caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
104.6s |
107.4s |
104.6s |
107.3s |
57.6s |
58.1s |
58.5s |
57.9s |
58.8s |
58.7s |
59.4s |
59.3s |
test_image_options_imports_correctly |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
test_ecc384_sign_validation_failure |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
0.2s |
0.3s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.5s |
2.6s |
2.4s |
2.4s |
2.8s |
2.7s |
2.9s |
2.9s |
2.9s |
2.8s |
3.1s |
2.8s |
test_sha256 |
4.1s |
5.2s |
4.4s |
4.3s |
4.4s |
4.7s |
4.4s |
4.5s |
4.4s |
4.7s |
4.3s |
4.4s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.3s |
3.9s |
3.3s |
3.2s |
3.8s |
3.6s |
3.7s |
3.6s |
3.7s |
3.8s |
3.5s |
3.7s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
0.6s |
0.5s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
0.4s |
0.5s |
0.5s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
0.4s |
0.3s |
0.3s |
0.2s |
0.2s |
0.1s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.5s |
1.7s |
1.5s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.4s |
1.2s |
1.4s |
1.5s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
test_rtalias::test_fht_info |
1.6s |
1.4s |
1.9s |
1.6s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_rtalias::test_pcr_log |
2.6s |
2.4s |
2.3s |
2.5s |
1.8s |
1.7s |
1.7s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.2s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.6s |
0.5s |
0.6s |
1.0s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
0.9s |
1.1s |
1.1s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_dice_derivations::test_cold_reset_status_reporting |
1.5s |
1.5s |
1.6s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.1s |
0.9s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
test_fake_rom::test_fake_rom_fw_load |
0.7s |
0.6s |
0.6s |
1.0s |
0.4s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
test_fake_rom::test_fake_rom_production_enabled |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_update_reset |
1.0s |
0.8s |
1.0s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fips_hooks::test_fips_hook_exit |
1.1s |
1.1s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.4s |
1.3s |
1.3s |
1.1s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.4s |
1.4s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
test_fmcalias_derivation::test_fht_info |
1.5s |
1.5s |
1.3s |
1.4s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.7s |
0.8s |
0.9s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.4s |
1.3s |
1.2s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.5s |
1.4s |
1.3s |
1.7s |
1.2s |
1.1s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
2.2s |
1.8s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.4s |
1.1s |
1.5s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.6s |
1.4s |
1.5s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.6s |
1.3s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.8s |
0.6s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.1s |
1.1s |
1.2s |
1.3s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_single_measurement |
1.1s |
1.2s |
1.2s |
1.3s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_idevid_derivation::test_generate_csr |
1.5s |
1.5s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
928.8s |
894.0s |
907.6s |
879.1s |
890.7s |
858.4s |
895.2s |
863.7s |
897.2s |
858.2s |
894.6s |
858.8s |
test_idevid_derivation::test_idev_subj_key_id_algo |
6.1s |
5.4s |
5.4s |
5.3s |
5.3s |
5.1s |
4.9s |
4.7s |
5.4s |
5.2s |
5.2s |
4.7s |
test_image_validation::cert_test |
1.9s |
1.2s |
1.4s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.5s |
1.2s |
1.2s |
1.2s |
test_image_validation::cert_test_with_custom_dates |
1.4s |
1.2s |
1.4s |
1.3s |
1.5s |
1.1s |
1.1s |
1.1s |
1.6s |
1.3s |
1.2s |
1.1s |
test_image_validation::cert_test_with_ueid |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.2s |
1.4s |
1.0s |
test_image_validation::test_fmc_digest_mismatch |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_fmc_entry_point_unaligned |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.7s |
0.9s |
0.9s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
1.1s |
0.8s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
0.9s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
1.0s |
1.0s |
0.7s |
0.7s |
0.8s |
0.9s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
test_image_validation::test_fmc_load_addr_unaligned |
0.9s |
1.0s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.8s |
test_image_validation::test_fmc_not_contained_in_iccm |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.3s |
1.8s |
1.5s |
1.4s |
1.3s |
1.2s |
1.1s |
1.4s |
1.0s |
1.1s |
1.3s |
1.4s |
test_image_validation::test_fmc_svn_greater_than_32 |
0.8s |
1.1s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.8s |
0.7s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
0.6s |
0.6s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
0.7s |
0.6s |
0.8s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.8s |
0.6s |
0.8s |
0.7s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.7s |
0.6s |
0.7s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.3s |
2.4s |
2.4s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
1.6s |
1.7s |
1.6s |
1.7s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
0.9s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.2s |
1.1s |
1.2s |
1.4s |
1.2s |
1.1s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.1s |
1.0s |
1.1s |
1.3s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
1.5s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.3s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.6s |
0.8s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.6s |
0.7s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.2s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.6s |
0.6s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
2.7s |
2.7s |
2.7s |
3.0s |
2.6s |
2.4s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
33.0s |
31.9s |
32.7s |
31.6s |
30.7s |
29.6s |
31.0s |
30.4s |
30.6s |
29.5s |
30.8s |
29.8s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
19.0s |
17.8s |
18.9s |
17.4s |
17.4s |
16.6s |
17.6s |
16.6s |
17.5s |
16.4s |
17.6s |
16.8s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
1.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.6s |
0.5s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
0.9s |
0.8s |
1.0s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
0.9s |
0.9s |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
test_image_validation::test_toc_fmc_size_zero |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_unknown_command_is_fatal |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
test_rom_integrity::test_rom_integrity_failure |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_success |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_version::test_version |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.2s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests_get_idev_csr::test_get_csr |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
2.3s |
2.4s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
2.3s |
2.5s |
2.6s |
2.3s |
2.2s |
2.1s |
2.2s |
2.4s |
2.2s |
2.1s |
2.3s |
2.3s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
2.9s |
3.2s |
3.4s |
2.5s |
2.5s |
2.4s |
2.6s |
2.8s |
2.5s |
2.5s |
2.6s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
2.3s |
2.9s |
2.8s |
2.2s |
2.2s |
2.1s |
2.3s |
2.5s |
2.3s |
2.1s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
2.8s |
2.4s |
2.6s |
2.3s |
2.2s |
2.1s |
2.2s |
2.8s |
2.2s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.2s |
2.1s |
2.3s |
2.0s |
1.8s |
1.7s |
1.8s |
2.5s |
1.8s |
1.8s |
1.9s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
1.6s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
1.6s |
1.3s |
1.3s |
1.9s |
1.2s |
1.2s |
1.3s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
1.4s |
1.3s |
1.3s |
1.7s |
1.3s |
1.2s |
1.3s |
1.6s |
1.3s |
1.2s |
1.4s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
2.7s |
2.5s |
2.6s |
2.9s |
2.6s |
2.5s |
2.6s |
2.7s |
3.3s |
2.5s |
2.7s |
2.6s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
2.2s |
2.1s |
2.2s |
2.6s |
2.1s |
2.0s |
2.1s |
2.1s |
2.6s |
2.1s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.5s |
1.2s |
1.4s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
1.7s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.3s |
1.2s |
1.5s |
1.3s |
1.7s |
1.3s |
test_boot::test_boot |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
1.1s |
0.8s |
1.0s |
0.8s |
test_boot::test_boot_tci_data |
1.0s |
0.9s |
1.0s |
1.0s |
1.3s |
0.9s |
1.0s |
0.9s |
1.4s |
0.9s |
1.2s |
0.9s |
test_boot::test_fw_version |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.3s |
1.2s |
1.3s |
1.1s |
1.5s |
1.1s |
test_boot::test_persistent_data |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
1.0s |
0.8s |
0.9s |
0.8s |
test_boot::test_standard |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
test_boot::test_stress_update |
350.7s |
330.2s |
339.9s |
331.5s |
315.9s |
306.0s |
324.8s |
315.2s |
317.0s |
309.7s |
324.8s |
317.8s |
test_boot::test_update |
2.0s |
2.0s |
2.0s |
1.9s |
2.2s |
1.8s |
2.3s |
1.9s |
1.9s |
1.8s |
2.1s |
1.9s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
1.3s |
1.2s |
1.3s |
1.2s |
1.5s |
1.2s |
1.5s |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
1.2s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
1.4s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
4.0s |
3.9s |
4.0s |
3.8s |
3.8s |
3.8s |
4.2s |
3.8s |
3.8s |
3.8s |
4.0s |
3.8s |
test_certs::test_dpe_leaf_cert |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.5s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
test_certs::test_fmc_alias_cert |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_full_cert_chain |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
test_certs::test_idev_id_cert |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_rt_alias_cert |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.3s |
2.1s |
2.1s |
2.6s |
2.2s |
2.3s |
test_disable::test_disable_attestation_cmd |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
4.5s |
4.6s |
4.5s |
4.4s |
4.4s |
4.4s |
4.6s |
4.5s |
4.5s |
5.5s |
4.7s |
5.3s |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.1s |
test_ecdsa::test_ecdsa_verify_cmd |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.2s |
test_fips::test_fips_shutdown |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.4s |
test_fips::test_fips_version |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.3s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
test_get_idev_csr::test_get_csr |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.2s |
test_get_idev_csr::test_missing_csr |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.0s |
3.8s |
3.8s |
3.7s |
3.6s |
3.6s |
3.9s |
3.8s |
3.7s |
3.5s |
3.7s |
3.8s |
test_info::test_idev_id_info |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
1.7s |
1.6s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
test_lms::test_lms_verify_failure |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_lmots_type |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_mailbox::test_error_cleared |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_mailbox::test_unimplemented_cmds |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.4s |
1.2s |
1.3s |
1.2s |
1.4s |
1.2s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_pcr::test_pcr_quote |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
1.4s |
1.3s |
1.3s |
1.4s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
1.9s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
1.6s |
1.6s |
1.6s |
1.5s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
1.6s |
1.6s |
1.6s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
1.6s |
1.6s |
1.6s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
1.6s |
1.6s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
1.5s |
1.5s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
1.5s |
1.4s |
1.5s |
1.4s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
1.5s |
1.4s |
1.4s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
1.7s |
1.7s |
1.7s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
3.8s |
3.7s |
3.9s |
3.6s |
3.5s |
3.4s |
3.7s |
3.5s |
3.6s |
3.3s |
3.7s |
3.6s |
test_stash_measurement::test_stash_measurement |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_tagging::test_duplicate_tag |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_default_context |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.2s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
2.0s |
1.9s |
test_update_reset::test_context_tags_validation |
2.0s |
1.9s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_deformed_structure |
2.1s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
2.0s |
1.9s |
1.9s |
2.0s |
2.0s |
test_update_reset::test_dpe_validation_illegal_state |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
2.0s |
test_update_reset::test_pcr_reset_counter_persistence |
2.9s |
2.8s |
2.9s |
2.8s |
2.6s |
2.5s |
2.7s |
2.6s |
2.7s |
2.6s |
2.7s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.7s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_tags_persistence |
2.9s |
2.8s |
2.9s |
2.8s |
2.6s |
2.5s |
2.7s |
2.6s |
2.7s |
2.6s |
2.7s |
2.7s |
test_warm_reset::test_mbox_busy_during_warm_reset |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.3s |
0.3s |
0.4s |
0.4s |
jtag_test::gdb_test |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
2.9s |
2.9s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.4s |
2.2s |
2.4s |
2.3s |
smoke_test::test_fmc_wdt_timeout |
2.0s |
1.9s |
2.0s |
2.2s |
1.9s |
1.8s |
2.0s |
1.9s |
2.3s |
1.9s |
2.4s |
1.9s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
2.3s |
2.3s |
2.4s |
2.8s |
2.2s |
2.2s |
2.3s |
2.2s |
2.7s |
2.2s |
2.8s |
2.2s |
test_code_coverage::test_emu_coverage |
7.5s |
7.2s |
8.0s |
7.5s |
8.4s |
7.3s |
8.2s |
6.8s |
8.0s |
7.0s |
8.1s |
7.1s |
warm_reset::warm_reset_basic |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.7s |
1.9s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
warm_reset::warm_reset_during_fw_load |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.1s |
0.8s |
0.9s |
1.0s |
0.9s |
0.9s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.9s |
0.9s |
0.6s |
0.8s |
1.0s |
0.7s |
0.9s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.7s |
0.9s |
0.9s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
1.1s |
0.7s |
0.7s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.7s |
0.8s |
1.2s |
0.7s |
0.6s |
0.6s |
0.6s |
0.9s |
0.7s |
0.8s |
0.7s |
0.8s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.9s |
0.7s |
1.0s |
fw_load::fw_load_blank_pub_key_hashes |
0.6s |
0.8s |
0.8s |
0.6s |
0.5s |
0.5s |
0.5s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
fw_load::fw_load_blank_pub_keys |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
fw_load::fw_load_error_fmc_digest_failure |
1.5s |
1.6s |
1.8s |
1.6s |
1.5s |
1.4s |
1.5s |
1.7s |
1.5s |
1.4s |
1.5s |
1.6s |
fw_load::fw_load_error_fmc_digest_mismatch |
1.7s |
1.9s |
1.8s |
1.7s |
1.7s |
1.5s |
1.7s |
1.9s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_invalid |
1.9s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
1.8s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_invalid |
1.8s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
1.9s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
1.8s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
2.3s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.8s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
1.8s |
1.7s |
1.8s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.8s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.5s |
2.0s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_size_zero |
1.7s |
1.6s |
1.8s |
1.7s |
2.1s |
1.6s |
2.1s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
1.7s |
1.7s |
1.8s |
1.6s |
2.2s |
1.6s |
2.1s |
1.5s |
1.6s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.5s |
1.6s |
1.5s |
1.7s |
1.8s |
fw_load::fw_load_error_header_digest_failure |
1.5s |
1.6s |
1.5s |
1.4s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.8s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
1.7s |
1.9s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
2.0s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.7s |
fw_load::fw_load_error_manifest_size_mismatch |
1.6s |
1.8s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.6s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.2s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.8s |
1.7s |
fw_load::fw_load_error_owner_lms_verify_failure |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.5s |
1.4s |
1.4s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.6s |
1.4s |
1.5s |
1.7s |
1.5s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.8s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_digest_mismatch |
1.9s |
2.2s |
1.9s |
1.9s |
1.8s |
2.1s |
1.8s |
1.7s |
1.8s |
2.2s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
1.9s |
2.2s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
2.3s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
2.2s |
2.1s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.0s |
1.9s |
2.1s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
2.0s |
2.3s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.0s |
1.9s |
2.2s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
2.2s |
1.9s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
1.7s |
1.7s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.8s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
1.7s |
1.7s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.3s |
1.9s |
2.4s |
1.9s |
1.8s |
1.8s |
1.9s |
1.7s |
2.0s |
1.9s |
2.2s |
1.8s |
fw_load::fw_load_error_toc_digest_failure |
1.7s |
1.5s |
1.7s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.8s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
1.9s |
1.6s |
2.2s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.0s |
1.6s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
1.7s |
1.6s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
2.8s |
2.6s |
3.0s |
3.2s |
2.6s |
2.7s |
2.7s |
2.6s |
2.8s |
2.9s |
2.7s |
2.6s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
2.7s |
2.5s |
2.8s |
3.1s |
2.5s |
2.5s |
2.6s |
2.4s |
2.6s |
2.5s |
2.5s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
2.8s |
2.7s |
3.0s |
3.2s |
2.6s |
2.6s |
2.7s |
2.6s |
2.7s |
2.5s |
2.6s |
2.9s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.8s |
3.6s |
3.8s |
3.7s |
2.9s |
2.8s |
2.8s |
2.6s |
2.9s |
2.6s |
2.7s |
2.8s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.6s |
1.6s |
1.7s |
1.6s |
1.5s |
1.7s |
1.5s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.4s |
1.4s |
1.6s |
1.5s |
1.5s |
1.4s |
1.7s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
1.9s |
1.9s |
2.0s |
1.9s |
1.7s |
1.6s |
1.9s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
1.8s |
1.8s |
2.0s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
security_parameters::attempt_ssp_access_fw_load |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
1.0s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.7s |
0.5s |
0.5s |
0.5s |
0.6s |
self_tests::integrity_check_failure_rom |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.2s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.1s |
2.1s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.2s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_halt_check_no_output |
9.2s |
9.2s |
9.4s |
9.5s |
9.5s |
9.6s |
8.6s |
9.4s |
9.3s |
9.6s |
9.4s |
9.6s |
self_tests::kat_hmac384_failure_rom |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_hmac384_failure_rt |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
2.0s |
2.0s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_lms_digest_mismatch_rom |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_sha1_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha256_digest_failure_rom |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha256_digest_mismatch_rom |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_mismatch_rt |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.1s |
2.0s |
2.3s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.2s |
2.0s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.1s |
2.0s |
2.3s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.2s |
2.0s |
2.2s |
2.2s |
2.1s |
1.9s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.2s |
2.0s |
2.1s |
2.1s |
2.1s |
1.9s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
services::check_version_rom |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
services::execute_all_services_rom |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
services::execute_all_services_rt |
2.3s |
2.2s |
2.3s |
2.4s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.2s |
2.3s |
2.3s |
services::fips_self_test_rom |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.8s |
0.6s |
0.8s |
0.7s |
0.8s |
0.7s |
services::fips_self_test_rt |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
services::version_info_update |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.1s |
1.3s |
1.2s |
1.3s |
1.3s |
services::zeroize_halt_check_no_output |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.4s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.57s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 107.35s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.62s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 107.31s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.59s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.14s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.47s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.90s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.80s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.71s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.38s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.28s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.12s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.01s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,593 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,505 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,455 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,645 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,179 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,319 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,933 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,827 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,223 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,351 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,539 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,961 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,457 UART: ecc384::test_gen_key_pair...[ok]
25,133 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,399 UART: ecc384::test_sign...[ok]
41,991 UART: ecc384::test_verify...[ok]
50,965 UART: ecc384::test_verify_r...[ok]
59,204 UART: ecc384::test_verify_failure...[ok]
67,846 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,504 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,465 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,253 UART: ecc384::test_gen_key_pair...[ok]
25,477 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,693 UART: ecc384::test_sign...[ok]
42,451 UART: ecc384::test_verify...[ok]
51,237 UART: ecc384::test_verify_r...[ok]
59,730 UART: ecc384::test_verify_failure...[ok]
68,662 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,712 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,177 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,189 UART: ecc384::test_gen_key_pair...[ok]
26,539 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,069 UART: ecc384::test_sign...[ok]
44,065 UART: ecc384::test_verify...[ok]
52,921 UART: ecc384::test_verify_r...[ok]
61,532 UART: ecc384::test_verify_failure...[ok]
70,736 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,466 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,691 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,747 UART: ecc384::test_gen_key_pair...[ok]
26,149 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,345 UART: ecc384::test_sign...[ok]
43,121 UART: ecc384::test_verify...[ok]
52,643 UART: ecc384::test_verify_r...[ok]
61,034 UART: ecc384::test_verify_failure...[ok]
70,118 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,672 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,325 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,371 UART: ecc384::test_gen_key_pair...[ok]
25,741 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,265 UART: ecc384::test_sign...[ok]
43,267 UART: ecc384::test_verify...[ok]
52,383 UART: ecc384::test_verify_r...[ok]
60,736 UART: ecc384::test_verify_failure...[ok]
69,628 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,252 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,305 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,249 UART: ecc384::test_gen_key_pair...[ok]
25,265 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,115 UART: ecc384::test_sign...[ok]
43,079 UART: ecc384::test_verify...[ok]
52,341 UART: ecc384::test_verify_r...[ok]
60,940 UART: ecc384::test_verify_failure...[ok]
69,542 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,002 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,037 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,715 UART: ecc384::test_gen_key_pair...[ok]
25,765 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,619 UART: ecc384::test_sign...[ok]
43,363 UART: ecc384::test_verify...[ok]
52,483 UART: ecc384::test_verify_r...[ok]
60,794 UART: ecc384::test_verify_failure...[ok]
70,044 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,784 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,279 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,839 UART: ecc384::test_gen_key_pair...[ok]
26,373 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,901 UART: ecc384::test_sign...[ok]
43,757 UART: ecc384::test_verify...[ok]
52,597 UART: ecc384::test_verify_r...[ok]
61,596 UART: ecc384::test_verify_failure...[ok]
70,682 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,580 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
118,377 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,367 UART: ecc384::test_gen_key_pair...[ok]
25,233 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,505 UART: ecc384::test_sign...[ok]
42,279 UART: ecc384::test_verify...[ok]
51,433 UART: ecc384::test_verify_r...[ok]
60,070 UART: ecc384::test_verify_failure...[ok]
68,308 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,004 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,899 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,285 UART: ecc384::test_gen_key_pair...[ok]
25,219 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,719 UART: ecc384::test_sign...[ok]
42,459 UART: ecc384::test_verify...[ok]
51,249 UART: ecc384::test_verify_r...[ok]
60,086 UART: ecc384::test_verify_failure...[ok]
68,782 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,212 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,761 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,207 UART: ecc384::test_gen_key_pair...[ok]
26,829 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,081 UART: ecc384::test_sign...[ok]
44,013 UART: ecc384::test_verify...[ok]
53,111 UART: ecc384::test_verify_r...[ok]
61,682 UART: ecc384::test_verify_failure...[ok]
70,874 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
90,252 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
118,707 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,607 UART: ecc384::test_gen_key_pair...[ok]
25,687 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,053 UART: ecc384::test_sign...[ok]
42,841 UART: ecc384::test_verify...[ok]
52,051 UART: ecc384::test_verify_r...[ok]
60,484 UART: ecc384::test_verify_failure...[ok]
69,750 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,988 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,001 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,528 UART: hmac384::test_hmac0...[ok]
13,581 UART: hmac384::test_hmac1...[ok]
17,792 UART: hmac384::test_hmac2...[ok]
37,759 UART: hmac384::test_hmac3...[ok]
57,187 UART: hmac384::test_hmac4...[ok]
77,646 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,675 UART: hmac384::test_hmac5...[ok]
121,297 UART: hmac384::test_kdf0...[ok]
137,807 UART: hmac384::test_kdf1...[ok]
153,491 UART: hmac384::test_kdf2...[ok]
159,224 UART: hmac384::test_hmac_multi_block...[ok]
165,041 UART: hmac384::test_hmac_exact_single_block...[ok]
170,993 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,696 UART: hmac384::test_hmac0...[ok]
13,599 UART: hmac384::test_hmac1...[ok]
17,804 UART: hmac384::test_hmac2...[ok]
37,671 UART: hmac384::test_hmac3...[ok]
57,471 UART: hmac384::test_hmac4...[ok]
77,456 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,835 UART: hmac384::test_hmac5...[ok]
120,611 UART: hmac384::test_kdf0...[ok]
137,015 UART: hmac384::test_kdf1...[ok]
152,811 UART: hmac384::test_kdf2...[ok]
158,316 UART: hmac384::test_hmac_multi_block...[ok]
164,101 UART: hmac384::test_hmac_exact_single_block...[ok]
170,047 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,868 UART: hmac384::test_hmac0...[ok]
13,945 UART: hmac384::test_hmac1...[ok]
18,070 UART: hmac384::test_hmac2...[ok]
38,705 UART: hmac384::test_hmac3...[ok]
58,969 UART: hmac384::test_hmac4...[ok]
78,798 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,471 UART: hmac384::test_hmac5...[ok]
122,825 UART: hmac384::test_kdf0...[ok]
139,523 UART: hmac384::test_kdf1...[ok]
155,555 UART: hmac384::test_kdf2...[ok]
161,276 UART: hmac384::test_hmac_multi_block...[ok]
167,301 UART: hmac384::test_hmac_exact_single_block...[ok]
173,483 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,000 UART: hmac384::test_hmac0...[ok]
14,103 UART: hmac384::test_hmac1...[ok]
18,340 UART: hmac384::test_hmac2...[ok]
38,521 UART: hmac384::test_hmac3...[ok]
58,191 UART: hmac384::test_hmac4...[ok]
78,144 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,849 UART: hmac384::test_hmac5...[ok]
121,411 UART: hmac384::test_kdf0...[ok]
138,161 UART: hmac384::test_kdf1...[ok]
154,109 UART: hmac384::test_kdf2...[ok]
159,790 UART: hmac384::test_hmac_multi_block...[ok]
165,667 UART: hmac384::test_hmac_exact_single_block...[ok]
171,945 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,750 UART: hmac384::test_hmac0...[ok]
13,639 UART: hmac384::test_hmac1...[ok]
17,712 UART: hmac384::test_hmac2...[ok]
37,979 UART: hmac384::test_hmac3...[ok]
57,071 UART: hmac384::test_hmac4...[ok]
76,796 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,051 UART: hmac384::test_hmac5...[ok]
120,269 UART: hmac384::test_kdf0...[ok]
136,479 UART: hmac384::test_kdf1...[ok]
151,931 UART: hmac384::test_kdf2...[ok]
157,656 UART: hmac384::test_hmac_multi_block...[ok]
163,451 UART: hmac384::test_hmac_exact_single_block...[ok]
169,553 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,582 UART: hmac384::test_hmac0...[ok]
13,697 UART: hmac384::test_hmac1...[ok]
17,896 UART: hmac384::test_hmac2...[ok]
38,025 UART: hmac384::test_hmac3...[ok]
58,147 UART: hmac384::test_hmac4...[ok]
78,724 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,749 UART: hmac384::test_hmac5...[ok]
122,511 UART: hmac384::test_kdf0...[ok]
138,655 UART: hmac384::test_kdf1...[ok]
154,205 UART: hmac384::test_kdf2...[ok]
159,668 UART: hmac384::test_hmac_multi_block...[ok]
165,653 UART: hmac384::test_hmac_exact_single_block...[ok]
171,637 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,018 UART: hmac384::test_hmac0...[ok]
14,031 UART: hmac384::test_hmac1...[ok]
18,318 UART: hmac384::test_hmac2...[ok]
37,941 UART: hmac384::test_hmac3...[ok]
58,417 UART: hmac384::test_hmac4...[ok]
78,740 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,427 UART: hmac384::test_hmac5...[ok]
122,677 UART: hmac384::test_kdf0...[ok]
139,473 UART: hmac384::test_kdf1...[ok]
154,885 UART: hmac384::test_kdf2...[ok]
160,518 UART: hmac384::test_hmac_multi_block...[ok]
166,509 UART: hmac384::test_hmac_exact_single_block...[ok]
172,637 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,936 UART: hmac384::test_hmac0...[ok]
14,165 UART: hmac384::test_hmac1...[ok]
18,374 UART: hmac384::test_hmac2...[ok]
38,479 UART: hmac384::test_hmac3...[ok]
58,315 UART: hmac384::test_hmac4...[ok]
78,396 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,549 UART: hmac384::test_hmac5...[ok]
122,103 UART: hmac384::test_kdf0...[ok]
138,765 UART: hmac384::test_kdf1...[ok]
154,611 UART: hmac384::test_kdf2...[ok]
160,354 UART: hmac384::test_hmac_multi_block...[ok]
166,313 UART: hmac384::test_hmac_exact_single_block...[ok]
172,491 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,654 UART: hmac384::test_hmac0...[ok]
13,867 UART: hmac384::test_hmac1...[ok]
17,942 UART: hmac384::test_hmac2...[ok]
38,079 UART: hmac384::test_hmac3...[ok]
57,473 UART: hmac384::test_hmac4...[ok]
77,262 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,047 UART: hmac384::test_hmac5...[ok]
121,145 UART: hmac384::test_kdf0...[ok]
137,765 UART: hmac384::test_kdf1...[ok]
153,337 UART: hmac384::test_kdf2...[ok]
158,968 UART: hmac384::test_hmac_multi_block...[ok]
164,809 UART: hmac384::test_hmac_exact_single_block...[ok]
170,789 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,784 UART: hmac384::test_hmac0...[ok]
13,723 UART: hmac384::test_hmac1...[ok]
17,680 UART: hmac384::test_hmac2...[ok]
37,439 UART: hmac384::test_hmac3...[ok]
57,337 UART: hmac384::test_hmac4...[ok]
77,348 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,231 UART: hmac384::test_hmac5...[ok]
120,957 UART: hmac384::test_kdf0...[ok]
137,187 UART: hmac384::test_kdf1...[ok]
152,415 UART: hmac384::test_kdf2...[ok]
157,934 UART: hmac384::test_hmac_multi_block...[ok]
164,003 UART: hmac384::test_hmac_exact_single_block...[ok]
169,965 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,918 UART: hmac384::test_hmac0...[ok]
14,229 UART: hmac384::test_hmac1...[ok]
18,598 UART: hmac384::test_hmac2...[ok]
38,133 UART: hmac384::test_hmac3...[ok]
58,515 UART: hmac384::test_hmac4...[ok]
79,046 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,343 UART: hmac384::test_hmac5...[ok]
123,085 UART: hmac384::test_kdf0...[ok]
140,091 UART: hmac384::test_kdf1...[ok]
155,265 UART: hmac384::test_kdf2...[ok]
161,050 UART: hmac384::test_hmac_multi_block...[ok]
167,037 UART: hmac384::test_hmac_exact_single_block...[ok]
173,143 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,818 UART: hmac384::test_hmac0...[ok]
14,025 UART: hmac384::test_hmac1...[ok]
18,360 UART: hmac384::test_hmac2...[ok]
38,331 UART: hmac384::test_hmac3...[ok]
58,083 UART: hmac384::test_hmac4...[ok]
78,064 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,285 UART: hmac384::test_hmac5...[ok]
122,275 UART: hmac384::test_kdf0...[ok]
139,363 UART: hmac384::test_kdf1...[ok]
154,981 UART: hmac384::test_kdf2...[ok]
160,676 UART: hmac384::test_hmac_multi_block...[ok]
166,495 UART: hmac384::test_hmac_exact_single_block...[ok]
172,735 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fcbf4000ed0`,
right: `0x7fcbf4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fbea4000ed0`,
right: `0x7fbea4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f5bd4000ed0`,
right: `0x7f5bd4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f72a8000ed0`,
right: `0x7f72a8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7a64000ed0`,
right: `0x7f7a64000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f46a4000ed0`,
right: `0x7f46a4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f992c000ed0`,
right: `0x7f992c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f49dc000ed0`,
right: `0x7f49dc000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ff83c000ed0`,
right: `0x7ff83c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f16ec000ed0`,
right: `0x7f16ec000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f5700000ed0`,
right: `0x7f5700000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0b4c000ed0`,
right: `0x7f0b4c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.54s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.52s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.36s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.36s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.35s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.48s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.49s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.51s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.38s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.25s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.18s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,794 UART: [kat] SHA2-512-ACC
896,695 UART: [kat] ECC-384
902,214 UART: [kat] HMAC-384Kdf
906,948 UART: [kat] LMS
1,475,144 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 ready_for_fw is high
1,480,933 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,475 UART: [ldev] ++
1,514,643 UART: [ldev] CDI.KEYID = 6
1,515,006 UART: [ldev] SUBJECT.KEYID = 5
1,515,432 UART: [ldev] AUTHORITY.KEYID = 7
1,515,895 UART: [ldev] FE.KEYID = 1
1,521,007 UART: [ldev] Erasing FE.KEYID = 1
1,546,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,354 UART: [ldev] --
1,585,693 UART: [fwproc] Waiting for Commands...
1,586,552 UART: [fwproc] Received command 0x46574c44
1,587,343 UART: [fwproc] Received Image of size 31656 bytes
1,938,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,481 >>> mbox cmd response: success
2,007,701 UART: [afmc] ++
2,007,869 UART: [afmc] CDI.KEYID = 6
2,008,231 UART: [afmc] SUBJECT.KEYID = 7
2,008,656 UART: [afmc] AUTHORITY.KEYID = 5
2,044,109 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,201 UART: [afmc] --
2,087,315 UART: [cold-reset] --
2,088,143 UART: [state] Locking Datavault
2,089,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,006 UART: [state] Locking ICCM
2,090,612 UART: [exit] Launching FMC @ 0x40000130
2,095,941 UART:
2,095,957 UART: Running Caliptra FMC ...
2,096,365 UART:
2,096,419 UART: [state] CFI Enabled
2,106,838 UART: [fht] FMC Alias Private Key: 7
2,214,427 UART: [art] Extend RT PCRs Done
2,214,855 UART: [art] Lock RT PCRs Done
2,216,317 UART: [art] Populate DV Done
2,224,870 UART: [fht] FMC Alias Private Key: 7
2,226,016 UART: [art] Derive CDI
2,226,296 UART: [art] Store in in slot 0x4
2,312,011 UART: [art] Derive Key Pair
2,312,371 UART: [art] Store priv key in slot 0x5
2,325,257 UART: [art] Derive Key Pair - Done
2,339,781 UART: [art] Signing Cert with AUTHO
2,340,261 UART: RITY.KEYID = 7
2,355,819 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,584 UART: [art] PUB.X = 806AC910A76583C858D5EB60E6202EA184A7A8830605C7C47AEAF5904F0BD3CDD82B154A32CD736373E118AEB2127D71
2,363,349 UART: [art] PUB.Y = 91D34C11A9B8A4249E6C51344F8CAF7C40998BBBA0E0344D09EBF1944D5E47F395915983D7DEF7557B2C5C3AFC0CED1A
2,370,307 UART: [art] SIG.R = 0B36CE89BEE9B37C5C585AD6A11144332737AB877EAE9EEB4448C4C2276934A01280CDE930DDA3FCF5403D3EB7EB92BA
2,377,090 UART: [art] SIG.S = 4D08558B1BC6081895F1DFDEF0CD86D9C55A0586A575423AC0EE2DD486FBA1692C6CCD56CE2D7AC7C2C3590E3D7D9EF0
2,400,430 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,181 ready_for_fw is high
1,362,181 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,855,191 >>> mbox cmd response: success
1,916,397 UART:
1,916,413 UART: Running Caliptra FMC ...
1,916,821 UART:
1,916,875 UART: [state] CFI Enabled
1,927,196 UART: [fht] FMC Alias Private Key: 7
2,035,021 UART: [art] Extend RT PCRs Done
2,035,449 UART: [art] Lock RT PCRs Done
2,037,141 UART: [art] Populate DV Done
2,045,494 UART: [fht] FMC Alias Private Key: 7
2,046,506 UART: [art] Derive CDI
2,046,786 UART: [art] Store in in slot 0x4
2,132,445 UART: [art] Derive Key Pair
2,132,805 UART: [art] Store priv key in slot 0x5
2,145,839 UART: [art] Derive Key Pair - Done
2,160,501 UART: [art] Signing Cert with AUTHO
2,160,981 UART: RITY.KEYID = 7
2,176,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,177,600 UART: [art] PUB.X = 6516D25CB3CDBA1A8B36513691523546D9E48E65C311587F10E9E9751E79A9FBAB0A9C7C259C2CAE08CCDDA2FE71DAA1
2,184,380 UART: [art] PUB.Y = 59098AC3F2333E7FAEC92AB08D394563EB1F22E41B7CC4C5EB06672F63176458C408AC6A43B6BDAA7E61F2DE31741BC7
2,191,333 UART: [art] SIG.R = 69B45322236FB9543835EF06FC9A5BCA18241A71E85DFE0D8CF6478DED1288FF3BC7769369271566CEF242BAA068E599
2,198,101 UART: [art] SIG.S = 5DE2256CC13C2A8C8805CD95D68A1A725D4A9023CCB255ECBCD5343A33ED4BE2B876F45B11404ED67F88D71DE3ABE343
2,221,748 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,477,084 UART: [cold-reset] ++
1,477,614 UART: [fht] Storing FHT @ 0x50003400
1,480,437 UART: [idev] ++
1,480,605 UART: [idev] CDI.KEYID = 6
1,480,965 UART: [idev] SUBJECT.KEYID = 7
1,481,389 UART: [idev] UDS.KEYID = 0
1,481,734 ready_for_fw is high
1,481,734 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,441 UART: [idev] Erasing UDS.KEYID = 0
1,506,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,807 UART: [idev] --
1,515,976 UART: [ldev] ++
1,516,144 UART: [ldev] CDI.KEYID = 6
1,516,507 UART: [ldev] SUBJECT.KEYID = 5
1,516,933 UART: [ldev] AUTHORITY.KEYID = 7
1,517,396 UART: [ldev] FE.KEYID = 1
1,522,674 UART: [ldev] Erasing FE.KEYID = 1
1,548,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,645 UART: [ldev] --
1,587,960 UART: [fwproc] Waiting for Commands...
1,588,771 UART: [fwproc] Received command 0x46574c44
1,589,562 UART: [fwproc] Received Image of size 31656 bytes
1,939,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,580 >>> mbox cmd response: success
2,008,822 UART: [afmc] ++
2,008,990 UART: [afmc] CDI.KEYID = 6
2,009,352 UART: [afmc] SUBJECT.KEYID = 7
2,009,777 UART: [afmc] AUTHORITY.KEYID = 5
2,045,216 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,256 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,984 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,869 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,559 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,504 UART: [afmc] --
2,088,448 UART: [cold-reset] --
2,089,358 UART: [state] Locking Datavault
2,090,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,073 UART: [state] Locking ICCM
2,091,693 UART: [exit] Launching FMC @ 0x40000130
2,097,022 UART:
2,097,038 UART: Running Caliptra FMC ...
2,097,446 UART:
2,097,589 UART: [state] CFI Enabled
2,108,388 UART: [fht] FMC Alias Private Key: 7
2,215,721 UART: [art] Extend RT PCRs Done
2,216,149 UART: [art] Lock RT PCRs Done
2,217,605 UART: [art] Populate DV Done
2,225,748 UART: [fht] FMC Alias Private Key: 7
2,226,694 UART: [art] Derive CDI
2,226,974 UART: [art] Store in in slot 0x4
2,312,995 UART: [art] Derive Key Pair
2,313,355 UART: [art] Store priv key in slot 0x5
2,326,281 UART: [art] Derive Key Pair - Done
2,341,104 UART: [art] Signing Cert with AUTHO
2,341,584 UART: RITY.KEYID = 7
2,356,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,309 UART: [art] PUB.X = 3940534AC96F70B5B04056C19A9656C2F4E4D138A257BFC273DC4919465758C67F2A4EE56365498774CB7A008FCE3C4C
2,364,055 UART: [art] PUB.Y = 695BDCD0779450F36F22E11D0C67689970C27286AADE3AEEC776EC6718EAEA20E3FA30CD3631F5E6686A9198ECC91EB2
2,371,014 UART: [art] SIG.R = EFBC3F131E524EC6E9E66FF09A5E5DB521C7F16AD5F04743AB86952919F3117A4FA201F69D22CC084D0DC23C43B60B53
2,377,784 UART: [art] SIG.S = 75E5D654DC91AF09CF48407A19BF3BDF835E3076DD1E36ADF70C646EBC5C094DC0EAC9259D4EB6E5425FCEE5740C29D9
2,401,562 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 ready_for_fw is high
1,362,768 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,484 >>> mbox cmd response: success
1,919,482 UART:
1,919,498 UART: Running Caliptra FMC ...
1,919,906 UART:
1,920,049 UART: [state] CFI Enabled
1,930,802 UART: [fht] FMC Alias Private Key: 7
2,038,475 UART: [art] Extend RT PCRs Done
2,038,903 UART: [art] Lock RT PCRs Done
2,040,691 UART: [art] Populate DV Done
2,048,936 UART: [fht] FMC Alias Private Key: 7
2,049,966 UART: [art] Derive CDI
2,050,246 UART: [art] Store in in slot 0x4
2,136,033 UART: [art] Derive Key Pair
2,136,393 UART: [art] Store priv key in slot 0x5
2,149,251 UART: [art] Derive Key Pair - Done
2,164,048 UART: [art] Signing Cert with AUTHO
2,164,528 UART: RITY.KEYID = 7
2,179,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,583 UART: [art] PUB.X = 90DBC4CF8FF58A2D058231287C6DB371773E01FA3A3F844DDD6325E7C1707961412CF7D7BB7DC14A007FF9BBB12F97B1
2,187,337 UART: [art] PUB.Y = 057675A8D66FB13462D4C2E101AE46F0E16F771BCD687234183CB89AE114168577E8AD9F8EF477D79719ECCFF77F3789
2,194,283 UART: [art] SIG.R = C2BF13EAA5C4AE0E4BDFF157AC078B1D2E474B25108D86CF3E457A4FB53302D29FADAB63BF8CCF32227B3C32032B377C
2,201,063 UART: [art] SIG.S = B2EC88A6A6A27CC1FABB2F1D7618FD47C6896A64DE7287FCF33BC4B32F06155CE5A03C0D90A7813D18616510D6ABD761
2,224,719 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,730 UART: [kat] SHA2-512-ACC
908,631 UART: [kat] ECC-384
918,326 UART: [kat] HMAC-384Kdf
922,790 UART: [kat] LMS
1,171,118 UART: [kat] --
1,172,123 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 ready_for_fw is high
1,176,601 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,066 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,179 UART: [idev] --
1,210,109 UART: [ldev] ++
1,210,277 UART: [ldev] CDI.KEYID = 6
1,210,640 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,396 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,627 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,394 >>> mbox cmd response: success
1,704,650 UART: [afmc] ++
1,704,818 UART: [afmc] CDI.KEYID = 6
1,705,180 UART: [afmc] SUBJECT.KEYID = 7
1,705,605 UART: [afmc] AUTHORITY.KEYID = 5
1,740,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,717 UART: [afmc] --
1,783,635 UART: [cold-reset] --
1,784,613 UART: [state] Locking Datavault
1,785,554 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,158 UART: [state] Locking ICCM
1,786,818 UART: [exit] Launching FMC @ 0x40000130
1,792,147 UART:
1,792,163 UART: Running Caliptra FMC ...
1,792,571 UART:
1,792,625 UART: [state] CFI Enabled
1,803,110 UART: [fht] FMC Alias Private Key: 7
1,910,775 UART: [art] Extend RT PCRs Done
1,911,203 UART: [art] Lock RT PCRs Done
1,912,621 UART: [art] Populate DV Done
1,920,754 UART: [fht] FMC Alias Private Key: 7
1,921,872 UART: [art] Derive CDI
1,922,152 UART: [art] Store in in slot 0x4
2,007,657 UART: [art] Derive Key Pair
2,008,017 UART: [art] Store priv key in slot 0x5
2,021,183 UART: [art] Derive Key Pair - Done
2,036,198 UART: [art] Signing Cert with AUTHO
2,036,678 UART: RITY.KEYID = 7
2,051,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,725 UART: [art] PUB.X = BBC0C87F4021321105A5745DAC3B6B167C7D43A2AF7337CA0205FBA37987A86733EF4E6F4E4553043782A7F16F7E1546
2,059,483 UART: [art] PUB.Y = 6298C7DCA5F92F259F8AC981767318D55F506207F2EBFD476B784F26C71DF59A5AD9323E4779222E975A8BDF6F0D84A7
2,066,431 UART: [art] SIG.R = 2A0F0E152C3C51366AF34BADCC0CC76819B140AD3486F0E76389E6540D78D27B430380E408018FB66EDFB8C9BD7219E5
2,073,186 UART: [art] SIG.S = 2710CCAD99FC25216F272AA9894CE450243ADBD3BD0A1D37B502F32E2AE2416F53E8035D5E26F4870856A8DE9C0E5544
2,097,421 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 ready_for_fw is high
1,060,085 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,421 >>> mbox cmd response: success
1,614,393 UART:
1,614,409 UART: Running Caliptra FMC ...
1,614,817 UART:
1,614,871 UART: [state] CFI Enabled
1,625,174 UART: [fht] FMC Alias Private Key: 7
1,732,493 UART: [art] Extend RT PCRs Done
1,732,921 UART: [art] Lock RT PCRs Done
1,734,227 UART: [art] Populate DV Done
1,742,490 UART: [fht] FMC Alias Private Key: 7
1,743,500 UART: [art] Derive CDI
1,743,780 UART: [art] Store in in slot 0x4
1,829,275 UART: [art] Derive Key Pair
1,829,635 UART: [art] Store priv key in slot 0x5
1,842,979 UART: [art] Derive Key Pair - Done
1,857,832 UART: [art] Signing Cert with AUTHO
1,858,312 UART: RITY.KEYID = 7
1,873,610 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,375 UART: [art] PUB.X = 8C37AE4A1A050A31740A927056E3BE02A0442F8DF32C84216CC8CFFEE45F3BD75032D97BF5891B04229F2F4FAFBFD64F
1,881,144 UART: [art] PUB.Y = 341D105541720F0171FBF596E0A41EAD3EE5BADEC26B34F8E40783559EC2A49AE08A198B70ACA0B014189F114BD705FF
1,888,092 UART: [art] SIG.R = 29E2B4F2057AB35270E0D9AAB4500885BBF28E9F80A62A1BCF4893609D2DBB6825947FD7D5AF6D7D8B1ED8C47F0766C3
1,894,865 UART: [art] SIG.S = 31A6ED1263F0CBA36561A6AF43C2F85C09AD05B21B8EEE0C006A182321CE94C68DB10CA6E1652276B2BBBB159F00A863
1,918,923 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,220 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
894,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,284 UART: [kat] ++
898,436 UART: [kat] sha1
902,646 UART: [kat] SHA2-256
904,586 UART: [kat] SHA2-384
907,377 UART: [kat] SHA2-512-ACC
909,278 UART: [kat] ECC-384
919,107 UART: [kat] HMAC-384Kdf
923,659 UART: [kat] LMS
1,171,987 UART: [kat] --
1,172,878 UART: [cold-reset] ++
1,173,258 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 ready_for_fw is high
1,177,128 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,737 UART: [idev] Erasing UDS.KEYID = 0
1,202,102 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,218,036 UART: [ldev] Erasing FE.KEYID = 1
1,244,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,988 UART: [ldev] --
1,283,289 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,198 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,931 >>> mbox cmd response: success
1,704,089 UART: [afmc] ++
1,704,257 UART: [afmc] CDI.KEYID = 6
1,704,619 UART: [afmc] SUBJECT.KEYID = 7
1,705,044 UART: [afmc] AUTHORITY.KEYID = 5
1,740,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,354 UART: [afmc] --
1,783,406 UART: [cold-reset] --
1,783,984 UART: [state] Locking Datavault
1,785,303 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,907 UART: [state] Locking ICCM
1,786,529 UART: [exit] Launching FMC @ 0x40000130
1,791,858 UART:
1,791,874 UART: Running Caliptra FMC ...
1,792,282 UART:
1,792,425 UART: [state] CFI Enabled
1,803,378 UART: [fht] FMC Alias Private Key: 7
1,911,355 UART: [art] Extend RT PCRs Done
1,911,783 UART: [art] Lock RT PCRs Done
1,913,271 UART: [art] Populate DV Done
1,921,572 UART: [fht] FMC Alias Private Key: 7
1,922,658 UART: [art] Derive CDI
1,922,938 UART: [art] Store in in slot 0x4
2,009,195 UART: [art] Derive Key Pair
2,009,555 UART: [art] Store priv key in slot 0x5
2,023,315 UART: [art] Derive Key Pair - Done
2,038,295 UART: [art] Signing Cert with AUTHO
2,038,775 UART: RITY.KEYID = 7
2,054,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,184 UART: [art] PUB.X = 2313E777DEF8E7B6A2595A24058C91B5ECDD9B5DC3F869F818C503A3D9A19B7EC64E5DBF23A043EA8B18D19C3A55CD21
2,061,964 UART: [art] PUB.Y = FBCBE5E511FE8FA709F792D690664A8D5E1F5CF260559E54136F3F84A3CE8C6C50C4C4BE43B12D53A82ECF9111E65E0B
2,068,924 UART: [art] SIG.R = 4E45186BDE1B9CF33AB43E01A4C9D0BB5F3961EB0FC172F22D22F3824C1B1D23DC6DB849B793326DC5C19E3B687FDCFD
2,075,708 UART: [art] SIG.S = 74B6ED639C674E2FDFE90F17A0CDC30A5B08C577234B756B368BE847B9E78422EFD2D9C3DBB7A60C02B15619339F8A9D
2,099,543 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,204 ready_for_fw is high
1,061,204 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,706 >>> mbox cmd response: success
1,617,616 UART:
1,617,632 UART: Running Caliptra FMC ...
1,618,040 UART:
1,618,183 UART: [state] CFI Enabled
1,628,988 UART: [fht] FMC Alias Private Key: 7
1,736,709 UART: [art] Extend RT PCRs Done
1,737,137 UART: [art] Lock RT PCRs Done
1,738,439 UART: [art] Populate DV Done
1,746,652 UART: [fht] FMC Alias Private Key: 7
1,747,590 UART: [art] Derive CDI
1,747,870 UART: [art] Store in in slot 0x4
1,833,433 UART: [art] Derive Key Pair
1,833,793 UART: [art] Store priv key in slot 0x5
1,847,353 UART: [art] Derive Key Pair - Done
1,862,228 UART: [art] Signing Cert with AUTHO
1,862,708 UART: RITY.KEYID = 7
1,877,666 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,431 UART: [art] PUB.X = 0EBAC7E9B50C2654E8A9B72D1014173767AEC1A5EBC5739F19138DFCF891E2E8AC6FC985DE6A04497A85AB4C7E25441B
1,885,206 UART: [art] PUB.Y = 5A1BEA1C5882AF78079534B1CDE1BFEEA5C6343E06CCA0A7CC5B1BB3E1573C83F5765A598AC50AECF5326257735565AC
1,892,163 UART: [art] SIG.R = 9D1403C64A9D32929237F7E5AF9716437D45B1F6D9EDF55CF7404FBB4E90C0B8806C21CA674A9E711CEB905B1A1BF3DD
1,898,942 UART: [art] SIG.S = D82A696653C028C4B043B4C9CACFFBB5A0F4EDC1930A9EFCEB419BC08AB1EE4B61944DF1AB05FC931310DA3B927D928F
1,922,774 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,413 UART: [idev] ++
1,172,581 UART: [idev] CDI.KEYID = 6
1,172,942 UART: [idev] SUBJECT.KEYID = 7
1,173,367 UART: [idev] UDS.KEYID = 0
1,173,713 ready_for_fw is high
1,173,713 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,587 UART: [idev] Sha1 KeyId Algorithm
1,207,543 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,158 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,498 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,256 >>> mbox cmd response: success
1,702,339 UART: [afmc] ++
1,702,507 UART: [afmc] CDI.KEYID = 6
1,702,870 UART: [afmc] SUBJECT.KEYID = 7
1,703,296 UART: [afmc] AUTHORITY.KEYID = 5
1,739,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,872 UART: [afmc] --
1,781,950 UART: [cold-reset] --
1,782,962 UART: [state] Locking Datavault
1,784,235 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,839 UART: [state] Locking ICCM
1,785,393 UART: [exit] Launching FMC @ 0x40000130
1,790,722 UART:
1,790,738 UART: Running Caliptra FMC ...
1,791,146 UART:
1,791,200 UART: [state] CFI Enabled
1,801,819 UART: [fht] FMC Alias Private Key: 7
1,909,366 UART: [art] Extend RT PCRs Done
1,909,794 UART: [art] Lock RT PCRs Done
1,911,600 UART: [art] Populate DV Done
1,919,815 UART: [fht] FMC Alias Private Key: 7
1,920,833 UART: [art] Derive CDI
1,921,113 UART: [art] Store in in slot 0x4
2,007,130 UART: [art] Derive Key Pair
2,007,490 UART: [art] Store priv key in slot 0x5
2,020,568 UART: [art] Derive Key Pair - Done
2,035,098 UART: [art] Signing Cert with AUTHO
2,035,578 UART: RITY.KEYID = 7
2,051,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,009 UART: [art] PUB.X = 71B935C5F55094338F30683853D5A484E32B51D917FD55D814D1CAF6A48193658D02E1DFDA98207A0D2374A9426CBF1E
2,058,771 UART: [art] PUB.Y = 49BC61C5F3AAFF247C0DCCDEF10B03BD9B388840157B19D9CFF1D3F649532A037D5BA94126699A0AF8C2641D5C5BB4A5
2,065,722 UART: [art] SIG.R = 052035D079B8A69A858D4B28B96431B0AC5267B01E512F422929461B509D6761818ABB086494D838D252CB2BB74A2ACB
2,072,480 UART: [art] SIG.S = 024742720C3513BCCEDB7AC08F0BA74C0CE7DB034146E9BD60538D3E8F5EAC70441CC07ED03A832D659BD1991851C605
2,095,994 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,828 ready_for_fw is high
1,055,828 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,850 >>> mbox cmd response: success
1,613,340 UART:
1,613,356 UART: Running Caliptra FMC ...
1,613,764 UART:
1,613,818 UART: [state] CFI Enabled
1,624,151 UART: [fht] FMC Alias Private Key: 7
1,731,208 UART: [art] Extend RT PCRs Done
1,731,636 UART: [art] Lock RT PCRs Done
1,733,464 UART: [art] Populate DV Done
1,741,739 UART: [fht] FMC Alias Private Key: 7
1,742,759 UART: [art] Derive CDI
1,743,039 UART: [art] Store in in slot 0x4
1,828,230 UART: [art] Derive Key Pair
1,828,590 UART: [art] Store priv key in slot 0x5
1,841,978 UART: [art] Derive Key Pair - Done
1,856,721 UART: [art] Signing Cert with AUTHO
1,857,201 UART: RITY.KEYID = 7
1,872,709 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,474 UART: [art] PUB.X = BFF6CD17B715A426B7C939E02AC929ACB2A46835784B028D1E687B61758747ACFB8EFF7505A3F1DB000F700E1FB4474E
1,880,220 UART: [art] PUB.Y = 185CB5D03A28E62D050287D6EE8C61FDA220E7EB23A848B8EF080A290D3C208D8766846270BEE82CC803B7FE197B2051
1,887,156 UART: [art] SIG.R = 6BAD6D4058CE8FEDEA1286B319A9BFB7BFB502F2434EE521F95E13DB02CD65AB5D6CBDC054DF78F9DA99D2A5FCD208B5
1,893,947 UART: [art] SIG.S = A476E581D3A5CD862E51D056040F466BC9577D232BCBA3B1C714FB9B9CCAEDEB904FB3DA96780F85ADCFA854312A4E3F
1,917,668 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,174,440 ready_for_fw is high
1,174,440 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,299 UART: [fwproc] Wait for Commands...
1,282,932 UART: [fwproc] Recv command 0x46574c44
1,283,665 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,693 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,399 >>> mbox cmd response: success
1,703,546 UART: [afmc] ++
1,703,714 UART: [afmc] CDI.KEYID = 6
1,704,077 UART: [afmc] SUBJECT.KEYID = 7
1,704,503 UART: [afmc] AUTHORITY.KEYID = 5
1,740,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,192 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,719 UART: [afmc] --
1,783,735 UART: [cold-reset] --
1,784,377 UART: [state] Locking Datavault
1,785,390 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,994 UART: [state] Locking ICCM
1,786,502 UART: [exit] Launching FMC @ 0x40000130
1,791,831 UART:
1,791,847 UART: Running Caliptra FMC ...
1,792,255 UART:
1,792,398 UART: [state] CFI Enabled
1,802,887 UART: [fht] FMC Alias Private Key: 7
1,911,262 UART: [art] Extend RT PCRs Done
1,911,690 UART: [art] Lock RT PCRs Done
1,913,186 UART: [art] Populate DV Done
1,921,309 UART: [fht] FMC Alias Private Key: 7
1,922,283 UART: [art] Derive CDI
1,922,563 UART: [art] Store in in slot 0x4
2,008,140 UART: [art] Derive Key Pair
2,008,500 UART: [art] Store priv key in slot 0x5
2,021,606 UART: [art] Derive Key Pair - Done
2,036,440 UART: [art] Signing Cert with AUTHO
2,036,920 UART: RITY.KEYID = 7
2,052,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,083 UART: [art] PUB.X = 1CC27A3E23508B62C98C782B493666636860D16AF7F0E3BDE6B5B8EDCB8620491EB1062CB8E2C72889BC8F91F75426C2
2,059,854 UART: [art] PUB.Y = AB49A4D121F53E8DCC62BFFAF72E8F53321F7D9321A8BBF7A2122A9C6DF6211AABBE497E8298DEEE311EA1C80F1FBE2F
2,066,829 UART: [art] SIG.R = CE2543AD2C5A68F2EA1D67F3EAEA612AB284664238B9B3D42AEB17AEC1A19BE5AEE1CE37CF7863C6E9BFCED91E4E0F1C
2,073,628 UART: [art] SIG.S = 15EEE382582541106D0493ACF73DC6C2101F06DA43F986C01A90F0155854D7CD875FF9253F7140E7B3D91A3326D9E152
2,097,674 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,635 ready_for_fw is high
1,057,635 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,069 >>> mbox cmd response: success
1,614,737 UART:
1,614,753 UART: Running Caliptra FMC ...
1,615,161 UART:
1,615,304 UART: [state] CFI Enabled
1,625,863 UART: [fht] FMC Alias Private Key: 7
1,733,768 UART: [art] Extend RT PCRs Done
1,734,196 UART: [art] Lock RT PCRs Done
1,735,690 UART: [art] Populate DV Done
1,743,767 UART: [fht] FMC Alias Private Key: 7
1,744,749 UART: [art] Derive CDI
1,745,029 UART: [art] Store in in slot 0x4
1,830,354 UART: [art] Derive Key Pair
1,830,714 UART: [art] Store priv key in slot 0x5
1,843,742 UART: [art] Derive Key Pair - Done
1,858,159 UART: [art] Signing Cert with AUTHO
1,858,639 UART: RITY.KEYID = 7
1,874,217 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,982 UART: [art] PUB.X = 75C98F712F926F151931EDF6B842393303386FDEAF26FBDDA7DA42047A35FEEED0DB63D48AA38848CE91C6C83F315BC9
1,881,760 UART: [art] PUB.Y = 88E0025E8AA7FF886FD5667CDD5D1ABC7B8071F1FABC9640698A603F872AF7378D50D0A1610B0C53182A52F5150D4D5C
1,888,706 UART: [art] SIG.R = DF567A499FBBB9455088781C86A81E163D5F44D1FCD1FC48702CD9074758D05E3261B9611AE0CC8672179BB811C141F5
1,895,473 UART: [art] SIG.S = 758D5972829DB2631DC8B2EF65E41B1441687F4614E6838B6855078879F7A524D7E4790F4D2A818412B7E1A6B8C01AF6
1,918,975 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,807 UART: [kat] SHA2-256
892,745 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
903,076 UART: [kat] HMAC-384Kdf
907,444 UART: [kat] LMS
1,475,640 UART: [kat] --
1,476,659 UART: [cold-reset] ++
1,477,117 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,806 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,617 UART: [ldev] Erasing FE.KEYID = 1
1,547,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,180 UART: [ldev] --
1,586,553 UART: [fwproc] Waiting for Commands...
1,587,420 UART: [fwproc] Received command 0x46574c44
1,588,211 UART: [fwproc] Received Image of size 31656 bytes
1,939,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,223 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,090 >>> mbox cmd response: success
2,009,278 UART: [afmc] ++
2,009,446 UART: [afmc] CDI.KEYID = 6
2,009,808 UART: [afmc] SUBJECT.KEYID = 7
2,010,233 UART: [afmc] AUTHORITY.KEYID = 5
2,044,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,222 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,615 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,305 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,240 UART: [afmc] --
2,088,342 UART: [cold-reset] --
2,089,164 UART: [state] Locking Datavault
2,090,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,013 UART: [state] Locking ICCM
2,091,525 UART: [exit] Launching FMC @ 0x40000130
2,096,854 UART:
2,096,870 UART: Running Caliptra FMC ...
2,097,278 UART:
2,097,332 UART: [state] CFI Enabled
2,108,239 UART: [fht] FMC Alias Private Key: 7
2,215,800 UART: [art] Extend RT PCRs Done
2,216,228 UART: [art] Lock RT PCRs Done
2,217,558 UART: [art] Populate DV Done
2,225,841 UART: [fht] FMC Alias Private Key: 7
2,226,819 UART: [art] Derive CDI
2,227,099 UART: [art] Store in in slot 0x4
2,312,480 UART: [art] Derive Key Pair
2,312,840 UART: [art] Store priv key in slot 0x5
2,325,902 UART: [art] Derive Key Pair - Done
2,340,825 UART: [art] Signing Cert with AUTHO
2,341,305 UART: RITY.KEYID = 7
2,356,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,892 UART: [art] PUB.X = 7204A0A28A2ED1306E57803E2079FD5C515B58B9C4736BA445754892A897CDB708A6757CC49D6D9E76C07319CB50F6E4
2,363,654 UART: [art] PUB.Y = B4521C645F7D2542129ED92DBE9FDD2F1CC0FEADBC21B0FABB163E904F1951901BDDFCB7AB3058D3D87B151B983D71E1
2,370,626 UART: [art] SIG.R = 57159D060B64C300F7F2CBFB72DB360F11528F0D707CB048798007E3E1E8ED9FEC57FC792EE39E45532E56E5A7323A15
2,377,363 UART: [art] SIG.S = 44C20FE1FA83DE4D39E57AF3C63DEDED03C6F80B204307FB1725F327D2C25B2D22DA31C71C98B2C21E1E039BECC5B5F3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,041 ready_for_fw is high
1,362,041 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,247 >>> mbox cmd response: success
1,918,365 UART:
1,918,381 UART: Running Caliptra FMC ...
1,918,789 UART:
1,918,843 UART: [state] CFI Enabled
1,929,158 UART: [fht] FMC Alias Private Key: 7
2,036,735 UART: [art] Extend RT PCRs Done
2,037,163 UART: [art] Lock RT PCRs Done
2,038,829 UART: [art] Populate DV Done
2,047,116 UART: [fht] FMC Alias Private Key: 7
2,048,266 UART: [art] Derive CDI
2,048,546 UART: [art] Store in in slot 0x4
2,134,605 UART: [art] Derive Key Pair
2,134,965 UART: [art] Store priv key in slot 0x5
2,147,903 UART: [art] Derive Key Pair - Done
2,162,684 UART: [art] Signing Cert with AUTHO
2,163,164 UART: RITY.KEYID = 7
2,178,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,505 UART: [art] PUB.X = 3E27E3BB16921BD76DE8F0B3EAE6928ACE13484C434703CD80E05B31A4FBA5B17EFAACF35A2DA8279F9BC9F1CD3DFEDF
2,186,302 UART: [art] PUB.Y = DF5E02294C4882FE4B67EBFC2104030ED592F29228B07737BEA5B2EA786490E822BB943CFDDFB71F4B22E23F6A854737
2,193,248 UART: [art] SIG.R = 0A7B783E34B9B86B36AE364441C1211FBCB4A635926881DCE75ED2F039C95129E3EC5B79BA83A94328C254F805CDC042
2,200,016 UART: [art] SIG.S = 15952AAC272A33A2FB1A0A61345317A69CDB4ED59CD4574F8BC16D6BFAF09D74830912879EB65970685510D86476CA05
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,901 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,758 UART: [cold-reset] ++
1,477,216 UART: [fht] Storing FHT @ 0x50003400
1,480,183 UART: [idev] ++
1,480,351 UART: [idev] CDI.KEYID = 6
1,480,711 UART: [idev] SUBJECT.KEYID = 7
1,481,135 UART: [idev] UDS.KEYID = 0
1,481,480 ready_for_fw is high
1,481,480 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,869 UART: [idev] --
1,515,966 UART: [ldev] ++
1,516,134 UART: [ldev] CDI.KEYID = 6
1,516,497 UART: [ldev] SUBJECT.KEYID = 5
1,516,923 UART: [ldev] AUTHORITY.KEYID = 7
1,517,386 UART: [ldev] FE.KEYID = 1
1,522,630 UART: [ldev] Erasing FE.KEYID = 1
1,548,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,563 UART: [ldev] --
1,588,010 UART: [fwproc] Waiting for Commands...
1,588,627 UART: [fwproc] Received command 0x46574c44
1,589,418 UART: [fwproc] Received Image of size 31656 bytes
1,940,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,009,274 >>> mbox cmd response: success
2,010,330 UART: [afmc] ++
2,010,498 UART: [afmc] CDI.KEYID = 6
2,010,860 UART: [afmc] SUBJECT.KEYID = 7
2,011,285 UART: [afmc] AUTHORITY.KEYID = 5
2,046,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,031 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,721 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,522 UART: [afmc] --
2,089,568 UART: [cold-reset] --
2,090,340 UART: [state] Locking Datavault
2,091,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,075 UART: [state] Locking ICCM
2,092,597 UART: [exit] Launching FMC @ 0x40000130
2,097,926 UART:
2,097,942 UART: Running Caliptra FMC ...
2,098,350 UART:
2,098,493 UART: [state] CFI Enabled
2,109,160 UART: [fht] FMC Alias Private Key: 7
2,217,585 UART: [art] Extend RT PCRs Done
2,218,013 UART: [art] Lock RT PCRs Done
2,219,389 UART: [art] Populate DV Done
2,227,814 UART: [fht] FMC Alias Private Key: 7
2,228,996 UART: [art] Derive CDI
2,229,276 UART: [art] Store in in slot 0x4
2,315,165 UART: [art] Derive Key Pair
2,315,525 UART: [art] Store priv key in slot 0x5
2,329,091 UART: [art] Derive Key Pair - Done
2,344,030 UART: [art] Signing Cert with AUTHO
2,344,510 UART: RITY.KEYID = 7
2,360,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,360,917 UART: [art] PUB.X = 1F2123F2567FDC398119EE3D69B57CE149B7DCF52F26D85AEC9B8AA3D8FFBFD35C3315A15A98F7268312026E7A1DD34A
2,367,698 UART: [art] PUB.Y = 931522D554CBAFD57EB2D63EDBEAC8369649B9355E8340AFA0FBB8152D900E26A37B61A7423D236FBCADB31D367C880D
2,374,656 UART: [art] SIG.R = 6729F86D1F4EB863C094D4C1BD9EBD6E682125B1CC178E479274AE1334FD6C8297E9B90BA8E5C1FCB7307FDFBE490075
2,381,413 UART: [art] SIG.S = 6032389D291185478EAA10ED33C1D496D979367DFA001C22D911ECED7D36C1BB38A43C23F48BCBA5912B556104765684
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,706 ready_for_fw is high
1,363,706 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,858,740 >>> mbox cmd response: success
1,920,608 UART:
1,920,624 UART: Running Caliptra FMC ...
1,921,032 UART:
1,921,175 UART: [state] CFI Enabled
1,931,820 UART: [fht] FMC Alias Private Key: 7
2,039,759 UART: [art] Extend RT PCRs Done
2,040,187 UART: [art] Lock RT PCRs Done
2,041,769 UART: [art] Populate DV Done
2,050,002 UART: [fht] FMC Alias Private Key: 7
2,051,070 UART: [art] Derive CDI
2,051,350 UART: [art] Store in in slot 0x4
2,137,243 UART: [art] Derive Key Pair
2,137,603 UART: [art] Store priv key in slot 0x5
2,151,025 UART: [art] Derive Key Pair - Done
2,165,558 UART: [art] Signing Cert with AUTHO
2,166,038 UART: RITY.KEYID = 7
2,181,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,773 UART: [art] PUB.X = 94A269A9A99FF0CAE2BD022D8BB89E5EFC04A0FD2F99476AC92AD5E190B1AFBA1D1EF936B7A8F7ACED06A2978D5A0C27
2,188,559 UART: [art] PUB.Y = 5E175DBF9D179F19071872842A6C38DE1CB3FA75EDB086D349DD3684D49387FE085D6F490619A2D5CE01DE2264FB7C2C
2,195,505 UART: [art] SIG.R = CF717C85EC66C5DB5A9416B1943A5DBE8F088ED89AA3A9F577FFE506CCD49EC3D7C4F6DDD00A854462B5841D45B49420
2,202,282 UART: [art] SIG.S = 9967A2015FE1BFF202231D3EE56359072B8E503B307D1FFA282158B241A3651B3CF7A63A06D068BA8735AECFF494AB74
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,705 UART: [kat] SHA2-256
903,645 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,933 UART: [cold-reset] ++
1,172,353 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 ready_for_fw is high
1,176,289 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,405 UART: [idev] Sha1 KeyId Algorithm
1,208,983 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,496 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,412 UART: [fwproc] Recv command 0x46574c44
1,284,140 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,667 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,404 >>> mbox cmd response: success
1,705,628 UART: [afmc] ++
1,705,796 UART: [afmc] CDI.KEYID = 6
1,706,158 UART: [afmc] SUBJECT.KEYID = 7
1,706,583 UART: [afmc] AUTHORITY.KEYID = 5
1,742,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,357 UART: [afmc] --
1,785,399 UART: [cold-reset] --
1,786,213 UART: [state] Locking Datavault
1,787,580 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,184 UART: [state] Locking ICCM
1,788,604 UART: [exit] Launching FMC @ 0x40000130
1,793,933 UART:
1,793,949 UART: Running Caliptra FMC ...
1,794,357 UART:
1,794,411 UART: [state] CFI Enabled
1,804,494 UART: [fht] FMC Alias Private Key: 7
1,912,467 UART: [art] Extend RT PCRs Done
1,912,895 UART: [art] Lock RT PCRs Done
1,914,851 UART: [art] Populate DV Done
1,922,914 UART: [fht] FMC Alias Private Key: 7
1,924,044 UART: [art] Derive CDI
1,924,324 UART: [art] Store in in slot 0x4
2,010,253 UART: [art] Derive Key Pair
2,010,613 UART: [art] Store priv key in slot 0x5
2,023,387 UART: [art] Derive Key Pair - Done
2,038,017 UART: [art] Signing Cert with AUTHO
2,038,497 UART: RITY.KEYID = 7
2,053,645 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,410 UART: [art] PUB.X = AC85D4375E4382BA03E8E944C95674857E544E75249A97F4BD2F5CF2AB756AE7495EA3020948A536C5E0969052528F29
2,061,165 UART: [art] PUB.Y = 6DFA8BD2429280B405628051F865955E432B8FE672CD78508AFF166E4BCAE597CE75BA9AAFADFBDE2DDFE637B24DFDC6
2,068,136 UART: [art] SIG.R = 8C9EA7F14225A8962BF8C8B3D366D259AFDC7FFAF7B0BB73A1D707BC009B7CF2AADAAF2FFE946453AD83FCF9211AD301
2,074,906 UART: [art] SIG.S = 9C056B4BF66D6608E843C3700EA90FA63424A56DF091CD2B21D6577B75A7484C46E6CE100BE38B4558522B2835292A86
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 ready_for_fw is high
1,060,589 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,045 >>> mbox cmd response: success
1,618,099 UART:
1,618,115 UART: Running Caliptra FMC ...
1,618,523 UART:
1,618,577 UART: [state] CFI Enabled
1,629,530 UART: [fht] FMC Alias Private Key: 7
1,737,215 UART: [art] Extend RT PCRs Done
1,737,643 UART: [art] Lock RT PCRs Done
1,739,125 UART: [art] Populate DV Done
1,747,334 UART: [fht] FMC Alias Private Key: 7
1,748,362 UART: [art] Derive CDI
1,748,642 UART: [art] Store in in slot 0x4
1,834,431 UART: [art] Derive Key Pair
1,834,791 UART: [art] Store priv key in slot 0x5
1,847,463 UART: [art] Derive Key Pair - Done
1,862,357 UART: [art] Signing Cert with AUTHO
1,862,837 UART: RITY.KEYID = 7
1,877,865 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,630 UART: [art] PUB.X = 7AB9D97DE0FDA96D803B3F0CED2CE689855D3FBEA39EA8C77F558E73242CE1A2CC26665B9C1C220402148251A8385A00
1,885,379 UART: [art] PUB.Y = 5F5E5620DB0D36048E29DDA7C5F018377F4E8356DF197F6F0F01B6133CFA9FC04C7F56A619DADF1925B09F8661AF1BA3
1,892,329 UART: [art] SIG.R = 7C34D6E8915743B4080504DB9CF4A2BB7C1D9659C950D592DD06DBD6703E84D514B0B3F695FB4AF61B292692FD0785BD
1,899,090 UART: [art] SIG.S = D4269680D32DA4F4B340BF8C792C7C4E5A96FBAE663D408D9E1159E4AB7B4F9F74B633F410D82FE10E96C8C3B33C1778
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
893,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,070 UART: [kat] ++
898,222 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,803 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,132 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,147 UART: [idev] ++
1,175,315 UART: [idev] CDI.KEYID = 6
1,175,675 UART: [idev] SUBJECT.KEYID = 7
1,176,099 UART: [idev] UDS.KEYID = 0
1,176,444 ready_for_fw is high
1,176,444 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,205 UART: [idev] Erasing UDS.KEYID = 0
1,201,074 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] --
1,210,726 UART: [ldev] ++
1,210,894 UART: [ldev] CDI.KEYID = 6
1,211,257 UART: [ldev] SUBJECT.KEYID = 5
1,211,683 UART: [ldev] AUTHORITY.KEYID = 7
1,212,146 UART: [ldev] FE.KEYID = 1
1,217,346 UART: [ldev] Erasing FE.KEYID = 1
1,243,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,389 UART: [fwproc] Wait for Commands...
1,284,185 UART: [fwproc] Recv command 0x46574c44
1,284,913 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,056 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,703 >>> mbox cmd response: success
1,705,797 UART: [afmc] ++
1,705,965 UART: [afmc] CDI.KEYID = 6
1,706,327 UART: [afmc] SUBJECT.KEYID = 7
1,706,752 UART: [afmc] AUTHORITY.KEYID = 5
1,742,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,760,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,725 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,164 UART: [afmc] --
1,786,158 UART: [cold-reset] --
1,787,296 UART: [state] Locking Datavault
1,788,407 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,011 UART: [state] Locking ICCM
1,789,477 UART: [exit] Launching FMC @ 0x40000130
1,794,806 UART:
1,794,822 UART: Running Caliptra FMC ...
1,795,230 UART:
1,795,373 UART: [state] CFI Enabled
1,805,418 UART: [fht] FMC Alias Private Key: 7
1,913,895 UART: [art] Extend RT PCRs Done
1,914,323 UART: [art] Lock RT PCRs Done
1,915,715 UART: [art] Populate DV Done
1,924,352 UART: [fht] FMC Alias Private Key: 7
1,925,448 UART: [art] Derive CDI
1,925,728 UART: [art] Store in in slot 0x4
2,011,381 UART: [art] Derive Key Pair
2,011,741 UART: [art] Store priv key in slot 0x5
2,025,063 UART: [art] Derive Key Pair - Done
2,039,889 UART: [art] Signing Cert with AUTHO
2,040,369 UART: RITY.KEYID = 7
2,055,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,260 UART: [art] PUB.X = E3E2090961A75883040FCFD0EFB1A1BA544A120957237649DA257647CBF19C9424B80DD3FE7C18511BC41C5FD8AF919E
2,063,018 UART: [art] PUB.Y = D76C48D1C3C6F974F329D71A34134C35F4FE3599B46A4CA38DCF3E36FAA70883BAF1BDA6584954EF04713377E54E295F
2,069,970 UART: [art] SIG.R = 04FCEEEC22EFE495A3E6302D7955115E9AA5C7686699948268AFAB2BA51D8C83789144D676E69E2D06DAB3C9F4469D21
2,076,740 UART: [art] SIG.S = F5817EF23C0C1E1814D6069FC876B2710FAF3F3148A2F10BB901D934DF5FA51EF297B2797626D98E926C3DC3720D2C69
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 ready_for_fw is high
1,061,018 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,682 >>> mbox cmd response: success
1,618,850 UART:
1,618,866 UART: Running Caliptra FMC ...
1,619,274 UART:
1,619,417 UART: [state] CFI Enabled
1,630,038 UART: [fht] FMC Alias Private Key: 7
1,737,315 UART: [art] Extend RT PCRs Done
1,737,743 UART: [art] Lock RT PCRs Done
1,739,411 UART: [art] Populate DV Done
1,747,740 UART: [fht] FMC Alias Private Key: 7
1,748,918 UART: [art] Derive CDI
1,749,198 UART: [art] Store in in slot 0x4
1,834,719 UART: [art] Derive Key Pair
1,835,079 UART: [art] Store priv key in slot 0x5
1,848,583 UART: [art] Derive Key Pair - Done
1,863,183 UART: [art] Signing Cert with AUTHO
1,863,663 UART: RITY.KEYID = 7
1,879,281 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,046 UART: [art] PUB.X = 39DAB3795D8D7E4F09FBCC80865D36FD77E37BB36E916BD68A771066A5FB35AB8442247CF1660B047BF6E5626B62775B
1,886,813 UART: [art] PUB.Y = 996F8DD7E87EF3B4287A3CD2E8374E8B54DF0788903A84D8E55E5A6B5B18CA9D019166CC4D217320F6B599F710D2527F
1,893,761 UART: [art] SIG.R = 8123E4166272850E441452771356B68D4E34C948225EE18607887DE4D35733A29A1F9219D8CEF1B40AF22BD97F5A81E5
1,900,512 UART: [art] SIG.S = 87D9DED16A137515E271CA8A294BA52398D90BC2F98A99CE6F17388A5B58EE996C25B97001EA07077BC4842C085C4274
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,273 UART: [idev] ++
1,172,441 UART: [idev] CDI.KEYID = 6
1,172,802 UART: [idev] SUBJECT.KEYID = 7
1,173,227 UART: [idev] UDS.KEYID = 0
1,173,573 ready_for_fw is high
1,173,573 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,549 UART: [idev] Sha1 KeyId Algorithm
1,207,471 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,774 UART: [ldev] Erasing FE.KEYID = 1
1,240,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,302 UART: [fwproc] Wait for Commands...
1,280,997 UART: [fwproc] Recv command 0x46574c44
1,281,730 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,250 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,024 >>> mbox cmd response: success
1,702,279 UART: [afmc] ++
1,702,447 UART: [afmc] CDI.KEYID = 6
1,702,810 UART: [afmc] SUBJECT.KEYID = 7
1,703,236 UART: [afmc] AUTHORITY.KEYID = 5
1,738,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,632 UART: [afmc] --
1,782,556 UART: [cold-reset] --
1,783,532 UART: [state] Locking Datavault
1,784,833 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,437 UART: [state] Locking ICCM
1,785,883 UART: [exit] Launching FMC @ 0x40000130
1,791,212 UART:
1,791,228 UART: Running Caliptra FMC ...
1,791,636 UART:
1,791,690 UART: [state] CFI Enabled
1,801,949 UART: [fht] FMC Alias Private Key: 7
1,909,970 UART: [art] Extend RT PCRs Done
1,910,398 UART: [art] Lock RT PCRs Done
1,911,874 UART: [art] Populate DV Done
1,920,225 UART: [fht] FMC Alias Private Key: 7
1,921,293 UART: [art] Derive CDI
1,921,573 UART: [art] Store in in slot 0x4
2,006,934 UART: [art] Derive Key Pair
2,007,294 UART: [art] Store priv key in slot 0x5
2,020,808 UART: [art] Derive Key Pair - Done
2,036,000 UART: [art] Signing Cert with AUTHO
2,036,480 UART: RITY.KEYID = 7
2,052,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,849 UART: [art] PUB.X = AEE1FF264596ACACB99EB6DCF7837DA3B8B48BF14FF2E76E7ADE29EAC40F897A11611406CBFEFCFA99E5D3B0FC920D7C
2,059,644 UART: [art] PUB.Y = 23C2021F560298397EF8B60B957C1E348D3D254B087B9C1C2A70BC7D9B05CDB4BB5CDB2C3F33F6A1EE8A7561D6AF4669
2,066,591 UART: [art] SIG.R = 096A72A432B5017FBAF3C2BFEAABC2F13E45839D0C9610E651DD06ED8AE9F9A969E43D04605DADD44A804AF62F8CE37D
2,073,366 UART: [art] SIG.S = 56888A444530FB612416CA7B0D6C3100DB48697B762E41A9D489E8045B7C4D8D57A5F7B6418552AE7B6FF346C86D02D1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,430 ready_for_fw is high
1,056,430 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,380 >>> mbox cmd response: success
1,611,144 UART:
1,611,160 UART: Running Caliptra FMC ...
1,611,568 UART:
1,611,622 UART: [state] CFI Enabled
1,622,159 UART: [fht] FMC Alias Private Key: 7
1,729,986 UART: [art] Extend RT PCRs Done
1,730,414 UART: [art] Lock RT PCRs Done
1,732,344 UART: [art] Populate DV Done
1,740,427 UART: [fht] FMC Alias Private Key: 7
1,741,363 UART: [art] Derive CDI
1,741,643 UART: [art] Store in in slot 0x4
1,827,142 UART: [art] Derive Key Pair
1,827,502 UART: [art] Store priv key in slot 0x5
1,840,530 UART: [art] Derive Key Pair - Done
1,855,141 UART: [art] Signing Cert with AUTHO
1,855,621 UART: RITY.KEYID = 7
1,870,579 UART: [art] Erasing AUTHORITY.KEYID = 7
1,871,344 UART: [art] PUB.X = 69409B83AE315AF6990CB78CB53A00F656736B8B1ADF582D84BD92E8B52DBF3156F3260CD11AF1335A5B46E330A7C489
1,878,092 UART: [art] PUB.Y = A787FC1F5DCA22D786B5016DAABD137734A253C8B8702437622325016D834ADB6C3A845BFDAA321A890EE75AA4D1E370
1,885,041 UART: [art] SIG.R = 70D2446B91DB4E99BCFBFE04CB593D69E576C6686602414C511E6B267189EC21644C9F82899608D176303602CA78B7DE
1,891,795 UART: [art] SIG.S = F835A5A9ACC384943C6AE2999B603207E475DB4D9660083051C478B58C13C123F63E732A8324E8C334C3F73DCD5A3DA1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,514 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,175,022 ready_for_fw is high
1,175,022 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,292 UART: [idev] Sha1 KeyId Algorithm
1,209,236 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,217,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,379 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,542 UART: [fwproc] Recv command 0x46574c44
1,284,275 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,387 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,193 >>> mbox cmd response: success
1,703,344 UART: [afmc] ++
1,703,512 UART: [afmc] CDI.KEYID = 6
1,703,875 UART: [afmc] SUBJECT.KEYID = 7
1,704,301 UART: [afmc] AUTHORITY.KEYID = 5
1,739,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,627 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,346 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,045 UART: [afmc] --
1,783,019 UART: [cold-reset] --
1,783,785 UART: [state] Locking Datavault
1,784,972 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,576 UART: [state] Locking ICCM
1,786,172 UART: [exit] Launching FMC @ 0x40000130
1,791,501 UART:
1,791,517 UART: Running Caliptra FMC ...
1,791,925 UART:
1,792,068 UART: [state] CFI Enabled
1,802,799 UART: [fht] FMC Alias Private Key: 7
1,911,040 UART: [art] Extend RT PCRs Done
1,911,468 UART: [art] Lock RT PCRs Done
1,912,882 UART: [art] Populate DV Done
1,921,243 UART: [fht] FMC Alias Private Key: 7
1,922,171 UART: [art] Derive CDI
1,922,451 UART: [art] Store in in slot 0x4
2,008,118 UART: [art] Derive Key Pair
2,008,478 UART: [art] Store priv key in slot 0x5
2,021,452 UART: [art] Derive Key Pair - Done
2,036,089 UART: [art] Signing Cert with AUTHO
2,036,569 UART: RITY.KEYID = 7
2,051,985 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,750 UART: [art] PUB.X = 0155F63D21D81601D91BF1C726E7608E35598988E82CBFD92EEE521F7319DAC625C59448FE9E4106D709484AE987B307
2,059,501 UART: [art] PUB.Y = 47FC2381D1E8CF389E61368AE1626B4634469A2643057ECC97840237F614E417A7EF424055BC4C41CD894F733489CBC7
2,066,439 UART: [art] SIG.R = D5669707463133FBB7082A01836D9676A51568AF3AFD9732BC370AE92FEDD00255FFEB3A56CEB562614903BB85973545
2,073,189 UART: [art] SIG.S = C03D8D8EEA15FFB3D53CA3077E97E46AA70EA723D469646FEF0E5DED515DEB7AFFAF43AC12333CC033BDC343B5B33EE8
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 ready_for_fw is high
1,055,941 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,963 >>> mbox cmd response: success
1,613,299 UART:
1,613,315 UART: Running Caliptra FMC ...
1,613,723 UART:
1,613,866 UART: [state] CFI Enabled
1,624,315 UART: [fht] FMC Alias Private Key: 7
1,732,010 UART: [art] Extend RT PCRs Done
1,732,438 UART: [art] Lock RT PCRs Done
1,734,010 UART: [art] Populate DV Done
1,742,293 UART: [fht] FMC Alias Private Key: 7
1,743,433 UART: [art] Derive CDI
1,743,713 UART: [art] Store in in slot 0x4
1,829,310 UART: [art] Derive Key Pair
1,829,670 UART: [art] Store priv key in slot 0x5
1,842,566 UART: [art] Derive Key Pair - Done
1,857,464 UART: [art] Signing Cert with AUTHO
1,857,944 UART: RITY.KEYID = 7
1,872,746 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,511 UART: [art] PUB.X = 124F503A71A6DD6288AF8F3B0E0F36BC64CD59AA211678E0C687856F3B6CA0739430DCAA706BE938E4A3A10FDF799A05
1,880,279 UART: [art] PUB.Y = 45112F01C45ADA130FE05E1D59B73CD185B2D53FD06A52C916E4C8F5EFB325683F24D6792E8FE7BF8E71B4C462ACA945
1,887,235 UART: [art] SIG.R = 713F3FADC2636051CC19BF824C5C2F69F91E6AA5F25D07D1C5D790CDBBD13517E9740AE9538A132238D896FDF7597FE5
1,894,009 UART: [art] SIG.S = C0889B740DA4979064E18ED32CE562A428B0BE5F80DC1E647EB952E94E4AE4EE7DB60BDF887D1F739C71892B26663119
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
903,004 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,775 UART: [fht] Storing FHT @ 0x50003400
1,479,476 UART: [idev] ++
1,479,644 UART: [idev] CDI.KEYID = 6
1,480,004 UART: [idev] SUBJECT.KEYID = 7
1,480,428 UART: [idev] UDS.KEYID = 0
1,480,773 ready_for_fw is high
1,480,773 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,812 UART: [idev] --
1,514,829 UART: [ldev] ++
1,514,997 UART: [ldev] CDI.KEYID = 6
1,515,360 UART: [ldev] SUBJECT.KEYID = 5
1,515,786 UART: [ldev] AUTHORITY.KEYID = 7
1,516,249 UART: [ldev] FE.KEYID = 1
1,521,033 UART: [ldev] Erasing FE.KEYID = 1
1,546,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,086 UART: [ldev] --
1,585,531 UART: [fwproc] Waiting for Commands...
1,586,190 UART: [fwproc] Received command 0x46574c44
1,586,981 UART: [fwproc] Received Image of size 75384 bytes
2,438,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,465,893 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,495,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,572,658 >>> mbox cmd response: success
2,572,658 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,573,874 UART: [afmc] ++
2,574,042 UART: [afmc] CDI.KEYID = 6
2,574,404 UART: [afmc] SUBJECT.KEYID = 7
2,574,829 UART: [afmc] AUTHORITY.KEYID = 5
2,609,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,626,128 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,626,908 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,632,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,638,521 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,644,211 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,652,088 UART: [afmc] --
2,653,040 UART: [cold-reset] --
2,653,946 UART: [state] Locking Datavault
2,655,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,655,875 UART: [state] Locking ICCM
2,656,361 UART: [exit] Launching FMC @ 0x40000130
2,661,690 UART:
2,661,706 UART: Running Caliptra FMC ...
2,662,114 UART:
2,662,168 UART: [state] CFI Enabled
2,672,779 UART: [fht] FMC Alias Private Key: 7
2,780,760 UART: [art] Extend RT PCRs Done
2,781,188 UART: [art] Lock RT PCRs Done
2,783,230 UART: [art] Populate DV Done
2,791,699 UART: [fht] FMC Alias Private Key: 7
2,792,701 UART: [art] Derive CDI
2,792,981 UART: [art] Store in in slot 0x4
2,878,840 UART: [art] Derive Key Pair
2,879,200 UART: [art] Store priv key in slot 0x5
2,892,766 UART: [art] Derive Key Pair - Done
2,907,546 UART: [art] Signing Cert with AUTHO
2,908,026 UART: RITY.KEYID = 7
2,923,614 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,379 UART: [art] PUB.X = 07B7CE2E9D4A931EE1B0500F59431F6E9E8CA5C21622A4870BCE21EC41AA2F4B93803D826A00450C84298164757CE7F6
2,931,117 UART: [art] PUB.Y = DB322DF975E0B942544EE4D92E6DE6A1D6DD7A4E767D727FA5D6CBB99FB0AEB315D85F428A232C83C06BB5AD0A523B04
2,938,081 UART: [art] SIG.R = 5780D81E85A1BEBF771B747B1F494DE898B62EB62A304DE2B85732791D7701CB6E936780D7D2A671719D14303143C5CD
2,944,846 UART: [art] SIG.S = CF424512FE73E35D87C81804318BF551541C664F2EF9A40068C043CB1385CA78667D3BB8A6BA056203820EB6AEEFCDD1
2,968,115 UART: mock_rt_interact::rt_entry...FMC Tester
3,075,915 UART: [rt] Runtime listening for mailbox commands...
3,079,305 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,525 ready_for_fw is high
1,362,525 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,424,474 >>> mbox cmd response: success
2,424,474 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,328 UART:
2,485,344 UART: Running Caliptra FMC ...
2,485,752 UART:
2,485,806 UART: [state] CFI Enabled
2,496,379 UART: [fht] FMC Alias Private Key: 7
2,604,616 UART: [art] Extend RT PCRs Done
2,605,044 UART: [art] Lock RT PCRs Done
2,606,730 UART: [art] Populate DV Done
2,614,965 UART: [fht] FMC Alias Private Key: 7
2,615,997 UART: [art] Derive CDI
2,616,277 UART: [art] Store in in slot 0x4
2,702,170 UART: [art] Derive Key Pair
2,702,530 UART: [art] Store priv key in slot 0x5
2,715,560 UART: [art] Derive Key Pair - Done
2,730,328 UART: [art] Signing Cert with AUTHO
2,730,808 UART: RITY.KEYID = 7
2,745,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,493 UART: [art] PUB.X = C3395B5A7493535C6EDBA51A7A19149BC5D64D148A6E110F80504E5AA33E7BBFE937844048D783C761F0C6B9D80F18C7
2,753,261 UART: [art] PUB.Y = 6F2CD1149488E79E5D19A51ABBB8FC430E3ABF515AD77EB00DA4FC2D215BD67753B6F8024CA74AA221E15E173FA837FE
2,760,220 UART: [art] SIG.R = 81BFD0F5C8E53F6881DA3A57D4B2708C0450BAD0ACBC366BD40362A8979E7BF6968FE7D2C96285F34CF3BC8C6A084D61
2,766,995 UART: [art] SIG.S = 00DCA388FC8AF782852F833EA1F2092C68EFD847BDCDE4D4A8BA98DDBD6B1612E059C182F8FA87BABFD2B7E6C272E5FB
2,790,823 UART: mock_rt_interact::rt_entry...FMC Tester
2,898,862 UART: [rt] Runtime listening for mailbox commands...
2,902,252 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,311 UART: [kat] LMS
1,475,507 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,545 UART: [idev] ++
1,479,713 UART: [idev] CDI.KEYID = 6
1,480,073 UART: [idev] SUBJECT.KEYID = 7
1,480,497 UART: [idev] UDS.KEYID = 0
1,480,842 ready_for_fw is high
1,480,842 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,505,189 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,692 UART: [ldev] ++
1,514,860 UART: [ldev] CDI.KEYID = 6
1,515,223 UART: [ldev] SUBJECT.KEYID = 5
1,515,649 UART: [ldev] AUTHORITY.KEYID = 7
1,516,112 UART: [ldev] FE.KEYID = 1
1,521,420 UART: [ldev] Erasing FE.KEYID = 1
1,546,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,155 UART: [ldev] --
1,586,658 UART: [fwproc] Waiting for Commands...
1,587,477 UART: [fwproc] Received command 0x46574c44
1,588,268 UART: [fwproc] Received Image of size 75384 bytes
2,440,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,497,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,143 >>> mbox cmd response: success
2,575,143 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,189 UART: [afmc] ++
2,576,357 UART: [afmc] CDI.KEYID = 6
2,576,719 UART: [afmc] SUBJECT.KEYID = 7
2,577,144 UART: [afmc] AUTHORITY.KEYID = 5
2,612,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,629,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,630,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,635,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,641,868 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,647,558 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,655,407 UART: [afmc] --
2,656,413 UART: [cold-reset] --
2,657,167 UART: [state] Locking Datavault
2,658,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,659,272 UART: [state] Locking ICCM
2,659,706 UART: [exit] Launching FMC @ 0x40000130
2,665,035 UART:
2,665,051 UART: Running Caliptra FMC ...
2,665,459 UART:
2,665,602 UART: [state] CFI Enabled
2,676,505 UART: [fht] FMC Alias Private Key: 7
2,784,610 UART: [art] Extend RT PCRs Done
2,785,038 UART: [art] Lock RT PCRs Done
2,786,656 UART: [art] Populate DV Done
2,794,967 UART: [fht] FMC Alias Private Key: 7
2,796,043 UART: [art] Derive CDI
2,796,323 UART: [art] Store in in slot 0x4
2,881,734 UART: [art] Derive Key Pair
2,882,094 UART: [art] Store priv key in slot 0x5
2,895,260 UART: [art] Derive Key Pair - Done
2,909,902 UART: [art] Signing Cert with AUTHO
2,910,382 UART: RITY.KEYID = 7
2,925,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,926,519 UART: [art] PUB.X = FD66BC3408E7C20FCA62698D4798397330D638B37A922662693AF783C5C8ACDC4B88DC60D3B4A1A96467FE82950FF5BB
2,933,286 UART: [art] PUB.Y = 8D3CF734D00036BDD70408012EBE4952AEBF4471A49C635B56956CA3334CBF0A3DD6FAB2E97A2CFD6C30A5D78D15FFF7
2,940,220 UART: [art] SIG.R = 84C0350BCAAA93B58D84FB2440DB505324E662C186AF95147580BF031033D208DE36F95AB214F6FD78C503B48D55D002
2,946,975 UART: [art] SIG.S = 70CC9C749ECAD079836EB67F5BC3397D26DE62F1593CFD70F0C1F2D0E1108D326576FD81AEE3BC25A5BAFC9F5367E404
2,970,825 UART: mock_rt_interact::rt_entry...FMC Tester
3,078,655 UART: [rt] Runtime listening for mailbox commands...
3,082,045 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,906 ready_for_fw is high
1,362,906 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,283 >>> mbox cmd response: success
2,423,283 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,484,571 UART:
2,484,587 UART: Running Caliptra FMC ...
2,484,995 UART:
2,485,138 UART: [state] CFI Enabled
2,495,461 UART: [fht] FMC Alias Private Key: 7
2,602,892 UART: [art] Extend RT PCRs Done
2,603,320 UART: [art] Lock RT PCRs Done
2,604,806 UART: [art] Populate DV Done
2,612,925 UART: [fht] FMC Alias Private Key: 7
2,613,891 UART: [art] Derive CDI
2,614,171 UART: [art] Store in in slot 0x4
2,699,604 UART: [art] Derive Key Pair
2,699,964 UART: [art] Store priv key in slot 0x5
2,714,190 UART: [art] Derive Key Pair - Done
2,728,950 UART: [art] Signing Cert with AUTHO
2,729,430 UART: RITY.KEYID = 7
2,744,398 UART: [art] Erasing AUTHORITY.KEYID = 7
2,745,163 UART: [art] PUB.X = CCDEE8084904DD9EF4432A1697818188BDC317DB7AB8BA7F69A03325AD5382EE3ACCFC753559E6646FAE20C4156CD3EE
2,751,943 UART: [art] PUB.Y = AABA18E5F7380EB1FCF940811F521CAC15B62AA7EAF5C3A5AE7FA472EAD330FA5734843BAAF752FBFA92026DEA605DBE
2,758,917 UART: [art] SIG.R = F2B16FE83826EC80995E541382B61D447BC3A24E3FD55F7F6DB0A29CE5351846C7EE6DD879E5D92769EC884838D9C8CE
2,765,695 UART: [art] SIG.S = F0C0FDA81C4B6320EB531AA1F6BD21FE133A40413508561026AA630B127089C664E2846584A3F2EF8C8C31C012C2C770
2,789,854 UART: mock_rt_interact::rt_entry...FMC Tester
2,897,621 UART: [rt] Runtime listening for mailbox commands...
2,901,011 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
893,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,659 UART: [kat] ++
897,811 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,864 UART: [kat] SHA2-512-ACC
908,765 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,041 UART: [cold-reset] ++
1,172,495 UART: [fht] FHT @ 0x50003400
1,175,114 UART: [idev] ++
1,175,282 UART: [idev] CDI.KEYID = 6
1,175,642 UART: [idev] SUBJECT.KEYID = 7
1,176,066 UART: [idev] UDS.KEYID = 0
1,176,411 ready_for_fw is high
1,176,411 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,201,595 UART: [idev] Sha1 KeyId Algorithm
1,210,245 UART: [idev] --
1,211,301 UART: [ldev] ++
1,211,469 UART: [ldev] CDI.KEYID = 6
1,211,832 UART: [ldev] SUBJECT.KEYID = 5
1,212,258 UART: [ldev] AUTHORITY.KEYID = 7
1,212,721 UART: [ldev] FE.KEYID = 1
1,218,063 UART: [ldev] Erasing FE.KEYID = 1
1,244,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,788 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,592 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,270,097 >>> mbox cmd response: success
2,270,097 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,257 UART: [afmc] ++
2,271,425 UART: [afmc] CDI.KEYID = 6
2,271,787 UART: [afmc] SUBJECT.KEYID = 7
2,272,212 UART: [afmc] AUTHORITY.KEYID = 5
2,307,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,340 UART: [afmc] --
2,351,404 UART: [cold-reset] --
2,352,214 UART: [state] Locking Datavault
2,353,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,793 UART: [state] Locking ICCM
2,354,345 UART: [exit] Launching FMC @ 0x40000130
2,359,674 UART:
2,359,690 UART: Running Caliptra FMC ...
2,360,098 UART:
2,360,152 UART: [state] CFI Enabled
2,370,767 UART: [fht] FMC Alias Private Key: 7
2,478,632 UART: [art] Extend RT PCRs Done
2,479,060 UART: [art] Lock RT PCRs Done
2,480,456 UART: [art] Populate DV Done
2,488,567 UART: [fht] FMC Alias Private Key: 7
2,489,513 UART: [art] Derive CDI
2,489,793 UART: [art] Store in in slot 0x4
2,575,652 UART: [art] Derive Key Pair
2,576,012 UART: [art] Store priv key in slot 0x5
2,589,570 UART: [art] Derive Key Pair - Done
2,604,280 UART: [art] Signing Cert with AUTHO
2,604,760 UART: RITY.KEYID = 7
2,620,068 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,833 UART: [art] PUB.X = 76DA658505F217E87B56FCA332DD1634AA3961AC07E5FDCFE9B650926F103775ACE77249FA3A9174B8103945E55D41BE
2,627,601 UART: [art] PUB.Y = 6961C1266F9038BE6FC12C7B57F02142310D830455FA81CE6973316D24955F7E4906C9835B8D399AC2D79FC9E2AF8478
2,634,536 UART: [art] SIG.R = 153477E2BC8A066CBABB92A529A1A71A10E5C600417A51D9BFE7EA4392A3A9E45D2580CB452973B59C90C53D20DF60FF
2,641,291 UART: [art] SIG.S = B24C5BFB9B54A6C5FB154E44263D64FF1EA953A2E48C84B9957DCD2ACADD35E2306865B195FF5C043BFED5A794026DE6
2,664,794 UART: mock_rt_interact::rt_entry...FMC Tester
2,772,400 UART: [rt] Runtime listening for mailbox commands...
2,775,790 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 ready_for_fw is high
1,059,701 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,120,570 >>> mbox cmd response: success
2,120,570 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,352 UART:
2,183,368 UART: Running Caliptra FMC ...
2,183,776 UART:
2,183,830 UART: [state] CFI Enabled
2,194,159 UART: [fht] FMC Alias Private Key: 7
2,301,750 UART: [art] Extend RT PCRs Done
2,302,178 UART: [art] Lock RT PCRs Done
2,303,614 UART: [art] Populate DV Done
2,311,681 UART: [fht] FMC Alias Private Key: 7
2,312,805 UART: [art] Derive CDI
2,313,085 UART: [art] Store in in slot 0x4
2,398,544 UART: [art] Derive Key Pair
2,398,904 UART: [art] Store priv key in slot 0x5
2,411,990 UART: [art] Derive Key Pair - Done
2,426,872 UART: [art] Signing Cert with AUTHO
2,427,352 UART: RITY.KEYID = 7
2,442,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,217 UART: [art] PUB.X = 27DDB7B74E118C43CEBC129DFF9FE0D74020B91D47AE12484B06313A01B14DFD8D13361228314A15E5AD3953AC9136F7
2,449,987 UART: [art] PUB.Y = 2ADB7247568084E73D0D13C40D18C1D87148235611EA6EF61EFE4E1049B448A249EBA5498C66A5F5CE4025C604B7C32E
2,456,930 UART: [art] SIG.R = B8441995008D901E10AD2522C51F26B5DE0A71FB8052FE4E97FC97E2C64FC1BBAD980007F417191774D9DE8A0168D591
2,463,649 UART: [art] SIG.S = E11AB6ED0EFE55D9B554E0EAF1C4E2C0BBB96A3B10A9D6EC7C06BD01D39AE25C9FCD900EF0C075386B6BC6B4B444E642
2,486,714 UART: mock_rt_interact::rt_entry...FMC Tester
2,593,933 UART: [rt] Runtime listening for mailbox commands...
2,597,323 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,273 UART: [kat] HMAC-384Kdf
922,847 UART: [kat] LMS
1,171,175 UART: [kat] --
1,172,106 UART: [cold-reset] ++
1,172,546 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 ready_for_fw is high
1,176,516 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,274 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,748 UART: [ldev] ++
1,210,916 UART: [ldev] CDI.KEYID = 6
1,211,279 UART: [ldev] SUBJECT.KEYID = 5
1,211,705 UART: [ldev] AUTHORITY.KEYID = 7
1,212,168 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,140 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,409 UART: [fwproc] Recv command 0x46574c44
1,285,137 UART: [fwproc] Recv'd Img size: 75384 bytes
2,138,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,165,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,195,057 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,272,408 >>> mbox cmd response: success
2,272,408 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,273,482 UART: [afmc] ++
2,273,650 UART: [afmc] CDI.KEYID = 6
2,274,012 UART: [afmc] SUBJECT.KEYID = 7
2,274,437 UART: [afmc] AUTHORITY.KEYID = 5
2,310,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,326,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,327,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,333,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,339,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,345,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,352,951 UART: [afmc] --
2,353,865 UART: [cold-reset] --
2,354,693 UART: [state] Locking Datavault
2,356,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,356,604 UART: [state] Locking ICCM
2,357,066 UART: [exit] Launching FMC @ 0x40000130
2,362,395 UART:
2,362,411 UART: Running Caliptra FMC ...
2,362,819 UART:
2,362,962 UART: [state] CFI Enabled
2,373,753 UART: [fht] FMC Alias Private Key: 7
2,481,772 UART: [art] Extend RT PCRs Done
2,482,200 UART: [art] Lock RT PCRs Done
2,483,748 UART: [art] Populate DV Done
2,491,947 UART: [fht] FMC Alias Private Key: 7
2,493,027 UART: [art] Derive CDI
2,493,307 UART: [art] Store in in slot 0x4
2,579,164 UART: [art] Derive Key Pair
2,579,524 UART: [art] Store priv key in slot 0x5
2,593,570 UART: [art] Derive Key Pair - Done
2,608,203 UART: [art] Signing Cert with AUTHO
2,608,683 UART: RITY.KEYID = 7
2,624,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,625,094 UART: [art] PUB.X = 2D69E576E283F937BC98065146D78E823EF126542AE0D5A378D26F7FA40C8D769E97C73D8FD3D27DCA53FA9FA0BD8AB6
2,631,870 UART: [art] PUB.Y = 48D1B2A3D1E57CCAD17F0933AAB88D1857C35979BAB2E1846DB3B96929DB17040735BE6D85AE30AD744CD6CEF75A65B4
2,638,825 UART: [art] SIG.R = FE01B4738854E9B0C139387393395B6337976D38A8F1AD7C24B2AB57D1B191088D627BD00648E125539DCB14EE097F1E
2,645,579 UART: [art] SIG.S = D9C44164F667BB5EF11F0F55E99C6BB2AEE889BA732BF8E6A3D7E52A115CACB98ADFB5F56DF32672A1636457056D4288
2,668,932 UART: mock_rt_interact::rt_entry...FMC Tester
2,776,055 UART: [rt] Runtime listening for mailbox commands...
2,779,445 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 ready_for_fw is high
1,060,700 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,122,543 >>> mbox cmd response: success
2,122,543 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,185,169 UART:
2,185,185 UART: Running Caliptra FMC ...
2,185,593 UART:
2,185,736 UART: [state] CFI Enabled
2,196,505 UART: [fht] FMC Alias Private Key: 7
2,305,292 UART: [art] Extend RT PCRs Done
2,305,720 UART: [art] Lock RT PCRs Done
2,307,292 UART: [art] Populate DV Done
2,315,589 UART: [fht] FMC Alias Private Key: 7
2,316,519 UART: [art] Derive CDI
2,316,799 UART: [art] Store in in slot 0x4
2,402,394 UART: [art] Derive Key Pair
2,402,754 UART: [art] Store priv key in slot 0x5
2,415,926 UART: [art] Derive Key Pair - Done
2,430,652 UART: [art] Signing Cert with AUTHO
2,431,132 UART: RITY.KEYID = 7
2,446,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,447,151 UART: [art] PUB.X = 7C847CDB362857BC131275E52B7367AF8CD4B1D90C8ED2834C46AA633A690E1CB15D6787D30465E0E3A79A3BAF0E3F71
2,453,917 UART: [art] PUB.Y = CF869534DB6DF9186536A73218307F739EA74566C942DF58F7F8D1E3BCB9F7EC444D9205684597B43F5E81F227DCCEFF
2,460,870 UART: [art] SIG.R = D6BD3D83CEDB608AC5DFF4A2CD8113D8DF2B487C7DB9EC65783339AD68E68A4770DEA3F4FEC8B18FBA686E1639CBDA71
2,467,668 UART: [art] SIG.S = 2A6128177C3A1F493A2A5DA0B2800ED4C742193FB4B8E70D6F19DCB2BB9C4705520B9CAF756CD3DD2A6CDD6B1E758A2F
2,491,769 UART: mock_rt_interact::rt_entry...FMC Tester
2,598,439 UART: [rt] Runtime listening for mailbox commands...
2,601,829 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,199,765 UART: [idev] Sha1 KeyId Algorithm
1,208,793 UART: [idev] --
1,209,698 UART: [ldev] ++
1,209,866 UART: [ldev] CDI.KEYID = 6
1,210,230 UART: [ldev] SUBJECT.KEYID = 5
1,210,657 UART: [ldev] AUTHORITY.KEYID = 7
1,211,120 UART: [ldev] FE.KEYID = 1
1,216,298 UART: [ldev] Erasing FE.KEYID = 1
1,242,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,224 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,335 UART: [fwproc] Recv command 0x46574c44
1,283,068 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,623 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,985 >>> mbox cmd response: success
2,268,985 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,270,224 UART: [afmc] ++
2,270,392 UART: [afmc] CDI.KEYID = 6
2,270,755 UART: [afmc] SUBJECT.KEYID = 7
2,271,181 UART: [afmc] AUTHORITY.KEYID = 5
2,306,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,284 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,886 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,765 UART: [afmc] --
2,349,879 UART: [cold-reset] --
2,350,691 UART: [state] Locking Datavault
2,352,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,818 UART: [state] Locking ICCM
2,353,372 UART: [exit] Launching FMC @ 0x40000130
2,358,701 UART:
2,358,717 UART: Running Caliptra FMC ...
2,359,125 UART:
2,359,179 UART: [state] CFI Enabled
2,369,934 UART: [fht] FMC Alias Private Key: 7
2,478,027 UART: [art] Extend RT PCRs Done
2,478,455 UART: [art] Lock RT PCRs Done
2,480,025 UART: [art] Populate DV Done
2,488,076 UART: [fht] FMC Alias Private Key: 7
2,489,108 UART: [art] Derive CDI
2,489,388 UART: [art] Store in in slot 0x4
2,574,725 UART: [art] Derive Key Pair
2,575,085 UART: [art] Store priv key in slot 0x5
2,588,003 UART: [art] Derive Key Pair - Done
2,602,901 UART: [art] Signing Cert with AUTHO
2,603,381 UART: RITY.KEYID = 7
2,618,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,600 UART: [art] PUB.X = 4BE2E4752618AB83AEF698CAB2EDE132182928F4769C59A8E098B950A20388DFC96C80109CA37730763BA05134A05C0F
2,626,364 UART: [art] PUB.Y = 17A28338AEC4671222E463B958075AB4BC0961ADCDB9833C1AFBFE96E8CF35E33976997D0F16019485143B444A642CB4
2,633,302 UART: [art] SIG.R = 6CA81BC561AA4368EB2BC16BEE3B715A7F5EF927CF1B9D820ADBB97B3562FB43FE573E674E5D09145C3C33BDFFF45EAA
2,640,092 UART: [art] SIG.S = 98465AAC0B36A22AF4400521CC01933BB97A908ECBB904F41C0126D15DF60D6A0306D969D416636D67CDE714AA6BF401
2,664,010 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,824 UART: [rt] Runtime listening for mailbox commands...
2,774,214 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,898 ready_for_fw is high
1,055,898 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,491 >>> mbox cmd response: success
2,118,491 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,197 UART:
2,180,213 UART: Running Caliptra FMC ...
2,180,621 UART:
2,180,675 UART: [state] CFI Enabled
2,191,220 UART: [fht] FMC Alias Private Key: 7
2,299,047 UART: [art] Extend RT PCRs Done
2,299,475 UART: [art] Lock RT PCRs Done
2,301,119 UART: [art] Populate DV Done
2,309,270 UART: [fht] FMC Alias Private Key: 7
2,310,228 UART: [art] Derive CDI
2,310,508 UART: [art] Store in in slot 0x4
2,396,375 UART: [art] Derive Key Pair
2,396,735 UART: [art] Store priv key in slot 0x5
2,409,437 UART: [art] Derive Key Pair - Done
2,424,114 UART: [art] Signing Cert with AUTHO
2,424,594 UART: RITY.KEYID = 7
2,440,102 UART: [art] Erasing AUTHORITY.KEYID = 7
2,440,867 UART: [art] PUB.X = 5E59D9F436EC217EB3823A91B3D10136050E4BD3E5FD1DB37DE0CB94505903890F53AB2F7CFCE14F2E3DEC28DC3B362B
2,447,638 UART: [art] PUB.Y = 5DA99F1883EEE77B49478D6F2D8DEAD805ABD6FA677D534753D7F6022D110C41E03B616DAAA4B3E51CFDD2C5F4EE4E0B
2,454,598 UART: [art] SIG.R = 27576B44C16C45DE390F24583F31BA2F33B96FD52DC67F84501AE2913E9B895B026A5462E709DD98C1C39E4EB8B50A69
2,461,358 UART: [art] SIG.S = AFD011714A2A6C61ED96DE55A5103FC764879862E16030EAF9EE838F58AF8604C7C359537D1DEF2F3BCA7563EE737E66
2,484,288 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,530 UART: [rt] Runtime listening for mailbox commands...
2,594,920 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,250 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,830 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,575 UART: [ldev] --
1,280,971 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,104 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,269,524 >>> mbox cmd response: success
2,269,524 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,270,695 UART: [afmc] ++
2,270,863 UART: [afmc] CDI.KEYID = 6
2,271,226 UART: [afmc] SUBJECT.KEYID = 7
2,271,652 UART: [afmc] AUTHORITY.KEYID = 5
2,308,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,330,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,140 UART: [afmc] --
2,351,222 UART: [cold-reset] --
2,352,254 UART: [state] Locking Datavault
2,353,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,977 UART: [state] Locking ICCM
2,354,607 UART: [exit] Launching FMC @ 0x40000130
2,359,936 UART:
2,359,952 UART: Running Caliptra FMC ...
2,360,360 UART:
2,360,503 UART: [state] CFI Enabled
2,371,102 UART: [fht] FMC Alias Private Key: 7
2,478,981 UART: [art] Extend RT PCRs Done
2,479,409 UART: [art] Lock RT PCRs Done
2,480,705 UART: [art] Populate DV Done
2,488,830 UART: [fht] FMC Alias Private Key: 7
2,489,832 UART: [art] Derive CDI
2,490,112 UART: [art] Store in in slot 0x4
2,575,549 UART: [art] Derive Key Pair
2,575,909 UART: [art] Store priv key in slot 0x5
2,589,077 UART: [art] Derive Key Pair - Done
2,603,507 UART: [art] Signing Cert with AUTHO
2,603,987 UART: RITY.KEYID = 7
2,619,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,058 UART: [art] PUB.X = D78F1E92A4748BCB116ACDEFE724BA4AC724461468F9CB68D5ECB427E77728A446CC6662946DCBB2AC78F63B4BBA9F19
2,626,846 UART: [art] PUB.Y = A18339F3F2F5802D24C02F91C228C9A18F65B84056471A42A16EB0F424C071436EFB7E6C46AC5A20B8EA914A850BC3BD
2,633,799 UART: [art] SIG.R = 4F8D7507F0F046C01A7FDE55196655D2AA33D514BCB7B3BC506D4DD3992D8DF2B402C6CC25BA6871A220F3B7C2F94A45
2,640,575 UART: [art] SIG.S = D2780744EBB02FEA1DEA5CAACB325844FE070EE359EE50A8081115D09111D2200C3E101C4609A998513D424BD0A33B55
2,664,472 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,796 UART: [rt] Runtime listening for mailbox commands...
2,775,186 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,097 ready_for_fw is high
1,056,097 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,119,172 >>> mbox cmd response: success
2,119,172 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,610 UART:
2,181,626 UART: Running Caliptra FMC ...
2,182,034 UART:
2,182,177 UART: [state] CFI Enabled
2,193,392 UART: [fht] FMC Alias Private Key: 7
2,300,817 UART: [art] Extend RT PCRs Done
2,301,245 UART: [art] Lock RT PCRs Done
2,302,551 UART: [art] Populate DV Done
2,310,766 UART: [fht] FMC Alias Private Key: 7
2,311,830 UART: [art] Derive CDI
2,312,110 UART: [art] Store in in slot 0x4
2,397,703 UART: [art] Derive Key Pair
2,398,063 UART: [art] Store priv key in slot 0x5
2,411,927 UART: [art] Derive Key Pair - Done
2,426,729 UART: [art] Signing Cert with AUTHO
2,427,209 UART: RITY.KEYID = 7
2,442,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,442 UART: [art] PUB.X = 44DC769ECB87918B2A67E6064926AFB2408E759DB494A64FF9F04032A0C96D3B960982A30769C238434FAFC46EC90D34
2,450,200 UART: [art] PUB.Y = 72FC9B6401E3696D98B85DEE4D3A35BBB4152AB0E3C081DA5F27846FD8E59C4FC9BACBB25F88C1C1C024963603428CE1
2,457,158 UART: [art] SIG.R = 736B0C15613ED4327767E889ACD427698B94EF28955B627450C8BD9207BA156F120125091CBDE1BC73A3EAAB1BD7116C
2,463,918 UART: [art] SIG.S = 4E56858A50CE8FEA89DDA5A00D0F5BC6D8DC8750C09A979EC694DE324171F0236E5342151CAF79FB87768B0BC82B1B49
2,487,256 UART: mock_rt_interact::rt_entry...FMC Tester
2,595,124 UART: [rt] Runtime listening for mailbox commands...
2,598,514 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,687 UART: [kat] SHA2-256
881,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,733 UART: [kat] ++
885,885 UART: [kat] sha1
890,111 UART: [kat] SHA2-256
892,049 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,682 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,231 UART: [cold-reset] ++
1,476,615 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 ready_for_fw is high
1,480,607 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,624 UART: [idev] Erasing UDS.KEYID = 0
1,505,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,287 UART: [ldev] ++
1,515,455 UART: [ldev] CDI.KEYID = 6
1,515,818 UART: [ldev] SUBJECT.KEYID = 5
1,516,244 UART: [ldev] AUTHORITY.KEYID = 7
1,516,707 UART: [ldev] FE.KEYID = 1
1,521,839 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,502 UART: [ldev] --
1,586,883 UART: [fwproc] Waiting for Commands...
1,587,668 UART: [fwproc] Received command 0x46574c44
1,588,459 UART: [fwproc] Received Image of size 75384 bytes
2,439,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,467,293 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,496,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,573,972 >>> mbox cmd response: success
2,573,972 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,575,170 UART: [afmc] ++
2,575,338 UART: [afmc] CDI.KEYID = 6
2,575,700 UART: [afmc] SUBJECT.KEYID = 7
2,576,125 UART: [afmc] AUTHORITY.KEYID = 5
2,611,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,627,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,175 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,645,865 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,653,642 UART: [afmc] --
2,654,554 UART: [cold-reset] --
2,655,418 UART: [state] Locking Datavault
2,656,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,099 UART: [state] Locking ICCM
2,657,521 UART: [exit] Launching FMC @ 0x40000130
2,662,850 UART:
2,662,866 UART: Running Caliptra FMC ...
2,663,274 UART:
2,663,328 UART: [state] CFI Enabled
2,673,665 UART: [fht] FMC Alias Private Key: 7
2,781,116 UART: [art] Extend RT PCRs Done
2,781,544 UART: [art] Lock RT PCRs Done
2,783,258 UART: [art] Populate DV Done
2,791,683 UART: [fht] FMC Alias Private Key: 7
2,792,845 UART: [art] Derive CDI
2,793,125 UART: [art] Store in in slot 0x4
2,878,666 UART: [art] Derive Key Pair
2,879,026 UART: [art] Store priv key in slot 0x5
2,892,416 UART: [art] Derive Key Pair - Done
2,907,599 UART: [art] Signing Cert with AUTHO
2,908,079 UART: RITY.KEYID = 7
2,923,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,060 UART: [art] PUB.X = 578CD15403403221149533334ED3E6DF418D95A03EB8BBED1C2C1F67112AC2F71DE5D9F8E2080641A99AFBFEB4C04041
2,930,827 UART: [art] PUB.Y = 388CE588FAB6C5FB0D3EE11AC9B6AE90821984C303EDA9ADC443D84FB06D52455751F30A3E19E32716C3B3391B15B479
2,937,776 UART: [art] SIG.R = 488B82AF19839BFB0A0182061D231EA987FF92FB03559C340A8F585B4CF32CD173E0DEDC5A42FD627C46960D17B59345
2,944,532 UART: [art] SIG.S = 39C3F9CB32B4C83A9BCFC4EFCB8DE8CBE1168AD704068AE90142397066AF54BA9F5F1AB51DE74FDCAC57E811A62948F1
2,968,690 UART: mock_rt_interact::rt_entry...FMC Tester
3,075,793 UART: [rt] Runtime listening for mailbox commands...
3,079,183 >>> mbox cmd response data (2048 bytes)
3,079,184 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,080,416 >>> mbox cmd response data (336 bytes)
3,080,417 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,093,008 >>> mbox cmd response data (1536 bytes)
3,093,009 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,093,115 UART:
3,093,131 UART: Running Caliptra ROM ...
3,093,539 UART:
3,093,593 UART: [state] CFI Enabled
3,096,567 UART: [state] LifecycleState = Unprovisioned
3,097,222 UART: [state] DebugLocked = No
3,097,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,099,477 UART: [kat] SHA2-256
3,893,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,897,523 UART: [kat] ++
3,897,675 UART: [kat] sha1
3,902,097 UART: [kat] SHA2-256
3,904,035 UART: [kat] SHA2-384
3,906,700 UART: [kat] SHA2-512-ACC
3,908,600 UART: [kat] ECC-384
3,914,227 UART: [kat] HMAC-384Kdf
3,918,987 UART: [kat] LMS
4,487,183 UART: [kat] --
4,488,040 UART: [update-reset] ++
5,377,474 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,378,604 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,470,058 >>> mbox cmd response: success
5,470,293 UART: [update-reset] Copying MAN_2 To MAN_1
5,478,307 UART: [update-reset Success] --
5,479,476 UART: [state] Locking Datavault
5,480,292 UART: [state] Locking PCR0, PCR1 and PCR31
5,480,896 UART: [state] Locking ICCM
5,481,324 UART: [exit] Launching FMC @ 0x40000130
5,486,653 UART:
5,486,669 UART: Running Caliptra FMC ...
5,487,077 UART:
5,487,131 UART: [state] CFI Enabled
5,576,130 UART: [art] Extend RT PCRs Done
5,576,558 UART: [art] Lock RT PCRs Done
5,577,573 UART: [art] Populate DV Done
5,585,738 UART: [fht] FMC Alias Private Key: 7
5,586,686 UART: [art] Derive CDI
5,586,966 UART: [art] Store in in slot 0x4
5,672,625 UART: [art] Derive Key Pair
5,672,985 UART: [art] Store priv key in slot 0x5
5,685,577 UART: [art] Derive Key Pair - Done
5,700,494 UART: [art] Signing Cert with AUTHO
5,700,974 UART: RITY.KEYID = 7
5,716,452 UART: [art] Erasing AUTHORITY.KEYID = 7
5,717,217 UART: [art] PUB.X = AA7181269578C65264A102280A7EE8479B2847505C3E355CD44416DD8AD10C3D83019298476735FC8E90FC8FDF9C2AAE
5,723,973 UART: [art] PUB.Y = D43D9D3D085523A2855FF3BC6776685114D7682576B1AB06F98F1A2108645F67CF3D7EAC48DA276957BDDA3AF76A8339
5,730,916 UART: [art] SIG.R = 3DEDADC810E535F3BBC8F730EB50CD85A5FC14B7FB5B200AA8558395C3CCF02921CCAA0F5A1DF6C7DC44AF5B78D93C44
5,737,708 UART: [art] SIG.S = 485613EF8B296EDD0E03196D8A5099E7684059368F8FB4BD9212769B86D10DB74C562FA73782A2F6FB2F88F21D9ED8DF
5,760,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,761,388 UART: mock_rt_interact::rt_entry...FMC Tester
6,048,861 UART: [rt] Runtime listening for mailbox commands...
6,050,896 >>> mbox cmd response data (336 bytes)
6,050,897 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,063,488 >>> mbox cmd response data (1536 bytes)
6,063,489 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,063,506 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,135 ready_for_fw is high
1,363,135 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,424,112 >>> mbox cmd response: success
2,424,112 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,918 UART:
2,485,934 UART: Running Caliptra FMC ...
2,486,342 UART:
2,486,396 UART: [state] CFI Enabled
2,497,215 UART: [fht] FMC Alias Private Key: 7
2,605,546 UART: [art] Extend RT PCRs Done
2,605,974 UART: [art] Lock RT PCRs Done
2,607,346 UART: [art] Populate DV Done
2,615,597 UART: [fht] FMC Alias Private Key: 7
2,616,699 UART: [art] Derive CDI
2,616,979 UART: [art] Store in in slot 0x4
2,702,492 UART: [art] Derive Key Pair
2,702,852 UART: [art] Store priv key in slot 0x5
2,716,278 UART: [art] Derive Key Pair - Done
2,731,215 UART: [art] Signing Cert with AUTHO
2,731,695 UART: RITY.KEYID = 7
2,747,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,748,074 UART: [art] PUB.X = 1E47AC054F8D18891BF48B68E8C2711FB6914D1BDBDE29A7242ED0CF6717858A5F2DCB5DF1A0F3C2355E88924E424FA9
2,754,853 UART: [art] PUB.Y = 2D78D993E1FD82E5608313AFDA106581F4D5A45096AB40A2CA6D5A87C5F0A70C4EF9C85E33964082B04C0EEC87E8C6C3
2,761,807 UART: [art] SIG.R = 537DF82409E4F78394FF2C3748ACD0117A5E4E0F76D385743ED82625392C22870CBBA095A6F535FC9150D1D06A88AA93
2,768,568 UART: [art] SIG.S = AA8753F04857C69CD269525415854EE32A8CACB22AFAE4155A301D7F2C1AD9E09455099CC2C06BAE92FF427580074C8F
2,792,483 UART: mock_rt_interact::rt_entry...FMC Tester
2,900,335 UART: [rt] Runtime listening for mailbox commands...
2,903,725 >>> mbox cmd response data (2048 bytes)
2,903,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,904,958 >>> mbox cmd response data (336 bytes)
2,904,959 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,917,550 >>> mbox cmd response data (1536 bytes)
2,917,551 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,174,754 >>> mbox cmd response: success
5,187,971 UART:
5,187,987 UART: Running Caliptra FMC ...
5,188,395 UART:
5,188,449 UART: [state] CFI Enabled
5,277,606 UART: [art] Extend RT PCRs Done
5,278,034 UART: [art] Lock RT PCRs Done
5,279,361 UART: [art] Populate DV Done
5,287,550 UART: [fht] FMC Alias Private Key: 7
5,288,664 UART: [art] Derive CDI
5,288,944 UART: [art] Store in in slot 0x4
5,374,537 UART: [art] Derive Key Pair
5,374,897 UART: [art] Store priv key in slot 0x5
5,388,289 UART: [art] Derive Key Pair - Done
5,402,651 UART: [art] Signing Cert with AUTHO
5,403,131 UART: RITY.KEYID = 7
5,418,373 UART: [art] Erasing AUTHORITY.KEYID = 7
5,419,138 UART: [art] PUB.X = 7650120FE5111AC0C86B83FBB3DF66D8E299107B2C980745367CA4C42D9DD25BE01560EEEC0A3A9A182E859DFD12BBD3
5,425,911 UART: [art] PUB.Y = CC5A7FE3247831ACE881B42F515B0D6691D55C6259C74CADF941C4252A82DA679292254768338CCFECAC90AC65E9225D
5,432,864 UART: [art] SIG.R = DE70F7C137E6A13B524CA8BE148A7B6AABC886B964DBE59892A36B720764A4ADB7B8B86067EECCA8F9CD6BB38CAC1190
5,439,653 UART: [art] SIG.S = 721705D94C900F0AFE19A8C47ADC9A685487216E8B77E70A0AE7635E77356348F1F666E6100CD812AD8E3BFA76FC0585
5,462,098 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,463,087 UART: mock_rt_interact::rt_entry...FMC Tester
5,747,981 UART: [rt] Runtime listening for mailbox commands...
5,750,016 >>> mbox cmd response data (336 bytes)
5,750,017 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,762,608 >>> mbox cmd response data (1536 bytes)
5,762,609 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,762,626 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,964 UART: [kat] SHA2-256
881,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,010 UART: [kat] ++
886,162 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,405 UART: [kat] LMS
1,475,601 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,245 UART: [idev] ++
1,480,413 UART: [idev] CDI.KEYID = 6
1,480,773 UART: [idev] SUBJECT.KEYID = 7
1,481,197 UART: [idev] UDS.KEYID = 0
1,481,542 ready_for_fw is high
1,481,542 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,337 UART: [idev] Erasing UDS.KEYID = 0
1,506,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,215 UART: [idev] --
1,516,420 UART: [ldev] ++
1,516,588 UART: [ldev] CDI.KEYID = 6
1,516,951 UART: [ldev] SUBJECT.KEYID = 5
1,517,377 UART: [ldev] AUTHORITY.KEYID = 7
1,517,840 UART: [ldev] FE.KEYID = 1
1,523,164 UART: [ldev] Erasing FE.KEYID = 1
1,548,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,471 UART: [ldev] --
1,587,824 UART: [fwproc] Waiting for Commands...
1,588,533 UART: [fwproc] Received command 0x46574c44
1,589,324 UART: [fwproc] Received Image of size 75384 bytes
2,442,072 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,469,894 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,499,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,576,813 >>> mbox cmd response: success
2,576,813 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,577,989 UART: [afmc] ++
2,578,157 UART: [afmc] CDI.KEYID = 6
2,578,519 UART: [afmc] SUBJECT.KEYID = 7
2,578,944 UART: [afmc] AUTHORITY.KEYID = 5
2,613,945 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,630,089 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,630,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,636,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,642,482 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,648,172 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,656,181 UART: [afmc] --
2,657,225 UART: [cold-reset] --
2,658,181 UART: [state] Locking Datavault
2,659,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,659,700 UART: [state] Locking ICCM
2,660,338 UART: [exit] Launching FMC @ 0x40000130
2,665,667 UART:
2,665,683 UART: Running Caliptra FMC ...
2,666,091 UART:
2,666,234 UART: [state] CFI Enabled
2,677,225 UART: [fht] FMC Alias Private Key: 7
2,785,206 UART: [art] Extend RT PCRs Done
2,785,634 UART: [art] Lock RT PCRs Done
2,787,126 UART: [art] Populate DV Done
2,795,505 UART: [fht] FMC Alias Private Key: 7
2,796,507 UART: [art] Derive CDI
2,796,787 UART: [art] Store in in slot 0x4
2,882,430 UART: [art] Derive Key Pair
2,882,790 UART: [art] Store priv key in slot 0x5
2,896,578 UART: [art] Derive Key Pair - Done
2,911,545 UART: [art] Signing Cert with AUTHO
2,912,025 UART: RITY.KEYID = 7
2,927,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,927,910 UART: [art] PUB.X = B2BC1F22F43BCEB83134BE631C5CABCFD34937B8C0E823C8EE010B5553AE53CD51055D58DD3A6A5FA4151D2D042C885A
2,934,686 UART: [art] PUB.Y = FE5B21A4CDAB63A5F4AD6518036D5CC5D2788248F9ED60B7D5C4D2EF3802E26629CE1E511C22FAAF0260903F080E9220
2,941,631 UART: [art] SIG.R = D10306FA51D32101E64C23EA1D6E2D6B0086E3DC6DBC8D2A2F2B07598FC01094A794DE816C42A1FE5B9484BF55A718A8
2,948,377 UART: [art] SIG.S = FD16E6C9F5449F9A4D5E27E8905F9F75D2C290D3B2CB099E811460AFAA0674ED8A7506347432759E58B0DFC5E373C478
2,971,983 UART: mock_rt_interact::rt_entry...FMC Tester
3,079,472 UART: [rt] Runtime listening for mailbox commands...
3,082,862 >>> mbox cmd response data (2048 bytes)
3,082,863 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,084,095 >>> mbox cmd response data (336 bytes)
3,084,096 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,096,687 >>> mbox cmd response data (1536 bytes)
3,096,688 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,096,794 UART:
3,096,810 UART: Running Caliptra ROM ...
3,097,218 UART:
3,097,359 UART: [state] CFI Enabled
3,099,795 UART: [state] LifecycleState = Unprovisioned
3,100,450 UART: [state] DebugLocked = No
3,101,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,102,879 UART: [kat] SHA2-256
3,896,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,900,925 UART: [kat] ++
3,901,077 UART: [kat] sha1
3,905,461 UART: [kat] SHA2-256
3,907,399 UART: [kat] SHA2-384
3,910,334 UART: [kat] SHA2-512-ACC
3,912,234 UART: [kat] ECC-384
3,917,955 UART: [kat] HMAC-384Kdf
3,922,503 UART: [kat] LMS
4,490,699 UART: [kat] --
4,491,638 UART: [update-reset] ++
5,381,114 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,382,328 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,473,782 >>> mbox cmd response: success
5,473,961 UART: [update-reset] Copying MAN_2 To MAN_1
5,481,975 UART: [update-reset Success] --
5,482,898 UART: [state] Locking Datavault
5,483,830 UART: [state] Locking PCR0, PCR1 and PCR31
5,484,434 UART: [state] Locking ICCM
5,485,068 UART: [exit] Launching FMC @ 0x40000130
5,490,397 UART:
5,490,413 UART: Running Caliptra FMC ...
5,490,821 UART:
5,490,964 UART: [state] CFI Enabled
5,580,639 UART: [art] Extend RT PCRs Done
5,581,067 UART: [art] Lock RT PCRs Done
5,582,418 UART: [art] Populate DV Done
5,590,931 UART: [fht] FMC Alias Private Key: 7
5,592,001 UART: [art] Derive CDI
5,592,281 UART: [art] Store in in slot 0x4
5,677,652 UART: [art] Derive Key Pair
5,678,012 UART: [art] Store priv key in slot 0x5
5,691,582 UART: [art] Derive Key Pair - Done
5,706,111 UART: [art] Signing Cert with AUTHO
5,706,591 UART: RITY.KEYID = 7
5,722,093 UART: [art] Erasing AUTHORITY.KEYID = 7
5,722,858 UART: [art] PUB.X = EB56DEA3E87351E9D9C01AEBAAFD64D0457A6963FB4C7E1C4EE1FE046C4D46801CB46BFBDC33E0C080B6DD9AF0056CB1
5,729,650 UART: [art] PUB.Y = 4880EC9A2173F4426CD89E6FE257BB222A67EE68608781B92F71479F75DF76382C1D6EE10411ACC94C6D2C9D4979075C
5,736,594 UART: [art] SIG.R = DC79B20DDE162C76B99B5E8E68213570D90C459B7D620281BD37693580DD0CF08DD441BDEEBAEC6773D4B83FA2BD9474
5,743,364 UART: [art] SIG.S = 116E173011D0C74A293BAE8AE90D75E442B85222A18A07F2F4BD77AD423C16A7D329D173DDBAEA21F9BA1D97B2D91FB1
5,766,018 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,767,065 UART: mock_rt_interact::rt_entry...FMC Tester
6,051,243 UART: [rt] Runtime listening for mailbox commands...
6,053,278 >>> mbox cmd response data (336 bytes)
6,053,279 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,065,870 >>> mbox cmd response data (1536 bytes)
6,065,871 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,065,888 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,754 ready_for_fw is high
1,362,754 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,425,827 >>> mbox cmd response: success
2,425,827 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,488,379 UART:
2,488,395 UART: Running Caliptra FMC ...
2,488,803 UART:
2,488,946 UART: [state] CFI Enabled
2,499,629 UART: [fht] FMC Alias Private Key: 7
2,606,846 UART: [art] Extend RT PCRs Done
2,607,274 UART: [art] Lock RT PCRs Done
2,608,818 UART: [art] Populate DV Done
2,616,737 UART: [fht] FMC Alias Private Key: 7
2,617,859 UART: [art] Derive CDI
2,618,139 UART: [art] Store in in slot 0x4
2,704,002 UART: [art] Derive Key Pair
2,704,362 UART: [art] Store priv key in slot 0x5
2,717,592 UART: [art] Derive Key Pair - Done
2,732,120 UART: [art] Signing Cert with AUTHO
2,732,600 UART: RITY.KEYID = 7
2,747,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,748,561 UART: [art] PUB.X = 99F6204E63C99FD527F419DF652CB5226778E83BA69AC682EA45D8D20460BF252CD698C34B3C69192BBC691C99653ACD
2,755,332 UART: [art] PUB.Y = F8D161DBE1F44C9AAC791DBA5C8AA28F0F3CB8638E59BAB1121930B387EB433A26D1A174BE4097351FB1C771726E9ADD
2,762,295 UART: [art] SIG.R = B0173C1F3924A59A82862875A4863DF94CBE157E8F3E57057EFEAF624F572C49E15D9E1E290D77C1B8375CC52B475819
2,769,059 UART: [art] SIG.S = 2AE217DDE5A8A86EC6109F13FEA3CCF52F1A334C2C55FC2E968914720CE6641290FB654EE87958E0A998006003017D2B
2,792,243 UART: mock_rt_interact::rt_entry...FMC Tester
2,900,319 UART: [rt] Runtime listening for mailbox commands...
2,903,709 >>> mbox cmd response data (2048 bytes)
2,903,710 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,904,942 >>> mbox cmd response data (336 bytes)
2,904,943 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,917,534 >>> mbox cmd response data (1536 bytes)
2,917,535 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,175,451 >>> mbox cmd response: success
5,188,998 UART:
5,189,014 UART: Running Caliptra FMC ...
5,189,422 UART:
5,189,565 UART: [state] CFI Enabled
5,279,306 UART: [art] Extend RT PCRs Done
5,279,734 UART: [art] Lock RT PCRs Done
5,280,709 UART: [art] Populate DV Done
5,289,016 UART: [fht] FMC Alias Private Key: 7
5,289,976 UART: [art] Derive CDI
5,290,256 UART: [art] Store in in slot 0x4
5,376,669 UART: [art] Derive Key Pair
5,377,029 UART: [art] Store priv key in slot 0x5
5,390,181 UART: [art] Derive Key Pair - Done
5,404,986 UART: [art] Signing Cert with AUTHO
5,405,466 UART: RITY.KEYID = 7
5,420,932 UART: [art] Erasing AUTHORITY.KEYID = 7
5,421,697 UART: [art] PUB.X = D6D78BD518832CB6D503984301765E319FDA20B6062D043F4985DB231C4673D614BBF53B1A7E7747273AE181DFBBBBE4
5,428,459 UART: [art] PUB.Y = 1E3A499DF21544A663455A0B49BE641BA8C8CCF83A17143210C1D165484816ACEAFF3FB60C96D746C4EECB119BF10DAB
5,435,414 UART: [art] SIG.R = 551F21E3940B015257F7A53EA9661E5130E8BC166C5D4C901F4BAEC937AEC4D868A3A538800C47265178E15D10D475AC
5,442,175 UART: [art] SIG.S = 0EB8AC5E8C88A0624796354B7267B91EAB01024AAA23D2FBC20B4CDE0F15440CE81FA3EFCBAA3F9882A2DF70FAC2DC1B
5,464,671 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,465,632 UART: mock_rt_interact::rt_entry...FMC Tester
5,746,179 UART: [rt] Runtime listening for mailbox commands...
5,748,214 >>> mbox cmd response data (336 bytes)
5,748,215 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,760,806 >>> mbox cmd response data (1536 bytes)
5,760,807 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,760,824 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,090 UART: [kat] SHA2-256
892,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,865 UART: [kat] ++
897,017 UART: [kat] sha1
901,163 UART: [kat] SHA2-256
903,103 UART: [kat] SHA2-384
905,806 UART: [kat] SHA2-512-ACC
907,707 UART: [kat] ECC-384
917,148 UART: [kat] HMAC-384Kdf
921,644 UART: [kat] LMS
1,169,972 UART: [kat] --
1,170,587 UART: [cold-reset] ++
1,171,101 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,290 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,175,059 ready_for_fw is high
1,175,059 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,597 UART: [idev] Sha1 KeyId Algorithm
1,207,931 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,687 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,654 UART: [fwproc] Wait for Commands...
1,282,324 UART: [fwproc] Recv command 0x46574c44
1,283,052 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,784 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,270,299 >>> mbox cmd response: success
2,270,299 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,355 UART: [afmc] ++
2,271,523 UART: [afmc] CDI.KEYID = 6
2,271,885 UART: [afmc] SUBJECT.KEYID = 7
2,272,310 UART: [afmc] AUTHORITY.KEYID = 5
2,307,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,324,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,330,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,810 UART: [afmc] --
2,350,714 UART: [cold-reset] --
2,351,442 UART: [state] Locking Datavault
2,352,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,169 UART: [state] Locking ICCM
2,353,761 UART: [exit] Launching FMC @ 0x40000130
2,359,090 UART:
2,359,106 UART: Running Caliptra FMC ...
2,359,514 UART:
2,359,568 UART: [state] CFI Enabled
2,370,113 UART: [fht] FMC Alias Private Key: 7
2,478,430 UART: [art] Extend RT PCRs Done
2,478,858 UART: [art] Lock RT PCRs Done
2,480,194 UART: [art] Populate DV Done
2,488,417 UART: [fht] FMC Alias Private Key: 7
2,489,537 UART: [art] Derive CDI
2,489,817 UART: [art] Store in in slot 0x4
2,575,764 UART: [art] Derive Key Pair
2,576,124 UART: [art] Store priv key in slot 0x5
2,589,524 UART: [art] Derive Key Pair - Done
2,604,154 UART: [art] Signing Cert with AUTHO
2,604,634 UART: RITY.KEYID = 7
2,619,620 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,385 UART: [art] PUB.X = 2890DFB9684B39E7F4429693A0417ADE1051C500DF207E1451A2D60E1A67D0BF0E796ACB22F5DBE57B1C429F117A5B33
2,627,133 UART: [art] PUB.Y = BDAC09DCED5F5830BC96282AB8CE72C80133BC24EBE099EDDA91F7A613D8135A7A0456CED6A7AFF229E66972E1A28116
2,634,092 UART: [art] SIG.R = 8D3191A4725DAADFBBB5E609A3D212E5FDEE04CD55C888E7CDD279FA61B237DBA4C01BFC6F6C8B2697C0BABBF9D6E040
2,640,886 UART: [art] SIG.S = 1BA1F366B3A6A3C9C58844F36F036F0B5A54F133F644B9F33DE646B72CAFBE5D5D6CE6265588966339CA482F91D0A122
2,664,253 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,005 UART: [rt] Runtime listening for mailbox commands...
2,774,395 >>> mbox cmd response data (2048 bytes)
2,774,396 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,628 >>> mbox cmd response data (336 bytes)
2,775,629 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,220 >>> mbox cmd response data (1536 bytes)
2,788,221 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,324 UART:
2,788,340 UART: Running Caliptra ROM ...
2,788,748 UART:
2,788,803 UART: [state] CFI Enabled
2,791,221 UART: [state] LifecycleState = Unprovisioned
2,791,876 UART: [state] DebugLocked = No
2,792,556 UART: [state] WD Timer not started. Device not locked for debugging
2,793,914 UART: [kat] SHA2-256
3,599,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,603,689 UART: [kat] ++
3,603,841 UART: [kat] sha1
3,608,211 UART: [kat] SHA2-256
3,610,151 UART: [kat] SHA2-384
3,612,972 UART: [kat] SHA2-512-ACC
3,614,872 UART: [kat] ECC-384
3,624,361 UART: [kat] HMAC-384Kdf
3,628,797 UART: [kat] LMS
3,877,125 UART: [kat] --
3,877,917 UART: [update-reset] ++
4,743,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,918 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,836,320 >>> mbox cmd response: success
4,836,481 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,495 UART: [update-reset Success] --
4,845,448 UART: [state] Locking Datavault
4,846,216 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,820 UART: [state] Locking ICCM
4,847,260 UART: [exit] Launching FMC @ 0x40000130
4,852,589 UART:
4,852,605 UART: Running Caliptra FMC ...
4,853,013 UART:
4,853,067 UART: [state] CFI Enabled
4,941,930 UART: [art] Extend RT PCRs Done
4,942,358 UART: [art] Lock RT PCRs Done
4,943,579 UART: [art] Populate DV Done
4,951,848 UART: [fht] FMC Alias Private Key: 7
4,952,928 UART: [art] Derive CDI
4,953,208 UART: [art] Store in in slot 0x4
5,039,157 UART: [art] Derive Key Pair
5,039,517 UART: [art] Store priv key in slot 0x5
5,052,959 UART: [art] Derive Key Pair - Done
5,067,656 UART: [art] Signing Cert with AUTHO
5,068,136 UART: RITY.KEYID = 7
5,083,280 UART: [art] Erasing AUTHORITY.KEYID = 7
5,084,045 UART: [art] PUB.X = 706ACF2337D47C7827F90F7DC65F3CB6CFC671B31986C7369C748CCC29A23836A3FE9D7A7825C4B39D16D946E0887ECE
5,090,820 UART: [art] PUB.Y = 5AA80ADB3441B8E2430AE0CFE4580B07741EF086C678817E445C0A01D40CFA7D0592B253202FACBBC809CDAB021F73BA
5,097,754 UART: [art] SIG.R = 079A2A617D9D664B70D199A2F072FED82E84699CF8F7533DC9B3152DE3EF914B46F5342659F20DCB0E150B314BB7BA11
5,104,518 UART: [art] SIG.S = 529B2E2CC5B3EFB7295F3D6B1871773D0D50BAD148FBB2043937859ECF16FFF0D3FE03F190EDD2736FE1AA5F2631B186
5,126,911 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,976 UART: mock_rt_interact::rt_entry...FMC Tester
5,411,194 UART: [rt] Runtime listening for mailbox commands...
5,413,229 >>> mbox cmd response data (336 bytes)
5,413,230 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,425,821 >>> mbox cmd response data (1536 bytes)
5,425,822 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,425,839 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 ready_for_fw is high
1,059,635 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,120,410 >>> mbox cmd response: success
2,120,410 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,182,476 UART:
2,182,492 UART: Running Caliptra FMC ...
2,182,900 UART:
2,182,954 UART: [state] CFI Enabled
2,193,611 UART: [fht] FMC Alias Private Key: 7
2,302,022 UART: [art] Extend RT PCRs Done
2,302,450 UART: [art] Lock RT PCRs Done
2,304,034 UART: [art] Populate DV Done
2,312,495 UART: [fht] FMC Alias Private Key: 7
2,313,587 UART: [art] Derive CDI
2,313,867 UART: [art] Store in in slot 0x4
2,399,642 UART: [art] Derive Key Pair
2,400,002 UART: [art] Store priv key in slot 0x5
2,413,338 UART: [art] Derive Key Pair - Done
2,427,962 UART: [art] Signing Cert with AUTHO
2,428,442 UART: RITY.KEYID = 7
2,443,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,667 UART: [art] PUB.X = 602D2F3D6B846A43A72D8016A55F50423224163700393571AE35E6CF59AF7B9505B3BD22EA20E6C72507EED423611A52
2,451,403 UART: [art] PUB.Y = 96216A07C24D1E0F43093F89C386D5F7D5D3F86F2106652DC71CDBAFBD688C6FF19F7EFC88785C47EEAFF14B1872A5AB
2,458,357 UART: [art] SIG.R = 0836DA34E4C9A86164EE15283D0186D75B6E3A650118A3FEEF87B39001FDF7C6A52DF6A6490DAF9E13927A65CA167B21
2,465,118 UART: [art] SIG.S = 5A964038DBA220B434FBCEA2CEB1702CC7FAF173EE2D224853E832F73E5713329CA18258E396BC8C5DE60125984DB34C
2,488,902 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,338 UART: [rt] Runtime listening for mailbox commands...
2,599,728 >>> mbox cmd response data (2048 bytes)
2,599,729 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,961 >>> mbox cmd response data (336 bytes)
2,600,962 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,613,553 >>> mbox cmd response data (1536 bytes)
2,613,554 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,547,388 >>> mbox cmd response: success
4,560,810 UART:
4,560,826 UART: Running Caliptra FMC ...
4,561,234 UART:
4,561,288 UART: [state] CFI Enabled
4,651,055 UART: [art] Extend RT PCRs Done
4,651,483 UART: [art] Lock RT PCRs Done
4,652,580 UART: [art] Populate DV Done
4,660,681 UART: [fht] FMC Alias Private Key: 7
4,661,661 UART: [art] Derive CDI
4,661,941 UART: [art] Store in in slot 0x4
4,747,196 UART: [art] Derive Key Pair
4,747,556 UART: [art] Store priv key in slot 0x5
4,760,328 UART: [art] Derive Key Pair - Done
4,775,558 UART: [art] Signing Cert with AUTHO
4,776,038 UART: RITY.KEYID = 7
4,791,076 UART: [art] Erasing AUTHORITY.KEYID = 7
4,791,841 UART: [art] PUB.X = 3AB4BF62BC196B98EE5EB4743E26909E539AA53F83B6933C51577956B85C5FF0589EAEC636625BF0004F43ADDD4BD1F4
4,798,599 UART: [art] PUB.Y = 7F330F27E75D5F8726C4F93099C0C0EDCAA88DF806DF5EFB6CEDC90BCC159C6B765FA87F0133F6AD02CF75546723B4E1
4,805,552 UART: [art] SIG.R = 6EC8DA6728AEADE71F556637CB85D66AB63326A6EDFF521E8193C810A06D73882DC2FEEA0BEC06067AC3D0BE50DD1515
4,812,331 UART: [art] SIG.S = 703378D5F00A08E228B804B00705A499006E001AA13B5405B2A646C7079F31F836599218637565C3C40BEE959BF594EF
4,834,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,835,804 UART: mock_rt_interact::rt_entry...FMC Tester
5,114,778 UART: [rt] Runtime listening for mailbox commands...
5,116,813 >>> mbox cmd response data (336 bytes)
5,116,814 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,129,405 >>> mbox cmd response data (1536 bytes)
5,129,406 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,129,423 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
893,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,242 UART: [kat] ++
897,394 UART: [kat] sha1
901,872 UART: [kat] SHA2-256
903,812 UART: [kat] SHA2-384
906,549 UART: [kat] SHA2-512-ACC
908,450 UART: [kat] ECC-384
918,219 UART: [kat] HMAC-384Kdf
922,753 UART: [kat] LMS
1,171,081 UART: [kat] --
1,172,046 UART: [cold-reset] ++
1,172,466 UART: [fht] FHT @ 0x50003400
1,175,193 UART: [idev] ++
1,175,361 UART: [idev] CDI.KEYID = 6
1,175,721 UART: [idev] SUBJECT.KEYID = 7
1,176,145 UART: [idev] UDS.KEYID = 0
1,176,490 ready_for_fw is high
1,176,490 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,200,986 UART: [idev] Sha1 KeyId Algorithm
1,209,340 UART: [idev] --
1,210,218 UART: [ldev] ++
1,210,386 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,175 UART: [ldev] AUTHORITY.KEYID = 7
1,211,638 UART: [ldev] FE.KEYID = 1
1,217,168 UART: [ldev] Erasing FE.KEYID = 1
1,243,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,680 UART: [ldev] --
1,282,987 UART: [fwproc] Wait for Commands...
1,283,579 UART: [fwproc] Recv command 0x46574c44
1,284,307 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,539 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,270,040 >>> mbox cmd response: success
2,270,040 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,294 UART: [afmc] ++
2,271,462 UART: [afmc] CDI.KEYID = 6
2,271,824 UART: [afmc] SUBJECT.KEYID = 7
2,272,249 UART: [afmc] AUTHORITY.KEYID = 5
2,308,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,801 UART: [afmc] --
2,351,781 UART: [cold-reset] --
2,352,487 UART: [state] Locking Datavault
2,353,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,398 UART: [state] Locking ICCM
2,354,948 UART: [exit] Launching FMC @ 0x40000130
2,360,277 UART:
2,360,293 UART: Running Caliptra FMC ...
2,360,701 UART:
2,360,844 UART: [state] CFI Enabled
2,371,563 UART: [fht] FMC Alias Private Key: 7
2,479,402 UART: [art] Extend RT PCRs Done
2,479,830 UART: [art] Lock RT PCRs Done
2,481,484 UART: [art] Populate DV Done
2,489,819 UART: [fht] FMC Alias Private Key: 7
2,490,763 UART: [art] Derive CDI
2,491,043 UART: [art] Store in in slot 0x4
2,576,512 UART: [art] Derive Key Pair
2,576,872 UART: [art] Store priv key in slot 0x5
2,590,528 UART: [art] Derive Key Pair - Done
2,605,292 UART: [art] Signing Cert with AUTHO
2,605,772 UART: RITY.KEYID = 7
2,620,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,621,335 UART: [art] PUB.X = 60BD066B1F4AF1386C7AF9EED629D71B994DA2B87EE0B2351939E041DAC131B4AD221739A72F9F9B30CAF542422653AC
2,628,112 UART: [art] PUB.Y = D20D2A385F2EDC78D51DED47C769925D9AEB0165FDB36617D2B06A2EAEBDFD23A723C34CFE3BA4AEBD210FACA15314E2
2,635,081 UART: [art] SIG.R = 518011DB47DECF7AA522C8CF191B6C458644530478D03CEAEEC1049023DBA82012A1C7C2CDF0A1F2FA78DC2A3E2AA42C
2,641,863 UART: [art] SIG.S = 4A678179695CE64C10B548E418D430CA39CE5FCFDA97998FF20955C21AB66A8A18A92244A8ED784AE864692AF1671138
2,666,111 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,563 UART: [rt] Runtime listening for mailbox commands...
2,776,953 >>> mbox cmd response data (2048 bytes)
2,776,954 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,778,186 >>> mbox cmd response data (336 bytes)
2,778,187 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,778 >>> mbox cmd response data (1536 bytes)
2,790,779 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,882 UART:
2,790,898 UART: Running Caliptra ROM ...
2,791,306 UART:
2,791,448 UART: [state] CFI Enabled
2,793,692 UART: [state] LifecycleState = Unprovisioned
2,794,347 UART: [state] DebugLocked = No
2,795,019 UART: [state] WD Timer not started. Device not locked for debugging
2,796,313 UART: [kat] SHA2-256
3,601,963 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,606,088 UART: [kat] ++
3,606,240 UART: [kat] sha1
3,610,300 UART: [kat] SHA2-256
3,612,240 UART: [kat] SHA2-384
3,614,923 UART: [kat] SHA2-512-ACC
3,616,823 UART: [kat] ECC-384
3,626,632 UART: [kat] HMAC-384Kdf
3,631,070 UART: [kat] LMS
3,879,398 UART: [kat] --
3,879,940 UART: [update-reset] ++
4,747,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,748,245 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,839,647 >>> mbox cmd response: success
4,839,940 UART: [update-reset] Copying MAN_2 To MAN_1
4,847,954 UART: [update-reset Success] --
4,848,921 UART: [state] Locking Datavault
4,849,751 UART: [state] Locking PCR0, PCR1 and PCR31
4,850,355 UART: [state] Locking ICCM
4,850,787 UART: [exit] Launching FMC @ 0x40000130
4,856,116 UART:
4,856,132 UART: Running Caliptra FMC ...
4,856,540 UART:
4,856,683 UART: [state] CFI Enabled
4,945,666 UART: [art] Extend RT PCRs Done
4,946,094 UART: [art] Lock RT PCRs Done
4,947,199 UART: [art] Populate DV Done
4,955,254 UART: [fht] FMC Alias Private Key: 7
4,956,398 UART: [art] Derive CDI
4,956,678 UART: [art] Store in in slot 0x4
5,042,441 UART: [art] Derive Key Pair
5,042,801 UART: [art] Store priv key in slot 0x5
5,055,827 UART: [art] Derive Key Pair - Done
5,071,065 UART: [art] Signing Cert with AUTHO
5,071,545 UART: RITY.KEYID = 7
5,087,185 UART: [art] Erasing AUTHORITY.KEYID = 7
5,087,950 UART: [art] PUB.X = 1BED8D941CF2002EE5CAB0DE4465BBB6E168FE76FFFBE4C0E98C520EF0DAD7EAA828F571431A213A53F10E583C43D578
5,094,714 UART: [art] PUB.Y = 3F5364BB66ABF34E8B32C7F9D552ECED37C148785E1C2711801E433D901F966CB13419368EC63C456AD00BA70CB71D64
5,101,662 UART: [art] SIG.R = E86939F328185B061B4BE72058C8816B3BBFB44F97C15A81ACF013968546FA8CDC65177C5CDBEC3A3360AEF0A3DF76E4
5,108,441 UART: [art] SIG.S = 3E3DE29567BC26E7C960BA7A328C8D0C09C11BEBE47D3AD05C4AE382228F5ECBD909E8AD4501722E8DE9ABA25707DF0E
5,130,867 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,132,068 UART: mock_rt_interact::rt_entry...FMC Tester
5,411,266 UART: [rt] Runtime listening for mailbox commands...
5,413,301 >>> mbox cmd response data (336 bytes)
5,413,302 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,425,893 >>> mbox cmd response data (1536 bytes)
5,425,894 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,425,911 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,782 ready_for_fw is high
1,060,782 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,123,129 >>> mbox cmd response: success
2,123,129 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,184,745 UART:
2,184,761 UART: Running Caliptra FMC ...
2,185,169 UART:
2,185,312 UART: [state] CFI Enabled
2,195,913 UART: [fht] FMC Alias Private Key: 7
2,303,720 UART: [art] Extend RT PCRs Done
2,304,148 UART: [art] Lock RT PCRs Done
2,305,592 UART: [art] Populate DV Done
2,314,019 UART: [fht] FMC Alias Private Key: 7
2,315,021 UART: [art] Derive CDI
2,315,301 UART: [art] Store in in slot 0x4
2,400,870 UART: [art] Derive Key Pair
2,401,230 UART: [art] Store priv key in slot 0x5
2,414,324 UART: [art] Derive Key Pair - Done
2,429,287 UART: [art] Signing Cert with AUTHO
2,429,767 UART: RITY.KEYID = 7
2,444,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,676 UART: [art] PUB.X = 145FBF44C8E200A256201DFD486FF4AACC6CAB19FBD344E35B0275B82CF1AEE1B3375A8270B9755D105381DBDBDFDFD1
2,452,443 UART: [art] PUB.Y = 8190ADD786F6ABC55329D349F0B939CFF1423A189AC5F47818ECBB91D8D3045E3B1BEC909999C5102C878A0079C8B920
2,459,372 UART: [art] SIG.R = CBACC1DF1735EEAE2345A293E7B5AE43D38A1E0BBE64A03FD2BFA9300076230E1CBC69974317C3545DA1237FE4146087
2,466,126 UART: [art] SIG.S = 4E340962FAFD0DCFE2C064603E376B970BF311ADE5882F318D65CB5BE396C17BF72F23DEE5FF3E7B8C9D6E2384176C7F
2,490,218 UART: mock_rt_interact::rt_entry...FMC Tester
2,597,414 UART: [rt] Runtime listening for mailbox commands...
2,600,804 >>> mbox cmd response data (2048 bytes)
2,600,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,602,037 >>> mbox cmd response data (336 bytes)
2,602,038 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,614,629 >>> mbox cmd response data (1536 bytes)
2,614,630 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,547,501 >>> mbox cmd response: success
4,561,067 UART:
4,561,083 UART: Running Caliptra FMC ...
4,561,491 UART:
4,561,634 UART: [state] CFI Enabled
4,650,813 UART: [art] Extend RT PCRs Done
4,651,241 UART: [art] Lock RT PCRs Done
4,652,764 UART: [art] Populate DV Done
4,661,113 UART: [fht] FMC Alias Private Key: 7
4,662,187 UART: [art] Derive CDI
4,662,467 UART: [art] Store in in slot 0x4
4,747,804 UART: [art] Derive Key Pair
4,748,164 UART: [art] Store priv key in slot 0x5
4,761,308 UART: [art] Derive Key Pair - Done
4,775,834 UART: [art] Signing Cert with AUTHO
4,776,314 UART: RITY.KEYID = 7
4,791,124 UART: [art] Erasing AUTHORITY.KEYID = 7
4,791,889 UART: [art] PUB.X = 2E22C31184D97C7903B8FF49B22A2D21113715EF96631B2455083CD4B2A3608D0A17B9112FAB20E712B5693579383CF6
4,798,642 UART: [art] PUB.Y = 468D9192DC919D888BDE1E18B1AF3BB2AF714CDF566540AE9F18F17E4618CD803AC3F4A43899E495957E7238BF6CAD32
4,805,602 UART: [art] SIG.R = 36E8509E791BD30749F5F1B9BF8D910C16E9C54CD6E96CF3D0264FC202145F9EC7832F3E0C1EEC544EDC87F19A7AA7D0
4,812,374 UART: [art] SIG.S = 586C68749D2616D4165A181BE0C5682999E12468C699C46BBD641D3D63FEC315E2C17A2476673C12C30A3A51B956C835
4,835,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,836,166 UART: mock_rt_interact::rt_entry...FMC Tester
5,119,110 UART: [rt] Runtime listening for mailbox commands...
5,121,145 >>> mbox cmd response data (336 bytes)
5,121,146 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,133,737 >>> mbox cmd response data (1536 bytes)
5,133,738 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,133,755 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,467 UART: [idev] ++
1,172,635 UART: [idev] CDI.KEYID = 6
1,172,996 UART: [idev] SUBJECT.KEYID = 7
1,173,421 UART: [idev] UDS.KEYID = 0
1,173,767 ready_for_fw is high
1,173,767 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,207,894 UART: [ldev] ++
1,208,062 UART: [ldev] CDI.KEYID = 6
1,208,426 UART: [ldev] SUBJECT.KEYID = 5
1,208,853 UART: [ldev] AUTHORITY.KEYID = 7
1,209,316 UART: [ldev] FE.KEYID = 1
1,214,358 UART: [ldev] Erasing FE.KEYID = 1
1,240,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,606 UART: [ldev] --
1,280,000 UART: [fwproc] Wait for Commands...
1,280,769 UART: [fwproc] Recv command 0x46574c44
1,281,502 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,701 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,199 >>> mbox cmd response: success
2,267,199 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,356 UART: [afmc] ++
2,268,524 UART: [afmc] CDI.KEYID = 6
2,268,887 UART: [afmc] SUBJECT.KEYID = 7
2,269,313 UART: [afmc] AUTHORITY.KEYID = 5
2,305,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,347,745 UART: [afmc] --
2,348,751 UART: [cold-reset] --
2,349,485 UART: [state] Locking Datavault
2,350,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,452 UART: [state] Locking ICCM
2,352,076 UART: [exit] Launching FMC @ 0x40000130
2,357,405 UART:
2,357,421 UART: Running Caliptra FMC ...
2,357,829 UART:
2,357,883 UART: [state] CFI Enabled
2,368,580 UART: [fht] FMC Alias Private Key: 7
2,476,855 UART: [art] Extend RT PCRs Done
2,477,283 UART: [art] Lock RT PCRs Done
2,478,709 UART: [art] Populate DV Done
2,487,162 UART: [fht] FMC Alias Private Key: 7
2,488,138 UART: [art] Derive CDI
2,488,418 UART: [art] Store in in slot 0x4
2,573,839 UART: [art] Derive Key Pair
2,574,199 UART: [art] Store priv key in slot 0x5
2,587,085 UART: [art] Derive Key Pair - Done
2,601,699 UART: [art] Signing Cert with AUTHO
2,602,179 UART: RITY.KEYID = 7
2,617,795 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,560 UART: [art] PUB.X = 62972A5F2AD98752F9C5BE7B985FB6C8345B3213A554B362D87CC5CE2D64E3D2C341CA802F865B39ED372775F16958F2
2,625,332 UART: [art] PUB.Y = 753B00E25E40DAF04E9D6688821841DA6A951B7D3BE532016A8F5D93AD54A28818A4D25F7E46E3D71CB840527ADD55A6
2,632,261 UART: [art] SIG.R = 3CBF45FCEB3ED6B91727C65E2A9C774A525F4C07E370C8CAE282512C6A8A19D5D960EC1D9220369A76DC4CE76DB6592C
2,639,042 UART: [art] SIG.S = 036D62AAE00570710AAFA6849A893650138299BACF3B5D92FED5BBC2BAB55F8910C1074030EBEABD623350096509AF6C
2,662,931 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,495 UART: [rt] Runtime listening for mailbox commands...
2,773,885 >>> mbox cmd response data (2048 bytes)
2,773,886 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,118 >>> mbox cmd response data (336 bytes)
2,775,119 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,787,710 >>> mbox cmd response data (1536 bytes)
2,787,711 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,787,814 UART:
2,787,830 UART: Running Caliptra ROM ...
2,788,238 UART:
2,788,293 UART: [state] CFI Enabled
2,790,989 UART: [state] LifecycleState = Unprovisioned
2,791,644 UART: [state] DebugLocked = No
2,792,218 UART: [state] WD Timer not started. Device not locked for debugging
2,793,404 UART: [kat] SHA2-256
3,596,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,601,083 UART: [kat] ++
3,601,235 UART: [kat] sha1
3,605,287 UART: [kat] SHA2-256
3,607,227 UART: [kat] SHA2-384
3,610,058 UART: [kat] SHA2-512-ACC
3,611,958 UART: [kat] ECC-384
3,621,467 UART: [kat] HMAC-384Kdf
3,625,891 UART: [kat] LMS
3,874,203 UART: [kat] --
3,874,833 UART: [update-reset] ++
4,740,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,741,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,832,889 >>> mbox cmd response: success
4,833,160 UART: [update-reset] Copying MAN_2 To MAN_1
4,841,174 UART: [update-reset Success] --
4,842,189 UART: [state] Locking Datavault
4,842,965 UART: [state] Locking PCR0, PCR1 and PCR31
4,843,569 UART: [state] Locking ICCM
4,844,103 UART: [exit] Launching FMC @ 0x40000130
4,849,432 UART:
4,849,448 UART: Running Caliptra FMC ...
4,849,856 UART:
4,849,910 UART: [state] CFI Enabled
4,938,575 UART: [art] Extend RT PCRs Done
4,939,003 UART: [art] Lock RT PCRs Done
4,940,196 UART: [art] Populate DV Done
4,948,515 UART: [fht] FMC Alias Private Key: 7
4,949,463 UART: [art] Derive CDI
4,949,743 UART: [art] Store in in slot 0x4
5,035,242 UART: [art] Derive Key Pair
5,035,602 UART: [art] Store priv key in slot 0x5
5,048,740 UART: [art] Derive Key Pair - Done
5,063,614 UART: [art] Signing Cert with AUTHO
5,064,094 UART: RITY.KEYID = 7
5,079,078 UART: [art] Erasing AUTHORITY.KEYID = 7
5,079,843 UART: [art] PUB.X = CA8864EDFB19EAF77C85E33212B9230748108FE930D23BAD74D23163BAE944296F9B993A78060FF2620D3965FCDEB773
5,086,605 UART: [art] PUB.Y = 267463E6325A039B8E59DB4EBACA91E63B85BB95B9607F6D6AFDA67EAB6BE1219CA40D988EFF9FE1B26103DAEE949313
5,093,564 UART: [art] SIG.R = 38BA0897ED7701C781925474CEB9EFD556200250AA993DC9669C8A33D7D4738BCC84214080284DD6E05044481EAA09F0
5,100,318 UART: [art] SIG.S = B5F7BAFAE8489AC9D8CA19EE60C97B8B1A7E7AAB86D42147CABFAEBF0D68995076C9A34EC29A9169A398140D08346297
5,123,127 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,124,254 UART: mock_rt_interact::rt_entry...FMC Tester
5,407,116 UART: [rt] Runtime listening for mailbox commands...
5,409,151 >>> mbox cmd response data (336 bytes)
5,409,152 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,421,743 >>> mbox cmd response data (1536 bytes)
5,421,744 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,421,761 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 ready_for_fw is high
1,056,102 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,119,359 >>> mbox cmd response: success
2,119,359 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,443 UART:
2,181,459 UART: Running Caliptra FMC ...
2,181,867 UART:
2,181,921 UART: [state] CFI Enabled
2,192,356 UART: [fht] FMC Alias Private Key: 7
2,300,139 UART: [art] Extend RT PCRs Done
2,300,567 UART: [art] Lock RT PCRs Done
2,301,869 UART: [art] Populate DV Done
2,310,114 UART: [fht] FMC Alias Private Key: 7
2,311,108 UART: [art] Derive CDI
2,311,388 UART: [art] Store in in slot 0x4
2,397,069 UART: [art] Derive Key Pair
2,397,429 UART: [art] Store priv key in slot 0x5
2,410,671 UART: [art] Derive Key Pair - Done
2,425,339 UART: [art] Signing Cert with AUTHO
2,425,819 UART: RITY.KEYID = 7
2,440,727 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,492 UART: [art] PUB.X = 020403F454B38470A47801489701D3059A6EEEFC59846E7D188F5686797CBE6CEFF03DFCD5A5B5FC3E1B5F11E193B0FA
2,448,252 UART: [art] PUB.Y = 947931E40491E4D40DE59F038B660BCD706B3C6616BD1832A459C0109354657D234F5B850C21F6C3B63F808C1FFC5400
2,455,159 UART: [art] SIG.R = 99D0E5E1117174A6634707BFD624EAE27DBCED8FE447D11DAC75FC694A06E86971FB53BCA168486202A2D41C25E16BC5
2,461,930 UART: [art] SIG.S = A411F389188353D5F7DA3A28A469A161EC29097D64B2104BA36094BEF3D314E4E7E2F7A75FBCB7D1AC2CF3E4A599F162
2,486,152 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,111 UART: [rt] Runtime listening for mailbox commands...
2,597,501 >>> mbox cmd response data (2048 bytes)
2,597,502 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,598,734 >>> mbox cmd response data (336 bytes)
2,598,735 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,611,326 >>> mbox cmd response data (1536 bytes)
2,611,327 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,538,892 >>> mbox cmd response: success
4,552,116 UART:
4,552,132 UART: Running Caliptra FMC ...
4,552,540 UART:
4,552,594 UART: [state] CFI Enabled
4,641,647 UART: [art] Extend RT PCRs Done
4,642,075 UART: [art] Lock RT PCRs Done
4,643,360 UART: [art] Populate DV Done
4,651,243 UART: [fht] FMC Alias Private Key: 7
4,652,201 UART: [art] Derive CDI
4,652,481 UART: [art] Store in in slot 0x4
4,738,050 UART: [art] Derive Key Pair
4,738,410 UART: [art] Store priv key in slot 0x5
4,752,488 UART: [art] Derive Key Pair - Done
4,767,294 UART: [art] Signing Cert with AUTHO
4,767,774 UART: RITY.KEYID = 7
4,782,858 UART: [art] Erasing AUTHORITY.KEYID = 7
4,783,623 UART: [art] PUB.X = 1C4DAE17740EC760FD0DE472EE0B90AB326166196CED9D7F6357A7EA5BCA22370FFF375BEEE554695566CA952E0A5E26
4,790,392 UART: [art] PUB.Y = FF0E604B8B9C5245133E4AD4E525622AB4ED2486D8F8EFB8C5F2201FA7E9173D5A99A7E240A7C9E5B35B0DCA2755217D
4,797,348 UART: [art] SIG.R = 91317FE53C1B5C4BB6B4EB5FEE9CCA571DABBD93B2256A0B5802A2B96C6842C16A8DE43278938DF08D72DFD2406DFA82
4,804,130 UART: [art] SIG.S = B55D2E959A0F9670B64BD1B886A6426B8BCD37445F261FD3DA22032066C6EE8769F37A84015B5536F2C509608E212870
4,826,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,827,997 UART: mock_rt_interact::rt_entry...FMC Tester
5,109,846 UART: [rt] Runtime listening for mailbox commands...
5,111,881 >>> mbox cmd response data (336 bytes)
5,111,882 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,124,473 >>> mbox cmd response data (1536 bytes)
5,124,474 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,124,491 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 ready_for_fw is high
1,174,752 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,818 UART: [fwproc] Recv command 0x46574c44
1,283,551 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,060 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,492 >>> mbox cmd response: success
2,268,492 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,649 UART: [afmc] ++
2,269,817 UART: [afmc] CDI.KEYID = 6
2,270,180 UART: [afmc] SUBJECT.KEYID = 7
2,270,606 UART: [afmc] AUTHORITY.KEYID = 5
2,306,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,302 UART: [afmc] --
2,349,214 UART: [cold-reset] --
2,350,132 UART: [state] Locking Datavault
2,351,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,915 UART: [state] Locking ICCM
2,352,515 UART: [exit] Launching FMC @ 0x40000130
2,357,844 UART:
2,357,860 UART: Running Caliptra FMC ...
2,358,268 UART:
2,358,411 UART: [state] CFI Enabled
2,369,242 UART: [fht] FMC Alias Private Key: 7
2,476,549 UART: [art] Extend RT PCRs Done
2,476,977 UART: [art] Lock RT PCRs Done
2,478,361 UART: [art] Populate DV Done
2,486,610 UART: [fht] FMC Alias Private Key: 7
2,487,670 UART: [art] Derive CDI
2,487,950 UART: [art] Store in in slot 0x4
2,573,537 UART: [art] Derive Key Pair
2,573,897 UART: [art] Store priv key in slot 0x5
2,587,075 UART: [art] Derive Key Pair - Done
2,601,828 UART: [art] Signing Cert with AUTHO
2,602,308 UART: RITY.KEYID = 7
2,617,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,645 UART: [art] PUB.X = 267B73E591E3E3DE02559E2006F8C5C2C6EA92E9194D3E91C7A9B27C3D252DA20C76984F23314686AF6B88731416BD45
2,625,404 UART: [art] PUB.Y = 89EDFBEF8A2D17E6B86C160AFBF25FE7ADFFE939DD9C85F885BA47E4C000816ED5BFB2CF7EFF6397CC90B730BE90B8CF
2,632,363 UART: [art] SIG.R = 0BA90EC5BFCC924E11F8DF1DD3D8A738D512082E07C66F47812EDD6B36717DFE2B32FAFAE9C517F2CEEC662F7E03E11E
2,639,142 UART: [art] SIG.S = 27CA4806CF7810D6B341D9F218E9A85D19FECE71923912C65AF7C1716F3DE72E22A985E0E0CB30B328A462042D541438
2,663,661 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,431 UART: [rt] Runtime listening for mailbox commands...
2,774,821 >>> mbox cmd response data (2048 bytes)
2,774,822 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,776,054 >>> mbox cmd response data (336 bytes)
2,776,055 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,646 >>> mbox cmd response data (1536 bytes)
2,788,647 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,750 UART:
2,788,766 UART: Running Caliptra ROM ...
2,789,174 UART:
2,789,316 UART: [state] CFI Enabled
2,791,828 UART: [state] LifecycleState = Unprovisioned
2,792,483 UART: [state] DebugLocked = No
2,793,141 UART: [state] WD Timer not started. Device not locked for debugging
2,794,499 UART: [kat] SHA2-256
3,598,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,602,178 UART: [kat] ++
3,602,330 UART: [kat] sha1
3,606,366 UART: [kat] SHA2-256
3,608,306 UART: [kat] SHA2-384
3,611,057 UART: [kat] SHA2-512-ACC
3,612,957 UART: [kat] ECC-384
3,622,950 UART: [kat] HMAC-384Kdf
3,627,768 UART: [kat] LMS
3,876,080 UART: [kat] --
3,876,802 UART: [update-reset] ++
4,743,405 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,835,992 >>> mbox cmd response: success
4,836,273 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,287 UART: [update-reset Success] --
4,845,418 UART: [state] Locking Datavault
4,846,100 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,704 UART: [state] Locking ICCM
4,847,340 UART: [exit] Launching FMC @ 0x40000130
4,852,669 UART:
4,852,685 UART: Running Caliptra FMC ...
4,853,093 UART:
4,853,236 UART: [state] CFI Enabled
4,942,245 UART: [art] Extend RT PCRs Done
4,942,673 UART: [art] Lock RT PCRs Done
4,944,034 UART: [art] Populate DV Done
4,952,247 UART: [fht] FMC Alias Private Key: 7
4,953,397 UART: [art] Derive CDI
4,953,677 UART: [art] Store in in slot 0x4
5,039,470 UART: [art] Derive Key Pair
5,039,830 UART: [art] Store priv key in slot 0x5
5,052,626 UART: [art] Derive Key Pair - Done
5,067,791 UART: [art] Signing Cert with AUTHO
5,068,271 UART: RITY.KEYID = 7
5,083,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,084,482 UART: [art] PUB.X = FD6B6A4F966C8A06F69F5B2B7E8F0B00DFCA0640513B5AA397C2E6A34E9D18C5568745B8644D66AA5A9FC14553288B7D
5,091,231 UART: [art] PUB.Y = 696B131ACE93806886B52F3FF86F7CBA042E7B50CB53987F83726B87E4690CC1DB4114F8CDEFDDC74F41EC83335EA9D8
5,098,187 UART: [art] SIG.R = 9F3BADD435A297ED739CE9A75C048AC101A2398CD321E484F8ADFFE82F879A4BF317A89DBB46DF106289EDBD295CE947
5,104,969 UART: [art] SIG.S = 19A42DE9C5F19F062A80AAAE8F562A0165A1E557D035A5703BD6BBD174DC030FFDC019288351E80A5B9AACD37ED4EE04
5,127,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,128,864 UART: mock_rt_interact::rt_entry...FMC Tester
5,409,652 UART: [rt] Runtime listening for mailbox commands...
5,411,687 >>> mbox cmd response data (336 bytes)
5,411,688 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,424,279 >>> mbox cmd response data (1536 bytes)
5,424,280 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,424,297 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,131 ready_for_fw is high
1,057,131 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,119,592 >>> mbox cmd response: success
2,119,592 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,028 UART:
2,183,044 UART: Running Caliptra FMC ...
2,183,452 UART:
2,183,595 UART: [state] CFI Enabled
2,194,142 UART: [fht] FMC Alias Private Key: 7
2,301,767 UART: [art] Extend RT PCRs Done
2,302,195 UART: [art] Lock RT PCRs Done
2,304,027 UART: [art] Populate DV Done
2,312,372 UART: [fht] FMC Alias Private Key: 7
2,313,428 UART: [art] Derive CDI
2,313,708 UART: [art] Store in in slot 0x4
2,399,651 UART: [art] Derive Key Pair
2,400,011 UART: [art] Store priv key in slot 0x5
2,413,377 UART: [art] Derive Key Pair - Done
2,427,863 UART: [art] Signing Cert with AUTHO
2,428,343 UART: RITY.KEYID = 7
2,443,473 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,238 UART: [art] PUB.X = 426060975253545DF1312F081C115C96C2998B90A800342DF3F2663A1FF0CF4D62D7B8394030627AA13C970E934D36BF
2,450,970 UART: [art] PUB.Y = E429BD05310BD0CD1E7F704500157946D749AF401B893DAA29FFAFEDA7553C6BBCB3E94A96286B625DA03FB7B8679D3A
2,457,906 UART: [art] SIG.R = 5359699EF9C517B5BC6C52F258CEF0C2992CB91D3817DAB353624A7C84ABB45BB5AD21526C941BD07523E2ADC6C0EA1F
2,464,690 UART: [art] SIG.S = 3FFCD2D2B5F90520F96D355D67D4BCD942CA9F259004C04897690E7CED82C0EE295EA459B79DBB6C1DCAEF005F57E73C
2,488,664 UART: mock_rt_interact::rt_entry...FMC Tester
2,595,560 UART: [rt] Runtime listening for mailbox commands...
2,598,950 >>> mbox cmd response data (2048 bytes)
2,598,951 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,183 >>> mbox cmd response data (336 bytes)
2,600,184 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,612,775 >>> mbox cmd response data (1536 bytes)
2,612,776 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,540,754 >>> mbox cmd response: success
4,554,244 UART:
4,554,260 UART: Running Caliptra FMC ...
4,554,668 UART:
4,554,811 UART: [state] CFI Enabled
4,644,158 UART: [art] Extend RT PCRs Done
4,644,586 UART: [art] Lock RT PCRs Done
4,645,783 UART: [art] Populate DV Done
4,653,974 UART: [fht] FMC Alias Private Key: 7
4,655,132 UART: [art] Derive CDI
4,655,412 UART: [art] Store in in slot 0x4
4,741,155 UART: [art] Derive Key Pair
4,741,515 UART: [art] Store priv key in slot 0x5
4,754,939 UART: [art] Derive Key Pair - Done
4,769,483 UART: [art] Signing Cert with AUTHO
4,769,963 UART: RITY.KEYID = 7
4,785,511 UART: [art] Erasing AUTHORITY.KEYID = 7
4,786,276 UART: [art] PUB.X = 14DE938147CA04D2851DE2B25F584EF20309C4E3B69B48EAE2558E50DC73EEBE6A0EB1E8600586F5DF5EB08C3AA613AC
4,793,047 UART: [art] PUB.Y = 43163490CCA57AE2BCE23DA2A77F6A29795BC443943561178B79C33210EDD8F3801C3DD13FF5C02FC13428D4016FE104
4,799,993 UART: [art] SIG.R = 3C25194183ACDA1FA455E3E6E8929BBB027C050A8C0A55DC80B68A1C412BDE527F9699313A1C20F01E4C5ED018A682D8
4,806,759 UART: [art] SIG.S = 7286203A8A5A82CE666E1B535B713B93EEC9AE46B46E4231E70C709F198A06887E675EA157D403F7CAB81ED18A31A47F
4,829,464 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,830,429 UART: mock_rt_interact::rt_entry...FMC Tester
5,111,277 UART: [rt] Runtime listening for mailbox commands...
5,113,312 >>> mbox cmd response data (336 bytes)
5,113,313 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,125,904 >>> mbox cmd response data (1536 bytes)
5,125,905 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,125,922 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.17s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
903,914 UART: [kat] SHA2-512-ACC
905,815 UART: [kat] ECC-384
914,938 UART: [kat] HMAC-384Kdf
919,544 UART: [kat] LMS
1,167,856 UART: [kat] --
1,168,655 UART: [cold-reset] ++
1,169,081 UART: [fht] FHT @ 0x50003400
1,171,589 UART: [idev] ++
1,171,757 UART: [idev] CDI.KEYID = 6
1,172,118 UART: [idev] SUBJECT.KEYID = 7
1,172,543 UART: [idev] UDS.KEYID = 0
1,180,349 UART: [idev] Erasing UDS.KEYID = 0
1,197,195 UART: [idev] Sha1 KeyId Algorithm
1,205,981 UART: [idev] --
1,207,186 UART: [ldev] ++
1,207,354 UART: [ldev] CDI.KEYID = 6
1,207,718 UART: [ldev] SUBJECT.KEYID = 5
1,208,145 UART: [ldev] AUTHORITY.KEYID = 7
1,208,608 UART: [ldev] FE.KEYID = 1
1,214,000 UART: [ldev] Erasing FE.KEYID = 1
1,240,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,288 UART: [ldev] --
1,279,620 UART: [fwproc] Wait for Commands...
1,280,419 UART: [fwproc] Recv command 0x43415053
1,281,414 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,463 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,189 UART: [kat] SHA2-256
891,739 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,868 UART: [kat] ++
896,020 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,271 UART: [kat] LMS
1,169,583 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,170,980 UART: [fht] FHT @ 0x50003400
1,173,636 UART: [idev] ++
1,173,804 UART: [idev] CDI.KEYID = 6
1,174,165 UART: [idev] SUBJECT.KEYID = 7
1,174,590 UART: [idev] UDS.KEYID = 0
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x43415053
1,284,029 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,212 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,056 UART: [ldev] ++
1,208,224 UART: [ldev] CDI.KEYID = 6
1,208,588 UART: [ldev] SUBJECT.KEYID = 5
1,209,015 UART: [ldev] AUTHORITY.KEYID = 7
1,209,478 UART: [ldev] FE.KEYID = 1
1,214,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,404 UART: [ldev] --
1,279,748 UART: [fwproc] Wait for Commands...
1,280,361 UART: [fwproc] Recv command 0x43415053
1,281,356 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,447 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,198,984 UART: [idev] Sha1 KeyId Algorithm
1,207,904 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,669 UART: [fwproc] Wait for Commands...
1,282,380 UART: [fwproc] Recv command 0x43415053
1,283,375 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,216 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,493 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,364 UART: [ldev] ++
1,209,532 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,323 UART: [ldev] AUTHORITY.KEYID = 7
1,210,786 UART: [ldev] FE.KEYID = 1
1,215,822 UART: [ldev] Erasing FE.KEYID = 1
1,242,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,994 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,143 UART: [fwproc] Recv command 0x43415053
1,283,138 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,389 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
891,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,860 UART: [kat] ++
896,012 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,468 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,281,977 UART: [fwproc] Wait for Commands...
1,282,796 UART: [fwproc] Recv command 0x43415053
1,283,791 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,272 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,966 UART: [ldev] Erasing FE.KEYID = 1
1,243,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,798 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,282,881 UART: [fwproc] Recv command 0x46574c44
1,283,614 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,872 UART: [afmc] ++
2,775,040 UART: [afmc] CDI.KEYID = 6
2,775,403 UART: [afmc] SUBJECT.KEYID = 7
2,775,829 UART: [afmc] AUTHORITY.KEYID = 5
2,811,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,331 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,386 UART: [kat] SHA2-256
902,326 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,241 UART: [ldev] ++
1,209,409 UART: [ldev] CDI.KEYID = 6
1,209,773 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,933 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,282,024 UART: [fwproc] Recv command 0x46574c44
1,282,757 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,627 UART: [afmc] ++
2,772,795 UART: [afmc] CDI.KEYID = 6
2,773,158 UART: [afmc] SUBJECT.KEYID = 7
2,773,584 UART: [afmc] AUTHORITY.KEYID = 5
2,809,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,924 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
905,122 UART: [kat] SHA2-512-ACC
907,023 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,258 UART: [kat] LMS
1,169,570 UART: [kat] --
1,170,495 UART: [cold-reset] ++
1,171,061 UART: [fht] FHT @ 0x50003400
1,173,873 UART: [idev] ++
1,174,041 UART: [idev] CDI.KEYID = 6
1,174,402 UART: [idev] SUBJECT.KEYID = 7
1,174,827 UART: [idev] UDS.KEYID = 0
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,671 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,216,152 UART: [ldev] Erasing FE.KEYID = 1
1,242,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,832 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,548 UART: [afmc] ++
2,774,716 UART: [afmc] CDI.KEYID = 6
2,775,079 UART: [afmc] SUBJECT.KEYID = 7
2,775,505 UART: [afmc] AUTHORITY.KEYID = 5
2,811,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,685 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,241,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,537 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,711 UART: [afmc] ++
2,772,879 UART: [afmc] CDI.KEYID = 6
2,773,242 UART: [afmc] SUBJECT.KEYID = 7
2,773,668 UART: [afmc] AUTHORITY.KEYID = 5
2,809,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,875 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,746 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,182,523 UART: [idev] Erasing UDS.KEYID = 0
1,199,565 UART: [idev] Sha1 KeyId Algorithm
1,208,465 UART: [idev] --
1,209,514 UART: [ldev] ++
1,209,682 UART: [ldev] CDI.KEYID = 6
1,210,046 UART: [ldev] SUBJECT.KEYID = 5
1,210,473 UART: [ldev] AUTHORITY.KEYID = 7
1,210,936 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,760 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,787 UART: [fwproc] Recv command 0x46574c44
1,283,520 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,346 UART: [afmc] ++
2,774,514 UART: [afmc] CDI.KEYID = 6
2,774,877 UART: [afmc] SUBJECT.KEYID = 7
2,775,303 UART: [afmc] AUTHORITY.KEYID = 5
2,810,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,987 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,483 UART: [afmc] ++
2,775,651 UART: [afmc] CDI.KEYID = 6
2,776,014 UART: [afmc] SUBJECT.KEYID = 7
2,776,440 UART: [afmc] AUTHORITY.KEYID = 5
2,811,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,648 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 ready_for_fw is high
1,174,353 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,199,365 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,702 UART: [ldev] --
1,281,216 UART: [fwproc] Wait for Commands...
1,281,879 UART: [fwproc] Recv command 0x46574c44
1,282,612 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,623 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,586 >>> mbox cmd response: success
2,674,855 UART: [afmc] ++
2,675,023 UART: [afmc] CDI.KEYID = 6
2,675,386 UART: [afmc] SUBJECT.KEYID = 7
2,675,812 UART: [afmc] AUTHORITY.KEYID = 5
2,710,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,109 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,829 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,722 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,415 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,248 UART: [afmc] --
2,754,228 UART: [cold-reset] --
2,755,142 UART: [state] Locking Datavault
2,756,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,027 UART: [state] Locking ICCM
2,757,521 UART: [exit] Launching FMC @ 0x40000000
2,762,818 UART:
2,762,834 UART: Running Caliptra FMC ...
2,763,242 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 ready_for_fw is high
1,055,856 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,670 >>> mbox cmd response: success
2,585,567 UART:
2,585,583 UART: Running Caliptra FMC ...
2,585,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,152 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,373 UART: [idev] SUBJECT.KEYID = 7
1,174,798 UART: [idev] UDS.KEYID = 0
1,175,144 ready_for_fw is high
1,175,144 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,696 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,929 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,357 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,442 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,417 >>> mbox cmd response: success
2,677,470 UART: [afmc] ++
2,677,638 UART: [afmc] CDI.KEYID = 6
2,678,001 UART: [afmc] SUBJECT.KEYID = 7
2,678,427 UART: [afmc] AUTHORITY.KEYID = 5
2,714,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,920 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,640 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,533 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,226 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,963 UART: [afmc] --
2,758,071 UART: [cold-reset] --
2,758,815 UART: [state] Locking Datavault
2,759,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,480 UART: [state] Locking ICCM
2,761,046 UART: [exit] Launching FMC @ 0x40000000
2,766,343 UART:
2,766,359 UART: Running Caliptra FMC ...
2,766,767 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,395 ready_for_fw is high
1,055,395 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,173 >>> mbox cmd response: success
2,584,252 UART:
2,584,268 UART: Running Caliptra FMC ...
2,584,676 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,294 UART: [kat] SHA2-256
891,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,973 UART: [kat] ++
896,125 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,416 UART: [kat] LMS
1,169,728 UART: [kat] --
1,170,757 UART: [cold-reset] ++
1,171,103 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,174,951 ready_for_fw is high
1,174,951 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,665 UART: [idev] Erasing UDS.KEYID = 0
1,199,741 UART: [idev] Sha1 KeyId Algorithm
1,208,775 UART: [idev] --
1,209,794 UART: [ldev] ++
1,209,962 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,753 UART: [ldev] AUTHORITY.KEYID = 7
1,211,216 UART: [ldev] FE.KEYID = 1
1,216,440 UART: [ldev] Erasing FE.KEYID = 1
1,242,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,822 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,281 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,126 >>> mbox cmd response: success
2,675,227 UART: [afmc] ++
2,675,395 UART: [afmc] CDI.KEYID = 6
2,675,758 UART: [afmc] SUBJECT.KEYID = 7
2,676,184 UART: [afmc] AUTHORITY.KEYID = 5
2,712,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,505 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,225 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,118 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,811 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,646 UART: [afmc] --
2,755,730 UART: [cold-reset] --
2,756,490 UART: [state] Locking Datavault
2,757,795 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,399 UART: [state] Locking ICCM
2,758,867 UART: [exit] Launching FMC @ 0x40000000
2,764,164 UART:
2,764,180 UART: Running Caliptra FMC ...
2,764,588 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,716 ready_for_fw is high
1,056,716 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,334 >>> mbox cmd response: success
2,586,461 UART:
2,586,477 UART: Running Caliptra FMC ...
2,586,885 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,700 UART: [idev] ++
1,173,868 UART: [idev] CDI.KEYID = 6
1,174,229 UART: [idev] SUBJECT.KEYID = 7
1,174,654 UART: [idev] UDS.KEYID = 0
1,175,000 ready_for_fw is high
1,175,000 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,735 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,153 UART: [fwproc] Recv'd Img size: 106848 bytes
2,496,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,920 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,869 >>> mbox cmd response: success
2,677,940 UART: [afmc] ++
2,678,108 UART: [afmc] CDI.KEYID = 6
2,678,471 UART: [afmc] SUBJECT.KEYID = 7
2,678,897 UART: [afmc] AUTHORITY.KEYID = 5
2,714,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,314 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,034 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,927 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,620 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,397 UART: [afmc] --
2,758,441 UART: [cold-reset] --
2,759,187 UART: [state] Locking Datavault
2,760,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,748 UART: [state] Locking ICCM
2,761,212 UART: [exit] Launching FMC @ 0x40000000
2,766,509 UART:
2,766,525 UART: Running Caliptra FMC ...
2,766,933 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,455 >>> mbox cmd response: success
2,587,290 UART:
2,587,306 UART: Running Caliptra FMC ...
2,587,714 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,124 UART: [kat] SHA2-256
890,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,803 UART: [kat] ++
894,955 UART: [kat] sha1
899,115 UART: [kat] SHA2-256
901,055 UART: [kat] SHA2-384
903,780 UART: [kat] SHA2-512-ACC
905,681 UART: [kat] ECC-384
915,124 UART: [kat] HMAC-384Kdf
919,906 UART: [kat] LMS
1,168,218 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,563 UART: [fht] FHT @ 0x50003400
1,172,181 UART: [idev] ++
1,172,349 UART: [idev] CDI.KEYID = 6
1,172,710 UART: [idev] SUBJECT.KEYID = 7
1,173,135 UART: [idev] UDS.KEYID = 0
1,173,481 ready_for_fw is high
1,173,481 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,640 UART: [ldev] --
1,281,030 UART: [fwproc] Wait for Commands...
1,281,743 UART: [fwproc] Recv command 0x46574c44
1,282,476 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,181 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,026 >>> mbox cmd response: success
2,675,099 UART: [afmc] ++
2,675,267 UART: [afmc] CDI.KEYID = 6
2,675,630 UART: [afmc] SUBJECT.KEYID = 7
2,676,056 UART: [afmc] AUTHORITY.KEYID = 5
2,712,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,533 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,253 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,146 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,839 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,636 UART: [afmc] --
2,755,546 UART: [cold-reset] --
2,756,564 UART: [state] Locking Datavault
2,757,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,161 UART: [state] Locking ICCM
2,758,777 UART: [exit] Launching FMC @ 0x40000000
2,764,074 UART:
2,764,090 UART: Running Caliptra FMC ...
2,764,498 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,674 ready_for_fw is high
1,056,674 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,296 >>> mbox cmd response: success
2,588,131 UART:
2,588,147 UART: Running Caliptra FMC ...
2,588,555 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,296 UART: [kat] SHA2-256
902,236 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,174,882 ready_for_fw is high
1,174,882 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,749 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,163 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,858 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,677 >>> mbox cmd response: success
2,675,930 UART: [afmc] ++
2,676,098 UART: [afmc] CDI.KEYID = 6
2,676,461 UART: [afmc] SUBJECT.KEYID = 7
2,676,887 UART: [afmc] AUTHORITY.KEYID = 5
2,712,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,014 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,734 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,627 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,320 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,145 UART: [afmc] --
2,756,115 UART: [cold-reset] --
2,756,987 UART: [state] Locking Datavault
2,758,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,694 UART: [state] Locking ICCM
2,759,168 UART: [exit] Launching FMC @ 0x40000000
2,764,465 UART:
2,764,481 UART: Running Caliptra FMC ...
2,764,889 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,471 ready_for_fw is high
1,056,471 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,685 >>> mbox cmd response: success
2,586,922 UART:
2,586,938 UART: Running Caliptra FMC ...
2,587,346 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [fake-rom-cold-reset] ++
88,702 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,948 UART: [fht] FHT @ 0x50003400
92,263 UART: [fwproc] Wait for Commands...
92,928 UART: [fwproc] Recv command 0x46574c44
93,656 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,672 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,112 >>> mbox cmd response: success
1,548,270 UART: [fake-rom-cold-reset] --
1,549,056 UART: [state] Locking Datavault
1,550,273 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,877 UART: [state] Locking ICCM
1,551,345 UART: [exit] Launching FMC @ 0x40000000
1,556,642 UART:
1,556,658 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [fake-rom-cold-reset] ++
88,516 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,724 UART: [fht] FHT @ 0x50003400
92,179 UART: [fwproc] Wait for Commands...
92,826 UART: [fwproc] Recv command 0x46574c44
93,554 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,310 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,744 >>> mbox cmd response: success
1,548,902 UART: [fake-rom-cold-reset] --
1,549,672 UART: [state] Locking Datavault
1,550,905 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,509 UART: [state] Locking ICCM
1,552,031 UART: [exit] Launching FMC @ 0x40000000
1,557,328 UART:
1,557,344 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [fake-rom-cold-reset] ++
89,067 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,377 UART: [fht] FHT @ 0x50003400
92,732 UART: [fwproc] Wait for Commands...
93,453 UART: [fwproc] Recv command 0x46574c44
94,181 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,647 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,245 >>> mbox cmd response: success
1,549,403 UART: [fake-rom-cold-reset] --
1,550,225 UART: [state] Locking Datavault
1,551,200 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,804 UART: [state] Locking ICCM
1,552,246 UART: [exit] Launching FMC @ 0x40000000
1,557,543 UART:
1,557,559 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [fake-rom-cold-reset] ++
88,951 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,149 UART: [fht] FHT @ 0x50003400
92,444 UART: [fwproc] Wait for Commands...
93,269 UART: [fwproc] Recv command 0x46574c44
93,997 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,123 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,523 >>> mbox cmd response: success
1,547,681 UART: [fake-rom-cold-reset] --
1,548,589 UART: [state] Locking Datavault
1,549,832 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,436 UART: [state] Locking ICCM
1,550,882 UART: [exit] Launching FMC @ 0x40000000
1,556,179 UART:
1,556,195 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [fake-rom-cold-reset] ++
88,734 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,888 UART: [fht] FHT @ 0x50003400
92,271 UART: [fwproc] Wait for Commands...
92,884 UART: [fwproc] Recv command 0x46574c44
93,612 UART: [fwproc] Recv'd Img size: 111916 bytes
1,357,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,212 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,545,698 >>> mbox cmd response: success
1,546,856 UART: [fake-rom-cold-reset] --
1,547,638 UART: [state] Locking Datavault
1,548,915 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,519 UART: [state] Locking ICCM
1,549,991 UART: [exit] Launching FMC @ 0x40000000
1,555,288 UART:
1,555,304 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [fake-rom-cold-reset] ++
89,080 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,364 UART: [fht] FHT @ 0x50003400
92,827 UART: [fwproc] Wait for Commands...
93,426 UART: [fwproc] Recv command 0x46574c44
94,154 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,322 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,776 >>> mbox cmd response: success
1,548,934 UART: [fake-rom-cold-reset] --
1,549,686 UART: [state] Locking Datavault
1,550,677 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,281 UART: [state] Locking ICCM
1,551,921 UART: [exit] Launching FMC @ 0x40000000
1,557,218 UART:
1,557,234 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [fake-rom-cold-reset] ++
88,927 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,045 UART: [fht] FHT @ 0x50003400
92,472 UART: [fwproc] Wait for Commands...
93,103 UART: [fwproc] Recv command 0x46574c44
93,831 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,397 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,917 >>> mbox cmd response: success
1,548,075 UART: [fake-rom-cold-reset] --
1,548,851 UART: [state] Locking Datavault
1,549,952 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,556 UART: [state] Locking ICCM
1,551,138 UART: [exit] Launching FMC @ 0x40000000
1,556,435 UART:
1,556,451 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,466 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [fake-rom-cold-reset] ++
88,439 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,729 UART: [fht] FHT @ 0x50003400
92,116 UART: [fwproc] Wait for Commands...
92,843 UART: [fwproc] Recv command 0x46574c44
93,571 UART: [fwproc] Recv'd Img size: 111916 bytes
1,357,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,333 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,545,765 >>> mbox cmd response: success
1,546,923 UART: [fake-rom-cold-reset] --
1,547,795 UART: [state] Locking Datavault
1,548,686 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,290 UART: [state] Locking ICCM
1,549,786 UART: [exit] Launching FMC @ 0x40000000
1,555,083 UART:
1,555,099 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [fake-rom-cold-reset] ++
88,732 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,878 UART: [fht] FHT @ 0x50003400
92,297 UART: [fwproc] Wait for Commands...
93,142 UART: [fwproc] Recv command 0x46574c44
93,870 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,268 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,642 >>> mbox cmd response: success
1,547,800 UART: [fake-rom-cold-reset] --
1,548,786 UART: [state] Locking Datavault
1,549,905 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,509 UART: [state] Locking ICCM
1,551,025 UART: [exit] Launching FMC @ 0x40000000
1,556,322 UART:
1,556,338 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [fake-rom-cold-reset] ++
88,520 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,604 UART: [fht] FHT @ 0x50003400
92,071 UART: [fwproc] Wait for Commands...
92,890 UART: [fwproc] Recv command 0x46574c44
93,618 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,806 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,210 >>> mbox cmd response: success
1,547,368 UART: [fake-rom-cold-reset] --
1,548,030 UART: [state] Locking Datavault
1,549,227 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,831 UART: [state] Locking ICCM
1,550,291 UART: [exit] Launching FMC @ 0x40000000
1,555,588 UART:
1,555,604 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [fake-rom-cold-reset] ++
88,639 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,857 UART: [fht] FHT @ 0x50003400
92,110 UART: [fwproc] Wait for Commands...
92,891 UART: [fwproc] Recv command 0x46574c44
93,619 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,587 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,987 >>> mbox cmd response: success
1,548,145 UART: [fake-rom-cold-reset] --
1,548,913 UART: [state] Locking Datavault
1,550,016 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,620 UART: [state] Locking ICCM
1,551,288 UART: [exit] Launching FMC @ 0x40000000
1,556,585 UART:
1,556,601 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,991 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [fake-rom-cold-reset] ++
89,345 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,467 UART: [fht] FHT @ 0x50003400
92,690 UART: [fwproc] Wait for Commands...
93,427 UART: [fwproc] Recv command 0x46574c44
94,155 UART: [fwproc] Recv'd Img size: 111916 bytes
1,360,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,315 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,927 >>> mbox cmd response: success
1,550,085 UART: [fake-rom-cold-reset] --
1,551,027 UART: [state] Locking Datavault
1,552,126 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,730 UART: [state] Locking ICCM
1,553,206 UART: [exit] Launching FMC @ 0x40000000
1,558,503 UART:
1,558,519 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Production
85,963 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Production
86,085 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,907 UART: [state] LifecycleState = Production
86,522 UART: [state] DebugLocked = No
87,229 UART: [state] WD Timer not started. Device not locked for debugging
88,680 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Production
86,020 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Production
85,827 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Production
85,853 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Production
85,754 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Production
86,108 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Production
85,461 UART: [state] DebugLocked = No
86,088 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Production
85,933 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Production
86,366 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Production
85,950 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Production
86,068 UART: Fake ROM in Prod lifecycle disabled
86,662 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Production
85,598 UART: Fake ROM in Prod lifecycle disabled
86,192 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Production
85,779 UART: Fake ROM in Prod lifecycle disabled
86,373 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Production
86,007 UART: Fake ROM in Prod lifecycle disabled
86,601 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Production
85,586 UART: Fake ROM in Prod lifecycle disabled
86,180 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Production
85,658 UART: Fake ROM in Prod lifecycle disabled
86,252 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Production
86,041 UART: Fake ROM in Prod lifecycle disabled
86,635 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Production
85,713 UART: Fake ROM in Prod lifecycle disabled
86,307 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Production
86,004 UART: Fake ROM in Prod lifecycle disabled
86,598 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Production
85,822 UART: Fake ROM in Prod lifecycle disabled
86,416 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Production
86,307 UART: Fake ROM in Prod lifecycle disabled
86,901 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Production
86,143 UART: Fake ROM in Prod lifecycle disabled
86,737 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [fake-rom-cold-reset] ++
88,804 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,954 UART: [fht] FHT @ 0x50003400
92,411 UART: [fwproc] Wait for Commands...
93,064 UART: [fwproc] Recv command 0x46574c44
93,792 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,692 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,184 >>> mbox cmd response: success
1,548,342 UART: [fake-rom-cold-reset] --
1,548,737 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,084 UART: [state] Locking Datavault
1,550,313 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,917 UART: [state] Locking ICCM
1,551,345 UART: [exit] Launching FMC @ 0x40000000
1,556,642 UART:
1,556,658 UART: Running Caliptra FMC ...
1,557,066 UART:
1,557,207 UART: [fmc] Received command: 0x46574C44
1,558,031 UART:
1,558,047 UART: Running Caliptra ROM ...
1,558,455 UART:
1,558,510 UART: [state] CFI Enabled
1,560,834 UART: [state] LifecycleState = Unprovisioned
1,561,493 UART: [state] DebugLocked = No
1,562,082 UART: [state] WD Timer not started. Device not locked for debugging
1,563,526 UART: [update-reset] ++
2,842,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,449 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,744 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,758 UART: [update-reset Success] --
3,000,167 >>> mbox cmd response: success
3,000,167 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,880 UART: [state] Locking Datavault
3,001,768 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,372 UART: [state] Locking ICCM
3,002,840 UART: [exit] Launching FMC @ 0x40000000
3,008,137 UART:
3,008,153 UART: Running Caliptra FMC ...
3,008,561 UART:
3,008,702 UART: [fmc] Received command: 0x1000000C
3,009,437 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [fake-rom-cold-reset] ++
88,490 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,722 UART: [fht] FHT @ 0x50003400
92,059 UART: [fwproc] Wait for Commands...
92,776 UART: [fwproc] Recv command 0x46574c44
93,504 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,974 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,348 >>> mbox cmd response: success
1,548,506 UART: [fake-rom-cold-reset] --
1,548,901 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,530 UART: [state] Locking Datavault
1,550,491 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,095 UART: [state] Locking ICCM
1,551,515 UART: [exit] Launching FMC @ 0x40000000
1,556,812 UART:
1,556,828 UART: Running Caliptra FMC ...
1,557,236 UART:
1,557,377 UART: [fmc] Received command: 0x46574C44
1,558,201 UART:
1,558,217 UART: Running Caliptra ROM ...
1,558,625 UART:
1,558,680 UART: [state] CFI Enabled
1,561,102 UART: [state] LifecycleState = Unprovisioned
1,561,761 UART: [state] DebugLocked = No
1,562,460 UART: [state] WD Timer not started. Device not locked for debugging
1,564,212 UART: [update-reset] ++
2,843,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,827 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,060 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,074 UART: [update-reset Success] --
3,001,483 >>> mbox cmd response: success
3,001,483 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,838 UART: [state] Locking Datavault
3,002,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,436 UART: [state] Locking ICCM
3,004,034 UART: [exit] Launching FMC @ 0x40000000
3,009,331 UART:
3,009,347 UART: Running Caliptra FMC ...
3,009,755 UART:
3,009,896 UART: [fmc] Received command: 0x1000000C
3,010,631 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [fake-rom-cold-reset] ++
89,157 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,413 UART: [fht] FHT @ 0x50003400
92,854 UART: [fwproc] Wait for Commands...
93,467 UART: [fwproc] Recv command 0x46574c44
94,195 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,309 >>> mbox cmd response: success
1,548,467 UART: [fake-rom-cold-reset] --
1,548,862 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,153 UART: [state] Locking Datavault
1,550,322 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,926 UART: [state] Locking ICCM
1,551,514 UART: [exit] Launching FMC @ 0x40000000
1,556,811 UART:
1,556,827 UART: Running Caliptra FMC ...
1,557,235 UART:
1,557,376 UART: [fmc] Received command: 0x46574C44
1,558,200 UART:
1,558,216 UART: Running Caliptra ROM ...
1,558,624 UART:
1,558,766 UART: [state] CFI Enabled
1,561,798 UART: [state] LifecycleState = Unprovisioned
1,562,457 UART: [state] DebugLocked = No
1,563,182 UART: [state] WD Timer not started. Device not locked for debugging
1,564,754 UART: [update-reset] ++
2,843,319 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,393 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,544 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,558 UART: [update-reset Success] --
3,000,967 >>> mbox cmd response: success
3,000,967 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,762 UART: [state] Locking Datavault
3,002,564 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,168 UART: [state] Locking ICCM
3,003,778 UART: [exit] Launching FMC @ 0x40000000
3,009,075 UART:
3,009,091 UART: Running Caliptra FMC ...
3,009,499 UART:
3,009,640 UART: [fmc] Received command: 0x1000000C
3,010,375 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [fake-rom-cold-reset] ++
88,811 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,981 UART: [fht] FHT @ 0x50003400
92,378 UART: [fwproc] Wait for Commands...
93,209 UART: [fwproc] Recv command 0x46574c44
93,937 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,971 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,393 >>> mbox cmd response: success
1,548,551 UART: [fake-rom-cold-reset] --
1,548,946 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,549 UART: [state] Locking Datavault
1,550,518 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,122 UART: [state] Locking ICCM
1,551,754 UART: [exit] Launching FMC @ 0x40000000
1,557,051 UART:
1,557,067 UART: Running Caliptra FMC ...
1,557,475 UART:
1,557,616 UART: [fmc] Received command: 0x46574C44
1,558,440 UART:
1,558,456 UART: Running Caliptra ROM ...
1,558,864 UART:
1,559,006 UART: [state] CFI Enabled
1,561,312 UART: [state] LifecycleState = Unprovisioned
1,561,971 UART: [state] DebugLocked = No
1,562,476 UART: [state] WD Timer not started. Device not locked for debugging
1,564,006 UART: [update-reset] ++
2,842,815 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,963 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,084 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,098 UART: [update-reset Success] --
3,000,507 >>> mbox cmd response: success
3,000,507 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,032 UART: [state] Locking Datavault
3,001,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,418 UART: [state] Locking ICCM
3,003,018 UART: [exit] Launching FMC @ 0x40000000
3,008,315 UART:
3,008,331 UART: Running Caliptra FMC ...
3,008,739 UART:
3,008,880 UART: [fmc] Received command: 0x1000000C
3,009,615 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,544 UART: [state] LifecycleState = Unprovisioned
85,203 UART: [state] DebugLocked = No
85,784 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [fake-rom-cold-reset] ++
88,168 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,440 UART: [fht] FHT @ 0x50003400
91,659 UART: [fwproc] Wait for Commands...
92,262 UART: [fwproc] Recv command 0x46574c44
92,990 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,772 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,150 >>> mbox cmd response: success
1,547,308 UART: [fake-rom-cold-reset] --
1,547,703 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,038 UART: [state] Locking Datavault
1,549,167 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,771 UART: [state] Locking ICCM
1,550,369 UART: [exit] Launching FMC @ 0x40000000
1,555,666 UART:
1,555,682 UART: Running Caliptra FMC ...
1,556,090 UART:
1,556,231 UART: [fmc] Received command: 0x46574C44
1,557,055 UART:
1,557,071 UART: Running Caliptra ROM ...
1,557,479 UART:
1,557,534 UART: [state] CFI Enabled
1,560,094 UART: [state] LifecycleState = Unprovisioned
1,560,753 UART: [state] DebugLocked = No
1,561,424 UART: [state] WD Timer not started. Device not locked for debugging
1,562,984 UART: [update-reset] ++
2,842,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,385 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,586 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,600 UART: [update-reset Success] --
3,000,009 >>> mbox cmd response: success
3,000,009 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,626 UART: [state] Locking Datavault
3,001,442 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,046 UART: [state] Locking ICCM
3,002,538 UART: [exit] Launching FMC @ 0x40000000
3,007,835 UART:
3,007,851 UART: Running Caliptra FMC ...
3,008,259 UART:
3,008,400 UART: [fmc] Received command: 0x1000000C
3,009,135 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,164 UART: [fake-rom-cold-reset] ++
89,092 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,322 UART: [fht] FHT @ 0x50003400
92,557 UART: [fwproc] Wait for Commands...
93,210 UART: [fwproc] Recv command 0x46574c44
93,938 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,107 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,573 >>> mbox cmd response: success
1,548,731 UART: [fake-rom-cold-reset] --
1,549,126 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,533 UART: [state] Locking Datavault
1,550,566 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,170 UART: [state] Locking ICCM
1,551,736 UART: [exit] Launching FMC @ 0x40000000
1,557,033 UART:
1,557,049 UART: Running Caliptra FMC ...
1,557,457 UART:
1,557,598 UART: [fmc] Received command: 0x46574C44
1,558,422 UART:
1,558,438 UART: Running Caliptra ROM ...
1,558,846 UART:
1,558,901 UART: [state] CFI Enabled
1,561,729 UART: [state] LifecycleState = Unprovisioned
1,562,388 UART: [state] DebugLocked = No
1,563,023 UART: [state] WD Timer not started. Device not locked for debugging
1,564,551 UART: [update-reset] ++
2,843,331 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,521 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,688 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,702 UART: [update-reset Success] --
3,001,111 >>> mbox cmd response: success
3,001,111 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,696 UART: [state] Locking Datavault
3,002,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,242 UART: [state] Locking ICCM
3,003,882 UART: [exit] Launching FMC @ 0x40000000
3,009,179 UART:
3,009,195 UART: Running Caliptra FMC ...
3,009,603 UART:
3,009,744 UART: [fmc] Received command: 0x1000000C
3,010,479 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,407 UART: [fake-rom-cold-reset] ++
89,335 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,587 UART: [fht] FHT @ 0x50003400
92,950 UART: [fwproc] Wait for Commands...
93,783 UART: [fwproc] Recv command 0x46574c44
94,511 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,687 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,119 >>> mbox cmd response: success
1,549,277 UART: [fake-rom-cold-reset] --
1,549,672 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,550,031 UART: [state] Locking Datavault
1,551,076 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,680 UART: [state] Locking ICCM
1,552,346 UART: [exit] Launching FMC @ 0x40000000
1,557,643 UART:
1,557,659 UART: Running Caliptra FMC ...
1,558,067 UART:
1,558,208 UART: [fmc] Received command: 0x46574C44
1,559,032 UART:
1,559,048 UART: Running Caliptra ROM ...
1,559,456 UART:
1,559,598 UART: [state] CFI Enabled
1,562,246 UART: [state] LifecycleState = Unprovisioned
1,562,905 UART: [state] DebugLocked = No
1,563,486 UART: [state] WD Timer not started. Device not locked for debugging
1,565,010 UART: [update-reset] ++
2,844,919 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,021 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,994,158 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,172 UART: [update-reset Success] --
3,002,581 >>> mbox cmd response: success
3,002,581 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,068 UART: [state] Locking Datavault
3,003,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,282 UART: [state] Locking ICCM
3,004,790 UART: [exit] Launching FMC @ 0x40000000
3,010,087 UART:
3,010,103 UART: Running Caliptra FMC ...
3,010,511 UART:
3,010,652 UART: [fmc] Received command: 0x1000000C
3,011,387 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,103 UART: [state] WD Timer not started. Device not locked for debugging
88,551 UART: [fake-rom-cold-reset] ++
89,479 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,607 UART: [fht] FHT @ 0x50003400
92,982 UART: [fwproc] Wait for Commands...
93,771 UART: [fwproc] Recv command 0x46574c44
94,499 UART: [fwproc] Recv'd Img size: 111916 bytes
1,360,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,345 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,747 >>> mbox cmd response: success
1,549,905 UART: [fake-rom-cold-reset] --
1,550,300 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,550,701 UART: [state] Locking Datavault
1,551,784 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,388 UART: [state] Locking ICCM
1,553,038 UART: [exit] Launching FMC @ 0x40000000
1,558,335 UART:
1,558,351 UART: Running Caliptra FMC ...
1,558,759 UART:
1,558,900 UART: [fmc] Received command: 0x46574C44
1,559,724 UART:
1,559,740 UART: Running Caliptra ROM ...
1,560,148 UART:
1,560,290 UART: [state] CFI Enabled
1,563,082 UART: [state] LifecycleState = Unprovisioned
1,563,741 UART: [state] DebugLocked = No
1,564,236 UART: [state] WD Timer not started. Device not locked for debugging
1,565,998 UART: [update-reset] ++
2,845,267 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,303 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,994,576 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,590 UART: [update-reset Success] --
3,002,999 >>> mbox cmd response: success
3,002,999 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,378 UART: [state] Locking Datavault
3,004,176 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,780 UART: [state] Locking ICCM
3,005,200 UART: [exit] Launching FMC @ 0x40000000
3,010,497 UART:
3,010,513 UART: Running Caliptra FMC ...
3,010,921 UART:
3,011,062 UART: [fmc] Received command: 0x1000000C
3,011,797 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [fake-rom-cold-reset] ++
88,740 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,066 UART: [fht] FHT @ 0x50003400
92,489 UART: [fwproc] Wait for Commands...
93,112 UART: [fwproc] Recv command 0x46574c44
93,840 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,094 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,528 >>> mbox cmd response: success
1,548,686 UART: [fake-rom-cold-reset] --
1,549,081 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,472 UART: [state] Locking Datavault
1,550,767 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,371 UART: [state] Locking ICCM
1,551,871 UART: [exit] Launching FMC @ 0x40000000
1,557,168 UART:
1,557,184 UART: Running Caliptra FMC ...
1,557,592 UART:
1,557,733 UART: [fmc] Received command: 0x46574C44
1,558,557 UART:
1,558,573 UART: Running Caliptra ROM ...
1,558,981 UART:
1,559,036 UART: [state] CFI Enabled
1,561,510 UART: [state] LifecycleState = Unprovisioned
1,562,169 UART: [state] DebugLocked = No
1,562,786 UART: [state] WD Timer not started. Device not locked for debugging
1,564,466 UART: [update-reset] ++
2,842,309 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,327 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,522 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,536 UART: [update-reset Success] --
2,999,945 >>> mbox cmd response: success
2,999,945 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,630 UART: [state] Locking Datavault
3,001,546 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,150 UART: [state] Locking ICCM
3,002,728 UART: [exit] Launching FMC @ 0x40000000
3,008,025 UART:
3,008,041 UART: Running Caliptra FMC ...
3,008,449 UART:
3,008,590 UART: [fmc] Received command: 0x1000000C
3,009,325 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,514 UART: [state] LifecycleState = Unprovisioned
85,173 UART: [state] DebugLocked = No
85,720 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [fake-rom-cold-reset] ++
88,250 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,572 UART: [fht] FHT @ 0x50003400
91,935 UART: [fwproc] Wait for Commands...
92,780 UART: [fwproc] Recv command 0x46574c44
93,508 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,554 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,018 >>> mbox cmd response: success
1,548,176 UART: [fake-rom-cold-reset] --
1,548,571 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,940 UART: [state] Locking Datavault
1,550,161 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,765 UART: [state] Locking ICCM
1,551,243 UART: [exit] Launching FMC @ 0x40000000
1,556,540 UART:
1,556,556 UART: Running Caliptra FMC ...
1,556,964 UART:
1,557,105 UART: [fmc] Received command: 0x46574C44
1,557,929 UART:
1,557,945 UART: Running Caliptra ROM ...
1,558,353 UART:
1,558,408 UART: [state] CFI Enabled
1,561,054 UART: [state] LifecycleState = Unprovisioned
1,561,713 UART: [state] DebugLocked = No
1,562,366 UART: [state] WD Timer not started. Device not locked for debugging
1,564,052 UART: [update-reset] ++
2,842,881 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,037 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,266 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,280 UART: [update-reset Success] --
3,000,689 >>> mbox cmd response: success
3,000,689 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,388 UART: [state] Locking Datavault
3,002,062 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,666 UART: [state] Locking ICCM
3,003,236 UART: [exit] Launching FMC @ 0x40000000
3,008,533 UART:
3,008,549 UART: Running Caliptra FMC ...
3,008,957 UART:
3,009,098 UART: [fmc] Received command: 0x1000000C
3,009,833 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,925 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [fake-rom-cold-reset] ++
89,237 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,367 UART: [fht] FHT @ 0x50003400
92,730 UART: [fwproc] Wait for Commands...
93,507 UART: [fwproc] Recv command 0x46574c44
94,235 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,771 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,203 >>> mbox cmd response: success
1,549,361 UART: [fake-rom-cold-reset] --
1,549,756 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,550,239 UART: [state] Locking Datavault
1,551,496 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,100 UART: [state] Locking ICCM
1,552,734 UART: [exit] Launching FMC @ 0x40000000
1,558,031 UART:
1,558,047 UART: Running Caliptra FMC ...
1,558,455 UART:
1,558,596 UART: [fmc] Received command: 0x46574C44
1,559,420 UART:
1,559,436 UART: Running Caliptra ROM ...
1,559,844 UART:
1,559,986 UART: [state] CFI Enabled
1,562,876 UART: [state] LifecycleState = Unprovisioned
1,563,535 UART: [state] DebugLocked = No
1,564,246 UART: [state] WD Timer not started. Device not locked for debugging
1,565,844 UART: [update-reset] ++
2,845,087 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,059 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,994,384 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,398 UART: [update-reset Success] --
3,002,807 >>> mbox cmd response: success
3,002,807 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,386 UART: [state] Locking Datavault
3,004,200 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,804 UART: [state] Locking ICCM
3,005,254 UART: [exit] Launching FMC @ 0x40000000
3,010,551 UART:
3,010,567 UART: Running Caliptra FMC ...
3,010,975 UART:
3,011,116 UART: [fmc] Received command: 0x1000000C
3,011,851 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [fake-rom-cold-reset] ++
88,865 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,169 UART: [fht] FHT @ 0x50003400
92,400 UART: [fwproc] Wait for Commands...
93,085 UART: [fwproc] Recv command 0x46574c44
93,813 UART: [fwproc] Recv'd Img size: 111916 bytes
1,357,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,757 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,545,181 >>> mbox cmd response: success
1,546,339 UART: [fake-rom-cold-reset] --
1,546,734 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,547,291 UART: [state] Locking Datavault
1,548,520 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,124 UART: [state] Locking ICCM
1,549,682 UART: [exit] Launching FMC @ 0x40000000
1,554,979 UART:
1,554,995 UART: Running Caliptra FMC ...
1,555,403 UART:
1,555,544 UART: [fmc] Received command: 0x46574C44
1,556,368 UART:
1,556,384 UART: Running Caliptra ROM ...
1,556,792 UART:
1,556,934 UART: [state] CFI Enabled
1,559,744 UART: [state] LifecycleState = Unprovisioned
1,560,403 UART: [state] DebugLocked = No
1,561,084 UART: [state] WD Timer not started. Device not locked for debugging
1,562,798 UART: [update-reset] ++
2,842,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,279 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,630 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,644 UART: [update-reset Success] --
3,000,053 >>> mbox cmd response: success
3,000,053 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,566 UART: [state] Locking Datavault
3,001,330 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,934 UART: [state] Locking ICCM
3,002,506 UART: [exit] Launching FMC @ 0x40000000
3,007,803 UART:
3,007,819 UART: Running Caliptra FMC ...
3,008,227 UART:
3,008,368 UART: [fmc] Received command: 0x1000000C
3,009,103 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,784 UART: [state] LifecycleState = Unprovisioned
86,443 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,470 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,350 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
87,047 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [fake-rom-cold-reset] ++
88,612 UART: [fht] FHT @ 0x50003400
91,917 UART: [fwproc] Wait for Commands...
92,562 UART: [fwproc] Recv command 0x46574c44
93,290 UART: [fwproc] Recv'd Img size: 111916 bytes
129,897 UART: ROM Fatal Error: 0x000B000C
131,066 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [fake-rom-cold-reset] ++
89,188 UART: [fht] FHT @ 0x50003400
92,501 UART: [fwproc] Wait for Commands...
93,212 UART: [fwproc] Recv command 0x46574c44
93,940 UART: [fwproc] Recv'd Img size: 111916 bytes
130,777 UART: ROM Fatal Error: 0x000B000C
131,946 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [fake-rom-cold-reset] ++
88,769 UART: [fht] FHT @ 0x50003400
92,210 UART: [fwproc] Wait for Commands...
92,995 UART: [fwproc] Recv command 0x46574c44
93,723 UART: [fwproc] Recv'd Img size: 111916 bytes
130,560 UART: ROM Fatal Error: 0x000B000C
131,729 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [fake-rom-cold-reset] ++
89,275 UART: [fht] FHT @ 0x50003400
92,540 UART: [fwproc] Wait for Commands...
93,155 UART: [fwproc] Recv command 0x46574c44
93,883 UART: [fwproc] Recv'd Img size: 111916 bytes
130,908 UART: ROM Fatal Error: 0x000B000C
132,077 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,762 UART: [state] LifecycleState = Unprovisioned
86,421 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,560 UART: [fake-rom-cold-reset] ++
89,704 UART: [fht] FHT @ 0x50003400
92,947 UART: [fwproc] Wait for Commands...
93,542 UART: [fwproc] Recv command 0x46574c44
94,270 UART: [fwproc] Recv'd Img size: 111916 bytes
131,525 UART: ROM Fatal Error: 0x000B000C
132,694 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [fake-rom-cold-reset] ++
89,174 UART: [fht] FHT @ 0x50003400
92,479 UART: [fwproc] Wait for Commands...
93,206 UART: [fwproc] Recv command 0x46574c44
93,934 UART: [fwproc] Recv'd Img size: 111916 bytes
131,477 UART: ROM Fatal Error: 0x000B000C
132,646 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [fake-rom-cold-reset] ++
89,421 UART: [fht] FHT @ 0x50003400
92,860 UART: [fwproc] Wait for Commands...
93,547 UART: [fwproc] Recv command 0x46574c44
94,275 UART: [fwproc] Recv'd Img size: 111916 bytes
131,328 UART: ROM Fatal Error: 0x000B000C
132,497 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [fake-rom-cold-reset] ++
89,249 UART: [fht] FHT @ 0x50003400
92,540 UART: [fwproc] Wait for Commands...
93,327 UART: [fwproc] Recv command 0x46574c44
94,055 UART: [fwproc] Recv'd Img size: 111916 bytes
131,156 UART: ROM Fatal Error: 0x000B000C
132,325 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [fake-rom-cold-reset] ++
88,856 UART: [fht] FHT @ 0x50003400
92,211 UART: [fwproc] Wait for Commands...
92,976 UART: [fwproc] Recv command 0x46574c44
93,704 UART: [fwproc] Recv'd Img size: 111916 bytes
131,031 UART: ROM Fatal Error: 0x000B000C
132,200 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [fake-rom-cold-reset] ++
89,182 UART: [fht] FHT @ 0x50003400
92,639 UART: [fwproc] Wait for Commands...
93,282 UART: [fwproc] Recv command 0x46574c44
94,010 UART: [fwproc] Recv'd Img size: 111916 bytes
131,471 UART: ROM Fatal Error: 0x000B000C
132,640 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [fake-rom-cold-reset] ++
88,913 UART: [fht] FHT @ 0x50003400
92,276 UART: [fwproc] Wait for Commands...
92,871 UART: [fwproc] Recv command 0x46574c44
93,599 UART: [fwproc] Recv'd Img size: 111916 bytes
131,434 UART: ROM Fatal Error: 0x000B000C
132,603 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [fake-rom-cold-reset] ++
88,759 UART: [fht] FHT @ 0x50003400
92,100 UART: [fwproc] Wait for Commands...
92,949 UART: [fwproc] Recv command 0x46574c44
93,677 UART: [fwproc] Recv'd Img size: 111916 bytes
130,188 UART: ROM Fatal Error: 0x000B000C
131,357 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,156 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,170 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
87,019 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,971 ready_for_fw is high
1,077,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,727 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,469 ready_for_fw is high
1,078,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,009 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,286 ready_for_fw is high
1,078,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,844 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,430 ready_for_fw is high
1,078,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,092 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,867 ready_for_fw is high
1,076,867 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,699 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,175 ready_for_fw is high
1,077,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,133 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,194 ready_for_fw is high
1,077,194 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,422 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,530 ready_for_fw is high
1,078,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,168 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,907 ready_for_fw is high
1,077,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,457 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,343 ready_for_fw is high
1,077,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,165 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,354 ready_for_fw is high
1,077,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,968 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,748 ready_for_fw is high
1,077,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,134 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,027 UART: [idev] Sha1 KeyId Algorithm
1,206,903 UART: [idev] --
1,208,148 UART: [ldev] ++
1,208,316 UART: [ldev] CDI.KEYID = 6
1,208,680 UART: [ldev] SUBJECT.KEYID = 5
1,209,107 UART: [ldev] AUTHORITY.KEYID = 7
1,209,570 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,504 UART: [fwproc] Wait for Commands...
1,281,257 UART: [fwproc] Recv command 0x46574c44
1,281,990 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,467 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,344 >>> mbox cmd response: success
2,675,455 UART: [afmc] ++
2,675,623 UART: [afmc] CDI.KEYID = 6
2,675,986 UART: [afmc] SUBJECT.KEYID = 7
2,676,412 UART: [afmc] AUTHORITY.KEYID = 5
2,711,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,941 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,661 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,554 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,247 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,256 UART: [afmc] --
2,755,192 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,214 UART: [cold-reset] --
2,756,350 UART: [state] Locking Datavault
2,757,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,169 UART: [state] Locking ICCM
2,758,641 UART: [exit] Launching FMC @ 0x40000000
2,763,938 UART:
2,763,954 UART: Running Caliptra FMC ...
2,764,362 UART:
2,764,500 UART: [fmc] Received command: 0x10000005
2,765,601 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,978 >>> mbox cmd response: success
2,579,090 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,185 UART:
2,585,201 UART: Running Caliptra FMC ...
2,585,609 UART:
2,585,747 UART: [fmc] Received command: 0x10000005
2,586,848 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,198 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,649 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,280 UART: [fwproc] Recv command 0x46574c44
1,283,013 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,856 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,755 >>> mbox cmd response: success
2,675,836 UART: [afmc] ++
2,676,004 UART: [afmc] CDI.KEYID = 6
2,676,367 UART: [afmc] SUBJECT.KEYID = 7
2,676,793 UART: [afmc] AUTHORITY.KEYID = 5
2,712,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,632 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,352 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,245 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,938 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,751 UART: [afmc] --
2,755,819 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,841 UART: [cold-reset] --
2,756,489 UART: [state] Locking Datavault
2,757,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,098 UART: [state] Locking ICCM
2,758,720 UART: [exit] Launching FMC @ 0x40000000
2,764,017 UART:
2,764,033 UART: Running Caliptra FMC ...
2,764,441 UART:
2,764,579 UART: [fmc] Received command: 0x10000005
2,765,680 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,079 >>> mbox cmd response: success
2,581,035 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,336 UART:
2,587,352 UART: Running Caliptra FMC ...
2,587,760 UART:
2,587,898 UART: [fmc] Received command: 0x10000005
2,588,999 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,512 UART: [ldev] ++
1,209,680 UART: [ldev] CDI.KEYID = 6
1,210,044 UART: [ldev] SUBJECT.KEYID = 5
1,210,471 UART: [ldev] AUTHORITY.KEYID = 7
1,210,934 UART: [ldev] FE.KEYID = 1
1,216,046 UART: [ldev] Erasing FE.KEYID = 1
1,242,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,913 UART: [fwproc] Recv command 0x46574c44
1,282,646 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,859 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,830 >>> mbox cmd response: success
2,675,849 UART: [afmc] ++
2,676,017 UART: [afmc] CDI.KEYID = 6
2,676,380 UART: [afmc] SUBJECT.KEYID = 7
2,676,806 UART: [afmc] AUTHORITY.KEYID = 5
2,712,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,625 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,345 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,238 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,931 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,732 UART: [afmc] --
2,755,628 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,650 UART: [cold-reset] --
2,756,536 UART: [state] Locking Datavault
2,757,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,203 UART: [state] Locking ICCM
2,758,661 UART: [exit] Launching FMC @ 0x40000000
2,763,958 UART:
2,763,974 UART: Running Caliptra FMC ...
2,764,382 UART:
2,764,520 UART: [fmc] Received command: 0x10000005
2,765,621 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,032 >>> mbox cmd response: success
2,578,884 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,003 UART:
2,585,019 UART: Running Caliptra FMC ...
2,585,427 UART:
2,585,565 UART: [fmc] Received command: 0x10000005
2,586,666 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,208,767 UART: [ldev] ++
1,208,935 UART: [ldev] CDI.KEYID = 6
1,209,299 UART: [ldev] SUBJECT.KEYID = 5
1,209,726 UART: [ldev] AUTHORITY.KEYID = 7
1,210,189 UART: [ldev] FE.KEYID = 1
1,215,267 UART: [ldev] Erasing FE.KEYID = 1
1,241,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,569 UART: [ldev] --
1,281,067 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,020 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,813 >>> mbox cmd response: success
2,675,878 UART: [afmc] ++
2,676,046 UART: [afmc] CDI.KEYID = 6
2,676,409 UART: [afmc] SUBJECT.KEYID = 7
2,676,835 UART: [afmc] AUTHORITY.KEYID = 5
2,712,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,140 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,860 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,753 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,446 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,345 UART: [afmc] --
2,755,295 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,317 UART: [cold-reset] --
2,756,367 UART: [state] Locking Datavault
2,757,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,004 UART: [state] Locking ICCM
2,758,516 UART: [exit] Launching FMC @ 0x40000000
2,763,813 UART:
2,763,829 UART: Running Caliptra FMC ...
2,764,237 UART:
2,764,375 UART: [fmc] Received command: 0x10000005
2,765,476 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,653 >>> mbox cmd response: success
2,579,799 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,076 UART:
2,586,092 UART: Running Caliptra FMC ...
2,586,500 UART:
2,586,638 UART: [fmc] Received command: 0x10000005
2,587,739 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,482 UART: [ldev] Erasing FE.KEYID = 1
1,242,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,704 UART: [fwproc] Wait for Commands...
1,282,371 UART: [fwproc] Recv command 0x46574c44
1,283,104 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,543 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,532 >>> mbox cmd response: success
2,676,737 UART: [afmc] ++
2,676,905 UART: [afmc] CDI.KEYID = 6
2,677,268 UART: [afmc] SUBJECT.KEYID = 7
2,677,694 UART: [afmc] AUTHORITY.KEYID = 5
2,713,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,933 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,653 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,546 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,239 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,910 UART: [afmc] --
2,756,952 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,974 UART: [cold-reset] --
2,757,844 UART: [state] Locking Datavault
2,759,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,897 UART: [state] Locking ICCM
2,760,329 UART: [exit] Launching FMC @ 0x40000000
2,765,626 UART:
2,765,642 UART: Running Caliptra FMC ...
2,766,050 UART:
2,766,188 UART: [fmc] Received command: 0x10000005
2,767,289 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,812 >>> mbox cmd response: success
2,581,274 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,043 UART:
2,587,059 UART: Running Caliptra FMC ...
2,587,467 UART:
2,587,605 UART: [fmc] Received command: 0x10000005
2,588,706 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
905,067 UART: [kat] SHA2-512-ACC
906,968 UART: [kat] ECC-384
917,009 UART: [kat] HMAC-384Kdf
921,693 UART: [kat] LMS
1,170,005 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,256 UART: [fht] FHT @ 0x50003400
1,173,896 UART: [idev] ++
1,174,064 UART: [idev] CDI.KEYID = 6
1,174,425 UART: [idev] SUBJECT.KEYID = 7
1,174,850 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,706 UART: [idev] Sha1 KeyId Algorithm
1,208,550 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,639 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,744 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,619 >>> mbox cmd response: success
2,676,736 UART: [afmc] ++
2,676,904 UART: [afmc] CDI.KEYID = 6
2,677,267 UART: [afmc] SUBJECT.KEYID = 7
2,677,693 UART: [afmc] AUTHORITY.KEYID = 5
2,713,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,802 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,522 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,415 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,108 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,897 UART: [afmc] --
2,756,845 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,867 UART: [cold-reset] --
2,757,581 UART: [state] Locking Datavault
2,758,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,310 UART: [state] Locking ICCM
2,759,930 UART: [exit] Launching FMC @ 0x40000000
2,765,227 UART:
2,765,243 UART: Running Caliptra FMC ...
2,765,651 UART:
2,765,789 UART: [fmc] Received command: 0x10000005
2,766,890 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,997 >>> mbox cmd response: success
2,581,759 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,884 UART:
2,587,900 UART: Running Caliptra FMC ...
2,588,308 UART:
2,588,446 UART: [fmc] Received command: 0x10000005
2,589,547 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,400 UART: [kat] HMAC-384Kdf
919,948 UART: [kat] LMS
1,168,260 UART: [kat] --
1,169,073 UART: [cold-reset] ++
1,169,421 UART: [fht] FHT @ 0x50003400
1,172,059 UART: [idev] ++
1,172,227 UART: [idev] CDI.KEYID = 6
1,172,588 UART: [idev] SUBJECT.KEYID = 7
1,173,013 UART: [idev] UDS.KEYID = 0
1,180,907 UART: [idev] Erasing UDS.KEYID = 0
1,197,563 UART: [idev] Sha1 KeyId Algorithm
1,206,453 UART: [idev] --
1,207,456 UART: [ldev] ++
1,207,624 UART: [ldev] CDI.KEYID = 6
1,207,988 UART: [ldev] SUBJECT.KEYID = 5
1,208,415 UART: [ldev] AUTHORITY.KEYID = 7
1,208,878 UART: [ldev] FE.KEYID = 1
1,214,142 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,678 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x46574c44
1,281,996 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,483 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,354 >>> mbox cmd response: success
2,675,417 UART: [afmc] ++
2,675,585 UART: [afmc] CDI.KEYID = 6
2,675,948 UART: [afmc] SUBJECT.KEYID = 7
2,676,374 UART: [afmc] AUTHORITY.KEYID = 5
2,711,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,661 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,381 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,274 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,967 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,880 UART: [afmc] --
2,754,904 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,926 UART: [cold-reset] --
2,755,746 UART: [state] Locking Datavault
2,756,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,537 UART: [state] Locking ICCM
2,757,967 UART: [exit] Launching FMC @ 0x40000000
2,763,264 UART:
2,763,280 UART: Running Caliptra FMC ...
2,763,688 UART:
2,763,826 UART: [fmc] Received command: 0x10000005
2,764,927 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,946 >>> mbox cmd response: success
2,580,496 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,481 UART:
2,586,497 UART: Running Caliptra FMC ...
2,586,905 UART:
2,587,043 UART: [fmc] Received command: 0x10000005
2,588,144 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,813 UART: [state] LifecycleState = Unprovisioned
85,468 UART: [state] DebugLocked = No
85,954 UART: [state] WD Timer not started. Device not locked for debugging
87,231 UART: [kat] SHA2-256
890,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,910 UART: [kat] ++
895,062 UART: [kat] sha1
899,356 UART: [kat] SHA2-256
901,296 UART: [kat] SHA2-384
904,019 UART: [kat] SHA2-512-ACC
905,920 UART: [kat] ECC-384
915,255 UART: [kat] HMAC-384Kdf
920,035 UART: [kat] LMS
1,168,347 UART: [kat] --
1,169,372 UART: [cold-reset] ++
1,169,716 UART: [fht] FHT @ 0x50003400
1,172,446 UART: [idev] ++
1,172,614 UART: [idev] CDI.KEYID = 6
1,172,975 UART: [idev] SUBJECT.KEYID = 7
1,173,400 UART: [idev] UDS.KEYID = 0
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,198,248 UART: [idev] Sha1 KeyId Algorithm
1,206,984 UART: [idev] --
1,207,903 UART: [ldev] ++
1,208,071 UART: [ldev] CDI.KEYID = 6
1,208,435 UART: [ldev] SUBJECT.KEYID = 5
1,208,862 UART: [ldev] AUTHORITY.KEYID = 7
1,209,325 UART: [ldev] FE.KEYID = 1
1,214,475 UART: [ldev] Erasing FE.KEYID = 1
1,241,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,233 UART: [ldev] --
1,280,619 UART: [fwproc] Wait for Commands...
1,281,214 UART: [fwproc] Recv command 0x46574c44
1,281,947 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,974 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,765 >>> mbox cmd response: success
2,675,790 UART: [afmc] ++
2,675,958 UART: [afmc] CDI.KEYID = 6
2,676,321 UART: [afmc] SUBJECT.KEYID = 7
2,676,747 UART: [afmc] AUTHORITY.KEYID = 5
2,712,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,878 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,598 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,491 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,184 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,885 UART: [afmc] --
2,755,865 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,887 UART: [cold-reset] --
2,756,657 UART: [state] Locking Datavault
2,757,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,478 UART: [state] Locking ICCM
2,758,940 UART: [exit] Launching FMC @ 0x40000000
2,764,237 UART:
2,764,253 UART: Running Caliptra FMC ...
2,764,661 UART:
2,764,799 UART: [fmc] Received command: 0x10000005
2,765,900 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,749 >>> mbox cmd response: success
2,581,549 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,548 UART:
2,587,564 UART: Running Caliptra FMC ...
2,587,972 UART:
2,588,110 UART: [fmc] Received command: 0x10000005
2,589,211 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
890,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,897 UART: [kat] ++
895,049 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,420 UART: [kat] HMAC-384Kdf
919,932 UART: [kat] LMS
1,168,244 UART: [kat] --
1,168,877 UART: [cold-reset] ++
1,169,401 UART: [fht] FHT @ 0x50003400
1,171,991 UART: [idev] ++
1,172,159 UART: [idev] CDI.KEYID = 6
1,172,520 UART: [idev] SUBJECT.KEYID = 7
1,172,945 UART: [idev] UDS.KEYID = 0
1,181,029 UART: [idev] Erasing UDS.KEYID = 0
1,197,943 UART: [idev] Sha1 KeyId Algorithm
1,206,943 UART: [idev] --
1,207,972 UART: [ldev] ++
1,208,140 UART: [ldev] CDI.KEYID = 6
1,208,504 UART: [ldev] SUBJECT.KEYID = 5
1,208,931 UART: [ldev] AUTHORITY.KEYID = 7
1,209,394 UART: [ldev] FE.KEYID = 1
1,214,608 UART: [ldev] Erasing FE.KEYID = 1
1,240,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,760 UART: [ldev] --
1,280,140 UART: [fwproc] Wait for Commands...
1,280,951 UART: [fwproc] Recv command 0x46574c44
1,281,684 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,005 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,958 >>> mbox cmd response: success
2,675,079 UART: [afmc] ++
2,675,247 UART: [afmc] CDI.KEYID = 6
2,675,610 UART: [afmc] SUBJECT.KEYID = 7
2,676,036 UART: [afmc] AUTHORITY.KEYID = 5
2,711,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,569 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,289 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,182 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,875 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,750 UART: [afmc] --
2,754,702 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,724 UART: [cold-reset] --
2,755,736 UART: [state] Locking Datavault
2,757,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,617 UART: [state] Locking ICCM
2,758,131 UART: [exit] Launching FMC @ 0x40000000
2,763,428 UART:
2,763,444 UART: Running Caliptra FMC ...
2,763,852 UART:
2,763,990 UART: [fmc] Received command: 0x10000005
2,765,091 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,260 >>> mbox cmd response: success
2,579,230 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,955 UART:
2,584,971 UART: Running Caliptra FMC ...
2,585,379 UART:
2,585,517 UART: [fmc] Received command: 0x10000005
2,586,618 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,399 UART: [kat] LMS
1,168,711 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,198,524 UART: [idev] Sha1 KeyId Algorithm
1,207,414 UART: [idev] --
1,208,531 UART: [ldev] ++
1,208,699 UART: [ldev] CDI.KEYID = 6
1,209,063 UART: [ldev] SUBJECT.KEYID = 5
1,209,490 UART: [ldev] AUTHORITY.KEYID = 7
1,209,953 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,241,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,763 UART: [ldev] --
1,281,151 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,434 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,339 >>> mbox cmd response: success
2,676,526 UART: [afmc] ++
2,676,694 UART: [afmc] CDI.KEYID = 6
2,677,057 UART: [afmc] SUBJECT.KEYID = 7
2,677,483 UART: [afmc] AUTHORITY.KEYID = 5
2,713,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,564 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,284 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,177 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,870 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,879 UART: [afmc] --
2,756,967 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,989 UART: [cold-reset] --
2,757,879 UART: [state] Locking Datavault
2,758,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,394 UART: [state] Locking ICCM
2,759,922 UART: [exit] Launching FMC @ 0x40000000
2,765,219 UART:
2,765,235 UART: Running Caliptra FMC ...
2,765,643 UART:
2,765,781 UART: [fmc] Received command: 0x10000005
2,766,882 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,799 >>> mbox cmd response: success
2,583,251 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,260 UART:
2,589,276 UART: Running Caliptra FMC ...
2,589,684 UART:
2,589,822 UART: [fmc] Received command: 0x10000005
2,590,923 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,199,263 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,958 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,281,881 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,623 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,610 >>> mbox cmd response: success
2,674,637 UART: [afmc] ++
2,674,805 UART: [afmc] CDI.KEYID = 6
2,675,168 UART: [afmc] SUBJECT.KEYID = 7
2,675,594 UART: [afmc] AUTHORITY.KEYID = 5
2,711,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,289 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,009 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,902 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,595 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,504 UART: [afmc] --
2,754,456 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,478 UART: [cold-reset] --
2,755,376 UART: [state] Locking Datavault
2,756,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,031 UART: [state] Locking ICCM
2,757,699 UART: [exit] Launching FMC @ 0x40000000
2,762,996 UART:
2,763,012 UART: Running Caliptra FMC ...
2,763,420 UART:
2,763,558 UART: [fmc] Received command: 0x10000005
2,764,659 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,754 >>> mbox cmd response: success
2,578,626 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,889 UART:
2,584,905 UART: Running Caliptra FMC ...
2,585,313 UART:
2,585,451 UART: [fmc] Received command: 0x10000005
2,586,552 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,230 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,761 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,380 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,283 >>> mbox cmd response: success
2,676,470 UART: [afmc] ++
2,676,638 UART: [afmc] CDI.KEYID = 6
2,677,001 UART: [afmc] SUBJECT.KEYID = 7
2,677,427 UART: [afmc] AUTHORITY.KEYID = 5
2,712,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,900 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,620 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,513 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,206 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,879 UART: [afmc] --
2,755,823 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,845 UART: [cold-reset] --
2,756,801 UART: [state] Locking Datavault
2,757,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,374 UART: [state] Locking ICCM
2,758,800 UART: [exit] Launching FMC @ 0x40000000
2,764,097 UART:
2,764,113 UART: Running Caliptra FMC ...
2,764,521 UART:
2,764,659 UART: [fmc] Received command: 0x10000005
2,765,760 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,317 >>> mbox cmd response: success
2,581,901 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,996 UART:
2,588,012 UART: Running Caliptra FMC ...
2,588,420 UART:
2,588,558 UART: [fmc] Received command: 0x10000005
2,589,659 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,895 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,240,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,956 UART: [ldev] --
1,280,470 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,899 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,722 >>> mbox cmd response: success
2,675,855 UART: [afmc] ++
2,676,023 UART: [afmc] CDI.KEYID = 6
2,676,386 UART: [afmc] SUBJECT.KEYID = 7
2,676,812 UART: [afmc] AUTHORITY.KEYID = 5
2,712,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,601 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,321 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,214 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,907 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,880 UART: [afmc] --
2,755,838 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,860 UART: [cold-reset] --
2,756,710 UART: [state] Locking Datavault
2,758,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,697 UART: [state] Locking ICCM
2,759,303 UART: [exit] Launching FMC @ 0x40000000
2,764,600 UART:
2,764,616 UART: Running Caliptra FMC ...
2,765,024 UART:
2,765,162 UART: [fmc] Received command: 0x10000003
2,774,638 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,176 >>> mbox cmd response: success
2,581,598 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,907 UART:
2,587,923 UART: Running Caliptra FMC ...
2,588,331 UART:
2,588,469 UART: [fmc] Received command: 0x10000003
2,597,945 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,909 UART: [kat] SHA2-512-ACC
906,810 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,660 UART: [cold-reset] ++
1,171,136 UART: [fht] FHT @ 0x50003400
1,173,800 UART: [idev] ++
1,173,968 UART: [idev] CDI.KEYID = 6
1,174,329 UART: [idev] SUBJECT.KEYID = 7
1,174,754 UART: [idev] UDS.KEYID = 0
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,314 UART: [idev] Sha1 KeyId Algorithm
1,209,360 UART: [idev] --
1,210,509 UART: [ldev] ++
1,210,677 UART: [ldev] CDI.KEYID = 6
1,211,041 UART: [ldev] SUBJECT.KEYID = 5
1,211,468 UART: [ldev] AUTHORITY.KEYID = 7
1,211,931 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,243,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,681 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,223 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,588 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,507 >>> mbox cmd response: success
2,677,526 UART: [afmc] ++
2,677,694 UART: [afmc] CDI.KEYID = 6
2,678,057 UART: [afmc] SUBJECT.KEYID = 7
2,678,483 UART: [afmc] AUTHORITY.KEYID = 5
2,713,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,928 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,648 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,541 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,234 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,065 UART: [afmc] --
2,757,109 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,131 UART: [cold-reset] --
2,758,211 UART: [state] Locking Datavault
2,759,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,774 UART: [state] Locking ICCM
2,760,374 UART: [exit] Launching FMC @ 0x40000000
2,765,671 UART:
2,765,687 UART: Running Caliptra FMC ...
2,766,095 UART:
2,766,233 UART: [fmc] Received command: 0x10000003
2,775,709 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,753 >>> mbox cmd response: success
2,580,479 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,294 UART:
2,586,310 UART: Running Caliptra FMC ...
2,586,718 UART:
2,586,856 UART: [fmc] Received command: 0x10000003
2,596,332 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,181,473 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,746 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,535 >>> mbox cmd response: success
2,674,686 UART: [afmc] ++
2,674,854 UART: [afmc] CDI.KEYID = 6
2,675,217 UART: [afmc] SUBJECT.KEYID = 7
2,675,643 UART: [afmc] AUTHORITY.KEYID = 5
2,710,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,056 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,776 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,669 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,362 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,163 UART: [afmc] --
2,754,185 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,207 UART: [cold-reset] --
2,755,019 UART: [state] Locking Datavault
2,756,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,736 UART: [state] Locking ICCM
2,757,288 UART: [exit] Launching FMC @ 0x40000000
2,762,585 UART:
2,762,601 UART: Running Caliptra FMC ...
2,763,009 UART:
2,763,147 UART: [fmc] Received command: 0x10000003
2,772,623 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,010 >>> mbox cmd response: success
2,580,494 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,573 UART:
2,586,589 UART: Running Caliptra FMC ...
2,586,997 UART:
2,587,135 UART: [fmc] Received command: 0x10000003
2,596,611 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,625 UART: [kat] HMAC-384Kdf
920,141 UART: [kat] LMS
1,168,453 UART: [kat] --
1,169,526 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,560 UART: [idev] ++
1,172,728 UART: [idev] CDI.KEYID = 6
1,173,089 UART: [idev] SUBJECT.KEYID = 7
1,173,514 UART: [idev] UDS.KEYID = 0
1,181,678 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,207,406 UART: [idev] --
1,208,345 UART: [ldev] ++
1,208,513 UART: [ldev] CDI.KEYID = 6
1,208,877 UART: [ldev] SUBJECT.KEYID = 5
1,209,304 UART: [ldev] AUTHORITY.KEYID = 7
1,209,767 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,481 UART: [ldev] --
1,280,829 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,132 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,147 >>> mbox cmd response: success
2,676,274 UART: [afmc] ++
2,676,442 UART: [afmc] CDI.KEYID = 6
2,676,805 UART: [afmc] SUBJECT.KEYID = 7
2,677,231 UART: [afmc] AUTHORITY.KEYID = 5
2,712,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,038 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,758 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,651 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,344 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,085 UART: [afmc] --
2,756,151 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,173 UART: [cold-reset] --
2,756,953 UART: [state] Locking Datavault
2,758,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,660 UART: [state] Locking ICCM
2,759,190 UART: [exit] Launching FMC @ 0x40000000
2,764,487 UART:
2,764,503 UART: Running Caliptra FMC ...
2,764,911 UART:
2,765,049 UART: [fmc] Received command: 0x10000003
2,774,525 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,833 >>> mbox cmd response: success
2,582,697 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,816 UART:
2,588,832 UART: Running Caliptra FMC ...
2,589,240 UART:
2,589,378 UART: [fmc] Received command: 0x10000003
2,598,854 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,695 UART: [fht] FHT @ 0x50003400
1,172,551 UART: [idev] ++
1,172,719 UART: [idev] CDI.KEYID = 6
1,173,080 UART: [idev] SUBJECT.KEYID = 7
1,173,505 UART: [idev] UDS.KEYID = 0
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,369 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,360 >>> mbox cmd response: success
2,675,601 UART: [afmc] ++
2,675,769 UART: [afmc] CDI.KEYID = 6
2,676,132 UART: [afmc] SUBJECT.KEYID = 7
2,676,558 UART: [afmc] AUTHORITY.KEYID = 5
2,711,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,287 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,007 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,900 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,593 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,376 UART: [afmc] --
2,755,472 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,494 UART: [cold-reset] --
2,756,064 UART: [state] Locking Datavault
2,757,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,079 UART: [state] Locking ICCM
2,758,711 UART: [exit] Launching FMC @ 0x40000000
2,764,008 UART:
2,764,024 UART: Running Caliptra FMC ...
2,764,432 UART:
2,764,570 UART: [fmc] Received command: 0x10000003
2,774,046 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,428 >>> mbox cmd response: success
2,578,678 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,584,619 UART:
2,584,635 UART: Running Caliptra FMC ...
2,585,043 UART:
2,585,181 UART: [fmc] Received command: 0x10000003
2,594,657 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,302 UART: [kat] SHA2-256
902,242 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,021 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,394 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,417 >>> mbox cmd response: success
2,675,598 UART: [afmc] ++
2,675,766 UART: [afmc] CDI.KEYID = 6
2,676,129 UART: [afmc] SUBJECT.KEYID = 7
2,676,555 UART: [afmc] AUTHORITY.KEYID = 5
2,712,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,414 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,134 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,027 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,720 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,565 UART: [afmc] --
2,755,471 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,493 UART: [cold-reset] --
2,756,211 UART: [state] Locking Datavault
2,757,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,176 UART: [state] Locking ICCM
2,758,652 UART: [exit] Launching FMC @ 0x40000000
2,763,949 UART:
2,763,965 UART: Running Caliptra FMC ...
2,764,373 UART:
2,764,511 UART: [fmc] Received command: 0x10000003
2,773,987 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,649 >>> mbox cmd response: success
2,583,917 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,590,024 UART:
2,590,040 UART: Running Caliptra FMC ...
2,590,448 UART:
2,590,586 UART: [fmc] Received command: 0x10000003
2,600,062 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,208,970 UART: [ldev] ++
1,209,138 UART: [ldev] CDI.KEYID = 6
1,209,502 UART: [ldev] SUBJECT.KEYID = 5
1,209,929 UART: [ldev] AUTHORITY.KEYID = 7
1,210,392 UART: [ldev] FE.KEYID = 1
1,215,794 UART: [ldev] Erasing FE.KEYID = 1
1,242,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,538 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: Invalid Img size: 131073 bytes
1,284,097 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,937 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,181,654 UART: [idev] Erasing UDS.KEYID = 0
1,198,390 UART: [idev] Sha1 KeyId Algorithm
1,207,394 UART: [idev] --
1,208,407 UART: [ldev] ++
1,208,575 UART: [ldev] CDI.KEYID = 6
1,208,939 UART: [ldev] SUBJECT.KEYID = 5
1,209,366 UART: [ldev] AUTHORITY.KEYID = 7
1,209,829 UART: [ldev] FE.KEYID = 1
1,214,883 UART: [ldev] Erasing FE.KEYID = 1
1,241,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,369 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,334 UART: [fwproc] Recv command 0x46574c44
1,282,068 UART: Invalid Img size: 131073 bytes
1,282,986 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,141 UART: [idev] Sha1 KeyId Algorithm
1,207,961 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,576 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,095 UART: Invalid Img size: 131073 bytes
1,284,251 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,430 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,181,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,958 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,127 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,616 UART: Invalid Img size: 131073 bytes
1,284,452 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,064 UART: [kat] LMS
1,169,376 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,757 UART: [idev] Sha1 KeyId Algorithm
1,208,697 UART: [idev] --
1,209,666 UART: [ldev] ++
1,209,834 UART: [ldev] CDI.KEYID = 6
1,210,198 UART: [ldev] SUBJECT.KEYID = 5
1,210,625 UART: [ldev] AUTHORITY.KEYID = 7
1,211,088 UART: [ldev] FE.KEYID = 1
1,216,456 UART: [ldev] Erasing FE.KEYID = 1
1,242,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,468 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,487 UART: [fwproc] Recv command 0x46574c44
1,283,221 UART: Invalid Img size: 131073 bytes
1,284,303 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [kat] SHA2-256
892,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,140 UART: [kat] ++
896,292 UART: [kat] sha1
900,560 UART: [kat] SHA2-256
902,500 UART: [kat] SHA2-384
905,311 UART: [kat] SHA2-512-ACC
907,212 UART: [kat] ECC-384
917,199 UART: [kat] HMAC-384Kdf
921,647 UART: [kat] LMS
1,169,959 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,368 UART: [fht] FHT @ 0x50003400
1,173,870 UART: [idev] ++
1,174,038 UART: [idev] CDI.KEYID = 6
1,174,399 UART: [idev] SUBJECT.KEYID = 7
1,174,824 UART: [idev] UDS.KEYID = 0
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: Invalid Img size: 131073 bytes
1,283,802 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,618 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,805 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,653 UART: [idev] Sha1 KeyId Algorithm
1,208,585 UART: [idev] --
1,209,674 UART: [ldev] ++
1,209,842 UART: [ldev] CDI.KEYID = 6
1,210,206 UART: [ldev] SUBJECT.KEYID = 5
1,210,633 UART: [ldev] AUTHORITY.KEYID = 7
1,211,096 UART: [ldev] FE.KEYID = 1
1,216,246 UART: [ldev] Erasing FE.KEYID = 1
1,242,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 106848 bytes
3,024,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,052,947 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,071,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,206,738 >>> mbox cmd response: success
3,207,991 UART: [afmc] ++
3,208,159 UART: [afmc] CDI.KEYID = 6
3,208,522 UART: [afmc] SUBJECT.KEYID = 7
3,208,948 UART: [afmc] AUTHORITY.KEYID = 5
3,243,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,260,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,261,387 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,267,064 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,272,957 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,278,667 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,286,385 UART: [afmc] --
3,287,465 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,287,487 UART: [cold-reset] --
3,288,447 UART: [state] Locking Datavault
3,289,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,289,990 UART: [state] Locking ICCM
3,290,420 UART: [exit] Launching FMC @ 0x40000000
3,295,717 UART:
3,295,733 UART: Running Caliptra FMC ...
3,296,141 UART:
3,296,279 UART: [fmc] Received command: 0x10000002
3,298,023 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,070,884 >>> mbox cmd response: success
3,126,294 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,132,521 UART:
3,132,537 UART: Running Caliptra FMC ...
3,132,945 UART:
3,133,083 UART: [fmc] Received command: 0x10000002
3,134,827 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,311 UART: [kat] LMS
1,168,623 UART: [kat] --
1,169,322 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,256 UART: [idev] ++
1,172,424 UART: [idev] CDI.KEYID = 6
1,172,785 UART: [idev] SUBJECT.KEYID = 7
1,173,210 UART: [idev] UDS.KEYID = 0
1,181,282 UART: [idev] Erasing UDS.KEYID = 0
1,198,050 UART: [idev] Sha1 KeyId Algorithm
1,206,874 UART: [idev] --
1,207,777 UART: [ldev] ++
1,207,945 UART: [ldev] CDI.KEYID = 6
1,208,309 UART: [ldev] SUBJECT.KEYID = 5
1,208,736 UART: [ldev] AUTHORITY.KEYID = 7
1,209,199 UART: [ldev] FE.KEYID = 1
1,214,595 UART: [ldev] Erasing FE.KEYID = 1
1,240,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,671 UART: [ldev] --
1,280,059 UART: [fwproc] Wait for Commands...
1,280,678 UART: [fwproc] Recv command 0x46574c44
1,281,411 UART: [fwproc] Recv'd Img size: 106848 bytes
3,029,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,056,600 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,074,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,210,495 >>> mbox cmd response: success
3,211,682 UART: [afmc] ++
3,211,850 UART: [afmc] CDI.KEYID = 6
3,212,213 UART: [afmc] SUBJECT.KEYID = 7
3,212,639 UART: [afmc] AUTHORITY.KEYID = 5
3,248,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,265,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,265,952 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,271,629 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,277,522 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,283,232 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,291,048 UART: [afmc] --
3,291,924 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,291,946 UART: [cold-reset] --
3,292,646 UART: [state] Locking Datavault
3,293,895 UART: [state] Locking PCR0, PCR1 and PCR31
3,294,499 UART: [state] Locking ICCM
3,295,037 UART: [exit] Launching FMC @ 0x40000000
3,300,334 UART:
3,300,350 UART: Running Caliptra FMC ...
3,300,758 UART:
3,300,896 UART: [fmc] Received command: 0x10000002
3,302,640 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,072,201 >>> mbox cmd response: success
3,128,965 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,135,032 UART:
3,135,048 UART: Running Caliptra FMC ...
3,135,456 UART:
3,135,594 UART: [fmc] Received command: 0x10000002
3,137,338 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,084 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 106848 bytes
3,038,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,067,106 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,085,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,220,951 >>> mbox cmd response: success
3,222,116 UART: [afmc] ++
3,222,284 UART: [afmc] CDI.KEYID = 6
3,222,647 UART: [afmc] SUBJECT.KEYID = 7
3,223,073 UART: [afmc] AUTHORITY.KEYID = 5
3,259,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,275,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,276,478 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,282,155 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,288,048 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,293,758 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,301,404 UART: [afmc] --
3,302,314 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,302,336 UART: [cold-reset] --
3,303,088 UART: [state] Locking Datavault
3,304,291 UART: [state] Locking PCR0, PCR1 and PCR31
3,304,895 UART: [state] Locking ICCM
3,305,535 UART: [exit] Launching FMC @ 0x40000000
3,310,832 UART:
3,310,848 UART: Running Caliptra FMC ...
3,311,256 UART:
3,311,394 UART: [fmc] Received command: 0x10000002
3,313,138 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,065,132 >>> mbox cmd response: success
3,120,700 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,126,605 UART:
3,126,621 UART: Running Caliptra FMC ...
3,127,029 UART:
3,127,167 UART: [fmc] Received command: 0x10000002
3,128,911 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,365 UART: [fwproc] Wait for Commands...
1,283,018 UART: [fwproc] Recv command 0x46574c44
1,283,751 UART: [fwproc] Recv'd Img size: 106848 bytes
3,041,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,069,962 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,088,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,223,817 >>> mbox cmd response: success
3,224,880 UART: [afmc] ++
3,225,048 UART: [afmc] CDI.KEYID = 6
3,225,411 UART: [afmc] SUBJECT.KEYID = 7
3,225,837 UART: [afmc] AUTHORITY.KEYID = 5
3,261,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,278,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,278,982 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,284,659 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,290,552 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,296,262 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,974 UART: [afmc] --
3,304,992 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,305,014 UART: [cold-reset] --
3,305,854 UART: [state] Locking Datavault
3,306,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,539 UART: [state] Locking ICCM
3,308,159 UART: [exit] Launching FMC @ 0x40000000
3,313,456 UART:
3,313,472 UART: Running Caliptra FMC ...
3,313,880 UART:
3,314,018 UART: [fmc] Received command: 0x10000002
3,315,762 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,070,855 >>> mbox cmd response: success
3,127,187 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,426 UART:
3,133,442 UART: Running Caliptra FMC ...
3,133,850 UART:
3,133,988 UART: [fmc] Received command: 0x10000002
3,135,732 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,495 UART: [idev] ++
1,172,663 UART: [idev] CDI.KEYID = 6
1,173,024 UART: [idev] SUBJECT.KEYID = 7
1,173,449 UART: [idev] UDS.KEYID = 0
1,181,229 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,862 UART: [ldev] ++
1,209,030 UART: [ldev] CDI.KEYID = 6
1,209,394 UART: [ldev] SUBJECT.KEYID = 5
1,209,821 UART: [ldev] AUTHORITY.KEYID = 7
1,210,284 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,200 UART: [fwproc] Wait for Commands...
1,281,837 UART: [fwproc] Recv command 0x46574c44
1,282,570 UART: [fwproc] Recv'd Img size: 106848 bytes
3,032,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,059,694 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,077,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,213,577 >>> mbox cmd response: success
3,214,790 UART: [afmc] ++
3,214,958 UART: [afmc] CDI.KEYID = 6
3,215,321 UART: [afmc] SUBJECT.KEYID = 7
3,215,747 UART: [afmc] AUTHORITY.KEYID = 5
3,251,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,268,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,269,036 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,274,713 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,280,606 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,286,316 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,294,178 UART: [afmc] --
3,295,038 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,295,060 UART: [cold-reset] --
3,295,880 UART: [state] Locking Datavault
3,296,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,297,567 UART: [state] Locking ICCM
3,298,173 UART: [exit] Launching FMC @ 0x40000000
3,303,470 UART:
3,303,486 UART: Running Caliptra FMC ...
3,303,894 UART:
3,304,032 UART: [fmc] Received command: 0x10000002
3,305,776 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,073,919 >>> mbox cmd response: success
3,130,805 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,136,634 UART:
3,136,650 UART: Running Caliptra FMC ...
3,137,058 UART:
3,137,196 UART: [fmc] Received command: 0x10000002
3,138,940 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 106848 bytes
3,026,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,054,688 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,072,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,208,543 >>> mbox cmd response: success
3,209,594 UART: [afmc] ++
3,209,762 UART: [afmc] CDI.KEYID = 6
3,210,125 UART: [afmc] SUBJECT.KEYID = 7
3,210,551 UART: [afmc] AUTHORITY.KEYID = 5
3,245,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,262,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,263,384 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,269,061 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,274,954 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,280,664 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,288,358 UART: [afmc] --
3,289,220 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,289,242 UART: [cold-reset] --
3,290,340 UART: [state] Locking Datavault
3,291,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,292,119 UART: [state] Locking ICCM
3,292,641 UART: [exit] Launching FMC @ 0x40000000
3,297,938 UART:
3,297,954 UART: Running Caliptra FMC ...
3,298,362 UART:
3,298,500 UART: [fmc] Received command: 0x10000002
3,300,244 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,061,847 >>> mbox cmd response: success
3,118,391 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,124,436 UART:
3,124,452 UART: Running Caliptra FMC ...
3,124,860 UART:
3,124,998 UART: [fmc] Received command: 0x10000002
3,126,742 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x46574c44
1,282,048 UART: [fwproc] Recv'd Img size: 111916 bytes
3,098,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,126,147 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,151,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,287,556 >>> mbox cmd response: success
3,288,765 UART: [afmc] ++
3,288,933 UART: [afmc] CDI.KEYID = 6
3,289,296 UART: [afmc] SUBJECT.KEYID = 7
3,289,722 UART: [afmc] AUTHORITY.KEYID = 5
3,324,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,024 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,347,718 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,353,618 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,359,327 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,366,965 UART: [afmc] --
3,367,871 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,367,893 UART: [cold-reset] --
3,368,495 UART: [state] Locking Datavault
3,369,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,260 UART: [state] Locking ICCM
3,370,804 UART: [exit] Launching FMC @ 0x40000000
3,376,101 UART:
3,376,117 UART: Running Caliptra FMC ...
3,376,525 UART:
3,376,755 UART: [fmc] Received command: 0x10000000
3,378,924 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,136,280 >>> mbox cmd response: success
3,192,745 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,198,772 UART:
3,198,788 UART: Running Caliptra FMC ...
3,199,196 UART:
3,199,426 UART: [fmc] Received command: 0x10000000
3,201,595 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,463 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 111916 bytes
3,093,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,555 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,282,128 >>> mbox cmd response: success
3,283,395 UART: [afmc] ++
3,283,563 UART: [afmc] CDI.KEYID = 6
3,283,926 UART: [afmc] SUBJECT.KEYID = 7
3,284,352 UART: [afmc] AUTHORITY.KEYID = 5
3,319,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,336,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,337,050 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,342,744 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,348,644 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,354,353 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,362,101 UART: [afmc] --
3,362,975 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,997 UART: [cold-reset] --
3,363,935 UART: [state] Locking Datavault
3,365,106 UART: [state] Locking PCR0, PCR1 and PCR31
3,365,710 UART: [state] Locking ICCM
3,366,250 UART: [exit] Launching FMC @ 0x40000000
3,371,547 UART:
3,371,563 UART: Running Caliptra FMC ...
3,371,971 UART:
3,372,201 UART: [fmc] Received command: 0x10000000
3,374,370 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,130,438 >>> mbox cmd response: success
3,186,985 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,152 UART:
3,193,168 UART: Running Caliptra FMC ...
3,193,576 UART:
3,193,806 UART: [fmc] Received command: 0x10000000
3,195,975 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,170,081 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,182,421 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,918 UART: [ldev] Erasing FE.KEYID = 1
1,242,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,094 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 111916 bytes
3,088,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,116,697 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,142,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,278,184 >>> mbox cmd response: success
3,279,293 UART: [afmc] ++
3,279,461 UART: [afmc] CDI.KEYID = 6
3,279,824 UART: [afmc] SUBJECT.KEYID = 7
3,280,250 UART: [afmc] AUTHORITY.KEYID = 5
3,315,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,331,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,332,540 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,338,234 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,344,134 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,349,843 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,357,611 UART: [afmc] --
3,358,589 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,358,611 UART: [cold-reset] --
3,359,519 UART: [state] Locking Datavault
3,360,274 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,878 UART: [state] Locking ICCM
3,361,520 UART: [exit] Launching FMC @ 0x40000000
3,366,817 UART:
3,366,833 UART: Running Caliptra FMC ...
3,367,241 UART:
3,367,471 UART: [fmc] Received command: 0x10000000
3,369,640 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,136,440 >>> mbox cmd response: success
3,193,047 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,076 UART:
3,199,092 UART: Running Caliptra FMC ...
3,199,500 UART:
3,199,730 UART: [fmc] Received command: 0x10000000
3,201,899 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,182,598 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,561 UART: [ldev] ++
1,209,729 UART: [ldev] CDI.KEYID = 6
1,210,093 UART: [ldev] SUBJECT.KEYID = 5
1,210,520 UART: [ldev] AUTHORITY.KEYID = 7
1,210,983 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,209 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,537 UART: [fwproc] Recv'd Img size: 111916 bytes
3,104,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,132,686 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,158,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,294,145 >>> mbox cmd response: success
3,295,364 UART: [afmc] ++
3,295,532 UART: [afmc] CDI.KEYID = 6
3,295,895 UART: [afmc] SUBJECT.KEYID = 7
3,296,321 UART: [afmc] AUTHORITY.KEYID = 5
3,331,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,348,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,349,191 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,354,885 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,360,785 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,366,494 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,374,390 UART: [afmc] --
3,375,446 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,375,468 UART: [cold-reset] --
3,376,262 UART: [state] Locking Datavault
3,377,653 UART: [state] Locking PCR0, PCR1 and PCR31
3,378,257 UART: [state] Locking ICCM
3,378,873 UART: [exit] Launching FMC @ 0x40000000
3,384,170 UART:
3,384,186 UART: Running Caliptra FMC ...
3,384,594 UART:
3,384,824 UART: [fmc] Received command: 0x10000000
3,386,993 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,140,079 >>> mbox cmd response: success
3,196,426 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,202,015 UART:
3,202,031 UART: Running Caliptra FMC ...
3,202,439 UART:
3,202,669 UART: [fmc] Received command: 0x10000000
3,204,838 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
85,987 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
903,924 UART: [kat] SHA2-512-ACC
905,825 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,179 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,207,623 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,678 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,699 UART: [fwproc] Recv command 0x46574c44
1,282,432 UART: [fwproc] Recv'd Img size: 111916 bytes
3,095,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,123,986 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,149,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,285,567 >>> mbox cmd response: success
3,286,582 UART: [afmc] ++
3,286,750 UART: [afmc] CDI.KEYID = 6
3,287,113 UART: [afmc] SUBJECT.KEYID = 7
3,287,539 UART: [afmc] AUTHORITY.KEYID = 5
3,322,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,339,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,340,257 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,345,951 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,351,851 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,357,560 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,365,416 UART: [afmc] --
3,366,288 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,366,310 UART: [cold-reset] --
3,367,188 UART: [state] Locking Datavault
3,368,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,143 UART: [state] Locking ICCM
3,369,811 UART: [exit] Launching FMC @ 0x40000000
3,375,108 UART:
3,375,124 UART: Running Caliptra FMC ...
3,375,532 UART:
3,375,762 UART: [fmc] Received command: 0x10000000
3,377,931 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,124,795 >>> mbox cmd response: success
3,180,764 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,186,799 UART:
3,186,815 UART: Running Caliptra FMC ...
3,187,223 UART:
3,187,453 UART: [fmc] Received command: 0x10000000
3,189,622 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 111916 bytes
3,081,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,108,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,134,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,270,028 >>> mbox cmd response: success
3,271,159 UART: [afmc] ++
3,271,327 UART: [afmc] CDI.KEYID = 6
3,271,690 UART: [afmc] SUBJECT.KEYID = 7
3,272,116 UART: [afmc] AUTHORITY.KEYID = 5
3,308,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,325,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,325,818 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,331,512 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,337,412 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,343,121 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,350,999 UART: [afmc] --
3,352,007 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,352,029 UART: [cold-reset] --
3,352,973 UART: [state] Locking Datavault
3,354,062 UART: [state] Locking PCR0, PCR1 and PCR31
3,354,666 UART: [state] Locking ICCM
3,355,166 UART: [exit] Launching FMC @ 0x40000000
3,360,463 UART:
3,360,479 UART: Running Caliptra FMC ...
3,360,887 UART:
3,361,117 UART: [fmc] Received command: 0x10000000
3,363,286 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,140,882 >>> mbox cmd response: success
3,197,147 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,203,270 UART:
3,203,286 UART: Running Caliptra FMC ...
3,203,694 UART:
3,203,924 UART: [fmc] Received command: 0x10000000
3,206,093 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,673 UART: [fht] FHT @ 0x50003400
1,172,237 UART: [idev] ++
1,172,405 UART: [idev] CDI.KEYID = 6
1,172,766 UART: [idev] SUBJECT.KEYID = 7
1,173,191 UART: [idev] UDS.KEYID = 0
1,181,045 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,494 UART: [ldev] ++
1,208,662 UART: [ldev] CDI.KEYID = 6
1,209,026 UART: [ldev] SUBJECT.KEYID = 5
1,209,453 UART: [ldev] AUTHORITY.KEYID = 7
1,209,916 UART: [ldev] FE.KEYID = 1
1,215,434 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,654 UART: [ldev] --
1,280,018 UART: [fwproc] Wait for Commands...
1,280,797 UART: [fwproc] Recv command 0x46574c44
1,281,530 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,219 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,808 >>> mbox cmd response: success
2,739,851 UART: [afmc] ++
2,740,019 UART: [afmc] CDI.KEYID = 6
2,740,382 UART: [afmc] SUBJECT.KEYID = 7
2,740,808 UART: [afmc] AUTHORITY.KEYID = 5
2,776,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,695 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,415 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,307 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,001 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,818,890 UART: [afmc] --
2,819,872 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,894 UART: [cold-reset] --
2,820,886 UART: [state] Locking Datavault
2,822,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,947 UART: [state] Locking ICCM
2,823,367 UART: [exit] Launching FMC @ 0x40000000
2,828,664 UART:
2,828,680 UART: Running Caliptra FMC ...
2,829,088 UART:
2,829,318 UART: [fmc] Received command: 0x10000000
2,831,487 >>> mbox cmd response data (224 bytes)
2,831,488 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,517 UART: [fmc] Received command: 0x10000006
2,849,534 >>> mbox cmd response data (1536 bytes)
2,849,535 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,849,563 UART: [fmc] Received command: 0x46574C44
2,850,389 UART:
2,850,405 UART: Running Caliptra ROM ...
2,850,813 UART:
2,850,868 UART: [state] CFI Enabled
2,853,292 UART: [state] LifecycleState = Unprovisioned
2,853,947 UART: [state] DebugLocked = No
2,854,575 UART: [state] WD Timer not started. Device not locked for debugging
2,855,819 UART: [kat] SHA2-256
3,659,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,498 UART: [kat] ++
3,663,650 UART: [kat] sha1
3,667,906 UART: [kat] SHA2-256
3,669,846 UART: [kat] SHA2-384
3,672,451 UART: [kat] SHA2-512-ACC
3,674,351 UART: [kat] ECC-384
3,684,148 UART: [kat] HMAC-384Kdf
3,688,722 UART: [kat] LMS
3,937,034 UART: [kat] --
3,937,970 UART: [update-reset] ++
5,222,698 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,821 >>> mbox cmd response: success
5,371,972 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,986 UART: [update-reset Success] --
5,380,395 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,921 UART: [state] Locking Datavault
5,381,737 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,341 UART: [state] Locking ICCM
5,382,867 UART: [exit] Launching FMC @ 0x40000000
5,388,164 UART:
5,388,180 UART: Running Caliptra FMC ...
5,388,588 UART:
5,388,810 UART: [fmc] Received command: 0x10000000
5,390,979 >>> mbox cmd response data (224 bytes)
5,390,980 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,391,009 UART: [fmc] Received command: 0x10000006
5,409,026 >>> mbox cmd response data (1536 bytes)
5,409,027 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,409,055 UART: [fmc] Received command: 0x10000007
5,409,847 >>> mbox cmd response data (4 bytes)
5,409,848 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,876 UART: [fmc] Received command: 0x10000006
5,427,893 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,948 >>> mbox cmd response: success
2,644,880 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,055 UART:
2,651,071 UART: Running Caliptra FMC ...
2,651,479 UART:
2,651,709 UART: [fmc] Received command: 0x10000000
2,653,878 >>> mbox cmd response data (224 bytes)
2,653,879 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,653,908 UART: [fmc] Received command: 0x10000006
2,671,925 >>> mbox cmd response data (1536 bytes)
2,671,926 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,671,954 UART: [fmc] Received command: 0x46574C44
5,074,163 >>> mbox cmd response: success
5,081,713 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,087,831 UART:
5,087,847 UART: Running Caliptra FMC ...
5,088,255 UART:
5,088,477 UART: [fmc] Received command: 0x10000000
5,090,646 >>> mbox cmd response data (224 bytes)
5,090,647 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,090,676 UART: [fmc] Received command: 0x10000006
5,108,693 >>> mbox cmd response data (1536 bytes)
5,108,694 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,108,722 UART: [fmc] Received command: 0x10000007
5,109,514 >>> mbox cmd response data (4 bytes)
5,109,515 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,109,543 UART: [fmc] Received command: 0x10000006
5,127,560 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,700 UART: [idev] --
1,208,677 UART: [ldev] ++
1,208,845 UART: [ldev] CDI.KEYID = 6
1,209,209 UART: [ldev] SUBJECT.KEYID = 5
1,209,636 UART: [ldev] AUTHORITY.KEYID = 7
1,210,099 UART: [ldev] FE.KEYID = 1
1,215,347 UART: [ldev] Erasing FE.KEYID = 1
1,241,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,063 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,184 UART: [fwproc] Recv command 0x46574c44
1,281,917 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,280 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,757 >>> mbox cmd response: success
2,739,946 UART: [afmc] ++
2,740,114 UART: [afmc] CDI.KEYID = 6
2,740,477 UART: [afmc] SUBJECT.KEYID = 7
2,740,903 UART: [afmc] AUTHORITY.KEYID = 5
2,776,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,094 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,814 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,706 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,400 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,223 UART: [afmc] --
2,820,199 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,221 UART: [cold-reset] --
2,820,881 UART: [state] Locking Datavault
2,821,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,578 UART: [state] Locking ICCM
2,823,072 UART: [exit] Launching FMC @ 0x40000000
2,828,369 UART:
2,828,385 UART: Running Caliptra FMC ...
2,828,793 UART:
2,829,023 UART: [fmc] Received command: 0x10000000
2,831,192 >>> mbox cmd response data (224 bytes)
2,831,193 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,222 UART: [fmc] Received command: 0x10000006
2,849,239 >>> mbox cmd response data (1536 bytes)
2,849,240 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,849,268 UART: [fmc] Received command: 0x46574C44
2,850,094 UART:
2,850,110 UART: Running Caliptra ROM ...
2,850,518 UART:
2,850,660 UART: [state] CFI Enabled
2,853,510 UART: [state] LifecycleState = Unprovisioned
2,854,165 UART: [state] DebugLocked = No
2,854,799 UART: [state] WD Timer not started. Device not locked for debugging
2,856,009 UART: [kat] SHA2-256
3,659,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,688 UART: [kat] ++
3,663,840 UART: [kat] sha1
3,667,962 UART: [kat] SHA2-256
3,669,902 UART: [kat] SHA2-384
3,672,651 UART: [kat] SHA2-512-ACC
3,674,551 UART: [kat] ECC-384
3,684,196 UART: [kat] HMAC-384Kdf
3,688,882 UART: [kat] LMS
3,937,194 UART: [kat] --
3,937,808 UART: [update-reset] ++
5,222,220 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,367 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,379 >>> mbox cmd response: success
5,371,498 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,512 UART: [update-reset Success] --
5,379,921 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,521 UART: [state] Locking Datavault
5,381,367 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,971 UART: [state] Locking ICCM
5,382,587 UART: [exit] Launching FMC @ 0x40000000
5,387,884 UART:
5,387,900 UART: Running Caliptra FMC ...
5,388,308 UART:
5,388,530 UART: [fmc] Received command: 0x10000000
5,390,699 >>> mbox cmd response data (224 bytes)
5,390,700 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,390,729 UART: [fmc] Received command: 0x10000006
5,408,746 >>> mbox cmd response data (1536 bytes)
5,408,747 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,408,775 UART: [fmc] Received command: 0x10000007
5,409,567 >>> mbox cmd response data (4 bytes)
5,409,568 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,596 UART: [fmc] Received command: 0x10000006
5,427,613 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,461 >>> mbox cmd response: success
2,644,581 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,870 UART:
2,650,886 UART: Running Caliptra FMC ...
2,651,294 UART:
2,651,524 UART: [fmc] Received command: 0x10000000
2,653,693 >>> mbox cmd response data (224 bytes)
2,653,694 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,653,723 UART: [fmc] Received command: 0x10000006
2,671,740 >>> mbox cmd response data (1536 bytes)
2,671,741 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,671,769 UART: [fmc] Received command: 0x46574C44
5,075,951 >>> mbox cmd response: success
5,083,629 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,449 UART:
5,089,465 UART: Running Caliptra FMC ...
5,089,873 UART:
5,090,095 UART: [fmc] Received command: 0x10000000
5,092,264 >>> mbox cmd response data (224 bytes)
5,092,265 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,294 UART: [fmc] Received command: 0x10000006
5,110,311 >>> mbox cmd response data (1536 bytes)
5,110,312 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,340 UART: [fmc] Received command: 0x10000007
5,111,132 >>> mbox cmd response data (4 bytes)
5,111,133 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,161 UART: [fmc] Received command: 0x10000006
5,129,178 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
903,834 UART: [kat] SHA2-512-ACC
905,735 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,048 UART: [kat] LMS
1,168,360 UART: [kat] --
1,169,083 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,977 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,396 >>> mbox cmd response: success
2,742,437 UART: [afmc] ++
2,742,605 UART: [afmc] CDI.KEYID = 6
2,742,968 UART: [afmc] SUBJECT.KEYID = 7
2,743,394 UART: [afmc] AUTHORITY.KEYID = 5
2,779,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,283 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,003 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,895 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,589 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,398 UART: [afmc] --
2,822,418 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,440 UART: [cold-reset] --
2,823,222 UART: [state] Locking Datavault
2,824,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,029 UART: [state] Locking ICCM
2,825,635 UART: [exit] Launching FMC @ 0x40000000
2,830,932 UART:
2,830,948 UART: Running Caliptra FMC ...
2,831,356 UART:
2,831,586 UART: [fmc] Received command: 0x10000000
2,833,755 >>> mbox cmd response data (224 bytes)
2,833,756 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,785 UART: [fmc] Received command: 0x10000006
2,851,802 >>> mbox cmd response data (1536 bytes)
2,851,803 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,851,831 UART: [fmc] Received command: 0x46574C44
2,852,657 UART:
2,852,673 UART: Running Caliptra ROM ...
2,853,081 UART:
2,853,136 UART: [state] CFI Enabled
2,855,522 UART: [state] LifecycleState = Unprovisioned
2,856,177 UART: [state] DebugLocked = No
2,856,817 UART: [state] WD Timer not started. Device not locked for debugging
2,858,011 UART: [kat] SHA2-256
3,661,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,690 UART: [kat] ++
3,665,842 UART: [kat] sha1
3,670,152 UART: [kat] SHA2-256
3,672,092 UART: [kat] SHA2-384
3,674,871 UART: [kat] SHA2-512-ACC
3,676,771 UART: [kat] ECC-384
3,686,534 UART: [kat] HMAC-384Kdf
3,691,066 UART: [kat] LMS
3,939,378 UART: [kat] --
3,940,364 UART: [update-reset] ++
5,225,436 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,623 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,635 >>> mbox cmd response: success
5,374,910 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,924 UART: [update-reset Success] --
5,383,333 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,384,019 UART: [state] Locking Datavault
5,384,919 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,523 UART: [state] Locking ICCM
5,385,991 UART: [exit] Launching FMC @ 0x40000000
5,391,288 UART:
5,391,304 UART: Running Caliptra FMC ...
5,391,712 UART:
5,391,934 UART: [fmc] Received command: 0x10000000
5,394,103 >>> mbox cmd response data (224 bytes)
5,394,104 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,394,133 UART: [fmc] Received command: 0x10000006
5,412,150 >>> mbox cmd response data (1536 bytes)
5,412,151 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,412,179 UART: [fmc] Received command: 0x10000007
5,412,971 >>> mbox cmd response data (4 bytes)
5,412,972 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,413,000 UART: [fmc] Received command: 0x10000006
5,431,017 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,778 >>> mbox cmd response: success
2,646,266 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,111 UART:
2,652,127 UART: Running Caliptra FMC ...
2,652,535 UART:
2,652,765 UART: [fmc] Received command: 0x10000000
2,654,934 >>> mbox cmd response data (224 bytes)
2,654,935 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,964 UART: [fmc] Received command: 0x10000006
2,672,981 >>> mbox cmd response data (1536 bytes)
2,672,982 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,673,010 UART: [fmc] Received command: 0x46574C44
5,075,283 >>> mbox cmd response: success
5,082,887 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,709 UART:
5,088,725 UART: Running Caliptra FMC ...
5,089,133 UART:
5,089,355 UART: [fmc] Received command: 0x10000000
5,091,524 >>> mbox cmd response data (224 bytes)
5,091,525 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,091,554 UART: [fmc] Received command: 0x10000006
5,109,571 >>> mbox cmd response data (1536 bytes)
5,109,572 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,109,600 UART: [fmc] Received command: 0x10000007
5,110,392 >>> mbox cmd response data (4 bytes)
5,110,393 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,421 UART: [fmc] Received command: 0x10000006
5,128,438 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,442 UART: [idev] --
1,208,347 UART: [ldev] ++
1,208,515 UART: [ldev] CDI.KEYID = 6
1,208,879 UART: [ldev] SUBJECT.KEYID = 5
1,209,306 UART: [ldev] AUTHORITY.KEYID = 7
1,209,769 UART: [ldev] FE.KEYID = 1
1,214,749 UART: [ldev] Erasing FE.KEYID = 1
1,241,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,507 UART: [ldev] --
1,280,847 UART: [fwproc] Wait for Commands...
1,281,638 UART: [fwproc] Recv command 0x46574c44
1,282,371 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,968 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,553 >>> mbox cmd response: success
2,741,700 UART: [afmc] ++
2,741,868 UART: [afmc] CDI.KEYID = 6
2,742,231 UART: [afmc] SUBJECT.KEYID = 7
2,742,657 UART: [afmc] AUTHORITY.KEYID = 5
2,778,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,886 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,801,606 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,498 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,192 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,075 UART: [afmc] --
2,822,177 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,199 UART: [cold-reset] --
2,823,039 UART: [state] Locking Datavault
2,824,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,680 UART: [state] Locking ICCM
2,825,348 UART: [exit] Launching FMC @ 0x40000000
2,830,645 UART:
2,830,661 UART: Running Caliptra FMC ...
2,831,069 UART:
2,831,299 UART: [fmc] Received command: 0x10000000
2,833,468 >>> mbox cmd response data (224 bytes)
2,833,469 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,498 UART: [fmc] Received command: 0x10000006
2,851,515 >>> mbox cmd response data (1536 bytes)
2,851,516 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,851,544 UART: [fmc] Received command: 0x46574C44
2,852,370 UART:
2,852,386 UART: Running Caliptra ROM ...
2,852,794 UART:
2,852,936 UART: [state] CFI Enabled
2,855,840 UART: [state] LifecycleState = Unprovisioned
2,856,495 UART: [state] DebugLocked = No
2,857,089 UART: [state] WD Timer not started. Device not locked for debugging
2,858,221 UART: [kat] SHA2-256
3,661,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,900 UART: [kat] ++
3,666,052 UART: [kat] sha1
3,670,204 UART: [kat] SHA2-256
3,672,144 UART: [kat] SHA2-384
3,674,973 UART: [kat] SHA2-512-ACC
3,676,873 UART: [kat] ECC-384
3,686,702 UART: [kat] HMAC-384Kdf
3,691,520 UART: [kat] LMS
3,939,832 UART: [kat] --
3,940,620 UART: [update-reset] ++
5,224,516 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,225,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,373,499 >>> mbox cmd response: success
5,373,692 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,706 UART: [update-reset Success] --
5,382,115 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,382,603 UART: [state] Locking Datavault
5,383,463 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,067 UART: [state] Locking ICCM
5,384,565 UART: [exit] Launching FMC @ 0x40000000
5,389,862 UART:
5,389,878 UART: Running Caliptra FMC ...
5,390,286 UART:
5,390,508 UART: [fmc] Received command: 0x10000000
5,392,677 >>> mbox cmd response data (224 bytes)
5,392,678 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,392,707 UART: [fmc] Received command: 0x10000006
5,410,724 >>> mbox cmd response data (1536 bytes)
5,410,725 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,410,753 UART: [fmc] Received command: 0x10000007
5,411,545 >>> mbox cmd response data (4 bytes)
5,411,546 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,411,574 UART: [fmc] Received command: 0x10000006
5,429,591 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,093 >>> mbox cmd response: success
2,646,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,026 UART:
2,653,042 UART: Running Caliptra FMC ...
2,653,450 UART:
2,653,680 UART: [fmc] Received command: 0x10000000
2,655,849 >>> mbox cmd response data (224 bytes)
2,655,850 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,879 UART: [fmc] Received command: 0x10000006
2,673,896 >>> mbox cmd response data (1536 bytes)
2,673,897 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,673,925 UART: [fmc] Received command: 0x46574C44
5,075,903 >>> mbox cmd response: success
5,083,551 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,347 UART:
5,089,363 UART: Running Caliptra FMC ...
5,089,771 UART:
5,089,993 UART: [fmc] Received command: 0x10000000
5,092,162 >>> mbox cmd response data (224 bytes)
5,092,163 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,192 UART: [fmc] Received command: 0x10000006
5,110,209 >>> mbox cmd response data (1536 bytes)
5,110,210 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,238 UART: [fmc] Received command: 0x10000007
5,111,030 >>> mbox cmd response data (4 bytes)
5,111,031 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,059 UART: [fmc] Received command: 0x10000006
5,129,076 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,170,081 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,564 UART: [ldev] --
1,281,080 UART: [fwproc] Wait for Commands...
1,281,735 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,785 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,294 >>> mbox cmd response: success
2,740,353 UART: [afmc] ++
2,740,521 UART: [afmc] CDI.KEYID = 6
2,740,884 UART: [afmc] SUBJECT.KEYID = 7
2,741,310 UART: [afmc] AUTHORITY.KEYID = 5
2,776,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,307 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,027 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,919 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,613 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,346 UART: [afmc] --
2,820,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,306 UART: [cold-reset] --
2,821,042 UART: [state] Locking Datavault
2,822,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,949 UART: [state] Locking ICCM
2,823,573 UART: [exit] Launching FMC @ 0x40000000
2,828,870 UART:
2,828,886 UART: Running Caliptra FMC ...
2,829,294 UART:
2,829,524 UART: [fmc] Received command: 0x10000000
2,831,693 >>> mbox cmd response data (224 bytes)
2,831,694 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,723 UART: [fmc] Received command: 0x10000006
2,849,740 >>> mbox cmd response data (1536 bytes)
2,849,741 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,849,769 UART: [fmc] Received command: 0x46574C44
2,850,595 UART:
2,850,611 UART: Running Caliptra ROM ...
2,851,019 UART:
2,851,074 UART: [state] CFI Enabled
2,853,712 UART: [state] LifecycleState = Unprovisioned
2,854,367 UART: [state] DebugLocked = No
2,854,943 UART: [state] WD Timer not started. Device not locked for debugging
2,856,119 UART: [kat] SHA2-256
3,659,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,798 UART: [kat] ++
3,663,950 UART: [kat] sha1
3,668,224 UART: [kat] SHA2-256
3,670,164 UART: [kat] SHA2-384
3,672,677 UART: [kat] SHA2-512-ACC
3,674,577 UART: [kat] ECC-384
3,684,142 UART: [kat] HMAC-384Kdf
3,688,658 UART: [kat] LMS
3,936,970 UART: [kat] --
3,937,996 UART: [update-reset] ++
5,221,114 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,222,107 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,370,119 >>> mbox cmd response: success
5,370,426 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,440 UART: [update-reset Success] --
5,378,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,379,275 UART: [state] Locking Datavault
5,379,937 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,541 UART: [state] Locking ICCM
5,381,189 UART: [exit] Launching FMC @ 0x40000000
5,386,486 UART:
5,386,502 UART: Running Caliptra FMC ...
5,386,910 UART:
5,387,132 UART: [fmc] Received command: 0x10000000
5,389,301 >>> mbox cmd response data (224 bytes)
5,389,302 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,389,331 UART: [fmc] Received command: 0x10000006
5,407,348 >>> mbox cmd response data (1536 bytes)
5,407,349 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,407,377 UART: [fmc] Received command: 0x10000007
5,408,169 >>> mbox cmd response data (4 bytes)
5,408,170 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,408,198 UART: [fmc] Received command: 0x10000006
5,426,215 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,822 >>> mbox cmd response: success
2,644,852 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,689 UART:
2,650,705 UART: Running Caliptra FMC ...
2,651,113 UART:
2,651,343 UART: [fmc] Received command: 0x10000000
2,653,512 >>> mbox cmd response data (224 bytes)
2,653,513 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,653,542 UART: [fmc] Received command: 0x10000006
2,671,559 >>> mbox cmd response data (1536 bytes)
2,671,560 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,671,588 UART: [fmc] Received command: 0x46574C44
5,074,613 >>> mbox cmd response: success
5,082,239 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,075 UART:
5,088,091 UART: Running Caliptra FMC ...
5,088,499 UART:
5,088,721 UART: [fmc] Received command: 0x10000000
5,090,890 >>> mbox cmd response data (224 bytes)
5,090,891 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,090,920 UART: [fmc] Received command: 0x10000006
5,108,937 >>> mbox cmd response data (1536 bytes)
5,108,938 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,108,966 UART: [fmc] Received command: 0x10000007
5,109,758 >>> mbox cmd response data (4 bytes)
5,109,759 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,109,787 UART: [fmc] Received command: 0x10000006
5,127,804 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,468 UART: [kat] SHA2-256
902,408 UART: [kat] SHA2-384
905,313 UART: [kat] SHA2-512-ACC
907,214 UART: [kat] ECC-384
917,105 UART: [kat] HMAC-384Kdf
921,697 UART: [kat] LMS
1,170,009 UART: [kat] --
1,170,936 UART: [cold-reset] ++
1,171,268 UART: [fht] FHT @ 0x50003400
1,174,176 UART: [idev] ++
1,174,344 UART: [idev] CDI.KEYID = 6
1,174,705 UART: [idev] SUBJECT.KEYID = 7
1,175,130 UART: [idev] UDS.KEYID = 0
1,183,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,283,042 UART: [fwproc] Recv command 0x46574c44
1,283,775 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,044 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,635 >>> mbox cmd response: success
2,742,656 UART: [afmc] ++
2,742,824 UART: [afmc] CDI.KEYID = 6
2,743,187 UART: [afmc] SUBJECT.KEYID = 7
2,743,613 UART: [afmc] AUTHORITY.KEYID = 5
2,779,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,598 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,318 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,210 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,904 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,771 UART: [afmc] --
2,822,759 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,781 UART: [cold-reset] --
2,823,721 UART: [state] Locking Datavault
2,824,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,520 UART: [state] Locking ICCM
2,826,086 UART: [exit] Launching FMC @ 0x40000000
2,831,383 UART:
2,831,399 UART: Running Caliptra FMC ...
2,831,807 UART:
2,832,037 UART: [fmc] Received command: 0x10000000
2,834,206 >>> mbox cmd response data (224 bytes)
2,834,207 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,236 UART: [fmc] Received command: 0x10000006
2,852,253 >>> mbox cmd response data (1536 bytes)
2,852,254 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,852,282 UART: [fmc] Received command: 0x46574C44
2,853,108 UART:
2,853,124 UART: Running Caliptra ROM ...
2,853,532 UART:
2,853,674 UART: [state] CFI Enabled
2,856,436 UART: [state] LifecycleState = Unprovisioned
2,857,091 UART: [state] DebugLocked = No
2,857,585 UART: [state] WD Timer not started. Device not locked for debugging
2,858,825 UART: [kat] SHA2-256
3,662,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,504 UART: [kat] ++
3,666,656 UART: [kat] sha1
3,670,852 UART: [kat] SHA2-256
3,672,792 UART: [kat] SHA2-384
3,675,601 UART: [kat] SHA2-512-ACC
3,677,501 UART: [kat] ECC-384
3,686,984 UART: [kat] HMAC-384Kdf
3,691,544 UART: [kat] LMS
3,939,856 UART: [kat] --
3,940,804 UART: [update-reset] ++
5,225,134 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,269 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,281 >>> mbox cmd response: success
5,374,468 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,482 UART: [update-reset Success] --
5,382,891 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,383,533 UART: [state] Locking Datavault
5,384,425 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,029 UART: [state] Locking ICCM
5,385,459 UART: [exit] Launching FMC @ 0x40000000
5,390,756 UART:
5,390,772 UART: Running Caliptra FMC ...
5,391,180 UART:
5,391,402 UART: [fmc] Received command: 0x10000000
5,393,571 >>> mbox cmd response data (224 bytes)
5,393,572 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,393,601 UART: [fmc] Received command: 0x10000006
5,411,618 >>> mbox cmd response data (1536 bytes)
5,411,619 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,411,647 UART: [fmc] Received command: 0x10000007
5,412,439 >>> mbox cmd response data (4 bytes)
5,412,440 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,412,468 UART: [fmc] Received command: 0x10000006
5,430,485 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,137 >>> mbox cmd response: success
2,649,981 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,655,840 UART:
2,655,856 UART: Running Caliptra FMC ...
2,656,264 UART:
2,656,494 UART: [fmc] Received command: 0x10000000
2,658,663 >>> mbox cmd response data (224 bytes)
2,658,664 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,658,693 UART: [fmc] Received command: 0x10000006
2,676,710 >>> mbox cmd response data (1536 bytes)
2,676,711 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,676,739 UART: [fmc] Received command: 0x46574C44
5,079,283 >>> mbox cmd response: success
5,086,811 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,092,751 UART:
5,092,767 UART: Running Caliptra FMC ...
5,093,175 UART:
5,093,397 UART: [fmc] Received command: 0x10000000
5,095,566 >>> mbox cmd response data (224 bytes)
5,095,567 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,095,596 UART: [fmc] Received command: 0x10000006
5,113,613 >>> mbox cmd response data (1536 bytes)
5,113,614 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,113,642 UART: [fmc] Received command: 0x10000007
5,114,434 >>> mbox cmd response data (4 bytes)
5,114,435 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,114,463 UART: [fmc] Received command: 0x10000006
5,132,480 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,576,755 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,292 >>> mbox cmd response: success
2,739,335 UART: [afmc] ++
2,739,503 UART: [afmc] CDI.KEYID = 6
2,739,866 UART: [afmc] SUBJECT.KEYID = 7
2,740,292 UART: [afmc] AUTHORITY.KEYID = 5
2,775,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,242 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,798,948 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,804,835 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,810,554 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,818,404 UART: [afmc] --
2,819,480 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,502 UART: [cold-reset] --
2,820,424 UART: [state] Locking Datavault
2,821,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,215 UART: [state] Locking ICCM
2,822,775 UART: [exit] Launching FMC @ 0x40000000
2,828,072 UART:
2,828,088 UART: Running Caliptra FMC ...
2,828,496 UART:
2,828,726 UART: [fmc] Received command: 0x10000000
2,830,895 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,246 >>> mbox cmd response: success
2,645,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,952 UART:
2,650,968 UART: Running Caliptra FMC ...
2,651,376 UART:
2,651,606 UART: [fmc] Received command: 0x10000000
2,653,775 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,716 UART: [idev] --
1,208,793 UART: [ldev] ++
1,208,961 UART: [ldev] CDI.KEYID = 6
1,209,325 UART: [ldev] SUBJECT.KEYID = 5
1,209,752 UART: [ldev] AUTHORITY.KEYID = 7
1,210,215 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,081 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,549 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,434 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,859 >>> mbox cmd response: success
2,741,954 UART: [afmc] ++
2,742,122 UART: [afmc] CDI.KEYID = 6
2,742,485 UART: [afmc] SUBJECT.KEYID = 7
2,742,911 UART: [afmc] AUTHORITY.KEYID = 5
2,778,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,455 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,161 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,048 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,767 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,387 UART: [afmc] --
2,821,419 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,441 UART: [cold-reset] --
2,822,337 UART: [state] Locking Datavault
2,823,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,038 UART: [state] Locking ICCM
2,824,600 UART: [exit] Launching FMC @ 0x40000000
2,829,897 UART:
2,829,913 UART: Running Caliptra FMC ...
2,830,321 UART:
2,830,551 UART: [fmc] Received command: 0x10000000
2,832,720 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,561 >>> mbox cmd response: success
2,647,502 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,689 UART:
2,653,705 UART: Running Caliptra FMC ...
2,654,113 UART:
2,654,343 UART: [fmc] Received command: 0x10000000
2,656,512 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,065 UART: [idev] --
1,207,884 UART: [ldev] ++
1,208,052 UART: [ldev] CDI.KEYID = 6
1,208,416 UART: [ldev] SUBJECT.KEYID = 5
1,208,843 UART: [ldev] AUTHORITY.KEYID = 7
1,209,306 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,546 UART: [ldev] --
1,279,932 UART: [fwproc] Wait for Commands...
1,280,649 UART: [fwproc] Recv command 0x46574c44
1,281,382 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,399 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,778 >>> mbox cmd response: success
2,739,897 UART: [afmc] ++
2,740,065 UART: [afmc] CDI.KEYID = 6
2,740,428 UART: [afmc] SUBJECT.KEYID = 7
2,740,854 UART: [afmc] AUTHORITY.KEYID = 5
2,776,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,316 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,799,022 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,804,909 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,810,628 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,818,500 UART: [afmc] --
2,819,432 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,454 UART: [cold-reset] --
2,820,212 UART: [state] Locking Datavault
2,821,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,095 UART: [state] Locking ICCM
2,822,587 UART: [exit] Launching FMC @ 0x40000000
2,827,884 UART:
2,827,900 UART: Running Caliptra FMC ...
2,828,308 UART:
2,828,538 UART: [fmc] Received command: 0x10000000
2,830,707 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,416 >>> mbox cmd response: success
2,648,439 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,648 UART:
2,654,664 UART: Running Caliptra FMC ...
2,655,072 UART:
2,655,302 UART: [fmc] Received command: 0x10000000
2,657,471 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,132 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,786 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,727 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,090 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,621 >>> mbox cmd response: success
2,742,666 UART: [afmc] ++
2,742,834 UART: [afmc] CDI.KEYID = 6
2,743,197 UART: [afmc] SUBJECT.KEYID = 7
2,743,623 UART: [afmc] AUTHORITY.KEYID = 5
2,779,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,847 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,802,553 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,808,440 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,159 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,822,225 UART: [afmc] --
2,823,321 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,343 UART: [cold-reset] --
2,824,021 UART: [state] Locking Datavault
2,825,140 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,744 UART: [state] Locking ICCM
2,826,180 UART: [exit] Launching FMC @ 0x40000000
2,831,477 UART:
2,831,493 UART: Running Caliptra FMC ...
2,831,901 UART:
2,832,131 UART: [fmc] Received command: 0x10000000
2,834,300 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,789 >>> mbox cmd response: success
2,646,808 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,831 UART:
2,652,847 UART: Running Caliptra FMC ...
2,653,255 UART:
2,653,485 UART: [fmc] Received command: 0x10000000
2,655,654 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,961 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,197,865 UART: [idev] Sha1 KeyId Algorithm
1,206,771 UART: [idev] --
1,207,986 UART: [ldev] ++
1,208,154 UART: [ldev] CDI.KEYID = 6
1,208,518 UART: [ldev] SUBJECT.KEYID = 5
1,208,945 UART: [ldev] AUTHORITY.KEYID = 7
1,209,408 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,831 UART: [fwproc] Recv command 0x46574c44
1,281,564 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,409 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,034 >>> mbox cmd response: success
2,742,263 UART: [afmc] ++
2,742,431 UART: [afmc] CDI.KEYID = 6
2,742,794 UART: [afmc] SUBJECT.KEYID = 7
2,743,220 UART: [afmc] AUTHORITY.KEYID = 5
2,777,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,880 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,586 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,473 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,192 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,054 UART: [afmc] --
2,820,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,008 UART: [cold-reset] --
2,821,908 UART: [state] Locking Datavault
2,823,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,909 UART: [state] Locking ICCM
2,824,569 UART: [exit] Launching FMC @ 0x40000000
2,829,866 UART:
2,829,882 UART: Running Caliptra FMC ...
2,830,290 UART:
2,830,520 UART: [fmc] Received command: 0x10000000
2,832,689 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,298 >>> mbox cmd response: success
2,647,571 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,908 UART:
2,653,924 UART: Running Caliptra FMC ...
2,654,332 UART:
2,654,562 UART: [fmc] Received command: 0x10000000
2,656,731 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,198,402 UART: [idev] Sha1 KeyId Algorithm
1,207,286 UART: [idev] --
1,208,151 UART: [ldev] ++
1,208,319 UART: [ldev] CDI.KEYID = 6
1,208,683 UART: [ldev] SUBJECT.KEYID = 5
1,209,110 UART: [ldev] AUTHORITY.KEYID = 7
1,209,573 UART: [ldev] FE.KEYID = 1
1,215,053 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,988 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,481 >>> mbox cmd response: success
2,741,666 UART: [afmc] ++
2,741,834 UART: [afmc] CDI.KEYID = 6
2,742,197 UART: [afmc] SUBJECT.KEYID = 7
2,742,623 UART: [afmc] AUTHORITY.KEYID = 5
2,778,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,717 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,423 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,310 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,029 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,899 UART: [afmc] --
2,821,949 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,971 UART: [cold-reset] --
2,822,993 UART: [state] Locking Datavault
2,824,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,044 UART: [state] Locking ICCM
2,825,488 UART: [exit] Launching FMC @ 0x40000000
2,830,785 UART:
2,830,801 UART: Running Caliptra FMC ...
2,831,209 UART:
2,831,439 UART: [fmc] Received command: 0x10000000
2,833,608 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,597 >>> mbox cmd response: success
2,647,968 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,123 UART:
2,654,139 UART: Running Caliptra FMC ...
2,654,547 UART:
2,654,777 UART: [fmc] Received command: 0x10000000
2,656,946 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,365 UART: [kat] SHA2-256
901,305 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,160 UART: [kat] LMS
1,168,472 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,181,277 UART: [idev] Erasing UDS.KEYID = 0
1,198,209 UART: [idev] Sha1 KeyId Algorithm
1,206,939 UART: [idev] --
1,207,902 UART: [ldev] ++
1,208,070 UART: [ldev] CDI.KEYID = 6
1,208,434 UART: [ldev] SUBJECT.KEYID = 5
1,208,861 UART: [ldev] AUTHORITY.KEYID = 7
1,209,324 UART: [ldev] FE.KEYID = 1
1,214,440 UART: [ldev] Erasing FE.KEYID = 1
1,240,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,826 UART: [ldev] --
1,279,328 UART: [fwproc] Wait for Commands...
1,280,117 UART: [fwproc] Recv command 0x46574c44
1,280,850 UART: [fwproc] Recv'd Img size: 111916 bytes
3,097,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,125,702 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,151,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,287,223 >>> mbox cmd response: success
3,288,402 UART: [afmc] ++
3,288,570 UART: [afmc] CDI.KEYID = 6
3,288,933 UART: [afmc] SUBJECT.KEYID = 7
3,289,359 UART: [afmc] AUTHORITY.KEYID = 5
3,324,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,131 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,346,834 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,352,716 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,358,422 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,366,218 UART: [afmc] --
3,367,314 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,367,336 UART: [cold-reset] --
3,368,104 UART: [state] Locking Datavault
3,369,323 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,927 UART: [state] Locking ICCM
3,370,365 UART: [exit] Launching FMC @ 0x40000000
3,375,662 UART:
3,375,678 UART: Running Caliptra FMC ...
3,376,086 UART:
3,376,316 UART: [fmc] Received command: 0x10000000
3,378,485 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,136,516 >>> mbox cmd response: success
3,191,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,198,130 UART:
3,198,146 UART: Running Caliptra FMC ...
3,198,554 UART:
3,198,784 UART: [fmc] Received command: 0x10000000
3,200,953 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,478 UART: [idev] ++
1,172,646 UART: [idev] CDI.KEYID = 6
1,173,007 UART: [idev] SUBJECT.KEYID = 7
1,173,432 UART: [idev] UDS.KEYID = 0
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,198,896 UART: [idev] Sha1 KeyId Algorithm
1,207,634 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,413 UART: [ldev] --
1,281,899 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 111916 bytes
3,100,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,281 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,288,738 >>> mbox cmd response: success
3,289,893 UART: [afmc] ++
3,290,061 UART: [afmc] CDI.KEYID = 6
3,290,424 UART: [afmc] SUBJECT.KEYID = 7
3,290,850 UART: [afmc] AUTHORITY.KEYID = 5
3,326,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,492 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,349,195 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,355,077 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,360,783 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,368,559 UART: [afmc] --
3,369,633 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,369,655 UART: [cold-reset] --
3,370,225 UART: [state] Locking Datavault
3,371,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,022 UART: [state] Locking ICCM
3,372,642 UART: [exit] Launching FMC @ 0x40000000
3,377,939 UART:
3,377,955 UART: Running Caliptra FMC ...
3,378,363 UART:
3,378,593 UART: [fmc] Received command: 0x10000000
3,380,762 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,119,362 >>> mbox cmd response: success
3,175,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,182,054 UART:
3,182,070 UART: Running Caliptra FMC ...
3,182,478 UART:
3,182,708 UART: [fmc] Received command: 0x10000000
3,184,877 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 111916 bytes
3,087,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,115,049 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,140,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,276,598 >>> mbox cmd response: success
3,277,863 UART: [afmc] ++
3,278,031 UART: [afmc] CDI.KEYID = 6
3,278,394 UART: [afmc] SUBJECT.KEYID = 7
3,278,820 UART: [afmc] AUTHORITY.KEYID = 5
3,314,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,330,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,331,636 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,337,339 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,343,221 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,348,927 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,356,721 UART: [afmc] --
3,357,665 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,357,687 UART: [cold-reset] --
3,358,661 UART: [state] Locking Datavault
3,359,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,400 UART: [state] Locking ICCM
3,361,052 UART: [exit] Launching FMC @ 0x40000000
3,366,349 UART:
3,366,365 UART: Running Caliptra FMC ...
3,366,773 UART:
3,367,003 UART: [fmc] Received command: 0x10000000
3,369,172 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,138,007 >>> mbox cmd response: success
3,194,178 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,079 UART:
3,200,095 UART: Running Caliptra FMC ...
3,200,503 UART:
3,200,733 UART: [fmc] Received command: 0x10000000
3,202,902 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,170,846 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,347 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 111916 bytes
3,093,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,635 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,147,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,283,254 >>> mbox cmd response: success
3,284,495 UART: [afmc] ++
3,284,663 UART: [afmc] CDI.KEYID = 6
3,285,026 UART: [afmc] SUBJECT.KEYID = 7
3,285,452 UART: [afmc] AUTHORITY.KEYID = 5
3,321,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,338,968 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,344,671 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,350,553 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,356,259 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,163 UART: [afmc] --
3,365,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,083 UART: [cold-reset] --
3,365,991 UART: [state] Locking Datavault
3,366,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,367,562 UART: [state] Locking ICCM
3,368,050 UART: [exit] Launching FMC @ 0x40000000
3,373,347 UART:
3,373,363 UART: Running Caliptra FMC ...
3,373,771 UART:
3,374,001 UART: [fmc] Received command: 0x10000000
3,376,170 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,138,528 >>> mbox cmd response: success
3,194,919 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,926 UART:
3,200,942 UART: Running Caliptra FMC ...
3,201,350 UART:
3,201,580 UART: [fmc] Received command: 0x10000000
3,203,749 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
903,968 UART: [kat] SHA2-512-ACC
905,869 UART: [kat] ECC-384
915,560 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
1,168,428 UART: [kat] --
1,169,125 UART: [cold-reset] ++
1,169,487 UART: [fht] FHT @ 0x50003400
1,172,305 UART: [idev] ++
1,172,473 UART: [idev] CDI.KEYID = 6
1,172,834 UART: [idev] SUBJECT.KEYID = 7
1,173,259 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,543 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,146 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 111916 bytes
3,090,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,909 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,280,324 >>> mbox cmd response: success
3,281,433 UART: [afmc] ++
3,281,601 UART: [afmc] CDI.KEYID = 6
3,281,964 UART: [afmc] SUBJECT.KEYID = 7
3,282,390 UART: [afmc] AUTHORITY.KEYID = 5
3,318,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,412 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,341,115 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,346,997 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,352,703 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,360,499 UART: [afmc] --
3,361,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,619 UART: [cold-reset] --
3,362,517 UART: [state] Locking Datavault
3,363,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,260 UART: [state] Locking ICCM
3,364,708 UART: [exit] Launching FMC @ 0x40000000
3,370,005 UART:
3,370,021 UART: Running Caliptra FMC ...
3,370,429 UART:
3,370,659 UART: [fmc] Received command: 0x10000000
3,372,828 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,137,863 >>> mbox cmd response: success
3,194,392 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,619 UART:
3,200,635 UART: Running Caliptra FMC ...
3,201,043 UART:
3,201,273 UART: [fmc] Received command: 0x10000000
3,203,442 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,099 UART: [kat] LMS
1,168,411 UART: [kat] --
1,169,386 UART: [cold-reset] ++
1,169,870 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,296 UART: [idev] Sha1 KeyId Algorithm
1,207,090 UART: [idev] --
1,208,157 UART: [ldev] ++
1,208,325 UART: [ldev] CDI.KEYID = 6
1,208,689 UART: [ldev] SUBJECT.KEYID = 5
1,209,116 UART: [ldev] AUTHORITY.KEYID = 7
1,209,579 UART: [ldev] FE.KEYID = 1
1,214,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,282,166 UART: [fwproc] Recv command 0x46574c44
1,282,899 UART: [fwproc] Recv'd Img size: 111916 bytes
3,094,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,123,049 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,284,498 >>> mbox cmd response: success
3,285,713 UART: [afmc] ++
3,285,881 UART: [afmc] CDI.KEYID = 6
3,286,244 UART: [afmc] SUBJECT.KEYID = 7
3,286,670 UART: [afmc] AUTHORITY.KEYID = 5
3,322,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,339,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,812 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,345,515 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,351,397 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,357,103 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,885 UART: [afmc] --
3,365,971 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,993 UART: [cold-reset] --
3,366,767 UART: [state] Locking Datavault
3,367,794 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,398 UART: [state] Locking ICCM
3,368,938 UART: [exit] Launching FMC @ 0x40000000
3,374,235 UART:
3,374,251 UART: Running Caliptra FMC ...
3,374,659 UART:
3,374,889 UART: [fmc] Received command: 0x10000000
3,377,058 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,137,526 >>> mbox cmd response: success
3,193,367 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,922 UART:
3,199,938 UART: Running Caliptra FMC ...
3,200,346 UART:
3,200,576 UART: [fmc] Received command: 0x10000000
3,202,745 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,199,541 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,216,026 UART: [ldev] Erasing FE.KEYID = 1
1,242,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,834 UART: [ldev] --
1,282,198 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x4d454153
1,286,880 >>> mbox cmd response data (12 bytes)
1,286,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,028 UART: [fwproc] Recv command 0x4d454153
1,291,055 >>> mbox cmd response data (12 bytes)
1,291,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,235 UART: [fwproc] Recv command 0x4d454153
1,295,262 >>> mbox cmd response data (12 bytes)
1,295,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,368 UART: [fwproc] Recv command 0x4d454153
1,299,395 >>> mbox cmd response data (12 bytes)
1,299,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,503 UART: [fwproc] Recv command 0x4d454153
1,303,530 >>> mbox cmd response data (12 bytes)
1,303,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,840 UART: [fwproc] Recv command 0x4d454153
1,307,867 >>> mbox cmd response data (12 bytes)
1,307,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,011 UART: [fwproc] Recv command 0x4d454153
1,312,038 >>> mbox cmd response data (12 bytes)
1,312,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,330 UART: [fwproc] Recv command 0x4d454153
1,316,357 >>> mbox cmd response data (12 bytes)
1,316,358 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,316,539 UART: [fwproc] Recv command 0x46574c44
1,317,272 UART: [fwproc] Recv'd Img size: 111916 bytes
2,587,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,154 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,667 >>> mbox cmd response: success
2,777,852 UART: [afmc] ++
2,778,020 UART: [afmc] CDI.KEYID = 6
2,778,383 UART: [afmc] SUBJECT.KEYID = 7
2,778,809 UART: [afmc] AUTHORITY.KEYID = 5
2,814,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,471 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,167 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,066 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,759 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,639 UART: [afmc] --
2,857,551 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,573 UART: [cold-reset] --
2,858,603 UART: [state] Locking Datavault
2,859,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,416 UART: [state] Locking ICCM
2,860,938 UART: [exit] Launching FMC @ 0x40000000
2,866,235 UART:
2,866,251 UART: Running Caliptra FMC ...
2,866,659 UART:
2,866,889 UART: [fmc] Received command: 0x1000000A
2,873,120 >>> mbox cmd response data (928 bytes)
2,873,121 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,150 UART: [fmc] Received command: 0x10000009
2,874,348 >>> mbox cmd response data (48 bytes)
2,874,349 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,378 UART: [fmc] Received command: 0x10000003
2,883,834 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,432 >>> mbox cmd response data (12 bytes)
1,138,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,864 >>> mbox cmd response data (12 bytes)
1,141,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,262 >>> mbox cmd response data (12 bytes)
1,145,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,668 >>> mbox cmd response data (12 bytes)
1,148,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,218 >>> mbox cmd response data (12 bytes)
1,152,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,614 >>> mbox cmd response data (12 bytes)
1,155,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,142 >>> mbox cmd response data (12 bytes)
1,159,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,722 >>> mbox cmd response data (12 bytes)
1,162,723 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,616,701 >>> mbox cmd response: success
2,672,470 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,678,673 UART:
2,678,689 UART: Running Caliptra FMC ...
2,679,097 UART:
2,679,327 UART: [fmc] Received command: 0x1000000A
2,685,558 >>> mbox cmd response data (928 bytes)
2,685,559 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,685,588 UART: [fmc] Received command: 0x10000009
2,686,786 >>> mbox cmd response data (48 bytes)
2,686,787 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,686,816 UART: [fmc] Received command: 0x10000003
2,696,272 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,351 UART: [kat] SHA2-256
890,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,541 UART: [kat] HMAC-384Kdf
920,201 UART: [kat] LMS
1,168,513 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,181,836 UART: [idev] Erasing UDS.KEYID = 0
1,198,358 UART: [idev] Sha1 KeyId Algorithm
1,207,014 UART: [idev] --
1,208,239 UART: [ldev] ++
1,208,407 UART: [ldev] CDI.KEYID = 6
1,208,771 UART: [ldev] SUBJECT.KEYID = 5
1,209,198 UART: [ldev] AUTHORITY.KEYID = 7
1,209,661 UART: [ldev] FE.KEYID = 1
1,214,935 UART: [ldev] Erasing FE.KEYID = 1
1,241,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,489 UART: [ldev] --
1,280,983 UART: [fwproc] Wait for Commands...
1,281,782 UART: [fwproc] Recv command 0x4d454153
1,285,809 >>> mbox cmd response data (12 bytes)
1,285,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,879 UART: [fwproc] Recv command 0x4d454153
1,289,906 >>> mbox cmd response data (12 bytes)
1,289,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,008 UART: [fwproc] Recv command 0x4d454153
1,294,035 >>> mbox cmd response data (12 bytes)
1,294,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,197 UART: [fwproc] Recv command 0x4d454153
1,298,224 >>> mbox cmd response data (12 bytes)
1,298,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,464 UART: [fwproc] Recv command 0x4d454153
1,302,491 >>> mbox cmd response data (12 bytes)
1,302,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,671 UART: [fwproc] Recv command 0x4d454153
1,306,698 >>> mbox cmd response data (12 bytes)
1,306,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,918 UART: [fwproc] Recv command 0x4d454153
1,310,945 >>> mbox cmd response data (12 bytes)
1,310,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,103 UART: [fwproc] Recv command 0x4d454153
1,315,130 >>> mbox cmd response data (12 bytes)
1,315,131 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,315,406 UART: [fwproc] Recv command 0x46574c44
1,316,139 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,475 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,896 >>> mbox cmd response: success
2,774,995 UART: [afmc] ++
2,775,163 UART: [afmc] CDI.KEYID = 6
2,775,526 UART: [afmc] SUBJECT.KEYID = 7
2,775,952 UART: [afmc] AUTHORITY.KEYID = 5
2,811,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,640 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,834,336 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,840,235 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,845,928 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,853,792 UART: [afmc] --
2,854,820 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,854,842 UART: [cold-reset] --
2,855,750 UART: [state] Locking Datavault
2,857,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,697 UART: [state] Locking ICCM
2,858,223 UART: [exit] Launching FMC @ 0x40000000
2,863,520 UART:
2,863,536 UART: Running Caliptra FMC ...
2,863,944 UART:
2,864,174 UART: [fmc] Received command: 0x1000000A
2,870,405 >>> mbox cmd response data (928 bytes)
2,870,406 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,435 UART: [fmc] Received command: 0x10000009
2,871,633 >>> mbox cmd response data (48 bytes)
2,871,634 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,663 UART: [fmc] Received command: 0x10000003
2,881,119 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,153 >>> mbox cmd response data (12 bytes)
1,139,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,547 >>> mbox cmd response data (12 bytes)
1,142,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,093 >>> mbox cmd response data (12 bytes)
1,146,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,505 >>> mbox cmd response data (12 bytes)
1,149,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,901 >>> mbox cmd response data (12 bytes)
1,152,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,397 >>> mbox cmd response data (12 bytes)
1,156,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,957 >>> mbox cmd response data (12 bytes)
1,159,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,463 >>> mbox cmd response data (12 bytes)
1,163,464 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,617,418 >>> mbox cmd response: success
2,673,903 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,140 UART:
2,680,156 UART: Running Caliptra FMC ...
2,680,564 UART:
2,680,794 UART: [fmc] Received command: 0x1000000A
2,687,025 >>> mbox cmd response data (928 bytes)
2,687,026 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,055 UART: [fmc] Received command: 0x10000009
2,688,253 >>> mbox cmd response data (48 bytes)
2,688,254 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,283 UART: [fmc] Received command: 0x10000003
2,697,739 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,197,951 UART: [idev] Sha1 KeyId Algorithm
1,206,707 UART: [idev] --
1,207,764 UART: [ldev] ++
1,207,932 UART: [ldev] CDI.KEYID = 6
1,208,296 UART: [ldev] SUBJECT.KEYID = 5
1,208,723 UART: [ldev] AUTHORITY.KEYID = 7
1,209,186 UART: [ldev] FE.KEYID = 1
1,214,574 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,722 UART: [ldev] --
1,280,148 UART: [fwproc] Wait for Commands...
1,280,791 UART: [fwproc] Recv command 0x4d454153
1,284,818 >>> mbox cmd response data (12 bytes)
1,284,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,126 UART: [fwproc] Recv command 0x4d454153
1,289,153 >>> mbox cmd response data (12 bytes)
1,289,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,393 UART: [fwproc] Recv command 0x4d454153
1,293,420 >>> mbox cmd response data (12 bytes)
1,293,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,698 UART: [fwproc] Recv command 0x4d454153
1,297,725 >>> mbox cmd response data (12 bytes)
1,297,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,901 UART: [fwproc] Recv command 0x4d454153
1,301,928 >>> mbox cmd response data (12 bytes)
1,301,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,122 UART: [fwproc] Recv command 0x4d454153
1,306,149 >>> mbox cmd response data (12 bytes)
1,306,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,423 UART: [fwproc] Recv command 0x4d454153
1,310,450 >>> mbox cmd response data (12 bytes)
1,310,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,700 UART: [fwproc] Recv command 0x4d454153
1,314,727 >>> mbox cmd response data (12 bytes)
1,314,728 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,314,845 UART: [fwproc] Recv command 0x46574c44
1,315,578 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,868 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,437 >>> mbox cmd response: success
2,775,674 UART: [afmc] ++
2,775,842 UART: [afmc] CDI.KEYID = 6
2,776,205 UART: [afmc] SUBJECT.KEYID = 7
2,776,631 UART: [afmc] AUTHORITY.KEYID = 5
2,811,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,157 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,834,853 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,840,752 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,846,445 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,854,211 UART: [afmc] --
2,855,299 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,855,321 UART: [cold-reset] --
2,856,235 UART: [state] Locking Datavault
2,857,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,904 UART: [state] Locking ICCM
2,858,356 UART: [exit] Launching FMC @ 0x40000000
2,863,653 UART:
2,863,669 UART: Running Caliptra FMC ...
2,864,077 UART:
2,864,307 UART: [fmc] Received command: 0x1000000A
2,870,538 >>> mbox cmd response data (928 bytes)
2,870,539 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,568 UART: [fmc] Received command: 0x10000009
2,871,766 >>> mbox cmd response data (48 bytes)
2,871,767 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,796 UART: [fmc] Received command: 0x10000003
2,881,252 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,026 >>> mbox cmd response data (12 bytes)
1,140,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,506 >>> mbox cmd response data (12 bytes)
1,143,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,022 >>> mbox cmd response data (12 bytes)
1,147,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,416 >>> mbox cmd response data (12 bytes)
1,150,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,820 >>> mbox cmd response data (12 bytes)
1,153,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,310 >>> mbox cmd response data (12 bytes)
1,157,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,896 >>> mbox cmd response data (12 bytes)
1,160,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,328 >>> mbox cmd response data (12 bytes)
1,164,329 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,619,337 >>> mbox cmd response: success
2,674,718 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,641 UART:
2,680,657 UART: Running Caliptra FMC ...
2,681,065 UART:
2,681,295 UART: [fmc] Received command: 0x1000000A
2,687,526 >>> mbox cmd response data (928 bytes)
2,687,527 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,556 UART: [fmc] Received command: 0x10000009
2,688,754 >>> mbox cmd response data (48 bytes)
2,688,755 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,784 UART: [fmc] Received command: 0x10000003
2,698,240 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,853 UART: [state] LifecycleState = Unprovisioned
85,508 UART: [state] DebugLocked = No
86,074 UART: [state] WD Timer not started. Device not locked for debugging
87,293 UART: [kat] SHA2-256
890,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,972 UART: [kat] ++
895,124 UART: [kat] sha1
899,252 UART: [kat] SHA2-256
901,192 UART: [kat] SHA2-384
904,041 UART: [kat] SHA2-512-ACC
905,942 UART: [kat] ECC-384
915,479 UART: [kat] HMAC-384Kdf
920,115 UART: [kat] LMS
1,168,427 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,730 UART: [fht] FHT @ 0x50003400
1,172,430 UART: [idev] ++
1,172,598 UART: [idev] CDI.KEYID = 6
1,172,959 UART: [idev] SUBJECT.KEYID = 7
1,173,384 UART: [idev] UDS.KEYID = 0
1,181,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,050 UART: [idev] Sha1 KeyId Algorithm
1,207,090 UART: [idev] --
1,207,953 UART: [ldev] ++
1,208,121 UART: [ldev] CDI.KEYID = 6
1,208,485 UART: [ldev] SUBJECT.KEYID = 5
1,208,912 UART: [ldev] AUTHORITY.KEYID = 7
1,209,375 UART: [ldev] FE.KEYID = 1
1,214,399 UART: [ldev] Erasing FE.KEYID = 1
1,240,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,843 UART: [ldev] --
1,280,327 UART: [fwproc] Wait for Commands...
1,281,058 UART: [fwproc] Recv command 0x4d454153
1,285,085 >>> mbox cmd response data (12 bytes)
1,285,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,385 UART: [fwproc] Recv command 0x4d454153
1,289,412 >>> mbox cmd response data (12 bytes)
1,289,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,650 UART: [fwproc] Recv command 0x4d454153
1,293,677 >>> mbox cmd response data (12 bytes)
1,293,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,895 UART: [fwproc] Recv command 0x4d454153
1,297,922 >>> mbox cmd response data (12 bytes)
1,297,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,016 UART: [fwproc] Recv command 0x4d454153
1,302,043 >>> mbox cmd response data (12 bytes)
1,302,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,321 UART: [fwproc] Recv command 0x4d454153
1,306,348 >>> mbox cmd response data (12 bytes)
1,306,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,610 UART: [fwproc] Recv command 0x4d454153
1,310,637 >>> mbox cmd response data (12 bytes)
1,310,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,713 UART: [fwproc] Recv command 0x4d454153
1,314,740 >>> mbox cmd response data (12 bytes)
1,314,741 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,314,900 UART: [fwproc] Recv command 0x46574c44
1,315,633 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,511 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,924 >>> mbox cmd response: success
2,774,019 UART: [afmc] ++
2,774,187 UART: [afmc] CDI.KEYID = 6
2,774,550 UART: [afmc] SUBJECT.KEYID = 7
2,774,976 UART: [afmc] AUTHORITY.KEYID = 5
2,810,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,262 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,833,958 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,839,857 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,845,550 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,853,288 UART: [afmc] --
2,854,394 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,854,416 UART: [cold-reset] --
2,855,396 UART: [state] Locking Datavault
2,856,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,035 UART: [state] Locking ICCM
2,857,593 UART: [exit] Launching FMC @ 0x40000000
2,862,890 UART:
2,862,906 UART: Running Caliptra FMC ...
2,863,314 UART:
2,863,544 UART: [fmc] Received command: 0x1000000A
2,869,775 >>> mbox cmd response data (928 bytes)
2,869,776 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,869,805 UART: [fmc] Received command: 0x10000009
2,871,003 >>> mbox cmd response data (48 bytes)
2,871,004 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,033 UART: [fmc] Received command: 0x10000003
2,880,489 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,957 >>> mbox cmd response data (12 bytes)
1,139,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,369 >>> mbox cmd response data (12 bytes)
1,143,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,981 >>> mbox cmd response data (12 bytes)
1,146,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,471 >>> mbox cmd response data (12 bytes)
1,150,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,893 >>> mbox cmd response data (12 bytes)
1,153,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,267 >>> mbox cmd response data (12 bytes)
1,157,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,721 >>> mbox cmd response data (12 bytes)
1,160,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,139 >>> mbox cmd response data (12 bytes)
1,164,140 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,619,302 >>> mbox cmd response: success
2,675,855 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,681,802 UART:
2,681,818 UART: Running Caliptra FMC ...
2,682,226 UART:
2,682,456 UART: [fmc] Received command: 0x1000000A
2,688,687 >>> mbox cmd response data (928 bytes)
2,688,688 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,717 UART: [fmc] Received command: 0x10000009
2,689,915 >>> mbox cmd response data (48 bytes)
2,689,916 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,689,945 UART: [fmc] Received command: 0x10000003
2,699,401 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,280,909 UART: [fwproc] Recv command 0x4d454153
1,284,936 >>> mbox cmd response data (12 bytes)
1,284,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,248 UART: [fwproc] Recv command 0x4d454153
1,289,275 >>> mbox cmd response data (12 bytes)
1,289,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,573 UART: [fwproc] Recv command 0x4d454153
1,293,600 >>> mbox cmd response data (12 bytes)
1,293,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,756 UART: [fwproc] Recv command 0x4d454153
1,297,783 >>> mbox cmd response data (12 bytes)
1,297,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,871 UART: [fwproc] Recv command 0x4d454153
1,301,898 >>> mbox cmd response data (12 bytes)
1,301,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,036 UART: [fwproc] Recv command 0x4d454153
1,306,063 >>> mbox cmd response data (12 bytes)
1,306,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,283 UART: [fwproc] Recv command 0x4d454153
1,310,310 >>> mbox cmd response data (12 bytes)
1,310,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,584 UART: [fwproc] Recv command 0x4d454153
1,314,611 >>> mbox cmd response data (12 bytes)
1,314,612 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,314,711 UART: [fwproc] Recv command 0x46574c44
1,315,444 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,742 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,341 >>> mbox cmd response: success
2,774,578 UART: [afmc] ++
2,774,746 UART: [afmc] CDI.KEYID = 6
2,775,109 UART: [afmc] SUBJECT.KEYID = 7
2,775,535 UART: [afmc] AUTHORITY.KEYID = 5
2,810,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,909 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,833,605 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,839,504 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,845,197 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,852,989 UART: [afmc] --
2,853,993 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,854,015 UART: [cold-reset] --
2,855,021 UART: [state] Locking Datavault
2,856,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,696 UART: [state] Locking ICCM
2,857,352 UART: [exit] Launching FMC @ 0x40000000
2,862,649 UART:
2,862,665 UART: Running Caliptra FMC ...
2,863,073 UART:
2,863,303 UART: [fmc] Received command: 0x1000000A
2,869,534 >>> mbox cmd response data (928 bytes)
2,869,535 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,869,564 UART: [fmc] Received command: 0x10000009
2,870,762 >>> mbox cmd response data (48 bytes)
2,870,763 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,792 UART: [fmc] Received command: 0x10000003
2,880,248 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,086 >>> mbox cmd response data (12 bytes)
1,139,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,526 >>> mbox cmd response data (12 bytes)
1,142,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,132 >>> mbox cmd response data (12 bytes)
1,146,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,516 >>> mbox cmd response data (12 bytes)
1,149,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,138 >>> mbox cmd response data (12 bytes)
1,153,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,580 >>> mbox cmd response data (12 bytes)
1,156,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,034 >>> mbox cmd response data (12 bytes)
1,160,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,618 >>> mbox cmd response data (12 bytes)
1,163,619 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,617,317 >>> mbox cmd response: success
2,673,158 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,678,985 UART:
2,679,001 UART: Running Caliptra FMC ...
2,679,409 UART:
2,679,639 UART: [fmc] Received command: 0x1000000A
2,685,870 >>> mbox cmd response data (928 bytes)
2,685,871 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,685,900 UART: [fmc] Received command: 0x10000009
2,687,098 >>> mbox cmd response data (48 bytes)
2,687,099 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,128 UART: [fmc] Received command: 0x10000003
2,696,584 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,181,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,058 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,493 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x4d454153
1,287,231 >>> mbox cmd response data (12 bytes)
1,287,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,397 UART: [fwproc] Recv command 0x4d454153
1,291,424 >>> mbox cmd response data (12 bytes)
1,291,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,678 UART: [fwproc] Recv command 0x4d454153
1,295,705 >>> mbox cmd response data (12 bytes)
1,295,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,881 UART: [fwproc] Recv command 0x4d454153
1,299,908 >>> mbox cmd response data (12 bytes)
1,299,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,084 UART: [fwproc] Recv command 0x4d454153
1,304,111 >>> mbox cmd response data (12 bytes)
1,304,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,259 UART: [fwproc] Recv command 0x4d454153
1,308,286 >>> mbox cmd response data (12 bytes)
1,308,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,486 UART: [fwproc] Recv command 0x4d454153
1,312,513 >>> mbox cmd response data (12 bytes)
1,312,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,799 UART: [fwproc] Recv command 0x4d454153
1,316,826 >>> mbox cmd response data (12 bytes)
1,316,827 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,317,048 UART: [fwproc] Recv command 0x46574c44
1,317,781 UART: [fwproc] Recv'd Img size: 111916 bytes
2,586,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,059 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,442 >>> mbox cmd response: success
2,776,559 UART: [afmc] ++
2,776,727 UART: [afmc] CDI.KEYID = 6
2,777,090 UART: [afmc] SUBJECT.KEYID = 7
2,777,516 UART: [afmc] AUTHORITY.KEYID = 5
2,813,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,558 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,254 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,153 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,846 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,802 UART: [afmc] --
2,856,802 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,824 UART: [cold-reset] --
2,857,444 UART: [state] Locking Datavault
2,858,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,325 UART: [state] Locking ICCM
2,859,955 UART: [exit] Launching FMC @ 0x40000000
2,865,252 UART:
2,865,268 UART: Running Caliptra FMC ...
2,865,676 UART:
2,865,906 UART: [fmc] Received command: 0x1000000A
2,872,137 >>> mbox cmd response data (928 bytes)
2,872,138 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,167 UART: [fmc] Received command: 0x10000009
2,873,365 >>> mbox cmd response data (48 bytes)
2,873,366 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,395 UART: [fmc] Received command: 0x10000003
2,882,851 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,549 >>> mbox cmd response data (12 bytes)
1,140,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,113 >>> mbox cmd response data (12 bytes)
1,144,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,543 >>> mbox cmd response data (12 bytes)
1,147,544 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,973 >>> mbox cmd response data (12 bytes)
1,150,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,393 >>> mbox cmd response data (12 bytes)
1,154,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,939 >>> mbox cmd response data (12 bytes)
1,157,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,493 >>> mbox cmd response data (12 bytes)
1,161,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,879 >>> mbox cmd response data (12 bytes)
1,164,880 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,618,142 >>> mbox cmd response: success
2,674,565 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,842 UART:
2,680,858 UART: Running Caliptra FMC ...
2,681,266 UART:
2,681,496 UART: [fmc] Received command: 0x1000000A
2,687,727 >>> mbox cmd response data (928 bytes)
2,687,728 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,757 UART: [fmc] Received command: 0x10000009
2,688,955 >>> mbox cmd response data (48 bytes)
2,688,956 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,985 UART: [fmc] Received command: 0x10000003
2,698,441 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,707 UART: [idev] Erasing UDS.KEYID = 0
1,199,703 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,558 UART: [ldev] ++
1,209,726 UART: [ldev] CDI.KEYID = 6
1,210,090 UART: [ldev] SUBJECT.KEYID = 5
1,210,517 UART: [ldev] AUTHORITY.KEYID = 7
1,210,980 UART: [ldev] FE.KEYID = 1
1,216,154 UART: [ldev] Erasing FE.KEYID = 1
1,242,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,540 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x4d454153
1,286,344 >>> mbox cmd response data (12 bytes)
1,286,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,508 UART: [fwproc] Recv command 0x4d454153
1,290,535 >>> mbox cmd response data (12 bytes)
1,290,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,747 UART: [fwproc] Recv command 0x4d454153
1,294,774 >>> mbox cmd response data (12 bytes)
1,294,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,058 UART: [fwproc] Recv command 0x4d454153
1,299,085 >>> mbox cmd response data (12 bytes)
1,299,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,301 UART: [fwproc] Recv command 0x4d454153
1,303,328 >>> mbox cmd response data (12 bytes)
1,303,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,616 UART: [fwproc] Recv command 0x4d454153
1,307,643 >>> mbox cmd response data (12 bytes)
1,307,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,819 UART: [fwproc] Recv command 0x4d454153
1,311,846 >>> mbox cmd response data (12 bytes)
1,311,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,118 UART: [fwproc] Recv command 0x4d454153
1,316,145 >>> mbox cmd response data (12 bytes)
1,316,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,451 UART: [fwproc] Recv command 0x4d454153
1,317,194 UART: [fwproc] Max # of measurements received.
1,317,839 >>> mbox cmd response: failed
1,318,273 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,930 >>> mbox cmd response data (12 bytes)
1,138,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,410 >>> mbox cmd response data (12 bytes)
1,142,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,830 >>> mbox cmd response data (12 bytes)
1,145,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,384 >>> mbox cmd response data (12 bytes)
1,149,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,878 >>> mbox cmd response data (12 bytes)
1,152,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,430 >>> mbox cmd response data (12 bytes)
1,156,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,914 >>> mbox cmd response data (12 bytes)
1,159,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,340 >>> mbox cmd response data (12 bytes)
1,163,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,606 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,839 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x4d454153
1,286,025 >>> mbox cmd response data (12 bytes)
1,286,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,337 UART: [fwproc] Recv command 0x4d454153
1,290,364 >>> mbox cmd response data (12 bytes)
1,290,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,612 UART: [fwproc] Recv command 0x4d454153
1,294,639 >>> mbox cmd response data (12 bytes)
1,294,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,735 UART: [fwproc] Recv command 0x4d454153
1,298,762 >>> mbox cmd response data (12 bytes)
1,298,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,034 UART: [fwproc] Recv command 0x4d454153
1,303,061 >>> mbox cmd response data (12 bytes)
1,303,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,227 UART: [fwproc] Recv command 0x4d454153
1,307,254 >>> mbox cmd response data (12 bytes)
1,307,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,496 UART: [fwproc] Recv command 0x4d454153
1,311,523 >>> mbox cmd response data (12 bytes)
1,311,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,587 UART: [fwproc] Recv command 0x4d454153
1,315,614 >>> mbox cmd response data (12 bytes)
1,315,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,820 UART: [fwproc] Recv command 0x4d454153
1,316,563 UART: [fwproc] Max # of measurements received.
1,317,208 >>> mbox cmd response: failed
1,317,590 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,529 >>> mbox cmd response data (12 bytes)
1,140,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,003 >>> mbox cmd response data (12 bytes)
1,144,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,545 >>> mbox cmd response data (12 bytes)
1,147,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,151 >>> mbox cmd response data (12 bytes)
1,151,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,519 >>> mbox cmd response data (12 bytes)
1,154,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,019 >>> mbox cmd response data (12 bytes)
1,158,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,459 >>> mbox cmd response data (12 bytes)
1,161,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,045 >>> mbox cmd response data (12 bytes)
1,165,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,155 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,269 UART: [fwproc] Recv command 0x4d454153
1,286,296 >>> mbox cmd response data (12 bytes)
1,286,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,418 UART: [fwproc] Recv command 0x4d454153
1,290,445 >>> mbox cmd response data (12 bytes)
1,290,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,649 UART: [fwproc] Recv command 0x4d454153
1,294,676 >>> mbox cmd response data (12 bytes)
1,294,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,980 UART: [fwproc] Recv command 0x4d454153
1,299,007 >>> mbox cmd response data (12 bytes)
1,299,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,079 UART: [fwproc] Recv command 0x4d454153
1,303,106 >>> mbox cmd response data (12 bytes)
1,303,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,176 UART: [fwproc] Recv command 0x4d454153
1,307,203 >>> mbox cmd response data (12 bytes)
1,307,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,321 UART: [fwproc] Recv command 0x4d454153
1,311,348 >>> mbox cmd response data (12 bytes)
1,311,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,502 UART: [fwproc] Recv command 0x4d454153
1,315,529 >>> mbox cmd response data (12 bytes)
1,315,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,751 UART: [fwproc] Recv command 0x4d454153
1,316,494 UART: [fwproc] Max # of measurements received.
1,317,139 >>> mbox cmd response: failed
1,317,467 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,390 >>> mbox cmd response data (12 bytes)
1,138,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,848 >>> mbox cmd response data (12 bytes)
1,141,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,464 >>> mbox cmd response data (12 bytes)
1,145,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,902 >>> mbox cmd response data (12 bytes)
1,148,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,378 >>> mbox cmd response data (12 bytes)
1,152,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,966 >>> mbox cmd response data (12 bytes)
1,155,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,426 >>> mbox cmd response data (12 bytes)
1,159,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,824 >>> mbox cmd response data (12 bytes)
1,162,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,022 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,313 UART: [kat] LMS
1,169,625 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,484 UART: [idev] ++
1,173,652 UART: [idev] CDI.KEYID = 6
1,174,013 UART: [idev] SUBJECT.KEYID = 7
1,174,438 UART: [idev] UDS.KEYID = 0
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,200,078 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,209,987 UART: [ldev] ++
1,210,155 UART: [ldev] CDI.KEYID = 6
1,210,519 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x4d454153
1,286,719 >>> mbox cmd response data (12 bytes)
1,286,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,925 UART: [fwproc] Recv command 0x4d454153
1,290,952 >>> mbox cmd response data (12 bytes)
1,290,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,206 UART: [fwproc] Recv command 0x4d454153
1,295,233 >>> mbox cmd response data (12 bytes)
1,295,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,393 UART: [fwproc] Recv command 0x4d454153
1,299,420 >>> mbox cmd response data (12 bytes)
1,299,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,668 UART: [fwproc] Recv command 0x4d454153
1,303,695 >>> mbox cmd response data (12 bytes)
1,303,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,783 UART: [fwproc] Recv command 0x4d454153
1,307,810 >>> mbox cmd response data (12 bytes)
1,307,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,954 UART: [fwproc] Recv command 0x4d454153
1,311,981 >>> mbox cmd response data (12 bytes)
1,311,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,107 UART: [fwproc] Recv command 0x4d454153
1,316,134 >>> mbox cmd response data (12 bytes)
1,316,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,434 UART: [fwproc] Recv command 0x4d454153
1,317,177 UART: [fwproc] Max # of measurements received.
1,317,822 >>> mbox cmd response: failed
1,318,276 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,267 >>> mbox cmd response data (12 bytes)
1,140,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,801 >>> mbox cmd response data (12 bytes)
1,143,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,175 >>> mbox cmd response data (12 bytes)
1,147,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,703 >>> mbox cmd response data (12 bytes)
1,150,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,073 >>> mbox cmd response data (12 bytes)
1,154,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,685 >>> mbox cmd response data (12 bytes)
1,157,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,185 >>> mbox cmd response data (12 bytes)
1,161,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,561 >>> mbox cmd response data (12 bytes)
1,164,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,861 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,424 UART: [state] LifecycleState = Unprovisioned
85,079 UART: [state] DebugLocked = No
85,723 UART: [state] WD Timer not started. Device not locked for debugging
87,082 UART: [kat] SHA2-256
890,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,761 UART: [kat] ++
894,913 UART: [kat] sha1
899,199 UART: [kat] SHA2-256
901,139 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,171 UART: [cold-reset] ++
1,169,593 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,181,229 UART: [idev] Erasing UDS.KEYID = 0
1,198,113 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,114 UART: [ldev] ++
1,208,282 UART: [ldev] CDI.KEYID = 6
1,208,646 UART: [ldev] SUBJECT.KEYID = 5
1,209,073 UART: [ldev] AUTHORITY.KEYID = 7
1,209,536 UART: [ldev] FE.KEYID = 1
1,214,426 UART: [ldev] Erasing FE.KEYID = 1
1,240,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,982 UART: [ldev] --
1,280,410 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x4d454153
1,285,248 >>> mbox cmd response data (12 bytes)
1,285,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,536 UART: [fwproc] Recv command 0x4d454153
1,289,563 >>> mbox cmd response data (12 bytes)
1,289,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,869 UART: [fwproc] Recv command 0x4d454153
1,293,896 >>> mbox cmd response data (12 bytes)
1,293,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,030 UART: [fwproc] Recv command 0x4d454153
1,298,057 >>> mbox cmd response data (12 bytes)
1,298,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,181 UART: [fwproc] Recv command 0x4d454153
1,302,208 >>> mbox cmd response data (12 bytes)
1,302,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,340 UART: [fwproc] Recv command 0x4d454153
1,306,367 >>> mbox cmd response data (12 bytes)
1,306,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,583 UART: [fwproc] Recv command 0x4d454153
1,310,610 >>> mbox cmd response data (12 bytes)
1,310,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,900 UART: [fwproc] Recv command 0x4d454153
1,314,927 >>> mbox cmd response data (12 bytes)
1,314,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,131 UART: [fwproc] Recv command 0x4d454153
1,315,874 UART: [fwproc] Max # of measurements received.
1,316,519 >>> mbox cmd response: failed
1,316,921 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,040 >>> mbox cmd response data (12 bytes)
1,140,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,428 >>> mbox cmd response data (12 bytes)
1,143,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,036 >>> mbox cmd response data (12 bytes)
1,147,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,534 >>> mbox cmd response data (12 bytes)
1,150,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,056 >>> mbox cmd response data (12 bytes)
1,154,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,438 >>> mbox cmd response data (12 bytes)
1,157,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,960 >>> mbox cmd response data (12 bytes)
1,160,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,396 >>> mbox cmd response data (12 bytes)
1,164,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,710 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,181,914 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,329 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x4d454153
1,286,467 >>> mbox cmd response data (12 bytes)
1,286,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,711 UART: [fwproc] Recv command 0x4d454153
1,290,738 >>> mbox cmd response data (12 bytes)
1,290,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,888 UART: [fwproc] Recv command 0x4d454153
1,294,915 >>> mbox cmd response data (12 bytes)
1,294,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,175 UART: [fwproc] Recv command 0x4d454153
1,299,202 >>> mbox cmd response data (12 bytes)
1,299,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,358 UART: [fwproc] Recv command 0x4d454153
1,303,385 >>> mbox cmd response data (12 bytes)
1,303,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,641 UART: [fwproc] Recv command 0x4d454153
1,307,668 >>> mbox cmd response data (12 bytes)
1,307,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,826 UART: [fwproc] Recv command 0x4d454153
1,311,853 >>> mbox cmd response data (12 bytes)
1,311,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,079 UART: [fwproc] Recv command 0x4d454153
1,316,106 >>> mbox cmd response data (12 bytes)
1,316,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,354 UART: [fwproc] Recv command 0x4d454153
1,317,097 UART: [fwproc] Max # of measurements received.
1,317,742 >>> mbox cmd response: failed
1,318,014 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,309 >>> mbox cmd response data (12 bytes)
1,139,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,693 >>> mbox cmd response data (12 bytes)
1,142,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,255 >>> mbox cmd response data (12 bytes)
1,146,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,859 >>> mbox cmd response data (12 bytes)
1,149,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,451 >>> mbox cmd response data (12 bytes)
1,153,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,987 >>> mbox cmd response data (12 bytes)
1,156,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,443 >>> mbox cmd response data (12 bytes)
1,160,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,007 >>> mbox cmd response data (12 bytes)
1,164,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,181 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,722 UART: [ldev] --
1,281,160 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,123 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,562 >>> mbox cmd response: success
2,740,651 UART: [afmc] ++
2,740,819 UART: [afmc] CDI.KEYID = 6
2,741,182 UART: [afmc] SUBJECT.KEYID = 7
2,741,608 UART: [afmc] AUTHORITY.KEYID = 5
2,777,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,510 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,206 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,105 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,798 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,522 UART: [afmc] --
2,820,612 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,820,634 UART: [cold-reset] --
2,821,428 UART: [state] Locking Datavault
2,822,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,023 UART: [state] Locking ICCM
2,823,447 UART: [exit] Launching FMC @ 0x40000000
2,828,744 UART:
2,828,760 UART: Running Caliptra FMC ...
2,829,168 UART:
2,829,398 UART: [fmc] Received command: 0x10000009
2,830,596 >>> mbox cmd response data (48 bytes)
2,830,597 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,626 UART: [fmc] Received command: 0x1000000A
2,831,366 >>> mbox cmd response data (0 bytes)
2,831,367 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,396 UART: [fmc] Received command: 0x10000003
2,840,852 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,039 >>> mbox cmd response: success
2,645,294 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,651,415 UART:
2,651,431 UART: Running Caliptra FMC ...
2,651,839 UART:
2,652,069 UART: [fmc] Received command: 0x10000009
2,653,267 >>> mbox cmd response data (48 bytes)
2,653,268 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,297 UART: [fmc] Received command: 0x1000000A
2,654,037 >>> mbox cmd response data (0 bytes)
2,654,038 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,067 UART: [fmc] Received command: 0x10000003
2,663,523 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,921 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,686 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,752 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,913 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,265 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,641 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,160 >>> mbox cmd response: success
2,743,323 UART: [afmc] ++
2,743,491 UART: [afmc] CDI.KEYID = 6
2,743,854 UART: [afmc] SUBJECT.KEYID = 7
2,744,280 UART: [afmc] AUTHORITY.KEYID = 5
2,779,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,702 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,398 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,297 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,990 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,010 UART: [afmc] --
2,823,076 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,098 UART: [cold-reset] --
2,824,012 UART: [state] Locking Datavault
2,825,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,687 UART: [state] Locking ICCM
2,826,301 UART: [exit] Launching FMC @ 0x40000000
2,831,598 UART:
2,831,614 UART: Running Caliptra FMC ...
2,832,022 UART:
2,832,252 UART: [fmc] Received command: 0x10000009
2,833,450 >>> mbox cmd response data (48 bytes)
2,833,451 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,480 UART: [fmc] Received command: 0x1000000A
2,834,220 >>> mbox cmd response data (0 bytes)
2,834,221 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,250 UART: [fmc] Received command: 0x10000003
2,843,706 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,644 >>> mbox cmd response: success
2,647,099 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,254 UART:
2,653,270 UART: Running Caliptra FMC ...
2,653,678 UART:
2,653,908 UART: [fmc] Received command: 0x10000009
2,655,106 >>> mbox cmd response data (48 bytes)
2,655,107 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,136 UART: [fmc] Received command: 0x1000000A
2,655,876 >>> mbox cmd response data (0 bytes)
2,655,877 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,655,906 UART: [fmc] Received command: 0x10000003
2,665,362 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
85,913 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,426 UART: [kat] HMAC-384Kdf
919,954 UART: [kat] LMS
1,168,266 UART: [kat] --
1,169,051 UART: [cold-reset] ++
1,169,381 UART: [fht] FHT @ 0x50003400
1,172,081 UART: [idev] ++
1,172,249 UART: [idev] CDI.KEYID = 6
1,172,610 UART: [idev] SUBJECT.KEYID = 7
1,173,035 UART: [idev] UDS.KEYID = 0
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,215 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,240,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,338 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,142 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,561 >>> mbox cmd response: success
2,740,706 UART: [afmc] ++
2,740,874 UART: [afmc] CDI.KEYID = 6
2,741,237 UART: [afmc] SUBJECT.KEYID = 7
2,741,663 UART: [afmc] AUTHORITY.KEYID = 5
2,776,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,245 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,941 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,840 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,533 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,559 UART: [afmc] --
2,820,475 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,820,497 UART: [cold-reset] --
2,821,427 UART: [state] Locking Datavault
2,822,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,182 UART: [state] Locking ICCM
2,823,642 UART: [exit] Launching FMC @ 0x40000000
2,828,939 UART:
2,828,955 UART: Running Caliptra FMC ...
2,829,363 UART:
2,829,593 UART: [fmc] Received command: 0x10000009
2,830,791 >>> mbox cmd response data (48 bytes)
2,830,792 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,821 UART: [fmc] Received command: 0x1000000A
2,831,561 >>> mbox cmd response data (0 bytes)
2,831,562 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,591 UART: [fmc] Received command: 0x10000003
2,841,047 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,607 >>> mbox cmd response: success
2,645,840 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,651,587 UART:
2,651,603 UART: Running Caliptra FMC ...
2,652,011 UART:
2,652,241 UART: [fmc] Received command: 0x10000009
2,653,439 >>> mbox cmd response data (48 bytes)
2,653,440 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,469 UART: [fmc] Received command: 0x1000000A
2,654,209 >>> mbox cmd response data (0 bytes)
2,654,210 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,239 UART: [fmc] Received command: 0x10000003
2,663,695 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,339 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,439 UART: [fwproc] Wait for Commands...
1,282,214 UART: [fwproc] Recv command 0x46574c44
1,282,947 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,397 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,946 >>> mbox cmd response: success
2,743,207 UART: [afmc] ++
2,743,375 UART: [afmc] CDI.KEYID = 6
2,743,738 UART: [afmc] SUBJECT.KEYID = 7
2,744,164 UART: [afmc] AUTHORITY.KEYID = 5
2,779,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,956 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,652 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,551 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,244 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,122 UART: [afmc] --
2,822,992 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,014 UART: [cold-reset] --
2,824,056 UART: [state] Locking Datavault
2,825,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,621 UART: [state] Locking ICCM
2,826,097 UART: [exit] Launching FMC @ 0x40000000
2,831,394 UART:
2,831,410 UART: Running Caliptra FMC ...
2,831,818 UART:
2,832,048 UART: [fmc] Received command: 0x10000009
2,833,246 >>> mbox cmd response data (48 bytes)
2,833,247 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,276 UART: [fmc] Received command: 0x1000000A
2,834,016 >>> mbox cmd response data (0 bytes)
2,834,017 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,046 UART: [fmc] Received command: 0x10000003
2,843,502 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,800 >>> mbox cmd response: success
2,648,383 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,578 UART:
2,654,594 UART: Running Caliptra FMC ...
2,655,002 UART:
2,655,232 UART: [fmc] Received command: 0x10000009
2,656,430 >>> mbox cmd response data (48 bytes)
2,656,431 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,460 UART: [fmc] Received command: 0x1000000A
2,657,200 >>> mbox cmd response data (0 bytes)
2,657,201 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,230 UART: [fmc] Received command: 0x10000003
2,666,686 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,173,059 UART: [idev] ++
1,173,227 UART: [idev] CDI.KEYID = 6
1,173,588 UART: [idev] SUBJECT.KEYID = 7
1,174,013 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,213 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,502 UART: [fwproc] Wait for Commands...
1,281,321 UART: [fwproc] Recv command 0x46574c44
1,282,054 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,342 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,763 >>> mbox cmd response: success
2,741,012 UART: [afmc] ++
2,741,180 UART: [afmc] CDI.KEYID = 6
2,741,543 UART: [afmc] SUBJECT.KEYID = 7
2,741,969 UART: [afmc] AUTHORITY.KEYID = 5
2,777,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,455 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,151 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,050 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,743 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,425 UART: [afmc] --
2,820,359 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,820,381 UART: [cold-reset] --
2,821,345 UART: [state] Locking Datavault
2,822,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,312 UART: [state] Locking ICCM
2,823,886 UART: [exit] Launching FMC @ 0x40000000
2,829,183 UART:
2,829,199 UART: Running Caliptra FMC ...
2,829,607 UART:
2,829,837 UART: [fmc] Received command: 0x10000009
2,831,035 >>> mbox cmd response data (48 bytes)
2,831,036 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,831,065 UART: [fmc] Received command: 0x1000000A
2,831,805 >>> mbox cmd response data (0 bytes)
2,831,806 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,835 UART: [fmc] Received command: 0x10000003
2,841,291 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,389 >>> mbox cmd response: success
2,646,130 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,307 UART:
2,652,323 UART: Running Caliptra FMC ...
2,652,731 UART:
2,652,961 UART: [fmc] Received command: 0x10000009
2,654,159 >>> mbox cmd response data (48 bytes)
2,654,160 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,189 UART: [fmc] Received command: 0x1000000A
2,654,929 >>> mbox cmd response data (0 bytes)
2,654,930 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,959 UART: [fmc] Received command: 0x10000003
2,664,415 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,215 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,815 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,242 >>> mbox cmd response: success
2,742,469 UART: [afmc] ++
2,742,637 UART: [afmc] CDI.KEYID = 6
2,743,000 UART: [afmc] SUBJECT.KEYID = 7
2,743,426 UART: [afmc] AUTHORITY.KEYID = 5
2,779,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,510 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,206 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,105 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,798 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,590 UART: [afmc] --
2,822,600 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,622 UART: [cold-reset] --
2,823,272 UART: [state] Locking Datavault
2,824,245 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,849 UART: [state] Locking ICCM
2,825,277 UART: [exit] Launching FMC @ 0x40000000
2,830,574 UART:
2,830,590 UART: Running Caliptra FMC ...
2,830,998 UART:
2,831,228 UART: [fmc] Received command: 0x10000009
2,832,426 >>> mbox cmd response data (48 bytes)
2,832,427 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,456 UART: [fmc] Received command: 0x1000000A
2,833,196 >>> mbox cmd response data (0 bytes)
2,833,197 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,226 UART: [fmc] Received command: 0x10000003
2,842,682 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,590 >>> mbox cmd response: success
2,648,313 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,408 UART:
2,654,424 UART: Running Caliptra FMC ...
2,654,832 UART:
2,655,062 UART: [fmc] Received command: 0x10000009
2,656,260 >>> mbox cmd response data (48 bytes)
2,656,261 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,290 UART: [fmc] Received command: 0x1000000A
2,657,030 >>> mbox cmd response data (0 bytes)
2,657,031 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,060 UART: [fmc] Received command: 0x10000003
2,666,516 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x4d454153
1,286,418 >>> mbox cmd response data (12 bytes)
1,286,419 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,656 UART: [fwproc] Recv command 0x46574c44
1,287,389 UART: [fwproc] Recv'd Img size: 111916 bytes
2,555,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,909 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,408 >>> mbox cmd response: success
2,745,609 UART: [afmc] ++
2,745,777 UART: [afmc] CDI.KEYID = 6
2,746,140 UART: [afmc] SUBJECT.KEYID = 7
2,746,566 UART: [afmc] AUTHORITY.KEYID = 5
2,781,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,902 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,598 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,497 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,190 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,870 UART: [afmc] --
2,824,858 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,880 UART: [cold-reset] --
2,825,798 UART: [state] Locking Datavault
2,826,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,557 UART: [state] Locking ICCM
2,828,073 UART: [exit] Launching FMC @ 0x40000000
2,833,370 UART:
2,833,386 UART: Running Caliptra FMC ...
2,833,794 UART:
2,834,024 UART: [fmc] Received command: 0x1000000A
2,835,453 >>> mbox cmd response data (116 bytes)
2,835,454 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,483 UART: [fmc] Received command: 0x10000009
2,836,681 >>> mbox cmd response data (48 bytes)
2,836,682 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,711 UART: [fmc] Received command: 0x10000003
2,846,167 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,696 >>> mbox cmd response data (12 bytes)
1,137,697 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,399 >>> mbox cmd response: success
2,648,720 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,763 UART:
2,654,779 UART: Running Caliptra FMC ...
2,655,187 UART:
2,655,417 UART: [fmc] Received command: 0x1000000A
2,656,846 >>> mbox cmd response data (116 bytes)
2,656,847 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,656,876 UART: [fmc] Received command: 0x10000009
2,658,074 >>> mbox cmd response data (48 bytes)
2,658,075 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,104 UART: [fmc] Received command: 0x10000003
2,667,560 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,772 UART: [idev] ++
1,173,940 UART: [idev] CDI.KEYID = 6
1,174,301 UART: [idev] SUBJECT.KEYID = 7
1,174,726 UART: [idev] UDS.KEYID = 0
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,209,040 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,569 UART: [fwproc] Wait for Commands...
1,283,276 UART: [fwproc] Recv command 0x4d454153
1,287,303 >>> mbox cmd response data (12 bytes)
1,287,304 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,287,529 UART: [fwproc] Recv command 0x46574c44
1,288,262 UART: [fwproc] Recv'd Img size: 111916 bytes
2,557,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,682 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,746,241 >>> mbox cmd response: success
2,747,392 UART: [afmc] ++
2,747,560 UART: [afmc] CDI.KEYID = 6
2,747,923 UART: [afmc] SUBJECT.KEYID = 7
2,748,349 UART: [afmc] AUTHORITY.KEYID = 5
2,783,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,823 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,519 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,418 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,111 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,943 UART: [afmc] --
2,826,813 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,835 UART: [cold-reset] --
2,827,729 UART: [state] Locking Datavault
2,828,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,578 UART: [state] Locking ICCM
2,830,130 UART: [exit] Launching FMC @ 0x40000000
2,835,427 UART:
2,835,443 UART: Running Caliptra FMC ...
2,835,851 UART:
2,836,081 UART: [fmc] Received command: 0x1000000A
2,837,510 >>> mbox cmd response data (116 bytes)
2,837,511 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,540 UART: [fmc] Received command: 0x10000009
2,838,738 >>> mbox cmd response data (48 bytes)
2,838,739 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,768 UART: [fmc] Received command: 0x10000003
2,848,224 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,555 >>> mbox cmd response data (12 bytes)
1,140,556 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,595,722 >>> mbox cmd response: success
2,652,011 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,230 UART:
2,658,246 UART: Running Caliptra FMC ...
2,658,654 UART:
2,658,884 UART: [fmc] Received command: 0x1000000A
2,660,313 >>> mbox cmd response data (116 bytes)
2,660,314 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,343 UART: [fmc] Received command: 0x10000009
2,661,541 >>> mbox cmd response data (48 bytes)
2,661,542 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,571 UART: [fmc] Received command: 0x10000003
2,671,027 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,105 UART: [idev] Sha1 KeyId Algorithm
1,206,959 UART: [idev] --
1,208,054 UART: [ldev] ++
1,208,222 UART: [ldev] CDI.KEYID = 6
1,208,586 UART: [ldev] SUBJECT.KEYID = 5
1,209,013 UART: [ldev] AUTHORITY.KEYID = 7
1,209,476 UART: [ldev] FE.KEYID = 1
1,214,652 UART: [ldev] Erasing FE.KEYID = 1
1,240,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,990 UART: [ldev] --
1,279,466 UART: [fwproc] Wait for Commands...
1,280,111 UART: [fwproc] Recv command 0x4d454153
1,284,138 >>> mbox cmd response data (12 bytes)
1,284,139 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,284,362 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 111916 bytes
2,554,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,895 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,743,328 >>> mbox cmd response: success
2,744,437 UART: [afmc] ++
2,744,605 UART: [afmc] CDI.KEYID = 6
2,744,968 UART: [afmc] SUBJECT.KEYID = 7
2,745,394 UART: [afmc] AUTHORITY.KEYID = 5
2,780,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,788 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,484 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,383 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,076 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,904 UART: [afmc] --
2,823,882 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,823,904 UART: [cold-reset] --
2,824,598 UART: [state] Locking Datavault
2,825,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,353 UART: [state] Locking ICCM
2,826,999 UART: [exit] Launching FMC @ 0x40000000
2,832,296 UART:
2,832,312 UART: Running Caliptra FMC ...
2,832,720 UART:
2,832,950 UART: [fmc] Received command: 0x1000000A
2,834,379 >>> mbox cmd response data (116 bytes)
2,834,380 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,409 UART: [fmc] Received command: 0x10000009
2,835,607 >>> mbox cmd response data (48 bytes)
2,835,608 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,637 UART: [fmc] Received command: 0x10000003
2,845,093 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,450 >>> mbox cmd response data (12 bytes)
1,139,451 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,765 >>> mbox cmd response: success
2,649,432 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,659 UART:
2,655,675 UART: Running Caliptra FMC ...
2,656,083 UART:
2,656,313 UART: [fmc] Received command: 0x1000000A
2,657,742 >>> mbox cmd response data (116 bytes)
2,657,743 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,772 UART: [fmc] Received command: 0x10000009
2,658,970 >>> mbox cmd response data (48 bytes)
2,658,971 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,000 UART: [fmc] Received command: 0x10000003
2,668,456 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
916,931 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,782 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,208,970 UART: [idev] --
1,210,243 UART: [ldev] ++
1,210,411 UART: [ldev] CDI.KEYID = 6
1,210,775 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,509 UART: [ldev] --
1,282,915 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x4d454153
1,287,655 >>> mbox cmd response data (12 bytes)
1,287,656 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,287,835 UART: [fwproc] Recv command 0x46574c44
1,288,568 UART: [fwproc] Recv'd Img size: 111916 bytes
2,557,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,944 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,746,359 >>> mbox cmd response: success
2,747,528 UART: [afmc] ++
2,747,696 UART: [afmc] CDI.KEYID = 6
2,748,059 UART: [afmc] SUBJECT.KEYID = 7
2,748,485 UART: [afmc] AUTHORITY.KEYID = 5
2,783,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,985 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,681 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,580 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,273 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,299 UART: [afmc] --
2,827,211 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,233 UART: [cold-reset] --
2,827,959 UART: [state] Locking Datavault
2,829,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,838 UART: [state] Locking ICCM
2,830,458 UART: [exit] Launching FMC @ 0x40000000
2,835,755 UART:
2,835,771 UART: Running Caliptra FMC ...
2,836,179 UART:
2,836,409 UART: [fmc] Received command: 0x1000000A
2,837,838 >>> mbox cmd response data (116 bytes)
2,837,839 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,868 UART: [fmc] Received command: 0x10000009
2,839,066 >>> mbox cmd response data (48 bytes)
2,839,067 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,096 UART: [fmc] Received command: 0x10000003
2,848,552 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,729 >>> mbox cmd response data (12 bytes)
1,140,730 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,595,836 >>> mbox cmd response: success
2,652,397 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,666 UART:
2,658,682 UART: Running Caliptra FMC ...
2,659,090 UART:
2,659,320 UART: [fmc] Received command: 0x1000000A
2,660,749 >>> mbox cmd response data (116 bytes)
2,660,750 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,779 UART: [fmc] Received command: 0x10000009
2,661,977 >>> mbox cmd response data (48 bytes)
2,661,978 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,662,007 UART: [fmc] Received command: 0x10000003
2,671,463 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,538 UART: [state] LifecycleState = Unprovisioned
85,193 UART: [state] DebugLocked = No
85,909 UART: [state] WD Timer not started. Device not locked for debugging
87,044 UART: [kat] SHA2-256
890,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,723 UART: [kat] ++
894,875 UART: [kat] sha1
899,119 UART: [kat] SHA2-256
901,059 UART: [kat] SHA2-384
903,732 UART: [kat] SHA2-512-ACC
905,633 UART: [kat] ECC-384
915,354 UART: [kat] HMAC-384Kdf
919,914 UART: [kat] LMS
1,168,226 UART: [kat] --
1,169,155 UART: [cold-reset] ++
1,169,705 UART: [fht] FHT @ 0x50003400
1,172,509 UART: [idev] ++
1,172,677 UART: [idev] CDI.KEYID = 6
1,173,038 UART: [idev] SUBJECT.KEYID = 7
1,173,463 UART: [idev] UDS.KEYID = 0
1,181,189 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,241,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,770 UART: [ldev] --
1,280,194 UART: [fwproc] Wait for Commands...
1,280,883 UART: [fwproc] Recv command 0x4d454153
1,284,910 >>> mbox cmd response data (12 bytes)
1,284,911 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,285,128 UART: [fwproc] Recv command 0x46574c44
1,285,861 UART: [fwproc] Recv'd Img size: 111916 bytes
2,555,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,287 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,743,914 >>> mbox cmd response: success
2,745,059 UART: [afmc] ++
2,745,227 UART: [afmc] CDI.KEYID = 6
2,745,590 UART: [afmc] SUBJECT.KEYID = 7
2,746,016 UART: [afmc] AUTHORITY.KEYID = 5
2,781,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,500 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,196 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,095 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,788 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,610 UART: [afmc] --
2,824,482 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,504 UART: [cold-reset] --
2,825,328 UART: [state] Locking Datavault
2,826,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,991 UART: [state] Locking ICCM
2,827,507 UART: [exit] Launching FMC @ 0x40000000
2,832,804 UART:
2,832,820 UART: Running Caliptra FMC ...
2,833,228 UART:
2,833,458 UART: [fmc] Received command: 0x1000000A
2,834,887 >>> mbox cmd response data (116 bytes)
2,834,888 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,917 UART: [fmc] Received command: 0x10000009
2,836,115 >>> mbox cmd response data (48 bytes)
2,836,116 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,145 UART: [fmc] Received command: 0x10000003
2,845,601 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,510 >>> mbox cmd response data (12 bytes)
1,137,511 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,963 >>> mbox cmd response: success
2,648,340 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,363 UART:
2,654,379 UART: Running Caliptra FMC ...
2,654,787 UART:
2,655,017 UART: [fmc] Received command: 0x1000000A
2,656,446 >>> mbox cmd response data (116 bytes)
2,656,447 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,656,476 UART: [fmc] Received command: 0x10000009
2,657,674 >>> mbox cmd response data (48 bytes)
2,657,675 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,704 UART: [fmc] Received command: 0x10000003
2,667,160 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,452 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,713 UART: [fwproc] Wait for Commands...
1,283,350 UART: [fwproc] Recv command 0x4d454153
1,287,377 >>> mbox cmd response data (12 bytes)
1,287,378 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,287,543 UART: [fwproc] Recv command 0x46574c44
1,288,276 UART: [fwproc] Recv'd Img size: 111916 bytes
2,558,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,585,220 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,746,643 >>> mbox cmd response: success
2,747,850 UART: [afmc] ++
2,748,018 UART: [afmc] CDI.KEYID = 6
2,748,381 UART: [afmc] SUBJECT.KEYID = 7
2,748,807 UART: [afmc] AUTHORITY.KEYID = 5
2,785,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,801,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,802,681 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,808,377 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,814,276 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,819,969 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,827,745 UART: [afmc] --
2,828,779 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,828,801 UART: [cold-reset] --
2,829,635 UART: [state] Locking Datavault
2,831,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,831,706 UART: [state] Locking ICCM
2,832,328 UART: [exit] Launching FMC @ 0x40000000
2,837,625 UART:
2,837,641 UART: Running Caliptra FMC ...
2,838,049 UART:
2,838,279 UART: [fmc] Received command: 0x1000000A
2,839,708 >>> mbox cmd response data (116 bytes)
2,839,709 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,839,738 UART: [fmc] Received command: 0x10000009
2,840,936 >>> mbox cmd response data (48 bytes)
2,840,937 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,840,966 UART: [fmc] Received command: 0x10000003
2,850,422 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,715 >>> mbox cmd response data (12 bytes)
1,140,716 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,850 >>> mbox cmd response: success
2,649,639 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,098 UART:
2,656,114 UART: Running Caliptra FMC ...
2,656,522 UART:
2,656,752 UART: [fmc] Received command: 0x1000000A
2,658,181 >>> mbox cmd response data (116 bytes)
2,658,182 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,211 UART: [fmc] Received command: 0x10000009
2,659,409 >>> mbox cmd response data (48 bytes)
2,659,410 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,439 UART: [fmc] Received command: 0x10000003
2,668,895 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,608 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,135 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,315 UART: [idev] ++
1,172,483 UART: [idev] CDI.KEYID = 6
1,172,844 UART: [idev] SUBJECT.KEYID = 7
1,173,269 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,139 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,207,916 UART: [ldev] ++
1,208,084 UART: [ldev] CDI.KEYID = 6
1,208,448 UART: [ldev] SUBJECT.KEYID = 5
1,208,875 UART: [ldev] AUTHORITY.KEYID = 7
1,209,338 UART: [ldev] FE.KEYID = 1
1,214,224 UART: [ldev] Erasing FE.KEYID = 1
1,240,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,246 UART: [ldev] --
1,279,718 UART: [fwproc] Wait for Commands...
1,280,369 UART: [fwproc] Recv command 0x46574c44
1,281,098 UART: Invalid Img size: 0 bytes
1,281,770 UART: ROM Fatal Error: 0x01020002
1,282,929 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,891 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,199 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: Invalid Img size: 0 bytes
1,284,469 UART: ROM Fatal Error: 0x01020002
1,285,628 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,042 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,919 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
891,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,789 UART: [kat] ++
895,941 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,335 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,648 UART: [ldev] --
1,280,082 UART: [fwproc] Wait for Commands...
1,280,859 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: Invalid Img size: 0 bytes
1,282,598 UART: ROM Fatal Error: 0x01020002
1,283,757 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,281 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,524 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,243,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,935 UART: [fwproc] Wait for Commands...
1,283,646 UART: [fwproc] Recv command 0x46574c44
1,284,375 UART: Invalid Img size: 0 bytes
1,285,175 UART: ROM Fatal Error: 0x01020002
1,286,334 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,296 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: Invalid Img size: 0 bytes
1,283,022 UART: ROM Fatal Error: 0x01020002
1,284,181 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,987 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,801 UART: [ldev] ++
1,209,969 UART: [ldev] CDI.KEYID = 6
1,210,333 UART: [ldev] SUBJECT.KEYID = 5
1,210,760 UART: [ldev] AUTHORITY.KEYID = 7
1,211,223 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,243,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,881 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,327 UART: Invalid Img size: 0 bytes
1,285,303 UART: ROM Fatal Error: 0x01020002
1,286,462 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,212 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,206,701 UART: [idev] CSR upload begun
1,208,480 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,433 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,141 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,026 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,732 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,161 UART: [idev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
1,296,658 UART: [idev] CSR uploaded
1,299,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,872 UART: [idev] --
1,301,091 UART: [ldev] ++
1,301,259 UART: [ldev] CDI.KEYID = 6
1,301,623 UART: [ldev] SUBJECT.KEYID = 5
1,302,050 UART: [ldev] AUTHORITY.KEYID = 7
1,302,513 UART: [ldev] FE.KEYID = 1
1,307,821 UART: [ldev] Erasing FE.KEYID = 1
1,333,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,459 UART: [ldev] --
1,372,765 UART: [fwproc] Wait for Commands...
1,373,474 UART: [fwproc] Recv command 0x46574c44
1,374,207 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,444 >>> mbox cmd response: success
2,865,701 UART: [afmc] ++
2,865,869 UART: [afmc] CDI.KEYID = 6
2,866,232 UART: [afmc] SUBJECT.KEYID = 7
2,866,658 UART: [afmc] AUTHORITY.KEYID = 5
2,902,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,114 UART: [afmc] --
2,946,232 UART: [cold-reset] --
2,946,888 UART: [state] Locking Datavault
2,947,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,509 UART: [state] Locking ICCM
2,949,035 UART: [exit] Launching FMC @ 0x40000130
2,954,364 UART:
2,954,380 UART: Running Caliptra FMC ...
2,954,788 UART:
2,954,842 UART: [state] CFI Enabled
2,965,149 UART: [fht] FMC Alias Private Key: 7
3,073,096 UART: [art] Extend RT PCRs Done
3,073,524 UART: [art] Lock RT PCRs Done
3,074,824 UART: [art] Populate DV Done
3,082,953 UART: [fht] FMC Alias Private Key: 7
3,083,977 UART: [art] Derive CDI
3,084,257 UART: [art] Store in in slot 0x4
3,169,986 UART: [art] Derive Key Pair
3,170,346 UART: [art] Store priv key in slot 0x5
3,183,752 UART: [art] Derive Key Pair - Done
3,198,638 UART: [art] Signing Cert with AUTHO
3,199,118 UART: RITY.KEYID = 7
3,214,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,345 UART: [art] PUB.X = 4B0194335BFA76C9E6718BEFB3550D11E5EAC262DA005D365300F7AB61A58799C539FCE5069A1587C658F19E59073205
3,222,054 UART: [art] PUB.Y = 59AF05416E5D4D9868593EF247C6F5AF6C9E5845D8A4406284C6C4230F83937DD076CA326D5454AAD0EB0D0277B227BF
3,228,994 UART: [art] SIG.R = 26A322EA21819875C38B084B7410F941488AAD6F168512AF60B8174B7BB1F7F49991E8F683B091A403598D8895E73410
3,235,746 UART: [art] SIG.S = A328F8B104B465980DB86376B80881836FA3E93C670880DC0BA65ED7B0527A216285013434980B03859492D45CF66FC3
3,259,651 UART: Caliptra RT
3,259,904 UART: [state] CFI Enabled
3,367,353 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,143 >>> mbox cmd response: success
2,703,235 UART:
2,703,251 UART: Running Caliptra FMC ...
2,703,659 UART:
2,703,713 UART: [state] CFI Enabled
2,714,368 UART: [fht] FMC Alias Private Key: 7
2,822,335 UART: [art] Extend RT PCRs Done
2,822,763 UART: [art] Lock RT PCRs Done
2,824,287 UART: [art] Populate DV Done
2,832,346 UART: [fht] FMC Alias Private Key: 7
2,833,404 UART: [art] Derive CDI
2,833,684 UART: [art] Store in in slot 0x4
2,918,893 UART: [art] Derive Key Pair
2,919,253 UART: [art] Store priv key in slot 0x5
2,932,103 UART: [art] Derive Key Pair - Done
2,946,552 UART: [art] Signing Cert with AUTHO
2,947,032 UART: RITY.KEYID = 7
2,961,720 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,485 UART: [art] PUB.X = CEE1DB105A122A2B8457CAF262D4162E0F5CBF5B5308AE4D93E08C85C916D2DD411E076737A3D266F9F73C5C18502A3E
2,969,256 UART: [art] PUB.Y = 685AADCF0CFE10803CB6E882F02588DD1A00A99485BB93ACF95406E06228DDE8F3CB7393D927449A463AC99A8BF612C9
2,976,188 UART: [art] SIG.R = F53DEBB4519DF7B0CC6FB3E9A38B0DE8AE1D077BBDEEA0E8E21E1D954C05B386BB172FC2450A81B4DAE78A78C5611556
2,982,970 UART: [art] SIG.S = 1159624D38B9995B6195F13F0F3CC419041D42D95C9332465CDD517F2E6D5D0042260DC6CC8AEFD998E8B627312385B9
3,006,536 UART: Caliptra RT
3,006,789 UART: [state] CFI Enabled
3,115,232 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,381 UART: [kat] SHA2-256
890,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,060 UART: [kat] ++
895,212 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,161 UART: [kat] SHA2-512-ACC
906,062 UART: [kat] ECC-384
915,541 UART: [kat] HMAC-384Kdf
920,219 UART: [kat] LMS
1,168,531 UART: [kat] --
1,169,218 UART: [cold-reset] ++
1,169,668 UART: [fht] FHT @ 0x50003400
1,172,268 UART: [idev] ++
1,172,436 UART: [idev] CDI.KEYID = 6
1,172,797 UART: [idev] SUBJECT.KEYID = 7
1,173,222 UART: [idev] UDS.KEYID = 0
1,181,084 UART: [idev] Erasing UDS.KEYID = 0
1,198,276 UART: [idev] Sha1 KeyId Algorithm
1,206,624 UART: [idev] CSR upload begun
1,208,403 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,072 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,780 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,665 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,371 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,800 UART: [idev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
1,296,297 UART: [idev] CSR uploaded
1,299,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,511 UART: [idev] --
1,300,616 UART: [ldev] ++
1,300,784 UART: [ldev] CDI.KEYID = 6
1,301,148 UART: [ldev] SUBJECT.KEYID = 5
1,301,575 UART: [ldev] AUTHORITY.KEYID = 7
1,302,038 UART: [ldev] FE.KEYID = 1
1,307,364 UART: [ldev] Erasing FE.KEYID = 1
1,334,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,172 UART: [ldev] --
1,373,658 UART: [fwproc] Wait for Commands...
1,374,257 UART: [fwproc] Recv command 0x46574c44
1,374,990 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,377 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,319 >>> mbox cmd response: success
2,866,390 UART: [afmc] ++
2,866,558 UART: [afmc] CDI.KEYID = 6
2,866,921 UART: [afmc] SUBJECT.KEYID = 7
2,867,347 UART: [afmc] AUTHORITY.KEYID = 5
2,902,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,497 UART: [afmc] --
2,945,617 UART: [cold-reset] --
2,946,497 UART: [state] Locking Datavault
2,947,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,210 UART: [state] Locking ICCM
2,948,762 UART: [exit] Launching FMC @ 0x40000130
2,954,091 UART:
2,954,107 UART: Running Caliptra FMC ...
2,954,515 UART:
2,954,658 UART: [state] CFI Enabled
2,965,387 UART: [fht] FMC Alias Private Key: 7
3,073,348 UART: [art] Extend RT PCRs Done
3,073,776 UART: [art] Lock RT PCRs Done
3,075,110 UART: [art] Populate DV Done
3,083,431 UART: [fht] FMC Alias Private Key: 7
3,084,413 UART: [art] Derive CDI
3,084,693 UART: [art] Store in in slot 0x4
3,170,268 UART: [art] Derive Key Pair
3,170,628 UART: [art] Store priv key in slot 0x5
3,183,650 UART: [art] Derive Key Pair - Done
3,198,561 UART: [art] Signing Cert with AUTHO
3,199,041 UART: RITY.KEYID = 7
3,213,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,746 UART: [art] PUB.X = 5ACD84BBFA295BBCA8D348CECE6A6A05714312AFFAFFE435F59ABE0591FE2C3ECE440B43112B14B59E54DD471657CF50
3,221,531 UART: [art] PUB.Y = 959F35E64A658F358356D3866F0B27FB9179D1E06B790E7750D60B2980AD7AA63832388DDCCFA46AE588028B9334FED4
3,228,469 UART: [art] SIG.R = 29BB66AB654F65715AA3CCBCCC4DC80E16369B982886729DEF32513EFFF12E7080B267FAB1332EADD67881A86AA69BD7
3,235,250 UART: [art] SIG.S = A1523276B4E45486926A2998B3FD38A428F06BC3A38C05545F5310B7B1EF465AF0147ECAA47EA4524A61765CE81408C3
3,259,221 UART: Caliptra RT
3,259,566 UART: [state] CFI Enabled
3,366,985 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,963 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,986 >>> mbox cmd response: success
2,705,008 UART:
2,705,024 UART: Running Caliptra FMC ...
2,705,432 UART:
2,705,575 UART: [state] CFI Enabled
2,716,164 UART: [fht] FMC Alias Private Key: 7
2,824,031 UART: [art] Extend RT PCRs Done
2,824,459 UART: [art] Lock RT PCRs Done
2,826,133 UART: [art] Populate DV Done
2,834,396 UART: [fht] FMC Alias Private Key: 7
2,835,338 UART: [art] Derive CDI
2,835,618 UART: [art] Store in in slot 0x4
2,921,327 UART: [art] Derive Key Pair
2,921,687 UART: [art] Store priv key in slot 0x5
2,934,561 UART: [art] Derive Key Pair - Done
2,949,075 UART: [art] Signing Cert with AUTHO
2,949,555 UART: RITY.KEYID = 7
2,965,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,800 UART: [art] PUB.X = 7824405D26A9BFF656E4B0C3590D04A8AB085F7EACCDD211E7527884561B8EACD204EEB580B166286D5A2EF6CDDF48A3
2,972,572 UART: [art] PUB.Y = 9EBFDB799FB27A233C2EA31D8ADEE4708DD123F1C54B55F0974B8124DA1181D6057950BCFFCE12FD8486602B027B610D
2,979,525 UART: [art] SIG.R = 738D4CD06DC4893DF9571EBD43B76E77FC07BA8FD20A6A87EC67D76FDDF76E0392F133D581E8F7E4C7A359F2F3298798
2,986,298 UART: [art] SIG.S = F2780F95BA18FB7B09717F8AA48FAF92208E6633D79F1BDEA0665C9ABC9B93F0AC70D993C41DA99C0DC722C7B9C1120C
3,010,357 UART: Caliptra RT
3,010,702 UART: [state] CFI Enabled
3,117,855 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,206,831 UART: [idev] CSR upload begun
1,208,610 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,297 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,005 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,890 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,596 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,025 UART: [idev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
1,296,522 UART: [idev] CSR uploaded
1,299,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,736 UART: [idev] --
1,300,897 UART: [ldev] ++
1,301,065 UART: [ldev] CDI.KEYID = 6
1,301,429 UART: [ldev] SUBJECT.KEYID = 5
1,301,856 UART: [ldev] AUTHORITY.KEYID = 7
1,302,319 UART: [ldev] FE.KEYID = 1
1,307,195 UART: [ldev] Erasing FE.KEYID = 1
1,333,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,633 UART: [ldev] --
1,373,123 UART: [fwproc] Wait for Commands...
1,373,838 UART: [fwproc] Recv command 0x46574c44
1,374,571 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,280 >>> mbox cmd response: success
2,864,379 UART: [afmc] ++
2,864,547 UART: [afmc] CDI.KEYID = 6
2,864,910 UART: [afmc] SUBJECT.KEYID = 7
2,865,336 UART: [afmc] AUTHORITY.KEYID = 5
2,900,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,542 UART: [afmc] --
2,943,578 UART: [cold-reset] --
2,944,686 UART: [state] Locking Datavault
2,945,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,397 UART: [state] Locking ICCM
2,946,975 UART: [exit] Launching FMC @ 0x40000130
2,952,304 UART:
2,952,320 UART: Running Caliptra FMC ...
2,952,728 UART:
2,952,782 UART: [state] CFI Enabled
2,963,119 UART: [fht] FMC Alias Private Key: 7
3,070,538 UART: [art] Extend RT PCRs Done
3,070,966 UART: [art] Lock RT PCRs Done
3,072,330 UART: [art] Populate DV Done
3,080,651 UART: [fht] FMC Alias Private Key: 7
3,081,747 UART: [art] Derive CDI
3,082,027 UART: [art] Store in in slot 0x4
3,167,896 UART: [art] Derive Key Pair
3,168,256 UART: [art] Store priv key in slot 0x5
3,181,900 UART: [art] Derive Key Pair - Done
3,196,710 UART: [art] Signing Cert with AUTHO
3,197,190 UART: RITY.KEYID = 7
3,212,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,967 UART: [art] PUB.X = F8B29663427978467D4C97E52BF888538901C39EF86EC9C8FA937F4717F64D14435EB077CECB802C20D81C5CAF21EAAF
3,219,740 UART: [art] PUB.Y = E0D94FBF4A28FA523B1C83191492E3E37F34362E009C1DE75112E20DABE86436BA9AAB7CCA43C52025802112E5860E03
3,226,663 UART: [art] SIG.R = 683A691A67CC9DE2F3A700E24467E2175652F86B3C9DC5125AE6E21F07E6FBCD3B9FD2B4D4358C4E98C4D7123011F2FD
3,233,418 UART: [art] SIG.S = 5205ED05B181D2A5C96199FCC213AABAED0504625D8660310BDD6CC417F3D5A9BF90CF81F5569162DBC0F6151AA707A1
3,257,965 UART: Caliptra RT
3,258,218 UART: [state] CFI Enabled
3,365,603 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,067 >>> mbox cmd response: success
2,701,953 UART:
2,701,969 UART: Running Caliptra FMC ...
2,702,377 UART:
2,702,431 UART: [state] CFI Enabled
2,713,242 UART: [fht] FMC Alias Private Key: 7
2,821,785 UART: [art] Extend RT PCRs Done
2,822,213 UART: [art] Lock RT PCRs Done
2,823,855 UART: [art] Populate DV Done
2,832,130 UART: [fht] FMC Alias Private Key: 7
2,833,164 UART: [art] Derive CDI
2,833,444 UART: [art] Store in in slot 0x4
2,919,365 UART: [art] Derive Key Pair
2,919,725 UART: [art] Store priv key in slot 0x5
2,932,695 UART: [art] Derive Key Pair - Done
2,947,292 UART: [art] Signing Cert with AUTHO
2,947,772 UART: RITY.KEYID = 7
2,962,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,325 UART: [art] PUB.X = 1AA145B505AE9B70B3C8457B53AF50960BBE027CE65E25B046CFB8738818B6FE9659F4AB25E733AC5800A5E93D3B2752
2,970,070 UART: [art] PUB.Y = 92B9331478834FFF1E310CFBA10BB75679D7DA91937D9E8CDA802C03E6DF759D9380BED068226ED2B4FAD92DF6E7A8D1
2,977,025 UART: [art] SIG.R = 5A198C8679A78304E10DE3472318DB5B5E47B277FC9AF40935F28552D379E032379C2BDD239AD8BC484E39A50DB94C71
2,983,783 UART: [art] SIG.S = 51BB7FBDACC1743F7AD599E80F954CE838C0A1FED7A42D084DE7CFF05A124F80B9112CF8D5B87B1DAB7F3241B147F840
3,007,874 UART: Caliptra RT
3,008,127 UART: [state] CFI Enabled
3,116,552 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,601 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,268 UART: [idev] CSR upload begun
1,209,047 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,252 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,960 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,845 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,551 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,980 UART: [idev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
1,296,477 UART: [idev] CSR uploaded
1,299,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,691 UART: [idev] --
1,300,726 UART: [ldev] ++
1,300,894 UART: [ldev] CDI.KEYID = 6
1,301,258 UART: [ldev] SUBJECT.KEYID = 5
1,301,685 UART: [ldev] AUTHORITY.KEYID = 7
1,302,148 UART: [ldev] FE.KEYID = 1
1,307,404 UART: [ldev] Erasing FE.KEYID = 1
1,333,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,458 UART: [ldev] --
1,372,842 UART: [fwproc] Wait for Commands...
1,373,553 UART: [fwproc] Recv command 0x46574c44
1,374,286 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,735 >>> mbox cmd response: success
2,864,900 UART: [afmc] ++
2,865,068 UART: [afmc] CDI.KEYID = 6
2,865,431 UART: [afmc] SUBJECT.KEYID = 7
2,865,857 UART: [afmc] AUTHORITY.KEYID = 5
2,902,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,089 UART: [afmc] --
2,945,117 UART: [cold-reset] --
2,946,063 UART: [state] Locking Datavault
2,947,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,706 UART: [state] Locking ICCM
2,948,178 UART: [exit] Launching FMC @ 0x40000130
2,953,507 UART:
2,953,523 UART: Running Caliptra FMC ...
2,953,931 UART:
2,954,074 UART: [state] CFI Enabled
2,964,593 UART: [fht] FMC Alias Private Key: 7
3,072,998 UART: [art] Extend RT PCRs Done
3,073,426 UART: [art] Lock RT PCRs Done
3,075,058 UART: [art] Populate DV Done
3,083,137 UART: [fht] FMC Alias Private Key: 7
3,084,305 UART: [art] Derive CDI
3,084,585 UART: [art] Store in in slot 0x4
3,170,018 UART: [art] Derive Key Pair
3,170,378 UART: [art] Store priv key in slot 0x5
3,183,374 UART: [art] Derive Key Pair - Done
3,197,838 UART: [art] Signing Cert with AUTHO
3,198,318 UART: RITY.KEYID = 7
3,213,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,015 UART: [art] PUB.X = 4C124B23815E85217C8A732DBB3E8329669BC4A965F6A82412864BE46826B44EA952EB7F0C471A052F6F514B480DB191
3,220,772 UART: [art] PUB.Y = 88BF226CBF822D9EFAF31FB1F41AC3FC7C47A6654D4A8B953D057E9C4D94B09E1C67975EE0410736BD35DF2698DFF6FA
3,227,734 UART: [art] SIG.R = 00FAC231B94C4AAADCC7A2DF5D043E73CCE3EB9C514C53123201082E6787EC5D194ECCC75548BDB9020D291591CBDDD5
3,234,485 UART: [art] SIG.S = 73CE8E44A7501C412A3B9003BBB4CC595D309026AD4123990C28571DAE526C83884C90E5BDF40D255602D805135D9359
3,257,601 UART: Caliptra RT
3,257,946 UART: [state] CFI Enabled
3,365,184 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,369 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,658 >>> mbox cmd response: success
2,702,054 UART:
2,702,070 UART: Running Caliptra FMC ...
2,702,478 UART:
2,702,621 UART: [state] CFI Enabled
2,713,474 UART: [fht] FMC Alias Private Key: 7
2,821,765 UART: [art] Extend RT PCRs Done
2,822,193 UART: [art] Lock RT PCRs Done
2,824,071 UART: [art] Populate DV Done
2,832,280 UART: [fht] FMC Alias Private Key: 7
2,833,382 UART: [art] Derive CDI
2,833,662 UART: [art] Store in in slot 0x4
2,919,329 UART: [art] Derive Key Pair
2,919,689 UART: [art] Store priv key in slot 0x5
2,932,965 UART: [art] Derive Key Pair - Done
2,947,940 UART: [art] Signing Cert with AUTHO
2,948,420 UART: RITY.KEYID = 7
2,963,696 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,461 UART: [art] PUB.X = 0D757FCD977522F37A8B277D2ECBE735BFFCC49D53F60698EE5EABEDD9B2571B7A46CA866BB052B1DD588CF188CADCED
2,971,253 UART: [art] PUB.Y = 0C17A48D25C5D82028E7360DA077F550F41B9D5028385EEFC4719080A5125A2DC20E8889F6B4CAA82072C9825A4C1EA5
2,978,194 UART: [art] SIG.R = AFD21FFE0DA1DB3E119CC0AB2D7D4C8926EA7526B7F582B471C8D98D6AC78579CFB8A8EC3417823E43889E37DD02E1E7
2,984,976 UART: [art] SIG.S = BD0961F04207C446F84CF59303F456AE3D584D360FE6094F48690041BD5A0DBD125CB66046D4257BF25BFAD3EA37DA05
3,008,984 UART: Caliptra RT
3,009,329 UART: [state] CFI Enabled
3,117,715 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,952 UART: [kat] SHA2-512-ACC
906,853 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,182,383 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] CSR upload begun
1,210,164 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,889 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,597 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,482 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,188 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,617 UART: [idev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
1,298,114 UART: [idev] CSR uploaded
1,301,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,301,328 UART: [idev] --
1,302,361 UART: [ldev] ++
1,302,529 UART: [ldev] CDI.KEYID = 6
1,302,893 UART: [ldev] SUBJECT.KEYID = 5
1,303,320 UART: [ldev] AUTHORITY.KEYID = 7
1,303,783 UART: [ldev] FE.KEYID = 1
1,309,131 UART: [ldev] Erasing FE.KEYID = 1
1,335,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,101 UART: [ldev] --
1,374,609 UART: [fwproc] Wait for Commands...
1,375,404 UART: [fwproc] Recv command 0x46574c44
1,376,137 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,788 >>> mbox cmd response: success
2,866,945 UART: [afmc] ++
2,867,113 UART: [afmc] CDI.KEYID = 6
2,867,476 UART: [afmc] SUBJECT.KEYID = 7
2,867,902 UART: [afmc] AUTHORITY.KEYID = 5
2,904,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,798 UART: [afmc] --
2,947,922 UART: [cold-reset] --
2,948,744 UART: [state] Locking Datavault
2,949,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,213 UART: [state] Locking ICCM
2,950,639 UART: [exit] Launching FMC @ 0x40000130
2,955,968 UART:
2,955,984 UART: Running Caliptra FMC ...
2,956,392 UART:
2,956,446 UART: [state] CFI Enabled
2,967,041 UART: [fht] FMC Alias Private Key: 7
3,074,804 UART: [art] Extend RT PCRs Done
3,075,232 UART: [art] Lock RT PCRs Done
3,076,498 UART: [art] Populate DV Done
3,084,799 UART: [fht] FMC Alias Private Key: 7
3,085,833 UART: [art] Derive CDI
3,086,113 UART: [art] Store in in slot 0x4
3,171,598 UART: [art] Derive Key Pair
3,171,958 UART: [art] Store priv key in slot 0x5
3,185,136 UART: [art] Derive Key Pair - Done
3,200,124 UART: [art] Signing Cert with AUTHO
3,200,604 UART: RITY.KEYID = 7
3,215,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,755 UART: [art] PUB.X = ABF6F7891E47639A178817FA3ED44E0DC65CC16D7DD75265248FC6AAEC0679CCA0B9A09D07A8296828E16F0AB5FC0C89
3,223,524 UART: [art] PUB.Y = 978686411A5C77D6BA1B59601382EB7306699E243F8168AF78C1716CC9638124C6930C8818B7A0C35F1CAC703F63C520
3,230,458 UART: [art] SIG.R = 5420B86E18F67E730DBB1583E9EB8595C8F49E74BFD6C08785284C428F4720A86FB3CBFC3F110400C4401748E53009F5
3,237,195 UART: [art] SIG.S = 967CF494E59D069B629DE45375A61503DC0C7C00D45266B0F86E6C04894D63AB273E1D3AAC4C75A1E16621E45DD774B6
3,261,188 UART: Caliptra RT
3,261,441 UART: [state] CFI Enabled
3,369,244 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,102 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,427 >>> mbox cmd response: success
2,703,183 UART:
2,703,199 UART: Running Caliptra FMC ...
2,703,607 UART:
2,703,661 UART: [state] CFI Enabled
2,714,296 UART: [fht] FMC Alias Private Key: 7
2,822,095 UART: [art] Extend RT PCRs Done
2,822,523 UART: [art] Lock RT PCRs Done
2,823,937 UART: [art] Populate DV Done
2,832,198 UART: [fht] FMC Alias Private Key: 7
2,833,248 UART: [art] Derive CDI
2,833,528 UART: [art] Store in in slot 0x4
2,919,133 UART: [art] Derive Key Pair
2,919,493 UART: [art] Store priv key in slot 0x5
2,932,571 UART: [art] Derive Key Pair - Done
2,947,472 UART: [art] Signing Cert with AUTHO
2,947,952 UART: RITY.KEYID = 7
2,963,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,819 UART: [art] PUB.X = F9EB2FBB2E16B45215C62EF4729D704A45BDB8AF352260EA3287F506FF38FE1E98DED612CF2A892F6417009A2848E3E7
2,970,574 UART: [art] PUB.Y = 6873DE6A553B0C8C55144AB580D664FA8CDB69DDBE4E1EAE3909F66735D4454324DA27CEE68A85BED1F203B36ECA06D5
2,977,528 UART: [art] SIG.R = 0DEF7625BB380FD8008F2537351EA86AC3CDA8C0CFFC6EA54747C5091ADB0CDF43A5FA6EC0F3ECC1ACAD9AF1E04B0E90
2,984,293 UART: [art] SIG.S = 331D177FBD323F82D0B88C3804F8F0A61EE5AE268D541605DE129CF192AB41B1245FD3F44E6E3DE10943FA8E2E62A748
3,008,071 UART: Caliptra RT
3,008,324 UART: [state] CFI Enabled
3,116,407 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,531 UART: [kat] LMS
1,169,843 UART: [kat] --
1,170,994 UART: [cold-reset] ++
1,171,502 UART: [fht] FHT @ 0x50003400
1,174,334 UART: [idev] ++
1,174,502 UART: [idev] CDI.KEYID = 6
1,174,863 UART: [idev] SUBJECT.KEYID = 7
1,175,288 UART: [idev] UDS.KEYID = 0
1,182,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] CSR upload begun
1,210,265 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,026 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,734 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,619 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,325 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,754 UART: [idev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
1,298,251 UART: [idev] CSR uploaded
1,301,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,301,465 UART: [idev] --
1,302,498 UART: [ldev] ++
1,302,666 UART: [ldev] CDI.KEYID = 6
1,303,030 UART: [ldev] SUBJECT.KEYID = 5
1,303,457 UART: [ldev] AUTHORITY.KEYID = 7
1,303,920 UART: [ldev] FE.KEYID = 1
1,309,106 UART: [ldev] Erasing FE.KEYID = 1
1,335,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,302 UART: [ldev] --
1,374,580 UART: [fwproc] Wait for Commands...
1,375,323 UART: [fwproc] Recv command 0x46574c44
1,376,056 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,431 >>> mbox cmd response: success
2,865,470 UART: [afmc] ++
2,865,638 UART: [afmc] CDI.KEYID = 6
2,866,001 UART: [afmc] SUBJECT.KEYID = 7
2,866,427 UART: [afmc] AUTHORITY.KEYID = 5
2,901,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,267 UART: [afmc] --
2,945,369 UART: [cold-reset] --
2,946,295 UART: [state] Locking Datavault
2,947,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,150 UART: [state] Locking ICCM
2,948,782 UART: [exit] Launching FMC @ 0x40000130
2,954,111 UART:
2,954,127 UART: Running Caliptra FMC ...
2,954,535 UART:
2,954,678 UART: [state] CFI Enabled
2,965,407 UART: [fht] FMC Alias Private Key: 7
3,072,798 UART: [art] Extend RT PCRs Done
3,073,226 UART: [art] Lock RT PCRs Done
3,074,804 UART: [art] Populate DV Done
3,083,189 UART: [fht] FMC Alias Private Key: 7
3,084,343 UART: [art] Derive CDI
3,084,623 UART: [art] Store in in slot 0x4
3,170,486 UART: [art] Derive Key Pair
3,170,846 UART: [art] Store priv key in slot 0x5
3,184,200 UART: [art] Derive Key Pair - Done
3,199,126 UART: [art] Signing Cert with AUTHO
3,199,606 UART: RITY.KEYID = 7
3,214,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,759 UART: [art] PUB.X = BB6E5A99B83D1ACF0F2EC058147593794C3EC5966084EA183C5C2195CB0462E7E9ED1CBC5164D0C81023F9A2A16B5444
3,222,529 UART: [art] PUB.Y = A2EB4526A1643446ACE113FD4005B6D5BA279545CDCA497DA77760F16C76E9ED593E86650E817ADB675CC6A1340EEBFB
3,229,482 UART: [art] SIG.R = C5EA8E86D095244ECD84DCC1C9AAB721A20033154892DB534371B8607C8C39A53EC16861F2FFFACD3A7BEC620BA0741E
3,236,241 UART: [art] SIG.S = 1E5BC206A90FD28018ED2A8E7307A3D39BA2F0CC2047039D0C1DE6CD0121BAFD4662103C6121BF53DF8AE00FFE0AA9CD
3,260,150 UART: Caliptra RT
3,260,495 UART: [state] CFI Enabled
3,367,966 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,242 >>> mbox cmd response: success
2,704,172 UART:
2,704,188 UART: Running Caliptra FMC ...
2,704,596 UART:
2,704,739 UART: [state] CFI Enabled
2,715,142 UART: [fht] FMC Alias Private Key: 7
2,823,497 UART: [art] Extend RT PCRs Done
2,823,925 UART: [art] Lock RT PCRs Done
2,825,745 UART: [art] Populate DV Done
2,833,876 UART: [fht] FMC Alias Private Key: 7
2,835,002 UART: [art] Derive CDI
2,835,282 UART: [art] Store in in slot 0x4
2,921,043 UART: [art] Derive Key Pair
2,921,403 UART: [art] Store priv key in slot 0x5
2,934,755 UART: [art] Derive Key Pair - Done
2,949,489 UART: [art] Signing Cert with AUTHO
2,949,969 UART: RITY.KEYID = 7
2,965,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,880 UART: [art] PUB.X = C745A5A8621CACCAEBD843472C453EBD02C79C81B227716028644145DD42F37A74452146963B9DCF7C92EF70AA78776B
2,972,649 UART: [art] PUB.Y = 597E26418E4F71ABECB9D95265C12B367EC4995CB1B2647ED2E296BB55A605604457A24D2DD81CE6018A5B88EA6FD965
2,979,599 UART: [art] SIG.R = 9ABD069C8393465772E706C4D7CC603CFDE6C229FB337DCDAFFB7B8ACBEEB4F14E31F3B7B177B6C034BBEE26BF0B4D54
2,986,388 UART: [art] SIG.S = ED6EDD5C1C8578797C976C99F81DD4C757D5588E3009AD092A1825105CB9FA8037A5B1C129845ED3BBA34E1FBA553E26
3,010,567 UART: Caliptra RT
3,010,912 UART: [state] CFI Enabled
3,118,520 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,484 UART: [idev] CSR uploaded
1,300,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,698 UART: [idev] --
1,301,951 UART: [ldev] ++
1,302,119 UART: [ldev] CDI.KEYID = 6
1,302,483 UART: [ldev] SUBJECT.KEYID = 5
1,302,910 UART: [ldev] AUTHORITY.KEYID = 7
1,303,373 UART: [ldev] FE.KEYID = 1
1,308,561 UART: [ldev] Erasing FE.KEYID = 1
1,334,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,719 UART: [ldev] --
1,374,229 UART: [fwproc] Wait for Commands...
1,374,938 UART: [fwproc] Recv command 0x46574c44
1,375,671 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,672 >>> mbox cmd response: success
2,866,719 UART: [afmc] ++
2,866,887 UART: [afmc] CDI.KEYID = 6
2,867,250 UART: [afmc] SUBJECT.KEYID = 7
2,867,676 UART: [afmc] AUTHORITY.KEYID = 5
2,903,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,357 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,240 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,959 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,660 UART: [afmc] --
2,946,604 UART: [cold-reset] --
2,947,538 UART: [state] Locking Datavault
2,948,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,435 UART: [state] Locking ICCM
2,950,021 UART: [exit] Launching FMC @ 0x40000130
2,955,350 UART:
2,955,366 UART: Running Caliptra FMC ...
2,955,774 UART:
2,955,828 UART: [state] CFI Enabled
2,966,277 UART: [fht] FMC Alias Private Key: 7
3,073,754 UART: [art] Extend RT PCRs Done
3,074,182 UART: [art] Lock RT PCRs Done
3,075,834 UART: [art] Populate DV Done
3,084,177 UART: [fht] FMC Alias Private Key: 7
3,085,203 UART: [art] Derive CDI
3,085,483 UART: [art] Store in in slot 0x4
3,171,312 UART: [art] Derive Key Pair
3,171,672 UART: [art] Store priv key in slot 0x5
3,185,318 UART: [art] Derive Key Pair - Done
3,200,481 UART: [art] Signing Cert with AUTHO
3,200,961 UART: RITY.KEYID = 7
3,216,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,950 UART: [art] PUB.X = 976D1D0DF001D7CDAC06F4A60ECCE9CDBBA0148B820561B376FBAACD054B198FFF9A12BB5475286C8B0CD13270AE236A
3,223,721 UART: [art] PUB.Y = C9A19B2BCBE63CFC454ACC0D4F2B5BF9D48C73E0185573A5E430EAE729206F2410D6B24CE438EA5DEBD49C3B849DA10F
3,230,687 UART: [art] SIG.R = 671DF12B8EE859DBA6C437874B3B0122D0686FE4F6367B9D1DCF4BC8BD90C9F7DA48D83606DF67689EEFD689F7E80DBD
3,237,466 UART: [art] SIG.S = 6BF18115E6EA736816F2267685886C44BF6EE2AA1D42F6A67E284179EBA3B836BA557EF4D630003AEB7DDD07C7421AE0
3,261,862 UART: Caliptra RT
3,262,115 UART: [state] CFI Enabled
3,369,084 UART: [rt] RT listening for mailbox commands...
3,369,754 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,578 UART: [rt]cmd =0x4c444556, len=4
3,410,061 >>> mbox cmd response data (687 bytes)
3,410,062 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,345 UART: [rt]cmd =0x43455246, len=4
3,451,334 >>> mbox cmd response data (887 bytes)
3,451,335 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,882 UART: [rt]cmd =0x43455252, len=4
3,491,716 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,718 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,197,737 UART: [idev] Sha1 KeyId Algorithm
1,206,091 UART: [idev] CSR upload begun
1,207,870 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,415 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,123 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,008 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,714 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,143 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,295,640 UART: [idev] CSR uploaded
1,298,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,298,854 UART: [idev] --
1,299,943 UART: [ldev] ++
1,300,111 UART: [ldev] CDI.KEYID = 6
1,300,475 UART: [ldev] SUBJECT.KEYID = 5
1,300,902 UART: [ldev] AUTHORITY.KEYID = 7
1,301,365 UART: [ldev] FE.KEYID = 1
1,306,631 UART: [ldev] Erasing FE.KEYID = 1
1,333,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,541 UART: [ldev] --
1,372,923 UART: [fwproc] Wait for Commands...
1,373,726 UART: [fwproc] Recv command 0x46574c44
1,374,459 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,740 >>> mbox cmd response: success
2,865,973 UART: [afmc] ++
2,866,141 UART: [afmc] CDI.KEYID = 6
2,866,504 UART: [afmc] SUBJECT.KEYID = 7
2,866,930 UART: [afmc] AUTHORITY.KEYID = 5
2,902,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,392 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,111 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,856 UART: [afmc] --
2,945,806 UART: [cold-reset] --
2,946,744 UART: [state] Locking Datavault
2,947,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,363 UART: [state] Locking ICCM
2,948,865 UART: [exit] Launching FMC @ 0x40000130
2,954,194 UART:
2,954,210 UART: Running Caliptra FMC ...
2,954,618 UART:
2,954,672 UART: [state] CFI Enabled
2,964,877 UART: [fht] FMC Alias Private Key: 7
3,072,658 UART: [art] Extend RT PCRs Done
3,073,086 UART: [art] Lock RT PCRs Done
3,074,454 UART: [art] Populate DV Done
3,082,505 UART: [fht] FMC Alias Private Key: 7
3,083,537 UART: [art] Derive CDI
3,083,817 UART: [art] Store in in slot 0x4
3,169,692 UART: [art] Derive Key Pair
3,170,052 UART: [art] Store priv key in slot 0x5
3,183,500 UART: [art] Derive Key Pair - Done
3,198,508 UART: [art] Signing Cert with AUTHO
3,198,988 UART: RITY.KEYID = 7
3,213,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,633 UART: [art] PUB.X = 87A859B01D83D128653B8F746766BB8CDBFAF4BB8DC86E160109AB2C856BCC7200A624F8FF126D61F13D788D316059D6
3,221,381 UART: [art] PUB.Y = F1AF9095695C7C05AB48761C57CCD664D49222A2BE9FF466C1D022752138C66D1D4F5AA7604C6404F6C0C2D7499C52A1
3,228,327 UART: [art] SIG.R = AF8A751763F3AA6A1169928C1188D50212DADEC66FEAE767592B17CD428CF2DFC473CF241534519C29B726D63F64ABFB
3,235,104 UART: [art] SIG.S = 50B16C65AB5B0AB76A5EB239668EE0ABCD04486201964DBE746A58F0A3DC77ED5C1353E9CA7AC9395B9F11A560B15689
3,258,620 UART: Caliptra RT
3,258,873 UART: [state] CFI Enabled
3,367,182 UART: [rt] RT listening for mailbox commands...
3,367,852 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,664 UART: [rt]cmd =0x4c444556, len=4
3,408,045 >>> mbox cmd response data (687 bytes)
3,408,046 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,267 UART: [rt]cmd =0x43455246, len=4
3,449,132 >>> mbox cmd response data (887 bytes)
3,449,133 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,372 UART: [rt]cmd =0x43455252, len=4
3,489,248 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 928.76s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,487 UART: [art] Lock RT PCRs Done
2,822,161 UART: [art] Populate DV Done
2,830,388 UART: [fht] FMC Alias Private Key: 7
2,831,348 UART: [art] Derive CDI
2,831,628 UART: [art] Store in in slot 0x4
2,917,413 UART: [art] Derive Key Pair
2,917,773 UART: [art] Store priv key in slot 0x5
2,930,971 UART: [art] Derive Key Pair - Done
2,945,650 UART: [art] Signing Cert with AUTHO
2,946,130 UART: RITY.KEYID = 7
2,961,082 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,847 UART: [art] PUB.X = 58D4D2867DAAB250B12523605D52610D69DC743C2EBA65295B6D66E24DDFF2ABEBDF9C0F33A50EE28FCCB01240B276D6
2,968,624 UART: [art] PUB.Y = 8DF75BA49EE946030ACDF750BE62D527C586350780E65BAD8D348C6ACC11FEDEAEB3D5140BA073E7BFAFBD6E315AF741
2,975,586 UART: [art] SIG.R = 124BE7BA956390953B5BE6BFF04F7C24A7C9A253F20EECE89269076AEBC7666341658DFF862B1660922ECEC6C9BC5762
2,982,358 UART: [art] SIG.S = B884229483B482DA3DD6EA4BBADDB1F9205CDDDC26FFC790FB5099BEDEE95F568A3D1CE94ED9A160258D1E76C6CBE17D
3,006,243 UART: Caliptra RT
3,006,496 UART: [state] CFI Enabled
3,114,251 UART: [rt] RT listening for mailbox commands...
3,114,921 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,915 UART: [rt]cmd =0x4c444556, len=4
3,155,460 >>> mbox cmd response data (687 bytes)
3,155,461 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,838 UART: [rt]cmd =0x43455246, len=4
3,196,875 >>> mbox cmd response data (887 bytes)
3,196,876 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,187 UART: [rt]cmd =0x43455252, len=4
3,237,219 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,407 >>> mbox cmd response: success
2,703,803 UART:
2,703,819 UART: Running Caliptra FMC ...
2,704,227 UART:
2,704,281 UART: [state] CFI Enabled
2,714,758 UART: [fht] FMC Alias Private Key: 7
2,823,039 UART: [art] Extend RT PCRs Done
2,823,467 UART: [art] Lock RT PCRs Done
2,824,905 UART: [art] Populate DV Done
2,832,980 UART: [fht] FMC Alias Private Key: 7
2,833,970 UART: [art] Derive CDI
2,834,250 UART: [art] Store in in slot 0x4
2,919,989 UART: [art] Derive Key Pair
2,920,349 UART: [art] Store priv key in slot 0x5
2,934,247 UART: [art] Derive Key Pair - Done
2,948,765 UART: [art] Signing Cert with AUTHO
2,949,245 UART: RITY.KEYID = 7
2,964,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,340 UART: [art] PUB.X = EA5232FE28469F733C5D4C9CB7BF853EDFA34C799C6A5C188A48300B8FEFCDB26FEC8FE487B9A0E6E5F6ED11D380890A
2,972,126 UART: [art] PUB.Y = 2F97135DE53DF2309A4D19768C52AE401BC526D74D169BC3389CE6EC3BE2D167B2B8A73E5911AB2B671207984A4ABA77
2,979,079 UART: [art] SIG.R = 81B340EB88C7F96469DF4B183873CB70B49E3B6811B1154190D85D60EDEFDCD804DF5D4734FB5A884F07E789EAEE0CB5
2,985,852 UART: [art] SIG.S = A3A54F0C73AD5516AD61E2235627FF76B835D2CD624D40C3823E1E8BF16A7EE7D533A344EF0C5A59A6C42DF569C7843A
3,010,053 UART: Caliptra RT
3,010,306 UART: [state] CFI Enabled
3,118,376 UART: [rt] RT listening for mailbox commands...
3,119,046 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,794 UART: [rt]cmd =0x4c444556, len=4
3,159,259 >>> mbox cmd response data (687 bytes)
3,159,260 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,605 UART: [rt]cmd =0x43455246, len=4
3,200,592 >>> mbox cmd response data (887 bytes)
3,200,593 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,020 UART: [rt]cmd =0x43455252, len=4
3,240,903 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,761 >>> mbox cmd response: success
2,702,275 UART:
2,702,291 UART: Running Caliptra FMC ...
2,702,699 UART:
2,702,753 UART: [state] CFI Enabled
2,713,224 UART: [fht] FMC Alias Private Key: 7
2,821,791 UART: [art] Extend RT PCRs Done
2,822,219 UART: [art] Lock RT PCRs Done
2,823,567 UART: [art] Populate DV Done
2,831,578 UART: [fht] FMC Alias Private Key: 7
2,832,694 UART: [art] Derive CDI
2,832,974 UART: [art] Store in in slot 0x4
2,918,611 UART: [art] Derive Key Pair
2,918,971 UART: [art] Store priv key in slot 0x5
2,932,461 UART: [art] Derive Key Pair - Done
2,947,139 UART: [art] Signing Cert with AUTHO
2,947,619 UART: RITY.KEYID = 7
2,962,315 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,080 UART: [art] PUB.X = B5AA9B0E7D43D7A348FD3C29E9621792E110F05C29919B0DC1EE54B5E18C1D34826BE84D576C6C4F7E0FCCB2844890E5
2,969,851 UART: [art] PUB.Y = EA7753BDF8B4D01999FD1F696F08CB53DDE5A09A803AF5C6B6441ED675ED8F64C00484C76416C85323499F4995EE35BE
2,976,803 UART: [art] SIG.R = 3A2B9B8ADA8D1DEFA26C66F8464B67F1806911CB3FB05F37EADEE7D3A4AA4D73CB0F0CCEB0AA39FEE8B5F060F9FBD32D
2,983,603 UART: [art] SIG.S = E0D53A04ADE76A7E8FB242A6D21FB3BA835460579D291B8EB300BE09B8E516A985E89175A4E8B5B0833025C4B8873F9F
3,007,180 UART: Caliptra RT
3,007,433 UART: [state] CFI Enabled
3,115,048 UART: [rt] RT listening for mailbox commands...
3,115,718 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,728 UART: [rt]cmd =0x4c444556, len=4
3,156,069 >>> mbox cmd response data (687 bytes)
3,156,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,317 UART: [rt]cmd =0x43455246, len=4
3,197,410 >>> mbox cmd response data (887 bytes)
3,197,411 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,700 UART: [rt]cmd =0x43455252, len=4
3,237,522 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,625 >>> mbox cmd response: success
2,701,337 UART:
2,701,353 UART: Running Caliptra FMC ...
2,701,761 UART:
2,701,815 UART: [state] CFI Enabled
2,712,178 UART: [fht] FMC Alias Private Key: 7
2,819,401 UART: [art] Extend RT PCRs Done
2,819,829 UART: [art] Lock RT PCRs Done
2,821,485 UART: [art] Populate DV Done
2,829,952 UART: [fht] FMC Alias Private Key: 7
2,830,882 UART: [art] Derive CDI
2,831,162 UART: [art] Store in in slot 0x4
2,916,845 UART: [art] Derive Key Pair
2,917,205 UART: [art] Store priv key in slot 0x5
2,929,817 UART: [art] Derive Key Pair - Done
2,944,319 UART: [art] Signing Cert with AUTHO
2,944,799 UART: RITY.KEYID = 7
2,960,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,274 UART: [art] PUB.X = 0EBBA06C357D2E10C8212986206A6C76553D195B5F514B48E25A42D9E170B723053A20F30922F808A4605CBF2642CA3D
2,968,028 UART: [art] PUB.Y = B66440EC1AE75711A1A40C5696E983BF19B530698250A1BF48D57E26AB1B60F956DC3A884F7233C356F591984DE0F0FE
2,974,977 UART: [art] SIG.R = CC1B6BCDE3AE45DAC2EBC0E414F8F2C838990FC56AD0843F424169568568642A8C2AEFDCB778848D5E2CA9776D62027D
2,981,755 UART: [art] SIG.S = BCBBE8FFBD8B8D49C9F9885416CC2FD992A6554769D619118FA16EDF69277AE8202887EBFF4FBA8AB7D92FAB30F37E00
3,004,858 UART: Caliptra RT
3,005,111 UART: [state] CFI Enabled
3,112,571 UART: [rt] RT listening for mailbox commands...
3,113,241 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,153 UART: [rt]cmd =0x4c444556, len=4
3,153,502 >>> mbox cmd response data (687 bytes)
3,153,503 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,822 UART: [rt]cmd =0x43455246, len=4
3,194,771 >>> mbox cmd response data (887 bytes)
3,194,772 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,149 UART: [rt]cmd =0x43455252, len=4
3,234,900 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,167 >>> mbox cmd response: success
2,703,567 UART:
2,703,583 UART: Running Caliptra FMC ...
2,703,991 UART:
2,704,045 UART: [state] CFI Enabled
2,714,394 UART: [fht] FMC Alias Private Key: 7
2,822,299 UART: [art] Extend RT PCRs Done
2,822,727 UART: [art] Lock RT PCRs Done
2,824,421 UART: [art] Populate DV Done
2,832,702 UART: [fht] FMC Alias Private Key: 7
2,833,718 UART: [art] Derive CDI
2,833,998 UART: [art] Store in in slot 0x4
2,919,449 UART: [art] Derive Key Pair
2,919,809 UART: [art] Store priv key in slot 0x5
2,932,761 UART: [art] Derive Key Pair - Done
2,947,806 UART: [art] Signing Cert with AUTHO
2,948,286 UART: RITY.KEYID = 7
2,963,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,407 UART: [art] PUB.X = 29C96031CDF9C77660AAA8F039DA5FF8F7C24607F2BB023CECDF42219F8F9F273C6D07FADEEB3E1B7F31FAC26F0D9925
2,971,187 UART: [art] PUB.Y = CA117A3F9FAF7F3A2C4F527E2BA6CF34683B65CE7398258DB86695188CBB888308AD53D11F5F7605E2DD218F997EA243
2,978,139 UART: [art] SIG.R = 6DEAE8E94375DE3661F8184085F205E271B8C89A3CE308E08EB1FE8A77144C5E60F09D5EF044ADFFA8B48D9BD9586D33
2,984,915 UART: [art] SIG.S = 6AB2787B4AC298AB494F826CD9BFE171C0DB7582169C00AC1CC392AFDDFD4C132449C90C955EA364A40452C1D1A9EEA8
3,007,864 UART: Caliptra RT
3,008,117 UART: [state] CFI Enabled
3,115,750 UART: [rt] RT listening for mailbox commands...
3,116,420 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,232 UART: [rt]cmd =0x4c444556, len=4
3,156,679 >>> mbox cmd response data (687 bytes)
3,156,680 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,059 UART: [rt]cmd =0x43455246, len=4
3,197,930 >>> mbox cmd response data (887 bytes)
3,197,931 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,366 UART: [rt]cmd =0x43455252, len=4
3,238,366 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 894.02s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,881 UART: [idev] CSR uploaded
1,299,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,095 UART: [idev] --
1,301,212 UART: [ldev] ++
1,301,380 UART: [ldev] CDI.KEYID = 6
1,301,744 UART: [ldev] SUBJECT.KEYID = 5
1,302,171 UART: [ldev] AUTHORITY.KEYID = 7
1,302,634 UART: [ldev] FE.KEYID = 1
1,307,910 UART: [ldev] Erasing FE.KEYID = 1
1,334,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,194 UART: [ldev] --
1,373,484 UART: [fwproc] Wait for Commands...
1,374,215 UART: [fwproc] Recv command 0x46574c44
1,374,948 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,267 >>> mbox cmd response: success
2,866,528 UART: [afmc] ++
2,866,696 UART: [afmc] CDI.KEYID = 6
2,867,059 UART: [afmc] SUBJECT.KEYID = 7
2,867,485 UART: [afmc] AUTHORITY.KEYID = 5
2,903,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,824 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,481 UART: [afmc] --
2,946,487 UART: [cold-reset] --
2,947,119 UART: [state] Locking Datavault
2,948,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,832 UART: [state] Locking ICCM
2,949,490 UART: [exit] Launching FMC @ 0x40000130
2,954,819 UART:
2,954,835 UART: Running Caliptra FMC ...
2,955,243 UART:
2,955,386 UART: [state] CFI Enabled
2,965,687 UART: [fht] FMC Alias Private Key: 7
3,074,218 UART: [art] Extend RT PCRs Done
3,074,646 UART: [art] Lock RT PCRs Done
3,076,124 UART: [art] Populate DV Done
3,084,459 UART: [fht] FMC Alias Private Key: 7
3,085,483 UART: [art] Derive CDI
3,085,763 UART: [art] Store in in slot 0x4
3,171,162 UART: [art] Derive Key Pair
3,171,522 UART: [art] Store priv key in slot 0x5
3,184,926 UART: [art] Derive Key Pair - Done
3,199,899 UART: [art] Signing Cert with AUTHO
3,200,379 UART: RITY.KEYID = 7
3,215,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,284 UART: [art] PUB.X = 046217F9B20828D6AAE75366B9CE347FAD32B8B0319E02319D3ED10842C30FEFA34A7077DEC2D2B2789424616B6D2D28
3,223,041 UART: [art] PUB.Y = 8BB993DE40A2A91320B5DF1B36FAC849A9B7AAC8F35C24513F6289C7BA91DDAD346EBFE765AB8937CC300DF62BB100B7
3,229,986 UART: [art] SIG.R = 1B4E5896A00E924FAA182CD60C61FE7987E8CBA8DE31384A8D8DCADEF51D922A922AFACED077868D02E7527C0366E67D
3,236,760 UART: [art] SIG.S = 1BC875DC84631DC6DA11EAD818212B39F150AF93BEB419FEFE22A84C9C9FAAB9F86B3096397D14C0CE7F7ABC1D5054EE
3,259,915 UART: Caliptra RT
3,260,260 UART: [state] CFI Enabled
3,368,349 UART: [rt] RT listening for mailbox commands...
3,369,019 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,787 UART: [rt]cmd =0x4c444556, len=4
3,409,306 >>> mbox cmd response data (687 bytes)
3,409,307 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,664 UART: [rt]cmd =0x43455246, len=4
3,450,615 >>> mbox cmd response data (887 bytes)
3,450,616 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,745 UART: [rt]cmd =0x43455252, len=4
3,490,783 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,882 UART: [idev] ++
1,173,050 UART: [idev] CDI.KEYID = 6
1,173,411 UART: [idev] SUBJECT.KEYID = 7
1,173,836 UART: [idev] UDS.KEYID = 0
1,181,974 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] CSR upload begun
1,209,619 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,220 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,928 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,813 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,519 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,948 UART: [idev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
1,297,445 UART: [idev] CSR uploaded
1,300,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,659 UART: [idev] --
1,301,530 UART: [ldev] ++
1,301,698 UART: [ldev] CDI.KEYID = 6
1,302,062 UART: [ldev] SUBJECT.KEYID = 5
1,302,489 UART: [ldev] AUTHORITY.KEYID = 7
1,302,952 UART: [ldev] FE.KEYID = 1
1,308,398 UART: [ldev] Erasing FE.KEYID = 1
1,334,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,260 UART: [ldev] --
1,373,526 UART: [fwproc] Wait for Commands...
1,374,123 UART: [fwproc] Recv command 0x46574c44
1,374,856 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,781 >>> mbox cmd response: success
2,866,862 UART: [afmc] ++
2,867,030 UART: [afmc] CDI.KEYID = 6
2,867,393 UART: [afmc] SUBJECT.KEYID = 7
2,867,819 UART: [afmc] AUTHORITY.KEYID = 5
2,904,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,851 UART: [afmc] --
2,947,961 UART: [cold-reset] --
2,948,789 UART: [state] Locking Datavault
2,949,892 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,496 UART: [state] Locking ICCM
2,950,948 UART: [exit] Launching FMC @ 0x40000130
2,956,277 UART:
2,956,293 UART: Running Caliptra FMC ...
2,956,701 UART:
2,956,844 UART: [state] CFI Enabled
2,967,867 UART: [fht] FMC Alias Private Key: 7
3,075,928 UART: [art] Extend RT PCRs Done
3,076,356 UART: [art] Lock RT PCRs Done
3,077,810 UART: [art] Populate DV Done
3,085,871 UART: [fht] FMC Alias Private Key: 7
3,086,983 UART: [art] Derive CDI
3,087,263 UART: [art] Store in in slot 0x4
3,173,414 UART: [art] Derive Key Pair
3,173,774 UART: [art] Store priv key in slot 0x5
3,186,380 UART: [art] Derive Key Pair - Done
3,200,987 UART: [art] Signing Cert with AUTHO
3,201,467 UART: RITY.KEYID = 7
3,216,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,698 UART: [art] PUB.X = 9A9393FC5CFBA40A311130109E4FCFB3D80A93310F20BAD8250AA2ED498A508C13F1D9E99D8A41823E0231F33E4E4D40
3,224,461 UART: [art] PUB.Y = 6ED01DDD7D6695F4B3E244D55493C35F8688A43F69E9F76DDD82AE08E09209C1CC52A15384D7635A1B54456E8B680990
3,231,402 UART: [art] SIG.R = EF650F0AD88CDFCFDDAE5C8D060AF8C5829B37EC461B99622FA1CB9A69386CB7027E8DE86336FE0A9003393B9062255F
3,238,165 UART: [art] SIG.S = 1C2C60234AD2EE9FCDF0BE4F9E062D17B6105E05D72A8778A10BCD192ECA13ED4A58A77694D790B8D164BE3C21F54D2D
3,261,729 UART: Caliptra RT
3,262,074 UART: [state] CFI Enabled
3,369,777 UART: [rt] RT listening for mailbox commands...
3,370,447 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,239 UART: [rt]cmd =0x4c444556, len=4
3,410,584 >>> mbox cmd response data (687 bytes)
3,410,585 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,950 UART: [rt]cmd =0x43455246, len=4
3,452,103 >>> mbox cmd response data (887 bytes)
3,452,104 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,421 UART: [rt]cmd =0x43455252, len=4
3,492,265 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 907.56s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,615 UART: [art] Lock RT PCRs Done
2,826,353 UART: [art] Populate DV Done
2,834,688 UART: [fht] FMC Alias Private Key: 7
2,835,792 UART: [art] Derive CDI
2,836,072 UART: [art] Store in in slot 0x4
2,921,741 UART: [art] Derive Key Pair
2,922,101 UART: [art] Store priv key in slot 0x5
2,935,241 UART: [art] Derive Key Pair - Done
2,950,002 UART: [art] Signing Cert with AUTHO
2,950,482 UART: RITY.KEYID = 7
2,965,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,493 UART: [art] PUB.X = F05609C6657DE1E71B86C7E6FC42425EB85B387615FB7E003C4FC3EAEE9847CE49F6509F29DE627A72AD293BF4021D2C
2,973,245 UART: [art] PUB.Y = 99EAF9BA263EA71A1424884044610083F2F623FD766C787D68407F984573C2AB03E2581F28F32177F5159075AF39DACC
2,980,164 UART: [art] SIG.R = EBD36B35F08280A73AFDD339C7F2C1BA69C49F595787F4D68221E249821081BB41FD61953DA1E4A0AE4B3DA19D58DEC3
2,986,946 UART: [art] SIG.S = 1921A025B7B0377B8F20973338B292358D2B92C16662C00F510DACCFF82F87EF1E08B6B30F58A6B8D3593A174E32656A
3,010,791 UART: Caliptra RT
3,011,136 UART: [state] CFI Enabled
3,119,153 UART: [rt] RT listening for mailbox commands...
3,119,823 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,655 UART: [rt]cmd =0x4c444556, len=4
3,160,112 >>> mbox cmd response data (687 bytes)
3,160,113 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,522 UART: [rt]cmd =0x43455246, len=4
3,201,459 >>> mbox cmd response data (887 bytes)
3,201,460 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,727 UART: [rt]cmd =0x43455252, len=4
3,241,607 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,572 >>> mbox cmd response: success
2,702,974 UART:
2,702,990 UART: Running Caliptra FMC ...
2,703,398 UART:
2,703,541 UART: [state] CFI Enabled
2,714,110 UART: [fht] FMC Alias Private Key: 7
2,821,663 UART: [art] Extend RT PCRs Done
2,822,091 UART: [art] Lock RT PCRs Done
2,823,647 UART: [art] Populate DV Done
2,831,796 UART: [fht] FMC Alias Private Key: 7
2,832,746 UART: [art] Derive CDI
2,833,026 UART: [art] Store in in slot 0x4
2,918,665 UART: [art] Derive Key Pair
2,919,025 UART: [art] Store priv key in slot 0x5
2,931,879 UART: [art] Derive Key Pair - Done
2,946,481 UART: [art] Signing Cert with AUTHO
2,946,961 UART: RITY.KEYID = 7
2,961,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,718 UART: [art] PUB.X = 2D3395CDB9D68208D4C1A3B1CEB79BEBEB9815A61F6AD40032B458DD06826F40CB730E56D679310FF551204D4E74324E
2,969,460 UART: [art] PUB.Y = 15A99EB746073471CA9BDF72C989E858667B6FD315F0964A7A5B467B98D2906C3EEF9A37395EB81D4131B3421C9FFBAD
2,976,413 UART: [art] SIG.R = 2C5CB5AA04AAD6C978866758C6CB7F622968B495CC5258B43035256170C05B2D8F9D74ECC6FC21A1B05396DB1A02E6F7
2,983,183 UART: [art] SIG.S = 4AC322F99F5166C43740BFF5A1EE104E8424043ABB741872011D8183185D7BA50002C12AB8EFF1AEBBE368005108CE74
3,006,762 UART: Caliptra RT
3,007,107 UART: [state] CFI Enabled
3,114,360 UART: [rt] RT listening for mailbox commands...
3,115,030 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,796 UART: [rt]cmd =0x4c444556, len=4
3,155,121 >>> mbox cmd response data (687 bytes)
3,155,122 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,587 UART: [rt]cmd =0x43455246, len=4
3,196,628 >>> mbox cmd response data (887 bytes)
3,196,629 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,720 UART: [rt]cmd =0x43455252, len=4
3,236,762 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,870 >>> mbox cmd response: success
2,703,024 UART:
2,703,040 UART: Running Caliptra FMC ...
2,703,448 UART:
2,703,591 UART: [state] CFI Enabled
2,714,188 UART: [fht] FMC Alias Private Key: 7
2,822,395 UART: [art] Extend RT PCRs Done
2,822,823 UART: [art] Lock RT PCRs Done
2,824,309 UART: [art] Populate DV Done
2,832,848 UART: [fht] FMC Alias Private Key: 7
2,833,776 UART: [art] Derive CDI
2,834,056 UART: [art] Store in in slot 0x4
2,919,641 UART: [art] Derive Key Pair
2,920,001 UART: [art] Store priv key in slot 0x5
2,933,225 UART: [art] Derive Key Pair - Done
2,947,641 UART: [art] Signing Cert with AUTHO
2,948,121 UART: RITY.KEYID = 7
2,963,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,064 UART: [art] PUB.X = 233C63837B2B82FE27C15742E414086A6B9718A62B1BFF78F9F19DB36E17899EF4683F4F08562B5537FAC0C297DDA34B
2,970,830 UART: [art] PUB.Y = FCC1E34818817E2FDE37906EBA11232DEA113E609B851A3F3B8453A06EDA1AC258D8627950E57AC871907D6F06EC4238
2,977,781 UART: [art] SIG.R = 2CC21E1469A2DE20B81D081F3F81C673DEF255BA2743FFE6F7F6C4F741DF1442B43B5D94742D212B3FD4A1C1277F9376
2,984,556 UART: [art] SIG.S = 7BC90DCC6AA3B018024BB133DA48746103A156DBF2D78A758F5DA0432076B60040703EB15B14735AAADEE251CC161FBE
3,008,242 UART: Caliptra RT
3,008,587 UART: [state] CFI Enabled
3,116,114 UART: [rt] RT listening for mailbox commands...
3,116,784 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,706 UART: [rt]cmd =0x4c444556, len=4
3,157,141 >>> mbox cmd response data (687 bytes)
3,157,142 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,563 UART: [rt]cmd =0x43455246, len=4
3,198,618 >>> mbox cmd response data (887 bytes)
3,198,619 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,960 UART: [rt]cmd =0x43455252, len=4
3,238,864 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,484 >>> mbox cmd response: success
2,703,388 UART:
2,703,404 UART: Running Caliptra FMC ...
2,703,812 UART:
2,703,955 UART: [state] CFI Enabled
2,714,526 UART: [fht] FMC Alias Private Key: 7
2,822,431 UART: [art] Extend RT PCRs Done
2,822,859 UART: [art] Lock RT PCRs Done
2,824,471 UART: [art] Populate DV Done
2,832,698 UART: [fht] FMC Alias Private Key: 7
2,833,656 UART: [art] Derive CDI
2,833,936 UART: [art] Store in in slot 0x4
2,919,637 UART: [art] Derive Key Pair
2,919,997 UART: [art] Store priv key in slot 0x5
2,933,431 UART: [art] Derive Key Pair - Done
2,948,195 UART: [art] Signing Cert with AUTHO
2,948,675 UART: RITY.KEYID = 7
2,963,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,280 UART: [art] PUB.X = F5CB60844ACA3EB3E17F1F4A51125DC9F119E6D359664F6835098BE67B30BEA3E4DE5EC8DD627CC411814D7D4512483F
2,971,057 UART: [art] PUB.Y = 6C260BCB97804B316ED5AD15445DBAE5C93E319523F577F36D014A27E9474ABB7A3F2EE8D332A0E59FCE214D961F803D
2,978,011 UART: [art] SIG.R = D08C3607B8C26498F7846E75303363D3D274B976564112191D253D84312449E720E04D4DB6597AD24D0E202D17FEE093
2,984,761 UART: [art] SIG.S = 01C9D4ED696EB77FEA06C903FBB4719A9E2FD99395D235F50935DEF4918A81788ACF3521151A06A1FDF032E955240BC8
3,008,298 UART: Caliptra RT
3,008,643 UART: [state] CFI Enabled
3,117,060 UART: [rt] RT listening for mailbox commands...
3,117,730 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,460 UART: [rt]cmd =0x4c444556, len=4
3,158,017 >>> mbox cmd response data (687 bytes)
3,158,018 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,359 UART: [rt]cmd =0x43455246, len=4
3,199,528 >>> mbox cmd response data (887 bytes)
3,199,529 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,826 UART: [rt]cmd =0x43455252, len=4
3,239,624 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,865 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,218 >>> mbox cmd response: success
2,703,862 UART:
2,703,878 UART: Running Caliptra FMC ...
2,704,286 UART:
2,704,429 UART: [state] CFI Enabled
2,714,950 UART: [fht] FMC Alias Private Key: 7
2,822,885 UART: [art] Extend RT PCRs Done
2,823,313 UART: [art] Lock RT PCRs Done
2,824,891 UART: [art] Populate DV Done
2,833,158 UART: [fht] FMC Alias Private Key: 7
2,834,152 UART: [art] Derive CDI
2,834,432 UART: [art] Store in in slot 0x4
2,920,177 UART: [art] Derive Key Pair
2,920,537 UART: [art] Store priv key in slot 0x5
2,933,625 UART: [art] Derive Key Pair - Done
2,948,208 UART: [art] Signing Cert with AUTHO
2,948,688 UART: RITY.KEYID = 7
2,963,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,395 UART: [art] PUB.X = 0F63F9EDC9FF74549DB7F551CA0B792DB2BD519DDCF2CB6BF6F192609E5901BCB23829A5D2F5AAB040B8C80F83BBD034
2,971,175 UART: [art] PUB.Y = 7A7B3FD1EF7BDB18CD11D65E7E7241B45D685A47D58DCDEFDB56AF7B283F7367A687968ED5143A20488BF933A9C79BA7
2,978,141 UART: [art] SIG.R = F4C0D14292958D68EAD9670767D68353C7929D159287FBB61C74C6D05D174A7C99D9D688F8B8975A43717AECD5BB4C2B
2,984,910 UART: [art] SIG.S = 797B980C09743D20D8D4B05C4C52BC53391807E25DFF6D3952AAC87DA6399CECEEAD4CE701548F91B4B01EC2EF0316B3
3,009,132 UART: Caliptra RT
3,009,477 UART: [state] CFI Enabled
3,117,028 UART: [rt] RT listening for mailbox commands...
3,117,698 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,608 UART: [rt]cmd =0x4c444556, len=4
3,157,917 >>> mbox cmd response data (687 bytes)
3,157,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,049 UART: [rt]cmd =0x43455246, len=4
3,199,138 >>> mbox cmd response data (887 bytes)
3,199,139 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,484 UART: [rt]cmd =0x43455252, len=4
3,239,100 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 879.12s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,520 UART: [idev] CSR uploaded
1,300,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,734 UART: [idev] --
1,301,895 UART: [ldev] ++
1,302,063 UART: [ldev] CDI.KEYID = 6
1,302,427 UART: [ldev] SUBJECT.KEYID = 5
1,302,854 UART: [ldev] AUTHORITY.KEYID = 7
1,303,317 UART: [ldev] FE.KEYID = 1
1,308,819 UART: [ldev] Erasing FE.KEYID = 1
1,334,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,745 UART: [ldev] --
1,374,193 UART: [fwproc] Wait for Commands...
1,374,962 UART: [fwproc] Recv command 0x46574c44
1,375,695 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,866,612 >>> mbox cmd response: success
2,867,775 UART: [afmc] ++
2,867,943 UART: [afmc] CDI.KEYID = 6
2,868,306 UART: [afmc] SUBJECT.KEYID = 7
2,868,732 UART: [afmc] AUTHORITY.KEYID = 5
2,904,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,042 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,771 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,373 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,134 UART: [afmc] --
2,948,186 UART: [cold-reset] --
2,948,914 UART: [state] Locking Datavault
2,950,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,785 UART: [state] Locking ICCM
2,951,349 UART: [exit] Launching FMC @ 0x40000130
2,956,678 UART:
2,956,694 UART: Running Caliptra FMC ...
2,957,102 UART:
2,957,156 UART: [state] CFI Enabled
2,967,459 UART: [fht] FMC Alias Private Key: 7
3,075,084 UART: [art] Extend RT PCRs Done
3,075,512 UART: [art] Lock RT PCRs Done
3,077,098 UART: [art] Populate DV Done
3,085,373 UART: [fht] FMC Alias Private Key: 7
3,086,541 UART: [art] Derive CDI
3,086,821 UART: [art] Store in in slot 0x4
3,172,482 UART: [art] Derive Key Pair
3,172,842 UART: [art] Store priv key in slot 0x5
3,186,486 UART: [art] Derive Key Pair - Done
3,200,992 UART: [art] Signing Cert with AUTHO
3,201,472 UART: RITY.KEYID = 7
3,216,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,497 UART: [art] PUB.X = 9BDD0E8D4CEAB41FE05D6A99ED46CE20786FCA20CFC08F7B3C46618FD4AD84398518BB9868666011EA6E5EEC335DC91E
3,224,284 UART: [art] PUB.Y = EBC4909C042E1292BD7DD2235267B22244B3D3E1A83477F157AAF86D742E1C66305914A3E7C70E05D9629646B013C49C
3,231,221 UART: [art] SIG.R = 95821BF6277CF803121B06BA22FE0EFDFEE3D8B298BA8D1DB4F88AF4AE14F570CA06B7E90F3C352EE18ACD1816A65E4F
3,237,998 UART: [art] SIG.S = 2C3747B3B13F34A3A4BE3BD6995FCA9D83BA04D03DC0ED6D279C024054F2A3F0E4B9019693644DB0CEC0DDD49923963F
3,261,708 UART: Caliptra RT
3,261,961 UART: [state] CFI Enabled
3,369,006 UART: [rt] RT listening for mailbox commands...
3,369,676 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,532 UART: [rt]cmd =0x4c444556, len=4
3,409,867 >>> mbox cmd response data (687 bytes)
3,409,868 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,129 UART: [rt]cmd =0x43455246, len=4
3,451,064 >>> mbox cmd response data (887 bytes)
3,451,065 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,492 UART: [rt]cmd =0x43455252, len=4
3,491,278 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,495 UART: [idev] Sha1 KeyId Algorithm
1,206,731 UART: [idev] CSR upload begun
1,208,510 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,295 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,003 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,888 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,594 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,023 UART: [idev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
1,296,520 UART: [idev] CSR uploaded
1,299,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,734 UART: [idev] --
1,300,965 UART: [ldev] ++
1,301,133 UART: [ldev] CDI.KEYID = 6
1,301,497 UART: [ldev] SUBJECT.KEYID = 5
1,301,924 UART: [ldev] AUTHORITY.KEYID = 7
1,302,387 UART: [ldev] FE.KEYID = 1
1,307,491 UART: [ldev] Erasing FE.KEYID = 1
1,334,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,653 UART: [ldev] --
1,372,973 UART: [fwproc] Wait for Commands...
1,373,742 UART: [fwproc] Recv command 0x46574c44
1,374,475 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,192 >>> mbox cmd response: success
2,865,329 UART: [afmc] ++
2,865,497 UART: [afmc] CDI.KEYID = 6
2,865,860 UART: [afmc] SUBJECT.KEYID = 7
2,866,286 UART: [afmc] AUTHORITY.KEYID = 5
2,901,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,328 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,047 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,956 UART: [afmc] --
2,944,842 UART: [cold-reset] --
2,945,778 UART: [state] Locking Datavault
2,946,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,597 UART: [state] Locking ICCM
2,948,199 UART: [exit] Launching FMC @ 0x40000130
2,953,528 UART:
2,953,544 UART: Running Caliptra FMC ...
2,953,952 UART:
2,954,006 UART: [state] CFI Enabled
2,964,305 UART: [fht] FMC Alias Private Key: 7
3,072,282 UART: [art] Extend RT PCRs Done
3,072,710 UART: [art] Lock RT PCRs Done
3,074,390 UART: [art] Populate DV Done
3,082,767 UART: [fht] FMC Alias Private Key: 7
3,083,701 UART: [art] Derive CDI
3,083,981 UART: [art] Store in in slot 0x4
3,169,650 UART: [art] Derive Key Pair
3,170,010 UART: [art] Store priv key in slot 0x5
3,182,964 UART: [art] Derive Key Pair - Done
3,197,560 UART: [art] Signing Cert with AUTHO
3,198,040 UART: RITY.KEYID = 7
3,212,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,725 UART: [art] PUB.X = 6ABDD2217B569E8C725D0EF5B146B8919327E8C4165D7620CC191F1AE7EF91ABFE0385ECB3C2E3F467CB25950EEED2A7
3,220,502 UART: [art] PUB.Y = B40F8EA957BAFA805B2384D7C063166A6EB0F747A7A7370F0FB677CE72C514BB72638116A76FCEA192A354884EA93E16
3,227,449 UART: [art] SIG.R = 24DA37C9C22D7D91E7ADF9D9880EB495DEBAAB9F2666BAEF76F9620931777599E9EAE636B2C43F2EE5A23B9870146D70
3,234,225 UART: [art] SIG.S = CFC960463AC910669289E4CB8DA2AF73C9DB1A896C012D0430350E0669057F33C53C25981BF6F99B56BF51A8C30A2021
3,257,788 UART: Caliptra RT
3,258,041 UART: [state] CFI Enabled
3,365,262 UART: [rt] RT listening for mailbox commands...
3,365,932 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,748 UART: [rt]cmd =0x4c444556, len=4
3,406,183 >>> mbox cmd response data (687 bytes)
3,406,184 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,591 UART: [rt]cmd =0x43455246, len=4
3,447,846 >>> mbox cmd response data (887 bytes)
3,447,847 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,198 UART: [rt]cmd =0x43455252, len=4
3,488,150 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 890.65s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,819,607 UART: [art] Lock RT PCRs Done
2,820,695 UART: [art] Populate DV Done
2,828,854 UART: [fht] FMC Alias Private Key: 7
2,829,910 UART: [art] Derive CDI
2,830,190 UART: [art] Store in in slot 0x4
2,916,065 UART: [art] Derive Key Pair
2,916,425 UART: [art] Store priv key in slot 0x5
2,929,455 UART: [art] Derive Key Pair - Done
2,944,376 UART: [art] Signing Cert with AUTHO
2,944,856 UART: RITY.KEYID = 7
2,960,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,875 UART: [art] PUB.X = A6FF50AF201DCBF67F8655765E996FAF60BA3BEEFABBE95CCF0540300FA807750421CA525693250FF2D4498B0976257E
2,967,637 UART: [art] PUB.Y = 7A7723CC55767B9EEA2ED1EB222FD97ABCBC7FFAA781ED19AFABAEB7D5043472D2A93E666534EF56D744F27ECB55FDC1
2,974,612 UART: [art] SIG.R = 3E9AB405DAE6767131C4C5247C48C69E6CB665345B10C71B1D149CD73250034E05601329A23BC13E4CCACC383B73D658
2,981,373 UART: [art] SIG.S = 52D8B7B169DDE22AB8B334F3820349A7967DAFBBAB21B385A96AE55EB9FA0FAE3B8536620D698D39A2F278C99B60F557
3,004,765 UART: Caliptra RT
3,005,018 UART: [state] CFI Enabled
3,112,901 UART: [rt] RT listening for mailbox commands...
3,113,571 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,411 UART: [rt]cmd =0x4c444556, len=4
3,153,782 >>> mbox cmd response data (687 bytes)
3,153,783 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,022 UART: [rt]cmd =0x43455246, len=4
3,195,151 >>> mbox cmd response data (887 bytes)
3,195,152 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,609 UART: [rt]cmd =0x43455252, len=4
3,235,461 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,069 >>> mbox cmd response: success
2,703,389 UART:
2,703,405 UART: Running Caliptra FMC ...
2,703,813 UART:
2,703,867 UART: [state] CFI Enabled
2,714,634 UART: [fht] FMC Alias Private Key: 7
2,822,589 UART: [art] Extend RT PCRs Done
2,823,017 UART: [art] Lock RT PCRs Done
2,824,635 UART: [art] Populate DV Done
2,833,064 UART: [fht] FMC Alias Private Key: 7
2,834,116 UART: [art] Derive CDI
2,834,396 UART: [art] Store in in slot 0x4
2,920,183 UART: [art] Derive Key Pair
2,920,543 UART: [art] Store priv key in slot 0x5
2,933,647 UART: [art] Derive Key Pair - Done
2,948,517 UART: [art] Signing Cert with AUTHO
2,948,997 UART: RITY.KEYID = 7
2,964,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,932 UART: [art] PUB.X = CC8A12B1C32FDA57D0E1FB5E3FDA46A0B4A73BF340FD99B4DDF1024A5373A3A7F099C403DB5335ABD4A906B10582DBE1
2,971,712 UART: [art] PUB.Y = 5812CA556996125CE2B3F20184A310455EBD6424AEF2BF689C958917302E22B931CB8479FFE4A1FDFE8E23ACC0DDACC1
2,978,671 UART: [art] SIG.R = 6F444A65C6BFACD7EB703A79AC606B95321F355DB3FD37409DB6A0DEE851E845385D2CC7CC03E908235F0C40181B9CF7
2,985,444 UART: [art] SIG.S = BB93AF5141517FD0F171B90BAEB65298A07EEA159D09A0B5AE6FE4EADA4C1DD149633E43B01AF1AB7EC1738429F49BB5
3,008,925 UART: Caliptra RT
3,009,178 UART: [state] CFI Enabled
3,117,753 UART: [rt] RT listening for mailbox commands...
3,118,423 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,549 UART: [rt]cmd =0x4c444556, len=4
3,158,948 >>> mbox cmd response data (687 bytes)
3,158,949 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,438 UART: [rt]cmd =0x43455246, len=4
3,200,537 >>> mbox cmd response data (887 bytes)
3,200,538 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,781 UART: [rt]cmd =0x43455252, len=4
3,240,627 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,747 >>> mbox cmd response: success
2,701,821 UART:
2,701,837 UART: Running Caliptra FMC ...
2,702,245 UART:
2,702,299 UART: [state] CFI Enabled
2,712,950 UART: [fht] FMC Alias Private Key: 7
2,820,757 UART: [art] Extend RT PCRs Done
2,821,185 UART: [art] Lock RT PCRs Done
2,822,895 UART: [art] Populate DV Done
2,831,138 UART: [fht] FMC Alias Private Key: 7
2,832,090 UART: [art] Derive CDI
2,832,370 UART: [art] Store in in slot 0x4
2,917,763 UART: [art] Derive Key Pair
2,918,123 UART: [art] Store priv key in slot 0x5
2,930,927 UART: [art] Derive Key Pair - Done
2,945,880 UART: [art] Signing Cert with AUTHO
2,946,360 UART: RITY.KEYID = 7
2,961,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,531 UART: [art] PUB.X = F424C2FA8E6BC6D4C57884D2445AB513E70C239D65142F3DAFD65BF0F256CDC3454379743C572700204DC8FCF5567523
2,969,278 UART: [art] PUB.Y = 91064EF10A9E0F616BD44E4AE763F403C57015A513B24451584BE5428756771484038F6E91AEAD7F36905C497AEF5011
2,976,205 UART: [art] SIG.R = 258E7010FDC1729E7C6AF7E3A2E97504AEE45444A208835AF4F394A76CE14B2660D2C06A2D33777C402FDB9810473673
2,982,967 UART: [art] SIG.S = 15FF70C88188223A78D7CDFFF521D00C6FA76AA8755AD5B79565B7F7F36288EAB7561E51B5215AED9C8FAFA4DA673C1A
3,007,283 UART: Caliptra RT
3,007,536 UART: [state] CFI Enabled
3,113,989 UART: [rt] RT listening for mailbox commands...
3,114,659 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,723 UART: [rt]cmd =0x4c444556, len=4
3,155,306 >>> mbox cmd response data (687 bytes)
3,155,307 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,526 UART: [rt]cmd =0x43455246, len=4
3,196,651 >>> mbox cmd response data (887 bytes)
3,196,652 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,191 UART: [rt]cmd =0x43455252, len=4
3,237,027 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,631 >>> mbox cmd response: success
2,703,181 UART:
2,703,197 UART: Running Caliptra FMC ...
2,703,605 UART:
2,703,659 UART: [state] CFI Enabled
2,714,094 UART: [fht] FMC Alias Private Key: 7
2,822,771 UART: [art] Extend RT PCRs Done
2,823,199 UART: [art] Lock RT PCRs Done
2,824,987 UART: [art] Populate DV Done
2,833,258 UART: [fht] FMC Alias Private Key: 7
2,834,324 UART: [art] Derive CDI
2,834,604 UART: [art] Store in in slot 0x4
2,920,293 UART: [art] Derive Key Pair
2,920,653 UART: [art] Store priv key in slot 0x5
2,933,549 UART: [art] Derive Key Pair - Done
2,948,538 UART: [art] Signing Cert with AUTHO
2,949,018 UART: RITY.KEYID = 7
2,964,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,979 UART: [art] PUB.X = B2BD40DA43096EE04C36E09F222BF8E889D3A29C9B829EE9AC64522C78BD904B98A6C590B84C09B0E5BC7FA9E48E9496
2,971,755 UART: [art] PUB.Y = E4AC986CB682AEEAAAC56D6ED340D53419BF3FAF80B5C99CD1A95915330D1DF9FFB4F76905685E91B51AA11EC5904656
2,978,715 UART: [art] SIG.R = 66E60B15415DE779B2227FDE91B13DF218B57E6C0A715DAEE115F507AC8280144D8395C79599EB88B3622C99CDF6BEDC
2,985,484 UART: [art] SIG.S = 48504ECE9BA05FD040B1FD217F77258BEC77DCE69B830230DDF5DB4B3A8D5EBC5F86773EEA96254D97CDBF88507E6DB4
3,009,162 UART: Caliptra RT
3,009,415 UART: [state] CFI Enabled
3,116,678 UART: [rt] RT listening for mailbox commands...
3,117,348 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,166 UART: [rt]cmd =0x4c444556, len=4
3,157,543 >>> mbox cmd response data (687 bytes)
3,157,544 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,771 UART: [rt]cmd =0x43455246, len=4
3,198,714 >>> mbox cmd response data (887 bytes)
3,198,715 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,070 UART: [rt]cmd =0x43455252, len=4
3,238,822 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,849 >>> mbox cmd response: success
2,702,155 UART:
2,702,171 UART: Running Caliptra FMC ...
2,702,579 UART:
2,702,633 UART: [state] CFI Enabled
2,713,126 UART: [fht] FMC Alias Private Key: 7
2,820,773 UART: [art] Extend RT PCRs Done
2,821,201 UART: [art] Lock RT PCRs Done
2,822,655 UART: [art] Populate DV Done
2,830,850 UART: [fht] FMC Alias Private Key: 7
2,831,948 UART: [art] Derive CDI
2,832,228 UART: [art] Store in in slot 0x4
2,918,025 UART: [art] Derive Key Pair
2,918,385 UART: [art] Store priv key in slot 0x5
2,931,473 UART: [art] Derive Key Pair - Done
2,946,340 UART: [art] Signing Cert with AUTHO
2,946,820 UART: RITY.KEYID = 7
2,961,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,557 UART: [art] PUB.X = 0F4897C79DC674E09455E2C7563721A38D7A38D2656503FBA79407D3722BE4347EC77B64E8EF3EB96CDDC128C25D8577
2,969,318 UART: [art] PUB.Y = FEDD5746DF0B0698E38D92033C18405AAB95B63BEBEA3E2167F4692DE628197EBD24DA31E2C61191FAB4D7623C35F1C1
2,976,271 UART: [art] SIG.R = 1FA6FC53C22BFAA1D37FDCBBD0F7D9AB480C6F0C386526D3241A19B7D5136293AFA1DCD3D13E2B621F79B0483C9E6DC9
2,983,057 UART: [art] SIG.S = F4692365116962CF31A02287AB532D1CF2649D2EBD1B37ED4675E089AAB641B92689E6860906F25F70C5D0DFF4F5D606
3,006,803 UART: Caliptra RT
3,007,056 UART: [state] CFI Enabled
3,114,211 UART: [rt] RT listening for mailbox commands...
3,114,881 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,585 UART: [rt]cmd =0x4c444556, len=4
3,154,986 >>> mbox cmd response data (687 bytes)
3,154,987 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,398 UART: [rt]cmd =0x43455246, len=4
3,196,585 >>> mbox cmd response data (887 bytes)
3,196,586 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,625 UART: [rt]cmd =0x43455252, len=4
3,236,311 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 858.36s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,847 UART: [idev] CSR uploaded
1,299,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,061 UART: [idev] --
1,301,014 UART: [ldev] ++
1,301,182 UART: [ldev] CDI.KEYID = 6
1,301,546 UART: [ldev] SUBJECT.KEYID = 5
1,301,973 UART: [ldev] AUTHORITY.KEYID = 7
1,302,436 UART: [ldev] FE.KEYID = 1
1,307,830 UART: [ldev] Erasing FE.KEYID = 1
1,333,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,122 UART: [ldev] --
1,373,422 UART: [fwproc] Wait for Commands...
1,374,087 UART: [fwproc] Recv command 0x46574c44
1,374,820 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,177 >>> mbox cmd response: success
2,865,376 UART: [afmc] ++
2,865,544 UART: [afmc] CDI.KEYID = 6
2,865,907 UART: [afmc] SUBJECT.KEYID = 7
2,866,333 UART: [afmc] AUTHORITY.KEYID = 5
2,902,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,415 UART: [afmc] --
2,945,389 UART: [cold-reset] --
2,946,259 UART: [state] Locking Datavault
2,947,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,184 UART: [state] Locking ICCM
2,948,774 UART: [exit] Launching FMC @ 0x40000130
2,954,103 UART:
2,954,119 UART: Running Caliptra FMC ...
2,954,527 UART:
2,954,670 UART: [state] CFI Enabled
2,965,391 UART: [fht] FMC Alias Private Key: 7
3,074,260 UART: [art] Extend RT PCRs Done
3,074,688 UART: [art] Lock RT PCRs Done
3,076,080 UART: [art] Populate DV Done
3,084,491 UART: [fht] FMC Alias Private Key: 7
3,085,669 UART: [art] Derive CDI
3,085,949 UART: [art] Store in in slot 0x4
3,171,506 UART: [art] Derive Key Pair
3,171,866 UART: [art] Store priv key in slot 0x5
3,185,466 UART: [art] Derive Key Pair - Done
3,200,210 UART: [art] Signing Cert with AUTHO
3,200,690 UART: RITY.KEYID = 7
3,215,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,525 UART: [art] PUB.X = 136E0E3EF67DC6F4A60A3A3B1E118F4B3E566DB3157688A1B06D856E52CFD14F4E21A07959A8F79A5397ABFEE9E1ADE9
3,223,305 UART: [art] PUB.Y = CA38E604A4F2EC19586CC72237740EA2EC31979242F0207FC7333CE1E5A5755046FE0A0DEA3AB40131EC122E8A4660CF
3,230,246 UART: [art] SIG.R = A07C8A9BBCC12D46DC04D90DEC00B73678ED66131357615ADEE11140FD0274CD11642642A35A92A8929B7A7057308983
3,236,983 UART: [art] SIG.S = 4AB94B8E6B46CEA95A4FA6D667F32ABC58D082343931BDC85AD392812D701CFC79200FF7B2758E749544941F897711E3
3,260,365 UART: Caliptra RT
3,260,710 UART: [state] CFI Enabled
3,368,495 UART: [rt] RT listening for mailbox commands...
3,369,165 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,903 UART: [rt]cmd =0x4c444556, len=4
3,409,316 >>> mbox cmd response data (687 bytes)
3,409,317 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,592 UART: [rt]cmd =0x43455246, len=4
3,450,583 >>> mbox cmd response data (887 bytes)
3,450,584 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,835 UART: [rt]cmd =0x43455252, len=4
3,490,583 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,432 UART: [idev] CSR upload begun
1,209,211 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,068 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,776 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,661 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,367 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,796 UART: [idev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
1,297,293 UART: [idev] CSR uploaded
1,300,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,507 UART: [idev] --
1,301,680 UART: [ldev] ++
1,301,848 UART: [ldev] CDI.KEYID = 6
1,302,212 UART: [ldev] SUBJECT.KEYID = 5
1,302,639 UART: [ldev] AUTHORITY.KEYID = 7
1,303,102 UART: [ldev] FE.KEYID = 1
1,308,584 UART: [ldev] Erasing FE.KEYID = 1
1,334,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,710 UART: [ldev] --
1,374,000 UART: [fwproc] Wait for Commands...
1,374,661 UART: [fwproc] Recv command 0x46574c44
1,375,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,691 >>> mbox cmd response: success
2,865,944 UART: [afmc] ++
2,866,112 UART: [afmc] CDI.KEYID = 6
2,866,475 UART: [afmc] SUBJECT.KEYID = 7
2,866,901 UART: [afmc] AUTHORITY.KEYID = 5
2,902,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,225 UART: [afmc] --
2,945,201 UART: [cold-reset] --
2,946,141 UART: [state] Locking Datavault
2,947,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,830 UART: [state] Locking ICCM
2,948,376 UART: [exit] Launching FMC @ 0x40000130
2,953,705 UART:
2,953,721 UART: Running Caliptra FMC ...
2,954,129 UART:
2,954,272 UART: [state] CFI Enabled
2,964,711 UART: [fht] FMC Alias Private Key: 7
3,073,304 UART: [art] Extend RT PCRs Done
3,073,732 UART: [art] Lock RT PCRs Done
3,075,128 UART: [art] Populate DV Done
3,083,113 UART: [fht] FMC Alias Private Key: 7
3,084,295 UART: [art] Derive CDI
3,084,575 UART: [art] Store in in slot 0x4
3,170,256 UART: [art] Derive Key Pair
3,170,616 UART: [art] Store priv key in slot 0x5
3,184,350 UART: [art] Derive Key Pair - Done
3,198,827 UART: [art] Signing Cert with AUTHO
3,199,307 UART: RITY.KEYID = 7
3,214,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,288 UART: [art] PUB.X = 6FCA030EA19BF1C39598A8FDD45E9B5C30752443160A55E4BF2A8C473DD380C436A4A488425B1350D56323F5E7EDF1FB
3,222,057 UART: [art] PUB.Y = E10CFE5536E740FEE55C0C5D2D140F6F327CA9FF9CC38845E332071D7DAFC1D10836A10F5DFFB94890E96C0070A4325F
3,228,979 UART: [art] SIG.R = BA79AE3A67637D12E8C355DAEB91967AD700CC16E79B4938169A66A03B25DB7D8C36578A84C1C7071EE48ACDB138C103
3,235,729 UART: [art] SIG.S = 40393B5B24363B8A412F59C186A06BB28B6BCC77E1BB3F01C721BD5AB1D17AF5553BB2794EA672B7ABCC9E98EA4B2A97
3,259,125 UART: Caliptra RT
3,259,470 UART: [state] CFI Enabled
3,368,153 UART: [rt] RT listening for mailbox commands...
3,368,823 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,689 UART: [rt]cmd =0x4c444556, len=4
3,409,276 >>> mbox cmd response data (687 bytes)
3,409,277 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,356 UART: [rt]cmd =0x43455246, len=4
3,450,255 >>> mbox cmd response data (887 bytes)
3,450,256 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,791 UART: [rt]cmd =0x43455252, len=4
3,490,685 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 895.19s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,341 UART: [art] Lock RT PCRs Done
2,825,793 UART: [art] Populate DV Done
2,834,176 UART: [fht] FMC Alias Private Key: 7
2,835,262 UART: [art] Derive CDI
2,835,542 UART: [art] Store in in slot 0x4
2,921,357 UART: [art] Derive Key Pair
2,921,717 UART: [art] Store priv key in slot 0x5
2,935,195 UART: [art] Derive Key Pair - Done
2,950,416 UART: [art] Signing Cert with AUTHO
2,950,896 UART: RITY.KEYID = 7
2,965,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,659 UART: [art] PUB.X = 33FD00B6412A6A5ECFE7D91D9ACDCDCEB7B4392DBF93A39E798986F31D6F1B7C3E5220E85FE1DCDC456968634649339B
2,973,423 UART: [art] PUB.Y = 6284FE167A850DDA672E894ACA565EEDA6CA61AE8ED611B83050F566AD5160B07C898B67F10D75EEDE6CB93D5061FAF7
2,980,383 UART: [art] SIG.R = 1F19209DF0F40D287E7207988FBC9EAB9212FE001472666D3C0CF594817444CA5B7CDD498602536B7A0806CA0F4FA3B4
2,987,112 UART: [art] SIG.S = BE6008573DCE682BD0577E086968EF3BEBFBC35923C132FD39B15F0E6502721992D0E40FE4B5BB16391C85865401BEF3
3,011,273 UART: Caliptra RT
3,011,618 UART: [state] CFI Enabled
3,119,191 UART: [rt] RT listening for mailbox commands...
3,119,861 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,521 UART: [rt]cmd =0x4c444556, len=4
3,160,012 >>> mbox cmd response data (687 bytes)
3,160,013 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,288 UART: [rt]cmd =0x43455246, len=4
3,201,229 >>> mbox cmd response data (887 bytes)
3,201,230 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,561 UART: [rt]cmd =0x43455252, len=4
3,241,485 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,242 >>> mbox cmd response: success
2,703,952 UART:
2,703,968 UART: Running Caliptra FMC ...
2,704,376 UART:
2,704,519 UART: [state] CFI Enabled
2,715,062 UART: [fht] FMC Alias Private Key: 7
2,822,955 UART: [art] Extend RT PCRs Done
2,823,383 UART: [art] Lock RT PCRs Done
2,824,591 UART: [art] Populate DV Done
2,832,830 UART: [fht] FMC Alias Private Key: 7
2,833,864 UART: [art] Derive CDI
2,834,144 UART: [art] Store in in slot 0x4
2,920,077 UART: [art] Derive Key Pair
2,920,437 UART: [art] Store priv key in slot 0x5
2,933,627 UART: [art] Derive Key Pair - Done
2,948,344 UART: [art] Signing Cert with AUTHO
2,948,824 UART: RITY.KEYID = 7
2,963,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,757 UART: [art] PUB.X = D58DD847549251D83981A90DD4EC45A0AC6C225A4334C6BFB421018AFDD29972459FECFAF14E19309EE3DB9480F9D309
2,971,526 UART: [art] PUB.Y = E199226CB417D2ADAC02555374938DAB83DCDDB62FF34968F44B795DAE66C47263D2EC7E23EC7C537D09CA7402EFAE03
2,978,478 UART: [art] SIG.R = 3FA8A2365ACE27A87DD62EC4BF5B24898631DDA366D27C2C2B739B84C495832C62E7EADEDCC0EDAE6808F2BF1AFE9A9B
2,985,271 UART: [art] SIG.S = 415BA684CD1BF6A4B15A5BA19B829B673EF1D01A16666B9955E6280A80BC856D951515D2B9FF4E257290F7FA5ADA843D
3,009,307 UART: Caliptra RT
3,009,652 UART: [state] CFI Enabled
3,116,745 UART: [rt] RT listening for mailbox commands...
3,117,415 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,955 UART: [rt]cmd =0x4c444556, len=4
3,157,470 >>> mbox cmd response data (687 bytes)
3,157,471 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,600 UART: [rt]cmd =0x43455246, len=4
3,198,803 >>> mbox cmd response data (887 bytes)
3,198,804 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,303 UART: [rt]cmd =0x43455252, len=4
3,239,143 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,944 >>> mbox cmd response: success
2,704,272 UART:
2,704,288 UART: Running Caliptra FMC ...
2,704,696 UART:
2,704,839 UART: [state] CFI Enabled
2,715,392 UART: [fht] FMC Alias Private Key: 7
2,823,733 UART: [art] Extend RT PCRs Done
2,824,161 UART: [art] Lock RT PCRs Done
2,825,605 UART: [art] Populate DV Done
2,833,824 UART: [fht] FMC Alias Private Key: 7
2,834,888 UART: [art] Derive CDI
2,835,168 UART: [art] Store in in slot 0x4
2,920,661 UART: [art] Derive Key Pair
2,921,021 UART: [art] Store priv key in slot 0x5
2,934,363 UART: [art] Derive Key Pair - Done
2,949,259 UART: [art] Signing Cert with AUTHO
2,949,739 UART: RITY.KEYID = 7
2,964,735 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,500 UART: [art] PUB.X = 845A69C43B54F0DD71CBF6F5192D9101BB2EC55B21F74567F1488620CAE1AF9B661877864AAB1CC1C419981B28E0864E
2,972,271 UART: [art] PUB.Y = 4379619A938D91A93EB38320AE4EE1A75F8B65C4DFFA544E0A0427364C7A66AC549D35773D207D0D62E9E1502E42B820
2,979,212 UART: [art] SIG.R = 1F318865F8B1019C63D7491C7F1851CD999B0CEBFBA5DF9800E77C5A0E72EEE0875F01ECAF3CB14586AC01D0FC534C5C
2,985,961 UART: [art] SIG.S = FC0C06AD3C12DF4BFBC4030A43AC80E737A320C7D7FD078F96CC32B7ABE53AE1E2B1C1F07C5FA66B4EAB08E816D2CE21
3,009,960 UART: Caliptra RT
3,010,305 UART: [state] CFI Enabled
3,118,114 UART: [rt] RT listening for mailbox commands...
3,118,784 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,296 UART: [rt]cmd =0x4c444556, len=4
3,158,769 >>> mbox cmd response data (687 bytes)
3,158,770 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,139 UART: [rt]cmd =0x43455246, len=4
3,200,310 >>> mbox cmd response data (887 bytes)
3,200,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,732 UART: [rt]cmd =0x43455252, len=4
3,240,590 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,778 >>> mbox cmd response: success
2,704,818 UART:
2,704,834 UART: Running Caliptra FMC ...
2,705,242 UART:
2,705,385 UART: [state] CFI Enabled
2,716,126 UART: [fht] FMC Alias Private Key: 7
2,824,395 UART: [art] Extend RT PCRs Done
2,824,823 UART: [art] Lock RT PCRs Done
2,826,237 UART: [art] Populate DV Done
2,834,210 UART: [fht] FMC Alias Private Key: 7
2,835,206 UART: [art] Derive CDI
2,835,486 UART: [art] Store in in slot 0x4
2,921,411 UART: [art] Derive Key Pair
2,921,771 UART: [art] Store priv key in slot 0x5
2,934,995 UART: [art] Derive Key Pair - Done
2,949,710 UART: [art] Signing Cert with AUTHO
2,950,190 UART: RITY.KEYID = 7
2,965,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,809 UART: [art] PUB.X = BA6E518779EE9A9F97890D2D84951230B7C8150B834798C6B5A83D40A27C326187C6B817CA4BB5E7BCD38D82BC545227
2,972,573 UART: [art] PUB.Y = FCC3C85D8601097C38EA6A5CDFAE5F3A26EE31487DB3F552AFEF9B4571376158BCCA6407259C419A54B9B4925F6D0375
2,979,521 UART: [art] SIG.R = 9ADF074B8B610F817A0E45A564CA84F9CFCF415C9F5A15A99993B889CB822CF0932AD0423176F3208D6BD2A205C61A1D
2,986,287 UART: [art] SIG.S = 3653121CE48AA22C3FF6464F646B03DB75A186D5C6AD021DC33981DF51C6469695EEA3F3AF33AFE11BFF0668878518B9
3,010,467 UART: Caliptra RT
3,010,812 UART: [state] CFI Enabled
3,119,035 UART: [rt] RT listening for mailbox commands...
3,119,705 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,967 UART: [rt]cmd =0x4c444556, len=4
3,160,436 >>> mbox cmd response data (687 bytes)
3,160,437 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,746 UART: [rt]cmd =0x43455246, len=4
3,201,859 >>> mbox cmd response data (887 bytes)
3,201,860 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,185 UART: [rt]cmd =0x43455252, len=4
3,241,855 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,606 >>> mbox cmd response: success
2,706,174 UART:
2,706,190 UART: Running Caliptra FMC ...
2,706,598 UART:
2,706,741 UART: [state] CFI Enabled
2,717,160 UART: [fht] FMC Alias Private Key: 7
2,825,423 UART: [art] Extend RT PCRs Done
2,825,851 UART: [art] Lock RT PCRs Done
2,827,501 UART: [art] Populate DV Done
2,835,628 UART: [fht] FMC Alias Private Key: 7
2,836,688 UART: [art] Derive CDI
2,836,968 UART: [art] Store in in slot 0x4
2,922,929 UART: [art] Derive Key Pair
2,923,289 UART: [art] Store priv key in slot 0x5
2,936,725 UART: [art] Derive Key Pair - Done
2,951,428 UART: [art] Signing Cert with AUTHO
2,951,908 UART: RITY.KEYID = 7
2,966,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,455 UART: [art] PUB.X = 7805F556505F0C09659F696C2C46BD3BB2C0552DBF2BF8E0F3B8A7410C47BA08D53E026A80246C9CDDC4338D8FA737C5
2,974,215 UART: [art] PUB.Y = C34BB9522B9BE70A4279D45823714DF944FA25306C8AAF3DA04F736BE70E5528D14B8938EA11CF67A54EA799C1D9CCCE
2,981,171 UART: [art] SIG.R = FD3B13D7F162889C3479204EC07E2FB47350457A439679C411180251EFABEBDD9DAEDC837122CEE9BFF5331BBC376189
2,987,946 UART: [art] SIG.S = 28AE3F484D67710D0D43BD5C787513479098F03EB64CCAF6AE2429174CC867E20E1BB193027078B84EE08F55A51D5275
3,011,183 UART: Caliptra RT
3,011,528 UART: [state] CFI Enabled
3,119,715 UART: [rt] RT listening for mailbox commands...
3,120,385 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,009 UART: [rt]cmd =0x4c444556, len=4
3,160,356 >>> mbox cmd response data (687 bytes)
3,160,357 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,660 UART: [rt]cmd =0x43455246, len=4
3,201,769 >>> mbox cmd response data (887 bytes)
3,201,770 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,343 UART: [rt]cmd =0x43455252, len=4
3,242,139 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 863.68s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,664 UART: [idev] CSR uploaded
1,299,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,878 UART: [idev] --
1,300,987 UART: [ldev] ++
1,301,155 UART: [ldev] CDI.KEYID = 6
1,301,519 UART: [ldev] SUBJECT.KEYID = 5
1,301,946 UART: [ldev] AUTHORITY.KEYID = 7
1,302,409 UART: [ldev] FE.KEYID = 1
1,307,807 UART: [ldev] Erasing FE.KEYID = 1
1,334,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,785 UART: [ldev] --
1,374,109 UART: [fwproc] Wait for Commands...
1,374,744 UART: [fwproc] Recv command 0x46574c44
1,375,477 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,492 >>> mbox cmd response: success
2,866,757 UART: [afmc] ++
2,866,925 UART: [afmc] CDI.KEYID = 6
2,867,288 UART: [afmc] SUBJECT.KEYID = 7
2,867,714 UART: [afmc] AUTHORITY.KEYID = 5
2,902,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,734 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,453 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,150 UART: [afmc] --
2,946,108 UART: [cold-reset] --
2,946,984 UART: [state] Locking Datavault
2,948,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,941 UART: [state] Locking ICCM
2,949,527 UART: [exit] Launching FMC @ 0x40000130
2,954,856 UART:
2,954,872 UART: Running Caliptra FMC ...
2,955,280 UART:
2,955,334 UART: [state] CFI Enabled
2,965,607 UART: [fht] FMC Alias Private Key: 7
3,073,864 UART: [art] Extend RT PCRs Done
3,074,292 UART: [art] Lock RT PCRs Done
3,075,874 UART: [art] Populate DV Done
3,084,281 UART: [fht] FMC Alias Private Key: 7
3,085,291 UART: [art] Derive CDI
3,085,571 UART: [art] Store in in slot 0x4
3,171,100 UART: [art] Derive Key Pair
3,171,460 UART: [art] Store priv key in slot 0x5
3,185,208 UART: [art] Derive Key Pair - Done
3,200,106 UART: [art] Signing Cert with AUTHO
3,200,586 UART: RITY.KEYID = 7
3,215,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,323 UART: [art] PUB.X = E2B6EA184220AC6593FD770FE2D4D566C38EAFFB072C17DF07E3372EAB7C0E161E9F902BA0AA3B9DCF1C7837CC901C99
3,223,101 UART: [art] PUB.Y = B182A35129AA84583E0AED34C6EF42D8FB077B804B5D8467E596AEA5E15E850E1ABF0B0BBD664651BBC518CAD88F7683
3,230,050 UART: [art] SIG.R = B347191262C32920E54EE0310BC8CE9BA19C0814C6DD7A2FD3AFD33B5C9C66C77A9D707178157991E296C1C5BCFE1BFA
3,236,826 UART: [art] SIG.S = 268EC053D8133C3C91369AA0A6D4D264F415165FD0798D2215CA3C63399E710E113E4DDC18A16A60A090CFAC7803E237
3,260,353 UART: Caliptra RT
3,260,606 UART: [state] CFI Enabled
3,367,931 UART: [rt] RT listening for mailbox commands...
3,368,601 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,685 UART: [rt]cmd =0x4c444556, len=4
3,409,134 >>> mbox cmd response data (687 bytes)
3,409,135 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,222 UART: [rt]cmd =0x43455246, len=4
3,450,329 >>> mbox cmd response data (887 bytes)
3,450,330 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,935 UART: [rt]cmd =0x43455252, len=4
3,490,663 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
904,040 UART: [kat] SHA2-512-ACC
905,941 UART: [kat] ECC-384
915,580 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,357 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,181,079 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,206,443 UART: [idev] CSR upload begun
1,208,222 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,279 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,987 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,872 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,578 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,007 UART: [idev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
1,296,504 UART: [idev] CSR uploaded
1,299,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,718 UART: [idev] --
1,300,767 UART: [ldev] ++
1,300,935 UART: [ldev] CDI.KEYID = 6
1,301,299 UART: [ldev] SUBJECT.KEYID = 5
1,301,726 UART: [ldev] AUTHORITY.KEYID = 7
1,302,189 UART: [ldev] FE.KEYID = 1
1,307,207 UART: [ldev] Erasing FE.KEYID = 1
1,332,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,541 UART: [ldev] --
1,371,911 UART: [fwproc] Wait for Commands...
1,372,528 UART: [fwproc] Recv command 0x46574c44
1,373,261 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,316 >>> mbox cmd response: success
2,864,461 UART: [afmc] ++
2,864,629 UART: [afmc] CDI.KEYID = 6
2,864,992 UART: [afmc] SUBJECT.KEYID = 7
2,865,418 UART: [afmc] AUTHORITY.KEYID = 5
2,900,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,960 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,238 UART: [afmc] --
2,944,214 UART: [cold-reset] --
2,944,922 UART: [state] Locking Datavault
2,946,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,911 UART: [state] Locking ICCM
2,947,341 UART: [exit] Launching FMC @ 0x40000130
2,952,670 UART:
2,952,686 UART: Running Caliptra FMC ...
2,953,094 UART:
2,953,148 UART: [state] CFI Enabled
2,963,689 UART: [fht] FMC Alias Private Key: 7
3,071,402 UART: [art] Extend RT PCRs Done
3,071,830 UART: [art] Lock RT PCRs Done
3,073,182 UART: [art] Populate DV Done
3,081,283 UART: [fht] FMC Alias Private Key: 7
3,082,441 UART: [art] Derive CDI
3,082,721 UART: [art] Store in in slot 0x4
3,168,194 UART: [art] Derive Key Pair
3,168,554 UART: [art] Store priv key in slot 0x5
3,182,098 UART: [art] Derive Key Pair - Done
3,196,745 UART: [art] Signing Cert with AUTHO
3,197,225 UART: RITY.KEYID = 7
3,212,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,310 UART: [art] PUB.X = 7D87DBE7178BD12C2D743638A637D91B7F3B1CE4C7BBDBB4E620DE5D0FC7D1AE5067821BCC12F5A1A440ADC8D7BB5B08
3,220,098 UART: [art] PUB.Y = B54F05D1E8EA34DCB776A4F02BC09B66D4AF5C318A0A333F69A9175862F8732EC724CC35F5B76E577571F2287538299F
3,227,044 UART: [art] SIG.R = 3FE426179D2C1BC338391D8778BDAEDA35F93A8F70F0657C1115BBF7E1D5C4EFF0D32A473BEE1FE66E12CCA7830941BF
3,233,829 UART: [art] SIG.S = C7AE671FA4857C24F5717A251B45EED6C6EB2AC71240FD1B38D3C421BE158A7A7797F309990F7CDFDD0C1071DD11A5DA
3,258,117 UART: Caliptra RT
3,258,370 UART: [state] CFI Enabled
3,365,551 UART: [rt] RT listening for mailbox commands...
3,366,221 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,111 UART: [rt]cmd =0x4c444556, len=4
3,406,512 >>> mbox cmd response data (687 bytes)
3,406,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,858 UART: [rt]cmd =0x43455246, len=4
3,447,913 >>> mbox cmd response data (887 bytes)
3,447,914 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,455 UART: [rt]cmd =0x43455252, len=4
3,488,337 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 897.17s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,551 UART: [art] Lock RT PCRs Done
2,824,523 UART: [art] Populate DV Done
2,832,600 UART: [fht] FMC Alias Private Key: 7
2,833,544 UART: [art] Derive CDI
2,833,824 UART: [art] Store in in slot 0x4
2,919,037 UART: [art] Derive Key Pair
2,919,397 UART: [art] Store priv key in slot 0x5
2,932,679 UART: [art] Derive Key Pair - Done
2,947,629 UART: [art] Signing Cert with AUTHO
2,948,109 UART: RITY.KEYID = 7
2,963,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,100 UART: [art] PUB.X = 4D45D359E535B7228E19A03E7D686877978FBC1AB5DB74702E6689DF6C304D93520FBBCB66D6243E068EC4CA3EE9158E
2,970,870 UART: [art] PUB.Y = BC1C7C87E6D0FD7C64BE0D4BDD5439092E1AA94B108275A9E86493AB1489F6CA2B2745DB1D2EE534DC13436F8771C79A
2,977,826 UART: [art] SIG.R = D904DEBDAF1783E86F709BDD02FD6958F8CCEBC8C476CF83832D83AAB726507EE570E6EADFAEAB30065055B839016B61
2,984,602 UART: [art] SIG.S = 9DD052DFD6EA65624032623EE0BA90FAA7919E5182B66078FCDA4B0D2D13A97CA5131E11A95695FF4E22DB1715A8C91D
3,008,262 UART: Caliptra RT
3,008,515 UART: [state] CFI Enabled
3,115,545 UART: [rt] RT listening for mailbox commands...
3,116,215 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,861 UART: [rt]cmd =0x4c444556, len=4
3,156,484 >>> mbox cmd response data (687 bytes)
3,156,485 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,748 UART: [rt]cmd =0x43455246, len=4
3,197,847 >>> mbox cmd response data (887 bytes)
3,197,848 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,117 UART: [rt]cmd =0x43455252, len=4
3,238,054 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,059 >>> mbox cmd response: success
2,703,691 UART:
2,703,707 UART: Running Caliptra FMC ...
2,704,115 UART:
2,704,169 UART: [state] CFI Enabled
2,714,578 UART: [fht] FMC Alias Private Key: 7
2,822,357 UART: [art] Extend RT PCRs Done
2,822,785 UART: [art] Lock RT PCRs Done
2,824,207 UART: [art] Populate DV Done
2,832,314 UART: [fht] FMC Alias Private Key: 7
2,833,390 UART: [art] Derive CDI
2,833,670 UART: [art] Store in in slot 0x4
2,919,433 UART: [art] Derive Key Pair
2,919,793 UART: [art] Store priv key in slot 0x5
2,932,931 UART: [art] Derive Key Pair - Done
2,947,380 UART: [art] Signing Cert with AUTHO
2,947,860 UART: RITY.KEYID = 7
2,962,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,657 UART: [art] PUB.X = 2EEA3E9F0D73B58DFD12BFCBAF3218D7A0FD64D320700482D1BC8D110E999768E4B5AA6D767CE6DA197E6D2DCC43D8B1
2,970,440 UART: [art] PUB.Y = 894F68D1343CF081894C4A362D7648369C35E11174F89A8DFBA67BEFFDDCC5F7E58A618EEE5355DA9A37AED2D3BE8443
2,977,404 UART: [art] SIG.R = CB8CA23D519DB98CAF16FD82E3B5A2CA9562A12C31BFBB3F6621DFF374C37A5258716BA073D0DA548B0C7FE747CD5768
2,984,189 UART: [art] SIG.S = B7B182B54C65EBA782ACA035FD687F8E1E26607ED6B7BAE0CF1DE9C8B249248E98BA5FEB0638644F47375F1D16E92AB9
3,007,987 UART: Caliptra RT
3,008,240 UART: [state] CFI Enabled
3,115,384 UART: [rt] RT listening for mailbox commands...
3,116,054 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,722 UART: [rt]cmd =0x4c444556, len=4
3,155,965 >>> mbox cmd response data (687 bytes)
3,155,966 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,245 UART: [rt]cmd =0x43455246, len=4
3,197,164 >>> mbox cmd response data (887 bytes)
3,197,165 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,482 UART: [rt]cmd =0x43455252, len=4
3,237,351 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,605 >>> mbox cmd response: success
2,703,239 UART:
2,703,255 UART: Running Caliptra FMC ...
2,703,663 UART:
2,703,717 UART: [state] CFI Enabled
2,714,716 UART: [fht] FMC Alias Private Key: 7
2,823,101 UART: [art] Extend RT PCRs Done
2,823,529 UART: [art] Lock RT PCRs Done
2,825,183 UART: [art] Populate DV Done
2,833,308 UART: [fht] FMC Alias Private Key: 7
2,834,358 UART: [art] Derive CDI
2,834,638 UART: [art] Store in in slot 0x4
2,920,079 UART: [art] Derive Key Pair
2,920,439 UART: [art] Store priv key in slot 0x5
2,933,335 UART: [art] Derive Key Pair - Done
2,947,958 UART: [art] Signing Cert with AUTHO
2,948,438 UART: RITY.KEYID = 7
2,963,436 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,201 UART: [art] PUB.X = 429749EA8FEC75087B36BD1EB7A1A299CCC55829FF3FE66FF7BC62CFCE1BD21A15CC953EE9EAFD83A00086D1A8493018
2,970,966 UART: [art] PUB.Y = 1F25808145B4FE8594A793B959A21C9C4C9D8887DDD36DF1D202415D14BF22B0F0BBC546D17B0AAB848643146FB26FFF
2,977,918 UART: [art] SIG.R = 41CF1BC448329D51AFB2EA888E832168BDA641F27C25B0DEBEC538C4B06434529588336804B07FFD20419F13153B3E63
2,984,685 UART: [art] SIG.S = 92E1134606F71C614556D666989F366C64358EBA064860D6AB1FE9491CCB083FF1C5577701E0793E994D44AAB0982DA8
3,008,288 UART: Caliptra RT
3,008,541 UART: [state] CFI Enabled
3,116,380 UART: [rt] RT listening for mailbox commands...
3,117,050 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,878 UART: [rt]cmd =0x4c444556, len=4
3,157,223 >>> mbox cmd response data (687 bytes)
3,157,224 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,609 UART: [rt]cmd =0x43455246, len=4
3,198,760 >>> mbox cmd response data (887 bytes)
3,198,761 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,068 UART: [rt]cmd =0x43455252, len=4
3,239,038 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,215 >>> mbox cmd response: success
2,703,347 UART:
2,703,363 UART: Running Caliptra FMC ...
2,703,771 UART:
2,703,825 UART: [state] CFI Enabled
2,714,170 UART: [fht] FMC Alias Private Key: 7
2,822,265 UART: [art] Extend RT PCRs Done
2,822,693 UART: [art] Lock RT PCRs Done
2,824,263 UART: [art] Populate DV Done
2,832,358 UART: [fht] FMC Alias Private Key: 7
2,833,532 UART: [art] Derive CDI
2,833,812 UART: [art] Store in in slot 0x4
2,919,135 UART: [art] Derive Key Pair
2,919,495 UART: [art] Store priv key in slot 0x5
2,932,769 UART: [art] Derive Key Pair - Done
2,947,412 UART: [art] Signing Cert with AUTHO
2,947,892 UART: RITY.KEYID = 7
2,962,868 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,633 UART: [art] PUB.X = 8F4F166D63AAD2790A75ECF16D04AFB0DA1F53E73960D3EB8A4DD5314E60D07537847473E5EB202241F146E2EC8946ED
2,970,405 UART: [art] PUB.Y = 5A0B7A9351D5373D85DD34157271135805C8CC83ED5357D6E6FCFCF4BC9072DC2EFE7C912EFFF69EB47604E727D30E0F
2,977,352 UART: [art] SIG.R = E70476690C8625181C1844F9705F5E87B0532367968FAAD01BD1C9B2DB0269136CFC5C1A8A2C363F4D3E838C1AEF8EF0
2,984,117 UART: [art] SIG.S = A6536BE0A5B876118CBE0C527D3823933A99778113B55405D91167537DB41F8A915F149BD7BB860B137666C5B7508B90
3,008,085 UART: Caliptra RT
3,008,338 UART: [state] CFI Enabled
3,117,124 UART: [rt] RT listening for mailbox commands...
3,117,794 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,766 UART: [rt]cmd =0x4c444556, len=4
3,158,349 >>> mbox cmd response data (687 bytes)
3,158,350 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,911 UART: [rt]cmd =0x43455246, len=4
3,199,982 >>> mbox cmd response data (887 bytes)
3,199,983 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,406 UART: [rt]cmd =0x43455252, len=4
3,240,053 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,998 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,881 >>> mbox cmd response: success
2,702,217 UART:
2,702,233 UART: Running Caliptra FMC ...
2,702,641 UART:
2,702,695 UART: [state] CFI Enabled
2,713,470 UART: [fht] FMC Alias Private Key: 7
2,821,267 UART: [art] Extend RT PCRs Done
2,821,695 UART: [art] Lock RT PCRs Done
2,823,271 UART: [art] Populate DV Done
2,831,372 UART: [fht] FMC Alias Private Key: 7
2,832,398 UART: [art] Derive CDI
2,832,678 UART: [art] Store in in slot 0x4
2,918,799 UART: [art] Derive Key Pair
2,919,159 UART: [art] Store priv key in slot 0x5
2,931,633 UART: [art] Derive Key Pair - Done
2,946,661 UART: [art] Signing Cert with AUTHO
2,947,141 UART: RITY.KEYID = 7
2,962,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,200 UART: [art] PUB.X = C034EF25898E4E7F29AE62DA1AD6B380D0A8BC5BB778CBC7AB22916B94F410FFB7E5F714947360B76E49237F03BFA126
2,969,979 UART: [art] PUB.Y = 8AF9ED33E30C1A5053834B5E574105B0C0E8BEFFFF916099C67B02A3BF404B60A55B580E8DAD0657227B6446AA2736CF
2,976,922 UART: [art] SIG.R = 677778715F1C4F6697145FC104366BABF67006B275EB0A3B24FEE1BC8957B8DEE5BFE133E9B828234605976AD88A5537
2,983,680 UART: [art] SIG.S = 7F29781AB2398DA478C28A4ECAA8E78B3E159958902534A06E517D8AB50E49976DF34BE5B3F516EE932F86644056C490
3,007,488 UART: Caliptra RT
3,007,741 UART: [state] CFI Enabled
3,115,402 UART: [rt] RT listening for mailbox commands...
3,116,072 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,758 UART: [rt]cmd =0x4c444556, len=4
3,156,293 >>> mbox cmd response data (687 bytes)
3,156,294 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,503 UART: [rt]cmd =0x43455246, len=4
3,197,598 >>> mbox cmd response data (887 bytes)
3,197,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,984 UART: [rt]cmd =0x43455252, len=4
3,237,766 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 858.21s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,633 UART: [idev] CSR uploaded
1,300,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,847 UART: [idev] --
1,301,846 UART: [ldev] ++
1,302,014 UART: [ldev] CDI.KEYID = 6
1,302,378 UART: [ldev] SUBJECT.KEYID = 5
1,302,805 UART: [ldev] AUTHORITY.KEYID = 7
1,303,268 UART: [ldev] FE.KEYID = 1
1,308,536 UART: [ldev] Erasing FE.KEYID = 1
1,334,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,088 UART: [ldev] --
1,374,492 UART: [fwproc] Wait for Commands...
1,375,119 UART: [fwproc] Recv command 0x46574c44
1,375,852 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,991 >>> mbox cmd response: success
2,865,208 UART: [afmc] ++
2,865,376 UART: [afmc] CDI.KEYID = 6
2,865,739 UART: [afmc] SUBJECT.KEYID = 7
2,866,165 UART: [afmc] AUTHORITY.KEYID = 5
2,901,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,231 UART: [afmc] --
2,945,241 UART: [cold-reset] --
2,946,103 UART: [state] Locking Datavault
2,947,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,860 UART: [state] Locking ICCM
2,948,454 UART: [exit] Launching FMC @ 0x40000130
2,953,783 UART:
2,953,799 UART: Running Caliptra FMC ...
2,954,207 UART:
2,954,350 UART: [state] CFI Enabled
2,965,291 UART: [fht] FMC Alias Private Key: 7
3,073,570 UART: [art] Extend RT PCRs Done
3,073,998 UART: [art] Lock RT PCRs Done
3,075,832 UART: [art] Populate DV Done
3,083,915 UART: [fht] FMC Alias Private Key: 7
3,084,867 UART: [art] Derive CDI
3,085,147 UART: [art] Store in in slot 0x4
3,170,966 UART: [art] Derive Key Pair
3,171,326 UART: [art] Store priv key in slot 0x5
3,184,100 UART: [art] Derive Key Pair - Done
3,198,591 UART: [art] Signing Cert with AUTHO
3,199,071 UART: RITY.KEYID = 7
3,214,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,976 UART: [art] PUB.X = 6812003F7F07EE1F681A2119E053883A9E5B9D6A17E9CC41781508555D9558340DB2896805FABB6E68343B5E27A572F0
3,221,704 UART: [art] PUB.Y = 62B048ECCD117552608B2121CD5B7EC64F15D9B394D117B07F7A647E08D0F010332A614BB97859275127FB4AC5986BD3
3,228,649 UART: [art] SIG.R = 9703D59E82E85D9B057C8ADB4786F029C15A8545933628CE6EE29EDAB7B30A4C56DE2FC126CE48AED8944BA09D0E698B
3,235,419 UART: [art] SIG.S = 9FD6D36F5A41B7B778C5889B6923B61432084BCA25AFABB530335384482951228A85FE26115453E13C6403EA5AFA4BCA
3,258,642 UART: Caliptra RT
3,258,987 UART: [state] CFI Enabled
3,367,449 UART: [rt] RT listening for mailbox commands...
3,368,119 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,133 UART: [rt]cmd =0x4c444556, len=4
3,408,460 >>> mbox cmd response data (687 bytes)
3,408,461 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,716 UART: [rt]cmd =0x43455246, len=4
3,449,551 >>> mbox cmd response data (887 bytes)
3,449,552 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,927 UART: [rt]cmd =0x43455252, len=4
3,489,670 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,206 UART: [idev] CSR upload begun
1,208,985 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,664 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,372 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,257 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,963 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,392 UART: [idev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
1,296,889 UART: [idev] CSR uploaded
1,299,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,103 UART: [idev] --
1,301,224 UART: [ldev] ++
1,301,392 UART: [ldev] CDI.KEYID = 6
1,301,756 UART: [ldev] SUBJECT.KEYID = 5
1,302,183 UART: [ldev] AUTHORITY.KEYID = 7
1,302,646 UART: [ldev] FE.KEYID = 1
1,307,968 UART: [ldev] Erasing FE.KEYID = 1
1,334,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,356 UART: [ldev] --
1,373,622 UART: [fwproc] Wait for Commands...
1,374,285 UART: [fwproc] Recv command 0x46574c44
1,375,018 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,459 >>> mbox cmd response: success
2,866,726 UART: [afmc] ++
2,866,894 UART: [afmc] CDI.KEYID = 6
2,867,257 UART: [afmc] SUBJECT.KEYID = 7
2,867,683 UART: [afmc] AUTHORITY.KEYID = 5
2,903,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,013 UART: [afmc] --
2,946,925 UART: [cold-reset] --
2,947,893 UART: [state] Locking Datavault
2,949,140 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,744 UART: [state] Locking ICCM
2,950,188 UART: [exit] Launching FMC @ 0x40000130
2,955,517 UART:
2,955,533 UART: Running Caliptra FMC ...
2,955,941 UART:
2,956,084 UART: [state] CFI Enabled
2,966,357 UART: [fht] FMC Alias Private Key: 7
3,075,178 UART: [art] Extend RT PCRs Done
3,075,606 UART: [art] Lock RT PCRs Done
3,076,938 UART: [art] Populate DV Done
3,085,383 UART: [fht] FMC Alias Private Key: 7
3,086,325 UART: [art] Derive CDI
3,086,605 UART: [art] Store in in slot 0x4
3,172,544 UART: [art] Derive Key Pair
3,172,904 UART: [art] Store priv key in slot 0x5
3,186,388 UART: [art] Derive Key Pair - Done
3,200,980 UART: [art] Signing Cert with AUTHO
3,201,460 UART: RITY.KEYID = 7
3,216,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,147 UART: [art] PUB.X = 8EA5159137C093586C4F0ABEFE10609317E7D3DC98A0474CCB0CF708142DCF647A934A747C1D1879EDAE3CF09F1270CA
3,223,918 UART: [art] PUB.Y = BC06A01771905ADCF744F022F181AF304FA31C0A2A9792C84D4A383432E7586EBBACCFE72D820298035EBC9EF06CB5A7
3,230,868 UART: [art] SIG.R = 89FA47D91BA81BD89EBA191AE8CDE7F809DC30C65F35391B03742AC5C0C20D66AD58D40613E2D03C154D4D1EDB8BBC2D
3,237,646 UART: [art] SIG.S = C6BF9C7BCD1DADF56173CB3ACB9B3384437F5189DFB69F0F335F216A2A73647E8EA08B6C1F42B0DBA0815E202DB42D4B
3,261,666 UART: Caliptra RT
3,262,011 UART: [state] CFI Enabled
3,369,545 UART: [rt] RT listening for mailbox commands...
3,370,215 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,755 UART: [rt]cmd =0x4c444556, len=4
3,410,210 >>> mbox cmd response data (687 bytes)
3,410,211 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,884 UART: [rt]cmd =0x43455246, len=4
3,451,889 >>> mbox cmd response data (887 bytes)
3,451,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,049 UART: [rt]cmd =0x43455252, len=4
3,491,698 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 894.60s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,823,515 UART: [art] Lock RT PCRs Done
2,824,933 UART: [art] Populate DV Done
2,833,116 UART: [fht] FMC Alias Private Key: 7
2,834,158 UART: [art] Derive CDI
2,834,438 UART: [art] Store in in slot 0x4
2,920,457 UART: [art] Derive Key Pair
2,920,817 UART: [art] Store priv key in slot 0x5
2,934,463 UART: [art] Derive Key Pair - Done
2,949,246 UART: [art] Signing Cert with AUTHO
2,949,726 UART: RITY.KEYID = 7
2,965,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,785 UART: [art] PUB.X = A998830D9F06805825BA65F33BB8732FBF419AB05ADD83D2195C24D35460B39DDB98943801FB6F4F732E6B4328082EFD
2,972,545 UART: [art] PUB.Y = BAF5D4B113885AFC71EC14F59303F0C2F53506C6BAC54CF50414BFDA3A421836F1D371F7FBB6CE237B4ABB08AB33E9CE
2,979,505 UART: [art] SIG.R = B52A64416C1D69B57F960F5ACF14E7355162EA9F4242C5B78CA532398DEBF7192D9790D6B14D7E6A2562CA6102550BED
2,986,270 UART: [art] SIG.S = BF86160F885421271BC15C05C4BD56AF875378A3BDB081C93314BFE62FBBDFD2564D3F02297FFB4EA2862ED5940DB3FA
3,010,297 UART: Caliptra RT
3,010,642 UART: [state] CFI Enabled
3,118,978 UART: [rt] RT listening for mailbox commands...
3,119,648 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,542 UART: [rt]cmd =0x4c444556, len=4
3,159,967 >>> mbox cmd response data (687 bytes)
3,159,968 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,401 UART: [rt]cmd =0x43455246, len=4
3,201,524 >>> mbox cmd response data (887 bytes)
3,201,525 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,894 UART: [rt]cmd =0x43455252, len=4
3,241,647 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,680 >>> mbox cmd response: success
2,702,060 UART:
2,702,076 UART: Running Caliptra FMC ...
2,702,484 UART:
2,702,627 UART: [state] CFI Enabled
2,713,270 UART: [fht] FMC Alias Private Key: 7
2,820,049 UART: [art] Extend RT PCRs Done
2,820,477 UART: [art] Lock RT PCRs Done
2,821,929 UART: [art] Populate DV Done
2,830,296 UART: [fht] FMC Alias Private Key: 7
2,831,224 UART: [art] Derive CDI
2,831,504 UART: [art] Store in in slot 0x4
2,917,305 UART: [art] Derive Key Pair
2,917,665 UART: [art] Store priv key in slot 0x5
2,930,539 UART: [art] Derive Key Pair - Done
2,944,725 UART: [art] Signing Cert with AUTHO
2,945,205 UART: RITY.KEYID = 7
2,960,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,012 UART: [art] PUB.X = 3A28E677CF4D89D53C739095768C2C67138907B95360D8DCDA607430E980AF66E700EE7AFFD5DCC5E4CB47FBFABE3EBA
2,967,775 UART: [art] PUB.Y = D6D270734BE1EB00C8A67C622A22EBC70C513095DB4635B6052F8531912C09C99AA2E12F23B41C336B819474C12D8F64
2,974,692 UART: [art] SIG.R = 0B3C5C0852DAEA4DFE247C3EE8860F20BA003579F565C77189AFCB29E4A5B78265168F3C798E3BD2B348F8AACECFB961
2,981,447 UART: [art] SIG.S = BC105F9990CEC572A927B02968323C51EABEC2CB7BA3FD3C0CA60C0B1BA44C24FDF633E8EB9873CE79F970266E07996C
3,004,950 UART: Caliptra RT
3,005,295 UART: [state] CFI Enabled
3,112,826 UART: [rt] RT listening for mailbox commands...
3,113,496 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,592 UART: [rt]cmd =0x4c444556, len=4
3,154,011 >>> mbox cmd response data (687 bytes)
3,154,012 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,237 UART: [rt]cmd =0x43455246, len=4
3,195,370 >>> mbox cmd response data (887 bytes)
3,195,371 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,686 UART: [rt]cmd =0x43455252, len=4
3,235,648 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,500 >>> mbox cmd response: success
2,701,782 UART:
2,701,798 UART: Running Caliptra FMC ...
2,702,206 UART:
2,702,349 UART: [state] CFI Enabled
2,713,106 UART: [fht] FMC Alias Private Key: 7
2,821,135 UART: [art] Extend RT PCRs Done
2,821,563 UART: [art] Lock RT PCRs Done
2,822,903 UART: [art] Populate DV Done
2,831,032 UART: [fht] FMC Alias Private Key: 7
2,831,988 UART: [art] Derive CDI
2,832,268 UART: [art] Store in in slot 0x4
2,918,331 UART: [art] Derive Key Pair
2,918,691 UART: [art] Store priv key in slot 0x5
2,932,073 UART: [art] Derive Key Pair - Done
2,947,232 UART: [art] Signing Cert with AUTHO
2,947,712 UART: RITY.KEYID = 7
2,962,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,541 UART: [art] PUB.X = AD3D0980C13EB225A2A5F01141999FBBBD6083D38FE90D325D4E873D73DC18945823DE7C0F3E9EC1B597188B7EB55C8D
2,970,312 UART: [art] PUB.Y = E05C16E1AE20F1D3E35B48F0A6F0AA98FFE410384CC3B0D1FCD4D9420F3A31C5BE4F5249F2960E7A7B3C8573171EB620
2,977,270 UART: [art] SIG.R = 3FA913170974F086205B5F73FA7101EB54E6DF712E7107854780173E82ADB0E37D8445814913697AAFB3239BA17BD5A2
2,984,025 UART: [art] SIG.S = 4C9BBFA7FC4230BD6FDE885CF32C69AB06AC3A736611DFA337B7AAFFEA430A8EA83F3891DAE535549A9982095AB31730
3,007,925 UART: Caliptra RT
3,008,270 UART: [state] CFI Enabled
3,115,443 UART: [rt] RT listening for mailbox commands...
3,116,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,091 UART: [rt]cmd =0x4c444556, len=4
3,156,478 >>> mbox cmd response data (687 bytes)
3,156,479 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,556 UART: [rt]cmd =0x43455246, len=4
3,197,729 >>> mbox cmd response data (887 bytes)
3,197,730 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,109 UART: [rt]cmd =0x43455252, len=4
3,238,077 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,906 >>> mbox cmd response: success
2,703,656 UART:
2,703,672 UART: Running Caliptra FMC ...
2,704,080 UART:
2,704,223 UART: [state] CFI Enabled
2,714,500 UART: [fht] FMC Alias Private Key: 7
2,823,057 UART: [art] Extend RT PCRs Done
2,823,485 UART: [art] Lock RT PCRs Done
2,825,111 UART: [art] Populate DV Done
2,833,144 UART: [fht] FMC Alias Private Key: 7
2,834,232 UART: [art] Derive CDI
2,834,512 UART: [art] Store in in slot 0x4
2,919,959 UART: [art] Derive Key Pair
2,920,319 UART: [art] Store priv key in slot 0x5
2,933,703 UART: [art] Derive Key Pair - Done
2,948,291 UART: [art] Signing Cert with AUTHO
2,948,771 UART: RITY.KEYID = 7
2,963,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,340 UART: [art] PUB.X = 07DE42704C8BCE7A91DA948CFCA706E96FD79B6B4987EF7E5A522FFEA3117FE4013547F544386242D30E88A72B3A2A10
2,971,106 UART: [art] PUB.Y = 7661324E15CC0764A8DA1E607C9F658111CCD1DF0CF59DF89CCCAAFFCF08BE34142337CEF23CABF81A517947CCD74EEC
2,978,071 UART: [art] SIG.R = 921F3F63D3580DCDE41D67EC9DEB4DADF2EBFBF44CDF1135E00D696206FBE96A563DC50690B4AE26F9CBF3F92DEBB193
2,984,857 UART: [art] SIG.S = CC4C489042F7D2B5DB3BF5B130A634B30B63C0B1CEEAE43E417885EB4C4A330ABE290C9310EBDDA2E3E371889E1580D7
3,008,493 UART: Caliptra RT
3,008,838 UART: [state] CFI Enabled
3,116,588 UART: [rt] RT listening for mailbox commands...
3,117,258 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,268 UART: [rt]cmd =0x4c444556, len=4
3,157,605 >>> mbox cmd response data (687 bytes)
3,157,606 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,005 UART: [rt]cmd =0x43455246, len=4
3,199,112 >>> mbox cmd response data (887 bytes)
3,199,113 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,674 UART: [rt]cmd =0x43455252, len=4
3,239,701 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,056 >>> mbox cmd response: success
2,704,556 UART:
2,704,572 UART: Running Caliptra FMC ...
2,704,980 UART:
2,705,123 UART: [state] CFI Enabled
2,715,666 UART: [fht] FMC Alias Private Key: 7
2,823,643 UART: [art] Extend RT PCRs Done
2,824,071 UART: [art] Lock RT PCRs Done
2,825,687 UART: [art] Populate DV Done
2,834,034 UART: [fht] FMC Alias Private Key: 7
2,835,176 UART: [art] Derive CDI
2,835,456 UART: [art] Store in in slot 0x4
2,921,387 UART: [art] Derive Key Pair
2,921,747 UART: [art] Store priv key in slot 0x5
2,935,305 UART: [art] Derive Key Pair - Done
2,950,270 UART: [art] Signing Cert with AUTHO
2,950,750 UART: RITY.KEYID = 7
2,966,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,923 UART: [art] PUB.X = 8FAB0C7FEB3B8F2AD6C0AB6B6F3E7E76A9B27AA3AA5064B1CE203FAC26C4AD5C4797EBD712987790CD794F6B0A125823
2,973,709 UART: [art] PUB.Y = D9F99E7BB55FAB159946DCA2B99C7ECA8F4FFCC1F6BBFBBD168D24120B4E326416051119647F47F64D8A081F8F7847AC
2,980,666 UART: [art] SIG.R = FDEBE212BB48138E857F15F5E5D7E179F734D485BD88354D6E9BF607F766D5C5CAFA490564D358B1AEEBEBAAA73B2FD0
2,987,452 UART: [art] SIG.S = 44DEAD93132A85A5AFA139D73795A5C56E7886B263CB5E34BBAE661EA6ADE7358CC4700162B80004F3AAB37F3C536FB1
3,011,457 UART: Caliptra RT
3,011,802 UART: [state] CFI Enabled
3,119,121 UART: [rt] RT listening for mailbox commands...
3,119,791 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,355 UART: [rt]cmd =0x4c444556, len=4
3,159,672 >>> mbox cmd response data (687 bytes)
3,159,673 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,954 UART: [rt]cmd =0x43455246, len=4
3,200,989 >>> mbox cmd response data (887 bytes)
3,200,990 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,511 UART: [rt]cmd =0x43455252, len=4
3,241,299 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 858.78s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,411 UART: [afmc] --
2,847,319 UART: [cold-reset] --
2,848,237 UART: [state] Locking Datavault
2,849,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,804 UART: [state] Locking ICCM
2,850,442 UART: [exit] Launching FMC @ 0x40000130
2,855,771 UART:
2,855,787 UART: Running Caliptra FMC ...
2,856,195 UART:
2,856,249 UART: [state] CFI Enabled
2,866,874 UART: [fht] FMC Alias Private Key: 7
2,974,531 UART: [art] Extend RT PCRs Done
2,974,959 UART: [art] Lock RT PCRs Done
2,976,477 UART: [art] Populate DV Done
2,984,564 UART: [fht] FMC Alias Private Key: 7
2,985,548 UART: [art] Derive CDI
2,985,828 UART: [art] Store in in slot 0x4
3,071,483 UART: [art] Derive Key Pair
3,071,843 UART: [art] Store priv key in slot 0x5
3,084,725 UART: [art] Derive Key Pair - Done
3,099,943 UART: [art] Signing Cert with AUTHO
3,100,423 UART: RITY.KEYID = 7
3,115,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,540 UART: [art] PUB.X = 6188FE8326D9703C64C8A1B1B00DBC3FC90D135D6D71A09CB358318925D4596D4372A2487D929BE0ABFC7F1C999549B1
3,123,306 UART: [art] PUB.Y = 3E9A137289E3822D2F58B0A0D7E4D933FF72C8888491C97C15FCA04DD23BD16E4C4464927A8A92CBC97A5EE18CE7F0B2
3,130,266 UART: [art] SIG.R = EDFDFA401187491F98C2EEDCDDDA6DC56B4ABA04B43B0A00D9211D617AEC5FF8A75E4EEFEEB318F584CED6ABFE642BFE
3,137,048 UART: [art] SIG.S = 1AE710B8F9E090882E21B0BC3BAA45E2445E6F1D4B60955A5B99A491B4717D7302FC54CD6C76E4A7E9E6CAF830CB85B3
3,160,656 UART: Caliptra RT
3,160,909 UART: [state] CFI Enabled
3,266,373 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,060 UART: [kat] SHA2-512-ACC
905,961 UART: [kat] ECC-384
915,416 UART: [kat] HMAC-384Kdf
920,022 UART: [kat] LMS
1,168,334 UART: [kat] --
1,169,247 UART: [cold-reset] ++
1,169,609 UART: [fht] FHT @ 0x50003400
1,172,229 UART: [idev] ++
1,172,397 UART: [idev] CDI.KEYID = 6
1,172,758 UART: [idev] SUBJECT.KEYID = 7
1,173,183 UART: [idev] UDS.KEYID = 0
1,181,223 UART: [idev] Erasing UDS.KEYID = 0
1,198,406 UART: [idev] Sha384 KeyId Algorithm
1,202,151 UART: [idev] --
1,203,254 UART: [ldev] ++
1,203,422 UART: [ldev] CDI.KEYID = 6
1,203,786 UART: [ldev] SUBJECT.KEYID = 5
1,204,213 UART: [ldev] AUTHORITY.KEYID = 7
1,204,676 UART: [ldev] FE.KEYID = 1
1,209,558 UART: [ldev] Erasing FE.KEYID = 1
1,235,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,560 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,282 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,268 UART: [ldev] --
1,274,596 UART: [fwproc] Wait for Commands...
1,275,359 UART: [fwproc] Recv command 0x46574c44
1,276,092 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,413 >>> mbox cmd response: success
2,766,520 UART: [afmc] ++
2,766,688 UART: [afmc] CDI.KEYID = 6
2,767,051 UART: [afmc] SUBJECT.KEYID = 7
2,767,477 UART: [afmc] AUTHORITY.KEYID = 5
2,802,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,305 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,915 UART: [afmc] --
2,845,793 UART: [cold-reset] --
2,846,511 UART: [state] Locking Datavault
2,847,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,424 UART: [state] Locking ICCM
2,848,884 UART: [exit] Launching FMC @ 0x40000130
2,854,213 UART:
2,854,229 UART: Running Caliptra FMC ...
2,854,637 UART:
2,854,691 UART: [state] CFI Enabled
2,865,140 UART: [fht] FMC Alias Private Key: 7
2,973,237 UART: [art] Extend RT PCRs Done
2,973,665 UART: [art] Lock RT PCRs Done
2,975,137 UART: [art] Populate DV Done
2,983,500 UART: [fht] FMC Alias Private Key: 7
2,984,538 UART: [art] Derive CDI
2,984,818 UART: [art] Store in in slot 0x4
3,070,651 UART: [art] Derive Key Pair
3,071,011 UART: [art] Store priv key in slot 0x5
3,083,909 UART: [art] Derive Key Pair - Done
3,098,451 UART: [art] Signing Cert with AUTHO
3,098,931 UART: RITY.KEYID = 7
3,113,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,658 UART: [art] PUB.X = 057633D738D1E1C082C33161307CF1EDCD8DEBDE7824DFF0800D4BB16047F679EEB662D8C6AE90478B8206D0C1146C68
3,121,425 UART: [art] PUB.Y = 62798CA65E2EEDD9CEEF6B754D98C009CDC5C98606FCA5005A5E465189B5851709FAC456A2C8205535E7921377B639EE
3,128,348 UART: [art] SIG.R = 92332045D0D2C1AA1D65B5C4557F20FF57650A6A2B61064B10B6046A1B841B29979241DD0F826A559218274864065E9C
3,135,091 UART: [art] SIG.S = F245F12C25943EFF5B901685B4AE06350E6C8A49BA01985E4227F59837A1AB1F22D00C810C2E439E0C91024D48CC1D80
3,158,687 UART: Caliptra RT
3,158,940 UART: [state] CFI Enabled
3,266,249 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,325 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Fuse KeyId
1,200,856 UART: [idev] --
1,201,799 UART: [ldev] ++
1,201,967 UART: [ldev] CDI.KEYID = 6
1,202,331 UART: [ldev] SUBJECT.KEYID = 5
1,202,758 UART: [ldev] AUTHORITY.KEYID = 7
1,203,221 UART: [ldev] FE.KEYID = 1
1,208,377 UART: [ldev] Erasing FE.KEYID = 1
1,234,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,441 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,123 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,182 UART: [ldev] --
1,273,606 UART: [fwproc] Wait for Commands...
1,274,401 UART: [fwproc] Recv command 0x46574c44
1,275,134 UART: [fwproc] Recv'd Img size: 114332 bytes
2,572,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,163 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,764,861 >>> mbox cmd response: success
2,765,960 UART: [afmc] ++
2,766,128 UART: [afmc] CDI.KEYID = 6
2,766,491 UART: [afmc] SUBJECT.KEYID = 7
2,766,917 UART: [afmc] AUTHORITY.KEYID = 5
2,802,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,719 UART: [afmc] --
2,845,687 UART: [cold-reset] --
2,846,441 UART: [state] Locking Datavault
2,847,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,142 UART: [state] Locking ICCM
2,848,618 UART: [exit] Launching FMC @ 0x40000130
2,853,947 UART:
2,853,963 UART: Running Caliptra FMC ...
2,854,371 UART:
2,854,425 UART: [state] CFI Enabled
2,864,880 UART: [fht] FMC Alias Private Key: 7
2,972,669 UART: [art] Extend RT PCRs Done
2,973,097 UART: [art] Lock RT PCRs Done
2,974,669 UART: [art] Populate DV Done
2,982,822 UART: [fht] FMC Alias Private Key: 7
2,983,930 UART: [art] Derive CDI
2,984,210 UART: [art] Store in in slot 0x4
3,069,913 UART: [art] Derive Key Pair
3,070,273 UART: [art] Store priv key in slot 0x5
3,083,919 UART: [art] Derive Key Pair - Done
3,098,527 UART: [art] Signing Cert with AUTHO
3,099,007 UART: RITY.KEYID = 7
3,114,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,108 UART: [art] PUB.X = 96D44AF8BD6EB5CEFFFAB353C33C5913D416E8778F312C0A908BBFA656D68A643DEAA22C41D73719153077C21B2F1C4A
3,121,889 UART: [art] PUB.Y = 9147B450D1DD7C2C6A5F2C854E51F3D8A6DEE79D7D244C5B8868B48EBE18E0018CDDCA029B954208D5584D6F062EE4C7
3,128,839 UART: [art] SIG.R = C4639750B053A8538CD7BFC767A1682B8712EA943531E214F61EEC825F828DD12391507DBB0F5E45CA93E2D8C8D1BD59
3,135,610 UART: [art] SIG.S = 5EE077C9432AC08EEC475F1D5ECFE6F16D8FD2E7FAC2983802883A1ADB54BEBE7680B4046D349301DE0CC2DF4AC16188
3,159,087 UART: Caliptra RT
3,159,340 UART: [state] CFI Enabled
3,267,815 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 6.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,519 >>> mbox cmd response: success
2,682,547 UART:
2,682,563 UART: Running Caliptra FMC ...
2,682,971 UART:
2,683,025 UART: [state] CFI Enabled
2,693,576 UART: [fht] FMC Alias Private Key: 7
2,802,155 UART: [art] Extend RT PCRs Done
2,802,583 UART: [art] Lock RT PCRs Done
2,804,011 UART: [art] Populate DV Done
2,812,300 UART: [fht] FMC Alias Private Key: 7
2,813,344 UART: [art] Derive CDI
2,813,624 UART: [art] Store in in slot 0x4
2,899,153 UART: [art] Derive Key Pair
2,899,513 UART: [art] Store priv key in slot 0x5
2,912,629 UART: [art] Derive Key Pair - Done
2,927,477 UART: [art] Signing Cert with AUTHO
2,927,957 UART: RITY.KEYID = 7
2,943,305 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,070 UART: [art] PUB.X = 621AD68552EE6A52D540E013576965F1FC114F2EB431773A5D932471B25DF163F043293B3C93CD4F98434CACCE04E4F1
2,950,837 UART: [art] PUB.Y = 2F05DE7E6BF7AE5BB46ECDD7000222C8520ABD77A84ED4CBF9405E3398BE1517FE50B6492DB1AA609DB05AA50FF37535
2,957,771 UART: [art] SIG.R = 44589988E70D0B98A22EC8C4BA82D8FD326C9B6471D314B029B92B38427B429765E05CEFD4ECCDFECCE15C814B4A5EB6
2,964,549 UART: [art] SIG.S = B28A4432BC71690C63438DCDBAC030DF3C3F2BABF71D7FC9CCE642AEA5C1FC5100BF7720DFD6934AB8414AF18F188673
2,988,055 UART: Caliptra RT
2,988,308 UART: [state] CFI Enabled
3,095,871 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,349 >>> mbox cmd response: success
2,679,691 UART:
2,679,707 UART: Running Caliptra FMC ...
2,680,115 UART:
2,680,169 UART: [state] CFI Enabled
2,690,232 UART: [fht] FMC Alias Private Key: 7
2,798,079 UART: [art] Extend RT PCRs Done
2,798,507 UART: [art] Lock RT PCRs Done
2,800,617 UART: [art] Populate DV Done
2,809,090 UART: [fht] FMC Alias Private Key: 7
2,810,098 UART: [art] Derive CDI
2,810,378 UART: [art] Store in in slot 0x4
2,895,911 UART: [art] Derive Key Pair
2,896,271 UART: [art] Store priv key in slot 0x5
2,909,987 UART: [art] Derive Key Pair - Done
2,924,515 UART: [art] Signing Cert with AUTHO
2,924,995 UART: RITY.KEYID = 7
2,939,933 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,698 UART: [art] PUB.X = F41AFD0F3D8D82AFC00ADE43845AF1C1522603879788A9E31172D6455610C9D93B3751E833D9AE54B7CDF3A1DFDCE9D1
2,947,471 UART: [art] PUB.Y = FC83966BE7BB9EB66B5DC4A686A8F630C2629056544FA40075F628309126B6FE7FAB985A12FEA5C4B914DF03BB520FB1
2,954,403 UART: [art] SIG.R = 1083250DF3D73E9D17F1D0C7ECB9334ED260F4B350912C70EA7F21D63D0C33F69C0CA94F3C3E31D3DB73FA86563C87DB
2,961,176 UART: [art] SIG.S = ED524818E48AE1D9332F41CFC65CF608E34D6ABDB60999D70C697C40F3660D2374F162872DF424EF8951D104A7779D7C
2,985,104 UART: Caliptra RT
2,985,357 UART: [state] CFI Enabled
3,092,833 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,173 >>> mbox cmd response: success
2,679,755 UART:
2,679,771 UART: Running Caliptra FMC ...
2,680,179 UART:
2,680,233 UART: [state] CFI Enabled
2,690,502 UART: [fht] FMC Alias Private Key: 7
2,798,393 UART: [art] Extend RT PCRs Done
2,798,821 UART: [art] Lock RT PCRs Done
2,800,629 UART: [art] Populate DV Done
2,808,996 UART: [fht] FMC Alias Private Key: 7
2,810,122 UART: [art] Derive CDI
2,810,402 UART: [art] Store in in slot 0x4
2,895,969 UART: [art] Derive Key Pair
2,896,329 UART: [art] Store priv key in slot 0x5
2,909,539 UART: [art] Derive Key Pair - Done
2,924,128 UART: [art] Signing Cert with AUTHO
2,924,608 UART: RITY.KEYID = 7
2,939,720 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,485 UART: [art] PUB.X = BA2237191C90CBF0B785563F6CDB1F759938CD8522EFDE34530AFA399076C891E30AD613E06B684DBDFB4156C1756F8B
2,947,257 UART: [art] PUB.Y = CFF7B8A8BB5A133305A9E9C3C354B96831E1FBC49C1F90FC0AFE0051B9B7E16752E24D80D28E8E765D910BA9AC87238E
2,954,190 UART: [art] SIG.R = F892AD2877B9B07E233FEF4FF1723198A5639A867BAE1C46F8EC1FAD5728EE68D90258851FFE6EF33088BCE913CEF1BB
2,960,973 UART: [art] SIG.S = 96DB2E2E864D865E2998BF7D1CE743635DC0268E08354B2E79C1E990485690341835166F551BF5F86CBBB83008A81B31
2,984,450 UART: Caliptra RT
2,984,703 UART: [state] CFI Enabled
3,092,056 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,614,947 >>> mbox cmd response: success
2,677,055 UART:
2,677,071 UART: Running Caliptra FMC ...
2,677,479 UART:
2,677,533 UART: [state] CFI Enabled
2,687,992 UART: [fht] FMC Alias Private Key: 7
2,795,465 UART: [art] Extend RT PCRs Done
2,795,893 UART: [art] Lock RT PCRs Done
2,797,211 UART: [art] Populate DV Done
2,805,662 UART: [fht] FMC Alias Private Key: 7
2,806,658 UART: [art] Derive CDI
2,806,938 UART: [art] Store in in slot 0x4
2,892,913 UART: [art] Derive Key Pair
2,893,273 UART: [art] Store priv key in slot 0x5
2,906,175 UART: [art] Derive Key Pair - Done
2,921,130 UART: [art] Signing Cert with AUTHO
2,921,610 UART: RITY.KEYID = 7
2,936,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,531 UART: [art] PUB.X = A80FDC4DD655FBB1E1804937EC667416C08A19EE591553C6D7EBC07986D509658CD52EE2AFB1F52EC80D19AB05AC2678
2,944,301 UART: [art] PUB.Y = B3CFEB6CBF6F79E100826B50EEA003EA0E4C088DECBAD056BF4E1826451B08C9CFF9FAFAC86B55494229BE755A37DF22
2,951,241 UART: [art] SIG.R = E55D8FB2A6814B4DE84869B16F3F5743794B926D3074D8F7F87CE7BDC1A2DFB029459048F720B8C9CBA8922C62951B56
2,958,015 UART: [art] SIG.S = 3DC3A4E2166476E82DCB4C9C5D6A234F4380413F409AD6F930B4FA6712B8617DD02BE13F3A031A0CBCDC9A4D35D0EB32
2,981,906 UART: Caliptra RT
2,982,159 UART: [state] CFI Enabled
3,090,704 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.39s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,346 UART: [afmc] --
2,849,318 UART: [cold-reset] --
2,850,210 UART: [state] Locking Datavault
2,851,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,825 UART: [state] Locking ICCM
2,852,385 UART: [exit] Launching FMC @ 0x40000130
2,857,714 UART:
2,857,730 UART: Running Caliptra FMC ...
2,858,138 UART:
2,858,281 UART: [state] CFI Enabled
2,869,260 UART: [fht] FMC Alias Private Key: 7
2,976,887 UART: [art] Extend RT PCRs Done
2,977,315 UART: [art] Lock RT PCRs Done
2,978,849 UART: [art] Populate DV Done
2,987,156 UART: [fht] FMC Alias Private Key: 7
2,988,332 UART: [art] Derive CDI
2,988,612 UART: [art] Store in in slot 0x4
3,074,497 UART: [art] Derive Key Pair
3,074,857 UART: [art] Store priv key in slot 0x5
3,088,327 UART: [art] Derive Key Pair - Done
3,103,099 UART: [art] Signing Cert with AUTHO
3,103,579 UART: RITY.KEYID = 7
3,118,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,592 UART: [art] PUB.X = C9C4CA6B712520ECAC1A92ED91776D5C21FF35337359B9DE11FC7CE24B3C3E0FA729510FBF9D5D6AFFD91FF8E00D9A1C
3,126,377 UART: [art] PUB.Y = F275E3621A3793A6FD3A480A5F5AFB751B4BEE70B0E70D75C85661D1F790FC53BE641EC3A9046773C533FFAE3CA07F1B
3,133,332 UART: [art] SIG.R = F497F51520E26D0829D3B865250B09102850B129BCA7B9649C58DF4D35DA796AF74DEE5ADD9893A3BC4CC491510D7485
3,140,092 UART: [art] SIG.S = 8A0D7F42E3FFAF9C07D723416DEE9316AA499399AE7538EB782967F6D46B4575ED54E2CB8B3955FEA34711C9D003C9F0
3,163,786 UART: Caliptra RT
3,164,131 UART: [state] CFI Enabled
3,271,084 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,500 UART: [cold-reset] ++
1,169,928 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,181,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,085 UART: [idev] Sha384 KeyId Algorithm
1,202,736 UART: [idev] --
1,203,803 UART: [ldev] ++
1,203,971 UART: [ldev] CDI.KEYID = 6
1,204,335 UART: [ldev] SUBJECT.KEYID = 5
1,204,762 UART: [ldev] AUTHORITY.KEYID = 7
1,205,225 UART: [ldev] FE.KEYID = 1
1,210,595 UART: [ldev] Erasing FE.KEYID = 1
1,236,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,207 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,929 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,045 UART: [ldev] --
1,275,561 UART: [fwproc] Wait for Commands...
1,276,308 UART: [fwproc] Recv command 0x46574c44
1,277,041 UART: [fwproc] Recv'd Img size: 114332 bytes
2,575,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,658 >>> mbox cmd response: success
2,768,735 UART: [afmc] ++
2,768,903 UART: [afmc] CDI.KEYID = 6
2,769,266 UART: [afmc] SUBJECT.KEYID = 7
2,769,692 UART: [afmc] AUTHORITY.KEYID = 5
2,806,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,647 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,718 UART: [afmc] --
2,849,630 UART: [cold-reset] --
2,850,592 UART: [state] Locking Datavault
2,852,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,637 UART: [state] Locking ICCM
2,853,249 UART: [exit] Launching FMC @ 0x40000130
2,858,578 UART:
2,858,594 UART: Running Caliptra FMC ...
2,859,002 UART:
2,859,145 UART: [state] CFI Enabled
2,869,828 UART: [fht] FMC Alias Private Key: 7
2,977,895 UART: [art] Extend RT PCRs Done
2,978,323 UART: [art] Lock RT PCRs Done
2,979,653 UART: [art] Populate DV Done
2,987,662 UART: [fht] FMC Alias Private Key: 7
2,988,834 UART: [art] Derive CDI
2,989,114 UART: [art] Store in in slot 0x4
3,074,785 UART: [art] Derive Key Pair
3,075,145 UART: [art] Store priv key in slot 0x5
3,088,551 UART: [art] Derive Key Pair - Done
3,102,976 UART: [art] Signing Cert with AUTHO
3,103,456 UART: RITY.KEYID = 7
3,118,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,569 UART: [art] PUB.X = 238DF9B0B692AC0B142D90D089BC4CA75DCEC25CB426B6476C274AA99A66419BBC10F5CBD050B643D629A59B2B9D08E5
3,126,347 UART: [art] PUB.Y = 0626A8D70DFA6E523C72C7986A4571CFFCABE7C7BEE9919AA2385E9AAB87C20B959496A6EC0B08E25DD8FF223F59CC5D
3,133,302 UART: [art] SIG.R = 51CBF9759B57181E57BAF7D16C595C2CE103E89BC95A33ED8AA00BDBDD9EF13D3E50B9A42986344F7B7285FF4A41D787
3,140,080 UART: [art] SIG.S = 2116F7EEAD53D6A67B7552FE4B10BBCEBD3CFE0305E23B123EC3B6DFA51732297D2A149AA380D573A423E8CD47E43E55
3,164,071 UART: Caliptra RT
3,164,416 UART: [state] CFI Enabled
3,271,549 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,615 UART: [idev] Fuse KeyId
1,200,837 UART: [idev] --
1,201,670 UART: [ldev] ++
1,201,838 UART: [ldev] CDI.KEYID = 6
1,202,202 UART: [ldev] SUBJECT.KEYID = 5
1,202,629 UART: [ldev] AUTHORITY.KEYID = 7
1,203,092 UART: [ldev] FE.KEYID = 1
1,208,490 UART: [ldev] Erasing FE.KEYID = 1
1,235,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,778 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,460 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,615 UART: [ldev] --
1,275,003 UART: [fwproc] Wait for Commands...
1,275,676 UART: [fwproc] Recv command 0x46574c44
1,276,409 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,540 >>> mbox cmd response: success
2,767,627 UART: [afmc] ++
2,767,795 UART: [afmc] CDI.KEYID = 6
2,768,158 UART: [afmc] SUBJECT.KEYID = 7
2,768,584 UART: [afmc] AUTHORITY.KEYID = 5
2,804,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,999 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,820 UART: [afmc] --
2,847,916 UART: [cold-reset] --
2,848,898 UART: [state] Locking Datavault
2,850,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,673 UART: [state] Locking ICCM
2,851,203 UART: [exit] Launching FMC @ 0x40000130
2,856,532 UART:
2,856,548 UART: Running Caliptra FMC ...
2,856,956 UART:
2,857,099 UART: [state] CFI Enabled
2,867,502 UART: [fht] FMC Alias Private Key: 7
2,975,521 UART: [art] Extend RT PCRs Done
2,975,949 UART: [art] Lock RT PCRs Done
2,977,605 UART: [art] Populate DV Done
2,985,474 UART: [fht] FMC Alias Private Key: 7
2,986,654 UART: [art] Derive CDI
2,986,934 UART: [art] Store in in slot 0x4
3,072,745 UART: [art] Derive Key Pair
3,073,105 UART: [art] Store priv key in slot 0x5
3,086,743 UART: [art] Derive Key Pair - Done
3,101,519 UART: [art] Signing Cert with AUTHO
3,101,999 UART: RITY.KEYID = 7
3,117,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,166 UART: [art] PUB.X = 19DDC0CF7DB004463B15208CAF387BB6EA6CDB6E4D07657FF7970B401ABB732972141051CBC4900F81E332AB49288E1E
3,124,932 UART: [art] PUB.Y = 0581CC30B0816A2AFC434720BDD7BFA7A8760344A86A298E1F7378081B515FC9116741D390FB8467A3A31E264BEF1BA6
3,131,875 UART: [art] SIG.R = 8908E3B58CB643E24937EE6665941781085124C96E3B0B3FC767CD34C51D35DFBC3FF0F300736A294754C3E662B53077
3,138,608 UART: [art] SIG.S = D4DDF36CAA902C11856358968E9AE87CBFA3B6329F75CE8AE80119E18B969EC53682246FE1D9CAB94DA0D76C0C4BB5E7
3,163,303 UART: Caliptra RT
3,163,648 UART: [state] CFI Enabled
3,271,358 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,860 >>> mbox cmd response: success
2,685,152 UART:
2,685,168 UART: Running Caliptra FMC ...
2,685,576 UART:
2,685,719 UART: [state] CFI Enabled
2,696,648 UART: [fht] FMC Alias Private Key: 7
2,804,837 UART: [art] Extend RT PCRs Done
2,805,265 UART: [art] Lock RT PCRs Done
2,806,477 UART: [art] Populate DV Done
2,814,880 UART: [fht] FMC Alias Private Key: 7
2,815,946 UART: [art] Derive CDI
2,816,226 UART: [art] Store in in slot 0x4
2,901,961 UART: [art] Derive Key Pair
2,902,321 UART: [art] Store priv key in slot 0x5
2,915,651 UART: [art] Derive Key Pair - Done
2,930,090 UART: [art] Signing Cert with AUTHO
2,930,570 UART: RITY.KEYID = 7
2,945,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,455 UART: [art] PUB.X = 5E8D22FD64DF7145DEF79FE7E3FEBD782EE1E1A265E85DE0BD3A6A814A4B3D5DA60DC6EE36394F267DEFD2EF14C7566E
2,953,250 UART: [art] PUB.Y = A7E2AB1951ED6B7576228C938503F42D9A91A09BCB7C5AABB5478F65313B8C5C961DA0E56796BC54648EF650E3091130
2,960,196 UART: [art] SIG.R = 6F310A13B1014A0A0C22D309462410798C2A34EEF9618145112AF797D8A8D5EA05B5016F3923A4CA4536D98A1C7438A2
2,966,939 UART: [art] SIG.S = 549982E03C585949BBCFCB4F713CDD6C9C87F8B42155FFB0B7F29001F6C50AC6FD138B9029BE793800326C7EB83DF146
2,990,276 UART: Caliptra RT
2,990,621 UART: [state] CFI Enabled
3,099,830 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,068 >>> mbox cmd response: success
2,682,824 UART:
2,682,840 UART: Running Caliptra FMC ...
2,683,248 UART:
2,683,391 UART: [state] CFI Enabled
2,694,018 UART: [fht] FMC Alias Private Key: 7
2,802,403 UART: [art] Extend RT PCRs Done
2,802,831 UART: [art] Lock RT PCRs Done
2,804,613 UART: [art] Populate DV Done
2,812,708 UART: [fht] FMC Alias Private Key: 7
2,813,694 UART: [art] Derive CDI
2,813,974 UART: [art] Store in in slot 0x4
2,899,661 UART: [art] Derive Key Pair
2,900,021 UART: [art] Store priv key in slot 0x5
2,912,661 UART: [art] Derive Key Pair - Done
2,927,070 UART: [art] Signing Cert with AUTHO
2,927,550 UART: RITY.KEYID = 7
2,942,574 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,339 UART: [art] PUB.X = 3BED7A960C32E0C89AC3561FA0923B8FD9CA22FDF908AE1C60E9AD4179FB11B91F49B4DBBC53048867A8D31EACA9C8AF
2,950,124 UART: [art] PUB.Y = 0B9704EE961443002F94EE464A645F24B09FDC11B4537FAEF443B921631500DC3B5978899C1275459B2F27EC20641D20
2,957,016 UART: [art] SIG.R = A807795F74D350253C081FF938E2D06B31072B0B08DC04E3649A0BEEF6324B89C9227DA02D9CF4C42C3A896AD38F0C15
2,963,766 UART: [art] SIG.S = 60CBE172771639E26DDAD144E344743A8831F605ADCB4A377E721D168CBE44B77FD6353964B93768D36B0068EEB66B46
2,987,236 UART: Caliptra RT
2,987,581 UART: [state] CFI Enabled
3,094,859 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,964 >>> mbox cmd response: success
2,679,600 UART:
2,679,616 UART: Running Caliptra FMC ...
2,680,024 UART:
2,680,167 UART: [state] CFI Enabled
2,691,044 UART: [fht] FMC Alias Private Key: 7
2,799,101 UART: [art] Extend RT PCRs Done
2,799,529 UART: [art] Lock RT PCRs Done
2,800,631 UART: [art] Populate DV Done
2,808,744 UART: [fht] FMC Alias Private Key: 7
2,809,922 UART: [art] Derive CDI
2,810,202 UART: [art] Store in in slot 0x4
2,896,001 UART: [art] Derive Key Pair
2,896,361 UART: [art] Store priv key in slot 0x5
2,910,137 UART: [art] Derive Key Pair - Done
2,924,766 UART: [art] Signing Cert with AUTHO
2,925,246 UART: RITY.KEYID = 7
2,940,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,159 UART: [art] PUB.X = 927C55984DCA1DC7B5A392539068AC1EFA0F479F77AF2A8BC821F4DE49A0EFA7411053AD0817B516371587E81F8929AE
2,947,929 UART: [art] PUB.Y = D30784DEE1686428237DA9AD0F1C166CB5ABCA3B5ED633D14384A6F5CDEA18B32D9DA20AD17CCC1DD4500CE3700548A4
2,954,882 UART: [art] SIG.R = 951566B15B3BE63B4F0FF5C457F0739504B9C3FC1D405D61D4612016511251ABE6B9B0B7BA0C3A133E1392138D7FEA37
2,961,645 UART: [art] SIG.S = A9289ACBDE1E6696DA828D1906D409293BE274E6CA1264CFF5D3C575D01B769CE7BFE7ABBA6AAE4CF873E749CB55128E
2,985,634 UART: Caliptra RT
2,985,979 UART: [state] CFI Enabled
3,093,562 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,614,348 >>> mbox cmd response: success
2,676,792 UART:
2,676,808 UART: Running Caliptra FMC ...
2,677,216 UART:
2,677,359 UART: [state] CFI Enabled
2,687,962 UART: [fht] FMC Alias Private Key: 7
2,795,327 UART: [art] Extend RT PCRs Done
2,795,755 UART: [art] Lock RT PCRs Done
2,797,123 UART: [art] Populate DV Done
2,805,396 UART: [fht] FMC Alias Private Key: 7
2,806,370 UART: [art] Derive CDI
2,806,650 UART: [art] Store in in slot 0x4
2,892,183 UART: [art] Derive Key Pair
2,892,543 UART: [art] Store priv key in slot 0x5
2,906,307 UART: [art] Derive Key Pair - Done
2,920,717 UART: [art] Signing Cert with AUTHO
2,921,197 UART: RITY.KEYID = 7
2,936,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,314 UART: [art] PUB.X = 15F8CEEE86BDE45BCEC85D85A8363B5EC8C479DF44E993AEAC7EF1BFC426C77BF7E79DA81820B6180F51D8B84CC60E3D
2,944,104 UART: [art] PUB.Y = B2B06C35AEBEA67D0CAD5811F23C621992F0C4D9DF27E5F8DBF1CDEC5B370EC2C477C24433A1477FA1B43D5652F012A2
2,951,066 UART: [art] SIG.R = B045FC4BD15A3F9FE0BB0C16CB24C7B8B2D2204D3ED6C7C6D18A8A413F7C632BC175F44E3A26B0CE6DFB85565036F09F
2,957,853 UART: [art] SIG.S = 7B71E1A47452D5DDE779595577D510349E395FEC8980F4903407F11C0D38029138B5EC938F32A8B7A3A0293770353DB2
2,981,275 UART: Caliptra RT
2,981,620 UART: [state] CFI Enabled
3,089,635 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.26s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,825 UART: [afmc] --
2,848,769 UART: [cold-reset] --
2,849,905 UART: [state] Locking Datavault
2,851,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,730 UART: [state] Locking ICCM
2,852,198 UART: [exit] Launching FMC @ 0x40000130
2,857,527 UART:
2,857,543 UART: Running Caliptra FMC ...
2,857,951 UART:
2,858,005 UART: [state] CFI Enabled
2,868,072 UART: [fht] FMC Alias Private Key: 7
2,975,505 UART: [art] Extend RT PCRs Done
2,975,933 UART: [art] Lock RT PCRs Done
2,977,723 UART: [art] Populate DV Done
2,986,258 UART: [fht] FMC Alias Private Key: 7
2,987,400 UART: [art] Derive CDI
2,987,680 UART: [art] Store in in slot 0x4
3,073,349 UART: [art] Derive Key Pair
3,073,709 UART: [art] Store priv key in slot 0x5
3,087,191 UART: [art] Derive Key Pair - Done
3,101,680 UART: [art] Signing Cert with AUTHO
3,102,160 UART: RITY.KEYID = 7
3,117,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,377 UART: [art] PUB.X = 2F644387FCED96E56B2B1D9058DEF3CCF26070B11027612236A08989A61ED62F422F01A86F6FDC3B75249A6D95906B3C
3,125,146 UART: [art] PUB.Y = 3514874927E26C3C9B78DB53F7EE000B1F393F0897A3A54006851E0B0ADB7C575F9006BC044F94F29EE9DECB30DFA23E
3,132,061 UART: [art] SIG.R = 2D36CAC8FA06BE55AA992FE7A9D0FC32CF58D4968F3B491B5F9264FAE821A17DD71263364214F7205B1B6549EB152D4C
3,138,838 UART: [art] SIG.S = 32DB4B8F1948C8D44E2FAC43EA24CD70559A18AAB38EFF02E30F0060761818C9B7CBB34D6603F7BBAD092982B1DBB126
3,162,729 UART: Caliptra RT
3,162,982 UART: [state] CFI Enabled
3,270,061 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,919 UART: [state] WD Timer not started. Device not locked for debugging
87,162 UART: [kat] SHA2-256
890,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,841 UART: [kat] ++
894,993 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
903,866 UART: [kat] SHA2-512-ACC
905,767 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,596 UART: [idev] Sha384 KeyId Algorithm
1,202,291 UART: [idev] --
1,203,418 UART: [ldev] ++
1,203,586 UART: [ldev] CDI.KEYID = 6
1,203,950 UART: [ldev] SUBJECT.KEYID = 5
1,204,377 UART: [ldev] AUTHORITY.KEYID = 7
1,204,840 UART: [ldev] FE.KEYID = 1
1,210,160 UART: [ldev] Erasing FE.KEYID = 1
1,236,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,674 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,396 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,484 UART: [ldev] --
1,275,954 UART: [fwproc] Wait for Commands...
1,276,687 UART: [fwproc] Recv command 0x46574c44
1,277,420 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,811 >>> mbox cmd response: success
2,768,056 UART: [afmc] ++
2,768,224 UART: [afmc] CDI.KEYID = 6
2,768,587 UART: [afmc] SUBJECT.KEYID = 7
2,769,013 UART: [afmc] AUTHORITY.KEYID = 5
2,804,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,967 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,921 UART: [afmc] --
2,847,853 UART: [cold-reset] --
2,848,607 UART: [state] Locking Datavault
2,849,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,354 UART: [state] Locking ICCM
2,850,842 UART: [exit] Launching FMC @ 0x40000130
2,856,171 UART:
2,856,187 UART: Running Caliptra FMC ...
2,856,595 UART:
2,856,649 UART: [state] CFI Enabled
2,866,832 UART: [fht] FMC Alias Private Key: 7
2,974,489 UART: [art] Extend RT PCRs Done
2,974,917 UART: [art] Lock RT PCRs Done
2,976,755 UART: [art] Populate DV Done
2,985,008 UART: [fht] FMC Alias Private Key: 7
2,986,126 UART: [art] Derive CDI
2,986,406 UART: [art] Store in in slot 0x4
3,071,907 UART: [art] Derive Key Pair
3,072,267 UART: [art] Store priv key in slot 0x5
3,085,773 UART: [art] Derive Key Pair - Done
3,100,569 UART: [art] Signing Cert with AUTHO
3,101,049 UART: RITY.KEYID = 7
3,116,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,192 UART: [art] PUB.X = C8C5518ACB20E8167A63C6427A60BA734BE183719057E18FB4D024721EA2D427FA9A5C95C995CBC3FA4DD5D84542D66F
3,123,970 UART: [art] PUB.Y = FBEFCB0AB0D8349BF6B1F6AB17C48A5D1C5D4F8EE526F9F434F8BC92567845162070CF955610EA59EC3C20ABBE8772A6
3,130,935 UART: [art] SIG.R = FEA5C05355ADFF258FB4B29EFC65AD5C60EB829B14B84DFC30EEA47FACE516CF65F2F2C90506CF34EE56D0143A1CF17F
3,137,727 UART: [art] SIG.S = DA77CDA187C2A6F4CF1D23F359A55A810B9869B5CD0024DEA4E93D8F65A16C5457AAA56ABE63867691E047DC130A44C6
3,161,450 UART: Caliptra RT
3,161,703 UART: [state] CFI Enabled
3,269,954 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
890,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,839 UART: [kat] ++
894,991 UART: [kat] sha1
899,141 UART: [kat] SHA2-256
901,081 UART: [kat] SHA2-384
903,820 UART: [kat] SHA2-512-ACC
905,721 UART: [kat] ECC-384
915,360 UART: [kat] HMAC-384Kdf
919,924 UART: [kat] LMS
1,168,236 UART: [kat] --
1,169,183 UART: [cold-reset] ++
1,169,647 UART: [fht] FHT @ 0x50003400
1,172,311 UART: [idev] ++
1,172,479 UART: [idev] CDI.KEYID = 6
1,172,840 UART: [idev] SUBJECT.KEYID = 7
1,173,265 UART: [idev] UDS.KEYID = 0
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,160 UART: [idev] Fuse KeyId
1,199,382 UART: [idev] --
1,200,345 UART: [ldev] ++
1,200,513 UART: [ldev] CDI.KEYID = 6
1,200,877 UART: [ldev] SUBJECT.KEYID = 5
1,201,304 UART: [ldev] AUTHORITY.KEYID = 7
1,201,767 UART: [ldev] FE.KEYID = 1
1,206,967 UART: [ldev] Erasing FE.KEYID = 1
1,233,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,505 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,187 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,350 UART: [ldev] --
1,272,812 UART: [fwproc] Wait for Commands...
1,273,505 UART: [fwproc] Recv command 0x46574c44
1,274,238 UART: [fwproc] Recv'd Img size: 114332 bytes
2,572,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,598,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,763,837 >>> mbox cmd response: success
2,764,928 UART: [afmc] ++
2,765,096 UART: [afmc] CDI.KEYID = 6
2,765,459 UART: [afmc] SUBJECT.KEYID = 7
2,765,885 UART: [afmc] AUTHORITY.KEYID = 5
2,800,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,487 UART: [afmc] --
2,844,523 UART: [cold-reset] --
2,845,255 UART: [state] Locking Datavault
2,846,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,730 UART: [state] Locking ICCM
2,847,402 UART: [exit] Launching FMC @ 0x40000130
2,852,731 UART:
2,852,747 UART: Running Caliptra FMC ...
2,853,155 UART:
2,853,209 UART: [state] CFI Enabled
2,863,816 UART: [fht] FMC Alias Private Key: 7
2,972,101 UART: [art] Extend RT PCRs Done
2,972,529 UART: [art] Lock RT PCRs Done
2,973,791 UART: [art] Populate DV Done
2,981,664 UART: [fht] FMC Alias Private Key: 7
2,982,674 UART: [art] Derive CDI
2,982,954 UART: [art] Store in in slot 0x4
3,068,459 UART: [art] Derive Key Pair
3,068,819 UART: [art] Store priv key in slot 0x5
3,082,095 UART: [art] Derive Key Pair - Done
3,096,868 UART: [art] Signing Cert with AUTHO
3,097,348 UART: RITY.KEYID = 7
3,112,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,112,975 UART: [art] PUB.X = F2CF282CE76161116EB4CC4CF15F5D7D092E93340AD49CF38F92C1FAF8CDFFB02B09BE9B2041A671589FA9B89115C5E3
3,119,752 UART: [art] PUB.Y = C8CBCCA1BEE63FED038AA0852B956FE7121BDA805EBF29721936E7799FE59C4A9EC37A4C3603999629228EC1C29CDE4F
3,126,712 UART: [art] SIG.R = 9F2C8599C99D09499392EA02774B5DFA2A175253B7832390F0E3D1BF2BC0D909B939E329E27A77AD19F5AC0904A402E9
3,133,464 UART: [art] SIG.S = 78BDEFD7F93F40ABB9E6AA1E4AC8F88DA0D737C95450E0F6BF1CC0055322A60FA373A0943F2B32B3B7F786ED1D8259EB
3,157,361 UART: Caliptra RT
3,157,614 UART: [state] CFI Enabled
3,264,961 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,233 >>> mbox cmd response: success
2,684,009 UART:
2,684,025 UART: Running Caliptra FMC ...
2,684,433 UART:
2,684,487 UART: [state] CFI Enabled
2,695,452 UART: [fht] FMC Alias Private Key: 7
2,803,007 UART: [art] Extend RT PCRs Done
2,803,435 UART: [art] Lock RT PCRs Done
2,804,969 UART: [art] Populate DV Done
2,813,094 UART: [fht] FMC Alias Private Key: 7
2,814,028 UART: [art] Derive CDI
2,814,308 UART: [art] Store in in slot 0x4
2,899,579 UART: [art] Derive Key Pair
2,899,939 UART: [art] Store priv key in slot 0x5
2,913,015 UART: [art] Derive Key Pair - Done
2,927,491 UART: [art] Signing Cert with AUTHO
2,927,971 UART: RITY.KEYID = 7
2,943,047 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,812 UART: [art] PUB.X = 855B1EE93043E0A51963E93F31469F96AD4AF4312BF0D75E3A7EBCABA0DC44D69E24407C83D8672A6E5BA4DE7AE9DFD5
2,950,600 UART: [art] PUB.Y = 8D9666D9A68D02D33301E3F6DC81E8D53DD356DD7DA1B90CBD05F3F58C74576CA28F74D0DFEDBC424E01BD8F33B789EF
2,957,555 UART: [art] SIG.R = 1A3659A95B8A121232B91D404A75914023B5BAD9CD1BAA662C82701CA647F460644C1C73A230593BAC94C29974ED1A30
2,964,323 UART: [art] SIG.S = 3928B9A8E91F07DF135EE89D34427A8F3C527041A9494E7392C9C27877C3AD12A3AEC8D88F13175366C5CBCB15EDEAFF
2,988,213 UART: Caliptra RT
2,988,466 UART: [state] CFI Enabled
3,096,079 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,901 >>> mbox cmd response: success
2,679,363 UART:
2,679,379 UART: Running Caliptra FMC ...
2,679,787 UART:
2,679,841 UART: [state] CFI Enabled
2,690,622 UART: [fht] FMC Alias Private Key: 7
2,798,689 UART: [art] Extend RT PCRs Done
2,799,117 UART: [art] Lock RT PCRs Done
2,800,901 UART: [art] Populate DV Done
2,809,256 UART: [fht] FMC Alias Private Key: 7
2,810,342 UART: [art] Derive CDI
2,810,622 UART: [art] Store in in slot 0x4
2,896,355 UART: [art] Derive Key Pair
2,896,715 UART: [art] Store priv key in slot 0x5
2,909,965 UART: [art] Derive Key Pair - Done
2,924,977 UART: [art] Signing Cert with AUTHO
2,925,457 UART: RITY.KEYID = 7
2,939,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,642 UART: [art] PUB.X = 6D3959FED51C49978670E5C3D93711D35D2227DDE5118CBA71178819DB56EE7B9DA9ADCEEFD72C3270FDE4746E2D6084
2,947,422 UART: [art] PUB.Y = 3C082B9CF9420571C7F7B6EE731CEE812A32BC27F379BDB8C3FBF153E6A6E90740019F029D4A0388143CDC5CCB4CF3F5
2,954,368 UART: [art] SIG.R = BE634FC3A891FACBA7E410EEBEF2535CAE4050626EC90134AF9695640AC36BAC6E4279DB1DA4C8C3E1D6E8F76FAE9F12
2,961,156 UART: [art] SIG.S = 73933BD6AEC4617C46D0E05316E58249598993EC0D5F7FC34A268CAA5F9715DC4C278BBEF7BD8205D2D1F56853CB61E6
2,984,709 UART: Caliptra RT
2,984,962 UART: [state] CFI Enabled
3,091,316 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,853 >>> mbox cmd response: success
2,678,665 UART:
2,678,681 UART: Running Caliptra FMC ...
2,679,089 UART:
2,679,143 UART: [state] CFI Enabled
2,689,240 UART: [fht] FMC Alias Private Key: 7
2,797,253 UART: [art] Extend RT PCRs Done
2,797,681 UART: [art] Lock RT PCRs Done
2,799,065 UART: [art] Populate DV Done
2,807,334 UART: [fht] FMC Alias Private Key: 7
2,808,280 UART: [art] Derive CDI
2,808,560 UART: [art] Store in in slot 0x4
2,894,475 UART: [art] Derive Key Pair
2,894,835 UART: [art] Store priv key in slot 0x5
2,908,063 UART: [art] Derive Key Pair - Done
2,922,615 UART: [art] Signing Cert with AUTHO
2,923,095 UART: RITY.KEYID = 7
2,938,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,008 UART: [art] PUB.X = 12E44C8C45B845050B5552EF72A182A0B7405370AD851CF457F81D0CBA475D90359A202B0400E4A5A3EA7E7A87B7F2BA
2,945,748 UART: [art] PUB.Y = B7F7A14161059CD34FD544AF2AECB3B9B1B27CE5A26492484C71DF2B7B51CF8565F198CD3FEE0B6D516F1071AC8BD4CE
2,952,712 UART: [art] SIG.R = 0AE89BCAF955FBDA600544F282D0ECBB33FEE1B5F5FB00C9400335AF595F923CE68FC947E6E6D2CE90A1C5AC3E8CF241
2,959,475 UART: [art] SIG.S = 9E847C43D423DC63AB1D1080374FE6D275E37BDDC4984E6E40BD278EECDD7AD77830C3E201186EEEF58D448A018F0BA8
2,983,645 UART: Caliptra RT
2,983,898 UART: [state] CFI Enabled
3,091,344 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,615,983 >>> mbox cmd response: success
2,677,741 UART:
2,677,757 UART: Running Caliptra FMC ...
2,678,165 UART:
2,678,219 UART: [state] CFI Enabled
2,689,232 UART: [fht] FMC Alias Private Key: 7
2,797,197 UART: [art] Extend RT PCRs Done
2,797,625 UART: [art] Lock RT PCRs Done
2,799,217 UART: [art] Populate DV Done
2,807,264 UART: [fht] FMC Alias Private Key: 7
2,808,204 UART: [art] Derive CDI
2,808,484 UART: [art] Store in in slot 0x4
2,894,217 UART: [art] Derive Key Pair
2,894,577 UART: [art] Store priv key in slot 0x5
2,907,419 UART: [art] Derive Key Pair - Done
2,922,309 UART: [art] Signing Cert with AUTHO
2,922,789 UART: RITY.KEYID = 7
2,938,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,060 UART: [art] PUB.X = 88B4681D320F6D1E1FB9BB4E6B2027642DA7425632CC89596CCC36CF79117C53C24A80471F5F3670AC66E48B764ACDEE
2,945,833 UART: [art] PUB.Y = 389838EADEAAC7E686A9748D90C3847132AA41C062CC1C190DACB12882A259A680988D606DE557724C280D4ADB9B4F9F
2,952,783 UART: [art] SIG.R = 2A219B8DB1027F4D903A01EF333AD2DCFA3237FED256D729C30A8CAE19284BD3EA151ED0E0E1D82E6C2FB82731D4FFD4
2,959,564 UART: [art] SIG.S = 3FFB2228783FAA340935963D4B7C70FBED3C1E52E28B0B56F9F90B2E9358F3FC7F25E86E99193BCC22D5029CE7BC9E67
2,983,157 UART: Caliptra RT
2,983,410 UART: [state] CFI Enabled
3,092,355 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.09s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,214 UART: [afmc] --
2,851,110 UART: [cold-reset] --
2,851,976 UART: [state] Locking Datavault
2,852,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,565 UART: [state] Locking ICCM
2,854,217 UART: [exit] Launching FMC @ 0x40000130
2,859,546 UART:
2,859,562 UART: Running Caliptra FMC ...
2,859,970 UART:
2,860,113 UART: [state] CFI Enabled
2,870,802 UART: [fht] FMC Alias Private Key: 7
2,979,085 UART: [art] Extend RT PCRs Done
2,979,513 UART: [art] Lock RT PCRs Done
2,981,113 UART: [art] Populate DV Done
2,989,408 UART: [fht] FMC Alias Private Key: 7
2,990,540 UART: [art] Derive CDI
2,990,820 UART: [art] Store in in slot 0x4
3,076,981 UART: [art] Derive Key Pair
3,077,341 UART: [art] Store priv key in slot 0x5
3,091,115 UART: [art] Derive Key Pair - Done
3,106,000 UART: [art] Signing Cert with AUTHO
3,106,480 UART: RITY.KEYID = 7
3,121,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,197 UART: [art] PUB.X = DCB2E7E566F5B9AC7BF08DF7A790C81D630B4246D6955B14CB38DFEA9A7F82BE429E1ABB1896F02D7ED6E69FBEB213A7
3,128,988 UART: [art] PUB.Y = 73128D0D2B67436931C1C30BE40B420891A7DD8CBBA909DD436DB44A0E03F3ECA73E1A58FA14A3A011A0F3FC2B41F7E5
3,135,931 UART: [art] SIG.R = E9A1D48C05CE99FBFEC652D57D17722C511157BED9FAB9B5BD0DF315AD56DF20A678E1039A09F0F9213AADC419A2432B
3,142,707 UART: [art] SIG.S = 514C0A57B6D92156961E1E07849C2C37A8FA3927289F705BA69762FA0973D034FDC39D8D5CE026E2D1771524AFC0C01E
3,166,653 UART: Caliptra RT
3,166,998 UART: [state] CFI Enabled
3,274,648 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,230 UART: [state] WD Timer not started. Device not locked for debugging
88,517 UART: [kat] SHA2-256
892,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,196 UART: [kat] ++
896,348 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
916,713 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,171,118 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,183,158 UART: [idev] Erasing UDS.KEYID = 0
1,200,287 UART: [idev] Sha384 KeyId Algorithm
1,204,020 UART: [idev] --
1,205,043 UART: [ldev] ++
1,205,211 UART: [ldev] CDI.KEYID = 6
1,205,575 UART: [ldev] SUBJECT.KEYID = 5
1,206,002 UART: [ldev] AUTHORITY.KEYID = 7
1,206,465 UART: [ldev] FE.KEYID = 1
1,211,863 UART: [ldev] Erasing FE.KEYID = 1
1,238,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,635 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,357 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,469 UART: [ldev] --
1,277,775 UART: [fwproc] Wait for Commands...
1,278,444 UART: [fwproc] Recv command 0x46574c44
1,279,177 UART: [fwproc] Recv'd Img size: 114332 bytes
2,576,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,764 >>> mbox cmd response: success
2,768,885 UART: [afmc] ++
2,769,053 UART: [afmc] CDI.KEYID = 6
2,769,416 UART: [afmc] SUBJECT.KEYID = 7
2,769,842 UART: [afmc] AUTHORITY.KEYID = 5
2,804,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,430 UART: [afmc] --
2,848,528 UART: [cold-reset] --
2,849,260 UART: [state] Locking Datavault
2,850,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,265 UART: [state] Locking ICCM
2,851,839 UART: [exit] Launching FMC @ 0x40000130
2,857,168 UART:
2,857,184 UART: Running Caliptra FMC ...
2,857,592 UART:
2,857,735 UART: [state] CFI Enabled
2,867,888 UART: [fht] FMC Alias Private Key: 7
2,975,793 UART: [art] Extend RT PCRs Done
2,976,221 UART: [art] Lock RT PCRs Done
2,977,621 UART: [art] Populate DV Done
2,985,812 UART: [fht] FMC Alias Private Key: 7
2,986,788 UART: [art] Derive CDI
2,987,068 UART: [art] Store in in slot 0x4
3,072,695 UART: [art] Derive Key Pair
3,073,055 UART: [art] Store priv key in slot 0x5
3,086,561 UART: [art] Derive Key Pair - Done
3,101,032 UART: [art] Signing Cert with AUTHO
3,101,512 UART: RITY.KEYID = 7
3,116,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,525 UART: [art] PUB.X = A9589DAC275F9E78AEFC6487A283762BE4C0B48FCA2B20C1F02141565699DC266B934E8D96DF1FAA05976C81F88B91ED
3,124,302 UART: [art] PUB.Y = 9B2D371B8D57F7FE5DC5B881CB013275DAF36695C16EB95AB46743C5A72D20CA16774B1CD8FA089880976379CF84A4AC
3,131,254 UART: [art] SIG.R = 8AC5A0CC9466B590E5EFEE32FEF94865F15B6E5B4846280ED56F480E770EC4E7DE854DC65F33C6A4968C2BEE0A800FA6
3,138,025 UART: [art] SIG.S = EFBAB3F228FB552D660C88C937250E138A4BE736E4837DA5F4BAAC8559E0E833B30EE90100D6B03B8C2567D19A1C23E6
3,161,948 UART: Caliptra RT
3,162,293 UART: [state] CFI Enabled
3,270,360 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Fuse KeyId
1,200,703 UART: [idev] --
1,201,806 UART: [ldev] ++
1,201,974 UART: [ldev] CDI.KEYID = 6
1,202,338 UART: [ldev] SUBJECT.KEYID = 5
1,202,765 UART: [ldev] AUTHORITY.KEYID = 7
1,203,228 UART: [ldev] FE.KEYID = 1
1,208,600 UART: [ldev] Erasing FE.KEYID = 1
1,235,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,336 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,018 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,229 UART: [ldev] --
1,274,739 UART: [fwproc] Wait for Commands...
1,275,384 UART: [fwproc] Recv command 0x46574c44
1,276,117 UART: [fwproc] Recv'd Img size: 114332 bytes
2,572,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,764,828 >>> mbox cmd response: success
2,765,907 UART: [afmc] ++
2,766,075 UART: [afmc] CDI.KEYID = 6
2,766,438 UART: [afmc] SUBJECT.KEYID = 7
2,766,864 UART: [afmc] AUTHORITY.KEYID = 5
2,801,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,824 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,543 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,314 UART: [afmc] --
2,845,254 UART: [cold-reset] --
2,846,034 UART: [state] Locking Datavault
2,847,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,761 UART: [state] Locking ICCM
2,848,319 UART: [exit] Launching FMC @ 0x40000130
2,853,648 UART:
2,853,664 UART: Running Caliptra FMC ...
2,854,072 UART:
2,854,215 UART: [state] CFI Enabled
2,864,946 UART: [fht] FMC Alias Private Key: 7
2,972,955 UART: [art] Extend RT PCRs Done
2,973,383 UART: [art] Lock RT PCRs Done
2,974,737 UART: [art] Populate DV Done
2,983,110 UART: [fht] FMC Alias Private Key: 7
2,984,258 UART: [art] Derive CDI
2,984,538 UART: [art] Store in in slot 0x4
3,070,111 UART: [art] Derive Key Pair
3,070,471 UART: [art] Store priv key in slot 0x5
3,083,765 UART: [art] Derive Key Pair - Done
3,098,252 UART: [art] Signing Cert with AUTHO
3,098,732 UART: RITY.KEYID = 7
3,113,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,595 UART: [art] PUB.X = 9B51347A0E89F1EF94912209E40C6169A70973C0AAE7BB5726FA5D4DF7A9600C725EB8960C39C0B275C5B5AC32A0A71C
3,121,353 UART: [art] PUB.Y = 1A9288CB5F60A903F0131D8278869980B60998AB016C0294E2FE4BEF54AD3B2DDB630B7397AEB177E5995B3DA197E94A
3,128,292 UART: [art] SIG.R = AECE7EBBE20496741A4DFA784E81796AC415B3FCF1A8D9A9DC5DCF40A1AAD1D57813FC3381BE75AA53C26CCEF034628A
3,135,085 UART: [art] SIG.S = 367DC3E7CF17D967D26A1FF48BB8D87C2287D3905CB5022AB75B624F54DE7045F08E183F4C3E7950558D4F026474D94E
3,158,714 UART: Caliptra RT
3,159,059 UART: [state] CFI Enabled
3,267,126 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,874 >>> mbox cmd response: success
2,684,880 UART:
2,684,896 UART: Running Caliptra FMC ...
2,685,304 UART:
2,685,447 UART: [state] CFI Enabled
2,696,076 UART: [fht] FMC Alias Private Key: 7
2,804,021 UART: [art] Extend RT PCRs Done
2,804,449 UART: [art] Lock RT PCRs Done
2,805,599 UART: [art] Populate DV Done
2,813,924 UART: [fht] FMC Alias Private Key: 7
2,814,962 UART: [art] Derive CDI
2,815,242 UART: [art] Store in in slot 0x4
2,900,901 UART: [art] Derive Key Pair
2,901,261 UART: [art] Store priv key in slot 0x5
2,914,415 UART: [art] Derive Key Pair - Done
2,929,326 UART: [art] Signing Cert with AUTHO
2,929,806 UART: RITY.KEYID = 7
2,945,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,879 UART: [art] PUB.X = 7D49F4F84DD821EC5D6C6E1578149A84FFF22D62FA7A2F1F8DCB95A5A9C528857062714ED35A343FFD5BFECA460A9EDA
2,952,666 UART: [art] PUB.Y = 5E0FF5EA81519EF1A775FFD58CB80F025B49F997EA5E1CC9F0501B8992695835176F9EBA50762F77BD259F7DF60CCC54
2,959,614 UART: [art] SIG.R = AB730EA50B15E7DBD3F9A900B8852FC0A94007C8234FECA6AD761800BE21355DEEF91A6436460BAE801156F3D98C00C4
2,966,316 UART: [art] SIG.S = 91789B83BDC03574540E1869B9C357511991F9BF848FB56A74D973EEEB27427A28DA7E4DAEA737EA5B49AA0412BE0313
2,989,860 UART: Caliptra RT
2,990,205 UART: [state] CFI Enabled
3,098,467 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,684 >>> mbox cmd response: success
2,683,656 UART:
2,683,672 UART: Running Caliptra FMC ...
2,684,080 UART:
2,684,223 UART: [state] CFI Enabled
2,694,816 UART: [fht] FMC Alias Private Key: 7
2,802,295 UART: [art] Extend RT PCRs Done
2,802,723 UART: [art] Lock RT PCRs Done
2,804,393 UART: [art] Populate DV Done
2,812,774 UART: [fht] FMC Alias Private Key: 7
2,813,738 UART: [art] Derive CDI
2,814,018 UART: [art] Store in in slot 0x4
2,899,397 UART: [art] Derive Key Pair
2,899,757 UART: [art] Store priv key in slot 0x5
2,912,675 UART: [art] Derive Key Pair - Done
2,927,470 UART: [art] Signing Cert with AUTHO
2,927,950 UART: RITY.KEYID = 7
2,944,002 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,767 UART: [art] PUB.X = 480C722FFD06106B61CA6A6900C6DEA4B6492390FA5920548035396F7FAA30C3D5A393AEEFC6541C8EFA39228C0EBCFC
2,951,518 UART: [art] PUB.Y = 5E536F37806F9AAE5C08276412AE583C6FCAFC3E7959120B01B1016F7CEF12C1F1B0D92A2ECCCF010816E58F5A13166D
2,958,460 UART: [art] SIG.R = 3FFF0DFDB5AC87D03C5DDAA1620014932D3419FF1566B59033461221D2AC570429A46F626B114C20D77B41BC2B82B35D
2,965,206 UART: [art] SIG.S = 45FC87DA1D4E0B51BC14542EF1D7BC59CF6DEBCEBD707E5AC8A3E93EAC159C2EAD56868BB012156DD541D226EAC186EE
2,988,782 UART: Caliptra RT
2,989,127 UART: [state] CFI Enabled
3,096,566 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,184 >>> mbox cmd response: success
2,679,342 UART:
2,679,358 UART: Running Caliptra FMC ...
2,679,766 UART:
2,679,909 UART: [state] CFI Enabled
2,690,852 UART: [fht] FMC Alias Private Key: 7
2,798,265 UART: [art] Extend RT PCRs Done
2,798,693 UART: [art] Lock RT PCRs Done
2,800,367 UART: [art] Populate DV Done
2,808,678 UART: [fht] FMC Alias Private Key: 7
2,809,688 UART: [art] Derive CDI
2,809,968 UART: [art] Store in in slot 0x4
2,895,555 UART: [art] Derive Key Pair
2,895,915 UART: [art] Store priv key in slot 0x5
2,909,015 UART: [art] Derive Key Pair - Done
2,923,918 UART: [art] Signing Cert with AUTHO
2,924,398 UART: RITY.KEYID = 7
2,939,896 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,661 UART: [art] PUB.X = 733AC40E531E3178FF1341A3CBC755E25E881467FAA1B88F601C89B39B7FB84C09FC7169C364D3C4A7AFED92BFF00A5D
2,947,436 UART: [art] PUB.Y = 498C8A977CA364AC5AA8E3859323C213B78171271F9093FB6566D64B8563F4E96170E5376F2D5E18C1EC0A94F1EF6D50
2,954,381 UART: [art] SIG.R = 1FFD08AEB0214AC41B16E17809AFB2C1E118F367DC25FB03257A190FB8E1485AFC2F983AF25C49F621CE564A26423BA5
2,961,151 UART: [art] SIG.S = 185C0B42478CBF7D4ABF4753EC204E323DDCF8E9B11A66481719D286A7900DA27FE0468C111BC16D86FCDC90587A6AA0
2,984,744 UART: Caliptra RT
2,985,089 UART: [state] CFI Enabled
3,093,070 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,613,920 >>> mbox cmd response: success
2,675,704 UART:
2,675,720 UART: Running Caliptra FMC ...
2,676,128 UART:
2,676,271 UART: [state] CFI Enabled
2,686,748 UART: [fht] FMC Alias Private Key: 7
2,794,231 UART: [art] Extend RT PCRs Done
2,794,659 UART: [art] Lock RT PCRs Done
2,795,889 UART: [art] Populate DV Done
2,804,006 UART: [fht] FMC Alias Private Key: 7
2,805,016 UART: [art] Derive CDI
2,805,296 UART: [art] Store in in slot 0x4
2,891,287 UART: [art] Derive Key Pair
2,891,647 UART: [art] Store priv key in slot 0x5
2,905,257 UART: [art] Derive Key Pair - Done
2,919,704 UART: [art] Signing Cert with AUTHO
2,920,184 UART: RITY.KEYID = 7
2,935,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,595 UART: [art] PUB.X = D3B02662A454180DCA13518C087E383D184BB444D4352FBB3C2735AFD002D39AB455651AB03DC2B1D201C55A218FDDC1
2,943,359 UART: [art] PUB.Y = 4FA3B1B2E70033595ADFB814D3255DB9ECD6B2A7CE7B333FE8F907B1428FCF606388E166A094FA079708F7F6B4DB4663
2,950,288 UART: [art] SIG.R = 60CBFC3CF841D109A79F180EB3DD2ED1916E3F4654861C4D7FB0252EBCBDE2E203081BFCEC887B26BD60FEE93FE1D3E7
2,957,070 UART: [art] SIG.S = 18A2CCF2C68337335241809532A454C8E279D73DD286647420268BD8B24F1F0365AAE65FA03399E808A31593470BE35B
2,980,504 UART: Caliptra RT
2,980,849 UART: [state] CFI Enabled
3,088,702 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.73s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,127 UART: [afmc] --
2,848,039 UART: [cold-reset] --
2,848,797 UART: [state] Locking Datavault
2,850,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,660 UART: [state] Locking ICCM
2,851,248 UART: [exit] Launching FMC @ 0x40000130
2,856,577 UART:
2,856,593 UART: Running Caliptra FMC ...
2,857,001 UART:
2,857,055 UART: [state] CFI Enabled
2,867,752 UART: [fht] FMC Alias Private Key: 7
2,975,411 UART: [art] Extend RT PCRs Done
2,975,839 UART: [art] Lock RT PCRs Done
2,977,313 UART: [art] Populate DV Done
2,985,586 UART: [fht] FMC Alias Private Key: 7
2,986,546 UART: [art] Derive CDI
2,986,826 UART: [art] Store in in slot 0x4
3,072,135 UART: [art] Derive Key Pair
3,072,495 UART: [art] Store priv key in slot 0x5
3,085,643 UART: [art] Derive Key Pair - Done
3,100,411 UART: [art] Signing Cert with AUTHO
3,100,891 UART: RITY.KEYID = 7
3,115,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,506 UART: [art] PUB.X = A23E0D4E367E130DD047DEB60F2823CD48109823B81F3BFEF3D98AFB3347969DC29A131D610C3F0ABFD655E122925602
3,123,264 UART: [art] PUB.Y = 41CCC766BA86102CFDCDBF6FF28099A07A990FD3F2D1A13EBB66A5BBF0A8C1A4F6E5FC2300487CBFD75ADB619E1C46B0
3,130,217 UART: [art] SIG.R = 0656602A396B09F04E018D34BBCE35A65F00FC90E4ED3A868A80D631CFE9B8FE9143E4D00B10DA27B3E6170941D38FFE
3,136,960 UART: [art] SIG.S = 2DBA9E37FFD5AF2A019CFB10628736DCCE58C79ACF3CC93559C8E35F4ACA0CBEAC92C4FB5D6F5D94789966E8FA6993D5
3,160,937 UART: Caliptra RT
3,161,190 UART: [state] CFI Enabled
3,267,323 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha384 KeyId Algorithm
1,202,873 UART: [idev] --
1,203,924 UART: [ldev] ++
1,204,092 UART: [ldev] CDI.KEYID = 6
1,204,456 UART: [ldev] SUBJECT.KEYID = 5
1,204,883 UART: [ldev] AUTHORITY.KEYID = 7
1,205,346 UART: [ldev] FE.KEYID = 1
1,210,382 UART: [ldev] Erasing FE.KEYID = 1
1,236,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,788 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,510 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,578 UART: [ldev] --
1,275,920 UART: [fwproc] Wait for Commands...
1,276,523 UART: [fwproc] Recv command 0x46574c44
1,277,256 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,117 >>> mbox cmd response: success
2,768,248 UART: [afmc] ++
2,768,416 UART: [afmc] CDI.KEYID = 6
2,768,779 UART: [afmc] SUBJECT.KEYID = 7
2,769,205 UART: [afmc] AUTHORITY.KEYID = 5
2,804,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,947 UART: [afmc] --
2,847,949 UART: [cold-reset] --
2,848,877 UART: [state] Locking Datavault
2,849,932 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,536 UART: [state] Locking ICCM
2,851,010 UART: [exit] Launching FMC @ 0x40000130
2,856,339 UART:
2,856,355 UART: Running Caliptra FMC ...
2,856,763 UART:
2,856,817 UART: [state] CFI Enabled
2,867,090 UART: [fht] FMC Alias Private Key: 7
2,975,471 UART: [art] Extend RT PCRs Done
2,975,899 UART: [art] Lock RT PCRs Done
2,977,133 UART: [art] Populate DV Done
2,985,192 UART: [fht] FMC Alias Private Key: 7
2,986,164 UART: [art] Derive CDI
2,986,444 UART: [art] Store in in slot 0x4
3,072,431 UART: [art] Derive Key Pair
3,072,791 UART: [art] Store priv key in slot 0x5
3,085,335 UART: [art] Derive Key Pair - Done
3,100,013 UART: [art] Signing Cert with AUTHO
3,100,493 UART: RITY.KEYID = 7
3,115,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,458 UART: [art] PUB.X = ECCBDDB35D75A37CC6EC4E9CAC2DD8C0C16F1A52E85052EE042E4C538C32CBD0EF1E484006FF23EE7A989B606F9DD62E
3,123,250 UART: [art] PUB.Y = E006E112DAA0FBCB08A7AF794EB078982DAFBA5AA62CE50DC5EDA7F314E4419DF021552C2819579335E96784E0C6EF24
3,130,205 UART: [art] SIG.R = B755A120CE304A13341BEFB25B5A462754986951CCCDEB664D9EA2875FD77D9909715BED39B3F8868C4999EC2E9FE42B
3,136,980 UART: [art] SIG.S = 59AD0BD2F6275CE7C72952165C8DA693AB3F1A7D3E361CD5DBB6F083B34DCD07D8AF2964C0B0F2805DE4F88DA836BA1C
3,160,789 UART: Caliptra RT
3,161,042 UART: [state] CFI Enabled
3,267,314 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,819 UART: [state] WD Timer not started. Device not locked for debugging
86,934 UART: [kat] SHA2-256
890,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,613 UART: [kat] ++
894,765 UART: [kat] sha1
899,117 UART: [kat] SHA2-256
901,057 UART: [kat] SHA2-384
903,724 UART: [kat] SHA2-512-ACC
905,625 UART: [kat] ECC-384
915,152 UART: [kat] HMAC-384Kdf
919,588 UART: [kat] LMS
1,167,900 UART: [kat] --
1,168,851 UART: [cold-reset] ++
1,169,293 UART: [fht] FHT @ 0x50003400
1,171,943 UART: [idev] ++
1,172,111 UART: [idev] CDI.KEYID = 6
1,172,472 UART: [idev] SUBJECT.KEYID = 7
1,172,897 UART: [idev] UDS.KEYID = 0
1,180,899 UART: [idev] Erasing UDS.KEYID = 0
1,197,516 UART: [idev] Fuse KeyId
1,198,738 UART: [idev] --
1,199,673 UART: [ldev] ++
1,199,841 UART: [ldev] CDI.KEYID = 6
1,200,205 UART: [ldev] SUBJECT.KEYID = 5
1,200,632 UART: [ldev] AUTHORITY.KEYID = 7
1,201,095 UART: [ldev] FE.KEYID = 1
1,206,093 UART: [ldev] Erasing FE.KEYID = 1
1,231,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,245,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,251,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,256,923 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,262,605 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,269,736 UART: [ldev] --
1,271,216 UART: [fwproc] Wait for Commands...
1,271,867 UART: [fwproc] Recv command 0x46574c44
1,272,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,570,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,627,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,762,869 >>> mbox cmd response: success
2,763,984 UART: [afmc] ++
2,764,152 UART: [afmc] CDI.KEYID = 6
2,764,515 UART: [afmc] SUBJECT.KEYID = 7
2,764,941 UART: [afmc] AUTHORITY.KEYID = 5
2,800,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,193 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,779 UART: [afmc] --
2,843,739 UART: [cold-reset] --
2,844,609 UART: [state] Locking Datavault
2,845,862 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,466 UART: [state] Locking ICCM
2,847,120 UART: [exit] Launching FMC @ 0x40000130
2,852,449 UART:
2,852,465 UART: Running Caliptra FMC ...
2,852,873 UART:
2,852,927 UART: [state] CFI Enabled
2,863,546 UART: [fht] FMC Alias Private Key: 7
2,971,161 UART: [art] Extend RT PCRs Done
2,971,589 UART: [art] Lock RT PCRs Done
2,973,133 UART: [art] Populate DV Done
2,981,660 UART: [fht] FMC Alias Private Key: 7
2,982,630 UART: [art] Derive CDI
2,982,910 UART: [art] Store in in slot 0x4
3,068,339 UART: [art] Derive Key Pair
3,068,699 UART: [art] Store priv key in slot 0x5
3,082,511 UART: [art] Derive Key Pair - Done
3,097,101 UART: [art] Signing Cert with AUTHO
3,097,581 UART: RITY.KEYID = 7
3,113,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,012 UART: [art] PUB.X = 420F93E21172999DFE0606616AAB86112520EC89ECAE263BF0A857DC4995C13FF23242AA32E4355A53DC8F16BC4A084E
3,120,774 UART: [art] PUB.Y = 103AA6D2CB07F8DBD58CE2C3BB9E57779DADFC60C59038AA388D02C38C66736E858B5562691CBB890FD1450880EC70D2
3,127,722 UART: [art] SIG.R = F45CE3890250411E412F0044EEB2D211270C49DBAE0B45AB45749CA8D34F11A1C46D09CD75F821E8DCAD576E05B6865C
3,134,463 UART: [art] SIG.S = 913DE6A2C593D1D9DE52FFB3A80B58D2A368FC0B4847F932EF08235E54127089D3E24A569D7DD08A441C8036736B82DA
3,158,101 UART: Caliptra RT
3,158,354 UART: [state] CFI Enabled
3,264,786 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,767 >>> mbox cmd response: success
2,682,897 UART:
2,682,913 UART: Running Caliptra FMC ...
2,683,321 UART:
2,683,375 UART: [state] CFI Enabled
2,694,188 UART: [fht] FMC Alias Private Key: 7
2,802,453 UART: [art] Extend RT PCRs Done
2,802,881 UART: [art] Lock RT PCRs Done
2,804,155 UART: [art] Populate DV Done
2,812,422 UART: [fht] FMC Alias Private Key: 7
2,813,414 UART: [art] Derive CDI
2,813,694 UART: [art] Store in in slot 0x4
2,899,209 UART: [art] Derive Key Pair
2,899,569 UART: [art] Store priv key in slot 0x5
2,913,223 UART: [art] Derive Key Pair - Done
2,928,222 UART: [art] Signing Cert with AUTHO
2,928,702 UART: RITY.KEYID = 7
2,944,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,015 UART: [art] PUB.X = 55A4739B8589F69C569A48B5A1069D2964AD36ED043BAEF700FD69F1A5ED44906AB2DF7E569DBFF0DB0D683E47FC8D70
2,951,768 UART: [art] PUB.Y = D3AF424924A97F4A66CA73C6D0F950DA6C5C11CBF7919694B3A78FC560EFBA23AC60B1575B66A64F2711FF185FB7D2B0
2,958,732 UART: [art] SIG.R = 6E21211A03D54FFD5237AF6849019426D51618B2B5A951E81B75D37B751938B328498AA410626CBDEBFDB760FF1DD9C4
2,965,498 UART: [art] SIG.S = 22C8158DBFA2FEABE11965E3A39176ECA9A7E575510B039B33066F548A7F28EA1C12E4C9E60BB0AE231AE4C89557355E
2,988,925 UART: Caliptra RT
2,989,178 UART: [state] CFI Enabled
3,097,011 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,615,901 >>> mbox cmd response: success
2,678,635 UART:
2,678,651 UART: Running Caliptra FMC ...
2,679,059 UART:
2,679,113 UART: [state] CFI Enabled
2,689,534 UART: [fht] FMC Alias Private Key: 7
2,797,005 UART: [art] Extend RT PCRs Done
2,797,433 UART: [art] Lock RT PCRs Done
2,798,989 UART: [art] Populate DV Done
2,807,278 UART: [fht] FMC Alias Private Key: 7
2,808,450 UART: [art] Derive CDI
2,808,730 UART: [art] Store in in slot 0x4
2,894,461 UART: [art] Derive Key Pair
2,894,821 UART: [art] Store priv key in slot 0x5
2,907,637 UART: [art] Derive Key Pair - Done
2,922,348 UART: [art] Signing Cert with AUTHO
2,922,828 UART: RITY.KEYID = 7
2,937,806 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,571 UART: [art] PUB.X = 107D3AB5BCBE3077ECA49AA5248F782BD0C7EEC1BFE922128B249B506B27B1906DB666FFE3D2B45AE4A5C977691DB6CF
2,945,361 UART: [art] PUB.Y = 0C877541C0AF0A3652F9D5C853EC35D3562E3F9375D57C469EED9CDBDD547D95B2A2F1A444AE0ADD4501605DA0F10E29
2,952,308 UART: [art] SIG.R = 83CA5E328E6453F107FE4D10272511D82DBA5746DDB231A6C43F90662873A21402FA6D8AAD616FFB1251131D70FCECCC
2,959,080 UART: [art] SIG.S = A85C367853AFB0F11BDA40F1B54C114CD475B975390530AE3BB8BD87920221BCB7A6ACF484FD9A69D32F3B18217FB631
2,982,417 UART: Caliptra RT
2,982,670 UART: [state] CFI Enabled
3,089,753 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,615,635 >>> mbox cmd response: success
2,678,483 UART:
2,678,499 UART: Running Caliptra FMC ...
2,678,907 UART:
2,678,961 UART: [state] CFI Enabled
2,689,408 UART: [fht] FMC Alias Private Key: 7
2,797,955 UART: [art] Extend RT PCRs Done
2,798,383 UART: [art] Lock RT PCRs Done
2,799,869 UART: [art] Populate DV Done
2,808,162 UART: [fht] FMC Alias Private Key: 7
2,809,104 UART: [art] Derive CDI
2,809,384 UART: [art] Store in in slot 0x4
2,895,083 UART: [art] Derive Key Pair
2,895,443 UART: [art] Store priv key in slot 0x5
2,908,491 UART: [art] Derive Key Pair - Done
2,922,938 UART: [art] Signing Cert with AUTHO
2,923,418 UART: RITY.KEYID = 7
2,938,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,513 UART: [art] PUB.X = 33096285D6DAA6DDE94690071C0D0A8DF5EB40B3FF29D67C6F87B0D83253EF20D817D57B44B2FF8CA3218AC58D728127
2,946,279 UART: [art] PUB.Y = 3A77F086583F9886BB9D80CB4BAC295DEF292043DDD4B11780E410ADA0F4223813BADBE50AFEE555EFE3B567E7A1478F
2,953,242 UART: [art] SIG.R = 8CC9D3514712128BB077F2A0312AD1FEF09532D6C46AC3A5F5B3E1EC998D582AB5EFF48A1503B30E2B1721F061014D0D
2,960,008 UART: [art] SIG.S = C8F8EB929ED1943BA0D9C4E4B23FBC8CC83030E42A5228D9838B7AFF85452A4CEA3BFAA558437BC5BC523E2521F55F58
2,984,391 UART: Caliptra RT
2,984,644 UART: [state] CFI Enabled
3,092,229 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,614,751 >>> mbox cmd response: success
2,676,311 UART:
2,676,327 UART: Running Caliptra FMC ...
2,676,735 UART:
2,676,789 UART: [state] CFI Enabled
2,687,398 UART: [fht] FMC Alias Private Key: 7
2,795,149 UART: [art] Extend RT PCRs Done
2,795,577 UART: [art] Lock RT PCRs Done
2,797,041 UART: [art] Populate DV Done
2,805,456 UART: [fht] FMC Alias Private Key: 7
2,806,616 UART: [art] Derive CDI
2,806,896 UART: [art] Store in in slot 0x4
2,892,369 UART: [art] Derive Key Pair
2,892,729 UART: [art] Store priv key in slot 0x5
2,905,867 UART: [art] Derive Key Pair - Done
2,920,595 UART: [art] Signing Cert with AUTHO
2,921,075 UART: RITY.KEYID = 7
2,935,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,434 UART: [art] PUB.X = E2A32B59886FB3AB54774350C4B4B3CC2B7EF40AD6D563E62A008E0BB60B1DC1E76D80F59673C74864E273462A4CB587
2,943,179 UART: [art] PUB.Y = A5B4D27C1F294D3D52999AF603CF271BE381BF266486886FA5371C534736BE4E29485F33F64017EE02570178A240CEEF
2,950,118 UART: [art] SIG.R = DF784EB8A2C73A853226960114F59DA8310F183C4CE0045284AFBFC31C2CC51EF9B187BE496591CA54ED5BE3EA82057A
2,956,886 UART: [art] SIG.S = EAA8F594C5774E785031E7905A9505036E4B749FA4927CBC42DB866D9B74C3F83B9E83DC2E1348A5A0A8F489E6A88AAA
2,981,019 UART: Caliptra RT
2,981,272 UART: [state] CFI Enabled
3,088,274 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.21s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,970 UART: [afmc] --
2,851,874 UART: [cold-reset] --
2,852,594 UART: [state] Locking Datavault
2,853,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,395 UART: [state] Locking ICCM
2,854,817 UART: [exit] Launching FMC @ 0x40000130
2,860,146 UART:
2,860,162 UART: Running Caliptra FMC ...
2,860,570 UART:
2,860,713 UART: [state] CFI Enabled
2,871,130 UART: [fht] FMC Alias Private Key: 7
2,979,563 UART: [art] Extend RT PCRs Done
2,979,991 UART: [art] Lock RT PCRs Done
2,981,325 UART: [art] Populate DV Done
2,989,572 UART: [fht] FMC Alias Private Key: 7
2,990,642 UART: [art] Derive CDI
2,990,922 UART: [art] Store in in slot 0x4
3,076,807 UART: [art] Derive Key Pair
3,077,167 UART: [art] Store priv key in slot 0x5
3,091,137 UART: [art] Derive Key Pair - Done
3,105,744 UART: [art] Signing Cert with AUTHO
3,106,224 UART: RITY.KEYID = 7
3,121,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,029 UART: [art] PUB.X = B5433DB7A59F87038A7D9EA1211A7E4CA9C6D5B60779F384BD4D2FDFEFBA47A9982EB99B747BE720AACEB96ABB7963CE
3,128,817 UART: [art] PUB.Y = A031BD168C9A72EE3C7EDA86C60B42685CBD5B263D2A43FF778D81D83268FB79632E5DFC8DAE0D5EEA89F3816D5B6FD1
3,135,781 UART: [art] SIG.R = 8CE8E305ECC8385C052046516B836320AAF0E1E9853852123EF388EBFABF262E9C2BB70D799C22A2E5AE556428FCF09A
3,142,550 UART: [art] SIG.S = 8E86D1D41028BF00A14F8E98F05D27DF122DE9928FCCFAE0F0E3B5C13067AA31F78034C3869345B69F00FCCA3888211A
3,165,913 UART: Caliptra RT
3,166,258 UART: [state] CFI Enabled
3,273,571 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,028 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha384 KeyId Algorithm
1,201,990 UART: [idev] --
1,202,975 UART: [ldev] ++
1,203,143 UART: [ldev] CDI.KEYID = 6
1,203,507 UART: [ldev] SUBJECT.KEYID = 5
1,203,934 UART: [ldev] AUTHORITY.KEYID = 7
1,204,397 UART: [ldev] FE.KEYID = 1
1,209,571 UART: [ldev] Erasing FE.KEYID = 1
1,236,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,925 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,647 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,799 UART: [ldev] --
1,275,187 UART: [fwproc] Wait for Commands...
1,276,004 UART: [fwproc] Recv command 0x46574c44
1,276,737 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,926 >>> mbox cmd response: success
2,768,995 UART: [afmc] ++
2,769,163 UART: [afmc] CDI.KEYID = 6
2,769,526 UART: [afmc] SUBJECT.KEYID = 7
2,769,952 UART: [afmc] AUTHORITY.KEYID = 5
2,805,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,198 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,762 UART: [afmc] --
2,848,868 UART: [cold-reset] --
2,849,686 UART: [state] Locking Datavault
2,851,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,859 UART: [state] Locking ICCM
2,852,511 UART: [exit] Launching FMC @ 0x40000130
2,857,840 UART:
2,857,856 UART: Running Caliptra FMC ...
2,858,264 UART:
2,858,407 UART: [state] CFI Enabled
2,869,148 UART: [fht] FMC Alias Private Key: 7
2,976,823 UART: [art] Extend RT PCRs Done
2,977,251 UART: [art] Lock RT PCRs Done
2,978,739 UART: [art] Populate DV Done
2,986,816 UART: [fht] FMC Alias Private Key: 7
2,987,746 UART: [art] Derive CDI
2,988,026 UART: [art] Store in in slot 0x4
3,073,559 UART: [art] Derive Key Pair
3,073,919 UART: [art] Store priv key in slot 0x5
3,086,873 UART: [art] Derive Key Pair - Done
3,101,857 UART: [art] Signing Cert with AUTHO
3,102,337 UART: RITY.KEYID = 7
3,117,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,230 UART: [art] PUB.X = E96A470B88B759E359D32464D119EFEFEF0557A1D62F27C6727F12B91FC50D34BA126DD2FBFB40D32A4B00FB0E8C6042
3,124,978 UART: [art] PUB.Y = 16427CCB0DC0910683F2CCE5884159BE9ABE264DDAA6A2E94F5546D61B6FB5781500A4032F56536C5D43425D7A61B319
3,131,899 UART: [art] SIG.R = 8D7D18C6737B8C6803AC3FB14596CFA244E407EAFABF4E2424F2679DC715939A8E415F123737EC1B5107887665DB8B86
3,138,662 UART: [art] SIG.S = C988D8E393EE9349196F7B0B825E1F21F5C3ED02FCC3D72866704BE5F22EF1849B249ABE0396997D4A8987DC397FC325
3,162,448 UART: Caliptra RT
3,162,793 UART: [state] CFI Enabled
3,269,298 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,501 UART: [kat] LMS
1,169,813 UART: [kat] --
1,170,566 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,931 UART: [idev] Fuse KeyId
1,201,153 UART: [idev] --
1,202,008 UART: [ldev] ++
1,202,176 UART: [ldev] CDI.KEYID = 6
1,202,540 UART: [ldev] SUBJECT.KEYID = 5
1,202,967 UART: [ldev] AUTHORITY.KEYID = 7
1,203,430 UART: [ldev] FE.KEYID = 1
1,208,640 UART: [ldev] Erasing FE.KEYID = 1
1,234,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,236 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,918 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,997 UART: [ldev] --
1,274,511 UART: [fwproc] Wait for Commands...
1,275,154 UART: [fwproc] Recv command 0x46574c44
1,275,887 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,084 >>> mbox cmd response: success
2,768,279 UART: [afmc] ++
2,768,447 UART: [afmc] CDI.KEYID = 6
2,768,810 UART: [afmc] SUBJECT.KEYID = 7
2,769,236 UART: [afmc] AUTHORITY.KEYID = 5
2,804,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,826 UART: [afmc] --
2,847,774 UART: [cold-reset] --
2,848,572 UART: [state] Locking Datavault
2,849,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,497 UART: [state] Locking ICCM
2,850,953 UART: [exit] Launching FMC @ 0x40000130
2,856,282 UART:
2,856,298 UART: Running Caliptra FMC ...
2,856,706 UART:
2,856,849 UART: [state] CFI Enabled
2,867,336 UART: [fht] FMC Alias Private Key: 7
2,975,405 UART: [art] Extend RT PCRs Done
2,975,833 UART: [art] Lock RT PCRs Done
2,977,553 UART: [art] Populate DV Done
2,985,714 UART: [fht] FMC Alias Private Key: 7
2,986,714 UART: [art] Derive CDI
2,986,994 UART: [art] Store in in slot 0x4
3,072,671 UART: [art] Derive Key Pair
3,073,031 UART: [art] Store priv key in slot 0x5
3,086,713 UART: [art] Derive Key Pair - Done
3,101,391 UART: [art] Signing Cert with AUTHO
3,101,871 UART: RITY.KEYID = 7
3,116,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,740 UART: [art] PUB.X = 441111F10B776818FDA45243B6598EAD008DCC30C0D8EA61FDA7C0437713E5522379EE56C10D9F28C6D7E1B0876DE842
3,124,484 UART: [art] PUB.Y = 50AA22A3A0FC19FF8C2ABF93EEE855F82B789996A53F1BFB634239786B1FC169DA5ADC9FCCDACA811200B24587E6464A
3,131,430 UART: [art] SIG.R = 018C83F4F7C55B4B18EC7C75C1E5D1BE42F8D159FDA0E08C964C1F7C7F98366FC92CABA44CE0F818EC33F875C1F07E1B
3,138,217 UART: [art] SIG.S = 8B8FB982E65986C7C951A3F868AFB7C807B12BEFED9BC1261F866F74D85128A2FFA33571D84F4A324D00BDBBE4C3BED6
3,162,195 UART: Caliptra RT
3,162,540 UART: [state] CFI Enabled
3,270,505 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,950 >>> mbox cmd response: success
2,686,940 UART:
2,686,956 UART: Running Caliptra FMC ...
2,687,364 UART:
2,687,507 UART: [state] CFI Enabled
2,698,252 UART: [fht] FMC Alias Private Key: 7
2,806,393 UART: [art] Extend RT PCRs Done
2,806,821 UART: [art] Lock RT PCRs Done
2,808,527 UART: [art] Populate DV Done
2,816,582 UART: [fht] FMC Alias Private Key: 7
2,817,580 UART: [art] Derive CDI
2,817,860 UART: [art] Store in in slot 0x4
2,903,623 UART: [art] Derive Key Pair
2,903,983 UART: [art] Store priv key in slot 0x5
2,917,875 UART: [art] Derive Key Pair - Done
2,932,458 UART: [art] Signing Cert with AUTHO
2,932,938 UART: RITY.KEYID = 7
2,948,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,967 UART: [art] PUB.X = E4673D69CFE1090A6732FBD2CE0D41251B0F16F8B3383D5806C774A3E13427AF42E6696F3D9F12D6A7D1FAF56F98EC38
2,955,730 UART: [art] PUB.Y = 1BD13D8448F3B02E8C2BC2826D2513F4B7EFA87350581C9CABB8A1490F61A7C1E27155D6E1DA808D9BBD6DF7CFAF0406
2,962,687 UART: [art] SIG.R = 7011B99B8217B64600ADFE4389BD224EA0170E4D719E5BD467FAE4C75EC60ED519792914A2E3D6F92D750823E14356EF
2,969,428 UART: [art] SIG.S = 38BD44AD885BEFB08F767E2D8A97BA54D72EDC660ABB4B8D2933CC83372C04A60F3A519C2F4DBE08BBF704A97DBB0713
2,993,241 UART: Caliptra RT
2,993,586 UART: [state] CFI Enabled
3,101,601 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,702 >>> mbox cmd response: success
2,683,184 UART:
2,683,200 UART: Running Caliptra FMC ...
2,683,608 UART:
2,683,751 UART: [state] CFI Enabled
2,694,132 UART: [fht] FMC Alias Private Key: 7
2,801,685 UART: [art] Extend RT PCRs Done
2,802,113 UART: [art] Lock RT PCRs Done
2,803,667 UART: [art] Populate DV Done
2,811,754 UART: [fht] FMC Alias Private Key: 7
2,812,698 UART: [art] Derive CDI
2,812,978 UART: [art] Store in in slot 0x4
2,898,729 UART: [art] Derive Key Pair
2,899,089 UART: [art] Store priv key in slot 0x5
2,912,469 UART: [art] Derive Key Pair - Done
2,927,247 UART: [art] Signing Cert with AUTHO
2,927,727 UART: RITY.KEYID = 7
2,942,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,638 UART: [art] PUB.X = C487728EF557E92759B86306B5A2A6A405C8E5752FF8C9EB0584E8CA410AD9574CFD53A52908C539386B3C89E2C2C744
2,950,393 UART: [art] PUB.Y = 98654E5B1D0ADB57D681971C2C48FBFEAA6B0322DE367500C3B969028B3BE84E79171B5332E9A5F3170586B76718222D
2,957,307 UART: [art] SIG.R = 4BB715BA154EF9D54BCA6CB3FC4B5FEA0CF0FA66DD7F3E2F652C81F8839C9E9284E3F5C158EF885474E399FE3ED016FA
2,964,098 UART: [art] SIG.S = 0F74C163C16E1552AC5D215E301BA716BAC3ABED80C858485107D39AEEE6EF2DE93D585567A49F20DA40104D1E586C93
2,987,625 UART: Caliptra RT
2,987,970 UART: [state] CFI Enabled
3,095,353 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,398 >>> mbox cmd response: success
2,679,872 UART:
2,679,888 UART: Running Caliptra FMC ...
2,680,296 UART:
2,680,439 UART: [state] CFI Enabled
2,691,030 UART: [fht] FMC Alias Private Key: 7
2,798,711 UART: [art] Extend RT PCRs Done
2,799,139 UART: [art] Lock RT PCRs Done
2,800,537 UART: [art] Populate DV Done
2,808,714 UART: [fht] FMC Alias Private Key: 7
2,809,670 UART: [art] Derive CDI
2,809,950 UART: [art] Store in in slot 0x4
2,895,655 UART: [art] Derive Key Pair
2,896,015 UART: [art] Store priv key in slot 0x5
2,909,513 UART: [art] Derive Key Pair - Done
2,924,003 UART: [art] Signing Cert with AUTHO
2,924,483 UART: RITY.KEYID = 7
2,939,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,340 UART: [art] PUB.X = F12230A5E7AD5B03F498A0DFF7C190CB77384BCF9F3A51C445BB51F6A82D8CC195D25B3FB2DF5D3AE1E0D631A628546F
2,947,125 UART: [art] PUB.Y = D451C7514782BE190DD05DF1E3AA048BFF1A09D58212AE72F412E510448F57CF2A47BAE8049D32FDAA4829D9B75EF86E
2,954,075 UART: [art] SIG.R = 1FC8344B540B56AD5C3B139D3F761593CB157A6D22FE6C2EC84E916F820F66C7995DE975403738A6695134C51B428DD8
2,960,837 UART: [art] SIG.S = 77E3EA584221D75B515800379145D4BD92EA5CBE2E4A64100D4D6B65D7779C1FD95431C7C2162765EEBE826047833F83
2,984,345 UART: Caliptra RT
2,984,690 UART: [state] CFI Enabled
3,092,351 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,064 >>> mbox cmd response: success
2,679,174 UART:
2,679,190 UART: Running Caliptra FMC ...
2,679,598 UART:
2,679,741 UART: [state] CFI Enabled
2,690,300 UART: [fht] FMC Alias Private Key: 7
2,798,359 UART: [art] Extend RT PCRs Done
2,798,787 UART: [art] Lock RT PCRs Done
2,800,553 UART: [art] Populate DV Done
2,808,868 UART: [fht] FMC Alias Private Key: 7
2,810,004 UART: [art] Derive CDI
2,810,284 UART: [art] Store in in slot 0x4
2,895,789 UART: [art] Derive Key Pair
2,896,149 UART: [art] Store priv key in slot 0x5
2,908,581 UART: [art] Derive Key Pair - Done
2,923,140 UART: [art] Signing Cert with AUTHO
2,923,620 UART: RITY.KEYID = 7
2,938,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,239 UART: [art] PUB.X = 54E7BEE462701268B6D7D6D163EC022AA93D191E9ED2719E892644373F57FAFA767C4274E23784B14CB43C30D8F9950B
2,946,003 UART: [art] PUB.Y = F464843F135DDA29555E4A7658932562E061BCA4BF23779AEA8ED1EF0E5BA126E482F13CB2D40B2D77571A98FB9743A2
2,952,953 UART: [art] SIG.R = AEEDE334CCAF1AD64FA0F69BBFA8A2EADD155FE59DC07D5B019F77FFDC0946ABEE4614DF40C1ECB1F269FD9A103AEA8F
2,959,759 UART: [art] SIG.S = 4BBF0CF727161169CA9F14E03D43083E3454FF63C0496E51FD1BDF9E2E7C8D3BCCED80564F39920DAED6EF659C1DD843
2,983,699 UART: Caliptra RT
2,984,044 UART: [state] CFI Enabled
3,092,611 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.69s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,103,955 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : Jun 26 10:27:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:37:55:19:91:a6:bf:48:69:12:c4:62:3a:9c:
7d:e3:5c:d5:21:85:f3:e7:9a:a4:ec:f3:00:27:da:
73:3f:13:04:fa:8b:51:6e:8b:4b:81:a2:8e:9d:42:
d7:b7:4b:d2:10:4a:eb:aa:ab:dd:8e:d7:f5:bd:2e:
d9:1d:b1:7d:7f:2c:4e:67:f8:cf:fb:cb:46:7f:57:
f7:fa:f0:e5:55:2c:0b:2c:01:72:4d:1c:64:60:9c:
71:36:82:07:65:bb:e4:9e:09:66:4e:67:42:89:28:
1f:9d:58:57:a1:f4:12:03:75:3d:5c:e6:2a:bf:0a:
69:0e:bb:7d:39:b4:d5:cb:a5:62:2a:03:e7:27:e4:
84:17:fd:39:fe:d7:a2:60:e6:98:95:15:b7:c3:82:
a5:37:35:cf:d1:e3:14:e3:4a:44:3a:6c:be:54:b3:
ee:c1:36:8b:71:61:aa:fe:e3:67:2a:0c:e4:a3:45:
29:e1:c8:75:4b:36:52:ea:3b:f7:88:af:a1:85:0a:
43:e8:8e:9f:cb:c4:54:37:61:f9:f7:17:90:06:d2:
ab:2a:ab:c1:a8:45:ef:78:88:14:32:88:59:1e:0b:
a9:05:86:5a:e7:cf:a1:53:be:67:9a:ee:41:92:a0:
d4:d9:6a:e7:94:8b:ea:d3:ce:cf:4d:c2:d5:17:0b:
af:7f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:b4:e5:52:0f:56:15:0b:c5:fc:2e:2b:c6:2b:3b:65:51:57:
b6:16:1e:b1:3f:a9:d5:55:17:32:05:f9:9b:30:0a:35:ad:84:
5f:91:71:e9:91:f9:8c:c6:0e:51:5c:ff:03:2c:26:b1:54:b8:
6f:41:96:57:80:a8:57:4a:90:e6:be:c3:29:e7:bc:b3:62:1e:
8e:6d:f5:f3:24:7e:fe:fe:ee:57:ae:27:78:92:41:2a:07:20:
97:b3:60:45:dc:5b:38:4a:eb:e4:21:02:3c:3b:a7:79:5e:6e:
3c:4c:32:d6:73:7a:0d:8b:f0:be:83:35:01:ea:d8:e8:06:5f:
c2:41:c9:b3:83:36:83:cd:b5:45:77:88:d3:fe:7f:8a:82:7a:
e1:26:de:3b:20:ab:ef:35:ed:73:84:fc:fc:8f:fe:d5:b4:7d:
69:03:0d:13:5f:bb:14:71:dd:f3:09:a3:4f:df:88:0e:23:92:
d9:d0:df:72:83:c1:6f:cd:f8:5e:a4:0b:38:ef:22:2d:de:6f:
88:2a:d3:39:d8:5e:0d:16:43:bf:4f:3e:b3:36:94:34:12:af:
30:f9:f9:dc:60:21:72:99:c4:62:f9:48:70:32:2f:7f:de:df:
a9:ce:8a:cd:51:dc:7b:26:f8:b0:0b:68:dc:9e:cd:2f:67:5a:
a9:2e:26:2a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:23 2025 GMT
Not After : May 28 10:27:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
67:66:f9:12:86:29:8d:c3:5d:d6:a9:26:1a:37:1f:f4:ee:f0:
b5:6a:e9:56:42:59:dd:86:1e:2f:02:69:90:68:a7:76:8d:6d:
f3:6e:09:79:02:b4:19:26:b4:02:8f:32:a2:ef:87:cb:9e:b8:
dc:8a:da:02:4b:f0:2c:03:52:47:91:83:fe:e0:2d:3a:61:ea:
41:40:94:d4:6a:ee:c2:00:5c:af:49:c9:c8:9e:5d:be:0c:78:
81:13:9f:a1:b7:20:c8:f6:2e:66:bf:1e:58:3c:c2:07:32:67:
9e:03:c1:0e:b6:4d:5f:a9:36:b4:ee:02:a9:6b:63:2d:5f:bb:
ff:60:da:35:09:82:dd:84:52:39:77:87:32:d7:16:f4:88:98:
1d:f8:c0:fa:23:34:17:c6:e6:2c:ce:2e:3f:6c:12:2e:4e:e8:
6c:a0:ee:93:2b:92:4c:cb:90:cc:d0:2d:d8:78:a4:c7:af:5b:
1b:cd:4a:45:ac:76:50:ce:9a:20:51:8a:fe:9d:d5:2e:be:94:
a5:67:91:c8:a0:c0:a0:c2:67:c9:28:75:98:90:34:7d:5b:93:
b5:da:88:b6:a0:0d:c9:58:6b:b8:d1:18:05:d6:bd:ea:31:26:
d4:01:5f:7d:2b:05:54:fa:b6:24:5c:50:56:28:c9:5a:5c:8e:
06:7b:65:4c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.90s
Truncated 3059 bytes from beginning
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
2,853,779 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:13 2025 GMT
Not After : Jun 26 10:27:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:db:e3:e7:de:12:8f:3a:d2:68:b2:87:85:77:03:
ac:f0:16:14:2b:6e:f0:ee:fb:fe:e4:7a:b7:7e:90:
3f:22:62:5f:eb:b8:f7:9b:7f:44:61:b2:71:db:f2:
6d:f9:f1:54:7d:33:13:6a:a9:dd:ee:d9:64:30:43:
9d:b6:bc:cb:35:ab:9c:81:82:93:3d:91:c8:b3:e0:
ee:20:60:ec:d9:4d:2a:ec:43:88:de:50:bd:cb:43:
1d:35:71:05:0f:5c:ec:7c:d7:0d:2d:d3:d6:82:b3:
7a:d6:b2:fb:97:9d:3a:c9:7c:28:cf:fc:4a:41:59:
67:1c:ba:cb:d5:db:42:8d:45:2b:cd:4a:c3:fd:f2:
b4:eb:44:2d:cc:c8:9d:2a:4b:e1:58:3e:96:49:60:
b4:00:c9:c7:5f:f5:e7:b1:cc:3c:78:6b:7c:d5:3b:
0e:fb:42:d4:4f:62:64:bf:fc:6d:9d:8e:1a:18:db:
1d:b9:b5:15:bf:3b:1a:c0:78:df:17:98:de:49:3b:
90:37:c6:f6:ad:bb:cd:e8:85:a6:40:0a:33:e7:ad:
d1:3d:2c:da:5a:a0:5a:17:6c:8a:6f:c1:2f:c3:39:
b0:4d:6f:b6:c5:d1:ea:2e:a1:a2:0d:10:85:38:01:
a0:f1:d0:e5:e4:72:52:1f:2f:1e:64:3a:e4:2a:40:
e6:e3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
58:37:f4:64:f6:a8:29:d1:98:4d:20:77:77:6d:c8:21:de:10:
c4:60:c1:eb:e2:23:ef:da:4a:9a:1d:4a:52:1d:b1:09:65:65:
76:3a:cf:2f:1b:93:9e:c5:8c:cf:18:1f:8b:1c:e8:58:bf:55:
6e:7e:3d:ba:5a:e7:71:87:e1:4f:fe:dc:9b:26:1f:1b:66:1b:
b6:07:d6:80:10:23:65:46:37:24:85:43:ab:81:2e:31:56:d8:
9a:b5:f8:2b:26:67:96:fb:83:dc:a2:d6:93:b3:a4:ab:cf:06:
fd:fb:96:86:7d:9a:34:bf:ee:e0:cf:dd:43:89:63:01:8e:41:
bf:86:b3:00:ee:9d:f1:fd:4a:da:40:28:b3:69:71:bb:2c:f3:
e8:01:f6:10:4f:bb:3c:ab:ab:ed:2f:83:74:c6:25:bc:9b:b9:
9d:f5:70:74:d1:0a:d2:9f:91:8a:6e:57:14:b4:97:03:ef:25:
ef:61:bc:b8:89:fe:32:a9:1e:66:48:d4:74:18:d9:60:81:fc:
f1:6c:c4:46:74:77:5d:e6:8f:a5:bc:a0:c2:ae:3b:0c:b4:d3:
c6:41:97:2b:9f:04:07:1b:31:fa:5a:36:07:03:41:8d:d1:28:
db:4b:8f:ae:b4:fe:9d:e4:96:7e:06:02:1c:6e:8a:16:1f:a2:
1e:ce:23:f7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:13 2025 GMT
Not After : May 28 10:27:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5e:c1:1c:1f:0d:7d:4f:48:b5:38:fd:d1:b0:b9:64:73:75:db:
87:36:28:bd:d6:0d:ed:d8:75:f3:97:5f:e9:ed:e4:6c:8e:55:
e4:22:f5:fe:04:5c:88:cf:fe:53:26:5e:c7:20:59:b2:c8:d8:
10:b2:77:8e:33:1f:17:64:85:fd:34:78:ff:80:8c:2b:aa:64:
8f:51:c0:0e:f6:a0:4a:76:bc:c5:ea:03:67:0c:d2:a7:bc:43:
2f:4f:ed:1d:a9:cb:31:2d:64:ac:81:b1:fb:11:0a:15:35:e0:
1c:fe:fc:ec:1d:8e:27:12:ae:90:9f:0a:ae:b0:d6:d8:f3:8f:
a4:f3:cf:d5:27:da:16:9a:64:ce:99:b6:7c:8f:d4:ea:c9:4d:
bc:07:e4:56:08:1b:b7:85:b6:f9:0b:60:77:54:06:10:12:6d:
27:1b:0f:ab:b4:08:4e:bf:8b:5b:28:26:4b:20:ae:c9:8c:33:
66:c5:a1:97:f8:81:0a:f1:96:14:29:de:11:8e:82:a2:e1:d8:
78:ac:9c:14:94:08:8e:d8:26:33:f5:b2:a6:d7:5c:96:de:1a:
79:71:c7:1a:ea:12:cc:8e:77:de:53:af:db:91:22:fa:e4:ff:
b9:a3:8c:10:6d:a0:c7:d1:57:98:da:ac:7a:be:10:d9:f7:5d:
03:aa:70:00
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 7935 bytes from beginning
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
3,108,218 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : Jun 26 10:27:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cb:50:b2:0d:3e:60:47:2a:91:66:22:06:cd:6c:
2e:e6:fd:ac:56:b7:be:05:c2:4d:09:e3:11:71:4f:
66:ad:f9:56:7d:b3:ca:24:02:7f:8f:81:58:40:16:
4b:13:d8:21:60:14:a5:53:db:ca:65:6c:87:12:88:
8d:6f:65:b3:e6:62:e7:cc:46:cd:6e:e8:1c:01:7d:
52:4c:e5:d3:19:ce:e6:54:1d:c5:df:b0:8c:f7:8d:
6a:44:1c:9f:78:55:24:e7:9f:74:1b:52:01:58:eb:
5f:04:1c:8c:fd:9b:ef:33:9b:2d:1a:c6:d6:67:fa:
85:63:e6:45:c8:66:eb:e1:5f:d3:f7:48:e7:02:57:
b6:f0:99:2b:ea:4c:82:d2:8b:a4:ee:17:6b:e8:f5:
23:3f:0f:c3:90:66:64:89:1b:63:06:3c:68:8d:ae:
69:fa:a3:cf:9a:42:41:66:96:81:fa:ea:1c:74:01:
d3:1e:2e:09:75:04:64:e6:60:3c:cf:79:1d:09:3b:
53:46:44:43:9a:ca:35:a4:17:db:b3:ab:61:b9:88:
96:44:62:e5:18:a3:74:78:0d:22:cd:5f:0d:53:a2:
61:55:3f:50:b2:95:4b:76:1c:75:b4:5c:b5:eb:af:
56:98:d7:33:0d:ab:30:d8:bf:82:bd:d2:56:ac:b4:
15:db
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b7:70:94:85:f1:fa:d4:96:3f:19:02:c0:75:d1:7c:d7:4b:a5:
21:c6:80:65:37:15:25:58:fe:82:23:19:a3:ea:0c:ad:ca:3a:
7b:56:5d:0d:c2:77:62:6e:e1:01:97:8b:c2:80:14:96:0a:15:
4f:f9:06:fb:d4:06:43:c5:19:8d:d9:14:f1:f2:46:74:7b:33:
2c:b5:51:16:e9:d0:05:8b:ab:41:fd:63:c4:d4:b8:da:47:b8:
c9:21:50:39:82:07:b3:02:45:7e:12:57:9f:e7:49:11:a3:d2:
1a:c4:1f:a1:d9:70:55:b5:6d:0c:e8:14:c3:20:be:a9:d1:b3:
49:7d:ed:42:48:d8:7b:fe:3f:01:ac:a3:ad:1f:20:fd:bc:da:
67:7c:53:42:38:4b:81:c0:35:89:26:51:b1:01:55:94:21:1c:
c7:c1:ff:aa:66:0a:6f:38:7e:79:ea:f8:86:3b:da:41:ee:42:
32:1e:e3:40:31:d8:1d:cf:a0:89:da:f9:fe:b3:2e:ed:f1:a3:
0c:83:64:33:e0:89:aa:77:31:47:5a:a1:83:48:17:86:28:95:
07:c4:60:36:ee:a1:c4:84:72:8c:91:62:8b:42:35:bf:a6:89:
4e:29:c7:34:02:22:fe:3c:af:4a:f2:ba:bd:0f:f7:18:5c:ce:
79:74:09:3e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : May 28 10:27:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:43:20:ce:b4:09:8e:17:f2:58:04:b1:66:0c:91:4b:37:98:
3e:49:4a:8c:f3:24:0d:8d:16:4d:02:4f:c5:fd:f7:1b:94:f0:
ce:7d:0f:40:02:d2:26:ef:6d:b5:32:83:d9:cb:08:7b:19:a5:
00:3f:43:3d:3d:12:f1:a5:bc:e3:5e:ab:c5:da:9c:6d:a6:f8:
71:3f:4e:e3:6e:69:63:2d:d4:4b:59:90:64:6e:b8:e1:41:ba:
d0:6b:fc:1e:ae:0b:14:0e:94:ce:89:7f:86:24:33:39:36:83:
c9:f0:dc:b8:b9:9d:09:09:19:0e:3d:7d:fd:dd:1f:d7:9b:b1:
22:48:85:69:52:89:c8:86:41:a0:59:54:c4:85:5d:41:af:9d:
7d:0a:d6:ef:82:f8:1e:0c:9e:a4:c5:03:22:28:c0:e5:34:df:
24:5f:9e:42:33:70:44:74:d1:7f:17:b1:fe:e4:90:ee:81:98:
e2:c3:88:63:1a:e9:30:b8:0b:70:c0:8b:c7:d1:12:18:4c:23:
29:45:01:8d:c1:63:35:b8:48:b7:6f:95:98:31:33:9f:ba:dd:
cc:b6:7c:b4:d3:6a:ce:81:36:11:77:0d:fd:7b:95:44:2e:a2:
03:ec:e8:c0:9f:4e:4a:d0:34:4c:87:60:3d:f8:3b:b6:f9:4f:
00:ab:57:f2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
Truncated 3059 bytes from beginning
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
2,855,734 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : Jun 26 10:27:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a8:b8:08:36:05:db:2b:92:f8:58:76:08:bc:cd:
ad:ee:db:f0:94:52:7b:e3:f5:68:7f:2e:1a:71:7f:
59:59:6d:e4:a4:b0:e1:1c:f0:9a:40:44:bb:55:44:
d3:45:e0:1d:68:ce:84:5c:0c:1e:a5:b5:99:74:bb:
1a:4a:d4:51:10:90:de:04:f2:db:34:af:01:a8:b7:
24:04:24:4e:9e:ae:03:cf:e4:24:2e:d6:c8:88:88:
b6:00:b7:a1:a1:74:84:f7:00:5e:d2:db:b4:0e:cd:
7d:fd:b3:97:ae:8a:19:5f:b4:30:d4:53:e3:90:12:
30:3b:c1:b3:b0:2e:4f:30:78:37:d5:60:18:78:9c:
5b:16:de:97:3b:ad:b0:4e:b6:c2:78:47:9a:5a:7d:
02:f5:89:9e:c0:99:70:e8:81:54:e1:0f:ec:e9:52:
3e:bc:06:bc:b3:18:40:2f:c8:e2:8d:3f:ab:1d:82:
1c:c0:a6:5e:22:1a:14:12:e4:44:3b:fc:bc:42:74:
de:8e:8f:a6:6d:40:0c:b7:ce:95:3a:36:dd:ca:78:
ba:f6:b2:20:39:f1:18:ba:6f:4f:5a:86:39:b9:2e:
24:f1:85:7f:6e:a2:f5:e6:4d:d9:b8:4c:87:18:21:
c7:96:22:57:60:5b:7e:68:7b:f4:33:de:75:47:88:
42:31
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:29:4d:e3:a4:8b:ad:dd:bf:0a:4d:d1:1d:71:f5:9f:2f:49:
fc:de:a0:26:e5:65:a0:0a:f0:81:57:ff:46:17:35:cd:20:83:
75:36:ef:6c:a5:d7:7d:11:b5:87:ea:5c:50:15:6f:c0:25:47:
dc:da:00:d1:5a:1b:8f:02:10:32:29:91:42:cd:a4:a5:a1:37:
e0:e4:ca:02:65:9a:e0:74:47:de:78:b0:e5:c1:1f:1c:44:f3:
d1:c4:85:7a:10:1c:f0:9d:16:aa:9c:bc:f1:07:75:ad:b5:9e:
07:db:26:89:0e:83:02:d0:cd:3f:ea:e7:9a:bc:be:ec:2a:ff:
1f:e3:9c:4d:b8:69:c0:0f:a0:03:cd:88:9d:71:ab:91:32:d9:
64:bb:42:b6:b8:49:c0:ff:19:30:50:a8:30:79:81:81:d1:20:
ad:e7:d1:a7:48:f5:47:fa:f9:7d:9e:2a:37:d1:e8:e5:5b:30:
79:47:89:01:bf:ed:7f:af:13:dc:48:c6:89:9f:46:da:cc:68:
73:72:f0:19:07:76:72:1e:9c:3c:48:d8:67:ec:cc:06:1e:ce:
0a:59:35:57:9a:7a:06:ea:e1:d0:2b:d3:b1:57:40:17:dd:cf:
af:73:f0:19:36:d0:b9:f7:1b:99:5d:85:89:81:e7:c3:3c:38:
f5:0d:61:57
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : May 28 10:27:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:e0:69:67:6c:8e:bf:3f:7b:84:af:54:00:7b:d0:16:5c:cf:
d3:2b:29:69:22:38:51:5b:d0:00:33:95:79:32:2c:97:7b:31:
a1:85:c1:3f:24:cf:ea:58:6a:fb:92:23:27:cc:90:bd:61:5a:
26:95:78:ab:cf:d0:16:0b:a0:96:b0:14:59:3e:b5:36:11:95:
6b:28:38:e4:14:cf:98:46:95:e8:45:2d:74:d7:9d:5f:10:52:
de:90:cb:c2:50:99:e2:31:b0:dd:de:53:1a:9b:07:ff:23:ec:
5d:31:45:8b:71:fc:41:9f:88:b8:a0:c0:dd:54:07:c5:9d:0b:
4b:e2:44:f7:0c:75:81:08:f0:05:8c:07:a2:3c:af:92:c5:3a:
e1:f5:c5:3f:0d:42:8c:f5:9b:5a:ac:4a:51:23:f0:d5:13:a2:
b7:5d:cb:70:54:46:11:b9:0b:f7:6e:b0:68:4a:c9:23:14:9a:
03:d1:cd:a9:12:b6:d8:ab:6e:09:08:69:1a:f7:14:cf:a4:01:
16:1d:11:75:1b:56:4b:a8:a4:88:0b:07:c3:10:44:84:b1:41:
ab:3a:ab:c9:ee:31:6d:f7:21:56:21:f3:94:d4:9c:53:85:68:
ad:02:3d:7f:8d:af:3f:be:68:5f:38:b3:2c:c5:5e:57:bb:b3:
87:1e:a8:1d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,106,639 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:13 2025 GMT
Not After : Jun 26 10:27:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:f3:25:e7:7d:ad:4e:1b:fd:d8:68:e0:62:52:
6e:06:67:34:13:6e:3b:29:d8:29:7b:78:37:cd:fc:
5b:92:d7:34:11:78:d4:72:14:1b:cc:e3:02:e2:4b:
36:61:56:e4:56:c6:e2:11:71:99:f2:b0:42:54:af:
bf:24:0d:61:07:de:9d:20:50:2f:a2:43:e1:d6:cf:
38:28:c3:68:5d:f7:9b:4c:39:f8:49:1c:60:d2:9c:
31:d1:f5:9f:93:24:08:57:89:6b:28:ac:30:9c:16:
4d:2b:57:db:d6:e1:c6:1e:17:be:20:24:07:82:cd:
14:d8:9e:80:df:71:51:3b:8b:55:8b:76:c9:4d:cc:
05:a1:ee:ef:83:3b:94:e3:ee:65:4e:52:a8:6f:74:
25:8b:6f:b8:03:ea:a1:fd:4c:93:db:e8:b8:d9:95:
65:e5:d2:88:d2:2a:78:7f:48:34:8e:db:9c:25:21:
46:d9:16:9e:1f:d2:30:f8:1e:6d:a8:24:35:93:77:
0c:83:cc:b1:b0:20:d0:b1:0d:67:dd:0b:8f:b0:d3:
97:f4:3d:c7:4f:1f:26:15:da:65:16:2f:76:0d:bd:
0d:d8:76:61:f5:5d:50:35:17:f5:02:9c:7a:6d:ff:
d3:cd:45:8f:bd:83:28:5d:7b:9c:3d:77:9a:11:fb:
93:17
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
60:d3:56:c0:26:49:2f:04:4d:fc:81:bb:da:ba:0d:81:f6:9b:
c6:4e:ca:57:cb:3b:1c:78:e7:72:36:e3:9a:a7:4c:47:97:94:
f7:bd:54:67:9f:f6:f1:72:87:b8:b5:22:71:a4:17:cb:e1:48:
72:70:5b:0d:b7:42:39:2c:f8:57:37:2d:2d:ae:54:13:16:72:
3a:05:10:3b:fe:c5:95:3d:90:69:10:78:05:d1:83:38:c1:4e:
9d:62:46:38:ea:bf:0b:52:55:a2:0d:84:bc:ab:f0:38:b0:c9:
37:c2:ee:bd:41:30:e2:2c:fa:fe:89:0f:64:fb:17:6d:d2:0f:
39:79:b5:70:44:d0:62:2f:93:c1:38:b3:72:3e:3c:08:7a:1f:
8e:c8:94:27:65:59:bb:9f:ac:8d:d6:da:a3:98:d8:5d:fd:a6:
e4:07:45:d4:4d:65:b9:26:cf:58:9d:de:09:fb:10:14:4a:9e:
1e:b7:8a:3f:b2:f8:d3:5d:a9:92:a8:bd:74:1d:f6:dd:d7:7f:
70:39:07:60:a1:4b:24:24:08:f2:e1:50:7d:8c:a8:ab:68:49:
2b:6d:f3:72:b6:3d:0e:f8:2b:b8:d0:89:55:78:96:de:da:a7:
b9:f0:e2:08:76:9a:83:00:bd:9c:43:c3:95:d8:b3:a5:ef:8a:
80:d0:10:c4
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:13 2025 GMT
Not After : May 28 10:27:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:bc:b6:a5:b4:f8:32:30:cd:58:23:0f:07:a4:7e:67:11:d8:
12:cb:6f:5b:8d:32:51:85:65:5c:42:d2:fa:45:83:a3:d4:e6:
cc:63:c7:44:56:c7:85:97:b8:1c:16:4e:6a:aa:77:5c:0a:ed:
56:f4:b1:77:aa:b8:70:c6:6a:ee:35:57:9b:89:63:18:dc:93:
b8:e6:4f:b6:e7:00:44:6f:b8:27:13:bb:60:a1:7f:e2:c1:84:
23:78:4b:c8:3d:84:8e:95:d9:00:03:df:bc:38:94:f7:ff:69:
7b:50:02:78:e4:8c:06:f7:1c:1f:0a:42:43:86:6d:02:ec:7c:
84:29:d6:f5:47:4c:a2:96:de:00:9a:34:1b:e4:e9:21:e8:74:
ed:c7:11:d0:1a:5c:83:80:69:90:79:04:7f:45:fc:3e:6c:8e:
95:7c:51:bd:5a:e2:37:a9:eb:c7:2d:f9:c3:cb:ca:80:89:03:
e2:b3:70:10:7b:73:b1:a9:13:8e:c8:d2:12:12:f0:45:54:ef:
54:2a:7a:b5:7b:7c:58:e8:31:6f:31:52:52:03:5a:4b:50:e8:
25:62:c2:52:7c:f3:cc:8c:f5:5d:ad:66:8a:88:fb:5d:13:77:
b0:ad:f2:d5:53:65:38:ce:eb:ad:f9:ec:1c:4a:ee:f6:13:18:
3e:a3:e7:a4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 3059 bytes from beginning
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
2,852,289 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:28 2025 GMT
Not After : Jun 26 10:27:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e3:0a:ba:33:5b:4e:95:45:49:d4:fb:d8:66:74:
cd:d5:b9:bf:f6:b1:50:8f:b7:52:9d:c5:d5:dd:1a:
b9:1f:b4:0b:6e:22:13:3f:59:15:9d:69:49:36:3a:
1c:24:c2:b2:0a:f5:23:7d:d4:ab:74:df:85:d5:1f:
84:f9:1b:a8:42:ec:35:0d:22:f1:82:46:c6:a2:e3:
39:25:4e:0d:03:a8:c5:c6:97:52:ea:74:be:5e:2c:
63:58:d2:4e:4d:92:92:82:b9:bf:81:fb:17:8d:68:
b7:12:02:25:8b:f5:7f:20:f9:a9:90:20:7e:fa:a8:
ef:2d:66:b8:4a:32:bf:ec:df:91:ab:12:c7:07:45:
9c:60:ed:58:3b:46:f6:89:8c:e9:7a:ea:7e:47:4c:
26:34:ec:c6:a4:27:25:49:fd:eb:19:d8:c2:d3:5f:
9a:cf:d5:3f:1f:de:28:3c:46:89:ff:15:ba:e6:93:
7b:28:22:38:de:41:6f:d6:05:cf:97:2e:c0:87:b8:
3d:52:df:42:1c:bc:2a:ac:71:f9:30:4b:25:4c:02:
54:7a:26:84:df:2b:23:93:1f:ec:3d:8f:c4:cc:d7:
12:66:28:8a:91:85:56:b0:52:46:f1:55:b8:09:f7:
75:b8:6e:6c:21:c7:6e:6d:5b:0e:82:b9:51:fe:dc:
a4:39
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4b:0b:5f:5c:a4:84:00:48:01:7d:9a:22:78:ac:aa:76:20:60:
b7:3e:16:8d:93:8c:89:b6:eb:a4:3d:2c:f5:4c:39:3e:2d:10:
fa:d9:80:6b:69:af:f6:80:96:63:d2:dd:7a:64:1d:37:c7:65:
49:96:f0:7f:51:19:0f:68:b2:de:e5:45:e1:f9:0f:13:37:15:
da:10:c2:be:ac:ee:b3:1a:87:8e:e3:b9:b0:99:6e:99:04:19:
69:c3:dc:91:18:20:33:5b:03:34:25:9f:b1:f4:e1:ea:b8:33:
c0:82:1a:c7:9c:b0:14:b8:2b:cd:95:59:32:5b:6f:14:61:b5:
b8:d5:80:72:89:b9:4a:2a:12:d6:de:47:3a:5c:8c:b0:33:e2:
46:d2:aa:4d:33:ae:cb:4f:51:3e:1c:dc:04:5a:a7:06:0b:73:
20:4e:3c:89:0e:dc:26:ee:3a:fd:ff:d1:7d:5c:1c:5d:81:df:
da:34:00:ff:a2:91:98:18:c2:f1:55:f9:61:41:41:00:15:96:
a9:3f:05:70:b5:a1:9e:a9:22:ca:cb:b3:15:20:89:f6:73:2d:
bf:81:59:75:58:79:e8:20:2e:54:20:ba:2a:ad:83:df:40:68:
4c:a9:a3:dd:21:59:c6:ea:02:51:fa:a8:04:8f:b2:09:8c:28:
39:c7:5a:04
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:28 2025 GMT
Not After : May 28 10:27:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:4d:38:75:39:da:b1:45:33:0e:c3:a7:d0:9d:a6:95:e6:01:
90:38:2d:9d:8d:d7:6e:a6:a3:9d:e9:63:b0:ac:5f:20:ec:06:
fa:9c:82:85:98:74:ec:ef:0d:24:b9:f9:19:7a:48:fc:2a:b6:
30:53:cb:d5:97:ba:d0:7c:d0:9f:c5:ec:d6:93:b8:60:14:23:
1f:4a:ac:e8:7d:da:45:1c:4b:21:51:4f:27:13:df:d6:a4:ea:
81:53:c0:b0:73:bc:fc:d9:de:18:6b:b8:93:67:2e:75:f5:0e:
0c:d2:68:99:7f:51:4a:b3:ff:24:22:6a:30:22:58:54:b5:ae:
9b:c9:d4:30:cf:6a:14:24:59:59:d6:03:d3:e1:d3:3b:16:82:
f0:f2:db:94:4f:bb:8e:e1:61:ee:d7:1d:65:53:89:c2:15:e1:
55:06:69:dd:dd:e8:b9:1c:90:44:83:26:26:ae:8c:4d:08:66:
1f:2a:7c:09:e7:0b:38:ca:c6:5a:6d:2a:2c:3f:90:10:04:87:
e0:1f:fc:0e:c9:d7:a3:b2:04:88:11:f6:74:3f:16:8b:fb:42:
45:ff:ef:7a:4d:5d:ab:f6:c8:0a:d9:b6:30:0b:46:6b:b7:59:
ea:d6:e8:66:64:15:30:4f:9c:18:d0:63:fa:f5:90:63:57:f6:
0e:28:30:c5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
Truncated 7935 bytes from beginning
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
3,107,086 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:09 2025 GMT
Not After : Jun 26 10:27:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8d:57:da:5a:42:63:21:ea:86:13:79:7d:9b:40:
b5:78:e1:dc:0a:bf:80:ca:57:e4:92:6d:94:3f:0a:
7c:cf:7f:0f:9d:61:2f:53:45:28:da:ee:a2:4a:80:
62:6d:47:f0:74:62:7d:cd:28:5a:a4:5a:83:94:32:
ea:90:c0:11:96:86:22:a9:7b:5f:7c:2b:86:3e:bc:
d0:fc:d5:95:9f:85:da:e3:aa:29:8a:03:b8:c0:aa:
0c:2a:97:06:53:95:53:91:ca:82:a3:94:94:be:74:
29:30:c5:38:a0:96:cd:4d:1c:bd:65:2a:fa:e9:f7:
9d:15:02:3f:43:52:40:15:c9:a9:a1:c7:18:0e:4d:
81:f3:d0:16:2e:48:58:c8:8b:d2:5a:27:ab:1b:8d:
c4:27:cc:3c:53:e6:df:fa:37:12:55:ed:08:d1:5f:
37:81:f4:df:c8:94:49:d8:4a:ce:ed:d0:69:2e:68:
cb:3c:73:36:84:59:b3:de:aa:20:2e:cf:65:9f:18:
3c:70:97:b9:11:27:db:64:c2:45:85:8e:5f:be:78:
8e:15:34:59:1d:d6:a1:3d:13:ac:39:46:d0:6e:77:
75:0a:18:44:37:eb:e0:97:ab:1b:ac:5e:4d:20:92:
8e:8d:b7:69:51:3d:d7:5b:68:63:df:fc:2a:a3:23:
04:2f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:2b:46:7d:66:f8:e2:3a:8d:a5:4b:32:1e:54:48:33:33:50:
34:41:86:22:66:94:34:0a:dc:c9:13:98:31:fa:9b:6c:4c:91:
5a:9f:95:21:d7:9f:b3:58:1e:42:f0:77:43:f7:b4:83:6d:ca:
b7:18:bf:38:a8:5c:40:c8:dc:86:69:7d:71:e5:74:47:31:b8:
8c:e7:90:fe:84:23:87:88:a8:08:a2:92:16:ea:06:62:df:40:
73:09:87:cd:15:f3:a0:07:fe:00:b5:27:d0:ac:26:06:92:b7:
82:c4:0e:ff:fb:b0:65:ff:2f:3a:dd:e6:f7:db:b9:ed:65:e8:
39:35:b8:a8:99:3d:5b:7d:2b:ff:a4:ca:74:1d:e7:b4:95:0a:
ff:e6:a6:15:77:bd:92:60:55:3b:b8:a5:9d:ca:de:07:b5:b7:
99:f1:30:5f:eb:d2:db:7e:e8:45:07:8e:86:4e:23:9b:b7:52:
9a:be:c4:fe:69:31:d9:e6:e9:e2:5f:ef:4b:c3:28:2b:95:1d:
bc:28:7a:f5:ee:1a:a8:14:54:b0:24:74:03:d8:f4:f9:5c:7e:
41:7c:01:4d:fc:38:6f:d0:fa:03:01:1d:01:34:74:8f:1e:84:
be:25:8a:a0:15:7d:44:2e:34:d6:a8:54:96:cb:32:ef:b9:9c:
76:9e:cc:94
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:09 2025 GMT
Not After : May 28 10:27:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
58:93:ba:49:71:2d:c9:35:3b:33:90:59:19:1f:06:05:00:05:
39:73:ed:0b:a6:bd:d7:11:20:80:a6:f7:3e:7f:52:65:bc:7b:
81:52:ab:72:54:65:76:cf:db:1c:53:9c:a9:0f:63:56:07:b6:
13:30:40:de:46:22:46:8c:09:4e:24:b5:98:d6:21:2d:b4:e7:
f4:84:33:bc:fd:49:28:35:34:9d:28:39:ec:1f:55:e0:2e:4d:
04:c5:04:ea:4e:b7:72:75:d3:05:f2:26:c7:4c:cd:c6:e8:2a:
61:2e:de:27:ea:0e:35:8e:00:72:40:59:69:ca:eb:d0:aa:35:
9f:9d:59:46:85:45:24:83:ed:f8:cc:e8:e1:ed:75:cc:0d:fb:
cb:90:a4:54:bd:2a:90:fa:5e:3e:ed:ed:0e:dd:bc:26:b8:25:
89:1f:79:14:0c:14:c0:45:7e:45:cb:60:1e:d8:3c:83:4e:65:
8e:c5:04:83:8f:48:8b:ad:a4:bd:8d:fa:b2:24:11:d0:0e:65:
9d:43:51:e4:db:77:67:86:50:d4:22:60:a0:16:00:1c:6e:e4:
98:1c:4e:33:34:84:da:1b:93:55:17:07:4a:ba:03:12:15:b5:
08:01:c9:6b:46:b3:ff:65:6a:86:b0:04:4a:17:f7:e3:3c:db:
ed:ca:6f:0f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
Truncated 3059 bytes from beginning
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
2,854,742 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:10 2025 GMT
Not After : Jun 26 10:27:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:2a:64:26:54:4b:ee:8d:50:58:ca:e7:64:b1:
d0:a7:14:77:d8:15:5b:e3:b1:af:f1:29:29:9b:b0:
22:8d:3f:1c:ae:10:45:d1:87:d3:bd:83:c0:f1:da:
cf:83:c2:32:07:f7:e8:33:d4:85:82:d5:dc:d8:0d:
cb:4f:9a:dd:82:07:68:82:1b:03:ba:33:fa:cb:08:
ad:38:80:de:70:99:2a:48:6b:63:a5:11:a8:4c:4c:
c9:40:e9:e7:b7:73:ad:f3:c8:15:6e:55:0d:d1:f2:
ae:88:d0:cb:c0:fc:55:3c:59:1e:af:e2:b2:c4:ed:
13:98:8e:71:da:f6:49:35:6f:2d:a5:37:71:b9:6e:
11:96:28:ac:52:00:59:fd:57:ab:37:9d:ec:0e:59:
5b:42:17:09:38:b5:99:f2:ce:18:37:8b:0a:bb:53:
8c:81:28:82:47:6f:fc:5d:33:1a:7b:1e:17:4e:00:
f7:44:fd:35:57:50:4f:e0:bd:89:ec:20:ab:15:9d:
aa:65:58:1a:49:b3:33:4a:18:4b:26:d9:88:44:6a:
51:e8:65:65:dd:3d:21:1c:96:16:dd:e9:ff:f5:be:
29:5f:09:69:c8:d4:5d:39:d9:1b:8d:77:e0:08:64:
a3:b3:b4:c9:12:76:49:db:3c:94:76:05:ea:62:d3:
7f:cd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:6d:3f:bd:a7:e7:3b:cf:ab:d2:fb:5f:6b:fd:c9:52:c2:59:
f2:c4:c9:b8:8a:05:04:fa:82:9f:14:7e:2f:c6:8a:f3:06:cc:
8c:d7:9b:31:85:6e:b2:e8:a9:99:b5:67:45:f0:d2:3c:a4:25:
0d:b6:6e:79:41:80:ec:d3:42:5d:73:e0:ba:b9:2e:30:08:1f:
a8:6e:01:1d:90:be:70:8e:c5:3c:47:c8:4e:22:3b:3a:28:d1:
1d:c0:70:81:09:c5:c0:d4:c7:88:37:17:71:b5:a6:6f:b5:21:
4c:8e:ee:6e:fc:45:00:26:ed:fd:37:2b:ab:98:d9:c6:eb:4d:
dc:25:1f:51:1d:7a:c2:6d:da:6c:f8:dd:d1:ce:d9:db:52:b3:
c9:34:5e:64:c7:b7:41:02:21:b4:df:e4:40:89:f4:5b:f7:a7:
a9:4b:a9:fe:5c:6c:c5:ff:bd:28:15:ff:be:c7:bc:56:7a:2f:
08:57:3f:c5:68:bf:de:f0:9b:30:55:2e:5c:5d:e0:18:ea:17:
24:db:74:3d:a0:ad:50:a8:d4:16:13:f5:1b:6d:09:72:f2:25:
c3:36:21:f5:80:16:95:bb:71:21:e0:00:35:e0:4b:7c:ab:ba:
b8:75:54:28:8a:84:d4:13:95:e0:68:9d:3f:17:c5:5f:38:35:
03:fd:ab:28
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:10 2025 GMT
Not After : May 28 10:27:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:1e:3d:18:3c:a1:e7:a9:ab:f5:5f:6a:51:70:67:95:f3:20:
9f:46:c6:1f:6f:41:e0:c8:fa:f1:c5:38:ba:c2:e2:58:ce:5a:
ba:0c:72:ab:07:40:27:ab:0c:49:e9:7a:09:40:34:4b:e3:6b:
1d:40:f1:22:b5:92:e6:b9:80:11:12:1f:41:23:ac:20:08:fb:
87:68:7f:d3:bc:d9:50:15:84:4b:28:13:ea:ba:82:ab:8c:e5:
2a:53:8b:c6:ac:fe:7e:a9:8b:4b:22:e9:7f:f9:25:6d:0c:e3:
ee:60:93:c9:6f:bc:68:65:14:5b:2b:5e:78:bd:43:1e:e8:6b:
c0:fc:45:c0:72:44:16:e7:97:a7:4d:04:1e:74:1f:67:3b:bc:
a3:cd:71:65:fb:0e:33:c2:5e:7a:05:15:5d:5e:fc:7d:84:f0:
bd:b4:d2:bb:fc:a2:51:fd:88:d9:22:ca:5b:4f:08:1d:ae:67:
67:7b:9d:d1:4c:c6:7d:a7:e4:2a:35:f0:31:88:38:9c:c3:26:
a5:ee:22:f4:a6:0b:1f:0a:4a:f5:39:34:92:e3:c6:85:7d:c7:
2f:7a:f9:b2:61:aa:b7:cd:00:cb:0e:d6:8a:00:da:63:a4:c0:
84:b4:43:2a:47:d1:92:7d:13:8e:c6:97:1a:19:81:3d:9a:5e:
8d:44:2a:b4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
Truncated 7935 bytes from beginning
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
3,106,103 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : Jun 26 10:27:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:31:da:f4:39:36:13:a9:f8:e3:ba:cd:93:a0:
31:79:75:3d:83:23:7a:69:dc:88:7a:87:b4:fd:07:
21:29:37:24:77:d7:9d:ce:2f:08:c3:78:e4:b8:9c:
81:68:fa:2d:8b:9a:16:b7:8d:fe:15:3f:3f:71:43:
87:b3:02:1b:d5:fb:d1:3f:fe:a1:f5:74:54:1c:4e:
97:da:29:bd:8f:c7:e1:ba:43:fb:0a:03:25:b6:99:
87:33:4a:35:c7:88:9d:50:a5:90:e0:34:c4:06:88:
c9:b4:db:b5:ec:a1:0a:27:41:32:03:aa:09:fd:68:
3e:d0:b6:92:fa:40:6d:80:9b:09:3d:d5:7d:8f:44:
5e:58:0e:ba:6c:ed:3e:82:1b:5b:19:26:50:f6:bf:
a1:af:30:08:1c:53:dd:74:2e:47:d1:41:72:29:91:
32:4c:21:61:c8:89:fc:d1:0e:50:c1:88:4f:99:a4:
59:f9:c4:f9:f8:58:41:71:13:84:b1:55:ad:21:f4:
41:db:16:ee:ee:66:f4:ee:4a:23:69:69:3b:c9:2d:
c0:16:f0:ae:f2:ac:42:b4:d3:08:ca:08:72:4d:b1:
23:99:62:14:e4:11:60:75:b8:0a:0f:a8:30:97:5c:
71:24:a3:1f:eb:2b:eb:c2:ad:8c:38:cd:01:41:07:
56:ff
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:45:9d:07:6a:a3:76:33:71:b4:be:cd:a8:da:90:68:48:41:
7a:40:da:66:91:12:15:5d:f8:b7:d8:97:7f:92:d0:9b:1f:6e:
ca:db:ac:91:b3:79:54:af:82:c4:f4:90:54:63:28:51:b8:7c:
ce:c9:ae:83:83:ae:8d:6f:f4:f7:d1:cc:56:f8:5d:c4:02:16:
6f:6a:10:60:df:17:41:81:87:0e:1a:bb:d9:99:8f:87:44:d5:
5e:6a:9d:8f:ea:9c:c5:50:a3:61:90:2a:1a:7c:6b:54:c9:dc:
0a:46:e2:75:f9:78:82:51:1d:ad:8a:6d:3a:c1:7c:2e:fe:28:
94:ee:73:8c:83:c3:49:0a:aa:ad:97:6c:8b:74:40:e1:3d:04:
41:1d:73:5f:fd:21:8d:74:c3:81:c5:bf:32:e5:d3:90:4f:1e:
5c:c3:a9:a8:3e:8e:0d:40:2f:52:73:e9:cf:bf:6d:69:b2:86:
dc:bb:a4:ba:b4:c2:58:d8:d8:7d:70:72:d7:5d:94:9f:52:3e:
b4:8b:39:9f:ba:89:7f:4e:f5:d2:7e:ee:e2:bd:1c:d9:03:e2:
48:8c:a6:37:8d:c4:71:c3:f9:b5:98:4a:8e:ff:2d:43:4a:98:
b4:22:44:78:ee:02:34:7e:4f:a0:bc:c0:e8:1e:77:01:72:10:
19:30:2c:53
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : May 28 10:27:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:77:3a:9e:65:ad:d0:83:28:9c:6f:2b:96:2e:c2:34:8b:90:
26:ef:c2:24:2f:4c:f7:bd:9b:35:64:59:86:25:b7:96:d4:72:
55:6c:e8:bf:dd:5f:a4:bf:4e:8f:34:12:26:5c:58:6b:78:39:
dc:0f:39:91:ac:f4:0c:1a:09:4e:f6:74:11:61:79:10:2d:37:
e4:fc:82:4b:e1:a7:24:a9:18:4d:ff:84:c0:95:69:cb:30:61:
5b:f3:5a:e5:55:fa:9e:d6:ad:7a:66:ab:36:fd:bd:df:57:d4:
c7:46:3b:ad:84:e2:54:5a:49:3a:91:b9:e5:66:7f:5e:7b:43:
20:ca:26:78:14:a2:68:72:0a:a9:27:25:53:94:31:17:e3:48:
71:94:e5:a0:4e:26:30:79:5f:26:bb:27:77:aa:30:16:24:e6:
9d:43:24:e8:72:52:7a:30:f6:ae:8d:42:5f:8d:7e:47:4e:36:
41:0b:10:ff:4b:7d:41:49:e6:4b:d1:1a:fa:95:f9:f8:ef:34:
df:5b:70:41:12:40:a5:ac:76:35:05:2e:04:c7:36:b3:dc:3f:
b4:26:11:b9:97:8a:19:23:95:d2:f1:47:10:a3:a4:f6:2b:2c:
d9:73:e7:35:0f:71:2e:57:ce:ec:43:bf:75:e5:f2:ac:3d:9b:
79:44:80:08
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
Truncated 3059 bytes from beginning
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
2,853,375 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : Jun 26 10:27:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:57:01:55:9c:59:fd:52:15:84:5d:92:f7:2f:
f3:a0:ca:e7:ed:23:0b:ea:a6:05:fa:17:e9:e6:64:
a0:11:75:34:79:8a:d4:35:24:04:05:a2:b4:07:8b:
2b:76:cc:05:75:d7:f4:89:d6:88:7e:43:c7:24:4d:
b5:d9:00:e0:ca:92:14:84:a6:95:cf:6b:d4:51:96:
73:a7:12:3c:f0:bd:7a:2e:e4:51:f4:92:83:d7:0d:
88:a6:14:8a:3e:30:cd:d5:c4:93:67:78:29:ec:57:
40:fb:6f:7d:64:e0:f1:22:00:4b:af:67:46:74:6e:
15:a5:f3:99:99:f3:1b:7d:9b:78:2f:92:0e:b9:37:
fc:0f:af:61:30:2d:5c:02:e0:cc:ca:24:cd:d5:c9:
97:d3:79:fc:6f:7c:f8:f5:57:2c:fb:38:f2:6b:06:
c9:9d:de:17:d8:e8:dd:73:48:36:31:9c:fb:04:bd:
07:35:3a:96:7f:4b:b5:a0:48:16:7f:09:5a:a2:01:
a1:49:27:1e:0d:92:f7:ce:a5:ae:9d:d9:10:0c:f1:
b0:f4:bf:eb:61:ce:0b:78:0d:31:78:57:cc:8a:80:
03:cc:48:45:2a:d0:03:21:a6:64:a7:49:56:63:af:
a0:09:5a:91:93:82:15:fa:bb:24:03:bf:e5:1b:d3:
93:2d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
94:cb:d4:f4:3a:b4:e6:b0:14:dc:6e:c3:a3:37:a5:8c:50:b3:
bf:ff:70:e6:10:ba:da:d6:36:b7:96:e0:7d:cf:e4:11:57:0c:
c8:cf:9f:54:41:b3:d9:af:f4:db:b1:eb:56:49:d7:f3:ed:8f:
f7:d1:c4:9e:b0:33:5d:c0:1a:08:c5:22:13:b5:aa:ef:37:4f:
0a:47:ba:01:db:ff:54:f6:1c:d6:02:12:1c:86:93:d9:ae:59:
2f:11:fc:7c:9e:26:21:0e:ff:fb:86:d9:ea:9b:a4:22:41:60:
03:17:98:6e:68:fa:0d:7a:c7:6e:ad:52:e2:05:05:e6:35:e8:
87:a3:e2:23:68:5c:e3:63:eb:12:c2:bd:f6:a7:c0:54:a3:02:
d0:f8:24:55:94:16:5e:cd:73:70:f6:ec:01:62:b2:40:16:e4:
a7:ef:11:98:10:7e:2b:85:c9:34:c2:fc:00:77:d8:2c:07:48:
4c:67:07:a2:4a:14:43:c6:6c:19:b3:8f:e8:f9:9e:90:50:40:
ac:db:1e:e2:84:a7:08:11:fb:aa:9c:33:48:83:b7:22:7d:a2:
30:ef:39:b4:15:b3:74:ba:6d:f0:bf:f5:99:51:93:ba:fb:98:
23:03:b4:5d:b1:f7:f1:91:15:4c:21:a7:e1:a2:c5:45:93:51:
c1:4e:bc:05
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : May 28 10:27:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
af:f0:61:a5:d1:e6:92:b8:f7:28:f8:a1:23:a4:dc:99:f4:0a:
af:88:c6:36:21:e5:1a:a5:68:9e:a5:9c:c0:64:44:fc:11:76:
36:24:9f:24:8b:a1:30:da:41:e2:2f:24:64:1f:7c:19:1a:61:
00:c3:68:07:e5:7f:f3:98:80:f2:06:b7:4a:ba:31:ef:ea:b4:
56:aa:5e:71:a9:fb:dd:b6:f5:2b:15:41:46:9f:ad:22:53:09:
07:bb:e8:f9:17:e3:95:63:21:81:5e:55:56:33:fc:b1:b5:e3:
fa:48:a6:6b:31:25:c6:cc:e3:ca:21:aa:18:56:03:26:28:88:
8f:99:2a:32:f7:9e:d2:e6:f7:a7:0c:20:f8:4e:a0:34:42:d4:
24:59:f4:f9:cb:90:da:cd:6b:48:c0:92:b8:a9:3a:47:cb:61:
da:0a:18:3d:3a:22:c9:62:13:8f:af:0e:28:b5:f3:f6:90:ba:
6a:a0:65:41:db:19:74:78:fd:ab:85:2c:1e:8a:10:62:d3:f7:
cb:71:52:6b:29:4a:66:73:90:7a:e4:52:72:83:91:fa:7d:af:
61:75:40:8c:51:11:ad:22:5e:f3:8e:61:5f:0b:10:d8:65:84:
63:af:94:96:ea:63:aa:cf:3d:1c:d0:ca:d0:46:3e:53:9d:ef:
43:d6:53:68
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 7935 bytes from beginning
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
3,106,298 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : Jun 26 10:27:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:7a:c7:98:6a:c9:0f:43:e5:18:c5:46:81:b4:
a5:12:26:9d:57:89:ba:2a:00:ea:a8:5f:00:3f:c9:
36:e2:ab:f3:8a:34:72:07:34:45:74:1b:c6:03:05:
9c:ed:78:7b:c8:19:f7:fb:75:7b:f0:8d:78:95:44:
c8:80:ac:a1:b0:18:87:c6:0c:74:4d:eb:f0:07:f5:
16:3f:15:62:28:e1:71:22:d4:37:5b:44:ba:a8:80:
fc:c9:79:c7:de:f1:6a:6e:28:6c:6e:09:b2:7e:0c:
a3:7e:9f:a5:9a:26:7a:19:cd:ea:74:ea:55:73:8e:
a0:59:6e:d1:81:bf:f2:cd:d0:1f:29:39:f7:2b:25:
4c:9c:3b:23:6b:51:ad:5e:5d:f8:1e:58:b7:e4:fb:
72:e0:01:9a:67:6a:ab:12:e7:ac:83:b8:23:84:47:
43:63:92:b7:09:43:31:be:25:71:5f:41:d9:a5:56:
64:e3:9e:e3:bf:ce:31:d9:c1:3b:f1:dc:28:28:ea:
a2:6f:01:34:74:a7:7a:0b:29:1a:cf:f7:6b:26:55:
0e:56:13:32:82:3d:c4:4b:a4:82:9f:03:ec:a3:72:
11:15:0d:cf:7a:96:cf:71:a1:d2:e2:8a:04:9c:34:
0e:01:c6:73:62:8d:1b:31:9a:7a:c2:44:5a:01:56:
0d:c3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:da:2b:09:79:44:8f:2d:bb:ef:52:a0:80:4a:89:06:ad:f3:
55:87:7c:3d:2c:de:0b:37:db:c4:d5:1b:9f:e5:23:c5:37:3e:
4a:44:b8:a9:07:2c:75:a7:16:06:d0:ed:a0:4a:42:84:25:7d:
79:6a:40:4e:3d:92:88:4b:5c:d5:6d:a2:25:a6:88:9c:ad:0a:
e3:37:3a:0b:e5:fd:6b:9d:cf:9b:d6:62:e2:14:26:51:64:9b:
b9:00:82:1c:c9:2b:b4:58:0c:e8:10:48:57:18:53:2a:45:ce:
6a:27:2b:c7:1a:e1:44:c6:fa:d6:51:cc:97:41:b5:7a:22:22:
90:a4:d5:41:5b:ad:2e:58:d8:e6:5e:b8:40:9f:41:6e:e2:55:
50:be:40:c9:91:dd:2e:2d:0f:46:42:61:48:f4:a5:8c:74:b8:
89:98:69:77:66:c3:2c:bb:60:d8:d0:b9:0a:21:c6:94:a8:4b:
84:78:9a:00:e3:af:c0:a6:28:48:2a:72:88:da:2b:2e:03:26:
4b:b9:58:22:65:12:47:dc:4c:26:f4:ec:7c:63:90:a0:56:85:
5b:07:2c:1d:87:2b:90:73:cb:b7:ed:de:52:ad:a5:a8:7c:53:
54:c3:bd:c4:f8:c7:93:e2:e4:24:78:67:a1:e6:c8:7e:73:e4:
d9:b7:63:6b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:18 2025 GMT
Not After : May 28 10:27:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8f:99:cd:55:62:04:f5:94:e0:21:cf:5a:78:fe:61:ff:ea:a8:
fc:8f:58:ef:d8:b1:d1:06:86:d2:e8:76:16:c1:8b:28:fd:8b:
7a:3e:e6:b1:7b:a1:a3:ce:4b:c8:4b:02:33:87:c0:cb:e6:04:
13:2e:fc:3c:92:da:db:2a:06:1e:51:65:30:b6:0c:53:fe:6b:
e4:8e:12:ec:e3:93:38:c8:ce:f6:5e:f1:68:59:71:73:f8:3a:
55:0c:62:9a:64:4d:dc:3a:e1:b8:06:ff:52:87:c9:97:6a:da:
72:1e:64:78:36:ad:ec:d6:83:95:d3:66:a0:a7:10:c3:be:db:
91:6f:d0:dd:5b:ba:ab:e6:e8:39:8c:97:d9:a2:5e:f5:b9:ff:
3f:fa:bf:e7:26:0e:1b:e7:d1:fa:86:e3:09:02:61:78:6b:35:
7e:c2:72:b3:b4:f5:2d:12:e9:65:96:82:6b:85:78:74:2b:b9:
0c:cd:56:ad:c1:a8:55:44:53:30:4d:ff:90:05:af:15:ff:6c:
4d:88:5a:65:29:a2:32:94:51:68:b6:65:9a:ba:76:cc:13:76:
19:5d:c8:ef:fc:1a:72:cf:b6:21:33:1e:5f:cf:5e:98:08:42:
92:2d:89:10:5f:5c:fe:9b:07:35:15:08:a3:92:db:4e:43:43:
f1:e8:ed:00
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,855,444 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:21 2025 GMT
Not After : Jun 26 10:27:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:01:1b:1c:1a:64:b8:6b:48:91:88:ba:3c:11:
a7:8e:79:ef:6f:1d:a8:ae:0d:39:f8:f6:e4:d6:2b:
23:f3:f7:e3:56:32:5a:f4:39:0e:db:35:ae:d4:cd:
db:5a:b7:ec:74:ca:9a:9e:db:5b:35:e5:d3:f1:c7:
c7:8b:aa:b1:a7:c7:c3:7e:6b:5c:9d:5f:66:4c:15:
a3:8f:51:25:d6:7b:88:c8:42:27:f7:bf:45:70:3f:
b9:4e:1f:49:1a:77:ab:d1:21:00:56:75:6e:69:d0:
39:88:ca:46:2e:b0:57:45:3b:9a:9d:0b:05:12:c2:
73:cf:c0:ee:cd:1e:e0:53:32:3e:a9:08:a9:41:43:
16:55:c9:8d:be:59:5e:68:c0:fd:8f:77:7a:4e:0c:
9f:a2:9d:cc:22:29:51:21:42:0f:66:92:70:4a:e3:
c2:1b:92:91:08:ea:41:9b:d1:68:5e:1b:30:19:b5:
76:c9:31:7a:24:49:39:0b:ee:17:df:3b:f8:27:2d:
63:73:93:13:79:24:fa:fe:f2:12:6c:f6:f4:aa:9e:
6a:33:c8:57:27:f8:1c:58:0c:65:bc:98:c1:3c:c2:
d5:72:15:1a:e2:f0:d0:22:22:b6:52:fd:c3:da:8d:
78:78:a8:2f:17:6c:85:fd:37:4e:58:41:63:1b:04:
fd:57
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:99:bf:2f:73:14:03:39:ec:5a:94:6b:6d:c5:da:04:cd:79:
e5:65:2a:7a:cd:a3:6e:ae:8c:25:80:c4:aa:c7:3c:ff:cf:28:
e2:3a:40:e6:f9:2a:0b:29:42:64:51:ac:16:1a:bf:3b:ce:ce:
00:9c:02:c1:9a:3e:af:c2:82:5d:84:fb:d4:7d:ff:1e:28:99:
9a:06:40:0c:85:6d:c7:70:66:29:da:55:d0:16:4b:af:cb:d8:
67:d4:65:d3:02:c6:4c:e0:a3:42:e3:b0:14:0b:43:ac:b6:84:
2f:bc:46:16:cf:ad:1f:92:9d:a2:7b:0d:25:ef:2b:cb:8f:ec:
27:dc:d9:ae:69:d6:fc:97:35:a1:37:fb:02:4b:e6:7a:cc:2b:
2e:a9:d6:fe:cf:73:40:1a:80:0e:c0:6d:6b:0b:6d:26:38:82:
fb:20:34:04:b0:a7:5c:75:96:66:cc:6f:3b:ea:f4:f4:a9:47:
a6:93:53:eb:f6:1c:bc:f5:6b:4b:a7:69:ec:a4:28:a2:f8:3b:
a1:64:54:7f:7d:48:c1:f8:16:83:25:57:8d:41:1b:04:6d:07:
b9:54:67:be:db:a5:a0:2e:e7:b6:69:4a:41:a5:cd:2a:2a:41:
83:28:50:b2:13:04:30:a3:fc:93:76:3c:3b:ff:87:e0:61:e4:
f1:28:e0:86
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:21 2025 GMT
Not After : May 28 10:27:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
65:2a:a1:35:ef:f7:75:a8:bf:da:64:cb:90:81:a2:55:32:5b:
3a:43:9d:f8:42:41:c2:c1:d1:b8:d9:ec:be:2f:87:18:21:d4:
3f:f2:b6:93:ca:e4:81:82:f8:25:3c:d3:39:86:a9:f9:0d:b0:
8e:36:7d:f7:c8:3b:7c:1a:c7:f5:d6:6c:fc:0d:75:b6:c6:0c:
0f:0c:7c:48:0c:3e:f3:b5:ab:02:51:ef:b9:e7:05:b9:4d:83:
5a:9e:1b:1c:17:c9:31:1d:c0:cc:5e:c8:01:cb:24:cb:5a:c2:
33:68:02:44:ef:7f:b7:28:1b:e1:d1:58:9a:1b:84:cb:58:67:
1d:4d:cb:e0:4d:7b:1d:f9:71:f2:01:3b:a5:97:53:d3:65:5d:
c5:cc:e2:1a:fc:1a:21:52:df:b6:74:87:91:16:88:7c:e7:32:
39:b7:8a:b0:73:6c:b3:28:84:b7:01:4d:3b:ea:db:41:10:af:
53:52:4f:86:01:a2:37:8c:79:0d:26:7c:de:52:15:24:28:d6:
02:96:2e:d8:1e:13:9d:61:55:89:a7:fc:05:0f:ca:57:1b:01:
1c:52:c2:27:35:e9:7e:b3:ce:88:8b:89:bd:f0:c8:27:76:3c:
6a:59:b6:f3:d1:2b:fc:82:9d:e0:4a:8d:e7:61:5b:45:56:f9:
71:9e:de:4e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 7958 bytes from beginning
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
3,105,197 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:24 2025 GMT
Not After : Jun 26 10:27:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:97:1f:1c:96:4a:37:37:a0:f9:3f:d2:49:2f:20:
fd:88:c2:07:14:69:6b:75:07:e5:00:08:cc:19:21:
4b:26:e1:32:03:82:c2:71:48:36:7f:a4:e8:be:3d:
c2:ba:7c:8c:f1:21:03:aa:88:a5:69:18:1b:af:29:
e9:aa:da:43:96:aa:b4:c2:0e:3d:0e:49:1a:fc:45:
6f:8c:c9:d3:07:ce:7c:f5:7d:ef:8c:a2:0d:8c:86:
77:56:4e:a4:fc:fc:1a:69:4c:ee:a1:b7:93:2c:95:
af:f2:12:61:f2:88:96:d7:5b:f8:46:c4:94:ed:c2:
1a:5a:7e:a8:a8:f0:35:2e:df:53:ab:ef:37:0c:c9:
8d:dd:5b:bf:cf:b2:34:a7:84:7e:fc:47:7c:fc:d2:
14:7d:55:1c:39:54:d6:69:75:60:52:27:68:41:7d:
b4:f8:b9:48:1a:0e:bf:54:55:14:28:e2:53:3d:b4:
b7:14:1f:e4:aa:41:fa:73:3f:d3:5b:2a:8f:c2:be:
86:61:48:7e:44:40:9b:02:72:63:32:5a:d1:8c:01:
60:83:d7:7e:d2:79:57:93:58:34:49:e9:cd:cd:f6:
86:31:80:4c:f7:7f:8c:4b:c8:d4:bf:d3:cd:93:6f:
c3:a4:bb:a1:9e:53:cf:81:2d:2d:8b:cb:d2:9f:35:
5b:87
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
27:a6:e1:80:5b:6b:63:d4:f1:48:e0:85:14:1b:f4:76:df:98:
25:e8:18:e4:e3:4b:b1:ef:55:bb:1e:84:06:15:5c:7c:f4:b4:
3d:53:53:ee:bc:c6:9c:85:2d:dc:e8:4c:f5:11:d0:98:c4:95:
32:c7:c1:10:8b:56:07:5d:71:bb:e1:cf:e9:02:d8:02:e8:80:
07:3e:eb:ac:8f:4c:9f:35:02:8f:c5:60:c5:f1:04:22:78:e5:
75:3f:07:d3:66:f3:33:48:7b:64:ab:58:a1:3e:ab:1a:3a:64:
b5:0d:a8:bf:69:99:ce:a5:30:e5:40:0f:31:36:9e:15:9c:a6:
2f:57:9a:1c:b7:69:1c:4f:2f:ab:84:a1:0b:d5:9a:b2:d6:6e:
ff:f6:f5:06:75:ad:90:01:d5:b5:c5:c0:35:fd:98:47:9c:dc:
87:8d:14:6d:4a:c3:a2:b1:cf:b3:72:88:35:ae:27:c9:6f:9f:
b3:2d:08:ce:c1:f4:51:82:80:fb:c0:39:ac:77:29:9f:b1:02:
37:1a:03:32:de:cd:fd:68:f0:cd:3e:31:a2:54:85:d5:fd:1c:
91:e9:de:4a:c5:1a:5b:2c:d9:f9:b6:61:9d:fc:13:d2:9a:61:
44:34:69:7f:f8:bf:4b:99:1e:44:2e:9f:c4:ea:0f:ec:cb:fd:
8f:30:ca:ec
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:24 2025 GMT
Not After : May 28 10:27:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
57:a2:4e:01:e4:9c:b9:39:39:99:d3:59:00:fa:bb:0d:3c:ed:
75:39:87:3d:7e:de:11:41:97:fe:a5:c3:17:8c:4a:a3:00:53:
97:ad:b0:12:94:05:44:0f:ae:99:b1:19:d2:14:be:d2:f9:c6:
0c:ec:88:a9:de:01:45:4c:bc:40:f3:13:0f:c9:f8:99:76:a1:
f3:e0:c6:69:b5:c7:2d:2c:84:75:8c:1e:ad:03:24:3f:b5:1a:
3a:60:6c:02:16:9d:c0:53:67:80:8e:88:04:8b:72:e3:8d:c2:
fb:b7:7c:59:4c:68:14:be:d6:b1:a2:39:7f:29:4c:b2:10:ed:
04:13:d8:0e:ab:fe:9f:7d:53:8a:74:bf:0b:b5:7c:ab:9e:c0:
41:33:51:9a:ec:98:45:2d:87:0c:bf:47:f3:15:ec:74:64:8b:
3a:29:c9:59:9a:62:81:5a:40:d4:65:e0:56:ee:e3:35:31:5c:
0c:6e:8f:c9:8d:a4:78:bc:5e:26:cc:2c:3d:7a:9a:a2:c9:8a:
e5:d2:70:b7:91:29:df:a5:4a:a0:16:ed:96:d0:95:97:20:0b:
ab:7b:98:80:d9:18:b7:07:b7:31:e2:1f:71:6c:cf:8a:4a:22:
a2:5a:45:40:97:f9:9b:34:fe:89:ef:57:c6:00:a3:9a:5d:85:
ae:3a:42:8b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
Truncated 3082 bytes from beginning
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
2,853,138 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:14 2025 GMT
Not After : Jun 26 10:27:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:89:c6:e1:99:1a:34:19:d8:5a:a6:fa:a0:ba:
75:7d:cc:36:5a:b0:f1:70:7a:53:0b:c9:19:be:6d:
ee:c6:42:55:c5:71:a3:0b:ca:ea:db:36:41:24:6d:
74:a2:90:5e:a3:8c:80:83:00:99:78:39:03:0c:3a:
c7:39:2a:02:a2:0d:da:ce:f9:45:df:4f:37:30:31:
fc:5a:e5:2f:89:07:e6:22:b0:cf:53:ce:44:6e:95:
4d:09:60:80:87:f8:35:65:8d:d6:94:b5:5e:20:c2:
5f:b6:b4:eb:72:04:b9:e5:57:40:4c:f5:fd:8a:34:
71:58:78:bf:58:63:4b:30:de:f8:27:42:b0:0b:a9:
e1:f0:2e:26:86:1a:e8:fe:c7:20:d9:29:c7:d5:70:
d7:4a:2e:61:a9:f7:b6:d8:ee:af:55:29:c0:b5:8f:
87:11:c0:b5:27:74:ee:3e:c7:84:01:b0:a6:68:7d:
6f:11:19:fc:e6:20:b6:56:98:f8:e5:5a:56:77:39:
93:8d:7f:06:47:ac:25:c2:79:1d:27:df:b2:a2:cd:
7c:24:af:88:e4:70:01:40:d8:cb:8a:a3:f1:00:b2:
a9:25:1b:7e:22:ee:98:d4:90:c1:7a:3a:6a:a8:65:
fe:52:0c:79:b7:38:8d:1a:01:93:ac:e8:d3:ef:be:
36:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
79:d7:6b:55:b6:7a:4c:cb:d0:21:cd:fa:51:33:21:19:f9:3c:
0c:68:bb:79:cd:8b:68:e8:84:d8:ed:3a:9a:62:81:73:86:c3:
49:7b:af:67:aa:83:c5:fc:c5:8d:3e:0e:a1:e0:67:13:36:e8:
1f:c2:61:e6:b1:07:85:0a:16:4f:f4:c0:23:4f:d3:1a:7e:9d:
5d:a7:d9:3d:07:38:a9:9d:5f:6b:f2:cb:9e:ec:80:4c:4b:c6:
b4:7c:10:09:99:b7:a5:0c:8c:79:41:c2:39:e2:d4:0e:d1:86:
00:5b:f8:e5:b4:2a:af:ad:8f:37:05:00:fb:eb:24:be:f9:0a:
4d:92:84:f0:16:3f:3a:c3:4e:29:c8:8d:c2:81:5b:18:25:35:
63:60:ed:b9:9d:1d:9f:2a:23:33:73:cc:c5:2e:ab:cb:94:48:
8d:16:36:93:41:63:84:c9:58:32:92:3b:80:6e:c7:ef:c1:2d:
73:ed:e5:8a:c2:fe:05:ec:ec:26:0f:fb:56:ab:3f:91:65:2d:
55:1f:92:d7:67:8f:f0:79:64:55:0e:c7:33:18:9c:3b:60:e3:
47:28:49:c9:b1:3e:fa:29:12:c2:52:50:37:7f:4c:cc:73:89:
eb:6f:70:75:06:a1:20:d5:d5:e2:e7:25:53:3a:83:0c:2a:00:
75:b9:cb:70
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:14 2025 GMT
Not After : May 28 10:27:14 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
af:24:27:38:8f:6b:3f:86:d6:2d:b9:d7:1a:11:44:1e:ad:73:
8d:f8:4a:0f:6d:82:6d:89:bd:8d:e3:23:bb:57:a1:5f:1d:5a:
82:fc:5e:5c:31:21:a8:80:7d:c5:35:df:27:07:ce:45:b3:2c:
b0:95:65:4b:7a:a7:53:10:17:22:8c:98:83:c1:05:5c:4f:94:
58:f2:a1:76:e1:cf:3d:12:0c:2f:4a:8e:0d:df:6c:34:74:34:
4f:04:0d:a6:f8:b8:be:b6:7d:22:6c:25:8f:18:d9:90:ba:4b:
d2:5e:ef:1f:98:9b:8f:90:76:9d:7d:cc:0e:4b:d5:65:17:2e:
15:7f:ca:ba:eb:16:be:33:d5:d5:24:34:22:f6:fd:b1:2c:0f:
00:3d:3f:ad:23:d0:ad:db:83:fc:02:9b:b4:3f:ee:ff:14:48:
38:4a:33:50:34:6f:b9:4e:7e:41:43:85:69:bc:54:6b:c5:ce:
ab:93:13:d2:bb:fe:37:6f:25:24:5d:2a:81:7a:97:44:60:d1:
ff:81:e6:93:51:fd:82:8b:67:b8:c2:06:e9:7f:c2:93:b0:df:
f7:6c:a1:ad:c0:11:06:fc:11:17:f8:8b:3c:7e:06:38:cc:0d:
fe:0d:ea:10:1d:fd:30:cd:79:34:36:f7:8b:cc:1f:60:ce:14:
1e:d2:01:5f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 7958 bytes from beginning
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
3,108,760 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:20 2025 GMT
Not After : Jun 26 10:27:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:a4:11:7e:9e:d2:67:9e:f0:06:7a:77:e1:6d:
15:91:b5:b5:a2:a6:87:a7:0e:ba:43:29:5f:30:a3:
ef:8c:23:9e:01:66:2d:b5:0a:c0:87:60:14:c2:05:
26:0b:7b:92:1a:14:5c:c8:3f:34:3e:22:48:4c:39:
12:c9:53:67:df:8a:38:72:de:7f:e1:00:e0:5a:7f:
c4:d0:8a:26:b8:b9:e0:32:30:51:eb:a4:35:0b:c9:
9c:4e:98:7f:fa:ec:db:67:b9:4d:f7:71:80:b2:8d:
85:67:d4:cf:70:eb:b5:40:eb:d6:84:fc:22:ea:8b:
62:29:ab:46:bb:16:d0:1e:f1:a9:16:7b:ba:ab:75:
93:5b:1b:fe:4f:e5:32:cc:52:f5:66:de:f9:4a:bc:
b0:84:01:03:6f:a3:59:05:5c:48:c7:6b:e7:3f:b0:
3d:c2:87:9f:57:49:09:c2:c1:7f:2d:7b:86:e9:4c:
29:a1:5a:d4:ba:77:86:55:7d:46:53:f3:93:80:69:
14:91:09:73:85:95:21:17:8c:91:12:0d:5b:40:d9:
78:80:d7:67:30:a9:4d:f2:94:33:cd:78:24:7a:08:
db:e9:79:80:3a:41:a3:ed:e2:3b:5d:0a:49:77:b0:
c4:5a:dd:17:20:e6:7d:dd:44:71:64:b6:4d:00:d8:
b6:65
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
32:76:44:86:b7:0d:33:5a:b7:66:6d:31:6b:ee:3b:75:63:21:
3d:64:e7:de:81:6e:30:59:fa:f5:c7:01:e3:fc:5d:56:cf:30:
67:07:b3:fb:fe:9c:6c:bf:44:93:2a:a8:92:c0:f9:1c:b4:c3:
d2:cf:07:2a:f2:da:75:83:85:82:d6:9a:49:42:17:1a:cb:b5:
7d:20:9f:7c:be:80:03:bf:08:05:95:03:91:6d:26:95:66:7d:
2c:4b:56:f7:c9:f4:94:7b:8d:62:10:f1:95:14:9e:78:9d:f7:
9e:94:e7:86:83:81:de:64:f8:81:ed:40:b1:f5:25:4b:58:db:
5e:af:01:b3:1b:50:f8:fd:53:e0:93:54:de:d7:fb:dc:71:df:
ac:13:72:da:11:58:92:66:41:70:3c:1f:89:c6:1f:03:e2:35:
b7:ef:a0:f9:3b:31:fb:58:35:50:f7:61:38:78:a7:76:8f:73:
d9:8d:fa:fc:b8:be:1c:62:bb:91:96:ae:74:6a:54:2f:64:0d:
07:36:04:1f:02:41:98:63:2d:db:bc:c6:fb:5f:2a:ae:d9:8f:
ae:0f:c4:c2:f7:53:ca:83:79:54:6e:5a:10:fe:d8:60:b0:60:
e7:ae:ef:f2:2b:34:c4:6b:ee:a3:09:fe:bd:21:63:dd:da:9e:
de:55:0c:45
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:20 2025 GMT
Not After : May 28 10:27:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:82:88:79:53:58:0d:7d:b9:c8:85:66:1f:5a:ea:f7:2f:67:
71:39:61:f8:f6:91:84:a7:c3:b7:bb:4a:bc:3d:f9:da:c1:e4:
4c:34:ef:55:3a:d7:a5:3c:51:9a:f2:da:f8:46:7b:a9:b7:55:
ea:e6:71:24:2b:7e:bf:9d:92:4a:88:fd:db:12:62:54:c6:19:
e6:5b:b7:60:04:5a:3c:9f:d7:84:70:f4:8a:81:38:df:c6:7c:
94:fe:68:0a:74:fa:44:65:59:38:06:91:ed:29:e9:d8:6e:e2:
25:9a:70:84:18:b2:1c:f8:b9:8f:16:0d:a5:a3:6f:ff:88:86:
73:76:1a:8a:a0:36:85:f0:0c:38:d4:8e:8d:1f:fb:8f:69:23:
d1:7f:7e:07:68:17:e6:5c:b5:e4:65:63:d4:a3:3b:2f:13:88:
47:5c:7a:82:4b:24:ae:54:97:d5:19:85:9b:b1:e1:9b:d8:1a:
84:57:3a:b4:29:9e:21:fb:a7:36:6e:6c:5e:db:f0:68:c3:11:
a8:01:a9:8a:bd:d8:40:98:9d:e1:c6:da:1b:a7:12:fc:34:c2:
95:b2:e3:b7:de:b7:12:59:b2:4a:74:d5:27:dc:fa:2f:02:d3:
10:2a:ed:ab:ce:39:d1:b4:35:a7:82:03:f3:80:4f:18:b2:b3:
75:22:84:00
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
Truncated 3082 bytes from beginning
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
2,855,487 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:23 2025 GMT
Not After : Jun 26 10:27:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:98:7f:f1:0b:1c:e1:71:a0:38:42:cb:e4:2f:
62:b7:13:5c:98:26:57:19:bb:db:f2:ce:6c:5c:cc:
2a:3f:69:0c:dd:a7:13:f2:24:15:05:4b:82:2f:a7:
af:bd:19:71:73:3c:fd:10:e5:15:fa:c7:94:1e:32:
d5:29:b0:36:93:51:a3:3a:47:38:0f:42:c5:71:4d:
c3:2d:4e:f2:a5:97:e1:9c:a8:f4:2e:87:af:4d:c3:
94:d7:90:1f:4f:5a:2c:c9:c5:1c:4b:42:88:5e:33:
7e:2a:2c:4a:ad:7c:0b:75:01:2f:c8:01:21:83:ca:
2f:ec:a8:59:e7:8c:cd:4f:a8:60:12:6e:67:23:df:
40:ae:83:04:bc:40:7b:7f:37:b7:9b:b3:ec:a3:a8:
a6:0e:71:ac:f9:bd:18:2a:4a:16:a3:86:c2:ec:47:
c1:9c:a5:85:60:04:d4:60:24:94:e2:a1:69:c3:8c:
f7:35:5f:e4:aa:f6:e7:3e:1a:6b:9b:2c:f1:48:a1:
aa:30:7a:98:61:71:7e:99:04:f9:b4:05:ed:ab:cf:
de:fc:eb:97:72:3b:75:37:43:80:31:37:ac:81:44:
91:fa:88:bc:79:48:97:81:39:30:21:ba:78:16:ee:
48:b5:6f:9c:df:e7:ad:26:ac:5f:2c:0e:3a:e2:17:
02:25
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2c:84:b6:c2:82:b8:30:d3:53:94:dc:33:27:0d:7e:09:04:55:
c8:95:e7:d1:00:c8:09:33:d2:b5:35:37:3d:2f:47:e1:3f:b8:
fa:10:08:2a:a5:a4:cd:be:37:cd:f4:b4:15:8d:58:17:c8:11:
fa:d6:4e:ee:25:90:39:3b:d5:f5:ec:b4:c2:01:62:30:f3:77:
2e:71:f6:f8:83:c6:52:d7:f7:0a:1e:db:3f:22:0c:d2:aa:69:
be:05:e1:03:07:0a:57:c6:18:ae:bb:eb:48:24:ec:6c:c6:48:
e7:42:48:da:5f:bf:47:52:71:26:9c:a3:90:a7:b1:98:24:7d:
42:29:9b:67:11:24:e6:2c:ab:22:51:eb:7a:5f:5e:96:fb:3e:
23:13:dd:c5:1d:24:97:ef:47:b1:0b:82:e3:e1:46:01:c9:87:
cb:a4:61:f8:42:d4:a7:e9:14:9a:1b:cb:5e:e0:76:ca:49:1b:
31:b8:67:46:b7:14:c8:66:d2:69:f5:83:da:15:43:71:0b:79:
01:dc:d5:58:d7:e4:b4:fa:f3:75:7d:f0:56:04:b0:e6:ef:12:
16:72:ba:39:52:4d:79:1b:a3:33:42:7d:28:09:5f:1a:4f:62:
7a:95:2a:0f:90:a1:0c:b7:e1:9f:89:f1:b9:1d:47:a1:ff:5c:
69:f3:25:44
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:23 2025 GMT
Not After : May 28 10:27:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:c6:0c:d6:22:f7:fa:1b:14:f4:cc:4f:a7:4f:e6:f9:15:e4:
70:2c:b2:fd:fe:43:cc:8b:e5:5b:e9:85:8c:0b:97:72:f5:fe:
83:73:da:f3:87:ec:6d:cb:8e:71:c9:29:85:a6:4d:dc:7b:93:
f5:aa:d1:d7:25:58:39:18:3d:14:b8:d7:fe:a3:1a:dd:43:de:
85:15:da:63:81:61:79:7a:13:3f:61:12:0c:fc:d6:f9:50:89:
16:44:78:58:7a:45:f1:c6:6f:61:e2:ff:bf:d2:85:19:5b:cf:
29:73:76:8f:14:69:46:cc:eb:18:a3:73:07:eb:f1:78:bc:e4:
d9:d0:dd:e8:40:37:2b:17:5e:91:84:96:86:94:19:01:3d:9b:
eb:03:ea:c4:bd:db:0d:21:77:5a:cd:6d:3a:08:37:3e:0b:53:
a5:37:a6:2c:3c:15:6c:84:77:eb:cb:b9:44:03:cd:0d:8a:45:
6a:71:8a:69:a6:37:c8:b7:1d:76:6b:cd:3a:72:4f:12:00:be:
c9:5b:b5:18:00:3b:62:78:15:89:02:c4:1c:0b:8f:e1:b6:73:
6f:b2:41:61:ec:b9:a0:c8:32:4c:13:9b:50:e3:bd:aa:7f:84:
6c:06:21:72:9f:fc:ce:32:64:bf:a6:e8:99:e6:ae:e5:b2:66:
2f:cc:51:f9
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7958 bytes from beginning
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
3,106,771 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:15 2025 GMT
Not After : Jun 26 10:27:15 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ee:8b:be:b7:72:00:36:e5:6e:c9:d2:7b:c7:dd:
8b:9b:b2:b8:07:4b:3a:78:8b:fa:ec:a2:65:fd:1d:
65:4a:57:f7:81:4f:dc:a5:f0:e2:e0:11:9d:e3:14:
fa:17:e6:ac:28:25:3c:fe:f3:e0:0f:b7:f9:77:23:
55:dc:4f:96:d4:e5:ac:0c:4d:65:86:d6:16:d5:f2:
0e:64:aa:b7:47:c9:c3:44:c3:f0:2a:b5:d8:25:1d:
5f:67:a7:46:da:99:92:85:88:d9:d3:8b:2b:08:d9:
8b:5b:61:66:15:d5:19:a9:4d:de:9c:38:58:a1:c3:
74:d1:65:8d:8d:2d:d7:3e:18:6d:b0:74:51:c9:81:
ed:79:f9:86:64:e0:c8:21:75:b0:06:2b:c7:8b:2c:
fa:d9:72:11:19:72:da:66:aa:fd:b9:03:c4:44:6f:
91:0e:2c:3a:d0:3d:d0:c1:79:26:4e:81:d9:04:b1:
e5:f1:0b:8d:6a:46:08:54:f4:46:63:f0:be:0e:58:
aa:c7:f7:b8:50:dc:08:f3:70:5b:fd:fc:48:34:18:
0a:44:6b:cc:f2:fb:a4:dd:f5:d7:1c:e4:75:d6:1f:
af:cf:5f:37:4c:ce:33:3c:78:cf:9e:3f:d1:fe:b8:
d8:56:bc:c0:17:57:dd:e3:56:31:52:5b:06:b9:e4:
fd:c3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
07:b0:d7:2b:3f:63:ee:85:b7:71:00:1f:89:8d:b0:b7:9d:35:
e6:3a:5d:28:ff:00:8a:65:2d:3f:dc:12:49:4f:8b:28:fd:50:
4f:33:d1:b8:cf:ed:33:a3:ce:dc:de:4c:b2:25:17:45:20:46:
0f:f5:85:22:cb:af:97:94:52:e4:43:bb:c6:0c:a2:e0:3e:5a:
77:90:f5:9e:ed:3b:10:7d:e9:b6:fd:56:69:8f:b1:8a:49:0e:
7a:88:29:35:63:b0:d3:7a:f2:06:2f:94:ae:74:86:3f:57:db:
40:a9:4d:eb:9f:b2:75:c6:3b:42:da:8d:df:1d:56:f0:fe:5d:
c2:37:0b:25:17:46:b0:59:21:8d:22:84:46:61:be:a5:c3:c4:
6a:b4:43:b1:1f:79:fd:a8:7e:2a:f0:ea:b5:fb:89:cb:e5:ab:
4e:8c:b9:a0:89:f3:ec:05:53:45:cc:b9:9b:50:5e:1d:57:a5:
56:00:ad:35:b0:bd:5b:86:72:b6:ae:cb:81:dc:5f:96:6e:2b:
d6:3a:ed:39:14:37:e3:4d:8a:13:1d:77:96:b7:07:34:73:ac:
fc:e8:59:7c:1d:f7:8f:e3:0e:63:f6:ab:4a:94:b0:ca:ba:72:
19:91:b3:87:d6:72:ca:e8:27:25:22:94:f0:ca:86:75:ca:f7:
94:31:7e:6a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:15 2025 GMT
Not After : May 28 10:27:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
37:68:e9:1e:97:e1:f6:04:c8:45:c4:9f:69:ab:ba:22:6a:aa:
14:58:e0:17:34:e8:4b:6c:44:ec:43:69:04:7b:d0:bd:60:24:
5b:cb:00:b5:be:3e:39:9a:16:51:bf:1c:43:ce:3d:72:42:fa:
bf:18:d5:f3:36:24:a8:3d:e0:9d:24:d4:50:68:16:c5:d2:b3:
23:65:c7:b4:89:87:b3:7e:92:bb:a1:c5:a4:5e:cb:c2:2a:15:
64:84:ed:ae:2d:29:d4:ef:96:5f:f9:98:d2:2a:a4:9f:e2:d4:
92:13:2e:96:3e:c2:92:3c:a2:5b:04:51:2c:b1:dc:d1:0d:c0:
be:fe:df:96:e7:af:b6:76:65:0c:6d:5e:77:e9:ba:2d:65:43:
55:ab:7e:60:2f:30:61:63:f9:c3:c7:70:87:75:ad:28:af:f6:
d7:a1:30:b1:b0:f2:49:ee:79:c5:78:1c:a3:39:b4:83:46:b2:
8a:16:37:2b:c3:0e:57:a9:8c:22:c7:4c:78:21:b7:75:d3:f6:
6f:0b:8e:82:a9:b3:85:7a:0d:d3:1b:fe:a3:f7:16:1e:b6:b9:
ee:a6:8e:95:21:8e:2b:30:a3:ad:9b:7e:b4:6b:39:f3:e7:da:
bc:7f:9f:c7:a5:ba:c5:3e:b0:3e:8d:3c:f0:f0:6e:66:ec:da:
46:36:e8:03
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
Truncated 3082 bytes from beginning
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
2,855,462 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:29 2025 GMT
Not After : Jun 26 10:27:29 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:94:46:94:e1:9b:42:af:ca:d1:e6:7c:41:17:39:
d8:8b:b6:2c:eb:b4:0d:58:a6:85:c7:b8:c5:b9:9b:
c6:be:58:c6:e5:3d:a9:a0:33:b6:a8:48:82:b9:da:
18:38:3e:ce:3b:a3:a8:8b:89:62:d1:61:fe:5f:04:
82:5e:b8:ca:aa:14:cd:6e:35:e3:9f:4e:72:07:ae:
a3:4b:5a:09:fa:13:ee:17:69:92:19:c9:e6:9d:12:
25:03:b0:14:15:4e:43:6a:95:c0:0c:c1:e4:d4:89:
3d:f0:66:fc:e2:ab:19:ec:df:57:01:c4:43:a2:4c:
67:26:e4:fd:7b:42:92:f1:7c:b8:5e:9e:ef:54:19:
7b:7f:98:25:f0:52:94:77:ed:f1:7d:a8:32:9b:e0:
41:c1:ed:d3:34:bf:8c:a6:39:cc:58:38:b3:ae:92:
b7:9b:59:76:32:ef:8b:15:e9:35:b0:d1:64:d6:0e:
ec:88:7c:a9:af:26:c9:78:ee:bc:75:3a:5d:75:63:
ab:dc:d0:92:bb:a3:c4:42:36:2e:87:ab:8c:b0:7b:
41:4b:79:b8:fc:87:a5:c7:e6:0d:6e:5d:70:df:88:
6b:33:dd:1e:52:6a:60:ef:44:33:9e:d8:6a:3e:42:
b4:6d:cb:d3:cd:72:13:7d:d9:c2:ec:3f:93:23:12:
c4:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:75:86:90:6e:de:33:db:7d:7c:09:57:f0:34:08:46:10:fa:
8c:8c:37:4a:c1:76:6a:c9:6d:10:ae:12:06:97:c6:5c:f6:cf:
d1:ba:78:47:ae:92:46:4d:6e:32:90:cc:d4:83:cc:6c:be:d2:
ab:93:71:5f:f3:9b:f8:ce:58:be:cb:0b:80:a5:b0:6b:ca:bd:
42:53:9a:d8:4b:7c:2b:b4:3b:61:31:df:0a:27:fb:3a:dd:02:
a3:12:0f:95:86:a4:d6:3f:80:c6:dd:e3:ca:7e:4c:7d:44:06:
a4:ab:30:8a:02:97:36:98:ca:c7:f3:6e:6e:a3:d3:ad:ad:22:
ae:3e:85:c3:58:80:e2:42:f3:93:bd:2f:95:38:e5:e6:2d:ba:
18:34:9e:16:d3:43:f4:ba:31:a4:73:56:2b:03:d8:1f:18:7f:
99:09:4e:b6:27:5c:c1:85:04:c7:4e:f1:21:51:9c:6b:91:cd:
4d:ba:0a:ea:40:0e:bc:e5:4b:b1:47:0a:42:b9:ab:7d:39:9e:
35:ee:8e:72:e5:8a:23:ad:84:5e:5e:21:9e:9e:86:04:3d:a6:
3f:d4:8f:5b:de:09:98:2a:50:0d:af:61:d4:b5:d7:52:b0:c5:
4f:94:fe:a8:da:9a:e7:6b:00:b5:8e:5d:ce:0e:37:a1:54:84:
8f:b0:7e:0c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:29 2025 GMT
Not After : May 28 10:27:29 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
22:d4:17:ee:ef:7a:4b:fd:de:d4:42:11:12:fa:20:ce:97:ee:
89:dc:5f:05:3f:c3:19:8b:f3:b0:b9:67:d0:81:ef:c3:ac:fd:
79:06:74:ba:46:c7:c9:fe:b4:32:5c:5d:fb:aa:e0:d6:6a:2c:
c0:b8:39:71:5d:d7:6e:68:fe:72:d0:b0:a7:42:f9:11:2c:05:
f2:e9:c3:51:c2:cd:ea:25:70:f4:c5:ed:de:5c:e2:cc:64:cb:
1d:35:ec:5c:13:a0:a5:03:b3:4d:a9:36:fb:59:71:ce:6c:7c:
bb:29:bc:2d:41:7d:99:bd:34:7d:90:20:94:b0:c3:a9:2c:73:
48:11:19:a4:8a:50:cc:a8:63:e7:29:3e:43:e7:f5:b0:be:1e:
7c:2d:d1:92:33:a3:05:ee:e8:3f:a4:c5:9f:37:d3:2c:2b:ca:
aa:66:bd:06:20:aa:a6:0c:d3:63:c4:ca:ff:eb:ab:58:5d:e0:
b3:e4:f6:72:80:16:f3:4f:c7:dd:88:9a:cb:d3:bf:eb:52:8e:
50:87:b5:8d:46:19:6d:c2:1d:05:de:cb:87:a3:7e:37:8f:87:
d5:89:fb:df:b1:06:29:39:e6:46:5e:f5:d7:b6:35:33:e0:89:
3f:30:b9:16:b6:65:36:eb:0c:36:d7:32:6b:76:4c:cc:0d:aa:
ab:23:e6:3a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
Truncated 7958 bytes from beginning
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
3,107,974 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:10 2025 GMT
Not After : Jun 26 10:27:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:89:8e:e4:97:b3:f4:bf:a5:30:8d:c6:7d:89:
4f:60:07:10:85:36:b7:02:4e:0e:52:0d:66:72:6a:
10:cf:33:d8:93:d3:c1:f8:c5:59:97:20:51:00:2a:
c5:14:e3:96:af:70:92:a7:8c:88:08:80:fd:b4:71:
e6:9f:f6:1c:1a:fa:6d:fc:31:4e:f4:db:4f:20:46:
6d:ed:ef:ce:af:cf:b5:77:6a:b5:a7:5e:7a:c9:92:
45:c7:6d:87:cb:9d:0f:4e:b7:92:bc:b6:96:c6:a2:
50:ae:fe:48:b9:3e:0c:01:3b:c3:07:28:69:f3:04:
1b:d7:1e:31:b5:45:e7:30:f6:29:7b:f3:ec:fc:13:
ed:21:f9:06:1e:ee:a8:8b:07:53:ee:12:07:e7:4b:
97:c8:c3:c8:56:0a:11:db:a4:40:92:5f:56:32:34:
6c:fb:33:65:f0:fb:9b:81:db:72:e9:ab:c4:66:85:
53:9b:02:c2:68:dd:dc:97:2a:2f:bb:5f:a6:e3:d7:
83:46:fb:b9:b1:60:45:bd:b2:d5:8b:69:16:c3:96:
6c:ea:d4:df:ed:2e:d1:1e:bf:18:e1:05:72:34:bc:
22:3d:52:32:13:e8:bd:c3:c5:6f:be:2f:3d:ee:b3:
63:c1:25:aa:59:2b:6a:e4:3f:b5:85:18:6f:fe:f5:
f6:09
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c3:22:9c:0c:0d:fd:61:b2:3a:26:c1:8f:4e:17:fc:c2:60:30:
7e:bb:d5:52:d8:5f:e0:97:83:a8:3e:d2:72:f8:11:cf:01:fe:
21:7f:b4:f0:bd:fc:0d:9b:24:a7:33:4b:3d:5d:18:40:fa:a9:
27:42:36:c1:f8:36:51:c5:0e:db:81:46:dd:59:45:7b:45:7e:
a2:7b:f1:c4:ee:1a:a0:01:52:ad:f0:72:5f:3c:9b:38:a4:f0:
78:37:f6:ef:05:ca:d5:67:b7:8b:eb:81:18:c4:6d:d1:80:dc:
c1:0d:ed:c1:e4:a0:80:ee:1a:ce:be:1f:e4:4d:af:d2:0d:b6:
d4:38:5d:68:e9:46:14:e9:79:ba:4c:49:b2:83:e4:ea:3a:4c:
bf:40:60:15:50:5f:07:bb:68:a5:12:d9:95:43:dc:c8:81:4d:
37:c3:cd:21:e0:84:24:59:e6:58:a3:a6:96:c5:55:cd:90:f5:
6b:bb:17:7d:4c:90:41:89:53:c4:a8:54:b6:21:d0:b6:a3:a0:
0c:31:3f:43:bf:54:12:1b:7e:1b:54:65:bb:49:22:07:fb:3b:
21:1f:f7:7a:5f:88:3a:63:88:29:58:d6:75:a9:11:31:b6:b5:
86:f4:29:1a:60:67:57:a9:7f:d4:90:7e:86:75:89:30:ae:fd:
36:b0:60:41
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:10 2025 GMT
Not After : May 28 10:27:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0c:55:5b:18:0c:4f:6e:67:af:e0:78:b2:8d:d4:54:13:4d:12:
a8:df:11:ed:63:f3:f1:4d:65:ec:f3:8e:53:a1:31:a0:5a:99:
e5:41:59:1e:07:da:e6:7d:a8:1e:f0:45:c0:82:71:a3:83:f4:
a0:c6:50:80:bc:d2:dd:c5:5d:1f:bf:a5:34:5f:0e:49:a9:a3:
9a:b9:d1:34:2e:6b:ec:b7:cd:e3:71:45:8c:be:e4:ee:67:b5:
b9:5b:8d:ef:12:d6:b1:00:7a:34:91:3d:df:6d:d6:55:3a:ee:
9f:0a:d8:ba:2e:ba:b3:f8:25:a9:81:e5:bd:a3:9c:72:d0:1d:
a7:59:09:6b:4b:8c:dc:70:9c:8b:2b:d3:5b:88:fe:7d:8f:9e:
33:72:69:b9:5f:c0:4c:8c:a9:0c:57:3e:31:44:60:39:3f:39:
e2:2e:35:47:af:05:a3:c0:c0:bd:cd:d7:f4:6d:f6:8e:95:e2:
6f:2d:6d:8b:21:12:75:4d:34:ec:9d:01:06:8c:3a:fa:43:40:
9c:f5:2d:9e:ea:d0:cc:c3:b6:63:df:07:ad:62:23:d2:6a:81:
5e:5a:aa:27:ef:e7:e5:ed:5a:7b:2f:e1:74:53:78:10:c9:77:
bb:d0:af:15:a6:ea:47:b0:e0:1c:16:d5:15:74:13:50:55:52:
db:b4:46:8b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 3082 bytes from beginning
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
2,856,409 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:11 2025 GMT
Not After : Jun 26 10:27:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b6:8c:2f:5b:88:bf:2b:76:5b:82:e2:26:f7:8e:
3c:9f:79:97:e3:8b:e0:04:29:20:ec:a5:d3:db:c5:
82:26:39:74:d8:ad:4a:49:0c:87:5f:b8:b0:9d:72:
6d:ea:37:5c:24:9e:4f:7d:ea:b8:70:e4:51:6c:cd:
e2:73:1d:2c:01:e9:77:60:61:d5:30:ca:da:ab:dd:
7b:2c:2d:1f:2f:32:d7:8d:c2:41:6d:bf:d0:a9:bc:
6e:52:f4:96:99:f5:f7:92:57:a3:6c:6f:51:43:ae:
87:36:26:8b:d7:0f:fc:fb:f1:80:0d:71:8c:2d:98:
ef:bc:36:9e:f4:0c:ab:25:2b:56:d8:84:95:0b:3b:
a0:7b:7e:44:e1:a1:a2:36:81:2b:2f:47:59:f8:f5:
b3:59:da:2a:84:98:64:da:7f:56:35:1a:fe:41:65:
d5:24:27:18:fc:16:e4:aa:19:ff:b0:da:10:e8:39:
03:1f:7a:0e:3a:9d:c0:f7:42:cd:63:e3:3b:30:b5:
ae:30:2a:20:98:5d:20:02:cc:4a:4b:9d:d5:87:8b:
92:aa:68:a2:5d:e9:cc:6d:15:f4:5f:6b:52:6d:b8:
61:43:c8:cc:bb:65:44:c1:dd:d7:7f:a8:b0:02:cf:
98:66:9c:7d:e0:36:db:33:c8:b2:e6:8a:1a:f0:53:
d7:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:de:6e:7f:a8:f9:0e:eb:ff:88:a6:7a:fd:9d:9b:59:fb:01:
e5:95:fd:40:b0:10:4a:0c:7e:70:ba:4a:1f:72:e0:76:2e:50:
e7:47:97:ce:d5:f0:2c:5b:25:09:b3:fb:63:1c:a6:2b:9d:ec:
10:84:16:08:27:b3:c6:39:49:31:da:d6:e5:ee:bd:35:14:bd:
2f:23:b4:f4:e7:52:59:09:81:b8:5e:98:98:de:e0:36:c1:01:
04:ab:0f:a5:cf:e4:af:e3:1a:0a:d4:b2:d3:25:e0:e0:69:7a:
bc:cf:27:d9:32:57:2b:27:33:a1:bb:61:e1:df:3d:07:85:60:
17:c6:1a:68:38:a5:a1:5b:0e:b6:2d:c3:c7:3f:3e:51:bc:64:
7a:bf:c4:0d:10:81:fe:f4:e2:5e:56:9a:3c:b5:6b:4b:d8:92:
04:ec:f1:bf:c2:42:fb:95:b8:3d:e8:2f:bf:1f:31:c8:18:f9:
c9:1f:28:8f:71:56:10:dd:a3:46:95:79:d0:e9:da:29:07:39:
0f:3e:e5:12:7d:92:6a:9d:f8:85:dd:b2:cb:a6:70:8d:4f:af:
3c:1e:bc:16:63:91:20:2c:e9:ca:9f:0e:b4:59:2f:42:c3:2e:
22:2f:88:97:a5:cd:35:5b:06:a6:a2:a0:96:80:89:2d:ce:f8:
cc:8c:01:08
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:11 2025 GMT
Not After : May 28 10:27:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
79:6f:ba:ac:21:5d:92:97:f3:11:52:6c:2b:87:20:09:4b:b4:
a4:1e:4e:65:05:f8:34:db:85:92:72:b4:d9:fb:a9:8e:0f:29:
73:01:37:8d:61:f8:1d:3b:8f:6b:85:20:5b:70:e9:7b:d3:8e:
6d:8e:2f:d6:6d:75:ca:b0:c0:68:c3:11:d8:c4:19:ca:9d:2b:
32:c5:32:19:f0:b9:2a:33:f9:2e:d3:38:72:24:70:b4:08:37:
7f:69:3c:9a:1f:f3:8c:f7:94:96:6a:56:ed:ac:c8:99:e8:8c:
2e:1a:a4:ca:7e:2e:2a:9a:26:aa:16:bb:a4:95:2e:65:b0:98:
99:d1:3e:fa:f1:07:18:f9:9d:f2:60:f9:be:f9:fd:1e:47:30:
ac:8b:4b:42:68:24:ec:74:37:9a:89:1f:5e:c6:58:47:76:f0:
f9:8f:ee:0c:6a:3e:75:8f:e7:ed:6a:a3:6b:79:71:44:1c:87:
23:03:30:8f:24:88:e6:5c:3c:3d:0d:80:95:03:a3:6d:3d:14:
f4:3c:1c:70:7c:31:03:63:34:cd:41:40:be:6c:c2:03:81:f9:
34:84:e0:12:7a:f3:8b:d9:c3:41:1c:4a:82:4c:df:55:5c:12:
3e:65:9d:04:a9:87:13:ea:22:97:9e:b7:b1:92:30:ac:c2:be:
69:91:be:c4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
Truncated 7958 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,107,283 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:23 2025 GMT
Not After : Jun 26 10:27:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a5:87:48:26:fe:2d:73:6d:08:91:c0:c3:b3:ab:
a5:08:c7:8c:ce:eb:dc:53:cc:ee:01:4e:bf:08:ba:
45:37:22:5c:c5:e2:2b:e0:01:79:9b:0b:7c:57:85:
9b:44:8a:9c:b2:02:91:e1:9a:4b:1c:19:22:7e:b7:
61:b7:d5:01:7b:e8:3c:19:89:c7:14:fc:5b:4b:01:
a3:fc:a5:47:a9:c7:6d:a0:b7:64:67:8b:2d:04:8b:
07:c2:81:c4:8a:5d:72:ad:b2:58:83:4b:c9:2d:52:
ff:65:90:97:80:d4:1f:1c:8d:79:81:3f:75:d0:5a:
5d:04:c9:ca:e5:de:3d:9d:eb:f3:4e:da:93:c0:0c:
bc:b0:8c:dd:79:84:d7:ec:c2:0d:f5:0a:99:cd:53:
3a:c0:2a:1e:4e:33:be:4e:0c:93:2c:0c:b4:ac:92:
34:1c:cb:3d:dc:02:fc:93:4e:73:98:1a:09:58:05:
a5:4d:4f:83:e6:9f:b0:95:6b:f7:c5:7e:8b:77:d0:
0b:99:41:6e:0f:94:a9:10:69:f1:c7:b7:a4:68:ba:
fe:94:55:bc:07:82:c2:ea:3c:47:36:53:ad:0d:8c:
4b:fb:5b:f7:c6:a7:17:1b:ad:01:6c:51:b2:e8:2d:
d2:cc:87:18:82:ef:4e:15:0b:40:da:17:43:75:b8:
67:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
59:7c:c2:fc:5e:93:f2:c1:fd:5e:26:71:c5:2a:d1:0d:f3:f3:
e1:9f:8b:20:17:64:82:7a:f2:ba:3f:60:1e:cb:90:f2:5b:eb:
6d:9b:15:83:09:55:07:da:50:c6:c8:1f:48:57:ee:e1:81:10:
0e:bd:8b:72:3f:74:76:3a:09:f8:85:0a:0e:f7:70:59:61:3b:
24:a1:f4:80:fb:23:07:a9:25:36:37:53:29:a7:57:a5:bc:84:
89:34:63:f1:72:4c:3c:2e:6b:2f:4b:5a:78:1f:58:d6:29:d0:
a3:40:9a:28:d7:87:8a:20:8b:54:39:65:95:43:c4:f7:b8:9f:
fc:ec:92:ac:eb:52:93:f3:20:ea:8b:64:72:ce:16:97:2c:3c:
92:64:7a:84:89:31:a8:2b:46:2a:d3:b4:54:84:66:92:64:74:
5d:de:cc:50:6c:8e:46:e5:63:6a:d1:ec:d3:2d:2a:dd:5e:e8:
73:bc:79:c5:52:03:89:56:6d:36:0e:21:23:7f:bd:e8:70:54:
79:af:8d:b7:bb:bc:a1:2c:2e:cf:da:93:a0:0b:a2:0a:90:60:
24:f0:8c:f6:a6:50:32:45:c4:58:c7:34:27:65:89:d7:93:9d:
5e:e6:8f:dd:64:c6:e4:b1:67:73:2d:11:aa:33:f2:b3:c4:09:
d4:ab:96:fa
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:24 2025 GMT
Not After : May 28 10:27:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7b:ce:3a:22:70:02:b9:06:00:4d:0d:d8:02:29:46:2f:db:20:
70:d7:92:89:cf:84:ea:0b:1d:ff:4a:8c:2f:cd:46:bf:a1:0c:
ae:b5:d9:88:91:aa:98:d7:72:f9:3e:53:eb:50:7a:ee:82:96:
bb:13:36:ec:82:80:89:53:e7:d3:da:ff:73:7b:e8:0a:b7:6c:
d3:aa:34:0b:53:d3:a3:fd:f0:c3:85:3d:db:09:09:74:93:00:
4a:84:ac:2c:af:26:fe:43:c8:4b:c3:12:0c:98:cc:8b:68:9b:
5d:e9:66:a3:bd:61:bc:ac:68:de:52:8d:7d:aa:98:c1:9d:dc:
2d:93:13:d4:a8:13:f1:21:bf:c5:60:61:aa:14:c7:13:02:fb:
66:72:fb:99:db:08:61:a8:88:d7:f7:27:63:f1:c6:b0:df:9b:
cd:3f:07:51:3c:f7:94:4f:ff:82:54:0e:ff:25:b0:c8:e6:30:
b3:23:32:91:ba:fe:ff:91:99:d4:a3:f9:79:52:01:a1:aa:00:
d7:86:a4:7b:62:ce:c7:1f:e0:70:d3:f6:63:09:f6:47:50:09:
b3:db:df:25:5a:30:87:a1:49:da:b0:63:59:3e:c4:30:1f:57:
0a:d1:d7:6e:9e:f2:c0:1e:73:6a:1c:8c:93:2d:41:f0:8e:a3:
12:71:71:37
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,855,614 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:19 2025 GMT
Not After : Jun 26 10:27:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:ab:b1:d1:48:5d:d8:96:b2:16:05:04:ad:6a:
4f:87:98:9e:e2:47:9f:ad:8a:9b:8d:1e:db:e1:8c:
07:1a:09:7f:fa:06:01:4e:69:8a:01:c7:73:fb:31:
97:d3:dc:7b:3f:4f:a3:fe:90:63:cd:62:e1:c6:70:
bb:2e:26:d7:3f:ae:43:c5:19:4e:d1:7e:3b:9a:24:
9f:d3:db:0b:63:32:40:f0:53:c5:67:28:d9:b6:c3:
61:13:e8:25:9d:72:41:98:e6:92:ec:b0:9f:b0:8f:
50:84:cf:89:33:52:18:bd:97:81:00:89:70:8a:d9:
7a:5b:b9:91:b4:c3:e0:25:cc:43:da:c3:c0:8f:b1:
24:26:06:4f:40:f2:a6:56:28:df:c6:5b:81:c6:60:
0f:67:ef:ca:6c:39:60:e7:0f:91:ba:df:5a:67:ae:
34:5f:9a:ab:75:d5:f0:d8:b5:c0:1a:89:cb:a8:de:
74:95:3a:68:f4:e8:0c:de:f8:f9:82:09:c4:e4:d8:
7a:4e:e5:78:99:9b:84:b6:49:e1:c2:63:89:b9:30:
47:e4:23:e6:da:9b:1e:6a:20:4c:32:2a:19:fe:39:
45:3b:f8:9d:a0:9a:af:66:a9:64:e6:8d:b0:9a:e2:
ea:16:cb:9d:ac:09:6d:0b:ca:e6:9e:68:75:0a:25:
ac:21
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
50:5c:b4:2f:33:a7:26:fe:df:d0:db:67:a2:47:94:12:d2:67:
0b:50:76:c4:0d:f2:ea:56:04:99:29:84:b8:d9:5d:f3:e1:5d:
35:38:ec:f1:74:38:50:01:da:15:81:3c:32:f7:7b:c3:37:f6:
94:2d:ee:61:5a:7e:19:ad:70:3a:68:46:79:9d:c8:c2:89:02:
89:7b:c6:f2:69:f6:ed:d4:5c:6a:32:01:77:31:91:6d:82:a7:
9b:18:d9:05:53:62:d8:bb:85:b4:84:60:44:37:83:53:2d:bd:
df:bb:2f:f6:a7:8e:3b:93:e6:83:41:40:9f:26:23:95:15:51:
6c:68:ef:f1:09:c4:15:ba:79:6f:83:fb:95:f9:30:41:74:f9:
35:09:89:e0:3f:40:29:1f:02:4b:30:75:67:b4:52:dd:91:1a:
b4:d5:23:0c:1a:c1:fc:5d:f5:82:98:2e:68:c3:4c:a6:ce:22:
0c:90:d8:bb:ab:fc:a6:c7:bc:bc:8c:2b:13:67:f0:b3:e6:36:
82:23:84:d0:7a:11:af:5a:a3:2e:8f:5a:cb:13:1b:7b:25:b4:
35:db:dc:e2:88:2d:a8:74:04:56:62:65:df:5d:a6:ae:8c:58:
12:5b:a4:cc:35:7e:3a:cd:5b:58:ad:8a:b6:91:41:a7:ff:04:
8b:8c:1a:73
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:19 2025 GMT
Not After : May 28 10:27:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:00:dc:72:0e:ff:0e:fe:9f:4b:12:ee:d4:7e:1b:ab:2e:ac:
3d:3d:d3:f3:a0:4e:81:8e:39:a3:e9:2e:df:95:c1:85:f9:a8:
ac:b6:4a:43:2e:a8:75:4d:62:a2:0b:ac:2f:14:f0:f4:51:a1:
2c:73:5d:c1:60:1b:58:f2:48:64:8e:43:38:0a:e0:45:fb:65:
a6:c0:79:66:6b:51:a6:fc:69:2b:93:9c:11:a9:50:df:bd:ee:
97:72:7c:4d:ed:c8:d1:30:70:36:1b:69:50:2d:44:73:0e:10:
a3:5f:bb:48:f1:5b:bc:d7:f6:d9:91:c2:f8:e6:e5:6a:4c:ba:
d6:62:48:91:26:84:08:e3:5a:54:5b:b2:14:c5:0f:d2:a5:35:
a4:c6:0d:50:b1:86:d0:09:28:da:3d:69:3a:fe:79:2b:98:94:
2d:ae:34:cf:46:86:18:01:d3:ac:e3:60:67:de:ab:c8:6a:30:
64:82:60:66:62:41:70:9c:ca:91:6d:cd:7f:29:57:33:5f:5f:
05:c6:a1:f2:9c:84:ac:9c:b9:da:85:22:1c:1e:64:04:e6:e0:
86:d9:6d:f8:4d:eb:85:79:23:1e:b1:4d:37:d3:0a:cb:a3:72:
6f:db:6f:45:a9:d8:c1:f4:80:83:2f:d1:76:ce:56:8a:4d:d8:
20:45:96:9c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
Truncated 7958 bytes from beginning
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
3,104,718 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:19 2025 GMT
Not After : Jun 26 10:27:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:a3:11:14:e2:db:51:7a:12:4c:96:e3:86:f1:
d8:51:43:07:60:87:3e:ae:33:3a:de:26:30:88:30:
3e:63:f5:3a:61:ee:31:f8:b0:db:db:09:b6:6c:07:
e0:68:d7:49:0b:2b:8a:c6:a9:16:ed:af:0a:f0:2c:
95:66:a3:04:22:2a:7e:55:94:27:15:6f:c8:a6:c1:
44:62:db:5e:f2:de:05:8b:7a:0a:85:e9:38:48:50:
ec:05:b3:b9:e8:69:e0:46:f5:d3:a8:42:b6:9c:83:
4f:7d:c7:6b:72:87:18:84:98:9e:04:fd:aa:e0:56:
74:de:e4:3c:5c:fc:2c:44:ed:3b:26:9e:56:ed:27:
62:89:6a:6d:e1:d6:34:ea:98:22:ad:13:e5:a3:86:
75:8f:61:d6:49:f8:99:6c:33:a5:52:54:d2:76:ef:
93:1a:1c:c3:7e:1d:03:5e:e2:13:a0:c6:6e:55:cd:
71:29:1c:bb:f2:77:32:78:89:63:b8:3f:d8:96:2d:
52:b1:ce:66:81:86:48:89:76:be:49:f5:ee:8c:36:
97:7d:50:d6:41:66:41:28:d5:87:fa:7c:22:70:1a:
75:c1:ea:e4:4f:a8:38:dc:89:39:c6:bc:62:b9:32:
8e:39:c7:9a:b8:b0:c8:52:b3:71:4b:c7:66:9f:67:
a6:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
66:ee:4d:5f:a6:58:ee:e5:de:78:8e:9c:02:16:e1:a8:c1:07:
9a:6c:18:b5:b5:c5:80:21:c6:fe:aa:f1:62:2a:9f:f4:0f:aa:
84:98:c5:1d:08:f7:f0:05:f3:d0:93:a2:a9:d5:04:c2:3a:4a:
3b:a6:2b:d2:83:87:17:d6:de:fc:94:d3:6e:86:71:89:c3:36:
4f:ca:0f:37:9f:d8:26:d9:f5:dc:17:b9:6c:74:9c:5f:ed:d0:
12:f8:15:4f:1f:1f:53:3a:fa:a7:18:b2:6d:dc:0f:be:64:8f:
eb:66:a2:95:41:8b:d1:eb:4b:ae:d6:28:b7:69:f7:62:62:35:
25:25:62:2e:d9:54:57:20:ee:0a:6a:c0:95:a3:73:e5:b4:e5:
9a:4f:94:56:ef:eb:a7:83:8e:25:3e:88:b4:01:00:0b:de:94:
b6:06:81:93:01:5a:c4:8a:4b:d6:d1:37:27:4f:79:d1:23:03:
bb:81:b5:90:70:2e:7b:9a:d2:34:93:1a:4e:92:d5:ad:89:dd:
b5:ff:8e:e3:11:ab:10:81:b2:11:06:bc:75:a3:8d:1f:ae:d1:
46:41:9b:a8:78:c2:4e:4d:8c:4e:33:de:f7:92:3c:1d:9c:8a:
ac:58:50:3e:ad:62:25:69:ee:cc:d1:9e:eb:49:80:06:7f:63:
8a:5d:cb:c3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:19 2025 GMT
Not After : May 28 10:27:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:a4:06:5c:7e:ab:11:89:eb:92:09:51:83:9a:44:03:3a:46:
ed:60:ce:8c:b3:f2:b4:fa:2d:32:83:40:a5:22:a6:2d:85:b1:
27:65:6f:2e:76:02:1f:56:4b:fe:6d:da:61:5f:57:94:ab:49:
3b:a3:21:b5:d3:11:88:c2:73:3f:46:92:3d:02:9c:c8:86:23:
18:5e:dc:1a:ef:b2:71:d3:55:bc:30:4c:82:ad:e4:af:9d:e5:
e3:fa:b3:b2:2d:36:bd:52:a7:c8:e3:77:1c:35:b4:0e:a5:f6:
a5:b9:69:be:a8:4a:40:93:6e:5b:fc:2b:48:1c:86:9b:91:cc:
4a:c3:13:24:dc:ca:0f:2f:d2:1b:33:ad:bf:55:cb:54:2d:f2:
cf:1a:fa:7a:a2:c0:e1:56:17:08:c6:51:59:e7:b4:38:67:e5:
97:bb:9b:69:a5:27:a8:ee:bd:cb:21:15:57:e1:43:3e:bb:0c:
2c:5d:86:bf:4c:22:16:52:ce:00:49:71:9f:d0:a2:d8:e5:cb:
b2:38:b7:66:f7:fe:16:4e:65:0d:09:f2:ff:b9:df:ae:11:07:
a1:b0:d6:15:d6:f2:8d:f5:b0:ff:61:40:dc:08:28:06:16:22:
a8:ea:76:ed:05:f3:d2:78:61:fb:b6:81:0c:8f:66:f0:8f:c4:
c1:24:26:a3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 3082 bytes from beginning
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
2,855,079 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : Jun 26 10:27:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a5:b4:9c:a1:bd:24:53:2b:fb:a7:ef:34:4d:80:
25:cb:73:fe:4b:3b:51:ae:48:e0:06:d2:bc:41:da:
ba:1a:5e:71:5e:1e:1a:c7:66:d4:24:0e:6b:f8:94:
ae:43:3f:16:7f:33:c6:56:d9:c9:dc:3e:2a:29:08:
17:28:c0:6e:4b:38:d8:68:a4:5a:95:8e:d3:bb:35:
92:31:3d:ac:9f:a4:a1:3d:f0:6f:0e:e8:e0:9c:48:
b3:ff:1e:dc:a4:e3:18:7d:7c:06:9b:9f:98:1d:2e:
8d:52:8e:49:50:d6:17:7f:f2:f6:4c:65:79:2e:40:
fb:d2:47:81:70:f8:41:8d:25:6e:ff:3c:36:0b:ea:
6c:f3:f4:2c:c2:a8:60:1b:a4:7d:41:91:6f:0d:b5:
46:08:b4:e5:ff:9a:16:8a:57:02:56:10:b9:29:b7:
48:40:f1:64:52:5d:6f:4d:44:0c:d8:12:41:3d:cf:
3b:4f:56:5e:05:93:55:d8:e2:a8:e9:91:4c:ed:43:
dc:91:51:6b:3b:6d:cd:c8:62:47:34:9d:f3:5f:95:
9f:63:05:cb:1e:f4:d8:5e:b8:2f:8c:34:97:1d:b6:
37:dc:3b:3f:b4:95:01:56:f0:a4:bb:cc:dc:4c:f3:
d0:b4:8c:8d:c0:39:2d:5c:05:d8:f2:d0:6f:c0:6a:
d6:85
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:d5:88:2a:65:7e:ec:49:04:ad:e9:6a:0b:11:2b:e4:8e:87:
5e:91:74:c0:94:94:30:7d:2a:7b:0c:0c:dc:68:0c:26:30:88:
5c:fc:9b:96:0d:b6:41:b8:93:5a:c2:4b:58:21:d0:83:8b:fe:
5a:a3:12:a8:a0:a3:8a:22:fa:be:66:d4:f0:84:b4:01:3f:44:
39:84:9f:00:6b:2b:26:67:49:16:90:97:c2:44:63:0f:aa:e8:
e0:42:91:89:c4:05:60:5c:11:44:43:85:db:37:0c:6f:fc:ef:
36:af:c9:57:f7:da:91:71:d3:a9:29:94:72:4d:fe:dc:32:8d:
7d:37:a5:c9:35:4c:be:22:74:52:5d:e0:67:d7:9c:af:98:29:
6a:17:8e:02:08:93:22:fa:80:f0:67:74:19:23:0a:55:96:7c:
37:f8:73:41:20:2b:eb:ae:4d:4e:c3:d4:da:22:60:78:20:76:
a9:31:8b:bc:3a:0d:e2:0b:92:d4:b4:66:4c:1a:37:94:0f:2f:
89:2c:30:1a:90:cc:2f:96:18:aa:0d:e1:bc:ba:5b:79:37:8c:
1f:09:ec:16:7b:86:a6:c8:4c:6a:bf:e5:df:25:ad:fd:f6:1d:
53:0b:c9:1b:06:49:94:62:d5:06:0c:47:53:49:bc:fc:9b:e4:
15:42:fa:a3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 27 10:27:22 2025 GMT
Not After : May 28 10:27:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5c:f7:c0:38:da:fd:a1:b9:7d:62:48:62:64:d2:db:8d:a6:86:
7c:8f:d7:ea:cc:31:41:b1:8a:44:4a:f1:88:64:14:ce:c2:cd:
30:d9:10:76:a1:e8:ea:da:c2:6d:78:46:07:c8:47:f1:f7:b1:
aa:b6:45:fb:cf:dd:dd:88:3a:e7:85:10:07:db:c2:0c:93:53:
ff:7f:03:74:3e:c2:0f:76:48:ff:17:81:99:5a:78:14:49:2f:
23:9d:db:95:f6:be:04:8d:6b:4c:dd:aa:ee:ee:6f:4a:80:46:
41:2c:03:25:0a:e6:cd:27:50:27:cd:c3:5c:0d:00:2d:73:2c:
d8:59:82:78:2c:34:c2:60:f7:38:9e:f4:58:3d:fc:1c:bf:11:
e7:f2:42:d2:1f:4d:90:2d:0b:42:ce:1f:e2:b1:f4:f5:d7:49:
6a:21:3d:46:6d:3c:fb:da:ea:2d:4f:bd:bf:cc:58:5c:94:7b:
bf:36:42:33:12:5d:a4:b6:dd:e3:dc:c0:12:91:3a:f6:95:13:
ee:6c:d3:b8:10:9e:60:c7:08:96:3f:44:5f:b6:e1:a2:e7:64:
a0:dd:10:c0:fd:0b:f6:29:88:fa:b6:63:3c:19:ae:4a:05:2e:
c7:30:0d:c2:64:48:67:b3:4a:93:4a:27:37:c2:4e:ee:78:35:
ef:52:42:d6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,182,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,207,189 UART: [idev] CSR upload begun
1,208,968 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,947 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,655 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,540 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,256 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,721 UART: [idev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
1,297,511 UART: [idev] CSR uploaded
1,300,556 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,725 UART: [idev] --
1,301,720 UART: [ldev] ++
1,301,888 UART: [ldev] CDI.KEYID = 6
1,302,252 UART: [ldev] SUBJECT.KEYID = 5
1,302,679 UART: [ldev] AUTHORITY.KEYID = 7
1,303,142 UART: [ldev] FE.KEYID = 1
1,308,462 UART: [ldev] Erasing FE.KEYID = 1
1,334,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,674 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,398 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,475 UART: [ldev] --
1,373,931 UART: [fwproc] Wait for Commands...
1,374,568 UART: [fwproc] Recv command 0x46574c44
1,375,301 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,606 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,595 >>> mbox cmd response: success
2,766,595 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,698 UART: [afmc] ++
2,767,866 UART: [afmc] CDI.KEYID = 6
2,768,229 UART: [afmc] SUBJECT.KEYID = 7
2,768,655 UART: [afmc] AUTHORITY.KEYID = 5
2,803,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,290 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,010 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,832,903 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,608 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,373 UART: [afmc] --
2,847,475 UART: [cold-reset] --
2,848,405 UART: [state] Locking Datavault
2,849,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,196 UART: [state] Locking ICCM
2,850,644 UART: [exit] Launching FMC @ 0x40000000
2,855,941 UART:
2,855,957 UART: Running Caliptra FMC ...
2,856,365 UART:
2,856,503 UART: [fmc] Received command: 0x10000001
2,857,596 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,456 UART: [fmc] LDEVID cert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
2,967,433 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,024 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,105,559 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,462 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,542,058 >>> mbox cmd response: success
2,542,058 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,777 UART:
2,603,793 UART: Running Caliptra FMC ...
2,604,201 UART:
2,604,339 UART: [fmc] Received command: 0x10000001
2,605,432 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,624,292 UART: [fmc] LDEVID cert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
2,715,269 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,860 UART: [fmc] FMCALIAS cert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
2,853,395 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,746 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] CSR upload begun
1,209,929 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,638 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,346 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,231 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,947 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,412 UART: [idev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
1,298,202 UART: [idev] CSR uploaded
1,301,247 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,301,416 UART: [idev] --
1,302,469 UART: [ldev] ++
1,302,637 UART: [ldev] CDI.KEYID = 6
1,303,001 UART: [ldev] SUBJECT.KEYID = 5
1,303,428 UART: [ldev] AUTHORITY.KEYID = 7
1,303,891 UART: [ldev] FE.KEYID = 1
1,309,255 UART: [ldev] Erasing FE.KEYID = 1
1,335,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,107 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,831 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,686 UART: [ldev] --
1,375,060 UART: [fwproc] Wait for Commands...
1,375,687 UART: [fwproc] Recv command 0x46574c44
1,376,420 UART: [fwproc] Recv'd Img size: 106848 bytes
2,587,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,961 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,633,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,768,928 >>> mbox cmd response: success
2,768,928 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,145 UART: [afmc] ++
2,770,313 UART: [afmc] CDI.KEYID = 6
2,770,676 UART: [afmc] SUBJECT.KEYID = 7
2,771,102 UART: [afmc] AUTHORITY.KEYID = 5
2,807,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,007 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,830,727 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,836,620 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,842,325 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,850,086 UART: [afmc] --
2,851,076 UART: [cold-reset] --
2,851,982 UART: [state] Locking Datavault
2,852,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,581 UART: [state] Locking ICCM
2,854,039 UART: [exit] Launching FMC @ 0x40000000
2,859,336 UART:
2,859,352 UART: Running Caliptra FMC ...
2,859,760 UART:
2,859,898 UART: [fmc] Received command: 0x10000001
2,860,991 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,879,851 UART: [fmc] LDEVID cert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
2,970,828 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,990,419 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,108,954 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,637 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,419 >>> mbox cmd response: success
2,544,419 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,882 UART:
2,605,898 UART: Running Caliptra FMC ...
2,606,306 UART:
2,606,444 UART: [fmc] Received command: 0x10000001
2,607,537 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,397 UART: [fmc] LDEVID cert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
2,717,374 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,965 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,855,500 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,381 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] CSR upload begun
1,209,478 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,007 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,715 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,600 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,316 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,781 UART: [idev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
1,297,571 UART: [idev] CSR uploaded
1,300,616 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,785 UART: [idev] --
1,301,902 UART: [ldev] ++
1,302,070 UART: [ldev] CDI.KEYID = 6
1,302,434 UART: [ldev] SUBJECT.KEYID = 5
1,302,861 UART: [ldev] AUTHORITY.KEYID = 7
1,303,324 UART: [ldev] FE.KEYID = 1
1,308,470 UART: [ldev] Erasing FE.KEYID = 1
1,335,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,110 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,834 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,923 UART: [ldev] --
1,374,235 UART: [fwproc] Wait for Commands...
1,375,012 UART: [fwproc] Recv command 0x46574c44
1,375,745 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,642 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,437 >>> mbox cmd response: success
2,767,437 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,650 UART: [afmc] ++
2,768,818 UART: [afmc] CDI.KEYID = 6
2,769,181 UART: [afmc] SUBJECT.KEYID = 7
2,769,607 UART: [afmc] AUTHORITY.KEYID = 5
2,804,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,912 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,632 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,525 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,230 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,089 UART: [afmc] --
2,848,087 UART: [cold-reset] --
2,848,915 UART: [state] Locking Datavault
2,849,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,546 UART: [state] Locking ICCM
2,850,976 UART: [exit] Launching FMC @ 0x40000000
2,856,273 UART:
2,856,289 UART: Running Caliptra FMC ...
2,856,697 UART:
2,856,835 UART: [fmc] Received command: 0x10000001
2,857,928 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,788 UART: [fmc] LDEVID cert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
2,967,765 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,356 UART: [fmc] FMCALIAS cert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
3,105,891 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,304 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,144 >>> mbox cmd response: success
2,544,144 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,073 UART:
2,606,089 UART: Running Caliptra FMC ...
2,606,497 UART:
2,606,635 UART: [fmc] Received command: 0x10000001
2,607,728 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,588 UART: [fmc] LDEVID cert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
2,717,565 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,156 UART: [fmc] FMCALIAS cert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
2,855,691 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,357 UART: [kat] LMS
1,169,669 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] CSR upload begun
1,209,687 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,150 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,858 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,743 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,459 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,924 UART: [idev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
1,297,714 UART: [idev] CSR uploaded
1,300,759 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,928 UART: [idev] --
1,301,869 UART: [ldev] ++
1,302,037 UART: [ldev] CDI.KEYID = 6
1,302,401 UART: [ldev] SUBJECT.KEYID = 5
1,302,828 UART: [ldev] AUTHORITY.KEYID = 7
1,303,291 UART: [ldev] FE.KEYID = 1
1,308,605 UART: [ldev] Erasing FE.KEYID = 1
1,334,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,271 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,995 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,888 UART: [ldev] --
1,373,308 UART: [fwproc] Wait for Commands...
1,374,105 UART: [fwproc] Recv command 0x46574c44
1,374,838 UART: [fwproc] Recv'd Img size: 106848 bytes
2,585,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,083 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,960 >>> mbox cmd response: success
2,765,960 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,089 UART: [afmc] ++
2,767,257 UART: [afmc] CDI.KEYID = 6
2,767,620 UART: [afmc] SUBJECT.KEYID = 7
2,768,046 UART: [afmc] AUTHORITY.KEYID = 5
2,802,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,107 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,825,827 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,831,720 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,837,425 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,845,192 UART: [afmc] --
2,846,194 UART: [cold-reset] --
2,847,124 UART: [state] Locking Datavault
2,848,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,919 UART: [state] Locking ICCM
2,849,367 UART: [exit] Launching FMC @ 0x40000000
2,854,664 UART:
2,854,680 UART: Running Caliptra FMC ...
2,855,088 UART:
2,855,226 UART: [fmc] Received command: 0x10000001
2,856,319 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,179 UART: [fmc] LDEVID cert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
2,966,156 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,985,747 UART: [fmc] FMCALIAS cert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
3,104,282 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,467 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,705 >>> mbox cmd response: success
2,544,705 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,607,600 UART:
2,607,616 UART: Running Caliptra FMC ...
2,608,024 UART:
2,608,162 UART: [fmc] Received command: 0x10000001
2,609,255 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,628,115 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,719,092 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,683 UART: [fmc] FMCALIAS cert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
2,857,218 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] CSR upload begun
1,209,084 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,449 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,157 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,042 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,758 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,223 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,013 UART: [idev] CSR uploaded
1,300,058 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,227 UART: [idev] --
1,301,308 UART: [ldev] ++
1,301,476 UART: [ldev] CDI.KEYID = 6
1,301,840 UART: [ldev] SUBJECT.KEYID = 5
1,302,267 UART: [ldev] AUTHORITY.KEYID = 7
1,302,730 UART: [ldev] FE.KEYID = 1
1,307,894 UART: [ldev] Erasing FE.KEYID = 1
1,333,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,804 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,528 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,669 UART: [ldev] --
1,372,957 UART: [fwproc] Wait for Commands...
1,373,644 UART: [fwproc] Recv command 0x46574c44
1,374,377 UART: [fwproc] Recv'd Img size: 106848 bytes
2,585,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,968 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,935 >>> mbox cmd response: success
2,765,935 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,100 UART: [afmc] ++
2,767,268 UART: [afmc] CDI.KEYID = 6
2,767,631 UART: [afmc] SUBJECT.KEYID = 7
2,768,057 UART: [afmc] AUTHORITY.KEYID = 5
2,803,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,812 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,826,532 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,832,425 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,130 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,023 UART: [afmc] --
2,847,063 UART: [cold-reset] --
2,847,827 UART: [state] Locking Datavault
2,848,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,480 UART: [state] Locking ICCM
2,850,096 UART: [exit] Launching FMC @ 0x40000000
2,855,393 UART:
2,855,409 UART: Running Caliptra FMC ...
2,855,817 UART:
2,855,955 UART: [fmc] Received command: 0x10000001
2,857,048 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,908 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,966,885 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,986,476 UART: [fmc] FMCALIAS cert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
3,105,011 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,114 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,220 >>> mbox cmd response: success
2,544,220 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,355 UART:
2,606,371 UART: Running Caliptra FMC ...
2,606,779 UART:
2,606,917 UART: [fmc] Received command: 0x10000001
2,608,010 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,870 UART: [fmc] LDEVID cert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
2,717,847 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,438 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,855,973 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,181,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,207,470 UART: [idev] CSR upload begun
1,209,249 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,334 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,042 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,927 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,643 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,108 UART: [idev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
1,297,898 UART: [idev] CSR uploaded
1,300,943 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,301,112 UART: [idev] --
1,302,069 UART: [ldev] ++
1,302,237 UART: [ldev] CDI.KEYID = 6
1,302,601 UART: [ldev] SUBJECT.KEYID = 5
1,303,028 UART: [ldev] AUTHORITY.KEYID = 7
1,303,491 UART: [ldev] FE.KEYID = 1
1,308,679 UART: [ldev] Erasing FE.KEYID = 1
1,334,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,261 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,985 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,016 UART: [ldev] --
1,374,356 UART: [fwproc] Wait for Commands...
1,375,013 UART: [fwproc] Recv command 0x46574c44
1,375,746 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,137 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,108 >>> mbox cmd response: success
2,767,108 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,131 UART: [afmc] ++
2,768,299 UART: [afmc] CDI.KEYID = 6
2,768,662 UART: [afmc] SUBJECT.KEYID = 7
2,769,088 UART: [afmc] AUTHORITY.KEYID = 5
2,804,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,039 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,759 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,652 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,357 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,322 UART: [afmc] --
2,848,384 UART: [cold-reset] --
2,849,222 UART: [state] Locking Datavault
2,850,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,213 UART: [state] Locking ICCM
2,851,635 UART: [exit] Launching FMC @ 0x40000000
2,856,932 UART:
2,856,948 UART: Running Caliptra FMC ...
2,857,356 UART:
2,857,494 UART: [fmc] Received command: 0x10000001
2,858,587 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,447 UART: [fmc] LDEVID cert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
2,968,424 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,015 UART: [fmc] FMCALIAS cert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
3,106,550 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,947 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,247 >>> mbox cmd response: success
2,544,247 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,480 UART:
2,606,496 UART: Running Caliptra FMC ...
2,606,904 UART:
2,607,042 UART: [fmc] Received command: 0x10000001
2,608,135 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,995 UART: [fmc] LDEVID cert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
2,717,972 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,563 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,856,098 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,857 UART: [state] WD Timer not started. Device not locked for debugging
86,982 UART: [kat] SHA2-256
890,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,661 UART: [kat] ++
894,813 UART: [kat] sha1
898,883 UART: [kat] SHA2-256
900,823 UART: [kat] SHA2-384
903,600 UART: [kat] SHA2-512-ACC
905,501 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,128 UART: [ldev] ++
1,208,296 UART: [ldev] CDI.KEYID = 6
1,208,660 UART: [ldev] SUBJECT.KEYID = 5
1,209,087 UART: [ldev] AUTHORITY.KEYID = 7
1,209,550 UART: [ldev] FE.KEYID = 1
1,214,722 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,889 UART: ROM Fatal Error: 0x000B0014
1,548,046 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,663 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,234 UART: [idev] ++
1,173,402 UART: [idev] CDI.KEYID = 6
1,173,763 UART: [idev] SUBJECT.KEYID = 7
1,174,188 UART: [idev] UDS.KEYID = 0
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,246 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,480 UART: ROM Fatal Error: 0x000B0014
1,549,637 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,298 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,440 UART: [state] LifecycleState = Unprovisioned
85,095 UART: [state] DebugLocked = No
85,813 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
890,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,721 UART: [kat] ++
894,873 UART: [kat] sha1
899,143 UART: [kat] SHA2-256
901,083 UART: [kat] SHA2-384
903,866 UART: [kat] SHA2-512-ACC
905,767 UART: [kat] ECC-384
914,948 UART: [kat] HMAC-384Kdf
919,534 UART: [kat] LMS
1,167,846 UART: [kat] --
1,168,941 UART: [cold-reset] ++
1,169,407 UART: [fht] FHT @ 0x50003400
1,172,139 UART: [idev] ++
1,172,307 UART: [idev] CDI.KEYID = 6
1,172,668 UART: [idev] SUBJECT.KEYID = 7
1,173,093 UART: [idev] UDS.KEYID = 0
1,181,081 UART: [idev] Erasing UDS.KEYID = 0
1,197,821 UART: [idev] Sha1 KeyId Algorithm
1,206,687 UART: [idev] --
1,207,762 UART: [ldev] ++
1,207,930 UART: [ldev] CDI.KEYID = 6
1,208,294 UART: [ldev] SUBJECT.KEYID = 5
1,208,721 UART: [ldev] AUTHORITY.KEYID = 7
1,209,184 UART: [ldev] FE.KEYID = 1
1,214,230 UART: [ldev] Erasing FE.KEYID = 1
1,240,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,358 UART: [ldev] --
1,279,688 UART: [fwproc] Wait for Commands...
1,280,323 UART: [fwproc] Recv command 0x46574c44
1,281,056 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,065 UART: ROM Fatal Error: 0x000B0014
1,548,222 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,157 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,287 UART: [ldev] Erasing FE.KEYID = 1
1,241,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,141 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,460 UART: ROM Fatal Error: 0x000B0014
1,549,617 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,150 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,363 UART: [idev] ++
1,172,531 UART: [idev] CDI.KEYID = 6
1,172,892 UART: [idev] SUBJECT.KEYID = 7
1,173,317 UART: [idev] UDS.KEYID = 0
1,181,275 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,208,094 UART: [ldev] ++
1,208,262 UART: [ldev] CDI.KEYID = 6
1,208,626 UART: [ldev] SUBJECT.KEYID = 5
1,209,053 UART: [ldev] AUTHORITY.KEYID = 7
1,209,516 UART: [ldev] FE.KEYID = 1
1,214,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,918 UART: [ldev] --
1,280,228 UART: [fwproc] Wait for Commands...
1,280,965 UART: [fwproc] Recv command 0x46574c44
1,281,698 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,867 UART: ROM Fatal Error: 0x000B0014
1,550,024 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,169 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,415 UART: [kat] LMS
1,169,727 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,158 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,117 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,607 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,422 UART: ROM Fatal Error: 0x000B0014
1,550,579 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,656 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,208 UART: [kat] SHA2-256
891,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,887 UART: [kat] ++
896,039 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,181,957 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,472 UART: [fwproc] Wait for Commands...
1,282,293 UART: [fwproc] Recv command 0x46574c44
1,283,026 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,443 UART: ROM Fatal Error: 0x000B0024
1,549,600 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,128 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,302 UART: [kat] SHA2-256
902,242 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
916,853 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,710 UART: ROM Fatal Error: 0x000B0024
1,550,867 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,670 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,640 UART: [state] LifecycleState = Unprovisioned
85,295 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
890,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,873 UART: [kat] ++
895,025 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,414 UART: [kat] HMAC-384Kdf
919,964 UART: [kat] LMS
1,168,276 UART: [kat] --
1,169,117 UART: [cold-reset] ++
1,169,449 UART: [fht] FHT @ 0x50003400
1,172,071 UART: [idev] ++
1,172,239 UART: [idev] CDI.KEYID = 6
1,172,600 UART: [idev] SUBJECT.KEYID = 7
1,173,025 UART: [idev] UDS.KEYID = 0
1,180,595 UART: [idev] Erasing UDS.KEYID = 0
1,197,657 UART: [idev] Sha1 KeyId Algorithm
1,206,433 UART: [idev] --
1,207,500 UART: [ldev] ++
1,207,668 UART: [ldev] CDI.KEYID = 6
1,208,032 UART: [ldev] SUBJECT.KEYID = 5
1,208,459 UART: [ldev] AUTHORITY.KEYID = 7
1,208,922 UART: [ldev] FE.KEYID = 1
1,214,054 UART: [ldev] Erasing FE.KEYID = 1
1,240,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,680 UART: [ldev] --
1,280,068 UART: [fwproc] Wait for Commands...
1,280,763 UART: [fwproc] Recv command 0x46574c44
1,281,496 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,353 UART: ROM Fatal Error: 0x000B0024
1,548,510 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,251 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,346 UART: [kat] SHA2-256
902,286 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,889 UART: [kat] LMS
1,169,201 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,543 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,233 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,601 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,206 UART: ROM Fatal Error: 0x000B0024
1,550,363 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,169,911 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,209,010 UART: [ldev] ++
1,209,178 UART: [ldev] CDI.KEYID = 6
1,209,542 UART: [ldev] SUBJECT.KEYID = 5
1,209,969 UART: [ldev] AUTHORITY.KEYID = 7
1,210,432 UART: [ldev] FE.KEYID = 1
1,215,234 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,898 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,675 UART: ROM Fatal Error: 0x000B0024
1,549,832 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,765 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,695 UART: [state] LifecycleState = Unprovisioned
85,350 UART: [state] DebugLocked = No
85,906 UART: [state] WD Timer not started. Device not locked for debugging
87,057 UART: [kat] SHA2-256
890,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,736 UART: [kat] ++
894,888 UART: [kat] sha1
899,096 UART: [kat] SHA2-256
901,036 UART: [kat] SHA2-384
903,849 UART: [kat] SHA2-512-ACC
905,750 UART: [kat] ECC-384
915,569 UART: [kat] HMAC-384Kdf
920,323 UART: [kat] LMS
1,168,635 UART: [kat] --
1,169,410 UART: [cold-reset] ++
1,169,796 UART: [fht] FHT @ 0x50003400
1,172,594 UART: [idev] ++
1,172,762 UART: [idev] CDI.KEYID = 6
1,173,123 UART: [idev] SUBJECT.KEYID = 7
1,173,548 UART: [idev] UDS.KEYID = 0
1,181,726 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,939 UART: [fwproc] Wait for Commands...
1,282,674 UART: [fwproc] Recv command 0x46574c44
1,283,407 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,446 UART: ROM Fatal Error: 0x000B0024
1,550,603 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,360 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,031 UART: [kat] SHA2-256
900,971 UART: [kat] SHA2-384
903,824 UART: [kat] SHA2-512-ACC
905,725 UART: [kat] ECC-384
915,140 UART: [kat] HMAC-384Kdf
919,572 UART: [kat] LMS
1,167,884 UART: [kat] --
1,169,009 UART: [cold-reset] ++
1,169,549 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,214,938 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,644 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,168 UART: ROM Fatal Error: 0x000B0023
1,549,325 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,774 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
905,129 UART: [kat] SHA2-512-ACC
907,030 UART: [kat] ECC-384
916,473 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,635 UART: [ldev] Erasing FE.KEYID = 1
1,241,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,913 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,853 UART: ROM Fatal Error: 0x000B0023
1,551,010 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,890 UART: ROM Fatal Error: 0x000B0023
1,550,047 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,916 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,715 UART: ROM Fatal Error: 0x000B0023
1,549,872 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,553 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,226 UART: [kat] LMS
1,169,538 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,703 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,828 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,776 UART: ROM Fatal Error: 0x000B0023
1,549,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,320 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
891,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,046 UART: [kat] ++
896,198 UART: [kat] sha1
900,620 UART: [kat] SHA2-256
902,560 UART: [kat] SHA2-384
905,237 UART: [kat] SHA2-512-ACC
907,138 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,338 UART: [fht] FHT @ 0x50003400
1,173,910 UART: [idev] ++
1,174,078 UART: [idev] CDI.KEYID = 6
1,174,439 UART: [idev] SUBJECT.KEYID = 7
1,174,864 UART: [idev] UDS.KEYID = 0
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,638 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,055 UART: [ldev] SUBJECT.KEYID = 5
1,211,482 UART: [ldev] AUTHORITY.KEYID = 7
1,211,945 UART: [ldev] FE.KEYID = 1
1,217,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,503 UART: [ldev] --
1,282,975 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,415 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,949 UART: ROM Fatal Error: 0x000B0023
1,551,106 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,247 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,662 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,473 UART: [cold-reset] ++
1,170,953 UART: [fht] FHT @ 0x50003400
1,173,823 UART: [idev] ++
1,173,991 UART: [idev] CDI.KEYID = 6
1,174,352 UART: [idev] SUBJECT.KEYID = 7
1,174,777 UART: [idev] UDS.KEYID = 0
1,183,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,827 UART: [idev] Sha1 KeyId Algorithm
1,208,605 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,128 UART: [ldev] Erasing FE.KEYID = 1
1,242,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,840 UART: ROM Fatal Error: 0x000B0023
1,550,997 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,130 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
921,137 UART: [kat] LMS
1,169,449 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,183,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,282,157 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,527 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,143 UART: ROM Fatal Error: 0x000B0023
1,551,300 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,829 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,469 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,207,021 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,204 UART: [ldev] Erasing FE.KEYID = 1
1,240,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,226 UART: [ldev] --
1,279,528 UART: [fwproc] Wait for Commands...
1,280,269 UART: [fwproc] Recv command 0x46574c44
1,281,002 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,906 UART: ROM Fatal Error: 0x000B0023
1,548,063 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,476 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
916,099 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,181,706 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,623 UART: [ldev] Erasing FE.KEYID = 1
1,241,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,957 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,813 UART: ROM Fatal Error: 0x000B0023
1,549,970 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,889 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,243,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,924 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,075 UART: [fwproc] Recv command 0x46574c44
1,283,808 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,818 UART: ROM Fatal Error: 0x000B0023
1,550,975 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,206 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,587 UART: [kat] LMS
1,169,899 UART: [kat] --
1,170,824 UART: [cold-reset] ++
1,171,250 UART: [fht] FHT @ 0x50003400
1,173,950 UART: [idev] ++
1,174,118 UART: [idev] CDI.KEYID = 6
1,174,479 UART: [idev] SUBJECT.KEYID = 7
1,174,904 UART: [idev] UDS.KEYID = 0
1,183,134 UART: [idev] Erasing UDS.KEYID = 0
1,200,182 UART: [idev] Sha1 KeyId Algorithm
1,209,116 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,587 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,693 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,929 UART: ROM Fatal Error: 0x000B0023
1,551,086 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,869 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,794 UART: [kat] HMAC-384Kdf
921,504 UART: [kat] LMS
1,169,816 UART: [kat] --
1,170,647 UART: [cold-reset] ++
1,171,185 UART: [fht] FHT @ 0x50003400
1,173,751 UART: [idev] ++
1,173,919 UART: [idev] CDI.KEYID = 6
1,174,280 UART: [idev] SUBJECT.KEYID = 7
1,174,705 UART: [idev] UDS.KEYID = 0
1,182,711 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,210,046 UART: [ldev] ++
1,210,214 UART: [ldev] CDI.KEYID = 6
1,210,578 UART: [ldev] SUBJECT.KEYID = 5
1,211,005 UART: [ldev] AUTHORITY.KEYID = 7
1,211,468 UART: [ldev] FE.KEYID = 1
1,216,650 UART: [ldev] Erasing FE.KEYID = 1
1,243,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,804 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,747 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,235 UART: ROM Fatal Error: 0x000B0021
1,550,392 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,289 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,293 UART: [ldev] --
1,281,731 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,486 UART: ROM Fatal Error: 0x000B0021
1,550,643 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,240 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,993 UART: [state] WD Timer not started. Device not locked for debugging
88,306 UART: [kat] SHA2-256
891,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,529 UART: [kat] SHA2-256
902,469 UART: [kat] SHA2-384
905,166 UART: [kat] SHA2-512-ACC
907,067 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,571 UART: [cold-reset] ++
1,171,113 UART: [fht] FHT @ 0x50003400
1,173,619 UART: [idev] ++
1,173,787 UART: [idev] CDI.KEYID = 6
1,174,148 UART: [idev] SUBJECT.KEYID = 7
1,174,573 UART: [idev] UDS.KEYID = 0
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,783 UART: [idev] Sha1 KeyId Algorithm
1,208,751 UART: [idev] --
1,209,600 UART: [ldev] ++
1,209,768 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,559 UART: [ldev] AUTHORITY.KEYID = 7
1,211,022 UART: [ldev] FE.KEYID = 1
1,216,058 UART: [ldev] Erasing FE.KEYID = 1
1,242,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,636 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x46574c44
1,283,430 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,141 UART: ROM Fatal Error: 0x000B0021
1,551,298 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,763 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,861 UART: [state] LifecycleState = Unprovisioned
85,516 UART: [state] DebugLocked = No
86,002 UART: [state] WD Timer not started. Device not locked for debugging
87,311 UART: [kat] SHA2-256
890,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,990 UART: [kat] ++
895,142 UART: [kat] sha1
899,178 UART: [kat] SHA2-256
901,118 UART: [kat] SHA2-384
903,973 UART: [kat] SHA2-512-ACC
905,874 UART: [kat] ECC-384
915,569 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,286 UART: [cold-reset] ++
1,169,844 UART: [fht] FHT @ 0x50003400
1,172,522 UART: [idev] ++
1,172,690 UART: [idev] CDI.KEYID = 6
1,173,051 UART: [idev] SUBJECT.KEYID = 7
1,173,476 UART: [idev] UDS.KEYID = 0
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,604 UART: [idev] Sha1 KeyId Algorithm
1,207,470 UART: [idev] --
1,208,697 UART: [ldev] ++
1,208,865 UART: [ldev] CDI.KEYID = 6
1,209,229 UART: [ldev] SUBJECT.KEYID = 5
1,209,656 UART: [ldev] AUTHORITY.KEYID = 7
1,210,119 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,991 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,641 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,024 UART: ROM Fatal Error: 0x000B0021
1,549,181 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,890 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,976 UART: [kat] SHA2-512-ACC
906,877 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,086 UART: [kat] LMS
1,169,398 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,861 UART: [idev] Sha1 KeyId Algorithm
1,207,623 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,515 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,127 UART: ROM Fatal Error: 0x000B0021
1,551,284 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,575 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,070 UART: [state] WD Timer not started. Device not locked for debugging
87,215 UART: [kat] SHA2-256
890,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,894 UART: [kat] ++
895,046 UART: [kat] sha1
899,274 UART: [kat] SHA2-256
901,214 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,597 UART: [kat] HMAC-384Kdf
920,203 UART: [kat] LMS
1,168,515 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,173,034 UART: [idev] ++
1,173,202 UART: [idev] CDI.KEYID = 6
1,173,563 UART: [idev] SUBJECT.KEYID = 7
1,173,988 UART: [idev] UDS.KEYID = 0
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,841 UART: [ldev] ++
1,209,009 UART: [ldev] CDI.KEYID = 6
1,209,373 UART: [ldev] SUBJECT.KEYID = 5
1,209,800 UART: [ldev] AUTHORITY.KEYID = 7
1,210,263 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,241,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,791 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,016 UART: ROM Fatal Error: 0x000B0021
1,550,173 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,224 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,630 UART: [state] LifecycleState = Unprovisioned
85,285 UART: [state] DebugLocked = No
85,767 UART: [state] WD Timer not started. Device not locked for debugging
87,086 UART: [kat] SHA2-256
890,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,765 UART: [kat] ++
894,917 UART: [kat] sha1
899,313 UART: [kat] SHA2-256
901,253 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,509 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,240,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,522 UART: [ldev] --
1,279,794 UART: [fwproc] Wait for Commands...
1,280,399 UART: [fwproc] Recv command 0x46574c44
1,281,132 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,611 UART: ROM Fatal Error: 0x000B0021
1,547,768 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,411 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,698 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,283,068 UART: [fwproc] Recv command 0x46574c44
1,283,801 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,716 UART: ROM Fatal Error: 0x000B0021
1,550,873 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,310 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,474 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,471 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,181,555 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,281,141 UART: [fwproc] Recv command 0x46574c44
1,281,874 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,585 UART: ROM Fatal Error: 0x000B0021
1,548,742 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,341 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,063 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,622 UART: ROM Fatal Error: 0x000B0021
1,549,779 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,674 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,181,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,266 UART: [ldev] ++
1,208,434 UART: [ldev] CDI.KEYID = 6
1,208,798 UART: [ldev] SUBJECT.KEYID = 5
1,209,225 UART: [ldev] AUTHORITY.KEYID = 7
1,209,688 UART: [ldev] FE.KEYID = 1
1,214,832 UART: [ldev] Erasing FE.KEYID = 1
1,240,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,414 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46574c44
1,281,826 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,661 UART: ROM Fatal Error: 0x000B0021
1,549,818 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,628 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,828 UART: ROM Fatal Error: 0x000B0021
1,550,985 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,940 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,653 UART: [fwproc] Recv command 0x46574c44
1,282,386 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,093 UART: ROM Fatal Error: 0x000B0022
1,549,250 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,225 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,972 UART: [kat] ++
896,124 UART: [kat] sha1
900,478 UART: [kat] SHA2-256
902,418 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,604 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,380 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,241,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,545 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,886 UART: ROM Fatal Error: 0x000B0022
1,550,043 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,934 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
921,014 UART: [kat] LMS
1,169,326 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,397 UART: [idev] ++
1,173,565 UART: [idev] CDI.KEYID = 6
1,173,926 UART: [idev] SUBJECT.KEYID = 7
1,174,351 UART: [idev] UDS.KEYID = 0
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,397 UART: [idev] Sha1 KeyId Algorithm
1,208,405 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,467 UART: [ldev] AUTHORITY.KEYID = 7
1,210,930 UART: [ldev] FE.KEYID = 1
1,216,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,451 UART: ROM Fatal Error: 0x000B0022
1,549,608 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,189 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,824 UART: [kat] ++
895,976 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,106 UART: [fht] FHT @ 0x50003400
1,173,950 UART: [idev] ++
1,174,118 UART: [idev] CDI.KEYID = 6
1,174,479 UART: [idev] SUBJECT.KEYID = 7
1,174,904 UART: [idev] UDS.KEYID = 0
1,183,320 UART: [idev] Erasing UDS.KEYID = 0
1,200,956 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,211,063 UART: [ldev] ++
1,211,231 UART: [ldev] CDI.KEYID = 6
1,211,595 UART: [ldev] SUBJECT.KEYID = 5
1,212,022 UART: [ldev] AUTHORITY.KEYID = 7
1,212,485 UART: [ldev] FE.KEYID = 1
1,217,489 UART: [ldev] Erasing FE.KEYID = 1
1,244,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,905 UART: [ldev] --
1,283,217 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,268 UART: ROM Fatal Error: 0x000B0022
1,552,425 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,080 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
85,977 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,915 UART: [kat] ++
895,067 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
903,834 UART: [kat] SHA2-512-ACC
905,735 UART: [kat] ECC-384
915,444 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,693 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,858 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,671 UART: ROM Fatal Error: 0x000B0022
1,550,828 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,175 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,658 UART: [idev] ++
1,173,826 UART: [idev] CDI.KEYID = 6
1,174,187 UART: [idev] SUBJECT.KEYID = 7
1,174,612 UART: [idev] UDS.KEYID = 0
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,504 UART: ROM Fatal Error: 0x000B0022
1,551,661 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,720 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,242,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,073 UART: ROM Fatal Error: 0x000B0021
1,550,230 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,445 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,255 UART: [ldev] --
1,281,645 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,920 UART: ROM Fatal Error: 0x000B0021
1,549,077 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,590 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x46574c44
1,282,720 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,181 UART: ROM Fatal Error: 0x000B0021
1,550,338 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,669 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,568 UART: [fwproc] Recv command 0x46574c44
1,283,301 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,992 UART: ROM Fatal Error: 0x000B0021
1,550,149 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,024 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,198,061 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,972 UART: [ldev] --
1,279,454 UART: [fwproc] Wait for Commands...
1,280,039 UART: [fwproc] Recv command 0x46574c44
1,280,772 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,659 UART: ROM Fatal Error: 0x000B0021
1,547,816 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,041 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,971 UART: [kat] HMAC-384Kdf
921,489 UART: [kat] LMS
1,169,801 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,171,138 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,182,908 UART: [idev] Erasing UDS.KEYID = 0
1,200,540 UART: [idev] Sha1 KeyId Algorithm
1,209,374 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,017 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,687 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,880 UART: ROM Fatal Error: 0x000B0021
1,551,037 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,328 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,182,629 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,511 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,216,044 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,326 UART: [ldev] --
1,281,840 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,918 UART: ROM Fatal Error: 0x000B0034
1,331,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,526 UART: [fwproc] Wait for Commands...
1,282,265 UART: [fwproc] Recv command 0x46574c44
1,282,998 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,542 UART: ROM Fatal Error: 0x000B0034
1,330,699 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,018 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,451 UART: [kat] LMS
1,169,763 UART: [kat] --
1,170,710 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,956 UART: [idev] ++
1,174,124 UART: [idev] CDI.KEYID = 6
1,174,485 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,183,298 UART: [idev] Erasing UDS.KEYID = 0
1,200,228 UART: [idev] Sha1 KeyId Algorithm
1,209,304 UART: [idev] --
1,210,253 UART: [ldev] ++
1,210,421 UART: [ldev] CDI.KEYID = 6
1,210,785 UART: [ldev] SUBJECT.KEYID = 5
1,211,212 UART: [ldev] AUTHORITY.KEYID = 7
1,211,675 UART: [ldev] FE.KEYID = 1
1,216,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,515 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,869 UART: ROM Fatal Error: 0x000B0034
1,332,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,757 UART: [state] LifecycleState = Unprovisioned
85,412 UART: [state] DebugLocked = No
85,930 UART: [state] WD Timer not started. Device not locked for debugging
87,093 UART: [kat] SHA2-256
890,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,772 UART: [kat] ++
894,924 UART: [kat] sha1
899,156 UART: [kat] SHA2-256
901,096 UART: [kat] SHA2-384
903,923 UART: [kat] SHA2-512-ACC
905,824 UART: [kat] ECC-384
915,599 UART: [kat] HMAC-384Kdf
920,151 UART: [kat] LMS
1,168,463 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,679 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,157 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,487 UART: ROM Fatal Error: 0x000B0034
1,331,644 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,013 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,643 UART: [idev] Sha1 KeyId Algorithm
1,207,637 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,568 UART: ROM Fatal Error: 0x000B0034
1,330,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,320 UART: [kat] LMS
1,168,632 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,240,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,982 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,035 UART: [fwproc] Recv command 0x46574c44
1,281,768 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,202 UART: ROM Fatal Error: 0x000B0034
1,330,359 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,320 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] --
1,209,647 UART: [ldev] ++
1,209,815 UART: [ldev] CDI.KEYID = 6
1,210,179 UART: [ldev] SUBJECT.KEYID = 5
1,210,606 UART: [ldev] AUTHORITY.KEYID = 7
1,211,069 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,283,008 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,693 UART: ROM Fatal Error: 0x000B0034
1,332,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,852 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,406 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,121 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,278 UART: [fwproc] Recv command 0x46574c44
1,283,011 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,547 UART: ROM Fatal Error: 0x000B0034
1,330,704 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,793 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,830 UART: [ldev] ++
1,208,998 UART: [ldev] CDI.KEYID = 6
1,209,362 UART: [ldev] SUBJECT.KEYID = 5
1,209,789 UART: [ldev] AUTHORITY.KEYID = 7
1,210,252 UART: [ldev] FE.KEYID = 1
1,215,144 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,872 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,998 UART: ROM Fatal Error: 0x000B0034
1,330,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,365 UART: [idev] ++
1,173,533 UART: [idev] CDI.KEYID = 6
1,173,894 UART: [idev] SUBJECT.KEYID = 7
1,174,319 UART: [idev] UDS.KEYID = 0
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,656 UART: [ldev] ++
1,209,824 UART: [ldev] CDI.KEYID = 6
1,210,188 UART: [ldev] SUBJECT.KEYID = 5
1,210,615 UART: [ldev] AUTHORITY.KEYID = 7
1,211,078 UART: [ldev] FE.KEYID = 1
1,216,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,726 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,877 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,700 UART: ROM Fatal Error: 0x000B0034
1,331,857 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,022 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,659 UART: [kat] HMAC-384Kdf
921,543 UART: [kat] LMS
1,169,855 UART: [kat] --
1,170,836 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,173,894 UART: [idev] ++
1,174,062 UART: [idev] CDI.KEYID = 6
1,174,423 UART: [idev] SUBJECT.KEYID = 7
1,174,848 UART: [idev] UDS.KEYID = 0
1,183,112 UART: [idev] Erasing UDS.KEYID = 0
1,201,264 UART: [idev] Sha1 KeyId Algorithm
1,209,944 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,830 UART: [ldev] AUTHORITY.KEYID = 7
1,212,293 UART: [ldev] FE.KEYID = 1
1,217,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,609 UART: [ldev] --
1,283,043 UART: [fwproc] Wait for Commands...
1,283,788 UART: [fwproc] Recv command 0x46574c44
1,284,521 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,615 UART: ROM Fatal Error: 0x000B0034
1,332,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,294 UART: [kat] SHA2-256
902,234 UART: [kat] SHA2-384
904,855 UART: [kat] SHA2-512-ACC
906,756 UART: [kat] ECC-384
916,567 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
1,169,487 UART: [kat] --
1,170,540 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,451 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,281 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,837 UART: ROM Fatal Error: 0x000B0034
1,330,994 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Manufacturing
86,151 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,694 UART: [kat] HMAC-384Kdf
921,302 UART: [kat] LMS
1,169,614 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,205 UART: [idev] --
1,209,320 UART: [ldev] ++
1,209,488 UART: [ldev] CDI.KEYID = 6
1,209,852 UART: [ldev] SUBJECT.KEYID = 5
1,210,279 UART: [ldev] AUTHORITY.KEYID = 7
1,210,742 UART: [ldev] FE.KEYID = 1
1,215,972 UART: [ldev] Erasing FE.KEYID = 1
1,242,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,658 UART: [ldev] --
1,282,114 UART: [fwproc] Wait for Commands...
1,282,907 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,505 UART: ROM Fatal Error: 0x000B0025
1,576,662 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,203 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Manufacturing
85,856 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,194 UART: [idev] Sha1 KeyId Algorithm
1,208,882 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,565 UART: [ldev] SUBJECT.KEYID = 5
1,210,992 UART: [ldev] AUTHORITY.KEYID = 7
1,211,455 UART: [ldev] FE.KEYID = 1
1,216,695 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,293 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,792 UART: ROM Fatal Error: 0x000B0025
1,575,949 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,144 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Manufacturing
85,633 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,242,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,924 UART: [ldev] --
1,282,278 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,249 UART: ROM Fatal Error: 0x000B0025
1,576,406 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,425,801 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Manufacturing
86,154 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,215,507 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,391 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,829 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,088 UART: ROM Fatal Error: 0x000B0025
1,575,245 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,084 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Manufacturing
85,659 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,176 UART: [kat] LMS
1,168,488 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,199,255 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,196 UART: [ldev] --
1,280,544 UART: [fwproc] Wait for Commands...
1,281,341 UART: [fwproc] Recv command 0x46574c44
1,282,074 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,475 UART: ROM Fatal Error: 0x000B0025
1,574,632 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,425,663 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Manufacturing
86,322 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,659 UART: [kat] HMAC-384Kdf
921,411 UART: [kat] LMS
1,169,723 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,183,038 UART: [idev] Erasing UDS.KEYID = 0
1,200,106 UART: [idev] Sha1 KeyId Algorithm
1,209,110 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,819 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,649 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,504 UART: ROM Fatal Error: 0x000B0025
1,576,661 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,966 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Manufacturing
85,843 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,466 UART: [ldev] ++
1,208,634 UART: [ldev] CDI.KEYID = 6
1,208,998 UART: [ldev] SUBJECT.KEYID = 5
1,209,425 UART: [ldev] AUTHORITY.KEYID = 7
1,209,888 UART: [ldev] FE.KEYID = 1
1,214,958 UART: [ldev] Erasing FE.KEYID = 1
1,241,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,345 UART: [fwproc] Recv command 0x46574c44
1,282,078 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,901 UART: ROM Fatal Error: 0x000B0027
1,574,058 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,485 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Manufacturing
86,162 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
905,089 UART: [kat] SHA2-512-ACC
906,990 UART: [kat] ECC-384
916,965 UART: [kat] HMAC-384Kdf
921,663 UART: [kat] LMS
1,169,975 UART: [kat] --
1,170,902 UART: [cold-reset] ++
1,171,464 UART: [fht] FHT @ 0x50003400
1,174,210 UART: [idev] ++
1,174,378 UART: [idev] CDI.KEYID = 6
1,174,739 UART: [idev] SUBJECT.KEYID = 7
1,175,164 UART: [idev] UDS.KEYID = 0
1,183,344 UART: [idev] Erasing UDS.KEYID = 0
1,200,828 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,937 UART: [ldev] ++
1,211,105 UART: [ldev] CDI.KEYID = 6
1,211,469 UART: [ldev] SUBJECT.KEYID = 5
1,211,896 UART: [ldev] AUTHORITY.KEYID = 7
1,212,359 UART: [ldev] FE.KEYID = 1
1,217,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,835 UART: [ldev] --
1,283,183 UART: [fwproc] Wait for Commands...
1,283,756 UART: [fwproc] Recv command 0x46574c44
1,284,489 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,962 UART: ROM Fatal Error: 0x000B0027
1,576,119 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,166 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Manufacturing
85,789 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,672 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,563 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,600 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,724 UART: [fwproc] Wait for Commands...
1,281,527 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,911 UART: ROM Fatal Error: 0x000B0027
1,574,068 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,425,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Manufacturing
85,720 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
915,715 UART: [kat] HMAC-384Kdf
920,221 UART: [kat] LMS
1,168,533 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,181,462 UART: [idev] Erasing UDS.KEYID = 0
1,198,744 UART: [idev] Sha1 KeyId Algorithm
1,207,566 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,325 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,437 UART: [ldev] --
1,280,711 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,018 UART: ROM Fatal Error: 0x000B0027
1,573,175 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,668 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Manufacturing
85,677 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,325 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,513 UART: [idev] ++
1,173,681 UART: [idev] CDI.KEYID = 6
1,174,042 UART: [idev] SUBJECT.KEYID = 7
1,174,467 UART: [idev] UDS.KEYID = 0
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,890 UART: [ldev] ++
1,209,058 UART: [ldev] CDI.KEYID = 6
1,209,422 UART: [ldev] SUBJECT.KEYID = 5
1,209,849 UART: [ldev] AUTHORITY.KEYID = 7
1,210,312 UART: [ldev] FE.KEYID = 1
1,215,448 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,880 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x46574c44
1,282,290 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,213 UART: ROM Fatal Error: 0x000B0027
1,574,370 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,107 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Manufacturing
86,032 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,604 UART: [idev] ++
1,173,772 UART: [idev] CDI.KEYID = 6
1,174,133 UART: [idev] SUBJECT.KEYID = 7
1,174,558 UART: [idev] UDS.KEYID = 0
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,948 UART: ROM Fatal Error: 0x000B0027
1,577,105 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,226 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,777 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,182,497 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,374 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,841 UART: ROM Fatal Error: 0x000B000D
1,323,000 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,037 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,289 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,711 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,846 UART: ROM Fatal Error: 0x000B000D
1,323,005 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,684 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
891,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,181,109 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,350 UART: [ldev] ++
1,208,518 UART: [ldev] CDI.KEYID = 6
1,208,882 UART: [ldev] SUBJECT.KEYID = 5
1,209,309 UART: [ldev] AUTHORITY.KEYID = 7
1,209,772 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,836 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,783 UART: [fwproc] Recv command 0x46574c44
1,282,516 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,439 UART: ROM Fatal Error: 0x000B000D
1,321,598 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,115 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,282,038 UART: [fwproc] Recv command 0x46574c44
1,282,771 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,688 UART: ROM Fatal Error: 0x000B000D
1,321,847 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,758 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,646 UART: [kat] HMAC-384Kdf
920,008 UART: [kat] LMS
1,168,320 UART: [kat] --
1,169,079 UART: [cold-reset] ++
1,169,599 UART: [fht] FHT @ 0x50003400
1,172,273 UART: [idev] ++
1,172,441 UART: [idev] CDI.KEYID = 6
1,172,802 UART: [idev] SUBJECT.KEYID = 7
1,173,227 UART: [idev] UDS.KEYID = 0
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,021 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,975 UART: ROM Fatal Error: 0x000B000D
1,321,134 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,007 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,182,024 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,793 UART: [ldev] ++
1,208,961 UART: [ldev] CDI.KEYID = 6
1,209,325 UART: [ldev] SUBJECT.KEYID = 5
1,209,752 UART: [ldev] AUTHORITY.KEYID = 7
1,210,215 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,171 UART: [fwproc] Wait for Commands...
1,281,880 UART: [fwproc] Recv command 0x46574c44
1,282,613 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,328 UART: ROM Fatal Error: 0x000B000D
1,322,487 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,594 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,661 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,242,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,024 UART: [ldev] --
1,281,334 UART: [fwproc] Wait for Commands...
1,282,077 UART: [fwproc] Recv command 0x46574c44
1,282,810 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,037 >>> mbox cmd response: success
2,775,178 UART: [afmc] ++
2,775,346 UART: [afmc] CDI.KEYID = 6
2,775,709 UART: [afmc] SUBJECT.KEYID = 7
2,776,135 UART: [afmc] AUTHORITY.KEYID = 5
2,812,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,725 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,727 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,182,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,780 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,576 >>> mbox cmd response: success
2,774,791 UART: [afmc] ++
2,774,959 UART: [afmc] CDI.KEYID = 6
2,775,322 UART: [afmc] SUBJECT.KEYID = 7
2,775,748 UART: [afmc] AUTHORITY.KEYID = 5
2,811,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,120 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,714 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,241,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,817 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,153 >>> mbox cmd response: success
2,772,322 UART: [afmc] ++
2,772,490 UART: [afmc] CDI.KEYID = 6
2,772,853 UART: [afmc] SUBJECT.KEYID = 7
2,773,279 UART: [afmc] AUTHORITY.KEYID = 5
2,808,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,563 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,419 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,540 UART: [cold-reset] ++
1,171,038 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,179 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,683 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,682 >>> mbox cmd response: success
2,772,777 UART: [afmc] ++
2,772,945 UART: [afmc] CDI.KEYID = 6
2,773,308 UART: [afmc] SUBJECT.KEYID = 7
2,773,734 UART: [afmc] AUTHORITY.KEYID = 5
2,809,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,584 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,914 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,482 UART: [state] LifecycleState = Unprovisioned
85,137 UART: [state] DebugLocked = No
85,633 UART: [state] WD Timer not started. Device not locked for debugging
86,956 UART: [kat] SHA2-256
890,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,635 UART: [kat] ++
894,787 UART: [kat] sha1
898,919 UART: [kat] SHA2-256
900,859 UART: [kat] SHA2-384
903,736 UART: [kat] SHA2-512-ACC
905,637 UART: [kat] ECC-384
915,116 UART: [kat] HMAC-384Kdf
919,794 UART: [kat] LMS
1,168,106 UART: [kat] --
1,169,057 UART: [cold-reset] ++
1,169,581 UART: [fht] FHT @ 0x50003400
1,172,335 UART: [idev] ++
1,172,503 UART: [idev] CDI.KEYID = 6
1,172,864 UART: [idev] SUBJECT.KEYID = 7
1,173,289 UART: [idev] UDS.KEYID = 0
1,181,079 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,282,023 UART: [fwproc] Recv command 0x46574c44
1,282,756 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,997 >>> mbox cmd response: success
2,773,040 UART: [afmc] ++
2,773,208 UART: [afmc] CDI.KEYID = 6
2,773,571 UART: [afmc] SUBJECT.KEYID = 7
2,773,997 UART: [afmc] AUTHORITY.KEYID = 5
2,808,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,400 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,257 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,145 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,103 UART: [kat] SHA2-512-ACC
906,004 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,547 UART: [fwproc] Wait for Commands...
1,282,142 UART: [fwproc] Recv command 0x46574c44
1,282,875 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,046 >>> mbox cmd response: success
2,774,267 UART: [afmc] ++
2,774,435 UART: [afmc] CDI.KEYID = 6
2,774,798 UART: [afmc] SUBJECT.KEYID = 7
2,775,224 UART: [afmc] AUTHORITY.KEYID = 5
2,811,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,402 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,296 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,233 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,242,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,964 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,216 UART: ROM Fatal Error: 0x000B0030
1,596,373 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,446,591 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 114332 bytes
1,579,060 UART: ROM Fatal Error: 0x000B0030
1,580,217 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,447,756 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,663 UART: [fwproc] Recv command 0x46574c44
1,282,396 UART: [fwproc] Recv'd Img size: 114332 bytes
1,593,285 UART: ROM Fatal Error: 0x000B0030
1,594,442 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,449,376 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
890,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,066 UART: [kat] ++
895,218 UART: [kat] sha1
899,484 UART: [kat] SHA2-256
901,424 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,359 UART: [kat] LMS
1,168,671 UART: [kat] --
1,169,506 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,181,304 UART: [idev] Erasing UDS.KEYID = 0
1,198,392 UART: [idev] Sha1 KeyId Algorithm
1,207,160 UART: [idev] --
1,208,033 UART: [ldev] ++
1,208,201 UART: [ldev] CDI.KEYID = 6
1,208,565 UART: [ldev] SUBJECT.KEYID = 5
1,208,992 UART: [ldev] AUTHORITY.KEYID = 7
1,209,455 UART: [ldev] FE.KEYID = 1
1,214,931 UART: [ldev] Erasing FE.KEYID = 1
1,240,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,205 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,224 UART: [fwproc] Recv command 0x46574c44
1,281,957 UART: [fwproc] Recv'd Img size: 114332 bytes
1,597,454 UART: ROM Fatal Error: 0x000B0030
1,598,611 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,448,571 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,631 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,454 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,501 UART: [fwproc] Recv command 0x46574c44
1,282,234 UART: [fwproc] Recv'd Img size: 114332 bytes
1,590,916 UART: ROM Fatal Error: 0x000B0030
1,592,073 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,439,828 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,198,116 UART: [idev] Sha1 KeyId Algorithm
1,206,944 UART: [idev] --
1,208,071 UART: [ldev] ++
1,208,239 UART: [ldev] CDI.KEYID = 6
1,208,603 UART: [ldev] SUBJECT.KEYID = 5
1,209,030 UART: [ldev] AUTHORITY.KEYID = 7
1,209,493 UART: [ldev] FE.KEYID = 1
1,215,127 UART: [ldev] Erasing FE.KEYID = 1
1,241,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,319 UART: [ldev] --
1,280,783 UART: [fwproc] Wait for Commands...
1,281,532 UART: [fwproc] Recv command 0x46574c44
1,282,265 UART: [fwproc] Recv'd Img size: 114332 bytes
1,591,017 UART: ROM Fatal Error: 0x000B0030
1,592,174 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,453,156 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,173 UART: [cold-reset] ++
1,169,729 UART: [fht] FHT @ 0x50003400
1,172,425 UART: [idev] ++
1,172,593 UART: [idev] CDI.KEYID = 6
1,172,954 UART: [idev] SUBJECT.KEYID = 7
1,173,379 UART: [idev] UDS.KEYID = 0
1,181,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,207,153 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,464 UART: [ldev] Erasing FE.KEYID = 1
1,240,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,279,912 UART: [fwproc] Wait for Commands...
1,280,557 UART: [fwproc] Recv command 0x46574c44
1,281,290 UART: [fwproc] Recv'd Img size: 114332 bytes
1,300,147 UART: ROM Fatal Error: 0x000B0001
1,301,304 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,367 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,693 UART: [kat] LMS
1,169,005 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,002 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,281,989 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,307 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,584 UART: ROM Fatal Error: 0x000B0001
1,303,741 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,712 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,817 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,297 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,699 UART: ROM Fatal Error: 0x000B0001
1,302,856 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,197 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,810 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,412 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,615 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,497 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,288 UART: ROM Fatal Error: 0x000B0001
1,303,445 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,544 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,353 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,242,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,460 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,401 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,447 UART: ROM Fatal Error: 0x000B0001
1,303,604 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,247 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,181,120 UART: [idev] Erasing UDS.KEYID = 0
1,198,294 UART: [idev] Sha1 KeyId Algorithm
1,207,240 UART: [idev] --
1,208,125 UART: [ldev] ++
1,208,293 UART: [ldev] CDI.KEYID = 6
1,208,657 UART: [ldev] SUBJECT.KEYID = 5
1,209,084 UART: [ldev] AUTHORITY.KEYID = 7
1,209,547 UART: [ldev] FE.KEYID = 1
1,214,621 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,885 UART: [ldev] --
1,281,259 UART: [fwproc] Wait for Commands...
1,281,900 UART: [fwproc] Recv command 0x46574c44
1,282,633 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,170 UART: ROM Fatal Error: 0x000B0001
1,303,327 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,304 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,241,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,404 UART: ROM Fatal Error: 0x000B0002
1,303,561 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,244 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,161 UART: [kat] SHA2-512-ACC
906,062 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,181,354 UART: [idev] Erasing UDS.KEYID = 0
1,198,078 UART: [idev] Sha1 KeyId Algorithm
1,207,106 UART: [idev] --
1,208,167 UART: [ldev] ++
1,208,335 UART: [ldev] CDI.KEYID = 6
1,208,699 UART: [ldev] SUBJECT.KEYID = 5
1,209,126 UART: [ldev] AUTHORITY.KEYID = 7
1,209,589 UART: [ldev] FE.KEYID = 1
1,214,881 UART: [ldev] Erasing FE.KEYID = 1
1,240,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,885 UART: [ldev] --
1,280,355 UART: [fwproc] Wait for Commands...
1,281,138 UART: [fwproc] Recv command 0x46574c44
1,281,871 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,059 UART: ROM Fatal Error: 0x000B0002
1,302,216 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,509 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
890,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,917 UART: [kat] ++
895,069 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,614 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,409 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,479 UART: [idev] ++
1,172,647 UART: [idev] CDI.KEYID = 6
1,173,008 UART: [idev] SUBJECT.KEYID = 7
1,173,433 UART: [idev] UDS.KEYID = 0
1,181,185 UART: [idev] Erasing UDS.KEYID = 0
1,198,083 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,782 UART: [ldev] ++
1,207,950 UART: [ldev] CDI.KEYID = 6
1,208,314 UART: [ldev] SUBJECT.KEYID = 5
1,208,741 UART: [ldev] AUTHORITY.KEYID = 7
1,209,204 UART: [ldev] FE.KEYID = 1
1,214,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,316 UART: ROM Fatal Error: 0x000B0002
1,302,473 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,884 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,518 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,209,146 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,625 UART: [fwproc] Wait for Commands...
1,283,308 UART: [fwproc] Recv command 0x46574c44
1,284,041 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,113 UART: ROM Fatal Error: 0x000B0002
1,304,270 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,675 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,181,275 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,208,006 UART: [ldev] ++
1,208,174 UART: [ldev] CDI.KEYID = 6
1,208,538 UART: [ldev] SUBJECT.KEYID = 5
1,208,965 UART: [ldev] AUTHORITY.KEYID = 7
1,209,428 UART: [ldev] FE.KEYID = 1
1,214,256 UART: [ldev] Erasing FE.KEYID = 1
1,240,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,298 UART: [ldev] --
1,279,612 UART: [fwproc] Wait for Commands...
1,280,429 UART: [fwproc] Recv command 0x46574c44
1,281,162 UART: [fwproc] Recv'd Img size: 114332 bytes
1,300,488 UART: ROM Fatal Error: 0x000B0002
1,301,645 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,450 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,194 UART: [state] WD Timer not started. Device not locked for debugging
88,491 UART: [kat] SHA2-256
892,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,170 UART: [kat] ++
896,322 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,438 UART: [idev] Erasing UDS.KEYID = 0
1,200,106 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,571 UART: ROM Fatal Error: 0x000B0002
1,303,728 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,715 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
890,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,839 UART: [kat] ++
894,991 UART: [kat] sha1
899,255 UART: [kat] SHA2-256
901,195 UART: [kat] SHA2-384
903,742 UART: [kat] SHA2-512-ACC
905,643 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,977 UART: [idev] ++
1,173,145 UART: [idev] CDI.KEYID = 6
1,173,506 UART: [idev] SUBJECT.KEYID = 7
1,173,931 UART: [idev] UDS.KEYID = 0
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,242,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,565 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,250 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,718 >>> mbox cmd response: success
2,989,801 UART: [afmc] ++
2,989,969 UART: [afmc] CDI.KEYID = 6
2,990,332 UART: [afmc] SUBJECT.KEYID = 7
2,990,758 UART: [afmc] AUTHORITY.KEYID = 5
3,026,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,522 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,218 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,117 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,810 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,624 UART: [afmc] --
3,069,716 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,738 UART: [cold-reset] --
3,070,582 UART: [state] Locking Datavault
3,072,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,655 UART: [state] Locking ICCM
3,073,317 UART: [exit] Launching FMC @ 0x40000000
3,078,614 UART:
3,078,630 UART: Running Caliptra FMC ...
3,079,038 UART:
3,079,268 UART: [fmc] Received command: 0x1000000E
3,424,322 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,129 >>> mbox cmd response: success
2,894,214 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,393 UART:
2,900,409 UART: Running Caliptra FMC ...
2,900,817 UART:
2,901,047 UART: [fmc] Received command: 0x1000000E
3,246,101 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,925 UART: [ldev] --
1,281,263 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,917 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,602 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,120 >>> mbox cmd response: success
2,991,331 UART: [afmc] ++
2,991,499 UART: [afmc] CDI.KEYID = 6
2,991,862 UART: [afmc] SUBJECT.KEYID = 7
2,992,288 UART: [afmc] AUTHORITY.KEYID = 5
3,027,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,862 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,558 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,457 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,150 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,132 UART: [afmc] --
3,071,116 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,138 UART: [cold-reset] --
3,071,872 UART: [state] Locking Datavault
3,072,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,361 UART: [state] Locking ICCM
3,074,031 UART: [exit] Launching FMC @ 0x40000000
3,079,328 UART:
3,079,344 UART: Running Caliptra FMC ...
3,079,752 UART:
3,079,982 UART: [fmc] Received command: 0x1000000E
3,425,036 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,837,790 >>> mbox cmd response: success
2,894,679 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,050 UART:
2,901,066 UART: Running Caliptra FMC ...
2,901,474 UART:
2,901,704 UART: [fmc] Received command: 0x1000000E
3,246,758 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
890,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,897 UART: [kat] ++
895,049 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,625 UART: [fht] FHT @ 0x50003400
1,172,227 UART: [idev] ++
1,172,395 UART: [idev] CDI.KEYID = 6
1,172,756 UART: [idev] SUBJECT.KEYID = 7
1,173,181 UART: [idev] UDS.KEYID = 0
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,361 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,218 UART: [ldev] --
1,280,530 UART: [fwproc] Wait for Commands...
1,281,147 UART: [fwproc] Recv command 0x46574c44
1,281,880 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,797,880 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,565 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,113 >>> mbox cmd response: success
2,989,194 UART: [afmc] ++
2,989,362 UART: [afmc] CDI.KEYID = 6
2,989,725 UART: [afmc] SUBJECT.KEYID = 7
2,990,151 UART: [afmc] AUTHORITY.KEYID = 5
3,025,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,863 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,559 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,458 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,151 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,205 UART: [afmc] --
3,069,171 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,193 UART: [cold-reset] --
3,069,863 UART: [state] Locking Datavault
3,071,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,724 UART: [state] Locking ICCM
3,072,222 UART: [exit] Launching FMC @ 0x40000000
3,077,519 UART:
3,077,535 UART: Running Caliptra FMC ...
3,077,943 UART:
3,078,173 UART: [fmc] Received command: 0x1000000E
3,423,227 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,151 >>> mbox cmd response: success
2,895,886 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,697 UART:
2,901,713 UART: Running Caliptra FMC ...
2,902,121 UART:
2,902,351 UART: [fmc] Received command: 0x1000000E
3,247,405 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,524 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,942 UART: [idev] ++
1,174,110 UART: [idev] CDI.KEYID = 6
1,174,471 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,503 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,001 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,747 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,535 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,220 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,792 >>> mbox cmd response: success
2,991,929 UART: [afmc] ++
2,992,097 UART: [afmc] CDI.KEYID = 6
2,992,460 UART: [afmc] SUBJECT.KEYID = 7
2,992,886 UART: [afmc] AUTHORITY.KEYID = 5
3,028,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,045,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,790 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,486 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,385 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,063,078 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,862 UART: [afmc] --
3,071,774 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,796 UART: [cold-reset] --
3,072,568 UART: [state] Locking Datavault
3,073,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,355 UART: [state] Locking ICCM
3,074,979 UART: [exit] Launching FMC @ 0x40000000
3,080,276 UART:
3,080,292 UART: Running Caliptra FMC ...
3,080,700 UART:
3,080,930 UART: [fmc] Received command: 0x1000000E
3,425,984 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,634 >>> mbox cmd response: success
2,896,609 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,592 UART:
2,902,608 UART: Running Caliptra FMC ...
2,903,016 UART:
2,903,246 UART: [fmc] Received command: 0x1000000E
3,248,300 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,474 UART: [kat] HMAC-384Kdf
919,990 UART: [kat] LMS
1,168,302 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,683 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,482 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,597 UART: [fwproc] Recv command 0x46574c44
1,282,330 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,000 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,685 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,185 >>> mbox cmd response: success
2,989,292 UART: [afmc] ++
2,989,460 UART: [afmc] CDI.KEYID = 6
2,989,823 UART: [afmc] SUBJECT.KEYID = 7
2,990,249 UART: [afmc] AUTHORITY.KEYID = 5
3,025,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,571 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,267 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,166 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,059,859 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,823 UART: [afmc] --
3,068,731 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,068,753 UART: [cold-reset] --
3,069,385 UART: [state] Locking Datavault
3,070,442 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,046 UART: [state] Locking ICCM
3,071,638 UART: [exit] Launching FMC @ 0x40000000
3,076,935 UART:
3,076,951 UART: Running Caliptra FMC ...
3,077,359 UART:
3,077,589 UART: [fmc] Received command: 0x1000000E
3,422,643 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,923 >>> mbox cmd response: success
2,895,738 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,441 UART:
2,901,457 UART: Running Caliptra FMC ...
2,901,865 UART:
2,902,095 UART: [fmc] Received command: 0x1000000E
3,247,149 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
905,113 UART: [kat] SHA2-512-ACC
907,014 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,136 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,236 UART: [fwproc] Recv command 0x46574c44
1,283,969 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,135 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,820 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,298 >>> mbox cmd response: success
2,991,537 UART: [afmc] ++
2,991,705 UART: [afmc] CDI.KEYID = 6
2,992,068 UART: [afmc] SUBJECT.KEYID = 7
2,992,494 UART: [afmc] AUTHORITY.KEYID = 5
3,028,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,045,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,770 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,466 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,365 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,063,058 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,071,046 UART: [afmc] --
3,071,972 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,994 UART: [cold-reset] --
3,072,874 UART: [state] Locking Datavault
3,073,897 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,501 UART: [state] Locking ICCM
3,075,121 UART: [exit] Launching FMC @ 0x40000000
3,080,418 UART:
3,080,434 UART: Running Caliptra FMC ...
3,080,842 UART:
3,081,072 UART: [fmc] Received command: 0x1000000E
3,426,126 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,758 >>> mbox cmd response: success
2,896,771 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,834 UART:
2,902,850 UART: Running Caliptra FMC ...
2,903,258 UART:
2,903,488 UART: [fmc] Received command: 0x1000000E
3,248,542 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,182,395 UART: [idev] Erasing UDS.KEYID = 0
1,199,027 UART: [idev] Sha1 KeyId Algorithm
1,207,799 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,242,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,617 UART: ROM Fatal Error: 0x000B0007
1,307,774 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,855 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,086 UART: [fht] FHT @ 0x50003400
1,173,868 UART: [idev] ++
1,174,036 UART: [idev] CDI.KEYID = 6
1,174,397 UART: [idev] SUBJECT.KEYID = 7
1,174,822 UART: [idev] UDS.KEYID = 0
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,419 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,398 UART: [fwproc] Recv command 0x46574c44
1,282,131 UART: [fwproc] Recv'd Img size: 114332 bytes
1,305,536 UART: ROM Fatal Error: 0x000B0007
1,306,693 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,412 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,478 UART: [kat] HMAC-384Kdf
919,870 UART: [kat] LMS
1,168,182 UART: [kat] --
1,169,087 UART: [cold-reset] ++
1,169,549 UART: [fht] FHT @ 0x50003400
1,172,277 UART: [idev] ++
1,172,445 UART: [idev] CDI.KEYID = 6
1,172,806 UART: [idev] SUBJECT.KEYID = 7
1,173,231 UART: [idev] UDS.KEYID = 0
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,240,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,330 UART: [ldev] --
1,279,692 UART: [fwproc] Wait for Commands...
1,280,307 UART: [fwproc] Recv command 0x46574c44
1,281,040 UART: [fwproc] Recv'd Img size: 114332 bytes
1,305,131 UART: ROM Fatal Error: 0x000B0007
1,306,288 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,623 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,403 UART: [kat] SHA2-256
890,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,082 UART: [kat] ++
895,234 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,185 UART: [kat] SHA2-512-ACC
906,086 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,599 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,178 UART: ROM Fatal Error: 0x000B0007
1,307,335 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,492 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,521 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,182,471 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,845 UART: [idev] --
1,209,778 UART: [ldev] ++
1,209,946 UART: [ldev] CDI.KEYID = 6
1,210,310 UART: [ldev] SUBJECT.KEYID = 5
1,210,737 UART: [ldev] AUTHORITY.KEYID = 7
1,211,200 UART: [ldev] FE.KEYID = 1
1,216,608 UART: [ldev] Erasing FE.KEYID = 1
1,242,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,534 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,515 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,847 UART: ROM Fatal Error: 0x000B0007
1,308,004 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,411 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,063 UART: [state] LifecycleState = Unprovisioned
86,718 UART: [state] DebugLocked = No
87,394 UART: [state] WD Timer not started. Device not locked for debugging
88,675 UART: [kat] SHA2-256
892,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,354 UART: [kat] ++
896,506 UART: [kat] sha1
900,702 UART: [kat] SHA2-256
902,642 UART: [kat] SHA2-384
905,409 UART: [kat] SHA2-512-ACC
907,310 UART: [kat] ECC-384
917,597 UART: [kat] HMAC-384Kdf
922,133 UART: [kat] LMS
1,170,445 UART: [kat] --
1,171,308 UART: [cold-reset] ++
1,171,650 UART: [fht] FHT @ 0x50003400
1,174,290 UART: [idev] ++
1,174,458 UART: [idev] CDI.KEYID = 6
1,174,819 UART: [idev] SUBJECT.KEYID = 7
1,175,244 UART: [idev] UDS.KEYID = 0
1,183,560 UART: [idev] Erasing UDS.KEYID = 0
1,200,640 UART: [idev] Sha1 KeyId Algorithm
1,209,698 UART: [idev] --
1,210,791 UART: [ldev] ++
1,210,959 UART: [ldev] CDI.KEYID = 6
1,211,323 UART: [ldev] SUBJECT.KEYID = 5
1,211,750 UART: [ldev] AUTHORITY.KEYID = 7
1,212,213 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,573 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,399 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,492 UART: ROM Fatal Error: 0x000B0007
1,308,649 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,812 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,903 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,851 UART: [kat] ++
895,003 UART: [kat] sha1
899,185 UART: [kat] SHA2-256
901,125 UART: [kat] SHA2-384
903,832 UART: [kat] SHA2-512-ACC
905,733 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,150 UART: [kat] LMS
1,168,462 UART: [kat] --
1,169,137 UART: [cold-reset] ++
1,169,511 UART: [fht] FHT @ 0x50003400
1,172,179 UART: [idev] ++
1,172,347 UART: [idev] CDI.KEYID = 6
1,172,708 UART: [idev] SUBJECT.KEYID = 7
1,173,133 UART: [idev] UDS.KEYID = 0
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,506 UART: [ldev] ++
1,208,674 UART: [ldev] CDI.KEYID = 6
1,209,038 UART: [ldev] SUBJECT.KEYID = 5
1,209,465 UART: [ldev] AUTHORITY.KEYID = 7
1,209,928 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,280,984 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,568 UART: ROM Fatal Error: 0x000B0008
1,308,725 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,244 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,466 UART: [idev] Erasing UDS.KEYID = 0
1,198,428 UART: [idev] Sha1 KeyId Algorithm
1,207,552 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,103 UART: [ldev] SUBJECT.KEYID = 5
1,209,530 UART: [ldev] AUTHORITY.KEYID = 7
1,209,993 UART: [ldev] FE.KEYID = 1
1,215,069 UART: [ldev] Erasing FE.KEYID = 1
1,241,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,285 UART: [ldev] --
1,280,579 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,123 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,967 UART: ROM Fatal Error: 0x000B0008
1,308,124 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,475 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,197,859 UART: [idev] Sha1 KeyId Algorithm
1,206,587 UART: [idev] --
1,207,602 UART: [ldev] ++
1,207,770 UART: [ldev] CDI.KEYID = 6
1,208,134 UART: [ldev] SUBJECT.KEYID = 5
1,208,561 UART: [ldev] AUTHORITY.KEYID = 7
1,209,024 UART: [ldev] FE.KEYID = 1
1,214,102 UART: [ldev] Erasing FE.KEYID = 1
1,240,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,644 UART: [ldev] --
1,280,112 UART: [fwproc] Wait for Commands...
1,280,899 UART: [fwproc] Recv command 0x46574c44
1,281,632 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,988 UART: ROM Fatal Error: 0x000B0008
1,308,145 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,640 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,047 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,481 UART: ROM Fatal Error: 0x000B0008
1,309,638 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,007 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,181,855 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,706 UART: [fwproc] Wait for Commands...
1,281,449 UART: [fwproc] Recv command 0x46574c44
1,282,182 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,860 UART: ROM Fatal Error: 0x000B0008
1,308,017 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,822 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,244 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,814 UART: [idev] ++
1,172,982 UART: [idev] CDI.KEYID = 6
1,173,343 UART: [idev] SUBJECT.KEYID = 7
1,173,768 UART: [idev] UDS.KEYID = 0
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,208,841 UART: [ldev] ++
1,209,009 UART: [ldev] CDI.KEYID = 6
1,209,373 UART: [ldev] SUBJECT.KEYID = 5
1,209,800 UART: [ldev] AUTHORITY.KEYID = 7
1,210,263 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,734 UART: [fwproc] Recv command 0x46574c44
1,282,467 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,327 UART: ROM Fatal Error: 0x000B0008
1,308,484 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,177 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,386 UART: [kat] HMAC-384Kdf
920,078 UART: [kat] LMS
1,168,390 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,240,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,434 UART: [ldev] --
1,279,854 UART: [fwproc] Wait for Commands...
1,280,649 UART: [fwproc] Recv command 0x46574c44
1,281,382 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,236 UART: ROM Fatal Error: 0x000B0009
1,307,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,208,453 UART: [idev] --
1,209,684 UART: [ldev] ++
1,209,852 UART: [ldev] CDI.KEYID = 6
1,210,216 UART: [ldev] SUBJECT.KEYID = 5
1,210,643 UART: [ldev] AUTHORITY.KEYID = 7
1,211,106 UART: [ldev] FE.KEYID = 1
1,216,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,064 UART: [ldev] --
1,281,368 UART: [fwproc] Wait for Commands...
1,282,135 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,832 UART: ROM Fatal Error: 0x000B0009
1,308,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,181,433 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,830 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,815 UART: [fwproc] Recv command 0x46574c44
1,281,548 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,186 UART: ROM Fatal Error: 0x000B0009
1,308,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,197,859 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,281,118 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,810 >>> mbox cmd response: success
2,772,883 UART: [afmc] ++
2,773,051 UART: [afmc] CDI.KEYID = 6
2,773,414 UART: [afmc] SUBJECT.KEYID = 7
2,773,840 UART: [afmc] AUTHORITY.KEYID = 5
2,809,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,466 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,179 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,088 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,802 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,497 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,700 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,169,834 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,209,133 UART: [ldev] ++
1,209,301 UART: [ldev] CDI.KEYID = 6
1,209,665 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,285 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,699 UART: ROM Fatal Error: 0x000B0009
1,309,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,633 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,621 UART: ROM Fatal Error: 0x000B0009
1,310,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,182,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,953 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,269 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,157 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,203 UART: ROM Fatal Error: 0x000B0009
1,310,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,709 UART: [kat] HMAC-384Kdf
921,365 UART: [kat] LMS
1,169,677 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,185 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,627 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,293 >>> mbox cmd response: success
2,774,474 UART: [afmc] ++
2,774,642 UART: [afmc] CDI.KEYID = 6
2,775,005 UART: [afmc] SUBJECT.KEYID = 7
2,775,431 UART: [afmc] AUTHORITY.KEYID = 5
2,810,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,771 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,484 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,393 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,107 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,962 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,921 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,348 UART: [kat] HMAC-384Kdf
919,822 UART: [kat] LMS
1,168,134 UART: [kat] --
1,168,805 UART: [cold-reset] ++
1,169,137 UART: [fht] FHT @ 0x50003400
1,171,867 UART: [idev] ++
1,172,035 UART: [idev] CDI.KEYID = 6
1,172,396 UART: [idev] SUBJECT.KEYID = 7
1,172,821 UART: [idev] UDS.KEYID = 0
1,180,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,015 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,148 UART: [ldev] ++
1,208,316 UART: [ldev] CDI.KEYID = 6
1,208,680 UART: [ldev] SUBJECT.KEYID = 5
1,209,107 UART: [ldev] AUTHORITY.KEYID = 7
1,209,570 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,118 UART: [ldev] --
1,280,440 UART: [fwproc] Wait for Commands...
1,281,033 UART: [fwproc] Recv command 0x46574c44
1,281,766 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,918 UART: ROM Fatal Error: 0x000B0009
1,308,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,735 UART: [fht] FHT @ 0x50003400
1,172,295 UART: [idev] ++
1,172,463 UART: [idev] CDI.KEYID = 6
1,172,824 UART: [idev] SUBJECT.KEYID = 7
1,173,249 UART: [idev] UDS.KEYID = 0
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,355 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,452 UART: [ldev] ++
1,208,620 UART: [ldev] CDI.KEYID = 6
1,208,984 UART: [ldev] SUBJECT.KEYID = 5
1,209,411 UART: [ldev] AUTHORITY.KEYID = 7
1,209,874 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,240,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,002 UART: [ldev] --
1,280,374 UART: [fwproc] Wait for Commands...
1,281,145 UART: [fwproc] Recv command 0x46574c44
1,281,878 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,758 UART: ROM Fatal Error: 0x000B0009
1,307,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,217 UART: [cold-reset] ++
1,169,783 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,157 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,243,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,074 UART: [ldev] --
1,282,474 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,872 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,946 UART: ROM Fatal Error: 0x000B0009
1,310,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,215,118 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,498 UART: [fwproc] Wait for Commands...
1,281,225 UART: [fwproc] Recv command 0x46574c44
1,281,958 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,488 >>> mbox cmd response: success
2,773,747 UART: [afmc] ++
2,773,915 UART: [afmc] CDI.KEYID = 6
2,774,278 UART: [afmc] SUBJECT.KEYID = 7
2,774,704 UART: [afmc] AUTHORITY.KEYID = 5
2,810,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,654 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,367 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,276 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,990 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,689 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,408 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
890,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,441 UART: [ldev] SUBJECT.KEYID = 5
1,209,868 UART: [ldev] AUTHORITY.KEYID = 7
1,210,331 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,393 UART: [fwproc] Wait for Commands...
1,283,208 UART: [fwproc] Recv command 0x46574c44
1,283,941 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,063 UART: ROM Fatal Error: 0x000B0009
1,310,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,595 UART: [ldev] ++
1,208,763 UART: [ldev] CDI.KEYID = 6
1,209,127 UART: [ldev] SUBJECT.KEYID = 5
1,209,554 UART: [ldev] AUTHORITY.KEYID = 7
1,210,017 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,241,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,021 UART: [ldev] --
1,280,421 UART: [fwproc] Wait for Commands...
1,281,018 UART: [fwproc] Recv command 0x46574c44
1,281,751 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,129 UART: ROM Fatal Error: 0x000B0009
1,308,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,673 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,109 UART: ROM Fatal Error: 0x000B0009
1,310,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,431 UART: [kat] LMS
1,169,743 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,171,112 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,612 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,282,958 UART: [fwproc] Recv command 0x46574c44
1,283,691 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,305 >>> mbox cmd response: success
2,773,506 UART: [afmc] ++
2,773,674 UART: [afmc] CDI.KEYID = 6
2,774,037 UART: [afmc] SUBJECT.KEYID = 7
2,774,463 UART: [afmc] AUTHORITY.KEYID = 5
2,809,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,621 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,334 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,243 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,957 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,786 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,983 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
920,026 UART: [kat] LMS
1,168,338 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,638 UART: [ldev] Erasing FE.KEYID = 1
1,240,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,650 UART: [ldev] --
1,280,120 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,436 UART: ROM Fatal Error: 0x000B0009
1,307,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,526 UART: [kat] HMAC-384Kdf
919,996 UART: [kat] LMS
1,168,308 UART: [kat] --
1,169,097 UART: [cold-reset] ++
1,169,645 UART: [fht] FHT @ 0x50003400
1,172,143 UART: [idev] ++
1,172,311 UART: [idev] CDI.KEYID = 6
1,172,672 UART: [idev] SUBJECT.KEYID = 7
1,173,097 UART: [idev] UDS.KEYID = 0
1,181,009 UART: [idev] Erasing UDS.KEYID = 0
1,197,467 UART: [idev] Sha1 KeyId Algorithm
1,206,273 UART: [idev] --
1,207,332 UART: [ldev] ++
1,207,500 UART: [ldev] CDI.KEYID = 6
1,207,864 UART: [ldev] SUBJECT.KEYID = 5
1,208,291 UART: [ldev] AUTHORITY.KEYID = 7
1,208,754 UART: [ldev] FE.KEYID = 1
1,214,072 UART: [ldev] Erasing FE.KEYID = 1
1,240,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,532 UART: [fwproc] Wait for Commands...
1,280,127 UART: [fwproc] Recv command 0x46574c44
1,280,860 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,588 UART: ROM Fatal Error: 0x000B0009
1,307,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,407 UART: [kat] SHA2-256
901,347 UART: [kat] SHA2-384
903,896 UART: [kat] SHA2-512-ACC
905,797 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,197,971 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,578 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,968 UART: [ldev] --
1,280,396 UART: [fwproc] Wait for Commands...
1,281,201 UART: [fwproc] Recv command 0x46574c44
1,281,934 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,114 UART: ROM Fatal Error: 0x000B0009
1,308,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,717 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,415 UART: [fwproc] Recv command 0x46574c44
1,282,148 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,386 >>> mbox cmd response: success
2,772,625 UART: [afmc] ++
2,772,793 UART: [afmc] CDI.KEYID = 6
2,773,156 UART: [afmc] SUBJECT.KEYID = 7
2,773,582 UART: [afmc] AUTHORITY.KEYID = 5
2,808,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,928 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,641 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,550 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,264 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,949 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,012 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,069 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,729 UART: ROM Fatal Error: 0x000B0009
1,309,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
891,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,508 UART: [kat] SHA2-256
902,448 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
921,227 UART: [kat] LMS
1,169,539 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,209,995 UART: [ldev] ++
1,210,163 UART: [ldev] CDI.KEYID = 6
1,210,527 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,547 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,503 UART: ROM Fatal Error: 0x000B0009
1,308,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
890,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,622 UART: [idev] ++
1,172,790 UART: [idev] CDI.KEYID = 6
1,173,151 UART: [idev] SUBJECT.KEYID = 7
1,173,576 UART: [idev] UDS.KEYID = 0
1,181,612 UART: [idev] Erasing UDS.KEYID = 0
1,198,598 UART: [idev] Sha1 KeyId Algorithm
1,207,312 UART: [idev] --
1,208,141 UART: [ldev] ++
1,208,309 UART: [ldev] CDI.KEYID = 6
1,208,673 UART: [ldev] SUBJECT.KEYID = 5
1,209,100 UART: [ldev] AUTHORITY.KEYID = 7
1,209,563 UART: [ldev] FE.KEYID = 1
1,214,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,037 UART: [fwproc] Wait for Commands...
1,281,852 UART: [fwproc] Recv command 0x46574c44
1,282,585 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,859 UART: ROM Fatal Error: 0x000B0009
1,309,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,845 UART: [kat] HMAC-384Kdf
921,619 UART: [kat] LMS
1,169,931 UART: [kat] --
1,170,572 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,328 UART: [idev] Sha1 KeyId Algorithm
1,209,244 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,244,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,197 UART: [ldev] --
1,283,555 UART: [fwproc] Wait for Commands...
1,284,274 UART: [fwproc] Recv command 0x46574c44
1,285,007 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,877 >>> mbox cmd response: success
2,775,112 UART: [afmc] ++
2,775,280 UART: [afmc] CDI.KEYID = 6
2,775,643 UART: [afmc] SUBJECT.KEYID = 7
2,776,069 UART: [afmc] AUTHORITY.KEYID = 5
2,811,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,921 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,634 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,543 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,257 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,136 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,275 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,178 UART: [kat] LMS
1,168,490 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,739 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,044 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,568 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,157 >>> mbox cmd response: success
2,773,266 UART: [afmc] ++
2,773,434 UART: [afmc] CDI.KEYID = 6
2,773,797 UART: [afmc] SUBJECT.KEYID = 7
2,774,223 UART: [afmc] AUTHORITY.KEYID = 5
2,809,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,005 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,573 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,207,994 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,241,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,369 UART: [ldev] --
1,280,661 UART: [fwproc] Wait for Commands...
1,281,376 UART: [fwproc] Recv command 0x46574c44
1,282,109 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,514 >>> mbox cmd response: success
2,772,575 UART: [afmc] ++
2,772,743 UART: [afmc] CDI.KEYID = 6
2,773,106 UART: [afmc] SUBJECT.KEYID = 7
2,773,532 UART: [afmc] AUTHORITY.KEYID = 5
2,808,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,798 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,088 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,445 UART: [kat] SHA2-256
901,385 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,654 UART: [kat] HMAC-384Kdf
920,192 UART: [kat] LMS
1,168,504 UART: [kat] --
1,169,219 UART: [cold-reset] ++
1,169,553 UART: [fht] FHT @ 0x50003400
1,172,211 UART: [idev] ++
1,172,379 UART: [idev] CDI.KEYID = 6
1,172,740 UART: [idev] SUBJECT.KEYID = 7
1,173,165 UART: [idev] UDS.KEYID = 0
1,181,033 UART: [idev] Erasing UDS.KEYID = 0
1,197,683 UART: [idev] Sha1 KeyId Algorithm
1,206,569 UART: [idev] --
1,207,596 UART: [ldev] ++
1,207,764 UART: [ldev] CDI.KEYID = 6
1,208,128 UART: [ldev] SUBJECT.KEYID = 5
1,208,555 UART: [ldev] AUTHORITY.KEYID = 7
1,209,018 UART: [ldev] FE.KEYID = 1
1,214,342 UART: [ldev] Erasing FE.KEYID = 1
1,240,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,236 UART: [ldev] --
1,279,534 UART: [fwproc] Wait for Commands...
1,280,199 UART: [fwproc] Recv command 0x46574c44
1,280,932 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,355 >>> mbox cmd response: success
2,771,570 UART: [afmc] ++
2,771,738 UART: [afmc] CDI.KEYID = 6
2,772,101 UART: [afmc] SUBJECT.KEYID = 7
2,772,527 UART: [afmc] AUTHORITY.KEYID = 5
2,807,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,245 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,673 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,182,486 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,449 UART: [ldev] --
1,282,743 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,089 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,136 >>> mbox cmd response: success
2,776,179 UART: [afmc] ++
2,776,347 UART: [afmc] CDI.KEYID = 6
2,776,710 UART: [afmc] SUBJECT.KEYID = 7
2,777,136 UART: [afmc] AUTHORITY.KEYID = 5
2,812,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,410 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,118 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,822 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,931 UART: [state] WD Timer not started. Device not locked for debugging
88,220 UART: [kat] SHA2-256
891,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,899 UART: [kat] ++
896,051 UART: [kat] sha1
900,349 UART: [kat] SHA2-256
902,289 UART: [kat] SHA2-384
904,896 UART: [kat] SHA2-512-ACC
906,797 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,571 UART: [cold-reset] ++
1,171,121 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,182,681 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,467 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,216,260 UART: [ldev] Erasing FE.KEYID = 1
1,243,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,970 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,037 UART: [fwproc] Recv command 0x46574c44
1,283,770 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,243 >>> mbox cmd response: success
2,774,418 UART: [afmc] ++
2,774,586 UART: [afmc] CDI.KEYID = 6
2,774,949 UART: [afmc] SUBJECT.KEYID = 7
2,775,375 UART: [afmc] AUTHORITY.KEYID = 5
2,810,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,147 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,169 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,741 UART: [state] LifecycleState = Unprovisioned
85,396 UART: [state] DebugLocked = No
86,068 UART: [state] WD Timer not started. Device not locked for debugging
87,253 UART: [kat] SHA2-256
890,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,378 UART: [kat] SHA2-256
901,318 UART: [kat] SHA2-384
904,061 UART: [kat] SHA2-512-ACC
905,962 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,281,909 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,265 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,878 >>> mbox cmd response: success
2,773,937 UART: [afmc] ++
2,774,105 UART: [afmc] CDI.KEYID = 6
2,774,468 UART: [afmc] SUBJECT.KEYID = 7
2,774,894 UART: [afmc] AUTHORITY.KEYID = 5
2,810,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,830 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,092 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
Truncated 104976 bytes from beginning
4
1,281,496 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,464 >>> mbox cmd response: success
2,771,625 UART: [afmc] ++
2,771,793 UART: [afmc] CDI.KEYID = 6
2,772,156 UART: [afmc] SUBJECT.KEYID = 7
2,772,582 UART: [afmc] AUTHORITY.KEYID = 5
2,807,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,090 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,803 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,712 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,426 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,117 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,197,991 UART: [idev] Sha1 KeyId Algorithm
1,206,753 UART: [idev] --
1,207,714 UART: [ldev] ++
1,207,882 UART: [ldev] CDI.KEYID = 6
1,208,246 UART: [ldev] SUBJECT.KEYID = 5
1,208,673 UART: [ldev] AUTHORITY.KEYID = 7
1,209,136 UART: [ldev] FE.KEYID = 1
1,214,128 UART: [ldev] Erasing FE.KEYID = 1
1,240,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,326 UART: [ldev] --
1,279,824 UART: [fwproc] Wait for Commands...
1,280,461 UART: [fwproc] Recv command 0x46574c44
1,281,194 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,140 >>> mbox cmd response: success
2,773,399 UART: [afmc] ++
2,773,567 UART: [afmc] CDI.KEYID = 6
2,773,930 UART: [afmc] SUBJECT.KEYID = 7
2,774,356 UART: [afmc] AUTHORITY.KEYID = 5
2,809,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,090 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,803 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,712 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,426 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,353 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,480 UART: [ldev] Erasing FE.KEYID = 1
1,242,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,936 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x46574c44
1,282,708 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,068 >>> mbox cmd response: success
2,774,321 UART: [afmc] ++
2,774,489 UART: [afmc] CDI.KEYID = 6
2,774,852 UART: [afmc] SUBJECT.KEYID = 7
2,775,278 UART: [afmc] AUTHORITY.KEYID = 5
2,810,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,674 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,387 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,296 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,010 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,885 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,571 UART: [idev] ++
1,172,739 UART: [idev] CDI.KEYID = 6
1,173,100 UART: [idev] SUBJECT.KEYID = 7
1,173,525 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,387 UART: [idev] Sha1 KeyId Algorithm
1,207,349 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,799 UART: [fwproc] Recv command 0x46574c44
1,282,532 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,628 >>> mbox cmd response: success
2,773,761 UART: [afmc] ++
2,773,929 UART: [afmc] CDI.KEYID = 6
2,774,292 UART: [afmc] SUBJECT.KEYID = 7
2,774,718 UART: [afmc] AUTHORITY.KEYID = 5
2,810,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,142 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,855 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,764 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,478 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,345 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.98s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,272 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,324 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,550 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,496 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,574 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,038 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,010 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,966 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,582 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,564 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,226 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,078 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,394 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,704 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,198 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,266 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,772 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,149 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,170 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,804 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,602 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.90s
Truncated 104976 bytes from beginning
4
1,283,339 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,161 >>> mbox cmd response: success
2,775,390 UART: [afmc] ++
2,775,558 UART: [afmc] CDI.KEYID = 6
2,775,921 UART: [afmc] SUBJECT.KEYID = 7
2,776,347 UART: [afmc] AUTHORITY.KEYID = 5
2,811,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,709 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,422 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,331 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,045 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,908 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,550 UART: [kat] SHA2-256
901,490 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,181,230 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,214,971 UART: [ldev] Erasing FE.KEYID = 1
1,241,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,353 UART: [ldev] --
1,280,645 UART: [fwproc] Wait for Commands...
1,281,294 UART: [fwproc] Recv command 0x46574c44
1,282,027 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,825 >>> mbox cmd response: success
2,772,892 UART: [afmc] ++
2,773,060 UART: [afmc] CDI.KEYID = 6
2,773,423 UART: [afmc] SUBJECT.KEYID = 7
2,773,849 UART: [afmc] AUTHORITY.KEYID = 5
2,809,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,933 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,646 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,555 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,269 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,014 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,237 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,625 >>> mbox cmd response: success
2,774,684 UART: [afmc] ++
2,774,852 UART: [afmc] CDI.KEYID = 6
2,775,215 UART: [afmc] SUBJECT.KEYID = 7
2,775,641 UART: [afmc] AUTHORITY.KEYID = 5
2,811,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,133 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,846 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,755 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,469 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,126 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,181,758 UART: [idev] Erasing UDS.KEYID = 0
1,198,896 UART: [idev] Sha1 KeyId Algorithm
1,207,772 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,883 >>> mbox cmd response: success
2,773,124 UART: [afmc] ++
2,773,292 UART: [afmc] CDI.KEYID = 6
2,773,655 UART: [afmc] SUBJECT.KEYID = 7
2,774,081 UART: [afmc] AUTHORITY.KEYID = 5
2,809,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,739 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,452 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,361 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,075 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,058 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.66s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,393 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,875 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,001 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,163 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,377 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,005 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,649 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,795 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,477 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,125 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,315 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,557 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,985 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,941 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,227 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,188 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,563 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,955 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,047 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,177 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,229 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.55s
Truncated 104976 bytes from beginning
4
1,281,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,872 >>> mbox cmd response: success
2,771,943 UART: [afmc] ++
2,772,111 UART: [afmc] CDI.KEYID = 6
2,772,474 UART: [afmc] SUBJECT.KEYID = 7
2,772,900 UART: [afmc] AUTHORITY.KEYID = 5
2,808,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,186 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,899 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,808 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,522 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,303 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,207,951 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,664 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,961 UART: [fwproc] Recv command 0x46574c44
1,282,694 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,702 >>> mbox cmd response: success
2,772,725 UART: [afmc] ++
2,772,893 UART: [afmc] CDI.KEYID = 6
2,773,256 UART: [afmc] SUBJECT.KEYID = 7
2,773,682 UART: [afmc] AUTHORITY.KEYID = 5
2,808,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,556 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,269 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,178 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,892 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,665 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,047 UART: [kat] ++
895,199 UART: [kat] sha1
899,299 UART: [kat] SHA2-256
901,239 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
915,302 UART: [kat] HMAC-384Kdf
919,984 UART: [kat] LMS
1,168,296 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,791 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,181,189 UART: [idev] Erasing UDS.KEYID = 0
1,197,431 UART: [idev] Sha1 KeyId Algorithm
1,206,345 UART: [idev] --
1,207,420 UART: [ldev] ++
1,207,588 UART: [ldev] CDI.KEYID = 6
1,207,952 UART: [ldev] SUBJECT.KEYID = 5
1,208,379 UART: [ldev] AUTHORITY.KEYID = 7
1,208,842 UART: [ldev] FE.KEYID = 1
1,214,006 UART: [ldev] Erasing FE.KEYID = 1
1,240,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,100 UART: [ldev] --
1,279,524 UART: [fwproc] Wait for Commands...
1,280,303 UART: [fwproc] Recv command 0x46574c44
1,281,036 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,986 >>> mbox cmd response: success
2,772,089 UART: [afmc] ++
2,772,257 UART: [afmc] CDI.KEYID = 6
2,772,620 UART: [afmc] SUBJECT.KEYID = 7
2,773,046 UART: [afmc] AUTHORITY.KEYID = 5
2,808,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,710 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,423 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,332 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,046 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,817 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
903,972 UART: [kat] SHA2-512-ACC
905,873 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,671 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,871 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,242,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,236 UART: [ldev] --
1,281,588 UART: [fwproc] Wait for Commands...
1,282,209 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,062 >>> mbox cmd response: success
2,772,105 UART: [afmc] ++
2,772,273 UART: [afmc] CDI.KEYID = 6
2,772,636 UART: [afmc] SUBJECT.KEYID = 7
2,773,062 UART: [afmc] AUTHORITY.KEYID = 5
2,808,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,896 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,609 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,518 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,232 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,113 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.69s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,774 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,890 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,394 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,148 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,126 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,558 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,418 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,984 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,208 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,342 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,952 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,520 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,476 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,060 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,052 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,446 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,582 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,290 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,002 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,675 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,814 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.54s
Truncated 104976 bytes from beginning
4
1,282,807 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,079 >>> mbox cmd response: success
2,774,176 UART: [afmc] ++
2,774,344 UART: [afmc] CDI.KEYID = 6
2,774,707 UART: [afmc] SUBJECT.KEYID = 7
2,775,133 UART: [afmc] AUTHORITY.KEYID = 5
2,810,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,287 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,000 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,909 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,623 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,250 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,130 UART: [kat] SHA2-256
902,070 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,207,836 UART: [idev] --
1,208,805 UART: [ldev] ++
1,208,973 UART: [ldev] CDI.KEYID = 6
1,209,337 UART: [ldev] SUBJECT.KEYID = 5
1,209,764 UART: [ldev] AUTHORITY.KEYID = 7
1,210,227 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,055 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,327 >>> mbox cmd response: success
2,773,440 UART: [afmc] ++
2,773,608 UART: [afmc] CDI.KEYID = 6
2,773,971 UART: [afmc] SUBJECT.KEYID = 7
2,774,397 UART: [afmc] AUTHORITY.KEYID = 5
2,809,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,187 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,900 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,809 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,523 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,484 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
905,037 UART: [kat] SHA2-512-ACC
906,938 UART: [kat] ECC-384
916,987 UART: [kat] HMAC-384Kdf
921,595 UART: [kat] LMS
1,169,907 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,334 UART: [fht] FHT @ 0x50003400
1,173,904 UART: [idev] ++
1,174,072 UART: [idev] CDI.KEYID = 6
1,174,433 UART: [idev] SUBJECT.KEYID = 7
1,174,858 UART: [idev] UDS.KEYID = 0
1,183,286 UART: [idev] Erasing UDS.KEYID = 0
1,200,182 UART: [idev] Sha1 KeyId Algorithm
1,208,882 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,807 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,062 >>> mbox cmd response: success
2,773,101 UART: [afmc] ++
2,773,269 UART: [afmc] CDI.KEYID = 6
2,773,632 UART: [afmc] SUBJECT.KEYID = 7
2,774,058 UART: [afmc] AUTHORITY.KEYID = 5
2,809,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,596 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,309 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,218 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,932 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,767 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,172,936 UART: [idev] ++
1,173,104 UART: [idev] CDI.KEYID = 6
1,173,465 UART: [idev] SUBJECT.KEYID = 7
1,173,890 UART: [idev] UDS.KEYID = 0
1,181,820 UART: [idev] Erasing UDS.KEYID = 0
1,198,628 UART: [idev] Sha1 KeyId Algorithm
1,207,586 UART: [idev] --
1,208,585 UART: [ldev] ++
1,208,753 UART: [ldev] CDI.KEYID = 6
1,209,117 UART: [ldev] SUBJECT.KEYID = 5
1,209,544 UART: [ldev] AUTHORITY.KEYID = 7
1,210,007 UART: [ldev] FE.KEYID = 1
1,215,291 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,953 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,849 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,183 >>> mbox cmd response: success
2,775,420 UART: [afmc] ++
2,775,588 UART: [afmc] CDI.KEYID = 6
2,775,951 UART: [afmc] SUBJECT.KEYID = 7
2,776,377 UART: [afmc] AUTHORITY.KEYID = 5
2,811,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,633 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,346 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,255 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,969 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,888 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.99s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,531 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,475 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,077 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,952 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,113 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,981 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,945 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,913 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,957 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,433 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,913 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,057 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,719 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,201 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,521 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,209 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,217 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,085 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,432 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,511 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,009 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.42s
Truncated 104976 bytes from beginning
4
1,282,938 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,280 >>> mbox cmd response: success
2,774,495 UART: [afmc] ++
2,774,663 UART: [afmc] CDI.KEYID = 6
2,775,026 UART: [afmc] SUBJECT.KEYID = 7
2,775,452 UART: [afmc] AUTHORITY.KEYID = 5
2,810,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,722 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,435 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,344 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,058 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,889 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,369 UART: [idev] ++
1,172,537 UART: [idev] CDI.KEYID = 6
1,172,898 UART: [idev] SUBJECT.KEYID = 7
1,173,323 UART: [idev] UDS.KEYID = 0
1,181,303 UART: [idev] Erasing UDS.KEYID = 0
1,198,271 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,564 UART: [ldev] --
1,279,946 UART: [fwproc] Wait for Commands...
1,280,665 UART: [fwproc] Recv command 0x46574c44
1,281,398 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,406 >>> mbox cmd response: success
2,772,535 UART: [afmc] ++
2,772,703 UART: [afmc] CDI.KEYID = 6
2,773,066 UART: [afmc] SUBJECT.KEYID = 7
2,773,492 UART: [afmc] AUTHORITY.KEYID = 5
2,809,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,038 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,751 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,660 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,374 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,113 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,802 UART: [ldev] --
1,281,142 UART: [fwproc] Wait for Commands...
1,281,821 UART: [fwproc] Recv command 0x46574c44
1,282,554 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,896 >>> mbox cmd response: success
2,772,923 UART: [afmc] ++
2,773,091 UART: [afmc] CDI.KEYID = 6
2,773,454 UART: [afmc] SUBJECT.KEYID = 7
2,773,880 UART: [afmc] AUTHORITY.KEYID = 5
2,808,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,692 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,405 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,314 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,028 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,865 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,240,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,272 UART: [ldev] --
1,279,770 UART: [fwproc] Wait for Commands...
1,280,389 UART: [fwproc] Recv command 0x46574c44
1,281,122 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,990 >>> mbox cmd response: success
2,772,231 UART: [afmc] ++
2,772,399 UART: [afmc] CDI.KEYID = 6
2,772,762 UART: [afmc] SUBJECT.KEYID = 7
2,773,188 UART: [afmc] AUTHORITY.KEYID = 5
2,809,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,992 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,705 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,614 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,328 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,199 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.56s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,052 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,226 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,018 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,342 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,446 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,614 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,554 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,156 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,224 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,964 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,114 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,342 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,772 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,804 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,338 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,334 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,220 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,340 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,888 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,760 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,632 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.47s
Truncated 104976 bytes from beginning
4
1,282,165 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,009 >>> mbox cmd response: success
2,773,206 UART: [afmc] ++
2,773,374 UART: [afmc] CDI.KEYID = 6
2,773,737 UART: [afmc] SUBJECT.KEYID = 7
2,774,163 UART: [afmc] AUTHORITY.KEYID = 5
2,809,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,649 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,362 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,271 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,985 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,858 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,198,788 UART: [idev] Sha1 KeyId Algorithm
1,207,614 UART: [idev] --
1,208,693 UART: [ldev] ++
1,208,861 UART: [ldev] CDI.KEYID = 6
1,209,225 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,913 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,282,024 UART: [fwproc] Recv command 0x46574c44
1,282,757 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,377 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,229 >>> mbox cmd response: success
2,774,384 UART: [afmc] ++
2,774,552 UART: [afmc] CDI.KEYID = 6
2,774,915 UART: [afmc] SUBJECT.KEYID = 7
2,775,341 UART: [afmc] AUTHORITY.KEYID = 5
2,811,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,201 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,914 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,823 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,537 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,526 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,483 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,377 >>> mbox cmd response: success
2,773,516 UART: [afmc] ++
2,773,684 UART: [afmc] CDI.KEYID = 6
2,774,047 UART: [afmc] SUBJECT.KEYID = 7
2,774,473 UART: [afmc] AUTHORITY.KEYID = 5
2,810,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,593 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,306 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,215 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,929 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,734 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,875 UART: [ldev] SUBJECT.KEYID = 5
1,210,302 UART: [ldev] AUTHORITY.KEYID = 7
1,210,765 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,809 UART: [ldev] --
1,282,117 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,145 >>> mbox cmd response: success
2,774,312 UART: [afmc] ++
2,774,480 UART: [afmc] CDI.KEYID = 6
2,774,843 UART: [afmc] SUBJECT.KEYID = 7
2,775,269 UART: [afmc] AUTHORITY.KEYID = 5
2,811,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,137 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,850 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,759 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,473 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,250 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.77s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,019 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,831 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,053 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,581 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,625 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,437 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,203 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,373 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,109 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,245 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,389 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,175 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,829 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,335 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,455 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,879 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,603 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,647 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,911 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,199,005 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,036 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,250 UART: ROM Fatal Error: 0x000B0032
1,309,407 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,324 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,198,944 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,613 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,282,029 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,295 UART: ROM Fatal Error: 0x000B0032
1,310,452 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,459 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,130 UART: [ldev] --
1,280,494 UART: [fwproc] Wait for Commands...
1,281,133 UART: [fwproc] Recv command 0x46574c44
1,281,866 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,134 UART: ROM Fatal Error: 0x000B0032
1,308,291 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,956 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,505 UART: [kat] LMS
1,168,817 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,115 UART: ROM Fatal Error: 0x000B0032
1,310,272 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,215 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,159 UART: [kat] SHA2-256
901,099 UART: [kat] SHA2-384
903,848 UART: [kat] SHA2-512-ACC
905,749 UART: [kat] ECC-384
915,280 UART: [kat] HMAC-384Kdf
920,064 UART: [kat] LMS
1,168,376 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,831 UART: [fht] FHT @ 0x50003400
1,172,357 UART: [idev] ++
1,172,525 UART: [idev] CDI.KEYID = 6
1,172,886 UART: [idev] SUBJECT.KEYID = 7
1,173,311 UART: [idev] UDS.KEYID = 0
1,180,991 UART: [idev] Erasing UDS.KEYID = 0
1,197,861 UART: [idev] Sha1 KeyId Algorithm
1,206,823 UART: [idev] --
1,207,814 UART: [ldev] ++
1,207,982 UART: [ldev] CDI.KEYID = 6
1,208,346 UART: [ldev] SUBJECT.KEYID = 5
1,208,773 UART: [ldev] AUTHORITY.KEYID = 7
1,209,236 UART: [ldev] FE.KEYID = 1
1,214,576 UART: [ldev] Erasing FE.KEYID = 1
1,240,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,243 UART: [fwproc] Recv command 0x46574c44
1,281,976 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,866 UART: ROM Fatal Error: 0x000B0032
1,309,023 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,714 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,893 UART: [kat] HMAC-384Kdf
921,481 UART: [kat] LMS
1,169,793 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,427 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,955 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,249 UART: ROM Fatal Error: 0x000B0032
1,311,406 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,275 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 74764 bytes from beginning
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,682 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,989 UART: [fwproc] Recv command 0x46574c44
1,283,722 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,666 UART: ROM Fatal Error: 0x00B0003A
1,310,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,290 UART: [kat] LMS
1,168,602 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,736 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,282,027 UART: [fwproc] Recv command 0x46574c44
1,282,760 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,288 UART: ROM Fatal Error: 0x00B0003A
1,309,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,182,311 UART: [idev] Erasing UDS.KEYID = 0
1,199,165 UART: [idev] Sha1 KeyId Algorithm
1,208,091 UART: [idev] --
1,209,008 UART: [ldev] ++
1,209,176 UART: [ldev] CDI.KEYID = 6
1,209,540 UART: [ldev] SUBJECT.KEYID = 5
1,209,967 UART: [ldev] AUTHORITY.KEYID = 7
1,210,430 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,608 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,775 UART: [fwproc] Recv command 0x46574c44
1,282,508 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,490 UART: ROM Fatal Error: 0x00B0003A
1,309,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,190 UART: [kat] SHA2-256
890,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,869 UART: [kat] ++
895,021 UART: [kat] sha1
899,169 UART: [kat] SHA2-256
901,109 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,000 UART: [kat] HMAC-384Kdf
919,560 UART: [kat] LMS
1,167,872 UART: [kat] --
1,168,697 UART: [cold-reset] ++
1,169,099 UART: [fht] FHT @ 0x50003400
1,171,673 UART: [idev] ++
1,171,841 UART: [idev] CDI.KEYID = 6
1,172,202 UART: [idev] SUBJECT.KEYID = 7
1,172,627 UART: [idev] UDS.KEYID = 0
1,180,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,207,031 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,724 UART: [ldev] Erasing FE.KEYID = 1
1,240,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,482 UART: [ldev] --
1,279,930 UART: [fwproc] Wait for Commands...
1,280,615 UART: [fwproc] Recv command 0x46574c44
1,281,348 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,664 UART: ROM Fatal Error: 0x00B0003A
1,308,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,946 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 114332 bytes
3,111,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,140,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,305,882 >>> mbox cmd response: success
3,306,987 UART: [afmc] ++
3,307,155 UART: [afmc] CDI.KEYID = 6
3,307,518 UART: [afmc] SUBJECT.KEYID = 7
3,307,944 UART: [afmc] AUTHORITY.KEYID = 5
3,343,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,343 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,366,051 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,371,936 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,377,638 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,385,416 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.95s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,155,481 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.82s
Truncated 74764 bytes from beginning
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,649 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,636 UART: [fwproc] Recv command 0x46574c44
1,282,369 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,581 UART: ROM Fatal Error: 0x00B0003A
1,308,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
891,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,617 UART: [kat] LMS
1,168,929 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,181,908 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,607 UART: [ldev] ++
1,208,775 UART: [ldev] CDI.KEYID = 6
1,209,139 UART: [ldev] SUBJECT.KEYID = 5
1,209,566 UART: [ldev] AUTHORITY.KEYID = 7
1,210,029 UART: [ldev] FE.KEYID = 1
1,215,349 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,739 UART: [ldev] --
1,281,231 UART: [fwproc] Wait for Commands...
1,281,924 UART: [fwproc] Recv command 0x46574c44
1,282,657 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,123 UART: ROM Fatal Error: 0x00B0003A
1,309,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,198,658 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,567 UART: [ldev] ++
1,208,735 UART: [ldev] CDI.KEYID = 6
1,209,099 UART: [ldev] SUBJECT.KEYID = 5
1,209,526 UART: [ldev] AUTHORITY.KEYID = 7
1,209,989 UART: [ldev] FE.KEYID = 1
1,215,327 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,349 UART: [ldev] --
1,280,723 UART: [fwproc] Wait for Commands...
1,281,306 UART: [fwproc] Recv command 0x46574c44
1,282,039 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,539 UART: ROM Fatal Error: 0x00B0003A
1,308,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,974 UART: [idev] Sha1 KeyId Algorithm
1,208,948 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,798 UART: [fwproc] Recv command 0x46574c44
1,283,531 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,769 UART: ROM Fatal Error: 0x00B0003A
1,309,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,181,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,156 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,156,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,548 >>> mbox cmd response: success
3,322,581 UART: [afmc] ++
3,322,749 UART: [afmc] CDI.KEYID = 6
3,323,112 UART: [afmc] SUBJECT.KEYID = 7
3,323,538 UART: [afmc] AUTHORITY.KEYID = 5
3,358,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,689 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,397 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,282 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,392,984 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,400,700 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.85s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,079 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.38s
Truncated 74764 bytes from beginning
1,273,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,050 UART: [ldev] --
1,281,430 UART: [fwproc] Wait for Commands...
1,282,127 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,202 UART: ROM Fatal Error: 0x00B0003A
1,310,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,711 UART: [idev] ++
1,172,879 UART: [idev] CDI.KEYID = 6
1,173,240 UART: [idev] SUBJECT.KEYID = 7
1,173,665 UART: [idev] UDS.KEYID = 0
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,283 UART: [fwproc] Recv command 0x46574c44
1,282,016 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,790 UART: ROM Fatal Error: 0x00B0003A
1,308,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,418 UART: [kat] HMAC-384Kdf
919,786 UART: [kat] LMS
1,168,098 UART: [kat] --
1,169,283 UART: [cold-reset] ++
1,169,787 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,075 UART: [fwproc] Recv command 0x46574c44
1,281,808 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,580 UART: ROM Fatal Error: 0x00B0003A
1,308,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,203 UART: [kat] SHA2-256
902,143 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,158 UART: [kat] LMS
1,169,470 UART: [kat] --
1,170,517 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,585 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,498 UART: [ldev] ++
1,209,666 UART: [ldev] CDI.KEYID = 6
1,210,030 UART: [ldev] SUBJECT.KEYID = 5
1,210,457 UART: [ldev] AUTHORITY.KEYID = 7
1,210,920 UART: [ldev] FE.KEYID = 1
1,216,014 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,010 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,169 UART: [fwproc] Recv command 0x46574c44
1,282,902 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,152 UART: ROM Fatal Error: 0x00B0003A
1,309,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,963 UART: [state] WD Timer not started. Device not locked for debugging
88,280 UART: [kat] SHA2-256
891,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,487 UART: [kat] SHA2-256
902,427 UART: [kat] SHA2-384
905,262 UART: [kat] SHA2-512-ACC
907,163 UART: [kat] ECC-384
916,704 UART: [kat] HMAC-384Kdf
921,304 UART: [kat] LMS
1,169,616 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,200 UART: [fwproc] Wait for Commands...
1,282,015 UART: [fwproc] Recv command 0x46574c44
1,282,748 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,153,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,108 >>> mbox cmd response: success
3,320,265 UART: [afmc] ++
3,320,433 UART: [afmc] CDI.KEYID = 6
3,320,796 UART: [afmc] SUBJECT.KEYID = 7
3,321,222 UART: [afmc] AUTHORITY.KEYID = 5
3,357,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,157 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,379,865 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,385,750 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,391,452 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,399,458 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.43s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,156,033 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.59s
Truncated 74764 bytes from beginning
1,273,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,003 UART: ROM Fatal Error: 0x00B0003A
1,310,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,355 UART: [kat] LMS
1,168,667 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,951 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,383 UART: ROM Fatal Error: 0x00B0003A
1,310,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,182,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,847 UART: ROM Fatal Error: 0x00B0003A
1,311,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
891,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,014 UART: [kat] ++
896,166 UART: [kat] sha1
900,650 UART: [kat] SHA2-256
902,590 UART: [kat] SHA2-384
905,561 UART: [kat] SHA2-512-ACC
907,462 UART: [kat] ECC-384
917,085 UART: [kat] HMAC-384Kdf
921,847 UART: [kat] LMS
1,170,159 UART: [kat] --
1,170,902 UART: [cold-reset] ++
1,171,434 UART: [fht] FHT @ 0x50003400
1,174,178 UART: [idev] ++
1,174,346 UART: [idev] CDI.KEYID = 6
1,174,707 UART: [idev] SUBJECT.KEYID = 7
1,175,132 UART: [idev] UDS.KEYID = 0
1,183,368 UART: [idev] Erasing UDS.KEYID = 0
1,200,838 UART: [idev] Sha1 KeyId Algorithm
1,209,646 UART: [idev] --
1,210,793 UART: [ldev] ++
1,210,961 UART: [ldev] CDI.KEYID = 6
1,211,325 UART: [ldev] SUBJECT.KEYID = 5
1,211,752 UART: [ldev] AUTHORITY.KEYID = 7
1,212,215 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,435 UART: [ldev] --
1,282,749 UART: [fwproc] Wait for Commands...
1,283,572 UART: [fwproc] Recv command 0x46574c44
1,284,305 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,521 UART: ROM Fatal Error: 0x00B0003A
1,311,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,806 UART: [cold-reset] ++
1,171,366 UART: [fht] FHT @ 0x50003400
1,174,126 UART: [idev] ++
1,174,294 UART: [idev] CDI.KEYID = 6
1,174,655 UART: [idev] SUBJECT.KEYID = 7
1,175,080 UART: [idev] UDS.KEYID = 0
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,008 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,741 UART: [ldev] --
1,282,133 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,154,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,981 >>> mbox cmd response: success
3,321,112 UART: [afmc] ++
3,321,280 UART: [afmc] CDI.KEYID = 6
3,321,643 UART: [afmc] SUBJECT.KEYID = 7
3,322,069 UART: [afmc] AUTHORITY.KEYID = 5
3,357,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,548 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,380,256 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,386,141 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,391,843 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,399,469 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.61s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,158,747 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.61s
Truncated 74764 bytes from beginning
1,271,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,828 UART: [ldev] --
1,280,120 UART: [fwproc] Wait for Commands...
1,280,697 UART: [fwproc] Recv command 0x46574c44
1,281,430 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,974 UART: ROM Fatal Error: 0x00B0003A
1,308,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,756 UART: [state] LifecycleState = Unprovisioned
86,411 UART: [state] DebugLocked = No
87,013 UART: [state] WD Timer not started. Device not locked for debugging
88,326 UART: [kat] SHA2-256
891,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,005 UART: [kat] ++
896,157 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,368 UART: ROM Fatal Error: 0x00B0003A
1,308,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,868 UART: [ldev] --
1,280,172 UART: [fwproc] Wait for Commands...
1,280,983 UART: [fwproc] Recv command 0x46574c44
1,281,716 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,514 UART: ROM Fatal Error: 0x00B0003A
1,308,675 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,242,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,168 UART: [ldev] --
1,281,564 UART: [fwproc] Wait for Commands...
1,282,341 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,636 UART: ROM Fatal Error: 0x00B0003A
1,310,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,877 UART: [kat] ++
895,029 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,791 UART: [fht] FHT @ 0x50003400
1,172,341 UART: [idev] ++
1,172,509 UART: [idev] CDI.KEYID = 6
1,172,870 UART: [idev] SUBJECT.KEYID = 7
1,173,295 UART: [idev] UDS.KEYID = 0
1,181,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,117 UART: [idev] Sha1 KeyId Algorithm
1,207,035 UART: [idev] --
1,207,994 UART: [ldev] ++
1,208,162 UART: [ldev] CDI.KEYID = 6
1,208,526 UART: [ldev] SUBJECT.KEYID = 5
1,208,953 UART: [ldev] AUTHORITY.KEYID = 7
1,209,416 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,240,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,262 UART: [ldev] --
1,279,586 UART: [fwproc] Wait for Commands...
1,280,399 UART: [fwproc] Recv command 0x46574c44
1,281,132 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,155,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,373 >>> mbox cmd response: success
3,321,564 UART: [afmc] ++
3,321,732 UART: [afmc] CDI.KEYID = 6
3,322,095 UART: [afmc] SUBJECT.KEYID = 7
3,322,521 UART: [afmc] AUTHORITY.KEYID = 5
3,358,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,698 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,406 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,291 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,392,993 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,400,781 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.52s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,464 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,163,039 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.37s
Truncated 74764 bytes from beginning
1,272,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,875 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,797 UART: ROM Fatal Error: 0x00B0003A
1,309,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,991 UART: [state] LifecycleState = Unprovisioned
86,646 UART: [state] DebugLocked = No
87,164 UART: [state] WD Timer not started. Device not locked for debugging
88,515 UART: [kat] SHA2-256
892,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,194 UART: [kat] ++
896,346 UART: [kat] sha1
900,640 UART: [kat] SHA2-256
902,580 UART: [kat] SHA2-384
905,161 UART: [kat] SHA2-512-ACC
907,062 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,718 UART: [cold-reset] ++
1,171,298 UART: [fht] FHT @ 0x50003400
1,174,052 UART: [idev] ++
1,174,220 UART: [idev] CDI.KEYID = 6
1,174,581 UART: [idev] SUBJECT.KEYID = 7
1,175,006 UART: [idev] UDS.KEYID = 0
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,701 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,205 UART: ROM Fatal Error: 0x00B0003A
1,310,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,158 UART: [idev] ++
1,173,326 UART: [idev] CDI.KEYID = 6
1,173,687 UART: [idev] SUBJECT.KEYID = 7
1,174,112 UART: [idev] UDS.KEYID = 0
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,198,506 UART: [idev] Sha1 KeyId Algorithm
1,207,360 UART: [idev] --
1,208,583 UART: [ldev] ++
1,208,751 UART: [ldev] CDI.KEYID = 6
1,209,115 UART: [ldev] SUBJECT.KEYID = 5
1,209,542 UART: [ldev] AUTHORITY.KEYID = 7
1,210,005 UART: [ldev] FE.KEYID = 1
1,215,125 UART: [ldev] Erasing FE.KEYID = 1
1,241,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,915 UART: [ldev] --
1,280,375 UART: [fwproc] Wait for Commands...
1,281,080 UART: [fwproc] Recv command 0x46574c44
1,281,813 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,777 UART: ROM Fatal Error: 0x00B0003A
1,308,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,590 UART: [kat] SHA2-256
901,530 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,317 UART: [kat] LMS
1,168,629 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,594 UART: [idev] ++
1,172,762 UART: [idev] CDI.KEYID = 6
1,173,123 UART: [idev] SUBJECT.KEYID = 7
1,173,548 UART: [idev] UDS.KEYID = 0
1,181,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,551 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,623 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,698 UART: [fwproc] Recv command 0x46574c44
1,282,431 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,205 UART: ROM Fatal Error: 0x00B0003A
1,308,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,968 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,786 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114332 bytes
3,120,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,148,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,106 >>> mbox cmd response: success
3,315,361 UART: [afmc] ++
3,315,529 UART: [afmc] CDI.KEYID = 6
3,315,892 UART: [afmc] SUBJECT.KEYID = 7
3,316,318 UART: [afmc] AUTHORITY.KEYID = 5
3,352,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,519 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,375,227 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,381,112 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,386,814 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,394,578 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.58s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,377 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,150,525 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,889 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,651 UART: [fwproc] Recv command 0x46574c44
1,282,384 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,193 UART: ROM Fatal Error: 0x000B0005
1,328,350 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,315 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Manufacturing
86,194 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,873 UART: [kat] HMAC-384Kdf
921,641 UART: [kat] LMS
1,169,953 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,314 UART: [fht] FHT @ 0x50003400
1,173,940 UART: [idev] ++
1,174,108 UART: [idev] CDI.KEYID = 6
1,174,469 UART: [idev] SUBJECT.KEYID = 7
1,174,894 UART: [idev] UDS.KEYID = 0
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,852 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,917 UART: [ldev] ++
1,210,085 UART: [ldev] CDI.KEYID = 6
1,210,449 UART: [ldev] SUBJECT.KEYID = 5
1,210,876 UART: [ldev] AUTHORITY.KEYID = 7
1,211,339 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,551 UART: [fwproc] Wait for Commands...
1,283,230 UART: [fwproc] Recv command 0x46574c44
1,283,963 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,616 UART: ROM Fatal Error: 0x000B0005
1,329,773 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,610 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Manufacturing
85,655 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,447 UART: [cold-reset] ++
1,169,817 UART: [fht] FHT @ 0x50003400
1,172,431 UART: [idev] ++
1,172,599 UART: [idev] CDI.KEYID = 6
1,172,960 UART: [idev] SUBJECT.KEYID = 7
1,173,385 UART: [idev] UDS.KEYID = 0
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,127 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,042 UART: [ldev] ++
1,208,210 UART: [ldev] CDI.KEYID = 6
1,208,574 UART: [ldev] SUBJECT.KEYID = 5
1,209,001 UART: [ldev] AUTHORITY.KEYID = 7
1,209,464 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,241,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,184 UART: [fwproc] Wait for Commands...
1,280,795 UART: [fwproc] Recv command 0x46574c44
1,281,528 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,457 UART: ROM Fatal Error: 0x000B0005
1,327,614 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,805 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Manufacturing
85,840 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,241,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,022 UART: [fwproc] Recv command 0x46574c44
1,282,755 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,946 UART: ROM Fatal Error: 0x000B0005
1,328,103 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,538 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Manufacturing
85,327 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,053 UART: [kat] ++
895,205 UART: [kat] sha1
899,283 UART: [kat] SHA2-256
901,223 UART: [kat] SHA2-384
903,914 UART: [kat] SHA2-512-ACC
905,815 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,976 UART: [ldev] --
1,280,344 UART: [fwproc] Wait for Commands...
1,281,145 UART: [fwproc] Recv command 0x46574c44
1,281,878 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,809 UART: ROM Fatal Error: 0x000B0005
1,327,966 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,395 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Manufacturing
86,008 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,726 UART: [idev] ++
1,172,894 UART: [idev] CDI.KEYID = 6
1,173,255 UART: [idev] SUBJECT.KEYID = 7
1,173,680 UART: [idev] UDS.KEYID = 0
1,181,482 UART: [idev] Erasing UDS.KEYID = 0
1,198,850 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,605 UART: [ldev] ++
1,208,773 UART: [ldev] CDI.KEYID = 6
1,209,137 UART: [ldev] SUBJECT.KEYID = 5
1,209,564 UART: [ldev] AUTHORITY.KEYID = 7
1,210,027 UART: [ldev] FE.KEYID = 1
1,215,373 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,291 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,472 UART: [fwproc] Recv command 0x46574c44
1,282,205 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,562 UART: ROM Fatal Error: 0x000B0005
1,327,719 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,530 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Manufacturing
85,729 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,674 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,887 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,644 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,970 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,095 UART: ROM Fatal Error: 0x000B0003
1,304,252 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,233 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Manufacturing
86,064 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,181,576 UART: [idev] Erasing UDS.KEYID = 0
1,198,192 UART: [idev] Sha1 KeyId Algorithm
1,207,072 UART: [idev] --
1,208,165 UART: [ldev] ++
1,208,333 UART: [ldev] CDI.KEYID = 6
1,208,697 UART: [ldev] SUBJECT.KEYID = 5
1,209,124 UART: [ldev] AUTHORITY.KEYID = 7
1,209,587 UART: [ldev] FE.KEYID = 1
1,214,935 UART: [ldev] Erasing FE.KEYID = 1
1,241,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,661 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,417 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,920 UART: ROM Fatal Error: 0x000B0003
1,304,077 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,858 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Manufacturing
85,725 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,743 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,832 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,138 UART: [ldev] --
1,280,536 UART: [fwproc] Wait for Commands...
1,281,127 UART: [fwproc] Recv command 0x46574c44
1,281,860 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,079 UART: ROM Fatal Error: 0x000B0003
1,303,236 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,047 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Manufacturing
86,056 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
917,181 UART: [kat] HMAC-384Kdf
921,791 UART: [kat] LMS
1,170,103 UART: [kat] --
1,170,916 UART: [cold-reset] ++
1,171,412 UART: [fht] FHT @ 0x50003400
1,174,056 UART: [idev] ++
1,174,224 UART: [idev] CDI.KEYID = 6
1,174,585 UART: [idev] SUBJECT.KEYID = 7
1,175,010 UART: [idev] UDS.KEYID = 0
1,182,976 UART: [idev] Erasing UDS.KEYID = 0
1,200,370 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,741 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,235 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,590 UART: ROM Fatal Error: 0x000B0003
1,305,747 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,612 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Manufacturing
85,511 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,097 UART: [cold-reset] ++
1,169,597 UART: [fht] FHT @ 0x50003400
1,172,411 UART: [idev] ++
1,172,579 UART: [idev] CDI.KEYID = 6
1,172,940 UART: [idev] SUBJECT.KEYID = 7
1,173,365 UART: [idev] UDS.KEYID = 0
1,181,073 UART: [idev] Erasing UDS.KEYID = 0
1,197,897 UART: [idev] Sha1 KeyId Algorithm
1,206,755 UART: [idev] --
1,207,810 UART: [ldev] ++
1,207,978 UART: [ldev] CDI.KEYID = 6
1,208,342 UART: [ldev] SUBJECT.KEYID = 5
1,208,769 UART: [ldev] AUTHORITY.KEYID = 7
1,209,232 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,240,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,220 UART: [ldev] --
1,279,722 UART: [fwproc] Wait for Commands...
1,280,375 UART: [fwproc] Recv command 0x46574c44
1,281,108 UART: [fwproc] Recv'd Img size: 114332 bytes
1,300,697 UART: ROM Fatal Error: 0x000B0003
1,301,854 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,713 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Manufacturing
86,316 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,579 UART: [kat] LMS
1,169,891 UART: [kat] --
1,170,856 UART: [cold-reset] ++
1,171,320 UART: [fht] FHT @ 0x50003400
1,173,996 UART: [idev] ++
1,174,164 UART: [idev] CDI.KEYID = 6
1,174,525 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,182,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,678 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,603 UART: [ldev] --
1,283,079 UART: [fwproc] Wait for Commands...
1,283,768 UART: [fwproc] Recv command 0x46574c44
1,284,501 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,924 UART: ROM Fatal Error: 0x000B0003
1,306,081 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,496 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,234 UART: [ldev] --
1,281,572 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,174 UART: ROM Fatal Error: 0x000B0016
2,581,331 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,940 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,595 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,198,832 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,477 UART: [ldev] Erasing FE.KEYID = 1
1,241,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,965 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,919 UART: ROM Fatal Error: 0x000B0016
2,581,076 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,059 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,389 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,182,715 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,260 UART: [ldev] ++
1,209,428 UART: [ldev] CDI.KEYID = 6
1,209,792 UART: [ldev] SUBJECT.KEYID = 5
1,210,219 UART: [ldev] AUTHORITY.KEYID = 7
1,210,682 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,242,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,510 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,336 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,200 UART: ROM Fatal Error: 0x000B0016
2,581,357 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,778 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,783 UART: [ldev] ++
1,209,951 UART: [ldev] CDI.KEYID = 6
1,210,315 UART: [ldev] SUBJECT.KEYID = 5
1,210,742 UART: [ldev] AUTHORITY.KEYID = 7
1,211,205 UART: [ldev] FE.KEYID = 1
1,216,521 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,223 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,363 UART: ROM Fatal Error: 0x000B0016
2,580,520 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,059 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,209 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,196 UART: ROM Fatal Error: 0x000B0016
2,580,353 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,378 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,987 UART: [state] LifecycleState = Unprovisioned
86,642 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,086 UART: [fwproc] Recv command 0x46574c44
1,282,819 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,731 UART: ROM Fatal Error: 0x000B0016
2,579,888 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,333 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,334 UART: [ldev] ++
1,209,502 UART: [ldev] CDI.KEYID = 6
1,209,866 UART: [ldev] SUBJECT.KEYID = 5
1,210,293 UART: [ldev] AUTHORITY.KEYID = 7
1,210,756 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,865 UART: [fwproc] Recv command 0x46574c44
1,282,598 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,291 UART: ROM Fatal Error: 0x000B002B
2,580,450 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,547 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,206 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,209,007 UART: [ldev] ++
1,209,175 UART: [ldev] CDI.KEYID = 6
1,209,539 UART: [ldev] SUBJECT.KEYID = 5
1,209,966 UART: [ldev] AUTHORITY.KEYID = 7
1,210,429 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,129 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,350 UART: ROM Fatal Error: 0x000B002B
2,580,509 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,918 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,734 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,625 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,182,713 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,312 UART: [fwproc] Wait for Commands...
1,282,035 UART: [fwproc] Recv command 0x46574c44
1,282,768 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,839 UART: ROM Fatal Error: 0x000B002B
2,579,998 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,048 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,356 UART: [kat] SHA2-256
902,296 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,696 UART: [cold-reset] ++
1,171,214 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,254 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,285 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,888 UART: ROM Fatal Error: 0x000B002B
2,581,047 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,890 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,361 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,209,196 UART: [ldev] ++
1,209,364 UART: [ldev] CDI.KEYID = 6
1,209,728 UART: [ldev] SUBJECT.KEYID = 5
1,210,155 UART: [ldev] AUTHORITY.KEYID = 7
1,210,618 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,972 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x46574c44
1,282,708 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,317 UART: ROM Fatal Error: 0x000B002B
2,581,476 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,185 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,715 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,242,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,472 UART: ROM Fatal Error: 0x000B002B
2,581,631 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,754 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,345 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,182,493 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,610 UART: [ldev] ++
1,209,778 UART: [ldev] CDI.KEYID = 6
1,210,142 UART: [ldev] SUBJECT.KEYID = 5
1,210,569 UART: [ldev] AUTHORITY.KEYID = 7
1,211,032 UART: [ldev] FE.KEYID = 1
1,216,232 UART: [ldev] Erasing FE.KEYID = 1
1,242,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,146 UART: [ldev] --
1,282,548 UART: [fwproc] Wait for Commands...
1,283,229 UART: [fwproc] Recv command 0x46574c44
1,283,962 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,929 UART: ROM Fatal Error: 0x000B002A
2,581,088 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,177 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,270 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
892,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,148 UART: [kat] ++
896,300 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
905,311 UART: [kat] SHA2-512-ACC
907,212 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,756 UART: [cold-reset] ++
1,171,178 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,873 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,283 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,374 UART: ROM Fatal Error: 0x000B002A
2,582,533 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,662 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,476 UART: [kat] HMAC-384Kdf
920,052 UART: [kat] LMS
1,168,364 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,535 UART: [fht] FHT @ 0x50003400
1,172,133 UART: [idev] ++
1,172,301 UART: [idev] CDI.KEYID = 6
1,172,662 UART: [idev] SUBJECT.KEYID = 7
1,173,087 UART: [idev] UDS.KEYID = 0
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,119 UART: [idev] --
1,208,158 UART: [ldev] ++
1,208,326 UART: [ldev] CDI.KEYID = 6
1,208,690 UART: [ldev] SUBJECT.KEYID = 5
1,209,117 UART: [ldev] AUTHORITY.KEYID = 7
1,209,580 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,359 UART: [fwproc] Recv command 0x46574c44
1,282,092 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,819 UART: ROM Fatal Error: 0x000B002A
2,579,978 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,617 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,640 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,830 UART: [fwproc] Recv command 0x46574c44
1,283,563 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,872 UART: ROM Fatal Error: 0x000B002A
2,581,031 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,682 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,919 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,690 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,965 UART: [fht] FHT @ 0x50003400
1,173,783 UART: [idev] ++
1,173,951 UART: [idev] CDI.KEYID = 6
1,174,312 UART: [idev] SUBJECT.KEYID = 7
1,174,737 UART: [idev] UDS.KEYID = 0
1,182,799 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,208,683 UART: [idev] --
1,209,940 UART: [ldev] ++
1,210,108 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,899 UART: [ldev] AUTHORITY.KEYID = 7
1,211,362 UART: [ldev] FE.KEYID = 1
1,216,430 UART: [ldev] Erasing FE.KEYID = 1
1,242,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,614 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,103 UART: ROM Fatal Error: 0x000B002A
2,582,262 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,801 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,329 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,682 UART: ROM Fatal Error: 0x000B002A
2,580,841 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,386 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,182,185 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,351 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,216,232 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,412 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,289 UART: ROM Fatal Error: 0x000B002A
2,581,448 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,173 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,321 UART: [kat] LMS
1,168,633 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,496 UART: [idev] ++
1,172,664 UART: [idev] CDI.KEYID = 6
1,173,025 UART: [idev] SUBJECT.KEYID = 7
1,173,450 UART: [idev] UDS.KEYID = 0
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,198,610 UART: [idev] Sha1 KeyId Algorithm
1,207,586 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,507 UART: [ldev] Erasing FE.KEYID = 1
1,241,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,235 UART: [ldev] --
1,280,683 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,500 UART: ROM Fatal Error: 0x000B002A
2,580,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,414 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,503 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,488 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,177 UART: ROM Fatal Error: 0x000B002A
2,580,336 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,087 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,717 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,696 UART: [cold-reset] ++
1,171,080 UART: [fht] FHT @ 0x50003400
1,173,666 UART: [idev] ++
1,173,834 UART: [idev] CDI.KEYID = 6
1,174,195 UART: [idev] SUBJECT.KEYID = 7
1,174,620 UART: [idev] UDS.KEYID = 0
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,375 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,464 UART: [fwproc] Recv command 0x46574c44
1,284,197 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,742 UART: ROM Fatal Error: 0x000B002A
2,582,901 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,850 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,950 UART: [state] LifecycleState = Unprovisioned
86,605 UART: [state] DebugLocked = No
87,207 UART: [state] WD Timer not started. Device not locked for debugging
88,382 UART: [kat] SHA2-256
891,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,061 UART: [kat] ++
896,213 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,608 UART: [kat] HMAC-384Kdf
921,318 UART: [kat] LMS
1,169,630 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,170,927 UART: [fht] FHT @ 0x50003400
1,173,719 UART: [idev] ++
1,173,887 UART: [idev] CDI.KEYID = 6
1,174,248 UART: [idev] SUBJECT.KEYID = 7
1,174,673 UART: [idev] UDS.KEYID = 0
1,182,579 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,520 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,825 UART: ROM Fatal Error: 0x000B002A
2,579,984 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,129 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,279 UART: [fwproc] Wait for Commands...
1,282,028 UART: [fwproc] Recv command 0x46574c44
1,282,761 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,160 UART: ROM Fatal Error: 0x000B002A
2,581,319 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,524 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,922 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,398 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,090 UART: ROM Fatal Error: 0x000B0028
2,581,247 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,117 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,567 UART: [state] LifecycleState = Unprovisioned
85,222 UART: [state] DebugLocked = No
85,812 UART: [state] WD Timer not started. Device not locked for debugging
87,001 UART: [kat] SHA2-256
890,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,680 UART: [kat] ++
894,832 UART: [kat] sha1
898,916 UART: [kat] SHA2-256
900,856 UART: [kat] SHA2-384
903,771 UART: [kat] SHA2-512-ACC
905,672 UART: [kat] ECC-384
915,309 UART: [kat] HMAC-384Kdf
920,085 UART: [kat] LMS
1,168,397 UART: [kat] --
1,169,204 UART: [cold-reset] ++
1,169,560 UART: [fht] FHT @ 0x50003400
1,172,262 UART: [idev] ++
1,172,430 UART: [idev] CDI.KEYID = 6
1,172,791 UART: [idev] SUBJECT.KEYID = 7
1,173,216 UART: [idev] UDS.KEYID = 0
1,180,694 UART: [idev] Erasing UDS.KEYID = 0
1,197,482 UART: [idev] Sha1 KeyId Algorithm
1,206,380 UART: [idev] --
1,207,595 UART: [ldev] ++
1,207,763 UART: [ldev] CDI.KEYID = 6
1,208,127 UART: [ldev] SUBJECT.KEYID = 5
1,208,554 UART: [ldev] AUTHORITY.KEYID = 7
1,209,017 UART: [ldev] FE.KEYID = 1
1,214,241 UART: [ldev] Erasing FE.KEYID = 1
1,240,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,541 UART: [ldev] --
1,280,057 UART: [fwproc] Wait for Commands...
1,280,836 UART: [fwproc] Recv command 0x46574c44
1,281,569 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,361 UART: ROM Fatal Error: 0x000B0028
2,579,518 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,883 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,851 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,246 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,521 UART: [fwproc] Recv command 0x46574c44
1,282,254 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,002 UART: ROM Fatal Error: 0x000B0028
2,580,159 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,620 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,915 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,013 UART: ROM Fatal Error: 0x000B0028
2,581,170 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,175 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,694 UART: [state] LifecycleState = Unprovisioned
85,349 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,919 UART: [kat] ++
895,071 UART: [kat] sha1
899,223 UART: [kat] SHA2-256
901,163 UART: [kat] SHA2-384
903,836 UART: [kat] SHA2-512-ACC
905,737 UART: [kat] ECC-384
915,186 UART: [kat] HMAC-384Kdf
919,686 UART: [kat] LMS
1,167,998 UART: [kat] --
1,168,679 UART: [cold-reset] ++
1,169,205 UART: [fht] FHT @ 0x50003400
1,172,011 UART: [idev] ++
1,172,179 UART: [idev] CDI.KEYID = 6
1,172,540 UART: [idev] SUBJECT.KEYID = 7
1,172,965 UART: [idev] UDS.KEYID = 0
1,181,263 UART: [idev] Erasing UDS.KEYID = 0
1,197,719 UART: [idev] Sha1 KeyId Algorithm
1,206,637 UART: [idev] --
1,207,506 UART: [ldev] ++
1,207,674 UART: [ldev] CDI.KEYID = 6
1,208,038 UART: [ldev] SUBJECT.KEYID = 5
1,208,465 UART: [ldev] AUTHORITY.KEYID = 7
1,208,928 UART: [ldev] FE.KEYID = 1
1,214,064 UART: [ldev] Erasing FE.KEYID = 1
1,240,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,144 UART: [ldev] --
1,279,462 UART: [fwproc] Wait for Commands...
1,280,047 UART: [fwproc] Recv command 0x46574c44
1,280,780 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,356 UART: ROM Fatal Error: 0x000B0028
2,578,513 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,922 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,231 UART: [kat] LMS
1,169,543 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,108 UART: [idev] Sha1 KeyId Algorithm
1,208,934 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,581 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,075 UART: ROM Fatal Error: 0x000B0028
2,582,232 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,861 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,881 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,852 UART: ROM Fatal Error: 0x000B0028
2,581,009 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,148 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,984 UART: [kat] ++
896,136 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,053 UART: [kat] SHA2-512-ACC
906,954 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,756 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,691 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,617 UART: ROM Fatal Error: 0x000B0028
2,581,774 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,253 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,863 UART: [state] WD Timer not started. Device not locked for debugging
87,006 UART: [kat] SHA2-256
890,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,685 UART: [kat] ++
894,837 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,764 UART: [kat] SHA2-512-ACC
905,665 UART: [kat] ECC-384
915,192 UART: [kat] HMAC-384Kdf
919,728 UART: [kat] LMS
1,168,040 UART: [kat] --
1,168,929 UART: [cold-reset] ++
1,169,279 UART: [fht] FHT @ 0x50003400
1,171,885 UART: [idev] ++
1,172,053 UART: [idev] CDI.KEYID = 6
1,172,414 UART: [idev] SUBJECT.KEYID = 7
1,172,839 UART: [idev] UDS.KEYID = 0
1,181,093 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,807 UART: [idev] --
1,207,930 UART: [ldev] ++
1,208,098 UART: [ldev] CDI.KEYID = 6
1,208,462 UART: [ldev] SUBJECT.KEYID = 5
1,208,889 UART: [ldev] AUTHORITY.KEYID = 7
1,209,352 UART: [ldev] FE.KEYID = 1
1,214,830 UART: [ldev] Erasing FE.KEYID = 1
1,240,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,346 UART: [ldev] --
1,279,686 UART: [fwproc] Wait for Commands...
1,280,283 UART: [fwproc] Recv command 0x46574c44
1,281,016 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,640 UART: ROM Fatal Error: 0x000B0028
2,578,797 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,776 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,567 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,504 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,380 UART: [fwproc] Recv command 0x46574c44
1,283,113 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,423 UART: ROM Fatal Error: 0x000B0028
2,581,580 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,389 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,594 UART: [ldev] Erasing FE.KEYID = 1
1,241,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,281,054 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,598 UART: ROM Fatal Error: 0x000B0028
2,578,755 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,994 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,980 UART: [kat] ++
896,132 UART: [kat] sha1
900,492 UART: [kat] SHA2-256
902,432 UART: [kat] SHA2-384
905,227 UART: [kat] SHA2-512-ACC
907,128 UART: [kat] ECC-384
917,043 UART: [kat] HMAC-384Kdf
921,687 UART: [kat] LMS
1,169,999 UART: [kat] --
1,171,166 UART: [cold-reset] ++
1,171,738 UART: [fht] FHT @ 0x50003400
1,174,490 UART: [idev] ++
1,174,658 UART: [idev] CDI.KEYID = 6
1,175,019 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,183,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,646 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,305 UART: [ldev] --
1,282,717 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,453 UART: ROM Fatal Error: 0x000B0028
2,581,610 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,728 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,049 UART: [idev] --
1,207,976 UART: [ldev] ++
1,208,144 UART: [ldev] CDI.KEYID = 6
1,208,508 UART: [ldev] SUBJECT.KEYID = 5
1,208,935 UART: [ldev] AUTHORITY.KEYID = 7
1,209,398 UART: [ldev] FE.KEYID = 1
1,214,534 UART: [ldev] Erasing FE.KEYID = 1
1,240,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,270 UART: [ldev] --
1,279,572 UART: [fwproc] Wait for Commands...
1,280,247 UART: [fwproc] Recv command 0x46574c44
1,280,980 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,964 UART: ROM Fatal Error: 0x000B0029
2,579,121 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,888 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,346 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,209,130 UART: [idev] --
1,210,279 UART: [ldev] ++
1,210,447 UART: [ldev] CDI.KEYID = 6
1,210,811 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,217,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,725 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,991 UART: ROM Fatal Error: 0x000B0029
2,582,148 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,231 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
915,686 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,829 UART: [fht] FHT @ 0x50003400
1,172,427 UART: [idev] ++
1,172,595 UART: [idev] CDI.KEYID = 6
1,172,956 UART: [idev] SUBJECT.KEYID = 7
1,173,381 UART: [idev] UDS.KEYID = 0
1,181,499 UART: [idev] Erasing UDS.KEYID = 0
1,198,187 UART: [idev] Sha1 KeyId Algorithm
1,207,061 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,214,968 UART: [ldev] Erasing FE.KEYID = 1
1,241,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,575 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,864 UART: ROM Fatal Error: 0x000B0029
2,580,021 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,430,322 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,371 UART: [kat] LMS
1,169,683 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,192 UART: [fht] FHT @ 0x50003400
1,173,748 UART: [idev] ++
1,173,916 UART: [idev] CDI.KEYID = 6
1,174,277 UART: [idev] SUBJECT.KEYID = 7
1,174,702 UART: [idev] UDS.KEYID = 0
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,217,195 UART: [ldev] Erasing FE.KEYID = 1
1,243,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,176 UART: [fwproc] Recv command 0x46574c44
1,283,909 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,385 UART: ROM Fatal Error: 0x000B0029
2,581,542 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,825 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x46574c44
1,282,124 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,151 UART: ROM Fatal Error: 0x000B0029
2,580,308 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,736 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,244 UART: [state] WD Timer not started. Device not locked for debugging
87,417 UART: [kat] SHA2-256
890,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,096 UART: [kat] ++
895,248 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,643 UART: [kat] HMAC-384Kdf
920,087 UART: [kat] LMS
1,168,399 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,810 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,181,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,869 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,749 UART: ROM Fatal Error: 0x000B0029
2,580,906 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,757 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,207,974 UART: [ldev] ++
1,208,142 UART: [ldev] CDI.KEYID = 6
1,208,506 UART: [ldev] SUBJECT.KEYID = 5
1,208,933 UART: [ldev] AUTHORITY.KEYID = 7
1,209,396 UART: [ldev] FE.KEYID = 1
1,214,282 UART: [ldev] Erasing FE.KEYID = 1
1,240,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,798 UART: [ldev] --
1,279,128 UART: [fwproc] Wait for Commands...
1,279,849 UART: [fwproc] Recv command 0x46574c44
1,280,582 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,092 UART: ROM Fatal Error: 0x000B0028
2,579,249 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,324 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,434 UART: [kat] SHA2-256
902,374 UART: [kat] SHA2-384
905,083 UART: [kat] SHA2-512-ACC
906,984 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
920,939 UART: [kat] LMS
1,169,251 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,667 UART: ROM Fatal Error: 0x000B0028
2,580,824 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,455 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,971 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,208,782 UART: [ldev] ++
1,208,950 UART: [ldev] CDI.KEYID = 6
1,209,314 UART: [ldev] SUBJECT.KEYID = 5
1,209,741 UART: [ldev] AUTHORITY.KEYID = 7
1,210,204 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,972 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,280,939 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,430 UART: ROM Fatal Error: 0x000B0028
2,579,587 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,478 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,194 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,490 UART: [kat] SHA2-256
901,430 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,539 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,759 UART: [ldev] --
1,283,085 UART: [fwproc] Wait for Commands...
1,283,898 UART: [fwproc] Recv command 0x46574c44
1,284,631 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,599 UART: ROM Fatal Error: 0x000B0028
2,582,756 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,279 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,508 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,586 UART: ROM Fatal Error: 0x000B0028
2,581,743 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,712 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,362 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,971 UART: ROM Fatal Error: 0x000B0028
2,581,128 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Manufacturing
85,279 UART: [state] DebugLocked = No
85,839 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,807 UART: [kat] ++
894,959 UART: [kat] sha1
899,255 UART: [kat] SHA2-256
901,195 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,410 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,935 UART: ROM Fatal Error: 0x000B002C
2,606,094 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,303 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Manufacturing
86,106 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,764 UART: [idev] Sha1 KeyId Algorithm
1,208,726 UART: [idev] --
1,209,735 UART: [ldev] ++
1,209,903 UART: [ldev] CDI.KEYID = 6
1,210,267 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,969 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,992 UART: ROM Fatal Error: 0x000B002C
2,605,151 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,932 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Manufacturing
85,723 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,644 UART: [ldev] Erasing FE.KEYID = 1
1,242,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,422 UART: [ldev] --
1,280,846 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,715 UART: ROM Fatal Error: 0x000B002C
2,605,874 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,317 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Manufacturing
86,528 UART: [state] DebugLocked = No
87,206 UART: [state] WD Timer not started. Device not locked for debugging
88,535 UART: [kat] SHA2-256
892,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,214 UART: [kat] ++
896,366 UART: [kat] sha1
900,622 UART: [kat] SHA2-256
902,562 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,595 UART: [kat] LMS
1,169,907 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,228 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,209,165 UART: [ldev] ++
1,209,333 UART: [ldev] CDI.KEYID = 6
1,209,697 UART: [ldev] SUBJECT.KEYID = 5
1,210,124 UART: [ldev] AUTHORITY.KEYID = 7
1,210,587 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,471 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,307 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,948 UART: ROM Fatal Error: 0x000B002C
2,607,107 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,459,050 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Manufacturing
85,523 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,420 UART: [ldev] ++
1,208,588 UART: [ldev] CDI.KEYID = 6
1,208,952 UART: [ldev] SUBJECT.KEYID = 5
1,209,379 UART: [ldev] AUTHORITY.KEYID = 7
1,209,842 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,240,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,652 UART: [ldev] --
1,279,920 UART: [fwproc] Wait for Commands...
1,280,591 UART: [fwproc] Recv command 0x46574c44
1,281,324 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,659 UART: ROM Fatal Error: 0x000B002C
2,604,818 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,001 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Manufacturing
86,158 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,939 UART: [kat] SHA2-512-ACC
906,840 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,891 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,875 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,282,941 UART: [fwproc] Wait for Commands...
1,283,564 UART: [fwproc] Recv command 0x46574c44
1,284,297 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,556 UART: ROM Fatal Error: 0x000B002C
2,607,715 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,008 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Manufacturing
85,869 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,682 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,167 UART: ROM Fatal Error: 0x000B002E
2,606,326 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,093 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Manufacturing
86,006 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,906 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,181,656 UART: [idev] Erasing UDS.KEYID = 0
1,198,532 UART: [idev] Sha1 KeyId Algorithm
1,207,440 UART: [idev] --
1,208,375 UART: [ldev] ++
1,208,543 UART: [ldev] CDI.KEYID = 6
1,208,907 UART: [ldev] SUBJECT.KEYID = 5
1,209,334 UART: [ldev] AUTHORITY.KEYID = 7
1,209,797 UART: [ldev] FE.KEYID = 1
1,215,195 UART: [ldev] Erasing FE.KEYID = 1
1,241,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,280,905 UART: [fwproc] Wait for Commands...
1,281,486 UART: [fwproc] Recv command 0x46574c44
1,282,219 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,532 UART: ROM Fatal Error: 0x000B002E
2,605,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,866 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Manufacturing
86,001 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,456 UART: [kat] LMS
1,169,768 UART: [kat] --
1,170,857 UART: [cold-reset] ++
1,171,417 UART: [fht] FHT @ 0x50003400
1,174,039 UART: [idev] ++
1,174,207 UART: [idev] CDI.KEYID = 6
1,174,568 UART: [idev] SUBJECT.KEYID = 7
1,174,993 UART: [idev] UDS.KEYID = 0
1,183,141 UART: [idev] Erasing UDS.KEYID = 0
1,200,509 UART: [idev] Sha1 KeyId Algorithm
1,209,413 UART: [idev] --
1,210,668 UART: [ldev] ++
1,210,836 UART: [ldev] CDI.KEYID = 6
1,211,200 UART: [ldev] SUBJECT.KEYID = 5
1,211,627 UART: [ldev] AUTHORITY.KEYID = 7
1,212,090 UART: [ldev] FE.KEYID = 1
1,217,356 UART: [ldev] Erasing FE.KEYID = 1
1,243,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,522 UART: [ldev] --
1,282,892 UART: [fwproc] Wait for Commands...
1,283,671 UART: [fwproc] Recv command 0x46574c44
1,284,404 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,813 UART: ROM Fatal Error: 0x000B002E
2,607,972 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,183 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Manufacturing
85,820 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,038 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,182,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,713 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,695 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,026 UART: ROM Fatal Error: 0x000B002E
2,607,185 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,459,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Manufacturing
85,769 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,745 UART: [fwproc] Recv command 0x46574c44
1,282,478 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,629 UART: ROM Fatal Error: 0x000B002E
2,605,788 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,383 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Manufacturing
86,024 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,892 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,351 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,418 UART: ROM Fatal Error: 0x000B002E
2,605,577 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,040 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,215,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,281,997 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,294 UART: ROM Fatal Error: 0x000B0018
1,331,451 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,088 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,750 UART: [idev] ++
1,173,918 UART: [idev] CDI.KEYID = 6
1,174,279 UART: [idev] SUBJECT.KEYID = 7
1,174,704 UART: [idev] UDS.KEYID = 0
1,182,832 UART: [idev] Erasing UDS.KEYID = 0
1,200,130 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,077 UART: [ldev] ++
1,210,245 UART: [ldev] CDI.KEYID = 6
1,210,609 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,459 UART: [ldev] --
1,282,913 UART: [fwproc] Wait for Commands...
1,283,588 UART: [fwproc] Recv command 0x46574c44
1,284,321 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,939 UART: ROM Fatal Error: 0x000B0018
1,332,096 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,345 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,197,689 UART: [idev] Sha1 KeyId Algorithm
1,206,573 UART: [idev] --
1,207,564 UART: [ldev] ++
1,207,732 UART: [ldev] CDI.KEYID = 6
1,208,096 UART: [ldev] SUBJECT.KEYID = 5
1,208,523 UART: [ldev] AUTHORITY.KEYID = 7
1,208,986 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,241,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,890 UART: [ldev] --
1,280,228 UART: [fwproc] Wait for Commands...
1,280,939 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,910 UART: ROM Fatal Error: 0x000B0018
1,330,067 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,270 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
917,039 UART: [kat] HMAC-384Kdf
921,543 UART: [kat] LMS
1,169,855 UART: [kat] --
1,170,802 UART: [cold-reset] ++
1,171,250 UART: [fht] FHT @ 0x50003400
1,173,736 UART: [idev] ++
1,173,904 UART: [idev] CDI.KEYID = 6
1,174,265 UART: [idev] SUBJECT.KEYID = 7
1,174,690 UART: [idev] UDS.KEYID = 0
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,200,260 UART: [idev] Sha1 KeyId Algorithm
1,209,212 UART: [idev] --
1,210,255 UART: [ldev] ++
1,210,423 UART: [ldev] CDI.KEYID = 6
1,210,787 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,665 UART: [ldev] --
1,282,931 UART: [fwproc] Wait for Commands...
1,283,554 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,431 UART: ROM Fatal Error: 0x000B0018
1,332,588 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,319 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,871 UART: [kat] ++
895,023 UART: [kat] sha1
899,193 UART: [kat] SHA2-256
901,133 UART: [kat] SHA2-384
903,946 UART: [kat] SHA2-512-ACC
905,847 UART: [kat] ECC-384
915,380 UART: [kat] HMAC-384Kdf
920,028 UART: [kat] LMS
1,168,340 UART: [kat] --
1,169,211 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,164 UART: [ldev] ++
1,208,332 UART: [ldev] CDI.KEYID = 6
1,208,696 UART: [ldev] SUBJECT.KEYID = 5
1,209,123 UART: [ldev] AUTHORITY.KEYID = 7
1,209,586 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,240,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,110 UART: [fwproc] Wait for Commands...
1,280,869 UART: [fwproc] Recv command 0x46574c44
1,281,602 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,144 UART: ROM Fatal Error: 0x000B0018
1,330,301 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,770 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,003 UART: [ldev] ++
1,209,171 UART: [ldev] CDI.KEYID = 6
1,209,535 UART: [ldev] SUBJECT.KEYID = 5
1,209,962 UART: [ldev] AUTHORITY.KEYID = 7
1,210,425 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,253 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,364 UART: [fwproc] Recv command 0x46574c44
1,283,097 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,419 UART: ROM Fatal Error: 0x000B0018
1,331,576 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,569 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,184 UART: [ldev] ++
1,208,352 UART: [ldev] CDI.KEYID = 6
1,208,716 UART: [ldev] SUBJECT.KEYID = 5
1,209,143 UART: [ldev] AUTHORITY.KEYID = 7
1,209,606 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,241,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,676 UART: [fwproc] Wait for Commands...
1,281,373 UART: [fwproc] Recv command 0x46574c44
1,282,106 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,400 UART: ROM Fatal Error: 0x000B0017
1,330,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,199,173 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,242,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,812 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,596 UART: ROM Fatal Error: 0x000B0017
1,331,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,790 UART: [kat] SHA2-512-ACC
906,691 UART: [kat] ECC-384
916,766 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
1,169,528 UART: [kat] --
1,170,345 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,182,559 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,206 UART: [ldev] ++
1,209,374 UART: [ldev] CDI.KEYID = 6
1,209,738 UART: [ldev] SUBJECT.KEYID = 5
1,210,165 UART: [ldev] AUTHORITY.KEYID = 7
1,210,628 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,726 UART: ROM Fatal Error: 0x000B0017
1,331,883 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,568 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,798 UART: [fwproc] Recv command 0x46574c44
1,283,531 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,809 UART: ROM Fatal Error: 0x000B0017
1,330,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,873 UART: [kat] SHA2-512-ACC
906,774 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,839 UART: ROM Fatal Error: 0x000B0017
1,331,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,183,052 UART: [idev] Erasing UDS.KEYID = 0
1,200,298 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,741 UART: [ldev] SUBJECT.KEYID = 5
1,211,168 UART: [ldev] AUTHORITY.KEYID = 7
1,211,631 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,631 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,127 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,457 UART: ROM Fatal Error: 0x000B0017
1,332,614 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,379 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,142 UART: [kat] LMS
1,168,454 UART: [kat] --
1,169,361 UART: [cold-reset] ++
1,169,879 UART: [fht] FHT @ 0x50003400
1,172,595 UART: [idev] ++
1,172,763 UART: [idev] CDI.KEYID = 6
1,173,124 UART: [idev] SUBJECT.KEYID = 7
1,173,549 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,280,997 UART: [fwproc] Recv command 0x46574c44
1,281,730 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,012 UART: ROM Fatal Error: 0x000B0017
1,329,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,287 UART: [idev] ++
1,173,455 UART: [idev] CDI.KEYID = 6
1,173,816 UART: [idev] SUBJECT.KEYID = 7
1,174,241 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,458 UART: [ldev] --
1,281,858 UART: [fwproc] Wait for Commands...
1,282,627 UART: [fwproc] Recv command 0x46574c44
1,283,360 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,594 UART: ROM Fatal Error: 0x000B0017
1,330,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
890,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,957 UART: [kat] ++
895,109 UART: [kat] sha1
899,325 UART: [kat] SHA2-256
901,265 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,182,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,281,002 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,538 UART: ROM Fatal Error: 0x000B0017
1,330,695 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,810 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,500 UART: [fwproc] Recv command 0x46574c44
1,283,233 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,045 UART: ROM Fatal Error: 0x000B0017
1,332,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,629 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,573 UART: ROM Fatal Error: 0x000B0017
1,331,730 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,648 UART: [fwproc] Recv command 0x46574c44
1,283,381 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,613 UART: ROM Fatal Error: 0x000B0017
1,330,770 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,801 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,344 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,431 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,637 UART: [idev] ++
1,173,805 UART: [idev] CDI.KEYID = 6
1,174,166 UART: [idev] SUBJECT.KEYID = 7
1,174,591 UART: [idev] UDS.KEYID = 0
1,182,799 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,441 UART: [idev] --
1,210,502 UART: [ldev] ++
1,210,670 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,461 UART: [ldev] AUTHORITY.KEYID = 7
1,211,924 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,977 UART: [fwproc] Recv command 0x46574c44
1,283,710 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,782 UART: ROM Fatal Error: 0x000B0017
1,330,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,009 UART: [kat] ++
895,161 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,250 UART: [kat] HMAC-384Kdf
919,854 UART: [kat] LMS
1,168,166 UART: [kat] --
1,168,997 UART: [cold-reset] ++
1,169,325 UART: [fht] FHT @ 0x50003400
1,171,943 UART: [idev] ++
1,172,111 UART: [idev] CDI.KEYID = 6
1,172,472 UART: [idev] SUBJECT.KEYID = 7
1,172,897 UART: [idev] UDS.KEYID = 0
1,180,645 UART: [idev] Erasing UDS.KEYID = 0
1,197,537 UART: [idev] Sha1 KeyId Algorithm
1,206,287 UART: [idev] --
1,207,328 UART: [ldev] ++
1,207,496 UART: [ldev] CDI.KEYID = 6
1,207,860 UART: [ldev] SUBJECT.KEYID = 5
1,208,287 UART: [ldev] AUTHORITY.KEYID = 7
1,208,750 UART: [ldev] FE.KEYID = 1
1,213,842 UART: [ldev] Erasing FE.KEYID = 1
1,240,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,678 UART: [ldev] --
1,280,078 UART: [fwproc] Wait for Commands...
1,280,899 UART: [fwproc] Recv command 0x46574c44
1,281,632 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,814 UART: ROM Fatal Error: 0x000B0017
1,329,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,780 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,424 UART: ROM Fatal Error: 0x000B0017
1,329,581 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,224 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,975 UART: ROM Fatal Error: 0x000B0017
1,331,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,616 UART: [idev] Sha1 KeyId Algorithm
1,207,382 UART: [idev] --
1,208,411 UART: [ldev] ++
1,208,579 UART: [ldev] CDI.KEYID = 6
1,208,943 UART: [ldev] SUBJECT.KEYID = 5
1,209,370 UART: [ldev] AUTHORITY.KEYID = 7
1,209,833 UART: [ldev] FE.KEYID = 1
1,215,041 UART: [ldev] Erasing FE.KEYID = 1
1,241,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,892 UART: [fwproc] Recv command 0x46574c44
1,282,625 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,105 UART: ROM Fatal Error: 0x000B0017
1,330,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,572 UART: [idev] ++
1,173,740 UART: [idev] CDI.KEYID = 6
1,174,101 UART: [idev] SUBJECT.KEYID = 7
1,174,526 UART: [idev] UDS.KEYID = 0
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,270 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,281,971 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,335 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,477 UART: ROM Fatal Error: 0x000B0017
1,331,634 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,543 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,280 UART: [kat] SHA2-256
891,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,375 UART: [kat] SHA2-256
902,315 UART: [kat] SHA2-384
905,110 UART: [kat] SHA2-512-ACC
907,011 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,199,397 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,502 UART: [ldev] ++
1,209,670 UART: [ldev] CDI.KEYID = 6
1,210,034 UART: [ldev] SUBJECT.KEYID = 5
1,210,461 UART: [ldev] AUTHORITY.KEYID = 7
1,210,924 UART: [ldev] FE.KEYID = 1
1,215,898 UART: [ldev] Erasing FE.KEYID = 1
1,241,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,350 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,582 UART: ROM Fatal Error: 0x000B003B
1,329,741 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,606 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,047 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,725 UART: ROM Fatal Error: 0x000B003B
1,331,884 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,579 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
903,998 UART: [kat] SHA2-512-ACC
905,899 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,291 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,366 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,726 UART: ROM Fatal Error: 0x000B003B
1,329,885 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,782 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,574 UART: [kat] SHA2-256
902,514 UART: [kat] SHA2-384
905,361 UART: [kat] SHA2-512-ACC
907,262 UART: [kat] ECC-384
917,083 UART: [kat] HMAC-384Kdf
921,619 UART: [kat] LMS
1,169,931 UART: [kat] --
1,171,048 UART: [cold-reset] ++
1,171,504 UART: [fht] FHT @ 0x50003400
1,174,204 UART: [idev] ++
1,174,372 UART: [idev] CDI.KEYID = 6
1,174,733 UART: [idev] SUBJECT.KEYID = 7
1,175,158 UART: [idev] UDS.KEYID = 0
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,208,950 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,243,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,863 UART: [fwproc] Wait for Commands...
1,283,518 UART: [fwproc] Recv command 0x46574c44
1,284,251 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,149 UART: ROM Fatal Error: 0x000B003B
1,332,308 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,313 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,530 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,458 UART: ROM Fatal Error: 0x000B003B
1,330,617 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,926 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,731 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,937 UART: ROM Fatal Error: 0x000B003B
1,332,096 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,057 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,367 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,475 UART: [idev] ++
1,172,643 UART: [idev] CDI.KEYID = 6
1,173,004 UART: [idev] SUBJECT.KEYID = 7
1,173,429 UART: [idev] UDS.KEYID = 0
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,275 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,240,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,664 UART: [ldev] --
1,280,014 UART: [fwproc] Wait for Commands...
1,280,835 UART: [fwproc] Recv command 0x46574c44
1,281,568 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,575 UART: ROM Fatal Error: 0x000B0010
1,325,732 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,197 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
920,149 UART: [kat] LMS
1,168,461 UART: [kat] --
1,169,494 UART: [cold-reset] ++
1,169,834 UART: [fht] FHT @ 0x50003400
1,172,544 UART: [idev] ++
1,172,712 UART: [idev] CDI.KEYID = 6
1,173,073 UART: [idev] SUBJECT.KEYID = 7
1,173,498 UART: [idev] UDS.KEYID = 0
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,198,358 UART: [idev] Sha1 KeyId Algorithm
1,207,140 UART: [idev] --
1,208,059 UART: [ldev] ++
1,208,227 UART: [ldev] CDI.KEYID = 6
1,208,591 UART: [ldev] SUBJECT.KEYID = 5
1,209,018 UART: [ldev] AUTHORITY.KEYID = 7
1,209,481 UART: [ldev] FE.KEYID = 1
1,214,809 UART: [ldev] Erasing FE.KEYID = 1
1,241,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,533 UART: [ldev] --
1,280,925 UART: [fwproc] Wait for Commands...
1,281,702 UART: [fwproc] Recv command 0x46574c44
1,282,435 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,208 UART: ROM Fatal Error: 0x000B0010
1,325,365 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,684 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,240,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,788 UART: [fwproc] Wait for Commands...
1,280,591 UART: [fwproc] Recv command 0x46574c44
1,281,324 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,389 UART: ROM Fatal Error: 0x000B0010
1,325,546 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,279 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,885 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,170,998 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,707 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,607 UART: [ldev] --
1,281,047 UART: [fwproc] Wait for Commands...
1,281,744 UART: [fwproc] Recv command 0x46574c44
1,282,477 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,628 UART: ROM Fatal Error: 0x000B0010
1,325,785 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,366 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,614 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,570 UART: [fwproc] Wait for Commands...
1,281,157 UART: [fwproc] Recv command 0x46574c44
1,281,890 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,143 UART: ROM Fatal Error: 0x000B0010
1,325,300 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,977 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,913 UART: [ldev] ++
1,209,081 UART: [ldev] CDI.KEYID = 6
1,209,445 UART: [ldev] SUBJECT.KEYID = 5
1,209,872 UART: [ldev] AUTHORITY.KEYID = 7
1,210,335 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,896 UART: ROM Fatal Error: 0x000B0010
1,326,053 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,422 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,115 UART: [kat] SHA2-256
901,055 UART: [kat] SHA2-384
903,744 UART: [kat] SHA2-512-ACC
905,645 UART: [kat] ECC-384
915,496 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,379 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,381 UART: [idev] Sha1 KeyId Algorithm
1,207,365 UART: [idev] --
1,208,560 UART: [ldev] ++
1,208,728 UART: [ldev] CDI.KEYID = 6
1,209,092 UART: [ldev] SUBJECT.KEYID = 5
1,209,519 UART: [ldev] AUTHORITY.KEYID = 7
1,209,982 UART: [ldev] FE.KEYID = 1
1,215,172 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,233 UART: [fwproc] Recv command 0x46574c44
1,281,966 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,423 UART: ROM Fatal Error: 0x000B0012
1,330,580 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,521 UART: [kat] SHA2-256
891,071 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,200 UART: [kat] ++
895,352 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
904,133 UART: [kat] SHA2-512-ACC
906,034 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,503 UART: [fwproc] Wait for Commands...
1,283,090 UART: [fwproc] Recv command 0x46574c44
1,283,823 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,152 UART: ROM Fatal Error: 0x000B0012
1,331,309 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,620 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
891,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,737 UART: [kat] ++
895,889 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,594 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,673 UART: [fwproc] Recv command 0x46574c44
1,281,406 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,013 UART: ROM Fatal Error: 0x000B0012
1,329,170 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,553 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,198,452 UART: [idev] Sha1 KeyId Algorithm
1,207,394 UART: [idev] --
1,208,339 UART: [ldev] ++
1,208,507 UART: [ldev] CDI.KEYID = 6
1,208,871 UART: [ldev] SUBJECT.KEYID = 5
1,209,298 UART: [ldev] AUTHORITY.KEYID = 7
1,209,761 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,343 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,562 UART: [fwproc] Recv command 0x46574c44
1,282,295 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,480 UART: ROM Fatal Error: 0x000B0012
1,329,637 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,858 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,411 UART: [kat] SHA2-256
901,351 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,270 UART: [kat] HMAC-384Kdf
919,790 UART: [kat] LMS
1,168,102 UART: [kat] --
1,169,231 UART: [cold-reset] ++
1,169,565 UART: [fht] FHT @ 0x50003400
1,172,211 UART: [idev] ++
1,172,379 UART: [idev] CDI.KEYID = 6
1,172,740 UART: [idev] SUBJECT.KEYID = 7
1,173,165 UART: [idev] UDS.KEYID = 0
1,181,311 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,206,927 UART: [idev] --
1,207,894 UART: [ldev] ++
1,208,062 UART: [ldev] CDI.KEYID = 6
1,208,426 UART: [ldev] SUBJECT.KEYID = 5
1,208,853 UART: [ldev] AUTHORITY.KEYID = 7
1,209,316 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,240,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,152 UART: [ldev] --
1,279,652 UART: [fwproc] Wait for Commands...
1,280,275 UART: [fwproc] Recv command 0x46574c44
1,281,008 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,597 UART: ROM Fatal Error: 0x000B0012
1,328,754 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,411 UART: [kat] LMS
1,168,723 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,622 UART: [idev] ++
1,172,790 UART: [idev] CDI.KEYID = 6
1,173,151 UART: [idev] SUBJECT.KEYID = 7
1,173,576 UART: [idev] UDS.KEYID = 0
1,181,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,821 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,173 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,304 UART: ROM Fatal Error: 0x000B0012
1,331,461 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,648 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,199,571 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,504 UART: [ldev] ++
1,209,672 UART: [ldev] CDI.KEYID = 6
1,210,036 UART: [ldev] SUBJECT.KEYID = 5
1,210,463 UART: [ldev] AUTHORITY.KEYID = 7
1,210,926 UART: [ldev] FE.KEYID = 1
1,216,168 UART: [ldev] Erasing FE.KEYID = 1
1,242,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,920 UART: [ldev] --
1,282,350 UART: [fwproc] Wait for Commands...
1,283,069 UART: [fwproc] Recv command 0x46574c44
1,283,802 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,141 UART: ROM Fatal Error: 0x000B003C
1,332,300 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,453 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,459 UART: [ldev] ++
1,209,627 UART: [ldev] CDI.KEYID = 6
1,209,991 UART: [ldev] SUBJECT.KEYID = 5
1,210,418 UART: [ldev] AUTHORITY.KEYID = 7
1,210,881 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,271 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,645 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,496 UART: ROM Fatal Error: 0x000B003C
1,332,655 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,870 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,783 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,577 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,720 UART: [ldev] ++
1,209,888 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,679 UART: [ldev] AUTHORITY.KEYID = 7
1,211,142 UART: [ldev] FE.KEYID = 1
1,216,468 UART: [ldev] Erasing FE.KEYID = 1
1,242,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,224 UART: [ldev] --
1,282,706 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,969 UART: ROM Fatal Error: 0x000B003C
1,332,128 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,767 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,785 UART: [state] LifecycleState = Unprovisioned
85,440 UART: [state] DebugLocked = No
86,038 UART: [state] WD Timer not started. Device not locked for debugging
87,199 UART: [kat] SHA2-256
890,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,878 UART: [kat] ++
895,030 UART: [kat] sha1
899,274 UART: [kat] SHA2-256
901,214 UART: [kat] SHA2-384
904,039 UART: [kat] SHA2-512-ACC
905,940 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,798 UART: [fht] FHT @ 0x50003400
1,172,346 UART: [idev] ++
1,172,514 UART: [idev] CDI.KEYID = 6
1,172,875 UART: [idev] SUBJECT.KEYID = 7
1,173,300 UART: [idev] UDS.KEYID = 0
1,181,118 UART: [idev] Erasing UDS.KEYID = 0
1,198,524 UART: [idev] Sha1 KeyId Algorithm
1,207,424 UART: [idev] --
1,208,395 UART: [ldev] ++
1,208,563 UART: [ldev] CDI.KEYID = 6
1,208,927 UART: [ldev] SUBJECT.KEYID = 5
1,209,354 UART: [ldev] AUTHORITY.KEYID = 7
1,209,817 UART: [ldev] FE.KEYID = 1
1,215,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,503 UART: [ldev] --
1,280,933 UART: [fwproc] Wait for Commands...
1,281,714 UART: [fwproc] Recv command 0x46574c44
1,282,447 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,690 UART: ROM Fatal Error: 0x000B003C
1,330,849 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,908 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,230 UART: [kat] LMS
1,168,542 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,181,871 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,201 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,389 UART: ROM Fatal Error: 0x000B003C
1,331,548 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,499 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Unprovisioned
85,536 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,181,732 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,685 UART: [ldev] ++
1,208,853 UART: [ldev] CDI.KEYID = 6
1,209,217 UART: [ldev] SUBJECT.KEYID = 5
1,209,644 UART: [ldev] AUTHORITY.KEYID = 7
1,210,107 UART: [ldev] FE.KEYID = 1
1,215,093 UART: [ldev] Erasing FE.KEYID = 1
1,241,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,803 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,666 UART: ROM Fatal Error: 0x000B003C
1,330,825 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,426 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,199,311 UART: [idev] Sha1 KeyId Algorithm
1,208,345 UART: [idev] --
1,209,364 UART: [ldev] ++
1,209,532 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,323 UART: [ldev] AUTHORITY.KEYID = 7
1,210,786 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,424 UART: [ldev] --
1,281,730 UART: [fwproc] Wait for Commands...
1,282,531 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: Invalid Img size: 0 bytes
1,284,156 UART: ROM Fatal Error: 0x01020002
1,285,315 >>> mbox cmd response: failed
1,285,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,321 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,371 >>> mbox cmd response: failed
1,137,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,137,377 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,198,762 UART: [idev] Sha1 KeyId Algorithm
1,207,740 UART: [idev] --
1,208,681 UART: [ldev] ++
1,208,849 UART: [ldev] CDI.KEYID = 6
1,209,213 UART: [ldev] SUBJECT.KEYID = 5
1,209,640 UART: [ldev] AUTHORITY.KEYID = 7
1,210,103 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: Invalid Img size: 0 bytes
1,284,043 UART: ROM Fatal Error: 0x01020002
1,285,202 >>> mbox cmd response: failed
1,285,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,208 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,264 >>> mbox cmd response: failed
1,138,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,270 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,319 UART: [state] DebugLocked = No
86,931 UART: [state] WD Timer not started. Device not locked for debugging
88,208 UART: [kat] SHA2-256
891,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,887 UART: [kat] ++
896,039 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,215,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,613 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: Invalid Img size: 0 bytes
1,283,418 UART: ROM Fatal Error: 0x01020002
1,284,577 >>> mbox cmd response: failed
1,284,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,583 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,405 >>> mbox cmd response: failed
1,137,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,137,411 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,992 UART: [fht] FHT @ 0x50003400
1,172,798 UART: [idev] ++
1,172,966 UART: [idev] CDI.KEYID = 6
1,173,327 UART: [idev] SUBJECT.KEYID = 7
1,173,752 UART: [idev] UDS.KEYID = 0
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,644 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,061 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: Invalid Img size: 0 bytes
1,284,545 UART: ROM Fatal Error: 0x01020002
1,285,704 >>> mbox cmd response: failed
1,285,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,710 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,914 >>> mbox cmd response: failed
1,136,914 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,136,920 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,198,327 UART: [idev] Sha1 KeyId Algorithm
1,207,193 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,214,830 UART: [ldev] Erasing FE.KEYID = 1
1,240,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,026 UART: [ldev] --
1,279,320 UART: [fwproc] Wait for Commands...
1,280,029 UART: [fwproc] Recv command 0x46574c44
1,280,758 UART: Invalid Img size: 0 bytes
1,281,734 UART: ROM Fatal Error: 0x01020002
1,282,893 >>> mbox cmd response: failed
1,282,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,282,899 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,261 >>> mbox cmd response: failed
1,138,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,267 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,962 UART: [idev] Sha1 KeyId Algorithm
1,209,090 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,723 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,240 UART: [fwproc] Recv command 0x46574c44
1,283,969 UART: Invalid Img size: 0 bytes
1,284,725 UART: ROM Fatal Error: 0x01020002
1,285,884 >>> mbox cmd response: failed
1,285,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,890 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,840 >>> mbox cmd response: failed
1,138,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,846 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,679 UART: [idev] ++
1,172,847 UART: [idev] CDI.KEYID = 6
1,173,208 UART: [idev] SUBJECT.KEYID = 7
1,173,633 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,227 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,212 UART: [ldev] ++
1,208,380 UART: [ldev] CDI.KEYID = 6
1,208,744 UART: [ldev] SUBJECT.KEYID = 5
1,209,171 UART: [ldev] AUTHORITY.KEYID = 7
1,209,634 UART: [ldev] FE.KEYID = 1
1,215,100 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,397 UART: [fwproc] Recv command 0x4d454153
1,283,414 UART: ROM Fatal Error: 0x01020005
1,284,573 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,627 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,750 UART: [cold-reset] ++
1,171,286 UART: [fht] FHT @ 0x50003400
1,174,058 UART: [idev] ++
1,174,226 UART: [idev] CDI.KEYID = 6
1,174,587 UART: [idev] SUBJECT.KEYID = 7
1,175,012 UART: [idev] UDS.KEYID = 0
1,183,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,470 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,665 UART: [ldev] SUBJECT.KEYID = 5
1,211,092 UART: [ldev] AUTHORITY.KEYID = 7
1,211,555 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,244,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,203 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,392 UART: [fwproc] Recv command 0x4d454153
1,286,399 UART: ROM Fatal Error: 0x01020005
1,287,558 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,342 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,255 UART: [kat] SHA2-256
901,195 UART: [kat] SHA2-384
903,958 UART: [kat] SHA2-512-ACC
905,859 UART: [kat] ECC-384
915,646 UART: [kat] HMAC-384Kdf
920,274 UART: [kat] LMS
1,168,586 UART: [kat] --
1,169,627 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,198,753 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,241,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,486 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x4d454153
1,283,788 UART: ROM Fatal Error: 0x01020005
1,284,947 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,135,253 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,207,996 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,921 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,281,910 UART: [fwproc] Recv command 0x4d454153
1,284,059 UART: ROM Fatal Error: 0x01020005
1,285,218 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,596 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,604 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,233 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,182,777 UART: [idev] Erasing UDS.KEYID = 0
1,199,733 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,944 UART: [ldev] ++
1,210,112 UART: [ldev] CDI.KEYID = 6
1,210,476 UART: [ldev] SUBJECT.KEYID = 5
1,210,903 UART: [ldev] AUTHORITY.KEYID = 7
1,211,366 UART: [ldev] FE.KEYID = 1
1,216,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,914 UART: [ldev] --
1,282,400 UART: [fwproc] Wait for Commands...
1,282,993 UART: [fwproc] Recv command 0x4d454153
1,284,940 UART: ROM Fatal Error: 0x01020005
1,286,099 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,727 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,128 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,209,058 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,216,959 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x4d454153
1,285,483 UART: ROM Fatal Error: 0x01020005
1,286,642 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,526 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,723 UART: [idev] --
1,207,836 UART: [ldev] ++
1,208,004 UART: [ldev] CDI.KEYID = 6
1,208,368 UART: [ldev] SUBJECT.KEYID = 5
1,208,795 UART: [ldev] AUTHORITY.KEYID = 7
1,209,258 UART: [ldev] FE.KEYID = 1
1,214,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,448 UART: [fwproc] Wait for Commands...
1,281,183 UART: [fwproc] Recv command 0x43415053
1,282,516 UART: ROM Fatal Error: 0x01020006
1,283,675 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,919 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,124 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,470 UART: [kat] SHA2-256
902,410 UART: [kat] SHA2-384
905,329 UART: [kat] SHA2-512-ACC
907,230 UART: [kat] ECC-384
916,863 UART: [kat] HMAC-384Kdf
921,643 UART: [kat] LMS
1,169,955 UART: [kat] --
1,171,032 UART: [cold-reset] ++
1,171,582 UART: [fht] FHT @ 0x50003400
1,174,330 UART: [idev] ++
1,174,498 UART: [idev] CDI.KEYID = 6
1,174,859 UART: [idev] SUBJECT.KEYID = 7
1,175,284 UART: [idev] UDS.KEYID = 0
1,183,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,499 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,333 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x43415053
1,284,151 UART: ROM Fatal Error: 0x01020006
1,285,310 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,074 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,390 UART: [ldev] --
1,280,678 UART: [fwproc] Wait for Commands...
1,281,321 UART: [fwproc] Recv command 0x43415053
1,282,384 UART: ROM Fatal Error: 0x01020006
1,283,543 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,005 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,353 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x43415053
1,283,157 UART: ROM Fatal Error: 0x01020006
1,284,316 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,986 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,181,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,191 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,368 UART: [ldev] Erasing FE.KEYID = 1
1,240,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,500 UART: [ldev] --
1,279,814 UART: [fwproc] Wait for Commands...
1,280,607 UART: [fwproc] Recv command 0x43415053
1,281,928 UART: ROM Fatal Error: 0x01020006
1,283,087 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,685 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,216,075 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x43415053
1,283,479 UART: ROM Fatal Error: 0x01020006
1,284,638 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,372 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,961 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,681 UART: [fwproc] Recv command 0x4d454153
1,282,845 UART: ROM Fatal Error: 0x01020006
1,284,004 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,198 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,680 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,733 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x4d454153
1,283,032 UART: ROM Fatal Error: 0x01020006
1,284,191 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,339 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x4d454153
1,282,723 UART: ROM Fatal Error: 0x01020006
1,283,882 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,135,698 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,702 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x4d454153
1,283,512 UART: ROM Fatal Error: 0x01020006
1,284,671 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,913 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,431 UART: [idev] Sha1 KeyId Algorithm
1,208,295 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,918 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,968 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,141 UART: [fwproc] Recv command 0x4d454153
1,283,411 UART: ROM Fatal Error: 0x01020006
1,284,570 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,460 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,251 UART: [ldev] Erasing FE.KEYID = 1
1,241,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,489 UART: [ldev] --
1,280,905 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x4d454153
1,283,034 UART: ROM Fatal Error: 0x01020006
1,284,193 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,541 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,300 UART: [state] LifecycleState = Unprovisioned
84,955 UART: [state] DebugLocked = No
85,483 UART: [state] WD Timer not started. Device not locked for debugging
86,802 UART: [kat] SHA2-256
890,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,481 UART: [kat] ++
894,633 UART: [kat] sha1
898,797 UART: [kat] SHA2-256
900,737 UART: [kat] SHA2-384
903,376 UART: [kat] SHA2-512-ACC
905,277 UART: [kat] ECC-384
915,262 UART: [kat] HMAC-384Kdf
919,690 UART: [kat] LMS
1,168,002 UART: [kat] --
1,168,733 UART: [cold-reset] ++
1,169,209 UART: [fht] FHT @ 0x50003400
1,171,815 UART: [idev] ++
1,171,983 UART: [idev] CDI.KEYID = 6
1,172,344 UART: [idev] SUBJECT.KEYID = 7
1,172,769 UART: [idev] UDS.KEYID = 0
1,180,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,248 UART: [ldev] ++
1,208,416 UART: [ldev] CDI.KEYID = 6
1,208,780 UART: [ldev] SUBJECT.KEYID = 5
1,209,207 UART: [ldev] AUTHORITY.KEYID = 7
1,209,670 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,241,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,373 UART: [fwproc] Recv command 0x43415053
1,282,342 UART: ROM Fatal Error: 0x01020006
1,283,501 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,055 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,181,738 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,207,330 UART: [idev] --
1,208,355 UART: [ldev] ++
1,208,523 UART: [ldev] CDI.KEYID = 6
1,208,887 UART: [ldev] SUBJECT.KEYID = 5
1,209,314 UART: [ldev] AUTHORITY.KEYID = 7
1,209,777 UART: [ldev] FE.KEYID = 1
1,214,917 UART: [ldev] Erasing FE.KEYID = 1
1,240,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,539 UART: [ldev] --
1,279,939 UART: [fwproc] Wait for Commands...
1,280,548 UART: [fwproc] Recv command 0x43415053
1,281,793 UART: ROM Fatal Error: 0x01020006
1,282,952 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,278 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,181,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,571 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,286 UART: [ldev] ++
1,208,454 UART: [ldev] CDI.KEYID = 6
1,208,818 UART: [ldev] SUBJECT.KEYID = 5
1,209,245 UART: [ldev] AUTHORITY.KEYID = 7
1,209,708 UART: [ldev] FE.KEYID = 1
1,214,538 UART: [ldev] Erasing FE.KEYID = 1
1,240,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,758 UART: [ldev] --
1,280,112 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x43415053
1,282,034 UART: ROM Fatal Error: 0x01020006
1,283,193 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,931 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,084 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,547 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,725 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x43415053
1,284,621 UART: ROM Fatal Error: 0x01020006
1,285,780 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,742 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,847 UART: [fwproc] Recv command 0x43415053
1,283,116 UART: ROM Fatal Error: 0x01020006
1,284,275 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,697 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,344 UART: [kat] SHA2-256
902,284 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,245 UART: [ldev] --
1,281,583 UART: [fwproc] Wait for Commands...
1,282,282 UART: [fwproc] Recv command 0x43415053
1,283,507 UART: ROM Fatal Error: 0x01020006
1,284,666 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,666 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,971 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,422 UART: [ldev] --
1,280,784 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0xabcd1234
1,282,310 UART: [fwproc] Invalid command received
1,283,433 UART: ROM Fatal Error: 0x01020004
1,284,592 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,135,940 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,215,985 UART: [ldev] Erasing FE.KEYID = 1
1,241,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,063 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,140 UART: [fwproc] Recv command 0xabcd1234
1,282,885 UART: [fwproc] Invalid command received
1,283,880 UART: ROM Fatal Error: 0x01020004
1,285,039 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,257 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,417 UART: [idev] ++
1,173,585 UART: [idev] CDI.KEYID = 6
1,173,946 UART: [idev] SUBJECT.KEYID = 7
1,174,371 UART: [idev] UDS.KEYID = 0
1,182,589 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,383 UART: [idev] --
1,209,346 UART: [ldev] ++
1,209,514 UART: [ldev] CDI.KEYID = 6
1,209,878 UART: [ldev] SUBJECT.KEYID = 5
1,210,305 UART: [ldev] AUTHORITY.KEYID = 7
1,210,768 UART: [ldev] FE.KEYID = 1
1,215,958 UART: [ldev] Erasing FE.KEYID = 1
1,242,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,042 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,045 UART: [fwproc] Recv command 0xabcd1234
1,283,790 UART: [fwproc] Invalid command received
1,284,741 UART: ROM Fatal Error: 0x01020004
1,285,900 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,716 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,444 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,001 UART: [ldev] --
1,282,343 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0xabcd1234
1,283,809 UART: [fwproc] Invalid command received
1,284,860 UART: ROM Fatal Error: 0x01020004
1,286,019 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,627 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,169 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,241,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,118 UART: [fwproc] Wait for Commands...
1,281,729 UART: [fwproc] Recv command 0xabcd1234
1,282,474 UART: [fwproc] Invalid command received
1,283,601 UART: ROM Fatal Error: 0x01020004
1,284,760 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,302 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,276 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,198,968 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,871 UART: [fwproc] Wait for Commands...
1,282,664 UART: [fwproc] Recv command 0xabcd1234
1,283,409 UART: [fwproc] Invalid command received
1,284,546 UART: ROM Fatal Error: 0x01020004
1,285,705 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,113 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,445 UART: [idev] ++
1,172,613 UART: [idev] CDI.KEYID = 6
1,172,974 UART: [idev] SUBJECT.KEYID = 7
1,173,399 UART: [idev] UDS.KEYID = 0
1,173,745 ready_for_fw is high
1,173,745 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,206,985 UART: [idev] --
1,207,902 UART: [ldev] ++
1,208,070 UART: [ldev] CDI.KEYID = 6
1,208,434 UART: [ldev] SUBJECT.KEYID = 5
1,208,861 UART: [ldev] AUTHORITY.KEYID = 7
1,209,324 UART: [ldev] FE.KEYID = 1
1,214,390 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,730 UART: [ldev] --
1,280,126 UART: [fwproc] Wait for Commands...
1,280,951 UART: [fwproc] Recv command 0x46574c44
1,281,684 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,725 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,550 >>> mbox cmd response: success
2,675,550 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,627 UART: [afmc] ++
2,676,795 UART: [afmc] CDI.KEYID = 6
2,677,158 UART: [afmc] SUBJECT.KEYID = 7
2,677,584 UART: [afmc] AUTHORITY.KEYID = 5
2,713,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,359 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,079 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,972 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,665 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,534 UART: [afmc] --
2,756,494 UART: [cold-reset] --
2,757,216 UART: [state] Locking Datavault
2,758,275 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,879 UART: [state] Locking ICCM
2,759,485 UART: [exit] Launching FMC @ 0x40000000
2,764,782 UART:
2,764,798 UART: Running Caliptra FMC ...
2,765,206 UART:
2,765,344 UART: [fmc] Received command: 0x10000008
2,766,376 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,162 ready_for_fw is high
1,056,162 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,902 >>> mbox cmd response: success
2,522,902 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,929 UART:
2,584,945 UART: Running Caliptra FMC ...
2,585,353 UART:
2,585,491 UART: [fmc] Received command: 0x10000008
2,586,523 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
891,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,519 UART: [kat] LMS
1,168,831 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,958 UART: [idev] ++
1,173,126 UART: [idev] CDI.KEYID = 6
1,173,487 UART: [idev] SUBJECT.KEYID = 7
1,173,912 UART: [idev] UDS.KEYID = 0
1,174,258 ready_for_fw is high
1,174,258 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,570 UART: [idev] Sha1 KeyId Algorithm
1,207,624 UART: [idev] --
1,208,553 UART: [ldev] ++
1,208,721 UART: [ldev] CDI.KEYID = 6
1,209,085 UART: [ldev] SUBJECT.KEYID = 5
1,209,512 UART: [ldev] AUTHORITY.KEYID = 7
1,209,975 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,281,017 UART: [fwproc] Wait for Commands...
1,281,720 UART: [fwproc] Recv command 0x46574c44
1,282,453 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,796 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,605 >>> mbox cmd response: success
2,674,605 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,675,674 UART: [afmc] ++
2,675,842 UART: [afmc] CDI.KEYID = 6
2,676,205 UART: [afmc] SUBJECT.KEYID = 7
2,676,631 UART: [afmc] AUTHORITY.KEYID = 5
2,712,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,728 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,448 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,341 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,034 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,699 UART: [afmc] --
2,755,591 UART: [cold-reset] --
2,756,533 UART: [state] Locking Datavault
2,757,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,306 UART: [state] Locking ICCM
2,758,952 UART: [exit] Launching FMC @ 0x40000000
2,764,249 UART:
2,764,265 UART: Running Caliptra FMC ...
2,764,673 UART:
2,764,811 UART: [fmc] Received command: 0x10000008
2,765,843 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,445 >>> mbox cmd response: success
2,523,445 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,742 UART:
2,586,758 UART: Running Caliptra FMC ...
2,587,166 UART:
2,587,304 UART: [fmc] Received command: 0x10000008
2,588,336 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,946 UART: [kat] SHA2-512-ACC
906,847 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,553 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,174,531 ready_for_fw is high
1,174,531 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,602 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,679 UART: [fwproc] Recv command 0x46574c44
1,282,412 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,513 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,400 >>> mbox cmd response: success
2,676,400 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,491 UART: [afmc] ++
2,677,659 UART: [afmc] CDI.KEYID = 6
2,678,022 UART: [afmc] SUBJECT.KEYID = 7
2,678,448 UART: [afmc] AUTHORITY.KEYID = 5
2,713,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,951 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,671 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,564 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,257 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,048 UART: [afmc] --
2,757,048 UART: [cold-reset] --
2,757,820 UART: [state] Locking Datavault
2,758,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,325 UART: [state] Locking ICCM
2,759,769 UART: [exit] Launching FMC @ 0x40000000
2,765,066 UART:
2,765,082 UART: Running Caliptra FMC ...
2,765,490 UART:
2,765,628 UART: [fmc] Received command: 0x10000008
2,766,660 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,348 ready_for_fw is high
1,055,348 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,108 >>> mbox cmd response: success
2,525,108 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,355 UART:
2,586,371 UART: Running Caliptra FMC ...
2,586,779 UART:
2,586,917 UART: [fmc] Received command: 0x10000008
2,587,949 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,213 UART: [kat] LMS
1,169,525 UART: [kat] --
1,170,566 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,634 UART: [idev] ++
1,173,802 UART: [idev] CDI.KEYID = 6
1,174,163 UART: [idev] SUBJECT.KEYID = 7
1,174,588 UART: [idev] UDS.KEYID = 0
1,174,934 ready_for_fw is high
1,174,934 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,200,262 UART: [idev] Sha1 KeyId Algorithm
1,209,212 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,443 UART: [ldev] --
1,282,835 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,195 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,746 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,751 >>> mbox cmd response: success
2,677,751 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,678,860 UART: [afmc] ++
2,679,028 UART: [afmc] CDI.KEYID = 6
2,679,391 UART: [afmc] SUBJECT.KEYID = 7
2,679,817 UART: [afmc] AUTHORITY.KEYID = 5
2,714,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,364 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,084 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,977 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,670 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,419 UART: [afmc] --
2,758,423 UART: [cold-reset] --
2,759,331 UART: [state] Locking Datavault
2,760,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,406 UART: [state] Locking ICCM
2,761,954 UART: [exit] Launching FMC @ 0x40000000
2,767,251 UART:
2,767,267 UART: Running Caliptra FMC ...
2,767,675 UART:
2,767,813 UART: [fmc] Received command: 0x10000008
2,768,845 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 ready_for_fw is high
1,056,253 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,531 >>> mbox cmd response: success
2,525,531 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,878 UART:
2,587,894 UART: Running Caliptra FMC ...
2,588,302 UART:
2,588,440 UART: [fmc] Received command: 0x10000008
2,589,472 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
915,610 UART: [kat] HMAC-384Kdf
920,012 UART: [kat] LMS
1,168,324 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 ready_for_fw is high
1,173,857 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,199,637 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,572 UART: [ldev] ++
1,209,740 UART: [ldev] CDI.KEYID = 6
1,210,104 UART: [ldev] SUBJECT.KEYID = 5
1,210,531 UART: [ldev] AUTHORITY.KEYID = 7
1,210,994 UART: [ldev] FE.KEYID = 1
1,216,140 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,783 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,786 >>> mbox cmd response: success
2,675,786 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,909 UART: [afmc] ++
2,677,077 UART: [afmc] CDI.KEYID = 6
2,677,440 UART: [afmc] SUBJECT.KEYID = 7
2,677,866 UART: [afmc] AUTHORITY.KEYID = 5
2,713,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,361 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,081 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,974 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,667 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,514 UART: [afmc] --
2,757,440 UART: [cold-reset] --
2,758,530 UART: [state] Locking Datavault
2,759,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,269 UART: [state] Locking ICCM
2,760,811 UART: [exit] Launching FMC @ 0x40000000
2,766,108 UART:
2,766,124 UART: Running Caliptra FMC ...
2,766,532 UART:
2,766,670 UART: [fmc] Received command: 0x10000008
2,767,702 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,568 ready_for_fw is high
1,056,568 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,646 >>> mbox cmd response: success
2,525,646 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,447 UART:
2,588,463 UART: Running Caliptra FMC ...
2,588,871 UART:
2,589,009 UART: [fmc] Received command: 0x10000008
2,590,041 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,174,536 ready_for_fw is high
1,174,536 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,930 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,047 UART: [fwproc] Wait for Commands...
1,282,812 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,392 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,299 >>> mbox cmd response: success
2,676,299 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,512 UART: [afmc] ++
2,677,680 UART: [afmc] CDI.KEYID = 6
2,678,043 UART: [afmc] SUBJECT.KEYID = 7
2,678,469 UART: [afmc] AUTHORITY.KEYID = 5
2,713,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,076 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,796 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,689 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,382 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,239 UART: [afmc] --
2,757,353 UART: [cold-reset] --
2,758,151 UART: [state] Locking Datavault
2,759,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,934 UART: [state] Locking ICCM
2,760,584 UART: [exit] Launching FMC @ 0x40000000
2,765,881 UART:
2,765,897 UART: Running Caliptra FMC ...
2,766,305 UART:
2,766,443 UART: [fmc] Received command: 0x10000008
2,767,475 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 ready_for_fw is high
1,056,247 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,813 >>> mbox cmd response: success
2,522,813 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,670 UART:
2,585,686 UART: Running Caliptra FMC ...
2,586,094 UART:
2,586,232 UART: [fmc] Received command: 0x10000008
2,587,264 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: ROM integrity test failed
895,812 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: ROM integrity test failed
895,981 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.24s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: ROM integrity test failed
895,602 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,694 UART: ROM integrity test failed
896,141 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: ROM integrity test failed
895,646 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: ROM integrity test failed
895,645 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,796 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46574c44
1,282,306 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,816 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,249 >>> mbox cmd response: success
2,740,466 UART: [afmc] ++
2,740,634 UART: [afmc] CDI.KEYID = 6
2,740,997 UART: [afmc] SUBJECT.KEYID = 7
2,741,423 UART: [afmc] AUTHORITY.KEYID = 5
2,777,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,187 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,883 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,782 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,475 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,455 UART: [afmc] --
2,820,541 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,563 UART: [cold-reset] --
2,821,493 UART: [state] Locking Datavault
2,822,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,324 UART: [state] Locking ICCM
2,823,862 UART: [exit] Launching FMC @ 0x40000000
2,829,159 UART:
2,829,175 UART: Running Caliptra FMC ...
2,829,583 UART:
2,829,813 UART: [fmc] Received command: 0x46574C44
2,830,639 UART:
2,830,655 UART: Running Caliptra ROM ...
2,831,063 UART:
2,831,118 UART: [state] CFI Enabled
2,833,708 UART: [state] LifecycleState = Unprovisioned
2,834,363 UART: [state] DebugLocked = No
2,835,015 UART: [state] WD Timer not started. Device not locked for debugging
2,836,297 UART: [kat] SHA2-256
3,639,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,976 UART: [kat] ++
3,644,128 UART: [kat] sha1
3,648,364 UART: [kat] SHA2-256
3,650,304 UART: [kat] SHA2-384
3,653,047 UART: [kat] SHA2-512-ACC
3,654,947 UART: [kat] ECC-384
3,664,762 UART: [kat] HMAC-384Kdf
3,669,336 UART: [kat] LMS
3,917,648 UART: [kat] --
3,918,498 UART: [update-reset] ++
5,202,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,358 >>> mbox cmd response: success
5,351,547 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,561 UART: [update-reset Success] --
5,359,970 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,360,538 UART: [state] Locking Datavault
5,361,230 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,834 UART: [state] Locking ICCM
5,362,430 UART: [exit] Launching FMC @ 0x40000000
5,367,727 UART:
5,367,743 UART: Running Caliptra FMC ...
5,368,151 UART:
5,368,373 UART: [fmc] Received command: 0x1000000D
5,369,465 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 ready_for_fw is high
1,056,588 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,467 >>> mbox cmd response: success
2,647,792 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,743 UART:
2,653,759 UART: Running Caliptra FMC ...
2,654,167 UART:
2,654,397 UART: [fmc] Received command: 0x46574C44
5,058,639 >>> mbox cmd response: success
5,066,155 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,013 UART:
5,072,029 UART: Running Caliptra FMC ...
5,072,437 UART:
5,072,659 UART: [fmc] Received command: 0x1000000D
5,073,751 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,502 UART: [kat] ++
895,654 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,418 UART: [idev] ++
1,173,586 UART: [idev] CDI.KEYID = 6
1,173,947 UART: [idev] SUBJECT.KEYID = 7
1,174,372 UART: [idev] UDS.KEYID = 0
1,174,718 ready_for_fw is high
1,174,718 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,047 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,899 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,302 >>> mbox cmd response: success
2,742,455 UART: [afmc] ++
2,742,623 UART: [afmc] CDI.KEYID = 6
2,742,986 UART: [afmc] SUBJECT.KEYID = 7
2,743,412 UART: [afmc] AUTHORITY.KEYID = 5
2,779,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,094 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,790 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,689 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,382 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,234 UART: [afmc] --
2,822,320 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,342 UART: [cold-reset] --
2,823,120 UART: [state] Locking Datavault
2,824,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,925 UART: [state] Locking ICCM
2,825,573 UART: [exit] Launching FMC @ 0x40000000
2,830,870 UART:
2,830,886 UART: Running Caliptra FMC ...
2,831,294 UART:
2,831,524 UART: [fmc] Received command: 0x46574C44
2,832,350 UART:
2,832,366 UART: Running Caliptra ROM ...
2,832,774 UART:
2,832,916 UART: [state] CFI Enabled
2,836,404 UART: [state] LifecycleState = Unprovisioned
2,837,059 UART: [state] DebugLocked = No
2,837,553 UART: [state] WD Timer not started. Device not locked for debugging
2,838,759 UART: [kat] SHA2-256
3,642,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,438 UART: [kat] ++
3,646,590 UART: [kat] sha1
3,650,760 UART: [kat] SHA2-256
3,652,700 UART: [kat] SHA2-384
3,655,293 UART: [kat] SHA2-512-ACC
3,657,193 UART: [kat] ECC-384
3,666,562 UART: [kat] HMAC-384Kdf
3,671,238 UART: [kat] LMS
3,919,550 UART: [kat] --
3,920,518 UART: [update-reset] ++
5,204,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,560 >>> mbox cmd response: success
5,353,813 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,827 UART: [update-reset Success] --
5,362,236 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,930 UART: [state] Locking Datavault
5,363,630 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,234 UART: [state] Locking ICCM
5,364,874 UART: [exit] Launching FMC @ 0x40000000
5,370,171 UART:
5,370,187 UART: Running Caliptra FMC ...
5,370,595 UART:
5,370,817 UART: [fmc] Received command: 0x1000000D
5,371,909 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,377 ready_for_fw is high
1,056,377 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,466 >>> mbox cmd response: success
2,647,827 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,840 UART:
2,653,856 UART: Running Caliptra FMC ...
2,654,264 UART:
2,654,494 UART: [fmc] Received command: 0x46574C44
5,059,677 >>> mbox cmd response: success
5,067,393 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,851 UART:
5,072,867 UART: Running Caliptra FMC ...
5,073,275 UART:
5,073,497 UART: [fmc] Received command: 0x1000000D
5,074,589 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,421 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,821 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,241,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,644 UART: [fwproc] Wait for Commands...
1,281,423 UART: [fwproc] Recv command 0x46574c44
1,282,156 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,482 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,909 >>> mbox cmd response: success
2,741,942 UART: [afmc] ++
2,742,110 UART: [afmc] CDI.KEYID = 6
2,742,473 UART: [afmc] SUBJECT.KEYID = 7
2,742,899 UART: [afmc] AUTHORITY.KEYID = 5
2,778,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,179 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,875 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,774 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,467 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,197 UART: [afmc] --
2,822,303 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,325 UART: [cold-reset] --
2,823,123 UART: [state] Locking Datavault
2,824,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,888 UART: [state] Locking ICCM
2,825,412 UART: [exit] Launching FMC @ 0x40000000
2,830,709 UART:
2,830,725 UART: Running Caliptra FMC ...
2,831,133 UART:
2,831,363 UART: [fmc] Received command: 0x46574C44
2,832,189 UART:
2,832,205 UART: Running Caliptra ROM ...
2,832,613 UART:
2,832,668 UART: [state] CFI Enabled
2,834,964 UART: [state] LifecycleState = Unprovisioned
2,835,619 UART: [state] DebugLocked = No
2,836,203 UART: [state] WD Timer not started. Device not locked for debugging
2,837,331 UART: [kat] SHA2-256
3,640,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,010 UART: [kat] ++
3,645,162 UART: [kat] sha1
3,649,428 UART: [kat] SHA2-256
3,651,368 UART: [kat] SHA2-384
3,654,021 UART: [kat] SHA2-512-ACC
3,655,921 UART: [kat] ECC-384
3,665,794 UART: [kat] HMAC-384Kdf
3,670,344 UART: [kat] LMS
3,918,656 UART: [kat] --
3,919,482 UART: [update-reset] ++
5,202,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,702 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,714 >>> mbox cmd response: success
5,351,909 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,923 UART: [update-reset Success] --
5,360,332 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,360,868 UART: [state] Locking Datavault
5,361,694 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,298 UART: [state] Locking ICCM
5,362,782 UART: [exit] Launching FMC @ 0x40000000
5,368,079 UART:
5,368,095 UART: Running Caliptra FMC ...
5,368,503 UART:
5,368,725 UART: [fmc] Received command: 0x1000000D
5,369,817 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,056 ready_for_fw is high
1,056,056 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,735 >>> mbox cmd response: success
2,645,580 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,805 UART:
2,651,821 UART: Running Caliptra FMC ...
2,652,229 UART:
2,652,459 UART: [fmc] Received command: 0x46574C44
5,057,575 >>> mbox cmd response: success
5,065,143 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,671 UART:
5,070,687 UART: Running Caliptra FMC ...
5,071,095 UART:
5,071,317 UART: [fmc] Received command: 0x1000000D
5,072,409 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,174,080 ready_for_fw is high
1,174,080 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,765 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,595 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,158 >>> mbox cmd response: success
2,741,201 UART: [afmc] ++
2,741,369 UART: [afmc] CDI.KEYID = 6
2,741,732 UART: [afmc] SUBJECT.KEYID = 7
2,742,158 UART: [afmc] AUTHORITY.KEYID = 5
2,778,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,504 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,200 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,099 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,792 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,420 UART: [afmc] --
2,821,476 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,821,498 UART: [cold-reset] --
2,822,250 UART: [state] Locking Datavault
2,823,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,981 UART: [state] Locking ICCM
2,824,543 UART: [exit] Launching FMC @ 0x40000000
2,829,840 UART:
2,829,856 UART: Running Caliptra FMC ...
2,830,264 UART:
2,830,494 UART: [fmc] Received command: 0x46574C44
2,831,320 UART:
2,831,336 UART: Running Caliptra ROM ...
2,831,744 UART:
2,831,886 UART: [state] CFI Enabled
2,834,654 UART: [state] LifecycleState = Unprovisioned
2,835,309 UART: [state] DebugLocked = No
2,835,793 UART: [state] WD Timer not started. Device not locked for debugging
2,836,939 UART: [kat] SHA2-256
3,640,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,618 UART: [kat] ++
3,644,770 UART: [kat] sha1
3,649,056 UART: [kat] SHA2-256
3,650,996 UART: [kat] SHA2-384
3,653,831 UART: [kat] SHA2-512-ACC
3,655,731 UART: [kat] ECC-384
3,665,514 UART: [kat] HMAC-384Kdf
3,670,068 UART: [kat] LMS
3,918,380 UART: [kat] --
3,919,212 UART: [update-reset] ++
5,202,161 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,186 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,198 >>> mbox cmd response: success
5,351,533 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,547 UART: [update-reset Success] --
5,359,956 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,360,614 UART: [state] Locking Datavault
5,361,288 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,892 UART: [state] Locking ICCM
5,362,536 UART: [exit] Launching FMC @ 0x40000000
5,367,833 UART:
5,367,849 UART: Running Caliptra FMC ...
5,368,257 UART:
5,368,479 UART: [fmc] Received command: 0x1000000D
5,369,571 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,399 ready_for_fw is high
1,056,399 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,692 >>> mbox cmd response: success
2,647,321 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,326 UART:
2,653,342 UART: Running Caliptra FMC ...
2,653,750 UART:
2,653,980 UART: [fmc] Received command: 0x46574C44
5,057,751 >>> mbox cmd response: success
5,065,245 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,957 UART:
5,070,973 UART: Running Caliptra FMC ...
5,071,381 UART:
5,071,603 UART: [fmc] Received command: 0x1000000D
5,072,695 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,285 UART: [idev] Erasing UDS.KEYID = 0
1,199,757 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,902 UART: [ldev] ++
1,210,070 UART: [ldev] CDI.KEYID = 6
1,210,434 UART: [ldev] SUBJECT.KEYID = 5
1,210,861 UART: [ldev] AUTHORITY.KEYID = 7
1,211,324 UART: [ldev] FE.KEYID = 1
1,216,738 UART: [ldev] Erasing FE.KEYID = 1
1,243,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,516 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,831 UART: [fwproc] Recv command 0x46574c44
1,283,564 UART: [fwproc] Recv'd Img size: 111916 bytes
2,554,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,520 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,743,123 >>> mbox cmd response: success
2,744,298 UART: [afmc] ++
2,744,466 UART: [afmc] CDI.KEYID = 6
2,744,829 UART: [afmc] SUBJECT.KEYID = 7
2,745,255 UART: [afmc] AUTHORITY.KEYID = 5
2,780,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,797 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,493 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,392 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,085 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,783 UART: [afmc] --
2,823,813 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,835 UART: [cold-reset] --
2,824,577 UART: [state] Locking Datavault
2,825,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,308 UART: [state] Locking ICCM
2,826,772 UART: [exit] Launching FMC @ 0x40000000
2,832,069 UART:
2,832,085 UART: Running Caliptra FMC ...
2,832,493 UART:
2,832,723 UART: [fmc] Received command: 0x46574C44
2,833,549 UART:
2,833,565 UART: Running Caliptra ROM ...
2,833,973 UART:
2,834,028 UART: [state] CFI Enabled
2,836,790 UART: [state] LifecycleState = Unprovisioned
2,837,445 UART: [state] DebugLocked = No
2,838,099 UART: [state] WD Timer not started. Device not locked for debugging
2,839,409 UART: [kat] SHA2-256
3,642,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,088 UART: [kat] ++
3,647,240 UART: [kat] sha1
3,651,386 UART: [kat] SHA2-256
3,653,326 UART: [kat] SHA2-384
3,655,893 UART: [kat] SHA2-512-ACC
3,657,793 UART: [kat] ECC-384
3,667,106 UART: [kat] HMAC-384Kdf
3,671,798 UART: [kat] LMS
3,920,110 UART: [kat] --
3,921,084 UART: [update-reset] ++
5,204,177 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,328 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,340 >>> mbox cmd response: success
5,353,645 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,659 UART: [update-reset Success] --
5,362,068 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,498 UART: [state] Locking Datavault
5,363,354 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,958 UART: [state] Locking ICCM
5,364,528 UART: [exit] Launching FMC @ 0x40000000
5,369,825 UART:
5,369,841 UART: Running Caliptra FMC ...
5,370,249 UART:
5,370,471 UART: [fmc] Received command: 0x1000000D
5,371,563 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,290 ready_for_fw is high
1,055,290 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,387 >>> mbox cmd response: success
2,644,804 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,223 UART:
2,651,239 UART: Running Caliptra FMC ...
2,651,647 UART:
2,651,877 UART: [fmc] Received command: 0x46574C44
5,054,121 >>> mbox cmd response: success
5,061,633 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,067,255 UART:
5,067,271 UART: Running Caliptra FMC ...
5,067,679 UART:
5,067,901 UART: [fmc] Received command: 0x1000000D
5,068,993 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,594 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,175,040 ready_for_fw is high
1,175,040 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,784 UART: [idev] Sha1 KeyId Algorithm
1,209,634 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,087 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,663 UART: [ldev] --
1,282,979 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,435 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,052 >>> mbox cmd response: success
2,743,261 UART: [afmc] ++
2,743,429 UART: [afmc] CDI.KEYID = 6
2,743,792 UART: [afmc] SUBJECT.KEYID = 7
2,744,218 UART: [afmc] AUTHORITY.KEYID = 5
2,780,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,520 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,216 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,115 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,808 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,812 UART: [afmc] --
2,823,884 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,906 UART: [cold-reset] --
2,824,880 UART: [state] Locking Datavault
2,826,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,717 UART: [state] Locking ICCM
2,827,237 UART: [exit] Launching FMC @ 0x40000000
2,832,534 UART:
2,832,550 UART: Running Caliptra FMC ...
2,832,958 UART:
2,833,188 UART: [fmc] Received command: 0x46574C44
2,834,014 UART:
2,834,030 UART: Running Caliptra ROM ...
2,834,438 UART:
2,834,580 UART: [state] CFI Enabled
2,837,300 UART: [state] LifecycleState = Unprovisioned
2,837,955 UART: [state] DebugLocked = No
2,838,561 UART: [state] WD Timer not started. Device not locked for debugging
2,839,767 UART: [kat] SHA2-256
3,643,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,446 UART: [kat] ++
3,647,598 UART: [kat] sha1
3,651,698 UART: [kat] SHA2-256
3,653,638 UART: [kat] SHA2-384
3,656,407 UART: [kat] SHA2-512-ACC
3,658,307 UART: [kat] ECC-384
3,668,240 UART: [kat] HMAC-384Kdf
3,672,894 UART: [kat] LMS
3,921,206 UART: [kat] --
3,921,996 UART: [update-reset] ++
5,205,283 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,470 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,354,482 >>> mbox cmd response: success
5,354,727 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,741 UART: [update-reset Success] --
5,363,150 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,363,672 UART: [state] Locking Datavault
5,364,622 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,226 UART: [state] Locking ICCM
5,365,646 UART: [exit] Launching FMC @ 0x40000000
5,370,943 UART:
5,370,959 UART: Running Caliptra FMC ...
5,371,367 UART:
5,371,589 UART: [fmc] Received command: 0x1000000D
5,372,681 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 ready_for_fw is high
1,056,783 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,912 >>> mbox cmd response: success
2,645,309 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,286 UART:
2,651,302 UART: Running Caliptra FMC ...
2,651,710 UART:
2,651,940 UART: [fmc] Received command: 0x46574C44
5,054,283 >>> mbox cmd response: success
5,061,939 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,067,569 UART:
5,067,585 UART: Running Caliptra FMC ...
5,067,993 UART:
5,068,215 UART: [fmc] Received command: 0x1000000D
5,069,307 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.25s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 ready_for_fw is high
1,174,313 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,490 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46574c44
1,281,826 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,634 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,233 >>> mbox cmd response: success
2,741,410 UART: [afmc] ++
2,741,578 UART: [afmc] CDI.KEYID = 6
2,741,941 UART: [afmc] SUBJECT.KEYID = 7
2,742,367 UART: [afmc] AUTHORITY.KEYID = 5
2,777,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,895 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,591 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,490 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,183 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,843 UART: [afmc] --
2,820,857 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,879 UART: [cold-reset] --
2,821,759 UART: [state] Locking Datavault
2,822,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,304 UART: [state] Locking ICCM
2,823,922 UART: [exit] Launching FMC @ 0x40000000
2,829,219 UART:
2,829,235 UART: Running Caliptra FMC ...
2,829,643 UART:
2,829,873 UART: [fmc] Received command: 0x46574C44
2,830,699 UART:
2,830,715 UART: Running Caliptra ROM ...
2,831,123 UART:
2,831,178 UART: [state] CFI Enabled
2,833,674 UART: [state] LifecycleState = Unprovisioned
2,834,329 UART: [state] DebugLocked = No
2,834,837 UART: [state] WD Timer not started. Device not locked for debugging
2,835,945 UART: [kat] SHA2-256
3,639,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,624 UART: [kat] ++
3,643,776 UART: [kat] sha1
3,648,020 UART: [kat] SHA2-256
3,649,960 UART: [kat] SHA2-384
3,652,553 UART: [kat] SHA2-512-ACC
3,654,453 UART: [kat] ECC-384
3,663,984 UART: [kat] HMAC-384Kdf
3,668,660 UART: [kat] LMS
3,916,972 UART: [kat] --
3,917,830 UART: [update-reset] ++
5,201,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,828 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,155 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,169 UART: [update-reset Success] --
5,359,578 >>> mbox cmd response: success
5,359,578 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,056 UART: [state] Locking Datavault
5,360,954 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,558 UART: [state] Locking ICCM
5,362,016 UART: [exit] Launching FMC @ 0x40000000
5,367,313 UART:
5,367,329 UART: Running Caliptra FMC ...
5,367,737 UART:
5,367,959 UART: [fmc] Received command: 0x1000000C
5,368,694 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,266 ready_for_fw is high
1,056,266 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,497 >>> mbox cmd response: success
2,646,480 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,911 UART:
2,652,927 UART: Running Caliptra FMC ...
2,653,335 UART:
2,653,565 UART: [fmc] Received command: 0x46574C44
5,064,235 >>> mbox cmd response: success
5,064,235 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,121 UART:
5,070,137 UART: Running Caliptra FMC ...
5,070,545 UART:
5,070,767 UART: [fmc] Received command: 0x1000000C
5,071,502 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,953 UART: [kat] HMAC-384Kdf
921,589 UART: [kat] LMS
1,169,901 UART: [kat] --
1,170,850 UART: [cold-reset] ++
1,171,276 UART: [fht] FHT @ 0x50003400
1,174,112 UART: [idev] ++
1,174,280 UART: [idev] CDI.KEYID = 6
1,174,641 UART: [idev] SUBJECT.KEYID = 7
1,175,066 UART: [idev] UDS.KEYID = 0
1,175,412 ready_for_fw is high
1,175,412 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,362 UART: [idev] Erasing UDS.KEYID = 0
1,200,592 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,009 UART: [ldev] SUBJECT.KEYID = 5
1,211,436 UART: [ldev] AUTHORITY.KEYID = 7
1,211,899 UART: [ldev] FE.KEYID = 1
1,217,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,263 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,797 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,743,342 >>> mbox cmd response: success
2,744,465 UART: [afmc] ++
2,744,633 UART: [afmc] CDI.KEYID = 6
2,744,996 UART: [afmc] SUBJECT.KEYID = 7
2,745,422 UART: [afmc] AUTHORITY.KEYID = 5
2,781,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,090 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,786 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,685 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,378 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,072 UART: [afmc] --
2,824,126 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,824,148 UART: [cold-reset] --
2,825,040 UART: [state] Locking Datavault
2,826,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,841 UART: [state] Locking ICCM
2,827,411 UART: [exit] Launching FMC @ 0x40000000
2,832,708 UART:
2,832,724 UART: Running Caliptra FMC ...
2,833,132 UART:
2,833,362 UART: [fmc] Received command: 0x46574C44
2,834,188 UART:
2,834,204 UART: Running Caliptra ROM ...
2,834,612 UART:
2,834,754 UART: [state] CFI Enabled
2,837,622 UART: [state] LifecycleState = Unprovisioned
2,838,277 UART: [state] DebugLocked = No
2,838,989 UART: [state] WD Timer not started. Device not locked for debugging
2,840,229 UART: [kat] SHA2-256
3,643,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,908 UART: [kat] ++
3,648,060 UART: [kat] sha1
3,652,418 UART: [kat] SHA2-256
3,654,358 UART: [kat] SHA2-384
3,657,133 UART: [kat] SHA2-512-ACC
3,659,033 UART: [kat] ECC-384
3,668,468 UART: [kat] HMAC-384Kdf
3,673,106 UART: [kat] LMS
3,921,418 UART: [kat] --
3,922,262 UART: [update-reset] ++
5,206,553 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,356,023 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,037 UART: [update-reset Success] --
5,364,446 >>> mbox cmd response: success
5,364,446 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,364,852 UART: [state] Locking Datavault
5,365,498 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,102 UART: [state] Locking ICCM
5,366,540 UART: [exit] Launching FMC @ 0x40000000
5,371,837 UART:
5,371,853 UART: Running Caliptra FMC ...
5,372,261 UART:
5,372,483 UART: [fmc] Received command: 0x1000000C
5,373,218 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,477 ready_for_fw is high
1,056,477 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,594 >>> mbox cmd response: success
2,647,307 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,264 UART:
2,653,280 UART: Running Caliptra FMC ...
2,653,688 UART:
2,653,918 UART: [fmc] Received command: 0x46574C44
5,065,243 >>> mbox cmd response: success
5,065,243 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,007 UART:
5,071,023 UART: Running Caliptra FMC ...
5,071,431 UART:
5,071,653 UART: [fmc] Received command: 0x1000000C
5,072,388 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,174,457 ready_for_fw is high
1,174,457 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,199,217 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,214 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,241 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,304 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,935 >>> mbox cmd response: success
2,742,962 UART: [afmc] ++
2,743,130 UART: [afmc] CDI.KEYID = 6
2,743,493 UART: [afmc] SUBJECT.KEYID = 7
2,743,919 UART: [afmc] AUTHORITY.KEYID = 5
2,779,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,447 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,143 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,042 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,735 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,579 UART: [afmc] --
2,822,609 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,631 UART: [cold-reset] --
2,823,431 UART: [state] Locking Datavault
2,824,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,280 UART: [state] Locking ICCM
2,825,828 UART: [exit] Launching FMC @ 0x40000000
2,831,125 UART:
2,831,141 UART: Running Caliptra FMC ...
2,831,549 UART:
2,831,779 UART: [fmc] Received command: 0x46574C44
2,832,605 UART:
2,832,621 UART: Running Caliptra ROM ...
2,833,029 UART:
2,833,084 UART: [state] CFI Enabled
2,835,674 UART: [state] LifecycleState = Unprovisioned
2,836,329 UART: [state] DebugLocked = No
2,836,855 UART: [state] WD Timer not started. Device not locked for debugging
2,838,211 UART: [kat] SHA2-256
3,641,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,890 UART: [kat] ++
3,646,042 UART: [kat] sha1
3,650,072 UART: [kat] SHA2-256
3,652,012 UART: [kat] SHA2-384
3,654,727 UART: [kat] SHA2-512-ACC
3,656,627 UART: [kat] ECC-384
3,665,948 UART: [kat] HMAC-384Kdf
3,670,446 UART: [kat] LMS
3,918,758 UART: [kat] --
3,919,446 UART: [update-reset] ++
5,202,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,796 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,097 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,111 UART: [update-reset Success] --
5,360,520 >>> mbox cmd response: success
5,360,520 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,008 UART: [state] Locking Datavault
5,361,830 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,434 UART: [state] Locking ICCM
5,362,988 UART: [exit] Launching FMC @ 0x40000000
5,368,285 UART:
5,368,301 UART: Running Caliptra FMC ...
5,368,709 UART:
5,368,931 UART: [fmc] Received command: 0x1000000C
5,369,666 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,388 ready_for_fw is high
1,055,388 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,787 >>> mbox cmd response: success
2,645,844 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,029 UART:
2,652,045 UART: Running Caliptra FMC ...
2,652,453 UART:
2,652,683 UART: [fmc] Received command: 0x46574C44
5,064,111 >>> mbox cmd response: success
5,064,111 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,985 UART:
5,070,001 UART: Running Caliptra FMC ...
5,070,409 UART:
5,070,631 UART: [fmc] Received command: 0x1000000C
5,071,366 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,617 UART: [kat] LMS
1,168,929 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,174,380 ready_for_fw is high
1,174,380 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,993 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,063 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,748 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,488 >>> mbox cmd response: success
2,742,503 UART: [afmc] ++
2,742,671 UART: [afmc] CDI.KEYID = 6
2,743,034 UART: [afmc] SUBJECT.KEYID = 7
2,743,460 UART: [afmc] AUTHORITY.KEYID = 5
2,779,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,682 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,378 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,277 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,970 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,770 UART: [afmc] --
2,822,636 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,658 UART: [cold-reset] --
2,823,408 UART: [state] Locking Datavault
2,824,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,059 UART: [state] Locking ICCM
2,825,551 UART: [exit] Launching FMC @ 0x40000000
2,830,848 UART:
2,830,864 UART: Running Caliptra FMC ...
2,831,272 UART:
2,831,502 UART: [fmc] Received command: 0x46574C44
2,832,328 UART:
2,832,344 UART: Running Caliptra ROM ...
2,832,752 UART:
2,832,894 UART: [state] CFI Enabled
2,835,568 UART: [state] LifecycleState = Unprovisioned
2,836,223 UART: [state] DebugLocked = No
2,836,895 UART: [state] WD Timer not started. Device not locked for debugging
2,838,173 UART: [kat] SHA2-256
3,641,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,852 UART: [kat] ++
3,646,004 UART: [kat] sha1
3,650,126 UART: [kat] SHA2-256
3,652,066 UART: [kat] SHA2-384
3,654,619 UART: [kat] SHA2-512-ACC
3,656,519 UART: [kat] ECC-384
3,665,856 UART: [kat] HMAC-384Kdf
3,670,552 UART: [kat] LMS
3,918,864 UART: [kat] --
3,919,698 UART: [update-reset] ++
5,203,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,795 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,809 UART: [update-reset Success] --
5,361,218 >>> mbox cmd response: success
5,361,218 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,688 UART: [state] Locking Datavault
5,362,506 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,110 UART: [state] Locking ICCM
5,363,692 UART: [exit] Launching FMC @ 0x40000000
5,368,989 UART:
5,369,005 UART: Running Caliptra FMC ...
5,369,413 UART:
5,369,635 UART: [fmc] Received command: 0x1000000C
5,370,370 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,745 ready_for_fw is high
1,056,745 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,296 >>> mbox cmd response: success
2,648,379 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,654,480 UART:
2,654,496 UART: Running Caliptra FMC ...
2,654,904 UART:
2,655,134 UART: [fmc] Received command: 0x46574C44
5,066,523 >>> mbox cmd response: success
5,066,523 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,479 UART:
5,072,495 UART: Running Caliptra FMC ...
5,072,903 UART:
5,073,125 UART: [fmc] Received command: 0x1000000C
5,073,860 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,711 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,650 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,335 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,143 >>> mbox cmd response: success
2,742,178 UART: [afmc] ++
2,742,346 UART: [afmc] CDI.KEYID = 6
2,742,709 UART: [afmc] SUBJECT.KEYID = 7
2,743,135 UART: [afmc] AUTHORITY.KEYID = 5
2,779,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,179 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,875 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,774 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,467 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,347 UART: [afmc] --
2,822,431 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,453 UART: [cold-reset] --
2,823,081 UART: [state] Locking Datavault
2,824,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,888 UART: [state] Locking ICCM
2,825,536 UART: [exit] Launching FMC @ 0x40000000
2,830,833 UART:
2,830,849 UART: Running Caliptra FMC ...
2,831,257 UART:
2,831,487 UART: [fmc] Received command: 0x46574C44
2,832,313 UART:
2,832,329 UART: Running Caliptra ROM ...
2,832,737 UART:
2,832,792 UART: [state] CFI Enabled
2,835,440 UART: [state] LifecycleState = Unprovisioned
2,836,095 UART: [state] DebugLocked = No
2,836,765 UART: [state] WD Timer not started. Device not locked for debugging
2,837,979 UART: [kat] SHA2-256
3,641,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,658 UART: [kat] ++
3,645,810 UART: [kat] sha1
3,650,212 UART: [kat] SHA2-256
3,652,152 UART: [kat] SHA2-384
3,654,901 UART: [kat] SHA2-512-ACC
3,656,801 UART: [kat] ECC-384
3,666,604 UART: [kat] HMAC-384Kdf
3,671,136 UART: [kat] LMS
3,919,448 UART: [kat] --
3,920,092 UART: [update-reset] ++
5,204,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,407 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,421 UART: [update-reset Success] --
5,361,830 >>> mbox cmd response: success
5,361,830 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,556 UART: [state] Locking Datavault
5,363,488 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,092 UART: [state] Locking ICCM
5,364,736 UART: [exit] Launching FMC @ 0x40000000
5,370,033 UART:
5,370,049 UART: Running Caliptra FMC ...
5,370,457 UART:
5,370,679 UART: [fmc] Received command: 0x1000000C
5,371,414 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,684 ready_for_fw is high
1,055,684 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,709 >>> mbox cmd response: success
2,647,776 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,945 UART:
2,653,961 UART: Running Caliptra FMC ...
2,654,369 UART:
2,654,599 UART: [fmc] Received command: 0x46574C44
5,066,997 >>> mbox cmd response: success
5,066,997 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,537 UART:
5,072,553 UART: Running Caliptra FMC ...
5,072,961 UART:
5,073,183 UART: [fmc] Received command: 0x1000000C
5,073,918 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,428 UART: [kat] SHA2-256
902,368 UART: [kat] SHA2-384
905,175 UART: [kat] SHA2-512-ACC
907,076 UART: [kat] ECC-384
916,975 UART: [kat] HMAC-384Kdf
921,687 UART: [kat] LMS
1,169,999 UART: [kat] --
1,170,962 UART: [cold-reset] ++
1,171,396 UART: [fht] FHT @ 0x50003400
1,173,862 UART: [idev] ++
1,174,030 UART: [idev] CDI.KEYID = 6
1,174,391 UART: [idev] SUBJECT.KEYID = 7
1,174,816 UART: [idev] UDS.KEYID = 0
1,175,162 ready_for_fw is high
1,175,162 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,652 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,201 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,157 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,770 >>> mbox cmd response: success
2,742,913 UART: [afmc] ++
2,743,081 UART: [afmc] CDI.KEYID = 6
2,743,444 UART: [afmc] SUBJECT.KEYID = 7
2,743,870 UART: [afmc] AUTHORITY.KEYID = 5
2,779,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,936 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,632 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,531 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,224 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,018 UART: [afmc] --
2,823,096 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,118 UART: [cold-reset] --
2,823,884 UART: [state] Locking Datavault
2,825,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,669 UART: [state] Locking ICCM
2,826,139 UART: [exit] Launching FMC @ 0x40000000
2,831,436 UART:
2,831,452 UART: Running Caliptra FMC ...
2,831,860 UART:
2,832,090 UART: [fmc] Received command: 0x46574C44
2,832,916 UART:
2,832,932 UART: Running Caliptra ROM ...
2,833,340 UART:
2,833,482 UART: [state] CFI Enabled
2,836,424 UART: [state] LifecycleState = Unprovisioned
2,837,079 UART: [state] DebugLocked = No
2,837,761 UART: [state] WD Timer not started. Device not locked for debugging
2,839,085 UART: [kat] SHA2-256
3,642,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,764 UART: [kat] ++
3,646,916 UART: [kat] sha1
3,651,258 UART: [kat] SHA2-256
3,653,198 UART: [kat] SHA2-384
3,655,905 UART: [kat] SHA2-512-ACC
3,657,805 UART: [kat] ECC-384
3,667,476 UART: [kat] HMAC-384Kdf
3,671,992 UART: [kat] LMS
3,920,304 UART: [kat] --
3,921,234 UART: [update-reset] ++
5,204,481 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,642 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,845 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,859 UART: [update-reset Success] --
5,362,268 >>> mbox cmd response: success
5,362,268 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,850 UART: [state] Locking Datavault
5,363,730 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,334 UART: [state] Locking ICCM
5,364,802 UART: [exit] Launching FMC @ 0x40000000
5,370,099 UART:
5,370,115 UART: Running Caliptra FMC ...
5,370,523 UART:
5,370,745 UART: [fmc] Received command: 0x1000000C
5,371,480 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,237 ready_for_fw is high
1,056,237 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,410 >>> mbox cmd response: success
2,647,209 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,638 UART:
2,653,654 UART: Running Caliptra FMC ...
2,654,062 UART:
2,654,292 UART: [fmc] Received command: 0x46574C44
5,065,011 >>> mbox cmd response: success
5,065,011 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,773 UART:
5,070,789 UART: Running Caliptra FMC ...
5,071,197 UART:
5,071,419 UART: [fmc] Received command: 0x1000000C
5,072,154 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,359 UART: [kat] SHA2-256
901,299 UART: [kat] SHA2-384
903,902 UART: [kat] SHA2-512-ACC
905,803 UART: [kat] ECC-384
915,152 UART: [kat] HMAC-384Kdf
919,850 UART: [kat] LMS
1,168,162 UART: [kat] --
1,169,173 UART: [cold-reset] ++
1,169,741 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 ready_for_fw is high
1,173,945 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,790 UART: [ldev] --
1,280,224 UART: [fwproc] Wait for Commands...
1,280,817 UART: [fwproc] Recv command 0x46574c44
1,281,550 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,104 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,675 >>> mbox cmd response: success
2,740,804 UART: [afmc] ++
2,740,972 UART: [afmc] CDI.KEYID = 6
2,741,335 UART: [afmc] SUBJECT.KEYID = 7
2,741,761 UART: [afmc] AUTHORITY.KEYID = 5
2,777,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,501 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,197 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,096 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,789 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,621 UART: [afmc] --
2,820,543 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,565 UART: [cold-reset] --
2,821,399 UART: [state] Locking Datavault
2,822,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,060 UART: [state] Locking ICCM
2,823,680 UART: [exit] Launching FMC @ 0x40000000
2,828,977 UART:
2,828,993 UART: Running Caliptra FMC ...
2,829,401 UART:
2,829,631 UART: [fmc] Received command: 0x46574C44
2,830,457 UART:
2,830,473 UART: Running Caliptra ROM ...
2,830,881 UART:
2,830,936 UART: [state] CFI Enabled
2,833,414 UART: [state] LifecycleState = Unprovisioned
2,834,069 UART: [state] DebugLocked = No
2,834,775 UART: [state] WD Timer not started. Device not locked for debugging
2,836,069 UART: [kat] SHA2-256
3,639,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,748 UART: [kat] ++
3,643,900 UART: [kat] sha1
3,648,058 UART: [kat] SHA2-256
3,649,998 UART: [kat] SHA2-384
3,652,765 UART: [kat] SHA2-512-ACC
3,654,665 UART: [kat] ECC-384
3,664,624 UART: [kat] HMAC-384Kdf
3,669,242 UART: [kat] LMS
3,917,554 UART: [kat] --
3,918,248 UART: [update-reset] ++
5,422,611 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,814 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,588 >>> mbox cmd response: success
5,600,853 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,867 UART: [update-reset Success] --
5,609,276 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,926 UART: [state] Locking Datavault
5,610,788 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,392 UART: [state] Locking ICCM
5,612,048 UART: [exit] Launching FMC @ 0x40000000
5,617,345 UART:
5,617,361 UART: Running Caliptra FMC ...
5,617,769 UART:
5,617,991 UART: [fmc] Received command: 0x1000000E
5,963,045 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,649 >>> mbox cmd response: success
2,644,220 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,650,325 UART:
2,650,341 UART: Running Caliptra FMC ...
2,650,749 UART:
2,650,979 UART: [fmc] Received command: 0x46574C44
5,303,903 >>> mbox cmd response: success
5,311,499 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,305 UART:
5,317,321 UART: Running Caliptra FMC ...
5,317,729 UART:
5,317,951 UART: [fmc] Received command: 0x1000000E
5,663,005 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,907 UART: [state] LifecycleState = Unprovisioned
85,562 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,779 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,174,260 ready_for_fw is high
1,174,260 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,510 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,779 UART: [ldev] SUBJECT.KEYID = 5
1,210,206 UART: [ldev] AUTHORITY.KEYID = 7
1,210,669 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,536 UART: [fwproc] Recv command 0x46574c44
1,283,269 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,173 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,628 >>> mbox cmd response: success
2,742,843 UART: [afmc] ++
2,743,011 UART: [afmc] CDI.KEYID = 6
2,743,374 UART: [afmc] SUBJECT.KEYID = 7
2,743,800 UART: [afmc] AUTHORITY.KEYID = 5
2,779,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,952 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,648 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,547 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,240 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,186 UART: [afmc] --
2,823,182 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,204 UART: [cold-reset] --
2,823,884 UART: [state] Locking Datavault
2,824,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,371 UART: [state] Locking ICCM
2,825,943 UART: [exit] Launching FMC @ 0x40000000
2,831,240 UART:
2,831,256 UART: Running Caliptra FMC ...
2,831,664 UART:
2,831,894 UART: [fmc] Received command: 0x46574C44
2,832,720 UART:
2,832,736 UART: Running Caliptra ROM ...
2,833,144 UART:
2,833,286 UART: [state] CFI Enabled
2,836,264 UART: [state] LifecycleState = Unprovisioned
2,836,919 UART: [state] DebugLocked = No
2,837,505 UART: [state] WD Timer not started. Device not locked for debugging
2,838,723 UART: [kat] SHA2-256
3,642,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,402 UART: [kat] ++
3,646,554 UART: [kat] sha1
3,650,884 UART: [kat] SHA2-256
3,652,824 UART: [kat] SHA2-384
3,655,577 UART: [kat] SHA2-512-ACC
3,657,477 UART: [kat] ECC-384
3,667,482 UART: [kat] HMAC-384Kdf
3,672,028 UART: [kat] LMS
3,920,340 UART: [kat] --
3,921,278 UART: [update-reset] ++
5,425,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,552 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,603,326 >>> mbox cmd response: success
5,603,495 UART: [update-reset] Copying MAN_2 To MAN_1
5,611,509 UART: [update-reset Success] --
5,611,918 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,612,226 UART: [state] Locking Datavault
5,613,054 UART: [state] Locking PCR0, PCR1 and PCR31
5,613,658 UART: [state] Locking ICCM
5,614,110 UART: [exit] Launching FMC @ 0x40000000
5,619,407 UART:
5,619,423 UART: Running Caliptra FMC ...
5,619,831 UART:
5,620,053 UART: [fmc] Received command: 0x1000000E
5,965,107 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,573 ready_for_fw is high
1,056,573 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,828 >>> mbox cmd response: success
2,646,603 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,652,460 UART:
2,652,476 UART: Running Caliptra FMC ...
2,652,884 UART:
2,653,114 UART: [fmc] Received command: 0x46574C44
5,305,447 >>> mbox cmd response: success
5,313,109 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,319,007 UART:
5,319,023 UART: Running Caliptra FMC ...
5,319,431 UART:
5,319,653 UART: [fmc] Received command: 0x1000000E
5,664,707 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,174,143 ready_for_fw is high
1,174,143 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,317 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,207,301 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,288 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,522 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,925 >>> mbox cmd response: success
2,741,068 UART: [afmc] ++
2,741,236 UART: [afmc] CDI.KEYID = 6
2,741,599 UART: [afmc] SUBJECT.KEYID = 7
2,742,025 UART: [afmc] AUTHORITY.KEYID = 5
2,777,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,081 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,777 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,676 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,369 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,331 UART: [afmc] --
2,821,417 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,439 UART: [cold-reset] --
2,822,433 UART: [state] Locking Datavault
2,823,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,042 UART: [state] Locking ICCM
2,824,528 UART: [exit] Launching FMC @ 0x40000000
2,829,825 UART:
2,829,841 UART: Running Caliptra FMC ...
2,830,249 UART:
2,830,479 UART: [fmc] Received command: 0x46574C44
2,831,305 UART:
2,831,321 UART: Running Caliptra ROM ...
2,831,729 UART:
2,831,784 UART: [state] CFI Enabled
2,834,574 UART: [state] LifecycleState = Unprovisioned
2,835,229 UART: [state] DebugLocked = No
2,835,813 UART: [state] WD Timer not started. Device not locked for debugging
2,836,943 UART: [kat] SHA2-256
3,640,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,622 UART: [kat] ++
3,644,774 UART: [kat] sha1
3,649,150 UART: [kat] SHA2-256
3,651,090 UART: [kat] SHA2-384
3,653,819 UART: [kat] SHA2-512-ACC
3,655,719 UART: [kat] ECC-384
3,665,534 UART: [kat] HMAC-384Kdf
3,670,162 UART: [kat] LMS
3,918,474 UART: [kat] --
3,919,550 UART: [update-reset] ++
5,423,847 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,058 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,832 >>> mbox cmd response: success
5,602,021 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,035 UART: [update-reset Success] --
5,610,444 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,850 UART: [state] Locking Datavault
5,611,660 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,264 UART: [state] Locking ICCM
5,612,714 UART: [exit] Launching FMC @ 0x40000000
5,618,011 UART:
5,618,027 UART: Running Caliptra FMC ...
5,618,435 UART:
5,618,657 UART: [fmc] Received command: 0x1000000E
5,963,711 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,030 ready_for_fw is high
1,056,030 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,869 >>> mbox cmd response: success
2,645,936 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,652,181 UART:
2,652,197 UART: Running Caliptra FMC ...
2,652,605 UART:
2,652,835 UART: [fmc] Received command: 0x46574C44
5,304,483 >>> mbox cmd response: success
5,312,093 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,891 UART:
5,317,907 UART: Running Caliptra FMC ...
5,318,315 UART:
5,318,537 UART: [fmc] Received command: 0x1000000E
5,663,591 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,174,828 ready_for_fw is high
1,174,828 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,087 UART: [ldev] ++
1,209,255 UART: [ldev] CDI.KEYID = 6
1,209,619 UART: [ldev] SUBJECT.KEYID = 5
1,210,046 UART: [ldev] AUTHORITY.KEYID = 7
1,210,509 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,211 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,075 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,077 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,644 >>> mbox cmd response: success
2,741,849 UART: [afmc] ++
2,742,017 UART: [afmc] CDI.KEYID = 6
2,742,380 UART: [afmc] SUBJECT.KEYID = 7
2,742,806 UART: [afmc] AUTHORITY.KEYID = 5
2,778,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,198 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,894 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,793 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,486 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,498 UART: [afmc] --
2,821,562 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,584 UART: [cold-reset] --
2,822,590 UART: [state] Locking Datavault
2,823,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,957 UART: [state] Locking ICCM
2,824,557 UART: [exit] Launching FMC @ 0x40000000
2,829,854 UART:
2,829,870 UART: Running Caliptra FMC ...
2,830,278 UART:
2,830,508 UART: [fmc] Received command: 0x46574C44
2,831,334 UART:
2,831,350 UART: Running Caliptra ROM ...
2,831,758 UART:
2,831,900 UART: [state] CFI Enabled
2,834,624 UART: [state] LifecycleState = Unprovisioned
2,835,279 UART: [state] DebugLocked = No
2,835,819 UART: [state] WD Timer not started. Device not locked for debugging
2,836,969 UART: [kat] SHA2-256
3,640,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,648 UART: [kat] ++
3,644,800 UART: [kat] sha1
3,649,232 UART: [kat] SHA2-256
3,651,172 UART: [kat] SHA2-384
3,654,017 UART: [kat] SHA2-512-ACC
3,655,917 UART: [kat] ECC-384
3,665,630 UART: [kat] HMAC-384Kdf
3,670,340 UART: [kat] LMS
3,918,652 UART: [kat] --
3,919,508 UART: [update-reset] ++
5,421,609 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,612 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,599,386 >>> mbox cmd response: success
5,599,643 UART: [update-reset] Copying MAN_2 To MAN_1
5,607,657 UART: [update-reset Success] --
5,608,066 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,608,624 UART: [state] Locking Datavault
5,609,334 UART: [state] Locking PCR0, PCR1 and PCR31
5,609,938 UART: [state] Locking ICCM
5,610,416 UART: [exit] Launching FMC @ 0x40000000
5,615,713 UART:
5,615,729 UART: Running Caliptra FMC ...
5,616,137 UART:
5,616,359 UART: [fmc] Received command: 0x1000000E
5,961,413 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,787 ready_for_fw is high
1,055,787 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,688 >>> mbox cmd response: success
2,645,469 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,666 UART:
2,651,682 UART: Running Caliptra FMC ...
2,652,090 UART:
2,652,320 UART: [fmc] Received command: 0x46574C44
5,305,549 >>> mbox cmd response: success
5,313,119 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,319,047 UART:
5,319,063 UART: Running Caliptra FMC ...
5,319,471 UART:
5,319,693 UART: [fmc] Received command: 0x1000000E
5,664,747 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,760 UART: [state] LifecycleState = Unprovisioned
86,415 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,860 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,380 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,929 >>> mbox cmd response: success
2,741,082 UART: [afmc] ++
2,741,250 UART: [afmc] CDI.KEYID = 6
2,741,613 UART: [afmc] SUBJECT.KEYID = 7
2,742,039 UART: [afmc] AUTHORITY.KEYID = 5
2,777,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,747 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,443 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,342 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,035 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,907 UART: [afmc] --
2,820,887 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,909 UART: [cold-reset] --
2,821,675 UART: [state] Locking Datavault
2,823,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,708 UART: [state] Locking ICCM
2,824,222 UART: [exit] Launching FMC @ 0x40000000
2,829,519 UART:
2,829,535 UART: Running Caliptra FMC ...
2,829,943 UART:
2,830,173 UART: [fmc] Received command: 0x46574C44
2,830,999 UART:
2,831,015 UART: Running Caliptra ROM ...
2,831,423 UART:
2,831,478 UART: [state] CFI Enabled
2,833,978 UART: [state] LifecycleState = Unprovisioned
2,834,633 UART: [state] DebugLocked = No
2,835,237 UART: [state] WD Timer not started. Device not locked for debugging
2,836,387 UART: [kat] SHA2-256
3,639,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,066 UART: [kat] ++
3,644,218 UART: [kat] sha1
3,648,386 UART: [kat] SHA2-256
3,650,326 UART: [kat] SHA2-384
3,653,097 UART: [kat] SHA2-512-ACC
3,654,997 UART: [kat] ECC-384
3,664,334 UART: [kat] HMAC-384Kdf
3,668,968 UART: [kat] LMS
3,917,280 UART: [kat] --
3,918,260 UART: [update-reset] ++
5,422,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,768 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,542 >>> mbox cmd response: success
5,600,669 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,683 UART: [update-reset Success] --
5,609,092 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,692 UART: [state] Locking Datavault
5,610,504 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,108 UART: [state] Locking ICCM
5,611,582 UART: [exit] Launching FMC @ 0x40000000
5,616,879 UART:
5,616,895 UART: Running Caliptra FMC ...
5,617,303 UART:
5,617,525 UART: [fmc] Received command: 0x1000000E
5,962,579 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,977 >>> mbox cmd response: success
2,645,744 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,985 UART:
2,652,001 UART: Running Caliptra FMC ...
2,652,409 UART:
2,652,639 UART: [fmc] Received command: 0x46574C44
5,303,489 >>> mbox cmd response: success
5,310,981 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,316,833 UART:
5,316,849 UART: Running Caliptra FMC ...
5,317,257 UART:
5,317,479 UART: [fmc] Received command: 0x1000000E
5,662,533 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,010 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,174,852 ready_for_fw is high
1,174,852 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,522 UART: [idev] --
1,208,391 UART: [ldev] ++
1,208,559 UART: [ldev] CDI.KEYID = 6
1,208,923 UART: [ldev] SUBJECT.KEYID = 5
1,209,350 UART: [ldev] AUTHORITY.KEYID = 7
1,209,813 UART: [ldev] FE.KEYID = 1
1,214,933 UART: [ldev] Erasing FE.KEYID = 1
1,240,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,663 UART: [ldev] --
1,279,993 UART: [fwproc] Wait for Commands...
1,280,634 UART: [fwproc] Recv command 0x46574c44
1,281,367 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,093 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,504 >>> mbox cmd response: success
2,740,723 UART: [afmc] ++
2,740,891 UART: [afmc] CDI.KEYID = 6
2,741,254 UART: [afmc] SUBJECT.KEYID = 7
2,741,680 UART: [afmc] AUTHORITY.KEYID = 5
2,777,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,114 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,810 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,709 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,402 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,390 UART: [afmc] --
2,821,460 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,482 UART: [cold-reset] --
2,822,292 UART: [state] Locking Datavault
2,823,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,937 UART: [state] Locking ICCM
2,824,527 UART: [exit] Launching FMC @ 0x40000000
2,829,824 UART:
2,829,840 UART: Running Caliptra FMC ...
2,830,248 UART:
2,830,478 UART: [fmc] Received command: 0x46574C44
2,831,304 UART:
2,831,320 UART: Running Caliptra ROM ...
2,831,728 UART:
2,831,870 UART: [state] CFI Enabled
2,834,540 UART: [state] LifecycleState = Unprovisioned
2,835,195 UART: [state] DebugLocked = No
2,835,687 UART: [state] WD Timer not started. Device not locked for debugging
2,836,897 UART: [kat] SHA2-256
3,640,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,576 UART: [kat] ++
3,644,728 UART: [kat] sha1
3,649,070 UART: [kat] SHA2-256
3,651,010 UART: [kat] SHA2-384
3,653,835 UART: [kat] SHA2-512-ACC
3,655,735 UART: [kat] ECC-384
3,665,656 UART: [kat] HMAC-384Kdf
3,670,274 UART: [kat] LMS
3,918,586 UART: [kat] --
3,919,516 UART: [update-reset] ++
5,423,219 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,350 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,124 >>> mbox cmd response: success
5,601,235 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,249 UART: [update-reset Success] --
5,609,658 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,090 UART: [state] Locking Datavault
5,611,010 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,614 UART: [state] Locking ICCM
5,612,068 UART: [exit] Launching FMC @ 0x40000000
5,617,365 UART:
5,617,381 UART: Running Caliptra FMC ...
5,617,789 UART:
5,618,011 UART: [fmc] Received command: 0x1000000E
5,963,065 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,993 ready_for_fw is high
1,055,993 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,818 >>> mbox cmd response: success
2,646,737 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,172 UART:
2,653,188 UART: Running Caliptra FMC ...
2,653,596 UART:
2,653,826 UART: [fmc] Received command: 0x46574C44
5,305,987 >>> mbox cmd response: success
5,313,473 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,319,321 UART:
5,319,337 UART: Running Caliptra FMC ...
5,319,745 UART:
5,319,967 UART: [fmc] Received command: 0x1000000E
5,665,021 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 ready_for_fw is high
1,174,773 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,182 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,748 UART: [ldev] --
1,280,060 UART: [fwproc] Wait for Commands...
1,280,739 UART: [fwproc] Recv command 0x46574c44
1,281,472 UART: [fwproc] Recv'd Img size: 106848 bytes
2,490,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,623 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,671,654 >>> mbox cmd response: success
2,672,677 UART: [afmc] ++
2,672,845 UART: [afmc] CDI.KEYID = 6
2,673,208 UART: [afmc] SUBJECT.KEYID = 7
2,673,634 UART: [afmc] AUTHORITY.KEYID = 5
2,708,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,797 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,517 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,410 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,103 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,192 UART: [afmc] --
2,752,276 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,752,298 UART: [cold-reset] --
2,753,082 UART: [state] Locking Datavault
2,753,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,603 UART: [state] Locking ICCM
2,755,099 UART: [exit] Launching FMC @ 0x40000000
2,760,396 UART:
2,760,412 UART: Running Caliptra FMC ...
2,760,820 UART:
2,760,958 UART: [fmc] Received command: 0x10000004
2,761,695 >>> mbox cmd response: success
2,761,791 UART:
2,761,807 UART: Running Caliptra ROM ...
2,762,215 UART:
2,762,270 UART: [state] CFI Enabled
2,764,946 UART: [state] LifecycleState = Unprovisioned
2,765,601 UART: [state] DebugLocked = No
2,766,173 UART: [state] WD Timer not started. Device not locked for debugging
2,767,313 UART: [kat] SHA2-256
3,570,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,574,992 UART: [kat] ++
3,575,144 UART: [kat] sha1
3,579,364 UART: [kat] SHA2-256
3,581,304 UART: [kat] SHA2-384
3,584,187 UART: [kat] SHA2-512-ACC
3,586,087 UART: [kat] ECC-384
3,595,578 UART: [kat] HMAC-384Kdf
3,600,156 UART: [kat] LMS
3,848,468 UART: [kat] --
3,849,274 UART: [update-reset] ++
3,849,585 UART: Failed To Get Mailbox Txn
3,850,486 UART: ROM Non-Fatal Error: 0x01040004
3,851,161 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,851,306 UART: [state] Locking Datavault
3,852,182 UART: [state] Locking PCR0, PCR1 and PCR31
3,852,786 UART: [state] Locking ICCM
3,853,390 UART: [exit] Launching FMC @ 0x40000000
3,858,687 UART:
3,858,703 UART: Running Caliptra FMC ...
3,859,111 UART:
3,859,241 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,860,017 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,032 ready_for_fw is high
1,055,032 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,482 >>> mbox cmd response: success
2,579,500 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,085 UART:
2,586,101 UART: Running Caliptra FMC ...
2,586,509 UART:
2,586,647 UART: [fmc] Received command: 0x10000004
2,587,384 >>> mbox cmd response: success
3,558,728 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,041 UART:
3,564,057 UART: Running Caliptra FMC ...
3,564,465 UART:
3,564,595 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,565,371 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,939 UART: [kat] LMS
1,169,251 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 ready_for_fw is high
1,174,318 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,918 UART: [fwproc] Recv command 0x46574c44
1,282,651 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,160 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,175 >>> mbox cmd response: success
2,676,318 UART: [afmc] ++
2,676,486 UART: [afmc] CDI.KEYID = 6
2,676,849 UART: [afmc] SUBJECT.KEYID = 7
2,677,275 UART: [afmc] AUTHORITY.KEYID = 5
2,712,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,596 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,316 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,209 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,902 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,815 UART: [afmc] --
2,755,837 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,859 UART: [cold-reset] --
2,756,561 UART: [state] Locking Datavault
2,757,764 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,368 UART: [state] Locking ICCM
2,758,870 UART: [exit] Launching FMC @ 0x40000000
2,764,167 UART:
2,764,183 UART: Running Caliptra FMC ...
2,764,591 UART:
2,764,729 UART: [fmc] Received command: 0x10000004
2,765,466 >>> mbox cmd response: success
2,765,562 UART:
2,765,578 UART: Running Caliptra ROM ...
2,765,986 UART:
2,766,128 UART: [state] CFI Enabled
2,768,788 UART: [state] LifecycleState = Unprovisioned
2,769,443 UART: [state] DebugLocked = No
2,769,971 UART: [state] WD Timer not started. Device not locked for debugging
2,771,081 UART: [kat] SHA2-256
3,574,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,760 UART: [kat] ++
3,578,912 UART: [kat] sha1
3,583,118 UART: [kat] SHA2-256
3,585,058 UART: [kat] SHA2-384
3,587,783 UART: [kat] SHA2-512-ACC
3,589,683 UART: [kat] ECC-384
3,599,580 UART: [kat] HMAC-384Kdf
3,604,258 UART: [kat] LMS
3,852,570 UART: [kat] --
3,853,252 UART: [update-reset] ++
3,853,563 UART: Failed To Get Mailbox Txn
3,854,460 UART: ROM Non-Fatal Error: 0x01040004
3,855,135 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,855,304 UART: [state] Locking Datavault
3,856,076 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,680 UART: [state] Locking ICCM
3,857,262 UART: [exit] Launching FMC @ 0x40000000
3,862,559 UART:
3,862,575 UART: Running Caliptra FMC ...
3,862,983 UART:
3,863,113 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,889 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,707 ready_for_fw is high
1,056,707 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,069 >>> mbox cmd response: success
2,580,857 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,064 UART:
2,587,080 UART: Running Caliptra FMC ...
2,587,488 UART:
2,587,626 UART: [fmc] Received command: 0x10000004
2,588,363 >>> mbox cmd response: success
3,560,804 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,099 UART:
3,566,115 UART: Running Caliptra FMC ...
3,566,523 UART:
3,566,653 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,429 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,369 UART: [idev] ++
1,173,537 UART: [idev] CDI.KEYID = 6
1,173,898 UART: [idev] SUBJECT.KEYID = 7
1,174,323 UART: [idev] UDS.KEYID = 0
1,174,669 ready_for_fw is high
1,174,669 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,374 UART: [ldev] ++
1,209,542 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,333 UART: [ldev] AUTHORITY.KEYID = 7
1,210,796 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,330 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,997 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,988 >>> mbox cmd response: success
2,678,181 UART: [afmc] ++
2,678,349 UART: [afmc] CDI.KEYID = 6
2,678,712 UART: [afmc] SUBJECT.KEYID = 7
2,679,138 UART: [afmc] AUTHORITY.KEYID = 5
2,715,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,131 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,851 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,744 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,437 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,214 UART: [afmc] --
2,758,194 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,758,216 UART: [cold-reset] --
2,759,174 UART: [state] Locking Datavault
2,760,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,799 UART: [state] Locking ICCM
2,761,257 UART: [exit] Launching FMC @ 0x40000000
2,766,554 UART:
2,766,570 UART: Running Caliptra FMC ...
2,766,978 UART:
2,767,116 UART: [fmc] Received command: 0x10000004
2,767,853 >>> mbox cmd response: success
2,767,949 UART:
2,767,965 UART: Running Caliptra ROM ...
2,768,373 UART:
2,768,428 UART: [state] CFI Enabled
2,771,024 UART: [state] LifecycleState = Unprovisioned
2,771,679 UART: [state] DebugLocked = No
2,772,253 UART: [state] WD Timer not started. Device not locked for debugging
2,773,577 UART: [kat] SHA2-256
3,577,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,256 UART: [kat] ++
3,581,408 UART: [kat] sha1
3,585,680 UART: [kat] SHA2-256
3,587,620 UART: [kat] SHA2-384
3,590,375 UART: [kat] SHA2-512-ACC
3,592,275 UART: [kat] ECC-384
3,602,214 UART: [kat] HMAC-384Kdf
3,606,874 UART: [kat] LMS
3,855,186 UART: [kat] --
3,856,076 UART: [update-reset] ++
3,856,387 UART: Failed To Get Mailbox Txn
3,857,172 UART: ROM Non-Fatal Error: 0x01040004
3,857,847 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,936 UART: [state] Locking Datavault
3,858,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,170 UART: [state] Locking ICCM
3,859,812 UART: [exit] Launching FMC @ 0x40000000
3,865,109 UART:
3,865,125 UART: Running Caliptra FMC ...
3,865,533 UART:
3,865,663 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,866,439 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 ready_for_fw is high
1,055,860 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,521,750 >>> mbox cmd response: success
2,578,234 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,584,413 UART:
2,584,429 UART: Running Caliptra FMC ...
2,584,837 UART:
2,584,975 UART: [fmc] Received command: 0x10000004
2,585,712 >>> mbox cmd response: success
3,558,110 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,563,599 UART:
3,563,615 UART: Running Caliptra FMC ...
3,564,023 UART:
3,564,153 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,564,929 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,359 UART: [kat] SHA2-256
890,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,038 UART: [kat] ++
895,190 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,635 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,173,944 ready_for_fw is high
1,173,944 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,198,878 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,208,763 UART: [ldev] ++
1,208,931 UART: [ldev] CDI.KEYID = 6
1,209,295 UART: [ldev] SUBJECT.KEYID = 5
1,209,722 UART: [ldev] AUTHORITY.KEYID = 7
1,210,185 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,621 UART: [ldev] --
1,281,005 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,448 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,251 >>> mbox cmd response: success
2,675,396 UART: [afmc] ++
2,675,564 UART: [afmc] CDI.KEYID = 6
2,675,927 UART: [afmc] SUBJECT.KEYID = 7
2,676,353 UART: [afmc] AUTHORITY.KEYID = 5
2,711,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,492 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,212 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,105 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,798 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,583 UART: [afmc] --
2,754,673 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,695 UART: [cold-reset] --
2,755,507 UART: [state] Locking Datavault
2,756,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,260 UART: [state] Locking ICCM
2,757,684 UART: [exit] Launching FMC @ 0x40000000
2,762,981 UART:
2,762,997 UART: Running Caliptra FMC ...
2,763,405 UART:
2,763,543 UART: [fmc] Received command: 0x10000004
2,764,280 >>> mbox cmd response: success
2,764,376 UART:
2,764,392 UART: Running Caliptra ROM ...
2,764,800 UART:
2,764,942 UART: [state] CFI Enabled
2,767,800 UART: [state] LifecycleState = Unprovisioned
2,768,455 UART: [state] DebugLocked = No
2,769,095 UART: [state] WD Timer not started. Device not locked for debugging
2,770,445 UART: [kat] SHA2-256
3,573,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,124 UART: [kat] ++
3,578,276 UART: [kat] sha1
3,582,546 UART: [kat] SHA2-256
3,584,486 UART: [kat] SHA2-384
3,587,205 UART: [kat] SHA2-512-ACC
3,589,105 UART: [kat] ECC-384
3,598,378 UART: [kat] HMAC-384Kdf
3,602,970 UART: [kat] LMS
3,851,282 UART: [kat] --
3,852,278 UART: [update-reset] ++
3,852,589 UART: Failed To Get Mailbox Txn
3,853,384 UART: ROM Non-Fatal Error: 0x01040004
3,854,059 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,188 UART: [state] Locking Datavault
3,854,998 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,602 UART: [state] Locking ICCM
3,856,142 UART: [exit] Launching FMC @ 0x40000000
3,861,439 UART:
3,861,455 UART: Running Caliptra FMC ...
3,861,863 UART:
3,861,993 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,769 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 ready_for_fw is high
1,056,435 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,611 >>> mbox cmd response: success
2,581,505 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,626 UART:
2,587,642 UART: Running Caliptra FMC ...
2,588,050 UART:
2,588,188 UART: [fmc] Received command: 0x10000004
2,588,925 >>> mbox cmd response: success
3,561,320 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,531 UART:
3,566,547 UART: Running Caliptra FMC ...
3,566,955 UART:
3,567,085 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,861 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,222 UART: [kat] HMAC-384Kdf
919,764 UART: [kat] LMS
1,168,076 UART: [kat] --
1,168,743 UART: [cold-reset] ++
1,169,255 UART: [fht] FHT @ 0x50003400
1,171,991 UART: [idev] ++
1,172,159 UART: [idev] CDI.KEYID = 6
1,172,520 UART: [idev] SUBJECT.KEYID = 7
1,172,945 UART: [idev] UDS.KEYID = 0
1,173,291 ready_for_fw is high
1,173,291 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,960 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,511 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,526 >>> mbox cmd response: success
2,675,743 UART: [afmc] ++
2,675,911 UART: [afmc] CDI.KEYID = 6
2,676,274 UART: [afmc] SUBJECT.KEYID = 7
2,676,700 UART: [afmc] AUTHORITY.KEYID = 5
2,711,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,721 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,441 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,334 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,027 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,108 UART: [afmc] --
2,755,058 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,080 UART: [cold-reset] --
2,755,770 UART: [state] Locking Datavault
2,756,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,551 UART: [state] Locking ICCM
2,758,101 UART: [exit] Launching FMC @ 0x40000000
2,763,398 UART:
2,763,414 UART: Running Caliptra FMC ...
2,763,822 UART:
2,763,960 UART: [fmc] Received command: 0x10000004
2,764,697 >>> mbox cmd response: success
2,764,793 UART:
2,764,809 UART: Running Caliptra ROM ...
2,765,217 UART:
2,765,272 UART: [state] CFI Enabled
2,767,606 UART: [state] LifecycleState = Unprovisioned
2,768,261 UART: [state] DebugLocked = No
2,768,981 UART: [state] WD Timer not started. Device not locked for debugging
2,770,197 UART: [kat] SHA2-256
3,573,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,876 UART: [kat] ++
3,578,028 UART: [kat] sha1
3,582,310 UART: [kat] SHA2-256
3,584,250 UART: [kat] SHA2-384
3,586,937 UART: [kat] SHA2-512-ACC
3,588,837 UART: [kat] ECC-384
3,598,050 UART: [kat] HMAC-384Kdf
3,602,448 UART: [kat] LMS
3,850,760 UART: [kat] --
3,851,866 UART: [update-reset] ++
3,852,177 UART: Failed To Get Mailbox Txn
3,852,964 UART: ROM Non-Fatal Error: 0x01040004
3,853,639 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,958 UART: [state] Locking Datavault
3,854,736 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,340 UART: [state] Locking ICCM
3,855,868 UART: [exit] Launching FMC @ 0x40000000
3,861,165 UART:
3,861,181 UART: Running Caliptra FMC ...
3,861,589 UART:
3,861,719 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,495 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 ready_for_fw is high
1,055,860 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,350 >>> mbox cmd response: success
2,581,432 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,557 UART:
2,587,573 UART: Running Caliptra FMC ...
2,587,981 UART:
2,588,119 UART: [fmc] Received command: 0x10000004
2,588,856 >>> mbox cmd response: success
3,561,534 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,731 UART:
3,566,747 UART: Running Caliptra FMC ...
3,567,155 UART:
3,567,285 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,061 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,186 UART: [kat] SHA2-256
902,126 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 ready_for_fw is high
1,174,752 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,129 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,424 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,423 >>> mbox cmd response: success
2,676,486 UART: [afmc] ++
2,676,654 UART: [afmc] CDI.KEYID = 6
2,677,017 UART: [afmc] SUBJECT.KEYID = 7
2,677,443 UART: [afmc] AUTHORITY.KEYID = 5
2,713,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,434 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,154 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,047 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,740 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,493 UART: [afmc] --
2,756,439 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,756,461 UART: [cold-reset] --
2,757,179 UART: [state] Locking Datavault
2,758,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,896 UART: [state] Locking ICCM
2,759,406 UART: [exit] Launching FMC @ 0x40000000
2,764,703 UART:
2,764,719 UART: Running Caliptra FMC ...
2,765,127 UART:
2,765,265 UART: [fmc] Received command: 0x10000004
2,766,002 >>> mbox cmd response: success
2,766,098 UART:
2,766,114 UART: Running Caliptra ROM ...
2,766,522 UART:
2,766,664 UART: [state] CFI Enabled
2,770,160 UART: [state] LifecycleState = Unprovisioned
2,770,815 UART: [state] DebugLocked = No
2,771,301 UART: [state] WD Timer not started. Device not locked for debugging
2,772,429 UART: [kat] SHA2-256
3,575,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,108 UART: [kat] ++
3,580,260 UART: [kat] sha1
3,584,316 UART: [kat] SHA2-256
3,586,256 UART: [kat] SHA2-384
3,589,097 UART: [kat] SHA2-512-ACC
3,590,997 UART: [kat] ECC-384
3,601,166 UART: [kat] HMAC-384Kdf
3,605,876 UART: [kat] LMS
3,854,188 UART: [kat] --
3,855,120 UART: [update-reset] ++
3,855,431 UART: Failed To Get Mailbox Txn
3,856,378 UART: ROM Non-Fatal Error: 0x01040004
3,857,053 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,308 UART: [state] Locking Datavault
3,858,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,824 UART: [state] Locking ICCM
3,859,432 UART: [exit] Launching FMC @ 0x40000000
3,864,729 UART:
3,864,745 UART: Running Caliptra FMC ...
3,865,153 UART:
3,865,283 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,866,059 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,557 ready_for_fw is high
1,056,557 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,503 >>> mbox cmd response: success
2,581,505 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,458 UART:
2,587,474 UART: Running Caliptra FMC ...
2,587,882 UART:
2,588,020 UART: [fmc] Received command: 0x10000004
2,588,757 >>> mbox cmd response: success
3,562,054 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,399 UART:
3,567,415 UART: Running Caliptra FMC ...
3,567,823 UART:
3,567,953 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,729 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
903,848 UART: [kat] SHA2-512-ACC
905,749 UART: [kat] ECC-384
915,214 UART: [kat] HMAC-384Kdf
919,814 UART: [kat] LMS
1,168,126 UART: [kat] --
1,169,213 UART: [cold-reset] ++
1,169,557 UART: [fht] FHT @ 0x50003400
1,172,167 UART: [idev] ++
1,172,335 UART: [idev] CDI.KEYID = 6
1,172,696 UART: [idev] SUBJECT.KEYID = 7
1,173,121 UART: [idev] UDS.KEYID = 0
1,173,467 ready_for_fw is high
1,173,467 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,077 UART: [idev] Erasing UDS.KEYID = 0
1,197,965 UART: [idev] Sha1 KeyId Algorithm
1,207,001 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,214,692 UART: [ldev] Erasing FE.KEYID = 1
1,240,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,801 UART: [fwproc] Recv command 0x46574c44
1,281,534 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,145 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,136 >>> mbox cmd response: success
2,675,245 UART: [afmc] ++
2,675,413 UART: [afmc] CDI.KEYID = 6
2,675,776 UART: [afmc] SUBJECT.KEYID = 7
2,676,202 UART: [afmc] AUTHORITY.KEYID = 5
2,711,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,035 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,755 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,648 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,341 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,098 UART: [afmc] --
2,754,996 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,755,018 UART: [cold-reset] --
2,756,058 UART: [state] Locking Datavault
2,757,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,905 UART: [state] Locking ICCM
2,758,411 UART: [exit] Launching FMC @ 0x40000000
2,763,708 UART:
2,763,724 UART: Running Caliptra FMC ...
2,764,132 UART:
2,764,270 UART: [fmc] Received command: 0x1000000B
2,765,102 UART:
2,765,118 UART: Running Caliptra ROM ...
2,765,526 UART:
2,765,581 UART: [state] CFI Enabled
2,767,923 UART: [state] LifecycleState = Unprovisioned
2,768,578 UART: [state] DebugLocked = No
2,769,156 UART: [state] WD Timer not started. Device not locked for debugging
2,770,426 UART: [kat] SHA2-256
3,573,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,105 UART: [kat] ++
3,578,257 UART: [kat] sha1
3,582,447 UART: [kat] SHA2-256
3,584,387 UART: [kat] SHA2-384
3,586,992 UART: [kat] SHA2-512-ACC
3,588,892 UART: [kat] ECC-384
3,598,701 UART: [kat] HMAC-384Kdf
3,603,275 UART: [kat] LMS
3,851,587 UART: [kat] --
3,852,341 UART: [update-reset] ++
3,852,658 UART: Invalid command 0x1000000b recv
3,853,748 UART: ROM Non-Fatal Error: 0x01040003
3,854,680 UART: [state] Locking Datavault
3,855,276 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,880 UART: [state] Locking ICCM
3,856,366 UART: [exit] Launching FMC @ 0x40000000
3,861,663 UART:
3,861,679 UART: Running Caliptra FMC ...
3,862,087 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,578 ready_for_fw is high
1,056,578 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,364 >>> mbox cmd response: success
2,580,966 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,875 UART:
2,586,891 UART: Running Caliptra FMC ...
2,587,299 UART:
2,587,437 UART: [fmc] Received command: 0x1000000B
3,565,674 UART:
3,565,690 UART: Running Caliptra FMC ...
3,566,098 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,066 UART: [kat] ++
896,218 UART: [kat] sha1
900,492 UART: [kat] SHA2-256
902,432 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,937 UART: [kat] HMAC-384Kdf
921,675 UART: [kat] LMS
1,169,987 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,373 UART: [idev] SUBJECT.KEYID = 7
1,174,798 UART: [idev] UDS.KEYID = 0
1,175,144 ready_for_fw is high
1,175,144 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,794 UART: [idev] Erasing UDS.KEYID = 0
1,200,208 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,391 UART: [ldev] ++
1,210,559 UART: [ldev] CDI.KEYID = 6
1,210,923 UART: [ldev] SUBJECT.KEYID = 5
1,211,350 UART: [ldev] AUTHORITY.KEYID = 7
1,211,813 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,215 UART: [ldev] --
1,282,609 UART: [fwproc] Wait for Commands...
1,283,298 UART: [fwproc] Recv command 0x46574c44
1,284,031 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,268 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,211 >>> mbox cmd response: success
2,677,294 UART: [afmc] ++
2,677,462 UART: [afmc] CDI.KEYID = 6
2,677,825 UART: [afmc] SUBJECT.KEYID = 7
2,678,251 UART: [afmc] AUTHORITY.KEYID = 5
2,714,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,120 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,840 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,733 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,426 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,257 UART: [afmc] --
2,758,163 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,758,185 UART: [cold-reset] --
2,759,041 UART: [state] Locking Datavault
2,759,958 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,562 UART: [state] Locking ICCM
2,761,236 UART: [exit] Launching FMC @ 0x40000000
2,766,533 UART:
2,766,549 UART: Running Caliptra FMC ...
2,766,957 UART:
2,767,095 UART: [fmc] Received command: 0x1000000B
2,767,927 UART:
2,767,943 UART: Running Caliptra ROM ...
2,768,351 UART:
2,768,493 UART: [state] CFI Enabled
2,771,323 UART: [state] LifecycleState = Unprovisioned
2,771,978 UART: [state] DebugLocked = No
2,772,648 UART: [state] WD Timer not started. Device not locked for debugging
2,773,964 UART: [kat] SHA2-256
3,577,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,643 UART: [kat] ++
3,581,795 UART: [kat] sha1
3,586,185 UART: [kat] SHA2-256
3,588,125 UART: [kat] SHA2-384
3,590,652 UART: [kat] SHA2-512-ACC
3,592,552 UART: [kat] ECC-384
3,602,665 UART: [kat] HMAC-384Kdf
3,607,197 UART: [kat] LMS
3,855,509 UART: [kat] --
3,856,355 UART: [update-reset] ++
3,856,672 UART: Invalid command 0x1000000b recv
3,857,784 UART: ROM Non-Fatal Error: 0x01040003
3,858,748 UART: [state] Locking Datavault
3,859,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,986 UART: [state] Locking ICCM
3,860,638 UART: [exit] Launching FMC @ 0x40000000
3,865,935 UART:
3,865,951 UART: Running Caliptra FMC ...
3,866,359 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,685 ready_for_fw is high
1,056,685 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,223 >>> mbox cmd response: success
2,583,617 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,589,634 UART:
2,589,650 UART: Running Caliptra FMC ...
2,590,058 UART:
2,590,196 UART: [fmc] Received command: 0x1000000B
3,568,704 UART:
3,568,720 UART: Running Caliptra FMC ...
3,569,128 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 ready_for_fw is high
1,174,223 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,237 UART: [idev] Erasing UDS.KEYID = 0
1,199,625 UART: [idev] Sha1 KeyId Algorithm
1,208,449 UART: [idev] --
1,209,602 UART: [ldev] ++
1,209,770 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,216,226 UART: [ldev] Erasing FE.KEYID = 1
1,242,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,948 UART: [ldev] --
1,281,230 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,155 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,132 >>> mbox cmd response: success
2,676,311 UART: [afmc] ++
2,676,479 UART: [afmc] CDI.KEYID = 6
2,676,842 UART: [afmc] SUBJECT.KEYID = 7
2,677,268 UART: [afmc] AUTHORITY.KEYID = 5
2,712,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,665 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,385 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,278 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,971 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,858 UART: [afmc] --
2,755,892 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,755,914 UART: [cold-reset] --
2,756,834 UART: [state] Locking Datavault
2,758,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,909 UART: [state] Locking ICCM
2,759,457 UART: [exit] Launching FMC @ 0x40000000
2,764,754 UART:
2,764,770 UART: Running Caliptra FMC ...
2,765,178 UART:
2,765,316 UART: [fmc] Received command: 0x1000000B
2,766,148 UART:
2,766,164 UART: Running Caliptra ROM ...
2,766,572 UART:
2,766,627 UART: [state] CFI Enabled
2,769,125 UART: [state] LifecycleState = Unprovisioned
2,769,780 UART: [state] DebugLocked = No
2,770,372 UART: [state] WD Timer not started. Device not locked for debugging
2,771,554 UART: [kat] SHA2-256
3,575,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,233 UART: [kat] ++
3,579,385 UART: [kat] sha1
3,583,521 UART: [kat] SHA2-256
3,585,461 UART: [kat] SHA2-384
3,588,232 UART: [kat] SHA2-512-ACC
3,590,132 UART: [kat] ECC-384
3,599,933 UART: [kat] HMAC-384Kdf
3,604,407 UART: [kat] LMS
3,852,719 UART: [kat] --
3,853,673 UART: [update-reset] ++
3,853,990 UART: Invalid command 0x1000000b recv
3,854,926 UART: ROM Non-Fatal Error: 0x01040003
3,855,888 UART: [state] Locking Datavault
3,856,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,100 UART: [state] Locking ICCM
3,857,618 UART: [exit] Launching FMC @ 0x40000000
3,862,915 UART:
3,862,931 UART: Running Caliptra FMC ...
3,863,339 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,232 ready_for_fw is high
1,056,232 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,295 >>> mbox cmd response: success
2,581,497 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,652 UART:
2,587,668 UART: Running Caliptra FMC ...
2,588,076 UART:
2,588,214 UART: [fmc] Received command: 0x1000000B
3,566,137 UART:
3,566,153 UART: Running Caliptra FMC ...
3,566,561 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,396 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,812 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,716 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,527 >>> mbox cmd response: success
2,676,676 UART: [afmc] ++
2,676,844 UART: [afmc] CDI.KEYID = 6
2,677,207 UART: [afmc] SUBJECT.KEYID = 7
2,677,633 UART: [afmc] AUTHORITY.KEYID = 5
2,713,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,718 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,438 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,331 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,024 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,889 UART: [afmc] --
2,756,773 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,795 UART: [cold-reset] --
2,757,745 UART: [state] Locking Datavault
2,759,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,696 UART: [state] Locking ICCM
2,760,260 UART: [exit] Launching FMC @ 0x40000000
2,765,557 UART:
2,765,573 UART: Running Caliptra FMC ...
2,765,981 UART:
2,766,119 UART: [fmc] Received command: 0x1000000B
2,766,951 UART:
2,766,967 UART: Running Caliptra ROM ...
2,767,375 UART:
2,767,517 UART: [state] CFI Enabled
2,769,943 UART: [state] LifecycleState = Unprovisioned
2,770,598 UART: [state] DebugLocked = No
2,771,216 UART: [state] WD Timer not started. Device not locked for debugging
2,772,422 UART: [kat] SHA2-256
3,575,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,101 UART: [kat] ++
3,580,253 UART: [kat] sha1
3,584,301 UART: [kat] SHA2-256
3,586,241 UART: [kat] SHA2-384
3,589,070 UART: [kat] SHA2-512-ACC
3,590,970 UART: [kat] ECC-384
3,601,019 UART: [kat] HMAC-384Kdf
3,605,591 UART: [kat] LMS
3,853,903 UART: [kat] --
3,854,919 UART: [update-reset] ++
3,855,236 UART: Invalid command 0x1000000b recv
3,856,302 UART: ROM Non-Fatal Error: 0x01040003
3,857,310 UART: [state] Locking Datavault
3,858,118 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,722 UART: [state] Locking ICCM
3,859,210 UART: [exit] Launching FMC @ 0x40000000
3,864,507 UART:
3,864,523 UART: Running Caliptra FMC ...
3,864,931 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,497 ready_for_fw is high
1,056,497 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,569 >>> mbox cmd response: success
2,580,577 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,508 UART:
2,586,524 UART: Running Caliptra FMC ...
2,586,932 UART:
2,587,070 UART: [fmc] Received command: 0x1000000B
3,565,076 UART:
3,565,092 UART: Running Caliptra FMC ...
3,565,500 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,346 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,561 UART: [idev] ++
1,172,729 UART: [idev] CDI.KEYID = 6
1,173,090 UART: [idev] SUBJECT.KEYID = 7
1,173,515 UART: [idev] UDS.KEYID = 0
1,173,861 ready_for_fw is high
1,173,861 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,197,971 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,428 UART: [ldev] Erasing FE.KEYID = 1
1,240,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,738 UART: [fwproc] Wait for Commands...
1,280,383 UART: [fwproc] Recv command 0x46574c44
1,281,116 UART: [fwproc] Recv'd Img size: 106848 bytes
2,491,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,565 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,672,576 >>> mbox cmd response: success
2,673,641 UART: [afmc] ++
2,673,809 UART: [afmc] CDI.KEYID = 6
2,674,172 UART: [afmc] SUBJECT.KEYID = 7
2,674,598 UART: [afmc] AUTHORITY.KEYID = 5
2,710,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,411 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,131 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,024 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,717 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,354 UART: [afmc] --
2,753,310 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,753,332 UART: [cold-reset] --
2,754,212 UART: [state] Locking Datavault
2,755,351 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,955 UART: [state] Locking ICCM
2,756,619 UART: [exit] Launching FMC @ 0x40000000
2,761,916 UART:
2,761,932 UART: Running Caliptra FMC ...
2,762,340 UART:
2,762,478 UART: [fmc] Received command: 0x1000000B
2,763,310 UART:
2,763,326 UART: Running Caliptra ROM ...
2,763,734 UART:
2,763,789 UART: [state] CFI Enabled
2,766,231 UART: [state] LifecycleState = Unprovisioned
2,766,886 UART: [state] DebugLocked = No
2,767,582 UART: [state] WD Timer not started. Device not locked for debugging
2,768,794 UART: [kat] SHA2-256
3,572,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,473 UART: [kat] ++
3,576,625 UART: [kat] sha1
3,580,677 UART: [kat] SHA2-256
3,582,617 UART: [kat] SHA2-384
3,585,518 UART: [kat] SHA2-512-ACC
3,587,418 UART: [kat] ECC-384
3,597,425 UART: [kat] HMAC-384Kdf
3,602,181 UART: [kat] LMS
3,850,493 UART: [kat] --
3,851,491 UART: [update-reset] ++
3,851,808 UART: Invalid command 0x1000000b recv
3,852,830 UART: ROM Non-Fatal Error: 0x01040003
3,853,774 UART: [state] Locking Datavault
3,854,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,172 UART: [state] Locking ICCM
3,855,734 UART: [exit] Launching FMC @ 0x40000000
3,861,031 UART:
3,861,047 UART: Running Caliptra FMC ...
3,861,455 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,684 >>> mbox cmd response: success
2,580,920 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,761 UART:
2,586,777 UART: Running Caliptra FMC ...
2,587,185 UART:
2,587,323 UART: [fmc] Received command: 0x1000000B
3,564,924 UART:
3,564,940 UART: Running Caliptra FMC ...
3,565,348 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,662 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,174,274 ready_for_fw is high
1,174,274 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,726 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,689 >>> mbox cmd response: success
2,676,778 UART: [afmc] ++
2,676,946 UART: [afmc] CDI.KEYID = 6
2,677,309 UART: [afmc] SUBJECT.KEYID = 7
2,677,735 UART: [afmc] AUTHORITY.KEYID = 5
2,713,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,868 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,588 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,481 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,174 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,017 UART: [afmc] --
2,757,105 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,127 UART: [cold-reset] --
2,758,071 UART: [state] Locking Datavault
2,759,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,646 UART: [state] Locking ICCM
2,760,068 UART: [exit] Launching FMC @ 0x40000000
2,765,365 UART:
2,765,381 UART: Running Caliptra FMC ...
2,765,789 UART:
2,765,927 UART: [fmc] Received command: 0x1000000B
2,766,759 UART:
2,766,775 UART: Running Caliptra ROM ...
2,767,183 UART:
2,767,325 UART: [state] CFI Enabled
2,770,181 UART: [state] LifecycleState = Unprovisioned
2,770,836 UART: [state] DebugLocked = No
2,771,414 UART: [state] WD Timer not started. Device not locked for debugging
2,772,676 UART: [kat] SHA2-256
3,576,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,355 UART: [kat] ++
3,580,507 UART: [kat] sha1
3,584,801 UART: [kat] SHA2-256
3,586,741 UART: [kat] SHA2-384
3,589,436 UART: [kat] SHA2-512-ACC
3,591,336 UART: [kat] ECC-384
3,600,925 UART: [kat] HMAC-384Kdf
3,605,703 UART: [kat] LMS
3,854,015 UART: [kat] --
3,854,733 UART: [update-reset] ++
3,855,050 UART: Invalid command 0x1000000b recv
3,856,158 UART: ROM Non-Fatal Error: 0x01040003
3,857,064 UART: [state] Locking Datavault
3,857,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,468 UART: [state] Locking ICCM
3,859,134 UART: [exit] Launching FMC @ 0x40000000
3,864,431 UART:
3,864,447 UART: Running Caliptra FMC ...
3,864,855 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,883 ready_for_fw is high
1,055,883 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,621 >>> mbox cmd response: success
2,580,447 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,588 UART:
2,586,604 UART: Running Caliptra FMC ...
2,587,012 UART:
2,587,150 UART: [fmc] Received command: 0x1000000B
3,565,900 UART:
3,565,916 UART: Running Caliptra FMC ...
3,566,324 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,340 UART: [kat] LMS
1,169,652 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,601 UART: [idev] ++
1,173,769 UART: [idev] CDI.KEYID = 6
1,174,130 UART: [idev] SUBJECT.KEYID = 7
1,174,555 UART: [idev] UDS.KEYID = 0
1,174,901 ready_for_fw is high
1,174,901 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,527 UART: [idev] Erasing UDS.KEYID = 0
1,199,735 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,212 UART: [ldev] SUBJECT.KEYID = 5
1,210,639 UART: [ldev] AUTHORITY.KEYID = 7
1,211,102 UART: [ldev] FE.KEYID = 1
1,216,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,544 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,639 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,560 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,983 >>> mbox cmd response: success
2,741,126 UART: [afmc] ++
2,741,294 UART: [afmc] CDI.KEYID = 6
2,741,657 UART: [afmc] SUBJECT.KEYID = 7
2,742,083 UART: [afmc] AUTHORITY.KEYID = 5
2,777,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,943 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,639 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,538 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,231 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,133 UART: [afmc] --
2,821,049 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,821,071 UART: [cold-reset] --
2,822,035 UART: [state] Locking Datavault
2,822,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,566 UART: [state] Locking ICCM
2,824,122 UART: [exit] Launching FMC @ 0x40000000
2,829,419 UART:
2,829,435 UART: Running Caliptra FMC ...
2,829,843 UART:
2,830,073 UART: [fmc] Received command: 0x46574C44
2,830,899 UART:
2,830,915 UART: Running Caliptra ROM ...
2,831,323 UART:
2,831,378 UART: [state] CFI Enabled
2,833,736 UART: [state] LifecycleState = Unprovisioned
2,834,391 UART: [state] DebugLocked = No
2,834,947 UART: [state] WD Timer not started. Device not locked for debugging
2,836,153 UART: [kat] SHA2-256
3,639,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,832 UART: [kat] ++
3,643,984 UART: [kat] sha1
3,648,086 UART: [kat] SHA2-256
3,650,026 UART: [kat] SHA2-384
3,652,663 UART: [kat] SHA2-512-ACC
3,654,563 UART: [kat] ECC-384
3,664,326 UART: [kat] HMAC-384Kdf
3,668,910 UART: [kat] LMS
3,917,222 UART: [kat] --
3,918,344 UART: [update-reset] ++
5,203,201 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,330 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,342 >>> mbox cmd response: success
5,352,623 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,637 UART: [update-reset Success] --
5,361,046 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,818 UART: [state] Locking Datavault
5,362,522 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,126 UART: [state] Locking ICCM
5,363,634 UART: [exit] Launching FMC @ 0x40000000
5,368,931 UART:
5,368,947 UART: Running Caliptra FMC ...
5,369,355 UART:
5,369,577 UART: [fmc] Received command: 0x1000000C
5,370,312 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,782 ready_for_fw is high
1,055,782 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,137 >>> mbox cmd response: success
2,645,514 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,591 UART:
2,651,607 UART: Running Caliptra FMC ...
2,652,015 UART:
2,652,245 UART: [fmc] Received command: 0x46574C44
5,056,157 >>> mbox cmd response: success
5,063,871 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,345 UART:
5,069,361 UART: Running Caliptra FMC ...
5,069,769 UART:
5,069,991 UART: [fmc] Received command: 0x1000000C
5,070,726 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,878 UART: [fht] FHT @ 0x50003400
1,172,396 UART: [idev] ++
1,172,564 UART: [idev] CDI.KEYID = 6
1,172,925 UART: [idev] SUBJECT.KEYID = 7
1,173,350 UART: [idev] UDS.KEYID = 0
1,173,696 ready_for_fw is high
1,173,696 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,441 UART: [ldev] SUBJECT.KEYID = 5
1,209,868 UART: [ldev] AUTHORITY.KEYID = 7
1,210,331 UART: [ldev] FE.KEYID = 1
1,215,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,077 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,056 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,711 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,252 >>> mbox cmd response: success
2,741,395 UART: [afmc] ++
2,741,563 UART: [afmc] CDI.KEYID = 6
2,741,926 UART: [afmc] SUBJECT.KEYID = 7
2,742,352 UART: [afmc] AUTHORITY.KEYID = 5
2,778,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,494 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,190 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,089 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,782 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,780 UART: [afmc] --
2,821,790 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,821,812 UART: [cold-reset] --
2,822,350 UART: [state] Locking Datavault
2,823,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,283 UART: [state] Locking ICCM
2,824,743 UART: [exit] Launching FMC @ 0x40000000
2,830,040 UART:
2,830,056 UART: Running Caliptra FMC ...
2,830,464 UART:
2,830,694 UART: [fmc] Received command: 0x46574C44
2,831,520 UART:
2,831,536 UART: Running Caliptra ROM ...
2,831,944 UART:
2,832,086 UART: [state] CFI Enabled
2,835,164 UART: [state] LifecycleState = Unprovisioned
2,835,819 UART: [state] DebugLocked = No
2,836,381 UART: [state] WD Timer not started. Device not locked for debugging
2,837,579 UART: [kat] SHA2-256
3,641,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,258 UART: [kat] ++
3,645,410 UART: [kat] sha1
3,649,622 UART: [kat] SHA2-256
3,651,562 UART: [kat] SHA2-384
3,654,305 UART: [kat] SHA2-512-ACC
3,656,205 UART: [kat] ECC-384
3,666,172 UART: [kat] HMAC-384Kdf
3,670,606 UART: [kat] LMS
3,918,918 UART: [kat] --
3,919,516 UART: [update-reset] ++
5,203,315 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,454 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,466 >>> mbox cmd response: success
5,352,637 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,651 UART: [update-reset Success] --
5,361,060 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,504 UART: [state] Locking Datavault
5,362,248 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,852 UART: [state] Locking ICCM
5,363,302 UART: [exit] Launching FMC @ 0x40000000
5,368,599 UART:
5,368,615 UART: Running Caliptra FMC ...
5,369,023 UART:
5,369,245 UART: [fmc] Received command: 0x1000000C
5,369,980 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,017 ready_for_fw is high
1,056,017 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,288 >>> mbox cmd response: success
2,645,661 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,726 UART:
2,651,742 UART: Running Caliptra FMC ...
2,652,150 UART:
2,652,380 UART: [fmc] Received command: 0x46574C44
5,054,909 >>> mbox cmd response: success
5,062,569 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,068,357 UART:
5,068,373 UART: Running Caliptra FMC ...
5,068,781 UART:
5,069,003 UART: [fmc] Received command: 0x1000000C
5,069,738 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 ready_for_fw is high
1,174,311 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,433 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,628 UART: [ldev] Erasing FE.KEYID = 1
1,240,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,019 UART: [fwproc] Recv command 0x46574c44
1,281,752 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,486 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,003 >>> mbox cmd response: success
2,741,046 UART: [afmc] ++
2,741,214 UART: [afmc] CDI.KEYID = 6
2,741,577 UART: [afmc] SUBJECT.KEYID = 7
2,742,003 UART: [afmc] AUTHORITY.KEYID = 5
2,777,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,749 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,445 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,344 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,037 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,727 UART: [afmc] --
2,820,719 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,741 UART: [cold-reset] --
2,821,493 UART: [state] Locking Datavault
2,822,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,078 UART: [state] Locking ICCM
2,823,740 UART: [exit] Launching FMC @ 0x40000000
2,829,037 UART:
2,829,053 UART: Running Caliptra FMC ...
2,829,461 UART:
2,829,691 UART: [fmc] Received command: 0x46574C44
2,830,517 UART:
2,830,533 UART: Running Caliptra ROM ...
2,830,941 UART:
2,830,996 UART: [state] CFI Enabled
2,833,830 UART: [state] LifecycleState = Unprovisioned
2,834,485 UART: [state] DebugLocked = No
2,835,001 UART: [state] WD Timer not started. Device not locked for debugging
2,836,257 UART: [kat] SHA2-256
3,639,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,936 UART: [kat] ++
3,644,088 UART: [kat] sha1
3,648,206 UART: [kat] SHA2-256
3,650,146 UART: [kat] SHA2-384
3,652,909 UART: [kat] SHA2-512-ACC
3,654,809 UART: [kat] ECC-384
3,664,722 UART: [kat] HMAC-384Kdf
3,669,420 UART: [kat] LMS
3,917,732 UART: [kat] --
3,918,566 UART: [update-reset] ++
5,202,087 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,220 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,232 >>> mbox cmd response: success
5,351,567 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,581 UART: [update-reset Success] --
5,359,990 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,384 UART: [state] Locking Datavault
5,361,082 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,686 UART: [state] Locking ICCM
5,362,194 UART: [exit] Launching FMC @ 0x40000000
5,367,491 UART:
5,367,507 UART: Running Caliptra FMC ...
5,367,915 UART:
5,368,137 UART: [fmc] Received command: 0x1000000C
5,368,872 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 ready_for_fw is high
1,055,904 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,339 >>> mbox cmd response: success
2,646,722 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,643 UART:
2,652,659 UART: Running Caliptra FMC ...
2,653,067 UART:
2,653,297 UART: [fmc] Received command: 0x46574C44
5,056,981 >>> mbox cmd response: success
5,064,571 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,775 UART:
5,069,791 UART: Running Caliptra FMC ...
5,070,199 UART:
5,070,421 UART: [fmc] Received command: 0x1000000C
5,071,156 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,217 UART: [fwproc] Recv'd Img size: 111916 bytes
2,554,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,779 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,298 >>> mbox cmd response: success
2,745,385 UART: [afmc] ++
2,745,553 UART: [afmc] CDI.KEYID = 6
2,745,916 UART: [afmc] SUBJECT.KEYID = 7
2,746,342 UART: [afmc] AUTHORITY.KEYID = 5
2,781,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,236 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,932 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,831 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,524 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,162 UART: [afmc] --
2,825,218 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,825,240 UART: [cold-reset] --
2,826,194 UART: [state] Locking Datavault
2,827,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,101 UART: [state] Locking ICCM
2,828,609 UART: [exit] Launching FMC @ 0x40000000
2,833,906 UART:
2,833,922 UART: Running Caliptra FMC ...
2,834,330 UART:
2,834,560 UART: [fmc] Received command: 0x46574C44
2,835,386 UART:
2,835,402 UART: Running Caliptra ROM ...
2,835,810 UART:
2,835,952 UART: [state] CFI Enabled
2,838,662 UART: [state] LifecycleState = Unprovisioned
2,839,317 UART: [state] DebugLocked = No
2,839,833 UART: [state] WD Timer not started. Device not locked for debugging
2,841,073 UART: [kat] SHA2-256
3,644,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,752 UART: [kat] ++
3,648,904 UART: [kat] sha1
3,653,086 UART: [kat] SHA2-256
3,655,026 UART: [kat] SHA2-384
3,657,869 UART: [kat] SHA2-512-ACC
3,659,769 UART: [kat] ECC-384
3,669,238 UART: [kat] HMAC-384Kdf
3,673,976 UART: [kat] LMS
3,922,288 UART: [kat] --
3,923,020 UART: [update-reset] ++
5,206,995 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,356,010 >>> mbox cmd response: success
5,356,229 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,243 UART: [update-reset Success] --
5,364,652 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,256 UART: [state] Locking Datavault
5,366,042 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,646 UART: [state] Locking ICCM
5,367,088 UART: [exit] Launching FMC @ 0x40000000
5,372,385 UART:
5,372,401 UART: Running Caliptra FMC ...
5,372,809 UART:
5,373,031 UART: [fmc] Received command: 0x1000000C
5,373,766 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 ready_for_fw is high
1,056,345 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,402 >>> mbox cmd response: success
2,648,127 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,654,330 UART:
2,654,346 UART: Running Caliptra FMC ...
2,654,754 UART:
2,654,984 UART: [fmc] Received command: 0x46574C44
5,058,479 >>> mbox cmd response: success
5,066,083 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,769 UART:
5,071,785 UART: Running Caliptra FMC ...
5,072,193 UART:
5,072,415 UART: [fmc] Received command: 0x1000000C
5,073,150 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,855 UART: [state] WD Timer not started. Device not locked for debugging
87,030 UART: [kat] SHA2-256
890,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,709 UART: [kat] ++
894,861 UART: [kat] sha1
899,121 UART: [kat] SHA2-256
901,061 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,336 UART: [kat] HMAC-384Kdf
919,822 UART: [kat] LMS
1,168,134 UART: [kat] --
1,169,051 UART: [cold-reset] ++
1,169,627 UART: [fht] FHT @ 0x50003400
1,172,291 UART: [idev] ++
1,172,459 UART: [idev] CDI.KEYID = 6
1,172,820 UART: [idev] SUBJECT.KEYID = 7
1,173,245 UART: [idev] UDS.KEYID = 0
1,173,591 ready_for_fw is high
1,173,591 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,341 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,240,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,238 UART: [ldev] --
1,279,546 UART: [fwproc] Wait for Commands...
1,280,281 UART: [fwproc] Recv command 0x46574c44
1,281,014 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,160 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,663 >>> mbox cmd response: success
2,739,720 UART: [afmc] ++
2,739,888 UART: [afmc] CDI.KEYID = 6
2,740,251 UART: [afmc] SUBJECT.KEYID = 7
2,740,677 UART: [afmc] AUTHORITY.KEYID = 5
2,776,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,489 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,185 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,084 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,777 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,513 UART: [afmc] --
2,819,553 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,819,575 UART: [cold-reset] --
2,820,407 UART: [state] Locking Datavault
2,821,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,394 UART: [state] Locking ICCM
2,822,924 UART: [exit] Launching FMC @ 0x40000000
2,828,221 UART:
2,828,237 UART: Running Caliptra FMC ...
2,828,645 UART:
2,828,875 UART: [fmc] Received command: 0x46574C44
2,829,701 UART:
2,829,717 UART: Running Caliptra ROM ...
2,830,125 UART:
2,830,180 UART: [state] CFI Enabled
2,832,790 UART: [state] LifecycleState = Unprovisioned
2,833,445 UART: [state] DebugLocked = No
2,833,939 UART: [state] WD Timer not started. Device not locked for debugging
2,835,291 UART: [kat] SHA2-256
3,638,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,970 UART: [kat] ++
3,643,122 UART: [kat] sha1
3,647,322 UART: [kat] SHA2-256
3,649,262 UART: [kat] SHA2-384
3,651,877 UART: [kat] SHA2-512-ACC
3,653,777 UART: [kat] ECC-384
3,663,464 UART: [kat] HMAC-384Kdf
3,667,966 UART: [kat] LMS
3,916,278 UART: [kat] --
3,917,142 UART: [update-reset] ++
5,201,913 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,010 >>> mbox cmd response: success
5,351,341 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,355 UART: [update-reset Success] --
5,359,764 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,078 UART: [state] Locking Datavault
5,360,818 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,422 UART: [state] Locking ICCM
5,361,852 UART: [exit] Launching FMC @ 0x40000000
5,367,149 UART:
5,367,165 UART: Running Caliptra FMC ...
5,367,573 UART:
5,367,795 UART: [fmc] Received command: 0x1000000C
5,368,530 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,290 ready_for_fw is high
1,056,290 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,139 >>> mbox cmd response: success
2,645,976 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,369 UART:
2,652,385 UART: Running Caliptra FMC ...
2,652,793 UART:
2,653,023 UART: [fmc] Received command: 0x46574C44
5,055,905 >>> mbox cmd response: success
5,063,455 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,469 UART:
5,069,485 UART: Running Caliptra FMC ...
5,069,893 UART:
5,070,115 UART: [fmc] Received command: 0x1000000C
5,070,850 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 ready_for_fw is high
1,174,620 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,947 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,328 >>> mbox cmd response: success
2,743,447 UART: [afmc] ++
2,743,615 UART: [afmc] CDI.KEYID = 6
2,743,978 UART: [afmc] SUBJECT.KEYID = 7
2,744,404 UART: [afmc] AUTHORITY.KEYID = 5
2,779,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,234 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,930 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,829 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,522 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,292 UART: [afmc] --
2,823,392 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,414 UART: [cold-reset] --
2,824,344 UART: [state] Locking Datavault
2,825,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,193 UART: [state] Locking ICCM
2,826,707 UART: [exit] Launching FMC @ 0x40000000
2,832,004 UART:
2,832,020 UART: Running Caliptra FMC ...
2,832,428 UART:
2,832,658 UART: [fmc] Received command: 0x46574C44
2,833,484 UART:
2,833,500 UART: Running Caliptra ROM ...
2,833,908 UART:
2,834,050 UART: [state] CFI Enabled
2,836,794 UART: [state] LifecycleState = Unprovisioned
2,837,449 UART: [state] DebugLocked = No
2,838,025 UART: [state] WD Timer not started. Device not locked for debugging
2,839,149 UART: [kat] SHA2-256
3,642,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,828 UART: [kat] ++
3,646,980 UART: [kat] sha1
3,651,224 UART: [kat] SHA2-256
3,653,164 UART: [kat] SHA2-384
3,655,759 UART: [kat] SHA2-512-ACC
3,657,659 UART: [kat] ECC-384
3,667,584 UART: [kat] HMAC-384Kdf
3,672,118 UART: [kat] LMS
3,920,430 UART: [kat] --
3,921,174 UART: [update-reset] ++
5,205,867 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,906 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,354,918 >>> mbox cmd response: success
5,355,067 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,081 UART: [update-reset Success] --
5,363,490 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,364,004 UART: [state] Locking Datavault
5,364,956 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,560 UART: [state] Locking ICCM
5,366,146 UART: [exit] Launching FMC @ 0x40000000
5,371,443 UART:
5,371,459 UART: Running Caliptra FMC ...
5,371,867 UART:
5,372,089 UART: [fmc] Received command: 0x1000000C
5,372,824 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,199 ready_for_fw is high
1,056,199 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,994 >>> mbox cmd response: success
2,647,593 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,842 UART:
2,653,858 UART: Running Caliptra FMC ...
2,654,266 UART:
2,654,496 UART: [fmc] Received command: 0x46574C44
5,057,961 >>> mbox cmd response: success
5,065,469 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,303 UART:
5,071,319 UART: Running Caliptra FMC ...
5,071,727 UART:
5,071,949 UART: [fmc] Received command: 0x1000000C
5,072,684 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,174,433 ready_for_fw is high
1,174,433 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,215,010 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,284 UART: [ldev] --
1,280,728 UART: [fwproc] Wait for Commands...
1,281,401 UART: [fwproc] Recv command 0x46574c44
1,282,134 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,577,343 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,908 >>> mbox cmd response: success
2,740,157 UART: [afmc] ++
2,740,325 UART: [afmc] CDI.KEYID = 6
2,740,688 UART: [afmc] SUBJECT.KEYID = 7
2,741,114 UART: [afmc] AUTHORITY.KEYID = 5
2,776,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,432 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,799,147 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,805,039 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,810,751 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,818,426 UART: [afmc] --
2,819,454 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,819,476 UART: [cold-reset] --
2,820,252 UART: [state] Locking Datavault
2,821,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,927 UART: [state] Locking ICCM
2,822,563 UART: [exit] Launching FMC @ 0x40000000
2,827,860 UART:
2,827,876 UART: Running Caliptra FMC ...
2,828,284 UART:
2,828,514 UART: [fmc] Received command: 0x46574C44
2,829,340 UART:
2,829,356 UART: Running Caliptra ROM ...
2,829,764 UART:
2,829,819 UART: [state] CFI Enabled
2,832,399 UART: [state] LifecycleState = Unprovisioned
2,833,054 UART: [state] DebugLocked = No
2,833,722 UART: [state] WD Timer not started. Device not locked for debugging
2,834,988 UART: [kat] SHA2-256
3,638,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,667 UART: [kat] ++
3,642,819 UART: [kat] sha1
3,646,993 UART: [kat] SHA2-256
3,648,933 UART: [kat] SHA2-384
3,651,886 UART: [kat] SHA2-512-ACC
3,653,786 UART: [kat] ECC-384
3,663,405 UART: [kat] HMAC-384Kdf
3,668,093 UART: [kat] LMS
3,916,405 UART: [kat] --
3,917,365 UART: [update-reset] ++
3,934,067 >>> mbox cmd response: failed
3,934,067 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,934,595 UART: ROM Non-Fatal Error: 0x000B001E
3,935,473 UART: [state] Locking Datavault
3,936,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,769 UART: [state] Locking ICCM
3,937,327 UART: [exit] Launching FMC @ 0x40000000
3,942,624 UART:
3,942,640 UART: Running Caliptra FMC ...
3,943,048 UART:
3,943,270 UART: [fmc] Received command: 0x1000000C
3,944,005 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,587,320 >>> mbox cmd response: success
2,643,107 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,649,380 UART:
2,649,396 UART: Running Caliptra FMC ...
2,649,804 UART:
2,650,034 UART: [fmc] Received command: 0x46574C44
3,638,571 >>> mbox cmd response: failed
3,638,571 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,644,114 UART:
3,644,130 UART: Running Caliptra FMC ...
3,644,538 UART:
3,644,760 UART: [fmc] Received command: 0x1000000C
3,645,495 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
915,623 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,776 UART: [fht] FHT @ 0x50003400
1,172,466 UART: [idev] ++
1,172,634 UART: [idev] CDI.KEYID = 6
1,172,995 UART: [idev] SUBJECT.KEYID = 7
1,173,420 UART: [idev] UDS.KEYID = 0
1,173,766 ready_for_fw is high
1,173,766 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,502 UART: [idev] Erasing UDS.KEYID = 0
1,198,720 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,083 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,641 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,924 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,511 >>> mbox cmd response: success
2,741,550 UART: [afmc] ++
2,741,718 UART: [afmc] CDI.KEYID = 6
2,742,081 UART: [afmc] SUBJECT.KEYID = 7
2,742,507 UART: [afmc] AUTHORITY.KEYID = 5
2,778,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,327 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,042 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,934 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,646 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,319 UART: [afmc] --
2,821,233 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,821,255 UART: [cold-reset] --
2,822,071 UART: [state] Locking Datavault
2,823,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,264 UART: [state] Locking ICCM
2,824,742 UART: [exit] Launching FMC @ 0x40000000
2,830,039 UART:
2,830,055 UART: Running Caliptra FMC ...
2,830,463 UART:
2,830,693 UART: [fmc] Received command: 0x46574C44
2,831,519 UART:
2,831,535 UART: Running Caliptra ROM ...
2,831,943 UART:
2,832,085 UART: [state] CFI Enabled
2,834,905 UART: [state] LifecycleState = Unprovisioned
2,835,560 UART: [state] DebugLocked = No
2,836,192 UART: [state] WD Timer not started. Device not locked for debugging
2,837,410 UART: [kat] SHA2-256
3,640,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,089 UART: [kat] ++
3,645,241 UART: [kat] sha1
3,649,653 UART: [kat] SHA2-256
3,651,593 UART: [kat] SHA2-384
3,654,178 UART: [kat] SHA2-512-ACC
3,656,078 UART: [kat] ECC-384
3,666,055 UART: [kat] HMAC-384Kdf
3,670,769 UART: [kat] LMS
3,919,081 UART: [kat] --
3,919,791 UART: [update-reset] ++
3,936,731 >>> mbox cmd response: failed
3,936,731 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,937 UART: ROM Non-Fatal Error: 0x000B001E
3,937,807 UART: [state] Locking Datavault
3,938,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,119 UART: [state] Locking ICCM
3,939,775 UART: [exit] Launching FMC @ 0x40000000
3,945,072 UART:
3,945,088 UART: Running Caliptra FMC ...
3,945,496 UART:
3,945,718 UART: [fmc] Received command: 0x1000000C
3,946,453 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,649 ready_for_fw is high
1,056,649 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,403 >>> mbox cmd response: success
2,647,888 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,654,021 UART:
2,654,037 UART: Running Caliptra FMC ...
2,654,445 UART:
2,654,675 UART: [fmc] Received command: 0x46574C44
3,643,989 >>> mbox cmd response: failed
3,643,989 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,540 UART:
3,649,556 UART: Running Caliptra FMC ...
3,649,964 UART:
3,650,186 UART: [fmc] Received command: 0x1000000C
3,650,921 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,174,205 ready_for_fw is high
1,174,205 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,735 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,524 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,867 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,366 >>> mbox cmd response: success
2,741,607 UART: [afmc] ++
2,741,775 UART: [afmc] CDI.KEYID = 6
2,742,138 UART: [afmc] SUBJECT.KEYID = 7
2,742,564 UART: [afmc] AUTHORITY.KEYID = 5
2,777,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,362 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,077 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,969 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,681 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,412 UART: [afmc] --
2,821,484 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,821,506 UART: [cold-reset] --
2,822,256 UART: [state] Locking Datavault
2,823,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,003 UART: [state] Locking ICCM
2,824,647 UART: [exit] Launching FMC @ 0x40000000
2,829,944 UART:
2,829,960 UART: Running Caliptra FMC ...
2,830,368 UART:
2,830,598 UART: [fmc] Received command: 0x46574C44
2,831,424 UART:
2,831,440 UART: Running Caliptra ROM ...
2,831,848 UART:
2,831,903 UART: [state] CFI Enabled
2,834,599 UART: [state] LifecycleState = Unprovisioned
2,835,254 UART: [state] DebugLocked = No
2,835,978 UART: [state] WD Timer not started. Device not locked for debugging
2,837,104 UART: [kat] SHA2-256
3,640,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,783 UART: [kat] ++
3,644,935 UART: [kat] sha1
3,649,027 UART: [kat] SHA2-256
3,650,967 UART: [kat] SHA2-384
3,653,850 UART: [kat] SHA2-512-ACC
3,655,750 UART: [kat] ECC-384
3,665,029 UART: [kat] HMAC-384Kdf
3,669,519 UART: [kat] LMS
3,917,831 UART: [kat] --
3,918,569 UART: [update-reset] ++
3,934,963 >>> mbox cmd response: failed
3,934,963 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,329 UART: ROM Non-Fatal Error: 0x000B001E
3,936,215 UART: [state] Locking Datavault
3,936,997 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,601 UART: [state] Locking ICCM
3,938,027 UART: [exit] Launching FMC @ 0x40000000
3,943,324 UART:
3,943,340 UART: Running Caliptra FMC ...
3,943,748 UART:
3,943,970 UART: [fmc] Received command: 0x1000000C
3,944,705 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,702 >>> mbox cmd response: success
2,646,741 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,652,832 UART:
2,652,848 UART: Running Caliptra FMC ...
2,653,256 UART:
2,653,486 UART: [fmc] Received command: 0x46574C44
3,642,511 >>> mbox cmd response: failed
3,642,511 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,230 UART:
3,648,246 UART: Running Caliptra FMC ...
3,648,654 UART:
3,648,876 UART: [fmc] Received command: 0x1000000C
3,649,611 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,382 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,706 UART: [idev] ++
1,173,874 UART: [idev] CDI.KEYID = 6
1,174,235 UART: [idev] SUBJECT.KEYID = 7
1,174,660 UART: [idev] UDS.KEYID = 0
1,175,006 ready_for_fw is high
1,175,006 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,526 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,849 UART: [ldev] SUBJECT.KEYID = 5
1,210,276 UART: [ldev] AUTHORITY.KEYID = 7
1,210,739 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,969 UART: [ldev] --
1,281,425 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,580,240 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,845 >>> mbox cmd response: success
2,742,976 UART: [afmc] ++
2,743,144 UART: [afmc] CDI.KEYID = 6
2,743,507 UART: [afmc] SUBJECT.KEYID = 7
2,743,933 UART: [afmc] AUTHORITY.KEYID = 5
2,779,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,483 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,198 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,090 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,802 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,657 UART: [afmc] --
2,822,707 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,822,729 UART: [cold-reset] --
2,823,439 UART: [state] Locking Datavault
2,824,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,058 UART: [state] Locking ICCM
2,825,718 UART: [exit] Launching FMC @ 0x40000000
2,831,015 UART:
2,831,031 UART: Running Caliptra FMC ...
2,831,439 UART:
2,831,669 UART: [fmc] Received command: 0x46574C44
2,832,495 UART:
2,832,511 UART: Running Caliptra ROM ...
2,832,919 UART:
2,833,061 UART: [state] CFI Enabled
2,835,755 UART: [state] LifecycleState = Unprovisioned
2,836,410 UART: [state] DebugLocked = No
2,837,122 UART: [state] WD Timer not started. Device not locked for debugging
2,838,418 UART: [kat] SHA2-256
3,641,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,097 UART: [kat] ++
3,646,249 UART: [kat] sha1
3,650,531 UART: [kat] SHA2-256
3,652,471 UART: [kat] SHA2-384
3,655,240 UART: [kat] SHA2-512-ACC
3,657,140 UART: [kat] ECC-384
3,666,999 UART: [kat] HMAC-384Kdf
3,671,705 UART: [kat] LMS
3,920,017 UART: [kat] --
3,920,657 UART: [update-reset] ++
3,937,461 >>> mbox cmd response: failed
3,937,461 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,967 UART: ROM Non-Fatal Error: 0x000B001E
3,938,877 UART: [state] Locking Datavault
3,939,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,223 UART: [state] Locking ICCM
3,940,819 UART: [exit] Launching FMC @ 0x40000000
3,946,116 UART:
3,946,132 UART: Running Caliptra FMC ...
3,946,540 UART:
3,946,762 UART: [fmc] Received command: 0x1000000C
3,947,497 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 ready_for_fw is high
1,056,023 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,293 >>> mbox cmd response: success
2,645,152 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,651,539 UART:
2,651,555 UART: Running Caliptra FMC ...
2,651,963 UART:
2,652,193 UART: [fmc] Received command: 0x46574C44
3,640,895 >>> mbox cmd response: failed
3,640,895 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,646,164 UART:
3,646,180 UART: Running Caliptra FMC ...
3,646,588 UART:
3,646,810 UART: [fmc] Received command: 0x1000000C
3,647,545 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,101 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 ready_for_fw is high
1,173,943 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,830 UART: [ldev] ++
1,208,998 UART: [ldev] CDI.KEYID = 6
1,209,362 UART: [ldev] SUBJECT.KEYID = 5
1,209,789 UART: [ldev] AUTHORITY.KEYID = 7
1,210,252 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,049 UART: [fwproc] Recv command 0x46574c44
1,281,782 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,101 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,520 >>> mbox cmd response: success
2,740,741 UART: [afmc] ++
2,740,909 UART: [afmc] CDI.KEYID = 6
2,741,272 UART: [afmc] SUBJECT.KEYID = 7
2,741,698 UART: [afmc] AUTHORITY.KEYID = 5
2,776,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,590 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,799,305 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,805,197 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,810,909 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,818,664 UART: [afmc] --
2,819,670 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,819,692 UART: [cold-reset] --
2,820,578 UART: [state] Locking Datavault
2,821,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,509 UART: [state] Locking ICCM
2,823,059 UART: [exit] Launching FMC @ 0x40000000
2,828,356 UART:
2,828,372 UART: Running Caliptra FMC ...
2,828,780 UART:
2,829,010 UART: [fmc] Received command: 0x46574C44
2,829,836 UART:
2,829,852 UART: Running Caliptra ROM ...
2,830,260 UART:
2,830,315 UART: [state] CFI Enabled
2,832,987 UART: [state] LifecycleState = Unprovisioned
2,833,642 UART: [state] DebugLocked = No
2,834,194 UART: [state] WD Timer not started. Device not locked for debugging
2,835,438 UART: [kat] SHA2-256
3,638,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,117 UART: [kat] ++
3,643,269 UART: [kat] sha1
3,647,509 UART: [kat] SHA2-256
3,649,449 UART: [kat] SHA2-384
3,652,018 UART: [kat] SHA2-512-ACC
3,653,918 UART: [kat] ECC-384
3,663,489 UART: [kat] HMAC-384Kdf
3,667,949 UART: [kat] LMS
3,916,261 UART: [kat] --
3,917,071 UART: [update-reset] ++
3,933,991 >>> mbox cmd response: failed
3,933,991 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,934,541 UART: ROM Non-Fatal Error: 0x000B001E
3,935,537 UART: [state] Locking Datavault
3,936,263 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,867 UART: [state] Locking ICCM
3,937,485 UART: [exit] Launching FMC @ 0x40000000
3,942,782 UART:
3,942,798 UART: Running Caliptra FMC ...
3,943,206 UART:
3,943,428 UART: [fmc] Received command: 0x1000000C
3,944,163 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,404 ready_for_fw is high
1,055,404 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,736 >>> mbox cmd response: success
2,646,609 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,652,498 UART:
2,652,514 UART: Running Caliptra FMC ...
2,652,922 UART:
2,653,152 UART: [fmc] Received command: 0x46574C44
3,642,049 >>> mbox cmd response: failed
3,642,049 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,896 UART:
3,647,912 UART: Running Caliptra FMC ...
3,648,320 UART:
3,648,542 UART: [fmc] Received command: 0x1000000C
3,649,277 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,907 UART: [kat] HMAC-384Kdf
921,637 UART: [kat] LMS
1,169,949 UART: [kat] --
1,170,986 UART: [cold-reset] ++
1,171,518 UART: [fht] FHT @ 0x50003400
1,174,236 UART: [idev] ++
1,174,404 UART: [idev] CDI.KEYID = 6
1,174,765 UART: [idev] SUBJECT.KEYID = 7
1,175,190 UART: [idev] UDS.KEYID = 0
1,175,536 ready_for_fw is high
1,175,536 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,520 UART: [idev] Erasing UDS.KEYID = 0
1,200,624 UART: [idev] Sha1 KeyId Algorithm
1,209,368 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,386 UART: [ldev] AUTHORITY.KEYID = 7
1,211,849 UART: [ldev] FE.KEYID = 1
1,217,243 UART: [ldev] Erasing FE.KEYID = 1
1,243,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,825 UART: [ldev] --
1,283,187 UART: [fwproc] Wait for Commands...
1,283,818 UART: [fwproc] Recv command 0x46574c44
1,284,551 UART: [fwproc] Recv'd Img size: 111916 bytes
2,554,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,295 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,716 >>> mbox cmd response: success
2,743,893 UART: [afmc] ++
2,744,061 UART: [afmc] CDI.KEYID = 6
2,744,424 UART: [afmc] SUBJECT.KEYID = 7
2,744,850 UART: [afmc] AUTHORITY.KEYID = 5
2,780,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,656 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,803,371 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,263 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,975 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,822,904 UART: [afmc] --
2,823,894 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,823,916 UART: [cold-reset] --
2,824,734 UART: [state] Locking Datavault
2,826,043 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,647 UART: [state] Locking ICCM
2,827,315 UART: [exit] Launching FMC @ 0x40000000
2,832,612 UART:
2,832,628 UART: Running Caliptra FMC ...
2,833,036 UART:
2,833,266 UART: [fmc] Received command: 0x46574C44
2,834,092 UART:
2,834,108 UART: Running Caliptra ROM ...
2,834,516 UART:
2,834,658 UART: [state] CFI Enabled
2,837,496 UART: [state] LifecycleState = Unprovisioned
2,838,151 UART: [state] DebugLocked = No
2,838,751 UART: [state] WD Timer not started. Device not locked for debugging
2,840,047 UART: [kat] SHA2-256
3,643,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,726 UART: [kat] ++
3,647,878 UART: [kat] sha1
3,652,040 UART: [kat] SHA2-256
3,653,980 UART: [kat] SHA2-384
3,656,949 UART: [kat] SHA2-512-ACC
3,658,849 UART: [kat] ECC-384
3,668,070 UART: [kat] HMAC-384Kdf
3,672,752 UART: [kat] LMS
3,921,064 UART: [kat] --
3,921,986 UART: [update-reset] ++
3,938,304 >>> mbox cmd response: failed
3,938,304 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,566 UART: ROM Non-Fatal Error: 0x000B001E
3,939,406 UART: [state] Locking Datavault
3,940,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,914 UART: [state] Locking ICCM
3,941,410 UART: [exit] Launching FMC @ 0x40000000
3,946,707 UART:
3,946,723 UART: Running Caliptra FMC ...
3,947,131 UART:
3,947,353 UART: [fmc] Received command: 0x1000000C
3,948,088 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,843 ready_for_fw is high
1,055,843 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,971 >>> mbox cmd response: success
2,647,526 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,653,927 UART:
2,653,943 UART: Running Caliptra FMC ...
2,654,351 UART:
2,654,581 UART: [fmc] Received command: 0x46574C44
3,643,951 >>> mbox cmd response: failed
3,643,951 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,818 UART:
3,649,834 UART: Running Caliptra FMC ...
3,650,242 UART:
3,650,464 UART: [fmc] Received command: 0x1000000C
3,651,199 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
903,920 UART: [kat] SHA2-512-ACC
905,821 UART: [kat] ECC-384
915,340 UART: [kat] HMAC-384Kdf
919,886 UART: [kat] LMS
1,168,198 UART: [kat] --
1,169,165 UART: [cold-reset] ++
1,169,583 UART: [fht] FHT @ 0x50003400
1,172,373 UART: [idev] ++
1,172,541 UART: [idev] CDI.KEYID = 6
1,172,902 UART: [idev] SUBJECT.KEYID = 7
1,173,327 UART: [idev] UDS.KEYID = 0
1,173,673 ready_for_fw is high
1,173,673 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,215 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,454 UART: [fwproc] Wait for Commands...
1,281,187 UART: [fwproc] Recv command 0x46574c44
1,281,920 UART: [fwproc] Recv'd Img size: 111916 bytes
3,095,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,122,901 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,284,332 >>> mbox cmd response: success
3,285,543 UART: [afmc] ++
3,285,711 UART: [afmc] CDI.KEYID = 6
3,286,074 UART: [afmc] SUBJECT.KEYID = 7
3,286,500 UART: [afmc] AUTHORITY.KEYID = 5
3,322,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,488 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,345,199 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,351,086 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,356,784 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,364,785 UART: [afmc] --
3,365,855 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,365,877 UART: [cold-reset] --
3,366,893 UART: [state] Locking Datavault
3,368,104 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,708 UART: [state] Locking ICCM
3,369,300 UART: [exit] Launching FMC @ 0x40000000
3,374,597 UART:
3,374,613 UART: Running Caliptra FMC ...
3,375,021 UART:
3,375,251 UART: [fmc] Received command: 0x46574C44
3,376,077 UART:
3,376,093 UART: Running Caliptra ROM ...
3,376,501 UART:
3,376,556 UART: [state] CFI Enabled
3,379,186 UART: [state] LifecycleState = Unprovisioned
3,379,841 UART: [state] DebugLocked = No
3,380,365 UART: [state] WD Timer not started. Device not locked for debugging
3,381,713 UART: [kat] SHA2-256
4,185,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,189,392 UART: [kat] ++
4,189,544 UART: [kat] sha1
4,193,686 UART: [kat] SHA2-256
4,195,626 UART: [kat] SHA2-384
4,198,307 UART: [kat] SHA2-512-ACC
4,200,207 UART: [kat] ECC-384
4,210,114 UART: [kat] HMAC-384Kdf
4,214,790 UART: [kat] LMS
4,463,102 UART: [kat] --
4,463,748 UART: [update-reset] ++
4,481,018 >>> mbox cmd response: failed
4,481,018 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,481,300 UART: ROM Non-Fatal Error: 0x000B003D
4,482,142 UART: [state] Locking Datavault
4,482,954 UART: [state] Locking PCR0, PCR1 and PCR31
4,483,558 UART: [state] Locking ICCM
4,484,192 UART: [exit] Launching FMC @ 0x40000000
4,489,489 UART:
4,489,505 UART: Running Caliptra FMC ...
4,489,913 UART:
4,490,135 UART: [fmc] Received command: 0x1000000C
4,490,870 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,378 ready_for_fw is high
1,056,378 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,142,184 >>> mbox cmd response: success
3,198,267 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,204,476 UART:
3,204,492 UART: Running Caliptra FMC ...
3,204,900 UART:
3,205,130 UART: [fmc] Received command: 0x46574C44
4,195,247 >>> mbox cmd response: failed
4,195,247 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,200,878 UART:
4,200,894 UART: Running Caliptra FMC ...
4,201,302 UART:
4,201,524 UART: [fmc] Received command: 0x1000000C
4,202,259 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 ready_for_fw is high
1,174,406 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,156 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,997 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,282 UART: [fwproc] Recv command 0x46574c44
1,282,015 UART: [fwproc] Recv'd Img size: 111916 bytes
3,101,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,128,531 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,290,092 >>> mbox cmd response: success
3,291,179 UART: [afmc] ++
3,291,347 UART: [afmc] CDI.KEYID = 6
3,291,710 UART: [afmc] SUBJECT.KEYID = 7
3,292,136 UART: [afmc] AUTHORITY.KEYID = 5
3,328,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,344,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,345,124 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,350,835 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,356,722 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,362,420 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,370,285 UART: [afmc] --
3,371,253 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,371,275 UART: [cold-reset] --
3,372,057 UART: [state] Locking Datavault
3,373,118 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,722 UART: [state] Locking ICCM
3,374,210 UART: [exit] Launching FMC @ 0x40000000
3,379,507 UART:
3,379,523 UART: Running Caliptra FMC ...
3,379,931 UART:
3,380,161 UART: [fmc] Received command: 0x46574C44
3,380,987 UART:
3,381,003 UART: Running Caliptra ROM ...
3,381,411 UART:
3,381,553 UART: [state] CFI Enabled
3,384,133 UART: [state] LifecycleState = Unprovisioned
3,384,788 UART: [state] DebugLocked = No
3,385,270 UART: [state] WD Timer not started. Device not locked for debugging
3,386,474 UART: [kat] SHA2-256
4,190,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,194,153 UART: [kat] ++
4,194,305 UART: [kat] sha1
4,198,445 UART: [kat] SHA2-256
4,200,385 UART: [kat] SHA2-384
4,203,150 UART: [kat] SHA2-512-ACC
4,205,050 UART: [kat] ECC-384
4,215,219 UART: [kat] HMAC-384Kdf
4,219,849 UART: [kat] LMS
4,468,161 UART: [kat] --
4,469,023 UART: [update-reset] ++
4,486,841 >>> mbox cmd response: failed
4,486,841 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,487,181 UART: ROM Non-Fatal Error: 0x000B003D
4,488,025 UART: [state] Locking Datavault
4,488,751 UART: [state] Locking PCR0, PCR1 and PCR31
4,489,355 UART: [state] Locking ICCM
4,489,839 UART: [exit] Launching FMC @ 0x40000000
4,495,136 UART:
4,495,152 UART: Running Caliptra FMC ...
4,495,560 UART:
4,495,782 UART: [fmc] Received command: 0x1000000C
4,496,517 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,989 ready_for_fw is high
1,056,989 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,133,163 >>> mbox cmd response: success
3,189,496 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,195,369 UART:
3,195,385 UART: Running Caliptra FMC ...
3,195,793 UART:
3,196,023 UART: [fmc] Received command: 0x46574C44
4,186,887 >>> mbox cmd response: failed
4,186,887 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,540 UART:
4,192,556 UART: Running Caliptra FMC ...
4,192,964 UART:
4,193,186 UART: [fmc] Received command: 0x1000000C
4,193,921 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,795 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,173,791 ready_for_fw is high
1,173,791 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,198,067 UART: [idev] Sha1 KeyId Algorithm
1,206,905 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,426 UART: [ldev] --
1,279,784 UART: [fwproc] Wait for Commands...
1,280,453 UART: [fwproc] Recv command 0x46574c44
1,281,186 UART: [fwproc] Recv'd Img size: 111916 bytes
3,099,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,127,509 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,288,916 >>> mbox cmd response: success
3,289,969 UART: [afmc] ++
3,290,137 UART: [afmc] CDI.KEYID = 6
3,290,500 UART: [afmc] SUBJECT.KEYID = 7
3,290,926 UART: [afmc] AUTHORITY.KEYID = 5
3,326,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,166 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,349,877 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,355,764 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,361,462 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,469 UART: [afmc] --
3,370,557 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,370,579 UART: [cold-reset] --
3,371,337 UART: [state] Locking Datavault
3,372,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,232 UART: [state] Locking ICCM
3,373,846 UART: [exit] Launching FMC @ 0x40000000
3,379,143 UART:
3,379,159 UART: Running Caliptra FMC ...
3,379,567 UART:
3,379,797 UART: [fmc] Received command: 0x46574C44
3,380,623 UART:
3,380,639 UART: Running Caliptra ROM ...
3,381,047 UART:
3,381,102 UART: [state] CFI Enabled
3,383,696 UART: [state] LifecycleState = Unprovisioned
3,384,351 UART: [state] DebugLocked = No
3,385,009 UART: [state] WD Timer not started. Device not locked for debugging
3,386,265 UART: [kat] SHA2-256
4,189,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,193,944 UART: [kat] ++
4,194,096 UART: [kat] sha1
4,198,298 UART: [kat] SHA2-256
4,200,238 UART: [kat] SHA2-384
4,202,925 UART: [kat] SHA2-512-ACC
4,204,825 UART: [kat] ECC-384
4,214,428 UART: [kat] HMAC-384Kdf
4,218,866 UART: [kat] LMS
4,467,178 UART: [kat] --
4,467,862 UART: [update-reset] ++
4,485,636 >>> mbox cmd response: failed
4,485,636 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,485,982 UART: ROM Non-Fatal Error: 0x000B003D
4,486,822 UART: [state] Locking Datavault
4,487,538 UART: [state] Locking PCR0, PCR1 and PCR31
4,488,142 UART: [state] Locking ICCM
4,488,656 UART: [exit] Launching FMC @ 0x40000000
4,493,953 UART:
4,493,969 UART: Running Caliptra FMC ...
4,494,377 UART:
4,494,599 UART: [fmc] Received command: 0x1000000C
4,495,334 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,132,689 >>> mbox cmd response: success
3,189,272 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,195,695 UART:
3,195,711 UART: Running Caliptra FMC ...
3,196,119 UART:
3,196,349 UART: [fmc] Received command: 0x46574C44
4,186,514 >>> mbox cmd response: failed
4,186,514 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,179 UART:
4,192,195 UART: Running Caliptra FMC ...
4,192,603 UART:
4,192,825 UART: [fmc] Received command: 0x1000000C
4,193,560 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,736 UART: [cold-reset] ++
1,171,256 UART: [fht] FHT @ 0x50003400
1,174,112 UART: [idev] ++
1,174,280 UART: [idev] CDI.KEYID = 6
1,174,641 UART: [idev] SUBJECT.KEYID = 7
1,175,066 UART: [idev] UDS.KEYID = 0
1,175,412 ready_for_fw is high
1,175,412 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,197 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 111916 bytes
3,109,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,137,409 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,163,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,298,790 >>> mbox cmd response: success
3,299,895 UART: [afmc] ++
3,300,063 UART: [afmc] CDI.KEYID = 6
3,300,426 UART: [afmc] SUBJECT.KEYID = 7
3,300,852 UART: [afmc] AUTHORITY.KEYID = 5
3,336,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,353,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,354,064 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,359,775 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,365,662 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,371,360 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,379,193 UART: [afmc] --
3,380,203 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,380,225 UART: [cold-reset] --
3,381,205 UART: [state] Locking Datavault
3,382,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,382,914 UART: [state] Locking ICCM
3,383,482 UART: [exit] Launching FMC @ 0x40000000
3,388,779 UART:
3,388,795 UART: Running Caliptra FMC ...
3,389,203 UART:
3,389,433 UART: [fmc] Received command: 0x46574C44
3,390,259 UART:
3,390,275 UART: Running Caliptra ROM ...
3,390,683 UART:
3,390,825 UART: [state] CFI Enabled
3,393,551 UART: [state] LifecycleState = Unprovisioned
3,394,206 UART: [state] DebugLocked = No
3,394,834 UART: [state] WD Timer not started. Device not locked for debugging
3,396,182 UART: [kat] SHA2-256
4,199,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,203,861 UART: [kat] ++
4,204,013 UART: [kat] sha1
4,208,065 UART: [kat] SHA2-256
4,210,005 UART: [kat] SHA2-384
4,212,730 UART: [kat] SHA2-512-ACC
4,214,630 UART: [kat] ECC-384
4,224,361 UART: [kat] HMAC-384Kdf
4,228,885 UART: [kat] LMS
4,477,197 UART: [kat] --
4,478,035 UART: [update-reset] ++
4,495,299 >>> mbox cmd response: failed
4,495,299 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,495,833 UART: ROM Non-Fatal Error: 0x000B003D
4,496,589 UART: [state] Locking Datavault
4,497,473 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,077 UART: [state] Locking ICCM
4,498,613 UART: [exit] Launching FMC @ 0x40000000
4,503,910 UART:
4,503,926 UART: Running Caliptra FMC ...
4,504,334 UART:
4,504,556 UART: [fmc] Received command: 0x1000000C
4,505,291 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,687 ready_for_fw is high
1,056,687 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,122,478 >>> mbox cmd response: success
3,178,359 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,184,904 UART:
3,184,920 UART: Running Caliptra FMC ...
3,185,328 UART:
3,185,558 UART: [fmc] Received command: 0x46574C44
4,175,810 >>> mbox cmd response: failed
4,175,810 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,181,631 UART:
4,181,647 UART: Running Caliptra FMC ...
4,182,055 UART:
4,182,277 UART: [fmc] Received command: 0x1000000C
4,183,012 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,327 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,173,865 ready_for_fw is high
1,173,865 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,608 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x46574c44
1,282,282 UART: [fwproc] Recv'd Img size: 111916 bytes
3,082,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,111,524 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,137,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,273,149 >>> mbox cmd response: success
3,274,384 UART: [afmc] ++
3,274,552 UART: [afmc] CDI.KEYID = 6
3,274,915 UART: [afmc] SUBJECT.KEYID = 7
3,275,341 UART: [afmc] AUTHORITY.KEYID = 5
3,310,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,326,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,327,701 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,333,412 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,339,299 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,344,997 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,352,790 UART: [afmc] --
3,353,772 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,353,794 UART: [cold-reset] --
3,354,502 UART: [state] Locking Datavault
3,355,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,356,313 UART: [state] Locking ICCM
3,356,837 UART: [exit] Launching FMC @ 0x40000000
3,362,134 UART:
3,362,150 UART: Running Caliptra FMC ...
3,362,558 UART:
3,362,788 UART: [fmc] Received command: 0x46574C44
3,363,614 UART:
3,363,630 UART: Running Caliptra ROM ...
3,364,038 UART:
3,364,093 UART: [state] CFI Enabled
3,367,067 UART: [state] LifecycleState = Unprovisioned
3,367,722 UART: [state] DebugLocked = No
3,368,398 UART: [state] WD Timer not started. Device not locked for debugging
3,369,572 UART: [kat] SHA2-256
4,173,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,177,251 UART: [kat] ++
4,177,403 UART: [kat] sha1
4,181,409 UART: [kat] SHA2-256
4,183,349 UART: [kat] SHA2-384
4,186,132 UART: [kat] SHA2-512-ACC
4,188,032 UART: [kat] ECC-384
4,197,693 UART: [kat] HMAC-384Kdf
4,202,341 UART: [kat] LMS
4,450,653 UART: [kat] --
4,451,195 UART: [update-reset] ++
4,468,467 >>> mbox cmd response: failed
4,468,467 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,468,975 UART: ROM Non-Fatal Error: 0x000B003D
4,469,811 UART: [state] Locking Datavault
4,470,635 UART: [state] Locking PCR0, PCR1 and PCR31
4,471,239 UART: [state] Locking ICCM
4,471,793 UART: [exit] Launching FMC @ 0x40000000
4,477,090 UART:
4,477,106 UART: Running Caliptra FMC ...
4,477,514 UART:
4,477,736 UART: [fmc] Received command: 0x1000000C
4,478,471 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,874 ready_for_fw is high
1,055,874 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,126,697 >>> mbox cmd response: success
3,182,526 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,188,679 UART:
3,188,695 UART: Running Caliptra FMC ...
3,189,103 UART:
3,189,333 UART: [fmc] Received command: 0x46574C44
4,178,020 >>> mbox cmd response: failed
4,178,020 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,183,855 UART:
4,183,871 UART: Running Caliptra FMC ...
4,184,279 UART:
4,184,501 UART: [fmc] Received command: 0x1000000C
4,185,236 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
891,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,930 UART: [kat] ++
896,082 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,198,490 UART: [idev] Sha1 KeyId Algorithm
1,207,336 UART: [idev] --
1,208,427 UART: [ldev] ++
1,208,595 UART: [ldev] CDI.KEYID = 6
1,208,959 UART: [ldev] SUBJECT.KEYID = 5
1,209,386 UART: [ldev] AUTHORITY.KEYID = 7
1,209,849 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,251 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,278 UART: [fwproc] Recv command 0x46574c44
1,282,011 UART: [fwproc] Recv'd Img size: 111916 bytes
3,091,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,118,632 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,280,183 >>> mbox cmd response: success
3,281,276 UART: [afmc] ++
3,281,444 UART: [afmc] CDI.KEYID = 6
3,281,807 UART: [afmc] SUBJECT.KEYID = 7
3,282,233 UART: [afmc] AUTHORITY.KEYID = 5
3,317,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,334,683 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,340,394 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,346,281 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,351,979 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,359,914 UART: [afmc] --
3,360,822 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,360,844 UART: [cold-reset] --
3,361,696 UART: [state] Locking Datavault
3,362,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,363,553 UART: [state] Locking ICCM
3,364,083 UART: [exit] Launching FMC @ 0x40000000
3,369,380 UART:
3,369,396 UART: Running Caliptra FMC ...
3,369,804 UART:
3,370,034 UART: [fmc] Received command: 0x46574C44
3,370,860 UART:
3,370,876 UART: Running Caliptra ROM ...
3,371,284 UART:
3,371,426 UART: [state] CFI Enabled
3,374,010 UART: [state] LifecycleState = Unprovisioned
3,374,665 UART: [state] DebugLocked = No
3,375,227 UART: [state] WD Timer not started. Device not locked for debugging
3,376,445 UART: [kat] SHA2-256
4,179,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,184,124 UART: [kat] ++
4,184,276 UART: [kat] sha1
4,188,418 UART: [kat] SHA2-256
4,190,358 UART: [kat] SHA2-384
4,193,153 UART: [kat] SHA2-512-ACC
4,195,053 UART: [kat] ECC-384
4,204,964 UART: [kat] HMAC-384Kdf
4,209,518 UART: [kat] LMS
4,457,830 UART: [kat] --
4,458,794 UART: [update-reset] ++
4,476,766 >>> mbox cmd response: failed
4,476,766 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,477,318 UART: ROM Non-Fatal Error: 0x000B003D
4,478,098 UART: [state] Locking Datavault
4,479,000 UART: [state] Locking PCR0, PCR1 and PCR31
4,479,604 UART: [state] Locking ICCM
4,480,148 UART: [exit] Launching FMC @ 0x40000000
4,485,445 UART:
4,485,461 UART: Running Caliptra FMC ...
4,485,869 UART:
4,486,091 UART: [fmc] Received command: 0x1000000C
4,486,826 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,151 ready_for_fw is high
1,056,151 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,141,833 >>> mbox cmd response: success
3,198,240 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,204,613 UART:
3,204,629 UART: Running Caliptra FMC ...
3,205,037 UART:
3,205,267 UART: [fmc] Received command: 0x46574C44
4,195,211 >>> mbox cmd response: failed
4,195,211 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,200,894 UART:
4,200,910 UART: Running Caliptra FMC ...
4,201,318 UART:
4,201,540 UART: [fmc] Received command: 0x1000000C
4,202,275 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
891,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,175,039 ready_for_fw is high
1,175,039 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,825 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,906 UART: [ldev] ++
1,210,074 UART: [ldev] CDI.KEYID = 6
1,210,438 UART: [ldev] SUBJECT.KEYID = 5
1,210,865 UART: [ldev] AUTHORITY.KEYID = 7
1,211,328 UART: [ldev] FE.KEYID = 1
1,216,734 UART: [ldev] Erasing FE.KEYID = 1
1,243,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,500 UART: [ldev] --
1,282,938 UART: [fwproc] Wait for Commands...
1,283,519 UART: [fwproc] Recv command 0x46574c44
1,284,252 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,351 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,354 >>> mbox cmd response: success
2,677,589 UART: [afmc] ++
2,677,757 UART: [afmc] CDI.KEYID = 6
2,678,120 UART: [afmc] SUBJECT.KEYID = 7
2,678,546 UART: [afmc] AUTHORITY.KEYID = 5
2,714,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,647 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,367 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,260 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,953 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,664 UART: [afmc] --
2,757,684 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,757,706 UART: [cold-reset] --
2,758,378 UART: [state] Locking Datavault
2,759,505 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,109 UART: [state] Locking ICCM
2,760,559 UART: [exit] Launching FMC @ 0x40000000
2,765,856 UART:
2,765,872 UART: Running Caliptra FMC ...
2,766,280 UART:
2,766,418 UART: [fmc] Received command: 0x46574C44
2,767,247 UART:
2,767,263 UART: Running Caliptra ROM ...
2,767,671 UART:
2,767,726 UART: [state] CFI Enabled
2,770,370 UART: [state] LifecycleState = Unprovisioned
2,771,025 UART: [state] DebugLocked = No
2,771,613 UART: [state] WD Timer not started. Device not locked for debugging
2,772,953 UART: [kat] SHA2-256
3,576,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,632 UART: [kat] ++
3,580,784 UART: [kat] sha1
3,585,010 UART: [kat] SHA2-256
3,586,950 UART: [kat] SHA2-384
3,589,703 UART: [kat] SHA2-512-ACC
3,591,603 UART: [kat] ECC-384
3,601,036 UART: [kat] HMAC-384Kdf
3,605,590 UART: [kat] LMS
3,853,902 UART: [kat] --
3,854,920 UART: [update-reset] ++
3,856,403 >>> mbox cmd response: failed
3,856,821 UART: ROM Non-Fatal Error: 0x000B0001
3,857,775 UART: [state] Locking Datavault
3,858,413 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,017 UART: [state] Locking ICCM
3,859,595 UART: [exit] Launching FMC @ 0x40000000
3,864,892 UART:
3,864,908 UART: Running Caliptra FMC ...
3,865,316 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 ready_for_fw is high
1,056,204 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,276 >>> mbox cmd response: success
2,580,122 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,341 UART:
2,586,357 UART: Running Caliptra FMC ...
2,586,765 UART:
2,586,903 UART: [fmc] Received command: 0x46574C44
3,560,800 >>> mbox cmd response: failed
3,566,289 UART:
3,566,305 UART: Running Caliptra FMC ...
3,566,713 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
915,615 UART: [kat] HMAC-384Kdf
920,273 UART: [kat] LMS
1,168,585 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,556 UART: [idev] ++
1,172,724 UART: [idev] CDI.KEYID = 6
1,173,085 UART: [idev] SUBJECT.KEYID = 7
1,173,510 UART: [idev] UDS.KEYID = 0
1,173,856 ready_for_fw is high
1,173,856 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,376 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,585 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,915 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,866 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,783 >>> mbox cmd response: success
2,675,980 UART: [afmc] ++
2,676,148 UART: [afmc] CDI.KEYID = 6
2,676,511 UART: [afmc] SUBJECT.KEYID = 7
2,676,937 UART: [afmc] AUTHORITY.KEYID = 5
2,712,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,736 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,456 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,349 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,042 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,865 UART: [afmc] --
2,755,863 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,885 UART: [cold-reset] --
2,756,711 UART: [state] Locking Datavault
2,757,672 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,276 UART: [state] Locking ICCM
2,758,820 UART: [exit] Launching FMC @ 0x40000000
2,764,117 UART:
2,764,133 UART: Running Caliptra FMC ...
2,764,541 UART:
2,764,679 UART: [fmc] Received command: 0x46574C44
2,765,508 UART:
2,765,524 UART: Running Caliptra ROM ...
2,765,932 UART:
2,766,074 UART: [state] CFI Enabled
2,769,108 UART: [state] LifecycleState = Unprovisioned
2,769,763 UART: [state] DebugLocked = No
2,770,389 UART: [state] WD Timer not started. Device not locked for debugging
2,771,685 UART: [kat] SHA2-256
3,575,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,364 UART: [kat] ++
3,579,516 UART: [kat] sha1
3,583,824 UART: [kat] SHA2-256
3,585,764 UART: [kat] SHA2-384
3,588,405 UART: [kat] SHA2-512-ACC
3,590,305 UART: [kat] ECC-384
3,600,102 UART: [kat] HMAC-384Kdf
3,604,582 UART: [kat] LMS
3,852,894 UART: [kat] --
3,853,974 UART: [update-reset] ++
3,855,403 >>> mbox cmd response: failed
3,855,949 UART: ROM Non-Fatal Error: 0x000B0001
3,856,861 UART: [state] Locking Datavault
3,857,715 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,319 UART: [state] Locking ICCM
3,858,983 UART: [exit] Launching FMC @ 0x40000000
3,864,280 UART:
3,864,296 UART: Running Caliptra FMC ...
3,864,704 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,055 ready_for_fw is high
1,056,055 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,389 >>> mbox cmd response: success
2,581,287 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,604 UART:
2,587,620 UART: Running Caliptra FMC ...
2,588,028 UART:
2,588,166 UART: [fmc] Received command: 0x46574C44
3,562,136 >>> mbox cmd response: failed
3,568,157 UART:
3,568,173 UART: Running Caliptra FMC ...
3,568,581 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,092 UART: [kat] SHA2-512-ACC
905,993 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,318 UART: [kat] LMS
1,168,630 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 ready_for_fw is high
1,174,287 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,413 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,252 >>> mbox cmd response: success
2,676,319 UART: [afmc] ++
2,676,487 UART: [afmc] CDI.KEYID = 6
2,676,850 UART: [afmc] SUBJECT.KEYID = 7
2,677,276 UART: [afmc] AUTHORITY.KEYID = 5
2,712,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,957 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,677 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,570 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,263 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,036 UART: [afmc] --
2,756,116 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,138 UART: [cold-reset] --
2,757,102 UART: [state] Locking Datavault
2,758,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,687 UART: [state] Locking ICCM
2,759,269 UART: [exit] Launching FMC @ 0x40000000
2,764,566 UART:
2,764,582 UART: Running Caliptra FMC ...
2,764,990 UART:
2,765,128 UART: [fmc] Received command: 0x46574C44
2,765,957 UART:
2,765,973 UART: Running Caliptra ROM ...
2,766,381 UART:
2,766,436 UART: [state] CFI Enabled
2,769,460 UART: [state] LifecycleState = Unprovisioned
2,770,115 UART: [state] DebugLocked = No
2,770,647 UART: [state] WD Timer not started. Device not locked for debugging
2,771,881 UART: [kat] SHA2-256
3,575,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,560 UART: [kat] ++
3,579,712 UART: [kat] sha1
3,584,004 UART: [kat] SHA2-256
3,585,944 UART: [kat] SHA2-384
3,588,731 UART: [kat] SHA2-512-ACC
3,590,631 UART: [kat] ECC-384
3,600,138 UART: [kat] HMAC-384Kdf
3,604,784 UART: [kat] LMS
3,853,096 UART: [kat] --
3,854,066 UART: [update-reset] ++
3,855,649 >>> mbox cmd response: failed
3,856,043 UART: ROM Non-Fatal Error: 0x000B0001
3,856,867 UART: [state] Locking Datavault
3,857,647 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,251 UART: [state] Locking ICCM
3,858,705 UART: [exit] Launching FMC @ 0x40000000
3,864,002 UART:
3,864,018 UART: Running Caliptra FMC ...
3,864,426 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,982 ready_for_fw is high
1,055,982 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,332 >>> mbox cmd response: success
2,579,360 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,585,363 UART:
2,585,379 UART: Running Caliptra FMC ...
2,585,787 UART:
2,585,925 UART: [fmc] Received command: 0x46574C44
3,559,560 >>> mbox cmd response: failed
3,565,311 UART:
3,565,327 UART: Running Caliptra FMC ...
3,565,735 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,762 UART: [idev] Erasing UDS.KEYID = 0
1,198,840 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,033 UART: [ldev] Erasing FE.KEYID = 1
1,241,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,115 UART: [ldev] --
1,280,437 UART: [fwproc] Wait for Commands...
1,281,020 UART: [fwproc] Recv command 0x46574c44
1,281,753 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,022 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,867 >>> mbox cmd response: success
2,674,898 UART: [afmc] ++
2,675,066 UART: [afmc] CDI.KEYID = 6
2,675,429 UART: [afmc] SUBJECT.KEYID = 7
2,675,855 UART: [afmc] AUTHORITY.KEYID = 5
2,711,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,904 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,624 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,517 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,210 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,105 UART: [afmc] --
2,755,075 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,097 UART: [cold-reset] --
2,756,009 UART: [state] Locking Datavault
2,757,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,696 UART: [state] Locking ICCM
2,758,166 UART: [exit] Launching FMC @ 0x40000000
2,763,463 UART:
2,763,479 UART: Running Caliptra FMC ...
2,763,887 UART:
2,764,025 UART: [fmc] Received command: 0x46574C44
2,764,854 UART:
2,764,870 UART: Running Caliptra ROM ...
2,765,278 UART:
2,765,420 UART: [state] CFI Enabled
2,768,334 UART: [state] LifecycleState = Unprovisioned
2,768,989 UART: [state] DebugLocked = No
2,769,683 UART: [state] WD Timer not started. Device not locked for debugging
2,771,035 UART: [kat] SHA2-256
3,574,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,714 UART: [kat] ++
3,578,866 UART: [kat] sha1
3,583,110 UART: [kat] SHA2-256
3,585,050 UART: [kat] SHA2-384
3,587,673 UART: [kat] SHA2-512-ACC
3,589,573 UART: [kat] ECC-384
3,599,536 UART: [kat] HMAC-384Kdf
3,604,190 UART: [kat] LMS
3,852,502 UART: [kat] --
3,853,372 UART: [update-reset] ++
3,855,007 >>> mbox cmd response: failed
3,855,547 UART: ROM Non-Fatal Error: 0x000B0001
3,856,475 UART: [state] Locking Datavault
3,857,359 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,963 UART: [state] Locking ICCM
3,858,447 UART: [exit] Launching FMC @ 0x40000000
3,863,744 UART:
3,863,760 UART: Running Caliptra FMC ...
3,864,168 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,001 ready_for_fw is high
1,056,001 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,735 >>> mbox cmd response: success
2,581,799 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,834 UART:
2,587,850 UART: Running Caliptra FMC ...
2,588,258 UART:
2,588,396 UART: [fmc] Received command: 0x46574C44
3,562,894 >>> mbox cmd response: failed
3,568,587 UART:
3,568,603 UART: Running Caliptra FMC ...
3,569,011 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 ready_for_fw is high
1,174,263 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,207,815 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,968 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,807 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,686 >>> mbox cmd response: success
2,674,883 UART: [afmc] ++
2,675,051 UART: [afmc] CDI.KEYID = 6
2,675,414 UART: [afmc] SUBJECT.KEYID = 7
2,675,840 UART: [afmc] AUTHORITY.KEYID = 5
2,711,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,503 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,223 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,116 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,809 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,662 UART: [afmc] --
2,754,598 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,754,620 UART: [cold-reset] --
2,755,330 UART: [state] Locking Datavault
2,756,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,095 UART: [state] Locking ICCM
2,757,543 UART: [exit] Launching FMC @ 0x40000000
2,762,840 UART:
2,762,856 UART: Running Caliptra FMC ...
2,763,264 UART:
2,763,402 UART: [fmc] Received command: 0x46574C44
2,764,231 UART:
2,764,247 UART: Running Caliptra ROM ...
2,764,655 UART:
2,764,710 UART: [state] CFI Enabled
2,767,394 UART: [state] LifecycleState = Unprovisioned
2,768,049 UART: [state] DebugLocked = No
2,768,637 UART: [state] WD Timer not started. Device not locked for debugging
2,769,895 UART: [kat] SHA2-256
3,573,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,574 UART: [kat] ++
3,577,726 UART: [kat] sha1
3,582,150 UART: [kat] SHA2-256
3,584,090 UART: [kat] SHA2-384
3,586,955 UART: [kat] SHA2-512-ACC
3,588,855 UART: [kat] ECC-384
3,598,904 UART: [kat] HMAC-384Kdf
3,603,518 UART: [kat] LMS
3,851,830 UART: [kat] --
3,852,956 UART: [update-reset] ++
3,854,537 >>> mbox cmd response: failed
3,854,897 UART: ROM Non-Fatal Error: 0x000B0001
3,855,883 UART: [state] Locking Datavault
3,856,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,081 UART: [state] Locking ICCM
3,857,705 UART: [exit] Launching FMC @ 0x40000000
3,863,002 UART:
3,863,018 UART: Running Caliptra FMC ...
3,863,426 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,412 ready_for_fw is high
1,056,412 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,558 >>> mbox cmd response: success
2,578,500 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,584,889 UART:
2,584,905 UART: Running Caliptra FMC ...
2,585,313 UART:
2,585,451 UART: [fmc] Received command: 0x46574C44
3,559,106 >>> mbox cmd response: failed
3,564,939 UART:
3,564,955 UART: Running Caliptra FMC ...
3,565,363 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 ready_for_fw is high
1,174,384 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,033 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,786 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,607 >>> mbox cmd response: success
2,676,828 UART: [afmc] ++
2,676,996 UART: [afmc] CDI.KEYID = 6
2,677,359 UART: [afmc] SUBJECT.KEYID = 7
2,677,785 UART: [afmc] AUTHORITY.KEYID = 5
2,713,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,590 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,310 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,203 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,896 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,707 UART: [afmc] --
2,756,633 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,655 UART: [cold-reset] --
2,757,525 UART: [state] Locking Datavault
2,758,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,294 UART: [state] Locking ICCM
2,759,754 UART: [exit] Launching FMC @ 0x40000000
2,765,051 UART:
2,765,067 UART: Running Caliptra FMC ...
2,765,475 UART:
2,765,613 UART: [fmc] Received command: 0x46574C44
2,766,442 UART:
2,766,458 UART: Running Caliptra ROM ...
2,766,866 UART:
2,767,008 UART: [state] CFI Enabled
2,770,266 UART: [state] LifecycleState = Unprovisioned
2,770,921 UART: [state] DebugLocked = No
2,771,639 UART: [state] WD Timer not started. Device not locked for debugging
2,772,911 UART: [kat] SHA2-256
3,576,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,590 UART: [kat] ++
3,580,742 UART: [kat] sha1
3,584,920 UART: [kat] SHA2-256
3,586,860 UART: [kat] SHA2-384
3,589,687 UART: [kat] SHA2-512-ACC
3,591,587 UART: [kat] ECC-384
3,601,506 UART: [kat] HMAC-384Kdf
3,606,128 UART: [kat] LMS
3,854,440 UART: [kat] --
3,855,272 UART: [update-reset] ++
3,856,957 >>> mbox cmd response: failed
3,857,481 UART: ROM Non-Fatal Error: 0x000B0001
3,858,435 UART: [state] Locking Datavault
3,859,267 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,871 UART: [state] Locking ICCM
3,860,341 UART: [exit] Launching FMC @ 0x40000000
3,865,638 UART:
3,865,654 UART: Running Caliptra FMC ...
3,866,062 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,569 ready_for_fw is high
1,056,569 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,115 >>> mbox cmd response: success
2,580,467 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,942 UART:
2,586,958 UART: Running Caliptra FMC ...
2,587,366 UART:
2,587,504 UART: [fmc] Received command: 0x46574C44
3,561,614 >>> mbox cmd response: failed
3,567,335 UART:
3,567,351 UART: Running Caliptra FMC ...
3,567,759 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,230 UART: [kat] SHA2-256
891,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,909 UART: [kat] ++
896,061 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,182,269 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,709 UART: [fwproc] Recv command 0x46505652
1,282,536 UART: [rt] FIPS Version
1,283,097 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,310 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,386 UART: [kat] SHA2-256
902,326 UART: [kat] SHA2-384
905,067 UART: [kat] SHA2-512-ACC
906,968 UART: [kat] ECC-384
917,275 UART: [kat] HMAC-384Kdf
921,941 UART: [kat] LMS
1,170,253 UART: [kat] --
1,171,296 UART: [cold-reset] ++
1,171,834 UART: [fht] FHT @ 0x50003400
1,174,570 UART: [idev] ++
1,174,738 UART: [idev] CDI.KEYID = 6
1,175,099 UART: [idev] SUBJECT.KEYID = 7
1,175,524 UART: [idev] UDS.KEYID = 0
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,736 UART: [idev] --
1,210,837 UART: [ldev] ++
1,211,005 UART: [ldev] CDI.KEYID = 6
1,211,369 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,797 UART: [ldev] Erasing FE.KEYID = 1
1,244,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,517 UART: [ldev] --
1,283,943 UART: [fwproc] Wait for Commands...
1,284,576 UART: [fwproc] Recv command 0x46505652
1,285,403 UART: [rt] FIPS Version
1,285,964 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,595 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,597 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,766 UART: [ldev] --
1,280,086 UART: [fwproc] Wait for Commands...
1,280,685 UART: [fwproc] Recv command 0x46505652
1,281,512 UART: [rt] FIPS Version
1,282,073 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,806 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,985 UART: [state] LifecycleState = Unprovisioned
86,640 UART: [state] DebugLocked = No
87,168 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,130 UART: [kat] ++
896,282 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,261 UART: [kat] SHA2-512-ACC
907,162 UART: [kat] ECC-384
916,909 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,858 UART: [cold-reset] ++
1,171,378 UART: [fht] FHT @ 0x50003400
1,174,028 UART: [idev] ++
1,174,196 UART: [idev] CDI.KEYID = 6
1,174,557 UART: [idev] SUBJECT.KEYID = 7
1,174,982 UART: [idev] UDS.KEYID = 0
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,617 UART: [fwproc] Wait for Commands...
1,282,348 UART: [fwproc] Recv command 0x46505652
1,283,175 UART: [rt] FIPS Version
1,283,736 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,861 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,181,729 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,298 UART: [ldev] --
1,279,594 UART: [fwproc] Wait for Commands...
1,280,365 UART: [fwproc] Recv command 0x46505652
1,281,192 UART: [rt] FIPS Version
1,281,753 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,134,570 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,181,466 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,477 UART: [ldev] ++
1,208,645 UART: [ldev] CDI.KEYID = 6
1,209,009 UART: [ldev] SUBJECT.KEYID = 5
1,209,436 UART: [ldev] AUTHORITY.KEYID = 7
1,209,899 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46505652
1,282,933 UART: [rt] FIPS Version
1,283,494 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,243 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,477 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,890 UART: [fwproc] Wait for Commands...
1,281,463 UART: [fwproc] Recv command 0x46574c44
1,282,196 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,089 >>> mbox cmd response: success
2,773,206 UART: [afmc] ++
2,773,374 UART: [afmc] CDI.KEYID = 6
2,773,737 UART: [afmc] SUBJECT.KEYID = 7
2,774,163 UART: [afmc] AUTHORITY.KEYID = 5
2,809,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,544 UART:
2,851,560 UART: Running Caliptra ROM ...
2,851,968 UART:
2,852,023 UART: [state] CFI Enabled
2,854,473 UART: [state] LifecycleState = Unprovisioned
2,855,128 UART: [state] DebugLocked = No
2,855,834 UART: [state] WD Timer not started. Device not locked for debugging
2,856,953 UART: [kat] SHA2-256
3,660,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,632 UART: [kat] ++
3,664,784 UART: [kat] sha1
3,669,104 UART: [kat] SHA2-256
3,671,044 UART: [kat] SHA2-384
3,673,717 UART: [kat] SHA2-512-ACC
3,675,618 UART: [kat] ECC-384
3,685,215 UART: [kat] HMAC-384Kdf
3,689,783 UART: [kat] LMS
3,938,095 UART: [kat] --
3,938,945 UART: [warm-reset] ++
3,939,213 UART: [warm-reset] Prev Cold-Reset failed
3,940,270 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,365 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,313 UART: [kat] LMS
1,169,625 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,548 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,625 UART: [ldev] --
1,283,077 UART: [fwproc] Wait for Commands...
1,283,752 UART: [fwproc] Recv command 0x46574c44
1,284,485 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,608 >>> mbox cmd response: success
2,774,719 UART: [afmc] ++
2,774,887 UART: [afmc] CDI.KEYID = 6
2,775,250 UART: [afmc] SUBJECT.KEYID = 7
2,775,676 UART: [afmc] AUTHORITY.KEYID = 5
2,811,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,968 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,853,521 UART:
2,853,537 UART: Running Caliptra ROM ...
2,853,945 UART:
2,854,087 UART: [state] CFI Enabled
2,856,553 UART: [state] LifecycleState = Unprovisioned
2,857,208 UART: [state] DebugLocked = No
2,857,716 UART: [state] WD Timer not started. Device not locked for debugging
2,858,881 UART: [kat] SHA2-256
3,662,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,560 UART: [kat] ++
3,666,712 UART: [kat] sha1
3,670,832 UART: [kat] SHA2-256
3,672,772 UART: [kat] SHA2-384
3,675,349 UART: [kat] SHA2-512-ACC
3,677,250 UART: [kat] ECC-384
3,687,037 UART: [kat] HMAC-384Kdf
3,691,709 UART: [kat] LMS
3,940,021 UART: [kat] --
3,941,043 UART: [warm-reset] ++
3,941,311 UART: [warm-reset] Prev Cold-Reset failed
3,942,160 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,546 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,803 UART: [fht] FHT @ 0x50003400
1,172,619 UART: [idev] ++
1,172,787 UART: [idev] CDI.KEYID = 6
1,173,148 UART: [idev] SUBJECT.KEYID = 7
1,173,573 UART: [idev] UDS.KEYID = 0
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,668 UART: [ldev] --
1,280,040 UART: [fwproc] Wait for Commands...
1,280,693 UART: [fwproc] Recv command 0x46574c44
1,281,426 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,185 >>> mbox cmd response: success
2,773,448 UART: [afmc] ++
2,773,616 UART: [afmc] CDI.KEYID = 6
2,773,979 UART: [afmc] SUBJECT.KEYID = 7
2,774,405 UART: [afmc] AUTHORITY.KEYID = 5
2,809,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,204 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,262 UART:
2,852,278 UART: Running Caliptra ROM ...
2,852,686 UART:
2,852,741 UART: [state] CFI Enabled
2,855,507 UART: [state] LifecycleState = Unprovisioned
2,856,162 UART: [state] DebugLocked = No
2,856,660 UART: [state] WD Timer not started. Device not locked for debugging
2,857,789 UART: [kat] SHA2-256
3,661,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,468 UART: [kat] ++
3,665,620 UART: [kat] sha1
3,670,010 UART: [kat] SHA2-256
3,671,950 UART: [kat] SHA2-384
3,674,533 UART: [kat] SHA2-512-ACC
3,676,434 UART: [kat] ECC-384
3,685,967 UART: [kat] HMAC-384Kdf
3,690,429 UART: [kat] LMS
3,938,741 UART: [kat] --
3,939,655 UART: [warm-reset] ++
3,939,923 UART: [warm-reset] Prev Cold-Reset failed
3,940,906 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,717 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,198,812 UART: [idev] Sha1 KeyId Algorithm
1,207,846 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,661 UART: [ldev] --
1,281,083 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,846 >>> mbox cmd response: success
2,772,885 UART: [afmc] ++
2,773,053 UART: [afmc] CDI.KEYID = 6
2,773,416 UART: [afmc] SUBJECT.KEYID = 7
2,773,842 UART: [afmc] AUTHORITY.KEYID = 5
2,809,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,847 UART:
2,851,863 UART: Running Caliptra ROM ...
2,852,271 UART:
2,852,413 UART: [state] CFI Enabled
2,854,857 UART: [state] LifecycleState = Unprovisioned
2,855,512 UART: [state] DebugLocked = No
2,856,108 UART: [state] WD Timer not started. Device not locked for debugging
2,857,233 UART: [kat] SHA2-256
3,660,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,912 UART: [kat] ++
3,665,064 UART: [kat] sha1
3,669,298 UART: [kat] SHA2-256
3,671,238 UART: [kat] SHA2-384
3,673,939 UART: [kat] SHA2-512-ACC
3,675,840 UART: [kat] ECC-384
3,685,681 UART: [kat] HMAC-384Kdf
3,690,483 UART: [kat] LMS
3,938,795 UART: [kat] --
3,939,505 UART: [warm-reset] ++
3,939,773 UART: [warm-reset] Prev Cold-Reset failed
3,940,874 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,434 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,638 UART: [ldev] ++
1,208,806 UART: [ldev] CDI.KEYID = 6
1,209,170 UART: [ldev] SUBJECT.KEYID = 5
1,209,597 UART: [ldev] AUTHORITY.KEYID = 7
1,210,060 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,381 UART: [fwproc] Recv command 0x46574c44
1,282,114 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,991 >>> mbox cmd response: success
2,773,150 UART: [afmc] ++
2,773,318 UART: [afmc] CDI.KEYID = 6
2,773,681 UART: [afmc] SUBJECT.KEYID = 7
2,774,107 UART: [afmc] AUTHORITY.KEYID = 5
2,809,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,713 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,940 UART:
2,851,956 UART: Running Caliptra ROM ...
2,852,364 UART:
2,852,419 UART: [state] CFI Enabled
2,855,217 UART: [state] LifecycleState = Unprovisioned
2,855,872 UART: [state] DebugLocked = No
2,856,538 UART: [state] WD Timer not started. Device not locked for debugging
2,857,899 UART: [kat] SHA2-256
3,661,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,578 UART: [kat] ++
3,665,730 UART: [kat] sha1
3,670,112 UART: [kat] SHA2-256
3,672,052 UART: [kat] SHA2-384
3,674,757 UART: [kat] SHA2-512-ACC
3,676,658 UART: [kat] ECC-384
3,686,399 UART: [kat] HMAC-384Kdf
3,691,115 UART: [kat] LMS
3,939,427 UART: [kat] --
3,940,335 UART: [warm-reset] ++
3,940,603 UART: [warm-reset] Prev Cold-Reset failed
3,941,692 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,097 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,540 UART: [kat] SHA2-256
902,480 UART: [kat] SHA2-384
905,381 UART: [kat] SHA2-512-ACC
907,282 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,603 UART: [kat] LMS
1,169,915 UART: [kat] --
1,170,810 UART: [cold-reset] ++
1,171,318 UART: [fht] FHT @ 0x50003400
1,173,968 UART: [idev] ++
1,174,136 UART: [idev] CDI.KEYID = 6
1,174,497 UART: [idev] SUBJECT.KEYID = 7
1,174,922 UART: [idev] UDS.KEYID = 0
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,769 UART: [ldev] --
1,283,227 UART: [fwproc] Wait for Commands...
1,283,848 UART: [fwproc] Recv command 0x46574c44
1,284,581 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,824 >>> mbox cmd response: success
2,774,923 UART: [afmc] ++
2,775,091 UART: [afmc] CDI.KEYID = 6
2,775,454 UART: [afmc] SUBJECT.KEYID = 7
2,775,880 UART: [afmc] AUTHORITY.KEYID = 5
2,811,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,303 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,325 UART:
2,854,341 UART: Running Caliptra ROM ...
2,854,749 UART:
2,854,891 UART: [state] CFI Enabled
2,857,265 UART: [state] LifecycleState = Unprovisioned
2,857,920 UART: [state] DebugLocked = No
2,858,636 UART: [state] WD Timer not started. Device not locked for debugging
2,859,897 UART: [kat] SHA2-256
3,663,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,576 UART: [kat] ++
3,667,728 UART: [kat] sha1
3,671,894 UART: [kat] SHA2-256
3,673,834 UART: [kat] SHA2-384
3,676,435 UART: [kat] SHA2-512-ACC
3,678,336 UART: [kat] ECC-384
3,687,767 UART: [kat] HMAC-384Kdf
3,692,475 UART: [kat] LMS
3,940,787 UART: [kat] --
3,941,573 UART: [warm-reset] ++
3,941,841 UART: [warm-reset] Prev Cold-Reset failed
3,942,828 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,908 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,463 UART:
1,175,479 UART: Running Caliptra ROM ...
1,175,887 UART:
1,175,942 UART: [state] CFI Enabled
1,178,098 UART: [state] LifecycleState = Production
1,178,705 UART: [state] DebugLocked = No
1,179,437 UART: [state] WD Timer not started. Device not locked for debugging
1,180,762 UART: [kat] SHA2-256
1,984,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,441 UART: [kat] ++
1,988,593 UART: [kat] sha1
1,992,793 UART: [kat] SHA2-256
1,994,733 UART: [kat] SHA2-384
1,997,498 UART: [kat] SHA2-512-ACC
1,999,399 UART: [kat] ECC-384
2,008,778 UART: [kat] HMAC-384Kdf
2,013,374 UART: [kat] LMS
2,261,686 UART: [kat] --
2,262,678 UART: [warm-reset] ++
2,262,946 UART: [warm-reset] Prev Cold-Reset failed
2,263,989 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,978 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,827 UART: [kat] HMAC-384Kdf
921,543 UART: [kat] LMS
1,169,855 UART: [kat] --
1,171,196 UART: [cold-reset] ++
1,171,746 UART: [fht] FHT @ 0x50003400
1,174,406 UART: [idev] ++
1,174,574 UART: [idev] CDI.KEYID = 6
1,174,935 UART: [idev] SUBJECT.KEYID = 7
1,175,360 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,068 UART:
1,177,084 UART: Running Caliptra ROM ...
1,177,492 UART:
1,177,634 UART: [state] CFI Enabled
1,181,076 UART: [state] LifecycleState = Production
1,181,683 UART: [state] DebugLocked = No
1,182,185 UART: [state] WD Timer not started. Device not locked for debugging
1,183,322 UART: [kat] SHA2-256
1,986,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,991,001 UART: [kat] ++
1,991,153 UART: [kat] sha1
1,995,413 UART: [kat] SHA2-256
1,997,353 UART: [kat] SHA2-384
2,000,024 UART: [kat] SHA2-512-ACC
2,001,925 UART: [kat] ECC-384
2,011,648 UART: [kat] HMAC-384Kdf
2,016,162 UART: [kat] LMS
2,264,474 UART: [kat] --
2,265,234 UART: [warm-reset] ++
2,265,502 UART: [warm-reset] Prev Cold-Reset failed
2,266,627 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Production
85,601 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,617 UART: [idev] ++
1,172,785 UART: [idev] CDI.KEYID = 6
1,173,146 UART: [idev] SUBJECT.KEYID = 7
1,173,571 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,213 UART:
1,175,229 UART: Running Caliptra ROM ...
1,175,637 UART:
1,175,692 UART: [state] CFI Enabled
1,178,114 UART: [state] LifecycleState = Production
1,178,721 UART: [state] DebugLocked = No
1,179,249 UART: [state] WD Timer not started. Device not locked for debugging
1,180,436 UART: [kat] SHA2-256
1,983,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,115 UART: [kat] ++
1,988,267 UART: [kat] sha1
1,992,589 UART: [kat] SHA2-256
1,994,529 UART: [kat] SHA2-384
1,997,442 UART: [kat] SHA2-512-ACC
1,999,343 UART: [kat] ECC-384
2,009,096 UART: [kat] HMAC-384Kdf
2,013,622 UART: [kat] LMS
2,261,934 UART: [kat] --
2,262,512 UART: [warm-reset] ++
2,262,780 UART: [warm-reset] Prev Cold-Reset failed
2,263,593 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Production
86,226 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,156 UART:
1,176,172 UART: Running Caliptra ROM ...
1,176,580 UART:
1,176,722 UART: [state] CFI Enabled
1,179,342 UART: [state] LifecycleState = Production
1,179,949 UART: [state] DebugLocked = No
1,180,551 UART: [state] WD Timer not started. Device not locked for debugging
1,181,886 UART: [kat] SHA2-256
1,985,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,565 UART: [kat] ++
1,989,717 UART: [kat] sha1
1,994,087 UART: [kat] SHA2-256
1,996,027 UART: [kat] SHA2-384
1,998,684 UART: [kat] SHA2-512-ACC
2,000,585 UART: [kat] ECC-384
2,010,312 UART: [kat] HMAC-384Kdf
2,015,030 UART: [kat] LMS
2,263,342 UART: [kat] --
2,264,272 UART: [warm-reset] ++
2,264,540 UART: [warm-reset] Prev Cold-Reset failed
2,265,351 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Production
85,443 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,255 UART: [kat] SHA2-256
901,195 UART: [kat] SHA2-384
903,798 UART: [kat] SHA2-512-ACC
905,699 UART: [kat] ECC-384
915,240 UART: [kat] HMAC-384Kdf
919,760 UART: [kat] LMS
1,168,072 UART: [kat] --
1,168,929 UART: [cold-reset] ++
1,169,335 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,779 UART:
1,174,795 UART: Running Caliptra ROM ...
1,175,203 UART:
1,175,258 UART: [state] CFI Enabled
1,177,876 UART: [state] LifecycleState = Production
1,178,483 UART: [state] DebugLocked = No
1,179,107 UART: [state] WD Timer not started. Device not locked for debugging
1,180,364 UART: [kat] SHA2-256
1,983,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,043 UART: [kat] ++
1,988,195 UART: [kat] sha1
1,992,647 UART: [kat] SHA2-256
1,994,587 UART: [kat] SHA2-384
1,997,554 UART: [kat] SHA2-512-ACC
1,999,455 UART: [kat] ECC-384
2,009,316 UART: [kat] HMAC-384Kdf
2,013,870 UART: [kat] LMS
2,262,182 UART: [kat] --
2,263,090 UART: [warm-reset] ++
2,263,358 UART: [warm-reset] Prev Cold-Reset failed
2,264,221 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Production
85,874 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,628 UART:
1,175,644 UART: Running Caliptra ROM ...
1,176,052 UART:
1,176,194 UART: [state] CFI Enabled
1,178,896 UART: [state] LifecycleState = Production
1,179,503 UART: [state] DebugLocked = No
1,180,213 UART: [state] WD Timer not started. Device not locked for debugging
1,181,514 UART: [kat] SHA2-256
1,985,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,193 UART: [kat] ++
1,989,345 UART: [kat] sha1
1,993,627 UART: [kat] SHA2-256
1,995,567 UART: [kat] SHA2-384
1,998,110 UART: [kat] SHA2-512-ACC
2,000,011 UART: [kat] ECC-384
2,009,856 UART: [kat] HMAC-384Kdf
2,014,368 UART: [kat] LMS
2,262,680 UART: [kat] --
2,263,532 UART: [warm-reset] ++
2,263,800 UART: [warm-reset] Prev Cold-Reset failed
2,264,587 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,978 UART: [kat] SHA2-512-ACC
905,879 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,202 UART: [kat] LMS
1,168,514 UART: [kat] --
1,169,235 UART: [cold-reset] ++
1,169,579 UART: [fht] FHT @ 0x50003400
1,172,143 UART: [idev] ++
1,172,311 UART: [idev] CDI.KEYID = 6
1,172,672 UART: [idev] SUBJECT.KEYID = 7
1,173,097 UART: [idev] UDS.KEYID = 0
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,197,751 UART: [idev] Sha1 KeyId Algorithm
1,206,599 UART: [idev] --
1,207,612 UART: [ldev] ++
1,207,780 UART: [ldev] CDI.KEYID = 6
1,208,144 UART: [ldev] SUBJECT.KEYID = 5
1,208,571 UART: [ldev] AUTHORITY.KEYID = 7
1,209,034 UART: [ldev] FE.KEYID = 1
1,214,214 UART: [ldev] Erasing FE.KEYID = 1
1,240,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,486 UART: [ldev] --
1,279,822 UART: [fwproc] Wait for Commands...
1,280,407 UART: [fwproc] Recv command 0x46574c44
1,281,140 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,291,895 UART:
1,291,911 UART: Running Caliptra ROM ...
1,292,319 UART:
1,292,374 UART: [state] CFI Enabled
1,294,806 UART: [state] LifecycleState = Unprovisioned
1,295,461 UART: [state] DebugLocked = No
1,296,055 UART: [state] WD Timer not started. Device not locked for debugging
1,297,266 UART: [kat] SHA2-256
2,100,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,104,945 UART: [kat] ++
2,105,097 UART: [kat] sha1
2,109,321 UART: [kat] SHA2-256
2,111,261 UART: [kat] SHA2-384
2,114,086 UART: [kat] SHA2-512-ACC
2,115,987 UART: [kat] ECC-384
2,125,826 UART: [kat] HMAC-384Kdf
2,130,202 UART: [kat] LMS
2,378,514 UART: [kat] --
2,379,142 UART: [warm-reset] ++
2,379,410 UART: [warm-reset] Prev Cold-Reset failed
2,380,325 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,984 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,602 UART: [idev] Erasing UDS.KEYID = 0
1,198,564 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,595 UART: [ldev] ++
1,208,763 UART: [ldev] CDI.KEYID = 6
1,209,127 UART: [ldev] SUBJECT.KEYID = 5
1,209,554 UART: [ldev] AUTHORITY.KEYID = 7
1,210,017 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,267 UART: [ldev] --
1,280,717 UART: [fwproc] Wait for Commands...
1,281,430 UART: [fwproc] Recv command 0x46574c44
1,282,163 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,292,976 UART:
1,292,992 UART: Running Caliptra ROM ...
1,293,400 UART:
1,293,542 UART: [state] CFI Enabled
1,296,236 UART: [state] LifecycleState = Unprovisioned
1,296,891 UART: [state] DebugLocked = No
1,297,605 UART: [state] WD Timer not started. Device not locked for debugging
1,298,784 UART: [kat] SHA2-256
2,102,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,463 UART: [kat] ++
2,106,615 UART: [kat] sha1
2,110,835 UART: [kat] SHA2-256
2,112,775 UART: [kat] SHA2-384
2,115,558 UART: [kat] SHA2-512-ACC
2,117,459 UART: [kat] ECC-384
2,127,180 UART: [kat] HMAC-384Kdf
2,131,724 UART: [kat] LMS
2,380,036 UART: [kat] --
2,380,682 UART: [warm-reset] ++
2,380,950 UART: [warm-reset] Prev Cold-Reset failed
2,381,979 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,557 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,042 UART: [ldev] --
1,279,392 UART: [fwproc] Wait for Commands...
1,280,091 UART: [fwproc] Recv command 0x46574c44
1,280,824 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,291,643 UART:
1,291,659 UART: Running Caliptra ROM ...
1,292,067 UART:
1,292,122 UART: [state] CFI Enabled
1,294,604 UART: [state] LifecycleState = Unprovisioned
1,295,259 UART: [state] DebugLocked = No
1,295,755 UART: [state] WD Timer not started. Device not locked for debugging
1,297,012 UART: [kat] SHA2-256
2,100,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,104,691 UART: [kat] ++
2,104,843 UART: [kat] sha1
2,109,133 UART: [kat] SHA2-256
2,111,073 UART: [kat] SHA2-384
2,113,846 UART: [kat] SHA2-512-ACC
2,115,747 UART: [kat] ECC-384
2,125,406 UART: [kat] HMAC-384Kdf
2,130,218 UART: [kat] LMS
2,378,530 UART: [kat] --
2,379,454 UART: [warm-reset] ++
2,379,722 UART: [warm-reset] Prev Cold-Reset failed
2,380,719 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
915,853 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,181,668 UART: [idev] Erasing UDS.KEYID = 0
1,198,638 UART: [idev] Sha1 KeyId Algorithm
1,207,290 UART: [idev] --
1,208,237 UART: [ldev] ++
1,208,405 UART: [ldev] CDI.KEYID = 6
1,208,769 UART: [ldev] SUBJECT.KEYID = 5
1,209,196 UART: [ldev] AUTHORITY.KEYID = 7
1,209,659 UART: [ldev] FE.KEYID = 1
1,215,055 UART: [ldev] Erasing FE.KEYID = 1
1,241,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,603 UART: [ldev] --
1,280,885 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46574c44
1,282,341 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,293,172 UART:
1,293,188 UART: Running Caliptra ROM ...
1,293,596 UART:
1,293,738 UART: [state] CFI Enabled
1,296,320 UART: [state] LifecycleState = Unprovisioned
1,296,975 UART: [state] DebugLocked = No
1,297,519 UART: [state] WD Timer not started. Device not locked for debugging
1,298,862 UART: [kat] SHA2-256
2,102,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,541 UART: [kat] ++
2,106,693 UART: [kat] sha1
2,110,893 UART: [kat] SHA2-256
2,112,833 UART: [kat] SHA2-384
2,115,602 UART: [kat] SHA2-512-ACC
2,117,503 UART: [kat] ECC-384
2,127,070 UART: [kat] HMAC-384Kdf
2,131,762 UART: [kat] LMS
2,380,074 UART: [kat] --
2,380,940 UART: [warm-reset] ++
2,381,208 UART: [warm-reset] Prev Cold-Reset failed
2,382,057 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,980 UART: [kat] SHA2-512-ACC
905,881 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,481 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,661 UART: [idev] ++
1,172,829 UART: [idev] CDI.KEYID = 6
1,173,190 UART: [idev] SUBJECT.KEYID = 7
1,173,615 UART: [idev] UDS.KEYID = 0
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,793 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,592 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,663 UART: [fwproc] Recv command 0x46574c44
1,282,396 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,293,323 UART:
1,293,339 UART: Running Caliptra ROM ...
1,293,747 UART:
1,293,802 UART: [state] CFI Enabled
1,296,302 UART: [state] LifecycleState = Unprovisioned
1,296,957 UART: [state] DebugLocked = No
1,297,479 UART: [state] WD Timer not started. Device not locked for debugging
1,298,758 UART: [kat] SHA2-256
2,102,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,437 UART: [kat] ++
2,106,589 UART: [kat] sha1
2,110,753 UART: [kat] SHA2-256
2,112,693 UART: [kat] SHA2-384
2,115,282 UART: [kat] SHA2-512-ACC
2,117,183 UART: [kat] ECC-384
2,127,044 UART: [kat] HMAC-384Kdf
2,131,604 UART: [kat] LMS
2,379,916 UART: [kat] --
2,380,802 UART: [warm-reset] ++
2,381,070 UART: [warm-reset] Prev Cold-Reset failed
2,382,105 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,882 UART: [idev] ++
1,173,050 UART: [idev] CDI.KEYID = 6
1,173,411 UART: [idev] SUBJECT.KEYID = 7
1,173,836 UART: [idev] UDS.KEYID = 0
1,181,412 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,778 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,933 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,293,578 UART:
1,293,594 UART: Running Caliptra ROM ...
1,294,002 UART:
1,294,144 UART: [state] CFI Enabled
1,296,722 UART: [state] LifecycleState = Unprovisioned
1,297,377 UART: [state] DebugLocked = No
1,298,055 UART: [state] WD Timer not started. Device not locked for debugging
1,299,262 UART: [kat] SHA2-256
2,102,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,941 UART: [kat] ++
2,107,093 UART: [kat] sha1
2,111,347 UART: [kat] SHA2-256
2,113,287 UART: [kat] SHA2-384
2,115,902 UART: [kat] SHA2-512-ACC
2,117,803 UART: [kat] ECC-384
2,127,622 UART: [kat] HMAC-384Kdf
2,132,204 UART: [kat] LMS
2,380,516 UART: [kat] --
2,381,394 UART: [warm-reset] ++
2,381,662 UART: [warm-reset] Prev Cold-Reset failed
2,382,629 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,854 UART: [kat] SHA2-512-ACC
906,755 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,319 UART: [idev] ++
1,173,487 UART: [idev] CDI.KEYID = 6
1,173,848 UART: [idev] SUBJECT.KEYID = 7
1,174,273 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,971 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,385 UART: [fwproc] Recv command 0x46574c44
1,282,118 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,911 >>> mbox cmd response: success
2,773,974 UART: [afmc] ++
2,774,142 UART: [afmc] CDI.KEYID = 6
2,774,505 UART: [afmc] SUBJECT.KEYID = 7
2,774,931 UART: [afmc] AUTHORITY.KEYID = 5
2,810,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,523 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,242 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,935 UART: [afmc] --
2,853,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,853,849 UART: [cold-reset] --
2,854,583 UART: [state] Locking Datavault
2,855,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,364 UART: [state] Locking ICCM
2,857,010 UART: [exit] Launching FMC @ 0x40000130
2,862,339 UART:
2,862,355 UART: Running Caliptra FMC ...
2,862,763 UART:
2,862,817 UART: [state] CFI Enabled
2,873,880 UART: [fht] FMC Alias Private Key: 7
2,982,929 UART: [art] Extend RT PCRs Done
2,983,357 UART: [art] Lock RT PCRs Done
2,984,907 UART: [art] Populate DV Done
2,993,200 UART: [fht] FMC Alias Private Key: 7
2,994,362 UART: [art] Derive CDI
2,994,642 UART: [art] Store in in slot 0x4
3,080,367 UART: [art] Derive Key Pair
3,080,727 UART: [art] Store priv key in slot 0x5
3,093,617 UART: [art] Derive Key Pair - Done
3,108,507 UART: [art] Signing Cert with AUTHO
3,108,987 UART: RITY.KEYID = 7
3,124,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,790 UART: [art] PUB.X = C224CEE9B53B510EFCF590994AB33C12D4082AFF4BA1519E3AE65F32FE4AE9FB23EC4931506703349F64B1F51C149AAB
3,131,565 UART: [art] PUB.Y = 78683EC97525221AB4898C8257CA23771C6B8A56CCE941F2582A13CE00EE9A39C0359C6B5052397B92F6CA7CACD8CE11
3,138,497 UART: [art] SIG.R = 24D70CCA5519DACD4564F02F55410E503EA392B3AC2A79981B24F503823513844999F59406EB42D7DCC3597D3AC6B691
3,145,253 UART: [art] SIG.S = B1068F92906AFD2D1B5676B1FAB9A3636E18546901908015D42D4B79D929B6219051D1972B40B4B83CFA1D6E5787386A
3,169,088 UART: Caliptra RT
3,169,341 UART: [state] CFI Enabled
3,277,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,820 UART:
3,279,836 UART: Running Caliptra ROM ...
3,280,244 UART:
3,280,299 UART: [state] CFI Enabled
3,282,929 UART: [state] LifecycleState = Unprovisioned
3,283,584 UART: [state] DebugLocked = No
3,284,306 UART: [state] WD Timer not started. Device not locked for debugging
3,285,592 UART: [kat] SHA2-256
4,089,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,271 UART: [kat] ++
4,093,423 UART: [kat] sha1
4,097,757 UART: [kat] SHA2-256
4,099,697 UART: [kat] SHA2-384
4,102,484 UART: [kat] SHA2-512-ACC
4,104,384 UART: [kat] ECC-384
4,114,269 UART: [kat] HMAC-384Kdf
4,118,909 UART: [kat] LMS
4,367,221 UART: [kat] --
4,368,153 UART: [update-reset] ++
5,679,808 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,767 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,591 >>> mbox cmd response: success
Initializing fuses
5,830,817 UART:
5,830,833 UART: Running Caliptra ROM ...
5,831,241 UART:
5,831,296 UART: [state] CFI Enabled
5,834,134 UART: [state] LifecycleState = Unprovisioned
5,834,789 UART: [state] DebugLocked = No
5,835,361 UART: [state] WD Timer not started. Device not locked for debugging
5,836,686 UART: [kat] SHA2-256
6,640,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,365 UART: [kat] ++
6,644,517 UART: [kat] sha1
6,648,759 UART: [kat] SHA2-256
6,650,699 UART: [kat] SHA2-384
6,653,632 UART: [kat] SHA2-512-ACC
6,655,533 UART: [kat] ECC-384
6,665,266 UART: [kat] HMAC-384Kdf
6,669,834 UART: [kat] LMS
6,918,146 UART: [kat] --
6,919,094 UART: [warm-reset] ++
6,919,817 UART: [warm-reset] Prev Update Reset failed
6,920,888 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,915 >>> mbox cmd response: success
2,676,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,682,869 UART:
2,682,885 UART: Running Caliptra FMC ...
2,683,293 UART:
2,683,347 UART: [state] CFI Enabled
2,693,648 UART: [fht] FMC Alias Private Key: 7
2,802,343 UART: [art] Extend RT PCRs Done
2,802,771 UART: [art] Lock RT PCRs Done
2,803,903 UART: [art] Populate DV Done
2,812,026 UART: [fht] FMC Alias Private Key: 7
2,813,084 UART: [art] Derive CDI
2,813,364 UART: [art] Store in in slot 0x4
2,898,673 UART: [art] Derive Key Pair
2,899,033 UART: [art] Store priv key in slot 0x5
2,912,103 UART: [art] Derive Key Pair - Done
2,926,905 UART: [art] Signing Cert with AUTHO
2,927,385 UART: RITY.KEYID = 7
2,942,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,510 UART: [art] PUB.X = 346AC8F1217AAD8547631FBD16E1D6B7AB22E6A8E5121B9E6FE697EC5CAB9819281FE6F6324D8A604F335AAC42F7C03A
2,950,294 UART: [art] PUB.Y = 5C6600F10F65F592343ABEDB978B77EC70E6D258415044CE5BAE55A31558DBDC987EE14A921B501E8DFCEE76CCEAECC1
2,957,239 UART: [art] SIG.R = 04801F0532E983DBEC087D64C03E5213E0C58ACC53D4ADA551EAA6E7A70F7D3538D538F1B682AF7F893B07D77525E835
2,964,000 UART: [art] SIG.S = 20038810A96AC187A9DF91331CABB56A0D55F6B07CEB44740639FADED304EBD24025FE1623FA43E45BDDE5A3B1B27822
2,988,127 UART: Caliptra RT
2,988,380 UART: [state] CFI Enabled
3,095,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,530,947 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,392 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,182,736 UART: [idev] Erasing UDS.KEYID = 0
1,199,526 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,328 >>> mbox cmd response: success
2,774,509 UART: [afmc] ++
2,774,677 UART: [afmc] CDI.KEYID = 6
2,775,040 UART: [afmc] SUBJECT.KEYID = 7
2,775,466 UART: [afmc] AUTHORITY.KEYID = 5
2,811,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,630 UART: [afmc] --
2,854,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,854,722 UART: [cold-reset] --
2,855,778 UART: [state] Locking Datavault
2,856,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,435 UART: [state] Locking ICCM
2,858,097 UART: [exit] Launching FMC @ 0x40000130
2,863,426 UART:
2,863,442 UART: Running Caliptra FMC ...
2,863,850 UART:
2,863,993 UART: [state] CFI Enabled
2,875,024 UART: [fht] FMC Alias Private Key: 7
2,982,725 UART: [art] Extend RT PCRs Done
2,983,153 UART: [art] Lock RT PCRs Done
2,984,647 UART: [art] Populate DV Done
2,992,866 UART: [fht] FMC Alias Private Key: 7
2,993,964 UART: [art] Derive CDI
2,994,244 UART: [art] Store in in slot 0x4
3,079,731 UART: [art] Derive Key Pair
3,080,091 UART: [art] Store priv key in slot 0x5
3,092,859 UART: [art] Derive Key Pair - Done
3,107,675 UART: [art] Signing Cert with AUTHO
3,108,155 UART: RITY.KEYID = 7
3,123,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,480 UART: [art] PUB.X = 19BEFD4F494D1DDA5BC1A6DDF655D3CACD0E3837928DEEAE1D30B0F0DBA6A5A3266E6B1B887D80F24E2F5A5A042BB11D
3,131,274 UART: [art] PUB.Y = C8A90B109AA81EBEDCBBE99BAA481F78541AA3A0204F7D9315BFC71CC7AE89199431FC494594D23320F55B19085920F9
3,138,226 UART: [art] SIG.R = 09E35018C80AB4C47C35262CA2A2FF28A7127AC774E287465748A2A0C8E02D89384565EF00066B9D58371F06A8C0B34F
3,144,958 UART: [art] SIG.S = 48386F7CE3C46CF353F61A3FD119EAE154B08C1C4AC95FCCF03C0C5367EEAED3176E4B99EBA8C9018E9BD2D5DCB1991B
3,168,851 UART: Caliptra RT
3,169,196 UART: [state] CFI Enabled
3,277,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,299 UART:
3,279,315 UART: Running Caliptra ROM ...
3,279,723 UART:
3,279,865 UART: [state] CFI Enabled
3,282,559 UART: [state] LifecycleState = Unprovisioned
3,283,214 UART: [state] DebugLocked = No
3,283,810 UART: [state] WD Timer not started. Device not locked for debugging
3,285,030 UART: [kat] SHA2-256
4,088,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,709 UART: [kat] ++
4,092,861 UART: [kat] sha1
4,097,143 UART: [kat] SHA2-256
4,099,083 UART: [kat] SHA2-384
4,101,792 UART: [kat] SHA2-512-ACC
4,103,692 UART: [kat] ECC-384
4,113,525 UART: [kat] HMAC-384Kdf
4,117,987 UART: [kat] LMS
4,366,299 UART: [kat] --
4,367,115 UART: [update-reset] ++
5,679,006 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,007 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,829,831 >>> mbox cmd response: success
Initializing fuses
5,830,073 UART:
5,830,089 UART: Running Caliptra ROM ...
5,830,497 UART:
5,830,639 UART: [state] CFI Enabled
5,833,371 UART: [state] LifecycleState = Unprovisioned
5,834,026 UART: [state] DebugLocked = No
5,834,756 UART: [state] WD Timer not started. Device not locked for debugging
5,835,911 UART: [kat] SHA2-256
6,639,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,590 UART: [kat] ++
6,643,742 UART: [kat] sha1
6,647,906 UART: [kat] SHA2-256
6,649,846 UART: [kat] SHA2-384
6,652,699 UART: [kat] SHA2-512-ACC
6,654,600 UART: [kat] ECC-384
6,664,233 UART: [kat] HMAC-384Kdf
6,668,899 UART: [kat] LMS
6,917,211 UART: [kat] --
6,918,249 UART: [warm-reset] ++
6,918,736 UART: [warm-reset] Prev Update Reset failed
6,919,875 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,030 >>> mbox cmd response: success
2,676,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,084 UART:
2,683,100 UART: Running Caliptra FMC ...
2,683,508 UART:
2,683,651 UART: [state] CFI Enabled
2,694,480 UART: [fht] FMC Alias Private Key: 7
2,802,437 UART: [art] Extend RT PCRs Done
2,802,865 UART: [art] Lock RT PCRs Done
2,804,389 UART: [art] Populate DV Done
2,812,828 UART: [fht] FMC Alias Private Key: 7
2,813,972 UART: [art] Derive CDI
2,814,252 UART: [art] Store in in slot 0x4
2,899,803 UART: [art] Derive Key Pair
2,900,163 UART: [art] Store priv key in slot 0x5
2,913,699 UART: [art] Derive Key Pair - Done
2,928,660 UART: [art] Signing Cert with AUTHO
2,929,140 UART: RITY.KEYID = 7
2,944,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,773 UART: [art] PUB.X = 49F1C3F4BADCA44739530D5E9CDD15F5717D6E35B307C6D94D3B8DE172A71FF489DAE1CBB39B7D16373E48BDC0DC8878
2,951,555 UART: [art] PUB.Y = 474807ED07E1BBB59E31F804C5275D704054F5F90F63839A36A56B569DEC19170E2CA397EE0C438DAFBC6F57424190BE
2,958,491 UART: [art] SIG.R = 03038192AE7DDCF57DD1816A3A604885E558E699D40FA6462A918E4BEBE2BD1B14748F7BF57C2E37285B0CEAED7847E0
2,965,259 UART: [art] SIG.S = 1E775543E287E1F737C2AC35207DD49520FBD1D0C901CB0512595DADED078F1368B9A1DF15874DCC3F8C83E65941B8E9
2,988,967 UART: Caliptra RT
2,989,312 UART: [state] CFI Enabled
3,097,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,531,544 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,230 UART: [kat] HMAC-384Kdf
919,722 UART: [kat] LMS
1,168,034 UART: [kat] --
1,168,871 UART: [cold-reset] ++
1,169,355 UART: [fht] FHT @ 0x50003400
1,171,951 UART: [idev] ++
1,172,119 UART: [idev] CDI.KEYID = 6
1,172,480 UART: [idev] SUBJECT.KEYID = 7
1,172,905 UART: [idev] UDS.KEYID = 0
1,180,855 UART: [idev] Erasing UDS.KEYID = 0
1,197,499 UART: [idev] Sha1 KeyId Algorithm
1,206,331 UART: [idev] --
1,207,260 UART: [ldev] ++
1,207,428 UART: [ldev] CDI.KEYID = 6
1,207,792 UART: [ldev] SUBJECT.KEYID = 5
1,208,219 UART: [ldev] AUTHORITY.KEYID = 7
1,208,682 UART: [ldev] FE.KEYID = 1
1,213,832 UART: [ldev] Erasing FE.KEYID = 1
1,240,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,970 UART: [ldev] --
1,279,270 UART: [fwproc] Wait for Commands...
1,279,879 UART: [fwproc] Recv command 0x46574c44
1,280,612 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,411 >>> mbox cmd response: success
2,771,616 UART: [afmc] ++
2,771,784 UART: [afmc] CDI.KEYID = 6
2,772,147 UART: [afmc] SUBJECT.KEYID = 7
2,772,573 UART: [afmc] AUTHORITY.KEYID = 5
2,808,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,735 UART: [afmc] --
2,851,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,851,653 UART: [cold-reset] --
2,852,701 UART: [state] Locking Datavault
2,853,912 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,516 UART: [state] Locking ICCM
2,855,114 UART: [exit] Launching FMC @ 0x40000130
2,860,443 UART:
2,860,459 UART: Running Caliptra FMC ...
2,860,867 UART:
2,860,921 UART: [state] CFI Enabled
2,871,590 UART: [fht] FMC Alias Private Key: 7
2,979,663 UART: [art] Extend RT PCRs Done
2,980,091 UART: [art] Lock RT PCRs Done
2,981,823 UART: [art] Populate DV Done
2,989,800 UART: [fht] FMC Alias Private Key: 7
2,990,856 UART: [art] Derive CDI
2,991,136 UART: [art] Store in in slot 0x4
3,077,137 UART: [art] Derive Key Pair
3,077,497 UART: [art] Store priv key in slot 0x5
3,090,675 UART: [art] Derive Key Pair - Done
3,105,483 UART: [art] Signing Cert with AUTHO
3,105,963 UART: RITY.KEYID = 7
3,121,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,142 UART: [art] PUB.X = 3A6DF578C18F3A34C8B2C3B3A1AD377FCC84E0501E73D508D3C3973D9E206042F8F2D185423718036293031466CC9DFD
3,128,903 UART: [art] PUB.Y = FE35A6BF4BECA0FDB8A2404F7B0AD5E76F4FC71068F6731C06E7D16D04F1A52D23A70B0BD699EABFA9D17528EA4A4C94
3,135,862 UART: [art] SIG.R = 8BB476D03C59117D861209CEFA797D5A438874B6FA073552F858069CA0D288179A33CCF1ED3A3B18629383696DD4E439
3,142,619 UART: [art] SIG.S = 2F2741C4DA1FB97305E8D0AADD00DA19D7277406DE3585DE1F1F34E6CBC71B21F8FB0DCF62D733BDB6F601B6CF90F9C2
3,166,352 UART: Caliptra RT
3,166,605 UART: [state] CFI Enabled
3,274,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,686 UART:
3,276,702 UART: Running Caliptra ROM ...
3,277,110 UART:
3,277,165 UART: [state] CFI Enabled
3,279,937 UART: [state] LifecycleState = Unprovisioned
3,280,592 UART: [state] DebugLocked = No
3,281,140 UART: [state] WD Timer not started. Device not locked for debugging
3,282,282 UART: [kat] SHA2-256
4,085,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,961 UART: [kat] ++
4,090,113 UART: [kat] sha1
4,094,323 UART: [kat] SHA2-256
4,096,263 UART: [kat] SHA2-384
4,099,036 UART: [kat] SHA2-512-ACC
4,100,936 UART: [kat] ECC-384
4,110,699 UART: [kat] HMAC-384Kdf
4,115,373 UART: [kat] LMS
4,363,685 UART: [kat] --
4,364,309 UART: [update-reset] ++
5,676,450 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,677,535 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,827,359 >>> mbox cmd response: success
Initializing fuses
5,827,587 UART:
5,827,603 UART: Running Caliptra ROM ...
5,828,011 UART:
5,828,066 UART: [state] CFI Enabled
5,830,864 UART: [state] LifecycleState = Unprovisioned
5,831,519 UART: [state] DebugLocked = No
5,832,067 UART: [state] WD Timer not started. Device not locked for debugging
5,833,248 UART: [kat] SHA2-256
6,636,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,640,927 UART: [kat] ++
6,641,079 UART: [kat] sha1
6,645,227 UART: [kat] SHA2-256
6,647,167 UART: [kat] SHA2-384
6,649,934 UART: [kat] SHA2-512-ACC
6,651,835 UART: [kat] ECC-384
6,661,226 UART: [kat] HMAC-384Kdf
6,665,746 UART: [kat] LMS
6,914,058 UART: [kat] --
6,915,076 UART: [warm-reset] ++
6,915,671 UART: [warm-reset] Prev Update Reset failed
6,916,510 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,935 >>> mbox cmd response: success
2,675,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,681,955 UART:
2,681,971 UART: Running Caliptra FMC ...
2,682,379 UART:
2,682,433 UART: [state] CFI Enabled
2,692,830 UART: [fht] FMC Alias Private Key: 7
2,800,905 UART: [art] Extend RT PCRs Done
2,801,333 UART: [art] Lock RT PCRs Done
2,803,079 UART: [art] Populate DV Done
2,811,184 UART: [fht] FMC Alias Private Key: 7
2,812,146 UART: [art] Derive CDI
2,812,426 UART: [art] Store in in slot 0x4
2,897,735 UART: [art] Derive Key Pair
2,898,095 UART: [art] Store priv key in slot 0x5
2,911,231 UART: [art] Derive Key Pair - Done
2,926,144 UART: [art] Signing Cert with AUTHO
2,926,624 UART: RITY.KEYID = 7
2,941,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,121 UART: [art] PUB.X = CEAD39D0037EBCC11DBBDE42F8EC82D1B61D296E3E5C5B6252683CE90D067D39BF9882E50A675F3A29C01F84F67C82B2
2,948,895 UART: [art] PUB.Y = 35D5785D5A534E28839B0938BCD5C28EB9FC86B6EA3A9606346C4591A7083BAD899742543E26B7A38D20F9815898A8BC
2,955,834 UART: [art] SIG.R = 1CEA6B079CC1640CD37140F54133DC61C8505D20C6034946DCFD748BC13F757F9AF4C73A02412A2192FA8F640AF1D600
2,962,571 UART: [art] SIG.S = 517C6183E2E3473C5019435110D89EC58C691C1F1732BEB21EEDA3432FF384058462021571F4FFF30A20B6F50BC091E5
2,985,818 UART: Caliptra RT
2,986,071 UART: [state] CFI Enabled
3,094,310 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,528,072 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,090 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,520 >>> mbox cmd response: success
2,774,581 UART: [afmc] ++
2,774,749 UART: [afmc] CDI.KEYID = 6
2,775,112 UART: [afmc] SUBJECT.KEYID = 7
2,775,538 UART: [afmc] AUTHORITY.KEYID = 5
2,810,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,018 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,737 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,638 UART: [afmc] --
2,854,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,854,550 UART: [cold-reset] --
2,855,588 UART: [state] Locking Datavault
2,856,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,375 UART: [state] Locking ICCM
2,857,949 UART: [exit] Launching FMC @ 0x40000130
2,863,278 UART:
2,863,294 UART: Running Caliptra FMC ...
2,863,702 UART:
2,863,845 UART: [state] CFI Enabled
2,874,668 UART: [fht] FMC Alias Private Key: 7
2,982,479 UART: [art] Extend RT PCRs Done
2,982,907 UART: [art] Lock RT PCRs Done
2,984,149 UART: [art] Populate DV Done
2,992,308 UART: [fht] FMC Alias Private Key: 7
2,993,482 UART: [art] Derive CDI
2,993,762 UART: [art] Store in in slot 0x4
3,079,797 UART: [art] Derive Key Pair
3,080,157 UART: [art] Store priv key in slot 0x5
3,093,445 UART: [art] Derive Key Pair - Done
3,107,885 UART: [art] Signing Cert with AUTHO
3,108,365 UART: RITY.KEYID = 7
3,124,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,776 UART: [art] PUB.X = 14222E73FE4DE912F2D28014E3D230D808DAF6B68FA5086FE77394BE7AA0309C391C1850471D8879B92B53FDAC4C2C26
3,131,544 UART: [art] PUB.Y = 3FC1EBC3B862AB7F485B93D1E3B7863D45479912C38DC8C621CAB8DD69CDC440EF0DA5B3BF994B7A0C8ECC8AF9C7B59E
3,138,514 UART: [art] SIG.R = C2E07957A78A94C52FF7C1727CCBA66B43AF3FF965892B0555B8355CF555C6DDECF0C56C6353C7B9E6CA1C5021C1914D
3,145,293 UART: [art] SIG.S = 617F9A298C1CFD415C00FE06FCB9D7308298A2F50B3CEEEF5625C8B0D188210CC3D4970E477C412E34FB6DFD0F6683C7
3,169,507 UART: Caliptra RT
3,169,852 UART: [state] CFI Enabled
3,276,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,675 UART:
3,278,691 UART: Running Caliptra ROM ...
3,279,099 UART:
3,279,241 UART: [state] CFI Enabled
3,281,621 UART: [state] LifecycleState = Unprovisioned
3,282,276 UART: [state] DebugLocked = No
3,282,776 UART: [state] WD Timer not started. Device not locked for debugging
3,284,128 UART: [kat] SHA2-256
4,087,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,807 UART: [kat] ++
4,091,959 UART: [kat] sha1
4,096,329 UART: [kat] SHA2-256
4,098,269 UART: [kat] SHA2-384
4,101,182 UART: [kat] SHA2-512-ACC
4,103,082 UART: [kat] ECC-384
4,112,549 UART: [kat] HMAC-384Kdf
4,117,079 UART: [kat] LMS
4,365,391 UART: [kat] --
4,366,077 UART: [update-reset] ++
5,677,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,678,929 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,828,753 >>> mbox cmd response: success
Initializing fuses
5,828,927 UART:
5,828,943 UART: Running Caliptra ROM ...
5,829,351 UART:
5,829,493 UART: [state] CFI Enabled
5,831,915 UART: [state] LifecycleState = Unprovisioned
5,832,570 UART: [state] DebugLocked = No
5,833,290 UART: [state] WD Timer not started. Device not locked for debugging
5,834,593 UART: [kat] SHA2-256
6,638,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,642,272 UART: [kat] ++
6,642,424 UART: [kat] sha1
6,646,668 UART: [kat] SHA2-256
6,648,608 UART: [kat] SHA2-384
6,651,139 UART: [kat] SHA2-512-ACC
6,653,040 UART: [kat] ECC-384
6,662,799 UART: [kat] HMAC-384Kdf
6,667,475 UART: [kat] LMS
6,915,787 UART: [kat] --
6,916,617 UART: [warm-reset] ++
6,917,318 UART: [warm-reset] Prev Update Reset failed
6,918,409 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,756 >>> mbox cmd response: success
2,677,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,504 UART:
2,683,520 UART: Running Caliptra FMC ...
2,683,928 UART:
2,684,071 UART: [state] CFI Enabled
2,694,638 UART: [fht] FMC Alias Private Key: 7
2,802,767 UART: [art] Extend RT PCRs Done
2,803,195 UART: [art] Lock RT PCRs Done
2,804,667 UART: [art] Populate DV Done
2,812,840 UART: [fht] FMC Alias Private Key: 7
2,813,804 UART: [art] Derive CDI
2,814,084 UART: [art] Store in in slot 0x4
2,899,773 UART: [art] Derive Key Pair
2,900,133 UART: [art] Store priv key in slot 0x5
2,913,105 UART: [art] Derive Key Pair - Done
2,927,596 UART: [art] Signing Cert with AUTHO
2,928,076 UART: RITY.KEYID = 7
2,943,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,221 UART: [art] PUB.X = F5985D507B694732F9EA4CE4A41C5CA62BCB76B78DD357A99D55C606386E1EEE13676E55E5E9ED891DB626EC10355827
2,950,994 UART: [art] PUB.Y = 718D77D9E48B4F27C56C18192896E732DD013D44C7763EBAF777291B836F5AA8C40456529A12D33A8272ED4074034F37
2,957,927 UART: [art] SIG.R = 6D90898191294649B771C620B3A30AEDBADFCE12D500BFC403A5D7D6A166449776F8161787833EE04E777A3DFFAC9C17
2,964,673 UART: [art] SIG.S = 0108F49FC3DDD679704BE7F69248D4BD42614C49402FA249509A71FCD37F0E3D03F4E44F2531747694CAE6D18FFCF6F5
2,988,604 UART: Caliptra RT
2,988,949 UART: [state] CFI Enabled
3,097,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,655 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,199,751 UART: [idev] Sha1 KeyId Algorithm
1,208,485 UART: [idev] --
1,209,662 UART: [ldev] ++
1,209,830 UART: [ldev] CDI.KEYID = 6
1,210,194 UART: [ldev] SUBJECT.KEYID = 5
1,210,621 UART: [ldev] AUTHORITY.KEYID = 7
1,211,084 UART: [ldev] FE.KEYID = 1
1,216,400 UART: [ldev] Erasing FE.KEYID = 1
1,242,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,960 UART: [ldev] --
1,282,226 UART: [fwproc] Wait for Commands...
1,282,949 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,823 >>> mbox cmd response: success
2,774,866 UART: [afmc] ++
2,775,034 UART: [afmc] CDI.KEYID = 6
2,775,397 UART: [afmc] SUBJECT.KEYID = 7
2,775,823 UART: [afmc] AUTHORITY.KEYID = 5
2,810,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,829 UART: [afmc] --
2,853,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,853,959 UART: [cold-reset] --
2,854,851 UART: [state] Locking Datavault
2,856,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,616 UART: [state] Locking ICCM
2,857,284 UART: [exit] Launching FMC @ 0x40000130
2,862,613 UART:
2,862,629 UART: Running Caliptra FMC ...
2,863,037 UART:
2,863,091 UART: [state] CFI Enabled
2,873,916 UART: [fht] FMC Alias Private Key: 7
2,981,777 UART: [art] Extend RT PCRs Done
2,982,205 UART: [art] Lock RT PCRs Done
2,983,713 UART: [art] Populate DV Done
2,992,072 UART: [fht] FMC Alias Private Key: 7
2,993,122 UART: [art] Derive CDI
2,993,402 UART: [art] Store in in slot 0x4
3,079,167 UART: [art] Derive Key Pair
3,079,527 UART: [art] Store priv key in slot 0x5
3,092,589 UART: [art] Derive Key Pair - Done
3,107,320 UART: [art] Signing Cert with AUTHO
3,107,800 UART: RITY.KEYID = 7
3,123,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,779 UART: [art] PUB.X = D2A98790432A96AFE6821E48DCE9CD258FD1381343E91C205BA839929FBF32B292353E33866D980EE310EC603106DCF2
3,130,543 UART: [art] PUB.Y = 3164E7AF6FD56F2554A8D62AF637287674F6D72EE034BDE726B64987AE7FFDF4C6D21F738A0AEB03B9DB8EFDCA5E3F28
3,137,507 UART: [art] SIG.R = 458117DD5E1F13C1A10FD97CC05A4FA50798D0296772670A34794F8175EE05F59A4F3623495928DA81C3DD547B66E70C
3,144,258 UART: [art] SIG.S = 98362033497E66C3174F1CEE7865D6801C1E57C1815666F457A2510FD009D0D4B125D3ACFAB2DAAF494CE8B40A9A116D
3,168,728 UART: Caliptra RT
3,168,981 UART: [state] CFI Enabled
3,276,376 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,392 UART:
3,278,408 UART: Running Caliptra ROM ...
3,278,816 UART:
3,278,871 UART: [state] CFI Enabled
3,281,747 UART: [state] LifecycleState = Unprovisioned
3,282,402 UART: [state] DebugLocked = No
3,283,090 UART: [state] WD Timer not started. Device not locked for debugging
3,284,290 UART: [kat] SHA2-256
4,087,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,969 UART: [kat] ++
4,092,121 UART: [kat] sha1
4,096,493 UART: [kat] SHA2-256
4,098,433 UART: [kat] SHA2-384
4,101,314 UART: [kat] SHA2-512-ACC
4,103,214 UART: [kat] ECC-384
4,112,797 UART: [kat] HMAC-384Kdf
4,117,523 UART: [kat] LMS
4,365,835 UART: [kat] --
4,366,787 UART: [update-reset] ++
5,679,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,983 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,807 >>> mbox cmd response: success
Initializing fuses
5,831,049 UART:
5,831,065 UART: Running Caliptra ROM ...
5,831,473 UART:
5,831,528 UART: [state] CFI Enabled
5,834,324 UART: [state] LifecycleState = Unprovisioned
5,834,979 UART: [state] DebugLocked = No
5,835,611 UART: [state] WD Timer not started. Device not locked for debugging
5,836,898 UART: [kat] SHA2-256
6,640,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,577 UART: [kat] ++
6,644,729 UART: [kat] sha1
6,649,017 UART: [kat] SHA2-256
6,650,957 UART: [kat] SHA2-384
6,653,638 UART: [kat] SHA2-512-ACC
6,655,539 UART: [kat] ECC-384
6,664,824 UART: [kat] HMAC-384Kdf
6,669,578 UART: [kat] LMS
6,917,890 UART: [kat] --
6,918,804 UART: [warm-reset] ++
6,919,435 UART: [warm-reset] Prev Update Reset failed
6,920,418 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,433 >>> mbox cmd response: success
2,677,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,409 UART:
2,683,425 UART: Running Caliptra FMC ...
2,683,833 UART:
2,683,887 UART: [state] CFI Enabled
2,694,488 UART: [fht] FMC Alias Private Key: 7
2,803,063 UART: [art] Extend RT PCRs Done
2,803,491 UART: [art] Lock RT PCRs Done
2,805,007 UART: [art] Populate DV Done
2,813,092 UART: [fht] FMC Alias Private Key: 7
2,814,062 UART: [art] Derive CDI
2,814,342 UART: [art] Store in in slot 0x4
2,900,095 UART: [art] Derive Key Pair
2,900,455 UART: [art] Store priv key in slot 0x5
2,913,809 UART: [art] Derive Key Pair - Done
2,928,738 UART: [art] Signing Cert with AUTHO
2,929,218 UART: RITY.KEYID = 7
2,944,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,191 UART: [art] PUB.X = A3DE54DB3FD4A8EF2D96A04A43E5FF5711036902A692B2F3B83FEE411CF201317C950B653E187FC24AE46AC7C4DE2B36
2,951,963 UART: [art] PUB.Y = 2B3C92FD7540836CC9761FBBBD31B3624031DE28DD3AC0E20E4E1077E6A625AF6B0625C28981B6F041971262BD464AD1
2,958,911 UART: [art] SIG.R = 3198E8C79161D534F6382EA1866DF38B3CEC948A528EB1AFC62DB14388CFADF489A13C31895848AFDC1D490BBFC93DF8
2,965,692 UART: [art] SIG.S = 9A97408D03794EEEBE91EB16242BA86131ACC66F5BA2B35D02705C7BEF25A498FFD7A4D9E612D6E4953E5F33A9678167
2,989,647 UART: Caliptra RT
2,989,900 UART: [state] CFI Enabled
3,097,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,530,991 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,894 UART: [idev] ++
1,174,062 UART: [idev] CDI.KEYID = 6
1,174,423 UART: [idev] SUBJECT.KEYID = 7
1,174,848 UART: [idev] UDS.KEYID = 0
1,183,198 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,047 UART: [ldev] SUBJECT.KEYID = 5
1,211,474 UART: [ldev] AUTHORITY.KEYID = 7
1,211,937 UART: [ldev] FE.KEYID = 1
1,217,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,613 UART: [fwproc] Wait for Commands...
1,283,408 UART: [fwproc] Recv command 0x46574c44
1,284,141 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,564 >>> mbox cmd response: success
2,774,723 UART: [afmc] ++
2,774,891 UART: [afmc] CDI.KEYID = 6
2,775,254 UART: [afmc] SUBJECT.KEYID = 7
2,775,680 UART: [afmc] AUTHORITY.KEYID = 5
2,811,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,847 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,260 UART: [afmc] --
2,855,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,855,254 UART: [cold-reset] --
2,856,346 UART: [state] Locking Datavault
2,857,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,935 UART: [state] Locking ICCM
2,858,523 UART: [exit] Launching FMC @ 0x40000130
2,863,852 UART:
2,863,868 UART: Running Caliptra FMC ...
2,864,276 UART:
2,864,419 UART: [state] CFI Enabled
2,875,372 UART: [fht] FMC Alias Private Key: 7
2,983,797 UART: [art] Extend RT PCRs Done
2,984,225 UART: [art] Lock RT PCRs Done
2,985,525 UART: [art] Populate DV Done
2,993,892 UART: [fht] FMC Alias Private Key: 7
2,995,022 UART: [art] Derive CDI
2,995,302 UART: [art] Store in in slot 0x4
3,080,665 UART: [art] Derive Key Pair
3,081,025 UART: [art] Store priv key in slot 0x5
3,094,209 UART: [art] Derive Key Pair - Done
3,108,761 UART: [art] Signing Cert with AUTHO
3,109,241 UART: RITY.KEYID = 7
3,124,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,380 UART: [art] PUB.X = 52242648CA55BFBE452834E2090F0661CEF79324A00D60E61405446A3B14FB211D22CC5EB44A09294094733B7B3CAE39
3,132,128 UART: [art] PUB.Y = 128D16C15BD328A3EE1657BDD843F0DF760C6DDC7A66AA006304F2835AA667A3F83A0550875A96715E910314DE70DEF7
3,139,048 UART: [art] SIG.R = 5FB3CDD01BD8FC6328E2161EAF79972624A7D245E34D081EE0CBCCAC0ADFA9D8D2D0E050B0D4D5CE6FA2F17A8839D155
3,145,836 UART: [art] SIG.S = F1EEA92D3DF5573592741CF281CB0CB2BADB4485D67A1908FE91177D5F6042067138BA60FE36359DF01B765A9024BEFF
3,169,438 UART: Caliptra RT
3,169,783 UART: [state] CFI Enabled
3,277,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,944 UART:
3,279,960 UART: Running Caliptra ROM ...
3,280,368 UART:
3,280,510 UART: [state] CFI Enabled
3,283,308 UART: [state] LifecycleState = Unprovisioned
3,283,963 UART: [state] DebugLocked = No
3,284,637 UART: [state] WD Timer not started. Device not locked for debugging
3,285,939 UART: [kat] SHA2-256
4,089,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,618 UART: [kat] ++
4,093,770 UART: [kat] sha1
4,097,782 UART: [kat] SHA2-256
4,099,722 UART: [kat] SHA2-384
4,102,403 UART: [kat] SHA2-512-ACC
4,104,303 UART: [kat] ECC-384
4,113,476 UART: [kat] HMAC-384Kdf
4,118,268 UART: [kat] LMS
4,366,580 UART: [kat] --
4,367,794 UART: [update-reset] ++
5,680,063 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,681,106 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,930 >>> mbox cmd response: success
Initializing fuses
5,831,246 UART:
5,831,262 UART: Running Caliptra ROM ...
5,831,670 UART:
5,831,812 UART: [state] CFI Enabled
5,834,824 UART: [state] LifecycleState = Unprovisioned
5,835,479 UART: [state] DebugLocked = No
5,836,211 UART: [state] WD Timer not started. Device not locked for debugging
5,837,388 UART: [kat] SHA2-256
6,640,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,645,067 UART: [kat] ++
6,645,219 UART: [kat] sha1
6,649,563 UART: [kat] SHA2-256
6,651,503 UART: [kat] SHA2-384
6,654,212 UART: [kat] SHA2-512-ACC
6,656,113 UART: [kat] ECC-384
6,666,194 UART: [kat] HMAC-384Kdf
6,670,728 UART: [kat] LMS
6,919,040 UART: [kat] --
6,920,204 UART: [warm-reset] ++
6,920,931 UART: [warm-reset] Prev Update Reset failed
6,921,844 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,866 >>> mbox cmd response: success
2,678,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,036 UART:
2,684,052 UART: Running Caliptra FMC ...
2,684,460 UART:
2,684,603 UART: [state] CFI Enabled
2,695,414 UART: [fht] FMC Alias Private Key: 7
2,802,781 UART: [art] Extend RT PCRs Done
2,803,209 UART: [art] Lock RT PCRs Done
2,804,745 UART: [art] Populate DV Done
2,812,958 UART: [fht] FMC Alias Private Key: 7
2,814,120 UART: [art] Derive CDI
2,814,400 UART: [art] Store in in slot 0x4
2,900,265 UART: [art] Derive Key Pair
2,900,625 UART: [art] Store priv key in slot 0x5
2,913,635 UART: [art] Derive Key Pair - Done
2,928,489 UART: [art] Signing Cert with AUTHO
2,928,969 UART: RITY.KEYID = 7
2,943,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,746 UART: [art] PUB.X = 037D8E6F0B876D4176F631DCF04160542DCCC13C0867563CFEB5518B24A7912AC4D9C7ACC99481EB326D862FA63CD5E5
2,951,515 UART: [art] PUB.Y = 583915A7C74BE0A6D49D7B727F28F0498611C97131166290375599E1058B2499FAFD89F5EB471579F6AF6DE2E35AA21C
2,958,458 UART: [art] SIG.R = 0250049CB9FDD02E7C0CDF2D01A34E7FB8EB5CF6FD2C93BD168C56E8B7D99B8EE57249636E61748F712234CC6E474C41
2,965,228 UART: [art] SIG.S = 959FB2CE1884320AC5848403F04608CA41C488EE5B10ED6473C61E284CC3DB48619C0D264B6ECF744D6962047E07B10E
2,989,370 UART: Caliptra RT
2,989,715 UART: [state] CFI Enabled
3,096,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,530,775 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Production
85,735 UART: [state] DebugLocked = Yes
86,347 UART: [state] Starting the WD Timer 40000000 cycles
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,754 UART: [kat] SHA2-512-ACC
906,655 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,650 UART: [kat] LMS
1,168,962 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,219 UART: [idev] Erasing UDS.KEYID = 0
1,198,300 UART: [idev] Sha1 KeyId Algorithm
1,207,109 UART: [idev] --
1,208,314 UART: [ldev] ++
1,208,482 UART: [ldev] CDI.KEYID = 6
1,208,846 UART: [ldev] SUBJECT.KEYID = 5
1,209,273 UART: [ldev] AUTHORITY.KEYID = 7
1,209,736 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,953 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,823 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,529 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,607 UART: [ldev] --
1,281,103 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,718 >>> mbox cmd response: success
2,798,864 UART: [afmc] ++
2,799,032 UART: [afmc] CDI.KEYID = 6
2,799,395 UART: [afmc] SUBJECT.KEYID = 7
2,799,821 UART: [afmc] AUTHORITY.KEYID = 5
2,835,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,557 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,276 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,169 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,876 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,637 UART: [afmc] --
2,878,518 UART: [cold-reset] --
2,879,442 UART: [state] Locking Datavault
2,880,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,105 UART: [state] Locking ICCM
2,881,775 UART: [exit] Launching FMC @ 0x40000130
2,887,104 UART:
2,887,120 UART: Running Caliptra FMC ...
2,887,528 UART:
2,887,582 UART: [state] CFI Enabled
2,897,833 UART: [fht] FMC Alias Private Key: 7
3,005,054 UART: [art] Extend RT PCRs Done
3,005,482 UART: [art] Lock RT PCRs Done
3,006,994 UART: [art] Populate DV Done
3,015,580 UART: [fht] FMC Alias Private Key: 7
3,016,678 UART: [art] Derive CDI
3,016,958 UART: [art] Store in in slot 0x4
3,102,647 UART: [art] Derive Key Pair
3,103,007 UART: [art] Store priv key in slot 0x5
3,116,189 UART: [art] Derive Key Pair - Done
3,130,905 UART: [art] Signing Cert with AUTHO
3,131,385 UART: RITY.KEYID = 7
3,146,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,114 UART: [art] PUB.X = 512E2C2FE84584E4395AF8D2AC24D7A9F6636A3AD173CFCDA9F0354768FECF8CDA4D20915FCF0F156600C78113226A33
3,153,869 UART: [art] PUB.Y = AE553DD69848BCEA07D13D85BDE6A6AB4EF971C6468DD1DB7DF692A389449655C4B7B48F7D09B9A6FB9545B3A0886170
3,160,825 UART: [art] SIG.R = 95D6F3BBDCF6473721B912865990FC81D8400C526B87DD53BD0DACDBEC6793619935AE5FC5547C16AD3CCFEA1920004E
3,167,579 UART: [art] SIG.S = 286316EF8240EC1EF8CF4DEEE53194FF9ED4156AD36A86ADC070E00CDC02B9E3BE2F9F6A8B54C96A9A36A9E1E09C2620
3,191,350 UART: Caliptra RT
3,191,603 UART: [state] CFI Enabled
3,299,604 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,360 UART:
3,300,376 UART: Running Caliptra ROM ...
3,300,784 UART:
3,300,839 UART: [state] CFI Enabled
3,303,460 UART: [state] LifecycleState = Production
3,304,068 UART: [state] DebugLocked = Yes
3,304,616 UART: [state] Starting the WD Timer 40000000 cycles
3,306,255 UART: [kat] SHA2-256
4,109,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,934 UART: [kat] ++
4,114,086 UART: [kat] sha1
4,118,286 UART: [kat] SHA2-256
4,120,226 UART: [kat] SHA2-384
4,122,811 UART: [kat] SHA2-512-ACC
4,124,712 UART: [kat] ECC-384
4,134,343 UART: [kat] HMAC-384Kdf
4,139,045 UART: [kat] LMS
4,387,357 UART: [kat] --
4,388,243 UART: [warm-reset] ++
4,389,264 UART: [warm-reset] --
4,390,095 UART: [state] Locking Datavault
4,391,049 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,653 UART: [state] Locking ICCM
4,392,151 UART: [exit] Launching FMC @ 0x40000130
4,397,480 UART:
4,397,496 UART: Running Caliptra FMC ...
4,397,904 UART:
4,397,958 UART: [state] CFI Enabled
4,399,233 UART: [aliasrt :skip pcr extension
4,399,706 UART: [art] Extend RT PCRs Done
4,400,134 UART: [art] Lock RT PCRs Done
4,401,427 UART: [art] Populate DV Done
4,409,353 UART: [fht] FMC Alias Private Key: 7
4,410,319 UART: [art] Derive CDI
4,410,599 UART: [art] Store in in slot 0x4
4,496,380 UART: [art] Derive Key Pair
4,496,740 UART: [art] Store priv key in slot 0x5
4,510,046 UART: [art] Derive Key Pair - Done
4,524,568 UART: [art] Signing Cert with AUTHO
4,525,048 UART: RITY.KEYID = 7
4,540,192 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,957 UART: [art] PUB.X = 512E2C2FE84584E4395AF8D2AC24D7A9F6636A3AD173CFCDA9F0354768FECF8CDA4D20915FCF0F156600C78113226A33
4,547,712 UART: [art] PUB.Y = AE553DD69848BCEA07D13D85BDE6A6AB4EF971C6468DD1DB7DF692A389449655C4B7B48F7D09B9A6FB9545B3A0886170
4,554,668 UART: [art] SIG.R = 95D6F3BBDCF6473721B912865990FC81D8400C526B87DD53BD0DACDBEC6793619935AE5FC5547C16AD3CCFEA1920004E
4,561,422 UART: [art] SIG.S = 286316EF8240EC1EF8CF4DEEE53194FF9ED4156AD36A86ADC070E00CDC02B9E3BE2F9F6A8B54C96A9A36A9E1E09C2620
4,585,353 UART: Caliptra RT
4,585,606 UART: [state] CFI Enabled
4,864,189 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Production
85,543 UART: [state] DebugLocked = Yes
86,135 UART: [state] Starting the WD Timer 40000000 cycles
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 ready_for_fw is high
1,174,798 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,709 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,909 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,779 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,485 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,357 UART: [ldev] --
1,280,631 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,123 >>> mbox cmd response: success
2,798,307 UART: [afmc] ++
2,798,475 UART: [afmc] CDI.KEYID = 6
2,798,838 UART: [afmc] SUBJECT.KEYID = 7
2,799,264 UART: [afmc] AUTHORITY.KEYID = 5
2,834,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,044 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,763 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,656 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,363 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,326 UART: [afmc] --
2,877,413 UART: [cold-reset] --
2,878,249 UART: [state] Locking Datavault
2,879,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,050 UART: [state] Locking ICCM
2,880,642 UART: [exit] Launching FMC @ 0x40000130
2,885,971 UART:
2,885,987 UART: Running Caliptra FMC ...
2,886,395 UART:
2,886,449 UART: [state] CFI Enabled
2,896,938 UART: [fht] FMC Alias Private Key: 7
3,005,435 UART: [art] Extend RT PCRs Done
3,005,863 UART: [art] Lock RT PCRs Done
3,007,539 UART: [art] Populate DV Done
3,015,627 UART: [fht] FMC Alias Private Key: 7
3,016,581 UART: [art] Derive CDI
3,016,861 UART: [art] Store in in slot 0x4
3,102,490 UART: [art] Derive Key Pair
3,102,850 UART: [art] Store priv key in slot 0x5
3,115,854 UART: [art] Derive Key Pair - Done
3,130,344 UART: [art] Signing Cert with AUTHO
3,130,824 UART: RITY.KEYID = 7
3,146,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,953 UART: [art] PUB.X = C49D2328B6E72C8ABA9F7DC7043EF535C98128E076D61DB65E693730A5EAAF4BFF58A0E9B9785C73910930580C709257
3,153,716 UART: [art] PUB.Y = A1A43109C4082C4F90F7A3CD41847DA7665850B7085887DD40CE4D29B3C238CBEB24D71BE96D581262EDF912BB502544
3,160,659 UART: [art] SIG.R = C92C9B75194E0C8A15772438273E8231E61D1FAE659E8A0DE5EAFC26589450AED423523338B4EE05A3FDC98396D537DB
3,167,424 UART: [art] SIG.S = A5E49FFCF8DBF4C0151D62CEAA44A0196CFC455544527EAFE73CB3A38F2EBCEE7078B9E9576B0CFF078AF15E5FB6DAAE
3,191,449 UART: Caliptra RT
3,191,702 UART: [state] CFI Enabled
3,299,233 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,989 UART:
3,300,005 UART: Running Caliptra ROM ...
3,300,413 UART:
3,300,468 UART: [state] CFI Enabled
3,303,085 UART: [state] LifecycleState = Production
3,303,693 UART: [state] DebugLocked = Yes
3,304,315 UART: [state] Starting the WD Timer 40000000 cycles
3,305,964 UART: [kat] SHA2-256
4,109,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,643 UART: [kat] ++
4,113,795 UART: [kat] sha1
4,117,989 UART: [kat] SHA2-256
4,119,929 UART: [kat] SHA2-384
4,122,686 UART: [kat] SHA2-512-ACC
4,124,587 UART: [kat] ECC-384
4,134,008 UART: [kat] HMAC-384Kdf
4,138,382 UART: [kat] LMS
4,386,694 UART: [kat] --
4,387,682 UART: [warm-reset] ++
4,388,441 UART: [warm-reset] --
4,389,132 UART: [state] Locking Datavault
4,389,922 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,526 UART: [state] Locking ICCM
4,391,182 UART: [exit] Launching FMC @ 0x40000130
4,396,511 UART:
4,396,527 UART: Running Caliptra FMC ...
4,396,935 UART:
4,396,989 UART: [state] CFI Enabled
4,398,290 UART: [aliasrt :skip pcr extension
4,398,763 UART: [art] Extend RT PCRs Done
4,399,191 UART: [art] Lock RT PCRs Done
4,400,398 UART: [art] Populate DV Done
4,408,642 UART: [fht] FMC Alias Private Key: 7
4,409,686 UART: [art] Derive CDI
4,409,966 UART: [art] Store in in slot 0x4
4,495,599 UART: [art] Derive Key Pair
4,495,959 UART: [art] Store priv key in slot 0x5
4,508,947 UART: [art] Derive Key Pair - Done
4,523,637 UART: [art] Signing Cert with AUTHO
4,524,117 UART: RITY.KEYID = 7
4,539,103 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,868 UART: [art] PUB.X = C49D2328B6E72C8ABA9F7DC7043EF535C98128E076D61DB65E693730A5EAAF4BFF58A0E9B9785C73910930580C709257
4,546,631 UART: [art] PUB.Y = A1A43109C4082C4F90F7A3CD41847DA7665850B7085887DD40CE4D29B3C238CBEB24D71BE96D581262EDF912BB502544
4,553,574 UART: [art] SIG.R = C92C9B75194E0C8A15772438273E8231E61D1FAE659E8A0DE5EAFC26589450AED423523338B4EE05A3FDC98396D537DB
4,560,339 UART: [art] SIG.S = A5E49FFCF8DBF4C0151D62CEAA44A0196CFC455544527EAFE73CB3A38F2EBCEE7078B9E9576B0CFF078AF15E5FB6DAAE
4,584,114 UART: Caliptra RT
4,584,367 UART: [state] CFI Enabled
4,866,976 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Production
85,966 UART: [state] DebugLocked = Yes
86,668 UART: [state] Starting the WD Timer 40000000 cycles
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,145 UART: [kat] SHA2-512-ACC
907,046 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 ready_for_fw is high
1,174,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,005 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,995 UART: [ldev] ++
1,209,163 UART: [ldev] CDI.KEYID = 6
1,209,527 UART: [ldev] SUBJECT.KEYID = 5
1,209,954 UART: [ldev] AUTHORITY.KEYID = 7
1,210,417 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,790 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,484 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,354 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,060 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,152 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,345 UART: [fwproc] Recv command 0x46574c44
1,283,078 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,843 >>> mbox cmd response: success
2,800,049 UART: [afmc] ++
2,800,217 UART: [afmc] CDI.KEYID = 6
2,800,580 UART: [afmc] SUBJECT.KEYID = 7
2,801,006 UART: [afmc] AUTHORITY.KEYID = 5
2,836,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,460 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,179 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,072 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,779 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,672 UART: [afmc] --
2,879,791 UART: [cold-reset] --
2,880,485 UART: [state] Locking Datavault
2,881,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,394 UART: [state] Locking ICCM
2,883,016 UART: [exit] Launching FMC @ 0x40000130
2,888,345 UART:
2,888,361 UART: Running Caliptra FMC ...
2,888,769 UART:
2,888,912 UART: [state] CFI Enabled
2,899,851 UART: [fht] FMC Alias Private Key: 7
3,007,426 UART: [art] Extend RT PCRs Done
3,007,854 UART: [art] Lock RT PCRs Done
3,009,188 UART: [art] Populate DV Done
3,017,350 UART: [fht] FMC Alias Private Key: 7
3,018,492 UART: [art] Derive CDI
3,018,772 UART: [art] Store in in slot 0x4
3,104,579 UART: [art] Derive Key Pair
3,104,939 UART: [art] Store priv key in slot 0x5
3,118,549 UART: [art] Derive Key Pair - Done
3,133,167 UART: [art] Signing Cert with AUTHO
3,133,647 UART: RITY.KEYID = 7
3,148,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,616 UART: [art] PUB.X = CE268DE139066A88CF2958FE3C7D559F36BBBDF274C8E1EED44CA299FC9121349326D6E4A4CAA9CD0817EB861DE08434
3,156,394 UART: [art] PUB.Y = C96A2618F830CB28BF8DEC8FF39E16741B8762009309CE36E8A037648163A7A6DB4336AAC04A35992EFE7DC00CC50846
3,163,317 UART: [art] SIG.R = 805C7946D295C6CC990C89412F093A8C096E812B6D4CC94B4226C76137F8E71B26D7ADAFD01F3C312F08ACFECA0C86F1
3,170,082 UART: [art] SIG.S = A180388F9C8A54DA2B740BCF0A4F6BDC8A0A6038668356EAA0C938156041DE1474B4FB643183968F3631322BF44771CD
3,193,886 UART: Caliptra RT
3,194,231 UART: [state] CFI Enabled
3,302,622 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,378 UART:
3,303,394 UART: Running Caliptra ROM ...
3,303,802 UART:
3,303,944 UART: [state] CFI Enabled
3,307,031 UART: [state] LifecycleState = Production
3,307,639 UART: [state] DebugLocked = Yes
3,308,261 UART: [state] Starting the WD Timer 40000000 cycles
3,309,776 UART: [kat] SHA2-256
4,113,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,455 UART: [kat] ++
4,117,607 UART: [kat] sha1
4,121,765 UART: [kat] SHA2-256
4,123,705 UART: [kat] SHA2-384
4,126,428 UART: [kat] SHA2-512-ACC
4,128,329 UART: [kat] ECC-384
4,138,068 UART: [kat] HMAC-384Kdf
4,142,818 UART: [kat] LMS
4,391,130 UART: [kat] --
4,391,860 UART: [warm-reset] ++
4,392,919 UART: [warm-reset] --
4,393,852 UART: [state] Locking Datavault
4,394,654 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,258 UART: [state] Locking ICCM
4,395,872 UART: [exit] Launching FMC @ 0x40000130
4,401,201 UART:
4,401,217 UART: Running Caliptra FMC ...
4,401,625 UART:
4,401,768 UART: [state] CFI Enabled
4,402,971 UART: [aliasrt :skip pcr extension
4,403,444 UART: [art] Extend RT PCRs Done
4,403,872 UART: [art] Lock RT PCRs Done
4,405,031 UART: [art] Populate DV Done
4,413,391 UART: [fht] FMC Alias Private Key: 7
4,414,517 UART: [art] Derive CDI
4,414,797 UART: [art] Store in in slot 0x4
4,500,492 UART: [art] Derive Key Pair
4,500,852 UART: [art] Store priv key in slot 0x5
4,513,958 UART: [art] Derive Key Pair - Done
4,528,814 UART: [art] Signing Cert with AUTHO
4,529,294 UART: RITY.KEYID = 7
4,544,322 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,087 UART: [art] PUB.X = CE268DE139066A88CF2958FE3C7D559F36BBBDF274C8E1EED44CA299FC9121349326D6E4A4CAA9CD0817EB861DE08434
4,551,865 UART: [art] PUB.Y = C96A2618F830CB28BF8DEC8FF39E16741B8762009309CE36E8A037648163A7A6DB4336AAC04A35992EFE7DC00CC50846
4,558,788 UART: [art] SIG.R = 805C7946D295C6CC990C89412F093A8C096E812B6D4CC94B4226C76137F8E71B26D7ADAFD01F3C312F08ACFECA0C86F1
4,565,553 UART: [art] SIG.S = A180388F9C8A54DA2B740BCF0A4F6BDC8A0A6038668356EAA0C938156041DE1474B4FB643183968F3631322BF44771CD
4,589,397 UART: Caliptra RT
4,589,742 UART: [state] CFI Enabled
4,875,749 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Production
86,110 UART: [state] DebugLocked = Yes
86,674 UART: [state] Starting the WD Timer 40000000 cycles
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
917,049 UART: [kat] HMAC-384Kdf
921,683 UART: [kat] LMS
1,169,995 UART: [kat] --
1,170,912 UART: [cold-reset] ++
1,171,409 UART: [fht] FHT @ 0x50003400
1,174,065 UART: [idev] ++
1,174,233 UART: [idev] CDI.KEYID = 6
1,174,594 UART: [idev] SUBJECT.KEYID = 7
1,175,019 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,981 UART: [idev] Sha1 KeyId Algorithm
1,208,850 UART: [idev] --
1,209,857 UART: [ldev] ++
1,210,025 UART: [ldev] CDI.KEYID = 6
1,210,389 UART: [ldev] SUBJECT.KEYID = 5
1,210,816 UART: [ldev] AUTHORITY.KEYID = 7
1,211,279 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,220 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,936 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,201 UART: [fwproc] Recv command 0x46574c44
1,283,934 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,699 >>> mbox cmd response: success
2,799,737 UART: [afmc] ++
2,799,905 UART: [afmc] CDI.KEYID = 6
2,800,268 UART: [afmc] SUBJECT.KEYID = 7
2,800,694 UART: [afmc] AUTHORITY.KEYID = 5
2,835,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,828 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,547 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,440 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,147 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,000 UART: [afmc] --
2,879,007 UART: [cold-reset] --
2,879,671 UART: [state] Locking Datavault
2,880,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,434 UART: [state] Locking ICCM
2,881,938 UART: [exit] Launching FMC @ 0x40000130
2,887,267 UART:
2,887,283 UART: Running Caliptra FMC ...
2,887,691 UART:
2,887,834 UART: [state] CFI Enabled
2,898,609 UART: [fht] FMC Alias Private Key: 7
3,006,650 UART: [art] Extend RT PCRs Done
3,007,078 UART: [art] Lock RT PCRs Done
3,008,370 UART: [art] Populate DV Done
3,016,738 UART: [fht] FMC Alias Private Key: 7
3,017,834 UART: [art] Derive CDI
3,018,114 UART: [art] Store in in slot 0x4
3,103,877 UART: [art] Derive Key Pair
3,104,237 UART: [art] Store priv key in slot 0x5
3,117,367 UART: [art] Derive Key Pair - Done
3,132,176 UART: [art] Signing Cert with AUTHO
3,132,656 UART: RITY.KEYID = 7
3,148,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,991 UART: [art] PUB.X = 1A0EE45BBB1D3A0830E264833D8258CA6939798C322FE54E731DEE04A4E5D867EDCA95D1A867680390A1923497D5299B
3,155,749 UART: [art] PUB.Y = E2B24F0749846C29C5B5AE52922267A49241974F3E2D17E34A3A19C66307A9D97229D0C48FAF5DF6AF156A163D25E26B
3,162,693 UART: [art] SIG.R = 1EE2CE2145399E3A544C54C2F9D60BCC1601707863E8FD4CA43E30AE5B981FA70B8D3B3148A6C10CDB034963C671C032
3,169,454 UART: [art] SIG.S = 3914708C5690F959D2C81DD209FA8B2672975877F2F4590AAC01FCA8FD3DAEE5C7E61FBD41006AF48729322DEC8ADA45
3,193,406 UART: Caliptra RT
3,193,751 UART: [state] CFI Enabled
3,302,347 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,103 UART:
3,303,119 UART: Running Caliptra ROM ...
3,303,527 UART:
3,303,669 UART: [state] CFI Enabled
3,307,046 UART: [state] LifecycleState = Production
3,307,654 UART: [state] DebugLocked = Yes
3,308,354 UART: [state] Starting the WD Timer 40000000 cycles
3,309,885 UART: [kat] SHA2-256
4,113,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,564 UART: [kat] ++
4,117,716 UART: [kat] sha1
4,121,940 UART: [kat] SHA2-256
4,123,880 UART: [kat] SHA2-384
4,126,769 UART: [kat] SHA2-512-ACC
4,128,670 UART: [kat] ECC-384
4,138,249 UART: [kat] HMAC-384Kdf
4,142,793 UART: [kat] LMS
4,391,105 UART: [kat] --
4,392,025 UART: [warm-reset] ++
4,392,686 UART: [warm-reset] --
4,393,405 UART: [state] Locking Datavault
4,394,165 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,769 UART: [state] Locking ICCM
4,395,321 UART: [exit] Launching FMC @ 0x40000130
4,400,650 UART:
4,400,666 UART: Running Caliptra FMC ...
4,401,074 UART:
4,401,217 UART: [state] CFI Enabled
4,402,788 UART: [aliasrt :skip pcr extension
4,403,261 UART: [art] Extend RT PCRs Done
4,403,689 UART: [art] Lock RT PCRs Done
4,405,048 UART: [art] Populate DV Done
4,413,242 UART: [fht] FMC Alias Private Key: 7
4,414,220 UART: [art] Derive CDI
4,414,500 UART: [art] Store in in slot 0x4
4,500,481 UART: [art] Derive Key Pair
4,500,841 UART: [art] Store priv key in slot 0x5
4,513,795 UART: [art] Derive Key Pair - Done
4,528,452 UART: [art] Signing Cert with AUTHO
4,528,932 UART: RITY.KEYID = 7
4,544,054 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,819 UART: [art] PUB.X = 1A0EE45BBB1D3A0830E264833D8258CA6939798C322FE54E731DEE04A4E5D867EDCA95D1A867680390A1923497D5299B
4,551,577 UART: [art] PUB.Y = E2B24F0749846C29C5B5AE52922267A49241974F3E2D17E34A3A19C66307A9D97229D0C48FAF5DF6AF156A163D25E26B
4,558,521 UART: [art] SIG.R = 1EE2CE2145399E3A544C54C2F9D60BCC1601707863E8FD4CA43E30AE5B981FA70B8D3B3148A6C10CDB034963C671C032
4,565,282 UART: [art] SIG.S = 3914708C5690F959D2C81DD209FA8B2672975877F2F4590AAC01FCA8FD3DAEE5C7E61FBD41006AF48729322DEC8ADA45
4,589,146 UART: Caliptra RT
4,589,491 UART: [state] CFI Enabled
4,873,939 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Production
85,773 UART: [state] DebugLocked = Yes
86,293 UART: [state] Starting the WD Timer 40000000 cycles
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,173,952 ready_for_fw is high
1,173,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,967 UART: [idev] --
1,209,112 UART: [ldev] ++
1,209,280 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,071 UART: [ldev] AUTHORITY.KEYID = 7
1,210,534 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,659 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,529 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,235 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,199 UART: [ldev] --
1,281,649 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,063 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,966 >>> mbox cmd response: success
2,798,978 UART: [afmc] ++
2,799,146 UART: [afmc] CDI.KEYID = 6
2,799,509 UART: [afmc] SUBJECT.KEYID = 7
2,799,935 UART: [afmc] AUTHORITY.KEYID = 5
2,835,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,865 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,584 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,477 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,184 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,071 UART: [afmc] --
2,879,018 UART: [cold-reset] --
2,879,910 UART: [state] Locking Datavault
2,880,967 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,571 UART: [state] Locking ICCM
2,882,129 UART: [exit] Launching FMC @ 0x40000130
2,887,458 UART:
2,887,474 UART: Running Caliptra FMC ...
2,887,882 UART:
2,887,936 UART: [state] CFI Enabled
2,898,575 UART: [fht] FMC Alias Private Key: 7
3,006,668 UART: [art] Extend RT PCRs Done
3,007,096 UART: [art] Lock RT PCRs Done
3,008,836 UART: [art] Populate DV Done
3,016,982 UART: [fht] FMC Alias Private Key: 7
3,018,014 UART: [art] Derive CDI
3,018,294 UART: [art] Store in in slot 0x4
3,103,725 UART: [art] Derive Key Pair
3,104,085 UART: [art] Store priv key in slot 0x5
3,117,221 UART: [art] Derive Key Pair - Done
3,131,837 UART: [art] Signing Cert with AUTHO
3,132,317 UART: RITY.KEYID = 7
3,147,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,360 UART: [art] PUB.X = 9F5690B241956C20686A741BF5E538902E19C4C56F00D3DE4582EC4E25B18EE1D991AB9636A4B174473E04D69D66BDB8
3,155,105 UART: [art] PUB.Y = 92C307F1E373C9695895F6A2D7AEE68C4F7201AD13A5C369BEDC2DC6D9A05BBB23C1868B514CA631171B995F2CC47B86
3,162,059 UART: [art] SIG.R = 6999C7A09A0DC386A577C05783B2382B0957979A279C21396A8B38782CDF20D10F716DB23BF56C2460FB69BBA362B9CA
3,168,820 UART: [art] SIG.S = A2C2841AA4E8A51DB568EDC4A980942A448042B057261D2DB5FD2E7E94F30B10CA71856E7C8E138ED60B11A863A75F00
3,192,483 UART: Caliptra RT
3,192,736 UART: [state] CFI Enabled
3,301,647 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,403 UART:
3,302,419 UART: Running Caliptra ROM ...
3,302,827 UART:
3,302,882 UART: [state] CFI Enabled
3,305,835 UART: [state] LifecycleState = Production
3,306,443 UART: [state] DebugLocked = Yes
3,307,205 UART: [state] Starting the WD Timer 40000000 cycles
3,308,740 UART: [kat] SHA2-256
4,112,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,419 UART: [kat] ++
4,116,571 UART: [kat] sha1
4,120,747 UART: [kat] SHA2-256
4,122,687 UART: [kat] SHA2-384
4,125,428 UART: [kat] SHA2-512-ACC
4,127,329 UART: [kat] ECC-384
4,136,686 UART: [kat] HMAC-384Kdf
4,141,434 UART: [kat] LMS
4,389,746 UART: [kat] --
4,390,694 UART: [warm-reset] ++
4,391,545 UART: [warm-reset] --
4,392,272 UART: [state] Locking Datavault
4,393,078 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,682 UART: [state] Locking ICCM
4,394,274 UART: [exit] Launching FMC @ 0x40000130
4,399,603 UART:
4,399,619 UART: Running Caliptra FMC ...
4,400,027 UART:
4,400,081 UART: [state] CFI Enabled
4,401,210 UART: [aliasrt :skip pcr extension
4,401,683 UART: [art] Extend RT PCRs Done
4,402,111 UART: [art] Lock RT PCRs Done
4,403,238 UART: [art] Populate DV Done
4,411,498 UART: [fht] FMC Alias Private Key: 7
4,412,662 UART: [art] Derive CDI
4,412,942 UART: [art] Store in in slot 0x4
4,498,927 UART: [art] Derive Key Pair
4,499,287 UART: [art] Store priv key in slot 0x5
4,512,233 UART: [art] Derive Key Pair - Done
4,526,663 UART: [art] Signing Cert with AUTHO
4,527,143 UART: RITY.KEYID = 7
4,542,323 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,088 UART: [art] PUB.X = 9F5690B241956C20686A741BF5E538902E19C4C56F00D3DE4582EC4E25B18EE1D991AB9636A4B174473E04D69D66BDB8
4,549,833 UART: [art] PUB.Y = 92C307F1E373C9695895F6A2D7AEE68C4F7201AD13A5C369BEDC2DC6D9A05BBB23C1868B514CA631171B995F2CC47B86
4,556,787 UART: [art] SIG.R = 6999C7A09A0DC386A577C05783B2382B0957979A279C21396A8B38782CDF20D10F716DB23BF56C2460FB69BBA362B9CA
4,563,548 UART: [art] SIG.S = A2C2841AA4E8A51DB568EDC4A980942A448042B057261D2DB5FD2E7E94F30B10CA71856E7C8E138ED60B11A863A75F00
4,586,837 UART: Caliptra RT
4,587,090 UART: [state] CFI Enabled
4,870,573 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,799 UART: [state] LifecycleState = Production
85,407 UART: [state] DebugLocked = Yes
86,113 UART: [state] Starting the WD Timer 40000000 cycles
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 ready_for_fw is high
1,174,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,523 UART: [idev] Erasing UDS.KEYID = 0
1,197,966 UART: [idev] Sha1 KeyId Algorithm
1,206,779 UART: [idev] --
1,207,756 UART: [ldev] ++
1,207,924 UART: [ldev] CDI.KEYID = 6
1,208,288 UART: [ldev] SUBJECT.KEYID = 5
1,208,715 UART: [ldev] AUTHORITY.KEYID = 7
1,209,178 UART: [ldev] FE.KEYID = 1
1,214,156 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,097 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,791 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,661 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,367 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,669 UART: [ldev] --
1,279,985 UART: [fwproc] Wait for Commands...
1,280,680 UART: [fwproc] Recv command 0x46574c44
1,281,413 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,212 >>> mbox cmd response: success
2,798,302 UART: [afmc] ++
2,798,470 UART: [afmc] CDI.KEYID = 6
2,798,833 UART: [afmc] SUBJECT.KEYID = 7
2,799,259 UART: [afmc] AUTHORITY.KEYID = 5
2,834,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,027 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,746 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,639 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,346 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,255 UART: [afmc] --
2,878,206 UART: [cold-reset] --
2,878,956 UART: [state] Locking Datavault
2,880,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,751 UART: [state] Locking ICCM
2,881,287 UART: [exit] Launching FMC @ 0x40000130
2,886,616 UART:
2,886,632 UART: Running Caliptra FMC ...
2,887,040 UART:
2,887,094 UART: [state] CFI Enabled
2,897,241 UART: [fht] FMC Alias Private Key: 7
3,004,990 UART: [art] Extend RT PCRs Done
3,005,418 UART: [art] Lock RT PCRs Done
3,007,076 UART: [art] Populate DV Done
3,015,144 UART: [fht] FMC Alias Private Key: 7
3,016,226 UART: [art] Derive CDI
3,016,506 UART: [art] Store in in slot 0x4
3,102,375 UART: [art] Derive Key Pair
3,102,735 UART: [art] Store priv key in slot 0x5
3,115,335 UART: [art] Derive Key Pair - Done
3,129,810 UART: [art] Signing Cert with AUTHO
3,130,290 UART: RITY.KEYID = 7
3,145,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,213 UART: [art] PUB.X = 7A4811504C70C607B108ED58F58F14A353D4B94386DCEC7D15E6FDF03B1427201F0311F88FD549DA67A44C36040B4F8D
3,152,970 UART: [art] PUB.Y = 202446D3FBF7BB6FA9961DE2D3E06574227F23D59183CB204F97504EB4F74AC89C3802943EAC789093FD6E0513C5C15F
3,159,916 UART: [art] SIG.R = A880F1D7441D287A16CB106B0B7B384EE7EB49A0C7020939EA45EAF5388FE9628A64FE50D6FEE0EDD45CED7273F3D9EC
3,166,695 UART: [art] SIG.S = 105934977D233F758CB26ED7FFC52C7CAB45B4291C6FE514E0FDCC0224FDE5CE91E059AD74BF6418D4357EA05B163090
3,190,439 UART: Caliptra RT
3,190,692 UART: [state] CFI Enabled
3,298,189 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,945 UART:
3,298,961 UART: Running Caliptra ROM ...
3,299,369 UART:
3,299,424 UART: [state] CFI Enabled
3,302,271 UART: [state] LifecycleState = Production
3,302,879 UART: [state] DebugLocked = Yes
3,303,393 UART: [state] Starting the WD Timer 40000000 cycles
3,305,088 UART: [kat] SHA2-256
4,108,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,767 UART: [kat] ++
4,112,919 UART: [kat] sha1
4,117,187 UART: [kat] SHA2-256
4,119,127 UART: [kat] SHA2-384
4,121,826 UART: [kat] SHA2-512-ACC
4,123,727 UART: [kat] ECC-384
4,133,314 UART: [kat] HMAC-384Kdf
4,137,862 UART: [kat] LMS
4,386,174 UART: [kat] --
4,387,058 UART: [warm-reset] ++
4,387,751 UART: [warm-reset] --
4,388,428 UART: [state] Locking Datavault
4,389,164 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,768 UART: [state] Locking ICCM
4,390,192 UART: [exit] Launching FMC @ 0x40000130
4,395,521 UART:
4,395,537 UART: Running Caliptra FMC ...
4,395,945 UART:
4,395,999 UART: [state] CFI Enabled
4,397,318 UART: [aliasrt :skip pcr extension
4,397,791 UART: [art] Extend RT PCRs Done
4,398,219 UART: [art] Lock RT PCRs Done
4,399,708 UART: [art] Populate DV Done
4,407,828 UART: [fht] FMC Alias Private Key: 7
4,408,988 UART: [art] Derive CDI
4,409,268 UART: [art] Store in in slot 0x4
4,495,021 UART: [art] Derive Key Pair
4,495,381 UART: [art] Store priv key in slot 0x5
4,508,325 UART: [art] Derive Key Pair - Done
4,523,236 UART: [art] Signing Cert with AUTHO
4,523,716 UART: RITY.KEYID = 7
4,538,562 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,327 UART: [art] PUB.X = 7A4811504C70C607B108ED58F58F14A353D4B94386DCEC7D15E6FDF03B1427201F0311F88FD549DA67A44C36040B4F8D
4,546,084 UART: [art] PUB.Y = 202446D3FBF7BB6FA9961DE2D3E06574227F23D59183CB204F97504EB4F74AC89C3802943EAC789093FD6E0513C5C15F
4,553,030 UART: [art] SIG.R = A880F1D7441D287A16CB106B0B7B384EE7EB49A0C7020939EA45EAF5388FE9628A64FE50D6FEE0EDD45CED7273F3D9EC
4,559,809 UART: [art] SIG.S = 105934977D233F758CB26ED7FFC52C7CAB45B4291C6FE514E0FDCC0224FDE5CE91E059AD74BF6418D4357EA05B163090
4,583,423 UART: Caliptra RT
4,583,676 UART: [state] CFI Enabled
4,866,707 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,812 UART: [state] LifecycleState = Production
86,420 UART: [state] DebugLocked = Yes
87,160 UART: [state] Starting the WD Timer 40000000 cycles
88,797 UART: [kat] SHA2-256
892,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,476 UART: [kat] ++
896,628 UART: [kat] sha1
900,728 UART: [kat] SHA2-256
902,668 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
916,983 UART: [kat] HMAC-384Kdf
921,677 UART: [kat] LMS
1,169,989 UART: [kat] --
1,170,910 UART: [cold-reset] ++
1,171,237 UART: [fht] FHT @ 0x50003400
1,173,785 UART: [idev] ++
1,173,953 UART: [idev] CDI.KEYID = 6
1,174,314 UART: [idev] SUBJECT.KEYID = 7
1,174,739 UART: [idev] UDS.KEYID = 0
1,175,085 ready_for_fw is high
1,175,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,765 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,192 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,062 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,768 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,886 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,153 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,439 >>> mbox cmd response: success
2,800,461 UART: [afmc] ++
2,800,629 UART: [afmc] CDI.KEYID = 6
2,800,992 UART: [afmc] SUBJECT.KEYID = 7
2,801,418 UART: [afmc] AUTHORITY.KEYID = 5
2,836,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,728 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,447 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,340 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,047 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,666 UART: [afmc] --
2,879,635 UART: [cold-reset] --
2,880,325 UART: [state] Locking Datavault
2,881,746 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,350 UART: [state] Locking ICCM
2,882,856 UART: [exit] Launching FMC @ 0x40000130
2,888,185 UART:
2,888,201 UART: Running Caliptra FMC ...
2,888,609 UART:
2,888,752 UART: [state] CFI Enabled
2,899,435 UART: [fht] FMC Alias Private Key: 7
3,007,366 UART: [art] Extend RT PCRs Done
3,007,794 UART: [art] Lock RT PCRs Done
3,009,182 UART: [art] Populate DV Done
3,017,360 UART: [fht] FMC Alias Private Key: 7
3,018,394 UART: [art] Derive CDI
3,018,674 UART: [art] Store in in slot 0x4
3,104,487 UART: [art] Derive Key Pair
3,104,847 UART: [art] Store priv key in slot 0x5
3,118,259 UART: [art] Derive Key Pair - Done
3,132,997 UART: [art] Signing Cert with AUTHO
3,133,477 UART: RITY.KEYID = 7
3,148,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,446 UART: [art] PUB.X = 7D8385CA865D7BF6DB8EE6EB644A77C7126D2AD798BE18A39740AF4C4038AD727E7FAD3DD43A72A5721E34E4091D86F7
3,156,225 UART: [art] PUB.Y = 8D7EA03299D3A3F0584B5CD4632310FB56F654DB578F5EA17D57507AB878947B0739FAB5A9F66E2568748932B9A7FB69
3,163,172 UART: [art] SIG.R = E9D3712EFA24C095512F1DD77691D6B2412BBF98AD171CD43357EBFB68ED8F4D31CD0697CE42D60045BFED577FA1FA9E
3,169,935 UART: [art] SIG.S = 431E27AB78C7B0C115AF5920B334DDC36888A692BE63643699951185EAA6A7677AEBC9C06619C57430139B3DAD2D582E
3,193,422 UART: Caliptra RT
3,193,767 UART: [state] CFI Enabled
3,302,444 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,200 UART:
3,303,216 UART: Running Caliptra ROM ...
3,303,624 UART:
3,303,766 UART: [state] CFI Enabled
3,306,555 UART: [state] LifecycleState = Production
3,307,163 UART: [state] DebugLocked = Yes
3,307,831 UART: [state] Starting the WD Timer 40000000 cycles
3,309,534 UART: [kat] SHA2-256
4,113,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,213 UART: [kat] ++
4,117,365 UART: [kat] sha1
4,121,767 UART: [kat] SHA2-256
4,123,707 UART: [kat] SHA2-384
4,126,502 UART: [kat] SHA2-512-ACC
4,128,403 UART: [kat] ECC-384
4,137,902 UART: [kat] HMAC-384Kdf
4,142,490 UART: [kat] LMS
4,390,802 UART: [kat] --
4,391,666 UART: [warm-reset] ++
4,392,711 UART: [warm-reset] --
4,393,762 UART: [state] Locking Datavault
4,394,722 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,326 UART: [state] Locking ICCM
4,395,784 UART: [exit] Launching FMC @ 0x40000130
4,401,113 UART:
4,401,129 UART: Running Caliptra FMC ...
4,401,537 UART:
4,401,680 UART: [state] CFI Enabled
4,403,075 UART: [aliasrt :skip pcr extension
4,403,548 UART: [art] Extend RT PCRs Done
4,403,976 UART: [art] Lock RT PCRs Done
4,405,275 UART: [art] Populate DV Done
4,413,669 UART: [fht] FMC Alias Private Key: 7
4,414,743 UART: [art] Derive CDI
4,415,023 UART: [art] Store in in slot 0x4
4,501,194 UART: [art] Derive Key Pair
4,501,554 UART: [art] Store priv key in slot 0x5
4,514,528 UART: [art] Derive Key Pair - Done
4,528,688 UART: [art] Signing Cert with AUTHO
4,529,168 UART: RITY.KEYID = 7
4,544,334 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,099 UART: [art] PUB.X = 7D8385CA865D7BF6DB8EE6EB644A77C7126D2AD798BE18A39740AF4C4038AD727E7FAD3DD43A72A5721E34E4091D86F7
4,551,878 UART: [art] PUB.Y = 8D7EA03299D3A3F0584B5CD4632310FB56F654DB578F5EA17D57507AB878947B0739FAB5A9F66E2568748932B9A7FB69
4,558,825 UART: [art] SIG.R = E9D3712EFA24C095512F1DD77691D6B2412BBF98AD171CD43357EBFB68ED8F4D31CD0697CE42D60045BFED577FA1FA9E
4,565,588 UART: [art] SIG.S = 431E27AB78C7B0C115AF5920B334DDC36888A692BE63643699951185EAA6A7677AEBC9C06619C57430139B3DAD2D582E
4,589,489 UART: Caliptra RT
4,589,834 UART: [state] CFI Enabled
4,872,891 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,780 UART: [state] LifecycleState = Production
86,388 UART: [state] DebugLocked = Yes
87,042 UART: [state] Starting the WD Timer 40000000 cycles
88,681 UART: [kat] SHA2-256
892,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,360 UART: [kat] ++
896,512 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,375 UART: [kat] SHA2-512-ACC
907,276 UART: [kat] ECC-384
916,627 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,643 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 ready_for_fw is high
1,174,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,746 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,843 UART: [ldev] ++
1,209,011 UART: [ldev] CDI.KEYID = 6
1,209,375 UART: [ldev] SUBJECT.KEYID = 5
1,209,802 UART: [ldev] AUTHORITY.KEYID = 7
1,210,265 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,241,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,264 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,958 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,828 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,534 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,714 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,805 UART: [fwproc] Recv command 0x46574c44
1,282,538 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,393 >>> mbox cmd response: success
2,799,609 UART: [afmc] ++
2,799,777 UART: [afmc] CDI.KEYID = 6
2,800,140 UART: [afmc] SUBJECT.KEYID = 7
2,800,566 UART: [afmc] AUTHORITY.KEYID = 5
2,837,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,456 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,175 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,068 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,775 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,656 UART: [afmc] --
2,880,739 UART: [cold-reset] --
2,881,645 UART: [state] Locking Datavault
2,882,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,510 UART: [state] Locking ICCM
2,883,936 UART: [exit] Launching FMC @ 0x40000130
2,889,265 UART:
2,889,281 UART: Running Caliptra FMC ...
2,889,689 UART:
2,889,832 UART: [state] CFI Enabled
2,900,585 UART: [fht] FMC Alias Private Key: 7
3,007,814 UART: [art] Extend RT PCRs Done
3,008,242 UART: [art] Lock RT PCRs Done
3,009,814 UART: [art] Populate DV Done
3,017,896 UART: [fht] FMC Alias Private Key: 7
3,018,986 UART: [art] Derive CDI
3,019,266 UART: [art] Store in in slot 0x4
3,105,293 UART: [art] Derive Key Pair
3,105,653 UART: [art] Store priv key in slot 0x5
3,118,823 UART: [art] Derive Key Pair - Done
3,133,717 UART: [art] Signing Cert with AUTHO
3,134,197 UART: RITY.KEYID = 7
3,149,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,418 UART: [art] PUB.X = 7B3D1684228B3FEBC1AAC7AA3AD2CFBD66C8400827B09DFA49A872BFFC724C04B8BDE71EF19B6F14FAE4CE0C71F0E29E
3,157,209 UART: [art] PUB.Y = AD9F67CC0830EEC62FA902D7519C3C5A5AF461498C64DADA82367DF51A28BC8471633087E7EFE3EF79C4DFFA0E5986B0
3,164,166 UART: [art] SIG.R = B1C82262414479474E8DDE389F081BCBB6E423B077BF5CAF2B29538FFCF59CEB2A3796C11D5045DA84CDDA3FC1C30DBC
3,170,950 UART: [art] SIG.S = 0CEED47CC62885BA697A15F2A0F8660A09D3800A5ABDAC9A5FF901C84AD1F908F3791BB7EF11AB8C4E273E18E4EAE702
3,195,086 UART: Caliptra RT
3,195,431 UART: [state] CFI Enabled
3,302,652 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,408 UART:
3,303,424 UART: Running Caliptra ROM ...
3,303,832 UART:
3,303,974 UART: [state] CFI Enabled
3,306,503 UART: [state] LifecycleState = Production
3,307,111 UART: [state] DebugLocked = Yes
3,307,775 UART: [state] Starting the WD Timer 40000000 cycles
3,309,278 UART: [kat] SHA2-256
4,112,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,957 UART: [kat] ++
4,117,109 UART: [kat] sha1
4,121,395 UART: [kat] SHA2-256
4,123,335 UART: [kat] SHA2-384
4,125,986 UART: [kat] SHA2-512-ACC
4,127,887 UART: [kat] ECC-384
4,137,548 UART: [kat] HMAC-384Kdf
4,142,092 UART: [kat] LMS
4,390,404 UART: [kat] --
4,391,294 UART: [warm-reset] ++
4,392,003 UART: [warm-reset] --
4,392,716 UART: [state] Locking Datavault
4,393,660 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,264 UART: [state] Locking ICCM
4,394,864 UART: [exit] Launching FMC @ 0x40000130
4,400,193 UART:
4,400,209 UART: Running Caliptra FMC ...
4,400,617 UART:
4,400,760 UART: [state] CFI Enabled
4,402,201 UART: [aliasrt :skip pcr extension
4,402,674 UART: [art] Extend RT PCRs Done
4,403,102 UART: [art] Lock RT PCRs Done
4,404,467 UART: [art] Populate DV Done
4,412,695 UART: [fht] FMC Alias Private Key: 7
4,413,647 UART: [art] Derive CDI
4,413,927 UART: [art] Store in in slot 0x4
4,499,942 UART: [art] Derive Key Pair
4,500,302 UART: [art] Store priv key in slot 0x5
4,513,864 UART: [art] Derive Key Pair - Done
4,528,640 UART: [art] Signing Cert with AUTHO
4,529,120 UART: RITY.KEYID = 7
4,544,540 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,305 UART: [art] PUB.X = 7B3D1684228B3FEBC1AAC7AA3AD2CFBD66C8400827B09DFA49A872BFFC724C04B8BDE71EF19B6F14FAE4CE0C71F0E29E
4,552,096 UART: [art] PUB.Y = AD9F67CC0830EEC62FA902D7519C3C5A5AF461498C64DADA82367DF51A28BC8471633087E7EFE3EF79C4DFFA0E5986B0
4,559,053 UART: [art] SIG.R = B1C82262414479474E8DDE389F081BCBB6E423B077BF5CAF2B29538FFCF59CEB2A3796C11D5045DA84CDDA3FC1C30DBC
4,565,837 UART: [art] SIG.S = 0CEED47CC62885BA697A15F2A0F8660A09D3800A5ABDAC9A5FF901C84AD1F908F3791BB7EF11AB8C4E273E18E4EAE702
4,589,201 UART: Caliptra RT
4,589,546 UART: [state] CFI Enabled
4,868,653 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Production
85,577 UART: [state] DebugLocked = Yes
86,201 UART: [state] Starting the WD Timer 40000000 cycles
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,563 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,788 UART: [idev] ++
1,173,956 UART: [idev] CDI.KEYID = 6
1,174,317 UART: [idev] SUBJECT.KEYID = 7
1,174,742 UART: [idev] UDS.KEYID = 0
1,175,088 ready_for_fw is high
1,175,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,555 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,268 UART: [ldev] ++
1,209,436 UART: [ldev] CDI.KEYID = 6
1,209,800 UART: [ldev] SUBJECT.KEYID = 5
1,210,227 UART: [ldev] AUTHORITY.KEYID = 7
1,210,690 UART: [ldev] FE.KEYID = 1
1,215,734 UART: [ldev] Erasing FE.KEYID = 1
1,241,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,147 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,017 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,723 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,949 UART: [ldev] --
1,281,251 UART: [fwproc] Wait for Commands...
1,282,010 UART: [fwproc] Recv command 0x46574c44
1,282,743 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,212 >>> mbox cmd response: success
2,799,270 UART: [afmc] ++
2,799,438 UART: [afmc] CDI.KEYID = 6
2,799,801 UART: [afmc] SUBJECT.KEYID = 7
2,800,227 UART: [afmc] AUTHORITY.KEYID = 5
2,835,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,601 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,320 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,213 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,920 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,837 UART: [afmc] --
2,878,730 UART: [cold-reset] --
2,879,584 UART: [state] Locking Datavault
2,880,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,341 UART: [state] Locking ICCM
2,881,885 UART: [exit] Launching FMC @ 0x40000130
2,887,214 UART:
2,887,230 UART: Running Caliptra FMC ...
2,887,638 UART:
2,887,692 UART: [state] CFI Enabled
2,898,471 UART: [fht] FMC Alias Private Key: 7
3,006,234 UART: [art] Extend RT PCRs Done
3,006,662 UART: [art] Lock RT PCRs Done
3,008,022 UART: [art] Populate DV Done
3,016,392 UART: [fht] FMC Alias Private Key: 7
3,017,372 UART: [art] Derive CDI
3,017,652 UART: [art] Store in in slot 0x4
3,103,419 UART: [art] Derive Key Pair
3,103,779 UART: [art] Store priv key in slot 0x5
3,116,589 UART: [art] Derive Key Pair - Done
3,131,369 UART: [art] Signing Cert with AUTHO
3,131,849 UART: RITY.KEYID = 7
3,147,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,062 UART: [art] PUB.X = 592861E661F4CA070A6BC62B50AE129AC08248C856A41F8EBD72BE93DFA787E36BC058C5B41285CD6B169DEDE5BBCD9E
3,154,844 UART: [art] PUB.Y = D44DC77D628C4D888F820FBA183F41AD7C0A25036A34DB142313384AC9F4346025403E76AA57799950DFF9E84AAAF444
3,161,787 UART: [art] SIG.R = 2DCAF57E5C34FCDC88C1177E4C889357072BE0FB1A7E43B025064988EBD163AC49FC3D6DF07739716B2CC9C5D9CF1B6B
3,168,567 UART: [art] SIG.S = 0C8D5A71A21797A1F9EC3E60E45A651B3D8CEFAEF907FF3F867885F3C9D0EECA119A3CB1FB33AE1561B9B4AF53B075B0
3,193,138 UART: Caliptra RT
3,193,391 UART: [state] CFI Enabled
3,300,821 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,577 UART:
3,301,593 UART: Running Caliptra ROM ...
3,302,001 UART:
3,302,056 UART: [state] CFI Enabled
3,304,633 UART: [state] LifecycleState = Production
3,305,241 UART: [state] DebugLocked = Yes
3,305,805 UART: [state] Starting the WD Timer 40000000 cycles
3,307,468 UART: [kat] SHA2-256
4,111,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,147 UART: [kat] ++
4,115,299 UART: [kat] sha1
4,119,383 UART: [kat] SHA2-256
4,121,323 UART: [kat] SHA2-384
4,124,290 UART: [kat] SHA2-512-ACC
4,126,191 UART: [kat] ECC-384
4,136,122 UART: [kat] HMAC-384Kdf
4,140,826 UART: [kat] LMS
4,389,138 UART: [kat] --
4,389,978 UART: [warm-reset] ++
4,390,973 UART: [warm-reset] --
4,391,592 UART: [state] Locking Datavault
4,392,438 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,042 UART: [state] Locking ICCM
4,393,564 UART: [exit] Launching FMC @ 0x40000130
4,398,893 UART:
4,398,909 UART: Running Caliptra FMC ...
4,399,317 UART:
4,399,371 UART: [state] CFI Enabled
4,400,416 UART: [aliasrt :skip pcr extension
4,400,889 UART: [art] Extend RT PCRs Done
4,401,317 UART: [art] Lock RT PCRs Done
4,402,678 UART: [art] Populate DV Done
4,410,858 UART: [fht] FMC Alias Private Key: 7
4,411,840 UART: [art] Derive CDI
4,412,120 UART: [art] Store in in slot 0x4
4,498,015 UART: [art] Derive Key Pair
4,498,375 UART: [art] Store priv key in slot 0x5
4,510,893 UART: [art] Derive Key Pair - Done
4,525,715 UART: [art] Signing Cert with AUTHO
4,526,195 UART: RITY.KEYID = 7
4,541,711 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,476 UART: [art] PUB.X = 592861E661F4CA070A6BC62B50AE129AC08248C856A41F8EBD72BE93DFA787E36BC058C5B41285CD6B169DEDE5BBCD9E
4,549,258 UART: [art] PUB.Y = D44DC77D628C4D888F820FBA183F41AD7C0A25036A34DB142313384AC9F4346025403E76AA57799950DFF9E84AAAF444
4,556,201 UART: [art] SIG.R = 2DCAF57E5C34FCDC88C1177E4C889357072BE0FB1A7E43B025064988EBD163AC49FC3D6DF07739716B2CC9C5D9CF1B6B
4,562,981 UART: [art] SIG.S = 0C8D5A71A21797A1F9EC3E60E45A651B3D8CEFAEF907FF3F867885F3C9D0EECA119A3CB1FB33AE1561B9B4AF53B075B0
4,586,758 UART: Caliptra RT
4,587,011 UART: [state] CFI Enabled
4,870,243 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,737 UART: [state] LifecycleState = Production
85,345 UART: [state] DebugLocked = Yes
86,015 UART: [state] Starting the WD Timer 40000000 cycles
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,174,366 ready_for_fw is high
1,174,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,664 UART: [ldev] ++
1,209,832 UART: [ldev] CDI.KEYID = 6
1,210,196 UART: [ldev] SUBJECT.KEYID = 5
1,210,623 UART: [ldev] AUTHORITY.KEYID = 7
1,211,086 UART: [ldev] FE.KEYID = 1
1,216,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,007 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,877 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,583 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,615 UART: [ldev] --
1,280,983 UART: [fwproc] Wait for Commands...
1,281,556 UART: [fwproc] Recv command 0x46574c44
1,282,289 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,795,820 >>> mbox cmd response: success
2,796,852 UART: [afmc] ++
2,797,020 UART: [afmc] CDI.KEYID = 6
2,797,383 UART: [afmc] SUBJECT.KEYID = 7
2,797,809 UART: [afmc] AUTHORITY.KEYID = 5
2,833,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,529 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,248 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,141 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,848 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,821 UART: [afmc] --
2,876,896 UART: [cold-reset] --
2,877,870 UART: [state] Locking Datavault
2,879,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,671 UART: [state] Locking ICCM
2,880,247 UART: [exit] Launching FMC @ 0x40000130
2,885,576 UART:
2,885,592 UART: Running Caliptra FMC ...
2,886,000 UART:
2,886,054 UART: [state] CFI Enabled
2,896,295 UART: [fht] FMC Alias Private Key: 7
3,003,538 UART: [art] Extend RT PCRs Done
3,003,966 UART: [art] Lock RT PCRs Done
3,005,516 UART: [art] Populate DV Done
3,013,622 UART: [fht] FMC Alias Private Key: 7
3,014,564 UART: [art] Derive CDI
3,014,844 UART: [art] Store in in slot 0x4
3,100,501 UART: [art] Derive Key Pair
3,100,861 UART: [art] Store priv key in slot 0x5
3,113,959 UART: [art] Derive Key Pair - Done
3,128,770 UART: [art] Signing Cert with AUTHO
3,129,250 UART: RITY.KEYID = 7
3,144,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,243 UART: [art] PUB.X = 6A46A1793CCEB67424A7046F5FAEB1C9E765461B51DE940638F11E849E880CBE9A7F6B225922F4997E95CE5AEF601C77
3,152,010 UART: [art] PUB.Y = AAEFA0C4A2F418CC0060E289D46C664BCDB025DA0E5519E275BC6ECD634F291E6134D6C61EAD9695369DEA1EE589B515
3,158,951 UART: [art] SIG.R = 27F09F09AAD9626ABF4AA1AF1D1AAC39A6773CD3A97BA205C0321D32101EFD7F1E4647FDAB09EC99A7D5A4121767442E
3,165,728 UART: [art] SIG.S = 944E590AB458AD0988B42B2EB216BD29313FCA77951F0F59AA64D515D82F38788DD421EF9C5580E7E1291362EC70829D
3,190,222 UART: Caliptra RT
3,190,475 UART: [state] CFI Enabled
3,299,084 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,840 UART:
3,299,856 UART: Running Caliptra ROM ...
3,300,264 UART:
3,300,319 UART: [state] CFI Enabled
3,302,826 UART: [state] LifecycleState = Production
3,303,434 UART: [state] DebugLocked = Yes
3,303,946 UART: [state] Starting the WD Timer 40000000 cycles
3,305,497 UART: [kat] SHA2-256
4,109,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,176 UART: [kat] ++
4,113,328 UART: [kat] sha1
4,117,660 UART: [kat] SHA2-256
4,119,600 UART: [kat] SHA2-384
4,122,235 UART: [kat] SHA2-512-ACC
4,124,136 UART: [kat] ECC-384
4,133,709 UART: [kat] HMAC-384Kdf
4,138,203 UART: [kat] LMS
4,386,515 UART: [kat] --
4,387,387 UART: [warm-reset] ++
4,388,512 UART: [warm-reset] --
4,389,227 UART: [state] Locking Datavault
4,390,171 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,775 UART: [state] Locking ICCM
4,391,403 UART: [exit] Launching FMC @ 0x40000130
4,396,732 UART:
4,396,748 UART: Running Caliptra FMC ...
4,397,156 UART:
4,397,210 UART: [state] CFI Enabled
4,398,549 UART: [aliasrt :skip pcr extension
4,399,022 UART: [art] Extend RT PCRs Done
4,399,450 UART: [art] Lock RT PCRs Done
4,400,581 UART: [art] Populate DV Done
4,408,633 UART: [fht] FMC Alias Private Key: 7
4,409,715 UART: [art] Derive CDI
4,409,995 UART: [art] Store in in slot 0x4
4,495,870 UART: [art] Derive Key Pair
4,496,230 UART: [art] Store priv key in slot 0x5
4,509,778 UART: [art] Derive Key Pair - Done
4,524,835 UART: [art] Signing Cert with AUTHO
4,525,315 UART: RITY.KEYID = 7
4,540,537 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,302 UART: [art] PUB.X = 6A46A1793CCEB67424A7046F5FAEB1C9E765461B51DE940638F11E849E880CBE9A7F6B225922F4997E95CE5AEF601C77
4,548,069 UART: [art] PUB.Y = AAEFA0C4A2F418CC0060E289D46C664BCDB025DA0E5519E275BC6ECD634F291E6134D6C61EAD9695369DEA1EE589B515
4,555,010 UART: [art] SIG.R = 27F09F09AAD9626ABF4AA1AF1D1AAC39A6773CD3A97BA205C0321D32101EFD7F1E4647FDAB09EC99A7D5A4121767442E
4,561,787 UART: [art] SIG.S = 944E590AB458AD0988B42B2EB216BD29313FCA77951F0F59AA64D515D82F38788DD421EF9C5580E7E1291362EC70829D
4,585,635 UART: Caliptra RT
4,585,888 UART: [state] CFI Enabled
4,863,635 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Production
86,232 UART: [state] DebugLocked = Yes
86,786 UART: [state] Starting the WD Timer 40000000 cycles
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,839 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,808 UART: [cold-reset] ++
1,171,275 UART: [fht] FHT @ 0x50003400
1,173,953 UART: [idev] ++
1,174,121 UART: [idev] CDI.KEYID = 6
1,174,482 UART: [idev] SUBJECT.KEYID = 7
1,174,907 UART: [idev] UDS.KEYID = 0
1,175,253 ready_for_fw is high
1,175,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,158 UART: [idev] Erasing UDS.KEYID = 0
1,199,873 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,142 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,718 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,806 UART: [ldev] --
1,283,154 UART: [fwproc] Wait for Commands...
1,283,919 UART: [fwproc] Recv command 0x46574c44
1,284,652 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,437 >>> mbox cmd response: success
2,800,695 UART: [afmc] ++
2,800,863 UART: [afmc] CDI.KEYID = 6
2,801,226 UART: [afmc] SUBJECT.KEYID = 7
2,801,652 UART: [afmc] AUTHORITY.KEYID = 5
2,837,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,602 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,321 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,214 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,921 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,794 UART: [afmc] --
2,880,835 UART: [cold-reset] --
2,881,737 UART: [state] Locking Datavault
2,882,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,442 UART: [state] Locking ICCM
2,883,886 UART: [exit] Launching FMC @ 0x40000130
2,889,215 UART:
2,889,231 UART: Running Caliptra FMC ...
2,889,639 UART:
2,889,782 UART: [state] CFI Enabled
2,900,369 UART: [fht] FMC Alias Private Key: 7
3,008,086 UART: [art] Extend RT PCRs Done
3,008,514 UART: [art] Lock RT PCRs Done
3,010,244 UART: [art] Populate DV Done
3,018,670 UART: [fht] FMC Alias Private Key: 7
3,019,812 UART: [art] Derive CDI
3,020,092 UART: [art] Store in in slot 0x4
3,106,037 UART: [art] Derive Key Pair
3,106,397 UART: [art] Store priv key in slot 0x5
3,119,589 UART: [art] Derive Key Pair - Done
3,134,408 UART: [art] Signing Cert with AUTHO
3,134,888 UART: RITY.KEYID = 7
3,150,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,777 UART: [art] PUB.X = D7758C6701781B39196715934D38C14B45BBB2D03A46815D78EE8C5C44DDC1B7EB70B156887FAD097FB7DD16B0D8D777
3,157,545 UART: [art] PUB.Y = EC7149BDD12DD2322829308AFB4BD18E420F31BA483FEB448B7E6996B3A77E29A1091723BF3E97ED6B6DC17EA3AC1515
3,164,501 UART: [art] SIG.R = 4064D1B0DECEF72F5E29CE727108375AC0984DEA01C8F142A6C8CA4DA32AB874564A3487FBA31C92BB88CF9121F7BDF1
3,171,281 UART: [art] SIG.S = 8280E244FA58867CAE6230435A1722AFD680F04484C8279211294FEEFA986063E386D50FD77D9A80FE71C115C9BD177D
3,195,313 UART: Caliptra RT
3,195,658 UART: [state] CFI Enabled
3,304,081 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,837 UART:
3,304,853 UART: Running Caliptra ROM ...
3,305,261 UART:
3,305,403 UART: [state] CFI Enabled
3,308,326 UART: [state] LifecycleState = Production
3,308,934 UART: [state] DebugLocked = Yes
3,309,518 UART: [state] Starting the WD Timer 40000000 cycles
3,311,035 UART: [kat] SHA2-256
4,114,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,714 UART: [kat] ++
4,118,866 UART: [kat] sha1
4,123,082 UART: [kat] SHA2-256
4,125,022 UART: [kat] SHA2-384
4,127,675 UART: [kat] SHA2-512-ACC
4,129,576 UART: [kat] ECC-384
4,139,327 UART: [kat] HMAC-384Kdf
4,143,987 UART: [kat] LMS
4,392,299 UART: [kat] --
4,393,021 UART: [warm-reset] ++
4,393,972 UART: [warm-reset] --
4,394,771 UART: [state] Locking Datavault
4,395,443 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,047 UART: [state] Locking ICCM
4,396,545 UART: [exit] Launching FMC @ 0x40000130
4,401,874 UART:
4,401,890 UART: Running Caliptra FMC ...
4,402,298 UART:
4,402,441 UART: [state] CFI Enabled
4,403,918 UART: [aliasrt :skip pcr extension
4,404,391 UART: [art] Extend RT PCRs Done
4,404,819 UART: [art] Lock RT PCRs Done
4,405,982 UART: [art] Populate DV Done
4,414,212 UART: [fht] FMC Alias Private Key: 7
4,415,236 UART: [art] Derive CDI
4,415,516 UART: [art] Store in in slot 0x4
4,501,255 UART: [art] Derive Key Pair
4,501,615 UART: [art] Store priv key in slot 0x5
4,515,455 UART: [art] Derive Key Pair - Done
4,529,956 UART: [art] Signing Cert with AUTHO
4,530,436 UART: RITY.KEYID = 7
4,545,436 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,201 UART: [art] PUB.X = D7758C6701781B39196715934D38C14B45BBB2D03A46815D78EE8C5C44DDC1B7EB70B156887FAD097FB7DD16B0D8D777
4,552,969 UART: [art] PUB.Y = EC7149BDD12DD2322829308AFB4BD18E420F31BA483FEB448B7E6996B3A77E29A1091723BF3E97ED6B6DC17EA3AC1515
4,559,925 UART: [art] SIG.R = 4064D1B0DECEF72F5E29CE727108375AC0984DEA01C8F142A6C8CA4DA32AB874564A3487FBA31C92BB88CF9121F7BDF1
4,566,705 UART: [art] SIG.S = 8280E244FA58867CAE6230435A1722AFD680F04484C8279211294FEEFA986063E386D50FD77D9A80FE71C115C9BD177D
4,590,403 UART: Caliptra RT
4,590,748 UART: [state] CFI Enabled
4,871,703 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Production
86,056 UART: [state] DebugLocked = Yes
86,754 UART: [state] Starting the WD Timer 40000000 cycles
88,317 UART: [kat] SHA2-256
891,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,441 UART: [kat] LMS
1,169,753 UART: [kat] --
1,170,838 UART: [cold-reset] ++
1,171,247 UART: [fht] FHT @ 0x50003400
1,173,715 UART: [idev] ++
1,173,883 UART: [idev] CDI.KEYID = 6
1,174,244 UART: [idev] SUBJECT.KEYID = 7
1,174,669 UART: [idev] UDS.KEYID = 0
1,175,015 ready_for_fw is high
1,175,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,513 UART: [ldev] Erasing FE.KEYID = 1
1,241,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,008 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,878 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,584 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,648 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,617 >>> mbox cmd response: success
2,797,731 UART: [afmc] ++
2,797,899 UART: [afmc] CDI.KEYID = 6
2,798,262 UART: [afmc] SUBJECT.KEYID = 7
2,798,688 UART: [afmc] AUTHORITY.KEYID = 5
2,834,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,512 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,231 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,124 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,831 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,806 UART: [afmc] --
2,877,835 UART: [cold-reset] --
2,878,731 UART: [state] Locking Datavault
2,879,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,554 UART: [state] Locking ICCM
2,881,186 UART: [exit] Launching FMC @ 0x40000130
2,886,515 UART:
2,886,531 UART: Running Caliptra FMC ...
2,886,939 UART:
2,887,082 UART: [state] CFI Enabled
2,897,527 UART: [fht] FMC Alias Private Key: 7
3,005,232 UART: [art] Extend RT PCRs Done
3,005,660 UART: [art] Lock RT PCRs Done
3,007,552 UART: [art] Populate DV Done
3,015,894 UART: [fht] FMC Alias Private Key: 7
3,017,028 UART: [art] Derive CDI
3,017,308 UART: [art] Store in in slot 0x4
3,103,365 UART: [art] Derive Key Pair
3,103,725 UART: [art] Store priv key in slot 0x5
3,117,113 UART: [art] Derive Key Pair - Done
3,132,163 UART: [art] Signing Cert with AUTHO
3,132,643 UART: RITY.KEYID = 7
3,147,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,440 UART: [art] PUB.X = 343F3ED7D84251D16CAE96CA65752201F1F3B5436DF622C6A8DD14F400D2E9F7B2430904202473C619D69F1B01435A53
3,155,172 UART: [art] PUB.Y = 21831D0AD8702038891B0411D27CF9A17CA4D277E5A38250A45AEC4F0AC6ED3F92FAFBBC3F342E7523B2457AB512A32F
3,162,123 UART: [art] SIG.R = 5208FA26AB1AA329BFC584106C3BC26FFBC90E20759234E0EA541A53659F5E670C27BF6C6E1882E168E4E580EF5E462C
3,168,892 UART: [art] SIG.S = 4AAC32FFD969CE68D27FA92CCA9603EACFF4ACA0BA966F133ABFB4C2E3BB7098FDC35C96F98326531976EEFD44C0CB39
3,192,662 UART: Caliptra RT
3,193,007 UART: [state] CFI Enabled
3,301,211 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,967 UART:
3,301,983 UART: Running Caliptra ROM ...
3,302,391 UART:
3,302,533 UART: [state] CFI Enabled
3,305,490 UART: [state] LifecycleState = Production
3,306,098 UART: [state] DebugLocked = Yes
3,306,804 UART: [state] Starting the WD Timer 40000000 cycles
3,308,365 UART: [kat] SHA2-256
4,111,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,044 UART: [kat] ++
4,116,196 UART: [kat] sha1
4,120,592 UART: [kat] SHA2-256
4,122,532 UART: [kat] SHA2-384
4,125,421 UART: [kat] SHA2-512-ACC
4,127,322 UART: [kat] ECC-384
4,136,975 UART: [kat] HMAC-384Kdf
4,141,571 UART: [kat] LMS
4,389,883 UART: [kat] --
4,390,803 UART: [warm-reset] ++
4,391,728 UART: [warm-reset] --
4,392,587 UART: [state] Locking Datavault
4,393,389 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,993 UART: [state] Locking ICCM
4,394,555 UART: [exit] Launching FMC @ 0x40000130
4,399,884 UART:
4,399,900 UART: Running Caliptra FMC ...
4,400,308 UART:
4,400,451 UART: [state] CFI Enabled
4,401,952 UART: [aliasrt :skip pcr extension
4,402,425 UART: [art] Extend RT PCRs Done
4,402,853 UART: [art] Lock RT PCRs Done
4,404,182 UART: [art] Populate DV Done
4,412,546 UART: [fht] FMC Alias Private Key: 7
4,413,506 UART: [art] Derive CDI
4,413,786 UART: [art] Store in in slot 0x4
4,499,235 UART: [art] Derive Key Pair
4,499,595 UART: [art] Store priv key in slot 0x5
4,512,471 UART: [art] Derive Key Pair - Done
4,526,937 UART: [art] Signing Cert with AUTHO
4,527,417 UART: RITY.KEYID = 7
4,542,753 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,518 UART: [art] PUB.X = 343F3ED7D84251D16CAE96CA65752201F1F3B5436DF622C6A8DD14F400D2E9F7B2430904202473C619D69F1B01435A53
4,550,250 UART: [art] PUB.Y = 21831D0AD8702038891B0411D27CF9A17CA4D277E5A38250A45AEC4F0AC6ED3F92FAFBBC3F342E7523B2457AB512A32F
4,557,201 UART: [art] SIG.R = 5208FA26AB1AA329BFC584106C3BC26FFBC90E20759234E0EA541A53659F5E670C27BF6C6E1882E168E4E580EF5E462C
4,563,970 UART: [art] SIG.S = 4AAC32FFD969CE68D27FA92CCA9603EACFF4ACA0BA966F133ABFB4C2E3BB7098FDC35C96F98326531976EEFD44C0CB39
4,587,786 UART: Caliptra RT
4,588,131 UART: [state] CFI Enabled
4,871,927 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = Yes
86,587 UART: [state] Starting the WD Timer 1000000 cycles
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,699 UART: [kat] ++
895,851 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,900 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
1,090,341 UART: WDT Expired
1,090,550 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008EE6 ra=0x000086A8 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = Yes
86,796 UART: [state] Starting the WD Timer 1000000 cycles
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,518 UART: [kat] SHA2-256
902,458 UART: [kat] SHA2-384
905,241 UART: [kat] SHA2-512-ACC
907,142 UART: [kat] ECC-384
917,243 UART: [kat] HMAC-384Kdf
921,845 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,109 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2EA ra=0x00008132 error_internal_intr_r=00000040
1,090,554 UART: WDT Expired
1,090,763 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2EA ra=0x00008132 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = Yes
86,197 UART: [state] Starting the WD Timer 1000000 cycles
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,510 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079D4 ra=0x00008150 error_internal_intr_r=00000040
1,089,951 UART: WDT Expired
1,090,160 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079D4 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000781A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = Yes
86,880 UART: [state] Starting the WD Timer 1000000 cycles
88,499 UART: [kat] SHA2-256
892,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,178 UART: [kat] ++
896,330 UART: [kat] sha1
900,758 UART: [kat] SHA2-256
902,698 UART: [kat] SHA2-384
905,469 UART: [kat] SHA2-512-ACC
907,370 UART: [kat] ECC-384
917,075 UART: [kat] HMAC-384Kdf
921,677 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,193 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000814A ra=0x00008150 error_internal_intr_r=00000040
1,090,634 UART: WDT Expired
1,090,843 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000814A ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CC ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = Yes
86,609 UART: [state] Starting the WD Timer 1000000 cycles
88,174 UART: [kat] SHA2-256
891,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,393 UART: [kat] SHA2-256
902,333 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,312 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,922 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
1,090,363 UART: WDT Expired
1,090,572 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000781E ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = Yes
86,424 UART: [state] Starting the WD Timer 1000000 cycles
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,737 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
1,090,178 UART: WDT Expired
1,090,387 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000780C ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = Yes
86,781 UART: [state] Starting the WD Timer 40000000 cycles
88,342 UART: [kat] SHA2-256
891,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,021 UART: [kat] ++
896,173 UART: [kat] sha1
900,507 UART: [kat] SHA2-256
902,447 UART: [kat] SHA2-384
905,274 UART: [kat] SHA2-512-ACC
907,175 UART: [kat] ECC-384
917,032 UART: [kat] HMAC-384Kdf
921,652 UART: [kat] LMS
1,169,964 UART: [kat] --
1,170,693 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,175,030 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,567 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,111 UART: [idev] --
1,209,202 UART: [ldev] ++
1,209,370 UART: [ldev] CDI.KEYID = 6
1,209,734 UART: [ldev] SUBJECT.KEYID = 5
1,210,161 UART: [ldev] AUTHORITY.KEYID = 7
1,210,624 UART: [ldev] FE.KEYID = 1
1,215,664 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,223 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,093 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,799 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,941 UART: [ldev] --
1,281,455 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,700 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,304 >>> mbox cmd response: success
2,741,344 UART: [afmc] ++
2,741,512 UART: [afmc] CDI.KEYID = 6
2,741,875 UART: [afmc] SUBJECT.KEYID = 7
2,742,301 UART: [afmc] AUTHORITY.KEYID = 5
2,777,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,926 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,800,639 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,806,510 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,812,220 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,820,306 UART: [afmc] --
2,821,247 UART: [cold-reset] --
2,821,971 UART: [state] Locking Datavault
2,822,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,510 UART: [state] Locking ICCM
2,824,036 UART: [exit] Launching FMC @ 0x40000000
2,829,333 UART:
2,829,349 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,245 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,046 >>> mbox cmd response: success
2,652,440 UART:
2,652,456 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = Yes
86,640 UART: [state] Starting the WD Timer 40000000 cycles
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,390 UART: [kat] SHA2-256
902,330 UART: [kat] SHA2-384
905,143 UART: [kat] SHA2-512-ACC
907,044 UART: [kat] ECC-384
916,749 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,174,597 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,742 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,612 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,318 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,272 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,309 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,065 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,657 >>> mbox cmd response: success
2,742,885 UART: [afmc] ++
2,743,053 UART: [afmc] CDI.KEYID = 6
2,743,416 UART: [afmc] SUBJECT.KEYID = 7
2,743,842 UART: [afmc] AUTHORITY.KEYID = 5
2,779,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,271 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,984 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,855 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,565 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,541 UART: [afmc] --
2,822,614 UART: [cold-reset] --
2,823,256 UART: [state] Locking Datavault
2,824,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,909 UART: [state] Locking ICCM
2,825,401 UART: [exit] Launching FMC @ 0x40000000
2,830,698 UART:
2,830,714 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,446 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,413 >>> mbox cmd response: success
2,653,821 UART:
2,653,837 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = Yes
86,277 UART: [state] Starting the WD Timer 40000000 cycles
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,787 UART: [idev] --
1,209,792 UART: [ldev] ++
1,209,960 UART: [ldev] CDI.KEYID = 6
1,210,324 UART: [ldev] SUBJECT.KEYID = 5
1,210,751 UART: [ldev] AUTHORITY.KEYID = 7
1,211,214 UART: [ldev] FE.KEYID = 1
1,216,518 UART: [ldev] Erasing FE.KEYID = 1
1,242,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,385 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,255 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,961 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,955 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,076 UART: [fwproc] Recv command 0x46574c44
1,282,809 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,834 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,256 >>> mbox cmd response: success
2,742,324 UART: [afmc] ++
2,742,492 UART: [afmc] CDI.KEYID = 6
2,742,855 UART: [afmc] SUBJECT.KEYID = 7
2,743,281 UART: [afmc] AUTHORITY.KEYID = 5
2,778,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,094 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,807 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,678 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,388 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,270 UART: [afmc] --
2,822,363 UART: [cold-reset] --
2,823,121 UART: [state] Locking Datavault
2,823,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,554 UART: [state] Locking ICCM
2,825,018 UART: [exit] Launching FMC @ 0x40000000
2,830,315 UART:
2,830,331 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,608 >>> mbox cmd response: success
2,652,544 UART:
2,652,560 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,354 UART: [state] DebugLocked = Yes
86,008 UART: [state] Starting the WD Timer 40000000 cycles
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,137 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,689 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,217,077 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,142 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,718 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,846 UART: [ldev] --
1,283,248 UART: [fwproc] Wait for Commands...
1,283,997 UART: [fwproc] Recv command 0x46574c44
1,284,730 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,043 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,617 >>> mbox cmd response: success
2,743,729 UART: [afmc] ++
2,743,897 UART: [afmc] CDI.KEYID = 6
2,744,260 UART: [afmc] SUBJECT.KEYID = 7
2,744,686 UART: [afmc] AUTHORITY.KEYID = 5
2,780,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,867 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,803,580 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,809,451 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,815,161 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,822,807 UART: [afmc] --
2,823,720 UART: [cold-reset] --
2,824,612 UART: [state] Locking Datavault
2,825,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,381 UART: [state] Locking ICCM
2,826,845 UART: [exit] Launching FMC @ 0x40000000
2,832,142 UART:
2,832,158 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,530 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,319 >>> mbox cmd response: success
2,654,169 UART:
2,654,185 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,671 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = Yes
85,905 UART: [state] Starting the WD Timer 40000000 cycles
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,276 UART: [kat] LMS
1,168,588 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,169,918 UART: [fht] FHT @ 0x50003400
1,172,482 UART: [idev] ++
1,172,650 UART: [idev] CDI.KEYID = 6
1,173,011 UART: [idev] SUBJECT.KEYID = 7
1,173,436 UART: [idev] UDS.KEYID = 0
1,173,782 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,661 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,355 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,225 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,931 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,527 UART: [fwproc] Wait for Commands...
1,281,188 UART: [fwproc] Recv command 0x46574c44
1,281,921 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,648 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,222 >>> mbox cmd response: success
2,740,304 UART: [afmc] ++
2,740,472 UART: [afmc] CDI.KEYID = 6
2,740,835 UART: [afmc] SUBJECT.KEYID = 7
2,741,261 UART: [afmc] AUTHORITY.KEYID = 5
2,776,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,432 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,799,145 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,805,016 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,810,726 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,818,580 UART: [afmc] --
2,819,463 UART: [cold-reset] --
2,820,147 UART: [state] Locking Datavault
2,821,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,836 UART: [state] Locking ICCM
2,822,394 UART: [exit] Launching FMC @ 0x40000000
2,827,691 UART:
2,827,707 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,470 >>> mbox cmd response: success
2,653,082 UART:
2,653,098 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = Yes
86,690 UART: [state] Starting the WD Timer 40000000 cycles
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,368 UART: [kat] SHA2-256
902,308 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
917,007 UART: [kat] HMAC-384Kdf
921,579 UART: [kat] LMS
1,169,891 UART: [kat] --
1,171,008 UART: [cold-reset] ++
1,171,353 UART: [fht] FHT @ 0x50003400
1,174,035 UART: [idev] ++
1,174,203 UART: [idev] CDI.KEYID = 6
1,174,564 UART: [idev] SUBJECT.KEYID = 7
1,174,989 UART: [idev] UDS.KEYID = 0
1,175,335 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,352 UART: [idev] Erasing UDS.KEYID = 0
1,200,039 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,780 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,650 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,356 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,494 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,725 UART: [fwproc] Recv command 0x46574c44
1,284,458 UART: [fwproc] Recv'd Img size: 111916 bytes
2,555,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,703 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,145 >>> mbox cmd response: success
2,745,175 UART: [afmc] ++
2,745,343 UART: [afmc] CDI.KEYID = 6
2,745,706 UART: [afmc] SUBJECT.KEYID = 7
2,746,132 UART: [afmc] AUTHORITY.KEYID = 5
2,782,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,341 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,805,054 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,810,925 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,816,635 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,824,385 UART: [afmc] --
2,825,298 UART: [cold-reset] --
2,826,060 UART: [state] Locking Datavault
2,827,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,827 UART: [state] Locking ICCM
2,828,419 UART: [exit] Launching FMC @ 0x40000000
2,833,716 UART:
2,833,732 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,294 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,071 >>> mbox cmd response: success
2,654,753 UART:
2,654,769 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,532 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,206,685 UART: [idev] CSR upload begun
1,208,464 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,151 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,859 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,744 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,450 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,879 UART: [idev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
1,296,376 UART: [idev] CSR uploaded
1,299,421 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,590 UART: [idev] --
1,300,827 UART: [ldev] ++
1,300,995 UART: [ldev] CDI.KEYID = 6
1,301,359 UART: [ldev] SUBJECT.KEYID = 5
1,301,786 UART: [ldev] AUTHORITY.KEYID = 7
1,302,249 UART: [ldev] FE.KEYID = 1
1,307,383 UART: [ldev] Erasing FE.KEYID = 1
1,333,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,535 UART: [ldev] --
1,372,939 UART: [fwproc] Wait for Commands...
1,373,532 UART: [fwproc] Recv command 0x49444352
1,378,661 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,816 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,157,602 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,939 UART: [kat] LMS
1,169,251 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] CSR upload begun
1,210,071 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,438 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,146 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,031 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,737 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,166 UART: [idev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
1,297,663 UART: [idev] CSR uploaded
1,300,708 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,877 UART: [idev] --
1,301,902 UART: [ldev] ++
1,302,070 UART: [ldev] CDI.KEYID = 6
1,302,434 UART: [ldev] SUBJECT.KEYID = 5
1,302,861 UART: [ldev] AUTHORITY.KEYID = 7
1,303,324 UART: [ldev] FE.KEYID = 1
1,308,316 UART: [ldev] Erasing FE.KEYID = 1
1,334,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,818 UART: [ldev] --
1,374,094 UART: [fwproc] Wait for Commands...
1,374,677 UART: [fwproc] Recv command 0x49444352
1,379,806 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,997 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,907 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,513 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] CSR upload begun
1,209,704 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,457 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,165 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,050 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,756 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,185 UART: [idev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
1,297,682 UART: [idev] CSR uploaded
1,300,727 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,896 UART: [idev] --
1,301,837 UART: [ldev] ++
1,302,005 UART: [ldev] CDI.KEYID = 6
1,302,369 UART: [ldev] SUBJECT.KEYID = 5
1,302,796 UART: [ldev] AUTHORITY.KEYID = 7
1,303,259 UART: [ldev] FE.KEYID = 1
1,308,611 UART: [ldev] Erasing FE.KEYID = 1
1,335,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,325 UART: [ldev] --
1,374,729 UART: [fwproc] Wait for Commands...
1,375,470 UART: [fwproc] Recv command 0x49444352
1,380,599 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,224 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,170 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
917,039 UART: [kat] HMAC-384Kdf
921,617 UART: [kat] LMS
1,169,929 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,224 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] CSR upload begun
1,209,793 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,894 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,602 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,487 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,193 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,622 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,119 UART: [idev] CSR uploaded
1,301,164 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,333 UART: [idev] --
1,302,162 UART: [ldev] ++
1,302,330 UART: [ldev] CDI.KEYID = 6
1,302,694 UART: [ldev] SUBJECT.KEYID = 5
1,303,121 UART: [ldev] AUTHORITY.KEYID = 7
1,303,584 UART: [ldev] FE.KEYID = 1
1,309,014 UART: [ldev] Erasing FE.KEYID = 1
1,335,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,976 UART: [ldev] --
1,374,456 UART: [fwproc] Wait for Commands...
1,375,233 UART: [fwproc] Recv command 0x49444352
1,380,362 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,389 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,945 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
85,933 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,278 UART: [kat] HMAC-384Kdf
919,844 UART: [kat] LMS
1,168,156 UART: [kat] --
1,168,905 UART: [cold-reset] ++
1,169,245 UART: [fht] FHT @ 0x50003400
1,171,919 UART: [idev] ++
1,172,087 UART: [idev] CDI.KEYID = 6
1,172,448 UART: [idev] SUBJECT.KEYID = 7
1,172,873 UART: [idev] UDS.KEYID = 0
1,181,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,453 UART: [idev] CSR upload begun
1,208,232 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,161 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,869 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,754 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,460 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,889 UART: [idev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
1,296,386 UART: [idev] CSR uploaded
1,299,431 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,600 UART: [idev] --
1,300,619 UART: [ldev] ++
1,300,787 UART: [ldev] CDI.KEYID = 6
1,301,151 UART: [ldev] SUBJECT.KEYID = 5
1,301,578 UART: [ldev] AUTHORITY.KEYID = 7
1,302,041 UART: [ldev] FE.KEYID = 1
1,307,123 UART: [ldev] Erasing FE.KEYID = 1
1,333,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,995 UART: [ldev] --
1,372,397 UART: [fwproc] Wait for Commands...
1,373,160 UART: [fwproc] Recv command 0x49444352
1,378,289 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,984 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,612 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,342 UART: [kat] SHA2-256
902,282 UART: [kat] SHA2-384
904,967 UART: [kat] SHA2-512-ACC
906,868 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,250 UART: [idev] Sha1 KeyId Algorithm
1,207,558 UART: [idev] CSR upload begun
1,209,337 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,028 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,736 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,621 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,327 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,756 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,253 UART: [idev] CSR uploaded
1,300,298 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,467 UART: [idev] --
1,301,642 UART: [ldev] ++
1,301,810 UART: [ldev] CDI.KEYID = 6
1,302,174 UART: [ldev] SUBJECT.KEYID = 5
1,302,601 UART: [ldev] AUTHORITY.KEYID = 7
1,303,064 UART: [ldev] FE.KEYID = 1
1,308,144 UART: [ldev] Erasing FE.KEYID = 1
1,334,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,760 UART: [ldev] --
1,374,138 UART: [fwproc] Wait for Commands...
1,374,737 UART: [fwproc] Recv command 0x49444352
1,379,866 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,187 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,069 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
890,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,917 UART: [kat] ++
895,069 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,768 UART: [kat] SHA2-512-ACC
905,669 UART: [kat] ECC-384
915,200 UART: [kat] HMAC-384Kdf
919,804 UART: [kat] LMS
1,168,116 UART: [kat] --
1,169,007 UART: [cold-reset] ++
1,169,431 UART: [fht] FHT @ 0x50003400
1,171,861 UART: [idev] ++
1,172,029 UART: [idev] CDI.KEYID = 6
1,172,390 UART: [idev] SUBJECT.KEYID = 7
1,172,815 UART: [idev] UDS.KEYID = 0
1,173,161 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,180,503 UART: [idev] Erasing UDS.KEYID = 0
1,197,799 UART: [idev] Sha1 KeyId Algorithm
1,206,753 UART: [idev] --
1,207,788 UART: [ldev] ++
1,207,956 UART: [ldev] CDI.KEYID = 6
1,208,320 UART: [ldev] SUBJECT.KEYID = 5
1,208,747 UART: [ldev] AUTHORITY.KEYID = 7
1,209,210 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,632 UART: [fwproc] Wait for Commands...
1,281,213 UART: [fwproc] Recv command 0x49444352
1,282,819 UART: ROM Fatal Error: 0x0102000A
1,283,980 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,552 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,175,074 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,741 UART: [ldev] SUBJECT.KEYID = 5
1,211,168 UART: [ldev] AUTHORITY.KEYID = 7
1,211,631 UART: [ldev] FE.KEYID = 1
1,217,043 UART: [ldev] Erasing FE.KEYID = 1
1,243,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,567 UART: [ldev] --
1,282,895 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x49444352
1,285,004 UART: ROM Fatal Error: 0x0102000A
1,286,165 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,069 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,729 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,208,177 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,748 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x49444352
1,283,765 UART: ROM Fatal Error: 0x0102000A
1,284,926 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,628 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,462 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,765 UART: [kat] HMAC-384Kdf
920,319 UART: [kat] LMS
1,168,631 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,556 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,794 UART: [idev] --
1,208,705 UART: [ldev] ++
1,208,873 UART: [ldev] CDI.KEYID = 6
1,209,237 UART: [ldev] SUBJECT.KEYID = 5
1,209,664 UART: [ldev] AUTHORITY.KEYID = 7
1,210,127 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,293 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x49444352
1,283,640 UART: ROM Fatal Error: 0x0102000A
1,284,801 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,215 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,429 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,197,977 UART: [idev] Sha1 KeyId Algorithm
1,206,875 UART: [idev] --
1,208,022 UART: [ldev] ++
1,208,190 UART: [ldev] CDI.KEYID = 6
1,208,554 UART: [ldev] SUBJECT.KEYID = 5
1,208,981 UART: [ldev] AUTHORITY.KEYID = 7
1,209,444 UART: [ldev] FE.KEYID = 1
1,214,498 UART: [ldev] Erasing FE.KEYID = 1
1,240,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,654 UART: [ldev] --
1,280,112 UART: [fwproc] Wait for Commands...
1,280,781 UART: [fwproc] Recv command 0x49444352
1,282,621 UART: ROM Fatal Error: 0x0102000A
1,283,782 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,000 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,092 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,823 UART: [state] LifecycleState = Unprovisioned
85,478 UART: [state] DebugLocked = No
86,010 UART: [state] WD Timer not started. Device not locked for debugging
87,185 UART: [kat] SHA2-256
890,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,864 UART: [kat] ++
895,016 UART: [kat] sha1
899,302 UART: [kat] SHA2-256
901,242 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,732 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,208,038 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,241,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,723 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x49444352
1,283,398 UART: ROM Fatal Error: 0x0102000A
1,284,559 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,131 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,787 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,847 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 ready_for_fw is high
1,480,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,538 UART: [idev] Erasing UDS.KEYID = 0
1,504,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,430 UART: [idev] --
1,514,299 UART: [ldev] ++
1,514,467 UART: [ldev] CDI.KEYID = 6
1,514,830 UART: [ldev] SUBJECT.KEYID = 5
1,515,256 UART: [ldev] AUTHORITY.KEYID = 7
1,515,719 UART: [ldev] FE.KEYID = 1
1,520,851 UART: [ldev] Erasing FE.KEYID = 1
1,546,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,024 UART: [ldev] --
1,586,307 UART: [fwproc] Waiting for Commands...
1,586,984 UART: [fwproc] Received command 0x46574c44
1,587,775 UART: [fwproc] Received Image of size 114332 bytes
2,886,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,922 >>> mbox cmd response: success
3,079,950 UART: [afmc] ++
3,080,118 UART: [afmc] CDI.KEYID = 6
3,080,480 UART: [afmc] SUBJECT.KEYID = 7
3,080,905 UART: [afmc] AUTHORITY.KEYID = 5
3,115,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,894 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,402 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,287 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,977 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,906 UART: [afmc] --
3,158,794 UART: [cold-reset] --
3,159,744 UART: [state] Locking Datavault
3,161,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,607 UART: [state] Locking ICCM
3,162,029 UART: [exit] Launching FMC @ 0x40000130
3,167,358 UART:
3,167,374 UART: Running Caliptra FMC ...
3,167,782 UART:
3,167,836 UART: [state] CFI Enabled
3,178,391 UART: [fht] FMC Alias Private Key: 7
3,286,192 UART: [art] Extend RT PCRs Done
3,286,620 UART: [art] Lock RT PCRs Done
3,288,100 UART: [art] Populate DV Done
3,296,323 UART: [fht] FMC Alias Private Key: 7
3,297,445 UART: [art] Derive CDI
3,297,725 UART: [art] Store in in slot 0x4
3,383,496 UART: [art] Derive Key Pair
3,383,856 UART: [art] Store priv key in slot 0x5
3,397,008 UART: [art] Derive Key Pair - Done
3,411,615 UART: [art] Signing Cert with AUTHO
3,412,095 UART: RITY.KEYID = 7
3,427,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,056 UART: [art] PUB.X = 2DB21BB2FD234EDC969667175D54208014156CBCC514E984E03AC6111A9D353C92B904B7323B44FD19ED36C39D80B050
3,434,823 UART: [art] PUB.Y = 751D931E023E70BF2337616D8CBF2F014431EE599682E5B83208242B3A79D9BE95F86CEE8576B9B6E0B767BC850E7759
3,441,759 UART: [art] SIG.R = EE8CABCAF06998E44F3BDAD5F4E31606BBEEB9FDC20E1B8348996D34A3D50FC9007E9C0877A0A07B3E3240DD578D3244
3,448,513 UART: [art] SIG.S = 1B80F81C5CA67A9393DF0404A5FBA94B86E3287A4948B88BA71F8C533641565CF4C21969176D5A68F4BEE14118698AB9
3,472,494 UART: Caliptra RT
3,472,747 UART: [state] CFI Enabled
3,581,012 UART: [rt] RT listening for mailbox commands...
3,581,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,504 UART: [rt]cmd =0x41544d4e, len=14344
4,014,918 >>> mbox cmd response data (8 bytes)
4,014,919 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,940 UART: [rt]cmd =0x41545348, len=116
4,067,469 >>> mbox cmd response data (12 bytes)
4,067,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,270 UART:
4,068,286 UART: Running Caliptra ROM ...
4,068,694 UART:
4,068,748 UART: [state] CFI Enabled
4,071,312 UART: [state] LifecycleState = Unprovisioned
4,071,967 UART: [state] DebugLocked = No
4,072,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,074,194 UART: [kat] SHA2-256
4,868,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,872,240 UART: [kat] ++
4,872,392 UART: [kat] sha1
4,876,578 UART: [kat] SHA2-256
4,878,516 UART: [kat] SHA2-384
4,881,311 UART: [kat] SHA2-512-ACC
4,883,211 UART: [kat] ECC-384
4,888,850 UART: [kat] HMAC-384Kdf
4,893,584 UART: [kat] LMS
5,461,780 UART: [kat] --
5,462,521 UART: [update-reset] ++
6,796,215 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,797,325 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,947,201 >>> mbox cmd response: success
6,947,201 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,947,496 UART: [update-reset] Copying MAN_2 To MAN_1
6,955,510 UART: [update-reset Success] --
6,956,503 UART: [state] Locking Datavault
6,957,125 UART: [state] Locking PCR0, PCR1 and PCR31
6,957,729 UART: [state] Locking ICCM
6,958,191 UART: [exit] Launching FMC @ 0x40000130
6,963,520 UART:
6,963,536 UART: Running Caliptra FMC ...
6,963,944 UART:
6,963,998 UART: [state] CFI Enabled
7,052,425 UART: [art] Extend RT PCRs Done
7,052,853 UART: [art] Lock RT PCRs Done
7,053,904 UART: [art] Populate DV Done
7,062,333 UART: [fht] FMC Alias Private Key: 7
7,063,295 UART: [art] Derive CDI
7,063,575 UART: [art] Store in in slot 0x4
7,149,416 UART: [art] Derive Key Pair
7,149,776 UART: [art] Store priv key in slot 0x5
7,163,002 UART: [art] Derive Key Pair - Done
7,177,702 UART: [art] Signing Cert with AUTHO
7,178,182 UART: RITY.KEYID = 7
7,193,612 UART: [art] Erasing AUTHORITY.KEYID = 7
7,194,377 UART: [art] PUB.X = 1C0E658925FF04BFA8DEAB0A1D4A3F420BD856CE841AA67072E3DE7BEEEBF131A2174682684B35F38B6A8E6CA7BBA11D
7,201,157 UART: [art] PUB.Y = 59FCDA719F1EC9E3AAE63488E2C511450CA634E5E747E3558467F895AD83F700E824C2C0C39F6F38838A6ED98E702A06
7,208,083 UART: [art] SIG.R = 4DB3BE20C2159ACF51B339D53AC88C097166BA6D077AEB20A7AD3C34BC9362025D2EDA885FFA4FA69A7ED86E3524E0F9
7,214,862 UART: [art] SIG.S = FEF5927AFA44C1F2434CEC859F2BC16437D640B02D22C840A24EA205883D5360E9BF068D81845509E1650773D6F108A9
7,238,536 UART: Caliptra RT
7,238,789 UART: [state] CFI Enabled
7,519,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,550,393 UART: [rt]cmd =0x41545348, len=116
7,571,990 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,639 ready_for_fw is high
1,361,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,134 >>> mbox cmd response: success
2,986,656 UART:
2,986,672 UART: Running Caliptra FMC ...
2,987,080 UART:
2,987,134 UART: [state] CFI Enabled
2,997,623 UART: [fht] FMC Alias Private Key: 7
3,105,726 UART: [art] Extend RT PCRs Done
3,106,154 UART: [art] Lock RT PCRs Done
3,107,790 UART: [art] Populate DV Done
3,115,999 UART: [fht] FMC Alias Private Key: 7
3,117,021 UART: [art] Derive CDI
3,117,301 UART: [art] Store in in slot 0x4
3,202,836 UART: [art] Derive Key Pair
3,203,196 UART: [art] Store priv key in slot 0x5
3,216,674 UART: [art] Derive Key Pair - Done
3,231,381 UART: [art] Signing Cert with AUTHO
3,231,861 UART: RITY.KEYID = 7
3,247,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,924 UART: [art] PUB.X = 4012F5A9061966B98BD0700A510CBFB4035D68980E71D9960B6E404CC7E7208F7C2FEF5A2E6B54A8D4BB89C97CA417C5
3,254,682 UART: [art] PUB.Y = 1C4CCA609134FD961EAC1BF28CD18C64C44880F4C8AD893717D0A5C5692125BEF340245AB394E0132FF38A271DC4CA77
3,261,640 UART: [art] SIG.R = F0A6254EDCA2D6DA700FB4B3DCBD4933F1D8F9ABA9DA7824C8054183675ECF9B3BC85EA173E54CD73791AF1987CDD6B9
3,268,426 UART: [art] SIG.S = F24FF1D706271B75739D03ACBA4EFB494AC362F13879AB500F5A7A7FC5AC1E9AB416581F7772946F9D9EBCEE3C94C4C2
3,292,084 UART: Caliptra RT
3,292,337 UART: [state] CFI Enabled
3,400,279 UART: [rt] RT listening for mailbox commands...
3,400,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,175 UART: [rt]cmd =0x41544d4e, len=14344
3,834,031 >>> mbox cmd response data (8 bytes)
3,834,032 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,011 UART: [rt]cmd =0x41545348, len=116
3,885,552 >>> mbox cmd response data (12 bytes)
3,885,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,528 >>> mbox cmd response: success
6,648,528 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,661,989 UART:
6,662,005 UART: Running Caliptra FMC ...
6,662,413 UART:
6,662,467 UART: [state] CFI Enabled
6,751,246 UART: [art] Extend RT PCRs Done
6,751,674 UART: [art] Lock RT PCRs Done
6,752,835 UART: [art] Populate DV Done
6,760,828 UART: [fht] FMC Alias Private Key: 7
6,762,000 UART: [art] Derive CDI
6,762,280 UART: [art] Store in in slot 0x4
6,848,209 UART: [art] Derive Key Pair
6,848,569 UART: [art] Store priv key in slot 0x5
6,861,679 UART: [art] Derive Key Pair - Done
6,876,129 UART: [art] Signing Cert with AUTHO
6,876,609 UART: RITY.KEYID = 7
6,891,769 UART: [art] Erasing AUTHORITY.KEYID = 7
6,892,534 UART: [art] PUB.X = 0A0D4DF05D9AA1B4F73068DA3F3B158D922359110CAB91AB0E1F4D59BDB9FB61628C4B6AB50028B13087E59FDCD851F0
6,899,284 UART: [art] PUB.Y = ABB8A31EB057C2B0C6F83C684B7839037F6DBACF3E3B7451117EE0F57B0CD611451398EB602A696F8F6B1B40FF8A5BA5
6,906,242 UART: [art] SIG.R = D54313356B4E39EA8513CE5B95E0472957BCA0ADE05749EC65AF691C22B6D1BDB9200EB4A61AE3815B48BB86B36B7C7D
6,913,021 UART: [art] SIG.S = AD0339A7D89B25DA1AF161C46453C459AC629B2E7DA88DECBDECC7B0EC2E484DD559860A366E42D0F37B9FF02AD8347B
6,936,974 UART: Caliptra RT
6,937,227 UART: [state] CFI Enabled
7,214,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,245,128 UART: [rt]cmd =0x41545348, len=116
7,266,009 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
902,813 UART: [kat] HMAC-384Kdf
907,389 UART: [kat] LMS
1,475,585 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,625 UART: [idev] ++
1,479,793 UART: [idev] CDI.KEYID = 6
1,480,153 UART: [idev] SUBJECT.KEYID = 7
1,480,577 UART: [idev] UDS.KEYID = 0
1,480,922 ready_for_fw is high
1,480,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,335 UART: [idev] Erasing UDS.KEYID = 0
1,505,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,763 UART: [idev] --
1,514,948 UART: [ldev] ++
1,515,116 UART: [ldev] CDI.KEYID = 6
1,515,479 UART: [ldev] SUBJECT.KEYID = 5
1,515,905 UART: [ldev] AUTHORITY.KEYID = 7
1,516,368 UART: [ldev] FE.KEYID = 1
1,521,596 UART: [ldev] Erasing FE.KEYID = 1
1,547,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,081 UART: [ldev] --
1,586,396 UART: [fwproc] Waiting for Commands...
1,587,165 UART: [fwproc] Received command 0x46574c44
1,587,956 UART: [fwproc] Received Image of size 114332 bytes
2,886,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,605 >>> mbox cmd response: success
3,080,651 UART: [afmc] ++
3,080,819 UART: [afmc] CDI.KEYID = 6
3,081,181 UART: [afmc] SUBJECT.KEYID = 7
3,081,606 UART: [afmc] AUTHORITY.KEYID = 5
3,117,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,246 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,936 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,675 UART: [afmc] --
3,160,693 UART: [cold-reset] --
3,161,667 UART: [state] Locking Datavault
3,162,764 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,368 UART: [state] Locking ICCM
3,163,928 UART: [exit] Launching FMC @ 0x40000130
3,169,257 UART:
3,169,273 UART: Running Caliptra FMC ...
3,169,681 UART:
3,169,824 UART: [state] CFI Enabled
3,180,127 UART: [fht] FMC Alias Private Key: 7
3,288,082 UART: [art] Extend RT PCRs Done
3,288,510 UART: [art] Lock RT PCRs Done
3,290,120 UART: [art] Populate DV Done
3,298,569 UART: [fht] FMC Alias Private Key: 7
3,299,675 UART: [art] Derive CDI
3,299,955 UART: [art] Store in in slot 0x4
3,385,892 UART: [art] Derive Key Pair
3,386,252 UART: [art] Store priv key in slot 0x5
3,399,284 UART: [art] Derive Key Pair - Done
3,414,007 UART: [art] Signing Cert with AUTHO
3,414,487 UART: RITY.KEYID = 7
3,429,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,442 UART: [art] PUB.X = 6DB8222E0F404F992B4D6AD692FE59D4B8D949D69DC3D0F7ECFFBC097D210696FB7A384F41EDBF49871C26F3FC61A4CD
3,437,223 UART: [art] PUB.Y = 60A3E43EFD5AF93778D7FC780B57FFBD486AF05CB03872154C8B2951B3D9C02866B64B9E04C68B0750DA2314A58E98A8
3,444,170 UART: [art] SIG.R = 3EC15BA938FBD7AF22F5F6B9FF95B3A06FCB80DDE292AFB638F7260A3AF444A96E9084F9AF1D97EE4D0E5C7B34955464
3,450,954 UART: [art] SIG.S = EE49D3E7AD9C4C2AE9AAB92604F483D3956FF1648B26BD33A1287D11789DBF739EDE378DFB01B5E69647C12CE56B4393
3,474,479 UART: Caliptra RT
3,474,824 UART: [state] CFI Enabled
3,583,075 UART: [rt] RT listening for mailbox commands...
3,583,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,941 UART: [rt]cmd =0x41544d4e, len=14344
4,017,085 >>> mbox cmd response data (8 bytes)
4,017,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,151 UART: [rt]cmd =0x41545348, len=116
4,069,360 >>> mbox cmd response data (12 bytes)
4,069,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,221 UART:
4,070,237 UART: Running Caliptra ROM ...
4,070,645 UART:
4,070,786 UART: [state] CFI Enabled
4,073,564 UART: [state] LifecycleState = Unprovisioned
4,074,219 UART: [state] DebugLocked = No
4,074,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,076,422 UART: [kat] SHA2-256
4,870,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,874,468 UART: [kat] ++
4,874,620 UART: [kat] sha1
4,878,816 UART: [kat] SHA2-256
4,880,754 UART: [kat] SHA2-384
4,883,519 UART: [kat] SHA2-512-ACC
4,885,419 UART: [kat] ECC-384
4,890,842 UART: [kat] HMAC-384Kdf
4,895,444 UART: [kat] LMS
5,463,640 UART: [kat] --
5,464,621 UART: [update-reset] ++
6,798,441 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,799,531 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,949,407 >>> mbox cmd response: success
6,949,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,949,522 UART: [update-reset] Copying MAN_2 To MAN_1
6,957,536 UART: [update-reset Success] --
6,958,563 UART: [state] Locking Datavault
6,959,289 UART: [state] Locking PCR0, PCR1 and PCR31
6,959,893 UART: [state] Locking ICCM
6,960,445 UART: [exit] Launching FMC @ 0x40000130
6,965,774 UART:
6,965,790 UART: Running Caliptra FMC ...
6,966,198 UART:
6,966,341 UART: [state] CFI Enabled
7,055,064 UART: [art] Extend RT PCRs Done
7,055,492 UART: [art] Lock RT PCRs Done
7,056,599 UART: [art] Populate DV Done
7,064,848 UART: [fht] FMC Alias Private Key: 7
7,065,892 UART: [art] Derive CDI
7,066,172 UART: [art] Store in in slot 0x4
7,151,425 UART: [art] Derive Key Pair
7,151,785 UART: [art] Store priv key in slot 0x5
7,164,799 UART: [art] Derive Key Pair - Done
7,179,314 UART: [art] Signing Cert with AUTHO
7,179,794 UART: RITY.KEYID = 7
7,195,260 UART: [art] Erasing AUTHORITY.KEYID = 7
7,196,025 UART: [art] PUB.X = 35F26ECF080EEFEB0FAAAFCCB91F85E8FBC29DA4A96C01166E74D7FD6DC915BCFEFC793A82477AB82DB77CF1F15E40EE
7,202,819 UART: [art] PUB.Y = DA8D48908035A165D8DC8B3BC346ADE4399AE35E28BC36CB37FFC6EAE037A90C85FB0A1511B1CFB7A7F8AB4EA3B6AFBC
7,209,793 UART: [art] SIG.R = EC2867F03D3DF33C674518C0493A6D21E0FE3A6015CF94200F4DDF1C721AFA6F577C871827CEFE04A8CC30B2786854AC
7,216,567 UART: [art] SIG.S = 1D12AD4CB3ABFE8D76EE42F298B905015016678692ED1AACE91928C29CAA8DFF67234D2E55911D7008DCF6519FDFF298
7,240,079 UART: Caliptra RT
7,240,424 UART: [state] CFI Enabled
7,518,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,549,908 UART: [rt]cmd =0x41545348, len=116
7,572,259 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,500 ready_for_fw is high
1,362,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,861 >>> mbox cmd response: success
2,990,403 UART:
2,990,419 UART: Running Caliptra FMC ...
2,990,827 UART:
2,990,970 UART: [state] CFI Enabled
3,001,513 UART: [fht] FMC Alias Private Key: 7
3,109,052 UART: [art] Extend RT PCRs Done
3,109,480 UART: [art] Lock RT PCRs Done
3,111,130 UART: [art] Populate DV Done
3,119,321 UART: [fht] FMC Alias Private Key: 7
3,120,447 UART: [art] Derive CDI
3,120,727 UART: [art] Store in in slot 0x4
3,206,072 UART: [art] Derive Key Pair
3,206,432 UART: [art] Store priv key in slot 0x5
3,219,590 UART: [art] Derive Key Pair - Done
3,234,252 UART: [art] Signing Cert with AUTHO
3,234,732 UART: RITY.KEYID = 7
3,250,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,209 UART: [art] PUB.X = D64803311960C141102346CB1B66E7B70DD86159B5AC9BD11190863221EC8619D227FDE4B485BAE857EA1E419274081F
3,257,964 UART: [art] PUB.Y = DF64EAC5290CC27D611D36F68779D1A9EEB69B32C71145643C458183A257A9DF17210675A7F7EE7F5F0AE5D9A7BF4F68
3,264,913 UART: [art] SIG.R = 0C3E9AF6425F381CB5CBB3A6F6ACBD1E0FC4E69BE41A666CE4435F3EE9117CD95A528ACF568C1B7430C8CE06582B87C5
3,271,694 UART: [art] SIG.S = 8FFDEC7910AFA3E16A0423A125639F456FD85B6628A1DCFE9922512A6E4926A4F6008677D62FFD6FCFDF26CA8D11BE95
3,295,650 UART: Caliptra RT
3,295,995 UART: [state] CFI Enabled
3,403,686 UART: [rt] RT listening for mailbox commands...
3,404,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,318 UART: [rt]cmd =0x41544d4e, len=14344
3,837,962 >>> mbox cmd response data (8 bytes)
3,837,963 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,008 UART: [rt]cmd =0x41545348, len=116
3,889,873 >>> mbox cmd response data (12 bytes)
3,889,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,870 >>> mbox cmd response: success
6,651,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,664,971 UART:
6,664,987 UART: Running Caliptra FMC ...
6,665,395 UART:
6,665,538 UART: [state] CFI Enabled
6,754,715 UART: [art] Extend RT PCRs Done
6,755,143 UART: [art] Lock RT PCRs Done
6,756,324 UART: [art] Populate DV Done
6,764,743 UART: [fht] FMC Alias Private Key: 7
6,765,679 UART: [art] Derive CDI
6,765,959 UART: [art] Store in in slot 0x4
6,851,692 UART: [art] Derive Key Pair
6,852,052 UART: [art] Store priv key in slot 0x5
6,864,946 UART: [art] Derive Key Pair - Done
6,879,567 UART: [art] Signing Cert with AUTHO
6,880,047 UART: RITY.KEYID = 7
6,895,035 UART: [art] Erasing AUTHORITY.KEYID = 7
6,895,800 UART: [art] PUB.X = 60A2D28395C073FEF974EEB4750643F55AFD67FA2F225EE54C603EF5AAECF9A93B5BD0B21412DB47DA3AF181D9F8AE93
6,902,587 UART: [art] PUB.Y = FC7320A35937AEBF189CCC8B370DF7A15ABEE104BFC9721F469689A75691598D43038D60B968FEC02815CEE2C5167FCA
6,909,538 UART: [art] SIG.R = E8AADE61F1BEFB3880ED5FAB38558778BE429238E8A7917709DA69C20A8FDE27B91B7A4394B7E9D5DC889B7E0D307DB0
6,916,315 UART: [art] SIG.S = 268AB726727D43BC2BB1FF7ED6E97945713894AB1107DBA06D4DE36756D6183DF2A933359878C9B06666073C17F49CDE
6,939,496 UART: Caliptra RT
6,939,841 UART: [state] CFI Enabled
7,222,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,253,379 UART: [rt]cmd =0x41545348, len=116
7,276,362 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,780 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,172,001 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,120 UART: [idev] ++
1,175,288 UART: [idev] CDI.KEYID = 6
1,175,648 UART: [idev] SUBJECT.KEYID = 7
1,176,072 UART: [idev] UDS.KEYID = 0
1,176,417 ready_for_fw is high
1,176,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,994 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,447 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,602 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,067 >>> mbox cmd response: success
2,776,309 UART: [afmc] ++
2,776,477 UART: [afmc] CDI.KEYID = 6
2,776,839 UART: [afmc] SUBJECT.KEYID = 7
2,777,264 UART: [afmc] AUTHORITY.KEYID = 5
2,812,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,872 UART: [afmc] --
2,855,762 UART: [cold-reset] --
2,856,840 UART: [state] Locking Datavault
2,857,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,519 UART: [state] Locking ICCM
2,859,093 UART: [exit] Launching FMC @ 0x40000130
2,864,422 UART:
2,864,438 UART: Running Caliptra FMC ...
2,864,846 UART:
2,864,900 UART: [state] CFI Enabled
2,875,343 UART: [fht] FMC Alias Private Key: 7
2,983,062 UART: [art] Extend RT PCRs Done
2,983,490 UART: [art] Lock RT PCRs Done
2,985,276 UART: [art] Populate DV Done
2,993,557 UART: [fht] FMC Alias Private Key: 7
2,994,617 UART: [art] Derive CDI
2,994,897 UART: [art] Store in in slot 0x4
3,080,312 UART: [art] Derive Key Pair
3,080,672 UART: [art] Store priv key in slot 0x5
3,093,914 UART: [art] Derive Key Pair - Done
3,109,002 UART: [art] Signing Cert with AUTHO
3,109,482 UART: RITY.KEYID = 7
3,124,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,147 UART: [art] PUB.X = 8FBA711CA03C5C73EF3DCC288CF97EC8712E3517EB630355E50F6414D8C7EA50B815B397F929A4009837223D2E8B3F97
3,131,893 UART: [art] PUB.Y = 4F00ED4F3B5103D3C2FA5DB4051C169476F6C58BADB08BC3ACC6F0233E0AC25B6DC594BFC19246839D84AF7B61231FF6
3,138,828 UART: [art] SIG.R = 208C76E1303C8CB6EF0BF48E992FF2E6317DBF7205CE1C7C25AA31ECC0EAA872005D2EDD15757C4DE63320820AFEE1BC
3,145,587 UART: [art] SIG.S = A0025E5FE6A455D7B0C956E51EBAAA752E2B62574E0F7CED16A9B4B09B06E7E3011DEA3A5CA6ADBBDF9EE7CE4BE95FA7
3,169,416 UART: Caliptra RT
3,169,669 UART: [state] CFI Enabled
3,277,576 UART: [rt] RT listening for mailbox commands...
3,278,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,434 UART: [rt]cmd =0x41544d4e, len=14344
3,711,402 >>> mbox cmd response data (8 bytes)
3,711,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,472 UART: [rt]cmd =0x41545348, len=116
3,762,457 >>> mbox cmd response data (12 bytes)
3,762,458 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,003 UART:
3,763,019 UART: Running Caliptra ROM ...
3,763,427 UART:
3,763,482 UART: [state] CFI Enabled
3,766,376 UART: [state] LifecycleState = Unprovisioned
3,767,031 UART: [state] DebugLocked = No
3,767,555 UART: [state] WD Timer not started. Device not locked for debugging
3,768,721 UART: [kat] SHA2-256
4,574,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,578,496 UART: [kat] ++
4,578,648 UART: [kat] sha1
4,583,008 UART: [kat] SHA2-256
4,584,948 UART: [kat] SHA2-384
4,587,853 UART: [kat] SHA2-512-ACC
4,589,753 UART: [kat] ECC-384
4,599,780 UART: [kat] HMAC-384Kdf
4,604,260 UART: [kat] LMS
4,852,588 UART: [kat] --
4,853,418 UART: [update-reset] ++
6,165,766 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,166,759 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,316,583 >>> mbox cmd response: success
6,316,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,316,732 UART: [update-reset] Copying MAN_2 To MAN_1
6,324,746 UART: [update-reset Success] --
6,325,871 UART: [state] Locking Datavault
6,326,779 UART: [state] Locking PCR0, PCR1 and PCR31
6,327,383 UART: [state] Locking ICCM
6,327,907 UART: [exit] Launching FMC @ 0x40000130
6,333,236 UART:
6,333,252 UART: Running Caliptra FMC ...
6,333,660 UART:
6,333,714 UART: [state] CFI Enabled
6,423,139 UART: [art] Extend RT PCRs Done
6,423,567 UART: [art] Lock RT PCRs Done
6,424,814 UART: [art] Populate DV Done
6,432,927 UART: [fht] FMC Alias Private Key: 7
6,434,041 UART: [art] Derive CDI
6,434,321 UART: [art] Store in in slot 0x4
6,519,932 UART: [art] Derive Key Pair
6,520,292 UART: [art] Store priv key in slot 0x5
6,533,442 UART: [art] Derive Key Pair - Done
6,548,352 UART: [art] Signing Cert with AUTHO
6,548,832 UART: RITY.KEYID = 7
6,564,122 UART: [art] Erasing AUTHORITY.KEYID = 7
6,564,887 UART: [art] PUB.X = 89BA09FDEB4E3AD56EA3E23944C65C6A1CF51FB64AF68F4718C55364BB9B05372DF36F9CE32E72F06E493CB32C8FC282
6,571,667 UART: [art] PUB.Y = 7071DBF866460A643D356EFA111A0597B7DF8A5CC827FCD6621A673485949948B7D26180C43D33937B0D3BE93E031D4E
6,578,603 UART: [art] SIG.R = 9AA9C1C6EF06D810BB32AE672F3F88F630E558DD468F673DFD9F93782816D4150D684393CE2B6B2CB39A14CAB8E53AD6
6,585,379 UART: [art] SIG.S = C2D47D68714103716D60E232A36FF88A5CE461F1DCFBB3E5F4A08FFDA9C4BC3C9E4D04A8FADC573F350FA7559304EAAF
6,609,420 UART: Caliptra RT
6,609,673 UART: [state] CFI Enabled
6,890,595 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,596 UART: [rt]cmd =0x41545348, len=116
6,942,747 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,515 ready_for_fw is high
1,060,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,966 >>> mbox cmd response: success
2,687,122 UART:
2,687,138 UART: Running Caliptra FMC ...
2,687,546 UART:
2,687,600 UART: [state] CFI Enabled
2,698,169 UART: [fht] FMC Alias Private Key: 7
2,805,664 UART: [art] Extend RT PCRs Done
2,806,092 UART: [art] Lock RT PCRs Done
2,807,640 UART: [art] Populate DV Done
2,816,013 UART: [fht] FMC Alias Private Key: 7
2,817,105 UART: [art] Derive CDI
2,817,385 UART: [art] Store in in slot 0x4
2,903,084 UART: [art] Derive Key Pair
2,903,444 UART: [art] Store priv key in slot 0x5
2,916,322 UART: [art] Derive Key Pair - Done
2,930,971 UART: [art] Signing Cert with AUTHO
2,931,451 UART: RITY.KEYID = 7
2,946,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,394 UART: [art] PUB.X = 2C609D2E5CCF8BACF209FFC07281E0D707CDBE6FC990B44CAD8068A93B25E3892FD81848EC3D358E4F8692A187AD9573
2,954,172 UART: [art] PUB.Y = 450C296A4E8D5433852BEF4BD6E84DA85E050277C42F0C7245655C69ADA5D17BCF1825F1DB9F0C9A2CC4FC596A06A6B0
2,961,116 UART: [art] SIG.R = AB7A855D87C01424834E7EBD64C5F66E5EE6874EE4FF977D50DDC7CE3A1316F8863D418A755AC71FFF8E333C7E2796DF
2,967,900 UART: [art] SIG.S = 3111FEF8B8C5935B437536181F33B6B592847CD46D778932F7337DAB7D7D6D0E6CA6A189901494E2425E81158DD9068D
2,991,341 UART: Caliptra RT
2,991,594 UART: [state] CFI Enabled
3,099,717 UART: [rt] RT listening for mailbox commands...
3,100,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,283 UART: [rt]cmd =0x41544d4e, len=14344
3,533,221 >>> mbox cmd response data (8 bytes)
3,533,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,105 UART: [rt]cmd =0x41545348, len=116
3,584,760 >>> mbox cmd response data (12 bytes)
3,584,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,022,955 >>> mbox cmd response: success
6,022,955 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,036,805 UART:
6,036,821 UART: Running Caliptra FMC ...
6,037,229 UART:
6,037,283 UART: [state] CFI Enabled
6,126,422 UART: [art] Extend RT PCRs Done
6,126,850 UART: [art] Lock RT PCRs Done
6,128,001 UART: [art] Populate DV Done
6,136,102 UART: [fht] FMC Alias Private Key: 7
6,137,200 UART: [art] Derive CDI
6,137,480 UART: [art] Store in in slot 0x4
6,223,165 UART: [art] Derive Key Pair
6,223,525 UART: [art] Store priv key in slot 0x5
6,236,405 UART: [art] Derive Key Pair - Done
6,251,534 UART: [art] Signing Cert with AUTHO
6,252,014 UART: RITY.KEYID = 7
6,267,218 UART: [art] Erasing AUTHORITY.KEYID = 7
6,267,983 UART: [art] PUB.X = A73D5C9865B88BD598BE7900FFC3467F52A58F5845324219939417B353C0384BABBD25ED5A03B5AFA02F9BBFB8E803F3
6,274,733 UART: [art] PUB.Y = 55F0ADE7B762BF4184EDD9E21190569470BB4640C4284EE13C7297A16B4A2A31D64F9DEDBAF12CE930DD89C6A7B04932
6,281,693 UART: [art] SIG.R = EEE4B2A300C3E17E7B44BF130EBA75A58D50DB75162C5B250F103EDF96ADFDF9C248CA3DA53D78805013B04DD439D349
6,288,451 UART: [art] SIG.S = 1273F39116782A74E24FB6CEA5605C81A629114391DDB357072F7191CD92DE4978157789989CF0A9BBD09478EC3FBD89
6,312,253 UART: Caliptra RT
6,312,506 UART: [state] CFI Enabled
6,590,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,621,808 UART: [rt]cmd =0x41545348, len=116
6,643,779 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
893,225 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,350 UART: [kat] ++
897,502 UART: [kat] sha1
901,628 UART: [kat] SHA2-256
903,568 UART: [kat] SHA2-384
906,479 UART: [kat] SHA2-512-ACC
908,380 UART: [kat] ECC-384
918,617 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,363 UART: [idev] ++
1,175,531 UART: [idev] CDI.KEYID = 6
1,175,891 UART: [idev] SUBJECT.KEYID = 7
1,176,315 UART: [idev] UDS.KEYID = 0
1,176,660 ready_for_fw is high
1,176,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,343 UART: [idev] Erasing UDS.KEYID = 0
1,200,944 UART: [idev] Sha1 KeyId Algorithm
1,209,602 UART: [idev] --
1,210,574 UART: [ldev] ++
1,210,742 UART: [ldev] CDI.KEYID = 6
1,211,105 UART: [ldev] SUBJECT.KEYID = 5
1,211,531 UART: [ldev] AUTHORITY.KEYID = 7
1,211,994 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,890 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,284,107 UART: [fwproc] Recv command 0x46574c44
1,284,835 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,884 >>> mbox cmd response: success
2,775,140 UART: [afmc] ++
2,775,308 UART: [afmc] CDI.KEYID = 6
2,775,670 UART: [afmc] SUBJECT.KEYID = 7
2,776,095 UART: [afmc] AUTHORITY.KEYID = 5
2,811,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,087 UART: [afmc] --
2,854,967 UART: [cold-reset] --
2,855,745 UART: [state] Locking Datavault
2,856,892 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,496 UART: [state] Locking ICCM
2,857,976 UART: [exit] Launching FMC @ 0x40000130
2,863,305 UART:
2,863,321 UART: Running Caliptra FMC ...
2,863,729 UART:
2,863,872 UART: [state] CFI Enabled
2,874,579 UART: [fht] FMC Alias Private Key: 7
2,982,686 UART: [art] Extend RT PCRs Done
2,983,114 UART: [art] Lock RT PCRs Done
2,984,446 UART: [art] Populate DV Done
2,992,621 UART: [fht] FMC Alias Private Key: 7
2,993,721 UART: [art] Derive CDI
2,994,001 UART: [art] Store in in slot 0x4
3,080,082 UART: [art] Derive Key Pair
3,080,442 UART: [art] Store priv key in slot 0x5
3,094,010 UART: [art] Derive Key Pair - Done
3,108,652 UART: [art] Signing Cert with AUTHO
3,109,132 UART: RITY.KEYID = 7
3,125,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,805 UART: [art] PUB.X = A4654AE2B1D853DBEA12CC9F24B145C5DD3F25F0370519E70D92E6D9349356ABC25B3C515855041BB7D6850CFCD2E5ED
3,132,575 UART: [art] PUB.Y = FF09B769A9AB204DB9C8BC606D02004A62F394E8D15D67B8126A177C7EB66321401ED50A201AF53900BA397DCE334FB4
3,139,478 UART: [art] SIG.R = C01080CCD27CB2CB804D4ACC01D7035B93B9E29C007EE728A14B6A63CC2FE1A051C6C30AF3FA6B0FE8E42B21551A01CB
3,146,231 UART: [art] SIG.S = 421A8B0349744904077FA07950D3E1F89863A3C9D9EAB6E1C905EC5D1620C356288E02A99A2C2C991D6609EE46B3567D
3,170,262 UART: Caliptra RT
3,170,607 UART: [state] CFI Enabled
3,277,624 UART: [rt] RT listening for mailbox commands...
3,278,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,212 UART: [rt]cmd =0x41544d4e, len=14344
3,710,986 >>> mbox cmd response data (8 bytes)
3,710,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,056 UART: [rt]cmd =0x41545348, len=116
3,763,339 >>> mbox cmd response data (12 bytes)
3,763,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,169 UART:
3,764,185 UART: Running Caliptra ROM ...
3,764,593 UART:
3,764,735 UART: [state] CFI Enabled
3,767,373 UART: [state] LifecycleState = Unprovisioned
3,768,028 UART: [state] DebugLocked = No
3,768,728 UART: [state] WD Timer not started. Device not locked for debugging
3,769,888 UART: [kat] SHA2-256
4,575,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,579,663 UART: [kat] ++
4,579,815 UART: [kat] sha1
4,584,087 UART: [kat] SHA2-256
4,586,027 UART: [kat] SHA2-384
4,588,922 UART: [kat] SHA2-512-ACC
4,590,822 UART: [kat] ECC-384
4,600,619 UART: [kat] HMAC-384Kdf
4,605,231 UART: [kat] LMS
4,853,559 UART: [kat] --
4,854,685 UART: [update-reset] ++
6,164,855 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,165,830 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,315,654 >>> mbox cmd response: success
6,315,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,315,985 UART: [update-reset] Copying MAN_2 To MAN_1
6,323,999 UART: [update-reset Success] --
6,325,014 UART: [state] Locking Datavault
6,325,750 UART: [state] Locking PCR0, PCR1 and PCR31
6,326,354 UART: [state] Locking ICCM
6,326,792 UART: [exit] Launching FMC @ 0x40000130
6,332,121 UART:
6,332,137 UART: Running Caliptra FMC ...
6,332,545 UART:
6,332,688 UART: [state] CFI Enabled
6,421,989 UART: [art] Extend RT PCRs Done
6,422,417 UART: [art] Lock RT PCRs Done
6,423,820 UART: [art] Populate DV Done
6,432,057 UART: [fht] FMC Alias Private Key: 7
6,433,113 UART: [art] Derive CDI
6,433,393 UART: [art] Store in in slot 0x4
6,519,406 UART: [art] Derive Key Pair
6,519,766 UART: [art] Store priv key in slot 0x5
6,533,180 UART: [art] Derive Key Pair - Done
6,548,170 UART: [art] Signing Cert with AUTHO
6,548,650 UART: RITY.KEYID = 7
6,563,674 UART: [art] Erasing AUTHORITY.KEYID = 7
6,564,439 UART: [art] PUB.X = 8AB3CD78F366D1FBE2030DF780B5B3B129CDF8C25568B5F33F3279027051299A5799EE593E5D180F7FAB00C5A749D075
6,571,179 UART: [art] PUB.Y = D556E041871F10B1BD084CC243F7F45D4FF25A5B11FFF9EE36E3839CBFCF519A5995F78D12B167139AD79ACE854ADB67
6,578,140 UART: [art] SIG.R = B37E4693F72A5F610B6E80C834A5EFC1509C5FCA9CF3A4D6DB0AC760E7B51A3C182E7BC740693666BB00C59C37D5B440
6,584,894 UART: [art] SIG.S = 5CED9E831CCDD39E1719EE7A53530E3E9D313142BC7666A259E548C840EF935B8B7B2BCED9071243704261826EF01C07
6,609,016 UART: Caliptra RT
6,609,361 UART: [state] CFI Enabled
6,890,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,747 UART: [rt]cmd =0x41545348, len=116
6,944,194 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 ready_for_fw is high
1,060,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,821 >>> mbox cmd response: success
2,691,615 UART:
2,691,631 UART: Running Caliptra FMC ...
2,692,039 UART:
2,692,182 UART: [state] CFI Enabled
2,702,801 UART: [fht] FMC Alias Private Key: 7
2,811,232 UART: [art] Extend RT PCRs Done
2,811,660 UART: [art] Lock RT PCRs Done
2,813,212 UART: [art] Populate DV Done
2,821,483 UART: [fht] FMC Alias Private Key: 7
2,822,585 UART: [art] Derive CDI
2,822,865 UART: [art] Store in in slot 0x4
2,908,230 UART: [art] Derive Key Pair
2,908,590 UART: [art] Store priv key in slot 0x5
2,921,422 UART: [art] Derive Key Pair - Done
2,935,821 UART: [art] Signing Cert with AUTHO
2,936,301 UART: RITY.KEYID = 7
2,951,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,718 UART: [art] PUB.X = 3EB52260EBF4C777D1417A9DEAF945DE4D2A82F46D73C01FD84B9091C82906D298CBFE3B2246D6294658CCF44DE76A23
2,959,495 UART: [art] PUB.Y = 1B9D063D04471DB7EB6CE4D2B28F4045D1FE7810D8E34FE4D4261E94A8C4A0946D45B357FEB13F367A30828B22622DB7
2,966,445 UART: [art] SIG.R = 39CB026578CB14CD371865A4EF3D4DA9533BBD78D648FD16867EC54790306CFE9B2B6A2B548052156ACA387EF38B6856
2,973,216 UART: [art] SIG.S = D0B9E2130E8475FAF1DA092FE54F35B097C2CAE5FADBE31CADC7D488BD767EACA13BE5CE21CAE855CE023874708BC257
2,996,920 UART: Caliptra RT
2,997,265 UART: [state] CFI Enabled
3,105,512 UART: [rt] RT listening for mailbox commands...
3,106,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,198 UART: [rt]cmd =0x41544d4e, len=14344
3,539,354 >>> mbox cmd response data (8 bytes)
3,539,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,440 UART: [rt]cmd =0x41545348, len=116
3,592,407 >>> mbox cmd response data (12 bytes)
3,592,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,028,795 >>> mbox cmd response: success
6,028,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,042,365 UART:
6,042,381 UART: Running Caliptra FMC ...
6,042,789 UART:
6,042,932 UART: [state] CFI Enabled
6,132,067 UART: [art] Extend RT PCRs Done
6,132,495 UART: [art] Lock RT PCRs Done
6,133,588 UART: [art] Populate DV Done
6,141,899 UART: [fht] FMC Alias Private Key: 7
6,143,017 UART: [art] Derive CDI
6,143,297 UART: [art] Store in in slot 0x4
6,229,082 UART: [art] Derive Key Pair
6,229,442 UART: [art] Store priv key in slot 0x5
6,242,404 UART: [art] Derive Key Pair - Done
6,257,089 UART: [art] Signing Cert with AUTHO
6,257,569 UART: RITY.KEYID = 7
6,272,543 UART: [art] Erasing AUTHORITY.KEYID = 7
6,273,308 UART: [art] PUB.X = 614D8CFA8C73BF9BBD77ACF2BE361CD92B3CB0D710FA9AD30C9132B0D0F45691C79B8EA358A58CE5741414E0601DD4F0
6,280,093 UART: [art] PUB.Y = 8BF66AFD27BC896DF343268763E9AA79652C35DA61BA531EDD873DEB0223B915440EC3B5393A82190F6711C808E09247
6,287,031 UART: [art] SIG.R = C823BDBE386BBAFD021E702EE1423F55CAD9DB67ED669D6BC5297984B234CDF2DDD5A01AC82ED0072762FC1BB9460112
6,293,810 UART: [art] SIG.S = 160BAE0B44C27352DD612B5B5920F4DAC22169CF308F6739DE464B2A08D1768FCA0197BA2CAF4BADBE4C9E32A1C7AB84
6,317,635 UART: Caliptra RT
6,317,980 UART: [state] CFI Enabled
6,603,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,635,006 UART: [rt]cmd =0x41545348, len=116
6,657,201 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
891,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,717 UART: [kat] ++
895,869 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,340 UART: [kat] LMS
1,169,652 UART: [kat] --
1,170,805 UART: [cold-reset] ++
1,171,325 UART: [fht] FHT @ 0x50003400
1,174,127 UART: [idev] ++
1,174,295 UART: [idev] CDI.KEYID = 6
1,174,656 UART: [idev] SUBJECT.KEYID = 7
1,175,081 UART: [idev] UDS.KEYID = 0
1,175,427 ready_for_fw is high
1,175,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,033 UART: [idev] Erasing UDS.KEYID = 0
1,199,861 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,798 UART: [ldev] ++
1,209,966 UART: [ldev] CDI.KEYID = 6
1,210,330 UART: [ldev] SUBJECT.KEYID = 5
1,210,757 UART: [ldev] AUTHORITY.KEYID = 7
1,211,220 UART: [ldev] FE.KEYID = 1
1,216,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,170 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,193 >>> mbox cmd response: success
2,773,208 UART: [afmc] ++
2,773,376 UART: [afmc] CDI.KEYID = 6
2,773,739 UART: [afmc] SUBJECT.KEYID = 7
2,774,165 UART: [afmc] AUTHORITY.KEYID = 5
2,809,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,669 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,337 UART: [afmc] --
2,853,423 UART: [cold-reset] --
2,854,211 UART: [state] Locking Datavault
2,855,428 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,032 UART: [state] Locking ICCM
2,856,650 UART: [exit] Launching FMC @ 0x40000130
2,861,979 UART:
2,861,995 UART: Running Caliptra FMC ...
2,862,403 UART:
2,862,457 UART: [state] CFI Enabled
2,873,132 UART: [fht] FMC Alias Private Key: 7
2,981,057 UART: [art] Extend RT PCRs Done
2,981,485 UART: [art] Lock RT PCRs Done
2,983,033 UART: [art] Populate DV Done
2,991,194 UART: [fht] FMC Alias Private Key: 7
2,992,352 UART: [art] Derive CDI
2,992,632 UART: [art] Store in in slot 0x4
3,078,373 UART: [art] Derive Key Pair
3,078,733 UART: [art] Store priv key in slot 0x5
3,092,175 UART: [art] Derive Key Pair - Done
3,106,919 UART: [art] Signing Cert with AUTHO
3,107,399 UART: RITY.KEYID = 7
3,122,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,398 UART: [art] PUB.X = 1D58D2D48E9A0A1DA8AB9DFAB7AEA9E2AFDA617420CA2FA007FEE0A3F7A26E7FB9F250873CC572627B53B4BAD503C1F6
3,130,187 UART: [art] PUB.Y = C35B6D4B08E0465E2A8E05D64D51BB6D954EA72BDE4349F6BE6A769CCA8BEE1B1266189D40275F6DF4515DE1A0058DF9
3,137,142 UART: [art] SIG.R = 0B538BEE3BCE7B7FB42F1FFD2869354F7A72D48919A4229D5A023E0C766A2B797E490CB8FC41EEF6BFBC621B4AD512FB
3,143,920 UART: [art] SIG.S = 880786E1E1D72BBA2760F5F35B679C28EE990F6990FF2392D52E91492ABFEF264F7E47AB92FC16205727E880D9C46D91
3,167,271 UART: Caliptra RT
3,167,524 UART: [state] CFI Enabled
3,276,223 UART: [rt] RT listening for mailbox commands...
3,276,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,657 UART: [rt]cmd =0x41544d4e, len=14344
3,709,339 >>> mbox cmd response data (8 bytes)
3,709,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,533 UART: [rt]cmd =0x41545348, len=116
3,761,024 >>> mbox cmd response data (12 bytes)
3,761,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,880 UART:
3,761,896 UART: Running Caliptra ROM ...
3,762,304 UART:
3,762,359 UART: [state] CFI Enabled
3,765,473 UART: [state] LifecycleState = Unprovisioned
3,766,128 UART: [state] DebugLocked = No
3,766,704 UART: [state] WD Timer not started. Device not locked for debugging
3,767,958 UART: [kat] SHA2-256
4,571,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,575,637 UART: [kat] ++
4,575,789 UART: [kat] sha1
4,579,839 UART: [kat] SHA2-256
4,581,779 UART: [kat] SHA2-384
4,584,558 UART: [kat] SHA2-512-ACC
4,586,458 UART: [kat] ECC-384
4,595,999 UART: [kat] HMAC-384Kdf
4,600,597 UART: [kat] LMS
4,848,909 UART: [kat] --
4,849,645 UART: [update-reset] ++
6,162,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,163,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,313,711 >>> mbox cmd response: success
6,313,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,313,896 UART: [update-reset] Copying MAN_2 To MAN_1
6,321,910 UART: [update-reset Success] --
6,322,867 UART: [state] Locking Datavault
6,323,589 UART: [state] Locking PCR0, PCR1 and PCR31
6,324,193 UART: [state] Locking ICCM
6,324,747 UART: [exit] Launching FMC @ 0x40000130
6,330,076 UART:
6,330,092 UART: Running Caliptra FMC ...
6,330,500 UART:
6,330,554 UART: [state] CFI Enabled
6,419,683 UART: [art] Extend RT PCRs Done
6,420,111 UART: [art] Lock RT PCRs Done
6,421,608 UART: [art] Populate DV Done
6,429,971 UART: [fht] FMC Alias Private Key: 7
6,431,023 UART: [art] Derive CDI
6,431,303 UART: [art] Store in in slot 0x4
6,516,546 UART: [art] Derive Key Pair
6,516,906 UART: [art] Store priv key in slot 0x5
6,530,472 UART: [art] Derive Key Pair - Done
6,545,334 UART: [art] Signing Cert with AUTHO
6,545,814 UART: RITY.KEYID = 7
6,561,174 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,939 UART: [art] PUB.X = 03A8A7D3EC5A29E4E85053F6A604AA68E7144DA1478DB1DFF8B2489A25576D6B60B46EFA52970D896017421A4CA92613
6,568,702 UART: [art] PUB.Y = C52A5551479A21CACCBF190F93E43D586A36897FF05D3A1A9E99EBE4DA9F84B36A9CEA002EA81EAAE258FAAA9BB0FE89
6,575,653 UART: [art] SIG.R = ECC53064A5BC5172E4B413B3E75E03D4DA6315AF2F3D0ACF2E7A47AD001B7C62D508A0D02D5BA9503B191AB0A75F0B8B
6,582,407 UART: [art] SIG.S = EF9FA4B9831F5921EBA37B2C310CD05FC61A6ABE2486977A36173727134EE1904A17FFD2E8B9A02C8B62D09CC614A3FB
6,605,861 UART: Caliptra RT
6,606,114 UART: [state] CFI Enabled
6,883,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,913,875 UART: [rt]cmd =0x41545348, len=116
6,936,120 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,174 ready_for_fw is high
1,056,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,319 >>> mbox cmd response: success
2,683,609 UART:
2,683,625 UART: Running Caliptra FMC ...
2,684,033 UART:
2,684,087 UART: [state] CFI Enabled
2,694,510 UART: [fht] FMC Alias Private Key: 7
2,802,723 UART: [art] Extend RT PCRs Done
2,803,151 UART: [art] Lock RT PCRs Done
2,804,307 UART: [art] Populate DV Done
2,812,212 UART: [fht] FMC Alias Private Key: 7
2,813,148 UART: [art] Derive CDI
2,813,428 UART: [art] Store in in slot 0x4
2,899,123 UART: [art] Derive Key Pair
2,899,483 UART: [art] Store priv key in slot 0x5
2,912,609 UART: [art] Derive Key Pair - Done
2,927,723 UART: [art] Signing Cert with AUTHO
2,928,203 UART: RITY.KEYID = 7
2,943,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,040 UART: [art] PUB.X = 6489A6AF8D9E3DA313A2D287D0CFC4B62953647EDCB5315F06C6D9C4B9345AF5BF4426167D4020E90E11FDF1C7A7D7D3
2,950,816 UART: [art] PUB.Y = C5D2A8BFCF007DC01A580A6326E80BA182BD2737D810FD735E8481E9374E819EFD01E021A823A3F1C0E92EF3FC8FC964
2,957,747 UART: [art] SIG.R = A90BC28CC096CDB679939655DA29880549D6AE575C72CC7AE5E91A333BFC8A90851C05F591782013BC74B02C215A93C9
2,964,510 UART: [art] SIG.S = 5B691767E994EAAA3D21F7047E0E05BB1B3313CF5E86DAA5272DA86E015ADA5C55429C78575CBAECCCD006013B8BA1B2
2,988,097 UART: Caliptra RT
2,988,350 UART: [state] CFI Enabled
3,096,651 UART: [rt] RT listening for mailbox commands...
3,097,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,241 UART: [rt]cmd =0x41544d4e, len=14344
3,530,325 >>> mbox cmd response data (8 bytes)
3,530,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,649 UART: [rt]cmd =0x41545348, len=116
3,582,358 >>> mbox cmd response data (12 bytes)
3,582,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,144 >>> mbox cmd response: success
6,016,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,029,464 UART:
6,029,480 UART: Running Caliptra FMC ...
6,029,888 UART:
6,029,942 UART: [state] CFI Enabled
6,118,781 UART: [art] Extend RT PCRs Done
6,119,209 UART: [art] Lock RT PCRs Done
6,120,522 UART: [art] Populate DV Done
6,128,571 UART: [fht] FMC Alias Private Key: 7
6,129,623 UART: [art] Derive CDI
6,129,903 UART: [art] Store in in slot 0x4
6,215,554 UART: [art] Derive Key Pair
6,215,914 UART: [art] Store priv key in slot 0x5
6,229,408 UART: [art] Derive Key Pair - Done
6,244,405 UART: [art] Signing Cert with AUTHO
6,244,885 UART: RITY.KEYID = 7
6,260,133 UART: [art] Erasing AUTHORITY.KEYID = 7
6,260,898 UART: [art] PUB.X = C0E4A7B8256099D28F48E785BE2F551173F3F209B0B7FF7F58654B7EEBCB27556FAE7B884E4D63B995BF49F355201CB2
6,267,673 UART: [art] PUB.Y = D41CF25DC7376A5870A69775FD51A351425E76FD129ACD05D8FA6FC1C49CA02933100A72CF36D8715338E294AD2EE59B
6,274,623 UART: [art] SIG.R = A675C4D5B7E256327BC7E4815774C0166DE2BCE09FA738A15CA9D1835A437D4D2FCB4DF978952EFD6122122901B427F6
6,281,394 UART: [art] SIG.S = D13BE5A4524F495398180C2CC380857DF8EF1D19E5D6327BA60347C3C982472C9FD817DCB1E7489069BDB7A483B839F8
6,304,551 UART: Caliptra RT
6,304,804 UART: [state] CFI Enabled
6,586,380 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,617,061 UART: [rt]cmd =0x41545348, len=116
6,638,754 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,174,858 ready_for_fw is high
1,174,858 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,353 UART: [fwproc] Wait for Commands...
1,283,146 UART: [fwproc] Recv command 0x46574c44
1,283,879 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,244 >>> mbox cmd response: success
2,775,457 UART: [afmc] ++
2,775,625 UART: [afmc] CDI.KEYID = 6
2,775,988 UART: [afmc] SUBJECT.KEYID = 7
2,776,414 UART: [afmc] AUTHORITY.KEYID = 5
2,812,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,820 UART: [afmc] --
2,855,788 UART: [cold-reset] --
2,856,562 UART: [state] Locking Datavault
2,857,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,155 UART: [state] Locking ICCM
2,858,623 UART: [exit] Launching FMC @ 0x40000130
2,863,952 UART:
2,863,968 UART: Running Caliptra FMC ...
2,864,376 UART:
2,864,519 UART: [state] CFI Enabled
2,875,166 UART: [fht] FMC Alias Private Key: 7
2,982,861 UART: [art] Extend RT PCRs Done
2,983,289 UART: [art] Lock RT PCRs Done
2,984,845 UART: [art] Populate DV Done
2,992,886 UART: [fht] FMC Alias Private Key: 7
2,993,926 UART: [art] Derive CDI
2,994,206 UART: [art] Store in in slot 0x4
3,080,101 UART: [art] Derive Key Pair
3,080,461 UART: [art] Store priv key in slot 0x5
3,093,837 UART: [art] Derive Key Pair - Done
3,108,801 UART: [art] Signing Cert with AUTHO
3,109,281 UART: RITY.KEYID = 7
3,124,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,234 UART: [art] PUB.X = D9AE179D324C31AE606C085E4D564CD7CD6AE5265E37E6D1E2B77D615A3BB4A1CDDF5754309FDF0A35BBBAAB7CD4AEBA
3,132,028 UART: [art] PUB.Y = 9C856B38910739570A5E007913ADADB73E287F4B7D9061A7EB864850C7091ED11855B9465E5A51751CEF638C6CCB7C70
3,138,945 UART: [art] SIG.R = B8C6E9BFED54E351A299FF6E39E0ED2241517008C5251A4CDF4595C8A6032EF0C8B0E00E82569BC44DCFEDEF8A7ADE12
3,145,726 UART: [art] SIG.S = B83E2DC7DCC9B356C5533778F0E3EB5B597E3EAA1ECFA0C27E04CD0CE5ACE38711868DE9F256DFFA9DD0C9844C5C75CC
3,169,173 UART: Caliptra RT
3,169,518 UART: [state] CFI Enabled
3,276,536 UART: [rt] RT listening for mailbox commands...
3,277,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,942 UART: [rt]cmd =0x41544d4e, len=14344
3,709,832 >>> mbox cmd response data (8 bytes)
3,709,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,772 UART: [rt]cmd =0x41545348, len=116
3,761,967 >>> mbox cmd response data (12 bytes)
3,761,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,545 UART:
3,762,561 UART: Running Caliptra ROM ...
3,762,969 UART:
3,763,111 UART: [state] CFI Enabled
3,766,117 UART: [state] LifecycleState = Unprovisioned
3,766,772 UART: [state] DebugLocked = No
3,767,336 UART: [state] WD Timer not started. Device not locked for debugging
3,768,684 UART: [kat] SHA2-256
4,572,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,576,363 UART: [kat] ++
4,576,515 UART: [kat] sha1
4,580,889 UART: [kat] SHA2-256
4,582,829 UART: [kat] SHA2-384
4,585,394 UART: [kat] SHA2-512-ACC
4,587,294 UART: [kat] ECC-384
4,596,799 UART: [kat] HMAC-384Kdf
4,601,579 UART: [kat] LMS
4,849,891 UART: [kat] --
4,850,631 UART: [update-reset] ++
6,162,638 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,163,815 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,313,639 >>> mbox cmd response: success
6,313,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,313,950 UART: [update-reset] Copying MAN_2 To MAN_1
6,321,964 UART: [update-reset Success] --
6,323,055 UART: [state] Locking Datavault
6,323,951 UART: [state] Locking PCR0, PCR1 and PCR31
6,324,555 UART: [state] Locking ICCM
6,325,005 UART: [exit] Launching FMC @ 0x40000130
6,330,334 UART:
6,330,350 UART: Running Caliptra FMC ...
6,330,758 UART:
6,330,901 UART: [state] CFI Enabled
6,419,936 UART: [art] Extend RT PCRs Done
6,420,364 UART: [art] Lock RT PCRs Done
6,421,847 UART: [art] Populate DV Done
6,430,182 UART: [fht] FMC Alias Private Key: 7
6,431,354 UART: [art] Derive CDI
6,431,634 UART: [art] Store in in slot 0x4
6,517,603 UART: [art] Derive Key Pair
6,517,963 UART: [art] Store priv key in slot 0x5
6,530,755 UART: [art] Derive Key Pair - Done
6,545,480 UART: [art] Signing Cert with AUTHO
6,545,960 UART: RITY.KEYID = 7
6,561,068 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,833 UART: [art] PUB.X = 050DCB08C6EA05126B9431C5E0F681897B0DFF3549D88F6EFCBA0DAB87FD1C50D7371FB21436300E486894D0731042D5
6,568,586 UART: [art] PUB.Y = 97E61611C54DD7EF7DFA9EE80D2DF58409BAAB464B9268B5DD8DEDA07700DB4A614C45765FBF8F8C7BEEA50A60A0D271
6,575,527 UART: [art] SIG.R = BC745FF3F715E284AA906F0971DB414ADB16CE6CD7DC49C7D5F7EDFC23DF6F8B3D26833B12A595EDC17C24F368EEAFF5
6,582,320 UART: [art] SIG.S = 38E233D874A6E2DBB0536BE578B024511E45A8CA872D8682CC5D82ACC8AE15843DDEC2A738CA585B5F282F5008DEF76F
6,605,700 UART: Caliptra RT
6,606,045 UART: [state] CFI Enabled
6,890,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,463 UART: [rt]cmd =0x41545348, len=116
6,943,314 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,057 ready_for_fw is high
1,056,057 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,232 >>> mbox cmd response: success
2,684,134 UART:
2,684,150 UART: Running Caliptra FMC ...
2,684,558 UART:
2,684,701 UART: [state] CFI Enabled
2,695,604 UART: [fht] FMC Alias Private Key: 7
2,803,273 UART: [art] Extend RT PCRs Done
2,803,701 UART: [art] Lock RT PCRs Done
2,805,227 UART: [art] Populate DV Done
2,813,734 UART: [fht] FMC Alias Private Key: 7
2,814,892 UART: [art] Derive CDI
2,815,172 UART: [art] Store in in slot 0x4
2,900,429 UART: [art] Derive Key Pair
2,900,789 UART: [art] Store priv key in slot 0x5
2,914,367 UART: [art] Derive Key Pair - Done
2,928,917 UART: [art] Signing Cert with AUTHO
2,929,397 UART: RITY.KEYID = 7
2,944,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,310 UART: [art] PUB.X = ACC7E7BC609575F93E842D78B39CE0767F1752D19DA35EA7BE3E1742094B3CC9FBA69ABF4713455F77018B80875B533F
2,952,080 UART: [art] PUB.Y = F78409BB4A239A1D0198D49DDCAC46FCFBE8A473541CD0922600830C59D3685D2E0A9AB1560176FADD4072E5EDE1263C
2,959,003 UART: [art] SIG.R = EDF20728B1FB2AE0C766D5DCA2A76CCA2AB27A38A28DBBCC3B21AC48207452BDE41BBF3AE141F2EBACF6C5EC1546843C
2,965,802 UART: [art] SIG.S = 7501DD3D7ED48911AA55ED0CE0D2C4EE918160C1735FD8FCD90B88F126114178725D3471E4528485B5D3AE289D01A4BC
2,989,831 UART: Caliptra RT
2,990,176 UART: [state] CFI Enabled
3,098,555 UART: [rt] RT listening for mailbox commands...
3,099,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,263 UART: [rt]cmd =0x41544d4e, len=14344
3,532,209 >>> mbox cmd response data (8 bytes)
3,532,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,441 UART: [rt]cmd =0x41545348, len=116
3,584,654 >>> mbox cmd response data (12 bytes)
3,584,655 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,251 >>> mbox cmd response: success
6,019,251 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,033,101 UART:
6,033,117 UART: Running Caliptra FMC ...
6,033,525 UART:
6,033,668 UART: [state] CFI Enabled
6,122,087 UART: [art] Extend RT PCRs Done
6,122,515 UART: [art] Lock RT PCRs Done
6,123,986 UART: [art] Populate DV Done
6,132,137 UART: [fht] FMC Alias Private Key: 7
6,133,065 UART: [art] Derive CDI
6,133,345 UART: [art] Store in in slot 0x4
6,219,452 UART: [art] Derive Key Pair
6,219,812 UART: [art] Store priv key in slot 0x5
6,232,718 UART: [art] Derive Key Pair - Done
6,247,681 UART: [art] Signing Cert with AUTHO
6,248,161 UART: RITY.KEYID = 7
6,263,557 UART: [art] Erasing AUTHORITY.KEYID = 7
6,264,322 UART: [art] PUB.X = 63786090D1F754670C43C8F8814ADDB692954944674F3264E458F450ACFB0A60E1C1B8BBE383DF83EF988340ED8D76DC
6,271,088 UART: [art] PUB.Y = D007C8E8F221EB5AE378696A06DDBFD0006AA5C399F44B99158A3321061FB744B7B45F145F0B02989CC432CFFDF950F9
6,278,009 UART: [art] SIG.R = 23E5A7AC4FEBCD02FDBF2683D70ADEC97E897A3A28760661E3AB50148FC808356704158292B1DBC7B0D691F60E1BA9E8
6,284,773 UART: [art] SIG.S = 38FB3699DFF57676CE681ADF3408CDED2EFBDBDEFE475851CC9A857A791B3B88DB4937D6EC705F9725D3B02B31782F1E
6,308,625 UART: Caliptra RT
6,308,970 UART: [state] CFI Enabled
6,589,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,608 UART: [rt]cmd =0x41545348, len=116
6,642,923 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,662 UART: [kat] SHA2-512-ACC
897,563 UART: [kat] ECC-384
903,176 UART: [kat] HMAC-384Kdf
907,912 UART: [kat] LMS
1,476,108 UART: [kat] --
1,476,907 UART: [cold-reset] ++
1,477,393 UART: [fht] Storing FHT @ 0x50003400
1,480,100 UART: [idev] ++
1,480,268 UART: [idev] CDI.KEYID = 6
1,480,628 UART: [idev] SUBJECT.KEYID = 7
1,481,052 UART: [idev] UDS.KEYID = 0
1,481,397 ready_for_fw is high
1,481,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,960 UART: [idev] Erasing UDS.KEYID = 0
1,505,772 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,314 UART: [idev] --
1,515,499 UART: [ldev] ++
1,515,667 UART: [ldev] CDI.KEYID = 6
1,516,030 UART: [ldev] SUBJECT.KEYID = 5
1,516,456 UART: [ldev] AUTHORITY.KEYID = 7
1,516,919 UART: [ldev] FE.KEYID = 1
1,521,817 UART: [ldev] Erasing FE.KEYID = 1
1,547,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,198 UART: [ldev] --
1,586,485 UART: [fwproc] Waiting for Commands...
1,587,106 UART: [fwproc] Received command 0x46574c44
1,587,897 UART: [fwproc] Received Image of size 114332 bytes
2,885,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,422 >>> mbox cmd response: success
3,079,610 UART: [afmc] ++
3,079,778 UART: [afmc] CDI.KEYID = 6
3,080,140 UART: [afmc] SUBJECT.KEYID = 7
3,080,565 UART: [afmc] AUTHORITY.KEYID = 5
3,115,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,102 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,495 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,185 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,082 UART: [afmc] --
3,159,060 UART: [cold-reset] --
3,159,760 UART: [state] Locking Datavault
3,160,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,437 UART: [state] Locking ICCM
3,162,099 UART: [exit] Launching FMC @ 0x40000130
3,167,428 UART:
3,167,444 UART: Running Caliptra FMC ...
3,167,852 UART:
3,167,906 UART: [state] CFI Enabled
3,178,417 UART: [fht] FMC Alias Private Key: 7
3,286,818 UART: [art] Extend RT PCRs Done
3,287,246 UART: [art] Lock RT PCRs Done
3,288,816 UART: [art] Populate DV Done
3,296,799 UART: [fht] FMC Alias Private Key: 7
3,297,935 UART: [art] Derive CDI
3,298,215 UART: [art] Store in in slot 0x4
3,384,118 UART: [art] Derive Key Pair
3,384,478 UART: [art] Store priv key in slot 0x5
3,397,228 UART: [art] Derive Key Pair - Done
3,411,818 UART: [art] Signing Cert with AUTHO
3,412,298 UART: RITY.KEYID = 7
3,426,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,753 UART: [art] PUB.X = B37A180EBCBC52EA6024BC3428B89AA8E949AC5E39B49B0ECFE3C187567FF98D16589C33EE7EE303BA3B736691BA5057
3,434,528 UART: [art] PUB.Y = D3A1B2A95F2CA83A4B4433F06B7170D5712F7F24E95ACD9FEB112DFA6F13D368CD66833DDDDF18B0CD0F3F71DB2B4A79
3,441,497 UART: [art] SIG.R = 1DE82F761E193CF370C67087C91FEF0FA892AEE01086C97B9760DC73FCC49C7AA7D46D230ACFF0E2BC8ADAF3CACEAA47
3,448,289 UART: [art] SIG.S = ECBEBBCF1673E90B356EAB537A3DBA6D2970E4CD911BDE502273A9278F28A652E371218281B9FABCB02B45D1430DF0A1
3,471,732 UART: Caliptra RT
3,471,985 UART: [state] CFI Enabled
3,579,758 UART: [rt] RT listening for mailbox commands...
3,580,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,752 UART: [rt]cmd =0x41544d4e, len=14344
4,013,866 >>> mbox cmd response data (8 bytes)
4,013,867 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,924 UART: [rt]cmd =0x41545348, len=116
4,045,797 >>> mbox cmd response data (12 bytes)
4,045,798 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,562 UART:
4,046,578 UART: Running Caliptra ROM ...
4,046,986 UART:
4,047,040 UART: [state] CFI Enabled
4,049,464 UART: [state] LifecycleState = Unprovisioned
4,050,119 UART: [state] DebugLocked = No
4,050,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,052,284 UART: [kat] SHA2-256
4,846,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,850,330 UART: [kat] ++
4,850,482 UART: [kat] sha1
4,854,782 UART: [kat] SHA2-256
4,856,720 UART: [kat] SHA2-384
4,859,245 UART: [kat] SHA2-512-ACC
4,861,145 UART: [kat] ECC-384
4,866,816 UART: [kat] HMAC-384Kdf
4,871,538 UART: [kat] LMS
5,439,734 UART: [kat] --
5,440,535 UART: [update-reset] ++
6,774,893 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,776,089 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,925,965 >>> mbox cmd response: success
6,925,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,926,318 UART: [update-reset] Copying MAN_2 To MAN_1
6,934,332 UART: [update-reset Success] --
6,935,289 UART: [state] Locking Datavault
6,936,177 UART: [state] Locking PCR0, PCR1 and PCR31
6,936,781 UART: [state] Locking ICCM
6,937,211 UART: [exit] Launching FMC @ 0x40000130
6,942,540 UART:
6,942,556 UART: Running Caliptra FMC ...
6,942,964 UART:
6,943,018 UART: [state] CFI Enabled
7,032,415 UART: [art] Extend RT PCRs Done
7,032,843 UART: [art] Lock RT PCRs Done
7,034,238 UART: [art] Populate DV Done
7,042,485 UART: [fht] FMC Alias Private Key: 7
7,043,491 UART: [art] Derive CDI
7,043,771 UART: [art] Store in in slot 0x4
7,129,286 UART: [art] Derive Key Pair
7,129,646 UART: [art] Store priv key in slot 0x5
7,142,226 UART: [art] Derive Key Pair - Done
7,156,986 UART: [art] Signing Cert with AUTHO
7,157,466 UART: RITY.KEYID = 7
7,172,776 UART: [art] Erasing AUTHORITY.KEYID = 7
7,173,541 UART: [art] PUB.X = F5B83D2F2C3FE58D0257EFA90E9DE9630878D794C58433056466DCC11903F08661973A3FDB0427D0BBD9529D8D0A68CF
7,180,294 UART: [art] PUB.Y = 8248C6E88C7FA2F6E240920E4671E2C043DB27BFD3713576399EEBB9C9175ACFA9413EB97BD14758EB94619256FF44A2
7,187,245 UART: [art] SIG.R = 4925EF3AA4635162BE04D3AAAB7FAB91D66EAACB541155D2B64BF6BF3D8E9B8AC93C6A99A4DF5A501266B66062CD9188
7,194,030 UART: [art] SIG.S = 4BE1B7353BFAF1586E5ED4DFC91D9677EBBB4AB3D2A7B9CCA1F0C811F2E7756DF25A6DFBF868C774902C934D4C496C96
7,217,761 UART: Caliptra RT
7,218,014 UART: [state] CFI Enabled
7,499,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,530,501 UART: [rt]cmd =0x41545348, len=116
7,532,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,441 ready_for_fw is high
1,362,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,682 >>> mbox cmd response: success
2,990,014 UART:
2,990,030 UART: Running Caliptra FMC ...
2,990,438 UART:
2,990,492 UART: [state] CFI Enabled
3,000,815 UART: [fht] FMC Alias Private Key: 7
3,108,714 UART: [art] Extend RT PCRs Done
3,109,142 UART: [art] Lock RT PCRs Done
3,110,784 UART: [art] Populate DV Done
3,119,025 UART: [fht] FMC Alias Private Key: 7
3,120,119 UART: [art] Derive CDI
3,120,399 UART: [art] Store in in slot 0x4
3,205,990 UART: [art] Derive Key Pair
3,206,350 UART: [art] Store priv key in slot 0x5
3,219,674 UART: [art] Derive Key Pair - Done
3,234,537 UART: [art] Signing Cert with AUTHO
3,235,017 UART: RITY.KEYID = 7
3,250,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,004 UART: [art] PUB.X = 6078E2EE8C08B32FBBE0528D9106208DC8FF0F995368F144CED619CA9090F737C995B9A52DF688C131FA6824F9C80795
3,257,764 UART: [art] PUB.Y = 8F48A22D60803279FAEFA6B0BABCF37E44FF11F5FC813D8A2A4DA0EA0DE7F759DC5022AAFD1A18D4C3B9073367D9D53F
3,264,732 UART: [art] SIG.R = 6425D94069C6A6B6DA4F03A249C4CF7E83551E13D9F5B38D0C65AAD220CF2007194FCB5B9502CD473F12B28EFB62AC87
3,271,500 UART: [art] SIG.S = 9F4C06AF8FC986B4FADCFFB477EAA807B27F04F04D6A3F176D0327DE75C6995E31979B989C6595AA413C3F7DA52E8841
3,295,749 UART: Caliptra RT
3,296,002 UART: [state] CFI Enabled
3,403,749 UART: [rt] RT listening for mailbox commands...
3,404,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,437 UART: [rt]cmd =0x41544d4e, len=14344
3,838,103 >>> mbox cmd response data (8 bytes)
3,838,104 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,327 UART: [rt]cmd =0x41545348, len=116
3,869,948 >>> mbox cmd response data (12 bytes)
3,869,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,631,268 >>> mbox cmd response: success
6,631,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,644,649 UART:
6,644,665 UART: Running Caliptra FMC ...
6,645,073 UART:
6,645,127 UART: [state] CFI Enabled
6,734,444 UART: [art] Extend RT PCRs Done
6,734,872 UART: [art] Lock RT PCRs Done
6,735,923 UART: [art] Populate DV Done
6,744,240 UART: [fht] FMC Alias Private Key: 7
6,745,412 UART: [art] Derive CDI
6,745,692 UART: [art] Store in in slot 0x4
6,831,395 UART: [art] Derive Key Pair
6,831,755 UART: [art] Store priv key in slot 0x5
6,844,979 UART: [art] Derive Key Pair - Done
6,859,590 UART: [art] Signing Cert with AUTHO
6,860,070 UART: RITY.KEYID = 7
6,875,498 UART: [art] Erasing AUTHORITY.KEYID = 7
6,876,263 UART: [art] PUB.X = 81104109619EC5E7E277990738C9ECD00E131C2CF6E9CB7E8FEEC0B7CD0D685D5083F983AE14E500ADF7549306DFD1CD
6,883,008 UART: [art] PUB.Y = 323B1DEC13EEA910F13D35C14DEC758D42681BB4B6713B0D375E82B1BBB3560F0DFA4324EB3914E7D0217ABA69A5A3F8
6,889,963 UART: [art] SIG.R = 47A3F100BE781A9F4DB53EA1D65BCFE0582022595006B1BF06BCD4D31638017DAD7F9D3342C9575BDB1D9147C09E9244
6,896,708 UART: [art] SIG.S = 1A99C3C13B0AEA574993E3FCD41CE3260D07C20D915AFB6922DD8FE2558AFD0A1D40DD11DB768C0993B4326B223072DA
6,920,323 UART: Caliptra RT
6,920,576 UART: [state] CFI Enabled
7,199,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,229,977 UART: [rt]cmd =0x41545348, len=116
7,231,738 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,964 UART: [fht] Storing FHT @ 0x50003400
1,479,759 UART: [idev] ++
1,479,927 UART: [idev] CDI.KEYID = 6
1,480,287 UART: [idev] SUBJECT.KEYID = 7
1,480,711 UART: [idev] UDS.KEYID = 0
1,481,056 ready_for_fw is high
1,481,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,187 UART: [idev] Erasing UDS.KEYID = 0
1,506,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,867 UART: [idev] --
1,515,986 UART: [ldev] ++
1,516,154 UART: [ldev] CDI.KEYID = 6
1,516,517 UART: [ldev] SUBJECT.KEYID = 5
1,516,943 UART: [ldev] AUTHORITY.KEYID = 7
1,517,406 UART: [ldev] FE.KEYID = 1
1,522,638 UART: [ldev] Erasing FE.KEYID = 1
1,548,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,163 UART: [ldev] --
1,587,568 UART: [fwproc] Waiting for Commands...
1,588,331 UART: [fwproc] Received command 0x46574c44
1,589,122 UART: [fwproc] Received Image of size 114332 bytes
2,886,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,278 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,589 >>> mbox cmd response: success
3,079,677 UART: [afmc] ++
3,079,845 UART: [afmc] CDI.KEYID = 6
3,080,207 UART: [afmc] SUBJECT.KEYID = 7
3,080,632 UART: [afmc] AUTHORITY.KEYID = 5
3,115,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,221 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,614 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,304 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,979 UART: [afmc] --
3,158,991 UART: [cold-reset] --
3,159,883 UART: [state] Locking Datavault
3,161,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,714 UART: [state] Locking ICCM
3,162,224 UART: [exit] Launching FMC @ 0x40000130
3,167,553 UART:
3,167,569 UART: Running Caliptra FMC ...
3,167,977 UART:
3,168,120 UART: [state] CFI Enabled
3,178,381 UART: [fht] FMC Alias Private Key: 7
3,286,702 UART: [art] Extend RT PCRs Done
3,287,130 UART: [art] Lock RT PCRs Done
3,288,568 UART: [art] Populate DV Done
3,296,843 UART: [fht] FMC Alias Private Key: 7
3,297,909 UART: [art] Derive CDI
3,298,189 UART: [art] Store in in slot 0x4
3,383,992 UART: [art] Derive Key Pair
3,384,352 UART: [art] Store priv key in slot 0x5
3,397,200 UART: [art] Derive Key Pair - Done
3,411,896 UART: [art] Signing Cert with AUTHO
3,412,376 UART: RITY.KEYID = 7
3,427,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,293 UART: [art] PUB.X = BF7CAD23D5DED1229241D5EF262D4F4BFA834C0340A54E4011E06815D1724A54FBD0BB7CE0E88609FCDA33DB448BAA56
3,435,075 UART: [art] PUB.Y = 980D92563027F31F8736852C1339963AC18B67936A2332EE62265C43986560159A78D0556D6E01DD98A66B2AB8FE776B
3,442,005 UART: [art] SIG.R = 55D7C4F494270941B622F7ADE77798D1297827D3F7FB7EF6C1BE67C3B55AF00BD0415C4BDB528BEAE4DBBC9447CD666F
3,448,785 UART: [art] SIG.S = 6128E0286701AECF18A6EE6BE8EF98911B9EDBCAE8DF229A7A0CFBD48D9AD92A4D3BB305CC333E3DBF103FC56E298CFF
3,472,079 UART: Caliptra RT
3,472,424 UART: [state] CFI Enabled
3,581,468 UART: [rt] RT listening for mailbox commands...
3,582,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,076 UART: [rt]cmd =0x41544d4e, len=14344
4,015,312 >>> mbox cmd response data (8 bytes)
4,015,313 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,174 UART: [rt]cmd =0x41545348, len=116
4,047,133 >>> mbox cmd response data (12 bytes)
4,047,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,992 UART:
4,048,008 UART: Running Caliptra ROM ...
4,048,416 UART:
4,048,557 UART: [state] CFI Enabled
4,051,279 UART: [state] LifecycleState = Unprovisioned
4,051,934 UART: [state] DebugLocked = No
4,052,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,054,255 UART: [kat] SHA2-256
4,848,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,852,301 UART: [kat] ++
4,852,453 UART: [kat] sha1
4,856,603 UART: [kat] SHA2-256
4,858,541 UART: [kat] SHA2-384
4,861,290 UART: [kat] SHA2-512-ACC
4,863,190 UART: [kat] ECC-384
4,868,623 UART: [kat] HMAC-384Kdf
4,873,257 UART: [kat] LMS
5,441,453 UART: [kat] --
5,442,392 UART: [update-reset] ++
6,776,007 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,777,093 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,926,969 >>> mbox cmd response: success
6,926,969 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,927,170 UART: [update-reset] Copying MAN_2 To MAN_1
6,935,184 UART: [update-reset Success] --
6,936,199 UART: [state] Locking Datavault
6,936,963 UART: [state] Locking PCR0, PCR1 and PCR31
6,937,567 UART: [state] Locking ICCM
6,938,061 UART: [exit] Launching FMC @ 0x40000130
6,943,390 UART:
6,943,406 UART: Running Caliptra FMC ...
6,943,814 UART:
6,943,957 UART: [state] CFI Enabled
7,033,278 UART: [art] Extend RT PCRs Done
7,033,706 UART: [art] Lock RT PCRs Done
7,035,029 UART: [art] Populate DV Done
7,043,032 UART: [fht] FMC Alias Private Key: 7
7,044,090 UART: [art] Derive CDI
7,044,370 UART: [art] Store in in slot 0x4
7,130,541 UART: [art] Derive Key Pair
7,130,901 UART: [art] Store priv key in slot 0x5
7,144,029 UART: [art] Derive Key Pair - Done
7,158,855 UART: [art] Signing Cert with AUTHO
7,159,335 UART: RITY.KEYID = 7
7,174,123 UART: [art] Erasing AUTHORITY.KEYID = 7
7,174,888 UART: [art] PUB.X = EF132C67926B04149F107E137E9EB683658F505A8FD1039549A88449C14F902577C3620175846DC2209E07CDDE195AF7
7,181,636 UART: [art] PUB.Y = 1E73C1721BA630EB4CFE1FFA36F76FA0C1E79ED3836B4EA1F40389434652112D9D1793FF9E5AE8CD22761815B48B0336
7,188,586 UART: [art] SIG.R = 02E1E5A5265E1361BD5C8FD3920336D8C2D1637EC8DCE3527A15E3217FDB3F6382D78A938B8BCB8A9562E420D1714BE2
7,195,356 UART: [art] SIG.S = 756EA0F73D4ABF54E6FF8D0B6C933A203B7299D969F90BEAFDE1A244A60A54E1E99BB401EEE4B05803605079D8611977
7,219,194 UART: Caliptra RT
7,219,539 UART: [state] CFI Enabled
7,503,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,534,232 UART: [rt]cmd =0x41545348, len=116
7,535,815 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,949 >>> mbox cmd response: success
2,991,017 UART:
2,991,033 UART: Running Caliptra FMC ...
2,991,441 UART:
2,991,584 UART: [state] CFI Enabled
3,002,255 UART: [fht] FMC Alias Private Key: 7
3,110,118 UART: [art] Extend RT PCRs Done
3,110,546 UART: [art] Lock RT PCRs Done
3,112,160 UART: [art] Populate DV Done
3,120,495 UART: [fht] FMC Alias Private Key: 7
3,121,437 UART: [art] Derive CDI
3,121,717 UART: [art] Store in in slot 0x4
3,207,514 UART: [art] Derive Key Pair
3,207,874 UART: [art] Store priv key in slot 0x5
3,221,030 UART: [art] Derive Key Pair - Done
3,235,596 UART: [art] Signing Cert with AUTHO
3,236,076 UART: RITY.KEYID = 7
3,251,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,149 UART: [art] PUB.X = 80C85FD30196D7065C9223D2349E57C33FE7BFFB64243AE6C550874CEA9545E725E5C739BD701A07275169849D68A992
3,258,904 UART: [art] PUB.Y = 49D085EF42931B4DDA3CE9FE41C24593F3FFDE45A980D74803B5388EC5935C9E861EEEAB29C373518E7B7D6A7B75363A
3,265,861 UART: [art] SIG.R = B9ADEB42A0F046B53B82E3DE78EE505A2F513F2E1B0847CE2EE0AE85A7B5426F425BBFE864ACFB3976E5E3655EAACD4B
3,272,654 UART: [art] SIG.S = 60FF512C071D66CE15698CDADCDDF947D117269206D15186E54D1DB7C846D8333C3D81040C1915E59F7F511EAEA4A4D8
3,296,809 UART: Caliptra RT
3,297,154 UART: [state] CFI Enabled
3,406,341 UART: [rt] RT listening for mailbox commands...
3,407,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,347 UART: [rt]cmd =0x41544d4e, len=14344
3,839,893 >>> mbox cmd response data (8 bytes)
3,839,894 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,085 UART: [rt]cmd =0x41545348, len=116
3,871,806 >>> mbox cmd response data (12 bytes)
3,871,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,635,153 >>> mbox cmd response: success
6,635,153 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,648,542 UART:
6,648,558 UART: Running Caliptra FMC ...
6,648,966 UART:
6,649,109 UART: [state] CFI Enabled
6,737,820 UART: [art] Extend RT PCRs Done
6,738,248 UART: [art] Lock RT PCRs Done
6,739,445 UART: [art] Populate DV Done
6,747,792 UART: [fht] FMC Alias Private Key: 7
6,748,828 UART: [art] Derive CDI
6,749,108 UART: [art] Store in in slot 0x4
6,835,177 UART: [art] Derive Key Pair
6,835,537 UART: [art] Store priv key in slot 0x5
6,848,405 UART: [art] Derive Key Pair - Done
6,862,875 UART: [art] Signing Cert with AUTHO
6,863,355 UART: RITY.KEYID = 7
6,878,259 UART: [art] Erasing AUTHORITY.KEYID = 7
6,879,024 UART: [art] PUB.X = E47A70DFA2A54E2D341FAF79911BB2DC5FEDDA08D7A85C0A836BA01AB8F589F17CECB13DF84D2EC00120C86A9A985A86
6,885,809 UART: [art] PUB.Y = 804F4A6816098CDAED7E29FA27C9D63CBFEA95B8586E7873A322FF3F7EE0D4037E3C5F86D4439F227E7368BC0712D3FE
6,892,762 UART: [art] SIG.R = 605014DCB2919F42C093B81ECA1128F69D539BA393EAD14F58380255704BA67483B57B206D976D404D2C02EC2C104C88
6,899,522 UART: [art] SIG.S = 0076CBACD69C7C79CDF4E966DF76FECCE7139F86267D8969970A3204F7DAEDC5877D84B537AF7DA2BB2B04803D7C94D7
6,923,212 UART: Caliptra RT
6,923,557 UART: [state] CFI Enabled
7,206,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,237,364 UART: [rt]cmd =0x41545348, len=116
7,239,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,565 UART: [kat] SHA2-256
903,505 UART: [kat] SHA2-384
906,124 UART: [kat] SHA2-512-ACC
908,025 UART: [kat] ECC-384
917,592 UART: [kat] HMAC-384Kdf
922,226 UART: [kat] LMS
1,170,554 UART: [kat] --
1,171,281 UART: [cold-reset] ++
1,171,851 UART: [fht] FHT @ 0x50003400
1,174,424 UART: [idev] ++
1,174,592 UART: [idev] CDI.KEYID = 6
1,174,952 UART: [idev] SUBJECT.KEYID = 7
1,175,376 UART: [idev] UDS.KEYID = 0
1,175,721 ready_for_fw is high
1,175,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,208,849 UART: [idev] --
1,209,973 UART: [ldev] ++
1,210,141 UART: [ldev] CDI.KEYID = 6
1,210,504 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,708 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,069 >>> mbox cmd response: success
2,774,261 UART: [afmc] ++
2,774,429 UART: [afmc] CDI.KEYID = 6
2,774,791 UART: [afmc] SUBJECT.KEYID = 7
2,775,216 UART: [afmc] AUTHORITY.KEYID = 5
2,810,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,404 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,620 UART: [afmc] --
2,853,646 UART: [cold-reset] --
2,854,624 UART: [state] Locking Datavault
2,855,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,553 UART: [state] Locking ICCM
2,857,119 UART: [exit] Launching FMC @ 0x40000130
2,862,448 UART:
2,862,464 UART: Running Caliptra FMC ...
2,862,872 UART:
2,862,926 UART: [state] CFI Enabled
2,873,903 UART: [fht] FMC Alias Private Key: 7
2,982,218 UART: [art] Extend RT PCRs Done
2,982,646 UART: [art] Lock RT PCRs Done
2,984,206 UART: [art] Populate DV Done
2,992,401 UART: [fht] FMC Alias Private Key: 7
2,993,411 UART: [art] Derive CDI
2,993,691 UART: [art] Store in in slot 0x4
3,079,618 UART: [art] Derive Key Pair
3,079,978 UART: [art] Store priv key in slot 0x5
3,093,402 UART: [art] Derive Key Pair - Done
3,108,323 UART: [art] Signing Cert with AUTHO
3,108,803 UART: RITY.KEYID = 7
3,123,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,624 UART: [art] PUB.X = 0527551A25BB491EB7D09695F76941187F688C94C634112F8887BE77F98302831E65CD448FE7AA9C5E4013C08B8F71EA
3,131,382 UART: [art] PUB.Y = 97A2B5897B4E17847022567883F6CC4AEBB72ED109F6FDFCCE872E493240DE58553275B41C8932F656A839116F7A0E59
3,138,324 UART: [art] SIG.R = 87DE5442C14C22A30E3314CF64CCA5B8BC80EC70BBCB2A18B98958135AC2A8B68ACDDF4A89344038F76B4E207422BF26
3,145,103 UART: [art] SIG.S = D1378465F3E37FFD90FCCC3E6A19E3A48DBE48747FF5606AF8A50532983583FCE18D72A7089CAE9DF5A76169C267E7C7
3,168,464 UART: Caliptra RT
3,168,717 UART: [state] CFI Enabled
3,276,393 UART: [rt] RT listening for mailbox commands...
3,277,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,861 UART: [rt]cmd =0x41544d4e, len=14344
3,709,777 >>> mbox cmd response data (8 bytes)
3,709,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,673 UART: [rt]cmd =0x41545348, len=116
3,741,494 >>> mbox cmd response data (12 bytes)
3,741,495 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,400 UART:
3,742,416 UART: Running Caliptra ROM ...
3,742,824 UART:
3,742,879 UART: [state] CFI Enabled
3,746,071 UART: [state] LifecycleState = Unprovisioned
3,746,726 UART: [state] DebugLocked = No
3,747,304 UART: [state] WD Timer not started. Device not locked for debugging
3,748,568 UART: [kat] SHA2-256
4,554,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,558,343 UART: [kat] ++
4,558,495 UART: [kat] sha1
4,562,947 UART: [kat] SHA2-256
4,564,887 UART: [kat] SHA2-384
4,567,512 UART: [kat] SHA2-512-ACC
4,569,412 UART: [kat] ECC-384
4,579,323 UART: [kat] HMAC-384Kdf
4,583,749 UART: [kat] LMS
4,832,077 UART: [kat] --
4,832,791 UART: [update-reset] ++
6,144,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,146,124 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,295,948 >>> mbox cmd response: success
6,295,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,296,285 UART: [update-reset] Copying MAN_2 To MAN_1
6,304,299 UART: [update-reset Success] --
6,305,262 UART: [state] Locking Datavault
6,306,128 UART: [state] Locking PCR0, PCR1 and PCR31
6,306,732 UART: [state] Locking ICCM
6,307,266 UART: [exit] Launching FMC @ 0x40000130
6,312,595 UART:
6,312,611 UART: Running Caliptra FMC ...
6,313,019 UART:
6,313,073 UART: [state] CFI Enabled
6,401,890 UART: [art] Extend RT PCRs Done
6,402,318 UART: [art] Lock RT PCRs Done
6,403,813 UART: [art] Populate DV Done
6,411,900 UART: [fht] FMC Alias Private Key: 7
6,413,036 UART: [art] Derive CDI
6,413,316 UART: [art] Store in in slot 0x4
6,498,691 UART: [art] Derive Key Pair
6,499,051 UART: [art] Store priv key in slot 0x5
6,512,293 UART: [art] Derive Key Pair - Done
6,526,960 UART: [art] Signing Cert with AUTHO
6,527,440 UART: RITY.KEYID = 7
6,542,748 UART: [art] Erasing AUTHORITY.KEYID = 7
6,543,513 UART: [art] PUB.X = 95FEEBE6CBF4F405EAE2FC3ABBADAAC5BF35AC81B897464A3D05CA7199DB045EFCF749053EB086A08F22CB40149CEBA3
6,550,303 UART: [art] PUB.Y = 1BB2BBD9374C57D0406F679A30BEFC08A4A253427C023E6FCB21E28FEE690CA0C70A6CC360297ACB1D3D26951414D5C6
6,557,253 UART: [art] SIG.R = 01BD7A5570A2C98A3509506D54E268E6F6FDD86D221C9AA098990B1EC57D80624D313B022ACED2D7D1713178367AABD0
6,564,015 UART: [art] SIG.S = 8AD4E46F86B29745A946B0574A7AB06B66AF72C2A8C10DB856400741DE7A948C9E191CE0C52A12D33DFBF661102B1F3F
6,588,046 UART: Caliptra RT
6,588,299 UART: [state] CFI Enabled
6,868,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,899,247 UART: [rt]cmd =0x41545348, len=116
6,900,930 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,245 ready_for_fw is high
1,061,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,300 >>> mbox cmd response: success
2,689,562 UART:
2,689,578 UART: Running Caliptra FMC ...
2,689,986 UART:
2,690,040 UART: [state] CFI Enabled
2,700,711 UART: [fht] FMC Alias Private Key: 7
2,808,390 UART: [art] Extend RT PCRs Done
2,808,818 UART: [art] Lock RT PCRs Done
2,810,630 UART: [art] Populate DV Done
2,819,211 UART: [fht] FMC Alias Private Key: 7
2,820,227 UART: [art] Derive CDI
2,820,507 UART: [art] Store in in slot 0x4
2,905,938 UART: [art] Derive Key Pair
2,906,298 UART: [art] Store priv key in slot 0x5
2,919,556 UART: [art] Derive Key Pair - Done
2,934,327 UART: [art] Signing Cert with AUTHO
2,934,807 UART: RITY.KEYID = 7
2,950,053 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,818 UART: [art] PUB.X = C6F9C30F4115C1A1D6D35688C6715FDFE6B44AE6954768F2D1403409076E91BEAB3534301ED74F17DC595D56EE447F1A
2,957,583 UART: [art] PUB.Y = 60EB1AC20ADD70D8F1A1A30A329BEF040C6D920C0F79D96E289E6FDEDFB6044A239D5F13C53C23EDFA87FEC036E530C0
2,964,534 UART: [art] SIG.R = 4D65BA6DD9456DEC92A1B84898D0841E92C6FD49488ED9B12D20939D27E2F1352B7C354C941380C4EAB8A857E89F66F6
2,971,308 UART: [art] SIG.S = 421B61A792FB86A41AAB25B7392858A680EEC1201EF33F1D55683FAFF49A0735C1FA127D636BBF6CFC9C2E1C20E0A861
2,995,038 UART: Caliptra RT
2,995,291 UART: [state] CFI Enabled
3,103,024 UART: [rt] RT listening for mailbox commands...
3,103,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,844 UART: [rt]cmd =0x41544d4e, len=14344
3,536,756 >>> mbox cmd response data (8 bytes)
3,536,757 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,746 UART: [rt]cmd =0x41545348, len=116
3,568,473 >>> mbox cmd response data (12 bytes)
3,568,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,924 >>> mbox cmd response: success
6,006,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,020,304 UART:
6,020,320 UART: Running Caliptra FMC ...
6,020,728 UART:
6,020,782 UART: [state] CFI Enabled
6,109,711 UART: [art] Extend RT PCRs Done
6,110,139 UART: [art] Lock RT PCRs Done
6,111,466 UART: [art] Populate DV Done
6,119,729 UART: [fht] FMC Alias Private Key: 7
6,120,853 UART: [art] Derive CDI
6,121,133 UART: [art] Store in in slot 0x4
6,207,412 UART: [art] Derive Key Pair
6,207,772 UART: [art] Store priv key in slot 0x5
6,220,162 UART: [art] Derive Key Pair - Done
6,234,606 UART: [art] Signing Cert with AUTHO
6,235,086 UART: RITY.KEYID = 7
6,250,272 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,037 UART: [art] PUB.X = 22F67E0195A69D7DA2716E2C9FE9D860168EE3BA392C15B5E683E33420A949E33AC0744A1DF5684A6A98BE1058333504
6,257,799 UART: [art] PUB.Y = 1CF922E639C85D1BBC92BAC19844BF539241551A06D169D0AD5254F8F3F334A7B44AAB215812127708B9F1FC7A3299B2
6,264,745 UART: [art] SIG.R = E6D267F8CE0CEB3D8B8598B0B6CCFC14810A87D82E21F6BCCFDFBD01E838994AECCACA2CA45E34F1C97957893B2A5113
6,271,530 UART: [art] SIG.S = 022F2D0BD2F7869BE81031E65DA7BCB5E007A477ADFDF7D07CE422C0A6981175C3F59D495860F37F06A719DA261FCD90
6,295,855 UART: Caliptra RT
6,296,108 UART: [state] CFI Enabled
6,581,413 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,414 UART: [rt]cmd =0x41545348, len=116
6,613,915 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
894,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,214 UART: [kat] ++
898,366 UART: [kat] sha1
902,494 UART: [kat] SHA2-256
904,434 UART: [kat] SHA2-384
907,231 UART: [kat] SHA2-512-ACC
909,132 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,172,848 UART: [fht] FHT @ 0x50003400
1,175,713 UART: [idev] ++
1,175,881 UART: [idev] CDI.KEYID = 6
1,176,241 UART: [idev] SUBJECT.KEYID = 7
1,176,665 UART: [idev] UDS.KEYID = 0
1,177,010 ready_for_fw is high
1,177,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,450 UART: [idev] --
1,211,624 UART: [ldev] ++
1,211,792 UART: [ldev] CDI.KEYID = 6
1,212,155 UART: [ldev] SUBJECT.KEYID = 5
1,212,581 UART: [ldev] AUTHORITY.KEYID = 7
1,213,044 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,245,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,928 UART: [ldev] --
1,284,423 UART: [fwproc] Wait for Commands...
1,285,219 UART: [fwproc] Recv command 0x46574c44
1,285,947 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,750 >>> mbox cmd response: success
2,777,786 UART: [afmc] ++
2,777,954 UART: [afmc] CDI.KEYID = 6
2,778,316 UART: [afmc] SUBJECT.KEYID = 7
2,778,741 UART: [afmc] AUTHORITY.KEYID = 5
2,815,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,987 UART: [afmc] --
2,859,117 UART: [cold-reset] --
2,859,867 UART: [state] Locking Datavault
2,860,878 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,482 UART: [state] Locking ICCM
2,862,012 UART: [exit] Launching FMC @ 0x40000130
2,867,341 UART:
2,867,357 UART: Running Caliptra FMC ...
2,867,765 UART:
2,867,908 UART: [state] CFI Enabled
2,878,621 UART: [fht] FMC Alias Private Key: 7
2,986,562 UART: [art] Extend RT PCRs Done
2,986,990 UART: [art] Lock RT PCRs Done
2,988,620 UART: [art] Populate DV Done
2,996,639 UART: [fht] FMC Alias Private Key: 7
2,997,633 UART: [art] Derive CDI
2,997,913 UART: [art] Store in in slot 0x4
3,083,570 UART: [art] Derive Key Pair
3,083,930 UART: [art] Store priv key in slot 0x5
3,097,450 UART: [art] Derive Key Pair - Done
3,112,378 UART: [art] Signing Cert with AUTHO
3,112,858 UART: RITY.KEYID = 7
3,128,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,197 UART: [art] PUB.X = 74116248C20B038B331142BD325EE05B229D9996F8EEEBADBD94AA585A5C03FD510002272D444ECE0698DF09D0634684
3,135,927 UART: [art] PUB.Y = AC8171D5A228C75D7089F5A2D8D18CF49BAD16190D638B1EDE364813A0316B4B373450C167F2FE0B25DB40DBE636784B
3,142,877 UART: [art] SIG.R = 648E1C396B71AB59C3E5FD12FBDDF4A51A6371E6D1AFAA10B411079F113836D0EF344D2C7590A76AF55E9C7A6D2D5613
3,149,656 UART: [art] SIG.S = 29938547B4E516455BDCF27C3E996AA96FCB6C7E4849AB54B76D4443C3B5D6BE85937B3AA42167479F85E1D4575A5434
3,173,667 UART: Caliptra RT
3,174,012 UART: [state] CFI Enabled
3,281,631 UART: [rt] RT listening for mailbox commands...
3,282,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,467 UART: [rt]cmd =0x41544d4e, len=14344
3,715,773 >>> mbox cmd response data (8 bytes)
3,715,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,855 UART: [rt]cmd =0x41545348, len=116
3,747,496 >>> mbox cmd response data (12 bytes)
3,747,497 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,294 UART:
3,748,310 UART: Running Caliptra ROM ...
3,748,718 UART:
3,748,860 UART: [state] CFI Enabled
3,751,808 UART: [state] LifecycleState = Unprovisioned
3,752,463 UART: [state] DebugLocked = No
3,753,133 UART: [state] WD Timer not started. Device not locked for debugging
3,754,285 UART: [kat] SHA2-256
4,559,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,564,060 UART: [kat] ++
4,564,212 UART: [kat] sha1
4,568,342 UART: [kat] SHA2-256
4,570,282 UART: [kat] SHA2-384
4,572,901 UART: [kat] SHA2-512-ACC
4,574,801 UART: [kat] ECC-384
4,584,192 UART: [kat] HMAC-384Kdf
4,588,900 UART: [kat] LMS
4,837,228 UART: [kat] --
4,837,952 UART: [update-reset] ++
6,150,196 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,151,329 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,301,153 >>> mbox cmd response: success
6,301,153 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,301,400 UART: [update-reset] Copying MAN_2 To MAN_1
6,309,414 UART: [update-reset Success] --
6,310,639 UART: [state] Locking Datavault
6,311,385 UART: [state] Locking PCR0, PCR1 and PCR31
6,311,989 UART: [state] Locking ICCM
6,312,535 UART: [exit] Launching FMC @ 0x40000130
6,317,864 UART:
6,317,880 UART: Running Caliptra FMC ...
6,318,288 UART:
6,318,431 UART: [state] CFI Enabled
6,407,458 UART: [art] Extend RT PCRs Done
6,407,886 UART: [art] Lock RT PCRs Done
6,409,135 UART: [art] Populate DV Done
6,417,094 UART: [fht] FMC Alias Private Key: 7
6,418,194 UART: [art] Derive CDI
6,418,474 UART: [art] Store in in slot 0x4
6,504,097 UART: [art] Derive Key Pair
6,504,457 UART: [art] Store priv key in slot 0x5
6,518,379 UART: [art] Derive Key Pair - Done
6,533,194 UART: [art] Signing Cert with AUTHO
6,533,674 UART: RITY.KEYID = 7
6,549,070 UART: [art] Erasing AUTHORITY.KEYID = 7
6,549,835 UART: [art] PUB.X = AB1181CFDDED72283D9C44BD62807BF55F0BB37AC4BF71C81E760D51162A05FF35F819CF1637351F171EAEB3789B5C8D
6,556,610 UART: [art] PUB.Y = D96B073CBD407C797EA3E49ED0F3E69C0A3BEE41717136958E14337D31794AC6450F4DEF671BCE5B1AC11CC239B1A34D
6,563,563 UART: [art] SIG.R = 2D58E1930AB8A1E654C172FF7998E2B805773799D784AE014EA11AFFFB243A3D7CAA00FA83B6BC57E3CD52AE088759CB
6,570,313 UART: [art] SIG.S = 1A4F44A2527CB11588876AB98B2C890DBE2DAEC6A22112E5B7BF8B7C423C179B0D9008BD0DB745B8C042086A02333295
6,593,652 UART: Caliptra RT
6,593,997 UART: [state] CFI Enabled
6,874,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,865 UART: [rt]cmd =0x41545348, len=116
6,907,734 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 ready_for_fw is high
1,060,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,067 >>> mbox cmd response: success
2,688,243 UART:
2,688,259 UART: Running Caliptra FMC ...
2,688,667 UART:
2,688,810 UART: [state] CFI Enabled
2,699,453 UART: [fht] FMC Alias Private Key: 7
2,807,488 UART: [art] Extend RT PCRs Done
2,807,916 UART: [art] Lock RT PCRs Done
2,809,936 UART: [art] Populate DV Done
2,818,275 UART: [fht] FMC Alias Private Key: 7
2,819,223 UART: [art] Derive CDI
2,819,503 UART: [art] Store in in slot 0x4
2,905,378 UART: [art] Derive Key Pair
2,905,738 UART: [art] Store priv key in slot 0x5
2,918,570 UART: [art] Derive Key Pair - Done
2,933,498 UART: [art] Signing Cert with AUTHO
2,933,978 UART: RITY.KEYID = 7
2,948,980 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,745 UART: [art] PUB.X = CA630297FA49CF74965FFCD9E28615CEE24E45177BEAF3AE59B908A3AE00A62B54FE2B7C50B4C988AAAC8F56AB0325CA
2,956,506 UART: [art] PUB.Y = B93D7FF1DA61E15857D63D86ED026F7EB8F04695C5CC7E4ED7E6DFCDE62837B7EE35F79356EC24A512D2807A2DA72B44
2,963,469 UART: [art] SIG.R = 1E2C96248D6634F7DF7915DCB3C9F2DCC14A66B88C8C7EEAE84DA5C7879FFAD2A9FD5569812699E5238DDEAF003E6187
2,970,233 UART: [art] SIG.S = 885C8821774D69FB940F82471FF7125D5B15B62B526D2392827CE28B2F7C9E6DFF42D4D3CD60C4B397485B3CC9701FCC
2,993,971 UART: Caliptra RT
2,994,316 UART: [state] CFI Enabled
3,102,167 UART: [rt] RT listening for mailbox commands...
3,102,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,843 UART: [rt]cmd =0x41544d4e, len=14344
3,535,417 >>> mbox cmd response data (8 bytes)
3,535,418 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,323 UART: [rt]cmd =0x41545348, len=116
3,567,022 >>> mbox cmd response data (12 bytes)
3,567,023 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,694 >>> mbox cmd response: success
6,005,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,018,666 UART:
6,018,682 UART: Running Caliptra FMC ...
6,019,090 UART:
6,019,233 UART: [state] CFI Enabled
6,108,520 UART: [art] Extend RT PCRs Done
6,108,948 UART: [art] Lock RT PCRs Done
6,110,211 UART: [art] Populate DV Done
6,118,222 UART: [fht] FMC Alias Private Key: 7
6,119,274 UART: [art] Derive CDI
6,119,554 UART: [art] Store in in slot 0x4
6,205,051 UART: [art] Derive Key Pair
6,205,411 UART: [art] Store priv key in slot 0x5
6,218,985 UART: [art] Derive Key Pair - Done
6,233,792 UART: [art] Signing Cert with AUTHO
6,234,272 UART: RITY.KEYID = 7
6,249,608 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,373 UART: [art] PUB.X = A287D5088B8116A7FF2E9C1F439489E940217E0DFAE1214DDB399BEF4421834771CD3FC8CFD773D1DE55256081768801
6,257,134 UART: [art] PUB.Y = F5A7C98B8D1BAF17F0F27D859FD3147923F80044459836112CC7F21B5245E4E6665F64D9ABA50E0F6C991FD9607152C7
6,264,056 UART: [art] SIG.R = 87BE1F1ED13FB18CE370871C8AD698C4E9589CF567F3C79FDAAF5A9BBE9D10DE1D730586DBB59E321FA29F0E8919CC9B
6,270,842 UART: [art] SIG.S = 3564C164F6C8B4C0BE5F6D2E8A697B58DAF0AF4D48F604D1F08FB942344A37AC9AAFB192FEAFF57FEB5B5084FF0CD3C1
6,294,555 UART: Caliptra RT
6,294,900 UART: [state] CFI Enabled
6,577,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,608,766 UART: [rt]cmd =0x41545348, len=116
6,610,605 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,581 UART: [idev] ++
1,173,749 UART: [idev] CDI.KEYID = 6
1,174,110 UART: [idev] SUBJECT.KEYID = 7
1,174,535 UART: [idev] UDS.KEYID = 0
1,174,881 ready_for_fw is high
1,174,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,561 UART: [idev] Erasing UDS.KEYID = 0
1,199,939 UART: [idev] Sha1 KeyId Algorithm
1,208,675 UART: [idev] --
1,209,644 UART: [ldev] ++
1,209,812 UART: [ldev] CDI.KEYID = 6
1,210,176 UART: [ldev] SUBJECT.KEYID = 5
1,210,603 UART: [ldev] AUTHORITY.KEYID = 7
1,211,066 UART: [ldev] FE.KEYID = 1
1,216,312 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,158 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,665 >>> mbox cmd response: success
2,773,796 UART: [afmc] ++
2,773,964 UART: [afmc] CDI.KEYID = 6
2,774,327 UART: [afmc] SUBJECT.KEYID = 7
2,774,753 UART: [afmc] AUTHORITY.KEYID = 5
2,810,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,523 UART: [afmc] --
2,853,579 UART: [cold-reset] --
2,854,459 UART: [state] Locking Datavault
2,855,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,284 UART: [state] Locking ICCM
2,856,844 UART: [exit] Launching FMC @ 0x40000130
2,862,173 UART:
2,862,189 UART: Running Caliptra FMC ...
2,862,597 UART:
2,862,651 UART: [state] CFI Enabled
2,873,242 UART: [fht] FMC Alias Private Key: 7
2,981,281 UART: [art] Extend RT PCRs Done
2,981,709 UART: [art] Lock RT PCRs Done
2,983,353 UART: [art] Populate DV Done
2,991,722 UART: [fht] FMC Alias Private Key: 7
2,992,726 UART: [art] Derive CDI
2,993,006 UART: [art] Store in in slot 0x4
3,078,613 UART: [art] Derive Key Pair
3,078,973 UART: [art] Store priv key in slot 0x5
3,092,117 UART: [art] Derive Key Pair - Done
3,106,890 UART: [art] Signing Cert with AUTHO
3,107,370 UART: RITY.KEYID = 7
3,122,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,081 UART: [art] PUB.X = C1A27907618BF8B07AF503011CF849C1FBE0F4891BFFC6C12AB449BFA695A9727AEFFC808F42D3A87652873052709663
3,129,846 UART: [art] PUB.Y = ACE102B5C49B48AD8760D2D13C40F3566D412DEDBE60204EB5BAD8E3BDD5E2ACAF1FD2DBEA7F5DB68F9D1E267EC83B53
3,136,825 UART: [art] SIG.R = 16BDBC82257EDE53B9BA9EE4E27737E19D756E1B46457B6CBA8259F6893D895F63D8DC72F9260A8E4AB9D2EEE5FBC508
3,143,605 UART: [art] SIG.S = 4B0281653E343EF866574323C59E202E96AF6317860528B1CEFD18C5DEBEE3D0E33BF631B0B3DF9709FFF9AB4F0BE56A
3,167,260 UART: Caliptra RT
3,167,513 UART: [state] CFI Enabled
3,275,176 UART: [rt] RT listening for mailbox commands...
3,275,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,896 UART: [rt]cmd =0x41544d4e, len=14344
3,708,628 >>> mbox cmd response data (8 bytes)
3,708,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,722 UART: [rt]cmd =0x41545348, len=116
3,740,805 >>> mbox cmd response data (12 bytes)
3,740,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,497 UART:
3,741,513 UART: Running Caliptra ROM ...
3,741,921 UART:
3,741,976 UART: [state] CFI Enabled
3,744,290 UART: [state] LifecycleState = Unprovisioned
3,744,945 UART: [state] DebugLocked = No
3,745,571 UART: [state] WD Timer not started. Device not locked for debugging
3,746,843 UART: [kat] SHA2-256
4,550,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,554,522 UART: [kat] ++
4,554,674 UART: [kat] sha1
4,558,898 UART: [kat] SHA2-256
4,560,838 UART: [kat] SHA2-384
4,563,829 UART: [kat] SHA2-512-ACC
4,565,729 UART: [kat] ECC-384
4,575,306 UART: [kat] HMAC-384Kdf
4,580,050 UART: [kat] LMS
4,828,362 UART: [kat] --
4,828,990 UART: [update-reset] ++
6,141,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,142,412 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,292,236 >>> mbox cmd response: success
6,292,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,292,417 UART: [update-reset] Copying MAN_2 To MAN_1
6,300,431 UART: [update-reset Success] --
6,301,310 UART: [state] Locking Datavault
6,302,186 UART: [state] Locking PCR0, PCR1 and PCR31
6,302,790 UART: [state] Locking ICCM
6,303,430 UART: [exit] Launching FMC @ 0x40000130
6,308,759 UART:
6,308,775 UART: Running Caliptra FMC ...
6,309,183 UART:
6,309,237 UART: [state] CFI Enabled
6,398,638 UART: [art] Extend RT PCRs Done
6,399,066 UART: [art] Lock RT PCRs Done
6,400,333 UART: [art] Populate DV Done
6,408,842 UART: [fht] FMC Alias Private Key: 7
6,409,782 UART: [art] Derive CDI
6,410,062 UART: [art] Store in in slot 0x4
6,495,475 UART: [art] Derive Key Pair
6,495,835 UART: [art] Store priv key in slot 0x5
6,509,393 UART: [art] Derive Key Pair - Done
6,524,034 UART: [art] Signing Cert with AUTHO
6,524,514 UART: RITY.KEYID = 7
6,539,708 UART: [art] Erasing AUTHORITY.KEYID = 7
6,540,473 UART: [art] PUB.X = D4B144CFA2D2D04220AD16722E3B2542B7E541DEB3DDC165AFF77C32C4EBD35C546BE51781871B8168ABF94972383381
6,547,249 UART: [art] PUB.Y = 8FA0530E553F9C61901AAF90F1D7A502D3159D4A9AB632D8A7350F817984CEA59600B7907178AFE8D1C847EA4384ED75
6,554,170 UART: [art] SIG.R = C31C4592621DC4A5637C377487834BB0B856C9F5482375D3CCA5EA1437BDEA3FA92D56DFF25404B7A99721FA1F3B589B
6,560,943 UART: [art] SIG.S = 976842EC08CF593FB03CF6CE3C1D961B14D57147077C3F241B731C64CCD7F29C6E246FC55425366EA0BAF42CE99A6EA4
6,585,008 UART: Caliptra RT
6,585,261 UART: [state] CFI Enabled
6,865,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,994 UART: [rt]cmd =0x41545348, len=116
6,897,715 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,000 ready_for_fw is high
1,056,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,533 >>> mbox cmd response: success
2,684,023 UART:
2,684,039 UART: Running Caliptra FMC ...
2,684,447 UART:
2,684,501 UART: [state] CFI Enabled
2,694,904 UART: [fht] FMC Alias Private Key: 7
2,801,923 UART: [art] Extend RT PCRs Done
2,802,351 UART: [art] Lock RT PCRs Done
2,803,887 UART: [art] Populate DV Done
2,812,060 UART: [fht] FMC Alias Private Key: 7
2,813,240 UART: [art] Derive CDI
2,813,520 UART: [art] Store in in slot 0x4
2,899,191 UART: [art] Derive Key Pair
2,899,551 UART: [art] Store priv key in slot 0x5
2,912,323 UART: [art] Derive Key Pair - Done
2,927,285 UART: [art] Signing Cert with AUTHO
2,927,765 UART: RITY.KEYID = 7
2,943,125 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,890 UART: [art] PUB.X = 7F40A2C50847FEF1358FB7D2082A438913E73324013FDFD721BB1AFC131B95299CF4A46AFE9C4E005F374ED2693FDA86
2,950,637 UART: [art] PUB.Y = A6EB1C8570B6A319BB5FFA7585E9DCED1343018A06B7D968188C201479756884DCC3D85B6D6CA7A6F03D202F72379B41
2,957,585 UART: [art] SIG.R = F6D53DE57BEF4C4F419F73389984DD52D0D9FB27CCB320E9C66C9345384D9F39370EF03674D19D1624DC70086D1D2F6B
2,964,355 UART: [art] SIG.S = FFBBD957E2CD481D6DA4770D656646087D9137EF00487C2A6CA97E1104E6936F51280B8417ACE8B9DA276763AD649BB4
2,988,206 UART: Caliptra RT
2,988,459 UART: [state] CFI Enabled
3,095,939 UART: [rt] RT listening for mailbox commands...
3,096,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,491 UART: [rt]cmd =0x41544d4e, len=14344
3,529,239 >>> mbox cmd response data (8 bytes)
3,529,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,255 UART: [rt]cmd =0x41545348, len=116
3,561,508 >>> mbox cmd response data (12 bytes)
3,561,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,994,090 >>> mbox cmd response: success
5,994,090 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,007,416 UART:
6,007,432 UART: Running Caliptra FMC ...
6,007,840 UART:
6,007,894 UART: [state] CFI Enabled
6,096,565 UART: [art] Extend RT PCRs Done
6,096,993 UART: [art] Lock RT PCRs Done
6,098,168 UART: [art] Populate DV Done
6,106,539 UART: [fht] FMC Alias Private Key: 7
6,107,629 UART: [art] Derive CDI
6,107,909 UART: [art] Store in in slot 0x4
6,193,684 UART: [art] Derive Key Pair
6,194,044 UART: [art] Store priv key in slot 0x5
6,206,768 UART: [art] Derive Key Pair - Done
6,221,299 UART: [art] Signing Cert with AUTHO
6,221,779 UART: RITY.KEYID = 7
6,236,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,237,684 UART: [art] PUB.X = 809EB46877A05FF27EA2251AE30F66345823E268CF25946A730E04A8D4D64D535C9B9FA34CDF4929C5611E1EDBDA467C
6,244,451 UART: [art] PUB.Y = 00ED3835EA7FD3B0D010BB031D849593731FDC524A58B331006A482B4FBE6C2170EAF6CD153352E084697376E54A0447
6,251,349 UART: [art] SIG.R = 3D238C714A6B2DC344A34FE4EED06F0D8BB67883B94C66916BF66AE2F894378D7DC088FE6190D21F8021A3880974430F
6,258,112 UART: [art] SIG.S = 90488EF749F03D2A22B9CAFDA824F9FACDF5672172E714D16FD1E684945E5BCB06C24C39C610EBAB0A50AC08980BD126
6,281,547 UART: Caliptra RT
6,281,800 UART: [state] CFI Enabled
6,564,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,595,634 UART: [rt]cmd =0x41545348, len=116
6,597,503 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,174,034 ready_for_fw is high
1,174,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,198,810 UART: [idev] Sha1 KeyId Algorithm
1,207,754 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,779 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,760 UART: [fwproc] Recv command 0x46574c44
1,282,493 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,128 >>> mbox cmd response: success
2,773,251 UART: [afmc] ++
2,773,419 UART: [afmc] CDI.KEYID = 6
2,773,782 UART: [afmc] SUBJECT.KEYID = 7
2,774,208 UART: [afmc] AUTHORITY.KEYID = 5
2,809,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,264 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,338 UART: [afmc] --
2,853,418 UART: [cold-reset] --
2,854,298 UART: [state] Locking Datavault
2,855,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,833 UART: [state] Locking ICCM
2,856,465 UART: [exit] Launching FMC @ 0x40000130
2,861,794 UART:
2,861,810 UART: Running Caliptra FMC ...
2,862,218 UART:
2,862,361 UART: [state] CFI Enabled
2,872,992 UART: [fht] FMC Alias Private Key: 7
2,980,975 UART: [art] Extend RT PCRs Done
2,981,403 UART: [art] Lock RT PCRs Done
2,982,581 UART: [art] Populate DV Done
2,990,968 UART: [fht] FMC Alias Private Key: 7
2,991,918 UART: [art] Derive CDI
2,992,198 UART: [art] Store in in slot 0x4
3,077,873 UART: [art] Derive Key Pair
3,078,233 UART: [art] Store priv key in slot 0x5
3,091,197 UART: [art] Derive Key Pair - Done
3,106,164 UART: [art] Signing Cert with AUTHO
3,106,644 UART: RITY.KEYID = 7
3,121,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,729 UART: [art] PUB.X = 6A320DAB41C2F69D023B595DDAE85AAFA1E3D590869B09F92651C1585FABA62F22426DB8654DE4FA1265CA6944B657F3
3,129,500 UART: [art] PUB.Y = B0C58218AE8A1A1BFFD9DB1A7BA01C0E1ADF34ACEBA340EAE48F5A2D2DDB83372B46B5FD598284129F684AE0EC850365
3,136,468 UART: [art] SIG.R = A1E23C13CE6EA2CA227933B8233CBE88AE8922128162C3EC9CD5619DC990DA4FD2F84F278DC8ABD0CBC79D14612F17C9
3,143,254 UART: [art] SIG.S = EA9F3630DFD1B6DC9A20BE081B28EB8E4AF753755AD83BD8ACD4981287B44A161905D991F4469387AF726E6F79F1A221
3,167,509 UART: Caliptra RT
3,167,854 UART: [state] CFI Enabled
3,274,976 UART: [rt] RT listening for mailbox commands...
3,275,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,900 UART: [rt]cmd =0x41544d4e, len=14344
3,708,452 >>> mbox cmd response data (8 bytes)
3,708,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,770 UART: [rt]cmd =0x41545348, len=116
3,740,587 >>> mbox cmd response data (12 bytes)
3,740,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,059 UART:
3,741,075 UART: Running Caliptra ROM ...
3,741,483 UART:
3,741,625 UART: [state] CFI Enabled
3,744,027 UART: [state] LifecycleState = Unprovisioned
3,744,682 UART: [state] DebugLocked = No
3,745,206 UART: [state] WD Timer not started. Device not locked for debugging
3,746,522 UART: [kat] SHA2-256
4,550,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,554,201 UART: [kat] ++
4,554,353 UART: [kat] sha1
4,558,653 UART: [kat] SHA2-256
4,560,593 UART: [kat] SHA2-384
4,563,348 UART: [kat] SHA2-512-ACC
4,565,248 UART: [kat] ECC-384
4,574,527 UART: [kat] HMAC-384Kdf
4,579,241 UART: [kat] LMS
4,827,553 UART: [kat] --
4,828,475 UART: [update-reset] ++
6,140,626 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,141,827 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,291,651 >>> mbox cmd response: success
6,291,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,291,770 UART: [update-reset] Copying MAN_2 To MAN_1
6,299,784 UART: [update-reset Success] --
6,300,771 UART: [state] Locking Datavault
6,301,595 UART: [state] Locking PCR0, PCR1 and PCR31
6,302,199 UART: [state] Locking ICCM
6,302,709 UART: [exit] Launching FMC @ 0x40000130
6,308,038 UART:
6,308,054 UART: Running Caliptra FMC ...
6,308,462 UART:
6,308,605 UART: [state] CFI Enabled
6,398,324 UART: [art] Extend RT PCRs Done
6,398,752 UART: [art] Lock RT PCRs Done
6,400,021 UART: [art] Populate DV Done
6,408,282 UART: [fht] FMC Alias Private Key: 7
6,409,220 UART: [art] Derive CDI
6,409,500 UART: [art] Store in in slot 0x4
6,495,323 UART: [art] Derive Key Pair
6,495,683 UART: [art] Store priv key in slot 0x5
6,509,827 UART: [art] Derive Key Pair - Done
6,524,640 UART: [art] Signing Cert with AUTHO
6,525,120 UART: RITY.KEYID = 7
6,540,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,191 UART: [art] PUB.X = B9C0FD35FCD299FC8290E75EC65BC44D14C3410A69D3BB6C1B0D0102D855379E2F64F4D7836927F527E93C88FA4E31E6
6,547,957 UART: [art] PUB.Y = A20645655381C7CAD696715353160940045172400B12C0366FC1BC81330606A8C14BE4E126E94395A92E973EDB220740
6,554,868 UART: [art] SIG.R = 631BAA0958F90CD242D8CDFD7A03D5EB2447DD9049214F0024391F76DB0028205ED648B31CBA68D6CFF241E6BE9EFCBE
6,561,601 UART: [art] SIG.S = 754C470264FE30235ED9BA9C15DB334A2051C24D2D50A4CD766A9582751CA79043347909C03A45081A7E6010808ADF9B
6,585,057 UART: Caliptra RT
6,585,402 UART: [state] CFI Enabled
6,867,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,897,944 UART: [rt]cmd =0x41545348, len=116
6,899,863 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 ready_for_fw is high
1,056,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,910 >>> mbox cmd response: success
2,685,000 UART:
2,685,016 UART: Running Caliptra FMC ...
2,685,424 UART:
2,685,567 UART: [state] CFI Enabled
2,695,984 UART: [fht] FMC Alias Private Key: 7
2,804,485 UART: [art] Extend RT PCRs Done
2,804,913 UART: [art] Lock RT PCRs Done
2,806,077 UART: [art] Populate DV Done
2,814,168 UART: [fht] FMC Alias Private Key: 7
2,815,298 UART: [art] Derive CDI
2,815,578 UART: [art] Store in in slot 0x4
2,901,691 UART: [art] Derive Key Pair
2,902,051 UART: [art] Store priv key in slot 0x5
2,915,497 UART: [art] Derive Key Pair - Done
2,930,477 UART: [art] Signing Cert with AUTHO
2,930,957 UART: RITY.KEYID = 7
2,945,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,760 UART: [art] PUB.X = 051F94DB57435DA929D938B4553EB10D366F2609EF7CA8CBAD83F7D12F832DD38CE543B03F6DFB4FF8EDEE4EB71A9FEA
2,953,545 UART: [art] PUB.Y = 92639D76798C3DAAA69F73E77151541A047FDCDFED5481E7C79C82A7A5EFEA25FD846B9A8B0CCBDE6BFE547CDC5F6AB5
2,960,515 UART: [art] SIG.R = 31BBB13185030CB818365F5693F74C4E13764F4D1E0CD36CEBED4522DF9CEDEF7710B165B2EAC94D84A5B4920EC7A047
2,967,285 UART: [art] SIG.S = E94488393FD5A4619C6AE654D5553E52B72CFDC92373257F851628464FBE7FDD4861CE908E1C8E242C5D6537479C2B03
2,991,031 UART: Caliptra RT
2,991,376 UART: [state] CFI Enabled
3,099,397 UART: [rt] RT listening for mailbox commands...
3,100,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,939 UART: [rt]cmd =0x41544d4e, len=14344
3,533,341 >>> mbox cmd response data (8 bytes)
3,533,342 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,253 UART: [rt]cmd =0x41545348, len=116
3,564,940 >>> mbox cmd response data (12 bytes)
3,564,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,523 >>> mbox cmd response: success
5,998,523 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,011,977 UART:
6,011,993 UART: Running Caliptra FMC ...
6,012,401 UART:
6,012,544 UART: [state] CFI Enabled
6,102,013 UART: [art] Extend RT PCRs Done
6,102,441 UART: [art] Lock RT PCRs Done
6,103,898 UART: [art] Populate DV Done
6,112,145 UART: [fht] FMC Alias Private Key: 7
6,113,195 UART: [art] Derive CDI
6,113,475 UART: [art] Store in in slot 0x4
6,199,196 UART: [art] Derive Key Pair
6,199,556 UART: [art] Store priv key in slot 0x5
6,212,454 UART: [art] Derive Key Pair - Done
6,227,356 UART: [art] Signing Cert with AUTHO
6,227,836 UART: RITY.KEYID = 7
6,242,866 UART: [art] Erasing AUTHORITY.KEYID = 7
6,243,631 UART: [art] PUB.X = FC44E64B86843B588DB416FBA09CBA9DC0BDB460D556F85ADDFCBA9647C3164EF9CFDD404EE8E7D38E10E989035C9461
6,250,418 UART: [art] PUB.Y = 93A21DDBAFEFE41ED6B2794CF61158D31FA381A35EC8D6BB694DCE73EAC65AF71B283575703269EFBE79CE169ED498F7
6,257,388 UART: [art] SIG.R = 79BA7041D18A3441ADCB98930C3E586F221FCF7B2A657222E384C33DDBD0463CCBB43E92065DAA949142C9BDDB8C2289
6,264,162 UART: [art] SIG.S = 66F02BC054DEF3BA1F5B87A70A599794B5A544945E8F67BA54814A0AB376CB065F0C662FC56EE1DE393B1875569E0C87
6,287,760 UART: Caliptra RT
6,288,105 UART: [state] CFI Enabled
6,568,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,599,579 UART: [rt]cmd =0x41545348, len=116
6,601,708 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,290 UART: [kat] SHA2-512-ACC
897,191 UART: [kat] ECC-384
902,856 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,505,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,576 UART: [idev] --
1,515,627 UART: [ldev] ++
1,515,795 UART: [ldev] CDI.KEYID = 6
1,516,158 UART: [ldev] SUBJECT.KEYID = 5
1,516,584 UART: [ldev] AUTHORITY.KEYID = 7
1,517,047 UART: [ldev] FE.KEYID = 1
1,522,389 UART: [ldev] Erasing FE.KEYID = 1
1,547,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,998 UART: [ldev] --
1,587,419 UART: [fwproc] Waiting for Commands...
1,588,238 UART: [fwproc] Received command 0x46574c44
1,589,029 UART: [fwproc] Received Image of size 114332 bytes
2,886,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,042 >>> mbox cmd response: success
3,081,158 UART: [afmc] ++
3,081,326 UART: [afmc] CDI.KEYID = 6
3,081,688 UART: [afmc] SUBJECT.KEYID = 7
3,082,113 UART: [afmc] AUTHORITY.KEYID = 5
3,117,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,277 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,967 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,852 UART: [afmc] --
3,160,764 UART: [cold-reset] --
3,161,818 UART: [state] Locking Datavault
3,163,121 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,725 UART: [state] Locking ICCM
3,164,223 UART: [exit] Launching FMC @ 0x40000130
3,169,552 UART:
3,169,568 UART: Running Caliptra FMC ...
3,169,976 UART:
3,170,030 UART: [state] CFI Enabled
3,180,581 UART: [fht] FMC Alias Private Key: 7
3,289,430 UART: [art] Extend RT PCRs Done
3,289,858 UART: [art] Lock RT PCRs Done
3,291,584 UART: [art] Populate DV Done
3,299,703 UART: [fht] FMC Alias Private Key: 7
3,300,637 UART: [art] Derive CDI
3,300,917 UART: [art] Store in in slot 0x4
3,386,674 UART: [art] Derive Key Pair
3,387,034 UART: [art] Store priv key in slot 0x5
3,400,272 UART: [art] Derive Key Pair - Done
3,415,074 UART: [art] Signing Cert with AUTHO
3,415,554 UART: RITY.KEYID = 7
3,430,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,671 UART: [art] PUB.X = 73FE67299290621228D4333265EB7F878A75B1CCB6FFA61582C5CB8DA38700451A23E7AB12478DA5737DCBDF876F3B9D
3,438,423 UART: [art] PUB.Y = DCA3CE90C03C2A8F8B1C13899483648A68B169B58658D409592D2B9838E9BDDAC9165918A412D65B7ECA67A63F80A191
3,445,372 UART: [art] SIG.R = C804E30F705FE59DCA31BEDC6208B563EA6445007997BAF78FDDFDB5D227871215276BB5275A626AFC9D27D7E679B298
3,452,119 UART: [art] SIG.S = 51D343136F1A347B90933D942A5C68986B1DCA7793EB60844C5B07D94B64E49D9467F98682EE4D28828FBEB8EC8736FA
3,475,783 UART: Caliptra RT
3,476,036 UART: [state] CFI Enabled
3,583,599 UART: [rt] RT listening for mailbox commands...
3,584,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,081 UART: [rt]cmd =0x41544d4e, len=14344
4,017,133 >>> mbox cmd response data (8 bytes)
4,017,134 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,333 UART: [rt]cmd =0x41545348, len=116
4,068,578 >>> mbox cmd response data (12 bytes)
4,068,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,718 UART: [rt]cmd =0x41545348, len=116
4,100,689 >>> mbox cmd response data (12 bytes)
4,100,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,664 UART:
4,101,680 UART: Running Caliptra ROM ...
4,102,088 UART:
4,102,142 UART: [state] CFI Enabled
4,104,752 UART: [state] LifecycleState = Unprovisioned
4,105,407 UART: [state] DebugLocked = No
4,106,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,107,674 UART: [kat] SHA2-256
4,901,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,905,720 UART: [kat] ++
4,905,872 UART: [kat] sha1
4,909,960 UART: [kat] SHA2-256
4,911,898 UART: [kat] SHA2-384
4,914,721 UART: [kat] SHA2-512-ACC
4,916,621 UART: [kat] ECC-384
4,922,316 UART: [kat] HMAC-384Kdf
4,926,778 UART: [kat] LMS
5,494,974 UART: [kat] --
5,495,837 UART: [update-reset] ++
6,829,643 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,830,901 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,980,777 >>> mbox cmd response: success
6,980,777 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,980,952 UART: [update-reset] Copying MAN_2 To MAN_1
6,988,966 UART: [update-reset Success] --
6,990,137 UART: [state] Locking Datavault
6,990,911 UART: [state] Locking PCR0, PCR1 and PCR31
6,991,515 UART: [state] Locking ICCM
6,992,087 UART: [exit] Launching FMC @ 0x40000130
6,997,416 UART:
6,997,432 UART: Running Caliptra FMC ...
6,997,840 UART:
6,997,894 UART: [state] CFI Enabled
7,087,223 UART: [art] Extend RT PCRs Done
7,087,651 UART: [art] Lock RT PCRs Done
7,088,850 UART: [art] Populate DV Done
7,097,183 UART: [fht] FMC Alias Private Key: 7
7,098,129 UART: [art] Derive CDI
7,098,409 UART: [art] Store in in slot 0x4
7,184,094 UART: [art] Derive Key Pair
7,184,454 UART: [art] Store priv key in slot 0x5
7,197,404 UART: [art] Derive Key Pair - Done
7,212,473 UART: [art] Signing Cert with AUTHO
7,212,953 UART: RITY.KEYID = 7
7,227,845 UART: [art] Erasing AUTHORITY.KEYID = 7
7,228,610 UART: [art] PUB.X = 8A6970D4C6FADA241540DE56A92301727221DBD6FC51B96A7482F5589206C11B64A948FE01CD5880E62C101D48A0EB34
7,235,371 UART: [art] PUB.Y = 0138C0848ECDF1D26AB11F9F8DF3CE0E316DDDB340F9A15C29A615D98249D61D3EE2278344DB147C5ACB6768DD75C8B3
7,242,329 UART: [art] SIG.R = 5B90A95E4A70F35D8B3B01E5547911B9F39E38CB5AB7EFE891CBADEA6A266FFB1BB349A47ABB90DB3A1DEC184EA9A59D
7,249,124 UART: [art] SIG.S = 4F6047690F653E0CBC333CC1CFB6518746778A0D9343FDE0F960B3F61EEAAF7E68D4EBEE03DEF76BE82E6A6418822C42
7,272,771 UART: Caliptra RT
7,273,024 UART: [state] CFI Enabled
7,554,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,585,391 UART: [rt]cmd =0x41545348, len=116
7,607,638 >>> mbox cmd response data (12 bytes)
7,607,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,637,804 UART: [rt]cmd =0x41545348, len=116
7,639,631 >>> mbox cmd response data (12 bytes)
7,639,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,762,071 UART: [rt]cmd =0x41544d4e, len=14344
8,072,385 >>> mbox cmd response data (8 bytes)
8,072,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,102,511 UART: [rt]cmd =0x41545348, len=116
8,124,886 >>> mbox cmd response data (12 bytes)
8,124,887 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,155,184 UART: [rt]cmd =0x41545348, len=116
8,157,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,927 ready_for_fw is high
1,362,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,504 >>> mbox cmd response: success
2,986,990 UART:
2,987,006 UART: Running Caliptra FMC ...
2,987,414 UART:
2,987,468 UART: [state] CFI Enabled
2,997,659 UART: [fht] FMC Alias Private Key: 7
3,105,538 UART: [art] Extend RT PCRs Done
3,105,966 UART: [art] Lock RT PCRs Done
3,107,558 UART: [art] Populate DV Done
3,115,597 UART: [fht] FMC Alias Private Key: 7
3,116,631 UART: [art] Derive CDI
3,116,911 UART: [art] Store in in slot 0x4
3,202,152 UART: [art] Derive Key Pair
3,202,512 UART: [art] Store priv key in slot 0x5
3,215,514 UART: [art] Derive Key Pair - Done
3,230,463 UART: [art] Signing Cert with AUTHO
3,230,943 UART: RITY.KEYID = 7
3,246,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,872 UART: [art] PUB.X = F079F89CB31FFA1B5878109F1DEB8C728D6EE7D9788E0D327B8DE4EFD6D4C8A5ABDD20456A1F3E8318951F9D15520B39
3,253,650 UART: [art] PUB.Y = B35F8757EAF4C5EC0563336046B8E104EDE9F213037B4C150A67FA0D8FC75715B4E544A7105756D17615DD4019493D5A
3,260,583 UART: [art] SIG.R = 39A07936AA4B3EDE2FB6B34595ECB32D78AFC897A406E006362CD4B8E98BE5D7A863BA681DF8A7A3CD13B5D64EB8F5EA
3,267,369 UART: [art] SIG.S = 386E6BBF86E62C41503947C47639B6C7EE86199F1F345AAEE332C3F5CC8F239F1FA7B51F001BE53E9864439134042473
3,291,903 UART: Caliptra RT
3,292,156 UART: [state] CFI Enabled
3,400,830 UART: [rt] RT listening for mailbox commands...
3,401,500 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,508 UART: [rt]cmd =0x41544d4e, len=14344
3,834,528 >>> mbox cmd response data (8 bytes)
3,834,529 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,584 UART: [rt]cmd =0x41545348, len=116
3,886,299 >>> mbox cmd response data (12 bytes)
3,886,300 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,689 UART: [rt]cmd =0x41545348, len=116
3,918,162 >>> mbox cmd response data (12 bytes)
3,918,163 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,680,836 >>> mbox cmd response: success
6,680,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,694,359 UART:
6,694,375 UART: Running Caliptra FMC ...
6,694,783 UART:
6,694,837 UART: [state] CFI Enabled
6,783,316 UART: [art] Extend RT PCRs Done
6,783,744 UART: [art] Lock RT PCRs Done
6,784,691 UART: [art] Populate DV Done
6,792,900 UART: [fht] FMC Alias Private Key: 7
6,793,854 UART: [art] Derive CDI
6,794,134 UART: [art] Store in in slot 0x4
6,879,575 UART: [art] Derive Key Pair
6,879,935 UART: [art] Store priv key in slot 0x5
6,893,395 UART: [art] Derive Key Pair - Done
6,908,445 UART: [art] Signing Cert with AUTHO
6,908,925 UART: RITY.KEYID = 7
6,924,273 UART: [art] Erasing AUTHORITY.KEYID = 7
6,925,038 UART: [art] PUB.X = B43AA24C26C15F40C0289B862DA57D5F3B004EC2EAFEEF4508E2C64979AB9E0CCFB408000E0E88004954E7CECE442B48
6,931,741 UART: [art] PUB.Y = 669163B8E721570C80C279D36D28C39D3685267A4574E1BC8BF390770A8418FB48D218C314EE509D5F43B284BEC7D230
6,938,679 UART: [art] SIG.R = 847409D374CA93CD33A80E7BC5C014A5942903C935C080DAA5343787BDC892D92A111023809643A402A7E52A7333800B
6,945,424 UART: [art] SIG.S = 3EAD306388234D37BCEB4B3EF4DD09E02EB782FC3620E8336EAE1B1BAB54FE63A375F2C068D2CB467EAA09D1AE096B31
6,969,350 UART: Caliptra RT
6,969,603 UART: [state] CFI Enabled
7,248,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,279,057 UART: [rt]cmd =0x41545348, len=116
7,300,186 >>> mbox cmd response data (12 bytes)
7,300,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,330,360 UART: [rt]cmd =0x41545348, len=116
7,331,953 >>> mbox cmd response data (12 bytes)
7,331,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,454,477 UART: [rt]cmd =0x41544d4e, len=14344
7,764,069 >>> mbox cmd response data (8 bytes)
7,764,070 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,794,143 UART: [rt]cmd =0x41545348, len=116
7,816,140 >>> mbox cmd response data (12 bytes)
7,816,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,846,156 UART: [rt]cmd =0x41545348, len=116
7,847,964 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,123 UART: [state] LifecycleState = Unprovisioned
86,778 UART: [state] DebugLocked = No
87,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,004 UART: [kat] SHA2-256
882,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,050 UART: [kat] ++
887,202 UART: [kat] sha1
891,414 UART: [kat] SHA2-256
893,352 UART: [kat] SHA2-384
896,213 UART: [kat] SHA2-512-ACC
898,114 UART: [kat] ECC-384
903,683 UART: [kat] HMAC-384Kdf
908,323 UART: [kat] LMS
1,476,519 UART: [kat] --
1,477,444 UART: [cold-reset] ++
1,477,922 UART: [fht] Storing FHT @ 0x50003400
1,480,887 UART: [idev] ++
1,481,055 UART: [idev] CDI.KEYID = 6
1,481,415 UART: [idev] SUBJECT.KEYID = 7
1,481,839 UART: [idev] UDS.KEYID = 0
1,482,184 ready_for_fw is high
1,482,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,475 UART: [idev] Erasing UDS.KEYID = 0
1,506,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,829 UART: [idev] --
1,515,902 UART: [ldev] ++
1,516,070 UART: [ldev] CDI.KEYID = 6
1,516,433 UART: [ldev] SUBJECT.KEYID = 5
1,516,859 UART: [ldev] AUTHORITY.KEYID = 7
1,517,322 UART: [ldev] FE.KEYID = 1
1,522,556 UART: [ldev] Erasing FE.KEYID = 1
1,548,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,339 UART: [ldev] --
1,587,788 UART: [fwproc] Waiting for Commands...
1,588,429 UART: [fwproc] Received command 0x46574c44
1,589,220 UART: [fwproc] Received Image of size 114332 bytes
2,886,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,861 >>> mbox cmd response: success
3,080,079 UART: [afmc] ++
3,080,247 UART: [afmc] CDI.KEYID = 6
3,080,609 UART: [afmc] SUBJECT.KEYID = 7
3,081,034 UART: [afmc] AUTHORITY.KEYID = 5
3,116,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,653 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,046 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,736 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,737 UART: [afmc] --
3,159,827 UART: [cold-reset] --
3,160,513 UART: [state] Locking Datavault
3,161,734 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,338 UART: [state] Locking ICCM
3,162,882 UART: [exit] Launching FMC @ 0x40000130
3,168,211 UART:
3,168,227 UART: Running Caliptra FMC ...
3,168,635 UART:
3,168,778 UART: [state] CFI Enabled
3,179,475 UART: [fht] FMC Alias Private Key: 7
3,287,660 UART: [art] Extend RT PCRs Done
3,288,088 UART: [art] Lock RT PCRs Done
3,289,804 UART: [art] Populate DV Done
3,298,065 UART: [fht] FMC Alias Private Key: 7
3,299,207 UART: [art] Derive CDI
3,299,487 UART: [art] Store in in slot 0x4
3,385,270 UART: [art] Derive Key Pair
3,385,630 UART: [art] Store priv key in slot 0x5
3,399,592 UART: [art] Derive Key Pair - Done
3,414,188 UART: [art] Signing Cert with AUTHO
3,414,668 UART: RITY.KEYID = 7
3,429,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,609 UART: [art] PUB.X = B2C5FBFE31837E48BC5BA4467F223FE5069319A26789549B97E3DC2EB8CA9A89CB21BFB05F618B9D637D293985B9AD14
3,437,386 UART: [art] PUB.Y = FF8DEB3CCE25F4F8CFA57B3AF21D73446E95B394D225CFE855286D2069A342BE9FDC72FAC3BF2495E2B90B770D0F5C9E
3,444,349 UART: [art] SIG.R = 000FFEAF822DCAB279939AFE43E077ECCD20F9233241E0BADEC29D0E589781D6927A63C242EDC2E4F17EBC95F229E55D
3,451,109 UART: [art] SIG.S = 0C319B61BEF717AED8A14F03F4D6E63FBC67A06E53FDABF0C110D63E1A1F355850B9EDE5543E8CEE22381EC02C69D6DE
3,475,054 UART: Caliptra RT
3,475,399 UART: [state] CFI Enabled
3,583,566 UART: [rt] RT listening for mailbox commands...
3,584,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,542 UART: [rt]cmd =0x41544d4e, len=14344
4,017,722 >>> mbox cmd response data (8 bytes)
4,017,723 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,898 UART: [rt]cmd =0x41545348, len=116
4,070,081 >>> mbox cmd response data (12 bytes)
4,070,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,100,347 UART: [rt]cmd =0x41545348, len=116
4,102,278 >>> mbox cmd response data (12 bytes)
4,102,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,103,127 UART:
4,103,143 UART: Running Caliptra ROM ...
4,103,551 UART:
4,103,692 UART: [state] CFI Enabled
4,106,204 UART: [state] LifecycleState = Unprovisioned
4,106,859 UART: [state] DebugLocked = No
4,107,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,109,068 UART: [kat] SHA2-256
4,902,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,907,114 UART: [kat] ++
4,907,266 UART: [kat] sha1
4,911,474 UART: [kat] SHA2-256
4,913,412 UART: [kat] SHA2-384
4,916,205 UART: [kat] SHA2-512-ACC
4,918,105 UART: [kat] ECC-384
4,923,698 UART: [kat] HMAC-384Kdf
4,928,328 UART: [kat] LMS
5,496,524 UART: [kat] --
5,497,539 UART: [update-reset] ++
6,832,541 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,833,753 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,983,629 >>> mbox cmd response: success
6,983,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,983,982 UART: [update-reset] Copying MAN_2 To MAN_1
6,991,996 UART: [update-reset Success] --
6,993,059 UART: [state] Locking Datavault
6,993,863 UART: [state] Locking PCR0, PCR1 and PCR31
6,994,467 UART: [state] Locking ICCM
6,994,975 UART: [exit] Launching FMC @ 0x40000130
7,000,304 UART:
7,000,320 UART: Running Caliptra FMC ...
7,000,728 UART:
7,000,871 UART: [state] CFI Enabled
7,090,536 UART: [art] Extend RT PCRs Done
7,090,964 UART: [art] Lock RT PCRs Done
7,091,893 UART: [art] Populate DV Done
7,100,120 UART: [fht] FMC Alias Private Key: 7
7,101,240 UART: [art] Derive CDI
7,101,520 UART: [art] Store in in slot 0x4
7,187,367 UART: [art] Derive Key Pair
7,187,727 UART: [art] Store priv key in slot 0x5
7,201,455 UART: [art] Derive Key Pair - Done
7,215,780 UART: [art] Signing Cert with AUTHO
7,216,260 UART: RITY.KEYID = 7
7,231,680 UART: [art] Erasing AUTHORITY.KEYID = 7
7,232,445 UART: [art] PUB.X = A0434F51A1629C2020F982A950C5A52FC03DF74FB6E682CF8EA20E5067E48438510972363D0A28E8EE7A11EADE8A06E9
7,239,207 UART: [art] PUB.Y = 5ADADD1B13625EB48659E522B04EFDD717F56B0BF70AD9E76D942DB122FDAC10D91BC3F243FB785CA1FB941BF549A151
7,246,171 UART: [art] SIG.R = CDACD5D1C51B79BDE8745C5D78E5E4D7B3D8B8B3880056787A591295CEFFF061F61DECB354A32B293B485BF597105D4B
7,252,933 UART: [art] SIG.S = 3435BB5ADF42088D2D951358BB29047915D4251A5BB5D257EB7373539E5887581621DD3E564E7C690D8275C333C0AEA3
7,276,433 UART: Caliptra RT
7,276,778 UART: [state] CFI Enabled
7,560,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,591,024 UART: [rt]cmd =0x41545348, len=116
7,613,171 >>> mbox cmd response data (12 bytes)
7,613,172 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,643,281 UART: [rt]cmd =0x41545348, len=116
7,645,044 >>> mbox cmd response data (12 bytes)
7,645,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,767,710 UART: [rt]cmd =0x41544d4e, len=14344
8,077,480 >>> mbox cmd response data (8 bytes)
8,077,481 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,107,698 UART: [rt]cmd =0x41545348, len=116
8,129,617 >>> mbox cmd response data (12 bytes)
8,129,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,159,731 UART: [rt]cmd =0x41545348, len=116
8,161,667 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,778 ready_for_fw is high
1,362,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,307 >>> mbox cmd response: success
2,990,269 UART:
2,990,285 UART: Running Caliptra FMC ...
2,990,693 UART:
2,990,836 UART: [state] CFI Enabled
3,001,177 UART: [fht] FMC Alias Private Key: 7
3,109,714 UART: [art] Extend RT PCRs Done
3,110,142 UART: [art] Lock RT PCRs Done
3,111,694 UART: [art] Populate DV Done
3,119,853 UART: [fht] FMC Alias Private Key: 7
3,120,865 UART: [art] Derive CDI
3,121,145 UART: [art] Store in in slot 0x4
3,207,450 UART: [art] Derive Key Pair
3,207,810 UART: [art] Store priv key in slot 0x5
3,221,594 UART: [art] Derive Key Pair - Done
3,236,139 UART: [art] Signing Cert with AUTHO
3,236,619 UART: RITY.KEYID = 7
3,252,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,828 UART: [art] PUB.X = 43B64C5DC503031F97B8925F8EFB6E1C1061554DF9D5A8575440F297E5540D48411AC38E48A477BC9FCB788ED6FD1A5A
3,259,595 UART: [art] PUB.Y = 4A321E5E8CB7370B52F7DF15000BA4DF0E44BD0F6FE53DEB801D93A73302DE817AE0F1757D620AC4DD22F7E3B1B494D6
3,266,521 UART: [art] SIG.R = 1A4CB8566026796A3AF6FF3834B68C64FC4FC60D453DA0F9B5C295103CFABDE71881934684D6D319A5D9817D022D6E57
3,273,289 UART: [art] SIG.S = 854E18DCE3FA5DEA8AC2E54A412E9DEFAC11465452702483DFB2DFEA84BF8655462E485E7CABDDD96ECB79A392EABEB3
3,297,040 UART: Caliptra RT
3,297,385 UART: [state] CFI Enabled
3,405,122 UART: [rt] RT listening for mailbox commands...
3,405,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,876 UART: [rt]cmd =0x41544d4e, len=14344
3,839,208 >>> mbox cmd response data (8 bytes)
3,839,209 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,172 UART: [rt]cmd =0x41545348, len=116
3,890,641 >>> mbox cmd response data (12 bytes)
3,890,642 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,685 UART: [rt]cmd =0x41545348, len=116
3,922,286 >>> mbox cmd response data (12 bytes)
3,922,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,684,185 >>> mbox cmd response: success
6,684,185 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,697,224 UART:
6,697,240 UART: Running Caliptra FMC ...
6,697,648 UART:
6,697,791 UART: [state] CFI Enabled
6,787,624 UART: [art] Extend RT PCRs Done
6,788,052 UART: [art] Lock RT PCRs Done
6,789,301 UART: [art] Populate DV Done
6,797,486 UART: [fht] FMC Alias Private Key: 7
6,798,554 UART: [art] Derive CDI
6,798,834 UART: [art] Store in in slot 0x4
6,884,039 UART: [art] Derive Key Pair
6,884,399 UART: [art] Store priv key in slot 0x5
6,897,145 UART: [art] Derive Key Pair - Done
6,911,726 UART: [art] Signing Cert with AUTHO
6,912,206 UART: RITY.KEYID = 7
6,927,692 UART: [art] Erasing AUTHORITY.KEYID = 7
6,928,457 UART: [art] PUB.X = 1EC65D5B354DFBA4CBB821434682D58F2C70143B4619D8A82E0A9A18CC7976B233E39217041C7545FD4B94EE67440CA0
6,935,220 UART: [art] PUB.Y = 4F55986158F9DD7CCCA2B90275D5AA6703E0B3A24206116FD259D9E5A5E10F357F56D1F807281109FB2416D1F969652E
6,942,150 UART: [art] SIG.R = 24D3A21F96617CE97F3DF46BBDC935FF9F51610885CEC0EA64D41BFE9F817F9C6A9646856AF526F830B7EFC37876FFEA
6,948,933 UART: [art] SIG.S = 8AEC3C432B52BA13BA2651FB45FDD4537980CCBA733CBA5F154DCECD1C2DB881CA0B096CD6060CEF93D2859D5384611F
6,972,404 UART: Caliptra RT
6,972,749 UART: [state] CFI Enabled
7,256,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,287,721 UART: [rt]cmd =0x41545348, len=116
7,310,372 >>> mbox cmd response data (12 bytes)
7,310,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,340,580 UART: [rt]cmd =0x41545348, len=116
7,341,975 >>> mbox cmd response data (12 bytes)
7,341,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,464,505 UART: [rt]cmd =0x41544d4e, len=14344
7,774,623 >>> mbox cmd response data (8 bytes)
7,774,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,804,417 UART: [rt]cmd =0x41545348, len=116
7,825,856 >>> mbox cmd response data (12 bytes)
7,825,857 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,855,832 UART: [rt]cmd =0x41545348, len=116
7,857,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,834 UART: [state] LifecycleState = Unprovisioned
86,489 UART: [state] DebugLocked = No
87,079 UART: [state] WD Timer not started. Device not locked for debugging
88,436 UART: [kat] SHA2-256
894,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,211 UART: [kat] ++
898,363 UART: [kat] sha1
902,565 UART: [kat] SHA2-256
904,505 UART: [kat] SHA2-384
907,374 UART: [kat] SHA2-512-ACC
909,275 UART: [kat] ECC-384
918,620 UART: [kat] HMAC-384Kdf
923,188 UART: [kat] LMS
1,171,516 UART: [kat] --
1,172,379 UART: [cold-reset] ++
1,172,741 UART: [fht] FHT @ 0x50003400
1,175,404 UART: [idev] ++
1,175,572 UART: [idev] CDI.KEYID = 6
1,175,932 UART: [idev] SUBJECT.KEYID = 7
1,176,356 UART: [idev] UDS.KEYID = 0
1,176,701 ready_for_fw is high
1,176,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,201,279 UART: [idev] Sha1 KeyId Algorithm
1,209,885 UART: [idev] --
1,211,033 UART: [ldev] ++
1,211,201 UART: [ldev] CDI.KEYID = 6
1,211,564 UART: [ldev] SUBJECT.KEYID = 5
1,211,990 UART: [ldev] AUTHORITY.KEYID = 7
1,212,453 UART: [ldev] FE.KEYID = 1
1,217,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,553 UART: [ldev] --
1,282,874 UART: [fwproc] Wait for Commands...
1,283,692 UART: [fwproc] Recv command 0x46574c44
1,284,420 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,057 >>> mbox cmd response: success
2,776,229 UART: [afmc] ++
2,776,397 UART: [afmc] CDI.KEYID = 6
2,776,759 UART: [afmc] SUBJECT.KEYID = 7
2,777,184 UART: [afmc] AUTHORITY.KEYID = 5
2,812,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,212 UART: [afmc] --
2,856,234 UART: [cold-reset] --
2,857,202 UART: [state] Locking Datavault
2,858,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,085 UART: [state] Locking ICCM
2,859,581 UART: [exit] Launching FMC @ 0x40000130
2,864,910 UART:
2,864,926 UART: Running Caliptra FMC ...
2,865,334 UART:
2,865,388 UART: [state] CFI Enabled
2,875,713 UART: [fht] FMC Alias Private Key: 7
2,983,770 UART: [art] Extend RT PCRs Done
2,984,198 UART: [art] Lock RT PCRs Done
2,986,046 UART: [art] Populate DV Done
2,994,189 UART: [fht] FMC Alias Private Key: 7
2,995,303 UART: [art] Derive CDI
2,995,583 UART: [art] Store in in slot 0x4
3,081,330 UART: [art] Derive Key Pair
3,081,690 UART: [art] Store priv key in slot 0x5
3,094,940 UART: [art] Derive Key Pair - Done
3,109,707 UART: [art] Signing Cert with AUTHO
3,110,187 UART: RITY.KEYID = 7
3,125,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,002 UART: [art] PUB.X = F6493A675742E5BABDFBF38AE0D6A4973AD2F5710E7EF752F17DDA07BD074A7864E2FAFDD67C85792E0C74A5E3610F6C
3,132,775 UART: [art] PUB.Y = ACB6EBF0C7400DD9C105F622AD7890CCB59DEC52DD250E087CEF64DB880AC09645474896F3DA4B4172C4EC95D514BCD8
3,139,728 UART: [art] SIG.R = 19F7211A76E904876EFF03CDBE7B8D5BE72682C957A60D1538F4442DFB62271D4DD95FA22373A6D6D2434F011A175297
3,146,486 UART: [art] SIG.S = 18F4ACA8F8E388D88C3D78000381AA329C4C93B41F6F6996FA718009F95B121433C5ED3BB6A4C2C0D8D603159034DDA5
3,169,464 UART: Caliptra RT
3,169,717 UART: [state] CFI Enabled
3,276,960 UART: [rt] RT listening for mailbox commands...
3,277,630 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,862 UART: [rt]cmd =0x41544d4e, len=14344
3,711,194 >>> mbox cmd response data (8 bytes)
3,711,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,248 UART: [rt]cmd =0x41545348, len=116
3,762,855 >>> mbox cmd response data (12 bytes)
3,762,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,013 UART: [rt]cmd =0x41545348, len=116
3,794,860 >>> mbox cmd response data (12 bytes)
3,794,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,682 UART:
3,795,698 UART: Running Caliptra ROM ...
3,796,106 UART:
3,796,161 UART: [state] CFI Enabled
3,799,037 UART: [state] LifecycleState = Unprovisioned
3,799,692 UART: [state] DebugLocked = No
3,800,272 UART: [state] WD Timer not started. Device not locked for debugging
3,801,474 UART: [kat] SHA2-256
4,607,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,611,249 UART: [kat] ++
4,611,401 UART: [kat] sha1
4,615,755 UART: [kat] SHA2-256
4,617,695 UART: [kat] SHA2-384
4,620,492 UART: [kat] SHA2-512-ACC
4,622,392 UART: [kat] ECC-384
4,632,141 UART: [kat] HMAC-384Kdf
4,636,837 UART: [kat] LMS
4,885,165 UART: [kat] --
4,886,141 UART: [update-reset] ++
6,199,531 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,200,690 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,350,514 >>> mbox cmd response: success
6,350,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,350,833 UART: [update-reset] Copying MAN_2 To MAN_1
6,358,847 UART: [update-reset Success] --
6,359,806 UART: [state] Locking Datavault
6,360,740 UART: [state] Locking PCR0, PCR1 and PCR31
6,361,344 UART: [state] Locking ICCM
6,361,788 UART: [exit] Launching FMC @ 0x40000130
6,367,117 UART:
6,367,133 UART: Running Caliptra FMC ...
6,367,541 UART:
6,367,595 UART: [state] CFI Enabled
6,457,010 UART: [art] Extend RT PCRs Done
6,457,438 UART: [art] Lock RT PCRs Done
6,458,537 UART: [art] Populate DV Done
6,466,616 UART: [fht] FMC Alias Private Key: 7
6,467,694 UART: [art] Derive CDI
6,467,974 UART: [art] Store in in slot 0x4
6,553,357 UART: [art] Derive Key Pair
6,553,717 UART: [art] Store priv key in slot 0x5
6,567,031 UART: [art] Derive Key Pair - Done
6,581,655 UART: [art] Signing Cert with AUTHO
6,582,135 UART: RITY.KEYID = 7
6,597,491 UART: [art] Erasing AUTHORITY.KEYID = 7
6,598,256 UART: [art] PUB.X = CCBEFEB554F0F63A02CE47ADB1E2E17251FF08B9C32A5FF695333940526BFB05D3C6BC3E669C801538F83A360DBD6000
6,605,006 UART: [art] PUB.Y = D2958B77CC39E48F2157AD3D4A5EE8AD2688FD137CC1102BD70F6583703BF3852F81E6D857E5100B3E3A2F878714E607
6,611,949 UART: [art] SIG.R = ABAA473A3B11F552C41C85C30EEB2C1749270A5F62CC5411FE9B5D1B584FED326032C568F41AF63C8109FB66EDC0D48F
6,618,724 UART: [art] SIG.S = 4F263D5D885BCB98BAB6BB57B8314D31B48F13A98EC3B1619CE9D031103E5955ABC15D9BE39AF01E91EBD570A717EC5A
6,642,529 UART: Caliptra RT
6,642,782 UART: [state] CFI Enabled
6,923,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,953,918 UART: [rt]cmd =0x41545348, len=116
6,975,587 >>> mbox cmd response data (12 bytes)
6,975,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,005,713 UART: [rt]cmd =0x41545348, len=116
7,007,736 >>> mbox cmd response data (12 bytes)
7,007,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,130,070 UART: [rt]cmd =0x41544d4e, len=14344
7,440,466 >>> mbox cmd response data (8 bytes)
7,440,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,470,776 UART: [rt]cmd =0x41545348, len=116
7,492,337 >>> mbox cmd response data (12 bytes)
7,492,338 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,522,445 UART: [rt]cmd =0x41545348, len=116
7,524,129 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 ready_for_fw is high
1,060,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,746 >>> mbox cmd response: success
2,688,488 UART:
2,688,504 UART: Running Caliptra FMC ...
2,688,912 UART:
2,688,966 UART: [state] CFI Enabled
2,699,163 UART: [fht] FMC Alias Private Key: 7
2,807,314 UART: [art] Extend RT PCRs Done
2,807,742 UART: [art] Lock RT PCRs Done
2,809,710 UART: [art] Populate DV Done
2,817,889 UART: [fht] FMC Alias Private Key: 7
2,818,899 UART: [art] Derive CDI
2,819,179 UART: [art] Store in in slot 0x4
2,904,736 UART: [art] Derive Key Pair
2,905,096 UART: [art] Store priv key in slot 0x5
2,917,888 UART: [art] Derive Key Pair - Done
2,932,438 UART: [art] Signing Cert with AUTHO
2,932,918 UART: RITY.KEYID = 7
2,948,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,925 UART: [art] PUB.X = 505E45E618DE83DCAF88A949CF4A3B99A58E706F1A06A9C3EE497E3E7AD44BC0E39D049D35F7FCFF831944BEE95D8881
2,955,705 UART: [art] PUB.Y = 7ED855209FA7ACDADC701FC17E1C882334E7DF6E9812478D7563F547D6F6BCECDD81A3E52E8B6D97BAA229AE2CE78F7F
2,962,677 UART: [art] SIG.R = C01D1128D7132F0F847CDA79D157C5CA431D09BFBF4AE4894FA61C3092BE771B05A2F83115DD3051B580B9F39C09062E
2,969,438 UART: [art] SIG.S = 6FBDD38C0AD2275EF29537E7CED1E3FFD72DD83804E8D6DDBF871DD8840B26660CB2FBB1BD5F535C90FDD6F2CF313F82
2,992,811 UART: Caliptra RT
2,993,064 UART: [state] CFI Enabled
3,100,695 UART: [rt] RT listening for mailbox commands...
3,101,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,469 UART: [rt]cmd =0x41544d4e, len=14344
3,534,169 >>> mbox cmd response data (8 bytes)
3,534,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,153 UART: [rt]cmd =0x41545348, len=116
3,586,236 >>> mbox cmd response data (12 bytes)
3,586,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,522 UART: [rt]cmd =0x41545348, len=116
3,618,189 >>> mbox cmd response data (12 bytes)
3,618,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,055,764 >>> mbox cmd response: success
6,055,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,069,066 UART:
6,069,082 UART: Running Caliptra FMC ...
6,069,490 UART:
6,069,544 UART: [state] CFI Enabled
6,158,625 UART: [art] Extend RT PCRs Done
6,159,053 UART: [art] Lock RT PCRs Done
6,160,088 UART: [art] Populate DV Done
6,168,307 UART: [fht] FMC Alias Private Key: 7
6,169,321 UART: [art] Derive CDI
6,169,601 UART: [art] Store in in slot 0x4
6,255,240 UART: [art] Derive Key Pair
6,255,600 UART: [art] Store priv key in slot 0x5
6,268,762 UART: [art] Derive Key Pair - Done
6,283,523 UART: [art] Signing Cert with AUTHO
6,284,003 UART: RITY.KEYID = 7
6,298,493 UART: [art] Erasing AUTHORITY.KEYID = 7
6,299,258 UART: [art] PUB.X = E9DA51C2F09A12EA86FA767369C2C090609123564632BFA707D9EC00FC05A30C2E229AC1EB16576D7B4AF1F721B16F8F
6,306,005 UART: [art] PUB.Y = 91492E670A279FAEC197CDB3C1A58B600017A780D7FA63A21C6729321C199FB3F6171B13E23BD4C91623CFFE0D0A3EA4
6,312,932 UART: [art] SIG.R = D4032B449F108F2F38C510ECF041B372B7EC894F7F558CE0C6C08A5EEFC96F8B8B6023951BFE9C9D3D7DF00101065C4A
6,319,702 UART: [art] SIG.S = B28D68D5E4BB5A5E8590A525C2D856C4C7C6FE55A55378AF38DD9F19DF9F2504B69CEFFE321634059CD05A821AC7DD54
6,343,721 UART: Caliptra RT
6,343,974 UART: [state] CFI Enabled
6,624,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,655,825 UART: [rt]cmd =0x41545348, len=116
6,678,646 >>> mbox cmd response data (12 bytes)
6,678,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,708,738 UART: [rt]cmd =0x41545348, len=116
6,710,573 >>> mbox cmd response data (12 bytes)
6,710,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,833,145 UART: [rt]cmd =0x41544d4e, len=14344
7,142,873 >>> mbox cmd response data (8 bytes)
7,142,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,172,891 UART: [rt]cmd =0x41545348, len=116
7,195,024 >>> mbox cmd response data (12 bytes)
7,195,025 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,225,086 UART: [rt]cmd =0x41545348, len=116
7,226,836 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
893,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,314 UART: [kat] ++
897,466 UART: [kat] sha1
901,838 UART: [kat] SHA2-256
903,778 UART: [kat] SHA2-384
906,437 UART: [kat] SHA2-512-ACC
908,338 UART: [kat] ECC-384
918,083 UART: [kat] HMAC-384Kdf
922,593 UART: [kat] LMS
1,170,921 UART: [kat] --
1,171,634 UART: [cold-reset] ++
1,172,014 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 ready_for_fw is high
1,176,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,401 UART: [idev] Erasing UDS.KEYID = 0
1,200,790 UART: [idev] Sha1 KeyId Algorithm
1,209,220 UART: [idev] --
1,210,432 UART: [ldev] ++
1,210,600 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,389 UART: [ldev] AUTHORITY.KEYID = 7
1,211,852 UART: [ldev] FE.KEYID = 1
1,217,348 UART: [ldev] Erasing FE.KEYID = 1
1,244,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,892 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,101 UART: [fwproc] Recv command 0x46574c44
1,284,829 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,734 >>> mbox cmd response: success
2,776,952 UART: [afmc] ++
2,777,120 UART: [afmc] CDI.KEYID = 6
2,777,482 UART: [afmc] SUBJECT.KEYID = 7
2,777,907 UART: [afmc] AUTHORITY.KEYID = 5
2,813,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,567 UART: [afmc] --
2,857,691 UART: [cold-reset] --
2,858,737 UART: [state] Locking Datavault
2,859,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,440 UART: [state] Locking ICCM
2,861,000 UART: [exit] Launching FMC @ 0x40000130
2,866,329 UART:
2,866,345 UART: Running Caliptra FMC ...
2,866,753 UART:
2,866,896 UART: [state] CFI Enabled
2,877,503 UART: [fht] FMC Alias Private Key: 7
2,985,016 UART: [art] Extend RT PCRs Done
2,985,444 UART: [art] Lock RT PCRs Done
2,987,166 UART: [art] Populate DV Done
2,995,459 UART: [fht] FMC Alias Private Key: 7
2,996,527 UART: [art] Derive CDI
2,996,807 UART: [art] Store in in slot 0x4
3,081,916 UART: [art] Derive Key Pair
3,082,276 UART: [art] Store priv key in slot 0x5
3,095,648 UART: [art] Derive Key Pair - Done
3,110,580 UART: [art] Signing Cert with AUTHO
3,111,060 UART: RITY.KEYID = 7
3,126,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,967 UART: [art] PUB.X = 85FCBE61310EC4DDC7F5DD00ABA7B0DD0C13D07354137BF3CD7268EF086E6A5BF82591BE2B663A4ED6018B8A627F4BC8
3,133,723 UART: [art] PUB.Y = 726CF0CD76ACC6202E520ABA528471040F1FBFAB4B9DE5C0E187DA3B36CDDD97F56B57043D739136356E72D93467D374
3,140,669 UART: [art] SIG.R = 296AF61F5D321E368C81235F8977C06F1324F889EC941CF7362A56EE1805C88CCDFABB46BF7A258A9CCEE113F0F59B29
3,147,446 UART: [art] SIG.S = B2CEA43245E3FF734DCF07509646BAF613292AA21065D0CB3B5BAE26A011E000E4A8659CE2A5EC2883E53EDC3C48EEAD
3,171,512 UART: Caliptra RT
3,171,857 UART: [state] CFI Enabled
3,279,736 UART: [rt] RT listening for mailbox commands...
3,280,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,536 UART: [rt]cmd =0x41544d4e, len=14344
3,713,690 >>> mbox cmd response data (8 bytes)
3,713,691 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,714 UART: [rt]cmd =0x41545348, len=116
3,766,325 >>> mbox cmd response data (12 bytes)
3,766,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,339 UART: [rt]cmd =0x41545348, len=116
3,798,084 >>> mbox cmd response data (12 bytes)
3,798,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,006 UART:
3,799,022 UART: Running Caliptra ROM ...
3,799,430 UART:
3,799,572 UART: [state] CFI Enabled
3,802,168 UART: [state] LifecycleState = Unprovisioned
3,802,823 UART: [state] DebugLocked = No
3,803,435 UART: [state] WD Timer not started. Device not locked for debugging
3,804,715 UART: [kat] SHA2-256
4,610,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,614,490 UART: [kat] ++
4,614,642 UART: [kat] sha1
4,618,904 UART: [kat] SHA2-256
4,620,844 UART: [kat] SHA2-384
4,623,833 UART: [kat] SHA2-512-ACC
4,625,733 UART: [kat] ECC-384
4,635,650 UART: [kat] HMAC-384Kdf
4,640,236 UART: [kat] LMS
4,888,564 UART: [kat] --
4,889,726 UART: [update-reset] ++
6,202,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,204,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,353,965 >>> mbox cmd response: success
6,353,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,354,092 UART: [update-reset] Copying MAN_2 To MAN_1
6,362,106 UART: [update-reset Success] --
6,363,125 UART: [state] Locking Datavault
6,363,923 UART: [state] Locking PCR0, PCR1 and PCR31
6,364,527 UART: [state] Locking ICCM
6,365,095 UART: [exit] Launching FMC @ 0x40000130
6,370,424 UART:
6,370,440 UART: Running Caliptra FMC ...
6,370,848 UART:
6,370,991 UART: [state] CFI Enabled
6,460,502 UART: [art] Extend RT PCRs Done
6,460,930 UART: [art] Lock RT PCRs Done
6,462,235 UART: [art] Populate DV Done
6,470,654 UART: [fht] FMC Alias Private Key: 7
6,471,686 UART: [art] Derive CDI
6,471,966 UART: [art] Store in in slot 0x4
6,557,681 UART: [art] Derive Key Pair
6,558,041 UART: [art] Store priv key in slot 0x5
6,570,933 UART: [art] Derive Key Pair - Done
6,585,836 UART: [art] Signing Cert with AUTHO
6,586,316 UART: RITY.KEYID = 7
6,601,358 UART: [art] Erasing AUTHORITY.KEYID = 7
6,602,123 UART: [art] PUB.X = 35421A9A022D555397228F186AA775FF0D039F118737346114AC14A86EA2A28DED2059C8A2DB59A08C8C86D0A653908D
6,608,880 UART: [art] PUB.Y = 10C3C1772C3190C489371DC99ABCCD263CEB5AA7DE23DF6CA7A0517273732DDB3EF8F876788AEABA860C41AF1D3EDEE4
6,615,849 UART: [art] SIG.R = 8FE4135F73BCB91E628095B121A727E9E4D1A47ADE6E93899AF89386F268C9AD68CA51B50808B282935DFA6D14D85A37
6,622,617 UART: [art] SIG.S = 361DAC47B64716829C86E711CD1595DED6C28DF43EB30A4AE2A276659E8B49C0260034DB31A06BB4A7706EC34ED1DCE4
6,646,543 UART: Caliptra RT
6,646,888 UART: [state] CFI Enabled
6,927,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,958,014 UART: [rt]cmd =0x41545348, len=116
6,979,565 >>> mbox cmd response data (12 bytes)
6,979,566 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,009,733 UART: [rt]cmd =0x41545348, len=116
7,011,598 >>> mbox cmd response data (12 bytes)
7,011,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,134,234 UART: [rt]cmd =0x41544d4e, len=14344
7,444,504 >>> mbox cmd response data (8 bytes)
7,444,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,474,622 UART: [rt]cmd =0x41545348, len=116
7,496,767 >>> mbox cmd response data (12 bytes)
7,496,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,526,857 UART: [rt]cmd =0x41545348, len=116
7,528,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,702 ready_for_fw is high
1,060,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,951 >>> mbox cmd response: success
2,689,451 UART:
2,689,467 UART: Running Caliptra FMC ...
2,689,875 UART:
2,690,018 UART: [state] CFI Enabled
2,700,807 UART: [fht] FMC Alias Private Key: 7
2,807,698 UART: [art] Extend RT PCRs Done
2,808,126 UART: [art] Lock RT PCRs Done
2,809,558 UART: [art] Populate DV Done
2,817,811 UART: [fht] FMC Alias Private Key: 7
2,818,853 UART: [art] Derive CDI
2,819,133 UART: [art] Store in in slot 0x4
2,904,702 UART: [art] Derive Key Pair
2,905,062 UART: [art] Store priv key in slot 0x5
2,917,920 UART: [art] Derive Key Pair - Done
2,932,740 UART: [art] Signing Cert with AUTHO
2,933,220 UART: RITY.KEYID = 7
2,949,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,017 UART: [art] PUB.X = CA570816F62A5D15A8678EED7656D84049B68C15F36B7D2091EDD7ECE59E58E4D317DCE78FFF3051C54B0D919B59A10C
2,956,788 UART: [art] PUB.Y = D0FC5468E3DAF5A39ED56D69731E2F143E53272EA31E57D3EF35ED60AFFE8D1E4D1C3558AD92591E234FBE35754C0246
2,963,747 UART: [art] SIG.R = 23A279255FFEA82549F52340AFE275D912150781B42252FD39BEBDBF8E5ED312E3E6385BEDA8235C87A087BDBF1F4524
2,970,522 UART: [art] SIG.S = 6DB5D754299EABFC3D767D2881C18AC7BA4F02EF2DB121ADED55D625F1DEA7911795A1DE578EBB844D14F6EBD5CF7C79
2,994,058 UART: Caliptra RT
2,994,403 UART: [state] CFI Enabled
3,102,090 UART: [rt] RT listening for mailbox commands...
3,102,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,622 UART: [rt]cmd =0x41544d4e, len=14344
3,535,268 >>> mbox cmd response data (8 bytes)
3,535,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,234 UART: [rt]cmd =0x41545348, len=116
3,586,823 >>> mbox cmd response data (12 bytes)
3,586,824 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,949 UART: [rt]cmd =0x41545348, len=116
3,618,568 >>> mbox cmd response data (12 bytes)
3,618,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,056,186 >>> mbox cmd response: success
6,056,186 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,069,546 UART:
6,069,562 UART: Running Caliptra FMC ...
6,069,970 UART:
6,070,113 UART: [state] CFI Enabled
6,159,532 UART: [art] Extend RT PCRs Done
6,159,960 UART: [art] Lock RT PCRs Done
6,161,061 UART: [art] Populate DV Done
6,169,162 UART: [fht] FMC Alias Private Key: 7
6,170,316 UART: [art] Derive CDI
6,170,596 UART: [art] Store in in slot 0x4
6,256,373 UART: [art] Derive Key Pair
6,256,733 UART: [art] Store priv key in slot 0x5
6,269,999 UART: [art] Derive Key Pair - Done
6,284,866 UART: [art] Signing Cert with AUTHO
6,285,346 UART: RITY.KEYID = 7
6,300,626 UART: [art] Erasing AUTHORITY.KEYID = 7
6,301,391 UART: [art] PUB.X = 05B6D211A051C4ED6EE7C90C4FE1443980F0D04D0B5ED03595F956777821690FA206DEC2510DD1BC61A8F32BA0C70E17
6,308,146 UART: [art] PUB.Y = 8D4B000865D710DA10F0EEF39884077CA050F393FC3B3E989A48B354B1CD6496C393A9D266EC2B7E958C6AB5EAEB46E3
6,315,078 UART: [art] SIG.R = 46083D57DD4AA3552C2FA9C476C6BDE9BE385E7501743E6D09700A8001ADEF9FE02D70289C0B3ABD0CF8C769C8D5A052
6,321,839 UART: [art] SIG.S = 1600C9E681DA8A7EC9672D840E40D86F30D2E69D2CC80DDC8B2244CEAE9245F1BA4AAD1D8A3B1E27BB53601EB2202C41
6,345,808 UART: Caliptra RT
6,346,153 UART: [state] CFI Enabled
6,629,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,660,487 UART: [rt]cmd =0x41545348, len=116
6,682,672 >>> mbox cmd response data (12 bytes)
6,682,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,712,750 UART: [rt]cmd =0x41545348, len=116
6,714,547 >>> mbox cmd response data (12 bytes)
6,714,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,837,115 UART: [rt]cmd =0x41544d4e, len=14344
7,146,659 >>> mbox cmd response data (8 bytes)
7,146,660 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,176,543 UART: [rt]cmd =0x41545348, len=116
7,198,662 >>> mbox cmd response data (12 bytes)
7,198,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,228,856 UART: [rt]cmd =0x41545348, len=116
7,230,432 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,170,611 UART: [cold-reset] ++
1,170,947 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
1,175,017 ready_for_fw is high
1,175,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,687 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,432 UART: [ldev] ++
1,210,600 UART: [ldev] CDI.KEYID = 6
1,210,964 UART: [ldev] SUBJECT.KEYID = 5
1,211,391 UART: [ldev] AUTHORITY.KEYID = 7
1,211,854 UART: [ldev] FE.KEYID = 1
1,217,274 UART: [ldev] Erasing FE.KEYID = 1
1,243,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,250 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,401 UART: [fwproc] Recv command 0x46574c44
1,284,134 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,503 >>> mbox cmd response: success
2,775,718 UART: [afmc] ++
2,775,886 UART: [afmc] CDI.KEYID = 6
2,776,249 UART: [afmc] SUBJECT.KEYID = 7
2,776,675 UART: [afmc] AUTHORITY.KEYID = 5
2,812,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,871 UART: [afmc] --
2,855,979 UART: [cold-reset] --
2,856,797 UART: [state] Locking Datavault
2,857,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,582 UART: [state] Locking ICCM
2,859,180 UART: [exit] Launching FMC @ 0x40000130
2,864,509 UART:
2,864,525 UART: Running Caliptra FMC ...
2,864,933 UART:
2,864,987 UART: [state] CFI Enabled
2,875,780 UART: [fht] FMC Alias Private Key: 7
2,983,673 UART: [art] Extend RT PCRs Done
2,984,101 UART: [art] Lock RT PCRs Done
2,985,407 UART: [art] Populate DV Done
2,993,706 UART: [fht] FMC Alias Private Key: 7
2,994,802 UART: [art] Derive CDI
2,995,082 UART: [art] Store in in slot 0x4
3,080,843 UART: [art] Derive Key Pair
3,081,203 UART: [art] Store priv key in slot 0x5
3,094,881 UART: [art] Derive Key Pair - Done
3,109,729 UART: [art] Signing Cert with AUTHO
3,110,209 UART: RITY.KEYID = 7
3,125,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,350 UART: [art] PUB.X = E4825481DB6BBC4270A15F594CEDDFC57CF5FD10B0C935C79FE12E228F78ACB11FDD780AAE4A9434E1562174728C569E
3,133,131 UART: [art] PUB.Y = FEFF2B2A1435CB852C4C15087026FB6BA534119E5BD49164CAF7EBD6191103934432DD2685C09AE9DB9D3A48930417E6
3,140,076 UART: [art] SIG.R = DEF9877B7D04BC1FAA28FDA57988A7FFB5B594F7D9CB8B8D59BD2A364E6BD5135290048C972C239B6FBC4354013D33F3
3,146,851 UART: [art] SIG.S = DB296A67B5088DC3B587BD14EAD68FFE8F287F95C7FBD46B97B192640F7F6FBD3AE4FD8B203FF0394CE3D0B6BF527E4E
3,171,348 UART: Caliptra RT
3,171,601 UART: [state] CFI Enabled
3,279,687 UART: [rt] RT listening for mailbox commands...
3,280,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,419 UART: [rt]cmd =0x41544d4e, len=14344
3,713,231 >>> mbox cmd response data (8 bytes)
3,713,232 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,481 UART: [rt]cmd =0x41545348, len=116
3,765,466 >>> mbox cmd response data (12 bytes)
3,765,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,486 UART: [rt]cmd =0x41545348, len=116
3,797,041 >>> mbox cmd response data (12 bytes)
3,797,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,797,867 UART:
3,797,883 UART: Running Caliptra ROM ...
3,798,291 UART:
3,798,346 UART: [state] CFI Enabled
3,800,630 UART: [state] LifecycleState = Unprovisioned
3,801,285 UART: [state] DebugLocked = No
3,802,021 UART: [state] WD Timer not started. Device not locked for debugging
3,803,197 UART: [kat] SHA2-256
4,606,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,610,876 UART: [kat] ++
4,611,028 UART: [kat] sha1
4,615,406 UART: [kat] SHA2-256
4,617,346 UART: [kat] SHA2-384
4,620,257 UART: [kat] SHA2-512-ACC
4,622,157 UART: [kat] ECC-384
4,631,596 UART: [kat] HMAC-384Kdf
4,636,156 UART: [kat] LMS
4,884,468 UART: [kat] --
4,885,460 UART: [update-reset] ++
6,196,913 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,197,928 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,347,752 >>> mbox cmd response: success
6,347,752 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,348,067 UART: [update-reset] Copying MAN_2 To MAN_1
6,356,081 UART: [update-reset Success] --
6,356,904 UART: [state] Locking Datavault
6,357,732 UART: [state] Locking PCR0, PCR1 and PCR31
6,358,336 UART: [state] Locking ICCM
6,358,844 UART: [exit] Launching FMC @ 0x40000130
6,364,173 UART:
6,364,189 UART: Running Caliptra FMC ...
6,364,597 UART:
6,364,651 UART: [state] CFI Enabled
6,453,338 UART: [art] Extend RT PCRs Done
6,453,766 UART: [art] Lock RT PCRs Done
6,455,133 UART: [art] Populate DV Done
6,463,588 UART: [fht] FMC Alias Private Key: 7
6,464,764 UART: [art] Derive CDI
6,465,044 UART: [art] Store in in slot 0x4
6,550,681 UART: [art] Derive Key Pair
6,551,041 UART: [art] Store priv key in slot 0x5
6,564,585 UART: [art] Derive Key Pair - Done
6,579,333 UART: [art] Signing Cert with AUTHO
6,579,813 UART: RITY.KEYID = 7
6,595,215 UART: [art] Erasing AUTHORITY.KEYID = 7
6,595,980 UART: [art] PUB.X = 6157F949552C1997C8BEE87E0DB484A3A136255755AD6591D7F41DC0CF7CBBFEE526A42C90D6A6D46C2B35FD0116ED4C
6,602,756 UART: [art] PUB.Y = D65C10AD329B17F1E7C930A9A7EFD3CA75A7892D97739DC69EDC2007E6CEBCC74BEA8AD739EF49B50345DCF34943557B
6,609,718 UART: [art] SIG.R = 875CD32281A2248324DD05F5399CF79894CB586A0EE3D810D3EBA4F05846655D572A8321DAFC6F8BDDA3C17F070B60BB
6,616,484 UART: [art] SIG.S = C97FA1A0B5C6180B8E7D23301793F1F47C66AC26AD53DCB9AE12DA63A4CCA2522B8C5D45652D83F757D1893ECF5607C7
6,639,679 UART: Caliptra RT
6,639,932 UART: [state] CFI Enabled
6,924,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,955,289 UART: [rt]cmd =0x41545348, len=116
6,976,898 >>> mbox cmd response data (12 bytes)
6,976,899 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,007,180 UART: [rt]cmd =0x41545348, len=116
7,008,961 >>> mbox cmd response data (12 bytes)
7,008,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,131,435 UART: [rt]cmd =0x41544d4e, len=14344
7,441,285 >>> mbox cmd response data (8 bytes)
7,441,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,471,503 UART: [rt]cmd =0x41545348, len=116
7,493,788 >>> mbox cmd response data (12 bytes)
7,493,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,523,668 UART: [rt]cmd =0x41545348, len=116
7,525,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 ready_for_fw is high
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,725 >>> mbox cmd response: success
2,685,469 UART:
2,685,485 UART: Running Caliptra FMC ...
2,685,893 UART:
2,685,947 UART: [state] CFI Enabled
2,696,144 UART: [fht] FMC Alias Private Key: 7
2,804,519 UART: [art] Extend RT PCRs Done
2,804,947 UART: [art] Lock RT PCRs Done
2,806,745 UART: [art] Populate DV Done
2,814,910 UART: [fht] FMC Alias Private Key: 7
2,816,042 UART: [art] Derive CDI
2,816,322 UART: [art] Store in in slot 0x4
2,901,987 UART: [art] Derive Key Pair
2,902,347 UART: [art] Store priv key in slot 0x5
2,915,725 UART: [art] Derive Key Pair - Done
2,930,548 UART: [art] Signing Cert with AUTHO
2,931,028 UART: RITY.KEYID = 7
2,946,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,083 UART: [art] PUB.X = 9BA3D401EDF38F47F17A37E24796FDC47ACBBD5AD0EC5CF7F271EF658B000B99DCA4EDE209B5D6664CDC3201600FE460
2,953,838 UART: [art] PUB.Y = 294B383D0276B324969F240876269166D37BB9C35759714C0FC64715D9E4489EE8944D8152E12D65DE28B640E42BB947
2,960,765 UART: [art] SIG.R = 1E01FF68AD9E23571DB26516F507F8E77E52BF9FF05004A2F626833CAD5AF0117E9CEC42A6E822D3C785E0744FB1DE26
2,967,536 UART: [art] SIG.S = 1817CF9E30817FDEC9D9979904A0E5FC1C98437103B5074C9B5B73E877D7528711EB778996719773BD526443DECB3792
2,991,304 UART: Caliptra RT
2,991,557 UART: [state] CFI Enabled
3,099,704 UART: [rt] RT listening for mailbox commands...
3,100,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,278 UART: [rt]cmd =0x41544d4e, len=14344
3,532,946 >>> mbox cmd response data (8 bytes)
3,532,947 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,854 UART: [rt]cmd =0x41545348, len=116
3,584,411 >>> mbox cmd response data (12 bytes)
3,584,412 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,301 UART: [rt]cmd =0x41545348, len=116
3,616,244 >>> mbox cmd response data (12 bytes)
3,616,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,048,122 >>> mbox cmd response: success
6,048,122 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,061,134 UART:
6,061,150 UART: Running Caliptra FMC ...
6,061,558 UART:
6,061,612 UART: [state] CFI Enabled
6,150,775 UART: [art] Extend RT PCRs Done
6,151,203 UART: [art] Lock RT PCRs Done
6,152,460 UART: [art] Populate DV Done
6,160,507 UART: [fht] FMC Alias Private Key: 7
6,161,583 UART: [art] Derive CDI
6,161,863 UART: [art] Store in in slot 0x4
6,247,456 UART: [art] Derive Key Pair
6,247,816 UART: [art] Store priv key in slot 0x5
6,260,738 UART: [art] Derive Key Pair - Done
6,275,276 UART: [art] Signing Cert with AUTHO
6,275,756 UART: RITY.KEYID = 7
6,290,780 UART: [art] Erasing AUTHORITY.KEYID = 7
6,291,545 UART: [art] PUB.X = 97179FA766F3C3EFBCFC74A7ECBEFE3528D5F173C0EEC139BD11246249BF447AC38E442D8D06035CE3FA8F91F3A0B2D1
6,298,329 UART: [art] PUB.Y = 94C3E2F98D2E5D867DF07A29D528A4204BB3766AD6198BE6D22471C32600C4AC53A7E36D82A523CB76BDF481F54E02F2
6,305,260 UART: [art] SIG.R = 19D9745EDA5221BB10D909FE632B6E5178E1AF23F7113300DB559CB110B3A99DD8753BC101AB0E99F31B8CF824F01D75
6,312,005 UART: [art] SIG.S = 66507794314350224E14B2C0567B72E4B3E0FFF0F00AFE5FBA6F79E7531DB51845FA8CCED8104DD5D18D7EE1D453C65D
6,336,215 UART: Caliptra RT
6,336,468 UART: [state] CFI Enabled
6,618,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,649,592 UART: [rt]cmd =0x41545348, len=116
6,671,185 >>> mbox cmd response data (12 bytes)
6,671,186 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,701,401 UART: [rt]cmd =0x41545348, len=116
6,703,314 >>> mbox cmd response data (12 bytes)
6,703,315 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,825,920 UART: [rt]cmd =0x41544d4e, len=14344
7,135,680 >>> mbox cmd response data (8 bytes)
7,135,681 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,165,692 UART: [rt]cmd =0x41545348, len=116
7,187,179 >>> mbox cmd response data (12 bytes)
7,187,180 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,217,125 UART: [rt]cmd =0x41545348, len=116
7,218,975 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 ready_for_fw is high
1,174,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,208,088 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,909 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,171 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,576 >>> mbox cmd response: success
2,772,781 UART: [afmc] ++
2,772,949 UART: [afmc] CDI.KEYID = 6
2,773,312 UART: [afmc] SUBJECT.KEYID = 7
2,773,738 UART: [afmc] AUTHORITY.KEYID = 5
2,809,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,608 UART: [afmc] --
2,852,590 UART: [cold-reset] --
2,853,616 UART: [state] Locking Datavault
2,854,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,489 UART: [state] Locking ICCM
2,856,027 UART: [exit] Launching FMC @ 0x40000130
2,861,356 UART:
2,861,372 UART: Running Caliptra FMC ...
2,861,780 UART:
2,861,923 UART: [state] CFI Enabled
2,872,344 UART: [fht] FMC Alias Private Key: 7
2,979,957 UART: [art] Extend RT PCRs Done
2,980,385 UART: [art] Lock RT PCRs Done
2,981,897 UART: [art] Populate DV Done
2,990,142 UART: [fht] FMC Alias Private Key: 7
2,991,130 UART: [art] Derive CDI
2,991,410 UART: [art] Store in in slot 0x4
3,076,725 UART: [art] Derive Key Pair
3,077,085 UART: [art] Store priv key in slot 0x5
3,089,821 UART: [art] Derive Key Pair - Done
3,104,786 UART: [art] Signing Cert with AUTHO
3,105,266 UART: RITY.KEYID = 7
3,120,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,357 UART: [art] PUB.X = 93E38D63076DC06C7C9AF71D53C39106AEBCB57419C775952D5D6E31DCD398B4376E53E4CC886EE2A2BEEABEBAEB0400
3,128,114 UART: [art] PUB.Y = 40EC34B07A2C4CB73CFBF2432C3AB2F5E1FBAF5F9C77C06429530931FB0998DA9E5C30CB2EB782224F40BE769E10E7C2
3,135,074 UART: [art] SIG.R = B5436E1580F7F9A606177823652D600FD3EADAB2A6A407A2CA213CB642156194F2C5793271BBB035EA1A48EB8A41E240
3,141,837 UART: [art] SIG.S = 947AE509F063A0CBBF488D76B2A249E5E0964E433C162657EECA253B176715F90968834415DA641F850D2E321AC703F7
3,165,404 UART: Caliptra RT
3,165,749 UART: [state] CFI Enabled
3,273,149 UART: [rt] RT listening for mailbox commands...
3,273,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,935 UART: [rt]cmd =0x41544d4e, len=14344
3,705,675 >>> mbox cmd response data (8 bytes)
3,705,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,669 UART: [rt]cmd =0x41545348, len=116
3,757,826 >>> mbox cmd response data (12 bytes)
3,757,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,912 UART: [rt]cmd =0x41545348, len=116
3,789,707 >>> mbox cmd response data (12 bytes)
3,789,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,493 UART:
3,790,509 UART: Running Caliptra ROM ...
3,790,917 UART:
3,791,059 UART: [state] CFI Enabled
3,793,971 UART: [state] LifecycleState = Unprovisioned
3,794,626 UART: [state] DebugLocked = No
3,795,176 UART: [state] WD Timer not started. Device not locked for debugging
3,796,354 UART: [kat] SHA2-256
4,599,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,604,033 UART: [kat] ++
4,604,185 UART: [kat] sha1
4,608,495 UART: [kat] SHA2-256
4,610,435 UART: [kat] SHA2-384
4,613,040 UART: [kat] SHA2-512-ACC
4,614,940 UART: [kat] ECC-384
4,624,375 UART: [kat] HMAC-384Kdf
4,628,789 UART: [kat] LMS
4,877,101 UART: [kat] --
4,878,021 UART: [update-reset] ++
6,190,694 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,191,807 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,341,631 >>> mbox cmd response: success
6,341,631 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,341,976 UART: [update-reset] Copying MAN_2 To MAN_1
6,349,990 UART: [update-reset Success] --
6,350,959 UART: [state] Locking Datavault
6,351,795 UART: [state] Locking PCR0, PCR1 and PCR31
6,352,399 UART: [state] Locking ICCM
6,352,971 UART: [exit] Launching FMC @ 0x40000130
6,358,300 UART:
6,358,316 UART: Running Caliptra FMC ...
6,358,724 UART:
6,358,867 UART: [state] CFI Enabled
6,448,192 UART: [art] Extend RT PCRs Done
6,448,620 UART: [art] Lock RT PCRs Done
6,449,917 UART: [art] Populate DV Done
6,458,096 UART: [fht] FMC Alias Private Key: 7
6,459,044 UART: [art] Derive CDI
6,459,324 UART: [art] Store in in slot 0x4
6,545,153 UART: [art] Derive Key Pair
6,545,513 UART: [art] Store priv key in slot 0x5
6,559,067 UART: [art] Derive Key Pair - Done
6,573,979 UART: [art] Signing Cert with AUTHO
6,574,459 UART: RITY.KEYID = 7
6,589,849 UART: [art] Erasing AUTHORITY.KEYID = 7
6,590,614 UART: [art] PUB.X = 1C80393E75B602D05CAAB5C8255B4EC657981B251D3E73E7ECDC6D22728ECE83A1B436164DCE409C65FA361917DC8724
6,597,387 UART: [art] PUB.Y = AEFE4AAD7B1483F67BC30E24F3C00AADA04E7BA8B2BFC8302653AEAF19022B59AE1A4578D8801E8756A41EB70218F226
6,604,341 UART: [art] SIG.R = CA6FEF40FCAE7738AF67D5C3088809B39E25972915276F20A85E6C9A9BD7A075C8E038713A51C202829CEF66935DA0CC
6,611,108 UART: [art] SIG.S = D583E3C2D0F90ACBF671C2A01D45F1916D5D3DF23DF6D39420D7DEEBEF1510F98FC4BC76C2E4329BC3AF05A64BA668E4
6,634,699 UART: Caliptra RT
6,635,044 UART: [state] CFI Enabled
6,918,456 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,949,285 UART: [rt]cmd =0x41545348, len=116
6,971,330 >>> mbox cmd response data (12 bytes)
6,971,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,001,386 UART: [rt]cmd =0x41545348, len=116
7,003,185 >>> mbox cmd response data (12 bytes)
7,003,186 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,125,637 UART: [rt]cmd =0x41544d4e, len=14344
7,434,837 >>> mbox cmd response data (8 bytes)
7,434,838 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,464,911 UART: [rt]cmd =0x41545348, len=116
7,487,168 >>> mbox cmd response data (12 bytes)
7,487,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,517,540 UART: [rt]cmd =0x41545348, len=116
7,519,342 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,259 ready_for_fw is high
1,056,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,112 >>> mbox cmd response: success
2,684,974 UART:
2,684,990 UART: Running Caliptra FMC ...
2,685,398 UART:
2,685,541 UART: [state] CFI Enabled
2,696,456 UART: [fht] FMC Alias Private Key: 7
2,804,217 UART: [art] Extend RT PCRs Done
2,804,645 UART: [art] Lock RT PCRs Done
2,806,387 UART: [art] Populate DV Done
2,814,778 UART: [fht] FMC Alias Private Key: 7
2,815,836 UART: [art] Derive CDI
2,816,116 UART: [art] Store in in slot 0x4
2,901,667 UART: [art] Derive Key Pair
2,902,027 UART: [art] Store priv key in slot 0x5
2,915,245 UART: [art] Derive Key Pair - Done
2,930,177 UART: [art] Signing Cert with AUTHO
2,930,657 UART: RITY.KEYID = 7
2,946,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,022 UART: [art] PUB.X = AB8C3BA3D877336169F7CF3F9D28880A02952C38F27C8CDF9BEE1A40A67A739854DF6E6B4EFC83A8BB74B73C9B2145A7
2,953,800 UART: [art] PUB.Y = 77D188E9E563D4AFA06E44D2EF4E15A88BBF4FA03C64999AEBCEB3E22A725F3D3D40CF4ECB9AC4FE8E55DA1350BD0B6C
2,960,777 UART: [art] SIG.R = 25D86F7D500276FBF80B5B4F034A39AF6F65C722E13592DF3D181406728151B9DD15AB3E5511B194D0FA58B841DB6153
2,967,535 UART: [art] SIG.S = 9ABC1EBAF7BEACBFDBD9583C5677E699832A00E90AA3BADA3B5CB2EACFA56009BC5A46B6B5641A826DA10AF43782C5C8
2,991,077 UART: Caliptra RT
2,991,422 UART: [state] CFI Enabled
3,099,915 UART: [rt] RT listening for mailbox commands...
3,100,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,475 UART: [rt]cmd =0x41544d4e, len=14344
3,532,275 >>> mbox cmd response data (8 bytes)
3,532,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,539 UART: [rt]cmd =0x41545348, len=116
3,584,804 >>> mbox cmd response data (12 bytes)
3,584,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,720 UART: [rt]cmd =0x41545348, len=116
3,616,473 >>> mbox cmd response data (12 bytes)
3,616,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,049,269 >>> mbox cmd response: success
6,049,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,062,647 UART:
6,062,663 UART: Running Caliptra FMC ...
6,063,071 UART:
6,063,214 UART: [state] CFI Enabled
6,152,417 UART: [art] Extend RT PCRs Done
6,152,845 UART: [art] Lock RT PCRs Done
6,153,870 UART: [art] Populate DV Done
6,162,173 UART: [fht] FMC Alias Private Key: 7
6,163,293 UART: [art] Derive CDI
6,163,573 UART: [art] Store in in slot 0x4
6,249,220 UART: [art] Derive Key Pair
6,249,580 UART: [art] Store priv key in slot 0x5
6,262,890 UART: [art] Derive Key Pair - Done
6,277,715 UART: [art] Signing Cert with AUTHO
6,278,195 UART: RITY.KEYID = 7
6,293,253 UART: [art] Erasing AUTHORITY.KEYID = 7
6,294,018 UART: [art] PUB.X = 26B9599EF7D611BFB3541DFFC463655893A817A33F792C4685E14417EDC46CDF66262CDCBAE4B3FA38BD1AF9A2660D11
6,300,797 UART: [art] PUB.Y = 00495264C2850D12CD63E89741785D54B522904A3C48F5E5B4A798C029E6EF2E32B771694A371736A8A46F8604FE5B44
6,307,709 UART: [art] SIG.R = E902494AB8272649F4B06FB634A8AD9D544EE95C9C36EBBCA48FCCC6BF3F89871FC2512F8751CEAA7BE026EACA35B1BF
6,314,500 UART: [art] SIG.S = 193E7D72927DD3538AACA2C300A8150B9D6455402D2790892F7C55C2B07AACEA2432AE4E407DB2BB76A1D2FD7A2B97C6
6,337,980 UART: Caliptra RT
6,338,325 UART: [state] CFI Enabled
6,622,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,653,043 UART: [rt]cmd =0x41545348, len=116
6,674,602 >>> mbox cmd response data (12 bytes)
6,674,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,704,680 UART: [rt]cmd =0x41545348, len=116
6,706,149 >>> mbox cmd response data (12 bytes)
6,706,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,828,839 UART: [rt]cmd =0x41544d4e, len=14344
7,138,469 >>> mbox cmd response data (8 bytes)
7,138,470 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,168,347 UART: [rt]cmd =0x41545348, len=116
7,191,130 >>> mbox cmd response data (12 bytes)
7,191,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,221,212 UART: [rt]cmd =0x41545348, len=116
7,223,024 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,017 UART: [cold-reset] ++
1,476,541 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,906 UART: [idev] --
1,514,935 UART: [ldev] ++
1,515,103 UART: [ldev] CDI.KEYID = 6
1,515,466 UART: [ldev] SUBJECT.KEYID = 5
1,515,892 UART: [ldev] AUTHORITY.KEYID = 7
1,516,355 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,547,182 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,833 UART: [fwproc] Waiting for Commands...
1,587,622 UART: [fwproc] Received command 0x46574c44
1,588,413 UART: [fwproc] Received Image of size 114332 bytes
2,886,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,080 >>> mbox cmd response: success
3,080,174 UART: [afmc] ++
3,080,342 UART: [afmc] CDI.KEYID = 6
3,080,704 UART: [afmc] SUBJECT.KEYID = 7
3,081,129 UART: [afmc] AUTHORITY.KEYID = 5
3,116,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,413 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,103 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,070 UART: [afmc] --
3,159,096 UART: [cold-reset] --
3,159,848 UART: [state] Locking Datavault
3,161,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,823 UART: [state] Locking ICCM
3,162,405 UART: [exit] Launching FMC @ 0x40000130
3,167,734 UART:
3,167,750 UART: Running Caliptra FMC ...
3,168,158 UART:
3,168,212 UART: [state] CFI Enabled
3,178,683 UART: [fht] FMC Alias Private Key: 7
3,286,812 UART: [art] Extend RT PCRs Done
3,287,240 UART: [art] Lock RT PCRs Done
3,288,868 UART: [art] Populate DV Done
3,297,113 UART: [fht] FMC Alias Private Key: 7
3,298,057 UART: [art] Derive CDI
3,298,337 UART: [art] Store in in slot 0x4
3,384,116 UART: [art] Derive Key Pair
3,384,476 UART: [art] Store priv key in slot 0x5
3,398,088 UART: [art] Derive Key Pair - Done
3,412,613 UART: [art] Signing Cert with AUTHO
3,413,093 UART: RITY.KEYID = 7
3,428,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,208 UART: [art] PUB.X = BCED31DBBBDA590E0B95F0F993F272DE2CAE7DEC38D40A932661147E6FF20A64FC8DE33EEC175815C89644E8D50383AE
3,435,983 UART: [art] PUB.Y = B2E784F1FAE93756E4F6666FE3CA37A73DAB037F4E44CFFBD7EAD1C861E2435C00CBA38EF2008FE9BFACAE38BF06D281
3,442,911 UART: [art] SIG.R = CAD0E9B83B64F868AFA768D4476D5EFDC17E9E016DCDEFFA36B7DF8D670036871F78F2B84CBB0156CF1109A322B68630
3,449,666 UART: [art] SIG.S = 33F244DD5F83187D88A03067F00A842D4864E2F774B4064799023B63DBAD98CC7AEC161EE183C9DCCFB66DE84BF24D40
3,473,762 UART: Caliptra RT
3,474,015 UART: [state] CFI Enabled
3,582,618 UART: [rt] RT listening for mailbox commands...
3,583,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,350 UART: [rt]cmd =0x41544d4e, len=14344
4,016,095 >>> mbox cmd response data (8 bytes)
4,016,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,057 UART: [rt]cmd =0x41545348, len=116
4,067,214 >>> mbox cmd response data (12 bytes)
4,067,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,089 UART:
4,068,105 UART: Running Caliptra ROM ...
4,068,513 UART:
4,068,567 UART: [state] CFI Enabled
4,071,393 UART: [state] LifecycleState = Unprovisioned
4,072,048 UART: [state] DebugLocked = No
4,072,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,074,235 UART: [kat] SHA2-256
4,868,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,872,281 UART: [kat] ++
4,872,433 UART: [kat] sha1
4,876,611 UART: [kat] SHA2-256
4,878,549 UART: [kat] SHA2-384
4,881,338 UART: [kat] SHA2-512-ACC
4,883,238 UART: [kat] ECC-384
4,888,469 UART: [kat] HMAC-384Kdf
4,892,867 UART: [kat] LMS
5,461,063 UART: [kat] --
5,461,690 UART: [update-reset] ++
6,796,396 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,797,470 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,947,346 >>> mbox cmd response: success
6,947,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,947,647 UART: [update-reset] Copying MAN_2 To MAN_1
6,955,661 UART: [update-reset Success] --
6,956,512 UART: [state] Locking Datavault
6,957,348 UART: [state] Locking PCR0, PCR1 and PCR31
6,957,952 UART: [state] Locking ICCM
6,958,382 UART: [exit] Launching FMC @ 0x40000130
6,963,711 UART:
6,963,727 UART: Running Caliptra FMC ...
6,964,135 UART:
6,964,189 UART: [state] CFI Enabled
7,053,000 UART: [art] Extend RT PCRs Done
7,053,428 UART: [art] Lock RT PCRs Done
7,054,731 UART: [art] Populate DV Done
7,062,730 UART: [fht] FMC Alias Private Key: 7
7,063,810 UART: [art] Derive CDI
7,064,090 UART: [art] Store in in slot 0x4
7,150,329 UART: [art] Derive Key Pair
7,150,689 UART: [art] Store priv key in slot 0x5
7,163,935 UART: [art] Derive Key Pair - Done
7,178,697 UART: [art] Signing Cert with AUTHO
7,179,177 UART: RITY.KEYID = 7
7,194,475 UART: [art] Erasing AUTHORITY.KEYID = 7
7,195,240 UART: [art] PUB.X = 1A816AF7339B7DB50A27511CB2FBE1C10CA6D340EEAE327A291B422F42883AD7978E17719F5226D3486D69BCB111F659
7,202,008 UART: [art] PUB.Y = 51AB0D95A8161D941B054D467E6F9B1A652A81B7F423F3EE40A141465E43D340820BC453EE3C96EF76ED433618CE0E72
7,208,948 UART: [art] SIG.R = 95A15763CF0E504F8537F664F81387F73A1604C0FD163E6B4FC5DAC27B659B1D07D762F27F61179B70C44BB5E7C02AFB
7,215,715 UART: [art] SIG.S = ED4E1FE13C4A722BD5B265907703082C492B29B67BE001540C02BB8BAF65363CE88DB8AB2130648596EAF92F39AE2772
7,239,453 UART: Caliptra RT
7,239,706 UART: [state] CFI Enabled
7,521,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,551,861 UART: [rt]cmd =0x41545348, len=116
7,572,754 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,087 ready_for_fw is high
1,362,087 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,642 >>> mbox cmd response: success
2,988,820 UART:
2,988,836 UART: Running Caliptra FMC ...
2,989,244 UART:
2,989,298 UART: [state] CFI Enabled
2,999,881 UART: [fht] FMC Alias Private Key: 7
3,108,106 UART: [art] Extend RT PCRs Done
3,108,534 UART: [art] Lock RT PCRs Done
3,109,918 UART: [art] Populate DV Done
3,118,303 UART: [fht] FMC Alias Private Key: 7
3,119,417 UART: [art] Derive CDI
3,119,697 UART: [art] Store in in slot 0x4
3,205,186 UART: [art] Derive Key Pair
3,205,546 UART: [art] Store priv key in slot 0x5
3,219,074 UART: [art] Derive Key Pair - Done
3,234,070 UART: [art] Signing Cert with AUTHO
3,234,550 UART: RITY.KEYID = 7
3,249,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,367 UART: [art] PUB.X = 2782F72A7BA54D6E472CE61D2367854670B1F6EABFF8A8B3DB03ECA75F9145323602C5C5DD1486A3EB872140EA80DB4D
3,257,141 UART: [art] PUB.Y = 4E773B2E696C095A2DC870537B4D75A156B3A0FBCFB1E337678CCEDB02DDF5D51B090C52DA3470006041F19AB039A0FF
3,264,069 UART: [art] SIG.R = 7FEF9FCDFA2629CEC3C3EE13C7BE53F9C0920360460915ADA38BE13E19A59EBE818D90DA56CE75DEFA381C1807F6EBD1
3,270,854 UART: [art] SIG.S = 886E76CD80F4C6589DFF3CF3EB672A4B1AB48882356382B36876FB419CA9DFE399D0C8066F78FEF8675AE12BEC04BA1E
3,294,829 UART: Caliptra RT
3,295,082 UART: [state] CFI Enabled
3,403,201 UART: [rt] RT listening for mailbox commands...
3,403,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,737 UART: [rt]cmd =0x41544d4e, len=14344
3,836,742 >>> mbox cmd response data (8 bytes)
3,836,743 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,802 UART: [rt]cmd =0x41545348, len=116
3,887,635 >>> mbox cmd response data (12 bytes)
3,887,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,649,389 >>> mbox cmd response: success
6,649,389 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,662,666 UART:
6,662,682 UART: Running Caliptra FMC ...
6,663,090 UART:
6,663,144 UART: [state] CFI Enabled
6,751,681 UART: [art] Extend RT PCRs Done
6,752,109 UART: [art] Lock RT PCRs Done
6,753,488 UART: [art] Populate DV Done
6,761,747 UART: [fht] FMC Alias Private Key: 7
6,762,689 UART: [art] Derive CDI
6,762,969 UART: [art] Store in in slot 0x4
6,848,622 UART: [art] Derive Key Pair
6,848,982 UART: [art] Store priv key in slot 0x5
6,862,422 UART: [art] Derive Key Pair - Done
6,876,787 UART: [art] Signing Cert with AUTHO
6,877,267 UART: RITY.KEYID = 7
6,892,775 UART: [art] Erasing AUTHORITY.KEYID = 7
6,893,540 UART: [art] PUB.X = C660810B4B329853F3F13A8C76B4AE09870F370F62791FA36C9D07F9E8CB7A6DC9695A072830E58FA55D1EDE8DEC573A
6,900,300 UART: [art] PUB.Y = 74A3A8098B96BEC3BD04EBA0A20F2563C40569ECAD97DE52C172708F949F8D01331351F5EB7CCD9B5ABA30CFD7EB9C0D
6,907,252 UART: [art] SIG.R = BD46E0660C61FCCF07D96367368046FEED3788EC7C7C95D2FE3845EB1D227F3AE4B37A6A4E1FAA231AD1D9FEF8674A13
6,914,034 UART: [art] SIG.S = 189EAA68F15CAB162C3E35AE53A9D6FEFA8BC91796831987E9E53792D3B0FCFF961BB65D02F746FAA46E95A16B4FCADA
6,937,536 UART: Caliptra RT
6,937,789 UART: [state] CFI Enabled
7,218,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,249,553 UART: [rt]cmd =0x41545348, len=116
7,270,596 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,185 UART: [kat] SHA2-512-ACC
897,086 UART: [kat] ECC-384
902,409 UART: [kat] HMAC-384Kdf
906,991 UART: [kat] LMS
1,475,187 UART: [kat] --
1,475,922 UART: [cold-reset] ++
1,476,258 UART: [fht] Storing FHT @ 0x50003400
1,479,129 UART: [idev] ++
1,479,297 UART: [idev] CDI.KEYID = 6
1,479,657 UART: [idev] SUBJECT.KEYID = 7
1,480,081 UART: [idev] UDS.KEYID = 0
1,480,426 ready_for_fw is high
1,480,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,161 UART: [idev] Erasing UDS.KEYID = 0
1,504,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,247 UART: [idev] --
1,514,236 UART: [ldev] ++
1,514,404 UART: [ldev] CDI.KEYID = 6
1,514,767 UART: [ldev] SUBJECT.KEYID = 5
1,515,193 UART: [ldev] AUTHORITY.KEYID = 7
1,515,656 UART: [ldev] FE.KEYID = 1
1,520,890 UART: [ldev] Erasing FE.KEYID = 1
1,545,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,703 UART: [ldev] --
1,585,114 UART: [fwproc] Waiting for Commands...
1,585,793 UART: [fwproc] Received command 0x46574c44
1,586,584 UART: [fwproc] Received Image of size 114332 bytes
2,884,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,825 >>> mbox cmd response: success
3,077,835 UART: [afmc] ++
3,078,003 UART: [afmc] CDI.KEYID = 6
3,078,365 UART: [afmc] SUBJECT.KEYID = 7
3,078,790 UART: [afmc] AUTHORITY.KEYID = 5
3,113,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,506 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,196 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,179 UART: [afmc] --
3,157,151 UART: [cold-reset] --
3,158,095 UART: [state] Locking Datavault
3,159,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,906 UART: [state] Locking ICCM
3,160,500 UART: [exit] Launching FMC @ 0x40000130
3,165,829 UART:
3,165,845 UART: Running Caliptra FMC ...
3,166,253 UART:
3,166,396 UART: [state] CFI Enabled
3,177,361 UART: [fht] FMC Alias Private Key: 7
3,284,288 UART: [art] Extend RT PCRs Done
3,284,716 UART: [art] Lock RT PCRs Done
3,285,836 UART: [art] Populate DV Done
3,294,027 UART: [fht] FMC Alias Private Key: 7
3,294,987 UART: [art] Derive CDI
3,295,267 UART: [art] Store in in slot 0x4
3,380,740 UART: [art] Derive Key Pair
3,381,100 UART: [art] Store priv key in slot 0x5
3,394,152 UART: [art] Derive Key Pair - Done
3,409,112 UART: [art] Signing Cert with AUTHO
3,409,592 UART: RITY.KEYID = 7
3,425,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,803 UART: [art] PUB.X = 485B7E73FA24A02AC5D15C40674DECE4D476DED00221398FB29800F21FA3FA1902519CB20CAF69B16E40574C18AE5A9F
3,432,552 UART: [art] PUB.Y = 64031441A4ADAD8EA22927C78E5561709EADA41758C1E0199F84829590043DF067FC01C85C536635876B79C0CE5021E0
3,439,485 UART: [art] SIG.R = E9EF1359A44B619F3C4340CDF5743195CD346AAC3D064519277749097CBBEFA0C0D56DC40A458DAABA939CBD22A8020E
3,446,252 UART: [art] SIG.S = 6DCF891F8C7067EC6FC86E619CDAC9FBCB607E68DAFCA39229A9BF3F09B44459497112C6FB6FA13F48768FDD725F8FA1
3,469,392 UART: Caliptra RT
3,469,737 UART: [state] CFI Enabled
3,577,988 UART: [rt] RT listening for mailbox commands...
3,578,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,862 UART: [rt]cmd =0x41544d4e, len=14344
4,011,821 >>> mbox cmd response data (8 bytes)
4,011,822 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,905 UART: [rt]cmd =0x41545348, len=116
4,063,532 >>> mbox cmd response data (12 bytes)
4,063,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,079 UART:
4,064,095 UART: Running Caliptra ROM ...
4,064,503 UART:
4,064,644 UART: [state] CFI Enabled
4,067,536 UART: [state] LifecycleState = Unprovisioned
4,068,191 UART: [state] DebugLocked = No
4,068,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,070,298 UART: [kat] SHA2-256
4,864,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,868,344 UART: [kat] ++
4,868,496 UART: [kat] sha1
4,872,766 UART: [kat] SHA2-256
4,874,704 UART: [kat] SHA2-384
4,877,395 UART: [kat] SHA2-512-ACC
4,879,295 UART: [kat] ECC-384
4,885,062 UART: [kat] HMAC-384Kdf
4,889,726 UART: [kat] LMS
5,457,922 UART: [kat] --
5,458,583 UART: [update-reset] ++
6,793,499 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,794,615 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,944,491 >>> mbox cmd response: success
6,944,491 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,944,652 UART: [update-reset] Copying MAN_2 To MAN_1
6,952,666 UART: [update-reset Success] --
6,953,629 UART: [state] Locking Datavault
6,954,449 UART: [state] Locking PCR0, PCR1 and PCR31
6,955,053 UART: [state] Locking ICCM
6,955,473 UART: [exit] Launching FMC @ 0x40000130
6,960,802 UART:
6,960,818 UART: Running Caliptra FMC ...
6,961,226 UART:
6,961,369 UART: [state] CFI Enabled
7,051,060 UART: [art] Extend RT PCRs Done
7,051,488 UART: [art] Lock RT PCRs Done
7,052,703 UART: [art] Populate DV Done
7,060,694 UART: [fht] FMC Alias Private Key: 7
7,061,730 UART: [art] Derive CDI
7,062,010 UART: [art] Store in in slot 0x4
7,147,853 UART: [art] Derive Key Pair
7,148,213 UART: [art] Store priv key in slot 0x5
7,161,261 UART: [art] Derive Key Pair - Done
7,176,189 UART: [art] Signing Cert with AUTHO
7,176,669 UART: RITY.KEYID = 7
7,191,631 UART: [art] Erasing AUTHORITY.KEYID = 7
7,192,396 UART: [art] PUB.X = 0C6A24A9535D3D89953053EEC9342942CDF8DE043336A39DF06910C4D7B214B5EFE39241B3648315E6B5D35CFDBE1724
7,199,162 UART: [art] PUB.Y = A82CCD467984A2D88F44DADDB80E796C1A5F6638E80CAF43D611B0461BA4F6178919CBC2E95EE0909737722226E9F95F
7,206,112 UART: [art] SIG.R = 29BD2AF640A28064D0636954D5474C645080348292AEA86BEE8B5721B84A2640198731581524C448F01D69901FC8C9B5
7,212,868 UART: [art] SIG.S = 2C6B6A344626F98B52691D4F0D7832A7B42ED7B1956CA3BA1E677255B8494BDA00C3C1F8CA86BF5D6B07E5ADAB2CD6C6
7,236,879 UART: Caliptra RT
7,237,224 UART: [state] CFI Enabled
7,515,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,546,833 UART: [rt]cmd =0x41545348, len=116
7,568,680 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 ready_for_fw is high
1,363,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,341 >>> mbox cmd response: success
2,990,417 UART:
2,990,433 UART: Running Caliptra FMC ...
2,990,841 UART:
2,990,984 UART: [state] CFI Enabled
3,001,763 UART: [fht] FMC Alias Private Key: 7
3,110,022 UART: [art] Extend RT PCRs Done
3,110,450 UART: [art] Lock RT PCRs Done
3,112,244 UART: [art] Populate DV Done
3,120,361 UART: [fht] FMC Alias Private Key: 7
3,121,403 UART: [art] Derive CDI
3,121,683 UART: [art] Store in in slot 0x4
3,207,364 UART: [art] Derive Key Pair
3,207,724 UART: [art] Store priv key in slot 0x5
3,220,620 UART: [art] Derive Key Pair - Done
3,235,259 UART: [art] Signing Cert with AUTHO
3,235,739 UART: RITY.KEYID = 7
3,250,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,474 UART: [art] PUB.X = BFE08F35CB3D42E0C8B7C2F7E181ACB05EC895BF77D15B86AC01FD57567D3D6D1ED3A8D0E6D3B87EA292D8B118C2FA82
3,258,265 UART: [art] PUB.Y = FBC0FCD47C8E1277A9AEA1F7A28C3013747203E30F09C73481743E9E88C17FE93F9FDA853A1997E5332B5E5B722A8AB5
3,265,214 UART: [art] SIG.R = 2D7CBB589C70A1F3B93EE2CA6822AAB6259F5A966B7D0246B73C330C2EFFF29323A8DB18B26F03ED594DCF6F14FF6BE7
3,271,995 UART: [art] SIG.S = 28C5060D65A691CF2A5DD278075090AB326D847DF10C4B982E52916541ABFA388CB7F3D431F35F7A7FD0C36F9E2263B5
3,295,770 UART: Caliptra RT
3,296,115 UART: [state] CFI Enabled
3,404,889 UART: [rt] RT listening for mailbox commands...
3,405,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,441 UART: [rt]cmd =0x41544d4e, len=14344
3,838,730 >>> mbox cmd response data (8 bytes)
3,838,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,004 UART: [rt]cmd =0x41545348, len=116
3,889,715 >>> mbox cmd response data (12 bytes)
3,889,716 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,652,276 >>> mbox cmd response: success
6,652,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,665,707 UART:
6,665,723 UART: Running Caliptra FMC ...
6,666,131 UART:
6,666,274 UART: [state] CFI Enabled
6,755,417 UART: [art] Extend RT PCRs Done
6,755,845 UART: [art] Lock RT PCRs Done
6,757,196 UART: [art] Populate DV Done
6,765,189 UART: [fht] FMC Alias Private Key: 7
6,766,189 UART: [art] Derive CDI
6,766,469 UART: [art] Store in in slot 0x4
6,852,060 UART: [art] Derive Key Pair
6,852,420 UART: [art] Store priv key in slot 0x5
6,865,584 UART: [art] Derive Key Pair - Done
6,880,132 UART: [art] Signing Cert with AUTHO
6,880,612 UART: RITY.KEYID = 7
6,895,740 UART: [art] Erasing AUTHORITY.KEYID = 7
6,896,505 UART: [art] PUB.X = 48557729BCE6CC7840DF43B94E359CA0D992FF2E97414945807D2DE9B23CBB2CB9F4C056BA19F38F394C96AAC52F1364
6,903,283 UART: [art] PUB.Y = FCAC2B4F80045E44B5DBDEBB90BC1E3476A8128DA6278C20C40A825F954A78871F11BFA93386BF66BB6FD581CF1AA91E
6,910,245 UART: [art] SIG.R = BE2CA5067332F9E729466DF8148D62D1E5C80C6C25E033FD55A759B7AE3EA6F16EC0F994CB79DBD6728EC6A030803E48
6,917,019 UART: [art] SIG.S = D2FD7B68C86B2D42C5D95F11D945110E7776B569FF0EE7CDBC5ADAA8CEDBF7496112EB88662A445CBFDDCE941E212AE2
6,940,198 UART: Caliptra RT
6,940,543 UART: [state] CFI Enabled
7,220,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,251,194 UART: [rt]cmd =0x41545348, len=116
7,271,913 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,748 UART: [kat] SHA2-512-ACC
908,649 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,972 UART: [kat] LMS
1,171,300 UART: [kat] --
1,172,247 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,396 UART: [idev] ++
1,175,564 UART: [idev] CDI.KEYID = 6
1,175,924 UART: [idev] SUBJECT.KEYID = 7
1,176,348 UART: [idev] UDS.KEYID = 0
1,176,693 ready_for_fw is high
1,176,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,554 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,313 >>> mbox cmd response: success
2,774,373 UART: [afmc] ++
2,774,541 UART: [afmc] CDI.KEYID = 6
2,774,903 UART: [afmc] SUBJECT.KEYID = 7
2,775,328 UART: [afmc] AUTHORITY.KEYID = 5
2,810,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,280 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,346 UART: [afmc] --
2,854,298 UART: [cold-reset] --
2,855,076 UART: [state] Locking Datavault
2,856,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,973 UART: [state] Locking ICCM
2,857,479 UART: [exit] Launching FMC @ 0x40000130
2,862,808 UART:
2,862,824 UART: Running Caliptra FMC ...
2,863,232 UART:
2,863,286 UART: [state] CFI Enabled
2,873,641 UART: [fht] FMC Alias Private Key: 7
2,980,886 UART: [art] Extend RT PCRs Done
2,981,314 UART: [art] Lock RT PCRs Done
2,982,826 UART: [art] Populate DV Done
2,990,963 UART: [fht] FMC Alias Private Key: 7
2,992,053 UART: [art] Derive CDI
2,992,333 UART: [art] Store in in slot 0x4
3,077,944 UART: [art] Derive Key Pair
3,078,304 UART: [art] Store priv key in slot 0x5
3,091,586 UART: [art] Derive Key Pair - Done
3,106,493 UART: [art] Signing Cert with AUTHO
3,106,973 UART: RITY.KEYID = 7
3,121,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,562 UART: [art] PUB.X = 6D7453E07C75DB5E9FD53BD3CDBA5C44A102F3BA9FD99E717ED9FB708B98D64B77DE46021C6B3CB28CB2AFC440C7E587
3,129,348 UART: [art] PUB.Y = 9B5C882188F600D7007B9D51B9CFB4F4434AC15C1C234C46284391C8DE080F3ACE7165884A83BDCFBB3CF54C1986B9CE
3,136,258 UART: [art] SIG.R = 60AA2E8B7DEA8C4CCDEC5406756C321D8C939C198ED7B9B1288D6982ECFEBD0ED2CB44D2B47977E4BA1951ED0940B626
3,143,037 UART: [art] SIG.S = B511B1A073A0C89FD2CDC0C034B9B217132C3494F15090E442C2C2021D5ADA34A25A6E73E948B3BA3C7C229A267E1450
3,167,079 UART: Caliptra RT
3,167,332 UART: [state] CFI Enabled
3,275,183 UART: [rt] RT listening for mailbox commands...
3,275,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,809 UART: [rt]cmd =0x41544d4e, len=14344
3,708,728 >>> mbox cmd response data (8 bytes)
3,708,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,648 UART: [rt]cmd =0x41545348, len=116
3,759,961 >>> mbox cmd response data (12 bytes)
3,759,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,073 UART:
3,761,089 UART: Running Caliptra ROM ...
3,761,497 UART:
3,761,552 UART: [state] CFI Enabled
3,764,388 UART: [state] LifecycleState = Unprovisioned
3,765,043 UART: [state] DebugLocked = No
3,765,769 UART: [state] WD Timer not started. Device not locked for debugging
3,767,105 UART: [kat] SHA2-256
4,572,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,576,880 UART: [kat] ++
4,577,032 UART: [kat] sha1
4,581,300 UART: [kat] SHA2-256
4,583,240 UART: [kat] SHA2-384
4,586,067 UART: [kat] SHA2-512-ACC
4,587,967 UART: [kat] ECC-384
4,597,892 UART: [kat] HMAC-384Kdf
4,602,688 UART: [kat] LMS
4,851,016 UART: [kat] --
4,851,734 UART: [update-reset] ++
6,164,476 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,165,441 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,315,265 >>> mbox cmd response: success
6,315,265 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,315,518 UART: [update-reset] Copying MAN_2 To MAN_1
6,323,532 UART: [update-reset Success] --
6,324,771 UART: [state] Locking Datavault
6,325,381 UART: [state] Locking PCR0, PCR1 and PCR31
6,325,985 UART: [state] Locking ICCM
6,326,423 UART: [exit] Launching FMC @ 0x40000130
6,331,752 UART:
6,331,768 UART: Running Caliptra FMC ...
6,332,176 UART:
6,332,230 UART: [state] CFI Enabled
6,420,975 UART: [art] Extend RT PCRs Done
6,421,403 UART: [art] Lock RT PCRs Done
6,422,704 UART: [art] Populate DV Done
6,431,051 UART: [fht] FMC Alias Private Key: 7
6,432,151 UART: [art] Derive CDI
6,432,431 UART: [art] Store in in slot 0x4
6,518,152 UART: [art] Derive Key Pair
6,518,512 UART: [art] Store priv key in slot 0x5
6,531,552 UART: [art] Derive Key Pair - Done
6,546,574 UART: [art] Signing Cert with AUTHO
6,547,054 UART: RITY.KEYID = 7
6,561,824 UART: [art] Erasing AUTHORITY.KEYID = 7
6,562,589 UART: [art] PUB.X = 2433CC0038FE469FA950A7E6A696E3CD6478C98531BB6823F0B4A8BAF9BB4C5369DB8EB899B77352BC7385D8BAAD4BFE
6,569,353 UART: [art] PUB.Y = 0DB74F836B4032F00C2D4CD3367ED136A53F77B34D3C5BC4B648DCE83FDA13FCAC2564F7B24D0562229B62444DE95A5E
6,576,306 UART: [art] SIG.R = 95AB00FC7E6AE24B93B5CA4CA4E4AAEBF20BFCEF213F9A50E949C102C66805A500C20262D081895C886BDF163B6EA554
6,583,036 UART: [art] SIG.S = 685CF9C741345350965223640F8E2D98BA4B63C9C5A5C3A29260DF4EC56F8953ECCD95B3B30CA9F864A217AF4991A07E
6,606,021 UART: Caliptra RT
6,606,274 UART: [state] CFI Enabled
6,888,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,919,552 UART: [rt]cmd =0x41545348, len=116
6,940,433 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,619 ready_for_fw is high
1,060,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,702 >>> mbox cmd response: success
2,689,088 UART:
2,689,104 UART: Running Caliptra FMC ...
2,689,512 UART:
2,689,566 UART: [state] CFI Enabled
2,699,933 UART: [fht] FMC Alias Private Key: 7
2,808,300 UART: [art] Extend RT PCRs Done
2,808,728 UART: [art] Lock RT PCRs Done
2,810,100 UART: [art] Populate DV Done
2,818,413 UART: [fht] FMC Alias Private Key: 7
2,819,441 UART: [art] Derive CDI
2,819,721 UART: [art] Store in in slot 0x4
2,905,162 UART: [art] Derive Key Pair
2,905,522 UART: [art] Store priv key in slot 0x5
2,918,258 UART: [art] Derive Key Pair - Done
2,932,854 UART: [art] Signing Cert with AUTHO
2,933,334 UART: RITY.KEYID = 7
2,949,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,985 UART: [art] PUB.X = B6B071A22E96D35D18999CB156975B21099E517186BC17FC354348D3AC7DDBC5C8971F63B116D510FEFF5ED75178A67E
2,956,756 UART: [art] PUB.Y = 97E53CB81FFA816F087A3EB1BFD4D91B5B0263C4916B30BFE657EA2AD52A71C8624CB311C133FACD3249F72FF154AFB8
2,963,718 UART: [art] SIG.R = 4AE0EA38D2CB64C4F5D3D708A253E901D8650D178CC32AE56E811EEF906DADA37E29FF17E509DA2A3F9A5A775BBE1210
2,970,494 UART: [art] SIG.S = D5C6F8DEC804AF58DBCFFCC84B34EB16ED046BDA949193B1EACE311DC3D381D2451E6CCFFB8E9AF225B0379B0508B1B4
2,994,195 UART: Caliptra RT
2,994,448 UART: [state] CFI Enabled
3,101,983 UART: [rt] RT listening for mailbox commands...
3,102,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,577 UART: [rt]cmd =0x41544d4e, len=14344
3,535,158 >>> mbox cmd response data (8 bytes)
3,535,159 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,146 UART: [rt]cmd =0x41545348, len=116
3,586,551 >>> mbox cmd response data (12 bytes)
3,586,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,024,096 >>> mbox cmd response: success
6,024,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,037,420 UART:
6,037,436 UART: Running Caliptra FMC ...
6,037,844 UART:
6,037,898 UART: [state] CFI Enabled
6,126,617 UART: [art] Extend RT PCRs Done
6,127,045 UART: [art] Lock RT PCRs Done
6,128,384 UART: [art] Populate DV Done
6,136,635 UART: [fht] FMC Alias Private Key: 7
6,137,577 UART: [art] Derive CDI
6,137,857 UART: [art] Store in in slot 0x4
6,223,294 UART: [art] Derive Key Pair
6,223,654 UART: [art] Store priv key in slot 0x5
6,237,130 UART: [art] Derive Key Pair - Done
6,252,086 UART: [art] Signing Cert with AUTHO
6,252,566 UART: RITY.KEYID = 7
6,267,632 UART: [art] Erasing AUTHORITY.KEYID = 7
6,268,397 UART: [art] PUB.X = 1AE6956296A42417AA43CCFC1B85601917AFFAABB151AE21A97D60DCE5C0F41BB838FDE98A7FF9183102197661C3C0FE
6,275,178 UART: [art] PUB.Y = CAEA80CAA9B93E0B1E38D34E27C3270A329526578CF6A59947D788DF0A68AE681A05D2370BC239246F2932292ADD9AE5
6,282,119 UART: [art] SIG.R = FA39339ACC3A67608EB2BA293A30086280607A64CE6550D4E49E75C94CE9C2C18DA8FE7872E78F4570C906732A729D94
6,288,883 UART: [art] SIG.S = 9F839F00FF0D275098179E4D5E3EEE1EFD6195AED9C1CF2EE21F038E50369C14681DC034BD1129D76633FFA6F2865FEA
6,312,964 UART: Caliptra RT
6,313,217 UART: [state] CFI Enabled
6,596,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,627,304 UART: [rt]cmd =0x41545348, len=116
6,648,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,414 UART: [kat] SHA2-256
904,354 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,209 UART: [idev] ++
1,175,377 UART: [idev] CDI.KEYID = 6
1,175,737 UART: [idev] SUBJECT.KEYID = 7
1,176,161 UART: [idev] UDS.KEYID = 0
1,176,506 ready_for_fw is high
1,176,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,449 UART: [idev] Erasing UDS.KEYID = 0
1,201,618 UART: [idev] Sha1 KeyId Algorithm
1,209,946 UART: [idev] --
1,210,928 UART: [ldev] ++
1,211,096 UART: [ldev] CDI.KEYID = 6
1,211,459 UART: [ldev] SUBJECT.KEYID = 5
1,211,885 UART: [ldev] AUTHORITY.KEYID = 7
1,212,348 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,244,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,548 UART: [ldev] --
1,284,017 UART: [fwproc] Wait for Commands...
1,284,795 UART: [fwproc] Recv command 0x46574c44
1,285,523 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,984 >>> mbox cmd response: success
2,776,992 UART: [afmc] ++
2,777,160 UART: [afmc] CDI.KEYID = 6
2,777,522 UART: [afmc] SUBJECT.KEYID = 7
2,777,947 UART: [afmc] AUTHORITY.KEYID = 5
2,814,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,965 UART: [afmc] --
2,857,875 UART: [cold-reset] --
2,858,583 UART: [state] Locking Datavault
2,859,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,212 UART: [state] Locking ICCM
2,860,654 UART: [exit] Launching FMC @ 0x40000130
2,865,983 UART:
2,865,999 UART: Running Caliptra FMC ...
2,866,407 UART:
2,866,550 UART: [state] CFI Enabled
2,877,117 UART: [fht] FMC Alias Private Key: 7
2,985,420 UART: [art] Extend RT PCRs Done
2,985,848 UART: [art] Lock RT PCRs Done
2,987,602 UART: [art] Populate DV Done
2,995,879 UART: [fht] FMC Alias Private Key: 7
2,996,983 UART: [art] Derive CDI
2,997,263 UART: [art] Store in in slot 0x4
3,082,876 UART: [art] Derive Key Pair
3,083,236 UART: [art] Store priv key in slot 0x5
3,096,374 UART: [art] Derive Key Pair - Done
3,111,108 UART: [art] Signing Cert with AUTHO
3,111,588 UART: RITY.KEYID = 7
3,126,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,645 UART: [art] PUB.X = DE633798F669FCB6909F4A9691C50DDFB97CF76A699987DE68EEBBACAC67BA0174E7446AB5E9836FDF4CD7DB8AC2BFFB
3,134,437 UART: [art] PUB.Y = 0AE8B6B6755F55C8FEFC5F49F5223B7684E2957C377B3875D74F67C81617ABC2994CD1C02E4499E8F620CC20FE22B52A
3,141,390 UART: [art] SIG.R = CB76B4BA1C448E93313EC34A4A2382B05992474A6BB0E91CA1D85A418F45BFD5B5A2457DE803486346CEA83130C0BB1F
3,148,165 UART: [art] SIG.S = 8D3BBBE15149E050D2A7E711C7C2075CA0AC0F976942ED02F2C6A8A5E3E3F8F558549A32CB01F527DC4F759EA61783E2
3,171,960 UART: Caliptra RT
3,172,305 UART: [state] CFI Enabled
3,279,467 UART: [rt] RT listening for mailbox commands...
3,280,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,227 UART: [rt]cmd =0x41544d4e, len=14344
3,712,874 >>> mbox cmd response data (8 bytes)
3,712,875 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,044 UART: [rt]cmd =0x41545348, len=116
3,764,563 >>> mbox cmd response data (12 bytes)
3,764,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,435 UART:
3,765,451 UART: Running Caliptra ROM ...
3,765,859 UART:
3,766,001 UART: [state] CFI Enabled
3,769,041 UART: [state] LifecycleState = Unprovisioned
3,769,696 UART: [state] DebugLocked = No
3,770,212 UART: [state] WD Timer not started. Device not locked for debugging
3,771,506 UART: [kat] SHA2-256
4,577,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,581,281 UART: [kat] ++
4,581,433 UART: [kat] sha1
4,585,681 UART: [kat] SHA2-256
4,587,621 UART: [kat] SHA2-384
4,590,450 UART: [kat] SHA2-512-ACC
4,592,350 UART: [kat] ECC-384
4,602,313 UART: [kat] HMAC-384Kdf
4,606,895 UART: [kat] LMS
4,855,223 UART: [kat] --
4,856,009 UART: [update-reset] ++
6,168,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,170,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,320,000 >>> mbox cmd response: success
6,320,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,320,311 UART: [update-reset] Copying MAN_2 To MAN_1
6,328,325 UART: [update-reset Success] --
6,329,460 UART: [state] Locking Datavault
6,330,070 UART: [state] Locking PCR0, PCR1 and PCR31
6,330,674 UART: [state] Locking ICCM
6,331,138 UART: [exit] Launching FMC @ 0x40000130
6,336,467 UART:
6,336,483 UART: Running Caliptra FMC ...
6,336,891 UART:
6,337,034 UART: [state] CFI Enabled
6,426,349 UART: [art] Extend RT PCRs Done
6,426,777 UART: [art] Lock RT PCRs Done
6,428,024 UART: [art] Populate DV Done
6,436,183 UART: [fht] FMC Alias Private Key: 7
6,437,221 UART: [art] Derive CDI
6,437,501 UART: [art] Store in in slot 0x4
6,523,170 UART: [art] Derive Key Pair
6,523,530 UART: [art] Store priv key in slot 0x5
6,536,896 UART: [art] Derive Key Pair - Done
6,551,402 UART: [art] Signing Cert with AUTHO
6,551,882 UART: RITY.KEYID = 7
6,566,742 UART: [art] Erasing AUTHORITY.KEYID = 7
6,567,507 UART: [art] PUB.X = E19F7C9EE445ACFCF794757591D47499A4BAEDEDD05FC8A0C3E2107FBDE3B1B11C954E0BEC6F8D8986BFF918A0445DD4
6,574,298 UART: [art] PUB.Y = 02856379011ADB5B436633377DA13A6841D5B8E2E59E109C34997B1363A3F5F95AE9E54F1269C4B4B9F65E389B98C206
6,581,233 UART: [art] SIG.R = B582F354E6BAE93162275EB5E2DD45B884E998868F15F77D140B9A22F3DB29FE4E6D1E6E588562FA323C125C64D2282B
6,588,004 UART: [art] SIG.S = 448C32B09EF89B74BB6AA3489743B45BC6E260FFC8300782AD807414DD6A832BB101FB54DC32D4A8DAEC426339A7301F
6,611,929 UART: Caliptra RT
6,612,274 UART: [state] CFI Enabled
6,891,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,922,706 UART: [rt]cmd =0x41545348, len=116
6,943,323 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,322 ready_for_fw is high
1,061,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,217 >>> mbox cmd response: success
2,691,647 UART:
2,691,663 UART: Running Caliptra FMC ...
2,692,071 UART:
2,692,214 UART: [state] CFI Enabled
2,703,287 UART: [fht] FMC Alias Private Key: 7
2,811,416 UART: [art] Extend RT PCRs Done
2,811,844 UART: [art] Lock RT PCRs Done
2,813,480 UART: [art] Populate DV Done
2,821,691 UART: [fht] FMC Alias Private Key: 7
2,822,649 UART: [art] Derive CDI
2,822,929 UART: [art] Store in in slot 0x4
2,908,408 UART: [art] Derive Key Pair
2,908,768 UART: [art] Store priv key in slot 0x5
2,922,362 UART: [art] Derive Key Pair - Done
2,937,149 UART: [art] Signing Cert with AUTHO
2,937,629 UART: RITY.KEYID = 7
2,952,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,466 UART: [art] PUB.X = 25735FFB08800EA2175AEF08D7A51D28F53E04F4A0BAF575DF00FDBF09B5EC6ACC1791E8F6E08A4E7C6C86C2DE8375F8
2,960,219 UART: [art] PUB.Y = C731E1378E9E2B834654A5A69F58C146958CD9225F5EAF815C4902E58BCE6898952365D77A50A8112B6EC91151780750
2,967,153 UART: [art] SIG.R = 7C0838920AF7664F1BDBD52475D691E0DFF9839AD79E27ED102BA91D67362E132118CE8ABEF931F31FA77870AF9FCBAF
2,973,931 UART: [art] SIG.S = 4233AA2A27325B4F5AD1EA8A59C5DE03E789A15DBAA067D8DD2982DF2E9B54429DBD8F90B50895639678C498F35E9899
2,998,210 UART: Caliptra RT
2,998,555 UART: [state] CFI Enabled
3,105,980 UART: [rt] RT listening for mailbox commands...
3,106,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,648 UART: [rt]cmd =0x41544d4e, len=14344
3,539,631 >>> mbox cmd response data (8 bytes)
3,539,632 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,863 UART: [rt]cmd =0x41545348, len=116
3,590,950 >>> mbox cmd response data (12 bytes)
3,590,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,026,974 >>> mbox cmd response: success
6,026,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,040,454 UART:
6,040,470 UART: Running Caliptra FMC ...
6,040,878 UART:
6,041,021 UART: [state] CFI Enabled
6,129,756 UART: [art] Extend RT PCRs Done
6,130,184 UART: [art] Lock RT PCRs Done
6,131,313 UART: [art] Populate DV Done
6,139,694 UART: [fht] FMC Alias Private Key: 7
6,140,850 UART: [art] Derive CDI
6,141,130 UART: [art] Store in in slot 0x4
6,226,831 UART: [art] Derive Key Pair
6,227,191 UART: [art] Store priv key in slot 0x5
6,240,689 UART: [art] Derive Key Pair - Done
6,255,568 UART: [art] Signing Cert with AUTHO
6,256,048 UART: RITY.KEYID = 7
6,271,234 UART: [art] Erasing AUTHORITY.KEYID = 7
6,271,999 UART: [art] PUB.X = CE6691CDDAC6D2ED558409EF7157A2793FFD9CE010C31C9ECB46C6D2A006C8079A0AA792A3513077B1ED86204B76A7AC
6,278,771 UART: [art] PUB.Y = 45E878725AB79A8FC0ABCF285E0188F2F78CAFBF4E3235C5B11F67DA9960C9F72003B750C5BB0D0CFA9B96748E300C25
6,285,718 UART: [art] SIG.R = 47C0EBEAA29366845CBEE1479E6D67CDE45AA53D5C83EEEAB4E0000E7FDDF297E4A3418A3FA43EDE65072AB81DEBE9A6
6,292,488 UART: [art] SIG.S = 1D317ADEE7C76063FBF8C1F4DDF5FEB3E8D44C066290A4094446699593CDFE7EBB8FF380403B6BFF94465609FD045E15
6,316,739 UART: Caliptra RT
6,317,084 UART: [state] CFI Enabled
6,594,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,625,694 UART: [rt]cmd =0x41545348, len=116
6,647,221 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 ready_for_fw is high
1,174,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,207,997 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,799 >>> mbox cmd response: success
2,773,826 UART: [afmc] ++
2,773,994 UART: [afmc] CDI.KEYID = 6
2,774,357 UART: [afmc] SUBJECT.KEYID = 7
2,774,783 UART: [afmc] AUTHORITY.KEYID = 5
2,810,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,480 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,385 UART: [afmc] --
2,853,333 UART: [cold-reset] --
2,854,347 UART: [state] Locking Datavault
2,855,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,972 UART: [state] Locking ICCM
2,856,418 UART: [exit] Launching FMC @ 0x40000130
2,861,747 UART:
2,861,763 UART: Running Caliptra FMC ...
2,862,171 UART:
2,862,225 UART: [state] CFI Enabled
2,872,846 UART: [fht] FMC Alias Private Key: 7
2,980,603 UART: [art] Extend RT PCRs Done
2,981,031 UART: [art] Lock RT PCRs Done
2,982,473 UART: [art] Populate DV Done
2,990,864 UART: [fht] FMC Alias Private Key: 7
2,991,950 UART: [art] Derive CDI
2,992,230 UART: [art] Store in in slot 0x4
3,078,047 UART: [art] Derive Key Pair
3,078,407 UART: [art] Store priv key in slot 0x5
3,091,771 UART: [art] Derive Key Pair - Done
3,106,341 UART: [art] Signing Cert with AUTHO
3,106,821 UART: RITY.KEYID = 7
3,122,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,866 UART: [art] PUB.X = 953DA5A66621EFFE5FFA05BE493D86578354E3243B63C0948A54D02FAC1FC152998FEF1A1AF2B3BBE10BBB8F62D036F7
3,129,646 UART: [art] PUB.Y = 3E4AF0712AA6CAE77B057A4612047D16D2F92F13C6E4F4B6668DE5C85B70CF056A4C687F2C345EC66EB8EFBA73AE415E
3,136,603 UART: [art] SIG.R = A9FE1B55A0B67176488B6A93C265BFAEC945C5BB16C42EB129D050353F97906DD752FC49542CF5D556F71F1C4E956F0F
3,143,378 UART: [art] SIG.S = 985D84526ACA41A1F7BB158083A5F135ACC8D97F0351EB67F425C609E74CDA0D38BF63477A0455754521348ACA7583A0
3,167,009 UART: Caliptra RT
3,167,262 UART: [state] CFI Enabled
3,275,352 UART: [rt] RT listening for mailbox commands...
3,276,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,164 UART: [rt]cmd =0x41544d4e, len=14344
3,709,073 >>> mbox cmd response data (8 bytes)
3,709,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,055 UART: [rt]cmd =0x41545348, len=116
3,760,710 >>> mbox cmd response data (12 bytes)
3,760,711 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,450 UART:
3,761,466 UART: Running Caliptra ROM ...
3,761,874 UART:
3,761,929 UART: [state] CFI Enabled
3,764,161 UART: [state] LifecycleState = Unprovisioned
3,764,816 UART: [state] DebugLocked = No
3,765,438 UART: [state] WD Timer not started. Device not locked for debugging
3,766,626 UART: [kat] SHA2-256
4,570,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,305 UART: [kat] ++
4,574,457 UART: [kat] sha1
4,578,635 UART: [kat] SHA2-256
4,580,575 UART: [kat] SHA2-384
4,583,210 UART: [kat] SHA2-512-ACC
4,585,110 UART: [kat] ECC-384
4,594,325 UART: [kat] HMAC-384Kdf
4,599,023 UART: [kat] LMS
4,847,335 UART: [kat] --
4,848,097 UART: [update-reset] ++
6,160,164 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,161,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,311,179 >>> mbox cmd response: success
6,311,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,311,328 UART: [update-reset] Copying MAN_2 To MAN_1
6,319,342 UART: [update-reset Success] --
6,320,591 UART: [state] Locking Datavault
6,321,413 UART: [state] Locking PCR0, PCR1 and PCR31
6,322,017 UART: [state] Locking ICCM
6,322,507 UART: [exit] Launching FMC @ 0x40000130
6,327,836 UART:
6,327,852 UART: Running Caliptra FMC ...
6,328,260 UART:
6,328,314 UART: [state] CFI Enabled
6,417,825 UART: [art] Extend RT PCRs Done
6,418,253 UART: [art] Lock RT PCRs Done
6,419,452 UART: [art] Populate DV Done
6,427,763 UART: [fht] FMC Alias Private Key: 7
6,428,751 UART: [art] Derive CDI
6,429,031 UART: [art] Store in in slot 0x4
6,514,336 UART: [art] Derive Key Pair
6,514,696 UART: [art] Store priv key in slot 0x5
6,528,220 UART: [art] Derive Key Pair - Done
6,543,232 UART: [art] Signing Cert with AUTHO
6,543,712 UART: RITY.KEYID = 7
6,559,148 UART: [art] Erasing AUTHORITY.KEYID = 7
6,559,913 UART: [art] PUB.X = 10BCE97207DDFF6D0CA0725CB3FD2362D47E3390C9270D6BC28A593DE738F65BED87D1DC15392AF5C8D63AA2F55FEEF6
6,566,694 UART: [art] PUB.Y = 94BC8BBC55B9AB83D02C89ACB8BF98AF0E4CB1736C679D71454CECF89ED771BCBB484BF1B1EEE61D4E4198E62372714C
6,573,663 UART: [art] SIG.R = 40B7BBB473C4A414D8993CC7D3B4D0062A4B167AD2C62920A8D6BE35F06C7BB9D13F087E8AD56599F9EF60D69E21D2C7
6,580,439 UART: [art] SIG.S = F25B86CEC4BB38371DD87A9037A0885DE86C18F1169B942F9E4E00A8CB0A4CC28CE86541B1D4BAA854E99096B3802348
6,604,689 UART: Caliptra RT
6,604,942 UART: [state] CFI Enabled
6,881,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,912,424 UART: [rt]cmd =0x41545348, len=116
6,934,533 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 ready_for_fw is high
1,055,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,547 >>> mbox cmd response: success
2,682,419 UART:
2,682,435 UART: Running Caliptra FMC ...
2,682,843 UART:
2,682,897 UART: [state] CFI Enabled
2,693,454 UART: [fht] FMC Alias Private Key: 7
2,801,181 UART: [art] Extend RT PCRs Done
2,801,609 UART: [art] Lock RT PCRs Done
2,803,269 UART: [art] Populate DV Done
2,811,508 UART: [fht] FMC Alias Private Key: 7
2,812,652 UART: [art] Derive CDI
2,812,932 UART: [art] Store in in slot 0x4
2,898,279 UART: [art] Derive Key Pair
2,898,639 UART: [art] Store priv key in slot 0x5
2,912,185 UART: [art] Derive Key Pair - Done
2,926,864 UART: [art] Signing Cert with AUTHO
2,927,344 UART: RITY.KEYID = 7
2,942,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,383 UART: [art] PUB.X = D3DA9691195560A40701FAB7568EB9CB4C907FF77857AE0AB87579F9B6685207016B1BA98D3B85B582A23139872BD4C0
2,950,136 UART: [art] PUB.Y = 2A73E96CF9EC10AB7786F498C3D2470E8D29E3474A5F7FBF3D6E10BCD8B7ACC371992B25A34CE36CD55EF204E6F337B5
2,957,096 UART: [art] SIG.R = 5A130EC2235BCF0F3B184D2511C9218B2CCD1E6BEF96CB3D764CCBA2A22C57BBCA7D45A2EB679AF72F05927BDF9AAA85
2,963,883 UART: [art] SIG.S = 25CB080BFCCA5FA25FF808D00730A8625661EBD7EDFE3637A681342F5E4BCFCD62B87EC6DBFB27842B6B9B50B6F73924
2,987,782 UART: Caliptra RT
2,988,035 UART: [state] CFI Enabled
3,095,218 UART: [rt] RT listening for mailbox commands...
3,095,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,034 UART: [rt]cmd =0x41544d4e, len=14344
3,529,245 >>> mbox cmd response data (8 bytes)
3,529,246 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,059 UART: [rt]cmd =0x41545348, len=116
3,579,574 >>> mbox cmd response data (12 bytes)
3,579,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,236 >>> mbox cmd response: success
6,013,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,026,570 UART:
6,026,586 UART: Running Caliptra FMC ...
6,026,994 UART:
6,027,048 UART: [state] CFI Enabled
6,116,605 UART: [art] Extend RT PCRs Done
6,117,033 UART: [art] Lock RT PCRs Done
6,118,418 UART: [art] Populate DV Done
6,126,553 UART: [fht] FMC Alias Private Key: 7
6,127,689 UART: [art] Derive CDI
6,127,969 UART: [art] Store in in slot 0x4
6,213,298 UART: [art] Derive Key Pair
6,213,658 UART: [art] Store priv key in slot 0x5
6,227,750 UART: [art] Derive Key Pair - Done
6,242,490 UART: [art] Signing Cert with AUTHO
6,242,970 UART: RITY.KEYID = 7
6,258,512 UART: [art] Erasing AUTHORITY.KEYID = 7
6,259,277 UART: [art] PUB.X = B24525AE8648B354EE7BE50B313E92D63EBF19AF87E104A2217CD3244D64CB508D2467182A0985B08310E46EB9310241
6,266,031 UART: [art] PUB.Y = 5D8E3541590CD158CF02FD5817F87898646F6DB5EC87FFD0AC41048EE3485EF88E8D6089FA96A3F6B60852D0E616C62D
6,272,975 UART: [art] SIG.R = 8582568DCD4496BA77F473D41DDE8756ADB710E246EFE07139BCF53345B82BCF9E2AE09D0E9D62FF41B4319CE9DD3F0E
6,279,755 UART: [art] SIG.S = 98F1E640F05A7F1E57DA7044AE2DCA2A7A0A94078136DB924E49E00C92C01BE953554931B6382C0DDAB454BE7348682B
6,303,822 UART: Caliptra RT
6,304,075 UART: [state] CFI Enabled
6,586,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,617,194 UART: [rt]cmd =0x41545348, len=116
6,639,239 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,192 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [kat] SHA2-256
892,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,158 UART: [kat] ++
896,310 UART: [kat] sha1
900,316 UART: [kat] SHA2-256
902,256 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,429 UART: [kat] LMS
1,169,741 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 ready_for_fw is high
1,174,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,429 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,350 UART: [fwproc] Recv command 0x46574c44
1,284,083 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,622 >>> mbox cmd response: success
2,773,797 UART: [afmc] ++
2,773,965 UART: [afmc] CDI.KEYID = 6
2,774,328 UART: [afmc] SUBJECT.KEYID = 7
2,774,754 UART: [afmc] AUTHORITY.KEYID = 5
2,810,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,507 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,946 UART: [afmc] --
2,853,852 UART: [cold-reset] --
2,854,754 UART: [state] Locking Datavault
2,856,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,617 UART: [state] Locking ICCM
2,857,043 UART: [exit] Launching FMC @ 0x40000130
2,862,372 UART:
2,862,388 UART: Running Caliptra FMC ...
2,862,796 UART:
2,862,939 UART: [state] CFI Enabled
2,873,644 UART: [fht] FMC Alias Private Key: 7
2,981,463 UART: [art] Extend RT PCRs Done
2,981,891 UART: [art] Lock RT PCRs Done
2,983,457 UART: [art] Populate DV Done
2,991,464 UART: [fht] FMC Alias Private Key: 7
2,992,434 UART: [art] Derive CDI
2,992,714 UART: [art] Store in in slot 0x4
3,078,429 UART: [art] Derive Key Pair
3,078,789 UART: [art] Store priv key in slot 0x5
3,091,605 UART: [art] Derive Key Pair - Done
3,106,494 UART: [art] Signing Cert with AUTHO
3,106,974 UART: RITY.KEYID = 7
3,122,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,051 UART: [art] PUB.X = C60EEBE2B216E8ADF66A2BADCF269A3C7D411AC26983FDD97DF51E120071F1496D527F0084E7D29D48072464644B3083
3,129,777 UART: [art] PUB.Y = 72E05E5155F6EAFCB0C671DFE1759A6EC17BC36B28A3C5F7288F77EA5C7C2E23873446AE746FA6A787B9C1622A7AFA23
3,136,741 UART: [art] SIG.R = 61B868073F238A238F25634B6B7D5022827909362CA4C54E9790D52E5BDD5D0B8D80C0499FAEF57851AF3027FDA69168
3,143,498 UART: [art] SIG.S = FE24E4CDB5274CD979682C9DF1FCAE86675628B118ED8B40EACD09FA10D8A54C4E7F5F7B551C5911A7500E53CC31C80D
3,167,628 UART: Caliptra RT
3,167,973 UART: [state] CFI Enabled
3,275,420 UART: [rt] RT listening for mailbox commands...
3,276,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,966 UART: [rt]cmd =0x41544d4e, len=14344
3,708,813 >>> mbox cmd response data (8 bytes)
3,708,814 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,041 UART: [rt]cmd =0x41545348, len=116
3,760,892 >>> mbox cmd response data (12 bytes)
3,760,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,506 UART:
3,761,522 UART: Running Caliptra ROM ...
3,761,930 UART:
3,762,072 UART: [state] CFI Enabled
3,764,858 UART: [state] LifecycleState = Unprovisioned
3,765,513 UART: [state] DebugLocked = No
3,766,071 UART: [state] WD Timer not started. Device not locked for debugging
3,767,201 UART: [kat] SHA2-256
4,570,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,880 UART: [kat] ++
4,575,032 UART: [kat] sha1
4,579,350 UART: [kat] SHA2-256
4,581,290 UART: [kat] SHA2-384
4,583,937 UART: [kat] SHA2-512-ACC
4,585,837 UART: [kat] ECC-384
4,595,356 UART: [kat] HMAC-384Kdf
4,600,006 UART: [kat] LMS
4,848,318 UART: [kat] --
4,849,510 UART: [update-reset] ++
6,161,639 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,162,724 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,312,548 >>> mbox cmd response: success
6,312,548 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,312,875 UART: [update-reset] Copying MAN_2 To MAN_1
6,320,889 UART: [update-reset Success] --
6,321,736 UART: [state] Locking Datavault
6,322,708 UART: [state] Locking PCR0, PCR1 and PCR31
6,323,312 UART: [state] Locking ICCM
6,323,936 UART: [exit] Launching FMC @ 0x40000130
6,329,265 UART:
6,329,281 UART: Running Caliptra FMC ...
6,329,689 UART:
6,329,832 UART: [state] CFI Enabled
6,419,017 UART: [art] Extend RT PCRs Done
6,419,445 UART: [art] Lock RT PCRs Done
6,421,006 UART: [art] Populate DV Done
6,429,107 UART: [fht] FMC Alias Private Key: 7
6,430,147 UART: [art] Derive CDI
6,430,427 UART: [art] Store in in slot 0x4
6,516,118 UART: [art] Derive Key Pair
6,516,478 UART: [art] Store priv key in slot 0x5
6,530,302 UART: [art] Derive Key Pair - Done
6,544,957 UART: [art] Signing Cert with AUTHO
6,545,437 UART: RITY.KEYID = 7
6,560,835 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,600 UART: [art] PUB.X = 79645389678568AA0FBB00972008BBF1CEB8F739790C15DB05002A8089099667A43744139B19742BFC55A840279D00DE
6,568,277 UART: [art] PUB.Y = 9E3A62279E88E95606444708F0B58B9BA77AA94F5D7178744F460C5D94A67A5F2845A61259959CF04C0F01EF0C58EF66
6,575,205 UART: [art] SIG.R = 3348A08CDEF3CFF3B53F28DE6A7FFFFA7DFE69C5A205B7E80E5621A686BC43E881D0D5D9A597B1335477F8224890AFC8
6,581,985 UART: [art] SIG.S = FDD3BBEEB4DD3335C219D25317993C06661B2E82C12D0E186F0AED092E1BA4395DB1B2480606F9D9281524A5EFA5DB23
6,606,378 UART: Caliptra RT
6,606,723 UART: [state] CFI Enabled
6,885,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,916,683 UART: [rt]cmd =0x41545348, len=116
6,938,576 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,743 ready_for_fw is high
1,056,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,788 >>> mbox cmd response: success
2,685,600 UART:
2,685,616 UART: Running Caliptra FMC ...
2,686,024 UART:
2,686,167 UART: [state] CFI Enabled
2,697,032 UART: [fht] FMC Alias Private Key: 7
2,805,431 UART: [art] Extend RT PCRs Done
2,805,859 UART: [art] Lock RT PCRs Done
2,807,495 UART: [art] Populate DV Done
2,815,714 UART: [fht] FMC Alias Private Key: 7
2,816,704 UART: [art] Derive CDI
2,816,984 UART: [art] Store in in slot 0x4
2,902,925 UART: [art] Derive Key Pair
2,903,285 UART: [art] Store priv key in slot 0x5
2,916,749 UART: [art] Derive Key Pair - Done
2,931,502 UART: [art] Signing Cert with AUTHO
2,931,982 UART: RITY.KEYID = 7
2,947,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,051 UART: [art] PUB.X = 575D67E47B830D61C287C4B943905A6C8492710E635BE406DD1B94229754C4025A2B3D800C1AC917EF888C563BAEFC7A
2,954,806 UART: [art] PUB.Y = AE44D966A3D24AA48BBF5A74A370E86E31D48BC6B2165ABC680D9BE742D7EA32AD7BD4BE612BF067E3D9D061D8626600
2,961,747 UART: [art] SIG.R = 3F480B6BA5CF0F2478BFB85085F12D0BD3AB889F7B5881BA2DD2736727FD4D034EA8F6B728B6E3D44E1385412E980A95
2,968,510 UART: [art] SIG.S = 330678CECAAB0E9D22BC774F3BD74CC03A77D040163A6A22F16EAAF959A701F18D520AE020BE7D03F136E599C84DD383
2,992,168 UART: Caliptra RT
2,992,513 UART: [state] CFI Enabled
3,100,510 UART: [rt] RT listening for mailbox commands...
3,101,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,384 UART: [rt]cmd =0x41544d4e, len=14344
3,534,439 >>> mbox cmd response data (8 bytes)
3,534,440 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,491 UART: [rt]cmd =0x41545348, len=116
3,585,952 >>> mbox cmd response data (12 bytes)
3,585,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,651 >>> mbox cmd response: success
6,017,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,030,627 UART:
6,030,643 UART: Running Caliptra FMC ...
6,031,051 UART:
6,031,194 UART: [state] CFI Enabled
6,120,233 UART: [art] Extend RT PCRs Done
6,120,661 UART: [art] Lock RT PCRs Done
6,122,180 UART: [art] Populate DV Done
6,130,237 UART: [fht] FMC Alias Private Key: 7
6,131,373 UART: [art] Derive CDI
6,131,653 UART: [art] Store in in slot 0x4
6,217,318 UART: [art] Derive Key Pair
6,217,678 UART: [art] Store priv key in slot 0x5
6,230,686 UART: [art] Derive Key Pair - Done
6,245,633 UART: [art] Signing Cert with AUTHO
6,246,113 UART: RITY.KEYID = 7
6,261,099 UART: [art] Erasing AUTHORITY.KEYID = 7
6,261,864 UART: [art] PUB.X = 20D4CF7FE49D6F45134CB2E888737B633331233480C1DD523948ABDE99F1744B8129249EF41D0642B5538A1037DF02E9
6,268,622 UART: [art] PUB.Y = 7D31684C60F6AA97222F515513495F35D04073C35D5A201E861887CF5EEE9496436D8A251AC0323C5F9976597EE0804D
6,275,562 UART: [art] SIG.R = 7FE828342DFA36411E70203EF8EE1C5BC89BFCFFFEEE2B8CB869282685D5E78D3B2A625E7CEF49B66FB7FE3D84C608DE
6,282,353 UART: [art] SIG.S = 705BCAF044EB576A5DEE570C8B8C25D252BE0CB07634E82C1A10D5A1CE086B0468501FD997144EC31D294537549BAE15
6,306,218 UART: Caliptra RT
6,306,563 UART: [state] CFI Enabled
6,586,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,616,877 UART: [rt]cmd =0x41545348, len=116
6,638,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,625 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,170 UART: [idev] Erasing UDS.KEYID = 0
1,504,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,312 UART: [idev] --
1,514,327 UART: [ldev] ++
1,514,495 UART: [ldev] CDI.KEYID = 6
1,514,858 UART: [ldev] SUBJECT.KEYID = 5
1,515,284 UART: [ldev] AUTHORITY.KEYID = 7
1,515,747 UART: [ldev] FE.KEYID = 1
1,521,087 UART: [ldev] Erasing FE.KEYID = 1
1,546,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,798 UART: [ldev] --
1,586,201 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 114332 bytes
2,886,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,447 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,548 >>> mbox cmd response: success
3,079,686 UART: [afmc] ++
3,079,854 UART: [afmc] CDI.KEYID = 6
3,080,216 UART: [afmc] SUBJECT.KEYID = 7
3,080,641 UART: [afmc] AUTHORITY.KEYID = 5
3,115,806 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,848 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,356 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,241 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,931 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,898 UART: [afmc] --
3,158,808 UART: [cold-reset] --
3,159,624 UART: [state] Locking Datavault
3,160,927 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,531 UART: [state] Locking ICCM
3,162,137 UART: [exit] Launching FMC @ 0x40000130
3,167,466 UART:
3,167,482 UART: Running Caliptra FMC ...
3,167,890 UART:
3,167,944 UART: [state] CFI Enabled
3,178,529 UART: [fht] FMC Alias Private Key: 7
3,286,542 UART: [art] Extend RT PCRs Done
3,286,970 UART: [art] Lock RT PCRs Done
3,288,362 UART: [art] Populate DV Done
3,296,461 UART: [fht] FMC Alias Private Key: 7
3,297,489 UART: [art] Derive CDI
3,297,769 UART: [art] Store in in slot 0x4
3,383,100 UART: [art] Derive Key Pair
3,383,460 UART: [art] Store priv key in slot 0x5
3,396,844 UART: [art] Derive Key Pair - Done
3,411,402 UART: [art] Signing Cert with AUTHO
3,411,882 UART: RITY.KEYID = 7
3,427,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,805 UART: [art] PUB.X = 7B766314F69D80FC3B14388780C0AC3EF6C1459B3CA1AF180AE89F688F90ED4964BCE162ED5DE5036A76A5595A629481
3,434,573 UART: [art] PUB.Y = 6892CD96E6388A7D0C555C71BD23AB3E2E39D7A220D65C335B04DD778BED3D96D5FABCF3B4E91176E2E3C057B0D70D51
3,441,528 UART: [art] SIG.R = 6C4BC5711EC450D51930A804F9DFE3C31871945CDED53F74E169BF4ABA3D701E278BD813D20628CE0F83F1097DEE206E
3,448,296 UART: [art] SIG.S = D2DCB1F04472FDDC4E966659DCCBC88F1D39CBC7B5D7D191B9D0CAA073B2E4391A5157026C69194F5E4DFD353C3E682C
3,472,208 UART: Caliptra RT
3,472,461 UART: [state] CFI Enabled
3,580,450 UART: [rt] RT listening for mailbox commands...
3,581,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,292 UART: [rt]cmd =0x41544d4e, len=14344
4,014,494 >>> mbox cmd response data (8 bytes)
4,014,495 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,496 UART: [rt]cmd =0x41545348, len=116
4,046,171 >>> mbox cmd response data (12 bytes)
4,046,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,390 UART:
4,047,406 UART: Running Caliptra ROM ...
4,047,814 UART:
4,047,868 UART: [state] CFI Enabled
4,050,574 UART: [state] LifecycleState = Unprovisioned
4,051,229 UART: [state] DebugLocked = No
4,051,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,053,358 UART: [kat] SHA2-256
4,847,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,851,404 UART: [kat] ++
4,851,556 UART: [kat] sha1
4,855,876 UART: [kat] SHA2-256
4,857,814 UART: [kat] SHA2-384
4,860,603 UART: [kat] SHA2-512-ACC
4,862,503 UART: [kat] ECC-384
4,868,100 UART: [kat] HMAC-384Kdf
4,872,582 UART: [kat] LMS
5,440,778 UART: [kat] --
5,441,813 UART: [update-reset] ++
6,776,363 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,777,553 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,927,429 >>> mbox cmd response: success
6,927,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,927,640 UART: [update-reset] Copying MAN_2 To MAN_1
6,935,654 UART: [update-reset Success] --
6,936,685 UART: [state] Locking Datavault
6,937,533 UART: [state] Locking PCR0, PCR1 and PCR31
6,938,137 UART: [state] Locking ICCM
6,938,709 UART: [exit] Launching FMC @ 0x40000130
6,944,038 UART:
6,944,054 UART: Running Caliptra FMC ...
6,944,462 UART:
6,944,516 UART: [state] CFI Enabled
7,033,381 UART: [art] Extend RT PCRs Done
7,033,809 UART: [art] Lock RT PCRs Done
7,035,274 UART: [art] Populate DV Done
7,043,437 UART: [fht] FMC Alias Private Key: 7
7,044,511 UART: [art] Derive CDI
7,044,791 UART: [art] Store in in slot 0x4
7,130,278 UART: [art] Derive Key Pair
7,130,638 UART: [art] Store priv key in slot 0x5
7,143,426 UART: [art] Derive Key Pair - Done
7,158,539 UART: [art] Signing Cert with AUTHO
7,159,019 UART: RITY.KEYID = 7
7,174,281 UART: [art] Erasing AUTHORITY.KEYID = 7
7,175,046 UART: [art] PUB.X = 61F2A987BF144D90337E9B1D7EFBB0C7EAE6BCB066611BE57BF89762118EDD4E855BCF758012CE8086AE82BE76754FBA
7,181,832 UART: [art] PUB.Y = 0EFDB126C793C0FB314246C92D195E3F6B85474FE8D0D60FB177AFD6F38B14DDFBCDBB031452D8E48600E483F8D5346B
7,188,765 UART: [art] SIG.R = CF2D88587B1130A24BAA534ABB2336836383E23A513EC4F7996E4BBFB9CCCA3D6583AB101974C72A4B034ACF28D60C82
7,195,539 UART: [art] SIG.S = 4F3F2C058809D704BB147BD75B2D383F623F46F0241FD7155A9751F637BF38F236358303159853882EDFD6925D54F716
7,219,932 UART: Caliptra RT
7,220,185 UART: [state] CFI Enabled
7,496,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,527,413 UART: [rt]cmd =0x41545348, len=116
7,529,044 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,247 ready_for_fw is high
1,362,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,960 >>> mbox cmd response: success
2,989,528 UART:
2,989,544 UART: Running Caliptra FMC ...
2,989,952 UART:
2,990,006 UART: [state] CFI Enabled
3,000,165 UART: [fht] FMC Alias Private Key: 7
3,108,462 UART: [art] Extend RT PCRs Done
3,108,890 UART: [art] Lock RT PCRs Done
3,110,410 UART: [art] Populate DV Done
3,118,537 UART: [fht] FMC Alias Private Key: 7
3,119,605 UART: [art] Derive CDI
3,119,885 UART: [art] Store in in slot 0x4
3,205,568 UART: [art] Derive Key Pair
3,205,928 UART: [art] Store priv key in slot 0x5
3,218,896 UART: [art] Derive Key Pair - Done
3,233,538 UART: [art] Signing Cert with AUTHO
3,234,018 UART: RITY.KEYID = 7
3,248,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,671 UART: [art] PUB.X = 83BDA8118D6E2CD5524C9F908AAE90CB18552DB7C475464F21D86B6F2BA422E4893F2BB5D54A47630B650045463B544C
3,256,418 UART: [art] PUB.Y = E28E7554964DF9902F2A3E83CA88BAAEF913A59AA45F66D421EF2DE92CB06595F8885D7EF60032D4B1D3DF96A0B31CDB
3,263,362 UART: [art] SIG.R = EED1C3B590E405CDD45F7DBC4C11B1DD665F78DE9D40F5C01F87905038587C4BAE20FAD6549466D6157D08E26D06DFB3
3,270,137 UART: [art] SIG.S = DBF01C3B28FC3323CB89C7FF5EC2E5A1AD44D6FB16920F0E2A9205B27031F930FB40C22C7F66BA53DD00DC7DBA190773
3,294,000 UART: Caliptra RT
3,294,253 UART: [state] CFI Enabled
3,402,355 UART: [rt] RT listening for mailbox commands...
3,403,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,813 UART: [rt]cmd =0x41544d4e, len=14344
3,835,233 >>> mbox cmd response data (8 bytes)
3,835,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,387 UART: [rt]cmd =0x41545348, len=116
3,867,148 >>> mbox cmd response data (12 bytes)
3,867,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,628,918 >>> mbox cmd response: success
6,628,918 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,642,309 UART:
6,642,325 UART: Running Caliptra FMC ...
6,642,733 UART:
6,642,787 UART: [state] CFI Enabled
6,731,940 UART: [art] Extend RT PCRs Done
6,732,368 UART: [art] Lock RT PCRs Done
6,733,393 UART: [art] Populate DV Done
6,741,442 UART: [fht] FMC Alias Private Key: 7
6,742,524 UART: [art] Derive CDI
6,742,804 UART: [art] Store in in slot 0x4
6,828,443 UART: [art] Derive Key Pair
6,828,803 UART: [art] Store priv key in slot 0x5
6,841,711 UART: [art] Derive Key Pair - Done
6,856,251 UART: [art] Signing Cert with AUTHO
6,856,731 UART: RITY.KEYID = 7
6,871,823 UART: [art] Erasing AUTHORITY.KEYID = 7
6,872,588 UART: [art] PUB.X = 316EDA75EBCF3E85D90D4579C10FF75789683A1A2D6761F5BDADCCC0814B0E7E0DB2752B851A43A60280EF39C3EBA7B2
6,879,359 UART: [art] PUB.Y = 86BFAAC381AF4C8ECBCA2005C21C2A58DD7FA7BBF8BB48495DA4148EB94AB34D4212DF25141FF73C93667017389F5362
6,886,320 UART: [art] SIG.R = 977764DA8E67507B4BC072E4AEC469AC4F3E8E3A5B08025BC60A2B8F7DC1E09395A541B97B6548C588B14AB41E5AA510
6,893,089 UART: [art] SIG.S = A2635CA8BA8D89E9677AC3E514B73FFEF5F6D948995342BDF9FE28FF1AE3D14366AC62A0BB56F06C81EF4721DFDB0556
6,917,551 UART: Caliptra RT
6,917,804 UART: [state] CFI Enabled
7,196,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,227,729 UART: [rt]cmd =0x41545348, len=116
7,229,580 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,590 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 ready_for_fw is high
1,481,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,551 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,209 UART: [idev] --
1,515,076 UART: [ldev] ++
1,515,244 UART: [ldev] CDI.KEYID = 6
1,515,607 UART: [ldev] SUBJECT.KEYID = 5
1,516,033 UART: [ldev] AUTHORITY.KEYID = 7
1,516,496 UART: [ldev] FE.KEYID = 1
1,521,548 UART: [ldev] Erasing FE.KEYID = 1
1,547,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,469 UART: [ldev] --
1,586,772 UART: [fwproc] Waiting for Commands...
1,587,553 UART: [fwproc] Received command 0x46574c44
1,588,344 UART: [fwproc] Received Image of size 114332 bytes
2,886,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,557 >>> mbox cmd response: success
3,079,713 UART: [afmc] ++
3,079,881 UART: [afmc] CDI.KEYID = 6
3,080,243 UART: [afmc] SUBJECT.KEYID = 7
3,080,668 UART: [afmc] AUTHORITY.KEYID = 5
3,116,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,852 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,542 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,649 UART: [afmc] --
3,159,773 UART: [cold-reset] --
3,160,819 UART: [state] Locking Datavault
3,162,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,772 UART: [state] Locking ICCM
3,163,272 UART: [exit] Launching FMC @ 0x40000130
3,168,601 UART:
3,168,617 UART: Running Caliptra FMC ...
3,169,025 UART:
3,169,168 UART: [state] CFI Enabled
3,179,507 UART: [fht] FMC Alias Private Key: 7
3,286,748 UART: [art] Extend RT PCRs Done
3,287,176 UART: [art] Lock RT PCRs Done
3,288,722 UART: [art] Populate DV Done
3,297,133 UART: [fht] FMC Alias Private Key: 7
3,298,293 UART: [art] Derive CDI
3,298,573 UART: [art] Store in in slot 0x4
3,384,456 UART: [art] Derive Key Pair
3,384,816 UART: [art] Store priv key in slot 0x5
3,398,016 UART: [art] Derive Key Pair - Done
3,412,755 UART: [art] Signing Cert with AUTHO
3,413,235 UART: RITY.KEYID = 7
3,428,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,502 UART: [art] PUB.X = B2CD89B8AE09840FEE5770E01E3E69C0FD5A7E1585FF8F82CE187DA9B9BEDA296C8377F144A860A51B0A99B420ECEC78
3,436,281 UART: [art] PUB.Y = FECE113C11BF3229432C325CC303573A706788DD3AA2454EEF8AE162C511A78D7911620CAE09713550D5A1137DA20945
3,443,217 UART: [art] SIG.R = E8B0EEEACB30A98EFA3E5A3FA36805568283DBD9199B393DE548EB6B48DFC87C40529EE24E819F36179815373D096C05
3,449,986 UART: [art] SIG.S = 423828D04A0B55C4B8B61B2EDCBA303D843FDC486AA12A0B17907A4F0C0C5925B7057DCC6BCC676943C314ACEA249D6D
3,473,756 UART: Caliptra RT
3,474,101 UART: [state] CFI Enabled
3,582,880 UART: [rt] RT listening for mailbox commands...
3,583,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,662 UART: [rt]cmd =0x41544d4e, len=14344
4,016,194 >>> mbox cmd response data (8 bytes)
4,016,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,332 UART: [rt]cmd =0x41545348, len=116
4,048,027 >>> mbox cmd response data (12 bytes)
4,048,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,806 UART:
4,048,822 UART: Running Caliptra ROM ...
4,049,230 UART:
4,049,371 UART: [state] CFI Enabled
4,051,959 UART: [state] LifecycleState = Unprovisioned
4,052,614 UART: [state] DebugLocked = No
4,053,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,054,865 UART: [kat] SHA2-256
4,848,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,852,911 UART: [kat] ++
4,853,063 UART: [kat] sha1
4,857,413 UART: [kat] SHA2-256
4,859,351 UART: [kat] SHA2-384
4,862,254 UART: [kat] SHA2-512-ACC
4,864,154 UART: [kat] ECC-384
4,869,683 UART: [kat] HMAC-384Kdf
4,874,117 UART: [kat] LMS
5,442,313 UART: [kat] --
5,443,058 UART: [update-reset] ++
6,777,004 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,778,066 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,927,942 >>> mbox cmd response: success
6,927,942 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,928,047 UART: [update-reset] Copying MAN_2 To MAN_1
6,936,061 UART: [update-reset Success] --
6,937,076 UART: [state] Locking Datavault
6,937,802 UART: [state] Locking PCR0, PCR1 and PCR31
6,938,406 UART: [state] Locking ICCM
6,938,950 UART: [exit] Launching FMC @ 0x40000130
6,944,279 UART:
6,944,295 UART: Running Caliptra FMC ...
6,944,703 UART:
6,944,846 UART: [state] CFI Enabled
7,034,049 UART: [art] Extend RT PCRs Done
7,034,477 UART: [art] Lock RT PCRs Done
7,035,730 UART: [art] Populate DV Done
7,043,847 UART: [fht] FMC Alias Private Key: 7
7,044,993 UART: [art] Derive CDI
7,045,273 UART: [art] Store in in slot 0x4
7,130,988 UART: [art] Derive Key Pair
7,131,348 UART: [art] Store priv key in slot 0x5
7,144,344 UART: [art] Derive Key Pair - Done
7,159,190 UART: [art] Signing Cert with AUTHO
7,159,670 UART: RITY.KEYID = 7
7,175,426 UART: [art] Erasing AUTHORITY.KEYID = 7
7,176,191 UART: [art] PUB.X = CAF4FA8152AA9B65488AED54FC61D4476538AA053319EF67FAC04364AC1669666B0AA495DB3455D461F41BC62B3DAC2C
7,182,967 UART: [art] PUB.Y = B175271715089B4CE617432983401CDE2131718BB982640891D45AD0192528B490E21CE3B24726AD4200FC87DA3B265C
7,189,877 UART: [art] SIG.R = DC3F8EEC5D6CA9099FB552B971D0F0CD0572E8BA498D78FC62C428A6E74CDA7034E6527260760A8A70E6A5A0050DC206
7,196,639 UART: [art] SIG.S = 21B18BA2A73561C7BDC55263A691C73D8FAA578827B723A3B20DED9FA867824204C9B1683D0EB4F7B030C562229DF7E5
7,220,555 UART: Caliptra RT
7,220,900 UART: [state] CFI Enabled
7,505,579 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,536,474 UART: [rt]cmd =0x41545348, len=116
7,538,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 ready_for_fw is high
1,362,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,085 >>> mbox cmd response: success
2,990,185 UART:
2,990,201 UART: Running Caliptra FMC ...
2,990,609 UART:
2,990,752 UART: [state] CFI Enabled
3,001,255 UART: [fht] FMC Alias Private Key: 7
3,109,990 UART: [art] Extend RT PCRs Done
3,110,418 UART: [art] Lock RT PCRs Done
3,112,104 UART: [art] Populate DV Done
3,120,309 UART: [fht] FMC Alias Private Key: 7
3,121,347 UART: [art] Derive CDI
3,121,627 UART: [art] Store in in slot 0x4
3,207,334 UART: [art] Derive Key Pair
3,207,694 UART: [art] Store priv key in slot 0x5
3,221,206 UART: [art] Derive Key Pair - Done
3,236,009 UART: [art] Signing Cert with AUTHO
3,236,489 UART: RITY.KEYID = 7
3,251,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,044 UART: [art] PUB.X = 959A64B81F7609A351147845E5A3746AB4FC168112BE57A36BD0B5D975B945D573F2285ECC5CADC17F56CA322A81966A
3,258,813 UART: [art] PUB.Y = D4B7E52E12EF3D4415DFFEF8557D97D65D96E8E4409F84A5F38AE3AFD96811B03DBAF4C7F2F2D32FC1F3DE717E2D4B6E
3,265,787 UART: [art] SIG.R = AA9DEF6E765FC99A22B8B5E0E9704D5CA350DBA9F1E412A209CB4F3C7E0C546244375ED3930436CD1733B650FEDB7EEC
3,272,566 UART: [art] SIG.S = FBB4C548962D206451BB87FE66DAC0C6262ABE35C17FE0D1ECB94A8AEB30F0274FE34A1E1224E3C69586EF2B5E329C46
3,296,851 UART: Caliptra RT
3,297,196 UART: [state] CFI Enabled
3,405,046 UART: [rt] RT listening for mailbox commands...
3,405,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,760 UART: [rt]cmd =0x41544d4e, len=14344
3,839,094 >>> mbox cmd response data (8 bytes)
3,839,095 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,170 UART: [rt]cmd =0x41545348, len=116
3,871,123 >>> mbox cmd response data (12 bytes)
3,871,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,632,872 >>> mbox cmd response: success
6,632,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,646,363 UART:
6,646,379 UART: Running Caliptra FMC ...
6,646,787 UART:
6,646,930 UART: [state] CFI Enabled
6,735,533 UART: [art] Extend RT PCRs Done
6,735,961 UART: [art] Lock RT PCRs Done
6,737,332 UART: [art] Populate DV Done
6,745,263 UART: [fht] FMC Alias Private Key: 7
6,746,259 UART: [art] Derive CDI
6,746,539 UART: [art] Store in in slot 0x4
6,832,110 UART: [art] Derive Key Pair
6,832,470 UART: [art] Store priv key in slot 0x5
6,846,258 UART: [art] Derive Key Pair - Done
6,861,178 UART: [art] Signing Cert with AUTHO
6,861,658 UART: RITY.KEYID = 7
6,876,766 UART: [art] Erasing AUTHORITY.KEYID = 7
6,877,531 UART: [art] PUB.X = 889E27D2767D05A0764E1CED178E10DA8AEBC520F6B2BF067180E8DF7BDF314A68B16A2B3DC4181C5972829AF7E586D2
6,884,305 UART: [art] PUB.Y = 9684C432815AE76C405FAEAECED8D95A742D4B8CDFFC5B186ACB7C91FCC5902DEE6D8A0A1160A951E5A0C94EDEB5FAFA
6,891,284 UART: [art] SIG.R = DEF59B7FAC65EF1110C3FB3814EA3891453F0C6341DAACCAEF688853A748211B570A4DC6EEAF6F4A6F3049C57C4E153C
6,898,066 UART: [art] SIG.S = 8653438CC75433002A588B5D44CDFE36E82814893C0E145AED006488ED177BF76DF12BE78604EFA5AC59583BA38A06EC
6,921,742 UART: Caliptra RT
6,922,087 UART: [state] CFI Enabled
7,200,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,231,674 UART: [rt]cmd =0x41545348, len=116
7,233,409 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,300 UART: [kat] SHA2-512-ACC
908,201 UART: [kat] ECC-384
917,718 UART: [kat] HMAC-384Kdf
922,234 UART: [kat] LMS
1,170,562 UART: [kat] --
1,171,155 UART: [cold-reset] ++
1,171,723 UART: [fht] FHT @ 0x50003400
1,174,490 UART: [idev] ++
1,174,658 UART: [idev] CDI.KEYID = 6
1,175,018 UART: [idev] SUBJECT.KEYID = 7
1,175,442 UART: [idev] UDS.KEYID = 0
1,175,787 ready_for_fw is high
1,175,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,536 UART: [idev] Erasing UDS.KEYID = 0
1,200,407 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,454 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,905 >>> mbox cmd response: success
2,774,045 UART: [afmc] ++
2,774,213 UART: [afmc] CDI.KEYID = 6
2,774,575 UART: [afmc] SUBJECT.KEYID = 7
2,775,000 UART: [afmc] AUTHORITY.KEYID = 5
2,810,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,275 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,860 UART: [afmc] --
2,853,976 UART: [cold-reset] --
2,854,864 UART: [state] Locking Datavault
2,855,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,567 UART: [state] Locking ICCM
2,857,029 UART: [exit] Launching FMC @ 0x40000130
2,862,358 UART:
2,862,374 UART: Running Caliptra FMC ...
2,862,782 UART:
2,862,836 UART: [state] CFI Enabled
2,873,137 UART: [fht] FMC Alias Private Key: 7
2,981,474 UART: [art] Extend RT PCRs Done
2,981,902 UART: [art] Lock RT PCRs Done
2,983,362 UART: [art] Populate DV Done
2,991,931 UART: [fht] FMC Alias Private Key: 7
2,992,969 UART: [art] Derive CDI
2,993,249 UART: [art] Store in in slot 0x4
3,078,704 UART: [art] Derive Key Pair
3,079,064 UART: [art] Store priv key in slot 0x5
3,091,924 UART: [art] Derive Key Pair - Done
3,106,622 UART: [art] Signing Cert with AUTHO
3,107,102 UART: RITY.KEYID = 7
3,122,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,915 UART: [art] PUB.X = D443A0D6BFDE8418116514F694C38DC928DA99F1CB4742498E57FFB98B6B0E325AF13386E28C09DF80188F225389445C
3,129,679 UART: [art] PUB.Y = 7ACE0C77E9B20914C47D2A02B3DB91C411DDEF6BD50A18FB8A9FC329BE1D65ABCE4A386A814E56064367524BFD881748
3,136,628 UART: [art] SIG.R = 94BA829E33E7F35E8FD58649DAD92528655CEEC625BC40D87794C9801F39A667ED743E2273A58F102936FEEC5995B4A3
3,143,400 UART: [art] SIG.S = 8EFA4755DAF899D0BA0C7CEB1EAF62A94EED5FE35096B84F433BD9A0989C7F73B99221D2CC06996D5458CBBA25EB0C40
3,167,382 UART: Caliptra RT
3,167,635 UART: [state] CFI Enabled
3,274,833 UART: [rt] RT listening for mailbox commands...
3,275,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,733 UART: [rt]cmd =0x41544d4e, len=14344
3,708,573 >>> mbox cmd response data (8 bytes)
3,708,574 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,619 UART: [rt]cmd =0x41545348, len=116
3,740,098 >>> mbox cmd response data (12 bytes)
3,740,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,758 UART:
3,740,774 UART: Running Caliptra ROM ...
3,741,182 UART:
3,741,237 UART: [state] CFI Enabled
3,743,619 UART: [state] LifecycleState = Unprovisioned
3,744,274 UART: [state] DebugLocked = No
3,744,802 UART: [state] WD Timer not started. Device not locked for debugging
3,746,090 UART: [kat] SHA2-256
4,551,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,555,865 UART: [kat] ++
4,556,017 UART: [kat] sha1
4,560,279 UART: [kat] SHA2-256
4,562,219 UART: [kat] SHA2-384
4,564,952 UART: [kat] SHA2-512-ACC
4,566,852 UART: [kat] ECC-384
4,576,357 UART: [kat] HMAC-384Kdf
4,580,941 UART: [kat] LMS
4,829,269 UART: [kat] --
4,830,221 UART: [update-reset] ++
6,143,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,144,706 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,294,530 >>> mbox cmd response: success
6,294,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,294,813 UART: [update-reset] Copying MAN_2 To MAN_1
6,302,827 UART: [update-reset Success] --
6,303,958 UART: [state] Locking Datavault
6,304,866 UART: [state] Locking PCR0, PCR1 and PCR31
6,305,470 UART: [state] Locking ICCM
6,306,046 UART: [exit] Launching FMC @ 0x40000130
6,311,375 UART:
6,311,391 UART: Running Caliptra FMC ...
6,311,799 UART:
6,311,853 UART: [state] CFI Enabled
6,400,944 UART: [art] Extend RT PCRs Done
6,401,372 UART: [art] Lock RT PCRs Done
6,402,823 UART: [art] Populate DV Done
6,411,152 UART: [fht] FMC Alias Private Key: 7
6,412,126 UART: [art] Derive CDI
6,412,406 UART: [art] Store in in slot 0x4
6,497,663 UART: [art] Derive Key Pair
6,498,023 UART: [art] Store priv key in slot 0x5
6,511,267 UART: [art] Derive Key Pair - Done
6,525,690 UART: [art] Signing Cert with AUTHO
6,526,170 UART: RITY.KEYID = 7
6,541,168 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,933 UART: [art] PUB.X = 34822526619F591BB375CCBB777EFCF86F69AC3CC7B2F1BBEC8B923337DBB8A2620534C48DAA7A07C7D818C3F45D5BD6
6,548,713 UART: [art] PUB.Y = 04F84BC85010E71A0402957531E2F733252B1119494796950CA4CA3DAEB0D179A249ACE8ADF839DAB9C4B198962EB12D
6,555,653 UART: [art] SIG.R = 273314E716DE562999E1FAB65E955E97FCA8BEB0515F46454E67F5E324615AD0A82C9CE47F75CCC5F4AE4099B572E89D
6,562,431 UART: [art] SIG.S = D782B9FA68262123F54DBF2B5F6C6A58C4C2B8CDD796D560512F91B519B686CF5715203099AA47D531AEB9118DCD52CA
6,586,232 UART: Caliptra RT
6,586,485 UART: [state] CFI Enabled
6,865,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,479 UART: [rt]cmd =0x41545348, len=116
6,898,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 ready_for_fw is high
1,060,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,918 >>> mbox cmd response: success
2,688,272 UART:
2,688,288 UART: Running Caliptra FMC ...
2,688,696 UART:
2,688,750 UART: [state] CFI Enabled
2,699,091 UART: [fht] FMC Alias Private Key: 7
2,807,544 UART: [art] Extend RT PCRs Done
2,807,972 UART: [art] Lock RT PCRs Done
2,809,168 UART: [art] Populate DV Done
2,817,479 UART: [fht] FMC Alias Private Key: 7
2,818,445 UART: [art] Derive CDI
2,818,725 UART: [art] Store in in slot 0x4
2,904,278 UART: [art] Derive Key Pair
2,904,638 UART: [art] Store priv key in slot 0x5
2,917,312 UART: [art] Derive Key Pair - Done
2,932,025 UART: [art] Signing Cert with AUTHO
2,932,505 UART: RITY.KEYID = 7
2,947,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,442 UART: [art] PUB.X = A06BB43F30BE017797B1ECD2A0FC2E309F3109DC60A7068044173F1481DAEDCF0936591EC35DC7F0F303B07946586DFC
2,955,205 UART: [art] PUB.Y = 78242B7A3F1AD31CB9E95AB49CAF4F5E7B817789DF444616B22ADCBD915DAAD2F1B65D221A648EB13338D99CD8B3F350
2,962,171 UART: [art] SIG.R = 5FBB83C3D4D4D80134CEDAFC3F54CB28749B964F4C0B15D6869DF416FA0CB9FFE5C2E9962DB864209DD8CDDB0432637C
2,968,949 UART: [art] SIG.S = 0369EE29C6BA0F94A9B5DAD5CA805B0DDC3F45559CA395DC15937F4350D716100C7BEB9C1570377045DB8E6B0A6FBB67
2,992,697 UART: Caliptra RT
2,992,950 UART: [state] CFI Enabled
3,099,911 UART: [rt] RT listening for mailbox commands...
3,100,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,535 UART: [rt]cmd =0x41544d4e, len=14344
3,533,225 >>> mbox cmd response data (8 bytes)
3,533,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,169 UART: [rt]cmd =0x41545348, len=116
3,564,876 >>> mbox cmd response data (12 bytes)
3,564,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,211 >>> mbox cmd response: success
6,003,211 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,016,463 UART:
6,016,479 UART: Running Caliptra FMC ...
6,016,887 UART:
6,016,941 UART: [state] CFI Enabled
6,105,598 UART: [art] Extend RT PCRs Done
6,106,026 UART: [art] Lock RT PCRs Done
6,107,253 UART: [art] Populate DV Done
6,115,560 UART: [fht] FMC Alias Private Key: 7
6,116,524 UART: [art] Derive CDI
6,116,804 UART: [art] Store in in slot 0x4
6,202,217 UART: [art] Derive Key Pair
6,202,577 UART: [art] Store priv key in slot 0x5
6,215,833 UART: [art] Derive Key Pair - Done
6,230,641 UART: [art] Signing Cert with AUTHO
6,231,121 UART: RITY.KEYID = 7
6,246,405 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,170 UART: [art] PUB.X = 99CF88052A8C9B52A0ABA6AD8BB9078E86D1B5E89A7F826AD43E96835A4B5267AD393FEEA9C967C22BD070DCFAD9DD15
6,253,954 UART: [art] PUB.Y = 1605D8DF76B0DC723051D6ACA8A9AA15F795619D7ABA579FC3D4A03C00387EC518DD3D90DACE083D1B077F1DF349482F
6,260,887 UART: [art] SIG.R = D0BBCB16ED28DDF1C4493B720633A4084F1FE91F8998128327CD7C74178B79EFACC6531E5913D0343C34FEA00E9FF9A4
6,267,658 UART: [art] SIG.S = 484090FE4D7F8E75039994414BFC80A4D8597D5E49A1489D0008559674A3D5980ACDE12AA459012BD5E1240D970533B7
6,291,739 UART: Caliptra RT
6,291,992 UART: [state] CFI Enabled
6,570,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,601,314 UART: [rt]cmd =0x41545348, len=116
6,603,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,193 UART: [kat] HMAC-384Kdf
922,861 UART: [kat] LMS
1,171,189 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,357 UART: [idev] ++
1,175,525 UART: [idev] CDI.KEYID = 6
1,175,885 UART: [idev] SUBJECT.KEYID = 7
1,176,309 UART: [idev] UDS.KEYID = 0
1,176,654 ready_for_fw is high
1,176,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,195 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,664 UART: [idev] --
1,210,696 UART: [ldev] ++
1,210,864 UART: [ldev] CDI.KEYID = 6
1,211,227 UART: [ldev] SUBJECT.KEYID = 5
1,211,653 UART: [ldev] AUTHORITY.KEYID = 7
1,212,116 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,720 UART: [ldev] --
1,283,167 UART: [fwproc] Wait for Commands...
1,283,957 UART: [fwproc] Recv command 0x46574c44
1,284,685 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,078 >>> mbox cmd response: success
2,775,296 UART: [afmc] ++
2,775,464 UART: [afmc] CDI.KEYID = 6
2,775,826 UART: [afmc] SUBJECT.KEYID = 7
2,776,251 UART: [afmc] AUTHORITY.KEYID = 5
2,811,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,325 UART: [afmc] --
2,855,303 UART: [cold-reset] --
2,856,207 UART: [state] Locking Datavault
2,857,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,980 UART: [state] Locking ICCM
2,858,618 UART: [exit] Launching FMC @ 0x40000130
2,863,947 UART:
2,863,963 UART: Running Caliptra FMC ...
2,864,371 UART:
2,864,514 UART: [state] CFI Enabled
2,875,071 UART: [fht] FMC Alias Private Key: 7
2,982,838 UART: [art] Extend RT PCRs Done
2,983,266 UART: [art] Lock RT PCRs Done
2,984,686 UART: [art] Populate DV Done
2,993,025 UART: [fht] FMC Alias Private Key: 7
2,994,145 UART: [art] Derive CDI
2,994,425 UART: [art] Store in in slot 0x4
3,080,618 UART: [art] Derive Key Pair
3,080,978 UART: [art] Store priv key in slot 0x5
3,094,116 UART: [art] Derive Key Pair - Done
3,108,841 UART: [art] Signing Cert with AUTHO
3,109,321 UART: RITY.KEYID = 7
3,124,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,322 UART: [art] PUB.X = 0BA3E28B31D912BFDDE509B3661F5DCC674C1093E7CCF2B8DD82BB1E46AED53CAE291771847CBBF0C41F63F28D481F1A
3,132,108 UART: [art] PUB.Y = 465088309DB69E3C6229500CC857D2573AA786B1E41B4CEEB117994A0501272B8E9EB1BC5BF004A63416D6D1439BDCA2
3,139,048 UART: [art] SIG.R = 45883155700391CC1F8AF2D31F548F4E460D803FD27C693C22412B34CE103BF5484A3B99DDAD88AD3B06E9A0E81AEB55
3,145,815 UART: [art] SIG.S = 9C3CDCCB67869208B9A0BB76B5F227D53E76B73590D692266DDCCB22F67CA00151A8B197928157E1F23EBBCD8E5EF71A
3,169,070 UART: Caliptra RT
3,169,415 UART: [state] CFI Enabled
3,278,618 UART: [rt] RT listening for mailbox commands...
3,279,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,190 UART: [rt]cmd =0x41544d4e, len=14344
3,712,064 >>> mbox cmd response data (8 bytes)
3,712,065 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,170 UART: [rt]cmd =0x41545348, len=116
3,743,897 >>> mbox cmd response data (12 bytes)
3,743,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,635 UART:
3,744,651 UART: Running Caliptra ROM ...
3,745,059 UART:
3,745,201 UART: [state] CFI Enabled
3,747,897 UART: [state] LifecycleState = Unprovisioned
3,748,552 UART: [state] DebugLocked = No
3,749,112 UART: [state] WD Timer not started. Device not locked for debugging
3,750,448 UART: [kat] SHA2-256
4,556,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,560,223 UART: [kat] ++
4,560,375 UART: [kat] sha1
4,564,543 UART: [kat] SHA2-256
4,566,483 UART: [kat] SHA2-384
4,569,150 UART: [kat] SHA2-512-ACC
4,571,050 UART: [kat] ECC-384
4,580,543 UART: [kat] HMAC-384Kdf
4,585,229 UART: [kat] LMS
4,833,557 UART: [kat] --
4,834,305 UART: [update-reset] ++
6,146,741 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,147,746 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,297,570 >>> mbox cmd response: success
6,297,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,297,899 UART: [update-reset] Copying MAN_2 To MAN_1
6,305,913 UART: [update-reset Success] --
6,306,710 UART: [state] Locking Datavault
6,307,496 UART: [state] Locking PCR0, PCR1 and PCR31
6,308,100 UART: [state] Locking ICCM
6,308,706 UART: [exit] Launching FMC @ 0x40000130
6,314,035 UART:
6,314,051 UART: Running Caliptra FMC ...
6,314,459 UART:
6,314,602 UART: [state] CFI Enabled
6,403,711 UART: [art] Extend RT PCRs Done
6,404,139 UART: [art] Lock RT PCRs Done
6,405,374 UART: [art] Populate DV Done
6,413,437 UART: [fht] FMC Alias Private Key: 7
6,414,559 UART: [art] Derive CDI
6,414,839 UART: [art] Store in in slot 0x4
6,500,556 UART: [art] Derive Key Pair
6,500,916 UART: [art] Store priv key in slot 0x5
6,513,996 UART: [art] Derive Key Pair - Done
6,528,849 UART: [art] Signing Cert with AUTHO
6,529,329 UART: RITY.KEYID = 7
6,544,657 UART: [art] Erasing AUTHORITY.KEYID = 7
6,545,422 UART: [art] PUB.X = 26C1258F847943187454ACBB50527CDB56871731D81DEEF4596E78399EBEE3050D99FD5A8CCE885190D423AEC3BB1B66
6,552,190 UART: [art] PUB.Y = 3B9409A90AE7FCF3859C8D4BA4083262BF3AF24C24A2936047016EFC9449D32F028AA2E6DA23F2E78834371CBA90CBF9
6,559,133 UART: [art] SIG.R = 796E86F86352AFB7366A6F57409E4466DFFA256543CF12D77B92D976D8C580490378119E19D3D2E65DCE2EAD3416B83F
6,565,900 UART: [art] SIG.S = 94A84FD2918A420013B4AE9E3E30175B29E04F8379A514B48A3DD0933ADE6AB7165D3EC835F9B5BC80FDBDFD223CD6C8
6,590,027 UART: Caliptra RT
6,590,372 UART: [state] CFI Enabled
6,873,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,962 UART: [rt]cmd =0x41545348, len=116
6,905,685 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,848 ready_for_fw is high
1,060,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,097 >>> mbox cmd response: success
2,689,975 UART:
2,689,991 UART: Running Caliptra FMC ...
2,690,399 UART:
2,690,542 UART: [state] CFI Enabled
2,701,025 UART: [fht] FMC Alias Private Key: 7
2,809,330 UART: [art] Extend RT PCRs Done
2,809,758 UART: [art] Lock RT PCRs Done
2,811,226 UART: [art] Populate DV Done
2,819,441 UART: [fht] FMC Alias Private Key: 7
2,820,559 UART: [art] Derive CDI
2,820,839 UART: [art] Store in in slot 0x4
2,906,522 UART: [art] Derive Key Pair
2,906,882 UART: [art] Store priv key in slot 0x5
2,920,390 UART: [art] Derive Key Pair - Done
2,935,359 UART: [art] Signing Cert with AUTHO
2,935,839 UART: RITY.KEYID = 7
2,950,957 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,722 UART: [art] PUB.X = BC027DBCE3C3CC0A0B81C67E820AC6F43167F038F7D304AC63D0AB4E33771969845751425CC45C90284DD28B2CAB6E50
2,958,485 UART: [art] PUB.Y = 7B4D327AEDF954BD3DF18299B95B1B61C63CF73336A5927EF43BEA55241D8CD7068FB4436D8664C4B1FB554AC4AEA85A
2,965,446 UART: [art] SIG.R = F72F0A21FD8323FC4541ECA6A6ECF26C5DAF1462CD4E612D7C5FDC238E4E8AA0CE540F47314910C63AF064CC6280CEB5
2,972,230 UART: [art] SIG.S = 05358E38DC0ABAFBE1B49C078EB108FD3CDCE7A53B71152CF3C309F9787A43DB6BE55F542BB14B93789CD6A0A287BA01
2,995,111 UART: Caliptra RT
2,995,456 UART: [state] CFI Enabled
3,103,435 UART: [rt] RT listening for mailbox commands...
3,104,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,227 UART: [rt]cmd =0x41544d4e, len=14344
3,537,195 >>> mbox cmd response data (8 bytes)
3,537,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,515 UART: [rt]cmd =0x41545348, len=116
3,569,264 >>> mbox cmd response data (12 bytes)
3,569,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,794 >>> mbox cmd response: success
6,006,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,019,996 UART:
6,020,012 UART: Running Caliptra FMC ...
6,020,420 UART:
6,020,563 UART: [state] CFI Enabled
6,109,480 UART: [art] Extend RT PCRs Done
6,109,908 UART: [art] Lock RT PCRs Done
6,111,035 UART: [art] Populate DV Done
6,119,432 UART: [fht] FMC Alias Private Key: 7
6,120,526 UART: [art] Derive CDI
6,120,806 UART: [art] Store in in slot 0x4
6,206,079 UART: [art] Derive Key Pair
6,206,439 UART: [art] Store priv key in slot 0x5
6,219,183 UART: [art] Derive Key Pair - Done
6,234,173 UART: [art] Signing Cert with AUTHO
6,234,653 UART: RITY.KEYID = 7
6,249,667 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,432 UART: [art] PUB.X = 616462DA22CA9A8C2CA54C7DD8BD3ECCB7DBB02E8908C35FFCC78754D2DC698F94EAA1D4E2E455AF71F5F15F35914679
6,257,219 UART: [art] PUB.Y = DDD58D7866892F2F6FA883800E897768FF9F6304E5E173560E462330F149278C13E64EA167E105F21064AC319ABC0F93
6,264,148 UART: [art] SIG.R = 8424684CE77680B0CC6AA6E201E1A2C3BE2B2F44DF3CAEFE9A683CB555FC2EC67F1CBCC342DDA7B5606ECA67C58FE47E
6,270,943 UART: [art] SIG.S = 1E59B1063D50716E22BADB03B706A36686FD4373BD70355DCF7F31D92A0B4050A4C5CEAD956F8421ACC75BFB0DB765FF
6,294,557 UART: Caliptra RT
6,294,902 UART: [state] CFI Enabled
6,573,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,604,036 UART: [rt]cmd =0x41545348, len=116
6,606,043 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,174,795 ready_for_fw is high
1,174,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,851 UART: [idev] Sha1 KeyId Algorithm
1,208,813 UART: [idev] --
1,209,656 UART: [ldev] ++
1,209,824 UART: [ldev] CDI.KEYID = 6
1,210,188 UART: [ldev] SUBJECT.KEYID = 5
1,210,615 UART: [ldev] AUTHORITY.KEYID = 7
1,211,078 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,926 UART: [ldev] --
1,282,338 UART: [fwproc] Wait for Commands...
1,283,107 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,819 >>> mbox cmd response: success
2,774,908 UART: [afmc] ++
2,775,076 UART: [afmc] CDI.KEYID = 6
2,775,439 UART: [afmc] SUBJECT.KEYID = 7
2,775,865 UART: [afmc] AUTHORITY.KEYID = 5
2,811,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,957 UART: [afmc] --
2,854,841 UART: [cold-reset] --
2,855,649 UART: [state] Locking Datavault
2,856,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,272 UART: [state] Locking ICCM
2,857,802 UART: [exit] Launching FMC @ 0x40000130
2,863,131 UART:
2,863,147 UART: Running Caliptra FMC ...
2,863,555 UART:
2,863,609 UART: [state] CFI Enabled
2,874,032 UART: [fht] FMC Alias Private Key: 7
2,982,115 UART: [art] Extend RT PCRs Done
2,982,543 UART: [art] Lock RT PCRs Done
2,984,135 UART: [art] Populate DV Done
2,992,588 UART: [fht] FMC Alias Private Key: 7
2,993,754 UART: [art] Derive CDI
2,994,034 UART: [art] Store in in slot 0x4
3,079,583 UART: [art] Derive Key Pair
3,079,943 UART: [art] Store priv key in slot 0x5
3,093,325 UART: [art] Derive Key Pair - Done
3,108,470 UART: [art] Signing Cert with AUTHO
3,108,950 UART: RITY.KEYID = 7
3,124,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,953 UART: [art] PUB.X = C9B6F284E59669DAC82BFAF32ECA477850D9A2E6F77BC8842A990E3B64B3A8D545D4F1CA1B66022BC9D3DE48453F3673
3,131,729 UART: [art] PUB.Y = 1D0B6210CCB42F1AEEA92114C01BA190E8227BD0D9065B38822ECF8B33C89A62B1C1FC8B8173E75DF2BA7CDA3DBD1D39
3,138,693 UART: [art] SIG.R = 6F756492CDE85D3D4922DBD1E16A6684106930F5459E2AA3882AC053F77F4390B2E28B9F04C96695DBD2372EBC2C614C
3,145,462 UART: [art] SIG.S = B812BCCD09C5EAC8D458AB4D489EC3509DDF718BA3951B747AF69DA6FF02598DEE5169683237B6C2EDE71B2082E5D203
3,169,788 UART: Caliptra RT
3,170,041 UART: [state] CFI Enabled
3,278,314 UART: [rt] RT listening for mailbox commands...
3,278,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,958 UART: [rt]cmd =0x41544d4e, len=14344
3,711,794 >>> mbox cmd response data (8 bytes)
3,711,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,690 UART: [rt]cmd =0x41545348, len=116
3,743,533 >>> mbox cmd response data (12 bytes)
3,743,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,115 UART:
3,744,131 UART: Running Caliptra ROM ...
3,744,539 UART:
3,744,594 UART: [state] CFI Enabled
3,747,114 UART: [state] LifecycleState = Unprovisioned
3,747,769 UART: [state] DebugLocked = No
3,748,467 UART: [state] WD Timer not started. Device not locked for debugging
3,749,749 UART: [kat] SHA2-256
4,553,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,557,428 UART: [kat] ++
4,557,580 UART: [kat] sha1
4,561,728 UART: [kat] SHA2-256
4,563,668 UART: [kat] SHA2-384
4,566,285 UART: [kat] SHA2-512-ACC
4,568,185 UART: [kat] ECC-384
4,577,854 UART: [kat] HMAC-384Kdf
4,582,530 UART: [kat] LMS
4,830,842 UART: [kat] --
4,831,842 UART: [update-reset] ++
6,143,043 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,144,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,293,950 >>> mbox cmd response: success
6,293,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,294,305 UART: [update-reset] Copying MAN_2 To MAN_1
6,302,319 UART: [update-reset Success] --
6,303,340 UART: [state] Locking Datavault
6,304,186 UART: [state] Locking PCR0, PCR1 and PCR31
6,304,790 UART: [state] Locking ICCM
6,305,300 UART: [exit] Launching FMC @ 0x40000130
6,310,629 UART:
6,310,645 UART: Running Caliptra FMC ...
6,311,053 UART:
6,311,107 UART: [state] CFI Enabled
6,399,820 UART: [art] Extend RT PCRs Done
6,400,248 UART: [art] Lock RT PCRs Done
6,401,597 UART: [art] Populate DV Done
6,409,798 UART: [fht] FMC Alias Private Key: 7
6,410,832 UART: [art] Derive CDI
6,411,112 UART: [art] Store in in slot 0x4
6,496,591 UART: [art] Derive Key Pair
6,496,951 UART: [art] Store priv key in slot 0x5
6,510,207 UART: [art] Derive Key Pair - Done
6,524,903 UART: [art] Signing Cert with AUTHO
6,525,383 UART: RITY.KEYID = 7
6,541,077 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,842 UART: [art] PUB.X = F735BEA1F9FB258DAD324EFF06342176B4435D65FA40A0D0B38BE305CEF420F7B4DA1DB00D6AA854C14E075DCA4651B4
6,548,618 UART: [art] PUB.Y = ED19D2BC033D0581368B4D3AEBCE6976ED66EDD0A6FDD1EE041ECCCED4C52BC127327DC30204BE7877883160D5A9769B
6,555,571 UART: [art] SIG.R = 4DD69F215A4CD43CD1B6853A00C6553EE8AECE289AE2FC151149EE88CA6D81A7EB68B12334A1809E2BD8B885BEA4DDAC
6,562,341 UART: [art] SIG.S = D1CFCBEDCA4615D15B2FACD94A26E8D70A4A5EA7B03F5BDF4E0A639ED0F2B63643FB9AD5C54BDA3290B7BEDB8AC254ED
6,586,002 UART: Caliptra RT
6,586,255 UART: [state] CFI Enabled
6,870,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,901,381 UART: [rt]cmd =0x41545348, len=116
6,903,394 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,594 ready_for_fw is high
1,056,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,863 >>> mbox cmd response: success
2,683,719 UART:
2,683,735 UART: Running Caliptra FMC ...
2,684,143 UART:
2,684,197 UART: [state] CFI Enabled
2,694,884 UART: [fht] FMC Alias Private Key: 7
2,802,589 UART: [art] Extend RT PCRs Done
2,803,017 UART: [art] Lock RT PCRs Done
2,804,645 UART: [art] Populate DV Done
2,812,624 UART: [fht] FMC Alias Private Key: 7
2,813,650 UART: [art] Derive CDI
2,813,930 UART: [art] Store in in slot 0x4
2,899,869 UART: [art] Derive Key Pair
2,900,229 UART: [art] Store priv key in slot 0x5
2,913,815 UART: [art] Derive Key Pair - Done
2,928,718 UART: [art] Signing Cert with AUTHO
2,929,198 UART: RITY.KEYID = 7
2,944,284 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,049 UART: [art] PUB.X = ABD35C79F18857399C87EC403CA3302B7C5F8AE76D8C0B9DFC709971A65E144D670CDB24662DF2087E36236E615F838E
2,951,814 UART: [art] PUB.Y = DE77F43968C54F26AFC52D12CF8682FA19E6A5715148C1B5FF40B296A7384778A7B2D451B9CBAF29DB9E4FC367A5BCE6
2,958,778 UART: [art] SIG.R = B7C9FBF88FFC13444F10C0430C7277C97235BEBB2D70BB823EC25CFF11A358A9126796DF75DAA1861C240E11F2B1D7F7
2,965,554 UART: [art] SIG.S = 39DE3AC2266DF4DC963EC5DA160359634264E2C0B661BB51256E2F9BDFD547B7D3C048BE6D9DEE083ED835DA8CC9AE2C
2,989,331 UART: Caliptra RT
2,989,584 UART: [state] CFI Enabled
3,098,057 UART: [rt] RT listening for mailbox commands...
3,098,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,971 UART: [rt]cmd =0x41544d4e, len=14344
3,531,995 >>> mbox cmd response data (8 bytes)
3,531,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,979 UART: [rt]cmd =0x41545348, len=116
3,563,652 >>> mbox cmd response data (12 bytes)
3,563,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,722 >>> mbox cmd response: success
5,996,722 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,009,972 UART:
6,009,988 UART: Running Caliptra FMC ...
6,010,396 UART:
6,010,450 UART: [state] CFI Enabled
6,099,829 UART: [art] Extend RT PCRs Done
6,100,257 UART: [art] Lock RT PCRs Done
6,101,506 UART: [art] Populate DV Done
6,109,905 UART: [fht] FMC Alias Private Key: 7
6,110,979 UART: [art] Derive CDI
6,111,259 UART: [art] Store in in slot 0x4
6,196,802 UART: [art] Derive Key Pair
6,197,162 UART: [art] Store priv key in slot 0x5
6,210,484 UART: [art] Derive Key Pair - Done
6,225,418 UART: [art] Signing Cert with AUTHO
6,225,898 UART: RITY.KEYID = 7
6,241,010 UART: [art] Erasing AUTHORITY.KEYID = 7
6,241,775 UART: [art] PUB.X = 9EB08E07CB8A9CE306A18951424A5FAD2AEC5E689BD7DB0F54BDA25F6412194F6D92228D9B65C7A750E619A91CC12D41
6,248,548 UART: [art] PUB.Y = 9E35C065322B0002800CDB4672DF32ADE2F6AD90B9C236D5FE77C209C1B40A698A2F0B3D15527798804DDE70C2CF4E56
6,255,467 UART: [art] SIG.R = 239F74DB28EFBC24B8463D32630B783FA19B81746DF245AABDFA98BE16BAF9BED1410AFF4C819EAD6ABFDA001441DA4D
6,262,235 UART: [art] SIG.S = C6204152AF1759B5FEDAB6C3C556C9DEB481B884C6378CF7E082182DAB8937468B5B635BAB7EB54C94D56B65484FA4D6
6,286,848 UART: Caliptra RT
6,287,101 UART: [state] CFI Enabled
6,570,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,600,975 UART: [rt]cmd =0x41545348, len=116
6,602,442 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,174,770 ready_for_fw is high
1,174,770 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,242,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,620 >>> mbox cmd response: success
2,773,797 UART: [afmc] ++
2,773,965 UART: [afmc] CDI.KEYID = 6
2,774,328 UART: [afmc] SUBJECT.KEYID = 7
2,774,754 UART: [afmc] AUTHORITY.KEYID = 5
2,810,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,288 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,619 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,662 UART: [afmc] --
2,853,790 UART: [cold-reset] --
2,854,584 UART: [state] Locking Datavault
2,855,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,501 UART: [state] Locking ICCM
2,857,065 UART: [exit] Launching FMC @ 0x40000130
2,862,394 UART:
2,862,410 UART: Running Caliptra FMC ...
2,862,818 UART:
2,862,961 UART: [state] CFI Enabled
2,873,388 UART: [fht] FMC Alias Private Key: 7
2,981,675 UART: [art] Extend RT PCRs Done
2,982,103 UART: [art] Lock RT PCRs Done
2,983,513 UART: [art] Populate DV Done
2,991,956 UART: [fht] FMC Alias Private Key: 7
2,993,044 UART: [art] Derive CDI
2,993,324 UART: [art] Store in in slot 0x4
3,079,113 UART: [art] Derive Key Pair
3,079,473 UART: [art] Store priv key in slot 0x5
3,093,029 UART: [art] Derive Key Pair - Done
3,107,563 UART: [art] Signing Cert with AUTHO
3,108,043 UART: RITY.KEYID = 7
3,123,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,870 UART: [art] PUB.X = 1F05BAC8495408D10E07E93B14EEA8F014102451786E25164AE85BAA2DD346566D7D009074DAAF338844FC7135D9C64D
3,130,606 UART: [art] PUB.Y = D23BE5829B613DAB191741EF8173CA6078B5C2D9153EC5273A71F83AD1E752B8A7BF383995F1B4387F5AC626AFA0FA13
3,137,564 UART: [art] SIG.R = DFA588E7D554EE6A95CB0D20D8C5E41C050E4C56CE70FB3D240F9D81422F3B5666D7D92DF116D01226CB0F30F4FB9B64
3,144,333 UART: [art] SIG.S = 707E47335B1C624E0E136AEE65C7CE97F6D9814CAB2DEBC8EA8785240002E175EE7B3505EF6191226B3966AD94E69B35
3,168,369 UART: Caliptra RT
3,168,714 UART: [state] CFI Enabled
3,277,215 UART: [rt] RT listening for mailbox commands...
3,277,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,859 UART: [rt]cmd =0x41544d4e, len=14344
3,711,545 >>> mbox cmd response data (8 bytes)
3,711,546 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,573 UART: [rt]cmd =0x41545348, len=116
3,743,468 >>> mbox cmd response data (12 bytes)
3,743,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,258 UART:
3,744,274 UART: Running Caliptra ROM ...
3,744,682 UART:
3,744,824 UART: [state] CFI Enabled
3,747,378 UART: [state] LifecycleState = Unprovisioned
3,748,033 UART: [state] DebugLocked = No
3,748,531 UART: [state] WD Timer not started. Device not locked for debugging
3,749,833 UART: [kat] SHA2-256
4,553,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,557,512 UART: [kat] ++
4,557,664 UART: [kat] sha1
4,562,060 UART: [kat] SHA2-256
4,564,000 UART: [kat] SHA2-384
4,566,651 UART: [kat] SHA2-512-ACC
4,568,551 UART: [kat] ECC-384
4,578,132 UART: [kat] HMAC-384Kdf
4,582,862 UART: [kat] LMS
4,831,174 UART: [kat] --
4,831,842 UART: [update-reset] ++
6,144,903 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,145,878 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,295,702 >>> mbox cmd response: success
6,295,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,296,045 UART: [update-reset] Copying MAN_2 To MAN_1
6,304,059 UART: [update-reset Success] --
6,305,036 UART: [state] Locking Datavault
6,305,952 UART: [state] Locking PCR0, PCR1 and PCR31
6,306,556 UART: [state] Locking ICCM
6,307,032 UART: [exit] Launching FMC @ 0x40000130
6,312,361 UART:
6,312,377 UART: Running Caliptra FMC ...
6,312,785 UART:
6,312,928 UART: [state] CFI Enabled
6,402,155 UART: [art] Extend RT PCRs Done
6,402,583 UART: [art] Lock RT PCRs Done
6,404,180 UART: [art] Populate DV Done
6,412,291 UART: [fht] FMC Alias Private Key: 7
6,413,263 UART: [art] Derive CDI
6,413,543 UART: [art] Store in in slot 0x4
6,499,098 UART: [art] Derive Key Pair
6,499,458 UART: [art] Store priv key in slot 0x5
6,512,668 UART: [art] Derive Key Pair - Done
6,527,382 UART: [art] Signing Cert with AUTHO
6,527,862 UART: RITY.KEYID = 7
6,543,372 UART: [art] Erasing AUTHORITY.KEYID = 7
6,544,137 UART: [art] PUB.X = DE4793EB22E5FFB512842C5646DCD67C2824E06603E9AB5BD253195395509EED9FA72D39DD8A6B854F7DE86361356534
6,550,906 UART: [art] PUB.Y = BA5D321A6C35D8236E534EB6BDC4D8FF14E03D7CB6F02D231E91F963BE95AE575167E49DD36D38DA736B519FA8C38DF1
6,557,872 UART: [art] SIG.R = 288C241FF36B5D0F534DF0B5A93771274CD6BA43141FF7DFAA296A992997313E4B2308D2BC8E6BBEF628A8EB8AC78BD6
6,564,650 UART: [art] SIG.S = BFCB3743371FE11E186BF806EAD1510D0FF296F37DA05D8DD0D511EE33CECCC97383A4FE39F1C5951852025CA2F220DF
6,587,673 UART: Caliptra RT
6,588,018 UART: [state] CFI Enabled
6,873,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,904,060 UART: [rt]cmd =0x41545348, len=116
6,905,759 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,741 ready_for_fw is high
1,055,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,125 >>> mbox cmd response: success
2,681,959 UART:
2,681,975 UART: Running Caliptra FMC ...
2,682,383 UART:
2,682,526 UART: [state] CFI Enabled
2,693,321 UART: [fht] FMC Alias Private Key: 7
2,801,800 UART: [art] Extend RT PCRs Done
2,802,228 UART: [art] Lock RT PCRs Done
2,803,888 UART: [art] Populate DV Done
2,812,293 UART: [fht] FMC Alias Private Key: 7
2,813,423 UART: [art] Derive CDI
2,813,703 UART: [art] Store in in slot 0x4
2,899,394 UART: [art] Derive Key Pair
2,899,754 UART: [art] Store priv key in slot 0x5
2,912,944 UART: [art] Derive Key Pair - Done
2,927,655 UART: [art] Signing Cert with AUTHO
2,928,135 UART: RITY.KEYID = 7
2,943,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,088 UART: [art] PUB.X = CA45FC6E0FC43CE5C1432621ED2008F56937D62BA415C83DF7F51BBE688FF99A734B6ED22403B8E4BE09D139F162CDDC
2,950,862 UART: [art] PUB.Y = 2E12D5C3056A1861BBCA08D86EF82CF19DBBE9BE5E38358E185648A4120502E27E41E28154775B1082E29247D63229BA
2,957,798 UART: [art] SIG.R = DB7C719912450BBCF27F9B033E09C8A6B9AE8684C725C8049458FFF97D8275D7642C9AE210E140EDB94FF115FD9120CF
2,964,564 UART: [art] SIG.S = D7A08681B24ABC0D5BF03C7E55EAAA4934484FA0500F2EBC249D4DABE31A60A163864EFEA0E9D42C43020DF26E965DD0
2,987,755 UART: Caliptra RT
2,988,100 UART: [state] CFI Enabled
3,096,220 UART: [rt] RT listening for mailbox commands...
3,096,890 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,906 UART: [rt]cmd =0x41544d4e, len=14344
3,530,356 >>> mbox cmd response data (8 bytes)
3,530,357 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,366 UART: [rt]cmd =0x41545348, len=116
3,562,107 >>> mbox cmd response data (12 bytes)
3,562,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,086 >>> mbox cmd response: success
5,995,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,008,300 UART:
6,008,316 UART: Running Caliptra FMC ...
6,008,724 UART:
6,008,867 UART: [state] CFI Enabled
6,098,354 UART: [art] Extend RT PCRs Done
6,098,782 UART: [art] Lock RT PCRs Done
6,100,021 UART: [art] Populate DV Done
6,108,128 UART: [fht] FMC Alias Private Key: 7
6,109,288 UART: [art] Derive CDI
6,109,568 UART: [art] Store in in slot 0x4
6,195,533 UART: [art] Derive Key Pair
6,195,893 UART: [art] Store priv key in slot 0x5
6,209,441 UART: [art] Derive Key Pair - Done
6,224,235 UART: [art] Signing Cert with AUTHO
6,224,715 UART: RITY.KEYID = 7
6,239,555 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,320 UART: [art] PUB.X = 1020C56728C3CAE4668990B40BB8B8B3521A3C6CF1A84C5C49F06E09E3F934235F0096F1D56D9258B0FE3F26849A8465
6,247,060 UART: [art] PUB.Y = 3E5E0A528F73C8B7F5A471BD3A7CBB50471110AD68CC9E9818FC6BA094806509CA9FA1B6AF8CFE8CB7D928293B9102EC
6,254,017 UART: [art] SIG.R = 94F462217900341D0566962559B8ABBB1C67F6F09058CE84C2DDAC26305E4C6BE0388731F0D3B3D459839CBE6574F96D
6,260,760 UART: [art] SIG.S = E8D441D1B339FAA2F2ABC77A76487F55A9436EE5D2390D9603371E185D4F1B6B06C65A3718290C56030E8615BFCA2FCC
6,284,909 UART: Caliptra RT
6,285,254 UART: [state] CFI Enabled
6,568,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,599,673 UART: [rt]cmd =0x41545348, len=116
6,601,326 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,475,991 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,068 UART: [idev] ++
1,479,236 UART: [idev] CDI.KEYID = 6
1,479,596 UART: [idev] SUBJECT.KEYID = 7
1,480,020 UART: [idev] UDS.KEYID = 0
1,480,365 ready_for_fw is high
1,480,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,172 UART: [idev] Erasing UDS.KEYID = 0
1,504,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,260 UART: [idev] --
1,514,141 UART: [ldev] ++
1,514,309 UART: [ldev] CDI.KEYID = 6
1,514,672 UART: [ldev] SUBJECT.KEYID = 5
1,515,098 UART: [ldev] AUTHORITY.KEYID = 7
1,515,561 UART: [ldev] FE.KEYID = 1
1,520,773 UART: [ldev] Erasing FE.KEYID = 1
1,546,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,289 UART: [fwproc] Waiting for Commands...
1,585,910 UART: [fwproc] Received command 0x46574c44
1,586,701 UART: [fwproc] Received Image of size 114332 bytes
2,885,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,464 >>> mbox cmd response: success
3,078,634 UART: [afmc] ++
3,078,802 UART: [afmc] CDI.KEYID = 6
3,079,164 UART: [afmc] SUBJECT.KEYID = 7
3,079,589 UART: [afmc] AUTHORITY.KEYID = 5
3,114,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,371 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,061 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,816 UART: [afmc] --
3,157,870 UART: [cold-reset] --
3,158,534 UART: [state] Locking Datavault
3,159,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,313 UART: [state] Locking ICCM
3,160,747 UART: [exit] Launching FMC @ 0x40000130
3,166,076 UART:
3,166,092 UART: Running Caliptra FMC ...
3,166,500 UART:
3,166,554 UART: [state] CFI Enabled
3,176,803 UART: [fht] FMC Alias Private Key: 7
3,283,918 UART: [art] Extend RT PCRs Done
3,284,346 UART: [art] Lock RT PCRs Done
3,286,008 UART: [art] Populate DV Done
3,294,521 UART: [fht] FMC Alias Private Key: 7
3,295,611 UART: [art] Derive CDI
3,295,891 UART: [art] Store in in slot 0x4
3,381,514 UART: [art] Derive Key Pair
3,381,874 UART: [art] Store priv key in slot 0x5
3,395,142 UART: [art] Derive Key Pair - Done
3,409,809 UART: [art] Signing Cert with AUTHO
3,410,289 UART: RITY.KEYID = 7
3,425,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,900 UART: [art] PUB.X = 3B450279F71FFFE51F2E33B023FBC48EC322BBD5B168425579FB1F9B37EA40091D09E22A60973F106905FACC8EA6E7C8
3,432,668 UART: [art] PUB.Y = B075E5CEAAF27AA8C4E5EA6C34CDE1846DC57A71293DD7C87AAEF7CA78D603BDDC2C4D58BD185368918E66BC686C9B60
3,439,639 UART: [art] SIG.R = 244E63895D57B6670D8FE4C93664395AEC0FDF080C3DFCAE66D5D8A743ECF0D4747ADEBBCEDA492D36F4DE4C53E418D7
3,446,419 UART: [art] SIG.S = 6B2C432CC2F5AB6ECC8A5BDE22435C4FC5AFA9FFF9D2DBC582FD98D77C01184892F7D63D7DFEB91C8BB3A6F431C5B21B
3,470,155 UART: Caliptra RT
3,470,408 UART: [state] CFI Enabled
3,578,078 UART: [rt] RT listening for mailbox commands...
3,578,748 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,302 UART: [rt]cmd =0x41545348, len=116
3,611,145 >>> mbox cmd response data (12 bytes)
3,611,146 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,094 UART:
3,612,110 UART: Running Caliptra ROM ...
3,612,518 UART:
3,612,572 UART: [state] CFI Enabled
3,615,198 UART: [state] LifecycleState = Unprovisioned
3,615,853 UART: [state] DebugLocked = No
3,616,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,094 UART: [kat] SHA2-256
4,412,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,140 UART: [kat] ++
4,416,292 UART: [kat] sha1
4,420,612 UART: [kat] SHA2-256
4,422,550 UART: [kat] SHA2-384
4,425,195 UART: [kat] SHA2-512-ACC
4,427,095 UART: [kat] ECC-384
4,432,806 UART: [kat] HMAC-384Kdf
4,437,252 UART: [kat] LMS
5,005,448 UART: [kat] --
5,006,413 UART: [update-reset] ++
5,933,477 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,934,683 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,031,117 >>> mbox cmd response: success
6,031,117 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,031,404 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,418 UART: [update-reset Success] --
6,040,359 UART: [state] Locking Datavault
6,041,125 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,729 UART: [state] Locking ICCM
6,042,267 UART: [exit] Launching FMC @ 0x40000130
6,047,596 UART:
6,047,612 UART: Running Caliptra FMC ...
6,048,020 UART:
6,048,074 UART: [state] CFI Enabled
6,137,111 UART: [art] Extend RT PCRs Done
6,137,539 UART: [art] Lock RT PCRs Done
6,139,030 UART: [art] Populate DV Done
6,147,007 UART: [fht] FMC Alias Private Key: 7
6,147,997 UART: [art] Derive CDI
6,148,277 UART: [art] Store in in slot 0x4
6,234,098 UART: [art] Derive Key Pair
6,234,458 UART: [art] Store priv key in slot 0x5
6,247,220 UART: [art] Derive Key Pair - Done
6,262,030 UART: [art] Signing Cert with AUTHO
6,262,510 UART: RITY.KEYID = 7
6,277,390 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,155 UART: [art] PUB.X = 0D8D427EB624D3283CFF4BB63765ABE14CA812F398D1B71B868DC4B86A3A322631F5B779B0E3EB0030D459BFAE87C165
6,284,910 UART: [art] PUB.Y = 3D1DFC1FAD27800BA96F76AF08EAEECC324BCB75EBFA23BBB8A8B2B0EC2106A9E8CF239338FFBFB8026D1C92485FB28E
6,291,880 UART: [art] SIG.R = D01AC0B4BFF3EFA28BDBB0318937269D4A2608BF802D87D5F2EA793313F1F1689D67B0CBD8F4AE2BA318B59042C717D4
6,298,661 UART: [art] SIG.S = E62C320535EF5EA5601CC97C4080493D8E4449CEF7DB261C5340934F020A53BA02FDC2A9AB01ECFC2C8D7E5448076B80
6,322,202 UART: mbox::rt_entry...
6,322,574 UART: ____ _ _ _ ____ _____
6,323,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,324,158 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,324,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,325,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,326,462 UART: |_|
6,326,774 UART:
6,608,101 UART: [rt] Runtime listening for mailbox commands...
6,609,291 >>> mbox cmd response data (48 bytes)
6,609,292 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,612,075 >>> mbox cmd response data (48 bytes)
6,612,076 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,625,014 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,315 ready_for_fw is high
1,362,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,982 >>> mbox cmd response: success
2,986,914 UART:
2,986,930 UART: Running Caliptra FMC ...
2,987,338 UART:
2,987,392 UART: [state] CFI Enabled
2,997,795 UART: [fht] FMC Alias Private Key: 7
3,104,874 UART: [art] Extend RT PCRs Done
3,105,302 UART: [art] Lock RT PCRs Done
3,106,804 UART: [art] Populate DV Done
3,115,161 UART: [fht] FMC Alias Private Key: 7
3,116,279 UART: [art] Derive CDI
3,116,559 UART: [art] Store in in slot 0x4
3,202,262 UART: [art] Derive Key Pair
3,202,622 UART: [art] Store priv key in slot 0x5
3,215,774 UART: [art] Derive Key Pair - Done
3,230,391 UART: [art] Signing Cert with AUTHO
3,230,871 UART: RITY.KEYID = 7
3,245,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,494 UART: [art] PUB.X = 5BA8D3B62329176F3FC90F61FD6564FC5A7708BF8961408CCC9C9CE05235F40A0A5E10CA6A97CA05F5E27A8EC442FB29
3,253,261 UART: [art] PUB.Y = E240B0D1C74CC7679D6D07CF11F828C9BDC84C38DEB39A010D35D39324B6CE370AFC472A5F1DE13B42AC35E28DA08AAE
3,260,219 UART: [art] SIG.R = CE7505B05ADF431E5A927ADDEBA7F53CE18D8C929FAEDAF66DEA74A16CCD3F72A015DE69E2C3BF3030C4AD4FD6C44479
3,267,016 UART: [art] SIG.S = AD31E48A6735FCF92B681B53AD0F234F7C896937953010DFEE90D7960679C5ECCB6813970A5FD802D2AC8B19AABF28C0
3,291,103 UART: Caliptra RT
3,291,356 UART: [state] CFI Enabled
3,399,356 UART: [rt] RT listening for mailbox commands...
3,400,026 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,428 UART: [rt]cmd =0x41545348, len=116
3,432,207 >>> mbox cmd response data (12 bytes)
3,432,208 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,801 >>> mbox cmd response: success
5,733,801 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,746,966 UART:
5,746,982 UART: Running Caliptra FMC ...
5,747,390 UART:
5,747,444 UART: [state] CFI Enabled
5,836,187 UART: [art] Extend RT PCRs Done
5,836,615 UART: [art] Lock RT PCRs Done
5,838,028 UART: [art] Populate DV Done
5,845,963 UART: [fht] FMC Alias Private Key: 7
5,847,091 UART: [art] Derive CDI
5,847,371 UART: [art] Store in in slot 0x4
5,933,354 UART: [art] Derive Key Pair
5,933,714 UART: [art] Store priv key in slot 0x5
5,946,682 UART: [art] Derive Key Pair - Done
5,961,383 UART: [art] Signing Cert with AUTHO
5,961,863 UART: RITY.KEYID = 7
5,976,891 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,656 UART: [art] PUB.X = CF694E84AB895D45FCA1BB9D767F3ABA2CC7DEA17BD0FC1DA1F858ED171FB070783BAF98DAF7F9033FB04A49795205C6
5,984,444 UART: [art] PUB.Y = 6F8D4CDE4C8A72FFDF6AAC1CEBBCD3D467305CBDF76BB1BB93946E5C9D00AA8E1C14A9300DE62DEA5CE25D34FD90D0A6
5,991,405 UART: [art] SIG.R = 87C7D1F6561F9665BDF1126CBBA9215457B8ACA0C72E4B1E6C249CBF2230F108F2065FA130955FCBD4DBFAE9A5435662
5,998,181 UART: [art] SIG.S = 636178C570C955AFD4CE5B2C18B9D41749861652F74824BA28560802430F1BCF17FA78BD30D17ECDB7A5A2C496B3A643
6,021,789 UART: mbox::rt_entry...
6,022,161 UART: ____ _ _ _ ____ _____
6,022,945 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,745 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,513 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,281 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,049 UART: |_|
6,026,361 UART:
6,305,941 UART: [rt] Runtime listening for mailbox commands...
6,307,131 >>> mbox cmd response data (48 bytes)
6,307,132 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,309,915 >>> mbox cmd response data (48 bytes)
6,309,916 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,322,854 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,591 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,282 UART: [cold-reset] ++
1,476,646 UART: [fht] Storing FHT @ 0x50003400
1,479,251 UART: [idev] ++
1,479,419 UART: [idev] CDI.KEYID = 6
1,479,779 UART: [idev] SUBJECT.KEYID = 7
1,480,203 UART: [idev] UDS.KEYID = 0
1,480,548 ready_for_fw is high
1,480,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,889 UART: [idev] Erasing UDS.KEYID = 0
1,505,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,667 UART: [idev] --
1,514,736 UART: [ldev] ++
1,514,904 UART: [ldev] CDI.KEYID = 6
1,515,267 UART: [ldev] SUBJECT.KEYID = 5
1,515,693 UART: [ldev] AUTHORITY.KEYID = 7
1,516,156 UART: [ldev] FE.KEYID = 1
1,521,704 UART: [ldev] Erasing FE.KEYID = 1
1,547,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,550 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114332 bytes
2,886,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,037 >>> mbox cmd response: success
3,080,097 UART: [afmc] ++
3,080,265 UART: [afmc] CDI.KEYID = 6
3,080,627 UART: [afmc] SUBJECT.KEYID = 7
3,081,052 UART: [afmc] AUTHORITY.KEYID = 5
3,116,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,198 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,888 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,663 UART: [afmc] --
3,159,609 UART: [cold-reset] --
3,160,447 UART: [state] Locking Datavault
3,161,614 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,218 UART: [state] Locking ICCM
3,162,876 UART: [exit] Launching FMC @ 0x40000130
3,168,205 UART:
3,168,221 UART: Running Caliptra FMC ...
3,168,629 UART:
3,168,772 UART: [state] CFI Enabled
3,178,865 UART: [fht] FMC Alias Private Key: 7
3,287,258 UART: [art] Extend RT PCRs Done
3,287,686 UART: [art] Lock RT PCRs Done
3,289,198 UART: [art] Populate DV Done
3,297,363 UART: [fht] FMC Alias Private Key: 7
3,298,461 UART: [art] Derive CDI
3,298,741 UART: [art] Store in in slot 0x4
3,384,124 UART: [art] Derive Key Pair
3,384,484 UART: [art] Store priv key in slot 0x5
3,397,578 UART: [art] Derive Key Pair - Done
3,412,650 UART: [art] Signing Cert with AUTHO
3,413,130 UART: RITY.KEYID = 7
3,428,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,139 UART: [art] PUB.X = 9B4E54DA30DCD53A8914D978D620C23B67B7B1EACF74F1804C895059FCA73099EFCE8F518B3FB2B6258E878F1ACB1F0D
3,435,922 UART: [art] PUB.Y = F565EE6401182CCE03C29F47FCFDFB3681A0B3EBE5D68190977B4F0E1EEF7E7D3131F21DA26D1667F23C09FF5C89376E
3,442,874 UART: [art] SIG.R = 36B99C1DF6FA12C48310E87F2404DBEF6AEC7401427CFD3933AD1B901390547710B77C6879F3A78444F6A439631505B6
3,449,631 UART: [art] SIG.S = F4C7356B8ED93B9D50EF3088455F51AD08E8233F4305D19F02CEF6786C01946F223FF6B8248EB06935D0C7F10CBC3EE2
3,473,477 UART: Caliptra RT
3,473,822 UART: [state] CFI Enabled
3,582,523 UART: [rt] RT listening for mailbox commands...
3,583,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,539 UART: [rt]cmd =0x41545348, len=116
3,615,382 >>> mbox cmd response data (12 bytes)
3,615,383 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,327 UART:
3,616,343 UART: Running Caliptra ROM ...
3,616,751 UART:
3,616,892 UART: [state] CFI Enabled
3,619,492 UART: [state] LifecycleState = Unprovisioned
3,620,147 UART: [state] DebugLocked = No
3,620,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,276 UART: [kat] SHA2-256
4,416,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,322 UART: [kat] ++
4,420,474 UART: [kat] sha1
4,424,704 UART: [kat] SHA2-256
4,426,642 UART: [kat] SHA2-384
4,429,405 UART: [kat] SHA2-512-ACC
4,431,305 UART: [kat] ECC-384
4,436,770 UART: [kat] HMAC-384Kdf
4,441,546 UART: [kat] LMS
5,009,742 UART: [kat] --
5,010,543 UART: [update-reset] ++
5,937,131 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,201 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,034,635 >>> mbox cmd response: success
6,034,635 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,034,912 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,926 UART: [update-reset Success] --
6,043,909 UART: [state] Locking Datavault
6,044,625 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,229 UART: [state] Locking ICCM
6,045,729 UART: [exit] Launching FMC @ 0x40000130
6,051,058 UART:
6,051,074 UART: Running Caliptra FMC ...
6,051,482 UART:
6,051,625 UART: [state] CFI Enabled
6,140,804 UART: [art] Extend RT PCRs Done
6,141,232 UART: [art] Lock RT PCRs Done
6,142,455 UART: [art] Populate DV Done
6,150,834 UART: [fht] FMC Alias Private Key: 7
6,151,926 UART: [art] Derive CDI
6,152,206 UART: [art] Store in in slot 0x4
6,237,805 UART: [art] Derive Key Pair
6,238,165 UART: [art] Store priv key in slot 0x5
6,251,549 UART: [art] Derive Key Pair - Done
6,266,151 UART: [art] Signing Cert with AUTHO
6,266,631 UART: RITY.KEYID = 7
6,282,269 UART: [art] Erasing AUTHORITY.KEYID = 7
6,283,034 UART: [art] PUB.X = 4C49FD15A34CA9F7EEA39BE52AD76129BFF4C2CFFCCD3B152EDD733FD8142D329015CB4C3B585E48309DAF0ADDFF97A6
6,289,829 UART: [art] PUB.Y = E07027950F990692D89E433860DFA4BDEBBD534C8001A29E59BFF334E46217CFD690CDC045586F52251EBAFCB0E656D9
6,296,778 UART: [art] SIG.R = A51CB228500BED5910A3C6F650EA37674BDFF6C3E39DC7DC5CA94366E9956155E954AA3A2E3E1F228E1DD837FCD25E38
6,303,559 UART: [art] SIG.S = 30188493E4AAFECBE5AB955B4F857F578096C63BE00F1B52E78D5E78941BDE39D6E94CB016AAA816E26D88D343067088
6,327,484 UART: mbox::rt_entry...
6,327,856 UART: ____ _ _ _ ____ _____
6,328,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,329,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,330,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,744 UART: |_|
6,332,056 UART:
6,616,724 UART: [rt] Runtime listening for mailbox commands...
6,617,914 >>> mbox cmd response data (48 bytes)
6,617,915 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,620,698 >>> mbox cmd response data (48 bytes)
6,620,699 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,633,637 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,092 ready_for_fw is high
1,363,092 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,471 >>> mbox cmd response: success
2,989,763 UART:
2,989,779 UART: Running Caliptra FMC ...
2,990,187 UART:
2,990,330 UART: [state] CFI Enabled
3,000,975 UART: [fht] FMC Alias Private Key: 7
3,109,878 UART: [art] Extend RT PCRs Done
3,110,306 UART: [art] Lock RT PCRs Done
3,111,828 UART: [art] Populate DV Done
3,119,933 UART: [fht] FMC Alias Private Key: 7
3,121,029 UART: [art] Derive CDI
3,121,309 UART: [art] Store in in slot 0x4
3,207,148 UART: [art] Derive Key Pair
3,207,508 UART: [art] Store priv key in slot 0x5
3,220,974 UART: [art] Derive Key Pair - Done
3,236,123 UART: [art] Signing Cert with AUTHO
3,236,603 UART: RITY.KEYID = 7
3,251,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,312 UART: [art] PUB.X = 140472FFE7BFD653E94335072FF795893BF159C25CC6F2F79142D8ECBB0A01FE740247B4DD38C460AE4778DAF42EF19B
3,259,077 UART: [art] PUB.Y = 8660F95E9E3E1808AC3127AEE66BD8BEE15582DD435237679DEAFE4B779B41D8FE63A0A4AAA8E52983E03329C6E61F4C
3,266,036 UART: [art] SIG.R = 1D28AD2B12C3BD6FDA74CBF7ABA7191AF31774337C0E4997159CED713860BEDCEEB63F2DB756F1CCC9A7C56F0F56C48A
3,272,824 UART: [art] SIG.S = 2B02688F8909C057A22F3A7778EE01CE57F53038E05C58E3A8D8EF972145D14FB5DB7BB1887D38242F5FF61D4563439B
3,296,496 UART: Caliptra RT
3,296,841 UART: [state] CFI Enabled
3,405,729 UART: [rt] RT listening for mailbox commands...
3,406,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,215 UART: [rt]cmd =0x41545348, len=116
3,438,982 >>> mbox cmd response data (12 bytes)
3,438,983 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,739,135 >>> mbox cmd response: success
5,739,135 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,752,786 UART:
5,752,802 UART: Running Caliptra FMC ...
5,753,210 UART:
5,753,353 UART: [state] CFI Enabled
5,841,994 UART: [art] Extend RT PCRs Done
5,842,422 UART: [art] Lock RT PCRs Done
5,843,909 UART: [art] Populate DV Done
5,852,372 UART: [fht] FMC Alias Private Key: 7
5,853,372 UART: [art] Derive CDI
5,853,652 UART: [art] Store in in slot 0x4
5,939,441 UART: [art] Derive Key Pair
5,939,801 UART: [art] Store priv key in slot 0x5
5,952,957 UART: [art] Derive Key Pair - Done
5,967,957 UART: [art] Signing Cert with AUTHO
5,968,437 UART: RITY.KEYID = 7
5,983,981 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,746 UART: [art] PUB.X = 1CDB49037F311A09E06AA72C14FF30E1F2B949A2A8C5D4D6CEB0B314614172C408F9D5ADFF4B1BF813BC623FD35DBE5D
5,991,527 UART: [art] PUB.Y = 31473C9B215080C037A1D0A6D37CF2F1804CD18CD016F9B13EA79F6588742B43E92485D325EC7699DD7EAE825C28093D
5,998,474 UART: [art] SIG.R = 83452365F18B456F8007B9449772695AAA03C54DF039245420AB2B7F61E28E97B3FBE283A14E67D09B89073ED27763C1
6,005,227 UART: [art] SIG.S = CB6515B115367402F7C7BED5E0D2289E676D3273750A5F6E3BC2A559A56EE13AE4489FA12457D8DF7654AF51C7BC5B3C
6,028,526 UART: mbox::rt_entry...
6,028,898 UART: ____ _ _ _ ____ _____
6,029,682 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,482 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,031,250 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,032,018 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,786 UART: |_|
6,033,098 UART:
6,315,771 UART: [rt] Runtime listening for mailbox commands...
6,316,961 >>> mbox cmd response data (48 bytes)
6,316,962 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,319,745 >>> mbox cmd response data (48 bytes)
6,319,746 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,332,684 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
892,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,111 UART: [kat] ++
897,263 UART: [kat] sha1
901,683 UART: [kat] SHA2-256
903,623 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
918,126 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,835 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,175,136 UART: [idev] ++
1,175,304 UART: [idev] CDI.KEYID = 6
1,175,664 UART: [idev] SUBJECT.KEYID = 7
1,176,088 UART: [idev] UDS.KEYID = 0
1,176,433 ready_for_fw is high
1,176,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,201,697 UART: [idev] Sha1 KeyId Algorithm
1,210,075 UART: [idev] --
1,211,201 UART: [ldev] ++
1,211,369 UART: [ldev] CDI.KEYID = 6
1,211,732 UART: [ldev] SUBJECT.KEYID = 5
1,212,158 UART: [ldev] AUTHORITY.KEYID = 7
1,212,621 UART: [ldev] FE.KEYID = 1
1,217,633 UART: [ldev] Erasing FE.KEYID = 1
1,244,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,769 UART: [ldev] --
1,283,232 UART: [fwproc] Wait for Commands...
1,283,934 UART: [fwproc] Recv command 0x46574c44
1,284,662 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,417 >>> mbox cmd response: success
2,775,439 UART: [afmc] ++
2,775,607 UART: [afmc] CDI.KEYID = 6
2,775,969 UART: [afmc] SUBJECT.KEYID = 7
2,776,394 UART: [afmc] AUTHORITY.KEYID = 5
2,812,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,148 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,062 UART: [afmc] --
2,856,130 UART: [cold-reset] --
2,856,986 UART: [state] Locking Datavault
2,858,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,049 UART: [state] Locking ICCM
2,859,553 UART: [exit] Launching FMC @ 0x40000130
2,864,882 UART:
2,864,898 UART: Running Caliptra FMC ...
2,865,306 UART:
2,865,360 UART: [state] CFI Enabled
2,875,567 UART: [fht] FMC Alias Private Key: 7
2,983,304 UART: [art] Extend RT PCRs Done
2,983,732 UART: [art] Lock RT PCRs Done
2,985,286 UART: [art] Populate DV Done
2,993,513 UART: [fht] FMC Alias Private Key: 7
2,994,569 UART: [art] Derive CDI
2,994,849 UART: [art] Store in in slot 0x4
3,080,116 UART: [art] Derive Key Pair
3,080,476 UART: [art] Store priv key in slot 0x5
3,093,090 UART: [art] Derive Key Pair - Done
3,108,067 UART: [art] Signing Cert with AUTHO
3,108,547 UART: RITY.KEYID = 7
3,123,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,232 UART: [art] PUB.X = 8E2CA9B438B377F50EE5B8D1D5B6ED3E08FB888041329F02A6B22EBFEE0E6CE987F6D05E2B422E23797D6AF5E57D3FC1
3,131,008 UART: [art] PUB.Y = F86B7A665253769A89594BAB7365AC2EE862B8E20B2E46A8A3AB56740B36BD467B291FC4E69729143F52AFC09A4A3AFE
3,137,960 UART: [art] SIG.R = 8744502FDB32B857EBE3F125BE39317CE8DFEFC0F58D06E85480DEDBDA619C73CBA1D9F6FA8230052EF31366E7E13DEB
3,144,744 UART: [art] SIG.S = 0EC2536D5CC63ADF7622F47E696D57D0962483C51E5346F2C5CEA3CAAAFFEE0595EE7022CEC905724C36A9AF51ACC874
3,168,562 UART: Caliptra RT
3,168,815 UART: [state] CFI Enabled
3,276,842 UART: [rt] RT listening for mailbox commands...
3,277,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,310 UART: [rt]cmd =0x41545348, len=116
3,310,323 >>> mbox cmd response data (12 bytes)
3,310,324 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,345 UART:
3,311,361 UART: Running Caliptra ROM ...
3,311,769 UART:
3,311,824 UART: [state] CFI Enabled
3,314,902 UART: [state] LifecycleState = Unprovisioned
3,315,557 UART: [state] DebugLocked = No
3,316,081 UART: [state] WD Timer not started. Device not locked for debugging
3,317,283 UART: [kat] SHA2-256
4,122,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,058 UART: [kat] ++
4,127,210 UART: [kat] sha1
4,131,520 UART: [kat] SHA2-256
4,133,460 UART: [kat] SHA2-384
4,136,195 UART: [kat] SHA2-512-ACC
4,138,095 UART: [kat] ECC-384
4,147,858 UART: [kat] HMAC-384Kdf
4,152,332 UART: [kat] LMS
4,400,660 UART: [kat] --
4,401,766 UART: [update-reset] ++
5,307,376 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,308,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,404,751 >>> mbox cmd response: success
5,404,751 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,404,924 UART: [update-reset] Copying MAN_2 To MAN_1
5,412,938 UART: [update-reset Success] --
5,413,753 UART: [state] Locking Datavault
5,414,373 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,977 UART: [state] Locking ICCM
5,415,503 UART: [exit] Launching FMC @ 0x40000130
5,420,832 UART:
5,420,848 UART: Running Caliptra FMC ...
5,421,256 UART:
5,421,310 UART: [state] CFI Enabled
5,510,391 UART: [art] Extend RT PCRs Done
5,510,819 UART: [art] Lock RT PCRs Done
5,511,996 UART: [art] Populate DV Done
5,520,261 UART: [fht] FMC Alias Private Key: 7
5,521,323 UART: [art] Derive CDI
5,521,603 UART: [art] Store in in slot 0x4
5,607,148 UART: [art] Derive Key Pair
5,607,508 UART: [art] Store priv key in slot 0x5
5,620,732 UART: [art] Derive Key Pair - Done
5,635,757 UART: [art] Signing Cert with AUTHO
5,636,237 UART: RITY.KEYID = 7
5,651,263 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,028 UART: [art] PUB.X = 0DBEF9B408B179ACCDAFB86C40E66F0E61D8BBD3707D0891AEAD56845CC16B1C845347FF57FFD045EC7CE2E33C1A945D
5,658,810 UART: [art] PUB.Y = 6F2ED1EC07ECEFF87CC62AC103FA6D6C344211167E7FBCA7D6F163C263B932603668D8FF21B8AAD4EC09B32F3AD47A56
5,665,771 UART: [art] SIG.R = 9F4D8F28540CE25F001411D3A344A20E8B9BAE4F9C697B94F85E42030EAE53DADC5650555F7089EA2E4E810DEAECC940
5,672,516 UART: [art] SIG.S = 194469C4C1F53EF51E6A5F0F10A4DDC5A911736D03A4B4E139D476EEA28302DD614C6A12BF7EAAFC29E84411D1000E40
5,696,233 UART: mbox::rt_entry...
5,696,605 UART: ____ _ _ _ ____ _____
5,697,389 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,189 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,725 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,493 UART: |_|
5,700,805 UART:
5,981,441 UART: [rt] Runtime listening for mailbox commands...
5,982,631 >>> mbox cmd response data (48 bytes)
5,982,632 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,985,415 >>> mbox cmd response data (48 bytes)
5,985,416 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,998,354 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,892 >>> mbox cmd response: success
2,688,176 UART:
2,688,192 UART: Running Caliptra FMC ...
2,688,600 UART:
2,688,654 UART: [state] CFI Enabled
2,699,445 UART: [fht] FMC Alias Private Key: 7
2,807,688 UART: [art] Extend RT PCRs Done
2,808,116 UART: [art] Lock RT PCRs Done
2,809,802 UART: [art] Populate DV Done
2,818,213 UART: [fht] FMC Alias Private Key: 7
2,819,359 UART: [art] Derive CDI
2,819,639 UART: [art] Store in in slot 0x4
2,905,370 UART: [art] Derive Key Pair
2,905,730 UART: [art] Store priv key in slot 0x5
2,919,102 UART: [art] Derive Key Pair - Done
2,933,774 UART: [art] Signing Cert with AUTHO
2,934,254 UART: RITY.KEYID = 7
2,949,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,193 UART: [art] PUB.X = 27E443DB66B8C4EB9B735ED8A7239B6C97A413624FDB1C30D70D76F0E6A3BCD4CDB57EA5CB80C00CD2EE034A7D224E8C
2,956,976 UART: [art] PUB.Y = 8113D2CD1B86E6CCCF5C0AF21C229E13AE7B94078446AD0376CC26CDCD37E8210825C1987600F63D9C6412F33E53A34E
2,963,898 UART: [art] SIG.R = 1854F3CA4B35F90B998D2A91E239DDD0E3A08CA31E12F2436FF8120FB6872F9A85C3B57E4EDEC3228152C626CE365683
2,970,668 UART: [art] SIG.S = CF9D2E8B76710294FD4BEE7C69C341C68EFB6685F69FB1B98308251E4228D3B343048E54782E5C543C868FA304BDF5DE
2,994,539 UART: Caliptra RT
2,994,792 UART: [state] CFI Enabled
3,101,881 UART: [rt] RT listening for mailbox commands...
3,102,551 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,961 UART: [rt]cmd =0x41545348, len=116
3,134,678 >>> mbox cmd response data (12 bytes)
3,134,679 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,401 >>> mbox cmd response: success
5,110,401 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,123,921 UART:
5,123,937 UART: Running Caliptra FMC ...
5,124,345 UART:
5,124,399 UART: [state] CFI Enabled
5,213,242 UART: [art] Extend RT PCRs Done
5,213,670 UART: [art] Lock RT PCRs Done
5,215,009 UART: [art] Populate DV Done
5,223,204 UART: [fht] FMC Alias Private Key: 7
5,224,198 UART: [art] Derive CDI
5,224,478 UART: [art] Store in in slot 0x4
5,310,293 UART: [art] Derive Key Pair
5,310,653 UART: [art] Store priv key in slot 0x5
5,323,759 UART: [art] Derive Key Pair - Done
5,338,292 UART: [art] Signing Cert with AUTHO
5,338,772 UART: RITY.KEYID = 7
5,353,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,291 UART: [art] PUB.X = FBBBAC9DFC60AE5C93106259787E6DF4C6F87C43B9771AF9A2D1152F9BC9A5432DC0BCE5EA3BD3F7C2C366738C2E95C4
5,361,083 UART: [art] PUB.Y = 673BD9ED89D659885B9DBA406C3F5547D591696715EC8F756D6961055FAB199A0AC529B5F01C6C4F4E45F5AC7EECEAAF
5,368,041 UART: [art] SIG.R = B2F7D794B9C05F88D1F335053F909F82AD8F0C91AFD35E47D98FE1E7D9063858654DFD987169231827B731DA54D163F7
5,374,802 UART: [art] SIG.S = F3472CF27906393ABACBD600E995EF681088034DCB76F47987736A3BAF4766BD422279C5B87BE39AA51A1BF6300E3FF9
5,398,408 UART: mbox::rt_entry...
5,398,780 UART: ____ _ _ _ ____ _____
5,399,564 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,668 UART: |_|
5,402,980 UART:
5,681,735 UART: [rt] Runtime listening for mailbox commands...
5,682,925 >>> mbox cmd response data (48 bytes)
5,682,926 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,685,709 >>> mbox cmd response data (48 bytes)
5,685,710 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,698,648 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,718 UART: [kat] SHA2-256
903,658 UART: [kat] SHA2-384
906,277 UART: [kat] SHA2-512-ACC
908,178 UART: [kat] ECC-384
918,107 UART: [kat] HMAC-384Kdf
922,653 UART: [kat] LMS
1,170,981 UART: [kat] --
1,171,836 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,175,051 UART: [idev] ++
1,175,219 UART: [idev] CDI.KEYID = 6
1,175,579 UART: [idev] SUBJECT.KEYID = 7
1,176,003 UART: [idev] UDS.KEYID = 0
1,176,348 ready_for_fw is high
1,176,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,299 UART: [idev] Erasing UDS.KEYID = 0
1,201,590 UART: [idev] Sha1 KeyId Algorithm
1,210,018 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,468 UART: [ldev] Erasing FE.KEYID = 1
1,244,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,698 UART: [ldev] --
1,283,149 UART: [fwproc] Wait for Commands...
1,283,909 UART: [fwproc] Recv command 0x46574c44
1,284,637 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,414 >>> mbox cmd response: success
2,774,588 UART: [afmc] ++
2,774,756 UART: [afmc] CDI.KEYID = 6
2,775,118 UART: [afmc] SUBJECT.KEYID = 7
2,775,543 UART: [afmc] AUTHORITY.KEYID = 5
2,810,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,851 UART: [afmc] --
2,853,773 UART: [cold-reset] --
2,854,559 UART: [state] Locking Datavault
2,855,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,298 UART: [state] Locking ICCM
2,856,916 UART: [exit] Launching FMC @ 0x40000130
2,862,245 UART:
2,862,261 UART: Running Caliptra FMC ...
2,862,669 UART:
2,862,812 UART: [state] CFI Enabled
2,873,329 UART: [fht] FMC Alias Private Key: 7
2,981,500 UART: [art] Extend RT PCRs Done
2,981,928 UART: [art] Lock RT PCRs Done
2,983,082 UART: [art] Populate DV Done
2,991,059 UART: [fht] FMC Alias Private Key: 7
2,992,027 UART: [art] Derive CDI
2,992,307 UART: [art] Store in in slot 0x4
3,078,138 UART: [art] Derive Key Pair
3,078,498 UART: [art] Store priv key in slot 0x5
3,091,452 UART: [art] Derive Key Pair - Done
3,106,419 UART: [art] Signing Cert with AUTHO
3,106,899 UART: RITY.KEYID = 7
3,122,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,140 UART: [art] PUB.X = 89BDDB9054578AAA042E7B737B90DA9088536A2EEA791CEBE879470AEC7FB55A53123CAA12FEA0BBD8A0DDF37242358F
3,129,922 UART: [art] PUB.Y = 270E414331513334406071FB1291F6588F7AE4FB8A9C1DB9A7012D887CDA2ECDFBDB248D4CCE58B14C20A3A9DC502203
3,136,871 UART: [art] SIG.R = 9D03A0F66381B4BE186A43B57319E26237B99F33507F67EEE9DC024EB1F2D7A409EEAB70511A1B8C036A44AA4B9A8E20
3,143,637 UART: [art] SIG.S = B84550521165951CBCFA1B7362C13631DF6BD969897EEF7AFC6C7EDFF7D04117A7245E0736D3705DDA67B721D55D66F6
3,167,555 UART: Caliptra RT
3,167,900 UART: [state] CFI Enabled
3,276,376 UART: [rt] RT listening for mailbox commands...
3,277,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,370 UART: [rt]cmd =0x41545348, len=116
3,309,181 >>> mbox cmd response data (12 bytes)
3,309,182 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,899 UART:
3,309,915 UART: Running Caliptra ROM ...
3,310,323 UART:
3,310,465 UART: [state] CFI Enabled
3,313,191 UART: [state] LifecycleState = Unprovisioned
3,313,846 UART: [state] DebugLocked = No
3,314,404 UART: [state] WD Timer not started. Device not locked for debugging
3,315,726 UART: [kat] SHA2-256
4,121,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,501 UART: [kat] ++
4,125,653 UART: [kat] sha1
4,129,791 UART: [kat] SHA2-256
4,131,731 UART: [kat] SHA2-384
4,134,512 UART: [kat] SHA2-512-ACC
4,136,412 UART: [kat] ECC-384
4,146,143 UART: [kat] HMAC-384Kdf
4,150,591 UART: [kat] LMS
4,398,919 UART: [kat] --
4,399,877 UART: [update-reset] ++
5,303,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,857 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,239 >>> mbox cmd response: success
5,401,239 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,401,580 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,594 UART: [update-reset Success] --
5,410,797 UART: [state] Locking Datavault
5,411,623 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,227 UART: [state] Locking ICCM
5,412,739 UART: [exit] Launching FMC @ 0x40000130
5,418,068 UART:
5,418,084 UART: Running Caliptra FMC ...
5,418,492 UART:
5,418,635 UART: [state] CFI Enabled
5,508,240 UART: [art] Extend RT PCRs Done
5,508,668 UART: [art] Lock RT PCRs Done
5,509,797 UART: [art] Populate DV Done
5,517,912 UART: [fht] FMC Alias Private Key: 7
5,519,082 UART: [art] Derive CDI
5,519,362 UART: [art] Store in in slot 0x4
5,605,169 UART: [art] Derive Key Pair
5,605,529 UART: [art] Store priv key in slot 0x5
5,618,875 UART: [art] Derive Key Pair - Done
5,633,697 UART: [art] Signing Cert with AUTHO
5,634,177 UART: RITY.KEYID = 7
5,649,387 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,152 UART: [art] PUB.X = AE072A0190DE73018AD719DA88EC63C33FE04AFB7B5AAE4DB2EF093CC084B7D5593EE8899E9E5BD4549D9E9679856C8A
5,656,926 UART: [art] PUB.Y = 401A8F0FB448527CFDEDB9C60E2A3AF76E7D21650B7C6F279439EB055BEA140ABC0F274F18602121D0C9F2EED302E751
5,663,867 UART: [art] SIG.R = FF710E890EB2F383F9AEA6CADEDFCCB1801678D86C665D9C510258B29CB56427D5420A77F2236D7C097F1B23029F39A9
5,670,627 UART: [art] SIG.S = F61E49BB4F6A5206CE633C7D072A8CCF29F7040EFFF41B2FFE9B75397029D03C618DEA8C83E34D977766EB141FB535CE
5,694,436 UART: mbox::rt_entry...
5,694,808 UART: ____ _ _ _ ____ _____
5,695,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,696,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,160 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,697,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,698,696 UART: |_|
5,699,008 UART:
5,984,621 UART: [rt] Runtime listening for mailbox commands...
5,985,811 >>> mbox cmd response data (48 bytes)
5,985,812 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,988,595 >>> mbox cmd response data (48 bytes)
5,988,596 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,001,534 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,710 ready_for_fw is high
1,060,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,391 >>> mbox cmd response: success
2,689,373 UART:
2,689,389 UART: Running Caliptra FMC ...
2,689,797 UART:
2,689,940 UART: [state] CFI Enabled
2,700,983 UART: [fht] FMC Alias Private Key: 7
2,808,884 UART: [art] Extend RT PCRs Done
2,809,312 UART: [art] Lock RT PCRs Done
2,811,114 UART: [art] Populate DV Done
2,819,229 UART: [fht] FMC Alias Private Key: 7
2,820,407 UART: [art] Derive CDI
2,820,687 UART: [art] Store in in slot 0x4
2,906,572 UART: [art] Derive Key Pair
2,906,932 UART: [art] Store priv key in slot 0x5
2,920,480 UART: [art] Derive Key Pair - Done
2,935,417 UART: [art] Signing Cert with AUTHO
2,935,897 UART: RITY.KEYID = 7
2,951,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,254 UART: [art] PUB.X = E54EB252E24441FEE959C4E96B39319551F44A88D34025D643EB2853D034A741D5AA0CC978824BC7B7EF227E25227EBE
2,959,023 UART: [art] PUB.Y = 05E3C2CA49A588895DA8C4B08FF8C17AA6A389A8D92F432F2EAED2316A5BF6684A327A0E8F97FB336748E6C883BE79A8
2,965,979 UART: [art] SIG.R = B38A6971532A70CA7E80E14E3C866F53D461A5EDA656AB6FACBBE81A70C23BF04CA73DE0078113F2C37ABBE7D67D6935
2,972,762 UART: [art] SIG.S = EECD99B4754905164642299B44476F080CF7F07AFF6756DC4CBFA50EF56989E40D5441F1C8BB0E9B5D081E792003395A
2,996,735 UART: Caliptra RT
2,997,080 UART: [state] CFI Enabled
3,105,254 UART: [rt] RT listening for mailbox commands...
3,105,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,602 UART: [rt]cmd =0x41545348, len=116
3,138,345 >>> mbox cmd response data (12 bytes)
3,138,346 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,113,733 >>> mbox cmd response: success
5,113,733 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,093 UART:
5,127,109 UART: Running Caliptra FMC ...
5,127,517 UART:
5,127,660 UART: [state] CFI Enabled
5,216,809 UART: [art] Extend RT PCRs Done
5,217,237 UART: [art] Lock RT PCRs Done
5,218,636 UART: [art] Populate DV Done
5,226,987 UART: [fht] FMC Alias Private Key: 7
5,228,149 UART: [art] Derive CDI
5,228,429 UART: [art] Store in in slot 0x4
5,314,228 UART: [art] Derive Key Pair
5,314,588 UART: [art] Store priv key in slot 0x5
5,327,864 UART: [art] Derive Key Pair - Done
5,342,467 UART: [art] Signing Cert with AUTHO
5,342,947 UART: RITY.KEYID = 7
5,358,307 UART: [art] Erasing AUTHORITY.KEYID = 7
5,359,072 UART: [art] PUB.X = 7440A7D17FC5FB864CA768137A5FAC94C273F2A838C64DF8A8AD5696AE8CBBF0AEBE2CF021D22AC8B3D18FB4E5B4D043
5,365,866 UART: [art] PUB.Y = BC1A385572DAD30CDB4DE218985A6F81CCD584A22BC545803EC1FFCC9737C5A454FD34B46446D66EEACC79013DCB403E
5,372,828 UART: [art] SIG.R = FABEAE563F64C3BCABF9343CE67537BC14B4F39F507BE6B8F7A16185E24EC8C67738FB3408680B0CF3777F8E490AEA1E
5,379,604 UART: [art] SIG.S = EBD2CBE36B3C79CC11B79D7E93557E2568AB3454FFD102FEB9AADABD74080D8255764330C374E793B051B37C7C1585C3
5,403,050 UART: mbox::rt_entry...
5,403,422 UART: ____ _ _ _ ____ _____
5,404,206 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,405,006 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,405,774 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,406,542 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,407,310 UART: |_|
5,407,622 UART:
5,687,921 UART: [rt] Runtime listening for mailbox commands...
5,689,111 >>> mbox cmd response data (48 bytes)
5,689,112 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,691,895 >>> mbox cmd response data (48 bytes)
5,691,896 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,704,834 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
920,834 UART: [kat] LMS
1,169,146 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 ready_for_fw is high
1,174,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,241,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,780 UART: [ldev] --
1,281,078 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,731 >>> mbox cmd response: success
2,772,804 UART: [afmc] ++
2,772,972 UART: [afmc] CDI.KEYID = 6
2,773,335 UART: [afmc] SUBJECT.KEYID = 7
2,773,761 UART: [afmc] AUTHORITY.KEYID = 5
2,809,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,799 UART: [afmc] --
2,852,899 UART: [cold-reset] --
2,853,653 UART: [state] Locking Datavault
2,854,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,550 UART: [state] Locking ICCM
2,856,218 UART: [exit] Launching FMC @ 0x40000130
2,861,547 UART:
2,861,563 UART: Running Caliptra FMC ...
2,861,971 UART:
2,862,025 UART: [state] CFI Enabled
2,872,674 UART: [fht] FMC Alias Private Key: 7
2,980,761 UART: [art] Extend RT PCRs Done
2,981,189 UART: [art] Lock RT PCRs Done
2,982,889 UART: [art] Populate DV Done
2,991,088 UART: [fht] FMC Alias Private Key: 7
2,992,144 UART: [art] Derive CDI
2,992,424 UART: [art] Store in in slot 0x4
3,078,375 UART: [art] Derive Key Pair
3,078,735 UART: [art] Store priv key in slot 0x5
3,092,187 UART: [art] Derive Key Pair - Done
3,107,400 UART: [art] Signing Cert with AUTHO
3,107,880 UART: RITY.KEYID = 7
3,122,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,689 UART: [art] PUB.X = 5B27F7F3F73EBBC9380A63B95916A5F1FED72B8311317DA35E4FED445469160B3731D8157F220C4E388E235B0A7FA28F
3,130,451 UART: [art] PUB.Y = DCFF9BF37A2AB29A550162BF2B7F8CDF8941BD9594A847C80B87C985609DB386E5B236542C1F7E4DDF6EC32BEA9C81D5
3,137,413 UART: [art] SIG.R = AEF0551FDBE843A3DED3BDACE14F47AE7BBC4B21B86852475BD03246F03D087EBB9AACBE2CA036AB2D7307D4006F87A9
3,144,181 UART: [art] SIG.S = 99C6AAD498B9D00931AC3B667E012DEADAAB9F1B50F6980F781987521313446E10E1868D5214E3C383FFDA3BEBB6E30F
3,167,900 UART: Caliptra RT
3,168,153 UART: [state] CFI Enabled
3,276,319 UART: [rt] RT listening for mailbox commands...
3,276,989 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,407 UART: [rt]cmd =0x41545348, len=116
3,309,138 >>> mbox cmd response data (12 bytes)
3,309,139 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,758 UART:
3,309,774 UART: Running Caliptra ROM ...
3,310,182 UART:
3,310,237 UART: [state] CFI Enabled
3,313,449 UART: [state] LifecycleState = Unprovisioned
3,314,104 UART: [state] DebugLocked = No
3,314,828 UART: [state] WD Timer not started. Device not locked for debugging
3,316,028 UART: [kat] SHA2-256
4,119,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,707 UART: [kat] ++
4,123,859 UART: [kat] sha1
4,128,271 UART: [kat] SHA2-256
4,130,211 UART: [kat] SHA2-384
4,132,886 UART: [kat] SHA2-512-ACC
4,134,786 UART: [kat] ECC-384
4,144,469 UART: [kat] HMAC-384Kdf
4,148,983 UART: [kat] LMS
4,397,295 UART: [kat] --
4,398,269 UART: [update-reset] ++
5,303,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,400,859 >>> mbox cmd response: success
5,400,859 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,401,034 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,048 UART: [update-reset Success] --
5,410,081 UART: [state] Locking Datavault
5,410,881 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,485 UART: [state] Locking ICCM
5,412,109 UART: [exit] Launching FMC @ 0x40000130
5,417,438 UART:
5,417,454 UART: Running Caliptra FMC ...
5,417,862 UART:
5,417,916 UART: [state] CFI Enabled
5,507,083 UART: [art] Extend RT PCRs Done
5,507,511 UART: [art] Lock RT PCRs Done
5,508,546 UART: [art] Populate DV Done
5,516,603 UART: [fht] FMC Alias Private Key: 7
5,517,661 UART: [art] Derive CDI
5,517,941 UART: [art] Store in in slot 0x4
5,603,584 UART: [art] Derive Key Pair
5,603,944 UART: [art] Store priv key in slot 0x5
5,616,748 UART: [art] Derive Key Pair - Done
5,631,245 UART: [art] Signing Cert with AUTHO
5,631,725 UART: RITY.KEYID = 7
5,646,517 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,282 UART: [art] PUB.X = 201A756954863B6431006A09A055586B7C68AE567C1787A2A37C49905EFDD7BD7BA4DEEBEF4ABBF7031A80233F78FCA8
5,654,032 UART: [art] PUB.Y = 367505BC036DA4189F6C90471A7945506067D36BA289A8549A85FBC029493E876A3143D1412038144AAA8D9F6AF00AC1
5,660,965 UART: [art] SIG.R = 60032015DE33F2C52EABED6BB10504AF43AF1F6E338DFB497EB9FB0268978D94D718659025AB6DB92C56CE5B36660FBB
5,667,732 UART: [art] SIG.S = 723DCC58BB367796F6631368012F0EAD5FF9338C8A6203C8AC15398D3C4949595196D1D8F9A3879E654F98FB376FE5A5
5,690,688 UART: mbox::rt_entry...
5,691,060 UART: ____ _ _ _ ____ _____
5,691,844 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,644 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,948 UART: |_|
5,695,260 UART:
5,972,438 UART: [rt] Runtime listening for mailbox commands...
5,973,628 >>> mbox cmd response data (48 bytes)
5,973,629 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,976,412 >>> mbox cmd response data (48 bytes)
5,976,413 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,989,351 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,766 ready_for_fw is high
1,055,766 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,759 >>> mbox cmd response: success
2,682,211 UART:
2,682,227 UART: Running Caliptra FMC ...
2,682,635 UART:
2,682,689 UART: [state] CFI Enabled
2,692,930 UART: [fht] FMC Alias Private Key: 7
2,801,049 UART: [art] Extend RT PCRs Done
2,801,477 UART: [art] Lock RT PCRs Done
2,802,941 UART: [art] Populate DV Done
2,811,018 UART: [fht] FMC Alias Private Key: 7
2,812,000 UART: [art] Derive CDI
2,812,280 UART: [art] Store in in slot 0x4
2,897,997 UART: [art] Derive Key Pair
2,898,357 UART: [art] Store priv key in slot 0x5
2,911,267 UART: [art] Derive Key Pair - Done
2,925,739 UART: [art] Signing Cert with AUTHO
2,926,219 UART: RITY.KEYID = 7
2,941,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,078 UART: [art] PUB.X = 529101DB426E5FC001EE9F44478C295F4EEDD19F420450B910BEB3CD5DDE67F4B05B413132735B8703C4ED6A98632654
2,948,838 UART: [art] PUB.Y = 68F614610A131F2745B0E9ADCE459CAEF192C15ABE459F4170CC24624BE687930CE1EBBDDDB63853A1B018E8D292798D
2,955,792 UART: [art] SIG.R = 44382392E01B7E52F2367FE116D16363D03F4743AF2EA8E475C423AD0CBAE5A5A0AF747DFDCBBDBF505BFBB82DDDE732
2,962,581 UART: [art] SIG.S = 0FC31FB64C2D7E6FFB76081A5617792B24C70470195B82E82B4421A30A64E7A879EB43503A6826331B18E2F4A3EE7A6C
2,986,452 UART: Caliptra RT
2,986,705 UART: [state] CFI Enabled
3,094,286 UART: [rt] RT listening for mailbox commands...
3,094,956 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,500 UART: [rt]cmd =0x41545348, len=116
3,127,311 >>> mbox cmd response data (12 bytes)
3,127,312 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,645 >>> mbox cmd response: success
5,097,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,110,841 UART:
5,110,857 UART: Running Caliptra FMC ...
5,111,265 UART:
5,111,319 UART: [state] CFI Enabled
5,200,470 UART: [art] Extend RT PCRs Done
5,200,898 UART: [art] Lock RT PCRs Done
5,202,189 UART: [art] Populate DV Done
5,210,324 UART: [fht] FMC Alias Private Key: 7
5,211,488 UART: [art] Derive CDI
5,211,768 UART: [art] Store in in slot 0x4
5,297,355 UART: [art] Derive Key Pair
5,297,715 UART: [art] Store priv key in slot 0x5
5,310,809 UART: [art] Derive Key Pair - Done
5,325,450 UART: [art] Signing Cert with AUTHO
5,325,930 UART: RITY.KEYID = 7
5,341,298 UART: [art] Erasing AUTHORITY.KEYID = 7
5,342,063 UART: [art] PUB.X = CEA8417EA0899DB7C5B3DA41488D9D37E82B174647138732E1733C72E8899EE1E4895D602F4EBE484A6263C33C02356F
5,348,828 UART: [art] PUB.Y = E0CEB14AFB6D316CB008A24B0BE47254C22687622BB7E81D6814FA6E9F679102E716A8112083D80608BE3DBC6EC643B8
5,355,769 UART: [art] SIG.R = 82CB9B4423CFE2042E715A4826F7CC6CDFCF3F19C098362594D8A65D51C1F176421B316CA609D2A426F2833747706CFB
5,362,535 UART: [art] SIG.S = 4B32883C92C3536B3014CB6C7AD7A06AB46F48877F505B82EF9B8F8D69CAC32290ABF022C2B02636F95876BD828DE959
5,386,724 UART: mbox::rt_entry...
5,387,096 UART: ____ _ _ _ ____ _____
5,387,880 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,388,680 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,389,448 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,390,216 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,390,984 UART: |_|
5,391,296 UART:
5,671,222 UART: [rt] Runtime listening for mailbox commands...
5,672,412 >>> mbox cmd response data (48 bytes)
5,672,413 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,675,196 >>> mbox cmd response data (48 bytes)
5,675,197 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,688,135 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,819 UART: [ldev] ++
1,208,987 UART: [ldev] CDI.KEYID = 6
1,209,351 UART: [ldev] SUBJECT.KEYID = 5
1,209,778 UART: [ldev] AUTHORITY.KEYID = 7
1,210,241 UART: [ldev] FE.KEYID = 1
1,215,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,225 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,225 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,032 >>> mbox cmd response: success
2,775,221 UART: [afmc] ++
2,775,389 UART: [afmc] CDI.KEYID = 6
2,775,752 UART: [afmc] SUBJECT.KEYID = 7
2,776,178 UART: [afmc] AUTHORITY.KEYID = 5
2,811,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,780 UART: [afmc] --
2,854,702 UART: [cold-reset] --
2,855,436 UART: [state] Locking Datavault
2,856,833 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,437 UART: [state] Locking ICCM
2,857,865 UART: [exit] Launching FMC @ 0x40000130
2,863,194 UART:
2,863,210 UART: Running Caliptra FMC ...
2,863,618 UART:
2,863,761 UART: [state] CFI Enabled
2,874,344 UART: [fht] FMC Alias Private Key: 7
2,982,723 UART: [art] Extend RT PCRs Done
2,983,151 UART: [art] Lock RT PCRs Done
2,985,059 UART: [art] Populate DV Done
2,993,282 UART: [fht] FMC Alias Private Key: 7
2,994,234 UART: [art] Derive CDI
2,994,514 UART: [art] Store in in slot 0x4
3,079,803 UART: [art] Derive Key Pair
3,080,163 UART: [art] Store priv key in slot 0x5
3,093,767 UART: [art] Derive Key Pair - Done
3,108,665 UART: [art] Signing Cert with AUTHO
3,109,145 UART: RITY.KEYID = 7
3,124,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,848 UART: [art] PUB.X = 1B547734EAA16CEE937228A0C6E9DA679E4E31AAA5F031E55D307AE0F39C5BF004CF7B4353270E518FC681001323EE52
3,131,596 UART: [art] PUB.Y = 291B2C0B6C772172D33C93F5A3D3A342D8807607AE362DAF1E0340A1A698AD9150A3E64309816387811177D88466A639
3,138,522 UART: [art] SIG.R = 949FC103A44449D9ABAF462583AC11D3A7EDCF204879450C897438D7FF8A6F9057A7F47C3493892614FD92EB8DD39688
3,145,286 UART: [art] SIG.S = 3D7FFD5EAC96E9911BB21CFB566CE8495F5ACE64297FFDE5482B165D45BD26F94AD2F806D0EBC99F61DE1744D8C60960
3,168,703 UART: Caliptra RT
3,169,048 UART: [state] CFI Enabled
3,275,497 UART: [rt] RT listening for mailbox commands...
3,276,167 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,745 UART: [rt]cmd =0x41545348, len=116
3,308,514 >>> mbox cmd response data (12 bytes)
3,308,515 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,294 UART:
3,309,310 UART: Running Caliptra ROM ...
3,309,718 UART:
3,309,860 UART: [state] CFI Enabled
3,313,018 UART: [state] LifecycleState = Unprovisioned
3,313,673 UART: [state] DebugLocked = No
3,314,327 UART: [state] WD Timer not started. Device not locked for debugging
3,315,553 UART: [kat] SHA2-256
4,119,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,232 UART: [kat] ++
4,123,384 UART: [kat] sha1
4,127,560 UART: [kat] SHA2-256
4,129,500 UART: [kat] SHA2-384
4,132,167 UART: [kat] SHA2-512-ACC
4,134,067 UART: [kat] ECC-384
4,144,090 UART: [kat] HMAC-384Kdf
4,148,694 UART: [kat] LMS
4,397,006 UART: [kat] --
4,397,942 UART: [update-reset] ++
5,302,775 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,400,304 >>> mbox cmd response: success
5,400,304 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,400,409 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,423 UART: [update-reset Success] --
5,409,410 UART: [state] Locking Datavault
5,410,166 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,770 UART: [state] Locking ICCM
5,411,190 UART: [exit] Launching FMC @ 0x40000130
5,416,519 UART:
5,416,535 UART: Running Caliptra FMC ...
5,416,943 UART:
5,417,086 UART: [state] CFI Enabled
5,506,373 UART: [art] Extend RT PCRs Done
5,506,801 UART: [art] Lock RT PCRs Done
5,507,830 UART: [art] Populate DV Done
5,515,999 UART: [fht] FMC Alias Private Key: 7
5,517,035 UART: [art] Derive CDI
5,517,315 UART: [art] Store in in slot 0x4
5,602,926 UART: [art] Derive Key Pair
5,603,286 UART: [art] Store priv key in slot 0x5
5,615,850 UART: [art] Derive Key Pair - Done
5,630,839 UART: [art] Signing Cert with AUTHO
5,631,319 UART: RITY.KEYID = 7
5,646,433 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,198 UART: [art] PUB.X = 8DF7A8B1289F169E3443D0E2800F29F98E25927E38E545A7A29AFE57F401FE1EAC0C60A350F0AF93DF2DC3B6C7A8DF22
5,653,973 UART: [art] PUB.Y = 663FF201D3465B1ECD0B79DE5020F0AFF6032234F7DF65348582E7D803A8AB194A68C81909C9F2F6C3D4DC66E2360AB3
5,660,911 UART: [art] SIG.R = F975E19BA6DAB374B9BB36519B422BA0139DA34D2C0079EE0A286D30148E15195E3227B0956E845170C8AD786FCF88C0
5,667,658 UART: [art] SIG.S = 15FCB4059E9E88800F9A01BC824F93221B617286D38F127907CCD4EBC5DB60D8CF93B1E9D3EE3636B665BC688904E99D
5,691,312 UART: mbox::rt_entry...
5,691,684 UART: ____ _ _ _ ____ _____
5,692,468 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,804 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,572 UART: |_|
5,695,884 UART:
5,977,360 UART: [rt] Runtime listening for mailbox commands...
5,978,550 >>> mbox cmd response data (48 bytes)
5,978,551 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,981,334 >>> mbox cmd response data (48 bytes)
5,981,335 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,994,273 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,945 ready_for_fw is high
1,055,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,128 >>> mbox cmd response: success
2,684,386 UART:
2,684,402 UART: Running Caliptra FMC ...
2,684,810 UART:
2,684,953 UART: [state] CFI Enabled
2,695,550 UART: [fht] FMC Alias Private Key: 7
2,803,223 UART: [art] Extend RT PCRs Done
2,803,651 UART: [art] Lock RT PCRs Done
2,805,031 UART: [art] Populate DV Done
2,813,478 UART: [fht] FMC Alias Private Key: 7
2,814,620 UART: [art] Derive CDI
2,814,900 UART: [art] Store in in slot 0x4
2,900,511 UART: [art] Derive Key Pair
2,900,871 UART: [art] Store priv key in slot 0x5
2,914,097 UART: [art] Derive Key Pair - Done
2,928,851 UART: [art] Signing Cert with AUTHO
2,929,331 UART: RITY.KEYID = 7
2,944,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,832 UART: [art] PUB.X = AE96CD77C488E94FD2AD431634C0C20B6A4624C240ABCED5747840A4950330DC2B55B7AFBC59C1C027F68DDF26D90696
2,951,603 UART: [art] PUB.Y = 7B3D7A6D0BE2B1A7482CEA1FBEFD84EE58D73E4AE865BF9331EFAD92CB1E8006AA7EBE1A3B56AE97B6F6691BE26A486E
2,958,577 UART: [art] SIG.R = 09E35D04B981EF40D54C44E172AE223D0CA1758DD2F942FA69FDB9E3661863BB5B1F809BCD582A76516DDD337C35BB91
2,965,348 UART: [art] SIG.S = C108092EF3DD3D7458CFE90B67E11521FAE2EBCF8C33D3D2071EC844FED6A18A97BCAFC556E6EDDA842B9D7C90EE7EE8
2,989,533 UART: Caliptra RT
2,989,878 UART: [state] CFI Enabled
3,097,609 UART: [rt] RT listening for mailbox commands...
3,098,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,693 UART: [rt]cmd =0x41545348, len=116
3,130,320 >>> mbox cmd response data (12 bytes)
3,130,321 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,835 >>> mbox cmd response: success
5,102,835 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,115,979 UART:
5,115,995 UART: Running Caliptra FMC ...
5,116,403 UART:
5,116,546 UART: [state] CFI Enabled
5,205,377 UART: [art] Extend RT PCRs Done
5,205,805 UART: [art] Lock RT PCRs Done
5,206,714 UART: [art] Populate DV Done
5,215,047 UART: [fht] FMC Alias Private Key: 7
5,216,121 UART: [art] Derive CDI
5,216,401 UART: [art] Store in in slot 0x4
5,302,160 UART: [art] Derive Key Pair
5,302,520 UART: [art] Store priv key in slot 0x5
5,315,514 UART: [art] Derive Key Pair - Done
5,330,078 UART: [art] Signing Cert with AUTHO
5,330,558 UART: RITY.KEYID = 7
5,346,162 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,927 UART: [art] PUB.X = 9A326C27B3C21745FAA285B8D383FD9C16E5C35C063E5FC48500AE0D3150D67C8FE838D3AC9D86D201D5C6325B3A1465
5,353,672 UART: [art] PUB.Y = 0A185703EE2E65751843C3831C8F4801F77AFF5130AD610E0EB3EED5D298EDDFE13232A2EE59BAC3FE822090A4F9AECA
5,360,623 UART: [art] SIG.R = 1AA819FA0C3E66243CD0C9C6C8E05C5457B42A41E04EEAB28A5A8911919A284793580851C81C51B87CC96FDE7B2D881D
5,367,393 UART: [art] SIG.S = E8976FCCFF8913D58C7BF10F79D1A5277DA2B00C8513C294F548FD70BBA1697958D8F0868690688B201F7CB8440EB493
5,391,197 UART: mbox::rt_entry...
5,391,569 UART: ____ _ _ _ ____ _____
5,392,353 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,921 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,395,457 UART: |_|
5,395,769 UART:
5,675,871 UART: [rt] Runtime listening for mailbox commands...
5,677,061 >>> mbox cmd response data (48 bytes)
5,677,062 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,679,845 >>> mbox cmd response data (48 bytes)
5,679,846 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,692,784 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,659 UART: [kat] SHA2-256
892,597 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,318 UART: [kat] LMS
1,475,514 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,648 UART: [idev] ++
1,479,816 UART: [idev] CDI.KEYID = 6
1,480,176 UART: [idev] SUBJECT.KEYID = 7
1,480,600 UART: [idev] UDS.KEYID = 0
1,480,945 ready_for_fw is high
1,480,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,660 UART: [idev] --
1,514,643 UART: [ldev] ++
1,514,811 UART: [ldev] CDI.KEYID = 6
1,515,174 UART: [ldev] SUBJECT.KEYID = 5
1,515,600 UART: [ldev] AUTHORITY.KEYID = 7
1,516,063 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,838 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,892 UART: [fwproc] Received command 0x46574c44
1,587,683 UART: [fwproc] Received Image of size 114332 bytes
2,886,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,364 >>> mbox cmd response: success
3,080,528 UART: [afmc] ++
3,080,696 UART: [afmc] CDI.KEYID = 6
3,081,058 UART: [afmc] SUBJECT.KEYID = 7
3,081,483 UART: [afmc] AUTHORITY.KEYID = 5
3,116,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,300 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,693 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,383 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,280 UART: [afmc] --
3,159,186 UART: [cold-reset] --
3,159,870 UART: [state] Locking Datavault
3,160,805 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,409 UART: [state] Locking ICCM
3,162,065 UART: [exit] Launching FMC @ 0x40000130
3,167,394 UART:
3,167,410 UART: Running Caliptra FMC ...
3,167,818 UART:
3,167,872 UART: [state] CFI Enabled
3,178,355 UART: [fht] FMC Alias Private Key: 7
3,286,646 UART: [art] Extend RT PCRs Done
3,287,074 UART: [art] Lock RT PCRs Done
3,288,592 UART: [art] Populate DV Done
3,296,587 UART: [fht] FMC Alias Private Key: 7
3,297,709 UART: [art] Derive CDI
3,297,989 UART: [art] Store in in slot 0x4
3,383,426 UART: [art] Derive Key Pair
3,383,786 UART: [art] Store priv key in slot 0x5
3,396,840 UART: [art] Derive Key Pair - Done
3,411,163 UART: [art] Signing Cert with AUTHO
3,411,643 UART: RITY.KEYID = 7
3,427,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,836 UART: [art] PUB.X = 2FA4CB8BA8CF73FCD0E0A246E9683C130DB1F3E4BBA5722AB47EBEF643E80A032A6F34DCEDBEE689AA03E4897DAF1ECE
3,434,628 UART: [art] PUB.Y = 9D630E305D241387FDA2CA2266E15C196669B120FEF9155C67BCF236F98E16B504D864F017D9B40766E13A620179E88A
3,441,562 UART: [art] SIG.R = 8E989C8385805706CC51552CC248F75DE537FAEE53971DC2B8810567D9C066A2259063D3D89E2C85B123DB3D4D6EBB7D
3,448,328 UART: [art] SIG.S = 720BAF45786B29AC07FFD801C2F3377E620DBFC7497668C16BE274CB5AF01B7A19A765E679C49AE8008B840BC85C2B33
3,471,698 UART: Caliptra RT
3,471,951 UART: [state] CFI Enabled
3,579,044 UART: [rt] RT listening for mailbox commands...
3,579,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,792 UART: [rt]cmd =0x41544d4e, len=14344
4,012,725 >>> mbox cmd response data (8 bytes)
4,012,726 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,797 UART: [rt]cmd =0x41545348, len=116
4,044,633 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 ready_for_fw is high
1,362,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,134 >>> mbox cmd response: success
2,988,720 UART:
2,988,736 UART: Running Caliptra FMC ...
2,989,144 UART:
2,989,198 UART: [state] CFI Enabled
2,999,517 UART: [fht] FMC Alias Private Key: 7
3,107,452 UART: [art] Extend RT PCRs Done
3,107,880 UART: [art] Lock RT PCRs Done
3,109,440 UART: [art] Populate DV Done
3,117,313 UART: [fht] FMC Alias Private Key: 7
3,118,417 UART: [art] Derive CDI
3,118,697 UART: [art] Store in in slot 0x4
3,204,146 UART: [art] Derive Key Pair
3,204,506 UART: [art] Store priv key in slot 0x5
3,217,428 UART: [art] Derive Key Pair - Done
3,232,160 UART: [art] Signing Cert with AUTHO
3,232,640 UART: RITY.KEYID = 7
3,247,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,469 UART: [art] PUB.X = 93C384D46764B4BF54760E0FBD6681F3ED27249FC9E6E395CD0F2FEB80EB9D1C1709595C479DACBB82E63E86E3E7A657
3,255,239 UART: [art] PUB.Y = 9EEC24DE2F90583DE0A22B9F7F6787458415E498234AC6D8EAB528A5162DD26FFB1E495C067C55E1DC8D52FF2B66C053
3,262,196 UART: [art] SIG.R = C6A64486FCF2305ECA00E1FED366AA5B9B4AAFE041CF426B7B6EB85BAE1D5C8817B70CF6121763911960C0594EAB9D71
3,268,957 UART: [art] SIG.S = 619503E32FFE5919FAB20C3DDDBF3995263BB9B14A292FD6CAD3C0436047AA77CCB9B471464A18AD28D8BA21149FCC03
3,292,853 UART: Caliptra RT
3,293,106 UART: [state] CFI Enabled
3,402,591 UART: [rt] RT listening for mailbox commands...
3,403,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,377 UART: [rt]cmd =0x41544d4e, len=14344
3,836,350 >>> mbox cmd response data (8 bytes)
3,836,351 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,416 UART: [rt]cmd =0x41545348, len=116
3,868,208 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,744 UART: [kat] SHA2-256
892,682 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,678 UART: [cold-reset] ++
1,477,162 UART: [fht] Storing FHT @ 0x50003400
1,479,785 UART: [idev] ++
1,479,953 UART: [idev] CDI.KEYID = 6
1,480,313 UART: [idev] SUBJECT.KEYID = 7
1,480,737 UART: [idev] UDS.KEYID = 0
1,481,082 ready_for_fw is high
1,481,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,327 UART: [idev] Erasing UDS.KEYID = 0
1,505,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,547,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,561 UART: [ldev] --
1,586,932 UART: [fwproc] Waiting for Commands...
1,587,731 UART: [fwproc] Received command 0x46574c44
1,588,522 UART: [fwproc] Received Image of size 114332 bytes
2,886,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,851 >>> mbox cmd response: success
3,080,095 UART: [afmc] ++
3,080,263 UART: [afmc] CDI.KEYID = 6
3,080,625 UART: [afmc] SUBJECT.KEYID = 7
3,081,050 UART: [afmc] AUTHORITY.KEYID = 5
3,115,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,750 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,440 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,237 UART: [afmc] --
3,159,349 UART: [cold-reset] --
3,160,015 UART: [state] Locking Datavault
3,161,424 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,028 UART: [state] Locking ICCM
3,162,686 UART: [exit] Launching FMC @ 0x40000130
3,168,015 UART:
3,168,031 UART: Running Caliptra FMC ...
3,168,439 UART:
3,168,582 UART: [state] CFI Enabled
3,179,629 UART: [fht] FMC Alias Private Key: 7
3,287,722 UART: [art] Extend RT PCRs Done
3,288,150 UART: [art] Lock RT PCRs Done
3,289,864 UART: [art] Populate DV Done
3,298,209 UART: [fht] FMC Alias Private Key: 7
3,299,381 UART: [art] Derive CDI
3,299,661 UART: [art] Store in in slot 0x4
3,385,516 UART: [art] Derive Key Pair
3,385,876 UART: [art] Store priv key in slot 0x5
3,398,940 UART: [art] Derive Key Pair - Done
3,413,825 UART: [art] Signing Cert with AUTHO
3,414,305 UART: RITY.KEYID = 7
3,429,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,692 UART: [art] PUB.X = 5F80B66494029A4E2DD94B32B348E7F31CC5B993E8EBC5314BF10C98D44E7CF6FB3D2BA4D7E792D67EF635697BA5A968
3,437,468 UART: [art] PUB.Y = 96201E3CA80F56053E4CA73A5334A3C55C5069CE4581523B9C62EAFFA7561F05842D431BB964C82833A431BF500E6EA4
3,444,406 UART: [art] SIG.R = E92F52CAEE4E6E30834D316086E5F379B3AA59127DC43FD4A282862D46E1FA9E83129200C106D928DFF89E11BA014D86
3,451,152 UART: [art] SIG.S = 67E6865A8F828B1130A70036441992210638B443EFB83C1CA6A47DBE2E15C62D5B1BA2D7979C4A091BC42E30F9BA5DA2
3,475,303 UART: Caliptra RT
3,475,648 UART: [state] CFI Enabled
3,583,617 UART: [rt] RT listening for mailbox commands...
3,584,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,209 UART: [rt]cmd =0x41544d4e, len=14344
4,017,182 >>> mbox cmd response data (8 bytes)
4,017,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,336 UART: [rt]cmd =0x41545348, len=116
4,049,104 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,152 ready_for_fw is high
1,363,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,073 >>> mbox cmd response: success
2,991,515 UART:
2,991,531 UART: Running Caliptra FMC ...
2,991,939 UART:
2,992,082 UART: [state] CFI Enabled
3,002,991 UART: [fht] FMC Alias Private Key: 7
3,110,960 UART: [art] Extend RT PCRs Done
3,111,388 UART: [art] Lock RT PCRs Done
3,112,902 UART: [art] Populate DV Done
3,121,245 UART: [fht] FMC Alias Private Key: 7
3,122,337 UART: [art] Derive CDI
3,122,617 UART: [art] Store in in slot 0x4
3,208,124 UART: [art] Derive Key Pair
3,208,484 UART: [art] Store priv key in slot 0x5
3,221,674 UART: [art] Derive Key Pair - Done
3,236,361 UART: [art] Signing Cert with AUTHO
3,236,841 UART: RITY.KEYID = 7
3,251,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,764 UART: [art] PUB.X = 70F99907B5A97B6B8B731A062D88AA2B8DEB0C3F97DECB4BB46FF2E3F38A5AB801725A2038FEDDEA9F4AB1610DB15F5D
3,259,543 UART: [art] PUB.Y = CF050FE3DD8504FF8FB7EC44D0691F1CA4251923ED76381F0303B26FDE746127DBBD81D08C92FD1D376604B9001A2558
3,266,459 UART: [art] SIG.R = 3B9B7C58DD44B249D37A55FF9B13E09ECDBB8850F9FEF52DE55AE993152F2726B9FB763B64677CD040C783327BF61B2F
3,273,241 UART: [art] SIG.S = F34D0393CEF194AFB36B73EB38C604C428B68C6B3894ADAB609DDF1444EA103349B6497368490CE9F7C23BD66B8A3F38
3,297,405 UART: Caliptra RT
3,297,750 UART: [state] CFI Enabled
3,406,641 UART: [rt] RT listening for mailbox commands...
3,407,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,451 UART: [rt]cmd =0x41544d4e, len=14344
3,840,692 >>> mbox cmd response data (8 bytes)
3,840,693 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,938 UART: [rt]cmd =0x41545348, len=116
3,872,812 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,736 UART: [state] LifecycleState = Unprovisioned
86,391 UART: [state] DebugLocked = No
87,003 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
893,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,963 UART: [kat] ++
898,115 UART: [kat] sha1
902,481 UART: [kat] SHA2-256
904,421 UART: [kat] SHA2-384
907,236 UART: [kat] SHA2-512-ACC
909,137 UART: [kat] ECC-384
918,724 UART: [kat] HMAC-384Kdf
923,200 UART: [kat] LMS
1,171,528 UART: [kat] --
1,172,471 UART: [cold-reset] ++
1,172,807 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 ready_for_fw is high
1,176,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,986 UART: [idev] Erasing UDS.KEYID = 0
1,200,929 UART: [idev] Sha1 KeyId Algorithm
1,209,511 UART: [idev] --
1,210,717 UART: [ldev] ++
1,210,885 UART: [ldev] CDI.KEYID = 6
1,211,248 UART: [ldev] SUBJECT.KEYID = 5
1,211,674 UART: [ldev] AUTHORITY.KEYID = 7
1,212,137 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,213 UART: [ldev] --
1,282,570 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,401 >>> mbox cmd response: success
2,775,471 UART: [afmc] ++
2,775,639 UART: [afmc] CDI.KEYID = 6
2,776,001 UART: [afmc] SUBJECT.KEYID = 7
2,776,426 UART: [afmc] AUTHORITY.KEYID = 5
2,811,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,199 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,806 UART: [afmc] --
2,854,708 UART: [cold-reset] --
2,855,404 UART: [state] Locking Datavault
2,856,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,991 UART: [state] Locking ICCM
2,857,635 UART: [exit] Launching FMC @ 0x40000130
2,862,964 UART:
2,862,980 UART: Running Caliptra FMC ...
2,863,388 UART:
2,863,442 UART: [state] CFI Enabled
2,873,949 UART: [fht] FMC Alias Private Key: 7
2,981,910 UART: [art] Extend RT PCRs Done
2,982,338 UART: [art] Lock RT PCRs Done
2,983,914 UART: [art] Populate DV Done
2,992,309 UART: [fht] FMC Alias Private Key: 7
2,993,431 UART: [art] Derive CDI
2,993,711 UART: [art] Store in in slot 0x4
3,079,230 UART: [art] Derive Key Pair
3,079,590 UART: [art] Store priv key in slot 0x5
3,092,614 UART: [art] Derive Key Pair - Done
3,107,244 UART: [art] Signing Cert with AUTHO
3,107,724 UART: RITY.KEYID = 7
3,122,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,607 UART: [art] PUB.X = 2033205213FC1AFCBCFA51D8AD0BF21E3A9E9B6110CDF2C7284FEEC30AE5A2DC2DF5BFD92B7E7528064B2FDC2679A0DC
3,130,396 UART: [art] PUB.Y = ABD1A2677F09A5277A2336E31BF01B4121F6EACCF8BBDFE6F447357D2DBD54517066737932529ED6E2BE8995F89AC480
3,137,351 UART: [art] SIG.R = BAD00767AECE54D6E3F48CEEBBC14C0507FB4E97A1B23E63376EEEA1BCD8AAAD80B4E162A7BAFBCD947530A63FC0F827
3,144,144 UART: [art] SIG.S = 6E69C6610E47640A904C2046F56AEF6E9D67B5789CBD8BA93C66169C79BF419B20FE692FC372C84D9F185953EB2747B2
3,167,613 UART: Caliptra RT
3,167,866 UART: [state] CFI Enabled
3,275,965 UART: [rt] RT listening for mailbox commands...
3,276,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,651 UART: [rt]cmd =0x41544d4e, len=14344
3,709,978 >>> mbox cmd response data (8 bytes)
3,709,979 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,866 UART: [rt]cmd =0x41545348, len=116
3,741,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,805 ready_for_fw is high
1,059,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,654 >>> mbox cmd response: success
2,688,342 UART:
2,688,358 UART: Running Caliptra FMC ...
2,688,766 UART:
2,688,820 UART: [state] CFI Enabled
2,699,317 UART: [fht] FMC Alias Private Key: 7
2,807,218 UART: [art] Extend RT PCRs Done
2,807,646 UART: [art] Lock RT PCRs Done
2,809,266 UART: [art] Populate DV Done
2,817,439 UART: [fht] FMC Alias Private Key: 7
2,818,491 UART: [art] Derive CDI
2,818,771 UART: [art] Store in in slot 0x4
2,904,184 UART: [art] Derive Key Pair
2,904,544 UART: [art] Store priv key in slot 0x5
2,917,556 UART: [art] Derive Key Pair - Done
2,932,240 UART: [art] Signing Cert with AUTHO
2,932,720 UART: RITY.KEYID = 7
2,948,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,041 UART: [art] PUB.X = 040F7F9E733D0C23DF55318F4A401F3A4EF0071835370C73F010B3E4BE0009A5830E60C56F9DAA599DFD50BBEE30A73B
2,955,776 UART: [art] PUB.Y = C096EA96A8441B3C238F2E7C52F51154D6EC3D0384B5F4F5E6D6745E20796D5500CB12BD372C7655015410ED32A03D7F
2,962,698 UART: [art] SIG.R = 0AC7DBDBF0695659EA0AEA47F5E06906C4234C97C8AE27E8B98F073307573C5ABACCC032A563D1E82C187356E02A08EB
2,969,462 UART: [art] SIG.S = D5CEA7CDBFF45CDDE4CA859F92E0E6D9EB0E8709AD40BA142C9FAC14BF1BD352031BBC4B5DDDB0A7809C863E356CD63D
2,993,078 UART: Caliptra RT
2,993,331 UART: [state] CFI Enabled
3,101,376 UART: [rt] RT listening for mailbox commands...
3,102,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,138 UART: [rt]cmd =0x41544d4e, len=14344
3,535,457 >>> mbox cmd response data (8 bytes)
3,535,458 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,453 UART: [rt]cmd =0x41545348, len=116
3,567,471 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,705 UART: [kat] HMAC-384Kdf
923,301 UART: [kat] LMS
1,171,629 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 ready_for_fw is high
1,176,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,231 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,822 UART: [idev] --
1,210,870 UART: [ldev] ++
1,211,038 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,827 UART: [ldev] AUTHORITY.KEYID = 7
1,212,290 UART: [ldev] FE.KEYID = 1
1,217,600 UART: [ldev] Erasing FE.KEYID = 1
1,243,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,620 UART: [ldev] --
1,282,947 UART: [fwproc] Wait for Commands...
1,283,759 UART: [fwproc] Recv command 0x46574c44
1,284,487 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,860 >>> mbox cmd response: success
2,774,958 UART: [afmc] ++
2,775,126 UART: [afmc] CDI.KEYID = 6
2,775,488 UART: [afmc] SUBJECT.KEYID = 7
2,775,913 UART: [afmc] AUTHORITY.KEYID = 5
2,812,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,915 UART: [afmc] --
2,856,025 UART: [cold-reset] --
2,856,717 UART: [state] Locking Datavault
2,857,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,468 UART: [state] Locking ICCM
2,858,970 UART: [exit] Launching FMC @ 0x40000130
2,864,299 UART:
2,864,315 UART: Running Caliptra FMC ...
2,864,723 UART:
2,864,866 UART: [state] CFI Enabled
2,875,705 UART: [fht] FMC Alias Private Key: 7
2,984,150 UART: [art] Extend RT PCRs Done
2,984,578 UART: [art] Lock RT PCRs Done
2,986,102 UART: [art] Populate DV Done
2,994,227 UART: [fht] FMC Alias Private Key: 7
2,995,257 UART: [art] Derive CDI
2,995,537 UART: [art] Store in in slot 0x4
3,081,234 UART: [art] Derive Key Pair
3,081,594 UART: [art] Store priv key in slot 0x5
3,095,244 UART: [art] Derive Key Pair - Done
3,110,050 UART: [art] Signing Cert with AUTHO
3,110,530 UART: RITY.KEYID = 7
3,125,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,109 UART: [art] PUB.X = B20B70C419A414C042247172BA7FB2614E5F528B18C357B9EF823C5BFA2B072173D307ADDDDD69DCC1F6F8698D1599A8
3,132,878 UART: [art] PUB.Y = 1FEA8AACF2F3D61902A199E6ED838DAEA59EF517A935D358A60A5E9CFC9B3B9AF6321816771955B6A0958B0B90AADC58
3,139,835 UART: [art] SIG.R = DF1DD3FC9AA8669C993F3026C3ADBDC1F90ABD057D2832349438C161551A56334148BF44CF450A929828902BD22069F0
3,146,596 UART: [art] SIG.S = 1067363BF3CF942791426315E23028EEF7FDC7DDD7CAADE08D9410AF87EC72BCEAE7B4D6AB2940DBC0A8AC8666504825
3,170,885 UART: Caliptra RT
3,171,230 UART: [state] CFI Enabled
3,279,873 UART: [rt] RT listening for mailbox commands...
3,280,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,939 UART: [rt]cmd =0x41544d4e, len=14344
3,713,744 >>> mbox cmd response data (8 bytes)
3,713,745 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,962 UART: [rt]cmd =0x41545348, len=116
3,745,658 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,752 ready_for_fw is high
1,060,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,193 >>> mbox cmd response: success
2,689,853 UART:
2,689,869 UART: Running Caliptra FMC ...
2,690,277 UART:
2,690,420 UART: [state] CFI Enabled
2,701,027 UART: [fht] FMC Alias Private Key: 7
2,809,584 UART: [art] Extend RT PCRs Done
2,810,012 UART: [art] Lock RT PCRs Done
2,811,646 UART: [art] Populate DV Done
2,819,769 UART: [fht] FMC Alias Private Key: 7
2,820,745 UART: [art] Derive CDI
2,821,025 UART: [art] Store in in slot 0x4
2,906,750 UART: [art] Derive Key Pair
2,907,110 UART: [art] Store priv key in slot 0x5
2,920,268 UART: [art] Derive Key Pair - Done
2,935,014 UART: [art] Signing Cert with AUTHO
2,935,494 UART: RITY.KEYID = 7
2,950,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,319 UART: [art] PUB.X = 136A58102804E135AF4AD7D8385AC2448E19D5C11B4F5CCA25B015625DA9760EAB64AF4CFEDAF8A841AAD7EB2AFEFC28
2,958,105 UART: [art] PUB.Y = BDA14434818FB858048F62DBD53D665D976CBDF30057B1D44EE2985DB168EF8044429F494E0F2C2F71931A464F9B79CE
2,965,031 UART: [art] SIG.R = 2B78330148FB9D7E6BA9AA79A754A4C7275595752A247EABD45AA926BFC102997A661E9ED9BBF21B13CC06B0DE700E5A
2,971,801 UART: [art] SIG.S = FCACC23BB67BA95E66364CCC3780BBE913E86C8F8F511D75BEABDB35A76E648560652E0550C1C9680BD5C48367A4EBF7
2,995,964 UART: Caliptra RT
2,996,309 UART: [state] CFI Enabled
3,103,402 UART: [rt] RT listening for mailbox commands...
3,104,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,148 UART: [rt]cmd =0x41544d4e, len=14344
3,537,355 >>> mbox cmd response data (8 bytes)
3,537,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,455 UART: [rt]cmd =0x41545348, len=116
3,569,089 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 ready_for_fw is high
1,174,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,115 UART: [fwproc] Recv command 0x46574c44
1,281,848 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,305 >>> mbox cmd response: success
2,772,402 UART: [afmc] ++
2,772,570 UART: [afmc] CDI.KEYID = 6
2,772,933 UART: [afmc] SUBJECT.KEYID = 7
2,773,359 UART: [afmc] AUTHORITY.KEYID = 5
2,809,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,465 UART: [afmc] --
2,852,533 UART: [cold-reset] --
2,853,147 UART: [state] Locking Datavault
2,854,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,004 UART: [state] Locking ICCM
2,855,426 UART: [exit] Launching FMC @ 0x40000130
2,860,755 UART:
2,860,771 UART: Running Caliptra FMC ...
2,861,179 UART:
2,861,233 UART: [state] CFI Enabled
2,871,868 UART: [fht] FMC Alias Private Key: 7
2,979,721 UART: [art] Extend RT PCRs Done
2,980,149 UART: [art] Lock RT PCRs Done
2,981,873 UART: [art] Populate DV Done
2,990,402 UART: [fht] FMC Alias Private Key: 7
2,991,582 UART: [art] Derive CDI
2,991,862 UART: [art] Store in in slot 0x4
3,077,383 UART: [art] Derive Key Pair
3,077,743 UART: [art] Store priv key in slot 0x5
3,091,049 UART: [art] Derive Key Pair - Done
3,105,715 UART: [art] Signing Cert with AUTHO
3,106,195 UART: RITY.KEYID = 7
3,121,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,120 UART: [art] PUB.X = 24BE65F3C80B45F46C801B1E67D630525BCC33F5DEBB79D493F3543063457FEB0DE6323DC79E59D16DA36B2CD659A980
3,128,892 UART: [art] PUB.Y = 1F1C0FABABDD98E7F2FD94C2F7D0479C057AD7A12B4DFCFBC19FE819C43B975890E424D084A071F1962AE774DB84E54F
3,135,856 UART: [art] SIG.R = 3AC6CFE48B070A692BBD64C6A1EC3A8C95C6C888C4D4AE9FA0E9D12177120677A43FB4BCA1DB9B1160C0F38F6220CECF
3,142,639 UART: [art] SIG.S = E62EEFCBA571C706FA43B8F0F52DE0FC220E42B3F6FA077B66C4A23227E90842720D4C801508DA0F7B3F7E2797367142
3,166,639 UART: Caliptra RT
3,166,892 UART: [state] CFI Enabled
3,274,467 UART: [rt] RT listening for mailbox commands...
3,275,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,241 UART: [rt]cmd =0x41544d4e, len=14344
3,707,646 >>> mbox cmd response data (8 bytes)
3,707,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,546 UART: [rt]cmd =0x41545348, len=116
3,739,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,926 ready_for_fw is high
1,055,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,653 >>> mbox cmd response: success
2,686,383 UART:
2,686,399 UART: Running Caliptra FMC ...
2,686,807 UART:
2,686,861 UART: [state] CFI Enabled
2,697,598 UART: [fht] FMC Alias Private Key: 7
2,805,191 UART: [art] Extend RT PCRs Done
2,805,619 UART: [art] Lock RT PCRs Done
2,807,103 UART: [art] Populate DV Done
2,815,380 UART: [fht] FMC Alias Private Key: 7
2,816,492 UART: [art] Derive CDI
2,816,772 UART: [art] Store in in slot 0x4
2,902,405 UART: [art] Derive Key Pair
2,902,765 UART: [art] Store priv key in slot 0x5
2,915,601 UART: [art] Derive Key Pair - Done
2,930,270 UART: [art] Signing Cert with AUTHO
2,930,750 UART: RITY.KEYID = 7
2,946,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,891 UART: [art] PUB.X = 794B957B8D20C1FF6804AD77D4AACE25495A533341CE3189D9211EF2D582728CC3F6FCE2A1AD8F8F46C3DB4F3D757637
2,953,668 UART: [art] PUB.Y = 92D2DF06D57F625CBEBFBD281AD567519C5A0922EBEDE34A6648CC4442660FD0021722F41ECC9412FB1C99C11D75109D
2,960,616 UART: [art] SIG.R = 84F37FBF524974DA6AD6D960FE0B08C35A5FAF98E45D8C8F0876DA8474171B083164A7C2E1421C43CCE4176ACE09EC45
2,967,381 UART: [art] SIG.S = 738BB36C7828369B6523D5B339EA9E14C0891B89C9A252CF5DFB3A3D30F4A8B1926AFBA5F3F94E7A79DC275EBBC7B898
2,991,508 UART: Caliptra RT
2,991,761 UART: [state] CFI Enabled
3,099,954 UART: [rt] RT listening for mailbox commands...
3,100,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,602 UART: [rt]cmd =0x41544d4e, len=14344
3,534,285 >>> mbox cmd response data (8 bytes)
3,534,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,363 UART: [rt]cmd =0x41545348, len=116
3,566,039 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,541 UART: [kat] LMS
1,169,853 UART: [kat] --
1,170,904 UART: [cold-reset] ++
1,171,328 UART: [fht] FHT @ 0x50003400
1,174,132 UART: [idev] ++
1,174,300 UART: [idev] CDI.KEYID = 6
1,174,661 UART: [idev] SUBJECT.KEYID = 7
1,175,086 UART: [idev] UDS.KEYID = 0
1,175,432 ready_for_fw is high
1,175,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,507 UART: [ldev] SUBJECT.KEYID = 5
1,210,934 UART: [ldev] AUTHORITY.KEYID = 7
1,211,397 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,243,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,529 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,276 >>> mbox cmd response: success
2,775,435 UART: [afmc] ++
2,775,603 UART: [afmc] CDI.KEYID = 6
2,775,966 UART: [afmc] SUBJECT.KEYID = 7
2,776,392 UART: [afmc] AUTHORITY.KEYID = 5
2,812,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,632 UART: [afmc] --
2,855,714 UART: [cold-reset] --
2,856,230 UART: [state] Locking Datavault
2,857,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,805 UART: [state] Locking ICCM
2,858,311 UART: [exit] Launching FMC @ 0x40000130
2,863,640 UART:
2,863,656 UART: Running Caliptra FMC ...
2,864,064 UART:
2,864,207 UART: [state] CFI Enabled
2,875,102 UART: [fht] FMC Alias Private Key: 7
2,982,903 UART: [art] Extend RT PCRs Done
2,983,331 UART: [art] Lock RT PCRs Done
2,985,159 UART: [art] Populate DV Done
2,993,602 UART: [fht] FMC Alias Private Key: 7
2,994,578 UART: [art] Derive CDI
2,994,858 UART: [art] Store in in slot 0x4
3,080,143 UART: [art] Derive Key Pair
3,080,503 UART: [art] Store priv key in slot 0x5
3,093,925 UART: [art] Derive Key Pair - Done
3,108,671 UART: [art] Signing Cert with AUTHO
3,109,151 UART: RITY.KEYID = 7
3,124,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,096 UART: [art] PUB.X = D10497FA914A2AC59C2140F0756E8D206D08C5AF64DF378340B7DB112E444E09240DB475EB36D405396494124608CDFA
3,131,846 UART: [art] PUB.Y = A8D876EA5BE3A81AA61525DD41950158B41E7398658FFFF383F12FA2501CCB90DAFA7B1D4D7B4B3D23BB5E09600D79AE
3,138,803 UART: [art] SIG.R = 4B84BCB075BD9677B036FBD3AFAFF484E13EC388B518FFA9568073E5FE95EAD5605B7BADDE4A76B0C84AD70003D744CA
3,145,570 UART: [art] SIG.S = 7705E9AD35D310F45AB2BCFE6EB21A51C28FE89EDC7C6CE8725CE4E279D7485DB894085CEFCEC6BC0118C59025B9B8E9
3,170,032 UART: Caliptra RT
3,170,377 UART: [state] CFI Enabled
3,278,038 UART: [rt] RT listening for mailbox commands...
3,278,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,802 UART: [rt]cmd =0x41544d4e, len=14344
3,711,935 >>> mbox cmd response data (8 bytes)
3,711,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,019 UART: [rt]cmd =0x41545348, len=116
3,743,659 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 ready_for_fw is high
1,056,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,540 >>> mbox cmd response: success
2,684,078 UART:
2,684,094 UART: Running Caliptra FMC ...
2,684,502 UART:
2,684,645 UART: [state] CFI Enabled
2,695,228 UART: [fht] FMC Alias Private Key: 7
2,803,831 UART: [art] Extend RT PCRs Done
2,804,259 UART: [art] Lock RT PCRs Done
2,805,915 UART: [art] Populate DV Done
2,814,046 UART: [fht] FMC Alias Private Key: 7
2,815,080 UART: [art] Derive CDI
2,815,360 UART: [art] Store in in slot 0x4
2,900,517 UART: [art] Derive Key Pair
2,900,877 UART: [art] Store priv key in slot 0x5
2,913,913 UART: [art] Derive Key Pair - Done
2,928,702 UART: [art] Signing Cert with AUTHO
2,929,182 UART: RITY.KEYID = 7
2,944,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,425 UART: [art] PUB.X = B2C1F0456A79CE13CC75F3A7F0AFE669CCCC496914355839D51C6C08392C415644A47AB4EEA9A66C74D714894EA46F8C
2,952,200 UART: [art] PUB.Y = 0E9F8C37F1386EE2296F05C01543B8634F54B64EC91F80881EDD63C4F843618C0D2D2D2A3E4C29A0261E3511AFD2B4EA
2,959,147 UART: [art] SIG.R = D81EBF746EBDFCA9E8604F44C4A125381B661BA8BA784965A33BE2525968CF63F0A380917C9B7AC56F8BD79AF311F0C7
2,965,929 UART: [art] SIG.S = D81E5C41B854FD30808F111B6DAF31421761B48172EC9A68E428916CD3DD9797AA29B47DEB5D0F9C12E756390B49F7A4
2,989,630 UART: Caliptra RT
2,989,975 UART: [state] CFI Enabled
3,097,445 UART: [rt] RT listening for mailbox commands...
3,098,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,835 UART: [rt]cmd =0x41544d4e, len=14344
3,530,532 >>> mbox cmd response data (8 bytes)
3,530,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,516 UART: [rt]cmd =0x41545348, len=116
3,562,498 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,767 UART: [kat] SHA2-256
881,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,813 UART: [kat] ++
885,965 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,448 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,547 UART: [fht] Storing FHT @ 0x50003400
1,479,274 UART: [idev] ++
1,479,442 UART: [idev] CDI.KEYID = 6
1,479,802 UART: [idev] SUBJECT.KEYID = 7
1,480,226 UART: [idev] UDS.KEYID = 0
1,480,571 ready_for_fw is high
1,480,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,686 UART: [idev] --
1,514,637 UART: [ldev] ++
1,514,805 UART: [ldev] CDI.KEYID = 6
1,515,168 UART: [ldev] SUBJECT.KEYID = 5
1,515,594 UART: [ldev] AUTHORITY.KEYID = 7
1,516,057 UART: [ldev] FE.KEYID = 1
1,520,983 UART: [ldev] Erasing FE.KEYID = 1
1,545,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,690 UART: [ldev] --
1,585,043 UART: [fwproc] Waiting for Commands...
1,585,856 UART: [fwproc] Received command 0x46574c44
1,586,647 UART: [fwproc] Received Image of size 114332 bytes
2,883,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,040 >>> mbox cmd response: success
3,077,204 UART: [afmc] ++
3,077,372 UART: [afmc] CDI.KEYID = 6
3,077,734 UART: [afmc] SUBJECT.KEYID = 7
3,078,159 UART: [afmc] AUTHORITY.KEYID = 5
3,112,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,466 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,859 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,549 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,354 UART: [afmc] --
3,156,254 UART: [cold-reset] --
3,157,166 UART: [state] Locking Datavault
3,158,465 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,069 UART: [state] Locking ICCM
3,159,699 UART: [exit] Launching FMC @ 0x40000130
3,165,028 UART:
3,165,044 UART: Running Caliptra FMC ...
3,165,452 UART:
3,165,506 UART: [state] CFI Enabled
3,176,105 UART: [fht] FMC Alias Private Key: 7
3,284,150 UART: [art] Extend RT PCRs Done
3,284,578 UART: [art] Lock RT PCRs Done
3,285,980 UART: [art] Populate DV Done
3,294,385 UART: [fht] FMC Alias Private Key: 7
3,295,365 UART: [art] Derive CDI
3,295,645 UART: [art] Store in in slot 0x4
3,381,018 UART: [art] Derive Key Pair
3,381,378 UART: [art] Store priv key in slot 0x5
3,394,976 UART: [art] Derive Key Pair - Done
3,409,521 UART: [art] Signing Cert with AUTHO
3,410,001 UART: RITY.KEYID = 7
3,425,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,814 UART: [art] PUB.X = E2391EAB155B9E29B219F17749B8AC3E9CDCFF42450BCE11E87E7205FB8EBC9AA809CDC7E7C76662BA1D4166A7F921C3
3,432,593 UART: [art] PUB.Y = F2218413B24342D75F7058B1D44C2EB6F16EB8028771C45EC50CC4F267A445350D47FB25F8E3380AF946DF93627B4A4A
3,439,531 UART: [art] SIG.R = C40F3C2DDEFC9DC9B0696B12682FE50B9373FC693F0434931F15CFD520B96D300800DA8222EAD4C6680F913049C59E62
3,446,268 UART: [art] SIG.S = 6CCC0A1432927C78B6B42D06E4285728E43C1C2B50EABF54CE6E281D2DA51A6237FD2B66FFC85510150DE77B4EF68656
3,470,078 UART: Caliptra RT
3,470,331 UART: [state] CFI Enabled
3,578,824 UART: [rt] RT listening for mailbox commands...
3,579,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,660 UART: [rt]cmd =0x41544d4e, len=14344
4,012,381 >>> mbox cmd response data (8 bytes)
4,012,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,271 UART: [rt]cmd =0x41545348, len=116
4,044,084 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,341 ready_for_fw is high
1,363,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,184 >>> mbox cmd response: success
2,990,378 UART:
2,990,394 UART: Running Caliptra FMC ...
2,990,802 UART:
2,990,856 UART: [state] CFI Enabled
3,001,355 UART: [fht] FMC Alias Private Key: 7
3,108,670 UART: [art] Extend RT PCRs Done
3,109,098 UART: [art] Lock RT PCRs Done
3,110,610 UART: [art] Populate DV Done
3,118,703 UART: [fht] FMC Alias Private Key: 7
3,119,735 UART: [art] Derive CDI
3,120,015 UART: [art] Store in in slot 0x4
3,205,710 UART: [art] Derive Key Pair
3,206,070 UART: [art] Store priv key in slot 0x5
3,218,952 UART: [art] Derive Key Pair - Done
3,233,449 UART: [art] Signing Cert with AUTHO
3,233,929 UART: RITY.KEYID = 7
3,249,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,016 UART: [art] PUB.X = 7AD11080BE1CEF25A323CF37A9C54ABF8E1B9CB58C7A8E2E08E5C09F72513227681585D09A979AC4CA5D9CD8CAD2FDA3
3,256,803 UART: [art] PUB.Y = C5A399DD2E54E156D4F2F4478828BBB7F384B0CA7E5EFA05D2B906B60617DB62090A47DB19FF36C466CAB296324FFFAA
3,263,754 UART: [art] SIG.R = 330F6B04D2885CDE7B9E62FA1519FEA3D0AD214FD61BCE1F5B49A82E60F4A53A43FBCEE667DABC5B6A5B56C42C0E4036
3,270,539 UART: [art] SIG.S = 87722AA865A86D71103E5079E0539265AE184D050198532243FCA0F144EBA320840F476644FD596149BEE278FF15828E
3,293,715 UART: Caliptra RT
3,293,968 UART: [state] CFI Enabled
3,401,991 UART: [rt] RT listening for mailbox commands...
3,402,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,631 UART: [rt]cmd =0x41544d4e, len=14344
3,835,896 >>> mbox cmd response data (8 bytes)
3,835,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,002 UART: [rt]cmd =0x41545348, len=116
3,867,721 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,741 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,564 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,875 UART: [idev] ++
1,480,043 UART: [idev] CDI.KEYID = 6
1,480,403 UART: [idev] SUBJECT.KEYID = 7
1,480,827 UART: [idev] UDS.KEYID = 0
1,481,172 ready_for_fw is high
1,481,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,739 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,274 UART: [ldev] ++
1,515,442 UART: [ldev] CDI.KEYID = 6
1,515,805 UART: [ldev] SUBJECT.KEYID = 5
1,516,231 UART: [ldev] AUTHORITY.KEYID = 7
1,516,694 UART: [ldev] FE.KEYID = 1
1,521,962 UART: [ldev] Erasing FE.KEYID = 1
1,547,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,773 UART: [ldev] --
1,587,080 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 114332 bytes
2,886,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,661 >>> mbox cmd response: success
3,079,771 UART: [afmc] ++
3,079,939 UART: [afmc] CDI.KEYID = 6
3,080,301 UART: [afmc] SUBJECT.KEYID = 7
3,080,726 UART: [afmc] AUTHORITY.KEYID = 5
3,115,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,103 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,496 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,186 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,097 UART: [afmc] --
3,159,171 UART: [cold-reset] --
3,159,995 UART: [state] Locking Datavault
3,161,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,826 UART: [state] Locking ICCM
3,162,308 UART: [exit] Launching FMC @ 0x40000130
3,167,637 UART:
3,167,653 UART: Running Caliptra FMC ...
3,168,061 UART:
3,168,204 UART: [state] CFI Enabled
3,178,785 UART: [fht] FMC Alias Private Key: 7
3,286,438 UART: [art] Extend RT PCRs Done
3,286,866 UART: [art] Lock RT PCRs Done
3,288,728 UART: [art] Populate DV Done
3,297,051 UART: [fht] FMC Alias Private Key: 7
3,298,143 UART: [art] Derive CDI
3,298,423 UART: [art] Store in in slot 0x4
3,384,092 UART: [art] Derive Key Pair
3,384,452 UART: [art] Store priv key in slot 0x5
3,397,658 UART: [art] Derive Key Pair - Done
3,412,288 UART: [art] Signing Cert with AUTHO
3,412,768 UART: RITY.KEYID = 7
3,428,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,261 UART: [art] PUB.X = 180068E996178E04A45D73B5EEACBC1D538A5F01DB2AAB1C149BD743CC770FCD19D41E6EC9F89D5D577A5E96BB3D775E
3,436,018 UART: [art] PUB.Y = 7A5056AF75775E03221A9C0F0601CB00EED7E5B9B435DA8E807C5A55EFAC14F03D5FF2B6AABD9041BB3C123935A7EC2B
3,442,952 UART: [art] SIG.R = 74284CA7CFEBB73BB085EA3B7BB4E0C5CDE25E0E6F466002FBCD3C4CA29CF296DD3B8B0DBD091EA61B0831B6D03D4916
3,449,733 UART: [art] SIG.S = E520559B6EA8606A988719E43E05C90DBA6929ED2F0CB3F62983564BEEAFCC0EF7953BFB355C3423BFC8CBA5DF686D0B
3,472,973 UART: Caliptra RT
3,473,318 UART: [state] CFI Enabled
3,581,173 UART: [rt] RT listening for mailbox commands...
3,581,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,167 UART: [rt]cmd =0x41544d4e, len=14344
4,015,334 >>> mbox cmd response data (8 bytes)
4,015,335 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,258 UART: [rt]cmd =0x41545348, len=116
4,046,991 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 ready_for_fw is high
1,362,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,265 >>> mbox cmd response: success
2,988,177 UART:
2,988,193 UART: Running Caliptra FMC ...
2,988,601 UART:
2,988,744 UART: [state] CFI Enabled
2,999,183 UART: [fht] FMC Alias Private Key: 7
3,106,920 UART: [art] Extend RT PCRs Done
3,107,348 UART: [art] Lock RT PCRs Done
3,108,918 UART: [art] Populate DV Done
3,117,067 UART: [fht] FMC Alias Private Key: 7
3,117,995 UART: [art] Derive CDI
3,118,275 UART: [art] Store in in slot 0x4
3,203,778 UART: [art] Derive Key Pair
3,204,138 UART: [art] Store priv key in slot 0x5
3,217,554 UART: [art] Derive Key Pair - Done
3,232,535 UART: [art] Signing Cert with AUTHO
3,233,015 UART: RITY.KEYID = 7
3,247,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,630 UART: [art] PUB.X = 5AC9828DFF6277D289D4FAD3DBE233B03FAFC3ADAE9323E01E9FEABE626299D01003F400329A13BE1D33C25B15ABAB0E
3,255,394 UART: [art] PUB.Y = 5B2BD148B7AD4CE030C0AFAB92FAE132F5906AEB1F15DFD768C1F6DD210C316BAF3000CE88EBC3A8700977419F4EB1CA
3,262,340 UART: [art] SIG.R = A5C42954511AA0FC45C86BC961A41CAA69632679A9DCDF1806C5E3B4743A6958FA8A92B8236519B997E4BB88AC868124
3,269,109 UART: [art] SIG.S = 3072E65C05CAFEFBEAB41B50BB79B544A1355D1562B2620D36432CDC40C69FD6F67A2DBBCB461AA6E1B2B8ED8328D866
3,292,518 UART: Caliptra RT
3,292,863 UART: [state] CFI Enabled
3,400,926 UART: [rt] RT listening for mailbox commands...
3,401,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,932 UART: [rt]cmd =0x41544d4e, len=14344
3,834,775 >>> mbox cmd response data (8 bytes)
3,834,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,553 UART: [rt]cmd =0x41545348, len=116
3,866,332 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,023 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 ready_for_fw is high
1,175,981 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,191 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,744 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,559 UART: [ldev] --
1,282,926 UART: [fwproc] Wait for Commands...
1,283,650 UART: [fwproc] Recv command 0x46574c44
1,284,378 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,099 >>> mbox cmd response: success
2,776,145 UART: [afmc] ++
2,776,313 UART: [afmc] CDI.KEYID = 6
2,776,675 UART: [afmc] SUBJECT.KEYID = 7
2,777,100 UART: [afmc] AUTHORITY.KEYID = 5
2,812,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,888 UART: [afmc] --
2,855,798 UART: [cold-reset] --
2,856,658 UART: [state] Locking Datavault
2,857,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,413 UART: [state] Locking ICCM
2,859,075 UART: [exit] Launching FMC @ 0x40000130
2,864,404 UART:
2,864,420 UART: Running Caliptra FMC ...
2,864,828 UART:
2,864,882 UART: [state] CFI Enabled
2,875,367 UART: [fht] FMC Alias Private Key: 7
2,983,648 UART: [art] Extend RT PCRs Done
2,984,076 UART: [art] Lock RT PCRs Done
2,985,558 UART: [art] Populate DV Done
2,993,985 UART: [fht] FMC Alias Private Key: 7
2,994,993 UART: [art] Derive CDI
2,995,273 UART: [art] Store in in slot 0x4
3,080,810 UART: [art] Derive Key Pair
3,081,170 UART: [art] Store priv key in slot 0x5
3,094,596 UART: [art] Derive Key Pair - Done
3,109,451 UART: [art] Signing Cert with AUTHO
3,109,931 UART: RITY.KEYID = 7
3,125,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,234 UART: [art] PUB.X = BE88563BAA543F336549B981D43B1D6882D5B9B49F06C3405885AB29973BBC22F5DFA5A3859D214622799C0B60D5D654
3,132,996 UART: [art] PUB.Y = 3566A8FA7CCD04683AC7F08D27125762D9C6CFF55856E5B8611BFC25373AE00B61ABD23C42A297BF887E4BDC6F40FED6
3,139,954 UART: [art] SIG.R = 88061A376FD798E9BFCB76484455AEEDF6D1D626811F367DC81172B8441F6BB9AE86371B262F459EFF1105B3F3A0890B
3,146,719 UART: [art] SIG.S = ADAE474D95CFD04EEA339B55B3EC8DE9685528F2BC5219DB0BC43292A5E0FA7C6941241BE64AF2C08D6ABD64F38F277C
3,170,343 UART: Caliptra RT
3,170,596 UART: [state] CFI Enabled
3,279,070 UART: [rt] RT listening for mailbox commands...
3,279,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,738 UART: [rt]cmd =0x41544d4e, len=14344
3,712,415 >>> mbox cmd response data (8 bytes)
3,712,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,343 UART: [rt]cmd =0x41545348, len=116
3,744,176 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,289 ready_for_fw is high
1,060,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,588 >>> mbox cmd response: success
2,686,840 UART:
2,686,856 UART: Running Caliptra FMC ...
2,687,264 UART:
2,687,318 UART: [state] CFI Enabled
2,697,785 UART: [fht] FMC Alias Private Key: 7
2,805,662 UART: [art] Extend RT PCRs Done
2,806,090 UART: [art] Lock RT PCRs Done
2,807,926 UART: [art] Populate DV Done
2,816,093 UART: [fht] FMC Alias Private Key: 7
2,817,229 UART: [art] Derive CDI
2,817,509 UART: [art] Store in in slot 0x4
2,902,830 UART: [art] Derive Key Pair
2,903,190 UART: [art] Store priv key in slot 0x5
2,916,034 UART: [art] Derive Key Pair - Done
2,930,977 UART: [art] Signing Cert with AUTHO
2,931,457 UART: RITY.KEYID = 7
2,946,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,684 UART: [art] PUB.X = D5629C5519407DC861D2FA4FCFCF6ABE885121EA96CCC957A90778EF7698671E485EECC1FB64B9A97663930D207FC436
2,954,456 UART: [art] PUB.Y = 3486926AA349AFB0CF16120AD6030766249FAAAAF303F5BA88B056098848CB021806A05CEDCCABAB0126B57AF27D677F
2,961,392 UART: [art] SIG.R = D3AC619E184BB274849524DCF54F1581D93C53DA37109D3C93D7D29530F12411AA8D58F8CC8390DB01439329DB38B1FA
2,968,161 UART: [art] SIG.S = 69B1FD895524C7AF3B76364E7713FB6479A02D4CD0E5B946A5FBC3ADE296EF400A40B7754B1C5B10501C9F19D440B915
2,991,761 UART: Caliptra RT
2,992,014 UART: [state] CFI Enabled
3,099,753 UART: [rt] RT listening for mailbox commands...
3,100,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,425 UART: [rt]cmd =0x41544d4e, len=14344
3,533,220 >>> mbox cmd response data (8 bytes)
3,533,221 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,404 UART: [rt]cmd =0x41545348, len=116
3,565,115 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,395 UART: [kat] SHA2-512-ACC
908,296 UART: [kat] ECC-384
918,063 UART: [kat] HMAC-384Kdf
922,565 UART: [kat] LMS
1,170,893 UART: [kat] --
1,171,744 UART: [cold-reset] ++
1,172,194 UART: [fht] FHT @ 0x50003400
1,174,979 UART: [idev] ++
1,175,147 UART: [idev] CDI.KEYID = 6
1,175,507 UART: [idev] SUBJECT.KEYID = 7
1,175,931 UART: [idev] UDS.KEYID = 0
1,176,276 ready_for_fw is high
1,176,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,154 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,910 UART: [ldev] ++
1,211,078 UART: [ldev] CDI.KEYID = 6
1,211,441 UART: [ldev] SUBJECT.KEYID = 5
1,211,867 UART: [ldev] AUTHORITY.KEYID = 7
1,212,330 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,144 UART: [ldev] --
1,283,613 UART: [fwproc] Wait for Commands...
1,284,339 UART: [fwproc] Recv command 0x46574c44
1,285,067 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,542 >>> mbox cmd response: success
2,774,804 UART: [afmc] ++
2,774,972 UART: [afmc] CDI.KEYID = 6
2,775,334 UART: [afmc] SUBJECT.KEYID = 7
2,775,759 UART: [afmc] AUTHORITY.KEYID = 5
2,811,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,228 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,947 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,783 UART: [afmc] --
2,854,821 UART: [cold-reset] --
2,855,795 UART: [state] Locking Datavault
2,856,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,286 UART: [state] Locking ICCM
2,857,796 UART: [exit] Launching FMC @ 0x40000130
2,863,125 UART:
2,863,141 UART: Running Caliptra FMC ...
2,863,549 UART:
2,863,692 UART: [state] CFI Enabled
2,874,471 UART: [fht] FMC Alias Private Key: 7
2,982,912 UART: [art] Extend RT PCRs Done
2,983,340 UART: [art] Lock RT PCRs Done
2,984,754 UART: [art] Populate DV Done
2,993,039 UART: [fht] FMC Alias Private Key: 7
2,994,113 UART: [art] Derive CDI
2,994,393 UART: [art] Store in in slot 0x4
3,079,358 UART: [art] Derive Key Pair
3,079,718 UART: [art] Store priv key in slot 0x5
3,092,908 UART: [art] Derive Key Pair - Done
3,107,549 UART: [art] Signing Cert with AUTHO
3,108,029 UART: RITY.KEYID = 7
3,122,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,672 UART: [art] PUB.X = 5B56FCB7DAB6561D2F2132686F9B22FB4830F22E0D0C7707775189163749907E4F22211888C22A441FE75CD0D8E2A664
3,130,427 UART: [art] PUB.Y = A21C3C4D408B1AA67EAE4FAF70A8A0994E0B214322B5449095B62F98DE39D4A3901302C87E8E973B4C04165302F5C448
3,137,365 UART: [art] SIG.R = 46A81BE6BBDDD466AB731B3BCED380432D464C2FCFBFD642DEF94038A2B7588172D1DCADAF88601F3355CBA0B35556A9
3,144,155 UART: [art] SIG.S = 45D8FFC009B9FBC1B24DA36D43BA94129980D77FB0AECC128ED7E9F12F5E3025AC890AD95EB3C83C199351B3C9F24ADB
3,167,792 UART: Caliptra RT
3,168,137 UART: [state] CFI Enabled
3,275,352 UART: [rt] RT listening for mailbox commands...
3,276,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,942 UART: [rt]cmd =0x41544d4e, len=14344
3,709,105 >>> mbox cmd response data (8 bytes)
3,709,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,169 UART: [rt]cmd =0x41545348, len=116
3,740,928 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 ready_for_fw is high
1,060,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,066 >>> mbox cmd response: success
2,689,134 UART:
2,689,150 UART: Running Caliptra FMC ...
2,689,558 UART:
2,689,701 UART: [state] CFI Enabled
2,700,344 UART: [fht] FMC Alias Private Key: 7
2,808,509 UART: [art] Extend RT PCRs Done
2,808,937 UART: [art] Lock RT PCRs Done
2,810,663 UART: [art] Populate DV Done
2,819,036 UART: [fht] FMC Alias Private Key: 7
2,820,218 UART: [art] Derive CDI
2,820,498 UART: [art] Store in in slot 0x4
2,905,959 UART: [art] Derive Key Pair
2,906,319 UART: [art] Store priv key in slot 0x5
2,919,403 UART: [art] Derive Key Pair - Done
2,933,925 UART: [art] Signing Cert with AUTHO
2,934,405 UART: RITY.KEYID = 7
2,949,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,360 UART: [art] PUB.X = CFE7D251F99D8BB59D2FD2229A33C5FFF47268E159AD03BF50DAC6079790EABF241FAB6027757F938340D6F917A7F1F5
2,957,136 UART: [art] PUB.Y = 714669F4846982D8A64D290659289C2C54642C1780C480208EBC74CA46769E674B83CEAFFA0AC4237F227B3AE4DF7F72
2,964,078 UART: [art] SIG.R = 1C4A3F6BBD5E81E4473AB648659F70D4920D25C9B25C803CB62E675BF063665C86FFAC5CCB973C0CF991939EB6FEB0C3
2,970,856 UART: [art] SIG.S = 4635B29A0A4625D49AB99F1118711A8A74F3C0D075E98B991F8709E0F50C7D134A55EF0A60D47CFEC2A34399FE8433F5
2,994,989 UART: Caliptra RT
2,995,334 UART: [state] CFI Enabled
3,103,345 UART: [rt] RT listening for mailbox commands...
3,104,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,833 UART: [rt]cmd =0x41544d4e, len=14344
3,536,730 >>> mbox cmd response data (8 bytes)
3,536,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,942 UART: [rt]cmd =0x41545348, len=116
3,568,741 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,724 UART: [ldev] ++
1,208,892 UART: [ldev] CDI.KEYID = 6
1,209,256 UART: [ldev] SUBJECT.KEYID = 5
1,209,683 UART: [ldev] AUTHORITY.KEYID = 7
1,210,146 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,242,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,973 UART: [fwproc] Recv command 0x46574c44
1,282,706 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,791 >>> mbox cmd response: success
2,773,996 UART: [afmc] ++
2,774,164 UART: [afmc] CDI.KEYID = 6
2,774,527 UART: [afmc] SUBJECT.KEYID = 7
2,774,953 UART: [afmc] AUTHORITY.KEYID = 5
2,810,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,329 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,048 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,981 UART: [afmc] --
2,853,905 UART: [cold-reset] --
2,854,595 UART: [state] Locking Datavault
2,855,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,378 UART: [state] Locking ICCM
2,856,812 UART: [exit] Launching FMC @ 0x40000130
2,862,141 UART:
2,862,157 UART: Running Caliptra FMC ...
2,862,565 UART:
2,862,619 UART: [state] CFI Enabled
2,873,114 UART: [fht] FMC Alias Private Key: 7
2,981,215 UART: [art] Extend RT PCRs Done
2,981,643 UART: [art] Lock RT PCRs Done
2,983,127 UART: [art] Populate DV Done
2,991,604 UART: [fht] FMC Alias Private Key: 7
2,992,642 UART: [art] Derive CDI
2,992,922 UART: [art] Store in in slot 0x4
3,078,441 UART: [art] Derive Key Pair
3,078,801 UART: [art] Store priv key in slot 0x5
3,092,439 UART: [art] Derive Key Pair - Done
3,107,065 UART: [art] Signing Cert with AUTHO
3,107,545 UART: RITY.KEYID = 7
3,122,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,260 UART: [art] PUB.X = 70D1D3F14E83A4826E5F655817A245CAC7CE733DFFCBAE78F782A4F72C4299AA75B0313803615B88088D9398D357E389
3,130,024 UART: [art] PUB.Y = 2EF15066B72D0F2BC2EDA47A3C6149E28DFE34162D5C02DBFFC99216337BA62F67448869EC8BF1FEC3E65F1F20256D96
3,136,980 UART: [art] SIG.R = 7D9687A02F5EA83693401833536E18C9C3D2933ACCE40089D1423C9D18F9D80F4D30B3A99AD048A61BBDE80A2FCE8AC7
3,143,730 UART: [art] SIG.S = 15C19100CBA92DE5989CA6FD5AF91D574E7969CBB23A2BC4061A9EBE42CB2EFB3900E8EAF106B8A94B7A969109C7E57C
3,167,548 UART: Caliptra RT
3,167,801 UART: [state] CFI Enabled
3,275,672 UART: [rt] RT listening for mailbox commands...
3,276,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,536 UART: [rt]cmd =0x41544d4e, len=14344
3,709,533 >>> mbox cmd response data (8 bytes)
3,709,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,783 UART: [rt]cmd =0x41545348, len=116
3,741,770 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,976 ready_for_fw is high
1,056,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,453 >>> mbox cmd response: success
2,687,019 UART:
2,687,035 UART: Running Caliptra FMC ...
2,687,443 UART:
2,687,497 UART: [state] CFI Enabled
2,698,068 UART: [fht] FMC Alias Private Key: 7
2,806,403 UART: [art] Extend RT PCRs Done
2,806,831 UART: [art] Lock RT PCRs Done
2,808,421 UART: [art] Populate DV Done
2,816,470 UART: [fht] FMC Alias Private Key: 7
2,817,482 UART: [art] Derive CDI
2,817,762 UART: [art] Store in in slot 0x4
2,903,681 UART: [art] Derive Key Pair
2,904,041 UART: [art] Store priv key in slot 0x5
2,917,205 UART: [art] Derive Key Pair - Done
2,932,342 UART: [art] Signing Cert with AUTHO
2,932,822 UART: RITY.KEYID = 7
2,947,842 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,607 UART: [art] PUB.X = 5E774B7B2521B4E3F88231ED7BD3F816A5F5ECA6829FFD6647008603859D7BB60A5C1D98C888C2DC0CAF6E3A3F05FAE1
2,955,357 UART: [art] PUB.Y = 11809E7F81C58496A54C1A6A73ED7DD1102A56DBC3528710CA8AE5DFC98631FB39080989822A5C74301B3E5546D1144D
2,962,299 UART: [art] SIG.R = DDA15A7E86741616EDAC4FEEAE255D74152D6BBCB26BABEB0E3C52A3422AC9C25A1F81760A32C7C7DC90DE4611D2C8E8
2,969,087 UART: [art] SIG.S = FEFE357BFC0AF770D1CA506B66516C8C0C6247544394A897EB660CB7C05755160BDCC06E1171AC7D3FFF67ADCC072153
2,992,557 UART: Caliptra RT
2,992,810 UART: [state] CFI Enabled
3,100,312 UART: [rt] RT listening for mailbox commands...
3,100,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,104 UART: [rt]cmd =0x41544d4e, len=14344
3,533,853 >>> mbox cmd response data (8 bytes)
3,533,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,991 UART: [rt]cmd =0x41545348, len=116
3,566,022 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,167 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,985 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,618 >>> mbox cmd response: success
2,775,749 UART: [afmc] ++
2,775,917 UART: [afmc] CDI.KEYID = 6
2,776,280 UART: [afmc] SUBJECT.KEYID = 7
2,776,706 UART: [afmc] AUTHORITY.KEYID = 5
2,812,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,136 UART: [afmc] --
2,856,092 UART: [cold-reset] --
2,856,752 UART: [state] Locking Datavault
2,857,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,207 UART: [state] Locking ICCM
2,858,765 UART: [exit] Launching FMC @ 0x40000130
2,864,094 UART:
2,864,110 UART: Running Caliptra FMC ...
2,864,518 UART:
2,864,661 UART: [state] CFI Enabled
2,875,270 UART: [fht] FMC Alias Private Key: 7
2,982,963 UART: [art] Extend RT PCRs Done
2,983,391 UART: [art] Lock RT PCRs Done
2,984,829 UART: [art] Populate DV Done
2,992,916 UART: [fht] FMC Alias Private Key: 7
2,993,920 UART: [art] Derive CDI
2,994,200 UART: [art] Store in in slot 0x4
3,080,185 UART: [art] Derive Key Pair
3,080,545 UART: [art] Store priv key in slot 0x5
3,093,561 UART: [art] Derive Key Pair - Done
3,108,258 UART: [art] Signing Cert with AUTHO
3,108,738 UART: RITY.KEYID = 7
3,124,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,959 UART: [art] PUB.X = 4666160E1C703434105EEBF05C1B7B88CB149378604ED68AC972174A5BDDB74F859210FDF37725EB35D7B8BCD7479296
3,131,726 UART: [art] PUB.Y = 038CF8972D5EA5870532F92F34AFED8E861CC215AB89B193A19090665C4E46BB7606E2A12DE623BEAA314762866A9224
3,138,667 UART: [art] SIG.R = F2127B78065F7F43281F09C2E9459A039DD0B721D1757883E3C9E2EBFC18A99C9F073F1C28BC4CEC07AAB572AEF74BEA
3,145,436 UART: [art] SIG.S = 68C3257F6E8B412F742D163BFD1DF9885BB9B47545BE0DCC0AE06A2456A9971268D86DAD2BC0995A66A6BEC699271F0F
3,169,022 UART: Caliptra RT
3,169,367 UART: [state] CFI Enabled
3,277,116 UART: [rt] RT listening for mailbox commands...
3,277,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,010 UART: [rt]cmd =0x41544d4e, len=14344
3,711,483 >>> mbox cmd response data (8 bytes)
3,711,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,563 UART: [rt]cmd =0x41545348, len=116
3,743,448 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,515 ready_for_fw is high
1,056,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,944 >>> mbox cmd response: success
2,684,062 UART:
2,684,078 UART: Running Caliptra FMC ...
2,684,486 UART:
2,684,629 UART: [state] CFI Enabled
2,695,154 UART: [fht] FMC Alias Private Key: 7
2,803,031 UART: [art] Extend RT PCRs Done
2,803,459 UART: [art] Lock RT PCRs Done
2,805,379 UART: [art] Populate DV Done
2,813,606 UART: [fht] FMC Alias Private Key: 7
2,814,694 UART: [art] Derive CDI
2,814,974 UART: [art] Store in in slot 0x4
2,900,841 UART: [art] Derive Key Pair
2,901,201 UART: [art] Store priv key in slot 0x5
2,914,841 UART: [art] Derive Key Pair - Done
2,929,591 UART: [art] Signing Cert with AUTHO
2,930,071 UART: RITY.KEYID = 7
2,945,089 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,854 UART: [art] PUB.X = A4BA92A737727C84901D53A3E97F4DC4DAAC44839B36A222D1059194D7E04FD6EDDA6F793E61EC6AD8CF6988CCB3A01B
2,952,637 UART: [art] PUB.Y = FE93C56D3B83B3C309FD785C005B68C5308D3CCC862925A549906348A0F17FA5FC6BD18F93E1F5272626099CA6124DC0
2,959,561 UART: [art] SIG.R = F27898A460D65F7B92B510B0CB4AAD0CA5D0AB2EBB7AF27DF859181C617651CA663BED6D106A50D811CAF56EA4FD1C5F
2,966,350 UART: [art] SIG.S = 625617EF39C54CCF75C91E7292C321C831F4AA24F4A5C074F8D2D0BF4189B6E3B7F37A831D5EA4A17D9D053DF9C41C06
2,990,097 UART: Caliptra RT
2,990,442 UART: [state] CFI Enabled
3,098,113 UART: [rt] RT listening for mailbox commands...
3,098,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,831 UART: [rt]cmd =0x41544d4e, len=14344
3,531,710 >>> mbox cmd response data (8 bytes)
3,531,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,758 UART: [rt]cmd =0x41545348, len=116
3,563,693 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
85,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,565 UART: [kat] SHA2-256
881,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,611 UART: [kat] ++
885,763 UART: [kat] sha1
889,959 UART: [kat] SHA2-256
891,897 UART: [kat] SHA2-384
894,584 UART: [kat] SHA2-512-ACC
896,485 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
907,052 UART: [kat] LMS
1,475,248 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,743 UART: [fht] Storing FHT @ 0x50003400
1,479,410 UART: [idev] ++
1,479,578 UART: [idev] CDI.KEYID = 6
1,479,938 UART: [idev] SUBJECT.KEYID = 7
1,480,362 UART: [idev] UDS.KEYID = 0
1,480,707 ready_for_fw is high
1,480,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,430 UART: [idev] Erasing UDS.KEYID = 0
1,504,780 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,183 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,152 UART: [ldev] --
1,585,605 UART: [fwproc] Waiting for Commands...
1,586,298 UART: [fwproc] Received command 0x46574c44
1,587,089 UART: [fwproc] Received Image of size 114332 bytes
2,885,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,442 >>> mbox cmd response: success
3,079,686 UART: [afmc] ++
3,079,854 UART: [afmc] CDI.KEYID = 6
3,080,216 UART: [afmc] SUBJECT.KEYID = 7
3,080,641 UART: [afmc] AUTHORITY.KEYID = 5
3,115,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,331 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,021 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,706 UART: [afmc] --
3,158,616 UART: [cold-reset] --
3,159,576 UART: [state] Locking Datavault
3,160,803 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,407 UART: [state] Locking ICCM
3,162,005 UART: [exit] Launching FMC @ 0x40000130
3,167,334 UART:
3,167,350 UART: Running Caliptra FMC ...
3,167,758 UART:
3,167,812 UART: [state] CFI Enabled
3,178,129 UART: [fht] FMC Alias Private Key: 7
3,286,328 UART: [art] Extend RT PCRs Done
3,286,756 UART: [art] Lock RT PCRs Done
3,288,034 UART: [art] Populate DV Done
3,296,267 UART: [fht] FMC Alias Private Key: 7
3,297,397 UART: [art] Derive CDI
3,297,677 UART: [art] Store in in slot 0x4
3,383,208 UART: [art] Derive Key Pair
3,383,568 UART: [art] Store priv key in slot 0x5
3,396,608 UART: [art] Derive Key Pair - Done
3,411,148 UART: [art] Signing Cert with AUTHO
3,411,628 UART: RITY.KEYID = 7
3,426,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,509 UART: [art] PUB.X = 62C96C18E18BDC2786203E64D920E31BEDACBAC2F4193155926745A76A7A677327841A0A7AECE1A0C0018DD4903FA203
3,434,274 UART: [art] PUB.Y = 1C225CC1B6372DDFBCB23AFE18A6CEFE1410A25A41F0A3795B5DF4A8EB8B5A17FA6F599E47A746C6B141AD17FED5207F
3,441,248 UART: [art] SIG.R = DAD71A5B40727F79B56E3CBEA77D6688CE3B00B743CA828926EA3C4977CBBD5BA9E77C27723272DB2B152A490F0BE323
3,448,002 UART: [art] SIG.S = 2FB5F849DCAB32883A0A5D247A610D8D6F3A036CF5D5E67435BF359FC4B5974F763449376585D27B95FF0320F6478323
3,472,303 UART: Caliptra RT
3,472,556 UART: [state] CFI Enabled
3,581,157 UART: [rt] RT listening for mailbox commands...
3,581,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,813 UART: [rt]cmd =0x41544d4e, len=14344
4,014,514 >>> mbox cmd response data (8 bytes)
4,014,515 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,740 UART: [rt]cmd =0x41545348, len=116
4,046,379 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 ready_for_fw is high
1,362,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,168 >>> mbox cmd response: success
2,988,956 UART:
2,988,972 UART: Running Caliptra FMC ...
2,989,380 UART:
2,989,434 UART: [state] CFI Enabled
3,000,119 UART: [fht] FMC Alias Private Key: 7
3,108,396 UART: [art] Extend RT PCRs Done
3,108,824 UART: [art] Lock RT PCRs Done
3,110,220 UART: [art] Populate DV Done
3,118,213 UART: [fht] FMC Alias Private Key: 7
3,119,293 UART: [art] Derive CDI
3,119,573 UART: [art] Store in in slot 0x4
3,204,970 UART: [art] Derive Key Pair
3,205,330 UART: [art] Store priv key in slot 0x5
3,218,298 UART: [art] Derive Key Pair - Done
3,233,029 UART: [art] Signing Cert with AUTHO
3,233,509 UART: RITY.KEYID = 7
3,249,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,934 UART: [art] PUB.X = 029868B9DF9AEC153E264B6FB11D3A977BB3A15A13B055BF772527950F9ACBAE87B62E3B898D11A3B1F57E8764B62EB2
3,256,708 UART: [art] PUB.Y = 4A3A98F343B2B4769BEF7A447EFDE4FC1ADEFECEAAE9F6CD0B78D25E3A8286134F17940518BCA420AFC1081B0AAAD7EC
3,263,676 UART: [art] SIG.R = B82396CE0A46ACD231E642F16DE9A4B78B4D84E063223F4B78539C6E0D6D4EE08F5A87D228248BC4DACF3F562CD22966
3,270,450 UART: [art] SIG.S = 39960BA4BF08598AAA4FDD6F9777C0664686E3002CDB85B1C9083E6A316612D324CDAA4446544FB70AD6DAE5EA0FCDCB
3,294,986 UART: Caliptra RT
3,295,239 UART: [state] CFI Enabled
3,402,642 UART: [rt] RT listening for mailbox commands...
3,403,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,176 UART: [rt]cmd =0x41544d4e, len=14344
3,836,889 >>> mbox cmd response data (8 bytes)
3,836,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,923 UART: [rt]cmd =0x41545348, len=116
3,868,656 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
903,013 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,127 UART: [idev] ++
1,480,295 UART: [idev] CDI.KEYID = 6
1,480,655 UART: [idev] SUBJECT.KEYID = 7
1,481,079 UART: [idev] UDS.KEYID = 0
1,481,424 ready_for_fw is high
1,481,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,143 UART: [idev] Erasing UDS.KEYID = 0
1,505,711 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,434 UART: [ldev] ++
1,515,602 UART: [ldev] CDI.KEYID = 6
1,515,965 UART: [ldev] SUBJECT.KEYID = 5
1,516,391 UART: [ldev] AUTHORITY.KEYID = 7
1,516,854 UART: [ldev] FE.KEYID = 1
1,521,972 UART: [ldev] Erasing FE.KEYID = 1
1,546,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,895 UART: [ldev] --
1,586,382 UART: [fwproc] Waiting for Commands...
1,587,037 UART: [fwproc] Received command 0x46574c44
1,587,828 UART: [fwproc] Received Image of size 114332 bytes
2,885,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,473 >>> mbox cmd response: success
3,079,677 UART: [afmc] ++
3,079,845 UART: [afmc] CDI.KEYID = 6
3,080,207 UART: [afmc] SUBJECT.KEYID = 7
3,080,632 UART: [afmc] AUTHORITY.KEYID = 5
3,116,003 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,667 UART: [afmc] --
3,159,577 UART: [cold-reset] --
3,160,263 UART: [state] Locking Datavault
3,161,724 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,328 UART: [state] Locking ICCM
3,162,788 UART: [exit] Launching FMC @ 0x40000130
3,168,117 UART:
3,168,133 UART: Running Caliptra FMC ...
3,168,541 UART:
3,168,684 UART: [state] CFI Enabled
3,179,501 UART: [fht] FMC Alias Private Key: 7
3,286,126 UART: [art] Extend RT PCRs Done
3,286,554 UART: [art] Lock RT PCRs Done
3,287,714 UART: [art] Populate DV Done
3,296,035 UART: [fht] FMC Alias Private Key: 7
3,297,047 UART: [art] Derive CDI
3,297,327 UART: [art] Store in in slot 0x4
3,382,916 UART: [art] Derive Key Pair
3,383,276 UART: [art] Store priv key in slot 0x5
3,396,400 UART: [art] Derive Key Pair - Done
3,410,893 UART: [art] Signing Cert with AUTHO
3,411,373 UART: RITY.KEYID = 7
3,426,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,130 UART: [art] PUB.X = 770FCC2783653D79039203112A059563C9DDD7FEB52B1F7543240918E434CA68E165A60652B312C3D08968158FBD49CA
3,433,874 UART: [art] PUB.Y = 57D7AE4CE1B02817FDC26BDE5B8A65AA134BB5BED0BC8763A9D3228FE2BBB90F245EF464B88239AD223C51D53351C05B
3,440,839 UART: [art] SIG.R = C85B96763DE3CEA110888FD3F9B284F9381DC2D12195861B5CD7C7A92274C61E92ED5300DD4E408D12ED406538EC9EEC
3,447,595 UART: [art] SIG.S = 8B9D49AF118D70DD74211BF7A22008EC6536137FB39824B09F2C435D21D03FB74603A7AA264B7EA4E885BAEE5B980355
3,471,425 UART: Caliptra RT
3,471,770 UART: [state] CFI Enabled
3,579,928 UART: [rt] RT listening for mailbox commands...
3,580,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,696 UART: [rt]cmd =0x41544d4e, len=14344
4,013,693 >>> mbox cmd response data (8 bytes)
4,013,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,903 UART: [rt]cmd =0x41545348, len=116
4,045,618 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 ready_for_fw is high
1,362,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,621 >>> mbox cmd response: success
2,990,677 UART:
2,990,693 UART: Running Caliptra FMC ...
2,991,101 UART:
2,991,244 UART: [state] CFI Enabled
3,001,677 UART: [fht] FMC Alias Private Key: 7
3,109,082 UART: [art] Extend RT PCRs Done
3,109,510 UART: [art] Lock RT PCRs Done
3,110,900 UART: [art] Populate DV Done
3,118,931 UART: [fht] FMC Alias Private Key: 7
3,120,107 UART: [art] Derive CDI
3,120,387 UART: [art] Store in in slot 0x4
3,206,264 UART: [art] Derive Key Pair
3,206,624 UART: [art] Store priv key in slot 0x5
3,219,730 UART: [art] Derive Key Pair - Done
3,234,235 UART: [art] Signing Cert with AUTHO
3,234,715 UART: RITY.KEYID = 7
3,250,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,014 UART: [art] PUB.X = 47F227E581D00A1DDC255E66A4DB62E691AA43770B9F5BA457C8DAB3645DAB656ED593E84A14F5C329D4B776793B6344
3,257,784 UART: [art] PUB.Y = 2710A804600AE886CB802621F4D99C22FE9EC96B57C76B794BE4A673D2A43F13C6F9337ACB5C7231ABD45A51BE8A7D17
3,264,736 UART: [art] SIG.R = B5AFA84DB379EBE3D0E9298166B1A5BDC16DD3EDA1D5DF3B72393E86AAEFF7C6FA602FC43618DD391EEEE581A36B35C9
3,271,534 UART: [art] SIG.S = 8ADCD0968F562C72AF4556717D198AEDB62BCD74530AC1C2C3EFFB0A3E8CD4487ABB64FDC871A636FF6483B386BD25F5
3,295,593 UART: Caliptra RT
3,295,938 UART: [state] CFI Enabled
3,403,656 UART: [rt] RT listening for mailbox commands...
3,404,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,742 UART: [rt]cmd =0x41544d4e, len=14344
3,837,501 >>> mbox cmd response data (8 bytes)
3,837,502 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,463 UART: [rt]cmd =0x41545348, len=116
3,869,536 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,280 UART: [kat] LMS
1,170,608 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,171,903 UART: [fht] FHT @ 0x50003400
1,174,480 UART: [idev] ++
1,174,648 UART: [idev] CDI.KEYID = 6
1,175,008 UART: [idev] SUBJECT.KEYID = 7
1,175,432 UART: [idev] UDS.KEYID = 0
1,175,777 ready_for_fw is high
1,175,777 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,208,741 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,493 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,444 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,571 >>> mbox cmd response: success
2,775,629 UART: [afmc] ++
2,775,797 UART: [afmc] CDI.KEYID = 6
2,776,159 UART: [afmc] SUBJECT.KEYID = 7
2,776,584 UART: [afmc] AUTHORITY.KEYID = 5
2,812,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,260 UART: [afmc] --
2,855,286 UART: [cold-reset] --
2,856,092 UART: [state] Locking Datavault
2,857,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,939 UART: [state] Locking ICCM
2,858,365 UART: [exit] Launching FMC @ 0x40000130
2,863,694 UART:
2,863,710 UART: Running Caliptra FMC ...
2,864,118 UART:
2,864,172 UART: [state] CFI Enabled
2,874,907 UART: [fht] FMC Alias Private Key: 7
2,982,950 UART: [art] Extend RT PCRs Done
2,983,378 UART: [art] Lock RT PCRs Done
2,984,840 UART: [art] Populate DV Done
2,992,887 UART: [fht] FMC Alias Private Key: 7
2,994,027 UART: [art] Derive CDI
2,994,307 UART: [art] Store in in slot 0x4
3,079,880 UART: [art] Derive Key Pair
3,080,240 UART: [art] Store priv key in slot 0x5
3,093,438 UART: [art] Derive Key Pair - Done
3,107,727 UART: [art] Signing Cert with AUTHO
3,108,207 UART: RITY.KEYID = 7
3,123,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,044 UART: [art] PUB.X = 787F1ECE1A13EAB3E92639889E2D2A964B86E24D5FEFCF3774CEEBF85BDB265F775B3DA6D4F6B833A6109357DC38A8AF
3,130,834 UART: [art] PUB.Y = C0A70BFD73CDB121E9D63BAAE4D0553B8C1A568E34C43F60965A03B7C4E9109EF47EDD10B8EF4A7F385F44CD0C50244A
3,137,793 UART: [art] SIG.R = 49379EBB507779B7F75E39BA12D7DE275B53CCD1FDD22D377103AE162EE7CA554019C86500215D3E08966FB60A1D118E
3,144,536 UART: [art] SIG.S = CA6CD546EC17647A9BBE17A971EEB6CC582B88F8F8A4315EBA39B5A4B6EC6F223C8BDD51E5A047FEB0C7287EA36ED101
3,167,800 UART: Caliptra RT
3,168,053 UART: [state] CFI Enabled
3,276,442 UART: [rt] RT listening for mailbox commands...
3,277,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,018 UART: [rt]cmd =0x41544d4e, len=14344
3,709,769 >>> mbox cmd response data (8 bytes)
3,709,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,607 UART: [rt]cmd =0x41545348, len=116
3,741,170 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,503 ready_for_fw is high
1,059,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,556 >>> mbox cmd response: success
2,688,340 UART:
2,688,356 UART: Running Caliptra FMC ...
2,688,764 UART:
2,688,818 UART: [state] CFI Enabled
2,699,185 UART: [fht] FMC Alias Private Key: 7
2,807,150 UART: [art] Extend RT PCRs Done
2,807,578 UART: [art] Lock RT PCRs Done
2,809,654 UART: [art] Populate DV Done
2,817,693 UART: [fht] FMC Alias Private Key: 7
2,818,715 UART: [art] Derive CDI
2,818,995 UART: [art] Store in in slot 0x4
2,904,640 UART: [art] Derive Key Pair
2,905,000 UART: [art] Store priv key in slot 0x5
2,918,140 UART: [art] Derive Key Pair - Done
2,933,113 UART: [art] Signing Cert with AUTHO
2,933,593 UART: RITY.KEYID = 7
2,948,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,268 UART: [art] PUB.X = 14850FEE777E5406B4FA7933FD43F8B17859C0590070EE121AE7528CB7596A260DC06DDD0B001B58663801C046A0BABD
2,955,981 UART: [art] PUB.Y = 49D239260447160953BA0ACFA1380A87371CA139B08B6DEAB7ED85EA4C29A11C0851DD6C68B3894E46AB3FE3F51558B2
2,962,922 UART: [art] SIG.R = 54B1E20CC9CEE12818672F25EFF431AC69D0F4F5619EA331D482307F810F5EFAF5DA36EBD6450B95CE88DD30F368922E
2,969,695 UART: [art] SIG.S = 8D97E36CDB1F2ADAA0B185A92368EFAFE28F958EDA1419FDEFEB3E7F0D5A550B0C99C998D4146451E4D3F87C874B7362
2,993,667 UART: Caliptra RT
2,993,920 UART: [state] CFI Enabled
3,102,057 UART: [rt] RT listening for mailbox commands...
3,102,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,479 UART: [rt]cmd =0x41544d4e, len=14344
3,535,386 >>> mbox cmd response data (8 bytes)
3,535,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,522 UART: [rt]cmd =0x41545348, len=116
3,566,973 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
893,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,094 UART: [kat] ++
898,246 UART: [kat] sha1
902,476 UART: [kat] SHA2-256
904,416 UART: [kat] SHA2-384
907,239 UART: [kat] SHA2-512-ACC
909,140 UART: [kat] ECC-384
919,121 UART: [kat] HMAC-384Kdf
923,679 UART: [kat] LMS
1,172,007 UART: [kat] --
1,172,838 UART: [cold-reset] ++
1,173,286 UART: [fht] FHT @ 0x50003400
1,176,093 UART: [idev] ++
1,176,261 UART: [idev] CDI.KEYID = 6
1,176,621 UART: [idev] SUBJECT.KEYID = 7
1,177,045 UART: [idev] UDS.KEYID = 0
1,177,390 ready_for_fw is high
1,177,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,265 UART: [idev] Erasing UDS.KEYID = 0
1,202,396 UART: [idev] Sha1 KeyId Algorithm
1,211,100 UART: [idev] --
1,212,058 UART: [ldev] ++
1,212,226 UART: [ldev] CDI.KEYID = 6
1,212,589 UART: [ldev] SUBJECT.KEYID = 5
1,213,015 UART: [ldev] AUTHORITY.KEYID = 7
1,213,478 UART: [ldev] FE.KEYID = 1
1,218,708 UART: [ldev] Erasing FE.KEYID = 1
1,245,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,204 UART: [ldev] --
1,284,663 UART: [fwproc] Wait for Commands...
1,285,253 UART: [fwproc] Recv command 0x46574c44
1,285,981 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,145 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,378 >>> mbox cmd response: success
2,776,640 UART: [afmc] ++
2,776,808 UART: [afmc] CDI.KEYID = 6
2,777,170 UART: [afmc] SUBJECT.KEYID = 7
2,777,595 UART: [afmc] AUTHORITY.KEYID = 5
2,813,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,019 UART: [afmc] --
2,856,953 UART: [cold-reset] --
2,857,743 UART: [state] Locking Datavault
2,858,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,526 UART: [state] Locking ICCM
2,860,126 UART: [exit] Launching FMC @ 0x40000130
2,865,455 UART:
2,865,471 UART: Running Caliptra FMC ...
2,865,879 UART:
2,866,022 UART: [state] CFI Enabled
2,876,577 UART: [fht] FMC Alias Private Key: 7
2,984,700 UART: [art] Extend RT PCRs Done
2,985,128 UART: [art] Lock RT PCRs Done
2,986,374 UART: [art] Populate DV Done
2,994,831 UART: [fht] FMC Alias Private Key: 7
2,995,789 UART: [art] Derive CDI
2,996,069 UART: [art] Store in in slot 0x4
3,081,756 UART: [art] Derive Key Pair
3,082,116 UART: [art] Store priv key in slot 0x5
3,096,014 UART: [art] Derive Key Pair - Done
3,110,409 UART: [art] Signing Cert with AUTHO
3,110,889 UART: RITY.KEYID = 7
3,125,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,508 UART: [art] PUB.X = AEE0A784FD292BBCCCE84A54D2816D24459B6C26B6241104BAD755387A0DDFCABEE5104296634D182C56801EFFCC0608
3,133,278 UART: [art] PUB.Y = 4DE1F0B68CE67CC83EA71B28C03B83465F875737AE7AFEDA2677395A3286D2FAB75D6D7AD9D74369C3BE3BC75791F31D
3,140,242 UART: [art] SIG.R = 68B416C7D9AF313D56DCA02531858A493A786C6E07C6F051E8099E1C44FB0DCB24DAFCB0AB04350AF64AE4A36E74D856
3,147,009 UART: [art] SIG.S = FDDE3EDABB6E324960C664E92200E1734DEC7308AEBF64D0D7404ACA50AC5C6B19162D805C58BDAC94B48C48547724AB
3,170,721 UART: Caliptra RT
3,171,066 UART: [state] CFI Enabled
3,279,621 UART: [rt] RT listening for mailbox commands...
3,280,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,173 UART: [rt]cmd =0x41544d4e, len=14344
3,712,562 >>> mbox cmd response data (8 bytes)
3,712,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,688 UART: [rt]cmd =0x41545348, len=116
3,744,373 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,448 ready_for_fw is high
1,060,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,649 >>> mbox cmd response: success
2,690,103 UART:
2,690,119 UART: Running Caliptra FMC ...
2,690,527 UART:
2,690,670 UART: [state] CFI Enabled
2,701,427 UART: [fht] FMC Alias Private Key: 7
2,809,948 UART: [art] Extend RT PCRs Done
2,810,376 UART: [art] Lock RT PCRs Done
2,811,698 UART: [art] Populate DV Done
2,819,979 UART: [fht] FMC Alias Private Key: 7
2,821,059 UART: [art] Derive CDI
2,821,339 UART: [art] Store in in slot 0x4
2,907,140 UART: [art] Derive Key Pair
2,907,500 UART: [art] Store priv key in slot 0x5
2,920,650 UART: [art] Derive Key Pair - Done
2,935,266 UART: [art] Signing Cert with AUTHO
2,935,746 UART: RITY.KEYID = 7
2,950,580 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,345 UART: [art] PUB.X = CD24CA314701167F5BB7B1396FA53747582D4F00C54187D6D8E60B79E398EE8A795A07F904613C6630B95A444997889F
2,958,073 UART: [art] PUB.Y = 7776E4D076534FCDECBE79DE8929DB8FFCE86F4E94C4AED04951EF31A0F1F10E9F5B6C0B088DEE8A37F336DDD0B6ACD7
2,965,042 UART: [art] SIG.R = ACCF046E1C5D434EFFFD13D1B891DF34013B614233CC514CE39703D5E36EEE117CAB0A2B60AF6B97C3C98A3E22CEE8B4
2,971,822 UART: [art] SIG.S = 3A9DB6BB7AA882B288381E7845C802C60A675A58E6FAA9B024090ECE3EB8C08BD1FA14E4E6169C8DF2EB5E96199FD16A
2,995,563 UART: Caliptra RT
2,995,908 UART: [state] CFI Enabled
3,103,737 UART: [rt] RT listening for mailbox commands...
3,104,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,603 UART: [rt]cmd =0x41544d4e, len=14344
3,538,460 >>> mbox cmd response data (8 bytes)
3,538,461 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,672 UART: [rt]cmd =0x41545348, len=116
3,570,427 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,208,970 UART: [ldev] ++
1,209,138 UART: [ldev] CDI.KEYID = 6
1,209,502 UART: [ldev] SUBJECT.KEYID = 5
1,209,929 UART: [ldev] AUTHORITY.KEYID = 7
1,210,392 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,258 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,445 >>> mbox cmd response: success
2,772,478 UART: [afmc] ++
2,772,646 UART: [afmc] CDI.KEYID = 6
2,773,009 UART: [afmc] SUBJECT.KEYID = 7
2,773,435 UART: [afmc] AUTHORITY.KEYID = 5
2,809,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,891 UART: [afmc] --
2,852,945 UART: [cold-reset] --
2,853,853 UART: [state] Locking Datavault
2,854,990 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,594 UART: [state] Locking ICCM
2,856,198 UART: [exit] Launching FMC @ 0x40000130
2,861,527 UART:
2,861,543 UART: Running Caliptra FMC ...
2,861,951 UART:
2,862,005 UART: [state] CFI Enabled
2,872,526 UART: [fht] FMC Alias Private Key: 7
2,980,239 UART: [art] Extend RT PCRs Done
2,980,667 UART: [art] Lock RT PCRs Done
2,982,235 UART: [art] Populate DV Done
2,990,642 UART: [fht] FMC Alias Private Key: 7
2,991,660 UART: [art] Derive CDI
2,991,940 UART: [art] Store in in slot 0x4
3,077,791 UART: [art] Derive Key Pair
3,078,151 UART: [art] Store priv key in slot 0x5
3,091,405 UART: [art] Derive Key Pair - Done
3,105,808 UART: [art] Signing Cert with AUTHO
3,106,288 UART: RITY.KEYID = 7
3,121,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,121 UART: [art] PUB.X = 6E03D2F31DB0A81D7CA8CAF3ACE6D06E349A38566F59AC97796D2603797C6CFEF98DB2DD671EB0231901DC1E8613BAEF
3,128,900 UART: [art] PUB.Y = 458B6A5EE6090582F81F1866405B6748225E43B5CEA0EB4FA0C3F5AD62E3566BE2B546908857FBEF87EA217A599C5294
3,135,846 UART: [art] SIG.R = FA2BA5458D06D1790633A231B1738F5477831F719230B8F21C4EF70FEA45789E0F0E79E6002D463AF3F686D32CD17B3A
3,142,579 UART: [art] SIG.S = 27BBC11505A27CBC51569CA7AEEBD9B3B6CF7A990A3883C513114AEF38519A9E06DA1764156C439894AE6A8BF4F736E4
3,166,529 UART: Caliptra RT
3,166,782 UART: [state] CFI Enabled
3,274,223 UART: [rt] RT listening for mailbox commands...
3,274,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,859 UART: [rt]cmd =0x41544d4e, len=14344
3,707,548 >>> mbox cmd response data (8 bytes)
3,707,549 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,902 UART: [rt]cmd =0x41545348, len=116
3,739,701 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,046 ready_for_fw is high
1,056,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,149 >>> mbox cmd response: success
2,685,855 UART:
2,685,871 UART: Running Caliptra FMC ...
2,686,279 UART:
2,686,333 UART: [state] CFI Enabled
2,696,470 UART: [fht] FMC Alias Private Key: 7
2,804,759 UART: [art] Extend RT PCRs Done
2,805,187 UART: [art] Lock RT PCRs Done
2,806,777 UART: [art] Populate DV Done
2,815,038 UART: [fht] FMC Alias Private Key: 7
2,815,966 UART: [art] Derive CDI
2,816,246 UART: [art] Store in in slot 0x4
2,902,145 UART: [art] Derive Key Pair
2,902,505 UART: [art] Store priv key in slot 0x5
2,915,809 UART: [art] Derive Key Pair - Done
2,930,568 UART: [art] Signing Cert with AUTHO
2,931,048 UART: RITY.KEYID = 7
2,946,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,091 UART: [art] PUB.X = BE6FD85B65485872B0CFB8B60EDDB3482AC0D4DB748A6D4A0B09017A2B5B66EF3E06E902CCB112079473FF417B8D4433
2,953,852 UART: [art] PUB.Y = 84C45827DF508FB1CB178AA99EF908B03EE32DBBD9DF0DF837FD766EBFDD24EA8BFD2EA1080C7DFA499776EC348768D2
2,960,814 UART: [art] SIG.R = F23F27A0C19CBE8A31C74243D61FA95E8BC38118D76D3646F98F8471A36F96C8D53FF81E98C1215B7ECA1857FD9234ED
2,967,592 UART: [art] SIG.S = 07215B3749EAFE9358BC491E5A421383C6E8DC5893E8402846CF44279E9C3F39710E3044EBF6DEC2E755B0585058B3E2
2,990,937 UART: Caliptra RT
2,991,190 UART: [state] CFI Enabled
3,099,579 UART: [rt] RT listening for mailbox commands...
3,100,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,207 UART: [rt]cmd =0x41544d4e, len=14344
3,533,066 >>> mbox cmd response data (8 bytes)
3,533,067 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,284 UART: [rt]cmd =0x41545348, len=116
3,564,929 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,434 UART: [kat] SHA2-256
902,374 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 ready_for_fw is high
1,174,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,832 UART: [idev] Erasing UDS.KEYID = 0
1,200,016 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,210 >>> mbox cmd response: success
2,775,299 UART: [afmc] ++
2,775,467 UART: [afmc] CDI.KEYID = 6
2,775,830 UART: [afmc] SUBJECT.KEYID = 7
2,776,256 UART: [afmc] AUTHORITY.KEYID = 5
2,811,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,300 UART: [afmc] --
2,855,256 UART: [cold-reset] --
2,856,098 UART: [state] Locking Datavault
2,857,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,139 UART: [state] Locking ICCM
2,858,583 UART: [exit] Launching FMC @ 0x40000130
2,863,912 UART:
2,863,928 UART: Running Caliptra FMC ...
2,864,336 UART:
2,864,479 UART: [state] CFI Enabled
2,875,002 UART: [fht] FMC Alias Private Key: 7
2,981,797 UART: [art] Extend RT PCRs Done
2,982,225 UART: [art] Lock RT PCRs Done
2,983,583 UART: [art] Populate DV Done
2,992,092 UART: [fht] FMC Alias Private Key: 7
2,993,178 UART: [art] Derive CDI
2,993,458 UART: [art] Store in in slot 0x4
3,079,191 UART: [art] Derive Key Pair
3,079,551 UART: [art] Store priv key in slot 0x5
3,092,081 UART: [art] Derive Key Pair - Done
3,106,582 UART: [art] Signing Cert with AUTHO
3,107,062 UART: RITY.KEYID = 7
3,121,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,743 UART: [art] PUB.X = 81455300E2DA6C6375CEC994A6AFE9F3EBC4CD67C530D8FE0A57240727428C7E1474AECAE739EC3BF3A186B4A2692441
3,129,495 UART: [art] PUB.Y = 97409EF3A185DBD262101EC20BC1E4BDE79C0EF773104FEF76FCBF43A42D900D15453CCC472D2DA2B968E72AD5F8DB8F
3,136,456 UART: [art] SIG.R = 15BD65B1DCE9E6ADC3294D96702FDB24D30A543F8F20D53881CADDE40D8F6E3E055857F5C6D40B9828B70592A0F95F3B
3,143,223 UART: [art] SIG.S = A69A956D6280938FE9F5322FCC1732DA67138F5A1BDC5775D1782867D8E382A3E7489931882ABB1856C110AAB50F12A5
3,167,443 UART: Caliptra RT
3,167,788 UART: [state] CFI Enabled
3,275,053 UART: [rt] RT listening for mailbox commands...
3,275,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,815 UART: [rt]cmd =0x41544d4e, len=14344
3,708,806 >>> mbox cmd response data (8 bytes)
3,708,807 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,804 UART: [rt]cmd =0x41545348, len=116
3,740,641 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,961 ready_for_fw is high
1,056,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,322 >>> mbox cmd response: success
2,684,368 UART:
2,684,384 UART: Running Caliptra FMC ...
2,684,792 UART:
2,684,935 UART: [state] CFI Enabled
2,695,978 UART: [fht] FMC Alias Private Key: 7
2,803,553 UART: [art] Extend RT PCRs Done
2,803,981 UART: [art] Lock RT PCRs Done
2,805,719 UART: [art] Populate DV Done
2,813,890 UART: [fht] FMC Alias Private Key: 7
2,815,004 UART: [art] Derive CDI
2,815,284 UART: [art] Store in in slot 0x4
2,900,605 UART: [art] Derive Key Pair
2,900,965 UART: [art] Store priv key in slot 0x5
2,914,611 UART: [art] Derive Key Pair - Done
2,929,569 UART: [art] Signing Cert with AUTHO
2,930,049 UART: RITY.KEYID = 7
2,945,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,824 UART: [art] PUB.X = A7D6900402023686FD900CC206E3C378AAC3823CE3A0787E6FD70809FEE40A3550EB75343F086D0897876ACF60AAB4A0
2,952,566 UART: [art] PUB.Y = E203F0EB6EB2CA22F22D7E32AEC18B8C8726C38D9D4143171D04A02F7BAEEAECD62E1BBF828931BE2FA469FDDB188830
2,959,532 UART: [art] SIG.R = C06E3AA6A39DFA3A96E0E61A738F8DDB7FDF2F2BCBAC48078A02B8F7E1AA6D0B5CA26784242D1E51702D67C785C94914
2,966,311 UART: [art] SIG.S = 4D212A2021162056D0FB8C404D5F87A7243385C0FE2E0D7F2D5E39FAF69EF414434E9BEA1C852921355D0865C82195EA
2,990,326 UART: Caliptra RT
2,990,671 UART: [state] CFI Enabled
3,097,692 UART: [rt] RT listening for mailbox commands...
3,098,362 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,080 UART: [rt]cmd =0x41544d4e, len=14344
3,530,533 >>> mbox cmd response data (8 bytes)
3,530,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,875 UART: [rt]cmd =0x41545348, len=116
3,562,706 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,417 UART: [cold-reset] ++
1,476,879 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 ready_for_fw is high
1,480,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,674 UART: [idev] Erasing UDS.KEYID = 0
1,505,234 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,546,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,872 UART: [ldev] --
1,586,249 UART: [fwproc] Waiting for Commands...
1,586,902 UART: [fwproc] Received command 0x46574c44
1,587,693 UART: [fwproc] Received Image of size 114332 bytes
2,885,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,530 >>> mbox cmd response: success
3,079,620 UART: [afmc] ++
3,079,788 UART: [afmc] CDI.KEYID = 6
3,080,150 UART: [afmc] SUBJECT.KEYID = 7
3,080,575 UART: [afmc] AUTHORITY.KEYID = 5
3,115,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,544 UART: [afmc] --
3,158,526 UART: [cold-reset] --
3,159,474 UART: [state] Locking Datavault
3,160,493 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,097 UART: [state] Locking ICCM
3,161,755 UART: [exit] Launching FMC @ 0x40000130
3,167,084 UART:
3,167,100 UART: Running Caliptra FMC ...
3,167,508 UART:
3,167,562 UART: [state] CFI Enabled
3,178,355 UART: [fht] FMC Alias Private Key: 7
3,286,904 UART: [art] Extend RT PCRs Done
3,287,332 UART: [art] Lock RT PCRs Done
3,289,070 UART: [art] Populate DV Done
3,297,459 UART: [fht] FMC Alias Private Key: 7
3,298,417 UART: [art] Derive CDI
3,298,697 UART: [art] Store in in slot 0x4
3,384,456 UART: [art] Derive Key Pair
3,384,816 UART: [art] Store priv key in slot 0x5
3,397,972 UART: [art] Derive Key Pair - Done
3,412,870 UART: [art] Signing Cert with AUTHO
3,413,350 UART: RITY.KEYID = 7
3,428,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,481 UART: [art] PUB.X = 5A831D6EA71E4482D885F98C85393D747AFD79A92F6E18B6A225CF9E2137E109CFF9BA7D9ED748E6BF5A5480F4B54A57
3,436,258 UART: [art] PUB.Y = 30DEA2CC964CEF1A3267286291C16371D92215B4136199C30D9105E2D5B35A1B86DE4C57FE60B17E6262DE9BA78D3EB0
3,443,206 UART: [art] SIG.R = B9A00FB1CD036F3FF9C3DA9578AF9C0603393536F15506FD3A129DD6F63F09FDE0D1A534F89617DBB66847198AC3CC1E
3,449,970 UART: [art] SIG.S = DA545A2B2A9BEE31C74B27D0D9BBBD30AD589CA6AE3E0BD3472EE3033A2468669E052E06B52864626D18811C8A36F1C7
3,473,507 UART: Caliptra RT
3,473,760 UART: [state] CFI Enabled
3,581,352 UART: [rt] RT listening for mailbox commands...
3,582,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,172 UART: [rt]cmd =0x41544d4e, len=14344
4,014,979 >>> mbox cmd response data (8 bytes)
4,014,980 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,885 UART: [rt]cmd =0x41545348, len=116
4,067,446 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,938 UART: [kat] HMAC-384Kdf
907,680 UART: [kat] LMS
1,475,876 UART: [kat] --
1,476,945 UART: [cold-reset] ++
1,477,313 UART: [fht] Storing FHT @ 0x50003400
1,480,190 UART: [idev] ++
1,480,358 UART: [idev] CDI.KEYID = 6
1,480,718 UART: [idev] SUBJECT.KEYID = 7
1,481,142 UART: [idev] UDS.KEYID = 0
1,481,487 ready_for_fw is high
1,481,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,980 UART: [idev] Erasing UDS.KEYID = 0
1,505,034 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,514,969 UART: [ldev] ++
1,515,137 UART: [ldev] CDI.KEYID = 6
1,515,500 UART: [ldev] SUBJECT.KEYID = 5
1,515,926 UART: [ldev] AUTHORITY.KEYID = 7
1,516,389 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,344 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,570 UART: [fwproc] Received command 0x46574c44
1,587,361 UART: [fwproc] Received Image of size 114332 bytes
2,884,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,451 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,546 >>> mbox cmd response: success
3,078,590 UART: [afmc] ++
3,078,758 UART: [afmc] CDI.KEYID = 6
3,079,120 UART: [afmc] SUBJECT.KEYID = 7
3,079,545 UART: [afmc] AUTHORITY.KEYID = 5
3,114,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,076 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,469 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,159 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,998 UART: [afmc] --
3,157,080 UART: [cold-reset] --
3,157,832 UART: [state] Locking Datavault
3,158,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,599 UART: [state] Locking ICCM
3,160,211 UART: [exit] Launching FMC @ 0x40000130
3,165,540 UART:
3,165,556 UART: Running Caliptra FMC ...
3,165,964 UART:
3,166,018 UART: [state] CFI Enabled
3,176,659 UART: [fht] FMC Alias Private Key: 7
3,284,550 UART: [art] Extend RT PCRs Done
3,284,978 UART: [art] Lock RT PCRs Done
3,286,776 UART: [art] Populate DV Done
3,294,893 UART: [fht] FMC Alias Private Key: 7
3,296,043 UART: [art] Derive CDI
3,296,323 UART: [art] Store in in slot 0x4
3,382,036 UART: [art] Derive Key Pair
3,382,396 UART: [art] Store priv key in slot 0x5
3,395,766 UART: [art] Derive Key Pair - Done
3,410,485 UART: [art] Signing Cert with AUTHO
3,410,965 UART: RITY.KEYID = 7
3,426,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,930 UART: [art] PUB.X = 28C3939940DB0F23149E7C0CE5994BD145B6548D755702B61D8272F755D435BC9D88963E91ACF38744DC8741379D6131
3,433,681 UART: [art] PUB.Y = 0A7C8A3A7E014C76563FE09A0531CE530EF29E380B0ED5A246388673510E3234EEA9E7B14C0B945F1478770EECAEE011
3,440,608 UART: [art] SIG.R = 63D9D81BE9A9EEB31C339B9D4F9616A4A7941425C8777F1DEEF3B3A1DDA0F76206C848E701211149B58803A3E3692EEC
3,447,375 UART: [art] SIG.S = 1DFABF6BDABA414DB7888E169FA159BA06A9B443ECE50740AA8AC5116B5E402D8E476AE1875A91D216373AC33899C0F3
3,470,624 UART: Caliptra RT
3,470,877 UART: [state] CFI Enabled
3,578,583 UART: [rt] RT listening for mailbox commands...
3,579,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,365 UART: [rt]cmd =0x41544d4e, len=14344
4,012,249 >>> mbox cmd response data (8 bytes)
4,012,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,153 UART: [rt]cmd =0x41545348, len=116
4,044,042 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,271 ready_for_fw is high
1,362,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,662 >>> mbox cmd response: success
2,988,872 UART:
2,988,888 UART: Running Caliptra FMC ...
2,989,296 UART:
2,989,350 UART: [state] CFI Enabled
2,999,389 UART: [fht] FMC Alias Private Key: 7
3,107,752 UART: [art] Extend RT PCRs Done
3,108,180 UART: [art] Lock RT PCRs Done
3,109,776 UART: [art] Populate DV Done
3,118,113 UART: [fht] FMC Alias Private Key: 7
3,119,129 UART: [art] Derive CDI
3,119,409 UART: [art] Store in in slot 0x4
3,205,206 UART: [art] Derive Key Pair
3,205,566 UART: [art] Store priv key in slot 0x5
3,218,540 UART: [art] Derive Key Pair - Done
3,233,569 UART: [art] Signing Cert with AUTHO
3,234,049 UART: RITY.KEYID = 7
3,248,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,696 UART: [art] PUB.X = B7518ACA68BA3706AD9DCE8B5EE3AAFC8D01BA6D775D4AFB3FC99053D3643EDC3772884464436F60B0A34B44BF7B2E46
3,256,478 UART: [art] PUB.Y = 36178A164330FC6CC0263F856E5489627ED407E10EC9439533C5271913F9A4D0D13A66C9538679A9AE65CBB36141208C
3,263,412 UART: [art] SIG.R = 04113FEBD130ECD75D581105919ED6AD5FFE045C9F36C251BD5A4203009FB134F356C3FF1B0FD3BB8026A44607538F4E
3,270,150 UART: [art] SIG.S = 7DD8FD41AAA2850737BDF76C7F757911D7B7BD7927D4F3C3CC5B96D118BB9E7730B16C72F560586119750679B843FD4F
3,294,041 UART: Caliptra RT
3,294,294 UART: [state] CFI Enabled
3,402,164 UART: [rt] RT listening for mailbox commands...
3,402,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,766 UART: [rt]cmd =0x41544d4e, len=14344
3,835,937 >>> mbox cmd response data (8 bytes)
3,835,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,095 UART: [rt]cmd =0x41545348, len=116
3,887,626 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,715 ready_for_fw is high
1,362,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,708 >>> mbox cmd response: success
2,990,188 UART:
2,990,204 UART: Running Caliptra FMC ...
2,990,612 UART:
2,990,666 UART: [state] CFI Enabled
3,001,057 UART: [fht] FMC Alias Private Key: 7
3,109,398 UART: [art] Extend RT PCRs Done
3,109,826 UART: [art] Lock RT PCRs Done
3,111,222 UART: [art] Populate DV Done
3,119,581 UART: [fht] FMC Alias Private Key: 7
3,120,677 UART: [art] Derive CDI
3,120,957 UART: [art] Store in in slot 0x4
3,206,692 UART: [art] Derive Key Pair
3,207,052 UART: [art] Store priv key in slot 0x5
3,220,342 UART: [art] Derive Key Pair - Done
3,234,973 UART: [art] Signing Cert with AUTHO
3,235,453 UART: RITY.KEYID = 7
3,250,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,372 UART: [art] PUB.X = E38D8E17A572303C16FA1B153C0054665A0474E87974562778CF6BAF2487A210BE6A74D2B490EE31DF94E319A3C37FF7
3,258,117 UART: [art] PUB.Y = D3CC78971F38D9B6FCEA5B8096F78C993D028D36673130F16BDDD05C281E027B3FF62B660C4DCF9B7C4FDDD16DB1B992
3,265,074 UART: [art] SIG.R = A6FC666E46E308D8B67ED0FBDB5BCCEDB44003F6A9C84075AA23209CCF561A1D764F3C53C770AB25B6BEDC7654C12EA7
3,271,860 UART: [art] SIG.S = 8824DE87F07EE1CD9ED1E66FA73CA5B3DD29AB2FEDBABB5127D3683C1F0F0A5779DBFE6DE5A771FB991ED4F99C824AB3
3,295,493 UART: Caliptra RT
3,295,746 UART: [state] CFI Enabled
3,403,064 UART: [rt] RT listening for mailbox commands...
3,403,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,744 UART: [rt]cmd =0x41544d4e, len=14344
3,836,238 >>> mbox cmd response data (8 bytes)
3,836,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,330 UART: [rt]cmd =0x41545348, len=116
3,868,217 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,378 UART: [kat] SHA2-256
882,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,424 UART: [kat] ++
886,576 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,371 UART: [kat] SHA2-512-ACC
897,272 UART: [kat] ECC-384
902,903 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 ready_for_fw is high
1,481,050 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,301 UART: [idev] Erasing UDS.KEYID = 0
1,505,125 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,953 UART: [idev] --
1,514,990 UART: [ldev] ++
1,515,158 UART: [ldev] CDI.KEYID = 6
1,515,521 UART: [ldev] SUBJECT.KEYID = 5
1,515,947 UART: [ldev] AUTHORITY.KEYID = 7
1,516,410 UART: [ldev] FE.KEYID = 1
1,521,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,133 UART: [ldev] --
1,587,564 UART: [fwproc] Waiting for Commands...
1,588,255 UART: [fwproc] Received command 0x46574c44
1,589,046 UART: [fwproc] Received Image of size 114332 bytes
2,887,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,479 >>> mbox cmd response: success
3,081,529 UART: [afmc] ++
3,081,697 UART: [afmc] CDI.KEYID = 6
3,082,059 UART: [afmc] SUBJECT.KEYID = 7
3,082,484 UART: [afmc] AUTHORITY.KEYID = 5
3,117,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,910 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,600 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,619 UART: [afmc] --
3,160,723 UART: [cold-reset] --
3,161,439 UART: [state] Locking Datavault
3,162,570 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,174 UART: [state] Locking ICCM
3,163,604 UART: [exit] Launching FMC @ 0x40000130
3,168,933 UART:
3,168,949 UART: Running Caliptra FMC ...
3,169,357 UART:
3,169,500 UART: [state] CFI Enabled
3,180,145 UART: [fht] FMC Alias Private Key: 7
3,288,014 UART: [art] Extend RT PCRs Done
3,288,442 UART: [art] Lock RT PCRs Done
3,290,320 UART: [art] Populate DV Done
3,298,497 UART: [fht] FMC Alias Private Key: 7
3,299,673 UART: [art] Derive CDI
3,299,953 UART: [art] Store in in slot 0x4
3,385,734 UART: [art] Derive Key Pair
3,386,094 UART: [art] Store priv key in slot 0x5
3,399,908 UART: [art] Derive Key Pair - Done
3,414,730 UART: [art] Signing Cert with AUTHO
3,415,210 UART: RITY.KEYID = 7
3,430,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,785 UART: [art] PUB.X = 7463762AD70B59AD32DFE7414F4BC8A0EB7E30849E69B32B4336428E804162F9C3082A52281E81D6C7B66FBDA127C3E6
3,437,551 UART: [art] PUB.Y = 794F7334ED6BAC5DDCA76B894B7DFEBE0F855B6FFD6C8731E7B5D60261FB21D2C1E31CFC5FA037577F117833E26C71AF
3,444,515 UART: [art] SIG.R = E444AD56DBE93F558C17FC0AAF5D09B4A495937722C5E6023D88E9833B84BB77DC47B75D58EDC8E884A824F2CAAD6C0C
3,451,289 UART: [art] SIG.S = 3DC4218A297C926626FB68ED294822B2F8E292C54D7DC5CBFD4DCB9BBE80B006430FAA6AB8FDD62DA43EB25D8A351A4E
3,475,668 UART: Caliptra RT
3,476,013 UART: [state] CFI Enabled
3,585,372 UART: [rt] RT listening for mailbox commands...
3,586,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,084 UART: [rt]cmd =0x41544d4e, len=14344
4,019,191 >>> mbox cmd response data (8 bytes)
4,019,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,099 UART: [rt]cmd =0x41545348, len=116
4,071,474 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,696 UART: [kat] SHA2-256
882,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,742 UART: [kat] ++
886,894 UART: [kat] sha1
891,206 UART: [kat] SHA2-256
893,144 UART: [kat] SHA2-384
895,959 UART: [kat] SHA2-512-ACC
897,860 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,480,105 UART: [idev] ++
1,480,273 UART: [idev] CDI.KEYID = 6
1,480,633 UART: [idev] SUBJECT.KEYID = 7
1,481,057 UART: [idev] UDS.KEYID = 0
1,481,402 ready_for_fw is high
1,481,402 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,509 UART: [idev] --
1,515,620 UART: [ldev] ++
1,515,788 UART: [ldev] CDI.KEYID = 6
1,516,151 UART: [ldev] SUBJECT.KEYID = 5
1,516,577 UART: [ldev] AUTHORITY.KEYID = 7
1,517,040 UART: [ldev] FE.KEYID = 1
1,522,268 UART: [ldev] Erasing FE.KEYID = 1
1,547,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,796 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 114332 bytes
2,885,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,739 >>> mbox cmd response: success
3,079,993 UART: [afmc] ++
3,080,161 UART: [afmc] CDI.KEYID = 6
3,080,523 UART: [afmc] SUBJECT.KEYID = 7
3,080,948 UART: [afmc] AUTHORITY.KEYID = 5
3,116,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,998 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,688 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,617 UART: [afmc] --
3,159,515 UART: [cold-reset] --
3,160,219 UART: [state] Locking Datavault
3,161,434 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,038 UART: [state] Locking ICCM
3,162,502 UART: [exit] Launching FMC @ 0x40000130
3,167,831 UART:
3,167,847 UART: Running Caliptra FMC ...
3,168,255 UART:
3,168,398 UART: [state] CFI Enabled
3,179,285 UART: [fht] FMC Alias Private Key: 7
3,287,226 UART: [art] Extend RT PCRs Done
3,287,654 UART: [art] Lock RT PCRs Done
3,288,988 UART: [art] Populate DV Done
3,297,023 UART: [fht] FMC Alias Private Key: 7
3,298,157 UART: [art] Derive CDI
3,298,437 UART: [art] Store in in slot 0x4
3,384,400 UART: [art] Derive Key Pair
3,384,760 UART: [art] Store priv key in slot 0x5
3,398,156 UART: [art] Derive Key Pair - Done
3,413,065 UART: [art] Signing Cert with AUTHO
3,413,545 UART: RITY.KEYID = 7
3,428,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,724 UART: [art] PUB.X = EAA7CE73A8C4D3EED29512E16601985835F052A3B65BB964D452934F010213E9600EF724CF0CE2FD29542BBFCD3E1FAA
3,436,491 UART: [art] PUB.Y = 98651E0DE36D341F2EDF18F16011305175E6594406B23CCA46A5834A8AAC521AF887F96540DEF8F3191748B9C3668DE8
3,443,433 UART: [art] SIG.R = 39F2C7E3BEF42CF89EFBB785E192D6314B7148A4C08B2207D094D7F1E05C0AC37F93EA9C9B6439667A981247BE754308
3,450,198 UART: [art] SIG.S = 0A11146C92A9DFA94C4D4E926DDEF1CE98401CEF94F7C6B54555C79C6E0E50DCE6D1D5D875B159D6E27F44E945E6AA8A
3,474,321 UART: Caliptra RT
3,474,666 UART: [state] CFI Enabled
3,583,856 UART: [rt] RT listening for mailbox commands...
3,584,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,424 UART: [rt]cmd =0x41544d4e, len=14344
4,017,462 >>> mbox cmd response data (8 bytes)
4,017,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,626 UART: [rt]cmd =0x41545348, len=116
4,049,311 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 ready_for_fw is high
1,362,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,527 >>> mbox cmd response: success
2,989,831 UART:
2,989,847 UART: Running Caliptra FMC ...
2,990,255 UART:
2,990,398 UART: [state] CFI Enabled
3,001,047 UART: [fht] FMC Alias Private Key: 7
3,109,076 UART: [art] Extend RT PCRs Done
3,109,504 UART: [art] Lock RT PCRs Done
3,110,786 UART: [art] Populate DV Done
3,119,089 UART: [fht] FMC Alias Private Key: 7
3,120,121 UART: [art] Derive CDI
3,120,401 UART: [art] Store in in slot 0x4
3,206,058 UART: [art] Derive Key Pair
3,206,418 UART: [art] Store priv key in slot 0x5
3,219,430 UART: [art] Derive Key Pair - Done
3,234,329 UART: [art] Signing Cert with AUTHO
3,234,809 UART: RITY.KEYID = 7
3,249,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,514 UART: [art] PUB.X = D26BEB95DF8C4E52BEF3882C7BE314A89C5766066AA241E62A64FAAA9DE5CA50F27905FDFF11E139FC333DD421EBF8FD
3,257,302 UART: [art] PUB.Y = E55424B0AEC6641574937060F19605F4C67BBD6451ABF2B44D268885A4F06A3EBC3093C38B6B0DFFE8FF514F40937ACC
3,264,254 UART: [art] SIG.R = AD6DCC40862565FDC15F494C6F7D5E80A96C7B2C84B1AB02830DE08ADC843F6719A7625DA9A29C87F43037941E41F6E2
3,271,026 UART: [art] SIG.S = 56094FF1DEDAAC2A8828D984980DED2673023A9A0EB9CE10336EA98F3F283E0BCF8C9C05AC7C35734A23E8755511080D
3,294,453 UART: Caliptra RT
3,294,798 UART: [state] CFI Enabled
3,404,127 UART: [rt] RT listening for mailbox commands...
3,404,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,719 UART: [rt]cmd =0x41544d4e, len=14344
3,837,656 >>> mbox cmd response data (8 bytes)
3,837,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,800 UART: [rt]cmd =0x41545348, len=116
3,889,417 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,386 ready_for_fw is high
1,362,386 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,945 >>> mbox cmd response: success
2,987,275 UART:
2,987,291 UART: Running Caliptra FMC ...
2,987,699 UART:
2,987,842 UART: [state] CFI Enabled
2,998,619 UART: [fht] FMC Alias Private Key: 7
3,106,204 UART: [art] Extend RT PCRs Done
3,106,632 UART: [art] Lock RT PCRs Done
3,107,862 UART: [art] Populate DV Done
3,116,201 UART: [fht] FMC Alias Private Key: 7
3,117,283 UART: [art] Derive CDI
3,117,563 UART: [art] Store in in slot 0x4
3,203,250 UART: [art] Derive Key Pair
3,203,610 UART: [art] Store priv key in slot 0x5
3,217,206 UART: [art] Derive Key Pair - Done
3,231,846 UART: [art] Signing Cert with AUTHO
3,232,326 UART: RITY.KEYID = 7
3,247,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,177 UART: [art] PUB.X = 7B7EBAC4FEDB7F18F1CCCC70CFC30FB9528084EAD6E63DCC81F21C0C8200F0B62545C3CF38B2A0914176379EEBB585EE
3,254,943 UART: [art] PUB.Y = D552027DA7A0B160A5CAD27DCA837EB7AB9B6CD45FACF32565452A2BB3CBF9D531E70826651C454B0EFD20F1E8AC48E2
3,261,904 UART: [art] SIG.R = F9791F4923FE36F43BAF841599379C40F5066731A0A298DEA179DEB3E7212077AEE628BB6185ACD64A59EDE9FF9E3887
3,268,677 UART: [art] SIG.S = 994189EF30DB7CC74F2165A19FFF7D0064B49D274E91685934E228B262E144309EF07760A9F5B9CD7D7EB134C7F019ED
3,292,720 UART: Caliptra RT
3,293,065 UART: [state] CFI Enabled
3,401,595 UART: [rt] RT listening for mailbox commands...
3,402,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,257 UART: [rt]cmd =0x41544d4e, len=14344
3,834,491 >>> mbox cmd response data (8 bytes)
3,834,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,543 UART: [rt]cmd =0x41545348, len=116
3,866,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,566 UART: [kat] LMS
1,170,894 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,161 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 ready_for_fw is high
1,176,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,702 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,341 UART: [idev] --
1,210,509 UART: [ldev] ++
1,210,677 UART: [ldev] CDI.KEYID = 6
1,211,040 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,216,959 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,881 >>> mbox cmd response: success
2,776,045 UART: [afmc] ++
2,776,213 UART: [afmc] CDI.KEYID = 6
2,776,575 UART: [afmc] SUBJECT.KEYID = 7
2,777,000 UART: [afmc] AUTHORITY.KEYID = 5
2,812,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,078 UART: [afmc] --
2,856,098 UART: [cold-reset] --
2,857,114 UART: [state] Locking Datavault
2,858,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,881 UART: [state] Locking ICCM
2,859,519 UART: [exit] Launching FMC @ 0x40000130
2,864,848 UART:
2,864,864 UART: Running Caliptra FMC ...
2,865,272 UART:
2,865,326 UART: [state] CFI Enabled
2,875,979 UART: [fht] FMC Alias Private Key: 7
2,984,502 UART: [art] Extend RT PCRs Done
2,984,930 UART: [art] Lock RT PCRs Done
2,986,388 UART: [art] Populate DV Done
2,994,393 UART: [fht] FMC Alias Private Key: 7
2,995,427 UART: [art] Derive CDI
2,995,707 UART: [art] Store in in slot 0x4
3,081,248 UART: [art] Derive Key Pair
3,081,608 UART: [art] Store priv key in slot 0x5
3,094,670 UART: [art] Derive Key Pair - Done
3,109,677 UART: [art] Signing Cert with AUTHO
3,110,157 UART: RITY.KEYID = 7
3,125,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,374 UART: [art] PUB.X = 44D0AE5CEF5CBA6A68F82A51D60DEB23E35BD287F88A70F92314C20687EAFF7A0CC07B4386B8FF37CB2FD0720BAB2DE3
3,133,156 UART: [art] PUB.Y = 8DE9456D14B2F4AEF5E15461CC6210E7D2EEDB1F76F34DAE5F6A7E0609C1670E318225A0877D2E2B730165025505126A
3,140,090 UART: [art] SIG.R = CB3220CDA7BE1347ED7D0776F20F098CED2AA3DBC7E5E1D014B15839FCE9B1008273916CD0304BC146401BFA5996B8BB
3,146,843 UART: [art] SIG.S = 5848B5C4389E941A0044C07D75B17180CF5F069FAD0611EF00D9101D9C28CDB4350164D68D00BC11DF33050D93E373AA
3,171,099 UART: Caliptra RT
3,171,352 UART: [state] CFI Enabled
3,279,013 UART: [rt] RT listening for mailbox commands...
3,279,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,557 UART: [rt]cmd =0x41544d4e, len=14344
3,712,894 >>> mbox cmd response data (8 bytes)
3,712,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,014 UART: [rt]cmd =0x41545348, len=116
3,765,093 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
893,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,261 UART: [kat] ++
897,413 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,118 UART: [kat] HMAC-384Kdf
922,676 UART: [kat] LMS
1,171,004 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 ready_for_fw is high
1,176,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,851 UART: [idev] Sha1 KeyId Algorithm
1,209,399 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,516 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,683 >>> mbox cmd response: success
2,774,837 UART: [afmc] ++
2,775,005 UART: [afmc] CDI.KEYID = 6
2,775,367 UART: [afmc] SUBJECT.KEYID = 7
2,775,792 UART: [afmc] AUTHORITY.KEYID = 5
2,811,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,648 UART: [afmc] --
2,854,612 UART: [cold-reset] --
2,855,458 UART: [state] Locking Datavault
2,856,549 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,153 UART: [state] Locking ICCM
2,857,611 UART: [exit] Launching FMC @ 0x40000130
2,862,940 UART:
2,862,956 UART: Running Caliptra FMC ...
2,863,364 UART:
2,863,418 UART: [state] CFI Enabled
2,873,869 UART: [fht] FMC Alias Private Key: 7
2,981,672 UART: [art] Extend RT PCRs Done
2,982,100 UART: [art] Lock RT PCRs Done
2,983,774 UART: [art] Populate DV Done
2,991,787 UART: [fht] FMC Alias Private Key: 7
2,992,729 UART: [art] Derive CDI
2,993,009 UART: [art] Store in in slot 0x4
3,079,082 UART: [art] Derive Key Pair
3,079,442 UART: [art] Store priv key in slot 0x5
3,092,626 UART: [art] Derive Key Pair - Done
3,107,309 UART: [art] Signing Cert with AUTHO
3,107,789 UART: RITY.KEYID = 7
3,123,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,038 UART: [art] PUB.X = C122F0D602564C124CC015106EA51A21FDE2F141107BF12311C003B8221EC647445F58FBC4D86C6B29543E369E1D43F2
3,130,800 UART: [art] PUB.Y = F4541F8605A5347427F97F7287692D5468240AFA8B297F8CDAABB8DAE3885EB6A85A0BF0CCC072D6414AA7F0F1A6D103
3,137,748 UART: [art] SIG.R = A941D6C4861822B759F6A215F2366D077B6A1631E1B2AE20EF5999382C7208B2E88ECC9B83D415B3290BB16376FC01F4
3,144,504 UART: [art] SIG.S = 07B5FFB4DEC404D6C27F0D3290D67A46D3CAC270334B57970EBD6A80D0B1E3DEFD67EE2B82F5A529752C166050E30C24
3,168,282 UART: Caliptra RT
3,168,535 UART: [state] CFI Enabled
3,276,680 UART: [rt] RT listening for mailbox commands...
3,277,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,670 UART: [rt]cmd =0x41544d4e, len=14344
3,710,550 >>> mbox cmd response data (8 bytes)
3,710,551 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,860 UART: [rt]cmd =0x41545348, len=116
3,742,821 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,257 ready_for_fw is high
1,060,257 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,332 >>> mbox cmd response: success
2,689,076 UART:
2,689,092 UART: Running Caliptra FMC ...
2,689,500 UART:
2,689,554 UART: [state] CFI Enabled
2,699,811 UART: [fht] FMC Alias Private Key: 7
2,808,024 UART: [art] Extend RT PCRs Done
2,808,452 UART: [art] Lock RT PCRs Done
2,809,866 UART: [art] Populate DV Done
2,818,253 UART: [fht] FMC Alias Private Key: 7
2,819,347 UART: [art] Derive CDI
2,819,627 UART: [art] Store in in slot 0x4
2,905,334 UART: [art] Derive Key Pair
2,905,694 UART: [art] Store priv key in slot 0x5
2,918,732 UART: [art] Derive Key Pair - Done
2,933,707 UART: [art] Signing Cert with AUTHO
2,934,187 UART: RITY.KEYID = 7
2,949,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,586 UART: [art] PUB.X = DE45D75917F5D7D6F2B958805A018D8981FDAE27243CAB3D02BC7CC39F3B8ACD6B5029B3DD6567F03BACDDF99EA9E741
2,957,370 UART: [art] PUB.Y = 9BC2ABAB22508EBB62C942CA7D015B6998072D73DCAABBA933CEA8984E6CF33B948E456C35742407DCC9B60381037D80
2,964,315 UART: [art] SIG.R = 74CE10F3D30B25BB1DD429FBD7437DB7B19E7CDB31950E29B86ED49BC398E90723FE28F1FC7A165FF179EA6D28498CB9
2,971,092 UART: [art] SIG.S = A7524122FA2EF7A666D74B41DCCEBF09621CB5E114BC8888BD505AA31E311D937780BA6DF7CD6699777198B632A82031
2,994,862 UART: Caliptra RT
2,995,115 UART: [state] CFI Enabled
3,102,120 UART: [rt] RT listening for mailbox commands...
3,102,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,202 UART: [rt]cmd =0x41544d4e, len=14344
3,536,187 >>> mbox cmd response data (8 bytes)
3,536,188 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,111 UART: [rt]cmd =0x41545348, len=116
3,588,010 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 ready_for_fw is high
1,059,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,356 >>> mbox cmd response: success
2,686,666 UART:
2,686,682 UART: Running Caliptra FMC ...
2,687,090 UART:
2,687,144 UART: [state] CFI Enabled
2,697,637 UART: [fht] FMC Alias Private Key: 7
2,805,478 UART: [art] Extend RT PCRs Done
2,805,906 UART: [art] Lock RT PCRs Done
2,807,268 UART: [art] Populate DV Done
2,815,247 UART: [fht] FMC Alias Private Key: 7
2,816,295 UART: [art] Derive CDI
2,816,575 UART: [art] Store in in slot 0x4
2,902,608 UART: [art] Derive Key Pair
2,902,968 UART: [art] Store priv key in slot 0x5
2,916,354 UART: [art] Derive Key Pair - Done
2,931,377 UART: [art] Signing Cert with AUTHO
2,931,857 UART: RITY.KEYID = 7
2,947,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,160 UART: [art] PUB.X = 0870219BFCC730F1D0099EFA9755CEF33C889D228F86CC87AA348EBEBBD3EB3E2300D66F78E79C01E96FD94FE560EBCF
2,954,919 UART: [art] PUB.Y = 30456280F7160CB01A85405D439A9EF5376C74754B7A5B7B081E5BCBA6405126865B95B81E22902CE6435071BBF3021C
2,961,852 UART: [art] SIG.R = 29FF6943D8FB04C53C0EBE8AE76DC2A87DB30FE0A1AEF24A45E24BCF44FC10A0F811B9699D829E2DAE1A9AE3FCC94B31
2,968,641 UART: [art] SIG.S = 866000502FE0C286DEA7DF8098968399F19783E5B6DE3222594877A3B4F30CA6F0ACD674D8C44401B7D0A9914923D6A4
2,992,676 UART: Caliptra RT
2,992,929 UART: [state] CFI Enabled
3,101,022 UART: [rt] RT listening for mailbox commands...
3,101,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,572 UART: [rt]cmd =0x41544d4e, len=14344
3,534,770 >>> mbox cmd response data (8 bytes)
3,534,771 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,750 UART: [rt]cmd =0x41545348, len=116
3,566,395 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
918,799 UART: [kat] HMAC-384Kdf
923,351 UART: [kat] LMS
1,171,679 UART: [kat] --
1,172,610 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 ready_for_fw is high
1,177,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,938 UART: [idev] --
1,210,766 UART: [ldev] ++
1,210,934 UART: [ldev] CDI.KEYID = 6
1,211,297 UART: [ldev] SUBJECT.KEYID = 5
1,211,723 UART: [ldev] AUTHORITY.KEYID = 7
1,212,186 UART: [ldev] FE.KEYID = 1
1,217,098 UART: [ldev] Erasing FE.KEYID = 1
1,243,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,326 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,441 UART: [fwproc] Recv command 0x46574c44
1,284,169 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,974 >>> mbox cmd response: success
2,776,128 UART: [afmc] ++
2,776,296 UART: [afmc] CDI.KEYID = 6
2,776,658 UART: [afmc] SUBJECT.KEYID = 7
2,777,083 UART: [afmc] AUTHORITY.KEYID = 5
2,812,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,161 UART: [afmc] --
2,856,215 UART: [cold-reset] --
2,857,009 UART: [state] Locking Datavault
2,858,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,756 UART: [state] Locking ICCM
2,859,190 UART: [exit] Launching FMC @ 0x40000130
2,864,519 UART:
2,864,535 UART: Running Caliptra FMC ...
2,864,943 UART:
2,865,086 UART: [state] CFI Enabled
2,875,601 UART: [fht] FMC Alias Private Key: 7
2,983,210 UART: [art] Extend RT PCRs Done
2,983,638 UART: [art] Lock RT PCRs Done
2,985,222 UART: [art] Populate DV Done
2,993,569 UART: [fht] FMC Alias Private Key: 7
2,994,731 UART: [art] Derive CDI
2,995,011 UART: [art] Store in in slot 0x4
3,080,796 UART: [art] Derive Key Pair
3,081,156 UART: [art] Store priv key in slot 0x5
3,093,526 UART: [art] Derive Key Pair - Done
3,108,496 UART: [art] Signing Cert with AUTHO
3,108,976 UART: RITY.KEYID = 7
3,124,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,403 UART: [art] PUB.X = 4E27D0678D3E5BA3B59FE71E8BE32507A09309F3AAAB8909492A15CE301AAE5462C8A9A402E6BE9465059E56CDF7B82A
3,132,168 UART: [art] PUB.Y = 56172701CC5FEEE27CFD59AC7E691735C84FC7E4C0D1316449E61CD5235EA1BC743834D4A9B5CC6C4384E5E0BCA06D54
3,139,127 UART: [art] SIG.R = 9509C589C17C57E75902CD37A294D179F2AD26D54AF4B4F03AA901F24409470F56D116743DBF0F3BDD3E06172425BF96
3,145,876 UART: [art] SIG.S = 89BFA8E26B74E1E154B7AB075DBAE343A19E9AA9C4A1BF17747797A02AF409E1E3A61C16CAC668B1CBBD65AB41EB8EAA
3,170,371 UART: Caliptra RT
3,170,716 UART: [state] CFI Enabled
3,278,952 UART: [rt] RT listening for mailbox commands...
3,279,622 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,954 UART: [rt]cmd =0x41544d4e, len=14344
3,713,247 >>> mbox cmd response data (8 bytes)
3,713,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,417 UART: [rt]cmd =0x41545348, len=116
3,765,772 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,676 UART: [cold-reset] ++
1,173,166 UART: [fht] FHT @ 0x50003400
1,175,783 UART: [idev] ++
1,175,951 UART: [idev] CDI.KEYID = 6
1,176,311 UART: [idev] SUBJECT.KEYID = 7
1,176,735 UART: [idev] UDS.KEYID = 0
1,177,080 ready_for_fw is high
1,177,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,021 UART: [idev] Erasing UDS.KEYID = 0
1,202,134 UART: [idev] Sha1 KeyId Algorithm
1,210,382 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,217,876 UART: [ldev] Erasing FE.KEYID = 1
1,244,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,218 UART: [ldev] --
1,283,523 UART: [fwproc] Wait for Commands...
1,284,271 UART: [fwproc] Recv command 0x46574c44
1,284,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,458 >>> mbox cmd response: success
2,776,552 UART: [afmc] ++
2,776,720 UART: [afmc] CDI.KEYID = 6
2,777,082 UART: [afmc] SUBJECT.KEYID = 7
2,777,507 UART: [afmc] AUTHORITY.KEYID = 5
2,813,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,297 UART: [afmc] --
2,856,319 UART: [cold-reset] --
2,857,277 UART: [state] Locking Datavault
2,858,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,986 UART: [state] Locking ICCM
2,859,554 UART: [exit] Launching FMC @ 0x40000130
2,864,883 UART:
2,864,899 UART: Running Caliptra FMC ...
2,865,307 UART:
2,865,450 UART: [state] CFI Enabled
2,875,673 UART: [fht] FMC Alias Private Key: 7
2,983,640 UART: [art] Extend RT PCRs Done
2,984,068 UART: [art] Lock RT PCRs Done
2,985,954 UART: [art] Populate DV Done
2,994,227 UART: [fht] FMC Alias Private Key: 7
2,995,245 UART: [art] Derive CDI
2,995,525 UART: [art] Store in in slot 0x4
3,080,732 UART: [art] Derive Key Pair
3,081,092 UART: [art] Store priv key in slot 0x5
3,094,070 UART: [art] Derive Key Pair - Done
3,108,850 UART: [art] Signing Cert with AUTHO
3,109,330 UART: RITY.KEYID = 7
3,124,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,549 UART: [art] PUB.X = 5EB444E0799443099B089BD1EE0685AE2F0A7DE9511B7023A876A56268DA2DC2360B72F2B2F1A62A9DB034D35A63399C
3,132,306 UART: [art] PUB.Y = 715F910781CE7DF878736B2EA4CF7E8CCAC05E84087D6FB20F882559D0CDDC253C301240008642491277C984C7784A5A
3,139,223 UART: [art] SIG.R = 606A0C5305DE2AFC7814A096AF439F3D56260BFB78F038C2D4498DF983777298B8F27B5962B0417EE484A54AD44965E1
3,145,982 UART: [art] SIG.S = E0342BAF3A656750534E0965DCF4E320842E866260BF4D659094464F82FCF43E24A1B6BDDF011B1097529379838F5059
3,169,835 UART: Caliptra RT
3,170,180 UART: [state] CFI Enabled
3,278,193 UART: [rt] RT listening for mailbox commands...
3,278,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,887 UART: [rt]cmd =0x41544d4e, len=14344
3,712,077 >>> mbox cmd response data (8 bytes)
3,712,078 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,169 UART: [rt]cmd =0x41545348, len=116
3,744,106 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 ready_for_fw is high
1,060,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,847 >>> mbox cmd response: success
2,688,589 UART:
2,688,605 UART: Running Caliptra FMC ...
2,689,013 UART:
2,689,156 UART: [state] CFI Enabled
2,699,937 UART: [fht] FMC Alias Private Key: 7
2,807,936 UART: [art] Extend RT PCRs Done
2,808,364 UART: [art] Lock RT PCRs Done
2,809,742 UART: [art] Populate DV Done
2,818,005 UART: [fht] FMC Alias Private Key: 7
2,819,119 UART: [art] Derive CDI
2,819,399 UART: [art] Store in in slot 0x4
2,905,296 UART: [art] Derive Key Pair
2,905,656 UART: [art] Store priv key in slot 0x5
2,918,624 UART: [art] Derive Key Pair - Done
2,933,314 UART: [art] Signing Cert with AUTHO
2,933,794 UART: RITY.KEYID = 7
2,949,378 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,143 UART: [art] PUB.X = 9A596BECF664D837A05E66B2847682E63EAF12D923AFBD9BDF5C52DAB20489EF860B9A0860E1895996A033B1D47E74CA
2,956,914 UART: [art] PUB.Y = 75DB537D6F8C0E0212A1B6359C89D6D927BE0AE8C66BBA48C2C5D2A1C3936E6FDC0F6DFA518628A61320ED9E5C38EEA0
2,963,870 UART: [art] SIG.R = DFF432FF9DCADC454D71262F55E4CB4F91CB25281052641A698A3B8A7267A2038A1BD06D2DB9EAF8CBD01E6021467DCA
2,970,653 UART: [art] SIG.S = 62977EFECF4FBEE8ADF72CFB0923FBC981B7116EF3D2F90F37BFEE1C2EE6E8BA19FA1BB385CAC94FCF46F0CB5A48BCD5
2,993,582 UART: Caliptra RT
2,993,927 UART: [state] CFI Enabled
3,101,754 UART: [rt] RT listening for mailbox commands...
3,102,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,426 UART: [rt]cmd =0x41544d4e, len=14344
3,535,015 >>> mbox cmd response data (8 bytes)
3,535,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,197 UART: [rt]cmd =0x41545348, len=116
3,587,892 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,184 ready_for_fw is high
1,061,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,133 >>> mbox cmd response: success
2,690,759 UART:
2,690,775 UART: Running Caliptra FMC ...
2,691,183 UART:
2,691,326 UART: [state] CFI Enabled
2,702,063 UART: [fht] FMC Alias Private Key: 7
2,810,058 UART: [art] Extend RT PCRs Done
2,810,486 UART: [art] Lock RT PCRs Done
2,812,132 UART: [art] Populate DV Done
2,820,573 UART: [fht] FMC Alias Private Key: 7
2,821,601 UART: [art] Derive CDI
2,821,881 UART: [art] Store in in slot 0x4
2,907,946 UART: [art] Derive Key Pair
2,908,306 UART: [art] Store priv key in slot 0x5
2,921,454 UART: [art] Derive Key Pair - Done
2,936,132 UART: [art] Signing Cert with AUTHO
2,936,612 UART: RITY.KEYID = 7
2,951,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,587 UART: [art] PUB.X = C2B63937730DD6EA6B06986B085EEC8B4D1B3B2BB20DFE6EC3CC5890F84AD51FDA6E1F88E9E676BB944FB4BE55AE5F87
2,959,369 UART: [art] PUB.Y = 3ABEA82C56F5C5AC46129A339185AB20DA59781BC204AEFE5525F651526A03B3FBC8EA07B71C93C6F0645E998DF6334F
2,966,320 UART: [art] SIG.R = 8E596578FE2EE2C555D7EAE1B34C1809A912078E386C62F43F4719F4F93D5273B106DA305CBA8D0BDD8A0D0FBD87DD2A
2,973,086 UART: [art] SIG.S = D1B324C3EFA6BB91BCB811D0C73C7777A2AF8A77EF7F51CC539D3F54E18E6DFA463AE7BB09F630D421B989B1CEBAD484
2,996,694 UART: Caliptra RT
2,997,039 UART: [state] CFI Enabled
3,105,623 UART: [rt] RT listening for mailbox commands...
3,106,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,065 UART: [rt]cmd =0x41544d4e, len=14344
3,538,839 >>> mbox cmd response data (8 bytes)
3,538,840 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,993 UART: [rt]cmd =0x41545348, len=116
3,570,548 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,137 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,070 UART: [ldev] ++
1,208,238 UART: [ldev] CDI.KEYID = 6
1,208,602 UART: [ldev] SUBJECT.KEYID = 5
1,209,029 UART: [ldev] AUTHORITY.KEYID = 7
1,209,492 UART: [ldev] FE.KEYID = 1
1,214,464 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,088 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,065 UART: [fwproc] Recv command 0x46574c44
1,281,798 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,815 >>> mbox cmd response: success
2,772,970 UART: [afmc] ++
2,773,138 UART: [afmc] CDI.KEYID = 6
2,773,501 UART: [afmc] SUBJECT.KEYID = 7
2,773,927 UART: [afmc] AUTHORITY.KEYID = 5
2,808,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,783 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,502 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,335 UART: [afmc] --
2,852,393 UART: [cold-reset] --
2,853,233 UART: [state] Locking Datavault
2,854,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,862 UART: [state] Locking ICCM
2,855,354 UART: [exit] Launching FMC @ 0x40000130
2,860,683 UART:
2,860,699 UART: Running Caliptra FMC ...
2,861,107 UART:
2,861,161 UART: [state] CFI Enabled
2,871,772 UART: [fht] FMC Alias Private Key: 7
2,979,979 UART: [art] Extend RT PCRs Done
2,980,407 UART: [art] Lock RT PCRs Done
2,982,043 UART: [art] Populate DV Done
2,990,408 UART: [fht] FMC Alias Private Key: 7
2,991,396 UART: [art] Derive CDI
2,991,676 UART: [art] Store in in slot 0x4
3,077,011 UART: [art] Derive Key Pair
3,077,371 UART: [art] Store priv key in slot 0x5
3,090,677 UART: [art] Derive Key Pair - Done
3,105,219 UART: [art] Signing Cert with AUTHO
3,105,699 UART: RITY.KEYID = 7
3,120,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,748 UART: [art] PUB.X = 4B5CC3360D961D9B7E2617C502FE6B5FE6A7BDA1330B1E19A96DF7199EF99448BA1BE994858BD6877349AE7154F9BBF5
3,128,519 UART: [art] PUB.Y = 0397F9298AB9F10E0BEB3170EF4DF2195B5287412DA78DD4F43414B74DE0042E98F7256C360057C893BB1EC1D5157C6D
3,135,437 UART: [art] SIG.R = 53BE0AC0AFDEEDCFD7CA5FFCEEC96DA347FB1A010C3D25B4FB1DACFA01D5B89CC861B9218DDF92148CEDC581C26E5A31
3,142,235 UART: [art] SIG.S = 6889DE2464BE0EBE27CEE2ECC6993258F7920C26ED397AE513799BC876CCD0DD75650DD8F10AD77094D20632AA11F332
3,165,727 UART: Caliptra RT
3,165,980 UART: [state] CFI Enabled
3,273,689 UART: [rt] RT listening for mailbox commands...
3,274,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,457 UART: [rt]cmd =0x41544d4e, len=14344
3,707,052 >>> mbox cmd response data (8 bytes)
3,707,053 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,260 UART: [rt]cmd =0x41545348, len=116
3,759,629 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,984 UART: [kat] SHA2-512-ACC
906,885 UART: [kat] ECC-384
916,884 UART: [kat] HMAC-384Kdf
921,336 UART: [kat] LMS
1,169,648 UART: [kat] --
1,170,777 UART: [cold-reset] ++
1,171,263 UART: [fht] FHT @ 0x50003400
1,174,133 UART: [idev] ++
1,174,301 UART: [idev] CDI.KEYID = 6
1,174,662 UART: [idev] SUBJECT.KEYID = 7
1,175,087 UART: [idev] UDS.KEYID = 0
1,175,433 ready_for_fw is high
1,175,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,201 UART: [idev] Erasing UDS.KEYID = 0
1,200,107 UART: [idev] Sha1 KeyId Algorithm
1,209,065 UART: [idev] --
1,210,162 UART: [ldev] ++
1,210,330 UART: [ldev] CDI.KEYID = 6
1,210,694 UART: [ldev] SUBJECT.KEYID = 5
1,211,121 UART: [ldev] AUTHORITY.KEYID = 7
1,211,584 UART: [ldev] FE.KEYID = 1
1,216,906 UART: [ldev] Erasing FE.KEYID = 1
1,243,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,538 UART: [ldev] --
1,282,858 UART: [fwproc] Wait for Commands...
1,283,463 UART: [fwproc] Recv command 0x46574c44
1,284,196 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,673 >>> mbox cmd response: success
2,773,756 UART: [afmc] ++
2,773,924 UART: [afmc] CDI.KEYID = 6
2,774,287 UART: [afmc] SUBJECT.KEYID = 7
2,774,713 UART: [afmc] AUTHORITY.KEYID = 5
2,809,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,765 UART: [afmc] --
2,852,857 UART: [cold-reset] --
2,853,883 UART: [state] Locking Datavault
2,855,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,910 UART: [state] Locking ICCM
2,856,492 UART: [exit] Launching FMC @ 0x40000130
2,861,821 UART:
2,861,837 UART: Running Caliptra FMC ...
2,862,245 UART:
2,862,299 UART: [state] CFI Enabled
2,872,850 UART: [fht] FMC Alias Private Key: 7
2,980,757 UART: [art] Extend RT PCRs Done
2,981,185 UART: [art] Lock RT PCRs Done
2,982,853 UART: [art] Populate DV Done
2,991,252 UART: [fht] FMC Alias Private Key: 7
2,992,296 UART: [art] Derive CDI
2,992,576 UART: [art] Store in in slot 0x4
3,078,269 UART: [art] Derive Key Pair
3,078,629 UART: [art] Store priv key in slot 0x5
3,091,419 UART: [art] Derive Key Pair - Done
3,106,310 UART: [art] Signing Cert with AUTHO
3,106,790 UART: RITY.KEYID = 7
3,122,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,349 UART: [art] PUB.X = FED1E6BA86A68ED18E2AE7E27388B1D6B0513C764BF6438B00EC2842E98DE7609E33822A3F637A14B14D703649F1635A
3,130,101 UART: [art] PUB.Y = 9B8DA013398BDE4DC1A95C07324346474308FFCA785E4909EF03A818F302A583B99ACEE74A8768DCA9444978D6F8F913
3,137,038 UART: [art] SIG.R = 18664D7A70A7FF20E87920440651C3C0024988A674AEF0CDD9D2C4BE71E1582745A2AA9119A9A9E9F1CDDAFB42FC6D8D
3,143,814 UART: [art] SIG.S = EBB07747214DE67B68C7BB676B255C95BD5E02471714561FF6B9802625D4B92683688283C204B92454F8686301203E45
3,167,750 UART: Caliptra RT
3,168,003 UART: [state] CFI Enabled
3,275,414 UART: [rt] RT listening for mailbox commands...
3,276,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,300 UART: [rt]cmd =0x41544d4e, len=14344
3,710,162 >>> mbox cmd response data (8 bytes)
3,710,163 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,432 UART: [rt]cmd =0x41545348, len=116
3,742,097 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,928 ready_for_fw is high
1,055,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,653 >>> mbox cmd response: success
2,684,019 UART:
2,684,035 UART: Running Caliptra FMC ...
2,684,443 UART:
2,684,497 UART: [state] CFI Enabled
2,695,104 UART: [fht] FMC Alias Private Key: 7
2,802,855 UART: [art] Extend RT PCRs Done
2,803,283 UART: [art] Lock RT PCRs Done
2,804,779 UART: [art] Populate DV Done
2,812,906 UART: [fht] FMC Alias Private Key: 7
2,813,938 UART: [art] Derive CDI
2,814,218 UART: [art] Store in in slot 0x4
2,899,789 UART: [art] Derive Key Pair
2,900,149 UART: [art] Store priv key in slot 0x5
2,913,723 UART: [art] Derive Key Pair - Done
2,928,235 UART: [art] Signing Cert with AUTHO
2,928,715 UART: RITY.KEYID = 7
2,943,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,414 UART: [art] PUB.X = 725FAC458064DB576829D940786223CF50773CDDB5C9147DD8EA93DAD80040884452F853CF4E72B426858781FA661DB6
2,951,158 UART: [art] PUB.Y = E7A5FFF773483DED134CCE11FE0D824F95153E98AF06ED4F4718530B4CAA81ACAC6A14CE1ABF0422095EED4D9128B365
2,958,111 UART: [art] SIG.R = F73BA2E2130374846B099AE7CD55C4C05946E5698A85CB21A60E69A84DE81A1813D57E5D4897BAB680986F908F8C2D63
2,964,872 UART: [art] SIG.S = 1CEDB5F6FBAD9CF852306B9DF4B24F9576B4D296802E94CAB15D1B709A6023B6542804592C6DABD93749BEC32EF1453B
2,988,808 UART: Caliptra RT
2,989,061 UART: [state] CFI Enabled
3,098,066 UART: [rt] RT listening for mailbox commands...
3,098,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,688 UART: [rt]cmd =0x41544d4e, len=14344
3,531,225 >>> mbox cmd response data (8 bytes)
3,531,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,453 UART: [rt]cmd =0x41545348, len=116
3,583,298 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,266 ready_for_fw is high
1,056,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,743 >>> mbox cmd response: success
2,686,281 UART:
2,686,297 UART: Running Caliptra FMC ...
2,686,705 UART:
2,686,759 UART: [state] CFI Enabled
2,697,446 UART: [fht] FMC Alias Private Key: 7
2,805,453 UART: [art] Extend RT PCRs Done
2,805,881 UART: [art] Lock RT PCRs Done
2,807,477 UART: [art] Populate DV Done
2,815,822 UART: [fht] FMC Alias Private Key: 7
2,816,796 UART: [art] Derive CDI
2,817,076 UART: [art] Store in in slot 0x4
2,902,475 UART: [art] Derive Key Pair
2,902,835 UART: [art] Store priv key in slot 0x5
2,915,523 UART: [art] Derive Key Pair - Done
2,930,187 UART: [art] Signing Cert with AUTHO
2,930,667 UART: RITY.KEYID = 7
2,945,819 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,584 UART: [art] PUB.X = 743701C25AC6AEDCA455341CBC68EE963F9F2E042EC293EAA0A6561F1AF08CE4B279B158CD49890A7338B4E2BA06FA3D
2,953,358 UART: [art] PUB.Y = 7742DF9B1DBCCFEC96093DC3FBC96CEF591E4BABF8752ACF1A6F8CD2A6474E46ED6EB01B931A31E24821825650012BBD
2,960,324 UART: [art] SIG.R = 87E7FB85C55AB0A93666F81DDD5F31B8A78A7465801B8ADA656FB581750BEF45F55198E0FE41C979C9ADC1004318DA60
2,967,077 UART: [art] SIG.S = A454E96FAA1E27DB2496B1848D6A0321B182D67F4D4FEF8E04DE1AC154DC222F76BA783DA68477BBA496D006972CAA26
2,990,891 UART: Caliptra RT
2,991,144 UART: [state] CFI Enabled
3,098,810 UART: [rt] RT listening for mailbox commands...
3,099,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,380 UART: [rt]cmd =0x41544d4e, len=14344
3,532,012 >>> mbox cmd response data (8 bytes)
3,532,013 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,300 UART: [rt]cmd =0x41545348, len=116
3,564,113 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,175,008 ready_for_fw is high
1,175,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,723 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,297 UART: [ldev] --
1,282,563 UART: [fwproc] Wait for Commands...
1,283,212 UART: [fwproc] Recv command 0x46574c44
1,283,945 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,576 >>> mbox cmd response: success
2,774,701 UART: [afmc] ++
2,774,869 UART: [afmc] CDI.KEYID = 6
2,775,232 UART: [afmc] SUBJECT.KEYID = 7
2,775,658 UART: [afmc] AUTHORITY.KEYID = 5
2,811,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,474 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,030 UART: [afmc] --
2,855,004 UART: [cold-reset] --
2,855,708 UART: [state] Locking Datavault
2,857,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,693 UART: [state] Locking ICCM
2,858,363 UART: [exit] Launching FMC @ 0x40000130
2,863,692 UART:
2,863,708 UART: Running Caliptra FMC ...
2,864,116 UART:
2,864,259 UART: [state] CFI Enabled
2,874,918 UART: [fht] FMC Alias Private Key: 7
2,983,183 UART: [art] Extend RT PCRs Done
2,983,611 UART: [art] Lock RT PCRs Done
2,985,257 UART: [art] Populate DV Done
2,993,618 UART: [fht] FMC Alias Private Key: 7
2,994,768 UART: [art] Derive CDI
2,995,048 UART: [art] Store in in slot 0x4
3,080,611 UART: [art] Derive Key Pair
3,080,971 UART: [art] Store priv key in slot 0x5
3,094,397 UART: [art] Derive Key Pair - Done
3,108,855 UART: [art] Signing Cert with AUTHO
3,109,335 UART: RITY.KEYID = 7
3,124,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,284 UART: [art] PUB.X = F209F3D2210EA89F38A6D46624D04A97CB8F2D8D3E4DEB77B1D39410FC0A515E28475080003D4B8E06BBCC6C5AE96647
3,132,028 UART: [art] PUB.Y = 4B8316A403AEDF55EC6D17924436B891B5BFAA046ED69CB9B501EDEDA26C130487474D079069B89510116BDD656A0C1F
3,138,966 UART: [art] SIG.R = 43F78363DA4846E9619FDA9678289632E1C77FD1C7E3C727B509CD571470AAEF544E39BF0E3D4779608B9BADF90926A7
3,145,729 UART: [art] SIG.S = B8152D9D8183DB646654A17A0F65F301A46DD30B75B1678407122E15703CF88CCDA3488A056526F9243FA2ACCFE4E444
3,169,093 UART: Caliptra RT
3,169,438 UART: [state] CFI Enabled
3,277,903 UART: [rt] RT listening for mailbox commands...
3,278,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,709 UART: [rt]cmd =0x41544d4e, len=14344
3,711,650 >>> mbox cmd response data (8 bytes)
3,711,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,662 UART: [rt]cmd =0x41545348, len=116
3,762,517 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,174,570 ready_for_fw is high
1,174,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,006 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,241,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,213 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,342 >>> mbox cmd response: success
2,772,475 UART: [afmc] ++
2,772,643 UART: [afmc] CDI.KEYID = 6
2,773,006 UART: [afmc] SUBJECT.KEYID = 7
2,773,432 UART: [afmc] AUTHORITY.KEYID = 5
2,808,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,796 UART: [afmc] --
2,851,810 UART: [cold-reset] --
2,852,636 UART: [state] Locking Datavault
2,853,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,341 UART: [state] Locking ICCM
2,854,807 UART: [exit] Launching FMC @ 0x40000130
2,860,136 UART:
2,860,152 UART: Running Caliptra FMC ...
2,860,560 UART:
2,860,703 UART: [state] CFI Enabled
2,871,418 UART: [fht] FMC Alias Private Key: 7
2,979,451 UART: [art] Extend RT PCRs Done
2,979,879 UART: [art] Lock RT PCRs Done
2,981,581 UART: [art] Populate DV Done
2,989,654 UART: [fht] FMC Alias Private Key: 7
2,990,750 UART: [art] Derive CDI
2,991,030 UART: [art] Store in in slot 0x4
3,077,235 UART: [art] Derive Key Pair
3,077,595 UART: [art] Store priv key in slot 0x5
3,090,823 UART: [art] Derive Key Pair - Done
3,105,333 UART: [art] Signing Cert with AUTHO
3,105,813 UART: RITY.KEYID = 7
3,121,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,210 UART: [art] PUB.X = 50E11A84A227C86276E53FE916048A66DF96AC038DDC9D8788998A17CD4EADCBAEFB177933FE386A19A45E4C74C67F8B
3,128,986 UART: [art] PUB.Y = E45CE8AAA7C63C80648786B95B6C60377EA732F7987E6E8A2D84F5CFCEA3A218BC8E4EFD40D8EE0CFB889CEF85BF24C4
3,135,957 UART: [art] SIG.R = C4153B3F54EDBB4C1FF2A86687025B9CB51848013605CC919965AC63B8D6C1C5921110791B9A2B2776F243BA176D1D8F
3,142,718 UART: [art] SIG.S = E0A9A8079FF021FB92B4CD55D5ED6E197F7515F84DE6B739D590E4A1F84FBD30F91743978B06AF1D5106189314F37FBB
3,167,024 UART: Caliptra RT
3,167,369 UART: [state] CFI Enabled
3,274,803 UART: [rt] RT listening for mailbox commands...
3,275,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,347 UART: [rt]cmd =0x41544d4e, len=14344
3,708,253 >>> mbox cmd response data (8 bytes)
3,708,254 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,245 UART: [rt]cmd =0x41545348, len=116
3,740,256 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,339 ready_for_fw is high
1,056,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,754 >>> mbox cmd response: success
2,686,602 UART:
2,686,618 UART: Running Caliptra FMC ...
2,687,026 UART:
2,687,169 UART: [state] CFI Enabled
2,697,946 UART: [fht] FMC Alias Private Key: 7
2,805,873 UART: [art] Extend RT PCRs Done
2,806,301 UART: [art] Lock RT PCRs Done
2,807,611 UART: [art] Populate DV Done
2,815,834 UART: [fht] FMC Alias Private Key: 7
2,816,794 UART: [art] Derive CDI
2,817,074 UART: [art] Store in in slot 0x4
2,902,721 UART: [art] Derive Key Pair
2,903,081 UART: [art] Store priv key in slot 0x5
2,915,919 UART: [art] Derive Key Pair - Done
2,930,503 UART: [art] Signing Cert with AUTHO
2,930,983 UART: RITY.KEYID = 7
2,946,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,026 UART: [art] PUB.X = 2479EE9CBD10E3110DF9B4C05EAF02F96F3C5D4F91BA795DB9FA5AA10F9B47EFFC13D65A604A2504CB903F5C73F334C5
2,953,804 UART: [art] PUB.Y = AD1480F576178446BBA843996CE4051ABACCEF2F661A5D56AFA2B8D11A60208336E70825351C9DFBCC71E2828DD50D8B
2,960,755 UART: [art] SIG.R = 292A645FD30F30447F793736FE77DC84C46CF448830B06D3E25C689D30F2790500CB9F3D27A72C5F27E7060E6DF21EE9
2,967,485 UART: [art] SIG.S = 81430ADEA8A58E54D6E21B0A87462618ACBC988F49114610C3D037FFAB945497C36E6A5BB93593E034DD2E9537EE6AEC
2,991,598 UART: Caliptra RT
2,991,943 UART: [state] CFI Enabled
3,098,438 UART: [rt] RT listening for mailbox commands...
3,099,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,008 UART: [rt]cmd =0x41544d4e, len=14344
3,532,261 >>> mbox cmd response data (8 bytes)
3,532,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,357 UART: [rt]cmd =0x41545348, len=116
3,584,944 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,927 ready_for_fw is high
1,056,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,540 >>> mbox cmd response: success
2,685,546 UART:
2,685,562 UART: Running Caliptra FMC ...
2,685,970 UART:
2,686,113 UART: [state] CFI Enabled
2,697,026 UART: [fht] FMC Alias Private Key: 7
2,804,569 UART: [art] Extend RT PCRs Done
2,804,997 UART: [art] Lock RT PCRs Done
2,806,995 UART: [art] Populate DV Done
2,815,326 UART: [fht] FMC Alias Private Key: 7
2,816,422 UART: [art] Derive CDI
2,816,702 UART: [art] Store in in slot 0x4
2,902,147 UART: [art] Derive Key Pair
2,902,507 UART: [art] Store priv key in slot 0x5
2,915,525 UART: [art] Derive Key Pair - Done
2,930,557 UART: [art] Signing Cert with AUTHO
2,931,037 UART: RITY.KEYID = 7
2,946,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,924 UART: [art] PUB.X = 21EB3EE13BA5A7D469EAD46A90A4BCCD645FD46E8E053390429B56E6911ED24D45F63CBF68096520FFF7958CBD1DD3D2
2,953,704 UART: [art] PUB.Y = C743EDE61B940E14E7E72682E74650916C14B3601D5FCE822AE38E788CD06DF91686082FF8E2611C66AC65310E5A5805
2,960,640 UART: [art] SIG.R = F4A7E49AE1EF8A7B92ABC96E8E08BD7706953F668CAF13229EC9ED196910CF94B062329432B03F39C2D8AB4FF155B3A1
2,967,416 UART: [art] SIG.S = A2EDA8696E34B3E18B05F9F6E464C51DDB86E43FCB332F0877EB6A26DF5166296CC480549637F70BBF13A321337E11F9
2,991,284 UART: Caliptra RT
2,991,629 UART: [state] CFI Enabled
3,099,845 UART: [rt] RT listening for mailbox commands...
3,100,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,829 UART: [rt]cmd =0x41544d4e, len=14344
3,533,907 >>> mbox cmd response data (8 bytes)
3,533,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,769 UART: [rt]cmd =0x41545348, len=116
3,565,714 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,371 UART: [kat] SHA2-256
882,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,417 UART: [kat] ++
886,569 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,590 UART: [kat] LMS
1,475,786 UART: [kat] --
1,476,695 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,706 UART: [idev] ++
1,479,874 UART: [idev] CDI.KEYID = 6
1,480,234 UART: [idev] SUBJECT.KEYID = 7
1,480,658 UART: [idev] UDS.KEYID = 0
1,481,003 ready_for_fw is high
1,481,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,734 UART: [idev] --
1,514,833 UART: [ldev] ++
1,515,001 UART: [ldev] CDI.KEYID = 6
1,515,364 UART: [ldev] SUBJECT.KEYID = 5
1,515,790 UART: [ldev] AUTHORITY.KEYID = 7
1,516,253 UART: [ldev] FE.KEYID = 1
1,521,615 UART: [ldev] Erasing FE.KEYID = 1
1,546,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,020 UART: [ldev] --
1,586,423 UART: [fwproc] Waiting for Commands...
1,587,270 UART: [fwproc] Received command 0x46574c44
1,588,061 UART: [fwproc] Received Image of size 114332 bytes
2,885,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,307 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,522 >>> mbox cmd response: success
3,079,664 UART: [afmc] ++
3,079,832 UART: [afmc] CDI.KEYID = 6
3,080,194 UART: [afmc] SUBJECT.KEYID = 7
3,080,619 UART: [afmc] AUTHORITY.KEYID = 5
3,115,260 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,156 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,549 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,239 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,940 UART: [afmc] --
3,158,026 UART: [cold-reset] --
3,158,700 UART: [state] Locking Datavault
3,159,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,421 UART: [state] Locking ICCM
3,161,041 UART: [exit] Launching FMC @ 0x40000130
3,166,370 UART:
3,166,386 UART: Running Caliptra FMC ...
3,166,794 UART:
3,166,848 UART: [state] CFI Enabled
3,177,327 UART: [fht] FMC Alias Private Key: 7
3,286,228 UART: [art] Extend RT PCRs Done
3,286,656 UART: [art] Lock RT PCRs Done
3,288,276 UART: [art] Populate DV Done
3,296,471 UART: [fht] FMC Alias Private Key: 7
3,297,607 UART: [art] Derive CDI
3,297,887 UART: [art] Store in in slot 0x4
3,383,510 UART: [art] Derive Key Pair
3,383,870 UART: [art] Store priv key in slot 0x5
3,396,894 UART: [art] Derive Key Pair - Done
3,411,762 UART: [art] Signing Cert with AUTHO
3,412,242 UART: RITY.KEYID = 7
3,427,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,529 UART: [art] PUB.X = A4CF0D5295C67D47732CEF09F57977F7A12CD045EA4F1A3BFDBBC8B6398D730200EA1AC66F1855BF1A38574DE10E1059
3,435,277 UART: [art] PUB.Y = 8F311674939DB865B4A7EFAF41550D19131321D657BD55F76B0F31BDFB9AB6600F3B7CC9EC3617C8511C6D1A880453DC
3,442,221 UART: [art] SIG.R = F59057DAC1C2181C0EEB0650CE3B0B369E0C94BBB9ACBFAE3174C035BD3C476419A717D9681C391D2751B96BFD42817A
3,448,991 UART: [art] SIG.S = C897C2EC8E0579C47E90F21F59905A5421CDD1607C5BA4089B5F25174BEA426242009CD2C74C4563668E16EA08548C14
3,473,335 UART: Caliptra RT
3,473,588 UART: [state] CFI Enabled
3,581,322 UART: [rt] RT listening for mailbox commands...
3,581,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,962 UART: [rt]cmd =0x41544d4e, len=14344
4,014,965 >>> mbox cmd response data (8 bytes)
4,014,966 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,207 UART: [rt]cmd =0x41545348, len=116
4,067,486 >>> mbox cmd response data (12 bytes)
4,067,487 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,037 UART:
4,068,053 UART: Running Caliptra ROM ...
4,068,461 UART:
4,068,515 UART: [state] CFI Enabled
4,071,495 UART: [state] LifecycleState = Unprovisioned
4,072,150 UART: [state] DebugLocked = No
4,072,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,074,407 UART: [kat] SHA2-256
4,868,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,872,453 UART: [kat] ++
4,872,605 UART: [kat] sha1
4,876,865 UART: [kat] SHA2-256
4,878,803 UART: [kat] SHA2-384
4,881,614 UART: [kat] SHA2-512-ACC
4,883,514 UART: [kat] ECC-384
4,888,949 UART: [kat] HMAC-384Kdf
4,893,653 UART: [kat] LMS
5,461,849 UART: [kat] --
5,462,746 UART: [update-reset] ++
6,390,280 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,391,480 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,487,914 >>> mbox cmd response: success
6,487,914 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,488,133 UART: [update-reset] Copying MAN_2 To MAN_1
6,496,147 UART: [update-reset Success] --
6,497,174 UART: [state] Locking Datavault
6,497,914 UART: [state] Locking PCR0, PCR1 and PCR31
6,498,518 UART: [state] Locking ICCM
6,499,172 UART: [exit] Launching FMC @ 0x40000130
6,504,501 UART:
6,504,517 UART: Running Caliptra FMC ...
6,504,925 UART:
6,504,979 UART: [state] CFI Enabled
6,594,302 UART: [art] Extend RT PCRs Done
6,594,730 UART: [art] Lock RT PCRs Done
6,595,925 UART: [art] Populate DV Done
6,604,110 UART: [fht] FMC Alias Private Key: 7
6,605,098 UART: [art] Derive CDI
6,605,378 UART: [art] Store in in slot 0x4
6,691,039 UART: [art] Derive Key Pair
6,691,399 UART: [art] Store priv key in slot 0x5
6,704,239 UART: [art] Derive Key Pair - Done
6,718,883 UART: [art] Signing Cert with AUTHO
6,719,363 UART: RITY.KEYID = 7
6,734,347 UART: [art] Erasing AUTHORITY.KEYID = 7
6,735,112 UART: [art] PUB.X = AFC3639C9B1857EAD71A6CAFC217A33C8B46624FD27B5F3C7BB912B36EBDDC6BC27C021726B701C46169AAF0A5D36FF9
6,741,896 UART: [art] PUB.Y = 3DC2BACE075BEC209403B23F4D065E36655E8AECEB2902721066DD73C0A91E21CE91B7873ED858644577693B6BA3FA76
6,748,840 UART: [art] SIG.R = 3F01CFD537EA6B550806560B6F889CF87DC3200245AAE7059E5CD23E32179F09995B464B51E4F946DC560FBC8B8217A5
6,755,588 UART: [art] SIG.S = E3CA230EBA17B0405DDCE2ECDAE51A8A290325E1B5A00CAC4DDFC73D6C5171B4B765391AABF9B14A0347CA815BA72FFF
6,779,531 UART: mbox::rt_entry...
6,779,903 UART: ____ _ _ _ ____ _____
6,780,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,781,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,782,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,783,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,783,791 UART: |_|
6,784,103 UART:
7,066,089 UART: [rt] Runtime listening for mailbox commands...
7,067,279 >>> mbox cmd response data (48 bytes)
7,067,280 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,070,063 >>> mbox cmd response data (48 bytes)
7,070,064 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,085,201 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,606 >>> mbox cmd response: success
2,988,718 UART:
2,988,734 UART: Running Caliptra FMC ...
2,989,142 UART:
2,989,196 UART: [state] CFI Enabled
2,999,357 UART: [fht] FMC Alias Private Key: 7
3,107,272 UART: [art] Extend RT PCRs Done
3,107,700 UART: [art] Lock RT PCRs Done
3,109,264 UART: [art] Populate DV Done
3,117,543 UART: [fht] FMC Alias Private Key: 7
3,118,657 UART: [art] Derive CDI
3,118,937 UART: [art] Store in in slot 0x4
3,204,644 UART: [art] Derive Key Pair
3,205,004 UART: [art] Store priv key in slot 0x5
3,218,402 UART: [art] Derive Key Pair - Done
3,232,908 UART: [art] Signing Cert with AUTHO
3,233,388 UART: RITY.KEYID = 7
3,248,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,165 UART: [art] PUB.X = 66CC057AB9FAA76C705E8D07DBDA8B895639F8CF61A05290922B0BCAAB34A00D315925B1861A8658D6CA0C7C5917A9A1
3,255,930 UART: [art] PUB.Y = 02A04E8115607601355B263D8BA79B8DF395E27D8B8BD5A515E35222DF878FA09969BD8E305F743B681A14FAD497D2B7
3,262,874 UART: [art] SIG.R = 2A8F7A3E639B432F296D1C77ED2E1A5E52E7F5071843A2851BE4C38E3B4206F3B192A669B9489373D6D8889BA8DD0AB4
3,269,639 UART: [art] SIG.S = 592C8226CD1F133F91F0E3DCD142D0D24E557169C4FAC4612B2E98FC5E2EDDE09E384F0345DE6D7692A1A30D49AD10EC
3,293,258 UART: Caliptra RT
3,293,511 UART: [state] CFI Enabled
3,401,991 UART: [rt] RT listening for mailbox commands...
3,402,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,801 UART: [rt]cmd =0x41544d4e, len=14344
3,835,466 >>> mbox cmd response data (8 bytes)
3,835,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,558 UART: [rt]cmd =0x41545348, len=116
3,887,341 >>> mbox cmd response data (12 bytes)
3,887,342 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,371 >>> mbox cmd response: success
6,188,371 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,201,898 UART:
6,201,914 UART: Running Caliptra FMC ...
6,202,322 UART:
6,202,376 UART: [state] CFI Enabled
6,291,303 UART: [art] Extend RT PCRs Done
6,291,731 UART: [art] Lock RT PCRs Done
6,293,064 UART: [art] Populate DV Done
6,301,007 UART: [fht] FMC Alias Private Key: 7
6,302,111 UART: [art] Derive CDI
6,302,391 UART: [art] Store in in slot 0x4
6,387,834 UART: [art] Derive Key Pair
6,388,194 UART: [art] Store priv key in slot 0x5
6,401,950 UART: [art] Derive Key Pair - Done
6,416,766 UART: [art] Signing Cert with AUTHO
6,417,246 UART: RITY.KEYID = 7
6,431,918 UART: [art] Erasing AUTHORITY.KEYID = 7
6,432,683 UART: [art] PUB.X = 57378BAFF690DD1906F20FF5FF39885604C9A7BDB70B62506B40AE8C5DC4EB52BA152BB5BD19F3C0D3C59F8E475464B0
6,439,455 UART: [art] PUB.Y = 6D123B451501F8A7973A943A5EDBFFBA1F29C2E537611AA20FD4626E106C18F4C09CFB8796B2B32BFD2C1AA1BF5DA9C3
6,446,417 UART: [art] SIG.R = 511949358FED9313F10A8F2F69B0C0D9A52B6A51D5F1771AE8BB760D09A7DBCFCEA4E2F431C0218169F1CE0DA107EED2
6,453,188 UART: [art] SIG.S = 7E0D5FA1B8791DCBB4E586E4225CF18427A6225E775D99D60D71AEBEBF8DBA4347F07765247B2596B13E8A5D593A8D7C
6,477,219 UART: mbox::rt_entry...
6,477,591 UART: ____ _ _ _ ____ _____
6,478,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,479,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,479,943 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,480,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,481,479 UART: |_|
6,481,791 UART:
6,763,316 UART: [rt] Runtime listening for mailbox commands...
6,764,506 >>> mbox cmd response data (48 bytes)
6,764,507 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,767,290 >>> mbox cmd response data (48 bytes)
6,767,291 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,782,428 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,587 UART: [kat] LMS
1,475,783 UART: [kat] --
1,476,486 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 ready_for_fw is high
1,481,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,693 UART: [idev] Erasing UDS.KEYID = 0
1,505,857 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,451 UART: [idev] --
1,515,614 UART: [ldev] ++
1,515,782 UART: [ldev] CDI.KEYID = 6
1,516,145 UART: [ldev] SUBJECT.KEYID = 5
1,516,571 UART: [ldev] AUTHORITY.KEYID = 7
1,517,034 UART: [ldev] FE.KEYID = 1
1,522,830 UART: [ldev] Erasing FE.KEYID = 1
1,548,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,319 UART: [ldev] --
1,587,776 UART: [fwproc] Waiting for Commands...
1,588,457 UART: [fwproc] Received command 0x46574c44
1,589,248 UART: [fwproc] Received Image of size 114332 bytes
2,886,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,941 >>> mbox cmd response: success
3,080,081 UART: [afmc] ++
3,080,249 UART: [afmc] CDI.KEYID = 6
3,080,611 UART: [afmc] SUBJECT.KEYID = 7
3,081,036 UART: [afmc] AUTHORITY.KEYID = 5
3,115,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,697 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,477 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,205 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,090 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,780 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,617 UART: [afmc] --
3,158,533 UART: [cold-reset] --
3,159,339 UART: [state] Locking Datavault
3,160,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,990 UART: [state] Locking ICCM
3,161,636 UART: [exit] Launching FMC @ 0x40000130
3,166,965 UART:
3,166,981 UART: Running Caliptra FMC ...
3,167,389 UART:
3,167,532 UART: [state] CFI Enabled
3,178,409 UART: [fht] FMC Alias Private Key: 7
3,286,806 UART: [art] Extend RT PCRs Done
3,287,234 UART: [art] Lock RT PCRs Done
3,288,974 UART: [art] Populate DV Done
3,297,405 UART: [fht] FMC Alias Private Key: 7
3,298,537 UART: [art] Derive CDI
3,298,817 UART: [art] Store in in slot 0x4
3,384,542 UART: [art] Derive Key Pair
3,384,902 UART: [art] Store priv key in slot 0x5
3,398,120 UART: [art] Derive Key Pair - Done
3,413,069 UART: [art] Signing Cert with AUTHO
3,413,549 UART: RITY.KEYID = 7
3,428,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,708 UART: [art] PUB.X = 66C5E9D2FDF19031CF546E0CBC26C9DACF46B20DA3EAA567134F9A4E9DEC3E27B85825863EEB063127AA17645FDACCB6
3,436,491 UART: [art] PUB.Y = 9B16CF24DFC9D96393CC3F53E01A1BDA6020FF71893C7B958734B41F29803C2016E3B6B708B8C7A035512C4EF8DF0F0F
3,443,440 UART: [art] SIG.R = 5800CBE933EF70CCFB9412B62C6DC1EC0EE2D68D30F2EF97E1FBE9560AD5FC8F2A7B4F65A5390EC3A6B97B02AC86DAAE
3,450,206 UART: [art] SIG.S = 815A4CD9EA7DB5D863436DA55BCEFD4891BF6C96371DC77CB47340AE52BD5095E4372C2A8A6072F1072C7BE456B433E4
3,473,830 UART: Caliptra RT
3,474,175 UART: [state] CFI Enabled
3,582,904 UART: [rt] RT listening for mailbox commands...
3,583,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,658 UART: [rt]cmd =0x41544d4e, len=14344
4,016,683 >>> mbox cmd response data (8 bytes)
4,016,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,713 UART: [rt]cmd =0x41545348, len=116
4,068,180 >>> mbox cmd response data (12 bytes)
4,068,181 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,013 UART:
4,069,029 UART: Running Caliptra ROM ...
4,069,437 UART:
4,069,578 UART: [state] CFI Enabled
4,072,196 UART: [state] LifecycleState = Unprovisioned
4,072,851 UART: [state] DebugLocked = No
4,073,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,074,938 UART: [kat] SHA2-256
4,868,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,872,984 UART: [kat] ++
4,873,136 UART: [kat] sha1
4,877,194 UART: [kat] SHA2-256
4,879,132 UART: [kat] SHA2-384
4,881,679 UART: [kat] SHA2-512-ACC
4,883,579 UART: [kat] ECC-384
4,889,068 UART: [kat] HMAC-384Kdf
4,893,570 UART: [kat] LMS
5,461,766 UART: [kat] --
5,462,353 UART: [update-reset] ++
6,390,333 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,391,555 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,487,989 >>> mbox cmd response: success
6,487,989 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,488,094 UART: [update-reset] Copying MAN_2 To MAN_1
6,496,108 UART: [update-reset Success] --
6,497,175 UART: [state] Locking Datavault
6,498,035 UART: [state] Locking PCR0, PCR1 and PCR31
6,498,639 UART: [state] Locking ICCM
6,499,269 UART: [exit] Launching FMC @ 0x40000130
6,504,598 UART:
6,504,614 UART: Running Caliptra FMC ...
6,505,022 UART:
6,505,165 UART: [state] CFI Enabled
6,594,892 UART: [art] Extend RT PCRs Done
6,595,320 UART: [art] Lock RT PCRs Done
6,596,805 UART: [art] Populate DV Done
6,605,178 UART: [fht] FMC Alias Private Key: 7
6,606,298 UART: [art] Derive CDI
6,606,578 UART: [art] Store in in slot 0x4
6,691,871 UART: [art] Derive Key Pair
6,692,231 UART: [art] Store priv key in slot 0x5
6,705,961 UART: [art] Derive Key Pair - Done
6,720,849 UART: [art] Signing Cert with AUTHO
6,721,329 UART: RITY.KEYID = 7
6,736,071 UART: [art] Erasing AUTHORITY.KEYID = 7
6,736,836 UART: [art] PUB.X = FFD33B02B3983A6389C39443016A1F2CA48308743BC3B2872057F5E12B71EDBD3C0BB369B6F21EFBA4766FB1C93CCE67
6,743,604 UART: [art] PUB.Y = 5FEA3481C8DF5BC75432E11F66A27E447AA0ED4AC511BEDAA4F701AEFA822B3AD4836DB2CD6B5C438F7F71857A5BDC54
6,750,575 UART: [art] SIG.R = 10234C4C155218EABE76D35517CE7A5A6A2956475EB8E96FFEA74D6589324FD0DD233CD91F782F23453B4D0085BB6506
6,757,322 UART: [art] SIG.S = 5FAE30A7E29C49E7BDAB4A52B47EDE927550D355C3D96017C10D77CEC039483D187AEF0050BCC43C7C8AEB2F21D96572
6,780,824 UART: mbox::rt_entry...
6,781,196 UART: ____ _ _ _ ____ _____
6,781,980 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,782,780 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,783,548 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,784,316 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,785,084 UART: |_|
6,785,396 UART:
7,065,075 UART: [rt] Runtime listening for mailbox commands...
7,066,265 >>> mbox cmd response data (48 bytes)
7,066,266 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,069,049 >>> mbox cmd response data (48 bytes)
7,069,050 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,084,187 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,432 ready_for_fw is high
1,363,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,263 >>> mbox cmd response: success
2,990,297 UART:
2,990,313 UART: Running Caliptra FMC ...
2,990,721 UART:
2,990,864 UART: [state] CFI Enabled
3,001,379 UART: [fht] FMC Alias Private Key: 7
3,109,128 UART: [art] Extend RT PCRs Done
3,109,556 UART: [art] Lock RT PCRs Done
3,111,358 UART: [art] Populate DV Done
3,119,389 UART: [fht] FMC Alias Private Key: 7
3,120,445 UART: [art] Derive CDI
3,120,725 UART: [art] Store in in slot 0x4
3,206,134 UART: [art] Derive Key Pair
3,206,494 UART: [art] Store priv key in slot 0x5
3,219,642 UART: [art] Derive Key Pair - Done
3,234,212 UART: [art] Signing Cert with AUTHO
3,234,692 UART: RITY.KEYID = 7
3,249,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,475 UART: [art] PUB.X = D680FB0661E250C60AAF57D93FE6CECA1A47C66002A56E181B3B41B6646324537CF188848654BD898A7BDE808FC8365A
3,257,240 UART: [art] PUB.Y = 4FE0B058AEE5F61AACCB75EA72FEF31B08BE5C7231CC674E042B09A66D0FA22A00720CAFA824BBE959D0C64B7FE545A5
3,264,177 UART: [art] SIG.R = 77435F12C4FDE4B6F091F4D9E13D1B371CCD8A291607E1788F469672565019D88934DF7240024413DA35B89250E15073
3,270,929 UART: [art] SIG.S = 01170DD964437035F373474762B3AAF549D8B20685B35A752221B81F35099FADBACC6D9AC7A4724D4460AEC47E14BCE1
3,295,514 UART: Caliptra RT
3,295,859 UART: [state] CFI Enabled
3,403,831 UART: [rt] RT listening for mailbox commands...
3,404,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,789 UART: [rt]cmd =0x41544d4e, len=14344
3,837,064 >>> mbox cmd response data (8 bytes)
3,837,065 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,092 UART: [rt]cmd =0x41545348, len=116
3,888,149 >>> mbox cmd response data (12 bytes)
3,888,150 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,191,106 >>> mbox cmd response: success
6,191,106 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,204,315 UART:
6,204,331 UART: Running Caliptra FMC ...
6,204,739 UART:
6,204,882 UART: [state] CFI Enabled
6,293,627 UART: [art] Extend RT PCRs Done
6,294,055 UART: [art] Lock RT PCRs Done
6,295,086 UART: [art] Populate DV Done
6,303,213 UART: [fht] FMC Alias Private Key: 7
6,304,197 UART: [art] Derive CDI
6,304,477 UART: [art] Store in in slot 0x4
6,390,150 UART: [art] Derive Key Pair
6,390,510 UART: [art] Store priv key in slot 0x5
6,403,878 UART: [art] Derive Key Pair - Done
6,418,724 UART: [art] Signing Cert with AUTHO
6,419,204 UART: RITY.KEYID = 7
6,434,376 UART: [art] Erasing AUTHORITY.KEYID = 7
6,435,141 UART: [art] PUB.X = 74BC5D10DD6356780E146AF571A70D9F1FB827D60CB8CF4A841504E50E18D0295F8DDF10506518AD3C8D6F127F369382
6,441,898 UART: [art] PUB.Y = B7A39CC0ED74ECBA8FFF79F0321A705D496A7D5547D30A8CC248E01596CC12CFFF53C13758181AFE6F84D646450B6F46
6,448,854 UART: [art] SIG.R = 71A50D8580C6F2AEECCF0BBD3550E5E5DF586FD83941FA85C67BA8AF2E13008366F65245FE3E7EE2767092A5A0035A50
6,455,603 UART: [art] SIG.S = B6964CF5F6B398BC7AD337DA3EBD5D822B845A964DA79A1E7D47683691F9D23F8AD24BDA16C37B2F0A474F09818CCE9A
6,478,762 UART: mbox::rt_entry...
6,479,134 UART: ____ _ _ _ ____ _____
6,479,918 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,480,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,481,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,482,254 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,483,022 UART: |_|
6,483,334 UART:
6,768,006 UART: [rt] Runtime listening for mailbox commands...
6,769,196 >>> mbox cmd response data (48 bytes)
6,769,197 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,771,980 >>> mbox cmd response data (48 bytes)
6,771,981 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,787,118 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
893,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,615 UART: [kat] ++
897,767 UART: [kat] sha1
902,117 UART: [kat] SHA2-256
904,057 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,020 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 ready_for_fw is high
1,176,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,273 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,321 >>> mbox cmd response: success
2,773,461 UART: [afmc] ++
2,773,629 UART: [afmc] CDI.KEYID = 6
2,773,991 UART: [afmc] SUBJECT.KEYID = 7
2,774,416 UART: [afmc] AUTHORITY.KEYID = 5
2,809,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,452 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,428 UART: [afmc] --
2,852,428 UART: [cold-reset] --
2,853,314 UART: [state] Locking Datavault
2,854,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,113 UART: [state] Locking ICCM
2,855,623 UART: [exit] Launching FMC @ 0x40000130
2,860,952 UART:
2,860,968 UART: Running Caliptra FMC ...
2,861,376 UART:
2,861,430 UART: [state] CFI Enabled
2,872,289 UART: [fht] FMC Alias Private Key: 7
2,980,076 UART: [art] Extend RT PCRs Done
2,980,504 UART: [art] Lock RT PCRs Done
2,981,918 UART: [art] Populate DV Done
2,990,207 UART: [fht] FMC Alias Private Key: 7
2,991,293 UART: [art] Derive CDI
2,991,573 UART: [art] Store in in slot 0x4
3,076,972 UART: [art] Derive Key Pair
3,077,332 UART: [art] Store priv key in slot 0x5
3,090,554 UART: [art] Derive Key Pair - Done
3,105,490 UART: [art] Signing Cert with AUTHO
3,105,970 UART: RITY.KEYID = 7
3,120,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,715 UART: [art] PUB.X = 4983E0FBCE4C88EDC1951308E3EF8242DE7128EFF8902811C6B8E099679289A87EE1525E0173B67770DFE38BED7CF3EF
3,128,487 UART: [art] PUB.Y = 310360570C2FAD7E50CD58C6D3B5BF3F02F1A406CC0C61522C38D6A9EDFCB4C7E300653BF944DCC47EC22EDF25F6DF7B
3,135,422 UART: [art] SIG.R = 68F0BB60DA6E7404D6732E54FD7BDBF0119DEFA3EDE941752631509E24823072795B45661D0536DB0BCD5E26920FFE40
3,142,184 UART: [art] SIG.S = 0531E63B25DB969B260E5FDB5D889BCF18430065AE94F91FAB0CB8D85B1E7D5E41D75F94D46699B03B4E241505669FBB
3,166,143 UART: Caliptra RT
3,166,396 UART: [state] CFI Enabled
3,274,251 UART: [rt] RT listening for mailbox commands...
3,274,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,059 UART: [rt]cmd =0x41544d4e, len=14344
3,707,988 >>> mbox cmd response data (8 bytes)
3,707,989 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,150 UART: [rt]cmd =0x41545348, len=116
3,759,849 >>> mbox cmd response data (12 bytes)
3,759,850 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,497 UART:
3,760,513 UART: Running Caliptra ROM ...
3,760,921 UART:
3,760,976 UART: [state] CFI Enabled
3,763,504 UART: [state] LifecycleState = Unprovisioned
3,764,159 UART: [state] DebugLocked = No
3,764,767 UART: [state] WD Timer not started. Device not locked for debugging
3,765,925 UART: [kat] SHA2-256
4,571,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,575,700 UART: [kat] ++
4,575,852 UART: [kat] sha1
4,580,140 UART: [kat] SHA2-256
4,582,080 UART: [kat] SHA2-384
4,584,813 UART: [kat] SHA2-512-ACC
4,586,713 UART: [kat] ECC-384
4,596,492 UART: [kat] HMAC-384Kdf
4,601,108 UART: [kat] LMS
4,849,436 UART: [kat] --
4,850,378 UART: [update-reset] ++
5,755,912 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,757,083 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,853,465 >>> mbox cmd response: success
5,853,465 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,853,646 UART: [update-reset] Copying MAN_2 To MAN_1
5,861,660 UART: [update-reset Success] --
5,862,753 UART: [state] Locking Datavault
5,863,697 UART: [state] Locking PCR0, PCR1 and PCR31
5,864,301 UART: [state] Locking ICCM
5,864,805 UART: [exit] Launching FMC @ 0x40000130
5,870,134 UART:
5,870,150 UART: Running Caliptra FMC ...
5,870,558 UART:
5,870,612 UART: [state] CFI Enabled
5,959,903 UART: [art] Extend RT PCRs Done
5,960,331 UART: [art] Lock RT PCRs Done
5,961,526 UART: [art] Populate DV Done
5,969,687 UART: [fht] FMC Alias Private Key: 7
5,970,765 UART: [art] Derive CDI
5,971,045 UART: [art] Store in in slot 0x4
6,056,634 UART: [art] Derive Key Pair
6,056,994 UART: [art] Store priv key in slot 0x5
6,069,864 UART: [art] Derive Key Pair - Done
6,084,566 UART: [art] Signing Cert with AUTHO
6,085,046 UART: RITY.KEYID = 7
6,100,344 UART: [art] Erasing AUTHORITY.KEYID = 7
6,101,109 UART: [art] PUB.X = 0699634E1F0F18777411CF5C415F58F01D27AF07BE2C427CD08915128BE1A550876196D82D126F22BF8AFA3051C6A6FC
6,107,870 UART: [art] PUB.Y = FB23712203D667045678A3A5A14A6764266714CA01E5DCBD6E6517A00DAD267E86205C24BC45D86A364EE25E23223856
6,114,802 UART: [art] SIG.R = 6DCD93FAFEDF7C00DD0D26011A950F80385679DB3CE15202F48325DE2BA4662FA6F190224BF4E9B2E7A2A2F4159B8DA7
6,121,552 UART: [art] SIG.S = D63A185D5724177D1C3C69A0714B4441646FF3AAAD1436143EF57636CC849DD1BEDE5372616EE19741E6334290AB3F00
6,145,573 UART: mbox::rt_entry...
6,145,945 UART: ____ _ _ _ ____ _____
6,146,729 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,147,529 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,148,297 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,149,065 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,149,833 UART: |_|
6,150,145 UART:
6,432,125 UART: [rt] Runtime listening for mailbox commands...
6,433,315 >>> mbox cmd response data (48 bytes)
6,433,316 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,436,099 >>> mbox cmd response data (48 bytes)
6,436,100 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,451,237 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,441 ready_for_fw is high
1,060,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,104 >>> mbox cmd response: success
2,687,200 UART:
2,687,216 UART: Running Caliptra FMC ...
2,687,624 UART:
2,687,678 UART: [state] CFI Enabled
2,698,379 UART: [fht] FMC Alias Private Key: 7
2,805,846 UART: [art] Extend RT PCRs Done
2,806,274 UART: [art] Lock RT PCRs Done
2,807,976 UART: [art] Populate DV Done
2,816,027 UART: [fht] FMC Alias Private Key: 7
2,817,125 UART: [art] Derive CDI
2,817,405 UART: [art] Store in in slot 0x4
2,903,010 UART: [art] Derive Key Pair
2,903,370 UART: [art] Store priv key in slot 0x5
2,916,732 UART: [art] Derive Key Pair - Done
2,931,664 UART: [art] Signing Cert with AUTHO
2,932,144 UART: RITY.KEYID = 7
2,947,412 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,177 UART: [art] PUB.X = 667D6893FBF6475326A7C590D4A537E162DDD819AE614B63CB96F11FEB2DD32C0B81BC828F0A62D882ECF5AE8F38FE49
2,954,955 UART: [art] PUB.Y = C9EB23E1F39FFF2AAB0EF59811B794374CC27DDFED23881946934B36FFF7E247CB604B0C9C9AB400B06A5B1131A81D1C
2,961,893 UART: [art] SIG.R = CD582980FE65E20E8068A43D1E3E89763C9833F50EEB934A4DD909399F2CDE90C4DB68B14F33DEE7723AD309762A4AB5
2,968,659 UART: [art] SIG.S = 6CED2C03DAA9D9830CD6D633FC09238D8F7705D4092D706916A47A42AE47F39C403E01ECA3CC0D6CD439DF87DBDA28C8
2,992,697 UART: Caliptra RT
2,992,950 UART: [state] CFI Enabled
3,101,619 UART: [rt] RT listening for mailbox commands...
3,102,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,409 UART: [rt]cmd =0x41544d4e, len=14344
3,535,554 >>> mbox cmd response data (8 bytes)
3,535,555 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,618 UART: [rt]cmd =0x41545348, len=116
3,587,719 >>> mbox cmd response data (12 bytes)
3,587,720 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,563,689 >>> mbox cmd response: success
5,563,689 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,576,857 UART:
5,576,873 UART: Running Caliptra FMC ...
5,577,281 UART:
5,577,335 UART: [state] CFI Enabled
5,666,614 UART: [art] Extend RT PCRs Done
5,667,042 UART: [art] Lock RT PCRs Done
5,668,269 UART: [art] Populate DV Done
5,676,440 UART: [fht] FMC Alias Private Key: 7
5,677,432 UART: [art] Derive CDI
5,677,712 UART: [art] Store in in slot 0x4
5,763,121 UART: [art] Derive Key Pair
5,763,481 UART: [art] Store priv key in slot 0x5
5,776,361 UART: [art] Derive Key Pair - Done
5,791,035 UART: [art] Signing Cert with AUTHO
5,791,515 UART: RITY.KEYID = 7
5,806,785 UART: [art] Erasing AUTHORITY.KEYID = 7
5,807,550 UART: [art] PUB.X = 00DD19826FA021289E699B10D32D5263BE448C40750533ABBD001B4424EEA477661D2C302064A1A63E5877F421460392
5,814,258 UART: [art] PUB.Y = 61A448FF83163089CE0BCCB1AD1C8F0544D12D707613AFB0354234A74314B040F38EBBAE873E6E1B0372EA5008736F7C
5,821,200 UART: [art] SIG.R = 115434FBBAB75896FDA3902002FBAF8F5F31688B207C9039B3E1E98A9FAF13AABEBD7A6BE2C4D748D532512B24490C5A
5,827,978 UART: [art] SIG.S = 97A41819CC173797F531558A6BF7AF186023B2350C62F2FB066440B9529CB950AC47D3EF6C8894592F3793960B2B4C70
5,852,056 UART: mbox::rt_entry...
5,852,428 UART: ____ _ _ _ ____ _____
5,853,212 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,854,012 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,854,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,855,548 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,856,316 UART: |_|
5,856,628 UART:
6,136,586 UART: [rt] Runtime listening for mailbox commands...
6,137,776 >>> mbox cmd response data (48 bytes)
6,137,777 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,140,560 >>> mbox cmd response data (48 bytes)
6,140,561 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,155,698 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
893,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,486 UART: [kat] ++
897,638 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,543 UART: [kat] SHA2-512-ACC
908,444 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
922,921 UART: [kat] LMS
1,171,249 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,744 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 ready_for_fw is high
1,176,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,193 UART: [idev] Erasing UDS.KEYID = 0
1,201,064 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] --
1,210,494 UART: [ldev] ++
1,210,662 UART: [ldev] CDI.KEYID = 6
1,211,025 UART: [ldev] SUBJECT.KEYID = 5
1,211,451 UART: [ldev] AUTHORITY.KEYID = 7
1,211,914 UART: [ldev] FE.KEYID = 1
1,217,170 UART: [ldev] Erasing FE.KEYID = 1
1,243,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,444 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,529 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,088 >>> mbox cmd response: success
2,775,178 UART: [afmc] ++
2,775,346 UART: [afmc] CDI.KEYID = 6
2,775,708 UART: [afmc] SUBJECT.KEYID = 7
2,776,133 UART: [afmc] AUTHORITY.KEYID = 5
2,811,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,032 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,751 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,613 UART: [afmc] --
2,854,523 UART: [cold-reset] --
2,855,181 UART: [state] Locking Datavault
2,856,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,036 UART: [state] Locking ICCM
2,857,556 UART: [exit] Launching FMC @ 0x40000130
2,862,885 UART:
2,862,901 UART: Running Caliptra FMC ...
2,863,309 UART:
2,863,452 UART: [state] CFI Enabled
2,873,933 UART: [fht] FMC Alias Private Key: 7
2,981,764 UART: [art] Extend RT PCRs Done
2,982,192 UART: [art] Lock RT PCRs Done
2,983,578 UART: [art] Populate DV Done
2,991,977 UART: [fht] FMC Alias Private Key: 7
2,993,071 UART: [art] Derive CDI
2,993,351 UART: [art] Store in in slot 0x4
3,079,374 UART: [art] Derive Key Pair
3,079,734 UART: [art] Store priv key in slot 0x5
3,093,578 UART: [art] Derive Key Pair - Done
3,108,104 UART: [art] Signing Cert with AUTHO
3,108,584 UART: RITY.KEYID = 7
3,123,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,535 UART: [art] PUB.X = 9C2616A19BC91696ECE691748DE3D28A47A257379829C25079163510B5E08C64E204175173CD376035B218A03C157641
3,131,284 UART: [art] PUB.Y = B532C75DC2C5B70FB943A11680E4AA8CD602582DB6EE22850FECD72A9B2D11A5428C2A4D1830E5D76FFBE59AAB994AEA
3,138,245 UART: [art] SIG.R = B25033EDEDF60403380C06F015E2AC171EF85D57B90FF2C484E210C75578A220F07AC491DF46BE16EC6EEF775680AB65
3,145,008 UART: [art] SIG.S = AB8462B3F25CFC36B542C466FA72F38FC3ABBD62A2C66B7C1C4108A693A341E2836B7C908D5C102E1C8ADCEC2EC5685C
3,168,430 UART: Caliptra RT
3,168,775 UART: [state] CFI Enabled
3,276,229 UART: [rt] RT listening for mailbox commands...
3,276,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,717 UART: [rt]cmd =0x41544d4e, len=14344
3,709,096 >>> mbox cmd response data (8 bytes)
3,709,097 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,058 UART: [rt]cmd =0x41545348, len=116
3,761,165 >>> mbox cmd response data (12 bytes)
3,761,166 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,989 UART:
3,762,005 UART: Running Caliptra ROM ...
3,762,413 UART:
3,762,555 UART: [state] CFI Enabled
3,765,625 UART: [state] LifecycleState = Unprovisioned
3,766,280 UART: [state] DebugLocked = No
3,766,968 UART: [state] WD Timer not started. Device not locked for debugging
3,768,144 UART: [kat] SHA2-256
4,573,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,577,919 UART: [kat] ++
4,578,071 UART: [kat] sha1
4,582,255 UART: [kat] SHA2-256
4,584,195 UART: [kat] SHA2-384
4,586,946 UART: [kat] SHA2-512-ACC
4,588,846 UART: [kat] ECC-384
4,598,293 UART: [kat] HMAC-384Kdf
4,603,119 UART: [kat] LMS
4,851,447 UART: [kat] --
4,852,517 UART: [update-reset] ++
5,756,403 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,757,418 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,853,800 >>> mbox cmd response: success
5,853,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,854,075 UART: [update-reset] Copying MAN_2 To MAN_1
5,862,089 UART: [update-reset Success] --
5,863,208 UART: [state] Locking Datavault
5,864,018 UART: [state] Locking PCR0, PCR1 and PCR31
5,864,622 UART: [state] Locking ICCM
5,865,078 UART: [exit] Launching FMC @ 0x40000130
5,870,407 UART:
5,870,423 UART: Running Caliptra FMC ...
5,870,831 UART:
5,870,974 UART: [state] CFI Enabled
5,960,225 UART: [art] Extend RT PCRs Done
5,960,653 UART: [art] Lock RT PCRs Done
5,961,968 UART: [art] Populate DV Done
5,970,049 UART: [fht] FMC Alias Private Key: 7
5,971,231 UART: [art] Derive CDI
5,971,511 UART: [art] Store in in slot 0x4
6,057,178 UART: [art] Derive Key Pair
6,057,538 UART: [art] Store priv key in slot 0x5
6,070,412 UART: [art] Derive Key Pair - Done
6,085,211 UART: [art] Signing Cert with AUTHO
6,085,691 UART: RITY.KEYID = 7
6,101,535 UART: [art] Erasing AUTHORITY.KEYID = 7
6,102,300 UART: [art] PUB.X = F4244F232B25DC37DB5D770578DBE921039F2C468F55E3F9A460046E95E5CAD87DF93DD6F1B7E80A8B9557279C01E784
6,109,059 UART: [art] PUB.Y = 56D0EF50333A9C95D05E1791A5EA1265F744667D006C9B91E7156EFDBACD8C0C43C3F4481773B10586923389A9FD953D
6,115,981 UART: [art] SIG.R = 36141C7E0B9D32EE1F0CDD71AE4FA89C4F31D36089BA77FEE895070E134B721E2E59B1FA2197256403B2A77B7D36E6A2
6,122,744 UART: [art] SIG.S = E43BF04995D5AF47877DDF0659C5154AAC65D422CFDD1439B93686BAC9704D44FE8FA7E86F3650BE7049903104A9D329
6,146,637 UART: mbox::rt_entry...
6,147,009 UART: ____ _ _ _ ____ _____
6,147,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,148,593 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,149,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,150,129 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,150,897 UART: |_|
6,151,209 UART:
6,433,809 UART: [rt] Runtime listening for mailbox commands...
6,434,999 >>> mbox cmd response data (48 bytes)
6,435,000 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,437,783 >>> mbox cmd response data (48 bytes)
6,437,784 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,452,921 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,526 ready_for_fw is high
1,060,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,581 >>> mbox cmd response: success
2,691,097 UART:
2,691,113 UART: Running Caliptra FMC ...
2,691,521 UART:
2,691,664 UART: [state] CFI Enabled
2,702,015 UART: [fht] FMC Alias Private Key: 7
2,809,586 UART: [art] Extend RT PCRs Done
2,810,014 UART: [art] Lock RT PCRs Done
2,811,412 UART: [art] Populate DV Done
2,819,815 UART: [fht] FMC Alias Private Key: 7
2,820,753 UART: [art] Derive CDI
2,821,033 UART: [art] Store in in slot 0x4
2,906,922 UART: [art] Derive Key Pair
2,907,282 UART: [art] Store priv key in slot 0x5
2,920,754 UART: [art] Derive Key Pair - Done
2,935,463 UART: [art] Signing Cert with AUTHO
2,935,943 UART: RITY.KEYID = 7
2,951,191 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,956 UART: [art] PUB.X = 01B19A8CFCA7BBA0BF42248B89A4693492975EBAFE30AA3E24BEEAB7C6A4C74C90E8E6F2979A1411C990F982E35050ED
2,958,739 UART: [art] PUB.Y = E896199E64DDC55DADF7057D20FB23B32863CA0A218BAA0BBFBB46C3BD5C6BF532332DCDFBF113C49CB29BC0ECD3329D
2,965,708 UART: [art] SIG.R = 7543784882AA7605E7D10827F195D0946A2E46CB8D2C12852AB6F36FDD73C290A34C270F47317FCF54A4C0B744660AA6
2,972,464 UART: [art] SIG.S = 9F95D4FC524E513D9E7C537E9AE35C9940D2CDB2B24257EE746B400A9DE8F7B57C7F00738FFE5B3366A95FB2145A7B40
2,996,386 UART: Caliptra RT
2,996,731 UART: [state] CFI Enabled
3,104,012 UART: [rt] RT listening for mailbox commands...
3,104,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,680 UART: [rt]cmd =0x41544d4e, len=14344
3,538,065 >>> mbox cmd response data (8 bytes)
3,538,066 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,275 UART: [rt]cmd =0x41545348, len=116
3,589,824 >>> mbox cmd response data (12 bytes)
3,589,825 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,565,688 >>> mbox cmd response: success
5,565,688 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,579,020 UART:
5,579,036 UART: Running Caliptra FMC ...
5,579,444 UART:
5,579,587 UART: [state] CFI Enabled
5,669,096 UART: [art] Extend RT PCRs Done
5,669,524 UART: [art] Lock RT PCRs Done
5,670,751 UART: [art] Populate DV Done
5,678,674 UART: [fht] FMC Alias Private Key: 7
5,679,740 UART: [art] Derive CDI
5,680,020 UART: [art] Store in in slot 0x4
5,765,681 UART: [art] Derive Key Pair
5,766,041 UART: [art] Store priv key in slot 0x5
5,778,975 UART: [art] Derive Key Pair - Done
5,793,888 UART: [art] Signing Cert with AUTHO
5,794,368 UART: RITY.KEYID = 7
5,809,872 UART: [art] Erasing AUTHORITY.KEYID = 7
5,810,637 UART: [art] PUB.X = 4DF9DC16104CFF49F26360B39D7753BF5265528F64976E35C9345D61B2905975B1B1EBFC417723896746AC8A7046E8EE
5,817,403 UART: [art] PUB.Y = F5B500D6BC8B068677DC057E5A8BC9121470ED2C176C287E13158059718519414FBB14F1CC4F7FCA437A125E5C9463F9
5,824,325 UART: [art] SIG.R = 904D47E5F1B2EE3EA876B8F53CC524B7B45020CC82E06117DCA719959913EEFF10CB33C5BFE8099C606F92FC681097C4
5,831,100 UART: [art] SIG.S = 2D3BF6D2590320CF390453E666DC1C428786FF7E2651B8DC6DBC104D7B85966A95BAE40E5DA9F19AE4744352FD44DBE3
5,854,920 UART: mbox::rt_entry...
5,855,292 UART: ____ _ _ _ ____ _____
5,856,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,856,876 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,857,644 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,858,412 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,859,180 UART: |_|
5,859,492 UART:
6,140,564 UART: [rt] Runtime listening for mailbox commands...
6,141,754 >>> mbox cmd response data (48 bytes)
6,141,755 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,144,538 >>> mbox cmd response data (48 bytes)
6,144,539 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,159,676 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,641 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,763 UART: [fwproc] Recv command 0x46574c44
1,282,496 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,949 >>> mbox cmd response: success
2,773,148 UART: [afmc] ++
2,773,316 UART: [afmc] CDI.KEYID = 6
2,773,679 UART: [afmc] SUBJECT.KEYID = 7
2,774,105 UART: [afmc] AUTHORITY.KEYID = 5
2,809,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,311 UART: [afmc] --
2,853,321 UART: [cold-reset] --
2,854,249 UART: [state] Locking Datavault
2,855,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,888 UART: [state] Locking ICCM
2,856,528 UART: [exit] Launching FMC @ 0x40000130
2,861,857 UART:
2,861,873 UART: Running Caliptra FMC ...
2,862,281 UART:
2,862,335 UART: [state] CFI Enabled
2,872,732 UART: [fht] FMC Alias Private Key: 7
2,980,569 UART: [art] Extend RT PCRs Done
2,980,997 UART: [art] Lock RT PCRs Done
2,982,813 UART: [art] Populate DV Done
2,990,702 UART: [fht] FMC Alias Private Key: 7
2,991,698 UART: [art] Derive CDI
2,991,978 UART: [art] Store in in slot 0x4
3,077,611 UART: [art] Derive Key Pair
3,077,971 UART: [art] Store priv key in slot 0x5
3,091,437 UART: [art] Derive Key Pair - Done
3,105,881 UART: [art] Signing Cert with AUTHO
3,106,361 UART: RITY.KEYID = 7
3,121,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,230 UART: [art] PUB.X = A8D24423ECFDC166953571E4ABA70E86C0B86DF53231865A668ADF8BA9E1051D7ED4E5B076F48F61F8363B39DAFCA1A4
3,129,008 UART: [art] PUB.Y = E8599671F01F2006CD8E67F5FA2210657A932BB320F28C99E36E339D619E4543BD198FD6E39EF9F83EFBC0D8912F90B4
3,135,959 UART: [art] SIG.R = BF42A56877FFE26BC3BD27FC68A82E0D56180CB43485A647052BF6CD51125B95E4F9EC186D8FC8903DF94BE52411456A
3,142,728 UART: [art] SIG.S = 9AD51BD63011217F939BFA6658C53298D8953512BB3B563665EEB48290ACEFCF6CB64A85DD0BDFADA6B7202664C0946F
3,165,932 UART: Caliptra RT
3,166,185 UART: [state] CFI Enabled
3,274,273 UART: [rt] RT listening for mailbox commands...
3,274,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,919 UART: [rt]cmd =0x41544d4e, len=14344
3,707,764 >>> mbox cmd response data (8 bytes)
3,707,765 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,930 UART: [rt]cmd =0x41545348, len=116
3,759,989 >>> mbox cmd response data (12 bytes)
3,759,990 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,699 UART:
3,760,715 UART: Running Caliptra ROM ...
3,761,123 UART:
3,761,178 UART: [state] CFI Enabled
3,764,198 UART: [state] LifecycleState = Unprovisioned
3,764,853 UART: [state] DebugLocked = No
3,765,467 UART: [state] WD Timer not started. Device not locked for debugging
3,766,707 UART: [kat] SHA2-256
4,570,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,386 UART: [kat] ++
4,574,538 UART: [kat] sha1
4,578,882 UART: [kat] SHA2-256
4,580,822 UART: [kat] SHA2-384
4,583,485 UART: [kat] SHA2-512-ACC
4,585,385 UART: [kat] ECC-384
4,594,690 UART: [kat] HMAC-384Kdf
4,599,110 UART: [kat] LMS
4,847,422 UART: [kat] --
4,848,530 UART: [update-reset] ++
5,753,733 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,754,822 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,851,204 >>> mbox cmd response: success
5,851,204 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,851,429 UART: [update-reset] Copying MAN_2 To MAN_1
5,859,443 UART: [update-reset Success] --
5,860,520 UART: [state] Locking Datavault
5,861,206 UART: [state] Locking PCR0, PCR1 and PCR31
5,861,810 UART: [state] Locking ICCM
5,862,236 UART: [exit] Launching FMC @ 0x40000130
5,867,565 UART:
5,867,581 UART: Running Caliptra FMC ...
5,867,989 UART:
5,868,043 UART: [state] CFI Enabled
5,956,720 UART: [art] Extend RT PCRs Done
5,957,148 UART: [art] Lock RT PCRs Done
5,958,443 UART: [art] Populate DV Done
5,966,618 UART: [fht] FMC Alias Private Key: 7
5,967,644 UART: [art] Derive CDI
5,967,924 UART: [art] Store in in slot 0x4
6,053,801 UART: [art] Derive Key Pair
6,054,161 UART: [art] Store priv key in slot 0x5
6,067,711 UART: [art] Derive Key Pair - Done
6,082,570 UART: [art] Signing Cert with AUTHO
6,083,050 UART: RITY.KEYID = 7
6,098,476 UART: [art] Erasing AUTHORITY.KEYID = 7
6,099,241 UART: [art] PUB.X = BF68DC1AEDE8F918A5238DBD0D9CE98001EEB4DB2AFEB4F849C31331F3039ACAD25F4A7374A9094F4E3672C378E52D25
6,106,017 UART: [art] PUB.Y = C88D7BB38569EEA3D184B14596AB1893FCBDF61D02F77196181B022C4A88FE9433053E57C6702C3BBBD9BAD97A90CE12
6,112,968 UART: [art] SIG.R = B40470A9F401CD4C0939526EC7C31F585EA2B5E5D729ADE366B23B2F45FA9F5195A4CA2FF88F194A35AF0E49AC849CFC
6,119,742 UART: [art] SIG.S = E196C0BA8CB2FAB300776771FCA3BD111D248431BEE2A88B39FFB676324BBB40543721DFEE107E465570B0E1C0DDD7A5
6,143,553 UART: mbox::rt_entry...
6,143,925 UART: ____ _ _ _ ____ _____
6,144,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,145,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,146,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,147,045 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,147,813 UART: |_|
6,148,125 UART:
6,431,922 UART: [rt] Runtime listening for mailbox commands...
6,433,112 >>> mbox cmd response data (48 bytes)
6,433,113 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,435,896 >>> mbox cmd response data (48 bytes)
6,435,897 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,451,034 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,764 ready_for_fw is high
1,055,764 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,817 >>> mbox cmd response: success
2,684,243 UART:
2,684,259 UART: Running Caliptra FMC ...
2,684,667 UART:
2,684,721 UART: [state] CFI Enabled
2,694,826 UART: [fht] FMC Alias Private Key: 7
2,802,781 UART: [art] Extend RT PCRs Done
2,803,209 UART: [art] Lock RT PCRs Done
2,804,761 UART: [art] Populate DV Done
2,813,090 UART: [fht] FMC Alias Private Key: 7
2,814,270 UART: [art] Derive CDI
2,814,550 UART: [art] Store in in slot 0x4
2,899,947 UART: [art] Derive Key Pair
2,900,307 UART: [art] Store priv key in slot 0x5
2,913,381 UART: [art] Derive Key Pair - Done
2,927,803 UART: [art] Signing Cert with AUTHO
2,928,283 UART: RITY.KEYID = 7
2,943,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,322 UART: [art] PUB.X = 9FFE93C0B418A643E45E4BA7473E314D8F54E8A48B1624459E144E83AD4F4E26479FCCD5E627132AB84F6E56FF41616A
2,951,098 UART: [art] PUB.Y = 10EFB8D43805FC1B5D094E819454174D7DD42BCD60D52EB8F99C6F1A0D6917C82D521A8456604333EB45846FCD12CD7C
2,958,045 UART: [art] SIG.R = 1D59BC790DB844E1247F52CF2DB99D2C709A3F06C74D8A44060443AAE7E7A8AFF80D96C799A48D4B2E2771278E4488F7
2,964,806 UART: [art] SIG.S = 6F2EA850D957F3DE3CD467E6608EA33E10012E3C381FE506384C690D95AF9F314CEA80A6CD498E6C2E499958AA0DA7FD
2,989,211 UART: Caliptra RT
2,989,464 UART: [state] CFI Enabled
3,097,053 UART: [rt] RT listening for mailbox commands...
3,097,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,811 UART: [rt]cmd =0x41544d4e, len=14344
3,530,332 >>> mbox cmd response data (8 bytes)
3,530,333 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,330 UART: [rt]cmd =0x41545348, len=116
3,582,381 >>> mbox cmd response data (12 bytes)
3,582,382 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,555,125 >>> mbox cmd response: success
5,555,125 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,568,137 UART:
5,568,153 UART: Running Caliptra FMC ...
5,568,561 UART:
5,568,615 UART: [state] CFI Enabled
5,658,182 UART: [art] Extend RT PCRs Done
5,658,610 UART: [art] Lock RT PCRs Done
5,660,039 UART: [art] Populate DV Done
5,668,266 UART: [fht] FMC Alias Private Key: 7
5,669,436 UART: [art] Derive CDI
5,669,716 UART: [art] Store in in slot 0x4
5,755,393 UART: [art] Derive Key Pair
5,755,753 UART: [art] Store priv key in slot 0x5
5,769,141 UART: [art] Derive Key Pair - Done
5,783,995 UART: [art] Signing Cert with AUTHO
5,784,475 UART: RITY.KEYID = 7
5,799,483 UART: [art] Erasing AUTHORITY.KEYID = 7
5,800,248 UART: [art] PUB.X = 3BE7BFC5A17F091A49E04FD74FD707BD023BDE2960B7F79A64A2A2808B104A08CBCCD983F3639BBAC1EE7E34BC2A1860
5,807,026 UART: [art] PUB.Y = F27871336F22338DCD29D856A0790A154AB1493AC8F4864FDE2AAB837371BA0D95B90373C484A57E718FAEB15BAD5BD3
5,813,975 UART: [art] SIG.R = 919C3DCE3FDC6D78D37F4BC195B97AA8304A5909451F9CA4E5C87248789B1E5514DA695A451FD718F4940D59421E81D6
5,820,741 UART: [art] SIG.S = 19AEEF396A74276669336DED29C21F9761DCFE82B5350EFAF902EF83F0E7DCF19A087301F0D4469366854AABB1EFE617
5,844,374 UART: mbox::rt_entry...
5,844,746 UART: ____ _ _ _ ____ _____
5,845,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,846,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,847,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,847,866 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,848,634 UART: |_|
5,848,946 UART:
6,129,138 UART: [rt] Runtime listening for mailbox commands...
6,130,328 >>> mbox cmd response data (48 bytes)
6,130,329 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,133,112 >>> mbox cmd response data (48 bytes)
6,133,113 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,148,250 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,461 UART: [kat] SHA2-256
891,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,140 UART: [kat] ++
895,292 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,174,468 ready_for_fw is high
1,174,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,208,855 UART: [ldev] ++
1,209,023 UART: [ldev] CDI.KEYID = 6
1,209,387 UART: [ldev] SUBJECT.KEYID = 5
1,209,814 UART: [ldev] AUTHORITY.KEYID = 7
1,210,277 UART: [ldev] FE.KEYID = 1
1,215,219 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,357 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,362 UART: [fwproc] Recv command 0x46574c44
1,282,095 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,592 >>> mbox cmd response: success
2,772,623 UART: [afmc] ++
2,772,791 UART: [afmc] CDI.KEYID = 6
2,773,154 UART: [afmc] SUBJECT.KEYID = 7
2,773,580 UART: [afmc] AUTHORITY.KEYID = 5
2,808,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,378 UART: [afmc] --
2,852,450 UART: [cold-reset] --
2,853,474 UART: [state] Locking Datavault
2,854,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,261 UART: [state] Locking ICCM
2,855,691 UART: [exit] Launching FMC @ 0x40000130
2,861,020 UART:
2,861,036 UART: Running Caliptra FMC ...
2,861,444 UART:
2,861,587 UART: [state] CFI Enabled
2,872,258 UART: [fht] FMC Alias Private Key: 7
2,979,491 UART: [art] Extend RT PCRs Done
2,979,919 UART: [art] Lock RT PCRs Done
2,981,703 UART: [art] Populate DV Done
2,989,848 UART: [fht] FMC Alias Private Key: 7
2,991,012 UART: [art] Derive CDI
2,991,292 UART: [art] Store in in slot 0x4
3,077,175 UART: [art] Derive Key Pair
3,077,535 UART: [art] Store priv key in slot 0x5
3,090,921 UART: [art] Derive Key Pair - Done
3,105,976 UART: [art] Signing Cert with AUTHO
3,106,456 UART: RITY.KEYID = 7
3,121,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,163 UART: [art] PUB.X = A0C60C37DB735DDC62DB09E6143595E581472C4AF589421A931C33D15E34A5E578B15542A9CDC442F5A621600B5AC6FA
3,128,928 UART: [art] PUB.Y = 872BF0D278DA8883DE41023FD05D7CD8D4157C9F7530F1C78ED74A76273783FDC174716A550B417DB187C4F5FF729A47
3,135,874 UART: [art] SIG.R = 4404C9884B97BE76691680D77D72B94D2AA5F80BC99FE54FD5B01226DCEA46907CB43FF4ADB79431C00953284AABDE6C
3,142,645 UART: [art] SIG.S = F82222DEB8CE45DD4E8C05B762054655889D93168B6842590B26F095B573B19A23CE0EC3F32114048501C80822A5F348
3,166,763 UART: Caliptra RT
3,167,108 UART: [state] CFI Enabled
3,275,553 UART: [rt] RT listening for mailbox commands...
3,276,223 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,077 UART: [rt]cmd =0x41544d4e, len=14344
3,708,736 >>> mbox cmd response data (8 bytes)
3,708,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,974 UART: [rt]cmd =0x41545348, len=116
3,760,785 >>> mbox cmd response data (12 bytes)
3,760,786 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,467 UART:
3,761,483 UART: Running Caliptra ROM ...
3,761,891 UART:
3,762,033 UART: [state] CFI Enabled
3,764,603 UART: [state] LifecycleState = Unprovisioned
3,765,258 UART: [state] DebugLocked = No
3,765,870 UART: [state] WD Timer not started. Device not locked for debugging
3,767,022 UART: [kat] SHA2-256
4,570,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,701 UART: [kat] ++
4,574,853 UART: [kat] sha1
4,578,949 UART: [kat] SHA2-256
4,580,889 UART: [kat] SHA2-384
4,583,586 UART: [kat] SHA2-512-ACC
4,585,486 UART: [kat] ECC-384
4,595,321 UART: [kat] HMAC-384Kdf
4,599,979 UART: [kat] LMS
4,848,291 UART: [kat] --
4,849,033 UART: [update-reset] ++
5,752,716 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,753,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,850,307 >>> mbox cmd response: success
5,850,307 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,850,590 UART: [update-reset] Copying MAN_2 To MAN_1
5,858,604 UART: [update-reset Success] --
5,859,557 UART: [state] Locking Datavault
5,860,295 UART: [state] Locking PCR0, PCR1 and PCR31
5,860,899 UART: [state] Locking ICCM
5,861,393 UART: [exit] Launching FMC @ 0x40000130
5,866,722 UART:
5,866,738 UART: Running Caliptra FMC ...
5,867,146 UART:
5,867,289 UART: [state] CFI Enabled
5,956,420 UART: [art] Extend RT PCRs Done
5,956,848 UART: [art] Lock RT PCRs Done
5,958,235 UART: [art] Populate DV Done
5,966,468 UART: [fht] FMC Alias Private Key: 7
5,967,440 UART: [art] Derive CDI
5,967,720 UART: [art] Store in in slot 0x4
6,053,837 UART: [art] Derive Key Pair
6,054,197 UART: [art] Store priv key in slot 0x5
6,067,553 UART: [art] Derive Key Pair - Done
6,082,066 UART: [art] Signing Cert with AUTHO
6,082,546 UART: RITY.KEYID = 7
6,097,442 UART: [art] Erasing AUTHORITY.KEYID = 7
6,098,207 UART: [art] PUB.X = 11420D0649CCA03BC7858BF4738B8DE0940ED9DAD55E6529B0DC18CBBDDF6D90D1B07214714A87062D36DE9E3F8D56BE
6,104,979 UART: [art] PUB.Y = 1554625778A6BC09F5471A10281E79491B36915AEE67579B70D7A1A156D38E8710B9CE39BF4AF856F78063CA3FEDB28F
6,111,926 UART: [art] SIG.R = EFFA95D2A412AB3F69D450E70E75CD3B68D2128225013A44A1D560FDA6F1FAB4BDD6F4B4C098CECF598D9A3A00375172
6,118,684 UART: [art] SIG.S = 70B3AAD107D84AF9771C4C642040B0C411852CFC159917675245C675FBD91D1A459B14D5E8F5139D03817576C015E045
6,142,205 UART: mbox::rt_entry...
6,142,577 UART: ____ _ _ _ ____ _____
6,143,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,144,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,144,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,145,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,146,465 UART: |_|
6,146,777 UART:
6,426,599 UART: [rt] Runtime listening for mailbox commands...
6,427,789 >>> mbox cmd response data (48 bytes)
6,427,790 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,430,573 >>> mbox cmd response data (48 bytes)
6,430,574 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,445,711 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,353 ready_for_fw is high
1,057,353 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,452 >>> mbox cmd response: success
2,684,022 UART:
2,684,038 UART: Running Caliptra FMC ...
2,684,446 UART:
2,684,589 UART: [state] CFI Enabled
2,694,804 UART: [fht] FMC Alias Private Key: 7
2,802,657 UART: [art] Extend RT PCRs Done
2,803,085 UART: [art] Lock RT PCRs Done
2,804,465 UART: [art] Populate DV Done
2,812,700 UART: [fht] FMC Alias Private Key: 7
2,813,658 UART: [art] Derive CDI
2,813,938 UART: [art] Store in in slot 0x4
2,899,603 UART: [art] Derive Key Pair
2,899,963 UART: [art] Store priv key in slot 0x5
2,913,539 UART: [art] Derive Key Pair - Done
2,928,356 UART: [art] Signing Cert with AUTHO
2,928,836 UART: RITY.KEYID = 7
2,944,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,895 UART: [art] PUB.X = F294D89FB011F801F1A20280CB5A179EBE49700953749E24FE376859988807279F681EFD9E13D325BF356CB237F3A6CB
2,951,651 UART: [art] PUB.Y = 821D0F2E0F4BD48EB20A569C36E56028D4A8B7A4FE3C977B31EAAC3924BB17CCBA46CC1573A68CA0D9027D4CFF3B309E
2,958,609 UART: [art] SIG.R = DCE2C66C8691719FC856E258E50D9EE5BB008CBAB091E0AD3E118282C4658C2C48332C571AF2D8D354770D8D51585562
2,965,353 UART: [art] SIG.S = 1656EF5223DEA5C2D47D9222CC18BE0526025833098C1ACB8DF2E6A29B15686A1E8D1F886A21396B6EEE6C94077F05C9
2,988,753 UART: Caliptra RT
2,989,098 UART: [state] CFI Enabled
3,096,427 UART: [rt] RT listening for mailbox commands...
3,097,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,311 UART: [rt]cmd =0x41544d4e, len=14344
3,530,352 >>> mbox cmd response data (8 bytes)
3,530,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,304 UART: [rt]cmd =0x41545348, len=116
3,582,111 >>> mbox cmd response data (12 bytes)
3,582,112 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,554,324 >>> mbox cmd response: success
5,554,324 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,567,770 UART:
5,567,786 UART: Running Caliptra FMC ...
5,568,194 UART:
5,568,337 UART: [state] CFI Enabled
5,657,808 UART: [art] Extend RT PCRs Done
5,658,236 UART: [art] Lock RT PCRs Done
5,659,533 UART: [art] Populate DV Done
5,667,696 UART: [fht] FMC Alias Private Key: 7
5,668,814 UART: [art] Derive CDI
5,669,094 UART: [art] Store in in slot 0x4
5,754,755 UART: [art] Derive Key Pair
5,755,115 UART: [art] Store priv key in slot 0x5
5,768,023 UART: [art] Derive Key Pair - Done
5,782,737 UART: [art] Signing Cert with AUTHO
5,783,217 UART: RITY.KEYID = 7
5,798,521 UART: [art] Erasing AUTHORITY.KEYID = 7
5,799,286 UART: [art] PUB.X = 583326CFEFB20F55DE967242AE38A7CFABB9743DF77EB754F03C3F215AB8AF57D71CD0413BA09A93D3B6581D33557B36
5,806,065 UART: [art] PUB.Y = 138E5B5C2131D906CC75B59379547A7EC48937B9E08368FFDA604ECC2C74B27A97AA838CFD0B4986EA32F7A39F3AA31C
5,813,019 UART: [art] SIG.R = B803FF102D91CAE90976D36C74C861ACDCF00C8100CD57A336FF4141BCBA5D5278756FABC40C6E4E8C2C993AE80ADD49
5,819,770 UART: [art] SIG.S = D1B6B37E456C62E573369705C1C8412605BB6CBA9BFC51446B8C34B57A8A86FCE69B534B8BC17DD221E52B578F3F1C0D
5,843,466 UART: mbox::rt_entry...
5,843,838 UART: ____ _ _ _ ____ _____
5,844,622 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,845,422 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,846,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,846,958 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,847,726 UART: |_|
5,848,038 UART:
6,125,721 UART: [rt] Runtime listening for mailbox commands...
6,126,911 >>> mbox cmd response data (48 bytes)
6,126,912 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,129,695 >>> mbox cmd response data (48 bytes)
6,129,696 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,144,833 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,703 UART: [kat] SHA2-256
881,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,749 UART: [kat] ++
885,901 UART: [kat] sha1
890,079 UART: [kat] SHA2-256
892,017 UART: [kat] SHA2-384
894,536 UART: [kat] SHA2-512-ACC
896,437 UART: [kat] ECC-384
901,908 UART: [kat] HMAC-384Kdf
906,500 UART: [kat] LMS
1,474,696 UART: [kat] --
1,475,705 UART: [cold-reset] ++
1,476,203 UART: [fht] Storing FHT @ 0x50003400
1,479,196 UART: [idev] ++
1,479,364 UART: [idev] CDI.KEYID = 6
1,479,724 UART: [idev] SUBJECT.KEYID = 7
1,480,148 UART: [idev] UDS.KEYID = 0
1,480,493 ready_for_fw is high
1,480,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,174 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,544 UART: [idev] --
1,514,521 UART: [ldev] ++
1,514,689 UART: [ldev] CDI.KEYID = 6
1,515,052 UART: [ldev] SUBJECT.KEYID = 5
1,515,478 UART: [ldev] AUTHORITY.KEYID = 7
1,515,941 UART: [ldev] FE.KEYID = 1
1,520,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,842 UART: [ldev] --
1,585,241 UART: [fwproc] Waiting for Commands...
1,585,870 UART: [fwproc] Received command 0x46574c44
1,586,661 UART: [fwproc] Received Image of size 114332 bytes
2,884,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,941 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,293 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,104 >>> mbox cmd response: success
3,079,352 UART: [afmc] ++
3,079,520 UART: [afmc] CDI.KEYID = 6
3,079,882 UART: [afmc] SUBJECT.KEYID = 7
3,080,307 UART: [afmc] AUTHORITY.KEYID = 5
3,115,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,256 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,984 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,869 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,559 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,234 UART: [afmc] --
3,158,234 UART: [cold-reset] --
3,159,262 UART: [state] Locking Datavault
3,160,089 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,693 UART: [state] Locking ICCM
3,161,201 UART: [exit] Launching FMC @ 0x40000130
3,166,530 UART:
3,166,546 UART: Running Caliptra FMC ...
3,166,954 UART:
3,167,008 UART: [state] CFI Enabled
3,177,897 UART: [fht] FMC Alias Private Key: 7
3,285,830 UART: [art] Extend RT PCRs Done
3,286,258 UART: [art] Lock RT PCRs Done
3,287,582 UART: [art] Populate DV Done
3,295,841 UART: [fht] FMC Alias Private Key: 7
3,296,825 UART: [art] Derive CDI
3,297,105 UART: [art] Store in in slot 0x4
3,382,524 UART: [art] Derive Key Pair
3,382,884 UART: [art] Store priv key in slot 0x5
3,396,666 UART: [art] Derive Key Pair - Done
3,411,302 UART: [art] Signing Cert with AUTHO
3,411,782 UART: RITY.KEYID = 7
3,426,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,759 UART: [art] PUB.X = C5D7082A678DB96627604C9D469010DD3CF96373DAA1E390111142BFA948FBE1A836D8E0AA14B9361B0A6CAD6B9D8FED
3,434,535 UART: [art] PUB.Y = 9501D9F11F008572C22D6E65E9F017A60871FEEB952A813F6D6848973A8140850A4C320176DAF522123E1A8F0EC26E67
3,441,442 UART: [art] SIG.R = D26BF46E874BE25E644F15ADEDBF56995B4292015728A4C89088D2F59F1F6074DFE0D40C37D327CA1A53DDD7A0250A3F
3,448,213 UART: [art] SIG.S = B9A31947A19F83EB1F79BB04AEC88163D2F2179EE96644DD73F69F92A5D74557C698A4B70E03DCB681576C030C349431
3,472,349 UART: Caliptra RT
3,472,602 UART: [state] CFI Enabled
3,580,636 UART: [rt] RT listening for mailbox commands...
3,581,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,318 UART: [rt]cmd =0x41544d4e, len=14344
4,013,907 >>> mbox cmd response data (8 bytes)
4,013,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,973 UART: [rt]cmd =0x41545348, len=116
4,066,108 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,953 ready_for_fw is high
1,362,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,980 >>> mbox cmd response: success
2,990,428 UART:
2,990,444 UART: Running Caliptra FMC ...
2,990,852 UART:
2,990,906 UART: [state] CFI Enabled
3,001,449 UART: [fht] FMC Alias Private Key: 7
3,109,818 UART: [art] Extend RT PCRs Done
3,110,246 UART: [art] Lock RT PCRs Done
3,111,606 UART: [art] Populate DV Done
3,119,811 UART: [fht] FMC Alias Private Key: 7
3,120,935 UART: [art] Derive CDI
3,121,215 UART: [art] Store in in slot 0x4
3,206,908 UART: [art] Derive Key Pair
3,207,268 UART: [art] Store priv key in slot 0x5
3,220,358 UART: [art] Derive Key Pair - Done
3,235,451 UART: [art] Signing Cert with AUTHO
3,235,931 UART: RITY.KEYID = 7
3,251,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,998 UART: [art] PUB.X = E58B3A58BAF1CDFFFBE8398A7D0FD70D0F5CBA88D560BFA22460794F1D5C1AA99BC8205B10874A446B15DA19DD7FB5A3
3,258,783 UART: [art] PUB.Y = 16095A6D7283135713C1911C45B3DA694AAAC5A65D0909516A62437A355D4DADD08F776D3747A6C68ABAEBFEB53DD130
3,265,730 UART: [art] SIG.R = 857025EC6E89E38919DED47358588EA2905756A3EBA224ADDD77591D02A94418C2F381B4451928650128E6ED8385D6AB
3,272,488 UART: [art] SIG.S = BC019CB5A96A545B5FCBBA20ABD20BC635545834FAA052C6BAEE6DAD811ADE822BB699C70A7FE400D2D2B16DDE84BC4F
3,295,600 UART: Caliptra RT
3,295,853 UART: [state] CFI Enabled
3,403,651 UART: [rt] RT listening for mailbox commands...
3,404,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,477 UART: [rt]cmd =0x41544d4e, len=14344
3,837,194 >>> mbox cmd response data (8 bytes)
3,837,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,204 UART: [rt]cmd =0x41545348, len=116
3,887,591 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,976 UART: [kat] SHA2-256
881,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,022 UART: [kat] ++
886,174 UART: [kat] sha1
890,442 UART: [kat] SHA2-256
892,380 UART: [kat] SHA2-384
894,989 UART: [kat] SHA2-512-ACC
896,890 UART: [kat] ECC-384
902,423 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,808 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 ready_for_fw is high
1,480,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,377 UART: [idev] Erasing UDS.KEYID = 0
1,505,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,147 UART: [idev] --
1,515,226 UART: [ldev] ++
1,515,394 UART: [ldev] CDI.KEYID = 6
1,515,757 UART: [ldev] SUBJECT.KEYID = 5
1,516,183 UART: [ldev] AUTHORITY.KEYID = 7
1,516,646 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,713 UART: [ldev] --
1,587,186 UART: [fwproc] Waiting for Commands...
1,588,049 UART: [fwproc] Received command 0x46574c44
1,588,840 UART: [fwproc] Received Image of size 114332 bytes
2,886,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,781 >>> mbox cmd response: success
3,080,919 UART: [afmc] ++
3,081,087 UART: [afmc] CDI.KEYID = 6
3,081,449 UART: [afmc] SUBJECT.KEYID = 7
3,081,874 UART: [afmc] AUTHORITY.KEYID = 5
3,117,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,965 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,850 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,540 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,567 UART: [afmc] --
3,160,523 UART: [cold-reset] --
3,161,459 UART: [state] Locking Datavault
3,162,684 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,288 UART: [state] Locking ICCM
3,163,896 UART: [exit] Launching FMC @ 0x40000130
3,169,225 UART:
3,169,241 UART: Running Caliptra FMC ...
3,169,649 UART:
3,169,792 UART: [state] CFI Enabled
3,180,515 UART: [fht] FMC Alias Private Key: 7
3,288,310 UART: [art] Extend RT PCRs Done
3,288,738 UART: [art] Lock RT PCRs Done
3,290,630 UART: [art] Populate DV Done
3,298,811 UART: [fht] FMC Alias Private Key: 7
3,299,913 UART: [art] Derive CDI
3,300,193 UART: [art] Store in in slot 0x4
3,385,628 UART: [art] Derive Key Pair
3,385,988 UART: [art] Store priv key in slot 0x5
3,398,672 UART: [art] Derive Key Pair - Done
3,413,435 UART: [art] Signing Cert with AUTHO
3,413,915 UART: RITY.KEYID = 7
3,429,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,144 UART: [art] PUB.X = A80CE9774CE8E33A256F8425F3DC1D1341ADF52DA9F43A732E58CE06CABB24551AB971E1B42B2D3E4F2C6E26245E766C
3,436,922 UART: [art] PUB.Y = 65D402B6B44C0387DE5C234F41A365D9966AF547593CAEEA18104B28365B181D12A424B79D4DE928FDF097F5FBCDFFEB
3,443,878 UART: [art] SIG.R = BF13D3BB6FBDE00CBF9A7CFC8650F850B4566E5263B2D2DA9D1295A38B6DE8B4770E963818AC023FF3BC5941E816AB9B
3,450,657 UART: [art] SIG.S = 82BDCF450A4572C8EE35F5FD6457F2A56E1AEE02B94DFF1CA31292BE15925E1ABC28CA067164CE95EF93AD358D3F834F
3,474,335 UART: Caliptra RT
3,474,680 UART: [state] CFI Enabled
3,582,530 UART: [rt] RT listening for mailbox commands...
3,583,200 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,224 UART: [rt]cmd =0x41544d4e, len=14344
4,016,161 >>> mbox cmd response data (8 bytes)
4,016,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,251 UART: [rt]cmd =0x41545348, len=116
4,067,006 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 ready_for_fw is high
1,362,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,633 >>> mbox cmd response: success
2,988,801 UART:
2,988,817 UART: Running Caliptra FMC ...
2,989,225 UART:
2,989,368 UART: [state] CFI Enabled
3,000,043 UART: [fht] FMC Alias Private Key: 7
3,108,062 UART: [art] Extend RT PCRs Done
3,108,490 UART: [art] Lock RT PCRs Done
3,109,818 UART: [art] Populate DV Done
3,118,135 UART: [fht] FMC Alias Private Key: 7
3,119,295 UART: [art] Derive CDI
3,119,575 UART: [art] Store in in slot 0x4
3,204,834 UART: [art] Derive Key Pair
3,205,194 UART: [art] Store priv key in slot 0x5
3,218,512 UART: [art] Derive Key Pair - Done
3,233,147 UART: [art] Signing Cert with AUTHO
3,233,627 UART: RITY.KEYID = 7
3,249,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,810 UART: [art] PUB.X = D6BDD706C58C67ED47FE2823553F2DA2AF03E3472B0AB9255F675990EA26A27F4CD5289701FD64830C951D9FBD9A9DA0
3,256,575 UART: [art] PUB.Y = A6B37E9FF7A977B2E4D62AA77A045EC6EABE2665FC89D8690C35AEE455EA15988C0255743C29FB0763CCB8B48D6478EC
3,263,527 UART: [art] SIG.R = 9AEE75FF44E63942571C2FD8CE59308CCC5E4677C694C489E4DE3D714ABD39CE63D687AF5ACBB94A9FD845AAEC4630B4
3,270,317 UART: [art] SIG.S = 1D3F760B99A1C3F9DF87CFD4B87E4F7AFE3340CC136B235609FB2B9D6F3C8829AC4B7769D32112EBA321987246E0696A
3,294,482 UART: Caliptra RT
3,294,827 UART: [state] CFI Enabled
3,402,918 UART: [rt] RT listening for mailbox commands...
3,403,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,584 UART: [rt]cmd =0x41544d4e, len=14344
3,836,441 >>> mbox cmd response data (8 bytes)
3,836,442 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,453 UART: [rt]cmd =0x41545348, len=116
3,888,444 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,931 UART: [state] WD Timer not started. Device not locked for debugging
87,130 UART: [kat] SHA2-256
892,780 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,905 UART: [kat] ++
897,057 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,138 UART: [kat] SHA2-512-ACC
908,039 UART: [kat] ECC-384
917,698 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,027 UART: [fht] FHT @ 0x50003400
1,174,708 UART: [idev] ++
1,174,876 UART: [idev] CDI.KEYID = 6
1,175,236 UART: [idev] SUBJECT.KEYID = 7
1,175,660 UART: [idev] UDS.KEYID = 0
1,176,005 ready_for_fw is high
1,176,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,893 UART: [idev] Sha1 KeyId Algorithm
1,209,407 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,814 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,790 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,201 >>> mbox cmd response: success
2,776,347 UART: [afmc] ++
2,776,515 UART: [afmc] CDI.KEYID = 6
2,776,877 UART: [afmc] SUBJECT.KEYID = 7
2,777,302 UART: [afmc] AUTHORITY.KEYID = 5
2,812,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,304 UART: [afmc] --
2,856,268 UART: [cold-reset] --
2,857,342 UART: [state] Locking Datavault
2,858,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,159 UART: [state] Locking ICCM
2,859,795 UART: [exit] Launching FMC @ 0x40000130
2,865,124 UART:
2,865,140 UART: Running Caliptra FMC ...
2,865,548 UART:
2,865,602 UART: [state] CFI Enabled
2,876,275 UART: [fht] FMC Alias Private Key: 7
2,984,484 UART: [art] Extend RT PCRs Done
2,984,912 UART: [art] Lock RT PCRs Done
2,986,644 UART: [art] Populate DV Done
2,994,985 UART: [fht] FMC Alias Private Key: 7
2,995,969 UART: [art] Derive CDI
2,996,249 UART: [art] Store in in slot 0x4
3,081,854 UART: [art] Derive Key Pair
3,082,214 UART: [art] Store priv key in slot 0x5
3,095,102 UART: [art] Derive Key Pair - Done
3,109,935 UART: [art] Signing Cert with AUTHO
3,110,415 UART: RITY.KEYID = 7
3,125,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,400 UART: [art] PUB.X = 419CF0DD931F57AD9293A64DE4203145993DEA6BFEB1FCE5548391F5DF589792F5EA1C500C074F4B000092FA586EF1F8
3,133,128 UART: [art] PUB.Y = 41369B148E0FFA48A3B95ABC77B16321DE9FFFEEB1FF3570A55EA93FCBF28027EDAB2A442878221CAFE7ACE7C9345CF7
3,140,099 UART: [art] SIG.R = E6B77CBD0763F4ADBA5C84E5F459DCCBD75D9D3E5A8AF108798CA0CFFAB8C38E1771595830348075293D3C3A587BB12B
3,146,879 UART: [art] SIG.S = BC4E18A6AB5A2FA8DDE42445A995CF9E5EEB87BE20A0DA6FDB223AA27DBB9A9FB314F29D7CA79588CED140E9D6241EFE
3,170,642 UART: Caliptra RT
3,170,895 UART: [state] CFI Enabled
3,279,407 UART: [rt] RT listening for mailbox commands...
3,280,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,361 UART: [rt]cmd =0x41544d4e, len=14344
3,713,850 >>> mbox cmd response data (8 bytes)
3,713,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,814 UART: [rt]cmd =0x41545348, len=116
3,765,767 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 ready_for_fw is high
1,059,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,416 >>> mbox cmd response: success
2,686,588 UART:
2,686,604 UART: Running Caliptra FMC ...
2,687,012 UART:
2,687,066 UART: [state] CFI Enabled
2,697,641 UART: [fht] FMC Alias Private Key: 7
2,805,242 UART: [art] Extend RT PCRs Done
2,805,670 UART: [art] Lock RT PCRs Done
2,807,288 UART: [art] Populate DV Done
2,815,689 UART: [fht] FMC Alias Private Key: 7
2,816,747 UART: [art] Derive CDI
2,817,027 UART: [art] Store in in slot 0x4
2,902,688 UART: [art] Derive Key Pair
2,903,048 UART: [art] Store priv key in slot 0x5
2,916,202 UART: [art] Derive Key Pair - Done
2,931,130 UART: [art] Signing Cert with AUTHO
2,931,610 UART: RITY.KEYID = 7
2,946,606 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,371 UART: [art] PUB.X = 32CB5929B182324817F0F1D266EFAB5F1F51732A0F488E56E0D99A41B3EAD4CB6B0A3C1514BDE627BC7669ADBDC8C611
2,954,149 UART: [art] PUB.Y = 49E2F8AC4ABFC0E4528FD0F8D2A12F8B96EC64076992AE49440DC534604E83E47C5ED43283444F2337AE30E8AA2B8F07
2,961,098 UART: [art] SIG.R = 9B0F3F0C17DF205E12C0793F832A08B64C410C738DEC97FE9817B3C03A98596699D1E80E90103F832636716647C9DF2E
2,967,849 UART: [art] SIG.S = 05563939069161AFAA0A71F5EF88AB6AFD71ABECE0A2E2F3AF2B67706C6070040E4CD8EB44838CE4451054E7878061D4
2,991,711 UART: Caliptra RT
2,991,964 UART: [state] CFI Enabled
3,098,721 UART: [rt] RT listening for mailbox commands...
3,099,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,665 UART: [rt]cmd =0x41544d4e, len=14344
3,532,562 >>> mbox cmd response data (8 bytes)
3,532,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,582 UART: [rt]cmd =0x41545348, len=116
3,584,483 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,163 UART: [kat] HMAC-384Kdf
922,815 UART: [kat] LMS
1,171,143 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,546 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 ready_for_fw is high
1,176,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,370 UART: [idev] Sha1 KeyId Algorithm
1,209,690 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,271 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,056 UART: [ldev] Erasing FE.KEYID = 1
1,243,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,510 UART: [ldev] --
1,282,773 UART: [fwproc] Wait for Commands...
1,283,593 UART: [fwproc] Recv command 0x46574c44
1,284,321 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,920 >>> mbox cmd response: success
2,776,108 UART: [afmc] ++
2,776,276 UART: [afmc] CDI.KEYID = 6
2,776,638 UART: [afmc] SUBJECT.KEYID = 7
2,777,063 UART: [afmc] AUTHORITY.KEYID = 5
2,813,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,257 UART: [afmc] --
2,856,223 UART: [cold-reset] --
2,857,199 UART: [state] Locking Datavault
2,858,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,196 UART: [state] Locking ICCM
2,859,652 UART: [exit] Launching FMC @ 0x40000130
2,864,981 UART:
2,864,997 UART: Running Caliptra FMC ...
2,865,405 UART:
2,865,548 UART: [state] CFI Enabled
2,876,079 UART: [fht] FMC Alias Private Key: 7
2,984,798 UART: [art] Extend RT PCRs Done
2,985,226 UART: [art] Lock RT PCRs Done
2,986,556 UART: [art] Populate DV Done
2,994,729 UART: [fht] FMC Alias Private Key: 7
2,995,679 UART: [art] Derive CDI
2,995,959 UART: [art] Store in in slot 0x4
3,081,840 UART: [art] Derive Key Pair
3,082,200 UART: [art] Store priv key in slot 0x5
3,095,612 UART: [art] Derive Key Pair - Done
3,110,361 UART: [art] Signing Cert with AUTHO
3,110,841 UART: RITY.KEYID = 7
3,126,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,314 UART: [art] PUB.X = D92799E7EFF0F387BADEE5817DA7560DED2206BD5BCBB25860AC3FD6F046B3CB7357B1905DDF741503CF577F3CEE6F6A
3,134,097 UART: [art] PUB.Y = D55525ED615E094EB57387870CBCE45360F58EACB4A030F058E82F4E4247CD9A3F3CC08FEF0E3518F58933D0AB207CD4
3,141,048 UART: [art] SIG.R = 974D4CA31D7378B6BB5AA1B58ED5791D1E2EEDF9C3DCECCE22B7C57886468687E4410204931BDCEB2A1BA12CBA700F6F
3,147,829 UART: [art] SIG.S = 7BD18896E6C36E3C22E8D5E59BD9059AEEC87068987A582C5EEACC46619CC4BD3C9B11054F687B9BF30FEC10C1F04E41
3,171,951 UART: Caliptra RT
3,172,296 UART: [state] CFI Enabled
3,280,973 UART: [rt] RT listening for mailbox commands...
3,281,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,757 UART: [rt]cmd =0x41544d4e, len=14344
3,714,448 >>> mbox cmd response data (8 bytes)
3,714,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,496 UART: [rt]cmd =0x41545348, len=116
3,765,995 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,466 ready_for_fw is high
1,060,466 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,813 >>> mbox cmd response: success
2,690,373 UART:
2,690,389 UART: Running Caliptra FMC ...
2,690,797 UART:
2,690,940 UART: [state] CFI Enabled
2,701,677 UART: [fht] FMC Alias Private Key: 7
2,809,544 UART: [art] Extend RT PCRs Done
2,809,972 UART: [art] Lock RT PCRs Done
2,811,440 UART: [art] Populate DV Done
2,819,299 UART: [fht] FMC Alias Private Key: 7
2,820,377 UART: [art] Derive CDI
2,820,657 UART: [art] Store in in slot 0x4
2,906,164 UART: [art] Derive Key Pair
2,906,524 UART: [art] Store priv key in slot 0x5
2,919,546 UART: [art] Derive Key Pair - Done
2,934,376 UART: [art] Signing Cert with AUTHO
2,934,856 UART: RITY.KEYID = 7
2,950,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,879 UART: [art] PUB.X = 139737D78CF946B83BCCFA2F052A6E6E00992E0B534F404E37F1BEE83176A39D8B95E03BAF829E25EFB5D6D564FEB355
2,957,633 UART: [art] PUB.Y = 3203FB786CB4ECE98A3479937E5679CF391038D532108D87429D8086FCF1F8ADA168370672504DC1F97ED4BE3C9A72A8
2,964,577 UART: [art] SIG.R = CC581CE2C45357F3334FBE58F7C24D11C65A954B8A03C9755AFEC7E6DE2DB61A1FA1D74FE7FEA501194C77E3A3712ED4
2,971,359 UART: [art] SIG.S = E372A2CF9DE91FB94D2F27F04EE068FE848E3B183741248F266BB93D5C53A514807B1C320C5851548C638F50D302FE1E
2,994,946 UART: Caliptra RT
2,995,291 UART: [state] CFI Enabled
3,102,983 UART: [rt] RT listening for mailbox commands...
3,103,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,913 UART: [rt]cmd =0x41544d4e, len=14344
3,537,040 >>> mbox cmd response data (8 bytes)
3,537,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,056 UART: [rt]cmd =0x41545348, len=116
3,589,043 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 ready_for_fw is high
1,173,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,447 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,236 UART: [fwproc] Wait for Commands...
1,280,995 UART: [fwproc] Recv command 0x46574c44
1,281,728 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,229 >>> mbox cmd response: success
2,773,428 UART: [afmc] ++
2,773,596 UART: [afmc] CDI.KEYID = 6
2,773,959 UART: [afmc] SUBJECT.KEYID = 7
2,774,385 UART: [afmc] AUTHORITY.KEYID = 5
2,810,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,411 UART: [afmc] --
2,853,513 UART: [cold-reset] --
2,854,279 UART: [state] Locking Datavault
2,855,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,244 UART: [state] Locking ICCM
2,856,872 UART: [exit] Launching FMC @ 0x40000130
2,862,201 UART:
2,862,217 UART: Running Caliptra FMC ...
2,862,625 UART:
2,862,679 UART: [state] CFI Enabled
2,873,154 UART: [fht] FMC Alias Private Key: 7
2,981,041 UART: [art] Extend RT PCRs Done
2,981,469 UART: [art] Lock RT PCRs Done
2,983,267 UART: [art] Populate DV Done
2,991,466 UART: [fht] FMC Alias Private Key: 7
2,992,432 UART: [art] Derive CDI
2,992,712 UART: [art] Store in in slot 0x4
3,078,299 UART: [art] Derive Key Pair
3,078,659 UART: [art] Store priv key in slot 0x5
3,091,629 UART: [art] Derive Key Pair - Done
3,106,189 UART: [art] Signing Cert with AUTHO
3,106,669 UART: RITY.KEYID = 7
3,121,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,720 UART: [art] PUB.X = E7022B892E023B97538AA25BA733F88CFDC11432B863E14D4F13BD93F38C1CD37E4B5B4D830BA0A63948834FE086D068
3,129,485 UART: [art] PUB.Y = C9ACCA25001B2F94763A6538796434E47281051A259AE060EE5479322FED56AD3D53058DA808D8F7DD3CC148AAA8CBA5
3,136,410 UART: [art] SIG.R = 20777F253CA9A9B2C22FE0B9A54C4E1426489BF5B5D9CB744651B2BE81883A58B67D7645307772C5DB46A19B02AEAFE6
3,143,183 UART: [art] SIG.S = B3A28DD1614FE314ACD95903A42A8752B416A28890B90F10DCA4CA9C1857155E53E6B4584A0D5A5620EEAE888AA75557
3,166,959 UART: Caliptra RT
3,167,212 UART: [state] CFI Enabled
3,274,523 UART: [rt] RT listening for mailbox commands...
3,275,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,415 UART: [rt]cmd =0x41544d4e, len=14344
3,708,174 >>> mbox cmd response data (8 bytes)
3,708,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,286 UART: [rt]cmd =0x41545348, len=116
3,759,023 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,268 ready_for_fw is high
1,056,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,351 >>> mbox cmd response: success
2,682,287 UART:
2,682,303 UART: Running Caliptra FMC ...
2,682,711 UART:
2,682,765 UART: [state] CFI Enabled
2,693,136 UART: [fht] FMC Alias Private Key: 7
2,800,787 UART: [art] Extend RT PCRs Done
2,801,215 UART: [art] Lock RT PCRs Done
2,802,787 UART: [art] Populate DV Done
2,810,840 UART: [fht] FMC Alias Private Key: 7
2,811,796 UART: [art] Derive CDI
2,812,076 UART: [art] Store in in slot 0x4
2,897,709 UART: [art] Derive Key Pair
2,898,069 UART: [art] Store priv key in slot 0x5
2,910,903 UART: [art] Derive Key Pair - Done
2,925,693 UART: [art] Signing Cert with AUTHO
2,926,173 UART: RITY.KEYID = 7
2,941,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,988 UART: [art] PUB.X = A3F97DCE68C83A7F0AE6AA913A6FE28F9C6FE864907BC411A016ECE5A33BEB3D8A75537CD9CC397F14C3C5FE05283393
2,948,770 UART: [art] PUB.Y = E805B34791706E73FFDE40DD28B5F028F4DAD792AAB46E380E70D6F740273F8B1A7025D0F5CACC67380527073859DE76
2,955,712 UART: [art] SIG.R = 7037D93B15639528E9C233D827B6F4CC5D3FD9A59A338C23B1BFEBDB2024EC52541F01F8BCBA19E405BF75C17420DF9F
2,962,488 UART: [art] SIG.S = 6CB9C1BF38A9FF188056F84774B040C91F06268ECDAB1E07E68BC75126E09D4C0A52EF54ECACB4BFCE9146DFC5BB6DFA
2,986,608 UART: Caliptra RT
2,986,861 UART: [state] CFI Enabled
3,094,228 UART: [rt] RT listening for mailbox commands...
3,094,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,860 UART: [rt]cmd =0x41544d4e, len=14344
3,527,799 >>> mbox cmd response data (8 bytes)
3,527,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,641 UART: [rt]cmd =0x41545348, len=116
3,579,352 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,617 UART: [kat] HMAC-384Kdf
921,157 UART: [kat] LMS
1,169,469 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,174,638 ready_for_fw is high
1,174,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,608 >>> mbox cmd response: success
2,773,871 UART: [afmc] ++
2,774,039 UART: [afmc] CDI.KEYID = 6
2,774,402 UART: [afmc] SUBJECT.KEYID = 7
2,774,828 UART: [afmc] AUTHORITY.KEYID = 5
2,810,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,812 UART: [afmc] --
2,853,780 UART: [cold-reset] --
2,854,736 UART: [state] Locking Datavault
2,856,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,751 UART: [state] Locking ICCM
2,857,331 UART: [exit] Launching FMC @ 0x40000130
2,862,660 UART:
2,862,676 UART: Running Caliptra FMC ...
2,863,084 UART:
2,863,227 UART: [state] CFI Enabled
2,873,944 UART: [fht] FMC Alias Private Key: 7
2,981,725 UART: [art] Extend RT PCRs Done
2,982,153 UART: [art] Lock RT PCRs Done
2,983,955 UART: [art] Populate DV Done
2,992,236 UART: [fht] FMC Alias Private Key: 7
2,993,220 UART: [art] Derive CDI
2,993,500 UART: [art] Store in in slot 0x4
3,079,177 UART: [art] Derive Key Pair
3,079,537 UART: [art] Store priv key in slot 0x5
3,092,845 UART: [art] Derive Key Pair - Done
3,107,678 UART: [art] Signing Cert with AUTHO
3,108,158 UART: RITY.KEYID = 7
3,123,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,823 UART: [art] PUB.X = 17CB6B164C1EBECEC87645CB675D6E71FF755240BE8413B0F2F0E4AB26B76FBE6AB19D51A0BD82543E56963F03FF10F8
3,130,606 UART: [art] PUB.Y = 51D2F7CD85237E7CE88D70A1608119328F320F57F55FCFF818613E8736F579E77A3848A39D47FE98FF90CC5FF4B5F532
3,137,555 UART: [art] SIG.R = 00C68B5E8AA7562D8D0BB89E474F1E078316F9AE9607562DD41F18F69B075530C26243AD4C5094ACBBA42CBE401EE54A
3,144,299 UART: [art] SIG.S = 1B1E390F60F41724C3402F5A77C8F9BDCFF7F416430C523FE0177AAB13BCA30115DC718C4502B36462D677D07AF99235
3,168,128 UART: Caliptra RT
3,168,473 UART: [state] CFI Enabled
3,276,485 UART: [rt] RT listening for mailbox commands...
3,277,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,133 UART: [rt]cmd =0x41544d4e, len=14344
3,709,946 >>> mbox cmd response data (8 bytes)
3,709,947 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,968 UART: [rt]cmd =0x41545348, len=116
3,761,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 ready_for_fw is high
1,056,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,484 >>> mbox cmd response: success
2,685,236 UART:
2,685,252 UART: Running Caliptra FMC ...
2,685,660 UART:
2,685,803 UART: [state] CFI Enabled
2,696,210 UART: [fht] FMC Alias Private Key: 7
2,803,691 UART: [art] Extend RT PCRs Done
2,804,119 UART: [art] Lock RT PCRs Done
2,805,411 UART: [art] Populate DV Done
2,813,792 UART: [fht] FMC Alias Private Key: 7
2,814,966 UART: [art] Derive CDI
2,815,246 UART: [art] Store in in slot 0x4
2,901,013 UART: [art] Derive Key Pair
2,901,373 UART: [art] Store priv key in slot 0x5
2,914,929 UART: [art] Derive Key Pair - Done
2,929,919 UART: [art] Signing Cert with AUTHO
2,930,399 UART: RITY.KEYID = 7
2,945,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,462 UART: [art] PUB.X = 7DBC5A1B13C053AA4C8212044E26C40D3C36C4D5FC1D112C66A077584374B0695131389E65B8D60A59543FDBCBDB3356
2,953,225 UART: [art] PUB.Y = 3B779EA0D5DCEDB764B5A3E9C318DEA512DC09626B5E894E5BD40C563D2A7C2B9DE314FDE5C2F9213D00A740DBB306AF
2,960,166 UART: [art] SIG.R = CBB09DA2792B86230858992A808F98D49E813E9780EFCB9BB49846570381CC38D2391689BF58EAA229DEE2529905089B
2,966,920 UART: [art] SIG.S = 567DF281487069E1D58E6BF7FFFFCE5B63ECA7C5C99D3186917302B09D400D6557E1ABD6F897D4775903A5154A6172CF
2,990,968 UART: Caliptra RT
2,991,313 UART: [state] CFI Enabled
3,099,150 UART: [rt] RT listening for mailbox commands...
3,099,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,860 UART: [rt]cmd =0x41544d4e, len=14344
3,532,971 >>> mbox cmd response data (8 bytes)
3,532,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,073 UART: [rt]cmd =0x41545348, len=116
3,584,350 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,701 UART: [kat] SHA2-256
881,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,747 UART: [kat] ++
885,899 UART: [kat] sha1
890,269 UART: [kat] SHA2-256
892,207 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,376 UART: [kat] HMAC-384Kdf
907,020 UART: [kat] LMS
1,475,216 UART: [kat] --
1,475,837 UART: [cold-reset] ++
1,476,231 UART: [fht] Storing FHT @ 0x50003400
1,478,822 UART: [idev] ++
1,478,990 UART: [idev] CDI.KEYID = 6
1,479,350 UART: [idev] SUBJECT.KEYID = 7
1,479,774 UART: [idev] UDS.KEYID = 0
1,480,119 ready_for_fw is high
1,480,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,330 UART: [idev] Erasing UDS.KEYID = 0
1,503,966 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,570 UART: [idev] --
1,513,437 UART: [ldev] ++
1,513,605 UART: [ldev] CDI.KEYID = 6
1,513,968 UART: [ldev] SUBJECT.KEYID = 5
1,514,394 UART: [ldev] AUTHORITY.KEYID = 7
1,514,857 UART: [ldev] FE.KEYID = 1
1,519,837 UART: [ldev] Erasing FE.KEYID = 1
1,545,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,358 UART: [ldev] --
1,584,747 UART: [fwproc] Waiting for Commands...
1,585,426 UART: [fwproc] Received command 0x46574c44
1,586,217 UART: [fwproc] Received Image of size 114332 bytes
2,883,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,504 >>> mbox cmd response: success
3,077,628 UART: [afmc] ++
3,077,796 UART: [afmc] CDI.KEYID = 6
3,078,158 UART: [afmc] SUBJECT.KEYID = 7
3,078,583 UART: [afmc] AUTHORITY.KEYID = 5
3,113,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,308 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,701 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,391 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,280 UART: [afmc] --
3,157,358 UART: [cold-reset] --
3,158,486 UART: [state] Locking Datavault
3,159,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,047 UART: [state] Locking ICCM
3,160,541 UART: [exit] Launching FMC @ 0x40000130
3,165,870 UART:
3,165,886 UART: Running Caliptra FMC ...
3,166,294 UART:
3,166,348 UART: [state] CFI Enabled
3,176,593 UART: [fht] FMC Alias Private Key: 7
3,283,934 UART: [art] Extend RT PCRs Done
3,284,362 UART: [art] Lock RT PCRs Done
3,285,728 UART: [art] Populate DV Done
3,293,933 UART: [fht] FMC Alias Private Key: 7
3,294,903 UART: [art] Derive CDI
3,295,183 UART: [art] Store in in slot 0x4
3,380,950 UART: [art] Derive Key Pair
3,381,310 UART: [art] Store priv key in slot 0x5
3,394,262 UART: [art] Derive Key Pair - Done
3,408,899 UART: [art] Signing Cert with AUTHO
3,409,379 UART: RITY.KEYID = 7
3,424,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,962 UART: [art] PUB.X = 6578C06FA6D0C7FE97AA7D2D382AAA86F8061A9AEC3CC348C34527ED9023A767545BD9BD128F7AED973B91865CCFDCC6
3,431,747 UART: [art] PUB.Y = 9E9B44616586E7D09C8B09561CD72F76C9E59714DA065B75EA8ED402B0C5867312C9C1ADC760E54C8EE94D5BC41E209F
3,438,694 UART: [art] SIG.R = F466BE4821B5059C660F90D10D1F78072FF1E48C929B851CA714991CF5BDD1CDB7FA5FC5AF6E4B10D3F72CDA15C19D87
3,445,468 UART: [art] SIG.S = 3E3E4BAFE7580EFECD701DDACEB8BE94B055E788AB00F30C51A75880DAA01970DEDCB07B79A1D03D45A21798D8E65A7F
3,469,335 UART: Caliptra RT
3,469,588 UART: [state] CFI Enabled
3,576,493 UART: [rt] RT listening for mailbox commands...
3,577,163 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,215 UART: [rt]cmd =0x41544d4e, len=14344
4,009,873 >>> mbox cmd response data (8 bytes)
4,009,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,865 UART: [rt]cmd =0x41545348, len=116
4,061,420 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,578 >>> mbox cmd response: success
2,987,750 UART:
2,987,766 UART: Running Caliptra FMC ...
2,988,174 UART:
2,988,228 UART: [state] CFI Enabled
2,998,761 UART: [fht] FMC Alias Private Key: 7
3,106,812 UART: [art] Extend RT PCRs Done
3,107,240 UART: [art] Lock RT PCRs Done
3,109,036 UART: [art] Populate DV Done
3,117,171 UART: [fht] FMC Alias Private Key: 7
3,118,271 UART: [art] Derive CDI
3,118,551 UART: [art] Store in in slot 0x4
3,204,228 UART: [art] Derive Key Pair
3,204,588 UART: [art] Store priv key in slot 0x5
3,217,742 UART: [art] Derive Key Pair - Done
3,232,666 UART: [art] Signing Cert with AUTHO
3,233,146 UART: RITY.KEYID = 7
3,248,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,093 UART: [art] PUB.X = 290A091CB433E8B444A99C9E26ECF7B4EAD62BD42C999C45ECC8FCB7B50292B5AD2EF2AB6F6B624D19D817CB86AE1F55
3,255,876 UART: [art] PUB.Y = B44B17060EEBD336A26B4FB503E6F0950311742E69E5C4B4ABA1F79ECDB890B83D50A81ADD6A9E920C701D89C7F3F448
3,262,823 UART: [art] SIG.R = BE4072C3E5AC1C729D4538C3DD9E3451AF1AEE6B0EF217F2B917491401392035C86D56A02B24A33C52E6889821A0CAAF
3,269,593 UART: [art] SIG.S = 71DB28D84A144D98B4CDB293EFA5262C54FEA7F2CE36140E56AD45AA3AA75F1F79609765910414504B70110BB470B5A5
3,292,863 UART: Caliptra RT
3,293,116 UART: [state] CFI Enabled
3,400,691 UART: [rt] RT listening for mailbox commands...
3,401,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,537 UART: [rt]cmd =0x41544d4e, len=14344
3,834,365 >>> mbox cmd response data (8 bytes)
3,834,366 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,531 UART: [rt]cmd =0x41545348, len=116
3,886,546 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,598 UART: [kat] SHA2-256
882,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,644 UART: [kat] ++
886,796 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,961 UART: [kat] SHA2-512-ACC
897,862 UART: [kat] ECC-384
903,697 UART: [kat] HMAC-384Kdf
908,543 UART: [kat] LMS
1,476,739 UART: [kat] --
1,477,634 UART: [cold-reset] ++
1,478,202 UART: [fht] Storing FHT @ 0x50003400
1,481,203 UART: [idev] ++
1,481,371 UART: [idev] CDI.KEYID = 6
1,481,731 UART: [idev] SUBJECT.KEYID = 7
1,482,155 UART: [idev] UDS.KEYID = 0
1,482,500 ready_for_fw is high
1,482,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,113 UART: [idev] Erasing UDS.KEYID = 0
1,506,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,837 UART: [idev] --
1,515,916 UART: [ldev] ++
1,516,084 UART: [ldev] CDI.KEYID = 6
1,516,447 UART: [ldev] SUBJECT.KEYID = 5
1,516,873 UART: [ldev] AUTHORITY.KEYID = 7
1,517,336 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,069 UART: [ldev] --
1,587,514 UART: [fwproc] Waiting for Commands...
1,588,171 UART: [fwproc] Received command 0x46574c44
1,588,962 UART: [fwproc] Received Image of size 114332 bytes
2,886,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,735 >>> mbox cmd response: success
3,079,863 UART: [afmc] ++
3,080,031 UART: [afmc] CDI.KEYID = 6
3,080,393 UART: [afmc] SUBJECT.KEYID = 7
3,080,818 UART: [afmc] AUTHORITY.KEYID = 5
3,116,193 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,894 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,584 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,603 UART: [afmc] --
3,159,657 UART: [cold-reset] --
3,160,619 UART: [state] Locking Datavault
3,161,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,458 UART: [state] Locking ICCM
3,162,980 UART: [exit] Launching FMC @ 0x40000130
3,168,309 UART:
3,168,325 UART: Running Caliptra FMC ...
3,168,733 UART:
3,168,876 UART: [state] CFI Enabled
3,179,199 UART: [fht] FMC Alias Private Key: 7
3,287,074 UART: [art] Extend RT PCRs Done
3,287,502 UART: [art] Lock RT PCRs Done
3,288,852 UART: [art] Populate DV Done
3,296,937 UART: [fht] FMC Alias Private Key: 7
3,298,053 UART: [art] Derive CDI
3,298,333 UART: [art] Store in in slot 0x4
3,383,504 UART: [art] Derive Key Pair
3,383,864 UART: [art] Store priv key in slot 0x5
3,397,942 UART: [art] Derive Key Pair - Done
3,412,840 UART: [art] Signing Cert with AUTHO
3,413,320 UART: RITY.KEYID = 7
3,428,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,871 UART: [art] PUB.X = 743FEBDF1BF8097AEDB7BC17BE99C3AB8C28235102FBDA9D4CA065B723B0EA16C07027AF332400D45380FB06634D0301
3,435,616 UART: [art] PUB.Y = DAB93E5B28845F5B3F08DE5B26D22804FE3A72510A16626C2C95F5773F9E4CD20CA9A0F954617127F1DE893D2F935870
3,442,556 UART: [art] SIG.R = 3E098B1A33D8CD3543806E12CEAA6C7D0117B7F4F80AA692A76190A5E6A430C0E46684FD21AFF3BA48D2FC89C8A1A590
3,449,329 UART: [art] SIG.S = 66888CAFCAA775B5C4A5508B293661698EBFFD99FD2056EA55DE817F7A779AFDAFD8A128017F6F703E3FB5801F7EBE25
3,473,393 UART: Caliptra RT
3,473,738 UART: [state] CFI Enabled
3,581,752 UART: [rt] RT listening for mailbox commands...
3,582,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,678 UART: [rt]cmd =0x41544d4e, len=14344
4,015,486 >>> mbox cmd response data (8 bytes)
4,015,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,712 UART: [rt]cmd =0x41545348, len=116
4,068,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,590 ready_for_fw is high
1,362,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,203 >>> mbox cmd response: success
2,990,779 UART:
2,990,795 UART: Running Caliptra FMC ...
2,991,203 UART:
2,991,346 UART: [state] CFI Enabled
3,001,769 UART: [fht] FMC Alias Private Key: 7
3,109,384 UART: [art] Extend RT PCRs Done
3,109,812 UART: [art] Lock RT PCRs Done
3,111,410 UART: [art] Populate DV Done
3,119,815 UART: [fht] FMC Alias Private Key: 7
3,120,825 UART: [art] Derive CDI
3,121,105 UART: [art] Store in in slot 0x4
3,206,874 UART: [art] Derive Key Pair
3,207,234 UART: [art] Store priv key in slot 0x5
3,220,490 UART: [art] Derive Key Pair - Done
3,235,319 UART: [art] Signing Cert with AUTHO
3,235,799 UART: RITY.KEYID = 7
3,251,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,848 UART: [art] PUB.X = 5DDEC38781B5306312DF698171408EBAA893088603BC97848FF4B30201826E5EC52FFF001E6C9829B302BE0D91CFC905
3,258,575 UART: [art] PUB.Y = 04773DED3B8A1D7BA33F642A8D5E7EDD317DCF737A737A2D9EFCD833653E03B7412B6FC26AFF1C7E96D86990A9328BE9
3,265,535 UART: [art] SIG.R = B2845F3B482E7B1ED92899C78011EC0C7B564770FD701A132BD1E9C5A217EF3DC5EA708D05A6EAAECC1BA17FC2EEDFC6
3,272,323 UART: [art] SIG.S = 32D118A0CF9682C115C5933A4A7982F3620DA92BA51FD57E365A6D0A862DD7F092D20FDFF4B6ECC3DC43A780024E34E5
3,296,524 UART: Caliptra RT
3,296,869 UART: [state] CFI Enabled
3,404,640 UART: [rt] RT listening for mailbox commands...
3,405,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,356 UART: [rt]cmd =0x41544d4e, len=14344
3,838,746 >>> mbox cmd response data (8 bytes)
3,838,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,748 UART: [rt]cmd =0x41545348, len=116
3,890,995 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
902,135 UART: [kat] SHA2-256
904,075 UART: [kat] SHA2-384
906,956 UART: [kat] SHA2-512-ACC
908,857 UART: [kat] ECC-384
918,622 UART: [kat] HMAC-384Kdf
923,290 UART: [kat] LMS
1,171,618 UART: [kat] --
1,172,497 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 ready_for_fw is high
1,176,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,927 UART: [idev] Sha1 KeyId Algorithm
1,210,435 UART: [idev] --
1,211,473 UART: [ldev] ++
1,211,641 UART: [ldev] CDI.KEYID = 6
1,212,004 UART: [ldev] SUBJECT.KEYID = 5
1,212,430 UART: [ldev] AUTHORITY.KEYID = 7
1,212,893 UART: [ldev] FE.KEYID = 1
1,218,237 UART: [ldev] Erasing FE.KEYID = 1
1,244,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,185 UART: [ldev] --
1,283,490 UART: [fwproc] Wait for Commands...
1,284,190 UART: [fwproc] Recv command 0x46574c44
1,284,918 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,553 >>> mbox cmd response: success
2,775,743 UART: [afmc] ++
2,775,911 UART: [afmc] CDI.KEYID = 6
2,776,273 UART: [afmc] SUBJECT.KEYID = 7
2,776,698 UART: [afmc] AUTHORITY.KEYID = 5
2,812,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,848 UART: [afmc] --
2,855,974 UART: [cold-reset] --
2,857,010 UART: [state] Locking Datavault
2,858,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,965 UART: [state] Locking ICCM
2,859,571 UART: [exit] Launching FMC @ 0x40000130
2,864,900 UART:
2,864,916 UART: Running Caliptra FMC ...
2,865,324 UART:
2,865,378 UART: [state] CFI Enabled
2,875,623 UART: [fht] FMC Alias Private Key: 7
2,983,700 UART: [art] Extend RT PCRs Done
2,984,128 UART: [art] Lock RT PCRs Done
2,985,906 UART: [art] Populate DV Done
2,994,213 UART: [fht] FMC Alias Private Key: 7
2,995,259 UART: [art] Derive CDI
2,995,539 UART: [art] Store in in slot 0x4
3,081,146 UART: [art] Derive Key Pair
3,081,506 UART: [art] Store priv key in slot 0x5
3,095,076 UART: [art] Derive Key Pair - Done
3,109,614 UART: [art] Signing Cert with AUTHO
3,110,094 UART: RITY.KEYID = 7
3,125,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,149 UART: [art] PUB.X = 9E7B6A46533F980FAF998BA903A1A27DDD80A3A500A1FB6DFE533EA38626D6D82A3B6DA41304AD5AC80BB7AC778F55F5
3,132,903 UART: [art] PUB.Y = 8B25967A0EFB4494E4309D6A04E7092D13931FC5C159A3AE1E98601138ECF6EBD85FC949B87FFAA7E23D7287D28E49FC
3,139,854 UART: [art] SIG.R = 3B02AA6501B7D1181926E3FB0A0A5C91C87FB029A5EE464E55988B4773938DB825739033D8A3D3E8AFEEB5B51D308951
3,146,614 UART: [art] SIG.S = EF046F1385FD311FD8E9FC82BB0E9245A3AD9FB59548DE40CA3FCF9681D42C93AC9D6DC6DA83BB2165026593A7803A02
3,170,169 UART: Caliptra RT
3,170,422 UART: [state] CFI Enabled
3,277,755 UART: [rt] RT listening for mailbox commands...
3,278,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,499 UART: [rt]cmd =0x41544d4e, len=14344
3,711,625 >>> mbox cmd response data (8 bytes)
3,711,626 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,741 UART: [rt]cmd =0x41545348, len=116
3,763,778 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 ready_for_fw is high
1,060,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,668 >>> mbox cmd response: success
2,687,634 UART:
2,687,650 UART: Running Caliptra FMC ...
2,688,058 UART:
2,688,112 UART: [state] CFI Enabled
2,698,619 UART: [fht] FMC Alias Private Key: 7
2,806,316 UART: [art] Extend RT PCRs Done
2,806,744 UART: [art] Lock RT PCRs Done
2,808,444 UART: [art] Populate DV Done
2,816,521 UART: [fht] FMC Alias Private Key: 7
2,817,645 UART: [art] Derive CDI
2,817,925 UART: [art] Store in in slot 0x4
2,903,478 UART: [art] Derive Key Pair
2,903,838 UART: [art] Store priv key in slot 0x5
2,916,878 UART: [art] Derive Key Pair - Done
2,931,429 UART: [art] Signing Cert with AUTHO
2,931,909 UART: RITY.KEYID = 7
2,946,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,740 UART: [art] PUB.X = BD6A2883F6667C62EF75946D6FD6CEE01C948F774B76035C27B2B00CEB0CB6A435BFCE74289176F4FCB2A504AF69C6F6
2,954,512 UART: [art] PUB.Y = 0963AC7C977E3B757875128E7D7F251D37226F88C66BCF3596FDAEE221553C6CA1989B3D4BDA802B818F61C09DF6BB21
2,961,465 UART: [art] SIG.R = 7FA0E7B2B0D20FBFDBFDAAC59DF398340AF66FA37A3A2267A48A748AD1E37FE872169582AEA1DD4C622F053F140E24DC
2,968,245 UART: [art] SIG.S = 2C393767E2AB54A50FFC8961DEDEC042A027523F572D3B60A3863A1278930B5E6E61754709AADA7056CE2F083DFA53F2
2,991,444 UART: Caliptra RT
2,991,697 UART: [state] CFI Enabled
3,099,620 UART: [rt] RT listening for mailbox commands...
3,100,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,154 UART: [rt]cmd =0x41544d4e, len=14344
3,532,678 >>> mbox cmd response data (8 bytes)
3,532,679 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,916 UART: [rt]cmd =0x41545348, len=116
3,585,351 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
907,097 UART: [kat] SHA2-512-ACC
908,998 UART: [kat] ECC-384
918,645 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,148 UART: [fht] FHT @ 0x50003400
1,175,887 UART: [idev] ++
1,176,055 UART: [idev] CDI.KEYID = 6
1,176,415 UART: [idev] SUBJECT.KEYID = 7
1,176,839 UART: [idev] UDS.KEYID = 0
1,177,184 ready_for_fw is high
1,177,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,695 UART: [idev] Erasing UDS.KEYID = 0
1,201,710 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,217,598 UART: [ldev] Erasing FE.KEYID = 1
1,243,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,541 UART: [fwproc] Recv command 0x46574c44
1,284,269 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,414 >>> mbox cmd response: success
2,773,616 UART: [afmc] ++
2,773,784 UART: [afmc] CDI.KEYID = 6
2,774,146 UART: [afmc] SUBJECT.KEYID = 7
2,774,571 UART: [afmc] AUTHORITY.KEYID = 5
2,809,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,939 UART: [afmc] --
2,852,853 UART: [cold-reset] --
2,853,719 UART: [state] Locking Datavault
2,854,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,478 UART: [state] Locking ICCM
2,855,952 UART: [exit] Launching FMC @ 0x40000130
2,861,281 UART:
2,861,297 UART: Running Caliptra FMC ...
2,861,705 UART:
2,861,848 UART: [state] CFI Enabled
2,872,529 UART: [fht] FMC Alias Private Key: 7
2,980,392 UART: [art] Extend RT PCRs Done
2,980,820 UART: [art] Lock RT PCRs Done
2,982,574 UART: [art] Populate DV Done
2,990,895 UART: [fht] FMC Alias Private Key: 7
2,991,955 UART: [art] Derive CDI
2,992,235 UART: [art] Store in in slot 0x4
3,077,734 UART: [art] Derive Key Pair
3,078,094 UART: [art] Store priv key in slot 0x5
3,091,306 UART: [art] Derive Key Pair - Done
3,105,656 UART: [art] Signing Cert with AUTHO
3,106,136 UART: RITY.KEYID = 7
3,121,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,223 UART: [art] PUB.X = 2CCF320A05FBE1AFDBBF98F0C3CCB4109016D412866090912943ADA0050B9FBFD7F7EBB0F066E91DE024252E96E8B041
3,128,995 UART: [art] PUB.Y = D0BD2528F5FD7518A0AB0BF921800309A993FFC899F57F3ADC35083A7C15D4F2580A5D0E94783F554533BE37BB592A6C
3,135,933 UART: [art] SIG.R = DE5622BD2CD657D53AE214AD7D9D01A3BEE06AC95D5C10DCC53D7E13E79D361F37AEC6B598863F7CCD64790960D74C1B
3,142,715 UART: [art] SIG.S = 1F58EB862EF2FB2E81D733706A9AA7192DE3C3D77B49C2F53177B8F3175DE0C04D1749F2821A63DE24817C54BF33253A
3,166,464 UART: Caliptra RT
3,166,809 UART: [state] CFI Enabled
3,274,610 UART: [rt] RT listening for mailbox commands...
3,275,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,254 UART: [rt]cmd =0x41544d4e, len=14344
3,707,850 >>> mbox cmd response data (8 bytes)
3,707,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,986 UART: [rt]cmd =0x41545348, len=116
3,759,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,214 ready_for_fw is high
1,060,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,299 >>> mbox cmd response: success
2,689,709 UART:
2,689,725 UART: Running Caliptra FMC ...
2,690,133 UART:
2,690,276 UART: [state] CFI Enabled
2,700,853 UART: [fht] FMC Alias Private Key: 7
2,808,484 UART: [art] Extend RT PCRs Done
2,808,912 UART: [art] Lock RT PCRs Done
2,810,460 UART: [art] Populate DV Done
2,818,595 UART: [fht] FMC Alias Private Key: 7
2,819,765 UART: [art] Derive CDI
2,820,045 UART: [art] Store in in slot 0x4
2,905,968 UART: [art] Derive Key Pair
2,906,328 UART: [art] Store priv key in slot 0x5
2,919,766 UART: [art] Derive Key Pair - Done
2,934,721 UART: [art] Signing Cert with AUTHO
2,935,201 UART: RITY.KEYID = 7
2,950,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,336 UART: [art] PUB.X = D97543B17D174C4A9E08F78557B4586A7DB25CC36D3E25E40A958866892960B857A760B50680CE65531CF1D8EC4CF84E
2,958,095 UART: [art] PUB.Y = 0B0CC8BF8783D35FBCAE5A1C07D83B595C19CF702A4F8BCDFFAD79D139440B5284FB4B8389F06209B6B61CE8D03075E5
2,965,046 UART: [art] SIG.R = 1981DFF584FBED49CC00AB8C3DB86C864AB162E0BF30DEA16271AB4946600A2705BA055DC707A0C901B9DFEB15B5ED49
2,971,797 UART: [art] SIG.S = 22BA6C7D76D64AB53B9CF42BB7038CF775D3FCF24D0E4471B4B9A4ECB35AB2E09E80C988B2D896368B604F8876E1C929
2,995,964 UART: Caliptra RT
2,996,309 UART: [state] CFI Enabled
3,103,298 UART: [rt] RT listening for mailbox commands...
3,103,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,936 UART: [rt]cmd =0x41544d4e, len=14344
3,536,622 >>> mbox cmd response data (8 bytes)
3,536,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,718 UART: [rt]cmd =0x41545348, len=116
3,589,053 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,174,241 ready_for_fw is high
1,174,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,303 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,207,914 UART: [ldev] ++
1,208,082 UART: [ldev] CDI.KEYID = 6
1,208,446 UART: [ldev] SUBJECT.KEYID = 5
1,208,873 UART: [ldev] AUTHORITY.KEYID = 7
1,209,336 UART: [ldev] FE.KEYID = 1
1,214,432 UART: [ldev] Erasing FE.KEYID = 1
1,240,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,396 UART: [fwproc] Wait for Commands...
1,281,113 UART: [fwproc] Recv command 0x46574c44
1,281,846 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,035 >>> mbox cmd response: success
2,772,226 UART: [afmc] ++
2,772,394 UART: [afmc] CDI.KEYID = 6
2,772,757 UART: [afmc] SUBJECT.KEYID = 7
2,773,183 UART: [afmc] AUTHORITY.KEYID = 5
2,808,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,147 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,866 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,583 UART: [afmc] --
2,851,479 UART: [cold-reset] --
2,852,407 UART: [state] Locking Datavault
2,853,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,900 UART: [state] Locking ICCM
2,854,572 UART: [exit] Launching FMC @ 0x40000130
2,859,901 UART:
2,859,917 UART: Running Caliptra FMC ...
2,860,325 UART:
2,860,379 UART: [state] CFI Enabled
2,870,296 UART: [fht] FMC Alias Private Key: 7
2,978,589 UART: [art] Extend RT PCRs Done
2,979,017 UART: [art] Lock RT PCRs Done
2,980,211 UART: [art] Populate DV Done
2,988,456 UART: [fht] FMC Alias Private Key: 7
2,989,548 UART: [art] Derive CDI
2,989,828 UART: [art] Store in in slot 0x4
3,075,565 UART: [art] Derive Key Pair
3,075,925 UART: [art] Store priv key in slot 0x5
3,088,731 UART: [art] Derive Key Pair - Done
3,103,646 UART: [art] Signing Cert with AUTHO
3,104,126 UART: RITY.KEYID = 7
3,118,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,667 UART: [art] PUB.X = 254DCBABB2661336465C7D980FE3889C05FFE34E53B7516D0E0478756EC88E0E03B7C941B1503529B90922EFD17913AF
3,126,416 UART: [art] PUB.Y = 19AFF3C3675A2486C08ED40FFB0716EDF7B88C8B2E24A7A1C7293679A6A8EBE822889E955410C08D71AE08272CEF68A1
3,133,365 UART: [art] SIG.R = D102D7CBE3215194E172395FD54D981EC4444671C732D8B78B215A9E75621808F56AEC7D2FE9367AC75F2704584D2C20
3,140,122 UART: [art] SIG.S = CFD7165033D4ABADFB6AD7A87396B06AB0B7682EEED4DF8378A4D9F5FF81BAF289F7749E3856CF95D044C61B181B2B35
3,163,827 UART: Caliptra RT
3,164,080 UART: [state] CFI Enabled
3,271,654 UART: [rt] RT listening for mailbox commands...
3,272,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,294 UART: [rt]cmd =0x41544d4e, len=14344
3,704,986 >>> mbox cmd response data (8 bytes)
3,704,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,100 UART: [rt]cmd =0x41545348, len=116
3,757,459 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,110 ready_for_fw is high
1,056,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,805 >>> mbox cmd response: success
2,686,125 UART:
2,686,141 UART: Running Caliptra FMC ...
2,686,549 UART:
2,686,603 UART: [state] CFI Enabled
2,697,000 UART: [fht] FMC Alias Private Key: 7
2,804,935 UART: [art] Extend RT PCRs Done
2,805,363 UART: [art] Lock RT PCRs Done
2,807,191 UART: [art] Populate DV Done
2,815,452 UART: [fht] FMC Alias Private Key: 7
2,816,550 UART: [art] Derive CDI
2,816,830 UART: [art] Store in in slot 0x4
2,902,255 UART: [art] Derive Key Pair
2,902,615 UART: [art] Store priv key in slot 0x5
2,915,019 UART: [art] Derive Key Pair - Done
2,929,864 UART: [art] Signing Cert with AUTHO
2,930,344 UART: RITY.KEYID = 7
2,945,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,297 UART: [art] PUB.X = 67FE49775923A6596EC30B01A94657749F2E6B5C97EDE72CBD46EEDB22BD0FBBA098367679A8A8F77EA33F270C4D1DC8
2,953,067 UART: [art] PUB.Y = A892050D81EE3604EFB139B3BEF45D4E2B29068678133420D55DD1CB80D8FFCB51401E6F5C56CF3F3AFA206E7F68086C
2,960,012 UART: [art] SIG.R = 8125AE2672AD1A97500C044B5BCB7AB8272686C05AE4752F497DA59AEE0A1FAAD9DBFECE4CAA67DC230BE60F71585364
2,966,785 UART: [art] SIG.S = E3460551733424E2FD59C73355B078CD41E6D52B337669CE10B1D37233F4B59D8F924ABD8CE8F5A0B4F9A828739F0486
2,990,014 UART: Caliptra RT
2,990,267 UART: [state] CFI Enabled
3,097,337 UART: [rt] RT listening for mailbox commands...
3,098,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,923 UART: [rt]cmd =0x41544d4e, len=14344
3,530,349 >>> mbox cmd response data (8 bytes)
3,530,350 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,495 UART: [rt]cmd =0x41545348, len=116
3,582,996 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,113 UART: [kat] LMS
1,169,425 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,174,836 ready_for_fw is high
1,174,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,200,122 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,225 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,837 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,728 >>> mbox cmd response: success
2,774,905 UART: [afmc] ++
2,775,073 UART: [afmc] CDI.KEYID = 6
2,775,436 UART: [afmc] SUBJECT.KEYID = 7
2,775,862 UART: [afmc] AUTHORITY.KEYID = 5
2,811,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,318 UART: [afmc] --
2,855,446 UART: [cold-reset] --
2,856,362 UART: [state] Locking Datavault
2,857,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,211 UART: [state] Locking ICCM
2,858,663 UART: [exit] Launching FMC @ 0x40000130
2,863,992 UART:
2,864,008 UART: Running Caliptra FMC ...
2,864,416 UART:
2,864,559 UART: [state] CFI Enabled
2,875,170 UART: [fht] FMC Alias Private Key: 7
2,983,991 UART: [art] Extend RT PCRs Done
2,984,419 UART: [art] Lock RT PCRs Done
2,986,207 UART: [art] Populate DV Done
2,994,468 UART: [fht] FMC Alias Private Key: 7
2,995,574 UART: [art] Derive CDI
2,995,854 UART: [art] Store in in slot 0x4
3,081,561 UART: [art] Derive Key Pair
3,081,921 UART: [art] Store priv key in slot 0x5
3,094,777 UART: [art] Derive Key Pair - Done
3,109,475 UART: [art] Signing Cert with AUTHO
3,109,955 UART: RITY.KEYID = 7
3,125,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,266 UART: [art] PUB.X = 13757474C64042DE2DF63AF82EB468B458AAF3173D5E266CD450ACC7189B1039C74C69629AC359A5EC8DC2F0DD42875B
3,133,042 UART: [art] PUB.Y = 5AE20855EFFE18CA109474428117572DEE905BA5B1A8FE53C333B78A546C3498B52E9307571447596DE340E919E85EBE
3,139,984 UART: [art] SIG.R = 59A4C77C3E55BFA314444E21115A9A1178E3D1A9A5CFA4E4E1FC369AFF4DAC53782634DA553BB55209CB41257DB2FA08
3,146,760 UART: [art] SIG.S = 6FED3D8A5BFA3DBA85B9EE1C72465DFEB2FDE326540DC8AF6F3F6641DF5FADC5EF1602BFF52C9D9FBB9F370BA2BAD343
3,170,732 UART: Caliptra RT
3,171,077 UART: [state] CFI Enabled
3,279,652 UART: [rt] RT listening for mailbox commands...
3,280,322 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,488 UART: [rt]cmd =0x41544d4e, len=14344
3,712,992 >>> mbox cmd response data (8 bytes)
3,712,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,028 UART: [rt]cmd =0x41545348, len=116
3,765,515 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,167 ready_for_fw is high
1,056,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,148 >>> mbox cmd response: success
2,684,126 UART:
2,684,142 UART: Running Caliptra FMC ...
2,684,550 UART:
2,684,693 UART: [state] CFI Enabled
2,695,306 UART: [fht] FMC Alias Private Key: 7
2,803,493 UART: [art] Extend RT PCRs Done
2,803,921 UART: [art] Lock RT PCRs Done
2,805,437 UART: [art] Populate DV Done
2,813,652 UART: [fht] FMC Alias Private Key: 7
2,814,644 UART: [art] Derive CDI
2,814,924 UART: [art] Store in in slot 0x4
2,900,689 UART: [art] Derive Key Pair
2,901,049 UART: [art] Store priv key in slot 0x5
2,913,879 UART: [art] Derive Key Pair - Done
2,928,497 UART: [art] Signing Cert with AUTHO
2,928,977 UART: RITY.KEYID = 7
2,944,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,182 UART: [art] PUB.X = 11F7A8E1A7B2CCFCEEE38D7BD662B85D32C3AB31C69D1D853094CB63DDD74D3BCB3E41F2233674864A05A4C6C36CF97D
2,951,969 UART: [art] PUB.Y = AE0CA84B309FBC6D4D0F2A1F9C98930613A15C5852AEF27D6AE85B04A76BDFCBD0A417217DE6453B735BE1C46F705FDF
2,958,927 UART: [art] SIG.R = 63447701CAFF061E69316E0BED5F4BE2A19CE010EFDC9A3D252E300DABC7FCE37F6BD4AD709AADDF9761CA4AE2965528
2,965,709 UART: [art] SIG.S = 9C4330CBA7D7D7F5E79118B5B0066E4228614431E8BB88CA7DD2C34C2F0F2E7371D27D895377C5C61C85D2832072746F
2,989,806 UART: Caliptra RT
2,990,151 UART: [state] CFI Enabled
3,098,616 UART: [rt] RT listening for mailbox commands...
3,099,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,170 UART: [rt]cmd =0x41544d4e, len=14344
3,532,810 >>> mbox cmd response data (8 bytes)
3,532,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,660 UART: [rt]cmd =0x41545348, len=116
3,584,443 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,694 UART: [state] LifecycleState = Unprovisioned
85,349 UART: [state] DebugLocked = No
85,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,403 UART: [kat] SHA2-256
881,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,449 UART: [kat] ++
885,601 UART: [kat] sha1
889,955 UART: [kat] SHA2-256
891,893 UART: [kat] SHA2-384
894,760 UART: [kat] SHA2-512-ACC
896,661 UART: [kat] ECC-384
902,214 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,280 UART: [idev] ++
1,479,448 UART: [idev] CDI.KEYID = 6
1,479,808 UART: [idev] SUBJECT.KEYID = 7
1,480,232 UART: [idev] UDS.KEYID = 0
1,480,577 ready_for_fw is high
1,480,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,684 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,434 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,510 UART: [ldev] --
1,585,967 UART: [fwproc] Waiting for Commands...
1,586,788 UART: [fwproc] Received command 0x46574c44
1,587,579 UART: [fwproc] Received Image of size 114332 bytes
2,885,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,390 >>> mbox cmd response: success
3,080,618 UART: [afmc] ++
3,080,786 UART: [afmc] CDI.KEYID = 6
3,081,148 UART: [afmc] SUBJECT.KEYID = 7
3,081,573 UART: [afmc] AUTHORITY.KEYID = 5
3,116,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,599 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,289 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,290 UART: [afmc] --
3,160,170 UART: [cold-reset] --
3,161,064 UART: [state] Locking Datavault
3,162,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,119 UART: [state] Locking ICCM
3,163,669 UART: [exit] Launching FMC @ 0x40000130
3,168,998 UART:
3,169,014 UART: Running Caliptra FMC ...
3,169,422 UART:
3,169,476 UART: [state] CFI Enabled
3,179,719 UART: [fht] FMC Alias Private Key: 7
3,287,960 UART: [art] Extend RT PCRs Done
3,288,388 UART: [art] Lock RT PCRs Done
3,289,860 UART: [art] Populate DV Done
3,298,407 UART: [fht] FMC Alias Private Key: 7
3,299,487 UART: [art] Derive CDI
3,299,767 UART: [art] Store in in slot 0x4
3,385,040 UART: [art] Derive Key Pair
3,385,400 UART: [art] Store priv key in slot 0x5
3,398,090 UART: [art] Derive Key Pair - Done
3,413,016 UART: [art] Signing Cert with AUTHO
3,413,496 UART: RITY.KEYID = 7
3,428,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,515 UART: [art] PUB.X = 5C40D09295FF65722BA5A639B5F57B15F6BB5115A11C417CE3B9F9F13A6198CC5929DBB05540F510700FFC0798A24FF7
3,436,283 UART: [art] PUB.Y = 0C430BED48CF474FDB30963A70D48EE2E8404BADCFDBB5ED9BBF67891769AB740A8613CBE47A3ED0B44E8CC4DCAE8C44
3,443,252 UART: [art] SIG.R = E161E6EF0945E8096CAB97730B948A372A5B7F83B2B0E17B980A1B2F29DFB376BC0DAF19B92C091F9EA4067456A9613F
3,450,009 UART: [art] SIG.S = E283B8A4B0027AD2345616F4CD4BF652EF8CCCFD8667F88A001162B3AECFFEFF15847185FF3F275C10B39384D8B4B45F
3,473,727 UART: Caliptra RT
3,473,980 UART: [state] CFI Enabled
3,582,336 UART: [rt] RT listening for mailbox commands...
3,583,006 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,922 UART: [rt]cmd =0x41544d4e, len=14344
4,015,116 >>> mbox cmd response data (8 bytes)
4,015,117 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,164 UART: [rt]cmd =0x41545348, len=116
4,066,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,863 ready_for_fw is high
1,362,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,180 >>> mbox cmd response: success
2,989,524 UART:
2,989,540 UART: Running Caliptra FMC ...
2,989,948 UART:
2,990,002 UART: [state] CFI Enabled
3,000,461 UART: [fht] FMC Alias Private Key: 7
3,108,094 UART: [art] Extend RT PCRs Done
3,108,522 UART: [art] Lock RT PCRs Done
3,110,310 UART: [art] Populate DV Done
3,118,595 UART: [fht] FMC Alias Private Key: 7
3,119,687 UART: [art] Derive CDI
3,119,967 UART: [art] Store in in slot 0x4
3,205,484 UART: [art] Derive Key Pair
3,205,844 UART: [art] Store priv key in slot 0x5
3,219,046 UART: [art] Derive Key Pair - Done
3,234,189 UART: [art] Signing Cert with AUTHO
3,234,669 UART: RITY.KEYID = 7
3,249,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,548 UART: [art] PUB.X = 531BBFBBA09DAC4508A9054ACEB76353FF30948DE17A2DFAA8FB1BF1AD46485B99747FC2F27D5611B5A63C5A4B2C733D
3,257,332 UART: [art] PUB.Y = EF6A0CB7B458167DD2C3EF189A68D72BEE2A08193053216AC7EB3EC205A51826D48BEE5E06059C5760373F1F8FA8956F
3,264,275 UART: [art] SIG.R = 1EF6EFD87E54FD5EC87838A75EC334FD53AD37D585E6761BAC57D0B63FB6FA33C0AF5B11DEFA0E192B4E5C9D253A6755
3,271,064 UART: [art] SIG.S = 20E2A2D888039EAFA68F57A6830D0B8E9904F6956CA2AAB325CBBDC08D69AF6B0AA16DE7BC76DBDC2E240232B8CC073D
3,294,832 UART: Caliptra RT
3,295,085 UART: [state] CFI Enabled
3,403,573 UART: [rt] RT listening for mailbox commands...
3,404,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,101 UART: [rt]cmd =0x41544d4e, len=14344
3,836,715 >>> mbox cmd response data (8 bytes)
3,836,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,645 UART: [rt]cmd =0x41545348, len=116
3,888,916 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,749 UART: [kat] SHA2-512-ACC
897,650 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,794 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 ready_for_fw is high
1,481,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,139 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,546,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,217 UART: [ldev] --
1,586,540 UART: [fwproc] Waiting for Commands...
1,587,377 UART: [fwproc] Received command 0x46574c44
1,588,168 UART: [fwproc] Received Image of size 114332 bytes
2,885,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,224 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,395 >>> mbox cmd response: success
3,078,455 UART: [afmc] ++
3,078,623 UART: [afmc] CDI.KEYID = 6
3,078,985 UART: [afmc] SUBJECT.KEYID = 7
3,079,410 UART: [afmc] AUTHORITY.KEYID = 5
3,115,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,008 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,698 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,705 UART: [afmc] --
3,158,615 UART: [cold-reset] --
3,159,247 UART: [state] Locking Datavault
3,160,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,960 UART: [state] Locking ICCM
3,161,608 UART: [exit] Launching FMC @ 0x40000130
3,166,937 UART:
3,166,953 UART: Running Caliptra FMC ...
3,167,361 UART:
3,167,504 UART: [state] CFI Enabled
3,178,223 UART: [fht] FMC Alias Private Key: 7
3,286,544 UART: [art] Extend RT PCRs Done
3,286,972 UART: [art] Lock RT PCRs Done
3,288,372 UART: [art] Populate DV Done
3,296,743 UART: [fht] FMC Alias Private Key: 7
3,297,683 UART: [art] Derive CDI
3,297,963 UART: [art] Store in in slot 0x4
3,383,542 UART: [art] Derive Key Pair
3,383,902 UART: [art] Store priv key in slot 0x5
3,397,270 UART: [art] Derive Key Pair - Done
3,412,194 UART: [art] Signing Cert with AUTHO
3,412,674 UART: RITY.KEYID = 7
3,427,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,643 UART: [art] PUB.X = E17FAE10FE2CA32743D518FBC4A30C8AD2CFC05D8329FBBC92B3A564699ED18E8BE85F598049E253190735A121EBEB9F
3,435,423 UART: [art] PUB.Y = C2361A33DBA22F5B3DFDD2EC214346B1920C8EBBF0DD12005B875116499016DA91DE0EBCDD4AA0EA0F1237C4A2FC30F0
3,442,362 UART: [art] SIG.R = AE84A3E2094ACD592B94BA05F3C43B1F7C49462EF47C47588FC117A0BD263E648175E11E978F83600525E5E6A22C0C0D
3,449,121 UART: [art] SIG.S = 5393441001323B8B3E70FCF8A33330555B34AB681953556993B718E969EF0C4D8EC0A066A4312FA0693A4370C0F12716
3,472,510 UART: Caliptra RT
3,472,855 UART: [state] CFI Enabled
3,581,044 UART: [rt] RT listening for mailbox commands...
3,581,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,766 UART: [rt]cmd =0x41544d4e, len=14344
4,015,020 >>> mbox cmd response data (8 bytes)
4,015,021 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,024 UART: [rt]cmd =0x41545348, len=116
4,066,637 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,334 ready_for_fw is high
1,363,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,591 >>> mbox cmd response: success
2,992,379 UART:
2,992,395 UART: Running Caliptra FMC ...
2,992,803 UART:
2,992,946 UART: [state] CFI Enabled
3,003,375 UART: [fht] FMC Alias Private Key: 7
3,111,728 UART: [art] Extend RT PCRs Done
3,112,156 UART: [art] Lock RT PCRs Done
3,113,940 UART: [art] Populate DV Done
3,121,977 UART: [fht] FMC Alias Private Key: 7
3,123,013 UART: [art] Derive CDI
3,123,293 UART: [art] Store in in slot 0x4
3,208,638 UART: [art] Derive Key Pair
3,208,998 UART: [art] Store priv key in slot 0x5
3,222,346 UART: [art] Derive Key Pair - Done
3,237,087 UART: [art] Signing Cert with AUTHO
3,237,567 UART: RITY.KEYID = 7
3,252,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,332 UART: [art] PUB.X = 4B2524F73D6F9605EBAA8EBC7DA28AD060957CADD8FEEC2A3C85ACABFC16FCF6131C00F7CF2BD75D78347BBC20021DA0
3,260,104 UART: [art] PUB.Y = 66BA98C8181A52EE9475A93CFFBA96A64FF35F64CCF0C9C5392209299C7CAE3C5CB4537FE7547EA19E6A31E8438E54EC
3,267,065 UART: [art] SIG.R = AE19683607F9DA1E2B5912EF75B378A3C9618A7477C1050135714FEF4C274D098220E5D2F485913F6BE068007AE879B1
3,273,795 UART: [art] SIG.S = D4029E8E1416A3CCA933E1722B9F8832D5AAF74516F1186C96C9D4358C903976FF0459A71759B44433852375C1F15BD4
3,297,566 UART: Caliptra RT
3,297,911 UART: [state] CFI Enabled
3,406,607 UART: [rt] RT listening for mailbox commands...
3,407,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,283 UART: [rt]cmd =0x41544d4e, len=14344
3,840,061 >>> mbox cmd response data (8 bytes)
3,840,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,945 UART: [rt]cmd =0x41545348, len=116
3,891,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,232 UART: [kat] SHA2-512-ACC
908,133 UART: [kat] ECC-384
917,812 UART: [kat] HMAC-384Kdf
922,404 UART: [kat] LMS
1,170,732 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,089 UART: [fht] FHT @ 0x50003400
1,174,544 UART: [idev] ++
1,174,712 UART: [idev] CDI.KEYID = 6
1,175,072 UART: [idev] SUBJECT.KEYID = 7
1,175,496 UART: [idev] UDS.KEYID = 0
1,175,841 ready_for_fw is high
1,175,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,627 UART: [idev] Sha1 KeyId Algorithm
1,210,093 UART: [idev] --
1,211,075 UART: [ldev] ++
1,211,243 UART: [ldev] CDI.KEYID = 6
1,211,606 UART: [ldev] SUBJECT.KEYID = 5
1,212,032 UART: [ldev] AUTHORITY.KEYID = 7
1,212,495 UART: [ldev] FE.KEYID = 1
1,217,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,665 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x46574c44
1,284,276 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,080 >>> mbox cmd response: success
2,775,176 UART: [afmc] ++
2,775,344 UART: [afmc] CDI.KEYID = 6
2,775,706 UART: [afmc] SUBJECT.KEYID = 7
2,776,131 UART: [afmc] AUTHORITY.KEYID = 5
2,811,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,911 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,245 UART: [afmc] --
2,854,269 UART: [cold-reset] --
2,855,001 UART: [state] Locking Datavault
2,855,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,586 UART: [state] Locking ICCM
2,857,014 UART: [exit] Launching FMC @ 0x40000130
2,862,343 UART:
2,862,359 UART: Running Caliptra FMC ...
2,862,767 UART:
2,862,821 UART: [state] CFI Enabled
2,872,786 UART: [fht] FMC Alias Private Key: 7
2,980,735 UART: [art] Extend RT PCRs Done
2,981,163 UART: [art] Lock RT PCRs Done
2,982,933 UART: [art] Populate DV Done
2,991,334 UART: [fht] FMC Alias Private Key: 7
2,992,478 UART: [art] Derive CDI
2,992,758 UART: [art] Store in in slot 0x4
3,078,471 UART: [art] Derive Key Pair
3,078,831 UART: [art] Store priv key in slot 0x5
3,092,351 UART: [art] Derive Key Pair - Done
3,107,191 UART: [art] Signing Cert with AUTHO
3,107,671 UART: RITY.KEYID = 7
3,122,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,204 UART: [art] PUB.X = F445341BC2AFF3603DCC5AC4DE8B8F837011D1BA720A44C412DD4DD008764381219178FDE6E950E03A84D3A228A564AA
3,129,976 UART: [art] PUB.Y = AEF2434C86FCFD2F2C757EC9CE17D0185E27A087FCF000BB8EA6ADBC9A3A2ADB898EA0F56DDBE3B5C5E797A67C429C9A
3,136,936 UART: [art] SIG.R = 697760A6AA79AE8803E60AEEF5804EDCD9032D748606B4909D1B7A9F5AE5180887282CC04CEDF224B8E48ADD8B779DE0
3,143,701 UART: [art] SIG.S = D79244992F1F2B9C4D4D9FDF6D830B98F87EBD4B5964CB38990502CCA18508090BA79C96F72F94DE52EAA0B7DB4EF476
3,167,120 UART: Caliptra RT
3,167,373 UART: [state] CFI Enabled
3,274,882 UART: [rt] RT listening for mailbox commands...
3,275,552 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,742 UART: [rt]cmd =0x41544d4e, len=14344
3,708,218 >>> mbox cmd response data (8 bytes)
3,708,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,402 UART: [rt]cmd =0x41545348, len=116
3,759,879 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,945 ready_for_fw is high
1,060,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,228 >>> mbox cmd response: success
2,688,568 UART:
2,688,584 UART: Running Caliptra FMC ...
2,688,992 UART:
2,689,046 UART: [state] CFI Enabled
2,699,409 UART: [fht] FMC Alias Private Key: 7
2,807,440 UART: [art] Extend RT PCRs Done
2,807,868 UART: [art] Lock RT PCRs Done
2,809,556 UART: [art] Populate DV Done
2,817,625 UART: [fht] FMC Alias Private Key: 7
2,818,705 UART: [art] Derive CDI
2,818,985 UART: [art] Store in in slot 0x4
2,904,832 UART: [art] Derive Key Pair
2,905,192 UART: [art] Store priv key in slot 0x5
2,917,896 UART: [art] Derive Key Pair - Done
2,932,696 UART: [art] Signing Cert with AUTHO
2,933,176 UART: RITY.KEYID = 7
2,948,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,801 UART: [art] PUB.X = 60EF8881159E481CA7134024E7882C231ABC67419201E3A3F39DD78F162FBDD394859AEBCFEBE77F1B2A7BBBF845388A
2,955,578 UART: [art] PUB.Y = 42C42CEA769C458E4605DC427589537258BB2D519A9F76A347E678038FEF8C38BE79F62212B393E73E912A0EBDE2D9FF
2,962,523 UART: [art] SIG.R = 673AD5A388FAF942FDAC9BF18E3D7910E4DA92EB4E63E9D43031D6C1AA2F606FFC8C66F7A69C651946790B18291B8981
2,969,300 UART: [art] SIG.S = 7DDD120A829DEA144DB17EAB6FC6AD578BE4DF457788CA2CC7535ED1F1EF4344396E15E5B39D927696059108A57AB7D4
2,993,050 UART: Caliptra RT
2,993,303 UART: [state] CFI Enabled
3,100,258 UART: [rt] RT listening for mailbox commands...
3,100,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,032 UART: [rt]cmd =0x41544d4e, len=14344
3,533,894 >>> mbox cmd response data (8 bytes)
3,533,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,926 UART: [rt]cmd =0x41545348, len=116
3,585,805 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,374 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 ready_for_fw is high
1,176,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,097 UART: [idev] Erasing UDS.KEYID = 0
1,201,028 UART: [idev] Sha1 KeyId Algorithm
1,209,544 UART: [idev] --
1,210,774 UART: [ldev] ++
1,210,942 UART: [ldev] CDI.KEYID = 6
1,211,305 UART: [ldev] SUBJECT.KEYID = 5
1,211,731 UART: [ldev] AUTHORITY.KEYID = 7
1,212,194 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,244,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,380 UART: [ldev] --
1,283,725 UART: [fwproc] Wait for Commands...
1,284,539 UART: [fwproc] Recv command 0x46574c44
1,285,267 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,942 >>> mbox cmd response: success
2,776,200 UART: [afmc] ++
2,776,368 UART: [afmc] CDI.KEYID = 6
2,776,730 UART: [afmc] SUBJECT.KEYID = 7
2,777,155 UART: [afmc] AUTHORITY.KEYID = 5
2,812,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,277 UART: [afmc] --
2,856,273 UART: [cold-reset] --
2,857,105 UART: [state] Locking Datavault
2,858,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,898 UART: [state] Locking ICCM
2,859,544 UART: [exit] Launching FMC @ 0x40000130
2,864,873 UART:
2,864,889 UART: Running Caliptra FMC ...
2,865,297 UART:
2,865,440 UART: [state] CFI Enabled
2,876,323 UART: [fht] FMC Alias Private Key: 7
2,984,844 UART: [art] Extend RT PCRs Done
2,985,272 UART: [art] Lock RT PCRs Done
2,986,682 UART: [art] Populate DV Done
2,994,777 UART: [fht] FMC Alias Private Key: 7
2,995,727 UART: [art] Derive CDI
2,996,007 UART: [art] Store in in slot 0x4
3,081,398 UART: [art] Derive Key Pair
3,081,758 UART: [art] Store priv key in slot 0x5
3,095,580 UART: [art] Derive Key Pair - Done
3,110,550 UART: [art] Signing Cert with AUTHO
3,111,030 UART: RITY.KEYID = 7
3,126,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,065 UART: [art] PUB.X = CF8FD429C36249F5E1B6F1B93CDF1B702E3D16736F13ACBF733B9AE5968A48D6645431B21691C292186A10C300A35694
3,133,813 UART: [art] PUB.Y = 0877164959A64321B017F7AA93CC8787EC41F592DA23E624693C6FC911CD3B80C07E84021684880021B90410638082A6
3,140,716 UART: [art] SIG.R = DB971C0D936D506852F7CF5878CA56E27A68A9AC608B3910A99ACA939C8E0350197310C39B58E2F150C0F20E6708BA9B
3,147,476 UART: [art] SIG.S = 272EF597BBB586B6F9D7A4B78AB15FA280F4317EA711C611EDCEE5923A0EAFF70B8DDF201AB8CFA1E92C2F0E94FA3ECA
3,170,998 UART: Caliptra RT
3,171,343 UART: [state] CFI Enabled
3,279,678 UART: [rt] RT listening for mailbox commands...
3,280,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,432 UART: [rt]cmd =0x41544d4e, len=14344
3,713,710 >>> mbox cmd response data (8 bytes)
3,713,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,922 UART: [rt]cmd =0x41545348, len=116
3,765,977 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,456 ready_for_fw is high
1,061,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,447 >>> mbox cmd response: success
2,690,425 UART:
2,690,441 UART: Running Caliptra FMC ...
2,690,849 UART:
2,690,992 UART: [state] CFI Enabled
2,701,541 UART: [fht] FMC Alias Private Key: 7
2,809,190 UART: [art] Extend RT PCRs Done
2,809,618 UART: [art] Lock RT PCRs Done
2,810,992 UART: [art] Populate DV Done
2,819,303 UART: [fht] FMC Alias Private Key: 7
2,820,387 UART: [art] Derive CDI
2,820,667 UART: [art] Store in in slot 0x4
2,906,198 UART: [art] Derive Key Pair
2,906,558 UART: [art] Store priv key in slot 0x5
2,919,574 UART: [art] Derive Key Pair - Done
2,933,962 UART: [art] Signing Cert with AUTHO
2,934,442 UART: RITY.KEYID = 7
2,949,368 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,133 UART: [art] PUB.X = 9B540EB14FF5D06EA76BE8E7E8528032EEF0741A63816D96634F5761693BD3B8D00AC46128768A70F9CA34C97A8FAF53
2,956,901 UART: [art] PUB.Y = E20B8253DA9B3631D53A692B73AD2FECE9ACA21A1C7EC0D27082562B4B42B23D2B3D47F265A0FE9AB7D813C5D1D4D3F3
2,963,866 UART: [art] SIG.R = 18519709D106A71724C05BD6766D4E0C5EAAB0A757AF9E185D6FD5BD8CD46110A2B3751BFF1CDBCC9EB48565CCA7049A
2,970,640 UART: [art] SIG.S = 2F5A49E76BCA1ED9E803209178B1535CBC7F8A2FF3CD3A2AD5E4A015083ECC5CD13C5D090554FDFD540F01921A6A778B
2,994,421 UART: Caliptra RT
2,994,766 UART: [state] CFI Enabled
3,103,167 UART: [rt] RT listening for mailbox commands...
3,103,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,791 UART: [rt]cmd =0x41544d4e, len=14344
3,536,733 >>> mbox cmd response data (8 bytes)
3,536,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,901 UART: [rt]cmd =0x41545348, len=116
3,588,466 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,174,099 ready_for_fw is high
1,174,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,987 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,846 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,067 >>> mbox cmd response: success
2,774,100 UART: [afmc] ++
2,774,268 UART: [afmc] CDI.KEYID = 6
2,774,631 UART: [afmc] SUBJECT.KEYID = 7
2,775,057 UART: [afmc] AUTHORITY.KEYID = 5
2,810,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,495 UART: [afmc] --
2,853,553 UART: [cold-reset] --
2,854,295 UART: [state] Locking Datavault
2,855,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,922 UART: [state] Locking ICCM
2,856,368 UART: [exit] Launching FMC @ 0x40000130
2,861,697 UART:
2,861,713 UART: Running Caliptra FMC ...
2,862,121 UART:
2,862,175 UART: [state] CFI Enabled
2,872,576 UART: [fht] FMC Alias Private Key: 7
2,980,511 UART: [art] Extend RT PCRs Done
2,980,939 UART: [art] Lock RT PCRs Done
2,982,317 UART: [art] Populate DV Done
2,990,490 UART: [fht] FMC Alias Private Key: 7
2,991,474 UART: [art] Derive CDI
2,991,754 UART: [art] Store in in slot 0x4
3,077,607 UART: [art] Derive Key Pair
3,077,967 UART: [art] Store priv key in slot 0x5
3,090,775 UART: [art] Derive Key Pair - Done
3,105,458 UART: [art] Signing Cert with AUTHO
3,105,938 UART: RITY.KEYID = 7
3,121,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,793 UART: [art] PUB.X = E37746B27819FB3A6C5919894FA82B4C4CE256E8A517215669BFFAEB61E9F762E3029C8BE42EC2854289AD2F0346E95A
3,128,561 UART: [art] PUB.Y = 73CB603EFBF6C5D9F868B2959581CED380F18FF27265D3B1B3F8479AC00BF0011EAD7F63C04921C81C5F35B2689129DA
3,135,513 UART: [art] SIG.R = BC099E499B661436B7D8DE0AB3E11050CFB5EFEF0BE4B20AE5799E09CAC0156ABEC0DF047E926EB791BA5E4380A22350
3,142,283 UART: [art] SIG.S = 2C9576D2D45F84C8250E2CAB1472C9F74EF442366A792B7A678A9E4D34C27DE3104BC81329E522FF0E51BB6E6B9D2C67
3,166,060 UART: Caliptra RT
3,166,313 UART: [state] CFI Enabled
3,273,338 UART: [rt] RT listening for mailbox commands...
3,274,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,288 UART: [rt]cmd =0x41544d4e, len=14344
3,707,672 >>> mbox cmd response data (8 bytes)
3,707,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,962 UART: [rt]cmd =0x41545348, len=116
3,760,599 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,938 ready_for_fw is high
1,055,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,805 >>> mbox cmd response: success
2,683,765 UART:
2,683,781 UART: Running Caliptra FMC ...
2,684,189 UART:
2,684,243 UART: [state] CFI Enabled
2,694,522 UART: [fht] FMC Alias Private Key: 7
2,802,357 UART: [art] Extend RT PCRs Done
2,802,785 UART: [art] Lock RT PCRs Done
2,804,397 UART: [art] Populate DV Done
2,812,348 UART: [fht] FMC Alias Private Key: 7
2,813,508 UART: [art] Derive CDI
2,813,788 UART: [art] Store in in slot 0x4
2,898,931 UART: [art] Derive Key Pair
2,899,291 UART: [art] Store priv key in slot 0x5
2,912,567 UART: [art] Derive Key Pair - Done
2,927,327 UART: [art] Signing Cert with AUTHO
2,927,807 UART: RITY.KEYID = 7
2,942,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,564 UART: [art] PUB.X = 0B7F34546F04EEC3614D22A22EE0111B53FA8D3D9D88C719AB4CF4473481B291EFACC16694BE47171AACCF1D1BD71645
2,950,340 UART: [art] PUB.Y = 43A3D5A5E628D8A769E86AAE02321195A9D8D61FC2C284A23203EBBAFA53823418DC18EF1765E3B8D6EE7DBC31A3B7A6
2,957,298 UART: [art] SIG.R = F72793C12573486A189F57D6E47DC8A4F1282A15B30CD00250A625C6F022EF8AC51254D969111DAB76C40B55FABB7B7C
2,964,063 UART: [art] SIG.S = 9B88B4AB52D4DB194D5CBD300FDE53E81E95AE0CF8EDC589C0EB5E5AD044690A069D7BE9C2F07E1D42971DC1F50BD257
2,988,135 UART: Caliptra RT
2,988,388 UART: [state] CFI Enabled
3,095,636 UART: [rt] RT listening for mailbox commands...
3,096,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,164 UART: [rt]cmd =0x41544d4e, len=14344
3,528,628 >>> mbox cmd response data (8 bytes)
3,528,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,760 UART: [rt]cmd =0x41545348, len=116
3,580,687 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,556 UART: [kat] SHA2-256
902,496 UART: [kat] SHA2-384
905,167 UART: [kat] SHA2-512-ACC
907,068 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,405 UART: [kat] LMS
1,169,717 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,175,058 ready_for_fw is high
1,175,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,208,830 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,445 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,532 UART: [fwproc] Recv command 0x46574c44
1,284,265 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,098 >>> mbox cmd response: success
2,775,243 UART: [afmc] ++
2,775,411 UART: [afmc] CDI.KEYID = 6
2,775,774 UART: [afmc] SUBJECT.KEYID = 7
2,776,200 UART: [afmc] AUTHORITY.KEYID = 5
2,811,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,558 UART: [afmc] --
2,854,466 UART: [cold-reset] --
2,855,076 UART: [state] Locking Datavault
2,856,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,969 UART: [state] Locking ICCM
2,857,615 UART: [exit] Launching FMC @ 0x40000130
2,862,944 UART:
2,862,960 UART: Running Caliptra FMC ...
2,863,368 UART:
2,863,511 UART: [state] CFI Enabled
2,874,164 UART: [fht] FMC Alias Private Key: 7
2,982,151 UART: [art] Extend RT PCRs Done
2,982,579 UART: [art] Lock RT PCRs Done
2,983,885 UART: [art] Populate DV Done
2,992,106 UART: [fht] FMC Alias Private Key: 7
2,993,164 UART: [art] Derive CDI
2,993,444 UART: [art] Store in in slot 0x4
3,079,173 UART: [art] Derive Key Pair
3,079,533 UART: [art] Store priv key in slot 0x5
3,092,175 UART: [art] Derive Key Pair - Done
3,107,059 UART: [art] Signing Cert with AUTHO
3,107,539 UART: RITY.KEYID = 7
3,122,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,248 UART: [art] PUB.X = 6DE02A445376343830F98F74EDBB94B122AE6BCFCCA8F6E8E026B05F64A2DD1BE68D97FFCF3FCF2D490E60C0C1EDD24A
3,130,041 UART: [art] PUB.Y = E34DF631D9182E31EDAF32115214F2A9B8342A72E84D257D49A46E37E895F1FAFF382D7F95B4D0585247448C5F616C37
3,136,991 UART: [art] SIG.R = 1342471070F369E1FA804483F1EB2EBADB2D44262E9B318D7581519D8667BA56FC2FBB9E35FB8FE68CA89357A3F55ADF
3,143,771 UART: [art] SIG.S = 1089756B5EE7C3F512C500714FBF1FA499924F87CF62C19C2F3036A8DC23D02A0641E4FD677360F516D0A400C8BBDFB9
3,167,585 UART: Caliptra RT
3,167,930 UART: [state] CFI Enabled
3,276,117 UART: [rt] RT listening for mailbox commands...
3,276,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,053 UART: [rt]cmd =0x41544d4e, len=14344
3,710,475 >>> mbox cmd response data (8 bytes)
3,710,476 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,329 UART: [rt]cmd =0x41545348, len=116
3,762,402 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,325 ready_for_fw is high
1,056,325 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,856 >>> mbox cmd response: success
2,685,096 UART:
2,685,112 UART: Running Caliptra FMC ...
2,685,520 UART:
2,685,663 UART: [state] CFI Enabled
2,696,244 UART: [fht] FMC Alias Private Key: 7
2,804,525 UART: [art] Extend RT PCRs Done
2,804,953 UART: [art] Lock RT PCRs Done
2,806,445 UART: [art] Populate DV Done
2,814,786 UART: [fht] FMC Alias Private Key: 7
2,815,794 UART: [art] Derive CDI
2,816,074 UART: [art] Store in in slot 0x4
2,901,835 UART: [art] Derive Key Pair
2,902,195 UART: [art] Store priv key in slot 0x5
2,915,399 UART: [art] Derive Key Pair - Done
2,930,117 UART: [art] Signing Cert with AUTHO
2,930,597 UART: RITY.KEYID = 7
2,945,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,506 UART: [art] PUB.X = 6907D911CBD0E2AC62952099A17FFB5784ECACF61DA0D42F4492AEABF6EC28B6F2C7294820739C3DC35FA4FD9E408DCD
2,953,293 UART: [art] PUB.Y = 6C1EFC5F9E3DD54F2BC870464EDA64D29CE624E904507CC58EB844D79EEA503962B831703AC7DB51E6595D21B40841D3
2,960,245 UART: [art] SIG.R = CA45F513774F14406504FC94DAAB0AD92F8CE4E61DEE7DA1BA8B910D2A113BCF7760C9D1078950FF573030FCC3055201
2,967,007 UART: [art] SIG.S = 6FEFC8665089F6714E53E576F770B394E36E59A26A69AD90D4D3E5F7B877AF170C5896851988779774841A4D2EFA4C51
2,990,875 UART: Caliptra RT
2,991,220 UART: [state] CFI Enabled
3,099,325 UART: [rt] RT listening for mailbox commands...
3,099,995 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,073 UART: [rt]cmd =0x41544d4e, len=14344
3,533,539 >>> mbox cmd response data (8 bytes)
3,533,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,591 UART: [rt]cmd =0x41545348, len=116
3,584,748 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,509 UART: [kat] SHA2-256
881,440 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,555 UART: [kat] ++
885,707 UART: [kat] sha1
890,019 UART: [kat] SHA2-256
891,957 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,046 UART: [kat] HMAC-384Kdf
906,472 UART: [kat] LMS
1,474,668 UART: [kat] --
1,475,621 UART: [cold-reset] ++
1,476,063 UART: [fht] Storing FHT @ 0x50003400
1,478,686 UART: [idev] ++
1,478,854 UART: [idev] CDI.KEYID = 6
1,479,214 UART: [idev] SUBJECT.KEYID = 7
1,479,638 UART: [idev] UDS.KEYID = 0
1,479,983 ready_for_fw is high
1,479,983 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,620 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,313 UART: [ldev] Erasing FE.KEYID = 1
1,546,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,251 UART: [fwproc] Waiting for Commands...
1,586,964 UART: [fwproc] Received command 0x46574c44
1,587,755 UART: [fwproc] Received Image of size 31656 bytes
1,938,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,301 >>> mbox cmd response: success
2,007,419 UART: [afmc] ++
2,007,587 UART: [afmc] CDI.KEYID = 6
2,007,949 UART: [afmc] SUBJECT.KEYID = 7
2,008,374 UART: [afmc] AUTHORITY.KEYID = 5
2,043,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,065,939 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,071,824 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,514 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,383 UART: [afmc] --
2,086,473 UART: [cold-reset] --
2,087,145 UART: [state] Locking Datavault
2,088,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,140 UART: [state] Locking ICCM
2,089,726 UART: [exit] Launching FMC @ 0x40000130
2,095,055 UART:
2,095,071 UART: Running Caliptra FMC ...
2,095,479 UART:
2,095,533 UART: [state] CFI Enabled
2,106,598 UART: [fht] FMC Alias Private Key: 7
2,214,433 UART: [art] Extend RT PCRs Done
2,214,861 UART: [art] Lock RT PCRs Done
2,216,339 UART: [art] Populate DV Done
2,224,680 UART: [fht] FMC Alias Private Key: 7
2,225,778 UART: [art] Derive CDI
2,226,058 UART: [art] Store in in slot 0x4
2,311,831 UART: [art] Derive Key Pair
2,312,191 UART: [art] Store priv key in slot 0x5
2,325,149 UART: [art] Derive Key Pair - Done
2,339,887 UART: [art] Signing Cert with AUTHO
2,340,367 UART: RITY.KEYID = 7
2,355,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,574 UART: [art] PUB.X = 4DD58301EF29EAD9CB36C9A55D9D68DD5F5089C6732F63DD5BDE330D286A3C2E74D82B8EC01FB507BA57C061665E38DA
2,363,351 UART: [art] PUB.Y = 2005068A64556EB5B0541D1745A9A0F602B9E139A69853E4E347A1F1D90B15D047BCF560C1EBB1787689CEF476BEAA2C
2,370,293 UART: [art] SIG.R = 5812ED9B6920208ADF05A4A57CCDD0F3730376FE22CE1A22B6A9FE74C26B9B4095BC0F5BA571E4EBCCE4215181D79380
2,377,066 UART: [art] SIG.S = 197CF004653B6ED9FFC026B13716A4C3C721B36256FD11EF8EA2E76305E9F3452D233148060DA8ED5AB6FC7FDCC0CE38
2,400,586 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,461 ready_for_fw is high
1,363,461 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,821 >>> mbox cmd response: success
1,919,079 UART:
1,919,095 UART: Running Caliptra FMC ...
1,919,503 UART:
1,919,557 UART: [state] CFI Enabled
1,930,134 UART: [fht] FMC Alias Private Key: 7
2,038,403 UART: [art] Extend RT PCRs Done
2,038,831 UART: [art] Lock RT PCRs Done
2,040,387 UART: [art] Populate DV Done
2,048,764 UART: [fht] FMC Alias Private Key: 7
2,049,928 UART: [art] Derive CDI
2,050,208 UART: [art] Store in in slot 0x4
2,135,777 UART: [art] Derive Key Pair
2,136,137 UART: [art] Store priv key in slot 0x5
2,149,189 UART: [art] Derive Key Pair - Done
2,164,200 UART: [art] Signing Cert with AUTHO
2,164,680 UART: RITY.KEYID = 7
2,180,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,945 UART: [art] PUB.X = E0001FBB44699426A099938A6ADBDF1674F9B8CE2EFC09FBBB55E849CDDB2E82D2E5865F1FF42FF329E44078C6983171
2,187,702 UART: [art] PUB.Y = 5163BA4946DBD661FDA8CFB6E61E66E3EF503A639FD258E8658B806EBBC7DF305ED38FCC0111EFFBD9C62F41813700A0
2,194,645 UART: [art] SIG.R = F67B16817FC83A92D087135DF53A7AC7890D298FAA47A7D4416529000C101400D6BE8F65121E2FACC38D4A6CB48C0052
2,201,345 UART: [art] SIG.S = 202C4C05C0E951C53C55AA4296A553443898521DFDC9868D3DC64BC1DC4A8A23CD916CA277B87E816D5AF3060E2A535A
2,225,422 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
903,075 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,477,010 UART: [cold-reset] ++
1,477,488 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 ready_for_fw is high
1,481,606 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,299 UART: [idev] Erasing UDS.KEYID = 0
1,505,953 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,613 UART: [idev] --
1,515,512 UART: [ldev] ++
1,515,680 UART: [ldev] CDI.KEYID = 6
1,516,043 UART: [ldev] SUBJECT.KEYID = 5
1,516,469 UART: [ldev] AUTHORITY.KEYID = 7
1,516,932 UART: [ldev] FE.KEYID = 1
1,522,108 UART: [ldev] Erasing FE.KEYID = 1
1,547,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,843 UART: [ldev] --
1,586,298 UART: [fwproc] Waiting for Commands...
1,587,053 UART: [fwproc] Received command 0x46574c44
1,587,844 UART: [fwproc] Received Image of size 31656 bytes
1,938,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,802 >>> mbox cmd response: success
2,007,838 UART: [afmc] ++
2,008,006 UART: [afmc] CDI.KEYID = 6
2,008,368 UART: [afmc] SUBJECT.KEYID = 7
2,008,793 UART: [afmc] AUTHORITY.KEYID = 5
2,044,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,584 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,977 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,667 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,600 UART: [afmc] --
2,087,546 UART: [cold-reset] --
2,088,328 UART: [state] Locking Datavault
2,089,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,841 UART: [state] Locking ICCM
2,090,371 UART: [exit] Launching FMC @ 0x40000130
2,095,700 UART:
2,095,716 UART: Running Caliptra FMC ...
2,096,124 UART:
2,096,267 UART: [state] CFI Enabled
2,106,778 UART: [fht] FMC Alias Private Key: 7
2,214,705 UART: [art] Extend RT PCRs Done
2,215,133 UART: [art] Lock RT PCRs Done
2,216,723 UART: [art] Populate DV Done
2,225,018 UART: [fht] FMC Alias Private Key: 7
2,225,992 UART: [art] Derive CDI
2,226,272 UART: [art] Store in in slot 0x4
2,311,845 UART: [art] Derive Key Pair
2,312,205 UART: [art] Store priv key in slot 0x5
2,325,187 UART: [art] Derive Key Pair - Done
2,339,954 UART: [art] Signing Cert with AUTHO
2,340,434 UART: RITY.KEYID = 7
2,355,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,471 UART: [art] PUB.X = AEF94B70C2B94A61BF20DA9F10FE95BCBC8089ABF1ABAB76CD0B8538673A680B4E7644A35D0AA0386FF1CAE2FE921EAC
2,363,260 UART: [art] PUB.Y = 7AA96475A6522F5E19AE27E5731FE555265FE1CE2146A93BB6084A69F5866144B466E082AC20AE967E2B7D2C285F40CD
2,370,209 UART: [art] SIG.R = D63411E3B2C7D992014446EA2FB9E81D97BDEAEA299DE3C33CB979F44AFB2F1D8845299B7427CCCB4F463E6171E4B4A2
2,376,990 UART: [art] SIG.S = 0DA4FFFB60D1BE35FE65C39188272805D9A823FABBED555B787A215D51D5042D40E0818738A1AF2A0885BF7B9D53FC2D
2,400,470 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,920 ready_for_fw is high
1,362,920 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,136 >>> mbox cmd response: success
1,918,572 UART:
1,918,588 UART: Running Caliptra FMC ...
1,918,996 UART:
1,919,139 UART: [state] CFI Enabled
1,929,518 UART: [fht] FMC Alias Private Key: 7
2,037,525 UART: [art] Extend RT PCRs Done
2,037,953 UART: [art] Lock RT PCRs Done
2,039,177 UART: [art] Populate DV Done
2,047,434 UART: [fht] FMC Alias Private Key: 7
2,048,504 UART: [art] Derive CDI
2,048,784 UART: [art] Store in in slot 0x4
2,134,309 UART: [art] Derive Key Pair
2,134,669 UART: [art] Store priv key in slot 0x5
2,147,477 UART: [art] Derive Key Pair - Done
2,161,874 UART: [art] Signing Cert with AUTHO
2,162,354 UART: RITY.KEYID = 7
2,177,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,293 UART: [art] PUB.X = 5B943434A8A9AAF002CAA04955B7C7DAFE5896A4CD5B634A27CCB9855C91A22DFB62E18F3D1F0CC17E0BDCE24521F3B3
2,185,074 UART: [art] PUB.Y = 908505AB76073D97FC17262B686A68E604215129A061263EB4B9AFB1EAABEEF3DBF6E326F2216F4E11609F08EAFAF096
2,192,020 UART: [art] SIG.R = 2BBD4D9F950154261A7A2F4979C22A38D64AF453B23E0101EF9D507ACBC1D14A20664E2B8DC88D9E0EF037EA550E99A8
2,198,785 UART: [art] SIG.S = B076ABC433EA03FBC7BE8AB251B5101CD6B60E4214C405770878095B85E3CFA391B31292A81DFBFE7457B670C59A0030
2,222,544 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,742 UART: [kat] LMS
1,171,070 UART: [kat] --
1,172,001 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,244 UART: [idev] ++
1,175,412 UART: [idev] CDI.KEYID = 6
1,175,772 UART: [idev] SUBJECT.KEYID = 7
1,176,196 UART: [idev] UDS.KEYID = 0
1,176,541 ready_for_fw is high
1,176,541 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,240 UART: [idev] Erasing UDS.KEYID = 0
1,201,177 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,639 UART: [ldev] ++
1,210,807 UART: [ldev] CDI.KEYID = 6
1,211,170 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,183 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,282,958 UART: [fwproc] Recv command 0x46574c44
1,283,686 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,737 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,608 >>> mbox cmd response: success
1,705,776 UART: [afmc] ++
1,705,944 UART: [afmc] CDI.KEYID = 6
1,706,306 UART: [afmc] SUBJECT.KEYID = 7
1,706,731 UART: [afmc] AUTHORITY.KEYID = 5
1,741,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,716 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,435 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,289 UART: [afmc] --
1,784,383 UART: [cold-reset] --
1,785,279 UART: [state] Locking Datavault
1,786,334 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,938 UART: [state] Locking ICCM
1,787,566 UART: [exit] Launching FMC @ 0x40000130
1,792,895 UART:
1,792,911 UART: Running Caliptra FMC ...
1,793,319 UART:
1,793,373 UART: [state] CFI Enabled
1,803,980 UART: [fht] FMC Alias Private Key: 7
1,912,391 UART: [art] Extend RT PCRs Done
1,912,819 UART: [art] Lock RT PCRs Done
1,914,381 UART: [art] Populate DV Done
1,922,806 UART: [fht] FMC Alias Private Key: 7
1,923,890 UART: [art] Derive CDI
1,924,170 UART: [art] Store in in slot 0x4
2,009,627 UART: [art] Derive Key Pair
2,009,987 UART: [art] Store priv key in slot 0x5
2,023,219 UART: [art] Derive Key Pair - Done
2,037,740 UART: [art] Signing Cert with AUTHO
2,038,220 UART: RITY.KEYID = 7
2,053,410 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,175 UART: [art] PUB.X = D34AAC939BA13A22361A0D77D71253A5FCB60643183A380101B68CE7ED10F63700D7F9CDA50FDD6E38598D22EDB1BC16
2,060,918 UART: [art] PUB.Y = 0FCEED4B1C5C3401315866CA50DB3BF91A16324549C523F22DEC6ADDE1D8637EA11F9BBAB4FDFDCC4B8BB58044ACCFBA
2,067,894 UART: [art] SIG.R = ABD60E1C0692926D93ED90B5801D0F597A6A329E51C290CC374F06B7AABF3109D64FDC254684FCB45000577D194996F0
2,074,629 UART: [art] SIG.S = DE8ADBB7D01ADCDDF518FE3E20AD572A5530A56FE38ED1CBB93EBFF0A604F6C0E39740B90AA3DB4875C7DF9ADA32B723
2,098,407 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,617 ready_for_fw is high
1,059,617 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,571 >>> mbox cmd response: success
1,616,941 UART:
1,616,957 UART: Running Caliptra FMC ...
1,617,365 UART:
1,617,419 UART: [state] CFI Enabled
1,627,896 UART: [fht] FMC Alias Private Key: 7
1,735,957 UART: [art] Extend RT PCRs Done
1,736,385 UART: [art] Lock RT PCRs Done
1,737,731 UART: [art] Populate DV Done
1,746,124 UART: [fht] FMC Alias Private Key: 7
1,747,128 UART: [art] Derive CDI
1,747,408 UART: [art] Store in in slot 0x4
1,833,347 UART: [art] Derive Key Pair
1,833,707 UART: [art] Store priv key in slot 0x5
1,846,831 UART: [art] Derive Key Pair - Done
1,861,387 UART: [art] Signing Cert with AUTHO
1,861,867 UART: RITY.KEYID = 7
1,876,983 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,748 UART: [art] PUB.X = C26F6DEA8C21B48BE73329CFDA80F671C30F58F5D4D948A0FEDCB373EB416D19F84EAA538F17B5B74063A2BA531E3906
1,884,528 UART: [art] PUB.Y = BA8D521680BC56DA3D7D5CE9309E730813DED189CC5570D0B01F2B73574731124E0EE7AFADC5D049669F47FA91915D2B
1,891,480 UART: [art] SIG.R = 518C475E3552BCA3AEDCF28FB99B90C0746D31D651C4A19B47781939DB8AA72333C96AF8C31D3D473C6D2ADF7310BFD6
1,898,262 UART: [art] SIG.S = AC40BD39DF09FEA286358D73F470DF2B0DDAD30D74EA2D33F71536EF6BC4AEFEF8315176D8E220D8712E08CEF5279B37
1,922,268 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
893,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,832 UART: [kat] ++
897,984 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,175,145 UART: [idev] ++
1,175,313 UART: [idev] CDI.KEYID = 6
1,175,673 UART: [idev] SUBJECT.KEYID = 7
1,176,097 UART: [idev] UDS.KEYID = 0
1,176,442 ready_for_fw is high
1,176,442 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,789 UART: [idev] Erasing UDS.KEYID = 0
1,200,664 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,209,960 UART: [ldev] ++
1,210,128 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,917 UART: [ldev] AUTHORITY.KEYID = 7
1,211,380 UART: [ldev] FE.KEYID = 1
1,216,836 UART: [ldev] Erasing FE.KEYID = 1
1,243,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,536 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,529 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,974 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,647 >>> mbox cmd response: success
1,703,799 UART: [afmc] ++
1,703,967 UART: [afmc] CDI.KEYID = 6
1,704,329 UART: [afmc] SUBJECT.KEYID = 7
1,704,754 UART: [afmc] AUTHORITY.KEYID = 5
1,740,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,202 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,815 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,534 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,212 UART: [afmc] --
1,784,142 UART: [cold-reset] --
1,785,040 UART: [state] Locking Datavault
1,786,333 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,937 UART: [state] Locking ICCM
1,787,493 UART: [exit] Launching FMC @ 0x40000130
1,792,822 UART:
1,792,838 UART: Running Caliptra FMC ...
1,793,246 UART:
1,793,389 UART: [state] CFI Enabled
1,804,068 UART: [fht] FMC Alias Private Key: 7
1,912,035 UART: [art] Extend RT PCRs Done
1,912,463 UART: [art] Lock RT PCRs Done
1,913,941 UART: [art] Populate DV Done
1,921,968 UART: [fht] FMC Alias Private Key: 7
1,922,904 UART: [art] Derive CDI
1,923,184 UART: [art] Store in in slot 0x4
2,008,825 UART: [art] Derive Key Pair
2,009,185 UART: [art] Store priv key in slot 0x5
2,022,609 UART: [art] Derive Key Pair - Done
2,037,602 UART: [art] Signing Cert with AUTHO
2,038,082 UART: RITY.KEYID = 7
2,053,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,985 UART: [art] PUB.X = 6750EF0583DFBEA05203A77DCA837BECE045DED8E8ACFE4495D39976AE1976EEA36E03556A30965C8B89650D9EF6B7D2
2,060,757 UART: [art] PUB.Y = B9E3F8E6D5D8BF9EB9AC9ED40C97665A60F04382BE721DCBFCE78C8529517C31D915A5292209EF368D0E3B1D68B12DC3
2,067,712 UART: [art] SIG.R = 82F1D44833284BBCF23A10744F7F18F3D9A02BDFD1718F82A23E13A7AE3E9EA236A2877FC3679457523DFEA672EC09DF
2,074,489 UART: [art] SIG.S = D081E45C8D9DD0E0F64D2F38F78B83045547B821216EE82C6E4C726C30094C0548E2432167BB8F1E5760CC6C3F98D8FB
2,097,574 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 ready_for_fw is high
1,061,118 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,557,374 >>> mbox cmd response: success
1,619,236 UART:
1,619,252 UART: Running Caliptra FMC ...
1,619,660 UART:
1,619,803 UART: [state] CFI Enabled
1,630,492 UART: [fht] FMC Alias Private Key: 7
1,738,161 UART: [art] Extend RT PCRs Done
1,738,589 UART: [art] Lock RT PCRs Done
1,740,233 UART: [art] Populate DV Done
1,748,240 UART: [fht] FMC Alias Private Key: 7
1,749,286 UART: [art] Derive CDI
1,749,566 UART: [art] Store in in slot 0x4
1,835,289 UART: [art] Derive Key Pair
1,835,649 UART: [art] Store priv key in slot 0x5
1,849,463 UART: [art] Derive Key Pair - Done
1,864,002 UART: [art] Signing Cert with AUTHO
1,864,482 UART: RITY.KEYID = 7
1,879,906 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,671 UART: [art] PUB.X = A999EDDE40D56F3CEE72FAB3DFE1E26ADD758E302D16A7CF1585E9244BDA319189EB92E6865D58D0788EB8B798A3D78F
1,887,459 UART: [art] PUB.Y = 2B7A893400BC7FA6C3CB444AE0B7894CD66B310AAA5BA791DEFBF39CDEE81D771D120E52DA2B382727DA1172D4211198
1,894,395 UART: [art] SIG.R = 17A9520101811BFDE4FCB6FD39FAD30F92B072062BB694FF7EC12BA6189B6B4B44C682ADA01E74F8A2523B2E3C8E622A
1,901,167 UART: [art] SIG.S = 05406E7F36067246AD417FF88A99834FEBB806B750FCD448B0D5802DF20A3B3AF782AAA4D29B5A3877A393F618DA8954
1,924,937 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,556 UART: [state] LifecycleState = Unprovisioned
85,211 UART: [state] DebugLocked = No
85,783 UART: [state] WD Timer not started. Device not locked for debugging
87,140 UART: [kat] SHA2-256
890,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,819 UART: [kat] ++
894,971 UART: [kat] sha1
899,063 UART: [kat] SHA2-256
901,003 UART: [kat] SHA2-384
903,676 UART: [kat] SHA2-512-ACC
905,577 UART: [kat] ECC-384
915,470 UART: [kat] HMAC-384Kdf
920,066 UART: [kat] LMS
1,168,378 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,855 UART: [fht] FHT @ 0x50003400
1,172,505 UART: [idev] ++
1,172,673 UART: [idev] CDI.KEYID = 6
1,173,034 UART: [idev] SUBJECT.KEYID = 7
1,173,459 UART: [idev] UDS.KEYID = 0
1,173,805 ready_for_fw is high
1,173,805 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,197,927 UART: [idev] Sha1 KeyId Algorithm
1,206,857 UART: [idev] --
1,207,964 UART: [ldev] ++
1,208,132 UART: [ldev] CDI.KEYID = 6
1,208,496 UART: [ldev] SUBJECT.KEYID = 5
1,208,923 UART: [ldev] AUTHORITY.KEYID = 7
1,209,386 UART: [ldev] FE.KEYID = 1
1,214,244 UART: [ldev] Erasing FE.KEYID = 1
1,240,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,676 UART: [ldev] --
1,280,132 UART: [fwproc] Wait for Commands...
1,280,871 UART: [fwproc] Recv command 0x46574c44
1,281,604 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,816 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,662 >>> mbox cmd response: success
1,701,755 UART: [afmc] ++
1,701,923 UART: [afmc] CDI.KEYID = 6
1,702,286 UART: [afmc] SUBJECT.KEYID = 7
1,702,712 UART: [afmc] AUTHORITY.KEYID = 5
1,738,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,394 UART: [afmc] --
1,781,520 UART: [cold-reset] --
1,782,250 UART: [state] Locking Datavault
1,783,657 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,261 UART: [state] Locking ICCM
1,784,855 UART: [exit] Launching FMC @ 0x40000130
1,790,184 UART:
1,790,200 UART: Running Caliptra FMC ...
1,790,608 UART:
1,790,662 UART: [state] CFI Enabled
1,801,027 UART: [fht] FMC Alias Private Key: 7
1,909,240 UART: [art] Extend RT PCRs Done
1,909,668 UART: [art] Lock RT PCRs Done
1,911,130 UART: [art] Populate DV Done
1,919,433 UART: [fht] FMC Alias Private Key: 7
1,920,615 UART: [art] Derive CDI
1,920,895 UART: [art] Store in in slot 0x4
2,006,410 UART: [art] Derive Key Pair
2,006,770 UART: [art] Store priv key in slot 0x5
2,019,512 UART: [art] Derive Key Pair - Done
2,034,459 UART: [art] Signing Cert with AUTHO
2,034,939 UART: RITY.KEYID = 7
2,050,005 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,770 UART: [art] PUB.X = 1986C0B0A94817E12F45668A427318592140CF2D1C473275E2A2A5C6825AE409BCEE4EA99299EB674F20A2558407C25A
2,057,528 UART: [art] PUB.Y = CE9BCB0EB9E768E97426BF8D4FD48E5DFE49E3CED581F7BF9426FEA12DA79B7FAF76DAD348AF76033FFE597E3AF19B1C
2,064,504 UART: [art] SIG.R = 32B4866ECC641A6438ADB7F4A1DF0EAFB7000E7CD6E4F3B20DC5C1B9E3F56151C04577C0F9039BA9223FB0CBCC9B7B4D
2,071,262 UART: [art] SIG.S = 57DB5EFE7F8D55D9FD4BABFFC83A4E613AA065C459A3F2D1C90E1F3E915A84AE9CABD64157CF9787B9E04D2937878391
2,095,091 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,058 ready_for_fw is high
1,057,058 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,854 >>> mbox cmd response: success
1,614,180 UART:
1,614,196 UART: Running Caliptra FMC ...
1,614,604 UART:
1,614,658 UART: [state] CFI Enabled
1,625,241 UART: [fht] FMC Alias Private Key: 7
1,733,568 UART: [art] Extend RT PCRs Done
1,733,996 UART: [art] Lock RT PCRs Done
1,735,590 UART: [art] Populate DV Done
1,743,959 UART: [fht] FMC Alias Private Key: 7
1,744,977 UART: [art] Derive CDI
1,745,257 UART: [art] Store in in slot 0x4
1,830,856 UART: [art] Derive Key Pair
1,831,216 UART: [art] Store priv key in slot 0x5
1,844,256 UART: [art] Derive Key Pair - Done
1,858,745 UART: [art] Signing Cert with AUTHO
1,859,225 UART: RITY.KEYID = 7
1,874,193 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,958 UART: [art] PUB.X = 86630AA64959E304B40572AB93A9937F13E1F89B4FBC9DF529465FF0E9469502B9B7F9367190EC9E57764BBFF0C07F11
1,881,716 UART: [art] PUB.Y = BB597A530293D21019C400DAEBF8BD6EF31EDF8D6E64FA21908896B0C770415709DFA9805FF5D1EEFF0B20A2BCE352D0
1,888,651 UART: [art] SIG.R = 75811120963F08F17F9AC1AE4D1A671C53C7CCBA5F761FB12715EE8C68DBA34C26E9CE2DC54DF97A0A60ADD6483386EB
1,895,431 UART: [art] SIG.S = 8A986CA9FB71C2EF9B53C6DAB8A92793FB3EFF77D266146AC82C80B8732D1C1E9E75227F0E8A28325958F88BACCD4638
1,919,510 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
916,231 UART: [kat] HMAC-384Kdf
920,875 UART: [kat] LMS
1,169,187 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,174,700 ready_for_fw is high
1,174,700 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,701 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,163 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,977 >>> mbox cmd response: success
1,703,998 UART: [afmc] ++
1,704,166 UART: [afmc] CDI.KEYID = 6
1,704,529 UART: [afmc] SUBJECT.KEYID = 7
1,704,955 UART: [afmc] AUTHORITY.KEYID = 5
1,740,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,307 UART: [afmc] --
1,784,373 UART: [cold-reset] --
1,785,451 UART: [state] Locking Datavault
1,786,582 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,186 UART: [state] Locking ICCM
1,787,856 UART: [exit] Launching FMC @ 0x40000130
1,793,185 UART:
1,793,201 UART: Running Caliptra FMC ...
1,793,609 UART:
1,793,752 UART: [state] CFI Enabled
1,804,423 UART: [fht] FMC Alias Private Key: 7
1,912,592 UART: [art] Extend RT PCRs Done
1,913,020 UART: [art] Lock RT PCRs Done
1,914,482 UART: [art] Populate DV Done
1,922,469 UART: [fht] FMC Alias Private Key: 7
1,923,409 UART: [art] Derive CDI
1,923,689 UART: [art] Store in in slot 0x4
2,009,102 UART: [art] Derive Key Pair
2,009,462 UART: [art] Store priv key in slot 0x5
2,023,288 UART: [art] Derive Key Pair - Done
2,038,190 UART: [art] Signing Cert with AUTHO
2,038,670 UART: RITY.KEYID = 7
2,054,140 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,905 UART: [art] PUB.X = 15E8B6D841DA9AD8176CF7979F9229180A09DE26B5F12C33EECC44FF6C7655008058275763E15A1070C8B9AC8B09BAAA
2,061,650 UART: [art] PUB.Y = C35108B7E2B52C25A98E23CC5CDF13A904238661C4D1097BB2A3AB719CF7A7241ED8757A792D7D911D228558BE900C8D
2,068,592 UART: [art] SIG.R = F6B544B96C363C3411D984120A348C7F2A5AFB6C95D30952421DB7754FF693B54B8A0DBFD46A67BB6FF4F9E8DC6EFE27
2,075,367 UART: [art] SIG.S = E68912E55AC597131E6064D0C5539899C29E07DEB96BD6A72F7EC8D8EBF47A077B5B5055AC804D86F65FBE85458EDF48
2,099,125 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 ready_for_fw is high
1,056,113 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,985 >>> mbox cmd response: success
1,614,063 UART:
1,614,079 UART: Running Caliptra FMC ...
1,614,487 UART:
1,614,630 UART: [state] CFI Enabled
1,625,007 UART: [fht] FMC Alias Private Key: 7
1,733,494 UART: [art] Extend RT PCRs Done
1,733,922 UART: [art] Lock RT PCRs Done
1,735,232 UART: [art] Populate DV Done
1,743,487 UART: [fht] FMC Alias Private Key: 7
1,744,453 UART: [art] Derive CDI
1,744,733 UART: [art] Store in in slot 0x4
1,830,664 UART: [art] Derive Key Pair
1,831,024 UART: [art] Store priv key in slot 0x5
1,844,216 UART: [art] Derive Key Pair - Done
1,858,456 UART: [art] Signing Cert with AUTHO
1,858,936 UART: RITY.KEYID = 7
1,874,470 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,235 UART: [art] PUB.X = 9C8FA743BBB7227E3A4923B81DCEBE4B13922A008C33A0FB8CA06073E06E7A5A23AAD929A39CFEFD45A70E1B6D9A95E9
1,882,000 UART: [art] PUB.Y = 810FCB00817C20DA6114FF58E5EFD93332804C82B45B45E6453584AD5A1E3562242A4CD60AD569CC8840BAA693A4BE24
1,888,926 UART: [art] SIG.R = B78E4B36FAAC2846D80D075675C365227A5E53339ADDBC7A057C6C0F92906649C44148BB5A6BF69534B4221A03F4E56C
1,895,683 UART: [art] SIG.S = 4DE748ECD3425309CFD39BEE53077DBD16EAE45B2A3D9C188940C2E7A637A3ADC16F23A02DBE7DB2BCFA1889A217E09B
1,919,493 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,647 UART: [kat] SHA2-256
892,585 UART: [kat] SHA2-384
895,488 UART: [kat] SHA2-512-ACC
897,389 UART: [kat] ECC-384
903,132 UART: [kat] HMAC-384Kdf
907,720 UART: [kat] LMS
1,475,916 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,477,077 UART: [fht] Storing FHT @ 0x50003400
1,479,818 UART: [idev] ++
1,479,986 UART: [idev] CDI.KEYID = 6
1,480,346 UART: [idev] SUBJECT.KEYID = 7
1,480,770 UART: [idev] UDS.KEYID = 0
1,481,115 ready_for_fw is high
1,481,115 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,240 UART: [idev] Erasing UDS.KEYID = 0
1,505,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,808 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,307 UART: [ldev] Erasing FE.KEYID = 1
1,547,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,854 UART: [ldev] --
1,586,263 UART: [fwproc] Waiting for Commands...
1,587,112 UART: [fwproc] Received command 0x46574c44
1,587,903 UART: [fwproc] Received Image of size 78704 bytes
2,478,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,172 >>> mbox cmd response: success
2,617,172 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,618,382 UART: [afmc] ++
2,618,550 UART: [afmc] CDI.KEYID = 6
2,618,912 UART: [afmc] SUBJECT.KEYID = 7
2,619,337 UART: [afmc] AUTHORITY.KEYID = 5
2,654,674 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,551 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,241 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,170 UART: [afmc] --
2,698,106 UART: [cold-reset] --
2,698,942 UART: [state] Locking Datavault
2,700,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,095 UART: [state] Locking ICCM
2,701,567 UART: [exit] Launching FMC @ 0x40000130
2,706,896 UART:
2,706,912 UART: Running Caliptra FMC ...
2,707,320 UART:
2,707,374 UART: [state] CFI Enabled
2,718,071 UART: [fht] FMC Alias Private Key: 7
2,826,086 UART: [art] Extend RT PCRs Done
2,826,514 UART: [art] Lock RT PCRs Done
2,828,038 UART: [art] Populate DV Done
2,836,149 UART: [fht] FMC Alias Private Key: 7
2,837,115 UART: [art] Derive CDI
2,837,395 UART: [art] Store in in slot 0x4
2,923,064 UART: [art] Derive Key Pair
2,923,424 UART: [art] Store priv key in slot 0x5
2,936,488 UART: [art] Derive Key Pair - Done
2,951,266 UART: [art] Signing Cert with AUTHO
2,951,746 UART: RITY.KEYID = 7
2,967,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,981 UART: [art] PUB.X = 3FD31A99EFC4511D1B836C91B0D3B633D368637FCD2E0C2264D660DD0769586D77E2A48E9E962D6AA245C6E454F121A9
2,974,749 UART: [art] PUB.Y = 82BA33B3FE06FAE8FA6D7163C51664FDDF804B3108191285C956C0FA5835ACC203A5DD12B6D1151637FD52C2FDB39161
2,981,698 UART: [art] SIG.R = 2EFACF90BD79D700505F719636B856AFBA7E2F58F7E642916D32E3786424C5283BD62E6E8B66FF77250B58CCF8FCC6A7
2,988,453 UART: [art] SIG.S = 64016058F34FDD5D31858CAFE52281A24543125E0472867BE8A57F297B085D3AFE263A8B34697F35A5F1B399C72240ED
3,011,759 UART: mbox::rt_entry...
3,012,131 UART: ____ _ _ _ ____ _____
3,012,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,019 UART: |_|
3,016,331 UART:
3,124,156 UART: [rt] Runtime listening for mailbox commands...
3,125,337 >>> mbox cmd response data (48 bytes)
3,125,338 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,128,121 >>> mbox cmd response data (48 bytes)
3,128,122 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,141,060 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,647 ready_for_fw is high
1,361,647 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,463,482 >>> mbox cmd response: success
2,463,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,525,620 UART:
2,525,636 UART: Running Caliptra FMC ...
2,526,044 UART:
2,526,098 UART: [state] CFI Enabled
2,536,371 UART: [fht] FMC Alias Private Key: 7
2,644,062 UART: [art] Extend RT PCRs Done
2,644,490 UART: [art] Lock RT PCRs Done
2,645,808 UART: [art] Populate DV Done
2,654,007 UART: [fht] FMC Alias Private Key: 7
2,655,121 UART: [art] Derive CDI
2,655,401 UART: [art] Store in in slot 0x4
2,741,414 UART: [art] Derive Key Pair
2,741,774 UART: [art] Store priv key in slot 0x5
2,754,394 UART: [art] Derive Key Pair - Done
2,769,058 UART: [art] Signing Cert with AUTHO
2,769,538 UART: RITY.KEYID = 7
2,784,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,729 UART: [art] PUB.X = A0620218DD29FD3F090FD45331F88AF060F61F97494F84A7FB6986E7E0EBBD75847061FB9A2A4CA00C2FDBD19D31E6CF
2,792,501 UART: [art] PUB.Y = 4F40E3685DD24D628790F6D91E119EFB38CD7571CF079537857EFFB0D713FA9734C5901939B5D7999987D1D406DFF422
2,799,443 UART: [art] SIG.R = 4231041C9FE81D63F212DCD33BAE89552933CFEB6337CE8A6C39EF9F51CA25EBA2BA4A77616F7BF0D05B055F7154D7E1
2,806,221 UART: [art] SIG.S = 3F5C7AB26B5DFE37FF7F57777D04452FE56BD97E4E50D39C4CC85BFA259F76402714E4E249C1502384FDEF1C012E3FB6
2,829,366 UART: mbox::rt_entry...
2,829,738 UART: ____ _ _ _ ____ _____
2,830,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,858 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,626 UART: |_|
2,833,938 UART:
2,941,915 UART: [rt] Runtime listening for mailbox commands...
2,943,096 >>> mbox cmd response data (48 bytes)
2,943,097 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,945,880 >>> mbox cmd response data (48 bytes)
2,945,881 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,958,819 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,690 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 ready_for_fw is high
1,481,286 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,465 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,135 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,522,030 UART: [ldev] Erasing FE.KEYID = 1
1,547,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,941 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,163 UART: [fwproc] Received command 0x46574c44
1,588,954 UART: [fwproc] Received Image of size 78704 bytes
2,478,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,524 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,173 >>> mbox cmd response: success
2,617,173 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,618,223 UART: [afmc] ++
2,618,391 UART: [afmc] CDI.KEYID = 6
2,618,753 UART: [afmc] SUBJECT.KEYID = 7
2,619,178 UART: [afmc] AUTHORITY.KEYID = 5
2,654,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,522 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,212 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,045 UART: [afmc] --
2,698,015 UART: [cold-reset] --
2,698,903 UART: [state] Locking Datavault
2,700,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,696 UART: [state] Locking ICCM
2,701,292 UART: [exit] Launching FMC @ 0x40000130
2,706,621 UART:
2,706,637 UART: Running Caliptra FMC ...
2,707,045 UART:
2,707,188 UART: [state] CFI Enabled
2,717,857 UART: [fht] FMC Alias Private Key: 7
2,826,014 UART: [art] Extend RT PCRs Done
2,826,442 UART: [art] Lock RT PCRs Done
2,827,804 UART: [art] Populate DV Done
2,835,923 UART: [fht] FMC Alias Private Key: 7
2,837,059 UART: [art] Derive CDI
2,837,339 UART: [art] Store in in slot 0x4
2,923,318 UART: [art] Derive Key Pair
2,923,678 UART: [art] Store priv key in slot 0x5
2,936,358 UART: [art] Derive Key Pair - Done
2,951,060 UART: [art] Signing Cert with AUTHO
2,951,540 UART: RITY.KEYID = 7
2,966,694 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,459 UART: [art] PUB.X = 313C110D6F393141CD397DE5A89617EC8FEE91D8EA97FB89317A73ED4B51CE42A86C3EE80AF37236FB937C9EE72E37CE
2,974,237 UART: [art] PUB.Y = A6AE61949D551094E12915FC6F3C388AC6A1DA26A6D747520B52DCAA4F0BEA244C07C50B381F8628FCDE4C8A3B67CF7A
2,981,191 UART: [art] SIG.R = B3674DB8A6655583DBE1FC6B0264F19C13C42E07110BB9E3A138CBC0CC5367D1EEE0D7E1FCEC6410119746FE6EA013CF
2,987,968 UART: [art] SIG.S = 8AFB26F34A4E7A3B079C66CCD9D303A5581032544603985B3908BD8F50709E616796AE4FAC1833AF2BDBED921A095995
3,011,380 UART: mbox::rt_entry...
3,011,752 UART: ____ _ _ _ ____ _____
3,012,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,336 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,104 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,872 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,640 UART: |_|
3,015,952 UART:
3,122,247 UART: [rt] Runtime listening for mailbox commands...
3,123,428 >>> mbox cmd response data (48 bytes)
3,123,429 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,126,212 >>> mbox cmd response data (48 bytes)
3,126,213 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,139,151 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,158 ready_for_fw is high
1,362,158 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,355 >>> mbox cmd response: success
2,467,355 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,823 UART:
2,529,839 UART: Running Caliptra FMC ...
2,530,247 UART:
2,530,390 UART: [state] CFI Enabled
2,541,127 UART: [fht] FMC Alias Private Key: 7
2,648,728 UART: [art] Extend RT PCRs Done
2,649,156 UART: [art] Lock RT PCRs Done
2,650,740 UART: [art] Populate DV Done
2,658,985 UART: [fht] FMC Alias Private Key: 7
2,659,959 UART: [art] Derive CDI
2,660,239 UART: [art] Store in in slot 0x4
2,746,230 UART: [art] Derive Key Pair
2,746,590 UART: [art] Store priv key in slot 0x5
2,759,288 UART: [art] Derive Key Pair - Done
2,773,947 UART: [art] Signing Cert with AUTHO
2,774,427 UART: RITY.KEYID = 7
2,789,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,210 UART: [art] PUB.X = FF082E0B4C045733C410D89B486D77C8B643983B5C08A34A7BE082D84C32D1576B841A676CDD0E022F9898DA621C7352
2,796,960 UART: [art] PUB.Y = 9445890A23E3DE6A51227EF122A03F868612DD826F20AFFEB354EBBFE5EBF35956EAE58479F59E74F06DD6C2C9DD4370
2,803,919 UART: [art] SIG.R = FE72E1DEAEEE2F42F5F87BD2CEEF9F0B26DC75CC245D12C79908E2DCCEC68F16BB6267121C1C07C7B64C27197DE03518
2,810,702 UART: [art] SIG.S = 1ECC61537AA7AB0834E934D39D0F14ABD2415EBF431DE906D570073DD7E82C92E92BE4EDDFD7CBCFF46B2631572E616D
2,834,913 UART: mbox::rt_entry...
2,835,285 UART: ____ _ _ _ ____ _____
2,836,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,637 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,173 UART: |_|
2,839,485 UART:
2,945,957 UART: [rt] Runtime listening for mailbox commands...
2,947,138 >>> mbox cmd response data (48 bytes)
2,947,139 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,949,922 >>> mbox cmd response data (48 bytes)
2,949,923 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,962,861 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
892,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,009 UART: [kat] ++
897,161 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
917,976 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,172,053 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 ready_for_fw is high
1,176,371 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,200,807 UART: [idev] Sha1 KeyId Algorithm
1,209,199 UART: [idev] --
1,210,123 UART: [ldev] ++
1,210,291 UART: [ldev] CDI.KEYID = 6
1,210,654 UART: [ldev] SUBJECT.KEYID = 5
1,211,080 UART: [ldev] AUTHORITY.KEYID = 7
1,211,543 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,668 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,129 >>> mbox cmd response: success
2,313,129 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,161 UART: [afmc] ++
2,314,329 UART: [afmc] CDI.KEYID = 6
2,314,691 UART: [afmc] SUBJECT.KEYID = 7
2,315,116 UART: [afmc] AUTHORITY.KEYID = 5
2,351,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,290 UART: [afmc] --
2,394,302 UART: [cold-reset] --
2,394,954 UART: [state] Locking Datavault
2,395,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,579 UART: [state] Locking ICCM
2,397,013 UART: [exit] Launching FMC @ 0x40000130
2,402,342 UART:
2,402,358 UART: Running Caliptra FMC ...
2,402,766 UART:
2,402,820 UART: [state] CFI Enabled
2,413,487 UART: [fht] FMC Alias Private Key: 7
2,521,208 UART: [art] Extend RT PCRs Done
2,521,636 UART: [art] Lock RT PCRs Done
2,523,316 UART: [art] Populate DV Done
2,531,485 UART: [fht] FMC Alias Private Key: 7
2,532,591 UART: [art] Derive CDI
2,532,871 UART: [art] Store in in slot 0x4
2,618,416 UART: [art] Derive Key Pair
2,618,776 UART: [art] Store priv key in slot 0x5
2,632,024 UART: [art] Derive Key Pair - Done
2,647,096 UART: [art] Signing Cert with AUTHO
2,647,576 UART: RITY.KEYID = 7
2,663,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,961 UART: [art] PUB.X = A55D46DE464327A69EE9432EBF23543D0E486A1994C1511048A87B60878AD6C6076988A3BBEA1E6F9A34FEF6011A9C0A
2,670,723 UART: [art] PUB.Y = E50C780EC7D870FF76986C513912E46A2B34D8E5EFB2896130B855E8A46123B82D041806253A2729B48CF9023C9FCBDC
2,677,658 UART: [art] SIG.R = 4B9C3A764FB0511130E9D58CD46A364468C6CC52F522226A023E433E823567F580555F4440C634FF3561EBA1D3C416C5
2,684,419 UART: [art] SIG.S = 5015C88107BED35291CE982BB2BBCEEA81F833E8D68E9E415A45622EF1E290D435290A6B3AAADBE03578DDCAF4C0FBC4
2,708,330 UART: mbox::rt_entry...
2,708,702 UART: ____ _ _ _ ____ _____
2,709,486 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,286 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,054 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,822 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,590 UART: |_|
2,712,902 UART:
2,818,806 UART: [rt] Runtime listening for mailbox commands...
2,819,987 >>> mbox cmd response data (48 bytes)
2,819,988 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,771 >>> mbox cmd response data (48 bytes)
2,822,772 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,710 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,519 ready_for_fw is high
1,060,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,578 >>> mbox cmd response: success
2,165,578 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,096 UART:
2,227,112 UART: Running Caliptra FMC ...
2,227,520 UART:
2,227,574 UART: [state] CFI Enabled
2,238,213 UART: [fht] FMC Alias Private Key: 7
2,346,044 UART: [art] Extend RT PCRs Done
2,346,472 UART: [art] Lock RT PCRs Done
2,348,190 UART: [art] Populate DV Done
2,356,555 UART: [fht] FMC Alias Private Key: 7
2,357,617 UART: [art] Derive CDI
2,357,897 UART: [art] Store in in slot 0x4
2,443,790 UART: [art] Derive Key Pair
2,444,150 UART: [art] Store priv key in slot 0x5
2,457,082 UART: [art] Derive Key Pair - Done
2,471,908 UART: [art] Signing Cert with AUTHO
2,472,388 UART: RITY.KEYID = 7
2,487,940 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,705 UART: [art] PUB.X = A8C6FCE5086D769B048F25D76CBFCCBF743B7E40ACBE615DF89E42C8D8B7511949217D0326C3D8DBAD70CE69D3620486
2,495,477 UART: [art] PUB.Y = 21DDF114E586890B1DC909D51D0A4468F367DB2122635E407EC6F3288D28AC88068082C0BDA4E9501F5BB318CCD75363
2,502,415 UART: [art] SIG.R = D27364DFAEAC85B762A4270136797390C5B794CAE0269EA3F60FB89F750A19A8D895C8896CF418F75B6144BF8E646CB3
2,509,180 UART: [art] SIG.S = 79704E24504EBEC8C605D85E94FF04C4125410DA0CD98A01DD1CD0C071A5F225E0CC803E57536A05C74776A079E159F2
2,532,722 UART: mbox::rt_entry...
2,533,094 UART: ____ _ _ _ ____ _____
2,533,878 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,982 UART: |_|
2,537,294 UART:
2,644,430 UART: [rt] Runtime listening for mailbox commands...
2,645,611 >>> mbox cmd response data (48 bytes)
2,645,612 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,648,395 >>> mbox cmd response data (48 bytes)
2,648,396 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,661,334 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
893,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,846 UART: [kat] ++
897,998 UART: [kat] sha1
902,120 UART: [kat] SHA2-256
904,060 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,495 UART: [kat] HMAC-384Kdf
923,141 UART: [kat] LMS
1,171,469 UART: [kat] --
1,172,096 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 ready_for_fw is high
1,176,570 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,199 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,994 UART: [idev] --
1,211,168 UART: [ldev] ++
1,211,336 UART: [ldev] CDI.KEYID = 6
1,211,699 UART: [ldev] SUBJECT.KEYID = 5
1,212,125 UART: [ldev] AUTHORITY.KEYID = 7
1,212,588 UART: [ldev] FE.KEYID = 1
1,217,918 UART: [ldev] Erasing FE.KEYID = 1
1,244,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,498 UART: [ldev] --
1,283,875 UART: [fwproc] Wait for Commands...
1,284,613 UART: [fwproc] Recv command 0x46574c44
1,285,341 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,811 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,304 >>> mbox cmd response: success
2,313,304 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,470 UART: [afmc] ++
2,314,638 UART: [afmc] CDI.KEYID = 6
2,315,000 UART: [afmc] SUBJECT.KEYID = 7
2,315,425 UART: [afmc] AUTHORITY.KEYID = 5
2,351,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,623 UART: [afmc] --
2,394,703 UART: [cold-reset] --
2,395,585 UART: [state] Locking Datavault
2,396,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,440 UART: [state] Locking ICCM
2,398,090 UART: [exit] Launching FMC @ 0x40000130
2,403,419 UART:
2,403,435 UART: Running Caliptra FMC ...
2,403,843 UART:
2,403,986 UART: [state] CFI Enabled
2,414,631 UART: [fht] FMC Alias Private Key: 7
2,522,380 UART: [art] Extend RT PCRs Done
2,522,808 UART: [art] Lock RT PCRs Done
2,524,286 UART: [art] Populate DV Done
2,532,437 UART: [fht] FMC Alias Private Key: 7
2,533,519 UART: [art] Derive CDI
2,533,799 UART: [art] Store in in slot 0x4
2,619,636 UART: [art] Derive Key Pair
2,619,996 UART: [art] Store priv key in slot 0x5
2,633,786 UART: [art] Derive Key Pair - Done
2,648,467 UART: [art] Signing Cert with AUTHO
2,648,947 UART: RITY.KEYID = 7
2,664,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,196 UART: [art] PUB.X = 7C537F9D05165B56F700E9BFD467BF485F5CD44D5C90CFB70098B98502DD042823EBC597F59E9CA5C28A43C84FC3BE99
2,671,923 UART: [art] PUB.Y = DB41982CDBF5B0F37142F742578117C213AED00576BA80163F5C5552AFCC39E99B189C0547B98FBF238189D98376423D
2,678,865 UART: [art] SIG.R = A20717939766D44C398586005FCB89BAE064FBF8598C2C9FCFDF65D820B010920D6AB98212ED102392ACC44AE44B0CAC
2,685,612 UART: [art] SIG.S = 285236BBE29C4B7E3C66B9E042F99D4163A24F245D4265E41FF50259FECF157FF3301E0B6CDC61701F683C81F61AAA8E
2,708,643 UART: mbox::rt_entry...
2,709,015 UART: ____ _ _ _ ____ _____
2,709,799 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,599 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,367 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,135 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,903 UART: |_|
2,713,215 UART:
2,820,353 UART: [rt] Runtime listening for mailbox commands...
2,821,534 >>> mbox cmd response data (48 bytes)
2,821,535 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,824,318 >>> mbox cmd response data (48 bytes)
2,824,319 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,837,257 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 ready_for_fw is high
1,060,626 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,923 >>> mbox cmd response: success
2,165,923 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,025 UART:
2,228,041 UART: Running Caliptra FMC ...
2,228,449 UART:
2,228,592 UART: [state] CFI Enabled
2,239,047 UART: [fht] FMC Alias Private Key: 7
2,346,960 UART: [art] Extend RT PCRs Done
2,347,388 UART: [art] Lock RT PCRs Done
2,348,900 UART: [art] Populate DV Done
2,357,297 UART: [fht] FMC Alias Private Key: 7
2,358,439 UART: [art] Derive CDI
2,358,719 UART: [art] Store in in slot 0x4
2,444,324 UART: [art] Derive Key Pair
2,444,684 UART: [art] Store priv key in slot 0x5
2,457,598 UART: [art] Derive Key Pair - Done
2,472,376 UART: [art] Signing Cert with AUTHO
2,472,856 UART: RITY.KEYID = 7
2,488,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,893 UART: [art] PUB.X = 27CDD42CAF819E03EAD97B0F2CB6211F9F80E134A464B529400CA2B4DAD9FF5E54AD91F461ACCCD25899DB7A0775FAC6
2,495,673 UART: [art] PUB.Y = E91110B4C92CA5E3F2BCD1C4C5D3146C7C70579835F2CAEFD76A6248AF65B6E361988F0B413B8088F3E28A0586ADE64C
2,502,627 UART: [art] SIG.R = CB0873E413020E74961DB094547AC121A12EDA1D67683FDE6B631075FD80BB18F3CA54945630C8495E8459B8AC98962F
2,509,386 UART: [art] SIG.S = EFEADA67CD70130015D7A44DAC3D35C12EEBEF61B5A71AAC626AACEEA6F7153943EDAD2E7FFE3384076E8ECD59ED63E4
2,533,516 UART: mbox::rt_entry...
2,533,888 UART: ____ _ _ _ ____ _____
2,534,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,776 UART: |_|
2,538,088 UART:
2,644,821 UART: [rt] Runtime listening for mailbox commands...
2,646,002 >>> mbox cmd response data (48 bytes)
2,646,003 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,648,786 >>> mbox cmd response data (48 bytes)
2,648,787 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,661,725 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,242,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,314 UART: [ldev] --
1,281,662 UART: [fwproc] Wait for Commands...
1,282,257 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,691 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,119 >>> mbox cmd response: success
2,311,119 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,146 UART: [afmc] ++
2,312,314 UART: [afmc] CDI.KEYID = 6
2,312,677 UART: [afmc] SUBJECT.KEYID = 7
2,313,103 UART: [afmc] AUTHORITY.KEYID = 5
2,348,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,577 UART: [afmc] --
2,391,535 UART: [cold-reset] --
2,392,397 UART: [state] Locking Datavault
2,393,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,998 UART: [state] Locking ICCM
2,394,564 UART: [exit] Launching FMC @ 0x40000130
2,399,893 UART:
2,399,909 UART: Running Caliptra FMC ...
2,400,317 UART:
2,400,371 UART: [state] CFI Enabled
2,410,966 UART: [fht] FMC Alias Private Key: 7
2,518,449 UART: [art] Extend RT PCRs Done
2,518,877 UART: [art] Lock RT PCRs Done
2,520,357 UART: [art] Populate DV Done
2,528,470 UART: [fht] FMC Alias Private Key: 7
2,529,534 UART: [art] Derive CDI
2,529,814 UART: [art] Store in in slot 0x4
2,615,597 UART: [art] Derive Key Pair
2,615,957 UART: [art] Store priv key in slot 0x5
2,628,857 UART: [art] Derive Key Pair - Done
2,643,927 UART: [art] Signing Cert with AUTHO
2,644,407 UART: RITY.KEYID = 7
2,659,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,752 UART: [art] PUB.X = FA0FC771D0F66FCF1534F3854697FE67440F7981FF6F7431129E03073D6E3CF0B3CDD3E76DDE9F0934BDAD0A13B91F2B
2,667,518 UART: [art] PUB.Y = CFC6AEBD4144ED9659EFDD66E430F2908F4317DE753A35903EA8D33B064DCF3AFF17A85C874842715914CEC7D6CAC665
2,674,479 UART: [art] SIG.R = 0BC8769980D4E8B9FB5F17C5369CD510A3D6813FC62B85FB9A0F09F5D46D4D33A0E3B99614814D76D2F331A778CA7133
2,681,244 UART: [art] SIG.S = 36479D1625B7653A25EA3B0B191509F0105717785A17FD5E56B7D2A9439D885B65AD0469B383B8918FB7EAFCCAE354E5
2,704,476 UART: mbox::rt_entry...
2,704,848 UART: ____ _ _ _ ____ _____
2,705,632 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,432 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,200 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,968 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,736 UART: |_|
2,709,048 UART:
2,816,178 UART: [rt] Runtime listening for mailbox commands...
2,817,359 >>> mbox cmd response data (48 bytes)
2,817,360 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,143 >>> mbox cmd response data (48 bytes)
2,820,144 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,082 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 ready_for_fw is high
1,055,860 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,659 >>> mbox cmd response: success
2,161,659 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,087 UART:
2,223,103 UART: Running Caliptra FMC ...
2,223,511 UART:
2,223,565 UART: [state] CFI Enabled
2,234,140 UART: [fht] FMC Alias Private Key: 7
2,342,407 UART: [art] Extend RT PCRs Done
2,342,835 UART: [art] Lock RT PCRs Done
2,344,381 UART: [art] Populate DV Done
2,352,600 UART: [fht] FMC Alias Private Key: 7
2,353,628 UART: [art] Derive CDI
2,353,908 UART: [art] Store in in slot 0x4
2,439,149 UART: [art] Derive Key Pair
2,439,509 UART: [art] Store priv key in slot 0x5
2,452,971 UART: [art] Derive Key Pair - Done
2,467,802 UART: [art] Signing Cert with AUTHO
2,468,282 UART: RITY.KEYID = 7
2,482,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,715 UART: [art] PUB.X = D1E707A34D42112D47DAE9493E1A0C95B5A0369E100A3325D91B435A1E4803A9323111A1D7C95BBF05925A475E8547CF
2,490,468 UART: [art] PUB.Y = 810AD1623C741B56638E5C1CCB1649F4CEB941E72A4E8C3E370A65D536D31399C95220CB36985393785860A6B501B849
2,497,401 UART: [art] SIG.R = 519F0C0504D0B971AEB4C5820B802D40FDC9FA864971FE5138DBEB49A8EB5D8E859E22E7FE77317F24627D99BCE7853E
2,504,169 UART: [art] SIG.S = B34D1BC23F1B18AE7ECC2C62881E1A2515239322CCF68902FDBC79367AC1E0581840F216BB7E1ABB7842E38D3028DCFD
2,528,245 UART: mbox::rt_entry...
2,528,617 UART: ____ _ _ _ ____ _____
2,529,401 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,201 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,969 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,505 UART: |_|
2,532,817 UART:
2,639,739 UART: [rt] Runtime listening for mailbox commands...
2,640,920 >>> mbox cmd response data (48 bytes)
2,640,921 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,643,704 >>> mbox cmd response data (48 bytes)
2,643,705 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,656,643 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,174,582 ready_for_fw is high
1,174,582 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,199,904 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,499 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,459 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,570 UART: [fwproc] Recv command 0x46574c44
1,284,303 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,254 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,596 >>> mbox cmd response: success
2,313,596 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,773 UART: [afmc] ++
2,314,941 UART: [afmc] CDI.KEYID = 6
2,315,304 UART: [afmc] SUBJECT.KEYID = 7
2,315,730 UART: [afmc] AUTHORITY.KEYID = 5
2,351,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,405 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,262 UART: [afmc] --
2,395,158 UART: [cold-reset] --
2,395,930 UART: [state] Locking Datavault
2,397,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,827 UART: [state] Locking ICCM
2,398,395 UART: [exit] Launching FMC @ 0x40000130
2,403,724 UART:
2,403,740 UART: Running Caliptra FMC ...
2,404,148 UART:
2,404,291 UART: [state] CFI Enabled
2,414,938 UART: [fht] FMC Alias Private Key: 7
2,523,261 UART: [art] Extend RT PCRs Done
2,523,689 UART: [art] Lock RT PCRs Done
2,525,299 UART: [art] Populate DV Done
2,533,632 UART: [fht] FMC Alias Private Key: 7
2,534,750 UART: [art] Derive CDI
2,535,030 UART: [art] Store in in slot 0x4
2,620,697 UART: [art] Derive Key Pair
2,621,057 UART: [art] Store priv key in slot 0x5
2,634,459 UART: [art] Derive Key Pair - Done
2,648,957 UART: [art] Signing Cert with AUTHO
2,649,437 UART: RITY.KEYID = 7
2,664,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,488 UART: [art] PUB.X = C2CFE9E404E0D3783EB65F73BE5AF9079EED33835A4EE91669B3B052D3C139381A7F5F4E5F2C2AB016B3E8DDAFFF249E
2,672,272 UART: [art] PUB.Y = ECABAAB25963362AC632CFC4CF1DADFEF5B5DE3F0693F286F1FA965D8678BC592D7F72810ED3ABFF5FECABDCB72A458E
2,679,252 UART: [art] SIG.R = 3277A924F130348A1EEB0E80723DE71958FEE473958F6CB85B28031424D7EDD4B6F87F2DBF0FCF3E7CA4C03083669CE3
2,686,021 UART: [art] SIG.S = 0C4049BEC29815C4DD67876CB3354A7938D70D16AE29B8B0D99C6C32E5BE986007A6632F53AF56EC2BC6955112999A3D
2,709,695 UART: mbox::rt_entry...
2,710,067 UART: ____ _ _ _ ____ _____
2,710,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,955 UART: |_|
2,714,267 UART:
2,820,795 UART: [rt] Runtime listening for mailbox commands...
2,821,976 >>> mbox cmd response data (48 bytes)
2,821,977 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,824,760 >>> mbox cmd response data (48 bytes)
2,824,761 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,837,699 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,391 ready_for_fw is high
1,056,391 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,120 >>> mbox cmd response: success
2,160,120 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,456 UART:
2,223,472 UART: Running Caliptra FMC ...
2,223,880 UART:
2,224,023 UART: [state] CFI Enabled
2,234,564 UART: [fht] FMC Alias Private Key: 7
2,342,473 UART: [art] Extend RT PCRs Done
2,342,901 UART: [art] Lock RT PCRs Done
2,344,687 UART: [art] Populate DV Done
2,352,810 UART: [fht] FMC Alias Private Key: 7
2,353,882 UART: [art] Derive CDI
2,354,162 UART: [art] Store in in slot 0x4
2,439,453 UART: [art] Derive Key Pair
2,439,813 UART: [art] Store priv key in slot 0x5
2,453,035 UART: [art] Derive Key Pair - Done
2,467,491 UART: [art] Signing Cert with AUTHO
2,467,971 UART: RITY.KEYID = 7
2,483,447 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,212 UART: [art] PUB.X = 941018B4D89F75BF9962D049CAA92DF733640A5A3FD149369A154134BFB91EC6191473BC717C70577FF37FB8861C3564
2,490,975 UART: [art] PUB.Y = 65ED9150804E716C352E279CA9A2935821B96F8F205FC11CF683922CDE37CC93AA489356C0C65E0AEFF2FDD0FA59C1E3
2,497,932 UART: [art] SIG.R = 8BB8BE453D209F45974765CDCFC6B2FACBDCC136DD2CECCF0242082F0C73F25F9C0382CB8CB295A7AA63D034E9F90873
2,504,707 UART: [art] SIG.S = C278F550B558E82A70FB931A6568BBE1ADAC5863201C2DDFCAD611CF46503841B018C467F5B17458586DFEB2A6C34978
2,528,512 UART: mbox::rt_entry...
2,528,884 UART: ____ _ _ _ ____ _____
2,529,668 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,236 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,004 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,772 UART: |_|
2,533,084 UART:
2,639,545 UART: [rt] Runtime listening for mailbox commands...
2,640,726 >>> mbox cmd response data (48 bytes)
2,640,727 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,643,510 >>> mbox cmd response data (48 bytes)
2,643,511 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,656,449 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
86,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,655 UART: [kat] SHA2-256
881,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,701 UART: [kat] ++
885,853 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,612 UART: [kat] SHA2-512-ACC
896,513 UART: [kat] ECC-384
902,088 UART: [kat] HMAC-384Kdf
906,622 UART: [kat] LMS
1,474,818 UART: [kat] --
1,475,575 UART: [cold-reset] ++
1,475,973 UART: [fht] Storing FHT @ 0x50003400
1,478,802 UART: [idev] ++
1,478,970 UART: [idev] CDI.KEYID = 6
1,479,330 UART: [idev] SUBJECT.KEYID = 7
1,479,754 UART: [idev] UDS.KEYID = 0
1,480,099 ready_for_fw is high
1,480,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,001 UART: [ldev] ++
1,514,169 UART: [ldev] CDI.KEYID = 6
1,514,532 UART: [ldev] SUBJECT.KEYID = 5
1,514,958 UART: [ldev] AUTHORITY.KEYID = 7
1,515,421 UART: [ldev] FE.KEYID = 1
1,520,773 UART: [ldev] Erasing FE.KEYID = 1
1,546,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,585,969 UART: [fwproc] Waiting for Commands...
1,586,704 UART: [fwproc] Received command 0x46574c44
1,587,495 UART: [fwproc] Received Image of size 114332 bytes
2,884,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,417 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,686 >>> mbox cmd response: success
3,077,820 UART: [afmc] ++
3,077,988 UART: [afmc] CDI.KEYID = 6
3,078,350 UART: [afmc] SUBJECT.KEYID = 7
3,078,775 UART: [afmc] AUTHORITY.KEYID = 5
3,113,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,779 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,469 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,320 UART: [afmc] --
3,156,200 UART: [cold-reset] --
3,157,086 UART: [state] Locking Datavault
3,158,345 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,949 UART: [state] Locking ICCM
3,159,403 UART: [exit] Launching FMC @ 0x40000130
3,164,732 UART:
3,164,748 UART: Running Caliptra FMC ...
3,165,156 UART:
3,165,210 UART: [state] CFI Enabled
3,175,627 UART: [fht] FMC Alias Private Key: 7
3,283,464 UART: [art] Extend RT PCRs Done
3,283,892 UART: [art] Lock RT PCRs Done
3,285,574 UART: [art] Populate DV Done
3,293,821 UART: [fht] FMC Alias Private Key: 7
3,294,815 UART: [art] Derive CDI
3,295,095 UART: [art] Store in in slot 0x4
3,380,982 UART: [art] Derive Key Pair
3,381,342 UART: [art] Store priv key in slot 0x5
3,394,272 UART: [art] Derive Key Pair - Done
3,408,735 UART: [art] Signing Cert with AUTHO
3,409,215 UART: RITY.KEYID = 7
3,424,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,164 UART: [art] PUB.X = 6C2678E207B24A1DADACB2089CBDAD0FF482B7E9E6BAFDEA225F026BAC88F548E606F72B52AA7BD77F16A54B5A858D7B
3,431,945 UART: [art] PUB.Y = 6E12658F75F69D548B128114FF55BD6A1C1BB89C6211F6F6946A7E18D1F21FE18BFBC510979A82B63FABD6F7F1D6123F
3,438,905 UART: [art] SIG.R = 1B83FA2A93F7AEFD71E0F5F4A24E5A3089DC6E455911CE4E25153268FF46FF06333C5CA5D82E7DB759E3460F30113025
3,445,675 UART: [art] SIG.S = E95B50A3AE2EDC838AFEEF87DB5405F2003563C644A5A6919BD5E573163C91D2C9BF9BAA12FAA11B2A07CA8BFA27FF0A
3,469,301 UART: Caliptra RT
3,469,554 UART: [state] CFI Enabled
3,578,341 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 ready_for_fw is high
1,362,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,346 >>> mbox cmd response: success
2,988,456 UART:
2,988,472 UART: Running Caliptra FMC ...
2,988,880 UART:
2,988,934 UART: [state] CFI Enabled
2,999,269 UART: [fht] FMC Alias Private Key: 7
3,106,654 UART: [art] Extend RT PCRs Done
3,107,082 UART: [art] Lock RT PCRs Done
3,108,700 UART: [art] Populate DV Done
3,116,701 UART: [fht] FMC Alias Private Key: 7
3,117,651 UART: [art] Derive CDI
3,117,931 UART: [art] Store in in slot 0x4
3,203,512 UART: [art] Derive Key Pair
3,203,872 UART: [art] Store priv key in slot 0x5
3,217,664 UART: [art] Derive Key Pair - Done
3,232,153 UART: [art] Signing Cert with AUTHO
3,232,633 UART: RITY.KEYID = 7
3,247,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,550 UART: [art] PUB.X = 1F1CFB315E404D98002ABB442EE4B2F3EDB4936D86CEDE5563A8FF44B2DA74582175DB81BC71314613044DC7E0EC3636
3,255,305 UART: [art] PUB.Y = 56FFA9A6C8C0D39F88214D7D5EA9BC567C2902D16DE37FC1C9661A807E3411A37491FA981F9E73008786344DA4BCD46C
3,262,236 UART: [art] SIG.R = FFEB915A3D9261794A051D838A32C8489E70FBF1C974098037F1F37FD904A0847D5AD686935802F1B7BA722E095F411E
3,268,989 UART: [art] SIG.S = 5028E6F1C4187D2990BDEA16FEC2CE50D4272AE111FB2D0B63083CD1975BAFFD50A52F7D0674B951D71D432E6E41A1B9
3,292,537 UART: Caliptra RT
3,292,790 UART: [state] CFI Enabled
3,400,365 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,846 UART: [cold-reset] ++
1,477,380 UART: [fht] Storing FHT @ 0x50003400
1,480,285 UART: [idev] ++
1,480,453 UART: [idev] CDI.KEYID = 6
1,480,813 UART: [idev] SUBJECT.KEYID = 7
1,481,237 UART: [idev] UDS.KEYID = 0
1,481,582 ready_for_fw is high
1,481,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,977 UART: [idev] Erasing UDS.KEYID = 0
1,506,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,029 UART: [idev] --
1,516,158 UART: [ldev] ++
1,516,326 UART: [ldev] CDI.KEYID = 6
1,516,689 UART: [ldev] SUBJECT.KEYID = 5
1,517,115 UART: [ldev] AUTHORITY.KEYID = 7
1,517,578 UART: [ldev] FE.KEYID = 1
1,523,158 UART: [ldev] Erasing FE.KEYID = 1
1,548,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,871 UART: [ldev] --
1,588,300 UART: [fwproc] Waiting for Commands...
1,588,929 UART: [fwproc] Received command 0x46574c44
1,589,720 UART: [fwproc] Received Image of size 114332 bytes
2,888,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,377 >>> mbox cmd response: success
3,082,407 UART: [afmc] ++
3,082,575 UART: [afmc] CDI.KEYID = 6
3,082,937 UART: [afmc] SUBJECT.KEYID = 7
3,083,362 UART: [afmc] AUTHORITY.KEYID = 5
3,118,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,154 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,844 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,773 UART: [afmc] --
3,161,749 UART: [cold-reset] --
3,162,649 UART: [state] Locking Datavault
3,163,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,198 UART: [state] Locking ICCM
3,164,722 UART: [exit] Launching FMC @ 0x40000130
3,170,051 UART:
3,170,067 UART: Running Caliptra FMC ...
3,170,475 UART:
3,170,618 UART: [state] CFI Enabled
3,181,091 UART: [fht] FMC Alias Private Key: 7
3,289,020 UART: [art] Extend RT PCRs Done
3,289,448 UART: [art] Lock RT PCRs Done
3,290,710 UART: [art] Populate DV Done
3,298,743 UART: [fht] FMC Alias Private Key: 7
3,299,893 UART: [art] Derive CDI
3,300,173 UART: [art] Store in in slot 0x4
3,386,150 UART: [art] Derive Key Pair
3,386,510 UART: [art] Store priv key in slot 0x5
3,399,590 UART: [art] Derive Key Pair - Done
3,414,405 UART: [art] Signing Cert with AUTHO
3,414,885 UART: RITY.KEYID = 7
3,429,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,456 UART: [art] PUB.X = 0DC3FAA363F5780AE3CE38A70627E25B5784126D5BE0496D7D22EA4F4FCF687F61BDD7374E605E3ACE1476E3152B499A
3,437,227 UART: [art] PUB.Y = 767C3F5E8AF10CB58CDBB124F983066B9D0F723050B84C15289C6CB6A48DAA687C47B5214E4D051311E6507B5B4111B5
3,444,167 UART: [art] SIG.R = 05BFE5079C538C75AA4AA9F8275C708EAC0915062E0A2F0AE49FE6E56F85A8EDEFBF05FD52D58D6A76691DADE20FF24D
3,450,935 UART: [art] SIG.S = F12B8DEDCEE9965E2015B5F4A58BBCB9D4DC38181715E02FBD052037259BEA0FBEC290160426CABF693941C68DC40404
3,474,941 UART: Caliptra RT
3,475,286 UART: [state] CFI Enabled
3,582,929 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,242 ready_for_fw is high
1,362,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,943 >>> mbox cmd response: success
2,989,231 UART:
2,989,247 UART: Running Caliptra FMC ...
2,989,655 UART:
2,989,798 UART: [state] CFI Enabled
3,000,255 UART: [fht] FMC Alias Private Key: 7
3,108,324 UART: [art] Extend RT PCRs Done
3,108,752 UART: [art] Lock RT PCRs Done
3,110,154 UART: [art] Populate DV Done
3,118,315 UART: [fht] FMC Alias Private Key: 7
3,119,433 UART: [art] Derive CDI
3,119,713 UART: [art] Store in in slot 0x4
3,205,534 UART: [art] Derive Key Pair
3,205,894 UART: [art] Store priv key in slot 0x5
3,219,072 UART: [art] Derive Key Pair - Done
3,234,203 UART: [art] Signing Cert with AUTHO
3,234,683 UART: RITY.KEYID = 7
3,250,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,950 UART: [art] PUB.X = A9B35425EC70C5CBC1F986130733648AC8F3CC3454CC6216DC6A46FDB76184F3B105D118E369010DD4692E0F26C00B5E
3,257,706 UART: [art] PUB.Y = 38C381908A2E3BBE9D8C081C34000FBDFD3A6BB12289120310DF540343465F1026751D4F4EBA7AF09CBFB526B0FA40A7
3,264,630 UART: [art] SIG.R = 7133601FEE16483DADB96DD0B63F85F235547A8BAA59DD6DDA15E55B7D5C35A2632240678CE9AC03512D56913EE1534C
3,271,403 UART: [art] SIG.S = 686247C885D906753AB15FD0FBF1194E896CDD2941364F9DA589DB44D67D68572EB30134F3A49D332BBCB0DA86EB927C
3,294,608 UART: Caliptra RT
3,294,953 UART: [state] CFI Enabled
3,402,575 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,567 UART: [kat] SHA2-256
903,507 UART: [kat] SHA2-384
906,140 UART: [kat] SHA2-512-ACC
908,041 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,067 UART: [cold-reset] ++
1,172,477 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 ready_for_fw is high
1,176,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,405 >>> mbox cmd response: success
2,774,455 UART: [afmc] ++
2,774,623 UART: [afmc] CDI.KEYID = 6
2,774,985 UART: [afmc] SUBJECT.KEYID = 7
2,775,410 UART: [afmc] AUTHORITY.KEYID = 5
2,811,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,236 UART: [afmc] --
2,854,322 UART: [cold-reset] --
2,855,242 UART: [state] Locking Datavault
2,856,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,179 UART: [state] Locking ICCM
2,857,813 UART: [exit] Launching FMC @ 0x40000130
2,863,142 UART:
2,863,158 UART: Running Caliptra FMC ...
2,863,566 UART:
2,863,620 UART: [state] CFI Enabled
2,874,039 UART: [fht] FMC Alias Private Key: 7
2,981,690 UART: [art] Extend RT PCRs Done
2,982,118 UART: [art] Lock RT PCRs Done
2,984,012 UART: [art] Populate DV Done
2,992,121 UART: [fht] FMC Alias Private Key: 7
2,993,083 UART: [art] Derive CDI
2,993,363 UART: [art] Store in in slot 0x4
3,078,638 UART: [art] Derive Key Pair
3,078,998 UART: [art] Store priv key in slot 0x5
3,092,284 UART: [art] Derive Key Pair - Done
3,107,169 UART: [art] Signing Cert with AUTHO
3,107,649 UART: RITY.KEYID = 7
3,122,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,676 UART: [art] PUB.X = 1D04933F68917CD14DA3E3CA9002436A4EBA19E69C3E2E965FE44549136C36A885E29C219505AC8FDA47D17C75E4CA2C
3,130,443 UART: [art] PUB.Y = 1389F41B2E56E2D17B8591D5585879C50AEEC573589EA4D54A489CE8B01EF391F07F43C2C590F1446BFDC83831D91142
3,137,390 UART: [art] SIG.R = 01A435311D223B1C10DF9CC89DA841876CD86C00DB992A0181616675770735D7E239775E547C18B97D34B27D1F35C0DB
3,144,123 UART: [art] SIG.S = 9566F8827043C2819D79630828C30C9154DC96F14DE64F982E8C5B2BBFF1567B72BA43DBABB9745319AE6912F9D19A26
3,167,926 UART: Caliptra RT
3,168,179 UART: [state] CFI Enabled
3,275,482 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,845 ready_for_fw is high
1,060,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,958 >>> mbox cmd response: success
2,690,002 UART:
2,690,018 UART: Running Caliptra FMC ...
2,690,426 UART:
2,690,480 UART: [state] CFI Enabled
2,701,303 UART: [fht] FMC Alias Private Key: 7
2,808,998 UART: [art] Extend RT PCRs Done
2,809,426 UART: [art] Lock RT PCRs Done
2,810,878 UART: [art] Populate DV Done
2,818,985 UART: [fht] FMC Alias Private Key: 7
2,820,093 UART: [art] Derive CDI
2,820,373 UART: [art] Store in in slot 0x4
2,906,398 UART: [art] Derive Key Pair
2,906,758 UART: [art] Store priv key in slot 0x5
2,919,466 UART: [art] Derive Key Pair - Done
2,934,053 UART: [art] Signing Cert with AUTHO
2,934,533 UART: RITY.KEYID = 7
2,949,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,510 UART: [art] PUB.X = EE4E6B6EC8007946AB922F2F3C5116EFD60783BD4982AC417223ED5E64B041D4695E6B26D951384001AACC971C9D986E
2,957,256 UART: [art] PUB.Y = 327AFAB3D4A9A45767193EBE77B0C34AE9276210D2AA42278D658BCB7967D996AB782AA50811EF0D7F78C3466C6D0071
2,964,182 UART: [art] SIG.R = D8F4F0DF6BC046E2CF8ECC5C5F888506C44B42008083A846C9E504D2C9DBE8BABC97E6572C6420179E5FE06FDC1F095E
2,970,937 UART: [art] SIG.S = 815940296B2EDC918F7908D8FCC4A5042ED1A03AE137413FBD3DD321E808E32B419D203BF71E95D6BB70076C875EE6C9
2,994,758 UART: Caliptra RT
2,995,011 UART: [state] CFI Enabled
3,103,063 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
893,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,984 UART: [kat] ++
898,136 UART: [kat] sha1
902,402 UART: [kat] SHA2-256
904,342 UART: [kat] SHA2-384
906,883 UART: [kat] SHA2-512-ACC
908,784 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 ready_for_fw is high
1,176,680 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,253 UART: [idev] Erasing UDS.KEYID = 0
1,201,194 UART: [idev] Sha1 KeyId Algorithm
1,209,766 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,414 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,162 UART: [ldev] --
1,283,499 UART: [fwproc] Wait for Commands...
1,284,155 UART: [fwproc] Recv command 0x46574c44
1,284,883 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,064 >>> mbox cmd response: success
2,776,194 UART: [afmc] ++
2,776,362 UART: [afmc] CDI.KEYID = 6
2,776,724 UART: [afmc] SUBJECT.KEYID = 7
2,777,149 UART: [afmc] AUTHORITY.KEYID = 5
2,812,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,693 UART: [afmc] --
2,855,707 UART: [cold-reset] --
2,856,403 UART: [state] Locking Datavault
2,857,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,144 UART: [state] Locking ICCM
2,858,752 UART: [exit] Launching FMC @ 0x40000130
2,864,081 UART:
2,864,097 UART: Running Caliptra FMC ...
2,864,505 UART:
2,864,648 UART: [state] CFI Enabled
2,875,327 UART: [fht] FMC Alias Private Key: 7
2,983,938 UART: [art] Extend RT PCRs Done
2,984,366 UART: [art] Lock RT PCRs Done
2,985,934 UART: [art] Populate DV Done
2,994,385 UART: [fht] FMC Alias Private Key: 7
2,995,497 UART: [art] Derive CDI
2,995,777 UART: [art] Store in in slot 0x4
3,081,164 UART: [art] Derive Key Pair
3,081,524 UART: [art] Store priv key in slot 0x5
3,094,740 UART: [art] Derive Key Pair - Done
3,109,376 UART: [art] Signing Cert with AUTHO
3,109,856 UART: RITY.KEYID = 7
3,125,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,973 UART: [art] PUB.X = 17A31BFF0F7DA8F2BEEEB14B030650229B63F851F8C8B18FB7F84EE10B84E8E059D103D4F7D11DB443B4A8366A17E80D
3,132,739 UART: [art] PUB.Y = F36E0A95F2321A6751A6D964DBB411924D609C6FC43E99AE3ECDBD958C079B73D35B9092F7AC49F5291CF773735CE2DC
3,139,693 UART: [art] SIG.R = 1B53C8A61E19E68C8568642C3B18A3A4626B7E5C622379F98E65CF62BAAE440C4BA1CC47D2C5305F5DDE872DA02BF968
3,146,470 UART: [art] SIG.S = 90429B50CD83A292793EE0050F8B3CA0F79160103AD4FFE4E7008CD26E69D0E34513C429C76E38633DA5CE256BA9586A
3,170,893 UART: Caliptra RT
3,171,238 UART: [state] CFI Enabled
3,278,963 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 ready_for_fw is high
1,060,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,327 >>> mbox cmd response: success
2,689,953 UART:
2,689,969 UART: Running Caliptra FMC ...
2,690,377 UART:
2,690,520 UART: [state] CFI Enabled
2,700,735 UART: [fht] FMC Alias Private Key: 7
2,808,964 UART: [art] Extend RT PCRs Done
2,809,392 UART: [art] Lock RT PCRs Done
2,811,142 UART: [art] Populate DV Done
2,819,035 UART: [fht] FMC Alias Private Key: 7
2,820,099 UART: [art] Derive CDI
2,820,379 UART: [art] Store in in slot 0x4
2,905,584 UART: [art] Derive Key Pair
2,905,944 UART: [art] Store priv key in slot 0x5
2,918,784 UART: [art] Derive Key Pair - Done
2,933,461 UART: [art] Signing Cert with AUTHO
2,933,941 UART: RITY.KEYID = 7
2,948,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,726 UART: [art] PUB.X = 37C85A92627FF8DF880C2C4587C4649BDCE7BD588FF19C5397005720DD6311DEB0DA331C2BDBDA9E84D50EF69EBC1747
2,956,482 UART: [art] PUB.Y = DFB6BE3E82A49ADEB0577BA665499D8BAADB7DB49A44B77578592C9B40586E38D8A3BF8AB3E909994A7A8D4A86D97B87
2,963,445 UART: [art] SIG.R = CC6C7C08A5321395AC32E1BA80F45B8C246B394DFEC7C759E815C45C790F1F2D5D77C3A8BC6EB6C0C24F53FB4CE22179
2,970,225 UART: [art] SIG.S = AE392CE9E8F7144E780EC1F8B00FBFC9CB433C9654B7657AD0170572E001F5A1258E9B883D8CF26A4584D5548D6DBAE7
2,993,688 UART: Caliptra RT
2,994,033 UART: [state] CFI Enabled
3,102,233 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 ready_for_fw is high
1,174,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,235 UART: [idev] Sha1 KeyId Algorithm
1,207,111 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,622 UART: [fwproc] Wait for Commands...
1,281,423 UART: [fwproc] Recv command 0x46574c44
1,282,156 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,047 >>> mbox cmd response: success
2,773,288 UART: [afmc] ++
2,773,456 UART: [afmc] CDI.KEYID = 6
2,773,819 UART: [afmc] SUBJECT.KEYID = 7
2,774,245 UART: [afmc] AUTHORITY.KEYID = 5
2,809,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,565 UART: [afmc] --
2,852,499 UART: [cold-reset] --
2,853,457 UART: [state] Locking Datavault
2,854,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,186 UART: [state] Locking ICCM
2,855,644 UART: [exit] Launching FMC @ 0x40000130
2,860,973 UART:
2,860,989 UART: Running Caliptra FMC ...
2,861,397 UART:
2,861,451 UART: [state] CFI Enabled
2,871,886 UART: [fht] FMC Alias Private Key: 7
2,979,519 UART: [art] Extend RT PCRs Done
2,979,947 UART: [art] Lock RT PCRs Done
2,981,517 UART: [art] Populate DV Done
2,989,696 UART: [fht] FMC Alias Private Key: 7
2,990,780 UART: [art] Derive CDI
2,991,060 UART: [art] Store in in slot 0x4
3,076,655 UART: [art] Derive Key Pair
3,077,015 UART: [art] Store priv key in slot 0x5
3,090,435 UART: [art] Derive Key Pair - Done
3,104,964 UART: [art] Signing Cert with AUTHO
3,105,444 UART: RITY.KEYID = 7
3,120,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,319 UART: [art] PUB.X = 94DE5E0070B8FB6C8606CFCB2B044D0670679EE96FC50672A690DC185D3EF06A7FAD54E3F4B6D8CADF3B0960C7E27C74
3,128,068 UART: [art] PUB.Y = 7F0651DE59376F6286B62B68087EBA17858FD4EF54E97D742F77026BB99D2B31E52F349212061477C6523818D8302D44
3,134,994 UART: [art] SIG.R = 9BB19A0E0CF44A6E9082259D6BE65B57F8F7F5598AC4CA74469C37E5AFE0554DE76F6ED1862883459B8AB9B97B5B40B9
3,141,768 UART: [art] SIG.S = 9D80973E117FDFE9FF8DC90B65A236C0419074A3752E8CE62A9A1573A63A93990AE73FDC34C7959DEEB73D0965404E92
3,165,622 UART: Caliptra RT
3,165,875 UART: [state] CFI Enabled
3,273,603 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,464 ready_for_fw is high
1,056,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,267 >>> mbox cmd response: success
2,684,009 UART:
2,684,025 UART: Running Caliptra FMC ...
2,684,433 UART:
2,684,487 UART: [state] CFI Enabled
2,694,602 UART: [fht] FMC Alias Private Key: 7
2,802,307 UART: [art] Extend RT PCRs Done
2,802,735 UART: [art] Lock RT PCRs Done
2,804,131 UART: [art] Populate DV Done
2,812,424 UART: [fht] FMC Alias Private Key: 7
2,813,390 UART: [art] Derive CDI
2,813,670 UART: [art] Store in in slot 0x4
2,899,303 UART: [art] Derive Key Pair
2,899,663 UART: [art] Store priv key in slot 0x5
2,913,089 UART: [art] Derive Key Pair - Done
2,928,303 UART: [art] Signing Cert with AUTHO
2,928,783 UART: RITY.KEYID = 7
2,944,089 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,854 UART: [art] PUB.X = B7F6EECAB1098FA136467D525EE44E46CB70C8593D059271A7D2CDBF2CC802A50B3B4BB0E78B0A00D56E80FFD8CCB027
2,951,607 UART: [art] PUB.Y = A8D530A56624A26EC2F053FAA9946A63A104C623618697C1FF8A4A9D246FE9A4A2C6E63CC389B0C5143D4A1A6CEC1708
2,958,559 UART: [art] SIG.R = EC02FA7913D5204E5196691E30EF9F2C6E126B25FE8AEF781E027B5FF66D4E79E455E68EE51DEB4E2FA27387ADE7E898
2,965,337 UART: [art] SIG.S = 29FD33CCD0D04FE85EF8ECEDC0EF6033B23988E287F8541A06C1D1597B9A72355F74AE829ADF8F87499882B170ADE942
2,989,407 UART: Caliptra RT
2,989,660 UART: [state] CFI Enabled
3,097,487 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 ready_for_fw is high
1,174,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,523 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,474 >>> mbox cmd response: success
2,773,641 UART: [afmc] ++
2,773,809 UART: [afmc] CDI.KEYID = 6
2,774,172 UART: [afmc] SUBJECT.KEYID = 7
2,774,598 UART: [afmc] AUTHORITY.KEYID = 5
2,810,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,432 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,160 UART: [afmc] --
2,854,288 UART: [cold-reset] --
2,855,446 UART: [state] Locking Datavault
2,856,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,939 UART: [state] Locking ICCM
2,857,581 UART: [exit] Launching FMC @ 0x40000130
2,862,910 UART:
2,862,926 UART: Running Caliptra FMC ...
2,863,334 UART:
2,863,477 UART: [state] CFI Enabled
2,874,050 UART: [fht] FMC Alias Private Key: 7
2,981,927 UART: [art] Extend RT PCRs Done
2,982,355 UART: [art] Lock RT PCRs Done
2,983,869 UART: [art] Populate DV Done
2,992,298 UART: [fht] FMC Alias Private Key: 7
2,993,454 UART: [art] Derive CDI
2,993,734 UART: [art] Store in in slot 0x4
3,079,017 UART: [art] Derive Key Pair
3,079,377 UART: [art] Store priv key in slot 0x5
3,093,117 UART: [art] Derive Key Pair - Done
3,107,962 UART: [art] Signing Cert with AUTHO
3,108,442 UART: RITY.KEYID = 7
3,123,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,501 UART: [art] PUB.X = 78C2177644F125B0A0A8D0DBABA06236C0C7744B3D6C1A5FF305FE01C1A834D91BB71AC213D6F60948F93624577EE1CD
3,131,270 UART: [art] PUB.Y = AC32D3C4076CA74EE233C68A4808C4C144E0D003432E5F0882585B242BD7B60865FFB61DE203983F528015AB237F69D7
3,138,200 UART: [art] SIG.R = 116712DF082DBC9B0152BCF90CAE00A0C19AA4EF834EDEAD5A8D3F8C2A8218128F650E850DE0A55458DEF5846DFFE06B
3,144,953 UART: [art] SIG.S = AA082A0C2B6811EB0508A5A8429FDABF418F01F6ACC6B4A59331822C91730107A915DCA2F3261F82E38382E93A8B6F34
3,169,153 UART: Caliptra RT
3,169,498 UART: [state] CFI Enabled
3,277,353 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,111 ready_for_fw is high
1,057,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,828 >>> mbox cmd response: success
2,684,968 UART:
2,684,984 UART: Running Caliptra FMC ...
2,685,392 UART:
2,685,535 UART: [state] CFI Enabled
2,695,794 UART: [fht] FMC Alias Private Key: 7
2,803,721 UART: [art] Extend RT PCRs Done
2,804,149 UART: [art] Lock RT PCRs Done
2,805,469 UART: [art] Populate DV Done
2,813,638 UART: [fht] FMC Alias Private Key: 7
2,814,656 UART: [art] Derive CDI
2,814,936 UART: [art] Store in in slot 0x4
2,900,635 UART: [art] Derive Key Pair
2,900,995 UART: [art] Store priv key in slot 0x5
2,914,109 UART: [art] Derive Key Pair - Done
2,929,053 UART: [art] Signing Cert with AUTHO
2,929,533 UART: RITY.KEYID = 7
2,944,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,458 UART: [art] PUB.X = 4CE7CF4F3035AE20321685336DA909427A4E4A9FE487B48ABB65DAF72DB4FA1FE63D91381679A1C9CE37DD8C5171ED4F
2,952,239 UART: [art] PUB.Y = 2541FCBC393E85E2443310B5D010768A24F68490831FE052E048DCC827BAC98BEF4DA1A7BDB571B826174532E5227737
2,959,187 UART: [art] SIG.R = D411CA5C196BC7C916D1A02E7E7BB283632A1DD9B66E0A957791C02033D98DBF5D7BF1FBDBD94EF06A9713ED498FE823
2,965,970 UART: [art] SIG.S = B16944833A41E20604B406FEDCEBE4AC0F4546D7DD6A5321E6C381B4568F12783C8E79E99B5886622EF81942C7D9CEEC
2,990,251 UART: Caliptra RT
2,990,596 UART: [state] CFI Enabled
3,098,388 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,071 UART: [kat] SHA2-256
892,009 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
902,268 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,475,859 UART: [cold-reset] ++
1,476,287 UART: [fht] Storing FHT @ 0x50003400
1,479,046 UART: [idev] ++
1,479,214 UART: [idev] CDI.KEYID = 6
1,479,574 UART: [idev] SUBJECT.KEYID = 7
1,479,998 UART: [idev] UDS.KEYID = 0
1,487,688 UART: [idev] Erasing UDS.KEYID = 0
1,504,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,598 UART: [idev] --
1,513,543 UART: [ldev] ++
1,513,711 UART: [ldev] CDI.KEYID = 6
1,514,074 UART: [ldev] SUBJECT.KEYID = 5
1,514,500 UART: [ldev] AUTHORITY.KEYID = 7
1,514,963 UART: [ldev] FE.KEYID = 1
1,520,069 UART: [ldev] Erasing FE.KEYID = 1
1,545,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,112 UART: [ldev] --
1,585,449 UART: [fwproc] Waiting for Commands...
1,586,198 UART: [fwproc] Received command 0x4d454153
1,590,262 >>> mbox cmd response data (12 bytes)
1,590,263 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,590,559 UART: [fwproc] Received command 0x46574c44
1,591,350 UART: [fwproc] Received Image of size 78704 bytes
2,481,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,509,236 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,538,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,620,933 >>> mbox cmd response: success
2,622,051 UART: [afmc] ++
2,622,219 UART: [afmc] CDI.KEYID = 6
2,622,581 UART: [afmc] SUBJECT.KEYID = 7
2,623,006 UART: [afmc] AUTHORITY.KEYID = 5
2,658,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,674,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,675,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,681,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,687,084 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,774 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,700,667 UART: [afmc] --
2,701,731 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,701,753 UART: [cold-reset] --
2,702,715 UART: [state] Locking Datavault
2,703,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,704,356 UART: [state] Locking ICCM
2,704,838 UART: [exit] Launching FMC @ 0x40000130
2,710,167 UART:
2,710,183 UART: Running Caliptra FMC ...
2,710,591 UART:
2,710,645 UART: [state] CFI Enabled
2,720,956 UART: [fht] FMC Alias Private Key: 7
2,829,037 UART: [art] Extend RT PCRs Done
2,829,465 UART: [art] Lock RT PCRs Done
2,831,299 UART: [art] Populate DV Done
2,839,496 UART: [fht] FMC Alias Private Key: 7
2,840,672 UART: [art] Derive CDI
2,840,952 UART: [art] Store in in slot 0x4
2,926,319 UART: [art] Derive Key Pair
2,926,679 UART: [art] Store priv key in slot 0x5
2,939,609 UART: [art] Derive Key Pair - Done
2,954,375 UART: [art] Signing Cert with AUTHO
2,954,855 UART: RITY.KEYID = 7
2,969,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,360 UART: [art] PUB.X = 1A437EC2B5D7582CDDCD2DCE65CAA49922C293CA5FA9FA2242B9329693287434AD68B7BB86376AC29E6D9C3FE6E6E62A
2,977,146 UART: [art] PUB.Y = 1276AB1E4674E48CDFD55EBFAD1BDA6130873B3CA0139FF742A0A6AF50E1901F15E14F60CDD114FAF045532DFA60B5FD
2,984,116 UART: [art] SIG.R = BBDEB696C1D872B05360AFD02A6D1E13B276DFA88BF792D9E8427D36DA54E70E5AA8B729220F210C2BC3BF6BEB425176
2,990,893 UART: [art] SIG.S = BDC1529DD0D4AA4DE8B9828A585B68E8889945C5A3817DD596C224CBC05D1018B1012423D99363ED00AEFB1E30D2BF69
3,014,317 UART: mbox::rt_entry...
3,014,689 UART: ____ _ _ _ ____ _____
3,015,473 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,273 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,809 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,577 UART: |_|
3,018,889 UART:
3,137,903 UART: [rt] Runtime listening for mailbox commands...
3,139,084 >>> mbox cmd response data (48 bytes)
3,139,085 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,141,868 >>> mbox cmd response data (48 bytes)
3,141,869 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,006 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,539 >>> mbox cmd response data (12 bytes)
1,444,540 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,470,473 >>> mbox cmd response: success
2,526,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,531,911 UART:
2,531,927 UART: Running Caliptra FMC ...
2,532,335 UART:
2,532,389 UART: [state] CFI Enabled
2,543,032 UART: [fht] FMC Alias Private Key: 7
2,650,703 UART: [art] Extend RT PCRs Done
2,651,131 UART: [art] Lock RT PCRs Done
2,652,881 UART: [art] Populate DV Done
2,660,890 UART: [fht] FMC Alias Private Key: 7
2,661,932 UART: [art] Derive CDI
2,662,212 UART: [art] Store in in slot 0x4
2,747,899 UART: [art] Derive Key Pair
2,748,259 UART: [art] Store priv key in slot 0x5
2,760,945 UART: [art] Derive Key Pair - Done
2,775,786 UART: [art] Signing Cert with AUTHO
2,776,266 UART: RITY.KEYID = 7
2,791,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,167 UART: [art] PUB.X = 1D1577BE18ECB829FBB64CB650DECE53209FF9FB26B9909E12F35A50311764B243731039F97CF2298FDA42A9B205518E
2,798,938 UART: [art] PUB.Y = 8685A7E4392AADBFBBDD576E66FB48EB7EBAB52BD8D656CED5470B5F0EA5F626AE833720D38F8099AC13BAABF7D4D09D
2,805,910 UART: [art] SIG.R = 4A710C1CE75C56BF8E8FFD7DD349DA1674B4CF24C126EF680BB7D88354CDD9DC51D08D442EB74D9FFA54AAB6341CE4A4
2,812,698 UART: [art] SIG.S = 3C45BF53171A350566D6CC98109F384C154285652961ED6835BBD70EC75EFB5080D0BFB47F347BF5D1D233A989F9352A
2,836,283 UART: mbox::rt_entry...
2,836,655 UART: ____ _ _ _ ____ _____
2,837,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,007 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,775 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,543 UART: |_|
2,840,855 UART:
2,959,915 UART: [rt] Runtime listening for mailbox commands...
2,961,096 >>> mbox cmd response data (48 bytes)
2,961,097 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,963,880 >>> mbox cmd response data (48 bytes)
2,963,881 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,979,018 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,200 UART: [kat] SHA2-256
882,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,246 UART: [kat] ++
886,398 UART: [kat] sha1
890,780 UART: [kat] SHA2-256
892,718 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
903,177 UART: [kat] HMAC-384Kdf
907,781 UART: [kat] LMS
1,475,977 UART: [kat] --
1,476,836 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,479,765 UART: [idev] ++
1,479,933 UART: [idev] CDI.KEYID = 6
1,480,293 UART: [idev] SUBJECT.KEYID = 7
1,480,717 UART: [idev] UDS.KEYID = 0
1,488,465 UART: [idev] Erasing UDS.KEYID = 0
1,505,521 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,514,868 UART: [ldev] ++
1,515,036 UART: [ldev] CDI.KEYID = 6
1,515,399 UART: [ldev] SUBJECT.KEYID = 5
1,515,825 UART: [ldev] AUTHORITY.KEYID = 7
1,516,288 UART: [ldev] FE.KEYID = 1
1,521,744 UART: [ldev] Erasing FE.KEYID = 1
1,547,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,561 UART: [ldev] --
1,587,050 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x4d454153
1,591,915 >>> mbox cmd response data (12 bytes)
1,591,916 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,592,142 UART: [fwproc] Received command 0x46574c44
1,592,933 UART: [fwproc] Received Image of size 78704 bytes
2,482,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,509,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,539,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,621,572 >>> mbox cmd response: success
2,622,586 UART: [afmc] ++
2,622,754 UART: [afmc] CDI.KEYID = 6
2,623,116 UART: [afmc] SUBJECT.KEYID = 7
2,623,541 UART: [afmc] AUTHORITY.KEYID = 5
2,658,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,674,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,675,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,681,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,687,261 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,951 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,700,616 UART: [afmc] --
2,701,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,701,748 UART: [cold-reset] --
2,702,588 UART: [state] Locking Datavault
2,703,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,704,271 UART: [state] Locking ICCM
2,704,803 UART: [exit] Launching FMC @ 0x40000130
2,710,132 UART:
2,710,148 UART: Running Caliptra FMC ...
2,710,556 UART:
2,710,699 UART: [state] CFI Enabled
2,721,242 UART: [fht] FMC Alias Private Key: 7
2,828,497 UART: [art] Extend RT PCRs Done
2,828,925 UART: [art] Lock RT PCRs Done
2,830,425 UART: [art] Populate DV Done
2,838,872 UART: [fht] FMC Alias Private Key: 7
2,839,864 UART: [art] Derive CDI
2,840,144 UART: [art] Store in in slot 0x4
2,925,845 UART: [art] Derive Key Pair
2,926,205 UART: [art] Store priv key in slot 0x5
2,938,759 UART: [art] Derive Key Pair - Done
2,953,426 UART: [art] Signing Cert with AUTHO
2,953,906 UART: RITY.KEYID = 7
2,969,232 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,997 UART: [art] PUB.X = F09D0EC4ABC6130857DE8A62EB9539D4364F0ECABC590608A7C4A0D37AD928B969614AB83F1784C296B98DA4955C54D2
2,976,760 UART: [art] PUB.Y = EDA71DD0CFD8699B7FC9037B2DFFC0B12B99A1A826E61B75D1625C08B737861E8A5353AB19E2369D0657E674DDD63A49
2,983,711 UART: [art] SIG.R = 7A81FE7F3F09B6B7292392F78075C954CC6D287A9B7745A4447A3FEF2410A71C793C8106A9EF9687F6EE124C81048D12
2,990,470 UART: [art] SIG.S = 7969F36BC54BC5ADE556BFE1C8AD007ECFBF1FB674D0DFAD5D2D7FF72190878533CE2D8D94EC6BEB6BD5B6F99F2E4855
3,014,119 UART: mbox::rt_entry...
3,014,491 UART: ____ _ _ _ ____ _____
3,015,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,379 UART: |_|
3,018,691 UART:
3,136,947 UART: [rt] Runtime listening for mailbox commands...
3,138,128 >>> mbox cmd response data (48 bytes)
3,138,129 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,140,912 >>> mbox cmd response data (48 bytes)
3,140,913 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,156,050 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,564 >>> mbox cmd response data (12 bytes)
1,445,565 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,472,522 >>> mbox cmd response: success
2,527,971 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,534,122 UART:
2,534,138 UART: Running Caliptra FMC ...
2,534,546 UART:
2,534,689 UART: [state] CFI Enabled
2,545,206 UART: [fht] FMC Alias Private Key: 7
2,652,815 UART: [art] Extend RT PCRs Done
2,653,243 UART: [art] Lock RT PCRs Done
2,654,793 UART: [art] Populate DV Done
2,662,892 UART: [fht] FMC Alias Private Key: 7
2,663,832 UART: [art] Derive CDI
2,664,112 UART: [art] Store in in slot 0x4
2,749,465 UART: [art] Derive Key Pair
2,749,825 UART: [art] Store priv key in slot 0x5
2,763,161 UART: [art] Derive Key Pair - Done
2,778,040 UART: [art] Signing Cert with AUTHO
2,778,520 UART: RITY.KEYID = 7
2,793,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,794,573 UART: [art] PUB.X = B8BF7FBB26F0AABF9164B48835EB494A3A39F3C1B3CB6351C88D3392FA21D4146511C81252158EB1BD66AABB3BCB0490
2,801,354 UART: [art] PUB.Y = EF975FA25C1EE0F2C5F8D463C6589B71F0425FD0BB15DD66EC55D4A79A84BE9D5C2327000D9B229353E844D64E1E634A
2,808,289 UART: [art] SIG.R = 76DF53F1E6A01459CA064FD4BE46F5C28A51D3159C4392ABF520E172B9DCFFFC43E3FB64BA453845C255EBCC47E07921
2,815,070 UART: [art] SIG.S = 222A98B5A8F2733E0E1A6960A8EB34BF7881391B4B1CF7AFC9ED8A4EEC827A24BC993140515165C100D17BA15BBB626D
2,839,326 UART: mbox::rt_entry...
2,839,698 UART: ____ _ _ _ ____ _____
2,840,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,841,282 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,842,050 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,842,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,843,586 UART: |_|
2,843,898 UART:
2,962,904 UART: [rt] Runtime listening for mailbox commands...
2,964,085 >>> mbox cmd response data (48 bytes)
2,964,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,966,869 >>> mbox cmd response data (48 bytes)
2,966,870 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,982,007 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,802 UART: [state] LifecycleState = Unprovisioned
86,457 UART: [state] DebugLocked = No
87,089 UART: [state] WD Timer not started. Device not locked for debugging
88,276 UART: [kat] SHA2-256
893,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,051 UART: [kat] ++
898,203 UART: [kat] sha1
902,423 UART: [kat] SHA2-256
904,363 UART: [kat] SHA2-384
907,076 UART: [kat] SHA2-512-ACC
908,977 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,447 UART: [fht] FHT @ 0x50003400
1,175,116 UART: [idev] ++
1,175,284 UART: [idev] CDI.KEYID = 6
1,175,644 UART: [idev] SUBJECT.KEYID = 7
1,176,068 UART: [idev] UDS.KEYID = 0
1,184,258 UART: [idev] Erasing UDS.KEYID = 0
1,201,059 UART: [idev] Sha1 KeyId Algorithm
1,209,647 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,196 UART: [ldev] SUBJECT.KEYID = 5
1,211,622 UART: [ldev] AUTHORITY.KEYID = 7
1,212,085 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x4d454153
1,286,891 >>> mbox cmd response data (12 bytes)
1,286,892 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,287,011 UART: [fwproc] Recv command 0x46574c44
1,287,739 UART: [fwproc] Recv'd Img size: 78704 bytes
2,177,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,204,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,234,051 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,316,364 >>> mbox cmd response: success
2,317,550 UART: [afmc] ++
2,317,718 UART: [afmc] CDI.KEYID = 6
2,318,080 UART: [afmc] SUBJECT.KEYID = 7
2,318,505 UART: [afmc] AUTHORITY.KEYID = 5
2,353,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,521 UART: [afmc] --
2,396,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,396,631 UART: [cold-reset] --
2,397,373 UART: [state] Locking Datavault
2,398,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,786 UART: [state] Locking ICCM
2,399,362 UART: [exit] Launching FMC @ 0x40000130
2,404,691 UART:
2,404,707 UART: Running Caliptra FMC ...
2,405,115 UART:
2,405,169 UART: [state] CFI Enabled
2,416,020 UART: [fht] FMC Alias Private Key: 7
2,524,201 UART: [art] Extend RT PCRs Done
2,524,629 UART: [art] Lock RT PCRs Done
2,526,177 UART: [art] Populate DV Done
2,534,512 UART: [fht] FMC Alias Private Key: 7
2,535,470 UART: [art] Derive CDI
2,535,750 UART: [art] Store in in slot 0x4
2,621,695 UART: [art] Derive Key Pair
2,622,055 UART: [art] Store priv key in slot 0x5
2,635,005 UART: [art] Derive Key Pair - Done
2,649,617 UART: [art] Signing Cert with AUTHO
2,650,097 UART: RITY.KEYID = 7
2,665,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,954 UART: [art] PUB.X = B8C3E41416ECBC1B3BC60A3998F9AA30B0ACA23788D7B54E04D4CF3DE631563EBEF6A5E34985BE4C93F05BF5ABB534AD
2,672,742 UART: [art] PUB.Y = B9A00852B76FE05B15B78B4B4C4023A6DABD3E9BE7DD8BBFD88223DFFF8A6AB1484C74C7628C8D5166A09499EB33F1E8
2,679,707 UART: [art] SIG.R = 1B9BEB50C783F6C82DBA7376B15F5F927B5CF11DCE9FBFD43073FA0C422B33720CEDB6F24B6F0F201EFC232EBD61271C
2,686,490 UART: [art] SIG.S = 6D9372638DD8ACC061D39F983A53CDCF8CCC08642D61A6C381952081DD71E947A601A22082EEEDB8D4369E3E7C22748A
2,710,531 UART: mbox::rt_entry...
2,710,903 UART: ____ _ _ _ ____ _____
2,711,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,791 UART: |_|
2,715,103 UART:
2,835,772 UART: [rt] Runtime listening for mailbox commands...
2,836,953 >>> mbox cmd response data (48 bytes)
2,836,954 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,839,737 >>> mbox cmd response data (48 bytes)
2,839,738 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,854,875 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,461 >>> mbox cmd response data (12 bytes)
1,142,462 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,465 >>> mbox cmd response: success
2,222,804 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,229,119 UART:
2,229,135 UART: Running Caliptra FMC ...
2,229,543 UART:
2,229,597 UART: [state] CFI Enabled
2,240,118 UART: [fht] FMC Alias Private Key: 7
2,347,793 UART: [art] Extend RT PCRs Done
2,348,221 UART: [art] Lock RT PCRs Done
2,349,641 UART: [art] Populate DV Done
2,357,770 UART: [fht] FMC Alias Private Key: 7
2,358,808 UART: [art] Derive CDI
2,359,088 UART: [art] Store in in slot 0x4
2,444,293 UART: [art] Derive Key Pair
2,444,653 UART: [art] Store priv key in slot 0x5
2,457,243 UART: [art] Derive Key Pair - Done
2,471,694 UART: [art] Signing Cert with AUTHO
2,472,174 UART: RITY.KEYID = 7
2,487,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,857 UART: [art] PUB.X = 487DD4155901ED0856D8C3B3DE68645695FAA86DB8289CF00D5A1718AF899022670EF8D0E12CBA4430E9340F48F657B8
2,494,612 UART: [art] PUB.Y = E690AEB23CF7A41706C32FA4834C1C5B8901B1983F7207143A23D4D0F607EBF946243B9169CE134550386A715B0CD717
2,501,543 UART: [art] SIG.R = 68A5C87B97431FA27AF8B2F8123AB764CBFC8AB819E430617C36D99C93EFF1BDD9B238DD8496CBE27232DB7DBC81B06A
2,508,331 UART: [art] SIG.S = D939CB9F3E82C9DA8C4A6C22DAFAD054EF81D4EC32B06A401D0F8FB57DA0EECFC578065CDC2483F5D139B34BDCFBFA68
2,532,296 UART: mbox::rt_entry...
2,532,668 UART: ____ _ _ _ ____ _____
2,533,452 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,252 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,788 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,556 UART: |_|
2,536,868 UART:
2,655,763 UART: [rt] Runtime listening for mailbox commands...
2,656,944 >>> mbox cmd response data (48 bytes)
2,656,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,659,728 >>> mbox cmd response data (48 bytes)
2,659,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,674,866 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,872 UART: [kat] SHA2-256
903,812 UART: [kat] SHA2-384
906,635 UART: [kat] SHA2-512-ACC
908,536 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,137 UART: [kat] LMS
1,171,465 UART: [kat] --
1,172,296 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,165 UART: [idev] ++
1,175,333 UART: [idev] CDI.KEYID = 6
1,175,693 UART: [idev] SUBJECT.KEYID = 7
1,176,117 UART: [idev] UDS.KEYID = 0
1,184,171 UART: [idev] Erasing UDS.KEYID = 0
1,201,056 UART: [idev] Sha1 KeyId Algorithm
1,209,296 UART: [idev] --
1,210,160 UART: [ldev] ++
1,210,328 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,117 UART: [ldev] AUTHORITY.KEYID = 7
1,211,580 UART: [ldev] FE.KEYID = 1
1,216,848 UART: [ldev] Erasing FE.KEYID = 1
1,243,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,002 UART: [ldev] --
1,283,267 UART: [fwproc] Wait for Commands...
1,283,907 UART: [fwproc] Recv command 0x4d454153
1,287,916 >>> mbox cmd response data (12 bytes)
1,287,917 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,288,008 UART: [fwproc] Recv command 0x46574c44
1,288,736 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,816 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,236,120 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,318,389 >>> mbox cmd response: success
2,319,579 UART: [afmc] ++
2,319,747 UART: [afmc] CDI.KEYID = 6
2,320,109 UART: [afmc] SUBJECT.KEYID = 7
2,320,534 UART: [afmc] AUTHORITY.KEYID = 5
2,356,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,372,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,373,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,379,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,385,013 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,390,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,398,674 UART: [afmc] --
2,399,782 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,399,804 UART: [cold-reset] --
2,400,654 UART: [state] Locking Datavault
2,402,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,729 UART: [state] Locking ICCM
2,403,187 UART: [exit] Launching FMC @ 0x40000130
2,408,516 UART:
2,408,532 UART: Running Caliptra FMC ...
2,408,940 UART:
2,409,083 UART: [state] CFI Enabled
2,419,784 UART: [fht] FMC Alias Private Key: 7
2,528,453 UART: [art] Extend RT PCRs Done
2,528,881 UART: [art] Lock RT PCRs Done
2,530,165 UART: [art] Populate DV Done
2,538,300 UART: [fht] FMC Alias Private Key: 7
2,539,316 UART: [art] Derive CDI
2,539,596 UART: [art] Store in in slot 0x4
2,625,485 UART: [art] Derive Key Pair
2,625,845 UART: [art] Store priv key in slot 0x5
2,638,619 UART: [art] Derive Key Pair - Done
2,653,772 UART: [art] Signing Cert with AUTHO
2,654,252 UART: RITY.KEYID = 7
2,669,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,670,267 UART: [art] PUB.X = 62EFB00372F83B236A1F9006727861D61F7ED390196DCA2253AE339F2CBFD09978CCCC193A2A39D57C4DC4E7E7563C98
2,677,037 UART: [art] PUB.Y = D886FB6A5ECA531664A198E013DF8266890A0A4227D62DE35621ACE1AE266E46E0B784CB3CFF6E342FB0B9390C92F5E5
2,683,988 UART: [art] SIG.R = 6512CBF5B8A8BF137F62E70628D80046B6FD8C4A811A6A2E4A9BBB9CAD8AE43A3F61923122DFA79F8F884727FCEBBF82
2,690,751 UART: [art] SIG.S = A0BC748D06250B8E7950EE58C8A16EC4A8B6724B8944DC7FB005C35BBDA63017D71A11C2A6EEE605D9C09F05BC1E710E
2,714,214 UART: mbox::rt_entry...
2,714,586 UART: ____ _ _ _ ____ _____
2,715,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,716,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,716,938 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,717,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,718,474 UART: |_|
2,718,786 UART:
2,837,289 UART: [rt] Runtime listening for mailbox commands...
2,838,470 >>> mbox cmd response data (48 bytes)
2,838,471 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,841,254 >>> mbox cmd response data (48 bytes)
2,841,255 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,856,392 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,018 >>> mbox cmd response data (12 bytes)
1,144,019 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,168,816 >>> mbox cmd response: success
2,224,857 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,230,906 UART:
2,230,922 UART: Running Caliptra FMC ...
2,231,330 UART:
2,231,473 UART: [state] CFI Enabled
2,242,386 UART: [fht] FMC Alias Private Key: 7
2,350,423 UART: [art] Extend RT PCRs Done
2,350,851 UART: [art] Lock RT PCRs Done
2,352,327 UART: [art] Populate DV Done
2,360,474 UART: [fht] FMC Alias Private Key: 7
2,361,538 UART: [art] Derive CDI
2,361,818 UART: [art] Store in in slot 0x4
2,447,575 UART: [art] Derive Key Pair
2,447,935 UART: [art] Store priv key in slot 0x5
2,461,289 UART: [art] Derive Key Pair - Done
2,476,370 UART: [art] Signing Cert with AUTHO
2,476,850 UART: RITY.KEYID = 7
2,492,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,492,837 UART: [art] PUB.X = 3CFAEA0F999F02A48AF47DA5AA73DD879A4CBC8CF0FAE64E206B9C9C5E538AF5B1F322701132689ABC2FA2CAA031107D
2,499,625 UART: [art] PUB.Y = DA396BD3BC2C2DF52C547CC34263EDB307DDCC714D55B3EE49903BC99DCC8BAA623A68C6C02BACAAC8A3D49E4128D19B
2,506,600 UART: [art] SIG.R = 34A7972AFE6D84BE9A7D5C4EE6F0A8408F0B1C2D909FA7218443B7B02B06452A11296D405A146382B989D382D1897020
2,513,360 UART: [art] SIG.S = C1F10D190929EB24DEC4100D8C3DE2E416C1004D8E5BFD1DCF52A4A9885373B8D2F6590C5314A2800D24313A143CBBA6
2,536,854 UART: mbox::rt_entry...
2,537,226 UART: ____ _ _ _ ____ _____
2,538,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,538,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,539,578 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,540,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,541,114 UART: |_|
2,541,426 UART:
2,660,085 UART: [rt] Runtime listening for mailbox commands...
2,661,266 >>> mbox cmd response data (48 bytes)
2,661,267 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,664,050 >>> mbox cmd response data (48 bytes)
2,664,051 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,679,188 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,911 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,198,929 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,432 UART: [fwproc] Wait for Commands...
1,281,075 UART: [fwproc] Recv command 0x4d454153
1,285,102 >>> mbox cmd response data (12 bytes)
1,285,103 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,285,282 UART: [fwproc] Recv command 0x46574c44
1,286,015 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,558 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,916 >>> mbox cmd response: success
2,315,165 UART: [afmc] ++
2,315,333 UART: [afmc] CDI.KEYID = 6
2,315,696 UART: [afmc] SUBJECT.KEYID = 7
2,316,122 UART: [afmc] AUTHORITY.KEYID = 5
2,351,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,218 UART: [afmc] --
2,395,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,108 UART: [cold-reset] --
2,396,058 UART: [state] Locking Datavault
2,397,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,853 UART: [state] Locking ICCM
2,398,331 UART: [exit] Launching FMC @ 0x40000130
2,403,660 UART:
2,403,676 UART: Running Caliptra FMC ...
2,404,084 UART:
2,404,138 UART: [state] CFI Enabled
2,414,371 UART: [fht] FMC Alias Private Key: 7
2,522,864 UART: [art] Extend RT PCRs Done
2,523,292 UART: [art] Lock RT PCRs Done
2,525,332 UART: [art] Populate DV Done
2,533,577 UART: [fht] FMC Alias Private Key: 7
2,534,653 UART: [art] Derive CDI
2,534,933 UART: [art] Store in in slot 0x4
2,620,746 UART: [art] Derive Key Pair
2,621,106 UART: [art] Store priv key in slot 0x5
2,633,772 UART: [art] Derive Key Pair - Done
2,648,552 UART: [art] Signing Cert with AUTHO
2,649,032 UART: RITY.KEYID = 7
2,664,278 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,043 UART: [art] PUB.X = 2FAF6EF480BD340A0BBB95FFFCDD47D1499036B354BD3AC56FCCAAC895121AFF469F9CC6AFC97D415D511D73788B7EBA
2,671,835 UART: [art] PUB.Y = FAEEFDEA6CB4DCDC622A650466E4DB3177281FF8942650AA7C96C0C5FD1CADA6E6843DD36BDDA197B63D8CCD19838F41
2,678,808 UART: [art] SIG.R = 70805F03FC26643EC43D6E1DF316D3B67201DB873CAAD233F9D473331EC2CA8B0B85CDA6E2AD8463413B0DF7B14DA8A4
2,685,580 UART: [art] SIG.S = 6D85037764D1D1C3F0E3D53E3E57BFE11E6897323BB7287814397E8858BE33FA1AC34F24B2DFC210EFDA8CF98DB6347C
2,708,940 UART: mbox::rt_entry...
2,709,312 UART: ____ _ _ _ ____ _____
2,710,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,664 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,200 UART: |_|
2,713,512 UART:
2,831,615 UART: [rt] Runtime listening for mailbox commands...
2,832,796 >>> mbox cmd response data (48 bytes)
2,832,797 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,580 >>> mbox cmd response data (48 bytes)
2,835,581 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,718 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,178 >>> mbox cmd response data (12 bytes)
1,139,179 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,347 >>> mbox cmd response: success
2,219,490 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,287 UART:
2,225,303 UART: Running Caliptra FMC ...
2,225,711 UART:
2,225,765 UART: [state] CFI Enabled
2,236,472 UART: [fht] FMC Alias Private Key: 7
2,344,271 UART: [art] Extend RT PCRs Done
2,344,699 UART: [art] Lock RT PCRs Done
2,346,159 UART: [art] Populate DV Done
2,354,314 UART: [fht] FMC Alias Private Key: 7
2,355,350 UART: [art] Derive CDI
2,355,630 UART: [art] Store in in slot 0x4
2,441,401 UART: [art] Derive Key Pair
2,441,761 UART: [art] Store priv key in slot 0x5
2,454,509 UART: [art] Derive Key Pair - Done
2,469,424 UART: [art] Signing Cert with AUTHO
2,469,904 UART: RITY.KEYID = 7
2,485,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,801 UART: [art] PUB.X = 338E4B90C3FF754F9F7A8F941217F4AE3C58289A52D78097557A726BD256ED60F505BEDC2EC4D9A1E99D5C706BE7AA83
2,492,578 UART: [art] PUB.Y = B982DA5D571135CF3443B165A57BA01A66856273C9CFA0D0EBCA67249FE16B4ACF7BBDAB22D5F0CC2DD2C585BDE8FEC6
2,499,554 UART: [art] SIG.R = E5F4FD2C5095F1F16FC0984A3747E6A5EC9C2B77C75B964C88D8182B4A377ADAA1CB222D24206E116945A15B5AED2883
2,506,332 UART: [art] SIG.S = 3E3CCF425614DFE1FA5D87F694F5803138F9AC536BE41D305D4BE6A1D3F0FC32DA0E013DB3AEA8D4AB7643D2CB8CD0BF
2,530,139 UART: mbox::rt_entry...
2,530,511 UART: ____ _ _ _ ____ _____
2,531,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,095 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,863 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,399 UART: |_|
2,534,711 UART:
2,653,202 UART: [rt] Runtime listening for mailbox commands...
2,654,383 >>> mbox cmd response data (48 bytes)
2,654,384 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,657,167 >>> mbox cmd response data (48 bytes)
2,657,168 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,672,305 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,787 UART: [kat] HMAC-384Kdf
921,487 UART: [kat] LMS
1,169,799 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,936 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,336 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,401 UART: [ldev] ++
1,209,569 UART: [ldev] CDI.KEYID = 6
1,209,933 UART: [ldev] SUBJECT.KEYID = 5
1,210,360 UART: [ldev] AUTHORITY.KEYID = 7
1,210,823 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,217 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x4d454153
1,285,909 >>> mbox cmd response data (12 bytes)
1,285,910 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,286,201 UART: [fwproc] Recv command 0x46574c44
1,286,934 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,539 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,969 >>> mbox cmd response: success
2,316,008 UART: [afmc] ++
2,316,176 UART: [afmc] CDI.KEYID = 6
2,316,539 UART: [afmc] SUBJECT.KEYID = 7
2,316,965 UART: [afmc] AUTHORITY.KEYID = 5
2,352,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,755 UART: [afmc] --
2,395,803 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,825 UART: [cold-reset] --
2,396,981 UART: [state] Locking Datavault
2,397,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,592 UART: [state] Locking ICCM
2,399,030 UART: [exit] Launching FMC @ 0x40000130
2,404,359 UART:
2,404,375 UART: Running Caliptra FMC ...
2,404,783 UART:
2,404,926 UART: [state] CFI Enabled
2,415,477 UART: [fht] FMC Alias Private Key: 7
2,523,098 UART: [art] Extend RT PCRs Done
2,523,526 UART: [art] Lock RT PCRs Done
2,524,898 UART: [art] Populate DV Done
2,532,733 UART: [fht] FMC Alias Private Key: 7
2,533,777 UART: [art] Derive CDI
2,534,057 UART: [art] Store in in slot 0x4
2,619,812 UART: [art] Derive Key Pair
2,620,172 UART: [art] Store priv key in slot 0x5
2,633,830 UART: [art] Derive Key Pair - Done
2,648,601 UART: [art] Signing Cert with AUTHO
2,649,081 UART: RITY.KEYID = 7
2,664,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,102 UART: [art] PUB.X = D565605108587E476B26E879A2386F47CC9A6776EAD7C9A56571EA66F1FB1ECDB4CBEE10348C0C5CB80E21F40F631048
2,671,866 UART: [art] PUB.Y = 378386A552667F254404966D5050406B361BE5811861B4F166E2691F267AE40DBD9712C35518BF6DF42129D47EDC6669
2,678,796 UART: [art] SIG.R = 9C06FF52157030FCFEF62A9DD596B7B3707C6E7031B6FC6434F344B48570C7D3D291A56179953C1907AA237594CA196A
2,685,558 UART: [art] SIG.S = 0C651E9DE282457BE56DE0050C22D80675729CE03A35B773E3A89C411388BE891FE35B5DACD45C289B6A8F0FA61A385F
2,708,912 UART: mbox::rt_entry...
2,709,284 UART: ____ _ _ _ ____ _____
2,710,068 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,868 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,636 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,404 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,172 UART: |_|
2,713,484 UART:
2,831,895 UART: [rt] Runtime listening for mailbox commands...
2,833,076 >>> mbox cmd response data (48 bytes)
2,833,077 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,860 >>> mbox cmd response data (48 bytes)
2,835,861 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,998 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,817 >>> mbox cmd response data (12 bytes)
1,140,818 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,140 >>> mbox cmd response: success
2,222,651 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,840 UART:
2,228,856 UART: Running Caliptra FMC ...
2,229,264 UART:
2,229,407 UART: [state] CFI Enabled
2,240,278 UART: [fht] FMC Alias Private Key: 7
2,348,429 UART: [art] Extend RT PCRs Done
2,348,857 UART: [art] Lock RT PCRs Done
2,350,611 UART: [art] Populate DV Done
2,358,716 UART: [fht] FMC Alias Private Key: 7
2,359,664 UART: [art] Derive CDI
2,359,944 UART: [art] Store in in slot 0x4
2,445,643 UART: [art] Derive Key Pair
2,446,003 UART: [art] Store priv key in slot 0x5
2,458,975 UART: [art] Derive Key Pair - Done
2,473,537 UART: [art] Signing Cert with AUTHO
2,474,017 UART: RITY.KEYID = 7
2,489,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,020 UART: [art] PUB.X = 1948FA5380B95F2EE7D2596EF8D3339439792517149A1727E6183B98D3F49A3709F7456A6233A7D7456CF0DABB247440
2,496,777 UART: [art] PUB.Y = 5AD3845BBA71424120A7EDC0F6D762463081C4FF08D2AE7C3EC0BE03A92B27C865A0FD1CD3635E84B1E5887B5390EDB5
2,503,733 UART: [art] SIG.R = BD4697E841C2B524C897606533B53B909F0FC3AD8FDA4FB634D959B8A4C804BB6DED5FCF03FA25EA6F33C2297A93F60A
2,510,507 UART: [art] SIG.S = 44C81AD7FA3607A9609549E87D6AD160783847F587FD7BC66C80071B0D603039FEA96A2CF414B568B9FB7DCA8B2803F6
2,534,284 UART: mbox::rt_entry...
2,534,656 UART: ____ _ _ _ ____ _____
2,535,440 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,776 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,544 UART: |_|
2,538,856 UART:
2,659,435 UART: [rt] Runtime listening for mailbox commands...
2,660,616 >>> mbox cmd response data (48 bytes)
2,660,617 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,663,400 >>> mbox cmd response data (48 bytes)
2,663,401 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,678,538 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,543 UART: [kat] SHA2-256
881,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,589 UART: [kat] ++
885,741 UART: [kat] sha1
889,833 UART: [kat] SHA2-256
891,771 UART: [kat] SHA2-384
894,640 UART: [kat] SHA2-512-ACC
896,541 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,695 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 ready_for_fw is high
1,480,699 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,240 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,065 UART: [ldev] Erasing FE.KEYID = 1
1,546,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,456 UART: [ldev] --
1,585,925 UART: [fwproc] Waiting for Commands...
1,586,762 UART: [fwproc] Received command 0x46574c44
1,587,553 UART: [fwproc] Received Image of size 31832 bytes
1,939,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,179 >>> mbox cmd response: success
2,009,305 UART: [afmc] ++
2,009,473 UART: [afmc] CDI.KEYID = 6
2,009,835 UART: [afmc] SUBJECT.KEYID = 7
2,010,260 UART: [afmc] AUTHORITY.KEYID = 5
2,045,241 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,940 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,630 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,537 UART: [afmc] --
2,088,555 UART: [cold-reset] --
2,089,337 UART: [state] Locking Datavault
2,090,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,048 UART: [state] Locking ICCM
2,091,622 UART: [exit] Launching FMC @ 0x40000130
2,096,951 UART:
2,096,967 UART: Running Caliptra FMC ...
2,097,375 UART:
2,097,429 UART: [state] CFI Enabled
2,107,956 UART: [fht] FMC Alias Private Key: 7
2,215,945 UART: [art] Extend RT PCRs Done
2,216,373 UART: [art] Lock RT PCRs Done
2,218,201 UART: [art] Populate DV Done
2,226,288 UART: [fht] FMC Alias Private Key: 7
2,227,402 UART: [art] Derive CDI
2,227,682 UART: [art] Store in in slot 0x4
2,313,525 UART: [art] Derive Key Pair
2,313,885 UART: [art] Store priv key in slot 0x5
2,327,173 UART: [art] Derive Key Pair - Done
2,341,732 UART: [art] Signing Cert with AUTHO
2,342,212 UART: RITY.KEYID = 7
2,357,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,603 UART: [art] PUB.X = D4D0413EF702723930EED71F369891AB7D8A26FC8470733B33025CD060BEB406B6813CA0F24144A0324BF62E95E8FBDA
2,365,368 UART: [art] PUB.Y = 4622547036CD70BB3C1FB930E9D49C931BAEF62B4D5A6249CD69B1E8261D0F74BF8B8A61871F6A09D2B94A813D5BE293
2,372,320 UART: [art] SIG.R = B3D6EAF57ADA09949F8D4199FC318D3B080261D0A73F052C87CEF6F991BBF6CC5A3FA130E7E8ADD71A5CBF58DB7F686C
2,379,102 UART: [art] SIG.S = D0D1C325966D52A0FE663FAC0CB0167603B881C7A78E435D17136AA8D0C075312C24965F2B7CBB581F808AF07DE0F0B6
2,402,388 UART: persistent_rt::test_persistent_data_layout...[ok]
2,403,631 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,551 ready_for_fw is high
1,362,551 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,858,263 >>> mbox cmd response: success
1,920,255 UART:
1,920,271 UART: Running Caliptra FMC ...
1,920,679 UART:
1,920,733 UART: [state] CFI Enabled
1,930,984 UART: [fht] FMC Alias Private Key: 7
2,039,189 UART: [art] Extend RT PCRs Done
2,039,617 UART: [art] Lock RT PCRs Done
2,041,435 UART: [art] Populate DV Done
2,049,644 UART: [fht] FMC Alias Private Key: 7
2,050,778 UART: [art] Derive CDI
2,051,058 UART: [art] Store in in slot 0x4
2,136,395 UART: [art] Derive Key Pair
2,136,755 UART: [art] Store priv key in slot 0x5
2,150,181 UART: [art] Derive Key Pair - Done
2,164,915 UART: [art] Signing Cert with AUTHO
2,165,395 UART: RITY.KEYID = 7
2,180,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,432 UART: [art] PUB.X = E516E1D55A1B9E87DA23FA3076900039785DC18679585C5348E11634A6C44BB0CD524BD054B5E63C4C861D5E62B61BE0
2,188,180 UART: [art] PUB.Y = 7548E41D1660ECD903B2CAC4373033B460DDECFDC3EF18BAAFBB09081DBF53FAB07F9FC4C0A96EEE80E57745E47629DD
2,195,145 UART: [art] SIG.R = C423BCCE812591F375E3DBF2E50A6F073A59BB80A0C030EFDFB559BBF2939A30C40A477A2DE852CE290E2DE571F45A17
2,201,919 UART: [art] SIG.S = 125E3D32500FF6FEB73734029D646408B0CF913F30623C9A83D334D155CDE7E3A8CBFA1770706FD2F625A6761B8AA17A
2,225,744 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,987 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,972 UART: [cold-reset] ++
1,477,410 UART: [fht] Storing FHT @ 0x50003400
1,480,127 UART: [idev] ++
1,480,295 UART: [idev] CDI.KEYID = 6
1,480,655 UART: [idev] SUBJECT.KEYID = 7
1,481,079 UART: [idev] UDS.KEYID = 0
1,481,424 ready_for_fw is high
1,481,424 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,489,157 UART: [idev] Erasing UDS.KEYID = 0
1,505,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,514,970 UART: [ldev] ++
1,515,138 UART: [ldev] CDI.KEYID = 6
1,515,501 UART: [ldev] SUBJECT.KEYID = 5
1,515,927 UART: [ldev] AUTHORITY.KEYID = 7
1,516,390 UART: [ldev] FE.KEYID = 1
1,521,862 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,348 UART: [fwproc] Waiting for Commands...
1,587,087 UART: [fwproc] Received command 0x46574c44
1,587,878 UART: [fwproc] Received Image of size 31832 bytes
1,940,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,009,602 >>> mbox cmd response: success
2,010,764 UART: [afmc] ++
2,010,932 UART: [afmc] CDI.KEYID = 6
2,011,294 UART: [afmc] SUBJECT.KEYID = 7
2,011,719 UART: [afmc] AUTHORITY.KEYID = 5
2,046,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,063,038 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,431 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,081,121 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,089,004 UART: [afmc] --
2,090,072 UART: [cold-reset] --
2,090,940 UART: [state] Locking Datavault
2,092,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,771 UART: [state] Locking ICCM
2,093,413 UART: [exit] Launching FMC @ 0x40000130
2,098,742 UART:
2,098,758 UART: Running Caliptra FMC ...
2,099,166 UART:
2,099,309 UART: [state] CFI Enabled
2,109,948 UART: [fht] FMC Alias Private Key: 7
2,218,495 UART: [art] Extend RT PCRs Done
2,218,923 UART: [art] Lock RT PCRs Done
2,220,243 UART: [art] Populate DV Done
2,228,538 UART: [fht] FMC Alias Private Key: 7
2,229,484 UART: [art] Derive CDI
2,229,764 UART: [art] Store in in slot 0x4
2,315,723 UART: [art] Derive Key Pair
2,316,083 UART: [art] Store priv key in slot 0x5
2,329,959 UART: [art] Derive Key Pair - Done
2,344,559 UART: [art] Signing Cert with AUTHO
2,345,039 UART: RITY.KEYID = 7
2,360,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,360,844 UART: [art] PUB.X = 51447D595A13A89BE01154F357A777B17C684F0AEDF7A323EE9BFABBB667BD3E2CF3EEB6351169A98A439BC804DF68B8
2,367,622 UART: [art] PUB.Y = 27D6955A9317AB33A283EC602673CF59F7C251F5A4FC38225E4E3784D0C7487902B47FFAC5214B26D5F01917EEB470A7
2,374,569 UART: [art] SIG.R = 645F0CB974CE48737A7F5EFD67C2C648A7E57945B2D6985E0CB111FCE09A6F34986AC870177BCA5A57962B08ACC06DCC
2,381,342 UART: [art] SIG.S = 177B8A4D05316B99A92C43E0C5BAD3FDE4715B026D403068228E872E8A1763967E1B0D23187F1863603C995D05EB6A8F
2,405,108 UART: persistent_rt::test_persistent_data_layout...[ok]
2,406,351 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 ready_for_fw is high
1,362,716 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,859,332 >>> mbox cmd response: success
1,920,966 UART:
1,920,982 UART: Running Caliptra FMC ...
1,921,390 UART:
1,921,533 UART: [state] CFI Enabled
1,932,062 UART: [fht] FMC Alias Private Key: 7
2,041,321 UART: [art] Extend RT PCRs Done
2,041,749 UART: [art] Lock RT PCRs Done
2,043,107 UART: [art] Populate DV Done
2,051,342 UART: [fht] FMC Alias Private Key: 7
2,052,446 UART: [art] Derive CDI
2,052,726 UART: [art] Store in in slot 0x4
2,138,747 UART: [art] Derive Key Pair
2,139,107 UART: [art] Store priv key in slot 0x5
2,152,353 UART: [art] Derive Key Pair - Done
2,167,233 UART: [art] Signing Cert with AUTHO
2,167,713 UART: RITY.KEYID = 7
2,182,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,183,658 UART: [art] PUB.X = B5642BCB2A33A2E3D1785162C3854E78281A1C574147C39CB5E3AACAEBDA0648D7C1DADC89374634570256866315A7AF
2,190,426 UART: [art] PUB.Y = 9EAC637C5034123DFE55C6804EE0B25B89544A49217BAAF17F22E1D00005CE23D8F4BEBA9C1BF4FC70073C0B87C7A8CB
2,197,361 UART: [art] SIG.R = 8542F1D9F6BB2E8A7CA3BE4D7C190E93C19679856790C59A2BE3533F6887C94B1D3DDE07048100F79D081E237A198209
2,204,092 UART: [art] SIG.S = 9CB2CFED744EDBF1362CCEF8E0156ECB9CBE0B66032D68013F7B1140CD1B842CEE7BC22EF5C24B76E420A206B1249059
2,227,798 UART: persistent_rt::test_persistent_data_layout...[ok]
2,229,041 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,080 UART: [kat] SHA2-256
892,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,855 UART: [kat] ++
897,007 UART: [kat] sha1
901,255 UART: [kat] SHA2-256
903,195 UART: [kat] SHA2-384
906,020 UART: [kat] SHA2-512-ACC
907,921 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,208 UART: [kat] LMS
1,170,536 UART: [kat] --
1,171,037 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,368 UART: [idev] ++
1,174,536 UART: [idev] CDI.KEYID = 6
1,174,896 UART: [idev] SUBJECT.KEYID = 7
1,175,320 UART: [idev] UDS.KEYID = 0
1,175,665 ready_for_fw is high
1,175,665 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,545 UART: [idev] Sha1 KeyId Algorithm
1,209,089 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,580 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,338 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,878 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,649 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,602 >>> mbox cmd response: success
1,704,776 UART: [afmc] ++
1,704,944 UART: [afmc] CDI.KEYID = 6
1,705,306 UART: [afmc] SUBJECT.KEYID = 7
1,705,731 UART: [afmc] AUTHORITY.KEYID = 5
1,741,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,865 UART: [afmc] --
1,784,917 UART: [cold-reset] --
1,785,843 UART: [state] Locking Datavault
1,786,838 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,442 UART: [state] Locking ICCM
1,787,930 UART: [exit] Launching FMC @ 0x40000130
1,793,259 UART:
1,793,275 UART: Running Caliptra FMC ...
1,793,683 UART:
1,793,737 UART: [state] CFI Enabled
1,804,660 UART: [fht] FMC Alias Private Key: 7
1,912,771 UART: [art] Extend RT PCRs Done
1,913,199 UART: [art] Lock RT PCRs Done
1,914,751 UART: [art] Populate DV Done
1,923,214 UART: [fht] FMC Alias Private Key: 7
1,924,164 UART: [art] Derive CDI
1,924,444 UART: [art] Store in in slot 0x4
2,009,947 UART: [art] Derive Key Pair
2,010,307 UART: [art] Store priv key in slot 0x5
2,023,831 UART: [art] Derive Key Pair - Done
2,038,647 UART: [art] Signing Cert with AUTHO
2,039,127 UART: RITY.KEYID = 7
2,054,297 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,062 UART: [art] PUB.X = F7E8DFFF77A304DC2312AA3018D520D8F096BCCB13C9F8C75428863FD81902C242EB0ED40655FF86C31ABBD43D44ABE2
2,061,836 UART: [art] PUB.Y = 5B60239494CAE74F6CFFE022DCCC20A80A924DA46873C22A2B18AD4AD7E21393357DB9DE144BD6A7A313CA0EAE8D2915
2,068,796 UART: [art] SIG.R = 9AB7D7A1E02170E307FF6763807677BAF65122BD300F21044D1720E5FEF85F7DAC960D51C0578BF5C0F601E2095A08A2
2,075,547 UART: [art] SIG.S = 79C31FFE250DF7B7E0556A0AA43E458699CC72C5FD8021CA4751CB2FE506CEA8D7CEEA3F7A9B4143B9ABACA3A8A914F3
2,099,464 UART: persistent_rt::test_persistent_data_layout...[ok]
2,100,707 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 ready_for_fw is high
1,060,647 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,557,935 >>> mbox cmd response: success
1,619,545 UART:
1,619,561 UART: Running Caliptra FMC ...
1,619,969 UART:
1,620,023 UART: [state] CFI Enabled
1,630,714 UART: [fht] FMC Alias Private Key: 7
1,739,229 UART: [art] Extend RT PCRs Done
1,739,657 UART: [art] Lock RT PCRs Done
1,741,213 UART: [art] Populate DV Done
1,749,484 UART: [fht] FMC Alias Private Key: 7
1,750,476 UART: [art] Derive CDI
1,750,756 UART: [art] Store in in slot 0x4
1,835,721 UART: [art] Derive Key Pair
1,836,081 UART: [art] Store priv key in slot 0x5
1,849,391 UART: [art] Derive Key Pair - Done
1,864,289 UART: [art] Signing Cert with AUTHO
1,864,769 UART: RITY.KEYID = 7
1,879,951 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,716 UART: [art] PUB.X = 8B3FE68B0E6C1BC07C200D191DE2D7B0F7E9FDD367F622164EDD862A663B36E3D0F2B5FAEA4C2F8F362EC8B69EB3AB92
1,887,504 UART: [art] PUB.Y = 25D077CFFB5579B1762D28D8B53A3BC026415DD35C4DB9E71B013EAA18BEC266F01734E55255AE392B53988ECA9CEF37
1,894,461 UART: [art] SIG.R = 0325F315A94868A7ECF60D8F8CB5BBE05F45DF9438C6BBCC1421A10B708EFF8633250EE4C6E721847A5493E082858181
1,901,221 UART: [art] SIG.S = D276DBF8C86CEB65298567B4E2F39F8553B02F2412920A9544148C2EF4719BD354DD0A308565DB46EB210D14D2F0F797
1,925,048 UART: persistent_rt::test_persistent_data_layout...[ok]
1,926,291 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
893,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,080 UART: [kat] ++
898,232 UART: [kat] sha1
902,426 UART: [kat] SHA2-256
904,366 UART: [kat] SHA2-384
907,115 UART: [kat] SHA2-512-ACC
909,016 UART: [kat] ECC-384
918,263 UART: [kat] HMAC-384Kdf
922,799 UART: [kat] LMS
1,171,127 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 ready_for_fw is high
1,176,572 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,184,587 UART: [idev] Erasing UDS.KEYID = 0
1,201,694 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,211,038 UART: [ldev] ++
1,211,206 UART: [ldev] CDI.KEYID = 6
1,211,569 UART: [ldev] SUBJECT.KEYID = 5
1,211,995 UART: [ldev] AUTHORITY.KEYID = 7
1,212,458 UART: [ldev] FE.KEYID = 1
1,217,574 UART: [ldev] Erasing FE.KEYID = 1
1,243,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,626 UART: [ldev] --
1,283,121 UART: [fwproc] Wait for Commands...
1,283,931 UART: [fwproc] Recv command 0x46574c44
1,284,659 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,694,096 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,706,099 >>> mbox cmd response: success
1,707,321 UART: [afmc] ++
1,707,489 UART: [afmc] CDI.KEYID = 6
1,707,851 UART: [afmc] SUBJECT.KEYID = 7
1,708,276 UART: [afmc] AUTHORITY.KEYID = 5
1,743,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,760,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,954 UART: [afmc] --
1,786,878 UART: [cold-reset] --
1,787,910 UART: [state] Locking Datavault
1,789,171 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,775 UART: [state] Locking ICCM
1,790,447 UART: [exit] Launching FMC @ 0x40000130
1,795,776 UART:
1,795,792 UART: Running Caliptra FMC ...
1,796,200 UART:
1,796,343 UART: [state] CFI Enabled
1,806,892 UART: [fht] FMC Alias Private Key: 7
1,914,611 UART: [art] Extend RT PCRs Done
1,915,039 UART: [art] Lock RT PCRs Done
1,916,621 UART: [art] Populate DV Done
1,924,838 UART: [fht] FMC Alias Private Key: 7
1,925,900 UART: [art] Derive CDI
1,926,180 UART: [art] Store in in slot 0x4
2,012,033 UART: [art] Derive Key Pair
2,012,393 UART: [art] Store priv key in slot 0x5
2,025,523 UART: [art] Derive Key Pair - Done
2,040,472 UART: [art] Signing Cert with AUTHO
2,040,952 UART: RITY.KEYID = 7
2,055,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,627 UART: [art] PUB.X = 3E1BCB704229B96FA008B391B4D56204FAA854A863136EBDECEC484FB97AD3B4CB192E58658E2C3EE92CE95FAE7EC134
2,063,409 UART: [art] PUB.Y = BC2F16BA4F159A63D5AB9A5F2C774AABC9FF67A4C4C556250E75712E04E8DF96724E0A0A910D7FDACC2107AC4B0F07FC
2,070,357 UART: [art] SIG.R = 9705F7A11F569273EAA3338BADCEFB3E12CB0203266626876EEF3427A3424DC58D07C871141668889D841E716CF6EF2A
2,077,115 UART: [art] SIG.S = 1729F82D1653EF13002EEE1F83C398548767F5F08AAABC03BDAC751B8725629D2CF58FA9F3355E71CDC98D112C964BE8
2,100,232 UART: persistent_rt::test_persistent_data_layout...[ok]
2,101,475 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 ready_for_fw is high
1,060,918 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,558,750 >>> mbox cmd response: success
1,620,652 UART:
1,620,668 UART: Running Caliptra FMC ...
1,621,076 UART:
1,621,219 UART: [state] CFI Enabled
1,631,686 UART: [fht] FMC Alias Private Key: 7
1,740,413 UART: [art] Extend RT PCRs Done
1,740,841 UART: [art] Lock RT PCRs Done
1,742,055 UART: [art] Populate DV Done
1,750,094 UART: [fht] FMC Alias Private Key: 7
1,751,198 UART: [art] Derive CDI
1,751,478 UART: [art] Store in in slot 0x4
1,837,495 UART: [art] Derive Key Pair
1,837,855 UART: [art] Store priv key in slot 0x5
1,850,641 UART: [art] Derive Key Pair - Done
1,865,594 UART: [art] Signing Cert with AUTHO
1,866,074 UART: RITY.KEYID = 7
1,881,294 UART: [art] Erasing AUTHORITY.KEYID = 7
1,882,059 UART: [art] PUB.X = 7EA51FC21EF2EA619F4E4734792D70D463FE4518A20B8B40BEE1474BE815EF355CBDDC0641627BFD3D3A47DE2FB7F58B
1,888,841 UART: [art] PUB.Y = FA7DE957F4F051B0FE31B1622CF512E92C8344EF2C3524C5F39739E3E83EB276E88C0AE202FD01FD8450511A03890A9F
1,895,782 UART: [art] SIG.R = 213A3455F206773600E0CB623D1CA475B03BB53B392C33B388329127DA6E19B7C95A8FB1724C76B024A597FA7E84AE14
1,902,525 UART: [art] SIG.S = E26E51C05358ADDF9712CA667044D1028C29F49C0B1FE1123951DF85DE0B8381A222B422FCA324A731C887588BAC26BF
1,926,134 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,377 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 ready_for_fw is high
1,174,101 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,167 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,936 UART: [fwproc] Wait for Commands...
1,281,627 UART: [fwproc] Recv command 0x46574c44
1,282,360 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,241 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,550 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,702,592 >>> mbox cmd response: success
1,703,763 UART: [afmc] ++
1,703,931 UART: [afmc] CDI.KEYID = 6
1,704,294 UART: [afmc] SUBJECT.KEYID = 7
1,704,720 UART: [afmc] AUTHORITY.KEYID = 5
1,740,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,146 UART: [afmc] --
1,784,192 UART: [cold-reset] --
1,784,946 UART: [state] Locking Datavault
1,786,149 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,753 UART: [state] Locking ICCM
1,787,391 UART: [exit] Launching FMC @ 0x40000130
1,792,720 UART:
1,792,736 UART: Running Caliptra FMC ...
1,793,144 UART:
1,793,198 UART: [state] CFI Enabled
1,803,823 UART: [fht] FMC Alias Private Key: 7
1,912,044 UART: [art] Extend RT PCRs Done
1,912,472 UART: [art] Lock RT PCRs Done
1,913,816 UART: [art] Populate DV Done
1,922,003 UART: [fht] FMC Alias Private Key: 7
1,923,103 UART: [art] Derive CDI
1,923,383 UART: [art] Store in in slot 0x4
2,009,032 UART: [art] Derive Key Pair
2,009,392 UART: [art] Store priv key in slot 0x5
2,022,200 UART: [art] Derive Key Pair - Done
2,037,017 UART: [art] Signing Cert with AUTHO
2,037,497 UART: RITY.KEYID = 7
2,052,827 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,592 UART: [art] PUB.X = 1B6400CCF78CBDB267FBBE8B5209E485FE520E21ECCA03F3A69692F3C3AA8241D023A1B9C6DC8E6087592860EB701CD0
2,060,345 UART: [art] PUB.Y = DCDF301E2D17C1211549DB6027DF65981C905E793C1F4986789D144117C28830F2663E7E4A7023DB03509FE4E95A7620
2,067,284 UART: [art] SIG.R = 26D37ECE706AF9D9BE0A611A9E4577CF2B9370F0D4CE164F23CB2A31D16542FB417386ED60ECBBFB1BEF84336659414A
2,074,065 UART: [art] SIG.S = 3D97D5C78EBD51B3FEFC6DC458FF2D3E7EDCB003FB9215A2D348EDAEE722CA840910A0884288AF85FB30D675EC7EFB4D
2,097,965 UART: persistent_rt::test_persistent_data_layout...[ok]
2,099,208 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,798 ready_for_fw is high
1,055,798 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,554,114 >>> mbox cmd response: success
1,616,472 UART:
1,616,488 UART: Running Caliptra FMC ...
1,616,896 UART:
1,616,950 UART: [state] CFI Enabled
1,627,631 UART: [fht] FMC Alias Private Key: 7
1,736,178 UART: [art] Extend RT PCRs Done
1,736,606 UART: [art] Lock RT PCRs Done
1,738,194 UART: [art] Populate DV Done
1,746,327 UART: [fht] FMC Alias Private Key: 7
1,747,337 UART: [art] Derive CDI
1,747,617 UART: [art] Store in in slot 0x4
1,833,154 UART: [art] Derive Key Pair
1,833,514 UART: [art] Store priv key in slot 0x5
1,846,466 UART: [art] Derive Key Pair - Done
1,861,255 UART: [art] Signing Cert with AUTHO
1,861,735 UART: RITY.KEYID = 7
1,876,937 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,702 UART: [art] PUB.X = BEAF7745569E707B85F989CB1A5F602E938BA05AA38A6A61C29E5255F5D575D2A60ACD45C7A14809BD7F2E6D6AD6BBC4
1,884,482 UART: [art] PUB.Y = 94567AAEC68415BA4CA4D785EA319CE68714EC8C2E2A447E716EAED2EBABF5A6C78A1880748FD3D17B581C7DDFD716A5
1,891,452 UART: [art] SIG.R = 3E116985BF992AFE86A942AACA48A04CE1C92CFC05FE268FF8970975765B430CD0B76B56FE67E166E238705C2D63A877
1,898,219 UART: [art] SIG.S = 62120360B0B9E18930EEFC784EBF35F138660F9C05867F180D92AEBF4339BA07036726FBE635F08BF6EC4BF125506201
1,922,276 UART: persistent_rt::test_persistent_data_layout...[ok]
1,923,519 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,478 UART: [kat] SHA2-256
902,418 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
917,069 UART: [kat] HMAC-384Kdf
921,777 UART: [kat] LMS
1,170,089 UART: [kat] --
1,171,312 UART: [cold-reset] ++
1,171,768 UART: [fht] FHT @ 0x50003400
1,174,364 UART: [idev] ++
1,174,532 UART: [idev] CDI.KEYID = 6
1,174,893 UART: [idev] SUBJECT.KEYID = 7
1,175,318 UART: [idev] UDS.KEYID = 0
1,175,664 ready_for_fw is high
1,175,664 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,196 UART: [idev] Erasing UDS.KEYID = 0
1,200,238 UART: [idev] Sha1 KeyId Algorithm
1,209,284 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,803 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,231 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,269 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,203 >>> mbox cmd response: success
1,705,360 UART: [afmc] ++
1,705,528 UART: [afmc] CDI.KEYID = 6
1,705,891 UART: [afmc] SUBJECT.KEYID = 7
1,706,317 UART: [afmc] AUTHORITY.KEYID = 5
1,742,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,041 UART: [afmc] --
1,784,989 UART: [cold-reset] --
1,785,849 UART: [state] Locking Datavault
1,787,016 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,620 UART: [state] Locking ICCM
1,788,164 UART: [exit] Launching FMC @ 0x40000130
1,793,493 UART:
1,793,509 UART: Running Caliptra FMC ...
1,793,917 UART:
1,794,060 UART: [state] CFI Enabled
1,804,567 UART: [fht] FMC Alias Private Key: 7
1,912,954 UART: [art] Extend RT PCRs Done
1,913,382 UART: [art] Lock RT PCRs Done
1,914,966 UART: [art] Populate DV Done
1,923,173 UART: [fht] FMC Alias Private Key: 7
1,924,233 UART: [art] Derive CDI
1,924,513 UART: [art] Store in in slot 0x4
2,010,102 UART: [art] Derive Key Pair
2,010,462 UART: [art] Store priv key in slot 0x5
2,023,782 UART: [art] Derive Key Pair - Done
2,038,432 UART: [art] Signing Cert with AUTHO
2,038,912 UART: RITY.KEYID = 7
2,054,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,135 UART: [art] PUB.X = 7ED407C9195759D3B14EB285C55C547892423F3B28E284E6183F073D0D8BD0A1AAE79ACDB916CF889F1B05A26A668466
2,061,895 UART: [art] PUB.Y = 99E3D55F1C89B941867A95D52B362009D498EC0D252746D3021AC4C709FFAAF0A982CD24DA818ABF9777515704DA6235
2,068,830 UART: [art] SIG.R = 6D0CF3CABB7F6D2A0896EFFB3446EFA70CE0CB606EC8B22FB7132421900BD66321FF940D48FC44A830C7657928FADA5C
2,075,603 UART: [art] SIG.S = E374FA170A94FA392A722E7E4609DEBC0E9719DD41E52704E9CAF36A812D928BE2623C9AE5DD10335B08399DB11C7264
2,099,026 UART: persistent_rt::test_persistent_data_layout...[ok]
2,100,269 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,015 ready_for_fw is high
1,057,015 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,553,041 >>> mbox cmd response: success
1,614,357 UART:
1,614,373 UART: Running Caliptra FMC ...
1,614,781 UART:
1,614,924 UART: [state] CFI Enabled
1,625,733 UART: [fht] FMC Alias Private Key: 7
1,733,850 UART: [art] Extend RT PCRs Done
1,734,278 UART: [art] Lock RT PCRs Done
1,736,034 UART: [art] Populate DV Done
1,744,127 UART: [fht] FMC Alias Private Key: 7
1,745,141 UART: [art] Derive CDI
1,745,421 UART: [art] Store in in slot 0x4
1,831,488 UART: [art] Derive Key Pair
1,831,848 UART: [art] Store priv key in slot 0x5
1,844,876 UART: [art] Derive Key Pair - Done
1,859,678 UART: [art] Signing Cert with AUTHO
1,860,158 UART: RITY.KEYID = 7
1,875,470 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,235 UART: [art] PUB.X = 646B0D9F2525173CFC637B23515969E13C2A83E4C99910625FC0F77593818E5E3267095C08D72742A6F671C2E6B7DC41
1,882,986 UART: [art] PUB.Y = 43CA8C0A87491ADBCB74F6026569201D758E8BAF1B815BD00137FC4ED7BF9B4C7DA90D7E1B3458FE2EAB0B1A3464AABF
1,889,943 UART: [art] SIG.R = 4AD478BBBA2ED71B068222BC4A01CF68939BBD3C67A14F1A59C200A70945E89119D31F833CF2749F7D177D88B22ADD99
1,896,690 UART: [art] SIG.S = E29C07411DCB4D797F865541EABADE29DA6AC4E022345595F2D77857B8ADEB05E20EEFF9ECF0D98CF37428AB2CED6636
1,920,463 UART: persistent_rt::test_persistent_data_layout...[ok]
1,921,706 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,579 UART: [kat] SHA2-256
882,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,625 UART: [kat] ++
886,777 UART: [kat] sha1
890,947 UART: [kat] SHA2-256
892,885 UART: [kat] SHA2-384
895,764 UART: [kat] SHA2-512-ACC
897,665 UART: [kat] ECC-384
903,498 UART: [kat] HMAC-384Kdf
908,196 UART: [kat] LMS
1,476,392 UART: [kat] --
1,477,417 UART: [cold-reset] ++
1,477,873 UART: [fht] Storing FHT @ 0x50003400
1,480,504 UART: [idev] ++
1,480,672 UART: [idev] CDI.KEYID = 6
1,481,032 UART: [idev] SUBJECT.KEYID = 7
1,481,456 UART: [idev] UDS.KEYID = 0
1,481,801 ready_for_fw is high
1,481,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,984 UART: [idev] Erasing UDS.KEYID = 0
1,505,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,505 UART: [ldev] ++
1,514,673 UART: [ldev] CDI.KEYID = 6
1,515,036 UART: [ldev] SUBJECT.KEYID = 5
1,515,462 UART: [ldev] AUTHORITY.KEYID = 7
1,515,925 UART: [ldev] FE.KEYID = 1
1,520,897 UART: [ldev] Erasing FE.KEYID = 1
1,546,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,428 UART: [ldev] --
1,585,779 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 114332 bytes
2,886,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,551 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,828 >>> mbox cmd response: success
3,080,034 UART: [afmc] ++
3,080,202 UART: [afmc] CDI.KEYID = 6
3,080,564 UART: [afmc] SUBJECT.KEYID = 7
3,080,989 UART: [afmc] AUTHORITY.KEYID = 5
3,116,144 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,996 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,609 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,299 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,212 UART: [afmc] --
3,159,308 UART: [cold-reset] --
3,160,228 UART: [state] Locking Datavault
3,161,373 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,977 UART: [state] Locking ICCM
3,162,435 UART: [exit] Launching FMC @ 0x40000130
3,167,764 UART:
3,167,780 UART: Running Caliptra FMC ...
3,168,188 UART:
3,168,242 UART: [state] CFI Enabled
3,178,993 UART: [fht] FMC Alias Private Key: 7
3,286,748 UART: [art] Extend RT PCRs Done
3,287,176 UART: [art] Lock RT PCRs Done
3,288,522 UART: [art] Populate DV Done
3,296,517 UART: [fht] FMC Alias Private Key: 7
3,297,543 UART: [art] Derive CDI
3,297,823 UART: [art] Store in in slot 0x4
3,383,518 UART: [art] Derive Key Pair
3,383,878 UART: [art] Store priv key in slot 0x5
3,396,738 UART: [art] Derive Key Pair - Done
3,411,836 UART: [art] Signing Cert with AUTHO
3,412,316 UART: RITY.KEYID = 7
3,427,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,203 UART: [art] PUB.X = CE9EC3DEA3EA0D39B6BC83660CE46B158A756AE0812FDF049B54F60E40255C3CDD99C1CEBF4F43D4378A4D87747F27B1
3,434,979 UART: [art] PUB.Y = 4D8061AFD15D8596FA058A9C9FB0806E2EDC0DA563B569728F8EF1572416E9A90CDE59FAAF905A01322FC75D40D7CA72
3,441,929 UART: [art] SIG.R = 03D61897DC58E739275928D7B7AF24F2120DED408A07D365ED9D90F480335E1E7DFC384FCCAD8BE2C95980A8ADDA1C12
3,448,702 UART: [art] SIG.S = 2DB603F7A1F45483B576435C6A1DD6372CAE174FAE864F8A3E0923583ACE9E7C5FCE2B58AACAE3017F6933DB3B33D4E9
3,472,188 UART: Caliptra RT
3,472,441 UART: [state] CFI Enabled
3,580,871 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,059 ready_for_fw is high
1,362,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,916 >>> mbox cmd response: success
2,988,730 UART:
2,988,746 UART: Running Caliptra FMC ...
2,989,154 UART:
2,989,208 UART: [state] CFI Enabled
2,999,449 UART: [fht] FMC Alias Private Key: 7
3,107,832 UART: [art] Extend RT PCRs Done
3,108,260 UART: [art] Lock RT PCRs Done
3,109,718 UART: [art] Populate DV Done
3,117,813 UART: [fht] FMC Alias Private Key: 7
3,118,761 UART: [art] Derive CDI
3,119,041 UART: [art] Store in in slot 0x4
3,204,308 UART: [art] Derive Key Pair
3,204,668 UART: [art] Store priv key in slot 0x5
3,217,090 UART: [art] Derive Key Pair - Done
3,231,768 UART: [art] Signing Cert with AUTHO
3,232,248 UART: RITY.KEYID = 7
3,247,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,991 UART: [art] PUB.X = 55B342DBA5A2ACCAA15656D918E44BE4C2A70C290E118676B7C9F9F15930365F2FC32A5F9954F1D7D750D2610DFEDA70
3,254,762 UART: [art] PUB.Y = 8847A687D47C5D239707E684815E4C495650DEBC5E526723A2FCBC4E5E5A456D73D352E22B0F7D80C37558F31AAF68EC
3,261,710 UART: [art] SIG.R = E5570AF0BA91F41171ACEFEC6644E357FD49CADFCC141C137E03144782B5F25543CDC5C7E1334C8D2BD771A9C3A2C385
3,268,488 UART: [art] SIG.S = 8769E501FCD79F1273087188A9E8CF0F7C2543F5A66F2D607AD85BB781A141B7091CFDA6B50D2545F5F1C1D91797BB9A
3,291,776 UART: Caliptra RT
3,292,029 UART: [state] CFI Enabled
3,399,727 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,540 UART: [kat] SHA2-256
892,478 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,427 UART: [kat] HMAC-384Kdf
907,089 UART: [kat] LMS
1,475,285 UART: [kat] --
1,475,992 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,135 UART: [idev] ++
1,479,303 UART: [idev] CDI.KEYID = 6
1,479,663 UART: [idev] SUBJECT.KEYID = 7
1,480,087 UART: [idev] UDS.KEYID = 0
1,480,432 ready_for_fw is high
1,480,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,049 UART: [idev] Erasing UDS.KEYID = 0
1,504,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,159 UART: [idev] --
1,514,120 UART: [ldev] ++
1,514,288 UART: [ldev] CDI.KEYID = 6
1,514,651 UART: [ldev] SUBJECT.KEYID = 5
1,515,077 UART: [ldev] AUTHORITY.KEYID = 7
1,515,540 UART: [ldev] FE.KEYID = 1
1,521,134 UART: [ldev] Erasing FE.KEYID = 1
1,546,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,673 UART: [ldev] --
1,586,044 UART: [fwproc] Waiting for Commands...
1,586,743 UART: [fwproc] Received command 0x46574c44
1,587,534 UART: [fwproc] Received Image of size 114332 bytes
2,885,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,670 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,957 >>> mbox cmd response: success
3,080,185 UART: [afmc] ++
3,080,353 UART: [afmc] CDI.KEYID = 6
3,080,715 UART: [afmc] SUBJECT.KEYID = 7
3,081,140 UART: [afmc] AUTHORITY.KEYID = 5
3,116,375 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,084 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,774 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,555 UART: [afmc] --
3,159,645 UART: [cold-reset] --
3,160,667 UART: [state] Locking Datavault
3,161,852 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,456 UART: [state] Locking ICCM
3,163,000 UART: [exit] Launching FMC @ 0x40000130
3,168,329 UART:
3,168,345 UART: Running Caliptra FMC ...
3,168,753 UART:
3,168,896 UART: [state] CFI Enabled
3,179,193 UART: [fht] FMC Alias Private Key: 7
3,287,376 UART: [art] Extend RT PCRs Done
3,287,804 UART: [art] Lock RT PCRs Done
3,289,338 UART: [art] Populate DV Done
3,297,729 UART: [fht] FMC Alias Private Key: 7
3,298,853 UART: [art] Derive CDI
3,299,133 UART: [art] Store in in slot 0x4
3,385,016 UART: [art] Derive Key Pair
3,385,376 UART: [art] Store priv key in slot 0x5
3,398,286 UART: [art] Derive Key Pair - Done
3,413,399 UART: [art] Signing Cert with AUTHO
3,413,879 UART: RITY.KEYID = 7
3,428,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,496 UART: [art] PUB.X = 7D943149CC83696545AC828A5380FC4F2F81FEC7E598F3E8A3466227C92E7DD46575FD91D1793BBB657D52C212F913D1
3,436,266 UART: [art] PUB.Y = 2EF05700AF55A8B74163046E6E168B5FF9B0060221659E24E6602D91E2722E5639EFCAE3094CBF257F16D77FD6469453
3,443,178 UART: [art] SIG.R = B4427A661D0A8C1A63C39C72D74D4875E9C4FB7FF997CED99B112B358FE0E028822FAE23990BC2365E01BA07103500C1
3,449,918 UART: [art] SIG.S = 983189113AF0D72D1ECF9A7A63E77E05C3472AECB4F8E6B8206A3A7CBC23EBD7AC93ABA611E5D42DB3B0998596A70373
3,474,001 UART: Caliptra RT
3,474,346 UART: [state] CFI Enabled
3,582,932 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,118 ready_for_fw is high
1,362,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,555 >>> mbox cmd response: success
2,990,095 UART:
2,990,111 UART: Running Caliptra FMC ...
2,990,519 UART:
2,990,662 UART: [state] CFI Enabled
3,001,207 UART: [fht] FMC Alias Private Key: 7
3,109,168 UART: [art] Extend RT PCRs Done
3,109,596 UART: [art] Lock RT PCRs Done
3,111,292 UART: [art] Populate DV Done
3,119,467 UART: [fht] FMC Alias Private Key: 7
3,120,597 UART: [art] Derive CDI
3,120,877 UART: [art] Store in in slot 0x4
3,206,472 UART: [art] Derive Key Pair
3,206,832 UART: [art] Store priv key in slot 0x5
3,219,602 UART: [art] Derive Key Pair - Done
3,234,470 UART: [art] Signing Cert with AUTHO
3,234,950 UART: RITY.KEYID = 7
3,250,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,831 UART: [art] PUB.X = A2B0F2357F9D058E9E75789E98D9A4AF77DA70DB4C5F860FA6219F701FE435D42C1E75B24FF541BA594D5172EA9060AB
3,257,605 UART: [art] PUB.Y = 37369FAE6DAF845AA49E0B3FB9982DB1E44F6E92D863BC029A9D72F918F47A8457C86CE77A4B817008802E0B0B7159E9
3,264,546 UART: [art] SIG.R = BFD464469E064E1E089A4961CA40483F40972E51A81C8066F924DF8FB1311C768F714AABDBE38E17F53A4E83653BE203
3,271,309 UART: [art] SIG.S = A5F81E9009A5E40FA420BE7EF78B9A61D567E65BBCA6E502E29DDC4CFD08B287F2F353E0C8915214B1E4A3076AB6A4EF
3,295,111 UART: Caliptra RT
3,295,456 UART: [state] CFI Enabled
3,404,036 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
892,914 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,039 UART: [kat] ++
897,191 UART: [kat] sha1
901,481 UART: [kat] SHA2-256
903,421 UART: [kat] SHA2-384
906,134 UART: [kat] SHA2-512-ACC
908,035 UART: [kat] ECC-384
917,552 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,784 UART: [idev] ++
1,174,952 UART: [idev] CDI.KEYID = 6
1,175,312 UART: [idev] SUBJECT.KEYID = 7
1,175,736 UART: [idev] UDS.KEYID = 0
1,176,081 ready_for_fw is high
1,176,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,415 UART: [ldev] ++
1,210,583 UART: [ldev] CDI.KEYID = 6
1,210,946 UART: [ldev] SUBJECT.KEYID = 5
1,211,372 UART: [ldev] AUTHORITY.KEYID = 7
1,211,835 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,154 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,474 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,999 >>> mbox cmd response: success
2,775,261 UART: [afmc] ++
2,775,429 UART: [afmc] CDI.KEYID = 6
2,775,791 UART: [afmc] SUBJECT.KEYID = 7
2,776,216 UART: [afmc] AUTHORITY.KEYID = 5
2,810,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,082 UART: [afmc] --
2,854,168 UART: [cold-reset] --
2,855,060 UART: [state] Locking Datavault
2,856,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,951 UART: [state] Locking ICCM
2,857,441 UART: [exit] Launching FMC @ 0x40000130
2,862,770 UART:
2,862,786 UART: Running Caliptra FMC ...
2,863,194 UART:
2,863,248 UART: [state] CFI Enabled
2,874,075 UART: [fht] FMC Alias Private Key: 7
2,982,056 UART: [art] Extend RT PCRs Done
2,982,484 UART: [art] Lock RT PCRs Done
2,983,912 UART: [art] Populate DV Done
2,992,083 UART: [fht] FMC Alias Private Key: 7
2,993,141 UART: [art] Derive CDI
2,993,421 UART: [art] Store in in slot 0x4
3,079,472 UART: [art] Derive Key Pair
3,079,832 UART: [art] Store priv key in slot 0x5
3,093,438 UART: [art] Derive Key Pair - Done
3,108,377 UART: [art] Signing Cert with AUTHO
3,108,857 UART: RITY.KEYID = 7
3,124,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,960 UART: [art] PUB.X = 0B9BB919E199DF460EE32CDA68FFB6DC012FDC8F4525BB041AF091440D1802646225A11DEECFC0A567655D8DF9132239
3,131,722 UART: [art] PUB.Y = A70BDBCB3F29C2743A808B3B5A89B3CD534D6BCCADBCF0203C3DB0AF77C95C6D30D2E35FA9AF1C29F29FE61CB12FC72C
3,138,701 UART: [art] SIG.R = A93422B7B78C1DD93A36F69743C35EDDDE5A3AB94041C913DF2F8109086BD5EB4CCD466230BBD89A5127E610A22CF36A
3,145,477 UART: [art] SIG.S = 8D280EF243430EB3AB057C71244179C468E338210A6B92C16978ED51A53AFDD51124989127B6B8FF21AC6ED16A0EA2E3
3,169,375 UART: Caliptra RT
3,169,628 UART: [state] CFI Enabled
3,276,580 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,725 ready_for_fw is high
1,059,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,458 >>> mbox cmd response: success
2,687,364 UART:
2,687,380 UART: Running Caliptra FMC ...
2,687,788 UART:
2,687,842 UART: [state] CFI Enabled
2,697,923 UART: [fht] FMC Alias Private Key: 7
2,805,842 UART: [art] Extend RT PCRs Done
2,806,270 UART: [art] Lock RT PCRs Done
2,807,780 UART: [art] Populate DV Done
2,816,061 UART: [fht] FMC Alias Private Key: 7
2,817,051 UART: [art] Derive CDI
2,817,331 UART: [art] Store in in slot 0x4
2,903,128 UART: [art] Derive Key Pair
2,903,488 UART: [art] Store priv key in slot 0x5
2,916,494 UART: [art] Derive Key Pair - Done
2,931,015 UART: [art] Signing Cert with AUTHO
2,931,495 UART: RITY.KEYID = 7
2,946,749 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,514 UART: [art] PUB.X = BA84CAB4F46D9E63237B66F67192B5A87CCCB96D5F8C2CE4D0B952548F196BDB0588EEBC3C7CD5922CBF49559997E9EF
2,954,299 UART: [art] PUB.Y = BA58AC08B9FAD35EF9AC73151A246F8D12D178294C190068D5844B75281467DEA9CB0FAF431579B4847064A72F0A6FA5
2,961,222 UART: [art] SIG.R = E0BB55565CCDE525104DCCE4253712F61469FC1655F1540500130900199AB5B4769E188DA9F4A18A63B4E1E9D56C5456
2,967,938 UART: [art] SIG.S = C7D13C29C7CA6ED0F25EB227FABDBC4707667F5FDCBA69A7277C834DFB169921FCADD9915201DF577B8623F8328BBC39
2,991,997 UART: Caliptra RT
2,992,250 UART: [state] CFI Enabled
3,100,232 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
893,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,300 UART: [kat] ++
897,452 UART: [kat] sha1
901,740 UART: [kat] SHA2-256
903,680 UART: [kat] SHA2-384
906,297 UART: [kat] SHA2-512-ACC
908,198 UART: [kat] ECC-384
918,241 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,171,998 UART: [cold-reset] ++
1,172,472 UART: [fht] FHT @ 0x50003400
1,175,123 UART: [idev] ++
1,175,291 UART: [idev] CDI.KEYID = 6
1,175,651 UART: [idev] SUBJECT.KEYID = 7
1,176,075 UART: [idev] UDS.KEYID = 0
1,176,420 ready_for_fw is high
1,176,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,929 UART: [idev] Erasing UDS.KEYID = 0
1,201,076 UART: [idev] Sha1 KeyId Algorithm
1,209,440 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,244,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,966 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,970 >>> mbox cmd response: success
2,775,022 UART: [afmc] ++
2,775,190 UART: [afmc] CDI.KEYID = 6
2,775,552 UART: [afmc] SUBJECT.KEYID = 7
2,775,977 UART: [afmc] AUTHORITY.KEYID = 5
2,811,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,308 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,027 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,707 UART: [afmc] --
2,854,807 UART: [cold-reset] --
2,855,719 UART: [state] Locking Datavault
2,857,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,730 UART: [state] Locking ICCM
2,858,396 UART: [exit] Launching FMC @ 0x40000130
2,863,725 UART:
2,863,741 UART: Running Caliptra FMC ...
2,864,149 UART:
2,864,292 UART: [state] CFI Enabled
2,875,303 UART: [fht] FMC Alias Private Key: 7
2,983,562 UART: [art] Extend RT PCRs Done
2,983,990 UART: [art] Lock RT PCRs Done
2,985,530 UART: [art] Populate DV Done
2,993,657 UART: [fht] FMC Alias Private Key: 7
2,994,731 UART: [art] Derive CDI
2,995,011 UART: [art] Store in in slot 0x4
3,080,330 UART: [art] Derive Key Pair
3,080,690 UART: [art] Store priv key in slot 0x5
3,093,344 UART: [art] Derive Key Pair - Done
3,108,327 UART: [art] Signing Cert with AUTHO
3,108,807 UART: RITY.KEYID = 7
3,123,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,764 UART: [art] PUB.X = F6604E2B56BA84F383270BC03FD119EB3030AC8C9DC9EE58C69F923A22D21D1F872E23FD79117B23D8A82D9495DF2899
3,131,537 UART: [art] PUB.Y = 0BDC70FC058B0E8AE3A4E31AAF44B67192A19D49B201B5C6F2A7422A3FA6454BAB8B27C1C9655F534D723237186BEED6
3,138,487 UART: [art] SIG.R = A4CEFDF9AB776A8BBE1AE896FCA7F4DA50802FA66D68FC3BD2AB2A0E40FC0D2AE5F72AC709D88AE4434BEA391E657A4F
3,145,282 UART: [art] SIG.S = 9EFF7F01446E9521A34FD03FF9267EFA95364294D1D1FB57392D931357D194E8F61193EB2333B59BE1E35CDC32F52537
3,168,880 UART: Caliptra RT
3,169,225 UART: [state] CFI Enabled
3,277,915 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 ready_for_fw is high
1,060,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,045 >>> mbox cmd response: success
2,688,977 UART:
2,688,993 UART: Running Caliptra FMC ...
2,689,401 UART:
2,689,544 UART: [state] CFI Enabled
2,700,173 UART: [fht] FMC Alias Private Key: 7
2,807,560 UART: [art] Extend RT PCRs Done
2,807,988 UART: [art] Lock RT PCRs Done
2,809,582 UART: [art] Populate DV Done
2,817,673 UART: [fht] FMC Alias Private Key: 7
2,818,791 UART: [art] Derive CDI
2,819,071 UART: [art] Store in in slot 0x4
2,904,822 UART: [art] Derive Key Pair
2,905,182 UART: [art] Store priv key in slot 0x5
2,918,882 UART: [art] Derive Key Pair - Done
2,933,487 UART: [art] Signing Cert with AUTHO
2,933,967 UART: RITY.KEYID = 7
2,949,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,980 UART: [art] PUB.X = BB5591BA32236421906E930B216500BD4885C4E3E7248CE74610140DA0C0656B78626ADA9EB7B2B302DDA5251B6C083F
2,956,714 UART: [art] PUB.Y = 91744BCB79A6F8DB1FAE7BFA619D2030B4C7E26E21FA1649476BFBD7283FDF747E52700FA07A44A8B3B2185E4429BD41
2,963,673 UART: [art] SIG.R = 19CA86D2CA58D115DC83B055AF52B4E08A6BC7BADEF467E7B1B7C689B7692A0CE040A0EDA38B4207FF51C44CE9209F8B
2,970,457 UART: [art] SIG.S = 274999A535B84987F00D9AE43437175356362C9732E894A9E48727B00B5F3C910E4E7B40D5099751C1ECC049B2B97334
2,994,056 UART: Caliptra RT
2,994,401 UART: [state] CFI Enabled
3,102,606 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Unprovisioned
86,381 UART: [state] DebugLocked = No
86,911 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,174,803 ready_for_fw is high
1,174,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,199,381 UART: [idev] Sha1 KeyId Algorithm
1,208,393 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,260 UART: [ldev] Erasing FE.KEYID = 1
1,243,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,830 UART: [ldev] --
1,282,262 UART: [fwproc] Wait for Commands...
1,282,909 UART: [fwproc] Recv command 0x46574c44
1,283,642 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,773 >>> mbox cmd response: success
2,774,808 UART: [afmc] ++
2,774,976 UART: [afmc] CDI.KEYID = 6
2,775,339 UART: [afmc] SUBJECT.KEYID = 7
2,775,765 UART: [afmc] AUTHORITY.KEYID = 5
2,811,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,535 UART: [afmc] --
2,854,513 UART: [cold-reset] --
2,855,349 UART: [state] Locking Datavault
2,856,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,198 UART: [state] Locking ICCM
2,857,752 UART: [exit] Launching FMC @ 0x40000130
2,863,081 UART:
2,863,097 UART: Running Caliptra FMC ...
2,863,505 UART:
2,863,559 UART: [state] CFI Enabled
2,873,980 UART: [fht] FMC Alias Private Key: 7
2,982,455 UART: [art] Extend RT PCRs Done
2,982,883 UART: [art] Lock RT PCRs Done
2,984,545 UART: [art] Populate DV Done
2,992,776 UART: [fht] FMC Alias Private Key: 7
2,993,936 UART: [art] Derive CDI
2,994,216 UART: [art] Store in in slot 0x4
3,079,777 UART: [art] Derive Key Pair
3,080,137 UART: [art] Store priv key in slot 0x5
3,093,251 UART: [art] Derive Key Pair - Done
3,108,215 UART: [art] Signing Cert with AUTHO
3,108,695 UART: RITY.KEYID = 7
3,124,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,208 UART: [art] PUB.X = 78199C6869B8A7AE2E30185E7996F98697D9BF3DCA63FE1AE5111087498CAFBF55D82566B270D3AF32240DD94A6C6AEA
3,131,983 UART: [art] PUB.Y = 0E3C3024143802ED35E536515C2A5DDAE8E961E3D974DBB3DC9F7D4301A7C90B9613D891B0A7C703B564274A8D01E2C5
3,138,919 UART: [art] SIG.R = CDCC2ECBD8AFE87E1EFB06FAE4C5DC1AD60DE7CE75DFC3CAA925663A1F17CCB0F4B87D3BECBA6E6587E513D058D2BC40
3,145,725 UART: [art] SIG.S = 2F9E6DC29BA29187824CD31FDE1FF8B9E60BAACDDC503F050FE25D3BB83EAA0EC3EAE7A4E0DA74AA402A5B640199E2C5
3,169,115 UART: Caliptra RT
3,169,368 UART: [state] CFI Enabled
3,277,325 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,668 ready_for_fw is high
1,055,668 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,637 >>> mbox cmd response: success
2,683,729 UART:
2,683,745 UART: Running Caliptra FMC ...
2,684,153 UART:
2,684,207 UART: [state] CFI Enabled
2,694,798 UART: [fht] FMC Alias Private Key: 7
2,802,771 UART: [art] Extend RT PCRs Done
2,803,199 UART: [art] Lock RT PCRs Done
2,804,731 UART: [art] Populate DV Done
2,812,902 UART: [fht] FMC Alias Private Key: 7
2,814,006 UART: [art] Derive CDI
2,814,286 UART: [art] Store in in slot 0x4
2,899,901 UART: [art] Derive Key Pair
2,900,261 UART: [art] Store priv key in slot 0x5
2,913,863 UART: [art] Derive Key Pair - Done
2,928,734 UART: [art] Signing Cert with AUTHO
2,929,214 UART: RITY.KEYID = 7
2,944,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,233 UART: [art] PUB.X = 8018C0E76F87B87FC506964B67D2B3B1C9D9D153B1E3AA302E757DB7D54816F05CA81CB3F789B18CB55F25BE79F81C4C
2,952,010 UART: [art] PUB.Y = FC6B6F2D9189DC78EF977444488F2BEE10FD1D7E5C92B0D7FD32E2B52B0D6C73C6D7767DAB65B4F6284B85B2B0ED8DA5
2,958,977 UART: [art] SIG.R = A98532DD6148084EC88E1C0F37532F5B74D3CE343FA38AFA548806F3450F890ABD43542F83AEC69E50F947B0F0D36C2B
2,965,738 UART: [art] SIG.S = F2C999444DB9B1DEFF3196BE29E4547FA8B35590CAFBFF245A8D77B4BBC723BF11FE2006497022D62B9CEAC29DFF67C6
2,989,834 UART: Caliptra RT
2,990,087 UART: [state] CFI Enabled
3,098,045 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,522 UART: [kat] SHA2-256
902,462 UART: [kat] SHA2-384
905,325 UART: [kat] SHA2-512-ACC
907,226 UART: [kat] ECC-384
917,421 UART: [kat] HMAC-384Kdf
921,843 UART: [kat] LMS
1,170,155 UART: [kat] --
1,171,122 UART: [cold-reset] ++
1,171,676 UART: [fht] FHT @ 0x50003400
1,174,354 UART: [idev] ++
1,174,522 UART: [idev] CDI.KEYID = 6
1,174,883 UART: [idev] SUBJECT.KEYID = 7
1,175,308 UART: [idev] UDS.KEYID = 0
1,175,654 ready_for_fw is high
1,175,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,532 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,497 UART: [ldev] ++
1,210,665 UART: [ldev] CDI.KEYID = 6
1,211,029 UART: [ldev] SUBJECT.KEYID = 5
1,211,456 UART: [ldev] AUTHORITY.KEYID = 7
1,211,919 UART: [ldev] FE.KEYID = 1
1,217,151 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,901 UART: [ldev] --
1,283,401 UART: [fwproc] Wait for Commands...
1,284,164 UART: [fwproc] Recv command 0x46574c44
1,284,897 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,850 >>> mbox cmd response: success
2,775,885 UART: [afmc] ++
2,776,053 UART: [afmc] CDI.KEYID = 6
2,776,416 UART: [afmc] SUBJECT.KEYID = 7
2,776,842 UART: [afmc] AUTHORITY.KEYID = 5
2,812,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,467 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,390 UART: [afmc] --
2,856,476 UART: [cold-reset] --
2,857,254 UART: [state] Locking Datavault
2,858,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,991 UART: [state] Locking ICCM
2,859,615 UART: [exit] Launching FMC @ 0x40000130
2,864,944 UART:
2,864,960 UART: Running Caliptra FMC ...
2,865,368 UART:
2,865,511 UART: [state] CFI Enabled
2,876,046 UART: [fht] FMC Alias Private Key: 7
2,983,781 UART: [art] Extend RT PCRs Done
2,984,209 UART: [art] Lock RT PCRs Done
2,985,941 UART: [art] Populate DV Done
2,994,354 UART: [fht] FMC Alias Private Key: 7
2,995,460 UART: [art] Derive CDI
2,995,740 UART: [art] Store in in slot 0x4
3,081,373 UART: [art] Derive Key Pair
3,081,733 UART: [art] Store priv key in slot 0x5
3,093,939 UART: [art] Derive Key Pair - Done
3,108,606 UART: [art] Signing Cert with AUTHO
3,109,086 UART: RITY.KEYID = 7
3,124,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,253 UART: [art] PUB.X = AF482E9A9B6789E22010E1F98762BF50045DD5AABF0DE366B09EDCE6FC0E7A97C7DFC98F966AB0467AC2466D958722CB
3,132,030 UART: [art] PUB.Y = EDCC16C6BD874D235B72258A2F8D50C2EF87B559A8F1E5F038D4C3952806951D45D76889E33B2435F34E0255BF7B63B7
3,138,976 UART: [art] SIG.R = 1727B0AC8C1BD35529C94D833F9F62D2CF34D801F2514357298F45297A2ACF1374052A1E8DBC8DADF13627A2D8F560F0
3,145,744 UART: [art] SIG.S = 4742FEEA7D5D36A512A820EE7FBDCA4CF828D514752810B32461695CF14651419AF7915F4320FD37E0B448B9A2FEDF82
3,169,443 UART: Caliptra RT
3,169,788 UART: [state] CFI Enabled
3,278,237 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,003 ready_for_fw is high
1,056,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,521 >>> mbox cmd response: success
2,685,087 UART:
2,685,103 UART: Running Caliptra FMC ...
2,685,511 UART:
2,685,654 UART: [state] CFI Enabled
2,696,459 UART: [fht] FMC Alias Private Key: 7
2,804,206 UART: [art] Extend RT PCRs Done
2,804,634 UART: [art] Lock RT PCRs Done
2,806,452 UART: [art] Populate DV Done
2,814,825 UART: [fht] FMC Alias Private Key: 7
2,815,771 UART: [art] Derive CDI
2,816,051 UART: [art] Store in in slot 0x4
2,901,860 UART: [art] Derive Key Pair
2,902,220 UART: [art] Store priv key in slot 0x5
2,915,162 UART: [art] Derive Key Pair - Done
2,929,742 UART: [art] Signing Cert with AUTHO
2,930,222 UART: RITY.KEYID = 7
2,945,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,393 UART: [art] PUB.X = D247CDC9FB8EF1EB8274EACC7EA7BF78BB536E0703C2DF0425EE26B4E89D11076A65FEAB1665F730DF3E8DF00CCBE831
2,953,174 UART: [art] PUB.Y = 6C63669F6E2137E83A0163A984F7D34C20AD8DB293505A2D158F3B241DEDC697B7575BA24543D07837B1256684028E9F
2,960,112 UART: [art] SIG.R = 4782A3B1FC9BA79A8F57E32277841A6A9FAD853D508984B5BE144D028AC9C9ABDE47DAEAE185BE74A1B61140E33F9A88
2,966,893 UART: [art] SIG.S = 4FC2B804E0FB9D1815A9A600D7FD07020AA49E91FCF5CB5A0A625EBFE9C87EFE2F81F19D946AAEDDA376A76A81F3F88E
2,990,101 UART: Caliptra RT
2,990,446 UART: [state] CFI Enabled
3,099,579 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
Truncated 1358290 bytes from beginning
8 UART: [art] Store in in slot 0x4
1,717,287,499 UART: [art] Derive Key Pair
1,717,287,859 UART: [art] Store priv key in slot 0x5
1,717,301,451 UART: [art] Derive Key Pair - Done
1,717,316,088 UART: [art] Signing Cert with AUTHO
1,717,316,568 UART: RITY.KEYID = 7
1,717,331,920 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,332,685 UART: [art] PUB.X = 28A4C1DE3020F46843C9E91C0350DA2BF5D2B8721F497522911BCBFC34DBA52B88EA688E97C3FE2E4D6E5825B37C1B72
1,717,339,462 UART: [art] PUB.Y = E088F427C65944D795666E53B0BE69F6763CF4133E8ECC7962B29C230ED57D1F1262468D500236ADED6B0F160C51CCF8
1,717,346,402 UART: [art] SIG.R = B167EA76456789A83013A0ACCFA7F571353B3134B26E1A9B8CEBDEED5831751E2F73D799559FE8DE6A19A94768FB2E76
1,717,353,180 UART: [art] SIG.S = FD6397065AAB5F04FC49E6B8470750F757D4A4576E701939D5920715464A6AE74C4D10C20254D7BE01C0D524DA3D232E
1,717,376,693 UART: Caliptra RT
1,717,376,946 UART: [state] CFI Enabled
1,717,655,860 UART: [rt] RT listening for mailbox commands...
1,717,656,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,717,657,430 UART:
1,717,657,446 UART: Running Caliptra ROM ...
1,717,657,854 UART:
1,717,657,908 UART: [state] CFI Enabled
1,717,660,836 UART: [state] LifecycleState = Unprovisioned
1,717,661,491 UART: [state] DebugLocked = No
1,717,662,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,717,663,756 UART: [kat] SHA2-256
1,718,457,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,718,461,802 UART: [kat] ++
1,718,461,954 UART: [kat] sha1
1,718,466,176 UART: [kat] SHA2-256
1,718,468,114 UART: [kat] SHA2-384
1,718,470,859 UART: [kat] SHA2-512-ACC
1,718,472,759 UART: [kat] ECC-384
1,718,478,394 UART: [kat] HMAC-384Kdf
1,718,482,946 UART: [kat] LMS
1,719,051,142 UART: [kat] --
1,719,052,023 UART: [update-reset] ++
1,720,386,395 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,720,387,655 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,720,537,531 >>> mbox cmd response: success
1,720,537,722 UART: [update-reset] Copying MAN_2 To MAN_1
1,720,545,736 UART: [update-reset Success] --
1,720,546,621 UART: [state] Locking Datavault
1,720,547,301 UART: [state] Locking PCR0, PCR1 and PCR31
1,720,547,905 UART: [state] Locking ICCM
1,720,548,381 UART: [exit] Launching FMC @ 0x40000130
1,720,553,710 UART:
1,720,553,726 UART: Running Caliptra FMC ...
1,720,554,134 UART:
1,720,554,188 UART: [state] CFI Enabled
1,720,643,203 UART: [art] Extend RT PCRs Done
1,720,643,631 UART: [art] Lock RT PCRs Done
1,720,644,908 UART: [art] Populate DV Done
1,720,652,989 UART: [fht] FMC Alias Private Key: 7
1,720,654,053 UART: [art] Derive CDI
1,720,654,333 UART: [art] Store in in slot 0x4
1,720,740,154 UART: [art] Derive Key Pair
1,720,740,514 UART: [art] Store priv key in slot 0x5
1,720,753,588 UART: [art] Derive Key Pair - Done
1,720,768,503 UART: [art] Signing Cert with AUTHO
1,720,768,983 UART: RITY.KEYID = 7
1,720,784,083 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,784,848 UART: [art] PUB.X = B8F26E0C34102254F5A85AA3B4D4E99316AC44C13E057D840F2F6F2B972789AB53B58B32702F5C5172F5253D2C1F7AC1
1,720,791,611 UART: [art] PUB.Y = 920BD887DA0F870189A1BB0E099E04CAD5D4449C661F0381181E823722B68C505D03A263873D380F1277D2A6607E9F9B
1,720,798,528 UART: [art] SIG.R = 90E22106CE7BC388C23271C4A78AD6312A8B46109D1F5D6119AC49B774F92F8A16A2352430068ED9C7DD21C0CEC73F04
1,720,805,291 UART: [art] SIG.S = 965A1A8897D7D25B46C74E574AF0BAD8B1B074D8443B2E3BA6918514416E74E4F9C292FADBA0245CB08BAC6C339CDFBB
1,720,829,172 UART: Caliptra RT
1,720,829,425 UART: [state] CFI Enabled
1,721,108,173 UART: [rt] RT listening for mailbox commands...
1,721,108,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,109,803 UART:
1,721,109,819 UART: Running Caliptra ROM ...
1,721,110,227 UART:
1,721,110,281 UART: [state] CFI Enabled
1,721,113,039 UART: [state] LifecycleState = Unprovisioned
1,721,113,694 UART: [state] DebugLocked = No
1,721,114,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,115,765 UART: [kat] SHA2-256
1,721,909,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,721,913,811 UART: [kat] ++
1,721,913,963 UART: [kat] sha1
1,721,918,189 UART: [kat] SHA2-256
1,721,920,127 UART: [kat] SHA2-384
1,721,922,862 UART: [kat] SHA2-512-ACC
1,721,924,762 UART: [kat] ECC-384
1,721,930,509 UART: [kat] HMAC-384Kdf
1,721,934,967 UART: [kat] LMS
1,722,503,163 UART: [kat] --
1,722,504,172 UART: [update-reset] ++
1,723,838,880 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,723,840,168 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,723,990,044 >>> mbox cmd response: success
1,723,990,181 UART: [update-reset] Copying MAN_2 To MAN_1
1,723,998,195 UART: [update-reset Success] --
1,723,999,040 UART: [state] Locking Datavault
1,723,999,876 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,000,480 UART: [state] Locking ICCM
1,724,001,146 UART: [exit] Launching FMC @ 0x40000130
1,724,006,475 UART:
1,724,006,491 UART: Running Caliptra FMC ...
1,724,006,899 UART:
1,724,006,953 UART: [state] CFI Enabled
1,724,095,868 UART: [art] Extend RT PCRs Done
1,724,096,296 UART: [art] Lock RT PCRs Done
1,724,097,567 UART: [art] Populate DV Done
1,724,105,484 UART: [fht] FMC Alias Private Key: 7
1,724,106,422 UART: [art] Derive CDI
1,724,106,702 UART: [art] Store in in slot 0x4
1,724,192,315 UART: [art] Derive Key Pair
1,724,192,675 UART: [art] Store priv key in slot 0x5
1,724,205,591 UART: [art] Derive Key Pair - Done
1,724,220,580 UART: [art] Signing Cert with AUTHO
1,724,221,060 UART: RITY.KEYID = 7
1,724,236,444 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,237,209 UART: [art] PUB.X = 28A4C1DE3020F46843C9E91C0350DA2BF5D2B8721F497522911BCBFC34DBA52B88EA688E97C3FE2E4D6E5825B37C1B72
1,724,243,986 UART: [art] PUB.Y = E088F427C65944D795666E53B0BE69F6763CF4133E8ECC7962B29C230ED57D1F1262468D500236ADED6B0F160C51CCF8
1,724,250,926 UART: [art] SIG.R = B167EA76456789A83013A0ACCFA7F571353B3134B26E1A9B8CEBDEED5831751E2F73D799559FE8DE6A19A94768FB2E76
1,724,257,704 UART: [art] SIG.S = FD6397065AAB5F04FC49E6B8470750F757D4A4576E701939D5920715464A6AE74C4D10C20254D7BE01C0D524DA3D232E
1,724,281,295 UART: Caliptra RT
1,724,281,548 UART: [state] CFI Enabled
1,724,560,818 UART: [rt] RT listening for mailbox commands...
1,724,561,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,724,562,420 UART:
1,724,562,436 UART: Running Caliptra ROM ...
1,724,562,844 UART:
1,724,562,898 UART: [state] CFI Enabled
1,724,565,920 UART: [state] LifecycleState = Unprovisioned
1,724,566,575 UART: [state] DebugLocked = No
1,724,567,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,724,568,720 UART: [kat] SHA2-256
1,725,362,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,725,366,766 UART: [kat] ++
1,725,366,918 UART: [kat] sha1
1,725,371,074 UART: [kat] SHA2-256
1,725,373,012 UART: [kat] SHA2-384
1,725,375,835 UART: [kat] SHA2-512-ACC
1,725,377,735 UART: [kat] ECC-384
1,725,383,324 UART: [kat] HMAC-384Kdf
1,725,387,792 UART: [kat] LMS
1,725,955,988 UART: [kat] --
1,725,956,719 UART: [update-reset] ++
1,727,290,943 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,292,167 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,727,442,043 >>> mbox cmd response: success
1,727,442,228 UART: [update-reset] Copying MAN_2 To MAN_1
1,727,450,242 UART: [update-reset Success] --
1,727,451,185 UART: [state] Locking Datavault
1,727,452,071 UART: [state] Locking PCR0, PCR1 and PCR31
1,727,452,675 UART: [state] Locking ICCM
1,727,453,125 UART: [exit] Launching FMC @ 0x40000130
1,727,458,454 UART:
1,727,458,470 UART: Running Caliptra FMC ...
1,727,458,878 UART:
1,727,458,932 UART: [state] CFI Enabled
1,727,547,961 UART: [art] Extend RT PCRs Done
1,727,548,389 UART: [art] Lock RT PCRs Done
1,727,549,302 UART: [art] Populate DV Done
1,727,557,613 UART: [fht] FMC Alias Private Key: 7
1,727,558,697 UART: [art] Derive CDI
1,727,558,977 UART: [art] Store in in slot 0x4
1,727,644,882 UART: [art] Derive Key Pair
1,727,645,242 UART: [art] Store priv key in slot 0x5
1,727,658,572 UART: [art] Derive Key Pair - Done
1,727,673,083 UART: [art] Signing Cert with AUTHO
1,727,673,563 UART: RITY.KEYID = 7
1,727,688,923 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,689,688 UART: [art] PUB.X = B8F26E0C34102254F5A85AA3B4D4E99316AC44C13E057D840F2F6F2B972789AB53B58B32702F5C5172F5253D2C1F7AC1
1,727,696,451 UART: [art] PUB.Y = 920BD887DA0F870189A1BB0E099E04CAD5D4449C661F0381181E823722B68C505D03A263873D380F1277D2A6607E9F9B
1,727,703,368 UART: [art] SIG.R = 90E22106CE7BC388C23271C4A78AD6312A8B46109D1F5D6119AC49B774F92F8A16A2352430068ED9C7DD21C0CEC73F04
1,727,710,131 UART: [art] SIG.S = 965A1A8897D7D25B46C74E574AF0BAD8B1B074D8443B2E3BA6918514416E74E4F9C292FADBA0245CB08BAC6C339CDFBB
1,727,734,054 UART: Caliptra RT
1,727,734,307 UART: [state] CFI Enabled
1,728,014,395 UART: [rt] RT listening for mailbox commands...
1,728,015,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,015,955 UART:
1,728,015,971 UART: Running Caliptra ROM ...
1,728,016,379 UART:
1,728,016,433 UART: [state] CFI Enabled
1,728,019,307 UART: [state] LifecycleState = Unprovisioned
1,728,019,962 UART: [state] DebugLocked = No
1,728,020,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,022,219 UART: [kat] SHA2-256
1,728,816,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,728,820,265 UART: [kat] ++
1,728,820,417 UART: [kat] sha1
1,728,824,655 UART: [kat] SHA2-256
1,728,826,593 UART: [kat] SHA2-384
1,728,829,160 UART: [kat] SHA2-512-ACC
1,728,831,060 UART: [kat] ECC-384
1,728,836,531 UART: [kat] HMAC-384Kdf
1,728,841,127 UART: [kat] LMS
1,729,409,323 UART: [kat] --
1,729,410,224 UART: [update-reset] ++
1,730,745,240 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,730,746,480 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,730,896,356 >>> mbox cmd response: success
1,730,896,571 UART: [update-reset] Copying MAN_2 To MAN_1
1,730,904,585 UART: [update-reset Success] --
1,730,905,650 UART: [state] Locking Datavault
1,730,906,604 UART: [state] Locking PCR0, PCR1 and PCR31
1,730,907,208 UART: [state] Locking ICCM
1,730,907,738 UART: [exit] Launching FMC @ 0x40000130
1,730,913,067 UART:
1,730,913,083 UART: Running Caliptra FMC ...
1,730,913,491 UART:
1,730,913,545 UART: [state] CFI Enabled
1,731,002,710 UART: [art] Extend RT PCRs Done
1,731,003,138 UART: [art] Lock RT PCRs Done
1,731,004,317 UART: [art] Populate DV Done
1,731,012,412 UART: [fht] FMC Alias Private Key: 7
1,731,013,544 UART: [art] Derive CDI
1,731,013,824 UART: [art] Store in in slot 0x4
1,731,099,645 UART: [art] Derive Key Pair
1,731,100,005 UART: [art] Store priv key in slot 0x5
1,731,113,527 UART: [art] Derive Key Pair - Done
1,731,128,176 UART: [art] Signing Cert with AUTHO
1,731,128,656 UART: RITY.KEYID = 7
1,731,144,154 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,144,919 UART: [art] PUB.X = 28A4C1DE3020F46843C9E91C0350DA2BF5D2B8721F497522911BCBFC34DBA52B88EA688E97C3FE2E4D6E5825B37C1B72
1,731,151,696 UART: [art] PUB.Y = E088F427C65944D795666E53B0BE69F6763CF4133E8ECC7962B29C230ED57D1F1262468D500236ADED6B0F160C51CCF8
1,731,158,636 UART: [art] SIG.R = B167EA76456789A83013A0ACCFA7F571353B3134B26E1A9B8CEBDEED5831751E2F73D799559FE8DE6A19A94768FB2E76
1,731,165,414 UART: [art] SIG.S = FD6397065AAB5F04FC49E6B8470750F757D4A4576E701939D5920715464A6AE74C4D10C20254D7BE01C0D524DA3D232E
1,731,189,519 UART: Caliptra RT
1,731,189,772 UART: [state] CFI Enabled
1,731,471,950 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 350.74s
Truncated 734956 bytes from beginning
7 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,646,494,252 >>> mbox cmd response: success
1,646,508,169 UART:
1,646,508,185 UART: Running Caliptra FMC ...
1,646,508,593 UART:
1,646,508,647 UART: [state] CFI Enabled
1,646,597,646 UART: [art] Extend RT PCRs Done
1,646,598,074 UART: [art] Lock RT PCRs Done
1,646,599,131 UART: [art] Populate DV Done
1,646,607,448 UART: [fht] FMC Alias Private Key: 7
1,646,608,594 UART: [art] Derive CDI
1,646,608,874 UART: [art] Store in in slot 0x4
1,646,694,761 UART: [art] Derive Key Pair
1,646,695,121 UART: [art] Store priv key in slot 0x5
1,646,708,385 UART: [art] Derive Key Pair - Done
1,646,722,905 UART: [art] Signing Cert with AUTHO
1,646,723,385 UART: RITY.KEYID = 7
1,646,738,529 UART: [art] Erasing AUTHORITY.KEYID = 7
1,646,739,294 UART: [art] PUB.X = B962F0CBDD087240A25664897EB47BC46B84ECA62FD486E70D67AFC67EF8B2C7FF6007E6C9C5F39C72E5ADD278936280
1,646,746,067 UART: [art] PUB.Y = 3B070FB83E4B56A16ACE5D634D7C60295A1D16F3C71EC1686239C9379493373B700D110B4F0D21326DDEA96324239669
1,646,752,996 UART: [art] SIG.R = BB148C86B1B52B76206D871E5D4603450D8331823D674850BEE32C7E14E49767E07F318DE05A03141147C20C5A87411D
1,646,759,744 UART: [art] SIG.S = 8520F109550BAD24A08C0105D1C53271B869540430F3B9DAD56BE8A4F2D5DE88D5E79A0FAD5BC43C3A4E9A59FB963F6C
1,646,784,019 UART: Caliptra RT
1,646,784,272 UART: [state] CFI Enabled
1,647,068,084 UART: [rt] RT listening for mailbox commands...
1,647,068,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,649,831,739 >>> mbox cmd response: success
1,649,845,354 UART:
1,649,845,370 UART: Running Caliptra FMC ...
1,649,845,778 UART:
1,649,845,832 UART: [state] CFI Enabled
1,649,934,561 UART: [art] Extend RT PCRs Done
1,649,934,989 UART: [art] Lock RT PCRs Done
1,649,936,110 UART: [art] Populate DV Done
1,649,944,289 UART: [fht] FMC Alias Private Key: 7
1,649,945,315 UART: [art] Derive CDI
1,649,945,595 UART: [art] Store in in slot 0x4
1,650,031,124 UART: [art] Derive Key Pair
1,650,031,484 UART: [art] Store priv key in slot 0x5
1,650,043,754 UART: [art] Derive Key Pair - Done
1,650,058,650 UART: [art] Signing Cert with AUTHO
1,650,059,130 UART: RITY.KEYID = 7
1,650,073,932 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,074,697 UART: [art] PUB.X = 0A24C1A33933B5F970C21A803230C1FEB0781E0DE31B11959AB965CF6EC06C446475C6611B7355665663172EDE4C0055
1,650,081,433 UART: [art] PUB.Y = 74FCB579B8732D6D0F54CB6775E89DB1AB69BD55C9C01C29F4676D1AA32E6F7AC92ECBB4CBD3CD784015B9464B371984
1,650,088,394 UART: [art] SIG.R = 83E0AF7A4095BE0F7C4A396F2CA026ACCE842B3D7F795922F2ED2CDDC60B23D8FE3252FEB43075A141560D5871FF8C9F
1,650,095,171 UART: [art] SIG.S = F1C62AFB103342E62782DC610BAFCD51442D37BC55225EA345DF97F4DA0C1CFF5EC240D37AC0095BE4691C872C764EF9
1,650,118,995 UART: Caliptra RT
1,650,119,248 UART: [state] CFI Enabled
1,650,400,684 UART: [rt] RT listening for mailbox commands...
1,650,401,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,164,179 >>> mbox cmd response: success
1,653,177,474 UART:
1,653,177,490 UART: Running Caliptra FMC ...
1,653,177,898 UART:
1,653,177,952 UART: [state] CFI Enabled
1,653,266,783 UART: [art] Extend RT PCRs Done
1,653,267,211 UART: [art] Lock RT PCRs Done
1,653,268,582 UART: [art] Populate DV Done
1,653,277,047 UART: [fht] FMC Alias Private Key: 7
1,653,278,127 UART: [art] Derive CDI
1,653,278,407 UART: [art] Store in in slot 0x4
1,653,364,008 UART: [art] Derive Key Pair
1,653,364,368 UART: [art] Store priv key in slot 0x5
1,653,377,402 UART: [art] Derive Key Pair - Done
1,653,392,076 UART: [art] Signing Cert with AUTHO
1,653,392,556 UART: RITY.KEYID = 7
1,653,407,902 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,408,667 UART: [art] PUB.X = B962F0CBDD087240A25664897EB47BC46B84ECA62FD486E70D67AFC67EF8B2C7FF6007E6C9C5F39C72E5ADD278936280
1,653,415,440 UART: [art] PUB.Y = 3B070FB83E4B56A16ACE5D634D7C60295A1D16F3C71EC1686239C9379493373B700D110B4F0D21326DDEA96324239669
1,653,422,369 UART: [art] SIG.R = BB148C86B1B52B76206D871E5D4603450D8331823D674850BEE32C7E14E49767E07F318DE05A03141147C20C5A87411D
1,653,429,117 UART: [art] SIG.S = 8520F109550BAD24A08C0105D1C53271B869540430F3B9DAD56BE8A4F2D5DE88D5E79A0FAD5BC43C3A4E9A59FB963F6C
1,653,452,182 UART: Caliptra RT
1,653,452,435 UART: [state] CFI Enabled
1,653,731,265 UART: [rt] RT listening for mailbox commands...
1,653,731,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,656,493,460 >>> mbox cmd response: success
1,656,506,629 UART:
1,656,506,645 UART: Running Caliptra FMC ...
1,656,507,053 UART:
1,656,507,107 UART: [state] CFI Enabled
1,656,596,652 UART: [art] Extend RT PCRs Done
1,656,597,080 UART: [art] Lock RT PCRs Done
1,656,598,353 UART: [art] Populate DV Done
1,656,606,706 UART: [fht] FMC Alias Private Key: 7
1,656,607,716 UART: [art] Derive CDI
1,656,607,996 UART: [art] Store in in slot 0x4
1,656,693,135 UART: [art] Derive Key Pair
1,656,693,495 UART: [art] Store priv key in slot 0x5
1,656,707,133 UART: [art] Derive Key Pair - Done
1,656,721,891 UART: [art] Signing Cert with AUTHO
1,656,722,371 UART: RITY.KEYID = 7
1,656,737,271 UART: [art] Erasing AUTHORITY.KEYID = 7
1,656,738,036 UART: [art] PUB.X = 0A24C1A33933B5F970C21A803230C1FEB0781E0DE31B11959AB965CF6EC06C446475C6611B7355665663172EDE4C0055
1,656,744,772 UART: [art] PUB.Y = 74FCB579B8732D6D0F54CB6775E89DB1AB69BD55C9C01C29F4676D1AA32E6F7AC92ECBB4CBD3CD784015B9464B371984
1,656,751,733 UART: [art] SIG.R = 83E0AF7A4095BE0F7C4A396F2CA026ACCE842B3D7F795922F2ED2CDDC60B23D8FE3252FEB43075A141560D5871FF8C9F
1,656,758,510 UART: [art] SIG.S = F1C62AFB103342E62782DC610BAFCD51442D37BC55225EA345DF97F4DA0C1CFF5EC240D37AC0095BE4691C872C764EF9
1,656,782,016 UART: Caliptra RT
1,656,782,269 UART: [state] CFI Enabled
1,657,064,997 UART: [rt] RT listening for mailbox commands...
1,657,065,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,659,827,478 >>> mbox cmd response: success
1,659,840,911 UART:
1,659,840,927 UART: Running Caliptra FMC ...
1,659,841,335 UART:
1,659,841,389 UART: [state] CFI Enabled
1,659,930,114 UART: [art] Extend RT PCRs Done
1,659,930,542 UART: [art] Lock RT PCRs Done
1,659,932,035 UART: [art] Populate DV Done
1,659,940,212 UART: [fht] FMC Alias Private Key: 7
1,659,941,300 UART: [art] Derive CDI
1,659,941,580 UART: [art] Store in in slot 0x4
1,660,027,137 UART: [art] Derive Key Pair
1,660,027,497 UART: [art] Store priv key in slot 0x5
1,660,040,141 UART: [art] Derive Key Pair - Done
1,660,054,743 UART: [art] Signing Cert with AUTHO
1,660,055,223 UART: RITY.KEYID = 7
1,660,070,499 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,071,264 UART: [art] PUB.X = B962F0CBDD087240A25664897EB47BC46B84ECA62FD486E70D67AFC67EF8B2C7FF6007E6C9C5F39C72E5ADD278936280
1,660,078,037 UART: [art] PUB.Y = 3B070FB83E4B56A16ACE5D634D7C60295A1D16F3C71EC1686239C9379493373B700D110B4F0D21326DDEA96324239669
1,660,084,966 UART: [art] SIG.R = BB148C86B1B52B76206D871E5D4603450D8331823D674850BEE32C7E14E49767E07F318DE05A03141147C20C5A87411D
1,660,091,714 UART: [art] SIG.S = 8520F109550BAD24A08C0105D1C53271B869540430F3B9DAD56BE8A4F2D5DE88D5E79A0FAD5BC43C3A4E9A59FB963F6C
1,660,115,429 UART: Caliptra RT
1,660,115,682 UART: [state] CFI Enabled
1,660,398,410 UART: [rt] RT listening for mailbox commands...
1,660,399,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,161,159 >>> mbox cmd response: success
1,663,174,414 UART:
1,663,174,430 UART: Running Caliptra FMC ...
1,663,174,838 UART:
1,663,174,892 UART: [state] CFI Enabled
1,663,263,893 UART: [art] Extend RT PCRs Done
1,663,264,321 UART: [art] Lock RT PCRs Done
1,663,265,450 UART: [art] Populate DV Done
1,663,273,525 UART: [fht] FMC Alias Private Key: 7
1,663,274,597 UART: [art] Derive CDI
1,663,274,877 UART: [art] Store in in slot 0x4
1,663,360,410 UART: [art] Derive Key Pair
1,663,360,770 UART: [art] Store priv key in slot 0x5
1,663,373,672 UART: [art] Derive Key Pair - Done
1,663,388,610 UART: [art] Signing Cert with AUTHO
1,663,389,090 UART: RITY.KEYID = 7
1,663,404,258 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,405,023 UART: [art] PUB.X = 0A24C1A33933B5F970C21A803230C1FEB0781E0DE31B11959AB965CF6EC06C446475C6611B7355665663172EDE4C0055
1,663,411,759 UART: [art] PUB.Y = 74FCB579B8732D6D0F54CB6775E89DB1AB69BD55C9C01C29F4676D1AA32E6F7AC92ECBB4CBD3CD784015B9464B371984
1,663,418,720 UART: [art] SIG.R = 83E0AF7A4095BE0F7C4A396F2CA026ACCE842B3D7F795922F2ED2CDDC60B23D8FE3252FEB43075A141560D5871FF8C9F
1,663,425,497 UART: [art] SIG.S = F1C62AFB103342E62782DC610BAFCD51442D37BC55225EA345DF97F4DA0C1CFF5EC240D37AC0095BE4691C872C764EF9
1,663,449,423 UART: Caliptra RT
1,663,449,676 UART: [state] CFI Enabled
1,663,731,534 UART: [rt] RT listening for mailbox commands...
1,663,732,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,666,494,267 >>> mbox cmd response: success
1,666,507,812 UART:
1,666,507,828 UART: Running Caliptra FMC ...
1,666,508,236 UART:
1,666,508,290 UART: [state] CFI Enabled
1,666,596,573 UART: [art] Extend RT PCRs Done
1,666,597,001 UART: [art] Lock RT PCRs Done
1,666,598,252 UART: [art] Populate DV Done
1,666,606,423 UART: [fht] FMC Alias Private Key: 7
1,666,607,395 UART: [art] Derive CDI
1,666,607,675 UART: [art] Store in in slot 0x4
1,666,692,968 UART: [art] Derive Key Pair
1,666,693,328 UART: [art] Store priv key in slot 0x5
1,666,706,862 UART: [art] Derive Key Pair - Done
1,666,721,580 UART: [art] Signing Cert with AUTHO
1,666,722,060 UART: RITY.KEYID = 7
1,666,737,330 UART: [art] Erasing AUTHORITY.KEYID = 7
1,666,738,095 UART: [art] PUB.X = B962F0CBDD087240A25664897EB47BC46B84ECA62FD486E70D67AFC67EF8B2C7FF6007E6C9C5F39C72E5ADD278936280
1,666,744,868 UART: [art] PUB.Y = 3B070FB83E4B56A16ACE5D634D7C60295A1D16F3C71EC1686239C9379493373B700D110B4F0D21326DDEA96324239669
1,666,751,797 UART: [art] SIG.R = BB148C86B1B52B76206D871E5D4603450D8331823D674850BEE32C7E14E49767E07F318DE05A03141147C20C5A87411D
1,666,758,545 UART: [art] SIG.S = 8520F109550BAD24A08C0105D1C53271B869540430F3B9DAD56BE8A4F2D5DE88D5E79A0FAD5BC43C3A4E9A59FB963F6C
1,666,782,068 UART: Caliptra RT
1,666,782,321 UART: [state] CFI Enabled
1,667,066,133 UART: [rt] RT listening for mailbox commands...
1,667,066,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,669,828,402 >>> mbox cmd response: success
1,669,841,515 UART:
1,669,841,531 UART: Running Caliptra FMC ...
1,669,841,939 UART:
1,669,841,993 UART: [state] CFI Enabled
1,669,931,112 UART: [art] Extend RT PCRs Done
1,669,931,540 UART: [art] Lock RT PCRs Done
1,669,932,631 UART: [art] Populate DV Done
1,669,940,894 UART: [fht] FMC Alias Private Key: 7
1,669,941,958 UART: [art] Derive CDI
1,669,942,238 UART: [art] Store in in slot 0x4
1,670,028,071 UART: [art] Derive Key Pair
1,670,028,431 UART: [art] Store priv key in slot 0x5
1,670,041,559 UART: [art] Derive Key Pair - Done
1,670,056,337 UART: [art] Signing Cert with AUTHO
1,670,056,817 UART: RITY.KEYID = 7
1,670,071,405 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,072,170 UART: [art] PUB.X = 0A24C1A33933B5F970C21A803230C1FEB0781E0DE31B11959AB965CF6EC06C446475C6611B7355665663172EDE4C0055
1,670,078,906 UART: [art] PUB.Y = 74FCB579B8732D6D0F54CB6775E89DB1AB69BD55C9C01C29F4676D1AA32E6F7AC92ECBB4CBD3CD784015B9464B371984
1,670,085,867 UART: [art] SIG.R = 83E0AF7A4095BE0F7C4A396F2CA026ACCE842B3D7F795922F2ED2CDDC60B23D8FE3252FEB43075A141560D5871FF8C9F
1,670,092,644 UART: [art] SIG.S = F1C62AFB103342E62782DC610BAFCD51442D37BC55225EA345DF97F4DA0C1CFF5EC240D37AC0095BE4691C872C764EF9
1,670,117,116 UART: Caliptra RT
1,670,117,369 UART: [state] CFI Enabled
1,670,399,991 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 330.15s
Truncated 1358308 bytes from beginning
7 UART: [art] Store in in slot 0x4
1,717,964,454 UART: [art] Derive Key Pair
1,717,964,814 UART: [art] Store priv key in slot 0x5
1,717,977,794 UART: [art] Derive Key Pair - Done
1,717,992,456 UART: [art] Signing Cert with AUTHO
1,717,992,936 UART: RITY.KEYID = 7
1,718,007,984 UART: [art] Erasing AUTHORITY.KEYID = 7
1,718,008,749 UART: [art] PUB.X = B83F712F8811925490D4A95034CB89BD691DFCC5FB3893D9AB9E217EB6ACDEDDA6BADEFFD6D7456E8153C19F94383B90
1,718,015,537 UART: [art] PUB.Y = 463B069A742B7EC2C305FD82BAC14A24F11544F19728791B4A84F43ED709274686E84CF15C4312978C5FFEAC0F4F7244
1,718,022,475 UART: [art] SIG.R = 460C58E65CB5CA5CDAFE7D3C5253F166A7ACA2BB49B478547084B779A51C05467E239DB12635996DCE681020299910BC
1,718,029,241 UART: [art] SIG.S = 9644B43B06DA4A879AF1649897BD919CCA3E2B1DC2C90DD5CF6506FEBFDEEBF0524968B13ABBF5A5F83B4258B9332E5C
1,718,053,327 UART: Caliptra RT
1,718,053,672 UART: [state] CFI Enabled
1,718,332,387 UART: [rt] RT listening for mailbox commands...
1,718,333,057 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,334,303 UART:
1,718,334,319 UART: Running Caliptra ROM ...
1,718,334,727 UART:
1,718,334,868 UART: [state] CFI Enabled
1,718,337,868 UART: [state] LifecycleState = Unprovisioned
1,718,338,523 UART: [state] DebugLocked = No
1,718,339,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,340,600 UART: [kat] SHA2-256
1,719,134,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,138,646 UART: [kat] ++
1,719,138,798 UART: [kat] sha1
1,719,143,120 UART: [kat] SHA2-256
1,719,145,058 UART: [kat] SHA2-384
1,719,147,831 UART: [kat] SHA2-512-ACC
1,719,149,731 UART: [kat] ECC-384
1,719,155,274 UART: [kat] HMAC-384Kdf
1,719,159,962 UART: [kat] LMS
1,719,728,158 UART: [kat] --
1,719,728,953 UART: [update-reset] ++
1,721,063,335 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,064,531 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,721,214,407 >>> mbox cmd response: success
1,721,214,764 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,222,778 UART: [update-reset Success] --
1,721,223,707 UART: [state] Locking Datavault
1,721,224,505 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,225,109 UART: [state] Locking ICCM
1,721,225,767 UART: [exit] Launching FMC @ 0x40000130
1,721,231,096 UART:
1,721,231,112 UART: Running Caliptra FMC ...
1,721,231,520 UART:
1,721,231,663 UART: [state] CFI Enabled
1,721,320,902 UART: [art] Extend RT PCRs Done
1,721,321,330 UART: [art] Lock RT PCRs Done
1,721,322,255 UART: [art] Populate DV Done
1,721,330,638 UART: [fht] FMC Alias Private Key: 7
1,721,331,664 UART: [art] Derive CDI
1,721,331,944 UART: [art] Store in in slot 0x4
1,721,417,409 UART: [art] Derive Key Pair
1,721,417,769 UART: [art] Store priv key in slot 0x5
1,721,430,517 UART: [art] Derive Key Pair - Done
1,721,445,230 UART: [art] Signing Cert with AUTHO
1,721,445,710 UART: RITY.KEYID = 7
1,721,460,668 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,461,433 UART: [art] PUB.X = A533BCA922DF5F6EFE2A50B4B5301C22660D1132DDFB34349765C16E72DEB864CD2AFFEA0615ED74F99B9B5989158E02
1,721,468,206 UART: [art] PUB.Y = A903F1E1D00B61B760F5DF0ABFAE721B5CE4E3B17D14817105BDE15839C45E5CDD9769A6EEAF578D560B1D7354413DDC
1,721,475,157 UART: [art] SIG.R = 944C6F2FBC7AE08E03824ACCB245D3EA4D7D76ABC3DD796B0C91A9EE7F2CD705A659454F6A6C764B1E1DAC53A1E85B32
1,721,481,940 UART: [art] SIG.S = 8C9A092D6378718F572B98A0A04CD53BD462FC3C57868C0BA5E17827563FE7BD84373A4175995E64971339A18D83C3E1
1,721,505,743 UART: Caliptra RT
1,721,506,088 UART: [state] CFI Enabled
1,721,789,380 UART: [rt] RT listening for mailbox commands...
1,721,790,050 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,790,814 UART:
1,721,790,830 UART: Running Caliptra ROM ...
1,721,791,238 UART:
1,721,791,379 UART: [state] CFI Enabled
1,721,794,495 UART: [state] LifecycleState = Unprovisioned
1,721,795,150 UART: [state] DebugLocked = No
1,721,795,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,797,297 UART: [kat] SHA2-256
1,722,591,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,595,343 UART: [kat] ++
1,722,595,495 UART: [kat] sha1
1,722,599,735 UART: [kat] SHA2-256
1,722,601,673 UART: [kat] SHA2-384
1,722,604,498 UART: [kat] SHA2-512-ACC
1,722,606,398 UART: [kat] ECC-384
1,722,612,177 UART: [kat] HMAC-384Kdf
1,722,616,917 UART: [kat] LMS
1,723,185,113 UART: [kat] --
1,723,186,020 UART: [update-reset] ++
1,724,521,320 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,724,522,386 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,724,672,262 >>> mbox cmd response: success
1,724,672,463 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,680,477 UART: [update-reset Success] --
1,724,681,498 UART: [state] Locking Datavault
1,724,682,428 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,683,032 UART: [state] Locking ICCM
1,724,683,592 UART: [exit] Launching FMC @ 0x40000130
1,724,688,921 UART:
1,724,688,937 UART: Running Caliptra FMC ...
1,724,689,345 UART:
1,724,689,488 UART: [state] CFI Enabled
1,724,779,127 UART: [art] Extend RT PCRs Done
1,724,779,555 UART: [art] Lock RT PCRs Done
1,724,781,088 UART: [art] Populate DV Done
1,724,789,287 UART: [fht] FMC Alias Private Key: 7
1,724,790,435 UART: [art] Derive CDI
1,724,790,715 UART: [art] Store in in slot 0x4
1,724,876,338 UART: [art] Derive Key Pair
1,724,876,698 UART: [art] Store priv key in slot 0x5
1,724,889,580 UART: [art] Derive Key Pair - Done
1,724,904,390 UART: [art] Signing Cert with AUTHO
1,724,904,870 UART: RITY.KEYID = 7
1,724,919,808 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,920,573 UART: [art] PUB.X = B83F712F8811925490D4A95034CB89BD691DFCC5FB3893D9AB9E217EB6ACDEDDA6BADEFFD6D7456E8153C19F94383B90
1,724,927,361 UART: [art] PUB.Y = 463B069A742B7EC2C305FD82BAC14A24F11544F19728791B4A84F43ED709274686E84CF15C4312978C5FFEAC0F4F7244
1,724,934,299 UART: [art] SIG.R = 460C58E65CB5CA5CDAFE7D3C5253F166A7ACA2BB49B478547084B779A51C05467E239DB12635996DCE681020299910BC
1,724,941,065 UART: [art] SIG.S = 9644B43B06DA4A879AF1649897BD919CCA3E2B1DC2C90DD5CF6506FEBFDEEBF0524968B13ABBF5A5F83B4258B9332E5C
1,724,964,747 UART: Caliptra RT
1,724,965,092 UART: [state] CFI Enabled
1,725,244,989 UART: [rt] RT listening for mailbox commands...
1,725,245,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,246,709 UART:
1,725,246,725 UART: Running Caliptra ROM ...
1,725,247,133 UART:
1,725,247,274 UART: [state] CFI Enabled
1,725,250,050 UART: [state] LifecycleState = Unprovisioned
1,725,250,705 UART: [state] DebugLocked = No
1,725,251,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,252,914 UART: [kat] SHA2-256
1,726,046,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,050,960 UART: [kat] ++
1,726,051,112 UART: [kat] sha1
1,726,055,518 UART: [kat] SHA2-256
1,726,057,456 UART: [kat] SHA2-384
1,726,060,149 UART: [kat] SHA2-512-ACC
1,726,062,049 UART: [kat] ECC-384
1,726,067,746 UART: [kat] HMAC-384Kdf
1,726,072,340 UART: [kat] LMS
1,726,640,536 UART: [kat] --
1,726,641,179 UART: [update-reset] ++
1,727,976,457 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,977,641 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,728,127,517 >>> mbox cmd response: success
1,728,127,786 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,135,800 UART: [update-reset Success] --
1,728,136,733 UART: [state] Locking Datavault
1,728,137,497 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,138,101 UART: [state] Locking ICCM
1,728,138,775 UART: [exit] Launching FMC @ 0x40000130
1,728,144,104 UART:
1,728,144,120 UART: Running Caliptra FMC ...
1,728,144,528 UART:
1,728,144,671 UART: [state] CFI Enabled
1,728,233,624 UART: [art] Extend RT PCRs Done
1,728,234,052 UART: [art] Lock RT PCRs Done
1,728,235,405 UART: [art] Populate DV Done
1,728,243,776 UART: [fht] FMC Alias Private Key: 7
1,728,244,870 UART: [art] Derive CDI
1,728,245,150 UART: [art] Store in in slot 0x4
1,728,330,479 UART: [art] Derive Key Pair
1,728,330,839 UART: [art] Store priv key in slot 0x5
1,728,343,575 UART: [art] Derive Key Pair - Done
1,728,358,306 UART: [art] Signing Cert with AUTHO
1,728,358,786 UART: RITY.KEYID = 7
1,728,373,916 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,374,681 UART: [art] PUB.X = A533BCA922DF5F6EFE2A50B4B5301C22660D1132DDFB34349765C16E72DEB864CD2AFFEA0615ED74F99B9B5989158E02
1,728,381,454 UART: [art] PUB.Y = A903F1E1D00B61B760F5DF0ABFAE721B5CE4E3B17D14817105BDE15839C45E5CDD9769A6EEAF578D560B1D7354413DDC
1,728,388,405 UART: [art] SIG.R = 944C6F2FBC7AE08E03824ACCB245D3EA4D7D76ABC3DD796B0C91A9EE7F2CD705A659454F6A6C764B1E1DAC53A1E85B32
1,728,395,188 UART: [art] SIG.S = 8C9A092D6378718F572B98A0A04CD53BD462FC3C57868C0BA5E17827563FE7BD84373A4175995E64971339A18D83C3E1
1,728,418,195 UART: Caliptra RT
1,728,418,540 UART: [state] CFI Enabled
1,728,694,450 UART: [rt] RT listening for mailbox commands...
1,728,695,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,696,300 UART:
1,728,696,316 UART: Running Caliptra ROM ...
1,728,696,724 UART:
1,728,696,865 UART: [state] CFI Enabled
1,728,699,857 UART: [state] LifecycleState = Unprovisioned
1,728,700,512 UART: [state] DebugLocked = No
1,728,701,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,702,729 UART: [kat] SHA2-256
1,729,496,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,729,500,775 UART: [kat] ++
1,729,500,927 UART: [kat] sha1
1,729,505,259 UART: [kat] SHA2-256
1,729,507,197 UART: [kat] SHA2-384
1,729,509,814 UART: [kat] SHA2-512-ACC
1,729,511,714 UART: [kat] ECC-384
1,729,517,413 UART: [kat] HMAC-384Kdf
1,729,522,005 UART: [kat] LMS
1,730,090,201 UART: [kat] --
1,730,091,106 UART: [update-reset] ++
1,731,426,000 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,731,427,162 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,731,577,038 >>> mbox cmd response: success
1,731,577,327 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,585,341 UART: [update-reset Success] --
1,731,586,192 UART: [state] Locking Datavault
1,731,587,144 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,587,748 UART: [state] Locking ICCM
1,731,588,194 UART: [exit] Launching FMC @ 0x40000130
1,731,593,523 UART:
1,731,593,539 UART: Running Caliptra FMC ...
1,731,593,947 UART:
1,731,594,090 UART: [state] CFI Enabled
1,731,683,159 UART: [art] Extend RT PCRs Done
1,731,683,587 UART: [art] Lock RT PCRs Done
1,731,684,890 UART: [art] Populate DV Done
1,731,693,115 UART: [fht] FMC Alias Private Key: 7
1,731,694,173 UART: [art] Derive CDI
1,731,694,453 UART: [art] Store in in slot 0x4
1,731,780,082 UART: [art] Derive Key Pair
1,731,780,442 UART: [art] Store priv key in slot 0x5
1,731,794,060 UART: [art] Derive Key Pair - Done
1,731,808,524 UART: [art] Signing Cert with AUTHO
1,731,809,004 UART: RITY.KEYID = 7
1,731,823,920 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,824,685 UART: [art] PUB.X = B83F712F8811925490D4A95034CB89BD691DFCC5FB3893D9AB9E217EB6ACDEDDA6BADEFFD6D7456E8153C19F94383B90
1,731,831,473 UART: [art] PUB.Y = 463B069A742B7EC2C305FD82BAC14A24F11544F19728791B4A84F43ED709274686E84CF15C4312978C5FFEAC0F4F7244
1,731,838,411 UART: [art] SIG.R = 460C58E65CB5CA5CDAFE7D3C5253F166A7ACA2BB49B478547084B779A51C05467E239DB12635996DCE681020299910BC
1,731,845,177 UART: [art] SIG.S = 9644B43B06DA4A879AF1649897BD919CCA3E2B1DC2C90DD5CF6506FEBFDEEBF0524968B13ABBF5A5F83B4258B9332E5C
1,731,869,369 UART: Caliptra RT
1,731,869,714 UART: [state] CFI Enabled
1,732,153,041 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 339.85s
Truncated 735002 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,008,824 >>> mbox cmd response: success
1,647,022,293 UART:
1,647,022,309 UART: Running Caliptra FMC ...
1,647,022,717 UART:
1,647,022,860 UART: [state] CFI Enabled
1,647,111,979 UART: [art] Extend RT PCRs Done
1,647,112,407 UART: [art] Lock RT PCRs Done
1,647,113,948 UART: [art] Populate DV Done
1,647,122,215 UART: [fht] FMC Alias Private Key: 7
1,647,123,323 UART: [art] Derive CDI
1,647,123,603 UART: [art] Store in in slot 0x4
1,647,209,002 UART: [art] Derive Key Pair
1,647,209,362 UART: [art] Store priv key in slot 0x5
1,647,222,640 UART: [art] Derive Key Pair - Done
1,647,237,245 UART: [art] Signing Cert with AUTHO
1,647,237,725 UART: RITY.KEYID = 7
1,647,253,143 UART: [art] Erasing AUTHORITY.KEYID = 7
1,647,253,908 UART: [art] PUB.X = 352D79E093706E21A9D533E1419EF620E875F000CF15D2FA6D91929CB86913A0B125FA98119A5626DAFD0FF366670D7A
1,647,260,650 UART: [art] PUB.Y = EA7ED49A0166A6F28E43D68DDDC07D8687D1A7DAFA59E2D649EF1E2CB5B4789527F799733ED9E06481B371D081CBF6ED
1,647,267,613 UART: [art] SIG.R = A5A2E602BA026ED5F6E48B6047A81F070472C19702437AC7A93CCE242F5CB3567B726555AD34D4EACD5F3D2700DA8B17
1,647,274,354 UART: [art] SIG.S = A6AE49C0DE2E3828BC2A5FE808635D964A08E95D13FAE169330F9AEBCB67E429ED697B5E50B138675D148C7A46F94E8E
1,647,297,844 UART: Caliptra RT
1,647,298,189 UART: [state] CFI Enabled
1,647,578,279 UART: [rt] RT listening for mailbox commands...
1,647,578,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,650,342,077 >>> mbox cmd response: success
1,650,355,562 UART:
1,650,355,578 UART: Running Caliptra FMC ...
1,650,355,986 UART:
1,650,356,129 UART: [state] CFI Enabled
1,650,445,386 UART: [art] Extend RT PCRs Done
1,650,445,814 UART: [art] Lock RT PCRs Done
1,650,446,961 UART: [art] Populate DV Done
1,650,455,148 UART: [fht] FMC Alias Private Key: 7
1,650,456,144 UART: [art] Derive CDI
1,650,456,424 UART: [art] Store in in slot 0x4
1,650,542,423 UART: [art] Derive Key Pair
1,650,542,783 UART: [art] Store priv key in slot 0x5
1,650,555,339 UART: [art] Derive Key Pair - Done
1,650,570,266 UART: [art] Signing Cert with AUTHO
1,650,570,746 UART: RITY.KEYID = 7
1,650,585,864 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,586,629 UART: [art] PUB.X = 5E2B0A50066864A693DFB5E686030534312812CC089F04AF835C33A0C517D3417E8BDECBFA383868D640C11303E364EC
1,650,593,376 UART: [art] PUB.Y = 0E9546B70B32A7E4D0C98CE4C39BA863295B3C175C8E9882398ACAFED1DD67065C4E26874243AD7FDE66BC42E69EBBF6
1,650,600,331 UART: [art] SIG.R = 5CA6DD783CDC51FA296C8FEF66B7F3D8E3240EFEBFDE053F835BA36431A9F68BFF58EBEFC23B7E044C4DFC3FC3EFF3E4
1,650,607,128 UART: [art] SIG.S = F0ECA4AA5DED3F86C9C6B5FE2F8351C2063DA28861C31544C3FC0C804E704F9ED0E55006D29DA8E91D07455C006BE6DD
1,650,631,707 UART: Caliptra RT
1,650,632,052 UART: [state] CFI Enabled
1,650,914,821 UART: [rt] RT listening for mailbox commands...
1,650,915,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,679,239 >>> mbox cmd response: success
1,653,692,624 UART:
1,653,692,640 UART: Running Caliptra FMC ...
1,653,693,048 UART:
1,653,693,191 UART: [state] CFI Enabled
1,653,782,440 UART: [art] Extend RT PCRs Done
1,653,782,868 UART: [art] Lock RT PCRs Done
1,653,784,103 UART: [art] Populate DV Done
1,653,792,014 UART: [fht] FMC Alias Private Key: 7
1,653,793,096 UART: [art] Derive CDI
1,653,793,376 UART: [art] Store in in slot 0x4
1,653,879,123 UART: [art] Derive Key Pair
1,653,879,483 UART: [art] Store priv key in slot 0x5
1,653,892,869 UART: [art] Derive Key Pair - Done
1,653,907,766 UART: [art] Signing Cert with AUTHO
1,653,908,246 UART: RITY.KEYID = 7
1,653,923,534 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,924,299 UART: [art] PUB.X = 352D79E093706E21A9D533E1419EF620E875F000CF15D2FA6D91929CB86913A0B125FA98119A5626DAFD0FF366670D7A
1,653,931,041 UART: [art] PUB.Y = EA7ED49A0166A6F28E43D68DDDC07D8687D1A7DAFA59E2D649EF1E2CB5B4789527F799733ED9E06481B371D081CBF6ED
1,653,938,004 UART: [art] SIG.R = A5A2E602BA026ED5F6E48B6047A81F070472C19702437AC7A93CCE242F5CB3567B726555AD34D4EACD5F3D2700DA8B17
1,653,944,745 UART: [art] SIG.S = A6AE49C0DE2E3828BC2A5FE808635D964A08E95D13FAE169330F9AEBCB67E429ED697B5E50B138675D148C7A46F94E8E
1,653,968,787 UART: Caliptra RT
1,653,969,132 UART: [state] CFI Enabled
1,654,253,174 UART: [rt] RT listening for mailbox commands...
1,654,253,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,016,374 >>> mbox cmd response: success
1,657,029,877 UART:
1,657,029,893 UART: Running Caliptra FMC ...
1,657,030,301 UART:
1,657,030,444 UART: [state] CFI Enabled
1,657,119,417 UART: [art] Extend RT PCRs Done
1,657,119,845 UART: [art] Lock RT PCRs Done
1,657,121,118 UART: [art] Populate DV Done
1,657,129,453 UART: [fht] FMC Alias Private Key: 7
1,657,130,441 UART: [art] Derive CDI
1,657,130,721 UART: [art] Store in in slot 0x4
1,657,216,778 UART: [art] Derive Key Pair
1,657,217,138 UART: [art] Store priv key in slot 0x5
1,657,230,700 UART: [art] Derive Key Pair - Done
1,657,245,589 UART: [art] Signing Cert with AUTHO
1,657,246,069 UART: RITY.KEYID = 7
1,657,261,209 UART: [art] Erasing AUTHORITY.KEYID = 7
1,657,261,974 UART: [art] PUB.X = 5E2B0A50066864A693DFB5E686030534312812CC089F04AF835C33A0C517D3417E8BDECBFA383868D640C11303E364EC
1,657,268,721 UART: [art] PUB.Y = 0E9546B70B32A7E4D0C98CE4C39BA863295B3C175C8E9882398ACAFED1DD67065C4E26874243AD7FDE66BC42E69EBBF6
1,657,275,676 UART: [art] SIG.R = 5CA6DD783CDC51FA296C8FEF66B7F3D8E3240EFEBFDE053F835BA36431A9F68BFF58EBEFC23B7E044C4DFC3FC3EFF3E4
1,657,282,473 UART: [art] SIG.S = F0ECA4AA5DED3F86C9C6B5FE2F8351C2063DA28861C31544C3FC0C804E704F9ED0E55006D29DA8E91D07455C006BE6DD
1,657,306,184 UART: Caliptra RT
1,657,306,529 UART: [state] CFI Enabled
1,657,597,518 UART: [rt] RT listening for mailbox commands...
1,657,598,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,660,361,838 >>> mbox cmd response: success
1,660,374,755 UART:
1,660,374,771 UART: Running Caliptra FMC ...
1,660,375,179 UART:
1,660,375,322 UART: [state] CFI Enabled
1,660,464,271 UART: [art] Extend RT PCRs Done
1,660,464,699 UART: [art] Lock RT PCRs Done
1,660,466,252 UART: [art] Populate DV Done
1,660,474,419 UART: [fht] FMC Alias Private Key: 7
1,660,475,581 UART: [art] Derive CDI
1,660,475,861 UART: [art] Store in in slot 0x4
1,660,561,946 UART: [art] Derive Key Pair
1,660,562,306 UART: [art] Store priv key in slot 0x5
1,660,575,876 UART: [art] Derive Key Pair - Done
1,660,590,811 UART: [art] Signing Cert with AUTHO
1,660,591,291 UART: RITY.KEYID = 7
1,660,606,787 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,607,552 UART: [art] PUB.X = 352D79E093706E21A9D533E1419EF620E875F000CF15D2FA6D91929CB86913A0B125FA98119A5626DAFD0FF366670D7A
1,660,614,294 UART: [art] PUB.Y = EA7ED49A0166A6F28E43D68DDDC07D8687D1A7DAFA59E2D649EF1E2CB5B4789527F799733ED9E06481B371D081CBF6ED
1,660,621,257 UART: [art] SIG.R = A5A2E602BA026ED5F6E48B6047A81F070472C19702437AC7A93CCE242F5CB3567B726555AD34D4EACD5F3D2700DA8B17
1,660,627,998 UART: [art] SIG.S = A6AE49C0DE2E3828BC2A5FE808635D964A08E95D13FAE169330F9AEBCB67E429ED697B5E50B138675D148C7A46F94E8E
1,660,651,638 UART: Caliptra RT
1,660,651,983 UART: [state] CFI Enabled
1,660,934,961 UART: [rt] RT listening for mailbox commands...
1,660,935,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,697,503 >>> mbox cmd response: success
1,663,710,778 UART:
1,663,710,794 UART: Running Caliptra FMC ...
1,663,711,202 UART:
1,663,711,345 UART: [state] CFI Enabled
1,663,800,602 UART: [art] Extend RT PCRs Done
1,663,801,030 UART: [art] Lock RT PCRs Done
1,663,802,277 UART: [art] Populate DV Done
1,663,810,514 UART: [fht] FMC Alias Private Key: 7
1,663,811,568 UART: [art] Derive CDI
1,663,811,848 UART: [art] Store in in slot 0x4
1,663,897,539 UART: [art] Derive Key Pair
1,663,897,899 UART: [art] Store priv key in slot 0x5
1,663,910,891 UART: [art] Derive Key Pair - Done
1,663,925,768 UART: [art] Signing Cert with AUTHO
1,663,926,248 UART: RITY.KEYID = 7
1,663,941,602 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,942,367 UART: [art] PUB.X = 5E2B0A50066864A693DFB5E686030534312812CC089F04AF835C33A0C517D3417E8BDECBFA383868D640C11303E364EC
1,663,949,114 UART: [art] PUB.Y = 0E9546B70B32A7E4D0C98CE4C39BA863295B3C175C8E9882398ACAFED1DD67065C4E26874243AD7FDE66BC42E69EBBF6
1,663,956,069 UART: [art] SIG.R = 5CA6DD783CDC51FA296C8FEF66B7F3D8E3240EFEBFDE053F835BA36431A9F68BFF58EBEFC23B7E044C4DFC3FC3EFF3E4
1,663,962,866 UART: [art] SIG.S = F0ECA4AA5DED3F86C9C6B5FE2F8351C2063DA28861C31544C3FC0C804E704F9ED0E55006D29DA8E91D07455C006BE6DD
1,663,987,031 UART: Caliptra RT
1,663,987,376 UART: [state] CFI Enabled
1,664,267,981 UART: [rt] RT listening for mailbox commands...
1,664,268,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,030,987 >>> mbox cmd response: success
1,667,044,418 UART:
1,667,044,434 UART: Running Caliptra FMC ...
1,667,044,842 UART:
1,667,044,985 UART: [state] CFI Enabled
1,667,133,700 UART: [art] Extend RT PCRs Done
1,667,134,128 UART: [art] Lock RT PCRs Done
1,667,135,429 UART: [art] Populate DV Done
1,667,143,580 UART: [fht] FMC Alias Private Key: 7
1,667,144,724 UART: [art] Derive CDI
1,667,145,004 UART: [art] Store in in slot 0x4
1,667,230,517 UART: [art] Derive Key Pair
1,667,230,877 UART: [art] Store priv key in slot 0x5
1,667,244,781 UART: [art] Derive Key Pair - Done
1,667,259,694 UART: [art] Signing Cert with AUTHO
1,667,260,174 UART: RITY.KEYID = 7
1,667,275,276 UART: [art] Erasing AUTHORITY.KEYID = 7
1,667,276,041 UART: [art] PUB.X = 352D79E093706E21A9D533E1419EF620E875F000CF15D2FA6D91929CB86913A0B125FA98119A5626DAFD0FF366670D7A
1,667,282,783 UART: [art] PUB.Y = EA7ED49A0166A6F28E43D68DDDC07D8687D1A7DAFA59E2D649EF1E2CB5B4789527F799733ED9E06481B371D081CBF6ED
1,667,289,746 UART: [art] SIG.R = A5A2E602BA026ED5F6E48B6047A81F070472C19702437AC7A93CCE242F5CB3567B726555AD34D4EACD5F3D2700DA8B17
1,667,296,487 UART: [art] SIG.S = A6AE49C0DE2E3828BC2A5FE808635D964A08E95D13FAE169330F9AEBCB67E429ED697B5E50B138675D148C7A46F94E8E
1,667,320,149 UART: Caliptra RT
1,667,320,494 UART: [state] CFI Enabled
1,667,604,902 UART: [rt] RT listening for mailbox commands...
1,667,605,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,670,366,346 >>> mbox cmd response: success
1,670,379,561 UART:
1,670,379,577 UART: Running Caliptra FMC ...
1,670,379,985 UART:
1,670,380,128 UART: [state] CFI Enabled
1,670,469,705 UART: [art] Extend RT PCRs Done
1,670,470,133 UART: [art] Lock RT PCRs Done
1,670,471,418 UART: [art] Populate DV Done
1,670,479,661 UART: [fht] FMC Alias Private Key: 7
1,670,480,807 UART: [art] Derive CDI
1,670,481,087 UART: [art] Store in in slot 0x4
1,670,566,448 UART: [art] Derive Key Pair
1,670,566,808 UART: [art] Store priv key in slot 0x5
1,670,579,948 UART: [art] Derive Key Pair - Done
1,670,594,561 UART: [art] Signing Cert with AUTHO
1,670,595,041 UART: RITY.KEYID = 7
1,670,610,117 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,610,882 UART: [art] PUB.X = 5E2B0A50066864A693DFB5E686030534312812CC089F04AF835C33A0C517D3417E8BDECBFA383868D640C11303E364EC
1,670,617,629 UART: [art] PUB.Y = 0E9546B70B32A7E4D0C98CE4C39BA863295B3C175C8E9882398ACAFED1DD67065C4E26874243AD7FDE66BC42E69EBBF6
1,670,624,584 UART: [art] SIG.R = 5CA6DD783CDC51FA296C8FEF66B7F3D8E3240EFEBFDE053F835BA36431A9F68BFF58EBEFC23B7E044C4DFC3FC3EFF3E4
1,670,631,381 UART: [art] SIG.S = F0ECA4AA5DED3F86C9C6B5FE2F8351C2063DA28861C31544C3FC0C804E704F9ED0E55006D29DA8E91D07455C006BE6DD
1,670,655,140 UART: Caliptra RT
1,670,655,485 UART: [state] CFI Enabled
1,670,942,246 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 331.51s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,642,883 UART: [fht] FMC Alias Private Key: 7
1,554,643,849 UART: [art] Derive CDI
1,554,644,129 UART: [art] Store in in slot 0x4
1,554,729,622 UART: [art] Derive Key Pair
1,554,729,982 UART: [art] Store priv key in slot 0x5
1,554,743,124 UART: [art] Derive Key Pair - Done
1,554,757,815 UART: [art] Signing Cert with AUTHO
1,554,758,295 UART: RITY.KEYID = 7
1,554,773,753 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,774,518 UART: [art] PUB.X = 96906114D650DC6AA202C03F1A3C0B00E500BFB617AA89578D973F832717604204315A9EF6F8233F40C2F08DFC7DE4FB
1,554,781,237 UART: [art] PUB.Y = DC1C0EE989412A53C36F937F07E75B1248EB76AB1798D225BCA7F5D654C5054B95A77029B55E110704C7347B2C72F78F
1,554,788,172 UART: [art] SIG.R = 278D48FCDC86C82DF2388A199B5FB1344FFFEBC9D9290F3146B7B49421399C3E356E98FEC70753CDACDEFF582F4C8760
1,554,794,950 UART: [art] SIG.S = 6DF43141E44136094E03E2771048A2A2331DA29F3D4FC82BE8EAFF2842FCA3E475F8207E906282F80A2A13E0B4710EBA
1,554,819,189 UART: Caliptra RT
1,554,819,442 UART: [state] CFI Enabled
1,555,101,859 UART: [rt] RT listening for mailbox commands...
1,555,102,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,103,352 UART:
1,555,103,368 UART: Running Caliptra ROM ...
1,555,103,776 UART:
1,555,103,831 UART: [state] CFI Enabled
1,555,106,725 UART: [state] LifecycleState = Unprovisioned
1,555,107,380 UART: [state] DebugLocked = No
1,555,108,008 UART: [state] WD Timer not started. Device not locked for debugging
1,555,109,296 UART: [kat] SHA2-256
1,555,914,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,555,919,071 UART: [kat] ++
1,555,919,223 UART: [kat] sha1
1,555,923,627 UART: [kat] SHA2-256
1,555,925,567 UART: [kat] SHA2-384
1,555,928,258 UART: [kat] SHA2-512-ACC
1,555,930,158 UART: [kat] ECC-384
1,555,939,523 UART: [kat] HMAC-384Kdf
1,555,944,221 UART: [kat] LMS
1,556,192,549 UART: [kat] --
1,556,193,249 UART: [update-reset] ++
1,557,507,163 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,508,326 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,557,658,150 >>> mbox cmd response: success
1,557,658,357 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,666,371 UART: [update-reset Success] --
1,557,667,496 UART: [state] Locking Datavault
1,557,668,224 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,668,828 UART: [state] Locking ICCM
1,557,669,472 UART: [exit] Launching FMC @ 0x40000130
1,557,674,801 UART:
1,557,674,817 UART: Running Caliptra FMC ...
1,557,675,225 UART:
1,557,675,279 UART: [state] CFI Enabled
1,557,764,588 UART: [art] Extend RT PCRs Done
1,557,765,016 UART: [art] Lock RT PCRs Done
1,557,766,435 UART: [art] Populate DV Done
1,557,774,936 UART: [fht] FMC Alias Private Key: 7
1,557,776,026 UART: [art] Derive CDI
1,557,776,306 UART: [art] Store in in slot 0x4
1,557,862,137 UART: [art] Derive Key Pair
1,557,862,497 UART: [art] Store priv key in slot 0x5
1,557,875,439 UART: [art] Derive Key Pair - Done
1,557,890,140 UART: [art] Signing Cert with AUTHO
1,557,890,620 UART: RITY.KEYID = 7
1,557,905,652 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,906,417 UART: [art] PUB.X = 2263EFC93B4050C7153C3382AF243E718A2CE346A53CB9A4AB980EB3FAD002D9DA8A48C8A8CA725426520B116736EF78
1,557,913,184 UART: [art] PUB.Y = AF8C756CFBE167FA5A54873C0A5C425703562DE087E6E024DAF413C1DE70B253CCA3F1FF0572B56B889E59D9B37E5C23
1,557,920,137 UART: [art] SIG.R = EE877DDBF37329CE45C5A403218B9D36ED465966B18FA19DAF15D1E677E9EBA87AAEC088C004804617250F0927238FDA
1,557,926,903 UART: [art] SIG.S = 2B1069549131FC9620A2E5C7ACF0D6ED5939617AF814CC5361BA10B58F6F62A11FB9C163A74249502D16068C63B4108F
1,557,950,705 UART: Caliptra RT
1,557,950,958 UART: [state] CFI Enabled
1,558,236,525 UART: [rt] RT listening for mailbox commands...
1,558,237,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,238,206 UART:
1,558,238,222 UART: Running Caliptra ROM ...
1,558,238,630 UART:
1,558,238,685 UART: [state] CFI Enabled
1,558,241,511 UART: [state] LifecycleState = Unprovisioned
1,558,242,166 UART: [state] DebugLocked = No
1,558,242,738 UART: [state] WD Timer not started. Device not locked for debugging
1,558,244,038 UART: [kat] SHA2-256
1,559,049,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,053,813 UART: [kat] ++
1,559,053,965 UART: [kat] sha1
1,559,058,289 UART: [kat] SHA2-256
1,559,060,229 UART: [kat] SHA2-384
1,559,062,772 UART: [kat] SHA2-512-ACC
1,559,064,672 UART: [kat] ECC-384
1,559,074,297 UART: [kat] HMAC-384Kdf
1,559,078,913 UART: [kat] LMS
1,559,327,241 UART: [kat] --
1,559,328,159 UART: [update-reset] ++
1,560,641,151 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,642,150 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,560,791,974 >>> mbox cmd response: success
1,560,792,171 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,800,185 UART: [update-reset Success] --
1,560,800,828 UART: [state] Locking Datavault
1,560,801,808 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,802,412 UART: [state] Locking ICCM
1,560,802,990 UART: [exit] Launching FMC @ 0x40000130
1,560,808,319 UART:
1,560,808,335 UART: Running Caliptra FMC ...
1,560,808,743 UART:
1,560,808,797 UART: [state] CFI Enabled
1,560,898,032 UART: [art] Extend RT PCRs Done
1,560,898,460 UART: [art] Lock RT PCRs Done
1,560,899,667 UART: [art] Populate DV Done
1,560,908,012 UART: [fht] FMC Alias Private Key: 7
1,560,909,146 UART: [art] Derive CDI
1,560,909,426 UART: [art] Store in in slot 0x4
1,560,995,173 UART: [art] Derive Key Pair
1,560,995,533 UART: [art] Store priv key in slot 0x5
1,561,008,633 UART: [art] Derive Key Pair - Done
1,561,023,312 UART: [art] Signing Cert with AUTHO
1,561,023,792 UART: RITY.KEYID = 7
1,561,038,594 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,039,359 UART: [art] PUB.X = 96906114D650DC6AA202C03F1A3C0B00E500BFB617AA89578D973F832717604204315A9EF6F8233F40C2F08DFC7DE4FB
1,561,046,078 UART: [art] PUB.Y = DC1C0EE989412A53C36F937F07E75B1248EB76AB1798D225BCA7F5D654C5054B95A77029B55E110704C7347B2C72F78F
1,561,053,013 UART: [art] SIG.R = 278D48FCDC86C82DF2388A199B5FB1344FFFEBC9D9290F3146B7B49421399C3E356E98FEC70753CDACDEFF582F4C8760
1,561,059,791 UART: [art] SIG.S = 6DF43141E44136094E03E2771048A2A2331DA29F3D4FC82BE8EAFF2842FCA3E475F8207E906282F80A2A13E0B4710EBA
1,561,083,898 UART: Caliptra RT
1,561,084,151 UART: [state] CFI Enabled
1,561,360,650 UART: [rt] RT listening for mailbox commands...
1,561,361,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,362,139 UART:
1,561,362,155 UART: Running Caliptra ROM ...
1,561,362,563 UART:
1,561,362,618 UART: [state] CFI Enabled
1,561,364,942 UART: [state] LifecycleState = Unprovisioned
1,561,365,597 UART: [state] DebugLocked = No
1,561,366,293 UART: [state] WD Timer not started. Device not locked for debugging
1,561,367,411 UART: [kat] SHA2-256
1,562,173,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,177,186 UART: [kat] ++
1,562,177,338 UART: [kat] sha1
1,562,181,692 UART: [kat] SHA2-256
1,562,183,632 UART: [kat] SHA2-384
1,562,186,363 UART: [kat] SHA2-512-ACC
1,562,188,263 UART: [kat] ECC-384
1,562,197,770 UART: [kat] HMAC-384Kdf
1,562,202,576 UART: [kat] LMS
1,562,450,904 UART: [kat] --
1,562,452,090 UART: [update-reset] ++
1,563,764,452 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,765,569 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,563,915,393 >>> mbox cmd response: success
1,563,915,594 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,923,608 UART: [update-reset Success] --
1,563,924,643 UART: [state] Locking Datavault
1,563,925,451 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,926,055 UART: [state] Locking ICCM
1,563,926,553 UART: [exit] Launching FMC @ 0x40000130
1,563,931,882 UART:
1,563,931,898 UART: Running Caliptra FMC ...
1,563,932,306 UART:
1,563,932,360 UART: [state] CFI Enabled
1,564,021,659 UART: [art] Extend RT PCRs Done
1,564,022,087 UART: [art] Lock RT PCRs Done
1,564,023,414 UART: [art] Populate DV Done
1,564,031,639 UART: [fht] FMC Alias Private Key: 7
1,564,032,607 UART: [art] Derive CDI
1,564,032,887 UART: [art] Store in in slot 0x4
1,564,118,446 UART: [art] Derive Key Pair
1,564,118,806 UART: [art] Store priv key in slot 0x5
1,564,132,036 UART: [art] Derive Key Pair - Done
1,564,146,419 UART: [art] Signing Cert with AUTHO
1,564,146,899 UART: RITY.KEYID = 7
1,564,161,495 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,162,260 UART: [art] PUB.X = 2263EFC93B4050C7153C3382AF243E718A2CE346A53CB9A4AB980EB3FAD002D9DA8A48C8A8CA725426520B116736EF78
1,564,169,027 UART: [art] PUB.Y = AF8C756CFBE167FA5A54873C0A5C425703562DE087E6E024DAF413C1DE70B253CCA3F1FF0572B56B889E59D9B37E5C23
1,564,175,980 UART: [art] SIG.R = EE877DDBF37329CE45C5A403218B9D36ED465966B18FA19DAF15D1E677E9EBA87AAEC088C004804617250F0927238FDA
1,564,182,746 UART: [art] SIG.S = 2B1069549131FC9620A2E5C7ACF0D6ED5939617AF814CC5361BA10B58F6F62A11FB9C163A74249502D16068C63B4108F
1,564,206,522 UART: Caliptra RT
1,564,206,775 UART: [state] CFI Enabled
1,564,486,658 UART: [rt] RT listening for mailbox commands...
1,564,487,328 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,488,223 UART:
1,564,488,239 UART: Running Caliptra ROM ...
1,564,488,647 UART:
1,564,488,702 UART: [state] CFI Enabled
1,564,491,138 UART: [state] LifecycleState = Unprovisioned
1,564,491,793 UART: [state] DebugLocked = No
1,564,492,467 UART: [state] WD Timer not started. Device not locked for debugging
1,564,493,781 UART: [kat] SHA2-256
1,565,299,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,303,556 UART: [kat] ++
1,565,303,708 UART: [kat] sha1
1,565,307,896 UART: [kat] SHA2-256
1,565,309,836 UART: [kat] SHA2-384
1,565,312,683 UART: [kat] SHA2-512-ACC
1,565,314,583 UART: [kat] ECC-384
1,565,324,246 UART: [kat] HMAC-384Kdf
1,565,328,924 UART: [kat] LMS
1,565,577,252 UART: [kat] --
1,565,578,036 UART: [update-reset] ++
1,566,889,678 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,890,819 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,567,040,643 >>> mbox cmd response: success
1,567,040,788 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,048,802 UART: [update-reset Success] --
1,567,050,083 UART: [state] Locking Datavault
1,567,051,103 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,051,707 UART: [state] Locking ICCM
1,567,052,327 UART: [exit] Launching FMC @ 0x40000130
1,567,057,656 UART:
1,567,057,672 UART: Running Caliptra FMC ...
1,567,058,080 UART:
1,567,058,134 UART: [state] CFI Enabled
1,567,146,967 UART: [art] Extend RT PCRs Done
1,567,147,395 UART: [art] Lock RT PCRs Done
1,567,148,718 UART: [art] Populate DV Done
1,567,157,213 UART: [fht] FMC Alias Private Key: 7
1,567,158,333 UART: [art] Derive CDI
1,567,158,613 UART: [art] Store in in slot 0x4
1,567,244,244 UART: [art] Derive Key Pair
1,567,244,604 UART: [art] Store priv key in slot 0x5
1,567,257,666 UART: [art] Derive Key Pair - Done
1,567,272,643 UART: [art] Signing Cert with AUTHO
1,567,273,123 UART: RITY.KEYID = 7
1,567,288,703 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,289,468 UART: [art] PUB.X = 96906114D650DC6AA202C03F1A3C0B00E500BFB617AA89578D973F832717604204315A9EF6F8233F40C2F08DFC7DE4FB
1,567,296,187 UART: [art] PUB.Y = DC1C0EE989412A53C36F937F07E75B1248EB76AB1798D225BCA7F5D654C5054B95A77029B55E110704C7347B2C72F78F
1,567,303,122 UART: [art] SIG.R = 278D48FCDC86C82DF2388A199B5FB1344FFFEBC9D9290F3146B7B49421399C3E356E98FEC70753CDACDEFF582F4C8760
1,567,309,900 UART: [art] SIG.S = 6DF43141E44136094E03E2771048A2A2331DA29F3D4FC82BE8EAFF2842FCA3E475F8207E906282F80A2A13E0B4710EBA
1,567,334,087 UART: Caliptra RT
1,567,334,340 UART: [state] CFI Enabled
1,567,611,367 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 315.92s
Truncated 733352 bytes from beginning
8 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,085,940 >>> mbox cmd response: success
1,486,099,622 UART:
1,486,099,638 UART: Running Caliptra FMC ...
1,486,100,046 UART:
1,486,100,100 UART: [state] CFI Enabled
1,486,189,637 UART: [art] Extend RT PCRs Done
1,486,190,065 UART: [art] Lock RT PCRs Done
1,486,191,448 UART: [art] Populate DV Done
1,486,199,615 UART: [fht] FMC Alias Private Key: 7
1,486,200,599 UART: [art] Derive CDI
1,486,200,879 UART: [art] Store in in slot 0x4
1,486,286,498 UART: [art] Derive Key Pair
1,486,286,858 UART: [art] Store priv key in slot 0x5
1,486,299,672 UART: [art] Derive Key Pair - Done
1,486,314,315 UART: [art] Signing Cert with AUTHO
1,486,314,795 UART: RITY.KEYID = 7
1,486,330,223 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,330,988 UART: [art] PUB.X = 2BAF24AB06DD9F1BB9A5A7487E99D4E53CF3F70D9DC2448F424034B79E3EEEF1AC2C33E18A96CAA2260739FAEB834D31
1,486,337,769 UART: [art] PUB.Y = 16CA22D8789EAF17F8AD2398959C05EAB479819E2E7EF6A49DA43D0EDE2D2CF13FE435A47A1D833BC87F34D966BE2AAD
1,486,344,733 UART: [art] SIG.R = C0DA304BAE9FD0BEC56A083EAF2C94C5D6713023DE5323DB527FA82AF063BF1B27B8892898E7E96CB0B53C6F841710B9
1,486,351,514 UART: [art] SIG.S = 6ABE9B2F891C041A2968721002566B7A4E0034624D638F991E359ADF128C870B518FB219906A55F27E30990C352A3557
1,486,375,269 UART: Caliptra RT
1,486,375,522 UART: [state] CFI Enabled
1,486,654,413 UART: [rt] RT listening for mailbox commands...
1,486,655,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,094,623 >>> mbox cmd response: success
1,489,107,675 UART:
1,489,107,691 UART: Running Caliptra FMC ...
1,489,108,099 UART:
1,489,108,153 UART: [state] CFI Enabled
1,489,197,538 UART: [art] Extend RT PCRs Done
1,489,197,966 UART: [art] Lock RT PCRs Done
1,489,199,339 UART: [art] Populate DV Done
1,489,207,486 UART: [fht] FMC Alias Private Key: 7
1,489,208,594 UART: [art] Derive CDI
1,489,208,874 UART: [art] Store in in slot 0x4
1,489,294,703 UART: [art] Derive Key Pair
1,489,295,063 UART: [art] Store priv key in slot 0x5
1,489,308,739 UART: [art] Derive Key Pair - Done
1,489,323,565 UART: [art] Signing Cert with AUTHO
1,489,324,045 UART: RITY.KEYID = 7
1,489,338,893 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,339,658 UART: [art] PUB.X = A0F1F80860C95FFF63B2489125E52FEDCECF7705D18F43EAA76C897F44A86BCD6011BFB0294CE88A35A60C641885E328
1,489,346,429 UART: [art] PUB.Y = 5FECA48B11FDD9DA939704B79EA0C186662BCE19415E6F7F423A7B6494B46556C92A616ED266CFCF8977D202FC82E71F
1,489,353,383 UART: [art] SIG.R = 9D7484C2B04E608ABFE5FB4C45145622072374A05E9682EB6E5396D90670782DA11098C35F31E5EB98EF77E24A5A298C
1,489,360,145 UART: [art] SIG.S = 2FC0424A76F7E525363969E8DE84FA7B7FFDB9C21E2E881FB530292C8DEBDC59EB6E03FCCA1D3567FC25421FDB013A8F
1,489,384,022 UART: Caliptra RT
1,489,384,275 UART: [state] CFI Enabled
1,489,661,044 UART: [rt] RT listening for mailbox commands...
1,489,661,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,101,238 >>> mbox cmd response: success
1,492,114,380 UART:
1,492,114,396 UART: Running Caliptra FMC ...
1,492,114,804 UART:
1,492,114,858 UART: [state] CFI Enabled
1,492,203,715 UART: [art] Extend RT PCRs Done
1,492,204,143 UART: [art] Lock RT PCRs Done
1,492,205,372 UART: [art] Populate DV Done
1,492,213,617 UART: [fht] FMC Alias Private Key: 7
1,492,214,687 UART: [art] Derive CDI
1,492,214,967 UART: [art] Store in in slot 0x4
1,492,300,262 UART: [art] Derive Key Pair
1,492,300,622 UART: [art] Store priv key in slot 0x5
1,492,313,342 UART: [art] Derive Key Pair - Done
1,492,328,243 UART: [art] Signing Cert with AUTHO
1,492,328,723 UART: RITY.KEYID = 7
1,492,343,735 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,344,500 UART: [art] PUB.X = 2BAF24AB06DD9F1BB9A5A7487E99D4E53CF3F70D9DC2448F424034B79E3EEEF1AC2C33E18A96CAA2260739FAEB834D31
1,492,351,281 UART: [art] PUB.Y = 16CA22D8789EAF17F8AD2398959C05EAB479819E2E7EF6A49DA43D0EDE2D2CF13FE435A47A1D833BC87F34D966BE2AAD
1,492,358,245 UART: [art] SIG.R = C0DA304BAE9FD0BEC56A083EAF2C94C5D6713023DE5323DB527FA82AF063BF1B27B8892898E7E96CB0B53C6F841710B9
1,492,365,026 UART: [art] SIG.S = 6ABE9B2F891C041A2968721002566B7A4E0034624D638F991E359ADF128C870B518FB219906A55F27E30990C352A3557
1,492,388,703 UART: Caliptra RT
1,492,388,956 UART: [state] CFI Enabled
1,492,669,799 UART: [rt] RT listening for mailbox commands...
1,492,670,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,109,263 >>> mbox cmd response: success
1,495,122,881 UART:
1,495,122,897 UART: Running Caliptra FMC ...
1,495,123,305 UART:
1,495,123,359 UART: [state] CFI Enabled
1,495,212,858 UART: [art] Extend RT PCRs Done
1,495,213,286 UART: [art] Lock RT PCRs Done
1,495,214,359 UART: [art] Populate DV Done
1,495,222,722 UART: [fht] FMC Alias Private Key: 7
1,495,223,708 UART: [art] Derive CDI
1,495,223,988 UART: [art] Store in in slot 0x4
1,495,309,493 UART: [art] Derive Key Pair
1,495,309,853 UART: [art] Store priv key in slot 0x5
1,495,322,617 UART: [art] Derive Key Pair - Done
1,495,337,107 UART: [art] Signing Cert with AUTHO
1,495,337,587 UART: RITY.KEYID = 7
1,495,352,421 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,353,186 UART: [art] PUB.X = A0F1F80860C95FFF63B2489125E52FEDCECF7705D18F43EAA76C897F44A86BCD6011BFB0294CE88A35A60C641885E328
1,495,359,957 UART: [art] PUB.Y = 5FECA48B11FDD9DA939704B79EA0C186662BCE19415E6F7F423A7B6494B46556C92A616ED266CFCF8977D202FC82E71F
1,495,366,911 UART: [art] SIG.R = 9D7484C2B04E608ABFE5FB4C45145622072374A05E9682EB6E5396D90670782DA11098C35F31E5EB98EF77E24A5A298C
1,495,373,673 UART: [art] SIG.S = 2FC0424A76F7E525363969E8DE84FA7B7FFDB9C21E2E881FB530292C8DEBDC59EB6E03FCCA1D3567FC25421FDB013A8F
1,495,397,056 UART: Caliptra RT
1,495,397,309 UART: [state] CFI Enabled
1,495,678,168 UART: [rt] RT listening for mailbox commands...
1,495,678,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,115,648 >>> mbox cmd response: success
1,498,128,920 UART:
1,498,128,936 UART: Running Caliptra FMC ...
1,498,129,344 UART:
1,498,129,398 UART: [state] CFI Enabled
1,498,218,423 UART: [art] Extend RT PCRs Done
1,498,218,851 UART: [art] Lock RT PCRs Done
1,498,220,118 UART: [art] Populate DV Done
1,498,228,553 UART: [fht] FMC Alias Private Key: 7
1,498,229,731 UART: [art] Derive CDI
1,498,230,011 UART: [art] Store in in slot 0x4
1,498,315,770 UART: [art] Derive Key Pair
1,498,316,130 UART: [art] Store priv key in slot 0x5
1,498,329,442 UART: [art] Derive Key Pair - Done
1,498,343,815 UART: [art] Signing Cert with AUTHO
1,498,344,295 UART: RITY.KEYID = 7
1,498,358,961 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,359,726 UART: [art] PUB.X = 2BAF24AB06DD9F1BB9A5A7487E99D4E53CF3F70D9DC2448F424034B79E3EEEF1AC2C33E18A96CAA2260739FAEB834D31
1,498,366,507 UART: [art] PUB.Y = 16CA22D8789EAF17F8AD2398959C05EAB479819E2E7EF6A49DA43D0EDE2D2CF13FE435A47A1D833BC87F34D966BE2AAD
1,498,373,471 UART: [art] SIG.R = C0DA304BAE9FD0BEC56A083EAF2C94C5D6713023DE5323DB527FA82AF063BF1B27B8892898E7E96CB0B53C6F841710B9
1,498,380,252 UART: [art] SIG.S = 6ABE9B2F891C041A2968721002566B7A4E0034624D638F991E359ADF128C870B518FB219906A55F27E30990C352A3557
1,498,403,635 UART: Caliptra RT
1,498,403,888 UART: [state] CFI Enabled
1,498,686,087 UART: [rt] RT listening for mailbox commands...
1,498,686,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,124,355 >>> mbox cmd response: success
1,501,137,615 UART:
1,501,137,631 UART: Running Caliptra FMC ...
1,501,138,039 UART:
1,501,138,093 UART: [state] CFI Enabled
1,501,226,404 UART: [art] Extend RT PCRs Done
1,501,226,832 UART: [art] Lock RT PCRs Done
1,501,228,169 UART: [art] Populate DV Done
1,501,236,250 UART: [fht] FMC Alias Private Key: 7
1,501,237,222 UART: [art] Derive CDI
1,501,237,502 UART: [art] Store in in slot 0x4
1,501,323,735 UART: [art] Derive Key Pair
1,501,324,095 UART: [art] Store priv key in slot 0x5
1,501,337,043 UART: [art] Derive Key Pair - Done
1,501,351,667 UART: [art] Signing Cert with AUTHO
1,501,352,147 UART: RITY.KEYID = 7
1,501,367,239 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,368,004 UART: [art] PUB.X = A0F1F80860C95FFF63B2489125E52FEDCECF7705D18F43EAA76C897F44A86BCD6011BFB0294CE88A35A60C641885E328
1,501,374,775 UART: [art] PUB.Y = 5FECA48B11FDD9DA939704B79EA0C186662BCE19415E6F7F423A7B6494B46556C92A616ED266CFCF8977D202FC82E71F
1,501,381,729 UART: [art] SIG.R = 9D7484C2B04E608ABFE5FB4C45145622072374A05E9682EB6E5396D90670782DA11098C35F31E5EB98EF77E24A5A298C
1,501,388,491 UART: [art] SIG.S = 2FC0424A76F7E525363969E8DE84FA7B7FFDB9C21E2E881FB530292C8DEBDC59EB6E03FCCA1D3567FC25421FDB013A8F
1,501,412,246 UART: Caliptra RT
1,501,412,499 UART: [state] CFI Enabled
1,501,697,194 UART: [rt] RT listening for mailbox commands...
1,501,697,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,135,056 >>> mbox cmd response: success
1,504,148,698 UART:
1,504,148,714 UART: Running Caliptra FMC ...
1,504,149,122 UART:
1,504,149,176 UART: [state] CFI Enabled
1,504,237,829 UART: [art] Extend RT PCRs Done
1,504,238,257 UART: [art] Lock RT PCRs Done
1,504,239,428 UART: [art] Populate DV Done
1,504,247,661 UART: [fht] FMC Alias Private Key: 7
1,504,248,775 UART: [art] Derive CDI
1,504,249,055 UART: [art] Store in in slot 0x4
1,504,334,342 UART: [art] Derive Key Pair
1,504,334,702 UART: [art] Store priv key in slot 0x5
1,504,348,366 UART: [art] Derive Key Pair - Done
1,504,363,173 UART: [art] Signing Cert with AUTHO
1,504,363,653 UART: RITY.KEYID = 7
1,504,378,633 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,379,398 UART: [art] PUB.X = 2BAF24AB06DD9F1BB9A5A7487E99D4E53CF3F70D9DC2448F424034B79E3EEEF1AC2C33E18A96CAA2260739FAEB834D31
1,504,386,179 UART: [art] PUB.Y = 16CA22D8789EAF17F8AD2398959C05EAB479819E2E7EF6A49DA43D0EDE2D2CF13FE435A47A1D833BC87F34D966BE2AAD
1,504,393,143 UART: [art] SIG.R = C0DA304BAE9FD0BEC56A083EAF2C94C5D6713023DE5323DB527FA82AF063BF1B27B8892898E7E96CB0B53C6F841710B9
1,504,399,924 UART: [art] SIG.S = 6ABE9B2F891C041A2968721002566B7A4E0034624D638F991E359ADF128C870B518FB219906A55F27E30990C352A3557
1,504,423,779 UART: Caliptra RT
1,504,424,032 UART: [state] CFI Enabled
1,504,707,953 UART: [rt] RT listening for mailbox commands...
1,504,708,623 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,146,337 >>> mbox cmd response: success
1,507,159,691 UART:
1,507,159,707 UART: Running Caliptra FMC ...
1,507,160,115 UART:
1,507,160,169 UART: [state] CFI Enabled
1,507,248,688 UART: [art] Extend RT PCRs Done
1,507,249,116 UART: [art] Lock RT PCRs Done
1,507,250,323 UART: [art] Populate DV Done
1,507,258,594 UART: [fht] FMC Alias Private Key: 7
1,507,259,716 UART: [art] Derive CDI
1,507,259,996 UART: [art] Store in in slot 0x4
1,507,345,485 UART: [art] Derive Key Pair
1,507,345,845 UART: [art] Store priv key in slot 0x5
1,507,358,731 UART: [art] Derive Key Pair - Done
1,507,373,585 UART: [art] Signing Cert with AUTHO
1,507,374,065 UART: RITY.KEYID = 7
1,507,389,029 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,389,794 UART: [art] PUB.X = A0F1F80860C95FFF63B2489125E52FEDCECF7705D18F43EAA76C897F44A86BCD6011BFB0294CE88A35A60C641885E328
1,507,396,565 UART: [art] PUB.Y = 5FECA48B11FDD9DA939704B79EA0C186662BCE19415E6F7F423A7B6494B46556C92A616ED266CFCF8977D202FC82E71F
1,507,403,519 UART: [art] SIG.R = 9D7484C2B04E608ABFE5FB4C45145622072374A05E9682EB6E5396D90670782DA11098C35F31E5EB98EF77E24A5A298C
1,507,410,281 UART: [art] SIG.S = 2FC0424A76F7E525363969E8DE84FA7B7FFDB9C21E2E881FB530292C8DEBDC59EB6E03FCCA1D3567FC25421FDB013A8F
1,507,434,038 UART: Caliptra RT
1,507,434,291 UART: [state] CFI Enabled
1,507,713,824 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 306.01s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,555,161,365 UART: [fht] FMC Alias Private Key: 7
1,555,162,481 UART: [art] Derive CDI
1,555,162,761 UART: [art] Store in in slot 0x4
1,555,248,164 UART: [art] Derive Key Pair
1,555,248,524 UART: [art] Store priv key in slot 0x5
1,555,261,590 UART: [art] Derive Key Pair - Done
1,555,276,284 UART: [art] Signing Cert with AUTHO
1,555,276,764 UART: RITY.KEYID = 7
1,555,292,166 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,292,931 UART: [art] PUB.X = 4FB8D2FEFEDB3EBF5B87B09065CE5C84DEBD117560E97E842E20A9C496F380BE71797B8296982ACC9C02993BE8F3873A
1,555,299,712 UART: [art] PUB.Y = CBDE81AF41FF6C66E3FEA78EF9C0E32056A1B3A7FDCF549B0B7663C7E104153EF8C99D43BBF3D2AD642943B735B75597
1,555,306,674 UART: [art] SIG.R = C2ADE0E901840A3A24E7D7981F5DA1BE6B3FF91BCD087FEFA16C68F3C8075111F74FE7A04CDEE31DA958C81FB962001A
1,555,313,430 UART: [art] SIG.S = E5E25DE74A7E21902C3F1ABBDE60F8D157421658F1ED7A78B3864FDADFBA36B58F7EA3EF4B73B09761110B6499715C79
1,555,336,346 UART: Caliptra RT
1,555,336,691 UART: [state] CFI Enabled
1,555,620,177 UART: [rt] RT listening for mailbox commands...
1,555,620,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,621,932 UART:
1,555,621,948 UART: Running Caliptra ROM ...
1,555,622,356 UART:
1,555,622,498 UART: [state] CFI Enabled
1,555,625,030 UART: [state] LifecycleState = Unprovisioned
1,555,625,685 UART: [state] DebugLocked = No
1,555,626,419 UART: [state] WD Timer not started. Device not locked for debugging
1,555,627,567 UART: [kat] SHA2-256
1,556,433,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,437,342 UART: [kat] ++
1,556,437,494 UART: [kat] sha1
1,556,441,860 UART: [kat] SHA2-256
1,556,443,800 UART: [kat] SHA2-384
1,556,446,399 UART: [kat] SHA2-512-ACC
1,556,448,299 UART: [kat] ECC-384
1,556,458,186 UART: [kat] HMAC-384Kdf
1,556,462,880 UART: [kat] LMS
1,556,711,208 UART: [kat] --
1,556,712,090 UART: [update-reset] ++
1,558,024,068 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,025,049 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,558,174,873 >>> mbox cmd response: success
1,558,174,982 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,182,996 UART: [update-reset Success] --
1,558,183,857 UART: [state] Locking Datavault
1,558,184,595 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,185,199 UART: [state] Locking ICCM
1,558,185,799 UART: [exit] Launching FMC @ 0x40000130
1,558,191,128 UART:
1,558,191,144 UART: Running Caliptra FMC ...
1,558,191,552 UART:
1,558,191,695 UART: [state] CFI Enabled
1,558,281,308 UART: [art] Extend RT PCRs Done
1,558,281,736 UART: [art] Lock RT PCRs Done
1,558,282,867 UART: [art] Populate DV Done
1,558,290,866 UART: [fht] FMC Alias Private Key: 7
1,558,291,890 UART: [art] Derive CDI
1,558,292,170 UART: [art] Store in in slot 0x4
1,558,377,825 UART: [art] Derive Key Pair
1,558,378,185 UART: [art] Store priv key in slot 0x5
1,558,391,473 UART: [art] Derive Key Pair - Done
1,558,405,901 UART: [art] Signing Cert with AUTHO
1,558,406,381 UART: RITY.KEYID = 7
1,558,421,171 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,421,936 UART: [art] PUB.X = AAF399F89D85347BC93F4F2C0C26AEE01BE9307676F9E7623B5A003F7BBF01F4FB584C9BFFF23349D096CAFBD33D8485
1,558,428,694 UART: [art] PUB.Y = 56A4FEA36B16F27C2A42B52784DD9C69FCB56644D8834EC09470D005EC24AC12242D301104A1A3EFF4169643CF85E63D
1,558,435,642 UART: [art] SIG.R = 06A6FADCF5282662D6CC8401E0CF95EC1F45C85283E07F471471DC97F6F59E93A55934EA138F5F8CD14A68F971A74B5E
1,558,442,414 UART: [art] SIG.S = 42E6081E18D2E2469C0B3525CACF0B054C691965FDB9A7FE5166D3D5FA2D56116B593959B212781B1BDBF23E92E88DE0
1,558,466,415 UART: Caliptra RT
1,558,466,760 UART: [state] CFI Enabled
1,558,748,985 UART: [rt] RT listening for mailbox commands...
1,558,749,655 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,750,516 UART:
1,558,750,532 UART: Running Caliptra ROM ...
1,558,750,940 UART:
1,558,751,082 UART: [state] CFI Enabled
1,558,754,224 UART: [state] LifecycleState = Unprovisioned
1,558,754,879 UART: [state] DebugLocked = No
1,558,755,439 UART: [state] WD Timer not started. Device not locked for debugging
1,558,756,573 UART: [kat] SHA2-256
1,559,562,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,566,348 UART: [kat] ++
1,559,566,500 UART: [kat] sha1
1,559,570,700 UART: [kat] SHA2-256
1,559,572,640 UART: [kat] SHA2-384
1,559,575,297 UART: [kat] SHA2-512-ACC
1,559,577,197 UART: [kat] ECC-384
1,559,586,626 UART: [kat] HMAC-384Kdf
1,559,591,258 UART: [kat] LMS
1,559,839,586 UART: [kat] --
1,559,840,610 UART: [update-reset] ++
1,561,153,340 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,154,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,561,304,181 >>> mbox cmd response: success
1,561,304,316 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,312,330 UART: [update-reset Success] --
1,561,313,297 UART: [state] Locking Datavault
1,561,314,165 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,314,769 UART: [state] Locking ICCM
1,561,315,189 UART: [exit] Launching FMC @ 0x40000130
1,561,320,518 UART:
1,561,320,534 UART: Running Caliptra FMC ...
1,561,320,942 UART:
1,561,321,085 UART: [state] CFI Enabled
1,561,409,622 UART: [art] Extend RT PCRs Done
1,561,410,050 UART: [art] Lock RT PCRs Done
1,561,411,291 UART: [art] Populate DV Done
1,561,419,434 UART: [fht] FMC Alias Private Key: 7
1,561,420,396 UART: [art] Derive CDI
1,561,420,676 UART: [art] Store in in slot 0x4
1,561,506,247 UART: [art] Derive Key Pair
1,561,506,607 UART: [art] Store priv key in slot 0x5
1,561,520,201 UART: [art] Derive Key Pair - Done
1,561,534,757 UART: [art] Signing Cert with AUTHO
1,561,535,237 UART: RITY.KEYID = 7
1,561,550,423 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,551,188 UART: [art] PUB.X = 4FB8D2FEFEDB3EBF5B87B09065CE5C84DEBD117560E97E842E20A9C496F380BE71797B8296982ACC9C02993BE8F3873A
1,561,557,969 UART: [art] PUB.Y = CBDE81AF41FF6C66E3FEA78EF9C0E32056A1B3A7FDCF549B0B7663C7E104153EF8C99D43BBF3D2AD642943B735B75597
1,561,564,931 UART: [art] SIG.R = C2ADE0E901840A3A24E7D7981F5DA1BE6B3FF91BCD087FEFA16C68F3C8075111F74FE7A04CDEE31DA958C81FB962001A
1,561,571,687 UART: [art] SIG.S = E5E25DE74A7E21902C3F1ABBDE60F8D157421658F1ED7A78B3864FDADFBA36B58F7EA3EF4B73B09761110B6499715C79
1,561,595,385 UART: Caliptra RT
1,561,595,730 UART: [state] CFI Enabled
1,561,876,882 UART: [rt] RT listening for mailbox commands...
1,561,877,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,878,267 UART:
1,561,878,283 UART: Running Caliptra ROM ...
1,561,878,691 UART:
1,561,878,833 UART: [state] CFI Enabled
1,561,881,665 UART: [state] LifecycleState = Unprovisioned
1,561,882,320 UART: [state] DebugLocked = No
1,561,882,994 UART: [state] WD Timer not started. Device not locked for debugging
1,561,884,110 UART: [kat] SHA2-256
1,562,689,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,693,885 UART: [kat] ++
1,562,694,037 UART: [kat] sha1
1,562,698,375 UART: [kat] SHA2-256
1,562,700,315 UART: [kat] SHA2-384
1,562,703,042 UART: [kat] SHA2-512-ACC
1,562,704,942 UART: [kat] ECC-384
1,562,714,515 UART: [kat] HMAC-384Kdf
1,562,719,273 UART: [kat] LMS
1,562,967,601 UART: [kat] --
1,562,968,325 UART: [update-reset] ++
1,564,280,611 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,281,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,564,431,614 >>> mbox cmd response: success
1,564,431,805 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,439,819 UART: [update-reset Success] --
1,564,440,672 UART: [state] Locking Datavault
1,564,441,484 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,442,088 UART: [state] Locking ICCM
1,564,442,760 UART: [exit] Launching FMC @ 0x40000130
1,564,448,089 UART:
1,564,448,105 UART: Running Caliptra FMC ...
1,564,448,513 UART:
1,564,448,656 UART: [state] CFI Enabled
1,564,537,581 UART: [art] Extend RT PCRs Done
1,564,538,009 UART: [art] Lock RT PCRs Done
1,564,539,542 UART: [art] Populate DV Done
1,564,547,697 UART: [fht] FMC Alias Private Key: 7
1,564,548,805 UART: [art] Derive CDI
1,564,549,085 UART: [art] Store in in slot 0x4
1,564,634,458 UART: [art] Derive Key Pair
1,564,634,818 UART: [art] Store priv key in slot 0x5
1,564,648,188 UART: [art] Derive Key Pair - Done
1,564,662,864 UART: [art] Signing Cert with AUTHO
1,564,663,344 UART: RITY.KEYID = 7
1,564,678,522 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,679,287 UART: [art] PUB.X = AAF399F89D85347BC93F4F2C0C26AEE01BE9307676F9E7623B5A003F7BBF01F4FB584C9BFFF23349D096CAFBD33D8485
1,564,686,045 UART: [art] PUB.Y = 56A4FEA36B16F27C2A42B52784DD9C69FCB56644D8834EC09470D005EC24AC12242D301104A1A3EFF4169643CF85E63D
1,564,692,993 UART: [art] SIG.R = 06A6FADCF5282662D6CC8401E0CF95EC1F45C85283E07F471471DC97F6F59E93A55934EA138F5F8CD14A68F971A74B5E
1,564,699,765 UART: [art] SIG.S = 42E6081E18D2E2469C0B3525CACF0B054C691965FDB9A7FE5166D3D5FA2D56116B593959B212781B1BDBF23E92E88DE0
1,564,723,878 UART: Caliptra RT
1,564,724,223 UART: [state] CFI Enabled
1,565,007,326 UART: [rt] RT listening for mailbox commands...
1,565,007,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,008,829 UART:
1,565,008,845 UART: Running Caliptra ROM ...
1,565,009,253 UART:
1,565,009,395 UART: [state] CFI Enabled
1,565,012,227 UART: [state] LifecycleState = Unprovisioned
1,565,012,882 UART: [state] DebugLocked = No
1,565,013,384 UART: [state] WD Timer not started. Device not locked for debugging
1,565,014,544 UART: [kat] SHA2-256
1,565,820,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,824,319 UART: [kat] ++
1,565,824,471 UART: [kat] sha1
1,565,828,587 UART: [kat] SHA2-256
1,565,830,527 UART: [kat] SHA2-384
1,565,833,204 UART: [kat] SHA2-512-ACC
1,565,835,104 UART: [kat] ECC-384
1,565,844,719 UART: [kat] HMAC-384Kdf
1,565,849,375 UART: [kat] LMS
1,566,097,703 UART: [kat] --
1,566,098,731 UART: [update-reset] ++
1,567,411,453 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,412,666 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,567,562,490 >>> mbox cmd response: success
1,567,562,699 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,570,713 UART: [update-reset Success] --
1,567,571,688 UART: [state] Locking Datavault
1,567,572,606 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,573,210 UART: [state] Locking ICCM
1,567,573,694 UART: [exit] Launching FMC @ 0x40000130
1,567,579,023 UART:
1,567,579,039 UART: Running Caliptra FMC ...
1,567,579,447 UART:
1,567,579,590 UART: [state] CFI Enabled
1,567,668,371 UART: [art] Extend RT PCRs Done
1,567,668,799 UART: [art] Lock RT PCRs Done
1,567,670,088 UART: [art] Populate DV Done
1,567,678,445 UART: [fht] FMC Alias Private Key: 7
1,567,679,393 UART: [art] Derive CDI
1,567,679,673 UART: [art] Store in in slot 0x4
1,567,765,410 UART: [art] Derive Key Pair
1,567,765,770 UART: [art] Store priv key in slot 0x5
1,567,778,562 UART: [art] Derive Key Pair - Done
1,567,792,986 UART: [art] Signing Cert with AUTHO
1,567,793,466 UART: RITY.KEYID = 7
1,567,808,896 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,809,661 UART: [art] PUB.X = 4FB8D2FEFEDB3EBF5B87B09065CE5C84DEBD117560E97E842E20A9C496F380BE71797B8296982ACC9C02993BE8F3873A
1,567,816,442 UART: [art] PUB.Y = CBDE81AF41FF6C66E3FEA78EF9C0E32056A1B3A7FDCF549B0B7663C7E104153EF8C99D43BBF3D2AD642943B735B75597
1,567,823,404 UART: [art] SIG.R = C2ADE0E901840A3A24E7D7981F5DA1BE6B3FF91BCD087FEFA16C68F3C8075111F74FE7A04CDEE31DA958C81FB962001A
1,567,830,160 UART: [art] SIG.S = E5E25DE74A7E21902C3F1ABBDE60F8D157421658F1ED7A78B3864FDADFBA36B58F7EA3EF4B73B09761110B6499715C79
1,567,853,680 UART: Caliptra RT
1,567,854,025 UART: [state] CFI Enabled
1,568,132,945 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 324.83s
Truncated 733352 bytes from beginning
5 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,577,868 >>> mbox cmd response: success
1,486,591,012 UART:
1,486,591,028 UART: Running Caliptra FMC ...
1,486,591,436 UART:
1,486,591,579 UART: [state] CFI Enabled
1,486,680,488 UART: [art] Extend RT PCRs Done
1,486,680,916 UART: [art] Lock RT PCRs Done
1,486,682,179 UART: [art] Populate DV Done
1,486,690,604 UART: [fht] FMC Alias Private Key: 7
1,486,691,736 UART: [art] Derive CDI
1,486,692,016 UART: [art] Store in in slot 0x4
1,486,777,483 UART: [art] Derive Key Pair
1,486,777,843 UART: [art] Store priv key in slot 0x5
1,486,791,355 UART: [art] Derive Key Pair - Done
1,486,806,304 UART: [art] Signing Cert with AUTHO
1,486,806,784 UART: RITY.KEYID = 7
1,486,821,576 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,822,341 UART: [art] PUB.X = F20FCB3990296CFCA9CDAA2B9C309B601A7FBC4A0CE9536712E83D5FB3689E28C8DBABA503C3EC264FAE7DDE87B8B9CA
1,486,829,132 UART: [art] PUB.Y = 5B42735F6211B7BE73CC8BC52345A97063E2FE7190208722B80342145FA2C9742028F07EA474B9A85C047CDB83EF5C5F
1,486,836,074 UART: [art] SIG.R = 8FE3C576E8121CBD4936CB72931DACA60C53A4290500536E44BFFE32390D1427E1957C0B31934C0CE7A680A7B66E5F12
1,486,842,809 UART: [art] SIG.S = 7E7FD9B47CD9D471ED51B39A56CBF2A949E138BDD5A302CB2D97ED0D736A5141366EC1E80FD34187D9B091BBB7D6C1CB
1,486,867,053 UART: Caliptra RT
1,486,867,398 UART: [state] CFI Enabled
1,487,150,503 UART: [rt] RT listening for mailbox commands...
1,487,151,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,589,172 >>> mbox cmd response: success
1,489,602,626 UART:
1,489,602,642 UART: Running Caliptra FMC ...
1,489,603,050 UART:
1,489,603,193 UART: [state] CFI Enabled
1,489,692,456 UART: [art] Extend RT PCRs Done
1,489,692,884 UART: [art] Lock RT PCRs Done
1,489,694,479 UART: [art] Populate DV Done
1,489,702,574 UART: [fht] FMC Alias Private Key: 7
1,489,703,588 UART: [art] Derive CDI
1,489,703,868 UART: [art] Store in in slot 0x4
1,489,789,533 UART: [art] Derive Key Pair
1,489,789,893 UART: [art] Store priv key in slot 0x5
1,489,803,379 UART: [art] Derive Key Pair - Done
1,489,818,289 UART: [art] Signing Cert with AUTHO
1,489,818,769 UART: RITY.KEYID = 7
1,489,834,111 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,834,876 UART: [art] PUB.X = 267DF206FE60C551E794190C01C4258C3D36875E91B1646D2F3420723CA0F16667C4EFC0AB7251F678D2BB0841FC3D43
1,489,841,632 UART: [art] PUB.Y = 688765C5C4046B61F28B5DEDBB0FED5404E6C4B536486A20080A265C6C6F64D6DFBF9C6253C65C4B726381C96C1F4CA7
1,489,848,575 UART: [art] SIG.R = C22C98AA7C17959CCFA6B2264F1AC33984567714D5967FC675FB6A0DC8A71D8B42117FE8A8473549B303EC775B766B04
1,489,855,338 UART: [art] SIG.S = 4A6B148D277AE56FEABFB47F945F471D188D5601BB816E35876502D4B895CFD5166FD1562EACBC900A99153FFA394212
1,489,879,134 UART: Caliptra RT
1,489,879,479 UART: [state] CFI Enabled
1,490,161,700 UART: [rt] RT listening for mailbox commands...
1,490,162,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,600,447 >>> mbox cmd response: success
1,492,614,101 UART:
1,492,614,117 UART: Running Caliptra FMC ...
1,492,614,525 UART:
1,492,614,668 UART: [state] CFI Enabled
1,492,703,615 UART: [art] Extend RT PCRs Done
1,492,704,043 UART: [art] Lock RT PCRs Done
1,492,705,542 UART: [art] Populate DV Done
1,492,713,961 UART: [fht] FMC Alias Private Key: 7
1,492,714,901 UART: [art] Derive CDI
1,492,715,181 UART: [art] Store in in slot 0x4
1,492,801,106 UART: [art] Derive Key Pair
1,492,801,466 UART: [art] Store priv key in slot 0x5
1,492,814,126 UART: [art] Derive Key Pair - Done
1,492,829,029 UART: [art] Signing Cert with AUTHO
1,492,829,509 UART: RITY.KEYID = 7
1,492,844,371 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,845,136 UART: [art] PUB.X = F20FCB3990296CFCA9CDAA2B9C309B601A7FBC4A0CE9536712E83D5FB3689E28C8DBABA503C3EC264FAE7DDE87B8B9CA
1,492,851,927 UART: [art] PUB.Y = 5B42735F6211B7BE73CC8BC52345A97063E2FE7190208722B80342145FA2C9742028F07EA474B9A85C047CDB83EF5C5F
1,492,858,869 UART: [art] SIG.R = 8FE3C576E8121CBD4936CB72931DACA60C53A4290500536E44BFFE32390D1427E1957C0B31934C0CE7A680A7B66E5F12
1,492,865,604 UART: [art] SIG.S = 7E7FD9B47CD9D471ED51B39A56CBF2A949E138BDD5A302CB2D97ED0D736A5141366EC1E80FD34187D9B091BBB7D6C1CB
1,492,889,302 UART: Caliptra RT
1,492,889,647 UART: [state] CFI Enabled
1,493,168,348 UART: [rt] RT listening for mailbox commands...
1,493,169,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,607,057 >>> mbox cmd response: success
1,495,620,509 UART:
1,495,620,525 UART: Running Caliptra FMC ...
1,495,620,933 UART:
1,495,621,076 UART: [state] CFI Enabled
1,495,710,913 UART: [art] Extend RT PCRs Done
1,495,711,341 UART: [art] Lock RT PCRs Done
1,495,712,788 UART: [art] Populate DV Done
1,495,721,013 UART: [fht] FMC Alias Private Key: 7
1,495,722,061 UART: [art] Derive CDI
1,495,722,341 UART: [art] Store in in slot 0x4
1,495,808,150 UART: [art] Derive Key Pair
1,495,808,510 UART: [art] Store priv key in slot 0x5
1,495,822,334 UART: [art] Derive Key Pair - Done
1,495,837,504 UART: [art] Signing Cert with AUTHO
1,495,837,984 UART: RITY.KEYID = 7
1,495,852,858 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,853,623 UART: [art] PUB.X = 267DF206FE60C551E794190C01C4258C3D36875E91B1646D2F3420723CA0F16667C4EFC0AB7251F678D2BB0841FC3D43
1,495,860,379 UART: [art] PUB.Y = 688765C5C4046B61F28B5DEDBB0FED5404E6C4B536486A20080A265C6C6F64D6DFBF9C6253C65C4B726381C96C1F4CA7
1,495,867,322 UART: [art] SIG.R = C22C98AA7C17959CCFA6B2264F1AC33984567714D5967FC675FB6A0DC8A71D8B42117FE8A8473549B303EC775B766B04
1,495,874,085 UART: [art] SIG.S = 4A6B148D277AE56FEABFB47F945F471D188D5601BB816E35876502D4B895CFD5166FD1562EACBC900A99153FFA394212
1,495,898,285 UART: Caliptra RT
1,495,898,630 UART: [state] CFI Enabled
1,496,180,841 UART: [rt] RT listening for mailbox commands...
1,496,181,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,619,044 >>> mbox cmd response: success
1,498,632,596 UART:
1,498,632,612 UART: Running Caliptra FMC ...
1,498,633,020 UART:
1,498,633,163 UART: [state] CFI Enabled
1,498,722,218 UART: [art] Extend RT PCRs Done
1,498,722,646 UART: [art] Lock RT PCRs Done
1,498,723,719 UART: [art] Populate DV Done
1,498,731,956 UART: [fht] FMC Alias Private Key: 7
1,498,733,040 UART: [art] Derive CDI
1,498,733,320 UART: [art] Store in in slot 0x4
1,498,818,981 UART: [art] Derive Key Pair
1,498,819,341 UART: [art] Store priv key in slot 0x5
1,498,833,121 UART: [art] Derive Key Pair - Done
1,498,847,638 UART: [art] Signing Cert with AUTHO
1,498,848,118 UART: RITY.KEYID = 7
1,498,863,744 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,864,509 UART: [art] PUB.X = F20FCB3990296CFCA9CDAA2B9C309B601A7FBC4A0CE9536712E83D5FB3689E28C8DBABA503C3EC264FAE7DDE87B8B9CA
1,498,871,300 UART: [art] PUB.Y = 5B42735F6211B7BE73CC8BC52345A97063E2FE7190208722B80342145FA2C9742028F07EA474B9A85C047CDB83EF5C5F
1,498,878,242 UART: [art] SIG.R = 8FE3C576E8121CBD4936CB72931DACA60C53A4290500536E44BFFE32390D1427E1957C0B31934C0CE7A680A7B66E5F12
1,498,884,977 UART: [art] SIG.S = 7E7FD9B47CD9D471ED51B39A56CBF2A949E138BDD5A302CB2D97ED0D736A5141366EC1E80FD34187D9B091BBB7D6C1CB
1,498,908,213 UART: Caliptra RT
1,498,908,558 UART: [state] CFI Enabled
1,499,192,615 UART: [rt] RT listening for mailbox commands...
1,499,193,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,630,408 >>> mbox cmd response: success
1,501,644,292 UART:
1,501,644,308 UART: Running Caliptra FMC ...
1,501,644,716 UART:
1,501,644,859 UART: [state] CFI Enabled
1,501,734,088 UART: [art] Extend RT PCRs Done
1,501,734,516 UART: [art] Lock RT PCRs Done
1,501,735,681 UART: [art] Populate DV Done
1,501,743,980 UART: [fht] FMC Alias Private Key: 7
1,501,744,928 UART: [art] Derive CDI
1,501,745,208 UART: [art] Store in in slot 0x4
1,501,830,693 UART: [art] Derive Key Pair
1,501,831,053 UART: [art] Store priv key in slot 0x5
1,501,844,343 UART: [art] Derive Key Pair - Done
1,501,859,175 UART: [art] Signing Cert with AUTHO
1,501,859,655 UART: RITY.KEYID = 7
1,501,875,305 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,876,070 UART: [art] PUB.X = 267DF206FE60C551E794190C01C4258C3D36875E91B1646D2F3420723CA0F16667C4EFC0AB7251F678D2BB0841FC3D43
1,501,882,826 UART: [art] PUB.Y = 688765C5C4046B61F28B5DEDBB0FED5404E6C4B536486A20080A265C6C6F64D6DFBF9C6253C65C4B726381C96C1F4CA7
1,501,889,769 UART: [art] SIG.R = C22C98AA7C17959CCFA6B2264F1AC33984567714D5967FC675FB6A0DC8A71D8B42117FE8A8473549B303EC775B766B04
1,501,896,532 UART: [art] SIG.S = 4A6B148D277AE56FEABFB47F945F471D188D5601BB816E35876502D4B895CFD5166FD1562EACBC900A99153FFA394212
1,501,920,668 UART: Caliptra RT
1,501,921,013 UART: [state] CFI Enabled
1,502,206,438 UART: [rt] RT listening for mailbox commands...
1,502,207,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,645,511 >>> mbox cmd response: success
1,504,658,767 UART:
1,504,658,783 UART: Running Caliptra FMC ...
1,504,659,191 UART:
1,504,659,334 UART: [state] CFI Enabled
1,504,748,943 UART: [art] Extend RT PCRs Done
1,504,749,371 UART: [art] Lock RT PCRs Done
1,504,750,872 UART: [art] Populate DV Done
1,504,758,965 UART: [fht] FMC Alias Private Key: 7
1,504,760,045 UART: [art] Derive CDI
1,504,760,325 UART: [art] Store in in slot 0x4
1,504,846,034 UART: [art] Derive Key Pair
1,504,846,394 UART: [art] Store priv key in slot 0x5
1,504,859,598 UART: [art] Derive Key Pair - Done
1,504,874,189 UART: [art] Signing Cert with AUTHO
1,504,874,669 UART: RITY.KEYID = 7
1,504,889,533 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,890,298 UART: [art] PUB.X = F20FCB3990296CFCA9CDAA2B9C309B601A7FBC4A0CE9536712E83D5FB3689E28C8DBABA503C3EC264FAE7DDE87B8B9CA
1,504,897,089 UART: [art] PUB.Y = 5B42735F6211B7BE73CC8BC52345A97063E2FE7190208722B80342145FA2C9742028F07EA474B9A85C047CDB83EF5C5F
1,504,904,031 UART: [art] SIG.R = 8FE3C576E8121CBD4936CB72931DACA60C53A4290500536E44BFFE32390D1427E1957C0B31934C0CE7A680A7B66E5F12
1,504,910,766 UART: [art] SIG.S = 7E7FD9B47CD9D471ED51B39A56CBF2A949E138BDD5A302CB2D97ED0D736A5141366EC1E80FD34187D9B091BBB7D6C1CB
1,504,935,250 UART: Caliptra RT
1,504,935,595 UART: [state] CFI Enabled
1,505,218,466 UART: [rt] RT listening for mailbox commands...
1,505,219,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,656,535 >>> mbox cmd response: success
1,507,670,055 UART:
1,507,670,071 UART: Running Caliptra FMC ...
1,507,670,479 UART:
1,507,670,622 UART: [state] CFI Enabled
1,507,759,779 UART: [art] Extend RT PCRs Done
1,507,760,207 UART: [art] Lock RT PCRs Done
1,507,761,366 UART: [art] Populate DV Done
1,507,769,785 UART: [fht] FMC Alias Private Key: 7
1,507,770,907 UART: [art] Derive CDI
1,507,771,187 UART: [art] Store in in slot 0x4
1,507,856,880 UART: [art] Derive Key Pair
1,507,857,240 UART: [art] Store priv key in slot 0x5
1,507,870,600 UART: [art] Derive Key Pair - Done
1,507,885,254 UART: [art] Signing Cert with AUTHO
1,507,885,734 UART: RITY.KEYID = 7
1,507,901,080 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,901,845 UART: [art] PUB.X = 267DF206FE60C551E794190C01C4258C3D36875E91B1646D2F3420723CA0F16667C4EFC0AB7251F678D2BB0841FC3D43
1,507,908,601 UART: [art] PUB.Y = 688765C5C4046B61F28B5DEDBB0FED5404E6C4B536486A20080A265C6C6F64D6DFBF9C6253C65C4B726381C96C1F4CA7
1,507,915,544 UART: [art] SIG.R = C22C98AA7C17959CCFA6B2264F1AC33984567714D5967FC675FB6A0DC8A71D8B42117FE8A8473549B303EC775B766B04
1,507,922,307 UART: [art] SIG.S = 4A6B148D277AE56FEABFB47F945F471D188D5601BB816E35876502D4B895CFD5166FD1562EACBC900A99153FFA394212
1,507,946,131 UART: Caliptra RT
1,507,946,476 UART: [state] CFI Enabled
1,508,231,455 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 315.18s
Truncated 1339567 bytes from beginning
[art] Populate DV Done
1,553,484,656 UART: [fht] FMC Alias Private Key: 7
1,553,485,816 UART: [art] Derive CDI
1,553,486,096 UART: [art] Store in in slot 0x4
1,553,571,729 UART: [art] Derive Key Pair
1,553,572,089 UART: [art] Store priv key in slot 0x5
1,553,585,261 UART: [art] Derive Key Pair - Done
1,553,600,034 UART: [art] Signing Cert with AUTHO
1,553,600,514 UART: RITY.KEYID = 7
1,553,615,852 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,616,617 UART: [art] PUB.X = 077F5DCFFCAEE0FA4D46D606D5309611E47B8CC608276E03C256620BC081D33980B16346A9D2DEA6929427C233638312
1,553,623,370 UART: [art] PUB.Y = 6D3149B9883C87B4659E8FD6B1ACDD07E3B65C30A8DD88FDD87A93DC4A272952356D3ED17FC775D392B01DCEC1CB1400
1,553,630,309 UART: [art] SIG.R = 6825D0872F99F55CE1F5BF906BB5C2C1CCF54377520A27555B719CF40B8501C19B8A17032461C690C99D77A6C1420B90
1,553,637,060 UART: [art] SIG.S = 324EFC9484BD6D28BF2FBA037230CEE47BDD4AFCE3DABB60074EC9838A9DA527921806E4F53A563D6C4C265FEC7731AF
1,553,660,794 UART: Caliptra RT
1,553,661,047 UART: [state] CFI Enabled
1,553,937,742 UART: [rt] RT listening for mailbox commands...
1,553,938,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,939,187 UART:
1,553,939,203 UART: Running Caliptra ROM ...
1,553,939,611 UART:
1,553,939,666 UART: [state] CFI Enabled
1,553,942,772 UART: [state] LifecycleState = Unprovisioned
1,553,943,427 UART: [state] DebugLocked = No
1,553,944,025 UART: [state] WD Timer not started. Device not locked for debugging
1,553,945,143 UART: [kat] SHA2-256
1,554,748,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,554,752,822 UART: [kat] ++
1,554,752,974 UART: [kat] sha1
1,554,757,212 UART: [kat] SHA2-256
1,554,759,152 UART: [kat] SHA2-384
1,554,761,999 UART: [kat] SHA2-512-ACC
1,554,763,899 UART: [kat] ECC-384
1,554,773,970 UART: [kat] HMAC-384Kdf
1,554,778,574 UART: [kat] LMS
1,555,026,886 UART: [kat] --
1,555,027,958 UART: [update-reset] ++
1,556,338,989 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,339,964 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,556,489,788 >>> mbox cmd response: success
1,556,489,943 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,497,957 UART: [update-reset Success] --
1,556,499,030 UART: [state] Locking Datavault
1,556,499,828 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,500,432 UART: [state] Locking ICCM
1,556,500,990 UART: [exit] Launching FMC @ 0x40000130
1,556,506,319 UART:
1,556,506,335 UART: Running Caliptra FMC ...
1,556,506,743 UART:
1,556,506,797 UART: [state] CFI Enabled
1,556,595,598 UART: [art] Extend RT PCRs Done
1,556,596,026 UART: [art] Lock RT PCRs Done
1,556,597,237 UART: [art] Populate DV Done
1,556,605,430 UART: [fht] FMC Alias Private Key: 7
1,556,606,366 UART: [art] Derive CDI
1,556,606,646 UART: [art] Store in in slot 0x4
1,556,692,683 UART: [art] Derive Key Pair
1,556,693,043 UART: [art] Store priv key in slot 0x5
1,556,705,853 UART: [art] Derive Key Pair - Done
1,556,720,666 UART: [art] Signing Cert with AUTHO
1,556,721,146 UART: RITY.KEYID = 7
1,556,736,682 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,737,447 UART: [art] PUB.X = 9C9C9404A436EB54F42CB7A8704B916AA3083B1AE7299FF0D8C879BD6CF94B4355F7A0774F3FF2B3D8B7EADD127773ED
1,556,744,225 UART: [art] PUB.Y = 8E69154808D07BCD5A4FF4AECFACBAC5A2FF6584DC87BCCC747610C2AA3CAD2BE74BD271B61B8DFA1746E2675E2C348D
1,556,751,200 UART: [art] SIG.R = E9972C92F20A497AC64737DD01BE034DB33C95FCE8466A0AFB245BE0A5A7CBA9DD0EE29A9196E3B4B645CD8B041FC4F7
1,556,757,972 UART: [art] SIG.S = F23CA609161375A9D0E3C2A7B6DE217299F6DE0AF9B99DC3F7D109FD98E8A123361EE3D2EBF44D9B3F9EB5D17B267F22
1,556,782,108 UART: Caliptra RT
1,556,782,361 UART: [state] CFI Enabled
1,557,066,223 UART: [rt] RT listening for mailbox commands...
1,557,066,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,067,788 UART:
1,557,067,804 UART: Running Caliptra ROM ...
1,557,068,212 UART:
1,557,068,267 UART: [state] CFI Enabled
1,557,070,909 UART: [state] LifecycleState = Unprovisioned
1,557,071,564 UART: [state] DebugLocked = No
1,557,072,050 UART: [state] WD Timer not started. Device not locked for debugging
1,557,073,216 UART: [kat] SHA2-256
1,557,876,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,557,880,895 UART: [kat] ++
1,557,881,047 UART: [kat] sha1
1,557,885,191 UART: [kat] SHA2-256
1,557,887,131 UART: [kat] SHA2-384
1,557,889,682 UART: [kat] SHA2-512-ACC
1,557,891,582 UART: [kat] ECC-384
1,557,901,741 UART: [kat] HMAC-384Kdf
1,557,906,269 UART: [kat] LMS
1,558,154,581 UART: [kat] --
1,558,155,313 UART: [update-reset] ++
1,559,467,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,468,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,559,618,117 >>> mbox cmd response: success
1,559,618,432 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,626,446 UART: [update-reset Success] --
1,559,627,507 UART: [state] Locking Datavault
1,559,628,361 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,628,965 UART: [state] Locking ICCM
1,559,629,499 UART: [exit] Launching FMC @ 0x40000130
1,559,634,828 UART:
1,559,634,844 UART: Running Caliptra FMC ...
1,559,635,252 UART:
1,559,635,306 UART: [state] CFI Enabled
1,559,723,677 UART: [art] Extend RT PCRs Done
1,559,724,105 UART: [art] Lock RT PCRs Done
1,559,725,196 UART: [art] Populate DV Done
1,559,733,483 UART: [fht] FMC Alias Private Key: 7
1,559,734,525 UART: [art] Derive CDI
1,559,734,805 UART: [art] Store in in slot 0x4
1,559,820,050 UART: [art] Derive Key Pair
1,559,820,410 UART: [art] Store priv key in slot 0x5
1,559,833,652 UART: [art] Derive Key Pair - Done
1,559,848,599 UART: [art] Signing Cert with AUTHO
1,559,849,079 UART: RITY.KEYID = 7
1,559,864,169 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,864,934 UART: [art] PUB.X = 077F5DCFFCAEE0FA4D46D606D5309611E47B8CC608276E03C256620BC081D33980B16346A9D2DEA6929427C233638312
1,559,871,687 UART: [art] PUB.Y = 6D3149B9883C87B4659E8FD6B1ACDD07E3B65C30A8DD88FDD87A93DC4A272952356D3ED17FC775D392B01DCEC1CB1400
1,559,878,626 UART: [art] SIG.R = 6825D0872F99F55CE1F5BF906BB5C2C1CCF54377520A27555B719CF40B8501C19B8A17032461C690C99D77A6C1420B90
1,559,885,377 UART: [art] SIG.S = 324EFC9484BD6D28BF2FBA037230CEE47BDD4AFCE3DABB60074EC9838A9DA527921806E4F53A563D6C4C265FEC7731AF
1,559,909,317 UART: Caliptra RT
1,559,909,570 UART: [state] CFI Enabled
1,560,188,859 UART: [rt] RT listening for mailbox commands...
1,560,189,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,190,610 UART:
1,560,190,626 UART: Running Caliptra ROM ...
1,560,191,034 UART:
1,560,191,089 UART: [state] CFI Enabled
1,560,193,505 UART: [state] LifecycleState = Unprovisioned
1,560,194,160 UART: [state] DebugLocked = No
1,560,194,810 UART: [state] WD Timer not started. Device not locked for debugging
1,560,196,170 UART: [kat] SHA2-256
1,560,999,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,003,849 UART: [kat] ++
1,561,004,001 UART: [kat] sha1
1,561,008,227 UART: [kat] SHA2-256
1,561,010,167 UART: [kat] SHA2-384
1,561,012,942 UART: [kat] SHA2-512-ACC
1,561,014,842 UART: [kat] ECC-384
1,561,024,655 UART: [kat] HMAC-384Kdf
1,561,029,287 UART: [kat] LMS
1,561,277,599 UART: [kat] --
1,561,278,475 UART: [update-reset] ++
1,562,591,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,592,157 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,562,741,981 >>> mbox cmd response: success
1,562,742,294 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,750,308 UART: [update-reset Success] --
1,562,751,355 UART: [state] Locking Datavault
1,562,751,933 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,752,537 UART: [state] Locking ICCM
1,562,753,175 UART: [exit] Launching FMC @ 0x40000130
1,562,758,504 UART:
1,562,758,520 UART: Running Caliptra FMC ...
1,562,758,928 UART:
1,562,758,982 UART: [state] CFI Enabled
1,562,847,979 UART: [art] Extend RT PCRs Done
1,562,848,407 UART: [art] Lock RT PCRs Done
1,562,849,774 UART: [art] Populate DV Done
1,562,858,279 UART: [fht] FMC Alias Private Key: 7
1,562,859,261 UART: [art] Derive CDI
1,562,859,541 UART: [art] Store in in slot 0x4
1,562,944,732 UART: [art] Derive Key Pair
1,562,945,092 UART: [art] Store priv key in slot 0x5
1,562,958,436 UART: [art] Derive Key Pair - Done
1,562,973,307 UART: [art] Signing Cert with AUTHO
1,562,973,787 UART: RITY.KEYID = 7
1,562,989,121 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,989,886 UART: [art] PUB.X = 9C9C9404A436EB54F42CB7A8704B916AA3083B1AE7299FF0D8C879BD6CF94B4355F7A0774F3FF2B3D8B7EADD127773ED
1,562,996,664 UART: [art] PUB.Y = 8E69154808D07BCD5A4FF4AECFACBAC5A2FF6584DC87BCCC747610C2AA3CAD2BE74BD271B61B8DFA1746E2675E2C348D
1,563,003,639 UART: [art] SIG.R = E9972C92F20A497AC64737DD01BE034DB33C95FCE8466A0AFB245BE0A5A7CBA9DD0EE29A9196E3B4B645CD8B041FC4F7
1,563,010,411 UART: [art] SIG.S = F23CA609161375A9D0E3C2A7B6DE217299F6DE0AF9B99DC3F7D109FD98E8A123361EE3D2EBF44D9B3F9EB5D17B267F22
1,563,033,987 UART: Caliptra RT
1,563,034,240 UART: [state] CFI Enabled
1,563,311,630 UART: [rt] RT listening for mailbox commands...
1,563,312,300 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,313,299 UART:
1,563,313,315 UART: Running Caliptra ROM ...
1,563,313,723 UART:
1,563,313,778 UART: [state] CFI Enabled
1,563,316,314 UART: [state] LifecycleState = Unprovisioned
1,563,316,969 UART: [state] DebugLocked = No
1,563,317,647 UART: [state] WD Timer not started. Device not locked for debugging
1,563,318,975 UART: [kat] SHA2-256
1,564,122,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,126,654 UART: [kat] ++
1,564,126,806 UART: [kat] sha1
1,564,131,206 UART: [kat] SHA2-256
1,564,133,146 UART: [kat] SHA2-384
1,564,135,977 UART: [kat] SHA2-512-ACC
1,564,137,877 UART: [kat] ECC-384
1,564,147,548 UART: [kat] HMAC-384Kdf
1,564,151,984 UART: [kat] LMS
1,564,400,296 UART: [kat] --
1,564,401,142 UART: [update-reset] ++
1,565,713,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,714,418 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,565,864,242 >>> mbox cmd response: success
1,565,864,391 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,872,405 UART: [update-reset Success] --
1,565,873,362 UART: [state] Locking Datavault
1,565,874,306 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,874,910 UART: [state] Locking ICCM
1,565,875,520 UART: [exit] Launching FMC @ 0x40000130
1,565,880,849 UART:
1,565,880,865 UART: Running Caliptra FMC ...
1,565,881,273 UART:
1,565,881,327 UART: [state] CFI Enabled
1,565,970,368 UART: [art] Extend RT PCRs Done
1,565,970,796 UART: [art] Lock RT PCRs Done
1,565,971,989 UART: [art] Populate DV Done
1,565,980,126 UART: [fht] FMC Alias Private Key: 7
1,565,981,058 UART: [art] Derive CDI
1,565,981,338 UART: [art] Store in in slot 0x4
1,566,066,919 UART: [art] Derive Key Pair
1,566,067,279 UART: [art] Store priv key in slot 0x5
1,566,080,415 UART: [art] Derive Key Pair - Done
1,566,095,406 UART: [art] Signing Cert with AUTHO
1,566,095,886 UART: RITY.KEYID = 7
1,566,111,304 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,112,069 UART: [art] PUB.X = 077F5DCFFCAEE0FA4D46D606D5309611E47B8CC608276E03C256620BC081D33980B16346A9D2DEA6929427C233638312
1,566,118,822 UART: [art] PUB.Y = 6D3149B9883C87B4659E8FD6B1ACDD07E3B65C30A8DD88FDD87A93DC4A272952356D3ED17FC775D392B01DCEC1CB1400
1,566,125,761 UART: [art] SIG.R = 6825D0872F99F55CE1F5BF906BB5C2C1CCF54377520A27555B719CF40B8501C19B8A17032461C690C99D77A6C1420B90
1,566,132,512 UART: [art] SIG.S = 324EFC9484BD6D28BF2FBA037230CEE47BDD4AFCE3DABB60074EC9838A9DA527921806E4F53A563D6C4C265FEC7731AF
1,566,156,142 UART: Caliptra RT
1,566,156,395 UART: [state] CFI Enabled
1,566,434,022 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 317.02s
Truncated 733352 bytes from beginning
7 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,483,885,722 >>> mbox cmd response: success
1,483,899,170 UART:
1,483,899,186 UART: Running Caliptra FMC ...
1,483,899,594 UART:
1,483,899,648 UART: [state] CFI Enabled
1,483,988,697 UART: [art] Extend RT PCRs Done
1,483,989,125 UART: [art] Lock RT PCRs Done
1,483,990,356 UART: [art] Populate DV Done
1,483,998,769 UART: [fht] FMC Alias Private Key: 7
1,483,999,727 UART: [art] Derive CDI
1,484,000,007 UART: [art] Store in in slot 0x4
1,484,086,038 UART: [art] Derive Key Pair
1,484,086,398 UART: [art] Store priv key in slot 0x5
1,484,100,176 UART: [art] Derive Key Pair - Done
1,484,115,154 UART: [art] Signing Cert with AUTHO
1,484,115,634 UART: RITY.KEYID = 7
1,484,130,830 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,131,595 UART: [art] PUB.X = CF8AA749AB48EB89FF52E5585B176CF1036CAF4396E641FDAE976F6AD82F8D74135D7C4324EB608BE3A2590D7C6EAF52
1,484,138,375 UART: [art] PUB.Y = A4D4C73A768F140DAF55523EE9CDBF28A568F087B3C9FEDFBE507A8B0F869DD7488DB3033CAA095C18DA5D7F93606FCF
1,484,145,335 UART: [art] SIG.R = FD86BE5B97077FA597E50AA173D6C66C6F946694C2F097A8AB117A4D9B91C6B252070AC5C855A54F0E9AB8A0FC0667FF
1,484,152,099 UART: [art] SIG.S = 8A7D200B600E567D9EA795F92C739B4F1FE0ACB9C59A7EB1022847AE949A4771A18663B48945C622C019A2BF639A3913
1,484,176,389 UART: Caliptra RT
1,484,176,642 UART: [state] CFI Enabled
1,484,457,482 UART: [rt] RT listening for mailbox commands...
1,484,458,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,891,341 >>> mbox cmd response: success
1,486,904,749 UART:
1,486,904,765 UART: Running Caliptra FMC ...
1,486,905,173 UART:
1,486,905,227 UART: [state] CFI Enabled
1,486,994,098 UART: [art] Extend RT PCRs Done
1,486,994,526 UART: [art] Lock RT PCRs Done
1,486,995,893 UART: [art] Populate DV Done
1,487,003,946 UART: [fht] FMC Alias Private Key: 7
1,487,005,114 UART: [art] Derive CDI
1,487,005,394 UART: [art] Store in in slot 0x4
1,487,091,113 UART: [art] Derive Key Pair
1,487,091,473 UART: [art] Store priv key in slot 0x5
1,487,104,601 UART: [art] Derive Key Pair - Done
1,487,119,328 UART: [art] Signing Cert with AUTHO
1,487,119,808 UART: RITY.KEYID = 7
1,487,134,916 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,135,681 UART: [art] PUB.X = 1EFBB363959A5178EEBC6B5C5B125104297613D857FBFBA522D369EFDF3974A4E7F542360C59DDA8CC703D4F240347D4
1,487,142,450 UART: [art] PUB.Y = 1DBF0912F20B36D0CCA6AC7EBA0BEB5BBC7C8ECDE50E3478E3F6A78C002EA0CC42F0F51EBA48EBEFAC22D94F87BE2F43
1,487,149,404 UART: [art] SIG.R = FA12A10D2EA8B58A0A6EDA9C439C0FACC0CC048B99DF132A7636651C3D4D31D5E3148B5CA7A56062FF86A2781D6A9AA6
1,487,156,180 UART: [art] SIG.S = 4CEDC4B9F8AA3CD9D99DC08B3C7C947ECCC80FAD67B367D9BA63E813D0242FBE72F49B8BED8E35307B9B7BB3C18462DA
1,487,180,380 UART: Caliptra RT
1,487,180,633 UART: [state] CFI Enabled
1,487,462,366 UART: [rt] RT listening for mailbox commands...
1,487,463,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,895,665 >>> mbox cmd response: success
1,489,909,197 UART:
1,489,909,213 UART: Running Caliptra FMC ...
1,489,909,621 UART:
1,489,909,675 UART: [state] CFI Enabled
1,489,998,704 UART: [art] Extend RT PCRs Done
1,489,999,132 UART: [art] Lock RT PCRs Done
1,490,000,643 UART: [art] Populate DV Done
1,490,008,792 UART: [fht] FMC Alias Private Key: 7
1,490,009,900 UART: [art] Derive CDI
1,490,010,180 UART: [art] Store in in slot 0x4
1,490,095,727 UART: [art] Derive Key Pair
1,490,096,087 UART: [art] Store priv key in slot 0x5
1,490,109,619 UART: [art] Derive Key Pair - Done
1,490,124,549 UART: [art] Signing Cert with AUTHO
1,490,125,029 UART: RITY.KEYID = 7
1,490,140,509 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,141,274 UART: [art] PUB.X = CF8AA749AB48EB89FF52E5585B176CF1036CAF4396E641FDAE976F6AD82F8D74135D7C4324EB608BE3A2590D7C6EAF52
1,490,148,054 UART: [art] PUB.Y = A4D4C73A768F140DAF55523EE9CDBF28A568F087B3C9FEDFBE507A8B0F869DD7488DB3033CAA095C18DA5D7F93606FCF
1,490,155,014 UART: [art] SIG.R = FD86BE5B97077FA597E50AA173D6C66C6F946694C2F097A8AB117A4D9B91C6B252070AC5C855A54F0E9AB8A0FC0667FF
1,490,161,778 UART: [art] SIG.S = 8A7D200B600E567D9EA795F92C739B4F1FE0ACB9C59A7EB1022847AE949A4771A18663B48945C622C019A2BF639A3913
1,490,185,492 UART: Caliptra RT
1,490,185,745 UART: [state] CFI Enabled
1,490,465,359 UART: [rt] RT listening for mailbox commands...
1,490,466,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,898,724 >>> mbox cmd response: success
1,492,912,510 UART:
1,492,912,526 UART: Running Caliptra FMC ...
1,492,912,934 UART:
1,492,912,988 UART: [state] CFI Enabled
1,493,002,063 UART: [art] Extend RT PCRs Done
1,493,002,491 UART: [art] Lock RT PCRs Done
1,493,003,556 UART: [art] Populate DV Done
1,493,011,671 UART: [fht] FMC Alias Private Key: 7
1,493,012,707 UART: [art] Derive CDI
1,493,012,987 UART: [art] Store in in slot 0x4
1,493,098,478 UART: [art] Derive Key Pair
1,493,098,838 UART: [art] Store priv key in slot 0x5
1,493,111,882 UART: [art] Derive Key Pair - Done
1,493,126,473 UART: [art] Signing Cert with AUTHO
1,493,126,953 UART: RITY.KEYID = 7
1,493,142,245 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,143,010 UART: [art] PUB.X = 1EFBB363959A5178EEBC6B5C5B125104297613D857FBFBA522D369EFDF3974A4E7F542360C59DDA8CC703D4F240347D4
1,493,149,779 UART: [art] PUB.Y = 1DBF0912F20B36D0CCA6AC7EBA0BEB5BBC7C8ECDE50E3478E3F6A78C002EA0CC42F0F51EBA48EBEFAC22D94F87BE2F43
1,493,156,733 UART: [art] SIG.R = FA12A10D2EA8B58A0A6EDA9C439C0FACC0CC048B99DF132A7636651C3D4D31D5E3148B5CA7A56062FF86A2781D6A9AA6
1,493,163,509 UART: [art] SIG.S = 4CEDC4B9F8AA3CD9D99DC08B3C7C947ECCC80FAD67B367D9BA63E813D0242FBE72F49B8BED8E35307B9B7BB3C18462DA
1,493,186,655 UART: Caliptra RT
1,493,186,908 UART: [state] CFI Enabled
1,493,467,725 UART: [rt] RT listening for mailbox commands...
1,493,468,395 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,899,364 >>> mbox cmd response: success
1,495,913,056 UART:
1,495,913,072 UART: Running Caliptra FMC ...
1,495,913,480 UART:
1,495,913,534 UART: [state] CFI Enabled
1,496,002,421 UART: [art] Extend RT PCRs Done
1,496,002,849 UART: [art] Lock RT PCRs Done
1,496,004,082 UART: [art] Populate DV Done
1,496,012,435 UART: [fht] FMC Alias Private Key: 7
1,496,013,567 UART: [art] Derive CDI
1,496,013,847 UART: [art] Store in in slot 0x4
1,496,099,760 UART: [art] Derive Key Pair
1,496,100,120 UART: [art] Store priv key in slot 0x5
1,496,113,390 UART: [art] Derive Key Pair - Done
1,496,127,882 UART: [art] Signing Cert with AUTHO
1,496,128,362 UART: RITY.KEYID = 7
1,496,144,036 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,144,801 UART: [art] PUB.X = CF8AA749AB48EB89FF52E5585B176CF1036CAF4396E641FDAE976F6AD82F8D74135D7C4324EB608BE3A2590D7C6EAF52
1,496,151,581 UART: [art] PUB.Y = A4D4C73A768F140DAF55523EE9CDBF28A568F087B3C9FEDFBE507A8B0F869DD7488DB3033CAA095C18DA5D7F93606FCF
1,496,158,541 UART: [art] SIG.R = FD86BE5B97077FA597E50AA173D6C66C6F946694C2F097A8AB117A4D9B91C6B252070AC5C855A54F0E9AB8A0FC0667FF
1,496,165,305 UART: [art] SIG.S = 8A7D200B600E567D9EA795F92C739B4F1FE0ACB9C59A7EB1022847AE949A4771A18663B48945C622C019A2BF639A3913
1,496,189,261 UART: Caliptra RT
1,496,189,514 UART: [state] CFI Enabled
1,496,471,182 UART: [rt] RT listening for mailbox commands...
1,496,471,852 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,905,333 >>> mbox cmd response: success
1,498,918,657 UART:
1,498,918,673 UART: Running Caliptra FMC ...
1,498,919,081 UART:
1,498,919,135 UART: [state] CFI Enabled
1,499,008,746 UART: [art] Extend RT PCRs Done
1,499,009,174 UART: [art] Lock RT PCRs Done
1,499,010,263 UART: [art] Populate DV Done
1,499,018,488 UART: [fht] FMC Alias Private Key: 7
1,499,019,488 UART: [art] Derive CDI
1,499,019,768 UART: [art] Store in in slot 0x4
1,499,104,877 UART: [art] Derive Key Pair
1,499,105,237 UART: [art] Store priv key in slot 0x5
1,499,118,475 UART: [art] Derive Key Pair - Done
1,499,133,418 UART: [art] Signing Cert with AUTHO
1,499,133,898 UART: RITY.KEYID = 7
1,499,148,786 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,149,551 UART: [art] PUB.X = 1EFBB363959A5178EEBC6B5C5B125104297613D857FBFBA522D369EFDF3974A4E7F542360C59DDA8CC703D4F240347D4
1,499,156,320 UART: [art] PUB.Y = 1DBF0912F20B36D0CCA6AC7EBA0BEB5BBC7C8ECDE50E3478E3F6A78C002EA0CC42F0F51EBA48EBEFAC22D94F87BE2F43
1,499,163,274 UART: [art] SIG.R = FA12A10D2EA8B58A0A6EDA9C439C0FACC0CC048B99DF132A7636651C3D4D31D5E3148B5CA7A56062FF86A2781D6A9AA6
1,499,170,050 UART: [art] SIG.S = 4CEDC4B9F8AA3CD9D99DC08B3C7C947ECCC80FAD67B367D9BA63E813D0242FBE72F49B8BED8E35307B9B7BB3C18462DA
1,499,193,840 UART: Caliptra RT
1,499,194,093 UART: [state] CFI Enabled
1,499,478,588 UART: [rt] RT listening for mailbox commands...
1,499,479,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,912,575 >>> mbox cmd response: success
1,501,926,145 UART:
1,501,926,161 UART: Running Caliptra FMC ...
1,501,926,569 UART:
1,501,926,623 UART: [state] CFI Enabled
1,502,016,120 UART: [art] Extend RT PCRs Done
1,502,016,548 UART: [art] Lock RT PCRs Done
1,502,018,063 UART: [art] Populate DV Done
1,502,026,108 UART: [fht] FMC Alias Private Key: 7
1,502,027,040 UART: [art] Derive CDI
1,502,027,320 UART: [art] Store in in slot 0x4
1,502,113,055 UART: [art] Derive Key Pair
1,502,113,415 UART: [art] Store priv key in slot 0x5
1,502,127,227 UART: [art] Derive Key Pair - Done
1,502,141,963 UART: [art] Signing Cert with AUTHO
1,502,142,443 UART: RITY.KEYID = 7
1,502,157,907 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,158,672 UART: [art] PUB.X = CF8AA749AB48EB89FF52E5585B176CF1036CAF4396E641FDAE976F6AD82F8D74135D7C4324EB608BE3A2590D7C6EAF52
1,502,165,452 UART: [art] PUB.Y = A4D4C73A768F140DAF55523EE9CDBF28A568F087B3C9FEDFBE507A8B0F869DD7488DB3033CAA095C18DA5D7F93606FCF
1,502,172,412 UART: [art] SIG.R = FD86BE5B97077FA597E50AA173D6C66C6F946694C2F097A8AB117A4D9B91C6B252070AC5C855A54F0E9AB8A0FC0667FF
1,502,179,176 UART: [art] SIG.S = 8A7D200B600E567D9EA795F92C739B4F1FE0ACB9C59A7EB1022847AE949A4771A18663B48945C622C019A2BF639A3913
1,502,202,470 UART: Caliptra RT
1,502,202,723 UART: [state] CFI Enabled
1,502,489,761 UART: [rt] RT listening for mailbox commands...
1,502,490,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,924,542 >>> mbox cmd response: success
1,504,938,044 UART:
1,504,938,060 UART: Running Caliptra FMC ...
1,504,938,468 UART:
1,504,938,522 UART: [state] CFI Enabled
1,505,028,001 UART: [art] Extend RT PCRs Done
1,505,028,429 UART: [art] Lock RT PCRs Done
1,505,029,752 UART: [art] Populate DV Done
1,505,037,917 UART: [fht] FMC Alias Private Key: 7
1,505,038,955 UART: [art] Derive CDI
1,505,039,235 UART: [art] Store in in slot 0x4
1,505,124,900 UART: [art] Derive Key Pair
1,505,125,260 UART: [art] Store priv key in slot 0x5
1,505,138,032 UART: [art] Derive Key Pair - Done
1,505,152,479 UART: [art] Signing Cert with AUTHO
1,505,152,959 UART: RITY.KEYID = 7
1,505,168,091 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,168,856 UART: [art] PUB.X = 1EFBB363959A5178EEBC6B5C5B125104297613D857FBFBA522D369EFDF3974A4E7F542360C59DDA8CC703D4F240347D4
1,505,175,625 UART: [art] PUB.Y = 1DBF0912F20B36D0CCA6AC7EBA0BEB5BBC7C8ECDE50E3478E3F6A78C002EA0CC42F0F51EBA48EBEFAC22D94F87BE2F43
1,505,182,579 UART: [art] SIG.R = FA12A10D2EA8B58A0A6EDA9C439C0FACC0CC048B99DF132A7636651C3D4D31D5E3148B5CA7A56062FF86A2781D6A9AA6
1,505,189,355 UART: [art] SIG.S = 4CEDC4B9F8AA3CD9D99DC08B3C7C947ECCC80FAD67B367D9BA63E813D0242FBE72F49B8BED8E35307B9B7BB3C18462DA
1,505,213,011 UART: Caliptra RT
1,505,213,264 UART: [state] CFI Enabled
1,505,492,309 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 309.72s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,005,052 UART: [fht] FMC Alias Private Key: 7
1,554,006,202 UART: [art] Derive CDI
1,554,006,482 UART: [art] Store in in slot 0x4
1,554,092,645 UART: [art] Derive Key Pair
1,554,093,005 UART: [art] Store priv key in slot 0x5
1,554,106,279 UART: [art] Derive Key Pair - Done
1,554,121,216 UART: [art] Signing Cert with AUTHO
1,554,121,696 UART: RITY.KEYID = 7
1,554,136,898 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,137,663 UART: [art] PUB.X = 49C305D40DEB416AEE192E8B15C94CA1868D2846C50943E07451FFA4792502FFBEF3D2660E34F99B13D54923E6F388CD
1,554,144,422 UART: [art] PUB.Y = 3FA7024FF35202C57C720DD5138FC528B46BF0E7D35FF7096B25DB40B51D4C62A834B95D74E7D76FB4FFFBF0E6E72D5C
1,554,151,376 UART: [art] SIG.R = 1EC7E583B0B40C1E5D06C20E488926F9394A5B05673779F69E79094DA818A30FA4B5155EF979F37357EFE1D141A8BA37
1,554,158,128 UART: [art] SIG.S = 2D6D7FDB874BD60B7EE98463EF60E1C8727E2DB842B77A6F92E413D1443C9F8E081AE77561032F6E54CA7F271D4BAD92
1,554,182,130 UART: Caliptra RT
1,554,182,475 UART: [state] CFI Enabled
1,554,460,780 UART: [rt] RT listening for mailbox commands...
1,554,461,450 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,462,305 UART:
1,554,462,321 UART: Running Caliptra ROM ...
1,554,462,729 UART:
1,554,462,871 UART: [state] CFI Enabled
1,554,465,263 UART: [state] LifecycleState = Unprovisioned
1,554,465,918 UART: [state] DebugLocked = No
1,554,466,650 UART: [state] WD Timer not started. Device not locked for debugging
1,554,467,962 UART: [kat] SHA2-256
1,555,271,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,555,275,641 UART: [kat] ++
1,555,275,793 UART: [kat] sha1
1,555,279,963 UART: [kat] SHA2-256
1,555,281,903 UART: [kat] SHA2-384
1,555,284,842 UART: [kat] SHA2-512-ACC
1,555,286,742 UART: [kat] ECC-384
1,555,296,667 UART: [kat] HMAC-384Kdf
1,555,301,129 UART: [kat] LMS
1,555,549,441 UART: [kat] --
1,555,550,445 UART: [update-reset] ++
1,556,863,428 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,864,437 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,557,014,261 >>> mbox cmd response: success
1,557,014,610 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,022,624 UART: [update-reset Success] --
1,557,023,759 UART: [state] Locking Datavault
1,557,024,791 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,025,395 UART: [state] Locking ICCM
1,557,025,951 UART: [exit] Launching FMC @ 0x40000130
1,557,031,280 UART:
1,557,031,296 UART: Running Caliptra FMC ...
1,557,031,704 UART:
1,557,031,847 UART: [state] CFI Enabled
1,557,120,976 UART: [art] Extend RT PCRs Done
1,557,121,404 UART: [art] Lock RT PCRs Done
1,557,122,933 UART: [art] Populate DV Done
1,557,131,422 UART: [fht] FMC Alias Private Key: 7
1,557,132,454 UART: [art] Derive CDI
1,557,132,734 UART: [art] Store in in slot 0x4
1,557,218,195 UART: [art] Derive Key Pair
1,557,218,555 UART: [art] Store priv key in slot 0x5
1,557,231,485 UART: [art] Derive Key Pair - Done
1,557,246,235 UART: [art] Signing Cert with AUTHO
1,557,246,715 UART: RITY.KEYID = 7
1,557,262,079 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,262,844 UART: [art] PUB.X = 67A4C00C18C9837C7E26EC326F60E9113FD4898568A736B5DEA00947074BEA8E5B11CF901CF0BEFFADF0CF5E8E1E3F74
1,557,269,621 UART: [art] PUB.Y = F4DAFBA1DB38F6886584982DA1B7E4CA1743229F54654BB4E2FB65F9BE1919DA03CF039AC1B127D496F289EEB0E041D2
1,557,276,579 UART: [art] SIG.R = A311B0C9E092722B1641FDB40F9EBA8616A18C64966363FF4C3FAD678060A9E29B27AC1689F9BC4B276AD7DD29679CD6
1,557,283,354 UART: [art] SIG.S = D6443FCD4D3AB08A3A1E33637A5A29D99AD5C5027A452A8608FA5F2C259F5541556248012735967FA50620148A152EEA
1,557,307,373 UART: Caliptra RT
1,557,307,718 UART: [state] CFI Enabled
1,557,586,648 UART: [rt] RT listening for mailbox commands...
1,557,587,318 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,588,357 UART:
1,557,588,373 UART: Running Caliptra ROM ...
1,557,588,781 UART:
1,557,588,923 UART: [state] CFI Enabled
1,557,591,727 UART: [state] LifecycleState = Unprovisioned
1,557,592,382 UART: [state] DebugLocked = No
1,557,593,092 UART: [state] WD Timer not started. Device not locked for debugging
1,557,594,338 UART: [kat] SHA2-256
1,558,397,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,558,402,017 UART: [kat] ++
1,558,402,169 UART: [kat] sha1
1,558,406,251 UART: [kat] SHA2-256
1,558,408,191 UART: [kat] SHA2-384
1,558,410,954 UART: [kat] SHA2-512-ACC
1,558,412,854 UART: [kat] ECC-384
1,558,422,863 UART: [kat] HMAC-384Kdf
1,558,427,575 UART: [kat] LMS
1,558,675,887 UART: [kat] --
1,558,677,133 UART: [update-reset] ++
1,559,989,950 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,991,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,560,140,857 >>> mbox cmd response: success
1,560,141,096 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,149,110 UART: [update-reset Success] --
1,560,150,121 UART: [state] Locking Datavault
1,560,150,875 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,151,479 UART: [state] Locking ICCM
1,560,151,919 UART: [exit] Launching FMC @ 0x40000130
1,560,157,248 UART:
1,560,157,264 UART: Running Caliptra FMC ...
1,560,157,672 UART:
1,560,157,815 UART: [state] CFI Enabled
1,560,247,100 UART: [art] Extend RT PCRs Done
1,560,247,528 UART: [art] Lock RT PCRs Done
1,560,248,547 UART: [art] Populate DV Done
1,560,256,866 UART: [fht] FMC Alias Private Key: 7
1,560,257,972 UART: [art] Derive CDI
1,560,258,252 UART: [art] Store in in slot 0x4
1,560,343,905 UART: [art] Derive Key Pair
1,560,344,265 UART: [art] Store priv key in slot 0x5
1,560,357,701 UART: [art] Derive Key Pair - Done
1,560,372,460 UART: [art] Signing Cert with AUTHO
1,560,372,940 UART: RITY.KEYID = 7
1,560,387,824 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,388,589 UART: [art] PUB.X = 49C305D40DEB416AEE192E8B15C94CA1868D2846C50943E07451FFA4792502FFBEF3D2660E34F99B13D54923E6F388CD
1,560,395,348 UART: [art] PUB.Y = 3FA7024FF35202C57C720DD5138FC528B46BF0E7D35FF7096B25DB40B51D4C62A834B95D74E7D76FB4FFFBF0E6E72D5C
1,560,402,302 UART: [art] SIG.R = 1EC7E583B0B40C1E5D06C20E488926F9394A5B05673779F69E79094DA818A30FA4B5155EF979F37357EFE1D141A8BA37
1,560,409,054 UART: [art] SIG.S = 2D6D7FDB874BD60B7EE98463EF60E1C8727E2DB842B77A6F92E413D1443C9F8E081AE77561032F6E54CA7F271D4BAD92
1,560,433,256 UART: Caliptra RT
1,560,433,601 UART: [state] CFI Enabled
1,560,717,414 UART: [rt] RT listening for mailbox commands...
1,560,718,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,719,163 UART:
1,560,719,179 UART: Running Caliptra ROM ...
1,560,719,587 UART:
1,560,719,729 UART: [state] CFI Enabled
1,560,722,385 UART: [state] LifecycleState = Unprovisioned
1,560,723,040 UART: [state] DebugLocked = No
1,560,723,578 UART: [state] WD Timer not started. Device not locked for debugging
1,560,724,882 UART: [kat] SHA2-256
1,561,528,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,532,561 UART: [kat] ++
1,561,532,713 UART: [kat] sha1
1,561,536,903 UART: [kat] SHA2-256
1,561,538,843 UART: [kat] SHA2-384
1,561,541,582 UART: [kat] SHA2-512-ACC
1,561,543,482 UART: [kat] ECC-384
1,561,553,241 UART: [kat] HMAC-384Kdf
1,561,558,029 UART: [kat] LMS
1,561,806,341 UART: [kat] --
1,561,807,167 UART: [update-reset] ++
1,563,119,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,120,959 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,563,270,783 >>> mbox cmd response: success
1,563,270,944 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,278,958 UART: [update-reset Success] --
1,563,280,027 UART: [state] Locking Datavault
1,563,280,885 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,281,489 UART: [state] Locking ICCM
1,563,282,073 UART: [exit] Launching FMC @ 0x40000130
1,563,287,402 UART:
1,563,287,418 UART: Running Caliptra FMC ...
1,563,287,826 UART:
1,563,287,969 UART: [state] CFI Enabled
1,563,377,104 UART: [art] Extend RT PCRs Done
1,563,377,532 UART: [art] Lock RT PCRs Done
1,563,378,845 UART: [art] Populate DV Done
1,563,387,202 UART: [fht] FMC Alias Private Key: 7
1,563,388,292 UART: [art] Derive CDI
1,563,388,572 UART: [art] Store in in slot 0x4
1,563,474,655 UART: [art] Derive Key Pair
1,563,475,015 UART: [art] Store priv key in slot 0x5
1,563,488,339 UART: [art] Derive Key Pair - Done
1,563,503,087 UART: [art] Signing Cert with AUTHO
1,563,503,567 UART: RITY.KEYID = 7
1,563,518,587 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,519,352 UART: [art] PUB.X = 67A4C00C18C9837C7E26EC326F60E9113FD4898568A736B5DEA00947074BEA8E5B11CF901CF0BEFFADF0CF5E8E1E3F74
1,563,526,129 UART: [art] PUB.Y = F4DAFBA1DB38F6886584982DA1B7E4CA1743229F54654BB4E2FB65F9BE1919DA03CF039AC1B127D496F289EEB0E041D2
1,563,533,087 UART: [art] SIG.R = A311B0C9E092722B1641FDB40F9EBA8616A18C64966363FF4C3FAD678060A9E29B27AC1689F9BC4B276AD7DD29679CD6
1,563,539,862 UART: [art] SIG.S = D6443FCD4D3AB08A3A1E33637A5A29D99AD5C5027A452A8608FA5F2C259F5541556248012735967FA50620148A152EEA
1,563,563,771 UART: Caliptra RT
1,563,564,116 UART: [state] CFI Enabled
1,563,843,530 UART: [rt] RT listening for mailbox commands...
1,563,844,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,844,901 UART:
1,563,844,917 UART: Running Caliptra ROM ...
1,563,845,325 UART:
1,563,845,467 UART: [state] CFI Enabled
1,563,848,049 UART: [state] LifecycleState = Unprovisioned
1,563,848,704 UART: [state] DebugLocked = No
1,563,849,338 UART: [state] WD Timer not started. Device not locked for debugging
1,563,850,674 UART: [kat] SHA2-256
1,564,654,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,658,353 UART: [kat] ++
1,564,658,505 UART: [kat] sha1
1,564,662,765 UART: [kat] SHA2-256
1,564,664,705 UART: [kat] SHA2-384
1,564,667,424 UART: [kat] SHA2-512-ACC
1,564,669,324 UART: [kat] ECC-384
1,564,679,271 UART: [kat] HMAC-384Kdf
1,564,683,935 UART: [kat] LMS
1,564,932,247 UART: [kat] --
1,564,932,769 UART: [update-reset] ++
1,566,245,314 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,246,485 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,566,396,309 >>> mbox cmd response: success
1,566,396,636 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,404,650 UART: [update-reset Success] --
1,566,405,925 UART: [state] Locking Datavault
1,566,406,605 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,407,209 UART: [state] Locking ICCM
1,566,407,851 UART: [exit] Launching FMC @ 0x40000130
1,566,413,180 UART:
1,566,413,196 UART: Running Caliptra FMC ...
1,566,413,604 UART:
1,566,413,747 UART: [state] CFI Enabled
1,566,503,268 UART: [art] Extend RT PCRs Done
1,566,503,696 UART: [art] Lock RT PCRs Done
1,566,505,025 UART: [art] Populate DV Done
1,566,513,202 UART: [fht] FMC Alias Private Key: 7
1,566,514,338 UART: [art] Derive CDI
1,566,514,618 UART: [art] Store in in slot 0x4
1,566,600,533 UART: [art] Derive Key Pair
1,566,600,893 UART: [art] Store priv key in slot 0x5
1,566,613,989 UART: [art] Derive Key Pair - Done
1,566,628,586 UART: [art] Signing Cert with AUTHO
1,566,629,066 UART: RITY.KEYID = 7
1,566,644,118 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,644,883 UART: [art] PUB.X = 49C305D40DEB416AEE192E8B15C94CA1868D2846C50943E07451FFA4792502FFBEF3D2660E34F99B13D54923E6F388CD
1,566,651,642 UART: [art] PUB.Y = 3FA7024FF35202C57C720DD5138FC528B46BF0E7D35FF7096B25DB40B51D4C62A834B95D74E7D76FB4FFFBF0E6E72D5C
1,566,658,596 UART: [art] SIG.R = 1EC7E583B0B40C1E5D06C20E488926F9394A5B05673779F69E79094DA818A30FA4B5155EF979F37357EFE1D141A8BA37
1,566,665,348 UART: [art] SIG.S = 2D6D7FDB874BD60B7EE98463EF60E1C8727E2DB842B77A6F92E413D1443C9F8E081AE77561032F6E54CA7F271D4BAD92
1,566,689,832 UART: Caliptra RT
1,566,690,177 UART: [state] CFI Enabled
1,566,970,284 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 324.78s
Truncated 733352 bytes from beginning
8 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,500,726 >>> mbox cmd response: success
1,484,514,016 UART:
1,484,514,032 UART: Running Caliptra FMC ...
1,484,514,440 UART:
1,484,514,583 UART: [state] CFI Enabled
1,484,603,986 UART: [art] Extend RT PCRs Done
1,484,604,414 UART: [art] Lock RT PCRs Done
1,484,605,641 UART: [art] Populate DV Done
1,484,613,848 UART: [fht] FMC Alias Private Key: 7
1,484,615,030 UART: [art] Derive CDI
1,484,615,310 UART: [art] Store in in slot 0x4
1,484,700,819 UART: [art] Derive Key Pair
1,484,701,179 UART: [art] Store priv key in slot 0x5
1,484,714,853 UART: [art] Derive Key Pair - Done
1,484,729,447 UART: [art] Signing Cert with AUTHO
1,484,729,927 UART: RITY.KEYID = 7
1,484,745,413 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,746,178 UART: [art] PUB.X = 80F6E0D24E34FF44B806693DE06C49B7F899D1997C564228E1735522DFBBB27CC4A62D200728482C24733DA795315A59
1,484,752,936 UART: [art] PUB.Y = DC90ADC41563634013F2A8E656D415883169E8028F5CFB7D0355EF1F9F8CFE74762A4AA0B4CE98E2FC37DA39DC3450CF
1,484,759,892 UART: [art] SIG.R = 3DF947CC82C385DF6E13FAB2BE62FE0467D9337C757F276960889616C5B4F9758527D49F06219301B0A2C2CE68149F5E
1,484,766,651 UART: [art] SIG.S = AA60AC02BE78D8399DCC1984196764DF90697626542D73C044439521CC0EED67BED4EAB06DA6B6232A5D69D88B66F7FA
1,484,789,954 UART: Caliptra RT
1,484,790,299 UART: [state] CFI Enabled
1,485,070,402 UART: [rt] RT listening for mailbox commands...
1,485,071,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,503,808 >>> mbox cmd response: success
1,487,517,294 UART:
1,487,517,310 UART: Running Caliptra FMC ...
1,487,517,718 UART:
1,487,517,861 UART: [state] CFI Enabled
1,487,607,130 UART: [art] Extend RT PCRs Done
1,487,607,558 UART: [art] Lock RT PCRs Done
1,487,608,875 UART: [art] Populate DV Done
1,487,617,198 UART: [fht] FMC Alias Private Key: 7
1,487,618,166 UART: [art] Derive CDI
1,487,618,446 UART: [art] Store in in slot 0x4
1,487,704,061 UART: [art] Derive Key Pair
1,487,704,421 UART: [art] Store priv key in slot 0x5
1,487,717,391 UART: [art] Derive Key Pair - Done
1,487,732,212 UART: [art] Signing Cert with AUTHO
1,487,732,692 UART: RITY.KEYID = 7
1,487,748,286 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,749,051 UART: [art] PUB.X = 626349501E1B9189B6A188827793D67FD85BD9F9A32DFC4DF82A50B3F082CB41F547542E390FEE5628B313B94E41CAFB
1,487,755,822 UART: [art] PUB.Y = 2A92D4A24DAF13EC8D5C55835B1C0576C64EE60D547A1151FF4A5AA6593159FB90F067F770EE5B52E0DB4C3C7CF70757
1,487,762,773 UART: [art] SIG.R = 7EE3334C8D0B106D08A4186612A610CCA9CBFA2AE4DEF30D6E6FDF892E3E9D9462171F2297B7CC8D8846ED1215A60F46
1,487,769,543 UART: [art] SIG.S = EE70CE8FED90B914B85A0A21A5C68B8E735BEECAA756E3FB459E561694304CFB80D120C58FBA2FCB4361B706CC4D872C
1,487,793,128 UART: Caliptra RT
1,487,793,473 UART: [state] CFI Enabled
1,488,075,252 UART: [rt] RT listening for mailbox commands...
1,488,075,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,508,072 >>> mbox cmd response: success
1,490,521,832 UART:
1,490,521,848 UART: Running Caliptra FMC ...
1,490,522,256 UART:
1,490,522,399 UART: [state] CFI Enabled
1,490,611,736 UART: [art] Extend RT PCRs Done
1,490,612,164 UART: [art] Lock RT PCRs Done
1,490,613,407 UART: [art] Populate DV Done
1,490,621,580 UART: [fht] FMC Alias Private Key: 7
1,490,622,566 UART: [art] Derive CDI
1,490,622,846 UART: [art] Store in in slot 0x4
1,490,708,291 UART: [art] Derive Key Pair
1,490,708,651 UART: [art] Store priv key in slot 0x5
1,490,722,039 UART: [art] Derive Key Pair - Done
1,490,736,517 UART: [art] Signing Cert with AUTHO
1,490,736,997 UART: RITY.KEYID = 7
1,490,752,197 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,752,962 UART: [art] PUB.X = 80F6E0D24E34FF44B806693DE06C49B7F899D1997C564228E1735522DFBBB27CC4A62D200728482C24733DA795315A59
1,490,759,720 UART: [art] PUB.Y = DC90ADC41563634013F2A8E656D415883169E8028F5CFB7D0355EF1F9F8CFE74762A4AA0B4CE98E2FC37DA39DC3450CF
1,490,766,676 UART: [art] SIG.R = 3DF947CC82C385DF6E13FAB2BE62FE0467D9337C757F276960889616C5B4F9758527D49F06219301B0A2C2CE68149F5E
1,490,773,435 UART: [art] SIG.S = AA60AC02BE78D8399DCC1984196764DF90697626542D73C044439521CC0EED67BED4EAB06DA6B6232A5D69D88B66F7FA
1,490,797,576 UART: Caliptra RT
1,490,797,921 UART: [state] CFI Enabled
1,491,080,620 UART: [rt] RT listening for mailbox commands...
1,491,081,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,515,254 >>> mbox cmd response: success
1,493,528,452 UART:
1,493,528,468 UART: Running Caliptra FMC ...
1,493,528,876 UART:
1,493,529,019 UART: [state] CFI Enabled
1,493,618,482 UART: [art] Extend RT PCRs Done
1,493,618,910 UART: [art] Lock RT PCRs Done
1,493,620,367 UART: [art] Populate DV Done
1,493,628,438 UART: [fht] FMC Alias Private Key: 7
1,493,629,528 UART: [art] Derive CDI
1,493,629,808 UART: [art] Store in in slot 0x4
1,493,714,991 UART: [art] Derive Key Pair
1,493,715,351 UART: [art] Store priv key in slot 0x5
1,493,728,593 UART: [art] Derive Key Pair - Done
1,493,743,364 UART: [art] Signing Cert with AUTHO
1,493,743,844 UART: RITY.KEYID = 7
1,493,758,776 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,759,541 UART: [art] PUB.X = 626349501E1B9189B6A188827793D67FD85BD9F9A32DFC4DF82A50B3F082CB41F547542E390FEE5628B313B94E41CAFB
1,493,766,312 UART: [art] PUB.Y = 2A92D4A24DAF13EC8D5C55835B1C0576C64EE60D547A1151FF4A5AA6593159FB90F067F770EE5B52E0DB4C3C7CF70757
1,493,773,263 UART: [art] SIG.R = 7EE3334C8D0B106D08A4186612A610CCA9CBFA2AE4DEF30D6E6FDF892E3E9D9462171F2297B7CC8D8846ED1215A60F46
1,493,780,033 UART: [art] SIG.S = EE70CE8FED90B914B85A0A21A5C68B8E735BEECAA756E3FB459E561694304CFB80D120C58FBA2FCB4361B706CC4D872C
1,493,803,598 UART: Caliptra RT
1,493,803,943 UART: [state] CFI Enabled
1,494,087,044 UART: [rt] RT listening for mailbox commands...
1,494,087,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,521,794 >>> mbox cmd response: success
1,496,535,292 UART:
1,496,535,308 UART: Running Caliptra FMC ...
1,496,535,716 UART:
1,496,535,859 UART: [state] CFI Enabled
1,496,624,874 UART: [art] Extend RT PCRs Done
1,496,625,302 UART: [art] Lock RT PCRs Done
1,496,626,337 UART: [art] Populate DV Done
1,496,634,752 UART: [fht] FMC Alias Private Key: 7
1,496,635,802 UART: [art] Derive CDI
1,496,636,082 UART: [art] Store in in slot 0x4
1,496,721,505 UART: [art] Derive Key Pair
1,496,721,865 UART: [art] Store priv key in slot 0x5
1,496,735,185 UART: [art] Derive Key Pair - Done
1,496,750,053 UART: [art] Signing Cert with AUTHO
1,496,750,533 UART: RITY.KEYID = 7
1,496,765,667 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,766,432 UART: [art] PUB.X = 80F6E0D24E34FF44B806693DE06C49B7F899D1997C564228E1735522DFBBB27CC4A62D200728482C24733DA795315A59
1,496,773,190 UART: [art] PUB.Y = DC90ADC41563634013F2A8E656D415883169E8028F5CFB7D0355EF1F9F8CFE74762A4AA0B4CE98E2FC37DA39DC3450CF
1,496,780,146 UART: [art] SIG.R = 3DF947CC82C385DF6E13FAB2BE62FE0467D9337C757F276960889616C5B4F9758527D49F06219301B0A2C2CE68149F5E
1,496,786,905 UART: [art] SIG.S = AA60AC02BE78D8399DCC1984196764DF90697626542D73C044439521CC0EED67BED4EAB06DA6B6232A5D69D88B66F7FA
1,496,811,002 UART: Caliptra RT
1,496,811,347 UART: [state] CFI Enabled
1,497,092,466 UART: [rt] RT listening for mailbox commands...
1,497,093,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,527,778 >>> mbox cmd response: success
1,499,541,306 UART:
1,499,541,322 UART: Running Caliptra FMC ...
1,499,541,730 UART:
1,499,541,873 UART: [state] CFI Enabled
1,499,630,868 UART: [art] Extend RT PCRs Done
1,499,631,296 UART: [art] Lock RT PCRs Done
1,499,632,691 UART: [art] Populate DV Done
1,499,640,926 UART: [fht] FMC Alias Private Key: 7
1,499,642,034 UART: [art] Derive CDI
1,499,642,314 UART: [art] Store in in slot 0x4
1,499,728,087 UART: [art] Derive Key Pair
1,499,728,447 UART: [art] Store priv key in slot 0x5
1,499,741,771 UART: [art] Derive Key Pair - Done
1,499,756,526 UART: [art] Signing Cert with AUTHO
1,499,757,006 UART: RITY.KEYID = 7
1,499,772,338 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,773,103 UART: [art] PUB.X = 626349501E1B9189B6A188827793D67FD85BD9F9A32DFC4DF82A50B3F082CB41F547542E390FEE5628B313B94E41CAFB
1,499,779,874 UART: [art] PUB.Y = 2A92D4A24DAF13EC8D5C55835B1C0576C64EE60D547A1151FF4A5AA6593159FB90F067F770EE5B52E0DB4C3C7CF70757
1,499,786,825 UART: [art] SIG.R = 7EE3334C8D0B106D08A4186612A610CCA9CBFA2AE4DEF30D6E6FDF892E3E9D9462171F2297B7CC8D8846ED1215A60F46
1,499,793,595 UART: [art] SIG.S = EE70CE8FED90B914B85A0A21A5C68B8E735BEECAA756E3FB459E561694304CFB80D120C58FBA2FCB4361B706CC4D872C
1,499,817,264 UART: Caliptra RT
1,499,817,609 UART: [state] CFI Enabled
1,500,099,878 UART: [rt] RT listening for mailbox commands...
1,500,100,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,534,012 >>> mbox cmd response: success
1,502,547,518 UART:
1,502,547,534 UART: Running Caliptra FMC ...
1,502,547,942 UART:
1,502,548,085 UART: [state] CFI Enabled
1,502,636,810 UART: [art] Extend RT PCRs Done
1,502,637,238 UART: [art] Lock RT PCRs Done
1,502,638,159 UART: [art] Populate DV Done
1,502,646,480 UART: [fht] FMC Alias Private Key: 7
1,502,647,556 UART: [art] Derive CDI
1,502,647,836 UART: [art] Store in in slot 0x4
1,502,733,227 UART: [art] Derive Key Pair
1,502,733,587 UART: [art] Store priv key in slot 0x5
1,502,746,321 UART: [art] Derive Key Pair - Done
1,502,760,949 UART: [art] Signing Cert with AUTHO
1,502,761,429 UART: RITY.KEYID = 7
1,502,776,517 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,777,282 UART: [art] PUB.X = 80F6E0D24E34FF44B806693DE06C49B7F899D1997C564228E1735522DFBBB27CC4A62D200728482C24733DA795315A59
1,502,784,040 UART: [art] PUB.Y = DC90ADC41563634013F2A8E656D415883169E8028F5CFB7D0355EF1F9F8CFE74762A4AA0B4CE98E2FC37DA39DC3450CF
1,502,790,996 UART: [art] SIG.R = 3DF947CC82C385DF6E13FAB2BE62FE0467D9337C757F276960889616C5B4F9758527D49F06219301B0A2C2CE68149F5E
1,502,797,755 UART: [art] SIG.S = AA60AC02BE78D8399DCC1984196764DF90697626542D73C044439521CC0EED67BED4EAB06DA6B6232A5D69D88B66F7FA
1,502,821,492 UART: Caliptra RT
1,502,821,837 UART: [state] CFI Enabled
1,503,104,752 UART: [rt] RT listening for mailbox commands...
1,503,105,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,539,436 >>> mbox cmd response: success
1,505,552,422 UART:
1,505,552,438 UART: Running Caliptra FMC ...
1,505,552,846 UART:
1,505,552,989 UART: [state] CFI Enabled
1,505,642,252 UART: [art] Extend RT PCRs Done
1,505,642,680 UART: [art] Lock RT PCRs Done
1,505,643,951 UART: [art] Populate DV Done
1,505,651,926 UART: [fht] FMC Alias Private Key: 7
1,505,652,922 UART: [art] Derive CDI
1,505,653,202 UART: [art] Store in in slot 0x4
1,505,738,881 UART: [art] Derive Key Pair
1,505,739,241 UART: [art] Store priv key in slot 0x5
1,505,752,797 UART: [art] Derive Key Pair - Done
1,505,767,412 UART: [art] Signing Cert with AUTHO
1,505,767,892 UART: RITY.KEYID = 7
1,505,782,966 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,783,731 UART: [art] PUB.X = 626349501E1B9189B6A188827793D67FD85BD9F9A32DFC4DF82A50B3F082CB41F547542E390FEE5628B313B94E41CAFB
1,505,790,502 UART: [art] PUB.Y = 2A92D4A24DAF13EC8D5C55835B1C0576C64EE60D547A1151FF4A5AA6593159FB90F067F770EE5B52E0DB4C3C7CF70757
1,505,797,453 UART: [art] SIG.R = 7EE3334C8D0B106D08A4186612A610CCA9CBFA2AE4DEF30D6E6FDF892E3E9D9462171F2297B7CC8D8846ED1215A60F46
1,505,804,223 UART: [art] SIG.S = EE70CE8FED90B914B85A0A21A5C68B8E735BEECAA756E3FB459E561694304CFB80D120C58FBA2FCB4361B706CC4D872C
1,505,828,048 UART: Caliptra RT
1,505,828,393 UART: [state] CFI Enabled
1,506,110,438 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 317.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,395 UART: [kat] SHA2-256
882,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,441 UART: [kat] ++
886,593 UART: [kat] sha1
890,835 UART: [kat] SHA2-256
892,773 UART: [kat] SHA2-384
895,656 UART: [kat] SHA2-512-ACC
897,557 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,686 UART: [kat] LMS
1,475,882 UART: [kat] --
1,476,665 UART: [cold-reset] ++
1,477,113 UART: [fht] Storing FHT @ 0x50003400
1,479,880 UART: [idev] ++
1,480,048 UART: [idev] CDI.KEYID = 6
1,480,408 UART: [idev] SUBJECT.KEYID = 7
1,480,832 UART: [idev] UDS.KEYID = 0
1,481,177 ready_for_fw is high
1,481,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,662 UART: [idev] Erasing UDS.KEYID = 0
1,505,344 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,893 UART: [ldev] ++
1,515,061 UART: [ldev] CDI.KEYID = 6
1,515,424 UART: [ldev] SUBJECT.KEYID = 5
1,515,850 UART: [ldev] AUTHORITY.KEYID = 7
1,516,313 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,545,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,326 UART: [ldev] --
1,584,655 UART: [fwproc] Waiting for Commands...
1,585,498 UART: [fwproc] Received command 0x46574c44
1,586,289 UART: [fwproc] Received Image of size 114332 bytes
2,883,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,754 >>> mbox cmd response: success
3,076,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,077,848 UART: [afmc] ++
3,078,016 UART: [afmc] CDI.KEYID = 6
3,078,378 UART: [afmc] SUBJECT.KEYID = 7
3,078,803 UART: [afmc] AUTHORITY.KEYID = 5
3,113,784 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,605 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,295 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,326 UART: [afmc] --
3,157,306 UART: [cold-reset] --
3,158,382 UART: [state] Locking Datavault
3,159,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,183 UART: [state] Locking ICCM
3,160,719 UART: [exit] Launching FMC @ 0x40000130
3,166,048 UART:
3,166,064 UART: Running Caliptra FMC ...
3,166,472 UART:
3,166,526 UART: [state] CFI Enabled
3,177,101 UART: [fht] FMC Alias Private Key: 7
3,284,714 UART: [art] Extend RT PCRs Done
3,285,142 UART: [art] Lock RT PCRs Done
3,286,616 UART: [art] Populate DV Done
3,294,803 UART: [fht] FMC Alias Private Key: 7
3,295,931 UART: [art] Derive CDI
3,296,211 UART: [art] Store in in slot 0x4
3,381,894 UART: [art] Derive Key Pair
3,382,254 UART: [art] Store priv key in slot 0x5
3,395,128 UART: [art] Derive Key Pair - Done
3,409,774 UART: [art] Signing Cert with AUTHO
3,410,254 UART: RITY.KEYID = 7
3,425,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,983 UART: [art] PUB.X = E1424ABFC0B2E3688C66FF48A9AD5FC0BDDA528A996DEC4AFAAEF887470D6802C59884D700207864976D404AADFF55DB
3,432,743 UART: [art] PUB.Y = 27198DC7F71B147FB3AAAAF0E9499A64F45C1074D6EE877552C270699AB5EDDF1152B7FA54437E2E33CD08108F04CADA
3,439,699 UART: [art] SIG.R = 9E0866D7F79C25A452EC5C14325F7B48A8674C4908D6158D455CBC206A039903C13A3F2507E5B219391F7701A97F916F
3,446,443 UART: [art] SIG.S = 97067AD1926BF71D82FF9A29562979F17AC9E62FA0C0C04B7ED70FDA1760C1069F71DB7D63FFE3FF99ACB27C773FF03F
3,470,663 UART: Caliptra RT
3,470,916 UART: [state] CFI Enabled
3,578,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,451 UART:
3,580,467 UART: Running Caliptra ROM ...
3,580,875 UART:
3,580,929 UART: [state] CFI Enabled
3,583,599 UART: [state] LifecycleState = Unprovisioned
3,584,254 UART: [state] DebugLocked = No
3,584,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,421 UART: [kat] SHA2-256
4,380,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,467 UART: [kat] ++
4,384,619 UART: [kat] sha1
4,388,991 UART: [kat] SHA2-256
4,390,929 UART: [kat] SHA2-384
4,393,538 UART: [kat] SHA2-512-ACC
4,395,438 UART: [kat] ECC-384
4,400,719 UART: [kat] HMAC-384Kdf
4,405,353 UART: [kat] LMS
4,973,549 UART: [kat] --
4,974,640 UART: [update-reset] ++
6,309,412 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,310,480 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,460,356 >>> mbox cmd response: success
6,460,681 UART: [update-reset] Copying MAN_2 To MAN_1
6,468,695 UART: [update-reset Success] --
6,469,764 UART: [state] Locking Datavault
6,470,496 UART: [state] Locking PCR0, PCR1 and PCR31
6,471,100 UART: [state] Locking ICCM
6,471,606 UART: [exit] Launching FMC @ 0x40000130
6,476,935 UART:
6,476,951 UART: Running Caliptra FMC ...
6,477,359 UART:
6,477,413 UART: [state] CFI Enabled
6,566,504 UART: [art] Extend RT PCRs Done
6,566,932 UART: [art] Lock RT PCRs Done
6,568,123 UART: [art] Populate DV Done
6,576,402 UART: [fht] FMC Alias Private Key: 7
6,577,514 UART: [art] Derive CDI
6,577,794 UART: [art] Store in in slot 0x4
6,663,505 UART: [art] Derive Key Pair
6,663,865 UART: [art] Store priv key in slot 0x5
6,677,323 UART: [art] Derive Key Pair - Done
6,692,008 UART: [art] Signing Cert with AUTHO
6,692,488 UART: RITY.KEYID = 7
6,707,742 UART: [art] Erasing AUTHORITY.KEYID = 7
6,708,507 UART: [art] PUB.X = ACDA331FFFF45DBD9FC33DCB29847F45FB05F8154AC35AA41621E916339511F537AE687406530FE61768005D4D5AD384
6,715,252 UART: [art] PUB.Y = 306862CABDA6E50EE8BC291DFF5AE95EC69073BBFEC924BFF7660AA9BF7E8AEF6F08EC70279D8352047FACA28106C649
6,722,209 UART: [art] SIG.R = 883541D012B118A2A3159E27B96DE0F0F76FCB52E212C3A194FB01AF3739CA687C648875F90D7C934EB5AC903D620D57
6,728,972 UART: [art] SIG.S = 5F34A73410286F8E86D91B271568D63E505F671913124E93CC34716DB9BB5F89D0570C58D4B74F5F853177441DFF26F5
6,752,794 UART: Caliptra RT
6,753,047 UART: [state] CFI Enabled
7,035,430 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,037 ready_for_fw is high
1,362,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,038 >>> mbox cmd response: success
2,926,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,988,012 UART:
2,988,028 UART: Running Caliptra FMC ...
2,988,436 UART:
2,988,490 UART: [state] CFI Enabled
2,999,063 UART: [fht] FMC Alias Private Key: 7
3,107,490 UART: [art] Extend RT PCRs Done
3,107,918 UART: [art] Lock RT PCRs Done
3,109,346 UART: [art] Populate DV Done
3,117,675 UART: [fht] FMC Alias Private Key: 7
3,118,679 UART: [art] Derive CDI
3,118,959 UART: [art] Store in in slot 0x4
3,204,518 UART: [art] Derive Key Pair
3,204,878 UART: [art] Store priv key in slot 0x5
3,217,986 UART: [art] Derive Key Pair - Done
3,233,024 UART: [art] Signing Cert with AUTHO
3,233,504 UART: RITY.KEYID = 7
3,248,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,399 UART: [art] PUB.X = EA7FEF4DC1566FFFB5596384E1D352C8F7A81BA191F4C793C80F595D686DB321C7B15749E3A6398811C5AD4338B84611
3,256,170 UART: [art] PUB.Y = 5E6439DD3CFABF96571DD2E5372AE0B637E7EA74AD394F1192C245284959E9D80B24C8F6056EFBE6E41FE167948932A7
3,263,120 UART: [art] SIG.R = 3AAC665345C75C32824CDD825D85E9E0E9F2C16B762DF98C3D5AADB67341B1698A07B277020EA157DAC38287D1178B07
3,269,882 UART: [art] SIG.S = 17EF4EFB3D3C3EFBE08038CE1742E234113C069742309676B43F2038BB746627EAED05902470249614B239A2BB545A68
3,293,571 UART: Caliptra RT
3,293,824 UART: [state] CFI Enabled
3,402,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,570 >>> mbox cmd response: success
6,178,743 UART:
6,178,759 UART: Running Caliptra FMC ...
6,179,167 UART:
6,179,221 UART: [state] CFI Enabled
6,267,924 UART: [art] Extend RT PCRs Done
6,268,352 UART: [art] Lock RT PCRs Done
6,269,595 UART: [art] Populate DV Done
6,277,912 UART: [fht] FMC Alias Private Key: 7
6,279,052 UART: [art] Derive CDI
6,279,332 UART: [art] Store in in slot 0x4
6,364,853 UART: [art] Derive Key Pair
6,365,213 UART: [art] Store priv key in slot 0x5
6,378,717 UART: [art] Derive Key Pair - Done
6,393,486 UART: [art] Signing Cert with AUTHO
6,393,966 UART: RITY.KEYID = 7
6,408,802 UART: [art] Erasing AUTHORITY.KEYID = 7
6,409,567 UART: [art] PUB.X = D88AD51E20AE841ADB03DC286E3EEA8C9A20C04BC7FDD3A127B4EC50CA00CE2C0870441147F24CC8682026F56B53A601
6,416,320 UART: [art] PUB.Y = DC64ED21D19F3650215BF8CCE100C9B06CE13EBD2B5D6DAE888497FAA968B360045FC38F8B9D8014F1F0D87B5AA5CE90
6,423,263 UART: [art] SIG.R = 1DE26E4F378401CBE1705CF4A4398D0F8EFDF5173931AF63231C086EC788373A769E40762A1F861A428ED5AF3EBD0105
6,430,022 UART: [art] SIG.S = 2A04A980D52DAC0B9A89726295765DB25736CD14D3F889CC3AA6D8CE0381D956F31811CDFDBDDE0610606CAB49D11858
6,454,235 UART: Caliptra RT
6,454,488 UART: [state] CFI Enabled
6,738,574 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,937 UART: [state] LifecycleState = Unprovisioned
85,592 UART: [state] DebugLocked = No
86,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,956 UART: [kat] SHA2-256
881,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,002 UART: [kat] ++
886,154 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,771 UART: [kat] HMAC-384Kdf
907,299 UART: [kat] LMS
1,475,495 UART: [kat] --
1,476,522 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 ready_for_fw is high
1,480,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,593 UART: [idev] Erasing UDS.KEYID = 0
1,504,961 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,387 UART: [idev] --
1,514,388 UART: [ldev] ++
1,514,556 UART: [ldev] CDI.KEYID = 6
1,514,919 UART: [ldev] SUBJECT.KEYID = 5
1,515,345 UART: [ldev] AUTHORITY.KEYID = 7
1,515,808 UART: [ldev] FE.KEYID = 1
1,521,210 UART: [ldev] Erasing FE.KEYID = 1
1,546,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,979 UART: [ldev] --
1,586,320 UART: [fwproc] Waiting for Commands...
1,586,949 UART: [fwproc] Received command 0x46574c44
1,587,740 UART: [fwproc] Received Image of size 114332 bytes
2,885,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,453 >>> mbox cmd response: success
3,078,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,079,579 UART: [afmc] ++
3,079,747 UART: [afmc] CDI.KEYID = 6
3,080,109 UART: [afmc] SUBJECT.KEYID = 7
3,080,534 UART: [afmc] AUTHORITY.KEYID = 5
3,115,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,265 UART: [afmc] --
3,159,255 UART: [cold-reset] --
3,160,041 UART: [state] Locking Datavault
3,161,248 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,852 UART: [state] Locking ICCM
3,162,392 UART: [exit] Launching FMC @ 0x40000130
3,167,721 UART:
3,167,737 UART: Running Caliptra FMC ...
3,168,145 UART:
3,168,288 UART: [state] CFI Enabled
3,179,047 UART: [fht] FMC Alias Private Key: 7
3,287,242 UART: [art] Extend RT PCRs Done
3,287,670 UART: [art] Lock RT PCRs Done
3,289,222 UART: [art] Populate DV Done
3,297,359 UART: [fht] FMC Alias Private Key: 7
3,298,443 UART: [art] Derive CDI
3,298,723 UART: [art] Store in in slot 0x4
3,384,306 UART: [art] Derive Key Pair
3,384,666 UART: [art] Store priv key in slot 0x5
3,397,712 UART: [art] Derive Key Pair - Done
3,412,659 UART: [art] Signing Cert with AUTHO
3,413,139 UART: RITY.KEYID = 7
3,428,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,324 UART: [art] PUB.X = 0D00C6CB252530BBA3B8F24806386795C872A2775890DA2E2F97C276BA8A02CD1B72A7E445FD9DBABAB1EC6288CC49B2
3,436,075 UART: [art] PUB.Y = 6E66A978D5901B8677FC63BCC9E2D23F244ADE007AF9D6EA35A7B6D7B281433D02BB4D435DB8B6018091DD4B2122CEA5
3,443,009 UART: [art] SIG.R = CBF89DD618A8F3E4ED6F2E4D103BA7533490816D58EC8388D59DE894375FD5F4ABBDB22C71D05261F002472F1AEAD1D6
3,449,790 UART: [art] SIG.S = 5CEEF24358E5CD79E6E8DAD651DBBDD51A89388D1CBC29F2FAFAF845D2B4459DA5B557F084163882E529411D09413024
3,473,504 UART: Caliptra RT
3,473,849 UART: [state] CFI Enabled
3,582,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,585 UART:
3,584,601 UART: Running Caliptra ROM ...
3,585,009 UART:
3,585,150 UART: [state] CFI Enabled
3,587,970 UART: [state] LifecycleState = Unprovisioned
3,588,625 UART: [state] DebugLocked = No
3,589,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,876 UART: [kat] SHA2-256
4,384,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,922 UART: [kat] ++
4,389,074 UART: [kat] sha1
4,393,226 UART: [kat] SHA2-256
4,395,164 UART: [kat] SHA2-384
4,398,061 UART: [kat] SHA2-512-ACC
4,399,961 UART: [kat] ECC-384
4,405,744 UART: [kat] HMAC-384Kdf
4,410,562 UART: [kat] LMS
4,978,758 UART: [kat] --
4,979,715 UART: [update-reset] ++
6,314,687 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,315,943 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,465,819 >>> mbox cmd response: success
6,466,006 UART: [update-reset] Copying MAN_2 To MAN_1
6,474,020 UART: [update-reset Success] --
6,475,121 UART: [state] Locking Datavault
6,476,077 UART: [state] Locking PCR0, PCR1 and PCR31
6,476,681 UART: [state] Locking ICCM
6,477,327 UART: [exit] Launching FMC @ 0x40000130
6,482,656 UART:
6,482,672 UART: Running Caliptra FMC ...
6,483,080 UART:
6,483,223 UART: [state] CFI Enabled
6,572,642 UART: [art] Extend RT PCRs Done
6,573,070 UART: [art] Lock RT PCRs Done
6,574,391 UART: [art] Populate DV Done
6,582,716 UART: [fht] FMC Alias Private Key: 7
6,583,682 UART: [art] Derive CDI
6,583,962 UART: [art] Store in in slot 0x4
6,669,871 UART: [art] Derive Key Pair
6,670,231 UART: [art] Store priv key in slot 0x5
6,683,415 UART: [art] Derive Key Pair - Done
6,698,194 UART: [art] Signing Cert with AUTHO
6,698,674 UART: RITY.KEYID = 7
6,713,848 UART: [art] Erasing AUTHORITY.KEYID = 7
6,714,613 UART: [art] PUB.X = 8355F07AD8855CCA93887AECA60AFC77330CC1545AD20FA829089DD189D388FA62FBB0D74C94AE6FC4293FDBFE4B3B5D
6,721,391 UART: [art] PUB.Y = 449F8FBD7265EBDDC8A8690DD1F13B4F2E37846F9761B1093F74258F124F53E5C20D4AF99C20B22D0B6A2BB69A3CE5AC
6,728,343 UART: [art] SIG.R = 1D04FB832D2322050C20811CB85E2601A851CA9B8DACD9DB7354B0615216D1447353532E263218AEFFB669E0EC78D90D
6,735,098 UART: [art] SIG.S = D2589BC771065C39AA6DEEA6F95A1F6084B240FAB36A584E211897CA50944F6D574D69552B1F8B98217E380129FF60FF
6,758,829 UART: Caliptra RT
6,759,174 UART: [state] CFI Enabled
7,039,403 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,822 ready_for_fw is high
1,361,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,109 >>> mbox cmd response: success
2,928,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,451 UART:
2,989,467 UART: Running Caliptra FMC ...
2,989,875 UART:
2,990,018 UART: [state] CFI Enabled
3,000,737 UART: [fht] FMC Alias Private Key: 7
3,109,050 UART: [art] Extend RT PCRs Done
3,109,478 UART: [art] Lock RT PCRs Done
3,111,360 UART: [art] Populate DV Done
3,119,443 UART: [fht] FMC Alias Private Key: 7
3,120,529 UART: [art] Derive CDI
3,120,809 UART: [art] Store in in slot 0x4
3,206,198 UART: [art] Derive Key Pair
3,206,558 UART: [art] Store priv key in slot 0x5
3,220,432 UART: [art] Derive Key Pair - Done
3,234,756 UART: [art] Signing Cert with AUTHO
3,235,236 UART: RITY.KEYID = 7
3,250,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,319 UART: [art] PUB.X = 53AED205E288CBAD229B568FC2190349AF80116B5C02B56BDF6CFFD2673FF9D022820AFAE236FDAB8146A6E14E16F06C
3,258,093 UART: [art] PUB.Y = 08BE8714C1566AF28850A04CC0539FA6F50A6835A7C4E31B8096A1F1AD54EEE54B61D8F240B60377D3B71A518C01BA0C
3,265,034 UART: [art] SIG.R = F06163CFBE5DAE3D760096E7167DAF7A85D78FD6D0C3D6C01CD72B96D61E97A4A55287207788FE964E62400F3AC873EB
3,271,789 UART: [art] SIG.S = 9331C6DA486334D69931B7E9F4301483D789B261BC54FA0507E8E2EC11041CE2D80893851E6856589EF18F384E714ADA
3,295,398 UART: Caliptra RT
3,295,743 UART: [state] CFI Enabled
3,403,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,754 >>> mbox cmd response: success
6,181,217 UART:
6,181,233 UART: Running Caliptra FMC ...
6,181,641 UART:
6,181,784 UART: [state] CFI Enabled
6,270,773 UART: [art] Extend RT PCRs Done
6,271,201 UART: [art] Lock RT PCRs Done
6,272,930 UART: [art] Populate DV Done
6,281,355 UART: [fht] FMC Alias Private Key: 7
6,282,469 UART: [art] Derive CDI
6,282,749 UART: [art] Store in in slot 0x4
6,368,608 UART: [art] Derive Key Pair
6,368,968 UART: [art] Store priv key in slot 0x5
6,382,344 UART: [art] Derive Key Pair - Done
6,397,193 UART: [art] Signing Cert with AUTHO
6,397,673 UART: RITY.KEYID = 7
6,412,905 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,670 UART: [art] PUB.X = 82AE0B3F9E269CD910771807D06C8EB6F7F5B5BC3E03CA107AAAE912843F578C670E109D238158056EA8336E5C7D5D1D
6,420,431 UART: [art] PUB.Y = 7D1F2D25DFB12B2B54F27998612A76455746C385045A707070DA78F0B97E11E1CECC3843DF4DAFDFCFE393D63CC419CF
6,427,390 UART: [art] SIG.R = F5499704D74C5CE1EE062AA1C8DD85309C1D2FFF6A44FDEBDA09026DF7476F407924952C821D29BD9538249F4CAAA3CE
6,434,162 UART: [art] SIG.S = 024B40863BB458D46B3A92C25549758CCDF5C4AFBFD892806F43642A6B3288C0AE018F561ADA598E717B6698BDC1C52E
6,457,563 UART: Caliptra RT
6,457,908 UART: [state] CFI Enabled
6,741,077 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,591 UART: [kat] SHA2-256
903,531 UART: [kat] SHA2-384
906,244 UART: [kat] SHA2-512-ACC
908,145 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
922,758 UART: [kat] LMS
1,171,086 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,721 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 ready_for_fw is high
1,176,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,758 UART: [idev] Erasing UDS.KEYID = 0
1,202,033 UART: [idev] Sha1 KeyId Algorithm
1,210,643 UART: [idev] --
1,211,845 UART: [ldev] ++
1,212,013 UART: [ldev] CDI.KEYID = 6
1,212,376 UART: [ldev] SUBJECT.KEYID = 5
1,212,802 UART: [ldev] AUTHORITY.KEYID = 7
1,213,265 UART: [ldev] FE.KEYID = 1
1,218,451 UART: [ldev] Erasing FE.KEYID = 1
1,245,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,989 UART: [ldev] --
1,284,412 UART: [fwproc] Wait for Commands...
1,285,016 UART: [fwproc] Recv command 0x46574c44
1,285,744 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,891 >>> mbox cmd response: success
2,775,891 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,776,963 UART: [afmc] ++
2,777,131 UART: [afmc] CDI.KEYID = 6
2,777,493 UART: [afmc] SUBJECT.KEYID = 7
2,777,918 UART: [afmc] AUTHORITY.KEYID = 5
2,812,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,216 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,062 UART: [afmc] --
2,856,048 UART: [cold-reset] --
2,856,824 UART: [state] Locking Datavault
2,858,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,671 UART: [state] Locking ICCM
2,859,111 UART: [exit] Launching FMC @ 0x40000130
2,864,440 UART:
2,864,456 UART: Running Caliptra FMC ...
2,864,864 UART:
2,864,918 UART: [state] CFI Enabled
2,875,719 UART: [fht] FMC Alias Private Key: 7
2,983,866 UART: [art] Extend RT PCRs Done
2,984,294 UART: [art] Lock RT PCRs Done
2,985,950 UART: [art] Populate DV Done
2,994,125 UART: [fht] FMC Alias Private Key: 7
2,995,193 UART: [art] Derive CDI
2,995,473 UART: [art] Store in in slot 0x4
3,081,238 UART: [art] Derive Key Pair
3,081,598 UART: [art] Store priv key in slot 0x5
3,094,340 UART: [art] Derive Key Pair - Done
3,109,162 UART: [art] Signing Cert with AUTHO
3,109,642 UART: RITY.KEYID = 7
3,124,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,291 UART: [art] PUB.X = 95487E020F964F1B6939BC6A38C8726DEB3EC2A73B96698ADD7F8DB801713DADA0124984783EEA5F87A6629F1009261E
3,132,051 UART: [art] PUB.Y = 09EB2FF8A6735D2971AD1D968A9205762D0179B900B8AB4D34190A6E21F6A78DA636A36538E051D541CD1D9F02B5C085
3,138,964 UART: [art] SIG.R = F221527725640B5E9F69A76C0EA065BDAC4C6336C7CB4B107D76CE481DBA120A94C9F2EBBC0EB91AD56183C92A468342
3,145,732 UART: [art] SIG.S = 8465777DF99FF1F72015FD422A99C629756F4991059BD582B6600B8C845722C8FC14D46D2DFC58D69C793FAECA44C3CF
3,169,899 UART: Caliptra RT
3,170,152 UART: [state] CFI Enabled
3,278,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,662 UART:
3,280,678 UART: Running Caliptra ROM ...
3,281,086 UART:
3,281,141 UART: [state] CFI Enabled
3,283,571 UART: [state] LifecycleState = Unprovisioned
3,284,226 UART: [state] DebugLocked = No
3,284,868 UART: [state] WD Timer not started. Device not locked for debugging
3,286,040 UART: [kat] SHA2-256
4,091,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,815 UART: [kat] ++
4,095,967 UART: [kat] sha1
4,100,167 UART: [kat] SHA2-256
4,102,107 UART: [kat] SHA2-384
4,104,932 UART: [kat] SHA2-512-ACC
4,106,832 UART: [kat] ECC-384
4,116,215 UART: [kat] HMAC-384Kdf
4,120,951 UART: [kat] LMS
4,369,279 UART: [kat] --
4,370,339 UART: [update-reset] ++
5,683,067 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,684,080 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,833,904 >>> mbox cmd response: success
5,834,161 UART: [update-reset] Copying MAN_2 To MAN_1
5,842,175 UART: [update-reset Success] --
5,843,278 UART: [state] Locking Datavault
5,844,276 UART: [state] Locking PCR0, PCR1 and PCR31
5,844,880 UART: [state] Locking ICCM
5,845,410 UART: [exit] Launching FMC @ 0x40000130
5,850,739 UART:
5,850,755 UART: Running Caliptra FMC ...
5,851,163 UART:
5,851,217 UART: [state] CFI Enabled
5,940,304 UART: [art] Extend RT PCRs Done
5,940,732 UART: [art] Lock RT PCRs Done
5,941,863 UART: [art] Populate DV Done
5,949,934 UART: [fht] FMC Alias Private Key: 7
5,950,868 UART: [art] Derive CDI
5,951,148 UART: [art] Store in in slot 0x4
6,036,997 UART: [art] Derive Key Pair
6,037,357 UART: [art] Store priv key in slot 0x5
6,050,615 UART: [art] Derive Key Pair - Done
6,065,602 UART: [art] Signing Cert with AUTHO
6,066,082 UART: RITY.KEYID = 7
6,081,384 UART: [art] Erasing AUTHORITY.KEYID = 7
6,082,149 UART: [art] PUB.X = 3FABD4EF6D96D16DC78232A680503072D79D37798F36424DB876B61FF97EDE4FC132B19A9C40C5F378BC7743F4302F97
6,088,923 UART: [art] PUB.Y = 5EF7403F58C555AEF2F8166909788FABD0D33736F5957BD0D18012DBCDC24D6882DF1F3375DCC67D7D106BCE96B9BDA9
6,095,884 UART: [art] SIG.R = D848BF96224FE0AABF0B540636AED17B23DF9EC2A73047B0CBC183CED14F027F9183891B6201740E917D9BE3EAA932A1
6,102,651 UART: [art] SIG.S = DD2C9100FD03BE5960354DC0D98BFDD333C5AD3AFFAC1A4E59846691648AB21F2A1879197B45ABF053BFD4F3ADC68DCB
6,126,649 UART: Caliptra RT
6,126,902 UART: [state] CFI Enabled
6,405,504 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,103 ready_for_fw is high
1,061,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,688 >>> mbox cmd response: success
2,627,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,474 UART:
2,689,490 UART: Running Caliptra FMC ...
2,689,898 UART:
2,689,952 UART: [state] CFI Enabled
2,700,033 UART: [fht] FMC Alias Private Key: 7
2,807,344 UART: [art] Extend RT PCRs Done
2,807,772 UART: [art] Lock RT PCRs Done
2,809,396 UART: [art] Populate DV Done
2,818,065 UART: [fht] FMC Alias Private Key: 7
2,818,993 UART: [art] Derive CDI
2,819,273 UART: [art] Store in in slot 0x4
2,905,326 UART: [art] Derive Key Pair
2,905,686 UART: [art] Store priv key in slot 0x5
2,918,600 UART: [art] Derive Key Pair - Done
2,932,954 UART: [art] Signing Cert with AUTHO
2,933,434 UART: RITY.KEYID = 7
2,948,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,273 UART: [art] PUB.X = 3014B18012A963A578E33D9A0B51E274C18DE2C991F497DBE8D50C88EFE325B9AC5F3B34CFDFFDABDBC556DCE64677C3
2,956,057 UART: [art] PUB.Y = C4AE62EB4FA2A3B6766EEEE2660447DEFC27A4B59FB81B7BB552AF0227263C65A9FB1C70D3BAECFB8F53A04CADA3333D
2,963,029 UART: [art] SIG.R = B23CB2CB06FD4D7C3977DD3E69C23EA6142429A8489D31B56B9C7958B5EE9CB53D4F26CF9D97683AAA76C0AB24BACE8B
2,969,816 UART: [art] SIG.S = 0084ADD660EDE7EC6C4638263E0394CA24723987421EC6B4CB5CCF2AD892145F3ACCA77A4384BA71D6DD5C44BE4BADCA
2,993,658 UART: Caliptra RT
2,993,911 UART: [state] CFI Enabled
3,101,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,541,258 >>> mbox cmd response: success
5,554,192 UART:
5,554,208 UART: Running Caliptra FMC ...
5,554,616 UART:
5,554,670 UART: [state] CFI Enabled
5,643,851 UART: [art] Extend RT PCRs Done
5,644,279 UART: [art] Lock RT PCRs Done
5,645,188 UART: [art] Populate DV Done
5,653,357 UART: [fht] FMC Alias Private Key: 7
5,654,451 UART: [art] Derive CDI
5,654,731 UART: [art] Store in in slot 0x4
5,740,206 UART: [art] Derive Key Pair
5,740,566 UART: [art] Store priv key in slot 0x5
5,753,682 UART: [art] Derive Key Pair - Done
5,768,224 UART: [art] Signing Cert with AUTHO
5,768,704 UART: RITY.KEYID = 7
5,783,848 UART: [art] Erasing AUTHORITY.KEYID = 7
5,784,613 UART: [art] PUB.X = DE771C33F8E5589BC6F882FA6D955975F14C1F50277B84BE63B473E444EEE7A780BE6A23685E1CA7B0FC605BC87825B8
5,791,391 UART: [art] PUB.Y = 47CE13489B3671016B32FF90D436C92A4B48B29A4ED9F16E9362C798846E286DDF1FBE29555E6657A5E62655AFF292C6
5,798,338 UART: [art] SIG.R = 974EFCFB7590B6398AAD3CB1617C8285524F1321FE27F56BD4FD75C5C3F17AB5188A3D3722C46085C45E549879AEDD09
5,805,111 UART: [art] SIG.S = 261C229EE53F4D0283CD2D536C69D62273CD6D6B8E1C3D87FF9241B59649A88D3C52335C996C4AF165B1E0DE6E376A74
5,828,615 UART: Caliptra RT
5,828,868 UART: [state] CFI Enabled
6,116,051 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
893,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,536 UART: [kat] ++
897,688 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,089 UART: [idev] ++
1,175,257 UART: [idev] CDI.KEYID = 6
1,175,617 UART: [idev] SUBJECT.KEYID = 7
1,176,041 UART: [idev] UDS.KEYID = 0
1,176,386 ready_for_fw is high
1,176,386 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,221 UART: [idev] Erasing UDS.KEYID = 0
1,201,010 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,248 UART: [ldev] ++
1,210,416 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,205 UART: [ldev] AUTHORITY.KEYID = 7
1,211,668 UART: [ldev] FE.KEYID = 1
1,216,750 UART: [ldev] Erasing FE.KEYID = 1
1,243,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,020 UART: [ldev] --
1,282,501 UART: [fwproc] Wait for Commands...
1,283,271 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,584 >>> mbox cmd response: success
2,774,584 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,775,726 UART: [afmc] ++
2,775,894 UART: [afmc] CDI.KEYID = 6
2,776,256 UART: [afmc] SUBJECT.KEYID = 7
2,776,681 UART: [afmc] AUTHORITY.KEYID = 5
2,812,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,959 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,844 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,563 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,483 UART: [afmc] --
2,856,531 UART: [cold-reset] --
2,857,155 UART: [state] Locking Datavault
2,858,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,816 UART: [state] Locking ICCM
2,859,296 UART: [exit] Launching FMC @ 0x40000130
2,864,625 UART:
2,864,641 UART: Running Caliptra FMC ...
2,865,049 UART:
2,865,192 UART: [state] CFI Enabled
2,875,537 UART: [fht] FMC Alias Private Key: 7
2,983,490 UART: [art] Extend RT PCRs Done
2,983,918 UART: [art] Lock RT PCRs Done
2,985,504 UART: [art] Populate DV Done
2,993,681 UART: [fht] FMC Alias Private Key: 7
2,994,829 UART: [art] Derive CDI
2,995,109 UART: [art] Store in in slot 0x4
3,080,958 UART: [art] Derive Key Pair
3,081,318 UART: [art] Store priv key in slot 0x5
3,094,430 UART: [art] Derive Key Pair - Done
3,109,065 UART: [art] Signing Cert with AUTHO
3,109,545 UART: RITY.KEYID = 7
3,124,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,380 UART: [art] PUB.X = 902AD0F7FBCED2348A68DE25AEE8DD403430C5348A7C4426F85AE3AF4FFCF36907FF51A12EDC2674CFCE90F757F202E9
3,132,164 UART: [art] PUB.Y = B3196C7D0D8CBB44FFD654DB6B6106089D33D47275534C53670DCF8A5C2A8DAD4E2B8F37D4C87151C9580078A6B005BC
3,139,085 UART: [art] SIG.R = C364A6177C907DDC1C71AD947D6003AAAD5F674C622F9B9BDB4E10D7C067CCC2C9D463E96DE10FCD8BC9080B9797C37D
3,145,861 UART: [art] SIG.S = B0F6393E60FA115C5268CA7B4BA1639F0FDF0510B551216D5D0B9B047E0A0E7774CFCF71F4FA42F7F3746728B2615C3D
3,169,600 UART: Caliptra RT
3,169,945 UART: [state] CFI Enabled
3,278,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,179 UART:
3,280,195 UART: Running Caliptra ROM ...
3,280,603 UART:
3,280,745 UART: [state] CFI Enabled
3,283,767 UART: [state] LifecycleState = Unprovisioned
3,284,422 UART: [state] DebugLocked = No
3,285,004 UART: [state] WD Timer not started. Device not locked for debugging
3,286,258 UART: [kat] SHA2-256
4,091,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,033 UART: [kat] ++
4,096,185 UART: [kat] sha1
4,100,575 UART: [kat] SHA2-256
4,102,515 UART: [kat] SHA2-384
4,105,350 UART: [kat] SHA2-512-ACC
4,107,250 UART: [kat] ECC-384
4,116,893 UART: [kat] HMAC-384Kdf
4,121,479 UART: [kat] LMS
4,369,807 UART: [kat] --
4,370,453 UART: [update-reset] ++
5,683,073 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,684,100 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,833,924 >>> mbox cmd response: success
5,834,055 UART: [update-reset] Copying MAN_2 To MAN_1
5,842,069 UART: [update-reset Success] --
5,843,050 UART: [state] Locking Datavault
5,843,926 UART: [state] Locking PCR0, PCR1 and PCR31
5,844,530 UART: [state] Locking ICCM
5,845,020 UART: [exit] Launching FMC @ 0x40000130
5,850,349 UART:
5,850,365 UART: Running Caliptra FMC ...
5,850,773 UART:
5,850,916 UART: [state] CFI Enabled
5,939,991 UART: [art] Extend RT PCRs Done
5,940,419 UART: [art] Lock RT PCRs Done
5,941,748 UART: [art] Populate DV Done
5,949,785 UART: [fht] FMC Alias Private Key: 7
5,950,827 UART: [art] Derive CDI
5,951,107 UART: [art] Store in in slot 0x4
6,036,404 UART: [art] Derive Key Pair
6,036,764 UART: [art] Store priv key in slot 0x5
6,049,826 UART: [art] Derive Key Pair - Done
6,064,703 UART: [art] Signing Cert with AUTHO
6,065,183 UART: RITY.KEYID = 7
6,080,771 UART: [art] Erasing AUTHORITY.KEYID = 7
6,081,536 UART: [art] PUB.X = 5421BAD048678775AF5DD1A7E7AF098F3176F7D0EF95A33F515AB7BAA187119084306D9A4BF6C6A2EF70B5CC75DB8261
6,088,313 UART: [art] PUB.Y = 8963372790B66FF6E1379C6122FD7E0C815A19A378D6C83CBD42C52944FD754B7F2E0E30F0CEEBE9945C7AE01803CE31
6,095,260 UART: [art] SIG.R = DBABCF1B1B287C093C0A6C3973FA61CD83F84107340119E1E71433380E017EF61015045419D5E86A804B4768AFDC3881
6,102,007 UART: [art] SIG.S = B44B5163C37EF216E3D67D1FE4AAE3CE40E6885C85E2D56D97824D388F535E86FC97E1A4E6E08B0CA9665D197A450D7D
6,126,040 UART: Caliptra RT
6,126,385 UART: [state] CFI Enabled
6,409,209 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 ready_for_fw is high
1,060,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,591 >>> mbox cmd response: success
2,623,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,686,019 UART:
2,686,035 UART: Running Caliptra FMC ...
2,686,443 UART:
2,686,586 UART: [state] CFI Enabled
2,697,167 UART: [fht] FMC Alias Private Key: 7
2,805,126 UART: [art] Extend RT PCRs Done
2,805,554 UART: [art] Lock RT PCRs Done
2,806,984 UART: [art] Populate DV Done
2,815,021 UART: [fht] FMC Alias Private Key: 7
2,815,983 UART: [art] Derive CDI
2,816,263 UART: [art] Store in in slot 0x4
2,901,920 UART: [art] Derive Key Pair
2,902,280 UART: [art] Store priv key in slot 0x5
2,915,652 UART: [art] Derive Key Pair - Done
2,930,525 UART: [art] Signing Cert with AUTHO
2,931,005 UART: RITY.KEYID = 7
2,946,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,390 UART: [art] PUB.X = F58B78553BD152F83C4947C7089254005EAC3CB6D2DFDAC484253AF10674D0D59A95B098DF16C1ACDBEE8C96BA3CB475
2,954,146 UART: [art] PUB.Y = D803E265B46DCB3B6441E9F2EBB46A9A3BF4F1E55B046BEFFD387F9182633D2597DCE889EA651404D67174E44BBEB5A4
2,961,101 UART: [art] SIG.R = 9EA6E70B4E971FD8B09352D51ED844565A3D70B87F86718DC89053A7DE5192B0E8D49985BEC8CC689C18A47EEBAFF549
2,967,878 UART: [art] SIG.S = 1003ADA114F0E945FF3605DADD71EF31126A1D38AF464F1907F01C028FE24AEEF90F7863828DCE36D32A281B162627CA
2,991,372 UART: Caliptra RT
2,991,717 UART: [state] CFI Enabled
3,100,576 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,539,182 >>> mbox cmd response: success
5,552,576 UART:
5,552,592 UART: Running Caliptra FMC ...
5,553,000 UART:
5,553,143 UART: [state] CFI Enabled
5,642,080 UART: [art] Extend RT PCRs Done
5,642,508 UART: [art] Lock RT PCRs Done
5,643,669 UART: [art] Populate DV Done
5,651,728 UART: [fht] FMC Alias Private Key: 7
5,652,722 UART: [art] Derive CDI
5,653,002 UART: [art] Store in in slot 0x4
5,738,469 UART: [art] Derive Key Pair
5,738,829 UART: [art] Store priv key in slot 0x5
5,752,499 UART: [art] Derive Key Pair - Done
5,767,251 UART: [art] Signing Cert with AUTHO
5,767,731 UART: RITY.KEYID = 7
5,782,511 UART: [art] Erasing AUTHORITY.KEYID = 7
5,783,276 UART: [art] PUB.X = C22D54D2B525D869F9446058B1B0C3DA74947ABF3A950A8D53D77F58F385C66D5D1A8703A1442BF3BA8E902FDE9E460D
5,790,045 UART: [art] PUB.Y = 5DF2881CB95E6DA5FB3B0E119D175D21CDE5E272F13FD14B6343FD640DA951150DAB2250BA48AB951823F97D19874523
5,796,992 UART: [art] SIG.R = DC3E616EC741C8376ADD364570E033CB22C5578AF642BEBF6A8D8BBD9BD429A51194CBE11C9A0E411249DB4DA1E64B49
5,803,775 UART: [art] SIG.S = 0875DA53C2FBBBB944308B06B6A11DED781A725AE076553BB91A3F15D17515E0E38091FF5CD9D14EE34F7B256836AFB2
5,827,306 UART: Caliptra RT
5,827,651 UART: [state] CFI Enabled
6,110,854 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,776 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 ready_for_fw is high
1,174,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,418 UART: [ldev] --
1,280,786 UART: [fwproc] Wait for Commands...
1,281,395 UART: [fwproc] Recv command 0x46574c44
1,282,128 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,297 >>> mbox cmd response: success
2,771,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,772,340 UART: [afmc] ++
2,772,508 UART: [afmc] CDI.KEYID = 6
2,772,871 UART: [afmc] SUBJECT.KEYID = 7
2,773,297 UART: [afmc] AUTHORITY.KEYID = 5
2,808,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,175 UART: [afmc] --
2,852,097 UART: [cold-reset] --
2,852,957 UART: [state] Locking Datavault
2,854,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,814 UART: [state] Locking ICCM
2,855,398 UART: [exit] Launching FMC @ 0x40000130
2,860,727 UART:
2,860,743 UART: Running Caliptra FMC ...
2,861,151 UART:
2,861,205 UART: [state] CFI Enabled
2,871,684 UART: [fht] FMC Alias Private Key: 7
2,979,201 UART: [art] Extend RT PCRs Done
2,979,629 UART: [art] Lock RT PCRs Done
2,981,089 UART: [art] Populate DV Done
2,989,502 UART: [fht] FMC Alias Private Key: 7
2,990,606 UART: [art] Derive CDI
2,990,886 UART: [art] Store in in slot 0x4
3,076,481 UART: [art] Derive Key Pair
3,076,841 UART: [art] Store priv key in slot 0x5
3,090,087 UART: [art] Derive Key Pair - Done
3,105,132 UART: [art] Signing Cert with AUTHO
3,105,612 UART: RITY.KEYID = 7
3,120,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,169 UART: [art] PUB.X = 0814F2535AD912AE9758D6D409D406605BB0C81FAFA79912B7AEF67A8AFE88D65E626168933A2247C54C3F4060609250
3,127,926 UART: [art] PUB.Y = 8B90F11759D75374E6400C60141ED3A207A1D5DF2D21C9C1DB0BED5257EA0B9FA573836580C47D7AE8FECE1FA3243334
3,134,872 UART: [art] SIG.R = DE30D1E8346F67FF1283620FA216922C55DE039CD116F82AE053DF2E430C8CB046544EE336E0BCD0E51334B0BC5BAB1F
3,141,645 UART: [art] SIG.S = 658271E11D2B3F1BCCE88F7084D91D2095AC788E7F60F5AB709F06E6571CCA12D6C38A62CA5B958F311D4A737049D264
3,165,221 UART: Caliptra RT
3,165,474 UART: [state] CFI Enabled
3,273,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,657 UART:
3,275,673 UART: Running Caliptra ROM ...
3,276,081 UART:
3,276,136 UART: [state] CFI Enabled
3,279,192 UART: [state] LifecycleState = Unprovisioned
3,279,847 UART: [state] DebugLocked = No
3,280,457 UART: [state] WD Timer not started. Device not locked for debugging
3,281,629 UART: [kat] SHA2-256
4,085,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,308 UART: [kat] ++
4,089,460 UART: [kat] sha1
4,093,532 UART: [kat] SHA2-256
4,095,472 UART: [kat] SHA2-384
4,098,233 UART: [kat] SHA2-512-ACC
4,100,133 UART: [kat] ECC-384
4,109,776 UART: [kat] HMAC-384Kdf
4,114,254 UART: [kat] LMS
4,362,566 UART: [kat] --
4,363,356 UART: [update-reset] ++
5,675,655 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,676,840 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,826,664 >>> mbox cmd response: success
5,826,869 UART: [update-reset] Copying MAN_2 To MAN_1
5,834,883 UART: [update-reset Success] --
5,835,612 UART: [state] Locking Datavault
5,836,394 UART: [state] Locking PCR0, PCR1 and PCR31
5,836,998 UART: [state] Locking ICCM
5,837,484 UART: [exit] Launching FMC @ 0x40000130
5,842,813 UART:
5,842,829 UART: Running Caliptra FMC ...
5,843,237 UART:
5,843,291 UART: [state] CFI Enabled
5,932,530 UART: [art] Extend RT PCRs Done
5,932,958 UART: [art] Lock RT PCRs Done
5,934,151 UART: [art] Populate DV Done
5,942,346 UART: [fht] FMC Alias Private Key: 7
5,943,296 UART: [art] Derive CDI
5,943,576 UART: [art] Store in in slot 0x4
6,028,995 UART: [art] Derive Key Pair
6,029,355 UART: [art] Store priv key in slot 0x5
6,042,107 UART: [art] Derive Key Pair - Done
6,056,947 UART: [art] Signing Cert with AUTHO
6,057,427 UART: RITY.KEYID = 7
6,072,421 UART: [art] Erasing AUTHORITY.KEYID = 7
6,073,186 UART: [art] PUB.X = E3F8BF68F7153F7DD6150288449384602A0576A3D929762AB8FCDA7F320C628D9F7C142D69F4C93462065B1CB3A0F5C0
6,079,944 UART: [art] PUB.Y = A8367A4213D6C8B4D54E8F2F254835D04B426D9EC82B36522CB3101FB8223C02F6EFB01E0E49574BDAB5B28574726127
6,086,888 UART: [art] SIG.R = C6D5148D49E1E7B65D523408712F3D98EF9D3199572FBDBA25CD552630CD457D314D12053B8BECF345D887A813600949
6,093,647 UART: [art] SIG.S = 9AB0E87EB1B71979CA3168DB5D77346B716F751E17061E360AAE8259745DEA79F94F26FF1874E21B5C50056472C278A7
6,118,219 UART: Caliptra RT
6,118,472 UART: [state] CFI Enabled
6,400,858 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,888 ready_for_fw is high
1,055,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,101 >>> mbox cmd response: success
2,621,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,682,587 UART:
2,682,603 UART: Running Caliptra FMC ...
2,683,011 UART:
2,683,065 UART: [state] CFI Enabled
2,693,860 UART: [fht] FMC Alias Private Key: 7
2,802,093 UART: [art] Extend RT PCRs Done
2,802,521 UART: [art] Lock RT PCRs Done
2,804,229 UART: [art] Populate DV Done
2,812,684 UART: [fht] FMC Alias Private Key: 7
2,813,816 UART: [art] Derive CDI
2,814,096 UART: [art] Store in in slot 0x4
2,899,541 UART: [art] Derive Key Pair
2,899,901 UART: [art] Store priv key in slot 0x5
2,912,827 UART: [art] Derive Key Pair - Done
2,927,529 UART: [art] Signing Cert with AUTHO
2,928,009 UART: RITY.KEYID = 7
2,943,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,264 UART: [art] PUB.X = B675A21C87ED2FBF07508A290F7AB0AB6490F9757305553305173FC1151241321AD7024245DB9E193C3D89381C50214D
2,951,009 UART: [art] PUB.Y = F52B9D937FAC4CC1A380DFFBAADD029125EBCB34A78B4B50CEA80BB496F6FF3B229834F77E3D68F795D1C03ED0928E36
2,957,975 UART: [art] SIG.R = 930BF3477C1D87C59F353531B92BA3108520A86BC16073A1B10CA79C5B71FC19337CB63672978796D81334753DE223D9
2,964,729 UART: [art] SIG.S = BCD0E1BC4D590D78793D3D4C4F6011414B922B92D595E276188815E5C1020243503003E0507985AF48DDA4CE53818320
2,988,188 UART: Caliptra RT
2,988,441 UART: [state] CFI Enabled
3,096,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,877 >>> mbox cmd response: success
5,543,027 UART:
5,543,043 UART: Running Caliptra FMC ...
5,543,451 UART:
5,543,505 UART: [state] CFI Enabled
5,632,838 UART: [art] Extend RT PCRs Done
5,633,266 UART: [art] Lock RT PCRs Done
5,634,655 UART: [art] Populate DV Done
5,642,990 UART: [fht] FMC Alias Private Key: 7
5,644,068 UART: [art] Derive CDI
5,644,348 UART: [art] Store in in slot 0x4
5,729,917 UART: [art] Derive Key Pair
5,730,277 UART: [art] Store priv key in slot 0x5
5,743,443 UART: [art] Derive Key Pair - Done
5,758,506 UART: [art] Signing Cert with AUTHO
5,758,986 UART: RITY.KEYID = 7
5,773,992 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,757 UART: [art] PUB.X = 8B26DB42EFD471F43DD2687447A1DBCB7731C439B5F4C58530E0DB0BF5A477C0FE26CF38C4CBF09FD8464121921DF51D
5,781,538 UART: [art] PUB.Y = 21398196D1FE1C5B71F3602483BE1E63A8133FA046D47506F82FF3A8B75A9DC8E14AB52392897A82040A08E468051A91
5,788,467 UART: [art] SIG.R = A919F4B88834EF85FE3B1012A193B9911BDB3A3E8CBC7614EE75CFBA046788F8016F70E15D3441E9C8C087FCD6192713
5,795,237 UART: [art] SIG.S = F1F71C60B7A1835102CA99EF58BA34F8370B90FAA338AE9FA2DAB747CFA5D80F6897E7F84AF1A78CCFBF801AF8412180
5,818,741 UART: Caliptra RT
5,818,994 UART: [state] CFI Enabled
6,096,952 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,241,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,076 UART: [fwproc] Recv command 0x46574c44
1,282,809 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,414 >>> mbox cmd response: success
2,772,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,773,523 UART: [afmc] ++
2,773,691 UART: [afmc] CDI.KEYID = 6
2,774,054 UART: [afmc] SUBJECT.KEYID = 7
2,774,480 UART: [afmc] AUTHORITY.KEYID = 5
2,810,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,802 UART: [afmc] --
2,853,794 UART: [cold-reset] --
2,854,944 UART: [state] Locking Datavault
2,856,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,693 UART: [state] Locking ICCM
2,857,241 UART: [exit] Launching FMC @ 0x40000130
2,862,570 UART:
2,862,586 UART: Running Caliptra FMC ...
2,862,994 UART:
2,863,137 UART: [state] CFI Enabled
2,873,810 UART: [fht] FMC Alias Private Key: 7
2,981,823 UART: [art] Extend RT PCRs Done
2,982,251 UART: [art] Lock RT PCRs Done
2,983,715 UART: [art] Populate DV Done
2,991,772 UART: [fht] FMC Alias Private Key: 7
2,992,706 UART: [art] Derive CDI
2,992,986 UART: [art] Store in in slot 0x4
3,078,677 UART: [art] Derive Key Pair
3,079,037 UART: [art] Store priv key in slot 0x5
3,092,617 UART: [art] Derive Key Pair - Done
3,107,814 UART: [art] Signing Cert with AUTHO
3,108,294 UART: RITY.KEYID = 7
3,123,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,391 UART: [art] PUB.X = ED69CB099373440AFA1FC66BF19D1B0A84A249BE8834C89583643DACFD25B10FC75ED16ED391486DDD1D7CC2852BD47F
3,131,165 UART: [art] PUB.Y = C594C46A3E11760BDFA2444EE871ED85CF7A773FFA362B6081F7C26AEB5BE217F185E51C78EC277EE8B3E6A4F08F5E77
3,138,128 UART: [art] SIG.R = 4FFF588BA6BF096C870A6123688AD3B018E4BD88F2E6FA8BDC35FF4285DC78F132CD0176A6C54F627D853778AA8F5C4F
3,144,903 UART: [art] SIG.S = A407B229ED848FC318A3E852826EFC6A8BF86219BDAE692AFC47CCD8AFF905F0D5A57708971059225C4239FFF0F620D0
3,169,099 UART: Caliptra RT
3,169,444 UART: [state] CFI Enabled
3,277,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,015 UART:
3,279,031 UART: Running Caliptra ROM ...
3,279,439 UART:
3,279,581 UART: [state] CFI Enabled
3,282,691 UART: [state] LifecycleState = Unprovisioned
3,283,346 UART: [state] DebugLocked = No
3,283,918 UART: [state] WD Timer not started. Device not locked for debugging
3,285,112 UART: [kat] SHA2-256
4,088,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,791 UART: [kat] ++
4,092,943 UART: [kat] sha1
4,097,323 UART: [kat] SHA2-256
4,099,263 UART: [kat] SHA2-384
4,101,988 UART: [kat] SHA2-512-ACC
4,103,888 UART: [kat] ECC-384
4,113,363 UART: [kat] HMAC-384Kdf
4,117,987 UART: [kat] LMS
4,366,299 UART: [kat] --
4,367,381 UART: [update-reset] ++
5,679,996 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,681,115 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,939 >>> mbox cmd response: success
5,831,226 UART: [update-reset] Copying MAN_2 To MAN_1
5,839,240 UART: [update-reset Success] --
5,840,143 UART: [state] Locking Datavault
5,840,945 UART: [state] Locking PCR0, PCR1 and PCR31
5,841,549 UART: [state] Locking ICCM
5,842,049 UART: [exit] Launching FMC @ 0x40000130
5,847,378 UART:
5,847,394 UART: Running Caliptra FMC ...
5,847,802 UART:
5,847,945 UART: [state] CFI Enabled
5,937,556 UART: [art] Extend RT PCRs Done
5,937,984 UART: [art] Lock RT PCRs Done
5,939,099 UART: [art] Populate DV Done
5,947,272 UART: [fht] FMC Alias Private Key: 7
5,948,228 UART: [art] Derive CDI
5,948,508 UART: [art] Store in in slot 0x4
6,034,299 UART: [art] Derive Key Pair
6,034,659 UART: [art] Store priv key in slot 0x5
6,048,261 UART: [art] Derive Key Pair - Done
6,062,666 UART: [art] Signing Cert with AUTHO
6,063,146 UART: RITY.KEYID = 7
6,078,080 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,845 UART: [art] PUB.X = 20A1F3DCB783F078556BB4EA8251555C5F703EF8C532A9549D34D0BA6899F280F839F1A6670EE71D7938EC2DB79F6C12
6,085,616 UART: [art] PUB.Y = A8342C33F97D44308B78EED59659B4D382B7FAD88CE7052E61AD88C1CA53FBC1FDF7FF0B67C9AFBAF1ABACBDE0224E53
6,092,588 UART: [art] SIG.R = 8F950C4456A9F23D0FA4D73C1369BC3683C371EBC636C322F6EBA45B13A3D89139059F10302CCA4DBA5FC7FF07818E71
6,099,354 UART: [art] SIG.S = 49BF4EA6FD7649F3E15DE365AAF72FC4B25B3C30BD640329056414FBC5A098BD2E146A00132892DC48514330781C18A8
6,123,291 UART: Caliptra RT
6,123,636 UART: [state] CFI Enabled
6,405,055 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 ready_for_fw is high
1,056,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,934 >>> mbox cmd response: success
2,623,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,685,796 UART:
2,685,812 UART: Running Caliptra FMC ...
2,686,220 UART:
2,686,363 UART: [state] CFI Enabled
2,696,924 UART: [fht] FMC Alias Private Key: 7
2,805,333 UART: [art] Extend RT PCRs Done
2,805,761 UART: [art] Lock RT PCRs Done
2,806,955 UART: [art] Populate DV Done
2,815,280 UART: [fht] FMC Alias Private Key: 7
2,816,416 UART: [art] Derive CDI
2,816,696 UART: [art] Store in in slot 0x4
2,902,387 UART: [art] Derive Key Pair
2,902,747 UART: [art] Store priv key in slot 0x5
2,916,057 UART: [art] Derive Key Pair - Done
2,931,017 UART: [art] Signing Cert with AUTHO
2,931,497 UART: RITY.KEYID = 7
2,946,889 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,654 UART: [art] PUB.X = 0680FAA31BBC249C7614F0783D8840E10D83364C5D10B00C94D35051FB967D413704AD57ADB79DBEE8F4B5CD22913BA2
2,954,418 UART: [art] PUB.Y = 764372ADA556EF8DAA594F0D1A7D0D1E1785800EC0B335C86A9BF94C41EB8E927EB1CAB2AC1C0D8CAC0B0DE56055CD94
2,961,372 UART: [art] SIG.R = 7B0AB5C66B73A703EE28A1072C5462F9A3719608B8A3EA9455E76FFF93788A5BBE159390E305DEF1401CDF70C07F51C8
2,968,133 UART: [art] SIG.S = FD27DF52D0FECA18448A2D4487051C627CA1CCFBEB49A265307ADAB8317C3E56C357113FAF7684462B4EA9BED127113D
2,992,669 UART: Caliptra RT
2,993,014 UART: [state] CFI Enabled
3,101,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,482 >>> mbox cmd response: success
5,548,818 UART:
5,548,834 UART: Running Caliptra FMC ...
5,549,242 UART:
5,549,385 UART: [state] CFI Enabled
5,638,608 UART: [art] Extend RT PCRs Done
5,639,036 UART: [art] Lock RT PCRs Done
5,640,453 UART: [art] Populate DV Done
5,648,762 UART: [fht] FMC Alias Private Key: 7
5,649,878 UART: [art] Derive CDI
5,650,158 UART: [art] Store in in slot 0x4
5,736,175 UART: [art] Derive Key Pair
5,736,535 UART: [art] Store priv key in slot 0x5
5,749,999 UART: [art] Derive Key Pair - Done
5,764,373 UART: [art] Signing Cert with AUTHO
5,764,853 UART: RITY.KEYID = 7
5,779,755 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,520 UART: [art] PUB.X = 73C5DFDC3670BF044906DD10DAAC61CEA1FF43187B012CA36A962DD0677A59DB3427687ECEC062CD1A648B77437B52EC
5,787,295 UART: [art] PUB.Y = 2EAB26FA60014F3294EAF2F57891F5CFD50A89B53044CABD98D42EFF7EA7334B7E6FE87C280C5165DC01911D1D5BC13A
5,794,249 UART: [art] SIG.R = 2B231E7167B968AF29547F47F82B8AE118A5A6BE3B8868507BD525398196FE69291AF7173D603C322338127DDECB514B
5,801,015 UART: [art] SIG.S = A415BF169AE2C7AA9C7F0A6E8D5CEA22F70CCBCD10D4833DF5A70120C18B666CCA349110CCAA51E380415B9DA7F948DB
5,825,287 UART: Caliptra RT
5,825,632 UART: [state] CFI Enabled
6,104,863 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,461 UART: [fht] Storing FHT @ 0x50003400
1,479,178 UART: [idev] ++
1,479,346 UART: [idev] CDI.KEYID = 6
1,479,706 UART: [idev] SUBJECT.KEYID = 7
1,480,130 UART: [idev] UDS.KEYID = 0
1,480,475 ready_for_fw is high
1,480,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,034 UART: [idev] Erasing UDS.KEYID = 0
1,504,570 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,210 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,520,873 UART: [ldev] Erasing FE.KEYID = 1
1,545,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,446 UART: [ldev] --
1,584,907 UART: [fwproc] Waiting for Commands...
1,585,774 UART: [fwproc] Received command 0x46574c44
1,586,565 UART: [fwproc] Received Image of size 114332 bytes
2,884,397 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,389 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,334 >>> mbox cmd response: success
3,078,490 UART: [afmc] ++
3,078,658 UART: [afmc] CDI.KEYID = 6
3,079,020 UART: [afmc] SUBJECT.KEYID = 7
3,079,445 UART: [afmc] AUTHORITY.KEYID = 5
3,114,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,657 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,347 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,232 UART: [afmc] --
3,158,356 UART: [cold-reset] --
3,159,314 UART: [state] Locking Datavault
3,160,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,075 UART: [state] Locking ICCM
3,161,557 UART: [exit] Launching FMC @ 0x40000130
3,166,886 UART:
3,166,902 UART: Running Caliptra FMC ...
3,167,310 UART:
3,167,364 UART: [state] CFI Enabled
3,178,211 UART: [fht] FMC Alias Private Key: 7
3,286,004 UART: [art] Extend RT PCRs Done
3,286,432 UART: [art] Lock RT PCRs Done
3,287,754 UART: [art] Populate DV Done
3,296,093 UART: [fht] FMC Alias Private Key: 7
3,297,195 UART: [art] Derive CDI
3,297,475 UART: [art] Store in in slot 0x4
3,383,382 UART: [art] Derive Key Pair
3,383,742 UART: [art] Store priv key in slot 0x5
3,397,092 UART: [art] Derive Key Pair - Done
3,411,635 UART: [art] Signing Cert with AUTHO
3,412,115 UART: RITY.KEYID = 7
3,426,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,656 UART: [art] PUB.X = E8CB2F5F72413A2FFAB5EB24C289331F5BE18CC33B0A2733C49CA857CC27A7923B89F5CBE0B80E10491AFFA3FF805BBB
3,434,442 UART: [art] PUB.Y = 9109C8F7FC96982A2260F145DAB2D93EB1D1BFDFE981D0B3E7FB20D5119BEA22FFC4ABAB64C7DAB756B0CB324309139C
3,441,408 UART: [art] SIG.R = 25BCB170D37D14CB076C4F79975408EF4C9CEEB00CD7C4EE5673CB87C627374998328C010E1660B3674C50E1AEEED7C6
3,448,171 UART: [art] SIG.S = 38AE5CB11E65C6FA2B51B6EE73AD8A14C2A88EE3F30D1A9BDB5A1A3EBA5CE985D6B7C63A988130EFBB90062AB4D516A1
3,471,546 UART: Caliptra RT
3,471,799 UART: [state] CFI Enabled
3,580,999 UART: [rt] RT listening for mailbox commands...
3,581,669 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,835 UART: [rt]cmd =0x434b4558, len=80
3,780,967 >>> mbox cmd response data (6280 bytes)
3,780,968 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,492 UART: [rt]cmd =0x414c544e, len=41
3,812,429 >>> mbox cmd response data (8 bytes)
3,812,430 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,353 UART: [rt]cmd =0x434b4558, len=80
4,011,323 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,901 ready_for_fw is high
1,361,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,026 >>> mbox cmd response: success
2,988,260 UART:
2,988,276 UART: Running Caliptra FMC ...
2,988,684 UART:
2,988,738 UART: [state] CFI Enabled
2,999,241 UART: [fht] FMC Alias Private Key: 7
3,106,896 UART: [art] Extend RT PCRs Done
3,107,324 UART: [art] Lock RT PCRs Done
3,108,840 UART: [art] Populate DV Done
3,116,865 UART: [fht] FMC Alias Private Key: 7
3,117,799 UART: [art] Derive CDI
3,118,079 UART: [art] Store in in slot 0x4
3,203,682 UART: [art] Derive Key Pair
3,204,042 UART: [art] Store priv key in slot 0x5
3,217,256 UART: [art] Derive Key Pair - Done
3,232,137 UART: [art] Signing Cert with AUTHO
3,232,617 UART: RITY.KEYID = 7
3,248,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,810 UART: [art] PUB.X = 9F575FFEC059C64F7B4AF4621F81DB757C934EF94555ECD7A2B47903F93CC932EC0E47B3BEC1092F776DFFCD35273C32
3,255,585 UART: [art] PUB.Y = 9BC691FB92532E7A9BA3F822C78F8DE6ACC22ABEA97332B1CBCE46706CEA25A023DB7EF35AA4994DBD50B352EB34F0EE
3,262,561 UART: [art] SIG.R = 26DCB4132A738715563572A1BDB7EF23824034863890D2FDD1F882DDBE0A05D2F72CEBD499B24634DD5D7DF53A1F4A71
3,269,333 UART: [art] SIG.S = 9AB1B5BAFB598EC0A8325FF436EEC07DB630CF4BB9A6EC63E3DE972D11C0A56C05CB277EEE7C12B11CA3D34440EBDAF1
3,293,365 UART: Caliptra RT
3,293,618 UART: [state] CFI Enabled
3,402,215 UART: [rt] RT listening for mailbox commands...
3,402,885 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,381 UART: [rt]cmd =0x434b4558, len=80
3,601,648 >>> mbox cmd response data (6280 bytes)
3,601,649 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,197 UART: [rt]cmd =0x414c544e, len=41
3,633,074 >>> mbox cmd response data (8 bytes)
3,633,075 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,850 UART: [rt]cmd =0x434b4558, len=80
3,831,679 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,545 UART: [kat] SHA2-512-ACC
897,446 UART: [kat] ECC-384
903,271 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,307 UART: [idev] ++
1,480,475 UART: [idev] CDI.KEYID = 6
1,480,835 UART: [idev] SUBJECT.KEYID = 7
1,481,259 UART: [idev] UDS.KEYID = 0
1,481,604 ready_for_fw is high
1,481,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,505,863 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,541 UART: [idev] --
1,515,628 UART: [ldev] ++
1,515,796 UART: [ldev] CDI.KEYID = 6
1,516,159 UART: [ldev] SUBJECT.KEYID = 5
1,516,585 UART: [ldev] AUTHORITY.KEYID = 7
1,517,048 UART: [ldev] FE.KEYID = 1
1,522,598 UART: [ldev] Erasing FE.KEYID = 1
1,548,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,287 UART: [ldev] --
1,587,790 UART: [fwproc] Waiting for Commands...
1,588,503 UART: [fwproc] Received command 0x46574c44
1,589,294 UART: [fwproc] Received Image of size 114332 bytes
2,887,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,490 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,759 >>> mbox cmd response: success
3,080,887 UART: [afmc] ++
3,081,055 UART: [afmc] CDI.KEYID = 6
3,081,417 UART: [afmc] SUBJECT.KEYID = 7
3,081,842 UART: [afmc] AUTHORITY.KEYID = 5
3,117,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,746 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,436 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,253 UART: [afmc] --
3,160,143 UART: [cold-reset] --
3,160,889 UART: [state] Locking Datavault
3,162,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,620 UART: [state] Locking ICCM
3,163,234 UART: [exit] Launching FMC @ 0x40000130
3,168,563 UART:
3,168,579 UART: Running Caliptra FMC ...
3,168,987 UART:
3,169,130 UART: [state] CFI Enabled
3,179,947 UART: [fht] FMC Alias Private Key: 7
3,288,316 UART: [art] Extend RT PCRs Done
3,288,744 UART: [art] Lock RT PCRs Done
3,290,336 UART: [art] Populate DV Done
3,298,773 UART: [fht] FMC Alias Private Key: 7
3,299,823 UART: [art] Derive CDI
3,300,103 UART: [art] Store in in slot 0x4
3,385,878 UART: [art] Derive Key Pair
3,386,238 UART: [art] Store priv key in slot 0x5
3,399,482 UART: [art] Derive Key Pair - Done
3,414,507 UART: [art] Signing Cert with AUTHO
3,414,987 UART: RITY.KEYID = 7
3,429,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,528 UART: [art] PUB.X = C025C436DBB029FCED5103FBFFF83496A859B4E8681A70DC4B609F305C158541B00F908800BF08F79A8C93B679B7B405
3,437,268 UART: [art] PUB.Y = B4B918EC1759DBB98C843DE5C6E32B7A0D9BD00904845F310979BB31756ECB4C84C0C4C32B4D3B2458B7F1C0BBBA253B
3,444,220 UART: [art] SIG.R = 606EDDAE802C78BD9C069BA280E98FA9AFE58BCFF109962BA1D17A53BD1EDA776553A1B34841BEEEFDCCEA62DEA9FE09
3,451,013 UART: [art] SIG.S = 9F0B40F941FCAAC0780C97AFC7AE5054946A8627FF69EA29C7BBAE6145C25A550DBFBA88BA56FCDD4C46EB09DFF53FD4
3,474,708 UART: Caliptra RT
3,475,053 UART: [state] CFI Enabled
3,583,720 UART: [rt] RT listening for mailbox commands...
3,584,390 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,842 UART: [rt]cmd =0x434b4558, len=80
3,783,548 >>> mbox cmd response data (6280 bytes)
3,783,549 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,093 UART: [rt]cmd =0x414c544e, len=41
3,814,968 >>> mbox cmd response data (8 bytes)
3,814,969 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,768 UART: [rt]cmd =0x434b4558, len=80
4,013,826 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,287 >>> mbox cmd response: success
2,989,311 UART:
2,989,327 UART: Running Caliptra FMC ...
2,989,735 UART:
2,989,878 UART: [state] CFI Enabled
3,000,491 UART: [fht] FMC Alias Private Key: 7
3,108,478 UART: [art] Extend RT PCRs Done
3,108,906 UART: [art] Lock RT PCRs Done
3,110,146 UART: [art] Populate DV Done
3,118,315 UART: [fht] FMC Alias Private Key: 7
3,119,371 UART: [art] Derive CDI
3,119,651 UART: [art] Store in in slot 0x4
3,205,678 UART: [art] Derive Key Pair
3,206,038 UART: [art] Store priv key in slot 0x5
3,219,632 UART: [art] Derive Key Pair - Done
3,234,295 UART: [art] Signing Cert with AUTHO
3,234,775 UART: RITY.KEYID = 7
3,250,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,018 UART: [art] PUB.X = DC68D43DBB401775020B13E33D923BBA1EAE4449ABD0702464300883F00F4796B8E000C57FD55777400CCE4A3AF77793
3,257,751 UART: [art] PUB.Y = 6800FB23A55916DABA0AF7C0021D22ABAE27714DE31C777E49631FCC429D8BBB4E756CE745B2FD4FDF168DA309226140
3,264,682 UART: [art] SIG.R = C4689BC6A023B110B5824533E841BF2A785BBEE92383133A630C2DB6EDFC9B07826DA30BE5265634572B8C3DDCEA734D
3,271,451 UART: [art] SIG.S = 137D3C98F376F28830C6EADAA85C48516CDACC4410CB418F9701AC28C84EB1E568083E0789F6E3098F133872A129FBF3
3,295,446 UART: Caliptra RT
3,295,791 UART: [state] CFI Enabled
3,404,340 UART: [rt] RT listening for mailbox commands...
3,405,010 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,144 UART: [rt]cmd =0x434b4558, len=80
3,603,077 >>> mbox cmd response data (6280 bytes)
3,603,078 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,672 UART: [rt]cmd =0x414c544e, len=41
3,634,633 >>> mbox cmd response data (8 bytes)
3,634,634 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,601 UART: [rt]cmd =0x434b4558, len=80
3,834,356 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,789 UART: [kat] SHA2-256
903,729 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,716 UART: [kat] HMAC-384Kdf
922,366 UART: [kat] LMS
1,170,694 UART: [kat] --
1,171,453 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,616 UART: [idev] ++
1,174,784 UART: [idev] CDI.KEYID = 6
1,175,144 UART: [idev] SUBJECT.KEYID = 7
1,175,568 UART: [idev] UDS.KEYID = 0
1,175,913 ready_for_fw is high
1,175,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,882 UART: [idev] Erasing UDS.KEYID = 0
1,201,019 UART: [idev] Sha1 KeyId Algorithm
1,209,589 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,556 UART: [ldev] AUTHORITY.KEYID = 7
1,212,019 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,368 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,745 >>> mbox cmd response: success
2,774,769 UART: [afmc] ++
2,774,937 UART: [afmc] CDI.KEYID = 6
2,775,299 UART: [afmc] SUBJECT.KEYID = 7
2,775,724 UART: [afmc] AUTHORITY.KEYID = 5
2,811,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,754 UART: [afmc] --
2,854,670 UART: [cold-reset] --
2,855,428 UART: [state] Locking Datavault
2,856,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,539 UART: [state] Locking ICCM
2,857,979 UART: [exit] Launching FMC @ 0x40000130
2,863,308 UART:
2,863,324 UART: Running Caliptra FMC ...
2,863,732 UART:
2,863,786 UART: [state] CFI Enabled
2,874,277 UART: [fht] FMC Alias Private Key: 7
2,982,558 UART: [art] Extend RT PCRs Done
2,982,986 UART: [art] Lock RT PCRs Done
2,984,576 UART: [art] Populate DV Done
2,992,771 UART: [fht] FMC Alias Private Key: 7
2,993,841 UART: [art] Derive CDI
2,994,121 UART: [art] Store in in slot 0x4
3,079,804 UART: [art] Derive Key Pair
3,080,164 UART: [art] Store priv key in slot 0x5
3,093,070 UART: [art] Derive Key Pair - Done
3,107,640 UART: [art] Signing Cert with AUTHO
3,108,120 UART: RITY.KEYID = 7
3,123,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,465 UART: [art] PUB.X = 566C3CDF77608116F2F75F4E1CF72CF4643FA2D1FFFB9BCED6C9B0A1E47EE8743C410BD3609A68C0178B67833D8687EF
3,131,246 UART: [art] PUB.Y = BA6F305D9E220A843C5A22D9C6FA0598BD7A41DE3A6305811537A595B1F8A5495575C8DEC4DE5579F6950A992D33DFA4
3,138,190 UART: [art] SIG.R = 9D0D4DF7937FF11C64720B7A5A90BEF34B267AD21208D2EB925492408F07DF958E09E5105669577E0245864678FB23C0
3,144,936 UART: [art] SIG.S = 1835BC5B9E143C4DB757C7A25C8C9B5F708478C07A24B95A2A3C2D62A2A8382C7BEA708AA201A9E3593E1746086B3A4A
3,168,401 UART: Caliptra RT
3,168,654 UART: [state] CFI Enabled
3,276,581 UART: [rt] RT listening for mailbox commands...
3,277,251 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,397 UART: [rt]cmd =0x434b4558, len=80
3,476,898 >>> mbox cmd response data (6280 bytes)
3,476,899 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,379 UART: [rt]cmd =0x414c544e, len=41
3,508,430 >>> mbox cmd response data (8 bytes)
3,508,431 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,476 UART: [rt]cmd =0x434b4558, len=80
3,707,993 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,665 ready_for_fw is high
1,060,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,574 >>> mbox cmd response: success
2,689,474 UART:
2,689,490 UART: Running Caliptra FMC ...
2,689,898 UART:
2,689,952 UART: [state] CFI Enabled
2,700,461 UART: [fht] FMC Alias Private Key: 7
2,808,468 UART: [art] Extend RT PCRs Done
2,808,896 UART: [art] Lock RT PCRs Done
2,810,030 UART: [art] Populate DV Done
2,818,039 UART: [fht] FMC Alias Private Key: 7
2,818,991 UART: [art] Derive CDI
2,819,271 UART: [art] Store in in slot 0x4
2,905,028 UART: [art] Derive Key Pair
2,905,388 UART: [art] Store priv key in slot 0x5
2,918,322 UART: [art] Derive Key Pair - Done
2,933,203 UART: [art] Signing Cert with AUTHO
2,933,683 UART: RITY.KEYID = 7
2,948,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,396 UART: [art] PUB.X = 2B3CDC7C0A3509DE0481FC0B98F4761D7B51C1E92F93931765C6B71A3BD15F5F484632E2C9C2587EEA8230BFA86E06B9
2,956,159 UART: [art] PUB.Y = EC5DB0D8B7143BA2841BEB4F76323864B3957123D82B49D3F8C9ABB3CA2E54077737BEC4D3182243982BE586ACFD1575
2,963,112 UART: [art] SIG.R = BBEB72642E27CC4110ECA415E59EBA043EE295473ED6072DE6B555D0EF794DB46735F3781EB9FC264999F0168034AC39
2,969,882 UART: [art] SIG.S = 1FC29000E257EC3E6802B97C8AE21610F886C694743D7491BDD0C175E21E5DC1BBB8F1D65655B445C66A47CE4AE19F76
2,994,016 UART: Caliptra RT
2,994,269 UART: [state] CFI Enabled
3,102,722 UART: [rt] RT listening for mailbox commands...
3,103,392 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,032 UART: [rt]cmd =0x434b4558, len=80
3,302,322 >>> mbox cmd response data (6280 bytes)
3,302,323 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,007 UART: [rt]cmd =0x414c544e, len=41
3,333,910 >>> mbox cmd response data (8 bytes)
3,333,911 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,938 UART: [rt]cmd =0x434b4558, len=80
3,532,404 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
907,177 UART: [kat] SHA2-512-ACC
909,078 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,489 UART: [kat] LMS
1,171,817 UART: [kat] --
1,172,482 UART: [cold-reset] ++
1,172,974 UART: [fht] FHT @ 0x50003400
1,175,709 UART: [idev] ++
1,175,877 UART: [idev] CDI.KEYID = 6
1,176,237 UART: [idev] SUBJECT.KEYID = 7
1,176,661 UART: [idev] UDS.KEYID = 0
1,177,006 ready_for_fw is high
1,177,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,476 UART: [idev] Sha1 KeyId Algorithm
1,209,798 UART: [idev] --
1,210,826 UART: [ldev] ++
1,210,994 UART: [ldev] CDI.KEYID = 6
1,211,357 UART: [ldev] SUBJECT.KEYID = 5
1,211,783 UART: [ldev] AUTHORITY.KEYID = 7
1,212,246 UART: [ldev] FE.KEYID = 1
1,217,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,858 UART: [ldev] --
1,283,287 UART: [fwproc] Wait for Commands...
1,284,083 UART: [fwproc] Recv command 0x46574c44
1,284,811 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,080 >>> mbox cmd response: success
2,777,274 UART: [afmc] ++
2,777,442 UART: [afmc] CDI.KEYID = 6
2,777,804 UART: [afmc] SUBJECT.KEYID = 7
2,778,229 UART: [afmc] AUTHORITY.KEYID = 5
2,813,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,365 UART: [afmc] --
2,856,343 UART: [cold-reset] --
2,857,273 UART: [state] Locking Datavault
2,858,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,944 UART: [state] Locking ICCM
2,859,426 UART: [exit] Launching FMC @ 0x40000130
2,864,755 UART:
2,864,771 UART: Running Caliptra FMC ...
2,865,179 UART:
2,865,322 UART: [state] CFI Enabled
2,876,083 UART: [fht] FMC Alias Private Key: 7
2,984,662 UART: [art] Extend RT PCRs Done
2,985,090 UART: [art] Lock RT PCRs Done
2,986,808 UART: [art] Populate DV Done
2,994,821 UART: [fht] FMC Alias Private Key: 7
2,995,839 UART: [art] Derive CDI
2,996,119 UART: [art] Store in in slot 0x4
3,082,050 UART: [art] Derive Key Pair
3,082,410 UART: [art] Store priv key in slot 0x5
3,095,820 UART: [art] Derive Key Pair - Done
3,110,778 UART: [art] Signing Cert with AUTHO
3,111,258 UART: RITY.KEYID = 7
3,126,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,919 UART: [art] PUB.X = 7B675163C8AB0881F740F03BD6C37CDC580E105D7EF67F5DA9DA0FA542925FCE53CB737FAB3A23060DDD1256D7B67978
3,133,686 UART: [art] PUB.Y = D000C03BE4DCCF10F28AAD6A82F20CED54141F2A4DB5738340AC2277A23801A10368F82B12841BE8DF7C8E150029F2BA
3,140,593 UART: [art] SIG.R = 303E57D3E3A120BFD3BD39C3F04FE8E77D13C358ACC9393EEAB137DFC8E9437ADC0AC09F2C1E432D9C8D310F8AFC7FE1
3,147,383 UART: [art] SIG.S = AD2805BF43ABA998D3EB6D2AA8F04746D2CA7B84A1438946955A61A04E6FA88366EA54F09CE354C44533AA0DB537245C
3,171,204 UART: Caliptra RT
3,171,549 UART: [state] CFI Enabled
3,278,948 UART: [rt] RT listening for mailbox commands...
3,279,618 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,028 UART: [rt]cmd =0x434b4558, len=80
3,478,602 >>> mbox cmd response data (6280 bytes)
3,478,603 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,159 UART: [rt]cmd =0x414c544e, len=41
3,510,102 >>> mbox cmd response data (8 bytes)
3,510,103 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,956 UART: [rt]cmd =0x434b4558, len=80
3,708,852 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,274 ready_for_fw is high
1,060,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,483 >>> mbox cmd response: success
2,689,465 UART:
2,689,481 UART: Running Caliptra FMC ...
2,689,889 UART:
2,690,032 UART: [state] CFI Enabled
2,700,639 UART: [fht] FMC Alias Private Key: 7
2,809,254 UART: [art] Extend RT PCRs Done
2,809,682 UART: [art] Lock RT PCRs Done
2,810,804 UART: [art] Populate DV Done
2,818,843 UART: [fht] FMC Alias Private Key: 7
2,819,981 UART: [art] Derive CDI
2,820,261 UART: [art] Store in in slot 0x4
2,905,560 UART: [art] Derive Key Pair
2,905,920 UART: [art] Store priv key in slot 0x5
2,919,440 UART: [art] Derive Key Pair - Done
2,934,131 UART: [art] Signing Cert with AUTHO
2,934,611 UART: RITY.KEYID = 7
2,949,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,486 UART: [art] PUB.X = 12BFD4756BCBA8A00410FA0B2021A76C7D8C60D11FA8B47F24EE43D768D0BC9F339BD8237FC073EB8DDFF12C5DC6C8EB
2,957,274 UART: [art] PUB.Y = 82E0A8E39D36B86F48CA564902438691FD71C4927EF26B693490B4280F3B7D660951ACCB88D006824B439E520F0ED068
2,964,200 UART: [art] SIG.R = 6A691D1A3B651790943776D51FEE61B74AD4786AC812D8F7D88B523CA80B84B4C47E2D3C48AA82D123A9FA26922F02F8
2,970,968 UART: [art] SIG.S = A1BA9DC25015C24973ECE0B79FEB0B9048DD5E7C89DEA069E636DBC79DCF07E31C77FC7FFB102BDD621F610CB74751EA
2,994,952 UART: Caliptra RT
2,995,297 UART: [state] CFI Enabled
3,102,922 UART: [rt] RT listening for mailbox commands...
3,103,592 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,020 UART: [rt]cmd =0x434b4558, len=80
3,303,270 >>> mbox cmd response data (6280 bytes)
3,303,271 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,889 UART: [rt]cmd =0x414c544e, len=41
3,334,764 >>> mbox cmd response data (8 bytes)
3,334,765 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,828 UART: [rt]cmd =0x434b4558, len=80
3,534,734 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 ready_for_fw is high
1,174,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,366 UART: [ldev] ++
1,208,534 UART: [ldev] CDI.KEYID = 6
1,208,898 UART: [ldev] SUBJECT.KEYID = 5
1,209,325 UART: [ldev] AUTHORITY.KEYID = 7
1,209,788 UART: [ldev] FE.KEYID = 1
1,214,888 UART: [ldev] Erasing FE.KEYID = 1
1,241,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,028 UART: [ldev] --
1,280,390 UART: [fwproc] Wait for Commands...
1,281,121 UART: [fwproc] Recv command 0x46574c44
1,281,854 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,793 >>> mbox cmd response: success
2,773,060 UART: [afmc] ++
2,773,228 UART: [afmc] CDI.KEYID = 6
2,773,591 UART: [afmc] SUBJECT.KEYID = 7
2,774,017 UART: [afmc] AUTHORITY.KEYID = 5
2,809,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,637 UART: [afmc] --
2,852,639 UART: [cold-reset] --
2,853,593 UART: [state] Locking Datavault
2,854,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,154 UART: [state] Locking ICCM
2,855,594 UART: [exit] Launching FMC @ 0x40000130
2,860,923 UART:
2,860,939 UART: Running Caliptra FMC ...
2,861,347 UART:
2,861,401 UART: [state] CFI Enabled
2,871,944 UART: [fht] FMC Alias Private Key: 7
2,980,269 UART: [art] Extend RT PCRs Done
2,980,697 UART: [art] Lock RT PCRs Done
2,982,057 UART: [art] Populate DV Done
2,990,154 UART: [fht] FMC Alias Private Key: 7
2,991,250 UART: [art] Derive CDI
2,991,530 UART: [art] Store in in slot 0x4
3,077,515 UART: [art] Derive Key Pair
3,077,875 UART: [art] Store priv key in slot 0x5
3,090,855 UART: [art] Derive Key Pair - Done
3,105,577 UART: [art] Signing Cert with AUTHO
3,106,057 UART: RITY.KEYID = 7
3,120,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,680 UART: [art] PUB.X = 09C06516714624A0C5BB7595BF75295A388D6F03923E61F33C075759722EF22B32D7668B647F8DAE6C70D3D1AA5E99FA
3,128,439 UART: [art] PUB.Y = 596DBBC19045330D4277B326CED8C3B77A8A832DDB8F9C455539093DBA7AE70C090EF4DCF5B8DC2C1411C152D828FEAE
3,135,390 UART: [art] SIG.R = CDF5CA3EFB0B0DB12B3A8CED5527308921E92AC4829F760CDBC80B718EE269C66F90853F3DCEFCEC1E0018CFF7414EBF
3,142,152 UART: [art] SIG.S = D24E76B4E4019AC5A4F4790F24433FD0BA20F485F00D0515AB2DA5560CCEA063EC13F389B7A27286D6946223DC351AA4
3,166,046 UART: Caliptra RT
3,166,299 UART: [state] CFI Enabled
3,273,311 UART: [rt] RT listening for mailbox commands...
3,273,981 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,411 UART: [rt]cmd =0x434b4558, len=80
3,473,255 >>> mbox cmd response data (6280 bytes)
3,473,256 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,670 UART: [rt]cmd =0x414c544e, len=41
3,504,777 >>> mbox cmd response data (8 bytes)
3,504,778 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,719 UART: [rt]cmd =0x434b4558, len=80
3,702,695 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,910 ready_for_fw is high
1,055,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,501 >>> mbox cmd response: success
2,685,435 UART:
2,685,451 UART: Running Caliptra FMC ...
2,685,859 UART:
2,685,913 UART: [state] CFI Enabled
2,696,848 UART: [fht] FMC Alias Private Key: 7
2,804,603 UART: [art] Extend RT PCRs Done
2,805,031 UART: [art] Lock RT PCRs Done
2,806,359 UART: [art] Populate DV Done
2,814,492 UART: [fht] FMC Alias Private Key: 7
2,815,440 UART: [art] Derive CDI
2,815,720 UART: [art] Store in in slot 0x4
2,901,377 UART: [art] Derive Key Pair
2,901,737 UART: [art] Store priv key in slot 0x5
2,914,419 UART: [art] Derive Key Pair - Done
2,929,270 UART: [art] Signing Cert with AUTHO
2,929,750 UART: RITY.KEYID = 7
2,944,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,465 UART: [art] PUB.X = 1DDB2BBF47621034AE847C4FE360808A8FD4833EE164422C3CB9C8B64A0C671E03EAB39384317F7CDBDDF54869D81C5E
2,952,241 UART: [art] PUB.Y = 25F0DF1B2B8AC4053A6EC85B225E641F61A46083B607A3CCA98DDA5E88A1E154D191D82F4B4A5422AE4A458CC69BD44D
2,959,199 UART: [art] SIG.R = 53F3276A7E4125CF4CC37EA1A252522AAE12F9798E3DCCA57D36AD313B07F11274AA8783C958B0786AE9EB2436B877D1
2,965,972 UART: [art] SIG.S = 9F427B98234570163B96E42D018C6645C249D2B928ECDCF46623B7904602D6CDFE9EF2B96B9C840097D38F4410323D5B
2,990,023 UART: Caliptra RT
2,990,276 UART: [state] CFI Enabled
3,099,005 UART: [rt] RT listening for mailbox commands...
3,099,675 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,823 UART: [rt]cmd =0x434b4558, len=80
3,298,617 >>> mbox cmd response data (6280 bytes)
3,298,618 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,204 UART: [rt]cmd =0x414c544e, len=41
3,330,201 >>> mbox cmd response data (8 bytes)
3,330,202 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,813 UART: [rt]cmd =0x434b4558, len=80
3,528,481 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 ready_for_fw is high
1,174,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,678 UART: [idev] --
1,209,657 UART: [ldev] ++
1,209,825 UART: [ldev] CDI.KEYID = 6
1,210,189 UART: [ldev] SUBJECT.KEYID = 5
1,210,616 UART: [ldev] AUTHORITY.KEYID = 7
1,211,079 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,447 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46574c44
1,283,939 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,672 >>> mbox cmd response: success
2,774,695 UART: [afmc] ++
2,774,863 UART: [afmc] CDI.KEYID = 6
2,775,226 UART: [afmc] SUBJECT.KEYID = 7
2,775,652 UART: [afmc] AUTHORITY.KEYID = 5
2,810,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,138 UART: [afmc] --
2,854,020 UART: [cold-reset] --
2,854,984 UART: [state] Locking Datavault
2,856,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,715 UART: [state] Locking ICCM
2,857,345 UART: [exit] Launching FMC @ 0x40000130
2,862,674 UART:
2,862,690 UART: Running Caliptra FMC ...
2,863,098 UART:
2,863,241 UART: [state] CFI Enabled
2,874,058 UART: [fht] FMC Alias Private Key: 7
2,982,119 UART: [art] Extend RT PCRs Done
2,982,547 UART: [art] Lock RT PCRs Done
2,983,951 UART: [art] Populate DV Done
2,992,294 UART: [fht] FMC Alias Private Key: 7
2,993,258 UART: [art] Derive CDI
2,993,538 UART: [art] Store in in slot 0x4
3,079,073 UART: [art] Derive Key Pair
3,079,433 UART: [art] Store priv key in slot 0x5
3,093,337 UART: [art] Derive Key Pair - Done
3,107,700 UART: [art] Signing Cert with AUTHO
3,108,180 UART: RITY.KEYID = 7
3,123,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,045 UART: [art] PUB.X = C42BB0B9DB6CBEE7FAAC738F0B05C5AD371DF8D6F48E13EC7F1EA56692F8137AA125446F07875F8D70E8781DB6C414E3
3,130,824 UART: [art] PUB.Y = 61814F9D164089FAD12F74E93C172417D5BBE91D534467B030D0352B3721860571AB80A59DB92655AC20E3163F8D6738
3,137,761 UART: [art] SIG.R = D623818909A630A5C09112DEDF4A0BE8CF759A0732BCDBD420D185037CEFAB58F847A5D16E51591785241E5A07CDA145
3,144,522 UART: [art] SIG.S = 848D3F4E5253FAFB37358EF6DFC879E02A9581EB0E4F38963847D8D72BC53D1B1B88A5D73A29F414D689C6733D626221
3,168,644 UART: Caliptra RT
3,168,989 UART: [state] CFI Enabled
3,277,283 UART: [rt] RT listening for mailbox commands...
3,277,953 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,257 UART: [rt]cmd =0x434b4558, len=80
3,476,749 >>> mbox cmd response data (6280 bytes)
3,476,750 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,210 UART: [rt]cmd =0x414c544e, len=41
3,508,093 >>> mbox cmd response data (8 bytes)
3,508,094 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,917 UART: [rt]cmd =0x434b4558, len=80
3,706,909 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 ready_for_fw is high
1,056,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,364 >>> mbox cmd response: success
2,684,900 UART:
2,684,916 UART: Running Caliptra FMC ...
2,685,324 UART:
2,685,467 UART: [state] CFI Enabled
2,695,934 UART: [fht] FMC Alias Private Key: 7
2,804,299 UART: [art] Extend RT PCRs Done
2,804,727 UART: [art] Lock RT PCRs Done
2,806,089 UART: [art] Populate DV Done
2,814,512 UART: [fht] FMC Alias Private Key: 7
2,815,496 UART: [art] Derive CDI
2,815,776 UART: [art] Store in in slot 0x4
2,901,231 UART: [art] Derive Key Pair
2,901,591 UART: [art] Store priv key in slot 0x5
2,915,063 UART: [art] Derive Key Pair - Done
2,930,129 UART: [art] Signing Cert with AUTHO
2,930,609 UART: RITY.KEYID = 7
2,946,147 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,912 UART: [art] PUB.X = E1350CC25171266DBDB7ADE00C3221BF13EE027C4215007DD8BEEAFFE09D66AC2093113CA6D6440C9E18670041D9B973
2,953,634 UART: [art] PUB.Y = 478A7C2FD577AF6CDF45E9961D423383456B8402BE772E1A5ABC86B35EA02E4DF9283F318CAC3FF1F50F355603FFDD45
2,960,587 UART: [art] SIG.R = A1D979C46CD005462005C387E3C9723A0F4942266C5C4AA20557CFC69B592A7541EA9FA48AD736433F82753012D392C4
2,967,339 UART: [art] SIG.S = 7A6BE90F00221B81A8AD3FED69AAADA1960B1FB76786E3D49DBE9F0BC7A8CEAE283A252C9FFDB4ECB1E19EAE376300BE
2,991,055 UART: Caliptra RT
2,991,400 UART: [state] CFI Enabled
3,097,955 UART: [rt] RT listening for mailbox commands...
3,098,625 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,901 UART: [rt]cmd =0x434b4558, len=80
3,298,139 >>> mbox cmd response data (6280 bytes)
3,298,140 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,712 UART: [rt]cmd =0x414c544e, len=41
3,329,577 >>> mbox cmd response data (8 bytes)
3,329,578 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,321 UART: [rt]cmd =0x434b4558, len=80
3,527,437 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,089 UART: [kat] SHA2-256
892,027 UART: [kat] SHA2-384
894,728 UART: [kat] SHA2-512-ACC
896,629 UART: [kat] ECC-384
902,094 UART: [kat] HMAC-384Kdf
906,636 UART: [kat] LMS
1,474,832 UART: [kat] --
1,475,633 UART: [cold-reset] ++
1,476,085 UART: [fht] Storing FHT @ 0x50003400
1,478,800 UART: [idev] ++
1,478,968 UART: [idev] CDI.KEYID = 6
1,479,328 UART: [idev] SUBJECT.KEYID = 7
1,479,752 UART: [idev] UDS.KEYID = 0
1,480,097 ready_for_fw is high
1,480,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,860 UART: [idev] Erasing UDS.KEYID = 0
1,503,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,660 UART: [idev] --
1,513,595 UART: [ldev] ++
1,513,763 UART: [ldev] CDI.KEYID = 6
1,514,126 UART: [ldev] SUBJECT.KEYID = 5
1,514,552 UART: [ldev] AUTHORITY.KEYID = 7
1,515,015 UART: [ldev] FE.KEYID = 1
1,520,003 UART: [ldev] Erasing FE.KEYID = 1
1,545,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,382 UART: [ldev] --
1,584,797 UART: [fwproc] Waiting for Commands...
1,585,622 UART: [fwproc] Received command 0x46574c44
1,586,413 UART: [fwproc] Received Image of size 114332 bytes
2,884,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,942 >>> mbox cmd response: success
3,077,032 UART: [afmc] ++
3,077,200 UART: [afmc] CDI.KEYID = 6
3,077,562 UART: [afmc] SUBJECT.KEYID = 7
3,077,987 UART: [afmc] AUTHORITY.KEYID = 5
3,113,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,967 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,657 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,346 UART: [afmc] --
3,156,352 UART: [cold-reset] --
3,157,376 UART: [state] Locking Datavault
3,158,407 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,011 UART: [state] Locking ICCM
3,159,671 UART: [exit] Launching FMC @ 0x40000130
3,165,000 UART:
3,165,016 UART: Running Caliptra FMC ...
3,165,424 UART:
3,165,478 UART: [state] CFI Enabled
3,176,485 UART: [fht] FMC Alias Private Key: 7
3,284,284 UART: [art] Extend RT PCRs Done
3,284,712 UART: [art] Lock RT PCRs Done
3,286,220 UART: [art] Populate DV Done
3,294,461 UART: [fht] FMC Alias Private Key: 7
3,295,623 UART: [art] Derive CDI
3,295,903 UART: [art] Store in in slot 0x4
3,381,562 UART: [art] Derive Key Pair
3,381,922 UART: [art] Store priv key in slot 0x5
3,395,506 UART: [art] Derive Key Pair - Done
3,410,312 UART: [art] Signing Cert with AUTHO
3,410,792 UART: RITY.KEYID = 7
3,425,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,727 UART: [art] PUB.X = 65908EA477B3B5F9B3D47A923A08118B14EED9E2D62AA581B80197ED21DE3A516149AF33ABB4A06E2935107FC9DBFD30
3,433,501 UART: [art] PUB.Y = 9F7183DF1D14168E52DC492C2FD5E9F981CDEFF0357373581596347EEA5065576887171975F654EF952BF020657567F6
3,440,441 UART: [art] SIG.R = BCA99500D0E92ED68524BEFF78AF1C740BCF798E010C0F85779669A27AFECDF52DE204E9BB4D4D6F588E2153CDAAA2DE
3,447,198 UART: [art] SIG.S = BDE9F43567FBB3329EAEA7EAB84EE5048798C65AB7C1A1B1ADB6574F8E7CAA0BE3711A19F4DB258BB92712523C25AED4
3,471,355 UART: Caliptra RT
3,471,608 UART: [state] CFI Enabled
3,579,294 UART: [rt] RT listening for mailbox commands...
3,579,964 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,005 UART: [rt]cmd =0x414c544e, len=41
3,611,862 >>> mbox cmd response data (8 bytes)
3,611,863 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,762 UART: [rt]cmd =0x434b4558, len=80
3,812,775 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,775 ready_for_fw is high
1,361,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,156 >>> mbox cmd response: success
2,990,330 UART:
2,990,346 UART: Running Caliptra FMC ...
2,990,754 UART:
2,990,808 UART: [state] CFI Enabled
3,001,177 UART: [fht] FMC Alias Private Key: 7
3,108,628 UART: [art] Extend RT PCRs Done
3,109,056 UART: [art] Lock RT PCRs Done
3,110,848 UART: [art] Populate DV Done
3,119,049 UART: [fht] FMC Alias Private Key: 7
3,120,017 UART: [art] Derive CDI
3,120,297 UART: [art] Store in in slot 0x4
3,205,994 UART: [art] Derive Key Pair
3,206,354 UART: [art] Store priv key in slot 0x5
3,219,988 UART: [art] Derive Key Pair - Done
3,234,686 UART: [art] Signing Cert with AUTHO
3,235,166 UART: RITY.KEYID = 7
3,250,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,969 UART: [art] PUB.X = 1464BB7E25B7BCC074B52DEC2C917D4BF65A454A033E5B334CAD838781661DA857D566B15AFED488C0BCA3D60C8BA0CB
3,257,751 UART: [art] PUB.Y = BA55F0D0B55775BC344BAE3FC701212BB2F1179157C5A74D37DFDCC5345A393EF0A6AB16AC59FFE05F1B9D25305D753B
3,264,714 UART: [art] SIG.R = 9D0410AADAC65CAABAF65967C912FC81E19D0BF0E6A7E80BD61B82A361F5CC2F693899D681DEC1FDB8921940C3D3F31E
3,271,495 UART: [art] SIG.S = 822ADC21B18066FBAFD6BB811722068436BA3FF7D26849F502A114E7D3AAD214F8DEF4FA02E0B69CB62A3D8B975C796A
3,295,415 UART: Caliptra RT
3,295,668 UART: [state] CFI Enabled
3,403,872 UART: [rt] RT listening for mailbox commands...
3,404,542 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,623 UART: [rt]cmd =0x414c544e, len=41
3,436,752 >>> mbox cmd response data (8 bytes)
3,436,753 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,612 UART: [rt]cmd =0x434b4558, len=80
3,637,321 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,476,824 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 ready_for_fw is high
1,481,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,537 UART: [idev] Erasing UDS.KEYID = 0
1,505,603 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,149 UART: [idev] --
1,515,062 UART: [ldev] ++
1,515,230 UART: [ldev] CDI.KEYID = 6
1,515,593 UART: [ldev] SUBJECT.KEYID = 5
1,516,019 UART: [ldev] AUTHORITY.KEYID = 7
1,516,482 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,547,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,811 UART: [ldev] --
1,587,322 UART: [fwproc] Waiting for Commands...
1,588,125 UART: [fwproc] Received command 0x46574c44
1,588,916 UART: [fwproc] Received Image of size 114332 bytes
2,886,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,052 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,183 >>> mbox cmd response: success
3,080,315 UART: [afmc] ++
3,080,483 UART: [afmc] CDI.KEYID = 6
3,080,845 UART: [afmc] SUBJECT.KEYID = 7
3,081,270 UART: [afmc] AUTHORITY.KEYID = 5
3,116,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,122 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,812 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,841 UART: [afmc] --
3,159,877 UART: [cold-reset] --
3,160,857 UART: [state] Locking Datavault
3,161,900 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,504 UART: [state] Locking ICCM
3,162,928 UART: [exit] Launching FMC @ 0x40000130
3,168,257 UART:
3,168,273 UART: Running Caliptra FMC ...
3,168,681 UART:
3,168,824 UART: [state] CFI Enabled
3,179,237 UART: [fht] FMC Alias Private Key: 7
3,286,980 UART: [art] Extend RT PCRs Done
3,287,408 UART: [art] Lock RT PCRs Done
3,289,308 UART: [art] Populate DV Done
3,297,521 UART: [fht] FMC Alias Private Key: 7
3,298,469 UART: [art] Derive CDI
3,298,749 UART: [art] Store in in slot 0x4
3,384,176 UART: [art] Derive Key Pair
3,384,536 UART: [art] Store priv key in slot 0x5
3,397,460 UART: [art] Derive Key Pair - Done
3,411,999 UART: [art] Signing Cert with AUTHO
3,412,479 UART: RITY.KEYID = 7
3,427,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,252 UART: [art] PUB.X = 3BDBE58F88E47497DB9FE5AE3D6A465AFC2CC8A5420334FFAB09BF0A2BB05314D410CCED277518F693C7842343D6B4EC
3,435,031 UART: [art] PUB.Y = 85F3546F7AA183C25E65A3AC29495F64022873EBB4E22E9E70D385C9534AD0911A16358E20DBE50D7A3BB0CAD08FAE32
3,441,983 UART: [art] SIG.R = 55940BE578EED1A60E903AA2EFFB6736713B99EE393BE919873AD719496B473D4CD1D28340E7859E15FE6B9B4E8399B2
3,448,751 UART: [art] SIG.S = B93F68CB104F22E3A412F844F3947B5C5C80323D116F357D99673FA72067CAA73498942377AB3292D614E91ED7CA570E
3,472,967 UART: Caliptra RT
3,473,312 UART: [state] CFI Enabled
3,581,483 UART: [rt] RT listening for mailbox commands...
3,582,153 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,970 UART: [rt]cmd =0x414c544e, len=41
3,613,855 >>> mbox cmd response data (8 bytes)
3,613,856 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,519 UART: [rt]cmd =0x434b4558, len=80
3,815,039 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,630 ready_for_fw is high
1,362,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,385 >>> mbox cmd response: success
2,988,465 UART:
2,988,481 UART: Running Caliptra FMC ...
2,988,889 UART:
2,989,032 UART: [state] CFI Enabled
2,999,905 UART: [fht] FMC Alias Private Key: 7
3,107,804 UART: [art] Extend RT PCRs Done
3,108,232 UART: [art] Lock RT PCRs Done
3,109,754 UART: [art] Populate DV Done
3,117,815 UART: [fht] FMC Alias Private Key: 7
3,118,789 UART: [art] Derive CDI
3,119,069 UART: [art] Store in in slot 0x4
3,204,878 UART: [art] Derive Key Pair
3,205,238 UART: [art] Store priv key in slot 0x5
3,218,844 UART: [art] Derive Key Pair - Done
3,233,674 UART: [art] Signing Cert with AUTHO
3,234,154 UART: RITY.KEYID = 7
3,249,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,635 UART: [art] PUB.X = 1F580EC21544E23172FB4140C55B0E6FF64D57DE44B9735CEEC46A5442972B37CA730AE43678732A99BFE1CD43C2EB12
3,257,402 UART: [art] PUB.Y = BA99F443B7121F4A2A754EA883ABA7FA58EEB62FD8CE3815D8905BE20CE46363EDA4986D6819428C6601F37A68E1399F
3,264,354 UART: [art] SIG.R = 4048619633B4C0E0B6280B98EF3EB718886863070904E073099F312E1A909E06CAA12ED098104FD464DFB8302254A318
3,271,094 UART: [art] SIG.S = 2E2CEB2B681058E296423FD07B00898330656EB1229CCE68FADF70BD0D5BC80B23A86AFC3CC1F883E2757604B02F2E3F
3,294,804 UART: Caliptra RT
3,295,149 UART: [state] CFI Enabled
3,402,817 UART: [rt] RT listening for mailbox commands...
3,403,487 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,434 UART: [rt]cmd =0x414c544e, len=41
3,435,125 >>> mbox cmd response data (8 bytes)
3,435,126 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,933 UART: [rt]cmd =0x434b4558, len=80
3,636,354 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
893,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,887 UART: [kat] ++
898,039 UART: [kat] sha1
902,353 UART: [kat] SHA2-256
904,293 UART: [kat] SHA2-384
907,060 UART: [kat] SHA2-512-ACC
908,961 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
923,010 UART: [kat] LMS
1,171,338 UART: [kat] --
1,172,141 UART: [cold-reset] ++
1,172,689 UART: [fht] FHT @ 0x50003400
1,175,418 UART: [idev] ++
1,175,586 UART: [idev] CDI.KEYID = 6
1,175,946 UART: [idev] SUBJECT.KEYID = 7
1,176,370 UART: [idev] UDS.KEYID = 0
1,176,715 ready_for_fw is high
1,176,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,540 UART: [idev] Erasing UDS.KEYID = 0
1,201,681 UART: [idev] Sha1 KeyId Algorithm
1,210,245 UART: [idev] --
1,211,279 UART: [ldev] ++
1,211,447 UART: [ldev] CDI.KEYID = 6
1,211,810 UART: [ldev] SUBJECT.KEYID = 5
1,212,236 UART: [ldev] AUTHORITY.KEYID = 7
1,212,699 UART: [ldev] FE.KEYID = 1
1,217,491 UART: [ldev] Erasing FE.KEYID = 1
1,244,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,555 UART: [ldev] --
1,284,002 UART: [fwproc] Wait for Commands...
1,284,780 UART: [fwproc] Recv command 0x46574c44
1,285,508 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,859 >>> mbox cmd response: success
2,777,959 UART: [afmc] ++
2,778,127 UART: [afmc] CDI.KEYID = 6
2,778,489 UART: [afmc] SUBJECT.KEYID = 7
2,778,914 UART: [afmc] AUTHORITY.KEYID = 5
2,814,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,516 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,786 UART: [afmc] --
2,857,800 UART: [cold-reset] --
2,858,692 UART: [state] Locking Datavault
2,859,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,591 UART: [state] Locking ICCM
2,861,185 UART: [exit] Launching FMC @ 0x40000130
2,866,514 UART:
2,866,530 UART: Running Caliptra FMC ...
2,866,938 UART:
2,866,992 UART: [state] CFI Enabled
2,877,391 UART: [fht] FMC Alias Private Key: 7
2,985,544 UART: [art] Extend RT PCRs Done
2,985,972 UART: [art] Lock RT PCRs Done
2,987,382 UART: [art] Populate DV Done
2,995,683 UART: [fht] FMC Alias Private Key: 7
2,996,643 UART: [art] Derive CDI
2,996,923 UART: [art] Store in in slot 0x4
3,082,268 UART: [art] Derive Key Pair
3,082,628 UART: [art] Store priv key in slot 0x5
3,095,688 UART: [art] Derive Key Pair - Done
3,110,256 UART: [art] Signing Cert with AUTHO
3,110,736 UART: RITY.KEYID = 7
3,126,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,941 UART: [art] PUB.X = B6F69A51C82F519133F0A592F56FC0FF873E2FAC0C0F81CB6D11FBCB440E59DE00BFB6FE9668E970B0BC2101148CC1C6
3,133,695 UART: [art] PUB.Y = 73E1012EBDB67A65528B3BDA69AC5CEA7B83D9B5693025FC7930FE46C1F4816A88A276A71176EF28B225224108F83782
3,140,639 UART: [art] SIG.R = AB546031ED6F881AB28C7DAFC56B4101FD00C4BA01126524AFC9EFA4B232D88B220ED1E037FF5B26DE40C36123E7DF6C
3,147,396 UART: [art] SIG.S = 49D589FA31AFFC2CEE16D6C9CF75E372635624FFD99E42D9EF29C79526A4FB9307BA2C3C7D9C3C6A61779E51637EEAE6
3,171,242 UART: Caliptra RT
3,171,495 UART: [state] CFI Enabled
3,278,776 UART: [rt] RT listening for mailbox commands...
3,279,446 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,411 UART: [rt]cmd =0x414c544e, len=41
3,311,324 >>> mbox cmd response data (8 bytes)
3,311,325 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,172 UART: [rt]cmd =0x434b4558, len=80
3,511,663 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,215 ready_for_fw is high
1,060,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,716 >>> mbox cmd response: success
2,688,476 UART:
2,688,492 UART: Running Caliptra FMC ...
2,688,900 UART:
2,688,954 UART: [state] CFI Enabled
2,699,493 UART: [fht] FMC Alias Private Key: 7
2,807,148 UART: [art] Extend RT PCRs Done
2,807,576 UART: [art] Lock RT PCRs Done
2,809,066 UART: [art] Populate DV Done
2,817,279 UART: [fht] FMC Alias Private Key: 7
2,818,383 UART: [art] Derive CDI
2,818,663 UART: [art] Store in in slot 0x4
2,904,354 UART: [art] Derive Key Pair
2,904,714 UART: [art] Store priv key in slot 0x5
2,918,130 UART: [art] Derive Key Pair - Done
2,933,029 UART: [art] Signing Cert with AUTHO
2,933,509 UART: RITY.KEYID = 7
2,948,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,746 UART: [art] PUB.X = BAA4EB4B6AA05AED75266FEE52C6562997AE0DB96A464E37C634AFACEA3E97E09491280C1EBC3C70416E6C0D0FEB1B23
2,956,526 UART: [art] PUB.Y = 2D193872A01784EEBD4B21811F5796D190544E9CA5159B80045B60AC786DAF1FA3172C0F3E07496D128F2973CCDF80D7
2,963,467 UART: [art] SIG.R = 8EA95D89F50AA4A06DC15D1F6E92C9D672A0F20A969EA0ED26B6CE781A07E3727CEA8B09E52D78D29E8DF53E5F3446F1
2,970,241 UART: [art] SIG.S = 3529E0614F727DAEC71C4BF3BC21B0199E3028019920704D58C3D8EDF40FD3BA6B35D79FDCF3DFD1183F1FAE2409904E
2,993,861 UART: Caliptra RT
2,994,114 UART: [state] CFI Enabled
3,101,579 UART: [rt] RT listening for mailbox commands...
3,102,249 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,224 UART: [rt]cmd =0x414c544e, len=41
3,134,169 >>> mbox cmd response data (8 bytes)
3,134,170 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,181 UART: [rt]cmd =0x434b4558, len=80
3,334,604 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
893,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,800 UART: [kat] ++
897,952 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
919,083 UART: [kat] HMAC-384Kdf
923,577 UART: [kat] LMS
1,171,905 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,084 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 ready_for_fw is high
1,176,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,201,036 UART: [idev] Sha1 KeyId Algorithm
1,209,278 UART: [idev] --
1,210,374 UART: [ldev] ++
1,210,542 UART: [ldev] CDI.KEYID = 6
1,210,905 UART: [ldev] SUBJECT.KEYID = 5
1,211,331 UART: [ldev] AUTHORITY.KEYID = 7
1,211,794 UART: [ldev] FE.KEYID = 1
1,216,888 UART: [ldev] Erasing FE.KEYID = 1
1,243,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,062 UART: [ldev] --
1,283,411 UART: [fwproc] Wait for Commands...
1,284,205 UART: [fwproc] Recv command 0x46574c44
1,284,933 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,520 >>> mbox cmd response: success
2,775,534 UART: [afmc] ++
2,775,702 UART: [afmc] CDI.KEYID = 6
2,776,064 UART: [afmc] SUBJECT.KEYID = 7
2,776,489 UART: [afmc] AUTHORITY.KEYID = 5
2,812,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,753 UART: [afmc] --
2,855,853 UART: [cold-reset] --
2,856,619 UART: [state] Locking Datavault
2,857,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,312 UART: [state] Locking ICCM
2,858,930 UART: [exit] Launching FMC @ 0x40000130
2,864,259 UART:
2,864,275 UART: Running Caliptra FMC ...
2,864,683 UART:
2,864,826 UART: [state] CFI Enabled
2,875,203 UART: [fht] FMC Alias Private Key: 7
2,983,572 UART: [art] Extend RT PCRs Done
2,984,000 UART: [art] Lock RT PCRs Done
2,985,452 UART: [art] Populate DV Done
2,993,603 UART: [fht] FMC Alias Private Key: 7
2,994,761 UART: [art] Derive CDI
2,995,041 UART: [art] Store in in slot 0x4
3,080,828 UART: [art] Derive Key Pair
3,081,188 UART: [art] Store priv key in slot 0x5
3,094,408 UART: [art] Derive Key Pair - Done
3,109,387 UART: [art] Signing Cert with AUTHO
3,109,867 UART: RITY.KEYID = 7
3,125,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,130 UART: [art] PUB.X = C0022018E0273BD6DC336742D475017EEC023BA0E227231FB53C1305DF4FD86E2BC34EBABBE595214546854DCA4DF4E7
3,132,896 UART: [art] PUB.Y = B894200A14B7FCD09CB0D295EB0A1A4A2DC1FE2129B5F308690EE49C57A5065CBC36FF3DF785FDF9DB438496D3862534
3,139,843 UART: [art] SIG.R = 6B81F933832DC2FB99ABAE79A83A7FA656A19097AD824265FF4142CDD74C9B60325F9B856C11B5412B5581F7927C0173
3,146,610 UART: [art] SIG.S = 403BA8757960C3164A1AC4C6075A7FDFDF84D5701FA2710D16A709D842D906608E2157BC9CB1C991CC4BE386734D4B76
3,170,705 UART: Caliptra RT
3,171,050 UART: [state] CFI Enabled
3,278,999 UART: [rt] RT listening for mailbox commands...
3,279,669 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,018 UART: [rt]cmd =0x414c544e, len=41
3,311,865 >>> mbox cmd response data (8 bytes)
3,311,866 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,663 UART: [rt]cmd =0x434b4558, len=80
3,511,951 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 ready_for_fw is high
1,060,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,699 >>> mbox cmd response: success
2,689,105 UART:
2,689,121 UART: Running Caliptra FMC ...
2,689,529 UART:
2,689,672 UART: [state] CFI Enabled
2,700,787 UART: [fht] FMC Alias Private Key: 7
2,808,244 UART: [art] Extend RT PCRs Done
2,808,672 UART: [art] Lock RT PCRs Done
2,810,452 UART: [art] Populate DV Done
2,818,595 UART: [fht] FMC Alias Private Key: 7
2,819,593 UART: [art] Derive CDI
2,819,873 UART: [art] Store in in slot 0x4
2,905,262 UART: [art] Derive Key Pair
2,905,622 UART: [art] Store priv key in slot 0x5
2,918,754 UART: [art] Derive Key Pair - Done
2,933,483 UART: [art] Signing Cert with AUTHO
2,933,963 UART: RITY.KEYID = 7
2,949,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,052 UART: [art] PUB.X = E747B9A4A7A9BF0656EF8AF7839EB392EB4C2197BF398711DF0A4D516B8F80F67384B372D8A8B2D461FF084A46634AA7
2,956,821 UART: [art] PUB.Y = F0438B16B8A77AA626EE16328658E6F64682C67A2A1DBB4DB08D067378CE614E4B6B37567C9B6B0272AB5A6332F99C2A
2,963,769 UART: [art] SIG.R = 134798D4B299B0864E9C1B8B402199AD8BC2D5C089F7679D679C402DA0A4F2978FBA2F85A2BA5854A5FD9A96AC3701DB
2,970,544 UART: [art] SIG.S = DA7793CB50BF5EE4A6522D1F68A2C73C898204AEADE6E4DB7368792680FE52751F4861479C36FD0F40D27074EAD9B115
2,994,929 UART: Caliptra RT
2,995,274 UART: [state] CFI Enabled
3,103,685 UART: [rt] RT listening for mailbox commands...
3,104,355 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,610 UART: [rt]cmd =0x414c544e, len=41
3,136,461 >>> mbox cmd response data (8 bytes)
3,136,462 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,311 UART: [rt]cmd =0x434b4558, len=80
3,337,248 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,173,881 ready_for_fw is high
1,173,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,623 UART: [fwproc] Recv command 0x46574c44
1,282,356 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,081 >>> mbox cmd response: success
2,773,286 UART: [afmc] ++
2,773,454 UART: [afmc] CDI.KEYID = 6
2,773,817 UART: [afmc] SUBJECT.KEYID = 7
2,774,243 UART: [afmc] AUTHORITY.KEYID = 5
2,809,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,516 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,411 UART: [afmc] --
2,853,337 UART: [cold-reset] --
2,854,013 UART: [state] Locking Datavault
2,854,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,592 UART: [state] Locking ICCM
2,856,102 UART: [exit] Launching FMC @ 0x40000130
2,861,431 UART:
2,861,447 UART: Running Caliptra FMC ...
2,861,855 UART:
2,861,909 UART: [state] CFI Enabled
2,872,010 UART: [fht] FMC Alias Private Key: 7
2,981,321 UART: [art] Extend RT PCRs Done
2,981,749 UART: [art] Lock RT PCRs Done
2,983,171 UART: [art] Populate DV Done
2,991,368 UART: [fht] FMC Alias Private Key: 7
2,992,326 UART: [art] Derive CDI
2,992,606 UART: [art] Store in in slot 0x4
3,078,389 UART: [art] Derive Key Pair
3,078,749 UART: [art] Store priv key in slot 0x5
3,091,599 UART: [art] Derive Key Pair - Done
3,106,377 UART: [art] Signing Cert with AUTHO
3,106,857 UART: RITY.KEYID = 7
3,122,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,838 UART: [art] PUB.X = DAB5DBBEE149CF9CFC6FD92D3858E10685DF073B450C67E71D31282D59960A80F9D287C61152712865FDBDDEA0022A48
3,129,603 UART: [art] PUB.Y = 0792725D4EA17ECFB1994F979C01638817E329E0D19153813F954D7156AFBFED844A5FC1275371EACD16EB15F4821FBA
3,136,551 UART: [art] SIG.R = 43E53BDFBC42686B4A0C8A635C56656AB40180AD02E84C640949B4C2BC2B2F9952A36EA9D0B45CFE1F369258592C3109
3,143,310 UART: [art] SIG.S = E54F1C18FA422BFD2305F53379B6FCEC23CD5E4F329EF786B87B39015355BC154849FEB75D86639411B705246BBA90E6
3,167,802 UART: Caliptra RT
3,168,055 UART: [state] CFI Enabled
3,275,036 UART: [rt] RT listening for mailbox commands...
3,275,706 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,685 UART: [rt]cmd =0x414c544e, len=41
3,307,432 >>> mbox cmd response data (8 bytes)
3,307,433 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,268 UART: [rt]cmd =0x434b4558, len=80
3,508,014 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,610 ready_for_fw is high
1,056,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,251 >>> mbox cmd response: success
2,686,151 UART:
2,686,167 UART: Running Caliptra FMC ...
2,686,575 UART:
2,686,629 UART: [state] CFI Enabled
2,697,088 UART: [fht] FMC Alias Private Key: 7
2,805,045 UART: [art] Extend RT PCRs Done
2,805,473 UART: [art] Lock RT PCRs Done
2,806,761 UART: [art] Populate DV Done
2,815,140 UART: [fht] FMC Alias Private Key: 7
2,816,302 UART: [art] Derive CDI
2,816,582 UART: [art] Store in in slot 0x4
2,902,205 UART: [art] Derive Key Pair
2,902,565 UART: [art] Store priv key in slot 0x5
2,915,749 UART: [art] Derive Key Pair - Done
2,930,305 UART: [art] Signing Cert with AUTHO
2,930,785 UART: RITY.KEYID = 7
2,946,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,788 UART: [art] PUB.X = 0FC84FBCAA0322054C748A8E807A4C16A88322AE94644C0C5EF4A51944B9FD65A7E122C67654A2F276683BDB2DE34BAC
2,953,556 UART: [art] PUB.Y = 05BE81447D688702F250EF4E0BD907A4595A76689C86EB4BEBDA1112E5E32B7024531981E2D5796BC88A46D0D92E2109
2,960,489 UART: [art] SIG.R = 83DD233BEF2875726D883846F6C5BF73E2BE7A0D0998CBFE74BCA64D0FC82231BEB7190A3C790CC81133D63437C98281
2,967,250 UART: [art] SIG.S = 281FC37D8244C4A863C47664473771107C5F7D57E9B7A4B21C6830EDEEA1D9701AA0FA32B3AA45CFE57084453E3634C6
2,990,875 UART: Caliptra RT
2,991,128 UART: [state] CFI Enabled
3,098,987 UART: [rt] RT listening for mailbox commands...
3,099,657 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,870 UART: [rt]cmd =0x414c544e, len=41
3,131,719 >>> mbox cmd response data (8 bytes)
3,131,720 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,643 UART: [rt]cmd =0x434b4558, len=80
3,332,294 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,407 UART: [kat] SHA2-256
891,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,086 UART: [kat] ++
896,238 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 ready_for_fw is high
1,174,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,198,622 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,505 UART: [ldev] ++
1,208,673 UART: [ldev] CDI.KEYID = 6
1,209,037 UART: [ldev] SUBJECT.KEYID = 5
1,209,464 UART: [ldev] AUTHORITY.KEYID = 7
1,209,927 UART: [ldev] FE.KEYID = 1
1,215,073 UART: [ldev] Erasing FE.KEYID = 1
1,241,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,019 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,224 UART: [fwproc] Recv command 0x46574c44
1,281,957 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,598 >>> mbox cmd response: success
2,771,739 UART: [afmc] ++
2,771,907 UART: [afmc] CDI.KEYID = 6
2,772,270 UART: [afmc] SUBJECT.KEYID = 7
2,772,696 UART: [afmc] AUTHORITY.KEYID = 5
2,807,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,946 UART: [afmc] --
2,851,030 UART: [cold-reset] --
2,851,590 UART: [state] Locking Datavault
2,852,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,173 UART: [state] Locking ICCM
2,853,711 UART: [exit] Launching FMC @ 0x40000130
2,859,040 UART:
2,859,056 UART: Running Caliptra FMC ...
2,859,464 UART:
2,859,607 UART: [state] CFI Enabled
2,870,388 UART: [fht] FMC Alias Private Key: 7
2,978,247 UART: [art] Extend RT PCRs Done
2,978,675 UART: [art] Lock RT PCRs Done
2,980,441 UART: [art] Populate DV Done
2,988,484 UART: [fht] FMC Alias Private Key: 7
2,989,428 UART: [art] Derive CDI
2,989,708 UART: [art] Store in in slot 0x4
3,075,667 UART: [art] Derive Key Pair
3,076,027 UART: [art] Store priv key in slot 0x5
3,089,275 UART: [art] Derive Key Pair - Done
3,104,049 UART: [art] Signing Cert with AUTHO
3,104,529 UART: RITY.KEYID = 7
3,119,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,614 UART: [art] PUB.X = B84CA4BB7724AF13F281EB14E95865CC3DA5F9D477F26FDF0CB298FA56DEB42FADC70D2B2C587D97A3F6FEFCAB5E1CEF
3,127,412 UART: [art] PUB.Y = BAF8FBE64BBE56BE7081B9AF4443EA2EC54607DF5D0E7E8EB50F9E46FE5895A75341390A8BD9AD7F2C4A0B8B40D690BD
3,134,371 UART: [art] SIG.R = 1380FE908250D54247067D3269F53571162BB237220D1CD1ACEE704531EED9A37C841D32CAACBFCFAEEE1933A16D08C5
3,141,140 UART: [art] SIG.S = F60D52F7E6FA9FC48C920546AF8A77C2FCC3585BB2DD7D297EC8008415A5BDBB944AF47EAF38580AB45CF6A97FA452F1
3,164,778 UART: Caliptra RT
3,165,123 UART: [state] CFI Enabled
3,273,756 UART: [rt] RT listening for mailbox commands...
3,274,426 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,537 UART: [rt]cmd =0x414c544e, len=41
3,306,618 >>> mbox cmd response data (8 bytes)
3,306,619 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,460 UART: [rt]cmd =0x434b4558, len=80
3,507,943 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,497 ready_for_fw is high
1,056,497 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,950 >>> mbox cmd response: success
2,685,268 UART:
2,685,284 UART: Running Caliptra FMC ...
2,685,692 UART:
2,685,835 UART: [state] CFI Enabled
2,696,670 UART: [fht] FMC Alias Private Key: 7
2,804,693 UART: [art] Extend RT PCRs Done
2,805,121 UART: [art] Lock RT PCRs Done
2,806,369 UART: [art] Populate DV Done
2,814,594 UART: [fht] FMC Alias Private Key: 7
2,815,604 UART: [art] Derive CDI
2,815,884 UART: [art] Store in in slot 0x4
2,901,583 UART: [art] Derive Key Pair
2,901,943 UART: [art] Store priv key in slot 0x5
2,914,597 UART: [art] Derive Key Pair - Done
2,929,271 UART: [art] Signing Cert with AUTHO
2,929,751 UART: RITY.KEYID = 7
2,944,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,650 UART: [art] PUB.X = 19D3802BD8D7733B4A018B7A7F9B54F8F12FEA46CD3EA4750427FF0E133943060941DB5E4117672A962C56189D02229C
2,952,398 UART: [art] PUB.Y = 816EE99BC646FBCEE28CC483B27D8F713CD5DBCAF720FA80A44FF06B6B78771D5116853AB9A9E99F21A1F94C5368B7CD
2,959,366 UART: [art] SIG.R = ED86E0FB5CA7E311E46E3A7FD73481C3F1E7F8DC6C8AD356964BF820885993A4FA13FADCAD23E7A74004CFBFCF2C2CB7
2,966,159 UART: [art] SIG.S = 767082B3C112B4062D9F5D9900F21E2E5613B429E598D5F26B0B7A5E568A0426173843B9EB6DD0A664350B0E78DBE4F3
2,989,967 UART: Caliptra RT
2,990,312 UART: [state] CFI Enabled
3,098,981 UART: [rt] RT listening for mailbox commands...
3,099,651 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,822 UART: [rt]cmd =0x414c544e, len=41
3,131,567 >>> mbox cmd response data (8 bytes)
3,131,568 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,511 UART: [rt]cmd =0x434b4558, len=80
3,333,253 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
87,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,633 UART: [kat] SHA2-256
882,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,679 UART: [kat] ++
886,831 UART: [kat] sha1
891,129 UART: [kat] SHA2-256
893,067 UART: [kat] SHA2-384
895,864 UART: [kat] SHA2-512-ACC
897,765 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,684 UART: [kat] LMS
1,475,880 UART: [kat] --
1,477,021 UART: [cold-reset] ++
1,477,515 UART: [fht] Storing FHT @ 0x50003400
1,480,390 UART: [idev] ++
1,480,558 UART: [idev] CDI.KEYID = 6
1,480,918 UART: [idev] SUBJECT.KEYID = 7
1,481,342 UART: [idev] UDS.KEYID = 0
1,481,687 ready_for_fw is high
1,481,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,434 UART: [idev] Erasing UDS.KEYID = 0
1,506,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,898 UART: [idev] --
1,516,029 UART: [ldev] ++
1,516,197 UART: [ldev] CDI.KEYID = 6
1,516,560 UART: [ldev] SUBJECT.KEYID = 5
1,516,986 UART: [ldev] AUTHORITY.KEYID = 7
1,517,449 UART: [ldev] FE.KEYID = 1
1,522,727 UART: [ldev] Erasing FE.KEYID = 1
1,548,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,248 UART: [ldev] --
1,587,743 UART: [fwproc] Waiting for Commands...
1,588,496 UART: [fwproc] Received command 0x46574c44
1,589,287 UART: [fwproc] Received Image of size 114332 bytes
2,887,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,656 >>> mbox cmd response: success
3,080,800 UART: [afmc] ++
3,080,968 UART: [afmc] CDI.KEYID = 6
3,081,330 UART: [afmc] SUBJECT.KEYID = 7
3,081,755 UART: [afmc] AUTHORITY.KEYID = 5
3,117,110 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,953 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,643 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,496 UART: [afmc] --
3,160,460 UART: [cold-reset] --
3,161,384 UART: [state] Locking Datavault
3,162,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,031 UART: [state] Locking ICCM
3,163,651 UART: [exit] Launching FMC @ 0x40000130
3,168,980 UART:
3,168,996 UART: Running Caliptra FMC ...
3,169,404 UART:
3,169,458 UART: [state] CFI Enabled
3,179,881 UART: [fht] FMC Alias Private Key: 7
3,287,570 UART: [art] Extend RT PCRs Done
3,287,998 UART: [art] Lock RT PCRs Done
3,289,548 UART: [art] Populate DV Done
3,297,947 UART: [fht] FMC Alias Private Key: 7
3,298,957 UART: [art] Derive CDI
3,299,237 UART: [art] Store in in slot 0x4
3,385,088 UART: [art] Derive Key Pair
3,385,448 UART: [art] Store priv key in slot 0x5
3,398,240 UART: [art] Derive Key Pair - Done
3,412,594 UART: [art] Signing Cert with AUTHO
3,413,074 UART: RITY.KEYID = 7
3,428,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,255 UART: [art] PUB.X = 3FBA72CD53C94B54C0E67753ACCBEF9C7492EC9D8B352F97D2425A535963B068BC2C0139BB5D9B0188A7154351C1C191
3,436,025 UART: [art] PUB.Y = 704CEC3E8CAA5408FB6C5E6450E872FBE4015C4A1C7847B902E099C9F8378756781DFF20823AFE70371BCB96466B464E
3,442,970 UART: [art] SIG.R = 47163F035B53A4158289F4525B0D7BC84633BC38EA5FEB2FE07EC39B20FD557DA7FA086CC6C8836F07E980C692113D20
3,449,732 UART: [art] SIG.S = 86C5021BD07FAEF1FB864FEA9CFC52AA9C23EA9F22F4253534BE89179AEA3403846287788F35FFBAA09EAA416BEDFF0A
3,473,518 UART: Caliptra RT
3,473,771 UART: [state] CFI Enabled
3,582,552 UART: [rt] RT listening for mailbox commands...
3,583,222 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,076 UART: [rt]cmd =0x414c544e, len=20
3,614,368 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,565 ready_for_fw is high
1,362,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,232 >>> mbox cmd response: success
2,989,108 UART:
2,989,124 UART: Running Caliptra FMC ...
2,989,532 UART:
2,989,586 UART: [state] CFI Enabled
3,000,257 UART: [fht] FMC Alias Private Key: 7
3,108,406 UART: [art] Extend RT PCRs Done
3,108,834 UART: [art] Lock RT PCRs Done
3,110,576 UART: [art] Populate DV Done
3,118,929 UART: [fht] FMC Alias Private Key: 7
3,119,903 UART: [art] Derive CDI
3,120,183 UART: [art] Store in in slot 0x4
3,205,764 UART: [art] Derive Key Pair
3,206,124 UART: [art] Store priv key in slot 0x5
3,219,352 UART: [art] Derive Key Pair - Done
3,234,325 UART: [art] Signing Cert with AUTHO
3,234,805 UART: RITY.KEYID = 7
3,249,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,684 UART: [art] PUB.X = A30C5802EB46722D03793AE336B63A3697105A1F5246D0BAC6B89A74D5F5FC2168BC7C1DF2276B4D08661248965B8AA7
3,257,442 UART: [art] PUB.Y = D35687850C0AFD511CCAFD29CEF4ADFB8EDF2428144F60D0898802EE8A8DE2CF7FD539B0E8FE62C78BA40958E007B564
3,264,395 UART: [art] SIG.R = F0DAFC6FE36B822537165BEA29D4A65DFE2906D3DF42F9F488B5C3E77B6A79B0FBBE8363AAC47145771710F63D3FC0B2
3,271,178 UART: [art] SIG.S = D5AE8FA1F2EE44360114270B8DC68C93C4CA96D412C910AC2A7A57B5B5E032ABA8D9AE3E1F0A2DF90FF848C56F39CC1F
3,294,505 UART: Caliptra RT
3,294,758 UART: [state] CFI Enabled
3,402,634 UART: [rt] RT listening for mailbox commands...
3,403,304 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,096 UART: [rt]cmd =0x414c544e, len=20
3,434,526 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,728 UART: [kat] SHA2-256
882,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,774 UART: [kat] ++
886,926 UART: [kat] sha1
891,128 UART: [kat] SHA2-256
893,066 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,469 UART: [kat] HMAC-384Kdf
908,043 UART: [kat] LMS
1,476,239 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,155 UART: [idev] ++
1,480,323 UART: [idev] CDI.KEYID = 6
1,480,683 UART: [idev] SUBJECT.KEYID = 7
1,481,107 UART: [idev] UDS.KEYID = 0
1,481,452 ready_for_fw is high
1,481,452 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,303 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,522,098 UART: [ldev] Erasing FE.KEYID = 1
1,547,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,779 UART: [ldev] --
1,587,224 UART: [fwproc] Waiting for Commands...
1,588,009 UART: [fwproc] Received command 0x46574c44
1,588,800 UART: [fwproc] Received Image of size 114332 bytes
2,885,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,764 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,079 >>> mbox cmd response: success
3,079,115 UART: [afmc] ++
3,079,283 UART: [afmc] CDI.KEYID = 6
3,079,645 UART: [afmc] SUBJECT.KEYID = 7
3,080,070 UART: [afmc] AUTHORITY.KEYID = 5
3,115,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,861 UART: [afmc] --
3,158,739 UART: [cold-reset] --
3,159,521 UART: [state] Locking Datavault
3,160,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,354 UART: [state] Locking ICCM
3,161,810 UART: [exit] Launching FMC @ 0x40000130
3,167,139 UART:
3,167,155 UART: Running Caliptra FMC ...
3,167,563 UART:
3,167,706 UART: [state] CFI Enabled
3,178,291 UART: [fht] FMC Alias Private Key: 7
3,286,526 UART: [art] Extend RT PCRs Done
3,286,954 UART: [art] Lock RT PCRs Done
3,288,604 UART: [art] Populate DV Done
3,296,755 UART: [fht] FMC Alias Private Key: 7
3,297,871 UART: [art] Derive CDI
3,298,151 UART: [art] Store in in slot 0x4
3,383,850 UART: [art] Derive Key Pair
3,384,210 UART: [art] Store priv key in slot 0x5
3,397,862 UART: [art] Derive Key Pair - Done
3,412,866 UART: [art] Signing Cert with AUTHO
3,413,346 UART: RITY.KEYID = 7
3,428,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,287 UART: [art] PUB.X = 9B0B80A0F48BF61D49760616FB2063AD1C0A899D05CEA567C725CFE515689BDC1EE93C3BC839088E95FFB171B75535ED
3,436,052 UART: [art] PUB.Y = BBD6A33422BB3BF13970D2AD1F460ED326A4DDC1179618B6C9A855FD26A04EE128CC1433302E7ABCB8B8B4C4BABF2746
3,443,017 UART: [art] SIG.R = 142DA53857674792686BB6A72EC43FD85AAA5D0A8A10288A71204121D8F4E4B9A37DAFB7FA7C021A95830F358B2EBF24
3,449,784 UART: [art] SIG.S = 5BFE718AAD627724BF8D106C3D1189785B2BD5B4A1CB418C87CF15F8825BF65099AD4681190901DD3D84BF2885A2AB10
3,473,449 UART: Caliptra RT
3,473,794 UART: [state] CFI Enabled
3,582,298 UART: [rt] RT listening for mailbox commands...
3,582,968 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,774 UART: [rt]cmd =0x414c544e, len=20
3,614,150 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,705 >>> mbox cmd response: success
2,990,625 UART:
2,990,641 UART: Running Caliptra FMC ...
2,991,049 UART:
2,991,192 UART: [state] CFI Enabled
3,001,887 UART: [fht] FMC Alias Private Key: 7
3,109,582 UART: [art] Extend RT PCRs Done
3,110,010 UART: [art] Lock RT PCRs Done
3,111,562 UART: [art] Populate DV Done
3,119,905 UART: [fht] FMC Alias Private Key: 7
3,120,913 UART: [art] Derive CDI
3,121,193 UART: [art] Store in in slot 0x4
3,206,936 UART: [art] Derive Key Pair
3,207,296 UART: [art] Store priv key in slot 0x5
3,220,882 UART: [art] Derive Key Pair - Done
3,235,502 UART: [art] Signing Cert with AUTHO
3,235,982 UART: RITY.KEYID = 7
3,251,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,799 UART: [art] PUB.X = 65AF9DD67A260F84456569CE60E14B8C0E91C2EE449EB76307DD16A0DDB6A2522FA7749A27A4E64CB444DCEDAF805924
3,258,572 UART: [art] PUB.Y = 6D05A2886589BB39202E835E295EC23374A60258EEC93DFA95491CAC811F5A9E421D0991ED8F71258EC4E9FCC901EA0E
3,265,513 UART: [art] SIG.R = CF1ECBF623BB311F75E1BAFA334AA00A84C8DF8C3270C01D8C839152C93BFB68005016074A6C20C610563AB244F14CCC
3,272,267 UART: [art] SIG.S = 413870DA362701CE08F934A6E122C045A741F34C2188371B73011F25AB8D6118C60CE0AE85710002019F247C60D71B13
3,296,384 UART: Caliptra RT
3,296,729 UART: [state] CFI Enabled
3,405,418 UART: [rt] RT listening for mailbox commands...
3,406,088 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,130 UART: [rt]cmd =0x414c544e, len=20
3,437,406 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
918,250 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,880 UART: [idev] ++
1,175,048 UART: [idev] CDI.KEYID = 6
1,175,408 UART: [idev] SUBJECT.KEYID = 7
1,175,832 UART: [idev] UDS.KEYID = 0
1,176,177 ready_for_fw is high
1,176,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,575 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,247 UART: [ldev] --
1,282,638 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,665 >>> mbox cmd response: success
2,775,919 UART: [afmc] ++
2,776,087 UART: [afmc] CDI.KEYID = 6
2,776,449 UART: [afmc] SUBJECT.KEYID = 7
2,776,874 UART: [afmc] AUTHORITY.KEYID = 5
2,811,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,074 UART: [afmc] --
2,854,988 UART: [cold-reset] --
2,855,948 UART: [state] Locking Datavault
2,857,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,753 UART: [state] Locking ICCM
2,858,217 UART: [exit] Launching FMC @ 0x40000130
2,863,546 UART:
2,863,562 UART: Running Caliptra FMC ...
2,863,970 UART:
2,864,024 UART: [state] CFI Enabled
2,874,511 UART: [fht] FMC Alias Private Key: 7
2,983,354 UART: [art] Extend RT PCRs Done
2,983,782 UART: [art] Lock RT PCRs Done
2,985,614 UART: [art] Populate DV Done
2,993,909 UART: [fht] FMC Alias Private Key: 7
2,995,041 UART: [art] Derive CDI
2,995,321 UART: [art] Store in in slot 0x4
3,080,950 UART: [art] Derive Key Pair
3,081,310 UART: [art] Store priv key in slot 0x5
3,094,960 UART: [art] Derive Key Pair - Done
3,109,801 UART: [art] Signing Cert with AUTHO
3,110,281 UART: RITY.KEYID = 7
3,125,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,070 UART: [art] PUB.X = 609348AADD4A388D1325B290096C5D63A96AEDE71AFE77FF243641164E9F01C6182562AE3C83E908398BCD2E662EA99E
3,132,835 UART: [art] PUB.Y = 6E26F2BB8CA4D93894B297B6BAFACA53DE7BA557CF9DD8519926240DD71FF9AF4DFEED380F43F5A07B8B6BCA1B22B593
3,139,805 UART: [art] SIG.R = 1622A16586CEA98D06B2E6FCC57E20AC86F3C3331FC2247BD66CF95BDF2FB03DF0274D10041C079FFF5CE47D9737D5B3
3,146,580 UART: [art] SIG.S = 1B6C8FFA78F03CDAC00AEBC4094716910C915FB25CA5E19C679FD3148D1DF25ABEEAFD7EB79C5594720335E486E2813C
3,169,957 UART: Caliptra RT
3,170,210 UART: [state] CFI Enabled
3,277,839 UART: [rt] RT listening for mailbox commands...
3,278,509 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,427 UART: [rt]cmd =0x414c544e, len=20
3,309,661 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 ready_for_fw is high
1,060,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,994 >>> mbox cmd response: success
2,687,996 UART:
2,688,012 UART: Running Caliptra FMC ...
2,688,420 UART:
2,688,474 UART: [state] CFI Enabled
2,699,279 UART: [fht] FMC Alias Private Key: 7
2,806,476 UART: [art] Extend RT PCRs Done
2,806,904 UART: [art] Lock RT PCRs Done
2,808,642 UART: [art] Populate DV Done
2,816,799 UART: [fht] FMC Alias Private Key: 7
2,817,755 UART: [art] Derive CDI
2,818,035 UART: [art] Store in in slot 0x4
2,903,406 UART: [art] Derive Key Pair
2,903,766 UART: [art] Store priv key in slot 0x5
2,916,888 UART: [art] Derive Key Pair - Done
2,932,114 UART: [art] Signing Cert with AUTHO
2,932,594 UART: RITY.KEYID = 7
2,947,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,343 UART: [art] PUB.X = 52BACA516F41BF31FAE773825DA143E0A3FB659F265217885E25C9003E83BBF131182A2955063C31701132663A8005EB
2,955,079 UART: [art] PUB.Y = 15E2C2D3D39B54D1FC0DE1892596176F7B6F7A918F37F6E62186B636E0733CE755AF78F394A89EF2747850F13E95C72B
2,962,026 UART: [art] SIG.R = BBBE6A4B65DADBEB01A999C4FCB8D49F3215AA1DAA2784E95177D3E2EA0BCD9E890DB2701B053DC7F09E66365D921698
2,968,804 UART: [art] SIG.S = 53FB71F53E7A10958789B33398D8C632FD1D24A7C6714F7DC9ACED1A4838B67BD05BB18853B9066B9C46E41154616967
2,992,652 UART: Caliptra RT
2,992,905 UART: [state] CFI Enabled
3,100,488 UART: [rt] RT listening for mailbox commands...
3,101,158 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,978 UART: [rt]cmd =0x414c544e, len=20
3,132,250 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
893,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,918 UART: [kat] ++
898,070 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
907,123 UART: [kat] SHA2-512-ACC
909,024 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
922,963 UART: [kat] LMS
1,171,291 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 ready_for_fw is high
1,176,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,619 UART: [idev] Erasing UDS.KEYID = 0
1,201,460 UART: [idev] Sha1 KeyId Algorithm
1,209,898 UART: [idev] --
1,210,996 UART: [ldev] ++
1,211,164 UART: [ldev] CDI.KEYID = 6
1,211,527 UART: [ldev] SUBJECT.KEYID = 5
1,211,953 UART: [ldev] AUTHORITY.KEYID = 7
1,212,416 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,244,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,069 UART: [fwproc] Recv command 0x46574c44
1,284,797 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,058 >>> mbox cmd response: success
2,775,142 UART: [afmc] ++
2,775,310 UART: [afmc] CDI.KEYID = 6
2,775,672 UART: [afmc] SUBJECT.KEYID = 7
2,776,097 UART: [afmc] AUTHORITY.KEYID = 5
2,812,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,623 UART: [afmc] --
2,855,613 UART: [cold-reset] --
2,856,311 UART: [state] Locking Datavault
2,857,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,030 UART: [state] Locking ICCM
2,858,628 UART: [exit] Launching FMC @ 0x40000130
2,863,957 UART:
2,863,973 UART: Running Caliptra FMC ...
2,864,381 UART:
2,864,524 UART: [state] CFI Enabled
2,875,413 UART: [fht] FMC Alias Private Key: 7
2,982,962 UART: [art] Extend RT PCRs Done
2,983,390 UART: [art] Lock RT PCRs Done
2,985,148 UART: [art] Populate DV Done
2,993,205 UART: [fht] FMC Alias Private Key: 7
2,994,259 UART: [art] Derive CDI
2,994,539 UART: [art] Store in in slot 0x4
3,080,400 UART: [art] Derive Key Pair
3,080,760 UART: [art] Store priv key in slot 0x5
3,094,154 UART: [art] Derive Key Pair - Done
3,109,049 UART: [art] Signing Cert with AUTHO
3,109,529 UART: RITY.KEYID = 7
3,124,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,314 UART: [art] PUB.X = BB268DEE1CE94BA1953F782165FBF5F973145126773C014BE2E2F04E94A88409C55E498A7E48EA8CE443DCC6760B0F63
3,132,078 UART: [art] PUB.Y = A1A13DA2B1096661D509A3FC0618F0A16CC8303B3E37FC52608526135AE32C3ED74EB4D063100E71300A93809A38CDEA
3,139,015 UART: [art] SIG.R = C8231F2460D166ADAB47B17BB3FDD4FD04A90FE6FF5549C48F5A57B49E7F048F0D55ED48FA9A68E74C025719E51CE3A0
3,145,786 UART: [art] SIG.S = 2AB3DD14EB8BEF642D1648DC8E21B2AE9CDF29C0D9F60758F0CE899D4903B29E4D861D6DC5338D73B0539DAA5B5CCF09
3,169,188 UART: Caliptra RT
3,169,533 UART: [state] CFI Enabled
3,276,458 UART: [rt] RT listening for mailbox commands...
3,277,128 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,032 UART: [rt]cmd =0x414c544e, len=20
3,308,270 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,184 ready_for_fw is high
1,061,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,973 >>> mbox cmd response: success
2,688,867 UART:
2,688,883 UART: Running Caliptra FMC ...
2,689,291 UART:
2,689,434 UART: [state] CFI Enabled
2,699,937 UART: [fht] FMC Alias Private Key: 7
2,807,594 UART: [art] Extend RT PCRs Done
2,808,022 UART: [art] Lock RT PCRs Done
2,809,272 UART: [art] Populate DV Done
2,817,471 UART: [fht] FMC Alias Private Key: 7
2,818,489 UART: [art] Derive CDI
2,818,769 UART: [art] Store in in slot 0x4
2,904,744 UART: [art] Derive Key Pair
2,905,104 UART: [art] Store priv key in slot 0x5
2,918,898 UART: [art] Derive Key Pair - Done
2,933,787 UART: [art] Signing Cert with AUTHO
2,934,267 UART: RITY.KEYID = 7
2,949,377 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,142 UART: [art] PUB.X = 72363D740963674F5F0E2B87451DEEE5F8659C1EE15F3EE35868097360313F7BFB4DB1C53998463B10D3F23EA4223D2C
2,956,901 UART: [art] PUB.Y = 3986447E7F610532064C2FB9431F2BCE0253A9601504827A39A44D188D0E6890AD590D53758A1C5DE98DFD5A30B5A450
2,963,827 UART: [art] SIG.R = 9E820CCFB95E3E17F6BD8DCDA87910375D8053552E8CCCAF287C14BECE45D028DCD9D2F8E01F659AAE16E4C97E740CA8
2,970,613 UART: [art] SIG.S = 16D4C5E56EEE6F2CF99DB4CE83604D0A1E2258ACAB9FABAF27C3A1730998CBE27B56F93A82846ADF636D350863EC1634
2,994,059 UART: Caliptra RT
2,994,404 UART: [state] CFI Enabled
3,102,023 UART: [rt] RT listening for mailbox commands...
3,102,693 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,363 UART: [rt]cmd =0x414c544e, len=20
3,133,529 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 ready_for_fw is high
1,174,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,295 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,242,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,862 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,953 UART: [fwproc] Recv command 0x46574c44
1,282,686 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,049 >>> mbox cmd response: success
2,773,132 UART: [afmc] ++
2,773,300 UART: [afmc] CDI.KEYID = 6
2,773,663 UART: [afmc] SUBJECT.KEYID = 7
2,774,089 UART: [afmc] AUTHORITY.KEYID = 5
2,809,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,051 UART: [afmc] --
2,853,025 UART: [cold-reset] --
2,853,863 UART: [state] Locking Datavault
2,855,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,726 UART: [state] Locking ICCM
2,856,376 UART: [exit] Launching FMC @ 0x40000130
2,861,705 UART:
2,861,721 UART: Running Caliptra FMC ...
2,862,129 UART:
2,862,183 UART: [state] CFI Enabled
2,872,804 UART: [fht] FMC Alias Private Key: 7
2,981,143 UART: [art] Extend RT PCRs Done
2,981,571 UART: [art] Lock RT PCRs Done
2,983,203 UART: [art] Populate DV Done
2,991,394 UART: [fht] FMC Alias Private Key: 7
2,992,428 UART: [art] Derive CDI
2,992,708 UART: [art] Store in in slot 0x4
3,078,485 UART: [art] Derive Key Pair
3,078,845 UART: [art] Store priv key in slot 0x5
3,092,597 UART: [art] Derive Key Pair - Done
3,107,483 UART: [art] Signing Cert with AUTHO
3,107,963 UART: RITY.KEYID = 7
3,123,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,022 UART: [art] PUB.X = BC50FA0FC0C77E04D228947657F35F98CCF481C6C3A991C6CBECF7C060E69D1C66895B323FBABB743678D2766EDCE2CA
3,130,804 UART: [art] PUB.Y = 143ED6110A205AF74C069587E104534FE9DAE09FF28120BA0B814D98EE188775CF5FDE2E43C8160B52211504491D409C
3,137,734 UART: [art] SIG.R = 2AE71B9B71671479EC9931A2E0AE3F54EF96CED7A64E7BB37B32C06D8FC0BDF5594F535901571C0AEDA3261642872DDC
3,144,510 UART: [art] SIG.S = 1560CE557E99B064CA5E38A7E9850F41EA3BB6D4F50ABDC734FA7C65CDE9666DF6DDD64F92180F0FF72857E4314052BD
3,168,789 UART: Caliptra RT
3,169,042 UART: [state] CFI Enabled
3,276,685 UART: [rt] RT listening for mailbox commands...
3,277,355 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,281 UART: [rt]cmd =0x414c544e, len=20
3,308,643 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,136 ready_for_fw is high
1,056,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,817 >>> mbox cmd response: success
2,682,765 UART:
2,682,781 UART: Running Caliptra FMC ...
2,683,189 UART:
2,683,243 UART: [state] CFI Enabled
2,693,714 UART: [fht] FMC Alias Private Key: 7
2,801,917 UART: [art] Extend RT PCRs Done
2,802,345 UART: [art] Lock RT PCRs Done
2,803,589 UART: [art] Populate DV Done
2,812,130 UART: [fht] FMC Alias Private Key: 7
2,813,138 UART: [art] Derive CDI
2,813,418 UART: [art] Store in in slot 0x4
2,898,807 UART: [art] Derive Key Pair
2,899,167 UART: [art] Store priv key in slot 0x5
2,912,571 UART: [art] Derive Key Pair - Done
2,927,740 UART: [art] Signing Cert with AUTHO
2,928,220 UART: RITY.KEYID = 7
2,943,466 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,231 UART: [art] PUB.X = 62D1C3D2EFFA479922A8A60426DD8FC49E539FD79594209B2EB21EFE11A39A37FA4F366CC9943958FFDF5ABEF7A1C042
2,951,014 UART: [art] PUB.Y = 4F7ECEEDD67CE71CEF0B078607ABEB17CDDB2AB6495CDFD1E136B4A0DD65DC2C9F275A765D2FC11C820FD545DF1626E8
2,957,982 UART: [art] SIG.R = 549DAD0A3E46942A0558B5DC653B8E51F6E0430CF98CB50D1DA57F5644C1939B37B989CCEA504F06C22AE8A0D969E1C5
2,964,747 UART: [art] SIG.S = 0C369A09C6E33390250159864D54E3A48B54B593B4C3D68FBCEB4BA1AE396D897336740BE18F8F2EF09464C71085C518
2,988,932 UART: Caliptra RT
2,989,185 UART: [state] CFI Enabled
3,096,682 UART: [rt] RT listening for mailbox commands...
3,097,352 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,212 UART: [rt]cmd =0x414c544e, len=20
3,128,364 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 ready_for_fw is high
1,174,674 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,975 UART: [ldev] ++
1,209,143 UART: [ldev] CDI.KEYID = 6
1,209,507 UART: [ldev] SUBJECT.KEYID = 5
1,209,934 UART: [ldev] AUTHORITY.KEYID = 7
1,210,397 UART: [ldev] FE.KEYID = 1
1,215,643 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,889 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,632 >>> mbox cmd response: success
2,773,785 UART: [afmc] ++
2,773,953 UART: [afmc] CDI.KEYID = 6
2,774,316 UART: [afmc] SUBJECT.KEYID = 7
2,774,742 UART: [afmc] AUTHORITY.KEYID = 5
2,810,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,818 UART: [afmc] --
2,853,828 UART: [cold-reset] --
2,854,524 UART: [state] Locking Datavault
2,855,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,389 UART: [state] Locking ICCM
2,857,051 UART: [exit] Launching FMC @ 0x40000130
2,862,380 UART:
2,862,396 UART: Running Caliptra FMC ...
2,862,804 UART:
2,862,947 UART: [state] CFI Enabled
2,873,600 UART: [fht] FMC Alias Private Key: 7
2,981,421 UART: [art] Extend RT PCRs Done
2,981,849 UART: [art] Lock RT PCRs Done
2,983,415 UART: [art] Populate DV Done
2,991,954 UART: [fht] FMC Alias Private Key: 7
2,992,954 UART: [art] Derive CDI
2,993,234 UART: [art] Store in in slot 0x4
3,079,031 UART: [art] Derive Key Pair
3,079,391 UART: [art] Store priv key in slot 0x5
3,092,961 UART: [art] Derive Key Pair - Done
3,107,625 UART: [art] Signing Cert with AUTHO
3,108,105 UART: RITY.KEYID = 7
3,122,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,714 UART: [art] PUB.X = 754088A347F0BE91B5DCED300D80CEBBBC33F32AAACCFAA7C18016E07426D4300B6B31FE62C7A7A910026DF11C2F3EB3
3,130,495 UART: [art] PUB.Y = D5D204B70E425A48C907FF5B72858BE6ECFC8774429F879E1F7D4D1A5245C38FF06179B5B555AB1345BD8CD79029F177
3,137,440 UART: [art] SIG.R = EB270CC47DE44212E9AF135D0C914B857853C6C6618E1F8780A75CE8923488C3CC4D5B1A300A54400022CF291EFA8DEB
3,144,185 UART: [art] SIG.S = C911B1AA36A86C226339F0029DFF20E97C9BEC3F260A6AB52CDB4D87F6B533E1745483E2415EECE3661E0F14EECDB5AE
3,168,525 UART: Caliptra RT
3,168,870 UART: [state] CFI Enabled
3,276,706 UART: [rt] RT listening for mailbox commands...
3,277,376 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,344 UART: [rt]cmd =0x414c544e, len=20
3,308,798 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,989 ready_for_fw is high
1,056,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,650 >>> mbox cmd response: success
2,685,960 UART:
2,685,976 UART: Running Caliptra FMC ...
2,686,384 UART:
2,686,527 UART: [state] CFI Enabled
2,696,864 UART: [fht] FMC Alias Private Key: 7
2,805,307 UART: [art] Extend RT PCRs Done
2,805,735 UART: [art] Lock RT PCRs Done
2,807,193 UART: [art] Populate DV Done
2,815,538 UART: [fht] FMC Alias Private Key: 7
2,816,490 UART: [art] Derive CDI
2,816,770 UART: [art] Store in in slot 0x4
2,902,929 UART: [art] Derive Key Pair
2,903,289 UART: [art] Store priv key in slot 0x5
2,916,489 UART: [art] Derive Key Pair - Done
2,931,219 UART: [art] Signing Cert with AUTHO
2,931,699 UART: RITY.KEYID = 7
2,947,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,902 UART: [art] PUB.X = A8447DD512DEA0971F2C5E8BB78A5E8D5A500BA5373FF64DAC1770FE0FEC976E3B645E9B4CEE40D13FC1C455FAC22E21
2,954,688 UART: [art] PUB.Y = 08BDC2CEB98459F94E8D23A184BFCAFB33A329EBA6BBBDAAB7EF30F425E4BD51FE4799231828EA423C32E37C27916964
2,961,653 UART: [art] SIG.R = 8FA9882EAF0487ED7C2DFA783598BD31703EFC38FF7440F0A6305E1C019E7D2B774DB811FDBC704D76E3D1A966F97D99
2,968,429 UART: [art] SIG.S = A8E86BF7475BD7542E0B79D562131B316A7166B6C5F81D9DE7A0D2A975CC8BA1C35A8826B48BF9E58441D4872DB7AF4A
2,991,507 UART: Caliptra RT
2,991,852 UART: [state] CFI Enabled
3,099,518 UART: [rt] RT listening for mailbox commands...
3,100,188 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,186 UART: [rt]cmd =0x414c544e, len=20
3,131,480 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
Truncated 5006 bytes from beginning
5B18BBB0439858E76AED5D10F980B4FCF05E0
3,438,328 UART: [art] PUB.Y = 113A0CD2524BD7B770F208090D748C3FC3B2955D3A953E5F1497CC705159A759E2CF1BDB45664E9225BFE9064EA720C2
3,445,265 UART: [art] SIG.R = EEB820494EF95BE2CE3F452950CA32394EE855D792E1A30EC4A8BFBD25C9C4E8DB82BEFF0029B899E09E172AC3466EF2
3,452,028 UART: [art] SIG.S = B8EA7FF0B8C026395E0F461195DAD8FDE60B1631CBF2349C5ABB756DBC07265FC88BBBC2DFCD66B665802EC25C4D996D
3,475,582 UART: Caliptra RT
3,475,835 UART: [state] CFI Enabled
3,596,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,667 UART: [rt]cmd =0x44504543, len=92
3,819,354 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,847 UART: [cold-reset] ++
1,477,383 UART: [fht] Storing FHT @ 0x50003400
1,480,034 UART: [idev] ++
1,480,202 UART: [idev] CDI.KEYID = 6
1,480,562 UART: [idev] SUBJECT.KEYID = 7
1,480,986 UART: [idev] UDS.KEYID = 0
1,481,331 ready_for_fw is high
1,481,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,906 UART: [idev] Erasing UDS.KEYID = 0
1,505,698 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,316 UART: [idev] --
1,515,387 UART: [ldev] ++
1,515,555 UART: [ldev] CDI.KEYID = 6
1,515,918 UART: [ldev] SUBJECT.KEYID = 5
1,516,344 UART: [ldev] AUTHORITY.KEYID = 7
1,516,807 UART: [ldev] FE.KEYID = 1
1,522,095 UART: [ldev] Erasing FE.KEYID = 1
1,547,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,504 UART: [ldev] --
1,587,005 UART: [fwproc] Waiting for Commands...
1,587,786 UART: [fwproc] Received command 0x46574c44
1,588,577 UART: [fwproc] Received Image of size 114332 bytes
2,886,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,800 >>> mbox cmd response: success
3,078,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,080,038 UART: [afmc] ++
3,080,206 UART: [afmc] CDI.KEYID = 6
3,080,568 UART: [afmc] SUBJECT.KEYID = 7
3,080,993 UART: [afmc] AUTHORITY.KEYID = 5
3,116,354 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,775 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,465 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,170 UART: [afmc] --
3,159,294 UART: [cold-reset] --
3,160,266 UART: [state] Locking Datavault
3,161,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,101 UART: [state] Locking ICCM
3,162,565 UART: [exit] Launching FMC @ 0x40000130
3,167,894 UART:
3,167,910 UART: Running Caliptra FMC ...
3,168,318 UART:
3,168,372 UART: [state] CFI Enabled
3,178,971 UART: [fht] FMC Alias Private Key: 7
3,286,252 UART: [art] Extend RT PCRs Done
3,286,680 UART: [art] Lock RT PCRs Done
3,288,566 UART: [art] Populate DV Done
3,296,569 UART: [fht] FMC Alias Private Key: 7
3,297,677 UART: [art] Derive CDI
3,297,957 UART: [art] Store in in slot 0x4
3,383,614 UART: [art] Derive Key Pair
3,383,974 UART: [art] Store priv key in slot 0x5
3,396,782 UART: [art] Derive Key Pair - Done
3,411,506 UART: [art] Signing Cert with AUTHO
3,411,986 UART: RITY.KEYID = 7
3,427,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,833 UART: [art] PUB.X = 597CC5DA1CE57D41592B065EF9C01205E6D2DCC096973516119226F064A5B18BBB0439858E76AED5D10F980B4FCF05E0
3,434,589 UART: [art] PUB.Y = 113A0CD2524BD7B770F208090D748C3FC3B2955D3A953E5F1497CC705159A759E2CF1BDB45664E9225BFE9064EA720C2
3,441,526 UART: [art] SIG.R = EEB820494EF95BE2CE3F452950CA32394EE855D792E1A30EC4A8BFBD25C9C4E8DB82BEFF0029B899E09E172AC3466EF2
3,448,289 UART: [art] SIG.S = B8EA7FF0B8C026395E0F461195DAD8FDE60B1631CBF2349C5ABB756DBC07265FC88BBBC2DFCD66B665802EC25C4D996D
3,471,875 UART: Caliptra RT
3,472,128 UART: [state] CFI Enabled
3,581,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,050 UART: [rt]cmd =0x4d454153, len=108
3,632,411 >>> mbox cmd response data (12 bytes)
3,632,412 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,339 UART: [rt]cmd =0x44504543, len=92
3,853,426 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
903,318 UART: [kat] HMAC-384Kdf
907,758 UART: [kat] LMS
1,475,954 UART: [kat] --
1,476,963 UART: [cold-reset] ++
1,477,423 UART: [fht] Storing FHT @ 0x50003400
1,480,224 UART: [idev] ++
1,480,392 UART: [idev] CDI.KEYID = 6
1,480,752 UART: [idev] SUBJECT.KEYID = 7
1,481,176 UART: [idev] UDS.KEYID = 0
1,481,521 ready_for_fw is high
1,481,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,106 UART: [idev] Erasing UDS.KEYID = 0
1,505,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,266 UART: [idev] --
1,515,431 UART: [ldev] ++
1,515,599 UART: [ldev] CDI.KEYID = 6
1,515,962 UART: [ldev] SUBJECT.KEYID = 5
1,516,388 UART: [ldev] AUTHORITY.KEYID = 7
1,516,851 UART: [ldev] FE.KEYID = 1
1,522,009 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,204 UART: [ldev] --
1,586,685 UART: [fwproc] Waiting for Commands...
1,587,486 UART: [fwproc] Received command 0x46574c44
1,588,277 UART: [fwproc] Received Image of size 114332 bytes
2,886,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,336 >>> mbox cmd response: success
3,078,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,556 UART: [afmc] ++
3,079,724 UART: [afmc] CDI.KEYID = 6
3,080,086 UART: [afmc] SUBJECT.KEYID = 7
3,080,511 UART: [afmc] AUTHORITY.KEYID = 5
3,115,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,975 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,665 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,592 UART: [afmc] --
3,158,648 UART: [cold-reset] --
3,159,724 UART: [state] Locking Datavault
3,160,855 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,459 UART: [state] Locking ICCM
3,162,001 UART: [exit] Launching FMC @ 0x40000130
3,167,330 UART:
3,167,346 UART: Running Caliptra FMC ...
3,167,754 UART:
3,167,808 UART: [state] CFI Enabled
3,178,587 UART: [fht] FMC Alias Private Key: 7
3,285,988 UART: [art] Extend RT PCRs Done
3,286,416 UART: [art] Lock RT PCRs Done
3,287,682 UART: [art] Populate DV Done
3,296,009 UART: [fht] FMC Alias Private Key: 7
3,296,979 UART: [art] Derive CDI
3,297,259 UART: [art] Store in in slot 0x4
3,382,502 UART: [art] Derive Key Pair
3,382,862 UART: [art] Store priv key in slot 0x5
3,394,928 UART: [art] Derive Key Pair - Done
3,409,472 UART: [art] Signing Cert with AUTHO
3,409,952 UART: RITY.KEYID = 7
3,424,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,697 UART: [art] PUB.X = 597CC5DA1CE57D41592B065EF9C01205E6D2DCC096973516119226F064A5B18BBB0439858E76AED5D10F980B4FCF05E0
3,432,453 UART: [art] PUB.Y = 113A0CD2524BD7B770F208090D748C3FC3B2955D3A953E5F1497CC705159A759E2CF1BDB45664E9225BFE9064EA720C2
3,439,390 UART: [art] SIG.R = EEB820494EF95BE2CE3F452950CA32394EE855D792E1A30EC4A8BFBD25C9C4E8DB82BEFF0029B899E09E172AC3466EF2
3,446,153 UART: [art] SIG.S = B8EA7FF0B8C026395E0F461195DAD8FDE60B1631CBF2349C5ABB756DBC07265FC88BBBC2DFCD66B665802EC25C4D996D
3,470,257 UART: Caliptra RT
3,470,510 UART: [state] CFI Enabled
3,578,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,084 UART: [rt]cmd =0x44504543, len=96
3,643,183 >>> mbox cmd response data (56 bytes)
3,643,184 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,361 UART: [rt]cmd =0x44504543, len=92
3,864,304 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,849 >>> mbox cmd response data (12 bytes)
1,444,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,932,137 >>> mbox cmd response: success
2,932,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,275 UART:
2,992,291 UART: Running Caliptra FMC ...
2,992,699 UART:
2,992,753 UART: [state] CFI Enabled
3,003,170 UART: [fht] FMC Alias Private Key: 7
3,111,255 UART: [art] Extend RT PCRs Done
3,111,683 UART: [art] Lock RT PCRs Done
3,113,363 UART: [art] Populate DV Done
3,121,634 UART: [fht] FMC Alias Private Key: 7
3,122,664 UART: [art] Derive CDI
3,122,944 UART: [art] Store in in slot 0x4
3,208,697 UART: [art] Derive Key Pair
3,209,057 UART: [art] Store priv key in slot 0x5
3,222,357 UART: [art] Derive Key Pair - Done
3,236,877 UART: [art] Signing Cert with AUTHO
3,237,357 UART: RITY.KEYID = 7
3,252,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,868 UART: [art] PUB.X = E36E09832C7FC80F2AD4DDC024055ABD9A3DAA5FA32E846B4EB03AA90438589F56F4F310FB76B7DC4F32B3BA86715DEA
3,259,646 UART: [art] PUB.Y = 4C9B846B03606DF7C51AE98DE64CA3F2E1B4A0F8D1F76E6205E4E80F3102406D1C9803A8223103557D68B5908107864C
3,266,571 UART: [art] SIG.R = 5A0EB4783663C1060D9E937E7603E7838EC60243A8F38966FC81A20BC1371F9F29DB304B216755550E703F89CEAEF331
3,273,316 UART: [art] SIG.S = 828E77E9E7C63F56D91C31747943F057E393F05262C7C1BEA151E1E3A7D02DC2461CDDF5F260B2F8ED5DB506125F420C
3,297,035 UART: Caliptra RT
3,297,288 UART: [state] CFI Enabled
3,417,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,561 UART: [rt]cmd =0x44504543, len=92
3,640,624 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,295 ready_for_fw is high
1,363,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,836 >>> mbox cmd response: success
2,927,836 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,988,538 UART:
2,988,554 UART: Running Caliptra FMC ...
2,988,962 UART:
2,989,016 UART: [state] CFI Enabled
2,999,363 UART: [fht] FMC Alias Private Key: 7
3,107,058 UART: [art] Extend RT PCRs Done
3,107,486 UART: [art] Lock RT PCRs Done
3,108,938 UART: [art] Populate DV Done
3,117,069 UART: [fht] FMC Alias Private Key: 7
3,118,193 UART: [art] Derive CDI
3,118,473 UART: [art] Store in in slot 0x4
3,204,182 UART: [art] Derive Key Pair
3,204,542 UART: [art] Store priv key in slot 0x5
3,217,842 UART: [art] Derive Key Pair - Done
3,232,578 UART: [art] Signing Cert with AUTHO
3,233,058 UART: RITY.KEYID = 7
3,247,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,521 UART: [art] PUB.X = E36E09832C7FC80F2AD4DDC024055ABD9A3DAA5FA32E846B4EB03AA90438589F56F4F310FB76B7DC4F32B3BA86715DEA
3,255,299 UART: [art] PUB.Y = 4C9B846B03606DF7C51AE98DE64CA3F2E1B4A0F8D1F76E6205E4E80F3102406D1C9803A8223103557D68B5908107864C
3,262,224 UART: [art] SIG.R = 5A0EB4783663C1060D9E937E7603E7838EC60243A8F38966FC81A20BC1371F9F29DB304B216755550E703F89CEAEF331
3,268,969 UART: [art] SIG.S = 828E77E9E7C63F56D91C31747943F057E393F05262C7C1BEA151E1E3A7D02DC2461CDDF5F260B2F8ED5DB506125F420C
3,292,586 UART: Caliptra RT
3,292,839 UART: [state] CFI Enabled
3,401,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,824 UART: [rt]cmd =0x4d454153, len=108
3,453,473 >>> mbox cmd response data (12 bytes)
3,453,474 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,199 UART: [rt]cmd =0x44504543, len=92
3,674,594 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,675 ready_for_fw is high
1,361,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,928 >>> mbox cmd response: success
2,926,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,988,018 UART:
2,988,034 UART: Running Caliptra FMC ...
2,988,442 UART:
2,988,496 UART: [state] CFI Enabled
2,998,649 UART: [fht] FMC Alias Private Key: 7
3,106,556 UART: [art] Extend RT PCRs Done
3,106,984 UART: [art] Lock RT PCRs Done
3,108,660 UART: [art] Populate DV Done
3,117,045 UART: [fht] FMC Alias Private Key: 7
3,118,077 UART: [art] Derive CDI
3,118,357 UART: [art] Store in in slot 0x4
3,204,062 UART: [art] Derive Key Pair
3,204,422 UART: [art] Store priv key in slot 0x5
3,217,704 UART: [art] Derive Key Pair - Done
3,232,492 UART: [art] Signing Cert with AUTHO
3,232,972 UART: RITY.KEYID = 7
3,248,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,109 UART: [art] PUB.X = E36E09832C7FC80F2AD4DDC024055ABD9A3DAA5FA32E846B4EB03AA90438589F56F4F310FB76B7DC4F32B3BA86715DEA
3,255,887 UART: [art] PUB.Y = 4C9B846B03606DF7C51AE98DE64CA3F2E1B4A0F8D1F76E6205E4E80F3102406D1C9803A8223103557D68B5908107864C
3,262,812 UART: [art] SIG.R = 5A0EB4783663C1060D9E937E7603E7838EC60243A8F38966FC81A20BC1371F9F29DB304B216755550E703F89CEAEF331
3,269,557 UART: [art] SIG.S = 828E77E9E7C63F56D91C31747943F057E393F05262C7C1BEA151E1E3A7D02DC2461CDDF5F260B2F8ED5DB506125F420C
3,293,408 UART: Caliptra RT
3,293,661 UART: [state] CFI Enabled
3,402,564 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,446 UART: [rt]cmd =0x44504543, len=96
3,465,441 >>> mbox cmd response data (56 bytes)
3,465,442 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,185 UART: [rt]cmd =0x44504543, len=92
3,686,310 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.88s
Truncated 5006 bytes from beginning
F99449AE388BFF785A052655380E95B07A923
3,440,468 UART: [art] PUB.Y = CE0D478228B1BF4C7DF2D437BEF6EA53F9A1776235189C10755C0A44540AC742A07E446B3FBF90770BF113A73E79F96F
3,447,412 UART: [art] SIG.R = 2C4D01CD7EC62A2B9148DB5EAC5D42CB5AA1F6A2A5AD60FC654456EBFF07EEA922E74AE8F4D033FFC80E1219C7B90363
3,454,194 UART: [art] SIG.S = C7B503D58012A2A3D303F8B0B21AF6A76690AF07FB66FF2538F65D8EFAE1181776BE85B1AA764FDC7A3B17268E2E53DA
3,476,886 UART: Caliptra RT
3,477,231 UART: [state] CFI Enabled
3,597,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,130 UART: [rt]cmd =0x44504543, len=92
3,820,986 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,802 UART: [kat] SHA2-256
892,740 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,637 UART: [kat] LMS
1,475,833 UART: [kat] --
1,476,976 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 ready_for_fw is high
1,481,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,461 UART: [idev] Erasing UDS.KEYID = 0
1,506,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,129 UART: [idev] --
1,516,146 UART: [ldev] ++
1,516,314 UART: [ldev] CDI.KEYID = 6
1,516,677 UART: [ldev] SUBJECT.KEYID = 5
1,517,103 UART: [ldev] AUTHORITY.KEYID = 7
1,517,566 UART: [ldev] FE.KEYID = 1
1,522,866 UART: [ldev] Erasing FE.KEYID = 1
1,548,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,729 UART: [ldev] --
1,588,022 UART: [fwproc] Waiting for Commands...
1,588,865 UART: [fwproc] Received command 0x46574c44
1,589,656 UART: [fwproc] Received Image of size 114332 bytes
2,888,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,332 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,445 >>> mbox cmd response: success
3,080,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,081,499 UART: [afmc] ++
3,081,667 UART: [afmc] CDI.KEYID = 6
3,082,029 UART: [afmc] SUBJECT.KEYID = 7
3,082,454 UART: [afmc] AUTHORITY.KEYID = 5
3,117,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,296 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,986 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,021 UART: [afmc] --
3,161,007 UART: [cold-reset] --
3,161,703 UART: [state] Locking Datavault
3,162,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,382 UART: [state] Locking ICCM
3,163,986 UART: [exit] Launching FMC @ 0x40000130
3,169,315 UART:
3,169,331 UART: Running Caliptra FMC ...
3,169,739 UART:
3,169,882 UART: [state] CFI Enabled
3,180,425 UART: [fht] FMC Alias Private Key: 7
3,288,314 UART: [art] Extend RT PCRs Done
3,288,742 UART: [art] Lock RT PCRs Done
3,290,092 UART: [art] Populate DV Done
3,298,307 UART: [fht] FMC Alias Private Key: 7
3,299,463 UART: [art] Derive CDI
3,299,743 UART: [art] Store in in slot 0x4
3,385,298 UART: [art] Derive Key Pair
3,385,658 UART: [art] Store priv key in slot 0x5
3,398,606 UART: [art] Derive Key Pair - Done
3,413,272 UART: [art] Signing Cert with AUTHO
3,413,752 UART: RITY.KEYID = 7
3,429,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,781 UART: [art] PUB.X = A78138DFA19C07EABCBBB3B34EF6984F4617FAF9DB8B434D65FC8250282F99449AE388BFF785A052655380E95B07A923
3,436,553 UART: [art] PUB.Y = CE0D478228B1BF4C7DF2D437BEF6EA53F9A1776235189C10755C0A44540AC742A07E446B3FBF90770BF113A73E79F96F
3,443,497 UART: [art] SIG.R = 2C4D01CD7EC62A2B9148DB5EAC5D42CB5AA1F6A2A5AD60FC654456EBFF07EEA922E74AE8F4D033FFC80E1219C7B90363
3,450,279 UART: [art] SIG.S = C7B503D58012A2A3D303F8B0B21AF6A76690AF07FB66FF2538F65D8EFAE1181776BE85B1AA764FDC7A3B17268E2E53DA
3,474,313 UART: Caliptra RT
3,474,658 UART: [state] CFI Enabled
3,584,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,263 UART: [rt]cmd =0x4d454153, len=108
3,635,646 >>> mbox cmd response data (12 bytes)
3,635,647 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,802 UART: [rt]cmd =0x44504543, len=92
3,856,806 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,836 UART: [kat] SHA2-256
892,774 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,469 UART: [kat] LMS
1,475,665 UART: [kat] --
1,476,490 UART: [cold-reset] ++
1,476,894 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
1,481,034 ready_for_fw is high
1,481,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,385 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,073 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,886 UART: [ldev] Erasing FE.KEYID = 1
1,547,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,087 UART: [ldev] --
1,586,570 UART: [fwproc] Waiting for Commands...
1,587,373 UART: [fwproc] Received command 0x46574c44
1,588,164 UART: [fwproc] Received Image of size 114332 bytes
2,886,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,846 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,973 >>> mbox cmd response: success
3,078,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,080,205 UART: [afmc] ++
3,080,373 UART: [afmc] CDI.KEYID = 6
3,080,735 UART: [afmc] SUBJECT.KEYID = 7
3,081,160 UART: [afmc] AUTHORITY.KEYID = 5
3,116,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,063 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,676 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,366 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,225 UART: [afmc] --
3,160,109 UART: [cold-reset] --
3,161,197 UART: [state] Locking Datavault
3,162,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,146 UART: [state] Locking ICCM
3,163,752 UART: [exit] Launching FMC @ 0x40000130
3,169,081 UART:
3,169,097 UART: Running Caliptra FMC ...
3,169,505 UART:
3,169,648 UART: [state] CFI Enabled
3,180,219 UART: [fht] FMC Alias Private Key: 7
3,288,614 UART: [art] Extend RT PCRs Done
3,289,042 UART: [art] Lock RT PCRs Done
3,290,412 UART: [art] Populate DV Done
3,298,643 UART: [fht] FMC Alias Private Key: 7
3,299,681 UART: [art] Derive CDI
3,299,961 UART: [art] Store in in slot 0x4
3,385,656 UART: [art] Derive Key Pair
3,386,016 UART: [art] Store priv key in slot 0x5
3,399,696 UART: [art] Derive Key Pair - Done
3,414,516 UART: [art] Signing Cert with AUTHO
3,414,996 UART: RITY.KEYID = 7
3,430,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,081 UART: [art] PUB.X = A78138DFA19C07EABCBBB3B34EF6984F4617FAF9DB8B434D65FC8250282F99449AE388BFF785A052655380E95B07A923
3,437,853 UART: [art] PUB.Y = CE0D478228B1BF4C7DF2D437BEF6EA53F9A1776235189C10755C0A44540AC742A07E446B3FBF90770BF113A73E79F96F
3,444,797 UART: [art] SIG.R = 2C4D01CD7EC62A2B9148DB5EAC5D42CB5AA1F6A2A5AD60FC654456EBFF07EEA922E74AE8F4D033FFC80E1219C7B90363
3,451,579 UART: [art] SIG.S = C7B503D58012A2A3D303F8B0B21AF6A76690AF07FB66FF2538F65D8EFAE1181776BE85B1AA764FDC7A3B17268E2E53DA
3,475,045 UART: Caliptra RT
3,475,390 UART: [state] CFI Enabled
3,583,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,793 UART: [rt]cmd =0x44504543, len=96
3,646,720 >>> mbox cmd response data (56 bytes)
3,646,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,356 UART: [rt]cmd =0x44504543, len=92
3,868,980 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,644 >>> mbox cmd response data (12 bytes)
1,445,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,932,610 >>> mbox cmd response: success
2,932,610 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,994,994 UART:
2,995,010 UART: Running Caliptra FMC ...
2,995,418 UART:
2,995,561 UART: [state] CFI Enabled
3,006,310 UART: [fht] FMC Alias Private Key: 7
3,114,299 UART: [art] Extend RT PCRs Done
3,114,727 UART: [art] Lock RT PCRs Done
3,116,113 UART: [art] Populate DV Done
3,124,098 UART: [fht] FMC Alias Private Key: 7
3,125,094 UART: [art] Derive CDI
3,125,374 UART: [art] Store in in slot 0x4
3,211,225 UART: [art] Derive Key Pair
3,211,585 UART: [art] Store priv key in slot 0x5
3,225,077 UART: [art] Derive Key Pair - Done
3,239,645 UART: [art] Signing Cert with AUTHO
3,240,125 UART: RITY.KEYID = 7
3,255,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,314 UART: [art] PUB.X = F25CBBD3BD2B19490D646AF6D5C300C833A92D3FA8FAD9C42D9F6F624CC2D4E243511712FD3E8685333DC66A70F1E811
3,263,071 UART: [art] PUB.Y = 5F2AA7A807028F150D27841614DB40624DA765D547FC1EB7793FA9B24A597D890C4009025A6C7D3F70671B7244945A1D
3,269,997 UART: [art] SIG.R = F15992399AB08319FBFCCCD8DCBCED4686940ABCAD0E02099105463A9AF7A7707E1170E8F5BF6EB239D399482F626864
3,276,760 UART: [art] SIG.S = F0B12959DBB56A0118602BC8AF87A8C3574B62A6D08F55F84E89FDEEB82A928615583B397E84EF78CE98BB445FE12BEC
3,300,430 UART: Caliptra RT
3,300,775 UART: [state] CFI Enabled
3,421,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,367 UART: [rt]cmd =0x44504543, len=92
3,643,383 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,568 ready_for_fw is high
1,362,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,895 >>> mbox cmd response: success
2,926,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,987,593 UART:
2,987,609 UART: Running Caliptra FMC ...
2,988,017 UART:
2,988,160 UART: [state] CFI Enabled
2,998,775 UART: [fht] FMC Alias Private Key: 7
3,106,912 UART: [art] Extend RT PCRs Done
3,107,340 UART: [art] Lock RT PCRs Done
3,108,726 UART: [art] Populate DV Done
3,116,955 UART: [fht] FMC Alias Private Key: 7
3,118,083 UART: [art] Derive CDI
3,118,363 UART: [art] Store in in slot 0x4
3,204,058 UART: [art] Derive Key Pair
3,204,418 UART: [art] Store priv key in slot 0x5
3,217,828 UART: [art] Derive Key Pair - Done
3,232,602 UART: [art] Signing Cert with AUTHO
3,233,082 UART: RITY.KEYID = 7
3,248,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,949 UART: [art] PUB.X = F25CBBD3BD2B19490D646AF6D5C300C833A92D3FA8FAD9C42D9F6F624CC2D4E243511712FD3E8685333DC66A70F1E811
3,255,706 UART: [art] PUB.Y = 5F2AA7A807028F150D27841614DB40624DA765D547FC1EB7793FA9B24A597D890C4009025A6C7D3F70671B7244945A1D
3,262,632 UART: [art] SIG.R = F15992399AB08319FBFCCCD8DCBCED4686940ABCAD0E02099105463A9AF7A7707E1170E8F5BF6EB239D399482F626864
3,269,395 UART: [art] SIG.S = F0B12959DBB56A0118602BC8AF87A8C3574B62A6D08F55F84E89FDEEB82A928615583B397E84EF78CE98BB445FE12BEC
3,292,871 UART: Caliptra RT
3,293,216 UART: [state] CFI Enabled
3,401,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,384 UART: [rt]cmd =0x4d454153, len=108
3,453,251 >>> mbox cmd response data (12 bytes)
3,453,252 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,397 UART: [rt]cmd =0x44504543, len=92
3,675,297 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,252 ready_for_fw is high
1,363,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,519 >>> mbox cmd response: success
2,928,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,989,607 UART:
2,989,623 UART: Running Caliptra FMC ...
2,990,031 UART:
2,990,174 UART: [state] CFI Enabled
3,000,669 UART: [fht] FMC Alias Private Key: 7
3,108,478 UART: [art] Extend RT PCRs Done
3,108,906 UART: [art] Lock RT PCRs Done
3,110,582 UART: [art] Populate DV Done
3,118,455 UART: [fht] FMC Alias Private Key: 7
3,119,505 UART: [art] Derive CDI
3,119,785 UART: [art] Store in in slot 0x4
3,205,616 UART: [art] Derive Key Pair
3,205,976 UART: [art] Store priv key in slot 0x5
3,219,246 UART: [art] Derive Key Pair - Done
3,234,348 UART: [art] Signing Cert with AUTHO
3,234,828 UART: RITY.KEYID = 7
3,250,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,833 UART: [art] PUB.X = F25CBBD3BD2B19490D646AF6D5C300C833A92D3FA8FAD9C42D9F6F624CC2D4E243511712FD3E8685333DC66A70F1E811
3,257,590 UART: [art] PUB.Y = 5F2AA7A807028F150D27841614DB40624DA765D547FC1EB7793FA9B24A597D890C4009025A6C7D3F70671B7244945A1D
3,264,516 UART: [art] SIG.R = F15992399AB08319FBFCCCD8DCBCED4686940ABCAD0E02099105463A9AF7A7707E1170E8F5BF6EB239D399482F626864
3,271,279 UART: [art] SIG.S = F0B12959DBB56A0118602BC8AF87A8C3574B62A6D08F55F84E89FDEEB82A928615583B397E84EF78CE98BB445FE12BEC
3,295,007 UART: Caliptra RT
3,295,352 UART: [state] CFI Enabled
3,404,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,384 UART: [rt]cmd =0x44504543, len=96
3,468,675 >>> mbox cmd response data (56 bytes)
3,468,676 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,723 UART: [rt]cmd =0x44504543, len=92
3,689,309 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.82s
Truncated 4783 bytes from beginning
7
3,127,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,371 UART: [art] PUB.X = 751D3F5B06CD2614DF0DE020111FF0F62ADCBABA48AEB0A97EA29857F5EC6BCB0C06CB6FE81B05CEF8D5F587449D9518
3,135,150 UART: [art] PUB.Y = 91F09A4DC4CEE6D978B91ED94CE825B885D93FB706E6A396B157330B3B55ADBA65E918486C4BC12D664CB940F69471BA
3,142,104 UART: [art] SIG.R = 06C7481D19099EC18775D6054EBEBD3EB5CA6D9C641E6C96F792AEEDA3EAE47F55F0F665FBD6D29C558A290F95A8C8E7
3,148,880 UART: [art] SIG.S = 86E7A5B7B8017C005CF757E205116B889EAD636DB92BEC6CB8801D50157975FA77F738BDF093DC5A8E3FC3D3E5A7D254
3,172,823 UART: Caliptra RT
3,173,076 UART: [state] CFI Enabled
3,292,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,017 UART: [rt]cmd =0x44504543, len=92
3,515,415 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
902,115 UART: [kat] SHA2-256
904,055 UART: [kat] SHA2-384
906,848 UART: [kat] SHA2-512-ACC
908,749 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
923,074 UART: [kat] LMS
1,171,402 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 ready_for_fw is high
1,176,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,273 UART: [idev] Sha1 KeyId Algorithm
1,209,777 UART: [idev] --
1,210,987 UART: [ldev] ++
1,211,155 UART: [ldev] CDI.KEYID = 6
1,211,518 UART: [ldev] SUBJECT.KEYID = 5
1,211,944 UART: [ldev] AUTHORITY.KEYID = 7
1,212,407 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,369 UART: [ldev] --
1,282,642 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,176 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,771 >>> mbox cmd response: success
2,773,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,007 UART: [afmc] ++
2,775,175 UART: [afmc] CDI.KEYID = 6
2,775,537 UART: [afmc] SUBJECT.KEYID = 7
2,775,962 UART: [afmc] AUTHORITY.KEYID = 5
2,810,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,523 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,242 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,108 UART: [afmc] --
2,854,238 UART: [cold-reset] --
2,855,206 UART: [state] Locking Datavault
2,856,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,093 UART: [state] Locking ICCM
2,857,563 UART: [exit] Launching FMC @ 0x40000130
2,862,892 UART:
2,862,908 UART: Running Caliptra FMC ...
2,863,316 UART:
2,863,370 UART: [state] CFI Enabled
2,873,757 UART: [fht] FMC Alias Private Key: 7
2,981,682 UART: [art] Extend RT PCRs Done
2,982,110 UART: [art] Lock RT PCRs Done
2,983,512 UART: [art] Populate DV Done
2,991,685 UART: [fht] FMC Alias Private Key: 7
2,992,775 UART: [art] Derive CDI
2,993,055 UART: [art] Store in in slot 0x4
3,078,712 UART: [art] Derive Key Pair
3,079,072 UART: [art] Store priv key in slot 0x5
3,092,442 UART: [art] Derive Key Pair - Done
3,107,487 UART: [art] Signing Cert with AUTHO
3,107,967 UART: RITY.KEYID = 7
3,123,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,768 UART: [art] PUB.X = 751D3F5B06CD2614DF0DE020111FF0F62ADCBABA48AEB0A97EA29857F5EC6BCB0C06CB6FE81B05CEF8D5F587449D9518
3,130,547 UART: [art] PUB.Y = 91F09A4DC4CEE6D978B91ED94CE825B885D93FB706E6A396B157330B3B55ADBA65E918486C4BC12D664CB940F69471BA
3,137,501 UART: [art] SIG.R = 06C7481D19099EC18775D6054EBEBD3EB5CA6D9C641E6C96F792AEEDA3EAE47F55F0F665FBD6D29C558A290F95A8C8E7
3,144,277 UART: [art] SIG.S = 86E7A5B7B8017C005CF757E205116B889EAD636DB92BEC6CB8801D50157975FA77F738BDF093DC5A8E3FC3D3E5A7D254
3,168,008 UART: Caliptra RT
3,168,261 UART: [state] CFI Enabled
3,276,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,082 UART: [rt]cmd =0x4d454153, len=108
3,328,605 >>> mbox cmd response data (12 bytes)
3,328,606 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,305 UART: [rt]cmd =0x44504543, len=92
3,549,595 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
893,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,187 UART: [kat] ++
897,339 UART: [kat] sha1
901,489 UART: [kat] SHA2-256
903,429 UART: [kat] SHA2-384
906,110 UART: [kat] SHA2-512-ACC
908,011 UART: [kat] ECC-384
917,412 UART: [kat] HMAC-384Kdf
921,742 UART: [kat] LMS
1,170,070 UART: [kat] --
1,170,955 UART: [cold-reset] ++
1,171,315 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,296 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,175,065 ready_for_fw is high
1,175,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,200,007 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,984 UART: [ldev] SUBJECT.KEYID = 5
1,210,410 UART: [ldev] AUTHORITY.KEYID = 7
1,210,873 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,678 UART: [fwproc] Wait for Commands...
1,282,282 UART: [fwproc] Recv command 0x46574c44
1,283,010 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,345 >>> mbox cmd response: success
2,772,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,529 UART: [afmc] ++
2,773,697 UART: [afmc] CDI.KEYID = 6
2,774,059 UART: [afmc] SUBJECT.KEYID = 7
2,774,484 UART: [afmc] AUTHORITY.KEYID = 5
2,810,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,448 UART: [afmc] --
2,853,418 UART: [cold-reset] --
2,854,066 UART: [state] Locking Datavault
2,854,849 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,453 UART: [state] Locking ICCM
2,855,877 UART: [exit] Launching FMC @ 0x40000130
2,861,206 UART:
2,861,222 UART: Running Caliptra FMC ...
2,861,630 UART:
2,861,684 UART: [state] CFI Enabled
2,872,247 UART: [fht] FMC Alias Private Key: 7
2,980,616 UART: [art] Extend RT PCRs Done
2,981,044 UART: [art] Lock RT PCRs Done
2,982,554 UART: [art] Populate DV Done
2,990,781 UART: [fht] FMC Alias Private Key: 7
2,991,941 UART: [art] Derive CDI
2,992,221 UART: [art] Store in in slot 0x4
3,077,582 UART: [art] Derive Key Pair
3,077,942 UART: [art] Store priv key in slot 0x5
3,090,774 UART: [art] Derive Key Pair - Done
3,105,757 UART: [art] Signing Cert with AUTHO
3,106,237 UART: RITY.KEYID = 7
3,121,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,504 UART: [art] PUB.X = 751D3F5B06CD2614DF0DE020111FF0F62ADCBABA48AEB0A97EA29857F5EC6BCB0C06CB6FE81B05CEF8D5F587449D9518
3,129,283 UART: [art] PUB.Y = 91F09A4DC4CEE6D978B91ED94CE825B885D93FB706E6A396B157330B3B55ADBA65E918486C4BC12D664CB940F69471BA
3,136,237 UART: [art] SIG.R = 06C7481D19099EC18775D6054EBEBD3EB5CA6D9C641E6C96F792AEEDA3EAE47F55F0F665FBD6D29C558A290F95A8C8E7
3,143,013 UART: [art] SIG.S = 86E7A5B7B8017C005CF757E205116B889EAD636DB92BEC6CB8801D50157975FA77F738BDF093DC5A8E3FC3D3E5A7D254
3,166,760 UART: Caliptra RT
3,167,013 UART: [state] CFI Enabled
3,273,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,180 UART: [rt]cmd =0x44504543, len=96
3,339,113 >>> mbox cmd response data (56 bytes)
3,339,114 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,907 UART: [rt]cmd =0x44504543, len=92
3,560,163 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,551 >>> mbox cmd response data (12 bytes)
1,142,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,917 >>> mbox cmd response: success
2,628,917 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,171 UART:
2,691,187 UART: Running Caliptra FMC ...
2,691,595 UART:
2,691,649 UART: [state] CFI Enabled
2,702,534 UART: [fht] FMC Alias Private Key: 7
2,810,167 UART: [art] Extend RT PCRs Done
2,810,595 UART: [art] Lock RT PCRs Done
2,812,141 UART: [art] Populate DV Done
2,820,494 UART: [fht] FMC Alias Private Key: 7
2,821,542 UART: [art] Derive CDI
2,821,822 UART: [art] Store in in slot 0x4
2,907,501 UART: [art] Derive Key Pair
2,907,861 UART: [art] Store priv key in slot 0x5
2,920,969 UART: [art] Derive Key Pair - Done
2,935,537 UART: [art] Signing Cert with AUTHO
2,936,017 UART: RITY.KEYID = 7
2,951,241 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,006 UART: [art] PUB.X = 90A2D2334423D5389784375043F86DC8F655F789AC753E087E0C99033CD309672FE243048588E1041C276242460008E8
2,958,711 UART: [art] PUB.Y = A7D224B96A9E846614649EB9662E94672585DB6194AA3F3693589BACFCF179BE8738274E45A693A3DB5A14370436B416
2,965,652 UART: [art] SIG.R = 200DF22D9223A7296E8EF8B4ED398560F5F1F36F75CD44B2D8F837FCF96D5ECF110DD3648314F13AE3ADD7E6CF3711B0
2,972,430 UART: [art] SIG.S = 5C85D86B0CE20EACFEF341FCB67BCDDFA45E5D617192DD30D27E887AB3982248B0F1D392C0168E9EB61819B883573456
2,996,725 UART: Caliptra RT
2,996,978 UART: [state] CFI Enabled
3,117,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,215 UART: [rt]cmd =0x44504543, len=92
3,338,510 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,135 ready_for_fw is high
1,060,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,700 >>> mbox cmd response: success
2,625,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,687,634 UART:
2,687,650 UART: Running Caliptra FMC ...
2,688,058 UART:
2,688,112 UART: [state] CFI Enabled
2,698,935 UART: [fht] FMC Alias Private Key: 7
2,807,000 UART: [art] Extend RT PCRs Done
2,807,428 UART: [art] Lock RT PCRs Done
2,808,906 UART: [art] Populate DV Done
2,817,075 UART: [fht] FMC Alias Private Key: 7
2,818,255 UART: [art] Derive CDI
2,818,535 UART: [art] Store in in slot 0x4
2,904,176 UART: [art] Derive Key Pair
2,904,536 UART: [art] Store priv key in slot 0x5
2,917,954 UART: [art] Derive Key Pair - Done
2,932,986 UART: [art] Signing Cert with AUTHO
2,933,466 UART: RITY.KEYID = 7
2,948,652 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,417 UART: [art] PUB.X = 90A2D2334423D5389784375043F86DC8F655F789AC753E087E0C99033CD309672FE243048588E1041C276242460008E8
2,956,122 UART: [art] PUB.Y = A7D224B96A9E846614649EB9662E94672585DB6194AA3F3693589BACFCF179BE8738274E45A693A3DB5A14370436B416
2,963,063 UART: [art] SIG.R = 200DF22D9223A7296E8EF8B4ED398560F5F1F36F75CD44B2D8F837FCF96D5ECF110DD3648314F13AE3ADD7E6CF3711B0
2,969,841 UART: [art] SIG.S = 5C85D86B0CE20EACFEF341FCB67BCDDFA45E5D617192DD30D27E887AB3982248B0F1D392C0168E9EB61819B883573456
2,993,796 UART: Caliptra RT
2,994,049 UART: [state] CFI Enabled
3,101,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,226 UART: [rt]cmd =0x4d454153, len=108
3,153,769 >>> mbox cmd response data (12 bytes)
3,153,770 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,465 UART: [rt]cmd =0x44504543, len=92
3,375,014 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,791 ready_for_fw is high
1,058,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,352 >>> mbox cmd response: success
2,624,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,818 UART:
2,686,834 UART: Running Caliptra FMC ...
2,687,242 UART:
2,687,296 UART: [state] CFI Enabled
2,697,757 UART: [fht] FMC Alias Private Key: 7
2,805,848 UART: [art] Extend RT PCRs Done
2,806,276 UART: [art] Lock RT PCRs Done
2,807,758 UART: [art] Populate DV Done
2,816,235 UART: [fht] FMC Alias Private Key: 7
2,817,393 UART: [art] Derive CDI
2,817,673 UART: [art] Store in in slot 0x4
2,903,630 UART: [art] Derive Key Pair
2,903,990 UART: [art] Store priv key in slot 0x5
2,917,068 UART: [art] Derive Key Pair - Done
2,931,736 UART: [art] Signing Cert with AUTHO
2,932,216 UART: RITY.KEYID = 7
2,947,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,945 UART: [art] PUB.X = 90A2D2334423D5389784375043F86DC8F655F789AC753E087E0C99033CD309672FE243048588E1041C276242460008E8
2,954,650 UART: [art] PUB.Y = A7D224B96A9E846614649EB9662E94672585DB6194AA3F3693589BACFCF179BE8738274E45A693A3DB5A14370436B416
2,961,591 UART: [art] SIG.R = 200DF22D9223A7296E8EF8B4ED398560F5F1F36F75CD44B2D8F837FCF96D5ECF110DD3648314F13AE3ADD7E6CF3711B0
2,968,369 UART: [art] SIG.S = 5C85D86B0CE20EACFEF341FCB67BCDDFA45E5D617192DD30D27E887AB3982248B0F1D392C0168E9EB61819B883573456
2,991,824 UART: Caliptra RT
2,992,077 UART: [state] CFI Enabled
3,100,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,502 UART: [rt]cmd =0x44504543, len=96
3,164,235 >>> mbox cmd response data (56 bytes)
3,164,236 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,309 UART: [rt]cmd =0x44504543, len=92
3,385,940 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.79s
Truncated 4783 bytes from beginning
7
3,130,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,946 UART: [art] PUB.X = DF99784D1DDE0B47D2C4FDAFE6EC7359945C3E481E4B1A54797B86B8F299BCE07B3B806E39898E2396C4B4786BEC2FC9
3,137,727 UART: [art] PUB.Y = 73910B69A19E9F5F3AF2C041BE6731AE83F3ADD45DD5C080FBF31B444E4E093BF610F0FD2E72544A9957AE7726AAE4BD
3,144,687 UART: [art] SIG.R = 90256A415E8ECB19540E0852D82165825420DFBADB458E53FFEC2E31F11AB5017671DF5C6B8B8C9BF0AEAD34749A5701
3,151,453 UART: [art] SIG.S = 898F44C9A8A24F4E15016C531198A5AB5E3DEFECAB0914AD62061A3960A367C668352B25B35E2C516A25A65C45933F26
3,175,121 UART: Caliptra RT
3,175,466 UART: [state] CFI Enabled
3,294,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,004 UART: [rt]cmd =0x44504543, len=92
3,517,099 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,144 UART: [kat] SHA2-256
904,084 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,367 UART: [kat] LMS
1,171,695 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,173,074 UART: [fht] FHT @ 0x50003400
1,175,855 UART: [idev] ++
1,176,023 UART: [idev] CDI.KEYID = 6
1,176,383 UART: [idev] SUBJECT.KEYID = 7
1,176,807 UART: [idev] UDS.KEYID = 0
1,177,152 ready_for_fw is high
1,177,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,009 UART: [idev] Erasing UDS.KEYID = 0
1,202,190 UART: [idev] Sha1 KeyId Algorithm
1,210,788 UART: [idev] --
1,212,022 UART: [ldev] ++
1,212,190 UART: [ldev] CDI.KEYID = 6
1,212,553 UART: [ldev] SUBJECT.KEYID = 5
1,212,979 UART: [ldev] AUTHORITY.KEYID = 7
1,213,442 UART: [ldev] FE.KEYID = 1
1,218,756 UART: [ldev] Erasing FE.KEYID = 1
1,245,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,166 UART: [ldev] --
1,284,551 UART: [fwproc] Wait for Commands...
1,285,361 UART: [fwproc] Recv command 0x46574c44
1,286,089 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,648 >>> mbox cmd response: success
2,776,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,777,844 UART: [afmc] ++
2,778,012 UART: [afmc] CDI.KEYID = 6
2,778,374 UART: [afmc] SUBJECT.KEYID = 7
2,778,799 UART: [afmc] AUTHORITY.KEYID = 5
2,814,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,465 UART: [afmc] --
2,857,541 UART: [cold-reset] --
2,858,375 UART: [state] Locking Datavault
2,859,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,298 UART: [state] Locking ICCM
2,860,792 UART: [exit] Launching FMC @ 0x40000130
2,866,121 UART:
2,866,137 UART: Running Caliptra FMC ...
2,866,545 UART:
2,866,688 UART: [state] CFI Enabled
2,877,373 UART: [fht] FMC Alias Private Key: 7
2,985,348 UART: [art] Extend RT PCRs Done
2,985,776 UART: [art] Lock RT PCRs Done
2,987,058 UART: [art] Populate DV Done
2,995,447 UART: [fht] FMC Alias Private Key: 7
2,996,449 UART: [art] Derive CDI
2,996,729 UART: [art] Store in in slot 0x4
3,082,636 UART: [art] Derive Key Pair
3,082,996 UART: [art] Store priv key in slot 0x5
3,096,994 UART: [art] Derive Key Pair - Done
3,111,980 UART: [art] Signing Cert with AUTHO
3,112,460 UART: RITY.KEYID = 7
3,128,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,807 UART: [art] PUB.X = DF99784D1DDE0B47D2C4FDAFE6EC7359945C3E481E4B1A54797B86B8F299BCE07B3B806E39898E2396C4B4786BEC2FC9
3,135,588 UART: [art] PUB.Y = 73910B69A19E9F5F3AF2C041BE6731AE83F3ADD45DD5C080FBF31B444E4E093BF610F0FD2E72544A9957AE7726AAE4BD
3,142,548 UART: [art] SIG.R = 90256A415E8ECB19540E0852D82165825420DFBADB458E53FFEC2E31F11AB5017671DF5C6B8B8C9BF0AEAD34749A5701
3,149,314 UART: [art] SIG.S = 898F44C9A8A24F4E15016C531198A5AB5E3DEFECAB0914AD62061A3960A367C668352B25B35E2C516A25A65C45933F26
3,173,188 UART: Caliptra RT
3,173,533 UART: [state] CFI Enabled
3,281,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,805 UART: [rt]cmd =0x4d454153, len=108
3,333,548 >>> mbox cmd response data (12 bytes)
3,333,549 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,514 UART: [rt]cmd =0x44504543, len=92
3,554,317 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,853 UART: [state] LifecycleState = Unprovisioned
85,508 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,353 UART: [kat] SHA2-256
893,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,128 UART: [kat] ++
897,280 UART: [kat] sha1
901,494 UART: [kat] SHA2-256
903,434 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,769 UART: [kat] LMS
1,171,097 UART: [kat] --
1,172,052 UART: [cold-reset] ++
1,172,518 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 ready_for_fw is high
1,176,502 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,210,006 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,886 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,406 UART: [ldev] --
1,283,841 UART: [fwproc] Wait for Commands...
1,284,427 UART: [fwproc] Recv command 0x46574c44
1,285,155 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,664 >>> mbox cmd response: success
2,775,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,776,698 UART: [afmc] ++
2,776,866 UART: [afmc] CDI.KEYID = 6
2,777,228 UART: [afmc] SUBJECT.KEYID = 7
2,777,653 UART: [afmc] AUTHORITY.KEYID = 5
2,813,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,307 UART: [afmc] --
2,856,195 UART: [cold-reset] --
2,856,945 UART: [state] Locking Datavault
2,858,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,854 UART: [state] Locking ICCM
2,859,412 UART: [exit] Launching FMC @ 0x40000130
2,864,741 UART:
2,864,757 UART: Running Caliptra FMC ...
2,865,165 UART:
2,865,308 UART: [state] CFI Enabled
2,875,825 UART: [fht] FMC Alias Private Key: 7
2,984,218 UART: [art] Extend RT PCRs Done
2,984,646 UART: [art] Lock RT PCRs Done
2,986,058 UART: [art] Populate DV Done
2,994,505 UART: [fht] FMC Alias Private Key: 7
2,995,551 UART: [art] Derive CDI
2,995,831 UART: [art] Store in in slot 0x4
3,081,754 UART: [art] Derive Key Pair
3,082,114 UART: [art] Store priv key in slot 0x5
3,095,862 UART: [art] Derive Key Pair - Done
3,110,446 UART: [art] Signing Cert with AUTHO
3,110,926 UART: RITY.KEYID = 7
3,125,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,611 UART: [art] PUB.X = DF99784D1DDE0B47D2C4FDAFE6EC7359945C3E481E4B1A54797B86B8F299BCE07B3B806E39898E2396C4B4786BEC2FC9
3,133,392 UART: [art] PUB.Y = 73910B69A19E9F5F3AF2C041BE6731AE83F3ADD45DD5C080FBF31B444E4E093BF610F0FD2E72544A9957AE7726AAE4BD
3,140,352 UART: [art] SIG.R = 90256A415E8ECB19540E0852D82165825420DFBADB458E53FFEC2E31F11AB5017671DF5C6B8B8C9BF0AEAD34749A5701
3,147,118 UART: [art] SIG.S = 898F44C9A8A24F4E15016C531198A5AB5E3DEFECAB0914AD62061A3960A367C668352B25B35E2C516A25A65C45933F26
3,171,460 UART: Caliptra RT
3,171,805 UART: [state] CFI Enabled
3,278,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,139 UART: [rt]cmd =0x44504543, len=96
3,341,956 >>> mbox cmd response data (56 bytes)
3,341,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,764 UART: [rt]cmd =0x44504543, len=92
3,563,419 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,888 >>> mbox cmd response data (12 bytes)
1,143,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,631,198 >>> mbox cmd response: success
2,631,198 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,694,434 UART:
2,694,450 UART: Running Caliptra FMC ...
2,694,858 UART:
2,695,001 UART: [state] CFI Enabled
2,705,620 UART: [fht] FMC Alias Private Key: 7
2,813,417 UART: [art] Extend RT PCRs Done
2,813,845 UART: [art] Lock RT PCRs Done
2,815,627 UART: [art] Populate DV Done
2,823,948 UART: [fht] FMC Alias Private Key: 7
2,824,904 UART: [art] Derive CDI
2,825,184 UART: [art] Store in in slot 0x4
2,910,859 UART: [art] Derive Key Pair
2,911,219 UART: [art] Store priv key in slot 0x5
2,924,221 UART: [art] Derive Key Pair - Done
2,938,968 UART: [art] Signing Cert with AUTHO
2,939,448 UART: RITY.KEYID = 7
2,954,936 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,701 UART: [art] PUB.X = D63E015313DA529AE04A3B1EDFDD8B43D1D5E2FBD44415ACF7C9D47CC81BF460263CC6EA99A984F9C61E0F64BF832939
2,962,483 UART: [art] PUB.Y = 8E099C7EB1568EDB0CF182FA7F5A52529A1D353ECB2C468FE43AAE6E18F78F806B322E7749978231674CA2C3F6C09441
2,969,433 UART: [art] SIG.R = A233D3D0FF2348A3BE6B41BAF12DBD0F89D5B6CED9B3BA4DFD817F681FBE72852C47FFA13DEBF0976264EA1783493116
2,976,220 UART: [art] SIG.S = 6CF8467D80FE9F52D194C57AA8C0664DD408264CA32E123296A0FF0FF50E1227F49FB58A879C13EDB1E08CBD629C499E
3,000,222 UART: Caliptra RT
3,000,567 UART: [state] CFI Enabled
3,121,842 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,152,994 UART: [rt]cmd =0x44504543, len=92
3,344,819 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 ready_for_fw is high
1,060,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,785 >>> mbox cmd response: success
2,626,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,688,729 UART:
2,688,745 UART: Running Caliptra FMC ...
2,689,153 UART:
2,689,296 UART: [state] CFI Enabled
2,699,481 UART: [fht] FMC Alias Private Key: 7
2,807,818 UART: [art] Extend RT PCRs Done
2,808,246 UART: [art] Lock RT PCRs Done
2,809,570 UART: [art] Populate DV Done
2,817,811 UART: [fht] FMC Alias Private Key: 7
2,818,773 UART: [art] Derive CDI
2,819,053 UART: [art] Store in in slot 0x4
2,904,624 UART: [art] Derive Key Pair
2,904,984 UART: [art] Store priv key in slot 0x5
2,918,212 UART: [art] Derive Key Pair - Done
2,933,107 UART: [art] Signing Cert with AUTHO
2,933,587 UART: RITY.KEYID = 7
2,948,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,118 UART: [art] PUB.X = D63E015313DA529AE04A3B1EDFDD8B43D1D5E2FBD44415ACF7C9D47CC81BF460263CC6EA99A984F9C61E0F64BF832939
2,955,900 UART: [art] PUB.Y = 8E099C7EB1568EDB0CF182FA7F5A52529A1D353ECB2C468FE43AAE6E18F78F806B322E7749978231674CA2C3F6C09441
2,962,850 UART: [art] SIG.R = A233D3D0FF2348A3BE6B41BAF12DBD0F89D5B6CED9B3BA4DFD817F681FBE72852C47FFA13DEBF0976264EA1783493116
2,969,637 UART: [art] SIG.S = 6CF8467D80FE9F52D194C57AA8C0664DD408264CA32E123296A0FF0FF50E1227F49FB58A879C13EDB1E08CBD629C499E
2,993,475 UART: Caliptra RT
2,993,820 UART: [state] CFI Enabled
3,102,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,603 UART: [rt]cmd =0x4d454153, len=108
3,153,742 >>> mbox cmd response data (12 bytes)
3,153,743 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,830 UART: [rt]cmd =0x44504543, len=92
3,376,205 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,822 ready_for_fw is high
1,060,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,567 >>> mbox cmd response: success
2,626,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,689,527 UART:
2,689,543 UART: Running Caliptra FMC ...
2,689,951 UART:
2,690,094 UART: [state] CFI Enabled
2,700,477 UART: [fht] FMC Alias Private Key: 7
2,808,378 UART: [art] Extend RT PCRs Done
2,808,806 UART: [art] Lock RT PCRs Done
2,810,338 UART: [art] Populate DV Done
2,818,519 UART: [fht] FMC Alias Private Key: 7
2,819,455 UART: [art] Derive CDI
2,819,735 UART: [art] Store in in slot 0x4
2,905,556 UART: [art] Derive Key Pair
2,905,916 UART: [art] Store priv key in slot 0x5
2,919,234 UART: [art] Derive Key Pair - Done
2,933,979 UART: [art] Signing Cert with AUTHO
2,934,459 UART: RITY.KEYID = 7
2,949,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,906 UART: [art] PUB.X = D63E015313DA529AE04A3B1EDFDD8B43D1D5E2FBD44415ACF7C9D47CC81BF460263CC6EA99A984F9C61E0F64BF832939
2,956,688 UART: [art] PUB.Y = 8E099C7EB1568EDB0CF182FA7F5A52529A1D353ECB2C468FE43AAE6E18F78F806B322E7749978231674CA2C3F6C09441
2,963,638 UART: [art] SIG.R = A233D3D0FF2348A3BE6B41BAF12DBD0F89D5B6CED9B3BA4DFD817F681FBE72852C47FFA13DEBF0976264EA1783493116
2,970,425 UART: [art] SIG.S = 6CF8467D80FE9F52D194C57AA8C0664DD408264CA32E123296A0FF0FF50E1227F49FB58A879C13EDB1E08CBD629C499E
2,994,555 UART: Caliptra RT
2,994,900 UART: [state] CFI Enabled
3,102,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,251 UART: [rt]cmd =0x44504543, len=96
3,166,370 >>> mbox cmd response data (56 bytes)
3,166,371 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,456 UART: [rt]cmd =0x44504543, len=92
3,387,823 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.80s
Truncated 4783 bytes from beginning
7
3,126,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,768 UART: [art] PUB.X = 107A6448F3B4ECEF88F98D5763E04A59C805F823C7071639026BC03D5851052AE3DE2354E0A93DDCE8C87EA015222163
3,133,524 UART: [art] PUB.Y = C908FA3EA49DD3DB6B1A745A3AE61BE2236D2D759F792939384BD374F13A59F51A6AB99B74F3FD22164374A530B212F4
3,140,477 UART: [art] SIG.R = BBCE4D2CBA96C6AE7CEF2A01260CB98FF37827B03F3B2978C71F1F0EA0D6A0DFF991A83F72F77CD9D22C58249A3B2B73
3,147,260 UART: [art] SIG.S = 68C1D9EC480EAA4BCF8FD98B5D121F92F0D1DBEC3DC014A4C65B08A328244BAB2AB3BB5AB71F4AFAF8E8DA35BEBA8D5B
3,171,113 UART: Caliptra RT
3,171,366 UART: [state] CFI Enabled
3,291,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,479 UART: [rt]cmd =0x44504543, len=92
3,513,189 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
903,960 UART: [kat] SHA2-512-ACC
905,861 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,043 UART: [cold-reset] ++
1,169,421 UART: [fht] FHT @ 0x50003400
1,172,149 UART: [idev] ++
1,172,317 UART: [idev] CDI.KEYID = 6
1,172,678 UART: [idev] SUBJECT.KEYID = 7
1,173,103 UART: [idev] UDS.KEYID = 0
1,173,449 ready_for_fw is high
1,173,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,211 UART: [idev] Sha1 KeyId Algorithm
1,206,881 UART: [idev] --
1,207,812 UART: [ldev] ++
1,207,980 UART: [ldev] CDI.KEYID = 6
1,208,344 UART: [ldev] SUBJECT.KEYID = 5
1,208,771 UART: [ldev] AUTHORITY.KEYID = 7
1,209,234 UART: [ldev] FE.KEYID = 1
1,214,294 UART: [ldev] Erasing FE.KEYID = 1
1,240,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,434 UART: [ldev] --
1,279,786 UART: [fwproc] Wait for Commands...
1,280,433 UART: [fwproc] Recv command 0x46574c44
1,281,166 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,565 >>> mbox cmd response: success
2,771,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,656 UART: [afmc] ++
2,772,824 UART: [afmc] CDI.KEYID = 6
2,773,187 UART: [afmc] SUBJECT.KEYID = 7
2,773,613 UART: [afmc] AUTHORITY.KEYID = 5
2,808,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,213 UART: [afmc] --
2,852,175 UART: [cold-reset] --
2,853,079 UART: [state] Locking Datavault
2,854,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,924 UART: [state] Locking ICCM
2,855,410 UART: [exit] Launching FMC @ 0x40000130
2,860,739 UART:
2,860,755 UART: Running Caliptra FMC ...
2,861,163 UART:
2,861,217 UART: [state] CFI Enabled
2,871,608 UART: [fht] FMC Alias Private Key: 7
2,978,929 UART: [art] Extend RT PCRs Done
2,979,357 UART: [art] Lock RT PCRs Done
2,980,829 UART: [art] Populate DV Done
2,988,866 UART: [fht] FMC Alias Private Key: 7
2,990,040 UART: [art] Derive CDI
2,990,320 UART: [art] Store in in slot 0x4
3,076,189 UART: [art] Derive Key Pair
3,076,549 UART: [art] Store priv key in slot 0x5
3,089,359 UART: [art] Derive Key Pair - Done
3,104,132 UART: [art] Signing Cert with AUTHO
3,104,612 UART: RITY.KEYID = 7
3,119,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,541 UART: [art] PUB.X = 107A6448F3B4ECEF88F98D5763E04A59C805F823C7071639026BC03D5851052AE3DE2354E0A93DDCE8C87EA015222163
3,127,297 UART: [art] PUB.Y = C908FA3EA49DD3DB6B1A745A3AE61BE2236D2D759F792939384BD374F13A59F51A6AB99B74F3FD22164374A530B212F4
3,134,250 UART: [art] SIG.R = BBCE4D2CBA96C6AE7CEF2A01260CB98FF37827B03F3B2978C71F1F0EA0D6A0DFF991A83F72F77CD9D22C58249A3B2B73
3,141,033 UART: [art] SIG.S = 68C1D9EC480EAA4BCF8FD98B5D121F92F0D1DBEC3DC014A4C65B08A328244BAB2AB3BB5AB71F4AFAF8E8DA35BEBA8D5B
3,164,982 UART: Caliptra RT
3,165,235 UART: [state] CFI Enabled
3,272,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,924 UART: [rt]cmd =0x4d454153, len=108
3,325,025 >>> mbox cmd response data (12 bytes)
3,325,026 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,807 UART: [rt]cmd =0x44504543, len=92
3,546,639 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 ready_for_fw is high
1,174,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,206 UART: [ldev] Erasing FE.KEYID = 1
1,240,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,452 UART: [ldev] --
1,279,966 UART: [fwproc] Wait for Commands...
1,280,783 UART: [fwproc] Recv command 0x46574c44
1,281,516 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,665 >>> mbox cmd response: success
2,772,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,884 UART: [afmc] ++
2,774,052 UART: [afmc] CDI.KEYID = 6
2,774,415 UART: [afmc] SUBJECT.KEYID = 7
2,774,841 UART: [afmc] AUTHORITY.KEYID = 5
2,811,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,439 UART: [afmc] --
2,854,343 UART: [cold-reset] --
2,855,195 UART: [state] Locking Datavault
2,856,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,842 UART: [state] Locking ICCM
2,857,300 UART: [exit] Launching FMC @ 0x40000130
2,862,629 UART:
2,862,645 UART: Running Caliptra FMC ...
2,863,053 UART:
2,863,107 UART: [state] CFI Enabled
2,873,326 UART: [fht] FMC Alias Private Key: 7
2,981,007 UART: [art] Extend RT PCRs Done
2,981,435 UART: [art] Lock RT PCRs Done
2,983,019 UART: [art] Populate DV Done
2,991,358 UART: [fht] FMC Alias Private Key: 7
2,992,316 UART: [art] Derive CDI
2,992,596 UART: [art] Store in in slot 0x4
3,078,151 UART: [art] Derive Key Pair
3,078,511 UART: [art] Store priv key in slot 0x5
3,091,855 UART: [art] Derive Key Pair - Done
3,106,426 UART: [art] Signing Cert with AUTHO
3,106,906 UART: RITY.KEYID = 7
3,122,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,253 UART: [art] PUB.X = 107A6448F3B4ECEF88F98D5763E04A59C805F823C7071639026BC03D5851052AE3DE2354E0A93DDCE8C87EA015222163
3,130,009 UART: [art] PUB.Y = C908FA3EA49DD3DB6B1A745A3AE61BE2236D2D759F792939384BD374F13A59F51A6AB99B74F3FD22164374A530B212F4
3,136,962 UART: [art] SIG.R = BBCE4D2CBA96C6AE7CEF2A01260CB98FF37827B03F3B2978C71F1F0EA0D6A0DFF991A83F72F77CD9D22C58249A3B2B73
3,143,745 UART: [art] SIG.S = 68C1D9EC480EAA4BCF8FD98B5D121F92F0D1DBEC3DC014A4C65B08A328244BAB2AB3BB5AB71F4AFAF8E8DA35BEBA8D5B
3,167,180 UART: Caliptra RT
3,167,433 UART: [state] CFI Enabled
3,275,408 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,374 UART: [rt]cmd =0x44504543, len=96
3,339,549 >>> mbox cmd response data (56 bytes)
3,339,550 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,447 UART: [rt]cmd =0x44504543, len=92
3,561,101 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,044 >>> mbox cmd response data (12 bytes)
1,140,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,443 >>> mbox cmd response: success
2,626,443 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,688,901 UART:
2,688,917 UART: Running Caliptra FMC ...
2,689,325 UART:
2,689,379 UART: [state] CFI Enabled
2,700,102 UART: [fht] FMC Alias Private Key: 7
2,808,207 UART: [art] Extend RT PCRs Done
2,808,635 UART: [art] Lock RT PCRs Done
2,810,309 UART: [art] Populate DV Done
2,818,546 UART: [fht] FMC Alias Private Key: 7
2,819,708 UART: [art] Derive CDI
2,819,988 UART: [art] Store in in slot 0x4
2,905,613 UART: [art] Derive Key Pair
2,905,973 UART: [art] Store priv key in slot 0x5
2,919,593 UART: [art] Derive Key Pair - Done
2,934,126 UART: [art] Signing Cert with AUTHO
2,934,606 UART: RITY.KEYID = 7
2,949,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,533 UART: [art] PUB.X = CFCE5C84499C07273FDCABD0007289972D478875AAAC09D15790BCE765C8B7BCCBB9317EFB0196FA866226721C0FB37B
2,957,281 UART: [art] PUB.Y = 3FAB8BDF6942AFB1942749DD6AA9A9F41F6C993A3CE8CFCB94A857CEC4F9F8543148EA47300B21567DAE19680C3A3435
2,964,239 UART: [art] SIG.R = E16E418D8EC16AABF7B58965A34F8EE12C4FA0AAE08F92EEAAE59622AAF6E4A608E111E093634C7D193F813C5E72D0E4
2,971,024 UART: [art] SIG.S = 349610DF1500FE1FD3ECE62B43C7C05CF82D42D302119683F26B845C43F5F8CD8D90317ECF6A87D02972F94C23E75570
2,994,106 UART: Caliptra RT
2,994,359 UART: [state] CFI Enabled
3,113,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,944 UART: [rt]cmd =0x44504543, len=92
3,336,009 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,022 ready_for_fw is high
1,057,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,529 >>> mbox cmd response: success
2,621,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,683,265 UART:
2,683,281 UART: Running Caliptra FMC ...
2,683,689 UART:
2,683,743 UART: [state] CFI Enabled
2,694,436 UART: [fht] FMC Alias Private Key: 7
2,802,247 UART: [art] Extend RT PCRs Done
2,802,675 UART: [art] Lock RT PCRs Done
2,804,361 UART: [art] Populate DV Done
2,812,660 UART: [fht] FMC Alias Private Key: 7
2,813,790 UART: [art] Derive CDI
2,814,070 UART: [art] Store in in slot 0x4
2,899,917 UART: [art] Derive Key Pair
2,900,277 UART: [art] Store priv key in slot 0x5
2,913,125 UART: [art] Derive Key Pair - Done
2,927,600 UART: [art] Signing Cert with AUTHO
2,928,080 UART: RITY.KEYID = 7
2,943,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,765 UART: [art] PUB.X = CFCE5C84499C07273FDCABD0007289972D478875AAAC09D15790BCE765C8B7BCCBB9317EFB0196FA866226721C0FB37B
2,950,513 UART: [art] PUB.Y = 3FAB8BDF6942AFB1942749DD6AA9A9F41F6C993A3CE8CFCB94A857CEC4F9F8543148EA47300B21567DAE19680C3A3435
2,957,471 UART: [art] SIG.R = E16E418D8EC16AABF7B58965A34F8EE12C4FA0AAE08F92EEAAE59622AAF6E4A608E111E093634C7D193F813C5E72D0E4
2,964,256 UART: [art] SIG.S = 349610DF1500FE1FD3ECE62B43C7C05CF82D42D302119683F26B845C43F5F8CD8D90317ECF6A87D02972F94C23E75570
2,988,156 UART: Caliptra RT
2,988,409 UART: [state] CFI Enabled
3,096,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,482 UART: [rt]cmd =0x4d454153, len=108
3,148,651 >>> mbox cmd response data (12 bytes)
3,148,652 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,643 UART: [rt]cmd =0x44504543, len=92
3,370,560 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 ready_for_fw is high
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,257 >>> mbox cmd response: success
2,624,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,261 UART:
2,686,277 UART: Running Caliptra FMC ...
2,686,685 UART:
2,686,739 UART: [state] CFI Enabled
2,696,942 UART: [fht] FMC Alias Private Key: 7
2,804,475 UART: [art] Extend RT PCRs Done
2,804,903 UART: [art] Lock RT PCRs Done
2,806,551 UART: [art] Populate DV Done
2,814,740 UART: [fht] FMC Alias Private Key: 7
2,815,688 UART: [art] Derive CDI
2,815,968 UART: [art] Store in in slot 0x4
2,901,337 UART: [art] Derive Key Pair
2,901,697 UART: [art] Store priv key in slot 0x5
2,914,921 UART: [art] Derive Key Pair - Done
2,929,092 UART: [art] Signing Cert with AUTHO
2,929,572 UART: RITY.KEYID = 7
2,944,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,435 UART: [art] PUB.X = CFCE5C84499C07273FDCABD0007289972D478875AAAC09D15790BCE765C8B7BCCBB9317EFB0196FA866226721C0FB37B
2,952,183 UART: [art] PUB.Y = 3FAB8BDF6942AFB1942749DD6AA9A9F41F6C993A3CE8CFCB94A857CEC4F9F8543148EA47300B21567DAE19680C3A3435
2,959,141 UART: [art] SIG.R = E16E418D8EC16AABF7B58965A34F8EE12C4FA0AAE08F92EEAAE59622AAF6E4A608E111E093634C7D193F813C5E72D0E4
2,965,926 UART: [art] SIG.S = 349610DF1500FE1FD3ECE62B43C7C05CF82D42D302119683F26B845C43F5F8CD8D90317ECF6A87D02972F94C23E75570
2,989,356 UART: Caliptra RT
2,989,609 UART: [state] CFI Enabled
3,098,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,440 UART: [rt]cmd =0x44504543, len=96
3,162,155 >>> mbox cmd response data (56 bytes)
3,162,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,023 UART: [rt]cmd =0x44504543, len=92
3,383,674 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.82s
Truncated 4783 bytes from beginning
7
3,128,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,820 UART: [art] PUB.X = A98B2AAA7282D90BBCB4E5C1DD92022A693ED94136D7A1D479AAE93B7ED33F5FB3CB525DFB21FDB0E2954A629D349B29
3,135,604 UART: [art] PUB.Y = 5446F34D98F47AAA0EB9965E557D1BCB3DDEE20AB3FEFE6D3B4AB2FF595FF89AFDA554248F97678F9A80AE501A330695
3,142,565 UART: [art] SIG.R = F35FCC36626368A8771A178B4F599FC4937508486303529E4786A12985AA6AC8B45082D3160F5C0F86989146381514AB
3,149,307 UART: [art] SIG.S = 7829CFE82E1814E82BEB2807E2A52EEBAC29E4B542163CD36529AD70F12A25E16F6568212B9C7CC1F74D72B4B3EAD6C2
3,173,321 UART: Caliptra RT
3,173,666 UART: [state] CFI Enabled
3,293,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,343 UART: [rt]cmd =0x44504543, len=92
3,515,020 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 ready_for_fw is high
1,174,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,407 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,842 >>> mbox cmd response: success
2,772,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,773,905 UART: [afmc] ++
2,774,073 UART: [afmc] CDI.KEYID = 6
2,774,436 UART: [afmc] SUBJECT.KEYID = 7
2,774,862 UART: [afmc] AUTHORITY.KEYID = 5
2,811,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,140 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,842 UART: [afmc] --
2,854,806 UART: [cold-reset] --
2,855,742 UART: [state] Locking Datavault
2,856,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,591 UART: [state] Locking ICCM
2,858,137 UART: [exit] Launching FMC @ 0x40000130
2,863,466 UART:
2,863,482 UART: Running Caliptra FMC ...
2,863,890 UART:
2,864,033 UART: [state] CFI Enabled
2,874,258 UART: [fht] FMC Alias Private Key: 7
2,981,697 UART: [art] Extend RT PCRs Done
2,982,125 UART: [art] Lock RT PCRs Done
2,983,777 UART: [art] Populate DV Done
2,992,070 UART: [fht] FMC Alias Private Key: 7
2,993,002 UART: [art] Derive CDI
2,993,282 UART: [art] Store in in slot 0x4
3,079,283 UART: [art] Derive Key Pair
3,079,643 UART: [art] Store priv key in slot 0x5
3,092,897 UART: [art] Derive Key Pair - Done
3,107,404 UART: [art] Signing Cert with AUTHO
3,107,884 UART: RITY.KEYID = 7
3,123,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,001 UART: [art] PUB.X = A98B2AAA7282D90BBCB4E5C1DD92022A693ED94136D7A1D479AAE93B7ED33F5FB3CB525DFB21FDB0E2954A629D349B29
3,130,785 UART: [art] PUB.Y = 5446F34D98F47AAA0EB9965E557D1BCB3DDEE20AB3FEFE6D3B4AB2FF595FF89AFDA554248F97678F9A80AE501A330695
3,137,746 UART: [art] SIG.R = F35FCC36626368A8771A178B4F599FC4937508486303529E4786A12985AA6AC8B45082D3160F5C0F86989146381514AB
3,144,488 UART: [art] SIG.S = 7829CFE82E1814E82BEB2807E2A52EEBAC29E4B542163CD36529AD70F12A25E16F6568212B9C7CC1F74D72B4B3EAD6C2
3,168,684 UART: Caliptra RT
3,169,029 UART: [state] CFI Enabled
3,276,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,040 UART: [rt]cmd =0x4d454153, len=108
3,328,815 >>> mbox cmd response data (12 bytes)
3,328,816 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,899 UART: [rt]cmd =0x44504543, len=92
3,549,036 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
891,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,087 UART: [kat] SHA2-512-ACC
905,988 UART: [kat] ECC-384
915,697 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,680 UART: [idev] ++
1,172,848 UART: [idev] CDI.KEYID = 6
1,173,209 UART: [idev] SUBJECT.KEYID = 7
1,173,634 UART: [idev] UDS.KEYID = 0
1,173,980 ready_for_fw is high
1,173,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,670 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,454 UART: [idev] --
1,208,325 UART: [ldev] ++
1,208,493 UART: [ldev] CDI.KEYID = 6
1,208,857 UART: [ldev] SUBJECT.KEYID = 5
1,209,284 UART: [ldev] AUTHORITY.KEYID = 7
1,209,747 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,241,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,543 UART: [ldev] --
1,280,961 UART: [fwproc] Wait for Commands...
1,281,706 UART: [fwproc] Recv command 0x46574c44
1,282,439 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,974 >>> mbox cmd response: success
2,771,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,127 UART: [afmc] ++
2,773,295 UART: [afmc] CDI.KEYID = 6
2,773,658 UART: [afmc] SUBJECT.KEYID = 7
2,774,084 UART: [afmc] AUTHORITY.KEYID = 5
2,809,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,430 UART: [afmc] --
2,853,526 UART: [cold-reset] --
2,854,212 UART: [state] Locking Datavault
2,855,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,125 UART: [state] Locking ICCM
2,856,697 UART: [exit] Launching FMC @ 0x40000130
2,862,026 UART:
2,862,042 UART: Running Caliptra FMC ...
2,862,450 UART:
2,862,593 UART: [state] CFI Enabled
2,872,954 UART: [fht] FMC Alias Private Key: 7
2,981,289 UART: [art] Extend RT PCRs Done
2,981,717 UART: [art] Lock RT PCRs Done
2,983,597 UART: [art] Populate DV Done
2,991,772 UART: [fht] FMC Alias Private Key: 7
2,992,744 UART: [art] Derive CDI
2,993,024 UART: [art] Store in in slot 0x4
3,078,573 UART: [art] Derive Key Pair
3,078,933 UART: [art] Store priv key in slot 0x5
3,092,547 UART: [art] Derive Key Pair - Done
3,107,310 UART: [art] Signing Cert with AUTHO
3,107,790 UART: RITY.KEYID = 7
3,123,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,999 UART: [art] PUB.X = A98B2AAA7282D90BBCB4E5C1DD92022A693ED94136D7A1D479AAE93B7ED33F5FB3CB525DFB21FDB0E2954A629D349B29
3,130,783 UART: [art] PUB.Y = 5446F34D98F47AAA0EB9965E557D1BCB3DDEE20AB3FEFE6D3B4AB2FF595FF89AFDA554248F97678F9A80AE501A330695
3,137,744 UART: [art] SIG.R = F35FCC36626368A8771A178B4F599FC4937508486303529E4786A12985AA6AC8B45082D3160F5C0F86989146381514AB
3,144,486 UART: [art] SIG.S = 7829CFE82E1814E82BEB2807E2A52EEBAC29E4B542163CD36529AD70F12A25E16F6568212B9C7CC1F74D72B4B3EAD6C2
3,168,696 UART: Caliptra RT
3,169,041 UART: [state] CFI Enabled
3,276,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,514 UART: [rt]cmd =0x44504543, len=96
3,340,775 >>> mbox cmd response data (56 bytes)
3,340,776 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,733 UART: [rt]cmd =0x44504543, len=92
3,562,058 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,435 >>> mbox cmd response data (12 bytes)
1,140,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,634 >>> mbox cmd response: success
2,627,634 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,598 UART:
2,689,614 UART: Running Caliptra FMC ...
2,690,022 UART:
2,690,165 UART: [state] CFI Enabled
2,700,966 UART: [fht] FMC Alias Private Key: 7
2,808,851 UART: [art] Extend RT PCRs Done
2,809,279 UART: [art] Lock RT PCRs Done
2,810,859 UART: [art] Populate DV Done
2,818,968 UART: [fht] FMC Alias Private Key: 7
2,819,988 UART: [art] Derive CDI
2,820,268 UART: [art] Store in in slot 0x4
2,906,369 UART: [art] Derive Key Pair
2,906,729 UART: [art] Store priv key in slot 0x5
2,920,295 UART: [art] Derive Key Pair - Done
2,935,132 UART: [art] Signing Cert with AUTHO
2,935,612 UART: RITY.KEYID = 7
2,950,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,443 UART: [art] PUB.X = 3BF407FACB4BD59ED9367C8A6720085F4132D3487C2B189C15ADBA3E4D9E20AF268DDF764B273486C76454B5750F8410
2,958,208 UART: [art] PUB.Y = 99993B3781CE16D1F70F324A4E07652FFDBF88514981A8B361D1693BD14A6CA2614AFD9DBFD3224D03E6D30FC77C89AA
2,965,156 UART: [art] SIG.R = 208F0142D8AFC9FBBE07EC29F70FB667057F4F08D9A3ACDAC1BE1FCE9D6C35288551BC18DA0CDE7BA094C1870EFF8887
2,971,929 UART: [art] SIG.S = 11809836AFB7109B4819DB272587279102CED849CB87A250EC79F7D814BDEDF0DAC1B86256313C8DE7D23620FF5FECA9
2,995,369 UART: Caliptra RT
2,995,714 UART: [state] CFI Enabled
3,116,481 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,359 UART: [rt]cmd =0x44504543, len=92
3,339,135 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,377 ready_for_fw is high
1,056,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,068 >>> mbox cmd response: success
2,621,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,682,668 UART:
2,682,684 UART: Running Caliptra FMC ...
2,683,092 UART:
2,683,235 UART: [state] CFI Enabled
2,693,736 UART: [fht] FMC Alias Private Key: 7
2,802,269 UART: [art] Extend RT PCRs Done
2,802,697 UART: [art] Lock RT PCRs Done
2,804,567 UART: [art] Populate DV Done
2,812,672 UART: [fht] FMC Alias Private Key: 7
2,813,752 UART: [art] Derive CDI
2,814,032 UART: [art] Store in in slot 0x4
2,899,703 UART: [art] Derive Key Pair
2,900,063 UART: [art] Store priv key in slot 0x5
2,913,209 UART: [art] Derive Key Pair - Done
2,927,792 UART: [art] Signing Cert with AUTHO
2,928,272 UART: RITY.KEYID = 7
2,943,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,207 UART: [art] PUB.X = 3BF407FACB4BD59ED9367C8A6720085F4132D3487C2B189C15ADBA3E4D9E20AF268DDF764B273486C76454B5750F8410
2,950,972 UART: [art] PUB.Y = 99993B3781CE16D1F70F324A4E07652FFDBF88514981A8B361D1693BD14A6CA2614AFD9DBFD3224D03E6D30FC77C89AA
2,957,920 UART: [art] SIG.R = 208F0142D8AFC9FBBE07EC29F70FB667057F4F08D9A3ACDAC1BE1FCE9D6C35288551BC18DA0CDE7BA094C1870EFF8887
2,964,693 UART: [art] SIG.S = 11809836AFB7109B4819DB272587279102CED849CB87A250EC79F7D814BDEDF0DAC1B86256313C8DE7D23620FF5FECA9
2,988,331 UART: Caliptra RT
2,988,676 UART: [state] CFI Enabled
3,096,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,539 UART: [rt]cmd =0x4d454153, len=108
3,148,566 >>> mbox cmd response data (12 bytes)
3,148,567 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,458 UART: [rt]cmd =0x44504543, len=92
3,369,614 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,875 ready_for_fw is high
1,056,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,382 >>> mbox cmd response: success
2,621,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,683,404 UART:
2,683,420 UART: Running Caliptra FMC ...
2,683,828 UART:
2,683,971 UART: [state] CFI Enabled
2,694,498 UART: [fht] FMC Alias Private Key: 7
2,802,053 UART: [art] Extend RT PCRs Done
2,802,481 UART: [art] Lock RT PCRs Done
2,804,283 UART: [art] Populate DV Done
2,812,394 UART: [fht] FMC Alias Private Key: 7
2,813,480 UART: [art] Derive CDI
2,813,760 UART: [art] Store in in slot 0x4
2,899,653 UART: [art] Derive Key Pair
2,900,013 UART: [art] Store priv key in slot 0x5
2,913,485 UART: [art] Derive Key Pair - Done
2,928,566 UART: [art] Signing Cert with AUTHO
2,929,046 UART: RITY.KEYID = 7
2,944,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,283 UART: [art] PUB.X = 3BF407FACB4BD59ED9367C8A6720085F4132D3487C2B189C15ADBA3E4D9E20AF268DDF764B273486C76454B5750F8410
2,952,048 UART: [art] PUB.Y = 99993B3781CE16D1F70F324A4E07652FFDBF88514981A8B361D1693BD14A6CA2614AFD9DBFD3224D03E6D30FC77C89AA
2,958,996 UART: [art] SIG.R = 208F0142D8AFC9FBBE07EC29F70FB667057F4F08D9A3ACDAC1BE1FCE9D6C35288551BC18DA0CDE7BA094C1870EFF8887
2,965,769 UART: [art] SIG.S = 11809836AFB7109B4819DB272587279102CED849CB87A250EC79F7D814BDEDF0DAC1B86256313C8DE7D23620FF5FECA9
2,988,715 UART: Caliptra RT
2,989,060 UART: [state] CFI Enabled
3,097,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,083 UART: [rt]cmd =0x44504543, len=96
3,161,022 >>> mbox cmd response data (56 bytes)
3,161,023 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,128 UART: [rt]cmd =0x44504543, len=92
3,382,416 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,773 UART: [kat] SHA2-256
892,711 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,559 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 ready_for_fw is high
1,481,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,505,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,326 UART: [idev] --
1,515,559 UART: [ldev] ++
1,515,727 UART: [ldev] CDI.KEYID = 6
1,516,090 UART: [ldev] SUBJECT.KEYID = 5
1,516,516 UART: [ldev] AUTHORITY.KEYID = 7
1,516,979 UART: [ldev] FE.KEYID = 1
1,522,073 UART: [ldev] Erasing FE.KEYID = 1
1,547,212 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,330 UART: [ldev] --
1,586,669 UART: [fwproc] Waiting for Commands...
1,587,424 UART: [fwproc] Received command 0x46574c44
1,588,215 UART: [fwproc] Received Image of size 114332 bytes
2,885,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,198 >>> mbox cmd response: success
3,078,198 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,079,392 UART: [afmc] ++
3,079,560 UART: [afmc] CDI.KEYID = 6
3,079,922 UART: [afmc] SUBJECT.KEYID = 7
3,080,347 UART: [afmc] AUTHORITY.KEYID = 5
3,116,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,240 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,633 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,323 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,402 UART: [afmc] --
3,159,484 UART: [cold-reset] --
3,160,432 UART: [state] Locking Datavault
3,161,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,117 UART: [state] Locking ICCM
3,162,781 UART: [exit] Launching FMC @ 0x40000130
3,168,110 UART:
3,168,126 UART: Running Caliptra FMC ...
3,168,534 UART:
3,168,588 UART: [state] CFI Enabled
3,178,913 UART: [fht] FMC Alias Private Key: 7
3,286,790 UART: [art] Extend RT PCRs Done
3,287,218 UART: [art] Lock RT PCRs Done
3,288,804 UART: [art] Populate DV Done
3,296,791 UART: [fht] FMC Alias Private Key: 7
3,297,725 UART: [art] Derive CDI
3,298,005 UART: [art] Store in in slot 0x4
3,383,950 UART: [art] Derive Key Pair
3,384,310 UART: [art] Store priv key in slot 0x5
3,397,732 UART: [art] Derive Key Pair - Done
3,412,459 UART: [art] Signing Cert with AUTHO
3,412,939 UART: RITY.KEYID = 7
3,428,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,060 UART: [art] PUB.X = A359DC5BF8CF30FC6F995B9A48082EC1DCFA77FC970E79E6E600E5D3082F8316B215A7D1E717B9A785765DD5F97B62A0
3,435,811 UART: [art] PUB.Y = 2B5797FF544269AFCA7B556DD6B02BDDA1A92C6BE4BD281ED87539CE1EC0C2E2900689E6884D2E1457358D51BA5DACBB
3,442,776 UART: [art] SIG.R = B4B066856BCE30D89634B8AE854BF5103044181F170740DE657438ECB926B414F5E2F929B801CAA146A7E6672341768D
3,449,534 UART: [art] SIG.S = CEB1902F1D6834486D1779EA62369996E5A1ADCBBAD557D6C21C7A493C18426F34B3F4E476B66BC51A0E3E618289DF13
3,472,672 UART: Caliptra RT
3,472,925 UART: [state] CFI Enabled
3,582,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,255 UART: [rt]cmd =0x43455252, len=4
3,624,058 >>> mbox cmd response data (784 bytes)
3,624,059 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,174 UART: [rt]cmd =0x44504543, len=92
3,837,571 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,851 ready_for_fw is high
1,362,851 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,976 >>> mbox cmd response: success
2,925,976 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,987,420 UART:
2,987,436 UART: Running Caliptra FMC ...
2,987,844 UART:
2,987,898 UART: [state] CFI Enabled
2,998,149 UART: [fht] FMC Alias Private Key: 7
3,106,032 UART: [art] Extend RT PCRs Done
3,106,460 UART: [art] Lock RT PCRs Done
3,107,756 UART: [art] Populate DV Done
3,115,855 UART: [fht] FMC Alias Private Key: 7
3,116,833 UART: [art] Derive CDI
3,117,113 UART: [art] Store in in slot 0x4
3,202,462 UART: [art] Derive Key Pair
3,202,822 UART: [art] Store priv key in slot 0x5
3,216,294 UART: [art] Derive Key Pair - Done
3,231,121 UART: [art] Signing Cert with AUTHO
3,231,601 UART: RITY.KEYID = 7
3,247,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,078 UART: [art] PUB.X = 71135145C3D94BF844D723DF0D680C5C503FA446A548F97E733225D9370DF902B225E23BDEEF928FD21CD7FCB677A72E
3,254,842 UART: [art] PUB.Y = 020E99A09AD3A5D0FF45AB76823325D8BD9DADB89A21F9F3202AF4475453E5093C5E51BFB95919C7D227EEB7150CA84F
3,261,790 UART: [art] SIG.R = 45263A78ADF88AAE29CFE219F9D038941116E25AD4CF8F599CE559A758BEB922FA7A1A234B7479CB56E25F0EAB75D437
3,268,569 UART: [art] SIG.S = BC2C3CB0FB0C2ABF5797489DCC045E655867F8D33A1C16E9297E17BF4001CD4DF6EA1A80E5E1C753352705B949705D16
3,292,540 UART: Caliptra RT
3,292,793 UART: [state] CFI Enabled
3,400,942 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,268 UART: [rt]cmd =0x43455252, len=4
3,442,022 >>> mbox cmd response data (783 bytes)
3,442,023 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,804 UART: [rt]cmd =0x44504543, len=92
3,655,705 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,520 UART: [kat] SHA2-256
882,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,566 UART: [kat] ++
886,718 UART: [kat] sha1
890,900 UART: [kat] SHA2-256
892,838 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,635 UART: [kat] LMS
1,475,831 UART: [kat] --
1,476,900 UART: [cold-reset] ++
1,477,252 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 ready_for_fw is high
1,481,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,609 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,570 UART: [ldev] Erasing FE.KEYID = 1
1,547,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,661 UART: [ldev] --
1,586,958 UART: [fwproc] Waiting for Commands...
1,587,825 UART: [fwproc] Received command 0x46574c44
1,588,616 UART: [fwproc] Received Image of size 114332 bytes
2,887,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,235 >>> mbox cmd response: success
3,079,235 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,491 UART: [afmc] ++
3,080,659 UART: [afmc] CDI.KEYID = 6
3,081,021 UART: [afmc] SUBJECT.KEYID = 7
3,081,446 UART: [afmc] AUTHORITY.KEYID = 5
3,116,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,716 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,406 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,459 UART: [afmc] --
3,160,357 UART: [cold-reset] --
3,161,205 UART: [state] Locking Datavault
3,162,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,990 UART: [state] Locking ICCM
3,163,476 UART: [exit] Launching FMC @ 0x40000130
3,168,805 UART:
3,168,821 UART: Running Caliptra FMC ...
3,169,229 UART:
3,169,372 UART: [state] CFI Enabled
3,180,121 UART: [fht] FMC Alias Private Key: 7
3,288,360 UART: [art] Extend RT PCRs Done
3,288,788 UART: [art] Lock RT PCRs Done
3,290,410 UART: [art] Populate DV Done
3,298,679 UART: [fht] FMC Alias Private Key: 7
3,299,655 UART: [art] Derive CDI
3,299,935 UART: [art] Store in in slot 0x4
3,386,036 UART: [art] Derive Key Pair
3,386,396 UART: [art] Store priv key in slot 0x5
3,399,938 UART: [art] Derive Key Pair - Done
3,414,747 UART: [art] Signing Cert with AUTHO
3,415,227 UART: RITY.KEYID = 7
3,430,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,206 UART: [art] PUB.X = C6F011795970B4957AF0DDB17FAD9586D09EA867AA2BDBAB8AE5A4D53D71D62384EA4885D50DCDB92C6594B9783F5F23
3,437,987 UART: [art] PUB.Y = 9BC8D69F22B22572F29A34C0403885EEEA3172335F1FE7AA789EECD4C92A9D6AD86BCB688AD86C6AEE3279EF9901B823
3,444,948 UART: [art] SIG.R = FC0BC7ED2E56BBF4F88E81357825936F5C2241FD023AE4099FC9B6E125632E11E7B23D4723A906F3DEC839ADE2673C36
3,451,714 UART: [art] SIG.S = FB2AF341B7162CDE0C92B1A61138C4C71C20F56D9F34E5A3B79458385CB6F180DF6BB63343D10D341F47FC05ADBD73D5
3,475,312 UART: Caliptra RT
3,475,657 UART: [state] CFI Enabled
3,583,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,235 UART: [rt]cmd =0x43455252, len=4
3,624,884 >>> mbox cmd response data (784 bytes)
3,624,885 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,820 UART: [rt]cmd =0x44504543, len=92
3,839,370 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 ready_for_fw is high
1,362,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,751 >>> mbox cmd response: success
2,929,751 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,991,859 UART:
2,991,875 UART: Running Caliptra FMC ...
2,992,283 UART:
2,992,426 UART: [state] CFI Enabled
3,002,775 UART: [fht] FMC Alias Private Key: 7
3,111,096 UART: [art] Extend RT PCRs Done
3,111,524 UART: [art] Lock RT PCRs Done
3,113,096 UART: [art] Populate DV Done
3,121,359 UART: [fht] FMC Alias Private Key: 7
3,122,331 UART: [art] Derive CDI
3,122,611 UART: [art] Store in in slot 0x4
3,208,302 UART: [art] Derive Key Pair
3,208,662 UART: [art] Store priv key in slot 0x5
3,221,926 UART: [art] Derive Key Pair - Done
3,236,418 UART: [art] Signing Cert with AUTHO
3,236,898 UART: RITY.KEYID = 7
3,252,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,923 UART: [art] PUB.X = 47069C946E67B756B01A173EF796EFA2F97E896819F220B7636DDEAA27514578B5009098015259D05916F2C64D761F80
3,259,653 UART: [art] PUB.Y = 1E02363E14D5787F7C1C12039E80470ECD67A4009C5AC7C2C964A4D70B1330922A78BCC0F5E62D643037B925113F3A4F
3,266,567 UART: [art] SIG.R = DFFC2163EAFED84826C7F48891D095EAD4F443DE96D00318E232DA5F37C1C5FD9C7833C92E7A134EC538E5D58A3DB155
3,273,348 UART: [art] SIG.S = AF0FB28988111532FEBA4997B6B10E62A09C7E09D421F482F321E9993D5D916AEE02A50236960292144D555CDA143003
3,296,698 UART: Caliptra RT
3,297,043 UART: [state] CFI Enabled
3,404,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,523 UART: [rt]cmd =0x43455252, len=4
3,446,382 >>> mbox cmd response data (784 bytes)
3,446,383 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,202 UART: [rt]cmd =0x44504543, len=92
3,659,786 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,758 UART: [kat] SHA2-512-ACC
908,659 UART: [kat] ECC-384
918,554 UART: [kat] HMAC-384Kdf
923,194 UART: [kat] LMS
1,171,522 UART: [kat] --
1,172,323 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,632 UART: [idev] ++
1,175,800 UART: [idev] CDI.KEYID = 6
1,176,160 UART: [idev] SUBJECT.KEYID = 7
1,176,584 UART: [idev] UDS.KEYID = 0
1,176,929 ready_for_fw is high
1,176,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,618 UART: [idev] Erasing UDS.KEYID = 0
1,201,831 UART: [idev] Sha1 KeyId Algorithm
1,210,443 UART: [idev] --
1,211,419 UART: [ldev] ++
1,211,587 UART: [ldev] CDI.KEYID = 6
1,211,950 UART: [ldev] SUBJECT.KEYID = 5
1,212,376 UART: [ldev] AUTHORITY.KEYID = 7
1,212,839 UART: [ldev] FE.KEYID = 1
1,217,907 UART: [ldev] Erasing FE.KEYID = 1
1,243,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,743 UART: [ldev] --
1,283,166 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,465 >>> mbox cmd response: success
2,775,465 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,521 UART: [afmc] ++
2,776,689 UART: [afmc] CDI.KEYID = 6
2,777,051 UART: [afmc] SUBJECT.KEYID = 7
2,777,476 UART: [afmc] AUTHORITY.KEYID = 5
2,812,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,942 UART: [afmc] --
2,855,984 UART: [cold-reset] --
2,856,872 UART: [state] Locking Datavault
2,858,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,611 UART: [state] Locking ICCM
2,859,179 UART: [exit] Launching FMC @ 0x40000130
2,864,508 UART:
2,864,524 UART: Running Caliptra FMC ...
2,864,932 UART:
2,864,986 UART: [state] CFI Enabled
2,875,321 UART: [fht] FMC Alias Private Key: 7
2,983,398 UART: [art] Extend RT PCRs Done
2,983,826 UART: [art] Lock RT PCRs Done
2,985,692 UART: [art] Populate DV Done
2,993,955 UART: [fht] FMC Alias Private Key: 7
2,995,023 UART: [art] Derive CDI
2,995,303 UART: [art] Store in in slot 0x4
3,080,952 UART: [art] Derive Key Pair
3,081,312 UART: [art] Store priv key in slot 0x5
3,094,548 UART: [art] Derive Key Pair - Done
3,109,079 UART: [art] Signing Cert with AUTHO
3,109,559 UART: RITY.KEYID = 7
3,124,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,266 UART: [art] PUB.X = E24568715C9569631BC573BB24021E23E768F8EA76F218909B489BC2DBBEE6F52CCC327E847A3160468E9F45AA45C12E
3,132,035 UART: [art] PUB.Y = 40C2891E11435F03A65F9B4E6D7214032B5E3CED4C0443FA8A02BC40707AA9B4224C59292281BF10FEFFB81F3C968140
3,138,975 UART: [art] SIG.R = 8288E09A5806BF4DB456E8280CD7C1FBFA6CBEA33C8AF20C99B018CD7FBD8D20B897697F867EB74DAAB88659389F302F
3,145,752 UART: [art] SIG.S = 65CEE2A744F2D4D14DC7D3D66ABDCF188BA58DB54E031F172BB56DB2C418D8BC3F1A4F447CA7FA79368D559FF5AB7D4D
3,169,848 UART: Caliptra RT
3,170,101 UART: [state] CFI Enabled
3,277,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,522 UART: [rt]cmd =0x43455252, len=4
3,319,384 >>> mbox cmd response data (783 bytes)
3,319,385 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,470 UART: [rt]cmd =0x44504543, len=92
3,532,197 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 ready_for_fw is high
1,060,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,038 >>> mbox cmd response: success
2,626,038 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,846 UART:
2,688,862 UART: Running Caliptra FMC ...
2,689,270 UART:
2,689,324 UART: [state] CFI Enabled
2,699,947 UART: [fht] FMC Alias Private Key: 7
2,807,616 UART: [art] Extend RT PCRs Done
2,808,044 UART: [art] Lock RT PCRs Done
2,809,332 UART: [art] Populate DV Done
2,817,651 UART: [fht] FMC Alias Private Key: 7
2,818,633 UART: [art] Derive CDI
2,818,913 UART: [art] Store in in slot 0x4
2,904,634 UART: [art] Derive Key Pair
2,904,994 UART: [art] Store priv key in slot 0x5
2,917,328 UART: [art] Derive Key Pair - Done
2,932,215 UART: [art] Signing Cert with AUTHO
2,932,695 UART: RITY.KEYID = 7
2,948,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,288 UART: [art] PUB.X = 2233F3CB71CF4D998DFE32C12EC2119AA3FE92E9CCB493E3F0CFE738076AE848CE40BD819E0FD47C8F2A283C38B46390
2,956,068 UART: [art] PUB.Y = B40E1D3DCDA77310B551DC07AD3E1AB9FF201B47DC74595441B2BCD9D2B8F39AA987CCEAAED65F451FDB56BEB154475E
2,963,038 UART: [art] SIG.R = 54971B61692D030F9CAE395FF6ADC1D909EC747716FF4B1E1226330F533B157F9447D3DBB4A73F63FD798B787C8A8DC3
2,969,802 UART: [art] SIG.S = 1AEABC4BAE1E782D23B824EBFBD441F62C383A18F53AFC945852DDB295E27400CE716C10DB710C1E0ECF976839667543
2,993,839 UART: Caliptra RT
2,994,092 UART: [state] CFI Enabled
3,100,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,339 UART: [rt]cmd =0x43455252, len=4
3,142,171 >>> mbox cmd response data (782 bytes)
3,142,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,297 UART: [rt]cmd =0x44504543, len=92
3,355,072 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
893,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,030 UART: [kat] ++
898,182 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,989 UART: [kat] HMAC-384Kdf
923,743 UART: [kat] LMS
1,172,071 UART: [kat] --
1,172,892 UART: [cold-reset] ++
1,173,238 UART: [fht] FHT @ 0x50003400
1,175,961 UART: [idev] ++
1,176,129 UART: [idev] CDI.KEYID = 6
1,176,489 UART: [idev] SUBJECT.KEYID = 7
1,176,913 UART: [idev] UDS.KEYID = 0
1,177,258 ready_for_fw is high
1,177,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,173 UART: [idev] Erasing UDS.KEYID = 0
1,201,976 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,422 UART: [ldev] ++
1,211,590 UART: [ldev] CDI.KEYID = 6
1,211,953 UART: [ldev] SUBJECT.KEYID = 5
1,212,379 UART: [ldev] AUTHORITY.KEYID = 7
1,212,842 UART: [ldev] FE.KEYID = 1
1,217,978 UART: [ldev] Erasing FE.KEYID = 1
1,244,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,108 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,283,955 UART: [fwproc] Recv command 0x46574c44
1,284,683 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,680 >>> mbox cmd response: success
2,774,680 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,766 UART: [afmc] ++
2,775,934 UART: [afmc] CDI.KEYID = 6
2,776,296 UART: [afmc] SUBJECT.KEYID = 7
2,776,721 UART: [afmc] AUTHORITY.KEYID = 5
2,812,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,201 UART: [afmc] --
2,856,183 UART: [cold-reset] --
2,857,147 UART: [state] Locking Datavault
2,858,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,838 UART: [state] Locking ICCM
2,859,366 UART: [exit] Launching FMC @ 0x40000130
2,864,695 UART:
2,864,711 UART: Running Caliptra FMC ...
2,865,119 UART:
2,865,262 UART: [state] CFI Enabled
2,875,517 UART: [fht] FMC Alias Private Key: 7
2,983,964 UART: [art] Extend RT PCRs Done
2,984,392 UART: [art] Lock RT PCRs Done
2,986,006 UART: [art] Populate DV Done
2,994,293 UART: [fht] FMC Alias Private Key: 7
2,995,449 UART: [art] Derive CDI
2,995,729 UART: [art] Store in in slot 0x4
3,081,370 UART: [art] Derive Key Pair
3,081,730 UART: [art] Store priv key in slot 0x5
3,095,080 UART: [art] Derive Key Pair - Done
3,109,840 UART: [art] Signing Cert with AUTHO
3,110,320 UART: RITY.KEYID = 7
3,125,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,059 UART: [art] PUB.X = 27CA912CDCCE14EFDB94F6D7F8B15A43A7E7EEE3B3CCA0830965D155B4F4E959BE3BC3B2DA0669081EDB34738A01A363
3,132,837 UART: [art] PUB.Y = 0992CE2932FCEA67540E1E82B82FEEE0E217CD5428CE347BBEAD53347898A76524BD046678BAB5A9CE6A2A58244B0FDC
3,139,789 UART: [art] SIG.R = D324BA3FC58589C19F63695FEAE7F317EAE415636366D840FF1CAE56B4DDCC0835A73E1811EB502AF61591A5CFB5A5E6
3,146,570 UART: [art] SIG.S = F29EAF62032EEF534ABFFF2F0EB693659E9A18DA8C82DCE28D670580F73AF92C062B1081C1699868134C6AE72B00555D
3,170,217 UART: Caliptra RT
3,170,562 UART: [state] CFI Enabled
3,277,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,068 UART: [rt]cmd =0x43455252, len=4
3,318,891 >>> mbox cmd response data (784 bytes)
3,318,892 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,987 UART: [rt]cmd =0x44504543, len=92
3,532,704 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,968 ready_for_fw is high
1,060,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,299 >>> mbox cmd response: success
2,628,299 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,691,853 UART:
2,691,869 UART: Running Caliptra FMC ...
2,692,277 UART:
2,692,420 UART: [state] CFI Enabled
2,703,373 UART: [fht] FMC Alias Private Key: 7
2,811,716 UART: [art] Extend RT PCRs Done
2,812,144 UART: [art] Lock RT PCRs Done
2,813,748 UART: [art] Populate DV Done
2,821,855 UART: [fht] FMC Alias Private Key: 7
2,822,805 UART: [art] Derive CDI
2,823,085 UART: [art] Store in in slot 0x4
2,908,890 UART: [art] Derive Key Pair
2,909,250 UART: [art] Store priv key in slot 0x5
2,922,906 UART: [art] Derive Key Pair - Done
2,937,555 UART: [art] Signing Cert with AUTHO
2,938,035 UART: RITY.KEYID = 7
2,953,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,526 UART: [art] PUB.X = 6FD3A5A3A00AA4EBAE8CD8D282BA8C0FC5E900FBF291BF7EAAA36634F49A98DE85586537F17299059D76F663ABBF0127
2,961,280 UART: [art] PUB.Y = 13AD9CA3C5E844C2D9185B976AF2554AEF315A464C2E90F0CFA74CFFCA37E6E204B1BC9BDF6E3C4813B72B8F64D4BACD
2,968,253 UART: [art] SIG.R = 9DA8E4B34DBFDED1BAFFF0FFA218E474BDA9F4A3CA291459B4D88431E01E31942164C5921B048CD21BB87B5BC4CE25A7
2,975,042 UART: [art] SIG.S = C6AE375881D0E160A84A1974E7EC6D5990A68CE1F8ADDB1F2A5B25DB2BE1EB0D4E61A0186E1A7631192CB9081AF34978
2,998,921 UART: Caliptra RT
2,999,266 UART: [state] CFI Enabled
3,107,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,646 UART: [rt]cmd =0x43455252, len=4
3,148,565 >>> mbox cmd response data (784 bytes)
3,148,566 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,523 UART: [rt]cmd =0x44504543, len=92
3,362,816 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,174,745 ready_for_fw is high
1,174,745 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,481 UART: [idev] Erasing UDS.KEYID = 0
1,199,881 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,514 UART: [ldev] ++
1,209,682 UART: [ldev] CDI.KEYID = 6
1,210,046 UART: [ldev] SUBJECT.KEYID = 5
1,210,473 UART: [ldev] AUTHORITY.KEYID = 7
1,210,936 UART: [ldev] FE.KEYID = 1
1,216,136 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,284 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,433 UART: [fwproc] Recv command 0x46574c44
1,283,166 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,917 >>> mbox cmd response: success
2,773,917 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,076 UART: [afmc] ++
2,775,244 UART: [afmc] CDI.KEYID = 6
2,775,607 UART: [afmc] SUBJECT.KEYID = 7
2,776,033 UART: [afmc] AUTHORITY.KEYID = 5
2,811,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,603 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,681 UART: [afmc] --
2,854,761 UART: [cold-reset] --
2,855,383 UART: [state] Locking Datavault
2,856,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,272 UART: [state] Locking ICCM
2,857,786 UART: [exit] Launching FMC @ 0x40000130
2,863,115 UART:
2,863,131 UART: Running Caliptra FMC ...
2,863,539 UART:
2,863,593 UART: [state] CFI Enabled
2,873,614 UART: [fht] FMC Alias Private Key: 7
2,981,841 UART: [art] Extend RT PCRs Done
2,982,269 UART: [art] Lock RT PCRs Done
2,984,047 UART: [art] Populate DV Done
2,992,258 UART: [fht] FMC Alias Private Key: 7
2,993,354 UART: [art] Derive CDI
2,993,634 UART: [art] Store in in slot 0x4
3,079,433 UART: [art] Derive Key Pair
3,079,793 UART: [art] Store priv key in slot 0x5
3,092,835 UART: [art] Derive Key Pair - Done
3,107,628 UART: [art] Signing Cert with AUTHO
3,108,108 UART: RITY.KEYID = 7
3,122,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,683 UART: [art] PUB.X = 6B828EC433F350A1D03BB10675425846E672AA9D809CC603333EBEA18FEA74EF85F7D14602097907306EEDCA6C6A98D2
3,130,442 UART: [art] PUB.Y = 9FB34B0A130690BE352249E52276BF59F07FE34D39D673EDFD85810B54194136E87443F2DD36179338E0EABD3F7F6ABA
3,137,387 UART: [art] SIG.R = 1942967A3187084DD62549BEBC4ED6B1AC13D889CF201EDDBAFCE24605A2F158D0C52987911AE5EF481A415C0F5A9DE8
3,144,160 UART: [art] SIG.S = 152FB7A440DCE4136F5CD52C783BF2447B74198375496A05625041CB199A5562986F091B25532A3B9B645FBD7E974078
3,168,423 UART: Caliptra RT
3,168,676 UART: [state] CFI Enabled
3,276,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,925 UART: [rt]cmd =0x43455252, len=4
3,317,663 >>> mbox cmd response data (782 bytes)
3,317,664 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,529 UART: [rt]cmd =0x44504543, len=92
3,529,965 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,470 ready_for_fw is high
1,055,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,921 >>> mbox cmd response: success
2,621,921 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,683,653 UART:
2,683,669 UART: Running Caliptra FMC ...
2,684,077 UART:
2,684,131 UART: [state] CFI Enabled
2,694,400 UART: [fht] FMC Alias Private Key: 7
2,802,055 UART: [art] Extend RT PCRs Done
2,802,483 UART: [art] Lock RT PCRs Done
2,804,379 UART: [art] Populate DV Done
2,812,458 UART: [fht] FMC Alias Private Key: 7
2,813,544 UART: [art] Derive CDI
2,813,824 UART: [art] Store in in slot 0x4
2,899,403 UART: [art] Derive Key Pair
2,899,763 UART: [art] Store priv key in slot 0x5
2,913,429 UART: [art] Derive Key Pair - Done
2,928,395 UART: [art] Signing Cert with AUTHO
2,928,875 UART: RITY.KEYID = 7
2,943,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,504 UART: [art] PUB.X = CB9E20549BAEFB969DC994BAC9AD87FA9CD15F5C3E052686DA26A826DF19AF0F028965787B2DC7FD1D15295523318B00
2,951,255 UART: [art] PUB.Y = 5BCBC4D45D19428947B22EC83DEFA6699C6FD562CD9305B591A8EEFA8582F9128C253ADA6A7628C82E7497FFF70AA997
2,958,211 UART: [art] SIG.R = 9546ADEBFA77DE82EED23BEA13EC80B208285E80566AFC2F16F979E0CA6524E0B2B215935BA4A1EE9561D3193E819740
2,964,988 UART: [art] SIG.S = AE6918F83E86B07123AB71C643C366FBB94E14D223C425E894DE90ADEC3AD75C27ABFACD98BF39EB0BE12C295D91D058
2,989,682 UART: Caliptra RT
2,989,935 UART: [state] CFI Enabled
3,096,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,007 UART: [rt]cmd =0x43455252, len=4
3,137,814 >>> mbox cmd response data (784 bytes)
3,137,815 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,840 UART: [rt]cmd =0x44504543, len=92
3,351,287 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,134 UART: [fht] FHT @ 0x50003400
1,173,742 UART: [idev] ++
1,173,910 UART: [idev] CDI.KEYID = 6
1,174,271 UART: [idev] SUBJECT.KEYID = 7
1,174,696 UART: [idev] UDS.KEYID = 0
1,175,042 ready_for_fw is high
1,175,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,209,102 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,861 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,233 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,904 >>> mbox cmd response: success
2,774,904 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,085 UART: [afmc] ++
2,776,253 UART: [afmc] CDI.KEYID = 6
2,776,616 UART: [afmc] SUBJECT.KEYID = 7
2,777,042 UART: [afmc] AUTHORITY.KEYID = 5
2,812,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,998 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,610 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,329 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,146 UART: [afmc] --
2,855,080 UART: [cold-reset] --
2,855,930 UART: [state] Locking Datavault
2,856,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,569 UART: [state] Locking ICCM
2,858,005 UART: [exit] Launching FMC @ 0x40000130
2,863,334 UART:
2,863,350 UART: Running Caliptra FMC ...
2,863,758 UART:
2,863,901 UART: [state] CFI Enabled
2,874,356 UART: [fht] FMC Alias Private Key: 7
2,982,277 UART: [art] Extend RT PCRs Done
2,982,705 UART: [art] Lock RT PCRs Done
2,984,133 UART: [art] Populate DV Done
2,992,280 UART: [fht] FMC Alias Private Key: 7
2,993,302 UART: [art] Derive CDI
2,993,582 UART: [art] Store in in slot 0x4
3,079,405 UART: [art] Derive Key Pair
3,079,765 UART: [art] Store priv key in slot 0x5
3,093,315 UART: [art] Derive Key Pair - Done
3,108,028 UART: [art] Signing Cert with AUTHO
3,108,508 UART: RITY.KEYID = 7
3,123,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,293 UART: [art] PUB.X = A2DBF0135DA287E4F7AAA4D638B06CE2378079DC14E5B340577255C87D114916261D9D80EFDB1B1A61143D4950EA4357
3,131,065 UART: [art] PUB.Y = 0083D21593E1145E24A232CED1CFD51E3FC8FA6356DC453E62E1C8A62212E46AB3CC5FD180D4E65CA9903D8A59E52503
3,137,998 UART: [art] SIG.R = 45F578EC6531B6ACBE27985B1A7E44C1507B840761693D69E699C376B08569D874E2E3D330E02E02E7E9E305F5BBD29E
3,144,759 UART: [art] SIG.S = B58C9710A97FCEDD3CF70E12510D91D7677C01BB6EB676A28BE308E946150FC1BEBF5ADF4F13CD2CA8BAAD3D5851D142
3,168,235 UART: Caliptra RT
3,168,580 UART: [state] CFI Enabled
3,276,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,585 UART: [rt]cmd =0x43455252, len=4
3,317,323 >>> mbox cmd response data (783 bytes)
3,317,324 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,301 UART: [rt]cmd =0x44504543, len=92
3,530,930 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,011 ready_for_fw is high
1,057,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,142 >>> mbox cmd response: success
2,624,142 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,686,240 UART:
2,686,256 UART: Running Caliptra FMC ...
2,686,664 UART:
2,686,807 UART: [state] CFI Enabled
2,697,424 UART: [fht] FMC Alias Private Key: 7
2,805,279 UART: [art] Extend RT PCRs Done
2,805,707 UART: [art] Lock RT PCRs Done
2,807,127 UART: [art] Populate DV Done
2,815,388 UART: [fht] FMC Alias Private Key: 7
2,816,436 UART: [art] Derive CDI
2,816,716 UART: [art] Store in in slot 0x4
2,901,949 UART: [art] Derive Key Pair
2,902,309 UART: [art] Store priv key in slot 0x5
2,915,463 UART: [art] Derive Key Pair - Done
2,930,128 UART: [art] Signing Cert with AUTHO
2,930,608 UART: RITY.KEYID = 7
2,946,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,059 UART: [art] PUB.X = 2F931D8DCA9BC215E7DCCEA9672E86F4F8D2D4AC306F00C4216D015CCD4A6CF16FBB62787730E81483719F3EC5E1F811
2,953,818 UART: [art] PUB.Y = 447D1E717FDB6D71495D2D56B808D05A8AED77429AF4C277FF35D903B5490BFFFFA3D714473E29760614899D46E7A2C7
2,960,760 UART: [art] SIG.R = 7307B4215A67810FAB724C8A50AE04C4440FAA03ABEEB6C606C8BA86F19D64B5044EB63D3F6853B71FF82E7A6B8F7633
2,967,519 UART: [art] SIG.S = 53DA2B77682A6BFB4A52461A74A8BB231C9131BB698A1850FA5141BCDE3980E4B1C3D9761FC8C275D4246C59ECE1D140
2,991,626 UART: Caliptra RT
2,991,971 UART: [state] CFI Enabled
3,099,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,376 UART: [rt]cmd =0x43455252, len=4
3,141,344 >>> mbox cmd response data (782 bytes)
3,141,345 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,160 UART: [rt]cmd =0x44504543, len=92
3,353,948 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,449 UART: [fht] Storing FHT @ 0x50003400
1,479,110 UART: [idev] ++
1,479,278 UART: [idev] CDI.KEYID = 6
1,479,638 UART: [idev] SUBJECT.KEYID = 7
1,480,062 UART: [idev] UDS.KEYID = 0
1,480,407 ready_for_fw is high
1,480,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,938 UART: [idev] Erasing UDS.KEYID = 0
1,504,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,106 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,913 UART: [ldev] Erasing FE.KEYID = 1
1,546,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,554 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,736 UART: [fwproc] Received command 0x46574c44
1,587,527 UART: [fwproc] Received Image of size 114332 bytes
2,886,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,296 >>> mbox cmd response: success
3,079,296 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,540 UART: [afmc] ++
3,080,708 UART: [afmc] CDI.KEYID = 6
3,081,070 UART: [afmc] SUBJECT.KEYID = 7
3,081,495 UART: [afmc] AUTHORITY.KEYID = 5
3,116,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,335 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,025 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,048 UART: [afmc] --
3,159,018 UART: [cold-reset] --
3,159,926 UART: [state] Locking Datavault
3,161,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,659 UART: [state] Locking ICCM
3,162,233 UART: [exit] Launching FMC @ 0x40000130
3,167,562 UART:
3,167,578 UART: Running Caliptra FMC ...
3,167,986 UART:
3,168,040 UART: [state] CFI Enabled
3,178,835 UART: [fht] FMC Alias Private Key: 7
3,287,132 UART: [art] Extend RT PCRs Done
3,287,560 UART: [art] Lock RT PCRs Done
3,289,090 UART: [art] Populate DV Done
3,297,221 UART: [fht] FMC Alias Private Key: 7
3,298,379 UART: [art] Derive CDI
3,298,659 UART: [art] Store in in slot 0x4
3,384,306 UART: [art] Derive Key Pair
3,384,666 UART: [art] Store priv key in slot 0x5
3,398,108 UART: [art] Derive Key Pair - Done
3,412,727 UART: [art] Signing Cert with AUTHO
3,413,207 UART: RITY.KEYID = 7
3,428,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,998 UART: [art] PUB.X = BABA929BC23C67D6B690367E01FC505D67A513A2E2BD68569981120934A9FD66E00C22B1C2A513755A8B3452224A446B
3,435,757 UART: [art] PUB.Y = FD0C88750CB6FE1D0E955B0921F1738D8F0D438908B9BA2A7175CC87B2CA75ED858A8CC571534F1EFA30496505C24DB7
3,442,694 UART: [art] SIG.R = BEA0B0EAA850E6A5BD9FA6D3608FF2F9D85FC2BEE3B21D8FC84D5634815018DA1382FD49093D8F5C2B9AB8C3A3CFE919
3,449,485 UART: [art] SIG.S = A28C4B62CA98549823B28E9470CFEA35B11960518A556B1A4F78B2C54390AA93229C704C244E680D19CE547201913557
3,472,874 UART: Caliptra RT
3,473,127 UART: [state] CFI Enabled
3,580,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,377 UART: [rt]cmd =0x4c444556, len=4
3,621,954 >>> mbox cmd response data (687 bytes)
3,621,955 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,178 UART: [rt]cmd =0x43455246, len=4
3,663,645 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,736 >>> mbox cmd response: success
2,925,736 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,987,226 UART:
2,987,242 UART: Running Caliptra FMC ...
2,987,650 UART:
2,987,704 UART: [state] CFI Enabled
2,998,095 UART: [fht] FMC Alias Private Key: 7
3,106,176 UART: [art] Extend RT PCRs Done
3,106,604 UART: [art] Lock RT PCRs Done
3,108,232 UART: [art] Populate DV Done
3,116,621 UART: [fht] FMC Alias Private Key: 7
3,117,739 UART: [art] Derive CDI
3,118,019 UART: [art] Store in in slot 0x4
3,204,072 UART: [art] Derive Key Pair
3,204,432 UART: [art] Store priv key in slot 0x5
3,217,356 UART: [art] Derive Key Pair - Done
3,232,068 UART: [art] Signing Cert with AUTHO
3,232,548 UART: RITY.KEYID = 7
3,247,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,739 UART: [art] PUB.X = 47DBBA7EC1110490115A323FB9107A983FA01A624660F03B5FFB5ED89A3F4BBC0FF6C9D75B5DE13EC01C78736E92562A
3,255,515 UART: [art] PUB.Y = 5F031A8DC8FA0E50AE26647F02CD603A722D3B1C1134805F8EDBA0EA68744E66EBDE559BEA5936B9D905B5B6AF32EE46
3,262,469 UART: [art] SIG.R = A783CD6B488FC6A929AB3355D86EC026686E72DC72E8012B725050C636232192164E60B6445593A7A1D1DD61EDCE4A0C
3,269,233 UART: [art] SIG.S = 66EF6FB716007FDB6A8E92A58BBCB2F824FEE55B99E5E7200B84560E714D22EA405DD949667C55FA6AA59BA1B81E2115
3,293,038 UART: Caliptra RT
3,293,291 UART: [state] CFI Enabled
3,401,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,934 UART: [rt]cmd =0x4c444556, len=4
3,442,317 >>> mbox cmd response data (687 bytes)
3,442,318 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,627 UART: [rt]cmd =0x43455246, len=4
3,484,042 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,488 UART: [kat] SHA2-256
892,426 UART: [kat] SHA2-384
895,313 UART: [kat] SHA2-512-ACC
897,214 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,908 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 ready_for_fw is high
1,481,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,505,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,230 UART: [ldev] ++
1,515,398 UART: [ldev] CDI.KEYID = 6
1,515,761 UART: [ldev] SUBJECT.KEYID = 5
1,516,187 UART: [ldev] AUTHORITY.KEYID = 7
1,516,650 UART: [ldev] FE.KEYID = 1
1,522,178 UART: [ldev] Erasing FE.KEYID = 1
1,547,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,529 UART: [ldev] --
1,586,918 UART: [fwproc] Waiting for Commands...
1,587,695 UART: [fwproc] Received command 0x46574c44
1,588,486 UART: [fwproc] Received Image of size 114332 bytes
2,886,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,683 >>> mbox cmd response: success
3,078,683 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,765 UART: [afmc] ++
3,079,933 UART: [afmc] CDI.KEYID = 6
3,080,295 UART: [afmc] SUBJECT.KEYID = 7
3,080,720 UART: [afmc] AUTHORITY.KEYID = 5
3,115,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,574 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,264 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,281 UART: [afmc] --
3,158,265 UART: [cold-reset] --
3,159,219 UART: [state] Locking Datavault
3,160,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,864 UART: [state] Locking ICCM
3,161,330 UART: [exit] Launching FMC @ 0x40000130
3,166,659 UART:
3,166,675 UART: Running Caliptra FMC ...
3,167,083 UART:
3,167,226 UART: [state] CFI Enabled
3,178,079 UART: [fht] FMC Alias Private Key: 7
3,286,054 UART: [art] Extend RT PCRs Done
3,286,482 UART: [art] Lock RT PCRs Done
3,288,020 UART: [art] Populate DV Done
3,296,169 UART: [fht] FMC Alias Private Key: 7
3,297,221 UART: [art] Derive CDI
3,297,501 UART: [art] Store in in slot 0x4
3,383,112 UART: [art] Derive Key Pair
3,383,472 UART: [art] Store priv key in slot 0x5
3,396,856 UART: [art] Derive Key Pair - Done
3,411,602 UART: [art] Signing Cert with AUTHO
3,412,082 UART: RITY.KEYID = 7
3,427,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,033 UART: [art] PUB.X = 53B08B39CF390D8458E01B5C61627796A18637E2C356BD004D2705762CDB5A8E1BB0D4F6B160A3D35305D05550F44193
3,434,766 UART: [art] PUB.Y = 2CAED92175BF53E5F5EC4CE77DAAD53E10D5E499FC81AA116F0162343AB8BA7A202F4593CEF5B5E0F4D655DC16895C49
3,441,731 UART: [art] SIG.R = 7E1B53039226BC5C414E94F7ABCACB04DEEC3BB6E90B43DCF802E994C8702D3691DD146BEF63E09944F993C9E631C660
3,448,501 UART: [art] SIG.S = C1E8F7BDAAB19EF83EF666E0EDCEE48E07B3B69DE920CC59104F68A80BD45EAD5DC56239F9B277802188276371F2E533
3,472,532 UART: Caliptra RT
3,472,877 UART: [state] CFI Enabled
3,580,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,802 UART: [rt]cmd =0x4c444556, len=4
3,621,299 >>> mbox cmd response data (687 bytes)
3,621,300 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,915 UART: [rt]cmd =0x43455246, len=4
3,663,148 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,131 >>> mbox cmd response: success
2,929,131 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,957 UART:
2,989,973 UART: Running Caliptra FMC ...
2,990,381 UART:
2,990,524 UART: [state] CFI Enabled
3,001,199 UART: [fht] FMC Alias Private Key: 7
3,109,476 UART: [art] Extend RT PCRs Done
3,109,904 UART: [art] Lock RT PCRs Done
3,111,538 UART: [art] Populate DV Done
3,119,543 UART: [fht] FMC Alias Private Key: 7
3,120,641 UART: [art] Derive CDI
3,120,921 UART: [art] Store in in slot 0x4
3,206,512 UART: [art] Derive Key Pair
3,206,872 UART: [art] Store priv key in slot 0x5
3,220,122 UART: [art] Derive Key Pair - Done
3,234,901 UART: [art] Signing Cert with AUTHO
3,235,381 UART: RITY.KEYID = 7
3,250,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,656 UART: [art] PUB.X = E7C12377508C40970043F003D330CA7C15B2EB76F57615B0E51DE8C8EB37A7BBCD1273F9803B68AFF3190FFA3720D217
3,258,402 UART: [art] PUB.Y = 24EDEE2269D7EE3E6A4D6EB2DCEA743FA9AEB199CD0A001B6DB5FE0A85EC3E665D328EE0DB07BAF199833A9039187E56
3,265,345 UART: [art] SIG.R = E749F150870F8A14D2137B77EADEB1F8E094144D0A08A904FBBE3E1172D8430FBFCB0B0522B95DE1A49750DCBCFC0148
3,272,105 UART: [art] SIG.S = ED35D4D107664A573A41F073BF88719519F4F2394EC3DB7FB9A829E0F1EAC0A70CD9862E4FED205D8C53AD52DFFE37B5
3,295,968 UART: Caliptra RT
3,296,313 UART: [state] CFI Enabled
3,405,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,009 UART: [rt]cmd =0x4c444556, len=4
3,446,504 >>> mbox cmd response data (687 bytes)
3,446,505 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,832 UART: [rt]cmd =0x43455246, len=4
3,487,989 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
893,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,823 UART: [kat] ++
897,975 UART: [kat] sha1
902,107 UART: [kat] SHA2-256
904,047 UART: [kat] SHA2-384
906,684 UART: [kat] SHA2-512-ACC
908,585 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,893 UART: [fht] FHT @ 0x50003400
1,175,512 UART: [idev] ++
1,175,680 UART: [idev] CDI.KEYID = 6
1,176,040 UART: [idev] SUBJECT.KEYID = 7
1,176,464 UART: [idev] UDS.KEYID = 0
1,176,809 ready_for_fw is high
1,176,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,282 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,210,021 UART: [idev] --
1,211,057 UART: [ldev] ++
1,211,225 UART: [ldev] CDI.KEYID = 6
1,211,588 UART: [ldev] SUBJECT.KEYID = 5
1,212,014 UART: [ldev] AUTHORITY.KEYID = 7
1,212,477 UART: [ldev] FE.KEYID = 1
1,217,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,614 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,019 >>> mbox cmd response: success
2,774,019 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,233 UART: [afmc] ++
2,775,401 UART: [afmc] CDI.KEYID = 6
2,775,763 UART: [afmc] SUBJECT.KEYID = 7
2,776,188 UART: [afmc] AUTHORITY.KEYID = 5
2,811,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,386 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,640 UART: [afmc] --
2,854,572 UART: [cold-reset] --
2,855,302 UART: [state] Locking Datavault
2,856,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,935 UART: [state] Locking ICCM
2,857,541 UART: [exit] Launching FMC @ 0x40000130
2,862,870 UART:
2,862,886 UART: Running Caliptra FMC ...
2,863,294 UART:
2,863,348 UART: [state] CFI Enabled
2,873,793 UART: [fht] FMC Alias Private Key: 7
2,981,680 UART: [art] Extend RT PCRs Done
2,982,108 UART: [art] Lock RT PCRs Done
2,983,544 UART: [art] Populate DV Done
2,991,755 UART: [fht] FMC Alias Private Key: 7
2,992,779 UART: [art] Derive CDI
2,993,059 UART: [art] Store in in slot 0x4
3,078,794 UART: [art] Derive Key Pair
3,079,154 UART: [art] Store priv key in slot 0x5
3,092,414 UART: [art] Derive Key Pair - Done
3,107,192 UART: [art] Signing Cert with AUTHO
3,107,672 UART: RITY.KEYID = 7
3,122,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,543 UART: [art] PUB.X = F64A4995B4C8A19F4DDFE7BDDFA663D6ADC2A1D3FB2E34B2456DDFD77B91086BEDECE667B290F54877E8C3237EF714A8
3,130,334 UART: [art] PUB.Y = DE145E7E4E277A10C101BA73FCC519AC8929C8CBE86DAB2770ED395EBD97F6D957FACF3A41FD6AEFB3EF9FF6334A603D
3,137,309 UART: [art] SIG.R = 543CB642130933C5CE8F731E492AC0692C490E92B5F1C892707E698F51F8E04BA0016A6BB967A14C9AA45AC82434F6EF
3,144,072 UART: [art] SIG.S = 77054D602802D50E49BCE686A47DBBBA26974FF2F188484F31EFF59B9065D364336A57BFF2C04434C666EBEDC5029F5E
3,167,809 UART: Caliptra RT
3,168,062 UART: [state] CFI Enabled
3,276,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,685 UART: [rt]cmd =0x4c444556, len=4
3,317,044 >>> mbox cmd response data (687 bytes)
3,317,045 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,448 UART: [rt]cmd =0x43455246, len=4
3,358,417 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,423 ready_for_fw is high
1,060,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,298 >>> mbox cmd response: success
2,625,298 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,942 UART:
2,686,958 UART: Running Caliptra FMC ...
2,687,366 UART:
2,687,420 UART: [state] CFI Enabled
2,698,095 UART: [fht] FMC Alias Private Key: 7
2,805,458 UART: [art] Extend RT PCRs Done
2,805,886 UART: [art] Lock RT PCRs Done
2,807,518 UART: [art] Populate DV Done
2,815,591 UART: [fht] FMC Alias Private Key: 7
2,816,661 UART: [art] Derive CDI
2,816,941 UART: [art] Store in in slot 0x4
2,902,706 UART: [art] Derive Key Pair
2,903,066 UART: [art] Store priv key in slot 0x5
2,916,166 UART: [art] Derive Key Pair - Done
2,931,008 UART: [art] Signing Cert with AUTHO
2,931,488 UART: RITY.KEYID = 7
2,946,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,215 UART: [art] PUB.X = FD94D23C029FE67FD50E9CB879BEC334FDF5D1CEB05A4E5809F47B3B63E76BDD42C2123964359846BBB0ACD241056433
2,953,985 UART: [art] PUB.Y = 0D6D3817301A02525B1F47C1B03CCBC7FD2A7792B96330851FAA99878D2A378649D6761031A12E98EFF982F6142D7A21
2,960,925 UART: [art] SIG.R = 67E5E0E8AFCA27A62EE7C309F3A86AC39E67B1BA07EEE5B68C3170A867C79651DD533C6B6336E0B39BB4909CC495887D
2,967,701 UART: [art] SIG.S = 5509B3E66B3213A5817EFE6E794D294C5EE6C49843515B4D54CC170F1B27BA91947C0D5579395140B267AF7EF8EA1430
2,991,291 UART: Caliptra RT
2,991,544 UART: [state] CFI Enabled
3,099,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,931 UART: [rt]cmd =0x4c444556, len=4
3,140,338 >>> mbox cmd response data (687 bytes)
3,140,339 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,668 UART: [rt]cmd =0x43455246, len=4
3,181,675 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 ready_for_fw is high
1,176,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,324 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,210,944 UART: [ldev] ++
1,211,112 UART: [ldev] CDI.KEYID = 6
1,211,475 UART: [ldev] SUBJECT.KEYID = 5
1,211,901 UART: [ldev] AUTHORITY.KEYID = 7
1,212,364 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,708 UART: [ldev] --
1,284,133 UART: [fwproc] Wait for Commands...
1,284,895 UART: [fwproc] Recv command 0x46574c44
1,285,623 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,968 >>> mbox cmd response: success
2,775,968 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,218 UART: [afmc] ++
2,777,386 UART: [afmc] CDI.KEYID = 6
2,777,748 UART: [afmc] SUBJECT.KEYID = 7
2,778,173 UART: [afmc] AUTHORITY.KEYID = 5
2,813,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,189 UART: [afmc] --
2,857,163 UART: [cold-reset] --
2,858,145 UART: [state] Locking Datavault
2,859,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,978 UART: [state] Locking ICCM
2,860,558 UART: [exit] Launching FMC @ 0x40000130
2,865,887 UART:
2,865,903 UART: Running Caliptra FMC ...
2,866,311 UART:
2,866,454 UART: [state] CFI Enabled
2,877,521 UART: [fht] FMC Alias Private Key: 7
2,985,634 UART: [art] Extend RT PCRs Done
2,986,062 UART: [art] Lock RT PCRs Done
2,987,816 UART: [art] Populate DV Done
2,995,935 UART: [fht] FMC Alias Private Key: 7
2,997,039 UART: [art] Derive CDI
2,997,319 UART: [art] Store in in slot 0x4
3,083,100 UART: [art] Derive Key Pair
3,083,460 UART: [art] Store priv key in slot 0x5
3,096,332 UART: [art] Derive Key Pair - Done
3,110,704 UART: [art] Signing Cert with AUTHO
3,111,184 UART: RITY.KEYID = 7
3,126,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,187 UART: [art] PUB.X = 7B48470D4EDF4F8F315637022B853E5FED7268EACB8495E50AA1A1A1EFDBADBC28FEFA8A431D040D08BA351135F20718
3,133,952 UART: [art] PUB.Y = DE93C4FD8D1A87703DF1C8392ABFCE44A97ADE6169C45BAD05EFECD5B8777EDDC280DAABE70B2A7B7EDFC1BB71C82B50
3,140,932 UART: [art] SIG.R = 58093970BCE321E6EC4739B68B6CDC0632F78838212337EACCC5267360DDDE56241F5036B488F6663963AE39DDA3A64A
3,147,696 UART: [art] SIG.S = 171C0E1C29CC0D19807EEBE9A4B05277CF3472A8003FCF62E593CDC2121EE8288354ACE543B10F2956028A22D7AE7755
3,171,071 UART: Caliptra RT
3,171,416 UART: [state] CFI Enabled
3,279,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,329 UART: [rt]cmd =0x4c444556, len=4
3,320,956 >>> mbox cmd response data (687 bytes)
3,320,957 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,208 UART: [rt]cmd =0x43455246, len=4
3,362,371 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,933 >>> mbox cmd response: success
2,625,933 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,361 UART:
2,688,377 UART: Running Caliptra FMC ...
2,688,785 UART:
2,688,928 UART: [state] CFI Enabled
2,699,611 UART: [fht] FMC Alias Private Key: 7
2,807,914 UART: [art] Extend RT PCRs Done
2,808,342 UART: [art] Lock RT PCRs Done
2,809,884 UART: [art] Populate DV Done
2,818,087 UART: [fht] FMC Alias Private Key: 7
2,819,193 UART: [art] Derive CDI
2,819,473 UART: [art] Store in in slot 0x4
2,905,096 UART: [art] Derive Key Pair
2,905,456 UART: [art] Store priv key in slot 0x5
2,918,472 UART: [art] Derive Key Pair - Done
2,933,223 UART: [art] Signing Cert with AUTHO
2,933,703 UART: RITY.KEYID = 7
2,948,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,408 UART: [art] PUB.X = C70CFE78FCEEF4C24A1E3329EFBD62044D7E7C35C45A359CFCED285BA039595C0005DC5153EDC4C71CC5E4FFDD3C9227
2,956,171 UART: [art] PUB.Y = 4CA638616E2249FCA120694F26923F18E07F082BA670715B14B234E8CB5303B7F1207E745E5E8B4C9863F7435F9D153C
2,963,109 UART: [art] SIG.R = 3404A064A677BA6F0FF872DD650218603C3375FF8C0304609A4C65C03BFC139E0F8C7FA52AA6DF2D7FBAD374F7279A7F
2,969,871 UART: [art] SIG.S = D861EE27A760B0698F89E2925C84C4E9AD48BED3090930E0F1329BE13B2E8A9001CDBD921E228B7146146430E8E4E991
2,993,965 UART: Caliptra RT
2,994,310 UART: [state] CFI Enabled
3,102,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,351 UART: [rt]cmd =0x4c444556, len=4
3,143,900 >>> mbox cmd response data (687 bytes)
3,143,901 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,362 UART: [rt]cmd =0x43455246, len=4
3,185,289 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,283 UART: [kat] SHA2-256
901,223 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
919,954 UART: [kat] LMS
1,168,266 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,605 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,173,733 ready_for_fw is high
1,173,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,199,365 UART: [idev] Sha1 KeyId Algorithm
1,208,119 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,424 UART: [ldev] --
1,281,844 UART: [fwproc] Wait for Commands...
1,282,549 UART: [fwproc] Recv command 0x46574c44
1,283,282 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,335 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,255 >>> mbox cmd response: success
2,773,255 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,494 UART: [afmc] ++
2,774,662 UART: [afmc] CDI.KEYID = 6
2,775,025 UART: [afmc] SUBJECT.KEYID = 7
2,775,451 UART: [afmc] AUTHORITY.KEYID = 5
2,811,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,517 UART: [afmc] --
2,854,605 UART: [cold-reset] --
2,855,447 UART: [state] Locking Datavault
2,856,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,000 UART: [state] Locking ICCM
2,857,472 UART: [exit] Launching FMC @ 0x40000130
2,862,801 UART:
2,862,817 UART: Running Caliptra FMC ...
2,863,225 UART:
2,863,279 UART: [state] CFI Enabled
2,873,602 UART: [fht] FMC Alias Private Key: 7
2,981,453 UART: [art] Extend RT PCRs Done
2,981,881 UART: [art] Lock RT PCRs Done
2,983,343 UART: [art] Populate DV Done
2,991,666 UART: [fht] FMC Alias Private Key: 7
2,992,756 UART: [art] Derive CDI
2,993,036 UART: [art] Store in in slot 0x4
3,078,883 UART: [art] Derive Key Pair
3,079,243 UART: [art] Store priv key in slot 0x5
3,092,719 UART: [art] Derive Key Pair - Done
3,107,201 UART: [art] Signing Cert with AUTHO
3,107,681 UART: RITY.KEYID = 7
3,123,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,108 UART: [art] PUB.X = 2735478656B712E8B0AA08B3ECAB7E1749C99BFA80B683A0BEFA62C5C52197ECB7A8CB9ED0867E9B09753AA08A5E76F5
3,130,886 UART: [art] PUB.Y = 407D095ED973135ED146A8DA75577437D6334053C69C47762AD8179F13F9F3A912A5162286B811000A70720377D07D37
3,137,787 UART: [art] SIG.R = 7AAE2AE8575B69A97A5F86D0C92EE6CC519F06FF05CBC19C52475DABA74295D46F3B234D4FE5998DE6D164EF985C6D8C
3,144,569 UART: [art] SIG.S = E6E846B7CC5D49FF62CF941EA5FDDDCA9102C825A473EFF7E6D3E6C67B6AFB7544CBC83B0F93778160CD5CB89E7BA9BB
3,168,856 UART: Caliptra RT
3,169,109 UART: [state] CFI Enabled
3,277,688 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,330 UART: [rt]cmd =0x4c444556, len=4
3,318,807 >>> mbox cmd response data (687 bytes)
3,318,808 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,045 UART: [rt]cmd =0x43455246, len=4
3,360,194 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,730 ready_for_fw is high
1,055,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,993 >>> mbox cmd response: success
2,620,993 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,485 UART:
2,683,501 UART: Running Caliptra FMC ...
2,683,909 UART:
2,683,963 UART: [state] CFI Enabled
2,694,074 UART: [fht] FMC Alias Private Key: 7
2,802,103 UART: [art] Extend RT PCRs Done
2,802,531 UART: [art] Lock RT PCRs Done
2,804,365 UART: [art] Populate DV Done
2,812,782 UART: [fht] FMC Alias Private Key: 7
2,813,814 UART: [art] Derive CDI
2,814,094 UART: [art] Store in in slot 0x4
2,899,501 UART: [art] Derive Key Pair
2,899,861 UART: [art] Store priv key in slot 0x5
2,912,931 UART: [art] Derive Key Pair - Done
2,927,485 UART: [art] Signing Cert with AUTHO
2,927,965 UART: RITY.KEYID = 7
2,943,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,074 UART: [art] PUB.X = 91CCE3EF7D44F78F289C247C8E3D4242E7C1FADD751723DBB204FF8405FCD790A82A2860232FB30AD6BD91A73EE61B21
2,950,849 UART: [art] PUB.Y = 8664987204E176856B93E1D5FA94C516A97CBE35A3C88A7E9983353B2E1E14E1F6739DC82D0E9C518FA70D53D9F8EBAA
2,957,796 UART: [art] SIG.R = 2046710720476F8F83127FE1F7B039ACE3592EAB0D031ACCA98972374A89E0E286994629F15C3081F52B7B475D247BF9
2,964,551 UART: [art] SIG.S = 1CECE1D0A4BD2CEBC06A43CE3FCC7C60841E349015E2AF9FD070775A01FA856D10ADA069051A9EB1C40FD6E92F3242BC
2,988,783 UART: Caliptra RT
2,989,036 UART: [state] CFI Enabled
3,097,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,583 UART: [rt]cmd =0x4c444556, len=4
3,138,040 >>> mbox cmd response data (687 bytes)
3,138,041 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,482 UART: [rt]cmd =0x43455246, len=4
3,179,553 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 ready_for_fw is high
1,174,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,054 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,709 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x46574c44
1,283,065 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,920 >>> mbox cmd response: success
2,772,920 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,969 UART: [afmc] ++
2,774,137 UART: [afmc] CDI.KEYID = 6
2,774,500 UART: [afmc] SUBJECT.KEYID = 7
2,774,926 UART: [afmc] AUTHORITY.KEYID = 5
2,810,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,828 UART: [afmc] --
2,853,800 UART: [cold-reset] --
2,854,616 UART: [state] Locking Datavault
2,855,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,511 UART: [state] Locking ICCM
2,857,053 UART: [exit] Launching FMC @ 0x40000130
2,862,382 UART:
2,862,398 UART: Running Caliptra FMC ...
2,862,806 UART:
2,862,949 UART: [state] CFI Enabled
2,873,084 UART: [fht] FMC Alias Private Key: 7
2,980,513 UART: [art] Extend RT PCRs Done
2,980,941 UART: [art] Lock RT PCRs Done
2,982,277 UART: [art] Populate DV Done
2,990,424 UART: [fht] FMC Alias Private Key: 7
2,991,586 UART: [art] Derive CDI
2,991,866 UART: [art] Store in in slot 0x4
3,078,187 UART: [art] Derive Key Pair
3,078,547 UART: [art] Store priv key in slot 0x5
3,092,055 UART: [art] Derive Key Pair - Done
3,106,758 UART: [art] Signing Cert with AUTHO
3,107,238 UART: RITY.KEYID = 7
3,122,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,129 UART: [art] PUB.X = D97A6F9DD33565498865AE8EC8ED5FFC38E6CF0B1AD7F75497044ECF77E25B491ADD52D5AE746F9563E91A229B2EC378
3,129,907 UART: [art] PUB.Y = 93426FAD945D9BF740B5A06381A5FFD180FD436378443C53D8AA98A6A82630044614944D65A01D971CF4B24A874CDAD1
3,136,854 UART: [art] SIG.R = A20D4FDF792455BEA68FCDEB3C663C46B8D5A92310E23211D49469C233433E61E777AB992387EF583F0AA6230AF7B685
3,143,619 UART: [art] SIG.S = 0036F48EEC3B2C363AA65AE3EA6E065EE169E01B0D1AA6DCA1AC740BFDC1F6BA974EFDC9F7A9972114F0C14D79545426
3,168,099 UART: Caliptra RT
3,168,444 UART: [state] CFI Enabled
3,276,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,546 UART: [rt]cmd =0x4c444556, len=4
3,316,917 >>> mbox cmd response data (687 bytes)
3,316,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,303 UART: [rt]cmd =0x43455246, len=4
3,358,344 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,823 ready_for_fw is high
1,055,823 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,698 >>> mbox cmd response: success
2,623,698 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,604 UART:
2,686,620 UART: Running Caliptra FMC ...
2,687,028 UART:
2,687,171 UART: [state] CFI Enabled
2,697,690 UART: [fht] FMC Alias Private Key: 7
2,805,743 UART: [art] Extend RT PCRs Done
2,806,171 UART: [art] Lock RT PCRs Done
2,807,567 UART: [art] Populate DV Done
2,815,956 UART: [fht] FMC Alias Private Key: 7
2,816,912 UART: [art] Derive CDI
2,817,192 UART: [art] Store in in slot 0x4
2,903,147 UART: [art] Derive Key Pair
2,903,507 UART: [art] Store priv key in slot 0x5
2,916,597 UART: [art] Derive Key Pair - Done
2,931,159 UART: [art] Signing Cert with AUTHO
2,931,639 UART: RITY.KEYID = 7
2,946,377 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,142 UART: [art] PUB.X = A572AF978DABD20E7E4346CE8FA14D5027A2560E5CCBA703C330C64E5D9C1ED60DB12F406C9A3369427872DD9AAD6543
2,953,912 UART: [art] PUB.Y = DBC8347ACEC1563BC2DE54AB7A284D0874F95F095E017B61B507BD59FEBE36942CAA4C59EFD1AAC0A3FC09B5A259796B
2,960,869 UART: [art] SIG.R = A42F7DD8B280CE24CBE8815B8550532085E1CC673B4DF81C9BEF29E64A10B59227852D2C29E16C26FF8E28256BE7AD65
2,967,647 UART: [art] SIG.S = 28D04766031B9ED572482450DEE0F247169EA4538842B4FC0F96370C0D666FD3EBFB2290D0AEA8A4518E6A7CF7AC039D
2,990,971 UART: Caliptra RT
2,991,316 UART: [state] CFI Enabled
3,099,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,427 UART: [rt]cmd =0x4c444556, len=4
3,140,800 >>> mbox cmd response data (687 bytes)
3,140,801 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,368 UART: [rt]cmd =0x43455246, len=4
3,182,331 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
903,174 UART: [kat] HMAC-384Kdf
907,768 UART: [kat] LMS
1,475,964 UART: [kat] --
1,476,941 UART: [cold-reset] ++
1,477,437 UART: [fht] Storing FHT @ 0x50003400
1,480,242 UART: [idev] ++
1,480,410 UART: [idev] CDI.KEYID = 6
1,480,770 UART: [idev] SUBJECT.KEYID = 7
1,481,194 UART: [idev] UDS.KEYID = 0
1,481,539 ready_for_fw is high
1,481,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,144 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,998 UART: [idev] --
1,514,981 UART: [ldev] ++
1,515,149 UART: [ldev] CDI.KEYID = 6
1,515,512 UART: [ldev] SUBJECT.KEYID = 5
1,515,938 UART: [ldev] AUTHORITY.KEYID = 7
1,516,401 UART: [ldev] FE.KEYID = 1
1,521,491 UART: [ldev] Erasing FE.KEYID = 1
1,547,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,104 UART: [ldev] --
1,586,403 UART: [fwproc] Waiting for Commands...
1,587,232 UART: [fwproc] Received command 0x46574c44
1,588,023 UART: [fwproc] Received Image of size 114332 bytes
2,885,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,987 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,224 >>> mbox cmd response: success
3,078,224 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,322 UART: [afmc] ++
3,079,490 UART: [afmc] CDI.KEYID = 6
3,079,852 UART: [afmc] SUBJECT.KEYID = 7
3,080,277 UART: [afmc] AUTHORITY.KEYID = 5
3,115,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,107 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,797 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,656 UART: [afmc] --
3,158,604 UART: [cold-reset] --
3,159,370 UART: [state] Locking Datavault
3,160,453 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,057 UART: [state] Locking ICCM
3,161,551 UART: [exit] Launching FMC @ 0x40000130
3,166,880 UART:
3,166,896 UART: Running Caliptra FMC ...
3,167,304 UART:
3,167,358 UART: [state] CFI Enabled
3,177,493 UART: [fht] FMC Alias Private Key: 7
3,285,386 UART: [art] Extend RT PCRs Done
3,285,814 UART: [art] Lock RT PCRs Done
3,287,200 UART: [art] Populate DV Done
3,295,589 UART: [fht] FMC Alias Private Key: 7
3,296,715 UART: [art] Derive CDI
3,296,995 UART: [art] Store in in slot 0x4
3,382,560 UART: [art] Derive Key Pair
3,382,920 UART: [art] Store priv key in slot 0x5
3,396,008 UART: [art] Derive Key Pair - Done
3,410,675 UART: [art] Signing Cert with AUTHO
3,411,155 UART: RITY.KEYID = 7
3,426,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,060 UART: [art] PUB.X = 4F463F4E5914BD664BA55C40594373E8700BDC4C606C5ADC038740136BB338ED06D99F529A9202E46A22F38D9EFA081E
3,433,817 UART: [art] PUB.Y = 9F0E9888A288FDD4EA164408ED5ED42498108E611C02087F92921DC038FFC62F9B9A95EA9EA9955ACD16A5CA72279118
3,440,759 UART: [art] SIG.R = FBE10351A27FBE281BBA0D1FD7D29CF34E9845DFDCB65F1434A0D38116E312686A6A86F12AA9DADD304F4CAB9E9F66DF
3,447,547 UART: [art] SIG.S = F513AA66DB2816BBFFFB5CFA7E25A7646A062CBB5C5736CEEE73B34B1B929A1CC0F077704A053935F130A5116871539B
3,471,382 UART: Caliptra RT
3,471,635 UART: [state] CFI Enabled
3,579,581 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,113 UART: [rt]cmd =0x4c444556, len=4
3,620,554 >>> mbox cmd response data (687 bytes)
3,620,555 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,932 UART: [rt]cmd =0x43455246, len=4
3,662,367 >>> mbox cmd response data (920 bytes)
3,662,368 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,731 UART: [rt]cmd =0x43455252, len=4
3,702,464 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,579 ready_for_fw is high
1,362,579 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,354 >>> mbox cmd response: success
2,927,354 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,216 UART:
2,989,232 UART: Running Caliptra FMC ...
2,989,640 UART:
2,989,694 UART: [state] CFI Enabled
3,000,349 UART: [fht] FMC Alias Private Key: 7
3,107,982 UART: [art] Extend RT PCRs Done
3,108,410 UART: [art] Lock RT PCRs Done
3,110,026 UART: [art] Populate DV Done
3,118,039 UART: [fht] FMC Alias Private Key: 7
3,119,199 UART: [art] Derive CDI
3,119,479 UART: [art] Store in in slot 0x4
3,205,556 UART: [art] Derive Key Pair
3,205,916 UART: [art] Store priv key in slot 0x5
3,219,040 UART: [art] Derive Key Pair - Done
3,233,986 UART: [art] Signing Cert with AUTHO
3,234,466 UART: RITY.KEYID = 7
3,249,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,327 UART: [art] PUB.X = 0C424163FB7D9D0903125550CAFA8564EC0613E3F1EE490FDAD86D126AE6F46688B285E3FADCF5F4FA8F30452101E25B
3,257,089 UART: [art] PUB.Y = 66CD25DA880407C3163C135B9A874C7B553EDD88B7E058701C10A546DCB7A21843008BBC1662D89E7CBBC4B3452BEBEF
3,264,021 UART: [art] SIG.R = DDF9756BA439DA100E74E7E5B2817A5830C137B2EB8974335E5B166ECEB82E85D751EA79E97E45178D0FB8609553CBBC
3,270,793 UART: [art] SIG.S = 138F4A4E3E449C38364BE24D4BA70EA0F92CA995A5116BB5CFE888A7163CAFBB76A6722481A4FFD5DE439BFB6CC2BF1B
3,294,279 UART: Caliptra RT
3,294,532 UART: [state] CFI Enabled
3,402,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,237 UART: [rt]cmd =0x4c444556, len=4
3,443,596 >>> mbox cmd response data (687 bytes)
3,443,597 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,034 UART: [rt]cmd =0x43455246, len=4
3,485,339 >>> mbox cmd response data (920 bytes)
3,485,340 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,681 UART: [rt]cmd =0x43455252, len=4
3,525,437 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,701 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 ready_for_fw is high
1,480,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,839 UART: [idev] Erasing UDS.KEYID = 0
1,504,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,878 UART: [ldev] ++
1,515,046 UART: [ldev] CDI.KEYID = 6
1,515,409 UART: [ldev] SUBJECT.KEYID = 5
1,515,835 UART: [ldev] AUTHORITY.KEYID = 7
1,516,298 UART: [ldev] FE.KEYID = 1
1,521,744 UART: [ldev] Erasing FE.KEYID = 1
1,547,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,359 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,341 UART: [fwproc] Received command 0x46574c44
1,588,132 UART: [fwproc] Received Image of size 114332 bytes
2,886,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,006 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,358 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,131 >>> mbox cmd response: success
3,079,131 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,231 UART: [afmc] ++
3,080,399 UART: [afmc] CDI.KEYID = 6
3,080,761 UART: [afmc] SUBJECT.KEYID = 7
3,081,186 UART: [afmc] AUTHORITY.KEYID = 5
3,116,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,427 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,820 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,510 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,389 UART: [afmc] --
3,159,433 UART: [cold-reset] --
3,160,377 UART: [state] Locking Datavault
3,161,448 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,052 UART: [state] Locking ICCM
3,162,696 UART: [exit] Launching FMC @ 0x40000130
3,168,025 UART:
3,168,041 UART: Running Caliptra FMC ...
3,168,449 UART:
3,168,592 UART: [state] CFI Enabled
3,179,157 UART: [fht] FMC Alias Private Key: 7
3,286,974 UART: [art] Extend RT PCRs Done
3,287,402 UART: [art] Lock RT PCRs Done
3,289,032 UART: [art] Populate DV Done
3,297,417 UART: [fht] FMC Alias Private Key: 7
3,298,463 UART: [art] Derive CDI
3,298,743 UART: [art] Store in in slot 0x4
3,384,128 UART: [art] Derive Key Pair
3,384,488 UART: [art] Store priv key in slot 0x5
3,397,846 UART: [art] Derive Key Pair - Done
3,412,511 UART: [art] Signing Cert with AUTHO
3,412,991 UART: RITY.KEYID = 7
3,428,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,336 UART: [art] PUB.X = E3BA8BE99EC7F0D321C220B087628F893E451DB82AF7BA8830772991C1FCA5D467B8243760A12A1902F22EFC708AED4E
3,436,111 UART: [art] PUB.Y = 436B23DED15B34825C848C8B00DD83A77E0CD0C23AE475835F48E8E264376B09122A9E65413B915BE1F370195CC01CA7
3,443,033 UART: [art] SIG.R = 458DB818DB6BF15F1DD0C4AA1BD722CC2E2D2A9300CEC3D00BDD8F37D46CC7FCC94C3C72E06113A824EACD1939F92D74
3,449,802 UART: [art] SIG.S = CF21B946D43BE73D000F9AEF8C00A9B5A00B90BE8575976F203989EA6990E792C4AEF4E0B6AB78A058FA56014F385093
3,473,522 UART: Caliptra RT
3,473,867 UART: [state] CFI Enabled
3,582,250 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,894 UART: [rt]cmd =0x4c444556, len=4
3,623,429 >>> mbox cmd response data (687 bytes)
3,623,430 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,789 UART: [rt]cmd =0x43455246, len=4
3,664,990 >>> mbox cmd response data (920 bytes)
3,664,991 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,450 UART: [rt]cmd =0x43455252, len=4
3,705,142 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,822 ready_for_fw is high
1,362,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,365 >>> mbox cmd response: success
2,929,365 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,991,067 UART:
2,991,083 UART: Running Caliptra FMC ...
2,991,491 UART:
2,991,634 UART: [state] CFI Enabled
3,002,305 UART: [fht] FMC Alias Private Key: 7
3,109,420 UART: [art] Extend RT PCRs Done
3,109,848 UART: [art] Lock RT PCRs Done
3,111,322 UART: [art] Populate DV Done
3,119,423 UART: [fht] FMC Alias Private Key: 7
3,120,479 UART: [art] Derive CDI
3,120,759 UART: [art] Store in in slot 0x4
3,206,350 UART: [art] Derive Key Pair
3,206,710 UART: [art] Store priv key in slot 0x5
3,219,984 UART: [art] Derive Key Pair - Done
3,234,582 UART: [art] Signing Cert with AUTHO
3,235,062 UART: RITY.KEYID = 7
3,250,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,853 UART: [art] PUB.X = 1AD4E6804129A816B604545441E5C8146E13F325B56DE7928B0CF65D9A0402BD88E6622615B4CA6209F306C0D6E6F189
3,257,599 UART: [art] PUB.Y = EAD0A0B3EA1761A9230B04F48F2EF613A4BA43F52A3827565B271F51A7F0DA55ECDE0A128C304D3506A8B80FD42F0A5C
3,264,545 UART: [art] SIG.R = 511C7F2A70F5CE281B5DDDF2138B67C580E205DE72D834488A93E5F696AB3B17B7829B5E5D0C40632FDA38F8C66833B8
3,271,315 UART: [art] SIG.S = 3D7CE650F3A7FE8A999173F8A94DE5DD29A0F8A0C73BCE16B031743DA9390362355B8A595C6B81EA5BFFF74E49FCC67E
3,295,097 UART: Caliptra RT
3,295,442 UART: [state] CFI Enabled
3,403,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,074 UART: [rt]cmd =0x4c444556, len=4
3,444,305 >>> mbox cmd response data (687 bytes)
3,444,306 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,515 UART: [rt]cmd =0x43455246, len=4
3,485,998 >>> mbox cmd response data (920 bytes)
3,485,999 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,256 UART: [rt]cmd =0x43455252, len=4
3,526,016 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
893,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,679 UART: [kat] ++
897,831 UART: [kat] sha1
902,113 UART: [kat] SHA2-256
904,053 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,303 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,318 UART: [idev] ++
1,175,486 UART: [idev] CDI.KEYID = 6
1,175,846 UART: [idev] SUBJECT.KEYID = 7
1,176,270 UART: [idev] UDS.KEYID = 0
1,176,615 ready_for_fw is high
1,176,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,340 UART: [idev] Erasing UDS.KEYID = 0
1,201,457 UART: [idev] Sha1 KeyId Algorithm
1,210,063 UART: [idev] --
1,211,329 UART: [ldev] ++
1,211,497 UART: [ldev] CDI.KEYID = 6
1,211,860 UART: [ldev] SUBJECT.KEYID = 5
1,212,286 UART: [ldev] AUTHORITY.KEYID = 7
1,212,749 UART: [ldev] FE.KEYID = 1
1,217,981 UART: [ldev] Erasing FE.KEYID = 1
1,243,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,963 UART: [ldev] --
1,283,328 UART: [fwproc] Wait for Commands...
1,284,090 UART: [fwproc] Recv command 0x46574c44
1,284,818 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,697 >>> mbox cmd response: success
2,774,697 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,825 UART: [afmc] ++
2,775,993 UART: [afmc] CDI.KEYID = 6
2,776,355 UART: [afmc] SUBJECT.KEYID = 7
2,776,780 UART: [afmc] AUTHORITY.KEYID = 5
2,812,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,296 UART: [afmc] --
2,855,228 UART: [cold-reset] --
2,856,114 UART: [state] Locking Datavault
2,857,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,917 UART: [state] Locking ICCM
2,858,541 UART: [exit] Launching FMC @ 0x40000130
2,863,870 UART:
2,863,886 UART: Running Caliptra FMC ...
2,864,294 UART:
2,864,348 UART: [state] CFI Enabled
2,875,277 UART: [fht] FMC Alias Private Key: 7
2,983,642 UART: [art] Extend RT PCRs Done
2,984,070 UART: [art] Lock RT PCRs Done
2,985,638 UART: [art] Populate DV Done
2,994,073 UART: [fht] FMC Alias Private Key: 7
2,995,059 UART: [art] Derive CDI
2,995,339 UART: [art] Store in in slot 0x4
3,080,850 UART: [art] Derive Key Pair
3,081,210 UART: [art] Store priv key in slot 0x5
3,094,120 UART: [art] Derive Key Pair - Done
3,108,747 UART: [art] Signing Cert with AUTHO
3,109,227 UART: RITY.KEYID = 7
3,124,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,424 UART: [art] PUB.X = 36025A2CDE3CD123170F9F71EEA6C6245DC1B79AD6F0A3F857A1392CCDE9DB651D1D621FD4D3403FC68EC3F2E33A4582
3,132,204 UART: [art] PUB.Y = AD6CE147FE461698E3B6C77613229FF04C5C34B642A897A973294408EEF72DAB494660A28A2D5D726626221F0205DAE3
3,139,143 UART: [art] SIG.R = CF7D5495864774FA62034C2EDC427A9426711BD1DCAB2714C923A5E686B5E0334F429BE6D408BE64A33B69F2BC5F0F08
3,145,907 UART: [art] SIG.S = A33ABBC07603AB09F11E7A8EC4B2DDDEC51D8DDDCFBF66B82E1928DF83A3A7AE9D7A95520310D14129830F8CA98996CE
3,169,126 UART: Caliptra RT
3,169,379 UART: [state] CFI Enabled
3,277,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,751 UART: [rt]cmd =0x4c444556, len=4
3,318,048 >>> mbox cmd response data (687 bytes)
3,318,049 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,574 UART: [rt]cmd =0x43455246, len=4
3,359,645 >>> mbox cmd response data (887 bytes)
3,359,646 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,139 UART: [rt]cmd =0x43455252, len=4
3,400,008 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,477 ready_for_fw is high
1,060,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,216 >>> mbox cmd response: success
2,625,216 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,694 UART:
2,687,710 UART: Running Caliptra FMC ...
2,688,118 UART:
2,688,172 UART: [state] CFI Enabled
2,698,375 UART: [fht] FMC Alias Private Key: 7
2,806,844 UART: [art] Extend RT PCRs Done
2,807,272 UART: [art] Lock RT PCRs Done
2,809,234 UART: [art] Populate DV Done
2,817,677 UART: [fht] FMC Alias Private Key: 7
2,818,713 UART: [art] Derive CDI
2,818,993 UART: [art] Store in in slot 0x4
2,905,130 UART: [art] Derive Key Pair
2,905,490 UART: [art] Store priv key in slot 0x5
2,918,522 UART: [art] Derive Key Pair - Done
2,933,165 UART: [art] Signing Cert with AUTHO
2,933,645 UART: RITY.KEYID = 7
2,949,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,008 UART: [art] PUB.X = 8BF9B51280840EA4335E9C4068EF0FCBFC53E10D6E3C7DED65E6C86271CE8BBDAA31BDC6A8A14B2E6C5C6EC61A62BEA8
2,956,797 UART: [art] PUB.Y = F16CACC10FF97E81828DADB786A94ECF41C19F1360E5A98C14FB0A73E80F7D3FC319F0AA152FDB91463381681444ED15
2,963,750 UART: [art] SIG.R = 00419F83A5F8D95B053CB2046B3FB791037EC47D5EA675A2E62BCE895BBE963EC7C63037CD2045C03E0342506304CE5B
2,970,487 UART: [art] SIG.S = EABBBAD0D80FDDD2AAF7ADF5799E700A90B8760D0333CDB3757FB89E05A43C25321900EEE65CA29567DB6249617F6580
2,994,553 UART: Caliptra RT
2,994,806 UART: [state] CFI Enabled
3,102,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,276 UART: [rt]cmd =0x4c444556, len=4
3,143,661 >>> mbox cmd response data (687 bytes)
3,143,662 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,093 UART: [rt]cmd =0x43455246, len=4
3,185,152 >>> mbox cmd response data (887 bytes)
3,185,153 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,214,642 UART: [rt]cmd =0x43455252, len=4
3,225,409 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
902,038 UART: [kat] SHA2-256
903,978 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,279 UART: [kat] LMS
1,171,607 UART: [kat] --
1,172,556 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,202,172 UART: [idev] Sha1 KeyId Algorithm
1,210,798 UART: [idev] --
1,211,910 UART: [ldev] ++
1,212,078 UART: [ldev] CDI.KEYID = 6
1,212,441 UART: [ldev] SUBJECT.KEYID = 5
1,212,867 UART: [ldev] AUTHORITY.KEYID = 7
1,213,330 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,244,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,614 UART: [ldev] --
1,284,081 UART: [fwproc] Wait for Commands...
1,284,841 UART: [fwproc] Recv command 0x46574c44
1,285,569 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,252 >>> mbox cmd response: success
2,775,252 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,266 UART: [afmc] ++
2,776,434 UART: [afmc] CDI.KEYID = 6
2,776,796 UART: [afmc] SUBJECT.KEYID = 7
2,777,221 UART: [afmc] AUTHORITY.KEYID = 5
2,813,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,553 UART: [afmc] --
2,856,519 UART: [cold-reset] --
2,857,591 UART: [state] Locking Datavault
2,859,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,716 UART: [state] Locking ICCM
2,860,258 UART: [exit] Launching FMC @ 0x40000130
2,865,587 UART:
2,865,603 UART: Running Caliptra FMC ...
2,866,011 UART:
2,866,154 UART: [state] CFI Enabled
2,877,025 UART: [fht] FMC Alias Private Key: 7
2,984,678 UART: [art] Extend RT PCRs Done
2,985,106 UART: [art] Lock RT PCRs Done
2,986,650 UART: [art] Populate DV Done
2,995,107 UART: [fht] FMC Alias Private Key: 7
2,996,071 UART: [art] Derive CDI
2,996,351 UART: [art] Store in in slot 0x4
3,082,038 UART: [art] Derive Key Pair
3,082,398 UART: [art] Store priv key in slot 0x5
3,095,764 UART: [art] Derive Key Pair - Done
3,110,725 UART: [art] Signing Cert with AUTHO
3,111,205 UART: RITY.KEYID = 7
3,126,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,170 UART: [art] PUB.X = 8738B7B4F991FA3AE301E73A530562E648230A1BABAC12ABFD3602FC3C3AA9369C58DF755E398660B045842F3731A0FA
3,133,934 UART: [art] PUB.Y = E07C14BA93B986589EF55E7DFEE30A431DC7B25072F76C14E2833DCB4AF5D327C388F00CAA331108C21B6BAAA706A8E3
3,140,886 UART: [art] SIG.R = 7D3E0FF67C646DF996E86A4B993A211986F61D44368E13A07201B199BB566C84D97B114CC69C6D1415A7C63B670C1023
3,147,643 UART: [art] SIG.S = 180C4DCE302124ACC483E1B6642BDF3C2569BA03F42174FBFBB1F3E8B3AFFDE47D9C8DF4FBD5F5BF6707DECE2D848A2B
3,171,793 UART: Caliptra RT
3,172,138 UART: [state] CFI Enabled
3,280,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,837 UART: [rt]cmd =0x4c444556, len=4
3,321,180 >>> mbox cmd response data (687 bytes)
3,321,181 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,526 UART: [rt]cmd =0x43455246, len=4
3,362,427 >>> mbox cmd response data (887 bytes)
3,362,428 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,823 UART: [rt]cmd =0x43455252, len=4
3,402,533 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 ready_for_fw is high
1,060,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,131 >>> mbox cmd response: success
2,626,131 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,571 UART:
2,687,587 UART: Running Caliptra FMC ...
2,687,995 UART:
2,688,138 UART: [state] CFI Enabled
2,699,005 UART: [fht] FMC Alias Private Key: 7
2,806,248 UART: [art] Extend RT PCRs Done
2,806,676 UART: [art] Lock RT PCRs Done
2,808,298 UART: [art] Populate DV Done
2,816,235 UART: [fht] FMC Alias Private Key: 7
2,817,285 UART: [art] Derive CDI
2,817,565 UART: [art] Store in in slot 0x4
2,903,392 UART: [art] Derive Key Pair
2,903,752 UART: [art] Store priv key in slot 0x5
2,916,986 UART: [art] Derive Key Pair - Done
2,931,620 UART: [art] Signing Cert with AUTHO
2,932,100 UART: RITY.KEYID = 7
2,947,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,013 UART: [art] PUB.X = 947B4F5A976EE6FE9A3138CA54606E0B9FF6CAD3262297FDCD42AFA787C6E7D02C8F3C3FBDF0332A0285E996AAD17B6C
2,954,797 UART: [art] PUB.Y = 1F50A7EC1FF348C83C20BFA66DA69D9B05DD5539E9F1AA6EB9477C8537CF651B7C00DF106F5C7F916E64B5810A6CEBBB
2,961,739 UART: [art] SIG.R = 206BDDD18C350026DC9DFCA6F5987CB8FC7698F77BF7F060FE78CA9979C5C398E3B3467A252291FF6BC80038E6DFBBE0
2,968,481 UART: [art] SIG.S = 885942B1F9F82088205058D7A5ABBA0C64267BB85EA686C42EA84750EE458DEB0903716E9D194C2BBBCFAC3148FB3BA8
2,992,737 UART: Caliptra RT
2,993,082 UART: [state] CFI Enabled
3,101,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,447 UART: [rt]cmd =0x4c444556, len=4
3,143,032 >>> mbox cmd response data (687 bytes)
3,143,033 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,406 UART: [rt]cmd =0x43455246, len=4
3,184,287 >>> mbox cmd response data (887 bytes)
3,184,288 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,213,437 UART: [rt]cmd =0x43455252, len=4
3,224,205 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Unprovisioned
86,225 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
891,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,325 UART: [kat] SHA2-256
902,265 UART: [kat] SHA2-384
905,100 UART: [kat] SHA2-512-ACC
907,001 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,315 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,174,939 ready_for_fw is high
1,174,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,375 UART: [idev] --
1,209,374 UART: [ldev] ++
1,209,542 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,333 UART: [ldev] AUTHORITY.KEYID = 7
1,210,796 UART: [ldev] FE.KEYID = 1
1,215,904 UART: [ldev] Erasing FE.KEYID = 1
1,242,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,710 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,523 >>> mbox cmd response: success
2,773,523 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,744 UART: [afmc] ++
2,774,912 UART: [afmc] CDI.KEYID = 6
2,775,275 UART: [afmc] SUBJECT.KEYID = 7
2,775,701 UART: [afmc] AUTHORITY.KEYID = 5
2,811,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,743 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,462 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,245 UART: [afmc] --
2,855,289 UART: [cold-reset] --
2,855,861 UART: [state] Locking Datavault
2,857,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,696 UART: [state] Locking ICCM
2,858,178 UART: [exit] Launching FMC @ 0x40000130
2,863,507 UART:
2,863,523 UART: Running Caliptra FMC ...
2,863,931 UART:
2,863,985 UART: [state] CFI Enabled
2,873,986 UART: [fht] FMC Alias Private Key: 7
2,981,653 UART: [art] Extend RT PCRs Done
2,982,081 UART: [art] Lock RT PCRs Done
2,983,599 UART: [art] Populate DV Done
2,992,048 UART: [fht] FMC Alias Private Key: 7
2,993,004 UART: [art] Derive CDI
2,993,284 UART: [art] Store in in slot 0x4
3,078,881 UART: [art] Derive Key Pair
3,079,241 UART: [art] Store priv key in slot 0x5
3,092,205 UART: [art] Derive Key Pair - Done
3,107,071 UART: [art] Signing Cert with AUTHO
3,107,551 UART: RITY.KEYID = 7
3,122,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,280 UART: [art] PUB.X = 1D1C9FECE80CD663EFFC532305CD4B49BE3C4EB61312634B1DFE535E38284657DBE5F416F3CDA5FB62E7E0E767ED037C
3,130,061 UART: [art] PUB.Y = BC42882484EB082CA15C748F2DECBD35E7AC51CA292F1CB53207E8F734C12D59787B846651E670314B738CB80CFA4E31
3,137,008 UART: [art] SIG.R = BB4405F8479D2EE49AF9CB82010DB45CDECEAB72F05F6A9A33762304407B06B9AF8BE562D1E1185EA1881D131853075C
3,143,768 UART: [art] SIG.S = 4C5762C577EA1844B4087B25D9BEB8B3132C34F3039858F53D9B2780D8BA024A727F9D1E8A9E6B48509B81AF003E14DC
3,167,120 UART: Caliptra RT
3,167,373 UART: [state] CFI Enabled
3,275,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,130 UART: [rt]cmd =0x4c444556, len=4
3,316,447 >>> mbox cmd response data (687 bytes)
3,316,448 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,905 UART: [rt]cmd =0x43455246, len=4
3,357,924 >>> mbox cmd response data (887 bytes)
3,357,925 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,376 UART: [rt]cmd =0x43455252, len=4
3,398,220 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,500 ready_for_fw is high
1,055,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,103 >>> mbox cmd response: success
2,621,103 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,681,969 UART:
2,681,985 UART: Running Caliptra FMC ...
2,682,393 UART:
2,682,447 UART: [state] CFI Enabled
2,693,118 UART: [fht] FMC Alias Private Key: 7
2,801,683 UART: [art] Extend RT PCRs Done
2,802,111 UART: [art] Lock RT PCRs Done
2,803,719 UART: [art] Populate DV Done
2,811,848 UART: [fht] FMC Alias Private Key: 7
2,812,792 UART: [art] Derive CDI
2,813,072 UART: [art] Store in in slot 0x4
2,898,781 UART: [art] Derive Key Pair
2,899,141 UART: [art] Store priv key in slot 0x5
2,912,339 UART: [art] Derive Key Pair - Done
2,927,417 UART: [art] Signing Cert with AUTHO
2,927,897 UART: RITY.KEYID = 7
2,943,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,948 UART: [art] PUB.X = 5C0489798C08F015192D76880069DA3745603CA9E79FC3FBFC966C998C439A05CF378745D902AD2B23C5AA5C035678C8
2,950,677 UART: [art] PUB.Y = 6D595E9D328AA0ACA45F96C3890FA054FF5BC8FA20D7197F0D8D6A0EA051FA12BA4B4CADBC60D6ED81F83378ADA1C2FD
2,957,646 UART: [art] SIG.R = 245CCD5B31B2557D7C45BC0F86813296B1CB93CC4E5DC76243DDA19D0157D6BBF83E21FCE425186064DDA697BDA5249F
2,964,422 UART: [art] SIG.S = 153BA3E123B6FB9419847974A19C6239EE84E90BA0EB30F86165FF7B25D52E3C7896EB92D404E8F21049C2C32EF5016D
2,988,658 UART: Caliptra RT
2,988,911 UART: [state] CFI Enabled
3,096,770 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,388 UART: [rt]cmd =0x4c444556, len=4
3,137,753 >>> mbox cmd response data (687 bytes)
3,137,754 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,213 UART: [rt]cmd =0x43455246, len=4
3,179,124 >>> mbox cmd response data (887 bytes)
3,179,125 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,494 UART: [rt]cmd =0x43455252, len=4
3,219,260 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 ready_for_fw is high
1,174,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,296 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,355 UART: [ldev] ++
1,210,523 UART: [ldev] CDI.KEYID = 6
1,210,887 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,244,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,321 UART: [ldev] --
1,283,679 UART: [fwproc] Wait for Commands...
1,284,470 UART: [fwproc] Recv command 0x46574c44
1,285,203 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,800 >>> mbox cmd response: success
2,774,800 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,045 UART: [afmc] ++
2,776,213 UART: [afmc] CDI.KEYID = 6
2,776,576 UART: [afmc] SUBJECT.KEYID = 7
2,777,002 UART: [afmc] AUTHORITY.KEYID = 5
2,812,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,282 UART: [afmc] --
2,856,188 UART: [cold-reset] --
2,856,994 UART: [state] Locking Datavault
2,858,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,609 UART: [state] Locking ICCM
2,859,081 UART: [exit] Launching FMC @ 0x40000130
2,864,410 UART:
2,864,426 UART: Running Caliptra FMC ...
2,864,834 UART:
2,864,977 UART: [state] CFI Enabled
2,875,696 UART: [fht] FMC Alias Private Key: 7
2,983,637 UART: [art] Extend RT PCRs Done
2,984,065 UART: [art] Lock RT PCRs Done
2,985,529 UART: [art] Populate DV Done
2,993,448 UART: [fht] FMC Alias Private Key: 7
2,994,582 UART: [art] Derive CDI
2,994,862 UART: [art] Store in in slot 0x4
3,081,015 UART: [art] Derive Key Pair
3,081,375 UART: [art] Store priv key in slot 0x5
3,094,889 UART: [art] Derive Key Pair - Done
3,109,619 UART: [art] Signing Cert with AUTHO
3,110,099 UART: RITY.KEYID = 7
3,125,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,890 UART: [art] PUB.X = C560EDCA2490B92C0DA77A3D5DB9A29649D79D0FCD7208D44064D84593E3A0B7CAE1AB42F1C9AF86CEE4C6902EE27D2D
3,132,671 UART: [art] PUB.Y = 1E985008920B704B854513F1BA976E7475D76FD4B9798212FB938CF1DD0D74010D4A8BEF4851D0EAB80ACBD517AE2AE2
3,139,611 UART: [art] SIG.R = F84DF69559BB47300B119FB503CED8EDDB5F09BBA62F500C6B85ECAA1136FFDB994E9D5A721300B4C2F25DEDEF96D4CF
3,146,373 UART: [art] SIG.S = FE69055949204EF122E7147ED5C509017ABD315CFEB385F98663B14C67517DC61107687203EEC27EBC42527E859DB560
3,169,707 UART: Caliptra RT
3,170,052 UART: [state] CFI Enabled
3,277,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,554 UART: [rt]cmd =0x4c444556, len=4
3,318,979 >>> mbox cmd response data (687 bytes)
3,318,980 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,279 UART: [rt]cmd =0x43455246, len=4
3,360,460 >>> mbox cmd response data (887 bytes)
3,360,461 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,848 UART: [rt]cmd =0x43455252, len=4
3,400,635 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,803 ready_for_fw is high
1,056,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,860 >>> mbox cmd response: success
2,623,860 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,470 UART:
2,687,486 UART: Running Caliptra FMC ...
2,687,894 UART:
2,688,037 UART: [state] CFI Enabled
2,698,688 UART: [fht] FMC Alias Private Key: 7
2,807,143 UART: [art] Extend RT PCRs Done
2,807,571 UART: [art] Lock RT PCRs Done
2,808,799 UART: [art] Populate DV Done
2,816,816 UART: [fht] FMC Alias Private Key: 7
2,817,952 UART: [art] Derive CDI
2,818,232 UART: [art] Store in in slot 0x4
2,903,543 UART: [art] Derive Key Pair
2,903,903 UART: [art] Store priv key in slot 0x5
2,917,499 UART: [art] Derive Key Pair - Done
2,932,467 UART: [art] Signing Cert with AUTHO
2,932,947 UART: RITY.KEYID = 7
2,947,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,310 UART: [art] PUB.X = 5FBA82F1256179E3FD2746C0DC7F79A3858965BF400F5BD29C0402B89DE57D6458A7E00E7798D86D827AD5B58DB8E905
2,955,069 UART: [art] PUB.Y = 243DA3196D6D6F6DCBFF6C06314B3D3BF81CA4FC3D34216964CD9BAFE2DCFAF600A133B3EB274801D42CC6F065BD076D
2,962,010 UART: [art] SIG.R = 699606F6348716327971A2A35838E7959AB93865B14E3D6F5DA7458CEC2EDDD0F25367856285B0DC569B9C17C878AD4D
2,968,773 UART: [art] SIG.S = B1106B723589AE700FB6BCC53EEF508E26038B320C0D520EF913C6E47EA9D89C195F66C645CC7AFF90898AFF966AA45D
2,992,029 UART: Caliptra RT
2,992,374 UART: [state] CFI Enabled
3,101,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,803 UART: [rt]cmd =0x4c444556, len=4
3,142,304 >>> mbox cmd response data (687 bytes)
3,142,305 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,550 UART: [rt]cmd =0x43455246, len=4
3,183,767 >>> mbox cmd response data (887 bytes)
3,183,768 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,213,193 UART: [rt]cmd =0x43455252, len=4
3,224,251 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,614 UART: [kat] LMS
1,475,810 UART: [kat] --
1,476,655 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 ready_for_fw is high
1,481,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,982 UART: [idev] Erasing UDS.KEYID = 0
1,505,536 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,106 UART: [idev] --
1,515,141 UART: [ldev] ++
1,515,309 UART: [ldev] CDI.KEYID = 6
1,515,672 UART: [ldev] SUBJECT.KEYID = 5
1,516,098 UART: [ldev] AUTHORITY.KEYID = 7
1,516,561 UART: [ldev] FE.KEYID = 1
1,521,685 UART: [ldev] Erasing FE.KEYID = 1
1,547,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,388 UART: [ldev] --
1,586,699 UART: [fwproc] Waiting for Commands...
1,587,438 UART: [fwproc] Received command 0x46574c44
1,588,229 UART: [fwproc] Received Image of size 114332 bytes
2,885,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,326 >>> mbox cmd response: success
3,077,326 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,078,426 UART: [afmc] ++
3,078,594 UART: [afmc] CDI.KEYID = 6
3,078,956 UART: [afmc] SUBJECT.KEYID = 7
3,079,381 UART: [afmc] AUTHORITY.KEYID = 5
3,114,010 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,629 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,319 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,122 UART: [afmc] --
3,157,134 UART: [cold-reset] --
3,158,174 UART: [state] Locking Datavault
3,159,181 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,785 UART: [state] Locking ICCM
3,160,289 UART: [exit] Launching FMC @ 0x40000130
3,165,618 UART:
3,165,634 UART: Running Caliptra FMC ...
3,166,042 UART:
3,166,096 UART: [state] CFI Enabled
3,176,265 UART: [fht] FMC Alias Private Key: 7
3,283,702 UART: [art] Extend RT PCRs Done
3,284,130 UART: [art] Lock RT PCRs Done
3,285,470 UART: [art] Populate DV Done
3,293,871 UART: [fht] FMC Alias Private Key: 7
3,294,839 UART: [art] Derive CDI
3,295,119 UART: [art] Store in in slot 0x4
3,381,128 UART: [art] Derive Key Pair
3,381,488 UART: [art] Store priv key in slot 0x5
3,394,280 UART: [art] Derive Key Pair - Done
3,409,013 UART: [art] Signing Cert with AUTHO
3,409,493 UART: RITY.KEYID = 7
3,424,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,608 UART: [art] PUB.X = 3DE3387FBCD60C684DA94738460B41DF46C0051BAEDC3D8E4DB80742CCF8C9A782F119692958B0EF891ED5B0EA1636A7
3,432,378 UART: [art] PUB.Y = 33C51FB261602E69BA4C0E900AA491E3A6EDC7F49FFC7C8201D67A80004CC1A8385F84EEC45FEAFBEF905C8D92CFA413
3,439,317 UART: [art] SIG.R = 825926D2DED8996D9894DD752BDEC4390923A673902C8FDC8D1810E567E41CD3F99332917D9AC6EAD0536EAD946551D4
3,446,086 UART: [art] SIG.S = 236B15EA12A56757C2E1A19E697738871B29F53A08A3F11726ED21B52075D33A315FFCC9B6FBBDEF796F1A0A89B87216
3,469,921 UART: Caliptra RT
3,470,174 UART: [state] CFI Enabled
3,578,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,104 UART: [rt]cmd =0x49444543, len=327
3,619,784 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,182 >>> mbox cmd response: success
2,928,182 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,586 UART:
2,990,602 UART: Running Caliptra FMC ...
2,991,010 UART:
2,991,064 UART: [state] CFI Enabled
3,001,357 UART: [fht] FMC Alias Private Key: 7
3,109,314 UART: [art] Extend RT PCRs Done
3,109,742 UART: [art] Lock RT PCRs Done
3,111,504 UART: [art] Populate DV Done
3,119,841 UART: [fht] FMC Alias Private Key: 7
3,121,015 UART: [art] Derive CDI
3,121,295 UART: [art] Store in in slot 0x4
3,206,610 UART: [art] Derive Key Pair
3,206,970 UART: [art] Store priv key in slot 0x5
3,220,528 UART: [art] Derive Key Pair - Done
3,235,477 UART: [art] Signing Cert with AUTHO
3,235,957 UART: RITY.KEYID = 7
3,251,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,014 UART: [art] PUB.X = BCEFC73D601217938722E7A28D561D8DA2837953C7A15BE2A48A0AAFB36C76D1071BA8EA7A1D0C92637BE36973146B2A
3,258,783 UART: [art] PUB.Y = E9620DD1C7907574A0BC3D6D2BE2E5DDE30811088556F825D693D885A196F1BFE3BAF800C78C7C1EA1B16E566455A52D
3,265,710 UART: [art] SIG.R = EF6FF27D5FFCEB6106AEE29EA971CB1DB3A16D89302FC9D6E362C31D9622879B4CA3079D2DBF6619A71BA07251A45D12
3,272,490 UART: [art] SIG.S = 38EA08F18056749AACD43D6E31CEA7E240D9EDAA7B128A73D35CFEB4E6B4D5D6B5AC54771AA50FD404A67AD815F8C429
3,295,962 UART: Caliptra RT
3,296,215 UART: [state] CFI Enabled
3,404,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,435 UART: [rt]cmd =0x49444543, len=327
3,445,835 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
890,966 UART: [kat] SHA2-256
892,904 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,299 UART: [kat] HMAC-384Kdf
908,073 UART: [kat] LMS
1,476,269 UART: [kat] --
1,477,148 UART: [cold-reset] ++
1,477,700 UART: [fht] Storing FHT @ 0x50003400
1,480,437 UART: [idev] ++
1,480,605 UART: [idev] CDI.KEYID = 6
1,480,965 UART: [idev] SUBJECT.KEYID = 7
1,481,389 UART: [idev] UDS.KEYID = 0
1,481,734 ready_for_fw is high
1,481,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,593 UART: [idev] Erasing UDS.KEYID = 0
1,506,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,883 UART: [idev] --
1,516,002 UART: [ldev] ++
1,516,170 UART: [ldev] CDI.KEYID = 6
1,516,533 UART: [ldev] SUBJECT.KEYID = 5
1,516,959 UART: [ldev] AUTHORITY.KEYID = 7
1,517,422 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,548,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,047 UART: [ldev] --
1,587,432 UART: [fwproc] Waiting for Commands...
1,588,091 UART: [fwproc] Received command 0x46574c44
1,588,882 UART: [fwproc] Received Image of size 114332 bytes
2,886,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,416 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,768 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,633 >>> mbox cmd response: success
3,078,633 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,079,757 UART: [afmc] ++
3,079,925 UART: [afmc] CDI.KEYID = 6
3,080,287 UART: [afmc] SUBJECT.KEYID = 7
3,080,712 UART: [afmc] AUTHORITY.KEYID = 5
3,116,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,311 UART: [afmc] --
3,159,427 UART: [cold-reset] --
3,160,169 UART: [state] Locking Datavault
3,161,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,018 UART: [state] Locking ICCM
3,162,690 UART: [exit] Launching FMC @ 0x40000130
3,168,019 UART:
3,168,035 UART: Running Caliptra FMC ...
3,168,443 UART:
3,168,586 UART: [state] CFI Enabled
3,179,323 UART: [fht] FMC Alias Private Key: 7
3,287,172 UART: [art] Extend RT PCRs Done
3,287,600 UART: [art] Lock RT PCRs Done
3,289,036 UART: [art] Populate DV Done
3,297,111 UART: [fht] FMC Alias Private Key: 7
3,298,111 UART: [art] Derive CDI
3,298,391 UART: [art] Store in in slot 0x4
3,383,908 UART: [art] Derive Key Pair
3,384,268 UART: [art] Store priv key in slot 0x5
3,397,694 UART: [art] Derive Key Pair - Done
3,412,197 UART: [art] Signing Cert with AUTHO
3,412,677 UART: RITY.KEYID = 7
3,427,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,716 UART: [art] PUB.X = F16EA7431258770A259190FB6C3B81A6239CA2ACEAEF6A3C338C3FCA4BDF1310447D41A1F480AC24C61393D0EEDA2F33
3,435,497 UART: [art] PUB.Y = AE13BED186F2E342236114013260F1EF1F15E79225AB3F6C4C965B72F12F372545B1298D3427FFBE609A6099FB2DA04A
3,442,446 UART: [art] SIG.R = A937C3E49D35FA1AB81F1B19FFCC5AF2DF99CC2CC9EE5331F2211DA0643702E41ECA16D345140F10E021481FE2A3B660
3,449,224 UART: [art] SIG.S = DC5C3657667ECB9A012CD38A2BDD9903849FE21F0C85CF4005113AB0C1E11A291118CEF61B945526F550AFDBE9EF9129
3,473,123 UART: Caliptra RT
3,473,468 UART: [state] CFI Enabled
3,581,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,845 UART: [rt]cmd =0x49444543, len=327
3,622,354 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,548 ready_for_fw is high
1,362,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,119 >>> mbox cmd response: success
2,928,119 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,379 UART:
2,990,395 UART: Running Caliptra FMC ...
2,990,803 UART:
2,990,946 UART: [state] CFI Enabled
3,001,731 UART: [fht] FMC Alias Private Key: 7
3,109,120 UART: [art] Extend RT PCRs Done
3,109,548 UART: [art] Lock RT PCRs Done
3,110,856 UART: [art] Populate DV Done
3,119,149 UART: [fht] FMC Alias Private Key: 7
3,120,329 UART: [art] Derive CDI
3,120,609 UART: [art] Store in in slot 0x4
3,206,142 UART: [art] Derive Key Pair
3,206,502 UART: [art] Store priv key in slot 0x5
3,220,272 UART: [art] Derive Key Pair - Done
3,234,837 UART: [art] Signing Cert with AUTHO
3,235,317 UART: RITY.KEYID = 7
3,250,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,390 UART: [art] PUB.X = ADB0AF82257BDD8E618D1C8DA74CBED9F25E009888D9817330AA018F83314AE10F7E1CD05515252A10EA4097156AF2C9
3,258,140 UART: [art] PUB.Y = 43C5FB2FA8DFC7413EA091183521004785A162BA3F92F314454C41614CA980AB6D85A8B9E066C12B937BBEAB99FAE32E
3,265,076 UART: [art] SIG.R = 7F78C747A06AE89E30A3FF1D3626997948636C5B6D7C6B0BFF70BAD908F4DC040F76F3E6CE02DE40E76A364FC5B894F1
3,271,843 UART: [art] SIG.S = D7D3E9389203D2C8C7E44F7C76261FFC9FE9A9F67DFCA9544C868B6FBCDD58B7C04F156D0748EA6DD1FCD4253561A77A
3,295,636 UART: Caliptra RT
3,295,981 UART: [state] CFI Enabled
3,405,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,715 UART: [rt]cmd =0x49444543, len=327
3,446,157 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,490 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,172,545 UART: [cold-reset] ++
1,173,101 UART: [fht] FHT @ 0x50003400
1,175,854 UART: [idev] ++
1,176,022 UART: [idev] CDI.KEYID = 6
1,176,382 UART: [idev] SUBJECT.KEYID = 7
1,176,806 UART: [idev] UDS.KEYID = 0
1,177,151 ready_for_fw is high
1,177,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,056 UART: [idev] Erasing UDS.KEYID = 0
1,202,171 UART: [idev] Sha1 KeyId Algorithm
1,210,603 UART: [idev] --
1,211,597 UART: [ldev] ++
1,211,765 UART: [ldev] CDI.KEYID = 6
1,212,128 UART: [ldev] SUBJECT.KEYID = 5
1,212,554 UART: [ldev] AUTHORITY.KEYID = 7
1,213,017 UART: [ldev] FE.KEYID = 1
1,218,047 UART: [ldev] Erasing FE.KEYID = 1
1,244,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,223 UART: [ldev] --
1,283,700 UART: [fwproc] Wait for Commands...
1,284,320 UART: [fwproc] Recv command 0x46574c44
1,285,048 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,503 >>> mbox cmd response: success
2,775,503 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,776,615 UART: [afmc] ++
2,776,783 UART: [afmc] CDI.KEYID = 6
2,777,145 UART: [afmc] SUBJECT.KEYID = 7
2,777,570 UART: [afmc] AUTHORITY.KEYID = 5
2,812,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,760 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,620 UART: [afmc] --
2,856,668 UART: [cold-reset] --
2,857,424 UART: [state] Locking Datavault
2,858,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,299 UART: [state] Locking ICCM
2,859,959 UART: [exit] Launching FMC @ 0x40000130
2,865,288 UART:
2,865,304 UART: Running Caliptra FMC ...
2,865,712 UART:
2,865,766 UART: [state] CFI Enabled
2,875,777 UART: [fht] FMC Alias Private Key: 7
2,983,916 UART: [art] Extend RT PCRs Done
2,984,344 UART: [art] Lock RT PCRs Done
2,985,732 UART: [art] Populate DV Done
2,994,069 UART: [fht] FMC Alias Private Key: 7
2,995,013 UART: [art] Derive CDI
2,995,293 UART: [art] Store in in slot 0x4
3,081,018 UART: [art] Derive Key Pair
3,081,378 UART: [art] Store priv key in slot 0x5
3,095,104 UART: [art] Derive Key Pair - Done
3,109,755 UART: [art] Signing Cert with AUTHO
3,110,235 UART: RITY.KEYID = 7
3,125,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,268 UART: [art] PUB.X = D6433709A16EF37ADCECA0AB9401F273AB42B641630CC45403AF710496EF4925D6BD5258E727A9DC7AB2C9E94CFD10D2
3,133,035 UART: [art] PUB.Y = CC8B4E83F9AA3D68E05834D22ADFDA35AF1EF4A7FD82167387ED2364F8835808128E1E375A635CD9FCF0F946C16A0AF1
3,139,993 UART: [art] SIG.R = D597A26F732549D75644FDD8EC478513273B08131556BC19F42DD5394E42D00BA1F60232DF0F7CD4AFAD8330E0673C96
3,146,751 UART: [art] SIG.S = F1A81F1DCDB2F395AD5DECB0D1380876F5165623AE8E5E09CD89BA7C955F8D8E6ADA2662356DAECC41E16522CA586CDD
3,170,844 UART: Caliptra RT
3,171,097 UART: [state] CFI Enabled
3,278,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,026 UART: [rt]cmd =0x49444543, len=327
3,319,526 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,949 ready_for_fw is high
1,059,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,976 >>> mbox cmd response: success
2,624,976 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,687,208 UART:
2,687,224 UART: Running Caliptra FMC ...
2,687,632 UART:
2,687,686 UART: [state] CFI Enabled
2,697,893 UART: [fht] FMC Alias Private Key: 7
2,805,888 UART: [art] Extend RT PCRs Done
2,806,316 UART: [art] Lock RT PCRs Done
2,807,960 UART: [art] Populate DV Done
2,816,419 UART: [fht] FMC Alias Private Key: 7
2,817,443 UART: [art] Derive CDI
2,817,723 UART: [art] Store in in slot 0x4
2,903,026 UART: [art] Derive Key Pair
2,903,386 UART: [art] Store priv key in slot 0x5
2,916,658 UART: [art] Derive Key Pair - Done
2,931,333 UART: [art] Signing Cert with AUTHO
2,931,813 UART: RITY.KEYID = 7
2,946,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,396 UART: [art] PUB.X = 21DF857507BBBB1F6506428257824BA1A983A09DDC4A50F187B12D343F24419671749D40D7CEC6E97F76A4BA080FDC33
2,954,156 UART: [art] PUB.Y = C2ABEA25E6D02C131FBF91F8F311715123E1E21495D71F7D722D1E8E07D17A376E91C7D0042E4F624CEADE75952E2324
2,961,106 UART: [art] SIG.R = BD5EAC6792518767868EE67121797DC75EF7D76449013197925411BBEB51DF9AE1676C15193A87DEF8E743C0EEB6E032
2,967,873 UART: [art] SIG.S = CE26C303EC7DFCB076443ECCCD51EF4A5BBE1E07EBAE2B58C72B3214B2CB31ED6C3B01229B172F4BC12B45ADFE3A2A38
2,992,025 UART: Caliptra RT
2,992,278 UART: [state] CFI Enabled
3,099,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,095 UART: [rt]cmd =0x49444543, len=327
3,140,426 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
922,893 UART: [kat] LMS
1,171,221 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,400 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 ready_for_fw is high
1,176,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,161 UART: [idev] Erasing UDS.KEYID = 0
1,201,250 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,244 UART: [ldev] Erasing FE.KEYID = 1
1,243,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,132 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,461 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,988 >>> mbox cmd response: success
2,772,988 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,010 UART: [afmc] ++
2,774,178 UART: [afmc] CDI.KEYID = 6
2,774,540 UART: [afmc] SUBJECT.KEYID = 7
2,774,965 UART: [afmc] AUTHORITY.KEYID = 5
2,810,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,407 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,493 UART: [afmc] --
2,853,405 UART: [cold-reset] --
2,854,291 UART: [state] Locking Datavault
2,855,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,986 UART: [state] Locking ICCM
2,856,424 UART: [exit] Launching FMC @ 0x40000130
2,861,753 UART:
2,861,769 UART: Running Caliptra FMC ...
2,862,177 UART:
2,862,320 UART: [state] CFI Enabled
2,873,385 UART: [fht] FMC Alias Private Key: 7
2,981,202 UART: [art] Extend RT PCRs Done
2,981,630 UART: [art] Lock RT PCRs Done
2,983,214 UART: [art] Populate DV Done
2,991,227 UART: [fht] FMC Alias Private Key: 7
2,992,241 UART: [art] Derive CDI
2,992,521 UART: [art] Store in in slot 0x4
3,078,436 UART: [art] Derive Key Pair
3,078,796 UART: [art] Store priv key in slot 0x5
3,092,618 UART: [art] Derive Key Pair - Done
3,107,397 UART: [art] Signing Cert with AUTHO
3,107,877 UART: RITY.KEYID = 7
3,122,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,672 UART: [art] PUB.X = 5203B6C24FDA73713C59DBEAB90494D3B3AE0848E39D2A54CC9068885B43E99FE0171062FCA649D8E9C760F06D1E0FB7
3,130,438 UART: [art] PUB.Y = 79052EBF7E22A4DB7CAB4102ED9DF2EE197B6DBF96603857AF5C277BB4FC0AE589E3C24644169A9CD0682BFA1DB5D784
3,137,397 UART: [art] SIG.R = 9ECFBA23DC842513B1517C39CD9ABFC5B11C0795D619AEB9F086FFB49BA3F8ECCD4450A6566E9913A32D30E26BB1F7BB
3,144,186 UART: [art] SIG.S = E5B5463BFA07DE11FAD82D3E59050D04940D4F4CB5D4DF3A9139EAFC87AB1110353ACB07D7AB4129B8132FF5DBDCA0F4
3,167,289 UART: Caliptra RT
3,167,634 UART: [state] CFI Enabled
3,276,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,857 UART: [rt]cmd =0x49444543, len=327
3,317,346 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 ready_for_fw is high
1,060,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,665 >>> mbox cmd response: success
2,627,665 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,689,449 UART:
2,689,465 UART: Running Caliptra FMC ...
2,689,873 UART:
2,690,016 UART: [state] CFI Enabled
2,700,575 UART: [fht] FMC Alias Private Key: 7
2,808,624 UART: [art] Extend RT PCRs Done
2,809,052 UART: [art] Lock RT PCRs Done
2,810,804 UART: [art] Populate DV Done
2,818,851 UART: [fht] FMC Alias Private Key: 7
2,819,857 UART: [art] Derive CDI
2,820,137 UART: [art] Store in in slot 0x4
2,905,718 UART: [art] Derive Key Pair
2,906,078 UART: [art] Store priv key in slot 0x5
2,919,698 UART: [art] Derive Key Pair - Done
2,934,263 UART: [art] Signing Cert with AUTHO
2,934,743 UART: RITY.KEYID = 7
2,950,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,098 UART: [art] PUB.X = 9297A56FF1425F95E0C0EE2C6CB655E0D05773DF439C2C25C1B65104B6C5356766AC6C729F78BFFDE36D592BB8684E11
2,957,871 UART: [art] PUB.Y = E35ED00440E5CBA40B45B8FAE43483ADF6889EE147F84BF8311510E2CDF1FC99F08BB15982327C0A1CDFFA03879C3A55
2,964,823 UART: [art] SIG.R = 136C01ACB69EF6135F11B14B96084B7DAA1A68AA7899B7B4B5F632CC6731FD34183A89128A46A152FB0471E4DEC1966F
2,971,590 UART: [art] SIG.S = C0484EC9E83C86131434932B557D5ADF91DF32ADB4DB9F86AE1EBF6A131E76398B65D6A098546DB9B963A1264E078FFC
2,995,302 UART: Caliptra RT
2,995,647 UART: [state] CFI Enabled
3,105,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,765 UART: [rt]cmd =0x49444543, len=327
3,146,196 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,629 UART: [idev] ++
1,172,797 UART: [idev] CDI.KEYID = 6
1,173,158 UART: [idev] SUBJECT.KEYID = 7
1,173,583 UART: [idev] UDS.KEYID = 0
1,173,929 ready_for_fw is high
1,173,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,523 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,214,962 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,126 UART: [fwproc] Wait for Commands...
1,280,947 UART: [fwproc] Recv command 0x46574c44
1,281,680 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,355 >>> mbox cmd response: success
2,771,355 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,772,470 UART: [afmc] ++
2,772,638 UART: [afmc] CDI.KEYID = 6
2,773,001 UART: [afmc] SUBJECT.KEYID = 7
2,773,427 UART: [afmc] AUTHORITY.KEYID = 5
2,808,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,073 UART: [afmc] --
2,852,163 UART: [cold-reset] --
2,852,941 UART: [state] Locking Datavault
2,854,204 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,808 UART: [state] Locking ICCM
2,855,344 UART: [exit] Launching FMC @ 0x40000130
2,860,673 UART:
2,860,689 UART: Running Caliptra FMC ...
2,861,097 UART:
2,861,151 UART: [state] CFI Enabled
2,871,788 UART: [fht] FMC Alias Private Key: 7
2,979,767 UART: [art] Extend RT PCRs Done
2,980,195 UART: [art] Lock RT PCRs Done
2,981,661 UART: [art] Populate DV Done
2,989,792 UART: [fht] FMC Alias Private Key: 7
2,990,872 UART: [art] Derive CDI
2,991,152 UART: [art] Store in in slot 0x4
3,076,519 UART: [art] Derive Key Pair
3,076,879 UART: [art] Store priv key in slot 0x5
3,088,877 UART: [art] Derive Key Pair - Done
3,103,580 UART: [art] Signing Cert with AUTHO
3,104,060 UART: RITY.KEYID = 7
3,119,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,981 UART: [art] PUB.X = E9F95F50B3962021CF00EC68DEE16466FF79A3CE54C5898646F0EC3429FC9BA4704A24149AFD567AEA02FF29C154D082
3,126,734 UART: [art] PUB.Y = 36A8FA05D4D85AA066363A9F8BDD6BA029636C58CF9125D3C22ABBCA2E616B7E16B67310119C54D42E8C858A90F229F6
3,133,689 UART: [art] SIG.R = 1052DDAF8BE342C69E79A14D92D70EABCBFB96B2AA833A3F8F3EEF132C09F61235AE0E604F2E0E913E4BD6479171BD08
3,140,462 UART: [art] SIG.S = 95E953471CE72EBD8FA8DD61BF73E8682D00D447EEF9E5282993E1C55EEE8AB2FD6FA94F2D33389A6D73C9631E94AE23
3,164,215 UART: Caliptra RT
3,164,468 UART: [state] CFI Enabled
3,271,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,732 UART: [rt]cmd =0x49444543, len=327
3,312,284 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,900 ready_for_fw is high
1,055,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,425 >>> mbox cmd response: success
2,622,425 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,684,853 UART:
2,684,869 UART: Running Caliptra FMC ...
2,685,277 UART:
2,685,331 UART: [state] CFI Enabled
2,695,930 UART: [fht] FMC Alias Private Key: 7
2,804,047 UART: [art] Extend RT PCRs Done
2,804,475 UART: [art] Lock RT PCRs Done
2,805,981 UART: [art] Populate DV Done
2,814,054 UART: [fht] FMC Alias Private Key: 7
2,815,058 UART: [art] Derive CDI
2,815,338 UART: [art] Store in in slot 0x4
2,901,235 UART: [art] Derive Key Pair
2,901,595 UART: [art] Store priv key in slot 0x5
2,915,033 UART: [art] Derive Key Pair - Done
2,930,053 UART: [art] Signing Cert with AUTHO
2,930,533 UART: RITY.KEYID = 7
2,945,699 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,464 UART: [art] PUB.X = 2346CAA912E57E5E50F1B91436463EC09C5254054964DB88795AC881476EF07749C0720388A0B177946C8A6486D1FD6B
2,953,218 UART: [art] PUB.Y = 8CBF88AFBCA1972491589D0DE7E476404EB54DD0660BD6B4AE6DFC2E2F1A438F2600C3CE21BD5D24CA311538C73457CA
2,960,156 UART: [art] SIG.R = E208D2589461AEE17A8162C7A96B45041333BAB2461F4D155AB332BAE677B8123BD0290301C72D92CAE609D440A6421C
2,966,909 UART: [art] SIG.S = 1168A984E773331F7E08590AAB296553D6D2901583221B1762482548C97D8D77E053393EE4BA337FD6CD1C7815EFA82B
2,990,830 UART: Caliptra RT
2,991,083 UART: [state] CFI Enabled
3,098,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,377 UART: [rt]cmd =0x49444543, len=327
3,139,931 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
916,663 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,648 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,174,808 ready_for_fw is high
1,174,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,241,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,491 UART: [ldev] --
1,280,979 UART: [fwproc] Wait for Commands...
1,281,702 UART: [fwproc] Recv command 0x46574c44
1,282,435 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,968 >>> mbox cmd response: success
2,772,968 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,183 UART: [afmc] ++
2,774,351 UART: [afmc] CDI.KEYID = 6
2,774,714 UART: [afmc] SUBJECT.KEYID = 7
2,775,140 UART: [afmc] AUTHORITY.KEYID = 5
2,810,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,962 UART: [afmc] --
2,854,030 UART: [cold-reset] --
2,854,842 UART: [state] Locking Datavault
2,856,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,619 UART: [state] Locking ICCM
2,857,267 UART: [exit] Launching FMC @ 0x40000130
2,862,596 UART:
2,862,612 UART: Running Caliptra FMC ...
2,863,020 UART:
2,863,163 UART: [state] CFI Enabled
2,873,762 UART: [fht] FMC Alias Private Key: 7
2,981,121 UART: [art] Extend RT PCRs Done
2,981,549 UART: [art] Lock RT PCRs Done
2,983,189 UART: [art] Populate DV Done
2,991,358 UART: [fht] FMC Alias Private Key: 7
2,992,346 UART: [art] Derive CDI
2,992,626 UART: [art] Store in in slot 0x4
3,078,641 UART: [art] Derive Key Pair
3,079,001 UART: [art] Store priv key in slot 0x5
3,092,545 UART: [art] Derive Key Pair - Done
3,107,565 UART: [art] Signing Cert with AUTHO
3,108,045 UART: RITY.KEYID = 7
3,123,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,434 UART: [art] PUB.X = 3FCEBD48AC7AFC228579656A2919AAE32AFD3C0411535E2FC68D60781E6CC1C5FC205D2F6549812E1504AD26069B4FCB
3,131,207 UART: [art] PUB.Y = 318748EB454AED854ED8C8C2C2AE783E9E6F7685499006B58539DDCDD5F2FEDDF34D5C7E1A22B1036AD088AF587CF12A
3,138,167 UART: [art] SIG.R = 381DA2847B52E73B248F262B0D781C80E2D8FF882B9C05AEE4C6FD77A6EA5329BAD1863D31973FEA2C0E76D3207CDA52
3,144,940 UART: [art] SIG.S = 8CF480BB2D133999D0CC54AAEB1266B370D285ADCF6C2025A682BED776A6F0DDAB716A9C07B79E5767D3EAE3F6C35CF1
3,168,592 UART: Caliptra RT
3,168,937 UART: [state] CFI Enabled
3,276,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,335 UART: [rt]cmd =0x49444543, len=327
3,317,555 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,643 ready_for_fw is high
1,056,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,562 >>> mbox cmd response: success
2,623,562 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,685,360 UART:
2,685,376 UART: Running Caliptra FMC ...
2,685,784 UART:
2,685,927 UART: [state] CFI Enabled
2,696,726 UART: [fht] FMC Alias Private Key: 7
2,804,491 UART: [art] Extend RT PCRs Done
2,804,919 UART: [art] Lock RT PCRs Done
2,806,951 UART: [art] Populate DV Done
2,814,980 UART: [fht] FMC Alias Private Key: 7
2,815,932 UART: [art] Derive CDI
2,816,212 UART: [art] Store in in slot 0x4
2,901,977 UART: [art] Derive Key Pair
2,902,337 UART: [art] Store priv key in slot 0x5
2,915,617 UART: [art] Derive Key Pair - Done
2,930,442 UART: [art] Signing Cert with AUTHO
2,930,922 UART: RITY.KEYID = 7
2,946,166 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,931 UART: [art] PUB.X = 1C947937A7E4517B3AF347F50807828325D4C4D1BAF73686566F1ED46E8399FCC19FCBF488BEC866D7AA12786B7CFE7D
2,953,703 UART: [art] PUB.Y = 6ABF603849667E948C77A09DB20B0FCA79C41B821D1558059F0761A8B2CC572FC9A4245215F752326D50A86BBD32BF2C
2,960,643 UART: [art] SIG.R = 9E8AE06690A1E44583365D82285DB34758C755EB22F5BF77D04BE9CEA8E4529B164A3FE42D544081D219C3DDEEB8F9BA
2,967,423 UART: [art] SIG.S = 6DE407D0B14D85449959326E755D51A24D90DACF617F0D9ACD318F2FB7DCFA92266D1BAF6065CFBC758FEB0D19C7699B
2,991,497 UART: Caliptra RT
2,991,842 UART: [state] CFI Enabled
3,099,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,906 UART: [rt]cmd =0x49444543, len=327
3,140,567 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,381 UART: [kat] SHA2-256
882,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,427 UART: [kat] ++
886,579 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,603 UART: [cold-reset] ++
1,477,037 UART: [fht] Storing FHT @ 0x50003400
1,479,880 UART: [idev] ++
1,480,048 UART: [idev] CDI.KEYID = 6
1,480,408 UART: [idev] SUBJECT.KEYID = 7
1,480,832 UART: [idev] UDS.KEYID = 0
1,481,177 ready_for_fw is high
1,481,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,562 UART: [idev] Erasing UDS.KEYID = 0
1,505,432 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,060 UART: [idev] --
1,515,137 UART: [ldev] ++
1,515,305 UART: [ldev] CDI.KEYID = 6
1,515,668 UART: [ldev] SUBJECT.KEYID = 5
1,516,094 UART: [ldev] AUTHORITY.KEYID = 7
1,516,557 UART: [ldev] FE.KEYID = 1
1,521,709 UART: [ldev] Erasing FE.KEYID = 1
1,546,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,413 UART: [fwproc] Waiting for Commands...
1,587,196 UART: [fwproc] Received command 0x46574c44
1,587,987 UART: [fwproc] Received Image of size 114332 bytes
2,885,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,359 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,711 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,692 >>> mbox cmd response: success
3,077,692 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,720 UART: [afmc] ++
3,078,888 UART: [afmc] CDI.KEYID = 6
3,079,250 UART: [afmc] SUBJECT.KEYID = 7
3,079,675 UART: [afmc] AUTHORITY.KEYID = 5
3,114,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,054 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,447 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,137 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,086 UART: [afmc] --
3,158,040 UART: [cold-reset] --
3,158,950 UART: [state] Locking Datavault
3,160,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,829 UART: [state] Locking ICCM
3,161,409 UART: [exit] Launching FMC @ 0x40000130
3,166,738 UART:
3,166,754 UART: Running Caliptra FMC ...
3,167,162 UART:
3,167,216 UART: [state] CFI Enabled
3,177,363 UART: [fht] FMC Alias Private Key: 7
3,285,166 UART: [art] Extend RT PCRs Done
3,285,594 UART: [art] Lock RT PCRs Done
3,287,202 UART: [art] Populate DV Done
3,295,459 UART: [fht] FMC Alias Private Key: 7
3,296,597 UART: [art] Derive CDI
3,296,877 UART: [art] Store in in slot 0x4
3,382,348 UART: [art] Derive Key Pair
3,382,708 UART: [art] Store priv key in slot 0x5
3,395,766 UART: [art] Derive Key Pair - Done
3,410,422 UART: [art] Signing Cert with AUTHO
3,410,902 UART: RITY.KEYID = 7
3,426,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,863 UART: [art] PUB.X = 57C3906DABE61DDFE26A7BB02FD571E5B0DB948BA9D6348DC40602CDAEB07F51CA7D856C1962FB5E57044EEA0AADD3E0
3,433,647 UART: [art] PUB.Y = E89501824BD91CB6A63895A9CD9EF29196C16303E2771C83843E277887DD8D9FC1484988048F5088678012BAFC04B9C3
3,440,577 UART: [art] SIG.R = 2B37E760DF3DBF292163655E317CC0FA9AC4A82FE29A22A09E04D53CE52B40816EFF93B62C2F841DCC9493AA2B3B624D
3,447,358 UART: [art] SIG.S = AF9144812856BDEDDC001AA56CE94D2658774607E858B9BC3C2F206F56A937863ECC8D824668D49F1E20D0A5E750D687
3,470,288 UART: Caliptra RT
3,470,541 UART: [state] CFI Enabled
3,578,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,802 UART: [rt]cmd =0x4c444556, len=4
3,619,159 >>> mbox cmd response data (687 bytes)
3,619,160 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,287 UART: [rt]cmd =0x49444549, len=4
3,650,756 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 ready_for_fw is high
1,362,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,046 >>> mbox cmd response: success
2,928,046 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,728 UART:
2,989,744 UART: Running Caliptra FMC ...
2,990,152 UART:
2,990,206 UART: [state] CFI Enabled
3,000,781 UART: [fht] FMC Alias Private Key: 7
3,108,904 UART: [art] Extend RT PCRs Done
3,109,332 UART: [art] Lock RT PCRs Done
3,110,802 UART: [art] Populate DV Done
3,119,027 UART: [fht] FMC Alias Private Key: 7
3,120,183 UART: [art] Derive CDI
3,120,463 UART: [art] Store in in slot 0x4
3,205,832 UART: [art] Derive Key Pair
3,206,192 UART: [art] Store priv key in slot 0x5
3,219,188 UART: [art] Derive Key Pair - Done
3,234,061 UART: [art] Signing Cert with AUTHO
3,234,541 UART: RITY.KEYID = 7
3,250,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,016 UART: [art] PUB.X = C8ED9E9C9A3CF426A252E91B007F698FD8ECE14DCD4E1AACD754ED621F3F914BC107A62929120A72346B73A033809E87
3,257,768 UART: [art] PUB.Y = B3A2DEFAADCCDB250D81C41C0762E52AA42C968AA856ABE37686BEE6C6DFFE45669D34B33560BB9DD727FE6D5BC9F5D6
3,264,740 UART: [art] SIG.R = E93C046E2F1290FEC9A64B1D02EDE3AECF2E6B5876A976E19923046BE21E345D0A15A9F66ECB0945C789A8AABAEB3856
3,271,511 UART: [art] SIG.S = 60F2F8A91326A408ED1D2272DC397ACCD1781314FFE41EDDC5C5F8290BB75686A68E5CAE98C0CE72748A4435A575F592
3,294,982 UART: Caliptra RT
3,295,235 UART: [state] CFI Enabled
3,403,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,624 UART: [rt]cmd =0x4c444556, len=4
3,444,047 >>> mbox cmd response data (687 bytes)
3,444,048 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,585 UART: [rt]cmd =0x49444549, len=4
3,475,852 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
895,025 UART: [kat] SHA2-512-ACC
896,926 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,260 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 ready_for_fw is high
1,480,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,548,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,587,068 UART: [fwproc] Waiting for Commands...
1,587,893 UART: [fwproc] Received command 0x46574c44
1,588,684 UART: [fwproc] Received Image of size 114332 bytes
2,886,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,585 >>> mbox cmd response: success
3,078,585 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,821 UART: [afmc] ++
3,079,989 UART: [afmc] CDI.KEYID = 6
3,080,351 UART: [afmc] SUBJECT.KEYID = 7
3,080,776 UART: [afmc] AUTHORITY.KEYID = 5
3,116,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,148 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,838 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,659 UART: [afmc] --
3,159,607 UART: [cold-reset] --
3,160,215 UART: [state] Locking Datavault
3,161,266 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,870 UART: [state] Locking ICCM
3,162,446 UART: [exit] Launching FMC @ 0x40000130
3,167,775 UART:
3,167,791 UART: Running Caliptra FMC ...
3,168,199 UART:
3,168,342 UART: [state] CFI Enabled
3,178,713 UART: [fht] FMC Alias Private Key: 7
3,286,616 UART: [art] Extend RT PCRs Done
3,287,044 UART: [art] Lock RT PCRs Done
3,288,494 UART: [art] Populate DV Done
3,296,905 UART: [fht] FMC Alias Private Key: 7
3,298,011 UART: [art] Derive CDI
3,298,291 UART: [art] Store in in slot 0x4
3,384,194 UART: [art] Derive Key Pair
3,384,554 UART: [art] Store priv key in slot 0x5
3,398,418 UART: [art] Derive Key Pair - Done
3,413,476 UART: [art] Signing Cert with AUTHO
3,413,956 UART: RITY.KEYID = 7
3,429,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,185 UART: [art] PUB.X = 794E50B14E2CD0E75E60271F6B218A41022E57D4B5A6238652A6DC5DDE5E16C98E45178D9A04123B8933C7682D273B59
3,436,945 UART: [art] PUB.Y = 3A8464AE0308CE1D67B94DA53C7520B75A08F343A58A68DB11648FFBA27582462FF66AE33A7893506C4656813A0699F6
3,443,879 UART: [art] SIG.R = E71BA4F62C4D1E72AB9C2521C70F13499D3BCF0B992F65AFE93EE0E5243548BDDE88A8B60E3E383B69E8CE88028E3AB3
3,450,653 UART: [art] SIG.S = 945220CA494D62A72652C642285A2546E11217DC1CD298F090C624E5F3494CC900D0ECACD518C6603067F310282C13C8
3,474,142 UART: Caliptra RT
3,474,487 UART: [state] CFI Enabled
3,582,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,427 UART: [rt]cmd =0x4c444556, len=4
3,623,928 >>> mbox cmd response data (687 bytes)
3,623,929 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,144 UART: [rt]cmd =0x49444549, len=4
3,655,243 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 ready_for_fw is high
1,362,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,141 >>> mbox cmd response: success
2,927,141 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,469 UART:
2,988,485 UART: Running Caliptra FMC ...
2,988,893 UART:
2,989,036 UART: [state] CFI Enabled
2,999,775 UART: [fht] FMC Alias Private Key: 7
3,107,776 UART: [art] Extend RT PCRs Done
3,108,204 UART: [art] Lock RT PCRs Done
3,109,560 UART: [art] Populate DV Done
3,117,735 UART: [fht] FMC Alias Private Key: 7
3,118,777 UART: [art] Derive CDI
3,119,057 UART: [art] Store in in slot 0x4
3,204,908 UART: [art] Derive Key Pair
3,205,268 UART: [art] Store priv key in slot 0x5
3,218,910 UART: [art] Derive Key Pair - Done
3,233,290 UART: [art] Signing Cert with AUTHO
3,233,770 UART: RITY.KEYID = 7
3,249,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,275 UART: [art] PUB.X = B72BE94888B9DC9F935D8859096E7DB6A557B3A7E0B14EA93600C066AA31D915A637E02B5E66A92B06BB24B596DA515E
3,257,023 UART: [art] PUB.Y = A18FE36554B22BC81D68A168821D38398757D74BC6B5B9878E04A7949F511F230F1995BEB2C4DF0FCE3F654CA363D3CC
3,263,970 UART: [art] SIG.R = F866C9ED926BF3C807DDDF1C68F6574E3A9C5DF20F5BBFC8F4FAAA7B293BFCB70154DC1AFD13A5ADC0CB6442CE6F5409
3,270,760 UART: [art] SIG.S = 3F526FF71C9199A43B352FBD83BD96FCEB0B3CB7D28DBC86097F854213716737E7F4D66D534F112BF83F206ED62C74E6
3,294,483 UART: Caliptra RT
3,294,828 UART: [state] CFI Enabled
3,401,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,541 UART: [rt]cmd =0x4c444556, len=4
3,442,942 >>> mbox cmd response data (687 bytes)
3,442,943 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,588 UART: [rt]cmd =0x49444549, len=4
3,475,027 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,178 UART: [kat] SHA2-256
892,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,953 UART: [kat] ++
897,105 UART: [kat] sha1
901,447 UART: [kat] SHA2-256
903,387 UART: [kat] SHA2-384
906,088 UART: [kat] SHA2-512-ACC
907,989 UART: [kat] ECC-384
917,532 UART: [kat] HMAC-384Kdf
921,940 UART: [kat] LMS
1,170,268 UART: [kat] --
1,170,859 UART: [cold-reset] ++
1,171,187 UART: [fht] FHT @ 0x50003400
1,173,998 UART: [idev] ++
1,174,166 UART: [idev] CDI.KEYID = 6
1,174,526 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,175,295 ready_for_fw is high
1,175,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,774 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,823 >>> mbox cmd response: success
2,773,823 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,995 UART: [afmc] ++
2,775,163 UART: [afmc] CDI.KEYID = 6
2,775,525 UART: [afmc] SUBJECT.KEYID = 7
2,775,950 UART: [afmc] AUTHORITY.KEYID = 5
2,811,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,742 UART: [afmc] --
2,854,778 UART: [cold-reset] --
2,855,552 UART: [state] Locking Datavault
2,856,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,343 UART: [state] Locking ICCM
2,857,763 UART: [exit] Launching FMC @ 0x40000130
2,863,092 UART:
2,863,108 UART: Running Caliptra FMC ...
2,863,516 UART:
2,863,570 UART: [state] CFI Enabled
2,873,795 UART: [fht] FMC Alias Private Key: 7
2,981,492 UART: [art] Extend RT PCRs Done
2,981,920 UART: [art] Lock RT PCRs Done
2,983,734 UART: [art] Populate DV Done
2,992,085 UART: [fht] FMC Alias Private Key: 7
2,993,085 UART: [art] Derive CDI
2,993,365 UART: [art] Store in in slot 0x4
3,079,054 UART: [art] Derive Key Pair
3,079,414 UART: [art] Store priv key in slot 0x5
3,092,702 UART: [art] Derive Key Pair - Done
3,107,652 UART: [art] Signing Cert with AUTHO
3,108,132 UART: RITY.KEYID = 7
3,122,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,711 UART: [art] PUB.X = FD02F66645A465F948063092FC37623DA929A149375ED196497D5A4727AA2371143A5261641AE6F88D9573F4E9CC35DA
3,130,467 UART: [art] PUB.Y = 7BF05D3171F6E2DFE5BBC8EC94E71F9E62E07D77FB223031EFF74F46ADA3AB70586CF0F7630521DAFD809F381879F7B4
3,137,430 UART: [art] SIG.R = 387818C4BFA85AD2F119A3805B4395D03572F14626974B57D9634BEA0C0C2FDF61B947780111156753334B0537F77BE0
3,144,178 UART: [art] SIG.S = 103550F82BB0984CFDE022C12D418A23A5184DE0A8219B74E0F2BB2FFCD281E9ACFCD90C570A1131C85CC8DBFE6D1F15
3,167,649 UART: Caliptra RT
3,167,902 UART: [state] CFI Enabled
3,274,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,387 UART: [rt]cmd =0x4c444556, len=4
3,315,914 >>> mbox cmd response data (687 bytes)
3,315,915 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,304 UART: [rt]cmd =0x49444549, len=4
3,347,563 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,413 ready_for_fw is high
1,060,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,604 >>> mbox cmd response: success
2,626,604 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,689,778 UART:
2,689,794 UART: Running Caliptra FMC ...
2,690,202 UART:
2,690,256 UART: [state] CFI Enabled
2,700,405 UART: [fht] FMC Alias Private Key: 7
2,808,120 UART: [art] Extend RT PCRs Done
2,808,548 UART: [art] Lock RT PCRs Done
2,810,312 UART: [art] Populate DV Done
2,818,485 UART: [fht] FMC Alias Private Key: 7
2,819,497 UART: [art] Derive CDI
2,819,777 UART: [art] Store in in slot 0x4
2,905,184 UART: [art] Derive Key Pair
2,905,544 UART: [art] Store priv key in slot 0x5
2,918,320 UART: [art] Derive Key Pair - Done
2,933,061 UART: [art] Signing Cert with AUTHO
2,933,541 UART: RITY.KEYID = 7
2,948,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,462 UART: [art] PUB.X = 6A9B132A5BFEC407046E65796723F2A9303023E4AFCEB5667E8C382E26848BC99CE816FE8528FDFB2677F51EB7EBB7A2
2,956,236 UART: [art] PUB.Y = B97BCBB7A8D533EFA63984E76B934617E77FD215FF3F20AE4C2AB30CA1AB6B1B3A3C5624C9E05615F8E61E5C6FE142F5
2,963,201 UART: [art] SIG.R = 31AD6FEE2B6E8CEB48A8F09E03015C8FC76807C3A8ABD8A73E1D11F08514242AE69EC8E40C2D0A363C5F3EAC566C07FB
2,969,973 UART: [art] SIG.S = C0858A038A3A0511C6224064E590773841FE94F76B812D9CD52C901221B504A46E6D7B5D91796E2EFA0AFA434D2AC566
2,994,238 UART: Caliptra RT
2,994,491 UART: [state] CFI Enabled
3,102,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,800 UART: [rt]cmd =0x4c444556, len=4
3,143,047 >>> mbox cmd response data (687 bytes)
3,143,048 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,339 UART: [rt]cmd =0x49444549, len=4
3,174,730 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,637 UART: [kat] SHA2-512-ACC
908,538 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,531 UART: [idev] ++
1,175,699 UART: [idev] CDI.KEYID = 6
1,176,059 UART: [idev] SUBJECT.KEYID = 7
1,176,483 UART: [idev] UDS.KEYID = 0
1,176,828 ready_for_fw is high
1,176,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,990 UART: [idev] --
1,211,040 UART: [ldev] ++
1,211,208 UART: [ldev] CDI.KEYID = 6
1,211,571 UART: [ldev] SUBJECT.KEYID = 5
1,211,997 UART: [ldev] AUTHORITY.KEYID = 7
1,212,460 UART: [ldev] FE.KEYID = 1
1,217,898 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,208 UART: [ldev] --
1,284,579 UART: [fwproc] Wait for Commands...
1,285,287 UART: [fwproc] Recv command 0x46574c44
1,286,015 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,034 >>> mbox cmd response: success
2,777,034 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,778,244 UART: [afmc] ++
2,778,412 UART: [afmc] CDI.KEYID = 6
2,778,774 UART: [afmc] SUBJECT.KEYID = 7
2,779,199 UART: [afmc] AUTHORITY.KEYID = 5
2,815,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,609 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,783 UART: [afmc] --
2,858,665 UART: [cold-reset] --
2,859,563 UART: [state] Locking Datavault
2,860,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,582 UART: [state] Locking ICCM
2,862,222 UART: [exit] Launching FMC @ 0x40000130
2,867,551 UART:
2,867,567 UART: Running Caliptra FMC ...
2,867,975 UART:
2,868,118 UART: [state] CFI Enabled
2,878,601 UART: [fht] FMC Alias Private Key: 7
2,986,118 UART: [art] Extend RT PCRs Done
2,986,546 UART: [art] Lock RT PCRs Done
2,988,200 UART: [art] Populate DV Done
2,996,447 UART: [fht] FMC Alias Private Key: 7
2,997,571 UART: [art] Derive CDI
2,997,851 UART: [art] Store in in slot 0x4
3,083,600 UART: [art] Derive Key Pair
3,083,960 UART: [art] Store priv key in slot 0x5
3,097,834 UART: [art] Derive Key Pair - Done
3,112,422 UART: [art] Signing Cert with AUTHO
3,112,902 UART: RITY.KEYID = 7
3,128,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,039 UART: [art] PUB.X = 0AA9F2BB86CA132882AEA5E3E854437D2935458B68AE381032CC51B0F5540B437D44BDFFB8EFFFBB8B2F9C2DFE1BE510
3,135,823 UART: [art] PUB.Y = C57E89EEAC4D29CED85B64A2EA1E3A9A349933105900B8E0E45054FF73AEA5615A86462AE49FD8E13E2257969ED0DAB9
3,142,763 UART: [art] SIG.R = 88D8DE99A997457CD97BAD9FE789A69D1FCE6E4F32F94B8C42BF5FB123FA57CE4D17472D337E91C24D107CECDAA80BE2
3,149,552 UART: [art] SIG.S = C65BC5DDD0118F264367B2A66C1C896FAA791FB7EC0DAE7A17D7AF86220ABE146F800FAFBC57764F5684D879EC1B4B88
3,173,246 UART: Caliptra RT
3,173,591 UART: [state] CFI Enabled
3,280,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,659 UART: [rt]cmd =0x4c444556, len=4
3,321,202 >>> mbox cmd response data (687 bytes)
3,321,203 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,530 UART: [rt]cmd =0x49444549, len=4
3,352,963 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,110 ready_for_fw is high
1,060,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,819 >>> mbox cmd response: success
2,625,819 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,345 UART:
2,688,361 UART: Running Caliptra FMC ...
2,688,769 UART:
2,688,912 UART: [state] CFI Enabled
2,699,267 UART: [fht] FMC Alias Private Key: 7
2,806,570 UART: [art] Extend RT PCRs Done
2,806,998 UART: [art] Lock RT PCRs Done
2,808,318 UART: [art] Populate DV Done
2,816,769 UART: [fht] FMC Alias Private Key: 7
2,817,907 UART: [art] Derive CDI
2,818,187 UART: [art] Store in in slot 0x4
2,903,910 UART: [art] Derive Key Pair
2,904,270 UART: [art] Store priv key in slot 0x5
2,917,398 UART: [art] Derive Key Pair - Done
2,931,916 UART: [art] Signing Cert with AUTHO
2,932,396 UART: RITY.KEYID = 7
2,947,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,109 UART: [art] PUB.X = 8EEE94821C4BA9A876A8CF5B39D6BCA5425C30D1974B3F56378359953798A9AFB447B1482075F035A6EF17654BE68CD7
2,954,881 UART: [art] PUB.Y = C1D74AE92CD228F3994C812795C94496943CDE3C1CCD666C0706509E08871902FC826E71FB9D908848E02FFF0CA01506
2,961,811 UART: [art] SIG.R = 906E19E63C53255BB3DC8AD5BB943FAAF8C7A3A182F8704C8D081930CC195556A5DE72714E1CBB2013BF5835A8A094AB
2,968,588 UART: [art] SIG.S = E080C13CAD5E0A53363E5F5C536BC7526DD4B29BA7A68A6340BE0AF54D1C6E44012EC303D8B1D3B955DA3349A09F2167
2,992,103 UART: Caliptra RT
2,992,448 UART: [state] CFI Enabled
3,101,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,524 UART: [rt]cmd =0x4c444556, len=4
3,142,069 >>> mbox cmd response data (687 bytes)
3,142,070 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,661 UART: [rt]cmd =0x49444549, len=4
3,174,090 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 ready_for_fw is high
1,174,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,349 UART: [idev] --
1,209,518 UART: [ldev] ++
1,209,686 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,477 UART: [ldev] AUTHORITY.KEYID = 7
1,210,940 UART: [ldev] FE.KEYID = 1
1,216,032 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,328 UART: [fwproc] Wait for Commands...
1,281,929 UART: [fwproc] Recv command 0x46574c44
1,282,662 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,329 >>> mbox cmd response: success
2,772,329 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,504 UART: [afmc] ++
2,773,672 UART: [afmc] CDI.KEYID = 6
2,774,035 UART: [afmc] SUBJECT.KEYID = 7
2,774,461 UART: [afmc] AUTHORITY.KEYID = 5
2,810,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,333 UART: [afmc] --
2,853,265 UART: [cold-reset] --
2,853,923 UART: [state] Locking Datavault
2,855,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,644 UART: [state] Locking ICCM
2,856,312 UART: [exit] Launching FMC @ 0x40000130
2,861,641 UART:
2,861,657 UART: Running Caliptra FMC ...
2,862,065 UART:
2,862,119 UART: [state] CFI Enabled
2,872,108 UART: [fht] FMC Alias Private Key: 7
2,979,821 UART: [art] Extend RT PCRs Done
2,980,249 UART: [art] Lock RT PCRs Done
2,981,993 UART: [art] Populate DV Done
2,990,242 UART: [fht] FMC Alias Private Key: 7
2,991,280 UART: [art] Derive CDI
2,991,560 UART: [art] Store in in slot 0x4
3,077,373 UART: [art] Derive Key Pair
3,077,733 UART: [art] Store priv key in slot 0x5
3,091,139 UART: [art] Derive Key Pair - Done
3,105,303 UART: [art] Signing Cert with AUTHO
3,105,783 UART: RITY.KEYID = 7
3,120,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,486 UART: [art] PUB.X = 299C2AEFDE0308E39B166D11D53E068AEC0EBA4E6F248DD0F21AD4774091EF4FDD6B74D21988130AD362CBD67D79C849
3,128,255 UART: [art] PUB.Y = FF12E1052CA3549A10E621E24D2A9F3685FB5F5B4F2AB72AEF26068D0A186840169BBAA4780FA15047E7E0615EDD147D
3,135,201 UART: [art] SIG.R = 18342493387E00AD3DA30BE016CAF3C40832899F04B5FF8A8892BB6A86F18011AD882E90947C210AE73D814C6E97E570
3,141,935 UART: [art] SIG.S = 37282AB511336FE2893A0E091AA561904765A8C00E254F24F7967A9555A69D8F1BC82312627FF1D1ECCC8AA534867FC3
3,165,731 UART: Caliptra RT
3,165,984 UART: [state] CFI Enabled
3,272,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,479 UART: [rt]cmd =0x4c444556, len=4
3,313,714 >>> mbox cmd response data (687 bytes)
3,313,715 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,072 UART: [rt]cmd =0x49444549, len=4
3,345,465 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 ready_for_fw is high
1,055,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,749 >>> mbox cmd response: success
2,621,749 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,505 UART:
2,684,521 UART: Running Caliptra FMC ...
2,684,929 UART:
2,684,983 UART: [state] CFI Enabled
2,695,642 UART: [fht] FMC Alias Private Key: 7
2,803,531 UART: [art] Extend RT PCRs Done
2,803,959 UART: [art] Lock RT PCRs Done
2,805,607 UART: [art] Populate DV Done
2,813,710 UART: [fht] FMC Alias Private Key: 7
2,814,774 UART: [art] Derive CDI
2,815,054 UART: [art] Store in in slot 0x4
2,900,247 UART: [art] Derive Key Pair
2,900,607 UART: [art] Store priv key in slot 0x5
2,913,923 UART: [art] Derive Key Pair - Done
2,928,638 UART: [art] Signing Cert with AUTHO
2,929,118 UART: RITY.KEYID = 7
2,944,022 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,787 UART: [art] PUB.X = CF8DB1FF3968543290AF0F5EE8716ABADF38171D74417924578FC89ED3FA581DF75EB11036063FDD9AF519593A69FAA2
2,951,561 UART: [art] PUB.Y = 48DA8DAEB6A783B326ECFA68FA1F17DBBA971963A0C1F39B8C12649930CCFF262FB4A87E4C0F59EA75206F88AFDBBE0F
2,958,531 UART: [art] SIG.R = E95CD29A1BF3AC8EA5539BCA186E5C74C309B3EE80A75333A776DB50FEDCE63295CF5C10A507CBE3FBB7E704B87AC5C5
2,965,316 UART: [art] SIG.S = E43D2E226C0E4E4EFE508646CD7C14667D79C1DCEBEB7AA5FAD4413EC93595A74F88EAB2D3E2F6D87B35AFCD4481EC4B
2,989,006 UART: Caliptra RT
2,989,259 UART: [state] CFI Enabled
3,096,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,097 UART: [rt]cmd =0x4c444556, len=4
3,137,464 >>> mbox cmd response data (687 bytes)
3,137,465 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,644 UART: [rt]cmd =0x49444549, len=4
3,168,871 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,174,814 ready_for_fw is high
1,174,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,222 UART: [fwproc] Recv command 0x46574c44
1,282,955 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,566 >>> mbox cmd response: success
2,773,566 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,631 UART: [afmc] ++
2,774,799 UART: [afmc] CDI.KEYID = 6
2,775,162 UART: [afmc] SUBJECT.KEYID = 7
2,775,588 UART: [afmc] AUTHORITY.KEYID = 5
2,811,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,912 UART: [afmc] --
2,855,024 UART: [cold-reset] --
2,856,008 UART: [state] Locking Datavault
2,857,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,877 UART: [state] Locking ICCM
2,858,435 UART: [exit] Launching FMC @ 0x40000130
2,863,764 UART:
2,863,780 UART: Running Caliptra FMC ...
2,864,188 UART:
2,864,331 UART: [state] CFI Enabled
2,874,984 UART: [fht] FMC Alias Private Key: 7
2,983,003 UART: [art] Extend RT PCRs Done
2,983,431 UART: [art] Lock RT PCRs Done
2,984,931 UART: [art] Populate DV Done
2,993,014 UART: [fht] FMC Alias Private Key: 7
2,994,086 UART: [art] Derive CDI
2,994,366 UART: [art] Store in in slot 0x4
3,079,967 UART: [art] Derive Key Pair
3,080,327 UART: [art] Store priv key in slot 0x5
3,093,563 UART: [art] Derive Key Pair - Done
3,108,099 UART: [art] Signing Cert with AUTHO
3,108,579 UART: RITY.KEYID = 7
3,123,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,752 UART: [art] PUB.X = 93D3EE5369E6D03625FA9778433CF66268C9E748E26A226A482D763C2BD998BA282CC813C2D539591D81635FF4F7D0C0
3,131,520 UART: [art] PUB.Y = E9034BE2B6B12B9CB984EDE6E8A18D7F29ADC351DEDE12B8190BD39B75EA542044E56C2B684F00E85CB24423406B323B
3,138,454 UART: [art] SIG.R = 6B5EB9F6B8620C55C47999D3C136A8CE5467A44BE1029A2FC009FC712B8586B29E2B935E199C15ACF4759D0593A918FB
3,145,216 UART: [art] SIG.S = C14076279802B22A08B70B03E4C887DDE823972E21A624E03494704B2C88F6BD9441FD8C78E59A4E69924B3850D537E6
3,169,201 UART: Caliptra RT
3,169,546 UART: [state] CFI Enabled
3,276,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,529 UART: [rt]cmd =0x4c444556, len=4
3,318,050 >>> mbox cmd response data (687 bytes)
3,318,051 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,380 UART: [rt]cmd =0x49444549, len=4
3,349,719 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 ready_for_fw is high
1,056,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,738 >>> mbox cmd response: success
2,621,738 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,660 UART:
2,683,676 UART: Running Caliptra FMC ...
2,684,084 UART:
2,684,227 UART: [state] CFI Enabled
2,695,196 UART: [fht] FMC Alias Private Key: 7
2,803,491 UART: [art] Extend RT PCRs Done
2,803,919 UART: [art] Lock RT PCRs Done
2,805,595 UART: [art] Populate DV Done
2,813,982 UART: [fht] FMC Alias Private Key: 7
2,814,936 UART: [art] Derive CDI
2,815,216 UART: [art] Store in in slot 0x4
2,900,945 UART: [art] Derive Key Pair
2,901,305 UART: [art] Store priv key in slot 0x5
2,914,443 UART: [art] Derive Key Pair - Done
2,929,094 UART: [art] Signing Cert with AUTHO
2,929,574 UART: RITY.KEYID = 7
2,944,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,333 UART: [art] PUB.X = 97470023DA9336A1AEBB8C61C2E65AE2E30E2956DC8B2C7622C93CB35E8A1798D7332C84B72F6596699DD19552E76062
2,952,076 UART: [art] PUB.Y = 2E955B19DD08A4FD6C3157A43EDD541363BBC44A0FBA335ECE89DBAB6E1B3E7128104692E417DE43467C0FD75CDB34AF
2,959,035 UART: [art] SIG.R = 98998965F3DFED898171240969FD17BDE061BF4BFB02543C136495D19FDFC5E6623D1C0A514134C26E7DCE7C1CB7BE4E
2,965,806 UART: [art] SIG.S = A8C40B36B206B70DF15589660C74A129762D0CEE4708F013BD98E13BCBD1164AAF8E6527CB43335B6B1ADD4F8D77DD3E
2,989,887 UART: Caliptra RT
2,990,232 UART: [state] CFI Enabled
3,097,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,060 UART: [rt]cmd =0x4c444556, len=4
3,138,609 >>> mbox cmd response data (687 bytes)
3,138,610 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,095 UART: [rt]cmd =0x49444549, len=4
3,170,392 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,401 UART: [kat] SHA2-256
882,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,447 UART: [kat] ++
886,599 UART: [kat] sha1
890,777 UART: [kat] SHA2-256
892,715 UART: [kat] SHA2-384
895,482 UART: [kat] SHA2-512-ACC
897,383 UART: [kat] ECC-384
903,062 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,845 UART: [cold-reset] ++
1,477,287 UART: [fht] Storing FHT @ 0x50003400
1,480,058 UART: [idev] ++
1,480,226 UART: [idev] CDI.KEYID = 6
1,480,586 UART: [idev] SUBJECT.KEYID = 7
1,481,010 UART: [idev] UDS.KEYID = 0
1,481,355 ready_for_fw is high
1,481,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,774 UART: [idev] Erasing UDS.KEYID = 0
1,505,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,742 UART: [idev] --
1,514,939 UART: [ldev] ++
1,515,107 UART: [ldev] CDI.KEYID = 6
1,515,470 UART: [ldev] SUBJECT.KEYID = 5
1,515,896 UART: [ldev] AUTHORITY.KEYID = 7
1,516,359 UART: [ldev] FE.KEYID = 1
1,521,559 UART: [ldev] Erasing FE.KEYID = 1
1,546,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,038 UART: [ldev] --
1,586,509 UART: [fwproc] Waiting for Commands...
1,587,270 UART: [fwproc] Received command 0x46574c44
1,588,061 UART: [fwproc] Received Image of size 114332 bytes
2,885,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,493 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,654 >>> mbox cmd response: success
3,077,654 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,790 UART: [afmc] ++
3,078,958 UART: [afmc] CDI.KEYID = 6
3,079,320 UART: [afmc] SUBJECT.KEYID = 7
3,079,745 UART: [afmc] AUTHORITY.KEYID = 5
3,114,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,319 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,009 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,954 UART: [afmc] --
3,157,962 UART: [cold-reset] --
3,158,770 UART: [state] Locking Datavault
3,159,939 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,543 UART: [state] Locking ICCM
3,161,103 UART: [exit] Launching FMC @ 0x40000130
3,166,432 UART:
3,166,448 UART: Running Caliptra FMC ...
3,166,856 UART:
3,166,910 UART: [state] CFI Enabled
3,177,099 UART: [fht] FMC Alias Private Key: 7
3,285,500 UART: [art] Extend RT PCRs Done
3,285,928 UART: [art] Lock RT PCRs Done
3,287,306 UART: [art] Populate DV Done
3,295,639 UART: [fht] FMC Alias Private Key: 7
3,296,731 UART: [art] Derive CDI
3,297,011 UART: [art] Store in in slot 0x4
3,382,510 UART: [art] Derive Key Pair
3,382,870 UART: [art] Store priv key in slot 0x5
3,396,498 UART: [art] Derive Key Pair - Done
3,411,124 UART: [art] Signing Cert with AUTHO
3,411,604 UART: RITY.KEYID = 7
3,426,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,157 UART: [art] PUB.X = F22F5E54F12C3FDF553A111F551223F567C78377DA4196332653EB749141EEAA8B67479DB7AD70A6F32DE6CAFA29851E
3,433,933 UART: [art] PUB.Y = B2AA2FF6C835B4B4B68DC298279E45124E9EAA749092079CDDA2FC1E21A4507F3CEBFB4226B7E21DDF8A66BBBFAC5211
3,440,902 UART: [art] SIG.R = 6DF4B930525B068E32E180ECE6E6D144ABCC580DF080DF41121910163EBCE8402F67AB25F0F819BBF1BA746A5EE9F7FA
3,447,682 UART: [art] SIG.S = 90B84A4552C13FFCABA86A60B6247D79EEF628A2EA10F4C750910A34F0706368573E307CEBCA9A40B15CC15858BC29DF
3,471,410 UART: Caliptra RT
3,471,663 UART: [state] CFI Enabled
3,579,134 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,586 UART: [rt]cmd =0x43455246, len=4
3,621,801 >>> mbox cmd response data (920 bytes)
3,621,802 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,269 UART: [rt]cmd =0x43455252, len=4
3,662,225 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 ready_for_fw is high
1,362,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,850 >>> mbox cmd response: success
2,925,850 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,987,598 UART:
2,987,614 UART: Running Caliptra FMC ...
2,988,022 UART:
2,988,076 UART: [state] CFI Enabled
2,999,117 UART: [fht] FMC Alias Private Key: 7
3,106,830 UART: [art] Extend RT PCRs Done
3,107,258 UART: [art] Lock RT PCRs Done
3,108,664 UART: [art] Populate DV Done
3,116,799 UART: [fht] FMC Alias Private Key: 7
3,117,917 UART: [art] Derive CDI
3,118,197 UART: [art] Store in in slot 0x4
3,203,958 UART: [art] Derive Key Pair
3,204,318 UART: [art] Store priv key in slot 0x5
3,217,566 UART: [art] Derive Key Pair - Done
3,232,439 UART: [art] Signing Cert with AUTHO
3,232,919 UART: RITY.KEYID = 7
3,248,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,154 UART: [art] PUB.X = 6D68E4F672EF4840726891F426521821A8E6BBC311D4B52C0808B79944F3213E2977768AFB27173AA299827D95F9B162
3,255,906 UART: [art] PUB.Y = 3465C803DEDEE6C580657E8F93B233BE4915A0BA40290EAA729F7FE96A84AAAEFF96AC9218B8D42C3939133382E23A9F
3,262,860 UART: [art] SIG.R = 248E62086B5B133E1683060551BD89854018FBE4324E1EEE73F9710C52ACCB88251D3B06F16B3DF22E53EC78E673739F
3,269,613 UART: [art] SIG.S = 2172660BA28F402F7007740B1F5D1E4076CB2EB0247D70216F312502ACA8F2FBAE506207129B9EFBF5739DD5EE4F5B47
3,293,491 UART: Caliptra RT
3,293,744 UART: [state] CFI Enabled
3,401,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,916 UART: [rt]cmd =0x43455246, len=4
3,444,263 >>> mbox cmd response data (920 bytes)
3,444,264 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,501 UART: [rt]cmd =0x43455252, len=4
3,484,345 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,408 UART: [kat] SHA2-256
892,346 UART: [kat] SHA2-384
894,951 UART: [kat] SHA2-512-ACC
896,852 UART: [kat] ECC-384
902,221 UART: [kat] HMAC-384Kdf
906,957 UART: [kat] LMS
1,475,153 UART: [kat] --
1,476,098 UART: [cold-reset] ++
1,476,664 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 ready_for_fw is high
1,480,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,321 UART: [idev] Erasing UDS.KEYID = 0
1,504,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,537 UART: [idev] --
1,514,432 UART: [ldev] ++
1,514,600 UART: [ldev] CDI.KEYID = 6
1,514,963 UART: [ldev] SUBJECT.KEYID = 5
1,515,389 UART: [ldev] AUTHORITY.KEYID = 7
1,515,852 UART: [ldev] FE.KEYID = 1
1,521,014 UART: [ldev] Erasing FE.KEYID = 1
1,546,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,625 UART: [ldev] --
1,585,924 UART: [fwproc] Waiting for Commands...
1,586,659 UART: [fwproc] Received command 0x46574c44
1,587,450 UART: [fwproc] Received Image of size 114332 bytes
2,885,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,791 >>> mbox cmd response: success
3,077,791 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,949 UART: [afmc] ++
3,079,117 UART: [afmc] CDI.KEYID = 6
3,079,479 UART: [afmc] SUBJECT.KEYID = 7
3,079,904 UART: [afmc] AUTHORITY.KEYID = 5
3,115,693 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,037 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,817 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,430 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,120 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,039 UART: [afmc] --
3,159,151 UART: [cold-reset] --
3,159,757 UART: [state] Locking Datavault
3,160,942 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,546 UART: [state] Locking ICCM
3,162,016 UART: [exit] Launching FMC @ 0x40000130
3,167,345 UART:
3,167,361 UART: Running Caliptra FMC ...
3,167,769 UART:
3,167,912 UART: [state] CFI Enabled
3,178,517 UART: [fht] FMC Alias Private Key: 7
3,286,126 UART: [art] Extend RT PCRs Done
3,286,554 UART: [art] Lock RT PCRs Done
3,288,136 UART: [art] Populate DV Done
3,296,441 UART: [fht] FMC Alias Private Key: 7
3,297,381 UART: [art] Derive CDI
3,297,661 UART: [art] Store in in slot 0x4
3,383,428 UART: [art] Derive Key Pair
3,383,788 UART: [art] Store priv key in slot 0x5
3,397,232 UART: [art] Derive Key Pair - Done
3,411,734 UART: [art] Signing Cert with AUTHO
3,412,214 UART: RITY.KEYID = 7
3,427,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,393 UART: [art] PUB.X = C34B41B7BAF7B84AB6D320661B871EF9B88F785183187288076F4AA6587DA34753DEDF3109B7F8F4CEC4A6174B41A06D
3,435,163 UART: [art] PUB.Y = 5A2AC22A285969A33A130B5D6F565B986E1CCA88FDDBDF4B195F8B5262AC3CE5D5831ED8F602FEC8743AD82A3B5A635C
3,442,125 UART: [art] SIG.R = F30FEA9DB0C69D5A8299B6CFAFFE92DA4120FED7470176968E6C490E43AAEECFC9E3A1F33248360F4833811E23C2E7C2
3,448,899 UART: [art] SIG.S = 2D681159069A660AB6135745966A58333918C3E781A64D7BB06996F6400BD62E52293F8B18C8535CD00E6285EFF848C7
3,472,800 UART: Caliptra RT
3,473,145 UART: [state] CFI Enabled
3,581,444 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,906 UART: [rt]cmd =0x43455246, len=4
3,624,267 >>> mbox cmd response data (920 bytes)
3,624,268 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,633 UART: [rt]cmd =0x43455252, len=4
3,664,447 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 ready_for_fw is high
1,363,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,083 >>> mbox cmd response: success
2,928,083 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,990,071 UART:
2,990,087 UART: Running Caliptra FMC ...
2,990,495 UART:
2,990,638 UART: [state] CFI Enabled
3,001,043 UART: [fht] FMC Alias Private Key: 7
3,108,782 UART: [art] Extend RT PCRs Done
3,109,210 UART: [art] Lock RT PCRs Done
3,110,752 UART: [art] Populate DV Done
3,119,103 UART: [fht] FMC Alias Private Key: 7
3,120,111 UART: [art] Derive CDI
3,120,391 UART: [art] Store in in slot 0x4
3,206,232 UART: [art] Derive Key Pair
3,206,592 UART: [art] Store priv key in slot 0x5
3,219,206 UART: [art] Derive Key Pair - Done
3,233,685 UART: [art] Signing Cert with AUTHO
3,234,165 UART: RITY.KEYID = 7
3,249,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,046 UART: [art] PUB.X = 1BD5AEDE49A9AE861F295E7D4568FC4A762AE33B03D112845DF77B4179C95E6C62F184882AF747EA20B2105C44EDD6C4
3,256,823 UART: [art] PUB.Y = 81A18AD7CDC02D5FADE0186B87D17A4188900F466923AF7660F0E29E4BE45B1913FB3480A167DA3460AD75EC73E39BA2
3,263,778 UART: [art] SIG.R = 02C0AFF7326D8728D5027BA0F6D8BB18D5F719F5D807A8B36921972310A3C882B465539DA4BA5B0894481E7AC022FB43
3,270,536 UART: [art] SIG.S = 5D4A8B116438C0CB971CB2A2FB5D70967EAA0F23AC138FE287133B4BC9725DD8873F8A215B01CAE95B21F8D831C96201
3,293,932 UART: Caliptra RT
3,294,277 UART: [state] CFI Enabled
3,402,285 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,451 UART: [rt]cmd =0x43455246, len=4
3,444,794 >>> mbox cmd response data (920 bytes)
3,444,795 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,272 UART: [rt]cmd =0x43455252, len=4
3,485,128 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
893,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,441 UART: [kat] ++
897,593 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,794 UART: [kat] SHA2-512-ACC
908,695 UART: [kat] ECC-384
918,352 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,615 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 ready_for_fw is high
1,176,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,716 UART: [idev] Erasing UDS.KEYID = 0
1,200,483 UART: [idev] Sha1 KeyId Algorithm
1,208,825 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,648 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,919 >>> mbox cmd response: success
2,773,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,065 UART: [afmc] ++
2,775,233 UART: [afmc] CDI.KEYID = 6
2,775,595 UART: [afmc] SUBJECT.KEYID = 7
2,776,020 UART: [afmc] AUTHORITY.KEYID = 5
2,811,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,962 UART: [afmc] --
2,854,996 UART: [cold-reset] --
2,855,924 UART: [state] Locking Datavault
2,857,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,905 UART: [state] Locking ICCM
2,858,481 UART: [exit] Launching FMC @ 0x40000130
2,863,810 UART:
2,863,826 UART: Running Caliptra FMC ...
2,864,234 UART:
2,864,288 UART: [state] CFI Enabled
2,875,151 UART: [fht] FMC Alias Private Key: 7
2,983,678 UART: [art] Extend RT PCRs Done
2,984,106 UART: [art] Lock RT PCRs Done
2,985,484 UART: [art] Populate DV Done
2,993,453 UART: [fht] FMC Alias Private Key: 7
2,994,423 UART: [art] Derive CDI
2,994,703 UART: [art] Store in in slot 0x4
3,080,496 UART: [art] Derive Key Pair
3,080,856 UART: [art] Store priv key in slot 0x5
3,094,060 UART: [art] Derive Key Pair - Done
3,108,873 UART: [art] Signing Cert with AUTHO
3,109,353 UART: RITY.KEYID = 7
3,124,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,190 UART: [art] PUB.X = 07C22E376610AC999D910F28EB37945C64891B53E55B0E19356F1B269922F484199B71E91C640601ED99C7DF306840BE
3,131,935 UART: [art] PUB.Y = D64A4A49714390CA60C447A8F40F277F57C3C9897C3D34034FD8112E38714CE8B2C2FF09729065C77E9BCE020079718D
3,138,847 UART: [art] SIG.R = 42DF29F8A37983FCE2BA42DE8B6A7915F8E57473F5612D2F8DEAA45728A3B696830E753A03F96FC180E830A466A44845
3,145,613 UART: [art] SIG.S = E2E421790DD27947CBFED5C650611754E068363171DADDF376168CF0D24FF705382B291B600E762BA30CECEF4D9009EC
3,169,093 UART: Caliptra RT
3,169,346 UART: [state] CFI Enabled
3,277,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,535 UART: [rt]cmd =0x43455246, len=4
3,320,782 >>> mbox cmd response data (887 bytes)
3,320,783 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,970 UART: [rt]cmd =0x43455252, len=4
3,360,946 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,399 ready_for_fw is high
1,060,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,236 >>> mbox cmd response: success
2,626,236 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,689,406 UART:
2,689,422 UART: Running Caliptra FMC ...
2,689,830 UART:
2,689,884 UART: [state] CFI Enabled
2,700,597 UART: [fht] FMC Alias Private Key: 7
2,808,146 UART: [art] Extend RT PCRs Done
2,808,574 UART: [art] Lock RT PCRs Done
2,810,228 UART: [art] Populate DV Done
2,818,413 UART: [fht] FMC Alias Private Key: 7
2,819,461 UART: [art] Derive CDI
2,819,741 UART: [art] Store in in slot 0x4
2,905,540 UART: [art] Derive Key Pair
2,905,900 UART: [art] Store priv key in slot 0x5
2,919,220 UART: [art] Derive Key Pair - Done
2,933,839 UART: [art] Signing Cert with AUTHO
2,934,319 UART: RITY.KEYID = 7
2,949,391 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,156 UART: [art] PUB.X = D1E4F71AD5E5D30664F5862A0FCC7A657CD8E2BF108A8E2F0E6CEAE174CCB09FFF2A70CB17EC8B20C783C3822C2BB103
2,956,938 UART: [art] PUB.Y = 466DB4E0F22F65AEC4B46DAC5B2889166694E48CA0A20D7EC8FD9DF0CDCC8F8528280E316BFA9E2B85CA55C01C577530
2,963,898 UART: [art] SIG.R = F73595BB6296D2CB53D10D6885442B5EF77D00DFC690799865A45484D9FA2B4086AFC78DEEBE2E289394C52F3EB1849B
2,970,649 UART: [art] SIG.S = 6AD2BF97391211BCD1DAEADE704532854F470E5B254BF2199ABBC4972E67A8B68D2A1A500061F1D2158619CE82EC85F7
2,994,677 UART: Caliptra RT
2,994,930 UART: [state] CFI Enabled
3,102,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,573 UART: [rt]cmd =0x43455246, len=4
3,144,504 >>> mbox cmd response data (887 bytes)
3,144,505 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,158 UART: [rt]cmd =0x43455252, len=4
3,184,988 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,552 UART: [kat] SHA2-256
904,492 UART: [kat] SHA2-384
907,267 UART: [kat] SHA2-512-ACC
909,168 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,676 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,749 UART: [idev] ++
1,175,917 UART: [idev] CDI.KEYID = 6
1,176,277 UART: [idev] SUBJECT.KEYID = 7
1,176,701 UART: [idev] UDS.KEYID = 0
1,177,046 ready_for_fw is high
1,177,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,901 UART: [idev] Erasing UDS.KEYID = 0
1,201,252 UART: [idev] Sha1 KeyId Algorithm
1,209,840 UART: [idev] --
1,210,776 UART: [ldev] ++
1,210,944 UART: [ldev] CDI.KEYID = 6
1,211,307 UART: [ldev] SUBJECT.KEYID = 5
1,211,733 UART: [ldev] AUTHORITY.KEYID = 7
1,212,196 UART: [ldev] FE.KEYID = 1
1,217,634 UART: [ldev] Erasing FE.KEYID = 1
1,244,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,036 UART: [ldev] --
1,283,537 UART: [fwproc] Wait for Commands...
1,284,203 UART: [fwproc] Recv command 0x46574c44
1,284,931 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,116 >>> mbox cmd response: success
2,775,116 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,776,128 UART: [afmc] ++
2,776,296 UART: [afmc] CDI.KEYID = 6
2,776,658 UART: [afmc] SUBJECT.KEYID = 7
2,777,083 UART: [afmc] AUTHORITY.KEYID = 5
2,812,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,923 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,651 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,536 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,005 UART: [afmc] --
2,855,909 UART: [cold-reset] --
2,856,947 UART: [state] Locking Datavault
2,857,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,540 UART: [state] Locking ICCM
2,859,170 UART: [exit] Launching FMC @ 0x40000130
2,864,499 UART:
2,864,515 UART: Running Caliptra FMC ...
2,864,923 UART:
2,865,066 UART: [state] CFI Enabled
2,875,931 UART: [fht] FMC Alias Private Key: 7
2,983,676 UART: [art] Extend RT PCRs Done
2,984,104 UART: [art] Lock RT PCRs Done
2,985,250 UART: [art] Populate DV Done
2,993,467 UART: [fht] FMC Alias Private Key: 7
2,994,649 UART: [art] Derive CDI
2,994,929 UART: [art] Store in in slot 0x4
3,080,910 UART: [art] Derive Key Pair
3,081,270 UART: [art] Store priv key in slot 0x5
3,094,090 UART: [art] Derive Key Pair - Done
3,108,702 UART: [art] Signing Cert with AUTHO
3,109,182 UART: RITY.KEYID = 7
3,124,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,489 UART: [art] PUB.X = 86F137326A91D8CB728F59DF8ECB023D241306247612EEFC36B6A67DDC9BF8C4CABB02A89174C81CAAB4F05B04833892
3,132,257 UART: [art] PUB.Y = 8198F082DA73A9D2CC8CC1AC155A4C10A9D5B258409A8E454DB9039FCB355C2B3B038464175F5D444E768A7FFA9E90F8
3,139,209 UART: [art] SIG.R = DFB474D744DF6ED14C069BADEAD726CCACEE0DCE2CBF31A3D28C01D28ED7D8AAD1836BB26209BD1FDF1926072089EFD9
3,145,996 UART: [art] SIG.S = CDA60F170A91403A839E8CEA419CB6AEF02BC4C2C1EFB031402CD1886406AE68325ACFB3A31201722F9B36BFCFCC8C74
3,169,317 UART: Caliptra RT
3,169,662 UART: [state] CFI Enabled
3,277,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,266 UART: [rt]cmd =0x43455246, len=4
3,320,449 >>> mbox cmd response data (887 bytes)
3,320,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,861 UART: [rt]cmd =0x43455252, len=4
3,360,504 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,684 ready_for_fw is high
1,060,684 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,455 >>> mbox cmd response: success
2,625,455 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,687,623 UART:
2,687,639 UART: Running Caliptra FMC ...
2,688,047 UART:
2,688,190 UART: [state] CFI Enabled
2,698,689 UART: [fht] FMC Alias Private Key: 7
2,806,490 UART: [art] Extend RT PCRs Done
2,806,918 UART: [art] Lock RT PCRs Done
2,808,236 UART: [art] Populate DV Done
2,816,549 UART: [fht] FMC Alias Private Key: 7
2,817,549 UART: [art] Derive CDI
2,817,829 UART: [art] Store in in slot 0x4
2,903,530 UART: [art] Derive Key Pair
2,903,890 UART: [art] Store priv key in slot 0x5
2,917,228 UART: [art] Derive Key Pair - Done
2,932,117 UART: [art] Signing Cert with AUTHO
2,932,597 UART: RITY.KEYID = 7
2,947,855 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,620 UART: [art] PUB.X = 64BAF83E5A964868F3C4E31D17ED2BB9414204D694BC83C53A048FE9DEECDE4024F47ED896FA4085076CBD39A2BEE439
2,955,395 UART: [art] PUB.Y = 82B75345B3AE4D0AE09D7419BFA742953C8914223632B69FF72CD196E771B57E8483FCF538F831410111A1C98913BDAA
2,962,337 UART: [art] SIG.R = BD94D696733522D7E7C7C0D5234CE395B043F85AF8B8204A07189C9E7AAADAF93D3343CD6924B2083028EB4F5828822F
2,969,103 UART: [art] SIG.S = 88B19BCE0BD5B70DBF016AE7E9ECF26DA3C0D3202EA279CD9DF8B5194736128B4118D8416B95D0EBF7F257C5E0502A80
2,992,517 UART: Caliptra RT
2,992,862 UART: [state] CFI Enabled
3,100,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,442 UART: [rt]cmd =0x43455246, len=4
3,142,457 >>> mbox cmd response data (887 bytes)
3,142,458 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,029 UART: [rt]cmd =0x43455252, len=4
3,182,628 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,777 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,375 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,466 UART: [ldev] ++
1,209,634 UART: [ldev] CDI.KEYID = 6
1,209,998 UART: [ldev] SUBJECT.KEYID = 5
1,210,425 UART: [ldev] AUTHORITY.KEYID = 7
1,210,888 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,064 UART: [ldev] --
1,281,436 UART: [fwproc] Wait for Commands...
1,282,039 UART: [fwproc] Recv command 0x46574c44
1,282,772 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,849 >>> mbox cmd response: success
2,771,849 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,773,034 UART: [afmc] ++
2,773,202 UART: [afmc] CDI.KEYID = 6
2,773,565 UART: [afmc] SUBJECT.KEYID = 7
2,773,991 UART: [afmc] AUTHORITY.KEYID = 5
2,810,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,671 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,390 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,147 UART: [afmc] --
2,853,191 UART: [cold-reset] --
2,854,187 UART: [state] Locking Datavault
2,855,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,916 UART: [state] Locking ICCM
2,856,490 UART: [exit] Launching FMC @ 0x40000130
2,861,819 UART:
2,861,835 UART: Running Caliptra FMC ...
2,862,243 UART:
2,862,297 UART: [state] CFI Enabled
2,872,986 UART: [fht] FMC Alias Private Key: 7
2,980,749 UART: [art] Extend RT PCRs Done
2,981,177 UART: [art] Lock RT PCRs Done
2,982,667 UART: [art] Populate DV Done
2,990,994 UART: [fht] FMC Alias Private Key: 7
2,992,010 UART: [art] Derive CDI
2,992,290 UART: [art] Store in in slot 0x4
3,077,581 UART: [art] Derive Key Pair
3,077,941 UART: [art] Store priv key in slot 0x5
3,091,659 UART: [art] Derive Key Pair - Done
3,106,271 UART: [art] Signing Cert with AUTHO
3,106,751 UART: RITY.KEYID = 7
3,121,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,448 UART: [art] PUB.X = 4831A1892A2598C1B825C4185A71AC984AA0B3C33F4E64A52DC47D59C764B79D84B656A3218EBE1900AECB31FA85A609
3,129,197 UART: [art] PUB.Y = 17D0C2D3FAACFA37A26D1B4A5AE4FEAA0E3BBB21AF9557C131E67707E02AF75D9768A86B584B6388821B72062FD09F0C
3,136,151 UART: [art] SIG.R = C0FFF76B6E0CC319174132FB423FB1DB02644C845622EF0D15E762E81F1A5A9F0191EB24C12574AEDC3E2D98766BB5EB
3,142,921 UART: [art] SIG.S = CCE7ED1D73E6FA75D95294B3B3E527FE403B3E7D57078428B667D8DDC313BBB8A24401F01619BBE8CE7BEFFA9AF7F0C6
3,166,616 UART: Caliptra RT
3,166,869 UART: [state] CFI Enabled
3,274,995 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,337 UART: [rt]cmd =0x43455246, len=4
3,317,388 >>> mbox cmd response data (887 bytes)
3,317,389 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,784 UART: [rt]cmd =0x43455252, len=4
3,357,485 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,394 ready_for_fw is high
1,055,394 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,385 >>> mbox cmd response: success
2,622,385 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,685,369 UART:
2,685,385 UART: Running Caliptra FMC ...
2,685,793 UART:
2,685,847 UART: [state] CFI Enabled
2,695,878 UART: [fht] FMC Alias Private Key: 7
2,804,421 UART: [art] Extend RT PCRs Done
2,804,849 UART: [art] Lock RT PCRs Done
2,806,261 UART: [art] Populate DV Done
2,814,414 UART: [fht] FMC Alias Private Key: 7
2,815,576 UART: [art] Derive CDI
2,815,856 UART: [art] Store in in slot 0x4
2,901,283 UART: [art] Derive Key Pair
2,901,643 UART: [art] Store priv key in slot 0x5
2,914,727 UART: [art] Derive Key Pair - Done
2,929,576 UART: [art] Signing Cert with AUTHO
2,930,056 UART: RITY.KEYID = 7
2,945,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,587 UART: [art] PUB.X = 683F10DE3C535AFCAEBDF6D12935057AB8CF2E314585528E31495409ACB68E2B8FAB02A1A28EDA2C639066E4AA47D5EB
2,953,364 UART: [art] PUB.Y = C6ED24F004BE10DBC4D937E530AB0BB905266F80EB1636FFA456A96263CA2DE2079D248DB1206BDCD5D9DFB9B9B84844
2,960,318 UART: [art] SIG.R = F6E9E493ADAA4417829CA0639E162ACC476D0D5A4401493150C9580CC3387FE1C60B5F136E0772D2BB979DBCDED2A7DF
2,967,085 UART: [art] SIG.S = 2E3EF0770F276CE51C17C9239B7CC55B67B02C4758B4A90668D12677C569ED6E2816CB54B1E35364654F5C36D9A79F61
2,990,868 UART: Caliptra RT
2,991,121 UART: [state] CFI Enabled
3,099,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,744 UART: [rt]cmd =0x43455246, len=4
3,141,953 >>> mbox cmd response data (887 bytes)
3,141,954 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,285 UART: [rt]cmd =0x43455252, len=4
3,182,105 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,174,074 ready_for_fw is high
1,174,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,394 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,855 UART: [ldev] ++
1,209,023 UART: [ldev] CDI.KEYID = 6
1,209,387 UART: [ldev] SUBJECT.KEYID = 5
1,209,814 UART: [ldev] AUTHORITY.KEYID = 7
1,210,277 UART: [ldev] FE.KEYID = 1
1,215,323 UART: [ldev] Erasing FE.KEYID = 1
1,241,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,599 UART: [ldev] --
1,280,931 UART: [fwproc] Wait for Commands...
1,281,674 UART: [fwproc] Recv command 0x46574c44
1,282,407 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,752 >>> mbox cmd response: success
2,772,752 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,773,931 UART: [afmc] ++
2,774,099 UART: [afmc] CDI.KEYID = 6
2,774,462 UART: [afmc] SUBJECT.KEYID = 7
2,774,888 UART: [afmc] AUTHORITY.KEYID = 5
2,810,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,618 UART: [afmc] --
2,853,678 UART: [cold-reset] --
2,854,596 UART: [state] Locking Datavault
2,855,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,359 UART: [state] Locking ICCM
2,856,865 UART: [exit] Launching FMC @ 0x40000130
2,862,194 UART:
2,862,210 UART: Running Caliptra FMC ...
2,862,618 UART:
2,862,761 UART: [state] CFI Enabled
2,873,334 UART: [fht] FMC Alias Private Key: 7
2,981,649 UART: [art] Extend RT PCRs Done
2,982,077 UART: [art] Lock RT PCRs Done
2,984,043 UART: [art] Populate DV Done
2,992,434 UART: [fht] FMC Alias Private Key: 7
2,993,572 UART: [art] Derive CDI
2,993,852 UART: [art] Store in in slot 0x4
3,080,055 UART: [art] Derive Key Pair
3,080,415 UART: [art] Store priv key in slot 0x5
3,094,119 UART: [art] Derive Key Pair - Done
3,109,107 UART: [art] Signing Cert with AUTHO
3,109,587 UART: RITY.KEYID = 7
3,124,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,046 UART: [art] PUB.X = 169020600D248780E08D172788EC7BA096B8A0512934962EC792A97409727F77D89585C3562B89F0DB2D2B59063EE523
3,131,791 UART: [art] PUB.Y = C0FB7BC750C990B19D309E0708E8971C4AB56B6870BBE6EED9BC6017B4B29A5D89F428B717C87A2D11C3D4A51FF66C1F
3,138,749 UART: [art] SIG.R = F3750B73A7DF3A867B6883CF2DC765176B72DF490785CDB6E0748A80752895EFE00FA5910C7CD998BF32265BB9D68CF8
3,145,513 UART: [art] SIG.S = EA956249BAD1638A815558D6701D69535EF8C95E2807AC0DC71C57D020D90310883B7D1D9FAFF1A07CAE7B04C404980D
3,169,234 UART: Caliptra RT
3,169,579 UART: [state] CFI Enabled
3,278,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,873 UART: [rt]cmd =0x43455246, len=4
3,320,734 >>> mbox cmd response data (887 bytes)
3,320,735 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,950 UART: [rt]cmd =0x43455252, len=4
3,360,571 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,833 ready_for_fw is high
1,056,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,284 >>> mbox cmd response: success
2,623,284 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,764 UART:
2,684,780 UART: Running Caliptra FMC ...
2,685,188 UART:
2,685,331 UART: [state] CFI Enabled
2,695,748 UART: [fht] FMC Alias Private Key: 7
2,804,015 UART: [art] Extend RT PCRs Done
2,804,443 UART: [art] Lock RT PCRs Done
2,806,347 UART: [art] Populate DV Done
2,814,622 UART: [fht] FMC Alias Private Key: 7
2,815,608 UART: [art] Derive CDI
2,815,888 UART: [art] Store in in slot 0x4
2,901,901 UART: [art] Derive Key Pair
2,902,261 UART: [art] Store priv key in slot 0x5
2,915,665 UART: [art] Derive Key Pair - Done
2,930,440 UART: [art] Signing Cert with AUTHO
2,930,920 UART: RITY.KEYID = 7
2,946,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,007 UART: [art] PUB.X = 55B17F7AC608E518AC8A1F6EE34F1C77454C49F606A83E91BDF2823B755A212B72E4B59C9B0B9DEF3F47FA5CE250980C
2,953,777 UART: [art] PUB.Y = 5E4455208DD88949C56A67827FD17E2C17F4E273DA7A1ADE42CC1040FDFD2181E05E5B2FAF98B3ED8C123A594C935985
2,960,735 UART: [art] SIG.R = F7EB1DF349926708830259893C20CAF3425BFB53F0BB51DF5ED27F03C01DD517674403A3E920FC5045071ACA3CD2159E
2,967,494 UART: [art] SIG.S = 55F283F413501B08E680FC9AD16C226027935B122172474C59D25A09FB5BFC97976C8C2B2DDA7917461A9DBE55FB9C2D
2,991,241 UART: Caliptra RT
2,991,586 UART: [state] CFI Enabled
3,097,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,451 UART: [rt]cmd =0x43455246, len=4
3,140,438 >>> mbox cmd response data (887 bytes)
3,140,439 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,786 UART: [rt]cmd =0x43455252, len=4
3,180,722 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,970 UART: [kat] HMAC-384Kdf
907,410 UART: [kat] LMS
1,475,606 UART: [kat] --
1,476,669 UART: [cold-reset] ++
1,477,243 UART: [fht] Storing FHT @ 0x50003400
1,479,996 UART: [idev] ++
1,480,164 UART: [idev] CDI.KEYID = 6
1,480,524 UART: [idev] SUBJECT.KEYID = 7
1,480,948 UART: [idev] UDS.KEYID = 0
1,481,293 ready_for_fw is high
1,481,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,505,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,804 UART: [idev] --
1,514,741 UART: [ldev] ++
1,514,909 UART: [ldev] CDI.KEYID = 6
1,515,272 UART: [ldev] SUBJECT.KEYID = 5
1,515,698 UART: [ldev] AUTHORITY.KEYID = 7
1,516,161 UART: [ldev] FE.KEYID = 1
1,521,289 UART: [ldev] Erasing FE.KEYID = 1
1,546,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,230 UART: [ldev] --
1,585,599 UART: [fwproc] Waiting for Commands...
1,586,368 UART: [fwproc] Received command 0x46574c44
1,587,159 UART: [fwproc] Received Image of size 114332 bytes
2,885,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,466 >>> mbox cmd response: success
3,077,466 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,876 UART: [afmc] ++
3,079,044 UART: [afmc] CDI.KEYID = 6
3,079,406 UART: [afmc] SUBJECT.KEYID = 7
3,079,831 UART: [afmc] AUTHORITY.KEYID = 5
3,115,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,245 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,148,957 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,156,837 UART: [afmc] --
3,157,967 UART: [cold-reset] --
3,158,663 UART: [state] Locking Datavault
3,159,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,262 UART: [state] Locking ICCM
3,160,792 UART: [exit] Launching FMC @ 0x40000130
3,166,121 UART:
3,166,137 UART: Running Caliptra FMC ...
3,166,545 UART:
3,166,599 UART: [state] CFI Enabled
3,176,946 UART: [fht] FMC Alias Private Key: 7
3,284,575 UART: [art] Extend RT PCRs Done
3,285,003 UART: [art] Lock RT PCRs Done
3,286,601 UART: [art] Populate DV Done
3,294,788 UART: [fht] FMC Alias Private Key: 7
3,295,828 UART: [art] Derive CDI
3,296,108 UART: [art] Store in in slot 0x4
3,381,883 UART: [art] Derive Key Pair
3,382,243 UART: [art] Store priv key in slot 0x5
3,395,729 UART: [art] Derive Key Pair - Done
3,410,603 UART: [art] Signing Cert with AUTHO
3,411,083 UART: RITY.KEYID = 7
3,426,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,094 UART: [art] PUB.X = 7B119A29C1ACF40DD01029934A70C207EE61CCCEF855AE70DD3A2E09C5E21D01BFB9065EBFD9B1BD6DEB6349FFBA37D5
3,433,875 UART: [art] PUB.Y = FC30CB0B149BF9315DCA044E32D3958982008562F652901C44347D48084F6B8CE07F28E574E11CF00551ECCE7375CA10
3,440,789 UART: [art] SIG.R = 6DE46147626D3343C1ADC4A26FDE901FA3CD0C4C4E318F2E61CD1613A6086ACA77BB0F33AA67213C04B89B1DCDB02C5E
3,447,565 UART: [art] SIG.S = 9D9199747F87FA427D136EBE858E887D9C8064C0EF7F21FE9280ED0C7AF78F14608BDDAB7662722CEDB07803893945EF
3,471,362 UART: Caliptra RT
3,471,615 UART: [state] CFI Enabled
3,578,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,501 UART: [rt]cmd =0x43455252, len=4
3,620,407 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,109 ready_for_fw is high
1,362,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,496 >>> mbox cmd response: success
2,925,496 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,576 UART:
2,986,592 UART: Running Caliptra FMC ...
2,987,000 UART:
2,987,054 UART: [state] CFI Enabled
2,997,541 UART: [fht] FMC Alias Private Key: 7
3,106,038 UART: [art] Extend RT PCRs Done
3,106,466 UART: [art] Lock RT PCRs Done
3,108,280 UART: [art] Populate DV Done
3,116,637 UART: [fht] FMC Alias Private Key: 7
3,117,763 UART: [art] Derive CDI
3,118,043 UART: [art] Store in in slot 0x4
3,203,528 UART: [art] Derive Key Pair
3,203,888 UART: [art] Store priv key in slot 0x5
3,217,298 UART: [art] Derive Key Pair - Done
3,232,112 UART: [art] Signing Cert with AUTHO
3,232,592 UART: RITY.KEYID = 7
3,247,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,385 UART: [art] PUB.X = CB2340F0FB1E24510475F403D9FE575145439035B4AE42ABE1ADAD987CB4B42D043644D5224C0B5BC2E2A564F1C976F4
3,255,149 UART: [art] PUB.Y = BF87C6C88BD68263022DCEC66D487097EC4C077BF64618151C43D3DD43B6B5178C70FC84FBB616B65CCEC7F2FD684196
3,262,103 UART: [art] SIG.R = C0C0C6F4618E9F11C4CCB120BCC1122D74240CB0B842DDA702F6AAB595B5C50287784DEBA95A95056FC170BC644FF17E
3,268,875 UART: [art] SIG.S = FA007E63900F67DEDFCE0596208A34E5704BD93A97D961384C0A069049757CDC4CE87E8324106C133437A952448687B9
3,292,894 UART: Caliptra RT
3,293,147 UART: [state] CFI Enabled
3,402,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,558 UART: [rt]cmd =0x43455252, len=4
3,443,277 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,082 UART: [kat] SHA2-256
893,020 UART: [kat] SHA2-384
895,809 UART: [kat] SHA2-512-ACC
897,710 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,181 UART: [kat] LMS
1,476,377 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,464 UART: [fht] Storing FHT @ 0x50003400
1,480,305 UART: [idev] ++
1,480,473 UART: [idev] CDI.KEYID = 6
1,480,833 UART: [idev] SUBJECT.KEYID = 7
1,481,257 UART: [idev] UDS.KEYID = 0
1,481,602 ready_for_fw is high
1,481,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,273 UART: [idev] Erasing UDS.KEYID = 0
1,505,867 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,449 UART: [idev] --
1,515,578 UART: [ldev] ++
1,515,746 UART: [ldev] CDI.KEYID = 6
1,516,109 UART: [ldev] SUBJECT.KEYID = 5
1,516,535 UART: [ldev] AUTHORITY.KEYID = 7
1,516,998 UART: [ldev] FE.KEYID = 1
1,522,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,366 UART: [fwproc] Waiting for Commands...
1,588,029 UART: [fwproc] Received command 0x46574c44
1,588,820 UART: [fwproc] Received Image of size 114332 bytes
2,886,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,903 >>> mbox cmd response: success
3,078,903 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,187 UART: [afmc] ++
3,080,355 UART: [afmc] CDI.KEYID = 6
3,080,717 UART: [afmc] SUBJECT.KEYID = 7
3,081,142 UART: [afmc] AUTHORITY.KEYID = 5
3,116,053 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,948 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,150,660 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,158,622 UART: [afmc] --
3,159,648 UART: [cold-reset] --
3,160,314 UART: [state] Locking Datavault
3,161,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,075 UART: [state] Locking ICCM
3,162,575 UART: [exit] Launching FMC @ 0x40000130
3,167,904 UART:
3,167,920 UART: Running Caliptra FMC ...
3,168,328 UART:
3,168,471 UART: [state] CFI Enabled
3,179,328 UART: [fht] FMC Alias Private Key: 7
3,287,043 UART: [art] Extend RT PCRs Done
3,287,471 UART: [art] Lock RT PCRs Done
3,289,079 UART: [art] Populate DV Done
3,297,292 UART: [fht] FMC Alias Private Key: 7
3,298,330 UART: [art] Derive CDI
3,298,610 UART: [art] Store in in slot 0x4
3,384,123 UART: [art] Derive Key Pair
3,384,483 UART: [art] Store priv key in slot 0x5
3,398,215 UART: [art] Derive Key Pair - Done
3,412,945 UART: [art] Signing Cert with AUTHO
3,413,425 UART: RITY.KEYID = 7
3,428,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,536 UART: [art] PUB.X = 0CAF5BD8D58A11FAF94298B76F40678D6CBAE8A19B13DBE574170297CE8A07639CEC5EFA2F1CB184CC8227FE37D68360
3,436,313 UART: [art] PUB.Y = 7DFDC986F8169EDC3176EB1EC64BA8CFD2BF185A5D9099D5687275B08A0C6B20113672B9CCED2FBA26BF8A83C295F581
3,443,276 UART: [art] SIG.R = F6A4A8A3595A78577A5D3AAB25B6156220E03B508ED7B19130C2C46520CBCB66D0810FEDBD5D50050297CC18BF3F247C
3,450,045 UART: [art] SIG.S = FE283C456F530B2103579A3EF4C4F5700D33C3C9798C9C4D59B9B4C45D4D3A07E57D977E26DCE45BC11CC98BC4C2CC54
3,474,028 UART: Caliptra RT
3,474,373 UART: [state] CFI Enabled
3,582,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,582 UART: [rt]cmd =0x43455252, len=4
3,623,467 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,566 ready_for_fw is high
1,362,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,141 >>> mbox cmd response: success
2,928,141 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,990,201 UART:
2,990,217 UART: Running Caliptra FMC ...
2,990,625 UART:
2,990,768 UART: [state] CFI Enabled
3,001,491 UART: [fht] FMC Alias Private Key: 7
3,109,208 UART: [art] Extend RT PCRs Done
3,109,636 UART: [art] Lock RT PCRs Done
3,111,438 UART: [art] Populate DV Done
3,119,819 UART: [fht] FMC Alias Private Key: 7
3,120,941 UART: [art] Derive CDI
3,121,221 UART: [art] Store in in slot 0x4
3,206,770 UART: [art] Derive Key Pair
3,207,130 UART: [art] Store priv key in slot 0x5
3,220,362 UART: [art] Derive Key Pair - Done
3,235,394 UART: [art] Signing Cert with AUTHO
3,235,874 UART: RITY.KEYID = 7
3,251,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,003 UART: [art] PUB.X = 36E30DC795208307FCC37859E72301F825B1EA9787C4D269D20DFEF0360858ADD3EECC94A23D42BBC3D6B30348F1E553
3,258,761 UART: [art] PUB.Y = DC1565013CCE85BEF3E216ED617DDF0139F29C46B863B7F9BE2C476137D88C7DB0087829B36D74D38AB1566EE9F86092
3,265,708 UART: [art] SIG.R = A7EBECB7166B74D155D2FB8FB61CC4522E22D8F43B1E068E341E314C410E21B32F1F5DDE2DD876F15B7F69F7080B181B
3,272,480 UART: [art] SIG.S = D939D005C9508E0C916166119BC0F28CA8BA5A4962871A812A3C699862BC8D5D69F06CE864FAB7F26D894C097F10AB93
3,296,358 UART: Caliptra RT
3,296,703 UART: [state] CFI Enabled
3,405,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,806 UART: [rt]cmd =0x43455252, len=4
3,446,719 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,154 UART: [kat] HMAC-384Kdf
922,818 UART: [kat] LMS
1,171,146 UART: [kat] --
1,171,977 UART: [cold-reset] ++
1,172,519 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,264 UART: [idev] Erasing UDS.KEYID = 0
1,200,999 UART: [idev] Sha1 KeyId Algorithm
1,209,537 UART: [idev] --
1,210,429 UART: [ldev] ++
1,210,597 UART: [ldev] CDI.KEYID = 6
1,210,960 UART: [ldev] SUBJECT.KEYID = 5
1,211,386 UART: [ldev] AUTHORITY.KEYID = 7
1,211,849 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,768 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x46574c44
1,284,106 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,461 >>> mbox cmd response: success
2,774,461 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,835 UART: [afmc] ++
2,776,003 UART: [afmc] CDI.KEYID = 6
2,776,365 UART: [afmc] SUBJECT.KEYID = 7
2,776,790 UART: [afmc] AUTHORITY.KEYID = 5
2,811,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,055 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,765 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,543 UART: [afmc] --
2,854,643 UART: [cold-reset] --
2,855,463 UART: [state] Locking Datavault
2,856,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,168 UART: [state] Locking ICCM
2,857,726 UART: [exit] Launching FMC @ 0x40000130
2,863,055 UART:
2,863,071 UART: Running Caliptra FMC ...
2,863,479 UART:
2,863,533 UART: [state] CFI Enabled
2,873,856 UART: [fht] FMC Alias Private Key: 7
2,981,607 UART: [art] Extend RT PCRs Done
2,982,035 UART: [art] Lock RT PCRs Done
2,983,723 UART: [art] Populate DV Done
2,991,838 UART: [fht] FMC Alias Private Key: 7
2,992,952 UART: [art] Derive CDI
2,993,232 UART: [art] Store in in slot 0x4
3,079,229 UART: [art] Derive Key Pair
3,079,589 UART: [art] Store priv key in slot 0x5
3,092,727 UART: [art] Derive Key Pair - Done
3,107,734 UART: [art] Signing Cert with AUTHO
3,108,214 UART: RITY.KEYID = 7
3,123,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,335 UART: [art] PUB.X = D7866C3BD84085FEB952A1E0FB2DFE7C06CEF4FCF5D1028F3AC5034CF297F9B05ABE4EDC6C75E54C351206F6ABCBF829
3,131,119 UART: [art] PUB.Y = 533F461196071439255ABC3D6316CC8D755B6310AB40A49001B682ECFAEC97194ACEAEB40B77EF9B271293FC43F38040
3,138,062 UART: [art] SIG.R = E3C0EC9C3E10DBD052894269688D78A6918F99D83233996E43EBB1B35269B8069E96D7C8918FDE71CD49FF047CFC704E
3,144,830 UART: [art] SIG.S = D504A3967E9FBC56A3A4BE69D26EA3648FB8128FA7F5E30FFE27008AE912FE9FAD0F3604DC1D14F7C9F03992A4B9F86A
3,168,137 UART: Caliptra RT
3,168,390 UART: [state] CFI Enabled
3,276,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,533 UART: [rt]cmd =0x43455252, len=4
3,318,314 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,612 >>> mbox cmd response: success
2,626,612 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,660 UART:
2,688,676 UART: Running Caliptra FMC ...
2,689,084 UART:
2,689,138 UART: [state] CFI Enabled
2,699,607 UART: [fht] FMC Alias Private Key: 7
2,807,456 UART: [art] Extend RT PCRs Done
2,807,884 UART: [art] Lock RT PCRs Done
2,809,310 UART: [art] Populate DV Done
2,817,885 UART: [fht] FMC Alias Private Key: 7
2,818,969 UART: [art] Derive CDI
2,819,249 UART: [art] Store in in slot 0x4
2,904,694 UART: [art] Derive Key Pair
2,905,054 UART: [art] Store priv key in slot 0x5
2,918,070 UART: [art] Derive Key Pair - Done
2,932,953 UART: [art] Signing Cert with AUTHO
2,933,433 UART: RITY.KEYID = 7
2,948,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,980 UART: [art] PUB.X = 26F3B1B1C6480919A783ECBC3841A2943C7E0686BB7AFFC3FE2BF6A495B8EB4E3383D31E3C625B8D233F0AB188FD78F4
2,955,755 UART: [art] PUB.Y = 20B9A002130F35D43DA53FF42669D15E87B06473FD753D6100C7DA7EF57D03748B5CD0CE7B6913C8169B629A020A8D24
2,962,668 UART: [art] SIG.R = 35B9EDC56E7C7E9C8CB48FEA70055654551A0A21E675364DFD50B63DE66E6ED233659FB7521A5049ECBCC48E8664843A
2,969,440 UART: [art] SIG.S = 9854D076D5CF61F121744A271BA4E8C433EBC5B160E28B1B5C0044D47BFD1CA269FE8BA965152D376B96DE21D1F27C4C
2,993,591 UART: Caliptra RT
2,993,844 UART: [state] CFI Enabled
3,102,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,170 UART: [rt]cmd =0x43455252, len=4
3,144,162 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
893,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,832 UART: [kat] ++
897,984 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
918,763 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,702 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 ready_for_fw is high
1,176,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,369 UART: [idev] Erasing UDS.KEYID = 0
1,201,448 UART: [idev] Sha1 KeyId Algorithm
1,209,886 UART: [idev] --
1,211,000 UART: [ldev] ++
1,211,168 UART: [ldev] CDI.KEYID = 6
1,211,531 UART: [ldev] SUBJECT.KEYID = 5
1,211,957 UART: [ldev] AUTHORITY.KEYID = 7
1,212,420 UART: [ldev] FE.KEYID = 1
1,217,542 UART: [ldev] Erasing FE.KEYID = 1
1,243,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,510 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,599 UART: [fwproc] Recv command 0x46574c44
1,284,327 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,954 >>> mbox cmd response: success
2,773,954 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,216 UART: [afmc] ++
2,775,384 UART: [afmc] CDI.KEYID = 6
2,775,746 UART: [afmc] SUBJECT.KEYID = 7
2,776,171 UART: [afmc] AUTHORITY.KEYID = 5
2,811,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,196 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,906 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,790 UART: [afmc] --
2,854,812 UART: [cold-reset] --
2,855,682 UART: [state] Locking Datavault
2,856,795 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,399 UART: [state] Locking ICCM
2,857,871 UART: [exit] Launching FMC @ 0x40000130
2,863,200 UART:
2,863,216 UART: Running Caliptra FMC ...
2,863,624 UART:
2,863,767 UART: [state] CFI Enabled
2,874,590 UART: [fht] FMC Alias Private Key: 7
2,982,623 UART: [art] Extend RT PCRs Done
2,983,051 UART: [art] Lock RT PCRs Done
2,984,461 UART: [art] Populate DV Done
2,992,678 UART: [fht] FMC Alias Private Key: 7
2,993,670 UART: [art] Derive CDI
2,993,950 UART: [art] Store in in slot 0x4
3,080,111 UART: [art] Derive Key Pair
3,080,471 UART: [art] Store priv key in slot 0x5
3,093,369 UART: [art] Derive Key Pair - Done
3,108,533 UART: [art] Signing Cert with AUTHO
3,109,013 UART: RITY.KEYID = 7
3,124,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,202 UART: [art] PUB.X = 4A66D67F496233B861994824AF4508BBCB2AC39C134979D25A1D287C9E815FCE10EE922EA49E443A5DA75BC848783D7E
3,131,973 UART: [art] PUB.Y = 08D8F150FA6FA585D942A77CD2E7C32A3BF99DA8BE65AD454D7C7EDA20AEDD70E93B4D2B3EAC015F37A5AE1C482AB25B
3,138,945 UART: [art] SIG.R = E32EC6F396DBEBD05F73A253BF8632388D7C5F2B306CFFA2D01B692BF093F7A7A24EDC04B1D392DEFC0E67852350618A
3,145,725 UART: [art] SIG.S = 233B733311FF3E18791FF357F0F3992DEF92A7106D16C75FDBE9BD67171BA2A298E9709DD70886DE28A05790D866902A
3,169,249 UART: Caliptra RT
3,169,594 UART: [state] CFI Enabled
3,277,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,718 UART: [rt]cmd =0x43455252, len=4
3,318,506 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,602 ready_for_fw is high
1,060,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,305 >>> mbox cmd response: success
2,626,305 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,023 UART:
2,688,039 UART: Running Caliptra FMC ...
2,688,447 UART:
2,688,590 UART: [state] CFI Enabled
2,699,099 UART: [fht] FMC Alias Private Key: 7
2,807,028 UART: [art] Extend RT PCRs Done
2,807,456 UART: [art] Lock RT PCRs Done
2,808,926 UART: [art] Populate DV Done
2,817,073 UART: [fht] FMC Alias Private Key: 7
2,818,027 UART: [art] Derive CDI
2,818,307 UART: [art] Store in in slot 0x4
2,904,224 UART: [art] Derive Key Pair
2,904,584 UART: [art] Store priv key in slot 0x5
2,918,144 UART: [art] Derive Key Pair - Done
2,933,126 UART: [art] Signing Cert with AUTHO
2,933,606 UART: RITY.KEYID = 7
2,948,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,061 UART: [art] PUB.X = B87237867C74D9687C0D158C310F34859EA99A8D0542357939D6C21F06F08C30824A14E846664FB8F3701D66B9E445A2
2,955,807 UART: [art] PUB.Y = 8C8F317D8E8DFAFBC2FB179F821A6B2C125224F5E99D8E891A498E0FA356C6EF146122FF607136FD71A2A37889C5BDB8
2,962,766 UART: [art] SIG.R = A022D2458862006AC4561EA8F78288094A6465DDB7F75F6C1A97FC3B59795A7D98B449F256460A08ADBADECAAE92FFB2
2,969,515 UART: [art] SIG.S = 768EEF3EF4AABDC38FCD8F956768383EF8B32CD582E27CF3F1C269E2EA5C1A1E30A2A772542DF4CC0266C43463190264
2,993,338 UART: Caliptra RT
2,993,683 UART: [state] CFI Enabled
3,102,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,701 UART: [rt]cmd =0x43455252, len=4
3,143,479 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,717 UART: [cold-reset] ++
1,171,121 UART: [fht] FHT @ 0x50003400
1,173,827 UART: [idev] ++
1,173,995 UART: [idev] CDI.KEYID = 6
1,174,356 UART: [idev] SUBJECT.KEYID = 7
1,174,781 UART: [idev] UDS.KEYID = 0
1,175,127 ready_for_fw is high
1,175,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,769 UART: [idev] Erasing UDS.KEYID = 0
1,199,939 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,174 UART: [ldev] ++
1,210,342 UART: [ldev] CDI.KEYID = 6
1,210,706 UART: [ldev] SUBJECT.KEYID = 5
1,211,133 UART: [ldev] AUTHORITY.KEYID = 7
1,211,596 UART: [ldev] FE.KEYID = 1
1,216,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,281,844 UART: [fwproc] Wait for Commands...
1,282,435 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,391 >>> mbox cmd response: success
2,773,391 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,710 UART: [afmc] ++
2,774,878 UART: [afmc] CDI.KEYID = 6
2,775,241 UART: [afmc] SUBJECT.KEYID = 7
2,775,667 UART: [afmc] AUTHORITY.KEYID = 5
2,811,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,193 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,903 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,790 UART: [afmc] --
2,854,750 UART: [cold-reset] --
2,855,440 UART: [state] Locking Datavault
2,856,637 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,241 UART: [state] Locking ICCM
2,857,675 UART: [exit] Launching FMC @ 0x40000130
2,863,004 UART:
2,863,020 UART: Running Caliptra FMC ...
2,863,428 UART:
2,863,482 UART: [state] CFI Enabled
2,874,077 UART: [fht] FMC Alias Private Key: 7
2,981,954 UART: [art] Extend RT PCRs Done
2,982,382 UART: [art] Lock RT PCRs Done
2,983,806 UART: [art] Populate DV Done
2,992,177 UART: [fht] FMC Alias Private Key: 7
2,993,319 UART: [art] Derive CDI
2,993,599 UART: [art] Store in in slot 0x4
3,079,364 UART: [art] Derive Key Pair
3,079,724 UART: [art] Store priv key in slot 0x5
3,092,830 UART: [art] Derive Key Pair - Done
3,107,596 UART: [art] Signing Cert with AUTHO
3,108,076 UART: RITY.KEYID = 7
3,122,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,749 UART: [art] PUB.X = A83E132406EB3474476B6B91498323CF005F15AABEBC2BCFC69791A3F0FFB1E26489827EA1108F7A50756843BF5ACD53
3,130,500 UART: [art] PUB.Y = 4E2CAEAC1F8419A67BDD8AE0166869B111A5AE8DBC1BE4557C225B274734D60085FF9F3AC5AA45C528A49FA7CFD79109
3,137,441 UART: [art] SIG.R = 195679E8AF72FF6CEADB0816C831CD006731BE36159F500D8FFF48AC8E853A471B2935D1C04FA29CD37B6F1F212319E0
3,144,191 UART: [art] SIG.S = C5A476A814BDF7E2E3FD31A9C406FD27CF05230D16A6F6965027E266F300C807AD9FA9D159B0584F8EF77C457648A8D0
3,167,742 UART: Caliptra RT
3,167,995 UART: [state] CFI Enabled
3,276,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,867 UART: [rt]cmd =0x43455252, len=4
3,317,705 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,726 ready_for_fw is high
1,055,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,509 >>> mbox cmd response: success
2,623,509 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,685,981 UART:
2,685,997 UART: Running Caliptra FMC ...
2,686,405 UART:
2,686,459 UART: [state] CFI Enabled
2,696,990 UART: [fht] FMC Alias Private Key: 7
2,805,013 UART: [art] Extend RT PCRs Done
2,805,441 UART: [art] Lock RT PCRs Done
2,806,781 UART: [art] Populate DV Done
2,814,946 UART: [fht] FMC Alias Private Key: 7
2,815,972 UART: [art] Derive CDI
2,816,252 UART: [art] Store in in slot 0x4
2,901,671 UART: [art] Derive Key Pair
2,902,031 UART: [art] Store priv key in slot 0x5
2,914,869 UART: [art] Derive Key Pair - Done
2,929,505 UART: [art] Signing Cert with AUTHO
2,929,985 UART: RITY.KEYID = 7
2,944,967 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,732 UART: [art] PUB.X = 47E51BE3B6D205269B7A1F09B08CB0A8AEF0E66CD211876184358ADAD36F79938FDD073397591130DAEC29399F0A3706
2,952,489 UART: [art] PUB.Y = CF85B0D07C0045802CA0251F3A6AD155137835283AFC7024609B434B36325B5215B7CBC3C13A59A7F1D21C7A2C542E48
2,959,415 UART: [art] SIG.R = 167B41AB0BDCAC6F9252C1975C6342A053EF21F984745C7DEDFF8A66C7450553EA262D9C54F8E8884FA3737C74F83539
2,966,183 UART: [art] SIG.S = 949BF9679F067809910C1401F6B385B6355D88FE1B65E7B6049228A4297A809087796845C877787F8753C0E5E0A12CB5
2,989,773 UART: Caliptra RT
2,990,026 UART: [state] CFI Enabled
3,097,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,394 UART: [rt]cmd =0x43455252, len=4
3,139,218 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,831 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,174,060 UART: [idev] ++
1,174,228 UART: [idev] CDI.KEYID = 6
1,174,589 UART: [idev] SUBJECT.KEYID = 7
1,175,014 UART: [idev] UDS.KEYID = 0
1,175,360 ready_for_fw is high
1,175,360 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,131 UART: [ldev] --
1,282,621 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,086 >>> mbox cmd response: success
2,774,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,525 UART: [afmc] ++
2,775,693 UART: [afmc] CDI.KEYID = 6
2,776,056 UART: [afmc] SUBJECT.KEYID = 7
2,776,482 UART: [afmc] AUTHORITY.KEYID = 5
2,812,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,930 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,640 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,854,689 UART: [afmc] --
2,855,569 UART: [cold-reset] --
2,856,521 UART: [state] Locking Datavault
2,857,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,256 UART: [state] Locking ICCM
2,858,808 UART: [exit] Launching FMC @ 0x40000130
2,864,137 UART:
2,864,153 UART: Running Caliptra FMC ...
2,864,561 UART:
2,864,704 UART: [state] CFI Enabled
2,875,549 UART: [fht] FMC Alias Private Key: 7
2,984,350 UART: [art] Extend RT PCRs Done
2,984,778 UART: [art] Lock RT PCRs Done
2,986,442 UART: [art] Populate DV Done
2,994,647 UART: [fht] FMC Alias Private Key: 7
2,995,713 UART: [art] Derive CDI
2,995,993 UART: [art] Store in in slot 0x4
3,081,372 UART: [art] Derive Key Pair
3,081,732 UART: [art] Store priv key in slot 0x5
3,095,160 UART: [art] Derive Key Pair - Done
3,110,095 UART: [art] Signing Cert with AUTHO
3,110,575 UART: RITY.KEYID = 7
3,125,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,618 UART: [art] PUB.X = CEDB452417DCE4E0E05712C083CBC98632E541DEE9E04B69C042B23CF7E766873DFD49955EA5C5682C660F960ED59F77
3,133,390 UART: [art] PUB.Y = 10B0BBE7CED300026CB43FAEFA1C97CD9FB5C3DBD79813ECF4803437A76788901971CF7D0EAD758D71D36390139981F8
3,140,322 UART: [art] SIG.R = AE54387F48CF8A7886CC08664AF8055AA076FDAA540BE2358FA851A4B4795633EE4E1CAA8F0DECCDF41E8C6BD1E4CEE9
3,147,104 UART: [art] SIG.S = 610E0548E813F5FE6F244FDF64381EAD33AB34F8FC9C482DACE6C535EA780EDDB74C323C84B4B9C6C203CF8AABDE864A
3,171,095 UART: Caliptra RT
3,171,440 UART: [state] CFI Enabled
3,278,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,374 UART: [rt]cmd =0x43455252, len=4
3,319,998 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,629 ready_for_fw is high
1,056,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,144 >>> mbox cmd response: success
2,622,144 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,464 UART:
2,684,480 UART: Running Caliptra FMC ...
2,684,888 UART:
2,685,031 UART: [state] CFI Enabled
2,695,844 UART: [fht] FMC Alias Private Key: 7
2,804,397 UART: [art] Extend RT PCRs Done
2,804,825 UART: [art] Lock RT PCRs Done
2,806,485 UART: [art] Populate DV Done
2,814,568 UART: [fht] FMC Alias Private Key: 7
2,815,588 UART: [art] Derive CDI
2,815,868 UART: [art] Store in in slot 0x4
2,901,419 UART: [art] Derive Key Pair
2,901,779 UART: [art] Store priv key in slot 0x5
2,914,853 UART: [art] Derive Key Pair - Done
2,930,055 UART: [art] Signing Cert with AUTHO
2,930,535 UART: RITY.KEYID = 7
2,945,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,600 UART: [art] PUB.X = 6B7E35EDA7C01A9F0ACA92A91BB2B904F24F45ADC8C47B768F1C16517E5CB75FD002DAC54DC57E4BE3F1B12361EFD546
2,953,383 UART: [art] PUB.Y = F4D7146D35EDC88209E63DDC1C8B09EE16184D417C4A1AE1349B98D56A6CA7BE1B8BE1CEF5759983F4CF9D0CDE5A3524
2,960,342 UART: [art] SIG.R = 9DF940AD92092D5BCA52CA132CFC3553EEEEFB728D1FD588C4EC0819D3CAD4589AD12CCC9238B8336C03D13B7202BF92
2,967,118 UART: [art] SIG.S = AABBC5D01C21350E9EB88F0291EF5E107A68E426F2FE9A23EE2865E78012210102D66999FB9E30A327317B7D3BF0CC4F
2,991,219 UART: Caliptra RT
2,991,564 UART: [state] CFI Enabled
3,099,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,495 UART: [rt]cmd =0x43455252, len=4
3,141,138 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,250 UART: [kat] LMS
1,475,446 UART: [kat] --
1,476,393 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 ready_for_fw is high
1,480,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,684 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,216 UART: [idev] --
1,514,365 UART: [ldev] ++
1,514,533 UART: [ldev] CDI.KEYID = 6
1,514,896 UART: [ldev] SUBJECT.KEYID = 5
1,515,322 UART: [ldev] AUTHORITY.KEYID = 7
1,515,785 UART: [ldev] FE.KEYID = 1
1,521,101 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,700 UART: [ldev] --
1,586,091 UART: [fwproc] Waiting for Commands...
1,586,898 UART: [fwproc] Received command 0x46574c44
1,587,689 UART: [fwproc] Received Image of size 114332 bytes
2,884,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,012 >>> mbox cmd response: success
3,076,012 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,077,210 UART: [afmc] ++
3,077,378 UART: [afmc] CDI.KEYID = 6
3,077,740 UART: [afmc] SUBJECT.KEYID = 7
3,078,165 UART: [afmc] AUTHORITY.KEYID = 5
3,113,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,811 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,501 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,614 UART: [afmc] --
3,156,522 UART: [cold-reset] --
3,157,406 UART: [state] Locking Datavault
3,158,501 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,105 UART: [state] Locking ICCM
3,159,755 UART: [exit] Launching FMC @ 0x40000130
3,165,084 UART:
3,165,100 UART: Running Caliptra FMC ...
3,165,508 UART:
3,165,562 UART: [state] CFI Enabled
3,175,919 UART: [fht] FMC Alias Private Key: 7
3,283,102 UART: [art] Extend RT PCRs Done
3,283,530 UART: [art] Lock RT PCRs Done
3,284,968 UART: [art] Populate DV Done
3,293,197 UART: [fht] FMC Alias Private Key: 7
3,294,241 UART: [art] Derive CDI
3,294,521 UART: [art] Store in in slot 0x4
3,380,396 UART: [art] Derive Key Pair
3,380,756 UART: [art] Store priv key in slot 0x5
3,393,036 UART: [art] Derive Key Pair - Done
3,408,349 UART: [art] Signing Cert with AUTHO
3,408,829 UART: RITY.KEYID = 7
3,423,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,688 UART: [art] PUB.X = 1867BBDE89E427A446765B993C446FAE1AB35ABBB54EE47E44DFC075324E195CC835E0871753A8A034E2473382D08C71
3,431,460 UART: [art] PUB.Y = 7B0DAF39E2BD8681C9F7BA5CEE9A01283EFBD8228D86832B20B0A4A75BC3A76828BDFD80500ABB140696407114621FF8
3,438,408 UART: [art] SIG.R = D93B15EAF5280C130F0BDF5919E7E4E0B1D1AB956FCF5A933385AA8AF35FBB754C8CA434E64310D17506CECB0DDDE2AB
3,445,187 UART: [art] SIG.S = CE51516AD74DF5B6A900208D5D104B6027833A5463207835CB93B1139E8A2C855842898D7CBDC25F45C21BCA2C14929E
3,468,264 UART: Caliptra RT
3,468,517 UART: [state] CFI Enabled
3,576,063 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,537 UART: [rt]cmd =0x4453424c, len=4
3,620,878 >>> mbox cmd response data (8 bytes)
3,620,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,379 UART:
3,621,395 UART: Running Caliptra ROM ...
3,621,803 UART:
3,621,857 UART: [state] CFI Enabled
3,624,301 UART: [state] LifecycleState = Unprovisioned
3,624,956 UART: [state] DebugLocked = No
3,625,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,627,083 UART: [kat] SHA2-256
4,421,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,425,129 UART: [kat] ++
4,425,281 UART: [kat] sha1
4,429,533 UART: [kat] SHA2-256
4,431,471 UART: [kat] SHA2-384
4,434,108 UART: [kat] SHA2-512-ACC
4,436,008 UART: [kat] ECC-384
4,441,311 UART: [kat] HMAC-384Kdf
4,445,943 UART: [kat] LMS
5,014,139 UART: [kat] --
5,014,906 UART: [update-reset] ++
6,349,256 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,350,404 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,500,280 >>> mbox cmd response: success
6,500,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,500,589 UART: [update-reset] Copying MAN_2 To MAN_1
6,508,603 UART: [update-reset Success] --
6,509,422 UART: [state] Locking Datavault
6,510,098 UART: [state] Locking PCR0, PCR1 and PCR31
6,510,702 UART: [state] Locking ICCM
6,511,272 UART: [exit] Launching FMC @ 0x40000130
6,516,601 UART:
6,516,617 UART: Running Caliptra FMC ...
6,517,025 UART:
6,517,079 UART: [state] CFI Enabled
6,606,310 UART: [art] Extend RT PCRs Done
6,606,738 UART: [art] Lock RT PCRs Done
6,608,117 UART: [art] Populate DV Done
6,616,590 UART: [fht] FMC Alias Private Key: 7
6,617,538 UART: [art] Derive CDI
6,617,818 UART: [art] Store in in slot 0x4
6,703,503 UART: [art] Derive Key Pair
6,703,863 UART: [art] Store priv key in slot 0x5
6,717,087 UART: [art] Derive Key Pair - Done
6,731,932 UART: [art] Signing Cert with AUTHO
6,732,412 UART: RITY.KEYID = 7
6,748,038 UART: [art] Erasing AUTHORITY.KEYID = 7
6,748,803 UART: [art] PUB.X = 0392F06C48A68BFDAA70983B48A280C6C84971B6F7300B8289AC4750AAA8C4DFB89C101ACCB14AD74206B669CB74B5AE
6,755,576 UART: [art] PUB.Y = 0E32577048DC593B661A5141F048E02D3393F59DFE3F61D911E8D28DC5655E302EA46489833BFB471194A3615C350527
6,762,510 UART: [art] SIG.R = 645A5763C77172A0727AFCEB406BD610C760EDCB982E1FFE12E74ECDC79001496AF3524FA9E9E26D3505D2689F97B19D
6,769,282 UART: [art] SIG.S = 196EDBF77E2405B656B2F32638DBD08EC37D63FA1B394AB951A13930201391D80F448B930A9313FA38FB70CF81BA63F0
6,793,110 UART: Caliptra RT
6,793,363 UART: [state] CFI Enabled
7,087,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,117,410 UART: [rt]cmd =0x494e464f, len=4
7,121,129 >>> mbox cmd response data (312 bytes)
7,121,130 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,150,681 UART: [rt]cmd =0x43455252, len=4
7,161,315 >>> mbox cmd response data (782 bytes)
7,161,316 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,191,095 UART: [rt]cmd =0x44504543, len=92
7,375,781 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,047 ready_for_fw is high
1,362,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,118 >>> mbox cmd response: success
2,927,118 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,987,954 UART:
2,987,970 UART: Running Caliptra FMC ...
2,988,378 UART:
2,988,432 UART: [state] CFI Enabled
2,998,817 UART: [fht] FMC Alias Private Key: 7
3,106,054 UART: [art] Extend RT PCRs Done
3,106,482 UART: [art] Lock RT PCRs Done
3,107,904 UART: [art] Populate DV Done
3,116,153 UART: [fht] FMC Alias Private Key: 7
3,117,249 UART: [art] Derive CDI
3,117,529 UART: [art] Store in in slot 0x4
3,203,380 UART: [art] Derive Key Pair
3,203,740 UART: [art] Store priv key in slot 0x5
3,217,136 UART: [art] Derive Key Pair - Done
3,231,970 UART: [art] Signing Cert with AUTHO
3,232,450 UART: RITY.KEYID = 7
3,247,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,533 UART: [art] PUB.X = E584884048FCA3788ACE1EC332F10655EAB698CA7C07F746E23B47CC9B2D447BCEC2671A4D2AA8A3E758E24EAE859A95
3,255,311 UART: [art] PUB.Y = A5856C8E9CE9B8DFF636BA0619571F0F6DE17C2E79C6E6DDF3D4F9AA4ECAB872BF6E8BF9EDCD5F240E09CEFBBF30F787
3,262,283 UART: [art] SIG.R = CF10C0039416A8BB68B5524B6C51F6D53952802A386E3768F6C3DD2EFC4D8F98ACFAFB916E43F5BAB26113BE758F452C
3,269,062 UART: [art] SIG.S = 8BDB786EB5007DA0573B056E37733783D7752D6E77FA1D355AF1524ADF15B4FC22E8F782CAD6BCEBCC6C7549AC5BD412
3,292,684 UART: Caliptra RT
3,292,937 UART: [state] CFI Enabled
3,400,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,203 UART: [rt]cmd =0x4453424c, len=4
3,444,906 >>> mbox cmd response data (8 bytes)
3,444,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,508 >>> mbox cmd response: success
6,206,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,219,871 UART:
6,219,887 UART: Running Caliptra FMC ...
6,220,295 UART:
6,220,349 UART: [state] CFI Enabled
6,309,552 UART: [art] Extend RT PCRs Done
6,309,980 UART: [art] Lock RT PCRs Done
6,311,021 UART: [art] Populate DV Done
6,319,002 UART: [fht] FMC Alias Private Key: 7
6,320,076 UART: [art] Derive CDI
6,320,356 UART: [art] Store in in slot 0x4
6,406,083 UART: [art] Derive Key Pair
6,406,443 UART: [art] Store priv key in slot 0x5
6,418,973 UART: [art] Derive Key Pair - Done
6,434,008 UART: [art] Signing Cert with AUTHO
6,434,488 UART: RITY.KEYID = 7
6,449,514 UART: [art] Erasing AUTHORITY.KEYID = 7
6,450,279 UART: [art] PUB.X = E5A4DB0DA6B9497AAE6D67BC58879C535438E9283F713555873306DF8E9EC6AADC570F7625125C1FFE39A99711BBDD95
6,457,048 UART: [art] PUB.Y = 4EE8B6B8F78ECA9E9821B3178DEA630C44E8DE864B3537AD3915562FDEE8A1E5281B641E68DF86DA2AC9DC4A291C66C0
6,464,011 UART: [art] SIG.R = 99BDED8379BEA781B01AF36BFE6C834CF79CFCDC5385D4698C50360E09FED3C6D2648B56392CA1FDA03F6926C86FA718
6,470,791 UART: [art] SIG.S = F9B67BDD347DF766FEAA2507CCB6BF9B773DFAA47E303865E99932CA208ACE10A7AB85E968FFBE0A8875A21D33B7CA97
6,494,268 UART: Caliptra RT
6,494,521 UART: [state] CFI Enabled
6,789,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,819,236 UART: [rt]cmd =0x494e464f, len=4
6,822,997 >>> mbox cmd response data (312 bytes)
6,822,998 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,852,267 UART: [rt]cmd =0x43455252, len=4
6,862,930 >>> mbox cmd response data (784 bytes)
6,862,931 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,892,962 UART: [rt]cmd =0x44504543, len=92
7,075,990 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,532 UART: [state] DebugLocked = No
86,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,580 UART: [kat] SHA2-256
881,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,626 UART: [kat] ++
885,778 UART: [kat] sha1
889,998 UART: [kat] SHA2-256
891,936 UART: [kat] SHA2-384
894,827 UART: [kat] SHA2-512-ACC
896,728 UART: [kat] ECC-384
902,427 UART: [kat] HMAC-384Kdf
907,181 UART: [kat] LMS
1,475,377 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,664 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 ready_for_fw is high
1,480,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,504,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,507 UART: [idev] --
1,514,520 UART: [ldev] ++
1,514,688 UART: [ldev] CDI.KEYID = 6
1,515,051 UART: [ldev] SUBJECT.KEYID = 5
1,515,477 UART: [ldev] AUTHORITY.KEYID = 7
1,515,940 UART: [ldev] FE.KEYID = 1
1,521,160 UART: [ldev] Erasing FE.KEYID = 1
1,546,871 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,891 UART: [ldev] --
1,586,180 UART: [fwproc] Waiting for Commands...
1,586,985 UART: [fwproc] Received command 0x46574c44
1,587,776 UART: [fwproc] Received Image of size 114332 bytes
2,885,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,949 >>> mbox cmd response: success
3,078,949 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,080,035 UART: [afmc] ++
3,080,203 UART: [afmc] CDI.KEYID = 6
3,080,565 UART: [afmc] SUBJECT.KEYID = 7
3,080,990 UART: [afmc] AUTHORITY.KEYID = 5
3,115,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,249 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,757 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,642 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,332 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,421 UART: [afmc] --
3,158,529 UART: [cold-reset] --
3,159,279 UART: [state] Locking Datavault
3,160,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,100 UART: [state] Locking ICCM
3,161,622 UART: [exit] Launching FMC @ 0x40000130
3,166,951 UART:
3,166,967 UART: Running Caliptra FMC ...
3,167,375 UART:
3,167,518 UART: [state] CFI Enabled
3,178,063 UART: [fht] FMC Alias Private Key: 7
3,285,188 UART: [art] Extend RT PCRs Done
3,285,616 UART: [art] Lock RT PCRs Done
3,287,400 UART: [art] Populate DV Done
3,295,891 UART: [fht] FMC Alias Private Key: 7
3,297,073 UART: [art] Derive CDI
3,297,353 UART: [art] Store in in slot 0x4
3,382,852 UART: [art] Derive Key Pair
3,383,212 UART: [art] Store priv key in slot 0x5
3,396,300 UART: [art] Derive Key Pair - Done
3,410,724 UART: [art] Signing Cert with AUTHO
3,411,204 UART: RITY.KEYID = 7
3,426,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,977 UART: [art] PUB.X = 66C46F852C38B38148DB445A0D2F8602B4C73CAE9DD7A16ED90B217B1F7C238594CED44A33DBB10718EA51ADA003366D
3,433,742 UART: [art] PUB.Y = EFFB54D2E175430301B3FD4A1C331AAE8231D35A9A306F3CF6EC1532783CA88CBAC352480036606BA0F813E17AF523DA
3,440,674 UART: [art] SIG.R = 44D3BAF1875BBACCBF44C28F90E1B9CDD077F90B03784981877BE350895F784257FB59F9899A9D53C1BBFEDCB1EBDED8
3,447,458 UART: [art] SIG.S = 8050854A39BE2CE96702C748F9A9CE98AFBA874CE364693AB6103C2714CAD01C66868B88CDD7BB034B22F88E7A54C395
3,471,211 UART: Caliptra RT
3,471,556 UART: [state] CFI Enabled
3,579,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,587 UART: [rt]cmd =0x4453424c, len=4
3,623,922 >>> mbox cmd response data (8 bytes)
3,623,923 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,883 UART:
3,624,899 UART: Running Caliptra ROM ...
3,625,307 UART:
3,625,448 UART: [state] CFI Enabled
3,628,316 UART: [state] LifecycleState = Unprovisioned
3,628,971 UART: [state] DebugLocked = No
3,629,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,631,364 UART: [kat] SHA2-256
4,425,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,429,410 UART: [kat] ++
4,429,562 UART: [kat] sha1
4,433,754 UART: [kat] SHA2-256
4,435,692 UART: [kat] SHA2-384
4,438,461 UART: [kat] SHA2-512-ACC
4,440,361 UART: [kat] ECC-384
4,445,864 UART: [kat] HMAC-384Kdf
4,450,552 UART: [kat] LMS
5,018,748 UART: [kat] --
5,019,657 UART: [update-reset] ++
6,354,289 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,355,409 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,505,285 >>> mbox cmd response: success
6,505,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,505,392 UART: [update-reset] Copying MAN_2 To MAN_1
6,513,406 UART: [update-reset Success] --
6,514,387 UART: [state] Locking Datavault
6,515,107 UART: [state] Locking PCR0, PCR1 and PCR31
6,515,711 UART: [state] Locking ICCM
6,516,257 UART: [exit] Launching FMC @ 0x40000130
6,521,586 UART:
6,521,602 UART: Running Caliptra FMC ...
6,522,010 UART:
6,522,153 UART: [state] CFI Enabled
6,611,554 UART: [art] Extend RT PCRs Done
6,611,982 UART: [art] Lock RT PCRs Done
6,613,017 UART: [art] Populate DV Done
6,621,212 UART: [fht] FMC Alias Private Key: 7
6,622,292 UART: [art] Derive CDI
6,622,572 UART: [art] Store in in slot 0x4
6,708,123 UART: [art] Derive Key Pair
6,708,483 UART: [art] Store priv key in slot 0x5
6,721,717 UART: [art] Derive Key Pair - Done
6,736,529 UART: [art] Signing Cert with AUTHO
6,737,009 UART: RITY.KEYID = 7
6,752,043 UART: [art] Erasing AUTHORITY.KEYID = 7
6,752,808 UART: [art] PUB.X = 85846B21DBB24410E29BD05E525BD6CF2F28D01B5B363B63E55CA38158E90212F0918201BBB9D8CE47CCCF14646B3EB5
6,759,580 UART: [art] PUB.Y = EA49D92390532F4EE40B1414F690AE0C578E48A1BB59B5D20CDEC1D06DA46763B60C45FEC57A437F639FF8435FFD6DC2
6,766,532 UART: [art] SIG.R = FEFBE29E72811732AB4F32BE4E30A559E219CBB25A4F6E2011A0F3C1F8BF49D68DD22EFDDEC5C00B911FDF548C4CCB99
6,773,325 UART: [art] SIG.S = E01D834D3C775BF7A4E88EBA2894E37A3C9E5961DAE2F1E7CE6B26365E1B0CAE98976A3CD34ED61553B40000C09A8FA6
6,797,265 UART: Caliptra RT
6,797,610 UART: [state] CFI Enabled
7,089,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,120,039 UART: [rt]cmd =0x494e464f, len=4
7,123,654 >>> mbox cmd response data (312 bytes)
7,123,655 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,152,996 UART: [rt]cmd =0x43455252, len=4
7,163,731 >>> mbox cmd response data (784 bytes)
7,163,732 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,193,561 UART: [rt]cmd =0x44504543, len=92
7,376,813 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,084 ready_for_fw is high
1,362,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,377 >>> mbox cmd response: success
2,927,377 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,988,869 UART:
2,988,885 UART: Running Caliptra FMC ...
2,989,293 UART:
2,989,436 UART: [state] CFI Enabled
2,999,963 UART: [fht] FMC Alias Private Key: 7
3,107,646 UART: [art] Extend RT PCRs Done
3,108,074 UART: [art] Lock RT PCRs Done
3,109,550 UART: [art] Populate DV Done
3,117,671 UART: [fht] FMC Alias Private Key: 7
3,118,669 UART: [art] Derive CDI
3,118,949 UART: [art] Store in in slot 0x4
3,204,350 UART: [art] Derive Key Pair
3,204,710 UART: [art] Store priv key in slot 0x5
3,218,422 UART: [art] Derive Key Pair - Done
3,233,517 UART: [art] Signing Cert with AUTHO
3,233,997 UART: RITY.KEYID = 7
3,249,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,430 UART: [art] PUB.X = E7806DC2BF8BD161446143CBBD13D621F3FFF91CD439DA0E213F3C2F7D7F538723C4D862011AB86E20C3CCAC0E69EB98
3,257,207 UART: [art] PUB.Y = 29EF8B5389459A33F5AA9B6EED26EFA9F55601F671566C3209A6DE2559FC9B7741E5210B191038FCA7F6AC41211BC8B0
3,264,154 UART: [art] SIG.R = 1168B50CDB4E7EF49D309560315CD97FEA1BFA12A5895185F372826299C69294C6202C0223790E50B7198296D62E77A3
3,270,905 UART: [art] SIG.S = A39F1168E5553D260DCF9CD2BA66379C870FCAFF092FE9D5DDD45BBDC56A54FAC8DD558D26B5D33720D66339668E0A29
3,294,236 UART: Caliptra RT
3,294,581 UART: [state] CFI Enabled
3,403,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,738 UART: [rt]cmd =0x4453424c, len=4
3,447,433 >>> mbox cmd response data (8 bytes)
3,447,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,209,418 >>> mbox cmd response: success
6,209,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,222,365 UART:
6,222,381 UART: Running Caliptra FMC ...
6,222,789 UART:
6,222,932 UART: [state] CFI Enabled
6,312,139 UART: [art] Extend RT PCRs Done
6,312,567 UART: [art] Lock RT PCRs Done
6,313,914 UART: [art] Populate DV Done
6,322,105 UART: [fht] FMC Alias Private Key: 7
6,323,215 UART: [art] Derive CDI
6,323,495 UART: [art] Store in in slot 0x4
6,409,492 UART: [art] Derive Key Pair
6,409,852 UART: [art] Store priv key in slot 0x5
6,422,930 UART: [art] Derive Key Pair - Done
6,437,563 UART: [art] Signing Cert with AUTHO
6,438,043 UART: RITY.KEYID = 7
6,453,649 UART: [art] Erasing AUTHORITY.KEYID = 7
6,454,414 UART: [art] PUB.X = 776018E0FC7C44510AA167BB33A01B3185C17CE974B9641EA1090FF717774D27B231D8C671713E31545BC66E6DF760E8
6,461,171 UART: [art] PUB.Y = B021858A9B7BFE639777BC689810F1422C5A6DCF495A6370B140929B8972A40C17A6992AF18E4E530636D9D779117B8E
6,468,109 UART: [art] SIG.R = A03D4BBEF0AC2065C8F2673DF65D59340FAF93F20C39D8D66D1C169937435C18028E30AA11EC78DB4FF44756D895E2FC
6,474,880 UART: [art] SIG.S = 33F301DE625B722FA13DB9B73B4B243B9E54EEBC40057AC0259E22509681DBD43A3EFD6F899664F1C99F0829ED68DB34
6,498,376 UART: Caliptra RT
6,498,721 UART: [state] CFI Enabled
6,791,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,822,053 UART: [rt]cmd =0x494e464f, len=4
6,825,756 >>> mbox cmd response data (312 bytes)
6,825,757 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,855,142 UART: [rt]cmd =0x43455252, len=4
6,865,962 >>> mbox cmd response data (783 bytes)
6,865,963 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,784 UART: [rt]cmd =0x44504543, len=92
7,079,503 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,458 UART: [kat] HMAC-384Kdf
923,150 UART: [kat] LMS
1,171,478 UART: [kat] --
1,172,605 UART: [cold-reset] ++
1,173,117 UART: [fht] FHT @ 0x50003400
1,175,730 UART: [idev] ++
1,175,898 UART: [idev] CDI.KEYID = 6
1,176,258 UART: [idev] SUBJECT.KEYID = 7
1,176,682 UART: [idev] UDS.KEYID = 0
1,177,027 ready_for_fw is high
1,177,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,201,615 UART: [idev] Sha1 KeyId Algorithm
1,210,203 UART: [idev] --
1,211,253 UART: [ldev] ++
1,211,421 UART: [ldev] CDI.KEYID = 6
1,211,784 UART: [ldev] SUBJECT.KEYID = 5
1,212,210 UART: [ldev] AUTHORITY.KEYID = 7
1,212,673 UART: [ldev] FE.KEYID = 1
1,217,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,538 UART: [fwproc] Recv command 0x46574c44
1,284,266 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,543 >>> mbox cmd response: success
2,774,543 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,577 UART: [afmc] ++
2,775,745 UART: [afmc] CDI.KEYID = 6
2,776,107 UART: [afmc] SUBJECT.KEYID = 7
2,776,532 UART: [afmc] AUTHORITY.KEYID = 5
2,811,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,098 UART: [afmc] --
2,855,164 UART: [cold-reset] --
2,856,062 UART: [state] Locking Datavault
2,857,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,917 UART: [state] Locking ICCM
2,858,527 UART: [exit] Launching FMC @ 0x40000130
2,863,856 UART:
2,863,872 UART: Running Caliptra FMC ...
2,864,280 UART:
2,864,334 UART: [state] CFI Enabled
2,874,677 UART: [fht] FMC Alias Private Key: 7
2,983,308 UART: [art] Extend RT PCRs Done
2,983,736 UART: [art] Lock RT PCRs Done
2,985,528 UART: [art] Populate DV Done
2,993,729 UART: [fht] FMC Alias Private Key: 7
2,994,825 UART: [art] Derive CDI
2,995,105 UART: [art] Store in in slot 0x4
3,080,742 UART: [art] Derive Key Pair
3,081,102 UART: [art] Store priv key in slot 0x5
3,094,102 UART: [art] Derive Key Pair - Done
3,108,742 UART: [art] Signing Cert with AUTHO
3,109,222 UART: RITY.KEYID = 7
3,124,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,343 UART: [art] PUB.X = F9FE6A3348AC38A797DA267821F62E829E60A46F3E42FEB6F477FA69EEAB448491229290C55F8C3529F7F1ECE5C09AB6
3,132,123 UART: [art] PUB.Y = 4E9FFB80673A8A1207FCEE9DA344F051061DE91502D9C5C82FD5A1F975BD2D2C10299615A53A605BC34CA85F7FB29D7A
3,139,076 UART: [art] SIG.R = 4573716CB620B8661C39EA57EBA6612F68676D176E8EFF5599DE186B3BD38C260E95276C4699810D9849F9AF31864815
3,145,832 UART: [art] SIG.S = 289B21B3F4138051ED3D58A041D7B462D5ECD76447138CF0989BA15DBD17DADE3DD1C0605B5CFF31E50B114272530C33
3,169,503 UART: Caliptra RT
3,169,756 UART: [state] CFI Enabled
3,279,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,669 UART: [rt]cmd =0x4453424c, len=4
3,323,272 >>> mbox cmd response data (8 bytes)
3,323,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,106 UART:
3,324,122 UART: Running Caliptra ROM ...
3,324,530 UART:
3,324,585 UART: [state] CFI Enabled
3,327,157 UART: [state] LifecycleState = Unprovisioned
3,327,812 UART: [state] DebugLocked = No
3,328,478 UART: [state] WD Timer not started. Device not locked for debugging
3,329,686 UART: [kat] SHA2-256
4,135,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,139,461 UART: [kat] ++
4,139,613 UART: [kat] sha1
4,143,881 UART: [kat] SHA2-256
4,145,821 UART: [kat] SHA2-384
4,148,794 UART: [kat] SHA2-512-ACC
4,150,694 UART: [kat] ECC-384
4,160,219 UART: [kat] HMAC-384Kdf
4,164,961 UART: [kat] LMS
4,413,289 UART: [kat] --
4,413,987 UART: [update-reset] ++
5,726,173 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,727,354 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,877,178 >>> mbox cmd response: success
5,877,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,877,437 UART: [update-reset] Copying MAN_2 To MAN_1
5,885,451 UART: [update-reset Success] --
5,886,652 UART: [state] Locking Datavault
5,887,606 UART: [state] Locking PCR0, PCR1 and PCR31
5,888,210 UART: [state] Locking ICCM
5,888,692 UART: [exit] Launching FMC @ 0x40000130
5,894,021 UART:
5,894,037 UART: Running Caliptra FMC ...
5,894,445 UART:
5,894,499 UART: [state] CFI Enabled
5,983,592 UART: [art] Extend RT PCRs Done
5,984,020 UART: [art] Lock RT PCRs Done
5,985,437 UART: [art] Populate DV Done
5,993,438 UART: [fht] FMC Alias Private Key: 7
5,994,400 UART: [art] Derive CDI
5,994,680 UART: [art] Store in in slot 0x4
6,080,063 UART: [art] Derive Key Pair
6,080,423 UART: [art] Store priv key in slot 0x5
6,093,803 UART: [art] Derive Key Pair - Done
6,108,941 UART: [art] Signing Cert with AUTHO
6,109,421 UART: RITY.KEYID = 7
6,124,443 UART: [art] Erasing AUTHORITY.KEYID = 7
6,125,208 UART: [art] PUB.X = 01256E5DE40DDFB6B83B1B96E53952B4A51039D42ABF8B7E48E30C9ED64A6011FCDBFAF484B10FD527372D05F93FAA53
6,131,979 UART: [art] PUB.Y = 3E39B9B1CAAF31D1FFE5999EA8460E52BC31B3AADAD51E5BDD1FD9B0AFFC5DE80366D217EEE60E206A6EFA6E007BD045
6,138,930 UART: [art] SIG.R = DC49FC8435E48B7B8E5E608E30E59F7C5AED69C88328E94F83391923A406A0783B86049D4C59B5CD3CBAE8A541267F01
6,145,695 UART: [art] SIG.S = A8AFB913787CD4CC5258A7C8FE2D06B256006CB8AC3C041FAAABAE5246AF30F5DDD1B48ABA5C38B84551EAB7113222CF
6,169,574 UART: Caliptra RT
6,169,827 UART: [state] CFI Enabled
6,463,913 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,092 UART: [rt]cmd =0x494e464f, len=4
6,497,719 >>> mbox cmd response data (312 bytes)
6,497,720 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,527,073 UART: [rt]cmd =0x43455252, len=4
6,537,952 >>> mbox cmd response data (784 bytes)
6,537,953 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,567,760 UART: [rt]cmd =0x44504543, len=92
6,749,965 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 ready_for_fw is high
1,060,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,896 >>> mbox cmd response: success
2,625,896 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,687,700 UART:
2,687,716 UART: Running Caliptra FMC ...
2,688,124 UART:
2,688,178 UART: [state] CFI Enabled
2,698,269 UART: [fht] FMC Alias Private Key: 7
2,806,264 UART: [art] Extend RT PCRs Done
2,806,692 UART: [art] Lock RT PCRs Done
2,808,262 UART: [art] Populate DV Done
2,816,825 UART: [fht] FMC Alias Private Key: 7
2,817,879 UART: [art] Derive CDI
2,818,159 UART: [art] Store in in slot 0x4
2,904,028 UART: [art] Derive Key Pair
2,904,388 UART: [art] Store priv key in slot 0x5
2,917,968 UART: [art] Derive Key Pair - Done
2,932,494 UART: [art] Signing Cert with AUTHO
2,932,974 UART: RITY.KEYID = 7
2,948,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,971 UART: [art] PUB.X = 1A2E841EC5C6294BF86F1412149E58838ABA708BB027919896819928DC62C62C20783C9C01EEF278220753B68D659E65
2,955,725 UART: [art] PUB.Y = E0E206E564A6561D58424D021A77ACD1418D42C831A15CF86737282C4DF6AFE4DAEE50459D907DC286FDBECC4D5E5DAA
2,962,685 UART: [art] SIG.R = F449E7EA219FDD86F357C4EB8CD2E7667127FEDE8221021B1B1546B155700959F99981171D04C41B04CC8E825EEB1DD0
2,969,447 UART: [art] SIG.S = 9B39BB91686D25BCF97F9D3276A2035A0A086FF64C4D05ADF278FE4A2569D47513E23812F29197AA876AB64757D23CA9
2,993,302 UART: Caliptra RT
2,993,555 UART: [state] CFI Enabled
3,101,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,865 UART: [rt]cmd =0x4453424c, len=4
3,145,676 >>> mbox cmd response data (8 bytes)
3,145,677 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,755 >>> mbox cmd response: success
5,582,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,596,115 UART:
5,596,131 UART: Running Caliptra FMC ...
5,596,539 UART:
5,596,593 UART: [state] CFI Enabled
5,685,638 UART: [art] Extend RT PCRs Done
5,686,066 UART: [art] Lock RT PCRs Done
5,687,341 UART: [art] Populate DV Done
5,695,546 UART: [fht] FMC Alias Private Key: 7
5,696,562 UART: [art] Derive CDI
5,696,842 UART: [art] Store in in slot 0x4
5,782,673 UART: [art] Derive Key Pair
5,783,033 UART: [art] Store priv key in slot 0x5
5,796,491 UART: [art] Derive Key Pair - Done
5,811,230 UART: [art] Signing Cert with AUTHO
5,811,710 UART: RITY.KEYID = 7
5,827,104 UART: [art] Erasing AUTHORITY.KEYID = 7
5,827,869 UART: [art] PUB.X = 37748854B84BAC64F79AE355265F132B193C4857568D04551D92574BABE02368634C040620430CE60DF1C36FFB56EF9D
5,834,618 UART: [art] PUB.Y = 7E6D3CF486DEAABFE2388D7C7330A7F9DA3AE1FC507557C600538D1355065C41AE61F91A05B2A02784523F6AB714AE80
5,841,548 UART: [art] SIG.R = 88FF05257DD3C7EC9C01B6DA0DE34E87B5770485FBCDA61206153679363716A08E2F85D21D6C2E0795CF298A14419063
5,848,298 UART: [art] SIG.S = 77D17B69B4361FDEE7A4837E14126D16910E14D0750BAB277E615CC760F2FEC586DA554FDA628A4C7CF63D69E1114503
5,871,702 UART: Caliptra RT
5,871,955 UART: [state] CFI Enabled
6,165,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,195,729 UART: [rt]cmd =0x494e464f, len=4
6,199,494 >>> mbox cmd response data (312 bytes)
6,199,495 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,228,986 UART: [rt]cmd =0x43455252, len=4
6,239,932 >>> mbox cmd response data (783 bytes)
6,239,933 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,270,056 UART: [rt]cmd =0x44504543, len=92
6,454,008 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
893,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,652 UART: [kat] ++
897,804 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,172,850 UART: [fht] FHT @ 0x50003400
1,175,683 UART: [idev] ++
1,175,851 UART: [idev] CDI.KEYID = 6
1,176,211 UART: [idev] SUBJECT.KEYID = 7
1,176,635 UART: [idev] UDS.KEYID = 0
1,176,980 ready_for_fw is high
1,176,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,537 UART: [idev] Erasing UDS.KEYID = 0
1,200,452 UART: [idev] Sha1 KeyId Algorithm
1,208,916 UART: [idev] --
1,209,944 UART: [ldev] ++
1,210,112 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,901 UART: [ldev] AUTHORITY.KEYID = 7
1,211,364 UART: [ldev] FE.KEYID = 1
1,216,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,093 UART: [fwproc] Recv command 0x46574c44
1,282,821 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,232 >>> mbox cmd response: success
2,773,232 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,774,472 UART: [afmc] ++
2,774,640 UART: [afmc] CDI.KEYID = 6
2,775,002 UART: [afmc] SUBJECT.KEYID = 7
2,775,427 UART: [afmc] AUTHORITY.KEYID = 5
2,810,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,051 UART: [afmc] --
2,853,173 UART: [cold-reset] --
2,853,905 UART: [state] Locking Datavault
2,855,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,604 UART: [state] Locking ICCM
2,856,264 UART: [exit] Launching FMC @ 0x40000130
2,861,593 UART:
2,861,609 UART: Running Caliptra FMC ...
2,862,017 UART:
2,862,160 UART: [state] CFI Enabled
2,873,123 UART: [fht] FMC Alias Private Key: 7
2,981,450 UART: [art] Extend RT PCRs Done
2,981,878 UART: [art] Lock RT PCRs Done
2,982,874 UART: [art] Populate DV Done
2,991,069 UART: [fht] FMC Alias Private Key: 7
2,991,997 UART: [art] Derive CDI
2,992,277 UART: [art] Store in in slot 0x4
3,078,422 UART: [art] Derive Key Pair
3,078,782 UART: [art] Store priv key in slot 0x5
3,092,280 UART: [art] Derive Key Pair - Done
3,106,858 UART: [art] Signing Cert with AUTHO
3,107,338 UART: RITY.KEYID = 7
3,122,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,909 UART: [art] PUB.X = 5E7507B67D1B7A971679C2989287D4DBF242714151E1953B680F6E7851D2EAA4EB9F21F4698DC4838A6010A7AB1A3980
3,129,669 UART: [art] PUB.Y = 577C08A403E52C573FB3F76E874D99FE9B632BF4E992A3465996543BB18C3DE8B6F8792B09211D26FA80598D17E64787
3,136,606 UART: [art] SIG.R = A8A42D3C4892793493291BF2BEE26C51CB5563FB9D1617B33A48DB4B0559173C2C39D64396D46619136086E7CA02223B
3,143,364 UART: [art] SIG.S = 4A2473184D69C8447BB5A7E93111B13C542C731D633569B0519151A63E764EDDF65DE86A20073F46BC48E1CF2856279D
3,167,078 UART: Caliptra RT
3,167,423 UART: [state] CFI Enabled
3,275,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,910 UART: [rt]cmd =0x4453424c, len=4
3,319,649 >>> mbox cmd response data (8 bytes)
3,319,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,327 UART:
3,320,343 UART: Running Caliptra ROM ...
3,320,751 UART:
3,320,893 UART: [state] CFI Enabled
3,323,373 UART: [state] LifecycleState = Unprovisioned
3,324,028 UART: [state] DebugLocked = No
3,324,602 UART: [state] WD Timer not started. Device not locked for debugging
3,325,860 UART: [kat] SHA2-256
4,131,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,135,635 UART: [kat] ++
4,135,787 UART: [kat] sha1
4,140,003 UART: [kat] SHA2-256
4,141,943 UART: [kat] SHA2-384
4,144,572 UART: [kat] SHA2-512-ACC
4,146,472 UART: [kat] ECC-384
4,156,221 UART: [kat] HMAC-384Kdf
4,160,841 UART: [kat] LMS
4,409,169 UART: [kat] --
4,409,929 UART: [update-reset] ++
5,721,843 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,722,910 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,872,734 >>> mbox cmd response: success
5,872,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,872,903 UART: [update-reset] Copying MAN_2 To MAN_1
5,880,917 UART: [update-reset Success] --
5,882,142 UART: [state] Locking Datavault
5,882,806 UART: [state] Locking PCR0, PCR1 and PCR31
5,883,410 UART: [state] Locking ICCM
5,883,842 UART: [exit] Launching FMC @ 0x40000130
5,889,171 UART:
5,889,187 UART: Running Caliptra FMC ...
5,889,595 UART:
5,889,738 UART: [state] CFI Enabled
5,979,013 UART: [art] Extend RT PCRs Done
5,979,441 UART: [art] Lock RT PCRs Done
5,980,678 UART: [art] Populate DV Done
5,989,073 UART: [fht] FMC Alias Private Key: 7
5,990,133 UART: [art] Derive CDI
5,990,413 UART: [art] Store in in slot 0x4
6,076,694 UART: [art] Derive Key Pair
6,077,054 UART: [art] Store priv key in slot 0x5
6,090,322 UART: [art] Derive Key Pair - Done
6,104,954 UART: [art] Signing Cert with AUTHO
6,105,434 UART: RITY.KEYID = 7
6,121,248 UART: [art] Erasing AUTHORITY.KEYID = 7
6,122,013 UART: [art] PUB.X = 07B5E9D31C9B6241CC09E59B58A2C7C69764016916D8B5F69A6D3336C4A84CB6B593A2431A7CEDE2EBD937E29386500F
6,128,775 UART: [art] PUB.Y = 0C0A4DDCB03EF6F7CC2A62F975DCFF5B7058AAF3B4B03DAD212BFE00624AEC559CF8E5DAE4692157A4CD898E3D648A4B
6,135,725 UART: [art] SIG.R = BDFBEEDC3A82AFC35CE35B2C50E3C9BF4A02BA08ABA3D987B0B27755B58E75AE6203934882692C9744C721C50D16B265
6,142,497 UART: [art] SIG.S = C0319AA7ACFB0BE6CDF8490D1DBB907FBC4328A5EC808DC95247CD4F125F57D8108DCECABCDA461D068C2A1AC7E14CF0
6,166,647 UART: Caliptra RT
6,166,992 UART: [state] CFI Enabled
6,459,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,489,295 UART: [rt]cmd =0x494e464f, len=4
6,493,004 >>> mbox cmd response data (312 bytes)
6,493,005 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,256 UART: [rt]cmd =0x43455252, len=4
6,533,007 >>> mbox cmd response data (784 bytes)
6,533,008 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,562,851 UART: [rt]cmd =0x44504543, len=92
6,745,676 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,060 ready_for_fw is high
1,060,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,683 >>> mbox cmd response: success
2,626,683 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,689,145 UART:
2,689,161 UART: Running Caliptra FMC ...
2,689,569 UART:
2,689,712 UART: [state] CFI Enabled
2,700,773 UART: [fht] FMC Alias Private Key: 7
2,808,792 UART: [art] Extend RT PCRs Done
2,809,220 UART: [art] Lock RT PCRs Done
2,810,598 UART: [art] Populate DV Done
2,818,515 UART: [fht] FMC Alias Private Key: 7
2,819,483 UART: [art] Derive CDI
2,819,763 UART: [art] Store in in slot 0x4
2,904,976 UART: [art] Derive Key Pair
2,905,336 UART: [art] Store priv key in slot 0x5
2,918,824 UART: [art] Derive Key Pair - Done
2,933,694 UART: [art] Signing Cert with AUTHO
2,934,174 UART: RITY.KEYID = 7
2,949,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,895 UART: [art] PUB.X = 667BAF1266CDF75FC603555447826688EF9A8CCEA9BBEF2A414FD84221D46B371C99BD8F32E17EC0E5A50C197B4AFF79
2,956,673 UART: [art] PUB.Y = B922A9FD72DB6468B60E17D5041674A2F1B7D93D422234B5C7EDC92D10EB7D80A357BFA967106CD7E71DACB86C12658E
2,963,627 UART: [art] SIG.R = 761DDA4AA3F9442CFF50307B921565730B9CEA3D515678A97DBB59F7BE08DCE8F74391630E0ADCE90E6968713F654D2E
2,970,390 UART: [art] SIG.S = 9EFE1C6DD594FBDA57D24E320361EBB1455CDB26BD745F5A3BE249EB71A52B45167352B61EFDBFCDC460688031CD766E
2,994,246 UART: Caliptra RT
2,994,591 UART: [state] CFI Enabled
3,102,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,206 UART: [rt]cmd =0x4453424c, len=4
3,147,049 >>> mbox cmd response data (8 bytes)
3,147,050 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,211 >>> mbox cmd response: success
5,584,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,597,843 UART:
5,597,859 UART: Running Caliptra FMC ...
5,598,267 UART:
5,598,410 UART: [state] CFI Enabled
5,687,649 UART: [art] Extend RT PCRs Done
5,688,077 UART: [art] Lock RT PCRs Done
5,689,380 UART: [art] Populate DV Done
5,697,857 UART: [fht] FMC Alias Private Key: 7
5,698,971 UART: [art] Derive CDI
5,699,251 UART: [art] Store in in slot 0x4
5,785,456 UART: [art] Derive Key Pair
5,785,816 UART: [art] Store priv key in slot 0x5
5,799,074 UART: [art] Derive Key Pair - Done
5,813,852 UART: [art] Signing Cert with AUTHO
5,814,332 UART: RITY.KEYID = 7
5,829,528 UART: [art] Erasing AUTHORITY.KEYID = 7
5,830,293 UART: [art] PUB.X = 7B240A99AEBF31FAF28A7AF54E03DE3FD3246F430B154F4322B327D4AAF88EF3A778E2C414E31611EC6AEC4B2F6EA5AF
5,837,076 UART: [art] PUB.Y = DB8A140A00ED0CAE7E0A12722EF75BBC1EDF4FD12E62B522348B12896C10B45A9F6053354610E583BA8DE2D20ECF5B92
5,844,006 UART: [art] SIG.R = 89D3F85645D8263645FF6CBB8932FB0BC58297BB890194DC824CF6C0D735EC24D692AECDA2A489002A12EA08F9296E70
5,850,751 UART: [art] SIG.S = 9F77FB8FFFA000E99669BC8422A5B89EC7126BC952B79D61FAD56E7EE1E6A491588A00FFB0724E395DC1A1629DFB9BB7
5,874,346 UART: Caliptra RT
5,874,691 UART: [state] CFI Enabled
6,164,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,830 UART: [rt]cmd =0x494e464f, len=4
6,198,441 >>> mbox cmd response data (312 bytes)
6,198,442 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,227,799 UART: [rt]cmd =0x43455252, len=4
6,238,660 >>> mbox cmd response data (784 bytes)
6,238,661 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,574 UART: [rt]cmd =0x44504543, len=92
6,452,400 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,180 UART: [kat] HMAC-384Kdf
919,776 UART: [kat] LMS
1,168,088 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,687 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 ready_for_fw is high
1,173,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,197,981 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,604 UART: [ldev] ++
1,207,772 UART: [ldev] CDI.KEYID = 6
1,208,136 UART: [ldev] SUBJECT.KEYID = 5
1,208,563 UART: [ldev] AUTHORITY.KEYID = 7
1,209,026 UART: [ldev] FE.KEYID = 1
1,214,170 UART: [ldev] Erasing FE.KEYID = 1
1,240,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,808 UART: [ldev] --
1,280,184 UART: [fwproc] Wait for Commands...
1,280,907 UART: [fwproc] Recv command 0x46574c44
1,281,640 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,851 >>> mbox cmd response: success
2,770,851 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,771,924 UART: [afmc] ++
2,772,092 UART: [afmc] CDI.KEYID = 6
2,772,455 UART: [afmc] SUBJECT.KEYID = 7
2,772,881 UART: [afmc] AUTHORITY.KEYID = 5
2,808,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,683 UART: [afmc] --
2,851,805 UART: [cold-reset] --
2,852,753 UART: [state] Locking Datavault
2,854,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,612 UART: [state] Locking ICCM
2,855,140 UART: [exit] Launching FMC @ 0x40000130
2,860,469 UART:
2,860,485 UART: Running Caliptra FMC ...
2,860,893 UART:
2,860,947 UART: [state] CFI Enabled
2,871,400 UART: [fht] FMC Alias Private Key: 7
2,978,205 UART: [art] Extend RT PCRs Done
2,978,633 UART: [art] Lock RT PCRs Done
2,980,311 UART: [art] Populate DV Done
2,988,680 UART: [fht] FMC Alias Private Key: 7
2,989,860 UART: [art] Derive CDI
2,990,140 UART: [art] Store in in slot 0x4
3,075,807 UART: [art] Derive Key Pair
3,076,167 UART: [art] Store priv key in slot 0x5
3,089,201 UART: [art] Derive Key Pair - Done
3,103,983 UART: [art] Signing Cert with AUTHO
3,104,463 UART: RITY.KEYID = 7
3,119,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,704 UART: [art] PUB.X = E2B7931ED89A589889B0CCF1A197093A5398EF1F554C5FC40BA8C7A4EC55935DA8CF45C425F7362046873E9E5B969DD0
3,127,474 UART: [art] PUB.Y = 911951CE7263CD34809CE153720280D8D3F20E0FD2476CEE826C560537AA4FC5D8634438ECF62C3C3E0202C3E715CC07
3,134,403 UART: [art] SIG.R = FCA03BD766C5D0B9FF13518C67E3EDECFA9C4720E6EC558236C00D418A465F3E5280F9A65B6071ECBD80B8B90854D943
3,141,179 UART: [art] SIG.S = 9B740B788CF0461B28EA82A54D7B2239E7927854E0AF7660C287997AA8E377249747FB032D97680EC98C75B9C2CBA249
3,164,383 UART: Caliptra RT
3,164,636 UART: [state] CFI Enabled
3,271,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,268 UART: [rt]cmd =0x4453424c, len=4
3,315,733 >>> mbox cmd response data (8 bytes)
3,315,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,595 UART:
3,316,611 UART: Running Caliptra ROM ...
3,317,019 UART:
3,317,074 UART: [state] CFI Enabled
3,319,964 UART: [state] LifecycleState = Unprovisioned
3,320,619 UART: [state] DebugLocked = No
3,321,289 UART: [state] WD Timer not started. Device not locked for debugging
3,322,639 UART: [kat] SHA2-256
4,126,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,130,318 UART: [kat] ++
4,130,470 UART: [kat] sha1
4,134,688 UART: [kat] SHA2-256
4,136,628 UART: [kat] SHA2-384
4,139,515 UART: [kat] SHA2-512-ACC
4,141,415 UART: [kat] ECC-384
4,151,172 UART: [kat] HMAC-384Kdf
4,155,608 UART: [kat] LMS
4,403,920 UART: [kat] --
4,404,856 UART: [update-reset] ++
5,717,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,718,460 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,868,284 >>> mbox cmd response: success
5,868,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,868,631 UART: [update-reset] Copying MAN_2 To MAN_1
5,876,645 UART: [update-reset Success] --
5,877,736 UART: [state] Locking Datavault
5,878,570 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,174 UART: [state] Locking ICCM
5,879,608 UART: [exit] Launching FMC @ 0x40000130
5,884,937 UART:
5,884,953 UART: Running Caliptra FMC ...
5,885,361 UART:
5,885,415 UART: [state] CFI Enabled
5,975,092 UART: [art] Extend RT PCRs Done
5,975,520 UART: [art] Lock RT PCRs Done
5,976,591 UART: [art] Populate DV Done
5,984,772 UART: [fht] FMC Alias Private Key: 7
5,985,724 UART: [art] Derive CDI
5,986,004 UART: [art] Store in in slot 0x4
6,071,719 UART: [art] Derive Key Pair
6,072,079 UART: [art] Store priv key in slot 0x5
6,085,715 UART: [art] Derive Key Pair - Done
6,100,488 UART: [art] Signing Cert with AUTHO
6,100,968 UART: RITY.KEYID = 7
6,116,454 UART: [art] Erasing AUTHORITY.KEYID = 7
6,117,219 UART: [art] PUB.X = 3DB706637C1A0D6B4630498E55CAFAFFA066BE877AF30CA4AA29205F2B6C1AA5206117F516FAC7006A23DC96E901761D
6,123,965 UART: [art] PUB.Y = B20651F6E63772F9D701A336B5A1F97BA035DAFD4FE9EC206894EDD0EEFB182AE1DF2706D30C0FF6149A9ED6ECCCCA96
6,130,924 UART: [art] SIG.R = 6BD7FC554E45AF507B19F8756857714DB0B80354ECBF7DE66F2383552D596C6BB13698158CDD7ED4B688419C1BDDC6B9
6,137,699 UART: [art] SIG.S = BD2CC537A43DBFC56352E2BF1CE87894C7879C98FBC8E67450A0222A0078EBA6A27A871B0D00E00CE4DBE2D30B3E7309
6,161,208 UART: Caliptra RT
6,161,461 UART: [state] CFI Enabled
6,454,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,141 UART: [rt]cmd =0x494e464f, len=4
6,488,660 >>> mbox cmd response data (312 bytes)
6,488,661 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,517,944 UART: [rt]cmd =0x43455252, len=4
6,528,780 >>> mbox cmd response data (783 bytes)
6,528,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,558,642 UART: [rt]cmd =0x44504543, len=92
6,742,261 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,164 ready_for_fw is high
1,056,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,831 >>> mbox cmd response: success
2,623,831 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,685,827 UART:
2,685,843 UART: Running Caliptra FMC ...
2,686,251 UART:
2,686,305 UART: [state] CFI Enabled
2,696,850 UART: [fht] FMC Alias Private Key: 7
2,805,083 UART: [art] Extend RT PCRs Done
2,805,511 UART: [art] Lock RT PCRs Done
2,806,993 UART: [art] Populate DV Done
2,815,374 UART: [fht] FMC Alias Private Key: 7
2,816,468 UART: [art] Derive CDI
2,816,748 UART: [art] Store in in slot 0x4
2,902,303 UART: [art] Derive Key Pair
2,902,663 UART: [art] Store priv key in slot 0x5
2,915,767 UART: [art] Derive Key Pair - Done
2,930,436 UART: [art] Signing Cert with AUTHO
2,930,916 UART: RITY.KEYID = 7
2,946,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,967 UART: [art] PUB.X = 24DD450454E33A8E19D99D4FA11FA2C109EB7E72D573E9D38421D030B1419126EEA1D0EAE15DAC4FE5B53EBDC78C300D
2,953,744 UART: [art] PUB.Y = 2CE75770E2A2F39F10A2C2DBAE91BE3F81D7340F314298CAAE9F0E50906A5769D992E16723E6E3B56520DECF5C4C675C
2,960,698 UART: [art] SIG.R = EE31411AFFCBE90C95C7110049C115E520B61624662082A52C6E9DC369E9D37E753EFC55164582069D8735EAA0C9A5F0
2,967,440 UART: [art] SIG.S = C8E8801938D13805E2F5D9D4BECC09B981589E5F474FCC765BFF366CB504F954AC5DA77630A59EF54A1AB6AEC2DBD79B
2,991,894 UART: Caliptra RT
2,992,147 UART: [state] CFI Enabled
3,100,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,409 UART: [rt]cmd =0x4453424c, len=4
3,144,254 >>> mbox cmd response data (8 bytes)
3,144,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,326 >>> mbox cmd response: success
5,577,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,590,758 UART:
5,590,774 UART: Running Caliptra FMC ...
5,591,182 UART:
5,591,236 UART: [state] CFI Enabled
5,680,089 UART: [art] Extend RT PCRs Done
5,680,517 UART: [art] Lock RT PCRs Done
5,681,566 UART: [art] Populate DV Done
5,689,649 UART: [fht] FMC Alias Private Key: 7
5,690,661 UART: [art] Derive CDI
5,690,941 UART: [art] Store in in slot 0x4
5,776,560 UART: [art] Derive Key Pair
5,776,920 UART: [art] Store priv key in slot 0x5
5,789,922 UART: [art] Derive Key Pair - Done
5,804,974 UART: [art] Signing Cert with AUTHO
5,805,454 UART: RITY.KEYID = 7
5,820,594 UART: [art] Erasing AUTHORITY.KEYID = 7
5,821,359 UART: [art] PUB.X = 105B9AFE374037215CA511BFDCE2C4673E88010E7ABB69522CDFA6D795A9C28D1EE5534F7D65B44A8E57F92A8FE3B592
5,828,135 UART: [art] PUB.Y = BED1AF36653B77CB0B9F4975B6E638923313B4E2B673A21BFC12DC72CB8E0E6A3A18B7B75EE590D50F651EE3912473AB
5,835,088 UART: [art] SIG.R = F0144E4931B45DD215A042D5BC8D81BC1C7BA747953F2D380BA60F25B507AF8C423998B862E0671F9D8FD0FBCEFCFCC0
5,841,865 UART: [art] SIG.S = 4175E580CC51D323C9D110879006EFE07C60C36756889D60DEE5347A79A0FAE9E99E77B46E038811BFBEF75149BB7A5B
5,865,462 UART: Caliptra RT
5,865,715 UART: [state] CFI Enabled
6,157,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,187,197 UART: [rt]cmd =0x494e464f, len=4
6,190,810 >>> mbox cmd response data (312 bytes)
6,190,811 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,220,208 UART: [rt]cmd =0x43455252, len=4
6,231,108 >>> mbox cmd response data (783 bytes)
6,231,109 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,261,242 UART: [rt]cmd =0x44504543, len=92
6,443,878 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,132 UART: [state] WD Timer not started. Device not locked for debugging
87,259 UART: [kat] SHA2-256
890,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,938 UART: [kat] ++
895,090 UART: [kat] sha1
899,240 UART: [kat] SHA2-256
901,180 UART: [kat] SHA2-384
903,883 UART: [kat] SHA2-512-ACC
905,784 UART: [kat] ECC-384
915,637 UART: [kat] HMAC-384Kdf
920,137 UART: [kat] LMS
1,168,449 UART: [kat] --
1,169,418 UART: [cold-reset] ++
1,169,828 UART: [fht] FHT @ 0x50003400
1,172,540 UART: [idev] ++
1,172,708 UART: [idev] CDI.KEYID = 6
1,173,069 UART: [idev] SUBJECT.KEYID = 7
1,173,494 UART: [idev] UDS.KEYID = 0
1,173,840 ready_for_fw is high
1,173,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,424 UART: [idev] Erasing UDS.KEYID = 0
1,198,110 UART: [idev] Sha1 KeyId Algorithm
1,206,948 UART: [idev] --
1,207,849 UART: [ldev] ++
1,208,017 UART: [ldev] CDI.KEYID = 6
1,208,381 UART: [ldev] SUBJECT.KEYID = 5
1,208,808 UART: [ldev] AUTHORITY.KEYID = 7
1,209,271 UART: [ldev] FE.KEYID = 1
1,214,203 UART: [ldev] Erasing FE.KEYID = 1
1,240,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,471 UART: [ldev] --
1,279,927 UART: [fwproc] Wait for Commands...
1,280,570 UART: [fwproc] Recv command 0x46574c44
1,281,303 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,406 >>> mbox cmd response: success
2,773,406 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,774,547 UART: [afmc] ++
2,774,715 UART: [afmc] CDI.KEYID = 6
2,775,078 UART: [afmc] SUBJECT.KEYID = 7
2,775,504 UART: [afmc] AUTHORITY.KEYID = 5
2,811,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,438 UART: [afmc] --
2,855,434 UART: [cold-reset] --
2,856,416 UART: [state] Locking Datavault
2,857,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,313 UART: [state] Locking ICCM
2,858,909 UART: [exit] Launching FMC @ 0x40000130
2,864,238 UART:
2,864,254 UART: Running Caliptra FMC ...
2,864,662 UART:
2,864,805 UART: [state] CFI Enabled
2,875,372 UART: [fht] FMC Alias Private Key: 7
2,983,275 UART: [art] Extend RT PCRs Done
2,983,703 UART: [art] Lock RT PCRs Done
2,985,149 UART: [art] Populate DV Done
2,993,436 UART: [fht] FMC Alias Private Key: 7
2,994,456 UART: [art] Derive CDI
2,994,736 UART: [art] Store in in slot 0x4
3,080,179 UART: [art] Derive Key Pair
3,080,539 UART: [art] Store priv key in slot 0x5
3,094,167 UART: [art] Derive Key Pair - Done
3,108,895 UART: [art] Signing Cert with AUTHO
3,109,375 UART: RITY.KEYID = 7
3,124,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,242 UART: [art] PUB.X = F28235F9DA47F875899082301BAF3D491A83EF9110C35132EA84CF966D164F0CCB2A24E1886A265B4CDC6B4A783BB5CE
3,132,017 UART: [art] PUB.Y = 657ED24CF9FFF4869C4725A9B1291E719CDD7F413DF3BC923036B90C4D25A0F80955AB9A69FA3BA14036C4ED3F9EF93B
3,138,975 UART: [art] SIG.R = E73F171F2F26454DD39E9EABBC8AE4AD965166F26BB3BA411162FC25A3E65EAF888A42E518E9945A074E50F19781E0C5
3,145,752 UART: [art] SIG.S = D24393B363A2F680CBFF09CFA294F6F978898A71A3383FFE15F2BD1B2AD465CAD09BB7DCF726D590A51F76E2DC2F91F4
3,169,642 UART: Caliptra RT
3,169,987 UART: [state] CFI Enabled
3,277,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,115 UART: [rt]cmd =0x4453424c, len=4
3,321,804 >>> mbox cmd response data (8 bytes)
3,321,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,408 UART:
3,322,424 UART: Running Caliptra ROM ...
3,322,832 UART:
3,322,974 UART: [state] CFI Enabled
3,326,308 UART: [state] LifecycleState = Unprovisioned
3,326,963 UART: [state] DebugLocked = No
3,327,463 UART: [state] WD Timer not started. Device not locked for debugging
3,328,803 UART: [kat] SHA2-256
4,132,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,136,482 UART: [kat] ++
4,136,634 UART: [kat] sha1
4,141,006 UART: [kat] SHA2-256
4,142,946 UART: [kat] SHA2-384
4,145,803 UART: [kat] SHA2-512-ACC
4,147,703 UART: [kat] ECC-384
4,157,532 UART: [kat] HMAC-384Kdf
4,162,178 UART: [kat] LMS
4,410,490 UART: [kat] --
4,411,400 UART: [update-reset] ++
5,723,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,724,326 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,874,150 >>> mbox cmd response: success
5,874,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,265 UART: [update-reset] Copying MAN_2 To MAN_1
5,882,279 UART: [update-reset Success] --
5,883,004 UART: [state] Locking Datavault
5,883,700 UART: [state] Locking PCR0, PCR1 and PCR31
5,884,304 UART: [state] Locking ICCM
5,884,920 UART: [exit] Launching FMC @ 0x40000130
5,890,249 UART:
5,890,265 UART: Running Caliptra FMC ...
5,890,673 UART:
5,890,816 UART: [state] CFI Enabled
5,979,625 UART: [art] Extend RT PCRs Done
5,980,053 UART: [art] Lock RT PCRs Done
5,981,466 UART: [art] Populate DV Done
5,989,583 UART: [fht] FMC Alias Private Key: 7
5,990,681 UART: [art] Derive CDI
5,990,961 UART: [art] Store in in slot 0x4
6,076,794 UART: [art] Derive Key Pair
6,077,154 UART: [art] Store priv key in slot 0x5
6,090,582 UART: [art] Derive Key Pair - Done
6,105,496 UART: [art] Signing Cert with AUTHO
6,105,976 UART: RITY.KEYID = 7
6,121,128 UART: [art] Erasing AUTHORITY.KEYID = 7
6,121,893 UART: [art] PUB.X = 08780315FCF219314957B8057B5D8C27EA786226587D6F75A4651182FFA2910820A44B295E4B3F42CE3B53BCECD2272B
6,128,647 UART: [art] PUB.Y = 88147D660895B7CD9D45EDF3FD303BC754DD0BB3FA05DB42C83E20F63F3611F94D31CCDCDD4DB3BEA3AB205BEA0CFECA
6,135,617 UART: [art] SIG.R = DFB5EDD48D1F35A08A9603C867C5DEDAA949C1E782C06F77245BC01D538A9799CD37536D206D9288D5A0E38385593C10
6,142,388 UART: [art] SIG.S = 65254D4D4216300F4691DBB3A701951788F16FC45BC022810E53622D4AB06658CB1D2888526CCBE7303ED413891F578B
6,166,320 UART: Caliptra RT
6,166,665 UART: [state] CFI Enabled
6,462,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,492,653 UART: [rt]cmd =0x494e464f, len=4
6,496,212 >>> mbox cmd response data (312 bytes)
6,496,213 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,525,484 UART: [rt]cmd =0x43455252, len=4
6,536,360 >>> mbox cmd response data (783 bytes)
6,536,361 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,566,374 UART: [rt]cmd =0x44504543, len=92
6,749,564 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 ready_for_fw is high
1,056,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,889 >>> mbox cmd response: success
2,621,889 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,683,995 UART:
2,684,011 UART: Running Caliptra FMC ...
2,684,419 UART:
2,684,562 UART: [state] CFI Enabled
2,695,413 UART: [fht] FMC Alias Private Key: 7
2,803,272 UART: [art] Extend RT PCRs Done
2,803,700 UART: [art] Lock RT PCRs Done
2,805,384 UART: [art] Populate DV Done
2,813,829 UART: [fht] FMC Alias Private Key: 7
2,814,925 UART: [art] Derive CDI
2,815,205 UART: [art] Store in in slot 0x4
2,900,930 UART: [art] Derive Key Pair
2,901,290 UART: [art] Store priv key in slot 0x5
2,914,310 UART: [art] Derive Key Pair - Done
2,929,028 UART: [art] Signing Cert with AUTHO
2,929,508 UART: RITY.KEYID = 7
2,944,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,615 UART: [art] PUB.X = F9FF10A976DF8E055EF60DE8DBD6CDDEF975C064632CA3B758480885E9280A3A3C47286022BD6478DF1CDB61346070E4
2,952,381 UART: [art] PUB.Y = F3EEB6959F811F4A1250B5994DC49DB7703EE16E244C64CD725B2FF53EFDA78BC178483FB6A5DF6D80C586A92223DD36
2,959,343 UART: [art] SIG.R = 2696B073F732F9A8B4F5E1CC2CAAA9B02248ED561DF1D09E9AC3D204011894E3962EB4F5F894E885739BD63FC1C585F9
2,966,115 UART: [art] SIG.S = 92FFC99002386B4776B27BCA459E31324F74D87D9C4BAA63A528297D0BBB9E931D375FB299BC3833C27EB84EEC5179A5
2,989,982 UART: Caliptra RT
2,990,327 UART: [state] CFI Enabled
3,098,960 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,366 UART: [rt]cmd =0x4453424c, len=4
3,142,961 >>> mbox cmd response data (8 bytes)
3,142,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,575,074 >>> mbox cmd response: success
5,575,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,588,820 UART:
5,588,836 UART: Running Caliptra FMC ...
5,589,244 UART:
5,589,387 UART: [state] CFI Enabled
5,678,092 UART: [art] Extend RT PCRs Done
5,678,520 UART: [art] Lock RT PCRs Done
5,679,789 UART: [art] Populate DV Done
5,688,152 UART: [fht] FMC Alias Private Key: 7
5,689,138 UART: [art] Derive CDI
5,689,418 UART: [art] Store in in slot 0x4
5,775,557 UART: [art] Derive Key Pair
5,775,917 UART: [art] Store priv key in slot 0x5
5,790,087 UART: [art] Derive Key Pair - Done
5,804,779 UART: [art] Signing Cert with AUTHO
5,805,259 UART: RITY.KEYID = 7
5,820,749 UART: [art] Erasing AUTHORITY.KEYID = 7
5,821,514 UART: [art] PUB.X = 8B16D196EDA80AD1C3AE5FB2A1B55F27987C2B8AA405FD31CAE31BA6238F6038039B160308F18E65E28B50BAB30A23B9
5,828,278 UART: [art] PUB.Y = 608E0D9AA06EBA7990B2AAF40C32E60527B9EBA7B7AFCD48E1F32A1CB575D42D178E4D6DF461C78B9D728549CA7EC534
5,835,237 UART: [art] SIG.R = D4E4016EB80A24B65B786AD8F8A72C4D29FAC5043CDEAC4A0E157D160AA40CC0AA8D620E6970DCE086D055099145A2F1
5,841,997 UART: [art] SIG.S = EEA250ABFBE3D6F419880B2A6AB4B46DF60B986F357EB7A1FC57A8DCFE47E53399D1486A77374D778A2D168B59609CCD
5,866,194 UART: Caliptra RT
5,866,539 UART: [state] CFI Enabled
6,162,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,192,236 UART: [rt]cmd =0x494e464f, len=4
6,195,971 >>> mbox cmd response data (312 bytes)
6,195,972 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,225,403 UART: [rt]cmd =0x43455252, len=4
6,236,196 >>> mbox cmd response data (784 bytes)
6,236,197 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,266,210 UART: [rt]cmd =0x44504543, len=92
6,449,748 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,944 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,817 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 ready_for_fw is high
1,480,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,356 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,680 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,547,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,222 UART: [ldev] --
1,586,697 UART: [fwproc] Waiting for Commands...
1,587,356 UART: [fwproc] Received command 0x46574c44
1,588,147 UART: [fwproc] Received Image of size 114332 bytes
2,886,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,588 >>> mbox cmd response: success
3,079,588 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,080,844 UART: [afmc] ++
3,081,012 UART: [afmc] CDI.KEYID = 6
3,081,374 UART: [afmc] SUBJECT.KEYID = 7
3,081,799 UART: [afmc] AUTHORITY.KEYID = 5
3,116,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,775 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,465 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,342 UART: [afmc] --
3,159,420 UART: [cold-reset] --
3,160,368 UART: [state] Locking Datavault
3,161,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,281 UART: [state] Locking ICCM
3,162,775 UART: [exit] Launching FMC @ 0x40000130
3,168,104 UART:
3,168,120 UART: Running Caliptra FMC ...
3,168,528 UART:
3,168,582 UART: [state] CFI Enabled
3,178,651 UART: [fht] FMC Alias Private Key: 7
3,286,544 UART: [art] Extend RT PCRs Done
3,286,972 UART: [art] Lock RT PCRs Done
3,288,788 UART: [art] Populate DV Done
3,296,981 UART: [fht] FMC Alias Private Key: 7
3,298,119 UART: [art] Derive CDI
3,298,399 UART: [art] Store in in slot 0x4
3,383,784 UART: [art] Derive Key Pair
3,384,144 UART: [art] Store priv key in slot 0x5
3,397,742 UART: [art] Derive Key Pair - Done
3,412,571 UART: [art] Signing Cert with AUTHO
3,413,051 UART: RITY.KEYID = 7
3,428,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,360 UART: [art] PUB.X = 0DF9128E61F89BE0476508C145E99D5AE0344A7C0BF0E02ED100B05A41B856B02D66E74ACF97615269DDA1BDC021C8F2
3,436,107 UART: [art] PUB.Y = 709BFB1B9DD1DC20BC2229A76183F13AD77BFFD61DE6DF986E36D3C5ABF1E2AD5647AE43C7E7047BA3F018253FAD5921
3,443,074 UART: [art] SIG.R = A16A04A3EDCCB9CE266D2A34A196FA056EFE03280BE0230FEAD7DAF4B0122DD1B2A183073606199EEF9915949302DE66
3,449,832 UART: [art] SIG.S = 409DE7E1EED943806DD8AB2B1E9F1E46D241A5C09CAAFC789F0E8ED546291B50030F1CBB4CEF8DDA88E11244973AA417
3,473,346 UART: Caliptra RT
3,473,599 UART: [state] CFI Enabled
3,581,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,100 UART: [rt]cmd =0x44504543, len=136
3,677,592 >>> mbox cmd response data (136 bytes)
3,677,593 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,066 UART: [rt]cmd =0x4453424c, len=4
3,720,445 >>> mbox cmd response data (8 bytes)
3,720,446 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,507 UART: [rt]cmd =0x44504543, len=92
3,933,712 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 ready_for_fw is high
1,362,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,980 >>> mbox cmd response: success
2,927,980 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,326 UART:
2,988,342 UART: Running Caliptra FMC ...
2,988,750 UART:
2,988,804 UART: [state] CFI Enabled
2,999,189 UART: [fht] FMC Alias Private Key: 7
3,106,794 UART: [art] Extend RT PCRs Done
3,107,222 UART: [art] Lock RT PCRs Done
3,108,754 UART: [art] Populate DV Done
3,116,861 UART: [fht] FMC Alias Private Key: 7
3,117,911 UART: [art] Derive CDI
3,118,191 UART: [art] Store in in slot 0x4
3,204,038 UART: [art] Derive Key Pair
3,204,398 UART: [art] Store priv key in slot 0x5
3,217,648 UART: [art] Derive Key Pair - Done
3,232,273 UART: [art] Signing Cert with AUTHO
3,232,753 UART: RITY.KEYID = 7
3,248,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,170 UART: [art] PUB.X = B0583EA21821C314049157F9D1E0151824C92302F0FD4A52A58AC955C81F0262905E9A280D19E4B024A9FF308DB42371
3,255,920 UART: [art] PUB.Y = ACC1191CBD1F5D05216873FE8CE9D8011D87D34460CFC61E0FF262CAC6746E3542057CEF27E0547623C55C956D7E1E73
3,262,864 UART: [art] SIG.R = 4E3569B3053CA7ADA38C7A6A5813B746F781CE50607074606EA5A32F3C6DEBF7AB97D3062F7D2D6CAF218134D9BC56AB
3,269,640 UART: [art] SIG.S = C41595449BF9103B2469F877DD134D6D0EC2AA535B7AB5E88748B0DBE3BECECA585A777DCAA2D989321547304AD22B3F
3,292,968 UART: Caliptra RT
3,293,221 UART: [state] CFI Enabled
3,400,180 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,500 UART: [rt]cmd =0x44504543, len=136
3,494,678 >>> mbox cmd response data (136 bytes)
3,494,679 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,782 UART: [rt]cmd =0x4453424c, len=4
3,537,331 >>> mbox cmd response data (8 bytes)
3,537,332 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,357 UART: [rt]cmd =0x44504543, len=92
3,751,348 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,580 UART: [kat] SHA2-256
892,518 UART: [kat] SHA2-384
895,345 UART: [kat] SHA2-512-ACC
897,246 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,818 UART: [fht] Storing FHT @ 0x50003400
1,479,715 UART: [idev] ++
1,479,883 UART: [idev] CDI.KEYID = 6
1,480,243 UART: [idev] SUBJECT.KEYID = 7
1,480,667 UART: [idev] UDS.KEYID = 0
1,481,012 ready_for_fw is high
1,481,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,569 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,191 UART: [idev] --
1,515,296 UART: [ldev] ++
1,515,464 UART: [ldev] CDI.KEYID = 6
1,515,827 UART: [ldev] SUBJECT.KEYID = 5
1,516,253 UART: [ldev] AUTHORITY.KEYID = 7
1,516,716 UART: [ldev] FE.KEYID = 1
1,521,826 UART: [ldev] Erasing FE.KEYID = 1
1,547,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,993 UART: [ldev] --
1,586,374 UART: [fwproc] Waiting for Commands...
1,586,991 UART: [fwproc] Received command 0x46574c44
1,587,782 UART: [fwproc] Received Image of size 114332 bytes
2,885,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,976 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,185 >>> mbox cmd response: success
3,078,185 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,293 UART: [afmc] ++
3,079,461 UART: [afmc] CDI.KEYID = 6
3,079,823 UART: [afmc] SUBJECT.KEYID = 7
3,080,248 UART: [afmc] AUTHORITY.KEYID = 5
3,116,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,375 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,883 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,768 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,458 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,547 UART: [afmc] --
3,159,445 UART: [cold-reset] --
3,160,329 UART: [state] Locking Datavault
3,161,546 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,150 UART: [state] Locking ICCM
3,162,606 UART: [exit] Launching FMC @ 0x40000130
3,167,935 UART:
3,167,951 UART: Running Caliptra FMC ...
3,168,359 UART:
3,168,502 UART: [state] CFI Enabled
3,178,811 UART: [fht] FMC Alias Private Key: 7
3,286,550 UART: [art] Extend RT PCRs Done
3,286,978 UART: [art] Lock RT PCRs Done
3,288,852 UART: [art] Populate DV Done
3,297,087 UART: [fht] FMC Alias Private Key: 7
3,298,055 UART: [art] Derive CDI
3,298,335 UART: [art] Store in in slot 0x4
3,383,756 UART: [art] Derive Key Pair
3,384,116 UART: [art] Store priv key in slot 0x5
3,397,610 UART: [art] Derive Key Pair - Done
3,412,382 UART: [art] Signing Cert with AUTHO
3,412,862 UART: RITY.KEYID = 7
3,427,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,757 UART: [art] PUB.X = 6CB08BDC6036874B455ABC967372492917DD7688D9D29D6A4E7A4012214D7D3640FC0BCF135FCC60075CBEE3B60FCA4F
3,435,528 UART: [art] PUB.Y = E8D72FA9E47625BAE5C008399C766C846BB45806B8935FE9D03B1D849381053B5EDEBB7520DD6A3E7C29BA6C315B33C4
3,442,477 UART: [art] SIG.R = 91744D14DD0A1C4C155020A3CA1E7D86D9D39F710BA13123EBD4EC247C960E5FB580DFAD8F32D6951D5EDDA43B670B8A
3,449,251 UART: [art] SIG.S = 0ACD8FFACD828B007D5CB9B52077BCB8BFA111CF77D4651A168B33FDE0DE48450449D9703F4A94D90A9317CDAA7EE993
3,473,149 UART: Caliptra RT
3,473,494 UART: [state] CFI Enabled
3,581,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,383 UART: [rt]cmd =0x44504543, len=136
3,676,115 >>> mbox cmd response data (136 bytes)
3,676,116 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,459 UART: [rt]cmd =0x4453424c, len=4
3,718,786 >>> mbox cmd response data (8 bytes)
3,718,787 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,864 UART: [rt]cmd =0x44504543, len=92
3,931,657 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,188 ready_for_fw is high
1,362,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,699 >>> mbox cmd response: success
2,927,699 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,989,393 UART:
2,989,409 UART: Running Caliptra FMC ...
2,989,817 UART:
2,989,960 UART: [state] CFI Enabled
3,000,583 UART: [fht] FMC Alias Private Key: 7
3,108,572 UART: [art] Extend RT PCRs Done
3,109,000 UART: [art] Lock RT PCRs Done
3,110,526 UART: [art] Populate DV Done
3,119,021 UART: [fht] FMC Alias Private Key: 7
3,120,175 UART: [art] Derive CDI
3,120,455 UART: [art] Store in in slot 0x4
3,206,086 UART: [art] Derive Key Pair
3,206,446 UART: [art] Store priv key in slot 0x5
3,220,076 UART: [art] Derive Key Pair - Done
3,234,933 UART: [art] Signing Cert with AUTHO
3,235,413 UART: RITY.KEYID = 7
3,250,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,644 UART: [art] PUB.X = 1FFFA1C818943222DB7EB7ECAE3C72033947CE60006328522F27B4108A2185515628AA3BF6A39483C5ED5B705DFB7E61
3,258,391 UART: [art] PUB.Y = 159095A77E050274921C3CD47B24CD3CFDE2082DB1D62DB7382C3499B747D47241345D8CA0508D6B37FCCB8639056A29
3,265,327 UART: [art] SIG.R = F517263A39E7645F38A7012A6B7A593D65F2BBD573708978B4B021D3B3DBC7BA80AC0EF4CBE460933AD020F40ADD0F0C
3,272,094 UART: [art] SIG.S = 37F847FB76319739010F88351DAF9E8A9CECF0E77CE68DC34B9130CFF24468DDA52A978386F87208478911F565D456C7
3,296,396 UART: Caliptra RT
3,296,741 UART: [state] CFI Enabled
3,405,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,072 UART: [rt]cmd =0x44504543, len=136
3,500,358 >>> mbox cmd response data (136 bytes)
3,500,359 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,768 UART: [rt]cmd =0x4453424c, len=4
3,544,209 >>> mbox cmd response data (8 bytes)
3,544,210 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,245 UART: [rt]cmd =0x44504543, len=92
3,757,019 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
892,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,123 UART: [kat] ++
897,275 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,370 UART: [kat] SHA2-512-ACC
908,271 UART: [kat] ECC-384
917,562 UART: [kat] HMAC-384Kdf
922,264 UART: [kat] LMS
1,170,592 UART: [kat] --
1,171,625 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,762 UART: [idev] ++
1,174,930 UART: [idev] CDI.KEYID = 6
1,175,290 UART: [idev] SUBJECT.KEYID = 7
1,175,714 UART: [idev] UDS.KEYID = 0
1,176,059 ready_for_fw is high
1,176,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,509 UART: [idev] Sha1 KeyId Algorithm
1,208,941 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,290 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,323 >>> mbox cmd response: success
2,774,323 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,335 UART: [afmc] ++
2,775,503 UART: [afmc] CDI.KEYID = 6
2,775,865 UART: [afmc] SUBJECT.KEYID = 7
2,776,290 UART: [afmc] AUTHORITY.KEYID = 5
2,812,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,092 UART: [afmc] --
2,855,980 UART: [cold-reset] --
2,856,974 UART: [state] Locking Datavault
2,858,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,979 UART: [state] Locking ICCM
2,859,545 UART: [exit] Launching FMC @ 0x40000130
2,864,874 UART:
2,864,890 UART: Running Caliptra FMC ...
2,865,298 UART:
2,865,352 UART: [state] CFI Enabled
2,875,661 UART: [fht] FMC Alias Private Key: 7
2,983,220 UART: [art] Extend RT PCRs Done
2,983,648 UART: [art] Lock RT PCRs Done
2,985,288 UART: [art] Populate DV Done
2,993,319 UART: [fht] FMC Alias Private Key: 7
2,994,279 UART: [art] Derive CDI
2,994,559 UART: [art] Store in in slot 0x4
3,080,184 UART: [art] Derive Key Pair
3,080,544 UART: [art] Store priv key in slot 0x5
3,093,602 UART: [art] Derive Key Pair - Done
3,108,314 UART: [art] Signing Cert with AUTHO
3,108,794 UART: RITY.KEYID = 7
3,124,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,387 UART: [art] PUB.X = BA347ED463B036F8751A2B9DB6C20D74D27576D052E281B50AD068DCD5A4D7948FCCCF2CF9544229FAAF3D8A4BA289D3
3,132,167 UART: [art] PUB.Y = 1FFD291D7024FDF394C13C9DEFAB7BBB86E073CF341DFA3E1D9180176034EF9B15AB5C56A3FB6085F17DD04694E7821A
3,139,133 UART: [art] SIG.R = 841702A57908FA6C6EF383C100786BE61E890552BCDC0DE7701EBBC90EFFF3BDCCA268DDFD48CC0A6A18BD0C2AA60CB9
3,145,883 UART: [art] SIG.S = D6F6A1B854A6A9652E9B097B52DCFED9020B2DBB5EECD0969E4BC35B70758913BE16FB4077A8DEE29778BF1404D30CFD
3,170,217 UART: Caliptra RT
3,170,470 UART: [state] CFI Enabled
3,278,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,674 UART: [rt]cmd =0x44504543, len=136
3,373,528 >>> mbox cmd response data (136 bytes)
3,373,529 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,074 UART: [rt]cmd =0x4453424c, len=4
3,417,179 >>> mbox cmd response data (8 bytes)
3,417,180 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,185 UART: [rt]cmd =0x44504543, len=92
3,630,311 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 ready_for_fw is high
1,060,143 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,556 >>> mbox cmd response: success
2,625,556 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,974 UART:
2,686,990 UART: Running Caliptra FMC ...
2,687,398 UART:
2,687,452 UART: [state] CFI Enabled
2,698,279 UART: [fht] FMC Alias Private Key: 7
2,806,722 UART: [art] Extend RT PCRs Done
2,807,150 UART: [art] Lock RT PCRs Done
2,808,496 UART: [art] Populate DV Done
2,816,891 UART: [fht] FMC Alias Private Key: 7
2,818,073 UART: [art] Derive CDI
2,818,353 UART: [art] Store in in slot 0x4
2,903,714 UART: [art] Derive Key Pair
2,904,074 UART: [art] Store priv key in slot 0x5
2,917,104 UART: [art] Derive Key Pair - Done
2,931,796 UART: [art] Signing Cert with AUTHO
2,932,276 UART: RITY.KEYID = 7
2,947,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,721 UART: [art] PUB.X = 6488EC295F9EF48AA79D3C9F0A42F219EF9222D8013689A24425C484C4E1A7DE450F47C2848A989840B68F9F4B920E95
2,955,477 UART: [art] PUB.Y = 272CA2C75B96B32902A0FAD0D0A06F75EB93F2510EED320E621D9D174D7D86953795A0BA3AA6FC85912C925F29C193C0
2,962,424 UART: [art] SIG.R = 3E73E39EC9A5311437B90F69D89055EB205BAB9B7D352FD81A7C388A7566424A970716B10C28CE59FDBC0545125374E5
2,969,180 UART: [art] SIG.S = 59776E2D0E7F3BC66B372A9ED167E457AAF25A2B6BEABC1436864D6D75671E7EF5AF752497AE78DAE6BD41EA1CFBA38F
2,993,134 UART: Caliptra RT
2,993,387 UART: [state] CFI Enabled
3,101,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,882 UART: [rt]cmd =0x44504543, len=136
3,197,092 >>> mbox cmd response data (136 bytes)
3,197,093 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,682 UART: [rt]cmd =0x4453424c, len=4
3,240,501 >>> mbox cmd response data (8 bytes)
3,240,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,439 UART: [rt]cmd =0x44504543, len=92
3,453,502 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
893,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,328 UART: [kat] ++
897,480 UART: [kat] sha1
901,680 UART: [kat] SHA2-256
903,620 UART: [kat] SHA2-384
906,397 UART: [kat] SHA2-512-ACC
908,298 UART: [kat] ECC-384
917,645 UART: [kat] HMAC-384Kdf
922,163 UART: [kat] LMS
1,170,491 UART: [kat] --
1,171,630 UART: [cold-reset] ++
1,172,114 UART: [fht] FHT @ 0x50003400
1,174,679 UART: [idev] ++
1,174,847 UART: [idev] CDI.KEYID = 6
1,175,207 UART: [idev] SUBJECT.KEYID = 7
1,175,631 UART: [idev] UDS.KEYID = 0
1,175,976 ready_for_fw is high
1,175,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,360 UART: [idev] Sha1 KeyId Algorithm
1,209,744 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,316 UART: [ldev] --
1,282,821 UART: [fwproc] Wait for Commands...
1,283,529 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,632 >>> mbox cmd response: success
2,773,632 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,808 UART: [afmc] ++
2,774,976 UART: [afmc] CDI.KEYID = 6
2,775,338 UART: [afmc] SUBJECT.KEYID = 7
2,775,763 UART: [afmc] AUTHORITY.KEYID = 5
2,811,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,003 UART: [afmc] --
2,855,109 UART: [cold-reset] --
2,855,921 UART: [state] Locking Datavault
2,856,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,450 UART: [state] Locking ICCM
2,857,916 UART: [exit] Launching FMC @ 0x40000130
2,863,245 UART:
2,863,261 UART: Running Caliptra FMC ...
2,863,669 UART:
2,863,812 UART: [state] CFI Enabled
2,874,541 UART: [fht] FMC Alias Private Key: 7
2,982,036 UART: [art] Extend RT PCRs Done
2,982,464 UART: [art] Lock RT PCRs Done
2,984,100 UART: [art] Populate DV Done
2,992,315 UART: [fht] FMC Alias Private Key: 7
2,993,431 UART: [art] Derive CDI
2,993,711 UART: [art] Store in in slot 0x4
3,079,260 UART: [art] Derive Key Pair
3,079,620 UART: [art] Store priv key in slot 0x5
3,092,988 UART: [art] Derive Key Pair - Done
3,107,986 UART: [art] Signing Cert with AUTHO
3,108,466 UART: RITY.KEYID = 7
3,123,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,623 UART: [art] PUB.X = 93EDE082694D335BA143ACD9A1D262CFDF2928AE3BD186004125E393735E65B74E2D385F42D6EEE34143E1F5C73C8CD0
3,131,379 UART: [art] PUB.Y = 03E7B64AFFDA1F8BAD1B73FCA0509EC3BD5CC452EC073D1C0C20AABCFBF24863616C814FEA2E0678E61A160BCF496CEE
3,138,344 UART: [art] SIG.R = 9F154D0405AE8C9F414264C4CA0F2E409759EEEADBC24780F1622E3E92C2BFB003B5D5F10E5B2DA6E09B1FFC6C73AC18
3,145,117 UART: [art] SIG.S = 42F0EE678722AEE4F77A5F3C5C4CA504BBA733A994B195939DBFA60B36FCFB7A0F1469F15E816DA3E4FAA763F74AC055
3,169,505 UART: Caliptra RT
3,169,850 UART: [state] CFI Enabled
3,277,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,027 UART: [rt]cmd =0x44504543, len=136
3,372,749 >>> mbox cmd response data (136 bytes)
3,372,750 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,095 UART: [rt]cmd =0x4453424c, len=4
3,416,198 >>> mbox cmd response data (8 bytes)
3,416,199 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,108 UART: [rt]cmd =0x44504543, len=92
3,629,727 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,220 ready_for_fw is high
1,060,220 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,347 >>> mbox cmd response: success
2,628,347 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,690,533 UART:
2,690,549 UART: Running Caliptra FMC ...
2,690,957 UART:
2,691,100 UART: [state] CFI Enabled
2,701,785 UART: [fht] FMC Alias Private Key: 7
2,809,794 UART: [art] Extend RT PCRs Done
2,810,222 UART: [art] Lock RT PCRs Done
2,811,694 UART: [art] Populate DV Done
2,820,349 UART: [fht] FMC Alias Private Key: 7
2,821,429 UART: [art] Derive CDI
2,821,709 UART: [art] Store in in slot 0x4
2,907,588 UART: [art] Derive Key Pair
2,907,948 UART: [art] Store priv key in slot 0x5
2,921,266 UART: [art] Derive Key Pair - Done
2,936,219 UART: [art] Signing Cert with AUTHO
2,936,699 UART: RITY.KEYID = 7
2,951,985 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,750 UART: [art] PUB.X = 3CA611BC9640928D19346630AF9AEFD3EBF083E2574708EB55B32F277FE2D3AB92FF368A03BC4071DCBAD3C58C848EDE
2,959,530 UART: [art] PUB.Y = 76B32E0B3D544733A8DFCCDDDD251D783AA848BE80BF07C7879864281F0B8F3E6F0768B6D60A6B9B596035C68F397D0F
2,966,470 UART: [art] SIG.R = 8F58AD341245E6172E590A0775942B6A528DCA2D482A8F79BD787A0EF1FFF789B72F7F90ED3EAF7B368C698973E929FB
2,973,239 UART: [art] SIG.S = 5129787278327A4AF94DD281C5C7E692BA3102C62D5EDF07F96D34CDFB127849D110D147D2513266506975709BF061EF
2,996,946 UART: Caliptra RT
2,997,291 UART: [state] CFI Enabled
3,105,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,702 UART: [rt]cmd =0x44504543, len=136
3,201,142 >>> mbox cmd response data (136 bytes)
3,201,143 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,280 UART: [rt]cmd =0x4453424c, len=4
3,244,453 >>> mbox cmd response data (8 bytes)
3,244,454 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,493 UART: [rt]cmd =0x44504543, len=92
3,457,911 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,239 UART: [kat] SHA2-256
901,179 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,631 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,173,793 ready_for_fw is high
1,173,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,450 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,488 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,879 >>> mbox cmd response: success
2,771,879 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,990 UART: [afmc] ++
2,773,158 UART: [afmc] CDI.KEYID = 6
2,773,521 UART: [afmc] SUBJECT.KEYID = 7
2,773,947 UART: [afmc] AUTHORITY.KEYID = 5
2,809,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,957 UART: [afmc] --
2,852,979 UART: [cold-reset] --
2,853,661 UART: [state] Locking Datavault
2,854,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,492 UART: [state] Locking ICCM
2,856,032 UART: [exit] Launching FMC @ 0x40000130
2,861,361 UART:
2,861,377 UART: Running Caliptra FMC ...
2,861,785 UART:
2,861,839 UART: [state] CFI Enabled
2,872,300 UART: [fht] FMC Alias Private Key: 7
2,980,491 UART: [art] Extend RT PCRs Done
2,980,919 UART: [art] Lock RT PCRs Done
2,982,517 UART: [art] Populate DV Done
2,990,782 UART: [fht] FMC Alias Private Key: 7
2,991,840 UART: [art] Derive CDI
2,992,120 UART: [art] Store in in slot 0x4
3,078,165 UART: [art] Derive Key Pair
3,078,525 UART: [art] Store priv key in slot 0x5
3,091,645 UART: [art] Derive Key Pair - Done
3,106,459 UART: [art] Signing Cert with AUTHO
3,106,939 UART: RITY.KEYID = 7
3,121,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,752 UART: [art] PUB.X = FA05FFD32AC8743DBB445C1DDA0FB7DCE2382B80997456F6749F64A967829DF6AB68035F9BF34DB0D963F64EAE94875F
3,129,527 UART: [art] PUB.Y = BA0C255ADEA70B355042368C0F63DEBB467A659F89921BB9D64C3D8515A754921B7966C4E3B1BCD41534D5E45B6072B2
3,136,472 UART: [art] SIG.R = F7D9DB5062BCB799D7F716CBC5F094581770A8E90542A2F9699626902B4D318E619E1255E9C308EAF38893B32800C527
3,143,208 UART: [art] SIG.S = CB75A9B698A575FC8CB0A16ABBC9DC16E0E08F13D0465E1EB927CA6E2FA8B3B5801EBF944E4B95724E421A0F7301D911
3,167,501 UART: Caliptra RT
3,167,754 UART: [state] CFI Enabled
3,276,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,708 UART: [rt]cmd =0x44504543, len=136
3,371,336 >>> mbox cmd response data (136 bytes)
3,371,337 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,794 UART: [rt]cmd =0x4453424c, len=4
3,414,477 >>> mbox cmd response data (8 bytes)
3,414,478 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,411 UART: [rt]cmd =0x44504543, len=92
3,628,083 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,006 ready_for_fw is high
1,056,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,183 >>> mbox cmd response: success
2,622,183 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,683,169 UART:
2,683,185 UART: Running Caliptra FMC ...
2,683,593 UART:
2,683,647 UART: [state] CFI Enabled
2,693,982 UART: [fht] FMC Alias Private Key: 7
2,801,783 UART: [art] Extend RT PCRs Done
2,802,211 UART: [art] Lock RT PCRs Done
2,803,515 UART: [art] Populate DV Done
2,811,780 UART: [fht] FMC Alias Private Key: 7
2,812,816 UART: [art] Derive CDI
2,813,096 UART: [art] Store in in slot 0x4
2,898,835 UART: [art] Derive Key Pair
2,899,195 UART: [art] Store priv key in slot 0x5
2,912,431 UART: [art] Derive Key Pair - Done
2,927,128 UART: [art] Signing Cert with AUTHO
2,927,608 UART: RITY.KEYID = 7
2,942,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,383 UART: [art] PUB.X = 3483DD9F25B2B4C70E00C49BB028618659DAA6A0D5100965CED6F9A2A803B352D5F507C7B4BAE8E5EC6FFC78ADF71D75
2,950,135 UART: [art] PUB.Y = BA387ED9CCF2FCD5A4D8C6DC35DCC22E916BDE374E80DD5BFDC39C7F0FAB726480B37955A33F66048866E517FD03ED61
2,957,098 UART: [art] SIG.R = 27BF5AD5B51FD8538DB4052C4DE720AA005D1DF5FA94E1065476C69D2BC5634B4F35A07D05E433998B56E08A6B9CC6BB
2,963,849 UART: [art] SIG.S = 89D8BE635BB6BB7330A01CA06B4E4F2482239ED9855B523071D44ED291023BE8A923BF64E27E04DF4CB0DC6BBD54F42A
2,988,044 UART: Caliptra RT
2,988,297 UART: [state] CFI Enabled
3,096,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,676 UART: [rt]cmd =0x44504543, len=136
3,190,888 >>> mbox cmd response data (136 bytes)
3,190,889 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,224 UART: [rt]cmd =0x4453424c, len=4
3,233,757 >>> mbox cmd response data (8 bytes)
3,233,758 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,263,799 UART: [rt]cmd =0x44504543, len=92
3,446,478 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,599 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,174,592 ready_for_fw is high
1,174,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,107 UART: [ldev] --
1,281,483 UART: [fwproc] Wait for Commands...
1,282,226 UART: [fwproc] Recv command 0x46574c44
1,282,959 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,454 >>> mbox cmd response: success
2,772,454 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,665 UART: [afmc] ++
2,773,833 UART: [afmc] CDI.KEYID = 6
2,774,196 UART: [afmc] SUBJECT.KEYID = 7
2,774,622 UART: [afmc] AUTHORITY.KEYID = 5
2,810,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,370 UART: [afmc] --
2,854,412 UART: [cold-reset] --
2,855,188 UART: [state] Locking Datavault
2,856,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,935 UART: [state] Locking ICCM
2,857,373 UART: [exit] Launching FMC @ 0x40000130
2,862,702 UART:
2,862,718 UART: Running Caliptra FMC ...
2,863,126 UART:
2,863,269 UART: [state] CFI Enabled
2,873,966 UART: [fht] FMC Alias Private Key: 7
2,982,091 UART: [art] Extend RT PCRs Done
2,982,519 UART: [art] Lock RT PCRs Done
2,983,987 UART: [art] Populate DV Done
2,992,206 UART: [fht] FMC Alias Private Key: 7
2,993,342 UART: [art] Derive CDI
2,993,622 UART: [art] Store in in slot 0x4
3,079,109 UART: [art] Derive Key Pair
3,079,469 UART: [art] Store priv key in slot 0x5
3,092,177 UART: [art] Derive Key Pair - Done
3,106,988 UART: [art] Signing Cert with AUTHO
3,107,468 UART: RITY.KEYID = 7
3,122,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,631 UART: [art] PUB.X = D0FBD49DEB1309E1524A218402FCFC1AFA043C6ABC5A454541D61E24EF7F44375C071E9EA1B8E51BCF81CB3E4D4A114F
3,130,409 UART: [art] PUB.Y = 49E3C5D4C4693FF569DFDF6E368A8AB0D8AA3B96B74C36BED0E875999D278810A5910764D6DB70ACC985AB62C49C39A9
3,137,368 UART: [art] SIG.R = C02E4E772D0955BDD87B2E5F23A7F719A0919EC3FF4DA49ACB9482D94585137544CA96910771091F869622EB5948409B
3,144,125 UART: [art] SIG.S = 594962BDCACECEE47ADAD8D2432DBB57EF3C2D9C60EEE0AC1D8FAA0F05271C0AB1D5AE8A1AB4690EE9A110C2E0FA4C94
3,167,918 UART: Caliptra RT
3,168,263 UART: [state] CFI Enabled
3,275,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,024 UART: [rt]cmd =0x44504543, len=136
3,369,826 >>> mbox cmd response data (136 bytes)
3,369,827 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,206 UART: [rt]cmd =0x4453424c, len=4
3,412,887 >>> mbox cmd response data (8 bytes)
3,412,888 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,823 UART: [rt]cmd =0x44504543, len=92
3,625,935 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 ready_for_fw is high
1,056,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,732 >>> mbox cmd response: success
2,622,732 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,598 UART:
2,684,614 UART: Running Caliptra FMC ...
2,685,022 UART:
2,685,165 UART: [state] CFI Enabled
2,695,766 UART: [fht] FMC Alias Private Key: 7
2,803,293 UART: [art] Extend RT PCRs Done
2,803,721 UART: [art] Lock RT PCRs Done
2,804,937 UART: [art] Populate DV Done
2,813,272 UART: [fht] FMC Alias Private Key: 7
2,814,386 UART: [art] Derive CDI
2,814,666 UART: [art] Store in in slot 0x4
2,900,069 UART: [art] Derive Key Pair
2,900,429 UART: [art] Store priv key in slot 0x5
2,913,935 UART: [art] Derive Key Pair - Done
2,928,697 UART: [art] Signing Cert with AUTHO
2,929,177 UART: RITY.KEYID = 7
2,944,199 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,964 UART: [art] PUB.X = 2BC866FFE2834CFADF31756E097E07D0DB900A8F3704EE961C8F5F314FBE8B49EFFDC14BC5C4A0956299D6FE1074C13A
2,951,740 UART: [art] PUB.Y = 10E1C74C5E042C91ACB72AA531B942A103796C074CD88D9CDCD66E8D1317EE833FCB3E79C19B39DC94DB45A239DEA794
2,958,695 UART: [art] SIG.R = AF3FC7EB1E5984A2121EE444545D0056EAC102B33D7D7D0E8D030929706E25EFD80C6D10376A5CECEC9B11BD5B1D4E65
2,965,442 UART: [art] SIG.S = B8F3B99DF38173A8FCA886AAC5704BBDE4A720A0B2F81C116730F97D91AA1C48F71C89485CACCBA74D813994F4F1114C
2,988,999 UART: Caliptra RT
2,989,344 UART: [state] CFI Enabled
3,096,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,192 UART: [rt]cmd =0x44504543, len=136
3,191,436 >>> mbox cmd response data (136 bytes)
3,191,437 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,938 UART: [rt]cmd =0x4453424c, len=4
3,235,173 >>> mbox cmd response data (8 bytes)
3,235,174 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,913 UART: [rt]cmd =0x44504543, len=92
3,448,359 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.48s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.59s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.48s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.42s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.40s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.38s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.60s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.47s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.51s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.45s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.68s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,299 UART: [kat] SHA2-256
882,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,345 UART: [kat] ++
886,497 UART: [kat] sha1
890,811 UART: [kat] SHA2-256
892,749 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,326 UART: [kat] LMS
1,475,522 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,477,063 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 ready_for_fw is high
1,481,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,812 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,860 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,703 UART: [ldev] Erasing FE.KEYID = 1
1,547,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,846 UART: [ldev] --
1,586,305 UART: [fwproc] Waiting for Commands...
1,586,976 UART: [fwproc] Received command 0x46574c44
1,587,767 UART: [fwproc] Received Image of size 114332 bytes
2,885,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,434 >>> mbox cmd response: success
3,077,434 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,518 UART: [afmc] ++
3,078,686 UART: [afmc] CDI.KEYID = 6
3,079,048 UART: [afmc] SUBJECT.KEYID = 7
3,079,473 UART: [afmc] AUTHORITY.KEYID = 5
3,114,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,636 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,029 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,719 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,520 UART: [afmc] --
3,157,494 UART: [cold-reset] --
3,158,500 UART: [state] Locking Datavault
3,159,613 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,217 UART: [state] Locking ICCM
3,160,871 UART: [exit] Launching FMC @ 0x40000130
3,166,200 UART:
3,166,216 UART: Running Caliptra FMC ...
3,166,624 UART:
3,166,678 UART: [state] CFI Enabled
3,177,057 UART: [fht] FMC Alias Private Key: 7
3,284,170 UART: [art] Extend RT PCRs Done
3,284,598 UART: [art] Lock RT PCRs Done
3,285,882 UART: [art] Populate DV Done
3,293,989 UART: [fht] FMC Alias Private Key: 7
3,294,969 UART: [art] Derive CDI
3,295,249 UART: [art] Store in in slot 0x4
3,381,012 UART: [art] Derive Key Pair
3,381,372 UART: [art] Store priv key in slot 0x5
3,394,108 UART: [art] Derive Key Pair - Done
3,408,854 UART: [art] Signing Cert with AUTHO
3,409,334 UART: RITY.KEYID = 7
3,424,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,373 UART: [art] PUB.X = 90A937C34A313CC3E2F78CAD5B29A2F14667E63D7F612AA1DAFE86F940460D3AD40AF545DE4F846A45B2248858AC7BE8
3,432,149 UART: [art] PUB.Y = 64C0B7AFF0263DA996D0091B91F504AC8BACABD984ED3FEA63501CCC3265918F1D9D0D11E5FC49B2452154D92E5AF003
3,439,101 UART: [art] SIG.R = 270F05263320DD1ED9D90A8843B638BBA263AD958BC9E61A90C4AA01B1A39CEFCEBC1EE337ECB2BCA9E23F311C224703
3,445,874 UART: [art] SIG.S = 09974A75ADAE4C9C5C6F2ADED8EE18799E9C62B03F45EDA24761C621998AB459C81F3B0635900457BD0E21ECF6BCFDE9
3,469,361 UART: Caliptra RT
3,469,614 UART: [state] CFI Enabled
3,577,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,949 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 ready_for_fw is high
1,362,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,218 >>> mbox cmd response: success
2,928,218 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,990,028 UART:
2,990,044 UART: Running Caliptra FMC ...
2,990,452 UART:
2,990,506 UART: [state] CFI Enabled
3,000,933 UART: [fht] FMC Alias Private Key: 7
3,108,722 UART: [art] Extend RT PCRs Done
3,109,150 UART: [art] Lock RT PCRs Done
3,110,292 UART: [art] Populate DV Done
3,118,521 UART: [fht] FMC Alias Private Key: 7
3,119,513 UART: [art] Derive CDI
3,119,793 UART: [art] Store in in slot 0x4
3,205,252 UART: [art] Derive Key Pair
3,205,612 UART: [art] Store priv key in slot 0x5
3,218,474 UART: [art] Derive Key Pair - Done
3,233,296 UART: [art] Signing Cert with AUTHO
3,233,776 UART: RITY.KEYID = 7
3,248,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,755 UART: [art] PUB.X = 7C3E27171B22300D12627C17EF9F0CD37C478AD1B276DD3E7D0BC2C3E6A3EB9D07A306C22F99258605A466EEAB1A6B32
3,256,517 UART: [art] PUB.Y = D64B773706007AD2285685E6C5DB08FFC6027023A6A247409941BAB982F94E8FE9D6831B4C0E994465FBA08D6F4312AF
3,263,433 UART: [art] SIG.R = A0078B673EB6078AF6490EE3017FEC49E7E7E7E048E9C05E4771BCB3CCE88CFBD25B855F43E99B7BE8080571E0981C2D
3,270,197 UART: [art] SIG.S = 5FD215EBC94DB6905FAE473C1C22B6A109BAD7D5FA53A34E25A4EE5F7DD786C628A72A71F174A44CD8B11435F83BE8C1
3,294,081 UART: Caliptra RT
3,294,334 UART: [state] CFI Enabled
3,401,521 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,762 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,498 UART: [kat] SHA2-256
882,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,544 UART: [kat] ++
886,696 UART: [kat] sha1
890,796 UART: [kat] SHA2-256
892,734 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
903,135 UART: [kat] HMAC-384Kdf
907,845 UART: [kat] LMS
1,476,041 UART: [kat] --
1,477,022 UART: [cold-reset] ++
1,477,490 UART: [fht] Storing FHT @ 0x50003400
1,480,299 UART: [idev] ++
1,480,467 UART: [idev] CDI.KEYID = 6
1,480,827 UART: [idev] SUBJECT.KEYID = 7
1,481,251 UART: [idev] UDS.KEYID = 0
1,481,596 ready_for_fw is high
1,481,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,133 UART: [idev] Erasing UDS.KEYID = 0
1,504,929 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,523 UART: [idev] --
1,514,720 UART: [ldev] ++
1,514,888 UART: [ldev] CDI.KEYID = 6
1,515,251 UART: [ldev] SUBJECT.KEYID = 5
1,515,677 UART: [ldev] AUTHORITY.KEYID = 7
1,516,140 UART: [ldev] FE.KEYID = 1
1,521,276 UART: [ldev] Erasing FE.KEYID = 1
1,546,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,611 UART: [ldev] --
1,585,928 UART: [fwproc] Waiting for Commands...
1,586,725 UART: [fwproc] Received command 0x46574c44
1,587,516 UART: [fwproc] Received Image of size 114332 bytes
2,886,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,932 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,135 >>> mbox cmd response: success
3,078,135 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,079,287 UART: [afmc] ++
3,079,455 UART: [afmc] CDI.KEYID = 6
3,079,817 UART: [afmc] SUBJECT.KEYID = 7
3,080,242 UART: [afmc] AUTHORITY.KEYID = 5
3,115,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,704 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,394 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,343 UART: [afmc] --
3,158,337 UART: [cold-reset] --
3,159,303 UART: [state] Locking Datavault
3,160,308 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,912 UART: [state] Locking ICCM
3,161,372 UART: [exit] Launching FMC @ 0x40000130
3,166,701 UART:
3,166,717 UART: Running Caliptra FMC ...
3,167,125 UART:
3,167,268 UART: [state] CFI Enabled
3,177,815 UART: [fht] FMC Alias Private Key: 7
3,286,190 UART: [art] Extend RT PCRs Done
3,286,618 UART: [art] Lock RT PCRs Done
3,288,294 UART: [art] Populate DV Done
3,296,593 UART: [fht] FMC Alias Private Key: 7
3,297,611 UART: [art] Derive CDI
3,297,891 UART: [art] Store in in slot 0x4
3,383,674 UART: [art] Derive Key Pair
3,384,034 UART: [art] Store priv key in slot 0x5
3,397,608 UART: [art] Derive Key Pair - Done
3,412,168 UART: [art] Signing Cert with AUTHO
3,412,648 UART: RITY.KEYID = 7
3,427,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,485 UART: [art] PUB.X = 41C6EC926E5FA8620C12F496C1F79264C5E6809FA76003D38A7E85289BA9D2B785E06249A9F2F9454B9C3053897F4381
3,435,243 UART: [art] PUB.Y = F4533791CFDAE1FEE563AA8AF3540B94BA9076F38C704C736EE4608F78E80D4C17E0AF7AC8F8DEEA24FB2602601EEE72
3,442,202 UART: [art] SIG.R = 78377655A2728F3DB01435F7E8FEA83D0D286D68969FFE83C71D6032BAF7D3CFDAE47F3849263CB6A790292DBB800D41
3,448,972 UART: [art] SIG.S = 0B84626C2886C4653770D7D93AB083D4CEB1F8F1E59295974997F0400AAC63EE5D18B9B213E01A947CC4599B139BFE42
3,473,161 UART: Caliptra RT
3,473,506 UART: [state] CFI Enabled
3,581,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,381 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,119 >>> mbox cmd response: success
2,926,119 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,987,833 UART:
2,987,849 UART: Running Caliptra FMC ...
2,988,257 UART:
2,988,400 UART: [state] CFI Enabled
2,999,003 UART: [fht] FMC Alias Private Key: 7
3,106,728 UART: [art] Extend RT PCRs Done
3,107,156 UART: [art] Lock RT PCRs Done
3,108,736 UART: [art] Populate DV Done
3,116,975 UART: [fht] FMC Alias Private Key: 7
3,118,029 UART: [art] Derive CDI
3,118,309 UART: [art] Store in in slot 0x4
3,204,256 UART: [art] Derive Key Pair
3,204,616 UART: [art] Store priv key in slot 0x5
3,218,080 UART: [art] Derive Key Pair - Done
3,233,087 UART: [art] Signing Cert with AUTHO
3,233,567 UART: RITY.KEYID = 7
3,248,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,632 UART: [art] PUB.X = 479380268F999CB424363E9F346854B8C72D3338665146690704D84F385C770D7BE8121F5B7A586E228D9707F58E3B64
3,256,372 UART: [art] PUB.Y = 5AFDDBBB8693482649939523E980B7EF8C20D545A2BF9BB1D0AADB9D2F939AF0E265F51CCEA3B519151B85CBD3349BB3
3,263,340 UART: [art] SIG.R = CD86386EC5E03D66602340F5E8FC13B66B303DCA7B81CB64C85B27A4C1635E8AC5A52C1A3597190EDD9F4B47243CA5BA
3,270,119 UART: [art] SIG.S = 47773745B98DE685BC8CA847ACFDF737DA091C729506567EE5CCFEC47824330D8B4D2706BFE7F773331930D74DCD6BA6
3,294,136 UART: Caliptra RT
3,294,481 UART: [state] CFI Enabled
3,403,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,599 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,263 UART: [cold-reset] ++
1,171,755 UART: [fht] FHT @ 0x50003400
1,174,308 UART: [idev] ++
1,174,476 UART: [idev] CDI.KEYID = 6
1,174,836 UART: [idev] SUBJECT.KEYID = 7
1,175,260 UART: [idev] UDS.KEYID = 0
1,175,605 ready_for_fw is high
1,175,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,020 UART: [idev] Erasing UDS.KEYID = 0
1,200,099 UART: [idev] Sha1 KeyId Algorithm
1,208,489 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,199 UART: [ldev] --
1,280,644 UART: [fwproc] Wait for Commands...
1,281,456 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,475 >>> mbox cmd response: success
2,771,475 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,772,497 UART: [afmc] ++
2,772,665 UART: [afmc] CDI.KEYID = 6
2,773,027 UART: [afmc] SUBJECT.KEYID = 7
2,773,452 UART: [afmc] AUTHORITY.KEYID = 5
2,809,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,602 UART: [afmc] --
2,852,488 UART: [cold-reset] --
2,853,306 UART: [state] Locking Datavault
2,854,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,167 UART: [state] Locking ICCM
2,855,751 UART: [exit] Launching FMC @ 0x40000130
2,861,080 UART:
2,861,096 UART: Running Caliptra FMC ...
2,861,504 UART:
2,861,558 UART: [state] CFI Enabled
2,872,221 UART: [fht] FMC Alias Private Key: 7
2,980,522 UART: [art] Extend RT PCRs Done
2,980,950 UART: [art] Lock RT PCRs Done
2,982,454 UART: [art] Populate DV Done
2,990,643 UART: [fht] FMC Alias Private Key: 7
2,991,713 UART: [art] Derive CDI
2,991,993 UART: [art] Store in in slot 0x4
3,077,414 UART: [art] Derive Key Pair
3,077,774 UART: [art] Store priv key in slot 0x5
3,090,402 UART: [art] Derive Key Pair - Done
3,105,220 UART: [art] Signing Cert with AUTHO
3,105,700 UART: RITY.KEYID = 7
3,120,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,419 UART: [art] PUB.X = C0915DE5DC1BF192F69AA1A57DAEB6C429BE8EB0BF103C91EB1B4A4BDD56AE5E09A8172484A65A43C4B571CB9DEFEF8D
3,128,216 UART: [art] PUB.Y = B266827246DFBC3B59ADF775AE697C66C2B8A46668F05BDC03604DC892882B37E18FFEEA8815AA6CD88668B1451A7949
3,135,169 UART: [art] SIG.R = BF17304E1FB0E0B4F45BE7219EA80C6042C336E6C251C49C647D4F3755108ED0977E30889C1A70A24CF963B0CCA88D0A
3,141,939 UART: [art] SIG.S = 5F75C850953D9E838DCBB20BA87D550054AE7AF3C504482DBE99BCADC8A2AF65F21D47210756E401A506F954C2CE3DE5
3,165,363 UART: Caliptra RT
3,165,616 UART: [state] CFI Enabled
3,274,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,070 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 ready_for_fw is high
1,060,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,658 >>> mbox cmd response: success
2,626,658 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,662 UART:
2,688,678 UART: Running Caliptra FMC ...
2,689,086 UART:
2,689,140 UART: [state] CFI Enabled
2,699,493 UART: [fht] FMC Alias Private Key: 7
2,808,078 UART: [art] Extend RT PCRs Done
2,808,506 UART: [art] Lock RT PCRs Done
2,810,488 UART: [art] Populate DV Done
2,818,865 UART: [fht] FMC Alias Private Key: 7
2,819,933 UART: [art] Derive CDI
2,820,213 UART: [art] Store in in slot 0x4
2,906,110 UART: [art] Derive Key Pair
2,906,470 UART: [art] Store priv key in slot 0x5
2,919,262 UART: [art] Derive Key Pair - Done
2,934,511 UART: [art] Signing Cert with AUTHO
2,934,991 UART: RITY.KEYID = 7
2,949,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,526 UART: [art] PUB.X = 2DCE80A76DF9E65DA872386B58C27B7D220111DFCCA5F1F1EBC167AA3E493F5AD82AF4CBFA5E358B3FAE396384408901
2,957,308 UART: [art] PUB.Y = 9939205DD8267D81401765073C19B20BD4FDF1D752E45DC1CB40BDF83D54EA51F4D7309984C5BD0BBFD9498766E39641
2,964,251 UART: [art] SIG.R = 3578E2E517ED9E3308C206B70B2E62FEF3DB48EA9190CB8A65642085B6529D3FE2E7B14E7578E2FE3D23407D6C3C80E3
2,971,018 UART: [art] SIG.S = 41306CE56B24F19BE7241926F36D42CDFF0FED8E9A9976478A0827126B642A3B8FF15227E7C7460FE9BA8E925154876C
2,994,354 UART: Caliptra RT
2,994,607 UART: [state] CFI Enabled
3,102,386 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,627 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
893,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,624 UART: [kat] ++
897,776 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,745 UART: [kat] SHA2-512-ACC
908,646 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,031 UART: [kat] LMS
1,171,359 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,468 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 ready_for_fw is high
1,176,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,372 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,271 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,496 UART: [ldev] Erasing FE.KEYID = 1
1,243,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,434 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,361 UART: [fwproc] Recv command 0x46574c44
1,284,089 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,244 >>> mbox cmd response: success
2,772,244 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,440 UART: [afmc] ++
2,773,608 UART: [afmc] CDI.KEYID = 6
2,773,970 UART: [afmc] SUBJECT.KEYID = 7
2,774,395 UART: [afmc] AUTHORITY.KEYID = 5
2,809,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,041 UART: [afmc] --
2,853,003 UART: [cold-reset] --
2,853,745 UART: [state] Locking Datavault
2,854,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,430 UART: [state] Locking ICCM
2,856,038 UART: [exit] Launching FMC @ 0x40000130
2,861,367 UART:
2,861,383 UART: Running Caliptra FMC ...
2,861,791 UART:
2,861,934 UART: [state] CFI Enabled
2,871,999 UART: [fht] FMC Alias Private Key: 7
2,979,670 UART: [art] Extend RT PCRs Done
2,980,098 UART: [art] Lock RT PCRs Done
2,981,868 UART: [art] Populate DV Done
2,990,187 UART: [fht] FMC Alias Private Key: 7
2,991,233 UART: [art] Derive CDI
2,991,513 UART: [art] Store in in slot 0x4
3,076,848 UART: [art] Derive Key Pair
3,077,208 UART: [art] Store priv key in slot 0x5
3,090,824 UART: [art] Derive Key Pair - Done
3,105,634 UART: [art] Signing Cert with AUTHO
3,106,114 UART: RITY.KEYID = 7
3,121,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,997 UART: [art] PUB.X = 58389629284F5F194F882491C0957584D75870980770243C79B231840563092F87BF03D427443DDB6AE86841E044227E
3,128,729 UART: [art] PUB.Y = A4C1734677E2611269A1462889F212C461A8FA968A98534A55B29933D23B5E3BD2FA53F2860F332C22B52C4791E38231
3,135,664 UART: [art] SIG.R = B30878C03743310953E6BC38AC487A96EA176D93C4AD9F82AE2D6D5AF35579142A1D329B1C1391C160BE78CD1FD9E537
3,142,432 UART: [art] SIG.S = 8B7BC85D5CB37B907C88DDAE745B87A873F87BCC1FC091E17304181E5E3F6A984E788C59A0981E0C7BD26DBCB7615F2A
3,166,339 UART: Caliptra RT
3,166,684 UART: [state] CFI Enabled
3,274,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,995 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 ready_for_fw is high
1,060,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,549 >>> mbox cmd response: success
2,627,549 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,690,013 UART:
2,690,029 UART: Running Caliptra FMC ...
2,690,437 UART:
2,690,580 UART: [state] CFI Enabled
2,701,261 UART: [fht] FMC Alias Private Key: 7
2,809,486 UART: [art] Extend RT PCRs Done
2,809,914 UART: [art] Lock RT PCRs Done
2,811,612 UART: [art] Populate DV Done
2,819,935 UART: [fht] FMC Alias Private Key: 7
2,820,907 UART: [art] Derive CDI
2,821,187 UART: [art] Store in in slot 0x4
2,906,720 UART: [art] Derive Key Pair
2,907,080 UART: [art] Store priv key in slot 0x5
2,920,210 UART: [art] Derive Key Pair - Done
2,935,113 UART: [art] Signing Cert with AUTHO
2,935,593 UART: RITY.KEYID = 7
2,950,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,520 UART: [art] PUB.X = 99587329B54F3A4CF1CA5D2273E4AC6828E002595F0E25E22459C1B8BB01F38C6E9FAA84F5363DEC2093511A0A2FC6A2
2,958,284 UART: [art] PUB.Y = 7B2F00FF3089C4CC05A2EC9447544D65B383170A12293433D558594C0672BF291F9F589E13F0BE77DDEFCD5CD06FF45A
2,965,209 UART: [art] SIG.R = 2C1569C4C5EFA060F590E3EC6282B85039A8C8AC16D3856D86185F2CCA495AC21C64420F96E61F04CE88922E6E68E7D2
2,971,977 UART: [art] SIG.S = FD085D28CF5BD666DB87822D8234DAB840D0C866A80B2786B1835AEF28C3A04E2F7E04991BDB4014CBEA37EE6E3704B2
2,995,680 UART: Caliptra RT
2,996,025 UART: [state] CFI Enabled
3,104,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,118,289 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,825 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,365 UART: [idev] ++
1,173,533 UART: [idev] CDI.KEYID = 6
1,173,894 UART: [idev] SUBJECT.KEYID = 7
1,174,319 UART: [idev] UDS.KEYID = 0
1,174,665 ready_for_fw is high
1,174,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,569 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,243,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,588 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,723 >>> mbox cmd response: success
2,774,723 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,784 UART: [afmc] ++
2,775,952 UART: [afmc] CDI.KEYID = 6
2,776,315 UART: [afmc] SUBJECT.KEYID = 7
2,776,741 UART: [afmc] AUTHORITY.KEYID = 5
2,812,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,541 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,260 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,165 UART: [afmc] --
2,856,139 UART: [cold-reset] --
2,857,057 UART: [state] Locking Datavault
2,858,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,788 UART: [state] Locking ICCM
2,859,324 UART: [exit] Launching FMC @ 0x40000130
2,864,653 UART:
2,864,669 UART: Running Caliptra FMC ...
2,865,077 UART:
2,865,131 UART: [state] CFI Enabled
2,875,498 UART: [fht] FMC Alias Private Key: 7
2,983,925 UART: [art] Extend RT PCRs Done
2,984,353 UART: [art] Lock RT PCRs Done
2,985,885 UART: [art] Populate DV Done
2,994,084 UART: [fht] FMC Alias Private Key: 7
2,995,080 UART: [art] Derive CDI
2,995,360 UART: [art] Store in in slot 0x4
3,081,463 UART: [art] Derive Key Pair
3,081,823 UART: [art] Store priv key in slot 0x5
3,094,617 UART: [art] Derive Key Pair - Done
3,109,371 UART: [art] Signing Cert with AUTHO
3,109,851 UART: RITY.KEYID = 7
3,125,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,324 UART: [art] PUB.X = 06F0F6777BF5E86C05B87DDC852DECF19801D046DC31054E9F136FECF8A4C5F508260036F485FB78B14967EB5B19DC90
3,133,065 UART: [art] PUB.Y = 3373362CD3F589EE8CCED33FBDC12A10754252086B42EDAD6F0B27462FA0430405BB6AD29C512587F73EBFE94A960985
3,140,006 UART: [art] SIG.R = 9395C046849566272878916722F606335886FA12023E257F9A791675DA823FE06AB8F566A784F534B5F74C2FCBD59923
3,146,754 UART: [art] SIG.S = FDEB7A0A75C2152F1FE913D3041AC7E02E6D89B9458D8F78C297F0F803B09C148AE6C3E3A10C3D3EB275A6D9E3968B01
3,170,884 UART: Caliptra RT
3,171,137 UART: [state] CFI Enabled
3,279,605 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,293,616 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,616 ready_for_fw is high
1,055,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,071 >>> mbox cmd response: success
2,622,071 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,827 UART:
2,684,843 UART: Running Caliptra FMC ...
2,685,251 UART:
2,685,305 UART: [state] CFI Enabled
2,695,632 UART: [fht] FMC Alias Private Key: 7
2,803,603 UART: [art] Extend RT PCRs Done
2,804,031 UART: [art] Lock RT PCRs Done
2,805,841 UART: [art] Populate DV Done
2,814,186 UART: [fht] FMC Alias Private Key: 7
2,815,178 UART: [art] Derive CDI
2,815,458 UART: [art] Store in in slot 0x4
2,901,341 UART: [art] Derive Key Pair
2,901,701 UART: [art] Store priv key in slot 0x5
2,914,223 UART: [art] Derive Key Pair - Done
2,928,903 UART: [art] Signing Cert with AUTHO
2,929,383 UART: RITY.KEYID = 7
2,945,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,982 UART: [art] PUB.X = BAA1F0FBFF67821F19381821A538DE7F0F0CF1AB8BBFD0CF136352DDC6811443FC1A72F0E7B1D00FF4F4D2F9D9F1D9D7
2,952,767 UART: [art] PUB.Y = B236D21EAF9635AE9EF05566E42E75F32914A875B056CD97BC8A456DFF0619F7D1FBFF069F153BD914A484595DAA6D89
2,959,721 UART: [art] SIG.R = A22676C087F0D1CB96F4C57A8C48A7071AA85A671B66CF80290BA8A9F0EC20DBFADFBCA2D08AACB104BE9B4AA92B6B58
2,966,508 UART: [art] SIG.S = 97F4C03E5422D0EC94AD0DE686E4E4DC7F8777F704AE6E18E03FDA78F4FE55E02FD4E8C45944FFE2641E8A27BFBE724F
2,990,005 UART: Caliptra RT
2,990,258 UART: [state] CFI Enabled
3,098,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,849 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,620 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 ready_for_fw is high
1,174,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,592 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,921 UART: [ldev] --
1,280,419 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,324 >>> mbox cmd response: success
2,771,324 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,772,395 UART: [afmc] ++
2,772,563 UART: [afmc] CDI.KEYID = 6
2,772,926 UART: [afmc] SUBJECT.KEYID = 7
2,773,352 UART: [afmc] AUTHORITY.KEYID = 5
2,809,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,344 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,956 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,454 UART: [afmc] --
2,852,488 UART: [cold-reset] --
2,853,402 UART: [state] Locking Datavault
2,854,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,191 UART: [state] Locking ICCM
2,855,787 UART: [exit] Launching FMC @ 0x40000130
2,861,116 UART:
2,861,132 UART: Running Caliptra FMC ...
2,861,540 UART:
2,861,683 UART: [state] CFI Enabled
2,872,712 UART: [fht] FMC Alias Private Key: 7
2,981,211 UART: [art] Extend RT PCRs Done
2,981,639 UART: [art] Lock RT PCRs Done
2,983,299 UART: [art] Populate DV Done
2,991,460 UART: [fht] FMC Alias Private Key: 7
2,992,558 UART: [art] Derive CDI
2,992,838 UART: [art] Store in in slot 0x4
3,078,457 UART: [art] Derive Key Pair
3,078,817 UART: [art] Store priv key in slot 0x5
3,091,735 UART: [art] Derive Key Pair - Done
3,106,648 UART: [art] Signing Cert with AUTHO
3,107,128 UART: RITY.KEYID = 7
3,122,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,259 UART: [art] PUB.X = 5C44B8624209441773FC153D3B24ACBE55A3B9062889906B3F7AD5B4099460A0381E1A032A8114765CBB936782994595
3,130,003 UART: [art] PUB.Y = E170F265EBF64F9A8CCF54A4EEFF4EA0E0F75F71F29DA7808A08D488D36D0F30F5C805F495D61DFD936BE6901F70C030
3,136,960 UART: [art] SIG.R = 2FA81975AE820A8E3AC863346CD9037B9B3B59FF7DEBCEA3A4C39C74AD5B6989076D15196585AC6149C59245293D3EA7
3,143,727 UART: [art] SIG.S = E183F45D616C90F32776C207027160F655A9BCAF8E46759C18D18E390C681A13BDD3E4D5F509468070CFF69E6E6896E9
3,167,254 UART: Caliptra RT
3,167,599 UART: [state] CFI Enabled
3,275,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,359 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,671 ready_for_fw is high
1,056,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,122 >>> mbox cmd response: success
2,624,122 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,686,994 UART:
2,687,010 UART: Running Caliptra FMC ...
2,687,418 UART:
2,687,561 UART: [state] CFI Enabled
2,697,912 UART: [fht] FMC Alias Private Key: 7
2,805,487 UART: [art] Extend RT PCRs Done
2,805,915 UART: [art] Lock RT PCRs Done
2,807,317 UART: [art] Populate DV Done
2,815,644 UART: [fht] FMC Alias Private Key: 7
2,816,800 UART: [art] Derive CDI
2,817,080 UART: [art] Store in in slot 0x4
2,902,349 UART: [art] Derive Key Pair
2,902,709 UART: [art] Store priv key in slot 0x5
2,916,457 UART: [art] Derive Key Pair - Done
2,931,193 UART: [art] Signing Cert with AUTHO
2,931,673 UART: RITY.KEYID = 7
2,946,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,474 UART: [art] PUB.X = 1C83218B5CAFE52443E405A40F58F5691F756CD5D66307F6CBFF18B4D83AC1F7543B441775E9B818CAAB3504F72A38EE
2,954,240 UART: [art] PUB.Y = D477D1545D164B4107913444798EB0BDF61B84E5099189132763AC126189FE9A4E53F8535B65191ACC59F3948FF65E85
2,961,174 UART: [art] SIG.R = 29E38B44A26192DB754142EA284D7B5427FCC972F025108C2A411ACFAF10C23556EAB337F7890C36C0A7BBDFBA47B5F4
2,967,951 UART: [art] SIG.S = CA24F18940BA21AE8C9CBCB3203FD0412CF0F560E9FC069B57D65291115C7631715C2DCA2EA4D95044C9A2057AF3D7A4
2,992,016 UART: Caliptra RT
2,992,361 UART: [state] CFI Enabled
3,100,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,114,699 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 ready_for_fw is high
1,480,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,192 UART: [idev] Erasing UDS.KEYID = 0
1,504,692 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,432 UART: [idev] --
1,514,681 UART: [ldev] ++
1,514,849 UART: [ldev] CDI.KEYID = 6
1,515,212 UART: [ldev] SUBJECT.KEYID = 5
1,515,638 UART: [ldev] AUTHORITY.KEYID = 7
1,516,101 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,546 UART: [ldev] --
1,585,841 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114332 bytes
2,884,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,528 >>> mbox cmd response: success
3,078,774 UART: [afmc] ++
3,078,942 UART: [afmc] CDI.KEYID = 6
3,079,304 UART: [afmc] SUBJECT.KEYID = 7
3,079,729 UART: [afmc] AUTHORITY.KEYID = 5
3,115,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,126 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,519 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,209 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,226 UART: [afmc] --
3,158,274 UART: [cold-reset] --
3,159,314 UART: [state] Locking Datavault
3,160,389 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,993 UART: [state] Locking ICCM
3,161,527 UART: [exit] Launching FMC @ 0x40000130
3,166,856 UART:
3,166,872 UART: Running Caliptra FMC ...
3,167,280 UART:
3,167,334 UART: [state] CFI Enabled
3,177,719 UART: [fht] FMC Alias Private Key: 7
3,285,420 UART: [art] Extend RT PCRs Done
3,285,848 UART: [art] Lock RT PCRs Done
3,287,098 UART: [art] Populate DV Done
3,295,289 UART: [fht] FMC Alias Private Key: 7
3,296,279 UART: [art] Derive CDI
3,296,559 UART: [art] Store in in slot 0x4
3,382,176 UART: [art] Derive Key Pair
3,382,536 UART: [art] Store priv key in slot 0x5
3,396,018 UART: [art] Derive Key Pair - Done
3,410,963 UART: [art] Signing Cert with AUTHO
3,411,443 UART: RITY.KEYID = 7
3,426,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,336 UART: [art] PUB.X = 2B4462D1548860848D2684056205DA785B68FDA3C4C73E108EB0D8BB3FBD7DEF76A6ABE142E9A5753A44337D34F0A54E
3,434,106 UART: [art] PUB.Y = E956A88830DD839125326D211B5DD455D1D8FE7F8FDAAB570985FF4034FCE0C7C2403F144D3264AC59B549100C5C6BE9
3,441,056 UART: [art] SIG.R = 101D47B07A1B902136DC3842E9C8E8D480EEB0AD3494420AEED48C2439B148EC74C10BED4297E7184E44A1F289F95903
3,447,819 UART: [art] SIG.S = B093264CD26AEE9A0C2B7CDF9163282FAB5EF3F08DBAB5A871B4C1C3019285C0E15203B42C566C73E1EE007039ADB0CF
3,471,031 UART: Caliptra RT
3,471,284 UART: [state] CFI Enabled
3,579,969 UART: [rt] RT listening for mailbox commands...
3,580,639 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,499 UART: [rt]cmd =0x53494756, len=196
3,616,463 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,049 ready_for_fw is high
1,363,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,200 >>> mbox cmd response: success
2,989,120 UART:
2,989,136 UART: Running Caliptra FMC ...
2,989,544 UART:
2,989,598 UART: [state] CFI Enabled
3,000,065 UART: [fht] FMC Alias Private Key: 7
3,108,164 UART: [art] Extend RT PCRs Done
3,108,592 UART: [art] Lock RT PCRs Done
3,110,172 UART: [art] Populate DV Done
3,118,339 UART: [fht] FMC Alias Private Key: 7
3,119,293 UART: [art] Derive CDI
3,119,573 UART: [art] Store in in slot 0x4
3,205,642 UART: [art] Derive Key Pair
3,206,002 UART: [art] Store priv key in slot 0x5
3,219,092 UART: [art] Derive Key Pair - Done
3,234,001 UART: [art] Signing Cert with AUTHO
3,234,481 UART: RITY.KEYID = 7
3,249,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,546 UART: [art] PUB.X = 26942154D29D28B541D728B9FF471CEBB3D28EB277BA41B1A9452BBEABFA994618303CFB017BE06B2A6052FC8581EA24
3,257,323 UART: [art] PUB.Y = 48140292994E32E15A37AC2E159CA146E74B09E22927047E933012ECF608AEDA234AE3532EE4D08A49E5577880782CD3
3,264,255 UART: [art] SIG.R = 7B5596EC643189B8899B782BAC31D2D57CE94E5793E62EF532E7778D809DF84C93ECBFBA36961201070658D37CE433C7
3,271,016 UART: [art] SIG.S = 476286CDE8FDF709E1A72D5503A45968DAB20CFE01DEA5697EBF61E1AB6FCDC3AF3C5E64BE28871B0FD25C698456120C
3,295,077 UART: Caliptra RT
3,295,330 UART: [state] CFI Enabled
3,404,400 UART: [rt] RT listening for mailbox commands...
3,405,070 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,210 UART: [rt]cmd =0x53494756, len=196
3,441,542 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,583 UART: [kat] LMS
1,475,779 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 ready_for_fw is high
1,480,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,995 UART: [idev] Erasing UDS.KEYID = 0
1,505,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,341 UART: [idev] --
1,515,486 UART: [ldev] ++
1,515,654 UART: [ldev] CDI.KEYID = 6
1,516,017 UART: [ldev] SUBJECT.KEYID = 5
1,516,443 UART: [ldev] AUTHORITY.KEYID = 7
1,516,906 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,371 UART: [ldev] --
1,586,658 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 114332 bytes
2,886,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,090 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,241 >>> mbox cmd response: success
3,080,269 UART: [afmc] ++
3,080,437 UART: [afmc] CDI.KEYID = 6
3,080,799 UART: [afmc] SUBJECT.KEYID = 7
3,081,224 UART: [afmc] AUTHORITY.KEYID = 5
3,115,869 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,552 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,242 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,261 UART: [afmc] --
3,159,277 UART: [cold-reset] --
3,160,025 UART: [state] Locking Datavault
3,161,376 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,980 UART: [state] Locking ICCM
3,162,610 UART: [exit] Launching FMC @ 0x40000130
3,167,939 UART:
3,167,955 UART: Running Caliptra FMC ...
3,168,363 UART:
3,168,506 UART: [state] CFI Enabled
3,179,585 UART: [fht] FMC Alias Private Key: 7
3,288,176 UART: [art] Extend RT PCRs Done
3,288,604 UART: [art] Lock RT PCRs Done
3,289,848 UART: [art] Populate DV Done
3,298,131 UART: [fht] FMC Alias Private Key: 7
3,299,083 UART: [art] Derive CDI
3,299,363 UART: [art] Store in in slot 0x4
3,385,278 UART: [art] Derive Key Pair
3,385,638 UART: [art] Store priv key in slot 0x5
3,399,300 UART: [art] Derive Key Pair - Done
3,414,102 UART: [art] Signing Cert with AUTHO
3,414,582 UART: RITY.KEYID = 7
3,429,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,747 UART: [art] PUB.X = CEA5BC1126AE1C1698AA8FD45E6C1027E32E89F8998632AD10EEF9151605E5F837697E95FF3303437FA1AB0789C1C2E5
3,437,514 UART: [art] PUB.Y = 8EDE9B2492184F292A2D8CBB86AB7E107E0218FD2697AB197261C8D58613D89BB9A51CFBEE58A769042EA43C12563B57
3,444,464 UART: [art] SIG.R = D817CD644FCF363D160B5DE1C0EA036B14C664B8121E3C82D16F2168A14DA5CE9DB3A886CDAABB3BBDECBD8D2D13EB01
3,451,253 UART: [art] SIG.S = 5C9BEB09202B5C9C8D1034DD4EBC2507F8E174E4EEE89E8EE68C6B1DC449E1DF903BAE1F90D9FE833D5CA04A081A59D1
3,474,477 UART: Caliptra RT
3,474,822 UART: [state] CFI Enabled
3,582,851 UART: [rt] RT listening for mailbox commands...
3,583,521 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,631 UART: [rt]cmd =0x53494756, len=196
3,619,999 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,670 ready_for_fw is high
1,362,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,913 >>> mbox cmd response: success
2,991,041 UART:
2,991,057 UART: Running Caliptra FMC ...
2,991,465 UART:
2,991,608 UART: [state] CFI Enabled
3,002,239 UART: [fht] FMC Alias Private Key: 7
3,110,354 UART: [art] Extend RT PCRs Done
3,110,782 UART: [art] Lock RT PCRs Done
3,112,572 UART: [art] Populate DV Done
3,120,723 UART: [fht] FMC Alias Private Key: 7
3,121,817 UART: [art] Derive CDI
3,122,097 UART: [art] Store in in slot 0x4
3,207,664 UART: [art] Derive Key Pair
3,208,024 UART: [art] Store priv key in slot 0x5
3,221,206 UART: [art] Derive Key Pair - Done
3,235,864 UART: [art] Signing Cert with AUTHO
3,236,344 UART: RITY.KEYID = 7
3,252,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,809 UART: [art] PUB.X = 65734D38ADB000B0A4E57F9339DA70BBAF5A65A4C709F8965A47C984D9AE4EC5AC599716004BC64630B6B7A7AC47C591
3,259,540 UART: [art] PUB.Y = A5CC29346D9D355761180BA42480EBB0979864BCD405DC193B8F1DCCDC3D0D17F41A113503357537FFEA710B0D2D74F3
3,266,478 UART: [art] SIG.R = D78C36F79156A9122B6041877386DA2CC320451B5651B7453CA62A9D085A648BA7F4B814FCCF3191F443F457C603C483
3,273,236 UART: [art] SIG.S = B3DF63F905D0BFDC28526C8D426F50C35C78A80CFA97AB9E712E84C43EBFC984FD0E1323B240F9565C8A913CD0347D8B
3,296,688 UART: Caliptra RT
3,297,033 UART: [state] CFI Enabled
3,405,603 UART: [rt] RT listening for mailbox commands...
3,406,273 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,377 UART: [rt]cmd =0x53494756, len=196
3,442,895 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,804 UART: [kat] SHA2-512-ACC
908,705 UART: [kat] ECC-384
918,550 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,965 UART: [fht] FHT @ 0x50003400
1,175,744 UART: [idev] ++
1,175,912 UART: [idev] CDI.KEYID = 6
1,176,272 UART: [idev] SUBJECT.KEYID = 7
1,176,696 UART: [idev] UDS.KEYID = 0
1,177,041 ready_for_fw is high
1,177,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,688 UART: [idev] Erasing UDS.KEYID = 0
1,201,645 UART: [idev] Sha1 KeyId Algorithm
1,210,251 UART: [idev] --
1,211,141 UART: [ldev] ++
1,211,309 UART: [ldev] CDI.KEYID = 6
1,211,672 UART: [ldev] SUBJECT.KEYID = 5
1,212,098 UART: [ldev] AUTHORITY.KEYID = 7
1,212,561 UART: [ldev] FE.KEYID = 1
1,218,137 UART: [ldev] Erasing FE.KEYID = 1
1,245,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,097 UART: [ldev] --
1,284,384 UART: [fwproc] Wait for Commands...
1,285,038 UART: [fwproc] Recv command 0x46574c44
1,285,766 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,179 >>> mbox cmd response: success
2,777,319 UART: [afmc] ++
2,777,487 UART: [afmc] CDI.KEYID = 6
2,777,849 UART: [afmc] SUBJECT.KEYID = 7
2,778,274 UART: [afmc] AUTHORITY.KEYID = 5
2,813,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,264 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,622 UART: [afmc] --
2,857,736 UART: [cold-reset] --
2,858,572 UART: [state] Locking Datavault
2,859,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,319 UART: [state] Locking ICCM
2,860,841 UART: [exit] Launching FMC @ 0x40000130
2,866,170 UART:
2,866,186 UART: Running Caliptra FMC ...
2,866,594 UART:
2,866,648 UART: [state] CFI Enabled
2,876,971 UART: [fht] FMC Alias Private Key: 7
2,985,340 UART: [art] Extend RT PCRs Done
2,985,768 UART: [art] Lock RT PCRs Done
2,986,928 UART: [art] Populate DV Done
2,995,307 UART: [fht] FMC Alias Private Key: 7
2,996,425 UART: [art] Derive CDI
2,996,705 UART: [art] Store in in slot 0x4
3,082,674 UART: [art] Derive Key Pair
3,083,034 UART: [art] Store priv key in slot 0x5
3,096,208 UART: [art] Derive Key Pair - Done
3,111,040 UART: [art] Signing Cert with AUTHO
3,111,520 UART: RITY.KEYID = 7
3,126,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,593 UART: [art] PUB.X = 12F70F0E808C60E9205086E50323EBE56945D12A03BB84B4A506621C8E665802E4AF92743C368DEFACC9C7859798A178
3,134,341 UART: [art] PUB.Y = 6D3A765081A4A7569A5434B2DC3AEBBEFF779E3AC9DE6FEC8B52EA1F4D2981F088B6431560536474E6100CDEA9805B59
3,141,298 UART: [art] SIG.R = 0BCFF32F88841FE20440770CAC793CE2F728A8B67D16AA33D8A1E245EC297997D618E06784B5051EA2854C333C9F0B44
3,148,055 UART: [art] SIG.S = 0D668ABCECA1AEB2A32051B7F6C36AF6BCCD4CE2E0A04A0A6BF36B8817C4629405951587FD04E96C9F36CD390AEA27EF
3,172,531 UART: Caliptra RT
3,172,784 UART: [state] CFI Enabled
3,281,479 UART: [rt] RT listening for mailbox commands...
3,282,149 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,861 UART: [rt]cmd =0x53494756, len=196
3,318,241 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,697 ready_for_fw is high
1,059,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,916 >>> mbox cmd response: success
2,687,090 UART:
2,687,106 UART: Running Caliptra FMC ...
2,687,514 UART:
2,687,568 UART: [state] CFI Enabled
2,698,211 UART: [fht] FMC Alias Private Key: 7
2,805,926 UART: [art] Extend RT PCRs Done
2,806,354 UART: [art] Lock RT PCRs Done
2,808,142 UART: [art] Populate DV Done
2,816,223 UART: [fht] FMC Alias Private Key: 7
2,817,221 UART: [art] Derive CDI
2,817,501 UART: [art] Store in in slot 0x4
2,902,986 UART: [art] Derive Key Pair
2,903,346 UART: [art] Store priv key in slot 0x5
2,916,542 UART: [art] Derive Key Pair - Done
2,931,434 UART: [art] Signing Cert with AUTHO
2,931,914 UART: RITY.KEYID = 7
2,947,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,967 UART: [art] PUB.X = 9DBF82994119A6FAF691B5547FAC460BA3FAE1758F3D1791BB390079758AC3E52CD8BAE69C456FF8C59033873A64A955
2,954,718 UART: [art] PUB.Y = 12FB0ED6E0BBBD7D6A21F3B07FCB9D1CDB5BFD940FA492C37A70D15453B3C256153D2A5C5FC6D27042232A3F43F1E142
2,961,680 UART: [art] SIG.R = 151F17A625E2B6FEE5E55B3B5DBB69CC85136BD381677F03233A737C4773521555D338C6809CC4C742165A8A4B83D82F
2,968,445 UART: [art] SIG.S = 6B8D25F71F7317547DCC59C9F3C68521D80ACD6A1685E19A4F02E87C46680A75D992A2BCD76CE42690BB675CC6067993
2,991,940 UART: Caliptra RT
2,992,193 UART: [state] CFI Enabled
3,099,778 UART: [rt] RT listening for mailbox commands...
3,100,448 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,414 UART: [rt]cmd =0x53494756, len=196
3,137,008 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,957 UART: [kat] SHA2-512-ACC
908,858 UART: [kat] ECC-384
918,511 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 ready_for_fw is high
1,177,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,015 UART: [idev] Erasing UDS.KEYID = 0
1,201,478 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,211,022 UART: [ldev] ++
1,211,190 UART: [ldev] CDI.KEYID = 6
1,211,553 UART: [ldev] SUBJECT.KEYID = 5
1,211,979 UART: [ldev] AUTHORITY.KEYID = 7
1,212,442 UART: [ldev] FE.KEYID = 1
1,217,480 UART: [ldev] Erasing FE.KEYID = 1
1,243,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,120 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,236 >>> mbox cmd response: success
2,777,360 UART: [afmc] ++
2,777,528 UART: [afmc] CDI.KEYID = 6
2,777,890 UART: [afmc] SUBJECT.KEYID = 7
2,778,315 UART: [afmc] AUTHORITY.KEYID = 5
2,814,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,907 UART: [afmc] --
2,857,919 UART: [cold-reset] --
2,858,813 UART: [state] Locking Datavault
2,859,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,484 UART: [state] Locking ICCM
2,860,984 UART: [exit] Launching FMC @ 0x40000130
2,866,313 UART:
2,866,329 UART: Running Caliptra FMC ...
2,866,737 UART:
2,866,880 UART: [state] CFI Enabled
2,877,501 UART: [fht] FMC Alias Private Key: 7
2,985,924 UART: [art] Extend RT PCRs Done
2,986,352 UART: [art] Lock RT PCRs Done
2,987,724 UART: [art] Populate DV Done
2,995,763 UART: [fht] FMC Alias Private Key: 7
2,996,827 UART: [art] Derive CDI
2,997,107 UART: [art] Store in in slot 0x4
3,082,438 UART: [art] Derive Key Pair
3,082,798 UART: [art] Store priv key in slot 0x5
3,095,844 UART: [art] Derive Key Pair - Done
3,110,649 UART: [art] Signing Cert with AUTHO
3,111,129 UART: RITY.KEYID = 7
3,126,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,254 UART: [art] PUB.X = CAC1ADFF90D8152EED6A0C8A76D24411BF67163E1E4DD68D1BF08330C73B8CC5C85BA6D366BF427EF36F0170102E6CF8
3,134,036 UART: [art] PUB.Y = BB854E610D6A08E60C43FC541BB1CCCA305D9A39FCBA3CC366B56B3AD35A6FF02C746AA01C6D165D6683909474F5F807
3,140,988 UART: [art] SIG.R = 0045871B5B513C211D24CE11A0DDE453F35F38D6BDD6113DA6AEF22BB656FFCA4A8B5CA1BB263D83EBBCFE78862D8F53
3,147,758 UART: [art] SIG.S = 2F39DF1139E2605DE4777C053E189044546BFFEDD80E2C1CDC7ECD6437B48F5A3B2219F50D8082C89EA92D03DF0217E3
3,171,806 UART: Caliptra RT
3,172,151 UART: [state] CFI Enabled
3,280,432 UART: [rt] RT listening for mailbox commands...
3,281,102 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,216 UART: [rt]cmd =0x53494756, len=196
3,317,754 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,900 ready_for_fw is high
1,060,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,001 >>> mbox cmd response: success
2,689,681 UART:
2,689,697 UART: Running Caliptra FMC ...
2,690,105 UART:
2,690,248 UART: [state] CFI Enabled
2,700,725 UART: [fht] FMC Alias Private Key: 7
2,808,582 UART: [art] Extend RT PCRs Done
2,809,010 UART: [art] Lock RT PCRs Done
2,810,844 UART: [art] Populate DV Done
2,818,929 UART: [fht] FMC Alias Private Key: 7
2,820,011 UART: [art] Derive CDI
2,820,291 UART: [art] Store in in slot 0x4
2,906,160 UART: [art] Derive Key Pair
2,906,520 UART: [art] Store priv key in slot 0x5
2,919,646 UART: [art] Derive Key Pair - Done
2,934,477 UART: [art] Signing Cert with AUTHO
2,934,957 UART: RITY.KEYID = 7
2,950,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,772 UART: [art] PUB.X = F7FE93099825EED1C2D257360CE02E60BC35D2842DE85696658E802F2F156A535B12593E586863B67D7D49A5C68FA9E6
2,957,534 UART: [art] PUB.Y = 777FED2D8E54754F3CE340AF20ED4BD08941E10C438BDB8823888994C25AA448DF5859B84390B98A403B2AD700321B12
2,964,459 UART: [art] SIG.R = 679E4A841EBBC6FAEBDB32FF011147E41E7B33F5ED0933674004292D5171D77B337B77EA8B53A16D45FA3CC3F1CEC2C3
2,971,234 UART: [art] SIG.S = D2A837C74C6E9116BFDDB826086579CF5A0873D26FC0CDA351884AAE912839AF3E8FB7463FDF26709DB9755579AEF69A
2,995,389 UART: Caliptra RT
2,995,734 UART: [state] CFI Enabled
3,104,171 UART: [rt] RT listening for mailbox commands...
3,104,841 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,757 UART: [rt]cmd =0x53494756, len=196
3,141,153 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 ready_for_fw is high
1,174,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,410 UART: [ldev] --
1,280,798 UART: [fwproc] Wait for Commands...
1,281,451 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,815 >>> mbox cmd response: success
2,772,912 UART: [afmc] ++
2,773,080 UART: [afmc] CDI.KEYID = 6
2,773,443 UART: [afmc] SUBJECT.KEYID = 7
2,773,869 UART: [afmc] AUTHORITY.KEYID = 5
2,808,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,227 UART: [afmc] --
2,852,139 UART: [cold-reset] --
2,852,771 UART: [state] Locking Datavault
2,853,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,526 UART: [state] Locking ICCM
2,855,152 UART: [exit] Launching FMC @ 0x40000130
2,860,481 UART:
2,860,497 UART: Running Caliptra FMC ...
2,860,905 UART:
2,860,959 UART: [state] CFI Enabled
2,871,526 UART: [fht] FMC Alias Private Key: 7
2,979,661 UART: [art] Extend RT PCRs Done
2,980,089 UART: [art] Lock RT PCRs Done
2,981,601 UART: [art] Populate DV Done
2,989,848 UART: [fht] FMC Alias Private Key: 7
2,991,002 UART: [art] Derive CDI
2,991,282 UART: [art] Store in in slot 0x4
3,077,001 UART: [art] Derive Key Pair
3,077,361 UART: [art] Store priv key in slot 0x5
3,090,885 UART: [art] Derive Key Pair - Done
3,105,413 UART: [art] Signing Cert with AUTHO
3,105,893 UART: RITY.KEYID = 7
3,120,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,348 UART: [art] PUB.X = 2C405EC665F8390D3AD916AB26B689C062C630EA009B787A25685363CA549FE9C78971CED6824322515D6C30E070D600
3,128,065 UART: [art] PUB.Y = 6C1AF6C55352BA8909915022EEC8462096B50D7034BCEAA281D02A97AA9BB9F629EF6C53BDEE1CFBF5D618183475AC4B
3,135,023 UART: [art] SIG.R = B0757DF9E4EB56441DE9850B22C21888E6B801B419184D1A5A2142D23E0730909DC9CB56B992EE871643BCCB1F7EFE2F
3,141,790 UART: [art] SIG.S = 69CC98DD62671BC617A02952FB90980CF6B22595E6D35B72F31347132AA0AF0310B275424AE4C2F23DE2B4D748DC3261
3,165,685 UART: Caliptra RT
3,165,938 UART: [state] CFI Enabled
3,272,839 UART: [rt] RT listening for mailbox commands...
3,273,509 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,495 UART: [rt]cmd =0x53494756, len=196
3,309,889 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,472 ready_for_fw is high
1,056,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,891 >>> mbox cmd response: success
2,685,161 UART:
2,685,177 UART: Running Caliptra FMC ...
2,685,585 UART:
2,685,639 UART: [state] CFI Enabled
2,696,010 UART: [fht] FMC Alias Private Key: 7
2,803,797 UART: [art] Extend RT PCRs Done
2,804,225 UART: [art] Lock RT PCRs Done
2,805,693 UART: [art] Populate DV Done
2,814,028 UART: [fht] FMC Alias Private Key: 7
2,815,190 UART: [art] Derive CDI
2,815,470 UART: [art] Store in in slot 0x4
2,901,725 UART: [art] Derive Key Pair
2,902,085 UART: [art] Store priv key in slot 0x5
2,915,021 UART: [art] Derive Key Pair - Done
2,929,766 UART: [art] Signing Cert with AUTHO
2,930,246 UART: RITY.KEYID = 7
2,945,806 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,571 UART: [art] PUB.X = CBE56E079F1F627E6EACE2B6178C0636E1045ED4F4818F583CFCAEC1C858C32C6AD8FF7B9ED20988BA9B7BB39C2E416C
2,953,351 UART: [art] PUB.Y = 7BAD31401A5A62D7B3946396B1F4FCC480178643A8D7869CC0D6B36AA39A14B103477C2525F850005D631F098008AFD8
2,960,266 UART: [art] SIG.R = 66C3A8F5FE48F215DB6822985ACAA673921DEFE1EAA44AE464DCF1776366F9266F61546DB8EDC83B0D7EE8F36E56082D
2,967,044 UART: [art] SIG.S = BBEE5E6A43AF5D26A5A482254094AD14E3D489DE57CBDA189917075D3914A1C5DCC8BEF83EBA5900C1085EFC4F9812D0
2,990,713 UART: Caliptra RT
2,990,966 UART: [state] CFI Enabled
3,098,799 UART: [rt] RT listening for mailbox commands...
3,099,469 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,395 UART: [rt]cmd =0x53494756, len=196
3,136,027 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,174,656 ready_for_fw is high
1,174,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,200,300 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,108 >>> mbox cmd response: success
2,774,155 UART: [afmc] ++
2,774,323 UART: [afmc] CDI.KEYID = 6
2,774,686 UART: [afmc] SUBJECT.KEYID = 7
2,775,112 UART: [afmc] AUTHORITY.KEYID = 5
2,810,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,208 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,927 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,754 UART: [afmc] --
2,853,848 UART: [cold-reset] --
2,854,546 UART: [state] Locking Datavault
2,855,655 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,259 UART: [state] Locking ICCM
2,856,867 UART: [exit] Launching FMC @ 0x40000130
2,862,196 UART:
2,862,212 UART: Running Caliptra FMC ...
2,862,620 UART:
2,862,763 UART: [state] CFI Enabled
2,873,586 UART: [fht] FMC Alias Private Key: 7
2,981,715 UART: [art] Extend RT PCRs Done
2,982,143 UART: [art] Lock RT PCRs Done
2,983,907 UART: [art] Populate DV Done
2,992,326 UART: [fht] FMC Alias Private Key: 7
2,993,388 UART: [art] Derive CDI
2,993,668 UART: [art] Store in in slot 0x4
3,079,749 UART: [art] Derive Key Pair
3,080,109 UART: [art] Store priv key in slot 0x5
3,093,941 UART: [art] Derive Key Pair - Done
3,108,870 UART: [art] Signing Cert with AUTHO
3,109,350 UART: RITY.KEYID = 7
3,125,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,785 UART: [art] PUB.X = 248E1E56B2707109E39478662DE8232E6E0C104FBA7E505A9565F3EC9213B71FAA74FF32B96506A789F23B5849DD5F11
3,132,544 UART: [art] PUB.Y = D4E426438E12F3D67741D12BA33FEE738ED4F16CFD2CC0C4F4D3A0DDB0980F3E082BC35CD907962FF60A9E803A30C872
3,139,496 UART: [art] SIG.R = B26711B4111AD01750DA8EE11E361956D67683EC59FA71B7A690B94C11D32808166E9D080378F90BB99BD9ADFFFD350D
3,146,255 UART: [art] SIG.S = 261E35FB8A5CD24EC90238201677CBFF01B8BEA7DDD5283C20EFB854CCFDA59BB38557C228AF7F556C0EA90489D83973
3,170,468 UART: Caliptra RT
3,170,813 UART: [state] CFI Enabled
3,279,056 UART: [rt] RT listening for mailbox commands...
3,279,726 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,960 UART: [rt]cmd =0x53494756, len=196
3,316,096 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,703 ready_for_fw is high
1,055,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,226 >>> mbox cmd response: success
2,683,522 UART:
2,683,538 UART: Running Caliptra FMC ...
2,683,946 UART:
2,684,089 UART: [state] CFI Enabled
2,694,596 UART: [fht] FMC Alias Private Key: 7
2,802,691 UART: [art] Extend RT PCRs Done
2,803,119 UART: [art] Lock RT PCRs Done
2,804,605 UART: [art] Populate DV Done
2,813,054 UART: [fht] FMC Alias Private Key: 7
2,814,058 UART: [art] Derive CDI
2,814,338 UART: [art] Store in in slot 0x4
2,899,665 UART: [art] Derive Key Pair
2,900,025 UART: [art] Store priv key in slot 0x5
2,913,797 UART: [art] Derive Key Pair - Done
2,928,783 UART: [art] Signing Cert with AUTHO
2,929,263 UART: RITY.KEYID = 7
2,944,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,230 UART: [art] PUB.X = D2310DA668B6D8021C5D6919344FE6DC8C70ADBBD873FF348F36B5144043FD20EB7816C4EDA6C0F37F171DDB5A6341B9
2,952,006 UART: [art] PUB.Y = CC540245FBBC2307CBB6F42B72B360DB5CDBFAC87742CF0DF77AF2083244913DA0B4FF4B1E74CE3F37E453661FD258C0
2,958,962 UART: [art] SIG.R = 9FFCAF147655A0EB1927E98EC5EE1482BBF4496A28A7AEC64B6E5F57D941F4F44BA9F681E2029B3733E3DE0C3DB4E567
2,965,742 UART: [art] SIG.S = 75238B1774264D151BE166B9F37927B5F411B41F5402C7D2F8F9DBDDDFD128943D431B5187AE464E32B17B9BBFF10C4E
2,989,825 UART: Caliptra RT
2,990,170 UART: [state] CFI Enabled
3,097,637 UART: [rt] RT listening for mailbox commands...
3,098,307 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,333 UART: [rt]cmd =0x53494756, len=196
3,135,141 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,217 UART: [kat] SHA2-256
892,155 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,892 UART: [kat] LMS
1,475,088 UART: [kat] --
1,476,007 UART: [cold-reset] ++
1,476,491 UART: [fht] Storing FHT @ 0x50003400
1,479,082 UART: [idev] ++
1,479,250 UART: [idev] CDI.KEYID = 6
1,479,610 UART: [idev] SUBJECT.KEYID = 7
1,480,034 UART: [idev] UDS.KEYID = 0
1,480,379 ready_for_fw is high
1,480,379 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,152 UART: [idev] Erasing UDS.KEYID = 0
1,504,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,940 UART: [idev] --
1,513,891 UART: [ldev] ++
1,514,059 UART: [ldev] CDI.KEYID = 6
1,514,422 UART: [ldev] SUBJECT.KEYID = 5
1,514,848 UART: [ldev] AUTHORITY.KEYID = 7
1,515,311 UART: [ldev] FE.KEYID = 1
1,520,499 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,808 UART: [ldev] --
1,585,227 UART: [fwproc] Waiting for Commands...
1,585,982 UART: [fwproc] Received command 0x46574c44
1,586,773 UART: [fwproc] Received Image of size 114332 bytes
2,884,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,714 >>> mbox cmd response: success
3,076,714 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,077,826 UART: [afmc] ++
3,077,994 UART: [afmc] CDI.KEYID = 6
3,078,356 UART: [afmc] SUBJECT.KEYID = 7
3,078,781 UART: [afmc] AUTHORITY.KEYID = 5
3,114,110 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,632 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,025 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,715 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,516 UART: [afmc] --
3,157,534 UART: [cold-reset] --
3,158,436 UART: [state] Locking Datavault
3,159,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,295 UART: [state] Locking ICCM
3,160,753 UART: [exit] Launching FMC @ 0x40000130
3,166,082 UART:
3,166,098 UART: Running Caliptra FMC ...
3,166,506 UART:
3,166,560 UART: [state] CFI Enabled
3,176,967 UART: [fht] FMC Alias Private Key: 7
3,284,594 UART: [art] Extend RT PCRs Done
3,285,022 UART: [art] Lock RT PCRs Done
3,286,606 UART: [art] Populate DV Done
3,294,755 UART: [fht] FMC Alias Private Key: 7
3,295,923 UART: [art] Derive CDI
3,296,203 UART: [art] Store in in slot 0x4
3,381,942 UART: [art] Derive Key Pair
3,382,302 UART: [art] Store priv key in slot 0x5
3,395,756 UART: [art] Derive Key Pair - Done
3,410,360 UART: [art] Signing Cert with AUTHO
3,410,840 UART: RITY.KEYID = 7
3,426,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,017 UART: [art] PUB.X = 61E5366140EFCADB5C0EAF7898985B7AAD284B99E8FB4982509304D53093C2CF273C06BB191DFE51A38F365E8CC651B5
3,433,786 UART: [art] PUB.Y = 0E4A72594EC884A3AA608C1CB5CB9F720182A12129383EB8C673024977D9592E09C5982967188E3217B66F6E9283B234
3,440,712 UART: [art] SIG.R = 67305B1E112C885E7F0C89D39C9E465883FC5248ABE5DBFFCF2983E9F39E8B9D4E744EB7DB9F9AB84D47955F32A098B8
3,447,491 UART: [art] SIG.S = 85EBB29C51FB4FF4A454BBCD6B97598A365B407B91E8016A46AE463CAFD2B9B9AD133675CBFF4F3CD68A08D18C4AA4BE
3,471,376 UART: Caliptra RT
3,471,629 UART: [state] CFI Enabled
3,580,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,000 UART: [rt]cmd =0x46505344, len=4
3,719,356 >>> mbox cmd response data (8 bytes)
3,719,357 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,719,393 UART: Fatal Error: 0x000E0008
3,720,516 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,049 ready_for_fw is high
1,363,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,916 >>> mbox cmd response: success
2,928,916 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,990,498 UART:
2,990,514 UART: Running Caliptra FMC ...
2,990,922 UART:
2,990,976 UART: [state] CFI Enabled
3,001,437 UART: [fht] FMC Alias Private Key: 7
3,109,770 UART: [art] Extend RT PCRs Done
3,110,198 UART: [art] Lock RT PCRs Done
3,112,060 UART: [art] Populate DV Done
3,120,325 UART: [fht] FMC Alias Private Key: 7
3,121,401 UART: [art] Derive CDI
3,121,681 UART: [art] Store in in slot 0x4
3,207,272 UART: [art] Derive Key Pair
3,207,632 UART: [art] Store priv key in slot 0x5
3,220,820 UART: [art] Derive Key Pair - Done
3,235,984 UART: [art] Signing Cert with AUTHO
3,236,464 UART: RITY.KEYID = 7
3,252,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,851 UART: [art] PUB.X = 2EAF12E28582F7B8980A770AA7FAD983BC57A4B29990DF6798EE8515ED25F1C38BAFE4FE2D61607D03F9B656227B47CC
3,259,624 UART: [art] PUB.Y = D33B78F2D8E00BA059AE803935FB3201B2EEC572712046A703EC9393ABADC2D0C80B8CE4C2134ABF0E3F3F66977DF618
3,266,571 UART: [art] SIG.R = 0A1D6416E0BA17FA8429887CF5AE90D1F130CDEA217F5F1B154CC1230B498B35EB07814609DEED91936814AC9A4D8A31
3,273,337 UART: [art] SIG.S = E353F80E26DDAD2AAF4D5CC832A2B469289FA441DF425F71F9FBD911BF28EB21EA8D5A19531A1558C032DF334C8B359D
3,297,147 UART: Caliptra RT
3,297,400 UART: [state] CFI Enabled
3,405,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,507 UART: [rt]cmd =0x46505344, len=4
3,543,739 >>> mbox cmd response data (8 bytes)
3,543,740 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,776 UART: Fatal Error: 0x000E0008
3,544,899 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,756 UART: [kat] SHA2-256
882,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,802 UART: [kat] ++
886,954 UART: [kat] sha1
891,248 UART: [kat] SHA2-256
893,186 UART: [kat] SHA2-384
895,919 UART: [kat] SHA2-512-ACC
897,820 UART: [kat] ECC-384
903,847 UART: [kat] HMAC-384Kdf
908,669 UART: [kat] LMS
1,476,865 UART: [kat] --
1,478,088 UART: [cold-reset] ++
1,478,544 UART: [fht] Storing FHT @ 0x50003400
1,481,203 UART: [idev] ++
1,481,371 UART: [idev] CDI.KEYID = 6
1,481,731 UART: [idev] SUBJECT.KEYID = 7
1,482,155 UART: [idev] UDS.KEYID = 0
1,482,500 ready_for_fw is high
1,482,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,375 UART: [idev] Erasing UDS.KEYID = 0
1,507,161 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,717 UART: [idev] --
1,516,600 UART: [ldev] ++
1,516,768 UART: [ldev] CDI.KEYID = 6
1,517,131 UART: [ldev] SUBJECT.KEYID = 5
1,517,557 UART: [ldev] AUTHORITY.KEYID = 7
1,518,020 UART: [ldev] FE.KEYID = 1
1,523,026 UART: [ldev] Erasing FE.KEYID = 1
1,548,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,968 UART: [fwproc] Waiting for Commands...
1,587,717 UART: [fwproc] Received command 0x46574c44
1,588,508 UART: [fwproc] Received Image of size 114332 bytes
2,886,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,672 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,937 >>> mbox cmd response: success
3,078,937 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,080,077 UART: [afmc] ++
3,080,245 UART: [afmc] CDI.KEYID = 6
3,080,607 UART: [afmc] SUBJECT.KEYID = 7
3,081,032 UART: [afmc] AUTHORITY.KEYID = 5
3,116,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,913 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,306 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,996 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,799 UART: [afmc] --
3,159,867 UART: [cold-reset] --
3,160,783 UART: [state] Locking Datavault
3,162,034 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,638 UART: [state] Locking ICCM
3,163,128 UART: [exit] Launching FMC @ 0x40000130
3,168,457 UART:
3,168,473 UART: Running Caliptra FMC ...
3,168,881 UART:
3,169,024 UART: [state] CFI Enabled
3,179,715 UART: [fht] FMC Alias Private Key: 7
3,288,092 UART: [art] Extend RT PCRs Done
3,288,520 UART: [art] Lock RT PCRs Done
3,289,924 UART: [art] Populate DV Done
3,298,295 UART: [fht] FMC Alias Private Key: 7
3,299,223 UART: [art] Derive CDI
3,299,503 UART: [art] Store in in slot 0x4
3,385,164 UART: [art] Derive Key Pair
3,385,524 UART: [art] Store priv key in slot 0x5
3,399,172 UART: [art] Derive Key Pair - Done
3,413,925 UART: [art] Signing Cert with AUTHO
3,414,405 UART: RITY.KEYID = 7
3,429,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,462 UART: [art] PUB.X = B90A489B0C37E498B0CF6560A62C1C7AA5E6D05476BDC413E4C92C8817AC2DD53E1890AE0802A0E0F32A9AB0AA4E6AFC
3,437,238 UART: [art] PUB.Y = DBDCDFFA863548CFCB48B29BE98BEC10326330E6F30DDA929AD3C45C2F15F84BF9FB21F7593BFE130DB375704CB892A9
3,444,204 UART: [art] SIG.R = 6BB0D698F99137220853A4448B16E37F7D0D9C949C9732082E0C5A5B389E4B4345F43370ECE738B99629FB7D6C9F732D
3,450,958 UART: [art] SIG.S = 08673F3016487273B8F70A0D6F39FC8A5DB7A9EA74E3270DFA12ABC0D700D5B3006B3DEE60A764F07277174B6120246A
3,474,273 UART: Caliptra RT
3,474,618 UART: [state] CFI Enabled
3,583,376 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,062 UART: [rt]cmd =0x46505344, len=4
3,722,278 >>> mbox cmd response data (8 bytes)
3,722,279 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,722,315 UART: Fatal Error: 0x000E0008
3,723,438 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 ready_for_fw is high
1,363,102 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,683 >>> mbox cmd response: success
2,928,683 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,990,713 UART:
2,990,729 UART: Running Caliptra FMC ...
2,991,137 UART:
2,991,280 UART: [state] CFI Enabled
3,001,725 UART: [fht] FMC Alias Private Key: 7
3,109,574 UART: [art] Extend RT PCRs Done
3,110,002 UART: [art] Lock RT PCRs Done
3,111,706 UART: [art] Populate DV Done
3,119,763 UART: [fht] FMC Alias Private Key: 7
3,120,693 UART: [art] Derive CDI
3,120,973 UART: [art] Store in in slot 0x4
3,206,082 UART: [art] Derive Key Pair
3,206,442 UART: [art] Store priv key in slot 0x5
3,220,310 UART: [art] Derive Key Pair - Done
3,234,759 UART: [art] Signing Cert with AUTHO
3,235,239 UART: RITY.KEYID = 7
3,250,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,160 UART: [art] PUB.X = E5867EAFBAF113C602E9585A3D371EBF7FAC40DDC6034EC7B8AC968A34CA1D0556C419E5AD727F51BF6B7B7CE1B6E970
3,257,943 UART: [art] PUB.Y = 785809359837E590392EAD8B4AA6EBB748DB190909C058D5F1DDF5B503E148E56AEEFE0ABE48F25FA9FFD33357AB77D8
3,264,892 UART: [art] SIG.R = D6E22F977FD8AD51131D87761BF507CF8BEA728CBA516069418B3EF13D8D0277AF92BDB0FB47697BBD70B146C1699B6F
3,271,668 UART: [art] SIG.S = 489292AA96B2993DEE15979A3323E42833874287602C26136468E187024D9EFE787C26B0C93AA8CFAE08DD5ABB9F1726
3,295,221 UART: Caliptra RT
3,295,566 UART: [state] CFI Enabled
3,403,411 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,859 UART: [rt]cmd =0x46505344, len=4
3,542,243 >>> mbox cmd response data (8 bytes)
3,542,244 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,280 UART: Fatal Error: 0x000E0008
3,543,403 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,412 UART: [kat] LMS
1,170,740 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,528 UART: [idev] ++
1,174,696 UART: [idev] CDI.KEYID = 6
1,175,056 UART: [idev] SUBJECT.KEYID = 7
1,175,480 UART: [idev] UDS.KEYID = 0
1,175,825 ready_for_fw is high
1,175,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,320 UART: [idev] Erasing UDS.KEYID = 0
1,200,401 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,458 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,902 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,065 >>> mbox cmd response: success
2,774,065 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,775,293 UART: [afmc] ++
2,775,461 UART: [afmc] CDI.KEYID = 6
2,775,823 UART: [afmc] SUBJECT.KEYID = 7
2,776,248 UART: [afmc] AUTHORITY.KEYID = 5
2,811,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,796 UART: [afmc] --
2,854,898 UART: [cold-reset] --
2,855,774 UART: [state] Locking Datavault
2,856,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,135 UART: [state] Locking ICCM
2,857,741 UART: [exit] Launching FMC @ 0x40000130
2,863,070 UART:
2,863,086 UART: Running Caliptra FMC ...
2,863,494 UART:
2,863,548 UART: [state] CFI Enabled
2,873,859 UART: [fht] FMC Alias Private Key: 7
2,981,934 UART: [art] Extend RT PCRs Done
2,982,362 UART: [art] Lock RT PCRs Done
2,983,884 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,993,141 UART: [art] Derive CDI
2,993,421 UART: [art] Store in in slot 0x4
3,079,150 UART: [art] Derive Key Pair
3,079,510 UART: [art] Store priv key in slot 0x5
3,092,862 UART: [art] Derive Key Pair - Done
3,107,941 UART: [art] Signing Cert with AUTHO
3,108,421 UART: RITY.KEYID = 7
3,123,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,844 UART: [art] PUB.X = A8BAF3D3D66ED2B2CF60384B8446B03784037CF4E8C242C6F9A6120DBC85736AA09C2B1D2760108C3DC13BB846C59E24
3,130,616 UART: [art] PUB.Y = 4A120C4068B9961A38F37E388E93A2861714042C4D197C01AC5A2C86DA967840B1E57C2EB80940A6A453DE92DB34BDD0
3,137,554 UART: [art] SIG.R = 1CF247C4B70750345399621B7FB446EA0FC16F7D246A79062D3F07A013AD25D54BBD683F74779E06DE0914360CA9ECCC
3,144,307 UART: [art] SIG.S = 6EE3413C58C7C9817CAA9BEFD2932FC36C0C825A26552EFA7E6029104DB5C806A5179E6397CB29339EEC7F157B699B50
3,168,266 UART: Caliptra RT
3,168,519 UART: [state] CFI Enabled
3,275,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,022 UART: [rt]cmd =0x46505344, len=4
3,414,312 >>> mbox cmd response data (8 bytes)
3,414,313 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,349 UART: Fatal Error: 0x000E0008
3,415,472 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,607 ready_for_fw is high
1,060,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,956 >>> mbox cmd response: success
2,627,956 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,689,358 UART:
2,689,374 UART: Running Caliptra FMC ...
2,689,782 UART:
2,689,836 UART: [state] CFI Enabled
2,700,225 UART: [fht] FMC Alias Private Key: 7
2,808,064 UART: [art] Extend RT PCRs Done
2,808,492 UART: [art] Lock RT PCRs Done
2,810,194 UART: [art] Populate DV Done
2,818,205 UART: [fht] FMC Alias Private Key: 7
2,819,247 UART: [art] Derive CDI
2,819,527 UART: [art] Store in in slot 0x4
2,904,812 UART: [art] Derive Key Pair
2,905,172 UART: [art] Store priv key in slot 0x5
2,918,616 UART: [art] Derive Key Pair - Done
2,933,131 UART: [art] Signing Cert with AUTHO
2,933,611 UART: RITY.KEYID = 7
2,948,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,136 UART: [art] PUB.X = 119155A1A8107B374E78A94747AFDF09D1F5E5F8D518EDBA87A0D8803413660B64A7556DB8AA6877FB47107BC37B938B
2,955,902 UART: [art] PUB.Y = 087284DAF50D459B406C76EEB7E35F2DD067F1665C46A293798DAB703B79DA6D5CAEF6EA201B050391237B24357778F2
2,962,842 UART: [art] SIG.R = 5A45F1459800F89F1C84E2708F0AB03FFE19BFB898EC3390C7C04B35EE5097C9635B62961417A79EEDCD5DCEFCAAD6A1
2,969,603 UART: [art] SIG.S = 572703071BB5A6A40328484538156FFA13D4ED8842FDD6DA1B239C8512BF73027C2073F4795674A91D03CA2A4993C03B
2,993,315 UART: Caliptra RT
2,993,568 UART: [state] CFI Enabled
3,101,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,113 UART: [rt]cmd =0x46505344, len=4
3,240,029 >>> mbox cmd response data (8 bytes)
3,240,030 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,240,066 UART: Fatal Error: 0x000E0008
3,241,189 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,051 UART: [kat] HMAC-384Kdf
922,709 UART: [kat] LMS
1,171,037 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,346 UART: [fht] FHT @ 0x50003400
1,174,929 UART: [idev] ++
1,175,097 UART: [idev] CDI.KEYID = 6
1,175,457 UART: [idev] SUBJECT.KEYID = 7
1,175,881 UART: [idev] UDS.KEYID = 0
1,176,226 ready_for_fw is high
1,176,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,201,222 UART: [idev] Sha1 KeyId Algorithm
1,209,650 UART: [idev] --
1,210,852 UART: [ldev] ++
1,211,020 UART: [ldev] CDI.KEYID = 6
1,211,383 UART: [ldev] SUBJECT.KEYID = 5
1,211,809 UART: [ldev] AUTHORITY.KEYID = 7
1,212,272 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,244,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,202 UART: [ldev] --
1,283,563 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,924 >>> mbox cmd response: success
2,773,924 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,775,122 UART: [afmc] ++
2,775,290 UART: [afmc] CDI.KEYID = 6
2,775,652 UART: [afmc] SUBJECT.KEYID = 7
2,776,077 UART: [afmc] AUTHORITY.KEYID = 5
2,812,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,451 UART: [afmc] --
2,855,417 UART: [cold-reset] --
2,856,245 UART: [state] Locking Datavault
2,857,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,132 UART: [state] Locking ICCM
2,858,582 UART: [exit] Launching FMC @ 0x40000130
2,863,911 UART:
2,863,927 UART: Running Caliptra FMC ...
2,864,335 UART:
2,864,478 UART: [state] CFI Enabled
2,875,089 UART: [fht] FMC Alias Private Key: 7
2,982,900 UART: [art] Extend RT PCRs Done
2,983,328 UART: [art] Lock RT PCRs Done
2,984,560 UART: [art] Populate DV Done
2,992,863 UART: [fht] FMC Alias Private Key: 7
2,993,881 UART: [art] Derive CDI
2,994,161 UART: [art] Store in in slot 0x4
3,080,174 UART: [art] Derive Key Pair
3,080,534 UART: [art] Store priv key in slot 0x5
3,093,552 UART: [art] Derive Key Pair - Done
3,108,309 UART: [art] Signing Cert with AUTHO
3,108,789 UART: RITY.KEYID = 7
3,123,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,410 UART: [art] PUB.X = 0543358159500095B4A653950FB52460C2C69190F010DA750CCDE1F2EB1330760CCE34B06FB5EA674649DD6F4C1C3B68
3,131,144 UART: [art] PUB.Y = 09117D00186F0892D5CDE921CE6FE4EB46DB876DDD1C213E7B1CF193F80725F124C2D053BD781B8A754AAB0DB9FE0BD4
3,138,073 UART: [art] SIG.R = 5F2EF34B95D5EC66E026FFD4589124501006D24385ABD4829DE47E95B4E10D0D91A07FAD0E98C9665E12CC0314082BDA
3,144,831 UART: [art] SIG.S = 3A67A4B08C2F759EF5706A8F7AF0EDE44C242B257589171D1F5E8D25369585FFE2742AC8229C496B161F0F5029F9F4D2
3,169,047 UART: Caliptra RT
3,169,392 UART: [state] CFI Enabled
3,277,581 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,857 UART: [rt]cmd =0x46505344, len=4
3,416,219 >>> mbox cmd response data (8 bytes)
3,416,220 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,416,256 UART: Fatal Error: 0x000E0008
3,417,379 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,904 ready_for_fw is high
1,060,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,477 >>> mbox cmd response: success
2,626,477 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,688,755 UART:
2,688,771 UART: Running Caliptra FMC ...
2,689,179 UART:
2,689,322 UART: [state] CFI Enabled
2,700,037 UART: [fht] FMC Alias Private Key: 7
2,808,192 UART: [art] Extend RT PCRs Done
2,808,620 UART: [art] Lock RT PCRs Done
2,810,184 UART: [art] Populate DV Done
2,818,137 UART: [fht] FMC Alias Private Key: 7
2,819,291 UART: [art] Derive CDI
2,819,571 UART: [art] Store in in slot 0x4
2,905,578 UART: [art] Derive Key Pair
2,905,938 UART: [art] Store priv key in slot 0x5
2,918,768 UART: [art] Derive Key Pair - Done
2,933,920 UART: [art] Signing Cert with AUTHO
2,934,400 UART: RITY.KEYID = 7
2,949,868 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,633 UART: [art] PUB.X = 16C8E3DDF7AE8C21380C9D37FA72938507E6B81BD6F4EC259CC26597FAE50C8FDF3679CD9F9F74A21BA7F95AE2C0FD46
2,957,414 UART: [art] PUB.Y = 734041F5D78BAAC86631C06A14DFE78C9AE0FB8503DDF19DFA6E8576D95E70A1705E96DF827BB5515733E4ABB5170740
2,964,366 UART: [art] SIG.R = E6DB54B7881E78B69BB776E169A6D180F298C377762F26F5F44CB35F02E791E486C7DC622356EFB09472E88B7203A458
2,971,128 UART: [art] SIG.S = B86A7C14B0925943258AAA0FE4235EA3AD1DE1981D629D18CC1DE953C968184586234385347C22F24547A709906EFB1C
2,994,621 UART: Caliptra RT
2,994,966 UART: [state] CFI Enabled
3,102,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,552 UART: [rt]cmd =0x46505344, len=4
3,241,816 >>> mbox cmd response data (8 bytes)
3,241,817 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,241,853 UART: Fatal Error: 0x000E0008
3,242,976 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 ready_for_fw is high
1,173,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,047 UART: [idev] --
1,208,060 UART: [ldev] ++
1,208,228 UART: [ldev] CDI.KEYID = 6
1,208,592 UART: [ldev] SUBJECT.KEYID = 5
1,209,019 UART: [ldev] AUTHORITY.KEYID = 7
1,209,482 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,005 >>> mbox cmd response: success
2,773,005 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,266 UART: [afmc] ++
2,774,434 UART: [afmc] CDI.KEYID = 6
2,774,797 UART: [afmc] SUBJECT.KEYID = 7
2,775,223 UART: [afmc] AUTHORITY.KEYID = 5
2,811,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,663 UART: [afmc] --
2,854,709 UART: [cold-reset] --
2,855,543 UART: [state] Locking Datavault
2,856,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,392 UART: [state] Locking ICCM
2,857,900 UART: [exit] Launching FMC @ 0x40000130
2,863,229 UART:
2,863,245 UART: Running Caliptra FMC ...
2,863,653 UART:
2,863,707 UART: [state] CFI Enabled
2,873,708 UART: [fht] FMC Alias Private Key: 7
2,980,933 UART: [art] Extend RT PCRs Done
2,981,361 UART: [art] Lock RT PCRs Done
2,983,047 UART: [art] Populate DV Done
2,991,182 UART: [fht] FMC Alias Private Key: 7
2,992,190 UART: [art] Derive CDI
2,992,470 UART: [art] Store in in slot 0x4
3,078,159 UART: [art] Derive Key Pair
3,078,519 UART: [art] Store priv key in slot 0x5
3,091,265 UART: [art] Derive Key Pair - Done
3,105,882 UART: [art] Signing Cert with AUTHO
3,106,362 UART: RITY.KEYID = 7
3,121,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,185 UART: [art] PUB.X = A964E237B7D6262B4042A149ACE86229BE3D5270B4210DC4EFEE19C519288F85FD2659977F883BCC9C96C853DCDA6510
3,128,956 UART: [art] PUB.Y = 17AB34045F00A48D15D5114BC92CBA3C0A37241E9F8E0BA07938E43000F3DA81CF80C473BBB9D614BFE3287D21DF87DC
3,135,865 UART: [art] SIG.R = FF188EB22CAF139FBAFA4E7DE934807C8B570CA5DB30AF1CE7570F84F4E8D640757D1503BE2F9D94EFFFB6DC5FD6C4B8
3,142,654 UART: [art] SIG.S = 5DA2588E9B0AFE7068C66F0AB9A87EDA24379ECF55EC6DBD3077559C14BF48A14A0C18B331A94AF2BB2D1D4D7FB5BED1
3,166,270 UART: Caliptra RT
3,166,523 UART: [state] CFI Enabled
3,274,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,032 UART: [rt]cmd =0x46505344, len=4
3,413,204 >>> mbox cmd response data (8 bytes)
3,413,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,241 UART: Fatal Error: 0x000E0008
3,414,364 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,376 ready_for_fw is high
1,055,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,433 >>> mbox cmd response: success
2,621,433 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,683,367 UART:
2,683,383 UART: Running Caliptra FMC ...
2,683,791 UART:
2,683,845 UART: [state] CFI Enabled
2,694,016 UART: [fht] FMC Alias Private Key: 7
2,802,113 UART: [art] Extend RT PCRs Done
2,802,541 UART: [art] Lock RT PCRs Done
2,804,115 UART: [art] Populate DV Done
2,812,300 UART: [fht] FMC Alias Private Key: 7
2,813,240 UART: [art] Derive CDI
2,813,520 UART: [art] Store in in slot 0x4
2,899,131 UART: [art] Derive Key Pair
2,899,491 UART: [art] Store priv key in slot 0x5
2,912,161 UART: [art] Derive Key Pair - Done
2,926,741 UART: [art] Signing Cert with AUTHO
2,927,221 UART: RITY.KEYID = 7
2,942,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,058 UART: [art] PUB.X = EB108EE44116707759682DA1E82B492BBCF756B7678177E5B2B5B28E9635BAB2B80C75E80416B4C250E9F3E94AC1AE86
2,949,826 UART: [art] PUB.Y = FE9DD91A5AD76ACD3ECC000753EE023F0C8F87650349A51DEEAD6A0468129F88F284A44051B19F84294BD194BE8FA647
2,956,749 UART: [art] SIG.R = 9AB4A4FBA4771FE035F014043CB36CE23570EB2B9E85671CE663C6946BFFDD8A16F1661201AC869A9E993F7D8FD2C047
2,963,523 UART: [art] SIG.S = DC98392B7E252503A6E8027CFA68D1D53463AB2F421DE69D39F8AB45478365A4ACACA7D78CD51DF0591065FEA517B519
2,987,010 UART: Caliptra RT
2,987,263 UART: [state] CFI Enabled
3,096,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,041 UART: [rt]cmd =0x46505344, len=4
3,235,603 >>> mbox cmd response data (8 bytes)
3,235,604 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,235,640 UART: Fatal Error: 0x000E0008
3,236,763 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,683 UART: [state] LifecycleState = Unprovisioned
85,338 UART: [state] DebugLocked = No
85,870 UART: [state] WD Timer not started. Device not locked for debugging
87,195 UART: [kat] SHA2-256
890,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,874 UART: [kat] ++
895,026 UART: [kat] sha1
899,250 UART: [kat] SHA2-256
901,190 UART: [kat] SHA2-384
903,941 UART: [kat] SHA2-512-ACC
905,842 UART: [kat] ECC-384
915,339 UART: [kat] HMAC-384Kdf
919,843 UART: [kat] LMS
1,168,155 UART: [kat] --
1,169,058 UART: [cold-reset] ++
1,169,556 UART: [fht] FHT @ 0x50003400
1,172,188 UART: [idev] ++
1,172,356 UART: [idev] CDI.KEYID = 6
1,172,717 UART: [idev] SUBJECT.KEYID = 7
1,173,142 UART: [idev] UDS.KEYID = 0
1,173,488 ready_for_fw is high
1,173,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,874 UART: [idev] Erasing UDS.KEYID = 0
1,198,156 UART: [idev] Sha1 KeyId Algorithm
1,206,922 UART: [idev] --
1,208,017 UART: [ldev] ++
1,208,185 UART: [ldev] CDI.KEYID = 6
1,208,549 UART: [ldev] SUBJECT.KEYID = 5
1,208,976 UART: [ldev] AUTHORITY.KEYID = 7
1,209,439 UART: [ldev] FE.KEYID = 1
1,214,489 UART: [ldev] Erasing FE.KEYID = 1
1,241,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,509 UART: [ldev] --
1,280,813 UART: [fwproc] Wait for Commands...
1,281,396 UART: [fwproc] Recv command 0x46574c44
1,282,129 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,868 >>> mbox cmd response: success
2,771,868 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,772,995 UART: [afmc] ++
2,773,163 UART: [afmc] CDI.KEYID = 6
2,773,526 UART: [afmc] SUBJECT.KEYID = 7
2,773,952 UART: [afmc] AUTHORITY.KEYID = 5
2,809,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,542 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,964 UART: [afmc] --
2,853,038 UART: [cold-reset] --
2,853,822 UART: [state] Locking Datavault
2,855,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,725 UART: [state] Locking ICCM
2,856,237 UART: [exit] Launching FMC @ 0x40000130
2,861,566 UART:
2,861,582 UART: Running Caliptra FMC ...
2,861,990 UART:
2,862,133 UART: [state] CFI Enabled
2,873,194 UART: [fht] FMC Alias Private Key: 7
2,981,375 UART: [art] Extend RT PCRs Done
2,981,803 UART: [art] Lock RT PCRs Done
2,983,471 UART: [art] Populate DV Done
2,991,674 UART: [fht] FMC Alias Private Key: 7
2,992,664 UART: [art] Derive CDI
2,992,944 UART: [art] Store in in slot 0x4
3,079,181 UART: [art] Derive Key Pair
3,079,541 UART: [art] Store priv key in slot 0x5
3,092,579 UART: [art] Derive Key Pair - Done
3,107,614 UART: [art] Signing Cert with AUTHO
3,108,094 UART: RITY.KEYID = 7
3,123,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,875 UART: [art] PUB.X = 41C940969047A9EF470BD979D394E2DC1C0023AC512A74654E73193DC9420E3666ABCB6DC033F4C3A343D6AC1B1BCAAA
3,130,627 UART: [art] PUB.Y = E2E40514DF509C581A4BDA9DFF30BEC8FD00F4AE20BB4C23BF70FBEF90A1DB880777C8C84CB554C55D0D245E45A77320
3,137,566 UART: [art] SIG.R = 95667548149D5A27E634DE602CBC0D580F217FEFE073923FE508502F459B4B5DEC4F5D436CFF9F9CCE7FDFCE203C6E8B
3,144,343 UART: [art] SIG.S = 1AB86C34F1F7B1555B4FB03ED407F12D3D09984FD89D6AC0E78B69C23563A68022ACC33EE9B40A28F42B7034B0049A46
3,167,966 UART: Caliptra RT
3,168,311 UART: [state] CFI Enabled
3,275,054 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,828 UART: [rt]cmd =0x46505344, len=4
3,413,950 >>> mbox cmd response data (8 bytes)
3,413,951 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,987 UART: Fatal Error: 0x000E0008
3,415,110 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,581 ready_for_fw is high
1,055,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,298 >>> mbox cmd response: success
2,622,298 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,684,932 UART:
2,684,948 UART: Running Caliptra FMC ...
2,685,356 UART:
2,685,499 UART: [state] CFI Enabled
2,696,006 UART: [fht] FMC Alias Private Key: 7
2,804,057 UART: [art] Extend RT PCRs Done
2,804,485 UART: [art] Lock RT PCRs Done
2,805,761 UART: [art] Populate DV Done
2,813,862 UART: [fht] FMC Alias Private Key: 7
2,814,808 UART: [art] Derive CDI
2,815,088 UART: [art] Store in in slot 0x4
2,900,869 UART: [art] Derive Key Pair
2,901,229 UART: [art] Store priv key in slot 0x5
2,914,527 UART: [art] Derive Key Pair - Done
2,929,366 UART: [art] Signing Cert with AUTHO
2,929,846 UART: RITY.KEYID = 7
2,945,080 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,845 UART: [art] PUB.X = FF98B3FFBECBB1E748271D4896420658BB99FD0531E33D05C790E1B6BF3B5778B2FD2C53D4CEFB797B1DA22C219A1539
2,952,620 UART: [art] PUB.Y = 6810D7B7C3B14F461055BF26B6643E6F17C73C5AF18129E08D48261DB36C2FBC21785270E90B50EE541FACA66C9B533F
2,959,571 UART: [art] SIG.R = 492B73E7BC5689A83899E880DAAC6EEE30863A2D6F68F12C47DD90E23CD91B1830390A1EA4C4288F491DB2CB05FC58BC
2,966,347 UART: [art] SIG.S = 286AEAB61FC4F329E8A98F35C5E06FB9161646594949A0C3B30FD597DB1E34EFF8EDFC451F29092E1E5DFC2E1CE60ADC
2,990,449 UART: Caliptra RT
2,990,794 UART: [state] CFI Enabled
3,097,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,051 UART: [rt]cmd =0x46505344, len=4
3,236,049 >>> mbox cmd response data (8 bytes)
3,236,050 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,236,086 UART: Fatal Error: 0x000E0008
3,237,209 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,046 UART: [kat] LMS
1,475,242 UART: [kat] --
1,475,869 UART: [cold-reset] ++
1,476,345 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 ready_for_fw is high
1,480,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,690 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,520,909 UART: [ldev] Erasing FE.KEYID = 1
1,546,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,142 UART: [ldev] --
1,585,535 UART: [fwproc] Waiting for Commands...
1,586,350 UART: [fwproc] Received command 0x46574c44
1,587,141 UART: [fwproc] Received Image of size 114332 bytes
2,885,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,848 >>> mbox cmd response: success
3,077,848 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,978 UART: [afmc] ++
3,079,146 UART: [afmc] CDI.KEYID = 6
3,079,508 UART: [afmc] SUBJECT.KEYID = 7
3,079,933 UART: [afmc] AUTHORITY.KEYID = 5
3,114,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,026 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,419 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,109 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,998 UART: [afmc] --
3,157,914 UART: [cold-reset] --
3,158,914 UART: [state] Locking Datavault
3,160,341 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,945 UART: [state] Locking ICCM
3,161,529 UART: [exit] Launching FMC @ 0x40000130
3,166,858 UART:
3,166,874 UART: Running Caliptra FMC ...
3,167,282 UART:
3,167,336 UART: [state] CFI Enabled
3,177,815 UART: [fht] FMC Alias Private Key: 7
3,285,942 UART: [art] Extend RT PCRs Done
3,286,370 UART: [art] Lock RT PCRs Done
3,287,834 UART: [art] Populate DV Done
3,296,157 UART: [fht] FMC Alias Private Key: 7
3,297,255 UART: [art] Derive CDI
3,297,535 UART: [art] Store in in slot 0x4
3,382,948 UART: [art] Derive Key Pair
3,383,308 UART: [art] Store priv key in slot 0x5
3,396,964 UART: [art] Derive Key Pair - Done
3,411,714 UART: [art] Signing Cert with AUTHO
3,412,194 UART: RITY.KEYID = 7
3,427,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,943 UART: [art] PUB.X = 694892CEF9EBF3E405B28C4C54D9747FA14036CE0E4D78D78149FA4C0522025B073A928E469354B802BE8AF8F1E3F04A
3,434,699 UART: [art] PUB.Y = EFA1DFACD0BF3EA0155330386200E6DDFDB4FBDFE8D68AE7123048FC64B13C78B6D775EE18A67C123D3AB3607AD49447
3,441,647 UART: [art] SIG.R = 53A1E0558C9F5189C27877C9C8E207FF1025309159A44DC15F66ABCA7EA892B8C6A1D184455C40CAEFEE07AF284ECBB1
3,448,423 UART: [art] SIG.S = E51B8FD5F5458315DC7E6A0DC1A74492AD30B591B7674A830EA043FEBC1DF0250C129A2B8AD18C4E7371B49168328683
3,472,363 UART: Caliptra RT
3,472,616 UART: [state] CFI Enabled
3,580,867 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,623 UART: [rt]cmd =0x46505652, len=4
3,612,283 UART: [rt] FIPS Version
3,613,202 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,938 >>> mbox cmd response: success
2,926,938 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,710 UART:
2,988,726 UART: Running Caliptra FMC ...
2,989,134 UART:
2,989,188 UART: [state] CFI Enabled
2,999,817 UART: [fht] FMC Alias Private Key: 7
3,107,848 UART: [art] Extend RT PCRs Done
3,108,276 UART: [art] Lock RT PCRs Done
3,109,580 UART: [art] Populate DV Done
3,117,785 UART: [fht] FMC Alias Private Key: 7
3,118,957 UART: [art] Derive CDI
3,119,237 UART: [art] Store in in slot 0x4
3,205,220 UART: [art] Derive Key Pair
3,205,580 UART: [art] Store priv key in slot 0x5
3,218,616 UART: [art] Derive Key Pair - Done
3,233,361 UART: [art] Signing Cert with AUTHO
3,233,841 UART: RITY.KEYID = 7
3,249,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,292 UART: [art] PUB.X = BC61FA5F198F00DADC91B29BD9D32FDCBC78500ADCAFFC434964D5092FED3660F2D43C2AECB2DB90EBE5D3328C294DB6
3,257,064 UART: [art] PUB.Y = 7D3E9A02854D05388F20D4B7254285590BF9FF7D6DBEBDD839BD53564D68F31346F3C8162880A4FA746601761522A5BE
3,264,000 UART: [art] SIG.R = D8A9140B67E25CDC32FEDB5FE1B40685561CD7BAD2271031F5E04F558BD1DE9558707261C2C71C812B413A887A1727EB
3,270,770 UART: [art] SIG.S = 0A24C4C738D284FA31338A8C3D3CB5B7F5C7DB1BDC413DEFB14F3959593711367BA73CA160F1FD4EF5B8517C94A91FDE
3,294,698 UART: Caliptra RT
3,294,951 UART: [state] CFI Enabled
3,403,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,736 UART: [rt]cmd =0x46505652, len=4
3,434,396 UART: [rt] FIPS Version
3,435,561 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,787 UART: [kat] LMS
1,475,983 UART: [kat] --
1,476,914 UART: [cold-reset] ++
1,477,292 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 ready_for_fw is high
1,481,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,581 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,332 UART: [ldev] ++
1,515,500 UART: [ldev] CDI.KEYID = 6
1,515,863 UART: [ldev] SUBJECT.KEYID = 5
1,516,289 UART: [ldev] AUTHORITY.KEYID = 7
1,516,752 UART: [ldev] FE.KEYID = 1
1,522,026 UART: [ldev] Erasing FE.KEYID = 1
1,547,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,705 UART: [ldev] --
1,587,126 UART: [fwproc] Waiting for Commands...
1,587,823 UART: [fwproc] Received command 0x46574c44
1,588,614 UART: [fwproc] Received Image of size 114332 bytes
2,886,854 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,071 >>> mbox cmd response: success
3,079,071 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,113 UART: [afmc] ++
3,080,281 UART: [afmc] CDI.KEYID = 6
3,080,643 UART: [afmc] SUBJECT.KEYID = 7
3,081,068 UART: [afmc] AUTHORITY.KEYID = 5
3,117,039 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,687 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,080 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,770 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,523 UART: [afmc] --
3,160,633 UART: [cold-reset] --
3,161,395 UART: [state] Locking Datavault
3,162,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,238 UART: [state] Locking ICCM
3,163,850 UART: [exit] Launching FMC @ 0x40000130
3,169,179 UART:
3,169,195 UART: Running Caliptra FMC ...
3,169,603 UART:
3,169,746 UART: [state] CFI Enabled
3,180,507 UART: [fht] FMC Alias Private Key: 7
3,288,120 UART: [art] Extend RT PCRs Done
3,288,548 UART: [art] Lock RT PCRs Done
3,290,310 UART: [art] Populate DV Done
3,298,763 UART: [fht] FMC Alias Private Key: 7
3,299,695 UART: [art] Derive CDI
3,299,975 UART: [art] Store in in slot 0x4
3,385,760 UART: [art] Derive Key Pair
3,386,120 UART: [art] Store priv key in slot 0x5
3,399,554 UART: [art] Derive Key Pair - Done
3,414,373 UART: [art] Signing Cert with AUTHO
3,414,853 UART: RITY.KEYID = 7
3,429,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,688 UART: [art] PUB.X = 1D9CADF064A8DD137476CF2EE987CF201EA90F0B81052B4ABA289F11362D069FBCD95222D1D986BF7B4A295843F72DE2
3,437,458 UART: [art] PUB.Y = 0184E125EE6175439894A8B832CA806E33008C0E0A670B4CF39274088B0C19F111CD6621F94BD86539D4BE4DA389E774
3,444,362 UART: [art] SIG.R = C0FE11CE9B7A10D4A655A52B579C18B03FB290ACE5A9ECB81ADBB1E9143334CE57D623CF27F7EFB474FB865D4C53369B
3,451,152 UART: [art] SIG.S = CAF044BF21E2794615646D5702D84756E0074B91E05061A82E26BF9D53F5165D7BD06ED5C5E56FBBF87164414B63D7F6
3,475,023 UART: Caliptra RT
3,475,368 UART: [state] CFI Enabled
3,583,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,078 UART: [rt]cmd =0x46505652, len=4
3,614,738 UART: [rt] FIPS Version
3,615,963 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,544 ready_for_fw is high
1,362,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,875 >>> mbox cmd response: success
2,926,875 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,613 UART:
2,988,629 UART: Running Caliptra FMC ...
2,989,037 UART:
2,989,180 UART: [state] CFI Enabled
3,000,049 UART: [fht] FMC Alias Private Key: 7
3,107,744 UART: [art] Extend RT PCRs Done
3,108,172 UART: [art] Lock RT PCRs Done
3,109,814 UART: [art] Populate DV Done
3,117,767 UART: [fht] FMC Alias Private Key: 7
3,118,789 UART: [art] Derive CDI
3,119,069 UART: [art] Store in in slot 0x4
3,204,998 UART: [art] Derive Key Pair
3,205,358 UART: [art] Store priv key in slot 0x5
3,218,426 UART: [art] Derive Key Pair - Done
3,233,187 UART: [art] Signing Cert with AUTHO
3,233,667 UART: RITY.KEYID = 7
3,249,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,102 UART: [art] PUB.X = 40FA07B00C903B7A7161505704BD94365686EF1B6066260CFF694046680612564A221D62790134D45815D1551A0ED516
3,256,831 UART: [art] PUB.Y = 6BAB4E0FF944C6008B6102DF258B63F0162E1179F2274C37A117298B195977822E9BC0D8D699A2D2EB24EE7B9F2557B2
3,263,753 UART: [art] SIG.R = 230F1B646589FDC6A756CA4646E38106BDCB8776EEB1E472F67802DACB246C1BD7E8CEE9B04CF48B6D2E20CF3DB3E206
3,270,529 UART: [art] SIG.S = 091BAC5A74631262EC92E06A0FD36752D381F6BE819B91293FEE436C2FC25A34581DD7C02171EAE752C66904FC5F331F
3,293,719 UART: Caliptra RT
3,294,064 UART: [state] CFI Enabled
3,403,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,770 UART: [rt]cmd =0x46505652, len=4
3,434,430 UART: [rt] FIPS Version
3,435,291 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,396 UART: [kat] SHA2-512-ACC
908,297 UART: [kat] ECC-384
917,866 UART: [kat] HMAC-384Kdf
922,548 UART: [kat] LMS
1,170,876 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,131 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 ready_for_fw is high
1,176,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,920 UART: [idev] Erasing UDS.KEYID = 0
1,201,113 UART: [idev] Sha1 KeyId Algorithm
1,209,489 UART: [idev] --
1,210,697 UART: [ldev] ++
1,210,865 UART: [ldev] CDI.KEYID = 6
1,211,228 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,002 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,811 >>> mbox cmd response: success
2,774,811 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,895 UART: [afmc] ++
2,776,063 UART: [afmc] CDI.KEYID = 6
2,776,425 UART: [afmc] SUBJECT.KEYID = 7
2,776,850 UART: [afmc] AUTHORITY.KEYID = 5
2,812,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,230 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,532 UART: [afmc] --
2,855,628 UART: [cold-reset] --
2,856,576 UART: [state] Locking Datavault
2,857,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,593 UART: [state] Locking ICCM
2,859,239 UART: [exit] Launching FMC @ 0x40000130
2,864,568 UART:
2,864,584 UART: Running Caliptra FMC ...
2,864,992 UART:
2,865,046 UART: [state] CFI Enabled
2,875,757 UART: [fht] FMC Alias Private Key: 7
2,984,662 UART: [art] Extend RT PCRs Done
2,985,090 UART: [art] Lock RT PCRs Done
2,986,918 UART: [art] Populate DV Done
2,995,087 UART: [fht] FMC Alias Private Key: 7
2,996,211 UART: [art] Derive CDI
2,996,491 UART: [art] Store in in slot 0x4
3,082,074 UART: [art] Derive Key Pair
3,082,434 UART: [art] Store priv key in slot 0x5
3,095,702 UART: [art] Derive Key Pair - Done
3,110,318 UART: [art] Signing Cert with AUTHO
3,110,798 UART: RITY.KEYID = 7
3,125,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,703 UART: [art] PUB.X = F31F5B7F2673960F8C72B9E14DABBB872C720E8E9401C63DBB9522CC8B0994F9D24B75C6218BC9A5B7C787992BFA7732
3,133,469 UART: [art] PUB.Y = 6BA289B61E3ECA71EE531AFF523AB9CE6F6A77FA8CA66DADE397C10763E2EDCEBB151C66F8FEDB6AF4EA0C134634054D
3,140,440 UART: [art] SIG.R = 23468EAD842C8F2C4DC980D4E747C9D75526A1838D082E89FFD2E2AAE79FEEFEEB94223C0072189F3F8E92CCCCBCB78D
3,147,205 UART: [art] SIG.S = DE071B84E7E94A2D6BBB9D9E61DF174EB8E3F9FEE277E95C61C69B4924D00235D4C13655A3549DD62375147DEAA24098
3,170,904 UART: Caliptra RT
3,171,157 UART: [state] CFI Enabled
3,279,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,694 UART: [rt]cmd =0x46505652, len=4
3,310,354 UART: [rt] FIPS Version
3,311,577 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,931 ready_for_fw is high
1,060,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,300 >>> mbox cmd response: success
2,625,300 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,252 UART:
2,687,268 UART: Running Caliptra FMC ...
2,687,676 UART:
2,687,730 UART: [state] CFI Enabled
2,697,999 UART: [fht] FMC Alias Private Key: 7
2,806,310 UART: [art] Extend RT PCRs Done
2,806,738 UART: [art] Lock RT PCRs Done
2,808,332 UART: [art] Populate DV Done
2,816,487 UART: [fht] FMC Alias Private Key: 7
2,817,615 UART: [art] Derive CDI
2,817,895 UART: [art] Store in in slot 0x4
2,903,560 UART: [art] Derive Key Pair
2,903,920 UART: [art] Store priv key in slot 0x5
2,917,062 UART: [art] Derive Key Pair - Done
2,931,596 UART: [art] Signing Cert with AUTHO
2,932,076 UART: RITY.KEYID = 7
2,947,376 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,141 UART: [art] PUB.X = A3E426B91C0FF9BFBB7001B65C264F6E1B823CE8C062922755557F83622B6C93151C0D5299416A4ABC9B45E89411C4BC
2,954,904 UART: [art] PUB.Y = FE02A1F5BD997F912CE95F319DA5676E250BAD9A39B49D8F8D1970B56BD7B01D4B5378A5DC1E39CBF12E5EE0EFDE21B4
2,961,870 UART: [art] SIG.R = D156A4B6E3EB0962BAFDF5C5BBB854FDA1CE08763988411C5A7B89543C6E382145A309AA050F1C8F08C5D50CD049CC37
2,968,631 UART: [art] SIG.S = 09BC903D7B0C79D8901BC940AC28176A82F444AAE0ED795E2A28BC7F7F4CFA03C43F489C9E4E88DEDBD95C51C6CE6DD1
2,992,139 UART: Caliptra RT
2,992,392 UART: [state] CFI Enabled
3,100,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,691 UART: [rt]cmd =0x46505652, len=4
3,131,351 UART: [rt] FIPS Version
3,132,458 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,545 UART: [idev] ++
1,175,713 UART: [idev] CDI.KEYID = 6
1,176,073 UART: [idev] SUBJECT.KEYID = 7
1,176,497 UART: [idev] UDS.KEYID = 0
1,176,842 ready_for_fw is high
1,176,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,874 UART: [idev] Sha1 KeyId Algorithm
1,210,362 UART: [idev] --
1,211,350 UART: [ldev] ++
1,211,518 UART: [ldev] CDI.KEYID = 6
1,211,881 UART: [ldev] SUBJECT.KEYID = 5
1,212,307 UART: [ldev] AUTHORITY.KEYID = 7
1,212,770 UART: [ldev] FE.KEYID = 1
1,218,186 UART: [ldev] Erasing FE.KEYID = 1
1,244,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,936 UART: [ldev] --
1,284,213 UART: [fwproc] Wait for Commands...
1,284,789 UART: [fwproc] Recv command 0x46574c44
1,285,517 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,478 >>> mbox cmd response: success
2,775,478 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,554 UART: [afmc] ++
2,776,722 UART: [afmc] CDI.KEYID = 6
2,777,084 UART: [afmc] SUBJECT.KEYID = 7
2,777,509 UART: [afmc] AUTHORITY.KEYID = 5
2,813,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,563 UART: [afmc] --
2,856,661 UART: [cold-reset] --
2,857,341 UART: [state] Locking Datavault
2,858,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,298 UART: [state] Locking ICCM
2,859,776 UART: [exit] Launching FMC @ 0x40000130
2,865,105 UART:
2,865,121 UART: Running Caliptra FMC ...
2,865,529 UART:
2,865,672 UART: [state] CFI Enabled
2,876,375 UART: [fht] FMC Alias Private Key: 7
2,984,756 UART: [art] Extend RT PCRs Done
2,985,184 UART: [art] Lock RT PCRs Done
2,986,492 UART: [art] Populate DV Done
2,994,899 UART: [fht] FMC Alias Private Key: 7
2,995,843 UART: [art] Derive CDI
2,996,123 UART: [art] Store in in slot 0x4
3,081,990 UART: [art] Derive Key Pair
3,082,350 UART: [art] Store priv key in slot 0x5
3,096,134 UART: [art] Derive Key Pair - Done
3,110,796 UART: [art] Signing Cert with AUTHO
3,111,276 UART: RITY.KEYID = 7
3,126,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,391 UART: [art] PUB.X = 2B24819E9528D5CE88275FCDC899442A90310131629DC388ADCF5CE31C8DA5C2025804B3D469098D455CD70D265695AF
3,134,144 UART: [art] PUB.Y = A90A171A5D09F3158956326AFD8632B929A6B5262C2AA76C5085D0FF82DBF932A002CEC9383D6353FFDBFA3759132E5B
3,141,091 UART: [art] SIG.R = 12166A9980082ADCC20FD66F981097BE4C4C6E5DD2DF4706D78DA2D29BA7755E5B46384AF49AE7F701C3D816B8114952
3,147,853 UART: [art] SIG.S = 21E438908C7EED90CCA40815D4CB75293F0E7DE5C83F053E0D4FD4DA8993FA7523C28E75EC5C9DDADD2A32D6A1DEFC89
3,171,998 UART: Caliptra RT
3,172,343 UART: [state] CFI Enabled
3,280,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,690 UART: [rt]cmd =0x46505652, len=4
3,312,350 UART: [rt] FIPS Version
3,313,221 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 ready_for_fw is high
1,060,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,525 >>> mbox cmd response: success
2,626,525 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,815 UART:
2,688,831 UART: Running Caliptra FMC ...
2,689,239 UART:
2,689,382 UART: [state] CFI Enabled
2,700,287 UART: [fht] FMC Alias Private Key: 7
2,807,780 UART: [art] Extend RT PCRs Done
2,808,208 UART: [art] Lock RT PCRs Done
2,809,734 UART: [art] Populate DV Done
2,818,259 UART: [fht] FMC Alias Private Key: 7
2,819,253 UART: [art] Derive CDI
2,819,533 UART: [art] Store in in slot 0x4
2,905,172 UART: [art] Derive Key Pair
2,905,532 UART: [art] Store priv key in slot 0x5
2,919,450 UART: [art] Derive Key Pair - Done
2,934,459 UART: [art] Signing Cert with AUTHO
2,934,939 UART: RITY.KEYID = 7
2,949,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,634 UART: [art] PUB.X = 9EC70D91CCDC62E08FD2F4F638C9BCA5B92B0DD363D05078CC408088C17F1EF73BA7EDE7825763AAB8C23EF94363D0C0
2,957,416 UART: [art] PUB.Y = 44C93C84ADBA88BE75BAE74B21D60360938D351B1AAA581DDBD31655DF35EC0087444DD839EDC2A8AE88E6EFB870FA48
2,964,359 UART: [art] SIG.R = 1825EDD9ADECE4B1CC9E470EA9E1755598D0BC51D9130779237FDBDFC32045395B37775A119DE89A1AA59C0A2DA70D32
2,971,129 UART: [art] SIG.S = C8E6D9A6C6B9D9AB0021430AB02439DE8065FAC99312F21780B3B99F62C4479F75F90552CB11F112276DFC9FDC57EE8C
2,995,024 UART: Caliptra RT
2,995,369 UART: [state] CFI Enabled
3,103,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,082 UART: [rt]cmd =0x46505652, len=4
3,134,742 UART: [rt] FIPS Version
3,135,747 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,294 UART: [kat] LMS
1,168,606 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 ready_for_fw is high
1,174,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,640 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,076 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,509 >>> mbox cmd response: success
2,774,509 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,684 UART: [afmc] ++
2,775,852 UART: [afmc] CDI.KEYID = 6
2,776,215 UART: [afmc] SUBJECT.KEYID = 7
2,776,641 UART: [afmc] AUTHORITY.KEYID = 5
2,812,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,568 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,451 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,897 UART: [afmc] --
2,855,941 UART: [cold-reset] --
2,856,701 UART: [state] Locking Datavault
2,858,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,690 UART: [state] Locking ICCM
2,859,218 UART: [exit] Launching FMC @ 0x40000130
2,864,547 UART:
2,864,563 UART: Running Caliptra FMC ...
2,864,971 UART:
2,865,025 UART: [state] CFI Enabled
2,875,660 UART: [fht] FMC Alias Private Key: 7
2,983,315 UART: [art] Extend RT PCRs Done
2,983,743 UART: [art] Lock RT PCRs Done
2,985,515 UART: [art] Populate DV Done
2,993,696 UART: [fht] FMC Alias Private Key: 7
2,994,650 UART: [art] Derive CDI
2,994,930 UART: [art] Store in in slot 0x4
3,080,747 UART: [art] Derive Key Pair
3,081,107 UART: [art] Store priv key in slot 0x5
3,094,333 UART: [art] Derive Key Pair - Done
3,109,039 UART: [art] Signing Cert with AUTHO
3,109,519 UART: RITY.KEYID = 7
3,124,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,258 UART: [art] PUB.X = EE361389E6033C0906338F7AEC929B46576C4EA59F54441462227DBEF6C4EFDD4517BEC30C644B461D9DE732907D6D49
3,132,018 UART: [art] PUB.Y = F0E969C08CDAD2314F7007357B643BD12DCDE05977435C68FEE41E701D31CB50A0F8D0B2DB90A1DF0F8F3FC2B07130FE
3,138,978 UART: [art] SIG.R = 35F0372414199FAE7DD420D5C7CD8EA98A4491F1C13901677831DB0F2E89D3D1A57A67C97D3E07232DAC058C7F0FD660
3,145,737 UART: [art] SIG.S = B1E605C4E533F5DD93AC362625BF5F6E7E241B8105BEAB101238100C374A20962ABE5C6717439FE3E2478595DE4DA035
3,169,517 UART: Caliptra RT
3,169,770 UART: [state] CFI Enabled
3,277,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,887 UART: [rt]cmd =0x46505652, len=4
3,308,547 UART: [rt] FIPS Version
3,309,622 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,208 ready_for_fw is high
1,055,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,571 >>> mbox cmd response: success
2,622,571 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,477 UART:
2,684,493 UART: Running Caliptra FMC ...
2,684,901 UART:
2,684,955 UART: [state] CFI Enabled
2,695,742 UART: [fht] FMC Alias Private Key: 7
2,803,553 UART: [art] Extend RT PCRs Done
2,803,981 UART: [art] Lock RT PCRs Done
2,805,635 UART: [art] Populate DV Done
2,813,978 UART: [fht] FMC Alias Private Key: 7
2,815,014 UART: [art] Derive CDI
2,815,294 UART: [art] Store in in slot 0x4
2,900,879 UART: [art] Derive Key Pair
2,901,239 UART: [art] Store priv key in slot 0x5
2,914,769 UART: [art] Derive Key Pair - Done
2,929,769 UART: [art] Signing Cert with AUTHO
2,930,249 UART: RITY.KEYID = 7
2,945,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,930 UART: [art] PUB.X = D28DB301CC61B62463A17CADC253A273F1A583AB9EEDA9285D3FD35B73AC181545BAFB7105BB915735D3527118E6B780
2,952,702 UART: [art] PUB.Y = C7271E13372F35BC77789CF5BBFEA734C9688C1AB784E3B8D271891B14DCD7508A46AA4F1CCD5952306EAD7E3B89BAFC
2,959,668 UART: [art] SIG.R = DAD25C790A5F2C34CCEC2E1B6E1BC0333A3C7657C6E09EDE1E7D5202C55D680F43D6DA5864AD68AB194073C8C4BD65C9
2,966,447 UART: [art] SIG.S = 0ABC8E4D2A4AF585B83F1AE55E70F56771B3796D2716C94DA2D862A77331D3A8402C33B17E3401D80C08A01F0BDFDD6D
2,990,279 UART: Caliptra RT
2,990,532 UART: [state] CFI Enabled
3,098,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,037 UART: [rt]cmd =0x46505652, len=4
3,129,697 UART: [rt] FIPS Version
3,130,912 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,838 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,859 UART: [ldev] ++
1,209,027 UART: [ldev] CDI.KEYID = 6
1,209,391 UART: [ldev] SUBJECT.KEYID = 5
1,209,818 UART: [ldev] AUTHORITY.KEYID = 7
1,210,281 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,241,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,825 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,770 >>> mbox cmd response: success
2,772,770 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,829 UART: [afmc] ++
2,773,997 UART: [afmc] CDI.KEYID = 6
2,774,360 UART: [afmc] SUBJECT.KEYID = 7
2,774,786 UART: [afmc] AUTHORITY.KEYID = 5
2,810,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,816 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,404 UART: [afmc] --
2,854,512 UART: [cold-reset] --
2,855,458 UART: [state] Locking Datavault
2,856,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,289 UART: [state] Locking ICCM
2,857,709 UART: [exit] Launching FMC @ 0x40000130
2,863,038 UART:
2,863,054 UART: Running Caliptra FMC ...
2,863,462 UART:
2,863,605 UART: [state] CFI Enabled
2,874,258 UART: [fht] FMC Alias Private Key: 7
2,982,739 UART: [art] Extend RT PCRs Done
2,983,167 UART: [art] Lock RT PCRs Done
2,984,689 UART: [art] Populate DV Done
2,992,816 UART: [fht] FMC Alias Private Key: 7
2,993,790 UART: [art] Derive CDI
2,994,070 UART: [art] Store in in slot 0x4
3,079,327 UART: [art] Derive Key Pair
3,079,687 UART: [art] Store priv key in slot 0x5
3,093,053 UART: [art] Derive Key Pair - Done
3,107,812 UART: [art] Signing Cert with AUTHO
3,108,292 UART: RITY.KEYID = 7
3,124,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,081 UART: [art] PUB.X = 7F4B48B28A98E4185086A5D4B1B69CCA8258553D47205B6FBE2F47E36EAFD85BF93BA54796B18EC913396D51F1CC2D9E
3,131,861 UART: [art] PUB.Y = C1DF26EC928EC4A81D26128D28DBA52E7D76E3E65705D71F79E8A96385A4059AADFD069DF59814EC6B4A20EA6542F373
3,138,812 UART: [art] SIG.R = A5B5AA0BB864B90B635B9A9CC04DE70AF1E9E5662DF6C2F04264595AD6CA7513F737D596590D5283BA8CA56438AA72FE
3,145,582 UART: [art] SIG.S = D7CEC10B7DBBEEBB4C990861A5677232DB56AD64368A1838D8186EFC309B74891AAB61334DD870745CFDF97A7F083110
3,168,710 UART: Caliptra RT
3,169,055 UART: [state] CFI Enabled
3,276,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,021 UART: [rt]cmd =0x46505652, len=4
3,307,681 UART: [rt] FIPS Version
3,308,670 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,399 ready_for_fw is high
1,056,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,860 >>> mbox cmd response: success
2,621,860 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,428 UART:
2,683,444 UART: Running Caliptra FMC ...
2,683,852 UART:
2,683,995 UART: [state] CFI Enabled
2,694,300 UART: [fht] FMC Alias Private Key: 7
2,801,861 UART: [art] Extend RT PCRs Done
2,802,289 UART: [art] Lock RT PCRs Done
2,803,711 UART: [art] Populate DV Done
2,812,016 UART: [fht] FMC Alias Private Key: 7
2,813,096 UART: [art] Derive CDI
2,813,376 UART: [art] Store in in slot 0x4
2,898,919 UART: [art] Derive Key Pair
2,899,279 UART: [art] Store priv key in slot 0x5
2,913,055 UART: [art] Derive Key Pair - Done
2,928,199 UART: [art] Signing Cert with AUTHO
2,928,679 UART: RITY.KEYID = 7
2,943,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,224 UART: [art] PUB.X = 594D044E7C041659E1D8CBB28DB34C8361F1E43861E178649D1C19E9CFF83951D04115E19C376B373B718ADDBFA7C434
2,950,990 UART: [art] PUB.Y = CB5B612B4C9F00571B959CAA036D57203426B08AD88CBE28FEB3D7EDC6BD1B2333F3E382B9E960B877E84326510028BD
2,957,901 UART: [art] SIG.R = D1BA97B2B346960A5D706B14EF64DE2669D9EC4184BA529E9460BE548838EA85FE99B8646D9BDFA3A06126FD63AAD802
2,964,675 UART: [art] SIG.S = A2B47E12BEE6F12D3C4D85B02AB4B70A99A718527D11DE8CD68A54F930FCB14A7674AA0F613E4C3F72B692E1B487BB3C
2,988,418 UART: Caliptra RT
2,988,763 UART: [state] CFI Enabled
3,097,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,685 UART: [rt]cmd =0x46505652, len=4
3,128,345 UART: [rt] FIPS Version
3,129,576 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
889,921 UART: [kat] SHA2-256
891,859 UART: [kat] SHA2-384
894,544 UART: [kat] SHA2-512-ACC
896,445 UART: [kat] ECC-384
902,146 UART: [kat] HMAC-384Kdf
906,892 UART: [kat] LMS
1,475,088 UART: [kat] --
1,475,689 UART: [cold-reset] ++
1,476,015 UART: [fht] Storing FHT @ 0x50003400
1,479,014 UART: [idev] ++
1,479,182 UART: [idev] CDI.KEYID = 6
1,479,542 UART: [idev] SUBJECT.KEYID = 7
1,479,966 UART: [idev] UDS.KEYID = 0
1,480,311 ready_for_fw is high
1,480,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,824 UART: [idev] Erasing UDS.KEYID = 0
1,504,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,074 UART: [idev] --
1,514,039 UART: [ldev] ++
1,514,207 UART: [ldev] CDI.KEYID = 6
1,514,570 UART: [ldev] SUBJECT.KEYID = 5
1,514,996 UART: [ldev] AUTHORITY.KEYID = 7
1,515,459 UART: [ldev] FE.KEYID = 1
1,520,395 UART: [ldev] Erasing FE.KEYID = 1
1,545,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,440 UART: [ldev] --
1,584,953 UART: [fwproc] Waiting for Commands...
1,585,708 UART: [fwproc] Received command 0x46574c44
1,586,499 UART: [fwproc] Received Image of size 114332 bytes
2,884,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,742 >>> mbox cmd response: success
3,076,742 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,077,964 UART: [afmc] ++
3,078,132 UART: [afmc] CDI.KEYID = 6
3,078,494 UART: [afmc] SUBJECT.KEYID = 7
3,078,919 UART: [afmc] AUTHORITY.KEYID = 5
3,114,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,769 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,459 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,506 UART: [afmc] --
3,157,470 UART: [cold-reset] --
3,158,342 UART: [state] Locking Datavault
3,159,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,187 UART: [state] Locking ICCM
3,160,855 UART: [exit] Launching FMC @ 0x40000130
3,166,184 UART:
3,166,200 UART: Running Caliptra FMC ...
3,166,608 UART:
3,166,662 UART: [state] CFI Enabled
3,177,059 UART: [fht] FMC Alias Private Key: 7
3,285,030 UART: [art] Extend RT PCRs Done
3,285,458 UART: [art] Lock RT PCRs Done
3,286,694 UART: [art] Populate DV Done
3,294,895 UART: [fht] FMC Alias Private Key: 7
3,296,005 UART: [art] Derive CDI
3,296,285 UART: [art] Store in in slot 0x4
3,382,136 UART: [art] Derive Key Pair
3,382,496 UART: [art] Store priv key in slot 0x5
3,395,576 UART: [art] Derive Key Pair - Done
3,410,614 UART: [art] Signing Cert with AUTHO
3,411,094 UART: RITY.KEYID = 7
3,426,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,937 UART: [art] PUB.X = CC14CB6AE2960E5FD49D1AA6696F5FB22B27A693D6DC351A4A2DCEC53AABF25C253594752910A9D2413CCCDE6538ED95
3,433,722 UART: [art] PUB.Y = F140C8605643E53DC8D9743E21ACCFEC0EA8B90CC05413BAFD8A107BD40BB95B5218F193921E2C51993D25F1D7C5377F
3,440,673 UART: [art] SIG.R = D5A028F50225173BD335F16C02045CD639FA2A9E969004CB87C0FC7D918E19092D385C5E19E22565C9EB27C0DFAF3F91
3,447,432 UART: [art] SIG.S = 28796F4C97E77719630A108C22512E7385CBE788E21369D966F5582031798B5E8414FC88530C7ABC98EF6388EEFD08D9
3,471,396 UART: Caliptra RT
3,471,649 UART: [state] CFI Enabled
3,579,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,684 UART: [rt]cmd =0x464d4352, len=4
3,617,611 >>> mbox cmd response data (524 bytes)
3,617,612 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,775 UART: [rt]cmd =0x43455252, len=4
3,657,551 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 ready_for_fw is high
1,362,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,668 >>> mbox cmd response: success
2,929,668 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,990,580 UART:
2,990,596 UART: Running Caliptra FMC ...
2,991,004 UART:
2,991,058 UART: [state] CFI Enabled
3,001,573 UART: [fht] FMC Alias Private Key: 7
3,109,944 UART: [art] Extend RT PCRs Done
3,110,372 UART: [art] Lock RT PCRs Done
3,111,954 UART: [art] Populate DV Done
3,120,177 UART: [fht] FMC Alias Private Key: 7
3,121,189 UART: [art] Derive CDI
3,121,469 UART: [art] Store in in slot 0x4
3,206,880 UART: [art] Derive Key Pair
3,207,240 UART: [art] Store priv key in slot 0x5
3,220,270 UART: [art] Derive Key Pair - Done
3,235,041 UART: [art] Signing Cert with AUTHO
3,235,521 UART: RITY.KEYID = 7
3,250,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,590 UART: [art] PUB.X = 76E626B5BE0F96962536669F72CE9D6E396463D426C6AF49439897BF4765188AE749C83BD6C978B89FFEFAA4F4646538
3,258,355 UART: [art] PUB.Y = 6B3EDCA6B3161A110B87D95AAC63598949F80889ED67C74FE72542F318CB1876720534F87C9A2F632318FFFFE6AFE00F
3,265,299 UART: [art] SIG.R = 0EC9BF26B9C3D67FEA6FC8C7C35C0C5183CC141ECDC45C15C4D794C96C3C2B8D84E159F9C2C04F89498CB97E0DE2F775
3,272,080 UART: [art] SIG.S = 64CC34816B89D46C61F7DA5E6875C13B2754271405643907D4A93A14562709CE44C6133389EC86F25033C60BAC0B075D
3,295,709 UART: Caliptra RT
3,295,962 UART: [state] CFI Enabled
3,404,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,344 UART: [rt]cmd =0x464d4352, len=4
3,442,559 >>> mbox cmd response data (524 bytes)
3,442,560 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,095 UART: [rt]cmd =0x43455252, len=4
3,483,135 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,752 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,255 UART: [idev] ++
1,480,423 UART: [idev] CDI.KEYID = 6
1,480,783 UART: [idev] SUBJECT.KEYID = 7
1,481,207 UART: [idev] UDS.KEYID = 0
1,481,552 ready_for_fw is high
1,481,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,121 UART: [idev] Erasing UDS.KEYID = 0
1,506,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,761 UART: [idev] --
1,515,642 UART: [ldev] ++
1,515,810 UART: [ldev] CDI.KEYID = 6
1,516,173 UART: [ldev] SUBJECT.KEYID = 5
1,516,599 UART: [ldev] AUTHORITY.KEYID = 7
1,517,062 UART: [ldev] FE.KEYID = 1
1,522,480 UART: [ldev] Erasing FE.KEYID = 1
1,548,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,107 UART: [ldev] --
1,587,430 UART: [fwproc] Waiting for Commands...
1,588,055 UART: [fwproc] Received command 0x46574c44
1,588,846 UART: [fwproc] Received Image of size 114332 bytes
2,885,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,567 >>> mbox cmd response: success
3,078,567 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,079,751 UART: [afmc] ++
3,079,919 UART: [afmc] CDI.KEYID = 6
3,080,281 UART: [afmc] SUBJECT.KEYID = 7
3,080,706 UART: [afmc] AUTHORITY.KEYID = 5
3,115,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,461 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,074 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,764 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,755 UART: [afmc] --
3,158,807 UART: [cold-reset] --
3,159,399 UART: [state] Locking Datavault
3,160,362 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,966 UART: [state] Locking ICCM
3,161,590 UART: [exit] Launching FMC @ 0x40000130
3,166,919 UART:
3,166,935 UART: Running Caliptra FMC ...
3,167,343 UART:
3,167,486 UART: [state] CFI Enabled
3,177,993 UART: [fht] FMC Alias Private Key: 7
3,286,112 UART: [art] Extend RT PCRs Done
3,286,540 UART: [art] Lock RT PCRs Done
3,287,910 UART: [art] Populate DV Done
3,296,491 UART: [fht] FMC Alias Private Key: 7
3,297,651 UART: [art] Derive CDI
3,297,931 UART: [art] Store in in slot 0x4
3,383,810 UART: [art] Derive Key Pair
3,384,170 UART: [art] Store priv key in slot 0x5
3,396,912 UART: [art] Derive Key Pair - Done
3,411,505 UART: [art] Signing Cert with AUTHO
3,411,985 UART: RITY.KEYID = 7
3,427,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,956 UART: [art] PUB.X = 41250C99127A7E8256734FC744D3D5C8F5EBB469223AE0EC7CF88C9523FC3B5F38435907E0461271D6B8F18712AF6CFC
3,434,722 UART: [art] PUB.Y = BDDDEE0617B4C4C2E36E3D3C718593092EF096C2C24D779308F0D0BD23920DEA953E2BF38E7FEB26B59F9C0EC262295B
3,441,671 UART: [art] SIG.R = DB47640D5EA8EDE199FA942186504AFDBDDC2BED913118C866148945D96965BC23D5843139BC7FDF8FF3211D59E1E7F0
3,448,448 UART: [art] SIG.S = B43AA85B756C01EA9EEC463F2F8498E054015F1A00B8A342606425A83AF02A696EBE4DBAE0AA35935B24AD3C93924C2F
3,471,927 UART: Caliptra RT
3,472,272 UART: [state] CFI Enabled
3,579,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,298 UART: [rt]cmd =0x464d4352, len=4
3,617,411 >>> mbox cmd response data (524 bytes)
3,617,412 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,021 UART: [rt]cmd =0x43455252, len=4
3,657,594 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 ready_for_fw is high
1,363,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,027 >>> mbox cmd response: success
2,930,027 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,992,027 UART:
2,992,043 UART: Running Caliptra FMC ...
2,992,451 UART:
2,992,594 UART: [state] CFI Enabled
3,003,477 UART: [fht] FMC Alias Private Key: 7
3,111,668 UART: [art] Extend RT PCRs Done
3,112,096 UART: [art] Lock RT PCRs Done
3,113,526 UART: [art] Populate DV Done
3,122,003 UART: [fht] FMC Alias Private Key: 7
3,123,159 UART: [art] Derive CDI
3,123,439 UART: [art] Store in in slot 0x4
3,209,094 UART: [art] Derive Key Pair
3,209,454 UART: [art] Store priv key in slot 0x5
3,222,870 UART: [art] Derive Key Pair - Done
3,237,798 UART: [art] Signing Cert with AUTHO
3,238,278 UART: RITY.KEYID = 7
3,253,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,553 UART: [art] PUB.X = BEDF5A646DDEDA7A9AABEE49F78050496201FD2F43A042EC72A9557E5154DAEB81D981447A88F91AB0EDF5AD9B18E49F
3,261,342 UART: [art] PUB.Y = F3F644ED383E92ADD8D70396E41753062170ADF03AC5F14F85AF7DA15F9C2C9AF3001F2E3FDB6DA65D9698606B178BF4
3,268,276 UART: [art] SIG.R = A89782914AE60F06D7F6E44FE84FF9E1470A518DC94B9C7E162C49DC356371AB8DA9497DF762BDF5E584AFD9D888763A
3,275,047 UART: [art] SIG.S = 22D5C7898B1F5D7C4D23F114722627FBC745FF99218ED8FF100C9A949D0246DA892BCCFBB122A93E5AC5C1847360A42E
3,298,882 UART: Caliptra RT
3,299,227 UART: [state] CFI Enabled
3,407,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,864 UART: [rt]cmd =0x464d4352, len=4
3,444,971 >>> mbox cmd response data (524 bytes)
3,444,972 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,385 UART: [rt]cmd =0x43455252, len=4
3,485,351 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
893,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,807 UART: [kat] ++
897,959 UART: [kat] sha1
902,219 UART: [kat] SHA2-256
904,159 UART: [kat] SHA2-384
906,914 UART: [kat] SHA2-512-ACC
908,815 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
922,914 UART: [kat] LMS
1,171,242 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,245 UART: [ldev] ++
1,210,413 UART: [ldev] CDI.KEYID = 6
1,210,776 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,217,069 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,282,904 UART: [fwproc] Recv command 0x46574c44
1,283,632 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,667 >>> mbox cmd response: success
2,773,667 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,774,877 UART: [afmc] ++
2,775,045 UART: [afmc] CDI.KEYID = 6
2,775,407 UART: [afmc] SUBJECT.KEYID = 7
2,775,832 UART: [afmc] AUTHORITY.KEYID = 5
2,810,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,751 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,094 UART: [afmc] --
2,854,200 UART: [cold-reset] --
2,855,180 UART: [state] Locking Datavault
2,856,241 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,845 UART: [state] Locking ICCM
2,857,353 UART: [exit] Launching FMC @ 0x40000130
2,862,682 UART:
2,862,698 UART: Running Caliptra FMC ...
2,863,106 UART:
2,863,160 UART: [state] CFI Enabled
2,873,427 UART: [fht] FMC Alias Private Key: 7
2,981,096 UART: [art] Extend RT PCRs Done
2,981,524 UART: [art] Lock RT PCRs Done
2,983,170 UART: [art] Populate DV Done
2,991,441 UART: [fht] FMC Alias Private Key: 7
2,992,409 UART: [art] Derive CDI
2,992,689 UART: [art] Store in in slot 0x4
3,078,154 UART: [art] Derive Key Pair
3,078,514 UART: [art] Store priv key in slot 0x5
3,091,386 UART: [art] Derive Key Pair - Done
3,106,103 UART: [art] Signing Cert with AUTHO
3,106,583 UART: RITY.KEYID = 7
3,121,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,570 UART: [art] PUB.X = C3D3ACDAC9CF09F74C0695B0EE9F3F22CEA4EDE0E7F14F03B4F94F0006A044693AC6D20EF90BDBF67A146E350D793D31
3,129,319 UART: [art] PUB.Y = C021F2A38DD5BC859F9985A157803B03CE24C8F3DD509F5C30B0D624BB1E42D915A5A053AE0540EFC1898AD2A67DFDCB
3,136,279 UART: [art] SIG.R = F07D6947C3D30039E3286F3E2C23FE2ABD39FD71F04325691D2F09F2DE6272820CE9A070FBA4EE4941A2CCF9B54DF70E
3,143,030 UART: [art] SIG.S = FC5F0A627773DD990AEFB3850261FB8C30DE70287FABD76E8807B4C24A6F197367B76CCBE89E5C1346FA5A7E1760FC7B
3,166,689 UART: Caliptra RT
3,166,942 UART: [state] CFI Enabled
3,274,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,678 UART: [rt]cmd =0x464d4352, len=4
3,312,045 >>> mbox cmd response data (524 bytes)
3,312,046 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,607 UART: [rt]cmd =0x43455252, len=4
3,352,192 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,648 >>> mbox cmd response: success
2,624,648 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,686,344 UART:
2,686,360 UART: Running Caliptra FMC ...
2,686,768 UART:
2,686,822 UART: [state] CFI Enabled
2,697,441 UART: [fht] FMC Alias Private Key: 7
2,805,644 UART: [art] Extend RT PCRs Done
2,806,072 UART: [art] Lock RT PCRs Done
2,807,504 UART: [art] Populate DV Done
2,815,837 UART: [fht] FMC Alias Private Key: 7
2,816,935 UART: [art] Derive CDI
2,817,215 UART: [art] Store in in slot 0x4
2,902,486 UART: [art] Derive Key Pair
2,902,846 UART: [art] Store priv key in slot 0x5
2,915,618 UART: [art] Derive Key Pair - Done
2,930,339 UART: [art] Signing Cert with AUTHO
2,930,819 UART: RITY.KEYID = 7
2,946,053 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,818 UART: [art] PUB.X = 7AC558A5776F1D284BE18C23331742FEA329A76B809BF7DD8F7CEFFBB51DDB38BE63A884878D0FBA7B12635440D5537B
2,953,597 UART: [art] PUB.Y = 6B4D7032166647BF363696F0BED34DF7B0D6BDF7D10C7BDFDF73A10044A260A4B086A8BA147C76FE0996C4C2A4BBB396
2,960,533 UART: [art] SIG.R = BEDBF9B179A3D4F61E49DAFEC8B5ACFBC3B085C5DEFCD9F9438EBF5106361DA18964DAB2DC872396BF3BA9DB20178A15
2,967,330 UART: [art] SIG.S = CD86CBA965EBA73C4E902077139E9CD4AA40771E6CE886382B75F8EEB65D66639664956C25CD97FCFFC08E1BFEB96A37
2,990,735 UART: Caliptra RT
2,990,988 UART: [state] CFI Enabled
3,098,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,346 UART: [rt]cmd =0x464d4352, len=4
3,136,581 >>> mbox cmd response data (524 bytes)
3,136,582 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,751 UART: [rt]cmd =0x43455252, len=4
3,176,348 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,602 UART: [kat] SHA2-256
904,542 UART: [kat] SHA2-384
907,289 UART: [kat] SHA2-512-ACC
909,190 UART: [kat] ECC-384
919,381 UART: [kat] HMAC-384Kdf
924,065 UART: [kat] LMS
1,172,393 UART: [kat] --
1,172,998 UART: [cold-reset] ++
1,173,398 UART: [fht] FHT @ 0x50003400
1,176,033 UART: [idev] ++
1,176,201 UART: [idev] CDI.KEYID = 6
1,176,561 UART: [idev] SUBJECT.KEYID = 7
1,176,985 UART: [idev] UDS.KEYID = 0
1,177,330 ready_for_fw is high
1,177,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,731 UART: [idev] Erasing UDS.KEYID = 0
1,202,000 UART: [idev] Sha1 KeyId Algorithm
1,210,604 UART: [idev] --
1,211,634 UART: [ldev] ++
1,211,802 UART: [ldev] CDI.KEYID = 6
1,212,165 UART: [ldev] SUBJECT.KEYID = 5
1,212,591 UART: [ldev] AUTHORITY.KEYID = 7
1,213,054 UART: [ldev] FE.KEYID = 1
1,218,182 UART: [ldev] Erasing FE.KEYID = 1
1,244,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,920 UART: [ldev] --
1,284,301 UART: [fwproc] Wait for Commands...
1,284,877 UART: [fwproc] Recv command 0x46574c44
1,285,605 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,554 >>> mbox cmd response: success
2,775,554 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,758 UART: [afmc] ++
2,776,926 UART: [afmc] CDI.KEYID = 6
2,777,288 UART: [afmc] SUBJECT.KEYID = 7
2,777,713 UART: [afmc] AUTHORITY.KEYID = 5
2,813,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,467 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,137 UART: [afmc] --
2,857,081 UART: [cold-reset] --
2,857,995 UART: [state] Locking Datavault
2,859,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,950 UART: [state] Locking ICCM
2,860,588 UART: [exit] Launching FMC @ 0x40000130
2,865,917 UART:
2,865,933 UART: Running Caliptra FMC ...
2,866,341 UART:
2,866,484 UART: [state] CFI Enabled
2,876,869 UART: [fht] FMC Alias Private Key: 7
2,985,332 UART: [art] Extend RT PCRs Done
2,985,760 UART: [art] Lock RT PCRs Done
2,987,224 UART: [art] Populate DV Done
2,995,353 UART: [fht] FMC Alias Private Key: 7
2,996,529 UART: [art] Derive CDI
2,996,809 UART: [art] Store in in slot 0x4
3,082,598 UART: [art] Derive Key Pair
3,082,958 UART: [art] Store priv key in slot 0x5
3,096,200 UART: [art] Derive Key Pair - Done
3,110,955 UART: [art] Signing Cert with AUTHO
3,111,435 UART: RITY.KEYID = 7
3,126,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,384 UART: [art] PUB.X = 5176092E9174018EDCEB8EA779172CF31437BB2DFD737DB7996FE86924D4C98686FB278BB029F3ED5685733587BB1C09
3,134,145 UART: [art] PUB.Y = CF3AD392DFFE667299B6AE0A9FBA154E42C01989AE5BC9D499D223E724BFF83783E3401EBE34C7A159B441160C3B4004
3,141,096 UART: [art] SIG.R = 9C823685790B651366DEF07D1F66F6B7BBBB186521AAFDF8519C81886EC7884A51C584D975FD1FEA334A05303F619A15
3,147,862 UART: [art] SIG.S = 48779823FB7A8C86D8D1CC2A368546E3B195589285B772743E579AA94DA2A59DE3DCA74DE92B13094A5C8852C29FEBC8
3,172,418 UART: Caliptra RT
3,172,763 UART: [state] CFI Enabled
3,280,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,384 UART: [rt]cmd =0x464d4352, len=4
3,317,201 >>> mbox cmd response data (524 bytes)
3,317,202 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,303 UART: [rt]cmd =0x43455252, len=4
3,356,931 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,204 >>> mbox cmd response: success
2,626,204 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,688,076 UART:
2,688,092 UART: Running Caliptra FMC ...
2,688,500 UART:
2,688,643 UART: [state] CFI Enabled
2,699,664 UART: [fht] FMC Alias Private Key: 7
2,807,547 UART: [art] Extend RT PCRs Done
2,807,975 UART: [art] Lock RT PCRs Done
2,809,573 UART: [art] Populate DV Done
2,817,664 UART: [fht] FMC Alias Private Key: 7
2,818,792 UART: [art] Derive CDI
2,819,072 UART: [art] Store in in slot 0x4
2,904,833 UART: [art] Derive Key Pair
2,905,193 UART: [art] Store priv key in slot 0x5
2,919,053 UART: [art] Derive Key Pair - Done
2,933,781 UART: [art] Signing Cert with AUTHO
2,934,261 UART: RITY.KEYID = 7
2,949,577 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,342 UART: [art] PUB.X = 511D5393A04E4FBAE2E036AAC5C7742222EC59C8E347AF3617C762FB7B0514E36D62F6F0E6AA67A2AD56069D31F94D9D
2,957,116 UART: [art] PUB.Y = 40B0BC02C0D85C9A8A1316053E5B92CA2212AF7959A8E8FB6CBC92148B330536E6D4F49B47782E1D4DF6764BBAC6FB70
2,964,067 UART: [art] SIG.R = 696415E32E0B0C23DEC59D757C54ECD18DC766F4B273E47864943B2AD0012E791807F4A357A25AEB57FF546AA9F0BFC0
2,970,833 UART: [art] SIG.S = 40A7A1B99FD3E6ABE0FA53116D9F059BAC5F52DB43C2617F5BF4F6BD9A4731470A129616932AFA465DC9A9A359F438E0
2,994,722 UART: Caliptra RT
2,995,067 UART: [state] CFI Enabled
3,103,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,556 UART: [rt]cmd =0x464d4352, len=4
3,141,601 >>> mbox cmd response data (524 bytes)
3,141,602 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,913 UART: [rt]cmd =0x43455252, len=4
3,181,901 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,174,293 ready_for_fw is high
1,174,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,087 UART: [idev] Sha1 KeyId Algorithm
1,207,069 UART: [idev] --
1,207,974 UART: [ldev] ++
1,208,142 UART: [ldev] CDI.KEYID = 6
1,208,506 UART: [ldev] SUBJECT.KEYID = 5
1,208,933 UART: [ldev] AUTHORITY.KEYID = 7
1,209,396 UART: [ldev] FE.KEYID = 1
1,214,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,804 UART: [ldev] --
1,280,206 UART: [fwproc] Wait for Commands...
1,280,895 UART: [fwproc] Recv command 0x46574c44
1,281,628 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,817 >>> mbox cmd response: success
2,772,817 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,914 UART: [afmc] ++
2,774,082 UART: [afmc] CDI.KEYID = 6
2,774,445 UART: [afmc] SUBJECT.KEYID = 7
2,774,871 UART: [afmc] AUTHORITY.KEYID = 5
2,810,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,591 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,310 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,325 UART: [afmc] --
2,854,279 UART: [cold-reset] --
2,855,099 UART: [state] Locking Datavault
2,856,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,764 UART: [state] Locking ICCM
2,857,296 UART: [exit] Launching FMC @ 0x40000130
2,862,625 UART:
2,862,641 UART: Running Caliptra FMC ...
2,863,049 UART:
2,863,103 UART: [state] CFI Enabled
2,873,906 UART: [fht] FMC Alias Private Key: 7
2,981,673 UART: [art] Extend RT PCRs Done
2,982,101 UART: [art] Lock RT PCRs Done
2,983,563 UART: [art] Populate DV Done
2,992,018 UART: [fht] FMC Alias Private Key: 7
2,992,948 UART: [art] Derive CDI
2,993,228 UART: [art] Store in in slot 0x4
3,078,939 UART: [art] Derive Key Pair
3,079,299 UART: [art] Store priv key in slot 0x5
3,092,357 UART: [art] Derive Key Pair - Done
3,107,072 UART: [art] Signing Cert with AUTHO
3,107,552 UART: RITY.KEYID = 7
3,122,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,461 UART: [art] PUB.X = 978B40E50DE4B3450B062C17B8EB2B9E83D9529480E27D6A73661E3AF8974062D67D1E93E2EED878E20E41F4BAD0B4EC
3,130,227 UART: [art] PUB.Y = 9006E836FD3CFE1D7C0707164CB92F939CDCCC471CD947636819BA109740446B49F3047EA6DAD10BB7AAF789EBBDBE1F
3,137,178 UART: [art] SIG.R = C6E33580B5439A131C422CF7B5A83B4BA18CA02DB9731470CB57F7174BE2974C91C98E33D3C6132F05E630500FAD0A8D
3,143,943 UART: [art] SIG.S = 2C08B64B7DDC616C062AC56A4C5EA30CC029F3CBE301D73E4CDBF4A4F8753CCF50F0FF1374308FBE852CBE1F614C6354
3,168,590 UART: Caliptra RT
3,168,843 UART: [state] CFI Enabled
3,276,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,952 UART: [rt]cmd =0x464d4352, len=4
3,314,135 >>> mbox cmd response data (524 bytes)
3,314,136 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,437 UART: [rt]cmd =0x43455252, len=4
3,354,473 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,412 ready_for_fw is high
1,056,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,255 >>> mbox cmd response: success
2,623,255 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,685,183 UART:
2,685,199 UART: Running Caliptra FMC ...
2,685,607 UART:
2,685,661 UART: [state] CFI Enabled
2,695,720 UART: [fht] FMC Alias Private Key: 7
2,803,993 UART: [art] Extend RT PCRs Done
2,804,421 UART: [art] Lock RT PCRs Done
2,806,217 UART: [art] Populate DV Done
2,814,360 UART: [fht] FMC Alias Private Key: 7
2,815,292 UART: [art] Derive CDI
2,815,572 UART: [art] Store in in slot 0x4
2,901,237 UART: [art] Derive Key Pair
2,901,597 UART: [art] Store priv key in slot 0x5
2,915,243 UART: [art] Derive Key Pair - Done
2,930,303 UART: [art] Signing Cert with AUTHO
2,930,783 UART: RITY.KEYID = 7
2,946,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,888 UART: [art] PUB.X = 7EBE8F9401CBF14048B7F5D7ADF147F8F066DEDC01265AE626281995E71DD696986CF3F6DA26BC13715C00273338882D
2,953,634 UART: [art] PUB.Y = 90699DC5311ADBECE89E8D31047BF376F7C92401C84C4D91A0F25329D9CCDEE34FC5E9B95B6AF1F39C416073DCA1ADDE
2,960,598 UART: [art] SIG.R = 5A5EB140A3CAF32D3B942645210E540BBBCC1D1A8667637BE80983500A56CFB732C3D62C16F0AC52A3D2DCB3208495E0
2,967,364 UART: [art] SIG.S = 1B270E9BD2F75F6A2DFC9D277EAA54564107F22454BDF3169D4F1DACE56080237A7F17821A04BEBF8435C71FB079EEF3
2,991,396 UART: Caliptra RT
2,991,649 UART: [state] CFI Enabled
3,099,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,706 UART: [rt]cmd =0x464d4352, len=4
3,136,755 >>> mbox cmd response data (524 bytes)
3,136,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,969 UART: [rt]cmd =0x43455252, len=4
3,176,953 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,712 UART: [idev] Erasing UDS.KEYID = 0
1,198,636 UART: [idev] Sha1 KeyId Algorithm
1,207,378 UART: [idev] --
1,208,431 UART: [ldev] ++
1,208,599 UART: [ldev] CDI.KEYID = 6
1,208,963 UART: [ldev] SUBJECT.KEYID = 5
1,209,390 UART: [ldev] AUTHORITY.KEYID = 7
1,209,853 UART: [ldev] FE.KEYID = 1
1,214,997 UART: [ldev] Erasing FE.KEYID = 1
1,241,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,051 UART: [ldev] --
1,280,361 UART: [fwproc] Wait for Commands...
1,281,176 UART: [fwproc] Recv command 0x46574c44
1,281,909 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,094 >>> mbox cmd response: success
2,772,094 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,163 UART: [afmc] ++
2,773,331 UART: [afmc] CDI.KEYID = 6
2,773,694 UART: [afmc] SUBJECT.KEYID = 7
2,774,120 UART: [afmc] AUTHORITY.KEYID = 5
2,810,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,740 UART: [afmc] --
2,853,682 UART: [cold-reset] --
2,854,610 UART: [state] Locking Datavault
2,855,967 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,571 UART: [state] Locking ICCM
2,857,127 UART: [exit] Launching FMC @ 0x40000130
2,862,456 UART:
2,862,472 UART: Running Caliptra FMC ...
2,862,880 UART:
2,863,023 UART: [state] CFI Enabled
2,873,814 UART: [fht] FMC Alias Private Key: 7
2,981,765 UART: [art] Extend RT PCRs Done
2,982,193 UART: [art] Lock RT PCRs Done
2,983,613 UART: [art] Populate DV Done
2,991,864 UART: [fht] FMC Alias Private Key: 7
2,992,870 UART: [art] Derive CDI
2,993,150 UART: [art] Store in in slot 0x4
3,078,965 UART: [art] Derive Key Pair
3,079,325 UART: [art] Store priv key in slot 0x5
3,092,729 UART: [art] Derive Key Pair - Done
3,107,615 UART: [art] Signing Cert with AUTHO
3,108,095 UART: RITY.KEYID = 7
3,123,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,072 UART: [art] PUB.X = ED56F777B9C24D8D366768976B3D1A0A49D9D7D6F43273DF1B6F04952820816E144D4C1D0ACD216BFD2DE66E30BE9B12
3,130,841 UART: [art] PUB.Y = C9CA0F6B84765BC71F4E5B244F5BF1A25853CADDA2F16DFEA12E0410AFF3290D9B26B3840E1A3982F440CE36173508E2
3,137,788 UART: [art] SIG.R = 053BA416696D6DAD4DF6DEEE1603B3A0A2C398C4F370FDB61507FA286E014019809C7F7D2D473AF2607FE790513610AA
3,144,552 UART: [art] SIG.S = E9813DC364F5A6CAE2F9B7E500F0C6CC7EC20807246ECDAC3A9704478CB063A5A6071930A85918F950B6E61FA73FF55C
3,168,227 UART: Caliptra RT
3,168,572 UART: [state] CFI Enabled
3,277,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,751 UART: [rt]cmd =0x464d4352, len=4
3,314,900 >>> mbox cmd response data (524 bytes)
3,314,901 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,286 UART: [rt]cmd =0x43455252, len=4
3,355,220 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,535 ready_for_fw is high
1,056,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,064 >>> mbox cmd response: success
2,625,064 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,687,592 UART:
2,687,608 UART: Running Caliptra FMC ...
2,688,016 UART:
2,688,159 UART: [state] CFI Enabled
2,698,692 UART: [fht] FMC Alias Private Key: 7
2,805,971 UART: [art] Extend RT PCRs Done
2,806,399 UART: [art] Lock RT PCRs Done
2,807,847 UART: [art] Populate DV Done
2,815,840 UART: [fht] FMC Alias Private Key: 7
2,816,932 UART: [art] Derive CDI
2,817,212 UART: [art] Store in in slot 0x4
2,902,685 UART: [art] Derive Key Pair
2,903,045 UART: [art] Store priv key in slot 0x5
2,916,669 UART: [art] Derive Key Pair - Done
2,931,196 UART: [art] Signing Cert with AUTHO
2,931,676 UART: RITY.KEYID = 7
2,946,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,729 UART: [art] PUB.X = B6BAAFC6F34CDE2FDB809EB660E364DA7F79D443921944231AADA9369E62B7B93133FA12EE2A0B8F14AD325B61B8D0F6
2,954,514 UART: [art] PUB.Y = 61D206167EE85129CE86D0138561303655DAF87B43CEC771A1207506A74174A11CD1DFAD624A2B29C80A5094BA0364AA
2,961,450 UART: [art] SIG.R = 1239CB26E9FF4A959C9F6648ADD7527A762264D61339509ADCFCDFBB4D44BD91D3F188F737681E7D5F7CF411083E4CD6
2,968,227 UART: [art] SIG.S = 97253B80EC30A2393AB7DCD69C5C902125EEAEF48436BFA8A8943CFE43999BE69B9FB7009C498B7762CADCB06F002492
2,992,440 UART: Caliptra RT
2,992,785 UART: [state] CFI Enabled
3,101,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,734 UART: [rt]cmd =0x464d4352, len=4
3,138,843 >>> mbox cmd response data (524 bytes)
3,138,844 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,359 UART: [rt]cmd =0x43455252, len=4
3,179,259 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,829 UART: [kat] SHA2-256
881,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,875 UART: [kat] ++
886,027 UART: [kat] sha1
890,135 UART: [kat] SHA2-256
892,073 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
901,944 UART: [kat] HMAC-384Kdf
906,312 UART: [kat] LMS
1,474,508 UART: [kat] --
1,475,411 UART: [cold-reset] ++
1,475,925 UART: [fht] Storing FHT @ 0x50003400
1,478,542 UART: [idev] ++
1,478,710 UART: [idev] CDI.KEYID = 6
1,479,070 UART: [idev] SUBJECT.KEYID = 7
1,479,494 UART: [idev] UDS.KEYID = 0
1,487,558 UART: [idev] Erasing UDS.KEYID = 0
1,503,934 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,337 UART: [idev] CSR upload requested
1,514,183 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,524,810 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,530,517 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,536,399 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,542,104 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,550,524 UART: [idev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
1,600,672 UART: [idev] CSR uploaded
1,603,053 ready_for_fw is high
1,603,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,603,224 UART: [idev] --
1,604,069 UART: [ldev] ++
1,604,237 UART: [ldev] CDI.KEYID = 6
1,604,600 UART: [ldev] SUBJECT.KEYID = 5
1,605,026 UART: [ldev] AUTHORITY.KEYID = 7
1,605,489 UART: [ldev] FE.KEYID = 1
1,610,475 UART: [ldev] Erasing FE.KEYID = 1
1,635,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,649,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,654,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,660,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,666,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,673,690 UART: [ldev] --
1,675,173 UART: [fwproc] Waiting for Commands...
1,675,792 UART: [fwproc] Received command 0x46574c44
1,676,583 UART: [fwproc] Received Image of size 114332 bytes
2,974,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,002,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,031,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,167,464 >>> mbox cmd response: success
3,167,464 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,168,480 UART: [afmc] ++
3,168,648 UART: [afmc] CDI.KEYID = 6
3,169,010 UART: [afmc] SUBJECT.KEYID = 7
3,169,435 UART: [afmc] AUTHORITY.KEYID = 5
3,204,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,220,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,221,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,227,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,233,335 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,239,025 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,247,076 UART: [afmc] --
3,248,166 UART: [cold-reset] --
3,249,016 UART: [state] Locking Datavault
3,250,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,250,627 UART: [state] Locking ICCM
3,251,219 UART: [exit] Launching FMC @ 0x40000130
3,256,548 UART:
3,256,564 UART: Running Caliptra FMC ...
3,256,972 UART:
3,257,026 UART: [state] CFI Enabled
3,267,589 UART: [fht] FMC Alias Private Key: 7
3,376,416 UART: [art] Extend RT PCRs Done
3,376,844 UART: [art] Lock RT PCRs Done
3,378,412 UART: [art] Populate DV Done
3,386,525 UART: [fht] FMC Alias Private Key: 7
3,387,489 UART: [art] Derive CDI
3,387,769 UART: [art] Store in in slot 0x4
3,473,840 UART: [art] Derive Key Pair
3,474,200 UART: [art] Store priv key in slot 0x5
3,487,462 UART: [art] Derive Key Pair - Done
3,502,382 UART: [art] Signing Cert with AUTHO
3,502,862 UART: RITY.KEYID = 7
3,518,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,785 UART: [art] PUB.X = 45CA534D44AAC55216DC4E1CF3C9D84E94098AB26C44632AA30706DCE35B74BC8B2874646B25D0B56AE75B90528133A3
3,525,550 UART: [art] PUB.Y = CE008251C580BF5F10EC5A24B32BD156BC0E6ED5229DC598724982157F5DB6BB847B3C965359C7A4DF08537B18F9D2C1
3,532,478 UART: [art] SIG.R = C0CCA335C45EFFB0FA940ED22EDA2776BA6C2CC656C9F866F9D659DF09996ED94A83F915276A81FC5F699D39742C9851
3,539,254 UART: [art] SIG.S = C33C955A6DB6192EEF8358EF661576E3FE1F76D8F46632B511529655B9C00FC69995A58A74ADC84EA3D62B37A1FDDF38
3,562,820 UART: Caliptra RT
3,563,073 UART: [state] CFI Enabled
3,671,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,337 UART: [rt]cmd =0x49444352, len=4
3,703,778 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,700 ready_for_fw is high
1,411,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,943,583 >>> mbox cmd response: success
2,943,583 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,006,083 UART:
3,006,099 UART: Running Caliptra FMC ...
3,006,507 UART:
3,006,561 UART: [state] CFI Enabled
3,017,238 UART: [fht] FMC Alias Private Key: 7
3,124,899 UART: [art] Extend RT PCRs Done
3,125,327 UART: [art] Lock RT PCRs Done
3,126,977 UART: [art] Populate DV Done
3,135,148 UART: [fht] FMC Alias Private Key: 7
3,136,240 UART: [art] Derive CDI
3,136,520 UART: [art] Store in in slot 0x4
3,222,071 UART: [art] Derive Key Pair
3,222,431 UART: [art] Store priv key in slot 0x5
3,235,299 UART: [art] Derive Key Pair - Done
3,250,041 UART: [art] Signing Cert with AUTHO
3,250,521 UART: RITY.KEYID = 7
3,265,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,490 UART: [art] PUB.X = FFDA8F97C9A833A766F3D6CFF47CF1FEEA85FF1D64911C821B34D12365031707AF8141A22B1049F3C11989C3B80B1B45
3,273,259 UART: [art] PUB.Y = 9B879A84957088BC150BBC5FAA1D3BF5FB064FCF04C0257E8A2D760C0FC07A377E5B513C64652108F40722AEA62C2E02
3,280,193 UART: [art] SIG.R = C161FB83387C709E36635E92C817BB17D9A22A46405E31F3E485398E6516F11A9427D6A977D45E51C0681F31C93A7A5F
3,286,957 UART: [art] SIG.S = C051012CD50125DE8D7BA5F92DC88954695503BAC01E314F20568E4CC3B8AC470C30188B6F9ABCC016F877922572B306
3,310,591 UART: Caliptra RT
3,310,844 UART: [state] CFI Enabled
3,418,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,678 UART: [rt]cmd =0x49444352, len=4
3,450,191 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,766 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,288 UART: [idev] CSR upload requested
1,516,134 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,733 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,440 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,322 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,027 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,447 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,602,595 UART: [idev] CSR uploaded
1,604,976 ready_for_fw is high
1,604,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,605,147 UART: [idev] --
1,606,124 UART: [ldev] ++
1,606,292 UART: [ldev] CDI.KEYID = 6
1,606,655 UART: [ldev] SUBJECT.KEYID = 5
1,607,081 UART: [ldev] AUTHORITY.KEYID = 7
1,607,544 UART: [ldev] FE.KEYID = 1
1,612,972 UART: [ldev] Erasing FE.KEYID = 1
1,638,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,664,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,993 UART: [ldev] --
1,678,410 UART: [fwproc] Waiting for Commands...
1,679,261 UART: [fwproc] Received command 0x46574c44
1,680,052 UART: [fwproc] Received Image of size 114332 bytes
2,978,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,005,292 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,034,644 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,170,603 >>> mbox cmd response: success
3,170,603 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,171,643 UART: [afmc] ++
3,171,811 UART: [afmc] CDI.KEYID = 6
3,172,173 UART: [afmc] SUBJECT.KEYID = 7
3,172,598 UART: [afmc] AUTHORITY.KEYID = 5
3,207,881 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,224,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,224,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,230,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,236,448 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,242,138 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,250,113 UART: [afmc] --
3,251,013 UART: [cold-reset] --
3,252,141 UART: [state] Locking Datavault
3,253,298 UART: [state] Locking PCR0, PCR1 and PCR31
3,253,902 UART: [state] Locking ICCM
3,254,342 UART: [exit] Launching FMC @ 0x40000130
3,259,671 UART:
3,259,687 UART: Running Caliptra FMC ...
3,260,095 UART:
3,260,238 UART: [state] CFI Enabled
3,270,871 UART: [fht] FMC Alias Private Key: 7
3,379,246 UART: [art] Extend RT PCRs Done
3,379,674 UART: [art] Lock RT PCRs Done
3,381,430 UART: [art] Populate DV Done
3,389,601 UART: [fht] FMC Alias Private Key: 7
3,390,701 UART: [art] Derive CDI
3,390,981 UART: [art] Store in in slot 0x4
3,476,520 UART: [art] Derive Key Pair
3,476,880 UART: [art] Store priv key in slot 0x5
3,490,472 UART: [art] Derive Key Pair - Done
3,505,405 UART: [art] Signing Cert with AUTHO
3,505,885 UART: RITY.KEYID = 7
3,521,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,522,000 UART: [art] PUB.X = C1A1FA6C211A1F31CDC6BD40F761D0A8D9532B70093CFA8D1C8A0F1CD85CE8CB55AC7E81CF076C78A27364E59B39FD48
3,528,781 UART: [art] PUB.Y = 04EF6C290EC9D74C0478F9F5A63B95BB90B13E197D0873FE552D05115EA3D8302597102518C05DB014FAC35121E4E845
3,535,714 UART: [art] SIG.R = F42411DAF43A444EC11A3E7B9AAD755C601F21063E3DB5BEB99DCD6CF683AECA54D051C76078363EE7B45318BEDA6EFB
3,542,503 UART: [art] SIG.S = BD16156E1B00AE96DF076A5FFC1787CCD57A0AC7A20B31FB0A8C42C42C2C04EE35BA7EAC9E9DE62088A09A91FDC4B50A
3,566,514 UART: Caliptra RT
3,566,859 UART: [state] CFI Enabled
3,675,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,337 UART: [rt]cmd =0x49444352, len=4
3,707,726 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,412,223 ready_for_fw is high
1,412,223 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,944,510 >>> mbox cmd response: success
2,944,510 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,005,934 UART:
3,005,950 UART: Running Caliptra FMC ...
3,006,358 UART:
3,006,501 UART: [state] CFI Enabled
3,017,416 UART: [fht] FMC Alias Private Key: 7
3,124,871 UART: [art] Extend RT PCRs Done
3,125,299 UART: [art] Lock RT PCRs Done
3,126,683 UART: [art] Populate DV Done
3,134,780 UART: [fht] FMC Alias Private Key: 7
3,135,722 UART: [art] Derive CDI
3,136,002 UART: [art] Store in in slot 0x4
3,221,593 UART: [art] Derive Key Pair
3,221,953 UART: [art] Store priv key in slot 0x5
3,235,135 UART: [art] Derive Key Pair - Done
3,249,842 UART: [art] Signing Cert with AUTHO
3,250,322 UART: RITY.KEYID = 7
3,265,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,447 UART: [art] PUB.X = 128F002538104E0E3A547962FB44BAD58E472F9DB7AB3AAA443EDD06D078D98040E11D2DE9DA4CAEA4987A30A7FF78B7
3,273,203 UART: [art] PUB.Y = 6BE0F5D34337164825005A34F67CA2539C06856424E63112BA952F7E09E517142AB7A07E683EED942B8EE3900A43047D
3,280,111 UART: [art] SIG.R = 025BF8CF1F76456DEE840ABAD424747EB60E392A76B835F8955C6C2E0DF46A529FC6E69AB63F49C3F36B958C5F72F72F
3,286,881 UART: [art] SIG.S = 64C6C4ACCCF32E406A59896DC3C243AB6BBCF132082E65FC7214863445B8B530ACDB28F8A2E17F1C3156D550B7154D64
3,310,533 UART: Caliptra RT
3,310,878 UART: [state] CFI Enabled
3,418,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,740 UART: [rt]cmd =0x49444352, len=4
3,451,147 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
917,700 UART: [kat] HMAC-384Kdf
922,358 UART: [kat] LMS
1,170,686 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,184,538 UART: [idev] Erasing UDS.KEYID = 0
1,201,817 UART: [idev] Sha1 KeyId Algorithm
1,210,117 UART: [idev] CSR upload begun
1,211,898 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,232 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,939 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,821 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,526 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,946 UART: [idev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
1,298,094 UART: [idev] CSR uploaded
1,300,473 ready_for_fw is high
1,300,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,644 UART: [idev] --
1,301,624 UART: [ldev] ++
1,301,792 UART: [ldev] CDI.KEYID = 6
1,302,155 UART: [ldev] SUBJECT.KEYID = 5
1,302,581 UART: [ldev] AUTHORITY.KEYID = 7
1,303,044 UART: [ldev] FE.KEYID = 1
1,308,118 UART: [ldev] Erasing FE.KEYID = 1
1,333,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,608 UART: [ldev] --
1,373,021 UART: [fwproc] Wait for Commands...
1,373,633 UART: [fwproc] Recv command 0x46574c44
1,374,361 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,998 >>> mbox cmd response: success
2,864,998 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,068 UART: [afmc] ++
2,866,236 UART: [afmc] CDI.KEYID = 6
2,866,598 UART: [afmc] SUBJECT.KEYID = 7
2,867,023 UART: [afmc] AUTHORITY.KEYID = 5
2,902,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,363 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,109 UART: [afmc] --
2,946,041 UART: [cold-reset] --
2,946,935 UART: [state] Locking Datavault
2,948,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,726 UART: [state] Locking ICCM
2,949,304 UART: [exit] Launching FMC @ 0x40000130
2,954,633 UART:
2,954,649 UART: Running Caliptra FMC ...
2,955,057 UART:
2,955,111 UART: [state] CFI Enabled
2,965,514 UART: [fht] FMC Alias Private Key: 7
3,073,423 UART: [art] Extend RT PCRs Done
3,073,851 UART: [art] Lock RT PCRs Done
3,075,585 UART: [art] Populate DV Done
3,083,808 UART: [fht] FMC Alias Private Key: 7
3,084,906 UART: [art] Derive CDI
3,085,186 UART: [art] Store in in slot 0x4
3,170,305 UART: [art] Derive Key Pair
3,170,665 UART: [art] Store priv key in slot 0x5
3,183,461 UART: [art] Derive Key Pair - Done
3,198,505 UART: [art] Signing Cert with AUTHO
3,198,985 UART: RITY.KEYID = 7
3,214,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,980 UART: [art] PUB.X = FA07DC0E1B3A6ADACF74F27D657D17860110B4C0846688E4F9473D8CE68B03189BAF5A48459B4C21D789ED82A889D385
3,221,744 UART: [art] PUB.Y = 63401AC4C9EB16F061A76F3421F2AB1689FFE81BBEC98DCF52175E8C82801A74FB9214CD95016B52355B380C44CE56BB
3,228,696 UART: [art] SIG.R = 0DE30810737B21D6E4010F61D2DD232A9CFBA9FE3F6F142B9D5FDB34F461378EBFC541F2642602167E5E9C4EC5FC7158
3,235,461 UART: [art] SIG.S = AB9DE93E63EE6999D8EAF874A32CA7AAAED81AC2C344B51560F112B0F8993E6B9BCEC34278E6EE6730072F77D3862082
3,259,311 UART: Caliptra RT
3,259,564 UART: [state] CFI Enabled
3,367,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,989 UART: [rt]cmd =0x49444352, len=4
3,399,260 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,312 ready_for_fw is high
1,109,312 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,892 >>> mbox cmd response: success
2,642,892 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,705,060 UART:
2,705,076 UART: Running Caliptra FMC ...
2,705,484 UART:
2,705,538 UART: [state] CFI Enabled
2,715,577 UART: [fht] FMC Alias Private Key: 7
2,824,076 UART: [art] Extend RT PCRs Done
2,824,504 UART: [art] Lock RT PCRs Done
2,826,006 UART: [art] Populate DV Done
2,834,233 UART: [fht] FMC Alias Private Key: 7
2,835,393 UART: [art] Derive CDI
2,835,673 UART: [art] Store in in slot 0x4
2,921,432 UART: [art] Derive Key Pair
2,921,792 UART: [art] Store priv key in slot 0x5
2,935,162 UART: [art] Derive Key Pair - Done
2,949,620 UART: [art] Signing Cert with AUTHO
2,950,100 UART: RITY.KEYID = 7
2,965,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,791 UART: [art] PUB.X = 4D2A3FAFD4BF84FF5E31402DFEB179202028D588CE64A8A88107A87F81DA6B6455F3B1A8ED0202F8EFF6EAB152603E89
2,972,566 UART: [art] PUB.Y = 8BA9FBC5A39201827B80ADDBED61CCCAA7CB012721096C6A5EC320843527578DDA4A2011AEC8015FCFE4431B22822997
2,979,514 UART: [art] SIG.R = 10765CC8D5FF1F21880538DB512A05A325D09CE9CE4A8593E756E66D1F7C9677349F496D82B7F31277A9D05F7FA23200
2,986,254 UART: [art] SIG.S = FFACB20569507974B73038010B90E225D62FC1C26D81CCFC55D4A161C03C6D9A289B629CFC4622218D3DA16EB0142883
3,009,726 UART: Caliptra RT
3,009,979 UART: [state] CFI Enabled
3,117,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,002 UART: [rt]cmd =0x49444352, len=4
3,149,153 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,546 UART: [kat] SHA2-256
904,486 UART: [kat] SHA2-384
907,353 UART: [kat] SHA2-512-ACC
909,254 UART: [kat] ECC-384
919,123 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,926 UART: [cold-reset] ++
1,173,298 UART: [fht] FHT @ 0x50003400
1,176,109 UART: [idev] ++
1,176,277 UART: [idev] CDI.KEYID = 6
1,176,637 UART: [idev] SUBJECT.KEYID = 7
1,177,061 UART: [idev] UDS.KEYID = 0
1,185,097 UART: [idev] Erasing UDS.KEYID = 0
1,201,970 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] CSR upload begun
1,212,225 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,503 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,210 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,092 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,797 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,217 UART: [idev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
1,298,365 UART: [idev] CSR uploaded
1,300,744 ready_for_fw is high
1,300,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,915 UART: [idev] --
1,302,007 UART: [ldev] ++
1,302,175 UART: [ldev] CDI.KEYID = 6
1,302,538 UART: [ldev] SUBJECT.KEYID = 5
1,302,964 UART: [ldev] AUTHORITY.KEYID = 7
1,303,427 UART: [ldev] FE.KEYID = 1
1,308,871 UART: [ldev] Erasing FE.KEYID = 1
1,336,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,007 UART: [ldev] --
1,375,354 UART: [fwproc] Wait for Commands...
1,376,110 UART: [fwproc] Recv command 0x46574c44
1,376,838 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,866,405 >>> mbox cmd response: success
2,866,405 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,867,503 UART: [afmc] ++
2,867,671 UART: [afmc] CDI.KEYID = 6
2,868,033 UART: [afmc] SUBJECT.KEYID = 7
2,868,458 UART: [afmc] AUTHORITY.KEYID = 5
2,903,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,472 UART: [afmc] --
2,947,400 UART: [cold-reset] --
2,948,284 UART: [state] Locking Datavault
2,949,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,261 UART: [state] Locking ICCM
2,950,773 UART: [exit] Launching FMC @ 0x40000130
2,956,102 UART:
2,956,118 UART: Running Caliptra FMC ...
2,956,526 UART:
2,956,669 UART: [state] CFI Enabled
2,967,374 UART: [fht] FMC Alias Private Key: 7
3,075,529 UART: [art] Extend RT PCRs Done
3,075,957 UART: [art] Lock RT PCRs Done
3,077,563 UART: [art] Populate DV Done
3,085,642 UART: [fht] FMC Alias Private Key: 7
3,086,798 UART: [art] Derive CDI
3,087,078 UART: [art] Store in in slot 0x4
3,172,875 UART: [art] Derive Key Pair
3,173,235 UART: [art] Store priv key in slot 0x5
3,186,363 UART: [art] Derive Key Pair - Done
3,201,057 UART: [art] Signing Cert with AUTHO
3,201,537 UART: RITY.KEYID = 7
3,217,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,888 UART: [art] PUB.X = 35553C99ED6E61747BBACE1C185A913773BF47BA1F907C2403C95737D628BCA164DFC9BC6A0EF30139394AA6B98E79DF
3,224,659 UART: [art] PUB.Y = FC092F57DC6E8F707EA4F9E67773854F61EB13BABD61D5250B87D6320FB46CD91F42C4A939774E260ED880789D245E0E
3,231,600 UART: [art] SIG.R = A48D901E7CFB0C169263732F698ECE286448104D04002F54BA772912FC15A797CD4331ACC58D21007C7B6A68DDC90288
3,238,315 UART: [art] SIG.S = 3AD42A952360138F1E480EE6AB04C5A0DC7D341885CD3C74490B772123103807333B13E829B2419937F7EDA231B1AAED
3,261,576 UART: Caliptra RT
3,261,921 UART: [state] CFI Enabled
3,369,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,020 UART: [rt]cmd =0x49444352, len=4
3,401,261 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,511 ready_for_fw is high
1,109,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,983 >>> mbox cmd response: success
2,644,983 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,707,097 UART:
2,707,113 UART: Running Caliptra FMC ...
2,707,521 UART:
2,707,664 UART: [state] CFI Enabled
2,718,013 UART: [fht] FMC Alias Private Key: 7
2,825,876 UART: [art] Extend RT PCRs Done
2,826,304 UART: [art] Lock RT PCRs Done
2,827,956 UART: [art] Populate DV Done
2,836,263 UART: [fht] FMC Alias Private Key: 7
2,837,407 UART: [art] Derive CDI
2,837,687 UART: [art] Store in in slot 0x4
2,923,676 UART: [art] Derive Key Pair
2,924,036 UART: [art] Store priv key in slot 0x5
2,937,314 UART: [art] Derive Key Pair - Done
2,951,945 UART: [art] Signing Cert with AUTHO
2,952,425 UART: RITY.KEYID = 7
2,967,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,380 UART: [art] PUB.X = AC45FD62A77C293EBB5F25757E1445F37E62619DF7FAC8B290D2F3B4A31457D6BADA0DB4DFDBE8824FA3C5D7B24A3259
2,975,167 UART: [art] PUB.Y = AE6092650B34DB3B8D48C31B3C369DB5BB3E931F078977E90A8FA4B0615BE29D2731FCA6DDC8078C6986AFE78C1C42DC
2,982,119 UART: [art] SIG.R = 265F9746DA9F8F61C08DDCF84DFB820BC6BDBAF648CBCBCFCE12449811800BB61DB5A1C6CE30F9E4D5AC1876CC9E7FB5
2,988,913 UART: [art] SIG.S = A63E2D1D912B68C2A08026F57D2E24B8037B33DE37859A303185F3B8A3AA4DE9F06C43C28B8D81690346C7EA0EEC1F03
3,012,744 UART: Caliptra RT
3,013,089 UART: [state] CFI Enabled
3,121,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,824 UART: [rt]cmd =0x49444352, len=4
3,153,455 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] CSR upload begun
1,208,704 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,179 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,887 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,772 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,478 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,907 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,401 UART: [idev] CSR uploaded
1,299,446 ready_for_fw is high
1,299,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,615 UART: [idev] --
1,300,632 UART: [ldev] ++
1,300,800 UART: [ldev] CDI.KEYID = 6
1,301,164 UART: [ldev] SUBJECT.KEYID = 5
1,301,591 UART: [ldev] AUTHORITY.KEYID = 7
1,302,054 UART: [ldev] FE.KEYID = 1
1,307,226 UART: [ldev] Erasing FE.KEYID = 1
1,334,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,808 UART: [ldev] --
1,373,222 UART: [fwproc] Wait for Commands...
1,373,807 UART: [fwproc] Recv command 0x46574c44
1,374,540 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,829 >>> mbox cmd response: success
2,864,829 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,998 UART: [afmc] ++
2,866,166 UART: [afmc] CDI.KEYID = 6
2,866,529 UART: [afmc] SUBJECT.KEYID = 7
2,866,955 UART: [afmc] AUTHORITY.KEYID = 5
2,902,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,945 UART: [afmc] --
2,945,935 UART: [cold-reset] --
2,946,823 UART: [state] Locking Datavault
2,947,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,462 UART: [state] Locking ICCM
2,949,028 UART: [exit] Launching FMC @ 0x40000130
2,954,357 UART:
2,954,373 UART: Running Caliptra FMC ...
2,954,781 UART:
2,954,835 UART: [state] CFI Enabled
2,965,354 UART: [fht] FMC Alias Private Key: 7
3,073,331 UART: [art] Extend RT PCRs Done
3,073,759 UART: [art] Lock RT PCRs Done
3,074,997 UART: [art] Populate DV Done
3,083,064 UART: [fht] FMC Alias Private Key: 7
3,084,182 UART: [art] Derive CDI
3,084,462 UART: [art] Store in in slot 0x4
3,170,125 UART: [art] Derive Key Pair
3,170,485 UART: [art] Store priv key in slot 0x5
3,184,091 UART: [art] Derive Key Pair - Done
3,199,327 UART: [art] Signing Cert with AUTHO
3,199,807 UART: RITY.KEYID = 7
3,214,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,578 UART: [art] PUB.X = 1402F73510CB4B7292E1F3C9764CA37EEF101AB889A2C12A65E8A7888A6153F8256ACE2660F378D457FF0F212EF900FD
3,222,324 UART: [art] PUB.Y = 4BEE295FA4FD3F14DCFF58B945D128D5A99C616BB14760E481C2D4477D20A861942F624835D35AC28971052727CE4A2A
3,229,273 UART: [art] SIG.R = 3F09CD2EB4A0E18F2986950E538C89F43A32FA0C230AB55867C17E5919B8D917DE2CDBFA17FE4FB83038FBEA4BC1D0E5
3,236,049 UART: [art] SIG.S = 22B37EC177276C0C38D1E4FD5B0FFFBD80AA79D63A1BAAB61EB7B7CCEFA5516A5807E111A8A34640C4D9CCE5C375C1D0
3,259,709 UART: Caliptra RT
3,259,962 UART: [state] CFI Enabled
3,367,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,725 UART: [rt]cmd =0x49444352, len=4
3,404,797 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,263 ready_for_fw is high
1,108,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,816 >>> mbox cmd response: success
2,641,816 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,200 UART:
2,704,216 UART: Running Caliptra FMC ...
2,704,624 UART:
2,704,678 UART: [state] CFI Enabled
2,714,925 UART: [fht] FMC Alias Private Key: 7
2,823,112 UART: [art] Extend RT PCRs Done
2,823,540 UART: [art] Lock RT PCRs Done
2,825,180 UART: [art] Populate DV Done
2,833,291 UART: [fht] FMC Alias Private Key: 7
2,834,339 UART: [art] Derive CDI
2,834,619 UART: [art] Store in in slot 0x4
2,920,378 UART: [art] Derive Key Pair
2,920,738 UART: [art] Store priv key in slot 0x5
2,933,740 UART: [art] Derive Key Pair - Done
2,948,335 UART: [art] Signing Cert with AUTHO
2,948,815 UART: RITY.KEYID = 7
2,963,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,454 UART: [art] PUB.X = EA69A16EFBA5072C45B00110E7F005B62A5EA21CDEF2ED3F3CA47216C0570806870A41D761895B275862D192753AA21C
2,971,208 UART: [art] PUB.Y = A62BCF131B56543A72B0FA94BB026A9E26C99EE4D706DB09A3C0A3B18E9DE5B8F497919C976630C6731AA5BAEE2007A3
2,978,158 UART: [art] SIG.R = 9FDE9701679DDCF531FB980CF46FCC0060AB2600BA0F32C87219F5D366345401613F114E114C452CD4C9719719BFB4BC
2,984,876 UART: [art] SIG.S = CFAC8BEA05D213813F7B10BBBDAF9A76D4EF192153B74DD3AC9941E81CB54347D68DEB5FC0D322E98BEF9D4FC9E3A3C9
3,009,170 UART: Caliptra RT
3,009,423 UART: [state] CFI Enabled
3,116,791 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,141 UART: [rt]cmd =0x49444352, len=4
3,154,175 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] CSR upload begun
1,209,787 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,550 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,258 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,143 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,849 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,278 UART: [idev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
1,297,772 UART: [idev] CSR uploaded
1,300,817 ready_for_fw is high
1,300,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,986 UART: [idev] --
1,302,179 UART: [ldev] ++
1,302,347 UART: [ldev] CDI.KEYID = 6
1,302,711 UART: [ldev] SUBJECT.KEYID = 5
1,303,138 UART: [ldev] AUTHORITY.KEYID = 7
1,303,601 UART: [ldev] FE.KEYID = 1
1,308,961 UART: [ldev] Erasing FE.KEYID = 1
1,335,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,439 UART: [ldev] --
1,374,841 UART: [fwproc] Wait for Commands...
1,375,630 UART: [fwproc] Recv command 0x46574c44
1,376,363 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,867,030 >>> mbox cmd response: success
2,867,030 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,868,079 UART: [afmc] ++
2,868,247 UART: [afmc] CDI.KEYID = 6
2,868,610 UART: [afmc] SUBJECT.KEYID = 7
2,869,036 UART: [afmc] AUTHORITY.KEYID = 5
2,904,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,555 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,292 UART: [afmc] --
2,947,390 UART: [cold-reset] --
2,948,458 UART: [state] Locking Datavault
2,949,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,117 UART: [state] Locking ICCM
2,950,721 UART: [exit] Launching FMC @ 0x40000130
2,956,050 UART:
2,956,066 UART: Running Caliptra FMC ...
2,956,474 UART:
2,956,617 UART: [state] CFI Enabled
2,967,348 UART: [fht] FMC Alias Private Key: 7
3,075,289 UART: [art] Extend RT PCRs Done
3,075,717 UART: [art] Lock RT PCRs Done
3,077,393 UART: [art] Populate DV Done
3,085,768 UART: [fht] FMC Alias Private Key: 7
3,086,808 UART: [art] Derive CDI
3,087,088 UART: [art] Store in in slot 0x4
3,172,961 UART: [art] Derive Key Pair
3,173,321 UART: [art] Store priv key in slot 0x5
3,186,207 UART: [art] Derive Key Pair - Done
3,200,934 UART: [art] Signing Cert with AUTHO
3,201,414 UART: RITY.KEYID = 7
3,216,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,629 UART: [art] PUB.X = 17B1876F9C18E2DA080CE7A82D15AC711C6DC320955D47444C7B1FE6EFC972505E19E8762D951B1F7E7117158116F1D5
3,224,393 UART: [art] PUB.Y = 4CEB4CD989AAF5AFF71DF9F61B20C24D5E3463F1C1C3662F634C06E2EA822CA41ACB2E5A9A358FAF0A724288B27FB078
3,231,357 UART: [art] SIG.R = 363F7F59EE579548CFA81001F61FE6535C370A085523A6C930C01B2DC6E7CE6F90E399A40A07162870C7727A61697D7E
3,238,108 UART: [art] SIG.S = 0426292BF0EF3D7B302D273BEACB15B70F22F1E863FB747827AE2F58499B09908F8A6E4503E03D2B8D7112DEC04E9CA2
3,262,427 UART: Caliptra RT
3,262,772 UART: [state] CFI Enabled
3,371,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,541 UART: [rt]cmd =0x49444352, len=4
3,409,677 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,680 ready_for_fw is high
1,106,680 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,839 >>> mbox cmd response: success
2,639,839 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,701,805 UART:
2,701,821 UART: Running Caliptra FMC ...
2,702,229 UART:
2,702,372 UART: [state] CFI Enabled
2,712,615 UART: [fht] FMC Alias Private Key: 7
2,820,246 UART: [art] Extend RT PCRs Done
2,820,674 UART: [art] Lock RT PCRs Done
2,822,210 UART: [art] Populate DV Done
2,830,269 UART: [fht] FMC Alias Private Key: 7
2,831,249 UART: [art] Derive CDI
2,831,529 UART: [art] Store in in slot 0x4
2,917,388 UART: [art] Derive Key Pair
2,917,748 UART: [art] Store priv key in slot 0x5
2,931,432 UART: [art] Derive Key Pair - Done
2,946,196 UART: [art] Signing Cert with AUTHO
2,946,676 UART: RITY.KEYID = 7
2,961,736 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,501 UART: [art] PUB.X = 809C05A89B5B376C8ECE78B8A8F79AD672BFAD816766E9C238CEE0CC9D1C5808658854635A47C3F0D1AB89790E694F8A
2,969,270 UART: [art] PUB.Y = EBA0738859766D91281B6DAA64F32B36186028E1E3EC255B72F5538C4019D999DBCB854886B26AA043A4FB4A793DCC18
2,976,222 UART: [art] SIG.R = E119C556337A4BA28C0B8A3AB3FC75D6DE491ECB638BE8910694C82E280EE45E650A04A1607F8EEF769F8CD7450D7BD6
2,982,986 UART: [art] SIG.S = C9F079D66D0A27BC53D30C03CA2A721CB8665D3CB9FB570089DA332FB74AA470D297845117310A5FB9BE10811C5054E3
3,006,863 UART: Caliptra RT
3,007,208 UART: [state] CFI Enabled
3,115,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,628 UART: [rt]cmd =0x49444352, len=4
3,152,776 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,821 UART: [kat] SHA2-256
881,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,867 UART: [kat] ++
886,019 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,368 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,479,068 UART: [idev] ++
1,479,236 UART: [idev] CDI.KEYID = 6
1,479,596 UART: [idev] SUBJECT.KEYID = 7
1,480,020 UART: [idev] UDS.KEYID = 0
1,480,365 ready_for_fw is high
1,480,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,780 UART: [idev] Erasing UDS.KEYID = 0
1,504,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,786 UART: [idev] --
1,513,857 UART: [ldev] ++
1,514,025 UART: [ldev] CDI.KEYID = 6
1,514,388 UART: [ldev] SUBJECT.KEYID = 5
1,514,814 UART: [ldev] AUTHORITY.KEYID = 7
1,515,277 UART: [ldev] FE.KEYID = 1
1,520,261 UART: [ldev] Erasing FE.KEYID = 1
1,545,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,064 UART: [ldev] --
1,585,359 UART: [fwproc] Waiting for Commands...
1,586,144 UART: [fwproc] Received command 0x46574c44
1,586,935 UART: [fwproc] Received Image of size 114332 bytes
2,885,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,830 >>> mbox cmd response: success
3,079,062 UART: [afmc] ++
3,079,230 UART: [afmc] CDI.KEYID = 6
3,079,592 UART: [afmc] SUBJECT.KEYID = 7
3,080,017 UART: [afmc] AUTHORITY.KEYID = 5
3,114,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,487 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,177 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,020 UART: [afmc] --
3,157,948 UART: [cold-reset] --
3,158,802 UART: [state] Locking Datavault
3,159,953 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,557 UART: [state] Locking ICCM
3,161,157 UART: [exit] Launching FMC @ 0x40000130
3,166,486 UART:
3,166,502 UART: Running Caliptra FMC ...
3,166,910 UART:
3,166,964 UART: [state] CFI Enabled
3,177,127 UART: [fht] FMC Alias Private Key: 7
3,285,556 UART: [art] Extend RT PCRs Done
3,285,984 UART: [art] Lock RT PCRs Done
3,287,504 UART: [art] Populate DV Done
3,295,871 UART: [fht] FMC Alias Private Key: 7
3,296,973 UART: [art] Derive CDI
3,297,253 UART: [art] Store in in slot 0x4
3,382,926 UART: [art] Derive Key Pair
3,383,286 UART: [art] Store priv key in slot 0x5
3,396,336 UART: [art] Derive Key Pair - Done
3,411,206 UART: [art] Signing Cert with AUTHO
3,411,686 UART: RITY.KEYID = 7
3,427,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,169 UART: [art] PUB.X = 7CF351DBDDACE4DE005D2780C7CD8752EE351A9A76B359B07465B99282AB50FEC8898E8868F155BBB9344A03530818D0
3,434,917 UART: [art] PUB.Y = 5560FC11AF6E35A2C950918990B7CD6D05050804E7C842FA98787CE2A4BBF1C2B761935D4971B223C793B80D35A39273
3,441,848 UART: [art] SIG.R = 9244125BFEDFF03A4AA6BC4D03D81DCC0D6D502C3365E29350E37DD10182D321D89F27AABE3201B52D1FFBA8F02DB95A
3,448,624 UART: [art] SIG.S = 939AC2F3A27BE771A646BBAAB4C48051007857F5D446654C9F34EC5C5A8C52A98C0DC6C6F478F6F409D117289BF90717
3,472,312 UART: Caliptra RT
3,472,565 UART: [state] CFI Enabled
3,580,339 UART: [rt] RT listening for mailbox commands...
3,581,009 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,765 UART: [rt]cmd =0x49444352, len=4
3,612,286 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,677 ready_for_fw is high
1,362,677 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,020 >>> mbox cmd response: success
2,989,204 UART:
2,989,220 UART: Running Caliptra FMC ...
2,989,628 UART:
2,989,682 UART: [state] CFI Enabled
3,000,351 UART: [fht] FMC Alias Private Key: 7
3,108,262 UART: [art] Extend RT PCRs Done
3,108,690 UART: [art] Lock RT PCRs Done
3,110,308 UART: [art] Populate DV Done
3,118,429 UART: [fht] FMC Alias Private Key: 7
3,119,359 UART: [art] Derive CDI
3,119,639 UART: [art] Store in in slot 0x4
3,205,100 UART: [art] Derive Key Pair
3,205,460 UART: [art] Store priv key in slot 0x5
3,218,928 UART: [art] Derive Key Pair - Done
3,233,529 UART: [art] Signing Cert with AUTHO
3,234,009 UART: RITY.KEYID = 7
3,249,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,260 UART: [art] PUB.X = F1F8C46047515184A84F4D234F0D4588EBCEC0F5D663497CE746CF5D2B6BA1CB616468A0BDCCD7F907867F2FDB93C912
3,257,036 UART: [art] PUB.Y = E907D7B0899C3222E4D28284D0287D63148F02976A74B140967EC29DB9FCEC28EDEAD91730FDAC7043AB79CEC23E353F
3,263,988 UART: [art] SIG.R = D41D7CA72B1162A55B79B15F6480EC11EA9866347B3474DE1B2040F038E2F89ECE74FC031AED48A55C7AAF77ACAFD7EF
3,270,773 UART: [art] SIG.S = 8C1DE281CCF19F4C3D10D4808BAFACDA9EFC67B9A40BBA42D052564B9B7600CFC904690EED988FF637C6947936CD6B94
3,294,709 UART: Caliptra RT
3,294,962 UART: [state] CFI Enabled
3,403,492 UART: [rt] RT listening for mailbox commands...
3,404,162 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,878 UART: [rt]cmd =0x49444352, len=4
3,435,031 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,595 UART: [kat] SHA2-512-ACC
897,496 UART: [kat] ECC-384
903,303 UART: [kat] HMAC-384Kdf
908,051 UART: [kat] LMS
1,476,247 UART: [kat] --
1,477,036 UART: [cold-reset] ++
1,477,456 UART: [fht] Storing FHT @ 0x50003400
1,480,377 UART: [idev] ++
1,480,545 UART: [idev] CDI.KEYID = 6
1,480,905 UART: [idev] SUBJECT.KEYID = 7
1,481,329 UART: [idev] UDS.KEYID = 0
1,481,674 ready_for_fw is high
1,481,674 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,152 UART: [ldev] ++
1,515,320 UART: [ldev] CDI.KEYID = 6
1,515,683 UART: [ldev] SUBJECT.KEYID = 5
1,516,109 UART: [ldev] AUTHORITY.KEYID = 7
1,516,572 UART: [ldev] FE.KEYID = 1
1,521,836 UART: [ldev] Erasing FE.KEYID = 1
1,547,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,659 UART: [ldev] --
1,586,954 UART: [fwproc] Waiting for Commands...
1,587,685 UART: [fwproc] Received command 0x46574c44
1,588,476 UART: [fwproc] Received Image of size 114332 bytes
2,887,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,069 >>> mbox cmd response: success
3,080,221 UART: [afmc] ++
3,080,389 UART: [afmc] CDI.KEYID = 6
3,080,751 UART: [afmc] SUBJECT.KEYID = 7
3,081,176 UART: [afmc] AUTHORITY.KEYID = 5
3,116,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,462 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,152 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,267 UART: [afmc] --
3,160,221 UART: [cold-reset] --
3,161,237 UART: [state] Locking Datavault
3,162,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,012 UART: [state] Locking ICCM
3,163,444 UART: [exit] Launching FMC @ 0x40000130
3,168,773 UART:
3,168,789 UART: Running Caliptra FMC ...
3,169,197 UART:
3,169,340 UART: [state] CFI Enabled
3,179,705 UART: [fht] FMC Alias Private Key: 7
3,287,998 UART: [art] Extend RT PCRs Done
3,288,426 UART: [art] Lock RT PCRs Done
3,289,604 UART: [art] Populate DV Done
3,298,073 UART: [fht] FMC Alias Private Key: 7
3,299,199 UART: [art] Derive CDI
3,299,479 UART: [art] Store in in slot 0x4
3,385,486 UART: [art] Derive Key Pair
3,385,846 UART: [art] Store priv key in slot 0x5
3,398,964 UART: [art] Derive Key Pair - Done
3,414,074 UART: [art] Signing Cert with AUTHO
3,414,554 UART: RITY.KEYID = 7
3,429,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,483 UART: [art] PUB.X = AFC0205E19FC111A5E24CA223409994F4FDD4EB482ABEF64AC8332815D50F2166D02538C7EE824FFFE114F7375672940
3,437,251 UART: [art] PUB.Y = 467252B6CB958C0298C46E3C73BD38042E9F23C67582ABFE926143B7522FFFDCCADB979DF1AD8EFFEB29EDCE63BC47F9
3,444,217 UART: [art] SIG.R = 4B7D955C8F3522BF53304AF801ED02FD52938F42E8C0A89D2764E28135B2208D28C3389FA92F7162B7C9F4CE8A1F4989
3,450,981 UART: [art] SIG.S = 564BD43096CC95E2E995A705C15E7559C8A0E1B52F8D0A941C419C3A1208276D0ADF50ABFEDDA6CE63D008851B313AFA
3,474,789 UART: Caliptra RT
3,475,134 UART: [state] CFI Enabled
3,582,710 UART: [rt] RT listening for mailbox commands...
3,583,380 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,164 UART: [rt]cmd =0x49444352, len=4
3,614,739 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,618 ready_for_fw is high
1,362,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,013 >>> mbox cmd response: success
2,989,825 UART:
2,989,841 UART: Running Caliptra FMC ...
2,990,249 UART:
2,990,392 UART: [state] CFI Enabled
3,000,987 UART: [fht] FMC Alias Private Key: 7
3,108,842 UART: [art] Extend RT PCRs Done
3,109,270 UART: [art] Lock RT PCRs Done
3,110,896 UART: [art] Populate DV Done
3,118,961 UART: [fht] FMC Alias Private Key: 7
3,120,035 UART: [art] Derive CDI
3,120,315 UART: [art] Store in in slot 0x4
3,206,086 UART: [art] Derive Key Pair
3,206,446 UART: [art] Store priv key in slot 0x5
3,219,678 UART: [art] Derive Key Pair - Done
3,234,070 UART: [art] Signing Cert with AUTHO
3,234,550 UART: RITY.KEYID = 7
3,249,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,375 UART: [art] PUB.X = 85C91476517F196879CBFB23E422FBF64CA4B5E134487690892814916A9483ACF75E2B7BD1E0D9154114D54F2AFCCDF7
3,257,147 UART: [art] PUB.Y = D75DA4BC55258926273F70505080F9AE22F3FB945AB1A179C0A2B13ECFEFBBD70B48FFB00EBC74A18DBF21965ABA7BD5
3,264,113 UART: [art] SIG.R = 8B266627B2D8EA93834C6EF7706F3F47970E8CA7F361D92F00F53B5342DE80FC01D9962FA9D2668D3C4BE5441592BC8F
3,270,859 UART: [art] SIG.S = 35DEE7E551CD9514C92F78014242AD1149165C6D710BD2D0A33E6EA888E05BBB18B025D1B5C388224DBDDFE2A38BEA57
3,295,084 UART: Caliptra RT
3,295,429 UART: [state] CFI Enabled
3,403,186 UART: [rt] RT listening for mailbox commands...
3,403,856 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,734 UART: [rt]cmd =0x49444352, len=4
3,435,111 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,312 UART: [kat] SHA2-512-ACC
908,213 UART: [kat] ECC-384
917,682 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,469 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 ready_for_fw is high
1,176,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,466 UART: [idev] Erasing UDS.KEYID = 0
1,200,677 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,058 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,216,977 UART: [ldev] Erasing FE.KEYID = 1
1,244,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,095 UART: [ldev] --
1,283,582 UART: [fwproc] Wait for Commands...
1,284,158 UART: [fwproc] Recv command 0x46574c44
1,284,886 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,003 >>> mbox cmd response: success
2,776,251 UART: [afmc] ++
2,776,419 UART: [afmc] CDI.KEYID = 6
2,776,781 UART: [afmc] SUBJECT.KEYID = 7
2,777,206 UART: [afmc] AUTHORITY.KEYID = 5
2,812,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,355 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,074 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,860 UART: [afmc] --
2,855,894 UART: [cold-reset] --
2,856,538 UART: [state] Locking Datavault
2,857,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,075 UART: [state] Locking ICCM
2,858,729 UART: [exit] Launching FMC @ 0x40000130
2,864,058 UART:
2,864,074 UART: Running Caliptra FMC ...
2,864,482 UART:
2,864,536 UART: [state] CFI Enabled
2,874,799 UART: [fht] FMC Alias Private Key: 7
2,982,652 UART: [art] Extend RT PCRs Done
2,983,080 UART: [art] Lock RT PCRs Done
2,984,514 UART: [art] Populate DV Done
2,992,903 UART: [fht] FMC Alias Private Key: 7
2,994,053 UART: [art] Derive CDI
2,994,333 UART: [art] Store in in slot 0x4
3,080,060 UART: [art] Derive Key Pair
3,080,420 UART: [art] Store priv key in slot 0x5
3,093,798 UART: [art] Derive Key Pair - Done
3,108,781 UART: [art] Signing Cert with AUTHO
3,109,261 UART: RITY.KEYID = 7
3,124,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,570 UART: [art] PUB.X = 1A0856E2556651F6FDEB47110EAE5A63854A5A6840558BE4FB1BE0DE904165A29137251E26CBCA87E28FB88C745672E5
3,132,336 UART: [art] PUB.Y = B2A8447E1151DF8E381DB536344E99822F9919C5320EDD60EE170803EEF92FD770E6FC56B53B3C2DD461037FCBA53FCF
3,139,284 UART: [art] SIG.R = 748D9F44E4EF0A1FD2B4BEB605933D8D349B50FED71287B04AE6A8B8734E37B2CD264746FE4275E84A9F7E5DE069CCE1
3,146,062 UART: [art] SIG.S = D83E254F3137957746896A9F8962A9C6465652EDF4427FCCF46368BC8D553D1E9DB528BFEF541A23C4763E7A8F1DB0D8
3,169,983 UART: Caliptra RT
3,170,236 UART: [state] CFI Enabled
3,277,769 UART: [rt] RT listening for mailbox commands...
3,278,439 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,295 UART: [rt]cmd =0x49444352, len=4
3,309,762 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,959 ready_for_fw is high
1,060,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,224 >>> mbox cmd response: success
2,689,196 UART:
2,689,212 UART: Running Caliptra FMC ...
2,689,620 UART:
2,689,674 UART: [state] CFI Enabled
2,699,833 UART: [fht] FMC Alias Private Key: 7
2,807,664 UART: [art] Extend RT PCRs Done
2,808,092 UART: [art] Lock RT PCRs Done
2,809,746 UART: [art] Populate DV Done
2,817,851 UART: [fht] FMC Alias Private Key: 7
2,818,915 UART: [art] Derive CDI
2,819,195 UART: [art] Store in in slot 0x4
2,905,282 UART: [art] Derive Key Pair
2,905,642 UART: [art] Store priv key in slot 0x5
2,918,732 UART: [art] Derive Key Pair - Done
2,933,421 UART: [art] Signing Cert with AUTHO
2,933,901 UART: RITY.KEYID = 7
2,949,099 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,864 UART: [art] PUB.X = 52F0CA39BE461850CD041FACAF2F8BF88E767A11EB9C180E89F5016B32CEF0FFF830850C32CCDFC2B2AAE34AA29154C5
2,956,644 UART: [art] PUB.Y = FB970A121E4BBFFE40C307DA515DE182258D19DD43AD5FB059DBA80EC7290E987A90F6BF807BE630CEFCB0AEF5070DC2
2,963,600 UART: [art] SIG.R = 85AC5A99585B5D5875761AD5C59E6AE6587C3B2EEC6492B64EB23343ED0841825EAD96B5AC2A11CD145AAB0E7591CC9D
2,970,376 UART: [art] SIG.S = 1EA1F3C930A19C71C62EBF631CD2F6421317142565A8217FA5F85DFD2BD2C0E33FAED6DA4D902C35E430C20BE363BB04
2,993,953 UART: Caliptra RT
2,994,206 UART: [state] CFI Enabled
3,101,653 UART: [rt] RT listening for mailbox commands...
3,102,323 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,395 UART: [rt]cmd =0x49444352, len=4
3,133,894 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
906,879 UART: [kat] SHA2-512-ACC
908,780 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,171,986 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 ready_for_fw is high
1,176,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,596 UART: [idev] Sha1 KeyId Algorithm
1,210,094 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,874 UART: [ldev] Erasing FE.KEYID = 1
1,244,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,796 UART: [ldev] --
1,284,063 UART: [fwproc] Wait for Commands...
1,284,815 UART: [fwproc] Recv command 0x46574c44
1,285,543 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,290 >>> mbox cmd response: success
2,776,544 UART: [afmc] ++
2,776,712 UART: [afmc] CDI.KEYID = 6
2,777,074 UART: [afmc] SUBJECT.KEYID = 7
2,777,499 UART: [afmc] AUTHORITY.KEYID = 5
2,812,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,965 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,569 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,201 UART: [afmc] --
2,855,215 UART: [cold-reset] --
2,855,979 UART: [state] Locking Datavault
2,857,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,730 UART: [state] Locking ICCM
2,858,164 UART: [exit] Launching FMC @ 0x40000130
2,863,493 UART:
2,863,509 UART: Running Caliptra FMC ...
2,863,917 UART:
2,864,060 UART: [state] CFI Enabled
2,874,377 UART: [fht] FMC Alias Private Key: 7
2,983,188 UART: [art] Extend RT PCRs Done
2,983,616 UART: [art] Lock RT PCRs Done
2,985,064 UART: [art] Populate DV Done
2,993,473 UART: [fht] FMC Alias Private Key: 7
2,994,525 UART: [art] Derive CDI
2,994,805 UART: [art] Store in in slot 0x4
3,080,596 UART: [art] Derive Key Pair
3,080,956 UART: [art] Store priv key in slot 0x5
3,094,184 UART: [art] Derive Key Pair - Done
3,108,761 UART: [art] Signing Cert with AUTHO
3,109,241 UART: RITY.KEYID = 7
3,124,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,460 UART: [art] PUB.X = 0930535501CA256107F25F5555BFF332595BB81978C73B381C121B464CEA125452F202D6FEEE1D06F5CE7326858BCE8F
3,132,213 UART: [art] PUB.Y = F6CFBD27AF17B27A564B921CB178516FE43EDC4DE8D3CEF824F25113116A0BC05FD53D9D8514063DD8C10C12D7ECB1E3
3,139,172 UART: [art] SIG.R = 73BC0A752B115FFCF60222D44C584058BEF117A70B185690C6A39F655B5276EBE2FCFB20C62D7DD8176B2B325A321A6D
3,145,941 UART: [art] SIG.S = C77D5EE9B4553AC485270596F30C6D9AEC6903CD4F2FCB9C2A67C310D33123B84C7A8AD1C27040BE701228CF379929D0
3,169,211 UART: Caliptra RT
3,169,556 UART: [state] CFI Enabled
3,277,351 UART: [rt] RT listening for mailbox commands...
3,278,021 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,761 UART: [rt]cmd =0x49444352, len=4
3,309,084 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,280 ready_for_fw is high
1,060,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,177 >>> mbox cmd response: success
2,690,335 UART:
2,690,351 UART: Running Caliptra FMC ...
2,690,759 UART:
2,690,902 UART: [state] CFI Enabled
2,701,505 UART: [fht] FMC Alias Private Key: 7
2,809,366 UART: [art] Extend RT PCRs Done
2,809,794 UART: [art] Lock RT PCRs Done
2,811,468 UART: [art] Populate DV Done
2,819,801 UART: [fht] FMC Alias Private Key: 7
2,820,977 UART: [art] Derive CDI
2,821,257 UART: [art] Store in in slot 0x4
2,907,316 UART: [art] Derive Key Pair
2,907,676 UART: [art] Store priv key in slot 0x5
2,920,880 UART: [art] Derive Key Pair - Done
2,935,713 UART: [art] Signing Cert with AUTHO
2,936,193 UART: RITY.KEYID = 7
2,951,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,924 UART: [art] PUB.X = 9CE59DDED656CCA9D5C8287AA5EF7F48FDDBF20E888385915FD43092D9C11AF416DC6F522E946D234F1B6FC351C5CE86
2,958,709 UART: [art] PUB.Y = B77ADBF18F87AD812432CD062A737CAD168635F1F98282639CC4ECEE66EAE92057017B834312F0336ED31F1D267C5E50
2,965,657 UART: [art] SIG.R = 72ED9CB05819991BAFEE73CCF708633ABED7A168F966CF0254393B41A2C5EE027AFD105C7D8E3F5DA4B8CD4BD7E586AF
2,972,440 UART: [art] SIG.S = 7618E1E4E56B1CBE57B5E1F3A205FE02C5C4E7169974C28968B422AA02C860CE1DA8E2F5A50966BE3EA7FA5B9AD4C037
2,996,419 UART: Caliptra RT
2,996,764 UART: [state] CFI Enabled
3,104,249 UART: [rt] RT listening for mailbox commands...
3,104,919 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,719 UART: [rt]cmd =0x49444352, len=4
3,136,140 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
915,878 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,497 UART: [idev] ++
1,172,665 UART: [idev] CDI.KEYID = 6
1,173,026 UART: [idev] SUBJECT.KEYID = 7
1,173,451 UART: [idev] UDS.KEYID = 0
1,173,797 ready_for_fw is high
1,173,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,208,138 UART: [ldev] ++
1,208,306 UART: [ldev] CDI.KEYID = 6
1,208,670 UART: [ldev] SUBJECT.KEYID = 5
1,209,097 UART: [ldev] AUTHORITY.KEYID = 7
1,209,560 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,084 UART: [fwproc] Wait for Commands...
1,280,897 UART: [fwproc] Recv command 0x46574c44
1,281,630 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,857 >>> mbox cmd response: success
2,771,106 UART: [afmc] ++
2,771,274 UART: [afmc] CDI.KEYID = 6
2,771,637 UART: [afmc] SUBJECT.KEYID = 7
2,772,063 UART: [afmc] AUTHORITY.KEYID = 5
2,807,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,795 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,503 UART: [afmc] --
2,851,457 UART: [cold-reset] --
2,852,369 UART: [state] Locking Datavault
2,853,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,274 UART: [state] Locking ICCM
2,854,716 UART: [exit] Launching FMC @ 0x40000130
2,860,045 UART:
2,860,061 UART: Running Caliptra FMC ...
2,860,469 UART:
2,860,523 UART: [state] CFI Enabled
2,871,376 UART: [fht] FMC Alias Private Key: 7
2,978,529 UART: [art] Extend RT PCRs Done
2,978,957 UART: [art] Lock RT PCRs Done
2,980,383 UART: [art] Populate DV Done
2,988,844 UART: [fht] FMC Alias Private Key: 7
2,989,908 UART: [art] Derive CDI
2,990,188 UART: [art] Store in in slot 0x4
3,075,815 UART: [art] Derive Key Pair
3,076,175 UART: [art] Store priv key in slot 0x5
3,089,321 UART: [art] Derive Key Pair - Done
3,104,116 UART: [art] Signing Cert with AUTHO
3,104,596 UART: RITY.KEYID = 7
3,119,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,693 UART: [art] PUB.X = A144F320D2FC5C846DD15AC820934C1D0F0AB9C93C65289067AB9F4993B61C0CD4ED763B74216EA8247F51A2288C7A53
3,127,458 UART: [art] PUB.Y = B7EFB736DD88364163CC56B912161F172CA99E231A6E85BC0E6271DE23FD07B36702F738AC377C15FDCF864027AE7A27
3,134,405 UART: [art] SIG.R = 553969D174B38031E8B57ABCDAF36B18DDBD13C3810F9FC0C8C16987223B6520B65D9AE11B5D84ABAACFD445AFC20424
3,141,183 UART: [art] SIG.S = A048F37DF47B96545DB3FFEF5F29B8F12A745CF02BD8ECCD54463FCD28592D209C19CDC3D5DA884B4C7A155040ECC317
3,165,486 UART: Caliptra RT
3,165,739 UART: [state] CFI Enabled
3,272,992 UART: [rt] RT listening for mailbox commands...
3,273,662 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,522 UART: [rt]cmd =0x49444352, len=4
3,304,811 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,120 ready_for_fw is high
1,056,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,333 >>> mbox cmd response: success
2,683,935 UART:
2,683,951 UART: Running Caliptra FMC ...
2,684,359 UART:
2,684,413 UART: [state] CFI Enabled
2,694,620 UART: [fht] FMC Alias Private Key: 7
2,802,189 UART: [art] Extend RT PCRs Done
2,802,617 UART: [art] Lock RT PCRs Done
2,804,101 UART: [art] Populate DV Done
2,812,434 UART: [fht] FMC Alias Private Key: 7
2,813,410 UART: [art] Derive CDI
2,813,690 UART: [art] Store in in slot 0x4
2,899,215 UART: [art] Derive Key Pair
2,899,575 UART: [art] Store priv key in slot 0x5
2,912,689 UART: [art] Derive Key Pair - Done
2,927,222 UART: [art] Signing Cert with AUTHO
2,927,702 UART: RITY.KEYID = 7
2,943,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,785 UART: [art] PUB.X = A4EE6AA66DE7E5AEB3A8B0B3AC4154992D786C4ED32A6D97BCFF4F5419D1D0F1F72F4670D2E5F2E4DDC73CC4643A6E30
2,950,579 UART: [art] PUB.Y = 366EC7FD9A744A66DCF4B209140AD3D925094717C488ADEAB5ACE9BEBF3488B182A7C79DF32C000A9CC22D74B86B1881
2,957,509 UART: [art] SIG.R = 3C8124AC06396CCB7618C488ABA6DFDFA662085644BBB95DA741FD8D96F296066B009F58439513BF405BDB8B641A3E2C
2,964,256 UART: [art] SIG.S = AE2E90243625E9830FEF18496E1A523F27D3002803848F02B648ABE9F04ECE0175D39C11666ED5D572D5DA2F9F6E828C
2,987,885 UART: Caliptra RT
2,988,138 UART: [state] CFI Enabled
3,095,721 UART: [rt] RT listening for mailbox commands...
3,096,391 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,065 UART: [rt]cmd =0x49444352, len=4
3,127,486 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,937 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,628 UART: [idev] ++
1,172,796 UART: [idev] CDI.KEYID = 6
1,173,157 UART: [idev] SUBJECT.KEYID = 7
1,173,582 UART: [idev] UDS.KEYID = 0
1,173,928 ready_for_fw is high
1,173,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,198,440 UART: [idev] Sha1 KeyId Algorithm
1,207,170 UART: [idev] --
1,208,169 UART: [ldev] ++
1,208,337 UART: [ldev] CDI.KEYID = 6
1,208,701 UART: [ldev] SUBJECT.KEYID = 5
1,209,128 UART: [ldev] AUTHORITY.KEYID = 7
1,209,591 UART: [ldev] FE.KEYID = 1
1,214,899 UART: [ldev] Erasing FE.KEYID = 1
1,241,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,789 UART: [ldev] --
1,281,187 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,645 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,104 >>> mbox cmd response: success
2,773,165 UART: [afmc] ++
2,773,333 UART: [afmc] CDI.KEYID = 6
2,773,696 UART: [afmc] SUBJECT.KEYID = 7
2,774,122 UART: [afmc] AUTHORITY.KEYID = 5
2,810,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,520 UART: [afmc] --
2,853,458 UART: [cold-reset] --
2,854,246 UART: [state] Locking Datavault
2,855,407 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,011 UART: [state] Locking ICCM
2,856,667 UART: [exit] Launching FMC @ 0x40000130
2,861,996 UART:
2,862,012 UART: Running Caliptra FMC ...
2,862,420 UART:
2,862,563 UART: [state] CFI Enabled
2,873,414 UART: [fht] FMC Alias Private Key: 7
2,981,077 UART: [art] Extend RT PCRs Done
2,981,505 UART: [art] Lock RT PCRs Done
2,982,959 UART: [art] Populate DV Done
2,991,268 UART: [fht] FMC Alias Private Key: 7
2,992,240 UART: [art] Derive CDI
2,992,520 UART: [art] Store in in slot 0x4
3,077,819 UART: [art] Derive Key Pair
3,078,179 UART: [art] Store priv key in slot 0x5
3,091,511 UART: [art] Derive Key Pair - Done
3,106,285 UART: [art] Signing Cert with AUTHO
3,106,765 UART: RITY.KEYID = 7
3,121,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,622 UART: [art] PUB.X = 14510954F96DBE2524879BF2BDA252A02F9070E76E1D1175F5A9B85C03519A6A94ECF4A12462520B64C2D764486A99AE
3,129,381 UART: [art] PUB.Y = 6583CFA35DABA801F589692D1B277C7622FCC548AAF6F31C035C78D626D1B5FBC3F712DDC90EF87D10C94A206CB1DF2A
3,136,340 UART: [art] SIG.R = 32119F803D70212134F2EA0D1C790A9C558680CA911D3FBCAEC3719FEF6332999C25BF690B8EFE7581BE442CDF680B22
3,143,104 UART: [art] SIG.S = 7A00CC73C4ECF7904138BF9FE843DD8BA6A69AB1967796977BE0466916F932AFC4AEDE9CF8CE8708004E29647605AC41
3,166,649 UART: Caliptra RT
3,166,994 UART: [state] CFI Enabled
3,274,783 UART: [rt] RT listening for mailbox commands...
3,275,453 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,149 UART: [rt]cmd =0x49444352, len=4
3,306,828 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 ready_for_fw is high
1,056,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,532 >>> mbox cmd response: success
2,685,742 UART:
2,685,758 UART: Running Caliptra FMC ...
2,686,166 UART:
2,686,309 UART: [state] CFI Enabled
2,696,968 UART: [fht] FMC Alias Private Key: 7
2,804,511 UART: [art] Extend RT PCRs Done
2,804,939 UART: [art] Lock RT PCRs Done
2,806,499 UART: [art] Populate DV Done
2,814,644 UART: [fht] FMC Alias Private Key: 7
2,815,582 UART: [art] Derive CDI
2,815,862 UART: [art] Store in in slot 0x4
2,901,447 UART: [art] Derive Key Pair
2,901,807 UART: [art] Store priv key in slot 0x5
2,915,041 UART: [art] Derive Key Pair - Done
2,929,901 UART: [art] Signing Cert with AUTHO
2,930,381 UART: RITY.KEYID = 7
2,945,201 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,966 UART: [art] PUB.X = A54E753257C76360957B7F4E06B242AFCF784009CFF03FD91AA414180EBD9D8C1FEFE1EDAB9E8478B64535C346CEEFB2
2,952,743 UART: [art] PUB.Y = 959C1C2DA8F616C4D5A1BC89ABECED725D6CFE77B71D2047B32BB7FE4DA66E07508B3925A20813C729DC26616AA151D4
2,959,701 UART: [art] SIG.R = 6498B9A484FD8E335B2B173DF6D47FFFAA77772DCE472E0267A9DB1C5E35592B7897BEC59755C565D88B8F9EAE585516
2,966,476 UART: [art] SIG.S = A5C0A3E2AA09096CFD75261DD02456A830DAEC3AA5FA55A73A46D5DEBE0811B52480A39873A1E1989D1AA67675E32972
2,990,766 UART: Caliptra RT
2,991,111 UART: [state] CFI Enabled
3,098,178 UART: [rt] RT listening for mailbox commands...
3,098,848 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,774 UART: [rt]cmd =0x49444352, len=4
3,129,961 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,879 UART: [kat] SHA2-256
881,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,925 UART: [kat] ++
886,077 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,350 UART: [kat] LMS
1,475,546 UART: [kat] --
1,476,389 UART: [cold-reset] ++
1,476,875 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 ready_for_fw is high
1,480,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,505,034 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,584 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,520,973 UART: [ldev] Erasing FE.KEYID = 1
1,546,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,644 UART: [ldev] --
1,586,125 UART: [fwproc] Waiting for Commands...
1,586,796 UART: [fwproc] Received command 0x46574c44
1,587,587 UART: [fwproc] Received Image of size 114332 bytes
2,886,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,388 >>> mbox cmd response: success
3,078,388 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,079,550 UART: [afmc] ++
3,079,718 UART: [afmc] CDI.KEYID = 6
3,080,080 UART: [afmc] SUBJECT.KEYID = 7
3,080,505 UART: [afmc] AUTHORITY.KEYID = 5
3,115,460 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,139 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,829 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,772 UART: [afmc] --
3,158,890 UART: [cold-reset] --
3,159,516 UART: [state] Locking Datavault
3,160,671 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,275 UART: [state] Locking ICCM
3,161,939 UART: [exit] Launching FMC @ 0x40000130
3,167,268 UART:
3,167,284 UART: Running Caliptra FMC ...
3,167,692 UART:
3,167,746 UART: [state] CFI Enabled
3,178,037 UART: [fht] FMC Alias Private Key: 7
3,286,174 UART: [art] Extend RT PCRs Done
3,286,602 UART: [art] Lock RT PCRs Done
3,288,420 UART: [art] Populate DV Done
3,296,399 UART: [fht] FMC Alias Private Key: 7
3,297,337 UART: [art] Derive CDI
3,297,617 UART: [art] Store in in slot 0x4
3,383,242 UART: [art] Derive Key Pair
3,383,602 UART: [art] Store priv key in slot 0x5
3,396,844 UART: [art] Derive Key Pair - Done
3,411,761 UART: [art] Signing Cert with AUTHO
3,412,241 UART: RITY.KEYID = 7
3,427,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,080 UART: [art] PUB.X = CBD4A08E7E13BB41F38F02EE84A3092E86DFB356BD87FCEE2A2157BF0BDC97CCA1402B8B20BF7C19ECD315B245B8DD99
3,434,867 UART: [art] PUB.Y = 2365C24E7A3FB6EB3B143259D3789FCC96303882FAE1D6CC025C534293CD3AAD66223D9B49505BC1E3CB22AD94C6E716
3,441,822 UART: [art] SIG.R = 017196D6946B5CB817416127C833F12E0ABF953D8A55428A30D20FE1974E4D87EE8391878BD5BAE51422CF397944B41E
3,448,579 UART: [art] SIG.S = 71508F56C485030CAD20B713EAB0319BD482D0680223290279A60DD992B1C431C9E3380C8F5136D63FEAB80CDDC24C9A
3,471,747 UART: Caliptra RT
3,472,000 UART: [state] CFI Enabled
3,580,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,332 UART: [rt]cmd =0x43415053, len=4
3,612,679 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,165 ready_for_fw is high
1,363,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,766 >>> mbox cmd response: success
2,927,766 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,988,496 UART:
2,988,512 UART: Running Caliptra FMC ...
2,988,920 UART:
2,988,974 UART: [state] CFI Enabled
2,999,597 UART: [fht] FMC Alias Private Key: 7
3,107,068 UART: [art] Extend RT PCRs Done
3,107,496 UART: [art] Lock RT PCRs Done
3,108,992 UART: [art] Populate DV Done
3,117,297 UART: [fht] FMC Alias Private Key: 7
3,118,435 UART: [art] Derive CDI
3,118,715 UART: [art] Store in in slot 0x4
3,204,176 UART: [art] Derive Key Pair
3,204,536 UART: [art] Store priv key in slot 0x5
3,217,500 UART: [art] Derive Key Pair - Done
3,232,263 UART: [art] Signing Cert with AUTHO
3,232,743 UART: RITY.KEYID = 7
3,247,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,510 UART: [art] PUB.X = 2C86D5444EBB862CEEA0FD76C479F4EA68DC69176CCC4005798EA5B6F539B8C5140C9F9EE0C4C706AF2189ACB434DF61
3,255,287 UART: [art] PUB.Y = 7EFB313F6C6AE65BBB7A6168F5E7A428DD8EA7CB4D3D6E53E9B1F0ED42F99B6A41F1ED27C159755BA01C39C6411E77BB
3,262,259 UART: [art] SIG.R = 87DE6AC71017499EBAD1F77E2F4CF2C288B91631600FEBD3D8A123E5E1DFD36F9DD4F8DF2E07CFCB976BD04B4ECDB67F
3,269,051 UART: [art] SIG.S = 41F410D000B43247C83C2E4378720B5E8B9FD680D9930C17FB65C7026BA3E1FF237F41058ADEF3B438036BE7B53C0CE3
3,293,056 UART: Caliptra RT
3,293,309 UART: [state] CFI Enabled
3,401,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,146 UART: [rt]cmd =0x43415053, len=4
3,433,399 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,057 UART: [state] LifecycleState = Unprovisioned
86,712 UART: [state] DebugLocked = No
87,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,932 UART: [kat] SHA2-256
882,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,978 UART: [kat] ++
887,130 UART: [kat] sha1
891,384 UART: [kat] SHA2-256
893,322 UART: [kat] SHA2-384
896,021 UART: [kat] SHA2-512-ACC
897,922 UART: [kat] ECC-384
903,309 UART: [kat] HMAC-384Kdf
908,073 UART: [kat] LMS
1,476,269 UART: [kat] --
1,477,204 UART: [cold-reset] ++
1,477,762 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,641 UART: [idev] Erasing UDS.KEYID = 0
1,506,319 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,961 UART: [idev] --
1,516,204 UART: [ldev] ++
1,516,372 UART: [ldev] CDI.KEYID = 6
1,516,735 UART: [ldev] SUBJECT.KEYID = 5
1,517,161 UART: [ldev] AUTHORITY.KEYID = 7
1,517,624 UART: [ldev] FE.KEYID = 1
1,523,186 UART: [ldev] Erasing FE.KEYID = 1
1,547,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,689 UART: [ldev] --
1,587,112 UART: [fwproc] Waiting for Commands...
1,587,799 UART: [fwproc] Received command 0x46574c44
1,588,590 UART: [fwproc] Received Image of size 114332 bytes
2,886,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,222 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,467 >>> mbox cmd response: success
3,078,467 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,079,539 UART: [afmc] ++
3,079,707 UART: [afmc] CDI.KEYID = 6
3,080,069 UART: [afmc] SUBJECT.KEYID = 7
3,080,494 UART: [afmc] AUTHORITY.KEYID = 5
3,116,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,377 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,770 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,460 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,399 UART: [afmc] --
3,159,289 UART: [cold-reset] --
3,160,057 UART: [state] Locking Datavault
3,161,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,836 UART: [state] Locking ICCM
3,162,300 UART: [exit] Launching FMC @ 0x40000130
3,167,629 UART:
3,167,645 UART: Running Caliptra FMC ...
3,168,053 UART:
3,168,196 UART: [state] CFI Enabled
3,178,671 UART: [fht] FMC Alias Private Key: 7
3,286,244 UART: [art] Extend RT PCRs Done
3,286,672 UART: [art] Lock RT PCRs Done
3,288,290 UART: [art] Populate DV Done
3,296,605 UART: [fht] FMC Alias Private Key: 7
3,297,731 UART: [art] Derive CDI
3,298,011 UART: [art] Store in in slot 0x4
3,383,220 UART: [art] Derive Key Pair
3,383,580 UART: [art] Store priv key in slot 0x5
3,396,430 UART: [art] Derive Key Pair - Done
3,411,061 UART: [art] Signing Cert with AUTHO
3,411,541 UART: RITY.KEYID = 7
3,426,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,674 UART: [art] PUB.X = B1A8A890751C6BFCDC6D128FC7751558D71180667E4C2BE041318E19099659DBD8D7653646235692937A13118A3EF899
3,434,431 UART: [art] PUB.Y = CE0F388D968A448C30ED469702D764CCBD4F6F79687D5CD3E3F08892F393B7AB85BDA6D7888ED46853F3D09C39A7705E
3,441,383 UART: [art] SIG.R = 4DA3DA8A383FB74C5FEE4399A2049199C157130CF2E3584A5BB6FCD8E66BB8FF32DE974669C9B8BBAB75CCE67CF182F2
3,448,167 UART: [art] SIG.S = 19335DCDBB9C4BEF7C3FF7659B0EF1E0FB24B9C4254DC0AD493FAB2560A3B5D66EEA8A0327E71EE47F92C6FE9E99381D
3,471,380 UART: Caliptra RT
3,471,725 UART: [state] CFI Enabled
3,579,049 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,739 UART: [rt]cmd =0x43415053, len=4
3,611,108 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,666 ready_for_fw is high
1,362,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,435 >>> mbox cmd response: success
2,928,435 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,990,327 UART:
2,990,343 UART: Running Caliptra FMC ...
2,990,751 UART:
2,990,894 UART: [state] CFI Enabled
3,001,489 UART: [fht] FMC Alias Private Key: 7
3,109,252 UART: [art] Extend RT PCRs Done
3,109,680 UART: [art] Lock RT PCRs Done
3,111,182 UART: [art] Populate DV Done
3,119,501 UART: [fht] FMC Alias Private Key: 7
3,120,559 UART: [art] Derive CDI
3,120,839 UART: [art] Store in in slot 0x4
3,206,656 UART: [art] Derive Key Pair
3,207,016 UART: [art] Store priv key in slot 0x5
3,220,252 UART: [art] Derive Key Pair - Done
3,234,540 UART: [art] Signing Cert with AUTHO
3,235,020 UART: RITY.KEYID = 7
3,250,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,001 UART: [art] PUB.X = 92B1B85CD3A0AD346BF0D1D524FA5AFCA42EBDBA51ACB47035755DC8857595F580AD4DF42E71B1EC8EFB1EE0271CA0A1
3,257,797 UART: [art] PUB.Y = 25CDBC6C97928BD839368DF4CC166C76419097EA12875F2DA827F66ED9FC3DED1B3E718C2FBD13693C814CF2166808BC
3,264,754 UART: [art] SIG.R = CEC5B13CF6C9D5E4BBC2BD0A6C77F5F5C0FF2202C68EFB404263BFC823C54F26DF27F9F746C09BBB406AF8F371598FE5
3,271,542 UART: [art] SIG.S = 1C1BABC109CC5133902DCC0E70C98C89948DD0E7B6F823833AE5A54151126C98847B12D5E48C6ACA0620D5BF3C54FE65
3,295,532 UART: Caliptra RT
3,295,877 UART: [state] CFI Enabled
3,403,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,436 UART: [rt]cmd =0x43415053, len=4
3,435,515 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
902,065 UART: [kat] SHA2-256
904,005 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,684 UART: [kat] HMAC-384Kdf
923,294 UART: [kat] LMS
1,171,622 UART: [kat] --
1,172,245 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,262 UART: [idev] ++
1,175,430 UART: [idev] CDI.KEYID = 6
1,175,790 UART: [idev] SUBJECT.KEYID = 7
1,176,214 UART: [idev] UDS.KEYID = 0
1,176,559 ready_for_fw is high
1,176,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,228 UART: [idev] Erasing UDS.KEYID = 0
1,201,093 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,743 UART: [ldev] ++
1,210,911 UART: [ldev] CDI.KEYID = 6
1,211,274 UART: [ldev] SUBJECT.KEYID = 5
1,211,700 UART: [ldev] AUTHORITY.KEYID = 7
1,212,163 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,710 UART: [fwproc] Recv command 0x46574c44
1,283,438 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,485 >>> mbox cmd response: success
2,773,485 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,511 UART: [afmc] ++
2,774,679 UART: [afmc] CDI.KEYID = 6
2,775,041 UART: [afmc] SUBJECT.KEYID = 7
2,775,466 UART: [afmc] AUTHORITY.KEYID = 5
2,811,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,482 UART: [afmc] --
2,854,372 UART: [cold-reset] --
2,855,508 UART: [state] Locking Datavault
2,856,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,159 UART: [state] Locking ICCM
2,857,653 UART: [exit] Launching FMC @ 0x40000130
2,862,982 UART:
2,862,998 UART: Running Caliptra FMC ...
2,863,406 UART:
2,863,460 UART: [state] CFI Enabled
2,874,217 UART: [fht] FMC Alias Private Key: 7
2,982,006 UART: [art] Extend RT PCRs Done
2,982,434 UART: [art] Lock RT PCRs Done
2,983,954 UART: [art] Populate DV Done
2,992,145 UART: [fht] FMC Alias Private Key: 7
2,993,171 UART: [art] Derive CDI
2,993,451 UART: [art] Store in in slot 0x4
3,079,194 UART: [art] Derive Key Pair
3,079,554 UART: [art] Store priv key in slot 0x5
3,092,690 UART: [art] Derive Key Pair - Done
3,107,330 UART: [art] Signing Cert with AUTHO
3,107,810 UART: RITY.KEYID = 7
3,122,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,723 UART: [art] PUB.X = DE7BDAE8C455521038D6AFE0A598B40D969A18BCB454049691698CE43A58EEEB3037CE1F26E3D3C585FC7DED4270839B
3,130,499 UART: [art] PUB.Y = 4B9E12A48BB5B017C5BD22C66ADA19EDFA0EFFDA404B80BAFA3C75EACA3E2C19AD45ECA8D8A01F72230A1600C20D39A9
3,137,448 UART: [art] SIG.R = A01C609D2315B08EFA12AAD16C273E44BC7C387DC7B719A92602F1029239F98E2C9215D1430B65E45D5F6494D8BAF9C1
3,144,213 UART: [art] SIG.S = 47AACD517FE35254196B6F77EB9CEF57086C4200485109025FB28917E2833BB3AFEDFE4E4677F501E0BC300A0BBA41D7
3,168,118 UART: Caliptra RT
3,168,371 UART: [state] CFI Enabled
3,276,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,812 UART: [rt]cmd =0x43415053, len=4
3,307,905 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 ready_for_fw is high
1,060,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,020 >>> mbox cmd response: success
2,628,020 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,690,550 UART:
2,690,566 UART: Running Caliptra FMC ...
2,690,974 UART:
2,691,028 UART: [state] CFI Enabled
2,701,669 UART: [fht] FMC Alias Private Key: 7
2,809,416 UART: [art] Extend RT PCRs Done
2,809,844 UART: [art] Lock RT PCRs Done
2,811,282 UART: [art] Populate DV Done
2,819,505 UART: [fht] FMC Alias Private Key: 7
2,820,581 UART: [art] Derive CDI
2,820,861 UART: [art] Store in in slot 0x4
2,906,828 UART: [art] Derive Key Pair
2,907,188 UART: [art] Store priv key in slot 0x5
2,920,338 UART: [art] Derive Key Pair - Done
2,935,209 UART: [art] Signing Cert with AUTHO
2,935,689 UART: RITY.KEYID = 7
2,950,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,516 UART: [art] PUB.X = 0751EB6FB310013F6601B623CDFAC32D23C08F9135F913F4E5CBFA4D645F001846C4867F405156EE41DF761C30548454
2,958,253 UART: [art] PUB.Y = 0C41A8BF431CADC122A4C2EC9F17430D11F134BC221C43572130BE3F4411CEEC0770A66C24AACCE2E1FA26D2DCD571D2
2,965,212 UART: [art] SIG.R = E773B7DDA5B12575CDDDCABE6D4BDFB7C6C0EA23731ABE05F082ABD6FD203313E56A25BAD0297F9311BAB74D922FFBB7
2,972,009 UART: [art] SIG.S = FC5CAD19279D8CE119B32FC54CDB69E7EF06F419917EB636A2D202826F1822D21687C094D854D8D7B9AE27A62C120BFA
2,995,719 UART: Caliptra RT
2,995,972 UART: [state] CFI Enabled
3,103,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,140 UART: [rt]cmd =0x43415053, len=4
3,135,347 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,726 UART: [kat] SHA2-256
903,666 UART: [kat] SHA2-384
906,401 UART: [kat] SHA2-512-ACC
908,302 UART: [kat] ECC-384
917,903 UART: [kat] HMAC-384Kdf
922,569 UART: [kat] LMS
1,170,897 UART: [kat] --
1,171,470 UART: [cold-reset] ++
1,171,816 UART: [fht] FHT @ 0x50003400
1,174,451 UART: [idev] ++
1,174,619 UART: [idev] CDI.KEYID = 6
1,174,979 UART: [idev] SUBJECT.KEYID = 7
1,175,403 UART: [idev] UDS.KEYID = 0
1,175,748 ready_for_fw is high
1,175,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,224 UART: [idev] Sha1 KeyId Algorithm
1,209,620 UART: [idev] --
1,210,674 UART: [ldev] ++
1,210,842 UART: [ldev] CDI.KEYID = 6
1,211,205 UART: [ldev] SUBJECT.KEYID = 5
1,211,631 UART: [ldev] AUTHORITY.KEYID = 7
1,212,094 UART: [ldev] FE.KEYID = 1
1,217,280 UART: [ldev] Erasing FE.KEYID = 1
1,243,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,480 UART: [ldev] --
1,282,957 UART: [fwproc] Wait for Commands...
1,283,683 UART: [fwproc] Recv command 0x46574c44
1,284,411 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,770 >>> mbox cmd response: success
2,774,770 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,914 UART: [afmc] ++
2,776,082 UART: [afmc] CDI.KEYID = 6
2,776,444 UART: [afmc] SUBJECT.KEYID = 7
2,776,869 UART: [afmc] AUTHORITY.KEYID = 5
2,812,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,196 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,681 UART: [afmc] --
2,855,751 UART: [cold-reset] --
2,856,847 UART: [state] Locking Datavault
2,858,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,738 UART: [state] Locking ICCM
2,859,214 UART: [exit] Launching FMC @ 0x40000130
2,864,543 UART:
2,864,559 UART: Running Caliptra FMC ...
2,864,967 UART:
2,865,110 UART: [state] CFI Enabled
2,875,543 UART: [fht] FMC Alias Private Key: 7
2,983,632 UART: [art] Extend RT PCRs Done
2,984,060 UART: [art] Lock RT PCRs Done
2,985,604 UART: [art] Populate DV Done
2,994,037 UART: [fht] FMC Alias Private Key: 7
2,995,085 UART: [art] Derive CDI
2,995,365 UART: [art] Store in in slot 0x4
3,081,290 UART: [art] Derive Key Pair
3,081,650 UART: [art] Store priv key in slot 0x5
3,095,452 UART: [art] Derive Key Pair - Done
3,110,350 UART: [art] Signing Cert with AUTHO
3,110,830 UART: RITY.KEYID = 7
3,126,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,447 UART: [art] PUB.X = F164E2D81BC1B5AF34E37F3EC563A6D29E6EEFA3E130D0720B588F761463C38CB66B2A3661041A6FE8D6B49198F1503E
3,134,219 UART: [art] PUB.Y = F3ECBD2F5D17D5304BF2B36E9AFF0AC917E55FB4D225A82B76D6DE67F7F6F114EB812BEA3EC70CBF0F3F9A0E500655F7
3,141,180 UART: [art] SIG.R = 6E453370D25570CEFAABE589664C4442CDBC3E5CFF707C05C356BEB530671A1BCAF2B4FDFF65CB374C6CA6786F29C0EA
3,147,969 UART: [art] SIG.S = BE37701AC0397B53DE236B181DAF44C3A3F0CFDD825205448643DCCE8F5D9F525D99D99F2951C983AAB85B98CFE8E9CA
3,172,241 UART: Caliptra RT
3,172,586 UART: [state] CFI Enabled
3,280,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,597 UART: [rt]cmd =0x43415053, len=4
3,312,634 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,742 ready_for_fw is high
1,061,742 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,361 >>> mbox cmd response: success
2,628,361 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,690,825 UART:
2,690,841 UART: Running Caliptra FMC ...
2,691,249 UART:
2,691,392 UART: [state] CFI Enabled
2,702,251 UART: [fht] FMC Alias Private Key: 7
2,809,880 UART: [art] Extend RT PCRs Done
2,810,308 UART: [art] Lock RT PCRs Done
2,811,696 UART: [art] Populate DV Done
2,819,795 UART: [fht] FMC Alias Private Key: 7
2,820,897 UART: [art] Derive CDI
2,821,177 UART: [art] Store in in slot 0x4
2,906,998 UART: [art] Derive Key Pair
2,907,358 UART: [art] Store priv key in slot 0x5
2,920,704 UART: [art] Derive Key Pair - Done
2,935,420 UART: [art] Signing Cert with AUTHO
2,935,900 UART: RITY.KEYID = 7
2,951,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,771 UART: [art] PUB.X = 207734D8CBFAB9022DA570F56EEAE1B170616461FB1C47EDFEB40FD4C534B104312BD7B4F9215CBD08A25194DE3D2443
2,958,541 UART: [art] PUB.Y = 0C171615E136AA47CD217D21DEE783366C24B9509FAA4FF238CE69C32A4F1FA43CF8B67536936F32465358FAB72801E1
2,965,487 UART: [art] SIG.R = 1CE86A74F95D59AF3FC4B78A2DA377397E5F286B3F906B7317F8F60BFF7B00157CFD7C37D22AEFBD374935879BBC6526
2,972,244 UART: [art] SIG.S = 60BFCD4BAF5134A115152A9E8CDDF46B75CD76E7AC8CA929E7082AF33C08E9511A67A259DD7A8FC3247023EF7519B0A0
2,995,623 UART: Caliptra RT
2,995,968 UART: [state] CFI Enabled
3,105,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,693 UART: [rt]cmd =0x43415053, len=4
3,136,832 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 ready_for_fw is high
1,173,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,160 UART: [ldev] ++
1,208,328 UART: [ldev] CDI.KEYID = 6
1,208,692 UART: [ldev] SUBJECT.KEYID = 5
1,209,119 UART: [ldev] AUTHORITY.KEYID = 7
1,209,582 UART: [ldev] FE.KEYID = 1
1,214,968 UART: [ldev] Erasing FE.KEYID = 1
1,241,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,144 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,145 UART: [fwproc] Recv command 0x46574c44
1,281,878 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,867 >>> mbox cmd response: success
2,772,867 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,773,964 UART: [afmc] ++
2,774,132 UART: [afmc] CDI.KEYID = 6
2,774,495 UART: [afmc] SUBJECT.KEYID = 7
2,774,921 UART: [afmc] AUTHORITY.KEYID = 5
2,810,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,477 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,563 UART: [afmc] --
2,853,603 UART: [cold-reset] --
2,854,499 UART: [state] Locking Datavault
2,856,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,612 UART: [state] Locking ICCM
2,857,198 UART: [exit] Launching FMC @ 0x40000130
2,862,527 UART:
2,862,543 UART: Running Caliptra FMC ...
2,862,951 UART:
2,863,005 UART: [state] CFI Enabled
2,873,302 UART: [fht] FMC Alias Private Key: 7
2,981,545 UART: [art] Extend RT PCRs Done
2,981,973 UART: [art] Lock RT PCRs Done
2,983,635 UART: [art] Populate DV Done
2,991,792 UART: [fht] FMC Alias Private Key: 7
2,992,798 UART: [art] Derive CDI
2,993,078 UART: [art] Store in in slot 0x4
3,078,793 UART: [art] Derive Key Pair
3,079,153 UART: [art] Store priv key in slot 0x5
3,092,317 UART: [art] Derive Key Pair - Done
3,107,178 UART: [art] Signing Cert with AUTHO
3,107,658 UART: RITY.KEYID = 7
3,122,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,671 UART: [art] PUB.X = 3C13E90D6A3A14BCC9397F39EF5E373D80D51B5BD027657D98426DAB71518638281A1B58E589F8D5CFC4145F8CB81C3B
3,130,444 UART: [art] PUB.Y = E052A06245E8DDCEF550C8E68D13280194C998EBA96932F609576A21DB8D4529FDE100E2FF3A70AE64C21D025F647F25
3,137,367 UART: [art] SIG.R = 15E9928F308F3C0CBE50C820FE76623465B69B52FE1A8E155EC9E4B0E8B9EE64CCB28847E99E27C98646531DC8042570
3,144,133 UART: [art] SIG.S = C5DDD1A79222A82C451AA82456AEAABE048D027F6C98194BF1A01BAC677FBF55436B5DFE1180A93CB04F4DFD6BD67BBF
3,167,594 UART: Caliptra RT
3,167,847 UART: [state] CFI Enabled
3,275,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,962 UART: [rt]cmd =0x43415053, len=4
3,307,357 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 ready_for_fw is high
1,055,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,793 >>> mbox cmd response: success
2,620,793 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,683,351 UART:
2,683,367 UART: Running Caliptra FMC ...
2,683,775 UART:
2,683,829 UART: [state] CFI Enabled
2,694,228 UART: [fht] FMC Alias Private Key: 7
2,801,435 UART: [art] Extend RT PCRs Done
2,801,863 UART: [art] Lock RT PCRs Done
2,803,441 UART: [art] Populate DV Done
2,811,822 UART: [fht] FMC Alias Private Key: 7
2,812,870 UART: [art] Derive CDI
2,813,150 UART: [art] Store in in slot 0x4
2,898,809 UART: [art] Derive Key Pair
2,899,169 UART: [art] Store priv key in slot 0x5
2,912,335 UART: [art] Derive Key Pair - Done
2,926,956 UART: [art] Signing Cert with AUTHO
2,927,436 UART: RITY.KEYID = 7
2,942,742 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,507 UART: [art] PUB.X = 908D440B292E73F4378DC91E5A0BC8E40681D45AE20ACD807588F8EDECEA535BBDC3B07770472B5295A8766FDEDA242C
2,950,277 UART: [art] PUB.Y = 5A41343B3F4565B0717E6F7DFC9B56FC5E244A36891BEAB6A297627EDD4C15B5964621E0E9FE96FED67A116546AB4BF2
2,957,237 UART: [art] SIG.R = 98D937FAF553DA2C191E0144EF53982427E55559CE9BD8DA4B2C0E795C2A61A75268A43E122DA473F41D456FFDFF0AF1
2,964,008 UART: [art] SIG.S = 078C449CB474C30A1117DB7817DF53E8FC82330D08248E0523D8F65860F4531767B79509637B4D55B844E7AE86B694BC
2,987,479 UART: Caliptra RT
2,987,732 UART: [state] CFI Enabled
3,096,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,583 UART: [rt]cmd =0x43415053, len=4
3,127,782 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,174,952 ready_for_fw is high
1,174,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,350 UART: [idev] Sha1 KeyId Algorithm
1,209,290 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,217,039 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,451 UART: [ldev] --
1,282,809 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,193 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,470 >>> mbox cmd response: success
2,773,470 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,497 UART: [afmc] ++
2,774,665 UART: [afmc] CDI.KEYID = 6
2,775,028 UART: [afmc] SUBJECT.KEYID = 7
2,775,454 UART: [afmc] AUTHORITY.KEYID = 5
2,811,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,347 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,949 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,712 UART: [afmc] --
2,854,674 UART: [cold-reset] --
2,855,584 UART: [state] Locking Datavault
2,856,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,299 UART: [state] Locking ICCM
2,857,775 UART: [exit] Launching FMC @ 0x40000130
2,863,104 UART:
2,863,120 UART: Running Caliptra FMC ...
2,863,528 UART:
2,863,671 UART: [state] CFI Enabled
2,874,202 UART: [fht] FMC Alias Private Key: 7
2,982,763 UART: [art] Extend RT PCRs Done
2,983,191 UART: [art] Lock RT PCRs Done
2,984,911 UART: [art] Populate DV Done
2,993,336 UART: [fht] FMC Alias Private Key: 7
2,994,344 UART: [art] Derive CDI
2,994,624 UART: [art] Store in in slot 0x4
3,080,339 UART: [art] Derive Key Pair
3,080,699 UART: [art] Store priv key in slot 0x5
3,094,213 UART: [art] Derive Key Pair - Done
3,109,210 UART: [art] Signing Cert with AUTHO
3,109,690 UART: RITY.KEYID = 7
3,125,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,847 UART: [art] PUB.X = BF94CDB7749441E25DBCEE0E8A80CEC27C1E2EFD0967581624C1726DCB9357E0131268B1507FB0B6E98F3D4C831387AC
3,132,621 UART: [art] PUB.Y = 752F811BCE88B70E26FB3062013F270545F83A7D18A8C4F829143ADEECA2ACD47A1094E3ADDCB594CBBBCED3D9C6DDD3
3,139,586 UART: [art] SIG.R = F279F0221C3CD6DF409CE1BD1A54F912E70650CA62CD5A3BEC027C0BADC9861F8207E3E2E3C0F396BB60659056EF7DA0
3,146,360 UART: [art] SIG.S = D08AA4E87D3CB4F3A19899CB5BBA94974BF3A06E5B1FBCA478148F488EB75E84B3F4488AA65A74C325829834FC03D390
3,170,092 UART: Caliptra RT
3,170,437 UART: [state] CFI Enabled
3,279,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,977 UART: [rt]cmd =0x43415053, len=4
3,311,104 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,197 ready_for_fw is high
1,056,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,960 >>> mbox cmd response: success
2,621,960 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,684,520 UART:
2,684,536 UART: Running Caliptra FMC ...
2,684,944 UART:
2,685,087 UART: [state] CFI Enabled
2,695,486 UART: [fht] FMC Alias Private Key: 7
2,803,023 UART: [art] Extend RT PCRs Done
2,803,451 UART: [art] Lock RT PCRs Done
2,805,035 UART: [art] Populate DV Done
2,813,340 UART: [fht] FMC Alias Private Key: 7
2,814,390 UART: [art] Derive CDI
2,814,670 UART: [art] Store in in slot 0x4
2,899,873 UART: [art] Derive Key Pair
2,900,233 UART: [art] Store priv key in slot 0x5
2,913,347 UART: [art] Derive Key Pair - Done
2,928,240 UART: [art] Signing Cert with AUTHO
2,928,720 UART: RITY.KEYID = 7
2,943,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,577 UART: [art] PUB.X = 0E0178BD455EE8632780AF8B97A39472F514F94C6E56255012F0F3A506A33FFB417CD8DF2A7DC0716827879DDA9E9E70
2,951,340 UART: [art] PUB.Y = FE9F623CE61283EBD4B508E7F3D2EC40627A649E0F2BBC6BC3DA3C1788CA719A6FB0B47A69B706AA8FDAA34FEB3677DE
2,958,307 UART: [art] SIG.R = 76A960B14EC800235267D549F383F8925279834524D85E5D02E4F22D5DC6F8E08ADA43EDE84C8D41CFB70E66AD3FAFEB
2,965,059 UART: [art] SIG.S = 46B28493E6DC6C4083267439AFCE2197A5FDA1C4C42A74978C39CB9E7BDE619DDBC563291FF83B39EA531E122CDD8244
2,988,650 UART: Caliptra RT
2,988,995 UART: [state] CFI Enabled
3,097,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,200 UART: [rt]cmd =0x43415053, len=4
3,129,459 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
Truncated 2120 bytes from beginning
,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,192 UART: [ldev] --
1,585,697 UART: [fwproc] Waiting for Commands...
1,586,412 UART: [fwproc] Received command 0x46574c44
1,587,203 UART: [fwproc] Received Image of size 114332 bytes
2,885,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,945 >>> mbox cmd response: success
3,076,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,191 UART: [afmc] ++
3,078,359 UART: [afmc] CDI.KEYID = 6
3,078,721 UART: [afmc] SUBJECT.KEYID = 7
3,079,146 UART: [afmc] AUTHORITY.KEYID = 5
3,114,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,690 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,470 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,162 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,143,035 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,148,749 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,680 UART: [afmc] --
3,157,754 UART: [cold-reset] --
3,158,552 UART: [state] Locking Datavault
3,159,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,361 UART: [state] Locking ICCM
3,160,813 UART: [exit] Launching FMC @ 0x40000130
3,166,142 UART:
3,166,158 UART: Running Caliptra FMC ...
3,166,566 UART:
3,166,620 UART: [state] CFI Enabled
3,177,084 UART: [fht] FMC Alias Private Key: 7
3,284,967 UART: [art] Extend RT PCRs Done
3,285,395 UART: [art] Lock RT PCRs Done
3,286,597 UART: [art] Populate DV Done
3,294,899 UART: [fht] FMC Alias Private Key: 7
3,295,907 UART: [art] Derive CDI
3,296,187 UART: [art] Store in in slot 0x4
3,381,614 UART: [art] Derive Key Pair
3,381,974 UART: [art] Store priv key in slot 0x5
3,394,750 UART: [art] Derive Key Pair - Done
3,409,864 UART: [art] Signing Cert with AUTHO
3,410,344 UART: RITY.KEYID = 7
3,425,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,301 UART: [art] PUB.X = 34C8C7B14ACFBF7C17F187DD4EAA2FD908F510942B83A85F756138116857A979FD27FDF9D894B8B2D19C2369E17CECD2
3,433,080 UART: [art] PUB.Y = A907DDF66F08EF7012C89DD13085BF7AD6DB268E7D6A581E508A55DB77478C55293BECF658A363D853C0AD7769F1E012
3,440,032 UART: [art] SIG.R = 9A571A18F4B241C55CEEDF152BD83E89D6E6130539A1E4E2BAD48C0FFC32441416BFC388127637FFF3E764A95C40F907
3,446,801 UART: [art] SIG.S = 8AD4FFBA4A9827C7857ED23A4DA97A0A52720E1AC98D816F245DC4A7B8074FE9B27D4153180A8F0C6525DCFF613EC4D9
3,470,585 UART: Caliptra RT
3,470,838 UART: [state] CFI Enabled
3,579,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,768 UART: [rt]cmd =0x494e464f, len=4
3,613,391 >>> mbox cmd response data (312 bytes)
3,613,392 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,298 UART:
3,614,314 UART: Running Caliptra ROM ...
3,614,722 UART:
3,614,776 UART: [state] CFI Enabled
3,617,618 UART: [state] LifecycleState = Unprovisioned
3,618,273 UART: [state] DebugLocked = No
3,618,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,464 UART: [kat] SHA2-256
4,414,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,510 UART: [kat] ++
4,418,662 UART: [kat] sha1
4,422,920 UART: [kat] SHA2-256
4,424,858 UART: [kat] SHA2-384
4,427,579 UART: [kat] SHA2-512-ACC
4,429,479 UART: [kat] ECC-384
4,434,998 UART: [kat] HMAC-384Kdf
4,439,424 UART: [kat] LMS
5,007,620 UART: [kat] --
5,008,423 UART: [update-reset] ++
6,342,316 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,343,536 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,493,412 >>> mbox cmd response: success
6,493,649 UART: [update-reset] Copying MAN_2 To MAN_1
6,501,663 UART: [update-reset Success] --
6,502,618 UART: [state] Locking Datavault
6,503,258 UART: [state] Locking PCR0, PCR1 and PCR31
6,503,862 UART: [state] Locking ICCM
6,504,440 UART: [exit] Launching FMC @ 0x40000130
6,509,769 UART:
6,509,785 UART: Running Caliptra FMC ...
6,510,193 UART:
6,510,247 UART: [state] CFI Enabled
6,599,300 UART: [art] Extend RT PCRs Done
6,599,728 UART: [art] Lock RT PCRs Done
6,600,809 UART: [art] Populate DV Done
6,609,157 UART: [fht] FMC Alias Private Key: 7
6,610,127 UART: [art] Derive CDI
6,610,407 UART: [art] Store in in slot 0x4
6,696,354 UART: [art] Derive Key Pair
6,696,714 UART: [art] Store priv key in slot 0x5
6,710,096 UART: [art] Derive Key Pair - Done
6,724,798 UART: [art] Signing Cert with AUTHO
6,725,278 UART: RITY.KEYID = 7
6,740,472 UART: [art] Erasing AUTHORITY.KEYID = 7
6,741,237 UART: [art] PUB.X = 8A80744AF72B14B854453FCE1638747C864D0458986DC55644ED781D0929912305BF1FCB1E7ACE8E15B8FD6E73548D88
6,747,996 UART: [art] PUB.Y = 2AAE14CA5825BFBC87180F99C54372F3668B752BEECACE6B272FA8243235A52E61AE76D677F24AB12D5A6311E5F05D6B
6,754,955 UART: [art] SIG.R = B38AFF0853926AD51540F0CD7151A3DD2591A0BCE63C726410782024CC6EEEFF99D4E0EAEF171789269E7B3BDCA0D674
6,761,734 UART: [art] SIG.S = 89B8FFA73AB25C195038954AA5894E2F028E258EDC2E4A202FAA9B4C2B1C545F83FEC24652B359677F8BD7B701CCD9C4
6,785,285 UART: Caliptra RT
6,785,538 UART: [state] CFI Enabled
7,066,478 UART: [rt] RT listening for mailbox commands...
7,067,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,749 UART: [rt]cmd =0x494e464f, len=4
7,100,502 >>> mbox cmd response data (312 bytes)
7,100,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,101,427 UART:
7,101,443 UART: Running Caliptra ROM ...
7,101,851 UART:
7,101,905 UART: [state] CFI Enabled
7,104,437 UART: [state] LifecycleState = Unprovisioned
7,105,092 UART: [state] DebugLocked = No
7,105,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,107,305 UART: [kat] SHA2-256
7,901,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,905,351 UART: [kat] ++
7,905,503 UART: [kat] sha1
7,909,803 UART: [kat] SHA2-256
7,911,741 UART: [kat] SHA2-384
7,914,520 UART: [kat] SHA2-512-ACC
7,916,420 UART: [kat] ECC-384
7,921,957 UART: [kat] HMAC-384Kdf
7,926,683 UART: [kat] LMS
8,494,879 UART: [kat] --
8,495,602 UART: [update-reset] ++
9,829,929 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,831,203 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
9,981,079 >>> mbox cmd response: success
9,981,366 UART: [update-reset] Copying MAN_2 To MAN_1
9,989,380 UART: [update-reset Success] --
9,990,595 UART: [state] Locking Datavault
9,991,175 UART: [state] Locking PCR0, PCR1 and PCR31
9,991,779 UART: [state] Locking ICCM
9,992,245 UART: [exit] Launching FMC @ 0x40000130
9,997,574 UART:
9,997,590 UART: Running Caliptra FMC ...
9,997,998 UART:
9,998,052 UART: [state] CFI Enabled
10,086,867 UART: [art] Extend RT PCRs Done
10,087,295 UART: [art] Lock RT PCRs Done
10,088,648 UART: [art] Populate DV Done
10,096,712 UART: [fht] FMC Alias Private Key: 7
10,097,842 UART: [art] Derive CDI
10,098,122 UART: [art] Store in in slot 0x4
10,183,569 UART: [art] Derive Key Pair
10,183,929 UART: [art] Store priv key in slot 0x5
10,197,309 UART: [art] Derive Key Pair - Done
10,212,100 UART: [art] Signing Cert with AUTHO
10,212,580 UART: RITY.KEYID = 7
10,227,860 UART: [art] Erasing AUTHORITY.KEYID = 7
10,228,625 UART: [art] PUB.X = 24F0AF5A9EA269FD4E2CA16B12D4D45B8037B3761AF28FF6269E5AFBCAA52D2273EC1B129B931538A4BDDE08E547B3F7
10,235,410 UART: [art] PUB.Y = 6619B9B6FD645199D1EBA5E627F268A0271F2A57678117A8CEA2FAF8C85A2B0787AF7D6B2E30D9246D2A5FF5B9A63CE8
10,242,369 UART: [art] SIG.R = 522B7E2BB2956FC5406053C566495492E9A2ADADC77177A11E87F75CA10BB0766A5EA056D44B6004264965B9871B4684
10,249,127 UART: [art] SIG.S = D0B6BFE76F899DABCD295F8C4765ADD810C1A07AD565D7598F3BB2B5ADE3FF8B44E57E8A19D26B89922237C5B4929A01
10,272,621 UART: Caliptra RT
10,272,874 UART: [state] CFI Enabled
10,555,999 UART: [rt] RT listening for mailbox commands...
10,556,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,586,378 UART: [rt]cmd =0x494e464f, len=4
10,590,209 >>> mbox cmd response data (312 bytes)
10,590,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,591,220 UART:
10,591,236 UART: Running Caliptra ROM ...
10,591,644 UART:
10,591,698 UART: [state] CFI Enabled
10,594,586 UART: [state] LifecycleState = Unprovisioned
10,595,241 UART: [state] DebugLocked = No
10,595,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,597,486 UART: [kat] SHA2-256
11,391,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,395,532 UART: [kat] ++
11,395,684 UART: [kat] sha1
11,399,984 UART: [kat] SHA2-256
11,401,922 UART: [kat] SHA2-384
11,404,759 UART: [kat] SHA2-512-ACC
11,406,659 UART: [kat] ECC-384
11,411,882 UART: [kat] HMAC-384Kdf
11,416,490 UART: [kat] LMS
11,984,686 UART: [kat] --
11,985,815 UART: [update-reset] ++
13,320,966 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,322,004 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,471,880 >>> mbox cmd response: success
13,472,173 UART: [update-reset] Copying MAN_2 To MAN_1
13,480,187 UART: [update-reset Success] --
13,481,316 UART: [state] Locking Datavault
13,482,302 UART: [state] Locking PCR0, PCR1 and PCR31
13,482,906 UART: [state] Locking ICCM
13,483,406 UART: [exit] Launching FMC @ 0x40000130
13,488,735 UART:
13,488,751 UART: Running Caliptra FMC ...
13,489,159 UART:
13,489,213 UART: [state] CFI Enabled
13,578,356 UART: [art] Extend RT PCRs Done
13,578,784 UART: [art] Lock RT PCRs Done
13,579,857 UART: [art] Populate DV Done
13,588,115 UART: [fht] FMC Alias Private Key: 7
13,589,061 UART: [art] Derive CDI
13,589,341 UART: [art] Store in in slot 0x4
13,674,690 UART: [art] Derive Key Pair
13,675,050 UART: [art] Store priv key in slot 0x5
13,688,738 UART: [art] Derive Key Pair - Done
13,703,648 UART: [art] Signing Cert with AUTHO
13,704,128 UART: RITY.KEYID = 7
13,719,180 UART: [art] Erasing AUTHORITY.KEYID = 7
13,719,945 UART: [art] PUB.X = 8A80744AF72B14B854453FCE1638747C864D0458986DC55644ED781D0929912305BF1FCB1E7ACE8E15B8FD6E73548D88
13,726,704 UART: [art] PUB.Y = 2AAE14CA5825BFBC87180F99C54372F3668B752BEECACE6B272FA8243235A52E61AE76D677F24AB12D5A6311E5F05D6B
13,733,663 UART: [art] SIG.R = B38AFF0853926AD51540F0CD7151A3DD2591A0BCE63C726410782024CC6EEEFF99D4E0EAEF171789269E7B3BDCA0D674
13,740,442 UART: [art] SIG.S = 89B8FFA73AB25C195038954AA5894E2F028E258EDC2E4A202FAA9B4C2B1C545F83FEC24652B359677F8BD7B701CCD9C4
13,764,195 UART: Caliptra RT
13,764,448 UART: [state] CFI Enabled
14,048,552 UART: [rt] RT listening for mailbox commands...
14,049,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,078,599 UART: [rt]cmd =0x494e464f, len=4
14,082,340 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,341 ready_for_fw is high
1,362,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,319 >>> mbox cmd response: success
2,926,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,987,870 UART:
2,987,886 UART: Running Caliptra FMC ...
2,988,294 UART:
2,988,348 UART: [state] CFI Enabled
2,998,886 UART: [fht] FMC Alias Private Key: 7
3,107,207 UART: [art] Extend RT PCRs Done
3,107,635 UART: [art] Lock RT PCRs Done
3,109,269 UART: [art] Populate DV Done
3,117,265 UART: [fht] FMC Alias Private Key: 7
3,118,361 UART: [art] Derive CDI
3,118,641 UART: [art] Store in in slot 0x4
3,204,146 UART: [art] Derive Key Pair
3,204,506 UART: [art] Store priv key in slot 0x5
3,217,580 UART: [art] Derive Key Pair - Done
3,232,222 UART: [art] Signing Cert with AUTHO
3,232,702 UART: RITY.KEYID = 7
3,248,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,827 UART: [art] PUB.X = 08D51632B52243F04559460FB2D89966B052074731D6B001CDB12AFA86A17CC6CDD04B52A2504E00BBA592B8845008FD
3,255,558 UART: [art] PUB.Y = DA5CC326C1CD6D1FE3A6CD35668829043CDCC81582CA46F19F51ACCA21C093ABA276AE9ED0E9A6395034B165B9AB7BC8
3,262,525 UART: [art] SIG.R = D8FE25584D54E9093A20099FA15F8134577918ABC73C7E0E7FF9215A4A482D247628E809A30C840509BA412578C11F5F
3,269,268 UART: [art] SIG.S = 71B03301653C0BF2875825808F674C88D6F34B6371C17F342A5E914E3C304FF76C5E0F0F1655CF3729B5B9C3772BEE49
3,292,997 UART: Caliptra RT
3,293,250 UART: [state] CFI Enabled
3,400,563 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,365 UART: [rt]cmd =0x494e464f, len=4
3,435,318 >>> mbox cmd response data (312 bytes)
3,435,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,196,025 >>> mbox cmd response: success
6,209,358 UART:
6,209,374 UART: Running Caliptra FMC ...
6,209,782 UART:
6,209,836 UART: [state] CFI Enabled
6,298,731 UART: [art] Extend RT PCRs Done
6,299,159 UART: [art] Lock RT PCRs Done
6,300,754 UART: [art] Populate DV Done
6,309,344 UART: [fht] FMC Alias Private Key: 7
6,310,344 UART: [art] Derive CDI
6,310,624 UART: [art] Store in in slot 0x4
6,396,165 UART: [art] Derive Key Pair
6,396,525 UART: [art] Store priv key in slot 0x5
6,410,061 UART: [art] Derive Key Pair - Done
6,424,806 UART: [art] Signing Cert with AUTHO
6,425,286 UART: RITY.KEYID = 7
6,440,728 UART: [art] Erasing AUTHORITY.KEYID = 7
6,441,493 UART: [art] PUB.X = 411DBD31FFF029D51B35A97505BFB92F4E57A613C82599ED0524C8D8349DC697B7C9C845E586761210426601D2CB7094
6,448,250 UART: [art] PUB.Y = 7488B3CE077748BA9B989D08D2FF1E2C8402D58E887E450A4A142E0CE369462BE598E5A7AF4A39AD42ADE5E34EACB13F
6,455,199 UART: [art] SIG.R = 7450C4111CA6EA8A287A5E23F8CEBCA1347BF96352E0E6108E57CDB40FD35F55D37D8858B7F4D3DEF326C700E9B62D32
6,461,956 UART: [art] SIG.S = FB7BA7A271062FB11E1124FA5AD732126C45688FA72A6962D1C4A67A66566A2B1400A451E7783E67667BAEF003174DF2
6,485,355 UART: Caliptra RT
6,485,608 UART: [state] CFI Enabled
6,766,117 UART: [rt] RT listening for mailbox commands...
6,766,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,796,356 UART: [rt]cmd =0x494e464f, len=4
6,800,143 >>> mbox cmd response data (312 bytes)
6,800,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,561,750 >>> mbox cmd response: success
9,575,031 UART:
9,575,047 UART: Running Caliptra FMC ...
9,575,455 UART:
9,575,509 UART: [state] CFI Enabled
9,664,600 UART: [art] Extend RT PCRs Done
9,665,028 UART: [art] Lock RT PCRs Done
9,666,107 UART: [art] Populate DV Done
9,674,417 UART: [fht] FMC Alias Private Key: 7
9,675,583 UART: [art] Derive CDI
9,675,863 UART: [art] Store in in slot 0x4
9,761,258 UART: [art] Derive Key Pair
9,761,618 UART: [art] Store priv key in slot 0x5
9,774,802 UART: [art] Derive Key Pair - Done
9,789,719 UART: [art] Signing Cert with AUTHO
9,790,199 UART: RITY.KEYID = 7
9,805,435 UART: [art] Erasing AUTHORITY.KEYID = 7
9,806,200 UART: [art] PUB.X = BCFCB8A88FFDD22948815E5A1F437EEFA67B9A2116A65C78CDA3C9D37D15C6D1E7AED3A41D2F2D9F71637F7F32F697D4
9,812,992 UART: [art] PUB.Y = AA25C2F9468CBC2BB6C169B8DE8219439C7DAF75C495B99D11EAD803FA2876645457CF17609B6A91208E92D338190F43
9,819,938 UART: [art] SIG.R = 242AB6B4CF579BD8FB3B6F55DEDE47EDAD8FF1D3BA4A9F800D3D23FAF5012E3BF6262A521887F41EC56317F76908780E
9,826,714 UART: [art] SIG.S = EE7DCA6178678EE6A8D4D79A2FF02E75D48DEDA54CFC9D4EF48A6DBA5AD04842D8487706790CC1B3773A5FE0C791563F
9,850,317 UART: Caliptra RT
9,850,570 UART: [state] CFI Enabled
10,131,457 UART: [rt] RT listening for mailbox commands...
10,132,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,161,582 UART: [rt]cmd =0x494e464f, len=4
10,165,091 >>> mbox cmd response data (312 bytes)
10,165,092 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,926,438 >>> mbox cmd response: success
12,939,831 UART:
12,939,847 UART: Running Caliptra FMC ...
12,940,255 UART:
12,940,309 UART: [state] CFI Enabled
13,029,384 UART: [art] Extend RT PCRs Done
13,029,812 UART: [art] Lock RT PCRs Done
13,031,059 UART: [art] Populate DV Done
13,039,353 UART: [fht] FMC Alias Private Key: 7
13,040,477 UART: [art] Derive CDI
13,040,757 UART: [art] Store in in slot 0x4
13,126,604 UART: [art] Derive Key Pair
13,126,964 UART: [art] Store priv key in slot 0x5
13,139,782 UART: [art] Derive Key Pair - Done
13,154,643 UART: [art] Signing Cert with AUTHO
13,155,123 UART: RITY.KEYID = 7
13,170,485 UART: [art] Erasing AUTHORITY.KEYID = 7
13,171,250 UART: [art] PUB.X = 411DBD31FFF029D51B35A97505BFB92F4E57A613C82599ED0524C8D8349DC697B7C9C845E586761210426601D2CB7094
13,178,007 UART: [art] PUB.Y = 7488B3CE077748BA9B989D08D2FF1E2C8402D58E887E450A4A142E0CE369462BE598E5A7AF4A39AD42ADE5E34EACB13F
13,184,956 UART: [art] SIG.R = 7450C4111CA6EA8A287A5E23F8CEBCA1347BF96352E0E6108E57CDB40FD35F55D37D8858B7F4D3DEF326C700E9B62D32
13,191,713 UART: [art] SIG.S = FB7BA7A271062FB11E1124FA5AD732126C45688FA72A6962D1C4A67A66566A2B1400A451E7783E67667BAEF003174DF2
13,215,758 UART: Caliptra RT
13,216,011 UART: [state] CFI Enabled
13,498,418 UART: [rt] RT listening for mailbox commands...
13,499,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,528,489 UART: [rt]cmd =0x494e464f, len=4
13,532,240 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.79s
Truncated 2120 bytes from beginning
,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,675 UART: [ldev] --
1,585,948 UART: [fwproc] Waiting for Commands...
1,586,731 UART: [fwproc] Received command 0x46574c44
1,587,522 UART: [fwproc] Received Image of size 114332 bytes
2,885,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,216 >>> mbox cmd response: success
3,077,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,362 UART: [afmc] ++
3,078,530 UART: [afmc] CDI.KEYID = 6
3,078,892 UART: [afmc] SUBJECT.KEYID = 7
3,079,317 UART: [afmc] AUTHORITY.KEYID = 5
3,114,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,249 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,029 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,721 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,143,594 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,149,308 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,157,191 UART: [afmc] --
3,158,309 UART: [cold-reset] --
3,159,271 UART: [state] Locking Datavault
3,160,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,180 UART: [state] Locking ICCM
3,161,814 UART: [exit] Launching FMC @ 0x40000130
3,167,143 UART:
3,167,159 UART: Running Caliptra FMC ...
3,167,567 UART:
3,167,710 UART: [state] CFI Enabled
3,178,272 UART: [fht] FMC Alias Private Key: 7
3,286,467 UART: [art] Extend RT PCRs Done
3,286,895 UART: [art] Lock RT PCRs Done
3,288,261 UART: [art] Populate DV Done
3,296,473 UART: [fht] FMC Alias Private Key: 7
3,297,565 UART: [art] Derive CDI
3,297,845 UART: [art] Store in in slot 0x4
3,383,750 UART: [art] Derive Key Pair
3,384,110 UART: [art] Store priv key in slot 0x5
3,397,378 UART: [art] Derive Key Pair - Done
3,411,964 UART: [art] Signing Cert with AUTHO
3,412,444 UART: RITY.KEYID = 7
3,427,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,971 UART: [art] PUB.X = 0C457305C8AC69D2BC51CAA3E9AFE8F30D46682073E0595F91D679B9AC03625B20829F809F10662ADAA0D38F35A737AB
3,434,735 UART: [art] PUB.Y = 6740D2F5CB00FF64BC5456FF9B1D83A46FF2F09804D0545852C1D218B80ADCA104B79DB3EA835A5F94C34F0FF65E42DB
3,441,665 UART: [art] SIG.R = 172B0CD038F695701ABE59ACD4C58B09A26F10C8B553BB941FB7C4A9E0D3F431771146A75BA1A4B8E585D9786E69C20A
3,448,434 UART: [art] SIG.S = 08BFC44EFB69EB594FC9FA057CB36EFF1AE2F4B57F622F5DF9130943E46E1A95E25564E20B1A96D20D276E78D8B947ED
3,472,112 UART: Caliptra RT
3,472,457 UART: [state] CFI Enabled
3,580,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,457 UART: [rt]cmd =0x494e464f, len=4
3,615,036 >>> mbox cmd response data (312 bytes)
3,615,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,663 UART:
3,615,679 UART: Running Caliptra ROM ...
3,616,087 UART:
3,616,228 UART: [state] CFI Enabled
3,618,926 UART: [state] LifecycleState = Unprovisioned
3,619,581 UART: [state] DebugLocked = No
3,620,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,758 UART: [kat] SHA2-256
4,415,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,804 UART: [kat] ++
4,419,956 UART: [kat] sha1
4,424,030 UART: [kat] SHA2-256
4,425,968 UART: [kat] SHA2-384
4,428,601 UART: [kat] SHA2-512-ACC
4,430,501 UART: [kat] ECC-384
4,436,018 UART: [kat] HMAC-384Kdf
4,440,812 UART: [kat] LMS
5,009,008 UART: [kat] --
5,009,777 UART: [update-reset] ++
6,344,084 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,345,278 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,495,154 >>> mbox cmd response: success
6,495,385 UART: [update-reset] Copying MAN_2 To MAN_1
6,503,399 UART: [update-reset Success] --
6,504,544 UART: [state] Locking Datavault
6,505,342 UART: [state] Locking PCR0, PCR1 and PCR31
6,505,946 UART: [state] Locking ICCM
6,506,454 UART: [exit] Launching FMC @ 0x40000130
6,511,783 UART:
6,511,799 UART: Running Caliptra FMC ...
6,512,207 UART:
6,512,350 UART: [state] CFI Enabled
6,601,365 UART: [art] Extend RT PCRs Done
6,601,793 UART: [art] Lock RT PCRs Done
6,603,240 UART: [art] Populate DV Done
6,611,570 UART: [fht] FMC Alias Private Key: 7
6,612,608 UART: [art] Derive CDI
6,612,888 UART: [art] Store in in slot 0x4
6,698,663 UART: [art] Derive Key Pair
6,699,023 UART: [art] Store priv key in slot 0x5
6,712,065 UART: [art] Derive Key Pair - Done
6,726,714 UART: [art] Signing Cert with AUTHO
6,727,194 UART: RITY.KEYID = 7
6,742,772 UART: [art] Erasing AUTHORITY.KEYID = 7
6,743,537 UART: [art] PUB.X = FA2BF88798E45929F34D75A73BC4BE34EAB900B15AB430F578524DFDE64701076F74D42DA89B96581BD93F7BC72CC9C8
6,750,289 UART: [art] PUB.Y = 6ED0DF1B969B08CCD99FDE60388A9C3D73EC6A7C3C1BF3BE40091799A6054EF3414F8749D0699185E24F90D4F32A0BBA
6,757,239 UART: [art] SIG.R = BC6CA37E08F231EC033709779751C86A38534083EB6679C59AFFFAA83D1DF22BA646F0F0701A9B24B9F0620D75309F30
6,763,999 UART: [art] SIG.S = 7081C8696A13AFA243551339DEE9E409CE59CDAB75FF0CCF4F1E6A80F2560231F241BB150154B8BF87544D37A1575740
6,787,650 UART: Caliptra RT
6,787,995 UART: [state] CFI Enabled
7,069,818 UART: [rt] RT listening for mailbox commands...
7,070,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,183 UART: [rt]cmd =0x494e464f, len=4
7,103,862 >>> mbox cmd response data (312 bytes)
7,103,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,104,503 UART:
7,104,519 UART: Running Caliptra ROM ...
7,104,927 UART:
7,105,068 UART: [state] CFI Enabled
7,107,900 UART: [state] LifecycleState = Unprovisioned
7,108,555 UART: [state] DebugLocked = No
7,109,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,110,858 UART: [kat] SHA2-256
7,904,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,908,904 UART: [kat] ++
7,909,056 UART: [kat] sha1
7,913,306 UART: [kat] SHA2-256
7,915,244 UART: [kat] SHA2-384
7,918,017 UART: [kat] SHA2-512-ACC
7,919,917 UART: [kat] ECC-384
7,925,322 UART: [kat] HMAC-384Kdf
7,929,882 UART: [kat] LMS
8,498,078 UART: [kat] --
8,499,331 UART: [update-reset] ++
9,834,006 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,835,182 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
9,985,058 >>> mbox cmd response: success
9,985,287 UART: [update-reset] Copying MAN_2 To MAN_1
9,993,301 UART: [update-reset Success] --
9,994,142 UART: [state] Locking Datavault
9,994,912 UART: [state] Locking PCR0, PCR1 and PCR31
9,995,516 UART: [state] Locking ICCM
9,995,962 UART: [exit] Launching FMC @ 0x40000130
10,001,291 UART:
10,001,307 UART: Running Caliptra FMC ...
10,001,715 UART:
10,001,858 UART: [state] CFI Enabled
10,090,155 UART: [art] Extend RT PCRs Done
10,090,583 UART: [art] Lock RT PCRs Done
10,092,008 UART: [art] Populate DV Done
10,100,084 UART: [fht] FMC Alias Private Key: 7
10,101,246 UART: [art] Derive CDI
10,101,526 UART: [art] Store in in slot 0x4
10,187,433 UART: [art] Derive Key Pair
10,187,793 UART: [art] Store priv key in slot 0x5
10,201,383 UART: [art] Derive Key Pair - Done
10,216,228 UART: [art] Signing Cert with AUTHO
10,216,708 UART: RITY.KEYID = 7
10,231,656 UART: [art] Erasing AUTHORITY.KEYID = 7
10,232,421 UART: [art] PUB.X = C71C6FE03D89CF24F556439D93FF264CBD18113EDC6C332429244E0294C80D087F9FA7869858404BEF8C0EB1F3E5E357
10,239,183 UART: [art] PUB.Y = E810A9BD3D31A5391BE8E43B6B2935C5DE1226B17FC18BAC413A181E4A8EC60E49D2A6A48BFED1C482BD7828D60DA8E6
10,246,145 UART: [art] SIG.R = 725F08340EA4A65936700BC47D94A191A341BEA5563B1AC9B983715BA92177419D6B2EDB07BB1FD5C10BD35D6EED7556
10,252,906 UART: [art] SIG.S = 804F582B939D9D7534BC0E809B61F1655F07B9ABA6DE5C58129D65FFE8914599F1D8CA71377896ABFCA5CB89E87C553F
10,276,635 UART: Caliptra RT
10,276,980 UART: [state] CFI Enabled
10,564,663 UART: [rt] RT listening for mailbox commands...
10,565,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,594,880 UART: [rt]cmd =0x494e464f, len=4
10,598,595 >>> mbox cmd response data (312 bytes)
10,598,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,599,268 UART:
10,599,284 UART: Running Caliptra ROM ...
10,599,692 UART:
10,599,833 UART: [state] CFI Enabled
10,602,559 UART: [state] LifecycleState = Unprovisioned
10,603,214 UART: [state] DebugLocked = No
10,603,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,605,379 UART: [kat] SHA2-256
11,399,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,403,425 UART: [kat] ++
11,403,577 UART: [kat] sha1
11,407,941 UART: [kat] SHA2-256
11,409,879 UART: [kat] SHA2-384
11,412,642 UART: [kat] SHA2-512-ACC
11,414,542 UART: [kat] ECC-384
11,419,841 UART: [kat] HMAC-384Kdf
11,424,517 UART: [kat] LMS
11,992,713 UART: [kat] --
11,993,382 UART: [update-reset] ++
13,327,419 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,328,557 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,478,433 >>> mbox cmd response: success
13,478,688 UART: [update-reset] Copying MAN_2 To MAN_1
13,486,702 UART: [update-reset Success] --
13,487,777 UART: [state] Locking Datavault
13,488,529 UART: [state] Locking PCR0, PCR1 and PCR31
13,489,133 UART: [state] Locking ICCM
13,489,701 UART: [exit] Launching FMC @ 0x40000130
13,495,030 UART:
13,495,046 UART: Running Caliptra FMC ...
13,495,454 UART:
13,495,597 UART: [state] CFI Enabled
13,584,370 UART: [art] Extend RT PCRs Done
13,584,798 UART: [art] Lock RT PCRs Done
13,585,925 UART: [art] Populate DV Done
13,594,117 UART: [fht] FMC Alias Private Key: 7
13,595,049 UART: [art] Derive CDI
13,595,329 UART: [art] Store in in slot 0x4
13,681,166 UART: [art] Derive Key Pair
13,681,526 UART: [art] Store priv key in slot 0x5
13,695,200 UART: [art] Derive Key Pair - Done
13,710,175 UART: [art] Signing Cert with AUTHO
13,710,655 UART: RITY.KEYID = 7
13,726,373 UART: [art] Erasing AUTHORITY.KEYID = 7
13,727,138 UART: [art] PUB.X = FA2BF88798E45929F34D75A73BC4BE34EAB900B15AB430F578524DFDE64701076F74D42DA89B96581BD93F7BC72CC9C8
13,733,890 UART: [art] PUB.Y = 6ED0DF1B969B08CCD99FDE60388A9C3D73EC6A7C3C1BF3BE40091799A6054EF3414F8749D0699185E24F90D4F32A0BBA
13,740,840 UART: [art] SIG.R = BC6CA37E08F231EC033709779751C86A38534083EB6679C59AFFFAA83D1DF22BA646F0F0701A9B24B9F0620D75309F30
13,747,600 UART: [art] SIG.S = 7081C8696A13AFA243551339DEE9E409CE59CDAB75FF0CCF4F1E6A80F2560231F241BB150154B8BF87544D37A1575740
13,771,031 UART: Caliptra RT
13,771,376 UART: [state] CFI Enabled
14,052,653 UART: [rt] RT listening for mailbox commands...
14,053,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,082,900 UART: [rt]cmd =0x494e464f, len=4
14,086,657 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,112 ready_for_fw is high
1,362,112 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,084 >>> mbox cmd response: success
2,927,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,988,517 UART:
2,988,533 UART: Running Caliptra FMC ...
2,988,941 UART:
2,989,084 UART: [state] CFI Enabled
2,999,768 UART: [fht] FMC Alias Private Key: 7
3,107,697 UART: [art] Extend RT PCRs Done
3,108,125 UART: [art] Lock RT PCRs Done
3,109,673 UART: [art] Populate DV Done
3,118,077 UART: [fht] FMC Alias Private Key: 7
3,119,049 UART: [art] Derive CDI
3,119,329 UART: [art] Store in in slot 0x4
3,204,692 UART: [art] Derive Key Pair
3,205,052 UART: [art] Store priv key in slot 0x5
3,218,048 UART: [art] Derive Key Pair - Done
3,232,803 UART: [art] Signing Cert with AUTHO
3,233,283 UART: RITY.KEYID = 7
3,248,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,102 UART: [art] PUB.X = 27CA0D2D338A73CFDBE69F312920CE4227CD7532A2E5E436859B4A73AF29887C004716A34D49DB22EFAE72C03529F102
3,255,848 UART: [art] PUB.Y = 389DD660B7240A226F61F54F719E03987B70BA5E8CC34538CA0EB75F057C45273D83871ADE37737400129B9DA9AC7584
3,262,760 UART: [art] SIG.R = AE0A9CF62DB5AA7443DA3A81B52F9F7AD612948D99A6559DE73160D8F1AAEE15DB623B75A1CE075886B9181D799A3648
3,269,534 UART: [art] SIG.S = 5EAED8644A1CB598AE2F2496F9F84E477FF63F24931437484BFE30906B20D6EF844C8DEA994705C63E5F7C9A656456CE
3,292,688 UART: Caliptra RT
3,293,033 UART: [state] CFI Enabled
3,401,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,342 UART: [rt]cmd =0x494e464f, len=4
3,436,019 >>> mbox cmd response data (312 bytes)
3,436,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,199,087 >>> mbox cmd response: success
6,212,756 UART:
6,212,772 UART: Running Caliptra FMC ...
6,213,180 UART:
6,213,323 UART: [state] CFI Enabled
6,302,702 UART: [art] Extend RT PCRs Done
6,303,130 UART: [art] Lock RT PCRs Done
6,304,485 UART: [art] Populate DV Done
6,312,511 UART: [fht] FMC Alias Private Key: 7
6,313,487 UART: [art] Derive CDI
6,313,767 UART: [art] Store in in slot 0x4
6,399,096 UART: [art] Derive Key Pair
6,399,456 UART: [art] Store priv key in slot 0x5
6,412,518 UART: [art] Derive Key Pair - Done
6,427,318 UART: [art] Signing Cert with AUTHO
6,427,798 UART: RITY.KEYID = 7
6,443,160 UART: [art] Erasing AUTHORITY.KEYID = 7
6,443,925 UART: [art] PUB.X = 4ABC20E48BC04AA6F57AC125997E6983939D948125D8330EDA56D9B1B3C4C1F847FC5D3BD3BE97D4B79046A0ED5A3DD1
6,450,706 UART: [art] PUB.Y = E7F5F6B40A6F6C5C1D221DD68B82DE34707B50379179770677AA9A00B688E4ED2095D5A5C5769929382403E094122D3C
6,457,619 UART: [art] SIG.R = 076674E59A7FDD759BE5304D9F2FD87BE2AD9A1983D31CB42CE324B60AA67FD0A43DD8290DCC343D925C5AA765255A7A
6,464,394 UART: [art] SIG.S = DAD892718D5DF393D998D3639A23106B938B5E066FEF38C8F3856F9AD9F5959961D5EB2775ECD6C93157E13FDC009E76
6,487,928 UART: Caliptra RT
6,488,273 UART: [state] CFI Enabled
6,772,780 UART: [rt] RT listening for mailbox commands...
6,773,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,802,941 UART: [rt]cmd =0x494e464f, len=4
6,806,580 >>> mbox cmd response data (312 bytes)
6,806,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,567,064 >>> mbox cmd response: success
9,580,239 UART:
9,580,255 UART: Running Caliptra FMC ...
9,580,663 UART:
9,580,806 UART: [state] CFI Enabled
9,670,435 UART: [art] Extend RT PCRs Done
9,670,863 UART: [art] Lock RT PCRs Done
9,672,166 UART: [art] Populate DV Done
9,680,238 UART: [fht] FMC Alias Private Key: 7
9,681,228 UART: [art] Derive CDI
9,681,508 UART: [art] Store in in slot 0x4
9,767,095 UART: [art] Derive Key Pair
9,767,455 UART: [art] Store priv key in slot 0x5
9,781,453 UART: [art] Derive Key Pair - Done
9,796,262 UART: [art] Signing Cert with AUTHO
9,796,742 UART: RITY.KEYID = 7
9,812,334 UART: [art] Erasing AUTHORITY.KEYID = 7
9,813,099 UART: [art] PUB.X = 2FC2E5D363E40DF51E4009540FDDEE60B315E3008485EA63EA93238B837C8F88E32D4ACA0C6CBF29A3CFAAC72297D03F
9,819,851 UART: [art] PUB.Y = 1D6D57CB41BAB3233F4BB521734F2C0561E41DD605E9170D96C6D1ABDFC9B443C763EA0702A34C7F7BB0A3F92FF944FB
9,826,802 UART: [art] SIG.R = C92048F68A1024EB895FC7FE0AF73BE146A5E3D4529FE18A99BB16485171F7A966A54B644E2CF0E9FA1C654F3620D3E7
9,833,577 UART: [art] SIG.S = AD2F066B16DEDEA298219183455FF5FDA43D507B6A3EFE9A7F9116CF449D62D7A46E9CF066C01E7B984795BBE255E21C
9,857,173 UART: Caliptra RT
9,857,518 UART: [state] CFI Enabled
10,140,656 UART: [rt] RT listening for mailbox commands...
10,141,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,171,107 UART: [rt]cmd =0x494e464f, len=4
10,174,908 >>> mbox cmd response data (312 bytes)
10,174,909 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,937,768 >>> mbox cmd response: success
12,951,641 UART:
12,951,657 UART: Running Caliptra FMC ...
12,952,065 UART:
12,952,208 UART: [state] CFI Enabled
13,041,069 UART: [art] Extend RT PCRs Done
13,041,497 UART: [art] Lock RT PCRs Done
13,042,898 UART: [art] Populate DV Done
13,051,152 UART: [fht] FMC Alias Private Key: 7
13,052,286 UART: [art] Derive CDI
13,052,566 UART: [art] Store in in slot 0x4
13,138,047 UART: [art] Derive Key Pair
13,138,407 UART: [art] Store priv key in slot 0x5
13,151,689 UART: [art] Derive Key Pair - Done
13,166,515 UART: [art] Signing Cert with AUTHO
13,166,995 UART: RITY.KEYID = 7
13,182,215 UART: [art] Erasing AUTHORITY.KEYID = 7
13,182,980 UART: [art] PUB.X = 4ABC20E48BC04AA6F57AC125997E6983939D948125D8330EDA56D9B1B3C4C1F847FC5D3BD3BE97D4B79046A0ED5A3DD1
13,189,761 UART: [art] PUB.Y = E7F5F6B40A6F6C5C1D221DD68B82DE34707B50379179770677AA9A00B688E4ED2095D5A5C5769929382403E094122D3C
13,196,674 UART: [art] SIG.R = 076674E59A7FDD759BE5304D9F2FD87BE2AD9A1983D31CB42CE324B60AA67FD0A43DD8290DCC343D925C5AA765255A7A
13,203,449 UART: [art] SIG.S = DAD892718D5DF393D998D3639A23106B938B5E066FEF38C8F3856F9AD9F5959961D5EB2775ECD6C93157E13FDC009E76
13,227,349 UART: Caliptra RT
13,227,694 UART: [state] CFI Enabled
13,509,823 UART: [rt] RT listening for mailbox commands...
13,510,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,539,978 UART: [rt]cmd =0x494e464f, len=4
13,543,813 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.74s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,038 >>> mbox cmd response: success
2,773,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,774,100 UART: [afmc] ++
2,774,268 UART: [afmc] CDI.KEYID = 6
2,774,630 UART: [afmc] SUBJECT.KEYID = 7
2,775,055 UART: [afmc] AUTHORITY.KEYID = 5
2,810,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,248 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,833,940 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,839,813 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,845,515 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,853,404 UART: [afmc] --
2,854,444 UART: [cold-reset] --
2,855,512 UART: [state] Locking Datavault
2,856,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,419 UART: [state] Locking ICCM
2,857,919 UART: [exit] Launching FMC @ 0x40000130
2,863,248 UART:
2,863,264 UART: Running Caliptra FMC ...
2,863,672 UART:
2,863,726 UART: [state] CFI Enabled
2,874,394 UART: [fht] FMC Alias Private Key: 7
2,982,649 UART: [art] Extend RT PCRs Done
2,983,077 UART: [art] Lock RT PCRs Done
2,984,789 UART: [art] Populate DV Done
2,993,101 UART: [fht] FMC Alias Private Key: 7
2,994,057 UART: [art] Derive CDI
2,994,337 UART: [art] Store in in slot 0x4
3,080,020 UART: [art] Derive Key Pair
3,080,380 UART: [art] Store priv key in slot 0x5
3,093,728 UART: [art] Derive Key Pair - Done
3,108,252 UART: [art] Signing Cert with AUTHO
3,108,732 UART: RITY.KEYID = 7
3,123,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,161 UART: [art] PUB.X = 9D0498354FC6B28D9374731B85462B6DF0F3ACE76594B26CEB3863187EA90349A9F2CF6BFD050EC803B74290EBC93102
3,130,915 UART: [art] PUB.Y = 1DC57FC3912D0EBDBE6DCA5502A63729F3FEF47C81C3AC39DFEA906AAEFCFBBF49B21085D0FEECA725A99294DB38C44A
3,137,891 UART: [art] SIG.R = 993BDBFAA028AB0DF26CDB0723DD77D0DBA37AD9F6A0E1D5E93F560B329FC0C599048C32CAD2D5765E403F39E1AA0990
3,144,666 UART: [art] SIG.S = 07CD49BF9A9A3D8F12895DA8B665CDD4CACF2A8C171F7BC005168147E9B74159FC472EAC06FECB7DEE069F3F809CB9DA
3,168,601 UART: Caliptra RT
3,168,854 UART: [state] CFI Enabled
3,275,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,123 UART: [rt]cmd =0x494e464f, len=4
3,310,008 >>> mbox cmd response data (312 bytes)
3,310,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,968 UART:
3,310,984 UART: Running Caliptra ROM ...
3,311,392 UART:
3,311,447 UART: [state] CFI Enabled
3,313,665 UART: [state] LifecycleState = Unprovisioned
3,314,320 UART: [state] DebugLocked = No
3,314,840 UART: [state] WD Timer not started. Device not locked for debugging
3,316,124 UART: [kat] SHA2-256
4,121,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,899 UART: [kat] ++
4,126,051 UART: [kat] sha1
4,130,091 UART: [kat] SHA2-256
4,132,031 UART: [kat] SHA2-384
4,134,694 UART: [kat] SHA2-512-ACC
4,136,594 UART: [kat] ECC-384
4,146,361 UART: [kat] HMAC-384Kdf
4,151,027 UART: [kat] LMS
4,399,355 UART: [kat] --
4,400,545 UART: [update-reset] ++
5,713,666 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,714,679 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,864,503 >>> mbox cmd response: success
5,864,750 UART: [update-reset] Copying MAN_2 To MAN_1
5,872,764 UART: [update-reset Success] --
5,873,679 UART: [state] Locking Datavault
5,874,537 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,141 UART: [state] Locking ICCM
5,875,645 UART: [exit] Launching FMC @ 0x40000130
5,880,974 UART:
5,880,990 UART: Running Caliptra FMC ...
5,881,398 UART:
5,881,452 UART: [state] CFI Enabled
5,970,449 UART: [art] Extend RT PCRs Done
5,970,877 UART: [art] Lock RT PCRs Done
5,972,260 UART: [art] Populate DV Done
5,980,474 UART: [fht] FMC Alias Private Key: 7
5,981,602 UART: [art] Derive CDI
5,981,882 UART: [art] Store in in slot 0x4
6,067,361 UART: [art] Derive Key Pair
6,067,721 UART: [art] Store priv key in slot 0x5
6,080,823 UART: [art] Derive Key Pair - Done
6,095,947 UART: [art] Signing Cert with AUTHO
6,096,427 UART: RITY.KEYID = 7
6,111,401 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,166 UART: [art] PUB.X = EC89E42A32354DB0DBDCC2678F4547DEFDA52A172F7C656622AB7BB8F38F85F11A255B8DCE284481F50A1A49496492A4
6,118,943 UART: [art] PUB.Y = EA1FB12C36B78F5C5D666C5A0EB61C557A23AC2EA9B93835D005B24320C3E10D2A454C8C4DDFDF4808986980291EFE83
6,125,891 UART: [art] SIG.R = C62588C5B0925F7C379B2BC01F30A3D0C0E63BBBECC04041EAB69AD638CC435F689307DBB3BF9E3BC4C9662FA010F721
6,132,674 UART: [art] SIG.S = 05FE452DC299A4EC9AF392EFCF6B2F5B289AD31E4781254DDDE70CC609B3AC59322A32510F510DADE44DBF886A30C06E
6,156,306 UART: Caliptra RT
6,156,559 UART: [state] CFI Enabled
6,438,584 UART: [rt] RT listening for mailbox commands...
6,439,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,468,739 UART: [rt]cmd =0x494e464f, len=4
6,472,458 >>> mbox cmd response data (312 bytes)
6,472,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,473,180 UART:
6,473,196 UART: Running Caliptra ROM ...
6,473,604 UART:
6,473,659 UART: [state] CFI Enabled
6,475,973 UART: [state] LifecycleState = Unprovisioned
6,476,628 UART: [state] DebugLocked = No
6,477,258 UART: [state] WD Timer not started. Device not locked for debugging
6,478,572 UART: [kat] SHA2-256
7,284,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,288,347 UART: [kat] ++
7,288,499 UART: [kat] sha1
7,292,709 UART: [kat] SHA2-256
7,294,649 UART: [kat] SHA2-384
7,297,368 UART: [kat] SHA2-512-ACC
7,299,268 UART: [kat] ECC-384
7,308,803 UART: [kat] HMAC-384Kdf
7,313,259 UART: [kat] LMS
7,561,587 UART: [kat] --
7,562,575 UART: [update-reset] ++
8,875,908 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,877,025 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,026,849 >>> mbox cmd response: success
9,027,036 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,050 UART: [update-reset Success] --
9,036,189 UART: [state] Locking Datavault
9,037,071 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,675 UART: [state] Locking ICCM
9,038,119 UART: [exit] Launching FMC @ 0x40000130
9,043,448 UART:
9,043,464 UART: Running Caliptra FMC ...
9,043,872 UART:
9,043,926 UART: [state] CFI Enabled
9,132,837 UART: [art] Extend RT PCRs Done
9,133,265 UART: [art] Lock RT PCRs Done
9,134,716 UART: [art] Populate DV Done
9,142,726 UART: [fht] FMC Alias Private Key: 7
9,143,744 UART: [art] Derive CDI
9,144,024 UART: [art] Store in in slot 0x4
9,229,521 UART: [art] Derive Key Pair
9,229,881 UART: [art] Store priv key in slot 0x5
9,243,401 UART: [art] Derive Key Pair - Done
9,258,121 UART: [art] Signing Cert with AUTHO
9,258,601 UART: RITY.KEYID = 7
9,273,811 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,576 UART: [art] PUB.X = 2B4B186F64C9595640E6CB224B9001A6F5969409138F7BEDD5260AFBB64F4B3460093CF2C6855A8CB63FEE9DC84728AA
9,281,340 UART: [art] PUB.Y = CC7E8031E1D9594D485A43235FF85285CE043EC837C445C431ABBEAFB22A5C2CCEF5997F17E9217FEB39BBF0469B6706
9,288,296 UART: [art] SIG.R = A62CF8217924516019D6DE45563BD768FB045E06D056DC7190D9EAE6AAFB9FF895AB4070C1B3F2A297DD73E1FCAA08AE
9,295,073 UART: [art] SIG.S = 7DC1DDF5A8354FF8B9F014CCC87C870D85DD725D85F4A3AD435024BEE625205FB412C0C89ED712F3E4795831186D6057
9,318,429 UART: Caliptra RT
9,318,682 UART: [state] CFI Enabled
9,603,433 UART: [rt] RT listening for mailbox commands...
9,604,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,642 UART: [rt]cmd =0x494e464f, len=4
9,637,325 >>> mbox cmd response data (312 bytes)
9,637,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,638,119 UART:
9,638,135 UART: Running Caliptra ROM ...
9,638,543 UART:
9,638,598 UART: [state] CFI Enabled
9,641,558 UART: [state] LifecycleState = Unprovisioned
9,642,213 UART: [state] DebugLocked = No
9,642,821 UART: [state] WD Timer not started. Device not locked for debugging
9,644,003 UART: [kat] SHA2-256
10,449,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,453,778 UART: [kat] ++
10,453,930 UART: [kat] sha1
10,458,046 UART: [kat] SHA2-256
10,459,986 UART: [kat] SHA2-384
10,462,643 UART: [kat] SHA2-512-ACC
10,464,543 UART: [kat] ECC-384
10,474,110 UART: [kat] HMAC-384Kdf
10,478,678 UART: [kat] LMS
10,727,006 UART: [kat] --
10,727,720 UART: [update-reset] ++
12,040,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,041,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,191,484 >>> mbox cmd response: success
12,191,683 UART: [update-reset] Copying MAN_2 To MAN_1
12,199,697 UART: [update-reset Success] --
12,200,668 UART: [state] Locking Datavault
12,201,420 UART: [state] Locking PCR0, PCR1 and PCR31
12,202,024 UART: [state] Locking ICCM
12,202,690 UART: [exit] Launching FMC @ 0x40000130
12,208,019 UART:
12,208,035 UART: Running Caliptra FMC ...
12,208,443 UART:
12,208,497 UART: [state] CFI Enabled
12,297,392 UART: [art] Extend RT PCRs Done
12,297,820 UART: [art] Lock RT PCRs Done
12,299,103 UART: [art] Populate DV Done
12,307,195 UART: [fht] FMC Alias Private Key: 7
12,308,307 UART: [art] Derive CDI
12,308,587 UART: [art] Store in in slot 0x4
12,394,150 UART: [art] Derive Key Pair
12,394,510 UART: [art] Store priv key in slot 0x5
12,407,438 UART: [art] Derive Key Pair - Done
12,422,116 UART: [art] Signing Cert with AUTHO
12,422,596 UART: RITY.KEYID = 7
12,437,534 UART: [art] Erasing AUTHORITY.KEYID = 7
12,438,299 UART: [art] PUB.X = EC89E42A32354DB0DBDCC2678F4547DEFDA52A172F7C656622AB7BB8F38F85F11A255B8DCE284481F50A1A49496492A4
12,445,076 UART: [art] PUB.Y = EA1FB12C36B78F5C5D666C5A0EB61C557A23AC2EA9B93835D005B24320C3E10D2A454C8C4DDFDF4808986980291EFE83
12,452,024 UART: [art] SIG.R = C62588C5B0925F7C379B2BC01F30A3D0C0E63BBBECC04041EAB69AD638CC435F689307DBB3BF9E3BC4C9662FA010F721
12,458,807 UART: [art] SIG.S = 05FE452DC299A4EC9AF392EFCF6B2F5B289AD31E4781254DDDE70CC609B3AC59322A32510F510DADE44DBF886A30C06E
12,482,771 UART: Caliptra RT
12,483,024 UART: [state] CFI Enabled
12,762,565 UART: [rt] RT listening for mailbox commands...
12,763,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,792,872 UART: [rt]cmd =0x494e464f, len=4
12,796,485 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,963 >>> mbox cmd response: success
2,623,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,438 UART:
2,685,454 UART: Running Caliptra FMC ...
2,685,862 UART:
2,685,916 UART: [state] CFI Enabled
2,696,460 UART: [fht] FMC Alias Private Key: 7
2,804,151 UART: [art] Extend RT PCRs Done
2,804,579 UART: [art] Lock RT PCRs Done
2,806,293 UART: [art] Populate DV Done
2,814,415 UART: [fht] FMC Alias Private Key: 7
2,815,597 UART: [art] Derive CDI
2,815,877 UART: [art] Store in in slot 0x4
2,901,738 UART: [art] Derive Key Pair
2,902,098 UART: [art] Store priv key in slot 0x5
2,915,262 UART: [art] Derive Key Pair - Done
2,930,248 UART: [art] Signing Cert with AUTHO
2,930,728 UART: RITY.KEYID = 7
2,946,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,923 UART: [art] PUB.X = 8D37305B8441812A12C08D7FA59865F40920B51CF894B5ABE822502B367BAC6186E8D733C3403F6D6AECE0E163452301
2,953,683 UART: [art] PUB.Y = 0390A3A1F6A3C4984D32C36C82A7CFA4A02F2E365CD97F991E1A4D99FB5020674F9CC6987B09594C6FDAABD42A70CA50
2,960,639 UART: [art] SIG.R = 2B9F01F2632BA04D21F96BF7A34B72D34C1151BFBB8A3A9D9A7F49444681FDD931AB8C3FFD8C2E1F5B4B2E47A0198C03
2,967,419 UART: [art] SIG.S = FCFD07E26EC2D10EA160835FC540441819147592730B11C06C226C20EA919E2186B685514919873C3550EA87AF282109
2,991,290 UART: Caliptra RT
2,991,543 UART: [state] CFI Enabled
3,099,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,858 UART: [rt]cmd =0x494e464f, len=4
3,133,407 >>> mbox cmd response data (312 bytes)
3,133,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,570,331 >>> mbox cmd response: success
5,583,451 UART:
5,583,467 UART: Running Caliptra FMC ...
5,583,875 UART:
5,583,929 UART: [state] CFI Enabled
5,673,194 UART: [art] Extend RT PCRs Done
5,673,622 UART: [art] Lock RT PCRs Done
5,675,133 UART: [art] Populate DV Done
5,683,511 UART: [fht] FMC Alias Private Key: 7
5,684,653 UART: [art] Derive CDI
5,684,933 UART: [art] Store in in slot 0x4
5,770,442 UART: [art] Derive Key Pair
5,770,802 UART: [art] Store priv key in slot 0x5
5,784,166 UART: [art] Derive Key Pair - Done
5,798,707 UART: [art] Signing Cert with AUTHO
5,799,187 UART: RITY.KEYID = 7
5,814,689 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,454 UART: [art] PUB.X = A078E7B5B4D97E036410565403D53AF5720A5DC5EDDC62010F7584CF116825A0DCAFEDF4A5AD08586838DEB87AA2D5BB
5,822,220 UART: [art] PUB.Y = 72DDB8803A6A147486D5924FD5ABA6AEA395D0BABB18374CAF83DBB609E68B1462EAF0EC79356E4266608B79FD593D78
5,829,179 UART: [art] SIG.R = 06975244FC0FEDB88DF7974CFC04E042DA9B68485D8F1297B530D403506F688A67E6AFE943AF1E0B0CB39AEAE4D66009
5,835,938 UART: [art] SIG.S = 1A540FFDA8239BEC5B867890EAABFC7C1D06E498DDB81462603C39CDBE75620B9E11A0C39D03A0570E70F49A2B09F3C0
5,859,911 UART: Caliptra RT
5,860,164 UART: [state] CFI Enabled
6,139,690 UART: [rt] RT listening for mailbox commands...
6,140,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,735 UART: [rt]cmd =0x494e464f, len=4
6,173,474 >>> mbox cmd response data (312 bytes)
6,173,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,612,152 >>> mbox cmd response: success
8,625,520 UART:
8,625,536 UART: Running Caliptra FMC ...
8,625,944 UART:
8,625,998 UART: [state] CFI Enabled
8,714,845 UART: [art] Extend RT PCRs Done
8,715,273 UART: [art] Lock RT PCRs Done
8,716,410 UART: [art] Populate DV Done
8,724,600 UART: [fht] FMC Alias Private Key: 7
8,725,762 UART: [art] Derive CDI
8,726,042 UART: [art] Store in in slot 0x4
8,812,233 UART: [art] Derive Key Pair
8,812,593 UART: [art] Store priv key in slot 0x5
8,825,627 UART: [art] Derive Key Pair - Done
8,840,294 UART: [art] Signing Cert with AUTHO
8,840,774 UART: RITY.KEYID = 7
8,855,558 UART: [art] Erasing AUTHORITY.KEYID = 7
8,856,323 UART: [art] PUB.X = 160BC2BAE750C92A4BA13D6DA534FD6BEA3D7FF2702737A1B03A83D8D51FEF9ED5273EFB2641F84E8AB9BC80B02AA731
8,863,112 UART: [art] PUB.Y = C9410399E291231C4E79C721049EFC5E2BD11490E78CD76C583B42C3BFD93B7D7E550791ACD940640CCA948CBE828A91
8,870,054 UART: [art] SIG.R = E04C6E82DF23930F23860F701D62E74531CFDB1FAA9D7B02C2167B1A1F4BD562B9441FD44754C5B442B1A4CBC21274F1
8,876,823 UART: [art] SIG.S = 1E5EB68C542EF3749CD42AD0A6BFC70CC4A5612E676A53A56CC98FBCEBE1C5DBFAC90D8D54F50A7104FDF479BCBB8717
8,900,350 UART: Caliptra RT
8,900,603 UART: [state] CFI Enabled
9,185,032 UART: [rt] RT listening for mailbox commands...
9,185,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,215,069 UART: [rt]cmd =0x494e464f, len=4
9,218,834 >>> mbox cmd response data (312 bytes)
9,218,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,655,584 >>> mbox cmd response: success
11,668,616 UART:
11,668,632 UART: Running Caliptra FMC ...
11,669,040 UART:
11,669,094 UART: [state] CFI Enabled
11,758,013 UART: [art] Extend RT PCRs Done
11,758,441 UART: [art] Lock RT PCRs Done
11,759,872 UART: [art] Populate DV Done
11,768,026 UART: [fht] FMC Alias Private Key: 7
11,769,088 UART: [art] Derive CDI
11,769,368 UART: [art] Store in in slot 0x4
11,855,393 UART: [art] Derive Key Pair
11,855,753 UART: [art] Store priv key in slot 0x5
11,868,791 UART: [art] Derive Key Pair - Done
11,883,642 UART: [art] Signing Cert with AUTHO
11,884,122 UART: RITY.KEYID = 7
11,899,606 UART: [art] Erasing AUTHORITY.KEYID = 7
11,900,371 UART: [art] PUB.X = A078E7B5B4D97E036410565403D53AF5720A5DC5EDDC62010F7584CF116825A0DCAFEDF4A5AD08586838DEB87AA2D5BB
11,907,137 UART: [art] PUB.Y = 72DDB8803A6A147486D5924FD5ABA6AEA395D0BABB18374CAF83DBB609E68B1462EAF0EC79356E4266608B79FD593D78
11,914,096 UART: [art] SIG.R = 06975244FC0FEDB88DF7974CFC04E042DA9B68485D8F1297B530D403506F688A67E6AFE943AF1E0B0CB39AEAE4D66009
11,920,855 UART: [art] SIG.S = 1A540FFDA8239BEC5B867890EAABFC7C1D06E498DDB81462603C39CDBE75620B9E11A0C39D03A0570E70F49A2B09F3C0
11,944,316 UART: Caliptra RT
11,944,569 UART: [state] CFI Enabled
12,222,711 UART: [rt] RT listening for mailbox commands...
12,223,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,253,004 UART: [rt]cmd =0x494e464f, len=4
12,256,709 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.60s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,246 UART: [ldev] --
1,282,663 UART: [fwproc] Wait for Commands...
1,283,283 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,539 >>> mbox cmd response: success
2,774,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,775,623 UART: [afmc] ++
2,775,791 UART: [afmc] CDI.KEYID = 6
2,776,153 UART: [afmc] SUBJECT.KEYID = 7
2,776,578 UART: [afmc] AUTHORITY.KEYID = 5
2,811,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,667 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,359 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,840,232 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,845,934 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,853,673 UART: [afmc] --
2,854,669 UART: [cold-reset] --
2,855,757 UART: [state] Locking Datavault
2,856,984 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,588 UART: [state] Locking ICCM
2,858,250 UART: [exit] Launching FMC @ 0x40000130
2,863,579 UART:
2,863,595 UART: Running Caliptra FMC ...
2,864,003 UART:
2,864,146 UART: [state] CFI Enabled
2,874,974 UART: [fht] FMC Alias Private Key: 7
2,983,557 UART: [art] Extend RT PCRs Done
2,983,985 UART: [art] Lock RT PCRs Done
2,985,533 UART: [art] Populate DV Done
2,993,749 UART: [fht] FMC Alias Private Key: 7
2,994,863 UART: [art] Derive CDI
2,995,143 UART: [art] Store in in slot 0x4
3,080,722 UART: [art] Derive Key Pair
3,081,082 UART: [art] Store priv key in slot 0x5
3,094,086 UART: [art] Derive Key Pair - Done
3,109,112 UART: [art] Signing Cert with AUTHO
3,109,592 UART: RITY.KEYID = 7
3,124,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,755 UART: [art] PUB.X = 0E4520DDA0C887BC78E406D3D2BDD837CAC817AD71D616941CB169C236F85D66F6BD4EDB852C5DF74325A0FA2226B51B
3,132,533 UART: [art] PUB.Y = A7368DCD2F792A4EB04D3282DD3C845374E95B4F988484B9A224A7F688FB7FB035A49BDC1AA290D54224F4BB52866799
3,139,487 UART: [art] SIG.R = 6DB40FCFDDD48F2E76FEB104930D1304D24810FC2A6A4F5F19AEE7CD2F5A8DAE04B2D15C08080241ECE06FD4AE2FF009
3,146,254 UART: [art] SIG.S = 5D158B3E33537F1ED30921A73F62AB67C42C0C09845D42A3F2ECBC3690A01972DD75C92083687D82BD0E9AE77FA50C7C
3,169,942 UART: Caliptra RT
3,170,287 UART: [state] CFI Enabled
3,278,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,273 UART: [rt]cmd =0x494e464f, len=4
3,312,812 >>> mbox cmd response data (312 bytes)
3,312,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,364 UART:
3,313,380 UART: Running Caliptra ROM ...
3,313,788 UART:
3,313,930 UART: [state] CFI Enabled
3,316,758 UART: [state] LifecycleState = Unprovisioned
3,317,413 UART: [state] DebugLocked = No
3,317,971 UART: [state] WD Timer not started. Device not locked for debugging
3,319,161 UART: [kat] SHA2-256
4,124,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,128,936 UART: [kat] ++
4,129,088 UART: [kat] sha1
4,133,320 UART: [kat] SHA2-256
4,135,260 UART: [kat] SHA2-384
4,138,197 UART: [kat] SHA2-512-ACC
4,140,097 UART: [kat] ECC-384
4,149,894 UART: [kat] HMAC-384Kdf
4,154,556 UART: [kat] LMS
4,402,884 UART: [kat] --
4,403,876 UART: [update-reset] ++
5,715,651 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,716,792 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,866,616 >>> mbox cmd response: success
5,866,943 UART: [update-reset] Copying MAN_2 To MAN_1
5,874,957 UART: [update-reset Success] --
5,875,816 UART: [state] Locking Datavault
5,876,630 UART: [state] Locking PCR0, PCR1 and PCR31
5,877,234 UART: [state] Locking ICCM
5,877,796 UART: [exit] Launching FMC @ 0x40000130
5,883,125 UART:
5,883,141 UART: Running Caliptra FMC ...
5,883,549 UART:
5,883,692 UART: [state] CFI Enabled
5,972,835 UART: [art] Extend RT PCRs Done
5,973,263 UART: [art] Lock RT PCRs Done
5,974,626 UART: [art] Populate DV Done
5,982,744 UART: [fht] FMC Alias Private Key: 7
5,983,764 UART: [art] Derive CDI
5,984,044 UART: [art] Store in in slot 0x4
6,069,931 UART: [art] Derive Key Pair
6,070,291 UART: [art] Store priv key in slot 0x5
6,084,315 UART: [art] Derive Key Pair - Done
6,098,774 UART: [art] Signing Cert with AUTHO
6,099,254 UART: RITY.KEYID = 7
6,114,068 UART: [art] Erasing AUTHORITY.KEYID = 7
6,114,833 UART: [art] PUB.X = 506ADC95745B7F4EF17E6543E6BDF1710AED7D802269ED1F10319C8E4F79D119D7089489A3C4F084029293CEC97A8A87
6,121,596 UART: [art] PUB.Y = 1F907C42F0F9CBDDCCA4A3C1A25B9FE6EB105B07B2D8A8E4B53D6FA131471C7FD472FA2764B9AF2BCD9D42EB910A1AA1
6,128,568 UART: [art] SIG.R = 560231712FDA09962E3F6B873DDF80F8C9FD3BAD4EA3A209F8847C4D4DB0ABBD38713A2ED7094054EF0C35CDDFE23096
6,135,339 UART: [art] SIG.S = 4A992B042B1460733587FDBE5EC61D2BE7B5FF8F7436FEAA70D59F06931C6B3A8A863942706A956EC115C583CBCA7CB5
6,159,360 UART: Caliptra RT
6,159,705 UART: [state] CFI Enabled
6,445,345 UART: [rt] RT listening for mailbox commands...
6,446,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,475,712 UART: [rt]cmd =0x494e464f, len=4
6,479,395 >>> mbox cmd response data (312 bytes)
6,479,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,480,107 UART:
6,480,123 UART: Running Caliptra ROM ...
6,480,531 UART:
6,480,673 UART: [state] CFI Enabled
6,483,447 UART: [state] LifecycleState = Unprovisioned
6,484,102 UART: [state] DebugLocked = No
6,484,712 UART: [state] WD Timer not started. Device not locked for debugging
6,485,988 UART: [kat] SHA2-256
7,291,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,295,763 UART: [kat] ++
7,295,915 UART: [kat] sha1
7,300,267 UART: [kat] SHA2-256
7,302,207 UART: [kat] SHA2-384
7,305,010 UART: [kat] SHA2-512-ACC
7,306,910 UART: [kat] ECC-384
7,317,007 UART: [kat] HMAC-384Kdf
7,321,827 UART: [kat] LMS
7,570,155 UART: [kat] --
7,571,323 UART: [update-reset] ++
8,883,650 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,884,615 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,034,439 >>> mbox cmd response: success
9,034,544 UART: [update-reset] Copying MAN_2 To MAN_1
9,042,558 UART: [update-reset Success] --
9,043,729 UART: [state] Locking Datavault
9,044,623 UART: [state] Locking PCR0, PCR1 and PCR31
9,045,227 UART: [state] Locking ICCM
9,045,733 UART: [exit] Launching FMC @ 0x40000130
9,051,062 UART:
9,051,078 UART: Running Caliptra FMC ...
9,051,486 UART:
9,051,629 UART: [state] CFI Enabled
9,140,934 UART: [art] Extend RT PCRs Done
9,141,362 UART: [art] Lock RT PCRs Done
9,142,695 UART: [art] Populate DV Done
9,150,999 UART: [fht] FMC Alias Private Key: 7
9,151,995 UART: [art] Derive CDI
9,152,275 UART: [art] Store in in slot 0x4
9,238,192 UART: [art] Derive Key Pair
9,238,552 UART: [art] Store priv key in slot 0x5
9,252,270 UART: [art] Derive Key Pair - Done
9,266,891 UART: [art] Signing Cert with AUTHO
9,267,371 UART: RITY.KEYID = 7
9,283,003 UART: [art] Erasing AUTHORITY.KEYID = 7
9,283,768 UART: [art] PUB.X = 129123CBB3231177E0CB448F719E4D9E1E97C4B72CC087A85A0A32C80719B94E9B64C0CB88BE60736CED771F008ECE9C
9,290,518 UART: [art] PUB.Y = 5C4CBEC7163F1B85E156BCA74E53339F9A44033FA3EA8559AE81FF2F17CC60B1A8B132CFAA5CA728B045D3884CE8185A
9,297,481 UART: [art] SIG.R = 87CF9C0951D73FE243667552AC0F70547BCBB1835B540DCA34F427FC3C2A6F5DD9BC5B1667B90062603EB0957CF59F2A
9,304,228 UART: [art] SIG.S = AA2BEB3C104DA7BA635017D639F4AF8BD393A0EB78CE97C95972248916B08A6078F857C3FFB231B17F810FD5DF2C2C52
9,327,156 UART: Caliptra RT
9,327,501 UART: [state] CFI Enabled
9,611,056 UART: [rt] RT listening for mailbox commands...
9,611,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,641,297 UART: [rt]cmd =0x494e464f, len=4
9,644,896 >>> mbox cmd response data (312 bytes)
9,644,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,645,752 UART:
9,645,768 UART: Running Caliptra ROM ...
9,646,176 UART:
9,646,318 UART: [state] CFI Enabled
9,649,018 UART: [state] LifecycleState = Unprovisioned
9,649,673 UART: [state] DebugLocked = No
9,650,271 UART: [state] WD Timer not started. Device not locked for debugging
9,651,485 UART: [kat] SHA2-256
10,457,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,461,260 UART: [kat] ++
10,461,412 UART: [kat] sha1
10,465,862 UART: [kat] SHA2-256
10,467,802 UART: [kat] SHA2-384
10,470,533 UART: [kat] SHA2-512-ACC
10,472,433 UART: [kat] ECC-384
10,482,150 UART: [kat] HMAC-384Kdf
10,486,622 UART: [kat] LMS
10,734,950 UART: [kat] --
10,735,700 UART: [update-reset] ++
12,047,375 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,048,334 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,198,158 >>> mbox cmd response: success
12,198,363 UART: [update-reset] Copying MAN_2 To MAN_1
12,206,377 UART: [update-reset Success] --
12,207,288 UART: [state] Locking Datavault
12,208,122 UART: [state] Locking PCR0, PCR1 and PCR31
12,208,726 UART: [state] Locking ICCM
12,209,302 UART: [exit] Launching FMC @ 0x40000130
12,214,631 UART:
12,214,647 UART: Running Caliptra FMC ...
12,215,055 UART:
12,215,198 UART: [state] CFI Enabled
12,304,561 UART: [art] Extend RT PCRs Done
12,304,989 UART: [art] Lock RT PCRs Done
12,306,342 UART: [art] Populate DV Done
12,314,312 UART: [fht] FMC Alias Private Key: 7
12,315,282 UART: [art] Derive CDI
12,315,562 UART: [art] Store in in slot 0x4
12,401,229 UART: [art] Derive Key Pair
12,401,589 UART: [art] Store priv key in slot 0x5
12,414,945 UART: [art] Derive Key Pair - Done
12,429,702 UART: [art] Signing Cert with AUTHO
12,430,182 UART: RITY.KEYID = 7
12,445,486 UART: [art] Erasing AUTHORITY.KEYID = 7
12,446,251 UART: [art] PUB.X = 506ADC95745B7F4EF17E6543E6BDF1710AED7D802269ED1F10319C8E4F79D119D7089489A3C4F084029293CEC97A8A87
12,453,014 UART: [art] PUB.Y = 1F907C42F0F9CBDDCCA4A3C1A25B9FE6EB105B07B2D8A8E4B53D6FA131471C7FD472FA2764B9AF2BCD9D42EB910A1AA1
12,459,986 UART: [art] SIG.R = 560231712FDA09962E3F6B873DDF80F8C9FD3BAD4EA3A209F8847C4D4DB0ABBD38713A2ED7094054EF0C35CDDFE23096
12,466,757 UART: [art] SIG.S = 4A992B042B1460733587FDBE5EC61D2BE7B5FF8F7436FEAA70D59F06931C6B3A8A863942706A956EC115C583CBCA7CB5
12,491,014 UART: Caliptra RT
12,491,359 UART: [state] CFI Enabled
12,772,707 UART: [rt] RT listening for mailbox commands...
12,773,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,802,958 UART: [rt]cmd =0x494e464f, len=4
12,806,599 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 ready_for_fw is high
1,060,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,694 >>> mbox cmd response: success
2,625,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,393 UART:
2,687,409 UART: Running Caliptra FMC ...
2,687,817 UART:
2,687,960 UART: [state] CFI Enabled
2,698,798 UART: [fht] FMC Alias Private Key: 7
2,806,277 UART: [art] Extend RT PCRs Done
2,806,705 UART: [art] Lock RT PCRs Done
2,808,157 UART: [art] Populate DV Done
2,816,319 UART: [fht] FMC Alias Private Key: 7
2,817,379 UART: [art] Derive CDI
2,817,659 UART: [art] Store in in slot 0x4
2,903,176 UART: [art] Derive Key Pair
2,903,536 UART: [art] Store priv key in slot 0x5
2,917,386 UART: [art] Derive Key Pair - Done
2,932,015 UART: [art] Signing Cert with AUTHO
2,932,495 UART: RITY.KEYID = 7
2,947,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,530 UART: [art] PUB.X = B369C78C03EFA23236133FBE2217F7CB711C6E12A12A2283AEF69113D3F125AE740A2BF51A0ED695AFD929EC6881179F
2,955,299 UART: [art] PUB.Y = CA5DDE3AB17439B623953E735EBC385FE8B5AB9C0C68EB5DD32C9109C4B176210AF8BF2DD1CE1DEB88C5035281722803
2,962,248 UART: [art] SIG.R = 083AB5772B422334A2697C45C08A7B315224326A30B8CE806DE8914FB41482EB5EE93E890E996776E482FFD4924F4910
2,969,004 UART: [art] SIG.S = 91CB424D4B88C98D0BF0DD947E1DAF8F600E081A8E0F5FF90D48C8FD4DC81DB80ED127A8EE9F90D093EF5C0A607614EE
2,993,402 UART: Caliptra RT
2,993,747 UART: [state] CFI Enabled
3,101,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,208 UART: [rt]cmd =0x494e464f, len=4
3,135,969 >>> mbox cmd response data (312 bytes)
3,135,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,573,926 >>> mbox cmd response: success
5,587,572 UART:
5,587,588 UART: Running Caliptra FMC ...
5,587,996 UART:
5,588,139 UART: [state] CFI Enabled
5,677,434 UART: [art] Extend RT PCRs Done
5,677,862 UART: [art] Lock RT PCRs Done
5,679,243 UART: [art] Populate DV Done
5,687,437 UART: [fht] FMC Alias Private Key: 7
5,688,523 UART: [art] Derive CDI
5,688,803 UART: [art] Store in in slot 0x4
5,774,812 UART: [art] Derive Key Pair
5,775,172 UART: [art] Store priv key in slot 0x5
5,788,314 UART: [art] Derive Key Pair - Done
5,803,062 UART: [art] Signing Cert with AUTHO
5,803,542 UART: RITY.KEYID = 7
5,818,794 UART: [art] Erasing AUTHORITY.KEYID = 7
5,819,559 UART: [art] PUB.X = 3288C8074BC8219E4042E6BB7264AD8CCD6A90BF940E6332C858A2C8332D9A158FBE6F6C0AFEDD89F1B8EA46338CE9E7
5,826,334 UART: [art] PUB.Y = 4B4AD311C28C08D445A8E2B2AC4AD4C9610DCE482D8A5B571C951D44F74623278C8F4C1141C4E5952CB3CA149EA3BD6E
5,833,290 UART: [art] SIG.R = 850A7F1088B728FF8EBB3B0CCD615970FE07B6B1A45F332112CB36947F161866898DCDCBF7294F1FE029378B77B8826F
5,840,055 UART: [art] SIG.S = 1E9CBF212D0AD1D67C2DEC695325968F4FAF93050A69E0B7CFE6A13A89849C01B19F9CEA72EC7459C1AD706AA5DC534F
5,863,870 UART: Caliptra RT
5,864,215 UART: [state] CFI Enabled
6,151,070 UART: [rt] RT listening for mailbox commands...
6,151,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,181,095 UART: [rt]cmd =0x494e464f, len=4
6,184,632 >>> mbox cmd response data (312 bytes)
6,184,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,622,281 >>> mbox cmd response: success
8,635,795 UART:
8,635,811 UART: Running Caliptra FMC ...
8,636,219 UART:
8,636,362 UART: [state] CFI Enabled
8,725,505 UART: [art] Extend RT PCRs Done
8,725,933 UART: [art] Lock RT PCRs Done
8,727,488 UART: [art] Populate DV Done
8,735,552 UART: [fht] FMC Alias Private Key: 7
8,736,572 UART: [art] Derive CDI
8,736,852 UART: [art] Store in in slot 0x4
8,822,531 UART: [art] Derive Key Pair
8,822,891 UART: [art] Store priv key in slot 0x5
8,835,855 UART: [art] Derive Key Pair - Done
8,850,901 UART: [art] Signing Cert with AUTHO
8,851,381 UART: RITY.KEYID = 7
8,866,739 UART: [art] Erasing AUTHORITY.KEYID = 7
8,867,504 UART: [art] PUB.X = F768275F19C6763D036D8ACB17ED994645507BE8B9A02A4EA6285D758BCA60651DE01B9B43E5E22A6549DF3336EF402D
8,874,275 UART: [art] PUB.Y = 592E4AFCD7DB88E2013216B07E4C780D9B76AC011CB0293923A05DA4445B20C9DC0E3F2E8DFBAB716DDD6EDD41DA068F
8,881,230 UART: [art] SIG.R = 66FF9E10C6D53539E2701A5832C1298B9B998987540321B8A7B8C7D61FB95C4D267305D15BE94FA776E9B9B40EFF8B9B
8,887,993 UART: [art] SIG.S = FE8CC7C2777AE55C3174186DEB253F5E1A3720C825C10F128E25B731CF9E5F997E79C7BF5EB2C5D2BC89EC9B719AACA6
8,911,643 UART: Caliptra RT
8,911,988 UART: [state] CFI Enabled
9,190,283 UART: [rt] RT listening for mailbox commands...
9,190,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,220,296 UART: [rt]cmd =0x494e464f, len=4
9,224,045 >>> mbox cmd response data (312 bytes)
9,224,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,661,372 >>> mbox cmd response: success
11,674,914 UART:
11,674,930 UART: Running Caliptra FMC ...
11,675,338 UART:
11,675,481 UART: [state] CFI Enabled
11,763,962 UART: [art] Extend RT PCRs Done
11,764,390 UART: [art] Lock RT PCRs Done
11,765,641 UART: [art] Populate DV Done
11,773,731 UART: [fht] FMC Alias Private Key: 7
11,774,891 UART: [art] Derive CDI
11,775,171 UART: [art] Store in in slot 0x4
11,860,910 UART: [art] Derive Key Pair
11,861,270 UART: [art] Store priv key in slot 0x5
11,874,356 UART: [art] Derive Key Pair - Done
11,888,926 UART: [art] Signing Cert with AUTHO
11,889,406 UART: RITY.KEYID = 7
11,904,600 UART: [art] Erasing AUTHORITY.KEYID = 7
11,905,365 UART: [art] PUB.X = 3288C8074BC8219E4042E6BB7264AD8CCD6A90BF940E6332C858A2C8332D9A158FBE6F6C0AFEDD89F1B8EA46338CE9E7
11,912,140 UART: [art] PUB.Y = 4B4AD311C28C08D445A8E2B2AC4AD4C9610DCE482D8A5B571C951D44F74623278C8F4C1141C4E5952CB3CA149EA3BD6E
11,919,096 UART: [art] SIG.R = 850A7F1088B728FF8EBB3B0CCD615970FE07B6B1A45F332112CB36947F161866898DCDCBF7294F1FE029378B77B8826F
11,925,861 UART: [art] SIG.S = 1E9CBF212D0AD1D67C2DEC695325968F4FAF93050A69E0B7CFE6A13A89849C01B19F9CEA72EC7459C1AD706AA5DC534F
11,949,716 UART: Caliptra RT
11,950,061 UART: [state] CFI Enabled
12,230,742 UART: [rt] RT listening for mailbox commands...
12,231,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,260,937 UART: [rt]cmd =0x494e464f, len=4
12,264,728 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.76s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,490 >>> mbox cmd response: success
2,773,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,774,593 UART: [afmc] ++
2,774,761 UART: [afmc] CDI.KEYID = 6
2,775,124 UART: [afmc] SUBJECT.KEYID = 7
2,775,550 UART: [afmc] AUTHORITY.KEYID = 5
2,811,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,391 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,084 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,839,955 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,845,657 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,853,521 UART: [afmc] --
2,854,451 UART: [cold-reset] --
2,855,313 UART: [state] Locking Datavault
2,856,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,116 UART: [state] Locking ICCM
2,857,702 UART: [exit] Launching FMC @ 0x40000130
2,863,031 UART:
2,863,047 UART: Running Caliptra FMC ...
2,863,455 UART:
2,863,509 UART: [state] CFI Enabled
2,874,089 UART: [fht] FMC Alias Private Key: 7
2,982,214 UART: [art] Extend RT PCRs Done
2,982,642 UART: [art] Lock RT PCRs Done
2,984,462 UART: [art] Populate DV Done
2,992,780 UART: [fht] FMC Alias Private Key: 7
2,993,842 UART: [art] Derive CDI
2,994,122 UART: [art] Store in in slot 0x4
3,079,603 UART: [art] Derive Key Pair
3,079,963 UART: [art] Store priv key in slot 0x5
3,093,177 UART: [art] Derive Key Pair - Done
3,107,679 UART: [art] Signing Cert with AUTHO
3,108,159 UART: RITY.KEYID = 7
3,123,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,036 UART: [art] PUB.X = 434E35F542D1E9204CC6D6D20DA641BD1C31707A6CBF30FDECF8D81196AB5BB90F26B68C862938CC9C3DE4F6E6E29A74
3,130,816 UART: [art] PUB.Y = 7DFCA5A30BAA5FF4516311DE49A8328111D2124CA7A45CC2E0F19DA6EADBD9F0FD0B3BEF6E910F9139294D3951D31313
3,137,773 UART: [art] SIG.R = BA0FC758C30E2060DD1A14F1A9924D0856E6622A53DF49451771D0FAD0D01E3B6C59CA13C4461F466B0CF20B3A18CCCF
3,144,540 UART: [art] SIG.S = 33EDEFF992158B2A7B24A76CF221EDB755EDA89B8269ED28FC63DEFCBFFFF7D126D88B98CA8A8F45202C2CF9E2A75BF8
3,169,113 UART: Caliptra RT
3,169,366 UART: [state] CFI Enabled
3,277,321 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,005 UART: [rt]cmd =0x494e464f, len=4
3,311,704 >>> mbox cmd response data (312 bytes)
3,311,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,578 UART:
3,312,594 UART: Running Caliptra ROM ...
3,313,002 UART:
3,313,057 UART: [state] CFI Enabled
3,315,471 UART: [state] LifecycleState = Unprovisioned
3,316,126 UART: [state] DebugLocked = No
3,316,624 UART: [state] WD Timer not started. Device not locked for debugging
3,317,874 UART: [kat] SHA2-256
4,121,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,553 UART: [kat] ++
4,125,705 UART: [kat] sha1
4,129,943 UART: [kat] SHA2-256
4,131,883 UART: [kat] SHA2-384
4,134,596 UART: [kat] SHA2-512-ACC
4,136,496 UART: [kat] ECC-384
4,146,387 UART: [kat] HMAC-384Kdf
4,150,921 UART: [kat] LMS
4,399,233 UART: [kat] --
4,399,875 UART: [update-reset] ++
5,713,235 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,714,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,864,148 >>> mbox cmd response: success
5,864,375 UART: [update-reset] Copying MAN_2 To MAN_1
5,872,389 UART: [update-reset Success] --
5,873,404 UART: [state] Locking Datavault
5,874,124 UART: [state] Locking PCR0, PCR1 and PCR31
5,874,728 UART: [state] Locking ICCM
5,875,290 UART: [exit] Launching FMC @ 0x40000130
5,880,619 UART:
5,880,635 UART: Running Caliptra FMC ...
5,881,043 UART:
5,881,097 UART: [state] CFI Enabled
5,970,170 UART: [art] Extend RT PCRs Done
5,970,598 UART: [art] Lock RT PCRs Done
5,971,729 UART: [art] Populate DV Done
5,979,943 UART: [fht] FMC Alias Private Key: 7
5,980,929 UART: [art] Derive CDI
5,981,209 UART: [art] Store in in slot 0x4
6,067,344 UART: [art] Derive Key Pair
6,067,704 UART: [art] Store priv key in slot 0x5
6,080,784 UART: [art] Derive Key Pair - Done
6,095,671 UART: [art] Signing Cert with AUTHO
6,096,151 UART: RITY.KEYID = 7
6,111,685 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,450 UART: [art] PUB.X = B272F300D22B3267E8EC3C961B6C9C17A98FB111790A3AD3B54CC4EBC5D5697AFFD06AE9302D4553C09FA9AA1361220D
6,119,204 UART: [art] PUB.Y = F77FDF40C2BB4BDF54363986E536B361F63300FCD9145E9E46A1D01F69A7ACC184A777CF2C5B2620CD2C339FE53EDC6A
6,126,148 UART: [art] SIG.R = 8F7B40DD07CAD45B1CC19ACFC9FE8382FC71C09609869F2C39D33CAB86CA1991BE27B77395F77D8D80E9B6A803BF37E0
6,132,925 UART: [art] SIG.S = 3B3BF9CC5730B5391058172195291043D766ADE2192458259976ABA83ED606C0619B18AFFD0C772B4A3F4A126A0E0579
6,156,148 UART: Caliptra RT
6,156,401 UART: [state] CFI Enabled
6,440,484 UART: [rt] RT listening for mailbox commands...
6,441,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,537 UART: [rt]cmd =0x494e464f, len=4
6,474,376 >>> mbox cmd response data (312 bytes)
6,474,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,475,078 UART:
6,475,094 UART: Running Caliptra ROM ...
6,475,502 UART:
6,475,557 UART: [state] CFI Enabled
6,478,059 UART: [state] LifecycleState = Unprovisioned
6,478,714 UART: [state] DebugLocked = No
6,479,290 UART: [state] WD Timer not started. Device not locked for debugging
6,480,502 UART: [kat] SHA2-256
7,284,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,288,181 UART: [kat] ++
7,288,333 UART: [kat] sha1
7,292,509 UART: [kat] SHA2-256
7,294,449 UART: [kat] SHA2-384
7,297,072 UART: [kat] SHA2-512-ACC
7,298,972 UART: [kat] ECC-384
7,308,787 UART: [kat] HMAC-384Kdf
7,313,335 UART: [kat] LMS
7,561,647 UART: [kat] --
7,562,375 UART: [update-reset] ++
8,875,463 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,876,448 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,026,272 >>> mbox cmd response: success
9,026,471 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,485 UART: [update-reset Success] --
9,035,500 UART: [state] Locking Datavault
9,036,436 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,040 UART: [state] Locking ICCM
9,037,544 UART: [exit] Launching FMC @ 0x40000130
9,042,873 UART:
9,042,889 UART: Running Caliptra FMC ...
9,043,297 UART:
9,043,351 UART: [state] CFI Enabled
9,132,334 UART: [art] Extend RT PCRs Done
9,132,762 UART: [art] Lock RT PCRs Done
9,134,135 UART: [art] Populate DV Done
9,142,241 UART: [fht] FMC Alias Private Key: 7
9,143,317 UART: [art] Derive CDI
9,143,597 UART: [art] Store in in slot 0x4
9,229,070 UART: [art] Derive Key Pair
9,229,430 UART: [art] Store priv key in slot 0x5
9,242,508 UART: [art] Derive Key Pair - Done
9,257,199 UART: [art] Signing Cert with AUTHO
9,257,679 UART: RITY.KEYID = 7
9,273,185 UART: [art] Erasing AUTHORITY.KEYID = 7
9,273,950 UART: [art] PUB.X = C4E272D9F8AB57A40956D232180DDDCC295883413C75587C55A783419CD850DE497368EC42B2DB438A571D98334D70AC
9,280,712 UART: [art] PUB.Y = 75FD8453268C79A2EBBBA83B9EE06CF5F56B71760E1C3944920207ED5C48CDD7E85129782CCD779E2EC6B5F009C0BC1D
9,287,662 UART: [art] SIG.R = 6B384C4AC3744168CACF7E7B71AC9943CA6CBA21D67EE9D721B9C02B52CA15B0E4A596A789CE259965EB1DDDA2D3B928
9,294,450 UART: [art] SIG.S = 8EE8ED4F13ACDDC06FF865B999E7E58CD7700B1A6223AA1B0FCB1F320E29DB38B61AD4AAD77792200F3444BFEE89F612
9,318,361 UART: Caliptra RT
9,318,614 UART: [state] CFI Enabled
9,603,183 UART: [rt] RT listening for mailbox commands...
9,603,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,300 UART: [rt]cmd =0x494e464f, len=4
9,637,065 >>> mbox cmd response data (312 bytes)
9,637,066 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,637,963 UART:
9,637,979 UART: Running Caliptra ROM ...
9,638,387 UART:
9,638,442 UART: [state] CFI Enabled
9,641,384 UART: [state] LifecycleState = Unprovisioned
9,642,039 UART: [state] DebugLocked = No
9,642,597 UART: [state] WD Timer not started. Device not locked for debugging
9,643,813 UART: [kat] SHA2-256
10,447,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,451,492 UART: [kat] ++
10,451,644 UART: [kat] sha1
10,455,848 UART: [kat] SHA2-256
10,457,788 UART: [kat] SHA2-384
10,460,657 UART: [kat] SHA2-512-ACC
10,462,557 UART: [kat] ECC-384
10,472,114 UART: [kat] HMAC-384Kdf
10,476,644 UART: [kat] LMS
10,724,956 UART: [kat] --
10,725,920 UART: [update-reset] ++
12,038,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,039,327 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,189,151 >>> mbox cmd response: success
12,189,266 UART: [update-reset] Copying MAN_2 To MAN_1
12,197,280 UART: [update-reset Success] --
12,198,269 UART: [state] Locking Datavault
12,199,211 UART: [state] Locking PCR0, PCR1 and PCR31
12,199,815 UART: [state] Locking ICCM
12,200,443 UART: [exit] Launching FMC @ 0x40000130
12,205,772 UART:
12,205,788 UART: Running Caliptra FMC ...
12,206,196 UART:
12,206,250 UART: [state] CFI Enabled
12,295,809 UART: [art] Extend RT PCRs Done
12,296,237 UART: [art] Lock RT PCRs Done
12,297,520 UART: [art] Populate DV Done
12,306,026 UART: [fht] FMC Alias Private Key: 7
12,306,982 UART: [art] Derive CDI
12,307,262 UART: [art] Store in in slot 0x4
12,393,009 UART: [art] Derive Key Pair
12,393,369 UART: [art] Store priv key in slot 0x5
12,406,975 UART: [art] Derive Key Pair - Done
12,421,618 UART: [art] Signing Cert with AUTHO
12,422,098 UART: RITY.KEYID = 7
12,436,762 UART: [art] Erasing AUTHORITY.KEYID = 7
12,437,527 UART: [art] PUB.X = B272F300D22B3267E8EC3C961B6C9C17A98FB111790A3AD3B54CC4EBC5D5697AFFD06AE9302D4553C09FA9AA1361220D
12,444,281 UART: [art] PUB.Y = F77FDF40C2BB4BDF54363986E536B361F63300FCD9145E9E46A1D01F69A7ACC184A777CF2C5B2620CD2C339FE53EDC6A
12,451,225 UART: [art] SIG.R = 8F7B40DD07CAD45B1CC19ACFC9FE8382FC71C09609869F2C39D33CAB86CA1991BE27B77395F77D8D80E9B6A803BF37E0
12,458,002 UART: [art] SIG.S = 3B3BF9CC5730B5391058172195291043D766ADE2192458259976ABA83ED606C0619B18AFFD0C772B4A3F4A126A0E0579
12,481,575 UART: Caliptra RT
12,481,828 UART: [state] CFI Enabled
12,763,689 UART: [rt] RT listening for mailbox commands...
12,764,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,793,936 UART: [rt]cmd =0x494e464f, len=4
12,797,577 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,260 ready_for_fw is high
1,055,260 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,472 >>> mbox cmd response: success
2,620,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,682,983 UART:
2,682,999 UART: Running Caliptra FMC ...
2,683,407 UART:
2,683,461 UART: [state] CFI Enabled
2,693,707 UART: [fht] FMC Alias Private Key: 7
2,801,588 UART: [art] Extend RT PCRs Done
2,802,016 UART: [art] Lock RT PCRs Done
2,803,730 UART: [art] Populate DV Done
2,812,012 UART: [fht] FMC Alias Private Key: 7
2,813,134 UART: [art] Derive CDI
2,813,414 UART: [art] Store in in slot 0x4
2,898,679 UART: [art] Derive Key Pair
2,899,039 UART: [art] Store priv key in slot 0x5
2,912,159 UART: [art] Derive Key Pair - Done
2,926,823 UART: [art] Signing Cert with AUTHO
2,927,303 UART: RITY.KEYID = 7
2,942,399 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,164 UART: [art] PUB.X = DA50D08BE7953BF57EA993626EC1B0C73659AC92B186C2A2A135E8B1C174F3DCB0216EAC0200A5B8176277B4A6683F00
2,949,893 UART: [art] PUB.Y = 9234C0355B6433E7022EC9E752FDF1A40027A28D079D0F674BCD53E094910B8F19ACC8757A95020DD456F06AE013B6F9
2,956,803 UART: [art] SIG.R = 40345482FB9204E5469E535360C633AFB468C044E1F11BE55B3D8087E6E00106C286155920A23D5D048A2258902062C5
2,963,545 UART: [art] SIG.S = F1A9849E3E69AAA31880C119AEE7BAD2F38332891FCBFD689299C8F3E0F0AF1FDD7EAE93A6E674448669D701BBE55857
2,987,537 UART: Caliptra RT
2,987,790 UART: [state] CFI Enabled
3,094,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,597 UART: [rt]cmd =0x494e464f, len=4
3,129,224 >>> mbox cmd response data (312 bytes)
3,129,225 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,562,371 >>> mbox cmd response: success
5,575,519 UART:
5,575,535 UART: Running Caliptra FMC ...
5,575,943 UART:
5,575,997 UART: [state] CFI Enabled
5,664,774 UART: [art] Extend RT PCRs Done
5,665,202 UART: [art] Lock RT PCRs Done
5,666,253 UART: [art] Populate DV Done
5,674,441 UART: [fht] FMC Alias Private Key: 7
5,675,369 UART: [art] Derive CDI
5,675,649 UART: [art] Store in in slot 0x4
5,760,828 UART: [art] Derive Key Pair
5,761,188 UART: [art] Store priv key in slot 0x5
5,774,320 UART: [art] Derive Key Pair - Done
5,788,975 UART: [art] Signing Cert with AUTHO
5,789,455 UART: RITY.KEYID = 7
5,804,519 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,284 UART: [art] PUB.X = A807EEBE5BB52C5FB3D3E7E2A2139E9186CEEAF4BE994CA62DE0A0A9832855D4BBD07455AEC9E634866DF6653806390C
5,812,061 UART: [art] PUB.Y = C10491F19AC089B70FF51A20013CE47D910B60509645D5640137FFDBBD9D1ED053C0374836BA0F4E70F32C678AC0AA3C
5,818,999 UART: [art] SIG.R = 018654D2160DDC3BE64BE216B5501908B1D50C2E9B8BF264883D35C6847B16F19B670F6BA4A5AB0DF03D7A310CFEFA2A
5,825,760 UART: [art] SIG.S = F1527220975781D96C3194AB71A22EC674FBE2BE39968BDE1F339E1130A93614412D8450EF85DC8C86E51BB58DB100D5
5,849,571 UART: Caliptra RT
5,849,824 UART: [state] CFI Enabled
6,132,771 UART: [rt] RT listening for mailbox commands...
6,133,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,162,902 UART: [rt]cmd =0x494e464f, len=4
6,166,703 >>> mbox cmd response data (312 bytes)
6,166,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,598,880 >>> mbox cmd response: success
8,612,232 UART:
8,612,248 UART: Running Caliptra FMC ...
8,612,656 UART:
8,612,710 UART: [state] CFI Enabled
8,702,011 UART: [art] Extend RT PCRs Done
8,702,439 UART: [art] Lock RT PCRs Done
8,703,482 UART: [art] Populate DV Done
8,711,914 UART: [fht] FMC Alias Private Key: 7
8,713,028 UART: [art] Derive CDI
8,713,308 UART: [art] Store in in slot 0x4
8,799,387 UART: [art] Derive Key Pair
8,799,747 UART: [art] Store priv key in slot 0x5
8,813,033 UART: [art] Derive Key Pair - Done
8,827,632 UART: [art] Signing Cert with AUTHO
8,828,112 UART: RITY.KEYID = 7
8,843,004 UART: [art] Erasing AUTHORITY.KEYID = 7
8,843,769 UART: [art] PUB.X = 91B3C89ADDD0B0CC2E6F29CFA62FF9FC74EFC96F30443B32F178EDC6128E381CAF2B7AB1B26C11703E4E9704BFB3A8E5
8,850,560 UART: [art] PUB.Y = 4C5E5CC13DB5D4829B5706093144C127639DF9B524ED6ECCDD01E4CD7E0AA76761A24DD4414338D257F59C5EB6BDDB7E
8,857,512 UART: [art] SIG.R = B171656A0B4908B0F8DA1D73EBC75CFD9F16C847D5183C12C83DFE38FFD54AE205727AC77FB5EA2250903D0326EEFA09
8,864,281 UART: [art] SIG.S = 1169C328B9A6CCEDE40A5E9F99D4C52B5FD929C0C23E78D537694074336CAAB24A89642577F4BBF7D4A7341ED6B874D9
8,888,245 UART: Caliptra RT
8,888,498 UART: [state] CFI Enabled
9,168,761 UART: [rt] RT listening for mailbox commands...
9,169,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,198,774 UART: [rt]cmd =0x494e464f, len=4
9,202,333 >>> mbox cmd response data (312 bytes)
9,202,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,634,922 >>> mbox cmd response: success
11,648,176 UART:
11,648,192 UART: Running Caliptra FMC ...
11,648,600 UART:
11,648,654 UART: [state] CFI Enabled
11,737,865 UART: [art] Extend RT PCRs Done
11,738,293 UART: [art] Lock RT PCRs Done
11,739,490 UART: [art] Populate DV Done
11,747,806 UART: [fht] FMC Alias Private Key: 7
11,748,936 UART: [art] Derive CDI
11,749,216 UART: [art] Store in in slot 0x4
11,835,123 UART: [art] Derive Key Pair
11,835,483 UART: [art] Store priv key in slot 0x5
11,848,659 UART: [art] Derive Key Pair - Done
11,863,758 UART: [art] Signing Cert with AUTHO
11,864,238 UART: RITY.KEYID = 7
11,879,114 UART: [art] Erasing AUTHORITY.KEYID = 7
11,879,879 UART: [art] PUB.X = A807EEBE5BB52C5FB3D3E7E2A2139E9186CEEAF4BE994CA62DE0A0A9832855D4BBD07455AEC9E634866DF6653806390C
11,886,656 UART: [art] PUB.Y = C10491F19AC089B70FF51A20013CE47D910B60509645D5640137FFDBBD9D1ED053C0374836BA0F4E70F32C678AC0AA3C
11,893,594 UART: [art] SIG.R = 018654D2160DDC3BE64BE216B5501908B1D50C2E9B8BF264883D35C6847B16F19B670F6BA4A5AB0DF03D7A310CFEFA2A
11,900,355 UART: [art] SIG.S = F1527220975781D96C3194AB71A22EC674FBE2BE39968BDE1F339E1130A93614412D8450EF85DC8C86E51BB58DB100D5
11,924,266 UART: Caliptra RT
11,924,519 UART: [state] CFI Enabled
12,203,430 UART: [rt] RT listening for mailbox commands...
12,204,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,233,493 UART: [rt]cmd =0x494e464f, len=4
12,237,206 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.53s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,079 >>> mbox cmd response: success
2,773,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,774,266 UART: [afmc] ++
2,774,434 UART: [afmc] CDI.KEYID = 6
2,774,797 UART: [afmc] SUBJECT.KEYID = 7
2,775,223 UART: [afmc] AUTHORITY.KEYID = 5
2,810,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,296 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,833,989 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,839,860 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,845,562 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,853,402 UART: [afmc] --
2,854,526 UART: [cold-reset] --
2,855,340 UART: [state] Locking Datavault
2,856,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,193 UART: [state] Locking ICCM
2,857,683 UART: [exit] Launching FMC @ 0x40000130
2,863,012 UART:
2,863,028 UART: Running Caliptra FMC ...
2,863,436 UART:
2,863,579 UART: [state] CFI Enabled
2,874,287 UART: [fht] FMC Alias Private Key: 7
2,982,216 UART: [art] Extend RT PCRs Done
2,982,644 UART: [art] Lock RT PCRs Done
2,984,334 UART: [art] Populate DV Done
2,992,530 UART: [fht] FMC Alias Private Key: 7
2,993,674 UART: [art] Derive CDI
2,993,954 UART: [art] Store in in slot 0x4
3,079,699 UART: [art] Derive Key Pair
3,080,059 UART: [art] Store priv key in slot 0x5
3,093,341 UART: [art] Derive Key Pair - Done
3,107,795 UART: [art] Signing Cert with AUTHO
3,108,275 UART: RITY.KEYID = 7
3,123,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,242 UART: [art] PUB.X = A1033CA1551CCAF5FAD3915FE56874FA0609097FF7E575C30353D436B33EB314749D209304949F544A133AD30CD9AFA7
3,130,993 UART: [art] PUB.Y = C8AD2C1915BA3AAAD7C102F0233CBC1216B38428D06CA2C4646D6002F9A64BD795C812836E15EF8DF9031B3AF287789B
3,137,942 UART: [art] SIG.R = 524495DCB3E1240F53AABA547F1D97690B6964D8C3C97F50A9CD85F156F6537BB7839A26437A59984DF1BE612AE2533E
3,144,708 UART: [art] SIG.S = EC3C437FA1042E175D76F7AB3D65FD34DE17C609CA428214187FD98A676CAF055EE0D2A9B074A9D8F9BEBDB82AB6AA67
3,168,994 UART: Caliptra RT
3,169,339 UART: [state] CFI Enabled
3,276,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,290 UART: [rt]cmd =0x494e464f, len=4
3,311,013 >>> mbox cmd response data (312 bytes)
3,311,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,899 UART:
3,311,915 UART: Running Caliptra ROM ...
3,312,323 UART:
3,312,465 UART: [state] CFI Enabled
3,315,253 UART: [state] LifecycleState = Unprovisioned
3,315,908 UART: [state] DebugLocked = No
3,316,512 UART: [state] WD Timer not started. Device not locked for debugging
3,317,742 UART: [kat] SHA2-256
4,121,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,421 UART: [kat] ++
4,125,573 UART: [kat] sha1
4,129,849 UART: [kat] SHA2-256
4,131,789 UART: [kat] SHA2-384
4,134,482 UART: [kat] SHA2-512-ACC
4,136,382 UART: [kat] ECC-384
4,146,009 UART: [kat] HMAC-384Kdf
4,150,519 UART: [kat] LMS
4,398,831 UART: [kat] --
4,399,607 UART: [update-reset] ++
5,711,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,712,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,862,268 >>> mbox cmd response: success
5,862,609 UART: [update-reset] Copying MAN_2 To MAN_1
5,870,623 UART: [update-reset Success] --
5,871,688 UART: [state] Locking Datavault
5,872,486 UART: [state] Locking PCR0, PCR1 and PCR31
5,873,090 UART: [state] Locking ICCM
5,873,588 UART: [exit] Launching FMC @ 0x40000130
5,878,917 UART:
5,878,933 UART: Running Caliptra FMC ...
5,879,341 UART:
5,879,484 UART: [state] CFI Enabled
5,968,811 UART: [art] Extend RT PCRs Done
5,969,239 UART: [art] Lock RT PCRs Done
5,970,462 UART: [art] Populate DV Done
5,978,588 UART: [fht] FMC Alias Private Key: 7
5,979,560 UART: [art] Derive CDI
5,979,840 UART: [art] Store in in slot 0x4
6,065,561 UART: [art] Derive Key Pair
6,065,921 UART: [art] Store priv key in slot 0x5
6,079,325 UART: [art] Derive Key Pair - Done
6,094,108 UART: [art] Signing Cert with AUTHO
6,094,588 UART: RITY.KEYID = 7
6,109,854 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,619 UART: [art] PUB.X = E9692D994106AD0368D39E8EF30305C5A48B5455613B7FDC5F11C2A08179F5441C0233E835000D59B69E4D1EA64DAACA
6,117,351 UART: [art] PUB.Y = F5ED921A0484AF7B8F57D35B9F2066EAFB3ACD446E315455AC776490CF827B200124C61F12E483870B4F482BD9BD7F64
6,124,298 UART: [art] SIG.R = AA11657AB42011F9BF89C6F81DA0FF176B5CE2804D9B03A157B8CF6110313DE6989C8552CE41F7715E70F71A4CB3FF03
6,131,070 UART: [art] SIG.S = 5792866ACE13DE42CE219CB6C8FABD827A3A75FBA31BCE87DB0316BD72095FC0DD2D8AFA6747BCA70D793582FBA0C686
6,154,774 UART: Caliptra RT
6,155,119 UART: [state] CFI Enabled
6,437,060 UART: [rt] RT listening for mailbox commands...
6,437,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,467,287 UART: [rt]cmd =0x494e464f, len=4
6,470,774 >>> mbox cmd response data (312 bytes)
6,470,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,644 UART:
6,471,660 UART: Running Caliptra ROM ...
6,472,068 UART:
6,472,210 UART: [state] CFI Enabled
6,475,116 UART: [state] LifecycleState = Unprovisioned
6,475,771 UART: [state] DebugLocked = No
6,476,481 UART: [state] WD Timer not started. Device not locked for debugging
6,477,813 UART: [kat] SHA2-256
7,281,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,285,492 UART: [kat] ++
7,285,644 UART: [kat] sha1
7,289,776 UART: [kat] SHA2-256
7,291,716 UART: [kat] SHA2-384
7,294,257 UART: [kat] SHA2-512-ACC
7,296,157 UART: [kat] ECC-384
7,306,226 UART: [kat] HMAC-384Kdf
7,310,820 UART: [kat] LMS
7,559,132 UART: [kat] --
7,560,284 UART: [update-reset] ++
8,871,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,872,907 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,022,731 >>> mbox cmd response: success
9,023,026 UART: [update-reset] Copying MAN_2 To MAN_1
9,031,040 UART: [update-reset Success] --
9,031,963 UART: [state] Locking Datavault
9,032,753 UART: [state] Locking PCR0, PCR1 and PCR31
9,033,357 UART: [state] Locking ICCM
9,033,875 UART: [exit] Launching FMC @ 0x40000130
9,039,204 UART:
9,039,220 UART: Running Caliptra FMC ...
9,039,628 UART:
9,039,771 UART: [state] CFI Enabled
9,128,984 UART: [art] Extend RT PCRs Done
9,129,412 UART: [art] Lock RT PCRs Done
9,130,547 UART: [art] Populate DV Done
9,138,725 UART: [fht] FMC Alias Private Key: 7
9,139,741 UART: [art] Derive CDI
9,140,021 UART: [art] Store in in slot 0x4
9,225,574 UART: [art] Derive Key Pair
9,225,934 UART: [art] Store priv key in slot 0x5
9,238,822 UART: [art] Derive Key Pair - Done
9,253,528 UART: [art] Signing Cert with AUTHO
9,254,008 UART: RITY.KEYID = 7
9,269,208 UART: [art] Erasing AUTHORITY.KEYID = 7
9,269,973 UART: [art] PUB.X = C597C7D8534DBAF980EADF48C4492FB52D82293ACAD2FC61FB103AA65B4CCFB231EF4EB5FB26748324EBCDC7A503270C
9,276,761 UART: [art] PUB.Y = 8CE8D5BB5E1D7A3F9472EEC4F187973FC7468F06479CA8EF00064576030E028FD38E8F1A4E9999BCD70DE7386C3E99E8
9,283,679 UART: [art] SIG.R = E048191BEBF6B38626B2BD5D706571DFBD11E9E66C2B4FB9BD74664435A83512792C88BF1E43FA646D4F99A89CE25E44
9,290,457 UART: [art] SIG.S = DAA3F998949CF0BC0F0C06BAFE72EAEE57A54FE68A2394B6CAEF846E0C29CC266E3475D0DFABD69A4E1189EA3E0077B0
9,313,920 UART: Caliptra RT
9,314,265 UART: [state] CFI Enabled
9,596,800 UART: [rt] RT listening for mailbox commands...
9,597,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,071 UART: [rt]cmd =0x494e464f, len=4
9,630,844 >>> mbox cmd response data (312 bytes)
9,630,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,631,562 UART:
9,631,578 UART: Running Caliptra ROM ...
9,631,986 UART:
9,632,128 UART: [state] CFI Enabled
9,634,634 UART: [state] LifecycleState = Unprovisioned
9,635,289 UART: [state] DebugLocked = No
9,635,885 UART: [state] WD Timer not started. Device not locked for debugging
9,637,213 UART: [kat] SHA2-256
10,440,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,444,892 UART: [kat] ++
10,445,044 UART: [kat] sha1
10,449,376 UART: [kat] SHA2-256
10,451,316 UART: [kat] SHA2-384
10,454,085 UART: [kat] SHA2-512-ACC
10,455,985 UART: [kat] ECC-384
10,465,842 UART: [kat] HMAC-384Kdf
10,470,486 UART: [kat] LMS
10,718,798 UART: [kat] --
10,719,800 UART: [update-reset] ++
12,030,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,031,763 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,181,587 >>> mbox cmd response: success
12,181,746 UART: [update-reset] Copying MAN_2 To MAN_1
12,189,760 UART: [update-reset Success] --
12,190,853 UART: [state] Locking Datavault
12,191,607 UART: [state] Locking PCR0, PCR1 and PCR31
12,192,211 UART: [state] Locking ICCM
12,192,711 UART: [exit] Launching FMC @ 0x40000130
12,198,040 UART:
12,198,056 UART: Running Caliptra FMC ...
12,198,464 UART:
12,198,607 UART: [state] CFI Enabled
12,287,974 UART: [art] Extend RT PCRs Done
12,288,402 UART: [art] Lock RT PCRs Done
12,289,733 UART: [art] Populate DV Done
12,297,967 UART: [fht] FMC Alias Private Key: 7
12,299,115 UART: [art] Derive CDI
12,299,395 UART: [art] Store in in slot 0x4
12,384,904 UART: [art] Derive Key Pair
12,385,264 UART: [art] Store priv key in slot 0x5
12,398,324 UART: [art] Derive Key Pair - Done
12,413,121 UART: [art] Signing Cert with AUTHO
12,413,601 UART: RITY.KEYID = 7
12,428,723 UART: [art] Erasing AUTHORITY.KEYID = 7
12,429,488 UART: [art] PUB.X = E9692D994106AD0368D39E8EF30305C5A48B5455613B7FDC5F11C2A08179F5441C0233E835000D59B69E4D1EA64DAACA
12,436,220 UART: [art] PUB.Y = F5ED921A0484AF7B8F57D35B9F2066EAFB3ACD446E315455AC776490CF827B200124C61F12E483870B4F482BD9BD7F64
12,443,167 UART: [art] SIG.R = AA11657AB42011F9BF89C6F81DA0FF176B5CE2804D9B03A157B8CF6110313DE6989C8552CE41F7715E70F71A4CB3FF03
12,449,939 UART: [art] SIG.S = 5792866ACE13DE42CE219CB6C8FABD827A3A75FBA31BCE87DB0316BD72095FC0DD2D8AFA6747BCA70D793582FBA0C686
12,474,049 UART: Caliptra RT
12,474,394 UART: [state] CFI Enabled
12,756,083 UART: [rt] RT listening for mailbox commands...
12,756,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,786,320 UART: [rt]cmd =0x494e464f, len=4
12,789,889 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 ready_for_fw is high
1,056,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,549 >>> mbox cmd response: success
2,622,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,122 UART:
2,685,138 UART: Running Caliptra FMC ...
2,685,546 UART:
2,685,689 UART: [state] CFI Enabled
2,696,179 UART: [fht] FMC Alias Private Key: 7
2,804,288 UART: [art] Extend RT PCRs Done
2,804,716 UART: [art] Lock RT PCRs Done
2,806,238 UART: [art] Populate DV Done
2,814,430 UART: [fht] FMC Alias Private Key: 7
2,815,610 UART: [art] Derive CDI
2,815,890 UART: [art] Store in in slot 0x4
2,901,875 UART: [art] Derive Key Pair
2,902,235 UART: [art] Store priv key in slot 0x5
2,915,591 UART: [art] Derive Key Pair - Done
2,930,426 UART: [art] Signing Cert with AUTHO
2,930,906 UART: RITY.KEYID = 7
2,945,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,677 UART: [art] PUB.X = 400418A76B5C5E8D2A683AE367D2AF6682BCAC67DEBC5FF2E1AB34BDDF0E396956DA249637124FBBBF7D6DEAB66FE617
2,953,465 UART: [art] PUB.Y = 95B096AC68DAD94B318284DE78253E3FDEEF9D27B6F4B696E95C65879F0171958197EC0D74C531F35A7341E41E8EED04
2,960,410 UART: [art] SIG.R = 3EF92C99209AFF97A70897163AF59F8F87B22BAC7937479F094B1C18C8DB59CFDA92C3D754ECE2313DAD6848714584BE
2,967,182 UART: [art] SIG.S = 735D8A27F99AC44AC31E6C7A9B7E26F253F8264FB33F3D2B5762ADFF366D692F30F56D6AA9DB38DA8DA16377A7045DB1
2,990,898 UART: Caliptra RT
2,991,243 UART: [state] CFI Enabled
3,097,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,777 UART: [rt]cmd =0x494e464f, len=4
3,132,698 >>> mbox cmd response data (312 bytes)
3,132,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,565,226 >>> mbox cmd response: success
5,578,300 UART:
5,578,316 UART: Running Caliptra FMC ...
5,578,724 UART:
5,578,867 UART: [state] CFI Enabled
5,667,618 UART: [art] Extend RT PCRs Done
5,668,046 UART: [art] Lock RT PCRs Done
5,669,571 UART: [art] Populate DV Done
5,677,591 UART: [fht] FMC Alias Private Key: 7
5,678,583 UART: [art] Derive CDI
5,678,863 UART: [art] Store in in slot 0x4
5,764,736 UART: [art] Derive Key Pair
5,765,096 UART: [art] Store priv key in slot 0x5
5,778,648 UART: [art] Derive Key Pair - Done
5,793,723 UART: [art] Signing Cert with AUTHO
5,794,203 UART: RITY.KEYID = 7
5,809,385 UART: [art] Erasing AUTHORITY.KEYID = 7
5,810,150 UART: [art] PUB.X = EF27EF76B1D11ECF4558997CFB9178BBA715B5AF973E3E993C8CA9E77128AFE8B0BF99E4DD7942AD013CB25F83D4A1C6
5,816,937 UART: [art] PUB.Y = 36623DAC08660E9E2B6CDAFC4B8C09215D0D66CE4B435137714536BCE07B7D392723C13A33A835CC26BEF7BEB538D22A
5,823,885 UART: [art] SIG.R = 78BAF38EE724BF292837A11F801E12E05AC9564B71E07BCBFB40F56617FE18D2B32D2BEB755C6B8E2A4EC6B6287AD38B
5,830,671 UART: [art] SIG.S = 822AC23D7AC07A76D90CEE63D62772FF6DC43B7F8491EA64D91224CBA1E042C5F3850BC446E71C1E4ED16249085B4C29
5,854,703 UART: Caliptra RT
5,855,048 UART: [state] CFI Enabled
6,136,179 UART: [rt] RT listening for mailbox commands...
6,136,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,612 UART: [rt]cmd =0x494e464f, len=4
6,170,411 >>> mbox cmd response data (312 bytes)
6,170,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,603,295 >>> mbox cmd response: success
8,616,293 UART:
8,616,309 UART: Running Caliptra FMC ...
8,616,717 UART:
8,616,860 UART: [state] CFI Enabled
8,705,773 UART: [art] Extend RT PCRs Done
8,706,201 UART: [art] Lock RT PCRs Done
8,707,410 UART: [art] Populate DV Done
8,715,616 UART: [fht] FMC Alias Private Key: 7
8,716,682 UART: [art] Derive CDI
8,716,962 UART: [art] Store in in slot 0x4
8,802,785 UART: [art] Derive Key Pair
8,803,145 UART: [art] Store priv key in slot 0x5
8,816,411 UART: [art] Derive Key Pair - Done
8,830,834 UART: [art] Signing Cert with AUTHO
8,831,314 UART: RITY.KEYID = 7
8,846,578 UART: [art] Erasing AUTHORITY.KEYID = 7
8,847,343 UART: [art] PUB.X = 4FF682ACED5953B8FD4B7047E49AC4933CE8CC11FBDE4B7B3FE38A918161ABAD5D59F5B37826E3E2C1A0297ED50892DC
8,854,130 UART: [art] PUB.Y = E8AC2B1E0FC9FFE3F584C47B93C8A5BA07FC8D8F719CCF63547F8FC471F855923F811E72DD5D85DA7D56BE3AFCE8BD64
8,861,100 UART: [art] SIG.R = 41576135AA7D0C86C73D431A6B58FCBAE84BFD3097DD649A4440AA9A31BDE1A2D4118D6BF8FCEF9B9563EA3CB3A6CBAF
8,867,893 UART: [art] SIG.S = 429FB46A768B73A64D6D2ED16EB296F181C3DC698899C7D73B44BA248F51CB1832FCC8E2397FA79F0CD29E04FA7B109E
8,891,622 UART: Caliptra RT
8,891,967 UART: [state] CFI Enabled
9,174,665 UART: [rt] RT listening for mailbox commands...
9,175,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,204,640 UART: [rt]cmd =0x494e464f, len=4
9,208,313 >>> mbox cmd response data (312 bytes)
9,208,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,642,637 >>> mbox cmd response: success
11,655,739 UART:
11,655,755 UART: Running Caliptra FMC ...
11,656,163 UART:
11,656,306 UART: [state] CFI Enabled
11,745,653 UART: [art] Extend RT PCRs Done
11,746,081 UART: [art] Lock RT PCRs Done
11,747,400 UART: [art] Populate DV Done
11,755,456 UART: [fht] FMC Alias Private Key: 7
11,756,548 UART: [art] Derive CDI
11,756,828 UART: [art] Store in in slot 0x4
11,842,165 UART: [art] Derive Key Pair
11,842,525 UART: [art] Store priv key in slot 0x5
11,855,859 UART: [art] Derive Key Pair - Done
11,870,662 UART: [art] Signing Cert with AUTHO
11,871,142 UART: RITY.KEYID = 7
11,885,968 UART: [art] Erasing AUTHORITY.KEYID = 7
11,886,733 UART: [art] PUB.X = EF27EF76B1D11ECF4558997CFB9178BBA715B5AF973E3E993C8CA9E77128AFE8B0BF99E4DD7942AD013CB25F83D4A1C6
11,893,520 UART: [art] PUB.Y = 36623DAC08660E9E2B6CDAFC4B8C09215D0D66CE4B435137714536BCE07B7D392723C13A33A835CC26BEF7BEB538D22A
11,900,468 UART: [art] SIG.R = 78BAF38EE724BF292837A11F801E12E05AC9564B71E07BCBFB40F56617FE18D2B32D2BEB755C6B8E2A4EC6B6287AD38B
11,907,254 UART: [art] SIG.S = 822AC23D7AC07A76D90CEE63D62772FF6DC43B7F8491EA64D91224CBA1E042C5F3850BC446E71C1E4ED16249085B4C29
11,931,340 UART: Caliptra RT
11,931,685 UART: [state] CFI Enabled
12,215,454 UART: [rt] RT listening for mailbox commands...
12,216,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,245,655 UART: [rt]cmd =0x494e464f, len=4
12,249,204 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,378 UART: [kat] LMS
1,475,574 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,830 UART: [idev] ++
1,479,998 UART: [idev] CDI.KEYID = 6
1,480,358 UART: [idev] SUBJECT.KEYID = 7
1,480,782 UART: [idev] UDS.KEYID = 0
1,481,127 ready_for_fw is high
1,481,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,934 UART: [idev] Erasing UDS.KEYID = 0
1,505,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,280 UART: [idev] --
1,515,451 UART: [ldev] ++
1,515,619 UART: [ldev] CDI.KEYID = 6
1,515,982 UART: [ldev] SUBJECT.KEYID = 5
1,516,408 UART: [ldev] AUTHORITY.KEYID = 7
1,516,871 UART: [ldev] FE.KEYID = 1
1,521,969 UART: [ldev] Erasing FE.KEYID = 1
1,547,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,714 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,862 UART: [fwproc] Received command 0x46574c44
1,587,653 UART: [fwproc] Received Image of size 114332 bytes
2,885,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,605 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,868 >>> mbox cmd response: success
3,077,868 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,078,942 UART: [afmc] ++
3,079,110 UART: [afmc] CDI.KEYID = 6
3,079,472 UART: [afmc] SUBJECT.KEYID = 7
3,079,897 UART: [afmc] AUTHORITY.KEYID = 5
3,115,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,457 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,147 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,020 UART: [afmc] --
3,157,900 UART: [cold-reset] --
3,158,984 UART: [state] Locking Datavault
3,160,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,877 UART: [state] Locking ICCM
3,161,441 UART: [exit] Launching FMC @ 0x40000130
3,166,770 UART:
3,166,786 UART: Running Caliptra FMC ...
3,167,194 UART:
3,167,248 UART: [state] CFI Enabled
3,177,747 UART: [fht] FMC Alias Private Key: 7
3,285,200 UART: [art] Extend RT PCRs Done
3,285,628 UART: [art] Lock RT PCRs Done
3,287,290 UART: [art] Populate DV Done
3,295,587 UART: [fht] FMC Alias Private Key: 7
3,296,589 UART: [art] Derive CDI
3,296,869 UART: [art] Store in in slot 0x4
3,382,456 UART: [art] Derive Key Pair
3,382,816 UART: [art] Store priv key in slot 0x5
3,395,926 UART: [art] Derive Key Pair - Done
3,410,429 UART: [art] Signing Cert with AUTHO
3,410,909 UART: RITY.KEYID = 7
3,426,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,872 UART: [art] PUB.X = 21990680E2DF8FA81C775F574D65362726FE7F4893A184B66524A83D5356EABE03FE27903746FE383824CFEC425BCFB6
3,433,636 UART: [art] PUB.Y = F05C15032C83075A5D5DE8DEE8A95C12AD050F9DDC3F22BE3BD5AB2546CDC0A0A85B6A55C14FC0552710B6BED12AFF4C
3,440,598 UART: [art] SIG.R = C8A216AAEBA241284E6789A9870043E47A4B4C4EACFE740FE8C7860B46F8C21BB444DC3CF68A921DA344B93F390BADD0
3,447,353 UART: [art] SIG.S = 00F47EBF453F576C35A375773A9C9187F46270AD0C0410BF81AD8C1F15148B872D857A2666889579693D405B747475D2
3,470,914 UART: Caliptra RT
3,471,167 UART: [state] CFI Enabled
3,579,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,683 UART: [rt]cmd =0x49444549, len=4
3,612,140 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,556 >>> mbox cmd response: success
2,928,556 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,989,348 UART:
2,989,364 UART: Running Caliptra FMC ...
2,989,772 UART:
2,989,826 UART: [state] CFI Enabled
3,000,591 UART: [fht] FMC Alias Private Key: 7
3,108,822 UART: [art] Extend RT PCRs Done
3,109,250 UART: [art] Lock RT PCRs Done
3,110,932 UART: [art] Populate DV Done
3,119,171 UART: [fht] FMC Alias Private Key: 7
3,120,271 UART: [art] Derive CDI
3,120,551 UART: [art] Store in in slot 0x4
3,206,266 UART: [art] Derive Key Pair
3,206,626 UART: [art] Store priv key in slot 0x5
3,219,556 UART: [art] Derive Key Pair - Done
3,234,197 UART: [art] Signing Cert with AUTHO
3,234,677 UART: RITY.KEYID = 7
3,249,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,422 UART: [art] PUB.X = 9344AEF3D401BB861CAB7E3D7AEF0FE324839B26F524D72631823A73D58B229CF2CAD187815D307A92806A6C0665778E
3,257,185 UART: [art] PUB.Y = 6D6156744E5AE96E88BBEA4E741A0D5E47FAC3AC8A1E7054F8EAF2F7DA3C565DE15E3DA4B3FC8761743C85F55CBF2619
3,264,152 UART: [art] SIG.R = 3E72F7E13DD97A70BDBE73607BB264FEF41004175B950924DAD350F3824EE3D90829339D45A735FEC1568DDFB6272B3C
3,270,919 UART: [art] SIG.S = 149A1D184E9D364D39083C4FB2BD3C4C93B4DC792962E901AB45A6840096C046FC50CCB413C1D00ADE739164333A0E8C
3,294,280 UART: Caliptra RT
3,294,533 UART: [state] CFI Enabled
3,402,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,027 UART: [rt]cmd =0x49444549, len=4
3,435,428 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,243 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,676 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,481,434 ready_for_fw is high
1,481,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,285 UART: [idev] Erasing UDS.KEYID = 0
1,505,555 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,221 UART: [idev] --
1,515,038 UART: [ldev] ++
1,515,206 UART: [ldev] CDI.KEYID = 6
1,515,569 UART: [ldev] SUBJECT.KEYID = 5
1,515,995 UART: [ldev] AUTHORITY.KEYID = 7
1,516,458 UART: [ldev] FE.KEYID = 1
1,521,906 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,587,114 UART: [fwproc] Waiting for Commands...
1,587,759 UART: [fwproc] Received command 0x46574c44
1,588,550 UART: [fwproc] Received Image of size 114332 bytes
2,885,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,483 >>> mbox cmd response: success
3,078,483 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,601 UART: [afmc] ++
3,079,769 UART: [afmc] CDI.KEYID = 6
3,080,131 UART: [afmc] SUBJECT.KEYID = 7
3,080,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,194 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,884 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,797 UART: [afmc] --
3,158,915 UART: [cold-reset] --
3,160,057 UART: [state] Locking Datavault
3,161,112 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,716 UART: [state] Locking ICCM
3,162,236 UART: [exit] Launching FMC @ 0x40000130
3,167,565 UART:
3,167,581 UART: Running Caliptra FMC ...
3,167,989 UART:
3,168,132 UART: [state] CFI Enabled
3,178,801 UART: [fht] FMC Alias Private Key: 7
3,286,826 UART: [art] Extend RT PCRs Done
3,287,254 UART: [art] Lock RT PCRs Done
3,288,954 UART: [art] Populate DV Done
3,297,033 UART: [fht] FMC Alias Private Key: 7
3,298,157 UART: [art] Derive CDI
3,298,437 UART: [art] Store in in slot 0x4
3,384,322 UART: [art] Derive Key Pair
3,384,682 UART: [art] Store priv key in slot 0x5
3,397,994 UART: [art] Derive Key Pair - Done
3,412,317 UART: [art] Signing Cert with AUTHO
3,412,797 UART: RITY.KEYID = 7
3,428,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,888 UART: [art] PUB.X = F2E8BA931496AC288016FAAE512AC9F57205D4C1FA03E0B0713259877A89D7BBF0202E365B0319DF1BB9DAADBD44CB4B
3,435,665 UART: [art] PUB.Y = 620CB0020867A0CFB04C03C149296CB37F1F1E84D6844619FAD59C2BEF5C03114F082789D67896C93CA620DDF7C6F13C
3,442,601 UART: [art] SIG.R = 26ED81F0CE332E574AB88A42FBAB1CD8534ADB865ACAFDE088E67A9644F4DD3AF9D7FDEA5C5A92AE30471204C9C33677
3,449,390 UART: [art] SIG.S = 685F873476C49748F526BB300EDF57906C061F94EE0FB93474B67E6165C164D2F514EF5800C28DFB090A7C1583B614CE
3,472,736 UART: Caliptra RT
3,473,081 UART: [state] CFI Enabled
3,581,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,007 UART: [rt]cmd =0x49444549, len=4
3,614,250 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,356 ready_for_fw is high
1,362,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,287 >>> mbox cmd response: success
2,928,287 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,990,205 UART:
2,990,221 UART: Running Caliptra FMC ...
2,990,629 UART:
2,990,772 UART: [state] CFI Enabled
3,001,599 UART: [fht] FMC Alias Private Key: 7
3,108,784 UART: [art] Extend RT PCRs Done
3,109,212 UART: [art] Lock RT PCRs Done
3,110,814 UART: [art] Populate DV Done
3,119,167 UART: [fht] FMC Alias Private Key: 7
3,120,225 UART: [art] Derive CDI
3,120,505 UART: [art] Store in in slot 0x4
3,205,804 UART: [art] Derive Key Pair
3,206,164 UART: [art] Store priv key in slot 0x5
3,219,676 UART: [art] Derive Key Pair - Done
3,234,408 UART: [art] Signing Cert with AUTHO
3,234,888 UART: RITY.KEYID = 7
3,249,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,445 UART: [art] PUB.X = 06EB8872FA8180407B06788EA81EA873715FCC58716D81F6FCAF8AF8D1AC3190D75EDB994FC5CCCFE7EAB15A43F76C28
3,257,227 UART: [art] PUB.Y = DAD61748AB1871CADCC85153A9DE0189500ED92A4696CB7B15C09D64991744443E495ED8B5647D0C09A2D0A7ABACB022
3,264,173 UART: [art] SIG.R = D7B1C06861B9A067E60B88882BE3FD8E217C49AA2F69F83A32AA5104470F867265FF25F5DC77138955C96AC90D23CC42
3,270,933 UART: [art] SIG.S = 6852E5251F50B1424A6B376F6FB16193C01A9551593CADF5918E7BA9C6371E0581655FEB08674A08A067F082EBB35E47
3,294,875 UART: Caliptra RT
3,295,220 UART: [state] CFI Enabled
3,402,545 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,987 UART: [rt]cmd =0x49444549, len=4
3,435,136 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
893,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,741 UART: [kat] ++
897,893 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,324 UART: [kat] HMAC-384Kdf
922,794 UART: [kat] LMS
1,171,122 UART: [kat] --
1,171,981 UART: [cold-reset] ++
1,172,493 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 ready_for_fw is high
1,176,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,201,339 UART: [idev] Sha1 KeyId Algorithm
1,209,879 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,060 UART: [fwproc] Recv command 0x46574c44
1,283,788 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,093 >>> mbox cmd response: success
2,775,093 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,776,235 UART: [afmc] ++
2,776,403 UART: [afmc] CDI.KEYID = 6
2,776,765 UART: [afmc] SUBJECT.KEYID = 7
2,777,190 UART: [afmc] AUTHORITY.KEYID = 5
2,812,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,182 UART: [afmc] --
2,856,086 UART: [cold-reset] --
2,857,030 UART: [state] Locking Datavault
2,858,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,875 UART: [state] Locking ICCM
2,859,547 UART: [exit] Launching FMC @ 0x40000130
2,864,876 UART:
2,864,892 UART: Running Caliptra FMC ...
2,865,300 UART:
2,865,354 UART: [state] CFI Enabled
2,875,685 UART: [fht] FMC Alias Private Key: 7
2,983,192 UART: [art] Extend RT PCRs Done
2,983,620 UART: [art] Lock RT PCRs Done
2,985,366 UART: [art] Populate DV Done
2,993,723 UART: [fht] FMC Alias Private Key: 7
2,994,881 UART: [art] Derive CDI
2,995,161 UART: [art] Store in in slot 0x4
3,080,976 UART: [art] Derive Key Pair
3,081,336 UART: [art] Store priv key in slot 0x5
3,094,088 UART: [art] Derive Key Pair - Done
3,108,807 UART: [art] Signing Cert with AUTHO
3,109,287 UART: RITY.KEYID = 7
3,124,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,288 UART: [art] PUB.X = DE5464810C242ED5BDE3E90895927D9C6831B83499A6E2F80B8D20B9507B28F2C250E1FABF3D118BB7C47A543EFAC456
3,132,057 UART: [art] PUB.Y = 67B51A8F1A6CF9BF56F0A88BD76D69CEC17360BA465884AC8FD1E96A1D0A71149A3C69978CBF6A9B34F417260687728B
3,139,009 UART: [art] SIG.R = 7B840938190D17CCDB7D90EB756B718EB7D99B19EE9D3F2BB25D137D99A39C22721A673B93F3F3B93B84D876CD2177D7
3,145,779 UART: [art] SIG.S = 5BBC33B545706A895FD38BE09E805CF4926CDA2B327D65EED936633FA50A25A5A60A83BEF493B96C38D4B8CF44751C34
3,169,962 UART: Caliptra RT
3,170,215 UART: [state] CFI Enabled
3,278,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,726 UART: [rt]cmd =0x49444549, len=4
3,311,223 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,699 ready_for_fw is high
1,059,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,628 >>> mbox cmd response: success
2,624,628 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,687,188 UART:
2,687,204 UART: Running Caliptra FMC ...
2,687,612 UART:
2,687,666 UART: [state] CFI Enabled
2,698,111 UART: [fht] FMC Alias Private Key: 7
2,806,096 UART: [art] Extend RT PCRs Done
2,806,524 UART: [art] Lock RT PCRs Done
2,807,890 UART: [art] Populate DV Done
2,815,985 UART: [fht] FMC Alias Private Key: 7
2,817,145 UART: [art] Derive CDI
2,817,425 UART: [art] Store in in slot 0x4
2,902,914 UART: [art] Derive Key Pair
2,903,274 UART: [art] Store priv key in slot 0x5
2,917,140 UART: [art] Derive Key Pair - Done
2,931,662 UART: [art] Signing Cert with AUTHO
2,932,142 UART: RITY.KEYID = 7
2,947,168 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,933 UART: [art] PUB.X = 3153E2769CA417771052C16299B8EDA9F0EA0FE8F736E5D02150E8C1062048781B427F50B6035D5C96BB127C2421FBF1
2,954,690 UART: [art] PUB.Y = 1BC0ECC31410252A788515BBEA0BF64B9D6EBFD249FD718E2B792F7181C37DED8B88F0960AEA4C7A736542F6EF20C1CE
2,961,652 UART: [art] SIG.R = 6F9D13F9991E751773F36CF815B8F53433BF8E1FB005B923446ACC52868F544CC7738620C9C0029E8D1A3B8BF7D47730
2,968,414 UART: [art] SIG.S = B7EB6A58315BC98F593DC84477AD97C05F97E008CCD12BB51BB21D01D31CA29E34526C26BA8A5E0F164FF03FFEBFA9F4
2,992,548 UART: Caliptra RT
2,992,801 UART: [state] CFI Enabled
3,100,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,518 UART: [rt]cmd =0x49444549, len=4
3,133,923 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
894,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,128 UART: [kat] ++
898,280 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,371 UART: [kat] SHA2-512-ACC
909,272 UART: [kat] ECC-384
919,209 UART: [kat] HMAC-384Kdf
923,857 UART: [kat] LMS
1,172,185 UART: [kat] --
1,173,024 UART: [cold-reset] ++
1,173,566 UART: [fht] FHT @ 0x50003400
1,176,255 UART: [idev] ++
1,176,423 UART: [idev] CDI.KEYID = 6
1,176,783 UART: [idev] SUBJECT.KEYID = 7
1,177,207 UART: [idev] UDS.KEYID = 0
1,177,552 ready_for_fw is high
1,177,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,419 UART: [idev] Erasing UDS.KEYID = 0
1,202,914 UART: [idev] Sha1 KeyId Algorithm
1,211,442 UART: [idev] --
1,212,534 UART: [ldev] ++
1,212,702 UART: [ldev] CDI.KEYID = 6
1,213,065 UART: [ldev] SUBJECT.KEYID = 5
1,213,491 UART: [ldev] AUTHORITY.KEYID = 7
1,213,954 UART: [ldev] FE.KEYID = 1
1,219,182 UART: [ldev] Erasing FE.KEYID = 1
1,245,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,200 UART: [ldev] --
1,284,499 UART: [fwproc] Wait for Commands...
1,285,317 UART: [fwproc] Recv command 0x46574c44
1,286,045 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,380 >>> mbox cmd response: success
2,775,380 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,776,460 UART: [afmc] ++
2,776,628 UART: [afmc] CDI.KEYID = 6
2,776,990 UART: [afmc] SUBJECT.KEYID = 7
2,777,415 UART: [afmc] AUTHORITY.KEYID = 5
2,812,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,228 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,947 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,799 UART: [afmc] --
2,855,907 UART: [cold-reset] --
2,856,759 UART: [state] Locking Datavault
2,858,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,768 UART: [state] Locking ICCM
2,859,188 UART: [exit] Launching FMC @ 0x40000130
2,864,517 UART:
2,864,533 UART: Running Caliptra FMC ...
2,864,941 UART:
2,865,084 UART: [state] CFI Enabled
2,875,709 UART: [fht] FMC Alias Private Key: 7
2,984,248 UART: [art] Extend RT PCRs Done
2,984,676 UART: [art] Lock RT PCRs Done
2,985,952 UART: [art] Populate DV Done
2,993,807 UART: [fht] FMC Alias Private Key: 7
2,994,811 UART: [art] Derive CDI
2,995,091 UART: [art] Store in in slot 0x4
3,080,684 UART: [art] Derive Key Pair
3,081,044 UART: [art] Store priv key in slot 0x5
3,094,744 UART: [art] Derive Key Pair - Done
3,109,613 UART: [art] Signing Cert with AUTHO
3,110,093 UART: RITY.KEYID = 7
3,125,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,222 UART: [art] PUB.X = 2D645CF7DD1AC88A28C2608A484990B7AAF5A156C71653E5A720992EF344849632FDFDB7872C3879C0DE75BD6E7C4707
3,132,993 UART: [art] PUB.Y = C27EACEDC38177D64A545539D80F98A646151E763BF79D99A6468F8DFF182ED6AAC4CAA91E8009661DFC84DC900123FE
3,139,946 UART: [art] SIG.R = 4BF51EE8960FF5757052CD3AFA74DC9773EE339F9FBBE7946B9023251D41AC7BB4617E742F1C7FB5661B35C59F1D31A4
3,146,723 UART: [art] SIG.S = 258476961C60C8BBB65671DE40CB57053F4B24A2483B37AE0A8843402B58D17CB6DC20E6A205834107118469CAB69ACF
3,170,418 UART: Caliptra RT
3,170,763 UART: [state] CFI Enabled
3,279,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,220 UART: [rt]cmd =0x49444549, len=4
3,312,447 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,623 >>> mbox cmd response: success
2,626,623 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,688,811 UART:
2,688,827 UART: Running Caliptra FMC ...
2,689,235 UART:
2,689,378 UART: [state] CFI Enabled
2,700,045 UART: [fht] FMC Alias Private Key: 7
2,808,314 UART: [art] Extend RT PCRs Done
2,808,742 UART: [art] Lock RT PCRs Done
2,810,312 UART: [art] Populate DV Done
2,818,675 UART: [fht] FMC Alias Private Key: 7
2,819,677 UART: [art] Derive CDI
2,819,957 UART: [art] Store in in slot 0x4
2,905,460 UART: [art] Derive Key Pair
2,905,820 UART: [art] Store priv key in slot 0x5
2,919,066 UART: [art] Derive Key Pair - Done
2,933,880 UART: [art] Signing Cert with AUTHO
2,934,360 UART: RITY.KEYID = 7
2,949,308 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,073 UART: [art] PUB.X = EE48F945DE0BC0D0C89B8F5D52CA771F6F167B0B5DA69E57B09BD491A8E7BB5666C3FE425F349A341BB2EE581CFB18B5
2,956,857 UART: [art] PUB.Y = EE9F44DA2E242D5D55FA132327F031FB4F20E9EEC6C83D5541FD8FE19EA11F5557B1AD0D343B37C095213B483872BD5A
2,963,816 UART: [art] SIG.R = E3F1A8BE52520BEDDA096B789E5467111BEA8E3C02730F77B4EF89B9B08D24CB1BE720928B9B385FC27591B186A35F8A
2,970,584 UART: [art] SIG.S = F52920987651353EA472351EB4105F91104F3E6186886AF570957850B2B1FCC753059DCFD71DBB2F025058086156BF34
2,994,918 UART: Caliptra RT
2,995,263 UART: [state] CFI Enabled
3,103,277 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,935 UART: [rt]cmd =0x49444549, len=4
3,136,424 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,174,317 ready_for_fw is high
1,174,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,323 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,240,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,306 UART: [ldev] --
1,279,778 UART: [fwproc] Wait for Commands...
1,280,545 UART: [fwproc] Recv command 0x46574c44
1,281,278 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,647 >>> mbox cmd response: success
2,770,647 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,771,692 UART: [afmc] ++
2,771,860 UART: [afmc] CDI.KEYID = 6
2,772,223 UART: [afmc] SUBJECT.KEYID = 7
2,772,649 UART: [afmc] AUTHORITY.KEYID = 5
2,807,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,383 UART: [afmc] --
2,851,493 UART: [cold-reset] --
2,852,215 UART: [state] Locking Datavault
2,853,782 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,386 UART: [state] Locking ICCM
2,854,966 UART: [exit] Launching FMC @ 0x40000130
2,860,295 UART:
2,860,311 UART: Running Caliptra FMC ...
2,860,719 UART:
2,860,773 UART: [state] CFI Enabled
2,871,024 UART: [fht] FMC Alias Private Key: 7
2,978,611 UART: [art] Extend RT PCRs Done
2,979,039 UART: [art] Lock RT PCRs Done
2,980,355 UART: [art] Populate DV Done
2,988,632 UART: [fht] FMC Alias Private Key: 7
2,989,772 UART: [art] Derive CDI
2,990,052 UART: [art] Store in in slot 0x4
3,075,949 UART: [art] Derive Key Pair
3,076,309 UART: [art] Store priv key in slot 0x5
3,089,349 UART: [art] Derive Key Pair - Done
3,104,121 UART: [art] Signing Cert with AUTHO
3,104,601 UART: RITY.KEYID = 7
3,120,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,792 UART: [art] PUB.X = 0832D698B8A06FAD47A8F3853CB149943ABD149C34E00DEF65FFF0303AE9BE3AB43A2E297E2C4C6D6083859B3626B3D9
3,127,566 UART: [art] PUB.Y = BD2E9235008C69728CE61F424CEE91DD8321A73D5DCC0CA7594F26E7DF7422CF41E44F0D79AEA01273C842D83D7A4244
3,134,496 UART: [art] SIG.R = D782C0F16D0C90E77B33A985668684FEEAD22E15F71C48F730A62BF6360EEF4859AA0A9134E8104C0C24A44679C0B408
3,141,253 UART: [art] SIG.S = 059F2DC8C499ED997EF6502D0A3962A3B1EBC5F1B36B0C5AD3208C233E62B24FC0AC696AB3374C52F3F08144991779CD
3,164,475 UART: Caliptra RT
3,164,728 UART: [state] CFI Enabled
3,272,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,809 UART: [rt]cmd =0x49444549, len=4
3,305,348 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,594 ready_for_fw is high
1,056,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,439 >>> mbox cmd response: success
2,622,439 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,684,283 UART:
2,684,299 UART: Running Caliptra FMC ...
2,684,707 UART:
2,684,761 UART: [state] CFI Enabled
2,695,258 UART: [fht] FMC Alias Private Key: 7
2,803,447 UART: [art] Extend RT PCRs Done
2,803,875 UART: [art] Lock RT PCRs Done
2,805,337 UART: [art] Populate DV Done
2,813,526 UART: [fht] FMC Alias Private Key: 7
2,814,540 UART: [art] Derive CDI
2,814,820 UART: [art] Store in in slot 0x4
2,900,641 UART: [art] Derive Key Pair
2,901,001 UART: [art] Store priv key in slot 0x5
2,914,049 UART: [art] Derive Key Pair - Done
2,929,199 UART: [art] Signing Cert with AUTHO
2,929,679 UART: RITY.KEYID = 7
2,944,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,424 UART: [art] PUB.X = 618B6145FFC451C909922FF52B367EFA80E9FB0B039CD6C75C8DA855AFFE0053F956A0176895A49F2608F8FA557DA182
2,952,166 UART: [art] PUB.Y = 454A6FB1FD03E03D9BA4DB81151C8A883DD657182574958C3AF5A17B5F33B961456125C0F07305587657E34D58AB31C7
2,959,106 UART: [art] SIG.R = 76E9587D0D64BF5E53AE27197AF06EF398BF2CDCF117A141EAA9FBB799BB967E7C90C213C4BAF2619E8EB547E6E04134
2,965,889 UART: [art] SIG.S = 2BA680E50FAA8782C51C2864EB10D147EBE9DDCFB92BEFBE8FA8E2D295587FA23ED743422DDDB87CCBDB3B2BD9730DF1
2,989,492 UART: Caliptra RT
2,989,745 UART: [state] CFI Enabled
3,097,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,982 UART: [rt]cmd =0x49444549, len=4
3,130,333 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,712 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,794 UART: [idev] ++
1,173,962 UART: [idev] CDI.KEYID = 6
1,174,323 UART: [idev] SUBJECT.KEYID = 7
1,174,748 UART: [idev] UDS.KEYID = 0
1,175,094 ready_for_fw is high
1,175,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,911 UART: [ldev] ++
1,209,079 UART: [ldev] CDI.KEYID = 6
1,209,443 UART: [ldev] SUBJECT.KEYID = 5
1,209,870 UART: [ldev] AUTHORITY.KEYID = 7
1,210,333 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,241,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,827 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,896 UART: [fwproc] Recv command 0x46574c44
1,282,629 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,256 >>> mbox cmd response: success
2,772,256 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,423 UART: [afmc] ++
2,773,591 UART: [afmc] CDI.KEYID = 6
2,773,954 UART: [afmc] SUBJECT.KEYID = 7
2,774,380 UART: [afmc] AUTHORITY.KEYID = 5
2,809,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,074 UART: [afmc] --
2,853,016 UART: [cold-reset] --
2,853,846 UART: [state] Locking Datavault
2,854,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,559 UART: [state] Locking ICCM
2,856,131 UART: [exit] Launching FMC @ 0x40000130
2,861,460 UART:
2,861,476 UART: Running Caliptra FMC ...
2,861,884 UART:
2,862,027 UART: [state] CFI Enabled
2,872,528 UART: [fht] FMC Alias Private Key: 7
2,980,653 UART: [art] Extend RT PCRs Done
2,981,081 UART: [art] Lock RT PCRs Done
2,982,575 UART: [art] Populate DV Done
2,990,616 UART: [fht] FMC Alias Private Key: 7
2,991,768 UART: [art] Derive CDI
2,992,048 UART: [art] Store in in slot 0x4
3,077,649 UART: [art] Derive Key Pair
3,078,009 UART: [art] Store priv key in slot 0x5
3,091,325 UART: [art] Derive Key Pair - Done
3,106,353 UART: [art] Signing Cert with AUTHO
3,106,833 UART: RITY.KEYID = 7
3,121,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,516 UART: [art] PUB.X = 7926E0B0247A5F65A527C19C4F8DA8F4D504D89895CA3AB5E6F5B2EE3820E112140E85D11E87FAC3927964ECF932B601
3,129,281 UART: [art] PUB.Y = 55F2E3F766988D01D66E5621979184C787CFD526BB4601C93F5560F57EE43351440F7AE40450DFD5B9EC0003862F4B6E
3,136,190 UART: [art] SIG.R = C667477E3F9611071FFB05DE5A689633C28FF4064564534961223AC3499928C7A720601539EE75F2F3A6FE919ADEEAEB
3,142,949 UART: [art] SIG.S = 736404AAA7683DF517D53D81DF59410256171A7517F880F83DFD51C6AD8684151F62B28FC4975585FB69292F1E6F6BD0
3,167,752 UART: Caliptra RT
3,168,097 UART: [state] CFI Enabled
3,275,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,328 UART: [rt]cmd =0x49444549, len=4
3,308,843 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,685 ready_for_fw is high
1,056,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,312 >>> mbox cmd response: success
2,623,312 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,685,238 UART:
2,685,254 UART: Running Caliptra FMC ...
2,685,662 UART:
2,685,805 UART: [state] CFI Enabled
2,696,262 UART: [fht] FMC Alias Private Key: 7
2,803,709 UART: [art] Extend RT PCRs Done
2,804,137 UART: [art] Lock RT PCRs Done
2,805,567 UART: [art] Populate DV Done
2,813,672 UART: [fht] FMC Alias Private Key: 7
2,814,850 UART: [art] Derive CDI
2,815,130 UART: [art] Store in in slot 0x4
2,900,735 UART: [art] Derive Key Pair
2,901,095 UART: [art] Store priv key in slot 0x5
2,914,873 UART: [art] Derive Key Pair - Done
2,929,662 UART: [art] Signing Cert with AUTHO
2,930,142 UART: RITY.KEYID = 7
2,945,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,117 UART: [art] PUB.X = F0D7033C0AF583BEFBE97CFBA5C2A40586414B720B85EAF5106CA1E91FED6F3425F859E4EE85F6AD58E3A91B2A7D9A69
2,952,895 UART: [art] PUB.Y = 59BC3863196ED33403CA9DA9F38D2E757C4C102161865AFBF13359BBFC44B87B51ED704319A56CC26FD335AFE676F33E
2,959,850 UART: [art] SIG.R = 9D189396EAF13295DE5A4245D294D84703D5C9709C1A30EE7B9924528ECFD96EC261814149E5242556CA030EC848E719
2,966,605 UART: [art] SIG.S = A682D5B2105BD6A6C4313F682FEAFABC9426CC033F380B6CCCE20E377FE66D94E5D1B8EBCEE1F0EEE08E7D57A2161001
2,990,066 UART: Caliptra RT
2,990,411 UART: [state] CFI Enabled
3,098,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,885 UART: [rt]cmd =0x49444549, len=4
3,131,180 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,543 UART: [kat] SHA2-256
882,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,589 UART: [kat] ++
886,741 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,504 UART: [kat] SHA2-512-ACC
897,405 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,662 UART: [kat] LMS
1,475,858 UART: [kat] --
1,476,953 UART: [cold-reset] ++
1,477,371 UART: [fht] Storing FHT @ 0x50003400
1,480,062 UART: [idev] ++
1,480,230 UART: [idev] CDI.KEYID = 6
1,480,590 UART: [idev] SUBJECT.KEYID = 7
1,481,014 UART: [idev] UDS.KEYID = 0
1,481,359 ready_for_fw is high
1,481,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,426 UART: [idev] Erasing UDS.KEYID = 0
1,506,134 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,784 UART: [idev] --
1,515,731 UART: [ldev] ++
1,515,899 UART: [ldev] CDI.KEYID = 6
1,516,262 UART: [ldev] SUBJECT.KEYID = 5
1,516,688 UART: [ldev] AUTHORITY.KEYID = 7
1,517,151 UART: [ldev] FE.KEYID = 1
1,522,165 UART: [ldev] Erasing FE.KEYID = 1
1,547,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,146 UART: [ldev] --
1,586,419 UART: [fwproc] Waiting for Commands...
1,587,132 UART: [fwproc] Received command 0x46574c44
1,587,923 UART: [fwproc] Received Image of size 114332 bytes
2,885,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,978 >>> mbox cmd response: success
3,079,092 UART: [afmc] ++
3,079,260 UART: [afmc] CDI.KEYID = 6
3,079,622 UART: [afmc] SUBJECT.KEYID = 7
3,080,047 UART: [afmc] AUTHORITY.KEYID = 5
3,115,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,249 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,939 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,980 UART: [afmc] --
3,158,876 UART: [cold-reset] --
3,159,758 UART: [state] Locking Datavault
3,161,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,623 UART: [state] Locking ICCM
3,162,093 UART: [exit] Launching FMC @ 0x40000130
3,167,422 UART:
3,167,438 UART: Running Caliptra FMC ...
3,167,846 UART:
3,167,900 UART: [state] CFI Enabled
3,178,933 UART: [fht] FMC Alias Private Key: 7
3,286,292 UART: [art] Extend RT PCRs Done
3,286,720 UART: [art] Lock RT PCRs Done
3,288,508 UART: [art] Populate DV Done
3,296,737 UART: [fht] FMC Alias Private Key: 7
3,297,819 UART: [art] Derive CDI
3,298,099 UART: [art] Store in in slot 0x4
3,383,858 UART: [art] Derive Key Pair
3,384,218 UART: [art] Store priv key in slot 0x5
3,397,534 UART: [art] Derive Key Pair - Done
3,412,005 UART: [art] Signing Cert with AUTHO
3,412,485 UART: RITY.KEYID = 7
3,427,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,402 UART: [art] PUB.X = B43DF52E8807D622BF14B7BD25422E8793ED946EBA84C7620FC79EFF5E5DE16EDDF705A93580E5E998E6ADD9737ED232
3,435,177 UART: [art] PUB.Y = BBFF1B728CE7BB4FC2851C1675AAEE0697E9E63B5DD3A81D55DBFB11F53FEACE6378A38A06831CB86E41A8CBEF370DE0
3,442,146 UART: [art] SIG.R = 7C66741AA8580BB59F1D8DFA3467388909E1DF5B104A7054FF87B5B2C89DAAD6DA915A63305B4F3927BCC589EDD9EB96
3,448,922 UART: [art] SIG.S = D4868FEC755943EB8DD2251DD4AE7CC0289C54D0DEB2EE886F98918D992D9D38B511515918ABAD7DA222B43022E62D85
3,471,843 UART: Caliptra RT
3,472,096 UART: [state] CFI Enabled
3,580,589 UART: [rt] RT listening for mailbox commands...
3,581,259 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,007 UART: [rt]cmd =0x44504543, len=136
3,675,049 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 ready_for_fw is high
1,362,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,856 >>> mbox cmd response: success
2,991,032 UART:
2,991,048 UART: Running Caliptra FMC ...
2,991,456 UART:
2,991,510 UART: [state] CFI Enabled
3,001,357 UART: [fht] FMC Alias Private Key: 7
3,108,970 UART: [art] Extend RT PCRs Done
3,109,398 UART: [art] Lock RT PCRs Done
3,111,012 UART: [art] Populate DV Done
3,119,263 UART: [fht] FMC Alias Private Key: 7
3,120,437 UART: [art] Derive CDI
3,120,717 UART: [art] Store in in slot 0x4
3,206,040 UART: [art] Derive Key Pair
3,206,400 UART: [art] Store priv key in slot 0x5
3,219,844 UART: [art] Derive Key Pair - Done
3,234,427 UART: [art] Signing Cert with AUTHO
3,234,907 UART: RITY.KEYID = 7
3,249,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,710 UART: [art] PUB.X = 375D18EDB4EACDDDD6FA176AB1962B212B1A2C94E790FE04624E220B833197BC8237C825F6F6328EA463F7F49307DE38
3,257,479 UART: [art] PUB.Y = 44CC1D7850CB82D5947767D776CC07E843AD293F0B02A76B5959B215AB8BF1790AD986DEE8C59E5ED1F80E6AE1605151
3,264,420 UART: [art] SIG.R = 8E78D7C74E52BB47F1F916A6E71ED52A722969F9957104EC45B6719BAE5B3A0A9BA585B253766F736312DDA4FF762C01
3,271,185 UART: [art] SIG.S = 39181DBB1DED2101AB5C747858423FEAB7733E2D0347AD5B5AF16C874DABCCCC99CAC9AFB211A676020B756F4E79607F
3,294,828 UART: Caliptra RT
3,295,081 UART: [state] CFI Enabled
3,402,818 UART: [rt] RT listening for mailbox commands...
3,403,488 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,266 UART: [rt]cmd =0x44504543, len=136
3,497,330 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
894,913 UART: [kat] SHA2-512-ACC
896,814 UART: [kat] ECC-384
902,521 UART: [kat] HMAC-384Kdf
907,107 UART: [kat] LMS
1,475,303 UART: [kat] --
1,476,108 UART: [cold-reset] ++
1,476,514 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 ready_for_fw is high
1,480,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,505 UART: [idev] Erasing UDS.KEYID = 0
1,505,453 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,069 UART: [idev] --
1,514,956 UART: [ldev] ++
1,515,124 UART: [ldev] CDI.KEYID = 6
1,515,487 UART: [ldev] SUBJECT.KEYID = 5
1,515,913 UART: [ldev] AUTHORITY.KEYID = 7
1,516,376 UART: [ldev] FE.KEYID = 1
1,521,760 UART: [ldev] Erasing FE.KEYID = 1
1,547,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,387 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 114332 bytes
2,886,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,112 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,351 >>> mbox cmd response: success
3,080,569 UART: [afmc] ++
3,080,737 UART: [afmc] CDI.KEYID = 6
3,081,099 UART: [afmc] SUBJECT.KEYID = 7
3,081,524 UART: [afmc] AUTHORITY.KEYID = 5
3,116,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,453 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,846 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,536 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,429 UART: [afmc] --
3,159,533 UART: [cold-reset] --
3,160,359 UART: [state] Locking Datavault
3,161,242 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,846 UART: [state] Locking ICCM
3,162,518 UART: [exit] Launching FMC @ 0x40000130
3,167,847 UART:
3,167,863 UART: Running Caliptra FMC ...
3,168,271 UART:
3,168,414 UART: [state] CFI Enabled
3,179,039 UART: [fht] FMC Alias Private Key: 7
3,287,350 UART: [art] Extend RT PCRs Done
3,287,778 UART: [art] Lock RT PCRs Done
3,289,608 UART: [art] Populate DV Done
3,297,811 UART: [fht] FMC Alias Private Key: 7
3,298,977 UART: [art] Derive CDI
3,299,257 UART: [art] Store in in slot 0x4
3,384,854 UART: [art] Derive Key Pair
3,385,214 UART: [art] Store priv key in slot 0x5
3,398,246 UART: [art] Derive Key Pair - Done
3,413,192 UART: [art] Signing Cert with AUTHO
3,413,672 UART: RITY.KEYID = 7
3,428,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,655 UART: [art] PUB.X = D5AA1DC4951B3592F8218DF0DFF96F5675E8301A0A2972875DD375036D811BADC92E6B1C07C25B2B7C53DF011C3B97CB
3,436,423 UART: [art] PUB.Y = 83D57F5FBF45E3AE9AE1B3D3991CFD7BC766F9C1A2CF747CC67B2A9D3AA62F560526495D01120A2C0215F89E83B2A8F0
3,443,375 UART: [art] SIG.R = 48463094EB40FBE48D0671FF5B88AB2AF587D5EB685E285B814EEB615CA4DE977AA99AF681B007DC0C153A880EFF038E
3,450,144 UART: [art] SIG.S = 8E9FAEF0DEAC881C7BB25D085E8B69F9A1D165D8162F2BF7A9D6021C02FFA1C804D4013ED8DF1D7289822AD61F16C821
3,474,078 UART: Caliptra RT
3,474,423 UART: [state] CFI Enabled
3,583,594 UART: [rt] RT listening for mailbox commands...
3,584,264 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,792 UART: [rt]cmd =0x44504543, len=136
3,678,708 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 ready_for_fw is high
1,362,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,373 >>> mbox cmd response: success
2,989,209 UART:
2,989,225 UART: Running Caliptra FMC ...
2,989,633 UART:
2,989,776 UART: [state] CFI Enabled
3,000,359 UART: [fht] FMC Alias Private Key: 7
3,108,250 UART: [art] Extend RT PCRs Done
3,108,678 UART: [art] Lock RT PCRs Done
3,110,356 UART: [art] Populate DV Done
3,118,659 UART: [fht] FMC Alias Private Key: 7
3,119,831 UART: [art] Derive CDI
3,120,111 UART: [art] Store in in slot 0x4
3,205,914 UART: [art] Derive Key Pair
3,206,274 UART: [art] Store priv key in slot 0x5
3,219,420 UART: [art] Derive Key Pair - Done
3,233,990 UART: [art] Signing Cert with AUTHO
3,234,470 UART: RITY.KEYID = 7
3,249,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,485 UART: [art] PUB.X = E5B398D45D9671194CA7985A9AF7F9ECEAA340A15800A458655C91FF2DE2CD32FE274832418D5EDB88ECFEC53B7227C1
3,257,245 UART: [art] PUB.Y = FA4C2314305CC6489438D53D4D548E27667C1E10339C5C4623EACF379479192390CDD4A8D5CA1FC7FD6886388D95A629
3,264,193 UART: [art] SIG.R = 4F0A127EAEC18C1E0FB3039C6E9E2C499BEDBED93675276EEDEEF9CA63B137F93B7B996534BC9D0BD9C45EA6B45BD87E
3,270,977 UART: [art] SIG.S = BC84E4E8CC54BBF5EFD9E3A3544A93DE96F87CACE6ABFB803F834FA03D7355110310AA8BA21681DFD0F2CA41C5218EFD
3,294,823 UART: Caliptra RT
3,295,168 UART: [state] CFI Enabled
3,404,033 UART: [rt] RT listening for mailbox commands...
3,404,703 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,473 UART: [rt]cmd =0x44504543, len=136
3,500,185 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
892,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,049 UART: [kat] ++
897,201 UART: [kat] sha1
901,339 UART: [kat] SHA2-256
903,279 UART: [kat] SHA2-384
905,912 UART: [kat] SHA2-512-ACC
907,813 UART: [kat] ECC-384
917,364 UART: [kat] HMAC-384Kdf
921,926 UART: [kat] LMS
1,170,254 UART: [kat] --
1,171,259 UART: [cold-reset] ++
1,171,749 UART: [fht] FHT @ 0x50003400
1,174,360 UART: [idev] ++
1,174,528 UART: [idev] CDI.KEYID = 6
1,174,888 UART: [idev] SUBJECT.KEYID = 7
1,175,312 UART: [idev] UDS.KEYID = 0
1,175,657 ready_for_fw is high
1,175,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,889 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,017 UART: [ldev] Erasing FE.KEYID = 1
1,241,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,261 UART: [ldev] --
1,280,606 UART: [fwproc] Wait for Commands...
1,281,290 UART: [fwproc] Recv command 0x46574c44
1,282,018 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,316 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,233 >>> mbox cmd response: success
2,772,493 UART: [afmc] ++
2,772,661 UART: [afmc] CDI.KEYID = 6
2,773,023 UART: [afmc] SUBJECT.KEYID = 7
2,773,448 UART: [afmc] AUTHORITY.KEYID = 5
2,808,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,816 UART: [afmc] --
2,851,892 UART: [cold-reset] --
2,852,604 UART: [state] Locking Datavault
2,853,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,277 UART: [state] Locking ICCM
2,854,749 UART: [exit] Launching FMC @ 0x40000130
2,860,078 UART:
2,860,094 UART: Running Caliptra FMC ...
2,860,502 UART:
2,860,556 UART: [state] CFI Enabled
2,870,663 UART: [fht] FMC Alias Private Key: 7
2,979,080 UART: [art] Extend RT PCRs Done
2,979,508 UART: [art] Lock RT PCRs Done
2,981,086 UART: [art] Populate DV Done
2,989,221 UART: [fht] FMC Alias Private Key: 7
2,990,367 UART: [art] Derive CDI
2,990,647 UART: [art] Store in in slot 0x4
3,076,550 UART: [art] Derive Key Pair
3,076,910 UART: [art] Store priv key in slot 0x5
3,089,566 UART: [art] Derive Key Pair - Done
3,104,186 UART: [art] Signing Cert with AUTHO
3,104,666 UART: RITY.KEYID = 7
3,119,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,591 UART: [art] PUB.X = B4B4A0DF07D22C00979BE4AB284DF36573A320B72B2742473DEE0C5681104EE281B1324EA54C88AA1D09A0082E197843
3,127,327 UART: [art] PUB.Y = 4A05871F2F53304570021825E50F7CC3AEC3770342D25F8483D8C9B6E9D1D2311D0C73A1669EBA9178D58A3C97C466BA
3,134,260 UART: [art] SIG.R = 5A32ABB101C584F0A0F2DFA6ABBC11C59A01D145FC6FC328ABC876A977C3E5FFEB11590A6C96D94D0613D34576D6030B
3,141,028 UART: [art] SIG.S = 5F53EFEE44A8F61662AD9C4B55167F0E8886E9B18F1A87E9BF6A56E54A387C3F49D992F17BB2E650ED97AADCF2F16801
3,164,685 UART: Caliptra RT
3,164,938 UART: [state] CFI Enabled
3,272,877 UART: [rt] RT listening for mailbox commands...
3,273,547 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,329 UART: [rt]cmd =0x44504543, len=136
3,367,947 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,593 ready_for_fw is high
1,059,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,488 >>> mbox cmd response: success
2,687,872 UART:
2,687,888 UART: Running Caliptra FMC ...
2,688,296 UART:
2,688,350 UART: [state] CFI Enabled
2,699,071 UART: [fht] FMC Alias Private Key: 7
2,806,822 UART: [art] Extend RT PCRs Done
2,807,250 UART: [art] Lock RT PCRs Done
2,808,964 UART: [art] Populate DV Done
2,817,197 UART: [fht] FMC Alias Private Key: 7
2,818,233 UART: [art] Derive CDI
2,818,513 UART: [art] Store in in slot 0x4
2,903,942 UART: [art] Derive Key Pair
2,904,302 UART: [art] Store priv key in slot 0x5
2,917,342 UART: [art] Derive Key Pair - Done
2,932,099 UART: [art] Signing Cert with AUTHO
2,932,579 UART: RITY.KEYID = 7
2,947,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,610 UART: [art] PUB.X = D65C42C05B92F38D7D45A72A48F3DB94CD7FFC5CAF6E98A4C94FBABBD0F556BEEA663DD5AF385A9EC001245AD5A0B052
2,955,405 UART: [art] PUB.Y = 1E0045B5E0FAF55883BE67CF44734C5492EA5355794BB42E2A1731EB64BF48B29E6DD00F20AC949FC51789705257250D
2,962,327 UART: [art] SIG.R = 6C0A31EF081E9B1721557AFE8851B552C10CD1FCF184DCE22DF3F99985C002C52061BDEB02EF3475AE7E94732D08BF3F
2,969,091 UART: [art] SIG.S = 2DF0F117FC51F53F5F166E04A1146E670CEE68282D6E52794E85D8B00A6C6DEC2F60538F805FD8DBB2CB23D1150C0D09
2,992,480 UART: Caliptra RT
2,992,733 UART: [state] CFI Enabled
3,099,802 UART: [rt] RT listening for mailbox commands...
3,100,472 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,134 UART: [rt]cmd =0x44504543, len=136
3,194,848 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,360 UART: [kat] SHA2-256
904,300 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,451 UART: [kat] LMS
1,171,779 UART: [kat] --
1,172,866 UART: [cold-reset] ++
1,173,440 UART: [fht] FHT @ 0x50003400
1,176,065 UART: [idev] ++
1,176,233 UART: [idev] CDI.KEYID = 6
1,176,593 UART: [idev] SUBJECT.KEYID = 7
1,177,017 UART: [idev] UDS.KEYID = 0
1,177,362 ready_for_fw is high
1,177,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,202,182 UART: [idev] Sha1 KeyId Algorithm
1,210,876 UART: [idev] --
1,211,904 UART: [ldev] ++
1,212,072 UART: [ldev] CDI.KEYID = 6
1,212,435 UART: [ldev] SUBJECT.KEYID = 5
1,212,861 UART: [ldev] AUTHORITY.KEYID = 7
1,213,324 UART: [ldev] FE.KEYID = 1
1,218,382 UART: [ldev] Erasing FE.KEYID = 1
1,245,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,890 UART: [ldev] --
1,284,303 UART: [fwproc] Wait for Commands...
1,285,067 UART: [fwproc] Recv command 0x46574c44
1,285,795 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,806 >>> mbox cmd response: success
2,776,970 UART: [afmc] ++
2,777,138 UART: [afmc] CDI.KEYID = 6
2,777,500 UART: [afmc] SUBJECT.KEYID = 7
2,777,925 UART: [afmc] AUTHORITY.KEYID = 5
2,813,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,714 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,433 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,093 UART: [afmc] --
2,856,095 UART: [cold-reset] --
2,856,977 UART: [state] Locking Datavault
2,857,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,424 UART: [state] Locking ICCM
2,859,072 UART: [exit] Launching FMC @ 0x40000130
2,864,401 UART:
2,864,417 UART: Running Caliptra FMC ...
2,864,825 UART:
2,864,968 UART: [state] CFI Enabled
2,875,909 UART: [fht] FMC Alias Private Key: 7
2,984,170 UART: [art] Extend RT PCRs Done
2,984,598 UART: [art] Lock RT PCRs Done
2,985,730 UART: [art] Populate DV Done
2,994,065 UART: [fht] FMC Alias Private Key: 7
2,994,995 UART: [art] Derive CDI
2,995,275 UART: [art] Store in in slot 0x4
3,081,102 UART: [art] Derive Key Pair
3,081,462 UART: [art] Store priv key in slot 0x5
3,095,062 UART: [art] Derive Key Pair - Done
3,109,979 UART: [art] Signing Cert with AUTHO
3,110,459 UART: RITY.KEYID = 7
3,126,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,772 UART: [art] PUB.X = 883718D1F28F24911DAC7E8B40A497E5055DE0107BD2AAB9EAF4328F6DFCF119017175FD9F67CBF3627BF05A1BDF87D5
3,133,550 UART: [art] PUB.Y = D76A17BE12C9CB6E3E935EA1B50E2D7CDC03DDD4A7DA6819E0A64D16C73CCBC5C3D4DA63966A6746C77ADEBF856D65F5
3,140,520 UART: [art] SIG.R = 21589E8BB915ADECB4B9699E6001871BF099CFDBECCB9640DAAD6D7946EA03A9816CDD14DC399AF473550FDB6EE1B2E0
3,147,303 UART: [art] SIG.S = D1CE5503BD22571A6F5A0F546C3080D53EBC5CD8462D7AC714F45DAC2AF6DB63A174053020AAD5A01CAD2D6B776A9082
3,171,203 UART: Caliptra RT
3,171,548 UART: [state] CFI Enabled
3,279,889 UART: [rt] RT listening for mailbox commands...
3,280,559 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,137 UART: [rt]cmd =0x44504543, len=136
3,374,807 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,760 ready_for_fw is high
1,060,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,691 >>> mbox cmd response: success
2,688,389 UART:
2,688,405 UART: Running Caliptra FMC ...
2,688,813 UART:
2,688,956 UART: [state] CFI Enabled
2,699,559 UART: [fht] FMC Alias Private Key: 7
2,807,416 UART: [art] Extend RT PCRs Done
2,807,844 UART: [art] Lock RT PCRs Done
2,809,462 UART: [art] Populate DV Done
2,817,687 UART: [fht] FMC Alias Private Key: 7
2,818,785 UART: [art] Derive CDI
2,819,065 UART: [art] Store in in slot 0x4
2,904,784 UART: [art] Derive Key Pair
2,905,144 UART: [art] Store priv key in slot 0x5
2,918,310 UART: [art] Derive Key Pair - Done
2,933,018 UART: [art] Signing Cert with AUTHO
2,933,498 UART: RITY.KEYID = 7
2,949,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,965 UART: [art] PUB.X = CD15B1ADC841A9546238B9021EF3DE3F2291159296677F5D6AD61CC6CF1CBFBE5B8E6353DA1E5ADCCB7CA55E62A1062B
2,956,749 UART: [art] PUB.Y = 9D410B9DD534ECB96AB971773F76572997A56A2125E793AF463ED36A0727170D61204E19044E832529CD02EAB49BC110
2,963,678 UART: [art] SIG.R = 4BD5D4B2CB6402435CE800DE364973AC09D4CA031F58B6A2793E94E43EE6652FFBEED34C3907E44E19087D7650671C8C
2,970,417 UART: [art] SIG.S = E2BD555EEF75505C5A9F1AA8BCA83DE99895809EE7A605ED1F6BE5988DC77DA7DDD1FCF6C7B95D7F006E99B8AC103906
2,994,528 UART: Caliptra RT
2,994,873 UART: [state] CFI Enabled
3,103,048 UART: [rt] RT listening for mailbox commands...
3,103,718 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,068 UART: [rt]cmd =0x44504543, len=136
3,198,332 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,304 UART: [kat] LMS
1,169,616 UART: [kat] --
1,170,695 UART: [cold-reset] ++
1,171,273 UART: [fht] FHT @ 0x50003400
1,174,039 UART: [idev] ++
1,174,207 UART: [idev] CDI.KEYID = 6
1,174,568 UART: [idev] SUBJECT.KEYID = 7
1,174,993 UART: [idev] UDS.KEYID = 0
1,175,339 ready_for_fw is high
1,175,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,599 UART: [idev] Erasing UDS.KEYID = 0
1,199,495 UART: [idev] Sha1 KeyId Algorithm
1,208,345 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,215,904 UART: [ldev] Erasing FE.KEYID = 1
1,242,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,622 UART: [ldev] --
1,281,890 UART: [fwproc] Wait for Commands...
1,282,631 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,519 >>> mbox cmd response: success
2,774,600 UART: [afmc] ++
2,774,768 UART: [afmc] CDI.KEYID = 6
2,775,131 UART: [afmc] SUBJECT.KEYID = 7
2,775,557 UART: [afmc] AUTHORITY.KEYID = 5
2,811,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,939 UART: [afmc] --
2,853,867 UART: [cold-reset] --
2,854,433 UART: [state] Locking Datavault
2,855,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,228 UART: [state] Locking ICCM
2,856,868 UART: [exit] Launching FMC @ 0x40000130
2,862,197 UART:
2,862,213 UART: Running Caliptra FMC ...
2,862,621 UART:
2,862,675 UART: [state] CFI Enabled
2,873,258 UART: [fht] FMC Alias Private Key: 7
2,981,401 UART: [art] Extend RT PCRs Done
2,981,829 UART: [art] Lock RT PCRs Done
2,983,263 UART: [art] Populate DV Done
2,991,392 UART: [fht] FMC Alias Private Key: 7
2,992,466 UART: [art] Derive CDI
2,992,746 UART: [art] Store in in slot 0x4
3,078,475 UART: [art] Derive Key Pair
3,078,835 UART: [art] Store priv key in slot 0x5
3,092,351 UART: [art] Derive Key Pair - Done
3,106,855 UART: [art] Signing Cert with AUTHO
3,107,335 UART: RITY.KEYID = 7
3,122,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,242 UART: [art] PUB.X = AA587F5FA64EADC6B3C04AC0659118B32CA0F3AB572A8C735AE44CBBCD8DDBC36E5DFFC11CDC7F697348E7CCA9BDD007
3,130,043 UART: [art] PUB.Y = 684FB646D1D47D1F4765007752009D20A9010C14A1933A0CD982CAD6574C7C9D47478635CC94220EB6D173F101C24D1B
3,136,928 UART: [art] SIG.R = 8F2C1A0B3ADDCD7BFC87264FF1E7958E271C1AC1AD6CBFFEB56743583188233697E3F1324304F1380E20B74EB7AC9949
3,143,699 UART: [art] SIG.S = 7CB653E16432699CD8350C240AB4C0CB8FBED2BF7BA578F4587315B1D6029DBF2A0B60B5BE9A0AD218D7F4F5AFC0AA0B
3,168,062 UART: Caliptra RT
3,168,315 UART: [state] CFI Enabled
3,275,712 UART: [rt] RT listening for mailbox commands...
3,276,382 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,026 UART: [rt]cmd =0x44504543, len=136
3,369,788 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,282 ready_for_fw is high
1,056,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,241 >>> mbox cmd response: success
2,686,225 UART:
2,686,241 UART: Running Caliptra FMC ...
2,686,649 UART:
2,686,703 UART: [state] CFI Enabled
2,697,294 UART: [fht] FMC Alias Private Key: 7
2,804,937 UART: [art] Extend RT PCRs Done
2,805,365 UART: [art] Lock RT PCRs Done
2,806,963 UART: [art] Populate DV Done
2,815,192 UART: [fht] FMC Alias Private Key: 7
2,816,320 UART: [art] Derive CDI
2,816,600 UART: [art] Store in in slot 0x4
2,902,329 UART: [art] Derive Key Pair
2,902,689 UART: [art] Store priv key in slot 0x5
2,915,965 UART: [art] Derive Key Pair - Done
2,930,971 UART: [art] Signing Cert with AUTHO
2,931,451 UART: RITY.KEYID = 7
2,946,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,048 UART: [art] PUB.X = 0CD6D55A2ECD82D8B28C6C6180E32BF67CC3AD38234C86093B63B949616FB6CC813D4E10BEAE69963BB8F463C19B1A67
2,953,824 UART: [art] PUB.Y = 13B16CBEC283A218BF53D481B056934DEDD5ADC59B2D63EFF6C89AD5F43450A2B8C085FA2782D419179C00A3AA357061
2,960,762 UART: [art] SIG.R = C8E7EA50252D82BCC018E3F9F6BE0D851E7DDFD56CE5AF974EA8A094FC7B0B2D9CFBBAFDC85E123EE7EA5AED55E9DA42
2,967,564 UART: [art] SIG.S = EB1083C50A5EFA521895D514DD3508B0F31266654344499981E940CA767A2C67608BF1898A8A1E7B64EDEE327F703272
2,991,331 UART: Caliptra RT
2,991,584 UART: [state] CFI Enabled
3,099,074 UART: [rt] RT listening for mailbox commands...
3,099,744 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,480 UART: [rt]cmd =0x44504543, len=136
3,193,242 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,174,926 ready_for_fw is high
1,174,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,760 UART: [idev] Sha1 KeyId Algorithm
1,208,700 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,437 UART: [fwproc] Wait for Commands...
1,283,160 UART: [fwproc] Recv command 0x46574c44
1,283,893 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,386 >>> mbox cmd response: success
2,775,561 UART: [afmc] ++
2,775,729 UART: [afmc] CDI.KEYID = 6
2,776,092 UART: [afmc] SUBJECT.KEYID = 7
2,776,518 UART: [afmc] AUTHORITY.KEYID = 5
2,812,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,281 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,678 UART: [afmc] --
2,855,702 UART: [cold-reset] --
2,856,610 UART: [state] Locking Datavault
2,857,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,245 UART: [state] Locking ICCM
2,858,735 UART: [exit] Launching FMC @ 0x40000130
2,864,064 UART:
2,864,080 UART: Running Caliptra FMC ...
2,864,488 UART:
2,864,631 UART: [state] CFI Enabled
2,874,914 UART: [fht] FMC Alias Private Key: 7
2,983,273 UART: [art] Extend RT PCRs Done
2,983,701 UART: [art] Lock RT PCRs Done
2,984,985 UART: [art] Populate DV Done
2,992,970 UART: [fht] FMC Alias Private Key: 7
2,993,958 UART: [art] Derive CDI
2,994,238 UART: [art] Store in in slot 0x4
3,079,999 UART: [art] Derive Key Pair
3,080,359 UART: [art] Store priv key in slot 0x5
3,094,019 UART: [art] Derive Key Pair - Done
3,108,784 UART: [art] Signing Cert with AUTHO
3,109,264 UART: RITY.KEYID = 7
3,124,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,261 UART: [art] PUB.X = 9EA511C0E6D14624DD11EF6E25CD145D7CE5E9A95C38A0B4E72FD86BC64F601D5B17813DF97176B6FE255CDE1664739F
3,132,043 UART: [art] PUB.Y = 3559A75146FBAD21C46BB4700341F8DA363FA9E505904EA0F3452F96468AFE993E8F12E80E8B0CDA20BCCC4015CA3ABE
3,138,995 UART: [art] SIG.R = E116019112467892294DF6C52E9447206130FED9D305CCB1CD99252A60FDB2BA7ABA2E605F3619EEE2B62AFACAC83B7E
3,145,771 UART: [art] SIG.S = DD441A7F5D8235BF65BA32D8B1A4AE8111718D09ABFB9519636F42B8E20635BBCD11831353B3807308D3F5932B9ABBFD
3,169,549 UART: Caliptra RT
3,169,894 UART: [state] CFI Enabled
3,277,754 UART: [rt] RT listening for mailbox commands...
3,278,424 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,216 UART: [rt]cmd =0x44504543, len=136
3,372,522 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,667 ready_for_fw is high
1,056,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,520 >>> mbox cmd response: success
2,685,092 UART:
2,685,108 UART: Running Caliptra FMC ...
2,685,516 UART:
2,685,659 UART: [state] CFI Enabled
2,696,086 UART: [fht] FMC Alias Private Key: 7
2,803,799 UART: [art] Extend RT PCRs Done
2,804,227 UART: [art] Lock RT PCRs Done
2,805,429 UART: [art] Populate DV Done
2,813,650 UART: [fht] FMC Alias Private Key: 7
2,814,584 UART: [art] Derive CDI
2,814,864 UART: [art] Store in in slot 0x4
2,900,815 UART: [art] Derive Key Pair
2,901,175 UART: [art] Store priv key in slot 0x5
2,914,667 UART: [art] Derive Key Pair - Done
2,929,344 UART: [art] Signing Cert with AUTHO
2,929,824 UART: RITY.KEYID = 7
2,944,644 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,409 UART: [art] PUB.X = 2B7C86785EA2EAD50A488182E710946CF15BF88DA0752741F4F4FB743EE7FB2739C0F4DDEB5296639081EE4E3D15B6C8
2,952,184 UART: [art] PUB.Y = C6B86428613C8E32E5C61847CCB9D7432CA19B577EE3D0E58912F885D42DAE1573F539C91A819E3BF08031EA3912A811
2,959,134 UART: [art] SIG.R = EBB6F139A1D67AF395EA339F8E8EA1EDF14B7E3A2561E76D599C484E50D2412BEEA49812EBF2F55DF4975BC7B8990EE3
2,965,919 UART: [art] SIG.S = F23474DB49135E765B6AB81CFD005796B856BC208041E3F7DAE6780643868AF33BAB5BA7FFB4445D4DE23041B63206F6
2,990,120 UART: Caliptra RT
2,990,465 UART: [state] CFI Enabled
3,097,339 UART: [rt] RT listening for mailbox commands...
3,098,009 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,847 UART: [rt]cmd =0x44504543, len=136
3,191,985 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,745 UART: [kat] SHA2-256
881,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,791 UART: [kat] ++
885,943 UART: [kat] sha1
890,269 UART: [kat] SHA2-256
892,207 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 ready_for_fw is high
1,481,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,512 UART: [idev] Erasing UDS.KEYID = 0
1,504,624 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,120 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,939 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,300 UART: [ldev] --
1,585,649 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 114332 bytes
2,884,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,703 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,802 >>> mbox cmd response: success
3,077,980 UART: [afmc] ++
3,078,148 UART: [afmc] CDI.KEYID = 6
3,078,510 UART: [afmc] SUBJECT.KEYID = 7
3,078,935 UART: [afmc] AUTHORITY.KEYID = 5
3,114,526 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,515 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,205 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,944 UART: [afmc] --
3,157,998 UART: [cold-reset] --
3,158,964 UART: [state] Locking Datavault
3,160,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,031 UART: [state] Locking ICCM
3,161,559 UART: [exit] Launching FMC @ 0x40000130
3,166,888 UART:
3,166,904 UART: Running Caliptra FMC ...
3,167,312 UART:
3,167,366 UART: [state] CFI Enabled
3,178,009 UART: [fht] FMC Alias Private Key: 7
3,286,046 UART: [art] Extend RT PCRs Done
3,286,474 UART: [art] Lock RT PCRs Done
3,287,872 UART: [art] Populate DV Done
3,296,313 UART: [fht] FMC Alias Private Key: 7
3,297,327 UART: [art] Derive CDI
3,297,607 UART: [art] Store in in slot 0x4
3,383,402 UART: [art] Derive Key Pair
3,383,762 UART: [art] Store priv key in slot 0x5
3,397,148 UART: [art] Derive Key Pair - Done
3,411,900 UART: [art] Signing Cert with AUTHO
3,412,380 UART: RITY.KEYID = 7
3,427,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,661 UART: [art] PUB.X = B8775B4F5A9B29008B5DB29ECB5AF5C805D97A044AEC6CE0DCC17FB143A14CE3AEE52ADE24A6F0A593AD6A230B6AFC8C
3,435,430 UART: [art] PUB.Y = 8CBF2B30EF2A30CCF26FD1DD42E0CDCEF39592413A97994DA5F1178A3C939828C24468AF11FD61923A96875A0B9B54F0
3,442,387 UART: [art] SIG.R = 021A834C4343C1E4E2AE8E3286FC411F31FA08FD88E96CED76A7DE0EA544526EB4B07EEFC91BF18DFB8C1AC2F841D974
3,449,168 UART: [art] SIG.S = 11A75ED16FF0F24C57045DBAC1D99097760BE37F57DA34FFC4579340DF0D85317F6583B720FB3FA0852C85B2B3EF2A2D
3,472,790 UART: Caliptra RT
3,473,043 UART: [state] CFI Enabled
3,581,501 UART: [rt] RT listening for mailbox commands...
3,582,171 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,795 UART: [rt]cmd =0x44504543, len=92
3,829,616 >>> mbox cmd response data (6284 bytes)
3,829,617 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,008 UART: [rt]cmd =0x43455252, len=4
3,869,830 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,641 ready_for_fw is high
1,362,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,710 >>> mbox cmd response: success
2,988,978 UART:
2,988,994 UART: Running Caliptra FMC ...
2,989,402 UART:
2,989,456 UART: [state] CFI Enabled
2,999,879 UART: [fht] FMC Alias Private Key: 7
3,107,402 UART: [art] Extend RT PCRs Done
3,107,830 UART: [art] Lock RT PCRs Done
3,109,136 UART: [art] Populate DV Done
3,117,351 UART: [fht] FMC Alias Private Key: 7
3,118,499 UART: [art] Derive CDI
3,118,779 UART: [art] Store in in slot 0x4
3,204,300 UART: [art] Derive Key Pair
3,204,660 UART: [art] Store priv key in slot 0x5
3,217,610 UART: [art] Derive Key Pair - Done
3,232,589 UART: [art] Signing Cert with AUTHO
3,233,069 UART: RITY.KEYID = 7
3,248,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,542 UART: [art] PUB.X = 53AFD3654368678A2C0BA51A8C9312F683FC88F080406D0C9B544275C17C67E90B3E9971747E49A1622DB5B1E9D4D368
3,256,299 UART: [art] PUB.Y = 56142880D2BCB80A91232BD1E23AB5A32B45F2539E2CF8EED15BCA0B751390B44EB137599E683BDCB6C63825F08D330E
3,263,248 UART: [art] SIG.R = F60931E1095E72E5D712FC406E3FC2EB5616BBD8FD13304D2EFE3B4FAB55C68DBB76255A28452BA3B52431313CEEB3D7
3,270,026 UART: [art] SIG.S = 18B8CDB257363FB6107FE359AE6F3529E762C3987DD8EC598C145DD10BB542E1C5C9ED2B588837F63300684BF11835C2
3,293,408 UART: Caliptra RT
3,293,661 UART: [state] CFI Enabled
3,401,962 UART: [rt] RT listening for mailbox commands...
3,402,632 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,316 UART: [rt]cmd =0x44504543, len=92
3,649,705 >>> mbox cmd response data (6284 bytes)
3,649,706 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,065 UART: [rt]cmd =0x43455252, len=4
3,689,837 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,906 UART: [kat] SHA2-256
882,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,952 UART: [kat] ++
887,104 UART: [kat] sha1
891,424 UART: [kat] SHA2-256
893,362 UART: [kat] SHA2-384
896,189 UART: [kat] SHA2-512-ACC
898,090 UART: [kat] ECC-384
903,811 UART: [kat] HMAC-384Kdf
908,547 UART: [kat] LMS
1,476,743 UART: [kat] --
1,477,394 UART: [cold-reset] ++
1,477,918 UART: [fht] Storing FHT @ 0x50003400
1,480,807 UART: [idev] ++
1,480,975 UART: [idev] CDI.KEYID = 6
1,481,335 UART: [idev] SUBJECT.KEYID = 7
1,481,759 UART: [idev] UDS.KEYID = 0
1,482,104 ready_for_fw is high
1,482,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,705 UART: [idev] Erasing UDS.KEYID = 0
1,506,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,629 UART: [idev] --
1,515,626 UART: [ldev] ++
1,515,794 UART: [ldev] CDI.KEYID = 6
1,516,157 UART: [ldev] SUBJECT.KEYID = 5
1,516,583 UART: [ldev] AUTHORITY.KEYID = 7
1,517,046 UART: [ldev] FE.KEYID = 1
1,522,414 UART: [ldev] Erasing FE.KEYID = 1
1,547,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,821 UART: [ldev] --
1,587,114 UART: [fwproc] Waiting for Commands...
1,587,895 UART: [fwproc] Received command 0x46574c44
1,588,686 UART: [fwproc] Received Image of size 114332 bytes
2,886,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,248 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,463 >>> mbox cmd response: success
3,080,555 UART: [afmc] ++
3,080,723 UART: [afmc] CDI.KEYID = 6
3,081,085 UART: [afmc] SUBJECT.KEYID = 7
3,081,510 UART: [afmc] AUTHORITY.KEYID = 5
3,117,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,469 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,862 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,552 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,405 UART: [afmc] --
3,160,477 UART: [cold-reset] --
3,161,323 UART: [state] Locking Datavault
3,162,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,022 UART: [state] Locking ICCM
3,163,630 UART: [exit] Launching FMC @ 0x40000130
3,168,959 UART:
3,168,975 UART: Running Caliptra FMC ...
3,169,383 UART:
3,169,526 UART: [state] CFI Enabled
3,180,465 UART: [fht] FMC Alias Private Key: 7
3,288,538 UART: [art] Extend RT PCRs Done
3,288,966 UART: [art] Lock RT PCRs Done
3,290,392 UART: [art] Populate DV Done
3,298,539 UART: [fht] FMC Alias Private Key: 7
3,299,497 UART: [art] Derive CDI
3,299,777 UART: [art] Store in in slot 0x4
3,385,576 UART: [art] Derive Key Pair
3,385,936 UART: [art] Store priv key in slot 0x5
3,399,396 UART: [art] Derive Key Pair - Done
3,414,306 UART: [art] Signing Cert with AUTHO
3,414,786 UART: RITY.KEYID = 7
3,429,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,713 UART: [art] PUB.X = 3FD709DCE7037E87B02F4A2740787FB8499BE5158A669FE71DDC3ED09713F1AA67699698ACF0191DCD43B7EEAF7FAD8B
3,437,493 UART: [art] PUB.Y = 2D92343E15B3593E066DF5F6E13144B8778E87A89011D8F8087D272C4E0D455CD8696449A1B9A470D451FC7F9CE64E41
3,444,430 UART: [art] SIG.R = 44B38EEC8182141E1097A50C3A573402FFA2540A34AC1F765885128B688741606293C877567B222592B8694DC2F501CA
3,451,174 UART: [art] SIG.S = 073B14CEF56C4875B205F7A20F15A9701A849A5518F1F6FAB53C07CB39AE2C59135C0F07117491D38AE6FB9D4762E07C
3,475,543 UART: Caliptra RT
3,475,888 UART: [state] CFI Enabled
3,584,336 UART: [rt] RT listening for mailbox commands...
3,585,006 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,126 UART: [rt]cmd =0x44504543, len=92
3,830,536 >>> mbox cmd response data (6284 bytes)
3,830,537 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,748 UART: [rt]cmd =0x43455252, len=4
3,870,688 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,594 ready_for_fw is high
1,362,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,525 >>> mbox cmd response: success
2,987,391 UART:
2,987,407 UART: Running Caliptra FMC ...
2,987,815 UART:
2,987,958 UART: [state] CFI Enabled
2,998,247 UART: [fht] FMC Alias Private Key: 7
3,105,950 UART: [art] Extend RT PCRs Done
3,106,378 UART: [art] Lock RT PCRs Done
3,108,084 UART: [art] Populate DV Done
3,116,471 UART: [fht] FMC Alias Private Key: 7
3,117,617 UART: [art] Derive CDI
3,117,897 UART: [art] Store in in slot 0x4
3,203,752 UART: [art] Derive Key Pair
3,204,112 UART: [art] Store priv key in slot 0x5
3,217,676 UART: [art] Derive Key Pair - Done
3,232,691 UART: [art] Signing Cert with AUTHO
3,233,171 UART: RITY.KEYID = 7
3,248,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,212 UART: [art] PUB.X = A2E06B54506264C9C648F12916E2DEBAE12277562C9C78CE1326ECA3697C4A1DC1A2D5CB14AF5A26A7791C82B530C216
3,255,988 UART: [art] PUB.Y = BC17B500B13FCE8DAC5266955819A72073F460B5400C31FFA1AC70EDF8D31658DFD48AC9044A3A129EF2E92DD8FA5E4A
3,262,926 UART: [art] SIG.R = B2DEC467364721FFECAC2D65422B6AD7EAF1A54EDAF8B540544CDF53E6B3B254B94E10CE91FC9423D18BECB7C7CAD462
3,269,722 UART: [art] SIG.S = 741E9CDEDF6F5817852348E49BF7454F64F50E528E70D081B15A4FC2EAC69076F4F5BA6A53B933362F172E89F452A80B
3,293,611 UART: Caliptra RT
3,293,956 UART: [state] CFI Enabled
3,403,031 UART: [rt] RT listening for mailbox commands...
3,403,701 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,101 UART: [rt]cmd =0x44504543, len=92
3,649,003 >>> mbox cmd response data (6284 bytes)
3,649,004 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,355 UART: [rt]cmd =0x43455252, len=4
3,689,321 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
893,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,597 UART: [kat] ++
897,749 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,171,461 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 ready_for_fw is high
1,175,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,409 UART: [idev] Sha1 KeyId Algorithm
1,208,893 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,576 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,650 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,361 >>> mbox cmd response: success
2,776,389 UART: [afmc] ++
2,776,557 UART: [afmc] CDI.KEYID = 6
2,776,919 UART: [afmc] SUBJECT.KEYID = 7
2,777,344 UART: [afmc] AUTHORITY.KEYID = 5
2,812,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,602 UART: [afmc] --
2,856,734 UART: [cold-reset] --
2,857,540 UART: [state] Locking Datavault
2,858,891 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,495 UART: [state] Locking ICCM
2,860,025 UART: [exit] Launching FMC @ 0x40000130
2,865,354 UART:
2,865,370 UART: Running Caliptra FMC ...
2,865,778 UART:
2,865,832 UART: [state] CFI Enabled
2,876,361 UART: [fht] FMC Alias Private Key: 7
2,984,644 UART: [art] Extend RT PCRs Done
2,985,072 UART: [art] Lock RT PCRs Done
2,986,958 UART: [art] Populate DV Done
2,994,995 UART: [fht] FMC Alias Private Key: 7
2,995,981 UART: [art] Derive CDI
2,996,261 UART: [art] Store in in slot 0x4
3,081,832 UART: [art] Derive Key Pair
3,082,192 UART: [art] Store priv key in slot 0x5
3,095,454 UART: [art] Derive Key Pair - Done
3,110,150 UART: [art] Signing Cert with AUTHO
3,110,630 UART: RITY.KEYID = 7
3,126,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,971 UART: [art] PUB.X = B481228A43771690014D5663AC17CB1B9F364A3969B6A217328A14AA4DF5642A453D2C00EF0BC1D47334C80B47CAB485
3,133,708 UART: [art] PUB.Y = 72C4969D80373804D099E6F966D808F98A7ED62E5C08E2C31D6CEC7FA60DC8A853C5FB1B8E64D61E418F56DE8533DE30
3,140,654 UART: [art] SIG.R = 40B47C3B2835328F4E522B5F0722A15D2315254C1EE62461702961915F1C820E15FF5CAF1EF2BDF8866C413F82EDFEF3
3,147,420 UART: [art] SIG.S = 10E41D62CF99C3DAB4B1E68335879640317003AFB5D55E940FE7351D5F6A76CCB9C4EEF70B67BEC810F62A20B18F6D2C
3,171,728 UART: Caliptra RT
3,171,981 UART: [state] CFI Enabled
3,280,826 UART: [rt] RT listening for mailbox commands...
3,281,496 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,886 UART: [rt]cmd =0x44504543, len=92
3,528,153 >>> mbox cmd response data (6284 bytes)
3,528,154 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,319 UART: [rt]cmd =0x43455252, len=4
3,568,293 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 ready_for_fw is high
1,060,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,634 >>> mbox cmd response: success
2,687,206 UART:
2,687,222 UART: Running Caliptra FMC ...
2,687,630 UART:
2,687,684 UART: [state] CFI Enabled
2,697,967 UART: [fht] FMC Alias Private Key: 7
2,805,988 UART: [art] Extend RT PCRs Done
2,806,416 UART: [art] Lock RT PCRs Done
2,808,314 UART: [art] Populate DV Done
2,816,483 UART: [fht] FMC Alias Private Key: 7
2,817,637 UART: [art] Derive CDI
2,817,917 UART: [art] Store in in slot 0x4
2,903,462 UART: [art] Derive Key Pair
2,903,822 UART: [art] Store priv key in slot 0x5
2,916,852 UART: [art] Derive Key Pair - Done
2,931,373 UART: [art] Signing Cert with AUTHO
2,931,853 UART: RITY.KEYID = 7
2,947,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,802 UART: [art] PUB.X = 06453DBF2D6218BF3C603AD253495BB06414DF1902304A4BCB68669489CCB1D051A4085B3C69F393AFBC7B9BC89757A6
2,954,567 UART: [art] PUB.Y = 4A6561E92387C6CB5C2FA307447497F4B3A3C8E25772D3DC07E99CB24663B9626AE54E015A435464957B9DB37211760C
2,961,499 UART: [art] SIG.R = FAA4594029431F9DF256B28420E1CA21FAC29CEA4E9B766FC476FA6C195092F8F083F110464895ECE5EFD7D4DACD35CB
2,968,285 UART: [art] SIG.S = 35E6BA8A314B9D8761E2992C095ECC3F502DAD4CA0902B30EEAD86F3C2F685CB40BAB71D85D4254335641A6655DED921
2,991,811 UART: Caliptra RT
2,992,064 UART: [state] CFI Enabled
3,098,765 UART: [rt] RT listening for mailbox commands...
3,099,435 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,009 UART: [rt]cmd =0x44504543, len=92
3,345,448 >>> mbox cmd response data (6284 bytes)
3,345,449 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,026 UART: [rt]cmd =0x43455252, len=4
3,385,818 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
917,999 UART: [kat] HMAC-384Kdf
922,699 UART: [kat] LMS
1,171,027 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,306 UART: [fht] FHT @ 0x50003400
1,175,001 UART: [idev] ++
1,175,169 UART: [idev] CDI.KEYID = 6
1,175,529 UART: [idev] SUBJECT.KEYID = 7
1,175,953 UART: [idev] UDS.KEYID = 0
1,176,298 ready_for_fw is high
1,176,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,631 UART: [idev] Erasing UDS.KEYID = 0
1,200,932 UART: [idev] Sha1 KeyId Algorithm
1,209,476 UART: [idev] --
1,210,342 UART: [ldev] ++
1,210,510 UART: [ldev] CDI.KEYID = 6
1,210,873 UART: [ldev] SUBJECT.KEYID = 5
1,211,299 UART: [ldev] AUTHORITY.KEYID = 7
1,211,762 UART: [ldev] FE.KEYID = 1
1,217,064 UART: [ldev] Erasing FE.KEYID = 1
1,243,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,104 UART: [ldev] --
1,282,607 UART: [fwproc] Wait for Commands...
1,283,385 UART: [fwproc] Recv command 0x46574c44
1,284,113 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,376 >>> mbox cmd response: success
2,776,444 UART: [afmc] ++
2,776,612 UART: [afmc] CDI.KEYID = 6
2,776,974 UART: [afmc] SUBJECT.KEYID = 7
2,777,399 UART: [afmc] AUTHORITY.KEYID = 5
2,813,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,473 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,611 UART: [afmc] --
2,856,715 UART: [cold-reset] --
2,857,799 UART: [state] Locking Datavault
2,859,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,628 UART: [state] Locking ICCM
2,860,212 UART: [exit] Launching FMC @ 0x40000130
2,865,541 UART:
2,865,557 UART: Running Caliptra FMC ...
2,865,965 UART:
2,866,108 UART: [state] CFI Enabled
2,876,803 UART: [fht] FMC Alias Private Key: 7
2,985,424 UART: [art] Extend RT PCRs Done
2,985,852 UART: [art] Lock RT PCRs Done
2,987,448 UART: [art] Populate DV Done
2,995,985 UART: [fht] FMC Alias Private Key: 7
2,997,051 UART: [art] Derive CDI
2,997,331 UART: [art] Store in in slot 0x4
3,083,128 UART: [art] Derive Key Pair
3,083,488 UART: [art] Store priv key in slot 0x5
3,096,412 UART: [art] Derive Key Pair - Done
3,110,808 UART: [art] Signing Cert with AUTHO
3,111,288 UART: RITY.KEYID = 7
3,126,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,331 UART: [art] PUB.X = 230FD4EE22CEB885A9641B2944F6670C2FCFBB6C912A8308E36207AACA236A9E244559436C9528A5A604332D771A688F
3,134,086 UART: [art] PUB.Y = E3E5C4B7526920E491494B94CBB8F6FB33C966639CB7DFB0D8FFFB4193D853A8E7020ABCE9CB868A7E4D602182AE29AF
3,141,046 UART: [art] SIG.R = 02C957222A11D7F7DDC40FD9367D9D065B8D3D8A96B335A787D68C4F0044DFADF305DA731036717FA31FBB7B7319F76B
3,147,790 UART: [art] SIG.S = DDD6A6BC2F0D7C980E44F5CCADA824B7C61A6F21852FFE51C49501BB77D75143C1A8708CCE42802DC27090359180598F
3,170,848 UART: Caliptra RT
3,171,193 UART: [state] CFI Enabled
3,278,394 UART: [rt] RT listening for mailbox commands...
3,279,064 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,826 UART: [rt]cmd =0x44504543, len=92
3,526,362 >>> mbox cmd response data (6284 bytes)
3,526,363 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,714 UART: [rt]cmd =0x43455252, len=4
3,566,474 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,212 ready_for_fw is high
1,060,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,175 >>> mbox cmd response: success
2,687,225 UART:
2,687,241 UART: Running Caliptra FMC ...
2,687,649 UART:
2,687,792 UART: [state] CFI Enabled
2,698,455 UART: [fht] FMC Alias Private Key: 7
2,806,502 UART: [art] Extend RT PCRs Done
2,806,930 UART: [art] Lock RT PCRs Done
2,808,334 UART: [art] Populate DV Done
2,816,637 UART: [fht] FMC Alias Private Key: 7
2,817,673 UART: [art] Derive CDI
2,817,953 UART: [art] Store in in slot 0x4
2,903,944 UART: [art] Derive Key Pair
2,904,304 UART: [art] Store priv key in slot 0x5
2,917,586 UART: [art] Derive Key Pair - Done
2,932,135 UART: [art] Signing Cert with AUTHO
2,932,615 UART: RITY.KEYID = 7
2,948,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,042 UART: [art] PUB.X = 5C2F5A8CFF526E16255422D6188DEDCAD9E031E1AD602360D9752579C0EFD06453149F0ECE8E62E61F51D666A17D8CE7
2,955,817 UART: [art] PUB.Y = A0E68E26245405E108E783D4F5A7945A7B38C5404CB5874F4429584D6214F53A2B97FC17E34C5883CE4B22ECBA42CE49
2,962,761 UART: [art] SIG.R = 8C5D21B52A762C6641E25A78A73558C96FE81B5B2061439D8C6DBAAF4EAA47457C4B87052090F8CCC71D7D28FA6115E3
2,969,534 UART: [art] SIG.S = 0C2E829BA19D705282B9ACE47652BD6664C747605D5616E4385E1CBD0B1185A175DB694EF5376FAF2A499BD393AE3846
2,993,581 UART: Caliptra RT
2,993,926 UART: [state] CFI Enabled
3,101,295 UART: [rt] RT listening for mailbox commands...
3,101,965 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,265 UART: [rt]cmd =0x44504543, len=92
3,349,153 >>> mbox cmd response data (6284 bytes)
3,349,154 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,501 UART: [rt]cmd =0x43455252, len=4
3,389,223 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,667 UART: [idev] --
1,208,814 UART: [ldev] ++
1,208,982 UART: [ldev] CDI.KEYID = 6
1,209,346 UART: [ldev] SUBJECT.KEYID = 5
1,209,773 UART: [ldev] AUTHORITY.KEYID = 7
1,210,236 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,240,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,598 UART: [ldev] --
1,279,884 UART: [fwproc] Wait for Commands...
1,280,551 UART: [fwproc] Recv command 0x46574c44
1,281,284 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,325 >>> mbox cmd response: success
2,773,570 UART: [afmc] ++
2,773,738 UART: [afmc] CDI.KEYID = 6
2,774,101 UART: [afmc] SUBJECT.KEYID = 7
2,774,527 UART: [afmc] AUTHORITY.KEYID = 5
2,810,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,647 UART: [afmc] --
2,853,755 UART: [cold-reset] --
2,854,397 UART: [state] Locking Datavault
2,855,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,304 UART: [state] Locking ICCM
2,856,888 UART: [exit] Launching FMC @ 0x40000130
2,862,217 UART:
2,862,233 UART: Running Caliptra FMC ...
2,862,641 UART:
2,862,695 UART: [state] CFI Enabled
2,873,358 UART: [fht] FMC Alias Private Key: 7
2,981,015 UART: [art] Extend RT PCRs Done
2,981,443 UART: [art] Lock RT PCRs Done
2,983,029 UART: [art] Populate DV Done
2,991,200 UART: [fht] FMC Alias Private Key: 7
2,992,166 UART: [art] Derive CDI
2,992,446 UART: [art] Store in in slot 0x4
3,078,319 UART: [art] Derive Key Pair
3,078,679 UART: [art] Store priv key in slot 0x5
3,091,955 UART: [art] Derive Key Pair - Done
3,106,757 UART: [art] Signing Cert with AUTHO
3,107,237 UART: RITY.KEYID = 7
3,122,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,442 UART: [art] PUB.X = E56D876AB7F98BF10FBD35C1722090EF94D6AE75165DE7356260F51D9DB9B1D0C2A5984B1822AC7E4C55F1D90F51A62A
3,130,216 UART: [art] PUB.Y = 3062635D60CC80B88D5F46E8742384EAE7901F86E465B4899443D2950CD54EF34E9B4E40C678C9E2F39D3BEAF95C81F8
3,137,165 UART: [art] SIG.R = 60FA5EE7C9B1C4516713BE125559F39CA70A8715AE858C910E50F489350AA38F3B0CCD48B15470DCFB1931A7FC88DAF4
3,143,933 UART: [art] SIG.S = CD7688CA77B92BB72F6F6C626A23CEFC4A8C5C49D77CFDB2B0671044686F20434961209456C46F8F366FA58874DB56F7
3,167,984 UART: Caliptra RT
3,168,237 UART: [state] CFI Enabled
3,276,102 UART: [rt] RT listening for mailbox commands...
3,276,772 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,156 UART: [rt]cmd =0x44504543, len=92
3,523,771 >>> mbox cmd response data (6284 bytes)
3,523,772 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,415 UART: [rt]cmd =0x43455252, len=4
3,564,067 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,298 ready_for_fw is high
1,056,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,669 >>> mbox cmd response: success
2,685,363 UART:
2,685,379 UART: Running Caliptra FMC ...
2,685,787 UART:
2,685,841 UART: [state] CFI Enabled
2,696,320 UART: [fht] FMC Alias Private Key: 7
2,803,881 UART: [art] Extend RT PCRs Done
2,804,309 UART: [art] Lock RT PCRs Done
2,805,991 UART: [art] Populate DV Done
2,814,262 UART: [fht] FMC Alias Private Key: 7
2,815,322 UART: [art] Derive CDI
2,815,602 UART: [art] Store in in slot 0x4
2,901,467 UART: [art] Derive Key Pair
2,901,827 UART: [art] Store priv key in slot 0x5
2,915,075 UART: [art] Derive Key Pair - Done
2,929,685 UART: [art] Signing Cert with AUTHO
2,930,165 UART: RITY.KEYID = 7
2,944,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,516 UART: [art] PUB.X = 856EF9BACFE2BDB22DCE96286704062733C0BFB8C3334B3DF48ECFFF2B85B6E57AD8B0F074E46F9CD29BC0B6536E53ED
2,952,304 UART: [art] PUB.Y = AE0E6079ACCC5BC2BA55D474130CC7C57A71912C8D0CC533CA867347A6A0DD61DE8C6183C5C63D0B87F2F506519453ED
2,959,251 UART: [art] SIG.R = 447EA38926803F1A0AF2D7C15410A96BD0199E6071EF3866F24CD2AD1A9D79D8059160603BA81E86D88E55189855DE6A
2,966,013 UART: [art] SIG.S = 52EA92B0409B2D17064375F622FC3B9D467E48BDF085D2F31C561E77BEC5F1403BD94762ADA3C0A2D9AD199AE94108E1
2,989,206 UART: Caliptra RT
2,989,459 UART: [state] CFI Enabled
3,097,582 UART: [rt] RT listening for mailbox commands...
3,098,252 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,672 UART: [rt]cmd =0x44504543, len=92
3,345,091 >>> mbox cmd response data (6284 bytes)
3,345,092 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,467 UART: [rt]cmd =0x43455252, len=4
3,385,367 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,444 UART: [kat] SHA2-256
902,384 UART: [kat] SHA2-384
905,329 UART: [kat] SHA2-512-ACC
907,230 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 ready_for_fw is high
1,174,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,759 UART: [ldev] SUBJECT.KEYID = 5
1,210,186 UART: [ldev] AUTHORITY.KEYID = 7
1,210,649 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,299 UART: [ldev] --
1,281,595 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,920 >>> mbox cmd response: success
2,773,125 UART: [afmc] ++
2,773,293 UART: [afmc] CDI.KEYID = 6
2,773,656 UART: [afmc] SUBJECT.KEYID = 7
2,774,082 UART: [afmc] AUTHORITY.KEYID = 5
2,810,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,008 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,727 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,626 UART: [afmc] --
2,853,596 UART: [cold-reset] --
2,854,192 UART: [state] Locking Datavault
2,855,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,989 UART: [state] Locking ICCM
2,856,437 UART: [exit] Launching FMC @ 0x40000130
2,861,766 UART:
2,861,782 UART: Running Caliptra FMC ...
2,862,190 UART:
2,862,333 UART: [state] CFI Enabled
2,873,138 UART: [fht] FMC Alias Private Key: 7
2,981,283 UART: [art] Extend RT PCRs Done
2,981,711 UART: [art] Lock RT PCRs Done
2,983,059 UART: [art] Populate DV Done
2,991,278 UART: [fht] FMC Alias Private Key: 7
2,992,298 UART: [art] Derive CDI
2,992,578 UART: [art] Store in in slot 0x4
3,078,083 UART: [art] Derive Key Pair
3,078,443 UART: [art] Store priv key in slot 0x5
3,091,757 UART: [art] Derive Key Pair - Done
3,106,424 UART: [art] Signing Cert with AUTHO
3,106,904 UART: RITY.KEYID = 7
3,121,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,543 UART: [art] PUB.X = 54D55BC34BD7976834D007D9FF165260A94D89AC59261C3195E832350917DA22A39875D686EDC678078DFCBC16310775
3,129,293 UART: [art] PUB.Y = 0FCC170C57B312C4A3FC238434EFFAE15A1D1C0328E18E9F9DE141DC5FDD990D2F5F84B459FC05C6411584F81B88C83D
3,136,242 UART: [art] SIG.R = 2BE9067FC8920BA452A688C1A608F6F2E3B906D4A2BF2E54C67C950C9960D5F80F8186EF0D116F926298B446CC787424
3,142,991 UART: [art] SIG.S = 1D2D5B49E62C54D36486ED0FA187360E66705D3C6F766058C627F729F3D47E4EBEE9836D5F3435C7AE07279F5606B6A1
3,167,014 UART: Caliptra RT
3,167,359 UART: [state] CFI Enabled
3,275,592 UART: [rt] RT listening for mailbox commands...
3,276,262 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,586 UART: [rt]cmd =0x44504543, len=92
3,523,174 >>> mbox cmd response data (6284 bytes)
3,523,175 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,418 UART: [rt]cmd =0x43455252, len=4
3,563,162 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 ready_for_fw is high
1,056,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,096 >>> mbox cmd response: success
2,685,242 UART:
2,685,258 UART: Running Caliptra FMC ...
2,685,666 UART:
2,685,809 UART: [state] CFI Enabled
2,696,084 UART: [fht] FMC Alias Private Key: 7
2,803,457 UART: [art] Extend RT PCRs Done
2,803,885 UART: [art] Lock RT PCRs Done
2,804,983 UART: [art] Populate DV Done
2,813,262 UART: [fht] FMC Alias Private Key: 7
2,814,422 UART: [art] Derive CDI
2,814,702 UART: [art] Store in in slot 0x4
2,900,063 UART: [art] Derive Key Pair
2,900,423 UART: [art] Store priv key in slot 0x5
2,913,393 UART: [art] Derive Key Pair - Done
2,928,398 UART: [art] Signing Cert with AUTHO
2,928,878 UART: RITY.KEYID = 7
2,944,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,925 UART: [art] PUB.X = 39044487859A4A52A63A0D0B918542151FEE3210C08E78632A19BF08DEC501615700C4FDDC0B9BD587359ED8F23C6A2F
2,951,655 UART: [art] PUB.Y = 88A116FF4DD517B35240B5B42245AC5C0341839FF800319B5E65B93C0809C984EC1FD9B2C57C5DE5ABFD196243D5BB79
2,958,580 UART: [art] SIG.R = FE456DFB2512F8E64C6656F651A2ACF53EAEBA8867BA1DF8FDA354BE0E9BE994A0C6E8C59EFFF26CAF75A761C9DDF65C
2,965,379 UART: [art] SIG.S = 130C9A99E55605F5EECC32CE5F2FFFD0076E6984BEEC452EE424FF3775590B76C17E6661A02CD125E574A3EEAFF840B2
2,989,486 UART: Caliptra RT
2,989,831 UART: [state] CFI Enabled
3,097,850 UART: [rt] RT listening for mailbox commands...
3,098,520 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,930 UART: [rt]cmd =0x44504543, len=92
3,346,285 >>> mbox cmd response data (6284 bytes)
3,346,286 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,663 UART: [rt]cmd =0x43455252, len=4
3,386,403 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,147 UART: [kat] SHA2-256
892,085 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,334 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,555 UART: [fht] Storing FHT @ 0x50003400
1,479,264 UART: [idev] ++
1,479,432 UART: [idev] CDI.KEYID = 6
1,479,792 UART: [idev] SUBJECT.KEYID = 7
1,480,216 UART: [idev] UDS.KEYID = 0
1,480,561 ready_for_fw is high
1,480,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,986 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,484 UART: [idev] --
1,514,593 UART: [ldev] ++
1,514,761 UART: [ldev] CDI.KEYID = 6
1,515,124 UART: [ldev] SUBJECT.KEYID = 5
1,515,550 UART: [ldev] AUTHORITY.KEYID = 7
1,516,013 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,734 UART: [ldev] --
1,586,207 UART: [fwproc] Waiting for Commands...
1,586,934 UART: [fwproc] Received command 0x46574c44
1,587,725 UART: [fwproc] Received Image of size 114332 bytes
2,885,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,529 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,748 >>> mbox cmd response: success
3,078,748 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,079,826 UART: [afmc] ++
3,079,994 UART: [afmc] CDI.KEYID = 6
3,080,356 UART: [afmc] SUBJECT.KEYID = 7
3,080,781 UART: [afmc] AUTHORITY.KEYID = 5
3,115,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,381 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,071 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,134 UART: [afmc] --
3,159,068 UART: [cold-reset] --
3,159,802 UART: [state] Locking Datavault
3,160,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,267 UART: [state] Locking ICCM
3,161,847 UART: [exit] Launching FMC @ 0x40000130
3,167,176 UART:
3,167,192 UART: Running Caliptra FMC ...
3,167,600 UART:
3,167,654 UART: [state] CFI Enabled
3,178,087 UART: [fht] FMC Alias Private Key: 7
3,286,254 UART: [art] Extend RT PCRs Done
3,286,682 UART: [art] Lock RT PCRs Done
3,288,220 UART: [art] Populate DV Done
3,296,549 UART: [fht] FMC Alias Private Key: 7
3,297,677 UART: [art] Derive CDI
3,297,957 UART: [art] Store in in slot 0x4
3,383,576 UART: [art] Derive Key Pair
3,383,936 UART: [art] Store priv key in slot 0x5
3,397,138 UART: [art] Derive Key Pair - Done
3,411,825 UART: [art] Signing Cert with AUTHO
3,412,305 UART: RITY.KEYID = 7
3,427,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,958 UART: [art] PUB.X = F3CFF459DBD89D24CE2A475323B6835EC791CB74CCE045CAE361C0383A40BD5D44771BE1A91B79FEF707D5F3A4D9862B
3,434,741 UART: [art] PUB.Y = A66925501ECB5C65EEE1A147FF0A5433915EDCCF111CE6A99008B3EE27B5FE962578D35DE94FA9C155CAC1E63C05624B
3,441,696 UART: [art] SIG.R = D4EA8656BA2BD33400C581020D3FE0F6DCA15CB1D63F61553ACAB72CFA055C8F9826A7F7930EB6DCC338E9537BF78423
3,448,446 UART: [art] SIG.S = 34BB205BE10A9D6A7F5836783C9048B72117ADAC88873FD36BB0253FE3BF8D6150BCCF9D2B764DE9A56E2F3E3CF2A05C
3,472,380 UART: Caliptra RT
3,472,633 UART: [state] CFI Enabled
3,580,690 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,712 UART: [rt]cmd =0x44504543, len=92
3,794,903 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,267 ready_for_fw is high
1,363,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,068 >>> mbox cmd response: success
2,927,068 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,988,282 UART:
2,988,298 UART: Running Caliptra FMC ...
2,988,706 UART:
2,988,760 UART: [state] CFI Enabled
2,999,123 UART: [fht] FMC Alias Private Key: 7
3,106,878 UART: [art] Extend RT PCRs Done
3,107,306 UART: [art] Lock RT PCRs Done
3,108,578 UART: [art] Populate DV Done
3,116,915 UART: [fht] FMC Alias Private Key: 7
3,117,925 UART: [art] Derive CDI
3,118,205 UART: [art] Store in in slot 0x4
3,203,974 UART: [art] Derive Key Pair
3,204,334 UART: [art] Store priv key in slot 0x5
3,217,644 UART: [art] Derive Key Pair - Done
3,232,106 UART: [art] Signing Cert with AUTHO
3,232,586 UART: RITY.KEYID = 7
3,247,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,359 UART: [art] PUB.X = 89DDFE6232946AA49A8804721CD7A18963B6F03AACB1EF8E75C150E160BBCDBB58225916ED9DE93ED959ED76DA346C48
3,255,140 UART: [art] PUB.Y = F285736990D48B1C316D3A1DF045F60A6F16F2602B6CC6452AFF1603FECD37DD1753C77B6049001E897F88CE9E9A3467
3,262,064 UART: [art] SIG.R = 70DC841692002CB0C829BBF6330555C83A703F6F9E96BFD6FC2A47F1040E4F07772C078DFD30309F45FDDF237F285AD9
3,268,803 UART: [art] SIG.S = C1D28850F3B53720C5557531D43FF397173D26CB5542FBA985AB0EE3942C7782C439CF08540C3B8325EBA7E9E3ABFC9C
3,292,493 UART: Caliptra RT
3,292,746 UART: [state] CFI Enabled
3,401,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,575 UART: [rt]cmd =0x44504543, len=92
3,616,460 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,854 UART: [kat] SHA2-256
881,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,900 UART: [kat] ++
886,052 UART: [kat] sha1
890,270 UART: [kat] SHA2-256
892,208 UART: [kat] SHA2-384
895,111 UART: [kat] SHA2-512-ACC
897,012 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,301 UART: [kat] LMS
1,475,497 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,774 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 ready_for_fw is high
1,480,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,519 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,872 UART: [ldev] ++
1,515,040 UART: [ldev] CDI.KEYID = 6
1,515,403 UART: [ldev] SUBJECT.KEYID = 5
1,515,829 UART: [ldev] AUTHORITY.KEYID = 7
1,516,292 UART: [ldev] FE.KEYID = 1
1,521,614 UART: [ldev] Erasing FE.KEYID = 1
1,546,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,935 UART: [ldev] --
1,586,262 UART: [fwproc] Waiting for Commands...
1,587,087 UART: [fwproc] Received command 0x46574c44
1,587,878 UART: [fwproc] Received Image of size 114332 bytes
2,886,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,578 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,667 >>> mbox cmd response: success
3,078,667 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,079,687 UART: [afmc] ++
3,079,855 UART: [afmc] CDI.KEYID = 6
3,080,217 UART: [afmc] SUBJECT.KEYID = 7
3,080,642 UART: [afmc] AUTHORITY.KEYID = 5
3,116,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,381 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,994 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,684 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,435 UART: [afmc] --
3,159,343 UART: [cold-reset] --
3,160,197 UART: [state] Locking Datavault
3,161,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,124 UART: [state] Locking ICCM
3,162,590 UART: [exit] Launching FMC @ 0x40000130
3,167,919 UART:
3,167,935 UART: Running Caliptra FMC ...
3,168,343 UART:
3,168,486 UART: [state] CFI Enabled
3,179,189 UART: [fht] FMC Alias Private Key: 7
3,286,916 UART: [art] Extend RT PCRs Done
3,287,344 UART: [art] Lock RT PCRs Done
3,289,094 UART: [art] Populate DV Done
3,297,199 UART: [fht] FMC Alias Private Key: 7
3,298,209 UART: [art] Derive CDI
3,298,489 UART: [art] Store in in slot 0x4
3,384,162 UART: [art] Derive Key Pair
3,384,522 UART: [art] Store priv key in slot 0x5
3,398,138 UART: [art] Derive Key Pair - Done
3,412,575 UART: [art] Signing Cert with AUTHO
3,413,055 UART: RITY.KEYID = 7
3,428,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,054 UART: [art] PUB.X = E787288E290249852EF8AE14F6389E806520677FC5C197F687C8F0ABB1C18C34BD50086877387DB6A1BE437D2A732275
3,435,812 UART: [art] PUB.Y = 13A23E855711B42764710C9A7D83FF9DFCE814A39E4ACA3B0516FA33AC16D86F7FD0D8FDBE37D55510126868BB66AB70
3,442,766 UART: [art] SIG.R = 2420C12FBC9ADBEE14ECA52E09994D995840518330879EEACAB79625BBDBA35DE9B0F9BF71269C57346A0EDD65AA015A
3,449,543 UART: [art] SIG.S = 7CB99197B8B0CFF64C19B20393E915FC8C539AEA3DD76D118E9B832A83D0038F5062B8BF20DDBCA08D0091FCD925C628
3,473,722 UART: Caliptra RT
3,474,067 UART: [state] CFI Enabled
3,582,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,839 UART: [rt]cmd =0x44504543, len=92
3,797,714 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,428 ready_for_fw is high
1,363,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,089 >>> mbox cmd response: success
2,929,089 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,990,677 UART:
2,990,693 UART: Running Caliptra FMC ...
2,991,101 UART:
2,991,244 UART: [state] CFI Enabled
3,001,813 UART: [fht] FMC Alias Private Key: 7
3,110,184 UART: [art] Extend RT PCRs Done
3,110,612 UART: [art] Lock RT PCRs Done
3,112,252 UART: [art] Populate DV Done
3,120,539 UART: [fht] FMC Alias Private Key: 7
3,121,479 UART: [art] Derive CDI
3,121,759 UART: [art] Store in in slot 0x4
3,207,550 UART: [art] Derive Key Pair
3,207,910 UART: [art] Store priv key in slot 0x5
3,220,928 UART: [art] Derive Key Pair - Done
3,235,664 UART: [art] Signing Cert with AUTHO
3,236,144 UART: RITY.KEYID = 7
3,251,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,291 UART: [art] PUB.X = BC64CFBE3092F500AB08BC5FAD5BA213DCCA913014158B7B34C9D72326976A83EDE99FF832B30C9BFD29F55F36157E89
3,259,047 UART: [art] PUB.Y = D67EE64F9374674B581C30B72A6A7DB7B60823D055FC09D23A92CD3139F50CFB00374815C3F8F804B42F526A408A5286
3,265,961 UART: [art] SIG.R = A629FA5E6C794C4EEEC897E075E92BB9F2BB600959BD64F188BC08D80BCDC261CD8E6023E2E921CD7046CA41175A7D0B
3,272,735 UART: [art] SIG.S = 03E190728495A59E04E058855CAAF3FB42453EEB61A674A49567416F46D4D85E79D38291E4892FDEE8EF010C636B63DD
3,296,684 UART: Caliptra RT
3,297,029 UART: [state] CFI Enabled
3,405,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,696 UART: [rt]cmd =0x44504543, len=92
3,620,381 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,142 UART: [kat] SHA2-256
892,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,917 UART: [kat] ++
897,069 UART: [kat] sha1
901,307 UART: [kat] SHA2-256
903,247 UART: [kat] SHA2-384
905,998 UART: [kat] SHA2-512-ACC
907,899 UART: [kat] ECC-384
917,560 UART: [kat] HMAC-384Kdf
922,328 UART: [kat] LMS
1,170,656 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,171,987 UART: [fht] FHT @ 0x50003400
1,174,530 UART: [idev] ++
1,174,698 UART: [idev] CDI.KEYID = 6
1,175,058 UART: [idev] SUBJECT.KEYID = 7
1,175,482 UART: [idev] UDS.KEYID = 0
1,175,827 ready_for_fw is high
1,175,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,208,983 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,512 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,243,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,776 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,349 >>> mbox cmd response: success
2,772,349 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,773,401 UART: [afmc] ++
2,773,569 UART: [afmc] CDI.KEYID = 6
2,773,931 UART: [afmc] SUBJECT.KEYID = 7
2,774,356 UART: [afmc] AUTHORITY.KEYID = 5
2,809,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,638 UART: [afmc] --
2,852,726 UART: [cold-reset] --
2,853,544 UART: [state] Locking Datavault
2,854,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,159 UART: [state] Locking ICCM
2,855,713 UART: [exit] Launching FMC @ 0x40000130
2,861,042 UART:
2,861,058 UART: Running Caliptra FMC ...
2,861,466 UART:
2,861,520 UART: [state] CFI Enabled
2,872,333 UART: [fht] FMC Alias Private Key: 7
2,980,064 UART: [art] Extend RT PCRs Done
2,980,492 UART: [art] Lock RT PCRs Done
2,981,954 UART: [art] Populate DV Done
2,990,353 UART: [fht] FMC Alias Private Key: 7
2,991,371 UART: [art] Derive CDI
2,991,651 UART: [art] Store in in slot 0x4
3,077,646 UART: [art] Derive Key Pair
3,078,006 UART: [art] Store priv key in slot 0x5
3,090,662 UART: [art] Derive Key Pair - Done
3,105,172 UART: [art] Signing Cert with AUTHO
3,105,652 UART: RITY.KEYID = 7
3,120,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,411 UART: [art] PUB.X = 69F6E578950348BFD6134BA14CC6DEF8D9B66CFBAF04403BE7ECEFF6800188E09743FDBA1A92AEB79BA98455794C4CA1
3,128,190 UART: [art] PUB.Y = 0247D70F9F125D66BE731D727C11729C54D84AE10FC51228F025882E893E6D3C4C1A76C9F1C1141A6CE81F433D3BA0F3
3,135,133 UART: [art] SIG.R = F3D48EA09DEF4A374E5FCCCD9441829E78B22F28D9692F1B81B8EB84757CF4A8D134E21333E4B524E15E379612092852
3,141,902 UART: [art] SIG.S = D9390AFAC4D6085D21096C93A7264F90501E3C3B3C432F4C433BE0D03EA0473BC6AC611365EF55D5E69AE2865E0CA9FE
3,165,867 UART: Caliptra RT
3,166,120 UART: [state] CFI Enabled
3,274,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,086 UART: [rt]cmd =0x44504543, len=92
3,488,214 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,841 ready_for_fw is high
1,059,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,602 >>> mbox cmd response: success
2,624,602 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,166 UART:
2,686,182 UART: Running Caliptra FMC ...
2,686,590 UART:
2,686,644 UART: [state] CFI Enabled
2,697,043 UART: [fht] FMC Alias Private Key: 7
2,804,578 UART: [art] Extend RT PCRs Done
2,805,006 UART: [art] Lock RT PCRs Done
2,806,330 UART: [art] Populate DV Done
2,814,531 UART: [fht] FMC Alias Private Key: 7
2,815,579 UART: [art] Derive CDI
2,815,859 UART: [art] Store in in slot 0x4
2,902,102 UART: [art] Derive Key Pair
2,902,462 UART: [art] Store priv key in slot 0x5
2,915,434 UART: [art] Derive Key Pair - Done
2,930,626 UART: [art] Signing Cert with AUTHO
2,931,106 UART: RITY.KEYID = 7
2,946,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,061 UART: [art] PUB.X = 2EFED870A31C515D679DDC157F12D6E177D3CE68A75B1E358FACAC3D19685318E6C6B2EB8650FC8EEE24CE12B6BC9EFD
2,953,855 UART: [art] PUB.Y = 0F16086FD2BE02F2A711C42ACED0FCA48EF80F84763CE3B5D4D2B9B3FCBF41BD5FA6B261BC62B1C8A93C1ED2F9B4D8AA
2,960,825 UART: [art] SIG.R = 787BBB96DDEBBBFB379DE325C6B5763A720195CC707762DA13EE2EF618B5060DEFA8F1E5771624A55816F5DF02818188
2,967,591 UART: [art] SIG.S = 04C26A17A931E5EE19C6422C96EF43774F5B110AA33741483D76A87526C65835F231E2CBA6E922C35FBBCAE0AD19D30F
2,991,597 UART: Caliptra RT
2,991,850 UART: [state] CFI Enabled
3,099,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,437 UART: [rt]cmd =0x44504543, len=92
3,312,778 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
893,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,558 UART: [kat] ++
897,710 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
922,893 UART: [kat] LMS
1,171,221 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,724 UART: [fht] FHT @ 0x50003400
1,175,531 UART: [idev] ++
1,175,699 UART: [idev] CDI.KEYID = 6
1,176,059 UART: [idev] SUBJECT.KEYID = 7
1,176,483 UART: [idev] UDS.KEYID = 0
1,176,828 ready_for_fw is high
1,176,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,429 UART: [idev] Erasing UDS.KEYID = 0
1,201,448 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,206 UART: [ldev] ++
1,211,374 UART: [ldev] CDI.KEYID = 6
1,211,737 UART: [ldev] SUBJECT.KEYID = 5
1,212,163 UART: [ldev] AUTHORITY.KEYID = 7
1,212,626 UART: [ldev] FE.KEYID = 1
1,217,782 UART: [ldev] Erasing FE.KEYID = 1
1,244,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,762 UART: [ldev] --
1,284,149 UART: [fwproc] Wait for Commands...
1,284,783 UART: [fwproc] Recv command 0x46574c44
1,285,511 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,118 >>> mbox cmd response: success
2,775,118 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,776,230 UART: [afmc] ++
2,776,398 UART: [afmc] CDI.KEYID = 6
2,776,760 UART: [afmc] SUBJECT.KEYID = 7
2,777,185 UART: [afmc] AUTHORITY.KEYID = 5
2,812,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,965 UART: [afmc] --
2,856,069 UART: [cold-reset] --
2,857,141 UART: [state] Locking Datavault
2,858,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,904 UART: [state] Locking ICCM
2,859,352 UART: [exit] Launching FMC @ 0x40000130
2,864,681 UART:
2,864,697 UART: Running Caliptra FMC ...
2,865,105 UART:
2,865,248 UART: [state] CFI Enabled
2,875,961 UART: [fht] FMC Alias Private Key: 7
2,984,532 UART: [art] Extend RT PCRs Done
2,984,960 UART: [art] Lock RT PCRs Done
2,986,614 UART: [art] Populate DV Done
2,994,811 UART: [fht] FMC Alias Private Key: 7
2,995,835 UART: [art] Derive CDI
2,996,115 UART: [art] Store in in slot 0x4
3,081,640 UART: [art] Derive Key Pair
3,082,000 UART: [art] Store priv key in slot 0x5
3,095,302 UART: [art] Derive Key Pair - Done
3,110,027 UART: [art] Signing Cert with AUTHO
3,110,507 UART: RITY.KEYID = 7
3,125,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,586 UART: [art] PUB.X = D2706D0057A94A86C20BCAE2A08E11958F1AE24F254BC616C50300592E313235B76A2704C5AFB5BE468C9BB9B2DA3E3D
3,133,311 UART: [art] PUB.Y = E4A6E266C01F32C705E06DCCC929E45D22C600EA8C30F29609403E0AB74CA01D9664E160BC2EC05596ACE708CE2474CF
3,140,237 UART: [art] SIG.R = E145A8B7B8ED9F76DAF3C3812C8EF747A7D429ADD9345B7515FCB3FE592C913050D6C17560CB4A5A52CA4A8F1B16F24F
3,147,023 UART: [art] SIG.S = 40DA6AB65A11F6BFFF0D984DB16BDCAE1DB5D67A6AB6A191DF6BCC512557F1AF29C52BC1F549A2349E87693D1A33EDC8
3,170,445 UART: Caliptra RT
3,170,790 UART: [state] CFI Enabled
3,279,129 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,301 UART: [rt]cmd =0x44504543, len=92
3,494,788 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 ready_for_fw is high
1,060,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,209 >>> mbox cmd response: success
2,627,209 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,587 UART:
2,689,603 UART: Running Caliptra FMC ...
2,690,011 UART:
2,690,154 UART: [state] CFI Enabled
2,701,125 UART: [fht] FMC Alias Private Key: 7
2,809,362 UART: [art] Extend RT PCRs Done
2,809,790 UART: [art] Lock RT PCRs Done
2,811,228 UART: [art] Populate DV Done
2,819,375 UART: [fht] FMC Alias Private Key: 7
2,820,491 UART: [art] Derive CDI
2,820,771 UART: [art] Store in in slot 0x4
2,906,390 UART: [art] Derive Key Pair
2,906,750 UART: [art] Store priv key in slot 0x5
2,920,266 UART: [art] Derive Key Pair - Done
2,934,973 UART: [art] Signing Cert with AUTHO
2,935,453 UART: RITY.KEYID = 7
2,950,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,586 UART: [art] PUB.X = 5B15568AF7D626F3140A13415FABE59723AE9F9B12BD710C7E574194016C98D20DFCD6F191E211493194B883701F9DED
2,958,344 UART: [art] PUB.Y = 19C955A9857419FE6138A4D140FAC4E049C353CC9A951F7997694410296CA77D7D1F16590EAA8F525F63119B34795E59
2,965,283 UART: [art] SIG.R = 4878556AF72A2205855585CBF390BC644DABFFC77C3DCC986D414A58CB555BFA82A9343715280EA5CF33D5AAEF55D102
2,972,054 UART: [art] SIG.S = B0BDC55E2D5A61E9B1CA0A4493CBF3E3879879227FDC2D57158508B3A571915832C31A12527842E9ECC4D4F03EFB68C2
2,995,723 UART: Caliptra RT
2,996,068 UART: [state] CFI Enabled
3,104,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,947 UART: [rt]cmd =0x44504543, len=92
3,320,096 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,970 UART: [kat] SHA2-512-ACC
906,871 UART: [kat] ECC-384
916,846 UART: [kat] HMAC-384Kdf
921,438 UART: [kat] LMS
1,169,750 UART: [kat] --
1,170,739 UART: [cold-reset] ++
1,171,269 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,175,171 ready_for_fw is high
1,175,171 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,213 UART: [idev] --
1,209,262 UART: [ldev] ++
1,209,430 UART: [ldev] CDI.KEYID = 6
1,209,794 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,216,092 UART: [ldev] Erasing FE.KEYID = 1
1,242,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,430 UART: [fwproc] Wait for Commands...
1,282,057 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,339 >>> mbox cmd response: success
2,773,339 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,500 UART: [afmc] ++
2,774,668 UART: [afmc] CDI.KEYID = 6
2,775,031 UART: [afmc] SUBJECT.KEYID = 7
2,775,457 UART: [afmc] AUTHORITY.KEYID = 5
2,811,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,029 UART: [afmc] --
2,854,927 UART: [cold-reset] --
2,855,757 UART: [state] Locking Datavault
2,856,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,570 UART: [state] Locking ICCM
2,858,036 UART: [exit] Launching FMC @ 0x40000130
2,863,365 UART:
2,863,381 UART: Running Caliptra FMC ...
2,863,789 UART:
2,863,843 UART: [state] CFI Enabled
2,874,194 UART: [fht] FMC Alias Private Key: 7
2,981,745 UART: [art] Extend RT PCRs Done
2,982,173 UART: [art] Lock RT PCRs Done
2,984,037 UART: [art] Populate DV Done
2,992,482 UART: [fht] FMC Alias Private Key: 7
2,993,604 UART: [art] Derive CDI
2,993,884 UART: [art] Store in in slot 0x4
3,079,491 UART: [art] Derive Key Pair
3,079,851 UART: [art] Store priv key in slot 0x5
3,093,741 UART: [art] Derive Key Pair - Done
3,108,880 UART: [art] Signing Cert with AUTHO
3,109,360 UART: RITY.KEYID = 7
3,124,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,789 UART: [art] PUB.X = 229F59A17DF24DEB95D03282AFA8B5F46E3DF527E86708CD11906AD5F9167CAB7584A97474A8BD70314449C12CAC2B78
3,131,562 UART: [art] PUB.Y = 73AF7CD3827F291FF0D1100DB56FBB2982BF50F78DF595AEA92EE761811D9AAB0C796F2A75CDF3297803D1C3FE3CA1A9
3,138,521 UART: [art] SIG.R = D8BAE063DC38024CC936BD0A642F737ED519371F805C05C1FD5A5ED325A75FFB73F63333E68D99E674514BD23017B74B
3,145,288 UART: [art] SIG.S = 8C27DB438AEE72B7F89AB968485D806BBFD4101AA6B484F7890E6554D1182BE8511B0AADAF3B734AAA5FDA77508C59E7
3,169,441 UART: Caliptra RT
3,169,694 UART: [state] CFI Enabled
3,277,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,202 UART: [rt]cmd =0x44504543, len=92
3,492,135 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,678 ready_for_fw is high
1,055,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,765 >>> mbox cmd response: success
2,620,765 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,683,387 UART:
2,683,403 UART: Running Caliptra FMC ...
2,683,811 UART:
2,683,865 UART: [state] CFI Enabled
2,694,386 UART: [fht] FMC Alias Private Key: 7
2,802,969 UART: [art] Extend RT PCRs Done
2,803,397 UART: [art] Lock RT PCRs Done
2,805,017 UART: [art] Populate DV Done
2,813,388 UART: [fht] FMC Alias Private Key: 7
2,814,516 UART: [art] Derive CDI
2,814,796 UART: [art] Store in in slot 0x4
2,900,613 UART: [art] Derive Key Pair
2,900,973 UART: [art] Store priv key in slot 0x5
2,914,507 UART: [art] Derive Key Pair - Done
2,929,409 UART: [art] Signing Cert with AUTHO
2,929,889 UART: RITY.KEYID = 7
2,944,773 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,538 UART: [art] PUB.X = B55291B61E569D03948E4ADB0483A8CF1AD9FBB759BE5DC9FC7193527E331589884A6D4F1F1F4658DFD7789F26667037
2,952,304 UART: [art] PUB.Y = 89A08D7A117EB604062A6EEE8E1B0580DAFAC9DCFBA6811BC5C703ADEB39E8DB7B955B692428417A67B27D5B13A0126B
2,959,258 UART: [art] SIG.R = 2BB93C134D65679592E37A835215EBAF7BEE6F7212B22683E3570DB4420C7591C81CC34C9203B0649C2DCEA54DD272BA
2,966,023 UART: [art] SIG.S = AE6B35A15B336A1F90E624D0B8570381C8DA11CCCC2E4226D7AF56392FEB2E9BEB809D526F4D5BF2C112C849CBE741D6
2,989,803 UART: Caliptra RT
2,990,056 UART: [state] CFI Enabled
3,097,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,779 UART: [rt]cmd =0x44504543, len=92
3,311,394 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,506 UART: [cold-reset] ++
1,169,940 UART: [fht] FHT @ 0x50003400
1,172,708 UART: [idev] ++
1,172,876 UART: [idev] CDI.KEYID = 6
1,173,237 UART: [idev] SUBJECT.KEYID = 7
1,173,662 UART: [idev] UDS.KEYID = 0
1,174,008 ready_for_fw is high
1,174,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,441 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,494 >>> mbox cmd response: success
2,772,494 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,773,717 UART: [afmc] ++
2,773,885 UART: [afmc] CDI.KEYID = 6
2,774,248 UART: [afmc] SUBJECT.KEYID = 7
2,774,674 UART: [afmc] AUTHORITY.KEYID = 5
2,811,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,340 UART: [afmc] --
2,854,218 UART: [cold-reset] --
2,855,014 UART: [state] Locking Datavault
2,856,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,885 UART: [state] Locking ICCM
2,857,421 UART: [exit] Launching FMC @ 0x40000130
2,862,750 UART:
2,862,766 UART: Running Caliptra FMC ...
2,863,174 UART:
2,863,317 UART: [state] CFI Enabled
2,873,858 UART: [fht] FMC Alias Private Key: 7
2,981,269 UART: [art] Extend RT PCRs Done
2,981,697 UART: [art] Lock RT PCRs Done
2,983,269 UART: [art] Populate DV Done
2,991,230 UART: [fht] FMC Alias Private Key: 7
2,992,384 UART: [art] Derive CDI
2,992,664 UART: [art] Store in in slot 0x4
3,078,651 UART: [art] Derive Key Pair
3,079,011 UART: [art] Store priv key in slot 0x5
3,092,109 UART: [art] Derive Key Pair - Done
3,106,855 UART: [art] Signing Cert with AUTHO
3,107,335 UART: RITY.KEYID = 7
3,122,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,658 UART: [art] PUB.X = 2A7F08578C04F31DCD78FDA13EF3EFD2684684B88E94FC817BE7B5FA16070EF56852CA82F70B7E39AF7AF5E6A59FB411
3,130,429 UART: [art] PUB.Y = BE1B6908A7011EFD917FDAC534759C9C926524FDAE0AD33DA95690AA589CB084CBFC6F493D35B33081B7A8B228CD5F63
3,137,384 UART: [art] SIG.R = 6FB35395EE316B9C09B0571606D165B2961E24E09ABD141AB30C9B9ED0FAA2B5D161863826A7803E12ACCD002BA5A2BC
3,144,133 UART: [art] SIG.S = 011F0EBFF2E072628173677ED70FCE83EFBA4CB2535129BCB74B6A327D623EAADA8AE17E937EF8BB2C7B4B77735520CA
3,168,177 UART: Caliptra RT
3,168,522 UART: [state] CFI Enabled
3,276,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,279 UART: [rt]cmd =0x44504543, len=92
3,490,626 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,969 ready_for_fw is high
1,056,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,168 >>> mbox cmd response: success
2,624,168 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,450 UART:
2,686,466 UART: Running Caliptra FMC ...
2,686,874 UART:
2,687,017 UART: [state] CFI Enabled
2,697,990 UART: [fht] FMC Alias Private Key: 7
2,805,709 UART: [art] Extend RT PCRs Done
2,806,137 UART: [art] Lock RT PCRs Done
2,807,377 UART: [art] Populate DV Done
2,815,830 UART: [fht] FMC Alias Private Key: 7
2,816,872 UART: [art] Derive CDI
2,817,152 UART: [art] Store in in slot 0x4
2,902,913 UART: [art] Derive Key Pair
2,903,273 UART: [art] Store priv key in slot 0x5
2,916,529 UART: [art] Derive Key Pair - Done
2,931,078 UART: [art] Signing Cert with AUTHO
2,931,558 UART: RITY.KEYID = 7
2,946,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,721 UART: [art] PUB.X = F20359C941376EF549976D517837C462CA7B41B86285678D4B827C6D2F23E583A9B8C570396076FC53CFC880CEB72ADA
2,954,486 UART: [art] PUB.Y = E5F412839418D623EE05CD58493C386F2F30958E55927AAC44C1490E46A97F5D37884E9F3C50E0331918F8005CA204FF
2,961,399 UART: [art] SIG.R = 77347A69F0616F1FC0002A2BA1BE50824AF71B51B312B023B209FA2B42E42F1253D203AF27576C0BB4B9674BFF7E9DA8
2,968,144 UART: [art] SIG.S = 159DE99EEE5EBA680D309026BDE58FF256D56EEF5327AE70AA7C033F86F39797C8F91796448FC0C2DB724CC0915C2FF9
2,992,455 UART: Caliptra RT
2,992,800 UART: [state] CFI Enabled
3,100,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,187 UART: [rt]cmd =0x44504543, len=92
3,314,894 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,423 UART: [kat] SHA2-256
882,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,469 UART: [kat] ++
886,621 UART: [kat] sha1
890,799 UART: [kat] SHA2-256
892,737 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,024 UART: [kat] HMAC-384Kdf
907,768 UART: [kat] LMS
1,475,964 UART: [kat] --
1,476,873 UART: [cold-reset] ++
1,477,275 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 ready_for_fw is high
1,481,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,872 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,485 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,602 UART: [ldev] --
1,586,093 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 114332 bytes
2,884,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,366 >>> mbox cmd response: success
3,079,404 UART: [afmc] ++
3,079,572 UART: [afmc] CDI.KEYID = 6
3,079,934 UART: [afmc] SUBJECT.KEYID = 7
3,080,359 UART: [afmc] AUTHORITY.KEYID = 5
3,115,582 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,712 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,325 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,015 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,850 UART: [afmc] --
3,158,970 UART: [cold-reset] --
3,159,976 UART: [state] Locking Datavault
3,161,269 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,873 UART: [state] Locking ICCM
3,162,381 UART: [exit] Launching FMC @ 0x40000130
3,167,710 UART:
3,167,726 UART: Running Caliptra FMC ...
3,168,134 UART:
3,168,188 UART: [state] CFI Enabled
3,178,397 UART: [fht] FMC Alias Private Key: 7
3,286,042 UART: [art] Extend RT PCRs Done
3,286,470 UART: [art] Lock RT PCRs Done
3,287,820 UART: [art] Populate DV Done
3,296,083 UART: [fht] FMC Alias Private Key: 7
3,297,051 UART: [art] Derive CDI
3,297,331 UART: [art] Store in in slot 0x4
3,382,566 UART: [art] Derive Key Pair
3,382,926 UART: [art] Store priv key in slot 0x5
3,395,030 UART: [art] Derive Key Pair - Done
3,410,033 UART: [art] Signing Cert with AUTHO
3,410,513 UART: RITY.KEYID = 7
3,425,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,320 UART: [art] PUB.X = 8EAA8BA7E0FD15B0A64277D722B503AC002AA10CE6308DE623C253B1D8544F6ACBD0C7B6228791D964720AED82612649
3,433,065 UART: [art] PUB.Y = D7EE18FC20CD970282E0744C43852AF33E71919B251B9B8FEC39B26BA2E5F49C66ACABBB633C1D7C37D2924B736D01FA
3,440,023 UART: [art] SIG.R = 8DD30C2A91404269B8CAE0F710D57B3A6A8B3FB27EB0FFE70568BF99D5B0099E7C96B24258D7FF6CE84B1FA862CB0904
3,446,792 UART: [art] SIG.S = 51FE7D6B890C4E41A25B9936A092B272FA7EC2B71A5A88677D7F98ECB4A17F1E6EF54EDE3D397E4621AA96CB8C033F01
3,470,478 UART: Caliptra RT
3,470,731 UART: [state] CFI Enabled
3,579,360 UART: [rt] RT listening for mailbox commands...
3,580,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,326 UART: [rt]cmd =0x44504543, len=96
3,791,041 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,366 >>> mbox cmd response: success
2,989,274 UART:
2,989,290 UART: Running Caliptra FMC ...
2,989,698 UART:
2,989,752 UART: [state] CFI Enabled
3,000,357 UART: [fht] FMC Alias Private Key: 7
3,108,584 UART: [art] Extend RT PCRs Done
3,109,012 UART: [art] Lock RT PCRs Done
3,110,558 UART: [art] Populate DV Done
3,118,965 UART: [fht] FMC Alias Private Key: 7
3,119,921 UART: [art] Derive CDI
3,120,201 UART: [art] Store in in slot 0x4
3,206,030 UART: [art] Derive Key Pair
3,206,390 UART: [art] Store priv key in slot 0x5
3,219,488 UART: [art] Derive Key Pair - Done
3,234,094 UART: [art] Signing Cert with AUTHO
3,234,574 UART: RITY.KEYID = 7
3,249,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,819 UART: [art] PUB.X = 455B50B1EB8029294636A97611EB556BB1B7FF70F71F60DDFCB460B91A227359BADD0A57262761638A34D0C7AAA3C9E6
3,256,592 UART: [art] PUB.Y = 36E299E96217ED7FA30F570AFB1B0DED77D3C2F215443B1E82AECC339B242375340922D3F1768FE13B196B8C8032FAF5
3,263,536 UART: [art] SIG.R = 5E71BAD8FF6BBF917746A89E0FDE0CB51C5F8CF0216056E726DF77ED47F153428E278BF9859B7F6C5F3C7094928332C1
3,270,308 UART: [art] SIG.S = 80F09CE982FD65BC2CBE0F109EC31243ECABB384CA5D49FB332F17290326AD71B72D79B6E1BEC539DAACD574C1DAF466
3,293,203 UART: Caliptra RT
3,293,456 UART: [state] CFI Enabled
3,400,559 UART: [rt] RT listening for mailbox commands...
3,401,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,639 UART: [rt]cmd =0x44504543, len=96
3,612,040 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,191 UART: [state] LifecycleState = Unprovisioned
86,846 UART: [state] DebugLocked = No
87,342 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,896 UART: [kat] SHA2-256
882,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,942 UART: [kat] ++
887,094 UART: [kat] sha1
891,306 UART: [kat] SHA2-256
893,244 UART: [kat] SHA2-384
896,031 UART: [kat] SHA2-512-ACC
897,932 UART: [kat] ECC-384
903,763 UART: [kat] HMAC-384Kdf
908,527 UART: [kat] LMS
1,476,723 UART: [kat] --
1,477,512 UART: [cold-reset] ++
1,478,084 UART: [fht] Storing FHT @ 0x50003400
1,480,971 UART: [idev] ++
1,481,139 UART: [idev] CDI.KEYID = 6
1,481,499 UART: [idev] SUBJECT.KEYID = 7
1,481,923 UART: [idev] UDS.KEYID = 0
1,482,268 ready_for_fw is high
1,482,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,229 UART: [idev] Erasing UDS.KEYID = 0
1,507,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,589 UART: [idev] --
1,516,524 UART: [ldev] ++
1,516,692 UART: [ldev] CDI.KEYID = 6
1,517,055 UART: [ldev] SUBJECT.KEYID = 5
1,517,481 UART: [ldev] AUTHORITY.KEYID = 7
1,517,944 UART: [ldev] FE.KEYID = 1
1,523,280 UART: [ldev] Erasing FE.KEYID = 1
1,548,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,773 UART: [ldev] --
1,587,188 UART: [fwproc] Waiting for Commands...
1,587,963 UART: [fwproc] Received command 0x46574c44
1,588,754 UART: [fwproc] Received Image of size 114332 bytes
2,887,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,492 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,844 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,663 >>> mbox cmd response: success
3,081,769 UART: [afmc] ++
3,081,937 UART: [afmc] CDI.KEYID = 6
3,082,299 UART: [afmc] SUBJECT.KEYID = 7
3,082,724 UART: [afmc] AUTHORITY.KEYID = 5
3,118,141 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,616 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,306 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,273 UART: [afmc] --
3,161,315 UART: [cold-reset] --
3,162,061 UART: [state] Locking Datavault
3,162,904 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,508 UART: [state] Locking ICCM
3,164,002 UART: [exit] Launching FMC @ 0x40000130
3,169,331 UART:
3,169,347 UART: Running Caliptra FMC ...
3,169,755 UART:
3,169,898 UART: [state] CFI Enabled
3,180,273 UART: [fht] FMC Alias Private Key: 7
3,288,818 UART: [art] Extend RT PCRs Done
3,289,246 UART: [art] Lock RT PCRs Done
3,290,450 UART: [art] Populate DV Done
3,298,835 UART: [fht] FMC Alias Private Key: 7
3,299,783 UART: [art] Derive CDI
3,300,063 UART: [art] Store in in slot 0x4
3,386,028 UART: [art] Derive Key Pair
3,386,388 UART: [art] Store priv key in slot 0x5
3,399,728 UART: [art] Derive Key Pair - Done
3,414,482 UART: [art] Signing Cert with AUTHO
3,414,962 UART: RITY.KEYID = 7
3,430,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,081 UART: [art] PUB.X = 31D535817AB3BED73F3A9AA17FB0F3F488FEB39A1C6CE222FF56F0809B02DA0EA23172AF00201ECE9CC188CE241615BF
3,437,841 UART: [art] PUB.Y = 99FB706FC2F1B68D110F3E8C13DF601FA32FC6730652702887BDA65DFDBB9BD7ABDA12594D6CF760413DFD98FC2323E5
3,444,801 UART: [art] SIG.R = BCDAB49C2C673F5A0FEFDA348C849478686D1A151F8F148372726A8FE40EBBFDE233BB630788C11B2508BCC785127E6A
3,451,571 UART: [art] SIG.S = 34F3D38F4BAB8F9365F3B5BD4591F48EF4E1AED9FEE3A982AA658CAD0F65E48C09402F74F9D1C20C2CC026CE1339307D
3,474,693 UART: Caliptra RT
3,475,038 UART: [state] CFI Enabled
3,583,419 UART: [rt] RT listening for mailbox commands...
3,584,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,377 UART: [rt]cmd =0x44504543, len=96
3,795,059 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,324 ready_for_fw is high
1,363,324 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,593 >>> mbox cmd response: success
2,991,259 UART:
2,991,275 UART: Running Caliptra FMC ...
2,991,683 UART:
2,991,826 UART: [state] CFI Enabled
3,002,437 UART: [fht] FMC Alias Private Key: 7
3,109,964 UART: [art] Extend RT PCRs Done
3,110,392 UART: [art] Lock RT PCRs Done
3,111,692 UART: [art] Populate DV Done
3,119,903 UART: [fht] FMC Alias Private Key: 7
3,120,981 UART: [art] Derive CDI
3,121,261 UART: [art] Store in in slot 0x4
3,206,744 UART: [art] Derive Key Pair
3,207,104 UART: [art] Store priv key in slot 0x5
3,220,890 UART: [art] Derive Key Pair - Done
3,235,972 UART: [art] Signing Cert with AUTHO
3,236,452 UART: RITY.KEYID = 7
3,251,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,227 UART: [art] PUB.X = 924FFD227558334191CABC9F3B413DD9225F90035F84C898295D97E7DAD4D2F5488FE289B6C16B4BAF6750BD271EAFD8
3,259,002 UART: [art] PUB.Y = D3A085C081B2F9986B89F4E60BE2B9B4391D83A486F77BB4361449BDAAE1CD8C8313674D68EE208983D8B81EF7B0C360
3,265,955 UART: [art] SIG.R = EB23D95B45078000F7497C93C3D037076CD9AEDF63DBDD3E0839B1E17A6AFCA3CDCF78357084D836310C99DC76FA6A4F
3,272,705 UART: [art] SIG.S = BBAB3F38D7DEDE8ABC4D28A3263316C9D964A912A1D1D463E8B907B50A0659F42117B0CB039FBBB282A47C87660399B1
3,295,939 UART: Caliptra RT
3,296,284 UART: [state] CFI Enabled
3,405,134 UART: [rt] RT listening for mailbox commands...
3,405,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,328 UART: [rt]cmd =0x44504543, len=96
3,616,388 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,424 UART: [kat] HMAC-384Kdf
923,170 UART: [kat] LMS
1,171,498 UART: [kat] --
1,172,473 UART: [cold-reset] ++
1,173,003 UART: [fht] FHT @ 0x50003400
1,175,724 UART: [idev] ++
1,175,892 UART: [idev] CDI.KEYID = 6
1,176,252 UART: [idev] SUBJECT.KEYID = 7
1,176,676 UART: [idev] UDS.KEYID = 0
1,177,021 ready_for_fw is high
1,177,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,576 UART: [idev] Erasing UDS.KEYID = 0
1,201,751 UART: [idev] Sha1 KeyId Algorithm
1,210,239 UART: [idev] --
1,211,335 UART: [ldev] ++
1,211,503 UART: [ldev] CDI.KEYID = 6
1,211,866 UART: [ldev] SUBJECT.KEYID = 5
1,212,292 UART: [ldev] AUTHORITY.KEYID = 7
1,212,755 UART: [ldev] FE.KEYID = 1
1,217,815 UART: [ldev] Erasing FE.KEYID = 1
1,244,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,203 UART: [ldev] --
1,283,550 UART: [fwproc] Wait for Commands...
1,284,308 UART: [fwproc] Recv command 0x46574c44
1,285,036 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,869 >>> mbox cmd response: success
2,775,997 UART: [afmc] ++
2,776,165 UART: [afmc] CDI.KEYID = 6
2,776,527 UART: [afmc] SUBJECT.KEYID = 7
2,776,952 UART: [afmc] AUTHORITY.KEYID = 5
2,812,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,414 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,582 UART: [afmc] --
2,855,464 UART: [cold-reset] --
2,856,264 UART: [state] Locking Datavault
2,857,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,053 UART: [state] Locking ICCM
2,858,525 UART: [exit] Launching FMC @ 0x40000130
2,863,854 UART:
2,863,870 UART: Running Caliptra FMC ...
2,864,278 UART:
2,864,332 UART: [state] CFI Enabled
2,875,263 UART: [fht] FMC Alias Private Key: 7
2,983,476 UART: [art] Extend RT PCRs Done
2,983,904 UART: [art] Lock RT PCRs Done
2,985,528 UART: [art] Populate DV Done
2,993,771 UART: [fht] FMC Alias Private Key: 7
2,994,897 UART: [art] Derive CDI
2,995,177 UART: [art] Store in in slot 0x4
3,080,332 UART: [art] Derive Key Pair
3,080,692 UART: [art] Store priv key in slot 0x5
3,094,014 UART: [art] Derive Key Pair - Done
3,108,830 UART: [art] Signing Cert with AUTHO
3,109,310 UART: RITY.KEYID = 7
3,124,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,225 UART: [art] PUB.X = 3122C05AE5A4FFF534FD0C0A5D90F3432044D442AB590D576EC80622A5A3317EDA4EC6D6923CFA10EB0666C3C81AD30C
3,131,989 UART: [art] PUB.Y = C3CA8AA35E52780410C203FE7F5DEAF45C675566822EB852A883EA0501D427066DA55E4B2C41AD5B0ED6129DD5C375D4
3,138,929 UART: [art] SIG.R = B23A39EEF6DCD79991C2D051B0D18254BB42569080972967685E576D49957BB420D034CE81B285DFAC227003ABFA62D7
3,145,696 UART: [art] SIG.S = 48855A8139EECF98CDB6B5525099F85FB6F54FC683E8BE7FD9F90131127453578EF39C51DBA7EA87DB0F1C7881DB6ACC
3,169,745 UART: Caliptra RT
3,169,998 UART: [state] CFI Enabled
3,277,763 UART: [rt] RT listening for mailbox commands...
3,278,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,939 UART: [rt]cmd =0x44504543, len=96
3,488,581 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,679 ready_for_fw is high
1,060,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,786 >>> mbox cmd response: success
2,689,128 UART:
2,689,144 UART: Running Caliptra FMC ...
2,689,552 UART:
2,689,606 UART: [state] CFI Enabled
2,699,945 UART: [fht] FMC Alias Private Key: 7
2,807,766 UART: [art] Extend RT PCRs Done
2,808,194 UART: [art] Lock RT PCRs Done
2,809,524 UART: [art] Populate DV Done
2,817,719 UART: [fht] FMC Alias Private Key: 7
2,818,825 UART: [art] Derive CDI
2,819,105 UART: [art] Store in in slot 0x4
2,904,956 UART: [art] Derive Key Pair
2,905,316 UART: [art] Store priv key in slot 0x5
2,918,190 UART: [art] Derive Key Pair - Done
2,932,722 UART: [art] Signing Cert with AUTHO
2,933,202 UART: RITY.KEYID = 7
2,948,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,097 UART: [art] PUB.X = 8D6D590227F096491A4A4A81BF81BFE2EA138783E6103B1C2CC5D9A58B96D1BA0AC0FD52E3DF77C8004A9948CEA890BD
2,955,853 UART: [art] PUB.Y = 47387556C9CB2CA5AD3B8079A11964DAF167E0D2FB6EAE78D8BE8B362DBFCD8D785A6A7090D3A3C1D31C97815DB6F051
2,962,819 UART: [art] SIG.R = 80E26D027A723D85A1A4424F2DD71D8A2E7B85D4E18C092395AF2D63E14CC0206535BF05A3F8932A129779E0599F6F3E
2,969,580 UART: [art] SIG.S = AF0DF75822B99694DA47802A2D7ECFFCA611480ED74A138BE8025BAF2D558B922FFC40F305A20FC7EE039267BF231E64
2,993,655 UART: Caliptra RT
2,993,908 UART: [state] CFI Enabled
3,101,590 UART: [rt] RT listening for mailbox commands...
3,102,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,488 UART: [rt]cmd =0x44504543, len=96
3,312,320 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
893,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,074 UART: [kat] ++
898,226 UART: [kat] sha1
902,666 UART: [kat] SHA2-256
904,606 UART: [kat] SHA2-384
907,407 UART: [kat] SHA2-512-ACC
909,308 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,440 UART: [cold-reset] ++
1,172,832 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,234 UART: [idev] Sha1 KeyId Algorithm
1,209,704 UART: [idev] --
1,210,646 UART: [ldev] ++
1,210,814 UART: [ldev] CDI.KEYID = 6
1,211,177 UART: [ldev] SUBJECT.KEYID = 5
1,211,603 UART: [ldev] AUTHORITY.KEYID = 7
1,212,066 UART: [ldev] FE.KEYID = 1
1,217,178 UART: [ldev] Erasing FE.KEYID = 1
1,243,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,672 UART: [ldev] --
1,283,061 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,500 >>> mbox cmd response: success
2,773,584 UART: [afmc] ++
2,773,752 UART: [afmc] CDI.KEYID = 6
2,774,114 UART: [afmc] SUBJECT.KEYID = 7
2,774,539 UART: [afmc] AUTHORITY.KEYID = 5
2,810,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,715 UART: [afmc] --
2,853,635 UART: [cold-reset] --
2,854,565 UART: [state] Locking Datavault
2,855,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,314 UART: [state] Locking ICCM
2,856,846 UART: [exit] Launching FMC @ 0x40000130
2,862,175 UART:
2,862,191 UART: Running Caliptra FMC ...
2,862,599 UART:
2,862,742 UART: [state] CFI Enabled
2,873,179 UART: [fht] FMC Alias Private Key: 7
2,981,288 UART: [art] Extend RT PCRs Done
2,981,716 UART: [art] Lock RT PCRs Done
2,983,318 UART: [art] Populate DV Done
2,991,739 UART: [fht] FMC Alias Private Key: 7
2,992,851 UART: [art] Derive CDI
2,993,131 UART: [art] Store in in slot 0x4
3,078,698 UART: [art] Derive Key Pair
3,079,058 UART: [art] Store priv key in slot 0x5
3,092,448 UART: [art] Derive Key Pair - Done
3,107,292 UART: [art] Signing Cert with AUTHO
3,107,772 UART: RITY.KEYID = 7
3,122,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,379 UART: [art] PUB.X = 0518ACA79B8D14B1D477B8F099B2B64EDB1ED77C1B8EED01E82AF1DAC04214F917399EF86A12C63FEA9DE936B8D82B4B
3,130,163 UART: [art] PUB.Y = 559F26B1E17B134A8CCF63E44D52A36D5A9DE389FF8400D72E3FA1BA0A399CC32EF8582ACE9CF4ABFDC28D00D8CD004D
3,137,068 UART: [art] SIG.R = 58EC0A3E3822DB2C0224FB9ED94FD37EC2489E8C822816B3420239916D2648C7DB003B8951408FFDCFBAB2F896311CE2
3,143,813 UART: [art] SIG.S = 1F8DFFCEB8E261EF6DDB506A458C1DAC5AB65043A1D932B32AC09ABF837E50925A072ED71E46A11D8FD26AB8FBD46D4B
3,167,545 UART: Caliptra RT
3,167,890 UART: [state] CFI Enabled
3,275,499 UART: [rt] RT listening for mailbox commands...
3,276,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,615 UART: [rt]cmd =0x44504543, len=96
3,486,408 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,174 ready_for_fw is high
1,060,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,073 >>> mbox cmd response: success
2,688,105 UART:
2,688,121 UART: Running Caliptra FMC ...
2,688,529 UART:
2,688,672 UART: [state] CFI Enabled
2,699,415 UART: [fht] FMC Alias Private Key: 7
2,807,434 UART: [art] Extend RT PCRs Done
2,807,862 UART: [art] Lock RT PCRs Done
2,809,036 UART: [art] Populate DV Done
2,817,287 UART: [fht] FMC Alias Private Key: 7
2,818,247 UART: [art] Derive CDI
2,818,527 UART: [art] Store in in slot 0x4
2,904,146 UART: [art] Derive Key Pair
2,904,506 UART: [art] Store priv key in slot 0x5
2,917,336 UART: [art] Derive Key Pair - Done
2,932,212 UART: [art] Signing Cert with AUTHO
2,932,692 UART: RITY.KEYID = 7
2,947,854 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,619 UART: [art] PUB.X = C16E7FD3BF765F9F8AE2C0A45BCFAC05BCA70500983C4430C9207D02BA54AE628A14AA4ADE7C92D941D614E54B44CF29
2,955,376 UART: [art] PUB.Y = 4FCDBB8681BC6FA1311D155396A72365A3B81B3EA3C2B4F3589E2C42335E29E7C9781A3E926AC9BBF3891C62738A9265
2,962,330 UART: [art] SIG.R = D86E64F86AEC018FD2FD6679DCF206AD426A164FF5DDBA1C9445C2EAD7186AE5310775FB6EAEACB609EF845C2733A164
2,969,108 UART: [art] SIG.S = CE6F5FE3899D050B86FEA541638CD9F9DA49391D504A86EE77E709996BE2CCA36DA32D52DB00B78E59B8589C994138D5
2,992,716 UART: Caliptra RT
2,993,061 UART: [state] CFI Enabled
3,100,047 UART: [rt] RT listening for mailbox commands...
3,100,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,257 UART: [rt]cmd =0x44504543, len=96
3,311,500 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,174,185 ready_for_fw is high
1,174,185 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,397 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,714 UART: [ldev] --
1,280,016 UART: [fwproc] Wait for Commands...
1,280,609 UART: [fwproc] Recv command 0x46574c44
1,281,342 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,690 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,699 >>> mbox cmd response: success
2,772,868 UART: [afmc] ++
2,773,036 UART: [afmc] CDI.KEYID = 6
2,773,399 UART: [afmc] SUBJECT.KEYID = 7
2,773,825 UART: [afmc] AUTHORITY.KEYID = 5
2,809,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,549 UART: [afmc] --
2,852,585 UART: [cold-reset] --
2,853,267 UART: [state] Locking Datavault
2,854,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,098 UART: [state] Locking ICCM
2,855,654 UART: [exit] Launching FMC @ 0x40000130
2,860,983 UART:
2,860,999 UART: Running Caliptra FMC ...
2,861,407 UART:
2,861,461 UART: [state] CFI Enabled
2,871,900 UART: [fht] FMC Alias Private Key: 7
2,979,595 UART: [art] Extend RT PCRs Done
2,980,023 UART: [art] Lock RT PCRs Done
2,981,223 UART: [art] Populate DV Done
2,989,482 UART: [fht] FMC Alias Private Key: 7
2,990,426 UART: [art] Derive CDI
2,990,706 UART: [art] Store in in slot 0x4
3,076,501 UART: [art] Derive Key Pair
3,076,861 UART: [art] Store priv key in slot 0x5
3,089,723 UART: [art] Derive Key Pair - Done
3,104,199 UART: [art] Signing Cert with AUTHO
3,104,679 UART: RITY.KEYID = 7
3,119,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,678 UART: [art] PUB.X = 096E689809F223499904A35C5BD989EB5B48ABA0FABDD7091B02D96DC1AF00B210F47E5628A65138C1D9530A0E251836
3,127,405 UART: [art] PUB.Y = 6261248274852DB05964C7ACD14AC62533826F309E73A804D2523EE44C1EDD73DDC3D844E0D616FBE2D0DB2946785DA3
3,134,354 UART: [art] SIG.R = 3709BD8469AB2C717AC372DB9BC50768E956FE0CE996CDC6F62EF6FC50D6C23EE1AA343444C827D013553B91E54FCFAD
3,141,131 UART: [art] SIG.S = A6528B663EE02411C037F5BAD90D19E24D4440BB0675FC121E8D79494D4F0A93A60C8F361C026B7F11D42FE4AD35AB2B
3,164,571 UART: Caliptra RT
3,164,824 UART: [state] CFI Enabled
3,272,849 UART: [rt] RT listening for mailbox commands...
3,273,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,443 UART: [rt]cmd =0x44504543, len=96
3,483,813 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 ready_for_fw is high
1,056,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,597 >>> mbox cmd response: success
2,683,885 UART:
2,683,901 UART: Running Caliptra FMC ...
2,684,309 UART:
2,684,363 UART: [state] CFI Enabled
2,694,958 UART: [fht] FMC Alias Private Key: 7
2,802,955 UART: [art] Extend RT PCRs Done
2,803,383 UART: [art] Lock RT PCRs Done
2,805,069 UART: [art] Populate DV Done
2,813,168 UART: [fht] FMC Alias Private Key: 7
2,814,110 UART: [art] Derive CDI
2,814,390 UART: [art] Store in in slot 0x4
2,900,153 UART: [art] Derive Key Pair
2,900,513 UART: [art] Store priv key in slot 0x5
2,913,529 UART: [art] Derive Key Pair - Done
2,928,234 UART: [art] Signing Cert with AUTHO
2,928,714 UART: RITY.KEYID = 7
2,943,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,651 UART: [art] PUB.X = E238095F0C909A8B8726F0FA77C143C9B0EDCE44BE37A95FF3E5A2F8385264984EDACC88F1AF788DCF6848E4D59821A4
2,951,427 UART: [art] PUB.Y = BC9C949FB88C5B408DBACB51A99A151E1A5ADD91E8A5EC1A750888B318121BFC6B889AB442068BF3F1006F1A0C288BDB
2,958,364 UART: [art] SIG.R = FDE41374730BE7BE155826354349522086DE56C141B1BF58EE1D0A50A6F1D0AA6D24621146A9BC92BAA829B5254C1E48
2,965,130 UART: [art] SIG.S = 410D68100B08E0BC4A810279C20D7EFA1E6A68DB76B1792E549BE0C7D0737134DAB5007A3D5E33C5E830607C278B4954
2,989,196 UART: Caliptra RT
2,989,449 UART: [state] CFI Enabled
3,097,604 UART: [rt] RT listening for mailbox commands...
3,098,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,640 UART: [rt]cmd =0x44504543, len=96
3,308,799 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 ready_for_fw is high
1,174,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,198,284 UART: [idev] Sha1 KeyId Algorithm
1,207,192 UART: [idev] --
1,208,365 UART: [ldev] ++
1,208,533 UART: [ldev] CDI.KEYID = 6
1,208,897 UART: [ldev] SUBJECT.KEYID = 5
1,209,324 UART: [ldev] AUTHORITY.KEYID = 7
1,209,787 UART: [ldev] FE.KEYID = 1
1,215,031 UART: [ldev] Erasing FE.KEYID = 1
1,240,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,455 UART: [ldev] --
1,279,821 UART: [fwproc] Wait for Commands...
1,280,518 UART: [fwproc] Recv command 0x46574c44
1,281,251 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,428 >>> mbox cmd response: success
2,771,633 UART: [afmc] ++
2,771,801 UART: [afmc] CDI.KEYID = 6
2,772,164 UART: [afmc] SUBJECT.KEYID = 7
2,772,590 UART: [afmc] AUTHORITY.KEYID = 5
2,807,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,602 UART: [afmc] --
2,851,486 UART: [cold-reset] --
2,852,230 UART: [state] Locking Datavault
2,853,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,039 UART: [state] Locking ICCM
2,854,509 UART: [exit] Launching FMC @ 0x40000130
2,859,838 UART:
2,859,854 UART: Running Caliptra FMC ...
2,860,262 UART:
2,860,405 UART: [state] CFI Enabled
2,870,972 UART: [fht] FMC Alias Private Key: 7
2,978,727 UART: [art] Extend RT PCRs Done
2,979,155 UART: [art] Lock RT PCRs Done
2,980,519 UART: [art] Populate DV Done
2,988,996 UART: [fht] FMC Alias Private Key: 7
2,990,142 UART: [art] Derive CDI
2,990,422 UART: [art] Store in in slot 0x4
3,076,389 UART: [art] Derive Key Pair
3,076,749 UART: [art] Store priv key in slot 0x5
3,090,241 UART: [art] Derive Key Pair - Done
3,105,214 UART: [art] Signing Cert with AUTHO
3,105,694 UART: RITY.KEYID = 7
3,121,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,035 UART: [art] PUB.X = D44A1BDFAB5426734FECF3CFA57922D013610074DAC4B9FC43C9B7D8A2F296526A7317737DAC41DFE5FB81230112AAA7
3,128,794 UART: [art] PUB.Y = 4DACAF053E0DA1698F327FAD86AF43BA08336F824BEE0A415D6BBC6461E822E10103823D9AD7180001AAE4FD4E2D62B4
3,135,715 UART: [art] SIG.R = 374DCB1E83BCC5FF7F3607EB78750328A7C6A8FCEC34283A977CF7B67669E6389295E1B499C8F2B28FBD4DD6E151C69D
3,142,491 UART: [art] SIG.S = 1CE4658657D1A3594263CAB515964EDD6AD500BF39C0647507D113765FFD31307D7E9B22F2716F3BFF6FB0F6A955CAAB
3,165,801 UART: Caliptra RT
3,166,146 UART: [state] CFI Enabled
3,274,261 UART: [rt] RT listening for mailbox commands...
3,274,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,425 UART: [rt]cmd =0x44504543, len=96
3,484,971 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 ready_for_fw is high
1,056,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,968 >>> mbox cmd response: success
2,686,598 UART:
2,686,614 UART: Running Caliptra FMC ...
2,687,022 UART:
2,687,165 UART: [state] CFI Enabled
2,697,956 UART: [fht] FMC Alias Private Key: 7
2,806,055 UART: [art] Extend RT PCRs Done
2,806,483 UART: [art] Lock RT PCRs Done
2,807,851 UART: [art] Populate DV Done
2,816,236 UART: [fht] FMC Alias Private Key: 7
2,817,320 UART: [art] Derive CDI
2,817,600 UART: [art] Store in in slot 0x4
2,903,287 UART: [art] Derive Key Pair
2,903,647 UART: [art] Store priv key in slot 0x5
2,916,949 UART: [art] Derive Key Pair - Done
2,931,732 UART: [art] Signing Cert with AUTHO
2,932,212 UART: RITY.KEYID = 7
2,947,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,253 UART: [art] PUB.X = 4833045188D1D50172B74DA38FFC698529BCF9D88AD81781D1D98EC8CA84574CC5C5AD2147696696693E772582AE492A
2,955,013 UART: [art] PUB.Y = 9C706F5A8DE761852E003C1CA86879BE98549DF0AC89B32590CB6057559E249702E1F86E27BA3C8F0DD008A35D7428CD
2,961,934 UART: [art] SIG.R = E9A3284E9B7F9B3D837E3772045B7EF3C2F11BA956784EEBAB9BEA135CF83B5F4A6EFEE4906CBC50704B3D73033E2839
2,968,712 UART: [art] SIG.S = 67F0A87F8312FDB71EB74652A896CB01E7C765B0A1D992D6C999C555A01B84F0B03A27D786AABBB80BA9564B9FE8D99C
2,992,017 UART: Caliptra RT
2,992,362 UART: [state] CFI Enabled
3,100,541 UART: [rt] RT listening for mailbox commands...
3,101,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,667 UART: [rt]cmd =0x44504543, len=96
3,311,750 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
87,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,663 UART: [kat] SHA2-256
882,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,709 UART: [kat] ++
886,861 UART: [kat] sha1
891,099 UART: [kat] SHA2-256
893,037 UART: [kat] SHA2-384
895,732 UART: [kat] SHA2-512-ACC
897,633 UART: [kat] ECC-384
903,302 UART: [kat] HMAC-384Kdf
907,792 UART: [kat] LMS
1,475,988 UART: [kat] --
1,477,009 UART: [cold-reset] ++
1,477,545 UART: [fht] Storing FHT @ 0x50003400
1,480,250 UART: [idev] ++
1,480,418 UART: [idev] CDI.KEYID = 6
1,480,778 UART: [idev] SUBJECT.KEYID = 7
1,481,202 UART: [idev] UDS.KEYID = 0
1,481,547 ready_for_fw is high
1,481,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,506,234 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,986 UART: [idev] --
1,515,871 UART: [ldev] ++
1,516,039 UART: [ldev] CDI.KEYID = 6
1,516,402 UART: [ldev] SUBJECT.KEYID = 5
1,516,828 UART: [ldev] AUTHORITY.KEYID = 7
1,517,291 UART: [ldev] FE.KEYID = 1
1,522,569 UART: [ldev] Erasing FE.KEYID = 1
1,548,382 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,572 UART: [ldev] --
1,587,853 UART: [fwproc] Waiting for Commands...
1,588,504 UART: [fwproc] Received command 0x46574c44
1,589,295 UART: [fwproc] Received Image of size 114332 bytes
2,887,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,085 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,384 >>> mbox cmd response: success
3,080,622 UART: [afmc] ++
3,080,790 UART: [afmc] CDI.KEYID = 6
3,081,152 UART: [afmc] SUBJECT.KEYID = 7
3,081,577 UART: [afmc] AUTHORITY.KEYID = 5
3,116,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,249 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,939 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,730 UART: [afmc] --
3,159,672 UART: [cold-reset] --
3,160,716 UART: [state] Locking Datavault
3,161,981 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,585 UART: [state] Locking ICCM
3,163,239 UART: [exit] Launching FMC @ 0x40000130
3,168,568 UART:
3,168,584 UART: Running Caliptra FMC ...
3,168,992 UART:
3,169,046 UART: [state] CFI Enabled
3,179,413 UART: [fht] FMC Alias Private Key: 7
3,287,078 UART: [art] Extend RT PCRs Done
3,287,506 UART: [art] Lock RT PCRs Done
3,289,238 UART: [art] Populate DV Done
3,297,517 UART: [fht] FMC Alias Private Key: 7
3,298,471 UART: [art] Derive CDI
3,298,751 UART: [art] Store in in slot 0x4
3,384,622 UART: [art] Derive Key Pair
3,384,982 UART: [art] Store priv key in slot 0x5
3,398,214 UART: [art] Derive Key Pair - Done
3,413,411 UART: [art] Signing Cert with AUTHO
3,413,891 UART: RITY.KEYID = 7
3,429,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,030 UART: [art] PUB.X = 63949B8E0A311E3B8F05592CC135BD299424B718846505450DFD78FFDF8248B43E676DE32361A5E85D86FA7E0E842606
3,436,778 UART: [art] PUB.Y = 0092896D29429C9C1DCA2150CCED4E5DF5A255C82F93F8F939654304CFF53863E6EEB8492544A8ABC36D89E90D6DEB5E
3,443,710 UART: [art] SIG.R = 9D39A8377CBF2BAC6A02A1AEA03D12CDA819677D25BFAEE198DEC238244420C09A140DBBA7E990BBE72C12B75BD09A99
3,450,494 UART: [art] SIG.S = 5D01933D2219E3EA19E708B3E06FDDC50C47504068DD35893A7AC667BFF6759E399BB007F7B73D4AAA048F86D73FE966
3,474,290 UART: Caliptra RT
3,474,543 UART: [state] CFI Enabled
3,581,792 UART: [rt] RT listening for mailbox commands...
3,582,462 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,262 UART: [rt]cmd =0x44504543, len=28
3,655,392 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,241 ready_for_fw is high
1,363,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,561 >>> mbox cmd response: success
2,991,061 UART:
2,991,077 UART: Running Caliptra FMC ...
2,991,485 UART:
2,991,539 UART: [state] CFI Enabled
3,001,972 UART: [fht] FMC Alias Private Key: 7
3,110,041 UART: [art] Extend RT PCRs Done
3,110,469 UART: [art] Lock RT PCRs Done
3,111,889 UART: [art] Populate DV Done
3,120,036 UART: [fht] FMC Alias Private Key: 7
3,121,096 UART: [art] Derive CDI
3,121,376 UART: [art] Store in in slot 0x4
3,206,755 UART: [art] Derive Key Pair
3,207,115 UART: [art] Store priv key in slot 0x5
3,220,325 UART: [art] Derive Key Pair - Done
3,235,328 UART: [art] Signing Cert with AUTHO
3,235,808 UART: RITY.KEYID = 7
3,250,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,439 UART: [art] PUB.X = 3617B5701F4A9076538D96EDEE0B4AF92F1648A479A8CCBDD44D669768A401C3FF80F31AF9D5D5FD9B5EE9AB728D9B75
3,258,217 UART: [art] PUB.Y = 305D69B246FCC61763DE39DB01BAF079647394043453A675D7FD27269A603AC46971D1554B40BA9D27B6E3F7FC7B51A2
3,265,161 UART: [art] SIG.R = 0CE9998072A1121D6ED5C5E93C260C5F9CE2A58C03470C30C129A621823CE0D2947F5B8C9ECB92BFB85D31B4C7269F57
3,271,925 UART: [art] SIG.S = 86477BC34D1A198825C650A9EE764B963F4A6D44099E1B0603748937EC1AEDAD73A415E0D5F141D903AD609A9C99EF35
3,296,166 UART: Caliptra RT
3,296,419 UART: [state] CFI Enabled
3,404,722 UART: [rt] RT listening for mailbox commands...
3,405,392 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,658 UART: [rt]cmd =0x44504543, len=28
3,478,744 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,628 UART: [kat] SHA2-256
882,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,674 UART: [kat] ++
886,826 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,891 UART: [kat] SHA2-512-ACC
897,792 UART: [kat] ECC-384
903,663 UART: [kat] HMAC-384Kdf
908,273 UART: [kat] LMS
1,476,469 UART: [kat] --
1,477,392 UART: [cold-reset] ++
1,477,920 UART: [fht] Storing FHT @ 0x50003400
1,480,911 UART: [idev] ++
1,481,079 UART: [idev] CDI.KEYID = 6
1,481,439 UART: [idev] SUBJECT.KEYID = 7
1,481,863 UART: [idev] UDS.KEYID = 0
1,482,208 ready_for_fw is high
1,482,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,643 UART: [idev] Erasing UDS.KEYID = 0
1,506,123 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,741 UART: [idev] --
1,515,892 UART: [ldev] ++
1,516,060 UART: [ldev] CDI.KEYID = 6
1,516,423 UART: [ldev] SUBJECT.KEYID = 5
1,516,849 UART: [ldev] AUTHORITY.KEYID = 7
1,517,312 UART: [ldev] FE.KEYID = 1
1,522,684 UART: [ldev] Erasing FE.KEYID = 1
1,547,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,301 UART: [ldev] --
1,586,632 UART: [fwproc] Waiting for Commands...
1,587,461 UART: [fwproc] Received command 0x46574c44
1,588,252 UART: [fwproc] Received Image of size 114332 bytes
2,887,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,644 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,813 >>> mbox cmd response: success
3,080,841 UART: [afmc] ++
3,081,009 UART: [afmc] CDI.KEYID = 6
3,081,371 UART: [afmc] SUBJECT.KEYID = 7
3,081,796 UART: [afmc] AUTHORITY.KEYID = 5
3,117,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,854 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,544 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,413 UART: [afmc] --
3,160,443 UART: [cold-reset] --
3,161,255 UART: [state] Locking Datavault
3,162,258 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,862 UART: [state] Locking ICCM
3,163,460 UART: [exit] Launching FMC @ 0x40000130
3,168,789 UART:
3,168,805 UART: Running Caliptra FMC ...
3,169,213 UART:
3,169,356 UART: [state] CFI Enabled
3,179,681 UART: [fht] FMC Alias Private Key: 7
3,287,778 UART: [art] Extend RT PCRs Done
3,288,206 UART: [art] Lock RT PCRs Done
3,290,034 UART: [art] Populate DV Done
3,298,305 UART: [fht] FMC Alias Private Key: 7
3,299,417 UART: [art] Derive CDI
3,299,697 UART: [art] Store in in slot 0x4
3,385,102 UART: [art] Derive Key Pair
3,385,462 UART: [art] Store priv key in slot 0x5
3,398,930 UART: [art] Derive Key Pair - Done
3,413,657 UART: [art] Signing Cert with AUTHO
3,414,137 UART: RITY.KEYID = 7
3,429,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,218 UART: [art] PUB.X = 9C12544E38EA763F025A2F429A1DAE192A090B1C6D0DC6351DB38C625009BCC9BED3A6867F296CB906F03EB926725119
3,436,974 UART: [art] PUB.Y = 21B05D7F84AF025DA3516E22AB60F67D03BFA8DDB1D958B9E76A29CE9A3A8D21FBDD821636899B1473380C0E6E508588
3,443,920 UART: [art] SIG.R = 9368ADFFB5A7DEE1256994E38C6BCE02FE4260001311279E49168922FBA703F22F0FC41DCC0F7222DEFA95135C46FB6C
3,450,666 UART: [art] SIG.S = 926CE4B9637C41372E1983DF32AF2EF764ED61B7AD72F6CBAEAFFC053731DB5D6364FB725961F6DE7E2FB67930E49277
3,474,586 UART: Caliptra RT
3,474,931 UART: [state] CFI Enabled
3,582,495 UART: [rt] RT listening for mailbox commands...
3,583,165 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,027 UART: [rt]cmd =0x44504543, len=28
3,656,327 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 ready_for_fw is high
1,363,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,123 >>> mbox cmd response: success
2,989,785 UART:
2,989,801 UART: Running Caliptra FMC ...
2,990,209 UART:
2,990,352 UART: [state] CFI Enabled
3,000,873 UART: [fht] FMC Alias Private Key: 7
3,109,102 UART: [art] Extend RT PCRs Done
3,109,530 UART: [art] Lock RT PCRs Done
3,111,160 UART: [art] Populate DV Done
3,119,451 UART: [fht] FMC Alias Private Key: 7
3,120,493 UART: [art] Derive CDI
3,120,773 UART: [art] Store in in slot 0x4
3,206,194 UART: [art] Derive Key Pair
3,206,554 UART: [art] Store priv key in slot 0x5
3,220,166 UART: [art] Derive Key Pair - Done
3,235,151 UART: [art] Signing Cert with AUTHO
3,235,631 UART: RITY.KEYID = 7
3,250,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,574 UART: [art] PUB.X = B8CF82805C3337FFDD5A14452146601C7940FE1F73039DEE6A4461E9494D8A48B233C3A230690ABFE892635AFBAEA3B2
3,258,344 UART: [art] PUB.Y = 8442690285810E4A41E869B83E3F55606500140A2FC8628BEFBD0010CD8AC257C59301F7D68526032F508837CB4FC0E5
3,265,227 UART: [art] SIG.R = DC80F7A6F77846E22732C5DAEEE500667906A37C39BE064992A5AED32069C8536004E193CC5BF48307099E3FCEE94AF4
3,271,964 UART: [art] SIG.S = 5AA317B7A3871BB46BC65236086A90A1C318A52B334D7D36B21464D1C274A19F5E2D14029AC34CDBC4C138300120FF7E
3,296,070 UART: Caliptra RT
3,296,415 UART: [state] CFI Enabled
3,404,746 UART: [rt] RT listening for mailbox commands...
3,405,416 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,278 UART: [rt]cmd =0x44504543, len=28
3,478,714 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
893,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,647 UART: [kat] ++
897,799 UART: [kat] sha1
902,085 UART: [kat] SHA2-256
904,025 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,065 UART: [cold-reset] ++
1,172,407 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,283 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,841 UART: [ldev] ++
1,211,009 UART: [ldev] CDI.KEYID = 6
1,211,372 UART: [ldev] SUBJECT.KEYID = 5
1,211,798 UART: [ldev] AUTHORITY.KEYID = 7
1,212,261 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,615 UART: [ldev] --
1,283,118 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,578 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,987 >>> mbox cmd response: success
2,775,241 UART: [afmc] ++
2,775,409 UART: [afmc] CDI.KEYID = 6
2,775,771 UART: [afmc] SUBJECT.KEYID = 7
2,776,196 UART: [afmc] AUTHORITY.KEYID = 5
2,811,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,875 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,324 UART: [afmc] --
2,855,284 UART: [cold-reset] --
2,856,320 UART: [state] Locking Datavault
2,857,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,137 UART: [state] Locking ICCM
2,858,725 UART: [exit] Launching FMC @ 0x40000130
2,864,054 UART:
2,864,070 UART: Running Caliptra FMC ...
2,864,478 UART:
2,864,532 UART: [state] CFI Enabled
2,875,083 UART: [fht] FMC Alias Private Key: 7
2,982,216 UART: [art] Extend RT PCRs Done
2,982,644 UART: [art] Lock RT PCRs Done
2,984,054 UART: [art] Populate DV Done
2,992,459 UART: [fht] FMC Alias Private Key: 7
2,993,519 UART: [art] Derive CDI
2,993,799 UART: [art] Store in in slot 0x4
3,079,290 UART: [art] Derive Key Pair
3,079,650 UART: [art] Store priv key in slot 0x5
3,093,024 UART: [art] Derive Key Pair - Done
3,108,102 UART: [art] Signing Cert with AUTHO
3,108,582 UART: RITY.KEYID = 7
3,123,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,049 UART: [art] PUB.X = 365BF289FDCCE68269AD0C722AB8E56E35A001005E7621C15ADBAA8B552C321278B9F6A33D53C13D6BA602A21F49C1DF
3,130,800 UART: [art] PUB.Y = 3EC024256D8F904A4B95DC266D57B4F4EAB6BE523EBD09053E03BFB3B3577B898C5D816046E6E037FC002F370CA0EDD9
3,137,728 UART: [art] SIG.R = 287C2223647ACA967D5E8E9B00872DC715980D54A2F52EBC2249800E7237CA8C44E24E55FDFE59EAFED1B4E93C709735
3,144,476 UART: [art] SIG.S = D7C282F406148D2192BFD2AABF1A286EAFC64B04FD2BAEEE436A840EEFEA749F82FB15B7E138DD0B2D5F60911B104818
3,168,189 UART: Caliptra RT
3,168,442 UART: [state] CFI Enabled
3,276,037 UART: [rt] RT listening for mailbox commands...
3,276,707 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,771 UART: [rt]cmd =0x44504543, len=28
3,350,301 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 ready_for_fw is high
1,060,031 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,342 >>> mbox cmd response: success
2,688,326 UART:
2,688,342 UART: Running Caliptra FMC ...
2,688,750 UART:
2,688,804 UART: [state] CFI Enabled
2,699,363 UART: [fht] FMC Alias Private Key: 7
2,807,290 UART: [art] Extend RT PCRs Done
2,807,718 UART: [art] Lock RT PCRs Done
2,809,098 UART: [art] Populate DV Done
2,817,467 UART: [fht] FMC Alias Private Key: 7
2,818,455 UART: [art] Derive CDI
2,818,735 UART: [art] Store in in slot 0x4
2,904,602 UART: [art] Derive Key Pair
2,904,962 UART: [art] Store priv key in slot 0x5
2,918,690 UART: [art] Derive Key Pair - Done
2,933,512 UART: [art] Signing Cert with AUTHO
2,933,992 UART: RITY.KEYID = 7
2,949,854 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,619 UART: [art] PUB.X = 6DD5551841E42467B22E4C99C6CB28A4B07BA1F100E36FC61A6F60BF5632EC40D4B676AF744DC8823CD8FDCB9ACABCA9
2,957,387 UART: [art] PUB.Y = 95EE688E1D0F585E5836AAE647771AA410A815074B0D061CD321494D44FDB631C93CF330D1AE7AB18AD568A4A834F2EC
2,964,333 UART: [art] SIG.R = C5500CA8DB6C0F6FFD140A9E2620CE8888D85ADF8E283482D19CCD11FE92C7F0C4C6F105C722C4C5A0A087DA2A77BF61
2,971,109 UART: [art] SIG.S = 132CF46D088C4C58843042700EC9574DF47C175060E00A3EF3A94F00C000646684300E16A75571D99E7C75B0E6539285
2,995,058 UART: Caliptra RT
2,995,311 UART: [state] CFI Enabled
3,102,384 UART: [rt] RT listening for mailbox commands...
3,103,054 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,006 UART: [rt]cmd =0x44504543, len=28
3,176,322 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,165 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,730 UART: [fht] FHT @ 0x50003400
1,175,359 UART: [idev] ++
1,175,527 UART: [idev] CDI.KEYID = 6
1,175,887 UART: [idev] SUBJECT.KEYID = 7
1,176,311 UART: [idev] UDS.KEYID = 0
1,176,656 ready_for_fw is high
1,176,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,952 UART: [ldev] ++
1,211,120 UART: [ldev] CDI.KEYID = 6
1,211,483 UART: [ldev] SUBJECT.KEYID = 5
1,211,909 UART: [ldev] AUTHORITY.KEYID = 7
1,212,372 UART: [ldev] FE.KEYID = 1
1,217,828 UART: [ldev] Erasing FE.KEYID = 1
1,244,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,542 UART: [ldev] --
1,283,987 UART: [fwproc] Wait for Commands...
1,284,575 UART: [fwproc] Recv command 0x46574c44
1,285,303 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,186 >>> mbox cmd response: success
2,775,444 UART: [afmc] ++
2,775,612 UART: [afmc] CDI.KEYID = 6
2,775,974 UART: [afmc] SUBJECT.KEYID = 7
2,776,399 UART: [afmc] AUTHORITY.KEYID = 5
2,812,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,985 UART: [afmc] --
2,856,095 UART: [cold-reset] --
2,856,651 UART: [state] Locking Datavault
2,857,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,088 UART: [state] Locking ICCM
2,858,544 UART: [exit] Launching FMC @ 0x40000130
2,863,873 UART:
2,863,889 UART: Running Caliptra FMC ...
2,864,297 UART:
2,864,440 UART: [state] CFI Enabled
2,875,075 UART: [fht] FMC Alias Private Key: 7
2,983,762 UART: [art] Extend RT PCRs Done
2,984,190 UART: [art] Lock RT PCRs Done
2,986,264 UART: [art] Populate DV Done
2,994,591 UART: [fht] FMC Alias Private Key: 7
2,995,599 UART: [art] Derive CDI
2,995,879 UART: [art] Store in in slot 0x4
3,081,022 UART: [art] Derive Key Pair
3,081,382 UART: [art] Store priv key in slot 0x5
3,094,502 UART: [art] Derive Key Pair - Done
3,109,123 UART: [art] Signing Cert with AUTHO
3,109,603 UART: RITY.KEYID = 7
3,124,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,386 UART: [art] PUB.X = 4527830E0826B55D9599191371BB13A9DFEFAE9C97EDDDCA8E8655CD5967894AF9F45B5D5EEC4A60E01A4C9DBB76EBF1
3,132,168 UART: [art] PUB.Y = 6D5FF8E02745324283C3FA85792B47E261CF6B031A28B8E5373318AED1DA3BCF35A516BBB101EB633E4A71359403DB15
3,139,113 UART: [art] SIG.R = D519AFB4FC9C97285D98533418A69334E19DA000CF356B58263857405BC60AF389155CED617E8535A504944FB4097DA8
3,145,846 UART: [art] SIG.S = 3DBAD4F18D8B165FAC5225C72121601DD78F803BE46759760C154F5118A8B4C2BD889FA6FF97FE3D876FB5D8587A5895
3,170,250 UART: Caliptra RT
3,170,595 UART: [state] CFI Enabled
3,278,716 UART: [rt] RT listening for mailbox commands...
3,279,386 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,430 UART: [rt]cmd =0x44504543, len=28
3,352,782 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,246 ready_for_fw is high
1,061,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,697 >>> mbox cmd response: success
2,688,301 UART:
2,688,317 UART: Running Caliptra FMC ...
2,688,725 UART:
2,688,868 UART: [state] CFI Enabled
2,699,447 UART: [fht] FMC Alias Private Key: 7
2,807,150 UART: [art] Extend RT PCRs Done
2,807,578 UART: [art] Lock RT PCRs Done
2,809,014 UART: [art] Populate DV Done
2,817,113 UART: [fht] FMC Alias Private Key: 7
2,818,253 UART: [art] Derive CDI
2,818,533 UART: [art] Store in in slot 0x4
2,904,086 UART: [art] Derive Key Pair
2,904,446 UART: [art] Store priv key in slot 0x5
2,918,102 UART: [art] Derive Key Pair - Done
2,932,803 UART: [art] Signing Cert with AUTHO
2,933,283 UART: RITY.KEYID = 7
2,948,281 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,046 UART: [art] PUB.X = 1C976F83DEA804B669995248C64AF378FAD53D729A7473B4CA9F9CCF87DBEB5273E3108EC2CF4D871C71E82A8C491DA6
2,955,825 UART: [art] PUB.Y = B1A0C6A52727B042A73A44A2220D12D8ED9C0758F2DF5362D82DC73490412D2A29BFCB3532EEE25EFF7154020DD56E42
2,962,769 UART: [art] SIG.R = DB01CB06DA518993366B2C131C20FA36EEC8EAF165175DA070EFE08CE09380A11D63A1DB3B7A192EDC0A79655E269269
2,969,540 UART: [art] SIG.S = E6FDA9D213F09888580A541B7441B59A086AB0BE6DA05F19477D21C98384F4B43634C2085891DE2543FF9B252C22B8FB
2,993,244 UART: Caliptra RT
2,993,589 UART: [state] CFI Enabled
3,101,765 UART: [rt] RT listening for mailbox commands...
3,102,435 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,261 UART: [rt]cmd =0x44504543, len=28
3,175,651 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,604 UART: [state] LifecycleState = Unprovisioned
85,259 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,173,811 ready_for_fw is high
1,173,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,411 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,214,456 UART: [ldev] Erasing FE.KEYID = 1
1,240,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,658 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,781 UART: [fwproc] Recv command 0x46574c44
1,281,514 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,779 >>> mbox cmd response: success
2,772,950 UART: [afmc] ++
2,773,118 UART: [afmc] CDI.KEYID = 6
2,773,481 UART: [afmc] SUBJECT.KEYID = 7
2,773,907 UART: [afmc] AUTHORITY.KEYID = 5
2,809,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,080 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,501 UART: [afmc] --
2,852,601 UART: [cold-reset] --
2,853,253 UART: [state] Locking Datavault
2,854,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,912 UART: [state] Locking ICCM
2,855,444 UART: [exit] Launching FMC @ 0x40000130
2,860,773 UART:
2,860,789 UART: Running Caliptra FMC ...
2,861,197 UART:
2,861,251 UART: [state] CFI Enabled
2,871,936 UART: [fht] FMC Alias Private Key: 7
2,979,769 UART: [art] Extend RT PCRs Done
2,980,197 UART: [art] Lock RT PCRs Done
2,981,757 UART: [art] Populate DV Done
2,990,090 UART: [fht] FMC Alias Private Key: 7
2,991,096 UART: [art] Derive CDI
2,991,376 UART: [art] Store in in slot 0x4
3,077,165 UART: [art] Derive Key Pair
3,077,525 UART: [art] Store priv key in slot 0x5
3,091,071 UART: [art] Derive Key Pair - Done
3,105,400 UART: [art] Signing Cert with AUTHO
3,105,880 UART: RITY.KEYID = 7
3,120,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,367 UART: [art] PUB.X = 284D07A517E417F772426745346C14D4747E553C9A8F41294CA068AB469C2F09AE8E16D83478168E97AADA80D7E63109
3,128,120 UART: [art] PUB.Y = 7CBB1F122E49C07DC2AA336324C244E58B28AE8B72FF178A40655E7B675E8C3307F397A154DAD60EEF5B397DC46B8F31
3,135,074 UART: [art] SIG.R = 3CB722F120C5121E5D55D1F04ED080BB102F7CB2DD64755E6AF48020DDB02E13235EED60B16D0907488BBBBCDA45EAAA
3,141,856 UART: [art] SIG.S = D0B2053BABE0FE88EE7A59C92156B0B1F6684DA3B98E47249FFE062794A7C35A815A68FFD2389833514BE84BCDC028FB
3,164,911 UART: Caliptra RT
3,165,164 UART: [state] CFI Enabled
3,271,883 UART: [rt] RT listening for mailbox commands...
3,272,553 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,905 UART: [rt]cmd =0x44504543, len=28
3,346,225 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,490 ready_for_fw is high
1,056,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,883 >>> mbox cmd response: success
2,684,807 UART:
2,684,823 UART: Running Caliptra FMC ...
2,685,231 UART:
2,685,285 UART: [state] CFI Enabled
2,695,874 UART: [fht] FMC Alias Private Key: 7
2,803,493 UART: [art] Extend RT PCRs Done
2,803,921 UART: [art] Lock RT PCRs Done
2,805,549 UART: [art] Populate DV Done
2,813,776 UART: [fht] FMC Alias Private Key: 7
2,814,844 UART: [art] Derive CDI
2,815,124 UART: [art] Store in in slot 0x4
2,900,965 UART: [art] Derive Key Pair
2,901,325 UART: [art] Store priv key in slot 0x5
2,914,627 UART: [art] Derive Key Pair - Done
2,929,269 UART: [art] Signing Cert with AUTHO
2,929,749 UART: RITY.KEYID = 7
2,944,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,412 UART: [art] PUB.X = 24C008384A54050DB0DD7021E290039FA8C459004B8FBA11C0DDF2C35188D6170F456EB7175F4C76C2DB039EF6E8C82A
2,952,146 UART: [art] PUB.Y = 08F502813DAD9467A97CC7EAEA9C2014321A081267BDFF08E52D4D4826F5B2F733332E01E15D76C4E7DAD96706F02DAD
2,959,086 UART: [art] SIG.R = E223C7EFFF0281006528362D2EEBC513BAC60AF523C8F4F5939775E0D702F3CCC131069BCCD43CFBED3F5537DBE8017D
2,965,835 UART: [art] SIG.S = A4A06651B059C6F9765F5CA3AFAA26E095129D5B2411753BB6729117C824AD54273033C5E88CC7898B327B914BB3CB55
2,989,358 UART: Caliptra RT
2,989,611 UART: [state] CFI Enabled
3,096,889 UART: [rt] RT listening for mailbox commands...
3,097,559 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,523 UART: [rt]cmd =0x44504543, len=28
3,171,027 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,561 UART: [kat] LMS
1,168,873 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 ready_for_fw is high
1,174,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,930 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,282,093 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,537 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,652 >>> mbox cmd response: success
2,774,731 UART: [afmc] ++
2,774,899 UART: [afmc] CDI.KEYID = 6
2,775,262 UART: [afmc] SUBJECT.KEYID = 7
2,775,688 UART: [afmc] AUTHORITY.KEYID = 5
2,812,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,103 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,986 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,452 UART: [afmc] --
2,855,500 UART: [cold-reset] --
2,856,314 UART: [state] Locking Datavault
2,857,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,019 UART: [state] Locking ICCM
2,858,661 UART: [exit] Launching FMC @ 0x40000130
2,863,990 UART:
2,864,006 UART: Running Caliptra FMC ...
2,864,414 UART:
2,864,557 UART: [state] CFI Enabled
2,875,244 UART: [fht] FMC Alias Private Key: 7
2,983,609 UART: [art] Extend RT PCRs Done
2,984,037 UART: [art] Lock RT PCRs Done
2,985,629 UART: [art] Populate DV Done
2,993,764 UART: [fht] FMC Alias Private Key: 7
2,994,802 UART: [art] Derive CDI
2,995,082 UART: [art] Store in in slot 0x4
3,080,935 UART: [art] Derive Key Pair
3,081,295 UART: [art] Store priv key in slot 0x5
3,094,547 UART: [art] Derive Key Pair - Done
3,109,494 UART: [art] Signing Cert with AUTHO
3,109,974 UART: RITY.KEYID = 7
3,125,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,995 UART: [art] PUB.X = F8F65AB5808DF548D90735D62F952FA13427F2B043D70AFD8DA4A92CA2B35ACE253C4BBEA154D20CB7E9623CC8279031
3,132,768 UART: [art] PUB.Y = 6FD24CB20158A193F85CE9258A167C4C49BEC83A59EA506D6E101270092C8D62E171A807E81AF0FFB5D1FA9A6F30F517
3,139,717 UART: [art] SIG.R = 32A97AF68C05B59DA17FA25EF769067FB99FE4EDA443164AD4F9104FFA60B4562C47A90BCFFE3AA15540D498250B5408
3,146,482 UART: [art] SIG.S = 26F8A47F9E8642C344D3F0F6D163A68895F6C227D5F036B4C15F102D1B289974292942AEC552F0E1CEBDB62434EA4A60
3,170,033 UART: Caliptra RT
3,170,378 UART: [state] CFI Enabled
3,277,949 UART: [rt] RT listening for mailbox commands...
3,278,619 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,469 UART: [rt]cmd =0x44504543, len=28
3,351,985 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,997 ready_for_fw is high
1,055,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,062 >>> mbox cmd response: success
2,683,414 UART:
2,683,430 UART: Running Caliptra FMC ...
2,683,838 UART:
2,683,981 UART: [state] CFI Enabled
2,694,538 UART: [fht] FMC Alias Private Key: 7
2,801,969 UART: [art] Extend RT PCRs Done
2,802,397 UART: [art] Lock RT PCRs Done
2,804,063 UART: [art] Populate DV Done
2,812,322 UART: [fht] FMC Alias Private Key: 7
2,813,304 UART: [art] Derive CDI
2,813,584 UART: [art] Store in in slot 0x4
2,899,143 UART: [art] Derive Key Pair
2,899,503 UART: [art] Store priv key in slot 0x5
2,912,859 UART: [art] Derive Key Pair - Done
2,927,475 UART: [art] Signing Cert with AUTHO
2,927,955 UART: RITY.KEYID = 7
2,943,531 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,296 UART: [art] PUB.X = E67B4DEBD8E22AC0A8ADC467F31824C026600BCBB5F15A4FB80A81DEABAA5B7DD34CC134441B75EB4BB664CBF9FDA74D
2,951,092 UART: [art] PUB.Y = 82453F2FF0F52811391A709A5E2FCA0C29D50251D307CD32C82690CA5386CCB723201D90FC3925F64854F3CDFFEDD46E
2,958,039 UART: [art] SIG.R = 9FC228F9977E552318723691A85B6D38CE615A7BD23BB934A4759A450124604CEE9212E4DFE6F25F0C621E441DF90CB1
2,964,800 UART: [art] SIG.S = 50C79CDCEFCC63C9E7C02DA25F3CAFDFDF0D9F7E03E81C3446A6A1FEA581196443DAE563B7BD1017B011A6C4339B1973
2,988,567 UART: Caliptra RT
2,988,912 UART: [state] CFI Enabled
3,096,673 UART: [rt] RT listening for mailbox commands...
3,097,343 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,399 UART: [rt]cmd =0x44504543, len=28
3,170,835 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,811 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,393 UART: [kat] SHA2-256
882,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,439 UART: [kat] ++
886,591 UART: [kat] sha1
890,907 UART: [kat] SHA2-256
892,845 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,733 UART: [cold-reset] ++
1,477,275 UART: [fht] Storing FHT @ 0x50003400
1,480,068 UART: [idev] ++
1,480,236 UART: [idev] CDI.KEYID = 6
1,480,596 UART: [idev] SUBJECT.KEYID = 7
1,481,020 UART: [idev] UDS.KEYID = 0
1,481,365 ready_for_fw is high
1,481,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,282 UART: [idev] Erasing UDS.KEYID = 0
1,505,864 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,566 UART: [idev] --
1,515,519 UART: [ldev] ++
1,515,687 UART: [ldev] CDI.KEYID = 6
1,516,050 UART: [ldev] SUBJECT.KEYID = 5
1,516,476 UART: [ldev] AUTHORITY.KEYID = 7
1,516,939 UART: [ldev] FE.KEYID = 1
1,521,935 UART: [ldev] Erasing FE.KEYID = 1
1,547,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,467 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 114332 bytes
2,885,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,998 >>> mbox cmd response: success
3,079,020 UART: [afmc] ++
3,079,188 UART: [afmc] CDI.KEYID = 6
3,079,550 UART: [afmc] SUBJECT.KEYID = 7
3,079,975 UART: [afmc] AUTHORITY.KEYID = 5
3,114,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,898 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,291 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,981 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,930 UART: [afmc] --
3,157,938 UART: [cold-reset] --
3,158,688 UART: [state] Locking Datavault
3,159,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,465 UART: [state] Locking ICCM
3,160,885 UART: [exit] Launching FMC @ 0x40000130
3,166,214 UART:
3,166,230 UART: Running Caliptra FMC ...
3,166,638 UART:
3,166,692 UART: [state] CFI Enabled
3,177,329 UART: [fht] FMC Alias Private Key: 7
3,284,648 UART: [art] Extend RT PCRs Done
3,285,076 UART: [art] Lock RT PCRs Done
3,286,792 UART: [art] Populate DV Done
3,295,161 UART: [fht] FMC Alias Private Key: 7
3,296,341 UART: [art] Derive CDI
3,296,621 UART: [art] Store in in slot 0x4
3,381,768 UART: [art] Derive Key Pair
3,382,128 UART: [art] Store priv key in slot 0x5
3,394,878 UART: [art] Derive Key Pair - Done
3,409,732 UART: [art] Signing Cert with AUTHO
3,410,212 UART: RITY.KEYID = 7
3,425,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,105 UART: [art] PUB.X = B7E9ACB3F2F1850763E90685F58E54256501B9D2BF63A6BD20DBCE4D9281A5AAAB0F9BCB3ACDC3A0D3B1B2B4282CA029
3,432,885 UART: [art] PUB.Y = 3EEE1D591282B6AD934BAEB4BB299FF36A9636B452C1A4F6C149024D10E33C5337D9A03C2B5C0ACC42150B64064BEDCC
3,439,837 UART: [art] SIG.R = 5F8901A7965391F0BEC5D2287A7DB44ABF139DA3C798D117144E9A6017E9527D95E3A2DA945C235C94D7B9D5010878E6
3,446,598 UART: [art] SIG.S = 092D1F890C7A163882641EA37B23755D4A76B6D05041AA11BDBC4CC24A14C2F5B16403EC9B59714D4377E48D5A0DD79C
3,470,651 UART: Caliptra RT
3,470,904 UART: [state] CFI Enabled
3,578,430 UART: [rt] RT listening for mailbox commands...
3,579,100 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,214 UART: [rt]cmd =0x44504543, len=20
3,630,426 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 ready_for_fw is high
1,362,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,122 >>> mbox cmd response: success
2,988,530 UART:
2,988,546 UART: Running Caliptra FMC ...
2,988,954 UART:
2,989,008 UART: [state] CFI Enabled
2,999,319 UART: [fht] FMC Alias Private Key: 7
3,107,180 UART: [art] Extend RT PCRs Done
3,107,608 UART: [art] Lock RT PCRs Done
3,108,840 UART: [art] Populate DV Done
3,117,187 UART: [fht] FMC Alias Private Key: 7
3,118,219 UART: [art] Derive CDI
3,118,499 UART: [art] Store in in slot 0x4
3,203,812 UART: [art] Derive Key Pair
3,204,172 UART: [art] Store priv key in slot 0x5
3,217,766 UART: [art] Derive Key Pair - Done
3,232,432 UART: [art] Signing Cert with AUTHO
3,232,912 UART: RITY.KEYID = 7
3,248,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,851 UART: [art] PUB.X = 50C3947A87C55F0890D75290B90E1654184EF0ACAF16E4F9DE8EF0B6B23E2A13D90770239BFA613A5AC842825BF4AACD
3,255,622 UART: [art] PUB.Y = 696BC7FDAF691045BB2AAB2AD85959897AF5BAEA3A9353EFDFF9B6B1E101A6FAA635DE0C87173A68C496AA06980E6388
3,262,578 UART: [art] SIG.R = 2CAAB5DE48F80AE55672C082D59985AFB44AFB85F2D9F7BA02F32036552E48764FD50DD99AB3AF8E7659AECF5928AC9D
3,269,357 UART: [art] SIG.S = D0B9E489097EB68D15C87CEC063327FBAB79588707B1AB1A3ABB8523744CBD48B95C00E7D2798CC47C9ABBF4995FA0BB
3,293,701 UART: Caliptra RT
3,293,954 UART: [state] CFI Enabled
3,402,767 UART: [rt] RT listening for mailbox commands...
3,403,437 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,323 UART: [rt]cmd =0x44504543, len=20
3,454,111 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,263 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,454 UART: [fht] Storing FHT @ 0x50003400
1,480,303 UART: [idev] ++
1,480,471 UART: [idev] CDI.KEYID = 6
1,480,831 UART: [idev] SUBJECT.KEYID = 7
1,481,255 UART: [idev] UDS.KEYID = 0
1,481,600 ready_for_fw is high
1,481,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,537 UART: [idev] --
1,515,478 UART: [ldev] ++
1,515,646 UART: [ldev] CDI.KEYID = 6
1,516,009 UART: [ldev] SUBJECT.KEYID = 5
1,516,435 UART: [ldev] AUTHORITY.KEYID = 7
1,516,898 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,789 UART: [ldev] --
1,587,112 UART: [fwproc] Waiting for Commands...
1,587,887 UART: [fwproc] Received command 0x46574c44
1,588,678 UART: [fwproc] Received Image of size 114332 bytes
2,887,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,979 >>> mbox cmd response: success
3,081,043 UART: [afmc] ++
3,081,211 UART: [afmc] CDI.KEYID = 6
3,081,573 UART: [afmc] SUBJECT.KEYID = 7
3,081,998 UART: [afmc] AUTHORITY.KEYID = 5
3,117,165 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,044 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,734 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,555 UART: [afmc] --
3,160,611 UART: [cold-reset] --
3,161,407 UART: [state] Locking Datavault
3,162,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,356 UART: [state] Locking ICCM
3,163,794 UART: [exit] Launching FMC @ 0x40000130
3,169,123 UART:
3,169,139 UART: Running Caliptra FMC ...
3,169,547 UART:
3,169,690 UART: [state] CFI Enabled
3,180,027 UART: [fht] FMC Alias Private Key: 7
3,288,626 UART: [art] Extend RT PCRs Done
3,289,054 UART: [art] Lock RT PCRs Done
3,290,786 UART: [art] Populate DV Done
3,299,125 UART: [fht] FMC Alias Private Key: 7
3,300,259 UART: [art] Derive CDI
3,300,539 UART: [art] Store in in slot 0x4
3,386,218 UART: [art] Derive Key Pair
3,386,578 UART: [art] Store priv key in slot 0x5
3,399,508 UART: [art] Derive Key Pair - Done
3,413,989 UART: [art] Signing Cert with AUTHO
3,414,469 UART: RITY.KEYID = 7
3,429,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,498 UART: [art] PUB.X = 7A7685BD8208F4160F1BA2AC621CF4C325FB59B35172490F381B4F4A20DE5A8355D851C7D845279BBDCBA88966EFC0C2
3,437,267 UART: [art] PUB.Y = 8EF3140EC9DAD70DF64A44A8637A1F9ACDC480706B0A2C514CB86AB6F393177A1137F4C1C9A356A2A7F72A285B2CCBC4
3,444,224 UART: [art] SIG.R = 06C61A0873D600CF6C9539E6864DAA026A81B418ED186D57AF3F83CE22FA77AA623CAD4C0F57268E25F57F97AF10AD16
3,450,970 UART: [art] SIG.S = A958D5C6B0A10766EE43E1CF9FBA36FD5B0F97D36332148717300E34E81389BA3221D75795003A70449E612B9FF01A0A
3,475,263 UART: Caliptra RT
3,475,608 UART: [state] CFI Enabled
3,583,551 UART: [rt] RT listening for mailbox commands...
3,584,221 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,185 UART: [rt]cmd =0x44504543, len=20
3,635,047 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,872 ready_for_fw is high
1,362,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,479 >>> mbox cmd response: success
2,988,433 UART:
2,988,449 UART: Running Caliptra FMC ...
2,988,857 UART:
2,989,000 UART: [state] CFI Enabled
2,999,689 UART: [fht] FMC Alias Private Key: 7
3,107,266 UART: [art] Extend RT PCRs Done
3,107,694 UART: [art] Lock RT PCRs Done
3,109,146 UART: [art] Populate DV Done
3,117,189 UART: [fht] FMC Alias Private Key: 7
3,118,197 UART: [art] Derive CDI
3,118,477 UART: [art] Store in in slot 0x4
3,204,248 UART: [art] Derive Key Pair
3,204,608 UART: [art] Store priv key in slot 0x5
3,217,950 UART: [art] Derive Key Pair - Done
3,232,745 UART: [art] Signing Cert with AUTHO
3,233,225 UART: RITY.KEYID = 7
3,248,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,620 UART: [art] PUB.X = 7114F8559D6162998BA6615C49E9ECD34F9310959A706B8FBE66D8A0014C46E3BB4C42EA9BEA0E96F33FBC730AF95186
3,256,387 UART: [art] PUB.Y = 91AD1A5CC5FA10F87B1F252BF1DFF3428BF4D51E68765BDE8DD11E253DB26BF2E75CC6313400580871CDA68795B23E63
3,263,324 UART: [art] SIG.R = C4B0FAB86DC002C03440DA17EB8976B065968E494FE1CB1444860324C83FB3A712C9B134F3F6358AED39DB5C86E97C1F
3,270,096 UART: [art] SIG.S = 3B49D1A2DADB49A6E0BCB8C7DF26C317A32FF945B5B05DF635A5F4F5199B8880E5F6CBA7B67312C60A85703B140D94ED
3,294,245 UART: Caliptra RT
3,294,590 UART: [state] CFI Enabled
3,402,017 UART: [rt] RT listening for mailbox commands...
3,402,687 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,663 UART: [rt]cmd =0x44504543, len=20
3,453,451 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,114 UART: [kat] SHA2-256
893,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,889 UART: [kat] ++
898,041 UART: [kat] sha1
902,303 UART: [kat] SHA2-256
904,243 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
922,968 UART: [kat] LMS
1,171,296 UART: [kat] --
1,172,179 UART: [cold-reset] ++
1,172,727 UART: [fht] FHT @ 0x50003400
1,175,494 UART: [idev] ++
1,175,662 UART: [idev] CDI.KEYID = 6
1,176,022 UART: [idev] SUBJECT.KEYID = 7
1,176,446 UART: [idev] UDS.KEYID = 0
1,176,791 ready_for_fw is high
1,176,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,993 UART: [idev] Sha1 KeyId Algorithm
1,209,467 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,460 UART: [ldev] AUTHORITY.KEYID = 7
1,211,923 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,667 UART: [ldev] --
1,283,068 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,460 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,921 >>> mbox cmd response: success
2,775,081 UART: [afmc] ++
2,775,249 UART: [afmc] CDI.KEYID = 6
2,775,611 UART: [afmc] SUBJECT.KEYID = 7
2,776,036 UART: [afmc] AUTHORITY.KEYID = 5
2,811,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,096 UART: [afmc] --
2,855,064 UART: [cold-reset] --
2,855,996 UART: [state] Locking Datavault
2,857,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,701 UART: [state] Locking ICCM
2,858,365 UART: [exit] Launching FMC @ 0x40000130
2,863,694 UART:
2,863,710 UART: Running Caliptra FMC ...
2,864,118 UART:
2,864,172 UART: [state] CFI Enabled
2,874,333 UART: [fht] FMC Alias Private Key: 7
2,982,760 UART: [art] Extend RT PCRs Done
2,983,188 UART: [art] Lock RT PCRs Done
2,984,862 UART: [art] Populate DV Done
2,992,933 UART: [fht] FMC Alias Private Key: 7
2,994,045 UART: [art] Derive CDI
2,994,325 UART: [art] Store in in slot 0x4
3,080,116 UART: [art] Derive Key Pair
3,080,476 UART: [art] Store priv key in slot 0x5
3,093,490 UART: [art] Derive Key Pair - Done
3,108,264 UART: [art] Signing Cert with AUTHO
3,108,744 UART: RITY.KEYID = 7
3,124,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,875 UART: [art] PUB.X = A029915528A07D67E8F65E3155D4E6979680A3156C5450A6BD05EDCD64374E158E6949EE1948A4674C99E43AE106065C
3,131,628 UART: [art] PUB.Y = FBEB9393B3A2CDCF4B59C53B521E349CCA4B5D329966BBBD1FF899C7F4E00B80F6CD0B443F0B042A2ACB7C490167C390
3,138,583 UART: [art] SIG.R = 069168E4216D26260E04D452711E56ED254F0BA012215E327B4DA61E186382EBA3BB0770ACE76FEE4A948EB153E3D232
3,145,338 UART: [art] SIG.S = 10AEA80B6FF46834E1ECEB5BCDC80EF6188AC1961BCFBC4F0C77987A9426F34A3214744D7F7F004DE10DFBA33586F01D
3,168,817 UART: Caliptra RT
3,169,070 UART: [state] CFI Enabled
3,276,533 UART: [rt] RT listening for mailbox commands...
3,277,203 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,153 UART: [rt]cmd =0x44504543, len=20
3,328,291 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,707 ready_for_fw is high
1,060,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,056 >>> mbox cmd response: success
2,688,008 UART:
2,688,024 UART: Running Caliptra FMC ...
2,688,432 UART:
2,688,486 UART: [state] CFI Enabled
2,698,843 UART: [fht] FMC Alias Private Key: 7
2,806,736 UART: [art] Extend RT PCRs Done
2,807,164 UART: [art] Lock RT PCRs Done
2,808,788 UART: [art] Populate DV Done
2,817,081 UART: [fht] FMC Alias Private Key: 7
2,818,061 UART: [art] Derive CDI
2,818,341 UART: [art] Store in in slot 0x4
2,904,152 UART: [art] Derive Key Pair
2,904,512 UART: [art] Store priv key in slot 0x5
2,918,238 UART: [art] Derive Key Pair - Done
2,932,749 UART: [art] Signing Cert with AUTHO
2,933,229 UART: RITY.KEYID = 7
2,948,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,626 UART: [art] PUB.X = 4C0B45285631BFFCDDD612712B17FCD324B2A8160DA6115B4D731C31D2207FA7FBD49A46C7B69CECBC3B009E484BBA45
2,956,384 UART: [art] PUB.Y = 576BB31661A03C6E1488C8369961CD789FD688D89C1B1D9F59A103AB475909E5B9B45E7567086B8A0ED2C649D7E0E8B0
2,963,322 UART: [art] SIG.R = E03BD0207D7D883CEE34F9E292D4AFD1FE9CC1C02B92500A19F1DC60FCB0F3EB8B449EB491DBA68B057E316E45EC075B
2,970,105 UART: [art] SIG.S = 8F2A30879EEC0F12B7687B8ED1F470762B2B61F0BF36CA5DBC591CA7F7E4DCE708CD0012979A9F4778B3E30D5C0BAE4A
2,993,696 UART: Caliptra RT
2,993,949 UART: [state] CFI Enabled
3,101,107 UART: [rt] RT listening for mailbox commands...
3,101,777 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,817 UART: [rt]cmd =0x44504543, len=20
3,152,445 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
894,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,192 UART: [kat] ++
898,344 UART: [kat] sha1
902,566 UART: [kat] SHA2-256
904,506 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,523 UART: [kat] LMS
1,171,851 UART: [kat] --
1,172,720 UART: [cold-reset] ++
1,173,280 UART: [fht] FHT @ 0x50003400
1,175,977 UART: [idev] ++
1,176,145 UART: [idev] CDI.KEYID = 6
1,176,505 UART: [idev] SUBJECT.KEYID = 7
1,176,929 UART: [idev] UDS.KEYID = 0
1,177,274 ready_for_fw is high
1,177,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,159 UART: [idev] Erasing UDS.KEYID = 0
1,202,786 UART: [idev] Sha1 KeyId Algorithm
1,211,096 UART: [idev] --
1,212,312 UART: [ldev] ++
1,212,480 UART: [ldev] CDI.KEYID = 6
1,212,843 UART: [ldev] SUBJECT.KEYID = 5
1,213,269 UART: [ldev] AUTHORITY.KEYID = 7
1,213,732 UART: [ldev] FE.KEYID = 1
1,219,218 UART: [ldev] Erasing FE.KEYID = 1
1,245,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,782 UART: [ldev] --
1,285,099 UART: [fwproc] Wait for Commands...
1,285,899 UART: [fwproc] Recv command 0x46574c44
1,286,627 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,830 >>> mbox cmd response: success
2,777,064 UART: [afmc] ++
2,777,232 UART: [afmc] CDI.KEYID = 6
2,777,594 UART: [afmc] SUBJECT.KEYID = 7
2,778,019 UART: [afmc] AUTHORITY.KEYID = 5
2,813,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,075 UART: [afmc] --
2,857,119 UART: [cold-reset] --
2,857,859 UART: [state] Locking Datavault
2,859,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,610 UART: [state] Locking ICCM
2,860,204 UART: [exit] Launching FMC @ 0x40000130
2,865,533 UART:
2,865,549 UART: Running Caliptra FMC ...
2,865,957 UART:
2,866,100 UART: [state] CFI Enabled
2,876,951 UART: [fht] FMC Alias Private Key: 7
2,984,300 UART: [art] Extend RT PCRs Done
2,984,728 UART: [art] Lock RT PCRs Done
2,986,366 UART: [art] Populate DV Done
2,994,641 UART: [fht] FMC Alias Private Key: 7
2,995,583 UART: [art] Derive CDI
2,995,863 UART: [art] Store in in slot 0x4
3,081,560 UART: [art] Derive Key Pair
3,081,920 UART: [art] Store priv key in slot 0x5
3,095,686 UART: [art] Derive Key Pair - Done
3,110,281 UART: [art] Signing Cert with AUTHO
3,110,761 UART: RITY.KEYID = 7
3,125,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,248 UART: [art] PUB.X = A34373DF584B5F4A9FE2351065026178A888355117722B0B0B69443A123984D6C0B211AAB26AC7FB3FEC5F0878FF70E0
3,133,004 UART: [art] PUB.Y = 8544DB71BAB6C86E505AA46BBE39F1D6D8AF708DA00207B4A29CE9F169EB3C6B03F73F2D71C04B13A39B807F32065C83
3,139,954 UART: [art] SIG.R = 05BF94ECB959619EB49E9126DCF0F30C17CC4AB568CC38563F7533EB5EA669B957DC5A9998E0D0ED4C321FDFACFE58AD
3,146,740 UART: [art] SIG.S = E7798D450D4343C8F14CCB12520F95CB233F0ACB90AB3D3C0C5FBD8D4BAC0320BE22A0E40424AD699F4DAE711998A768
3,170,207 UART: Caliptra RT
3,170,552 UART: [state] CFI Enabled
3,279,591 UART: [rt] RT listening for mailbox commands...
3,280,261 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,281 UART: [rt]cmd =0x44504543, len=20
3,331,055 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 ready_for_fw is high
1,060,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,331 >>> mbox cmd response: success
2,688,455 UART:
2,688,471 UART: Running Caliptra FMC ...
2,688,879 UART:
2,689,022 UART: [state] CFI Enabled
2,699,309 UART: [fht] FMC Alias Private Key: 7
2,807,206 UART: [art] Extend RT PCRs Done
2,807,634 UART: [art] Lock RT PCRs Done
2,809,156 UART: [art] Populate DV Done
2,817,535 UART: [fht] FMC Alias Private Key: 7
2,818,657 UART: [art] Derive CDI
2,818,937 UART: [art] Store in in slot 0x4
2,904,478 UART: [art] Derive Key Pair
2,904,838 UART: [art] Store priv key in slot 0x5
2,917,474 UART: [art] Derive Key Pair - Done
2,932,062 UART: [art] Signing Cert with AUTHO
2,932,542 UART: RITY.KEYID = 7
2,947,898 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,663 UART: [art] PUB.X = AAA9E1AD1CB96FF8C85BF6AFCB5499B947C9EC6B25FE93037339B11A2F7146C88EEBD889D86D198628ADE76B9A65C3BF
2,955,452 UART: [art] PUB.Y = 3094854B4D032A4C48DDEB10A2E336F418A0C8C2FEEE8D1F3C3679EB8CF8FC46C8AFC6D64188F668E7D4B034E5149E93
2,962,413 UART: [art] SIG.R = EF5CD9687C7F69CA9E58FEEA6A800AE8DB22DDF07A104FEB9615F6634E79D49FB546ABC062843A4986E29CF349B0DCC9
2,969,200 UART: [art] SIG.S = B71583DD1B03357088DBE8E96085DF108E169F754ABFF510E7A925587A7BD74516015175FBDDA0CE460B6E86398BEEDB
2,993,346 UART: Caliptra RT
2,993,691 UART: [state] CFI Enabled
3,102,197 UART: [rt] RT listening for mailbox commands...
3,102,867 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,963 UART: [rt]cmd =0x44504543, len=20
3,154,087 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,353 UART: [idev] --
1,209,296 UART: [ldev] ++
1,209,464 UART: [ldev] CDI.KEYID = 6
1,209,828 UART: [ldev] SUBJECT.KEYID = 5
1,210,255 UART: [ldev] AUTHORITY.KEYID = 7
1,210,718 UART: [ldev] FE.KEYID = 1
1,216,088 UART: [ldev] Erasing FE.KEYID = 1
1,242,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,162 UART: [ldev] --
1,281,528 UART: [fwproc] Wait for Commands...
1,282,161 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,949 >>> mbox cmd response: success
2,773,970 UART: [afmc] ++
2,774,138 UART: [afmc] CDI.KEYID = 6
2,774,501 UART: [afmc] SUBJECT.KEYID = 7
2,774,927 UART: [afmc] AUTHORITY.KEYID = 5
2,810,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,433 UART: [afmc] --
2,853,521 UART: [cold-reset] --
2,854,323 UART: [state] Locking Datavault
2,855,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,258 UART: [state] Locking ICCM
2,856,808 UART: [exit] Launching FMC @ 0x40000130
2,862,137 UART:
2,862,153 UART: Running Caliptra FMC ...
2,862,561 UART:
2,862,615 UART: [state] CFI Enabled
2,872,710 UART: [fht] FMC Alias Private Key: 7
2,979,873 UART: [art] Extend RT PCRs Done
2,980,301 UART: [art] Lock RT PCRs Done
2,982,007 UART: [art] Populate DV Done
2,989,988 UART: [fht] FMC Alias Private Key: 7
2,991,050 UART: [art] Derive CDI
2,991,330 UART: [art] Store in in slot 0x4
3,076,869 UART: [art] Derive Key Pair
3,077,229 UART: [art] Store priv key in slot 0x5
3,090,635 UART: [art] Derive Key Pair - Done
3,105,453 UART: [art] Signing Cert with AUTHO
3,105,933 UART: RITY.KEYID = 7
3,121,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,952 UART: [art] PUB.X = C3F08428C6F50F8B1860825D7F7BAE317954896342FA82CD57D2BA83DCFBC73F419694AD7BBBEFCD9924B3E4CA349020
3,128,731 UART: [art] PUB.Y = 7CD892D04846A602A3168200CD7FEFC8D4DA1CEC1C3926EFCDE95CE442DC7E8D6010410D1DC4626B90215973E5DFB7A5
3,135,667 UART: [art] SIG.R = 708CA5972EBB03AA45C3A7C5068B04D4A01DF76FD5335939C0DEE615BA46FA25FB6B01C202C829B7E9D20240BB0B2C9E
3,142,430 UART: [art] SIG.S = 0F48EB2EBCF7459C3EA8BFA9CEE6D15FBDF224E72816BF6559CD3BC607394CE555870126C5768E57A6F3AA5C84C3B8E2
3,166,038 UART: Caliptra RT
3,166,291 UART: [state] CFI Enabled
3,273,846 UART: [rt] RT listening for mailbox commands...
3,274,516 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,388 UART: [rt]cmd =0x44504543, len=20
3,324,964 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,276 ready_for_fw is high
1,056,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,369 >>> mbox cmd response: success
2,684,079 UART:
2,684,095 UART: Running Caliptra FMC ...
2,684,503 UART:
2,684,557 UART: [state] CFI Enabled
2,694,936 UART: [fht] FMC Alias Private Key: 7
2,803,633 UART: [art] Extend RT PCRs Done
2,804,061 UART: [art] Lock RT PCRs Done
2,805,483 UART: [art] Populate DV Done
2,813,534 UART: [fht] FMC Alias Private Key: 7
2,814,574 UART: [art] Derive CDI
2,814,854 UART: [art] Store in in slot 0x4
2,900,687 UART: [art] Derive Key Pair
2,901,047 UART: [art] Store priv key in slot 0x5
2,913,717 UART: [art] Derive Key Pair - Done
2,928,296 UART: [art] Signing Cert with AUTHO
2,928,776 UART: RITY.KEYID = 7
2,943,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,493 UART: [art] PUB.X = A6C2E47C5E901028C650A197F6D5A56261B13B33E119161A283C8C6E393E974A8D1F67EDADCE4C071AE6CB32757F7A07
2,951,263 UART: [art] PUB.Y = C64A1B17F707E9B1432CA85697F34E2531A3F6FC3112E09606E201AEB4578E2699355EA3C5B69776DBE369B7B4855725
2,958,200 UART: [art] SIG.R = E517E4285828E928BC4CE2342E43D961FD78BB8D366A192A85FDA1A18DEF290820CC8DDA7A131C5420063A465729E07B
2,964,968 UART: [art] SIG.S = 50B3602C40E8FF3C8C89B4CE12003B81F57D2825481B07B222127F05DE5F4DDB096C210948A3E9C3ECB4D536565C18E8
2,988,707 UART: Caliptra RT
2,988,960 UART: [state] CFI Enabled
3,097,139 UART: [rt] RT listening for mailbox commands...
3,097,809 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,533 UART: [rt]cmd =0x44504543, len=20
3,148,575 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,174,418 ready_for_fw is high
1,174,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,493 UART: [fwproc] Wait for Commands...
1,283,184 UART: [fwproc] Recv command 0x46574c44
1,283,917 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,054 >>> mbox cmd response: success
2,774,239 UART: [afmc] ++
2,774,407 UART: [afmc] CDI.KEYID = 6
2,774,770 UART: [afmc] SUBJECT.KEYID = 7
2,775,196 UART: [afmc] AUTHORITY.KEYID = 5
2,811,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,384 UART: [afmc] --
2,854,262 UART: [cold-reset] --
2,855,102 UART: [state] Locking Datavault
2,856,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,863 UART: [state] Locking ICCM
2,857,287 UART: [exit] Launching FMC @ 0x40000130
2,862,616 UART:
2,862,632 UART: Running Caliptra FMC ...
2,863,040 UART:
2,863,183 UART: [state] CFI Enabled
2,873,872 UART: [fht] FMC Alias Private Key: 7
2,981,967 UART: [art] Extend RT PCRs Done
2,982,395 UART: [art] Lock RT PCRs Done
2,983,833 UART: [art] Populate DV Done
2,991,952 UART: [fht] FMC Alias Private Key: 7
2,993,134 UART: [art] Derive CDI
2,993,414 UART: [art] Store in in slot 0x4
3,078,757 UART: [art] Derive Key Pair
3,079,117 UART: [art] Store priv key in slot 0x5
3,092,313 UART: [art] Derive Key Pair - Done
3,107,051 UART: [art] Signing Cert with AUTHO
3,107,531 UART: RITY.KEYID = 7
3,122,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,312 UART: [art] PUB.X = 19A11FFFDD1620C05F54E32022E7B26EA6983431CF6E365B89B8FFAC6B7B903B79B857DCE0F6EA97C7BBE93D8A94CB8D
3,130,102 UART: [art] PUB.Y = DA9513968045938C1EABA122F18C3E0F17D0426DBF006F9CED7B3632CF6A5CC1AFEA8A53E916BB0BBB2A3EB501A4BB46
3,137,043 UART: [art] SIG.R = 817DEED4F47C71902C0F308AFB8492D9A7BDEDBD5A44BADBA0EC892039C15DE2B7EE462AA4AC9B38033C25E780DFF6FB
3,143,835 UART: [art] SIG.S = F81AE24E37F05B06A0EB98A1C00A0D775EE567B1759FFFD566A0C4A59BA79877961FB07B79EA9C8778A23028D3D5F144
3,167,439 UART: Caliptra RT
3,167,784 UART: [state] CFI Enabled
3,276,424 UART: [rt] RT listening for mailbox commands...
3,277,094 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,114 UART: [rt]cmd =0x44504543, len=20
3,327,958 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,925 ready_for_fw is high
1,055,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,184 >>> mbox cmd response: success
2,683,796 UART:
2,683,812 UART: Running Caliptra FMC ...
2,684,220 UART:
2,684,363 UART: [state] CFI Enabled
2,694,808 UART: [fht] FMC Alias Private Key: 7
2,802,297 UART: [art] Extend RT PCRs Done
2,802,725 UART: [art] Lock RT PCRs Done
2,804,099 UART: [art] Populate DV Done
2,812,332 UART: [fht] FMC Alias Private Key: 7
2,813,478 UART: [art] Derive CDI
2,813,758 UART: [art] Store in in slot 0x4
2,899,227 UART: [art] Derive Key Pair
2,899,587 UART: [art] Store priv key in slot 0x5
2,913,221 UART: [art] Derive Key Pair - Done
2,928,026 UART: [art] Signing Cert with AUTHO
2,928,506 UART: RITY.KEYID = 7
2,943,696 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,461 UART: [art] PUB.X = 419910C43D155BDE1E519D574ED896BFFD229369207A25C9E6301EDF47961824473B0A787B1727AA35389BC515006F94
2,951,198 UART: [art] PUB.Y = 1A51611C6F49C568414E2191FD1A71625A608711B6C1E724E9DE250F1BF0CC33E63723B245D6E4CD0D57BDB5D19B5ABD
2,958,150 UART: [art] SIG.R = 787FAED94235573C95BE3D2933A863EA41B2F7815622556D736651D537A4FA9681E9D141A226AC4C5F9140DE73007AF7
2,964,894 UART: [art] SIG.S = 760C526E2A58CD1D3F5C71016D03D1A7C7E07EC29BF529EB700B3E5E8416A9F25475D6EAD774983FB9B1C127F3E81EEA
2,988,683 UART: Caliptra RT
2,989,028 UART: [state] CFI Enabled
3,096,267 UART: [rt] RT listening for mailbox commands...
3,096,937 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,747 UART: [rt]cmd =0x44504543, len=20
3,147,643 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,093 UART: [kat] SHA2-256
892,031 UART: [kat] SHA2-384
894,630 UART: [kat] SHA2-512-ACC
896,531 UART: [kat] ECC-384
902,142 UART: [kat] HMAC-384Kdf
906,576 UART: [kat] LMS
1,474,772 UART: [kat] --
1,475,549 UART: [cold-reset] ++
1,476,125 UART: [fht] Storing FHT @ 0x50003400
1,478,852 UART: [idev] ++
1,479,020 UART: [idev] CDI.KEYID = 6
1,479,380 UART: [idev] SUBJECT.KEYID = 7
1,479,804 UART: [idev] UDS.KEYID = 0
1,480,149 ready_for_fw is high
1,480,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,698 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,119 UART: [ldev] ++
1,514,287 UART: [ldev] CDI.KEYID = 6
1,514,650 UART: [ldev] SUBJECT.KEYID = 5
1,515,076 UART: [ldev] AUTHORITY.KEYID = 7
1,515,539 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,545,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,968 UART: [ldev] --
1,584,411 UART: [fwproc] Waiting for Commands...
1,585,154 UART: [fwproc] Received command 0x46574c44
1,585,945 UART: [fwproc] Received Image of size 114332 bytes
2,884,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,772 >>> mbox cmd response: success
3,078,034 UART: [afmc] ++
3,078,202 UART: [afmc] CDI.KEYID = 6
3,078,564 UART: [afmc] SUBJECT.KEYID = 7
3,078,989 UART: [afmc] AUTHORITY.KEYID = 5
3,114,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,288 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,901 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,591 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,610 UART: [afmc] --
3,157,498 UART: [cold-reset] --
3,158,530 UART: [state] Locking Datavault
3,159,701 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,305 UART: [state] Locking ICCM
3,160,797 UART: [exit] Launching FMC @ 0x40000130
3,166,126 UART:
3,166,142 UART: Running Caliptra FMC ...
3,166,550 UART:
3,166,604 UART: [state] CFI Enabled
3,177,215 UART: [fht] FMC Alias Private Key: 7
3,284,680 UART: [art] Extend RT PCRs Done
3,285,108 UART: [art] Lock RT PCRs Done
3,286,690 UART: [art] Populate DV Done
3,294,963 UART: [fht] FMC Alias Private Key: 7
3,296,027 UART: [art] Derive CDI
3,296,307 UART: [art] Store in in slot 0x4
3,381,610 UART: [art] Derive Key Pair
3,381,970 UART: [art] Store priv key in slot 0x5
3,395,536 UART: [art] Derive Key Pair - Done
3,410,245 UART: [art] Signing Cert with AUTHO
3,410,725 UART: RITY.KEYID = 7
3,425,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,582 UART: [art] PUB.X = 5D3D2E92B30EF957B2709BF2E90EAF98230E636B833456770532C5E0EA7F3EE892886E6214BC1758C762A34446445A37
3,433,334 UART: [art] PUB.Y = FB057B7185EE28AEA694FB05A034AA7056449DB13C4BF25EF02FC6F378021B70576A9EEB0A264B34437931F13DB73509
3,440,273 UART: [art] SIG.R = A5B20E33A680E0A90970BCE54B316F928EB86BBC261B00A3DA6FEA80BC2120F30491B5AD71CF013190D0B7D49DA72103
3,447,016 UART: [art] SIG.S = 7456160157A0964FA0B1946C9904372B35D1EBE32AA3B5ED8F231E084929664591F8C6821D99CCA731D8E22C442D002D
3,470,850 UART: Caliptra RT
3,471,103 UART: [state] CFI Enabled
3,579,006 UART: [rt] RT listening for mailbox commands...
3,579,676 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,542 UART: [rt]cmd =0x44504543, len=40
3,635,113 >>> mbox cmd response data (40 bytes)
3,635,114 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,737 UART: [rt]cmd =0x44504543, len=40
3,687,474 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 ready_for_fw is high
1,362,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,418 >>> mbox cmd response: success
2,989,590 UART:
2,989,606 UART: Running Caliptra FMC ...
2,990,014 UART:
2,990,068 UART: [state] CFI Enabled
3,000,577 UART: [fht] FMC Alias Private Key: 7
3,108,224 UART: [art] Extend RT PCRs Done
3,108,652 UART: [art] Lock RT PCRs Done
3,110,166 UART: [art] Populate DV Done
3,118,539 UART: [fht] FMC Alias Private Key: 7
3,119,597 UART: [art] Derive CDI
3,119,877 UART: [art] Store in in slot 0x4
3,205,570 UART: [art] Derive Key Pair
3,205,930 UART: [art] Store priv key in slot 0x5
3,218,916 UART: [art] Derive Key Pair - Done
3,233,900 UART: [art] Signing Cert with AUTHO
3,234,380 UART: RITY.KEYID = 7
3,249,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,251 UART: [art] PUB.X = 7CFDDB22E02F43C8AE3521E2EBEF9376B38CA93551894C46310274921A39BFC5004EE4DD39209D2B1DD2F2104CF51E09
3,257,001 UART: [art] PUB.Y = 76DEB914E7A6F940BBFC2710982D553F68A771657FB14956738662E6B98D4C563A8F6394659534CA05299E7D6F49D607
3,263,937 UART: [art] SIG.R = 9A497ABED0DEB32C682F3CD4178E357A2E887BEB27278B3ECB5AA146A031E023B1C09613BE96B0EC451960F28D19D5DF
3,270,721 UART: [art] SIG.S = 04450FDE34412BBFB444F624A2F4D165995D696A6C28E5EE58D792E6F38A9D79E01CC1F3942D4AD957DAED52C1DE7CEC
3,294,550 UART: Caliptra RT
3,294,803 UART: [state] CFI Enabled
3,402,200 UART: [rt] RT listening for mailbox commands...
3,402,870 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,042 UART: [rt]cmd =0x44504543, len=40
3,459,285 >>> mbox cmd response data (40 bytes)
3,459,286 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,961 UART: [rt]cmd =0x44504543, len=40
3,511,262 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,476,892 UART: [cold-reset] ++
1,477,292 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 ready_for_fw is high
1,481,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,101 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,944 UART: [ldev] ++
1,516,112 UART: [ldev] CDI.KEYID = 6
1,516,475 UART: [ldev] SUBJECT.KEYID = 5
1,516,901 UART: [ldev] AUTHORITY.KEYID = 7
1,517,364 UART: [ldev] FE.KEYID = 1
1,522,682 UART: [ldev] Erasing FE.KEYID = 1
1,547,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,857 UART: [ldev] --
1,587,262 UART: [fwproc] Waiting for Commands...
1,588,077 UART: [fwproc] Received command 0x46574c44
1,588,868 UART: [fwproc] Received Image of size 114332 bytes
2,886,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,335 >>> mbox cmd response: success
3,080,489 UART: [afmc] ++
3,080,657 UART: [afmc] CDI.KEYID = 6
3,081,019 UART: [afmc] SUBJECT.KEYID = 7
3,081,444 UART: [afmc] AUTHORITY.KEYID = 5
3,117,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,648 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,338 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,315 UART: [afmc] --
3,160,325 UART: [cold-reset] --
3,161,293 UART: [state] Locking Datavault
3,162,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,272 UART: [state] Locking ICCM
3,163,822 UART: [exit] Launching FMC @ 0x40000130
3,169,151 UART:
3,169,167 UART: Running Caliptra FMC ...
3,169,575 UART:
3,169,718 UART: [state] CFI Enabled
3,180,459 UART: [fht] FMC Alias Private Key: 7
3,288,886 UART: [art] Extend RT PCRs Done
3,289,314 UART: [art] Lock RT PCRs Done
3,290,828 UART: [art] Populate DV Done
3,298,883 UART: [fht] FMC Alias Private Key: 7
3,299,869 UART: [art] Derive CDI
3,300,149 UART: [art] Store in in slot 0x4
3,385,678 UART: [art] Derive Key Pair
3,386,038 UART: [art] Store priv key in slot 0x5
3,399,216 UART: [art] Derive Key Pair - Done
3,414,189 UART: [art] Signing Cert with AUTHO
3,414,669 UART: RITY.KEYID = 7
3,429,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,696 UART: [art] PUB.X = C2DD795B0BDE1D23E16FBA6C5F7D6EC4232389D3EF55D61DA455178DC2FE9EE630B1169BFF0335DAE4B0A232237D132C
3,437,478 UART: [art] PUB.Y = FE06B2416ACA89735A9469E5309E0C30E3FF3274ADAA60BD3866BC28E085ABA2510D9E0CC68FEE85C78634C5A0ED36DA
3,444,432 UART: [art] SIG.R = C2BD210142DFC6A50ACFB68578064C861A7BB76CC5CA29E09F990EA7A1BD1809875D0834AE4D892F1A49FCB47C598B6B
3,451,198 UART: [art] SIG.S = 902B4F04CE96C897286C19EE8FC6BFD672BED705423A51D875744B05AF5648A99E239BE5C65453E638F7378477269DC3
3,475,444 UART: Caliptra RT
3,475,789 UART: [state] CFI Enabled
3,583,649 UART: [rt] RT listening for mailbox commands...
3,584,319 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,183 UART: [rt]cmd =0x44504543, len=40
3,640,124 >>> mbox cmd response data (40 bytes)
3,640,125 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,704 UART: [rt]cmd =0x44504543, len=40
3,692,943 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,711 >>> mbox cmd response: success
2,990,763 UART:
2,990,779 UART: Running Caliptra FMC ...
2,991,187 UART:
2,991,330 UART: [state] CFI Enabled
3,002,235 UART: [fht] FMC Alias Private Key: 7
3,111,100 UART: [art] Extend RT PCRs Done
3,111,528 UART: [art] Lock RT PCRs Done
3,113,086 UART: [art] Populate DV Done
3,121,475 UART: [fht] FMC Alias Private Key: 7
3,122,509 UART: [art] Derive CDI
3,122,789 UART: [art] Store in in slot 0x4
3,208,630 UART: [art] Derive Key Pair
3,208,990 UART: [art] Store priv key in slot 0x5
3,222,054 UART: [art] Derive Key Pair - Done
3,236,872 UART: [art] Signing Cert with AUTHO
3,237,352 UART: RITY.KEYID = 7
3,252,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,237 UART: [art] PUB.X = E6E0D9AFF0101D3A479F74B08601999120FF5048972B877A73A73DF75868D762862920E9EED82545C52A4DEA1515945D
3,259,998 UART: [art] PUB.Y = 286188D9B5FE00F5D7597C475533D45FB4BE23F781099C492D65FC5A60FBE290FA05C7E8EA043A33957D66FF380C8EDA
3,266,922 UART: [art] SIG.R = 40AA9CEE02AF17347776519871C84BE976658FC32D155D4CBA2D14A63B0BDAB7EE683D01BB3AE4C1D0C6BC9A08097FC2
3,273,693 UART: [art] SIG.S = A5DAF130A935308FE3B069DABF16ADCB78C124EEC9F4F6D438ED07CADEE5397FCA37C1202624B671DD1F389FB47C5A93
3,296,707 UART: Caliptra RT
3,297,052 UART: [state] CFI Enabled
3,405,455 UART: [rt] RT listening for mailbox commands...
3,406,125 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,271 UART: [rt]cmd =0x44504543, len=40
3,462,582 >>> mbox cmd response data (40 bytes)
3,462,583 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,020 UART: [rt]cmd =0x44504543, len=40
3,514,507 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
892,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,115 UART: [kat] ++
897,267 UART: [kat] sha1
901,553 UART: [kat] SHA2-256
903,493 UART: [kat] SHA2-384
906,316 UART: [kat] SHA2-512-ACC
908,217 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,594 UART: [kat] LMS
1,170,922 UART: [kat] --
1,171,887 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,892 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,209,979 UART: [idev] --
1,211,189 UART: [ldev] ++
1,211,357 UART: [ldev] CDI.KEYID = 6
1,211,720 UART: [ldev] SUBJECT.KEYID = 5
1,212,146 UART: [ldev] AUTHORITY.KEYID = 7
1,212,609 UART: [ldev] FE.KEYID = 1
1,217,713 UART: [ldev] Erasing FE.KEYID = 1
1,243,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,282,968 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,494 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,793 >>> mbox cmd response: success
2,774,837 UART: [afmc] ++
2,775,005 UART: [afmc] CDI.KEYID = 6
2,775,367 UART: [afmc] SUBJECT.KEYID = 7
2,775,792 UART: [afmc] AUTHORITY.KEYID = 5
2,811,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,274 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,159 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,774 UART: [afmc] --
2,854,778 UART: [cold-reset] --
2,855,502 UART: [state] Locking Datavault
2,856,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,351 UART: [state] Locking ICCM
2,857,905 UART: [exit] Launching FMC @ 0x40000130
2,863,234 UART:
2,863,250 UART: Running Caliptra FMC ...
2,863,658 UART:
2,863,712 UART: [state] CFI Enabled
2,874,147 UART: [fht] FMC Alias Private Key: 7
2,982,164 UART: [art] Extend RT PCRs Done
2,982,592 UART: [art] Lock RT PCRs Done
2,984,038 UART: [art] Populate DV Done
2,992,173 UART: [fht] FMC Alias Private Key: 7
2,993,151 UART: [art] Derive CDI
2,993,431 UART: [art] Store in in slot 0x4
3,079,226 UART: [art] Derive Key Pair
3,079,586 UART: [art] Store priv key in slot 0x5
3,092,386 UART: [art] Derive Key Pair - Done
3,107,488 UART: [art] Signing Cert with AUTHO
3,107,968 UART: RITY.KEYID = 7
3,122,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,619 UART: [art] PUB.X = CFA69E775F0CC478FD53BE193A6728B722F10F7F5B22F1318F086EC9C99EE4CE2993865D5A16DACBE1D0440456047A76
3,130,382 UART: [art] PUB.Y = 7A56734DA94F72B74F4EC9ADA1BE895FA2F6335798747565F162B37017CB3E0F2486A597BFAC96CA7E735A81CB710E01
3,137,329 UART: [art] SIG.R = B1BEF33D914604DEB858C53040B9097F228A609A587E7973D68919084E9DEB4F527DB28A455113B2DED47C8AF27B2B0F
3,144,091 UART: [art] SIG.S = 9437C2A7BD821FF433BED7B88AB0E07029DEB8AE9FC1358D11366F85654918E1C978306028CA1B836C10DE8B385A469E
3,168,398 UART: Caliptra RT
3,168,651 UART: [state] CFI Enabled
3,276,161 UART: [rt] RT listening for mailbox commands...
3,276,831 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,835 UART: [rt]cmd =0x44504543, len=40
3,333,110 >>> mbox cmd response data (40 bytes)
3,333,111 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,838 UART: [rt]cmd =0x44504543, len=40
3,385,501 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,442 >>> mbox cmd response: success
2,688,056 UART:
2,688,072 UART: Running Caliptra FMC ...
2,688,480 UART:
2,688,534 UART: [state] CFI Enabled
2,698,779 UART: [fht] FMC Alias Private Key: 7
2,806,422 UART: [art] Extend RT PCRs Done
2,806,850 UART: [art] Lock RT PCRs Done
2,808,216 UART: [art] Populate DV Done
2,816,515 UART: [fht] FMC Alias Private Key: 7
2,817,513 UART: [art] Derive CDI
2,817,793 UART: [art] Store in in slot 0x4
2,903,286 UART: [art] Derive Key Pair
2,903,646 UART: [art] Store priv key in slot 0x5
2,916,484 UART: [art] Derive Key Pair - Done
2,931,314 UART: [art] Signing Cert with AUTHO
2,931,794 UART: RITY.KEYID = 7
2,947,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,069 UART: [art] PUB.X = 82D5D6AF04BF9E272C7442DF8325E0350CCF5FA369B73EC9C39912C57EA16D94FB3EDD16923B0216EA9043B6E973AB21
2,954,840 UART: [art] PUB.Y = 74823CFF90D1D9FC3EC2CCBD5DCC32DBFDC07C047FD2958CB4CBA1BC6D89BC3961BAB53D50EEE2CCD43E6673CA9DA993
2,961,823 UART: [art] SIG.R = C16357AFAF7C32A8B5FDB77C48B667CC04FBA429B2FAE183FB21839CB6250911ABA60FD6FA681CFAA272BDE28EBBEC3D
2,968,614 UART: [art] SIG.S = 7CF0FCBE9D7A5BCA19966A22B57B97ADA7FFA544BE628029195880471CD2D6F0A39D3B9188436D8FFC98E4CBEBB932B3
2,992,861 UART: Caliptra RT
2,993,114 UART: [state] CFI Enabled
3,101,241 UART: [rt] RT listening for mailbox commands...
3,101,911 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,845 UART: [rt]cmd =0x44504543, len=40
3,157,834 >>> mbox cmd response data (40 bytes)
3,157,835 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,564 UART: [rt]cmd =0x44504543, len=40
3,210,379 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,147 UART: [state] LifecycleState = Unprovisioned
86,802 UART: [state] DebugLocked = No
87,392 UART: [state] WD Timer not started. Device not locked for debugging
88,599 UART: [kat] SHA2-256
894,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,374 UART: [kat] ++
898,526 UART: [kat] sha1
902,766 UART: [kat] SHA2-256
904,706 UART: [kat] SHA2-384
907,355 UART: [kat] SHA2-512-ACC
909,256 UART: [kat] ECC-384
918,893 UART: [kat] HMAC-384Kdf
923,623 UART: [kat] LMS
1,171,951 UART: [kat] --
1,173,032 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,131 UART: [idev] ++
1,176,299 UART: [idev] CDI.KEYID = 6
1,176,659 UART: [idev] SUBJECT.KEYID = 7
1,177,083 UART: [idev] UDS.KEYID = 0
1,177,428 ready_for_fw is high
1,177,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,945 UART: [idev] Erasing UDS.KEYID = 0
1,202,056 UART: [idev] Sha1 KeyId Algorithm
1,210,426 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,554 UART: [ldev] Erasing FE.KEYID = 1
1,245,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,570 UART: [ldev] --
1,284,919 UART: [fwproc] Wait for Commands...
1,285,647 UART: [fwproc] Recv command 0x46574c44
1,286,375 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,280 >>> mbox cmd response: success
2,777,508 UART: [afmc] ++
2,777,676 UART: [afmc] CDI.KEYID = 6
2,778,038 UART: [afmc] SUBJECT.KEYID = 7
2,778,463 UART: [afmc] AUTHORITY.KEYID = 5
2,813,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,633 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,237 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,095 UART: [afmc] --
2,857,105 UART: [cold-reset] --
2,857,969 UART: [state] Locking Datavault
2,859,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,612 UART: [state] Locking ICCM
2,860,108 UART: [exit] Launching FMC @ 0x40000130
2,865,437 UART:
2,865,453 UART: Running Caliptra FMC ...
2,865,861 UART:
2,866,004 UART: [state] CFI Enabled
2,876,819 UART: [fht] FMC Alias Private Key: 7
2,984,644 UART: [art] Extend RT PCRs Done
2,985,072 UART: [art] Lock RT PCRs Done
2,986,498 UART: [art] Populate DV Done
2,994,359 UART: [fht] FMC Alias Private Key: 7
2,995,517 UART: [art] Derive CDI
2,995,797 UART: [art] Store in in slot 0x4
3,081,796 UART: [art] Derive Key Pair
3,082,156 UART: [art] Store priv key in slot 0x5
3,095,676 UART: [art] Derive Key Pair - Done
3,110,482 UART: [art] Signing Cert with AUTHO
3,110,962 UART: RITY.KEYID = 7
3,125,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,693 UART: [art] PUB.X = C0CA69835896E86A81CEBEC519716358B642525915250359892683001F22506328B890AF887DA07B032FB848C079777C
3,133,417 UART: [art] PUB.Y = 9DBEE63C32EA846A3E78A5587CAAADA2CA0063BB74DD5DD21FE11784324135F5D34BF626BBBD5CC8C18B299A61C27C6F
3,140,367 UART: [art] SIG.R = 775E82697988042BE5201CB439C6DB57C413E39F133D11697F9A7D8ED97AF5908B1B542A001B2BB083F609A5538A3D67
3,147,105 UART: [art] SIG.S = 11477277BB5701B1E7E91B094871D3231338AFBAF8718AEAF171979590BD90E68AF52FCFA9A1360CA350968DD2DE1108
3,170,346 UART: Caliptra RT
3,170,691 UART: [state] CFI Enabled
3,278,772 UART: [rt] RT listening for mailbox commands...
3,279,442 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,348 UART: [rt]cmd =0x44504543, len=40
3,335,569 >>> mbox cmd response data (40 bytes)
3,335,570 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,061 UART: [rt]cmd =0x44504543, len=40
3,387,812 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,797 >>> mbox cmd response: success
2,689,465 UART:
2,689,481 UART: Running Caliptra FMC ...
2,689,889 UART:
2,690,032 UART: [state] CFI Enabled
2,700,879 UART: [fht] FMC Alias Private Key: 7
2,808,452 UART: [art] Extend RT PCRs Done
2,808,880 UART: [art] Lock RT PCRs Done
2,810,248 UART: [art] Populate DV Done
2,818,707 UART: [fht] FMC Alias Private Key: 7
2,819,833 UART: [art] Derive CDI
2,820,113 UART: [art] Store in in slot 0x4
2,905,904 UART: [art] Derive Key Pair
2,906,264 UART: [art] Store priv key in slot 0x5
2,919,630 UART: [art] Derive Key Pair - Done
2,934,657 UART: [art] Signing Cert with AUTHO
2,935,137 UART: RITY.KEYID = 7
2,951,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,802 UART: [art] PUB.X = AAA8D47096A284DB0DEB18326305F9E3A1313A35B4B266AD1586158F4EC7642667CF289EFAE3B4E7AEF1D7609378259B
2,958,572 UART: [art] PUB.Y = 23D581D1C4A3CE5CF3D127266020AE1735FC08941E8599C9F010CA16F9B661D648DF7A34561402E67E5EA70C0B74BC69
2,965,512 UART: [art] SIG.R = DBCFB0CE0F69F3199D9A837E6DB195EBB76D59A046F2CD1D3C33F612A9E0B1B4E0D7A0B3D135591CD3FA5F2689815518
2,972,295 UART: [art] SIG.S = A46564A24023ADD533DEBA3BD5336705F2F8A42163669FEDF4872F7ACD6AE119A2B74C8E5B1B5DF87BA69AB00BA3C16B
2,996,930 UART: Caliptra RT
2,997,275 UART: [state] CFI Enabled
3,104,321 UART: [rt] RT listening for mailbox commands...
3,104,991 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,853 UART: [rt]cmd =0x44504543, len=40
3,161,274 >>> mbox cmd response data (40 bytes)
3,161,275 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,874 UART: [rt]cmd =0x44504543, len=40
3,213,273 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,281 UART: [idev] ++
1,172,449 UART: [idev] CDI.KEYID = 6
1,172,810 UART: [idev] SUBJECT.KEYID = 7
1,173,235 UART: [idev] UDS.KEYID = 0
1,173,581 ready_for_fw is high
1,173,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,843 UART: [idev] Erasing UDS.KEYID = 0
1,197,429 UART: [idev] Sha1 KeyId Algorithm
1,206,277 UART: [idev] --
1,207,338 UART: [ldev] ++
1,207,506 UART: [ldev] CDI.KEYID = 6
1,207,870 UART: [ldev] SUBJECT.KEYID = 5
1,208,297 UART: [ldev] AUTHORITY.KEYID = 7
1,208,760 UART: [ldev] FE.KEYID = 1
1,214,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,668 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,325 >>> mbox cmd response: success
2,773,350 UART: [afmc] ++
2,773,518 UART: [afmc] CDI.KEYID = 6
2,773,881 UART: [afmc] SUBJECT.KEYID = 7
2,774,307 UART: [afmc] AUTHORITY.KEYID = 5
2,809,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,883 UART: [afmc] --
2,852,969 UART: [cold-reset] --
2,853,845 UART: [state] Locking Datavault
2,855,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,682 UART: [state] Locking ICCM
2,856,184 UART: [exit] Launching FMC @ 0x40000130
2,861,513 UART:
2,861,529 UART: Running Caliptra FMC ...
2,861,937 UART:
2,861,991 UART: [state] CFI Enabled
2,872,506 UART: [fht] FMC Alias Private Key: 7
2,981,029 UART: [art] Extend RT PCRs Done
2,981,457 UART: [art] Lock RT PCRs Done
2,982,803 UART: [art] Populate DV Done
2,991,142 UART: [fht] FMC Alias Private Key: 7
2,992,112 UART: [art] Derive CDI
2,992,392 UART: [art] Store in in slot 0x4
3,078,071 UART: [art] Derive Key Pair
3,078,431 UART: [art] Store priv key in slot 0x5
3,091,233 UART: [art] Derive Key Pair - Done
3,106,130 UART: [art] Signing Cert with AUTHO
3,106,610 UART: RITY.KEYID = 7
3,121,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,567 UART: [art] PUB.X = BB2CB4DE20F5F3890020A283EBE9D519EB19AC08E9B3BC44A74CA35F83BA24E9FECD101B67511AE30F4278BFD315ED0D
3,129,328 UART: [art] PUB.Y = 24A8E8B7C6FF7AEAB307738D08EFB1FD67236105D627D844CF034540B238B5BD696A8F564C1C35146BAFFEBA49C8BC4D
3,136,282 UART: [art] SIG.R = 05C17A049E12DB4979611A07BCEFAE8068177312522E4827DACBFCA2A56738AA8F414F1A403FEA697423EE91FA13EA91
3,143,051 UART: [art] SIG.S = 323651AAC75D1B5F1D38D3E879023B48D07857D1E145E7FA3C3BB7482A3767F758B51CDE634FE1817AB10150082A0DC0
3,166,564 UART: Caliptra RT
3,166,817 UART: [state] CFI Enabled
3,274,852 UART: [rt] RT listening for mailbox commands...
3,275,522 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,836 UART: [rt]cmd =0x44504543, len=40
3,331,559 >>> mbox cmd response data (40 bytes)
3,331,560 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,051 UART: [rt]cmd =0x44504543, len=40
3,384,278 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,218 ready_for_fw is high
1,056,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,741 >>> mbox cmd response: success
2,682,911 UART:
2,682,927 UART: Running Caliptra FMC ...
2,683,335 UART:
2,683,389 UART: [state] CFI Enabled
2,693,968 UART: [fht] FMC Alias Private Key: 7
2,802,243 UART: [art] Extend RT PCRs Done
2,802,671 UART: [art] Lock RT PCRs Done
2,804,333 UART: [art] Populate DV Done
2,812,314 UART: [fht] FMC Alias Private Key: 7
2,813,248 UART: [art] Derive CDI
2,813,528 UART: [art] Store in in slot 0x4
2,899,129 UART: [art] Derive Key Pair
2,899,489 UART: [art] Store priv key in slot 0x5
2,913,381 UART: [art] Derive Key Pair - Done
2,927,763 UART: [art] Signing Cert with AUTHO
2,928,243 UART: RITY.KEYID = 7
2,943,561 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,326 UART: [art] PUB.X = AC488EF4045F5707E1E6C2E9A26E857020406C05A1BFB9887587BB3A7323F97C2A10885D2D2FADC6C03FBFE92ECD5186
2,951,097 UART: [art] PUB.Y = 70180CF6FE5F97EA888EFE4C18BA27B5696F072B73DCFF3BCBAA9D947EE35BF5622713E6C291CFD671DAB0817DAF3DC3
2,958,065 UART: [art] SIG.R = AF4DD7E959159F4DAF49B01A00996A59F8F2DC74A5C3B3F49D4F285A8225680885983E43FD15F8ADFDF1B430B351B399
2,964,818 UART: [art] SIG.S = 2EC06422AD87F939DB41671743067F38F0E96E688828E791F64329F5EF570686B791655F293E675566B1001C23F0CD09
2,988,856 UART: Caliptra RT
2,989,109 UART: [state] CFI Enabled
3,096,922 UART: [rt] RT listening for mailbox commands...
3,097,592 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,650 UART: [rt]cmd =0x44504543, len=40
3,154,009 >>> mbox cmd response data (40 bytes)
3,154,010 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,547 UART: [rt]cmd =0x44504543, len=40
3,205,742 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
891,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,484 UART: [kat] SHA2-256
901,424 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,173,970 ready_for_fw is high
1,173,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,198,698 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,521 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,616 >>> mbox cmd response: success
2,774,655 UART: [afmc] ++
2,774,823 UART: [afmc] CDI.KEYID = 6
2,775,186 UART: [afmc] SUBJECT.KEYID = 7
2,775,612 UART: [afmc] AUTHORITY.KEYID = 5
2,811,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,606 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,158 UART: [afmc] --
2,854,128 UART: [cold-reset] --
2,855,076 UART: [state] Locking Datavault
2,856,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,997 UART: [state] Locking ICCM
2,857,445 UART: [exit] Launching FMC @ 0x40000130
2,862,774 UART:
2,862,790 UART: Running Caliptra FMC ...
2,863,198 UART:
2,863,341 UART: [state] CFI Enabled
2,873,888 UART: [fht] FMC Alias Private Key: 7
2,981,819 UART: [art] Extend RT PCRs Done
2,982,247 UART: [art] Lock RT PCRs Done
2,984,013 UART: [art] Populate DV Done
2,991,960 UART: [fht] FMC Alias Private Key: 7
2,993,036 UART: [art] Derive CDI
2,993,316 UART: [art] Store in in slot 0x4
3,078,645 UART: [art] Derive Key Pair
3,079,005 UART: [art] Store priv key in slot 0x5
3,092,085 UART: [art] Derive Key Pair - Done
3,106,736 UART: [art] Signing Cert with AUTHO
3,107,216 UART: RITY.KEYID = 7
3,122,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,289 UART: [art] PUB.X = 0B8AB3CB57AA8E8B1A4CE2C0251502FBBA638A2345B7FA9C1E2075D330FE99B0CE278DADB0310B44F5768AD2554DCEB9
3,130,070 UART: [art] PUB.Y = 7F7E48CEF5110CE6CA6975F4A68333D0DDB26F54CEE98FBE55376B8C56F3E34439A5BC6286DFA9FC74073809B050044D
3,137,018 UART: [art] SIG.R = 15754E3F01FE38113C937883DC9D2728D718871FDFBEDF19E372BCBCA3261D83615AB3DC3E4BDD6B745112DBBDD9B5CE
3,143,803 UART: [art] SIG.S = 196B80C1EDA371B03C6FF17F0EC6FE23E9C35E66CE2C9E7DF1A530EBD76638F0EED65B29361D7A576481832959CCFF51
3,167,393 UART: Caliptra RT
3,167,738 UART: [state] CFI Enabled
3,275,201 UART: [rt] RT listening for mailbox commands...
3,275,871 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,963 UART: [rt]cmd =0x44504543, len=40
3,332,336 >>> mbox cmd response data (40 bytes)
3,332,337 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,016 UART: [rt]cmd =0x44504543, len=40
3,385,281 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,071 ready_for_fw is high
1,056,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,896 >>> mbox cmd response: success
2,685,484 UART:
2,685,500 UART: Running Caliptra FMC ...
2,685,908 UART:
2,686,051 UART: [state] CFI Enabled
2,696,824 UART: [fht] FMC Alias Private Key: 7
2,804,719 UART: [art] Extend RT PCRs Done
2,805,147 UART: [art] Lock RT PCRs Done
2,806,651 UART: [art] Populate DV Done
2,814,826 UART: [fht] FMC Alias Private Key: 7
2,815,872 UART: [art] Derive CDI
2,816,152 UART: [art] Store in in slot 0x4
2,901,855 UART: [art] Derive Key Pair
2,902,215 UART: [art] Store priv key in slot 0x5
2,915,753 UART: [art] Derive Key Pair - Done
2,930,615 UART: [art] Signing Cert with AUTHO
2,931,095 UART: RITY.KEYID = 7
2,946,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,182 UART: [art] PUB.X = 68A7426CFE2FC75EB19E380AA01E696BCC6450FE02141328141050492F2D716906643C6A1B53439C4A4D858196FCCBB2
2,953,941 UART: [art] PUB.Y = E9213CE90AD4C062014D4B33A969BAE91092BD50611497D04A79F17ACA11517DCED6CBDD1503184B5C5CFF18C4C69AA1
2,960,894 UART: [art] SIG.R = 1794D396E3F97649766ED5D042F147FE10351C814B70A91438C73D9D1EE8A7141C6AE46208354D949AC17E3D139F3E26
2,967,655 UART: [art] SIG.S = B275C6CA68EB74D06F208AE58B02FA3A1AF202EB0DBDD87E34BA4B2E0E8B23C3D85733424EECFA6749A1074A61C4939E
2,991,383 UART: Caliptra RT
2,991,728 UART: [state] CFI Enabled
3,099,531 UART: [rt] RT listening for mailbox commands...
3,100,201 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,085 UART: [rt]cmd =0x44504543, len=40
3,155,892 >>> mbox cmd response data (40 bytes)
3,155,893 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,604 UART: [rt]cmd =0x44504543, len=40
3,207,821 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 ready_for_fw is high
1,480,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,986 UART: [idev] Erasing UDS.KEYID = 0
1,505,738 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,568 UART: [idev] --
1,515,731 UART: [ldev] ++
1,515,899 UART: [ldev] CDI.KEYID = 6
1,516,262 UART: [ldev] SUBJECT.KEYID = 5
1,516,688 UART: [ldev] AUTHORITY.KEYID = 7
1,517,151 UART: [ldev] FE.KEYID = 1
1,522,219 UART: [ldev] Erasing FE.KEYID = 1
1,548,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,964 UART: [ldev] --
1,587,377 UART: [fwproc] Waiting for Commands...
1,588,192 UART: [fwproc] Received command 0x46574c44
1,588,983 UART: [fwproc] Received Image of size 114332 bytes
2,887,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,398 >>> mbox cmd response: success
3,080,398 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,081,464 UART: [afmc] ++
3,081,632 UART: [afmc] CDI.KEYID = 6
3,081,994 UART: [afmc] SUBJECT.KEYID = 7
3,082,419 UART: [afmc] AUTHORITY.KEYID = 5
3,117,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,852 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,465 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,155 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,108 UART: [afmc] --
3,160,216 UART: [cold-reset] --
3,161,168 UART: [state] Locking Datavault
3,162,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,943 UART: [state] Locking ICCM
3,163,483 UART: [exit] Launching FMC @ 0x40000130
3,168,812 UART:
3,168,828 UART: Running Caliptra FMC ...
3,169,236 UART:
3,169,290 UART: [state] CFI Enabled
3,179,673 UART: [fht] FMC Alias Private Key: 7
3,287,888 UART: [art] Extend RT PCRs Done
3,288,316 UART: [art] Lock RT PCRs Done
3,289,964 UART: [art] Populate DV Done
3,298,371 UART: [fht] FMC Alias Private Key: 7
3,299,379 UART: [art] Derive CDI
3,299,659 UART: [art] Store in in slot 0x4
3,385,432 UART: [art] Derive Key Pair
3,385,792 UART: [art] Store priv key in slot 0x5
3,399,410 UART: [art] Derive Key Pair - Done
3,413,734 UART: [art] Signing Cert with AUTHO
3,414,214 UART: RITY.KEYID = 7
3,429,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,011 UART: [art] PUB.X = 1148B42DC9F56C51BEA775C1545B130DB05780CA9C2552A2E3BFB6810885576CD77F419C90B56A92A0D0A8AA50949B50
3,436,777 UART: [art] PUB.Y = 8939674351A4DCADEA387E130EB01628A447B14E288488820E43EE32CECA02434F5222B026BE74050A754611D160028B
3,443,701 UART: [art] SIG.R = 77979FE39609B18CF03AFFDC59075A2973F8417F89A5523208EDB6DCB5D5EB19BE656BD939C1537A82ABAE17CAD451F1
3,450,474 UART: [art] SIG.S = AD3F27018F3A570D2AFBB46BBE1D7D02F562C444A9F6C943464E65222903E998CC37C1E206E9520C8D5946C236B06620
3,473,713 UART: Caliptra RT
3,473,966 UART: [state] CFI Enabled
3,582,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,417 UART: [rt]cmd =0x44504543, len=136
3,676,275 >>> mbox cmd response data (136 bytes)
3,676,276 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,297 UART: [rt]cmd =0x44504543, len=92
3,889,762 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,953 ready_for_fw is high
1,361,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,000 >>> mbox cmd response: success
2,927,000 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,918 UART:
2,988,934 UART: Running Caliptra FMC ...
2,989,342 UART:
2,989,396 UART: [state] CFI Enabled
2,999,931 UART: [fht] FMC Alias Private Key: 7
3,107,680 UART: [art] Extend RT PCRs Done
3,108,108 UART: [art] Lock RT PCRs Done
3,109,662 UART: [art] Populate DV Done
3,117,785 UART: [fht] FMC Alias Private Key: 7
3,118,809 UART: [art] Derive CDI
3,119,089 UART: [art] Store in in slot 0x4
3,204,850 UART: [art] Derive Key Pair
3,205,210 UART: [art] Store priv key in slot 0x5
3,218,684 UART: [art] Derive Key Pair - Done
3,233,607 UART: [art] Signing Cert with AUTHO
3,234,087 UART: RITY.KEYID = 7
3,249,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,026 UART: [art] PUB.X = BFC396A55B7E485B76381BFDCFE50F2C6C4A2BE2BCCD2CE1BAAA86705E031A634BD1BC5591D704B2DFDC36CA85D17D68
3,256,815 UART: [art] PUB.Y = A41168573D87321C8C309D2B12FCF424553D1C685C137D8FEC42B32D0007D19BD98D4BD0F57927DBE0C1DEA210258B78
3,263,744 UART: [art] SIG.R = 3FD62655D64B1D0E56A15489B1E38B467EAF3C762E24B56BD11CA8BB958FBA1892D8CDB26919E2C34E71D9E44A0C7765
3,270,518 UART: [art] SIG.S = 345AE845EC30192DECB01A729F1ED5DE667807159119A956FC692180FA60AA0A5EBE92C267C88CE2373886696D859AEF
3,294,251 UART: Caliptra RT
3,294,504 UART: [state] CFI Enabled
3,403,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,334 UART: [rt]cmd =0x44504543, len=136
3,497,524 >>> mbox cmd response data (136 bytes)
3,497,525 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,288 UART: [rt]cmd =0x44504543, len=92
3,710,118 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,796 UART: [kat] SHA2-256
892,734 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,133 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,477,056 UART: [cold-reset] ++
1,477,404 UART: [fht] Storing FHT @ 0x50003400
1,480,229 UART: [idev] ++
1,480,397 UART: [idev] CDI.KEYID = 6
1,480,757 UART: [idev] SUBJECT.KEYID = 7
1,481,181 UART: [idev] UDS.KEYID = 0
1,481,526 ready_for_fw is high
1,481,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,863 UART: [idev] --
1,514,892 UART: [ldev] ++
1,515,060 UART: [ldev] CDI.KEYID = 6
1,515,423 UART: [ldev] SUBJECT.KEYID = 5
1,515,849 UART: [ldev] AUTHORITY.KEYID = 7
1,516,312 UART: [ldev] FE.KEYID = 1
1,521,650 UART: [ldev] Erasing FE.KEYID = 1
1,546,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,045 UART: [ldev] --
1,586,316 UART: [fwproc] Waiting for Commands...
1,587,039 UART: [fwproc] Received command 0x46574c44
1,587,830 UART: [fwproc] Received Image of size 114332 bytes
2,886,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,858 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,131 >>> mbox cmd response: success
3,079,131 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,080,367 UART: [afmc] ++
3,080,535 UART: [afmc] CDI.KEYID = 6
3,080,897 UART: [afmc] SUBJECT.KEYID = 7
3,081,322 UART: [afmc] AUTHORITY.KEYID = 5
3,117,387 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,831 UART: [afmc] --
3,160,729 UART: [cold-reset] --
3,161,551 UART: [state] Locking Datavault
3,162,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,358 UART: [state] Locking ICCM
3,163,902 UART: [exit] Launching FMC @ 0x40000130
3,169,231 UART:
3,169,247 UART: Running Caliptra FMC ...
3,169,655 UART:
3,169,798 UART: [state] CFI Enabled
3,180,509 UART: [fht] FMC Alias Private Key: 7
3,288,548 UART: [art] Extend RT PCRs Done
3,288,976 UART: [art] Lock RT PCRs Done
3,290,626 UART: [art] Populate DV Done
3,299,045 UART: [fht] FMC Alias Private Key: 7
3,300,007 UART: [art] Derive CDI
3,300,287 UART: [art] Store in in slot 0x4
3,385,664 UART: [art] Derive Key Pair
3,386,024 UART: [art] Store priv key in slot 0x5
3,399,778 UART: [art] Derive Key Pair - Done
3,414,407 UART: [art] Signing Cert with AUTHO
3,414,887 UART: RITY.KEYID = 7
3,430,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,116 UART: [art] PUB.X = 53A6A5D0E03FB65B2F4FDDDF14A056B02AFDF9A35A515C13A979EA6B116C2A846E2A3B9676B31A5297DF46B4FEDFC5A5
3,437,908 UART: [art] PUB.Y = 7E4E7FCD4A6CF78DF87E0DBB4B5610F163B0D87CA36737BFF7FEEC17C38863B7752E00C6B674B1167675A7B80C2D4FD5
3,444,846 UART: [art] SIG.R = 2687CDD5CF4AA590AB76F3C1F2A45DC2BA1124A8C72ABF3DEB5BD03FF4F446F0703A2F15D50A5C8F984837A286D7A43C
3,451,633 UART: [art] SIG.S = 8F93EE81CA25CC2A1ADA48F62B051C8FFD49D459565E121034FB94094AF0C0FDF75DFBB7EC45DE4D6599E70E59BF3038
3,475,113 UART: Caliptra RT
3,475,458 UART: [state] CFI Enabled
3,583,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,089 UART: [rt]cmd =0x44504543, len=136
3,678,459 >>> mbox cmd response data (136 bytes)
3,678,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,477 UART: [rt]cmd =0x44504543, len=92
3,892,178 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 ready_for_fw is high
1,363,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,637 >>> mbox cmd response: success
2,928,637 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,990,765 UART:
2,990,781 UART: Running Caliptra FMC ...
2,991,189 UART:
2,991,332 UART: [state] CFI Enabled
3,002,025 UART: [fht] FMC Alias Private Key: 7
3,110,332 UART: [art] Extend RT PCRs Done
3,110,760 UART: [art] Lock RT PCRs Done
3,112,608 UART: [art] Populate DV Done
3,120,825 UART: [fht] FMC Alias Private Key: 7
3,121,899 UART: [art] Derive CDI
3,122,179 UART: [art] Store in in slot 0x4
3,207,982 UART: [art] Derive Key Pair
3,208,342 UART: [art] Store priv key in slot 0x5
3,221,906 UART: [art] Derive Key Pair - Done
3,236,572 UART: [art] Signing Cert with AUTHO
3,237,052 UART: RITY.KEYID = 7
3,252,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,313 UART: [art] PUB.X = CF7A86CE5F9F76D5EF45ABCFCBB285030BC5FDEF203E8DD33A947E19FBDF254C505EA1C4997601870D74F79DE9DFB4C6
3,260,097 UART: [art] PUB.Y = 53F2121D3DAD2C10160DF3B7A550A6E4FD6465D7362680CBE20DB96321F67A1CCF6C37DC601DA627AC408921601CE121
3,267,047 UART: [art] SIG.R = E99CF6C734FDB7209F1C6A103F67D58022A7622B0AC1F9AE3CA1BE2FA77572C1490F300FFDCC56EB0D90E1E6D7960976
3,273,816 UART: [art] SIG.S = 4D87481EBDCF210397C1B9E546F716F94B930041F46B6A9A940CB19960252B4797B2684934309234FEF6FE4126C15121
3,297,273 UART: Caliptra RT
3,297,618 UART: [state] CFI Enabled
3,405,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,951 UART: [rt]cmd =0x44504543, len=136
3,499,803 >>> mbox cmd response data (136 bytes)
3,499,804 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,691 UART: [rt]cmd =0x44504543, len=92
3,713,971 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,817 UART: [kat] SHA2-256
903,757 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
918,132 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,172,189 UART: [cold-reset] ++
1,172,757 UART: [fht] FHT @ 0x50003400
1,175,318 UART: [idev] ++
1,175,486 UART: [idev] CDI.KEYID = 6
1,175,846 UART: [idev] SUBJECT.KEYID = 7
1,176,270 UART: [idev] UDS.KEYID = 0
1,176,615 ready_for_fw is high
1,176,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,043 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,587 UART: [ldev] ++
1,210,755 UART: [ldev] CDI.KEYID = 6
1,211,118 UART: [ldev] SUBJECT.KEYID = 5
1,211,544 UART: [ldev] AUTHORITY.KEYID = 7
1,212,007 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,477 UART: [ldev] --
1,282,888 UART: [fwproc] Wait for Commands...
1,283,584 UART: [fwproc] Recv command 0x46574c44
1,284,312 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,463 >>> mbox cmd response: success
2,775,463 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,483 UART: [afmc] ++
2,776,651 UART: [afmc] CDI.KEYID = 6
2,777,013 UART: [afmc] SUBJECT.KEYID = 7
2,777,438 UART: [afmc] AUTHORITY.KEYID = 5
2,812,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,748 UART: [afmc] --
2,856,810 UART: [cold-reset] --
2,857,694 UART: [state] Locking Datavault
2,858,879 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,483 UART: [state] Locking ICCM
2,860,027 UART: [exit] Launching FMC @ 0x40000130
2,865,356 UART:
2,865,372 UART: Running Caliptra FMC ...
2,865,780 UART:
2,865,834 UART: [state] CFI Enabled
2,876,011 UART: [fht] FMC Alias Private Key: 7
2,984,024 UART: [art] Extend RT PCRs Done
2,984,452 UART: [art] Lock RT PCRs Done
2,986,038 UART: [art] Populate DV Done
2,994,191 UART: [fht] FMC Alias Private Key: 7
2,995,173 UART: [art] Derive CDI
2,995,453 UART: [art] Store in in slot 0x4
3,081,190 UART: [art] Derive Key Pair
3,081,550 UART: [art] Store priv key in slot 0x5
3,094,502 UART: [art] Derive Key Pair - Done
3,109,229 UART: [art] Signing Cert with AUTHO
3,109,709 UART: RITY.KEYID = 7
3,125,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,038 UART: [art] PUB.X = 5EAA30D92481E614B5319FEEE410838973168700E6ECF6E77F89AE84F8C739EBE3ADD3538CA59F05F2FBF13007DC8E38
3,132,790 UART: [art] PUB.Y = 59AE11EB2E86B7735A78F383EF8AC53D48E0CBFD46815CE9BA34C475FC8FE1C2925B8BAF2A6AC28A9A192DC180E51599
3,139,758 UART: [art] SIG.R = 77327915BAF7DACA23901F7E9E1BBD3057DE9473C738243473E035F09DAA675C088DD04DB1AE31BC21109BEADB5BA4DF
3,146,541 UART: [art] SIG.S = 5404AE5F3CCBB5C5BE4CE626EBEBB9AC9A480DEAF634FD39B7C608A4019BCA945126FDCF6C2EFF5B5524E067BEC9BC12
3,170,360 UART: Caliptra RT
3,170,613 UART: [state] CFI Enabled
3,278,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,326 UART: [rt]cmd =0x44504543, len=136
3,372,554 >>> mbox cmd response data (136 bytes)
3,372,555 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,414 UART: [rt]cmd =0x44504543, len=92
3,584,649 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,089 ready_for_fw is high
1,060,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,711 >>> mbox cmd response: success
2,625,711 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,853 UART:
2,687,869 UART: Running Caliptra FMC ...
2,688,277 UART:
2,688,331 UART: [state] CFI Enabled
2,698,746 UART: [fht] FMC Alias Private Key: 7
2,806,033 UART: [art] Extend RT PCRs Done
2,806,461 UART: [art] Lock RT PCRs Done
2,808,173 UART: [art] Populate DV Done
2,816,334 UART: [fht] FMC Alias Private Key: 7
2,817,426 UART: [art] Derive CDI
2,817,706 UART: [art] Store in in slot 0x4
2,902,979 UART: [art] Derive Key Pair
2,903,339 UART: [art] Store priv key in slot 0x5
2,916,577 UART: [art] Derive Key Pair - Done
2,930,936 UART: [art] Signing Cert with AUTHO
2,931,416 UART: RITY.KEYID = 7
2,946,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,567 UART: [art] PUB.X = F52DF83B8AC8EEBD4EBF9C16F04E42DBC3DEE1504483B32255A72C9F5779803526629E681B453FBF59094818CCB73B8E
2,954,344 UART: [art] PUB.Y = E8031E4C35CE6754883F60C4C971EEFCB00C63E84BC5562028ABCD5CB9CB9A0F0F6160C44B89222E79C9361DF9E4A81A
2,961,294 UART: [art] SIG.R = EBE96C41F557E50C9F51864E67E722744FAFE47C28043989FFD3C3A594A406F20E0596A0AE7860C39AEDC5385EAE911F
2,968,057 UART: [art] SIG.S = 0B8884F98F92BC13434F23E420242FE9D00E13A0BC1B26F2D0C124798C898C935C28E6E41B8C4DAA1D43625D6FF8E3E5
2,991,926 UART: Caliptra RT
2,992,179 UART: [state] CFI Enabled
3,100,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,906 UART: [rt]cmd =0x44504543, len=136
3,195,468 >>> mbox cmd response data (136 bytes)
3,195,469 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,366 UART: [rt]cmd =0x44504543, len=92
3,409,422 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,919 UART: [state] LifecycleState = Unprovisioned
86,574 UART: [state] DebugLocked = No
87,256 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
894,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,142 UART: [kat] ++
898,294 UART: [kat] sha1
902,576 UART: [kat] SHA2-256
904,516 UART: [kat] SHA2-384
907,227 UART: [kat] SHA2-512-ACC
909,128 UART: [kat] ECC-384
918,573 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,708 UART: [fht] FHT @ 0x50003400
1,175,293 UART: [idev] ++
1,175,461 UART: [idev] CDI.KEYID = 6
1,175,821 UART: [idev] SUBJECT.KEYID = 7
1,176,245 UART: [idev] UDS.KEYID = 0
1,176,590 ready_for_fw is high
1,176,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,200,642 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,306 UART: [ldev] ++
1,210,474 UART: [ldev] CDI.KEYID = 6
1,210,837 UART: [ldev] SUBJECT.KEYID = 5
1,211,263 UART: [ldev] AUTHORITY.KEYID = 7
1,211,726 UART: [ldev] FE.KEYID = 1
1,217,144 UART: [ldev] Erasing FE.KEYID = 1
1,243,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,280 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,295 UART: [fwproc] Recv command 0x46574c44
1,284,023 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,419 >>> mbox cmd response: success
2,774,419 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,525 UART: [afmc] ++
2,775,693 UART: [afmc] CDI.KEYID = 6
2,776,055 UART: [afmc] SUBJECT.KEYID = 7
2,776,480 UART: [afmc] AUTHORITY.KEYID = 5
2,812,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,211 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,902 UART: [afmc] --
2,855,866 UART: [cold-reset] --
2,856,848 UART: [state] Locking Datavault
2,857,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,425 UART: [state] Locking ICCM
2,858,987 UART: [exit] Launching FMC @ 0x40000130
2,864,316 UART:
2,864,332 UART: Running Caliptra FMC ...
2,864,740 UART:
2,864,883 UART: [state] CFI Enabled
2,875,510 UART: [fht] FMC Alias Private Key: 7
2,983,103 UART: [art] Extend RT PCRs Done
2,983,531 UART: [art] Lock RT PCRs Done
2,984,855 UART: [art] Populate DV Done
2,993,072 UART: [fht] FMC Alias Private Key: 7
2,994,062 UART: [art] Derive CDI
2,994,342 UART: [art] Store in in slot 0x4
3,080,143 UART: [art] Derive Key Pair
3,080,503 UART: [art] Store priv key in slot 0x5
3,094,039 UART: [art] Derive Key Pair - Done
3,108,634 UART: [art] Signing Cert with AUTHO
3,109,114 UART: RITY.KEYID = 7
3,124,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,019 UART: [art] PUB.X = E5B2AA3F093DE622BD67908C2D7107A1D31EF023E0FC9DDD84D98EF17318BE211658039E50C9BF36AFCC2C78BF642975
3,131,792 UART: [art] PUB.Y = E2BE31CDC23424B5CE7BB09AC8E6F4C061C8933F214E5650A26B63313B9AFCE2ABF5E200A707B28203C454947E59C4D9
3,138,724 UART: [art] SIG.R = DADEEF3FED9897D7F3C279351747541DC2910D56C3BAC1E200E7A0CEA3A7E1272563D8A4370F8A98C8C744E975182DE4
3,145,476 UART: [art] SIG.S = 7D7514E579F946088384B9B2F4056CB70D35D45D7BE24F0585A565A8A761BACD39B4A4EF89F853B48E40F1C64DD4F9AF
3,168,885 UART: Caliptra RT
3,169,230 UART: [state] CFI Enabled
3,276,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,859 UART: [rt]cmd =0x44504543, len=136
3,371,507 >>> mbox cmd response data (136 bytes)
3,371,508 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,187 UART: [rt]cmd =0x44504543, len=92
3,584,378 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,548 ready_for_fw is high
1,060,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,485 >>> mbox cmd response: success
2,626,485 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,689,419 UART:
2,689,435 UART: Running Caliptra FMC ...
2,689,843 UART:
2,689,986 UART: [state] CFI Enabled
2,700,659 UART: [fht] FMC Alias Private Key: 7
2,808,422 UART: [art] Extend RT PCRs Done
2,808,850 UART: [art] Lock RT PCRs Done
2,810,268 UART: [art] Populate DV Done
2,818,561 UART: [fht] FMC Alias Private Key: 7
2,819,493 UART: [art] Derive CDI
2,819,773 UART: [art] Store in in slot 0x4
2,905,434 UART: [art] Derive Key Pair
2,905,794 UART: [art] Store priv key in slot 0x5
2,919,500 UART: [art] Derive Key Pair - Done
2,934,412 UART: [art] Signing Cert with AUTHO
2,934,892 UART: RITY.KEYID = 7
2,950,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,091 UART: [art] PUB.X = 6A462017806900B6D404B6E35F426DE0D92D35B7614A948C670271244675EC937FB12C9CDCBA4297E488054983AA24D2
2,957,822 UART: [art] PUB.Y = 9D901B2837559740DB46405C728800AA51244923968B1C0344806B7BF4F59911E299630213642AB2B9CE813CFB0D1C23
2,964,727 UART: [art] SIG.R = 3B59C3FCB779C9857DC396DAB5DBF8787F0CB06443126AF4C0025431BAFCFA118C855E5732C08719D972B80716D09E22
2,971,492 UART: [art] SIG.S = 3BB301C8D667708D288570F24216063B8E2BE87156E2F6C8A30E1A47EC94C7CC083AD35ABFDE10783A9DA0966FF0C635
2,994,965 UART: Caliptra RT
2,995,310 UART: [state] CFI Enabled
3,103,247 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,661 UART: [rt]cmd =0x44504543, len=136
3,199,073 >>> mbox cmd response data (136 bytes)
3,199,074 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,105 UART: [rt]cmd =0x44504543, len=92
3,412,873 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,837 UART: [idev] ++
1,173,005 UART: [idev] CDI.KEYID = 6
1,173,366 UART: [idev] SUBJECT.KEYID = 7
1,173,791 UART: [idev] UDS.KEYID = 0
1,174,137 ready_for_fw is high
1,174,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,215,766 UART: [ldev] Erasing FE.KEYID = 1
1,242,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,146 UART: [ldev] --
1,281,560 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,317 >>> mbox cmd response: success
2,773,317 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,378 UART: [afmc] ++
2,774,546 UART: [afmc] CDI.KEYID = 6
2,774,909 UART: [afmc] SUBJECT.KEYID = 7
2,775,335 UART: [afmc] AUTHORITY.KEYID = 5
2,811,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,695 UART: [afmc] --
2,854,779 UART: [cold-reset] --
2,855,657 UART: [state] Locking Datavault
2,856,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,458 UART: [state] Locking ICCM
2,857,942 UART: [exit] Launching FMC @ 0x40000130
2,863,271 UART:
2,863,287 UART: Running Caliptra FMC ...
2,863,695 UART:
2,863,749 UART: [state] CFI Enabled
2,874,500 UART: [fht] FMC Alias Private Key: 7
2,982,435 UART: [art] Extend RT PCRs Done
2,982,863 UART: [art] Lock RT PCRs Done
2,984,185 UART: [art] Populate DV Done
2,992,408 UART: [fht] FMC Alias Private Key: 7
2,993,584 UART: [art] Derive CDI
2,993,864 UART: [art] Store in in slot 0x4
3,079,707 UART: [art] Derive Key Pair
3,080,067 UART: [art] Store priv key in slot 0x5
3,093,527 UART: [art] Derive Key Pair - Done
3,108,182 UART: [art] Signing Cert with AUTHO
3,108,662 UART: RITY.KEYID = 7
3,123,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,745 UART: [art] PUB.X = 3CDC203BA9FB6F7B2017F075928398B1CC083A52B1A4F0FFAEADB5555457FDCF3EFF432AB1612B107F0E5A7F28B670FF
3,131,529 UART: [art] PUB.Y = 6E0B474C78AAB2C33DEB9AC6A1AC567880D7ACC25B99A25A6ACE208E01A7EEBF9BE9A221AB0BF1210E0322F2370EFBAC
3,138,489 UART: [art] SIG.R = 928C37A0EDAFFB80B1A04BB41107D2E992675C1A6731D8F9E8728EA3DF2AE42B0BA0AD43D6D0EA709F9157E3ADB80207
3,145,263 UART: [art] SIG.S = D183FF2F26518234025F041FD9C88ACFC5DFC5E4E612D7BF0D054FDAED1DD492227C923EAD2E3AE14043DBD8C7A2DAFF
3,168,542 UART: Caliptra RT
3,168,795 UART: [state] CFI Enabled
3,277,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,557 UART: [rt]cmd =0x44504543, len=136
3,372,643 >>> mbox cmd response data (136 bytes)
3,372,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,555 UART: [rt]cmd =0x44504543, len=92
3,585,930 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,274 ready_for_fw is high
1,055,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,231 >>> mbox cmd response: success
2,622,231 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,683,905 UART:
2,683,921 UART: Running Caliptra FMC ...
2,684,329 UART:
2,684,383 UART: [state] CFI Enabled
2,694,964 UART: [fht] FMC Alias Private Key: 7
2,802,927 UART: [art] Extend RT PCRs Done
2,803,355 UART: [art] Lock RT PCRs Done
2,805,001 UART: [art] Populate DV Done
2,813,154 UART: [fht] FMC Alias Private Key: 7
2,814,186 UART: [art] Derive CDI
2,814,466 UART: [art] Store in in slot 0x4
2,899,931 UART: [art] Derive Key Pair
2,900,291 UART: [art] Store priv key in slot 0x5
2,913,707 UART: [art] Derive Key Pair - Done
2,928,641 UART: [art] Signing Cert with AUTHO
2,929,121 UART: RITY.KEYID = 7
2,944,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,378 UART: [art] PUB.X = 43AB760DEC0AD169261FEDF5187070F5D30994D9BB2CCB9F6922A5970D3ECDB8CA4A9F3D6E742786F7D6DACC1A2ACFFB
2,952,162 UART: [art] PUB.Y = 7AE486E0A99075C3C025F9BD248635EF6287933DA8B2C4A1CED6C21A32C0E6EE879448D9CCC1EDEBC764AEC5F9875495
2,959,126 UART: [art] SIG.R = A8ABE580B6B3DB762D163BA3FA675AFE498ACE3A36D1AD1643441DBF4A6FAE7F4D9F6C475904EAF69ECE962CF996F75F
2,965,919 UART: [art] SIG.S = 73B81CDC18C5218BCEF5D35C9CA2DB20B6614F0440FD863E668D854A84150B1A45604E270893B9CB703380994593718E
2,989,305 UART: Caliptra RT
2,989,558 UART: [state] CFI Enabled
3,097,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,975 UART: [rt]cmd =0x44504543, len=136
3,192,463 >>> mbox cmd response data (136 bytes)
3,192,464 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,365 UART: [rt]cmd =0x44504543, len=92
3,405,147 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,245 UART: [kat] SHA2-512-ACC
906,146 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,169,940 UART: [fht] FHT @ 0x50003400
1,172,486 UART: [idev] ++
1,172,654 UART: [idev] CDI.KEYID = 6
1,173,015 UART: [idev] SUBJECT.KEYID = 7
1,173,440 UART: [idev] UDS.KEYID = 0
1,173,786 ready_for_fw is high
1,173,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,290 UART: [idev] Erasing UDS.KEYID = 0
1,198,578 UART: [idev] Sha1 KeyId Algorithm
1,207,260 UART: [idev] --
1,208,127 UART: [ldev] ++
1,208,295 UART: [ldev] CDI.KEYID = 6
1,208,659 UART: [ldev] SUBJECT.KEYID = 5
1,209,086 UART: [ldev] AUTHORITY.KEYID = 7
1,209,549 UART: [ldev] FE.KEYID = 1
1,214,831 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,989 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,356 >>> mbox cmd response: success
2,773,356 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,515 UART: [afmc] ++
2,774,683 UART: [afmc] CDI.KEYID = 6
2,775,046 UART: [afmc] SUBJECT.KEYID = 7
2,775,472 UART: [afmc] AUTHORITY.KEYID = 5
2,811,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,966 UART: [afmc] --
2,854,866 UART: [cold-reset] --
2,855,532 UART: [state] Locking Datavault
2,856,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,485 UART: [state] Locking ICCM
2,857,971 UART: [exit] Launching FMC @ 0x40000130
2,863,300 UART:
2,863,316 UART: Running Caliptra FMC ...
2,863,724 UART:
2,863,867 UART: [state] CFI Enabled
2,874,622 UART: [fht] FMC Alias Private Key: 7
2,982,609 UART: [art] Extend RT PCRs Done
2,983,037 UART: [art] Lock RT PCRs Done
2,984,633 UART: [art] Populate DV Done
2,992,760 UART: [fht] FMC Alias Private Key: 7
2,993,746 UART: [art] Derive CDI
2,994,026 UART: [art] Store in in slot 0x4
3,079,195 UART: [art] Derive Key Pair
3,079,555 UART: [art] Store priv key in slot 0x5
3,093,199 UART: [art] Derive Key Pair - Done
3,107,642 UART: [art] Signing Cert with AUTHO
3,108,122 UART: RITY.KEYID = 7
3,123,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,167 UART: [art] PUB.X = A3000A26F4EC0630546F66A14CEF4E70433DF1B8E663AC4BAD9225FFD883A11FC2075369F0461EEC682C8C9E45BD6B02
3,130,913 UART: [art] PUB.Y = 24F6E6B29A3F2FFA871A2EBCCD846F44B8DC8329E19DB53F752D6FE97095BABE04A95D57ECB5A9EA9B9D3338F7F7EFD6
3,137,886 UART: [art] SIG.R = FB25B7EE97B61036973CDA774BE2DA4A9EFA0CD61C958669F3A97012676F75D83208D473DA0FEF3CE00364DD5161DE2C
3,144,656 UART: [art] SIG.S = 671A8CE4EFB405CDDD9623057E753278C1E8315CF3C2F7245868CE18E2EE4B811CDE5894086FBEA74E91EE1EC5F8CAAB
3,168,162 UART: Caliptra RT
3,168,507 UART: [state] CFI Enabled
3,277,428 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,994 UART: [rt]cmd =0x44504543, len=136
3,373,012 >>> mbox cmd response data (136 bytes)
3,373,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,102 UART: [rt]cmd =0x44504543, len=92
3,585,984 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,697 ready_for_fw is high
1,057,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,470 >>> mbox cmd response: success
2,627,470 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,690,588 UART:
2,690,604 UART: Running Caliptra FMC ...
2,691,012 UART:
2,691,155 UART: [state] CFI Enabled
2,702,062 UART: [fht] FMC Alias Private Key: 7
2,809,609 UART: [art] Extend RT PCRs Done
2,810,037 UART: [art] Lock RT PCRs Done
2,811,547 UART: [art] Populate DV Done
2,819,706 UART: [fht] FMC Alias Private Key: 7
2,820,814 UART: [art] Derive CDI
2,821,094 UART: [art] Store in in slot 0x4
2,906,837 UART: [art] Derive Key Pair
2,907,197 UART: [art] Store priv key in slot 0x5
2,920,557 UART: [art] Derive Key Pair - Done
2,935,281 UART: [art] Signing Cert with AUTHO
2,935,761 UART: RITY.KEYID = 7
2,951,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,830 UART: [art] PUB.X = D26C609C9599989F1E70E00FCECC75293D2021BA4D80A93B47E5340CD56A7625211C033FDD8682799ED59E5FCF373D72
2,958,593 UART: [art] PUB.Y = 1C9C7CD491E1D80A649E0F1D0E991D37AA9CAB73B80716B725BACF53B1D4D84496FB7AAAFA383BD3128F26D27FF78019
2,965,547 UART: [art] SIG.R = 24A455187F6C31F35F2745877ED66BF92667C551DE711414021E00B132F94CD41B3726A38C9527E487B66A2396B4C29D
2,972,282 UART: [art] SIG.S = 781ACDAFA902DA42EE122C6612BE5AAD4A59252D9BAD11E65795403881A3E6FEAE361F7CCFE2437E0EE1ACC16075164E
2,996,589 UART: Caliptra RT
2,996,934 UART: [state] CFI Enabled
3,103,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,995 UART: [rt]cmd =0x44504543, len=136
3,199,421 >>> mbox cmd response data (136 bytes)
3,199,422 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,201 UART: [rt]cmd =0x44504543, len=92
3,412,529 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,663 UART: [kat] SHA2-256
881,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,709 UART: [kat] ++
885,861 UART: [kat] sha1
889,989 UART: [kat] SHA2-256
891,927 UART: [kat] SHA2-384
894,878 UART: [kat] SHA2-512-ACC
896,779 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,004 UART: [kat] LMS
1,475,200 UART: [kat] --
1,476,117 UART: [cold-reset] ++
1,476,515 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 ready_for_fw is high
1,480,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,882 UART: [idev] Erasing UDS.KEYID = 0
1,504,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,140 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,521,151 UART: [ldev] Erasing FE.KEYID = 1
1,546,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,650 UART: [ldev] --
1,586,047 UART: [fwproc] Waiting for Commands...
1,586,744 UART: [fwproc] Received command 0x46574c44
1,587,535 UART: [fwproc] Received Image of size 114332 bytes
2,885,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,586 >>> mbox cmd response: success
3,078,726 UART: [afmc] ++
3,078,894 UART: [afmc] CDI.KEYID = 6
3,079,256 UART: [afmc] SUBJECT.KEYID = 7
3,079,681 UART: [afmc] AUTHORITY.KEYID = 5
3,114,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,173 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,863 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,798 UART: [afmc] --
3,157,712 UART: [cold-reset] --
3,158,560 UART: [state] Locking Datavault
3,159,883 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,487 UART: [state] Locking ICCM
3,161,119 UART: [exit] Launching FMC @ 0x40000130
3,166,448 UART:
3,166,464 UART: Running Caliptra FMC ...
3,166,872 UART:
3,166,926 UART: [state] CFI Enabled
3,177,825 UART: [fht] FMC Alias Private Key: 7
3,286,070 UART: [art] Extend RT PCRs Done
3,286,498 UART: [art] Lock RT PCRs Done
3,287,844 UART: [art] Populate DV Done
3,296,113 UART: [fht] FMC Alias Private Key: 7
3,297,053 UART: [art] Derive CDI
3,297,333 UART: [art] Store in in slot 0x4
3,383,028 UART: [art] Derive Key Pair
3,383,388 UART: [art] Store priv key in slot 0x5
3,396,878 UART: [art] Derive Key Pair - Done
3,411,825 UART: [art] Signing Cert with AUTHO
3,412,305 UART: RITY.KEYID = 7
3,427,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,114 UART: [art] PUB.X = 23A6C6DAE11120279DBE21EC98CBDA52794E8651E149E56503EE3F13176BC39220A0F6091038E2DCABC99E06BC02F381
3,434,878 UART: [art] PUB.Y = 702E32ED1455A50404261333199BF7B072991F7D0808711EDF9769E61658A01B9F840A874A219F97F16F4982B40CC11E
3,441,798 UART: [art] SIG.R = CBCF07C2FCA75FE3678F4856E4CCC47C8A874858CA42442EBCB488E7CEACF33B50A1C02F034D322C11227BB26E473DCF
3,448,582 UART: [art] SIG.S = 3BABEF77C6346C5DDC44D5C6676D4DAC93582BF115863D79EC9CDD4EE14F0039CE2CA7AC170DC798A90207789F22E91B
3,472,532 UART: Caliptra RT
3,472,785 UART: [state] CFI Enabled
3,581,506 UART: [rt] RT listening for mailbox commands...
3,582,176 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,792 UART: [rt]cmd =0x4c4d5356, len=1672
4,143,159 >>> mbox cmd response data (8 bytes)
4,143,160 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,183,579 UART: [rt]cmd =0x4c4d5356, len=1672
4,460,160 >>> mbox cmd response data (8 bytes)
4,460,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,320 UART: [rt]cmd =0x4c4d5356, len=1672
4,776,885 >>> mbox cmd response data (8 bytes)
4,776,886 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,209 UART: [rt]cmd =0x4c4d5356, len=1672
5,088,802 >>> mbox cmd response data (8 bytes)
5,088,803 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,128,894 UART: [rt]cmd =0x4c4d5356, len=1672
5,400,551 >>> mbox cmd response data (8 bytes)
5,400,552 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,440,609 UART: [rt]cmd =0x4c4d5356, len=1672
5,714,845 >>> mbox cmd response data (8 bytes)
5,714,846 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,223 UART: [rt]cmd =0x4c4d5356, len=1672
6,026,840 >>> mbox cmd response data (8 bytes)
6,026,841 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,072 UART: [rt]cmd =0x4c4d5356, len=1672
6,341,048 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,680 >>> mbox cmd response: success
2,987,964 UART:
2,987,980 UART: Running Caliptra FMC ...
2,988,388 UART:
2,988,442 UART: [state] CFI Enabled
2,998,733 UART: [fht] FMC Alias Private Key: 7
3,106,244 UART: [art] Extend RT PCRs Done
3,106,672 UART: [art] Lock RT PCRs Done
3,108,356 UART: [art] Populate DV Done
3,116,367 UART: [fht] FMC Alias Private Key: 7
3,117,519 UART: [art] Derive CDI
3,117,799 UART: [art] Store in in slot 0x4
3,203,762 UART: [art] Derive Key Pair
3,204,122 UART: [art] Store priv key in slot 0x5
3,217,284 UART: [art] Derive Key Pair - Done
3,231,810 UART: [art] Signing Cert with AUTHO
3,232,290 UART: RITY.KEYID = 7
3,247,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,843 UART: [art] PUB.X = 10A25FB358313FD47B4CB3D1AD114A4482D6CD398DD969136B9A8ABF118AD1F04E3D52E8DD83D20501567154028DDB7E
3,254,612 UART: [art] PUB.Y = CEE17BA86C3BF970D97F04CB8148E76B4549D262BEE23B3BC84CB5402A7BBF2E6F4895A4A8298D646694AE3FC1268E81
3,261,571 UART: [art] SIG.R = CB000CB18DCE749B8DBE88E599985AD48D4AC963D35F4EEC763CF404F2C86CBD9BF7BBC2BEE899010C522E59F5CDFC23
3,268,333 UART: [art] SIG.S = 055DEDBF5B27B9075932CD969C8A499052502E11D9804FD60B5A9AA9335083F42A989DEBE0DA54D0480F591F17071F07
3,291,820 UART: Caliptra RT
3,292,073 UART: [state] CFI Enabled
3,400,516 UART: [rt] RT listening for mailbox commands...
3,401,186 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,606 UART: [rt]cmd =0x4c4d5356, len=1672
3,961,843 >>> mbox cmd response data (8 bytes)
3,961,844 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,949 UART: [rt]cmd =0x4c4d5356, len=1672
4,278,212 >>> mbox cmd response data (8 bytes)
4,278,213 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,318,312 UART: [rt]cmd =0x4c4d5356, len=1672
4,594,671 >>> mbox cmd response data (8 bytes)
4,594,672 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,634,921 UART: [rt]cmd =0x4c4d5356, len=1672
4,906,272 >>> mbox cmd response data (8 bytes)
4,906,273 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,946,390 UART: [rt]cmd =0x4c4d5356, len=1672
5,218,093 >>> mbox cmd response data (8 bytes)
5,218,094 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,258,449 UART: [rt]cmd =0x4c4d5356, len=1672
5,532,601 >>> mbox cmd response data (8 bytes)
5,532,602 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,673 UART: [rt]cmd =0x4c4d5356, len=1672
5,844,504 >>> mbox cmd response data (8 bytes)
5,844,505 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,762 UART: [rt]cmd =0x4c4d5356, len=1672
6,158,864 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,573 UART: [kat] HMAC-384Kdf
907,121 UART: [kat] LMS
1,475,317 UART: [kat] --
1,476,384 UART: [cold-reset] ++
1,476,812 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 ready_for_fw is high
1,480,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,463 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,987 UART: [idev] --
1,515,192 UART: [ldev] ++
1,515,360 UART: [ldev] CDI.KEYID = 6
1,515,723 UART: [ldev] SUBJECT.KEYID = 5
1,516,149 UART: [ldev] AUTHORITY.KEYID = 7
1,516,612 UART: [ldev] FE.KEYID = 1
1,521,738 UART: [ldev] Erasing FE.KEYID = 1
1,547,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,141 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,319 UART: [fwproc] Received command 0x46574c44
1,588,110 UART: [fwproc] Received Image of size 114332 bytes
2,886,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,060 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,323 >>> mbox cmd response: success
3,080,569 UART: [afmc] ++
3,080,737 UART: [afmc] CDI.KEYID = 6
3,081,099 UART: [afmc] SUBJECT.KEYID = 7
3,081,524 UART: [afmc] AUTHORITY.KEYID = 5
3,116,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,813 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,206 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,896 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,603 UART: [afmc] --
3,159,667 UART: [cold-reset] --
3,160,653 UART: [state] Locking Datavault
3,161,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,552 UART: [state] Locking ICCM
3,162,984 UART: [exit] Launching FMC @ 0x40000130
3,168,313 UART:
3,168,329 UART: Running Caliptra FMC ...
3,168,737 UART:
3,168,880 UART: [state] CFI Enabled
3,179,393 UART: [fht] FMC Alias Private Key: 7
3,287,416 UART: [art] Extend RT PCRs Done
3,287,844 UART: [art] Lock RT PCRs Done
3,289,586 UART: [art] Populate DV Done
3,297,861 UART: [fht] FMC Alias Private Key: 7
3,299,039 UART: [art] Derive CDI
3,299,319 UART: [art] Store in in slot 0x4
3,385,322 UART: [art] Derive Key Pair
3,385,682 UART: [art] Store priv key in slot 0x5
3,398,690 UART: [art] Derive Key Pair - Done
3,413,628 UART: [art] Signing Cert with AUTHO
3,414,108 UART: RITY.KEYID = 7
3,428,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,711 UART: [art] PUB.X = 45A0B30CC09D6D48724DC9EB78CECFD11D7B97D70095D7BC64BF0841B9F093BEAF1E93624EC8BE4D278BBC1B6E07B290
3,436,470 UART: [art] PUB.Y = 404844942136BF2045A7326FD18BD3A77807E89CEA53ECCCB756FF89D5AB7A3B3FB944E659AA10F4A7D52AED63BC9CDD
3,443,435 UART: [art] SIG.R = 8F56DB6E2FB4A63D06505A9CD2B38E8580C45048C6C88869D34472D775E2E8DA0A16655F7375ED0533C2552D2E980889
3,450,189 UART: [art] SIG.S = 77F7FB196CD6DD44BE2AC20DC1FCD85E3DA0B40D0857F65B2DEF7494C402A1B3F19D2064DD24FEEB1367E1B9C8FB38D3
3,474,010 UART: Caliptra RT
3,474,355 UART: [state] CFI Enabled
3,583,004 UART: [rt] RT listening for mailbox commands...
3,583,674 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,494 UART: [rt]cmd =0x4c4d5356, len=1672
4,145,143 >>> mbox cmd response data (8 bytes)
4,145,144 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,185,229 UART: [rt]cmd =0x4c4d5356, len=1672
4,461,894 >>> mbox cmd response data (8 bytes)
4,461,895 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,502,082 UART: [rt]cmd =0x4c4d5356, len=1672
4,778,523 >>> mbox cmd response data (8 bytes)
4,778,524 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,818,641 UART: [rt]cmd =0x4c4d5356, len=1672
5,090,320 >>> mbox cmd response data (8 bytes)
5,090,321 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,130,528 UART: [rt]cmd =0x4c4d5356, len=1672
5,402,287 >>> mbox cmd response data (8 bytes)
5,402,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,442,393 UART: [rt]cmd =0x4c4d5356, len=1672
5,716,383 >>> mbox cmd response data (8 bytes)
5,716,384 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,807 UART: [rt]cmd =0x4c4d5356, len=1672
6,028,718 >>> mbox cmd response data (8 bytes)
6,028,719 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,068,826 UART: [rt]cmd =0x4c4d5356, len=1672
6,342,938 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,734 ready_for_fw is high
1,362,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,827 >>> mbox cmd response: success
2,989,443 UART:
2,989,459 UART: Running Caliptra FMC ...
2,989,867 UART:
2,990,010 UART: [state] CFI Enabled
3,000,571 UART: [fht] FMC Alias Private Key: 7
3,108,776 UART: [art] Extend RT PCRs Done
3,109,204 UART: [art] Lock RT PCRs Done
3,111,120 UART: [art] Populate DV Done
3,119,495 UART: [fht] FMC Alias Private Key: 7
3,120,481 UART: [art] Derive CDI
3,120,761 UART: [art] Store in in slot 0x4
3,206,296 UART: [art] Derive Key Pair
3,206,656 UART: [art] Store priv key in slot 0x5
3,220,048 UART: [art] Derive Key Pair - Done
3,234,998 UART: [art] Signing Cert with AUTHO
3,235,478 UART: RITY.KEYID = 7
3,251,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,983 UART: [art] PUB.X = 63C179236EF3A35787EBC92C0A0B4CD70DE0DD731AF5038D08CB7FE3D6F11F6FBAE75EEE512AAE095461880D65B562D7
3,258,748 UART: [art] PUB.Y = 37CDC4F73B80AFD1E97669C96BB096FE0F7A63C078C35802D9D557F7BE5058463858A3872E5CDCCD4C98F5338FF184CE
3,265,702 UART: [art] SIG.R = DFF52C78EA01D7012D0AF88BE0B735334C1F9A6EB7AF7650E2E995C7C5B1CDF5A3C7F57A055825DF7768E9B2CEDF2204
3,272,475 UART: [art] SIG.S = 944722D3A0ED28C855090EF55A3930566BD318FF01E43FCF7DDFCAE2D259E6BAFA50BCC10850CB6374A4A6BB2922F73B
3,296,554 UART: Caliptra RT
3,296,899 UART: [state] CFI Enabled
3,405,539 UART: [rt] RT listening for mailbox commands...
3,406,209 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,815 UART: [rt]cmd =0x4c4d5356, len=1672
3,967,472 >>> mbox cmd response data (8 bytes)
3,967,473 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,606 UART: [rt]cmd =0x4c4d5356, len=1672
4,284,147 >>> mbox cmd response data (8 bytes)
4,284,148 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,324,163 UART: [rt]cmd =0x4c4d5356, len=1672
4,600,630 >>> mbox cmd response data (8 bytes)
4,600,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,640,886 UART: [rt]cmd =0x4c4d5356, len=1672
4,912,253 >>> mbox cmd response data (8 bytes)
4,912,254 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,419 UART: [rt]cmd =0x4c4d5356, len=1672
5,223,894 >>> mbox cmd response data (8 bytes)
5,223,895 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,264,092 UART: [rt]cmd =0x4c4d5356, len=1672
5,538,040 >>> mbox cmd response data (8 bytes)
5,538,041 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,578,182 UART: [rt]cmd =0x4c4d5356, len=1672
5,849,777 >>> mbox cmd response data (8 bytes)
5,849,778 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,889,859 UART: [rt]cmd =0x4c4d5356, len=1672
6,164,093 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,260 UART: [kat] SHA2-512-ACC
908,161 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,559 UART: [fht] FHT @ 0x50003400
1,175,078 UART: [idev] ++
1,175,246 UART: [idev] CDI.KEYID = 6
1,175,606 UART: [idev] SUBJECT.KEYID = 7
1,176,030 UART: [idev] UDS.KEYID = 0
1,176,375 ready_for_fw is high
1,176,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,308 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,727 UART: [ldev] --
1,283,166 UART: [fwproc] Wait for Commands...
1,283,986 UART: [fwproc] Recv command 0x46574c44
1,284,714 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,619 >>> mbox cmd response: success
2,775,855 UART: [afmc] ++
2,776,023 UART: [afmc] CDI.KEYID = 6
2,776,385 UART: [afmc] SUBJECT.KEYID = 7
2,776,810 UART: [afmc] AUTHORITY.KEYID = 5
2,812,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,256 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,984 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,869 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,588 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,384 UART: [afmc] --
2,855,426 UART: [cold-reset] --
2,856,088 UART: [state] Locking Datavault
2,857,219 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,823 UART: [state] Locking ICCM
2,858,451 UART: [exit] Launching FMC @ 0x40000130
2,863,780 UART:
2,863,796 UART: Running Caliptra FMC ...
2,864,204 UART:
2,864,258 UART: [state] CFI Enabled
2,874,681 UART: [fht] FMC Alias Private Key: 7
2,982,878 UART: [art] Extend RT PCRs Done
2,983,306 UART: [art] Lock RT PCRs Done
2,984,798 UART: [art] Populate DV Done
2,992,651 UART: [fht] FMC Alias Private Key: 7
2,993,695 UART: [art] Derive CDI
2,993,975 UART: [art] Store in in slot 0x4
3,079,162 UART: [art] Derive Key Pair
3,079,522 UART: [art] Store priv key in slot 0x5
3,092,970 UART: [art] Derive Key Pair - Done
3,107,610 UART: [art] Signing Cert with AUTHO
3,108,090 UART: RITY.KEYID = 7
3,123,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,319 UART: [art] PUB.X = 95C8D10FFA202421A2A404F7B86B30CBA9312C32A247BECDDB79400648763166183726DDD7788C298BC239613B0375C4
3,131,073 UART: [art] PUB.Y = 833074582A5C4008095E9A278BA301EBFDA7175B3C88EDE2C4B6EDF7DC7EC492379E19E0B2C4D029F6359E1FBBABEA39
3,138,030 UART: [art] SIG.R = 20F5784008F2C1029826ECAD2BBD3F473F0E91DC67C8D7C7C87D040C912587AF5A1F3AEEB24486E33A5DE62B082D7322
3,144,790 UART: [art] SIG.S = 83AA972D09103DAF530EEE5E434078EDFDBD5A5D79A2C7B1FCFBC8EBA6B063E9C5ACFB0E36CEADEBB9FCA47919BBD2D5
3,168,662 UART: Caliptra RT
3,168,915 UART: [state] CFI Enabled
3,276,766 UART: [rt] RT listening for mailbox commands...
3,277,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,782 UART: [rt]cmd =0x4c4d5356, len=1672
3,838,065 >>> mbox cmd response data (8 bytes)
3,838,066 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,429 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,830 >>> mbox cmd response data (8 bytes)
4,154,831 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,008 UART: [rt]cmd =0x4c4d5356, len=1672
4,471,369 >>> mbox cmd response data (8 bytes)
4,471,370 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,511,645 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,210 >>> mbox cmd response data (8 bytes)
4,783,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,236 UART: [rt]cmd =0x4c4d5356, len=1672
5,094,867 >>> mbox cmd response data (8 bytes)
5,094,868 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,045 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,117 >>> mbox cmd response data (8 bytes)
5,409,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,205 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,870 >>> mbox cmd response data (8 bytes)
5,720,871 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,910 UART: [rt]cmd =0x4c4d5356, len=1672
6,034,836 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,829 ready_for_fw is high
1,060,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,740 >>> mbox cmd response: success
2,689,114 UART:
2,689,130 UART: Running Caliptra FMC ...
2,689,538 UART:
2,689,592 UART: [state] CFI Enabled
2,700,247 UART: [fht] FMC Alias Private Key: 7
2,808,224 UART: [art] Extend RT PCRs Done
2,808,652 UART: [art] Lock RT PCRs Done
2,809,916 UART: [art] Populate DV Done
2,818,085 UART: [fht] FMC Alias Private Key: 7
2,819,059 UART: [art] Derive CDI
2,819,339 UART: [art] Store in in slot 0x4
2,904,968 UART: [art] Derive Key Pair
2,905,328 UART: [art] Store priv key in slot 0x5
2,918,070 UART: [art] Derive Key Pair - Done
2,932,972 UART: [art] Signing Cert with AUTHO
2,933,452 UART: RITY.KEYID = 7
2,948,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,135 UART: [art] PUB.X = F820CE23DCD5206CC08866E2FED6D15B9354CA28F1BE8852BF4D726E3E0B4DC38B900FADEE081ED8CE8B52094BD3BCF0
2,955,917 UART: [art] PUB.Y = F706188C2161EEC5066C25B747F95CD5185E33B2E1F58A6DE02814A787809C2236F26BC2CAFE9A6F3CD417F0B6307877
2,962,863 UART: [art] SIG.R = 5078EBB5F633419AC4BC84680608963D750E9BE2AA3DA32B7FB3F13D669A2B962C0DD72D2244B97C628C7E58936D2024
2,969,623 UART: [art] SIG.S = DB4C48983615AA2E685C869509F385EC88A77E179BD5C7C6F9E9ADFFF27BF1E94BC641F4D7BF906AABC3956C1E6F1677
2,993,257 UART: Caliptra RT
2,993,510 UART: [state] CFI Enabled
3,100,861 UART: [rt] RT listening for mailbox commands...
3,101,531 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,077 UART: [rt]cmd =0x4c4d5356, len=1672
3,662,638 >>> mbox cmd response data (8 bytes)
3,662,639 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,664 UART: [rt]cmd =0x4c4d5356, len=1672
3,979,141 >>> mbox cmd response data (8 bytes)
3,979,142 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,357 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,780 >>> mbox cmd response data (8 bytes)
4,295,781 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,336,000 UART: [rt]cmd =0x4c4d5356, len=1672
4,607,829 >>> mbox cmd response data (8 bytes)
4,607,830 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,647,927 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,494 >>> mbox cmd response data (8 bytes)
4,919,495 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,959,688 UART: [rt]cmd =0x4c4d5356, len=1672
5,233,880 >>> mbox cmd response data (8 bytes)
5,233,881 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,274,222 UART: [rt]cmd =0x4c4d5356, len=1672
5,545,799 >>> mbox cmd response data (8 bytes)
5,545,800 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,857 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,133 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,933 UART: [kat] HMAC-384Kdf
923,511 UART: [kat] LMS
1,171,839 UART: [kat] --
1,172,904 UART: [cold-reset] ++
1,173,280 UART: [fht] FHT @ 0x50003400
1,175,955 UART: [idev] ++
1,176,123 UART: [idev] CDI.KEYID = 6
1,176,483 UART: [idev] SUBJECT.KEYID = 7
1,176,907 UART: [idev] UDS.KEYID = 0
1,177,252 ready_for_fw is high
1,177,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,215 UART: [idev] Erasing UDS.KEYID = 0
1,202,700 UART: [idev] Sha1 KeyId Algorithm
1,211,232 UART: [idev] --
1,212,196 UART: [ldev] ++
1,212,364 UART: [ldev] CDI.KEYID = 6
1,212,727 UART: [ldev] SUBJECT.KEYID = 5
1,213,153 UART: [ldev] AUTHORITY.KEYID = 7
1,213,616 UART: [ldev] FE.KEYID = 1
1,218,866 UART: [ldev] Erasing FE.KEYID = 1
1,245,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,776 UART: [ldev] --
1,285,095 UART: [fwproc] Wait for Commands...
1,285,761 UART: [fwproc] Recv command 0x46574c44
1,286,489 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,396 >>> mbox cmd response: success
2,777,628 UART: [afmc] ++
2,777,796 UART: [afmc] CDI.KEYID = 6
2,778,158 UART: [afmc] SUBJECT.KEYID = 7
2,778,583 UART: [afmc] AUTHORITY.KEYID = 5
2,814,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,699 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,303 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,129 UART: [afmc] --
2,858,071 UART: [cold-reset] --
2,859,081 UART: [state] Locking Datavault
2,860,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,884 UART: [state] Locking ICCM
2,861,388 UART: [exit] Launching FMC @ 0x40000130
2,866,717 UART:
2,866,733 UART: Running Caliptra FMC ...
2,867,141 UART:
2,867,284 UART: [state] CFI Enabled
2,878,079 UART: [fht] FMC Alias Private Key: 7
2,985,988 UART: [art] Extend RT PCRs Done
2,986,416 UART: [art] Lock RT PCRs Done
2,988,124 UART: [art] Populate DV Done
2,996,435 UART: [fht] FMC Alias Private Key: 7
2,997,451 UART: [art] Derive CDI
2,997,731 UART: [art] Store in in slot 0x4
3,083,592 UART: [art] Derive Key Pair
3,083,952 UART: [art] Store priv key in slot 0x5
3,096,978 UART: [art] Derive Key Pair - Done
3,111,361 UART: [art] Signing Cert with AUTHO
3,111,841 UART: RITY.KEYID = 7
3,126,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,742 UART: [art] PUB.X = FFDD1C057D8F79C36E46571E9FA960337F0E78D29D3CBF3834F5A4B1A042F47DC14D618AD4FAA13CAC528910F74CEC5B
3,134,524 UART: [art] PUB.Y = 46A934376DE230D4FE4EF575C67AC6FF3F3D31F2665067DB0D263B60CE920D803C0BCDA8FEC78F5A9940B2155191391E
3,141,473 UART: [art] SIG.R = 495B39B7DEBBE2EE0898A00B711838DE4EAAA0266D77CA21898BE2DA60996803800A80EBF9AF297B6E017C7F6DD08751
3,148,238 UART: [art] SIG.S = C44C445AA1D9149CCB1BBD6CC5C198BF21884FF7C27831D205D4D9EDB5E03BE573DDDD6554FCCE25C5D3B1F378645A80
3,172,270 UART: Caliptra RT
3,172,615 UART: [state] CFI Enabled
3,279,668 UART: [rt] RT listening for mailbox commands...
3,280,338 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,690 UART: [rt]cmd =0x4c4d5356, len=1672
3,841,175 >>> mbox cmd response data (8 bytes)
3,841,176 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,247 UART: [rt]cmd =0x4c4d5356, len=1672
4,157,660 >>> mbox cmd response data (8 bytes)
4,157,661 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,876 UART: [rt]cmd =0x4c4d5356, len=1672
4,474,541 >>> mbox cmd response data (8 bytes)
4,474,542 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,514,727 UART: [rt]cmd =0x4c4d5356, len=1672
4,786,374 >>> mbox cmd response data (8 bytes)
4,786,375 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,826,530 UART: [rt]cmd =0x4c4d5356, len=1672
5,098,069 >>> mbox cmd response data (8 bytes)
5,098,070 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,138,225 UART: [rt]cmd =0x4c4d5356, len=1672
5,412,407 >>> mbox cmd response data (8 bytes)
5,412,408 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,452,705 UART: [rt]cmd =0x4c4d5356, len=1672
5,724,332 >>> mbox cmd response data (8 bytes)
5,724,333 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,510 UART: [rt]cmd =0x4c4d5356, len=1672
6,038,390 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,250 ready_for_fw is high
1,060,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,789 >>> mbox cmd response: success
2,690,557 UART:
2,690,573 UART: Running Caliptra FMC ...
2,690,981 UART:
2,691,124 UART: [state] CFI Enabled
2,701,393 UART: [fht] FMC Alias Private Key: 7
2,808,964 UART: [art] Extend RT PCRs Done
2,809,392 UART: [art] Lock RT PCRs Done
2,810,960 UART: [art] Populate DV Done
2,819,025 UART: [fht] FMC Alias Private Key: 7
2,820,079 UART: [art] Derive CDI
2,820,359 UART: [art] Store in in slot 0x4
2,905,932 UART: [art] Derive Key Pair
2,906,292 UART: [art] Store priv key in slot 0x5
2,920,520 UART: [art] Derive Key Pair - Done
2,935,705 UART: [art] Signing Cert with AUTHO
2,936,185 UART: RITY.KEYID = 7
2,951,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,000 UART: [art] PUB.X = CEE0FA3658F34DF3BAB86EC9F4A15F35FF27822D91AEC2856CF0700B7415D8E92CEF8DF24958A2B4BA592FB17F8355C5
2,958,785 UART: [art] PUB.Y = B82B6BAA2946AD669DFCE53D496D6913BC4E56A752B4528A986107530B9D90A9A76CAE857D36B6FCA93A237971C8933E
2,965,735 UART: [art] SIG.R = F4B116EB64B6A80DCB4EFA497B2B9632ABFBFFD4C0C7023C3A6348CD1284D84EC3F5C5FF32460EDDA2D5A526DE8B6D0D
2,972,521 UART: [art] SIG.S = 7FC5DE3C62B92DF2952891CB44ADF0916E485DDDD332B51373F7704CDDF69B1D09F752DB2CEDC86A05982488EDB84137
2,996,722 UART: Caliptra RT
2,997,067 UART: [state] CFI Enabled
3,105,638 UART: [rt] RT listening for mailbox commands...
3,106,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,992 UART: [rt]cmd =0x4c4d5356, len=1672
3,667,153 >>> mbox cmd response data (8 bytes)
3,667,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,283 UART: [rt]cmd =0x4c4d5356, len=1672
3,983,794 >>> mbox cmd response data (8 bytes)
3,983,795 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,932 UART: [rt]cmd =0x4c4d5356, len=1672
4,300,145 >>> mbox cmd response data (8 bytes)
4,300,146 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,340,245 UART: [rt]cmd =0x4c4d5356, len=1672
4,611,914 >>> mbox cmd response data (8 bytes)
4,611,915 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,652,142 UART: [rt]cmd =0x4c4d5356, len=1672
4,923,827 >>> mbox cmd response data (8 bytes)
4,923,828 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,964,129 UART: [rt]cmd =0x4c4d5356, len=1672
5,238,209 >>> mbox cmd response data (8 bytes)
5,238,210 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,278,451 UART: [rt]cmd =0x4c4d5356, len=1672
5,550,280 >>> mbox cmd response data (8 bytes)
5,550,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,576 UART: [rt]cmd =0x4c4d5356, len=1672
5,864,514 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,198,991 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,596 UART: [ldev] Erasing FE.KEYID = 1
1,242,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,168 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,449 >>> mbox cmd response: success
2,774,632 UART: [afmc] ++
2,774,800 UART: [afmc] CDI.KEYID = 6
2,775,163 UART: [afmc] SUBJECT.KEYID = 7
2,775,589 UART: [afmc] AUTHORITY.KEYID = 5
2,811,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,705 UART: [afmc] --
2,854,797 UART: [cold-reset] --
2,855,509 UART: [state] Locking Datavault
2,856,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,038 UART: [state] Locking ICCM
2,857,506 UART: [exit] Launching FMC @ 0x40000130
2,862,835 UART:
2,862,851 UART: Running Caliptra FMC ...
2,863,259 UART:
2,863,313 UART: [state] CFI Enabled
2,873,550 UART: [fht] FMC Alias Private Key: 7
2,981,671 UART: [art] Extend RT PCRs Done
2,982,099 UART: [art] Lock RT PCRs Done
2,983,903 UART: [art] Populate DV Done
2,992,100 UART: [fht] FMC Alias Private Key: 7
2,993,206 UART: [art] Derive CDI
2,993,486 UART: [art] Store in in slot 0x4
3,079,209 UART: [art] Derive Key Pair
3,079,569 UART: [art] Store priv key in slot 0x5
3,092,613 UART: [art] Derive Key Pair - Done
3,107,459 UART: [art] Signing Cert with AUTHO
3,107,939 UART: RITY.KEYID = 7
3,123,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,960 UART: [art] PUB.X = AC3E30FF3058F8E3345442EAA1799E89B00210CEBD7FC22E5AA814693EEAE36B46000880B5141595630F77F0151CED38
3,130,701 UART: [art] PUB.Y = 2EBDF239EB86EE53967E9751E4E97F00B0C745956113F67061CC6FD2E86E2DBFFE89341C7EF310024E7CCD597121AD20
3,137,634 UART: [art] SIG.R = F88EBFFC1833848DF69020953AAE9E27A1176F6BF5CB5828A5BB6986AEC2C552AE7ABE9C960DCA52E301BC8313944C65
3,144,412 UART: [art] SIG.S = 4901FAA3C590C08262B814D14B136A90D2BCCA445D47973B293BB6DD4B72825183CA3543295A635E5EF34D49B71A8AD0
3,167,872 UART: Caliptra RT
3,168,125 UART: [state] CFI Enabled
3,275,492 UART: [rt] RT listening for mailbox commands...
3,276,162 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,812 UART: [rt]cmd =0x4c4d5356, len=1672
3,837,305 >>> mbox cmd response data (8 bytes)
3,837,306 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,493 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,298 >>> mbox cmd response data (8 bytes)
4,154,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,360 UART: [rt]cmd =0x4c4d5356, len=1672
4,470,773 >>> mbox cmd response data (8 bytes)
4,470,774 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,510,965 UART: [rt]cmd =0x4c4d5356, len=1672
4,782,512 >>> mbox cmd response data (8 bytes)
4,782,513 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,822,672 UART: [rt]cmd =0x4c4d5356, len=1672
5,094,023 >>> mbox cmd response data (8 bytes)
5,094,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,134,027 UART: [rt]cmd =0x4c4d5356, len=1672
5,408,005 >>> mbox cmd response data (8 bytes)
5,408,006 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,448,295 UART: [rt]cmd =0x4c4d5356, len=1672
5,719,816 >>> mbox cmd response data (8 bytes)
5,719,817 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,128 UART: [rt]cmd =0x4c4d5356, len=1672
6,034,052 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,502 ready_for_fw is high
1,055,502 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,895 >>> mbox cmd response: success
2,683,523 UART:
2,683,539 UART: Running Caliptra FMC ...
2,683,947 UART:
2,684,001 UART: [state] CFI Enabled
2,694,656 UART: [fht] FMC Alias Private Key: 7
2,802,891 UART: [art] Extend RT PCRs Done
2,803,319 UART: [art] Lock RT PCRs Done
2,805,177 UART: [art] Populate DV Done
2,813,408 UART: [fht] FMC Alias Private Key: 7
2,814,366 UART: [art] Derive CDI
2,814,646 UART: [art] Store in in slot 0x4
2,900,503 UART: [art] Derive Key Pair
2,900,863 UART: [art] Store priv key in slot 0x5
2,914,199 UART: [art] Derive Key Pair - Done
2,928,981 UART: [art] Signing Cert with AUTHO
2,929,461 UART: RITY.KEYID = 7
2,944,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,060 UART: [art] PUB.X = 331810F1F6950976D4A25D3089D35965E4CA45EBC45751F155575577D3A5B39566E0026CD8FAE5C13EEF172E50593642
2,951,816 UART: [art] PUB.Y = 67F33ED56FBEE7F0D7C8B8303E415AAAE397A46623F7A9A646A81E5997B2E19E3D08BB7FEBD2FCAC9B5882ACAF651CB1
2,958,787 UART: [art] SIG.R = 873DE93A12F1A3F73F29AE7B494A35207E99E025348A52F760DC2E51A80466F8B14E46BE17B9C982D10E99165284ACBA
2,965,553 UART: [art] SIG.S = 45AC425A3CA30986C31B9138F4D856EDAAAC4BCBCEE22F0516B8B091311FADC580C9BBC75E7695CFC5785A3DA6066542
2,989,557 UART: Caliptra RT
2,989,810 UART: [state] CFI Enabled
3,097,001 UART: [rt] RT listening for mailbox commands...
3,097,671 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,401 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,736 >>> mbox cmd response data (8 bytes)
3,658,737 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,860 UART: [rt]cmd =0x4c4d5356, len=1672
3,975,361 >>> mbox cmd response data (8 bytes)
3,975,362 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,541 UART: [rt]cmd =0x4c4d5356, len=1672
4,292,078 >>> mbox cmd response data (8 bytes)
4,292,079 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,332,180 UART: [rt]cmd =0x4c4d5356, len=1672
4,603,681 >>> mbox cmd response data (8 bytes)
4,603,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,643,989 UART: [rt]cmd =0x4c4d5356, len=1672
4,915,644 >>> mbox cmd response data (8 bytes)
4,915,645 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,962 UART: [rt]cmd =0x4c4d5356, len=1672
5,230,220 >>> mbox cmd response data (8 bytes)
5,230,221 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,270,322 UART: [rt]cmd =0x4c4d5356, len=1672
5,541,845 >>> mbox cmd response data (8 bytes)
5,541,846 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,077 UART: [rt]cmd =0x4c4d5356, len=1672
5,856,467 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 ready_for_fw is high
1,174,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,657 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,346 >>> mbox cmd response: success
2,775,583 UART: [afmc] ++
2,775,751 UART: [afmc] CDI.KEYID = 6
2,776,114 UART: [afmc] SUBJECT.KEYID = 7
2,776,540 UART: [afmc] AUTHORITY.KEYID = 5
2,812,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,242 UART: [afmc] --
2,856,266 UART: [cold-reset] --
2,857,054 UART: [state] Locking Datavault
2,858,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,733 UART: [state] Locking ICCM
2,859,261 UART: [exit] Launching FMC @ 0x40000130
2,864,590 UART:
2,864,606 UART: Running Caliptra FMC ...
2,865,014 UART:
2,865,157 UART: [state] CFI Enabled
2,876,026 UART: [fht] FMC Alias Private Key: 7
2,983,593 UART: [art] Extend RT PCRs Done
2,984,021 UART: [art] Lock RT PCRs Done
2,985,439 UART: [art] Populate DV Done
2,993,714 UART: [fht] FMC Alias Private Key: 7
2,994,654 UART: [art] Derive CDI
2,994,934 UART: [art] Store in in slot 0x4
3,080,643 UART: [art] Derive Key Pair
3,081,003 UART: [art] Store priv key in slot 0x5
3,094,575 UART: [art] Derive Key Pair - Done
3,109,556 UART: [art] Signing Cert with AUTHO
3,110,036 UART: RITY.KEYID = 7
3,125,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,267 UART: [art] PUB.X = 76CA4DDC7D74F3AD62BF7414A2D93D77710DF40A6C31D46C64384B4C9BA4961D5405B440CB791B46449523BC2F3D4B06
3,133,031 UART: [art] PUB.Y = 4B44FB357C88B52002FC33F9B5F031F4D02E15D23B97B3577284C264B9DAA589F230FE12151B3F849FAC4F05A4E40DC1
3,139,978 UART: [art] SIG.R = BDB3D7E7CC6DCA2BEDA2B4B7EA8E5BBA4A986290A3EB471DC3238474EC47FBD81D1C3A27AA51709FCBA793B00C25C6EA
3,146,777 UART: [art] SIG.S = 523242CC22D3378D8084163B3FE827DE242BA5D5F2904956DCBDA817446067F402D9B83AE14F7985CDA5E00D49D47C41
3,170,466 UART: Caliptra RT
3,170,811 UART: [state] CFI Enabled
3,278,358 UART: [rt] RT listening for mailbox commands...
3,279,028 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,956 UART: [rt]cmd =0x4c4d5356, len=1672
3,840,091 >>> mbox cmd response data (8 bytes)
3,840,092 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,137 UART: [rt]cmd =0x4c4d5356, len=1672
4,156,696 >>> mbox cmd response data (8 bytes)
4,156,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,972 UART: [rt]cmd =0x4c4d5356, len=1672
4,473,565 >>> mbox cmd response data (8 bytes)
4,473,566 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,513,603 UART: [rt]cmd =0x4c4d5356, len=1672
4,785,040 >>> mbox cmd response data (8 bytes)
4,785,041 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,824,952 UART: [rt]cmd =0x4c4d5356, len=1672
5,096,599 >>> mbox cmd response data (8 bytes)
5,096,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,136,843 UART: [rt]cmd =0x4c4d5356, len=1672
5,410,823 >>> mbox cmd response data (8 bytes)
5,410,824 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,450,813 UART: [rt]cmd =0x4c4d5356, len=1672
5,722,536 >>> mbox cmd response data (8 bytes)
5,722,537 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,826 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,936 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,921 ready_for_fw is high
1,056,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,052 >>> mbox cmd response: success
2,685,684 UART:
2,685,700 UART: Running Caliptra FMC ...
2,686,108 UART:
2,686,251 UART: [state] CFI Enabled
2,696,934 UART: [fht] FMC Alias Private Key: 7
2,804,719 UART: [art] Extend RT PCRs Done
2,805,147 UART: [art] Lock RT PCRs Done
2,806,483 UART: [art] Populate DV Done
2,814,814 UART: [fht] FMC Alias Private Key: 7
2,815,812 UART: [art] Derive CDI
2,816,092 UART: [art] Store in in slot 0x4
2,901,625 UART: [art] Derive Key Pair
2,901,985 UART: [art] Store priv key in slot 0x5
2,914,713 UART: [art] Derive Key Pair - Done
2,929,414 UART: [art] Signing Cert with AUTHO
2,929,894 UART: RITY.KEYID = 7
2,944,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,721 UART: [art] PUB.X = F3E8C5DE969954C938CE90129743869AEEED863D46EA4806C6894F9969CCC85ECFCA11418DE59A6C3C887503AD171C0E
2,952,490 UART: [art] PUB.Y = 382FF7AF944CD266B7CD9D240394E1A87FE0420E2F3F665E1A5CBCEE3EA61546EF4B40DA8D7904644547FE208889EDA6
2,959,443 UART: [art] SIG.R = 0CC8459202720958237DDC1A31114B860E1DA06A00F47DD88CFBC943CC0067F07E38BE098F1532675FA27348A144B6C1
2,966,152 UART: [art] SIG.S = 111DBD93FE076811A19298AA644546ABB7576EAF9E894A1B960B7B789648702D7C32FFA386248049C1FF375B973766DD
2,990,157 UART: Caliptra RT
2,990,502 UART: [state] CFI Enabled
3,098,913 UART: [rt] RT listening for mailbox commands...
3,099,583 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,009 UART: [rt]cmd =0x4c4d5356, len=1672
3,660,330 >>> mbox cmd response data (8 bytes)
3,660,331 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,636 UART: [rt]cmd =0x4c4d5356, len=1672
3,977,157 >>> mbox cmd response data (8 bytes)
3,977,158 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,497 UART: [rt]cmd =0x4c4d5356, len=1672
4,294,314 >>> mbox cmd response data (8 bytes)
4,294,315 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,442 UART: [rt]cmd =0x4c4d5356, len=1672
4,605,857 >>> mbox cmd response data (8 bytes)
4,605,858 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,193 UART: [rt]cmd =0x4c4d5356, len=1672
4,917,782 >>> mbox cmd response data (8 bytes)
4,917,783 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,094 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,198 >>> mbox cmd response data (8 bytes)
5,232,199 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,272,432 UART: [rt]cmd =0x4c4d5356, len=1672
5,544,155 >>> mbox cmd response data (8 bytes)
5,544,156 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,365 UART: [rt]cmd =0x4c4d5356, len=1672
5,858,331 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,606 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,599 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,638 UART: [idev] ++
1,479,806 UART: [idev] CDI.KEYID = 6
1,480,166 UART: [idev] SUBJECT.KEYID = 7
1,480,590 UART: [idev] UDS.KEYID = 0
1,480,935 ready_for_fw is high
1,480,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,554 UART: [idev] Erasing UDS.KEYID = 0
1,504,942 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,559 UART: [ldev] ++
1,514,727 UART: [ldev] CDI.KEYID = 6
1,515,090 UART: [ldev] SUBJECT.KEYID = 5
1,515,516 UART: [ldev] AUTHORITY.KEYID = 7
1,515,979 UART: [ldev] FE.KEYID = 1
1,520,997 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,002 UART: [ldev] --
1,585,515 UART: [fwproc] Waiting for Commands...
1,586,222 UART: [fwproc] Received command 0x46574c44
1,587,013 UART: [fwproc] Received Image of size 114332 bytes
2,885,753 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,244 >>> mbox cmd response: success
3,079,324 UART: [afmc] ++
3,079,492 UART: [afmc] CDI.KEYID = 6
3,079,854 UART: [afmc] SUBJECT.KEYID = 7
3,080,279 UART: [afmc] AUTHORITY.KEYID = 5
3,115,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,779 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,469 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,272 UART: [afmc] --
3,158,396 UART: [cold-reset] --
3,159,346 UART: [state] Locking Datavault
3,160,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,021 UART: [state] Locking ICCM
3,161,517 UART: [exit] Launching FMC @ 0x40000130
3,166,846 UART:
3,166,862 UART: Running Caliptra FMC ...
3,167,270 UART:
3,167,324 UART: [state] CFI Enabled
3,177,929 UART: [fht] FMC Alias Private Key: 7
3,285,662 UART: [art] Extend RT PCRs Done
3,286,090 UART: [art] Lock RT PCRs Done
3,287,450 UART: [art] Populate DV Done
3,295,841 UART: [fht] FMC Alias Private Key: 7
3,296,951 UART: [art] Derive CDI
3,297,231 UART: [art] Store in in slot 0x4
3,382,788 UART: [art] Derive Key Pair
3,383,148 UART: [art] Store priv key in slot 0x5
3,396,040 UART: [art] Derive Key Pair - Done
3,410,870 UART: [art] Signing Cert with AUTHO
3,411,350 UART: RITY.KEYID = 7
3,426,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,415 UART: [art] PUB.X = 91737998539A0E14F9F3B606E157CF0954740B44080337F3018E8F43078A7E316D1D2D6BFF6555C6D2BAD9D4AC63347E
3,434,157 UART: [art] PUB.Y = 70046BAA43C367832CECEA21B483DA140814B5A7CD559B5DC27765A834B1447A5C273A539795B507E419C05BA25ACC48
3,441,100 UART: [art] SIG.R = C062DE2BC56DA9B479C007DB9DDC722E61CC6B99E159AB53F5C234AFF698DE6870EAC69A6FC518FFB3C36B00B32B6C5A
3,447,869 UART: [art] SIG.S = DA22DF4D3218EA5CB2D2C5D5E1CF9869BC5B71721C59B333FC1E804F4F9B05CC99C1A8CA962746ACF7D5B986ACAD4C3F
3,471,143 UART: Caliptra RT
3,471,396 UART: [state] CFI Enabled
3,580,042 UART: [rt] RT listening for mailbox commands...
3,580,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,382 UART: [rt]cmd =0x4c4d5356, len=1672
4,151,346 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,859 ready_for_fw is high
1,361,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,148 >>> mbox cmd response: success
2,988,168 UART:
2,988,184 UART: Running Caliptra FMC ...
2,988,592 UART:
2,988,646 UART: [state] CFI Enabled
2,998,909 UART: [fht] FMC Alias Private Key: 7
3,106,642 UART: [art] Extend RT PCRs Done
3,107,070 UART: [art] Lock RT PCRs Done
3,108,816 UART: [art] Populate DV Done
3,117,151 UART: [fht] FMC Alias Private Key: 7
3,118,181 UART: [art] Derive CDI
3,118,461 UART: [art] Store in in slot 0x4
3,204,166 UART: [art] Derive Key Pair
3,204,526 UART: [art] Store priv key in slot 0x5
3,217,650 UART: [art] Derive Key Pair - Done
3,232,368 UART: [art] Signing Cert with AUTHO
3,232,848 UART: RITY.KEYID = 7
3,247,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,317 UART: [art] PUB.X = A4D59014AA93BC9547D9701595C1F76FE51F5F47E4B69DA2EAD5308FB6CA5AD70B946BDA4C9E6CA4E736848C4B34EA9F
3,255,102 UART: [art] PUB.Y = 38BB6D86B37D1B57A9F207C185A44FC6F4B9CBE8CFB063E153FE0958CFF586AAB1BF52B484F04C07CA42E7D482D0FCE8
3,262,065 UART: [art] SIG.R = 66650ADFA3CDB9E74A284271B7272F2660B6E3E76F39EAE1DA6E92B3673BB4A4A8015E69C60774CADEBDFE3B252350DE
3,268,842 UART: [art] SIG.S = 61A3E82179401749EADEC030561A45D0B50088889EF35BFB60843F34B8F059E8A0748DF027A2DED9E04B42D69BCC6D6F
3,292,199 UART: Caliptra RT
3,292,452 UART: [state] CFI Enabled
3,400,522 UART: [rt] RT listening for mailbox commands...
3,401,192 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,942 UART: [rt]cmd =0x4c4d5356, len=1672
3,971,812 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,479,941 UART: [idev] ++
1,480,109 UART: [idev] CDI.KEYID = 6
1,480,469 UART: [idev] SUBJECT.KEYID = 7
1,480,893 UART: [idev] UDS.KEYID = 0
1,481,238 ready_for_fw is high
1,481,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,791 UART: [idev] Erasing UDS.KEYID = 0
1,505,161 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,665 UART: [idev] --
1,514,710 UART: [ldev] ++
1,514,878 UART: [ldev] CDI.KEYID = 6
1,515,241 UART: [ldev] SUBJECT.KEYID = 5
1,515,667 UART: [ldev] AUTHORITY.KEYID = 7
1,516,130 UART: [ldev] FE.KEYID = 1
1,521,694 UART: [ldev] Erasing FE.KEYID = 1
1,547,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,899 UART: [ldev] --
1,586,292 UART: [fwproc] Waiting for Commands...
1,587,085 UART: [fwproc] Received command 0x46574c44
1,587,876 UART: [fwproc] Received Image of size 114332 bytes
2,885,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,675 >>> mbox cmd response: success
3,078,785 UART: [afmc] ++
3,078,953 UART: [afmc] CDI.KEYID = 6
3,079,315 UART: [afmc] SUBJECT.KEYID = 7
3,079,740 UART: [afmc] AUTHORITY.KEYID = 5
3,114,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,154 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,844 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,795 UART: [afmc] --
3,157,785 UART: [cold-reset] --
3,158,597 UART: [state] Locking Datavault
3,159,768 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,372 UART: [state] Locking ICCM
3,160,914 UART: [exit] Launching FMC @ 0x40000130
3,166,243 UART:
3,166,259 UART: Running Caliptra FMC ...
3,166,667 UART:
3,166,810 UART: [state] CFI Enabled
3,177,411 UART: [fht] FMC Alias Private Key: 7
3,285,584 UART: [art] Extend RT PCRs Done
3,286,012 UART: [art] Lock RT PCRs Done
3,287,438 UART: [art] Populate DV Done
3,295,839 UART: [fht] FMC Alias Private Key: 7
3,296,889 UART: [art] Derive CDI
3,297,169 UART: [art] Store in in slot 0x4
3,383,406 UART: [art] Derive Key Pair
3,383,766 UART: [art] Store priv key in slot 0x5
3,396,776 UART: [art] Derive Key Pair - Done
3,411,397 UART: [art] Signing Cert with AUTHO
3,411,877 UART: RITY.KEYID = 7
3,427,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,158 UART: [art] PUB.X = 07C913E93476695F3B63FEBB43B97424DD278B289B8104130EE90E33659520F15B1218890ED268B3038BEBD2C019FC4B
3,434,906 UART: [art] PUB.Y = AB67F7B1BB008D904FC4935B2DA89CD3531EAB2DCCAE54BEADD391FCAA52309972DB2D348DCBC0B978E9E359CAED85BB
3,441,866 UART: [art] SIG.R = 3907026E6B50CC3E75F711AD4364A78053ABC589BE81615D8C44E18DC44E0AB148810097F6C3B789C1D8CE76977F82DC
3,448,607 UART: [art] SIG.S = 9482D1A90D430234684935B752A0BD00E769E5AB7718AB0C0B49408D22D2F0B4573D2EFADA7458B321C3B9FE61D1A088
3,472,490 UART: Caliptra RT
3,472,835 UART: [state] CFI Enabled
3,580,576 UART: [rt] RT listening for mailbox commands...
3,581,246 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,866 UART: [rt]cmd =0x4c4d5356, len=1672
4,151,494 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,815 >>> mbox cmd response: success
2,990,225 UART:
2,990,241 UART: Running Caliptra FMC ...
2,990,649 UART:
2,990,792 UART: [state] CFI Enabled
3,001,331 UART: [fht] FMC Alias Private Key: 7
3,109,086 UART: [art] Extend RT PCRs Done
3,109,514 UART: [art] Lock RT PCRs Done
3,110,878 UART: [art] Populate DV Done
3,118,921 UART: [fht] FMC Alias Private Key: 7
3,120,081 UART: [art] Derive CDI
3,120,361 UART: [art] Store in in slot 0x4
3,205,752 UART: [art] Derive Key Pair
3,206,112 UART: [art] Store priv key in slot 0x5
3,219,008 UART: [art] Derive Key Pair - Done
3,233,598 UART: [art] Signing Cert with AUTHO
3,234,078 UART: RITY.KEYID = 7
3,248,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,737 UART: [art] PUB.X = 95A1B492000F91BDFF3BD1AA0D859A68226CD2E23A080297431A81D9C1799C565442A7E8CFF7FC433C5912A18F267873
3,256,473 UART: [art] PUB.Y = 1CC08C23158DFDFC59512F55193C3902AFE495C4B47467C625AE2B0A0E9A0A78A06C43929C904D84CF1E9940EA778AEF
3,263,419 UART: [art] SIG.R = 7820FCBA48CC667B805F5C4A151B8124F26BAC06DB7971E26D3FDDCABC730D9DEFDDE639823B9C0946A6F30F66F48B53
3,270,195 UART: [art] SIG.S = 20CC87F202FD62AB91A6C2CB2B133BC7E06E6BFACB88A7E8F2ED4FFD476BA572899D72DF97EB939F6D413D91D513F2EA
3,293,915 UART: Caliptra RT
3,294,260 UART: [state] CFI Enabled
3,402,870 UART: [rt] RT listening for mailbox commands...
3,403,540 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,050 UART: [rt]cmd =0x4c4d5356, len=1672
3,973,936 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
893,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,797 UART: [kat] ++
897,949 UART: [kat] sha1
902,181 UART: [kat] SHA2-256
904,121 UART: [kat] SHA2-384
906,924 UART: [kat] SHA2-512-ACC
908,825 UART: [kat] ECC-384
918,402 UART: [kat] HMAC-384Kdf
923,216 UART: [kat] LMS
1,171,544 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,634 UART: [idev] ++
1,175,802 UART: [idev] CDI.KEYID = 6
1,176,162 UART: [idev] SUBJECT.KEYID = 7
1,176,586 UART: [idev] UDS.KEYID = 0
1,176,931 ready_for_fw is high
1,176,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,640 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,641 UART: [idev] --
1,210,875 UART: [ldev] ++
1,211,043 UART: [ldev] CDI.KEYID = 6
1,211,406 UART: [ldev] SUBJECT.KEYID = 5
1,211,832 UART: [ldev] AUTHORITY.KEYID = 7
1,212,295 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,340 UART: [fwproc] Wait for Commands...
1,283,060 UART: [fwproc] Recv command 0x46574c44
1,283,788 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,869 >>> mbox cmd response: success
2,774,943 UART: [afmc] ++
2,775,111 UART: [afmc] CDI.KEYID = 6
2,775,473 UART: [afmc] SUBJECT.KEYID = 7
2,775,898 UART: [afmc] AUTHORITY.KEYID = 5
2,812,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,030 UART: [afmc] --
2,854,964 UART: [cold-reset] --
2,855,902 UART: [state] Locking Datavault
2,857,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,717 UART: [state] Locking ICCM
2,858,305 UART: [exit] Launching FMC @ 0x40000130
2,863,634 UART:
2,863,650 UART: Running Caliptra FMC ...
2,864,058 UART:
2,864,112 UART: [state] CFI Enabled
2,874,793 UART: [fht] FMC Alias Private Key: 7
2,983,066 UART: [art] Extend RT PCRs Done
2,983,494 UART: [art] Lock RT PCRs Done
2,985,160 UART: [art] Populate DV Done
2,993,387 UART: [fht] FMC Alias Private Key: 7
2,994,331 UART: [art] Derive CDI
2,994,611 UART: [art] Store in in slot 0x4
3,080,452 UART: [art] Derive Key Pair
3,080,812 UART: [art] Store priv key in slot 0x5
3,093,648 UART: [art] Derive Key Pair - Done
3,108,320 UART: [art] Signing Cert with AUTHO
3,108,800 UART: RITY.KEYID = 7
3,124,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,847 UART: [art] PUB.X = 618082A93DCA5E74061B6B1EA5F69AD38BACDAFB0647D3DF8630D277EEA7D1B7BB20E1D487F6B59A059765447444E936
3,131,618 UART: [art] PUB.Y = 8FD27BD2317F916B1D4ADD5789EF5C135BF96B6441A49CC2411CEBECCF4723273CEBFCA9EEADA3D8A20489825393D0BB
3,138,587 UART: [art] SIG.R = 6408BA575A91BA46FFD22591DD322022EA9B3A0AC724510FB15A5F0BE5074E002E18972A6FD10C2C86205451985141AB
3,145,317 UART: [art] SIG.S = 492161C4D2E11C22F3F599FA69A34E30B8EEB2520F5A3ABF86D3AC5A75F6CBEC61A057A0DD3DB042C9E98AF88C195448
3,169,449 UART: Caliptra RT
3,169,702 UART: [state] CFI Enabled
3,277,187 UART: [rt] RT listening for mailbox commands...
3,277,857 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,547 UART: [rt]cmd =0x4c4d5356, len=1672
3,848,345 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 ready_for_fw is high
1,060,637 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,410 >>> mbox cmd response: success
2,690,290 UART:
2,690,306 UART: Running Caliptra FMC ...
2,690,714 UART:
2,690,768 UART: [state] CFI Enabled
2,701,469 UART: [fht] FMC Alias Private Key: 7
2,809,928 UART: [art] Extend RT PCRs Done
2,810,356 UART: [art] Lock RT PCRs Done
2,812,090 UART: [art] Populate DV Done
2,820,115 UART: [fht] FMC Alias Private Key: 7
2,821,281 UART: [art] Derive CDI
2,821,561 UART: [art] Store in in slot 0x4
2,907,528 UART: [art] Derive Key Pair
2,907,888 UART: [art] Store priv key in slot 0x5
2,920,946 UART: [art] Derive Key Pair - Done
2,936,032 UART: [art] Signing Cert with AUTHO
2,936,512 UART: RITY.KEYID = 7
2,951,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,215 UART: [art] PUB.X = 832F903D6494B837EC8D8DF902B72A9CE29D0DCE67008BFB747C1591C550FCEE363EDAEF20182913CD48DE6903E0F8A8
2,958,966 UART: [art] PUB.Y = E88782A341ED91062C3B50B0B8596835B3423B784C313785372F7CDAA299FCE78D120C6C3767FF51E2DD52EBDEA0B19B
2,965,916 UART: [art] SIG.R = 91A3BE930A49C47B593DB9799AC9F1ED7A8E845CC38FA92E97048E15CEAEE704EA5CC43927D3B0738C15E157A7857B20
2,972,687 UART: [art] SIG.S = 3B2F21B61C0FCD7AB1AE7A94C4EAB9C20FF759F520670332EE62007CEA8B04EC6501F012F4A4F05852E3D545DB1AADE2
2,996,395 UART: Caliptra RT
2,996,648 UART: [state] CFI Enabled
3,104,507 UART: [rt] RT listening for mailbox commands...
3,105,177 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,629 UART: [rt]cmd =0x4c4d5356, len=1672
3,675,329 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,756 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 ready_for_fw is high
1,176,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,506 UART: [idev] Sha1 KeyId Algorithm
1,209,994 UART: [idev] --
1,211,006 UART: [ldev] ++
1,211,174 UART: [ldev] CDI.KEYID = 6
1,211,537 UART: [ldev] SUBJECT.KEYID = 5
1,211,963 UART: [ldev] AUTHORITY.KEYID = 7
1,212,426 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,244,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,398 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,579 UART: [fwproc] Recv command 0x46574c44
1,285,307 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,918 >>> mbox cmd response: success
2,777,058 UART: [afmc] ++
2,777,226 UART: [afmc] CDI.KEYID = 6
2,777,588 UART: [afmc] SUBJECT.KEYID = 7
2,778,013 UART: [afmc] AUTHORITY.KEYID = 5
2,813,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,429 UART: [afmc] --
2,856,367 UART: [cold-reset] --
2,857,105 UART: [state] Locking Datavault
2,858,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,874 UART: [state] Locking ICCM
2,859,306 UART: [exit] Launching FMC @ 0x40000130
2,864,635 UART:
2,864,651 UART: Running Caliptra FMC ...
2,865,059 UART:
2,865,202 UART: [state] CFI Enabled
2,875,371 UART: [fht] FMC Alias Private Key: 7
2,983,340 UART: [art] Extend RT PCRs Done
2,983,768 UART: [art] Lock RT PCRs Done
2,985,090 UART: [art] Populate DV Done
2,993,123 UART: [fht] FMC Alias Private Key: 7
2,994,219 UART: [art] Derive CDI
2,994,499 UART: [art] Store in in slot 0x4
3,080,222 UART: [art] Derive Key Pair
3,080,582 UART: [art] Store priv key in slot 0x5
3,093,930 UART: [art] Derive Key Pair - Done
3,108,655 UART: [art] Signing Cert with AUTHO
3,109,135 UART: RITY.KEYID = 7
3,124,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,098 UART: [art] PUB.X = 249AC56FE4C00DD7821E9A461F41CC482DFC81ACB2FD74116AA7E86CC59B5B2F3D35CFE30C2628DE5A6CAA63D8E99703
3,131,879 UART: [art] PUB.Y = E02CAA5648D69920A90697A345ED3B3FB2C911E6B374926A47EC4F0EEDE4065B9E10162D110764F957743B3F47CA593B
3,138,819 UART: [art] SIG.R = 0AD613C97F24FFEB782CEF288A9298C4C85C1AB6FE97A3C561A01CEBF6CD0B5622EB92ABF8ACD973B2A2F62FC0A578EF
3,145,611 UART: [art] SIG.S = 1176173C59360A1A989C0D2F471A975D0E63AE2C72042FD8976E166DDB49E88D2617AD05B1702FFFB12F699AD6D23059
3,169,327 UART: Caliptra RT
3,169,672 UART: [state] CFI Enabled
3,277,739 UART: [rt] RT listening for mailbox commands...
3,278,409 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,239 UART: [rt]cmd =0x4c4d5356, len=1672
3,848,927 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 ready_for_fw is high
1,060,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,719 >>> mbox cmd response: success
2,688,731 UART:
2,688,747 UART: Running Caliptra FMC ...
2,689,155 UART:
2,689,298 UART: [state] CFI Enabled
2,699,739 UART: [fht] FMC Alias Private Key: 7
2,807,196 UART: [art] Extend RT PCRs Done
2,807,624 UART: [art] Lock RT PCRs Done
2,809,140 UART: [art] Populate DV Done
2,817,045 UART: [fht] FMC Alias Private Key: 7
2,818,053 UART: [art] Derive CDI
2,818,333 UART: [art] Store in in slot 0x4
2,904,058 UART: [art] Derive Key Pair
2,904,418 UART: [art] Store priv key in slot 0x5
2,917,184 UART: [art] Derive Key Pair - Done
2,932,101 UART: [art] Signing Cert with AUTHO
2,932,581 UART: RITY.KEYID = 7
2,948,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,974 UART: [art] PUB.X = 22B368E26A165756FC66841921B4F5363C87DA17871ECD7D963F96D47C3DA8B9467CCE028527EAFC110FD112B621F550
2,955,738 UART: [art] PUB.Y = ABB4FD246BC8A8514E98081CF768AA253C1DED037523B98E963647881C7901E41964ABA280129446A25970A9B08D457A
2,962,675 UART: [art] SIG.R = 1A6EFC7A0ABDB2F6159619335AB8DBD0A6475B91E20878C2598D41EE02E277F099D85A5CBBC8365D395F9458537832AA
2,969,442 UART: [art] SIG.S = AF5FC6DC86093595C31DECFDBD8C34B1EE87028EE84813C3F6C46D19A1F2EA4E9036D5EFE3A1307CF6ED094785ED1EFF
2,993,490 UART: Caliptra RT
2,993,835 UART: [state] CFI Enabled
3,101,220 UART: [rt] RT listening for mailbox commands...
3,101,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,598 UART: [rt]cmd =0x4c4d5356, len=1672
3,672,374 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,873 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,194 UART: [fwproc] Wait for Commands...
1,280,777 UART: [fwproc] Recv command 0x46574c44
1,281,510 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,913 >>> mbox cmd response: success
2,773,178 UART: [afmc] ++
2,773,346 UART: [afmc] CDI.KEYID = 6
2,773,709 UART: [afmc] SUBJECT.KEYID = 7
2,774,135 UART: [afmc] AUTHORITY.KEYID = 5
2,809,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,192 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,695 UART: [afmc] --
2,852,607 UART: [cold-reset] --
2,853,637 UART: [state] Locking Datavault
2,854,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,458 UART: [state] Locking ICCM
2,856,132 UART: [exit] Launching FMC @ 0x40000130
2,861,461 UART:
2,861,477 UART: Running Caliptra FMC ...
2,861,885 UART:
2,861,939 UART: [state] CFI Enabled
2,872,664 UART: [fht] FMC Alias Private Key: 7
2,980,193 UART: [art] Extend RT PCRs Done
2,980,621 UART: [art] Lock RT PCRs Done
2,982,381 UART: [art] Populate DV Done
2,990,454 UART: [fht] FMC Alias Private Key: 7
2,991,594 UART: [art] Derive CDI
2,991,874 UART: [art] Store in in slot 0x4
3,077,393 UART: [art] Derive Key Pair
3,077,753 UART: [art] Store priv key in slot 0x5
3,090,959 UART: [art] Derive Key Pair - Done
3,106,151 UART: [art] Signing Cert with AUTHO
3,106,631 UART: RITY.KEYID = 7
3,121,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,734 UART: [art] PUB.X = F316B0A219DCA2136406E230ABCB90797BE519E6817D7DE5882C2882468C852CDA90C4ED82225BEB1B16B149567F5323
3,129,501 UART: [art] PUB.Y = 7EE457316C4E793D2BB709E28C80A5858951379C197EA1B09BE9CADB967AAF4B2B488AD3EE370E9C7390EFA3B3D7A97C
3,136,459 UART: [art] SIG.R = 54D412B3A50D6A4E8D07B2FEFE033239571F84E2D4BCDFB6CB75E82B3803E4655B394793B37149C5D8CE76CD7F32D84F
3,143,227 UART: [art] SIG.S = 5AD192552BEA47EC1128BF2471C461CDA3FAFDE268BAE47E661BD4F6836AF2AB0E5D16BD0DB37A46F76EC679EE8415D6
3,167,598 UART: Caliptra RT
3,167,851 UART: [state] CFI Enabled
3,275,332 UART: [rt] RT listening for mailbox commands...
3,276,002 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,576 UART: [rt]cmd =0x4c4d5356, len=1672
3,846,444 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,118 ready_for_fw is high
1,056,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,903 >>> mbox cmd response: success
2,686,167 UART:
2,686,183 UART: Running Caliptra FMC ...
2,686,591 UART:
2,686,645 UART: [state] CFI Enabled
2,696,964 UART: [fht] FMC Alias Private Key: 7
2,805,109 UART: [art] Extend RT PCRs Done
2,805,537 UART: [art] Lock RT PCRs Done
2,807,277 UART: [art] Populate DV Done
2,815,656 UART: [fht] FMC Alias Private Key: 7
2,816,632 UART: [art] Derive CDI
2,816,912 UART: [art] Store in in slot 0x4
2,902,449 UART: [art] Derive Key Pair
2,902,809 UART: [art] Store priv key in slot 0x5
2,915,823 UART: [art] Derive Key Pair - Done
2,930,483 UART: [art] Signing Cert with AUTHO
2,930,963 UART: RITY.KEYID = 7
2,946,385 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,150 UART: [art] PUB.X = 7A5ED0BC019F19EE34EFC76A72990D7DE922A4E110E0A261B3BD986EDB02AECAD9534BB1AB8A150DFEFEB6217253B2FC
2,953,934 UART: [art] PUB.Y = F0807DB55669D0216B442252D72CBA8D652E89F9064EA4FCA8F4F076AA8EE8165CC9434598F5C910CDC29EFCBA3EBCC7
2,960,897 UART: [art] SIG.R = 37FF41928113F64B69075131CE8F8A5FDE5302781E89910BBD535D3AF6F5F4D806B2BD67EB4646E988F8A4DC87452793
2,967,655 UART: [art] SIG.S = 69CE92C4F2BDE69F1C30B14A5EE265DA14FBCFE6B87720FDA9FDB40F58DBC75E0D0CDB8C27CEDA6F4D6AC44B3DCC24F9
2,991,883 UART: Caliptra RT
2,992,136 UART: [state] CFI Enabled
3,099,725 UART: [rt] RT listening for mailbox commands...
3,100,395 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,823 UART: [rt]cmd =0x4c4d5356, len=1672
3,670,559 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,548 UART: [idev] ++
1,172,716 UART: [idev] CDI.KEYID = 6
1,173,077 UART: [idev] SUBJECT.KEYID = 7
1,173,502 UART: [idev] UDS.KEYID = 0
1,173,848 ready_for_fw is high
1,173,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,198,834 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,357 UART: [ldev] SUBJECT.KEYID = 5
1,209,784 UART: [ldev] AUTHORITY.KEYID = 7
1,210,247 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,178 >>> mbox cmd response: success
2,773,287 UART: [afmc] ++
2,773,455 UART: [afmc] CDI.KEYID = 6
2,773,818 UART: [afmc] SUBJECT.KEYID = 7
2,774,244 UART: [afmc] AUTHORITY.KEYID = 5
2,809,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,453 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,055 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,858 UART: [afmc] --
2,852,786 UART: [cold-reset] --
2,853,640 UART: [state] Locking Datavault
2,854,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,513 UART: [state] Locking ICCM
2,856,169 UART: [exit] Launching FMC @ 0x40000130
2,861,498 UART:
2,861,514 UART: Running Caliptra FMC ...
2,861,922 UART:
2,862,065 UART: [state] CFI Enabled
2,872,890 UART: [fht] FMC Alias Private Key: 7
2,980,635 UART: [art] Extend RT PCRs Done
2,981,063 UART: [art] Lock RT PCRs Done
2,982,671 UART: [art] Populate DV Done
2,990,718 UART: [fht] FMC Alias Private Key: 7
2,991,756 UART: [art] Derive CDI
2,992,036 UART: [art] Store in in slot 0x4
3,077,715 UART: [art] Derive Key Pair
3,078,075 UART: [art] Store priv key in slot 0x5
3,091,623 UART: [art] Derive Key Pair - Done
3,106,582 UART: [art] Signing Cert with AUTHO
3,107,062 UART: RITY.KEYID = 7
3,122,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,003 UART: [art] PUB.X = 6B2FE098915B9B115C645A8C771402B921F9071065128FECB618A635CD756885768797E5AA2653F1FFC73D5D84F4489C
3,129,761 UART: [art] PUB.Y = C839D6D1A49A196B4925212A364D801BDA083CB78E3297B223046BCCD81B48889BFA7CC089B535A259CE5A18C80259B8
3,136,704 UART: [art] SIG.R = 8D05F95EF7A91B8A0FAA2A8D685F2D20B04169A25829E5F91A78A363FA03FB75C6D95D926664F7AE6C001E1633767CD4
3,143,449 UART: [art] SIG.S = A1624FC7A46E70028ED95B1CE7402E04F58D536B3C5ACD7C8063EB721FD141740D48EEEAB13298B00359F5683587DACF
3,166,904 UART: Caliptra RT
3,167,249 UART: [state] CFI Enabled
3,275,165 UART: [rt] RT listening for mailbox commands...
3,275,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,615 UART: [rt]cmd =0x4c4d5356, len=1672
3,846,349 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,693 ready_for_fw is high
1,055,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,076 >>> mbox cmd response: success
2,684,178 UART:
2,684,194 UART: Running Caliptra FMC ...
2,684,602 UART:
2,684,745 UART: [state] CFI Enabled
2,695,216 UART: [fht] FMC Alias Private Key: 7
2,803,661 UART: [art] Extend RT PCRs Done
2,804,089 UART: [art] Lock RT PCRs Done
2,805,817 UART: [art] Populate DV Done
2,814,046 UART: [fht] FMC Alias Private Key: 7
2,815,022 UART: [art] Derive CDI
2,815,302 UART: [art] Store in in slot 0x4
2,900,887 UART: [art] Derive Key Pair
2,901,247 UART: [art] Store priv key in slot 0x5
2,913,895 UART: [art] Derive Key Pair - Done
2,928,805 UART: [art] Signing Cert with AUTHO
2,929,285 UART: RITY.KEYID = 7
2,944,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,204 UART: [art] PUB.X = 7B40EA2B12DBBA2BFCFEC946DF3B2D06CF9AB8D1A897E1A889A0A0B6E7A3C6ED96BF5870C38982BEDD22547C7B198F29
2,951,997 UART: [art] PUB.Y = 0BFDE187BDD8ECC7692D886AF0D1C907572BAA16FF946B066D00B430BA79CEBDCB34534FDE5D58D6AD5FB2B3C8B6530E
2,958,939 UART: [art] SIG.R = 59F425D4EA089670CCCA9EB7074BF6C0E15334E4D0A81B27AC331192835CE18ADADD0508E64BAC0AE014F4C5E6C28B78
2,965,708 UART: [art] SIG.S = 3F0D38581215D4701AF5DBA84A2F4B338DB6F604A4B4046D82BEBE6140D93CD4FBEA962D548C0C39F6FE21122E23FABE
2,989,599 UART: Caliptra RT
2,989,944 UART: [state] CFI Enabled
3,097,617 UART: [rt] RT listening for mailbox commands...
3,098,287 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,813 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,539 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,377 UART: [kat] SHA2-256
892,315 UART: [kat] SHA2-384
894,914 UART: [kat] SHA2-512-ACC
896,815 UART: [kat] ECC-384
902,232 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,267 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,522 UART: [idev] ++
1,479,690 UART: [idev] CDI.KEYID = 6
1,480,050 UART: [idev] SUBJECT.KEYID = 7
1,480,474 UART: [idev] UDS.KEYID = 0
1,480,819 ready_for_fw is high
1,480,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,492 UART: [idev] Erasing UDS.KEYID = 0
1,505,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,744 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,547,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,670 UART: [ldev] --
1,586,161 UART: [fwproc] Waiting for Commands...
1,587,010 UART: [fwproc] Received command 0x46574c44
1,587,801 UART: [fwproc] Received Image of size 114332 bytes
2,885,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,582 >>> mbox cmd response: success
3,078,610 UART: [afmc] ++
3,078,778 UART: [afmc] CDI.KEYID = 6
3,079,140 UART: [afmc] SUBJECT.KEYID = 7
3,079,565 UART: [afmc] AUTHORITY.KEYID = 5
3,114,534 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,313 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,003 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,916 UART: [afmc] --
3,157,916 UART: [cold-reset] --
3,158,774 UART: [state] Locking Datavault
3,159,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,555 UART: [state] Locking ICCM
3,161,175 UART: [exit] Launching FMC @ 0x40000130
3,166,504 UART:
3,166,520 UART: Running Caliptra FMC ...
3,166,928 UART:
3,166,982 UART: [state] CFI Enabled
3,177,727 UART: [fht] FMC Alias Private Key: 7
3,285,588 UART: [art] Extend RT PCRs Done
3,286,016 UART: [art] Lock RT PCRs Done
3,287,434 UART: [art] Populate DV Done
3,295,725 UART: [fht] FMC Alias Private Key: 7
3,296,695 UART: [art] Derive CDI
3,296,975 UART: [art] Store in in slot 0x4
3,382,626 UART: [art] Derive Key Pair
3,382,986 UART: [art] Store priv key in slot 0x5
3,396,532 UART: [art] Derive Key Pair - Done
3,411,379 UART: [art] Signing Cert with AUTHO
3,411,859 UART: RITY.KEYID = 7
3,427,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,804 UART: [art] PUB.X = 9C773B825F1E6E7E8DCCF3AF93D7195408FBB018B144412983D5394AE7BB2B5A2735F7950F8E3DCEC7B7753E11F6BC61
3,434,578 UART: [art] PUB.Y = 8DE153D3D4448B08C1A63282DDAD5FE4F41D2843C73A287A5F6F5BFDEC1D9009174C8622A564A01EFF7256A41963DA14
3,441,530 UART: [art] SIG.R = 8EE04C95180503743758AA7A4833A64D683193CDD9712D6A536C5B1B03B38A0A8AF76A322FE7E3EB0830EC896E190860
3,448,280 UART: [art] SIG.S = 4209E1CE5BDE89FE91470F41293EDB47D2CFC44005AF778C0DFE486097982D8920BBCBD7150EFBDB52A7BDFFB696B05E
3,472,242 UART: Caliptra RT
3,472,495 UART: [state] CFI Enabled
3,579,270 UART: [rt] RT listening for mailbox commands...
3,579,940 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,536 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,802 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,509 ready_for_fw is high
1,362,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,688 >>> mbox cmd response: success
2,989,490 UART:
2,989,506 UART: Running Caliptra FMC ...
2,989,914 UART:
2,989,968 UART: [state] CFI Enabled
3,000,513 UART: [fht] FMC Alias Private Key: 7
3,108,422 UART: [art] Extend RT PCRs Done
3,108,850 UART: [art] Lock RT PCRs Done
3,110,394 UART: [art] Populate DV Done
3,118,655 UART: [fht] FMC Alias Private Key: 7
3,119,631 UART: [art] Derive CDI
3,119,911 UART: [art] Store in in slot 0x4
3,205,570 UART: [art] Derive Key Pair
3,205,930 UART: [art] Store priv key in slot 0x5
3,219,582 UART: [art] Derive Key Pair - Done
3,234,288 UART: [art] Signing Cert with AUTHO
3,234,768 UART: RITY.KEYID = 7
3,249,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,653 UART: [art] PUB.X = 9F2CB34F7B5FA6310C8E1E4F45858A4677A02F71B9A233EE862D890CD6A429840793EC1CFDB8B67D643605CCEDCFD8C1
3,257,425 UART: [art] PUB.Y = 56DDEAC4EA5EAD98777958B0F3E0EB4BD5CA52F309A5567C077220AE390ECA3B5C0DE22524CB538C5C471976EA973AFD
3,264,381 UART: [art] SIG.R = 28DD681C1415573F2EEF9244858E5C44F346ACDBB181A93A1EE6497E8A343C8AC415575E4668B319EB6B8D04767C7A85
3,271,150 UART: [art] SIG.S = 5B335679B8EDFFD952452678161A3B149191DF10ACE8B752A4E2F1B3CD6C3290CFE80F1EE150BEEE2DB929804ECC90B4
3,294,900 UART: Caliptra RT
3,295,153 UART: [state] CFI Enabled
3,403,373 UART: [rt] RT listening for mailbox commands...
3,404,043 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,513 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,835 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,379 UART: [kat] SHA2-512-ACC
897,280 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,700 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 ready_for_fw is high
1,480,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,361 UART: [idev] Erasing UDS.KEYID = 0
1,505,201 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,823 UART: [idev] --
1,514,892 UART: [ldev] ++
1,515,060 UART: [ldev] CDI.KEYID = 6
1,515,423 UART: [ldev] SUBJECT.KEYID = 5
1,515,849 UART: [ldev] AUTHORITY.KEYID = 7
1,516,312 UART: [ldev] FE.KEYID = 1
1,521,484 UART: [ldev] Erasing FE.KEYID = 1
1,546,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,867 UART: [ldev] --
1,586,288 UART: [fwproc] Waiting for Commands...
1,587,111 UART: [fwproc] Received command 0x46574c44
1,587,902 UART: [fwproc] Received Image of size 114332 bytes
2,884,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,781 >>> mbox cmd response: success
3,077,921 UART: [afmc] ++
3,078,089 UART: [afmc] CDI.KEYID = 6
3,078,451 UART: [afmc] SUBJECT.KEYID = 7
3,078,876 UART: [afmc] AUTHORITY.KEYID = 5
3,114,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,673 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,181 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,066 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,756 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,631 UART: [afmc] --
3,157,723 UART: [cold-reset] --
3,158,759 UART: [state] Locking Datavault
3,159,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,568 UART: [state] Locking ICCM
3,161,192 UART: [exit] Launching FMC @ 0x40000130
3,166,521 UART:
3,166,537 UART: Running Caliptra FMC ...
3,166,945 UART:
3,167,088 UART: [state] CFI Enabled
3,177,591 UART: [fht] FMC Alias Private Key: 7
3,285,642 UART: [art] Extend RT PCRs Done
3,286,070 UART: [art] Lock RT PCRs Done
3,287,616 UART: [art] Populate DV Done
3,295,673 UART: [fht] FMC Alias Private Key: 7
3,296,855 UART: [art] Derive CDI
3,297,135 UART: [art] Store in in slot 0x4
3,383,152 UART: [art] Derive Key Pair
3,383,512 UART: [art] Store priv key in slot 0x5
3,396,746 UART: [art] Derive Key Pair - Done
3,411,425 UART: [art] Signing Cert with AUTHO
3,411,905 UART: RITY.KEYID = 7
3,427,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,912 UART: [art] PUB.X = 66A17D669C0ED427F09B914E66BF67549AB84DBFC23DBF4FEB13E1AFF8353C5AB7960F6ADFAC88C5A53F14484FADA24C
3,434,700 UART: [art] PUB.Y = 17C0AA159ACC9BBAB51023A2E708349B8BB6296981B69124B5CB80876819CE242276274DF83C77693ED9ED07B95DA7A6
3,441,646 UART: [art] SIG.R = 3072CA0BB68A067938D205AEFA5E3C1671948B312B35A348CAD96C95769D94AA76CE446F21B51C8260F87D758BA851CC
3,448,411 UART: [art] SIG.S = EC25FEE56498F97D62D3FC68B1A10608AFE7B6F65DADF033FC8D0BD983128DCCFD4D7138FD37CF55A81AF9FA1523F954
3,472,157 UART: Caliptra RT
3,472,502 UART: [state] CFI Enabled
3,581,309 UART: [rt] RT listening for mailbox commands...
3,581,979 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,665 UART: [rt]cmd =0x4c4d5356, len=1672
3,875,385 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,932 ready_for_fw is high
1,361,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,911 >>> mbox cmd response: success
2,988,311 UART:
2,988,327 UART: Running Caliptra FMC ...
2,988,735 UART:
2,988,878 UART: [state] CFI Enabled
2,999,323 UART: [fht] FMC Alias Private Key: 7
3,106,808 UART: [art] Extend RT PCRs Done
3,107,236 UART: [art] Lock RT PCRs Done
3,108,570 UART: [art] Populate DV Done
3,116,717 UART: [fht] FMC Alias Private Key: 7
3,117,719 UART: [art] Derive CDI
3,117,999 UART: [art] Store in in slot 0x4
3,203,456 UART: [art] Derive Key Pair
3,203,816 UART: [art] Store priv key in slot 0x5
3,217,302 UART: [art] Derive Key Pair - Done
3,232,165 UART: [art] Signing Cert with AUTHO
3,232,645 UART: RITY.KEYID = 7
3,248,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,970 UART: [art] PUB.X = 4659F68CDBBAA73F5FEF10FBE25335D9650798A798992C43A799ECDB844A8F2C2D91E2AF799F93DD5D821D77F44895E1
3,255,747 UART: [art] PUB.Y = 97FC67F77DD7070D5EDE81B084F0867F5537964C23055E2AF8A4F269A52AF15021919977AE5BCAF274EB96812D62B100
3,262,666 UART: [art] SIG.R = 7DE4628AC2245A3FBF57F4174AD7E697032FC988FA416CCD763264DD3953D06F3F356E707312AABEBD81E79C2147D285
3,269,439 UART: [art] SIG.S = 7CC90E19AB48872117C521B679661975D69A6624112BD684B17DF783A5C45854CCF0663B011947541D9F627F4D1B4914
3,293,584 UART: Caliptra RT
3,293,929 UART: [state] CFI Enabled
3,402,041 UART: [rt] RT listening for mailbox commands...
3,402,711 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,305 UART: [rt]cmd =0x4c4d5356, len=1672
3,695,729 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,913 UART: [kat] SHA2-256
903,853 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,464 UART: [kat] HMAC-384Kdf
923,088 UART: [kat] LMS
1,171,416 UART: [kat] --
1,172,295 UART: [cold-reset] ++
1,172,811 UART: [fht] FHT @ 0x50003400
1,175,242 UART: [idev] ++
1,175,410 UART: [idev] CDI.KEYID = 6
1,175,770 UART: [idev] SUBJECT.KEYID = 7
1,176,194 UART: [idev] UDS.KEYID = 0
1,176,539 ready_for_fw is high
1,176,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,489 UART: [idev] --
1,210,567 UART: [ldev] ++
1,210,735 UART: [ldev] CDI.KEYID = 6
1,211,098 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,876 UART: [fwproc] Wait for Commands...
1,283,588 UART: [fwproc] Recv command 0x46574c44
1,284,316 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,531 >>> mbox cmd response: success
2,774,767 UART: [afmc] ++
2,774,935 UART: [afmc] CDI.KEYID = 6
2,775,297 UART: [afmc] SUBJECT.KEYID = 7
2,775,722 UART: [afmc] AUTHORITY.KEYID = 5
2,811,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,454 UART: [afmc] --
2,855,540 UART: [cold-reset] --
2,856,488 UART: [state] Locking Datavault
2,857,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,435 UART: [state] Locking ICCM
2,859,073 UART: [exit] Launching FMC @ 0x40000130
2,864,402 UART:
2,864,418 UART: Running Caliptra FMC ...
2,864,826 UART:
2,864,880 UART: [state] CFI Enabled
2,875,609 UART: [fht] FMC Alias Private Key: 7
2,982,758 UART: [art] Extend RT PCRs Done
2,983,186 UART: [art] Lock RT PCRs Done
2,984,552 UART: [art] Populate DV Done
2,992,833 UART: [fht] FMC Alias Private Key: 7
2,993,943 UART: [art] Derive CDI
2,994,223 UART: [art] Store in in slot 0x4
3,080,078 UART: [art] Derive Key Pair
3,080,438 UART: [art] Store priv key in slot 0x5
3,093,364 UART: [art] Derive Key Pair - Done
3,108,157 UART: [art] Signing Cert with AUTHO
3,108,637 UART: RITY.KEYID = 7
3,124,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,920 UART: [art] PUB.X = E4E9B47180DE4CB8D11B4FF8F245D566EE179FEDA40B68A25D7F2C920C06FE7894EEED6CAD652C7047E2AE87B4B92C3C
3,131,703 UART: [art] PUB.Y = E537DF8BD85223A6067C13FAF34156E95ACAC55A9685AC9CAE63D612783D8903811488A56C0EC65CF603CE1208952DCE
3,138,644 UART: [art] SIG.R = 17C225EB9C4C84273174F75E904E419976173E3C7E37473B04726E775B6FBFD946443F9AB68D964E867039CAAD1DB506
3,145,404 UART: [art] SIG.S = 273C2198F35F4C5771743AEC3B15E2152C82074B82E8681F1511243984916C313D0F7941C2623121DF0B68441899111A
3,168,978 UART: Caliptra RT
3,169,231 UART: [state] CFI Enabled
3,277,262 UART: [rt] RT listening for mailbox commands...
3,277,932 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,548 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,134 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,795 ready_for_fw is high
1,059,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,376 >>> mbox cmd response: success
2,688,182 UART:
2,688,198 UART: Running Caliptra FMC ...
2,688,606 UART:
2,688,660 UART: [state] CFI Enabled
2,698,839 UART: [fht] FMC Alias Private Key: 7
2,806,248 UART: [art] Extend RT PCRs Done
2,806,676 UART: [art] Lock RT PCRs Done
2,808,160 UART: [art] Populate DV Done
2,816,439 UART: [fht] FMC Alias Private Key: 7
2,817,523 UART: [art] Derive CDI
2,817,803 UART: [art] Store in in slot 0x4
2,902,956 UART: [art] Derive Key Pair
2,903,316 UART: [art] Store priv key in slot 0x5
2,916,810 UART: [art] Derive Key Pair - Done
2,931,614 UART: [art] Signing Cert with AUTHO
2,932,094 UART: RITY.KEYID = 7
2,946,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,679 UART: [art] PUB.X = 829DAC471CE0C381AC3961E2E5830D7E6D0C85089043540F0C9BD80C3249B9B9BE460A335CFA9B76E44AE5AB2A22689C
2,954,436 UART: [art] PUB.Y = F1B7D2130DBA62DE9F356FD8DE139F04034CADDDA3D3A5D813D2F0C83F3D6503B2A4A0A8AB5F80D4961BFF45D6DBF88A
2,961,400 UART: [art] SIG.R = F9D75A3FFB52CB3F06619CAD37D4DE748B2958E77D82E71A34CE95675551F1F820B462328E9214E91492EC0D561055DD
2,968,166 UART: [art] SIG.S = BEF04379FAD9BB0F0D60EFDC996A0D357D5014F8213CAFB6B3CE39EEB08916D17788836997ACD733297FEA42F0AFE2D5
2,992,330 UART: Caliptra RT
2,992,583 UART: [state] CFI Enabled
3,100,019 UART: [rt] RT listening for mailbox commands...
3,100,689 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,397 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,829 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,705 UART: [kat] HMAC-384Kdf
923,179 UART: [kat] LMS
1,171,507 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,575 UART: [idev] ++
1,175,743 UART: [idev] CDI.KEYID = 6
1,176,103 UART: [idev] SUBJECT.KEYID = 7
1,176,527 UART: [idev] UDS.KEYID = 0
1,176,872 ready_for_fw is high
1,176,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,200,890 UART: [idev] Sha1 KeyId Algorithm
1,209,336 UART: [idev] --
1,210,314 UART: [ldev] ++
1,210,482 UART: [ldev] CDI.KEYID = 6
1,210,845 UART: [ldev] SUBJECT.KEYID = 5
1,211,271 UART: [ldev] AUTHORITY.KEYID = 7
1,211,734 UART: [ldev] FE.KEYID = 1
1,217,142 UART: [ldev] Erasing FE.KEYID = 1
1,243,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,620 UART: [ldev] --
1,282,897 UART: [fwproc] Wait for Commands...
1,283,657 UART: [fwproc] Recv command 0x46574c44
1,284,385 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,744 >>> mbox cmd response: success
2,774,920 UART: [afmc] ++
2,775,088 UART: [afmc] CDI.KEYID = 6
2,775,450 UART: [afmc] SUBJECT.KEYID = 7
2,775,875 UART: [afmc] AUTHORITY.KEYID = 5
2,811,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,839 UART: [afmc] --
2,854,953 UART: [cold-reset] --
2,855,665 UART: [state] Locking Datavault
2,856,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,160 UART: [state] Locking ICCM
2,857,726 UART: [exit] Launching FMC @ 0x40000130
2,863,055 UART:
2,863,071 UART: Running Caliptra FMC ...
2,863,479 UART:
2,863,622 UART: [state] CFI Enabled
2,874,507 UART: [fht] FMC Alias Private Key: 7
2,982,314 UART: [art] Extend RT PCRs Done
2,982,742 UART: [art] Lock RT PCRs Done
2,984,068 UART: [art] Populate DV Done
2,992,557 UART: [fht] FMC Alias Private Key: 7
2,993,517 UART: [art] Derive CDI
2,993,797 UART: [art] Store in in slot 0x4
3,079,318 UART: [art] Derive Key Pair
3,079,678 UART: [art] Store priv key in slot 0x5
3,092,994 UART: [art] Derive Key Pair - Done
3,107,597 UART: [art] Signing Cert with AUTHO
3,108,077 UART: RITY.KEYID = 7
3,123,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,240 UART: [art] PUB.X = 5E4BB660DA80DFE6823421024BBF6048C89AFB40B6C956828752BBDA272014BADE86FF19CB9A79495BB3660E72C705A0
3,131,009 UART: [art] PUB.Y = D760FFA5C7D6308E1B829066D5525B952047AA10364D5D27A360C3B82891EFF3C759E05BEB04028F945B82B2B35827EA
3,137,953 UART: [art] SIG.R = 9E23700C369AF4017A556B639F74D9C0A516F0FA6B9196B9098C3DC05AFB49FECB5E21080DDEF858BB5A5ECF387182F6
3,144,720 UART: [art] SIG.S = 2B70E7D4BBEC3E2F7C6944A4BEB1B42C5492CC16D712F96A77BAE4F0AC543B1F175001A465F2B95205545D4F06588914
3,168,810 UART: Caliptra RT
3,169,155 UART: [state] CFI Enabled
3,276,882 UART: [rt] RT listening for mailbox commands...
3,277,552 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,316 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,798 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 ready_for_fw is high
1,060,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,773 >>> mbox cmd response: success
2,688,703 UART:
2,688,719 UART: Running Caliptra FMC ...
2,689,127 UART:
2,689,270 UART: [state] CFI Enabled
2,700,117 UART: [fht] FMC Alias Private Key: 7
2,807,838 UART: [art] Extend RT PCRs Done
2,808,266 UART: [art] Lock RT PCRs Done
2,809,888 UART: [art] Populate DV Done
2,818,049 UART: [fht] FMC Alias Private Key: 7
2,819,077 UART: [art] Derive CDI
2,819,357 UART: [art] Store in in slot 0x4
2,904,608 UART: [art] Derive Key Pair
2,904,968 UART: [art] Store priv key in slot 0x5
2,918,112 UART: [art] Derive Key Pair - Done
2,933,050 UART: [art] Signing Cert with AUTHO
2,933,530 UART: RITY.KEYID = 7
2,949,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,827 UART: [art] PUB.X = 63AC9F36F8CD6088D6C415208A4D03A8E11A650AF3F2A52C53B4027F4A316BB5DD4357752B331BB7DEADC00E0A0AFFE4
2,956,595 UART: [art] PUB.Y = 230995F69E3944B048C82A816B54B7F716948FED82BAE8E1B9BB30351F0FB1C354E074A49D73C8F53D2239FB46B15D21
2,963,541 UART: [art] SIG.R = 6B3099FD2000B8B83C425345640F71930C2F27D4D5BAEDD8EE89FBF3C2D031B957C9592C652BBE5B35F399DF42E14605
2,970,286 UART: [art] SIG.S = 0D203FF6279C50D7DD734DA68A83BA5E5E9654D994D5E24CD81B7A5D43E7E10B50F84CAFCDFEC7E66AB1DF368577C139
2,993,737 UART: Caliptra RT
2,994,082 UART: [state] CFI Enabled
3,102,037 UART: [rt] RT listening for mailbox commands...
3,102,707 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,413 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,819 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
915,508 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,173,893 ready_for_fw is high
1,173,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,197,851 UART: [idev] Sha1 KeyId Algorithm
1,206,595 UART: [idev] --
1,207,458 UART: [ldev] ++
1,207,626 UART: [ldev] CDI.KEYID = 6
1,207,990 UART: [ldev] SUBJECT.KEYID = 5
1,208,417 UART: [ldev] AUTHORITY.KEYID = 7
1,208,880 UART: [ldev] FE.KEYID = 1
1,213,946 UART: [ldev] Erasing FE.KEYID = 1
1,240,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,542 UART: [ldev] --
1,279,898 UART: [fwproc] Wait for Commands...
1,280,559 UART: [fwproc] Recv command 0x46574c44
1,281,292 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,941 >>> mbox cmd response: success
2,772,156 UART: [afmc] ++
2,772,324 UART: [afmc] CDI.KEYID = 6
2,772,687 UART: [afmc] SUBJECT.KEYID = 7
2,773,113 UART: [afmc] AUTHORITY.KEYID = 5
2,808,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,331 UART: [afmc] --
2,852,363 UART: [cold-reset] --
2,853,225 UART: [state] Locking Datavault
2,854,650 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,254 UART: [state] Locking ICCM
2,855,832 UART: [exit] Launching FMC @ 0x40000130
2,861,161 UART:
2,861,177 UART: Running Caliptra FMC ...
2,861,585 UART:
2,861,639 UART: [state] CFI Enabled
2,871,986 UART: [fht] FMC Alias Private Key: 7
2,979,999 UART: [art] Extend RT PCRs Done
2,980,427 UART: [art] Lock RT PCRs Done
2,981,879 UART: [art] Populate DV Done
2,990,546 UART: [fht] FMC Alias Private Key: 7
2,991,528 UART: [art] Derive CDI
2,991,808 UART: [art] Store in in slot 0x4
3,077,399 UART: [art] Derive Key Pair
3,077,759 UART: [art] Store priv key in slot 0x5
3,090,969 UART: [art] Derive Key Pair - Done
3,105,875 UART: [art] Signing Cert with AUTHO
3,106,355 UART: RITY.KEYID = 7
3,121,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,312 UART: [art] PUB.X = 306B329D11AAFD47B8DAEAF0550881CEDE63B72D108826E0442CF4BA7C8424850995F9EF3129869EACBCCBE3421AB93C
3,129,090 UART: [art] PUB.Y = 17AE618D1A4B72EB274F8234AB4A6B0CE6A29C10A8ECF617D09FD652EFD98018B105FDAA2BB3FB66722540D6179690CC
3,136,048 UART: [art] SIG.R = B2B0BE9CD2F5079139AE2809578F946E7A3B5B619113E9FA71D88FD55C8909C527801DAF44F3CB954B352ABC336B8E10
3,142,815 UART: [art] SIG.S = EE467FEEC7F6211B1BB387DB011514348A59D71746DFA455E07CB6A53AF807AAC8661C91C98908B45FC457D2BA992458
3,166,031 UART: Caliptra RT
3,166,284 UART: [state] CFI Enabled
3,274,580 UART: [rt] RT listening for mailbox commands...
3,275,250 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,786 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,194 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,018 ready_for_fw is high
1,056,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,841 >>> mbox cmd response: success
2,686,213 UART:
2,686,229 UART: Running Caliptra FMC ...
2,686,637 UART:
2,686,691 UART: [state] CFI Enabled
2,697,064 UART: [fht] FMC Alias Private Key: 7
2,804,649 UART: [art] Extend RT PCRs Done
2,805,077 UART: [art] Lock RT PCRs Done
2,806,115 UART: [art] Populate DV Done
2,814,090 UART: [fht] FMC Alias Private Key: 7
2,815,056 UART: [art] Derive CDI
2,815,336 UART: [art] Store in in slot 0x4
2,901,163 UART: [art] Derive Key Pair
2,901,523 UART: [art] Store priv key in slot 0x5
2,914,701 UART: [art] Derive Key Pair - Done
2,929,664 UART: [art] Signing Cert with AUTHO
2,930,144 UART: RITY.KEYID = 7
2,945,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,047 UART: [art] PUB.X = 2801F3B85FAFF897F30516B3DC848CAD3A31BF9A5E69B72B53A765FC257B5099F0179D576B02CD71278B65485265CAA3
2,952,812 UART: [art] PUB.Y = ADF0EDD4ABFDFE4AC3A8FF9D2B4055A4FBA83ACDAA105F28CF668CCAB7238B5E1DEE2CE8AC92A64438E65B25C18F1DFF
2,959,804 UART: [art] SIG.R = D90A9AF98C3CB9FA858A9A1CBCA61E088B2E659CA6C08F05F5C8F334E8B9812B8D42627C2D3D770FD2B80A4E1F7CD78F
2,966,579 UART: [art] SIG.S = CA605D2CE4A2B35B37A31321A438AC8F6F408C070226EE2CB74DDA05C636D967528D7FB0B9CCAB9808B4223D93D336DA
2,990,848 UART: Caliptra RT
2,991,101 UART: [state] CFI Enabled
3,098,995 UART: [rt] RT listening for mailbox commands...
3,099,665 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,145 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,765 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,138 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,072 UART: [kat] ++
896,224 UART: [kat] sha1
900,628 UART: [kat] SHA2-256
902,568 UART: [kat] SHA2-384
905,313 UART: [kat] SHA2-512-ACC
907,214 UART: [kat] ECC-384
916,977 UART: [kat] HMAC-384Kdf
921,707 UART: [kat] LMS
1,170,019 UART: [kat] --
1,170,660 UART: [cold-reset] ++
1,171,044 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,174,882 ready_for_fw is high
1,174,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,261 UART: [fwproc] Wait for Commands...
1,281,932 UART: [fwproc] Recv command 0x46574c44
1,282,665 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,744 >>> mbox cmd response: success
2,773,005 UART: [afmc] ++
2,773,173 UART: [afmc] CDI.KEYID = 6
2,773,536 UART: [afmc] SUBJECT.KEYID = 7
2,773,962 UART: [afmc] AUTHORITY.KEYID = 5
2,809,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,356 UART: [afmc] --
2,852,452 UART: [cold-reset] --
2,853,370 UART: [state] Locking Datavault
2,854,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,097 UART: [state] Locking ICCM
2,855,709 UART: [exit] Launching FMC @ 0x40000130
2,861,038 UART:
2,861,054 UART: Running Caliptra FMC ...
2,861,462 UART:
2,861,605 UART: [state] CFI Enabled
2,872,574 UART: [fht] FMC Alias Private Key: 7
2,981,197 UART: [art] Extend RT PCRs Done
2,981,625 UART: [art] Lock RT PCRs Done
2,983,327 UART: [art] Populate DV Done
2,991,772 UART: [fht] FMC Alias Private Key: 7
2,992,748 UART: [art] Derive CDI
2,993,028 UART: [art] Store in in slot 0x4
3,078,671 UART: [art] Derive Key Pair
3,079,031 UART: [art] Store priv key in slot 0x5
3,092,455 UART: [art] Derive Key Pair - Done
3,107,522 UART: [art] Signing Cert with AUTHO
3,108,002 UART: RITY.KEYID = 7
3,123,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,801 UART: [art] PUB.X = 66FC0D48259E1AE66E0E4FCDEAEAD1C8A3430610AC15A88221CB6DD8CEF103C2AD542C78984F7AFFB7897E867870CE45
3,130,577 UART: [art] PUB.Y = 5F6392D641645A8D78892B6A1355D390D963DD2427752AC6CA916022B06CFFFAC958AC65EFD1736B6A7282F7C783E270
3,137,527 UART: [art] SIG.R = 30FB1EFA62677E768EBADCC6AD7452157163A855230FCBDF4D267A35B45C16B69273AC5E08ABACC9FB5DBD9917A69948
3,144,307 UART: [art] SIG.S = BC7A35651912FE859F1E685BBDA788B67AAB0E88053D0124D24A506000DA31F9575D831004BAA11D7D648ECD68700C88
3,167,663 UART: Caliptra RT
3,168,008 UART: [state] CFI Enabled
3,276,477 UART: [rt] RT listening for mailbox commands...
3,277,147 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,963 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,629 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,193 ready_for_fw is high
1,056,193 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,962 >>> mbox cmd response: success
2,685,778 UART:
2,685,794 UART: Running Caliptra FMC ...
2,686,202 UART:
2,686,345 UART: [state] CFI Enabled
2,697,080 UART: [fht] FMC Alias Private Key: 7
2,804,599 UART: [art] Extend RT PCRs Done
2,805,027 UART: [art] Lock RT PCRs Done
2,806,741 UART: [art] Populate DV Done
2,815,000 UART: [fht] FMC Alias Private Key: 7
2,815,956 UART: [art] Derive CDI
2,816,236 UART: [art] Store in in slot 0x4
2,901,761 UART: [art] Derive Key Pair
2,902,121 UART: [art] Store priv key in slot 0x5
2,915,559 UART: [art] Derive Key Pair - Done
2,930,302 UART: [art] Signing Cert with AUTHO
2,930,782 UART: RITY.KEYID = 7
2,946,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,953 UART: [art] PUB.X = 6260EDC9F500F57A52794A810554B1BDF5A1DF015AD295CDF4C73DB61B8906893C46332ED06D050D9FDAD8490B777644
2,953,687 UART: [art] PUB.Y = 063EEF2A221E65B05FE668ABFE66E5F9E82EEB0CEDAA899AA2C8B28B5DF897A2D9D0D273C65AB5AA8C7E05FB698CB8A2
2,960,658 UART: [art] SIG.R = DC4D1A9E5BA904BA4902822EF0B16EF8C01232A825234CD92E8617C2D45635460A7876E7E70B8A02913BCAFA64DDCAB3
2,967,423 UART: [art] SIG.S = 4DDD36853AA7613DA9B6CD3EEB264578BCE97CD471D10AC91C273DFAEB578FAE7FE8B59E34ED8911757253A935370888
2,991,218 UART: Caliptra RT
2,991,563 UART: [state] CFI Enabled
3,099,428 UART: [rt] RT listening for mailbox commands...
3,100,098 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,584 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,126 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,199 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 ready_for_fw is high
1,480,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,340 UART: [idev] Erasing UDS.KEYID = 0
1,505,366 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,106 UART: [idev] --
1,515,041 UART: [ldev] ++
1,515,209 UART: [ldev] CDI.KEYID = 6
1,515,572 UART: [ldev] SUBJECT.KEYID = 5
1,515,998 UART: [ldev] AUTHORITY.KEYID = 7
1,516,461 UART: [ldev] FE.KEYID = 1
1,521,551 UART: [ldev] Erasing FE.KEYID = 1
1,547,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,872 UART: [ldev] --
1,586,261 UART: [fwproc] Waiting for Commands...
1,587,022 UART: [fwproc] Received command 0x46574c44
1,587,813 UART: [fwproc] Received Image of size 114332 bytes
2,884,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,442 >>> mbox cmd response: success
3,078,488 UART: [afmc] ++
3,078,656 UART: [afmc] CDI.KEYID = 6
3,079,018 UART: [afmc] SUBJECT.KEYID = 7
3,079,443 UART: [afmc] AUTHORITY.KEYID = 5
3,114,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,925 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,615 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,356 UART: [afmc] --
3,157,298 UART: [cold-reset] --
3,158,052 UART: [state] Locking Datavault
3,159,105 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,709 UART: [state] Locking ICCM
3,160,179 UART: [exit] Launching FMC @ 0x40000130
3,165,508 UART:
3,165,524 UART: Running Caliptra FMC ...
3,165,932 UART:
3,165,986 UART: [state] CFI Enabled
3,176,391 UART: [fht] FMC Alias Private Key: 7
3,283,974 UART: [art] Extend RT PCRs Done
3,284,402 UART: [art] Lock RT PCRs Done
3,285,718 UART: [art] Populate DV Done
3,294,109 UART: [fht] FMC Alias Private Key: 7
3,295,045 UART: [art] Derive CDI
3,295,325 UART: [art] Store in in slot 0x4
3,380,748 UART: [art] Derive Key Pair
3,381,108 UART: [art] Store priv key in slot 0x5
3,394,088 UART: [art] Derive Key Pair - Done
3,409,122 UART: [art] Signing Cert with AUTHO
3,409,602 UART: RITY.KEYID = 7
3,424,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,493 UART: [art] PUB.X = B112B8E53C2D88620D1D04A93AEF32C4E47C3923491F60E20BBD58BA292C9FE40936B25EF8CC3460997BEBA218D2C10D
3,432,258 UART: [art] PUB.Y = 18B6B2C30F625697F42B9DCFAA7A1160F00A3A44D54483062EF097D9E6E809B6912CBDEAB570B9EF980126F97FB555D8
3,439,201 UART: [art] SIG.R = 709A30B08E93A069C7229B36406F431334A0B7C9BB179970E94AB4E52C930FE218ECDFDE2597FE71671BA9286D912269
3,445,966 UART: [art] SIG.S = 3EE24E8A1D6670F432A62D23D924C9CE9355B8487062CF79648BFCCFECEB13859A2CD0AD3F70A27946DA1235B7B1359B
3,469,055 UART: Caliptra RT
3,469,308 UART: [state] CFI Enabled
3,577,014 UART: [rt] RT listening for mailbox commands...
3,577,684 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,286 UART: [rt]cmd =0x4c4d5356, len=1672
3,870,749 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,327 ready_for_fw is high
1,362,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,502 >>> mbox cmd response: success
2,986,240 UART:
2,986,256 UART: Running Caliptra FMC ...
2,986,664 UART:
2,986,718 UART: [state] CFI Enabled
2,997,057 UART: [fht] FMC Alias Private Key: 7
3,104,974 UART: [art] Extend RT PCRs Done
3,105,402 UART: [art] Lock RT PCRs Done
3,106,800 UART: [art] Populate DV Done
3,115,089 UART: [fht] FMC Alias Private Key: 7
3,116,241 UART: [art] Derive CDI
3,116,521 UART: [art] Store in in slot 0x4
3,202,068 UART: [art] Derive Key Pair
3,202,428 UART: [art] Store priv key in slot 0x5
3,215,496 UART: [art] Derive Key Pair - Done
3,230,453 UART: [art] Signing Cert with AUTHO
3,230,933 UART: RITY.KEYID = 7
3,246,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,862 UART: [art] PUB.X = 2C04FADAF495BD38D8002876F0FD360477E68B5624968DE8F990A69398B4450A31D4E55F529389A96E703CF3C53F023C
3,253,596 UART: [art] PUB.Y = 16CB02B60BBDA8F254A444AD7F9FC877AC26E78E1A156954C9780C84CE55050DDE388E021CB7337220930CCBE7822C98
3,260,531 UART: [art] SIG.R = 4A9763008C7DB0AFCABD52D15530993C9B7781A3187EF55389679CC35E110F71366A42FB24681B360CD4CAC069ECAE3E
3,267,279 UART: [art] SIG.S = D53FCDB2FCE1ABA738F384CC88A1A1C0633DD43A21DDB7F0340D1514088BAAC9D8F6483BB42FE7C2E93704822E3DDFF3
3,291,047 UART: Caliptra RT
3,291,300 UART: [state] CFI Enabled
3,399,573 UART: [rt] RT listening for mailbox commands...
3,400,243 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,947 UART: [rt]cmd =0x4c4d5356, len=1672
3,693,646 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,944 UART: [kat] SHA2-256
881,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,990 UART: [kat] ++
886,142 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,095 UART: [kat] SHA2-512-ACC
896,996 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 ready_for_fw is high
1,481,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,331 UART: [idev] Erasing UDS.KEYID = 0
1,506,211 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,851 UART: [idev] --
1,515,894 UART: [ldev] ++
1,516,062 UART: [ldev] CDI.KEYID = 6
1,516,425 UART: [ldev] SUBJECT.KEYID = 5
1,516,851 UART: [ldev] AUTHORITY.KEYID = 7
1,517,314 UART: [ldev] FE.KEYID = 1
1,522,698 UART: [ldev] Erasing FE.KEYID = 1
1,548,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,689 UART: [ldev] --
1,587,990 UART: [fwproc] Waiting for Commands...
1,588,787 UART: [fwproc] Received command 0x46574c44
1,589,578 UART: [fwproc] Received Image of size 114332 bytes
2,887,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,751 >>> mbox cmd response: success
3,080,835 UART: [afmc] ++
3,081,003 UART: [afmc] CDI.KEYID = 6
3,081,365 UART: [afmc] SUBJECT.KEYID = 7
3,081,790 UART: [afmc] AUTHORITY.KEYID = 5
3,116,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,300 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,990 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,883 UART: [afmc] --
3,159,901 UART: [cold-reset] --
3,160,787 UART: [state] Locking Datavault
3,161,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,352 UART: [state] Locking ICCM
3,162,888 UART: [exit] Launching FMC @ 0x40000130
3,168,217 UART:
3,168,233 UART: Running Caliptra FMC ...
3,168,641 UART:
3,168,784 UART: [state] CFI Enabled
3,179,383 UART: [fht] FMC Alias Private Key: 7
3,287,506 UART: [art] Extend RT PCRs Done
3,287,934 UART: [art] Lock RT PCRs Done
3,289,506 UART: [art] Populate DV Done
3,297,825 UART: [fht] FMC Alias Private Key: 7
3,298,963 UART: [art] Derive CDI
3,299,243 UART: [art] Store in in slot 0x4
3,384,854 UART: [art] Derive Key Pair
3,385,214 UART: [art] Store priv key in slot 0x5
3,398,786 UART: [art] Derive Key Pair - Done
3,413,637 UART: [art] Signing Cert with AUTHO
3,414,117 UART: RITY.KEYID = 7
3,429,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,034 UART: [art] PUB.X = 37A313FDE2B63AEA16478B250E6DA71420B2452A01045445DF414C75F5B61889D5601E348F1EC141D8A79E5C843C2F45
3,436,793 UART: [art] PUB.Y = 9D6658E6E651C69A0EEF5C3E6DD0FEFD6E7D4CEF309A0E6E451C99C766DE1BB7189171A0F50B2538373A02CFF21B015C
3,443,744 UART: [art] SIG.R = D55CD54F8FE889EB39EB13059F5D975F54C12B108B81D7AF5869CFA859CA91689C68D7ED449843E88D12ECEDEF615238
3,450,521 UART: [art] SIG.S = 7E5888EE3B0EC8597C46BA0478B143A8CB372471954C969590F1252F1A9F87E766F9623B5C642CAABCE455E3468C38A4
3,474,556 UART: Caliptra RT
3,474,901 UART: [state] CFI Enabled
3,583,178 UART: [rt] RT listening for mailbox commands...
3,583,848 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,404 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,975 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,512 ready_for_fw is high
1,363,512 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,949 >>> mbox cmd response: success
2,990,477 UART:
2,990,493 UART: Running Caliptra FMC ...
2,990,901 UART:
2,991,044 UART: [state] CFI Enabled
3,001,697 UART: [fht] FMC Alias Private Key: 7
3,109,906 UART: [art] Extend RT PCRs Done
3,110,334 UART: [art] Lock RT PCRs Done
3,111,622 UART: [art] Populate DV Done
3,119,849 UART: [fht] FMC Alias Private Key: 7
3,120,867 UART: [art] Derive CDI
3,121,147 UART: [art] Store in in slot 0x4
3,207,126 UART: [art] Derive Key Pair
3,207,486 UART: [art] Store priv key in slot 0x5
3,220,438 UART: [art] Derive Key Pair - Done
3,235,209 UART: [art] Signing Cert with AUTHO
3,235,689 UART: RITY.KEYID = 7
3,250,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,696 UART: [art] PUB.X = 01E6C37CADBE948C6E4AC29E3AB488F356451F40818063141B38DF0B78FBBFFB05202013C68A8CF85530E0A75DF58747
3,258,463 UART: [art] PUB.Y = ED3DF8B2F214E34B0226E285CD99F3CF5CBB5EECA574F1377381DEDCB1EA99DEA4F1D541BF65DF93423B1AF23E861DF7
3,265,436 UART: [art] SIG.R = 7AB56FDAB31FB852A7F1EFDC1ECEF2428361BC19852C8EE59DB9849FF8B8B49D53C08DD43971FA79E10028C114B63FEA
3,272,204 UART: [art] SIG.S = EF1EFF49A6EAAB791C37CD5A7C9B62E6D0F2F2D04FFF33CCEAD06F136C4FAC8B592F8C1F558002B7EDAC7471FA1661D9
3,296,094 UART: Caliptra RT
3,296,439 UART: [state] CFI Enabled
3,404,766 UART: [rt] RT listening for mailbox commands...
3,405,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,390 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,861 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
918,248 UART: [kat] HMAC-384Kdf
922,928 UART: [kat] LMS
1,171,256 UART: [kat] --
1,172,321 UART: [cold-reset] ++
1,172,805 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 ready_for_fw is high
1,176,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,375 UART: [idev] Sha1 KeyId Algorithm
1,209,891 UART: [idev] --
1,211,021 UART: [ldev] ++
1,211,189 UART: [ldev] CDI.KEYID = 6
1,211,552 UART: [ldev] SUBJECT.KEYID = 5
1,211,978 UART: [ldev] AUTHORITY.KEYID = 7
1,212,441 UART: [ldev] FE.KEYID = 1
1,217,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,190 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,725 >>> mbox cmd response: success
2,776,943 UART: [afmc] ++
2,777,111 UART: [afmc] CDI.KEYID = 6
2,777,473 UART: [afmc] SUBJECT.KEYID = 7
2,777,898 UART: [afmc] AUTHORITY.KEYID = 5
2,813,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,298 UART: [afmc] --
2,856,278 UART: [cold-reset] --
2,857,270 UART: [state] Locking Datavault
2,858,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,231 UART: [state] Locking ICCM
2,859,891 UART: [exit] Launching FMC @ 0x40000130
2,865,220 UART:
2,865,236 UART: Running Caliptra FMC ...
2,865,644 UART:
2,865,698 UART: [state] CFI Enabled
2,876,263 UART: [fht] FMC Alias Private Key: 7
2,984,386 UART: [art] Extend RT PCRs Done
2,984,814 UART: [art] Lock RT PCRs Done
2,986,888 UART: [art] Populate DV Done
2,994,899 UART: [fht] FMC Alias Private Key: 7
2,995,877 UART: [art] Derive CDI
2,996,157 UART: [art] Store in in slot 0x4
3,081,776 UART: [art] Derive Key Pair
3,082,136 UART: [art] Store priv key in slot 0x5
3,094,962 UART: [art] Derive Key Pair - Done
3,110,180 UART: [art] Signing Cert with AUTHO
3,110,660 UART: RITY.KEYID = 7
3,125,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,493 UART: [art] PUB.X = C6191BF67F2FB82D6581585E5F5AA254976A89F7EB0E40F47D0187593528DC4376491E1C7ED66E861DD22AD8A72CEAA1
3,133,263 UART: [art] PUB.Y = 5C5D98E2830080F5CB6B1137F5352A7508AE141166AABF0433320B66A6EB63D679C264A52CF946CA702AAE6A6C24EA69
3,140,186 UART: [art] SIG.R = D5786E53B6F20978EF727380E4EF4A797EC98E97137BCD5D20100DD1339CF3B7B78517C924C15E3CA3EFF8BEB1B35D65
3,146,960 UART: [art] SIG.S = 488D3FCA65D1BE4CA8D0D058F2A908BE53E243971D8A23CA2744CA1D637D769CD2161B3A84E71C0BF4186B87F3ADE0F2
3,170,745 UART: Caliptra RT
3,170,998 UART: [state] CFI Enabled
3,278,581 UART: [rt] RT listening for mailbox commands...
3,279,251 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,755 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,978 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 ready_for_fw is high
1,060,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,836 >>> mbox cmd response: success
2,689,126 UART:
2,689,142 UART: Running Caliptra FMC ...
2,689,550 UART:
2,689,604 UART: [state] CFI Enabled
2,700,121 UART: [fht] FMC Alias Private Key: 7
2,808,016 UART: [art] Extend RT PCRs Done
2,808,444 UART: [art] Lock RT PCRs Done
2,809,976 UART: [art] Populate DV Done
2,818,451 UART: [fht] FMC Alias Private Key: 7
2,819,519 UART: [art] Derive CDI
2,819,799 UART: [art] Store in in slot 0x4
2,905,540 UART: [art] Derive Key Pair
2,905,900 UART: [art] Store priv key in slot 0x5
2,919,304 UART: [art] Derive Key Pair - Done
2,934,012 UART: [art] Signing Cert with AUTHO
2,934,492 UART: RITY.KEYID = 7
2,949,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,715 UART: [art] PUB.X = 28AEE4C6716B8B0860DBB0184E0C1A7E83E207BD9D1B1692C9FFEBE897EA3BE8CDCEC9F75C248B3DF4244D9FE9EF2090
2,957,500 UART: [art] PUB.Y = 693679EB8D08F0176CE53C8BD848C79AE5489A760C4358F6844BDE6E2F882E63F68DA4A933E1C676A5991F2A06FD2D8C
2,964,447 UART: [art] SIG.R = 75F2A49C979BD18205B01F4B4169B54FDC8A98D60321077082AC1F31372D7E056DF7034B077A94DAD572B1A8508FF2A4
2,971,199 UART: [art] SIG.S = F68449369107E6857A583B5E2E088CC376839D14845A24ACA2DB93A263B88B932E34370A412FA520579BEF72A9C3583E
2,995,157 UART: Caliptra RT
2,995,410 UART: [state] CFI Enabled
3,102,961 UART: [rt] RT listening for mailbox commands...
3,103,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,039 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,672 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
893,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,008 UART: [kat] ++
898,160 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
906,927 UART: [kat] SHA2-512-ACC
908,828 UART: [kat] ECC-384
918,965 UART: [kat] HMAC-384Kdf
923,625 UART: [kat] LMS
1,171,953 UART: [kat] --
1,173,052 UART: [cold-reset] ++
1,173,586 UART: [fht] FHT @ 0x50003400
1,176,321 UART: [idev] ++
1,176,489 UART: [idev] CDI.KEYID = 6
1,176,849 UART: [idev] SUBJECT.KEYID = 7
1,177,273 UART: [idev] UDS.KEYID = 0
1,177,618 ready_for_fw is high
1,177,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,275 UART: [idev] Erasing UDS.KEYID = 0
1,202,496 UART: [idev] Sha1 KeyId Algorithm
1,211,086 UART: [idev] --
1,212,174 UART: [ldev] ++
1,212,342 UART: [ldev] CDI.KEYID = 6
1,212,705 UART: [ldev] SUBJECT.KEYID = 5
1,213,131 UART: [ldev] AUTHORITY.KEYID = 7
1,213,594 UART: [ldev] FE.KEYID = 1
1,218,898 UART: [ldev] Erasing FE.KEYID = 1
1,246,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,152 UART: [ldev] --
1,285,511 UART: [fwproc] Wait for Commands...
1,286,239 UART: [fwproc] Recv command 0x46574c44
1,286,967 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,846 >>> mbox cmd response: success
2,777,018 UART: [afmc] ++
2,777,186 UART: [afmc] CDI.KEYID = 6
2,777,548 UART: [afmc] SUBJECT.KEYID = 7
2,777,973 UART: [afmc] AUTHORITY.KEYID = 5
2,813,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,977 UART: [afmc] --
2,857,059 UART: [cold-reset] --
2,857,915 UART: [state] Locking Datavault
2,858,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,362 UART: [state] Locking ICCM
2,859,864 UART: [exit] Launching FMC @ 0x40000130
2,865,193 UART:
2,865,209 UART: Running Caliptra FMC ...
2,865,617 UART:
2,865,760 UART: [state] CFI Enabled
2,876,201 UART: [fht] FMC Alias Private Key: 7
2,983,970 UART: [art] Extend RT PCRs Done
2,984,398 UART: [art] Lock RT PCRs Done
2,986,006 UART: [art] Populate DV Done
2,994,127 UART: [fht] FMC Alias Private Key: 7
2,995,159 UART: [art] Derive CDI
2,995,439 UART: [art] Store in in slot 0x4
3,081,096 UART: [art] Derive Key Pair
3,081,456 UART: [art] Store priv key in slot 0x5
3,093,688 UART: [art] Derive Key Pair - Done
3,108,555 UART: [art] Signing Cert with AUTHO
3,109,035 UART: RITY.KEYID = 7
3,124,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,166 UART: [art] PUB.X = A2B342F95B30922E140D608569A5C3EFE09EB5A6373FFC497A84082455922A3A2940158C55BA8585D94BA32FEAA367B1
3,131,930 UART: [art] PUB.Y = 454C02D254B76220CFA3192F785B4BABC398B6F1966B3C69CEE1D84CFEF8D092794BD13355635BD69680C6FC53C460BD
3,138,885 UART: [art] SIG.R = 5F61B276BEFAD7916EEE38B10965DF8B202F738405C121477E23BB57CFCD47679FA842883BCE7335E4A7C8BA367B7A8B
3,145,659 UART: [art] SIG.S = 8D3A5707E0036186BE0826E124D9F461FC727AFA0E095CC5D6F8427497031FC80659BAA9F69E2FFCA45E71F1880CCD7F
3,169,876 UART: Caliptra RT
3,170,221 UART: [state] CFI Enabled
3,278,616 UART: [rt] RT listening for mailbox commands...
3,279,286 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,098 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,803 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,822 ready_for_fw is high
1,060,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,757 >>> mbox cmd response: success
2,688,499 UART:
2,688,515 UART: Running Caliptra FMC ...
2,688,923 UART:
2,689,066 UART: [state] CFI Enabled
2,700,163 UART: [fht] FMC Alias Private Key: 7
2,808,130 UART: [art] Extend RT PCRs Done
2,808,558 UART: [art] Lock RT PCRs Done
2,809,920 UART: [art] Populate DV Done
2,818,195 UART: [fht] FMC Alias Private Key: 7
2,819,313 UART: [art] Derive CDI
2,819,593 UART: [art] Store in in slot 0x4
2,905,378 UART: [art] Derive Key Pair
2,905,738 UART: [art] Store priv key in slot 0x5
2,918,672 UART: [art] Derive Key Pair - Done
2,933,669 UART: [art] Signing Cert with AUTHO
2,934,149 UART: RITY.KEYID = 7
2,949,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,444 UART: [art] PUB.X = 57406FA8A8CD31634E3D9C92A873A48B3CA7302D4B0C1EB43B8873D4F0CE2ACD9DF6BFD7758544D71A0515BC3EB026CB
2,957,224 UART: [art] PUB.Y = ABF002F3A7C36AA90F3F6003CB53F9BEA8B2DCBC82983605BCC0F4DDEEFDF730F856EA18BD2AB4A3135D18E71A1F05AB
2,964,189 UART: [art] SIG.R = 68955618291516337BE88862BE363EB8B9F8883C39912E7B53A54C82059EE11C8C24D30E62C4A485D75115488DBCA7BC
2,970,947 UART: [art] SIG.S = 80A1376C0962ADC74027BE68718EF5F1B5A7EB7FDC8303F6D07831C2F702FA37CE28BB5B66A6D1C8B501874EA3ACDEDD
2,994,784 UART: Caliptra RT
2,995,129 UART: [state] CFI Enabled
3,103,218 UART: [rt] RT listening for mailbox commands...
3,103,888 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,508 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,963 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,877 UART: [state] WD Timer not started. Device not locked for debugging
87,118 UART: [kat] SHA2-256
890,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,797 UART: [kat] ++
894,949 UART: [kat] sha1
899,169 UART: [kat] SHA2-256
901,109 UART: [kat] SHA2-384
903,676 UART: [kat] SHA2-512-ACC
905,577 UART: [kat] ECC-384
915,242 UART: [kat] HMAC-384Kdf
919,870 UART: [kat] LMS
1,168,182 UART: [kat] --
1,168,945 UART: [cold-reset] ++
1,169,389 UART: [fht] FHT @ 0x50003400
1,171,903 UART: [idev] ++
1,172,071 UART: [idev] CDI.KEYID = 6
1,172,432 UART: [idev] SUBJECT.KEYID = 7
1,172,857 UART: [idev] UDS.KEYID = 0
1,173,203 ready_for_fw is high
1,173,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,899 UART: [idev] Erasing UDS.KEYID = 0
1,197,431 UART: [idev] Sha1 KeyId Algorithm
1,206,281 UART: [idev] --
1,207,182 UART: [ldev] ++
1,207,350 UART: [ldev] CDI.KEYID = 6
1,207,714 UART: [ldev] SUBJECT.KEYID = 5
1,208,141 UART: [ldev] AUTHORITY.KEYID = 7
1,208,604 UART: [ldev] FE.KEYID = 1
1,213,628 UART: [ldev] Erasing FE.KEYID = 1
1,239,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,998 UART: [ldev] --
1,279,312 UART: [fwproc] Wait for Commands...
1,280,053 UART: [fwproc] Recv command 0x46574c44
1,280,786 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,235 >>> mbox cmd response: success
2,772,470 UART: [afmc] ++
2,772,638 UART: [afmc] CDI.KEYID = 6
2,773,001 UART: [afmc] SUBJECT.KEYID = 7
2,773,427 UART: [afmc] AUTHORITY.KEYID = 5
2,808,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,471 UART: [afmc] --
2,852,429 UART: [cold-reset] --
2,853,319 UART: [state] Locking Datavault
2,854,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,966 UART: [state] Locking ICCM
2,855,492 UART: [exit] Launching FMC @ 0x40000130
2,860,821 UART:
2,860,837 UART: Running Caliptra FMC ...
2,861,245 UART:
2,861,299 UART: [state] CFI Enabled
2,871,690 UART: [fht] FMC Alias Private Key: 7
2,980,341 UART: [art] Extend RT PCRs Done
2,980,769 UART: [art] Lock RT PCRs Done
2,982,209 UART: [art] Populate DV Done
2,990,522 UART: [fht] FMC Alias Private Key: 7
2,991,646 UART: [art] Derive CDI
2,991,926 UART: [art] Store in in slot 0x4
3,077,581 UART: [art] Derive Key Pair
3,077,941 UART: [art] Store priv key in slot 0x5
3,091,037 UART: [art] Derive Key Pair - Done
3,105,940 UART: [art] Signing Cert with AUTHO
3,106,420 UART: RITY.KEYID = 7
3,121,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,747 UART: [art] PUB.X = 9794CAF9A89E9D3AB7EA30F645C7FF8DD792FF51E07819E8B599AB53F5E03D9721119FCD12363D6D2F863D665E2A09BF
3,129,526 UART: [art] PUB.Y = 709FCCC2ED4A08AEFFFD5E7D71908F3349E88D48630D480D0D5ED97966BE77D69B8CFC1E2404AA0180F5D30BD078B82E
3,136,471 UART: [art] SIG.R = 488A5ED52EEC75B4AED6851BB1036BD6E2669323790C446A8FD6FFDA0C6CA187F8BF42F8092A444E3D98FE8546C0322B
3,143,241 UART: [art] SIG.S = 99DA9F2E56F7C6BBA0ECFD7EA84AE15F88DD1F4DA2394D209D11E8A9DA8B03FF5971C9DAE9EC6CD0B6FDCE1A6CCBB703
3,167,488 UART: Caliptra RT
3,167,741 UART: [state] CFI Enabled
3,276,404 UART: [rt] RT listening for mailbox commands...
3,277,074 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,848 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,329 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,786 ready_for_fw is high
1,055,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,521 >>> mbox cmd response: success
2,685,265 UART:
2,685,281 UART: Running Caliptra FMC ...
2,685,689 UART:
2,685,743 UART: [state] CFI Enabled
2,696,282 UART: [fht] FMC Alias Private Key: 7
2,803,377 UART: [art] Extend RT PCRs Done
2,803,805 UART: [art] Lock RT PCRs Done
2,805,145 UART: [art] Populate DV Done
2,813,314 UART: [fht] FMC Alias Private Key: 7
2,814,332 UART: [art] Derive CDI
2,814,612 UART: [art] Store in in slot 0x4
2,900,039 UART: [art] Derive Key Pair
2,900,399 UART: [art] Store priv key in slot 0x5
2,914,087 UART: [art] Derive Key Pair - Done
2,928,958 UART: [art] Signing Cert with AUTHO
2,929,438 UART: RITY.KEYID = 7
2,944,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,403 UART: [art] PUB.X = D84863A118FA7635AB3ED9038DF32ED1FE69F04E9556A11DCBEBDDA44F2B7EF976F279F6426D47492AF2E26C5580BEA5
2,952,186 UART: [art] PUB.Y = A9164811EF913E31B009612C0CB07DDD61E3A71F1681F4944E5C48B2E0FE0CFC86D6C2388CA7EE0FE22BA11F9DBD4CBE
2,959,144 UART: [art] SIG.R = 2E520975D8EB2958A34AB36B64647197B49F2DD9A13F6F7299D550FFD6B4C10182D31B6A4FC5907FD4D172C873F136FB
2,965,912 UART: [art] SIG.S = E6265C74577753F366393D064F297C15E2B8DFFD811C90D22A012AA4F24C4626EE9AEB7B7597199DEC52BCBBEB6EBCA9
2,990,901 UART: Caliptra RT
2,991,154 UART: [state] CFI Enabled
3,100,099 UART: [rt] RT listening for mailbox commands...
3,100,769 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,591 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,706 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,281 UART: [fwproc] Wait for Commands...
1,283,042 UART: [fwproc] Recv command 0x46574c44
1,283,775 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,426 >>> mbox cmd response: success
2,775,509 UART: [afmc] ++
2,775,677 UART: [afmc] CDI.KEYID = 6
2,776,040 UART: [afmc] SUBJECT.KEYID = 7
2,776,466 UART: [afmc] AUTHORITY.KEYID = 5
2,811,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,562 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,020 UART: [afmc] --
2,855,110 UART: [cold-reset] --
2,855,982 UART: [state] Locking Datavault
2,857,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,731 UART: [state] Locking ICCM
2,858,293 UART: [exit] Launching FMC @ 0x40000130
2,863,622 UART:
2,863,638 UART: Running Caliptra FMC ...
2,864,046 UART:
2,864,189 UART: [state] CFI Enabled
2,875,048 UART: [fht] FMC Alias Private Key: 7
2,983,421 UART: [art] Extend RT PCRs Done
2,983,849 UART: [art] Lock RT PCRs Done
2,985,329 UART: [art] Populate DV Done
2,993,402 UART: [fht] FMC Alias Private Key: 7
2,994,360 UART: [art] Derive CDI
2,994,640 UART: [art] Store in in slot 0x4
3,080,533 UART: [art] Derive Key Pair
3,080,893 UART: [art] Store priv key in slot 0x5
3,094,025 UART: [art] Derive Key Pair - Done
3,108,751 UART: [art] Signing Cert with AUTHO
3,109,231 UART: RITY.KEYID = 7
3,124,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,324 UART: [art] PUB.X = E5042401DE759DF1364D2FF093C1D468343EF1C397A3D7012D6469DB24849AC73564F94A114DF42918D0538710B7D369
3,132,077 UART: [art] PUB.Y = 9654F0BA74B186525CE192350BD576E188C3E8E0C7E26704B447F783CAC36F7835D35F743BE1A1E164AD3451F8FDA99E
3,139,025 UART: [art] SIG.R = 402F3822E19612D35092154C0DCCCD27CE53E9D74C083768B453ACAE29210F48568AEDD09B5BC4B4DE7B6D86D7241F10
3,145,792 UART: [art] SIG.S = DC94B32AEE08E48F62AEA39BC311ED116F2F3333D2C5DC6E32CA17967D0A13C32BA8BCC40AEB8027B83270C05AEEF711
3,169,438 UART: Caliptra RT
3,169,783 UART: [state] CFI Enabled
3,278,350 UART: [rt] RT listening for mailbox commands...
3,279,020 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,586 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,073 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 ready_for_fw is high
1,056,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,956 >>> mbox cmd response: success
2,686,806 UART:
2,686,822 UART: Running Caliptra FMC ...
2,687,230 UART:
2,687,373 UART: [state] CFI Enabled
2,697,680 UART: [fht] FMC Alias Private Key: 7
2,806,063 UART: [art] Extend RT PCRs Done
2,806,491 UART: [art] Lock RT PCRs Done
2,807,979 UART: [art] Populate DV Done
2,816,234 UART: [fht] FMC Alias Private Key: 7
2,817,256 UART: [art] Derive CDI
2,817,536 UART: [art] Store in in slot 0x4
2,903,157 UART: [art] Derive Key Pair
2,903,517 UART: [art] Store priv key in slot 0x5
2,917,217 UART: [art] Derive Key Pair - Done
2,931,632 UART: [art] Signing Cert with AUTHO
2,932,112 UART: RITY.KEYID = 7
2,947,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,157 UART: [art] PUB.X = AE05D8E78235DFB004BBDB636881F23C2E10EC8C788F0AF37A1BB47A01CCB487603E99D0B1D03A71B167FDB1C3A67EE8
2,954,933 UART: [art] PUB.Y = 8F88794B6C124FA07CCBD808FC9F437FF5145AC532490E6EACEE731CE97F1556ADFFFF74293E83017BCF7E4E63DD5E79
2,961,892 UART: [art] SIG.R = A8752B4431902BD2A579B0755ED536848DAD23501B167AE4B4E1374A1B37271EE222E37821B814D9B897E9DFB9165A3F
2,968,660 UART: [art] SIG.S = F224CB4BDF4BB19E108CF3373DBBA475EC474BC938A655B221A9AC9B0EB4437184CEE6644635881DAE152F1019596074
2,992,544 UART: Caliptra RT
2,992,889 UART: [state] CFI Enabled
3,100,015 UART: [rt] RT listening for mailbox commands...
3,100,685 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,321 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,720 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,441 UART: [kat] SHA2-256
892,379 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,303 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,338 UART: [idev] Erasing UDS.KEYID = 0
1,504,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,012 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,731 UART: [ldev] Erasing FE.KEYID = 1
1,545,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,094 UART: [ldev] --
1,585,385 UART: [fwproc] Waiting for Commands...
1,586,014 UART: [fwproc] Received command 0x46574c44
1,586,805 UART: [fwproc] Received Image of size 114332 bytes
2,883,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,015 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,330 >>> mbox cmd response: success
3,078,486 UART: [afmc] ++
3,078,654 UART: [afmc] CDI.KEYID = 6
3,079,016 UART: [afmc] SUBJECT.KEYID = 7
3,079,441 UART: [afmc] AUTHORITY.KEYID = 5
3,114,694 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,038 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,431 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,121 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,946 UART: [afmc] --
3,157,880 UART: [cold-reset] --
3,158,660 UART: [state] Locking Datavault
3,159,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,183 UART: [state] Locking ICCM
3,160,757 UART: [exit] Launching FMC @ 0x40000130
3,166,086 UART:
3,166,102 UART: Running Caliptra FMC ...
3,166,510 UART:
3,166,564 UART: [state] CFI Enabled
3,177,055 UART: [fht] FMC Alias Private Key: 7
3,284,824 UART: [art] Extend RT PCRs Done
3,285,252 UART: [art] Lock RT PCRs Done
3,286,786 UART: [art] Populate DV Done
3,295,091 UART: [fht] FMC Alias Private Key: 7
3,296,127 UART: [art] Derive CDI
3,296,407 UART: [art] Store in in slot 0x4
3,382,144 UART: [art] Derive Key Pair
3,382,504 UART: [art] Store priv key in slot 0x5
3,395,826 UART: [art] Derive Key Pair - Done
3,410,578 UART: [art] Signing Cert with AUTHO
3,411,058 UART: RITY.KEYID = 7
3,426,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,903 UART: [art] PUB.X = F796C5CC8EA45C7BB8134EC0BCCAAC02BAFAFED1592831247935143D3B5884C3E83687E89365C3544691DF343A7BB64F
3,433,680 UART: [art] PUB.Y = 37C46D2109403B95D1F6C1B5FE85A2D60BA787E37A9371ECB7C7470FCA8851A60BB906A37C6C25628FE60C55841891C2
3,440,614 UART: [art] SIG.R = F9DF02621B0D7AFA66967C96608C907C14D2FC8AB87C0096994D4C43FE7C54D30C3C289296D9EA8DEFB77E374C45FA92
3,447,363 UART: [art] SIG.S = D5CFA0DF56ED939B52D28388E579650EF7276C457C5F541BC41D2E1F408117527D51B2BE7F1002CE20B88BFAEFA85DDB
3,471,278 UART: Caliptra RT
3,471,531 UART: [state] CFI Enabled
3,578,881 UART: [rt] RT listening for mailbox commands...
3,579,551 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,309 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,894 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,731 ready_for_fw is high
1,362,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,606 >>> mbox cmd response: success
2,989,048 UART:
2,989,064 UART: Running Caliptra FMC ...
2,989,472 UART:
2,989,526 UART: [state] CFI Enabled
2,999,793 UART: [fht] FMC Alias Private Key: 7
3,107,212 UART: [art] Extend RT PCRs Done
3,107,640 UART: [art] Lock RT PCRs Done
3,109,046 UART: [art] Populate DV Done
3,117,369 UART: [fht] FMC Alias Private Key: 7
3,118,525 UART: [art] Derive CDI
3,118,805 UART: [art] Store in in slot 0x4
3,204,470 UART: [art] Derive Key Pair
3,204,830 UART: [art] Store priv key in slot 0x5
3,218,820 UART: [art] Derive Key Pair - Done
3,233,624 UART: [art] Signing Cert with AUTHO
3,234,104 UART: RITY.KEYID = 7
3,249,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,099 UART: [art] PUB.X = D4E9D4A14D2344111EFBE81570420C0E26F987FFBCB8392CC737C290E06CE9ECC4FB6A8DFF4F134FEA278DC02962C3B9
3,256,881 UART: [art] PUB.Y = 9BB2203897DC5CEC6D7E6642C1B17C66D458796B721365005DC8F3D37F3440E3AB63EB2B522101651949D0855A8DF0EC
3,263,806 UART: [art] SIG.R = 54D5EA81E5339B1556D7A16851F788B6215CE669567F6FE7CEDB495EE962A4C3F2B936AF81B3B78F0D4FCA0CC3F5BDA6
3,270,586 UART: [art] SIG.S = AD44924AAF3B50D25AD923EC789BDA6ABC2293B4900AFCB2BC02C1B2A458B4B456B01FB74EF4B04CEFD5EAF9DB4A9B30
3,294,781 UART: Caliptra RT
3,295,034 UART: [state] CFI Enabled
3,403,199 UART: [rt] RT listening for mailbox commands...
3,403,869 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,501 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,930 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,845 UART: [idev] ++
1,480,013 UART: [idev] CDI.KEYID = 6
1,480,373 UART: [idev] SUBJECT.KEYID = 7
1,480,797 UART: [idev] UDS.KEYID = 0
1,481,142 ready_for_fw is high
1,481,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,713 UART: [idev] Erasing UDS.KEYID = 0
1,505,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,309 UART: [idev] --
1,515,236 UART: [ldev] ++
1,515,404 UART: [ldev] CDI.KEYID = 6
1,515,767 UART: [ldev] SUBJECT.KEYID = 5
1,516,193 UART: [ldev] AUTHORITY.KEYID = 7
1,516,656 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,547,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,811 UART: [ldev] --
1,587,134 UART: [fwproc] Waiting for Commands...
1,587,751 UART: [fwproc] Received command 0x46574c44
1,588,542 UART: [fwproc] Received Image of size 114332 bytes
2,886,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,283 >>> mbox cmd response: success
3,080,457 UART: [afmc] ++
3,080,625 UART: [afmc] CDI.KEYID = 6
3,080,987 UART: [afmc] SUBJECT.KEYID = 7
3,081,412 UART: [afmc] AUTHORITY.KEYID = 5
3,116,817 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,205 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,818 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,508 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,247 UART: [afmc] --
3,160,287 UART: [cold-reset] --
3,160,821 UART: [state] Locking Datavault
3,161,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,324 UART: [state] Locking ICCM
3,162,916 UART: [exit] Launching FMC @ 0x40000130
3,168,245 UART:
3,168,261 UART: Running Caliptra FMC ...
3,168,669 UART:
3,168,812 UART: [state] CFI Enabled
3,179,775 UART: [fht] FMC Alias Private Key: 7
3,287,992 UART: [art] Extend RT PCRs Done
3,288,420 UART: [art] Lock RT PCRs Done
3,289,796 UART: [art] Populate DV Done
3,297,897 UART: [fht] FMC Alias Private Key: 7
3,298,957 UART: [art] Derive CDI
3,299,237 UART: [art] Store in in slot 0x4
3,384,708 UART: [art] Derive Key Pair
3,385,068 UART: [art] Store priv key in slot 0x5
3,398,298 UART: [art] Derive Key Pair - Done
3,413,132 UART: [art] Signing Cert with AUTHO
3,413,612 UART: RITY.KEYID = 7
3,428,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,737 UART: [art] PUB.X = 3B1C372582BDFA3EEE0B6E790A11BB53C088848CA99F9746A95FDF277C1C88C08D4585EAFCBE70AED145F40D76445FF2
3,436,514 UART: [art] PUB.Y = D20675933DE172019BCE451346EEE07928AF287D5840BEA553111C5458E5FCC2EC15716E2D3CF6D3E72F1ABED3E8CD22
3,443,468 UART: [art] SIG.R = A3E6EB9A99B214EC1DBA8B9AE78081B7FB4A46FBB2E9D67E6F7BC4151D47AAD1877D5528F5168ACE17AC02C0372AAB3F
3,450,259 UART: [art] SIG.S = 22BEE541534B300C6F44A8C644C5C7705D09CBCA1E1AFE473383C6A6A2E113FC278021C57C21D085A72BC00B78FE9E83
3,473,995 UART: Caliptra RT
3,474,340 UART: [state] CFI Enabled
3,581,579 UART: [rt] RT listening for mailbox commands...
3,582,249 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,829 UART: [rt]cmd =0x4c4d5356, len=1672
3,875,336 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,694 ready_for_fw is high
1,362,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,919 >>> mbox cmd response: success
2,990,749 UART:
2,990,765 UART: Running Caliptra FMC ...
2,991,173 UART:
2,991,316 UART: [state] CFI Enabled
3,001,725 UART: [fht] FMC Alias Private Key: 7
3,110,218 UART: [art] Extend RT PCRs Done
3,110,646 UART: [art] Lock RT PCRs Done
3,112,594 UART: [art] Populate DV Done
3,120,741 UART: [fht] FMC Alias Private Key: 7
3,121,907 UART: [art] Derive CDI
3,122,187 UART: [art] Store in in slot 0x4
3,208,312 UART: [art] Derive Key Pair
3,208,672 UART: [art] Store priv key in slot 0x5
3,221,816 UART: [art] Derive Key Pair - Done
3,237,090 UART: [art] Signing Cert with AUTHO
3,237,570 UART: RITY.KEYID = 7
3,252,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,629 UART: [art] PUB.X = B68E36E57DE5DF48153808FC4F3749024288559BF33C57D3E6312D0A6190B99154E0DB50B4A4D27DB58A18A3E1F9BECA
3,260,396 UART: [art] PUB.Y = F19801F45659AB9BCFCF8B235AA0FBC33E409B87A334D99C06615D666052509FD1A4C15EE2C911D38D640C2AF89E65CD
3,267,347 UART: [art] SIG.R = 385F17E58DEDD462CCA2E8CA340D7CD935309A4DD01D40D5D9321349DD3C8F17CAF065015C93F5BB06740E2C7D20CA18
3,274,117 UART: [art] SIG.S = 0FCE251111856EE7DDF43489C08FBF9EF1A59DFABE64FEE165E1A80D750A5118749F10409C43532B5FFAFF4FE508B9E4
3,298,142 UART: Caliptra RT
3,298,487 UART: [state] CFI Enabled
3,406,783 UART: [rt] RT listening for mailbox commands...
3,407,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,165 UART: [rt]cmd =0x4c4d5356, len=1672
3,700,538 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,784 UART: [kat] SHA2-512-ACC
908,685 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,133 UART: [cold-reset] ++
1,172,617 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 ready_for_fw is high
1,176,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,110 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,447 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,814 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,123 UART: [ldev] --
1,282,406 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,297 >>> mbox cmd response: success
2,776,335 UART: [afmc] ++
2,776,503 UART: [afmc] CDI.KEYID = 6
2,776,865 UART: [afmc] SUBJECT.KEYID = 7
2,777,290 UART: [afmc] AUTHORITY.KEYID = 5
2,812,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,202 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,815 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,534 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,198 UART: [afmc] --
2,855,204 UART: [cold-reset] --
2,856,284 UART: [state] Locking Datavault
2,857,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,269 UART: [state] Locking ICCM
2,858,873 UART: [exit] Launching FMC @ 0x40000130
2,864,202 UART:
2,864,218 UART: Running Caliptra FMC ...
2,864,626 UART:
2,864,680 UART: [state] CFI Enabled
2,875,035 UART: [fht] FMC Alias Private Key: 7
2,983,164 UART: [art] Extend RT PCRs Done
2,983,592 UART: [art] Lock RT PCRs Done
2,985,000 UART: [art] Populate DV Done
2,993,207 UART: [fht] FMC Alias Private Key: 7
2,994,249 UART: [art] Derive CDI
2,994,529 UART: [art] Store in in slot 0x4
3,080,380 UART: [art] Derive Key Pair
3,080,740 UART: [art] Store priv key in slot 0x5
3,093,256 UART: [art] Derive Key Pair - Done
3,107,738 UART: [art] Signing Cert with AUTHO
3,108,218 UART: RITY.KEYID = 7
3,123,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,329 UART: [art] PUB.X = 76E8A6CAE635D4C8FDF96956EF655800E0EAD67C9DE06770AD9F0B62D70A7EC1412A103250F91D4BE917AA8FCF067108
3,131,077 UART: [art] PUB.Y = A069E442251508E128FBB19B63D547C5FDE5431F2CCCB13EBA51C2CF915675ED0CDBB1AD67A0E03DBD14019FFF82EA9C
3,138,040 UART: [art] SIG.R = A49EB7AA35D0AB975CEC5A31D9ECB8C99C35746153791E6AAB5F382C74BC32791E7D4F6FCD301C544B06E3E317782E11
3,144,819 UART: [art] SIG.S = FB98D8785237AC6CA9B3E1B6D18407B101E7CDA170FB59E21D4D07A33E7D1BBA144E6D05139D6F4944160F0F04CB6980
3,168,241 UART: Caliptra RT
3,168,494 UART: [state] CFI Enabled
3,275,746 UART: [rt] RT listening for mailbox commands...
3,276,416 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,196 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,065 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,451 ready_for_fw is high
1,060,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,418 >>> mbox cmd response: success
2,688,766 UART:
2,688,782 UART: Running Caliptra FMC ...
2,689,190 UART:
2,689,244 UART: [state] CFI Enabled
2,699,581 UART: [fht] FMC Alias Private Key: 7
2,806,822 UART: [art] Extend RT PCRs Done
2,807,250 UART: [art] Lock RT PCRs Done
2,808,894 UART: [art] Populate DV Done
2,816,941 UART: [fht] FMC Alias Private Key: 7
2,818,113 UART: [art] Derive CDI
2,818,393 UART: [art] Store in in slot 0x4
2,904,146 UART: [art] Derive Key Pair
2,904,506 UART: [art] Store priv key in slot 0x5
2,917,440 UART: [art] Derive Key Pair - Done
2,932,554 UART: [art] Signing Cert with AUTHO
2,933,034 UART: RITY.KEYID = 7
2,948,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,381 UART: [art] PUB.X = 3B4EED1B72BF93345C8B33AAC2731D6322CC9DBCB2AB28893ECB15ECD5454A2BB9F5D3AA76D8CD3BB26927BA265F835D
2,956,175 UART: [art] PUB.Y = 420A79B71BA57B62D74B3BD3785B7497F1036D5474DED735ABE34311A665BE0E9FF69C54FB0585E9C77FA9B63CBE6132
2,963,121 UART: [art] SIG.R = 449EBC0F4C121D62D04FE285C409CB7B0FB282E0101FCCB60157C0F0FE227A37D172086C4C16BA4A6188FE46E32787A0
2,969,884 UART: [art] SIG.S = 82A18165932E2EAF65598FC214E9A62EAF0AD330D5C1DD8A9138BE9D1E6395AC7E7689C5DD6D31E750511C41282956A1
2,994,132 UART: Caliptra RT
2,994,385 UART: [state] CFI Enabled
3,101,848 UART: [rt] RT listening for mailbox commands...
3,102,518 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,178 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,771 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,795 UART: [kat] HMAC-384Kdf
923,465 UART: [kat] LMS
1,171,793 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,845 UART: [idev] ++
1,176,013 UART: [idev] CDI.KEYID = 6
1,176,373 UART: [idev] SUBJECT.KEYID = 7
1,176,797 UART: [idev] UDS.KEYID = 0
1,177,142 ready_for_fw is high
1,177,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,589 UART: [idev] Erasing UDS.KEYID = 0
1,201,882 UART: [idev] Sha1 KeyId Algorithm
1,210,418 UART: [idev] --
1,211,466 UART: [ldev] ++
1,211,634 UART: [ldev] CDI.KEYID = 6
1,211,997 UART: [ldev] SUBJECT.KEYID = 5
1,212,423 UART: [ldev] AUTHORITY.KEYID = 7
1,212,886 UART: [ldev] FE.KEYID = 1
1,218,182 UART: [ldev] Erasing FE.KEYID = 1
1,244,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,514 UART: [ldev] --
1,283,897 UART: [fwproc] Wait for Commands...
1,284,513 UART: [fwproc] Recv command 0x46574c44
1,285,241 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,552 >>> mbox cmd response: success
2,776,622 UART: [afmc] ++
2,776,790 UART: [afmc] CDI.KEYID = 6
2,777,152 UART: [afmc] SUBJECT.KEYID = 7
2,777,577 UART: [afmc] AUTHORITY.KEYID = 5
2,813,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,869 UART: [afmc] --
2,856,903 UART: [cold-reset] --
2,857,873 UART: [state] Locking Datavault
2,859,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,712 UART: [state] Locking ICCM
2,860,334 UART: [exit] Launching FMC @ 0x40000130
2,865,663 UART:
2,865,679 UART: Running Caliptra FMC ...
2,866,087 UART:
2,866,230 UART: [state] CFI Enabled
2,876,573 UART: [fht] FMC Alias Private Key: 7
2,985,158 UART: [art] Extend RT PCRs Done
2,985,586 UART: [art] Lock RT PCRs Done
2,986,908 UART: [art] Populate DV Done
2,995,417 UART: [fht] FMC Alias Private Key: 7
2,996,391 UART: [art] Derive CDI
2,996,671 UART: [art] Store in in slot 0x4
3,081,932 UART: [art] Derive Key Pair
3,082,292 UART: [art] Store priv key in slot 0x5
3,095,684 UART: [art] Derive Key Pair - Done
3,110,529 UART: [art] Signing Cert with AUTHO
3,111,009 UART: RITY.KEYID = 7
3,125,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,614 UART: [art] PUB.X = A9E169300BBD060CAA57760695EE64CE1EE48172827571EDB3FF40433707DB396907F1FA07EC09A512935783954BA1E8
3,133,358 UART: [art] PUB.Y = 659C1C2CF864217118348162227B2EE09F117D816A7043AED706E160941D78D08ECA73E5B1F36BEA97F50A1CCEA63B49
3,140,304 UART: [art] SIG.R = 9040134E7345342FFE8FD1E50860434DC0DA7F8E755337042BB5F9515C0E8D1C0C148612D0603045BFE4BF27B2D1EFE4
3,147,064 UART: [art] SIG.S = 9C051944D4667CA4756A9CF17EB09824E38FDFFFA81FA5E9603BDB0289760170D332B3B940D51CA1A3723BB03981822E
3,170,386 UART: Caliptra RT
3,170,731 UART: [state] CFI Enabled
3,278,291 UART: [rt] RT listening for mailbox commands...
3,278,961 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,575 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,178 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,772 ready_for_fw is high
1,060,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,167 >>> mbox cmd response: success
2,689,281 UART:
2,689,297 UART: Running Caliptra FMC ...
2,689,705 UART:
2,689,848 UART: [state] CFI Enabled
2,700,115 UART: [fht] FMC Alias Private Key: 7
2,808,832 UART: [art] Extend RT PCRs Done
2,809,260 UART: [art] Lock RT PCRs Done
2,810,640 UART: [art] Populate DV Done
2,818,797 UART: [fht] FMC Alias Private Key: 7
2,819,863 UART: [art] Derive CDI
2,820,143 UART: [art] Store in in slot 0x4
2,905,412 UART: [art] Derive Key Pair
2,905,772 UART: [art] Store priv key in slot 0x5
2,918,536 UART: [art] Derive Key Pair - Done
2,933,364 UART: [art] Signing Cert with AUTHO
2,933,844 UART: RITY.KEYID = 7
2,949,232 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,997 UART: [art] PUB.X = 2D645D023AD79A11919CCE8F727C0904D2DCF4B5BC5640BA93114A165349E731DFB0F56D3C457B64D29B72258E13EFDF
2,956,766 UART: [art] PUB.Y = 3502343A5E5325037AB6E5BE0913E8A2232A465B555966C3BC2A18AF1F7F48C161B91425442243EAAB8F4ABED1030C5D
2,963,703 UART: [art] SIG.R = C3D3BE5AC2D2C923A2CF0BBC0514E8EA9AB015269D1E377DB0B0B000B6202288D0A04882F42EA84A3D6E8A53901BE3C1
2,970,459 UART: [art] SIG.S = 3693FCC99B5DE1B0FE5C2978FC9511366C591A7A7BAF55643F93780780782935EC646EF29195F7FDF8A62035643181C8
2,994,153 UART: Caliptra RT
2,994,498 UART: [state] CFI Enabled
3,103,317 UART: [rt] RT listening for mailbox commands...
3,103,987 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,815 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,374 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,173,689 ready_for_fw is high
1,173,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,216,358 UART: [ldev] Erasing FE.KEYID = 1
1,243,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,628 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,719 >>> mbox cmd response: success
2,774,922 UART: [afmc] ++
2,775,090 UART: [afmc] CDI.KEYID = 6
2,775,453 UART: [afmc] SUBJECT.KEYID = 7
2,775,879 UART: [afmc] AUTHORITY.KEYID = 5
2,811,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,825 UART: [afmc] --
2,854,889 UART: [cold-reset] --
2,855,897 UART: [state] Locking Datavault
2,857,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,998 UART: [state] Locking ICCM
2,858,512 UART: [exit] Launching FMC @ 0x40000130
2,863,841 UART:
2,863,857 UART: Running Caliptra FMC ...
2,864,265 UART:
2,864,319 UART: [state] CFI Enabled
2,874,910 UART: [fht] FMC Alias Private Key: 7
2,983,339 UART: [art] Extend RT PCRs Done
2,983,767 UART: [art] Lock RT PCRs Done
2,985,305 UART: [art] Populate DV Done
2,993,492 UART: [fht] FMC Alias Private Key: 7
2,994,666 UART: [art] Derive CDI
2,994,946 UART: [art] Store in in slot 0x4
3,080,443 UART: [art] Derive Key Pair
3,080,803 UART: [art] Store priv key in slot 0x5
3,094,081 UART: [art] Derive Key Pair - Done
3,108,589 UART: [art] Signing Cert with AUTHO
3,109,069 UART: RITY.KEYID = 7
3,123,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,716 UART: [art] PUB.X = FBA3C4B71A84E20CA803C982E090D48DD4A8A9A420D6B63BFFDB4F9394C369643D814FA74D33C3B8F803C4F13CE8A128
3,131,491 UART: [art] PUB.Y = 5FA761D13C32B14DBAC71CEE40494C5268FF583F0DF4742112A7261DCC1DEB31C5F0D56D33BC3C7CE588938246E6AFD1
3,138,452 UART: [art] SIG.R = 117A234C738D77A1B92381745D388BE8F0D91E17F26B3AB8F4C65F7C15BEE39B6693DCBDAE9D46FAF000BDA6B2FF87BF
3,145,220 UART: [art] SIG.S = 82762B5FCC3BC9965E33E36B6C60556DB953B0A7D0484E613FC04A2234BA9620A845603A19C71E2B4C89F638FAC795AE
3,168,557 UART: Caliptra RT
3,168,810 UART: [state] CFI Enabled
3,276,875 UART: [rt] RT listening for mailbox commands...
3,277,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,105 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,480 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,392 ready_for_fw is high
1,056,392 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,607 >>> mbox cmd response: success
2,685,051 UART:
2,685,067 UART: Running Caliptra FMC ...
2,685,475 UART:
2,685,529 UART: [state] CFI Enabled
2,695,814 UART: [fht] FMC Alias Private Key: 7
2,804,183 UART: [art] Extend RT PCRs Done
2,804,611 UART: [art] Lock RT PCRs Done
2,806,323 UART: [art] Populate DV Done
2,814,696 UART: [fht] FMC Alias Private Key: 7
2,815,716 UART: [art] Derive CDI
2,815,996 UART: [art] Store in in slot 0x4
2,902,021 UART: [art] Derive Key Pair
2,902,381 UART: [art] Store priv key in slot 0x5
2,915,471 UART: [art] Derive Key Pair - Done
2,930,357 UART: [art] Signing Cert with AUTHO
2,930,837 UART: RITY.KEYID = 7
2,946,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,856 UART: [art] PUB.X = 08B8A8FCD4C052F94C811F08E436879AF1EA5D9E5C4F9EA61A7BF6674F8E2DAD8E2116C47212BAC16B3A1AFE538CDA25
2,953,640 UART: [art] PUB.Y = 3FAD68C7E108F1E5DFFE07376DCC168F5941327AC8750F861C83E88DAE7642F2F0B6CB259A7BAD093BC280A2BEF63B33
2,960,594 UART: [art] SIG.R = DD18B385F80FE3E7D2E45F5D0E35D07EAB94A4782A58798362DB16F757748BB824D20E6B7B191331AD0586BDE51DD44C
2,967,360 UART: [art] SIG.S = 82C61E9443089BCEA1F103458A07077FE9B956EFFFD02FE37AC199EAD2736A2DBC7A34E86DA0561CABB630CF84D3992C
2,990,677 UART: Caliptra RT
2,990,930 UART: [state] CFI Enabled
3,099,384 UART: [rt] RT listening for mailbox commands...
3,100,054 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,022 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,553 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,016 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,175,086 ready_for_fw is high
1,175,086 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,142 UART: [idev] Sha1 KeyId Algorithm
1,209,146 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,243,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,062 >>> mbox cmd response: success
2,776,127 UART: [afmc] ++
2,776,295 UART: [afmc] CDI.KEYID = 6
2,776,658 UART: [afmc] SUBJECT.KEYID = 7
2,777,084 UART: [afmc] AUTHORITY.KEYID = 5
2,812,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,914 UART: [afmc] --
2,855,808 UART: [cold-reset] --
2,856,716 UART: [state] Locking Datavault
2,857,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,415 UART: [state] Locking ICCM
2,859,007 UART: [exit] Launching FMC @ 0x40000130
2,864,336 UART:
2,864,352 UART: Running Caliptra FMC ...
2,864,760 UART:
2,864,903 UART: [state] CFI Enabled
2,875,118 UART: [fht] FMC Alias Private Key: 7
2,983,491 UART: [art] Extend RT PCRs Done
2,983,919 UART: [art] Lock RT PCRs Done
2,985,437 UART: [art] Populate DV Done
2,993,650 UART: [fht] FMC Alias Private Key: 7
2,994,594 UART: [art] Derive CDI
2,994,874 UART: [art] Store in in slot 0x4
3,080,293 UART: [art] Derive Key Pair
3,080,653 UART: [art] Store priv key in slot 0x5
3,093,809 UART: [art] Derive Key Pair - Done
3,108,510 UART: [art] Signing Cert with AUTHO
3,108,990 UART: RITY.KEYID = 7
3,124,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,317 UART: [art] PUB.X = A6E26AC5429BDE774A2768754EBE279E243BDAA52648B8D42B759330410FFF56FD63ED1AC71BBE74311F51B6FD84FEA5
3,132,098 UART: [art] PUB.Y = DCCE374A0960C29EFA3CC9786E8763231C3C1671E5FDBDB0BE5DBAECB45AD5A9A1544C87DCC1584F07FBBBF0C458D65D
3,139,070 UART: [art] SIG.R = 00B07CA0B8554540450CA08242F8598406DA1FDF9CA5AE5EFEE05F8843EB42A195F6B8DB88AF023E115BEDD2454D7004
3,145,816 UART: [art] SIG.S = 1348CD5CD1BCE18BB9453E5871A7F76A770931F993097B683E8488948E6C9AF5454CD294E50893B1FA8486817E0D36E6
3,169,389 UART: Caliptra RT
3,169,734 UART: [state] CFI Enabled
3,278,312 UART: [rt] RT listening for mailbox commands...
3,278,982 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,384 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,641 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,913 ready_for_fw is high
1,056,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,074 >>> mbox cmd response: success
2,684,206 UART:
2,684,222 UART: Running Caliptra FMC ...
2,684,630 UART:
2,684,773 UART: [state] CFI Enabled
2,695,268 UART: [fht] FMC Alias Private Key: 7
2,803,197 UART: [art] Extend RT PCRs Done
2,803,625 UART: [art] Lock RT PCRs Done
2,805,403 UART: [art] Populate DV Done
2,813,790 UART: [fht] FMC Alias Private Key: 7
2,814,760 UART: [art] Derive CDI
2,815,040 UART: [art] Store in in slot 0x4
2,900,541 UART: [art] Derive Key Pair
2,900,901 UART: [art] Store priv key in slot 0x5
2,914,315 UART: [art] Derive Key Pair - Done
2,928,780 UART: [art] Signing Cert with AUTHO
2,929,260 UART: RITY.KEYID = 7
2,944,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,315 UART: [art] PUB.X = C86CFF7FE5323B27F960773536FD64E1348C7F2E43CA4527D4FBE384F9767649EEC86D59A75ECA66918087548329524D
2,952,083 UART: [art] PUB.Y = 9A0A9A895BDD6F762100FF42B5B3B5BEF7B62019E2281838ADC33410E5370CC1E7332AD70DAB0EEC66576E188105D2DB
2,959,006 UART: [art] SIG.R = CDAE69AD6DD62EE6FA61FA7E8D5C5B25EBD0A105FE54C19CB8DD08699DC4ECB66E4C27C842FEF657063D77EF03A54187
2,965,790 UART: [art] SIG.S = 9401925935427A57CFE752D63C4CC2F882A8C9B7B829AC0CEABFCD90BDA633C351E753599E487DC9EB735418A9267C3C
2,989,651 UART: Caliptra RT
2,989,996 UART: [state] CFI Enabled
3,098,926 UART: [rt] RT listening for mailbox commands...
3,099,596 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,510 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,905 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,671 UART: [kat] SHA2-256
881,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,717 UART: [kat] ++
885,869 UART: [kat] sha1
890,037 UART: [kat] SHA2-256
891,975 UART: [kat] SHA2-384
894,724 UART: [kat] SHA2-512-ACC
896,625 UART: [kat] ECC-384
902,228 UART: [kat] HMAC-384Kdf
907,040 UART: [kat] LMS
1,475,236 UART: [kat] --
1,476,393 UART: [cold-reset] ++
1,476,773 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 ready_for_fw is high
1,480,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,098 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,070 UART: [idev] --
1,514,049 UART: [ldev] ++
1,514,217 UART: [ldev] CDI.KEYID = 6
1,514,580 UART: [ldev] SUBJECT.KEYID = 5
1,515,006 UART: [ldev] AUTHORITY.KEYID = 7
1,515,469 UART: [ldev] FE.KEYID = 1
1,520,601 UART: [ldev] Erasing FE.KEYID = 1
1,546,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,914 UART: [ldev] --
1,585,205 UART: [fwproc] Waiting for Commands...
1,586,028 UART: [fwproc] Received command 0x46574c44
1,586,819 UART: [fwproc] Received Image of size 114332 bytes
2,885,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,351 >>> mbox cmd response: success
3,078,351 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,079,573 UART: [afmc] ++
3,079,741 UART: [afmc] CDI.KEYID = 6
3,080,103 UART: [afmc] SUBJECT.KEYID = 7
3,080,528 UART: [afmc] AUTHORITY.KEYID = 5
3,115,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,344 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,034 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,971 UART: [afmc] --
3,159,073 UART: [cold-reset] --
3,159,891 UART: [state] Locking Datavault
3,161,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,674 UART: [state] Locking ICCM
3,162,176 UART: [exit] Launching FMC @ 0x40000130
3,167,505 UART:
3,167,521 UART: Running Caliptra FMC ...
3,167,929 UART:
3,167,983 UART: [state] CFI Enabled
3,178,700 UART: [fht] FMC Alias Private Key: 7
3,286,855 UART: [art] Extend RT PCRs Done
3,287,283 UART: [art] Lock RT PCRs Done
3,288,917 UART: [art] Populate DV Done
3,297,232 UART: [fht] FMC Alias Private Key: 7
3,298,226 UART: [art] Derive CDI
3,298,506 UART: [art] Store in in slot 0x4
3,384,361 UART: [art] Derive Key Pair
3,384,721 UART: [art] Store priv key in slot 0x5
3,398,109 UART: [art] Derive Key Pair - Done
3,412,871 UART: [art] Signing Cert with AUTHO
3,413,351 UART: RITY.KEYID = 7
3,428,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,616 UART: [art] PUB.X = 6BE2A6745B965C0D387B75406F55620DD646A33DE95032E5879F20172BD125A250D16388EFC94D3444178EFC01E09BB1
3,436,373 UART: [art] PUB.Y = 3582E0534AF4B66797B9306548867E5F77F22F512576814339FE486663FD8D9A402D14BD0B4C4A18B470F3D61E4244D9
3,443,310 UART: [art] SIG.R = C26C3F902466E03637E1F4D7B3E731D5A52DC5EDE07E0E1D78B558907B1FE36065D285C30706724F79637FDC1E0CE8AA
3,450,074 UART: [art] SIG.S = C1B4C2090B7A61CCFE5ECE1A428B8CBF6BAB2F267AED554483E364A74FA2839D6F7878EB16E32BBBE1167E2606149054
3,473,710 UART: Caliptra RT
3,473,963 UART: [state] CFI Enabled
3,581,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,714 >>> mbox cmd response: failed
3,594,714 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,912 UART: [rt]cmd =0x46505652, len=4
3,624,572 UART: [rt] FIPS Version
3,625,533 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 ready_for_fw is high
1,362,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,832 >>> mbox cmd response: success
2,925,832 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,987,680 UART:
2,987,696 UART: Running Caliptra FMC ...
2,988,104 UART:
2,988,158 UART: [state] CFI Enabled
2,998,355 UART: [fht] FMC Alias Private Key: 7
3,106,094 UART: [art] Extend RT PCRs Done
3,106,522 UART: [art] Lock RT PCRs Done
3,108,148 UART: [art] Populate DV Done
3,116,421 UART: [fht] FMC Alias Private Key: 7
3,117,471 UART: [art] Derive CDI
3,117,751 UART: [art] Store in in slot 0x4
3,203,234 UART: [art] Derive Key Pair
3,203,594 UART: [art] Store priv key in slot 0x5
3,216,930 UART: [art] Derive Key Pair - Done
3,231,576 UART: [art] Signing Cert with AUTHO
3,232,056 UART: RITY.KEYID = 7
3,247,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,067 UART: [art] PUB.X = 78402B82A15C6D36FF03188F8A0F3280FC00C638C170E8337250CB26B0B509997F98D132609E8E16A0845663E0D74B84
3,254,796 UART: [art] PUB.Y = 78B39E5C2E8DA81224A6D21DB09C188A82ECBEAFFD6FCCF0432295D5A8FA757A8AF05E30BF59F17CC29D7EAF139FE273
3,261,770 UART: [art] SIG.R = 08C8E681A9112EE9E87A6C9C522E94501552BB660CC2A52542EA73379C3A58F295C8C01BBE6C28C6F6CF68965586E828
3,268,534 UART: [art] SIG.S = 97C2B78A8D429D4D5C2F872F729C34C7F9229AFD5F47FBEAEDE85743980DFEF0B780E115E4CDB1E64A5DA02929391DB0
3,292,616 UART: Caliptra RT
3,292,869 UART: [state] CFI Enabled
3,401,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,041 >>> mbox cmd response: failed
3,414,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,249 UART: [rt]cmd =0x46505652, len=4
3,443,909 UART: [rt] FIPS Version
3,445,068 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,036 UART: [kat] SHA2-256
881,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,082 UART: [kat] ++
886,234 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,559 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,124 UART: [cold-reset] ++
1,476,696 UART: [fht] Storing FHT @ 0x50003400
1,479,447 UART: [idev] ++
1,479,615 UART: [idev] CDI.KEYID = 6
1,479,975 UART: [idev] SUBJECT.KEYID = 7
1,480,399 UART: [idev] UDS.KEYID = 0
1,480,744 ready_for_fw is high
1,480,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,327 UART: [idev] --
1,515,396 UART: [ldev] ++
1,515,564 UART: [ldev] CDI.KEYID = 6
1,515,927 UART: [ldev] SUBJECT.KEYID = 5
1,516,353 UART: [ldev] AUTHORITY.KEYID = 7
1,516,816 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,605 UART: [ldev] --
1,587,028 UART: [fwproc] Waiting for Commands...
1,587,705 UART: [fwproc] Received command 0x46574c44
1,588,496 UART: [fwproc] Received Image of size 114332 bytes
2,885,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,124 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,407 >>> mbox cmd response: success
3,078,407 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,079,433 UART: [afmc] ++
3,079,601 UART: [afmc] CDI.KEYID = 6
3,079,963 UART: [afmc] SUBJECT.KEYID = 7
3,080,388 UART: [afmc] AUTHORITY.KEYID = 5
3,115,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,547 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,275 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,160 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,850 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,879 UART: [afmc] --
3,158,761 UART: [cold-reset] --
3,159,657 UART: [state] Locking Datavault
3,160,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,522 UART: [state] Locking ICCM
3,162,082 UART: [exit] Launching FMC @ 0x40000130
3,167,411 UART:
3,167,427 UART: Running Caliptra FMC ...
3,167,835 UART:
3,167,978 UART: [state] CFI Enabled
3,178,571 UART: [fht] FMC Alias Private Key: 7
3,286,412 UART: [art] Extend RT PCRs Done
3,286,840 UART: [art] Lock RT PCRs Done
3,288,412 UART: [art] Populate DV Done
3,296,721 UART: [fht] FMC Alias Private Key: 7
3,297,767 UART: [art] Derive CDI
3,298,047 UART: [art] Store in in slot 0x4
3,383,376 UART: [art] Derive Key Pair
3,383,736 UART: [art] Store priv key in slot 0x5
3,397,366 UART: [art] Derive Key Pair - Done
3,412,230 UART: [art] Signing Cert with AUTHO
3,412,710 UART: RITY.KEYID = 7
3,427,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,647 UART: [art] PUB.X = B1028C70F49302AA784E52EE004AE75AB4B052E23360CCFD1843228A040E606E0E133B3121737BF2B7AAE089F8FD0E9E
3,435,383 UART: [art] PUB.Y = 052464CCC50727E520E543593E607C94D57BA88EC415AF990647C38CB3F9F50A8B41614CC620C5BC0F6C1883F3D3D6E6
3,442,320 UART: [art] SIG.R = 6438C789B8593DE0F79DB383FAD8386722B323A73DB929C5D49B49845B6848BCC6D7F657A7C1805493C91C645F2E75FB
3,449,090 UART: [art] SIG.S = 9661717675039BF3B320CC31212C49F31148970676C6956C31F526ACC5471186BB91A3255A7751C03C52A71D216FE061
3,473,245 UART: Caliptra RT
3,473,590 UART: [state] CFI Enabled
3,581,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,592 >>> mbox cmd response: failed
3,594,592 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,098 UART: [rt]cmd =0x46505652, len=4
3,624,758 UART: [rt] FIPS Version
3,625,835 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,830 ready_for_fw is high
1,363,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,997 >>> mbox cmd response: success
2,930,997 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,993,743 UART:
2,993,759 UART: Running Caliptra FMC ...
2,994,167 UART:
2,994,310 UART: [state] CFI Enabled
3,004,577 UART: [fht] FMC Alias Private Key: 7
3,113,014 UART: [art] Extend RT PCRs Done
3,113,442 UART: [art] Lock RT PCRs Done
3,114,842 UART: [art] Populate DV Done
3,123,091 UART: [fht] FMC Alias Private Key: 7
3,124,045 UART: [art] Derive CDI
3,124,325 UART: [art] Store in in slot 0x4
3,210,068 UART: [art] Derive Key Pair
3,210,428 UART: [art] Store priv key in slot 0x5
3,223,748 UART: [art] Derive Key Pair - Done
3,238,775 UART: [art] Signing Cert with AUTHO
3,239,255 UART: RITY.KEYID = 7
3,254,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,292 UART: [art] PUB.X = D591DE7C5C5464A54C26F382186E4E4F6DCB40AE5EE5A22C6BC39AE8853EA4F3AF43D3DC783FC00F48B4A8AB3717EF57
3,262,079 UART: [art] PUB.Y = EE5269C8EB442C16C7969C4ADACCF2A34F1518E32129853D19115D0975BA1656EC4153BF2F6909D50029123BCBD59792
3,269,001 UART: [art] SIG.R = 7F3DD98DCA759B3DD8F774CAFC521960FEB05C373778A92E2F217575B2FCB55B880F389C48CD4E2348D9BEE89A152D15
3,275,780 UART: [art] SIG.S = CF499BEA93A664444681359C4D09B12A19A07690827C50D97A2BCDC6900BE2526BEB29BEEB27C958D06989C0BE970EE2
3,299,210 UART: Caliptra RT
3,299,555 UART: [state] CFI Enabled
3,408,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,421,513 >>> mbox cmd response: failed
3,421,513 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,683 UART: [rt]cmd =0x46505652, len=4
3,451,343 UART: [rt] FIPS Version
3,452,396 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
918,384 UART: [kat] HMAC-384Kdf
923,186 UART: [kat] LMS
1,171,514 UART: [kat] --
1,172,379 UART: [cold-reset] ++
1,172,859 UART: [fht] FHT @ 0x50003400
1,175,588 UART: [idev] ++
1,175,756 UART: [idev] CDI.KEYID = 6
1,176,116 UART: [idev] SUBJECT.KEYID = 7
1,176,540 UART: [idev] UDS.KEYID = 0
1,176,885 ready_for_fw is high
1,176,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,797 UART: [idev] Sha1 KeyId Algorithm
1,210,259 UART: [idev] --
1,211,203 UART: [ldev] ++
1,211,371 UART: [ldev] CDI.KEYID = 6
1,211,734 UART: [ldev] SUBJECT.KEYID = 5
1,212,160 UART: [ldev] AUTHORITY.KEYID = 7
1,212,623 UART: [ldev] FE.KEYID = 1
1,217,613 UART: [ldev] Erasing FE.KEYID = 1
1,244,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,283,120 UART: [fwproc] Wait for Commands...
1,283,754 UART: [fwproc] Recv command 0x46574c44
1,284,482 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,985 >>> mbox cmd response: success
2,773,985 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,775,113 UART: [afmc] ++
2,775,281 UART: [afmc] CDI.KEYID = 6
2,775,643 UART: [afmc] SUBJECT.KEYID = 7
2,776,068 UART: [afmc] AUTHORITY.KEYID = 5
2,811,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,518 UART: [afmc] --
2,855,570 UART: [cold-reset] --
2,856,386 UART: [state] Locking Datavault
2,857,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,385 UART: [state] Locking ICCM
2,858,829 UART: [exit] Launching FMC @ 0x40000130
2,864,158 UART:
2,864,174 UART: Running Caliptra FMC ...
2,864,582 UART:
2,864,636 UART: [state] CFI Enabled
2,875,195 UART: [fht] FMC Alias Private Key: 7
2,983,716 UART: [art] Extend RT PCRs Done
2,984,144 UART: [art] Lock RT PCRs Done
2,985,548 UART: [art] Populate DV Done
2,994,009 UART: [fht] FMC Alias Private Key: 7
2,994,963 UART: [art] Derive CDI
2,995,243 UART: [art] Store in in slot 0x4
3,080,436 UART: [art] Derive Key Pair
3,080,796 UART: [art] Store priv key in slot 0x5
3,093,792 UART: [art] Derive Key Pair - Done
3,108,647 UART: [art] Signing Cert with AUTHO
3,109,127 UART: RITY.KEYID = 7
3,124,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,952 UART: [art] PUB.X = A731DF295C5338AB24E4D8F5BC2B09CE6D6CEF76266E937AC6CBF74C4DFCEF97E12D1A11F698BBA2D23E4376D8FBD609
3,131,740 UART: [art] PUB.Y = 7488091F20BD3D560C3F479B6FAD338211E0B2E9D419E7FACC5B8756A2DD8E3707257E5886C05224281B0F9AEB9F24D1
3,138,682 UART: [art] SIG.R = 3F6A6C3738F41979AE51A1900EFFE86518A6BC52DBECC4EFE9CF249500879E4FB6237386C2299A78DBDB894A26BFF573
3,145,439 UART: [art] SIG.S = F31F882908A7FAF0A6E4C39E94A60DE1EFEC215EA3198AD235D0D4DC488D9E2E8F2B53C655C93CE5C0B90F9D1BB8E3D7
3,169,105 UART: Caliptra RT
3,169,358 UART: [state] CFI Enabled
3,276,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,634 >>> mbox cmd response: failed
3,289,634 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,038 UART: [rt]cmd =0x46505652, len=4
3,319,698 UART: [rt] FIPS Version
3,320,739 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,487 ready_for_fw is high
1,059,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,394 >>> mbox cmd response: success
2,626,394 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,689,382 UART:
2,689,398 UART: Running Caliptra FMC ...
2,689,806 UART:
2,689,860 UART: [state] CFI Enabled
2,700,341 UART: [fht] FMC Alias Private Key: 7
2,808,196 UART: [art] Extend RT PCRs Done
2,808,624 UART: [art] Lock RT PCRs Done
2,810,088 UART: [art] Populate DV Done
2,818,315 UART: [fht] FMC Alias Private Key: 7
2,819,303 UART: [art] Derive CDI
2,819,583 UART: [art] Store in in slot 0x4
2,905,040 UART: [art] Derive Key Pair
2,905,400 UART: [art] Store priv key in slot 0x5
2,918,832 UART: [art] Derive Key Pair - Done
2,933,444 UART: [art] Signing Cert with AUTHO
2,933,924 UART: RITY.KEYID = 7
2,949,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,855 UART: [art] PUB.X = 5FA7D57AD15925F50097D0884215A58DF7D86BE8BA07F4033B2D270687D88C8BAEE4D938CAFC20501950E6837BA56D7F
2,956,600 UART: [art] PUB.Y = 3E91D8782BFD38AE16C629E9912DDC33612A705C68C1D3FB40016EBC2C467FB5FC525104C52015AE393A7A9A47DF14CB
2,963,554 UART: [art] SIG.R = 6002B6EA4B3B80FD24AB3D2DD63219047CB14DDA7FE20909B2F55D20AC8920BDD2A78A7B46A5FC98336003734A90E37E
2,970,319 UART: [art] SIG.S = 4CF384718D152EEA1F6251A73D1560E64FFA61A54CA89C70BAFB7836C60AF15BB920F23D846D5EBCA96E78C04580F97D
2,993,733 UART: Caliptra RT
2,993,986 UART: [state] CFI Enabled
3,102,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,114,974 >>> mbox cmd response: failed
3,114,974 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,302 UART: [rt]cmd =0x46505652, len=4
3,144,962 UART: [rt] FIPS Version
3,146,159 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
893,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,368 UART: [kat] ++
897,520 UART: [kat] sha1
901,600 UART: [kat] SHA2-256
903,540 UART: [kat] SHA2-384
906,193 UART: [kat] SHA2-512-ACC
908,094 UART: [kat] ECC-384
918,041 UART: [kat] HMAC-384Kdf
922,761 UART: [kat] LMS
1,171,089 UART: [kat] --
1,171,662 UART: [cold-reset] ++
1,172,222 UART: [fht] FHT @ 0x50003400
1,174,721 UART: [idev] ++
1,174,889 UART: [idev] CDI.KEYID = 6
1,175,249 UART: [idev] SUBJECT.KEYID = 7
1,175,673 UART: [idev] UDS.KEYID = 0
1,176,018 ready_for_fw is high
1,176,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,893 UART: [idev] Erasing UDS.KEYID = 0
1,201,022 UART: [idev] Sha1 KeyId Algorithm
1,209,498 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,242 UART: [ldev] Erasing FE.KEYID = 1
1,243,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,724 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,923 UART: [fwproc] Recv command 0x46574c44
1,284,651 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,874 >>> mbox cmd response: success
2,775,874 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,777,022 UART: [afmc] ++
2,777,190 UART: [afmc] CDI.KEYID = 6
2,777,552 UART: [afmc] SUBJECT.KEYID = 7
2,777,977 UART: [afmc] AUTHORITY.KEYID = 5
2,813,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,419 UART: [afmc] --
2,857,357 UART: [cold-reset] --
2,858,093 UART: [state] Locking Datavault
2,859,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,972 UART: [state] Locking ICCM
2,860,580 UART: [exit] Launching FMC @ 0x40000130
2,865,909 UART:
2,865,925 UART: Running Caliptra FMC ...
2,866,333 UART:
2,866,476 UART: [state] CFI Enabled
2,877,001 UART: [fht] FMC Alias Private Key: 7
2,985,402 UART: [art] Extend RT PCRs Done
2,985,830 UART: [art] Lock RT PCRs Done
2,987,186 UART: [art] Populate DV Done
2,995,447 UART: [fht] FMC Alias Private Key: 7
2,996,575 UART: [art] Derive CDI
2,996,855 UART: [art] Store in in slot 0x4
3,082,836 UART: [art] Derive Key Pair
3,083,196 UART: [art] Store priv key in slot 0x5
3,096,226 UART: [art] Derive Key Pair - Done
3,110,712 UART: [art] Signing Cert with AUTHO
3,111,192 UART: RITY.KEYID = 7
3,126,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,149 UART: [art] PUB.X = DDF75A2ED297883C71EE24D6BB44D269F1A8893F2E4040566BBE39D64BED4A10133BE3454546608646C2DDBDD59AB4EB
3,133,931 UART: [art] PUB.Y = 5A3669ADFC88232C43AAF55E1EFC4DD251CFB2427FB146FD374B43D9862BE941DE34780809030DA672FB88578AEE4DE6
3,140,881 UART: [art] SIG.R = EDB8494825D07D758C8F32665602B8AD89085FFA52AB34097B793A8CC5A85BFEAAB25A5943954B47C19D222B3605A023
3,147,641 UART: [art] SIG.S = A31E10ABE0E2BE00F3FCB8DE32F2748933A1A6DCBD8EB6BC8B780F5FD563C2F04E0E1C2306B4992FD8B31CF9D5222581
3,171,641 UART: Caliptra RT
3,171,986 UART: [state] CFI Enabled
3,279,428 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,292,455 >>> mbox cmd response: failed
3,292,455 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,699 UART: [rt]cmd =0x46505652, len=4
3,322,359 UART: [rt] FIPS Version
3,323,460 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 ready_for_fw is high
1,060,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,967 >>> mbox cmd response: success
2,627,967 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,690,735 UART:
2,690,751 UART: Running Caliptra FMC ...
2,691,159 UART:
2,691,302 UART: [state] CFI Enabled
2,701,737 UART: [fht] FMC Alias Private Key: 7
2,809,478 UART: [art] Extend RT PCRs Done
2,809,906 UART: [art] Lock RT PCRs Done
2,811,196 UART: [art] Populate DV Done
2,819,485 UART: [fht] FMC Alias Private Key: 7
2,820,657 UART: [art] Derive CDI
2,820,937 UART: [art] Store in in slot 0x4
2,906,668 UART: [art] Derive Key Pair
2,907,028 UART: [art] Store priv key in slot 0x5
2,920,158 UART: [art] Derive Key Pair - Done
2,934,899 UART: [art] Signing Cert with AUTHO
2,935,379 UART: RITY.KEYID = 7
2,950,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,086 UART: [art] PUB.X = A6B852D89D8231FBCFFFAAA4F3E74610D5645709D48A3DBE821C33A0FC1D4554F3D93DC54BC373ED00F8DED8D9F15DAC
2,957,855 UART: [art] PUB.Y = EB0BD3F46AFABD2B6959CD79A399AF372825C17E60130A5D19D1784ED411306C3EE8701B4ECBC9735C5DF8CE02A42FB0
2,964,812 UART: [art] SIG.R = E12E9E43C14E962A2EA6F71E771D092ACD449AC3FC536AE9E52154DCC0889408D8CF8FA15E6C1B839148A1F91E30B306
2,971,583 UART: [art] SIG.S = 0521F4D2AD31490DE5DFB33B3A083EC88F5661E393423A69EDE6C99467807FCCE742329BEB14ADFA25D59014BF741529
2,995,107 UART: Caliptra RT
2,995,452 UART: [state] CFI Enabled
3,104,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,640 >>> mbox cmd response: failed
3,116,640 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,132 UART: [rt]cmd =0x46505652, len=4
3,146,792 UART: [rt] FIPS Version
3,147,889 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 ready_for_fw is high
1,174,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,493 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,228 UART: [ldev] ++
1,209,396 UART: [ldev] CDI.KEYID = 6
1,209,760 UART: [ldev] SUBJECT.KEYID = 5
1,210,187 UART: [ldev] AUTHORITY.KEYID = 7
1,210,650 UART: [ldev] FE.KEYID = 1
1,215,554 UART: [ldev] Erasing FE.KEYID = 1
1,241,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,938 UART: [ldev] --
1,280,266 UART: [fwproc] Wait for Commands...
1,280,861 UART: [fwproc] Recv command 0x46574c44
1,281,594 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,209 >>> mbox cmd response: success
2,771,209 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,772,418 UART: [afmc] ++
2,772,586 UART: [afmc] CDI.KEYID = 6
2,772,949 UART: [afmc] SUBJECT.KEYID = 7
2,773,375 UART: [afmc] AUTHORITY.KEYID = 5
2,808,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,047 UART: [afmc] --
2,852,127 UART: [cold-reset] --
2,852,965 UART: [state] Locking Datavault
2,853,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,590 UART: [state] Locking ICCM
2,855,044 UART: [exit] Launching FMC @ 0x40000130
2,860,373 UART:
2,860,389 UART: Running Caliptra FMC ...
2,860,797 UART:
2,860,851 UART: [state] CFI Enabled
2,871,354 UART: [fht] FMC Alias Private Key: 7
2,978,529 UART: [art] Extend RT PCRs Done
2,978,957 UART: [art] Lock RT PCRs Done
2,980,643 UART: [art] Populate DV Done
2,988,860 UART: [fht] FMC Alias Private Key: 7
2,989,792 UART: [art] Derive CDI
2,990,072 UART: [art] Store in in slot 0x4
3,075,427 UART: [art] Derive Key Pair
3,075,787 UART: [art] Store priv key in slot 0x5
3,088,797 UART: [art] Derive Key Pair - Done
3,103,791 UART: [art] Signing Cert with AUTHO
3,104,271 UART: RITY.KEYID = 7
3,119,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,054 UART: [art] PUB.X = 2E895F523445A6D7B71744D1A0C5FB703DD9A0B535A73F9D318C460DB304B7DDB8B6B025DEB10DF4CC76B2ADEDD4F3F1
3,126,835 UART: [art] PUB.Y = DFBFAC284098C1979739859DC826D9F906E9931649D95E68CBCAEA1F77A661D2F74374487978691CBCAA7C294C261BFD
3,133,788 UART: [art] SIG.R = F196E3E8A60F1E145649603D283EE342757B135070B8A3F350DAA814235C102F2A7A22FB8B5CFB407518187CDD78C1C9
3,140,555 UART: [art] SIG.S = F7D6CBC08FD518D2C4003ADFD4B9A3033A3E4C2B6453B7712A7B6696F9903AF827FDF4BE0C1442E46F91C1F2690E1DFD
3,164,359 UART: Caliptra RT
3,164,612 UART: [state] CFI Enabled
3,271,650 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,337 >>> mbox cmd response: failed
3,284,337 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,793 UART: [rt]cmd =0x46505652, len=4
3,314,453 UART: [rt] FIPS Version
3,315,346 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 ready_for_fw is high
1,055,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,897 >>> mbox cmd response: success
2,619,897 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,681,763 UART:
2,681,779 UART: Running Caliptra FMC ...
2,682,187 UART:
2,682,241 UART: [state] CFI Enabled
2,692,720 UART: [fht] FMC Alias Private Key: 7
2,800,507 UART: [art] Extend RT PCRs Done
2,800,935 UART: [art] Lock RT PCRs Done
2,802,437 UART: [art] Populate DV Done
2,810,606 UART: [fht] FMC Alias Private Key: 7
2,811,566 UART: [art] Derive CDI
2,811,846 UART: [art] Store in in slot 0x4
2,897,475 UART: [art] Derive Key Pair
2,897,835 UART: [art] Store priv key in slot 0x5
2,910,581 UART: [art] Derive Key Pair - Done
2,925,343 UART: [art] Signing Cert with AUTHO
2,925,823 UART: RITY.KEYID = 7
2,940,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,430 UART: [art] PUB.X = 516723048701513A1C2BCF907A58A1CA0176A8F5A73CD44D4EEE64BC48E6AB915AA7D8C84B6B160BE98AC85DBFC34D16
2,948,202 UART: [art] PUB.Y = 71D84A0C035925064888786B26A67EC8DFFC430F962B0D2EB957051996597B0E329AF0BDD09086D48C6CA95E3710E508
2,955,124 UART: [art] SIG.R = 0DA5E60FDCEDE0017622A3BEA326DA0842BB6B1A269024B993B8C6F6E72F972C25BE644C5D6ACDE57F8532FFD71D8456
2,961,898 UART: [art] SIG.S = 3BBA5A614E30227095C0674A81AD1A06669C6E156EA6C18BB1CD2413EE8B5BDC8CDF36609BF0A2FAD488EEB07DDC11B5
2,986,182 UART: Caliptra RT
2,986,435 UART: [state] CFI Enabled
3,094,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,107,093 >>> mbox cmd response: failed
3,107,093 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,495 UART: [rt]cmd =0x46505652, len=4
3,137,155 UART: [rt] FIPS Version
3,138,118 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,749 UART: [kat] HMAC-384Kdf
920,285 UART: [kat] LMS
1,168,597 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,174,212 ready_for_fw is high
1,174,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,376 UART: [fwproc] Recv command 0x46574c44
1,283,109 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,542 >>> mbox cmd response: success
2,773,542 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,774,643 UART: [afmc] ++
2,774,811 UART: [afmc] CDI.KEYID = 6
2,775,174 UART: [afmc] SUBJECT.KEYID = 7
2,775,600 UART: [afmc] AUTHORITY.KEYID = 5
2,810,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,476 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,126 UART: [afmc] --
2,854,168 UART: [cold-reset] --
2,855,188 UART: [state] Locking Datavault
2,856,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,975 UART: [state] Locking ICCM
2,857,483 UART: [exit] Launching FMC @ 0x40000130
2,862,812 UART:
2,862,828 UART: Running Caliptra FMC ...
2,863,236 UART:
2,863,379 UART: [state] CFI Enabled
2,874,132 UART: [fht] FMC Alias Private Key: 7
2,981,773 UART: [art] Extend RT PCRs Done
2,982,201 UART: [art] Lock RT PCRs Done
2,984,073 UART: [art] Populate DV Done
2,992,222 UART: [fht] FMC Alias Private Key: 7
2,993,404 UART: [art] Derive CDI
2,993,684 UART: [art] Store in in slot 0x4
3,079,239 UART: [art] Derive Key Pair
3,079,599 UART: [art] Store priv key in slot 0x5
3,092,883 UART: [art] Derive Key Pair - Done
3,107,956 UART: [art] Signing Cert with AUTHO
3,108,436 UART: RITY.KEYID = 7
3,123,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,215 UART: [art] PUB.X = B7BA53E4F3C5431766BFF0C586D787AFEECF38AFC9E031406CC57D730CDF795FB9185A60691B82054A9FECB995D10C2E
3,130,992 UART: [art] PUB.Y = 6F6EB20FE5DF21E3910A17D959B0835FFC905376E1502F0C4A0735B47255BB36EAA2EC7D6D866DC0DBB1EEF684CAD428
3,137,946 UART: [art] SIG.R = E755E85AC67C5930B198777E02506F4F3409426C24CBC3D44614B250CE7B5C5AC52DD1843D4BCE5CCDDF274A14DAF544
3,144,720 UART: [art] SIG.S = 13A2DECF1ABAF385C71BC9AEEB6B8751766D3462564362D39D542116764B136C684B7EFB7F1ECFDE6062F2FB62740BA5
3,168,886 UART: Caliptra RT
3,169,231 UART: [state] CFI Enabled
3,276,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,223 >>> mbox cmd response: failed
3,289,223 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,711 UART: [rt]cmd =0x46505652, len=4
3,319,371 UART: [rt] FIPS Version
3,320,494 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 ready_for_fw is high
1,056,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,128 >>> mbox cmd response: success
2,623,128 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,686,482 UART:
2,686,498 UART: Running Caliptra FMC ...
2,686,906 UART:
2,687,049 UART: [state] CFI Enabled
2,697,532 UART: [fht] FMC Alias Private Key: 7
2,805,907 UART: [art] Extend RT PCRs Done
2,806,335 UART: [art] Lock RT PCRs Done
2,807,765 UART: [art] Populate DV Done
2,815,810 UART: [fht] FMC Alias Private Key: 7
2,816,976 UART: [art] Derive CDI
2,817,256 UART: [art] Store in in slot 0x4
2,902,699 UART: [art] Derive Key Pair
2,903,059 UART: [art] Store priv key in slot 0x5
2,916,385 UART: [art] Derive Key Pair - Done
2,931,416 UART: [art] Signing Cert with AUTHO
2,931,896 UART: RITY.KEYID = 7
2,946,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,729 UART: [art] PUB.X = 17E109CEA8AD5AAB87B8EDAF280407AC9B3774F43A0AD64BC9DBBE238EF449244039A6FCCCEC898D12971E391A4778A0
2,954,505 UART: [art] PUB.Y = 7345F19F85766191C489A2D632D7F312BEA3066CB8CA5D4969B29E2FD4F99796182FFFBE248B4C811F12A21BDD4154A2
2,961,456 UART: [art] SIG.R = 841B18302EE652C30D9E53565590491D5B2B3A6B45005F79B771D8F1106424D867AD88E5F8C949521AE6071103FD9198
2,968,183 UART: [art] SIG.S = 0F944C74E98C0761DD26C344A57BFE21D95803D3EBFC4A3BF150A82C23A51252E91DC7519DF476DC0CD9ED92E87C1439
2,991,456 UART: Caliptra RT
2,991,801 UART: [state] CFI Enabled
3,099,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,669 >>> mbox cmd response: failed
3,112,669 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,035 UART: [rt]cmd =0x46505652, len=4
3,142,695 UART: [rt] FIPS Version
3,143,748 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,021 UART: [kat] SHA2-256
881,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,067 UART: [kat] ++
886,219 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,504,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,374 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,187 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,590 UART: [ldev] --
1,585,985 UART: [fwproc] Waiting for Commands...
1,586,664 UART: [fwproc] Received command 0x46574c44
1,587,455 UART: [fwproc] Received Image of size 114332 bytes
2,885,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,951 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,128 >>> mbox cmd response: success
3,078,128 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,079,174 UART: [afmc] ++
3,079,342 UART: [afmc] CDI.KEYID = 6
3,079,704 UART: [afmc] SUBJECT.KEYID = 7
3,080,129 UART: [afmc] AUTHORITY.KEYID = 5
3,115,436 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,800 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,193 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,883 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,672 UART: [afmc] --
3,158,734 UART: [cold-reset] --
3,159,734 UART: [state] Locking Datavault
3,160,925 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,529 UART: [state] Locking ICCM
3,162,151 UART: [exit] Launching FMC @ 0x40000130
3,167,480 UART:
3,167,496 UART: Running Caliptra FMC ...
3,167,904 UART:
3,167,958 UART: [state] CFI Enabled
3,178,137 UART: [fht] FMC Alias Private Key: 7
3,286,244 UART: [art] Extend RT PCRs Done
3,286,672 UART: [art] Lock RT PCRs Done
3,288,130 UART: [art] Populate DV Done
3,296,189 UART: [fht] FMC Alias Private Key: 7
3,297,117 UART: [art] Derive CDI
3,297,397 UART: [art] Store in in slot 0x4
3,382,742 UART: [art] Derive Key Pair
3,383,102 UART: [art] Store priv key in slot 0x5
3,396,096 UART: [art] Derive Key Pair - Done
3,410,938 UART: [art] Signing Cert with AUTHO
3,411,418 UART: RITY.KEYID = 7
3,426,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,521 UART: [art] PUB.X = D3F31A55AED110EE564F8AA585A4E292D460021092FA3E43F5A6DA41DEFFE4C13B525B4CDFF8C509FEAA52FB3EEFD21D
3,434,313 UART: [art] PUB.Y = 0783834FCBFCD2F965757FC105FF02F2179CE2503293AFCC8CCBA62C5CA6A3997CE23ED9ACED45679E8E4C802ED25DD7
3,441,274 UART: [art] SIG.R = 76BAD2BBF7C3BAD0CB04A6DC6C3F92FF544818475DF27462FDF807760685C3F9AA9329A93FBAE02B81AFCCAEA526654C
3,448,057 UART: [art] SIG.S = 3C82324EB19D809A133413CC3E49B6719DA57E9DC8514023D0FD8B19C6800B67EFD1F70899E4A15ECAB44B452B650633
3,472,431 UART: Caliptra RT
3,472,684 UART: [state] CFI Enabled
3,581,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,504 UART: [rt]cmd =0xaabbccdd, len=4
3,613,416 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,592 >>> mbox cmd response: success
2,927,592 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,988,334 UART:
2,988,350 UART: Running Caliptra FMC ...
2,988,758 UART:
2,988,812 UART: [state] CFI Enabled
2,999,323 UART: [fht] FMC Alias Private Key: 7
3,107,608 UART: [art] Extend RT PCRs Done
3,108,036 UART: [art] Lock RT PCRs Done
3,109,544 UART: [art] Populate DV Done
3,117,555 UART: [fht] FMC Alias Private Key: 7
3,118,737 UART: [art] Derive CDI
3,119,017 UART: [art] Store in in slot 0x4
3,205,014 UART: [art] Derive Key Pair
3,205,374 UART: [art] Store priv key in slot 0x5
3,218,490 UART: [art] Derive Key Pair - Done
3,233,352 UART: [art] Signing Cert with AUTHO
3,233,832 UART: RITY.KEYID = 7
3,249,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,793 UART: [art] PUB.X = 60DABAD5FDBA81E1FD9103932AAF1D1EF833B07CE3D872533E43035BEA55693309FCB1A8AC8EBEC1EF37D317846834EB
3,256,574 UART: [art] PUB.Y = 00218219FE61FEE6FB0EDE39B7FA7C75DE7060B44C23F7F6C0691B7FF0FCB8D1B931AA4B9A819EBBCFC26158F5FB5687
3,263,521 UART: [art] SIG.R = 8E8A49F953143A274D008449CBCCA957D4389450E0C1358B94C3D910D74A49450650496E129439BB78B5AD82E54CDAA1
3,270,262 UART: [art] SIG.S = 5A63C48ACDDFB3AEAD180DF67B56C2369A58A59CDEE6849DF2C29B11364C10325FCD26075572A1029704F48B5FCF3194
3,294,375 UART: Caliptra RT
3,294,628 UART: [state] CFI Enabled
3,401,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,981 UART: [rt]cmd =0xaabbccdd, len=4
3,433,089 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,929 UART: [kat] LMS
1,476,125 UART: [kat] --
1,476,980 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,427 UART: [idev] ++
1,480,595 UART: [idev] CDI.KEYID = 6
1,480,955 UART: [idev] SUBJECT.KEYID = 7
1,481,379 UART: [idev] UDS.KEYID = 0
1,481,724 ready_for_fw is high
1,481,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,611 UART: [idev] Erasing UDS.KEYID = 0
1,506,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,137 UART: [idev] --
1,516,154 UART: [ldev] ++
1,516,322 UART: [ldev] CDI.KEYID = 6
1,516,685 UART: [ldev] SUBJECT.KEYID = 5
1,517,111 UART: [ldev] AUTHORITY.KEYID = 7
1,517,574 UART: [ldev] FE.KEYID = 1
1,522,630 UART: [ldev] Erasing FE.KEYID = 1
1,548,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,037 UART: [ldev] --
1,587,550 UART: [fwproc] Waiting for Commands...
1,588,403 UART: [fwproc] Received command 0x46574c44
1,589,194 UART: [fwproc] Received Image of size 114332 bytes
2,887,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,599 >>> mbox cmd response: success
3,080,599 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,081,665 UART: [afmc] ++
3,081,833 UART: [afmc] CDI.KEYID = 6
3,082,195 UART: [afmc] SUBJECT.KEYID = 7
3,082,620 UART: [afmc] AUTHORITY.KEYID = 5
3,118,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,559 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,952 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,642 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,505 UART: [afmc] --
3,161,513 UART: [cold-reset] --
3,162,103 UART: [state] Locking Datavault
3,163,162 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,766 UART: [state] Locking ICCM
3,164,270 UART: [exit] Launching FMC @ 0x40000130
3,169,599 UART:
3,169,615 UART: Running Caliptra FMC ...
3,170,023 UART:
3,170,166 UART: [state] CFI Enabled
3,180,891 UART: [fht] FMC Alias Private Key: 7
3,288,710 UART: [art] Extend RT PCRs Done
3,289,138 UART: [art] Lock RT PCRs Done
3,290,830 UART: [art] Populate DV Done
3,299,157 UART: [fht] FMC Alias Private Key: 7
3,300,175 UART: [art] Derive CDI
3,300,455 UART: [art] Store in in slot 0x4
3,386,380 UART: [art] Derive Key Pair
3,386,740 UART: [art] Store priv key in slot 0x5
3,399,974 UART: [art] Derive Key Pair - Done
3,414,954 UART: [art] Signing Cert with AUTHO
3,415,434 UART: RITY.KEYID = 7
3,430,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,851 UART: [art] PUB.X = AE948547BFC8319A68A28139ECDF8669F800EE0108096FBF891636F0336FA2F5AC09CF84C9F7D4C62C005CF432FC4284
3,437,571 UART: [art] PUB.Y = 9C7F880A0643BCFA53D6CAE4CE9FDAC96C853001AD9D7126DD2BDEAE395C9143B0E9258EB5D71CAE6DF1A146CD2DCFDF
3,444,544 UART: [art] SIG.R = 62787E26BB2907D2E38F148CEF8D06221B94695BCFE283BF7D4384E2894E163E97678A2CB4629222623DD3F13C51C9DA
3,451,308 UART: [art] SIG.S = E60D4C1FA838C32EF27F1B4E7786BDC021AE61E810DAA01BFB4E8ECF700CC5132319409DA8733F11555D75D3C11B631E
3,475,371 UART: Caliptra RT
3,475,716 UART: [state] CFI Enabled
3,583,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,401 UART: [rt]cmd =0xaabbccdd, len=4
3,614,517 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,936 ready_for_fw is high
1,362,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,379 >>> mbox cmd response: success
2,929,379 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,991,657 UART:
2,991,673 UART: Running Caliptra FMC ...
2,992,081 UART:
2,992,224 UART: [state] CFI Enabled
3,002,667 UART: [fht] FMC Alias Private Key: 7
3,110,560 UART: [art] Extend RT PCRs Done
3,110,988 UART: [art] Lock RT PCRs Done
3,112,504 UART: [art] Populate DV Done
3,120,733 UART: [fht] FMC Alias Private Key: 7
3,121,713 UART: [art] Derive CDI
3,121,993 UART: [art] Store in in slot 0x4
3,207,802 UART: [art] Derive Key Pair
3,208,162 UART: [art] Store priv key in slot 0x5
3,221,500 UART: [art] Derive Key Pair - Done
3,236,229 UART: [art] Signing Cert with AUTHO
3,236,709 UART: RITY.KEYID = 7
3,252,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,010 UART: [art] PUB.X = 6FC6CB715E14A88E01637E992AE012DCAC4D6799697EDAA5076D120905AC4CE927AC3D34B5CC9CA850D0036692C7B071
3,259,773 UART: [art] PUB.Y = DB422C44740C2B3C0B753C5243051C5CF0B0BC3C40AC0D2C8B0AE6B2A287D70D844215E99A6F32B3CA5B3F2A6BD3A534
3,266,719 UART: [art] SIG.R = 5184AD0C520D46EB336F7D8E812440C54EDC47FF2FD88CCFED449FAAA860B0FD274993E2E1BEC931A2EC76BBD89E75EA
3,273,507 UART: [art] SIG.S = C33878746E72CA077DC64B2087C1E81B1071435F4A67BE9DF79E68151B3B0C6F5749F7D1DD641EBC04C510FB11CA48F2
3,297,187 UART: Caliptra RT
3,297,532 UART: [state] CFI Enabled
3,405,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,935 UART: [rt]cmd =0xaabbccdd, len=4
3,437,015 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
893,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,887 UART: [kat] ++
898,039 UART: [kat] sha1
902,451 UART: [kat] SHA2-256
904,391 UART: [kat] SHA2-384
907,214 UART: [kat] SHA2-512-ACC
909,115 UART: [kat] ECC-384
918,704 UART: [kat] HMAC-384Kdf
923,296 UART: [kat] LMS
1,171,624 UART: [kat] --
1,172,517 UART: [cold-reset] ++
1,172,871 UART: [fht] FHT @ 0x50003400
1,175,500 UART: [idev] ++
1,175,668 UART: [idev] CDI.KEYID = 6
1,176,028 UART: [idev] SUBJECT.KEYID = 7
1,176,452 UART: [idev] UDS.KEYID = 0
1,176,797 ready_for_fw is high
1,176,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,386 UART: [idev] Erasing UDS.KEYID = 0
1,201,667 UART: [idev] Sha1 KeyId Algorithm
1,209,971 UART: [idev] --
1,210,919 UART: [ldev] ++
1,211,087 UART: [ldev] CDI.KEYID = 6
1,211,450 UART: [ldev] SUBJECT.KEYID = 5
1,211,876 UART: [ldev] AUTHORITY.KEYID = 7
1,212,339 UART: [ldev] FE.KEYID = 1
1,217,511 UART: [ldev] Erasing FE.KEYID = 1
1,243,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,955 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,284,096 UART: [fwproc] Recv command 0x46574c44
1,284,824 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,301 >>> mbox cmd response: success
2,774,301 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,775,339 UART: [afmc] ++
2,775,507 UART: [afmc] CDI.KEYID = 6
2,775,869 UART: [afmc] SUBJECT.KEYID = 7
2,776,294 UART: [afmc] AUTHORITY.KEYID = 5
2,812,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,582 UART: [afmc] --
2,855,554 UART: [cold-reset] --
2,856,340 UART: [state] Locking Datavault
2,857,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,101 UART: [state] Locking ICCM
2,858,663 UART: [exit] Launching FMC @ 0x40000130
2,863,992 UART:
2,864,008 UART: Running Caliptra FMC ...
2,864,416 UART:
2,864,470 UART: [state] CFI Enabled
2,874,807 UART: [fht] FMC Alias Private Key: 7
2,983,552 UART: [art] Extend RT PCRs Done
2,983,980 UART: [art] Lock RT PCRs Done
2,985,348 UART: [art] Populate DV Done
2,993,477 UART: [fht] FMC Alias Private Key: 7
2,994,427 UART: [art] Derive CDI
2,994,707 UART: [art] Store in in slot 0x4
3,080,200 UART: [art] Derive Key Pair
3,080,560 UART: [art] Store priv key in slot 0x5
3,093,604 UART: [art] Derive Key Pair - Done
3,108,532 UART: [art] Signing Cert with AUTHO
3,109,012 UART: RITY.KEYID = 7
3,124,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,991 UART: [art] PUB.X = 02C8A82719D3F717653A76693C0BD0EFE374D87B5293011D904AF19A32C7C241125729FF66E3A98B277FD01B5CA4EB98
3,131,752 UART: [art] PUB.Y = DC55943E309EF539DB6AA4A157C47267D97206A7954E13083761B2404D491FC34A481827BF84C89FD53F49CFB6189F70
3,138,692 UART: [art] SIG.R = D71E4B6ED1000BE87F64E0EE93E266651ED5D9834FF0E355181B1FAF5F95D4CB1D1AEDF68FF6AC76234F6157FBCB5464
3,145,455 UART: [art] SIG.S = 3C23B72E77B3EDD6404DBF447F4472D2BBB6AD64ACDD56ADB47225CAE56A6E4D77582CCEB0F714F41CEA4CFB898B9704
3,169,645 UART: Caliptra RT
3,169,898 UART: [state] CFI Enabled
3,277,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,377 UART: [rt]cmd =0xaabbccdd, len=4
3,309,503 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,879 ready_for_fw is high
1,059,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,304 >>> mbox cmd response: success
2,625,304 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,686,952 UART:
2,686,968 UART: Running Caliptra FMC ...
2,687,376 UART:
2,687,430 UART: [state] CFI Enabled
2,697,971 UART: [fht] FMC Alias Private Key: 7
2,806,046 UART: [art] Extend RT PCRs Done
2,806,474 UART: [art] Lock RT PCRs Done
2,807,798 UART: [art] Populate DV Done
2,815,967 UART: [fht] FMC Alias Private Key: 7
2,817,131 UART: [art] Derive CDI
2,817,411 UART: [art] Store in in slot 0x4
2,902,872 UART: [art] Derive Key Pair
2,903,232 UART: [art] Store priv key in slot 0x5
2,916,588 UART: [art] Derive Key Pair - Done
2,931,510 UART: [art] Signing Cert with AUTHO
2,931,990 UART: RITY.KEYID = 7
2,947,552 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,317 UART: [art] PUB.X = 3415D3CF9FCCB3A0A837371B2AF26088BE5339647A1ADA72CF3A24F50888F7480E1B0A644AFFCD3BFD0E861F3031C732
2,955,087 UART: [art] PUB.Y = 5E588A3D6F020C2ED0093B094E149E658B2C85B09D8E3842D35263A6F9E68E93719779B0C1E5E13F3DC629025466B82F
2,962,018 UART: [art] SIG.R = 741132F89CCBAFB2644F4EB12F9FE2A92DE0D8A55B74611492A6A3DC09FC19A742EA8578632F0FCBA8F2D4AF3809F5A9
2,968,795 UART: [art] SIG.S = 94B804E0BA0099ED81A016A71F839BB3D4099474A177064CF2FC9882DF975483EC5B9EA06C78A4C0D1EB5C6BAE616AF2
2,992,515 UART: Caliptra RT
2,992,768 UART: [state] CFI Enabled
3,100,959 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,221 UART: [rt]cmd =0xaabbccdd, len=4
3,132,201 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
894,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,138 UART: [kat] ++
898,290 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,083 UART: [kat] SHA2-512-ACC
908,984 UART: [kat] ECC-384
919,019 UART: [kat] HMAC-384Kdf
923,641 UART: [kat] LMS
1,171,969 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,201,396 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,962 UART: [ldev] Erasing FE.KEYID = 1
1,243,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,582 UART: [ldev] --
1,283,019 UART: [fwproc] Wait for Commands...
1,283,763 UART: [fwproc] Recv command 0x46574c44
1,284,491 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,146 >>> mbox cmd response: success
2,774,146 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,775,330 UART: [afmc] ++
2,775,498 UART: [afmc] CDI.KEYID = 6
2,775,860 UART: [afmc] SUBJECT.KEYID = 7
2,776,285 UART: [afmc] AUTHORITY.KEYID = 5
2,811,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,463 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,211 UART: [afmc] --
2,855,321 UART: [cold-reset] --
2,856,145 UART: [state] Locking Datavault
2,857,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,840 UART: [state] Locking ICCM
2,858,356 UART: [exit] Launching FMC @ 0x40000130
2,863,685 UART:
2,863,701 UART: Running Caliptra FMC ...
2,864,109 UART:
2,864,252 UART: [state] CFI Enabled
2,875,131 UART: [fht] FMC Alias Private Key: 7
2,983,376 UART: [art] Extend RT PCRs Done
2,983,804 UART: [art] Lock RT PCRs Done
2,985,270 UART: [art] Populate DV Done
2,993,529 UART: [fht] FMC Alias Private Key: 7
2,994,655 UART: [art] Derive CDI
2,994,935 UART: [art] Store in in slot 0x4
3,080,498 UART: [art] Derive Key Pair
3,080,858 UART: [art] Store priv key in slot 0x5
3,093,272 UART: [art] Derive Key Pair - Done
3,108,225 UART: [art] Signing Cert with AUTHO
3,108,705 UART: RITY.KEYID = 7
3,123,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,126 UART: [art] PUB.X = E73AF04E133911FE28DDB9C93E525C39DDE213FFA306CFA048BA5867F3010242DD6F5E4C6DF20B1AFF25CB976B886971
3,130,898 UART: [art] PUB.Y = 8AB2FF0843FC61478E641C00D6DF678FD65F5E754048F07F590D394DEB70870CF01F3BA0B45539107F75918402E63A6C
3,137,814 UART: [art] SIG.R = 1E17E8660E6055D9555B87F51C0EE764E8B6D4358EE71F746D55BFCC118428131B9A3FC13DF5B7FBD49B78591F77EA52
3,144,584 UART: [art] SIG.S = CF3BF14DA1C959765E2479DD314D873079E9369C30F257EBA251490B9F5FEF20067A1D99327E4BC0E56BA8398B433776
3,168,101 UART: Caliptra RT
3,168,446 UART: [state] CFI Enabled
3,277,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,365 UART: [rt]cmd =0xaabbccdd, len=4
3,308,499 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,664 ready_for_fw is high
1,060,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,755 >>> mbox cmd response: success
2,628,755 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,690,253 UART:
2,690,269 UART: Running Caliptra FMC ...
2,690,677 UART:
2,690,820 UART: [state] CFI Enabled
2,701,759 UART: [fht] FMC Alias Private Key: 7
2,810,184 UART: [art] Extend RT PCRs Done
2,810,612 UART: [art] Lock RT PCRs Done
2,812,326 UART: [art] Populate DV Done
2,820,469 UART: [fht] FMC Alias Private Key: 7
2,821,397 UART: [art] Derive CDI
2,821,677 UART: [art] Store in in slot 0x4
2,906,822 UART: [art] Derive Key Pair
2,907,182 UART: [art] Store priv key in slot 0x5
2,920,736 UART: [art] Derive Key Pair - Done
2,935,629 UART: [art] Signing Cert with AUTHO
2,936,109 UART: RITY.KEYID = 7
2,951,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,324 UART: [art] PUB.X = 32EDC4C3825B054AD6E5805B1DF43D8370303602FB7EC5252D92A4D2E338073CCECFFFD7B987808AF1EBCA659ADF8652
2,959,099 UART: [art] PUB.Y = 3769461865EE956BA0284FAFEC998D69B668C985B16BE00EFDC053FDE2048CB4778272E5E8E5CBAB5D13B63637D0E79B
2,966,053 UART: [art] SIG.R = EDBD5562EFC92D201D2D1F952A0325455DA113D1E457BA294D6CA23EA50CEED45F24625046680EDCC28299A2E5ACDF99
2,972,828 UART: [art] SIG.S = 40411299881C6C8547AA285F9D5BC466681CB1C665ECDE3D999598EF6616DAF3069DF900EFAB3F8318307AB44AE2A96A
2,996,684 UART: Caliptra RT
2,997,029 UART: [state] CFI Enabled
3,105,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,114 UART: [rt]cmd =0xaabbccdd, len=4
3,136,256 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,134 UART: [kat] LMS
1,168,446 UART: [kat] --
1,168,943 UART: [cold-reset] ++
1,169,431 UART: [fht] FHT @ 0x50003400
1,172,049 UART: [idev] ++
1,172,217 UART: [idev] CDI.KEYID = 6
1,172,578 UART: [idev] SUBJECT.KEYID = 7
1,173,003 UART: [idev] UDS.KEYID = 0
1,173,349 ready_for_fw is high
1,173,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,753 UART: [idev] Erasing UDS.KEYID = 0
1,197,609 UART: [idev] Sha1 KeyId Algorithm
1,206,533 UART: [idev] --
1,207,642 UART: [ldev] ++
1,207,810 UART: [ldev] CDI.KEYID = 6
1,208,174 UART: [ldev] SUBJECT.KEYID = 5
1,208,601 UART: [ldev] AUTHORITY.KEYID = 7
1,209,064 UART: [ldev] FE.KEYID = 1
1,214,246 UART: [ldev] Erasing FE.KEYID = 1
1,239,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,436 UART: [ldev] --
1,278,754 UART: [fwproc] Wait for Commands...
1,279,341 UART: [fwproc] Recv command 0x46574c44
1,280,074 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,737 >>> mbox cmd response: success
2,770,737 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,771,902 UART: [afmc] ++
2,772,070 UART: [afmc] CDI.KEYID = 6
2,772,433 UART: [afmc] SUBJECT.KEYID = 7
2,772,859 UART: [afmc] AUTHORITY.KEYID = 5
2,807,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,567 UART: [afmc] --
2,851,695 UART: [cold-reset] --
2,852,683 UART: [state] Locking Datavault
2,853,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,488 UART: [state] Locking ICCM
2,855,050 UART: [exit] Launching FMC @ 0x40000130
2,860,379 UART:
2,860,395 UART: Running Caliptra FMC ...
2,860,803 UART:
2,860,857 UART: [state] CFI Enabled
2,871,746 UART: [fht] FMC Alias Private Key: 7
2,978,909 UART: [art] Extend RT PCRs Done
2,979,337 UART: [art] Lock RT PCRs Done
2,980,843 UART: [art] Populate DV Done
2,988,896 UART: [fht] FMC Alias Private Key: 7
2,990,076 UART: [art] Derive CDI
2,990,356 UART: [art] Store in in slot 0x4
3,075,941 UART: [art] Derive Key Pair
3,076,301 UART: [art] Store priv key in slot 0x5
3,089,721 UART: [art] Derive Key Pair - Done
3,104,446 UART: [art] Signing Cert with AUTHO
3,104,926 UART: RITY.KEYID = 7
3,120,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,115 UART: [art] PUB.X = 81F0E580EB1F03BA39439E3D6DB84D4F54987D98D36E67C37C4953BA4DAFC0B7EF9491393FE84B6464ABBC7A6C1FA849
3,127,896 UART: [art] PUB.Y = 2E6C29E3CE027E919CAC1CE8E4C02CED06F830552D346A1B037F103873A9185AB2E683C8C1DFAD46F2C450E0006C0439
3,134,820 UART: [art] SIG.R = 9B8CEA9CE3DBD712CB00426C181EC55147E4315DE157245195A13FEEDB30121EAACEE83E72FF4C85A7858E487C309284
3,141,578 UART: [art] SIG.S = 5616098170A63566726125931E21CB5BEA10032B62A4BC3252A0825899A1EE877EDDD262543E15B4D9D03155DEDB405A
3,165,331 UART: Caliptra RT
3,165,584 UART: [state] CFI Enabled
3,273,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,823 UART: [rt]cmd =0xaabbccdd, len=4
3,304,659 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,436 ready_for_fw is high
1,056,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,645 >>> mbox cmd response: success
2,621,645 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,683,405 UART:
2,683,421 UART: Running Caliptra FMC ...
2,683,829 UART:
2,683,883 UART: [state] CFI Enabled
2,693,948 UART: [fht] FMC Alias Private Key: 7
2,801,853 UART: [art] Extend RT PCRs Done
2,802,281 UART: [art] Lock RT PCRs Done
2,803,619 UART: [art] Populate DV Done
2,811,826 UART: [fht] FMC Alias Private Key: 7
2,812,852 UART: [art] Derive CDI
2,813,132 UART: [art] Store in in slot 0x4
2,898,337 UART: [art] Derive Key Pair
2,898,697 UART: [art] Store priv key in slot 0x5
2,912,737 UART: [art] Derive Key Pair - Done
2,927,411 UART: [art] Signing Cert with AUTHO
2,927,891 UART: RITY.KEYID = 7
2,943,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,032 UART: [art] PUB.X = 50946BEB7D37DC242D200C194017DAD441ECDB3C9BB2FEBBE5CD3599E6F6F1E00F3D8E57BADB3169D777F407F1526C11
2,950,811 UART: [art] PUB.Y = B801E04677672D1652236E7656D149833B1A04B0B2C5F72E95627192BD150CEB4394C542B9C89939D08A2CACAFE0ADF3
2,957,752 UART: [art] SIG.R = 63BE718C26F9EA69C740333C4745830BF5D8ADAD3118A0F6D7ED4D950D89F10041A795999C141A1156F2515CA36C60F6
2,964,494 UART: [art] SIG.S = 9033301E34B515109C1AC6A28F966795E504769C406D5CF9A87AD2559B221FACDE4C58F90D279A956A6C4FE8CFE749D7
2,988,079 UART: Caliptra RT
2,988,332 UART: [state] CFI Enabled
3,096,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,419 UART: [rt]cmd =0xaabbccdd, len=4
3,127,377 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,174,882 ready_for_fw is high
1,174,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,756 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,421 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,169 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,310 >>> mbox cmd response: success
2,773,310 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,774,577 UART: [afmc] ++
2,774,745 UART: [afmc] CDI.KEYID = 6
2,775,108 UART: [afmc] SUBJECT.KEYID = 7
2,775,534 UART: [afmc] AUTHORITY.KEYID = 5
2,810,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,860 UART: [afmc] --
2,853,936 UART: [cold-reset] --
2,854,888 UART: [state] Locking Datavault
2,855,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,583 UART: [state] Locking ICCM
2,857,083 UART: [exit] Launching FMC @ 0x40000130
2,862,412 UART:
2,862,428 UART: Running Caliptra FMC ...
2,862,836 UART:
2,862,979 UART: [state] CFI Enabled
2,873,554 UART: [fht] FMC Alias Private Key: 7
2,981,557 UART: [art] Extend RT PCRs Done
2,981,985 UART: [art] Lock RT PCRs Done
2,983,673 UART: [art] Populate DV Done
2,992,108 UART: [fht] FMC Alias Private Key: 7
2,993,184 UART: [art] Derive CDI
2,993,464 UART: [art] Store in in slot 0x4
3,079,021 UART: [art] Derive Key Pair
3,079,381 UART: [art] Store priv key in slot 0x5
3,092,661 UART: [art] Derive Key Pair - Done
3,107,511 UART: [art] Signing Cert with AUTHO
3,107,991 UART: RITY.KEYID = 7
3,123,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,002 UART: [art] PUB.X = F7F8518EB783E0F88AF771F27D34D9141A118A3819407A8077A64C332811ACFBF2C0FEA62BA1CD50F1A4E95C22F005F6
3,130,777 UART: [art] PUB.Y = 6BB92CF5BF6147A7667B91373769236009D7F2B2468140B165F9A555BBFEE2C6787A9B8D3D1FE410013F44D5A2E5972E
3,137,721 UART: [art] SIG.R = 8D1317FB662960D6DB3CE93A40033C851B60A0DFCB7506DD635F7A1CE45E7AF4126A893E061C91AAB7D1B522C7F24B84
3,144,492 UART: [art] SIG.S = 890E1262E8CE47527BF64AC05B28858A0494A7CF28AA1484EE38BBA0C7F335ECABCC15AA18E8A53B120572412D8C3F22
3,168,044 UART: Caliptra RT
3,168,389 UART: [state] CFI Enabled
3,276,461 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,697 UART: [rt]cmd =0xaabbccdd, len=4
3,307,549 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,931 ready_for_fw is high
1,056,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,050 >>> mbox cmd response: success
2,623,050 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,684,906 UART:
2,684,922 UART: Running Caliptra FMC ...
2,685,330 UART:
2,685,473 UART: [state] CFI Enabled
2,696,446 UART: [fht] FMC Alias Private Key: 7
2,804,409 UART: [art] Extend RT PCRs Done
2,804,837 UART: [art] Lock RT PCRs Done
2,806,389 UART: [art] Populate DV Done
2,814,652 UART: [fht] FMC Alias Private Key: 7
2,815,690 UART: [art] Derive CDI
2,815,970 UART: [art] Store in in slot 0x4
2,901,939 UART: [art] Derive Key Pair
2,902,299 UART: [art] Store priv key in slot 0x5
2,915,911 UART: [art] Derive Key Pair - Done
2,930,607 UART: [art] Signing Cert with AUTHO
2,931,087 UART: RITY.KEYID = 7
2,946,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,746 UART: [art] PUB.X = A082000697C2D9066B0A5E1FBAB8336761FCE653ABFCABBB2EAA95346003CA604C599B25B99B214642DAFD2340C0F3B2
2,954,494 UART: [art] PUB.Y = 8697AC09EDB1131D52A56E9A47CA51E3F0190EC5F19DC74D7361CA4AA4D750083741309E6FCC61D4AABEC5DB4BE90986
2,961,446 UART: [art] SIG.R = 6B7EFD24713262B493FD308430346A02FEAB6286733C8C0653AF12906224A643A5BB23BB09DA6932EDC9463DA7232F5D
2,968,207 UART: [art] SIG.S = 29394665E93C26EEA4249B45BBF61004F8E0A2BD962C20602E2C5103712CC3392F1C5ECAA1C9E50BED2E4668C9BE7718
2,992,071 UART: Caliptra RT
2,992,416 UART: [state] CFI Enabled
3,099,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,307 UART: [rt]cmd =0xaabbccdd, len=4
3,131,259 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.02s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,597 UART: [cold-reset] ++
1,477,065 UART: [fht] Storing FHT @ 0x50003400
1,479,872 UART: [idev] ++
1,480,040 UART: [idev] CDI.KEYID = 6
1,480,400 UART: [idev] SUBJECT.KEYID = 7
1,480,824 UART: [idev] UDS.KEYID = 0
1,481,169 ready_for_fw is high
1,481,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,660 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,514,799 UART: [ldev] ++
1,514,967 UART: [ldev] CDI.KEYID = 6
1,515,330 UART: [ldev] SUBJECT.KEYID = 5
1,515,756 UART: [ldev] AUTHORITY.KEYID = 7
1,516,219 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,546,366 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,311 UART: [fwproc] Waiting for Commands...
1,585,962 UART: [fwproc] Received command 0x46574c44
1,586,753 UART: [fwproc] Received Image of size 114332 bytes
2,884,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,919 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,030 >>> mbox cmd response: success
3,079,270 UART: [afmc] ++
3,079,438 UART: [afmc] CDI.KEYID = 6
3,079,800 UART: [afmc] SUBJECT.KEYID = 7
3,080,225 UART: [afmc] AUTHORITY.KEYID = 5
3,115,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,003 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,693 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,698 UART: [afmc] --
3,158,816 UART: [cold-reset] --
3,159,974 UART: [state] Locking Datavault
3,161,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,929 UART: [state] Locking ICCM
3,162,497 UART: [exit] Launching FMC @ 0x40000130
3,167,826 UART:
3,167,842 UART: Running Caliptra FMC ...
3,168,250 UART:
3,168,304 UART: [state] CFI Enabled
3,178,787 UART: [fht] FMC Alias Private Key: 7
3,285,508 UART: [art] Extend RT PCRs Done
3,285,936 UART: [art] Lock RT PCRs Done
3,287,564 UART: [art] Populate DV Done
3,295,659 UART: [fht] FMC Alias Private Key: 7
3,296,615 UART: [art] Derive CDI
3,296,895 UART: [art] Store in in slot 0x4
3,382,616 UART: [art] Derive Key Pair
3,382,976 UART: [art] Store priv key in slot 0x5
3,395,558 UART: [art] Derive Key Pair - Done
3,410,360 UART: [art] Signing Cert with AUTHO
3,410,840 UART: RITY.KEYID = 7
3,426,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,807 UART: [art] PUB.X = 88803F7EDE25CFBAE5BF8F7E84F92F002001B97D72A62F0800024D296BC7447CAEAB173B7A4F23FF17894A1C0916F121
3,433,529 UART: [art] PUB.Y = 6C49D415DBB8AB663AB1728A5968761D8C3EBFB1CA6519EA5B170A02C7230E8A381B6A477C6DE9BF7F819D361EEB3AD6
3,440,486 UART: [art] SIG.R = 19C9F269309CC3075ACFC9B43AC3B06BD03C14C0936BA27043C804A2B8148E29186D803592577D350ADF8A6C76346958
3,447,243 UART: [art] SIG.S = C8735A14FAACF46BBCE18E2970EE7F70E88BB14E8638F76DA61B5AA5CC8B8D422345E0126E0B0564D9BE4FDCC726CC3B
3,471,190 UART: Caliptra RT
3,471,443 UART: [state] CFI Enabled
3,580,518 UART: [rt] RT listening for mailbox commands...
3,581,188 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,712 UART: [rt]cmd =0x434b4558, len=80
3,612,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 ready_for_fw is high
1,362,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,686 >>> mbox cmd response: success
2,986,724 UART:
2,986,740 UART: Running Caliptra FMC ...
2,987,148 UART:
2,987,202 UART: [state] CFI Enabled
2,997,367 UART: [fht] FMC Alias Private Key: 7
3,104,830 UART: [art] Extend RT PCRs Done
3,105,258 UART: [art] Lock RT PCRs Done
3,106,710 UART: [art] Populate DV Done
3,115,207 UART: [fht] FMC Alias Private Key: 7
3,116,359 UART: [art] Derive CDI
3,116,639 UART: [art] Store in in slot 0x4
3,202,342 UART: [art] Derive Key Pair
3,202,702 UART: [art] Store priv key in slot 0x5
3,216,516 UART: [art] Derive Key Pair - Done
3,231,105 UART: [art] Signing Cert with AUTHO
3,231,585 UART: RITY.KEYID = 7
3,247,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,868 UART: [art] PUB.X = A9F0BA1676F343C54A1246FCFF340008766D4213E179FF98B6D64476D8160072010FBB0FFE4D46210E4427EA75C03B73
3,254,577 UART: [art] PUB.Y = 5F94CC2A174A731F87718C10D85ADC5CBC3BAE9633E58F58DEBA4F6000B61D15025E19F6F75B6E23EAE5E1901B4625C9
3,261,514 UART: [art] SIG.R = 1A054F1B9D1FB766E933A3D73412DD11E5BBEC3D6C0C1509850095082493AE34D8021A442410869EA8107E7125C7F9D8
3,268,243 UART: [art] SIG.S = 4782CCB79DBEC65CDAA4A29C0AEDEA76C690541B2F6EBC50BCDFA92D89D0D881657F298DFC66337E092C58B67BF6896B
3,292,402 UART: Caliptra RT
3,292,655 UART: [state] CFI Enabled
3,401,015 UART: [rt] RT listening for mailbox commands...
3,401,685 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,991 UART: [rt]cmd =0x434b4558, len=80
3,433,038 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,886 UART: [kat] SHA2-256
892,824 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
902,863 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,542 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 ready_for_fw is high
1,480,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,275 UART: [idev] Erasing UDS.KEYID = 0
1,505,047 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,657 UART: [idev] --
1,514,836 UART: [ldev] ++
1,515,004 UART: [ldev] CDI.KEYID = 6
1,515,367 UART: [ldev] SUBJECT.KEYID = 5
1,515,793 UART: [ldev] AUTHORITY.KEYID = 7
1,516,256 UART: [ldev] FE.KEYID = 1
1,521,524 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,511 UART: [ldev] --
1,586,998 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 114332 bytes
2,886,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,727 >>> mbox cmd response: success
3,079,777 UART: [afmc] ++
3,079,945 UART: [afmc] CDI.KEYID = 6
3,080,307 UART: [afmc] SUBJECT.KEYID = 7
3,080,732 UART: [afmc] AUTHORITY.KEYID = 5
3,115,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,190 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,880 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,917 UART: [afmc] --
3,158,955 UART: [cold-reset] --
3,159,861 UART: [state] Locking Datavault
3,161,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,628 UART: [state] Locking ICCM
3,162,068 UART: [exit] Launching FMC @ 0x40000130
3,167,397 UART:
3,167,413 UART: Running Caliptra FMC ...
3,167,821 UART:
3,167,964 UART: [state] CFI Enabled
3,178,611 UART: [fht] FMC Alias Private Key: 7
3,286,948 UART: [art] Extend RT PCRs Done
3,287,376 UART: [art] Lock RT PCRs Done
3,288,570 UART: [art] Populate DV Done
3,296,839 UART: [fht] FMC Alias Private Key: 7
3,297,865 UART: [art] Derive CDI
3,298,145 UART: [art] Store in in slot 0x4
3,383,988 UART: [art] Derive Key Pair
3,384,348 UART: [art] Store priv key in slot 0x5
3,397,692 UART: [art] Derive Key Pair - Done
3,412,341 UART: [art] Signing Cert with AUTHO
3,412,821 UART: RITY.KEYID = 7
3,428,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,826 UART: [art] PUB.X = C70FAC35B565CAB04FADDC72198848928A637CE083914302011F87D972A9949149543FCE90E23C0E3C16BAF9703A6A4A
3,435,586 UART: [art] PUB.Y = 6E58C37C6A3577DC0016717D55096CD69BBDF67E222FB910838E085D34F77362FC050DBFD74774392CA08A91B4D88224
3,442,500 UART: [art] SIG.R = 7EEA85540001709DAC043BC08DB28198373E7C71682576996EA6BB3A36967D6B5B350BAC0E4C9968B2E4CAC3C8CA4342
3,449,240 UART: [art] SIG.S = 2ADBEEAEB6A1C5889E09C2C06AA042C8BBB5CAEB11335251B7E5EF8ED1C440BD8386E82D6755C5A889EC6F70D2849BF8
3,472,876 UART: Caliptra RT
3,473,221 UART: [state] CFI Enabled
3,579,991 UART: [rt] RT listening for mailbox commands...
3,580,661 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,857 UART: [rt]cmd =0x434b4558, len=80
3,611,896 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,310 ready_for_fw is high
1,362,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,813 >>> mbox cmd response: success
2,987,777 UART:
2,987,793 UART: Running Caliptra FMC ...
2,988,201 UART:
2,988,344 UART: [state] CFI Enabled
2,998,923 UART: [fht] FMC Alias Private Key: 7
3,107,220 UART: [art] Extend RT PCRs Done
3,107,648 UART: [art] Lock RT PCRs Done
3,109,182 UART: [art] Populate DV Done
3,117,593 UART: [fht] FMC Alias Private Key: 7
3,118,585 UART: [art] Derive CDI
3,118,865 UART: [art] Store in in slot 0x4
3,204,176 UART: [art] Derive Key Pair
3,204,536 UART: [art] Store priv key in slot 0x5
3,218,278 UART: [art] Derive Key Pair - Done
3,232,884 UART: [art] Signing Cert with AUTHO
3,233,364 UART: RITY.KEYID = 7
3,248,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,407 UART: [art] PUB.X = 6EE76D5AC1855AC3FEABC3AAFC0C33097F448370C78F22E130E4E930365541EF0BEFF8D55DD4106E5FBD604725DFF1CD
3,256,188 UART: [art] PUB.Y = E4816C12EA89CEBB20161D59E10D6713BB3EBD7E36C61AAD79FD0F1D76FB14C4B7197C5ABA15C83F6B313EAEFB534DCA
3,263,158 UART: [art] SIG.R = DFB2A65A5430DF0C1317E4454637B17DD3E0C91D806229B2DCE5624ABEA652CD264E8C98EF315F0E683C27B931777F30
3,269,928 UART: [art] SIG.S = AAC7365EB099512F964F76242DB677638FEB81CE072E4A9EE2A040CD2D9CBF59FF5AEFB27934F8F8CB0E919D8BC48009
3,293,894 UART: Caliptra RT
3,294,239 UART: [state] CFI Enabled
3,402,435 UART: [rt] RT listening for mailbox commands...
3,403,105 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,519 UART: [rt]cmd =0x434b4558, len=80
3,434,734 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,654 UART: [kat] SHA2-512-ACC
908,555 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,172,025 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,384 UART: [idev] ++
1,175,552 UART: [idev] CDI.KEYID = 6
1,175,912 UART: [idev] SUBJECT.KEYID = 7
1,176,336 UART: [idev] UDS.KEYID = 0
1,176,681 ready_for_fw is high
1,176,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,340 UART: [idev] Erasing UDS.KEYID = 0
1,201,421 UART: [idev] Sha1 KeyId Algorithm
1,209,811 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,302 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,515 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,792 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,341 >>> mbox cmd response: success
2,774,409 UART: [afmc] ++
2,774,577 UART: [afmc] CDI.KEYID = 6
2,774,939 UART: [afmc] SUBJECT.KEYID = 7
2,775,364 UART: [afmc] AUTHORITY.KEYID = 5
2,810,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,160 UART: [afmc] --
2,854,182 UART: [cold-reset] --
2,854,822 UART: [state] Locking Datavault
2,855,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,333 UART: [state] Locking ICCM
2,856,787 UART: [exit] Launching FMC @ 0x40000130
2,862,116 UART:
2,862,132 UART: Running Caliptra FMC ...
2,862,540 UART:
2,862,594 UART: [state] CFI Enabled
2,873,051 UART: [fht] FMC Alias Private Key: 7
2,980,656 UART: [art] Extend RT PCRs Done
2,981,084 UART: [art] Lock RT PCRs Done
2,982,666 UART: [art] Populate DV Done
2,991,079 UART: [fht] FMC Alias Private Key: 7
2,992,037 UART: [art] Derive CDI
2,992,317 UART: [art] Store in in slot 0x4
3,078,502 UART: [art] Derive Key Pair
3,078,862 UART: [art] Store priv key in slot 0x5
3,092,238 UART: [art] Derive Key Pair - Done
3,106,799 UART: [art] Signing Cert with AUTHO
3,107,279 UART: RITY.KEYID = 7
3,122,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,690 UART: [art] PUB.X = F870B35685EDFCFE09497D544F7528E111AB57C3EC0F99B14975F81F3D6A7FFBA16741A5FFE7991238D5C39A7145248F
3,130,460 UART: [art] PUB.Y = 45285192CB3504BAAD5C9E75190300D86538BF3A4F4B29C1D4D23A4823A23BB21364219B0108C64F7E3426AD3A01C098
3,137,369 UART: [art] SIG.R = 3F225EB6228608F6957FA91CB6BC5702E5BAE8293BCB68BFF616C0B71DA586EE691160C49E47066237ABC1004049EB40
3,144,112 UART: [art] SIG.S = 5775538AFD42B55444F32954D450F77189A3BB56AEAF8408D61774CB1DA35F12C8C28BC358A1DA5D600E74E47CB92EA5
3,167,983 UART: Caliptra RT
3,168,236 UART: [state] CFI Enabled
3,275,127 UART: [rt] RT listening for mailbox commands...
3,275,797 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,223 UART: [rt]cmd =0x434b4558, len=80
3,307,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 ready_for_fw is high
1,060,019 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,492 >>> mbox cmd response: success
2,687,568 UART:
2,687,584 UART: Running Caliptra FMC ...
2,687,992 UART:
2,688,046 UART: [state] CFI Enabled
2,698,587 UART: [fht] FMC Alias Private Key: 7
2,806,672 UART: [art] Extend RT PCRs Done
2,807,100 UART: [art] Lock RT PCRs Done
2,808,528 UART: [art] Populate DV Done
2,816,951 UART: [fht] FMC Alias Private Key: 7
2,818,115 UART: [art] Derive CDI
2,818,395 UART: [art] Store in in slot 0x4
2,904,208 UART: [art] Derive Key Pair
2,904,568 UART: [art] Store priv key in slot 0x5
2,917,780 UART: [art] Derive Key Pair - Done
2,932,706 UART: [art] Signing Cert with AUTHO
2,933,186 UART: RITY.KEYID = 7
2,948,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,215 UART: [art] PUB.X = 4FFB2C0E504A54B771979AAF9D986D3A5D6CD2DA1D886BA8A43FE2D3ADFB4CD35390E6CD9BE5C3803E00E91E13146DEF
2,955,984 UART: [art] PUB.Y = C0C0D5645BA9BE85C31E5F65430621078E0D66D7601B174C01C47C5AD7D7B8489EB2652095E32281B043DC0E455E3CAA
2,962,921 UART: [art] SIG.R = C153A1AAAB981ECC40DF8E9DC54B492B9742D49D05E6E325F6A7E9A4CB66089EE3F3E218AED74B28FEC0815851D6882C
2,969,701 UART: [art] SIG.S = 2C3D136F0BAD1C5F6AF4966F95B1E50D8F89DF5E2605105FC9739AE0E99142B49858805DCDFC37CF599D0EBFC9DA3067
2,993,526 UART: Caliptra RT
2,993,779 UART: [state] CFI Enabled
3,101,426 UART: [rt] RT listening for mailbox commands...
3,102,096 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,558 UART: [rt]cmd =0x434b4558, len=80
3,133,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
893,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,034 UART: [kat] ++
898,186 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,153 UART: [kat] SHA2-512-ACC
909,054 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,666 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,843 UART: [idev] Erasing UDS.KEYID = 0
1,200,338 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,910 UART: [ldev] ++
1,210,078 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,867 UART: [ldev] AUTHORITY.KEYID = 7
1,211,330 UART: [ldev] FE.KEYID = 1
1,216,834 UART: [ldev] Erasing FE.KEYID = 1
1,243,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,864 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,881 UART: [fwproc] Recv command 0x46574c44
1,283,609 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,292 >>> mbox cmd response: success
2,775,306 UART: [afmc] ++
2,775,474 UART: [afmc] CDI.KEYID = 6
2,775,836 UART: [afmc] SUBJECT.KEYID = 7
2,776,261 UART: [afmc] AUTHORITY.KEYID = 5
2,811,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,311 UART: [afmc] --
2,855,337 UART: [cold-reset] --
2,856,317 UART: [state] Locking Datavault
2,857,672 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,276 UART: [state] Locking ICCM
2,858,774 UART: [exit] Launching FMC @ 0x40000130
2,864,103 UART:
2,864,119 UART: Running Caliptra FMC ...
2,864,527 UART:
2,864,670 UART: [state] CFI Enabled
2,875,339 UART: [fht] FMC Alias Private Key: 7
2,982,994 UART: [art] Extend RT PCRs Done
2,983,422 UART: [art] Lock RT PCRs Done
2,985,088 UART: [art] Populate DV Done
2,993,343 UART: [fht] FMC Alias Private Key: 7
2,994,289 UART: [art] Derive CDI
2,994,569 UART: [art] Store in in slot 0x4
3,080,184 UART: [art] Derive Key Pair
3,080,544 UART: [art] Store priv key in slot 0x5
3,094,618 UART: [art] Derive Key Pair - Done
3,109,608 UART: [art] Signing Cert with AUTHO
3,110,088 UART: RITY.KEYID = 7
3,125,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,869 UART: [art] PUB.X = F3178B10CF71241D0676A3512E1C490DAD72EDD965C4222125E99F8908CE41D74F6B3A2495D292C533DE7296BD1A7231
3,132,628 UART: [art] PUB.Y = BD9D0AA80A31C6C035440CA1BFB5D2B61BC0845070C978D592E55954686110FD3D4DBB7789A2EA31DDBB7424FDAC4D6D
3,139,585 UART: [art] SIG.R = D963BC55BC70BB9B9257BA125AD93767BC927EB13DC0AC2F5453BF304AAB19AD98FAB777AD1621615F28BDB5461409D0
3,146,366 UART: [art] SIG.S = D2C4E0A22B30B5B137590F4562C3368A9A12E004B6B8E4D11F6D359CA61E6D1DE34CAA39F12E0B56CC0D0F2EE1B9A128
3,170,374 UART: Caliptra RT
3,170,719 UART: [state] CFI Enabled
3,279,037 UART: [rt] RT listening for mailbox commands...
3,279,707 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,947 UART: [rt]cmd =0x434b4558, len=80
3,311,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,366 ready_for_fw is high
1,060,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,751 >>> mbox cmd response: success
2,688,353 UART:
2,688,369 UART: Running Caliptra FMC ...
2,688,777 UART:
2,688,920 UART: [state] CFI Enabled
2,699,327 UART: [fht] FMC Alias Private Key: 7
2,807,418 UART: [art] Extend RT PCRs Done
2,807,846 UART: [art] Lock RT PCRs Done
2,809,058 UART: [art] Populate DV Done
2,817,371 UART: [fht] FMC Alias Private Key: 7
2,818,399 UART: [art] Derive CDI
2,818,679 UART: [art] Store in in slot 0x4
2,904,412 UART: [art] Derive Key Pair
2,904,772 UART: [art] Store priv key in slot 0x5
2,918,728 UART: [art] Derive Key Pair - Done
2,933,257 UART: [art] Signing Cert with AUTHO
2,933,737 UART: RITY.KEYID = 7
2,949,461 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,226 UART: [art] PUB.X = EFC8693731987CEE4E410F97C08D09AF102103A29846A644FE1CA9942E63972A7D6DD59322AB5B2E1AD2C54C8E9A8CC3
2,956,995 UART: [art] PUB.Y = 20BF1BA61F5C183D4070A6D3F5B7BD94248534B4DF35AC3F0B2A6F47E59C7C2DE8920135C9A4589917D00B9D9C366CE2
2,963,944 UART: [art] SIG.R = 79636DD0F56E6BCCCFC5FEF143357075A6BB9750956989987B1978BF9892048160CFF401FC79F301B41ADEBD67BDE74C
2,970,713 UART: [art] SIG.S = FA2F05B73411A88443E042EC2997A588D558B92456726003FF8EE4CF1C13D2A5B09948E86AF1B86D4FEAD5AA8C804859
2,994,402 UART: Caliptra RT
2,994,747 UART: [state] CFI Enabled
3,102,354 UART: [rt] RT listening for mailbox commands...
3,103,024 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,318 UART: [rt]cmd =0x434b4558, len=80
3,134,475 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,174,355 ready_for_fw is high
1,174,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,280,995 UART: [fwproc] Recv command 0x46574c44
1,281,728 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,927 >>> mbox cmd response: success
2,771,942 UART: [afmc] ++
2,772,110 UART: [afmc] CDI.KEYID = 6
2,772,473 UART: [afmc] SUBJECT.KEYID = 7
2,772,899 UART: [afmc] AUTHORITY.KEYID = 5
2,808,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,517 UART: [afmc] --
2,851,533 UART: [cold-reset] --
2,852,339 UART: [state] Locking Datavault
2,853,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,100 UART: [state] Locking ICCM
2,854,522 UART: [exit] Launching FMC @ 0x40000130
2,859,851 UART:
2,859,867 UART: Running Caliptra FMC ...
2,860,275 UART:
2,860,329 UART: [state] CFI Enabled
2,870,774 UART: [fht] FMC Alias Private Key: 7
2,978,243 UART: [art] Extend RT PCRs Done
2,978,671 UART: [art] Lock RT PCRs Done
2,980,273 UART: [art] Populate DV Done
2,988,254 UART: [fht] FMC Alias Private Key: 7
2,989,274 UART: [art] Derive CDI
2,989,554 UART: [art] Store in in slot 0x4
3,075,447 UART: [art] Derive Key Pair
3,075,807 UART: [art] Store priv key in slot 0x5
3,089,357 UART: [art] Derive Key Pair - Done
3,103,828 UART: [art] Signing Cert with AUTHO
3,104,308 UART: RITY.KEYID = 7
3,119,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,073 UART: [art] PUB.X = E5576B5510560AD15B90CCD339CEEA0E7B81D4779187B13CDE4184BA80E76BF2AEBB997E8E909B776A808C13F84A8B05
3,126,844 UART: [art] PUB.Y = 1138CA320BA72ECDA0E50E3E5B8D8CA6FD1957E59FEDA08BC99532D4A6693B2A00E72BDF41344266DA61861C3F75FA48
3,133,780 UART: [art] SIG.R = F582C65C026A78C172D68599CD0C2422867D1614D725DA076B95EC1C97A13C3D4030C1F8AE6291629B5A1FADBA45E565
3,140,543 UART: [art] SIG.S = 3E2E18FFFF61267685177205A39FA8F61D064670E47EDF1F3189DD7BE1F291BF4E6706FC811FAEB7755857A192C51492
3,164,029 UART: Caliptra RT
3,164,282 UART: [state] CFI Enabled
3,271,359 UART: [rt] RT listening for mailbox commands...
3,272,029 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,491 UART: [rt]cmd =0x434b4558, len=80
3,303,662 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,844 ready_for_fw is high
1,055,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,073 >>> mbox cmd response: success
2,684,079 UART:
2,684,095 UART: Running Caliptra FMC ...
2,684,503 UART:
2,684,557 UART: [state] CFI Enabled
2,694,830 UART: [fht] FMC Alias Private Key: 7
2,802,821 UART: [art] Extend RT PCRs Done
2,803,249 UART: [art] Lock RT PCRs Done
2,804,637 UART: [art] Populate DV Done
2,812,798 UART: [fht] FMC Alias Private Key: 7
2,813,940 UART: [art] Derive CDI
2,814,220 UART: [art] Store in in slot 0x4
2,899,525 UART: [art] Derive Key Pair
2,899,885 UART: [art] Store priv key in slot 0x5
2,913,453 UART: [art] Derive Key Pair - Done
2,927,732 UART: [art] Signing Cert with AUTHO
2,928,212 UART: RITY.KEYID = 7
2,943,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,375 UART: [art] PUB.X = 3B5D93D3BD9211748BFA3CBD3680C38F205D8714033AF55C5BAA550E09C1A24CE0620733204B4EF6F8E3C9BEB7197640
2,951,139 UART: [art] PUB.Y = FAB1BBD26D4785560B0E875415A4C27288A82CE027A45D5D8225D4EDC78E0A394E12C6D5AE9B639CD6DB3AD739FA1FCC
2,958,098 UART: [art] SIG.R = C8D7C64E6ADCF4E9BF4226EF8250B4BFE4DC52DAAF0662B21FA7ECBDB2FB5CC00D7D20A80F5D8F1E278C359418F0AF6F
2,964,891 UART: [art] SIG.S = BEB4EEAEE974B6BEEA34D1045E12AA4306D1E5360617E2004DF5ECDED5876713A0CFD00F3562B9D56D2089171E222969
2,989,284 UART: Caliptra RT
2,989,537 UART: [state] CFI Enabled
3,096,871 UART: [rt] RT listening for mailbox commands...
3,097,541 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,137 UART: [rt]cmd =0x434b4558, len=80
3,129,048 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,159 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,478 >>> mbox cmd response: success
2,774,539 UART: [afmc] ++
2,774,707 UART: [afmc] CDI.KEYID = 6
2,775,070 UART: [afmc] SUBJECT.KEYID = 7
2,775,496 UART: [afmc] AUTHORITY.KEYID = 5
2,811,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,136 UART: [afmc] --
2,854,016 UART: [cold-reset] --
2,855,002 UART: [state] Locking Datavault
2,856,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,697 UART: [state] Locking ICCM
2,857,191 UART: [exit] Launching FMC @ 0x40000130
2,862,520 UART:
2,862,536 UART: Running Caliptra FMC ...
2,862,944 UART:
2,863,087 UART: [state] CFI Enabled
2,873,138 UART: [fht] FMC Alias Private Key: 7
2,981,277 UART: [art] Extend RT PCRs Done
2,981,705 UART: [art] Lock RT PCRs Done
2,983,227 UART: [art] Populate DV Done
2,991,566 UART: [fht] FMC Alias Private Key: 7
2,992,706 UART: [art] Derive CDI
2,992,986 UART: [art] Store in in slot 0x4
3,078,791 UART: [art] Derive Key Pair
3,079,151 UART: [art] Store priv key in slot 0x5
3,092,537 UART: [art] Derive Key Pair - Done
3,107,560 UART: [art] Signing Cert with AUTHO
3,108,040 UART: RITY.KEYID = 7
3,123,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,765 UART: [art] PUB.X = 04CABBE0FF50E1F1DBF1A576BA146D37850757D7099F8031CBA68ADD93294E2508A567D69B4A923642304B7971A1EBA5
3,130,529 UART: [art] PUB.Y = F51B593DE75A103C50AAE61952A088C6BB43A4BC36874EED55B5817C30C133B45FD365C7E139725278BBBC8705C06E05
3,137,477 UART: [art] SIG.R = 530E4F70F9E62B7E6CC7E589BA713E419BBCD95C5AC4D673CE1C7DE43DB060BEB20E2BB3F5C72B65418371282D734A7B
3,144,257 UART: [art] SIG.S = 8FE1025BB20E9E5CD8B03592A7DB6845DDD0E0B4CBE6D48CDBEFAB5850F2D1AF004FB38D743726BAC6AC8846C887CE4C
3,168,518 UART: Caliptra RT
3,168,863 UART: [state] CFI Enabled
3,277,146 UART: [rt] RT listening for mailbox commands...
3,277,816 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,064 UART: [rt]cmd =0x434b4558, len=80
3,309,157 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,277 ready_for_fw is high
1,056,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,962 >>> mbox cmd response: success
2,684,774 UART:
2,684,790 UART: Running Caliptra FMC ...
2,685,198 UART:
2,685,341 UART: [state] CFI Enabled
2,696,024 UART: [fht] FMC Alias Private Key: 7
2,804,271 UART: [art] Extend RT PCRs Done
2,804,699 UART: [art] Lock RT PCRs Done
2,806,483 UART: [art] Populate DV Done
2,814,586 UART: [fht] FMC Alias Private Key: 7
2,815,664 UART: [art] Derive CDI
2,815,944 UART: [art] Store in in slot 0x4
2,901,223 UART: [art] Derive Key Pair
2,901,583 UART: [art] Store priv key in slot 0x5
2,914,945 UART: [art] Derive Key Pair - Done
2,929,689 UART: [art] Signing Cert with AUTHO
2,930,169 UART: RITY.KEYID = 7
2,945,413 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,178 UART: [art] PUB.X = 35329FFD7B5C7E0F060378B1B59AA240AE9E3D7A9DE500107399B4C7E1322F40F706594D71DDDCC4B8570EFF03D9E4B8
2,952,918 UART: [art] PUB.Y = D1FC03952701F07B062EF2CEC2A90C7B465594B1E26C747D3044F17498B9EC6CB31A0959F38B001D579803DFFE8E9E5C
2,959,834 UART: [art] SIG.R = 9ECF206C6C564541C84EE876B806E3498314C3CB2DE6BB2831E08588FA9C866C60FB80992C1BB9965C6B2D46B0E4102F
2,966,605 UART: [art] SIG.S = 609126E9502BAC08E716FF99C159B2154DC80D726FE7C2D35872F56228D4D8FB405D9524F469A1EE6A65881DD691CD0E
2,990,783 UART: Caliptra RT
2,991,128 UART: [state] CFI Enabled
3,098,723 UART: [rt] RT listening for mailbox commands...
3,099,393 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,667 UART: [rt]cmd =0x434b4558, len=80
3,130,682 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,207 UART: [kat] SHA2-256
892,145 UART: [kat] SHA2-384
894,906 UART: [kat] SHA2-512-ACC
896,807 UART: [kat] ECC-384
902,366 UART: [kat] HMAC-384Kdf
906,882 UART: [kat] LMS
1,475,078 UART: [kat] --
1,475,989 UART: [cold-reset] ++
1,476,341 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 ready_for_fw is high
1,480,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,270 UART: [idev] --
1,514,335 UART: [ldev] ++
1,514,503 UART: [ldev] CDI.KEYID = 6
1,514,866 UART: [ldev] SUBJECT.KEYID = 5
1,515,292 UART: [ldev] AUTHORITY.KEYID = 7
1,515,755 UART: [ldev] FE.KEYID = 1
1,520,661 UART: [ldev] Erasing FE.KEYID = 1
1,546,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,346 UART: [fwproc] Received command 0x46574c44
1,587,137 UART: [fwproc] Received Image of size 114332 bytes
2,885,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,478 >>> mbox cmd response: success
3,079,546 UART: [afmc] ++
3,079,714 UART: [afmc] CDI.KEYID = 6
3,080,076 UART: [afmc] SUBJECT.KEYID = 7
3,080,501 UART: [afmc] AUTHORITY.KEYID = 5
3,115,388 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,215 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,905 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,762 UART: [afmc] --
3,158,880 UART: [cold-reset] --
3,159,778 UART: [state] Locking Datavault
3,161,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,699 UART: [state] Locking ICCM
3,162,209 UART: [exit] Launching FMC @ 0x40000130
3,167,538 UART:
3,167,554 UART: Running Caliptra FMC ...
3,167,962 UART:
3,168,016 UART: [state] CFI Enabled
3,178,765 UART: [fht] FMC Alias Private Key: 7
3,286,588 UART: [art] Extend RT PCRs Done
3,287,016 UART: [art] Lock RT PCRs Done
3,288,586 UART: [art] Populate DV Done
3,296,651 UART: [fht] FMC Alias Private Key: 7
3,297,595 UART: [art] Derive CDI
3,297,875 UART: [art] Store in in slot 0x4
3,383,732 UART: [art] Derive Key Pair
3,384,092 UART: [art] Store priv key in slot 0x5
3,397,224 UART: [art] Derive Key Pair - Done
3,411,971 UART: [art] Signing Cert with AUTHO
3,412,451 UART: RITY.KEYID = 7
3,427,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,040 UART: [art] PUB.X = B1220BDC8F08190CB5CCD97608FEE1091BDF8ADB4DADCB581DFF99CB2E8C274C8E8D79B454B2FDC074A29489E84742EB
3,434,819 UART: [art] PUB.Y = 30CE61F5389559F634082999D39E2664BA97CBD68F8C48B0DE758A5247FE8DAEFA9AE170B0A6B127C695A6F9CF5BC8FA
3,441,780 UART: [art] SIG.R = 16A3DCA2718407D2B727FC99E69377F0F3DB5C39AAC728F0E5420CF2980F98932FA3404B2D1F716BAD6E182B71A7A41B
3,448,549 UART: [art] SIG.S = 5F196D9FCF5B84B73E444FAA1C7B0B86C1DD9E4FCA6B509A9395F8E154799F64B0AA9F26B5DB2BB4E9FA0196D75F05BE
3,472,741 UART: Caliptra RT
3,472,994 UART: [state] CFI Enabled
3,581,626 UART: [rt] RT listening for mailbox commands...
3,582,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,406 UART: [rt]cmd =0x44504543, len=92
3,619,760 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 ready_for_fw is high
1,362,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,076 >>> mbox cmd response: success
2,988,974 UART:
2,988,990 UART: Running Caliptra FMC ...
2,989,398 UART:
2,989,452 UART: [state] CFI Enabled
2,999,773 UART: [fht] FMC Alias Private Key: 7
3,108,436 UART: [art] Extend RT PCRs Done
3,108,864 UART: [art] Lock RT PCRs Done
3,110,268 UART: [art] Populate DV Done
3,118,549 UART: [fht] FMC Alias Private Key: 7
3,119,681 UART: [art] Derive CDI
3,119,961 UART: [art] Store in in slot 0x4
3,205,590 UART: [art] Derive Key Pair
3,205,950 UART: [art] Store priv key in slot 0x5
3,219,252 UART: [art] Derive Key Pair - Done
3,233,972 UART: [art] Signing Cert with AUTHO
3,234,452 UART: RITY.KEYID = 7
3,249,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,673 UART: [art] PUB.X = FF22B9561A47C29F57F53E92369A46CE0B174BF227E9BF408F4B3A7ED013F80ACB86EEBB1FAA8B598FC75000F5C63DDA
3,257,435 UART: [art] PUB.Y = 65C7227CD27F38E73AC6CBD6FEDDCA91BDCC10AA7D733C0A2D94CC49BE43BA0CB3543123ED4939E3147F2DDAC6C8773B
3,264,405 UART: [art] SIG.R = D977AE28350DD7654A903016B2C765D692ED113E43876D5B0163FC60A3DEDBC3C5449940D62CDFAA6FE76A5E1C27A658
3,271,177 UART: [art] SIG.S = 292FC356BB4E4D3F3D85476AA330A2EAC585EC6691C53B4A3F8BC256358CBD8FB43D2E9A9A80D93AF723A57C3909BAFB
3,295,101 UART: Caliptra RT
3,295,354 UART: [state] CFI Enabled
3,404,041 UART: [rt] RT listening for mailbox commands...
3,404,711 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,221 UART: [rt]cmd =0x44504543, len=92
3,442,453 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,106 UART: [kat] SHA2-256
882,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,152 UART: [kat] ++
886,304 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,293 UART: [kat] SHA2-512-ACC
897,194 UART: [kat] ECC-384
902,693 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,526 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,514,850 UART: [ldev] ++
1,515,018 UART: [ldev] CDI.KEYID = 6
1,515,381 UART: [ldev] SUBJECT.KEYID = 5
1,515,807 UART: [ldev] AUTHORITY.KEYID = 7
1,516,270 UART: [ldev] FE.KEYID = 1
1,521,640 UART: [ldev] Erasing FE.KEYID = 1
1,546,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,955 UART: [ldev] --
1,586,350 UART: [fwproc] Waiting for Commands...
1,587,139 UART: [fwproc] Received command 0x46574c44
1,587,930 UART: [fwproc] Received Image of size 114332 bytes
2,885,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,115 >>> mbox cmd response: success
3,078,171 UART: [afmc] ++
3,078,339 UART: [afmc] CDI.KEYID = 6
3,078,701 UART: [afmc] SUBJECT.KEYID = 7
3,079,126 UART: [afmc] AUTHORITY.KEYID = 5
3,114,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,018 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,708 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,447 UART: [afmc] --
3,157,389 UART: [cold-reset] --
3,158,297 UART: [state] Locking Datavault
3,159,292 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,896 UART: [state] Locking ICCM
3,160,450 UART: [exit] Launching FMC @ 0x40000130
3,165,779 UART:
3,165,795 UART: Running Caliptra FMC ...
3,166,203 UART:
3,166,346 UART: [state] CFI Enabled
3,176,807 UART: [fht] FMC Alias Private Key: 7
3,284,786 UART: [art] Extend RT PCRs Done
3,285,214 UART: [art] Lock RT PCRs Done
3,286,824 UART: [art] Populate DV Done
3,294,983 UART: [fht] FMC Alias Private Key: 7
3,296,035 UART: [art] Derive CDI
3,296,315 UART: [art] Store in in slot 0x4
3,381,894 UART: [art] Derive Key Pair
3,382,254 UART: [art] Store priv key in slot 0x5
3,395,532 UART: [art] Derive Key Pair - Done
3,410,274 UART: [art] Signing Cert with AUTHO
3,410,754 UART: RITY.KEYID = 7
3,426,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,339 UART: [art] PUB.X = 8F6CCFFCF1773F459A6D9A0E8ECF2B91CAE95AF200A362D1FBADA5F60F39A7F585289CCA37021A088CB5BA744CDE0D91
3,434,098 UART: [art] PUB.Y = B01B29E1AA31EAA20943A4A87C359BA5000FE2EB1CDDC07306205A20D871302D24D9593FF944DC9F7E05E7147449F336
3,441,018 UART: [art] SIG.R = DCA2417A991603AAC3739D8E7E00E2196404D6898ABF3F8B3D8DEA2559AFEF870B05C5A091306BF237169F2805A74A98
3,447,755 UART: [art] SIG.S = 50B04DF9EA391BA94C0E3F8811031F5EDE7D05594E91CCEA0EAF4C32E096430A4C7D9D054AB0AC80E3B993DE547A19C3
3,471,696 UART: Caliptra RT
3,472,041 UART: [state] CFI Enabled
3,579,454 UART: [rt] RT listening for mailbox commands...
3,580,124 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,558 UART: [rt]cmd =0x44504543, len=92
3,617,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 ready_for_fw is high
1,362,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,859 >>> mbox cmd response: success
2,990,161 UART:
2,990,177 UART: Running Caliptra FMC ...
2,990,585 UART:
2,990,728 UART: [state] CFI Enabled
3,001,577 UART: [fht] FMC Alias Private Key: 7
3,109,070 UART: [art] Extend RT PCRs Done
3,109,498 UART: [art] Lock RT PCRs Done
3,111,216 UART: [art] Populate DV Done
3,119,605 UART: [fht] FMC Alias Private Key: 7
3,120,705 UART: [art] Derive CDI
3,120,985 UART: [art] Store in in slot 0x4
3,206,406 UART: [art] Derive Key Pair
3,206,766 UART: [art] Store priv key in slot 0x5
3,220,230 UART: [art] Derive Key Pair - Done
3,235,383 UART: [art] Signing Cert with AUTHO
3,235,863 UART: RITY.KEYID = 7
3,251,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,996 UART: [art] PUB.X = 32B3C39D8958C495561A0FD934E7E85024CAA1797F13D9234F99048510B211A5531A1DE5A83B7A7631DD4C719D8D8C5E
3,258,758 UART: [art] PUB.Y = 33D48F2D6531870620A81567F72FDDE7F1A78E5061292B799768761ACF9910761E3DD80219397586B733CECA65BD9C11
3,265,694 UART: [art] SIG.R = 2D11A43DC0F9B6103203A62A238088BF1B22345C88B669B829516FB55642D72EC34665862D1817A043712BB72224F9B3
3,272,449 UART: [art] SIG.S = 648F3F728E678E1CA33A54B83D10722FB9A2C6CD31E2BA9358828383F1B5E644A1AA874BEF0854AC32DD7CACE555C9CB
3,296,669 UART: Caliptra RT
3,297,014 UART: [state] CFI Enabled
3,405,080 UART: [rt] RT listening for mailbox commands...
3,405,750 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,282 UART: [rt]cmd =0x44504543, len=92
3,443,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,408 UART: [kat] SHA2-512-ACC
908,309 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
923,054 UART: [kat] LMS
1,171,382 UART: [kat] --
1,172,479 UART: [cold-reset] ++
1,172,967 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 ready_for_fw is high
1,176,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,201,355 UART: [idev] Sha1 KeyId Algorithm
1,209,869 UART: [idev] --
1,210,841 UART: [ldev] ++
1,211,009 UART: [ldev] CDI.KEYID = 6
1,211,372 UART: [ldev] SUBJECT.KEYID = 5
1,211,798 UART: [ldev] AUTHORITY.KEYID = 7
1,212,261 UART: [ldev] FE.KEYID = 1
1,217,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,574 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,519 >>> mbox cmd response: success
2,776,577 UART: [afmc] ++
2,776,745 UART: [afmc] CDI.KEYID = 6
2,777,107 UART: [afmc] SUBJECT.KEYID = 7
2,777,532 UART: [afmc] AUTHORITY.KEYID = 5
2,812,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,875 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,388 UART: [afmc] --
2,856,340 UART: [cold-reset] --
2,857,246 UART: [state] Locking Datavault
2,858,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,363 UART: [state] Locking ICCM
2,859,831 UART: [exit] Launching FMC @ 0x40000130
2,865,160 UART:
2,865,176 UART: Running Caliptra FMC ...
2,865,584 UART:
2,865,638 UART: [state] CFI Enabled
2,876,063 UART: [fht] FMC Alias Private Key: 7
2,983,890 UART: [art] Extend RT PCRs Done
2,984,318 UART: [art] Lock RT PCRs Done
2,985,698 UART: [art] Populate DV Done
2,994,225 UART: [fht] FMC Alias Private Key: 7
2,995,297 UART: [art] Derive CDI
2,995,577 UART: [art] Store in in slot 0x4
3,080,858 UART: [art] Derive Key Pair
3,081,218 UART: [art] Store priv key in slot 0x5
3,094,254 UART: [art] Derive Key Pair - Done
3,108,937 UART: [art] Signing Cert with AUTHO
3,109,417 UART: RITY.KEYID = 7
3,124,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,382 UART: [art] PUB.X = 23CF2307D70A0EAA3B28A5706FEB55CAEFCEAEC02684DC1F869DD418F314659732A9344C53FA46C23135DCCAC830305A
3,132,157 UART: [art] PUB.Y = 3EAA209D79E8905849450CDD6DDA2620F7401A013DCF724F0526D84FA74C366AFEDCD265CB39C6A1BF74A8E1B7F65910
3,139,110 UART: [art] SIG.R = C7539B6851967961F69734476405E5F7ADB0183AF5DC77E4C71CC866C21853F5DD1913065574A4F24FD921DD6625F4AD
3,145,870 UART: [art] SIG.S = 53A617A8E4F699F0B5FA6A8833202AA439D6472DEB6B9DDB7D5B73B7AF170ED7B69408921D5C644A496CE6C2513A22C8
3,169,841 UART: Caliptra RT
3,170,094 UART: [state] CFI Enabled
3,277,129 UART: [rt] RT listening for mailbox commands...
3,277,799 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,063 UART: [rt]cmd =0x44504543, len=92
3,315,415 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,475 ready_for_fw is high
1,060,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,656 >>> mbox cmd response: success
2,689,382 UART:
2,689,398 UART: Running Caliptra FMC ...
2,689,806 UART:
2,689,860 UART: [state] CFI Enabled
2,700,129 UART: [fht] FMC Alias Private Key: 7
2,808,140 UART: [art] Extend RT PCRs Done
2,808,568 UART: [art] Lock RT PCRs Done
2,810,278 UART: [art] Populate DV Done
2,818,729 UART: [fht] FMC Alias Private Key: 7
2,819,777 UART: [art] Derive CDI
2,820,057 UART: [art] Store in in slot 0x4
2,905,458 UART: [art] Derive Key Pair
2,905,818 UART: [art] Store priv key in slot 0x5
2,918,870 UART: [art] Derive Key Pair - Done
2,933,537 UART: [art] Signing Cert with AUTHO
2,934,017 UART: RITY.KEYID = 7
2,949,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,324 UART: [art] PUB.X = BE8E8E73411652830ED2C214DCE75972045CC9091CB9725EB2C635DD6CBF36464090AB88F17ECCD39B65A8E1FFC053D5
2,957,095 UART: [art] PUB.Y = A5ECDB55CF4FC4C4856C04389D6D30F6666C728F9CECBC3B06209492D7C11AC8FB85D376D19D6090ECE9EB1ECF613705
2,964,052 UART: [art] SIG.R = 6015A28A8C50B3F03A3C87BE7BB11BB4E5A59830E799D1A446455877AB650568030FE59D20B5A4D4E917570C9D5FAB37
2,970,812 UART: [art] SIG.S = B92686668942FFA4CACECD925BFC97BBD73CE2DA2875DF0FA0B2C4FCAA4F90CCBAA878BA1A38527B42FCBA7E803B3BBA
2,994,468 UART: Caliptra RT
2,994,721 UART: [state] CFI Enabled
3,102,378 UART: [rt] RT listening for mailbox commands...
3,103,048 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,428 UART: [rt]cmd =0x44504543, len=92
3,140,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,527 UART: [kat] LMS
1,171,855 UART: [kat] --
1,172,824 UART: [cold-reset] ++
1,173,396 UART: [fht] FHT @ 0x50003400
1,175,971 UART: [idev] ++
1,176,139 UART: [idev] CDI.KEYID = 6
1,176,499 UART: [idev] SUBJECT.KEYID = 7
1,176,923 UART: [idev] UDS.KEYID = 0
1,177,268 ready_for_fw is high
1,177,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,973 UART: [idev] Erasing UDS.KEYID = 0
1,202,406 UART: [idev] Sha1 KeyId Algorithm
1,210,960 UART: [idev] --
1,212,156 UART: [ldev] ++
1,212,324 UART: [ldev] CDI.KEYID = 6
1,212,687 UART: [ldev] SUBJECT.KEYID = 5
1,213,113 UART: [ldev] AUTHORITY.KEYID = 7
1,213,576 UART: [ldev] FE.KEYID = 1
1,219,220 UART: [ldev] Erasing FE.KEYID = 1
1,245,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,442 UART: [ldev] --
1,284,927 UART: [fwproc] Wait for Commands...
1,285,649 UART: [fwproc] Recv command 0x46574c44
1,286,377 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,310 >>> mbox cmd response: success
2,778,518 UART: [afmc] ++
2,778,686 UART: [afmc] CDI.KEYID = 6
2,779,048 UART: [afmc] SUBJECT.KEYID = 7
2,779,473 UART: [afmc] AUTHORITY.KEYID = 5
2,815,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,130 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,737 UART: [afmc] --
2,858,667 UART: [cold-reset] --
2,859,591 UART: [state] Locking Datavault
2,860,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,520 UART: [state] Locking ICCM
2,862,132 UART: [exit] Launching FMC @ 0x40000130
2,867,461 UART:
2,867,477 UART: Running Caliptra FMC ...
2,867,885 UART:
2,868,028 UART: [state] CFI Enabled
2,878,587 UART: [fht] FMC Alias Private Key: 7
2,986,246 UART: [art] Extend RT PCRs Done
2,986,674 UART: [art] Lock RT PCRs Done
2,988,408 UART: [art] Populate DV Done
2,996,601 UART: [fht] FMC Alias Private Key: 7
2,997,781 UART: [art] Derive CDI
2,998,061 UART: [art] Store in in slot 0x4
3,084,076 UART: [art] Derive Key Pair
3,084,436 UART: [art] Store priv key in slot 0x5
3,098,212 UART: [art] Derive Key Pair - Done
3,112,940 UART: [art] Signing Cert with AUTHO
3,113,420 UART: RITY.KEYID = 7
3,128,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,057 UART: [art] PUB.X = CC10F0D46B674BDAA16C9E118F5583035236DA83D48ACAA184E253FD5649B04868825B5BF5097778F027AD6B386871B2
3,135,821 UART: [art] PUB.Y = 0C66DA7716018ECCB83223498BB1D62C0C50D0FF9938668C3576DF4D34827395D0C3594CE52C5E246EE9D949DE10F4E6
3,142,764 UART: [art] SIG.R = 5ADA63D8C5DF4705BAC652DC3279E60266734B024947AC30F21097C195B389250156BDC58EC59339B7141F69A75368DC
3,149,518 UART: [art] SIG.S = 9A5DB8B4DB77EF6C548CD1C1A50FB83EB1F22C4F20AC82A009D2D1658929B0E62ECF0BF5FEE87FD8A47A2AD144D0872B
3,173,370 UART: Caliptra RT
3,173,715 UART: [state] CFI Enabled
3,281,040 UART: [rt] RT listening for mailbox commands...
3,281,710 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,132 UART: [rt]cmd =0x44504543, len=92
3,319,334 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,100 ready_for_fw is high
1,061,100 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,191 >>> mbox cmd response: success
2,689,859 UART:
2,689,875 UART: Running Caliptra FMC ...
2,690,283 UART:
2,690,426 UART: [state] CFI Enabled
2,700,877 UART: [fht] FMC Alias Private Key: 7
2,808,952 UART: [art] Extend RT PCRs Done
2,809,380 UART: [art] Lock RT PCRs Done
2,810,800 UART: [art] Populate DV Done
2,818,843 UART: [fht] FMC Alias Private Key: 7
2,819,895 UART: [art] Derive CDI
2,820,175 UART: [art] Store in in slot 0x4
2,906,020 UART: [art] Derive Key Pair
2,906,380 UART: [art] Store priv key in slot 0x5
2,919,252 UART: [art] Derive Key Pair - Done
2,933,944 UART: [art] Signing Cert with AUTHO
2,934,424 UART: RITY.KEYID = 7
2,949,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,403 UART: [art] PUB.X = B01B4E102D0241603CC1B69551DFA5B64BD004B50F1D95A7FB85236528F24392D19F107247C7F90178CD92C58F4CC19F
2,957,161 UART: [art] PUB.Y = 62BEC2940B00D5B0AF5C70FCC9E4BF33FE74495D0B952C7F0C4A4653E6E220BB1C19B96989D996AB649371549B0E5FF2
2,964,087 UART: [art] SIG.R = 57B38D7235C532C4ED90E8D69B9EB32F787E11FB1053C7CF218B66D9B6EF912BD4C07DB9AB5AB1BEF984EDFE77DDF361
2,970,879 UART: [art] SIG.S = 0C60BC3047A6799B5CCCB8FAA9F2B9D731A2E84ABBBE85DF41BF241C391F65DC3F1589806FE4902479AFA1F35878F5B5
2,994,439 UART: Caliptra RT
2,994,784 UART: [state] CFI Enabled
3,103,343 UART: [rt] RT listening for mailbox commands...
3,104,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,423 UART: [rt]cmd =0x44504543, len=92
3,141,413 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,056 UART: [kat] LMS
1,168,368 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,173,825 ready_for_fw is high
1,173,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,127 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,240,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,824 UART: [ldev] --
1,280,088 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,763 >>> mbox cmd response: success
2,773,030 UART: [afmc] ++
2,773,198 UART: [afmc] CDI.KEYID = 6
2,773,561 UART: [afmc] SUBJECT.KEYID = 7
2,773,987 UART: [afmc] AUTHORITY.KEYID = 5
2,809,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,261 UART: [afmc] --
2,853,279 UART: [cold-reset] --
2,854,101 UART: [state] Locking Datavault
2,855,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,934 UART: [state] Locking ICCM
2,856,476 UART: [exit] Launching FMC @ 0x40000130
2,861,805 UART:
2,861,821 UART: Running Caliptra FMC ...
2,862,229 UART:
2,862,283 UART: [state] CFI Enabled
2,872,804 UART: [fht] FMC Alias Private Key: 7
2,980,591 UART: [art] Extend RT PCRs Done
2,981,019 UART: [art] Lock RT PCRs Done
2,982,533 UART: [art] Populate DV Done
2,990,742 UART: [fht] FMC Alias Private Key: 7
2,991,784 UART: [art] Derive CDI
2,992,064 UART: [art] Store in in slot 0x4
3,077,809 UART: [art] Derive Key Pair
3,078,169 UART: [art] Store priv key in slot 0x5
3,091,321 UART: [art] Derive Key Pair - Done
3,106,272 UART: [art] Signing Cert with AUTHO
3,106,752 UART: RITY.KEYID = 7
3,122,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,865 UART: [art] PUB.X = 3257E0F81AE2288CE6EBEA9792D5E46C678FF068742EA37B547D7BBDD9587509319589B5E2D87396D451B044971DE31F
3,129,632 UART: [art] PUB.Y = 18C0BADAA615A7F0862B844DD996BF647AE5CE3BF5DF6D6F1F1AF00F1F5D60FF13FC383B8BE73F41F4EADDA124CDDEB9
3,136,613 UART: [art] SIG.R = E6FA5DAC36B3D3A903EF9DEADFF677374B150E51C066E62EFEFD55BB7734C7866298D4000F68BC1145E700B030A6D9DD
3,143,346 UART: [art] SIG.S = 855D5A1B3D090B1DC8E0253A643D89690B5CF2B5E709AB3E47D72701D13C4902A6BF404FB1F4833BC7E366446DEF0221
3,167,274 UART: Caliptra RT
3,167,527 UART: [state] CFI Enabled
3,274,469 UART: [rt] RT listening for mailbox commands...
3,275,139 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,525 UART: [rt]cmd =0x44504543, len=92
3,312,259 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,168 ready_for_fw is high
1,056,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,677 >>> mbox cmd response: success
2,685,813 UART:
2,685,829 UART: Running Caliptra FMC ...
2,686,237 UART:
2,686,291 UART: [state] CFI Enabled
2,696,632 UART: [fht] FMC Alias Private Key: 7
2,804,547 UART: [art] Extend RT PCRs Done
2,804,975 UART: [art] Lock RT PCRs Done
2,806,673 UART: [art] Populate DV Done
2,814,804 UART: [fht] FMC Alias Private Key: 7
2,815,910 UART: [art] Derive CDI
2,816,190 UART: [art] Store in in slot 0x4
2,901,845 UART: [art] Derive Key Pair
2,902,205 UART: [art] Store priv key in slot 0x5
2,915,393 UART: [art] Derive Key Pair - Done
2,930,592 UART: [art] Signing Cert with AUTHO
2,931,072 UART: RITY.KEYID = 7
2,946,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,447 UART: [art] PUB.X = DF676857FA69C3BA8DE49B3330C49F64257CD54869A00855CA814F2A5875FA6F9C4EDAE15669958DC2726572343197B7
2,954,212 UART: [art] PUB.Y = 64EADEDF710978E3A7DA2F0CA5B68B4D919A688BCC7B23D65397FA7B7EDCCDD46DD2D2303C922F44D7389DAA75014A2A
2,961,175 UART: [art] SIG.R = 4DF74A67371118DC57D58365FCD691757FF64DBB884BFFA79C51E83246D8F4B09726FA7C984DA69C4EC91C561F379959
2,967,949 UART: [art] SIG.S = 5380FE46B2D9F299DFC38889143C318D4BD96C2F29EFD9C8C7DEF48FE09AF67B01F2A2F10CEE70BBB7C23FC47FB75096
2,992,330 UART: Caliptra RT
2,992,583 UART: [state] CFI Enabled
3,101,032 UART: [rt] RT listening for mailbox commands...
3,101,702 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,048 UART: [rt]cmd =0x44504543, len=92
3,139,192 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,162 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,092 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,937 UART: [ldev] --
1,281,229 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,724 >>> mbox cmd response: success
2,773,923 UART: [afmc] ++
2,774,091 UART: [afmc] CDI.KEYID = 6
2,774,454 UART: [afmc] SUBJECT.KEYID = 7
2,774,880 UART: [afmc] AUTHORITY.KEYID = 5
2,810,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,582 UART: [afmc] --
2,853,582 UART: [cold-reset] --
2,854,424 UART: [state] Locking Datavault
2,855,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,315 UART: [state] Locking ICCM
2,856,861 UART: [exit] Launching FMC @ 0x40000130
2,862,190 UART:
2,862,206 UART: Running Caliptra FMC ...
2,862,614 UART:
2,862,757 UART: [state] CFI Enabled
2,873,526 UART: [fht] FMC Alias Private Key: 7
2,981,393 UART: [art] Extend RT PCRs Done
2,981,821 UART: [art] Lock RT PCRs Done
2,983,339 UART: [art] Populate DV Done
2,991,620 UART: [fht] FMC Alias Private Key: 7
2,992,710 UART: [art] Derive CDI
2,992,990 UART: [art] Store in in slot 0x4
3,078,599 UART: [art] Derive Key Pair
3,078,959 UART: [art] Store priv key in slot 0x5
3,092,375 UART: [art] Derive Key Pair - Done
3,107,059 UART: [art] Signing Cert with AUTHO
3,107,539 UART: RITY.KEYID = 7
3,123,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,852 UART: [art] PUB.X = 547317DB3C7CD4EF58A9B0608A76C48A9F816AC2F68E16D58D577C1905C8F0AFD88FE7EEC7C22D481561C1C2248151B4
3,130,627 UART: [art] PUB.Y = 9050C6030A55E28C6AA022DA1A8706FEB9E1ED174772A03D20B2003733396755617F39FC831E73988358BCBE40E178A9
3,137,540 UART: [art] SIG.R = FD323356DEC4B1671022CAB9BFC0F2644EA85031CCC5D828D3F8D35FADB60C872BFD0E374C1A25927168973B9E2C6628
3,144,314 UART: [art] SIG.S = 63BE460CBEDC145CDD16AAF1C8A4BF6678F19D27B6B3709063AFDDCCBB35B919926FFE8CCC640F1C9B0D341BEF64601B
3,167,584 UART: Caliptra RT
3,167,929 UART: [state] CFI Enabled
3,274,836 UART: [rt] RT listening for mailbox commands...
3,275,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,902 UART: [rt]cmd =0x44504543, len=92
3,313,086 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,727 ready_for_fw is high
1,056,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,302 >>> mbox cmd response: success
2,684,320 UART:
2,684,336 UART: Running Caliptra FMC ...
2,684,744 UART:
2,684,887 UART: [state] CFI Enabled
2,695,276 UART: [fht] FMC Alias Private Key: 7
2,803,733 UART: [art] Extend RT PCRs Done
2,804,161 UART: [art] Lock RT PCRs Done
2,805,645 UART: [art] Populate DV Done
2,813,998 UART: [fht] FMC Alias Private Key: 7
2,815,108 UART: [art] Derive CDI
2,815,388 UART: [art] Store in in slot 0x4
2,900,987 UART: [art] Derive Key Pair
2,901,347 UART: [art] Store priv key in slot 0x5
2,914,709 UART: [art] Derive Key Pair - Done
2,929,630 UART: [art] Signing Cert with AUTHO
2,930,110 UART: RITY.KEYID = 7
2,945,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,993 UART: [art] PUB.X = 26ACDA85192DC096DB6AA09795C721CDC7905188EBCCE0223CC3A91E1147506F2BC581179517D1FAE08221666CD163E1
2,952,767 UART: [art] PUB.Y = 2D44D555013A84771CEE6BFA7E5DC69F99B86EFC9933295435E57464AA3FBC02DF8C2C6FDF1B3945C668AA93FB749BD3
2,959,725 UART: [art] SIG.R = 9BF6C54BC7EE50D526F86B5FC7C38F0B7273CBBA09E3F54E9208BF8A250FC513822144DEFA5744228A9590FA369A4124
2,966,491 UART: [art] SIG.S = 077CE38AADDEA88E2CAB24A14B4CEDDAE9C97E7C053A9E3C6AC589B605718B23C072C8EE14C4204803633189F72F9FA4
2,990,186 UART: Caliptra RT
2,990,531 UART: [state] CFI Enabled
3,097,448 UART: [rt] RT listening for mailbox commands...
3,098,118 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,424 UART: [rt]cmd =0x44504543, len=92
3,135,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,712 UART: [kat] SHA2-512-ACC
896,613 UART: [kat] ECC-384
902,014 UART: [kat] HMAC-384Kdf
906,616 UART: [kat] LMS
1,474,812 UART: [kat] --
1,475,713 UART: [cold-reset] ++
1,476,101 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 ready_for_fw is high
1,480,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,598 UART: [idev] Erasing UDS.KEYID = 0
1,504,030 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,626 UART: [idev] --
1,513,569 UART: [ldev] ++
1,513,737 UART: [ldev] CDI.KEYID = 6
1,514,100 UART: [ldev] SUBJECT.KEYID = 5
1,514,526 UART: [ldev] AUTHORITY.KEYID = 7
1,514,989 UART: [ldev] FE.KEYID = 1
1,520,161 UART: [ldev] Erasing FE.KEYID = 1
1,545,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,894 UART: [ldev] --
1,585,287 UART: [fwproc] Waiting for Commands...
1,585,968 UART: [fwproc] Received command 0x46574c44
1,586,759 UART: [fwproc] Received Image of size 114332 bytes
2,884,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,399 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,728 >>> mbox cmd response: success
3,077,804 UART: [afmc] ++
3,077,972 UART: [afmc] CDI.KEYID = 6
3,078,334 UART: [afmc] SUBJECT.KEYID = 7
3,078,759 UART: [afmc] AUTHORITY.KEYID = 5
3,113,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,396 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,789 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,479 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,186 UART: [afmc] --
3,157,226 UART: [cold-reset] --
3,158,014 UART: [state] Locking Datavault
3,159,279 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,883 UART: [state] Locking ICCM
3,160,505 UART: [exit] Launching FMC @ 0x40000130
3,165,834 UART:
3,165,850 UART: Running Caliptra FMC ...
3,166,258 UART:
3,166,312 UART: [state] CFI Enabled
3,176,557 UART: [fht] FMC Alias Private Key: 7
3,284,604 UART: [art] Extend RT PCRs Done
3,285,032 UART: [art] Lock RT PCRs Done
3,286,366 UART: [art] Populate DV Done
3,294,729 UART: [fht] FMC Alias Private Key: 7
3,295,681 UART: [art] Derive CDI
3,295,961 UART: [art] Store in in slot 0x4
3,381,488 UART: [art] Derive Key Pair
3,381,848 UART: [art] Store priv key in slot 0x5
3,395,186 UART: [art] Derive Key Pair - Done
3,409,867 UART: [art] Signing Cert with AUTHO
3,410,347 UART: RITY.KEYID = 7
3,425,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,974 UART: [art] PUB.X = 6A4274C7EF0B1BE69AADB348F4E25FCF71D6044ADEDDFAF3136EE653553EBE1024780BBCDE7B79CAAE3F6AA6E38B9C74
3,432,765 UART: [art] PUB.Y = F0F7C64517519EA69D2FF33DE5CE467E09A41D9FB67FEC1332C0D977955C5205B90535A93C6472DF006CB08A6BFD0F32
3,439,689 UART: [art] SIG.R = C899A96F357420E11867FDB8F3E581E85B2BB55878CA2AC5A983D48BA19127526886398D6CD853B98A56EF77A51580E7
3,446,457 UART: [art] SIG.S = FC88FB1C7B5A94E8D0C81BF2B1BD9FA0FE40FD1BD4E4A3FD705D694879C9246ABCBB98BA5E829B1D0B1D4B6C02C45C7E
3,470,586 UART: Caliptra RT
3,470,839 UART: [state] CFI Enabled
3,579,059 UART: [rt] RT listening for mailbox commands...
3,579,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,227 UART: [rt]cmd =0x44504543, len=96
3,642,788 >>> mbox cmd response data (56 bytes)
3,642,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,536 UART: [rt]cmd =0x44504543, len=96
3,705,198 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,101 ready_for_fw is high
1,362,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,954 >>> mbox cmd response: success
2,987,722 UART:
2,987,738 UART: Running Caliptra FMC ...
2,988,146 UART:
2,988,200 UART: [state] CFI Enabled
2,998,815 UART: [fht] FMC Alias Private Key: 7
3,106,390 UART: [art] Extend RT PCRs Done
3,106,818 UART: [art] Lock RT PCRs Done
3,108,310 UART: [art] Populate DV Done
3,116,421 UART: [fht] FMC Alias Private Key: 7
3,117,591 UART: [art] Derive CDI
3,117,871 UART: [art] Store in in slot 0x4
3,203,678 UART: [art] Derive Key Pair
3,204,038 UART: [art] Store priv key in slot 0x5
3,217,678 UART: [art] Derive Key Pair - Done
3,232,431 UART: [art] Signing Cert with AUTHO
3,232,911 UART: RITY.KEYID = 7
3,247,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,694 UART: [art] PUB.X = 9A8FE20273E88B9C69CCC78404BE2D3265EB5FBE29979474CE30B146630EB3708FC9957CC863399EE07F83EF106985F2
3,255,457 UART: [art] PUB.Y = D43DC01D9DFC24CDDC9DAB368E089F3BDD9A4FE73C8921B540A494F6EEAAE9110A1778D810EFBDAEA4BEEBCCFD791EB7
3,262,439 UART: [art] SIG.R = DCAC1B52FD06AB80EC2A8E7BEE320A1E0ECC1F7971350FEB17D6CEE5CAE9D345B7E1D6310B7818FEB95F0F822B0A568B
3,269,216 UART: [art] SIG.S = 6A3FFD01DF14B533E70CB4D8C667534E26EEB33FE1FC98E273030FD23465A43E59702734B7F3CFE990569D045435B1EF
3,293,506 UART: Caliptra RT
3,293,759 UART: [state] CFI Enabled
3,400,936 UART: [rt] RT listening for mailbox commands...
3,401,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,054 UART: [rt]cmd =0x44504543, len=96
3,464,617 >>> mbox cmd response data (56 bytes)
3,464,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,603 UART: [rt]cmd =0x44504543, len=96
3,527,567 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,015 UART: [kat] SHA2-512-ACC
896,916 UART: [kat] ECC-384
902,549 UART: [kat] HMAC-384Kdf
907,119 UART: [kat] LMS
1,475,315 UART: [kat] --
1,475,934 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,157 UART: [idev] ++
1,479,325 UART: [idev] CDI.KEYID = 6
1,479,685 UART: [idev] SUBJECT.KEYID = 7
1,480,109 UART: [idev] UDS.KEYID = 0
1,480,454 ready_for_fw is high
1,480,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,157 UART: [idev] Erasing UDS.KEYID = 0
1,504,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,435 UART: [idev] --
1,514,418 UART: [ldev] ++
1,514,586 UART: [ldev] CDI.KEYID = 6
1,514,949 UART: [ldev] SUBJECT.KEYID = 5
1,515,375 UART: [ldev] AUTHORITY.KEYID = 7
1,515,838 UART: [ldev] FE.KEYID = 1
1,521,122 UART: [ldev] Erasing FE.KEYID = 1
1,546,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,255 UART: [ldev] --
1,585,702 UART: [fwproc] Waiting for Commands...
1,586,431 UART: [fwproc] Received command 0x46574c44
1,587,222 UART: [fwproc] Received Image of size 114332 bytes
2,885,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,465 >>> mbox cmd response: success
3,079,593 UART: [afmc] ++
3,079,761 UART: [afmc] CDI.KEYID = 6
3,080,123 UART: [afmc] SUBJECT.KEYID = 7
3,080,548 UART: [afmc] AUTHORITY.KEYID = 5
3,115,453 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,008 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,698 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,537 UART: [afmc] --
3,158,497 UART: [cold-reset] --
3,159,203 UART: [state] Locking Datavault
3,160,486 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,090 UART: [state] Locking ICCM
3,161,688 UART: [exit] Launching FMC @ 0x40000130
3,167,017 UART:
3,167,033 UART: Running Caliptra FMC ...
3,167,441 UART:
3,167,584 UART: [state] CFI Enabled
3,178,495 UART: [fht] FMC Alias Private Key: 7
3,286,678 UART: [art] Extend RT PCRs Done
3,287,106 UART: [art] Lock RT PCRs Done
3,288,764 UART: [art] Populate DV Done
3,296,871 UART: [fht] FMC Alias Private Key: 7
3,297,809 UART: [art] Derive CDI
3,298,089 UART: [art] Store in in slot 0x4
3,383,684 UART: [art] Derive Key Pair
3,384,044 UART: [art] Store priv key in slot 0x5
3,397,446 UART: [art] Derive Key Pair - Done
3,412,116 UART: [art] Signing Cert with AUTHO
3,412,596 UART: RITY.KEYID = 7
3,428,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,855 UART: [art] PUB.X = 7BBDD071D1206F58BC353168E0E556B85D67A05324D20A8546C7B2B564D9A182089CD4782E0EB5BACFF64B63F2A444E1
3,435,622 UART: [art] PUB.Y = ED638C0AA0BF7A40647D2FE181A5C53215879C57724DCB024FE2F3C36B69D423B052CCFB509E34692613CA7C4ECA287F
3,442,576 UART: [art] SIG.R = 79D81FDD37751E58ED44265BE011676B9627C6CBFB1D17F7958B619DBA311D0388ECF65D44F0C54E992923F9C2749F4B
3,449,347 UART: [art] SIG.S = 4288E0D030294F933E590030C0BFA234E0C4CE53950D21224BDD4658605A2BA238B5C0214A66E16B695675F4ECC841C0
3,472,705 UART: Caliptra RT
3,473,050 UART: [state] CFI Enabled
3,582,594 UART: [rt] RT listening for mailbox commands...
3,583,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,136 UART: [rt]cmd =0x44504543, len=96
3,646,141 >>> mbox cmd response data (56 bytes)
3,646,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,291 UART: [rt]cmd =0x44504543, len=96
3,708,679 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,688 ready_for_fw is high
1,363,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,375 >>> mbox cmd response: success
2,990,063 UART:
2,990,079 UART: Running Caliptra FMC ...
2,990,487 UART:
2,990,630 UART: [state] CFI Enabled
3,001,073 UART: [fht] FMC Alias Private Key: 7
3,108,600 UART: [art] Extend RT PCRs Done
3,109,028 UART: [art] Lock RT PCRs Done
3,110,462 UART: [art] Populate DV Done
3,118,873 UART: [fht] FMC Alias Private Key: 7
3,119,923 UART: [art] Derive CDI
3,120,203 UART: [art] Store in in slot 0x4
3,205,962 UART: [art] Derive Key Pair
3,206,322 UART: [art] Store priv key in slot 0x5
3,219,042 UART: [art] Derive Key Pair - Done
3,233,789 UART: [art] Signing Cert with AUTHO
3,234,269 UART: RITY.KEYID = 7
3,249,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,142 UART: [art] PUB.X = C2E7A577A041F0DE9F5CD83F631FFBB64F57285FE1F822D531F799A05A02EA9C11F3473A80E4CEBB65873FBE2C0FF374
3,256,922 UART: [art] PUB.Y = 3D6AE4260B84B7046066EDA84FAFBF07C29ED786603AF7BA312637887EB216653654024919A9AEC3894771605662F0B8
3,263,854 UART: [art] SIG.R = DCE3DDD122333973BA306683357E197635575F1FCB7484988C4F9E6D5EADF8629E29562DC8AF3C8510021E7166349FF8
3,270,619 UART: [art] SIG.S = 996CC4C8DEAEE7EF3693C651D60D084E772EE323FCD3F23C3246793A02CC5CF9DBB683CF482840A796E0394EF7C5637E
3,294,143 UART: Caliptra RT
3,294,488 UART: [state] CFI Enabled
3,402,748 UART: [rt] RT listening for mailbox commands...
3,403,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,920 UART: [rt]cmd =0x44504543, len=96
3,466,595 >>> mbox cmd response data (56 bytes)
3,466,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,627 UART: [rt]cmd =0x44504543, len=96
3,529,431 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,579 UART: [kat] SHA2-256
903,519 UART: [kat] SHA2-384
906,304 UART: [kat] SHA2-512-ACC
908,205 UART: [kat] ECC-384
918,228 UART: [kat] HMAC-384Kdf
922,714 UART: [kat] LMS
1,171,042 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,277 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 ready_for_fw is high
1,176,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,082 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,690 UART: [fwproc] Wait for Commands...
1,283,400 UART: [fwproc] Recv command 0x46574c44
1,284,128 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,945 >>> mbox cmd response: success
2,775,191 UART: [afmc] ++
2,775,359 UART: [afmc] CDI.KEYID = 6
2,775,721 UART: [afmc] SUBJECT.KEYID = 7
2,776,146 UART: [afmc] AUTHORITY.KEYID = 5
2,811,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,820 UART: [afmc] --
2,855,918 UART: [cold-reset] --
2,856,752 UART: [state] Locking Datavault
2,857,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,597 UART: [state] Locking ICCM
2,859,193 UART: [exit] Launching FMC @ 0x40000130
2,864,522 UART:
2,864,538 UART: Running Caliptra FMC ...
2,864,946 UART:
2,865,000 UART: [state] CFI Enabled
2,875,419 UART: [fht] FMC Alias Private Key: 7
2,983,134 UART: [art] Extend RT PCRs Done
2,983,562 UART: [art] Lock RT PCRs Done
2,985,276 UART: [art] Populate DV Done
2,993,573 UART: [fht] FMC Alias Private Key: 7
2,994,553 UART: [art] Derive CDI
2,994,833 UART: [art] Store in in slot 0x4
3,080,370 UART: [art] Derive Key Pair
3,080,730 UART: [art] Store priv key in slot 0x5
3,093,856 UART: [art] Derive Key Pair - Done
3,108,782 UART: [art] Signing Cert with AUTHO
3,109,262 UART: RITY.KEYID = 7
3,124,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,959 UART: [art] PUB.X = C8FB0F37DCDAA832AB7C19EED62DE5EA7927F14A8C30DAE614863A072A57AB41F874AF3308CB8F4F4B680695C72197B7
3,131,733 UART: [art] PUB.Y = 5C05285C1AE150441EE04FAA6975985CAC7687A92C57F0649820887EC266AE5E845CAD72CC37A1A315AAB428CF7CA1D7
3,138,688 UART: [art] SIG.R = A140CD3187C9B74319BAD7198FD711463388CF8C96E96CFEFA59CE35407AF9A3BC3DDBF7904F45745B573873F3C0AEAA
3,145,472 UART: [art] SIG.S = 6D298FC3C020CF3BF7755333ADC8E4B03DF73465A5A21D4B90636C5B401D2285ACB4049035B01129E52B9101B22CC270
3,169,269 UART: Caliptra RT
3,169,522 UART: [state] CFI Enabled
3,276,927 UART: [rt] RT listening for mailbox commands...
3,277,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,055 UART: [rt]cmd =0x44504543, len=96
3,340,076 >>> mbox cmd response data (56 bytes)
3,340,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,020 UART: [rt]cmd =0x44504543, len=96
3,402,388 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 ready_for_fw is high
1,060,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,738 >>> mbox cmd response: success
2,687,842 UART:
2,687,858 UART: Running Caliptra FMC ...
2,688,266 UART:
2,688,320 UART: [state] CFI Enabled
2,699,059 UART: [fht] FMC Alias Private Key: 7
2,807,400 UART: [art] Extend RT PCRs Done
2,807,828 UART: [art] Lock RT PCRs Done
2,809,070 UART: [art] Populate DV Done
2,817,241 UART: [fht] FMC Alias Private Key: 7
2,818,283 UART: [art] Derive CDI
2,818,563 UART: [art] Store in in slot 0x4
2,904,486 UART: [art] Derive Key Pair
2,904,846 UART: [art] Store priv key in slot 0x5
2,917,522 UART: [art] Derive Key Pair - Done
2,931,990 UART: [art] Signing Cert with AUTHO
2,932,470 UART: RITY.KEYID = 7
2,947,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,387 UART: [art] PUB.X = 19761D0AA47C7233E38D452553D746CFDCEA6293F5A43DDB06C9384E843D19889D7F2FDE40D612A38B9D5CDCF88449E6
2,955,159 UART: [art] PUB.Y = C7DB65DD7892B6388DCAAF6ED4D1C828A6BA86097ACBF4DC80706EF2A1D77CBD172B987B592F1C485AF134AC504C615F
2,962,126 UART: [art] SIG.R = EF5D3FFEF40BFFFB76D74BDD69B7A6C5CF744CCD1DE85E05665DB9F7AA50CFD8CE956AE3E1F86CC1702D4A15FFEECCB4
2,968,932 UART: [art] SIG.S = 66456A39606237FA4D305F75D384A07345632EF93BDA784299568CCFC86D2D3BC2B348B474CC21279025B3D4D6572A21
2,992,877 UART: Caliptra RT
2,993,130 UART: [state] CFI Enabled
3,101,221 UART: [rt] RT listening for mailbox commands...
3,101,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,243 UART: [rt]cmd =0x44504543, len=96
3,165,124 >>> mbox cmd response data (56 bytes)
3,165,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,210 UART: [rt]cmd =0x44504543, len=96
3,227,990 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,132 UART: [state] WD Timer not started. Device not locked for debugging
87,301 UART: [kat] SHA2-256
892,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,076 UART: [kat] ++
897,228 UART: [kat] sha1
901,532 UART: [kat] SHA2-256
903,472 UART: [kat] SHA2-384
906,143 UART: [kat] SHA2-512-ACC
908,044 UART: [kat] ECC-384
917,481 UART: [kat] HMAC-384Kdf
922,193 UART: [kat] LMS
1,170,521 UART: [kat] --
1,171,292 UART: [cold-reset] ++
1,171,814 UART: [fht] FHT @ 0x50003400
1,174,591 UART: [idev] ++
1,174,759 UART: [idev] CDI.KEYID = 6
1,175,119 UART: [idev] SUBJECT.KEYID = 7
1,175,543 UART: [idev] UDS.KEYID = 0
1,175,888 ready_for_fw is high
1,175,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,485 UART: [idev] Erasing UDS.KEYID = 0
1,200,374 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,934 UART: [ldev] ++
1,210,102 UART: [ldev] CDI.KEYID = 6
1,210,465 UART: [ldev] SUBJECT.KEYID = 5
1,210,891 UART: [ldev] AUTHORITY.KEYID = 7
1,211,354 UART: [ldev] FE.KEYID = 1
1,216,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,546 UART: [ldev] --
1,281,929 UART: [fwproc] Wait for Commands...
1,282,723 UART: [fwproc] Recv command 0x46574c44
1,283,451 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,658 >>> mbox cmd response: success
2,774,774 UART: [afmc] ++
2,774,942 UART: [afmc] CDI.KEYID = 6
2,775,304 UART: [afmc] SUBJECT.KEYID = 7
2,775,729 UART: [afmc] AUTHORITY.KEYID = 5
2,811,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,525 UART: [afmc] --
2,855,435 UART: [cold-reset] --
2,856,635 UART: [state] Locking Datavault
2,857,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,330 UART: [state] Locking ICCM
2,859,004 UART: [exit] Launching FMC @ 0x40000130
2,864,333 UART:
2,864,349 UART: Running Caliptra FMC ...
2,864,757 UART:
2,864,900 UART: [state] CFI Enabled
2,875,419 UART: [fht] FMC Alias Private Key: 7
2,983,538 UART: [art] Extend RT PCRs Done
2,983,966 UART: [art] Lock RT PCRs Done
2,985,596 UART: [art] Populate DV Done
2,993,965 UART: [fht] FMC Alias Private Key: 7
2,995,051 UART: [art] Derive CDI
2,995,331 UART: [art] Store in in slot 0x4
3,081,318 UART: [art] Derive Key Pair
3,081,678 UART: [art] Store priv key in slot 0x5
3,094,942 UART: [art] Derive Key Pair - Done
3,109,818 UART: [art] Signing Cert with AUTHO
3,110,298 UART: RITY.KEYID = 7
3,125,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,205 UART: [art] PUB.X = F5958D0A022799BBDA9843FB698CF1AD768600A5F52386F245EFB8E56F4BCE362890E1CEE8627B5A270956531BA532BF
3,132,950 UART: [art] PUB.Y = 5E3B339AD1F13C01214E842C57309D43E17C6755FCE2F204777D75499A0F5D0CB75B996B543AB45C55DA1FD0D1B6F7C8
3,139,894 UART: [art] SIG.R = 6153DA1291D42FAC5099D808D614505779C6FCE07BDECC6F48DBA827009DF9F22814482047AAFFA597EC5FA2D3DE93AA
3,146,653 UART: [art] SIG.S = 1FEFE12B4D6FAA5AF27504055EDC91F18BF9E3F557200611FFBFC469C5545B7CE1702925DFE97373D05D00EFEA70CC09
3,170,508 UART: Caliptra RT
3,170,853 UART: [state] CFI Enabled
3,278,732 UART: [rt] RT listening for mailbox commands...
3,279,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,980 UART: [rt]cmd =0x44504543, len=96
3,342,083 >>> mbox cmd response data (56 bytes)
3,342,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,201 UART: [rt]cmd =0x44504543, len=96
3,404,449 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,998 ready_for_fw is high
1,059,998 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,957 >>> mbox cmd response: success
2,687,061 UART:
2,687,077 UART: Running Caliptra FMC ...
2,687,485 UART:
2,687,628 UART: [state] CFI Enabled
2,698,411 UART: [fht] FMC Alias Private Key: 7
2,806,494 UART: [art] Extend RT PCRs Done
2,806,922 UART: [art] Lock RT PCRs Done
2,808,432 UART: [art] Populate DV Done
2,816,653 UART: [fht] FMC Alias Private Key: 7
2,817,599 UART: [art] Derive CDI
2,817,879 UART: [art] Store in in slot 0x4
2,903,584 UART: [art] Derive Key Pair
2,903,944 UART: [art] Store priv key in slot 0x5
2,916,926 UART: [art] Derive Key Pair - Done
2,931,603 UART: [art] Signing Cert with AUTHO
2,932,083 UART: RITY.KEYID = 7
2,947,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,064 UART: [art] PUB.X = 4B5BA51B5515E31AC77D786C97AEBDCC7E39DF0FA2A3955FC014C488EBC1DB02E3730876A4BBBD76A0CB767AB91A87BB
2,954,849 UART: [art] PUB.Y = 0A61CD3122217CF83925763EEB1046B810FAB9C6A3ECCBAEA618481F62946DB877DC840484C7D5E4C876A2330F69E1FF
2,961,798 UART: [art] SIG.R = E77D1282F38592C114523C873DD0C7876D04CBA77119D7276EDB8F540BF6C00A4802671EAC355B91AAD859D4D04858EA
2,968,558 UART: [art] SIG.S = FB99DBEFA338D73C025A8D591188DD762CF6ECDDFCD8FA9BE14DDF2343315B5A101A956305CD2E68C8F58079B4664078
2,992,061 UART: Caliptra RT
2,992,406 UART: [state] CFI Enabled
3,099,948 UART: [rt] RT listening for mailbox commands...
3,100,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,764 UART: [rt]cmd =0x44504543, len=96
3,163,255 >>> mbox cmd response data (56 bytes)
3,163,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,341 UART: [rt]cmd =0x44504543, len=96
3,225,857 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,600 UART: [state] LifecycleState = Unprovisioned
85,255 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 ready_for_fw is high
1,174,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,551 >>> mbox cmd response: success
2,773,586 UART: [afmc] ++
2,773,754 UART: [afmc] CDI.KEYID = 6
2,774,117 UART: [afmc] SUBJECT.KEYID = 7
2,774,543 UART: [afmc] AUTHORITY.KEYID = 5
2,810,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,415 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,771 UART: [afmc] --
2,853,771 UART: [cold-reset] --
2,854,647 UART: [state] Locking Datavault
2,855,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,446 UART: [state] Locking ICCM
2,856,886 UART: [exit] Launching FMC @ 0x40000130
2,862,215 UART:
2,862,231 UART: Running Caliptra FMC ...
2,862,639 UART:
2,862,693 UART: [state] CFI Enabled
2,873,268 UART: [fht] FMC Alias Private Key: 7
2,980,745 UART: [art] Extend RT PCRs Done
2,981,173 UART: [art] Lock RT PCRs Done
2,982,635 UART: [art] Populate DV Done
2,990,864 UART: [fht] FMC Alias Private Key: 7
2,991,934 UART: [art] Derive CDI
2,992,214 UART: [art] Store in in slot 0x4
3,077,899 UART: [art] Derive Key Pair
3,078,259 UART: [art] Store priv key in slot 0x5
3,091,467 UART: [art] Derive Key Pair - Done
3,106,363 UART: [art] Signing Cert with AUTHO
3,106,843 UART: RITY.KEYID = 7
3,121,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,638 UART: [art] PUB.X = FB05C1F392D399B4609A96D3F157D7DCD06631500974BE4AAE825886F26A57501F0886F9654ABCA546D114A2737BFC16
3,129,399 UART: [art] PUB.Y = E82CD003C9E095E68D129A285A28379A4F80916A137F815C4BA0B215CA6A1A87F248BBCA26A817D2D876F30F8943A36D
3,136,347 UART: [art] SIG.R = 849ABD5462ECC2AEA3640A60D41F59F29907DDB44320BD86298910CAEAA417067EE16B503F1EB3D798F0B5856AEC1E24
3,143,118 UART: [art] SIG.S = 02707CA9C39E308182455A608327C67A9957E2C70C03438588751BAEAAC692A7CA205C636B0440F7BCFFDF6A1EE44AA7
3,166,543 UART: Caliptra RT
3,166,796 UART: [state] CFI Enabled
3,274,575 UART: [rt] RT listening for mailbox commands...
3,275,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,461 UART: [rt]cmd =0x44504543, len=96
3,337,454 >>> mbox cmd response data (56 bytes)
3,337,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,422 UART: [rt]cmd =0x44504543, len=96
3,399,296 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,618 ready_for_fw is high
1,055,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,545 >>> mbox cmd response: success
2,681,641 UART:
2,681,657 UART: Running Caliptra FMC ...
2,682,065 UART:
2,682,119 UART: [state] CFI Enabled
2,692,408 UART: [fht] FMC Alias Private Key: 7
2,799,759 UART: [art] Extend RT PCRs Done
2,800,187 UART: [art] Lock RT PCRs Done
2,801,593 UART: [art] Populate DV Done
2,809,654 UART: [fht] FMC Alias Private Key: 7
2,810,616 UART: [art] Derive CDI
2,810,896 UART: [art] Store in in slot 0x4
2,896,697 UART: [art] Derive Key Pair
2,897,057 UART: [art] Store priv key in slot 0x5
2,910,439 UART: [art] Derive Key Pair - Done
2,925,200 UART: [art] Signing Cert with AUTHO
2,925,680 UART: RITY.KEYID = 7
2,940,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,761 UART: [art] PUB.X = 7B947B6569755A72D74B57550C7675B87868608BA4A3EEF6103FDA77477A7E096079CFD404CC8F759533E97182D65DD0
2,948,516 UART: [art] PUB.Y = D74EFB826166281486670409D6418525852F4D52612634059519BCB67622EF6EC01FAEC87B49B701A581A91E4894FE01
2,955,439 UART: [art] SIG.R = 641BBC229B53BBC4E1E89C5DF59A3DE6C0B0B797F1B4480B2C62AAF95CF02CEF92EAADF819E1A53FCF25C9AE18CBF1D3
2,962,238 UART: [art] SIG.S = 208DF1780234303DC22DC7A873BB0B4C244708142057AE26E43B9BDA795AB950F34C199B6AD444E00BD7A8DEC21E60DC
2,986,443 UART: Caliptra RT
2,986,696 UART: [state] CFI Enabled
3,094,695 UART: [rt] RT listening for mailbox commands...
3,095,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,731 UART: [rt]cmd =0x44504543, len=96
3,158,338 >>> mbox cmd response data (56 bytes)
3,158,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,258 UART: [rt]cmd =0x44504543, len=96
3,221,724 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,055 UART: [kat] SHA2-512-ACC
905,956 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,674 UART: [idev] ++
1,172,842 UART: [idev] CDI.KEYID = 6
1,173,203 UART: [idev] SUBJECT.KEYID = 7
1,173,628 UART: [idev] UDS.KEYID = 0
1,173,974 ready_for_fw is high
1,173,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,544 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,549 UART: [ldev] Erasing FE.KEYID = 1
1,241,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,342 >>> mbox cmd response: success
2,772,457 UART: [afmc] ++
2,772,625 UART: [afmc] CDI.KEYID = 6
2,772,988 UART: [afmc] SUBJECT.KEYID = 7
2,773,414 UART: [afmc] AUTHORITY.KEYID = 5
2,810,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,094 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,706 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,425 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,292 UART: [afmc] --
2,853,198 UART: [cold-reset] --
2,854,090 UART: [state] Locking Datavault
2,855,187 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,791 UART: [state] Locking ICCM
2,856,293 UART: [exit] Launching FMC @ 0x40000130
2,861,622 UART:
2,861,638 UART: Running Caliptra FMC ...
2,862,046 UART:
2,862,189 UART: [state] CFI Enabled
2,873,360 UART: [fht] FMC Alias Private Key: 7
2,981,867 UART: [art] Extend RT PCRs Done
2,982,295 UART: [art] Lock RT PCRs Done
2,983,831 UART: [art] Populate DV Done
2,992,190 UART: [fht] FMC Alias Private Key: 7
2,993,118 UART: [art] Derive CDI
2,993,398 UART: [art] Store in in slot 0x4
3,079,033 UART: [art] Derive Key Pair
3,079,393 UART: [art] Store priv key in slot 0x5
3,093,079 UART: [art] Derive Key Pair - Done
3,108,078 UART: [art] Signing Cert with AUTHO
3,108,558 UART: RITY.KEYID = 7
3,123,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,969 UART: [art] PUB.X = 5A1909A20416174BAD03B679F0ABC38616930F4159420061DE1003A3786DFAEDF6EF9E0FC8809A4DC500E631D3A92356
3,130,677 UART: [art] PUB.Y = E63527F1114073554500F60EE902CF16CFF7D41EC7D54BDA2CAF665FEE398DA602FC83E7A870C52A60744FEAD1841F60
3,137,606 UART: [art] SIG.R = ACDB3E6C50C3DC62615825BA0F3A7602ED5FA200EF18EACD540FD3E73CA22262D81CD09079E6F16882C786439087626E
3,144,353 UART: [art] SIG.S = 716E2992D1F7D27B959526C86D76DCC120444D60F654D9FBFF10CC9BEDB6C11736AAFD24E2402A321A78C2559AA7E16E
3,168,274 UART: Caliptra RT
3,168,619 UART: [state] CFI Enabled
3,277,630 UART: [rt] RT listening for mailbox commands...
3,278,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,924 UART: [rt]cmd =0x44504543, len=96
3,341,919 >>> mbox cmd response data (56 bytes)
3,341,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,801 UART: [rt]cmd =0x44504543, len=96
3,404,195 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,671 ready_for_fw is high
1,055,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,900 >>> mbox cmd response: success
2,684,158 UART:
2,684,174 UART: Running Caliptra FMC ...
2,684,582 UART:
2,684,725 UART: [state] CFI Enabled
2,695,232 UART: [fht] FMC Alias Private Key: 7
2,803,811 UART: [art] Extend RT PCRs Done
2,804,239 UART: [art] Lock RT PCRs Done
2,806,097 UART: [art] Populate DV Done
2,814,078 UART: [fht] FMC Alias Private Key: 7
2,815,100 UART: [art] Derive CDI
2,815,380 UART: [art] Store in in slot 0x4
2,901,267 UART: [art] Derive Key Pair
2,901,627 UART: [art] Store priv key in slot 0x5
2,914,959 UART: [art] Derive Key Pair - Done
2,929,601 UART: [art] Signing Cert with AUTHO
2,930,081 UART: RITY.KEYID = 7
2,945,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,190 UART: [art] PUB.X = 0B06A46613FB096BF26AC11378AE084CAA91F5BC74975B28F7D022CFF43F08653233D7DE028D51553471FD8FB95E14C0
2,952,946 UART: [art] PUB.Y = 4581A34C0BC26B2E516A2DAA463B95F699CAAA06B23B9B5AEF9463DFBC93EDA53D21FF4C97ED47C36B371C46E9D30981
2,959,905 UART: [art] SIG.R = 9875177917E56344B855FE0EDF5B4BC5D510E4DE9863E3A2078F347A780F43B5B614977905D951209BBE78C2AD4C85E4
2,966,661 UART: [art] SIG.S = 20E358244CD658B36A013EBE7846604B5258B71FFD07FC8FE2BE479FC95CBF77362E6BD4A444D51DC79E4B57C321FEAD
2,990,518 UART: Caliptra RT
2,990,863 UART: [state] CFI Enabled
3,098,726 UART: [rt] RT listening for mailbox commands...
3,099,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,988 UART: [rt]cmd =0x44504543, len=96
3,162,203 >>> mbox cmd response data (56 bytes)
3,162,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,893 UART: [rt]cmd =0x44504543, len=96
3,223,743 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,668 UART: [state] LifecycleState = Unprovisioned
85,323 UART: [state] DebugLocked = No
85,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,641 UART: [kat] SHA2-256
881,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,687 UART: [kat] ++
885,839 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,570 UART: [kat] SHA2-512-ACC
896,471 UART: [kat] ECC-384
901,762 UART: [kat] HMAC-384Kdf
906,224 UART: [kat] LMS
1,474,420 UART: [kat] --
1,475,117 UART: [cold-reset] ++
1,475,555 UART: [fht] Storing FHT @ 0x50003400
1,478,418 UART: [idev] ++
1,478,586 UART: [idev] CDI.KEYID = 6
1,478,946 UART: [idev] SUBJECT.KEYID = 7
1,479,370 UART: [idev] UDS.KEYID = 0
1,479,715 ready_for_fw is high
1,479,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,724 UART: [idev] Erasing UDS.KEYID = 0
1,504,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,034 UART: [idev] --
1,514,145 UART: [ldev] ++
1,514,313 UART: [ldev] CDI.KEYID = 6
1,514,676 UART: [ldev] SUBJECT.KEYID = 5
1,515,102 UART: [ldev] AUTHORITY.KEYID = 7
1,515,565 UART: [ldev] FE.KEYID = 1
1,520,705 UART: [ldev] Erasing FE.KEYID = 1
1,545,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,686 UART: [ldev] --
1,585,159 UART: [fwproc] Waiting for Commands...
1,585,944 UART: [fwproc] Received command 0x46574c44
1,586,735 UART: [fwproc] Received Image of size 114332 bytes
2,884,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,186 >>> mbox cmd response: success
3,078,378 UART: [afmc] ++
3,078,546 UART: [afmc] CDI.KEYID = 6
3,078,908 UART: [afmc] SUBJECT.KEYID = 7
3,079,333 UART: [afmc] AUTHORITY.KEYID = 5
3,114,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,011 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,701 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,358 UART: [afmc] --
3,157,430 UART: [cold-reset] --
3,158,024 UART: [state] Locking Datavault
3,159,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,823 UART: [state] Locking ICCM
3,160,257 UART: [exit] Launching FMC @ 0x40000130
3,165,586 UART:
3,165,602 UART: Running Caliptra FMC ...
3,166,010 UART:
3,166,064 UART: [state] CFI Enabled
3,176,337 UART: [fht] FMC Alias Private Key: 7
3,284,616 UART: [art] Extend RT PCRs Done
3,285,044 UART: [art] Lock RT PCRs Done
3,286,378 UART: [art] Populate DV Done
3,294,731 UART: [fht] FMC Alias Private Key: 7
3,295,801 UART: [art] Derive CDI
3,296,081 UART: [art] Store in in slot 0x4
3,381,780 UART: [art] Derive Key Pair
3,382,140 UART: [art] Store priv key in slot 0x5
3,395,964 UART: [art] Derive Key Pair - Done
3,410,902 UART: [art] Signing Cert with AUTHO
3,411,382 UART: RITY.KEYID = 7
3,426,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,201 UART: [art] PUB.X = 786A56F12CEB0D757E759AE5199AFC3F5396AD6D1BBCD59DC49AC237DC7B5ACCAD142A35B4BB21A8A13B895E52688EA2
3,433,990 UART: [art] PUB.Y = 4104F158D72EBD777ED24E0295A623AD06D678C73DE6433FB1D63952B88959311A1BEF5E4B74E4074FD6AF8E17C9273F
3,440,932 UART: [art] SIG.R = 93760AEF8F9570D7300CAD3A192589C85E7F27F40CD0CA879C8E8E11F71C4899FC14A1ABFF57C55F245FD2CA8AD08CB6
3,447,709 UART: [art] SIG.S = C939BD56645FE1F33B53C285C6C0B3D964FF8677C485D06A41B5ACB5CD3953165E3A1198D58C80A58D95BCC6E51CE814
3,471,568 UART: Caliptra RT
3,471,821 UART: [state] CFI Enabled
3,580,541 UART: [rt] RT listening for mailbox commands...
3,581,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,189 UART: [rt]cmd =0x44504543, len=24
3,637,684 >>> mbox cmd response data (40 bytes)
3,637,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,514 UART: [rt]cmd =0x44504543, len=96
3,674,895 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,402 >>> mbox cmd response: success
2,988,588 UART:
2,988,604 UART: Running Caliptra FMC ...
2,989,012 UART:
2,989,066 UART: [state] CFI Enabled
2,999,311 UART: [fht] FMC Alias Private Key: 7
3,107,368 UART: [art] Extend RT PCRs Done
3,107,796 UART: [art] Lock RT PCRs Done
3,109,320 UART: [art] Populate DV Done
3,117,441 UART: [fht] FMC Alias Private Key: 7
3,118,437 UART: [art] Derive CDI
3,118,717 UART: [art] Store in in slot 0x4
3,204,176 UART: [art] Derive Key Pair
3,204,536 UART: [art] Store priv key in slot 0x5
3,217,342 UART: [art] Derive Key Pair - Done
3,231,865 UART: [art] Signing Cert with AUTHO
3,232,345 UART: RITY.KEYID = 7
3,247,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,464 UART: [art] PUB.X = CBD1F04C4889580DDD43996FB70B86539FD675334BEFC404FF670E1C4F7289F439A1147CF99239221FEEFF4478C29F84
3,255,226 UART: [art] PUB.Y = 78BAA1212FCC6E4817A41A92D3B9A377FFC38AC16E085D600B64AB276C262B798DECB1879E9CF01D051C017537BF5C51
3,262,174 UART: [art] SIG.R = 2E34825740A65EF9D266E313F65DF1BA67A1D6A5BB488D12DBB206F832FDCB8725AD943623FD2931A613EEC03453FABB
3,268,953 UART: [art] SIG.S = 627B6105B9B4B48069B0BB02C7AE8F09CF3FFEE924643EDEC10A064293B15891896299878BC74E2A86FD12689EA0BB30
3,293,019 UART: Caliptra RT
3,293,272 UART: [state] CFI Enabled
3,401,644 UART: [rt] RT listening for mailbox commands...
3,402,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,284 UART: [rt]cmd =0x44504543, len=24
3,458,601 >>> mbox cmd response data (40 bytes)
3,458,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,507 UART: [rt]cmd =0x44504543, len=96
3,495,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,692 UART: [cold-reset] ++
1,477,138 UART: [fht] Storing FHT @ 0x50003400
1,479,855 UART: [idev] ++
1,480,023 UART: [idev] CDI.KEYID = 6
1,480,383 UART: [idev] SUBJECT.KEYID = 7
1,480,807 UART: [idev] UDS.KEYID = 0
1,481,152 ready_for_fw is high
1,481,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,475 UART: [idev] Erasing UDS.KEYID = 0
1,506,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,393 UART: [idev] --
1,516,436 UART: [ldev] ++
1,516,604 UART: [ldev] CDI.KEYID = 6
1,516,967 UART: [ldev] SUBJECT.KEYID = 5
1,517,393 UART: [ldev] AUTHORITY.KEYID = 7
1,517,856 UART: [ldev] FE.KEYID = 1
1,522,990 UART: [ldev] Erasing FE.KEYID = 1
1,548,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,691 UART: [ldev] --
1,588,200 UART: [fwproc] Waiting for Commands...
1,589,069 UART: [fwproc] Received command 0x46574c44
1,589,860 UART: [fwproc] Received Image of size 114332 bytes
2,888,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,370 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,585 >>> mbox cmd response: success
3,082,603 UART: [afmc] ++
3,082,771 UART: [afmc] CDI.KEYID = 6
3,083,133 UART: [afmc] SUBJECT.KEYID = 7
3,083,558 UART: [afmc] AUTHORITY.KEYID = 5
3,118,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,293 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,686 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,376 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,029 UART: [afmc] --
3,162,121 UART: [cold-reset] --
3,163,141 UART: [state] Locking Datavault
3,164,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,080 UART: [state] Locking ICCM
3,165,732 UART: [exit] Launching FMC @ 0x40000130
3,171,061 UART:
3,171,077 UART: Running Caliptra FMC ...
3,171,485 UART:
3,171,628 UART: [state] CFI Enabled
3,182,743 UART: [fht] FMC Alias Private Key: 7
3,290,678 UART: [art] Extend RT PCRs Done
3,291,106 UART: [art] Lock RT PCRs Done
3,292,274 UART: [art] Populate DV Done
3,300,811 UART: [fht] FMC Alias Private Key: 7
3,301,871 UART: [art] Derive CDI
3,302,151 UART: [art] Store in in slot 0x4
3,388,116 UART: [art] Derive Key Pair
3,388,476 UART: [art] Store priv key in slot 0x5
3,401,964 UART: [art] Derive Key Pair - Done
3,416,959 UART: [art] Signing Cert with AUTHO
3,417,439 UART: RITY.KEYID = 7
3,432,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,226 UART: [art] PUB.X = 9B4D05E98C42AE2E9DF56FD8AAE74EB63B3C9E0412E64406272D45646B6FFE2B77186D63767DC359E808968FE532931F
3,439,988 UART: [art] PUB.Y = 741EBB0D36DA658713426940FE78B56C2A60C913BC36CA4680700696F94E46FF39E7539A7BC31FE3D5B954E4CE25BC4A
3,446,938 UART: [art] SIG.R = 1BFADBAAC9A8EDF4359131ADFBC8569E3541F7C5504257137D011137525FEDD85B0CE6B299C8085DEC07947550C996BA
3,453,706 UART: [art] SIG.S = 7A9E9C2EF87C177B48FEAAD70A1BE1D61601B7B85B006E389E37AC2200B20F3D4C8BC8A69BD032F7F2384DB3A79EB84D
3,477,388 UART: Caliptra RT
3,477,733 UART: [state] CFI Enabled
3,585,849 UART: [rt] RT listening for mailbox commands...
3,586,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,497 UART: [rt]cmd =0x44504543, len=24
3,642,078 >>> mbox cmd response data (40 bytes)
3,642,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,946 UART: [rt]cmd =0x44504543, len=96
3,679,145 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,114 ready_for_fw is high
1,363,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,887 >>> mbox cmd response: success
2,989,753 UART:
2,989,769 UART: Running Caliptra FMC ...
2,990,177 UART:
2,990,320 UART: [state] CFI Enabled
3,001,107 UART: [fht] FMC Alias Private Key: 7
3,109,178 UART: [art] Extend RT PCRs Done
3,109,606 UART: [art] Lock RT PCRs Done
3,111,168 UART: [art] Populate DV Done
3,119,459 UART: [fht] FMC Alias Private Key: 7
3,120,491 UART: [art] Derive CDI
3,120,771 UART: [art] Store in in slot 0x4
3,206,318 UART: [art] Derive Key Pair
3,206,678 UART: [art] Store priv key in slot 0x5
3,219,886 UART: [art] Derive Key Pair - Done
3,234,556 UART: [art] Signing Cert with AUTHO
3,235,036 UART: RITY.KEYID = 7
3,250,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,243 UART: [art] PUB.X = 1654AAB35C7B0B5CA004D433202C27675A37DC9BA3D34D21F75149E04D2DC69801412AAE9CF2EDF38926ED49F6411888
3,258,008 UART: [art] PUB.Y = 45441A4A4B1BE13AE314337F77000D7CEB6C8771BD987B92DF3C4DAAD9A318626933AD842CA6A64984CC65CCE4BA9697
3,264,943 UART: [art] SIG.R = A84444D3537BF9FCE06191A4129CBC9839174E0778919694EBAFC2364093D371BBD12D21A7CEE5DF9A0243B01B4D0E61
3,271,708 UART: [art] SIG.S = 0AAD4DBFEF1B61603635A57D488AEAF6D8D7DD7DEB0A32C9DC45FC5667613DE44ADAED5E663E38C388AC84EBBB1322D3
3,295,953 UART: Caliptra RT
3,296,298 UART: [state] CFI Enabled
3,404,161 UART: [rt] RT listening for mailbox commands...
3,404,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,943 UART: [rt]cmd =0x44504543, len=24
3,461,630 >>> mbox cmd response data (40 bytes)
3,461,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,500 UART: [rt]cmd =0x44504543, len=96
3,498,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
902,029 UART: [kat] SHA2-256
903,969 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,261 UART: [fht] FHT @ 0x50003400
1,174,924 UART: [idev] ++
1,175,092 UART: [idev] CDI.KEYID = 6
1,175,452 UART: [idev] SUBJECT.KEYID = 7
1,175,876 UART: [idev] UDS.KEYID = 0
1,176,221 ready_for_fw is high
1,176,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,224 UART: [idev] Erasing UDS.KEYID = 0
1,201,829 UART: [idev] Sha1 KeyId Algorithm
1,210,191 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,217,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,719 UART: [ldev] --
1,283,008 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,500 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,835 >>> mbox cmd response: success
2,774,941 UART: [afmc] ++
2,775,109 UART: [afmc] CDI.KEYID = 6
2,775,471 UART: [afmc] SUBJECT.KEYID = 7
2,775,896 UART: [afmc] AUTHORITY.KEYID = 5
2,811,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,506 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,391 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,834 UART: [afmc] --
2,854,880 UART: [cold-reset] --
2,855,782 UART: [state] Locking Datavault
2,856,829 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,433 UART: [state] Locking ICCM
2,857,987 UART: [exit] Launching FMC @ 0x40000130
2,863,316 UART:
2,863,332 UART: Running Caliptra FMC ...
2,863,740 UART:
2,863,794 UART: [state] CFI Enabled
2,874,299 UART: [fht] FMC Alias Private Key: 7
2,982,634 UART: [art] Extend RT PCRs Done
2,983,062 UART: [art] Lock RT PCRs Done
2,984,766 UART: [art] Populate DV Done
2,993,141 UART: [fht] FMC Alias Private Key: 7
2,994,219 UART: [art] Derive CDI
2,994,499 UART: [art] Store in in slot 0x4
3,080,352 UART: [art] Derive Key Pair
3,080,712 UART: [art] Store priv key in slot 0x5
3,093,496 UART: [art] Derive Key Pair - Done
3,108,084 UART: [art] Signing Cert with AUTHO
3,108,564 UART: RITY.KEYID = 7
3,123,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,937 UART: [art] PUB.X = 8BC93DE33F4EBC40A20CB6EB5A1916CA32580E4F21451797A5DB88D6D6BA1E1D48B00C03D30AD091F0BB4D2E27E94CE3
3,130,710 UART: [art] PUB.Y = AFB183E0BFC79DA0E26D28153006DC9C062A4C3D1C64B39B979F582C312965627AF07E25035DEDA37BC6FEA105E579CA
3,137,660 UART: [art] SIG.R = D8B68C40E1943BBD7CC784E5120A5FFCCF7523EA4F9F2A6546C0E956203CF8944AFDF899EF7E8EA659C7B1D32AE68D74
3,144,445 UART: [art] SIG.S = 73801B280F87A1E9AE8DB1355787D1F35E3C2A443445A407A13E49E685045D18DF1D0D4323E34F7287E6B818D298B316
3,167,896 UART: Caliptra RT
3,168,149 UART: [state] CFI Enabled
3,276,902 UART: [rt] RT listening for mailbox commands...
3,277,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,652 UART: [rt]cmd =0x44504543, len=24
3,333,725 >>> mbox cmd response data (40 bytes)
3,333,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,497 UART: [rt]cmd =0x44504543, len=96
3,371,044 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 ready_for_fw is high
1,060,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,250 >>> mbox cmd response: success
2,690,274 UART:
2,690,290 UART: Running Caliptra FMC ...
2,690,698 UART:
2,690,752 UART: [state] CFI Enabled
2,701,101 UART: [fht] FMC Alias Private Key: 7
2,808,888 UART: [art] Extend RT PCRs Done
2,809,316 UART: [art] Lock RT PCRs Done
2,810,504 UART: [art] Populate DV Done
2,818,609 UART: [fht] FMC Alias Private Key: 7
2,819,595 UART: [art] Derive CDI
2,819,875 UART: [art] Store in in slot 0x4
2,905,542 UART: [art] Derive Key Pair
2,905,902 UART: [art] Store priv key in slot 0x5
2,919,500 UART: [art] Derive Key Pair - Done
2,934,197 UART: [art] Signing Cert with AUTHO
2,934,677 UART: RITY.KEYID = 7
2,949,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,440 UART: [art] PUB.X = C3CE1914345EA6947AE39E8ABA8A9DA77118915B685CC78E238FF2DFF47A90FF86D54C4C1AAA295A8A7DBDD66EB2CA4D
2,957,234 UART: [art] PUB.Y = A39DEDB7E0CEA47EF222BB20F587783C3F158895EDC13804F72E74887314BCB82430951C4EDF5F5C005E198EC9447F66
2,964,165 UART: [art] SIG.R = AB5752001C00BE4670DF61B9D3D3E8E421EC63A24B3FB53A2B2D275F7A67580B7C5C15A71B6167E21BEDEE8C4FDA1756
2,970,902 UART: [art] SIG.S = A6EC1B546DC2FD3492B285E350E09DC0E10F39E0284C0F80073B453198D58D875709789D0EAB8804E28ECC1937690596
2,994,416 UART: Caliptra RT
2,994,669 UART: [state] CFI Enabled
3,103,113 UART: [rt] RT listening for mailbox commands...
3,103,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,747 UART: [rt]cmd =0x44504543, len=24
3,160,454 >>> mbox cmd response data (40 bytes)
3,160,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,446 UART: [rt]cmd =0x44504543, len=96
3,197,877 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
893,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,922 UART: [kat] ++
898,074 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,761 UART: [kat] LMS
1,171,089 UART: [kat] --
1,171,762 UART: [cold-reset] ++
1,172,140 UART: [fht] FHT @ 0x50003400
1,174,763 UART: [idev] ++
1,174,931 UART: [idev] CDI.KEYID = 6
1,175,291 UART: [idev] SUBJECT.KEYID = 7
1,175,715 UART: [idev] UDS.KEYID = 0
1,176,060 ready_for_fw is high
1,176,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,597 UART: [idev] Erasing UDS.KEYID = 0
1,200,754 UART: [idev] Sha1 KeyId Algorithm
1,209,266 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,216,728 UART: [ldev] Erasing FE.KEYID = 1
1,243,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,514 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,385 UART: [fwproc] Recv command 0x46574c44
1,284,113 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,828 >>> mbox cmd response: success
2,774,936 UART: [afmc] ++
2,775,104 UART: [afmc] CDI.KEYID = 6
2,775,466 UART: [afmc] SUBJECT.KEYID = 7
2,775,891 UART: [afmc] AUTHORITY.KEYID = 5
2,811,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,621 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,471 UART: [afmc] --
2,854,421 UART: [cold-reset] --
2,855,147 UART: [state] Locking Datavault
2,856,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,742 UART: [state] Locking ICCM
2,857,416 UART: [exit] Launching FMC @ 0x40000130
2,862,745 UART:
2,862,761 UART: Running Caliptra FMC ...
2,863,169 UART:
2,863,312 UART: [state] CFI Enabled
2,873,819 UART: [fht] FMC Alias Private Key: 7
2,982,150 UART: [art] Extend RT PCRs Done
2,982,578 UART: [art] Lock RT PCRs Done
2,984,166 UART: [art] Populate DV Done
2,992,219 UART: [fht] FMC Alias Private Key: 7
2,993,347 UART: [art] Derive CDI
2,993,627 UART: [art] Store in in slot 0x4
3,079,346 UART: [art] Derive Key Pair
3,079,706 UART: [art] Store priv key in slot 0x5
3,092,836 UART: [art] Derive Key Pair - Done
3,107,574 UART: [art] Signing Cert with AUTHO
3,108,054 UART: RITY.KEYID = 7
3,123,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,837 UART: [art] PUB.X = 2C406ED48885E55F55897DF37749F2B4D585AA748D6F6DB93D810AF3155D25B73914608E0704B64468BB41282FF75281
3,130,590 UART: [art] PUB.Y = 1AFA7010181B71F43FCA365416312079566194C1CA502376AED827A0151FEF921DC3C2C72F5817908A02C17D6D46CA8D
3,137,535 UART: [art] SIG.R = 40A69FAFC2E46FD9E4DABF2E76F5C8E4AF1524F37B81ACD5C91642F4CEE13924740247B4B9A8B697D16AF91D28C8A5F4
3,144,320 UART: [art] SIG.S = 37C19318C77E5571775F261CB4F6193986C398AEF26AC400EE8F0880DA3F2A6FF7696881C58E6F7B840C8075B46D90C3
3,168,279 UART: Caliptra RT
3,168,624 UART: [state] CFI Enabled
3,276,799 UART: [rt] RT listening for mailbox commands...
3,277,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,303 UART: [rt]cmd =0x44504543, len=24
3,334,280 >>> mbox cmd response data (40 bytes)
3,334,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,232 UART: [rt]cmd =0x44504543, len=96
3,371,591 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,338 ready_for_fw is high
1,060,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,879 >>> mbox cmd response: success
2,688,655 UART:
2,688,671 UART: Running Caliptra FMC ...
2,689,079 UART:
2,689,222 UART: [state] CFI Enabled
2,699,551 UART: [fht] FMC Alias Private Key: 7
2,807,562 UART: [art] Extend RT PCRs Done
2,807,990 UART: [art] Lock RT PCRs Done
2,809,546 UART: [art] Populate DV Done
2,817,591 UART: [fht] FMC Alias Private Key: 7
2,818,693 UART: [art] Derive CDI
2,818,973 UART: [art] Store in in slot 0x4
2,904,510 UART: [art] Derive Key Pair
2,904,870 UART: [art] Store priv key in slot 0x5
2,917,796 UART: [art] Derive Key Pair - Done
2,932,832 UART: [art] Signing Cert with AUTHO
2,933,312 UART: RITY.KEYID = 7
2,948,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,217 UART: [art] PUB.X = D7CF13904C5F910D30F8C793050601D25FC62EFD4FD493D7A84E7BD0271F73B0BCE1E391034624D26E22D36954530728
2,955,967 UART: [art] PUB.Y = F6F46E1E5730FFBF6BA738502D2C92D615B0245F71A9C809321ADFC665879A9E4EB72C05C7CF6B9FBEB48ADEEBD896A6
2,962,931 UART: [art] SIG.R = 16E59D9BDD3ABCBBE0722AC3CD355A2F2A85EADF4F79949DDFDB7E08825766A8B32E9FC9F43400168D1C40E6802044AA
2,969,694 UART: [art] SIG.S = 198E1BD5BF4F023D0F4B4EC4877181B15137210195A87A723B385D603E6D7393FA5452141F6CF70C3C81845A19F51821
2,993,947 UART: Caliptra RT
2,994,292 UART: [state] CFI Enabled
3,101,355 UART: [rt] RT listening for mailbox commands...
3,102,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,049 UART: [rt]cmd =0x44504543, len=24
3,158,242 >>> mbox cmd response data (40 bytes)
3,158,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,158 UART: [rt]cmd =0x44504543, len=96
3,195,231 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,730 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,769 UART: [fwproc] Recv command 0x46574c44
1,282,502 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,035 >>> mbox cmd response: success
2,774,162 UART: [afmc] ++
2,774,330 UART: [afmc] CDI.KEYID = 6
2,774,693 UART: [afmc] SUBJECT.KEYID = 7
2,775,119 UART: [afmc] AUTHORITY.KEYID = 5
2,810,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,499 UART: [afmc] --
2,853,565 UART: [cold-reset] --
2,854,503 UART: [state] Locking Datavault
2,855,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,220 UART: [state] Locking ICCM
2,856,704 UART: [exit] Launching FMC @ 0x40000130
2,862,033 UART:
2,862,049 UART: Running Caliptra FMC ...
2,862,457 UART:
2,862,511 UART: [state] CFI Enabled
2,872,982 UART: [fht] FMC Alias Private Key: 7
2,981,705 UART: [art] Extend RT PCRs Done
2,982,133 UART: [art] Lock RT PCRs Done
2,983,527 UART: [art] Populate DV Done
2,991,824 UART: [fht] FMC Alias Private Key: 7
2,992,784 UART: [art] Derive CDI
2,993,064 UART: [art] Store in in slot 0x4
3,078,425 UART: [art] Derive Key Pair
3,078,785 UART: [art] Store priv key in slot 0x5
3,091,533 UART: [art] Derive Key Pair - Done
3,106,243 UART: [art] Signing Cert with AUTHO
3,106,723 UART: RITY.KEYID = 7
3,122,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,780 UART: [art] PUB.X = C03EFEE98618EEEE599D6649BCAAE2C5F5022364191B65E9B21C4F628B1C2FA58A375E908FB3741F69984FA77090DEF3
3,129,557 UART: [art] PUB.Y = EF0F77742232FB144F792527570F94D9926C380025B58ABA0CF3477BDFAD5B60257FCB04C0B1A5299EA8BCEFF7A3CC4D
3,136,487 UART: [art] SIG.R = 9891DF96D2911A13506444AABDF94967C1E85D3A578932B1BD02419555F82F5DC1A8687ACB845AF072A062A1C7B3A99E
3,143,256 UART: [art] SIG.S = 79E48F9C68CBB9872353F397C1D825CCA953D1ABD6485651F8513B46B2FE504A0ED5BF9495A340E694C5D3F4B7EB88F4
3,167,220 UART: Caliptra RT
3,167,473 UART: [state] CFI Enabled
3,276,234 UART: [rt] RT listening for mailbox commands...
3,276,904 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,926 UART: [rt]cmd =0x44504543, len=24
3,333,229 >>> mbox cmd response data (40 bytes)
3,333,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,309 UART: [rt]cmd =0x44504543, len=96
3,370,662 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,022 ready_for_fw is high
1,056,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,835 >>> mbox cmd response: success
2,686,377 UART:
2,686,393 UART: Running Caliptra FMC ...
2,686,801 UART:
2,686,855 UART: [state] CFI Enabled
2,697,306 UART: [fht] FMC Alias Private Key: 7
2,805,195 UART: [art] Extend RT PCRs Done
2,805,623 UART: [art] Lock RT PCRs Done
2,806,983 UART: [art] Populate DV Done
2,815,094 UART: [fht] FMC Alias Private Key: 7
2,816,092 UART: [art] Derive CDI
2,816,372 UART: [art] Store in in slot 0x4
2,902,165 UART: [art] Derive Key Pair
2,902,525 UART: [art] Store priv key in slot 0x5
2,915,161 UART: [art] Derive Key Pair - Done
2,930,419 UART: [art] Signing Cert with AUTHO
2,930,899 UART: RITY.KEYID = 7
2,946,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,204 UART: [art] PUB.X = 1FBC4CDAA0A3193A95B1FCE84B3CEB8BCCDB81C92AD5444FA63D838051FAAAC4407D00B3A1FEC03787369349C07ED7FF
2,953,978 UART: [art] PUB.Y = 9AC67E5F347DA2610E7A7E627DCC898E64A62AC6749A01A06B19345CEFA29F71944B12E23C8E87D2CF09E65393E797C1
2,960,925 UART: [art] SIG.R = 78806BE17C587D1F33EFA35F3AB93C2ACBFBDF63B0E61C418DEA7437E19366DB060289CE7CF5F1F1428DBB268BDABE01
2,967,708 UART: [art] SIG.S = 6C88203E2A93C27715D170B258A79197447FF4E512C45A53940E83A16EF1C35F7277B3B8218C879616B4DEE507A97308
2,991,300 UART: Caliptra RT
2,991,553 UART: [state] CFI Enabled
3,099,252 UART: [rt] RT listening for mailbox commands...
3,099,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,716 UART: [rt]cmd =0x44504543, len=24
3,155,671 >>> mbox cmd response data (40 bytes)
3,155,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,609 UART: [rt]cmd =0x44504543, len=96
3,192,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,174,084 ready_for_fw is high
1,174,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,368 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,884 UART: [idev] --
1,208,829 UART: [ldev] ++
1,208,997 UART: [ldev] CDI.KEYID = 6
1,209,361 UART: [ldev] SUBJECT.KEYID = 5
1,209,788 UART: [ldev] AUTHORITY.KEYID = 7
1,210,251 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,249 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,450 UART: [fwproc] Recv command 0x46574c44
1,282,183 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,896 >>> mbox cmd response: success
2,774,139 UART: [afmc] ++
2,774,307 UART: [afmc] CDI.KEYID = 6
2,774,670 UART: [afmc] SUBJECT.KEYID = 7
2,775,096 UART: [afmc] AUTHORITY.KEYID = 5
2,810,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,898 UART: [afmc] --
2,853,964 UART: [cold-reset] --
2,854,870 UART: [state] Locking Datavault
2,855,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,463 UART: [state] Locking ICCM
2,856,981 UART: [exit] Launching FMC @ 0x40000130
2,862,310 UART:
2,862,326 UART: Running Caliptra FMC ...
2,862,734 UART:
2,862,877 UART: [state] CFI Enabled
2,873,424 UART: [fht] FMC Alias Private Key: 7
2,981,965 UART: [art] Extend RT PCRs Done
2,982,393 UART: [art] Lock RT PCRs Done
2,983,643 UART: [art] Populate DV Done
2,991,742 UART: [fht] FMC Alias Private Key: 7
2,992,682 UART: [art] Derive CDI
2,992,962 UART: [art] Store in in slot 0x4
3,078,447 UART: [art] Derive Key Pair
3,078,807 UART: [art] Store priv key in slot 0x5
3,091,819 UART: [art] Derive Key Pair - Done
3,106,729 UART: [art] Signing Cert with AUTHO
3,107,209 UART: RITY.KEYID = 7
3,122,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,470 UART: [art] PUB.X = 54B4E39F832390A901D3D5D5892F2228965F406EF7E78FF9D6ABF3DF43EF432562B339B8B19E6C4B47CD6F903CA2D57E
3,130,245 UART: [art] PUB.Y = 6C4B0A6DB9A91DF5E099F150CE3DF52AA06AEBFE8122674334F0A6FD6978B1E54D5107ED1452756F4A888AD5880A1B98
3,137,196 UART: [art] SIG.R = 6A240F45DD2657F6BD28F4AE1D33F7FA7FE99FFBA02FB99FCC500A54CBE3EB010B78E14E1D347D6C88BD94D2B95ABB6F
3,143,982 UART: [art] SIG.S = 6F9575ABF35F59EB6540C58D972D271C7B72DF3D8A68ADB705E3EF2A6DCD1791860E9A633C12762F56417300DF01A565
3,167,478 UART: Caliptra RT
3,167,823 UART: [state] CFI Enabled
3,276,124 UART: [rt] RT listening for mailbox commands...
3,276,794 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,702 UART: [rt]cmd =0x44504543, len=24
3,332,841 >>> mbox cmd response data (40 bytes)
3,332,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,439 UART: [rt]cmd =0x44504543, len=96
3,369,508 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 ready_for_fw is high
1,056,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,328 >>> mbox cmd response: success
2,682,354 UART:
2,682,370 UART: Running Caliptra FMC ...
2,682,778 UART:
2,682,921 UART: [state] CFI Enabled
2,693,488 UART: [fht] FMC Alias Private Key: 7
2,802,033 UART: [art] Extend RT PCRs Done
2,802,461 UART: [art] Lock RT PCRs Done
2,804,057 UART: [art] Populate DV Done
2,812,398 UART: [fht] FMC Alias Private Key: 7
2,813,546 UART: [art] Derive CDI
2,813,826 UART: [art] Store in in slot 0x4
2,899,939 UART: [art] Derive Key Pair
2,900,299 UART: [art] Store priv key in slot 0x5
2,913,741 UART: [art] Derive Key Pair - Done
2,928,443 UART: [art] Signing Cert with AUTHO
2,928,923 UART: RITY.KEYID = 7
2,944,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,324 UART: [art] PUB.X = 921B196EDC335FA43490BCE51E32AD3910B62DDC15F1F55F0F9A61D7FC32423DE27A8C6D40A2B7B76C420DAC0E2BA5C8
2,952,103 UART: [art] PUB.Y = D4FAA6E1741AA4FF43AB00D2E7A199F92460ED1FD89F49524287A36C986A968461DD3AD68D0B491983276CA1A843EA74
2,959,034 UART: [art] SIG.R = 9FBD063B25DE8A7C0BAF064439F09D8D6CD7C767AD07ED1DDA6163796547D2E575A674EE244B5D69ED16173144641AEA
2,965,802 UART: [art] SIG.S = 9558B0C9E554633012B9128747B407C472FB339B58F89D3501E84AFAFA047ABA4FEF2625A6CB589BC12E544B3EAD8EE9
2,989,632 UART: Caliptra RT
2,989,977 UART: [state] CFI Enabled
3,098,671 UART: [rt] RT listening for mailbox commands...
3,099,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,221 UART: [rt]cmd =0x44504543, len=24
3,155,448 >>> mbox cmd response data (40 bytes)
3,155,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,520 UART: [rt]cmd =0x44504543, len=96
3,192,645 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,394 UART: [kat] HMAC-384Kdf
906,852 UART: [kat] LMS
1,475,048 UART: [kat] --
1,475,841 UART: [cold-reset] ++
1,476,299 UART: [fht] Storing FHT @ 0x50003400
1,479,076 UART: [idev] ++
1,479,244 UART: [idev] CDI.KEYID = 6
1,479,604 UART: [idev] SUBJECT.KEYID = 7
1,480,028 UART: [idev] UDS.KEYID = 0
1,480,373 ready_for_fw is high
1,480,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,164 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,369 UART: [ldev] Erasing FE.KEYID = 1
1,547,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,288 UART: [ldev] --
1,586,625 UART: [fwproc] Waiting for Commands...
1,587,338 UART: [fwproc] Received command 0x46574c44
1,588,129 UART: [fwproc] Received Image of size 114332 bytes
2,886,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,089 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,218 >>> mbox cmd response: success
3,080,254 UART: [afmc] ++
3,080,422 UART: [afmc] CDI.KEYID = 6
3,080,784 UART: [afmc] SUBJECT.KEYID = 7
3,081,209 UART: [afmc] AUTHORITY.KEYID = 5
3,116,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,458 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,851 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,541 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,392 UART: [afmc] --
3,159,286 UART: [cold-reset] --
3,160,022 UART: [state] Locking Datavault
3,161,171 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,775 UART: [state] Locking ICCM
3,162,353 UART: [exit] Launching FMC @ 0x40000130
3,167,682 UART:
3,167,698 UART: Running Caliptra FMC ...
3,168,106 UART:
3,168,160 UART: [state] CFI Enabled
3,178,683 UART: [fht] FMC Alias Private Key: 7
3,286,530 UART: [art] Extend RT PCRs Done
3,286,958 UART: [art] Lock RT PCRs Done
3,288,572 UART: [art] Populate DV Done
3,296,843 UART: [fht] FMC Alias Private Key: 7
3,297,955 UART: [art] Derive CDI
3,298,235 UART: [art] Store in in slot 0x4
3,383,770 UART: [art] Derive Key Pair
3,384,130 UART: [art] Store priv key in slot 0x5
3,397,282 UART: [art] Derive Key Pair - Done
3,412,102 UART: [art] Signing Cert with AUTHO
3,412,582 UART: RITY.KEYID = 7
3,427,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,619 UART: [art] PUB.X = 1673A84C6E0388202CBED520CBA9F6C8E8FE63D718F2753AEA9DBCB90FFA893A7FABA76E24F3CBCA93DA775F6F9D9ED2
3,435,411 UART: [art] PUB.Y = DA761B29419EA9B7D34FD73BF11E934E70DBB22349EA54CC01637878F2AB61C9D6CBEE4BD6A8B694C0E465800E306230
3,442,365 UART: [art] SIG.R = D8B8803E50B086AA01D7609C175FD7021E4B1FC0F5AB7E7D14C45017B9E48723F90480AD7BB8E87B82ED1437CF51D628
3,449,132 UART: [art] SIG.S = 63C970BEF8402C880227E8355B152E9AF338155359169B8E0C054FD94CEE7538397AF28F37B2A5182E492DD0FC148177
3,472,702 UART: Caliptra RT
3,472,955 UART: [state] CFI Enabled
3,581,154 UART: [rt] RT listening for mailbox commands...
3,581,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,270 UART: [rt]cmd =0x44504543, len=96
3,619,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,171 ready_for_fw is high
1,362,171 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,476 >>> mbox cmd response: success
2,989,370 UART:
2,989,386 UART: Running Caliptra FMC ...
2,989,794 UART:
2,989,848 UART: [state] CFI Enabled
3,000,501 UART: [fht] FMC Alias Private Key: 7
3,107,822 UART: [art] Extend RT PCRs Done
3,108,250 UART: [art] Lock RT PCRs Done
3,109,578 UART: [art] Populate DV Done
3,117,697 UART: [fht] FMC Alias Private Key: 7
3,118,829 UART: [art] Derive CDI
3,119,109 UART: [art] Store in in slot 0x4
3,204,832 UART: [art] Derive Key Pair
3,205,192 UART: [art] Store priv key in slot 0x5
3,218,524 UART: [art] Derive Key Pair - Done
3,233,329 UART: [art] Signing Cert with AUTHO
3,233,809 UART: RITY.KEYID = 7
3,248,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,568 UART: [art] PUB.X = B8E0429D3B2B84C8EFB30394C48162B3E72663408DB91E9999D52D4A6D76057A57E9442D320B3735E8E64EBF1A89B423
3,256,327 UART: [art] PUB.Y = A0C985FC7F4C20692338CD05209CB7AAA9F07D546D20AF073A179B31EA6989175191A676002DB103944830EAE4F1803E
3,263,244 UART: [art] SIG.R = B01C13665D58F1A6420E41F9D727A324814AB2E3E5F86C219305580863A61191D95DD5516E51AB2D16967A64DECF7A41
3,270,001 UART: [art] SIG.S = 3DCB228CB3734EADD833670D0C1846B56798AD58077D32273FC80F5683E836105806AA78FF73E17F5ACA0688CBE3F6D1
3,293,918 UART: Caliptra RT
3,294,171 UART: [state] CFI Enabled
3,402,394 UART: [rt] RT listening for mailbox commands...
3,403,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,762 UART: [rt]cmd =0x44504543, len=96
3,440,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
891,146 UART: [kat] SHA2-256
893,084 UART: [kat] SHA2-384
895,697 UART: [kat] SHA2-512-ACC
897,598 UART: [kat] ECC-384
903,235 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,612 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 ready_for_fw is high
1,481,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,071 UART: [idev] Erasing UDS.KEYID = 0
1,506,443 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,095 UART: [idev] --
1,516,178 UART: [ldev] ++
1,516,346 UART: [ldev] CDI.KEYID = 6
1,516,709 UART: [ldev] SUBJECT.KEYID = 5
1,517,135 UART: [ldev] AUTHORITY.KEYID = 7
1,517,598 UART: [ldev] FE.KEYID = 1
1,522,692 UART: [ldev] Erasing FE.KEYID = 1
1,548,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,441 UART: [ldev] --
1,587,856 UART: [fwproc] Waiting for Commands...
1,588,705 UART: [fwproc] Received command 0x46574c44
1,589,496 UART: [fwproc] Received Image of size 114332 bytes
2,887,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,905 >>> mbox cmd response: success
3,080,957 UART: [afmc] ++
3,081,125 UART: [afmc] CDI.KEYID = 6
3,081,487 UART: [afmc] SUBJECT.KEYID = 7
3,081,912 UART: [afmc] AUTHORITY.KEYID = 5
3,116,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,433 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,213 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,826 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,516 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,461 UART: [afmc] --
3,159,479 UART: [cold-reset] --
3,160,475 UART: [state] Locking Datavault
3,161,472 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,076 UART: [state] Locking ICCM
3,162,688 UART: [exit] Launching FMC @ 0x40000130
3,168,017 UART:
3,168,033 UART: Running Caliptra FMC ...
3,168,441 UART:
3,168,584 UART: [state] CFI Enabled
3,179,253 UART: [fht] FMC Alias Private Key: 7
3,287,096 UART: [art] Extend RT PCRs Done
3,287,524 UART: [art] Lock RT PCRs Done
3,289,130 UART: [art] Populate DV Done
3,297,107 UART: [fht] FMC Alias Private Key: 7
3,298,057 UART: [art] Derive CDI
3,298,337 UART: [art] Store in in slot 0x4
3,384,222 UART: [art] Derive Key Pair
3,384,582 UART: [art] Store priv key in slot 0x5
3,397,708 UART: [art] Derive Key Pair - Done
3,412,654 UART: [art] Signing Cert with AUTHO
3,413,134 UART: RITY.KEYID = 7
3,428,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,159 UART: [art] PUB.X = 585E53C1B280DAE99F6C631319ED04D4E6548450FE3AFF07F70B2E25D1E750E96A922227B9C7F396A0301222F74C4711
3,435,918 UART: [art] PUB.Y = 9B8D23A0E93B054804377C2E9436852EE94DC3C4B6FBD50D228FBD536A48B8DF7E18CED91394FD1758E99C89DC05C1EB
3,442,868 UART: [art] SIG.R = F0FA3920AE2210F22E825E59172F05CCA2EFF82A07CEEEC154008C19618AD3A4710DF609A9BAC8841B92170BF61607C6
3,449,606 UART: [art] SIG.S = E00B1F33D5CD3501FAF81EC01EA987839BE4A0969FCE02E905D7405BD4FB54E56535928C2E08DB3E204ED95FC23979F9
3,473,090 UART: Caliptra RT
3,473,435 UART: [state] CFI Enabled
3,581,691 UART: [rt] RT listening for mailbox commands...
3,582,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,677 UART: [rt]cmd =0x44504543, len=96
3,619,795 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,479 >>> mbox cmd response: success
2,991,413 UART:
2,991,429 UART: Running Caliptra FMC ...
2,991,837 UART:
2,991,980 UART: [state] CFI Enabled
3,002,497 UART: [fht] FMC Alias Private Key: 7
3,110,782 UART: [art] Extend RT PCRs Done
3,111,210 UART: [art] Lock RT PCRs Done
3,112,466 UART: [art] Populate DV Done
3,120,627 UART: [fht] FMC Alias Private Key: 7
3,121,721 UART: [art] Derive CDI
3,122,001 UART: [art] Store in in slot 0x4
3,207,730 UART: [art] Derive Key Pair
3,208,090 UART: [art] Store priv key in slot 0x5
3,221,276 UART: [art] Derive Key Pair - Done
3,235,943 UART: [art] Signing Cert with AUTHO
3,236,423 UART: RITY.KEYID = 7
3,251,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,366 UART: [art] PUB.X = 8C07C1869C7ABD9A112E8C011495B99C39A8637CDD7C8C04E04CC08556F99C6E7D8DF4898542D8EDA0AAD6F094B2CBC7
3,259,141 UART: [art] PUB.Y = 724B1F18956AF050A98A402F13E5F92B4A1E0E1F7989A29BD6F3096BDC161405E6508ED6F1639406A4CF1385C42E01D5
3,266,076 UART: [art] SIG.R = D4E49E18E6D16B006E07B9D19667D8C925E3E35A111EB1B7842A57F77F8A9A19763A14B713258AF6E356293154399210
3,272,813 UART: [art] SIG.S = 61ACFB034B515DE4DB401894730F57E2B73C7C331B9918232BA308D5E3A9510F6FE4DDC2CD6171490976436F762B8152
3,296,993 UART: Caliptra RT
3,297,338 UART: [state] CFI Enabled
3,406,023 UART: [rt] RT listening for mailbox commands...
3,406,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,467 UART: [rt]cmd =0x44504543, len=96
3,444,625 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,956 UART: [idev] Erasing UDS.KEYID = 0
1,201,019 UART: [idev] Sha1 KeyId Algorithm
1,209,525 UART: [idev] --
1,210,411 UART: [ldev] ++
1,210,579 UART: [ldev] CDI.KEYID = 6
1,210,942 UART: [ldev] SUBJECT.KEYID = 5
1,211,368 UART: [ldev] AUTHORITY.KEYID = 7
1,211,831 UART: [ldev] FE.KEYID = 1
1,217,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,348 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,025 >>> mbox cmd response: success
2,775,223 UART: [afmc] ++
2,775,391 UART: [afmc] CDI.KEYID = 6
2,775,753 UART: [afmc] SUBJECT.KEYID = 7
2,776,178 UART: [afmc] AUTHORITY.KEYID = 5
2,811,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,424 UART: [afmc] --
2,855,506 UART: [cold-reset] --
2,856,162 UART: [state] Locking Datavault
2,857,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,041 UART: [state] Locking ICCM
2,858,481 UART: [exit] Launching FMC @ 0x40000130
2,863,810 UART:
2,863,826 UART: Running Caliptra FMC ...
2,864,234 UART:
2,864,288 UART: [state] CFI Enabled
2,874,935 UART: [fht] FMC Alias Private Key: 7
2,983,048 UART: [art] Extend RT PCRs Done
2,983,476 UART: [art] Lock RT PCRs Done
2,985,084 UART: [art] Populate DV Done
2,993,085 UART: [fht] FMC Alias Private Key: 7
2,994,253 UART: [art] Derive CDI
2,994,533 UART: [art] Store in in slot 0x4
3,079,936 UART: [art] Derive Key Pair
3,080,296 UART: [art] Store priv key in slot 0x5
3,093,778 UART: [art] Derive Key Pair - Done
3,108,841 UART: [art] Signing Cert with AUTHO
3,109,321 UART: RITY.KEYID = 7
3,124,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,918 UART: [art] PUB.X = 0E988C389D67E6ADAD7C25DE1ADDDE04B38D46BE2C8A3269AB07A0E47C251FA183AA3750843A849B62EB5A1CAFB4308C
3,131,699 UART: [art] PUB.Y = 215630E5A3FAA60013214B391D4C9C1FA6470BD6E8FE18034356037774504412812BA1BD781B7BF9B563A29B6FF882EB
3,138,616 UART: [art] SIG.R = B78F65AE89F6D2CA9C36FB408090377AEFD56BEC9FBB35F2EAD47DAC1FB0E74C482CDBE7155FE7AE64DA5652ADA3C2AE
3,145,420 UART: [art] SIG.S = 152D9A1EB1C2066C23353CB7E00BE72B4711CBA624059862C18C10FBD0CDA11080097D3908F4D102B72A4253C0799A03
3,169,404 UART: Caliptra RT
3,169,657 UART: [state] CFI Enabled
3,277,832 UART: [rt] RT listening for mailbox commands...
3,278,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,316 UART: [rt]cmd =0x44504543, len=96
3,316,380 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,877 ready_for_fw is high
1,060,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,576 >>> mbox cmd response: success
2,688,238 UART:
2,688,254 UART: Running Caliptra FMC ...
2,688,662 UART:
2,688,716 UART: [state] CFI Enabled
2,698,725 UART: [fht] FMC Alias Private Key: 7
2,806,868 UART: [art] Extend RT PCRs Done
2,807,296 UART: [art] Lock RT PCRs Done
2,808,782 UART: [art] Populate DV Done
2,817,201 UART: [fht] FMC Alias Private Key: 7
2,818,147 UART: [art] Derive CDI
2,818,427 UART: [art] Store in in slot 0x4
2,904,124 UART: [art] Derive Key Pair
2,904,484 UART: [art] Store priv key in slot 0x5
2,917,734 UART: [art] Derive Key Pair - Done
2,932,720 UART: [art] Signing Cert with AUTHO
2,933,200 UART: RITY.KEYID = 7
2,948,378 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,143 UART: [art] PUB.X = 36BD109E651783F8660946DB7625FCAEC95C17CE9AF7EB1E116335F125A5BE617BE329B529B34AEBD7EF883578F2459B
2,955,918 UART: [art] PUB.Y = B2575A06891B1EBA56341D4917B8EC309680C51D7981120BC449F16097947C77048C473AB516AC23F4A0AD526FED3EC5
2,962,857 UART: [art] SIG.R = B9C3D0EFA11BA7B8E9D0C962EA9608E132FF716B80E777AB843ED1EED44C9BA625142090F2B0F7BEB5C58A906E07259A
2,969,637 UART: [art] SIG.S = 224E993D5A7240E446C9DF31CE872A02ACDB5D08532BFC32F3D6EC08F93B5AD8CFCC5F586F8B3393CE356B96498CD9B9
2,993,459 UART: Caliptra RT
2,993,712 UART: [state] CFI Enabled
3,101,405 UART: [rt] RT listening for mailbox commands...
3,102,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,663 UART: [rt]cmd =0x44504543, len=96
3,139,565 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,288 UART: [kat] SHA2-256
904,228 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,645 UART: [kat] HMAC-384Kdf
923,307 UART: [kat] LMS
1,171,635 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,784 UART: [fht] FHT @ 0x50003400
1,175,493 UART: [idev] ++
1,175,661 UART: [idev] CDI.KEYID = 6
1,176,021 UART: [idev] SUBJECT.KEYID = 7
1,176,445 UART: [idev] UDS.KEYID = 0
1,176,790 ready_for_fw is high
1,176,790 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,209,812 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,398 UART: [ldev] Erasing FE.KEYID = 1
1,243,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,050 UART: [ldev] --
1,283,481 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,916 >>> mbox cmd response: success
2,776,130 UART: [afmc] ++
2,776,298 UART: [afmc] CDI.KEYID = 6
2,776,660 UART: [afmc] SUBJECT.KEYID = 7
2,777,085 UART: [afmc] AUTHORITY.KEYID = 5
2,811,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,343 UART: [afmc] --
2,855,259 UART: [cold-reset] --
2,856,341 UART: [state] Locking Datavault
2,857,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,132 UART: [state] Locking ICCM
2,858,702 UART: [exit] Launching FMC @ 0x40000130
2,864,031 UART:
2,864,047 UART: Running Caliptra FMC ...
2,864,455 UART:
2,864,598 UART: [state] CFI Enabled
2,875,363 UART: [fht] FMC Alias Private Key: 7
2,983,660 UART: [art] Extend RT PCRs Done
2,984,088 UART: [art] Lock RT PCRs Done
2,985,360 UART: [art] Populate DV Done
2,993,765 UART: [fht] FMC Alias Private Key: 7
2,994,829 UART: [art] Derive CDI
2,995,109 UART: [art] Store in in slot 0x4
3,080,836 UART: [art] Derive Key Pair
3,081,196 UART: [art] Store priv key in slot 0x5
3,094,786 UART: [art] Derive Key Pair - Done
3,109,217 UART: [art] Signing Cert with AUTHO
3,109,697 UART: RITY.KEYID = 7
3,124,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,426 UART: [art] PUB.X = 8B54E7E112355BB911B5C9F24ABCCAD424A8249213CF986253432F08994567DF262142BBFDC0E8C9F68BD9D645A48140
3,132,195 UART: [art] PUB.Y = B449F81D7548CC930B93F022FC3DA41881C5707AEE31993C3FDD7C1D826C8E00ACC9062D7434FCBE1E894F82D35EBA11
3,139,129 UART: [art] SIG.R = 00EEA54D4996D2407488F17411C4006C88FA8D46D7A2E154B04F07FD934A8E1E63FD3A681EC164781DCD7419F9E96101
3,145,849 UART: [art] SIG.S = 10D29F6B2987537C76ADB724E657A12E4CE296CF9CB3AFCA042E1930EEF256FAD573873588BEFF2F40CE95CBEFD23FBB
3,169,273 UART: Caliptra RT
3,169,618 UART: [state] CFI Enabled
3,278,484 UART: [rt] RT listening for mailbox commands...
3,279,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,728 UART: [rt]cmd =0x44504543, len=96
3,316,682 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,364 ready_for_fw is high
1,060,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,333 >>> mbox cmd response: success
2,689,749 UART:
2,689,765 UART: Running Caliptra FMC ...
2,690,173 UART:
2,690,316 UART: [state] CFI Enabled
2,700,781 UART: [fht] FMC Alias Private Key: 7
2,808,276 UART: [art] Extend RT PCRs Done
2,808,704 UART: [art] Lock RT PCRs Done
2,810,506 UART: [art] Populate DV Done
2,818,615 UART: [fht] FMC Alias Private Key: 7
2,819,677 UART: [art] Derive CDI
2,819,957 UART: [art] Store in in slot 0x4
2,905,738 UART: [art] Derive Key Pair
2,906,098 UART: [art] Store priv key in slot 0x5
2,919,632 UART: [art] Derive Key Pair - Done
2,934,168 UART: [art] Signing Cert with AUTHO
2,934,648 UART: RITY.KEYID = 7
2,950,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,869 UART: [art] PUB.X = C4747D7B5A7D94152865CED75D614C72AE030A4426818588FA7318EF71FCE03710FC26263ADAC8C0C422FDC48D7485E6
2,957,637 UART: [art] PUB.Y = EA8C8F50CB311F9097575F241E04CEA4E2DF02497DAAC8981598717C7F686B3F0B3E82779F4DE2F10032F0C39F753938
2,964,558 UART: [art] SIG.R = D9ECEE6B6EB93D732EFD746AB572B791791D85A272856B458E4F0FBABC0F6109ADB7657AE28DE805B5D5B889F8B13CFE
2,971,336 UART: [art] SIG.S = A82B00AE0B6EEEBFFA70930E522FDAE852E5475197BCA22F22908889CEB35CC34FE6035184398DF4327DAE0600014B1D
2,994,852 UART: Caliptra RT
2,995,197 UART: [state] CFI Enabled
3,103,457 UART: [rt] RT listening for mailbox commands...
3,104,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,339 UART: [rt]cmd =0x44504543, len=96
3,141,767 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,205 UART: [cold-reset] ++
1,169,671 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,173,799 ready_for_fw is high
1,173,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,097 UART: [idev] Sha1 KeyId Algorithm
1,206,811 UART: [idev] --
1,207,786 UART: [ldev] ++
1,207,954 UART: [ldev] CDI.KEYID = 6
1,208,318 UART: [ldev] SUBJECT.KEYID = 5
1,208,745 UART: [ldev] AUTHORITY.KEYID = 7
1,209,208 UART: [ldev] FE.KEYID = 1
1,214,242 UART: [ldev] Erasing FE.KEYID = 1
1,240,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,470 UART: [ldev] --
1,279,922 UART: [fwproc] Wait for Commands...
1,280,561 UART: [fwproc] Recv command 0x46574c44
1,281,294 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,217 >>> mbox cmd response: success
2,773,260 UART: [afmc] ++
2,773,428 UART: [afmc] CDI.KEYID = 6
2,773,791 UART: [afmc] SUBJECT.KEYID = 7
2,774,217 UART: [afmc] AUTHORITY.KEYID = 5
2,809,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,293 UART: [afmc] --
2,852,375 UART: [cold-reset] --
2,853,339 UART: [state] Locking Datavault
2,854,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,448 UART: [state] Locking ICCM
2,855,972 UART: [exit] Launching FMC @ 0x40000130
2,861,301 UART:
2,861,317 UART: Running Caliptra FMC ...
2,861,725 UART:
2,861,779 UART: [state] CFI Enabled
2,872,136 UART: [fht] FMC Alias Private Key: 7
2,980,095 UART: [art] Extend RT PCRs Done
2,980,523 UART: [art] Lock RT PCRs Done
2,982,043 UART: [art] Populate DV Done
2,990,484 UART: [fht] FMC Alias Private Key: 7
2,991,434 UART: [art] Derive CDI
2,991,714 UART: [art] Store in in slot 0x4
3,077,687 UART: [art] Derive Key Pair
3,078,047 UART: [art] Store priv key in slot 0x5
3,091,347 UART: [art] Derive Key Pair - Done
3,106,300 UART: [art] Signing Cert with AUTHO
3,106,780 UART: RITY.KEYID = 7
3,121,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,751 UART: [art] PUB.X = BD3C627ABE1774D8671A5E4EF62B26DBA53558F7070D154660DE9B636FF2EABCF9F43B6606B4C49F23C907699296DCA2
3,129,519 UART: [art] PUB.Y = 570F1062AA73B517D49458AB7AEDD0F3A0EA45FBCC357E936F6EE0EF8B7CF2EA07D13D4C7632FCEBFD41714434519EED
3,136,485 UART: [art] SIG.R = FADC7798A7016AA866DCC844897E42105EED2DC10AEB1117A424EA4EED55BC2CFFD484E336A5280A40C963C82E0E0CF3
3,143,258 UART: [art] SIG.S = 8CC0FD7DB6979C15DEF0F310F3978A5E3A43621476F9409508618398515459659462B155A8EF9E0078C0DD0FF697ECA8
3,167,315 UART: Caliptra RT
3,167,568 UART: [state] CFI Enabled
3,274,840 UART: [rt] RT listening for mailbox commands...
3,275,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,994 UART: [rt]cmd =0x44504543, len=96
3,313,048 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 ready_for_fw is high
1,055,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,387 >>> mbox cmd response: success
2,682,761 UART:
2,682,777 UART: Running Caliptra FMC ...
2,683,185 UART:
2,683,239 UART: [state] CFI Enabled
2,693,736 UART: [fht] FMC Alias Private Key: 7
2,801,285 UART: [art] Extend RT PCRs Done
2,801,713 UART: [art] Lock RT PCRs Done
2,803,341 UART: [art] Populate DV Done
2,811,436 UART: [fht] FMC Alias Private Key: 7
2,812,384 UART: [art] Derive CDI
2,812,664 UART: [art] Store in in slot 0x4
2,898,213 UART: [art] Derive Key Pair
2,898,573 UART: [art] Store priv key in slot 0x5
2,912,047 UART: [art] Derive Key Pair - Done
2,926,603 UART: [art] Signing Cert with AUTHO
2,927,083 UART: RITY.KEYID = 7
2,942,241 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,006 UART: [art] PUB.X = AC61B7F4EB64AF0BB07B12BBC69C52C4E0F38D591C2DEAA0B481A384FC40095A6F33A7E80CA1DEB345F32C20B8DCA678
2,949,791 UART: [art] PUB.Y = FE1FF4B8B65FD44CA2CCA9BCC18D3140567A0AC9DE8C4F4D0B54C9CC43178528FAAB4FAE2FA208EBE44DB1D9BBBB4080
2,956,766 UART: [art] SIG.R = E74FEDF2514C767ACDA3481243784AD729AC0EA7E96BC30F34CB26CD93024F92B16B349786252CF5801909CBE0576C9D
2,963,530 UART: [art] SIG.S = 0B968E0312073D658F96C7ABE8CB3919EA0082ADF414469F5C613DD8B6CC81540A0D2530C7AE13471E97146038C21690
2,987,198 UART: Caliptra RT
2,987,451 UART: [state] CFI Enabled
3,094,776 UART: [rt] RT listening for mailbox commands...
3,095,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,860 UART: [rt]cmd =0x44504543, len=96
3,133,256 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,045 UART: [kat] LMS
1,169,357 UART: [kat] --
1,170,332 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 ready_for_fw is high
1,174,684 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,610 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,324 >>> mbox cmd response: success
2,775,465 UART: [afmc] ++
2,775,633 UART: [afmc] CDI.KEYID = 6
2,775,996 UART: [afmc] SUBJECT.KEYID = 7
2,776,422 UART: [afmc] AUTHORITY.KEYID = 5
2,812,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,590 UART: [afmc] --
2,855,488 UART: [cold-reset] --
2,856,192 UART: [state] Locking Datavault
2,857,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,813 UART: [state] Locking ICCM
2,858,443 UART: [exit] Launching FMC @ 0x40000130
2,863,772 UART:
2,863,788 UART: Running Caliptra FMC ...
2,864,196 UART:
2,864,339 UART: [state] CFI Enabled
2,875,172 UART: [fht] FMC Alias Private Key: 7
2,983,023 UART: [art] Extend RT PCRs Done
2,983,451 UART: [art] Lock RT PCRs Done
2,984,805 UART: [art] Populate DV Done
2,993,290 UART: [fht] FMC Alias Private Key: 7
2,994,318 UART: [art] Derive CDI
2,994,598 UART: [art] Store in in slot 0x4
3,080,155 UART: [art] Derive Key Pair
3,080,515 UART: [art] Store priv key in slot 0x5
3,093,773 UART: [art] Derive Key Pair - Done
3,108,636 UART: [art] Signing Cert with AUTHO
3,109,116 UART: RITY.KEYID = 7
3,124,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,365 UART: [art] PUB.X = 190E9500807D3C85C145820185DB1CA83C34DE12B63F25FEE573E93F78CA72A48C7CD09B08E838B6CC62690C51D50B0C
3,132,099 UART: [art] PUB.Y = 0A562368734B925E0E99E94DFCE0904F44DD2C3E3C768E36247DB57F2315642BF848235AF507A57B42AA57F0846246A2
3,139,036 UART: [art] SIG.R = 704C4667D4ECD5C1013FE929E15BD1F0046F3FB122946FECF92B2B95B0B75AB9A3B52328185E09F9506DB4B679A45C16
3,145,803 UART: [art] SIG.S = 5C662F456C4C1861F48BA0F0A99E26EA3E215B0D67DBB7DE56A8B31C86E48441476CBB417C3A5AACC1B08F2643B12D7F
3,169,635 UART: Caliptra RT
3,169,980 UART: [state] CFI Enabled
3,278,307 UART: [rt] RT listening for mailbox commands...
3,278,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,509 UART: [rt]cmd =0x44504543, len=96
3,316,713 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,665 ready_for_fw is high
1,056,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,150 >>> mbox cmd response: success
2,685,110 UART:
2,685,126 UART: Running Caliptra FMC ...
2,685,534 UART:
2,685,677 UART: [state] CFI Enabled
2,696,302 UART: [fht] FMC Alias Private Key: 7
2,804,573 UART: [art] Extend RT PCRs Done
2,805,001 UART: [art] Lock RT PCRs Done
2,806,645 UART: [art] Populate DV Done
2,814,754 UART: [fht] FMC Alias Private Key: 7
2,815,908 UART: [art] Derive CDI
2,816,188 UART: [art] Store in in slot 0x4
2,901,813 UART: [art] Derive Key Pair
2,902,173 UART: [art] Store priv key in slot 0x5
2,915,339 UART: [art] Derive Key Pair - Done
2,930,261 UART: [art] Signing Cert with AUTHO
2,930,741 UART: RITY.KEYID = 7
2,946,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,904 UART: [art] PUB.X = 536A2B73B4D7359AC4FAFB66580E84F5555B2244FF3DAE0F831D33F26548BD26D83755E657180D61B0BFD0F2167ACFDD
2,953,675 UART: [art] PUB.Y = 7D12E816F503BB82E5514B1B5A2FB1EBAB180E018836761DB11D7A732B0107AA6C469AE9A34473D033A0AB896E7CF6C9
2,960,618 UART: [art] SIG.R = 7B22FBAC85FA7255D4A9927CFE509AA1591A1E8D57BC71373D748194AD8BAE6DA09AB0C333720F8EC67E5B5E9991060E
2,967,391 UART: [art] SIG.S = 3C422B4F5BDB70F901AB431B545A02688910C5EE339BAA64DEE9A1A47DA20FEF4983DDDEB53A42117928501DC562F8A9
2,991,449 UART: Caliptra RT
2,991,794 UART: [state] CFI Enabled
3,100,385 UART: [rt] RT listening for mailbox commands...
3,101,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,511 UART: [rt]cmd =0x44504543, len=96
3,138,783 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,701 UART: [kat] SHA2-256
881,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,747 UART: [kat] ++
885,899 UART: [kat] sha1
890,015 UART: [kat] SHA2-256
891,953 UART: [kat] SHA2-384
894,644 UART: [kat] SHA2-512-ACC
896,545 UART: [kat] ECC-384
902,110 UART: [kat] HMAC-384Kdf
906,734 UART: [kat] LMS
1,474,930 UART: [kat] --
1,475,763 UART: [cold-reset] ++
1,476,243 UART: [fht] Storing FHT @ 0x50003400
1,479,022 UART: [idev] ++
1,479,190 UART: [idev] CDI.KEYID = 6
1,479,550 UART: [idev] SUBJECT.KEYID = 7
1,479,974 UART: [idev] UDS.KEYID = 0
1,480,319 ready_for_fw is high
1,480,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,948 UART: [idev] Erasing UDS.KEYID = 0
1,504,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,830 UART: [idev] --
1,513,789 UART: [ldev] ++
1,513,957 UART: [ldev] CDI.KEYID = 6
1,514,320 UART: [ldev] SUBJECT.KEYID = 5
1,514,746 UART: [ldev] AUTHORITY.KEYID = 7
1,515,209 UART: [ldev] FE.KEYID = 1
1,520,297 UART: [ldev] Erasing FE.KEYID = 1
1,545,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,796 UART: [ldev] --
1,585,307 UART: [fwproc] Waiting for Commands...
1,586,064 UART: [fwproc] Received command 0x46574c44
1,586,855 UART: [fwproc] Received Image of size 114332 bytes
2,885,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,047 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,354 >>> mbox cmd response: success
3,078,522 UART: [afmc] ++
3,078,690 UART: [afmc] CDI.KEYID = 6
3,079,052 UART: [afmc] SUBJECT.KEYID = 7
3,079,477 UART: [afmc] AUTHORITY.KEYID = 5
3,114,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,054 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,447 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,137 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,034 UART: [afmc] --
3,157,984 UART: [cold-reset] --
3,158,948 UART: [state] Locking Datavault
3,160,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,787 UART: [state] Locking ICCM
3,161,217 UART: [exit] Launching FMC @ 0x40000130
3,166,546 UART:
3,166,562 UART: Running Caliptra FMC ...
3,166,970 UART:
3,167,024 UART: [state] CFI Enabled
3,177,335 UART: [fht] FMC Alias Private Key: 7
3,284,506 UART: [art] Extend RT PCRs Done
3,284,934 UART: [art] Lock RT PCRs Done
3,286,616 UART: [art] Populate DV Done
3,294,979 UART: [fht] FMC Alias Private Key: 7
3,296,093 UART: [art] Derive CDI
3,296,373 UART: [art] Store in in slot 0x4
3,381,884 UART: [art] Derive Key Pair
3,382,244 UART: [art] Store priv key in slot 0x5
3,394,808 UART: [art] Derive Key Pair - Done
3,409,479 UART: [art] Signing Cert with AUTHO
3,409,959 UART: RITY.KEYID = 7
3,424,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,628 UART: [art] PUB.X = BF495BE54377BF59AEF0804BDEDEB2E64558E943BF0C905456ADE1DAA99FA37C6EAE2E5B3E3153BD7CE3EE1F94F5D072
3,432,421 UART: [art] PUB.Y = 5E0A9645771D0A5C1A0D447B8149763A9D12A4225620432BDEF60BD183CD97657D2BC027CF2BB57E320FF8D01DC6525F
3,439,360 UART: [art] SIG.R = DD660E8C5056F57E801BC8E2F942DACBB3CDD78F086B34DD72D3B0F040062C1885659163A252C14B199E93CF6E5D748F
3,446,129 UART: [art] SIG.S = 952FD643957877B180C2C31B5E53F419DC6C55BB5C036334EBA9542442ACBB52F0C8335EBF591A072037A34754D9F3AC
3,470,172 UART: Caliptra RT
3,470,425 UART: [state] CFI Enabled
3,579,615 UART: [rt] RT listening for mailbox commands...
3,580,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,921 UART: [rt]cmd =0x4d454153, len=108
3,631,376 >>> mbox cmd response data (12 bytes)
3,631,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,346 UART: [rt]cmd =0x4d454153, len=108
3,681,929 >>> mbox cmd response data (12 bytes)
3,681,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,113 UART: [rt]cmd =0x4d454153, len=108
3,732,220 >>> mbox cmd response data (12 bytes)
3,732,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,158 UART: [rt]cmd =0x4d454153, len=108
3,783,045 >>> mbox cmd response data (12 bytes)
3,783,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,111 UART: [rt]cmd =0x4d454153, len=108
3,834,166 >>> mbox cmd response data (12 bytes)
3,834,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,222 UART: [rt]cmd =0x4d454153, len=108
3,884,217 >>> mbox cmd response data (12 bytes)
3,884,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,259 UART: [rt]cmd =0x4d454153, len=108
3,935,438 >>> mbox cmd response data (12 bytes)
3,935,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,418 UART: [rt]cmd =0x4d454153, len=108
3,985,809 >>> mbox cmd response data (12 bytes)
3,985,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,973 UART: [rt]cmd =0x4d454153, len=108
4,037,118 >>> mbox cmd response data (12 bytes)
4,037,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,124 UART: [rt]cmd =0x4d454153, len=108
4,088,373 >>> mbox cmd response data (12 bytes)
4,088,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,461 UART: [rt]cmd =0x4d454153, len=108
4,138,640 >>> mbox cmd response data (12 bytes)
4,138,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,770 UART: [rt]cmd =0x4d454153, len=108
4,188,785 >>> mbox cmd response data (12 bytes)
4,188,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,218,859 UART: [rt]cmd =0x4d454153, len=108
4,239,592 >>> mbox cmd response data (12 bytes)
4,239,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,390 UART: [rt]cmd =0x4d454153, len=108
4,290,581 >>> mbox cmd response data (12 bytes)
4,290,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,523 UART: [rt]cmd =0x4d454153, len=108
4,341,706 >>> mbox cmd response data (12 bytes)
4,341,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,764 UART: [rt]cmd =0x4d454153, len=108
4,373,756 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 ready_for_fw is high
1,362,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,088 >>> mbox cmd response: success
2,990,326 UART:
2,990,342 UART: Running Caliptra FMC ...
2,990,750 UART:
2,990,804 UART: [state] CFI Enabled
3,001,771 UART: [fht] FMC Alias Private Key: 7
3,110,150 UART: [art] Extend RT PCRs Done
3,110,578 UART: [art] Lock RT PCRs Done
3,112,474 UART: [art] Populate DV Done
3,120,609 UART: [fht] FMC Alias Private Key: 7
3,121,585 UART: [art] Derive CDI
3,121,865 UART: [art] Store in in slot 0x4
3,207,892 UART: [art] Derive Key Pair
3,208,252 UART: [art] Store priv key in slot 0x5
3,221,478 UART: [art] Derive Key Pair - Done
3,236,163 UART: [art] Signing Cert with AUTHO
3,236,643 UART: RITY.KEYID = 7
3,251,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,542 UART: [art] PUB.X = 891A4D2A7C5998766435E3E01E92215C3A4F757E2FCC91E3EB5BDFDA10E9049828B4B8C935B18C018DE8337D991962B4
3,259,308 UART: [art] PUB.Y = 766EA7320E72A2AB0FB0865A4C8F7FB410D8FD978B9F125022D5EA75FCFF01B016306DC523AA4B934F9AF073D24A5948
3,266,259 UART: [art] SIG.R = 14F7C77AFD203E47D44160796C88DDB31C1EB164DB1BA118E9C44830FD26024D07D5CCBF6EC5ECA8CF4312067B6163A6
3,273,032 UART: [art] SIG.S = BE8B28620DE152AB9EAAA4FB32F674CFB833624D6AE336EB6A9062E9172BD355948BA85289C899D8341BB2FFACA77088
3,297,250 UART: Caliptra RT
3,297,503 UART: [state] CFI Enabled
3,405,866 UART: [rt] RT listening for mailbox commands...
3,406,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,998 UART: [rt]cmd =0x4d454153, len=108
3,457,715 >>> mbox cmd response data (12 bytes)
3,457,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,753 UART: [rt]cmd =0x4d454153, len=108
3,507,854 >>> mbox cmd response data (12 bytes)
3,507,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,918 UART: [rt]cmd =0x4d454153, len=108
3,558,113 >>> mbox cmd response data (12 bytes)
3,558,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,237 UART: [rt]cmd =0x4d454153, len=108
3,609,446 >>> mbox cmd response data (12 bytes)
3,609,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,478 UART: [rt]cmd =0x4d454153, len=108
3,659,175 >>> mbox cmd response data (12 bytes)
3,659,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,313 UART: [rt]cmd =0x4d454153, len=108
3,711,220 >>> mbox cmd response data (12 bytes)
3,711,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,022 UART: [rt]cmd =0x4d454153, len=108
3,761,897 >>> mbox cmd response data (12 bytes)
3,761,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,913 UART: [rt]cmd =0x4d454153, len=108
3,812,650 >>> mbox cmd response data (12 bytes)
3,812,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,670 UART: [rt]cmd =0x4d454153, len=108
3,863,221 >>> mbox cmd response data (12 bytes)
3,863,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,409 UART: [rt]cmd =0x4d454153, len=108
3,914,250 >>> mbox cmd response data (12 bytes)
3,914,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,424 UART: [rt]cmd =0x4d454153, len=108
3,966,113 >>> mbox cmd response data (12 bytes)
3,966,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,069 UART: [rt]cmd =0x4d454153, len=108
4,016,844 >>> mbox cmd response data (12 bytes)
4,016,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,758 UART: [rt]cmd =0x4d454153, len=108
4,067,999 >>> mbox cmd response data (12 bytes)
4,068,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,213 UART: [rt]cmd =0x4d454153, len=108
4,119,472 >>> mbox cmd response data (12 bytes)
4,119,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,416 UART: [rt]cmd =0x4d454153, len=108
4,170,403 >>> mbox cmd response data (12 bytes)
4,170,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,200,467 UART: [rt]cmd =0x4d454153, len=108
4,202,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,052 UART: [kat] SHA2-256
881,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,098 UART: [kat] ++
886,250 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,255 UART: [kat] SHA2-512-ACC
897,156 UART: [kat] ECC-384
902,949 UART: [kat] HMAC-384Kdf
907,599 UART: [kat] LMS
1,475,795 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,758 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,115 UART: [idev] Erasing UDS.KEYID = 0
1,504,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,105 UART: [idev] --
1,514,122 UART: [ldev] ++
1,514,290 UART: [ldev] CDI.KEYID = 6
1,514,653 UART: [ldev] SUBJECT.KEYID = 5
1,515,079 UART: [ldev] AUTHORITY.KEYID = 7
1,515,542 UART: [ldev] FE.KEYID = 1
1,520,506 UART: [ldev] Erasing FE.KEYID = 1
1,545,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,121 UART: [ldev] --
1,585,476 UART: [fwproc] Waiting for Commands...
1,586,199 UART: [fwproc] Received command 0x46574c44
1,586,990 UART: [fwproc] Received Image of size 114332 bytes
2,884,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,134 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,461 >>> mbox cmd response: success
3,078,509 UART: [afmc] ++
3,078,677 UART: [afmc] CDI.KEYID = 6
3,079,039 UART: [afmc] SUBJECT.KEYID = 7
3,079,464 UART: [afmc] AUTHORITY.KEYID = 5
3,114,713 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,506 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,196 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,117 UART: [afmc] --
3,158,047 UART: [cold-reset] --
3,158,909 UART: [state] Locking Datavault
3,160,172 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,776 UART: [state] Locking ICCM
3,161,396 UART: [exit] Launching FMC @ 0x40000130
3,166,725 UART:
3,166,741 UART: Running Caliptra FMC ...
3,167,149 UART:
3,167,292 UART: [state] CFI Enabled
3,178,345 UART: [fht] FMC Alias Private Key: 7
3,285,696 UART: [art] Extend RT PCRs Done
3,286,124 UART: [art] Lock RT PCRs Done
3,287,694 UART: [art] Populate DV Done
3,296,057 UART: [fht] FMC Alias Private Key: 7
3,297,031 UART: [art] Derive CDI
3,297,311 UART: [art] Store in in slot 0x4
3,383,260 UART: [art] Derive Key Pair
3,383,620 UART: [art] Store priv key in slot 0x5
3,396,926 UART: [art] Derive Key Pair - Done
3,411,675 UART: [art] Signing Cert with AUTHO
3,412,155 UART: RITY.KEYID = 7
3,427,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,124 UART: [art] PUB.X = 0FA01F1785F4689D056CA655ADA1CB6FC3F6387A1A606958D18735333A0694BCE672586FBFD77CDA2D46F4D366C9DA51
3,434,893 UART: [art] PUB.Y = 22A8EA747E3808F88318B19463FD3DBA2113ECD3CCD71333E2BD8C533BC3D0AA5A7E4F915EDA39CC14DED032BF2B094F
3,441,857 UART: [art] SIG.R = 4AE3255162D9FD8F56FA2EB7DD1395FBC7E1EAC125BE23B5346BD6189B0343F49FA2F49E54B9112484A427F283DFDCDA
3,448,640 UART: [art] SIG.S = A2D90AE67A5DFC40BB4FFC145BCA604F597FF966D6CCE34859AF8EFB2DF740F6AAC950719296A52D86DF9541DF8C67D0
3,472,416 UART: Caliptra RT
3,472,761 UART: [state] CFI Enabled
3,581,378 UART: [rt] RT listening for mailbox commands...
3,582,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,530 UART: [rt]cmd =0x4d454153, len=108
3,632,489 >>> mbox cmd response data (12 bytes)
3,632,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,429 UART: [rt]cmd =0x4d454153, len=108
3,682,288 >>> mbox cmd response data (12 bytes)
3,682,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,402 UART: [rt]cmd =0x4d454153, len=108
3,733,279 >>> mbox cmd response data (12 bytes)
3,733,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,109 UART: [rt]cmd =0x4d454153, len=108
3,783,780 >>> mbox cmd response data (12 bytes)
3,783,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,036 UART: [rt]cmd =0x4d454153, len=108
3,834,621 >>> mbox cmd response data (12 bytes)
3,834,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,463 UART: [rt]cmd =0x4d454153, len=108
3,885,088 >>> mbox cmd response data (12 bytes)
3,885,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,002 UART: [rt]cmd =0x4d454153, len=108
3,935,045 >>> mbox cmd response data (12 bytes)
3,935,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,833 UART: [rt]cmd =0x4d454153, len=108
3,985,272 >>> mbox cmd response data (12 bytes)
3,985,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,082 UART: [rt]cmd =0x4d454153, len=108
4,035,509 >>> mbox cmd response data (12 bytes)
4,035,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,459 UART: [rt]cmd =0x4d454153, len=108
4,085,810 >>> mbox cmd response data (12 bytes)
4,085,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,764 UART: [rt]cmd =0x4d454153, len=108
4,136,723 >>> mbox cmd response data (12 bytes)
4,136,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,855 UART: [rt]cmd =0x4d454153, len=108
4,187,640 >>> mbox cmd response data (12 bytes)
4,187,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,217,888 UART: [rt]cmd =0x4d454153, len=108
4,238,337 >>> mbox cmd response data (12 bytes)
4,238,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,413 UART: [rt]cmd =0x4d454153, len=108
4,289,820 >>> mbox cmd response data (12 bytes)
4,289,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,319,762 UART: [rt]cmd =0x4d454153, len=108
4,341,059 >>> mbox cmd response data (12 bytes)
4,341,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,115 UART: [rt]cmd =0x4d454153, len=108
4,372,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,282 ready_for_fw is high
1,363,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,905 >>> mbox cmd response: success
2,988,869 UART:
2,988,885 UART: Running Caliptra FMC ...
2,989,293 UART:
2,989,436 UART: [state] CFI Enabled
3,000,059 UART: [fht] FMC Alias Private Key: 7
3,108,392 UART: [art] Extend RT PCRs Done
3,108,820 UART: [art] Lock RT PCRs Done
3,110,372 UART: [art] Populate DV Done
3,118,565 UART: [fht] FMC Alias Private Key: 7
3,119,643 UART: [art] Derive CDI
3,119,923 UART: [art] Store in in slot 0x4
3,205,236 UART: [art] Derive Key Pair
3,205,596 UART: [art] Store priv key in slot 0x5
3,218,564 UART: [art] Derive Key Pair - Done
3,233,183 UART: [art] Signing Cert with AUTHO
3,233,663 UART: RITY.KEYID = 7
3,249,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,908 UART: [art] PUB.X = 220E447DCA84CC8205787A689BA8EA97A16E4EFB4EBEF42D24879CD3E01AE7377E47AE465F867E9365BD59CE80817206
3,256,677 UART: [art] PUB.Y = 6CE9D91D4C6BC3FA2606A9D69CB968A760A0C93C6CBA74903E2EF234AA40AA8E5D385780EDC2A4082FA19E754CC775C3
3,263,637 UART: [art] SIG.R = B1447F60521940D2C20091CF20E4CBB1BD837650C0332D185096122D4C7E75F7CDBCA9236FC0CCFB24C5B651156FC6F9
3,270,391 UART: [art] SIG.S = B4DFCF1061447C57465A6502A14334243E73ED60DE9C41E1A6E7A6CA4BF25204EAACB6649179A4885DB2179CC50F7205
3,293,684 UART: Caliptra RT
3,294,029 UART: [state] CFI Enabled
3,401,987 UART: [rt] RT listening for mailbox commands...
3,402,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,313 UART: [rt]cmd =0x4d454153, len=108
3,453,354 >>> mbox cmd response data (12 bytes)
3,453,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,416 UART: [rt]cmd =0x4d454153, len=108
3,504,173 >>> mbox cmd response data (12 bytes)
3,504,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,085 UART: [rt]cmd =0x4d454153, len=108
3,554,928 >>> mbox cmd response data (12 bytes)
3,554,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,116 UART: [rt]cmd =0x4d454153, len=108
3,605,703 >>> mbox cmd response data (12 bytes)
3,605,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,021 UART: [rt]cmd =0x4d454153, len=108
3,656,630 >>> mbox cmd response data (12 bytes)
3,656,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,654 UART: [rt]cmd =0x4d454153, len=108
3,707,587 >>> mbox cmd response data (12 bytes)
3,707,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,605 UART: [rt]cmd =0x4d454153, len=108
3,758,714 >>> mbox cmd response data (12 bytes)
3,758,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,700 UART: [rt]cmd =0x4d454153, len=108
3,809,423 >>> mbox cmd response data (12 bytes)
3,809,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,579 UART: [rt]cmd =0x4d454153, len=108
3,860,136 >>> mbox cmd response data (12 bytes)
3,860,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,984 UART: [rt]cmd =0x4d454153, len=108
3,911,885 >>> mbox cmd response data (12 bytes)
3,911,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,777 UART: [rt]cmd =0x4d454153, len=108
3,962,488 >>> mbox cmd response data (12 bytes)
3,962,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,410 UART: [rt]cmd =0x4d454153, len=108
4,013,357 >>> mbox cmd response data (12 bytes)
4,013,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,655 UART: [rt]cmd =0x4d454153, len=108
4,064,194 >>> mbox cmd response data (12 bytes)
4,064,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,054 UART: [rt]cmd =0x4d454153, len=108
4,114,419 >>> mbox cmd response data (12 bytes)
4,114,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,223 UART: [rt]cmd =0x4d454153, len=108
4,165,518 >>> mbox cmd response data (12 bytes)
4,165,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,376 UART: [rt]cmd =0x4d454153, len=108
4,197,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,610 UART: [kat] HMAC-384Kdf
923,366 UART: [kat] LMS
1,171,694 UART: [kat] --
1,172,733 UART: [cold-reset] ++
1,173,067 UART: [fht] FHT @ 0x50003400
1,175,728 UART: [idev] ++
1,175,896 UART: [idev] CDI.KEYID = 6
1,176,256 UART: [idev] SUBJECT.KEYID = 7
1,176,680 UART: [idev] UDS.KEYID = 0
1,177,025 ready_for_fw is high
1,177,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,146 UART: [idev] Erasing UDS.KEYID = 0
1,200,705 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,792 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,316 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,103 >>> mbox cmd response: success
2,775,173 UART: [afmc] ++
2,775,341 UART: [afmc] CDI.KEYID = 6
2,775,703 UART: [afmc] SUBJECT.KEYID = 7
2,776,128 UART: [afmc] AUTHORITY.KEYID = 5
2,812,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,546 UART: [afmc] --
2,855,670 UART: [cold-reset] --
2,856,534 UART: [state] Locking Datavault
2,857,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,171 UART: [state] Locking ICCM
2,858,767 UART: [exit] Launching FMC @ 0x40000130
2,864,096 UART:
2,864,112 UART: Running Caliptra FMC ...
2,864,520 UART:
2,864,574 UART: [state] CFI Enabled
2,875,021 UART: [fht] FMC Alias Private Key: 7
2,983,030 UART: [art] Extend RT PCRs Done
2,983,458 UART: [art] Lock RT PCRs Done
2,985,296 UART: [art] Populate DV Done
2,993,555 UART: [fht] FMC Alias Private Key: 7
2,994,637 UART: [art] Derive CDI
2,994,917 UART: [art] Store in in slot 0x4
3,080,334 UART: [art] Derive Key Pair
3,080,694 UART: [art] Store priv key in slot 0x5
3,093,622 UART: [art] Derive Key Pair - Done
3,108,356 UART: [art] Signing Cert with AUTHO
3,108,836 UART: RITY.KEYID = 7
3,123,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,347 UART: [art] PUB.X = FA7E3BE859942A0592380468DE6010CB7536B6FB3DED124F7F18621F2EAFA8F794959311815A7068FA7D89876FB4A8D4
3,131,113 UART: [art] PUB.Y = 9F1BCDE45D66BCE3E6C25A49A0444473868FB0B06DBA7DB94530C4AE41FA5468A4CF682702FC90AAF3278C5F977BE7CE
3,138,078 UART: [art] SIG.R = C8D77F4D4238672688696B1ACCEF1A4174037956B8A78FF33CC7B24F87170DE59023B2800713CC8C8882662734BCA105
3,144,830 UART: [art] SIG.S = E4668040E4D211E37812EC365939519DD3704D571227E098348924E2C2AAAA5A8CBC6015B77C9650031A50A17F63EC35
3,168,312 UART: Caliptra RT
3,168,565 UART: [state] CFI Enabled
3,276,141 UART: [rt] RT listening for mailbox commands...
3,276,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,443 UART: [rt]cmd =0x4d454153, len=108
3,327,270 >>> mbox cmd response data (12 bytes)
3,327,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,134 UART: [rt]cmd =0x4d454153, len=108
3,377,685 >>> mbox cmd response data (12 bytes)
3,377,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,551 UART: [rt]cmd =0x4d454153, len=108
3,428,100 >>> mbox cmd response data (12 bytes)
3,428,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,094 UART: [rt]cmd =0x4d454153, len=108
3,478,957 >>> mbox cmd response data (12 bytes)
3,478,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,059 UART: [rt]cmd =0x4d454153, len=108
3,530,106 >>> mbox cmd response data (12 bytes)
3,530,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,382 UART: [rt]cmd =0x4d454153, len=108
3,580,965 >>> mbox cmd response data (12 bytes)
3,580,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,767 UART: [rt]cmd =0x4d454153, len=108
3,631,754 >>> mbox cmd response data (12 bytes)
3,631,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,714 UART: [rt]cmd =0x4d454153, len=108
3,682,433 >>> mbox cmd response data (12 bytes)
3,682,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,405 UART: [rt]cmd =0x4d454153, len=108
3,733,292 >>> mbox cmd response data (12 bytes)
3,733,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,406 UART: [rt]cmd =0x4d454153, len=108
3,784,083 >>> mbox cmd response data (12 bytes)
3,784,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,053 UART: [rt]cmd =0x4d454153, len=108
3,834,560 >>> mbox cmd response data (12 bytes)
3,834,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,636 UART: [rt]cmd =0x4d454153, len=108
3,885,435 >>> mbox cmd response data (12 bytes)
3,885,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,359 UART: [rt]cmd =0x4d454153, len=108
3,935,866 >>> mbox cmd response data (12 bytes)
3,935,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,858 UART: [rt]cmd =0x4d454153, len=108
3,986,871 >>> mbox cmd response data (12 bytes)
3,986,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,691 UART: [rt]cmd =0x4d454153, len=108
4,037,830 >>> mbox cmd response data (12 bytes)
4,037,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,766 UART: [rt]cmd =0x4d454153, len=108
4,069,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 ready_for_fw is high
1,060,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,346 >>> mbox cmd response: success
2,688,500 UART:
2,688,516 UART: Running Caliptra FMC ...
2,688,924 UART:
2,688,978 UART: [state] CFI Enabled
2,699,373 UART: [fht] FMC Alias Private Key: 7
2,807,654 UART: [art] Extend RT PCRs Done
2,808,082 UART: [art] Lock RT PCRs Done
2,809,490 UART: [art] Populate DV Done
2,817,849 UART: [fht] FMC Alias Private Key: 7
2,818,893 UART: [art] Derive CDI
2,819,173 UART: [art] Store in in slot 0x4
2,904,486 UART: [art] Derive Key Pair
2,904,846 UART: [art] Store priv key in slot 0x5
2,917,600 UART: [art] Derive Key Pair - Done
2,932,658 UART: [art] Signing Cert with AUTHO
2,933,138 UART: RITY.KEYID = 7
2,948,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,579 UART: [art] PUB.X = 920B7DC43403E8E4FBA4575624E3979F66017EC419D6722ECEFD18E46178208356E5879F612E9DD8B7B8AD33F433CD7B
2,956,342 UART: [art] PUB.Y = 6FC7DB795B6721EB28185087B59133A85326082054413AF3F7DF4A27F8473ABB12636F4FD0F74C1D1C03C51D80C32527
2,963,282 UART: [art] SIG.R = 962574F6AACC1260F3764330FEB5ECFC3589A69021454D85858E9DB9253E32A901E15F31E609BBAFFEE413B1B7E9E274
2,970,052 UART: [art] SIG.S = 9F5DF1220C8FA35614C9F4CF87D0CD7C459C678CB6BA4134ED7F03298F3323803ABE2D4A2B6176ACBE30A8DD9A0C366F
2,993,958 UART: Caliptra RT
2,994,211 UART: [state] CFI Enabled
3,102,619 UART: [rt] RT listening for mailbox commands...
3,103,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,953 UART: [rt]cmd =0x4d454153, len=108
3,154,982 >>> mbox cmd response data (12 bytes)
3,154,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,900 UART: [rt]cmd =0x4d454153, len=108
3,205,283 >>> mbox cmd response data (12 bytes)
3,205,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,441 UART: [rt]cmd =0x4d454153, len=108
3,256,020 >>> mbox cmd response data (12 bytes)
3,256,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,098 UART: [rt]cmd =0x4d454153, len=108
3,306,291 >>> mbox cmd response data (12 bytes)
3,306,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,501 UART: [rt]cmd =0x4d454153, len=108
3,356,888 >>> mbox cmd response data (12 bytes)
3,356,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,990 UART: [rt]cmd =0x4d454153, len=108
3,407,485 >>> mbox cmd response data (12 bytes)
3,407,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,573 UART: [rt]cmd =0x4d454153, len=108
3,457,926 >>> mbox cmd response data (12 bytes)
3,457,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,872 UART: [rt]cmd =0x4d454153, len=108
3,509,045 >>> mbox cmd response data (12 bytes)
3,509,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,191 UART: [rt]cmd =0x4d454153, len=108
3,560,820 >>> mbox cmd response data (12 bytes)
3,560,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,860 UART: [rt]cmd =0x4d454153, len=108
3,611,315 >>> mbox cmd response data (12 bytes)
3,611,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,283 UART: [rt]cmd =0x4d454153, len=108
3,662,696 >>> mbox cmd response data (12 bytes)
3,662,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,864 UART: [rt]cmd =0x4d454153, len=108
3,714,563 >>> mbox cmd response data (12 bytes)
3,714,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,533 UART: [rt]cmd =0x4d454153, len=108
3,765,146 >>> mbox cmd response data (12 bytes)
3,765,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,276 UART: [rt]cmd =0x4d454153, len=108
3,816,261 >>> mbox cmd response data (12 bytes)
3,816,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,387 UART: [rt]cmd =0x4d454153, len=108
3,867,742 >>> mbox cmd response data (12 bytes)
3,867,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,774 UART: [rt]cmd =0x4d454153, len=108
3,899,430 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
893,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,536 UART: [kat] ++
897,688 UART: [kat] sha1
901,820 UART: [kat] SHA2-256
903,760 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,537 UART: [idev] ++
1,175,705 UART: [idev] CDI.KEYID = 6
1,176,065 UART: [idev] SUBJECT.KEYID = 7
1,176,489 UART: [idev] UDS.KEYID = 0
1,176,834 ready_for_fw is high
1,176,834 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,189 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,116 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,217,876 UART: [ldev] Erasing FE.KEYID = 1
1,244,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,660 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,611 UART: [fwproc] Recv command 0x46574c44
1,284,339 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,794 >>> mbox cmd response: success
2,774,034 UART: [afmc] ++
2,774,202 UART: [afmc] CDI.KEYID = 6
2,774,564 UART: [afmc] SUBJECT.KEYID = 7
2,774,989 UART: [afmc] AUTHORITY.KEYID = 5
2,811,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,669 UART: [afmc] --
2,854,603 UART: [cold-reset] --
2,855,377 UART: [state] Locking Datavault
2,856,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,196 UART: [state] Locking ICCM
2,857,694 UART: [exit] Launching FMC @ 0x40000130
2,863,023 UART:
2,863,039 UART: Running Caliptra FMC ...
2,863,447 UART:
2,863,590 UART: [state] CFI Enabled
2,873,763 UART: [fht] FMC Alias Private Key: 7
2,981,944 UART: [art] Extend RT PCRs Done
2,982,372 UART: [art] Lock RT PCRs Done
2,983,930 UART: [art] Populate DV Done
2,992,027 UART: [fht] FMC Alias Private Key: 7
2,992,977 UART: [art] Derive CDI
2,993,257 UART: [art] Store in in slot 0x4
3,078,828 UART: [art] Derive Key Pair
3,079,188 UART: [art] Store priv key in slot 0x5
3,092,522 UART: [art] Derive Key Pair - Done
3,107,448 UART: [art] Signing Cert with AUTHO
3,107,928 UART: RITY.KEYID = 7
3,123,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,777 UART: [art] PUB.X = 4C8EAE284559CBC4DB56FA7D887F7917AF034206BD82FC7693D1A6984405F7BFF6BD950160817699000D16BF4EB7F555
3,130,514 UART: [art] PUB.Y = B3F8C85A909841DFC33F704FC00519B53FAC9C6E06482C569B7B5A22DE84162BFA484E1048546468FE8D4AAC36417B32
3,137,462 UART: [art] SIG.R = 9B8B2908228C9486F9B5EA6FBE17F8EF0E0BAB896B2970BB3054D39ECB01926B6D3C57A1F853FC7432BC2C5E9AB5AAB6
3,144,238 UART: [art] SIG.S = 92163E2270F3E159B0D1371F3EE3BC1E29B37CB0E4B33FA4DFAD6E2CF5751B37A0956082660B03474F251EAC639F640E
3,167,804 UART: Caliptra RT
3,168,149 UART: [state] CFI Enabled
3,276,381 UART: [rt] RT listening for mailbox commands...
3,277,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,597 UART: [rt]cmd =0x4d454153, len=108
3,328,100 >>> mbox cmd response data (12 bytes)
3,328,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,130 UART: [rt]cmd =0x4d454153, len=108
3,378,599 >>> mbox cmd response data (12 bytes)
3,378,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,811 UART: [rt]cmd =0x4d454153, len=108
3,429,362 >>> mbox cmd response data (12 bytes)
3,429,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,452 UART: [rt]cmd =0x4d454153, len=108
3,480,261 >>> mbox cmd response data (12 bytes)
3,480,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,501 UART: [rt]cmd =0x4d454153, len=108
3,531,142 >>> mbox cmd response data (12 bytes)
3,531,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,264 UART: [rt]cmd =0x4d454153, len=108
3,581,577 >>> mbox cmd response data (12 bytes)
3,581,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,499 UART: [rt]cmd =0x4d454153, len=108
3,631,912 >>> mbox cmd response data (12 bytes)
3,631,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,132 UART: [rt]cmd =0x4d454153, len=108
3,683,455 >>> mbox cmd response data (12 bytes)
3,683,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,619 UART: [rt]cmd =0x4d454153, len=108
3,735,030 >>> mbox cmd response data (12 bytes)
3,735,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,166 UART: [rt]cmd =0x4d454153, len=108
3,786,337 >>> mbox cmd response data (12 bytes)
3,786,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,377 UART: [rt]cmd =0x4d454153, len=108
3,837,920 >>> mbox cmd response data (12 bytes)
3,837,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,072 UART: [rt]cmd =0x4d454153, len=108
3,889,199 >>> mbox cmd response data (12 bytes)
3,889,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,183 UART: [rt]cmd =0x4d454153, len=108
3,939,204 >>> mbox cmd response data (12 bytes)
3,939,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,402 UART: [rt]cmd =0x4d454153, len=108
3,989,701 >>> mbox cmd response data (12 bytes)
3,989,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,741 UART: [rt]cmd =0x4d454153, len=108
4,040,612 >>> mbox cmd response data (12 bytes)
4,040,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,822 UART: [rt]cmd =0x4d454153, len=108
4,072,950 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,330 ready_for_fw is high
1,060,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,605 >>> mbox cmd response: success
2,687,535 UART:
2,687,551 UART: Running Caliptra FMC ...
2,687,959 UART:
2,688,102 UART: [state] CFI Enabled
2,698,329 UART: [fht] FMC Alias Private Key: 7
2,806,478 UART: [art] Extend RT PCRs Done
2,806,906 UART: [art] Lock RT PCRs Done
2,808,436 UART: [art] Populate DV Done
2,816,501 UART: [fht] FMC Alias Private Key: 7
2,817,615 UART: [art] Derive CDI
2,817,895 UART: [art] Store in in slot 0x4
2,903,538 UART: [art] Derive Key Pair
2,903,898 UART: [art] Store priv key in slot 0x5
2,917,502 UART: [art] Derive Key Pair - Done
2,932,238 UART: [art] Signing Cert with AUTHO
2,932,718 UART: RITY.KEYID = 7
2,947,824 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,589 UART: [art] PUB.X = 9F991AB351E38114E547286CFEBA850239BEC4405742545C12D9A56F80BB1F137B00C2553A91D8411D50A462997F711F
2,955,328 UART: [art] PUB.Y = 2E3B67474C295F1A5FA43B0BDFF2A27390858502EF2CB3535750A476E268680F12AE86FEDF5AE07F24BEE45C65964318
2,962,273 UART: [art] SIG.R = 8E84C58455C0AD970FF0B7EBDD6EA920C0047D566A9F95E0343D71E463F8999C793D2CFCE3A00291A9FEE0687924BA2A
2,969,044 UART: [art] SIG.S = 803A086C24469B4A5522A095370989E6C4AABCA9D4BC82BA27297F8FF22B8FC9B30961C143BDECDC30FFF121920ED3E2
2,992,365 UART: Caliptra RT
2,992,710 UART: [state] CFI Enabled
3,100,604 UART: [rt] RT listening for mailbox commands...
3,101,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,692 UART: [rt]cmd =0x4d454153, len=108
3,153,027 >>> mbox cmd response data (12 bytes)
3,153,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,117 UART: [rt]cmd =0x4d454153, len=108
3,204,298 >>> mbox cmd response data (12 bytes)
3,204,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,272 UART: [rt]cmd =0x4d454153, len=108
3,254,123 >>> mbox cmd response data (12 bytes)
3,254,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,205 UART: [rt]cmd =0x4d454153, len=108
3,305,168 >>> mbox cmd response data (12 bytes)
3,305,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,208 UART: [rt]cmd =0x4d454153, len=108
3,356,295 >>> mbox cmd response data (12 bytes)
3,356,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,363 UART: [rt]cmd =0x4d454153, len=108
3,406,630 >>> mbox cmd response data (12 bytes)
3,406,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,544 UART: [rt]cmd =0x4d454153, len=108
3,457,529 >>> mbox cmd response data (12 bytes)
3,457,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,557 UART: [rt]cmd =0x4d454153, len=108
3,507,918 >>> mbox cmd response data (12 bytes)
3,507,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,926 UART: [rt]cmd =0x4d454153, len=108
3,558,861 >>> mbox cmd response data (12 bytes)
3,558,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,919 UART: [rt]cmd =0x4d454153, len=108
3,609,498 >>> mbox cmd response data (12 bytes)
3,609,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,500 UART: [rt]cmd =0x4d454153, len=108
3,660,931 >>> mbox cmd response data (12 bytes)
3,660,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,931 UART: [rt]cmd =0x4d454153, len=108
3,712,628 >>> mbox cmd response data (12 bytes)
3,712,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,596 UART: [rt]cmd =0x4d454153, len=108
3,762,745 >>> mbox cmd response data (12 bytes)
3,762,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,811 UART: [rt]cmd =0x4d454153, len=108
3,813,796 >>> mbox cmd response data (12 bytes)
3,813,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,802 UART: [rt]cmd =0x4d454153, len=108
3,864,567 >>> mbox cmd response data (12 bytes)
3,864,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,655 UART: [rt]cmd =0x4d454153, len=108
3,896,607 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,210 UART: [kat] SHA2-512-ACC
906,111 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,174,153 ready_for_fw is high
1,174,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,197,997 UART: [idev] Sha1 KeyId Algorithm
1,206,687 UART: [idev] --
1,207,644 UART: [ldev] ++
1,207,812 UART: [ldev] CDI.KEYID = 6
1,208,176 UART: [ldev] SUBJECT.KEYID = 5
1,208,603 UART: [ldev] AUTHORITY.KEYID = 7
1,209,066 UART: [ldev] FE.KEYID = 1
1,214,378 UART: [ldev] Erasing FE.KEYID = 1
1,240,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,920 UART: [ldev] --
1,280,432 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,395 >>> mbox cmd response: success
2,773,416 UART: [afmc] ++
2,773,584 UART: [afmc] CDI.KEYID = 6
2,773,947 UART: [afmc] SUBJECT.KEYID = 7
2,774,373 UART: [afmc] AUTHORITY.KEYID = 5
2,809,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,199 UART: [afmc] --
2,853,223 UART: [cold-reset] --
2,853,953 UART: [state] Locking Datavault
2,855,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,948 UART: [state] Locking ICCM
2,856,432 UART: [exit] Launching FMC @ 0x40000130
2,861,761 UART:
2,861,777 UART: Running Caliptra FMC ...
2,862,185 UART:
2,862,239 UART: [state] CFI Enabled
2,872,740 UART: [fht] FMC Alias Private Key: 7
2,980,853 UART: [art] Extend RT PCRs Done
2,981,281 UART: [art] Lock RT PCRs Done
2,982,891 UART: [art] Populate DV Done
2,991,090 UART: [fht] FMC Alias Private Key: 7
2,992,220 UART: [art] Derive CDI
2,992,500 UART: [art] Store in in slot 0x4
3,078,351 UART: [art] Derive Key Pair
3,078,711 UART: [art] Store priv key in slot 0x5
3,091,879 UART: [art] Derive Key Pair - Done
3,106,958 UART: [art] Signing Cert with AUTHO
3,107,438 UART: RITY.KEYID = 7
3,122,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,709 UART: [art] PUB.X = 2094FFCC7594F1CBA69724D0E47C0B1128E603E6A2D8A5FC99FC2CD3488D94ED9FEAFD49F5576221A9CF0F437663A3E3
3,130,484 UART: [art] PUB.Y = 7DB1406ACA4392E8E0462132847FFCE6F57D3079BF8BA33DBE945C238758C748EBCFC98FD24BDB4886ACA600CF2EAA85
3,137,430 UART: [art] SIG.R = 1FF6B76CDEF50E688C3FE427CA069445807AC6971D1DFCA873DD3EB7B68B8B0D60569379DA735A5B3980DEFC57E725E1
3,144,205 UART: [art] SIG.S = 685B9BA574A23A220956BC62447C69680B936306AFA905ABFEF847AA2C041DAD5CACE5AEA2AC86D86B0618CF7A9E9059
3,167,614 UART: Caliptra RT
3,167,867 UART: [state] CFI Enabled
3,276,042 UART: [rt] RT listening for mailbox commands...
3,276,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,044 UART: [rt]cmd =0x4d454153, len=108
3,327,051 >>> mbox cmd response data (12 bytes)
3,327,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,993 UART: [rt]cmd =0x4d454153, len=108
3,377,822 >>> mbox cmd response data (12 bytes)
3,377,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,774 UART: [rt]cmd =0x4d454153, len=108
3,428,499 >>> mbox cmd response data (12 bytes)
3,428,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,485 UART: [rt]cmd =0x4d454153, len=108
3,478,944 >>> mbox cmd response data (12 bytes)
3,478,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,014 UART: [rt]cmd =0x4d454153, len=108
3,529,501 >>> mbox cmd response data (12 bytes)
3,529,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,531 UART: [rt]cmd =0x4d454153, len=108
3,579,756 >>> mbox cmd response data (12 bytes)
3,579,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,748 UART: [rt]cmd =0x4d454153, len=108
3,630,671 >>> mbox cmd response data (12 bytes)
3,630,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,583 UART: [rt]cmd =0x4d454153, len=108
3,680,858 >>> mbox cmd response data (12 bytes)
3,680,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,856 UART: [rt]cmd =0x4d454153, len=108
3,731,057 >>> mbox cmd response data (12 bytes)
3,731,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,129 UART: [rt]cmd =0x4d454153, len=108
3,781,636 >>> mbox cmd response data (12 bytes)
3,781,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,828 UART: [rt]cmd =0x4d454153, len=108
3,831,773 >>> mbox cmd response data (12 bytes)
3,831,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,717 UART: [rt]cmd =0x4d454153, len=108
3,882,344 >>> mbox cmd response data (12 bytes)
3,882,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,340 UART: [rt]cmd =0x4d454153, len=108
3,932,849 >>> mbox cmd response data (12 bytes)
3,932,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,687 UART: [rt]cmd =0x4d454153, len=108
3,983,948 >>> mbox cmd response data (12 bytes)
3,983,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,186 UART: [rt]cmd =0x4d454153, len=108
4,035,107 >>> mbox cmd response data (12 bytes)
4,035,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,355 UART: [rt]cmd =0x4d454153, len=108
4,067,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,288 ready_for_fw is high
1,056,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,235 >>> mbox cmd response: success
2,684,191 UART:
2,684,207 UART: Running Caliptra FMC ...
2,684,615 UART:
2,684,669 UART: [state] CFI Enabled
2,695,410 UART: [fht] FMC Alias Private Key: 7
2,803,359 UART: [art] Extend RT PCRs Done
2,803,787 UART: [art] Lock RT PCRs Done
2,805,219 UART: [art] Populate DV Done
2,813,230 UART: [fht] FMC Alias Private Key: 7
2,814,250 UART: [art] Derive CDI
2,814,530 UART: [art] Store in in slot 0x4
2,900,329 UART: [art] Derive Key Pair
2,900,689 UART: [art] Store priv key in slot 0x5
2,913,525 UART: [art] Derive Key Pair - Done
2,927,944 UART: [art] Signing Cert with AUTHO
2,928,424 UART: RITY.KEYID = 7
2,943,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,325 UART: [art] PUB.X = DA3F9E3917A703B68ACB4037EBC0CACC2C59F4BDF64E93B8A035833BC6A7FFCA3BAF89B0F99F204AF9C3C794AEC80ADD
2,951,121 UART: [art] PUB.Y = 46FFE202FADDF588EC249343A4F4B490C293F8AD91B705FE9B2EB4D05DD699DB3060E31CA450AE3784C632AA42768A94
2,958,077 UART: [art] SIG.R = 984B0AAEB50AE4694DF2757B90C21642B02B798F441D6826A45225BB39CEA2161B1C4C90F18971A73EDD9369C315A81B
2,964,843 UART: [art] SIG.S = 51BC0B624FACB6DE4A7BC37D3B58764D4C1CF6A10398C38946A880FA9584AAC7E9AF880A715986251EA60AF48535725C
2,988,216 UART: Caliptra RT
2,988,469 UART: [state] CFI Enabled
3,096,186 UART: [rt] RT listening for mailbox commands...
3,096,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,100 UART: [rt]cmd =0x4d454153, len=108
3,146,811 >>> mbox cmd response data (12 bytes)
3,146,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,901 UART: [rt]cmd =0x4d454153, len=108
3,197,964 >>> mbox cmd response data (12 bytes)
3,197,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,842 UART: [rt]cmd =0x4d454153, len=108
3,247,573 >>> mbox cmd response data (12 bytes)
3,247,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,569 UART: [rt]cmd =0x4d454153, len=108
3,297,486 >>> mbox cmd response data (12 bytes)
3,297,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,772 UART: [rt]cmd =0x4d454153, len=108
3,349,349 >>> mbox cmd response data (12 bytes)
3,349,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,237 UART: [rt]cmd =0x4d454153, len=108
3,399,704 >>> mbox cmd response data (12 bytes)
3,399,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,838 UART: [rt]cmd =0x4d454153, len=108
3,449,913 >>> mbox cmd response data (12 bytes)
3,449,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,713 UART: [rt]cmd =0x4d454153, len=108
3,500,762 >>> mbox cmd response data (12 bytes)
3,500,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,632 UART: [rt]cmd =0x4d454153, len=108
3,552,043 >>> mbox cmd response data (12 bytes)
3,552,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,079 UART: [rt]cmd =0x4d454153, len=108
3,602,372 >>> mbox cmd response data (12 bytes)
3,602,373 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,262 UART: [rt]cmd =0x4d454153, len=108
3,653,145 >>> mbox cmd response data (12 bytes)
3,653,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,307 UART: [rt]cmd =0x4d454153, len=108
3,704,114 >>> mbox cmd response data (12 bytes)
3,704,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,240 UART: [rt]cmd =0x4d454153, len=108
3,754,775 >>> mbox cmd response data (12 bytes)
3,754,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,769 UART: [rt]cmd =0x4d454153, len=108
3,805,642 >>> mbox cmd response data (12 bytes)
3,805,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,550 UART: [rt]cmd =0x4d454153, len=108
3,856,381 >>> mbox cmd response data (12 bytes)
3,856,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,473 UART: [rt]cmd =0x4d454153, len=108
3,888,555 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,200 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,822 UART: [idev] Sha1 KeyId Algorithm
1,208,856 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,883 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,964 >>> mbox cmd response: success
2,775,153 UART: [afmc] ++
2,775,321 UART: [afmc] CDI.KEYID = 6
2,775,684 UART: [afmc] SUBJECT.KEYID = 7
2,776,110 UART: [afmc] AUTHORITY.KEYID = 5
2,811,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,567 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,018 UART: [afmc] --
2,854,958 UART: [cold-reset] --
2,855,850 UART: [state] Locking Datavault
2,857,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,843 UART: [state] Locking ICCM
2,858,489 UART: [exit] Launching FMC @ 0x40000130
2,863,818 UART:
2,863,834 UART: Running Caliptra FMC ...
2,864,242 UART:
2,864,385 UART: [state] CFI Enabled
2,874,656 UART: [fht] FMC Alias Private Key: 7
2,982,831 UART: [art] Extend RT PCRs Done
2,983,259 UART: [art] Lock RT PCRs Done
2,984,687 UART: [art] Populate DV Done
2,993,072 UART: [fht] FMC Alias Private Key: 7
2,994,114 UART: [art] Derive CDI
2,994,394 UART: [art] Store in in slot 0x4
3,080,401 UART: [art] Derive Key Pair
3,080,761 UART: [art] Store priv key in slot 0x5
3,093,727 UART: [art] Derive Key Pair - Done
3,108,235 UART: [art] Signing Cert with AUTHO
3,108,715 UART: RITY.KEYID = 7
3,123,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,412 UART: [art] PUB.X = DA57BAB932B55E148FC3F606C59AA81B30D6123E2758FDD43E367ACEC28E9BCA5B0DA8F36BD2C0F2D0F3B84BB16F4446
3,131,198 UART: [art] PUB.Y = DFA13C4F0DA52B8474FEEF0D6553B9AEDF7D9129B87B723C036AF5F71731A4386CBFD4023DB3AB32E8315071DC07C648
3,138,147 UART: [art] SIG.R = 4CB49D87FA07800F1CAFC4D908EED9F05428D963EE413739A84EE905A5345194B902181283CE5E33C848E32842DD1181
3,144,900 UART: [art] SIG.S = 3C486AC20FBE38E7065A916251B0E38E2A9BE6CAFD393C5FD5A22FF62F291F11AF2BC5A94FD911BC0BEA25AAD144195B
3,168,234 UART: Caliptra RT
3,168,579 UART: [state] CFI Enabled
3,276,068 UART: [rt] RT listening for mailbox commands...
3,276,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,242 UART: [rt]cmd =0x4d454153, len=108
3,328,125 >>> mbox cmd response data (12 bytes)
3,328,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,287 UART: [rt]cmd =0x4d454153, len=108
3,378,446 >>> mbox cmd response data (12 bytes)
3,378,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,400 UART: [rt]cmd =0x4d454153, len=108
3,428,979 >>> mbox cmd response data (12 bytes)
3,428,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,959 UART: [rt]cmd =0x4d454153, len=108
3,479,502 >>> mbox cmd response data (12 bytes)
3,479,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,394 UART: [rt]cmd =0x4d454153, len=108
3,530,191 >>> mbox cmd response data (12 bytes)
3,530,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,997 UART: [rt]cmd =0x4d454153, len=108
3,580,642 >>> mbox cmd response data (12 bytes)
3,580,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,666 UART: [rt]cmd =0x4d454153, len=108
3,631,567 >>> mbox cmd response data (12 bytes)
3,631,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,497 UART: [rt]cmd =0x4d454153, len=108
3,682,524 >>> mbox cmd response data (12 bytes)
3,682,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,462 UART: [rt]cmd =0x4d454153, len=108
3,733,665 >>> mbox cmd response data (12 bytes)
3,733,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,825 UART: [rt]cmd =0x4d454153, len=108
3,784,382 >>> mbox cmd response data (12 bytes)
3,784,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,448 UART: [rt]cmd =0x4d454153, len=108
3,835,015 >>> mbox cmd response data (12 bytes)
3,835,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,079 UART: [rt]cmd =0x4d454153, len=108
3,886,538 >>> mbox cmd response data (12 bytes)
3,886,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,554 UART: [rt]cmd =0x4d454153, len=108
3,936,879 >>> mbox cmd response data (12 bytes)
3,936,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,855 UART: [rt]cmd =0x4d454153, len=108
3,987,832 >>> mbox cmd response data (12 bytes)
3,987,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,550 UART: [rt]cmd =0x4d454153, len=108
4,038,123 >>> mbox cmd response data (12 bytes)
4,038,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,209 UART: [rt]cmd =0x4d454153, len=108
4,070,291 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,819 ready_for_fw is high
1,056,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,320 >>> mbox cmd response: success
2,685,086 UART:
2,685,102 UART: Running Caliptra FMC ...
2,685,510 UART:
2,685,653 UART: [state] CFI Enabled
2,696,304 UART: [fht] FMC Alias Private Key: 7
2,804,097 UART: [art] Extend RT PCRs Done
2,804,525 UART: [art] Lock RT PCRs Done
2,806,121 UART: [art] Populate DV Done
2,814,600 UART: [fht] FMC Alias Private Key: 7
2,815,570 UART: [art] Derive CDI
2,815,850 UART: [art] Store in in slot 0x4
2,901,663 UART: [art] Derive Key Pair
2,902,023 UART: [art] Store priv key in slot 0x5
2,915,679 UART: [art] Derive Key Pair - Done
2,930,605 UART: [art] Signing Cert with AUTHO
2,931,085 UART: RITY.KEYID = 7
2,946,507 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,272 UART: [art] PUB.X = D9DF8D64E50FE4A620E1979DD4DFAE3F276812C2BEBFBCA6F9DAA1AF60D48FA088A79A2ACB206E73E126E46B13F2DAB5
2,954,069 UART: [art] PUB.Y = AC479B06481934767536CD21338BB7FDA1DC4174A7A735DE3185DDF88DE1F911D2E73E2C5B2A3B2687866104CEC86BC2
2,961,019 UART: [art] SIG.R = 067ACD8846E91CC3005E869C873BB16CCD1B49FFC07D3541C78C04772647E8A3535FCF10EEA096770379816AEE9D6B05
2,967,759 UART: [art] SIG.S = 298F3A6FF39CE875B80BBEDAB668962E36C68FC0FAA3ED58E0E5BAB4A5126E16AF6EB5F20B5336CCE001491718D48C7D
2,992,111 UART: Caliptra RT
2,992,456 UART: [state] CFI Enabled
3,100,221 UART: [rt] RT listening for mailbox commands...
3,100,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,739 UART: [rt]cmd =0x4d454153, len=108
3,152,564 >>> mbox cmd response data (12 bytes)
3,152,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,902 UART: [rt]cmd =0x4d454153, len=108
3,203,531 >>> mbox cmd response data (12 bytes)
3,203,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,437 UART: [rt]cmd =0x4d454153, len=108
3,253,722 >>> mbox cmd response data (12 bytes)
3,253,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,650 UART: [rt]cmd =0x4d454153, len=108
3,304,295 >>> mbox cmd response data (12 bytes)
3,304,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,169 UART: [rt]cmd =0x4d454153, len=108
3,356,114 >>> mbox cmd response data (12 bytes)
3,356,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,184 UART: [rt]cmd =0x4d454153, len=108
3,406,731 >>> mbox cmd response data (12 bytes)
3,406,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,963 UART: [rt]cmd =0x4d454153, len=108
3,457,858 >>> mbox cmd response data (12 bytes)
3,457,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,062 UART: [rt]cmd =0x4d454153, len=108
3,509,015 >>> mbox cmd response data (12 bytes)
3,509,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,091 UART: [rt]cmd =0x4d454153, len=108
3,560,018 >>> mbox cmd response data (12 bytes)
3,560,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,106 UART: [rt]cmd =0x4d454153, len=108
3,610,007 >>> mbox cmd response data (12 bytes)
3,610,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,853 UART: [rt]cmd =0x4d454153, len=108
3,661,006 >>> mbox cmd response data (12 bytes)
3,661,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,010 UART: [rt]cmd =0x4d454153, len=108
3,710,853 >>> mbox cmd response data (12 bytes)
3,710,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,011 UART: [rt]cmd =0x4d454153, len=108
3,761,744 >>> mbox cmd response data (12 bytes)
3,761,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,644 UART: [rt]cmd =0x4d454153, len=108
3,813,161 >>> mbox cmd response data (12 bytes)
3,813,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,411 UART: [rt]cmd =0x4d454153, len=108
3,865,210 >>> mbox cmd response data (12 bytes)
3,865,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,150 UART: [rt]cmd =0x4d454153, len=108
3,896,992 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,914 UART: [kat] HMAC-384Kdf
907,318 UART: [kat] LMS
1,475,514 UART: [kat] --
1,476,467 UART: [cold-reset] ++
1,477,025 UART: [fht] Storing FHT @ 0x50003400
1,479,912 UART: [idev] ++
1,480,080 UART: [idev] CDI.KEYID = 6
1,480,440 UART: [idev] SUBJECT.KEYID = 7
1,480,864 UART: [idev] UDS.KEYID = 0
1,481,209 ready_for_fw is high
1,481,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,544 UART: [idev] --
1,514,591 UART: [ldev] ++
1,514,759 UART: [ldev] CDI.KEYID = 6
1,515,122 UART: [ldev] SUBJECT.KEYID = 5
1,515,548 UART: [ldev] AUTHORITY.KEYID = 7
1,516,011 UART: [ldev] FE.KEYID = 1
1,521,381 UART: [ldev] Erasing FE.KEYID = 1
1,545,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,904 UART: [ldev] --
1,585,379 UART: [fwproc] Waiting for Commands...
1,586,194 UART: [fwproc] Received command 0x46574c44
1,586,985 UART: [fwproc] Received Image of size 114332 bytes
2,885,103 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,225 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,480 >>> mbox cmd response: success
3,078,628 UART: [afmc] ++
3,078,796 UART: [afmc] CDI.KEYID = 6
3,079,158 UART: [afmc] SUBJECT.KEYID = 7
3,079,583 UART: [afmc] AUTHORITY.KEYID = 5
3,114,380 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,087 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,777 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,722 UART: [afmc] --
3,157,808 UART: [cold-reset] --
3,158,596 UART: [state] Locking Datavault
3,159,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,431 UART: [state] Locking ICCM
3,161,089 UART: [exit] Launching FMC @ 0x40000130
3,166,418 UART:
3,166,434 UART: Running Caliptra FMC ...
3,166,842 UART:
3,166,896 UART: [state] CFI Enabled
3,177,067 UART: [fht] FMC Alias Private Key: 7
3,285,414 UART: [art] Extend RT PCRs Done
3,285,842 UART: [art] Lock RT PCRs Done
3,287,266 UART: [art] Populate DV Done
3,295,675 UART: [fht] FMC Alias Private Key: 7
3,296,811 UART: [art] Derive CDI
3,297,091 UART: [art] Store in in slot 0x4
3,382,556 UART: [art] Derive Key Pair
3,382,916 UART: [art] Store priv key in slot 0x5
3,396,146 UART: [art] Derive Key Pair - Done
3,410,825 UART: [art] Signing Cert with AUTHO
3,411,305 UART: RITY.KEYID = 7
3,426,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,306 UART: [art] PUB.X = 6AFFC28F45BEFD7DC6CD3E487206CDFE1A32928E37C2A543425A8E000028D6AF03121F06038A3FCFB638BD6E291B5AB9
3,434,036 UART: [art] PUB.Y = 8357DAC56BDA9996412D12A7D34FF771C76C6702CDDEC6C3A3402E217507836547988FEB417C1A1A436FB580FF03D852
3,440,979 UART: [art] SIG.R = FBFF77F9BEDE24C6A08A099E6B970ED70698FED49009E5FD9749DB0501498E36A92A8CD87CD16AAA28CEF280A0A0FB51
3,447,751 UART: [art] SIG.S = CDFBF2439D7794D6EA21D42F036F25D4ACD7EE4B1500041703E5242F2E55D01EC0EED911B147A364B5AB18FC5EF402F1
3,471,176 UART: Caliptra RT
3,471,429 UART: [state] CFI Enabled
3,578,817 UART: [rt] RT listening for mailbox commands...
3,579,487 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,501 UART: [rt]cmd =0x44504543, len=40
3,635,558 >>> mbox cmd response data (40 bytes)
3,635,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,456 UART: [rt]cmd =0x44504543, len=96
3,705,541 >>> mbox cmd response data (56 bytes)
3,705,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,409 UART: [rt]cmd =0x44504543, len=96
3,774,687 >>> mbox cmd response data (56 bytes)
3,774,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,481 UART: [rt]cmd =0x44504543, len=96
3,845,543 >>> mbox cmd response data (56 bytes)
3,845,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,509 UART: [rt]cmd =0x44504543, len=96
3,916,501 >>> mbox cmd response data (56 bytes)
3,916,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,481 UART: [rt]cmd =0x44504543, len=96
3,988,139 >>> mbox cmd response data (56 bytes)
3,988,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,009 UART: [rt]cmd =0x44504543, len=96
4,060,143 >>> mbox cmd response data (56 bytes)
4,060,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,163 UART: [rt]cmd =0x44504543, len=96
4,132,283 >>> mbox cmd response data (56 bytes)
4,132,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,223 UART: [rt]cmd =0x44504543, len=96
4,204,649 >>> mbox cmd response data (56 bytes)
4,204,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,234,511 UART: [rt]cmd =0x44504543, len=96
4,276,559 >>> mbox cmd response data (56 bytes)
4,276,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,306,811 UART: [rt]cmd =0x44504543, len=96
4,349,703 >>> mbox cmd response data (56 bytes)
4,349,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,379,639 UART: [rt]cmd =0x44504543, len=96
4,422,697 >>> mbox cmd response data (56 bytes)
4,422,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,489 UART: [rt]cmd =0x44504543, len=96
4,495,565 >>> mbox cmd response data (56 bytes)
4,495,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,525,429 UART: [rt]cmd =0x44504543, len=96
4,568,989 >>> mbox cmd response data (56 bytes)
4,568,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,598,965 UART: [rt]cmd =0x44504543, len=96
4,643,369 >>> mbox cmd response data (56 bytes)
4,643,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,673,395 UART: [rt]cmd =0x44504543, len=96
4,718,249 >>> mbox cmd response data (56 bytes)
4,718,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,748,059 UART: [rt]cmd =0x44504543, len=96
4,755,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,703 ready_for_fw is high
1,361,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,096 >>> mbox cmd response: success
2,987,368 UART:
2,987,384 UART: Running Caliptra FMC ...
2,987,792 UART:
2,987,846 UART: [state] CFI Enabled
2,998,445 UART: [fht] FMC Alias Private Key: 7
3,106,512 UART: [art] Extend RT PCRs Done
3,106,940 UART: [art] Lock RT PCRs Done
3,108,246 UART: [art] Populate DV Done
3,116,381 UART: [fht] FMC Alias Private Key: 7
3,117,489 UART: [art] Derive CDI
3,117,769 UART: [art] Store in in slot 0x4
3,203,152 UART: [art] Derive Key Pair
3,203,512 UART: [art] Store priv key in slot 0x5
3,217,080 UART: [art] Derive Key Pair - Done
3,231,901 UART: [art] Signing Cert with AUTHO
3,232,381 UART: RITY.KEYID = 7
3,247,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,312 UART: [art] PUB.X = D3E3951750636C9C004AD0400C9DD4EA7584FF9D4201E589487267AE6DB77E07A89B3AD5AB7A7A04FD2C609A490333B7
3,255,049 UART: [art] PUB.Y = 96B26B38B9913DDCD840B2FC1B50D7F87E8CA617C596B885147B1F065008DD0C5CA560190DD4C6AA79259AFBF68C752E
3,261,997 UART: [art] SIG.R = 82B253CCAA82643E1F64170A4859E2D0940CC0F1FC3C4D3817F3B813577B3DBBF8888C8025A7EAD6BAE9BD3DE0EA26EB
3,268,779 UART: [art] SIG.S = 55BF50B91833259E8D3BDCB5252F5900CFC51A8685A776C7AF2CFD71B66F1B869DDA22B4D4C4B56EB4E2118DC25BD499
3,292,050 UART: Caliptra RT
3,292,303 UART: [state] CFI Enabled
3,400,128 UART: [rt] RT listening for mailbox commands...
3,400,798 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,016 UART: [rt]cmd =0x44504543, len=40
3,456,839 >>> mbox cmd response data (40 bytes)
3,456,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,771 UART: [rt]cmd =0x44504543, len=96
3,526,742 >>> mbox cmd response data (56 bytes)
3,526,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,778 UART: [rt]cmd =0x44504543, len=96
3,598,098 >>> mbox cmd response data (56 bytes)
3,598,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,080 UART: [rt]cmd =0x44504543, len=96
3,668,984 >>> mbox cmd response data (56 bytes)
3,668,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,846 UART: [rt]cmd =0x44504543, len=96
3,739,878 >>> mbox cmd response data (56 bytes)
3,739,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,974 UART: [rt]cmd =0x44504543, len=96
3,811,410 >>> mbox cmd response data (56 bytes)
3,811,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,496 UART: [rt]cmd =0x44504543, len=96
3,883,712 >>> mbox cmd response data (56 bytes)
3,883,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,626 UART: [rt]cmd =0x44504543, len=96
3,955,618 >>> mbox cmd response data (56 bytes)
3,955,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,985,510 UART: [rt]cmd =0x44504543, len=96
4,027,616 >>> mbox cmd response data (56 bytes)
4,027,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,724 UART: [rt]cmd =0x44504543, len=96
4,100,292 >>> mbox cmd response data (56 bytes)
4,100,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,306 UART: [rt]cmd =0x44504543, len=96
4,173,128 >>> mbox cmd response data (56 bytes)
4,173,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,203,196 UART: [rt]cmd =0x44504543, len=96
4,246,482 >>> mbox cmd response data (56 bytes)
4,246,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,276,246 UART: [rt]cmd =0x44504543, len=96
4,319,434 >>> mbox cmd response data (56 bytes)
4,319,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,349,302 UART: [rt]cmd =0x44504543, len=96
4,393,006 >>> mbox cmd response data (56 bytes)
4,393,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,422,694 UART: [rt]cmd =0x44504543, len=96
4,466,640 >>> mbox cmd response data (56 bytes)
4,466,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,496,562 UART: [rt]cmd =0x44504543, len=96
4,541,468 >>> mbox cmd response data (56 bytes)
4,541,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,571,538 UART: [rt]cmd =0x44504543, len=96
4,578,861 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,015 UART: [state] LifecycleState = Unprovisioned
86,670 UART: [state] DebugLocked = No
87,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,950 UART: [kat] SHA2-256
882,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,996 UART: [kat] ++
887,148 UART: [kat] sha1
891,364 UART: [kat] SHA2-256
893,302 UART: [kat] SHA2-384
896,287 UART: [kat] SHA2-512-ACC
898,188 UART: [kat] ECC-384
903,659 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,006 UART: [cold-reset] ++
1,477,500 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 ready_for_fw is high
1,481,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,954 UART: [ldev] ++
1,516,122 UART: [ldev] CDI.KEYID = 6
1,516,485 UART: [ldev] SUBJECT.KEYID = 5
1,516,911 UART: [ldev] AUTHORITY.KEYID = 7
1,517,374 UART: [ldev] FE.KEYID = 1
1,522,632 UART: [ldev] Erasing FE.KEYID = 1
1,547,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,901 UART: [ldev] --
1,587,320 UART: [fwproc] Waiting for Commands...
1,588,141 UART: [fwproc] Received command 0x46574c44
1,588,932 UART: [fwproc] Received Image of size 114332 bytes
2,887,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,650 >>> mbox cmd response: success
3,080,724 UART: [afmc] ++
3,080,892 UART: [afmc] CDI.KEYID = 6
3,081,254 UART: [afmc] SUBJECT.KEYID = 7
3,081,679 UART: [afmc] AUTHORITY.KEYID = 5
3,116,570 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,223 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,913 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,732 UART: [afmc] --
3,159,660 UART: [cold-reset] --
3,160,486 UART: [state] Locking Datavault
3,161,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,137 UART: [state] Locking ICCM
3,162,693 UART: [exit] Launching FMC @ 0x40000130
3,168,022 UART:
3,168,038 UART: Running Caliptra FMC ...
3,168,446 UART:
3,168,589 UART: [state] CFI Enabled
3,179,054 UART: [fht] FMC Alias Private Key: 7
3,286,729 UART: [art] Extend RT PCRs Done
3,287,157 UART: [art] Lock RT PCRs Done
3,288,641 UART: [art] Populate DV Done
3,296,604 UART: [fht] FMC Alias Private Key: 7
3,297,696 UART: [art] Derive CDI
3,297,976 UART: [art] Store in in slot 0x4
3,383,721 UART: [art] Derive Key Pair
3,384,081 UART: [art] Store priv key in slot 0x5
3,397,977 UART: [art] Derive Key Pair - Done
3,412,584 UART: [art] Signing Cert with AUTHO
3,413,064 UART: RITY.KEYID = 7
3,428,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,009 UART: [art] PUB.X = 3583C0C81DE5461C60D6BA0A4328D0810E8F29C976D0E116B7FC83C6C6C1EB70F913E314762D4B6B3BED1F04C7A10825
3,435,773 UART: [art] PUB.Y = BD8B052FD962FF50AE15EC2E756BFB081E288AA49DB85FFA42CE807D8ECCAA9BDDD46CFA5C9E53941B7ABC3C5E4B8F89
3,442,751 UART: [art] SIG.R = 08F8E6E3A02F510A3C2AB3E8623356BDD4A57420CA512E2B5DAF2C30ECDDAB47DD90DDF4077743548322BF669BD0AA75
3,449,528 UART: [art] SIG.S = 320B7C9C041BF121974133014C6F989752B54D5CB801C84293FA8C14213B9007D175F67ED2453D9FCC346485FD171BE0
3,473,504 UART: Caliptra RT
3,473,849 UART: [state] CFI Enabled
3,583,265 UART: [rt] RT listening for mailbox commands...
3,583,935 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,981 UART: [rt]cmd =0x44504543, len=40
3,640,198 >>> mbox cmd response data (40 bytes)
3,640,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,096 UART: [rt]cmd =0x44504543, len=96
3,710,193 >>> mbox cmd response data (56 bytes)
3,710,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,369 UART: [rt]cmd =0x44504543, len=96
3,781,585 >>> mbox cmd response data (56 bytes)
3,781,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,645 UART: [rt]cmd =0x44504543, len=96
3,852,801 >>> mbox cmd response data (56 bytes)
3,852,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,671 UART: [rt]cmd =0x44504543, len=96
3,923,379 >>> mbox cmd response data (56 bytes)
3,923,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,261 UART: [rt]cmd =0x44504543, len=96
3,995,005 >>> mbox cmd response data (56 bytes)
3,995,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,025,119 UART: [rt]cmd =0x44504543, len=96
4,067,013 >>> mbox cmd response data (56 bytes)
4,067,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,997 UART: [rt]cmd =0x44504543, len=96
4,139,293 >>> mbox cmd response data (56 bytes)
4,139,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,549 UART: [rt]cmd =0x44504543, len=96
4,212,697 >>> mbox cmd response data (56 bytes)
4,212,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,242,915 UART: [rt]cmd =0x44504543, len=96
4,285,843 >>> mbox cmd response data (56 bytes)
4,285,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,315,529 UART: [rt]cmd =0x44504543, len=96
4,358,393 >>> mbox cmd response data (56 bytes)
4,358,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,388,303 UART: [rt]cmd =0x44504543, len=96
4,431,947 >>> mbox cmd response data (56 bytes)
4,431,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,461,961 UART: [rt]cmd =0x44504543, len=96
4,505,929 >>> mbox cmd response data (56 bytes)
4,505,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,535,859 UART: [rt]cmd =0x44504543, len=96
4,579,775 >>> mbox cmd response data (56 bytes)
4,579,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,609,813 UART: [rt]cmd =0x44504543, len=96
4,654,127 >>> mbox cmd response data (56 bytes)
4,654,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,684,211 UART: [rt]cmd =0x44504543, len=96
4,728,405 >>> mbox cmd response data (56 bytes)
4,728,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,758,537 UART: [rt]cmd =0x44504543, len=96
4,765,796 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,906 ready_for_fw is high
1,362,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,023 >>> mbox cmd response: success
2,988,591 UART:
2,988,607 UART: Running Caliptra FMC ...
2,989,015 UART:
2,989,158 UART: [state] CFI Enabled
2,999,895 UART: [fht] FMC Alias Private Key: 7
3,107,838 UART: [art] Extend RT PCRs Done
3,108,266 UART: [art] Lock RT PCRs Done
3,109,950 UART: [art] Populate DV Done
3,117,969 UART: [fht] FMC Alias Private Key: 7
3,118,987 UART: [art] Derive CDI
3,119,267 UART: [art] Store in in slot 0x4
3,204,948 UART: [art] Derive Key Pair
3,205,308 UART: [art] Store priv key in slot 0x5
3,218,460 UART: [art] Derive Key Pair - Done
3,233,155 UART: [art] Signing Cert with AUTHO
3,233,635 UART: RITY.KEYID = 7
3,248,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,558 UART: [art] PUB.X = 797242C3C3C3EB702F7A31DB0C66D8D680C6E44CE262C54269471B2126E59B8B3325C7D7EB77A02E5DF1C263E4AE5AD3
3,256,333 UART: [art] PUB.Y = C78F83BACAB8CFE7DD6717636C9E9A45D2CE2160DB384DD57D84B179E0AC74F3E24B6CEA97FC62B0A2ECCB422D0B0E71
3,263,303 UART: [art] SIG.R = CD6519F14AF8845D1825A366EBAAE4E614FDE3DCB83C4CC98671C630EAB0C70EDDA8495415EF52477C90330806269B2A
3,270,074 UART: [art] SIG.S = B6ED695873E9CE74F0992FEBFB96C36F9464683333566E8A1B490476831B528FA375DE8F1E3CC9D00E4D9687053F845D
3,293,778 UART: Caliptra RT
3,294,123 UART: [state] CFI Enabled
3,401,243 UART: [rt] RT listening for mailbox commands...
3,401,913 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,203 UART: [rt]cmd =0x44504543, len=40
3,458,752 >>> mbox cmd response data (40 bytes)
3,458,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,732 UART: [rt]cmd =0x44504543, len=96
3,529,581 >>> mbox cmd response data (56 bytes)
3,529,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,679 UART: [rt]cmd =0x44504543, len=96
3,600,295 >>> mbox cmd response data (56 bytes)
3,600,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,059 UART: [rt]cmd =0x44504543, len=96
3,670,785 >>> mbox cmd response data (56 bytes)
3,670,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,571 UART: [rt]cmd =0x44504543, len=96
3,741,431 >>> mbox cmd response data (56 bytes)
3,741,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,425 UART: [rt]cmd =0x44504543, len=96
3,813,281 >>> mbox cmd response data (56 bytes)
3,813,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,263 UART: [rt]cmd =0x44504543, len=96
3,884,585 >>> mbox cmd response data (56 bytes)
3,884,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,701 UART: [rt]cmd =0x44504543, len=96
3,956,577 >>> mbox cmd response data (56 bytes)
3,956,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,423 UART: [rt]cmd =0x44504543, len=96
4,028,305 >>> mbox cmd response data (56 bytes)
4,028,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,211 UART: [rt]cmd =0x44504543, len=96
4,100,487 >>> mbox cmd response data (56 bytes)
4,100,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,163 UART: [rt]cmd =0x44504543, len=96
4,172,531 >>> mbox cmd response data (56 bytes)
4,172,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,202,527 UART: [rt]cmd =0x44504543, len=96
4,245,141 >>> mbox cmd response data (56 bytes)
4,245,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,249 UART: [rt]cmd =0x44504543, len=96
4,319,155 >>> mbox cmd response data (56 bytes)
4,319,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,349,303 UART: [rt]cmd =0x44504543, len=96
4,393,053 >>> mbox cmd response data (56 bytes)
4,393,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,422,781 UART: [rt]cmd =0x44504543, len=96
4,466,785 >>> mbox cmd response data (56 bytes)
4,466,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,496,767 UART: [rt]cmd =0x44504543, len=96
4,541,311 >>> mbox cmd response data (56 bytes)
4,541,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,571,291 UART: [rt]cmd =0x44504543, len=96
4,578,364 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
893,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,649 UART: [kat] ++
897,801 UART: [kat] sha1
901,991 UART: [kat] SHA2-256
903,931 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,380 UART: [kat] HMAC-384Kdf
923,122 UART: [kat] LMS
1,171,450 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,249 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,667 UART: [ldev] ++
1,210,835 UART: [ldev] CDI.KEYID = 6
1,211,198 UART: [ldev] SUBJECT.KEYID = 5
1,211,624 UART: [ldev] AUTHORITY.KEYID = 7
1,212,087 UART: [ldev] FE.KEYID = 1
1,217,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,102 UART: [fwproc] Wait for Commands...
1,283,734 UART: [fwproc] Recv command 0x46574c44
1,284,462 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,969 >>> mbox cmd response: success
2,776,183 UART: [afmc] ++
2,776,351 UART: [afmc] CDI.KEYID = 6
2,776,713 UART: [afmc] SUBJECT.KEYID = 7
2,777,138 UART: [afmc] AUTHORITY.KEYID = 5
2,812,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,952 UART: [afmc] --
2,855,844 UART: [cold-reset] --
2,856,810 UART: [state] Locking Datavault
2,857,857 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,461 UART: [state] Locking ICCM
2,859,079 UART: [exit] Launching FMC @ 0x40000130
2,864,408 UART:
2,864,424 UART: Running Caliptra FMC ...
2,864,832 UART:
2,864,886 UART: [state] CFI Enabled
2,875,299 UART: [fht] FMC Alias Private Key: 7
2,983,638 UART: [art] Extend RT PCRs Done
2,984,066 UART: [art] Lock RT PCRs Done
2,985,562 UART: [art] Populate DV Done
2,993,737 UART: [fht] FMC Alias Private Key: 7
2,994,799 UART: [art] Derive CDI
2,995,079 UART: [art] Store in in slot 0x4
3,080,870 UART: [art] Derive Key Pair
3,081,230 UART: [art] Store priv key in slot 0x5
3,094,806 UART: [art] Derive Key Pair - Done
3,109,484 UART: [art] Signing Cert with AUTHO
3,109,964 UART: RITY.KEYID = 7
3,125,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,881 UART: [art] PUB.X = 6F47140D78740A190177EAC017B838B4808FB80577BA48CF510C11EB40571192F83AF274C56566293631CDC043D92FC6
3,132,628 UART: [art] PUB.Y = D4332DD19616C525C06ED92D16C9A5F45083D40DCA3B6182A334321EAA9F5170678DFBD4B91299A16C0FC98353F88B20
3,139,574 UART: [art] SIG.R = E59DCEC71F6638F16A84DBD6D810AED4ED6AD8E3C2CC664E8CEB19F0A7AFF17AA83E3046576E85FB9CFE0D90FC3262CB
3,146,371 UART: [art] SIG.S = C534D1068081D0EF79361C6AE1B52A8D6EFC0829973A326F1426E5D7863769821DEED701F0038F31FA598BA942A90458
3,170,403 UART: Caliptra RT
3,170,656 UART: [state] CFI Enabled
3,277,512 UART: [rt] RT listening for mailbox commands...
3,278,182 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,168 UART: [rt]cmd =0x44504543, len=40
3,334,459 >>> mbox cmd response data (40 bytes)
3,334,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,297 UART: [rt]cmd =0x44504543, len=96
3,404,052 >>> mbox cmd response data (56 bytes)
3,404,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,712 UART: [rt]cmd =0x44504543, len=96
3,473,664 >>> mbox cmd response data (56 bytes)
3,473,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,704 UART: [rt]cmd =0x44504543, len=96
3,545,010 >>> mbox cmd response data (56 bytes)
3,545,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,090 UART: [rt]cmd =0x44504543, len=96
3,616,294 >>> mbox cmd response data (56 bytes)
3,616,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,136 UART: [rt]cmd =0x44504543, len=96
3,687,398 >>> mbox cmd response data (56 bytes)
3,687,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,382 UART: [rt]cmd =0x44504543, len=96
3,758,708 >>> mbox cmd response data (56 bytes)
3,758,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,592 UART: [rt]cmd =0x44504543, len=96
3,831,116 >>> mbox cmd response data (56 bytes)
3,831,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,086 UART: [rt]cmd =0x44504543, len=96
3,902,506 >>> mbox cmd response data (56 bytes)
3,902,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,532 UART: [rt]cmd =0x44504543, len=96
3,975,220 >>> mbox cmd response data (56 bytes)
3,975,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,128 UART: [rt]cmd =0x44504543, len=96
4,047,712 >>> mbox cmd response data (56 bytes)
4,047,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,712 UART: [rt]cmd =0x44504543, len=96
4,121,328 >>> mbox cmd response data (56 bytes)
4,121,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,232 UART: [rt]cmd =0x44504543, len=96
4,194,182 >>> mbox cmd response data (56 bytes)
4,194,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,372 UART: [rt]cmd =0x44504543, len=96
4,267,888 >>> mbox cmd response data (56 bytes)
4,267,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,297,890 UART: [rt]cmd =0x44504543, len=96
4,342,130 >>> mbox cmd response data (56 bytes)
4,342,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,940 UART: [rt]cmd =0x44504543, len=96
4,415,870 >>> mbox cmd response data (56 bytes)
4,415,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,445,934 UART: [rt]cmd =0x44504543, len=96
4,453,051 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,001 ready_for_fw is high
1,060,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,800 >>> mbox cmd response: success
2,688,748 UART:
2,688,764 UART: Running Caliptra FMC ...
2,689,172 UART:
2,689,226 UART: [state] CFI Enabled
2,699,909 UART: [fht] FMC Alias Private Key: 7
2,807,718 UART: [art] Extend RT PCRs Done
2,808,146 UART: [art] Lock RT PCRs Done
2,809,614 UART: [art] Populate DV Done
2,817,713 UART: [fht] FMC Alias Private Key: 7
2,818,877 UART: [art] Derive CDI
2,819,157 UART: [art] Store in in slot 0x4
2,904,702 UART: [art] Derive Key Pair
2,905,062 UART: [art] Store priv key in slot 0x5
2,918,282 UART: [art] Derive Key Pair - Done
2,932,894 UART: [art] Signing Cert with AUTHO
2,933,374 UART: RITY.KEYID = 7
2,948,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,467 UART: [art] PUB.X = 630774812D759853EC11C8C212C570995680032621133B4D9203287D78892D037FAB8D3B09C4FD398E820DB189C4AEDB
2,956,209 UART: [art] PUB.Y = F8EF80433C305A40F53F2E5946E788CD4E8BC2F1924010FA4F8ABB5917653B499B07035D5137531691F00711C1720D60
2,963,139 UART: [art] SIG.R = 826E80E748DC3BD0222179FCEEEF6FCFC137D5D9B3F8B3DF76DCC5B854ED2F39A2F4B49D9E56AFFC501D0F5B1D968441
2,969,930 UART: [art] SIG.S = 7DE73723DB94DFD5ED49ABEB59FC89EC27D85A0022EEDEC0CFC129CC8DCED2845A48202C4CE1BF22BE17060F8E6EA453
2,993,437 UART: Caliptra RT
2,993,690 UART: [state] CFI Enabled
3,101,851 UART: [rt] RT listening for mailbox commands...
3,102,521 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,531 UART: [rt]cmd =0x44504543, len=40
3,158,684 >>> mbox cmd response data (40 bytes)
3,158,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,784 UART: [rt]cmd =0x44504543, len=96
3,229,473 >>> mbox cmd response data (56 bytes)
3,229,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,515 UART: [rt]cmd =0x44504543, len=96
3,300,119 >>> mbox cmd response data (56 bytes)
3,300,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,241 UART: [rt]cmd =0x44504543, len=96
3,371,091 >>> mbox cmd response data (56 bytes)
3,371,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,919 UART: [rt]cmd =0x44504543, len=96
3,441,557 >>> mbox cmd response data (56 bytes)
3,441,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,601 UART: [rt]cmd =0x44504543, len=96
3,512,415 >>> mbox cmd response data (56 bytes)
3,512,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,401 UART: [rt]cmd =0x44504543, len=96
3,584,187 >>> mbox cmd response data (56 bytes)
3,584,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,003 UART: [rt]cmd =0x44504543, len=96
3,655,811 >>> mbox cmd response data (56 bytes)
3,655,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,811 UART: [rt]cmd =0x44504543, len=96
3,728,197 >>> mbox cmd response data (56 bytes)
3,728,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,089 UART: [rt]cmd =0x44504543, len=96
3,800,851 >>> mbox cmd response data (56 bytes)
3,800,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,867 UART: [rt]cmd =0x44504543, len=96
3,874,321 >>> mbox cmd response data (56 bytes)
3,874,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,904,273 UART: [rt]cmd =0x44504543, len=96
3,948,411 >>> mbox cmd response data (56 bytes)
3,948,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,435 UART: [rt]cmd =0x44504543, len=96
4,022,427 >>> mbox cmd response data (56 bytes)
4,022,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,052,405 UART: [rt]cmd =0x44504543, len=96
4,096,607 >>> mbox cmd response data (56 bytes)
4,096,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,681 UART: [rt]cmd =0x44504543, len=96
4,170,601 >>> mbox cmd response data (56 bytes)
4,170,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,200,489 UART: [rt]cmd =0x44504543, len=96
4,244,419 >>> mbox cmd response data (56 bytes)
4,244,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,274,331 UART: [rt]cmd =0x44504543, len=96
4,281,564 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,347 UART: [kat] LMS
1,171,675 UART: [kat] --
1,172,736 UART: [cold-reset] ++
1,173,258 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 ready_for_fw is high
1,177,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,375 UART: [idev] Erasing UDS.KEYID = 0
1,202,860 UART: [idev] Sha1 KeyId Algorithm
1,211,362 UART: [idev] --
1,212,334 UART: [ldev] ++
1,212,502 UART: [ldev] CDI.KEYID = 6
1,212,865 UART: [ldev] SUBJECT.KEYID = 5
1,213,291 UART: [ldev] AUTHORITY.KEYID = 7
1,213,754 UART: [ldev] FE.KEYID = 1
1,219,190 UART: [ldev] Erasing FE.KEYID = 1
1,246,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,036 UART: [ldev] --
1,285,409 UART: [fwproc] Wait for Commands...
1,286,063 UART: [fwproc] Recv command 0x46574c44
1,286,791 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,656 >>> mbox cmd response: success
2,777,878 UART: [afmc] ++
2,778,046 UART: [afmc] CDI.KEYID = 6
2,778,408 UART: [afmc] SUBJECT.KEYID = 7
2,778,833 UART: [afmc] AUTHORITY.KEYID = 5
2,814,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,969 UART: [afmc] --
2,857,869 UART: [cold-reset] --
2,858,855 UART: [state] Locking Datavault
2,859,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,598 UART: [state] Locking ICCM
2,861,036 UART: [exit] Launching FMC @ 0x40000130
2,866,365 UART:
2,866,381 UART: Running Caliptra FMC ...
2,866,789 UART:
2,866,932 UART: [state] CFI Enabled
2,877,349 UART: [fht] FMC Alias Private Key: 7
2,984,682 UART: [art] Extend RT PCRs Done
2,985,110 UART: [art] Lock RT PCRs Done
2,986,610 UART: [art] Populate DV Done
2,994,897 UART: [fht] FMC Alias Private Key: 7
2,995,841 UART: [art] Derive CDI
2,996,121 UART: [art] Store in in slot 0x4
3,081,744 UART: [art] Derive Key Pair
3,082,104 UART: [art] Store priv key in slot 0x5
3,095,560 UART: [art] Derive Key Pair - Done
3,110,292 UART: [art] Signing Cert with AUTHO
3,110,772 UART: RITY.KEYID = 7
3,126,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,979 UART: [art] PUB.X = 0DFAEFEF8F0E6F64D0C2071B62C424834080B3C5989DC3457CEEB2867D87A76AE2C5FBD2A2D5812C50C267ADA64A111B
3,133,756 UART: [art] PUB.Y = 06B5F82BCD430503ECB0AE8B039560CA3FB449A1210B718A2010AEE36B3FC7C7B41B01AF3E07BFFE72308B41765B5250
3,140,695 UART: [art] SIG.R = 7D97FD527494DAE1E795727E0CE96C08295AB265B030BB4876DCE852AA04C95CAF3AACE700FF5E06342C1219A41B5A88
3,147,441 UART: [art] SIG.S = 0E2268E48B28E9FFBCE691BEC22BE8138C602B10304DD1C5CEB4667EB085CC576D7A39E38AA13E52780973B59C9B706B
3,171,384 UART: Caliptra RT
3,171,729 UART: [state] CFI Enabled
3,279,118 UART: [rt] RT listening for mailbox commands...
3,279,788 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,640 UART: [rt]cmd =0x44504543, len=40
3,335,383 >>> mbox cmd response data (40 bytes)
3,335,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,521 UART: [rt]cmd =0x44504543, len=96
3,405,202 >>> mbox cmd response data (56 bytes)
3,405,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,136 UART: [rt]cmd =0x44504543, len=96
3,476,654 >>> mbox cmd response data (56 bytes)
3,476,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,588 UART: [rt]cmd =0x44504543, len=96
3,547,394 >>> mbox cmd response data (56 bytes)
3,547,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,372 UART: [rt]cmd =0x44504543, len=96
3,618,082 >>> mbox cmd response data (56 bytes)
3,618,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,904 UART: [rt]cmd =0x44504543, len=96
3,689,598 >>> mbox cmd response data (56 bytes)
3,689,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,719,460 UART: [rt]cmd =0x44504543, len=96
3,761,500 >>> mbox cmd response data (56 bytes)
3,761,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,498 UART: [rt]cmd =0x44504543, len=96
3,833,300 >>> mbox cmd response data (56 bytes)
3,833,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,544 UART: [rt]cmd =0x44504543, len=96
3,906,448 >>> mbox cmd response data (56 bytes)
3,906,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,252 UART: [rt]cmd =0x44504543, len=96
3,979,182 >>> mbox cmd response data (56 bytes)
3,979,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,266 UART: [rt]cmd =0x44504543, len=96
4,052,028 >>> mbox cmd response data (56 bytes)
4,052,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,166 UART: [rt]cmd =0x44504543, len=96
4,125,118 >>> mbox cmd response data (56 bytes)
4,125,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,158 UART: [rt]cmd =0x44504543, len=96
4,199,202 >>> mbox cmd response data (56 bytes)
4,199,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,018 UART: [rt]cmd =0x44504543, len=96
4,272,586 >>> mbox cmd response data (56 bytes)
4,272,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,302,526 UART: [rt]cmd =0x44504543, len=96
4,346,306 >>> mbox cmd response data (56 bytes)
4,346,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,250 UART: [rt]cmd =0x44504543, len=96
4,420,998 >>> mbox cmd response data (56 bytes)
4,420,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,451,074 UART: [rt]cmd =0x44504543, len=96
4,458,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,736 ready_for_fw is high
1,059,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,925 >>> mbox cmd response: success
2,690,477 UART:
2,690,493 UART: Running Caliptra FMC ...
2,690,901 UART:
2,691,044 UART: [state] CFI Enabled
2,701,609 UART: [fht] FMC Alias Private Key: 7
2,808,906 UART: [art] Extend RT PCRs Done
2,809,334 UART: [art] Lock RT PCRs Done
2,810,702 UART: [art] Populate DV Done
2,818,763 UART: [fht] FMC Alias Private Key: 7
2,819,715 UART: [art] Derive CDI
2,819,995 UART: [art] Store in in slot 0x4
2,905,560 UART: [art] Derive Key Pair
2,905,920 UART: [art] Store priv key in slot 0x5
2,919,104 UART: [art] Derive Key Pair - Done
2,934,128 UART: [art] Signing Cert with AUTHO
2,934,608 UART: RITY.KEYID = 7
2,949,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,363 UART: [art] PUB.X = 6F7351C3E22021A5933F7A174EF41EE92F95CFF2F507C6A80020881B5E36A4EB6417990375F42BFF3123F6B820D8AD15
2,957,105 UART: [art] PUB.Y = 4E0518C21A96754713D08105C6083C3BCAAB2C5CCF336F543302A551EB04F6C7C606B6D1D9BAAA925C92A988E28B7A0C
2,964,042 UART: [art] SIG.R = D680A60305A87EB825064498246CF681A3D43EC76C651C9972AC10FF74BFA8195188E3170CAC6D531BB20C3FF01EDED1
2,970,803 UART: [art] SIG.S = A67701A9ABDE8D1A1BD0901739CC4BF8CB444CAB134B4EDA2D44D22A12C63E19DEC56F4E1B6C651596CA737CC20BFE94
2,994,086 UART: Caliptra RT
2,994,431 UART: [state] CFI Enabled
3,101,683 UART: [rt] RT listening for mailbox commands...
3,102,353 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,563 UART: [rt]cmd =0x44504543, len=40
3,158,646 >>> mbox cmd response data (40 bytes)
3,158,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,718 UART: [rt]cmd =0x44504543, len=96
3,228,467 >>> mbox cmd response data (56 bytes)
3,228,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,265 UART: [rt]cmd =0x44504543, len=96
3,299,141 >>> mbox cmd response data (56 bytes)
3,299,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,945 UART: [rt]cmd =0x44504543, len=96
3,369,319 >>> mbox cmd response data (56 bytes)
3,369,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,217 UART: [rt]cmd =0x44504543, len=96
3,439,861 >>> mbox cmd response data (56 bytes)
3,439,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,995 UART: [rt]cmd =0x44504543, len=96
3,512,069 >>> mbox cmd response data (56 bytes)
3,512,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,999 UART: [rt]cmd =0x44504543, len=96
3,583,237 >>> mbox cmd response data (56 bytes)
3,583,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,289 UART: [rt]cmd =0x44504543, len=96
3,655,539 >>> mbox cmd response data (56 bytes)
3,655,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,347 UART: [rt]cmd =0x44504543, len=96
3,727,829 >>> mbox cmd response data (56 bytes)
3,727,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,033 UART: [rt]cmd =0x44504543, len=96
3,800,581 >>> mbox cmd response data (56 bytes)
3,800,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,615 UART: [rt]cmd =0x44504543, len=96
3,873,831 >>> mbox cmd response data (56 bytes)
3,873,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,807 UART: [rt]cmd =0x44504543, len=96
3,947,317 >>> mbox cmd response data (56 bytes)
3,947,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,977,137 UART: [rt]cmd =0x44504543, len=96
4,020,399 >>> mbox cmd response data (56 bytes)
4,020,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,325 UART: [rt]cmd =0x44504543, len=96
4,094,207 >>> mbox cmd response data (56 bytes)
4,094,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,433 UART: [rt]cmd =0x44504543, len=96
4,168,411 >>> mbox cmd response data (56 bytes)
4,168,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,283 UART: [rt]cmd =0x44504543, len=96
4,242,787 >>> mbox cmd response data (56 bytes)
4,242,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,827 UART: [rt]cmd =0x44504543, len=96
4,279,968 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,746 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,501 UART: [cold-reset] ++
1,169,905 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 ready_for_fw is high
1,173,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,313 UART: [idev] Sha1 KeyId Algorithm
1,207,209 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,013 UART: [fwproc] Recv command 0x46574c44
1,281,746 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,819 >>> mbox cmd response: success
2,770,954 UART: [afmc] ++
2,771,122 UART: [afmc] CDI.KEYID = 6
2,771,485 UART: [afmc] SUBJECT.KEYID = 7
2,771,911 UART: [afmc] AUTHORITY.KEYID = 5
2,807,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,813 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,542 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,425 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,144 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,185 UART: [afmc] --
2,851,315 UART: [cold-reset] --
2,852,031 UART: [state] Locking Datavault
2,853,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,088 UART: [state] Locking ICCM
2,854,594 UART: [exit] Launching FMC @ 0x40000130
2,859,923 UART:
2,859,939 UART: Running Caliptra FMC ...
2,860,347 UART:
2,860,401 UART: [state] CFI Enabled
2,870,884 UART: [fht] FMC Alias Private Key: 7
2,979,325 UART: [art] Extend RT PCRs Done
2,979,753 UART: [art] Lock RT PCRs Done
2,981,257 UART: [art] Populate DV Done
2,989,458 UART: [fht] FMC Alias Private Key: 7
2,990,442 UART: [art] Derive CDI
2,990,722 UART: [art] Store in in slot 0x4
3,076,557 UART: [art] Derive Key Pair
3,076,917 UART: [art] Store priv key in slot 0x5
3,089,927 UART: [art] Derive Key Pair - Done
3,105,055 UART: [art] Signing Cert with AUTHO
3,105,535 UART: RITY.KEYID = 7
3,120,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,250 UART: [art] PUB.X = 61EF2AE69EE4E36100E7857B4E1B65B028B2ABE28ACDF46F89B1390A161D96E53B3B48221687A8D252827186FE22D099
3,127,997 UART: [art] PUB.Y = FD80A17527887B4AE000D5F1BB4249E45F161F44219C77B793EFF66DA1E70C79F867467859C7247622E53B8CA0243EB4
3,134,920 UART: [art] SIG.R = FDBFA54E3BE1D9A898B5D89F61839E36006EA48C3C5DD6A166A5AE936C4B9F56DECFE87F3B2D54E2E314F94196B0CF7D
3,141,690 UART: [art] SIG.S = B36CBDEBEEB9A579F3AE2803A0C5DA5F6023D9E2FEAD272B7048012A2835C050779C72AB3631479C264F2D37C65675FC
3,164,947 UART: Caliptra RT
3,165,200 UART: [state] CFI Enabled
3,273,194 UART: [rt] RT listening for mailbox commands...
3,273,864 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,670 UART: [rt]cmd =0x44504543, len=40
3,329,631 >>> mbox cmd response data (40 bytes)
3,329,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,377 UART: [rt]cmd =0x44504543, len=96
3,399,410 >>> mbox cmd response data (56 bytes)
3,399,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,310 UART: [rt]cmd =0x44504543, len=96
3,469,290 >>> mbox cmd response data (56 bytes)
3,469,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,288 UART: [rt]cmd =0x44504543, len=96
3,540,632 >>> mbox cmd response data (56 bytes)
3,540,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,782 UART: [rt]cmd =0x44504543, len=96
3,611,552 >>> mbox cmd response data (56 bytes)
3,611,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,424 UART: [rt]cmd =0x44504543, len=96
3,682,814 >>> mbox cmd response data (56 bytes)
3,682,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,610 UART: [rt]cmd =0x44504543, len=96
3,754,060 >>> mbox cmd response data (56 bytes)
3,754,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,790 UART: [rt]cmd =0x44504543, len=96
3,825,630 >>> mbox cmd response data (56 bytes)
3,825,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,540 UART: [rt]cmd =0x44504543, len=96
3,897,294 >>> mbox cmd response data (56 bytes)
3,897,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,480 UART: [rt]cmd =0x44504543, len=96
3,969,976 >>> mbox cmd response data (56 bytes)
3,969,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,922 UART: [rt]cmd =0x44504543, len=96
4,043,056 >>> mbox cmd response data (56 bytes)
4,043,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,032 UART: [rt]cmd =0x44504543, len=96
4,116,062 >>> mbox cmd response data (56 bytes)
4,116,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,158 UART: [rt]cmd =0x44504543, len=96
4,189,600 >>> mbox cmd response data (56 bytes)
4,189,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,614 UART: [rt]cmd =0x44504543, len=96
4,263,042 >>> mbox cmd response data (56 bytes)
4,263,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,292,910 UART: [rt]cmd =0x44504543, len=96
4,337,728 >>> mbox cmd response data (56 bytes)
4,337,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,367,502 UART: [rt]cmd =0x44504543, len=96
4,411,918 >>> mbox cmd response data (56 bytes)
4,411,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,441,842 UART: [rt]cmd =0x44504543, len=96
4,449,123 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,756 ready_for_fw is high
1,056,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,781 >>> mbox cmd response: success
2,683,659 UART:
2,683,675 UART: Running Caliptra FMC ...
2,684,083 UART:
2,684,137 UART: [state] CFI Enabled
2,694,598 UART: [fht] FMC Alias Private Key: 7
2,802,789 UART: [art] Extend RT PCRs Done
2,803,217 UART: [art] Lock RT PCRs Done
2,804,907 UART: [art] Populate DV Done
2,813,114 UART: [fht] FMC Alias Private Key: 7
2,814,272 UART: [art] Derive CDI
2,814,552 UART: [art] Store in in slot 0x4
2,900,529 UART: [art] Derive Key Pair
2,900,889 UART: [art] Store priv key in slot 0x5
2,913,963 UART: [art] Derive Key Pair - Done
2,928,849 UART: [art] Signing Cert with AUTHO
2,929,329 UART: RITY.KEYID = 7
2,944,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,354 UART: [art] PUB.X = 38F8B908CCACF065F55A1F681BED410325F333422C04FFF06E90F86B67C8BBA77472633B67B4845537044C08856F5E10
2,952,107 UART: [art] PUB.Y = 8B1670A96A04F655D26F3E1FF283B88FB56E7C4CA3457A266C4C96AB1182F47847D42D82217A51619982E31DD5EF2400
2,959,030 UART: [art] SIG.R = 9511F12147E0DD62957596F31FE6C7A7604EF8DF615B07FD033C8F22A5D2CD8F06F197E2813A6DFE2CAA9F914E8BD0B9
2,965,803 UART: [art] SIG.S = 02A7AE1C70EBFABA994020FE1EEC3F68D4C91C40D3D78EDDAE55C2D1FBA227A352CB7D14192D3D01EF0AA6BF1D1F4D8F
2,989,233 UART: Caliptra RT
2,989,486 UART: [state] CFI Enabled
3,097,589 UART: [rt] RT listening for mailbox commands...
3,098,259 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,455 UART: [rt]cmd =0x44504543, len=40
3,154,668 >>> mbox cmd response data (40 bytes)
3,154,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,412 UART: [rt]cmd =0x44504543, len=96
3,224,499 >>> mbox cmd response data (56 bytes)
3,224,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,357 UART: [rt]cmd =0x44504543, len=96
3,294,445 >>> mbox cmd response data (56 bytes)
3,294,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,251 UART: [rt]cmd =0x44504543, len=96
3,364,477 >>> mbox cmd response data (56 bytes)
3,364,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,497 UART: [rt]cmd =0x44504543, len=96
3,435,947 >>> mbox cmd response data (56 bytes)
3,435,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,947 UART: [rt]cmd =0x44504543, len=96
3,507,011 >>> mbox cmd response data (56 bytes)
3,507,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,973 UART: [rt]cmd =0x44504543, len=96
3,578,663 >>> mbox cmd response data (56 bytes)
3,578,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,537 UART: [rt]cmd =0x44504543, len=96
3,650,399 >>> mbox cmd response data (56 bytes)
3,650,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,423 UART: [rt]cmd =0x44504543, len=96
3,723,337 >>> mbox cmd response data (56 bytes)
3,723,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,173 UART: [rt]cmd =0x44504543, len=96
3,795,039 >>> mbox cmd response data (56 bytes)
3,795,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,791 UART: [rt]cmd =0x44504543, len=96
3,866,915 >>> mbox cmd response data (56 bytes)
3,866,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,715 UART: [rt]cmd =0x44504543, len=96
3,940,235 >>> mbox cmd response data (56 bytes)
3,940,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,893 UART: [rt]cmd =0x44504543, len=96
4,012,617 >>> mbox cmd response data (56 bytes)
4,012,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,649 UART: [rt]cmd =0x44504543, len=96
4,085,969 >>> mbox cmd response data (56 bytes)
4,085,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,727 UART: [rt]cmd =0x44504543, len=96
4,160,533 >>> mbox cmd response data (56 bytes)
4,160,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,190,403 UART: [rt]cmd =0x44504543, len=96
4,234,873 >>> mbox cmd response data (56 bytes)
4,234,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,264,613 UART: [rt]cmd =0x44504543, len=96
4,271,822 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,485 UART: [kat] LMS
1,168,797 UART: [kat] --
1,169,366 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,340 UART: [idev] ++
1,172,508 UART: [idev] CDI.KEYID = 6
1,172,869 UART: [idev] SUBJECT.KEYID = 7
1,173,294 UART: [idev] UDS.KEYID = 0
1,173,640 ready_for_fw is high
1,173,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,212 UART: [idev] Erasing UDS.KEYID = 0
1,198,348 UART: [idev] Sha1 KeyId Algorithm
1,207,298 UART: [idev] --
1,208,531 UART: [ldev] ++
1,208,699 UART: [ldev] CDI.KEYID = 6
1,209,063 UART: [ldev] SUBJECT.KEYID = 5
1,209,490 UART: [ldev] AUTHORITY.KEYID = 7
1,209,953 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,581 UART: [ldev] --
1,280,927 UART: [fwproc] Wait for Commands...
1,281,708 UART: [fwproc] Recv command 0x46574c44
1,282,441 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,436 >>> mbox cmd response: success
2,773,645 UART: [afmc] ++
2,773,813 UART: [afmc] CDI.KEYID = 6
2,774,176 UART: [afmc] SUBJECT.KEYID = 7
2,774,602 UART: [afmc] AUTHORITY.KEYID = 5
2,810,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,132 UART: [afmc] --
2,854,142 UART: [cold-reset] --
2,854,812 UART: [state] Locking Datavault
2,855,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,583 UART: [state] Locking ICCM
2,857,209 UART: [exit] Launching FMC @ 0x40000130
2,862,538 UART:
2,862,554 UART: Running Caliptra FMC ...
2,862,962 UART:
2,863,105 UART: [state] CFI Enabled
2,873,468 UART: [fht] FMC Alias Private Key: 7
2,981,387 UART: [art] Extend RT PCRs Done
2,981,815 UART: [art] Lock RT PCRs Done
2,983,455 UART: [art] Populate DV Done
2,991,750 UART: [fht] FMC Alias Private Key: 7
2,992,724 UART: [art] Derive CDI
2,993,004 UART: [art] Store in in slot 0x4
3,078,453 UART: [art] Derive Key Pair
3,078,813 UART: [art] Store priv key in slot 0x5
3,091,891 UART: [art] Derive Key Pair - Done
3,106,557 UART: [art] Signing Cert with AUTHO
3,107,037 UART: RITY.KEYID = 7
3,122,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,024 UART: [art] PUB.X = 71A3FF3BE2222F273C5FBC5564096C8CCD7C734DD83D2BF809AF902CC3077A3F25D6CC0CEF5382CAEEB6830A6E4B4EB2
3,129,801 UART: [art] PUB.Y = 2390C7FA2BDD6FFBFBACF3BF0A1F91BEA5825822202352787001D46E0E8D214BF723C1DC04D6C1D48ACFF93DF56D5046
3,136,757 UART: [art] SIG.R = 5D0988B8580A3210D6291055D2DF276DCC89BDD2DC3293A98FE24630E35387468A963E41C169828761783FC63B56CE88
3,143,513 UART: [art] SIG.S = 35893CFD59D494FF591D345AC9E68976DA90122CD5F0E0B5A161DE560FA691F530EEDDA32F3533BF355F3D3A8704BD25
3,166,992 UART: Caliptra RT
3,167,337 UART: [state] CFI Enabled
3,274,808 UART: [rt] RT listening for mailbox commands...
3,275,478 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,414 UART: [rt]cmd =0x44504543, len=40
3,331,499 >>> mbox cmd response data (40 bytes)
3,331,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,229 UART: [rt]cmd =0x44504543, len=96
3,401,376 >>> mbox cmd response data (56 bytes)
3,401,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,548 UART: [rt]cmd =0x44504543, len=96
3,472,106 >>> mbox cmd response data (56 bytes)
3,472,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,108 UART: [rt]cmd =0x44504543, len=96
3,542,408 >>> mbox cmd response data (56 bytes)
3,542,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,316 UART: [rt]cmd =0x44504543, len=96
3,613,600 >>> mbox cmd response data (56 bytes)
3,613,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,570 UART: [rt]cmd =0x44504543, len=96
3,684,586 >>> mbox cmd response data (56 bytes)
3,684,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,562 UART: [rt]cmd =0x44504543, len=96
3,756,528 >>> mbox cmd response data (56 bytes)
3,756,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,338 UART: [rt]cmd =0x44504543, len=96
3,828,910 >>> mbox cmd response data (56 bytes)
3,828,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,806 UART: [rt]cmd =0x44504543, len=96
3,900,970 >>> mbox cmd response data (56 bytes)
3,900,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,874 UART: [rt]cmd =0x44504543, len=96
3,973,912 >>> mbox cmd response data (56 bytes)
3,973,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,150 UART: [rt]cmd =0x44504543, len=96
4,046,654 >>> mbox cmd response data (56 bytes)
4,046,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,592 UART: [rt]cmd =0x44504543, len=96
4,120,310 >>> mbox cmd response data (56 bytes)
4,120,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,150,232 UART: [rt]cmd =0x44504543, len=96
4,193,798 >>> mbox cmd response data (56 bytes)
4,193,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,806 UART: [rt]cmd =0x44504543, len=96
4,267,986 >>> mbox cmd response data (56 bytes)
4,267,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,297,950 UART: [rt]cmd =0x44504543, len=96
4,342,038 >>> mbox cmd response data (56 bytes)
4,342,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,100 UART: [rt]cmd =0x44504543, len=96
4,416,988 >>> mbox cmd response data (56 bytes)
4,416,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,014 UART: [rt]cmd =0x44504543, len=96
4,454,199 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,679 ready_for_fw is high
1,056,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,450 >>> mbox cmd response: success
2,684,798 UART:
2,684,814 UART: Running Caliptra FMC ...
2,685,222 UART:
2,685,365 UART: [state] CFI Enabled
2,695,918 UART: [fht] FMC Alias Private Key: 7
2,804,335 UART: [art] Extend RT PCRs Done
2,804,763 UART: [art] Lock RT PCRs Done
2,806,491 UART: [art] Populate DV Done
2,814,896 UART: [fht] FMC Alias Private Key: 7
2,816,024 UART: [art] Derive CDI
2,816,304 UART: [art] Store in in slot 0x4
2,902,299 UART: [art] Derive Key Pair
2,902,659 UART: [art] Store priv key in slot 0x5
2,915,373 UART: [art] Derive Key Pair - Done
2,930,182 UART: [art] Signing Cert with AUTHO
2,930,662 UART: RITY.KEYID = 7
2,945,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,749 UART: [art] PUB.X = 4FC1393281D0D1B515A78ADAD5C8E010669A8FBCDB7012FA65AD1F4DF85A3CE11861BBFE3782FDF507FEE4E23A049995
2,953,531 UART: [art] PUB.Y = A1CE08EDD1AB487F342D4FA06A95CC99FFE69CE41ABE7DE7F5518EF39751D63142605AEE69793C8F79FFD675A5AA985F
2,960,498 UART: [art] SIG.R = CDF5F8425AFB86FD1FB6554AB4B257F1BE8883DD459DEC656ABACB6997A613DC9564E7C60EE20435B4DDD6C63C56548E
2,967,282 UART: [art] SIG.S = 0FF4B70AD7398E7AE6C690952FA5DD9D26C837C9CB7AD97070C78A287AA14DB74058C174958C048941CFBD3F411A5633
2,991,050 UART: Caliptra RT
2,991,395 UART: [state] CFI Enabled
3,099,648 UART: [rt] RT listening for mailbox commands...
3,100,318 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,314 UART: [rt]cmd =0x44504543, len=40
3,156,321 >>> mbox cmd response data (40 bytes)
3,156,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,357 UART: [rt]cmd =0x44504543, len=96
3,227,122 >>> mbox cmd response data (56 bytes)
3,227,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,102 UART: [rt]cmd =0x44504543, len=96
3,297,656 >>> mbox cmd response data (56 bytes)
3,297,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,704 UART: [rt]cmd =0x44504543, len=96
3,368,106 >>> mbox cmd response data (56 bytes)
3,368,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,952 UART: [rt]cmd =0x44504543, len=96
3,438,906 >>> mbox cmd response data (56 bytes)
3,438,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,070 UART: [rt]cmd =0x44504543, len=96
3,510,766 >>> mbox cmd response data (56 bytes)
3,510,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,826 UART: [rt]cmd =0x44504543, len=96
3,582,312 >>> mbox cmd response data (56 bytes)
3,582,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,320 UART: [rt]cmd =0x44504543, len=96
3,654,152 >>> mbox cmd response data (56 bytes)
3,654,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,074 UART: [rt]cmd =0x44504543, len=96
3,726,418 >>> mbox cmd response data (56 bytes)
3,726,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,340 UART: [rt]cmd =0x44504543, len=96
3,799,122 >>> mbox cmd response data (56 bytes)
3,799,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,936 UART: [rt]cmd =0x44504543, len=96
3,872,138 >>> mbox cmd response data (56 bytes)
3,872,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,901,892 UART: [rt]cmd =0x44504543, len=96
3,945,306 >>> mbox cmd response data (56 bytes)
3,945,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,230 UART: [rt]cmd =0x44504543, len=96
4,018,442 >>> mbox cmd response data (56 bytes)
4,018,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,380 UART: [rt]cmd =0x44504543, len=96
4,092,058 >>> mbox cmd response data (56 bytes)
4,092,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,122,304 UART: [rt]cmd =0x44504543, len=96
4,166,642 >>> mbox cmd response data (56 bytes)
4,166,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,652 UART: [rt]cmd =0x44504543, len=96
4,242,152 >>> mbox cmd response data (56 bytes)
4,242,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,954 UART: [rt]cmd =0x44504543, len=96
4,279,495 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,404 UART: [kat] SHA2-512-ACC
897,305 UART: [kat] ECC-384
902,808 UART: [kat] HMAC-384Kdf
907,312 UART: [kat] LMS
1,475,508 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,732 UART: [idev] ++
1,479,900 UART: [idev] CDI.KEYID = 6
1,480,260 UART: [idev] SUBJECT.KEYID = 7
1,480,684 UART: [idev] UDS.KEYID = 0
1,481,029 ready_for_fw is high
1,481,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,402 UART: [idev] Erasing UDS.KEYID = 0
1,504,794 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,200 UART: [idev] --
1,514,357 UART: [ldev] ++
1,514,525 UART: [ldev] CDI.KEYID = 6
1,514,888 UART: [ldev] SUBJECT.KEYID = 5
1,515,314 UART: [ldev] AUTHORITY.KEYID = 7
1,515,777 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,546,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,933 UART: [fwproc] Waiting for Commands...
1,586,588 UART: [fwproc] Received command 0x46574c44
1,587,379 UART: [fwproc] Received Image of size 114332 bytes
2,884,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,608 >>> mbox cmd response: success
3,078,710 UART: [afmc] ++
3,078,878 UART: [afmc] CDI.KEYID = 6
3,079,240 UART: [afmc] SUBJECT.KEYID = 7
3,079,665 UART: [afmc] AUTHORITY.KEYID = 5
3,115,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,257 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,947 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,810 UART: [afmc] --
3,158,882 UART: [cold-reset] --
3,159,870 UART: [state] Locking Datavault
3,161,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,665 UART: [state] Locking ICCM
3,162,251 UART: [exit] Launching FMC @ 0x40000130
3,167,580 UART:
3,167,596 UART: Running Caliptra FMC ...
3,168,004 UART:
3,168,058 UART: [state] CFI Enabled
3,178,363 UART: [fht] FMC Alias Private Key: 7
3,285,668 UART: [art] Extend RT PCRs Done
3,286,096 UART: [art] Lock RT PCRs Done
3,287,722 UART: [art] Populate DV Done
3,296,279 UART: [fht] FMC Alias Private Key: 7
3,297,239 UART: [art] Derive CDI
3,297,519 UART: [art] Store in in slot 0x4
3,383,022 UART: [art] Derive Key Pair
3,383,382 UART: [art] Store priv key in slot 0x5
3,396,562 UART: [art] Derive Key Pair - Done
3,411,381 UART: [art] Signing Cert with AUTHO
3,411,861 UART: RITY.KEYID = 7
3,426,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,642 UART: [art] PUB.X = 173F69A311E4EFD88487FADD852E7CF86FC7BB2AEA67C83A182E648F40B837DF47C7728A237B86CFCDAFF8F0886D8938
3,434,428 UART: [art] PUB.Y = 770043D87B22A75D33C30E1B331370CD9E5FBC6D7D9A9ED466C57F493F5D75428958A011D99EBBF5B24425FEFABDFE8D
3,441,367 UART: [art] SIG.R = 83D6EA5264DDEED43F08CED7EF63A9984E651CB6B09589F10314FE22F72B9136DD74253F3038E87B682C6F59AEC0058B
3,448,136 UART: [art] SIG.S = 60EE3CCC367578C89B6E516A8E8CCDF50B2ECE13A72A0FCCF78A5FDCBE1E38D1846474207E42606DC7B31FB8F7018F72
3,472,470 UART: Caliptra RT
3,472,723 UART: [state] CFI Enabled
3,581,910 UART: [rt] RT listening for mailbox commands...
3,582,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,790 UART: [rt]cmd =0x44504543, len=24
3,638,826 >>> mbox cmd response data (40 bytes)
3,638,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,378 UART: [rt]cmd =0x44504543, len=24
3,694,710 >>> mbox cmd response data (40 bytes)
3,694,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,724,228 UART: [rt]cmd =0x44504543, len=24
3,750,288 >>> mbox cmd response data (40 bytes)
3,750,289 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,614 UART: [rt]cmd =0x44504543, len=24
3,806,026 >>> mbox cmd response data (40 bytes)
3,806,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,426 UART: [rt]cmd =0x44504543, len=24
3,861,926 >>> mbox cmd response data (40 bytes)
3,861,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,408 UART: [rt]cmd =0x44504543, len=24
3,918,256 >>> mbox cmd response data (40 bytes)
3,918,257 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,848 UART: [rt]cmd =0x44504543, len=24
3,974,052 >>> mbox cmd response data (40 bytes)
3,974,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,374 UART: [rt]cmd =0x44504543, len=24
4,029,246 >>> mbox cmd response data (40 bytes)
4,029,247 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,786 UART: [rt]cmd =0x44504543, len=24
4,085,248 >>> mbox cmd response data (40 bytes)
4,085,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,776 UART: [rt]cmd =0x44504543, len=24
4,141,482 >>> mbox cmd response data (40 bytes)
4,141,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,144 UART: [rt]cmd =0x44504543, len=24
4,197,242 >>> mbox cmd response data (40 bytes)
4,197,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,862 UART: [rt]cmd =0x44504543, len=24
4,253,210 >>> mbox cmd response data (40 bytes)
4,253,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,282,642 UART: [rt]cmd =0x44504543, len=24
4,309,334 >>> mbox cmd response data (40 bytes)
4,309,335 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,892 UART: [rt]cmd =0x44504543, len=24
4,365,222 >>> mbox cmd response data (40 bytes)
4,365,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,394,604 UART: [rt]cmd =0x44504543, len=24
4,420,740 >>> mbox cmd response data (40 bytes)
4,420,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,450,170 UART: [rt]cmd =0x44504543, len=24
4,457,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,709 ready_for_fw is high
1,362,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,050 >>> mbox cmd response: success
2,988,866 UART:
2,988,882 UART: Running Caliptra FMC ...
2,989,290 UART:
2,989,344 UART: [state] CFI Enabled
2,999,499 UART: [fht] FMC Alias Private Key: 7
3,107,134 UART: [art] Extend RT PCRs Done
3,107,562 UART: [art] Lock RT PCRs Done
3,109,256 UART: [art] Populate DV Done
3,117,437 UART: [fht] FMC Alias Private Key: 7
3,118,535 UART: [art] Derive CDI
3,118,815 UART: [art] Store in in slot 0x4
3,204,574 UART: [art] Derive Key Pair
3,204,934 UART: [art] Store priv key in slot 0x5
3,217,420 UART: [art] Derive Key Pair - Done
3,232,301 UART: [art] Signing Cert with AUTHO
3,232,781 UART: RITY.KEYID = 7
3,248,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,770 UART: [art] PUB.X = ECE8BFEB093FA7956B3C5C1F403408A087BB6A4B35A822ABDA57BFE1A2E86B0C4E2B1D6487ED36DD95560ABE08CFAF31
3,255,551 UART: [art] PUB.Y = 901858EC0D9736F1D222F8CD683CC95C767194412FB2673A9240D08F1438FA6017F072475A3B74E932923B23032AC8F0
3,262,485 UART: [art] SIG.R = 226D0B8420D5780F4C21CBC0B89EDB175F63F4CD27AF0204ACF0776FA23602409897C418037ED26DB7562E1161810A30
3,269,232 UART: [art] SIG.S = 496665022C80E8B829CAB8DCDE6CDEF5884AF9264849CD246715BAA2B008ED3E7638A49A95C4930FD18DDA31153D3510
3,292,426 UART: Caliptra RT
3,292,679 UART: [state] CFI Enabled
3,400,249 UART: [rt] RT listening for mailbox commands...
3,400,919 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,015 UART: [rt]cmd =0x44504543, len=24
3,456,447 >>> mbox cmd response data (40 bytes)
3,456,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,873 UART: [rt]cmd =0x44504543, len=24
3,512,059 >>> mbox cmd response data (40 bytes)
3,512,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,717 UART: [rt]cmd =0x44504543, len=24
3,567,719 >>> mbox cmd response data (40 bytes)
3,567,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,433 UART: [rt]cmd =0x44504543, len=24
3,623,473 >>> mbox cmd response data (40 bytes)
3,623,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,677 UART: [rt]cmd =0x44504543, len=24
3,679,103 >>> mbox cmd response data (40 bytes)
3,679,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,721 UART: [rt]cmd =0x44504543, len=24
3,734,763 >>> mbox cmd response data (40 bytes)
3,734,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,153 UART: [rt]cmd =0x44504543, len=24
3,790,525 >>> mbox cmd response data (40 bytes)
3,790,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,167 UART: [rt]cmd =0x44504543, len=24
3,846,297 >>> mbox cmd response data (40 bytes)
3,846,298 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,497 UART: [rt]cmd =0x44504543, len=24
3,901,687 >>> mbox cmd response data (40 bytes)
3,901,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,215 UART: [rt]cmd =0x44504543, len=24
3,957,617 >>> mbox cmd response data (40 bytes)
3,957,618 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,985 UART: [rt]cmd =0x44504543, len=24
4,013,671 >>> mbox cmd response data (40 bytes)
4,013,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,225 UART: [rt]cmd =0x44504543, len=24
4,069,231 >>> mbox cmd response data (40 bytes)
4,069,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,397 UART: [rt]cmd =0x44504543, len=24
4,124,243 >>> mbox cmd response data (40 bytes)
4,124,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,669 UART: [rt]cmd =0x44504543, len=24
4,180,229 >>> mbox cmd response data (40 bytes)
4,180,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,209,709 UART: [rt]cmd =0x44504543, len=24
4,235,837 >>> mbox cmd response data (40 bytes)
4,235,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,389 UART: [rt]cmd =0x44504543, len=24
4,273,033 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,465 UART: [kat] LMS
1,475,661 UART: [kat] --
1,476,742 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,057 UART: [idev] ++
1,480,225 UART: [idev] CDI.KEYID = 6
1,480,585 UART: [idev] SUBJECT.KEYID = 7
1,481,009 UART: [idev] UDS.KEYID = 0
1,481,354 ready_for_fw is high
1,481,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,505,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,555 UART: [idev] --
1,515,758 UART: [ldev] ++
1,515,926 UART: [ldev] CDI.KEYID = 6
1,516,289 UART: [ldev] SUBJECT.KEYID = 5
1,516,715 UART: [ldev] AUTHORITY.KEYID = 7
1,517,178 UART: [ldev] FE.KEYID = 1
1,522,452 UART: [ldev] Erasing FE.KEYID = 1
1,547,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,647 UART: [ldev] --
1,587,072 UART: [fwproc] Waiting for Commands...
1,587,751 UART: [fwproc] Received command 0x46574c44
1,588,542 UART: [fwproc] Received Image of size 114332 bytes
2,886,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,179 >>> mbox cmd response: success
3,080,265 UART: [afmc] ++
3,080,433 UART: [afmc] CDI.KEYID = 6
3,080,795 UART: [afmc] SUBJECT.KEYID = 7
3,081,220 UART: [afmc] AUTHORITY.KEYID = 5
3,116,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,252 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,942 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,011 UART: [afmc] --
3,160,045 UART: [cold-reset] --
3,160,863 UART: [state] Locking Datavault
3,161,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,572 UART: [state] Locking ICCM
3,163,106 UART: [exit] Launching FMC @ 0x40000130
3,168,435 UART:
3,168,451 UART: Running Caliptra FMC ...
3,168,859 UART:
3,169,002 UART: [state] CFI Enabled
3,179,893 UART: [fht] FMC Alias Private Key: 7
3,287,328 UART: [art] Extend RT PCRs Done
3,287,756 UART: [art] Lock RT PCRs Done
3,289,316 UART: [art] Populate DV Done
3,297,555 UART: [fht] FMC Alias Private Key: 7
3,298,685 UART: [art] Derive CDI
3,298,965 UART: [art] Store in in slot 0x4
3,384,430 UART: [art] Derive Key Pair
3,384,790 UART: [art] Store priv key in slot 0x5
3,398,378 UART: [art] Derive Key Pair - Done
3,413,489 UART: [art] Signing Cert with AUTHO
3,413,969 UART: RITY.KEYID = 7
3,428,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,332 UART: [art] PUB.X = F8A33F2BB43838C8DC70E3B3F2CC82CA3F8F8AA969ED65F2FC6E9FDC1AB77CB95B5A31E952DBFA0084CF6CE51C80CFFE
3,436,114 UART: [art] PUB.Y = 9E4A45676811BBECC36142687FBBCEC001573458B35966F3F676ACA497F7537F1D362AC9B6A818F583D7F6C22B8DCE3A
3,443,069 UART: [art] SIG.R = 892958949AA86F3F93EB3A45CBA62A26F91A0A1452B59C705290432B3E12F56FF99FBFDAF22640263D474E84427EF293
3,449,836 UART: [art] SIG.S = F282516746842FDA4C7C14F199750D74F7ED51598E690723144E1E9AC6A5638378B151464C898E62423A4F8871FF86DF
3,473,423 UART: Caliptra RT
3,473,768 UART: [state] CFI Enabled
3,581,306 UART: [rt] RT listening for mailbox commands...
3,581,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,638 UART: [rt]cmd =0x44504543, len=24
3,637,966 >>> mbox cmd response data (40 bytes)
3,637,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,570 UART: [rt]cmd =0x44504543, len=24
3,693,602 >>> mbox cmd response data (40 bytes)
3,693,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,723,034 UART: [rt]cmd =0x44504543, len=24
3,748,892 >>> mbox cmd response data (40 bytes)
3,748,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,418 UART: [rt]cmd =0x44504543, len=24
3,804,482 >>> mbox cmd response data (40 bytes)
3,804,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,920 UART: [rt]cmd =0x44504543, len=24
3,860,170 >>> mbox cmd response data (40 bytes)
3,860,171 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,590 UART: [rt]cmd =0x44504543, len=24
3,915,912 >>> mbox cmd response data (40 bytes)
3,915,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,366 UART: [rt]cmd =0x44504543, len=24
3,971,426 >>> mbox cmd response data (40 bytes)
3,971,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,778 UART: [rt]cmd =0x44504543, len=24
4,027,042 >>> mbox cmd response data (40 bytes)
4,027,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,508 UART: [rt]cmd =0x44504543, len=24
4,082,500 >>> mbox cmd response data (40 bytes)
4,082,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,004 UART: [rt]cmd =0x44504543, len=24
4,138,312 >>> mbox cmd response data (40 bytes)
4,138,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,136 UART: [rt]cmd =0x44504543, len=24
4,194,026 >>> mbox cmd response data (40 bytes)
4,194,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,674 UART: [rt]cmd =0x44504543, len=24
4,249,878 >>> mbox cmd response data (40 bytes)
4,249,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,204 UART: [rt]cmd =0x44504543, len=24
4,305,272 >>> mbox cmd response data (40 bytes)
4,305,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,918 UART: [rt]cmd =0x44504543, len=24
4,361,234 >>> mbox cmd response data (40 bytes)
4,361,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,390,690 UART: [rt]cmd =0x44504543, len=24
4,417,268 >>> mbox cmd response data (40 bytes)
4,417,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,446,824 UART: [rt]cmd =0x44504543, len=24
4,454,030 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,961 >>> mbox cmd response: success
2,990,845 UART:
2,990,861 UART: Running Caliptra FMC ...
2,991,269 UART:
2,991,412 UART: [state] CFI Enabled
3,001,997 UART: [fht] FMC Alias Private Key: 7
3,109,772 UART: [art] Extend RT PCRs Done
3,110,200 UART: [art] Lock RT PCRs Done
3,111,706 UART: [art] Populate DV Done
3,119,961 UART: [fht] FMC Alias Private Key: 7
3,120,931 UART: [art] Derive CDI
3,121,211 UART: [art] Store in in slot 0x4
3,206,994 UART: [art] Derive Key Pair
3,207,354 UART: [art] Store priv key in slot 0x5
3,220,702 UART: [art] Derive Key Pair - Done
3,235,478 UART: [art] Signing Cert with AUTHO
3,235,958 UART: RITY.KEYID = 7
3,251,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,187 UART: [art] PUB.X = 30D79D02C5FF572CFBEBDB8EB66A61BD1885E961FB1275393A3B9F149F8B6724239DA19ED74ADFC9C4C45B610BABA770
3,258,969 UART: [art] PUB.Y = 7950F3C004E49E019BAF285656CEBF65A55619268A485CEC228BC86E9629FEE4B72F7FAA5328CE69D85660B8877923BA
3,265,917 UART: [art] SIG.R = 342856973A012449679D43F01D355F20CF98222AFB4E5131E7B56B3F3CEF22E5CE4856E0147337F16E3E0A0A283169FA
3,272,674 UART: [art] SIG.S = 2A6B4963F5AA7A5790BF9EEDBDC76A9BCBE89C518654FBC13AB3EB7EE16FCF858CE4EB6932C333E4456AEA376F3E4464
3,296,889 UART: Caliptra RT
3,297,234 UART: [state] CFI Enabled
3,406,062 UART: [rt] RT listening for mailbox commands...
3,406,732 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,472 UART: [rt]cmd =0x44504543, len=24
3,462,906 >>> mbox cmd response data (40 bytes)
3,462,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,484 UART: [rt]cmd =0x44504543, len=24
3,518,268 >>> mbox cmd response data (40 bytes)
3,518,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,870 UART: [rt]cmd =0x44504543, len=24
3,574,670 >>> mbox cmd response data (40 bytes)
3,574,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,408 UART: [rt]cmd =0x44504543, len=24
3,630,554 >>> mbox cmd response data (40 bytes)
3,630,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,138 UART: [rt]cmd =0x44504543, len=24
3,686,906 >>> mbox cmd response data (40 bytes)
3,686,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,436 UART: [rt]cmd =0x44504543, len=24
3,742,522 >>> mbox cmd response data (40 bytes)
3,742,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,906 UART: [rt]cmd =0x44504543, len=24
3,798,354 >>> mbox cmd response data (40 bytes)
3,798,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,752 UART: [rt]cmd =0x44504543, len=24
3,854,086 >>> mbox cmd response data (40 bytes)
3,854,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,378 UART: [rt]cmd =0x44504543, len=24
3,910,066 >>> mbox cmd response data (40 bytes)
3,910,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,724 UART: [rt]cmd =0x44504543, len=24
3,966,416 >>> mbox cmd response data (40 bytes)
3,966,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,872 UART: [rt]cmd =0x44504543, len=24
4,022,436 >>> mbox cmd response data (40 bytes)
4,022,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,052,050 UART: [rt]cmd =0x44504543, len=24
4,078,784 >>> mbox cmd response data (40 bytes)
4,078,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,108,120 UART: [rt]cmd =0x44504543, len=24
4,134,122 >>> mbox cmd response data (40 bytes)
4,134,123 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,650 UART: [rt]cmd =0x44504543, len=24
4,190,338 >>> mbox cmd response data (40 bytes)
4,190,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,932 UART: [rt]cmd =0x44504543, len=24
4,246,328 >>> mbox cmd response data (40 bytes)
4,246,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,714 UART: [rt]cmd =0x44504543, len=24
4,282,980 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
892,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,121 UART: [kat] ++
897,273 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,044 UART: [kat] SHA2-512-ACC
907,945 UART: [kat] ECC-384
917,784 UART: [kat] HMAC-384Kdf
922,266 UART: [kat] LMS
1,170,594 UART: [kat] --
1,171,487 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 ready_for_fw is high
1,175,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,034 UART: [idev] Erasing UDS.KEYID = 0
1,200,699 UART: [idev] Sha1 KeyId Algorithm
1,209,287 UART: [idev] --
1,210,339 UART: [ldev] ++
1,210,507 UART: [ldev] CDI.KEYID = 6
1,210,870 UART: [ldev] SUBJECT.KEYID = 5
1,211,296 UART: [ldev] AUTHORITY.KEYID = 7
1,211,759 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,306 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,121 >>> mbox cmd response: success
2,775,303 UART: [afmc] ++
2,775,471 UART: [afmc] CDI.KEYID = 6
2,775,833 UART: [afmc] SUBJECT.KEYID = 7
2,776,258 UART: [afmc] AUTHORITY.KEYID = 5
2,811,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,657 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,300 UART: [afmc] --
2,855,226 UART: [cold-reset] --
2,856,226 UART: [state] Locking Datavault
2,857,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,065 UART: [state] Locking ICCM
2,858,565 UART: [exit] Launching FMC @ 0x40000130
2,863,894 UART:
2,863,910 UART: Running Caliptra FMC ...
2,864,318 UART:
2,864,372 UART: [state] CFI Enabled
2,874,721 UART: [fht] FMC Alias Private Key: 7
2,982,134 UART: [art] Extend RT PCRs Done
2,982,562 UART: [art] Lock RT PCRs Done
2,984,436 UART: [art] Populate DV Done
2,992,563 UART: [fht] FMC Alias Private Key: 7
2,993,503 UART: [art] Derive CDI
2,993,783 UART: [art] Store in in slot 0x4
3,079,314 UART: [art] Derive Key Pair
3,079,674 UART: [art] Store priv key in slot 0x5
3,092,804 UART: [art] Derive Key Pair - Done
3,107,604 UART: [art] Signing Cert with AUTHO
3,108,084 UART: RITY.KEYID = 7
3,123,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,983 UART: [art] PUB.X = E3B41B455DE4D091A8B64C5BF8BE30F1EF590E6807D8702E1ACB4C8B44B365E1DBAF64BEAD295F59D581CC134047AE2E
3,130,767 UART: [art] PUB.Y = 7503034C1E40686AE1B0865688EF0B2001997245A79BA7D1CDAE8599C8A42D37FF8705121A0CF61BD2CAC7422061CCD2
3,137,701 UART: [art] SIG.R = B8C43BE4EB0989A03A3E3C5BE61DAB598085C78CDE6D0702C2E4D0A1A0CFE8EA6D149494B8996247A1FEF610C83FAA53
3,144,480 UART: [art] SIG.S = 411E192D538550CC10A48D23ED15B40F28973223C46B8139F4DE2DA8EAD812477F43F1DE9880D4F97483992AD3D39695
3,168,098 UART: Caliptra RT
3,168,351 UART: [state] CFI Enabled
3,276,144 UART: [rt] RT listening for mailbox commands...
3,276,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,662 UART: [rt]cmd =0x44504543, len=24
3,333,066 >>> mbox cmd response data (40 bytes)
3,333,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,804 UART: [rt]cmd =0x44504543, len=24
3,388,444 >>> mbox cmd response data (40 bytes)
3,388,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,772 UART: [rt]cmd =0x44504543, len=24
3,443,958 >>> mbox cmd response data (40 bytes)
3,443,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,474 UART: [rt]cmd =0x44504543, len=24
3,499,526 >>> mbox cmd response data (40 bytes)
3,499,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,936 UART: [rt]cmd =0x44504543, len=24
3,555,240 >>> mbox cmd response data (40 bytes)
3,555,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,684 UART: [rt]cmd =0x44504543, len=24
3,610,562 >>> mbox cmd response data (40 bytes)
3,610,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,034 UART: [rt]cmd =0x44504543, len=24
3,666,662 >>> mbox cmd response data (40 bytes)
3,666,663 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,856 UART: [rt]cmd =0x44504543, len=24
3,721,840 >>> mbox cmd response data (40 bytes)
3,721,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,416 UART: [rt]cmd =0x44504543, len=24
3,777,746 >>> mbox cmd response data (40 bytes)
3,777,747 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,366 UART: [rt]cmd =0x44504543, len=24
3,833,544 >>> mbox cmd response data (40 bytes)
3,833,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,144 UART: [rt]cmd =0x44504543, len=24
3,889,526 >>> mbox cmd response data (40 bytes)
3,889,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,182 UART: [rt]cmd =0x44504543, len=24
3,945,460 >>> mbox cmd response data (40 bytes)
3,945,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,162 UART: [rt]cmd =0x44504543, len=24
4,001,464 >>> mbox cmd response data (40 bytes)
4,001,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,020 UART: [rt]cmd =0x44504543, len=24
4,056,528 >>> mbox cmd response data (40 bytes)
4,056,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,730 UART: [rt]cmd =0x44504543, len=24
4,111,946 >>> mbox cmd response data (40 bytes)
4,111,947 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,406 UART: [rt]cmd =0x44504543, len=24
4,148,458 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 ready_for_fw is high
1,060,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,848 >>> mbox cmd response: success
2,687,320 UART:
2,687,336 UART: Running Caliptra FMC ...
2,687,744 UART:
2,687,798 UART: [state] CFI Enabled
2,698,405 UART: [fht] FMC Alias Private Key: 7
2,806,562 UART: [art] Extend RT PCRs Done
2,806,990 UART: [art] Lock RT PCRs Done
2,808,346 UART: [art] Populate DV Done
2,816,599 UART: [fht] FMC Alias Private Key: 7
2,817,633 UART: [art] Derive CDI
2,817,913 UART: [art] Store in in slot 0x4
2,903,534 UART: [art] Derive Key Pair
2,903,894 UART: [art] Store priv key in slot 0x5
2,917,166 UART: [art] Derive Key Pair - Done
2,931,688 UART: [art] Signing Cert with AUTHO
2,932,168 UART: RITY.KEYID = 7
2,947,270 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,035 UART: [art] PUB.X = 32A38D93C3D024C4602CE1D962CC51713C07D047C915152FBF3E9439C015DC75AB6677781268E1A586F066B4F38972E5
2,954,796 UART: [art] PUB.Y = 3A75C735BB0F9EA19613ECD3B3374F2EA02D00E37FE54558517381A7BD08E293EBD6A476564FDA576BA094D3362F517A
2,961,724 UART: [art] SIG.R = 00E888DFF6815986DA503649B8219EC6C394AB936D4FF403D0B1CEF6B2A8751A59E199E9DEAFD1219597D1DBB30DA64C
2,968,478 UART: [art] SIG.S = 4E08275F148A8A8ED70785D29FED6FACB655E3C671B9C81B63BF49C95BF188A11806B6902E2277EC0785E26B94858C7E
2,992,617 UART: Caliptra RT
2,992,870 UART: [state] CFI Enabled
3,100,204 UART: [rt] RT listening for mailbox commands...
3,100,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,002 UART: [rt]cmd =0x44504543, len=24
3,156,988 >>> mbox cmd response data (40 bytes)
3,156,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,536 UART: [rt]cmd =0x44504543, len=24
3,213,454 >>> mbox cmd response data (40 bytes)
3,213,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,242,908 UART: [rt]cmd =0x44504543, len=24
3,268,984 >>> mbox cmd response data (40 bytes)
3,268,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,592 UART: [rt]cmd =0x44504543, len=24
3,324,758 >>> mbox cmd response data (40 bytes)
3,324,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,428 UART: [rt]cmd =0x44504543, len=24
3,380,664 >>> mbox cmd response data (40 bytes)
3,380,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,272 UART: [rt]cmd =0x44504543, len=24
3,436,446 >>> mbox cmd response data (40 bytes)
3,436,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,764 UART: [rt]cmd =0x44504543, len=24
3,492,328 >>> mbox cmd response data (40 bytes)
3,492,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,750 UART: [rt]cmd =0x44504543, len=24
3,547,906 >>> mbox cmd response data (40 bytes)
3,547,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,176 UART: [rt]cmd =0x44504543, len=24
3,603,210 >>> mbox cmd response data (40 bytes)
3,603,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,776 UART: [rt]cmd =0x44504543, len=24
3,658,760 >>> mbox cmd response data (40 bytes)
3,658,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,250 UART: [rt]cmd =0x44504543, len=24
3,714,718 >>> mbox cmd response data (40 bytes)
3,714,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,190 UART: [rt]cmd =0x44504543, len=24
3,770,274 >>> mbox cmd response data (40 bytes)
3,770,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,816 UART: [rt]cmd =0x44504543, len=24
3,825,714 >>> mbox cmd response data (40 bytes)
3,825,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,454 UART: [rt]cmd =0x44504543, len=24
3,881,544 >>> mbox cmd response data (40 bytes)
3,881,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,082 UART: [rt]cmd =0x44504543, len=24
3,937,452 >>> mbox cmd response data (40 bytes)
3,937,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,794 UART: [rt]cmd =0x44504543, len=24
3,974,372 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,497 UART: [kat] LMS
1,171,825 UART: [kat] --
1,172,946 UART: [cold-reset] ++
1,173,386 UART: [fht] FHT @ 0x50003400
1,175,807 UART: [idev] ++
1,175,975 UART: [idev] CDI.KEYID = 6
1,176,335 UART: [idev] SUBJECT.KEYID = 7
1,176,759 UART: [idev] UDS.KEYID = 0
1,177,104 ready_for_fw is high
1,177,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,973 UART: [idev] Erasing UDS.KEYID = 0
1,201,722 UART: [idev] Sha1 KeyId Algorithm
1,210,130 UART: [idev] --
1,211,316 UART: [ldev] ++
1,211,484 UART: [ldev] CDI.KEYID = 6
1,211,847 UART: [ldev] SUBJECT.KEYID = 5
1,212,273 UART: [ldev] AUTHORITY.KEYID = 7
1,212,736 UART: [ldev] FE.KEYID = 1
1,218,004 UART: [ldev] Erasing FE.KEYID = 1
1,244,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,912 UART: [ldev] --
1,283,403 UART: [fwproc] Wait for Commands...
1,284,065 UART: [fwproc] Recv command 0x46574c44
1,284,793 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,394 >>> mbox cmd response: success
2,776,630 UART: [afmc] ++
2,776,798 UART: [afmc] CDI.KEYID = 6
2,777,160 UART: [afmc] SUBJECT.KEYID = 7
2,777,585 UART: [afmc] AUTHORITY.KEYID = 5
2,813,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,505 UART: [afmc] --
2,856,459 UART: [cold-reset] --
2,857,195 UART: [state] Locking Datavault
2,858,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,794 UART: [state] Locking ICCM
2,859,466 UART: [exit] Launching FMC @ 0x40000130
2,864,795 UART:
2,864,811 UART: Running Caliptra FMC ...
2,865,219 UART:
2,865,362 UART: [state] CFI Enabled
2,875,655 UART: [fht] FMC Alias Private Key: 7
2,983,686 UART: [art] Extend RT PCRs Done
2,984,114 UART: [art] Lock RT PCRs Done
2,985,634 UART: [art] Populate DV Done
2,994,075 UART: [fht] FMC Alias Private Key: 7
2,995,111 UART: [art] Derive CDI
2,995,391 UART: [art] Store in in slot 0x4
3,081,380 UART: [art] Derive Key Pair
3,081,740 UART: [art] Store priv key in slot 0x5
3,095,216 UART: [art] Derive Key Pair - Done
3,109,935 UART: [art] Signing Cert with AUTHO
3,110,415 UART: RITY.KEYID = 7
3,126,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,832 UART: [art] PUB.X = 8CAFE0998E888A6BC218F0335E23CCE7EDA9E57E7876E0036F45299F9D603D1B2E1A33C592E8391D374D0C14F640CCCB
3,133,606 UART: [art] PUB.Y = E9E55680BADA03FE5A47C47FE6609331CD2B091A99D7D42E7A49E28BAED9ADEFD82E7D5A58B622FFBBABB09F737528C0
3,140,574 UART: [art] SIG.R = 4BA873B9FE322324C5AF7D6CCE626E0937535F18E529F0AA0A7344490C06F552BE40BB7CF1AF55A92DB498653621E814
3,147,336 UART: [art] SIG.S = 54D528728C8E9C3EDF0E35F1BDC9063F805B9AA7EBDB7383359A06A09FC7339E7CA8BB76AC1759B0AA5A8074A9ABB67A
3,171,226 UART: Caliptra RT
3,171,571 UART: [state] CFI Enabled
3,279,290 UART: [rt] RT listening for mailbox commands...
3,279,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,792 UART: [rt]cmd =0x44504543, len=24
3,335,778 >>> mbox cmd response data (40 bytes)
3,335,779 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,312 UART: [rt]cmd =0x44504543, len=24
3,391,164 >>> mbox cmd response data (40 bytes)
3,391,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,790 UART: [rt]cmd =0x44504543, len=24
3,446,886 >>> mbox cmd response data (40 bytes)
3,446,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,508 UART: [rt]cmd =0x44504543, len=24
3,502,600 >>> mbox cmd response data (40 bytes)
3,502,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,328 UART: [rt]cmd =0x44504543, len=24
3,557,950 >>> mbox cmd response data (40 bytes)
3,557,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,528 UART: [rt]cmd =0x44504543, len=24
3,613,518 >>> mbox cmd response data (40 bytes)
3,613,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,154 UART: [rt]cmd =0x44504543, len=24
3,669,302 >>> mbox cmd response data (40 bytes)
3,669,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,934 UART: [rt]cmd =0x44504543, len=24
3,725,370 >>> mbox cmd response data (40 bytes)
3,725,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,714 UART: [rt]cmd =0x44504543, len=24
3,781,286 >>> mbox cmd response data (40 bytes)
3,781,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,796 UART: [rt]cmd =0x44504543, len=24
3,837,286 >>> mbox cmd response data (40 bytes)
3,837,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,066 UART: [rt]cmd =0x44504543, len=24
3,894,006 >>> mbox cmd response data (40 bytes)
3,894,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,302 UART: [rt]cmd =0x44504543, len=24
3,949,476 >>> mbox cmd response data (40 bytes)
3,949,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,026 UART: [rt]cmd =0x44504543, len=24
4,005,290 >>> mbox cmd response data (40 bytes)
4,005,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,720 UART: [rt]cmd =0x44504543, len=24
4,061,108 >>> mbox cmd response data (40 bytes)
4,061,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,534 UART: [rt]cmd =0x44504543, len=24
4,117,002 >>> mbox cmd response data (40 bytes)
4,117,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,402 UART: [rt]cmd =0x44504543, len=24
4,153,468 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,298 ready_for_fw is high
1,061,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,779 >>> mbox cmd response: success
2,690,029 UART:
2,690,045 UART: Running Caliptra FMC ...
2,690,453 UART:
2,690,596 UART: [state] CFI Enabled
2,701,991 UART: [fht] FMC Alias Private Key: 7
2,809,344 UART: [art] Extend RT PCRs Done
2,809,772 UART: [art] Lock RT PCRs Done
2,811,296 UART: [art] Populate DV Done
2,819,491 UART: [fht] FMC Alias Private Key: 7
2,820,453 UART: [art] Derive CDI
2,820,733 UART: [art] Store in in slot 0x4
2,906,564 UART: [art] Derive Key Pair
2,906,924 UART: [art] Store priv key in slot 0x5
2,920,374 UART: [art] Derive Key Pair - Done
2,934,985 UART: [art] Signing Cert with AUTHO
2,935,465 UART: RITY.KEYID = 7
2,950,547 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,312 UART: [art] PUB.X = 8AF8B6C7CAE69E334775B0DCA1F039085811F7B8BDA0769B13AED15831DC13675A54E2C2A05C1ED905D30B5AB2EFD0B8
2,958,089 UART: [art] PUB.Y = 89BABB5F690942A4036F629C32E6975678EDE6B95C8BD1D699D1C6834A2E6626A648E05362DDA48C99E2BA9E2DE939B4
2,965,039 UART: [art] SIG.R = 23F1A17CDD83BF91F887CDD601654AA80834C67E28FE455066C0C1677333528547D5880BBF0768BF471DB0DD600E4EEB
2,971,798 UART: [art] SIG.S = 3BF14B3C1796C482EAE07A1F7E9D3A0433A18D02D2424BDCED0683FB11A799C420B91FD63B14CE3643BD0AC017E25329
2,995,597 UART: Caliptra RT
2,995,942 UART: [state] CFI Enabled
3,104,505 UART: [rt] RT listening for mailbox commands...
3,105,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,305 UART: [rt]cmd =0x44504543, len=24
3,161,661 >>> mbox cmd response data (40 bytes)
3,161,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,327 UART: [rt]cmd =0x44504543, len=24
3,216,965 >>> mbox cmd response data (40 bytes)
3,216,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,597 UART: [rt]cmd =0x44504543, len=24
3,272,511 >>> mbox cmd response data (40 bytes)
3,272,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,141 UART: [rt]cmd =0x44504543, len=24
3,328,217 >>> mbox cmd response data (40 bytes)
3,328,218 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,639 UART: [rt]cmd =0x44504543, len=24
3,384,031 >>> mbox cmd response data (40 bytes)
3,384,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,659 UART: [rt]cmd =0x44504543, len=24
3,439,421 >>> mbox cmd response data (40 bytes)
3,439,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,797 UART: [rt]cmd =0x44504543, len=24
3,495,535 >>> mbox cmd response data (40 bytes)
3,495,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,133 UART: [rt]cmd =0x44504543, len=24
3,551,537 >>> mbox cmd response data (40 bytes)
3,551,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,149 UART: [rt]cmd =0x44504543, len=24
3,607,139 >>> mbox cmd response data (40 bytes)
3,607,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,523 UART: [rt]cmd =0x44504543, len=24
3,662,655 >>> mbox cmd response data (40 bytes)
3,662,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,957 UART: [rt]cmd =0x44504543, len=24
3,718,129 >>> mbox cmd response data (40 bytes)
3,718,130 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,643 UART: [rt]cmd =0x44504543, len=24
3,774,115 >>> mbox cmd response data (40 bytes)
3,774,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,505 UART: [rt]cmd =0x44504543, len=24
3,830,199 >>> mbox cmd response data (40 bytes)
3,830,200 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,535 UART: [rt]cmd =0x44504543, len=24
3,885,557 >>> mbox cmd response data (40 bytes)
3,885,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,949 UART: [rt]cmd =0x44504543, len=24
3,940,679 >>> mbox cmd response data (40 bytes)
3,940,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,205 UART: [rt]cmd =0x44504543, len=24
3,977,021 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,124 UART: [kat] LMS
1,168,436 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,170,097 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,530 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,587 UART: [fwproc] Recv command 0x46574c44
1,282,320 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,609 >>> mbox cmd response: success
2,773,712 UART: [afmc] ++
2,773,880 UART: [afmc] CDI.KEYID = 6
2,774,243 UART: [afmc] SUBJECT.KEYID = 7
2,774,669 UART: [afmc] AUTHORITY.KEYID = 5
2,810,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,357 UART: [afmc] --
2,853,315 UART: [cold-reset] --
2,854,209 UART: [state] Locking Datavault
2,855,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,864 UART: [state] Locking ICCM
2,856,460 UART: [exit] Launching FMC @ 0x40000130
2,861,789 UART:
2,861,805 UART: Running Caliptra FMC ...
2,862,213 UART:
2,862,267 UART: [state] CFI Enabled
2,872,830 UART: [fht] FMC Alias Private Key: 7
2,980,559 UART: [art] Extend RT PCRs Done
2,980,987 UART: [art] Lock RT PCRs Done
2,982,709 UART: [art] Populate DV Done
2,990,796 UART: [fht] FMC Alias Private Key: 7
2,991,820 UART: [art] Derive CDI
2,992,100 UART: [art] Store in in slot 0x4
3,078,021 UART: [art] Derive Key Pair
3,078,381 UART: [art] Store priv key in slot 0x5
3,091,759 UART: [art] Derive Key Pair - Done
3,106,293 UART: [art] Signing Cert with AUTHO
3,106,773 UART: RITY.KEYID = 7
3,122,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,848 UART: [art] PUB.X = 2DB36130AE22B7C6D49589DF8144411D7B7119AD53FC7F0E1FDB1739EE42A097657075E8F3BAEC918B1A1246F7C3C956
3,129,621 UART: [art] PUB.Y = 1A9DFA590E38C619808E84F1CEF35C28B62552028A2BC6F49B5BF8599E08BE2CDDDF9CA193E83B02E3BB984DE89EE0C9
3,136,577 UART: [art] SIG.R = 44B1105382F8315C95B7C5ED0EFC218112BD1BB359BCF271614238E8521FE17C8681E8F9277AC272EDD5E25C414EA7B9
3,143,348 UART: [art] SIG.S = ED528FEC4B24428FB41A8501ED855343D40FBA55B5314C49B4DED76619D445F1CD32462632DD2164CC5DFE7B60AF02D7
3,167,584 UART: Caliptra RT
3,167,837 UART: [state] CFI Enabled
3,275,686 UART: [rt] RT listening for mailbox commands...
3,276,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,492 UART: [rt]cmd =0x44504543, len=24
3,332,796 >>> mbox cmd response data (40 bytes)
3,332,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,186 UART: [rt]cmd =0x44504543, len=24
3,389,190 >>> mbox cmd response data (40 bytes)
3,389,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,698 UART: [rt]cmd =0x44504543, len=24
3,445,540 >>> mbox cmd response data (40 bytes)
3,445,541 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,050 UART: [rt]cmd =0x44504543, len=24
3,501,062 >>> mbox cmd response data (40 bytes)
3,501,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,578 UART: [rt]cmd =0x44504543, len=24
3,556,570 >>> mbox cmd response data (40 bytes)
3,556,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,028 UART: [rt]cmd =0x44504543, len=24
3,612,408 >>> mbox cmd response data (40 bytes)
3,612,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,148 UART: [rt]cmd =0x44504543, len=24
3,668,254 >>> mbox cmd response data (40 bytes)
3,668,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,642 UART: [rt]cmd =0x44504543, len=24
3,723,514 >>> mbox cmd response data (40 bytes)
3,723,515 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,798 UART: [rt]cmd =0x44504543, len=24
3,779,504 >>> mbox cmd response data (40 bytes)
3,779,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,870 UART: [rt]cmd =0x44504543, len=24
3,834,812 >>> mbox cmd response data (40 bytes)
3,834,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,340 UART: [rt]cmd =0x44504543, len=24
3,890,592 >>> mbox cmd response data (40 bytes)
3,890,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,150 UART: [rt]cmd =0x44504543, len=24
3,947,006 >>> mbox cmd response data (40 bytes)
3,947,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,446 UART: [rt]cmd =0x44504543, len=24
4,002,728 >>> mbox cmd response data (40 bytes)
4,002,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,234 UART: [rt]cmd =0x44504543, len=24
4,058,500 >>> mbox cmd response data (40 bytes)
4,058,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,952 UART: [rt]cmd =0x44504543, len=24
4,114,006 >>> mbox cmd response data (40 bytes)
4,114,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,448 UART: [rt]cmd =0x44504543, len=24
4,150,738 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,614 ready_for_fw is high
1,056,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,399 >>> mbox cmd response: success
2,685,869 UART:
2,685,885 UART: Running Caliptra FMC ...
2,686,293 UART:
2,686,347 UART: [state] CFI Enabled
2,696,502 UART: [fht] FMC Alias Private Key: 7
2,804,699 UART: [art] Extend RT PCRs Done
2,805,127 UART: [art] Lock RT PCRs Done
2,806,771 UART: [art] Populate DV Done
2,814,884 UART: [fht] FMC Alias Private Key: 7
2,816,014 UART: [art] Derive CDI
2,816,294 UART: [art] Store in in slot 0x4
2,901,765 UART: [art] Derive Key Pair
2,902,125 UART: [art] Store priv key in slot 0x5
2,915,113 UART: [art] Derive Key Pair - Done
2,929,765 UART: [art] Signing Cert with AUTHO
2,930,245 UART: RITY.KEYID = 7
2,945,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,322 UART: [art] PUB.X = 4A122465FA288FC1BBE623DDF089F32A1CF2D035600D38E88E5CA74EC72E9F677A946273C436DAC423BEBDF78E0610C7
2,953,098 UART: [art] PUB.Y = D82C7496EF937868C7A7E6DD0C62685E1C3D7AFED228D04CA467D95600BD46907422184820A755787399CD886E7BDA76
2,960,021 UART: [art] SIG.R = BF10450E954B049DECC8D6B9570493FF9E4B994DC9B82D54482F8F1ABA80B1F838E52A1748E1351F01EBC84C919B3ED7
2,966,789 UART: [art] SIG.S = DD603C2E2BAC3BEB5F23E3C315C9EC8170FF2028B59EB24E4942BA442F5F5561D6A0BBE9E76594365726EB0670A93C69
2,990,209 UART: Caliptra RT
2,990,462 UART: [state] CFI Enabled
3,098,432 UART: [rt] RT listening for mailbox commands...
3,099,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,104 UART: [rt]cmd =0x44504543, len=24
3,155,330 >>> mbox cmd response data (40 bytes)
3,155,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,708 UART: [rt]cmd =0x44504543, len=24
3,210,508 >>> mbox cmd response data (40 bytes)
3,210,509 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,240,056 UART: [rt]cmd =0x44504543, len=24
3,266,660 >>> mbox cmd response data (40 bytes)
3,266,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,128 UART: [rt]cmd =0x44504543, len=24
3,322,376 >>> mbox cmd response data (40 bytes)
3,322,377 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,004 UART: [rt]cmd =0x44504543, len=24
3,378,454 >>> mbox cmd response data (40 bytes)
3,378,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,994 UART: [rt]cmd =0x44504543, len=24
3,434,080 >>> mbox cmd response data (40 bytes)
3,434,081 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,476 UART: [rt]cmd =0x44504543, len=24
3,489,642 >>> mbox cmd response data (40 bytes)
3,489,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,000 UART: [rt]cmd =0x44504543, len=24
3,545,200 >>> mbox cmd response data (40 bytes)
3,545,201 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,950 UART: [rt]cmd =0x44504543, len=24
3,601,166 >>> mbox cmd response data (40 bytes)
3,601,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,790 UART: [rt]cmd =0x44504543, len=24
3,657,188 >>> mbox cmd response data (40 bytes)
3,657,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,530 UART: [rt]cmd =0x44504543, len=24
3,713,242 >>> mbox cmd response data (40 bytes)
3,713,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,818 UART: [rt]cmd =0x44504543, len=24
3,769,460 >>> mbox cmd response data (40 bytes)
3,769,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,072 UART: [rt]cmd =0x44504543, len=24
3,824,832 >>> mbox cmd response data (40 bytes)
3,824,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,234 UART: [rt]cmd =0x44504543, len=24
3,880,632 >>> mbox cmd response data (40 bytes)
3,880,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,400 UART: [rt]cmd =0x44504543, len=24
3,937,146 >>> mbox cmd response data (40 bytes)
3,937,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,758 UART: [rt]cmd =0x44504543, len=24
3,973,914 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,198 UART: [state] WD Timer not started. Device not locked for debugging
88,545 UART: [kat] SHA2-256
892,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,224 UART: [kat] ++
896,376 UART: [kat] sha1
900,570 UART: [kat] SHA2-256
902,510 UART: [kat] SHA2-384
905,077 UART: [kat] SHA2-512-ACC
906,978 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,174,852 ready_for_fw is high
1,174,852 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,296 UART: [fwproc] Recv command 0x46574c44
1,284,029 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,942 >>> mbox cmd response: success
2,773,991 UART: [afmc] ++
2,774,159 UART: [afmc] CDI.KEYID = 6
2,774,522 UART: [afmc] SUBJECT.KEYID = 7
2,774,948 UART: [afmc] AUTHORITY.KEYID = 5
2,809,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,360 UART: [afmc] --
2,853,240 UART: [cold-reset] --
2,854,096 UART: [state] Locking Datavault
2,855,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,885 UART: [state] Locking ICCM
2,856,523 UART: [exit] Launching FMC @ 0x40000130
2,861,852 UART:
2,861,868 UART: Running Caliptra FMC ...
2,862,276 UART:
2,862,419 UART: [state] CFI Enabled
2,873,106 UART: [fht] FMC Alias Private Key: 7
2,980,291 UART: [art] Extend RT PCRs Done
2,980,719 UART: [art] Lock RT PCRs Done
2,982,331 UART: [art] Populate DV Done
2,990,548 UART: [fht] FMC Alias Private Key: 7
2,991,674 UART: [art] Derive CDI
2,991,954 UART: [art] Store in in slot 0x4
3,077,687 UART: [art] Derive Key Pair
3,078,047 UART: [art] Store priv key in slot 0x5
3,091,141 UART: [art] Derive Key Pair - Done
3,106,182 UART: [art] Signing Cert with AUTHO
3,106,662 UART: RITY.KEYID = 7
3,121,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,309 UART: [art] PUB.X = 2657952D332D6661DADE7CF45C3D52DF6276D933DB45A1FAC427F7E5B6D26D54A89A97591F37B616BF8FA7BB9422DB7A
3,129,091 UART: [art] PUB.Y = A84DD63455F8335CE9CE9E3DB6AD85846F60CB74EB4BE9CB1B592BA1421E2F27592AD00615F43865ECA5C7E1814B2B41
3,136,050 UART: [art] SIG.R = 3CAC1146B03A06C50B77EA3FD815FBAC29D18A97D1416B19E2F5CAEA526C003F69CF9DAEEA4D5E1EF3565EAD3923E4C9
3,142,816 UART: [art] SIG.S = 382F0537BB11023014F1B037C2B83624B074B4CD0731BF8B86EAB7424A612D9160C9FFFC2E2B1F9A51B860E9282324D7
3,166,684 UART: Caliptra RT
3,167,029 UART: [state] CFI Enabled
3,275,044 UART: [rt] RT listening for mailbox commands...
3,275,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,754 UART: [rt]cmd =0x44504543, len=24
3,331,896 >>> mbox cmd response data (40 bytes)
3,331,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,262 UART: [rt]cmd =0x44504543, len=24
3,387,686 >>> mbox cmd response data (40 bytes)
3,387,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,048 UART: [rt]cmd =0x44504543, len=24
3,443,048 >>> mbox cmd response data (40 bytes)
3,443,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,728 UART: [rt]cmd =0x44504543, len=24
3,498,664 >>> mbox cmd response data (40 bytes)
3,498,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,244 UART: [rt]cmd =0x44504543, len=24
3,555,204 >>> mbox cmd response data (40 bytes)
3,555,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,670 UART: [rt]cmd =0x44504543, len=24
3,611,634 >>> mbox cmd response data (40 bytes)
3,611,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,198 UART: [rt]cmd =0x44504543, len=24
3,667,310 >>> mbox cmd response data (40 bytes)
3,667,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,778 UART: [rt]cmd =0x44504543, len=24
3,722,890 >>> mbox cmd response data (40 bytes)
3,722,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,048 UART: [rt]cmd =0x44504543, len=24
3,778,266 >>> mbox cmd response data (40 bytes)
3,778,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,722 UART: [rt]cmd =0x44504543, len=24
3,834,426 >>> mbox cmd response data (40 bytes)
3,834,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,920 UART: [rt]cmd =0x44504543, len=24
3,890,386 >>> mbox cmd response data (40 bytes)
3,890,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,832 UART: [rt]cmd =0x44504543, len=24
3,946,254 >>> mbox cmd response data (40 bytes)
3,946,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,578 UART: [rt]cmd =0x44504543, len=24
4,002,010 >>> mbox cmd response data (40 bytes)
4,002,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,438 UART: [rt]cmd =0x44504543, len=24
4,058,028 >>> mbox cmd response data (40 bytes)
4,058,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,792 UART: [rt]cmd =0x44504543, len=24
4,114,440 >>> mbox cmd response data (40 bytes)
4,114,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,028 UART: [rt]cmd =0x44504543, len=24
4,151,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,303 ready_for_fw is high
1,056,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,590 >>> mbox cmd response: success
2,685,284 UART:
2,685,300 UART: Running Caliptra FMC ...
2,685,708 UART:
2,685,851 UART: [state] CFI Enabled
2,696,786 UART: [fht] FMC Alias Private Key: 7
2,804,673 UART: [art] Extend RT PCRs Done
2,805,101 UART: [art] Lock RT PCRs Done
2,806,817 UART: [art] Populate DV Done
2,814,818 UART: [fht] FMC Alias Private Key: 7
2,815,980 UART: [art] Derive CDI
2,816,260 UART: [art] Store in in slot 0x4
2,902,109 UART: [art] Derive Key Pair
2,902,469 UART: [art] Store priv key in slot 0x5
2,915,329 UART: [art] Derive Key Pair - Done
2,929,904 UART: [art] Signing Cert with AUTHO
2,930,384 UART: RITY.KEYID = 7
2,945,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,497 UART: [art] PUB.X = 50E131835C57888C7BC6BC5B6E37C3E1A15D3EFF28FC0B7412858BB7E19155C41C99097D2BA642A454BE098DE459EB7D
2,953,266 UART: [art] PUB.Y = 282EFAD601D12A75C8A31C65448457AC7E988FC09776CC4B8D0F15CE36BB7CCED8F47F239992D2CCA41F022757DA11E5
2,960,219 UART: [art] SIG.R = 3DC5F43AB8B03DEE88EC6B3F1FCED5E02BCC6329CCCF086DF2DCDDE0885E93D85A69BDCD5A5975AB22E32A9E1BEF99C7
2,967,022 UART: [art] SIG.S = D64CD2B7926BCEA92647C3C83107570B93B61100DF637A5FA0ECAED4AF9D2A0DCF318B25228690059937B18ED1CF0D03
2,991,221 UART: Caliptra RT
2,991,566 UART: [state] CFI Enabled
3,099,695 UART: [rt] RT listening for mailbox commands...
3,100,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,209 UART: [rt]cmd =0x44504543, len=24
3,156,647 >>> mbox cmd response data (40 bytes)
3,156,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,153 UART: [rt]cmd =0x44504543, len=24
3,211,977 >>> mbox cmd response data (40 bytes)
3,211,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,241,707 UART: [rt]cmd =0x44504543, len=24
3,267,343 >>> mbox cmd response data (40 bytes)
3,267,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,573 UART: [rt]cmd =0x44504543, len=24
3,322,673 >>> mbox cmd response data (40 bytes)
3,322,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,245 UART: [rt]cmd =0x44504543, len=24
3,378,535 >>> mbox cmd response data (40 bytes)
3,378,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,965 UART: [rt]cmd =0x44504543, len=24
3,434,213 >>> mbox cmd response data (40 bytes)
3,434,214 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,379 UART: [rt]cmd =0x44504543, len=24
3,489,949 >>> mbox cmd response data (40 bytes)
3,489,950 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,449 UART: [rt]cmd =0x44504543, len=24
3,546,255 >>> mbox cmd response data (40 bytes)
3,546,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,987 UART: [rt]cmd =0x44504543, len=24
3,602,249 >>> mbox cmd response data (40 bytes)
3,602,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,583 UART: [rt]cmd =0x44504543, len=24
3,657,855 >>> mbox cmd response data (40 bytes)
3,657,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,643 UART: [rt]cmd =0x44504543, len=24
3,713,303 >>> mbox cmd response data (40 bytes)
3,713,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,979 UART: [rt]cmd =0x44504543, len=24
3,769,029 >>> mbox cmd response data (40 bytes)
3,769,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,647 UART: [rt]cmd =0x44504543, len=24
3,825,243 >>> mbox cmd response data (40 bytes)
3,825,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,847 UART: [rt]cmd =0x44504543, len=24
3,881,523 >>> mbox cmd response data (40 bytes)
3,881,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,061 UART: [rt]cmd =0x44504543, len=24
3,937,391 >>> mbox cmd response data (40 bytes)
3,937,392 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,741 UART: [rt]cmd =0x44504543, len=24
3,973,595 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,488 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,476,113 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 ready_for_fw is high
1,480,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,504,746 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,344 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,520,943 UART: [ldev] Erasing FE.KEYID = 1
1,546,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,644 UART: [ldev] --
1,586,137 UART: [fwproc] Waiting for Commands...
1,586,868 UART: [fwproc] Received command 0x46574c44
1,587,659 UART: [fwproc] Received Image of size 114332 bytes
2,885,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,639 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,982 >>> mbox cmd response: success
3,080,172 UART: [afmc] ++
3,080,340 UART: [afmc] CDI.KEYID = 6
3,080,702 UART: [afmc] SUBJECT.KEYID = 7
3,081,127 UART: [afmc] AUTHORITY.KEYID = 5
3,116,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,839 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,529 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,378 UART: [afmc] --
3,159,326 UART: [cold-reset] --
3,160,386 UART: [state] Locking Datavault
3,161,771 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,375 UART: [state] Locking ICCM
3,162,889 UART: [exit] Launching FMC @ 0x40000130
3,168,218 UART:
3,168,234 UART: Running Caliptra FMC ...
3,168,642 UART:
3,168,696 UART: [state] CFI Enabled
3,179,075 UART: [fht] FMC Alias Private Key: 7
3,286,764 UART: [art] Extend RT PCRs Done
3,287,192 UART: [art] Lock RT PCRs Done
3,288,596 UART: [art] Populate DV Done
3,296,809 UART: [fht] FMC Alias Private Key: 7
3,297,755 UART: [art] Derive CDI
3,298,035 UART: [art] Store in in slot 0x4
3,383,738 UART: [art] Derive Key Pair
3,384,098 UART: [art] Store priv key in slot 0x5
3,397,310 UART: [art] Derive Key Pair - Done
3,412,010 UART: [art] Signing Cert with AUTHO
3,412,490 UART: RITY.KEYID = 7
3,428,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,969 UART: [art] PUB.X = 608D809E3B6E2D6921ED880322DC82D16A492AD38C330E08BFBD55A6F8FE711CBE2451FE03BBE8E7F0DA5D3C8BA48E10
3,435,745 UART: [art] PUB.Y = B36F001EDF53BDFC732B2DC68CBACBD9B40058B6EB4B7C6A429EA650B62421743C5109CE740D56A4F12CFEDA38A8D8CB
3,442,669 UART: [art] SIG.R = 3AE0B42E236F4F30FC603239DB312C51366116A4084136BE280E8F9BFA9CC1490321D2D8DE4054E01605A97AE1CD92C0
3,449,429 UART: [art] SIG.S = BDB8ED2B96912089D0F24FA40A5EB66CDB2B9A6FD134FBD6B621FD994BC72F4E5CBB329365A256907FDAE75660006507
3,473,170 UART: Caliptra RT
3,473,423 UART: [state] CFI Enabled
3,581,356 UART: [rt] RT listening for mailbox commands...
3,582,026 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,546 UART: [rt]cmd =0x44504543, len=24
3,637,957 >>> mbox cmd response data (40 bytes)
3,637,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,753 UART: [rt]cmd =0x44504543, len=96
3,707,627 >>> mbox cmd response data (56 bytes)
3,707,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,667 UART: [rt]cmd =0x44504543, len=96
3,777,666 >>> mbox cmd response data (56 bytes)
3,777,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,588 UART: [rt]cmd =0x44504543, len=96
3,849,251 >>> mbox cmd response data (56 bytes)
3,849,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,055 UART: [rt]cmd =0x44504543, len=96
3,919,340 >>> mbox cmd response data (56 bytes)
3,919,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,384 UART: [rt]cmd =0x44504543, len=96
3,990,925 >>> mbox cmd response data (56 bytes)
3,990,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,071 UART: [rt]cmd =0x44504543, len=96
4,063,148 >>> mbox cmd response data (56 bytes)
4,063,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,296 UART: [rt]cmd =0x44504543, len=96
4,135,107 >>> mbox cmd response data (56 bytes)
4,135,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,201 UART: [rt]cmd =0x44504543, len=96
4,207,030 >>> mbox cmd response data (56 bytes)
4,207,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,236,874 UART: [rt]cmd =0x44504543, len=96
4,279,785 >>> mbox cmd response data (56 bytes)
4,279,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,803 UART: [rt]cmd =0x44504543, len=96
4,352,424 >>> mbox cmd response data (56 bytes)
4,352,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,382,290 UART: [rt]cmd =0x44504543, len=96
4,425,765 >>> mbox cmd response data (56 bytes)
4,425,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,455,655 UART: [rt]cmd =0x44504543, len=96
4,499,840 >>> mbox cmd response data (56 bytes)
4,499,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,529,772 UART: [rt]cmd =0x44504543, len=96
4,573,501 >>> mbox cmd response data (56 bytes)
4,573,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,603,739 UART: [rt]cmd =0x44504543, len=96
4,647,736 >>> mbox cmd response data (56 bytes)
4,647,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,677,756 UART: [rt]cmd =0x44504543, len=96
4,685,588 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,932 >>> mbox cmd response: success
2,989,706 UART:
2,989,722 UART: Running Caliptra FMC ...
2,990,130 UART:
2,990,184 UART: [state] CFI Enabled
3,000,629 UART: [fht] FMC Alias Private Key: 7
3,107,958 UART: [art] Extend RT PCRs Done
3,108,386 UART: [art] Lock RT PCRs Done
3,109,844 UART: [art] Populate DV Done
3,118,187 UART: [fht] FMC Alias Private Key: 7
3,119,327 UART: [art] Derive CDI
3,119,607 UART: [art] Store in in slot 0x4
3,205,266 UART: [art] Derive Key Pair
3,205,626 UART: [art] Store priv key in slot 0x5
3,218,790 UART: [art] Derive Key Pair - Done
3,233,513 UART: [art] Signing Cert with AUTHO
3,233,993 UART: RITY.KEYID = 7
3,249,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,872 UART: [art] PUB.X = 30A0F6BA3CB599AF01FE3F0DEA96DA2D0C357464FC1C9420FAC6F24C667F566E1C39A85F56E925AA8BBEA9D28E013BAB
3,256,654 UART: [art] PUB.Y = 5205FAC02953BE67E68CD8F619407C075F24E6CFE832C911B575756FFA69CAC50BC3A3FE83082978D34C65B3725D7F97
3,263,596 UART: [art] SIG.R = B81AD1D773A18004F4F956B24F8AEDFA7C207F5D01A9269A599373B01F80DF4F957A337FCB6708268DD1475BBD94FDE1
3,270,367 UART: [art] SIG.S = F7EA279C091FEDB77A5853783751AF9559F247DE3E94DD663E7852CCF7C487C6AF3BC2D19319AB771E172EB98CBD7E60
3,293,463 UART: Caliptra RT
3,293,716 UART: [state] CFI Enabled
3,402,234 UART: [rt] RT listening for mailbox commands...
3,402,904 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,680 UART: [rt]cmd =0x44504543, len=24
3,458,715 >>> mbox cmd response data (40 bytes)
3,458,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,499 UART: [rt]cmd =0x44504543, len=96
3,529,327 >>> mbox cmd response data (56 bytes)
3,529,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,103 UART: [rt]cmd =0x44504543, len=96
3,599,358 >>> mbox cmd response data (56 bytes)
3,599,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,100 UART: [rt]cmd =0x44504543, len=96
3,670,613 >>> mbox cmd response data (56 bytes)
3,670,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,715 UART: [rt]cmd =0x44504543, len=96
3,741,922 >>> mbox cmd response data (56 bytes)
3,741,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,908 UART: [rt]cmd =0x44504543, len=96
3,813,495 >>> mbox cmd response data (56 bytes)
3,813,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,737 UART: [rt]cmd =0x44504543, len=96
3,885,032 >>> mbox cmd response data (56 bytes)
3,885,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,798 UART: [rt]cmd =0x44504543, len=96
3,956,629 >>> mbox cmd response data (56 bytes)
3,956,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,511 UART: [rt]cmd =0x44504543, len=96
4,029,310 >>> mbox cmd response data (56 bytes)
4,029,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,600 UART: [rt]cmd =0x44504543, len=96
4,102,097 >>> mbox cmd response data (56 bytes)
4,102,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,309 UART: [rt]cmd =0x44504543, len=96
4,174,744 >>> mbox cmd response data (56 bytes)
4,174,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,774 UART: [rt]cmd =0x44504543, len=96
4,248,325 >>> mbox cmd response data (56 bytes)
4,248,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,523 UART: [rt]cmd =0x44504543, len=96
4,322,068 >>> mbox cmd response data (56 bytes)
4,322,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,352,128 UART: [rt]cmd =0x44504543, len=96
4,396,179 >>> mbox cmd response data (56 bytes)
4,396,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,426,035 UART: [rt]cmd =0x44504543, len=96
4,470,486 >>> mbox cmd response data (56 bytes)
4,470,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,504 UART: [rt]cmd =0x44504543, len=96
4,507,898 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,477,024 UART: [fht] Storing FHT @ 0x50003400
1,479,715 UART: [idev] ++
1,479,883 UART: [idev] CDI.KEYID = 6
1,480,243 UART: [idev] SUBJECT.KEYID = 7
1,480,667 UART: [idev] UDS.KEYID = 0
1,481,012 ready_for_fw is high
1,481,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,507 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,258 UART: [ldev] ++
1,515,426 UART: [ldev] CDI.KEYID = 6
1,515,789 UART: [ldev] SUBJECT.KEYID = 5
1,516,215 UART: [ldev] AUTHORITY.KEYID = 7
1,516,678 UART: [ldev] FE.KEYID = 1
1,521,958 UART: [ldev] Erasing FE.KEYID = 1
1,547,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,555 UART: [ldev] --
1,586,848 UART: [fwproc] Waiting for Commands...
1,587,595 UART: [fwproc] Received command 0x46574c44
1,588,386 UART: [fwproc] Received Image of size 114332 bytes
2,885,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,255 >>> mbox cmd response: success
3,079,489 UART: [afmc] ++
3,079,657 UART: [afmc] CDI.KEYID = 6
3,080,019 UART: [afmc] SUBJECT.KEYID = 7
3,080,444 UART: [afmc] AUTHORITY.KEYID = 5
3,115,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,409 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,802 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,492 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,253 UART: [afmc] --
3,159,265 UART: [cold-reset] --
3,160,081 UART: [state] Locking Datavault
3,161,358 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,962 UART: [state] Locking ICCM
3,162,578 UART: [exit] Launching FMC @ 0x40000130
3,167,907 UART:
3,167,923 UART: Running Caliptra FMC ...
3,168,331 UART:
3,168,474 UART: [state] CFI Enabled
3,179,061 UART: [fht] FMC Alias Private Key: 7
3,286,530 UART: [art] Extend RT PCRs Done
3,286,958 UART: [art] Lock RT PCRs Done
3,288,588 UART: [art] Populate DV Done
3,297,049 UART: [fht] FMC Alias Private Key: 7
3,298,195 UART: [art] Derive CDI
3,298,475 UART: [art] Store in in slot 0x4
3,383,886 UART: [art] Derive Key Pair
3,384,246 UART: [art] Store priv key in slot 0x5
3,397,620 UART: [art] Derive Key Pair - Done
3,412,420 UART: [art] Signing Cert with AUTHO
3,412,900 UART: RITY.KEYID = 7
3,428,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,097 UART: [art] PUB.X = 6E0D0F64D1E1E5414D4D3636C50CBD1DB169C46F0396F6A07AF82992C1514FBF55F2213FE47B1F11D8EA2AB0A8A8C953
3,435,867 UART: [art] PUB.Y = 003DBEE4F02504681691C0A16F17467932D96A751C9BE2B0B191EA63D83E2A5768F4C9FB310750A3219472E1487D07CF
3,442,782 UART: [art] SIG.R = F84F11F038C1F2A3ADC2B5724248DF2513D69D83D854DEE922B69A0A0385CC47A6F2E054CC12A99EA1D8113392616E67
3,449,550 UART: [art] SIG.S = 2273F59FBE8193806838481D5F12718D11619ABD63FA15EF735AC7D26BEB59333227CC1D9A0B32AB2E2491C2FF88AA4E
3,472,868 UART: Caliptra RT
3,473,213 UART: [state] CFI Enabled
3,581,720 UART: [rt] RT listening for mailbox commands...
3,582,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,248 UART: [rt]cmd =0x44504543, len=24
3,637,861 >>> mbox cmd response data (40 bytes)
3,637,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,893 UART: [rt]cmd =0x44504543, len=96
3,708,655 >>> mbox cmd response data (56 bytes)
3,708,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,695 UART: [rt]cmd =0x44504543, len=96
3,779,104 >>> mbox cmd response data (56 bytes)
3,779,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,046 UART: [rt]cmd =0x44504543, len=96
3,850,407 >>> mbox cmd response data (56 bytes)
3,850,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,427 UART: [rt]cmd =0x44504543, len=96
3,921,472 >>> mbox cmd response data (56 bytes)
3,921,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,192 UART: [rt]cmd =0x44504543, len=96
3,993,485 >>> mbox cmd response data (56 bytes)
3,993,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,357 UART: [rt]cmd =0x44504543, len=96
4,064,814 >>> mbox cmd response data (56 bytes)
4,064,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,834 UART: [rt]cmd =0x44504543, len=96
4,137,301 >>> mbox cmd response data (56 bytes)
4,137,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,529 UART: [rt]cmd =0x44504543, len=96
4,209,822 >>> mbox cmd response data (56 bytes)
4,209,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,239,834 UART: [rt]cmd =0x44504543, len=96
4,282,955 >>> mbox cmd response data (56 bytes)
4,282,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,312,991 UART: [rt]cmd =0x44504543, len=96
4,356,334 >>> mbox cmd response data (56 bytes)
4,356,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,386,278 UART: [rt]cmd =0x44504543, len=96
4,429,791 >>> mbox cmd response data (56 bytes)
4,429,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,459,803 UART: [rt]cmd =0x44504543, len=96
4,503,054 >>> mbox cmd response data (56 bytes)
4,503,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,533,126 UART: [rt]cmd =0x44504543, len=96
4,577,465 >>> mbox cmd response data (56 bytes)
4,577,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,607,563 UART: [rt]cmd =0x44504543, len=96
4,651,442 >>> mbox cmd response data (56 bytes)
4,651,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,681,258 UART: [rt]cmd =0x44504543, len=96
4,688,336 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,621 >>> mbox cmd response: success
2,990,317 UART:
2,990,333 UART: Running Caliptra FMC ...
2,990,741 UART:
2,990,884 UART: [state] CFI Enabled
3,001,525 UART: [fht] FMC Alias Private Key: 7
3,109,434 UART: [art] Extend RT PCRs Done
3,109,862 UART: [art] Lock RT PCRs Done
3,111,236 UART: [art] Populate DV Done
3,119,443 UART: [fht] FMC Alias Private Key: 7
3,120,581 UART: [art] Derive CDI
3,120,861 UART: [art] Store in in slot 0x4
3,206,492 UART: [art] Derive Key Pair
3,206,852 UART: [art] Store priv key in slot 0x5
3,220,572 UART: [art] Derive Key Pair - Done
3,235,263 UART: [art] Signing Cert with AUTHO
3,235,743 UART: RITY.KEYID = 7
3,250,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,468 UART: [art] PUB.X = AE7EF121F7886C895B3207B4D575CB66773B059AEBBB0542C38A092F3CA87B70720BACF13977D68EAE352201757E0807
3,258,216 UART: [art] PUB.Y = EA1F67C2381AAC45543AF86A9EDD0DCDBFF387F88D7E10A135AE8B1663A916A5BE98AE44275A85F84517FDBCCCD9B21B
3,265,187 UART: [art] SIG.R = 7474BC7C61FDE605D2E8C2AA160F0A859E35B56325ACDE1916805D540414CD0492B0B90B957AE5434D1F9DFCEC305DBE
3,271,951 UART: [art] SIG.S = 702D9E62649E6BC3D7BE7496BACBF2BDAC4F6AD976258714098C14EAA9B32FCFCD0C37F3A0C3E3DE98D5449C63F09BA6
3,295,730 UART: Caliptra RT
3,296,075 UART: [state] CFI Enabled
3,404,943 UART: [rt] RT listening for mailbox commands...
3,405,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,807 UART: [rt]cmd =0x44504543, len=24
3,462,240 >>> mbox cmd response data (40 bytes)
3,462,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,140 UART: [rt]cmd =0x44504543, len=96
3,532,592 >>> mbox cmd response data (56 bytes)
3,532,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,752 UART: [rt]cmd =0x44504543, len=96
3,602,987 >>> mbox cmd response data (56 bytes)
3,602,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,987 UART: [rt]cmd =0x44504543, len=96
3,674,134 >>> mbox cmd response data (56 bytes)
3,674,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,884 UART: [rt]cmd =0x44504543, len=96
3,744,845 >>> mbox cmd response data (56 bytes)
3,744,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,661 UART: [rt]cmd =0x44504543, len=96
3,815,972 >>> mbox cmd response data (56 bytes)
3,815,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,876 UART: [rt]cmd =0x44504543, len=96
3,887,601 >>> mbox cmd response data (56 bytes)
3,887,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,539 UART: [rt]cmd =0x44504543, len=96
3,959,512 >>> mbox cmd response data (56 bytes)
3,959,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,588 UART: [rt]cmd =0x44504543, len=96
4,031,737 >>> mbox cmd response data (56 bytes)
4,031,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,661 UART: [rt]cmd =0x44504543, len=96
4,103,884 >>> mbox cmd response data (56 bytes)
4,103,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,134,068 UART: [rt]cmd =0x44504543, len=96
4,177,301 >>> mbox cmd response data (56 bytes)
4,177,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,207,297 UART: [rt]cmd =0x44504543, len=96
4,250,722 >>> mbox cmd response data (56 bytes)
4,250,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,280,748 UART: [rt]cmd =0x44504543, len=96
4,324,147 >>> mbox cmd response data (56 bytes)
4,324,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,354,181 UART: [rt]cmd =0x44504543, len=96
4,397,360 >>> mbox cmd response data (56 bytes)
4,397,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,427,210 UART: [rt]cmd =0x44504543, len=96
4,471,777 >>> mbox cmd response data (56 bytes)
4,471,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,871 UART: [rt]cmd =0x44504543, len=96
4,509,209 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
893,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,237 UART: [kat] ++
897,389 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,037 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 ready_for_fw is high
1,176,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,999 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,532 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,573 >>> mbox cmd response: success
2,776,781 UART: [afmc] ++
2,776,949 UART: [afmc] CDI.KEYID = 6
2,777,311 UART: [afmc] SUBJECT.KEYID = 7
2,777,736 UART: [afmc] AUTHORITY.KEYID = 5
2,812,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,498 UART: [afmc] --
2,856,424 UART: [cold-reset] --
2,857,236 UART: [state] Locking Datavault
2,858,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,935 UART: [state] Locking ICCM
2,859,451 UART: [exit] Launching FMC @ 0x40000130
2,864,780 UART:
2,864,796 UART: Running Caliptra FMC ...
2,865,204 UART:
2,865,258 UART: [state] CFI Enabled
2,875,905 UART: [fht] FMC Alias Private Key: 7
2,983,340 UART: [art] Extend RT PCRs Done
2,983,768 UART: [art] Lock RT PCRs Done
2,985,566 UART: [art] Populate DV Done
2,993,801 UART: [fht] FMC Alias Private Key: 7
2,994,821 UART: [art] Derive CDI
2,995,101 UART: [art] Store in in slot 0x4
3,080,972 UART: [art] Derive Key Pair
3,081,332 UART: [art] Store priv key in slot 0x5
3,095,022 UART: [art] Derive Key Pair - Done
3,110,104 UART: [art] Signing Cert with AUTHO
3,110,584 UART: RITY.KEYID = 7
3,126,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,771 UART: [art] PUB.X = 6E08FB80AA51E2BCCF4E735DABC53ED598F12455183412B3A5751867A51DC9D20F80B16D6FDDC9BB2DB1D9E0FEC756A9
3,133,555 UART: [art] PUB.Y = 289DFD4990EE01C248D3D87E95F06E38458DCF98DA9D0738DF5C789BA524DB598E84CCCF8FA1349E837B6DCEFEF05DDA
3,140,521 UART: [art] SIG.R = 6136700D8638224FFA0858B547841B445F52E7FE69B12877D9652D0341E29C66AF161FD1B047DE11AC4A55C29AA73B4C
3,147,280 UART: [art] SIG.S = 7E6CA59E9DC70AEB6752569FC51D0FB745783FE7531515BC8F955A78BFF8D5BA34876D9F3815DF027A8E7A9CB95E4148
3,170,708 UART: Caliptra RT
3,170,961 UART: [state] CFI Enabled
3,278,302 UART: [rt] RT listening for mailbox commands...
3,278,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,050 UART: [rt]cmd =0x44504543, len=24
3,334,881 >>> mbox cmd response data (40 bytes)
3,334,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,707 UART: [rt]cmd =0x44504543, len=96
3,404,917 >>> mbox cmd response data (56 bytes)
3,404,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,589 UART: [rt]cmd =0x44504543, len=96
3,474,876 >>> mbox cmd response data (56 bytes)
3,474,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,702 UART: [rt]cmd =0x44504543, len=96
3,545,195 >>> mbox cmd response data (56 bytes)
3,545,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,095 UART: [rt]cmd =0x44504543, len=96
3,615,976 >>> mbox cmd response data (56 bytes)
3,615,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,854 UART: [rt]cmd =0x44504543, len=96
3,687,703 >>> mbox cmd response data (56 bytes)
3,687,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,513 UART: [rt]cmd =0x44504543, len=96
3,758,780 >>> mbox cmd response data (56 bytes)
3,758,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,794 UART: [rt]cmd =0x44504543, len=96
3,831,707 >>> mbox cmd response data (56 bytes)
3,831,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,561 UART: [rt]cmd =0x44504543, len=96
3,903,642 >>> mbox cmd response data (56 bytes)
3,903,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,676 UART: [rt]cmd =0x44504543, len=96
3,975,873 >>> mbox cmd response data (56 bytes)
3,975,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,825 UART: [rt]cmd =0x44504543, len=96
4,048,462 >>> mbox cmd response data (56 bytes)
4,048,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,078,266 UART: [rt]cmd =0x44504543, len=96
4,121,655 >>> mbox cmd response data (56 bytes)
4,121,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,847 UART: [rt]cmd =0x44504543, len=96
4,196,070 >>> mbox cmd response data (56 bytes)
4,196,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,738 UART: [rt]cmd =0x44504543, len=96
4,269,861 >>> mbox cmd response data (56 bytes)
4,269,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,873 UART: [rt]cmd =0x44504543, len=96
4,344,418 >>> mbox cmd response data (56 bytes)
4,344,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,488 UART: [rt]cmd =0x44504543, len=96
4,381,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,101 ready_for_fw is high
1,060,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,554 >>> mbox cmd response: success
2,686,900 UART:
2,686,916 UART: Running Caliptra FMC ...
2,687,324 UART:
2,687,378 UART: [state] CFI Enabled
2,697,913 UART: [fht] FMC Alias Private Key: 7
2,805,978 UART: [art] Extend RT PCRs Done
2,806,406 UART: [art] Lock RT PCRs Done
2,807,874 UART: [art] Populate DV Done
2,816,307 UART: [fht] FMC Alias Private Key: 7
2,817,419 UART: [art] Derive CDI
2,817,699 UART: [art] Store in in slot 0x4
2,903,112 UART: [art] Derive Key Pair
2,903,472 UART: [art] Store priv key in slot 0x5
2,916,486 UART: [art] Derive Key Pair - Done
2,931,436 UART: [art] Signing Cert with AUTHO
2,931,916 UART: RITY.KEYID = 7
2,947,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,851 UART: [art] PUB.X = CA0982C0E3168F3181683429B78173E618BD9C05B043DBDB181C58639E273BBB9C5CB0A707A9C3B772883BAAA922AD8A
2,954,618 UART: [art] PUB.Y = A77A2C7FFFA9C379BDCFECB3FC91727D6979010D77D1125AE893CA6287B01741207A1ECC86A5D9ACF46899D3861973B6
2,961,572 UART: [art] SIG.R = 5603E1724BD1E268E18995F50CACB806D137D5F50D99067A1A4A2A8E17CBEF13951588CDA43FDC6DBF2D0837F55493C6
2,968,332 UART: [art] SIG.S = 8A573D327E5B03749A3981BF2CECEB0B0C17F7E00C3B4E0A40F539C8A30BE205AE746F7351DE0ADD35E2C975612D6A02
2,992,432 UART: Caliptra RT
2,992,685 UART: [state] CFI Enabled
3,100,728 UART: [rt] RT listening for mailbox commands...
3,101,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,282 UART: [rt]cmd =0x44504543, len=24
3,157,223 >>> mbox cmd response data (40 bytes)
3,157,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,175 UART: [rt]cmd =0x44504543, len=96
3,227,025 >>> mbox cmd response data (56 bytes)
3,227,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,843 UART: [rt]cmd =0x44504543, len=96
3,297,112 >>> mbox cmd response data (56 bytes)
3,297,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,100 UART: [rt]cmd =0x44504543, len=96
3,366,795 >>> mbox cmd response data (56 bytes)
3,366,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,745 UART: [rt]cmd =0x44504543, len=96
3,437,676 >>> mbox cmd response data (56 bytes)
3,437,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,568 UART: [rt]cmd =0x44504543, len=96
3,508,871 >>> mbox cmd response data (56 bytes)
3,508,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,577 UART: [rt]cmd =0x44504543, len=96
3,580,406 >>> mbox cmd response data (56 bytes)
3,580,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,574 UART: [rt]cmd =0x44504543, len=96
3,652,135 >>> mbox cmd response data (56 bytes)
3,652,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,273 UART: [rt]cmd =0x44504543, len=96
3,724,224 >>> mbox cmd response data (56 bytes)
3,724,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,182 UART: [rt]cmd =0x44504543, len=96
3,796,971 >>> mbox cmd response data (56 bytes)
3,796,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,913 UART: [rt]cmd =0x44504543, len=96
3,869,448 >>> mbox cmd response data (56 bytes)
3,869,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,404 UART: [rt]cmd =0x44504543, len=96
3,941,999 >>> mbox cmd response data (56 bytes)
3,942,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,825 UART: [rt]cmd =0x44504543, len=96
4,014,990 >>> mbox cmd response data (56 bytes)
4,014,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,904 UART: [rt]cmd =0x44504543, len=96
4,088,821 >>> mbox cmd response data (56 bytes)
4,088,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,701 UART: [rt]cmd =0x44504543, len=96
4,163,266 >>> mbox cmd response data (56 bytes)
4,163,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,190 UART: [rt]cmd =0x44504543, len=96
4,200,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,891 UART: [kat] HMAC-384Kdf
923,641 UART: [kat] LMS
1,171,969 UART: [kat] --
1,172,968 UART: [cold-reset] ++
1,173,418 UART: [fht] FHT @ 0x50003400
1,176,027 UART: [idev] ++
1,176,195 UART: [idev] CDI.KEYID = 6
1,176,555 UART: [idev] SUBJECT.KEYID = 7
1,176,979 UART: [idev] UDS.KEYID = 0
1,177,324 ready_for_fw is high
1,177,324 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,201,786 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,070 UART: [ldev] ++
1,211,238 UART: [ldev] CDI.KEYID = 6
1,211,601 UART: [ldev] SUBJECT.KEYID = 5
1,212,027 UART: [ldev] AUTHORITY.KEYID = 7
1,212,490 UART: [ldev] FE.KEYID = 1
1,217,780 UART: [ldev] Erasing FE.KEYID = 1
1,244,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,588 UART: [ldev] --
1,283,903 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,612 >>> mbox cmd response: success
2,777,792 UART: [afmc] ++
2,777,960 UART: [afmc] CDI.KEYID = 6
2,778,322 UART: [afmc] SUBJECT.KEYID = 7
2,778,747 UART: [afmc] AUTHORITY.KEYID = 5
2,814,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,107 UART: [afmc] --
2,858,159 UART: [cold-reset] --
2,858,811 UART: [state] Locking Datavault
2,859,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,584 UART: [state] Locking ICCM
2,861,040 UART: [exit] Launching FMC @ 0x40000130
2,866,369 UART:
2,866,385 UART: Running Caliptra FMC ...
2,866,793 UART:
2,866,936 UART: [state] CFI Enabled
2,877,273 UART: [fht] FMC Alias Private Key: 7
2,985,598 UART: [art] Extend RT PCRs Done
2,986,026 UART: [art] Lock RT PCRs Done
2,987,184 UART: [art] Populate DV Done
2,995,223 UART: [fht] FMC Alias Private Key: 7
2,996,381 UART: [art] Derive CDI
2,996,661 UART: [art] Store in in slot 0x4
3,082,440 UART: [art] Derive Key Pair
3,082,800 UART: [art] Store priv key in slot 0x5
3,096,356 UART: [art] Derive Key Pair - Done
3,111,093 UART: [art] Signing Cert with AUTHO
3,111,573 UART: RITY.KEYID = 7
3,126,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,506 UART: [art] PUB.X = CAED441CCDD94B47D2191DEC62CA666C37EE671314503190D017A5D3A608C59EDABDC731134307B6F88EED4FC1BDDCE5
3,134,290 UART: [art] PUB.Y = 1B6EA7282981BA2E13D5DDCAD277FC5A1AA865908EC6BF418720CBD46EF19BB759A7374AE571641B634226ACC93BAD69
3,141,254 UART: [art] SIG.R = 5C85107CF4F6AF254C76DC65083E382AC4AE05C0E46B64E9274701E3666B42A94F34E5547662DF8FBE7B7BB0D267FD52
3,148,021 UART: [art] SIG.S = 62C7AB672A3ECABC1B50322694BD520BD61280B8F92A461FC46CC1106B87151D6921F663E1369BFC43BE57870259AAAF
3,171,614 UART: Caliptra RT
3,171,959 UART: [state] CFI Enabled
3,280,566 UART: [rt] RT listening for mailbox commands...
3,281,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,094 UART: [rt]cmd =0x44504543, len=24
3,337,547 >>> mbox cmd response data (40 bytes)
3,337,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,567 UART: [rt]cmd =0x44504543, len=96
3,407,835 >>> mbox cmd response data (56 bytes)
3,407,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,731 UART: [rt]cmd =0x44504543, len=96
3,477,974 >>> mbox cmd response data (56 bytes)
3,477,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,996 UART: [rt]cmd =0x44504543, len=96
3,548,767 >>> mbox cmd response data (56 bytes)
3,548,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,829 UART: [rt]cmd =0x44504543, len=96
3,620,516 >>> mbox cmd response data (56 bytes)
3,620,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,456 UART: [rt]cmd =0x44504543, len=96
3,691,707 >>> mbox cmd response data (56 bytes)
3,691,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,687 UART: [rt]cmd =0x44504543, len=96
3,763,554 >>> mbox cmd response data (56 bytes)
3,763,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,378 UART: [rt]cmd =0x44504543, len=96
3,835,565 >>> mbox cmd response data (56 bytes)
3,835,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,397 UART: [rt]cmd =0x44504543, len=96
3,907,384 >>> mbox cmd response data (56 bytes)
3,907,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,288 UART: [rt]cmd =0x44504543, len=96
3,979,923 >>> mbox cmd response data (56 bytes)
3,979,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,010,005 UART: [rt]cmd =0x44504543, len=96
4,053,272 >>> mbox cmd response data (56 bytes)
4,053,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,288 UART: [rt]cmd =0x44504543, len=96
4,126,911 >>> mbox cmd response data (56 bytes)
4,126,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,811 UART: [rt]cmd =0x44504543, len=96
4,200,500 >>> mbox cmd response data (56 bytes)
4,200,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,230,332 UART: [rt]cmd =0x44504543, len=96
4,273,969 >>> mbox cmd response data (56 bytes)
4,273,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,304,145 UART: [rt]cmd =0x44504543, len=96
4,348,074 >>> mbox cmd response data (56 bytes)
4,348,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,378,264 UART: [rt]cmd =0x44504543, len=96
4,385,162 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,634 ready_for_fw is high
1,060,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,921 >>> mbox cmd response: success
2,688,017 UART:
2,688,033 UART: Running Caliptra FMC ...
2,688,441 UART:
2,688,584 UART: [state] CFI Enabled
2,699,249 UART: [fht] FMC Alias Private Key: 7
2,806,994 UART: [art] Extend RT PCRs Done
2,807,422 UART: [art] Lock RT PCRs Done
2,809,006 UART: [art] Populate DV Done
2,817,391 UART: [fht] FMC Alias Private Key: 7
2,818,443 UART: [art] Derive CDI
2,818,723 UART: [art] Store in in slot 0x4
2,904,328 UART: [art] Derive Key Pair
2,904,688 UART: [art] Store priv key in slot 0x5
2,918,022 UART: [art] Derive Key Pair - Done
2,932,595 UART: [art] Signing Cert with AUTHO
2,933,075 UART: RITY.KEYID = 7
2,948,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,946 UART: [art] PUB.X = AE9B808EEC7F1DC36DEC8584C87B7979AA67D77FF6C8EBF260B5D0D9A58A2389F7BB9EE584045558B08C05401DA88339
2,955,722 UART: [art] PUB.Y = 2A06230BD00A158E7FDC89932D70D3805B4D747D07219185A3F012596DC25334758D922C37CB1D58FE8071EEEB8301CD
2,962,655 UART: [art] SIG.R = D1416B10E0B694E3E115033A5273C69DFF9C0424CDE17EF8128BEC6070B4A0AA50CA6A44A93C65445BD2374684E8FFE4
2,969,427 UART: [art] SIG.S = 6F9501C036DE27B5B1D9D1D778041CBFBF18E6FCFD36D84954499B6AA3E1DE1411417880133C1FA914232EC6BC03B40D
2,993,166 UART: Caliptra RT
2,993,511 UART: [state] CFI Enabled
3,101,624 UART: [rt] RT listening for mailbox commands...
3,102,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,138 UART: [rt]cmd =0x44504543, len=24
3,158,115 >>> mbox cmd response data (40 bytes)
3,158,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,915 UART: [rt]cmd =0x44504543, len=96
3,228,279 >>> mbox cmd response data (56 bytes)
3,228,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,181 UART: [rt]cmd =0x44504543, len=96
3,298,704 >>> mbox cmd response data (56 bytes)
3,298,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,812 UART: [rt]cmd =0x44504543, len=96
3,369,919 >>> mbox cmd response data (56 bytes)
3,369,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,873 UART: [rt]cmd =0x44504543, len=96
3,441,658 >>> mbox cmd response data (56 bytes)
3,441,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,636 UART: [rt]cmd =0x44504543, len=96
3,512,883 >>> mbox cmd response data (56 bytes)
3,512,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,569 UART: [rt]cmd =0x44504543, len=96
3,584,518 >>> mbox cmd response data (56 bytes)
3,584,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,558 UART: [rt]cmd =0x44504543, len=96
3,656,367 >>> mbox cmd response data (56 bytes)
3,656,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,309 UART: [rt]cmd =0x44504543, len=96
3,728,276 >>> mbox cmd response data (56 bytes)
3,728,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,168 UART: [rt]cmd =0x44504543, len=96
3,801,001 >>> mbox cmd response data (56 bytes)
3,801,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,043 UART: [rt]cmd =0x44504543, len=96
3,873,138 >>> mbox cmd response data (56 bytes)
3,873,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,022 UART: [rt]cmd =0x44504543, len=96
3,946,469 >>> mbox cmd response data (56 bytes)
3,946,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,401 UART: [rt]cmd =0x44504543, len=96
4,020,232 >>> mbox cmd response data (56 bytes)
4,020,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,320 UART: [rt]cmd =0x44504543, len=96
4,093,727 >>> mbox cmd response data (56 bytes)
4,093,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,673 UART: [rt]cmd =0x44504543, len=96
4,167,386 >>> mbox cmd response data (56 bytes)
4,167,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,604 UART: [rt]cmd =0x44504543, len=96
4,204,314 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 ready_for_fw is high
1,174,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,231 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,407 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,951 >>> mbox cmd response: success
2,775,164 UART: [afmc] ++
2,775,332 UART: [afmc] CDI.KEYID = 6
2,775,695 UART: [afmc] SUBJECT.KEYID = 7
2,776,121 UART: [afmc] AUTHORITY.KEYID = 5
2,811,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,355 UART: [afmc] --
2,854,323 UART: [cold-reset] --
2,855,361 UART: [state] Locking Datavault
2,856,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,112 UART: [state] Locking ICCM
2,857,604 UART: [exit] Launching FMC @ 0x40000130
2,862,933 UART:
2,862,949 UART: Running Caliptra FMC ...
2,863,357 UART:
2,863,411 UART: [state] CFI Enabled
2,873,870 UART: [fht] FMC Alias Private Key: 7
2,981,801 UART: [art] Extend RT PCRs Done
2,982,229 UART: [art] Lock RT PCRs Done
2,983,475 UART: [art] Populate DV Done
2,991,936 UART: [fht] FMC Alias Private Key: 7
2,993,024 UART: [art] Derive CDI
2,993,304 UART: [art] Store in in slot 0x4
3,078,895 UART: [art] Derive Key Pair
3,079,255 UART: [art] Store priv key in slot 0x5
3,092,495 UART: [art] Derive Key Pair - Done
3,107,014 UART: [art] Signing Cert with AUTHO
3,107,494 UART: RITY.KEYID = 7
3,122,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,521 UART: [art] PUB.X = 448959F17DBD438DDFC08E71C3864D114DD6C08C6174451B72FA67FC03D1EBF5E9FB7CC21315F07D19CAA988CD8EE96B
3,130,304 UART: [art] PUB.Y = A7F718DAA36CD4DD2C54C9A98877A9780C3FECDBCE4CBED58A4A9CBE0511437FC93298AAD6D8D256629823871150F847
3,137,262 UART: [art] SIG.R = 3D25B49AE7AEA5786C91082960FF82032AF6DCF8DA4106F2470B52D44B7094BB59F81D2656A12E9D3EC89AEEB258128D
3,144,028 UART: [art] SIG.S = F418D848F32CFF550FB5B52A3D2366C7ACC55D702AD4BE156AA2DE2D8ABD41D8F1DA6571E0F78A8BAC33A8CEF0A481FC
3,167,734 UART: Caliptra RT
3,167,987 UART: [state] CFI Enabled
3,275,650 UART: [rt] RT listening for mailbox commands...
3,276,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,292 UART: [rt]cmd =0x44504543, len=24
3,332,677 >>> mbox cmd response data (40 bytes)
3,332,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,643 UART: [rt]cmd =0x44504543, len=96
3,402,297 >>> mbox cmd response data (56 bytes)
3,402,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,237 UART: [rt]cmd =0x44504543, len=96
3,473,160 >>> mbox cmd response data (56 bytes)
3,473,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,184 UART: [rt]cmd =0x44504543, len=96
3,543,611 >>> mbox cmd response data (56 bytes)
3,543,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,537 UART: [rt]cmd =0x44504543, len=96
3,614,702 >>> mbox cmd response data (56 bytes)
3,614,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,626 UART: [rt]cmd =0x44504543, len=96
3,686,701 >>> mbox cmd response data (56 bytes)
3,686,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,433 UART: [rt]cmd =0x44504543, len=96
3,758,310 >>> mbox cmd response data (56 bytes)
3,758,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,300 UART: [rt]cmd =0x44504543, len=96
3,830,889 >>> mbox cmd response data (56 bytes)
3,830,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,867 UART: [rt]cmd =0x44504543, len=96
3,902,942 >>> mbox cmd response data (56 bytes)
3,902,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,148 UART: [rt]cmd =0x44504543, len=96
3,975,381 >>> mbox cmd response data (56 bytes)
3,975,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,567 UART: [rt]cmd =0x44504543, len=96
4,048,384 >>> mbox cmd response data (56 bytes)
4,048,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,078,220 UART: [rt]cmd =0x44504543, len=96
4,121,755 >>> mbox cmd response data (56 bytes)
4,121,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,743 UART: [rt]cmd =0x44504543, len=96
4,195,306 >>> mbox cmd response data (56 bytes)
4,195,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,306 UART: [rt]cmd =0x44504543, len=96
4,268,983 >>> mbox cmd response data (56 bytes)
4,268,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,845 UART: [rt]cmd =0x44504543, len=96
4,343,196 >>> mbox cmd response data (56 bytes)
4,343,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,132 UART: [rt]cmd =0x44504543, len=96
4,380,616 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,218 ready_for_fw is high
1,056,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,331 >>> mbox cmd response: success
2,683,815 UART:
2,683,831 UART: Running Caliptra FMC ...
2,684,239 UART:
2,684,293 UART: [state] CFI Enabled
2,694,960 UART: [fht] FMC Alias Private Key: 7
2,802,155 UART: [art] Extend RT PCRs Done
2,802,583 UART: [art] Lock RT PCRs Done
2,803,999 UART: [art] Populate DV Done
2,812,058 UART: [fht] FMC Alias Private Key: 7
2,813,086 UART: [art] Derive CDI
2,813,366 UART: [art] Store in in slot 0x4
2,898,881 UART: [art] Derive Key Pair
2,899,241 UART: [art] Store priv key in slot 0x5
2,912,239 UART: [art] Derive Key Pair - Done
2,927,410 UART: [art] Signing Cert with AUTHO
2,927,890 UART: RITY.KEYID = 7
2,943,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,837 UART: [art] PUB.X = 5E1DEC18C30A70AA9F23004414FC31C79A5439EB112507427D8C68D21596494766AFED50D3BF50C8FFE04692A1D57B6F
2,950,583 UART: [art] PUB.Y = 3BB58DC88D6081D5D4AD1627209C444EF9B2F47DB9FEFF1A4E6983C4F937D1AC58D3A5D572A6EADB12EE4C807A9BCD67
2,957,555 UART: [art] SIG.R = 91DC5DE43D9FA439BC75CCF9C05CC3471B38AD4B5D3736C4114D09A4CB481729B9662850CF1BF7EE62E7D35326B22ECD
2,964,336 UART: [art] SIG.S = FB2C69161227467FF556A32B7BBDEF095D8A42ADF70312E16443F5C6873FFCFE360BD5715E06710206803B92550C8D87
2,988,042 UART: Caliptra RT
2,988,295 UART: [state] CFI Enabled
3,096,965 UART: [rt] RT listening for mailbox commands...
3,097,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,665 UART: [rt]cmd =0x44504543, len=24
3,154,120 >>> mbox cmd response data (40 bytes)
3,154,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,168 UART: [rt]cmd =0x44504543, len=96
3,224,356 >>> mbox cmd response data (56 bytes)
3,224,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,362 UART: [rt]cmd =0x44504543, len=96
3,295,117 >>> mbox cmd response data (56 bytes)
3,295,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,953 UART: [rt]cmd =0x44504543, len=96
3,365,686 >>> mbox cmd response data (56 bytes)
3,365,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,672 UART: [rt]cmd =0x44504543, len=96
3,436,455 >>> mbox cmd response data (56 bytes)
3,436,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,483 UART: [rt]cmd =0x44504543, len=96
3,508,358 >>> mbox cmd response data (56 bytes)
3,508,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,208 UART: [rt]cmd =0x44504543, len=96
3,579,695 >>> mbox cmd response data (56 bytes)
3,579,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,479 UART: [rt]cmd =0x44504543, len=96
3,651,286 >>> mbox cmd response data (56 bytes)
3,651,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,182 UART: [rt]cmd =0x44504543, len=96
3,723,317 >>> mbox cmd response data (56 bytes)
3,723,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,521 UART: [rt]cmd =0x44504543, len=96
3,795,764 >>> mbox cmd response data (56 bytes)
3,795,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,822 UART: [rt]cmd =0x44504543, len=96
3,868,811 >>> mbox cmd response data (56 bytes)
3,868,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,837 UART: [rt]cmd =0x44504543, len=96
3,942,430 >>> mbox cmd response data (56 bytes)
3,942,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,576 UART: [rt]cmd =0x44504543, len=96
4,016,159 >>> mbox cmd response data (56 bytes)
4,016,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,863 UART: [rt]cmd =0x44504543, len=96
4,089,380 >>> mbox cmd response data (56 bytes)
4,089,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,520 UART: [rt]cmd =0x44504543, len=96
4,163,297 >>> mbox cmd response data (56 bytes)
4,163,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,175 UART: [rt]cmd =0x44504543, len=96
4,200,509 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,357 UART: [kat] SHA2-256
891,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,036 UART: [kat] ++
896,188 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,730 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,175,068 ready_for_fw is high
1,175,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,904 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,293 UART: [ldev] SUBJECT.KEYID = 5
1,210,720 UART: [ldev] AUTHORITY.KEYID = 7
1,211,183 UART: [ldev] FE.KEYID = 1
1,216,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,281,965 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,056 >>> mbox cmd response: success
2,774,303 UART: [afmc] ++
2,774,471 UART: [afmc] CDI.KEYID = 6
2,774,834 UART: [afmc] SUBJECT.KEYID = 7
2,775,260 UART: [afmc] AUTHORITY.KEYID = 5
2,811,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,871 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,754 UART: [afmc] --
2,854,722 UART: [cold-reset] --
2,855,706 UART: [state] Locking Datavault
2,856,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,389 UART: [state] Locking ICCM
2,857,947 UART: [exit] Launching FMC @ 0x40000130
2,863,276 UART:
2,863,292 UART: Running Caliptra FMC ...
2,863,700 UART:
2,863,843 UART: [state] CFI Enabled
2,874,430 UART: [fht] FMC Alias Private Key: 7
2,982,363 UART: [art] Extend RT PCRs Done
2,982,791 UART: [art] Lock RT PCRs Done
2,984,237 UART: [art] Populate DV Done
2,992,250 UART: [fht] FMC Alias Private Key: 7
2,993,290 UART: [art] Derive CDI
2,993,570 UART: [art] Store in in slot 0x4
3,079,907 UART: [art] Derive Key Pair
3,080,267 UART: [art] Store priv key in slot 0x5
3,093,451 UART: [art] Derive Key Pair - Done
3,108,207 UART: [art] Signing Cert with AUTHO
3,108,687 UART: RITY.KEYID = 7
3,123,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,626 UART: [art] PUB.X = 5D849640FB604F3C4BBB1F32524DCE103B7DC7A0DD83E399C1690BC288233DAAE3AF9B3E0A1252D29A024B32AB763AC4
3,131,401 UART: [art] PUB.Y = 1CC601E658024BA051D944B00217F1E56F99BCA403B84245C944A5E9D417F1D468FDC1CD0350D0BC57E9759A85F0E795
3,138,338 UART: [art] SIG.R = 7F922603F2FBE275DDA6E59774CD1BFD6026C554C1DA4D791C49A235FA9BF5A01EAB9DC251E9BB82511A42AC1D66D43B
3,145,123 UART: [art] SIG.S = BC8A87A97276AD960DB183719B368FDE79A4476B7419571A76347CF222E1BBE7186C594AC429C778EB49836778E350DE
3,168,871 UART: Caliptra RT
3,169,216 UART: [state] CFI Enabled
3,277,487 UART: [rt] RT listening for mailbox commands...
3,278,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,095 UART: [rt]cmd =0x44504543, len=24
3,334,548 >>> mbox cmd response data (40 bytes)
3,334,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,706 UART: [rt]cmd =0x44504543, len=96
3,405,692 >>> mbox cmd response data (56 bytes)
3,405,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,518 UART: [rt]cmd =0x44504543, len=96
3,475,183 >>> mbox cmd response data (56 bytes)
3,475,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,087 UART: [rt]cmd =0x44504543, len=96
3,545,654 >>> mbox cmd response data (56 bytes)
3,545,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,392 UART: [rt]cmd =0x44504543, len=96
3,616,361 >>> mbox cmd response data (56 bytes)
3,616,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,295 UART: [rt]cmd =0x44504543, len=96
3,688,160 >>> mbox cmd response data (56 bytes)
3,688,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,024 UART: [rt]cmd =0x44504543, len=96
3,759,457 >>> mbox cmd response data (56 bytes)
3,759,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,547 UART: [rt]cmd =0x44504543, len=96
3,832,082 >>> mbox cmd response data (56 bytes)
3,832,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,088 UART: [rt]cmd =0x44504543, len=96
3,904,155 >>> mbox cmd response data (56 bytes)
3,904,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,017 UART: [rt]cmd =0x44504543, len=96
3,976,580 >>> mbox cmd response data (56 bytes)
3,976,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,616 UART: [rt]cmd =0x44504543, len=96
4,049,875 >>> mbox cmd response data (56 bytes)
4,049,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,697 UART: [rt]cmd =0x44504543, len=96
4,122,108 >>> mbox cmd response data (56 bytes)
4,122,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,956 UART: [rt]cmd =0x44504543, len=96
4,195,885 >>> mbox cmd response data (56 bytes)
4,195,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,793 UART: [rt]cmd =0x44504543, len=96
4,270,124 >>> mbox cmd response data (56 bytes)
4,270,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,042 UART: [rt]cmd =0x44504543, len=96
4,344,307 >>> mbox cmd response data (56 bytes)
4,344,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,297 UART: [rt]cmd =0x44504543, len=96
4,381,455 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,549 ready_for_fw is high
1,056,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,450 >>> mbox cmd response: success
2,683,796 UART:
2,683,812 UART: Running Caliptra FMC ...
2,684,220 UART:
2,684,363 UART: [state] CFI Enabled
2,694,762 UART: [fht] FMC Alias Private Key: 7
2,803,247 UART: [art] Extend RT PCRs Done
2,803,675 UART: [art] Lock RT PCRs Done
2,804,877 UART: [art] Populate DV Done
2,812,880 UART: [fht] FMC Alias Private Key: 7
2,814,012 UART: [art] Derive CDI
2,814,292 UART: [art] Store in in slot 0x4
2,899,971 UART: [art] Derive Key Pair
2,900,331 UART: [art] Store priv key in slot 0x5
2,914,015 UART: [art] Derive Key Pair - Done
2,928,925 UART: [art] Signing Cert with AUTHO
2,929,405 UART: RITY.KEYID = 7
2,944,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,440 UART: [art] PUB.X = CA7BA77EF762A57A7EEC075CCD36A3C0F5EF7B438267D1A709C2E4CA59D3B3ED348B9D0E00010C91119EA5891A45290D
2,952,184 UART: [art] PUB.Y = 7E9BF9B4447F07DE1948EF0D6CFA8129D6C4E3F4119E0E8676937BC5158C62E9B4A7F0A36C42AAEB91D7CBFAF86489F9
2,959,141 UART: [art] SIG.R = 5D632CCB3BA2BA2FB5C68D1BFA4F7051607A1AB118A59939DC3D183200E68B85BAECE3F939907A7CB43149B72BB25245
2,965,901 UART: [art] SIG.S = DFBF766D0D66E87C527554E719DE79D77137AA40475DD417B6B513C8410BA432CF93E4327F797AE8E61EFF98E490A786
2,989,564 UART: Caliptra RT
2,989,909 UART: [state] CFI Enabled
3,098,472 UART: [rt] RT listening for mailbox commands...
3,099,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,130 UART: [rt]cmd =0x44504543, len=24
3,155,703 >>> mbox cmd response data (40 bytes)
3,155,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,605 UART: [rt]cmd =0x44504543, len=96
3,225,145 >>> mbox cmd response data (56 bytes)
3,225,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,875 UART: [rt]cmd =0x44504543, len=96
3,295,148 >>> mbox cmd response data (56 bytes)
3,295,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,130 UART: [rt]cmd =0x44504543, len=96
3,366,049 >>> mbox cmd response data (56 bytes)
3,366,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,097 UART: [rt]cmd =0x44504543, len=96
3,436,746 >>> mbox cmd response data (56 bytes)
3,436,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,562 UART: [rt]cmd =0x44504543, len=96
3,508,277 >>> mbox cmd response data (56 bytes)
3,508,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,253 UART: [rt]cmd =0x44504543, len=96
3,580,704 >>> mbox cmd response data (56 bytes)
3,580,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,822 UART: [rt]cmd =0x44504543, len=96
3,653,029 >>> mbox cmd response data (56 bytes)
3,653,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,975 UART: [rt]cmd =0x44504543, len=96
3,725,700 >>> mbox cmd response data (56 bytes)
3,725,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,536 UART: [rt]cmd =0x44504543, len=96
3,798,405 >>> mbox cmd response data (56 bytes)
3,798,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,089 UART: [rt]cmd =0x44504543, len=96
3,870,756 >>> mbox cmd response data (56 bytes)
3,870,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,688 UART: [rt]cmd =0x44504543, len=96
3,944,289 >>> mbox cmd response data (56 bytes)
3,944,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,167 UART: [rt]cmd =0x44504543, len=96
4,017,746 >>> mbox cmd response data (56 bytes)
4,017,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,526 UART: [rt]cmd =0x44504543, len=96
4,091,413 >>> mbox cmd response data (56 bytes)
4,091,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,253 UART: [rt]cmd =0x44504543, len=96
4,165,932 >>> mbox cmd response data (56 bytes)
4,165,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,832 UART: [rt]cmd =0x44504543, len=96
4,202,930 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,475 UART: [kat] SHA2-256
882,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,521 UART: [kat] ++
886,673 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,636 UART: [kat] SHA2-512-ACC
897,537 UART: [kat] ECC-384
903,168 UART: [kat] HMAC-384Kdf
907,652 UART: [kat] LMS
1,475,848 UART: [kat] --
1,476,763 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,480,044 UART: [idev] ++
1,480,212 UART: [idev] CDI.KEYID = 6
1,480,572 UART: [idev] SUBJECT.KEYID = 7
1,480,996 UART: [idev] UDS.KEYID = 0
1,481,341 ready_for_fw is high
1,481,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,492 UART: [idev] Erasing UDS.KEYID = 0
1,505,988 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,558 UART: [idev] --
1,515,613 UART: [ldev] ++
1,515,781 UART: [ldev] CDI.KEYID = 6
1,516,144 UART: [ldev] SUBJECT.KEYID = 5
1,516,570 UART: [ldev] AUTHORITY.KEYID = 7
1,517,033 UART: [ldev] FE.KEYID = 1
1,522,271 UART: [ldev] Erasing FE.KEYID = 1
1,547,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,020 UART: [ldev] --
1,586,461 UART: [fwproc] Waiting for Commands...
1,587,282 UART: [fwproc] Received command 0x46574c44
1,588,073 UART: [fwproc] Received Image of size 114332 bytes
2,886,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,980 >>> mbox cmd response: success
3,080,076 UART: [afmc] ++
3,080,244 UART: [afmc] CDI.KEYID = 6
3,080,606 UART: [afmc] SUBJECT.KEYID = 7
3,081,031 UART: [afmc] AUTHORITY.KEYID = 5
3,115,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,046 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,931 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,621 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,582 UART: [afmc] --
3,158,680 UART: [cold-reset] --
3,159,436 UART: [state] Locking Datavault
3,160,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,379 UART: [state] Locking ICCM
3,162,005 UART: [exit] Launching FMC @ 0x40000130
3,167,334 UART:
3,167,350 UART: Running Caliptra FMC ...
3,167,758 UART:
3,167,812 UART: [state] CFI Enabled
3,178,755 UART: [fht] FMC Alias Private Key: 7
3,287,364 UART: [art] Extend RT PCRs Done
3,287,792 UART: [art] Lock RT PCRs Done
3,289,148 UART: [art] Populate DV Done
3,297,501 UART: [fht] FMC Alias Private Key: 7
3,298,433 UART: [art] Derive CDI
3,298,713 UART: [art] Store in in slot 0x4
3,384,144 UART: [art] Derive Key Pair
3,384,504 UART: [art] Store priv key in slot 0x5
3,397,714 UART: [art] Derive Key Pair - Done
3,412,570 UART: [art] Signing Cert with AUTHO
3,413,050 UART: RITY.KEYID = 7
3,428,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,131 UART: [art] PUB.X = 8FB779375D9ABE9A074EC903DFB6DB2BA7DDC4C5806019FC363ED1F7DCC3FF730BCAFF08038EF6B38EBEA09DD30121A9
3,435,911 UART: [art] PUB.Y = 05F994FCBF1E8ED144883A41D6ABA407CDFEEDD1B2DE122C251813BE8EAC41840CF65B59AF735D3B9CCCF5B88E5C7573
3,442,876 UART: [art] SIG.R = C59C4EB102B8FB824C0528F87232C48F35B007C07F103636F7048A1C6D8F8B9A87902E5DB4481D848B6F23BEC8E3C7AB
3,449,640 UART: [art] SIG.S = E0807A37F69734497070B8B22B90965402A5375F64782962B4E6B8174600B8345C20D6D95EAEE5B0F6AF243DA51914EC
3,473,722 UART: Caliptra RT
3,473,975 UART: [state] CFI Enabled
3,582,123 UART: [rt] RT listening for mailbox commands...
3,582,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,535 UART: [rt]cmd =0x44504543, len=24
3,638,600 >>> mbox cmd response data (40 bytes)
3,638,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,188 UART: [rt]cmd =0x44504543, len=24
3,693,799 >>> mbox cmd response data (40 bytes)
3,693,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,723,241 UART: [rt]cmd =0x44504543, len=24
3,749,220 >>> mbox cmd response data (40 bytes)
3,749,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,532 UART: [rt]cmd =0x44504543, len=24
3,804,811 >>> mbox cmd response data (40 bytes)
3,804,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,499 UART: [rt]cmd =0x44504543, len=24
3,860,240 >>> mbox cmd response data (40 bytes)
3,860,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,536 UART: [rt]cmd =0x44504543, len=24
3,915,613 >>> mbox cmd response data (40 bytes)
3,915,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,075 UART: [rt]cmd =0x44504543, len=24
3,971,120 >>> mbox cmd response data (40 bytes)
3,971,121 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,778 UART: [rt]cmd =0x44504543, len=24
4,027,061 >>> mbox cmd response data (40 bytes)
4,027,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,583 UART: [rt]cmd =0x44504543, len=24
4,082,646 >>> mbox cmd response data (40 bytes)
4,082,647 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,111,876 UART: [rt]cmd =0x44504543, len=24
4,138,383 >>> mbox cmd response data (40 bytes)
4,138,384 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,173 UART: [rt]cmd =0x44504543, len=24
4,194,318 >>> mbox cmd response data (40 bytes)
4,194,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,850 UART: [rt]cmd =0x44504543, len=24
4,250,419 >>> mbox cmd response data (40 bytes)
4,250,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,961 UART: [rt]cmd =0x44504543, len=24
4,306,252 >>> mbox cmd response data (40 bytes)
4,306,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,750 UART: [rt]cmd =0x44504543, len=24
4,362,017 >>> mbox cmd response data (40 bytes)
4,362,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,391,559 UART: [rt]cmd =0x44504543, len=24
4,417,714 >>> mbox cmd response data (40 bytes)
4,417,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,398 UART: [rt]cmd =0x44504543, len=24
4,454,321 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,097 ready_for_fw is high
1,363,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,898 >>> mbox cmd response: success
2,989,908 UART:
2,989,924 UART: Running Caliptra FMC ...
2,990,332 UART:
2,990,386 UART: [state] CFI Enabled
3,001,219 UART: [fht] FMC Alias Private Key: 7
3,109,518 UART: [art] Extend RT PCRs Done
3,109,946 UART: [art] Lock RT PCRs Done
3,111,346 UART: [art] Populate DV Done
3,119,389 UART: [fht] FMC Alias Private Key: 7
3,120,493 UART: [art] Derive CDI
3,120,773 UART: [art] Store in in slot 0x4
3,206,116 UART: [art] Derive Key Pair
3,206,476 UART: [art] Store priv key in slot 0x5
3,219,938 UART: [art] Derive Key Pair - Done
3,234,697 UART: [art] Signing Cert with AUTHO
3,235,177 UART: RITY.KEYID = 7
3,250,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,840 UART: [art] PUB.X = 51FE1C50651D3DB13D0EDA974B57C3522E02710CC590DF2A2757071D7A1DD014BE39F571A3641F2D326B2FD1714BAAAA
3,257,608 UART: [art] PUB.Y = 5B5A957703AE94D1EC792493A9B2481C501BEA214ECA6A5E9F07443B7385A094D081AAB092A201FBD7790919B77C41D8
3,264,548 UART: [art] SIG.R = 3673BE9858C6384B322459B22357FD3B242C6A9A991AE391A5181BA63187282FE9A599EAC8C6304C89EB6D7D6C8BFB9D
3,271,322 UART: [art] SIG.S = 54C59F3D108390302B5E03D6221A480BF385F3210FE3F97B47AB17F16175B48EBAC605B373315110DF82F39B965FACDF
3,294,845 UART: Caliptra RT
3,295,098 UART: [state] CFI Enabled
3,403,226 UART: [rt] RT listening for mailbox commands...
3,403,896 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,848 UART: [rt]cmd =0x44504543, len=24
3,459,905 >>> mbox cmd response data (40 bytes)
3,459,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,359 UART: [rt]cmd =0x44504543, len=24
3,515,508 >>> mbox cmd response data (40 bytes)
3,515,509 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,018 UART: [rt]cmd =0x44504543, len=24
3,571,109 >>> mbox cmd response data (40 bytes)
3,571,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,505 UART: [rt]cmd =0x44504543, len=24
3,626,434 >>> mbox cmd response data (40 bytes)
3,626,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,724 UART: [rt]cmd =0x44504543, len=24
3,681,931 >>> mbox cmd response data (40 bytes)
3,681,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,443 UART: [rt]cmd =0x44504543, len=24
3,737,546 >>> mbox cmd response data (40 bytes)
3,737,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,108 UART: [rt]cmd =0x44504543, len=24
3,793,497 >>> mbox cmd response data (40 bytes)
3,793,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,869 UART: [rt]cmd =0x44504543, len=24
3,848,580 >>> mbox cmd response data (40 bytes)
3,848,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,150 UART: [rt]cmd =0x44504543, len=24
3,904,671 >>> mbox cmd response data (40 bytes)
3,904,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,113 UART: [rt]cmd =0x44504543, len=24
3,960,114 >>> mbox cmd response data (40 bytes)
3,960,115 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,608 UART: [rt]cmd =0x44504543, len=24
4,015,651 >>> mbox cmd response data (40 bytes)
4,015,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,193 UART: [rt]cmd =0x44504543, len=24
4,071,876 >>> mbox cmd response data (40 bytes)
4,071,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,304 UART: [rt]cmd =0x44504543, len=24
4,127,545 >>> mbox cmd response data (40 bytes)
4,127,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,839 UART: [rt]cmd =0x44504543, len=24
4,183,640 >>> mbox cmd response data (40 bytes)
4,183,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,178 UART: [rt]cmd =0x44504543, len=24
4,239,483 >>> mbox cmd response data (40 bytes)
4,239,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,975 UART: [rt]cmd =0x44504543, len=24
4,276,128 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,441 UART: [kat] SHA2-512-ACC
897,342 UART: [kat] ECC-384
903,269 UART: [kat] HMAC-384Kdf
908,121 UART: [kat] LMS
1,476,317 UART: [kat] --
1,477,330 UART: [cold-reset] ++
1,477,734 UART: [fht] Storing FHT @ 0x50003400
1,480,671 UART: [idev] ++
1,480,839 UART: [idev] CDI.KEYID = 6
1,481,199 UART: [idev] SUBJECT.KEYID = 7
1,481,623 UART: [idev] UDS.KEYID = 0
1,481,968 ready_for_fw is high
1,481,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,633 UART: [idev] Erasing UDS.KEYID = 0
1,506,347 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,777 UART: [idev] --
1,515,836 UART: [ldev] ++
1,516,004 UART: [ldev] CDI.KEYID = 6
1,516,367 UART: [ldev] SUBJECT.KEYID = 5
1,516,793 UART: [ldev] AUTHORITY.KEYID = 7
1,517,256 UART: [ldev] FE.KEYID = 1
1,522,620 UART: [ldev] Erasing FE.KEYID = 1
1,548,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,453 UART: [ldev] --
1,587,850 UART: [fwproc] Waiting for Commands...
1,588,617 UART: [fwproc] Received command 0x46574c44
1,589,408 UART: [fwproc] Received Image of size 114332 bytes
2,886,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,328 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,651 >>> mbox cmd response: success
3,079,829 UART: [afmc] ++
3,079,997 UART: [afmc] CDI.KEYID = 6
3,080,359 UART: [afmc] SUBJECT.KEYID = 7
3,080,784 UART: [afmc] AUTHORITY.KEYID = 5
3,115,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,555 UART: [afmc] --
3,159,645 UART: [cold-reset] --
3,160,347 UART: [state] Locking Datavault
3,161,684 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,288 UART: [state] Locking ICCM
3,162,902 UART: [exit] Launching FMC @ 0x40000130
3,168,231 UART:
3,168,247 UART: Running Caliptra FMC ...
3,168,655 UART:
3,168,798 UART: [state] CFI Enabled
3,179,603 UART: [fht] FMC Alias Private Key: 7
3,286,890 UART: [art] Extend RT PCRs Done
3,287,318 UART: [art] Lock RT PCRs Done
3,288,856 UART: [art] Populate DV Done
3,297,339 UART: [fht] FMC Alias Private Key: 7
3,298,467 UART: [art] Derive CDI
3,298,747 UART: [art] Store in in slot 0x4
3,384,710 UART: [art] Derive Key Pair
3,385,070 UART: [art] Store priv key in slot 0x5
3,398,452 UART: [art] Derive Key Pair - Done
3,413,564 UART: [art] Signing Cert with AUTHO
3,414,044 UART: RITY.KEYID = 7
3,429,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,999 UART: [art] PUB.X = 2F11BFAD499A8714C2ECB648BE1F25605CB94C6434F99CF5C374B2C9F6346FCC1C85DC15B48EBAFF5E166A55F7B4BA6D
3,436,791 UART: [art] PUB.Y = 96D2349428B76EEC104387EC97BF0DFA149EC4DC4DEC97E4D405482D0F35E90EFDE786E7B0E5899112962F1815F0B2C3
3,443,737 UART: [art] SIG.R = A620FCEAD070EE2B2AF20C1F7F44794EB5B1BCE02656888396D95929DE80E98133DFEBB38ED6E6531BA7A925BF27CBE2
3,450,522 UART: [art] SIG.S = 72FA209F7459003EB983C5578DD04E500FE76BC7603130371A6AEC52ECD9C169910775124D0BD2FAA2E133CF9EC301A4
3,474,011 UART: Caliptra RT
3,474,356 UART: [state] CFI Enabled
3,581,841 UART: [rt] RT listening for mailbox commands...
3,582,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,265 UART: [rt]cmd =0x44504543, len=24
3,639,014 >>> mbox cmd response data (40 bytes)
3,639,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,436 UART: [rt]cmd =0x44504543, len=24
3,694,757 >>> mbox cmd response data (40 bytes)
3,694,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,724,333 UART: [rt]cmd =0x44504543, len=24
3,750,360 >>> mbox cmd response data (40 bytes)
3,750,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,794 UART: [rt]cmd =0x44504543, len=24
3,805,831 >>> mbox cmd response data (40 bytes)
3,805,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,319 UART: [rt]cmd =0x44504543, len=24
3,861,158 >>> mbox cmd response data (40 bytes)
3,861,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,672 UART: [rt]cmd =0x44504543, len=24
3,917,059 >>> mbox cmd response data (40 bytes)
3,917,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,505 UART: [rt]cmd =0x44504543, len=24
3,972,896 >>> mbox cmd response data (40 bytes)
3,972,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,254 UART: [rt]cmd =0x44504543, len=24
4,028,577 >>> mbox cmd response data (40 bytes)
4,028,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,283 UART: [rt]cmd =0x44504543, len=24
4,084,954 >>> mbox cmd response data (40 bytes)
4,084,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,546 UART: [rt]cmd =0x44504543, len=24
4,141,303 >>> mbox cmd response data (40 bytes)
4,141,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,637 UART: [rt]cmd =0x44504543, len=24
4,197,326 >>> mbox cmd response data (40 bytes)
4,197,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,227,026 UART: [rt]cmd =0x44504543, len=24
4,253,027 >>> mbox cmd response data (40 bytes)
4,253,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,282,561 UART: [rt]cmd =0x44504543, len=24
4,308,722 >>> mbox cmd response data (40 bytes)
4,308,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,204 UART: [rt]cmd =0x44504543, len=24
4,364,295 >>> mbox cmd response data (40 bytes)
4,364,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,393,863 UART: [rt]cmd =0x44504543, len=24
4,420,380 >>> mbox cmd response data (40 bytes)
4,420,381 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,974 UART: [rt]cmd =0x44504543, len=24
4,457,435 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 ready_for_fw is high
1,362,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,159 >>> mbox cmd response: success
2,989,633 UART:
2,989,649 UART: Running Caliptra FMC ...
2,990,057 UART:
2,990,200 UART: [state] CFI Enabled
3,000,779 UART: [fht] FMC Alias Private Key: 7
3,107,894 UART: [art] Extend RT PCRs Done
3,108,322 UART: [art] Lock RT PCRs Done
3,109,614 UART: [art] Populate DV Done
3,117,693 UART: [fht] FMC Alias Private Key: 7
3,118,863 UART: [art] Derive CDI
3,119,143 UART: [art] Store in in slot 0x4
3,204,356 UART: [art] Derive Key Pair
3,204,716 UART: [art] Store priv key in slot 0x5
3,217,982 UART: [art] Derive Key Pair - Done
3,232,603 UART: [art] Signing Cert with AUTHO
3,233,083 UART: RITY.KEYID = 7
3,247,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,674 UART: [art] PUB.X = B9F5064BF037A95562000352827A3A8DD6E1470ACC5B954466AB8FC2BC1DA40B4A9D1C67F02E2E58ECADE6263556304D
3,255,418 UART: [art] PUB.Y = A60CC44A534FE4DAF7F6058C3AD5701AE97549E7ADA4E925456A3D053B9D21C8911093D39EAA4E988E649949BDDB4578
3,262,367 UART: [art] SIG.R = 9A4A43B83E8517010E323122C6B0032DACC3C6CE83CB45438E7CC0CB25A0D04021E3BD8E73BE9811826B5F6B8A50E9B3
3,269,136 UART: [art] SIG.S = D12D7A2C31E57DF7476693AB3D4D393EF38EC8ECB2652412CED19C5E35F6A359F8BA5980FEA66C019DFEC74767C26BB6
3,293,010 UART: Caliptra RT
3,293,355 UART: [state] CFI Enabled
3,401,663 UART: [rt] RT listening for mailbox commands...
3,402,333 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,421 UART: [rt]cmd =0x44504543, len=24
3,458,968 >>> mbox cmd response data (40 bytes)
3,458,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,498 UART: [rt]cmd =0x44504543, len=24
3,514,369 >>> mbox cmd response data (40 bytes)
3,514,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,907 UART: [rt]cmd =0x44504543, len=24
3,570,172 >>> mbox cmd response data (40 bytes)
3,570,173 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,768 UART: [rt]cmd =0x44504543, len=24
3,625,697 >>> mbox cmd response data (40 bytes)
3,625,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,351 UART: [rt]cmd =0x44504543, len=24
3,682,050 >>> mbox cmd response data (40 bytes)
3,682,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,712 UART: [rt]cmd =0x44504543, len=24
3,738,109 >>> mbox cmd response data (40 bytes)
3,738,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,533 UART: [rt]cmd =0x44504543, len=24
3,794,008 >>> mbox cmd response data (40 bytes)
3,794,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,492 UART: [rt]cmd =0x44504543, len=24
3,849,631 >>> mbox cmd response data (40 bytes)
3,849,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,127 UART: [rt]cmd =0x44504543, len=24
3,905,576 >>> mbox cmd response data (40 bytes)
3,905,577 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,838 UART: [rt]cmd =0x44504543, len=24
3,961,117 >>> mbox cmd response data (40 bytes)
3,961,118 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,519 UART: [rt]cmd =0x44504543, len=24
4,016,616 >>> mbox cmd response data (40 bytes)
4,016,617 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,052 UART: [rt]cmd =0x44504543, len=24
4,072,185 >>> mbox cmd response data (40 bytes)
4,072,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,761 UART: [rt]cmd =0x44504543, len=24
4,127,866 >>> mbox cmd response data (40 bytes)
4,127,867 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,336 UART: [rt]cmd =0x44504543, len=24
4,183,491 >>> mbox cmd response data (40 bytes)
4,183,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,051 UART: [rt]cmd =0x44504543, len=24
4,239,440 >>> mbox cmd response data (40 bytes)
4,239,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,010 UART: [rt]cmd =0x44504543, len=24
4,276,319 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,453 UART: [cold-reset] ++
1,171,891 UART: [fht] FHT @ 0x50003400
1,174,484 UART: [idev] ++
1,174,652 UART: [idev] CDI.KEYID = 6
1,175,012 UART: [idev] SUBJECT.KEYID = 7
1,175,436 UART: [idev] UDS.KEYID = 0
1,175,781 ready_for_fw is high
1,175,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,010 UART: [idev] Erasing UDS.KEYID = 0
1,200,377 UART: [idev] Sha1 KeyId Algorithm
1,208,717 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,877 UART: [ldev] --
1,283,192 UART: [fwproc] Wait for Commands...
1,283,856 UART: [fwproc] Recv command 0x46574c44
1,284,584 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,483 >>> mbox cmd response: success
2,775,643 UART: [afmc] ++
2,775,811 UART: [afmc] CDI.KEYID = 6
2,776,173 UART: [afmc] SUBJECT.KEYID = 7
2,776,598 UART: [afmc] AUTHORITY.KEYID = 5
2,811,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,062 UART: [afmc] --
2,855,154 UART: [cold-reset] --
2,855,892 UART: [state] Locking Datavault
2,856,841 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,445 UART: [state] Locking ICCM
2,858,103 UART: [exit] Launching FMC @ 0x40000130
2,863,432 UART:
2,863,448 UART: Running Caliptra FMC ...
2,863,856 UART:
2,863,910 UART: [state] CFI Enabled
2,874,523 UART: [fht] FMC Alias Private Key: 7
2,982,382 UART: [art] Extend RT PCRs Done
2,982,810 UART: [art] Lock RT PCRs Done
2,984,128 UART: [art] Populate DV Done
2,992,143 UART: [fht] FMC Alias Private Key: 7
2,993,085 UART: [art] Derive CDI
2,993,365 UART: [art] Store in in slot 0x4
3,078,618 UART: [art] Derive Key Pair
3,078,978 UART: [art] Store priv key in slot 0x5
3,091,598 UART: [art] Derive Key Pair - Done
3,106,159 UART: [art] Signing Cert with AUTHO
3,106,639 UART: RITY.KEYID = 7
3,121,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,242 UART: [art] PUB.X = 4B60A136CD01137290A77CDDE9C3DCC759614F19A8D3C818050401560262410B0F2EFFAADD43A84AFB88DD84E78888FE
3,128,999 UART: [art] PUB.Y = 3969029A3FD9F735BF6BB9A989A55EBE72279D04237EB1881C9ED99427E25EC0E2D571843792B48BBB6705AF0B7A2F02
3,135,938 UART: [art] SIG.R = C5A91A0B12F83CAFC21D94BF01680C116466C39672DA20EFB2DB3970D1E00E66AE9E4664747712EE1B937EDD06FDF264
3,142,703 UART: [art] SIG.S = D99C41042C03399204BD69566A802E03912A1B275FDD2E8CD7120E99E4FD957DE0B9275BC8D89E8AE2FA70810594296D
3,166,628 UART: Caliptra RT
3,166,881 UART: [state] CFI Enabled
3,274,981 UART: [rt] RT listening for mailbox commands...
3,275,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,725 UART: [rt]cmd =0x44504543, len=24
3,331,648 >>> mbox cmd response data (40 bytes)
3,331,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,228 UART: [rt]cmd =0x44504543, len=24
3,387,691 >>> mbox cmd response data (40 bytes)
3,387,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,065 UART: [rt]cmd =0x44504543, len=24
3,443,782 >>> mbox cmd response data (40 bytes)
3,443,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,294 UART: [rt]cmd =0x44504543, len=24
3,499,583 >>> mbox cmd response data (40 bytes)
3,499,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,083 UART: [rt]cmd =0x44504543, len=24
3,555,008 >>> mbox cmd response data (40 bytes)
3,555,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,516 UART: [rt]cmd =0x44504543, len=24
3,611,437 >>> mbox cmd response data (40 bytes)
3,611,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,845 UART: [rt]cmd =0x44504543, len=24
3,667,132 >>> mbox cmd response data (40 bytes)
3,667,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,648 UART: [rt]cmd =0x44504543, len=24
3,723,205 >>> mbox cmd response data (40 bytes)
3,723,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,675 UART: [rt]cmd =0x44504543, len=24
3,778,916 >>> mbox cmd response data (40 bytes)
3,778,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,274 UART: [rt]cmd =0x44504543, len=24
3,834,555 >>> mbox cmd response data (40 bytes)
3,834,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,969 UART: [rt]cmd =0x44504543, len=24
3,890,346 >>> mbox cmd response data (40 bytes)
3,890,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,598 UART: [rt]cmd =0x44504543, len=24
3,946,077 >>> mbox cmd response data (40 bytes)
3,946,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,479 UART: [rt]cmd =0x44504543, len=24
4,002,026 >>> mbox cmd response data (40 bytes)
4,002,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,546 UART: [rt]cmd =0x44504543, len=24
4,057,839 >>> mbox cmd response data (40 bytes)
4,057,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,353 UART: [rt]cmd =0x44504543, len=24
4,113,756 >>> mbox cmd response data (40 bytes)
4,113,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,198 UART: [rt]cmd =0x44504543, len=24
4,150,705 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,801 ready_for_fw is high
1,060,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,988 >>> mbox cmd response: success
2,689,680 UART:
2,689,696 UART: Running Caliptra FMC ...
2,690,104 UART:
2,690,158 UART: [state] CFI Enabled
2,700,911 UART: [fht] FMC Alias Private Key: 7
2,808,586 UART: [art] Extend RT PCRs Done
2,809,014 UART: [art] Lock RT PCRs Done
2,810,420 UART: [art] Populate DV Done
2,818,543 UART: [fht] FMC Alias Private Key: 7
2,819,599 UART: [art] Derive CDI
2,819,879 UART: [art] Store in in slot 0x4
2,905,578 UART: [art] Derive Key Pair
2,905,938 UART: [art] Store priv key in slot 0x5
2,919,070 UART: [art] Derive Key Pair - Done
2,933,937 UART: [art] Signing Cert with AUTHO
2,934,417 UART: RITY.KEYID = 7
2,949,623 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,388 UART: [art] PUB.X = 58BB23A60C3F6EDDB2B2A65B777F686DBEBFAEC12BCCF01CE6B9D4F0F4537F7559D18F63A9477D51F478612B0B28A594
2,957,170 UART: [art] PUB.Y = BB044CD5F6CCBB0F9B0700CDAED3DE6167CF766DD70E585056B51B6938BE87FE435BDA1DDF66C28F1D0FF8BDD2D74809
2,964,106 UART: [art] SIG.R = 5715835CF2DDC0C1FA454F82945C7BFB48D1B543E3CD8057235A780E64DA6E2B8BADB362857E5B8AE1AC56AD43E9F1D6
2,970,889 UART: [art] SIG.S = 98B10A3A0EB74574A9E28C02E4ED914FFD6984F68E8C90AF16559047C24A6FFD3A09FE9B8B330F65D58A3447EF4BE244
2,994,469 UART: Caliptra RT
2,994,722 UART: [state] CFI Enabled
3,102,695 UART: [rt] RT listening for mailbox commands...
3,103,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,479 UART: [rt]cmd =0x44504543, len=24
3,159,562 >>> mbox cmd response data (40 bytes)
3,159,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,024 UART: [rt]cmd =0x44504543, len=24
3,215,395 >>> mbox cmd response data (40 bytes)
3,215,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,871 UART: [rt]cmd =0x44504543, len=24
3,270,764 >>> mbox cmd response data (40 bytes)
3,270,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,362 UART: [rt]cmd =0x44504543, len=24
3,326,443 >>> mbox cmd response data (40 bytes)
3,326,444 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,945 UART: [rt]cmd =0x44504543, len=24
3,382,134 >>> mbox cmd response data (40 bytes)
3,382,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,726 UART: [rt]cmd =0x44504543, len=24
3,437,971 >>> mbox cmd response data (40 bytes)
3,437,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,441 UART: [rt]cmd =0x44504543, len=24
3,493,718 >>> mbox cmd response data (40 bytes)
3,493,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,260 UART: [rt]cmd =0x44504543, len=24
3,549,169 >>> mbox cmd response data (40 bytes)
3,549,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,513 UART: [rt]cmd =0x44504543, len=24
3,604,790 >>> mbox cmd response data (40 bytes)
3,604,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,418 UART: [rt]cmd =0x44504543, len=24
3,660,579 >>> mbox cmd response data (40 bytes)
3,660,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,019 UART: [rt]cmd =0x44504543, len=24
3,716,042 >>> mbox cmd response data (40 bytes)
3,716,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,570 UART: [rt]cmd =0x44504543, len=24
3,771,855 >>> mbox cmd response data (40 bytes)
3,771,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,331 UART: [rt]cmd =0x44504543, len=24
3,827,842 >>> mbox cmd response data (40 bytes)
3,827,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,264 UART: [rt]cmd =0x44504543, len=24
3,883,377 >>> mbox cmd response data (40 bytes)
3,883,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,521 UART: [rt]cmd =0x44504543, len=24
3,938,384 >>> mbox cmd response data (40 bytes)
3,938,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,074 UART: [rt]cmd =0x44504543, len=24
3,975,321 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,773 UART: [idev] ++
1,175,941 UART: [idev] CDI.KEYID = 6
1,176,301 UART: [idev] SUBJECT.KEYID = 7
1,176,725 UART: [idev] UDS.KEYID = 0
1,177,070 ready_for_fw is high
1,177,070 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,081 UART: [idev] Erasing UDS.KEYID = 0
1,202,346 UART: [idev] Sha1 KeyId Algorithm
1,210,862 UART: [idev] --
1,211,862 UART: [ldev] ++
1,212,030 UART: [ldev] CDI.KEYID = 6
1,212,393 UART: [ldev] SUBJECT.KEYID = 5
1,212,819 UART: [ldev] AUTHORITY.KEYID = 7
1,213,282 UART: [ldev] FE.KEYID = 1
1,218,566 UART: [ldev] Erasing FE.KEYID = 1
1,245,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,082 UART: [ldev] --
1,284,371 UART: [fwproc] Wait for Commands...
1,285,133 UART: [fwproc] Recv command 0x46574c44
1,285,861 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,846 >>> mbox cmd response: success
2,777,046 UART: [afmc] ++
2,777,214 UART: [afmc] CDI.KEYID = 6
2,777,576 UART: [afmc] SUBJECT.KEYID = 7
2,778,001 UART: [afmc] AUTHORITY.KEYID = 5
2,812,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,343 UART: [afmc] --
2,856,385 UART: [cold-reset] --
2,856,987 UART: [state] Locking Datavault
2,858,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,926 UART: [state] Locking ICCM
2,859,528 UART: [exit] Launching FMC @ 0x40000130
2,864,857 UART:
2,864,873 UART: Running Caliptra FMC ...
2,865,281 UART:
2,865,424 UART: [state] CFI Enabled
2,876,015 UART: [fht] FMC Alias Private Key: 7
2,983,112 UART: [art] Extend RT PCRs Done
2,983,540 UART: [art] Lock RT PCRs Done
2,985,262 UART: [art] Populate DV Done
2,993,409 UART: [fht] FMC Alias Private Key: 7
2,994,499 UART: [art] Derive CDI
2,994,779 UART: [art] Store in in slot 0x4
3,080,320 UART: [art] Derive Key Pair
3,080,680 UART: [art] Store priv key in slot 0x5
3,094,710 UART: [art] Derive Key Pair - Done
3,109,484 UART: [art] Signing Cert with AUTHO
3,109,964 UART: RITY.KEYID = 7
3,124,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,607 UART: [art] PUB.X = DEF6A85733768E24C0E482FDE34799BCB8E87852ABCD3E139A4DD7BAA64E0C4F7B68DF7B90D87406D95780DA852B37E4
3,132,385 UART: [art] PUB.Y = 981323CE7FD9CFECE28CAD002381E78468DDBE26B9B9BF79191E9DC82193B17565DD9B2DBCF9F27E1BCD4D24D5AC99D2
3,139,335 UART: [art] SIG.R = 9C7470FDB7551FD4385B53D05942E77A6E724EDB4BC309F3BC6A844AE285766A58F740A9972767292634C3576D753B8E
3,146,098 UART: [art] SIG.S = 76CB4A76C02B46552B817FFC3E1263D7F05DA2F58B79BB515D9B58D60C224E5A668C4D1EBE23C12EA6D9D46BC0F623F8
3,170,306 UART: Caliptra RT
3,170,651 UART: [state] CFI Enabled
3,278,334 UART: [rt] RT listening for mailbox commands...
3,279,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,724 UART: [rt]cmd =0x44504543, len=24
3,335,463 >>> mbox cmd response data (40 bytes)
3,335,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,811 UART: [rt]cmd =0x44504543, len=24
3,391,240 >>> mbox cmd response data (40 bytes)
3,391,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,874 UART: [rt]cmd =0x44504543, len=24
3,447,203 >>> mbox cmd response data (40 bytes)
3,447,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,541 UART: [rt]cmd =0x44504543, len=24
3,503,136 >>> mbox cmd response data (40 bytes)
3,503,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,492 UART: [rt]cmd =0x44504543, len=24
3,559,239 >>> mbox cmd response data (40 bytes)
3,559,240 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,785 UART: [rt]cmd =0x44504543, len=24
3,615,026 >>> mbox cmd response data (40 bytes)
3,615,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,694 UART: [rt]cmd =0x44504543, len=24
3,671,325 >>> mbox cmd response data (40 bytes)
3,671,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,879 UART: [rt]cmd =0x44504543, len=24
3,727,308 >>> mbox cmd response data (40 bytes)
3,727,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,042 UART: [rt]cmd =0x44504543, len=24
3,783,407 >>> mbox cmd response data (40 bytes)
3,783,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,767 UART: [rt]cmd =0x44504543, len=24
3,839,226 >>> mbox cmd response data (40 bytes)
3,839,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,822 UART: [rt]cmd =0x44504543, len=24
3,895,179 >>> mbox cmd response data (40 bytes)
3,895,180 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,915 UART: [rt]cmd =0x44504543, len=24
3,951,758 >>> mbox cmd response data (40 bytes)
3,951,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,981,450 UART: [rt]cmd =0x44504543, len=24
4,007,771 >>> mbox cmd response data (40 bytes)
4,007,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,131 UART: [rt]cmd =0x44504543, len=24
4,063,874 >>> mbox cmd response data (40 bytes)
4,063,875 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,320 UART: [rt]cmd =0x44504543, len=24
4,120,399 >>> mbox cmd response data (40 bytes)
4,120,400 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,931 UART: [rt]cmd =0x44504543, len=24
4,156,824 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,148 ready_for_fw is high
1,061,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,675 >>> mbox cmd response: success
2,688,881 UART:
2,688,897 UART: Running Caliptra FMC ...
2,689,305 UART:
2,689,448 UART: [state] CFI Enabled
2,700,215 UART: [fht] FMC Alias Private Key: 7
2,807,706 UART: [art] Extend RT PCRs Done
2,808,134 UART: [art] Lock RT PCRs Done
2,809,834 UART: [art] Populate DV Done
2,818,089 UART: [fht] FMC Alias Private Key: 7
2,819,247 UART: [art] Derive CDI
2,819,527 UART: [art] Store in in slot 0x4
2,905,328 UART: [art] Derive Key Pair
2,905,688 UART: [art] Store priv key in slot 0x5
2,919,624 UART: [art] Derive Key Pair - Done
2,934,058 UART: [art] Signing Cert with AUTHO
2,934,538 UART: RITY.KEYID = 7
2,949,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,579 UART: [art] PUB.X = B085310E0ECFC1B5D139FE455D100A1BACB290B0149C08A6ADCBDD4A809A7097E30419D5014678EC268C31CF89BDE51F
2,957,345 UART: [art] PUB.Y = 1917666155FA0B471D28F189A48FFB128A8AF20DF6B54DA4744C820F8F4BA6DB687AD22B93A93BE0CB2923A276E5697C
2,964,294 UART: [art] SIG.R = 8EBE002AEC834CF369C5454C77ACFFC18FA63B4055E1051C05B640F973AA61BDCD00CB57EB2280D453F1FB12A9B9AC74
2,971,032 UART: [art] SIG.S = 4FC8E35752BE9DD43F3E1A0D798C1AAA19C5065A0F780608213C6FA17B562B83B58DCDAE8D4BD811EF5D510F9AFAE9B4
2,995,113 UART: Caliptra RT
2,995,458 UART: [state] CFI Enabled
3,102,749 UART: [rt] RT listening for mailbox commands...
3,103,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,357 UART: [rt]cmd =0x44504543, len=24
3,159,252 >>> mbox cmd response data (40 bytes)
3,159,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,678 UART: [rt]cmd =0x44504543, len=24
3,214,621 >>> mbox cmd response data (40 bytes)
3,214,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,083 UART: [rt]cmd =0x44504543, len=24
3,270,238 >>> mbox cmd response data (40 bytes)
3,270,239 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,428 UART: [rt]cmd =0x44504543, len=24
3,325,651 >>> mbox cmd response data (40 bytes)
3,325,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,081 UART: [rt]cmd =0x44504543, len=24
3,381,052 >>> mbox cmd response data (40 bytes)
3,381,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,602 UART: [rt]cmd =0x44504543, len=24
3,436,763 >>> mbox cmd response data (40 bytes)
3,436,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,229 UART: [rt]cmd =0x44504543, len=24
3,492,966 >>> mbox cmd response data (40 bytes)
3,492,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,176 UART: [rt]cmd =0x44504543, len=24
3,548,161 >>> mbox cmd response data (40 bytes)
3,548,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,539 UART: [rt]cmd =0x44504543, len=24
3,604,238 >>> mbox cmd response data (40 bytes)
3,604,239 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,662 UART: [rt]cmd =0x44504543, len=24
3,660,089 >>> mbox cmd response data (40 bytes)
3,660,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,695 UART: [rt]cmd =0x44504543, len=24
3,716,012 >>> mbox cmd response data (40 bytes)
3,716,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,552 UART: [rt]cmd =0x44504543, len=24
3,771,795 >>> mbox cmd response data (40 bytes)
3,771,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,375 UART: [rt]cmd =0x44504543, len=24
3,827,406 >>> mbox cmd response data (40 bytes)
3,827,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,812 UART: [rt]cmd =0x44504543, len=24
3,883,075 >>> mbox cmd response data (40 bytes)
3,883,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,501 UART: [rt]cmd =0x44504543, len=24
3,938,906 >>> mbox cmd response data (40 bytes)
3,938,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,294 UART: [rt]cmd =0x44504543, len=24
3,975,207 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,228 UART: [kat] SHA2-256
891,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,907 UART: [kat] ++
896,059 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
905,078 UART: [kat] SHA2-512-ACC
906,979 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
1,174,469 ready_for_fw is high
1,174,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,036 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,239 UART: [fwproc] Recv command 0x46574c44
1,282,972 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,629 >>> mbox cmd response: success
2,774,892 UART: [afmc] ++
2,775,060 UART: [afmc] CDI.KEYID = 6
2,775,423 UART: [afmc] SUBJECT.KEYID = 7
2,775,849 UART: [afmc] AUTHORITY.KEYID = 5
2,810,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,873 UART: [afmc] --
2,853,847 UART: [cold-reset] --
2,854,423 UART: [state] Locking Datavault
2,855,746 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,350 UART: [state] Locking ICCM
2,856,964 UART: [exit] Launching FMC @ 0x40000130
2,862,293 UART:
2,862,309 UART: Running Caliptra FMC ...
2,862,717 UART:
2,862,771 UART: [state] CFI Enabled
2,873,136 UART: [fht] FMC Alias Private Key: 7
2,980,807 UART: [art] Extend RT PCRs Done
2,981,235 UART: [art] Lock RT PCRs Done
2,982,641 UART: [art] Populate DV Done
2,990,664 UART: [fht] FMC Alias Private Key: 7
2,991,706 UART: [art] Derive CDI
2,991,986 UART: [art] Store in in slot 0x4
3,077,941 UART: [art] Derive Key Pair
3,078,301 UART: [art] Store priv key in slot 0x5
3,092,077 UART: [art] Derive Key Pair - Done
3,106,828 UART: [art] Signing Cert with AUTHO
3,107,308 UART: RITY.KEYID = 7
3,122,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,199 UART: [art] PUB.X = FBA0B73183E548388233D4D0381EFA8E38402DDFC25A0334F7E5BB28538BE4D5EF41BC64D2697B3711ABFB48F823EC52
3,129,976 UART: [art] PUB.Y = 48C1550EB6F24D8198B9C53E1C57188278731721F79AEFE0A45445DBAAD3AD9B0B73A5786F75DA077584B1AA38142854
3,136,917 UART: [art] SIG.R = AAAED019C3CA5770611FD57676815E50CCFF50BC9B5DF94A4C3225796CC054D0CCB271C29A6DBA8A30A2ED32FB5A111B
3,143,707 UART: [art] SIG.S = 0C38AF4E831B640F4E0B6EE51D80235BA29F15FC7F9559B53E94702C0FC9C91B61D6DEF094097058B25BF5642672D5AA
3,167,611 UART: Caliptra RT
3,167,864 UART: [state] CFI Enabled
3,275,499 UART: [rt] RT listening for mailbox commands...
3,276,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,133 UART: [rt]cmd =0x44504543, len=24
3,332,732 >>> mbox cmd response data (40 bytes)
3,332,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,252 UART: [rt]cmd =0x44504543, len=24
3,388,601 >>> mbox cmd response data (40 bytes)
3,388,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,111 UART: [rt]cmd =0x44504543, len=24
3,444,124 >>> mbox cmd response data (40 bytes)
3,444,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,594 UART: [rt]cmd =0x44504543, len=24
3,500,183 >>> mbox cmd response data (40 bytes)
3,500,184 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,521 UART: [rt]cmd =0x44504543, len=24
3,555,792 >>> mbox cmd response data (40 bytes)
3,555,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,488 UART: [rt]cmd =0x44504543, len=24
3,611,825 >>> mbox cmd response data (40 bytes)
3,611,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,341 UART: [rt]cmd =0x44504543, len=24
3,667,590 >>> mbox cmd response data (40 bytes)
3,667,591 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,896 UART: [rt]cmd =0x44504543, len=24
3,723,483 >>> mbox cmd response data (40 bytes)
3,723,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,793 UART: [rt]cmd =0x44504543, len=24
3,778,436 >>> mbox cmd response data (40 bytes)
3,778,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,758 UART: [rt]cmd =0x44504543, len=24
3,834,239 >>> mbox cmd response data (40 bytes)
3,834,240 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,717 UART: [rt]cmd =0x44504543, len=24
3,889,960 >>> mbox cmd response data (40 bytes)
3,889,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,542 UART: [rt]cmd =0x44504543, len=24
3,945,725 >>> mbox cmd response data (40 bytes)
3,945,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,165 UART: [rt]cmd =0x44504543, len=24
4,000,738 >>> mbox cmd response data (40 bytes)
4,000,739 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,030,272 UART: [rt]cmd =0x44504543, len=24
4,056,635 >>> mbox cmd response data (40 bytes)
4,056,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,241 UART: [rt]cmd =0x44504543, len=24
4,112,476 >>> mbox cmd response data (40 bytes)
4,112,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,162 UART: [rt]cmd =0x44504543, len=24
4,149,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 ready_for_fw is high
1,055,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,227 >>> mbox cmd response: success
2,684,279 UART:
2,684,295 UART: Running Caliptra FMC ...
2,684,703 UART:
2,684,757 UART: [state] CFI Enabled
2,695,406 UART: [fht] FMC Alias Private Key: 7
2,803,747 UART: [art] Extend RT PCRs Done
2,804,175 UART: [art] Lock RT PCRs Done
2,805,503 UART: [art] Populate DV Done
2,813,572 UART: [fht] FMC Alias Private Key: 7
2,814,616 UART: [art] Derive CDI
2,814,896 UART: [art] Store in in slot 0x4
2,900,623 UART: [art] Derive Key Pair
2,900,983 UART: [art] Store priv key in slot 0x5
2,914,351 UART: [art] Derive Key Pair - Done
2,929,291 UART: [art] Signing Cert with AUTHO
2,929,771 UART: RITY.KEYID = 7
2,944,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,638 UART: [art] PUB.X = 8B9A17D2D5FF751952A4F7C4BC7025B1E38A5BEE75FA64CDAD304919511A7D476E388D6B2652923ED31779FDEAC6329F
2,952,418 UART: [art] PUB.Y = 061ACA78D33A39EAB90DD8E2E94A27F280605D27E6048E08FF828B23C968B46FC9EEC79408453471B6C32C797FB58D49
2,959,357 UART: [art] SIG.R = AC5E97FDD9260E1EBF2F860DA43D2982C9CA4467FC8EF89E25A0C9BCA5D890C2461DF915D675C4D35DCF5E870120CF15
2,966,136 UART: [art] SIG.S = 7B61822C5EE782E1F5279B9B8719AC16358485E9E977B864F3C075F946022694536368329F90C2D89B0C0AF9B739A855
2,989,644 UART: Caliptra RT
2,989,897 UART: [state] CFI Enabled
3,096,752 UART: [rt] RT listening for mailbox commands...
3,097,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,254 UART: [rt]cmd =0x44504543, len=24
3,153,901 >>> mbox cmd response data (40 bytes)
3,153,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,561 UART: [rt]cmd =0x44504543, len=24
3,210,158 >>> mbox cmd response data (40 bytes)
3,210,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,660 UART: [rt]cmd =0x44504543, len=24
3,265,813 >>> mbox cmd response data (40 bytes)
3,265,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,181 UART: [rt]cmd =0x44504543, len=24
3,321,310 >>> mbox cmd response data (40 bytes)
3,321,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,784 UART: [rt]cmd =0x44504543, len=24
3,377,071 >>> mbox cmd response data (40 bytes)
3,377,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,325 UART: [rt]cmd =0x44504543, len=24
3,432,450 >>> mbox cmd response data (40 bytes)
3,432,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,862 UART: [rt]cmd =0x44504543, len=24
3,487,887 >>> mbox cmd response data (40 bytes)
3,487,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,401 UART: [rt]cmd =0x44504543, len=24
3,543,654 >>> mbox cmd response data (40 bytes)
3,543,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,246 UART: [rt]cmd =0x44504543, len=24
3,599,885 >>> mbox cmd response data (40 bytes)
3,599,886 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,201 UART: [rt]cmd =0x44504543, len=24
3,655,544 >>> mbox cmd response data (40 bytes)
3,655,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,066 UART: [rt]cmd =0x44504543, len=24
3,711,341 >>> mbox cmd response data (40 bytes)
3,711,342 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,941 UART: [rt]cmd =0x44504543, len=24
3,767,130 >>> mbox cmd response data (40 bytes)
3,767,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,580 UART: [rt]cmd =0x44504543, len=24
3,822,689 >>> mbox cmd response data (40 bytes)
3,822,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,169 UART: [rt]cmd =0x44504543, len=24
3,878,548 >>> mbox cmd response data (40 bytes)
3,878,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,194 UART: [rt]cmd =0x44504543, len=24
3,934,645 >>> mbox cmd response data (40 bytes)
3,934,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,313 UART: [rt]cmd =0x44504543, len=24
3,971,674 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,047 UART: [kat] SHA2-512-ACC
905,948 UART: [kat] ECC-384
915,725 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,716 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 ready_for_fw is high
1,174,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,235 UART: [fwproc] Wait for Commands...
1,282,972 UART: [fwproc] Recv command 0x46574c44
1,283,705 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,852 >>> mbox cmd response: success
2,775,079 UART: [afmc] ++
2,775,247 UART: [afmc] CDI.KEYID = 6
2,775,610 UART: [afmc] SUBJECT.KEYID = 7
2,776,036 UART: [afmc] AUTHORITY.KEYID = 5
2,812,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,766 UART: [afmc] --
2,855,710 UART: [cold-reset] --
2,856,516 UART: [state] Locking Datavault
2,857,813 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,417 UART: [state] Locking ICCM
2,859,059 UART: [exit] Launching FMC @ 0x40000130
2,864,388 UART:
2,864,404 UART: Running Caliptra FMC ...
2,864,812 UART:
2,864,955 UART: [state] CFI Enabled
2,875,474 UART: [fht] FMC Alias Private Key: 7
2,983,415 UART: [art] Extend RT PCRs Done
2,983,843 UART: [art] Lock RT PCRs Done
2,985,697 UART: [art] Populate DV Done
2,993,772 UART: [fht] FMC Alias Private Key: 7
2,994,730 UART: [art] Derive CDI
2,995,010 UART: [art] Store in in slot 0x4
3,081,317 UART: [art] Derive Key Pair
3,081,677 UART: [art] Store priv key in slot 0x5
3,094,451 UART: [art] Derive Key Pair - Done
3,108,889 UART: [art] Signing Cert with AUTHO
3,109,369 UART: RITY.KEYID = 7
3,124,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,106 UART: [art] PUB.X = 2CE46F94C6FBB30E06DA575D1B5E8B0BE41E22E6755C09D903CE21E3D2723C8E3E9F7BC96EE70338290EEB28D07109CD
3,131,866 UART: [art] PUB.Y = 72580CC382C43AE0FAD4FEB1CC5C7A8B3039CC6577931996B21F5D15A33578A893AE4B07387A657BA63D12041445ACFE
3,138,813 UART: [art] SIG.R = 1B1F6229EC290F958A7FE05E5B58D55129CE62E7CBE0138BCAFED5E3BB0E08CF7C17E6468B464EA426EC0FB8F5A4B996
3,145,591 UART: [art] SIG.S = 1FD243B3DC74218ED88593C4A69BCDE001BAAF7E3E5F39157393C2EA57D5B53F7C37C6581C764C55D54E07C5E416A8EF
3,169,456 UART: Caliptra RT
3,169,801 UART: [state] CFI Enabled
3,277,378 UART: [rt] RT listening for mailbox commands...
3,278,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,838 UART: [rt]cmd =0x44504543, len=24
3,333,795 >>> mbox cmd response data (40 bytes)
3,333,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,283 UART: [rt]cmd =0x44504543, len=24
3,389,676 >>> mbox cmd response data (40 bytes)
3,389,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,246 UART: [rt]cmd =0x44504543, len=24
3,445,659 >>> mbox cmd response data (40 bytes)
3,445,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,271 UART: [rt]cmd =0x44504543, len=24
3,501,606 >>> mbox cmd response data (40 bytes)
3,501,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,848 UART: [rt]cmd =0x44504543, len=24
3,557,295 >>> mbox cmd response data (40 bytes)
3,557,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,689 UART: [rt]cmd =0x44504543, len=24
3,613,034 >>> mbox cmd response data (40 bytes)
3,613,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,512 UART: [rt]cmd =0x44504543, len=24
3,669,115 >>> mbox cmd response data (40 bytes)
3,669,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,569 UART: [rt]cmd =0x44504543, len=24
3,724,596 >>> mbox cmd response data (40 bytes)
3,724,597 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,010 UART: [rt]cmd =0x44504543, len=24
3,779,763 >>> mbox cmd response data (40 bytes)
3,779,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,181 UART: [rt]cmd =0x44504543, len=24
3,835,298 >>> mbox cmd response data (40 bytes)
3,835,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,070 UART: [rt]cmd =0x44504543, len=24
3,891,293 >>> mbox cmd response data (40 bytes)
3,891,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,055 UART: [rt]cmd =0x44504543, len=24
3,946,952 >>> mbox cmd response data (40 bytes)
3,946,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,552 UART: [rt]cmd =0x44504543, len=24
4,003,115 >>> mbox cmd response data (40 bytes)
4,003,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,557 UART: [rt]cmd =0x44504543, len=24
4,058,728 >>> mbox cmd response data (40 bytes)
4,058,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,986 UART: [rt]cmd =0x44504543, len=24
4,113,983 >>> mbox cmd response data (40 bytes)
4,113,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,433 UART: [rt]cmd =0x44504543, len=24
4,150,648 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,127 ready_for_fw is high
1,056,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,238 >>> mbox cmd response: success
2,685,158 UART:
2,685,174 UART: Running Caliptra FMC ...
2,685,582 UART:
2,685,725 UART: [state] CFI Enabled
2,696,210 UART: [fht] FMC Alias Private Key: 7
2,803,811 UART: [art] Extend RT PCRs Done
2,804,239 UART: [art] Lock RT PCRs Done
2,805,637 UART: [art] Populate DV Done
2,813,976 UART: [fht] FMC Alias Private Key: 7
2,815,066 UART: [art] Derive CDI
2,815,346 UART: [art] Store in in slot 0x4
2,900,917 UART: [art] Derive Key Pair
2,901,277 UART: [art] Store priv key in slot 0x5
2,914,781 UART: [art] Derive Key Pair - Done
2,929,623 UART: [art] Signing Cert with AUTHO
2,930,103 UART: RITY.KEYID = 7
2,945,135 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,900 UART: [art] PUB.X = A99B73089B4FC11659D94954947ECEA8F89728C62715B7371AAE4288C5402DE7D9D17C5AC0C79D6703946808F3AF67B5
2,952,659 UART: [art] PUB.Y = 13E29085AE77E223173481B369E487CC9F07028B6101BB628EC17D0491D82F342452AE66648A7A143A58C59C74F63C2B
2,959,589 UART: [art] SIG.R = 086125350B4E879312B70B8D9FBD518FDF9595E5BD54FF9656491759E73EB68B0A3E5C495274B4BCA4F9869AB85BC916
2,966,349 UART: [art] SIG.S = F0FCF29FD9F8C2B6563F8DC85C7F6431AB65B79D5CFB9B0DF2E556B4AE7CCE7B648FADCC2F5043185882CE656F61A82D
2,989,981 UART: Caliptra RT
2,990,326 UART: [state] CFI Enabled
3,097,615 UART: [rt] RT listening for mailbox commands...
3,098,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,349 UART: [rt]cmd =0x44504543, len=24
3,154,816 >>> mbox cmd response data (40 bytes)
3,154,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,446 UART: [rt]cmd =0x44504543, len=24
3,210,863 >>> mbox cmd response data (40 bytes)
3,210,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,240,325 UART: [rt]cmd =0x44504543, len=24
3,267,150 >>> mbox cmd response data (40 bytes)
3,267,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,616 UART: [rt]cmd =0x44504543, len=24
3,323,025 >>> mbox cmd response data (40 bytes)
3,323,026 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,735 UART: [rt]cmd =0x44504543, len=24
3,379,062 >>> mbox cmd response data (40 bytes)
3,379,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,754 UART: [rt]cmd =0x44504543, len=24
3,435,381 >>> mbox cmd response data (40 bytes)
3,435,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,611 UART: [rt]cmd =0x44504543, len=24
3,491,158 >>> mbox cmd response data (40 bytes)
3,491,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,484 UART: [rt]cmd =0x44504543, len=24
3,546,693 >>> mbox cmd response data (40 bytes)
3,546,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,115 UART: [rt]cmd =0x44504543, len=24
3,602,296 >>> mbox cmd response data (40 bytes)
3,602,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,896 UART: [rt]cmd =0x44504543, len=24
3,658,255 >>> mbox cmd response data (40 bytes)
3,658,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,621 UART: [rt]cmd =0x44504543, len=24
3,713,736 >>> mbox cmd response data (40 bytes)
3,713,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,182 UART: [rt]cmd =0x44504543, len=24
3,769,405 >>> mbox cmd response data (40 bytes)
3,769,406 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,811 UART: [rt]cmd =0x44504543, len=24
3,825,074 >>> mbox cmd response data (40 bytes)
3,825,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,762 UART: [rt]cmd =0x44504543, len=24
3,881,481 >>> mbox cmd response data (40 bytes)
3,881,482 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,875 UART: [rt]cmd =0x44504543, len=24
3,936,882 >>> mbox cmd response data (40 bytes)
3,936,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,320 UART: [rt]cmd =0x44504543, len=24
3,973,563 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,629 UART: [kat] SHA2-256
881,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,675 UART: [kat] ++
885,827 UART: [kat] sha1
889,851 UART: [kat] SHA2-256
891,789 UART: [kat] SHA2-384
894,684 UART: [kat] SHA2-512-ACC
896,585 UART: [kat] ECC-384
902,174 UART: [kat] HMAC-384Kdf
906,838 UART: [kat] LMS
1,475,034 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,243 UART: [fht] Storing FHT @ 0x50003400
1,479,174 UART: [idev] ++
1,479,342 UART: [idev] CDI.KEYID = 6
1,479,702 UART: [idev] SUBJECT.KEYID = 7
1,480,126 UART: [idev] UDS.KEYID = 0
1,480,471 ready_for_fw is high
1,480,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,902 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,493 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,166 UART: [ldev] --
1,586,451 UART: [fwproc] Waiting for Commands...
1,587,074 UART: [fwproc] Received command 0x46574c44
1,587,865 UART: [fwproc] Received Image of size 114332 bytes
2,886,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,128 >>> mbox cmd response: success
3,080,228 UART: [afmc] ++
3,080,396 UART: [afmc] CDI.KEYID = 6
3,080,758 UART: [afmc] SUBJECT.KEYID = 7
3,081,183 UART: [afmc] AUTHORITY.KEYID = 5
3,116,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,308 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,701 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,391 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,264 UART: [afmc] --
3,159,290 UART: [cold-reset] --
3,160,030 UART: [state] Locking Datavault
3,161,245 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,849 UART: [state] Locking ICCM
3,162,315 UART: [exit] Launching FMC @ 0x40000130
3,167,644 UART:
3,167,660 UART: Running Caliptra FMC ...
3,168,068 UART:
3,168,122 UART: [state] CFI Enabled
3,178,707 UART: [fht] FMC Alias Private Key: 7
3,286,678 UART: [art] Extend RT PCRs Done
3,287,106 UART: [art] Lock RT PCRs Done
3,288,602 UART: [art] Populate DV Done
3,296,749 UART: [fht] FMC Alias Private Key: 7
3,297,783 UART: [art] Derive CDI
3,298,063 UART: [art] Store in in slot 0x4
3,383,452 UART: [art] Derive Key Pair
3,383,812 UART: [art] Store priv key in slot 0x5
3,396,766 UART: [art] Derive Key Pair - Done
3,411,632 UART: [art] Signing Cert with AUTHO
3,412,112 UART: RITY.KEYID = 7
3,427,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,143 UART: [art] PUB.X = 79FBAA3AA27CBF7261682E230F93886DBD102650952EA2339AF5C3844A6BE0038B752A1344203D20B556D96804CA5B3A
3,434,904 UART: [art] PUB.Y = 1AF2399E3FCE02B19C606DDE3E12A54193C14FA74096227DA77836AA78ECDE8804BD594FFC40BA518BB7D88316AE807C
3,441,860 UART: [art] SIG.R = 2CD217E55120F621FFE2C9FADD8F0F402CF364942A27CE4409FCEFC9C41493703429AD0AC66A983D226A5CB389FC04B7
3,448,630 UART: [art] SIG.S = ABDDD2D1634C09D55F1679AD4E7B11A315855D7C96C30681E24A4302598450DCC18E8E1D60C0598DBF23EF54762644A7
3,472,448 UART: Caliptra RT
3,472,701 UART: [state] CFI Enabled
3,579,578 UART: [rt] RT listening for mailbox commands...
3,580,248 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,106 UART: [rt]cmd =0x49444550, len=8
3,611,783 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,621 ready_for_fw is high
1,362,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,988 >>> mbox cmd response: success
2,989,288 UART:
2,989,304 UART: Running Caliptra FMC ...
2,989,712 UART:
2,989,766 UART: [state] CFI Enabled
3,000,193 UART: [fht] FMC Alias Private Key: 7
3,108,204 UART: [art] Extend RT PCRs Done
3,108,632 UART: [art] Lock RT PCRs Done
3,110,400 UART: [art] Populate DV Done
3,118,605 UART: [fht] FMC Alias Private Key: 7
3,119,667 UART: [art] Derive CDI
3,119,947 UART: [art] Store in in slot 0x4
3,205,122 UART: [art] Derive Key Pair
3,205,482 UART: [art] Store priv key in slot 0x5
3,218,426 UART: [art] Derive Key Pair - Done
3,233,081 UART: [art] Signing Cert with AUTHO
3,233,561 UART: RITY.KEYID = 7
3,248,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,480 UART: [art] PUB.X = F94ED4B44D3B134FE06B3B7CAFD3D83AF7A9F4ABB3B45DCE9B066CE53DA456766134B73985982F8998C9C8B5CD24FEF4
3,256,267 UART: [art] PUB.Y = 5501F1C31D53B4D37510452EBF77B0AEDD30D6647F2FEEF2A75F83E6C338FF7457CA68F82E165B4BA0842CC41A1E1E1A
3,263,228 UART: [art] SIG.R = D825EA7339CEB3E2878F78368E3D8833EF5DB7C75F9EB9F80862502393DF3D2BF165258F4BB7AD946D5C7133BABC78AC
3,270,007 UART: [art] SIG.S = C408F70C801FB86822163753FB328A952979C24E8E121FE9BA17D9AB726DB361B7B703910C2EB8DC50615A59121C03F4
3,293,759 UART: Caliptra RT
3,294,012 UART: [state] CFI Enabled
3,401,734 UART: [rt] RT listening for mailbox commands...
3,402,404 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,296 UART: [rt]cmd =0x49444550, len=8
3,434,263 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,407 UART: [kat] SHA2-512-ACC
897,308 UART: [kat] ECC-384
902,527 UART: [kat] HMAC-384Kdf
907,147 UART: [kat] LMS
1,475,343 UART: [kat] --
1,475,998 UART: [cold-reset] ++
1,476,474 UART: [fht] Storing FHT @ 0x50003400
1,479,241 UART: [idev] ++
1,479,409 UART: [idev] CDI.KEYID = 6
1,479,769 UART: [idev] SUBJECT.KEYID = 7
1,480,193 UART: [idev] UDS.KEYID = 0
1,480,538 ready_for_fw is high
1,480,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,817 UART: [idev] Erasing UDS.KEYID = 0
1,504,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,169 UART: [idev] --
1,514,238 UART: [ldev] ++
1,514,406 UART: [ldev] CDI.KEYID = 6
1,514,769 UART: [ldev] SUBJECT.KEYID = 5
1,515,195 UART: [ldev] AUTHORITY.KEYID = 7
1,515,658 UART: [ldev] FE.KEYID = 1
1,520,792 UART: [ldev] Erasing FE.KEYID = 1
1,545,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,511 UART: [ldev] --
1,584,788 UART: [fwproc] Waiting for Commands...
1,585,419 UART: [fwproc] Received command 0x46574c44
1,586,210 UART: [fwproc] Received Image of size 114332 bytes
2,882,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,074,467 >>> mbox cmd response: success
3,075,621 UART: [afmc] ++
3,075,789 UART: [afmc] CDI.KEYID = 6
3,076,151 UART: [afmc] SUBJECT.KEYID = 7
3,076,576 UART: [afmc] AUTHORITY.KEYID = 5
3,111,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,699 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,312 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,002 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,977 UART: [afmc] --
3,155,063 UART: [cold-reset] --
3,155,921 UART: [state] Locking Datavault
3,157,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,944 UART: [state] Locking ICCM
3,158,436 UART: [exit] Launching FMC @ 0x40000130
3,163,765 UART:
3,163,781 UART: Running Caliptra FMC ...
3,164,189 UART:
3,164,332 UART: [state] CFI Enabled
3,174,995 UART: [fht] FMC Alias Private Key: 7
3,282,926 UART: [art] Extend RT PCRs Done
3,283,354 UART: [art] Lock RT PCRs Done
3,285,032 UART: [art] Populate DV Done
3,293,279 UART: [fht] FMC Alias Private Key: 7
3,294,423 UART: [art] Derive CDI
3,294,703 UART: [art] Store in in slot 0x4
3,380,452 UART: [art] Derive Key Pair
3,380,812 UART: [art] Store priv key in slot 0x5
3,394,342 UART: [art] Derive Key Pair - Done
3,408,698 UART: [art] Signing Cert with AUTHO
3,409,178 UART: RITY.KEYID = 7
3,424,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,385 UART: [art] PUB.X = DCDF359B4D0D00BB544B8D4B7D9F012A985AA8DD6C4FB9DC025FD0794957C2228F835C93D25CFFE559010E88B24C243C
3,432,132 UART: [art] PUB.Y = FEE1EB52433743BFBDB66E212ADD38DF3D4B461EEAF674A2F8E0BEC41256A039E0E2F2F81A06100C031A134A11693BAF
3,439,091 UART: [art] SIG.R = F6F08EE85489F4FE6D20905CC10708464698987F163FCAB8A81826BCA24C3A8D858E645C37110007563472CB48277CC3
3,445,824 UART: [art] SIG.S = 72EC30FBA1A1CD78B24A7AA6E53ABF20B0A400E6557CC858EA3C6561DC0A68CFA7C3BCBCF587F0C78C97D7BF88449F73
3,469,774 UART: Caliptra RT
3,470,119 UART: [state] CFI Enabled
3,578,836 UART: [rt] RT listening for mailbox commands...
3,579,506 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,172 UART: [rt]cmd =0x49444550, len=8
3,611,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 ready_for_fw is high
1,362,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,231 >>> mbox cmd response: success
2,989,523 UART:
2,989,539 UART: Running Caliptra FMC ...
2,989,947 UART:
2,990,090 UART: [state] CFI Enabled
3,000,873 UART: [fht] FMC Alias Private Key: 7
3,108,108 UART: [art] Extend RT PCRs Done
3,108,536 UART: [art] Lock RT PCRs Done
3,110,012 UART: [art] Populate DV Done
3,118,175 UART: [fht] FMC Alias Private Key: 7
3,119,341 UART: [art] Derive CDI
3,119,621 UART: [art] Store in in slot 0x4
3,205,430 UART: [art] Derive Key Pair
3,205,790 UART: [art] Store priv key in slot 0x5
3,219,304 UART: [art] Derive Key Pair - Done
3,233,866 UART: [art] Signing Cert with AUTHO
3,234,346 UART: RITY.KEYID = 7
3,249,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,355 UART: [art] PUB.X = 41568D5A8E3223AD452F181F3081227257D007196DBE34BEA557FA890040B99A460C415849C5B72621A4B61E27085E51
3,257,082 UART: [art] PUB.Y = 207CDD7784F53C6F5C820064B4ECE81160843D5EF4AD31EEBA5B40C569F492B1ED7D0E2E1DEF7F5D5974C3497BF3233F
3,264,021 UART: [art] SIG.R = A589B52356483CC0641FFCF67556F426F403E5D2531B23E73489A322EF3C23F6E0CBCF6E92587E5ED34559CEDF4EA1FF
3,270,798 UART: [art] SIG.S = 02F0C857E0CB1CAF1E8330165ACC50CF1699B39247F25A1366755147DC08DFAB636D90A5E65304E636C27FFF5D568062
3,294,490 UART: Caliptra RT
3,294,835 UART: [state] CFI Enabled
3,403,440 UART: [rt] RT listening for mailbox commands...
3,404,110 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,298 UART: [rt]cmd =0x49444550, len=8
3,436,267 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
893,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,211 UART: [kat] ++
897,363 UART: [kat] sha1
901,401 UART: [kat] SHA2-256
903,341 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,778 UART: [kat] HMAC-384Kdf
922,288 UART: [kat] LMS
1,170,616 UART: [kat] --
1,171,329 UART: [cold-reset] ++
1,171,757 UART: [fht] FHT @ 0x50003400
1,174,376 UART: [idev] ++
1,174,544 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,328 UART: [idev] UDS.KEYID = 0
1,175,673 ready_for_fw is high
1,175,673 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,335 UART: [idev] Sha1 KeyId Algorithm
1,208,841 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,486 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,247 >>> mbox cmd response: success
2,775,497 UART: [afmc] ++
2,775,665 UART: [afmc] CDI.KEYID = 6
2,776,027 UART: [afmc] SUBJECT.KEYID = 7
2,776,452 UART: [afmc] AUTHORITY.KEYID = 5
2,811,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,270 UART: [afmc] --
2,855,150 UART: [cold-reset] --
2,856,066 UART: [state] Locking Datavault
2,857,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,931 UART: [state] Locking ICCM
2,858,541 UART: [exit] Launching FMC @ 0x40000130
2,863,870 UART:
2,863,886 UART: Running Caliptra FMC ...
2,864,294 UART:
2,864,348 UART: [state] CFI Enabled
2,874,951 UART: [fht] FMC Alias Private Key: 7
2,982,938 UART: [art] Extend RT PCRs Done
2,983,366 UART: [art] Lock RT PCRs Done
2,984,946 UART: [art] Populate DV Done
2,993,161 UART: [fht] FMC Alias Private Key: 7
2,994,159 UART: [art] Derive CDI
2,994,439 UART: [art] Store in in slot 0x4
3,079,882 UART: [art] Derive Key Pair
3,080,242 UART: [art] Store priv key in slot 0x5
3,093,576 UART: [art] Derive Key Pair - Done
3,108,451 UART: [art] Signing Cert with AUTHO
3,108,931 UART: RITY.KEYID = 7
3,124,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,836 UART: [art] PUB.X = 55AACADD4A23743C2B9994F003937D1576332585853050C58B33C2A2A0BF767513015AE30B9DC4A5526FBB6485B36326
3,131,591 UART: [art] PUB.Y = A90B864384DF8ABCB252CFE1C6DAF92346D10EA6C33239832D6BFD3AE0981578FC622DEF09E66E8DD00BF3ECD9411B7A
3,138,549 UART: [art] SIG.R = C24DF1A6EE03AB741537DE27B6850A9069E0E2F028039DDB62CE8E7C71F77619641690AAA1ED6A7531F578B4863C116E
3,145,314 UART: [art] SIG.S = 886ECE3DFF3300CB952F8F5CD176692DA06A030078EA0BE24FBF36CD2B1C690DD382BDFCF01968E0B3B6CA89F3DEDD6C
3,169,490 UART: Caliptra RT
3,169,743 UART: [state] CFI Enabled
3,276,675 UART: [rt] RT listening for mailbox commands...
3,277,345 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,987 UART: [rt]cmd =0x49444550, len=8
3,308,898 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,107 ready_for_fw is high
1,061,107 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,024 >>> mbox cmd response: success
2,688,700 UART:
2,688,716 UART: Running Caliptra FMC ...
2,689,124 UART:
2,689,178 UART: [state] CFI Enabled
2,699,945 UART: [fht] FMC Alias Private Key: 7
2,807,610 UART: [art] Extend RT PCRs Done
2,808,038 UART: [art] Lock RT PCRs Done
2,809,758 UART: [art] Populate DV Done
2,817,835 UART: [fht] FMC Alias Private Key: 7
2,818,931 UART: [art] Derive CDI
2,819,211 UART: [art] Store in in slot 0x4
2,904,850 UART: [art] Derive Key Pair
2,905,210 UART: [art] Store priv key in slot 0x5
2,918,150 UART: [art] Derive Key Pair - Done
2,932,942 UART: [art] Signing Cert with AUTHO
2,933,422 UART: RITY.KEYID = 7
2,948,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,341 UART: [art] PUB.X = 721879ACCD2F548A29C7107088CA8BB804467B799CD096B4DC3090F8103F81DED8D3131AC577C4E245AC8952AB9EE50F
2,956,111 UART: [art] PUB.Y = 2A7A65783A81C475CE2B5412CC5885220EA0543DF27062F41D13DFA604F53DE57BD674C9DD7BA9D3B68743886DE8BDBC
2,963,065 UART: [art] SIG.R = FBC677CDA23858BC53B789BB212C9C2999A1E3E8A983928FB88E513C5C6B7B1EB4DE43CA35F779E4EF576458C229B429
2,969,845 UART: [art] SIG.S = EBB0C628535C11A82FE98542151638C397A20CB4461A22AD1B41917F02A914B1AF6D9924C37C2CF052EB5C164D4216FB
2,993,160 UART: Caliptra RT
2,993,413 UART: [state] CFI Enabled
3,101,243 UART: [rt] RT listening for mailbox commands...
3,101,913 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,849 UART: [rt]cmd =0x49444550, len=8
3,133,926 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,879 UART: [kat] SHA2-512-ACC
908,780 UART: [kat] ECC-384
918,871 UART: [kat] HMAC-384Kdf
923,565 UART: [kat] LMS
1,171,893 UART: [kat] --
1,172,672 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,809 UART: [idev] ++
1,175,977 UART: [idev] CDI.KEYID = 6
1,176,337 UART: [idev] SUBJECT.KEYID = 7
1,176,761 UART: [idev] UDS.KEYID = 0
1,177,106 ready_for_fw is high
1,177,106 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,202,206 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,576 UART: [ldev] ++
1,211,744 UART: [ldev] CDI.KEYID = 6
1,212,107 UART: [ldev] SUBJECT.KEYID = 5
1,212,533 UART: [ldev] AUTHORITY.KEYID = 7
1,212,996 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,283,891 UART: [fwproc] Wait for Commands...
1,284,699 UART: [fwproc] Recv command 0x46574c44
1,285,427 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,450 >>> mbox cmd response: success
2,776,616 UART: [afmc] ++
2,776,784 UART: [afmc] CDI.KEYID = 6
2,777,146 UART: [afmc] SUBJECT.KEYID = 7
2,777,571 UART: [afmc] AUTHORITY.KEYID = 5
2,813,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,314 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,033 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,685 UART: [afmc] --
2,856,799 UART: [cold-reset] --
2,857,825 UART: [state] Locking Datavault
2,859,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,798 UART: [state] Locking ICCM
2,860,414 UART: [exit] Launching FMC @ 0x40000130
2,865,743 UART:
2,865,759 UART: Running Caliptra FMC ...
2,866,167 UART:
2,866,310 UART: [state] CFI Enabled
2,876,963 UART: [fht] FMC Alias Private Key: 7
2,985,188 UART: [art] Extend RT PCRs Done
2,985,616 UART: [art] Lock RT PCRs Done
2,986,944 UART: [art] Populate DV Done
2,995,139 UART: [fht] FMC Alias Private Key: 7
2,996,309 UART: [art] Derive CDI
2,996,589 UART: [art] Store in in slot 0x4
3,082,198 UART: [art] Derive Key Pair
3,082,558 UART: [art] Store priv key in slot 0x5
3,095,906 UART: [art] Derive Key Pair - Done
3,110,574 UART: [art] Signing Cert with AUTHO
3,111,054 UART: RITY.KEYID = 7
3,126,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,793 UART: [art] PUB.X = 3414C4197988310F7A8017BED00EE7A0073E121E2626672A57C4431922BFBF21EB613C3A0BB6CEFB412A8B0A3115F27A
3,133,550 UART: [art] PUB.Y = DA618B0130FF47BB1ED8262021A78AA023DBB989B0B9C2C6407B478C523B27E5114616FDA1F74C01AC7664D3CBB62D03
3,140,499 UART: [art] SIG.R = C9E3C35B043E1FEB5382DAFB79A8BAC0610DA95F2D934679FB442F9D1C1BE45722C04C94DF2A1A59ED69B9BA4F0E0DBA
3,147,281 UART: [art] SIG.S = 06744504EDAF254AB30839C47C1ACC8EA582328FDE47BEB5D0754F48C4C5201BBBFFF05728A0C14DA9443FD1CA630BFD
3,171,072 UART: Caliptra RT
3,171,417 UART: [state] CFI Enabled
3,279,366 UART: [rt] RT listening for mailbox commands...
3,280,036 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,846 UART: [rt]cmd =0x49444550, len=8
3,311,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,754 ready_for_fw is high
1,059,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,141 >>> mbox cmd response: success
2,690,277 UART:
2,690,293 UART: Running Caliptra FMC ...
2,690,701 UART:
2,690,844 UART: [state] CFI Enabled
2,701,157 UART: [fht] FMC Alias Private Key: 7
2,809,472 UART: [art] Extend RT PCRs Done
2,809,900 UART: [art] Lock RT PCRs Done
2,811,626 UART: [art] Populate DV Done
2,819,787 UART: [fht] FMC Alias Private Key: 7
2,820,741 UART: [art] Derive CDI
2,821,021 UART: [art] Store in in slot 0x4
2,907,204 UART: [art] Derive Key Pair
2,907,564 UART: [art] Store priv key in slot 0x5
2,920,426 UART: [art] Derive Key Pair - Done
2,935,071 UART: [art] Signing Cert with AUTHO
2,935,551 UART: RITY.KEYID = 7
2,950,703 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,468 UART: [art] PUB.X = 9EAC6D634F23DBFCBAE707673F61B857AA9DE83C034E1FE2995DD06A1205FBD4F8B9CCA80A28EC6A5F6CE7CCB8C55E8B
2,958,256 UART: [art] PUB.Y = 0C89DE8C7FB62E6FB79F4640734DF2459C5746E2E7B0909A04436BC966464EB054B89632AA5592F95D3817282A3A3B19
2,965,196 UART: [art] SIG.R = B77ED09AED13F50FBC8D37958B2167638C0D8881F765AB277EC553212358A79BADA3D6BEE4A070D44F479532D03FD6F7
2,971,968 UART: [art] SIG.S = 50DB57815770DB62CB8112AC6A4DC1066BF9A17994626BAC311E867D7197C14669AF38A1426E830C1088D3EF942E9A34
2,996,057 UART: Caliptra RT
2,996,402 UART: [state] CFI Enabled
3,104,505 UART: [rt] RT listening for mailbox commands...
3,105,175 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,947 UART: [rt]cmd =0x49444550, len=8
3,136,870 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,383 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 ready_for_fw is high
1,174,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,611 UART: [idev] Erasing UDS.KEYID = 0
1,199,895 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,788 UART: [ldev] ++
1,209,956 UART: [ldev] CDI.KEYID = 6
1,210,320 UART: [ldev] SUBJECT.KEYID = 5
1,210,747 UART: [ldev] AUTHORITY.KEYID = 7
1,211,210 UART: [ldev] FE.KEYID = 1
1,216,528 UART: [ldev] Erasing FE.KEYID = 1
1,242,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,464 UART: [ldev] --
1,281,968 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,402 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,809 >>> mbox cmd response: success
2,774,928 UART: [afmc] ++
2,775,096 UART: [afmc] CDI.KEYID = 6
2,775,459 UART: [afmc] SUBJECT.KEYID = 7
2,775,885 UART: [afmc] AUTHORITY.KEYID = 5
2,811,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,427 UART: [afmc] --
2,854,351 UART: [cold-reset] --
2,855,353 UART: [state] Locking Datavault
2,856,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,136 UART: [state] Locking ICCM
2,857,672 UART: [exit] Launching FMC @ 0x40000130
2,863,001 UART:
2,863,017 UART: Running Caliptra FMC ...
2,863,425 UART:
2,863,479 UART: [state] CFI Enabled
2,873,768 UART: [fht] FMC Alias Private Key: 7
2,981,291 UART: [art] Extend RT PCRs Done
2,981,719 UART: [art] Lock RT PCRs Done
2,983,661 UART: [art] Populate DV Done
2,992,142 UART: [fht] FMC Alias Private Key: 7
2,993,096 UART: [art] Derive CDI
2,993,376 UART: [art] Store in in slot 0x4
3,079,401 UART: [art] Derive Key Pair
3,079,761 UART: [art] Store priv key in slot 0x5
3,092,905 UART: [art] Derive Key Pair - Done
3,107,338 UART: [art] Signing Cert with AUTHO
3,107,818 UART: RITY.KEYID = 7
3,123,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,779 UART: [art] PUB.X = AE07EF32A75A0A3007DC9E4EBCDAB0B7A5D8ADE03BE1D744B6381B60D0B1BC8EB8FDC5A21A09887EA16F4C88B0088C6F
3,130,562 UART: [art] PUB.Y = 3906DE49063272651EEC5DD2D37B548926F85DE8AC5918227359B4FF940FC2F55E6971D1B3982892CD01008C91A20E21
3,137,469 UART: [art] SIG.R = 7B57EFA5C71D792DC33B5181EEEBE92E851780EB473E6BEEE9920A9EF7A743CB39F52FE971B4183FB43611DA7AC5C1B5
3,144,254 UART: [art] SIG.S = B81855EF9B0F973862D42ED5B56F8F0191589293A0DC27C94B4EED1749E87DE97F3807324609E73DCA0DB1611979DE47
3,168,378 UART: Caliptra RT
3,168,631 UART: [state] CFI Enabled
3,276,168 UART: [rt] RT listening for mailbox commands...
3,276,838 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,750 UART: [rt]cmd =0x49444550, len=8
3,308,603 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,632 ready_for_fw is high
1,056,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,777 >>> mbox cmd response: success
2,685,567 UART:
2,685,583 UART: Running Caliptra FMC ...
2,685,991 UART:
2,686,045 UART: [state] CFI Enabled
2,696,958 UART: [fht] FMC Alias Private Key: 7
2,804,663 UART: [art] Extend RT PCRs Done
2,805,091 UART: [art] Lock RT PCRs Done
2,806,759 UART: [art] Populate DV Done
2,814,800 UART: [fht] FMC Alias Private Key: 7
2,815,894 UART: [art] Derive CDI
2,816,174 UART: [art] Store in in slot 0x4
2,901,469 UART: [art] Derive Key Pair
2,901,829 UART: [art] Store priv key in slot 0x5
2,914,927 UART: [art] Derive Key Pair - Done
2,929,707 UART: [art] Signing Cert with AUTHO
2,930,187 UART: RITY.KEYID = 7
2,945,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,134 UART: [art] PUB.X = 802A38B55E13C8C51A029FB82B434ECF038D872D0A21874EB9CF71F25B5B66586ECFDBF710DBF8A5B38AF4EEAC429560
2,952,911 UART: [art] PUB.Y = 765B5BAE12C25BC108CCB54CEC10D2C7ACDC61C405E47DF59D4AAFCB96A5F51BF74BAE94F5976349405ECAA3A26543EC
2,959,881 UART: [art] SIG.R = 7B1CAC19370E1A467979E528946E87241016A416A569579477199F90E3A323E0323A0689A215DDBF9892509C6449E3FC
2,966,631 UART: [art] SIG.S = 680DE8067468E1353BDD9BE83ED21EEEDF3E85990F0D9037F7CBD92D9B0DAB33D01C27A7E20CA992009380E6E75C9EEE
2,990,340 UART: Caliptra RT
2,990,593 UART: [state] CFI Enabled
3,097,924 UART: [rt] RT listening for mailbox commands...
3,098,594 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,398 UART: [rt]cmd =0x49444550, len=8
3,130,279 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,009 UART: [state] LifecycleState = Unprovisioned
86,664 UART: [state] DebugLocked = No
87,364 UART: [state] WD Timer not started. Device not locked for debugging
88,569 UART: [kat] SHA2-256
892,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,248 UART: [kat] ++
896,400 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
905,207 UART: [kat] SHA2-512-ACC
907,108 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,868 UART: [cold-reset] ++
1,171,322 UART: [fht] FHT @ 0x50003400
1,173,984 UART: [idev] ++
1,174,152 UART: [idev] CDI.KEYID = 6
1,174,513 UART: [idev] SUBJECT.KEYID = 7
1,174,938 UART: [idev] UDS.KEYID = 0
1,175,284 ready_for_fw is high
1,175,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,774 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,569 UART: [ldev] ++
1,210,737 UART: [ldev] CDI.KEYID = 6
1,211,101 UART: [ldev] SUBJECT.KEYID = 5
1,211,528 UART: [ldev] AUTHORITY.KEYID = 7
1,211,991 UART: [ldev] FE.KEYID = 1
1,217,291 UART: [ldev] Erasing FE.KEYID = 1
1,244,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,863 UART: [ldev] --
1,283,245 UART: [fwproc] Wait for Commands...
1,283,820 UART: [fwproc] Recv command 0x46574c44
1,284,553 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,292 >>> mbox cmd response: success
2,774,535 UART: [afmc] ++
2,774,703 UART: [afmc] CDI.KEYID = 6
2,775,066 UART: [afmc] SUBJECT.KEYID = 7
2,775,492 UART: [afmc] AUTHORITY.KEYID = 5
2,810,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,988 UART: [afmc] --
2,854,014 UART: [cold-reset] --
2,855,000 UART: [state] Locking Datavault
2,856,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,805 UART: [state] Locking ICCM
2,857,391 UART: [exit] Launching FMC @ 0x40000130
2,862,720 UART:
2,862,736 UART: Running Caliptra FMC ...
2,863,144 UART:
2,863,287 UART: [state] CFI Enabled
2,873,928 UART: [fht] FMC Alias Private Key: 7
2,981,577 UART: [art] Extend RT PCRs Done
2,982,005 UART: [art] Lock RT PCRs Done
2,983,601 UART: [art] Populate DV Done
2,991,632 UART: [fht] FMC Alias Private Key: 7
2,992,806 UART: [art] Derive CDI
2,993,086 UART: [art] Store in in slot 0x4
3,078,741 UART: [art] Derive Key Pair
3,079,101 UART: [art] Store priv key in slot 0x5
3,091,965 UART: [art] Derive Key Pair - Done
3,106,462 UART: [art] Signing Cert with AUTHO
3,106,942 UART: RITY.KEYID = 7
3,122,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,355 UART: [art] PUB.X = 1DBAD2D8F025E8EC2800CEACDFC29019EBF8639FB9945AE23E5696B720D41FFFDB6C5AB30F35A79D00FC7EBB709AE8D6
3,130,106 UART: [art] PUB.Y = C6A39BC3883760B7A6A0A4C84592C9D2C3B8DE274BD59865C7D0ED4A68CD1F9D2D44ADC79FD595DBA00ADCBD389918D8
3,137,073 UART: [art] SIG.R = AAB425B0AEFE274D242A2E6CA3081D7876939D573B4D4427729C56CCDDCA986B6417991ACAEC7E0B1AC475ED9A911097
3,143,849 UART: [art] SIG.S = AE1B6CA90F46191E68C9FEA48C0E09EDD872F42CF1603ACB08FE0ADB3D4C8CAF27B225EE45E18F836B42F37E2DB5EF8B
3,167,871 UART: Caliptra RT
3,168,216 UART: [state] CFI Enabled
3,276,824 UART: [rt] RT listening for mailbox commands...
3,277,494 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,530 UART: [rt]cmd =0x49444550, len=8
3,309,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,037 ready_for_fw is high
1,056,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,104 >>> mbox cmd response: success
2,684,266 UART:
2,684,282 UART: Running Caliptra FMC ...
2,684,690 UART:
2,684,833 UART: [state] CFI Enabled
2,695,300 UART: [fht] FMC Alias Private Key: 7
2,803,387 UART: [art] Extend RT PCRs Done
2,803,815 UART: [art] Lock RT PCRs Done
2,805,143 UART: [art] Populate DV Done
2,813,412 UART: [fht] FMC Alias Private Key: 7
2,814,590 UART: [art] Derive CDI
2,814,870 UART: [art] Store in in slot 0x4
2,900,559 UART: [art] Derive Key Pair
2,900,919 UART: [art] Store priv key in slot 0x5
2,914,245 UART: [art] Derive Key Pair - Done
2,929,093 UART: [art] Signing Cert with AUTHO
2,929,573 UART: RITY.KEYID = 7
2,945,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,012 UART: [art] PUB.X = 05229545C9F3A7A4017A3EFB8CE655673BAF8E8B746EFA88BBF933DC6550FE95618A78D377D7E0DAD047C2CD5C077027
2,952,783 UART: [art] PUB.Y = 657A275C441257F27A5E23625E485C3B9CA0583ED06DE0D819F0DDDFE3E33D98548762D76EBC6864383A24C72F7FB959
2,959,735 UART: [art] SIG.R = 7C52B68280413757A14D42814482CA0D349911B7A296CF262A83E7D0753F3A90AF01E7CF06C0AA317D626D2181F1245A
2,966,490 UART: [art] SIG.S = A8782765DE98C53DB256E40E16ECB1DDD5E1F7B79207BD07A7A53BF83C7363E40E6E2CB6E7CF6000AFA72D4DFE8421CA
2,990,625 UART: Caliptra RT
2,990,970 UART: [state] CFI Enabled
3,098,587 UART: [rt] RT listening for mailbox commands...
3,099,257 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,075 UART: [rt]cmd =0x49444550, len=8
3,131,072 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,530 UART: [kat] SHA2-512-ACC
897,431 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,226 UART: [kat] LMS
1,475,422 UART: [kat] --
1,476,493 UART: [cold-reset] ++
1,476,885 UART: [fht] Storing FHT @ 0x50003400
1,479,622 UART: [idev] ++
1,479,790 UART: [idev] CDI.KEYID = 6
1,480,150 UART: [idev] SUBJECT.KEYID = 7
1,480,574 UART: [idev] UDS.KEYID = 0
1,480,919 ready_for_fw is high
1,480,919 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,776 UART: [idev] Erasing UDS.KEYID = 0
1,505,404 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,908 UART: [idev] --
1,514,947 UART: [ldev] ++
1,515,115 UART: [ldev] CDI.KEYID = 6
1,515,478 UART: [ldev] SUBJECT.KEYID = 5
1,515,904 UART: [ldev] AUTHORITY.KEYID = 7
1,516,367 UART: [ldev] FE.KEYID = 1
1,521,395 UART: [ldev] Erasing FE.KEYID = 1
1,546,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,906 UART: [ldev] --
1,585,305 UART: [fwproc] Waiting for Commands...
1,586,014 UART: [fwproc] Received command 0x46574c44
1,586,805 UART: [fwproc] Received Image of size 114332 bytes
2,886,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,243 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,374 >>> mbox cmd response: success
3,078,590 UART: [afmc] ++
3,078,758 UART: [afmc] CDI.KEYID = 6
3,079,120 UART: [afmc] SUBJECT.KEYID = 7
3,079,545 UART: [afmc] AUTHORITY.KEYID = 5
3,114,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,444 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,837 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,527 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,344 UART: [afmc] --
3,158,236 UART: [cold-reset] --
3,159,040 UART: [state] Locking Datavault
3,160,559 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,163 UART: [state] Locking ICCM
3,161,709 UART: [exit] Launching FMC @ 0x40000130
3,167,038 UART:
3,167,054 UART: Running Caliptra FMC ...
3,167,462 UART:
3,167,516 UART: [state] CFI Enabled
3,177,971 UART: [fht] FMC Alias Private Key: 7
3,285,846 UART: [art] Extend RT PCRs Done
3,286,274 UART: [art] Lock RT PCRs Done
3,287,830 UART: [art] Populate DV Done
3,296,313 UART: [fht] FMC Alias Private Key: 7
3,297,287 UART: [art] Derive CDI
3,297,567 UART: [art] Store in in slot 0x4
3,383,662 UART: [art] Derive Key Pair
3,384,022 UART: [art] Store priv key in slot 0x5
3,396,772 UART: [art] Derive Key Pair - Done
3,411,617 UART: [art] Signing Cert with AUTHO
3,412,097 UART: RITY.KEYID = 7
3,427,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,982 UART: [art] PUB.X = 511D4DC96ABCAEA64E44B252951DEBCDCF5F82293EF39DB939B4380D1110C75FED4C2723A0534AA1C92B2B238A09A4AE
3,434,764 UART: [art] PUB.Y = 8CA402AF7B06DA50B04B240DDE0CEF2ED2A9A96EAE3734C56BAC91947F76BB4373D886A180AD748A76C28E4423C1AE92
3,441,718 UART: [art] SIG.R = CEF7E66944EA66DB62D2D9C08542D2D434CCCF0044062629BA7443F450857F3D0105CC4C0C81C6242254CE7213FE9AF7
3,448,458 UART: [art] SIG.S = DA91D8D3957267DF195259B10B85B8A760BCB2E15FF4609ED7984B32C6D0280E7EA0529B50FE2511A306D0DF54DE146D
3,472,316 UART: Caliptra RT
3,472,569 UART: [state] CFI Enabled
3,579,911 UART: [rt] RT listening for mailbox commands...
3,580,581 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,693 UART: [rt]cmd =0x52564348, len=36
3,611,936 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,645 ready_for_fw is high
1,362,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,406 >>> mbox cmd response: success
2,988,404 UART:
2,988,420 UART: Running Caliptra FMC ...
2,988,828 UART:
2,988,882 UART: [state] CFI Enabled
2,999,289 UART: [fht] FMC Alias Private Key: 7
3,107,526 UART: [art] Extend RT PCRs Done
3,107,954 UART: [art] Lock RT PCRs Done
3,109,384 UART: [art] Populate DV Done
3,117,419 UART: [fht] FMC Alias Private Key: 7
3,118,347 UART: [art] Derive CDI
3,118,627 UART: [art] Store in in slot 0x4
3,204,338 UART: [art] Derive Key Pair
3,204,698 UART: [art] Store priv key in slot 0x5
3,217,758 UART: [art] Derive Key Pair - Done
3,232,533 UART: [art] Signing Cert with AUTHO
3,233,013 UART: RITY.KEYID = 7
3,247,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,630 UART: [art] PUB.X = 19557E2AF0FCB52A9C8BE2E9C52C6E5E962840BB6D07CB49F2CE62F9B71BF763D6DE6B229BBC629FCCFE76002F77C6A4
3,255,397 UART: [art] PUB.Y = 544CCEA3AB6588631375667A220A4B2D12E701F4EB990B4DF6B2C5AFB002FE369B6BA0C891C8753E023C5029661F3320
3,262,334 UART: [art] SIG.R = A30C209B7197FCB1F87A3BCD0CE148C4AC521EF94C1C4D8666E9D8F70A242368C69E1C73CD61220D0438777263DB5594
3,269,093 UART: [art] SIG.S = B434F0F0893E59E06C0FE6A12FD55218287A04407694349CFD32B62495B364D3C8536DA08F1218EF63A047AFC175F9F7
3,292,246 UART: Caliptra RT
3,292,499 UART: [state] CFI Enabled
3,401,431 UART: [rt] RT listening for mailbox commands...
3,402,101 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,003 UART: [rt]cmd =0x52564348, len=36
3,433,208 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,696 UART: [kat] SHA2-256
892,634 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,576 UART: [cold-reset] ++
1,477,002 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,141 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,195 UART: [ldev] --
1,586,502 UART: [fwproc] Waiting for Commands...
1,587,157 UART: [fwproc] Received command 0x46574c44
1,587,948 UART: [fwproc] Received Image of size 114332 bytes
2,885,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,193 >>> mbox cmd response: success
3,079,413 UART: [afmc] ++
3,079,581 UART: [afmc] CDI.KEYID = 6
3,079,943 UART: [afmc] SUBJECT.KEYID = 7
3,080,368 UART: [afmc] AUTHORITY.KEYID = 5
3,116,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,548 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,238 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,107 UART: [afmc] --
3,159,127 UART: [cold-reset] --
3,160,045 UART: [state] Locking Datavault
3,161,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,888 UART: [state] Locking ICCM
3,162,536 UART: [exit] Launching FMC @ 0x40000130
3,167,865 UART:
3,167,881 UART: Running Caliptra FMC ...
3,168,289 UART:
3,168,432 UART: [state] CFI Enabled
3,178,735 UART: [fht] FMC Alias Private Key: 7
3,287,148 UART: [art] Extend RT PCRs Done
3,287,576 UART: [art] Lock RT PCRs Done
3,289,006 UART: [art] Populate DV Done
3,297,401 UART: [fht] FMC Alias Private Key: 7
3,298,559 UART: [art] Derive CDI
3,298,839 UART: [art] Store in in slot 0x4
3,384,336 UART: [art] Derive Key Pair
3,384,696 UART: [art] Store priv key in slot 0x5
3,398,380 UART: [art] Derive Key Pair - Done
3,412,579 UART: [art] Signing Cert with AUTHO
3,413,059 UART: RITY.KEYID = 7
3,428,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,940 UART: [art] PUB.X = B6C913013C4B6028017641EC0212206C05BC7C94B49D544B6214383CCC1AF27A5FFBE894BAC0D4C3EFCDB8CA6DDA7194
3,435,712 UART: [art] PUB.Y = F4CB678B422CAC54A0B68FEB79EC991EE8C484F78B53C2F7AE9EDEB7AC011BEE7DAB2E16935092A4C339D1C8553A7258
3,442,679 UART: [art] SIG.R = BCF4BEF38E38A72AB455EA6D3489FD6A9BF40FA29D0AB5E23CC53FD0918129227E3C8533B5DCEB7C185F3C85CCA1A38F
3,449,467 UART: [art] SIG.S = CDC9CBC923E7E0B4824F997C6245309F1FA684C41DDC7F4593A4062CFDCE32163936E91D38D1720A56B5C4B701F84226
3,473,445 UART: Caliptra RT
3,473,790 UART: [state] CFI Enabled
3,581,868 UART: [rt] RT listening for mailbox commands...
3,582,538 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,558 UART: [rt]cmd =0x52564348, len=36
3,614,021 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,586 ready_for_fw is high
1,362,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,517 >>> mbox cmd response: success
2,989,849 UART:
2,989,865 UART: Running Caliptra FMC ...
2,990,273 UART:
2,990,416 UART: [state] CFI Enabled
3,000,969 UART: [fht] FMC Alias Private Key: 7
3,108,918 UART: [art] Extend RT PCRs Done
3,109,346 UART: [art] Lock RT PCRs Done
3,110,886 UART: [art] Populate DV Done
3,118,889 UART: [fht] FMC Alias Private Key: 7
3,119,855 UART: [art] Derive CDI
3,120,135 UART: [art] Store in in slot 0x4
3,205,830 UART: [art] Derive Key Pair
3,206,190 UART: [art] Store priv key in slot 0x5
3,219,490 UART: [art] Derive Key Pair - Done
3,234,171 UART: [art] Signing Cert with AUTHO
3,234,651 UART: RITY.KEYID = 7
3,250,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,868 UART: [art] PUB.X = F623A75C30CBB2E27F8E1DF7B8F7DAFC97E1F37AB589C17A4BA3FE312A267D7A86C17743D0C945AD69F5D4E2EAAC7CC9
3,257,664 UART: [art] PUB.Y = 2559ED0B3E86219234DCADB7EB52CF9D1685689C4BEE115D64663BF27D79DE92A7B1066E53224EB8888B759E011BDF3B
3,264,613 UART: [art] SIG.R = 3362A7E4EDB97FF6E114EA352C0027EB2E08BCCC8C922A5CE28D81489B2635D46FED89BCA0E252AEC2D82E9822243707
3,271,367 UART: [art] SIG.S = 0AF34550AD910494EF9497E56E865857E6F766D7BF1481589D20C05EEF8C88D6E003679008169C1E49B63A2574C4781A
3,295,160 UART: Caliptra RT
3,295,505 UART: [state] CFI Enabled
3,404,235 UART: [rt] RT listening for mailbox commands...
3,404,905 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,009 UART: [rt]cmd =0x52564348, len=36
3,436,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,099 UART: [cold-reset] ++
1,172,517 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 ready_for_fw is high
1,176,579 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,480 UART: [idev] Erasing UDS.KEYID = 0
1,201,317 UART: [idev] Sha1 KeyId Algorithm
1,209,993 UART: [idev] --
1,211,273 UART: [ldev] ++
1,211,441 UART: [ldev] CDI.KEYID = 6
1,211,804 UART: [ldev] SUBJECT.KEYID = 5
1,212,230 UART: [ldev] AUTHORITY.KEYID = 7
1,212,693 UART: [ldev] FE.KEYID = 1
1,217,775 UART: [ldev] Erasing FE.KEYID = 1
1,244,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,443 UART: [ldev] --
1,283,898 UART: [fwproc] Wait for Commands...
1,284,678 UART: [fwproc] Recv command 0x46574c44
1,285,406 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,651 >>> mbox cmd response: success
2,776,731 UART: [afmc] ++
2,776,899 UART: [afmc] CDI.KEYID = 6
2,777,261 UART: [afmc] SUBJECT.KEYID = 7
2,777,686 UART: [afmc] AUTHORITY.KEYID = 5
2,812,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,010 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,012 UART: [afmc] --
2,855,936 UART: [cold-reset] --
2,856,690 UART: [state] Locking Datavault
2,857,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,287 UART: [state] Locking ICCM
2,858,947 UART: [exit] Launching FMC @ 0x40000130
2,864,276 UART:
2,864,292 UART: Running Caliptra FMC ...
2,864,700 UART:
2,864,754 UART: [state] CFI Enabled
2,874,891 UART: [fht] FMC Alias Private Key: 7
2,983,008 UART: [art] Extend RT PCRs Done
2,983,436 UART: [art] Lock RT PCRs Done
2,985,284 UART: [art] Populate DV Done
2,993,567 UART: [fht] FMC Alias Private Key: 7
2,994,505 UART: [art] Derive CDI
2,994,785 UART: [art] Store in in slot 0x4
3,080,444 UART: [art] Derive Key Pair
3,080,804 UART: [art] Store priv key in slot 0x5
3,094,112 UART: [art] Derive Key Pair - Done
3,109,336 UART: [art] Signing Cert with AUTHO
3,109,816 UART: RITY.KEYID = 7
3,125,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,817 UART: [art] PUB.X = A29A128957B152861D130842BF4B334E436EB647B8C08F0FF32D79D60FECC5CFA38C7B7352A4BB1345E0ADDFB635B361
3,132,588 UART: [art] PUB.Y = 843C3320ECA0E20777076476923A21AEEC75A43405D67EDB2B6154759AF5EF4CDE7F411D895322DD39901E6DC314BD5E
3,139,533 UART: [art] SIG.R = B90035AE978D4CC3821DB8841AE1F7C95604A4298D081320BB3E46D745F0EE7198A1F68D465917A23F5724A60C5FAB09
3,146,269 UART: [art] SIG.S = AA3EB1076C6D76895005523C3FBB59187B0AA812C4F5D733A493D54B3C71ADA9EE1E0C655F31F2EB50C34B7552EA3058
3,170,132 UART: Caliptra RT
3,170,385 UART: [state] CFI Enabled
3,279,175 UART: [rt] RT listening for mailbox commands...
3,279,845 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,625 UART: [rt]cmd =0x52564348, len=36
3,311,056 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,279 ready_for_fw is high
1,060,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,654 >>> mbox cmd response: success
2,688,130 UART:
2,688,146 UART: Running Caliptra FMC ...
2,688,554 UART:
2,688,608 UART: [state] CFI Enabled
2,699,051 UART: [fht] FMC Alias Private Key: 7
2,807,114 UART: [art] Extend RT PCRs Done
2,807,542 UART: [art] Lock RT PCRs Done
2,809,184 UART: [art] Populate DV Done
2,817,335 UART: [fht] FMC Alias Private Key: 7
2,818,325 UART: [art] Derive CDI
2,818,605 UART: [art] Store in in slot 0x4
2,904,072 UART: [art] Derive Key Pair
2,904,432 UART: [art] Store priv key in slot 0x5
2,917,528 UART: [art] Derive Key Pair - Done
2,932,456 UART: [art] Signing Cert with AUTHO
2,932,936 UART: RITY.KEYID = 7
2,948,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,099 UART: [art] PUB.X = 82DC446F32E9C0BC8F6D34F91135BE799EDF950C8AEEBB28AF4F5D0344D4FDCD5650654833D97302C6C6549804C266BB
2,955,867 UART: [art] PUB.Y = 4C732A84446AF8774E85A998F6AA76D4968CE4D70D8A1D3457F569F03423B9F66E6416E289892D2B848A819110841934
2,962,802 UART: [art] SIG.R = 946F089B4A1D5432630A6BC82A7B29694F0116451DEE84D43EB9E5DBA82395BD188D0DAC624A33CC6BF62A722997EDD8
2,969,568 UART: [art] SIG.S = 98E024EFB53C41602B12ABF25F085F5CA9D44A00B9027FA1BA52190C81ACAD8BFF7D6CDC8AD327335D02EF3496E3D805
2,993,164 UART: Caliptra RT
2,993,417 UART: [state] CFI Enabled
3,099,987 UART: [rt] RT listening for mailbox commands...
3,100,657 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,721 UART: [rt]cmd =0x52564348, len=36
3,131,968 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
893,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,102 UART: [kat] ++
898,254 UART: [kat] sha1
902,550 UART: [kat] SHA2-256
904,490 UART: [kat] SHA2-384
907,325 UART: [kat] SHA2-512-ACC
909,226 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,235 UART: [kat] LMS
1,171,563 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,172,852 UART: [fht] FHT @ 0x50003400
1,175,619 UART: [idev] ++
1,175,787 UART: [idev] CDI.KEYID = 6
1,176,147 UART: [idev] SUBJECT.KEYID = 7
1,176,571 UART: [idev] UDS.KEYID = 0
1,176,916 ready_for_fw is high
1,176,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,210,046 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,930 UART: [ldev] Erasing FE.KEYID = 1
1,244,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,990 UART: [ldev] --
1,283,387 UART: [fwproc] Wait for Commands...
1,283,967 UART: [fwproc] Recv command 0x46574c44
1,284,695 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,544 >>> mbox cmd response: success
2,776,636 UART: [afmc] ++
2,776,804 UART: [afmc] CDI.KEYID = 6
2,777,166 UART: [afmc] SUBJECT.KEYID = 7
2,777,591 UART: [afmc] AUTHORITY.KEYID = 5
2,813,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,803 UART: [afmc] --
2,856,735 UART: [cold-reset] --
2,857,357 UART: [state] Locking Datavault
2,858,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,304 UART: [state] Locking ICCM
2,859,744 UART: [exit] Launching FMC @ 0x40000130
2,865,073 UART:
2,865,089 UART: Running Caliptra FMC ...
2,865,497 UART:
2,865,640 UART: [state] CFI Enabled
2,876,135 UART: [fht] FMC Alias Private Key: 7
2,983,458 UART: [art] Extend RT PCRs Done
2,983,886 UART: [art] Lock RT PCRs Done
2,985,600 UART: [art] Populate DV Done
2,993,957 UART: [fht] FMC Alias Private Key: 7
2,995,103 UART: [art] Derive CDI
2,995,383 UART: [art] Store in in slot 0x4
3,080,438 UART: [art] Derive Key Pair
3,080,798 UART: [art] Store priv key in slot 0x5
3,094,462 UART: [art] Derive Key Pair - Done
3,109,236 UART: [art] Signing Cert with AUTHO
3,109,716 UART: RITY.KEYID = 7
3,125,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,299 UART: [art] PUB.X = BE2CDDC738657E4B7CFBF3E153D1796436D24EB5ECA62EBCA66EC8065AAB2058819D712D252295E50D70D9F5CE5FB7E5
3,133,081 UART: [art] PUB.Y = D0D24F0E7B2A16ED2548DEFC251CFCAACB7582541E8EF935DB62110EBFE8F724488EA64ADA5F620FC1AB612C4D201E43
3,140,044 UART: [art] SIG.R = D9A39A27B8C304026CB86EB35B690E3D273BC8E45574FD0E75663BBE222E5F4973CC6D3B6A47CDED0EDCBA31E3D37F5E
3,146,819 UART: [art] SIG.S = F1321FFAEC9066879A963ABBDE902DDE7F98F80D150471FB82F77C8D3FE16A9031F26A0136691AF168B5428690FB6466
3,170,407 UART: Caliptra RT
3,170,752 UART: [state] CFI Enabled
3,278,934 UART: [rt] RT listening for mailbox commands...
3,279,604 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,746 UART: [rt]cmd =0x52564348, len=36
3,311,159 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,566 ready_for_fw is high
1,060,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,225 >>> mbox cmd response: success
2,691,345 UART:
2,691,361 UART: Running Caliptra FMC ...
2,691,769 UART:
2,691,912 UART: [state] CFI Enabled
2,702,559 UART: [fht] FMC Alias Private Key: 7
2,810,304 UART: [art] Extend RT PCRs Done
2,810,732 UART: [art] Lock RT PCRs Done
2,812,222 UART: [art] Populate DV Done
2,820,405 UART: [fht] FMC Alias Private Key: 7
2,821,513 UART: [art] Derive CDI
2,821,793 UART: [art] Store in in slot 0x4
2,907,642 UART: [art] Derive Key Pair
2,908,002 UART: [art] Store priv key in slot 0x5
2,921,154 UART: [art] Derive Key Pair - Done
2,936,036 UART: [art] Signing Cert with AUTHO
2,936,516 UART: RITY.KEYID = 7
2,951,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,513 UART: [art] PUB.X = 5CB9D100997F133DD45C45F8FFC3239B90E667FEC297E3840C4441E2BE32695C851F705013D3FD98B84FC37FAE281DB9
2,959,264 UART: [art] PUB.Y = 27ED0115AE03EAEC845CE8095DD140D093193CC9B1971B5BAFFC3613469E12F9873995B4A861AA24F4E1F65C12F3DEF7
2,966,215 UART: [art] SIG.R = 6FDDEA910C3343079A2580B91F7196896153339927DC949945E8A074D863EF7C812C00F44629B08608D83C8A00CB0B20
2,972,919 UART: [art] SIG.S = 31F281D2C09B3F979E685DF7DD257C00CC6D85937AC04FE564217CCB2ECC897263C7E6AC512603F4791EEB31AF79B5F4
2,996,885 UART: Caliptra RT
2,997,230 UART: [state] CFI Enabled
3,104,869 UART: [rt] RT listening for mailbox commands...
3,105,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,301 UART: [rt]cmd =0x52564348, len=36
3,136,760 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,174,067 ready_for_fw is high
1,174,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,109 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,326 UART: [ldev] ++
1,208,494 UART: [ldev] CDI.KEYID = 6
1,208,858 UART: [ldev] SUBJECT.KEYID = 5
1,209,285 UART: [ldev] AUTHORITY.KEYID = 7
1,209,748 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,574 UART: [fwproc] Wait for Commands...
1,281,283 UART: [fwproc] Recv command 0x46574c44
1,282,016 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,129 >>> mbox cmd response: success
2,773,302 UART: [afmc] ++
2,773,470 UART: [afmc] CDI.KEYID = 6
2,773,833 UART: [afmc] SUBJECT.KEYID = 7
2,774,259 UART: [afmc] AUTHORITY.KEYID = 5
2,810,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,765 UART: [afmc] --
2,853,667 UART: [cold-reset] --
2,854,599 UART: [state] Locking Datavault
2,855,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,382 UART: [state] Locking ICCM
2,856,832 UART: [exit] Launching FMC @ 0x40000130
2,862,161 UART:
2,862,177 UART: Running Caliptra FMC ...
2,862,585 UART:
2,862,639 UART: [state] CFI Enabled
2,873,152 UART: [fht] FMC Alias Private Key: 7
2,981,245 UART: [art] Extend RT PCRs Done
2,981,673 UART: [art] Lock RT PCRs Done
2,983,363 UART: [art] Populate DV Done
2,991,552 UART: [fht] FMC Alias Private Key: 7
2,992,720 UART: [art] Derive CDI
2,993,000 UART: [art] Store in in slot 0x4
3,078,589 UART: [art] Derive Key Pair
3,078,949 UART: [art] Store priv key in slot 0x5
3,092,379 UART: [art] Derive Key Pair - Done
3,107,196 UART: [art] Signing Cert with AUTHO
3,107,676 UART: RITY.KEYID = 7
3,122,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,667 UART: [art] PUB.X = 8270A7079DD104CC367BF183707C156AA0DDC98D32FBBE53BCEE1EB3C03C5C0249C5FCF9658D1F4C73F5008287BFEFF9
3,130,424 UART: [art] PUB.Y = 72E43FF19C21D65E9383C5C571069C1E226F39D51FBD5D099EDE3C48A09EDCB5283CE37D0E969A5BC5B362D57CF593C9
3,137,377 UART: [art] SIG.R = 7CE31404B013DBE6DB11E40C163E3F2A415E25BF62CAE6A139746C6CD59BB4BFA8F121304975CC234472346325A1889B
3,144,145 UART: [art] SIG.S = EA20829AD67A6430EE874FA976B3C0BF95736CB5A3CB3CB55C4A547F05EB5F19B012E12536C00B4644429489D8FBD5A1
3,167,942 UART: Caliptra RT
3,168,195 UART: [state] CFI Enabled
3,275,924 UART: [rt] RT listening for mailbox commands...
3,276,594 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,410 UART: [rt]cmd =0x52564348, len=36
3,307,951 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,348 ready_for_fw is high
1,057,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,289 >>> mbox cmd response: success
2,684,527 UART:
2,684,543 UART: Running Caliptra FMC ...
2,684,951 UART:
2,685,005 UART: [state] CFI Enabled
2,695,734 UART: [fht] FMC Alias Private Key: 7
2,803,223 UART: [art] Extend RT PCRs Done
2,803,651 UART: [art] Lock RT PCRs Done
2,805,531 UART: [art] Populate DV Done
2,813,714 UART: [fht] FMC Alias Private Key: 7
2,814,650 UART: [art] Derive CDI
2,814,930 UART: [art] Store in in slot 0x4
2,900,625 UART: [art] Derive Key Pair
2,900,985 UART: [art] Store priv key in slot 0x5
2,914,377 UART: [art] Derive Key Pair - Done
2,929,366 UART: [art] Signing Cert with AUTHO
2,929,846 UART: RITY.KEYID = 7
2,944,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,435 UART: [art] PUB.X = 9C732792378F3F3E94B6688BFBA17CF8DB583A400213FB980084436EAAFECE42684672E40D217B926A24F34048548595
2,952,171 UART: [art] PUB.Y = 39C3DB9EFCC2C2329E806B973208E9F4E9E8730AD27F5555A96AC82DE6304CFAFA964B991CD2F03E36231AB1696AF5C1
2,959,127 UART: [art] SIG.R = A93E22F99D2F753B167212092E9F6D767806B4A078505FC7E053B8EC1204E46C259FE358DED228528A580433E4B665C6
2,965,879 UART: [art] SIG.S = 8654182C75EB96A82C769E2639D7436CB36D673D0632007F885580C227E4388E614D1CB2F33E0B2C11557DE38C5D8BC7
2,989,142 UART: Caliptra RT
2,989,395 UART: [state] CFI Enabled
3,096,635 UART: [rt] RT listening for mailbox commands...
3,097,305 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,515 UART: [rt]cmd =0x52564348, len=36
3,128,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,282,029 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,334 >>> mbox cmd response: success
2,773,449 UART: [afmc] ++
2,773,617 UART: [afmc] CDI.KEYID = 6
2,773,980 UART: [afmc] SUBJECT.KEYID = 7
2,774,406 UART: [afmc] AUTHORITY.KEYID = 5
2,809,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,574 UART: [afmc] --
2,853,498 UART: [cold-reset] --
2,854,388 UART: [state] Locking Datavault
2,855,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,111 UART: [state] Locking ICCM
2,856,691 UART: [exit] Launching FMC @ 0x40000130
2,862,020 UART:
2,862,036 UART: Running Caliptra FMC ...
2,862,444 UART:
2,862,587 UART: [state] CFI Enabled
2,872,682 UART: [fht] FMC Alias Private Key: 7
2,980,297 UART: [art] Extend RT PCRs Done
2,980,725 UART: [art] Lock RT PCRs Done
2,982,191 UART: [art] Populate DV Done
2,990,358 UART: [fht] FMC Alias Private Key: 7
2,991,320 UART: [art] Derive CDI
2,991,600 UART: [art] Store in in slot 0x4
3,077,559 UART: [art] Derive Key Pair
3,077,919 UART: [art] Store priv key in slot 0x5
3,091,487 UART: [art] Derive Key Pair - Done
3,106,315 UART: [art] Signing Cert with AUTHO
3,106,795 UART: RITY.KEYID = 7
3,121,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,500 UART: [art] PUB.X = E98B861E822C0D9235160F9B99026CFAF003C0E3EF951215E1EFC0711BB8C079578EF4E87A1D660583B6B22DD4E35CC3
3,129,261 UART: [art] PUB.Y = 02F7CA603A4F6295700271BFBD0750D20CE1F956B30D9315D47712DE066B44C82E59657155A9677F305CF44277D35129
3,136,183 UART: [art] SIG.R = 26EC7ECC3F54D0E2DEB5E037932502A0EDC0CE11165AAFD1CF3236D06074015C52260D6F0B66C5F9FCC1FB581CA47054
3,142,955 UART: [art] SIG.S = 5F9F21B8020FF297D2510E37A953DEBF256859493D8D0C70E86AD781F15366D1D7650D2A4821F205A523BE2F6546CEA5
3,166,092 UART: Caliptra RT
3,166,437 UART: [state] CFI Enabled
3,274,158 UART: [rt] RT listening for mailbox commands...
3,274,828 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,004 UART: [rt]cmd =0x52564348, len=36
3,306,321 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,889 ready_for_fw is high
1,056,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,976 >>> mbox cmd response: success
2,687,456 UART:
2,687,472 UART: Running Caliptra FMC ...
2,687,880 UART:
2,688,023 UART: [state] CFI Enabled
2,699,000 UART: [fht] FMC Alias Private Key: 7
2,806,599 UART: [art] Extend RT PCRs Done
2,807,027 UART: [art] Lock RT PCRs Done
2,808,581 UART: [art] Populate DV Done
2,816,730 UART: [fht] FMC Alias Private Key: 7
2,817,746 UART: [art] Derive CDI
2,818,026 UART: [art] Store in in slot 0x4
2,903,525 UART: [art] Derive Key Pair
2,903,885 UART: [art] Store priv key in slot 0x5
2,916,991 UART: [art] Derive Key Pair - Done
2,931,291 UART: [art] Signing Cert with AUTHO
2,931,771 UART: RITY.KEYID = 7
2,946,819 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,584 UART: [art] PUB.X = 17C04B22345B78E8E8E2A40C535DA38C66C885AF2892B0C2C28E3D6A187703B705CCE7030634B123F869DA0AB89240E5
2,954,336 UART: [art] PUB.Y = 96C6B6610D98D44B5CA2ECF5812F25E305E67F80576BAE54D49DB711E87CB3BF0D2F3162B98079F4E2FED2EC07B212E0
2,961,286 UART: [art] SIG.R = 574A1C5A9EA89886FF1677A38402287A7E6F0534F1D7DC6A34A47C8935A7E188457E0476225469885F64C85CEC924E50
2,968,039 UART: [art] SIG.S = E5C3230094C878273007A42B367DD301A8831289147F1DD24C14742D6D421C2DE60913D84B6BEEBC0457C8403B9452C3
2,991,874 UART: Caliptra RT
2,992,219 UART: [state] CFI Enabled
3,100,404 UART: [rt] RT listening for mailbox commands...
3,101,074 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,272 UART: [rt]cmd =0x52564348, len=36
3,132,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
907,086 UART: [kat] LMS
1,475,282 UART: [kat] --
1,475,861 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,262 UART: [idev] ++
1,479,430 UART: [idev] CDI.KEYID = 6
1,479,790 UART: [idev] SUBJECT.KEYID = 7
1,480,214 UART: [idev] UDS.KEYID = 0
1,480,559 ready_for_fw is high
1,480,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,050 UART: [idev] Erasing UDS.KEYID = 0
1,504,670 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,460 UART: [idev] --
1,514,531 UART: [ldev] ++
1,514,699 UART: [ldev] CDI.KEYID = 6
1,515,062 UART: [ldev] SUBJECT.KEYID = 5
1,515,488 UART: [ldev] AUTHORITY.KEYID = 7
1,515,951 UART: [ldev] FE.KEYID = 1
1,520,967 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,036 UART: [ldev] --
1,585,469 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 114332 bytes
2,884,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,191 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,504 >>> mbox cmd response: success
3,078,708 UART: [afmc] ++
3,078,876 UART: [afmc] CDI.KEYID = 6
3,079,238 UART: [afmc] SUBJECT.KEYID = 7
3,079,663 UART: [afmc] AUTHORITY.KEYID = 5
3,114,348 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,408 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,801 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,491 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,330 UART: [afmc] --
3,157,418 UART: [cold-reset] --
3,158,206 UART: [state] Locking Datavault
3,159,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,909 UART: [state] Locking ICCM
3,160,343 UART: [exit] Launching FMC @ 0x40000130
3,165,672 UART:
3,165,688 UART: Running Caliptra FMC ...
3,166,096 UART:
3,166,150 UART: [state] CFI Enabled
3,176,405 UART: [fht] FMC Alias Private Key: 7
3,284,726 UART: [art] Extend RT PCRs Done
3,285,154 UART: [art] Lock RT PCRs Done
3,286,914 UART: [art] Populate DV Done
3,295,207 UART: [fht] FMC Alias Private Key: 7
3,296,207 UART: [art] Derive CDI
3,296,487 UART: [art] Store in in slot 0x4
3,382,130 UART: [art] Derive Key Pair
3,382,490 UART: [art] Store priv key in slot 0x5
3,395,424 UART: [art] Derive Key Pair - Done
3,410,315 UART: [art] Signing Cert with AUTHO
3,410,795 UART: RITY.KEYID = 7
3,425,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,424 UART: [art] PUB.X = D3B81AD5B8CB621CF90CAEB349833E50EAF5A3096DC554BE51502FC69D94A65EDD5AE3FD66C9ED2CC8823D9049AB6D1A
3,433,212 UART: [art] PUB.Y = 4926018E5AB1F1B0F7BF1695C33643A928A567EECAD5B55A37BD3D81D6EB29D2892C61FEADB99BD8BA3CCA0E91618958
3,440,172 UART: [art] SIG.R = B01C3836FC8826962F3F9D73857B344BA99C0733FD2D8659D8301AA9FF6FC204AF9365F6949482CDB67D7A77FEBF8A4A
3,446,944 UART: [art] SIG.S = C70E6FF192EB38EA1AAE27BB1AA97ABBF6DBE710095120763F0760A47A1A9625B92CB6BFE2948DAB3642017D31943513
3,470,683 UART: Caliptra RT
3,470,936 UART: [state] CFI Enabled
3,579,498 UART: [rt] RT listening for mailbox commands...
3,580,168 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,354 UART: [rt]cmd =0x53574545, len=84
3,611,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,773 ready_for_fw is high
1,361,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,820 >>> mbox cmd response: success
2,988,408 UART:
2,988,424 UART: Running Caliptra FMC ...
2,988,832 UART:
2,988,886 UART: [state] CFI Enabled
2,999,531 UART: [fht] FMC Alias Private Key: 7
3,107,152 UART: [art] Extend RT PCRs Done
3,107,580 UART: [art] Lock RT PCRs Done
3,108,806 UART: [art] Populate DV Done
3,117,077 UART: [fht] FMC Alias Private Key: 7
3,118,217 UART: [art] Derive CDI
3,118,497 UART: [art] Store in in slot 0x4
3,204,058 UART: [art] Derive Key Pair
3,204,418 UART: [art] Store priv key in slot 0x5
3,217,458 UART: [art] Derive Key Pair - Done
3,232,639 UART: [art] Signing Cert with AUTHO
3,233,119 UART: RITY.KEYID = 7
3,248,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,932 UART: [art] PUB.X = B0F0F1DB6AC12FFC29B65C184A516C5C0C64ECE9B46749FBE116947385C0D756A1CEE1B13F0829C76AC1A2480AA8B67B
3,255,709 UART: [art] PUB.Y = 14CA2E4D7D9350EA10BEDA4ADEE88A4B3FA732C2E0479C01D2FB07E9220723C94B63089CD9F707E74D6E298792A1D76F
3,262,656 UART: [art] SIG.R = 85CCFD6B795C8C7113E293AF7866DA6F2E63DD04DB6C2325E67B511A811A52CDE128817E648B5E40C607051F18574B51
3,269,419 UART: [art] SIG.S = 71C1C358329972FFBE55724819EB6E5A812B0D787D204DD8BFCE5F3319AA99C29B221A4C6FE8653F3F4B8015B0726D9D
3,293,361 UART: Caliptra RT
3,293,614 UART: [state] CFI Enabled
3,402,405 UART: [rt] RT listening for mailbox commands...
3,403,075 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,219 UART: [rt]cmd =0x53574545, len=84
3,434,389 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,503 UART: [kat] SHA2-512-ACC
897,404 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,756 UART: [cold-reset] ++
1,477,334 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 ready_for_fw is high
1,481,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,327 UART: [idev] Erasing UDS.KEYID = 0
1,505,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,459 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,522,074 UART: [ldev] Erasing FE.KEYID = 1
1,547,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,309 UART: [ldev] --
1,586,640 UART: [fwproc] Waiting for Commands...
1,587,269 UART: [fwproc] Received command 0x46574c44
1,588,060 UART: [fwproc] Received Image of size 114332 bytes
2,886,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,836 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,107 >>> mbox cmd response: success
3,080,299 UART: [afmc] ++
3,080,467 UART: [afmc] CDI.KEYID = 6
3,080,829 UART: [afmc] SUBJECT.KEYID = 7
3,081,254 UART: [afmc] AUTHORITY.KEYID = 5
3,116,429 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,651 UART: [afmc] --
3,159,555 UART: [cold-reset] --
3,160,377 UART: [state] Locking Datavault
3,161,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,186 UART: [state] Locking ICCM
3,162,820 UART: [exit] Launching FMC @ 0x40000130
3,168,149 UART:
3,168,165 UART: Running Caliptra FMC ...
3,168,573 UART:
3,168,716 UART: [state] CFI Enabled
3,179,759 UART: [fht] FMC Alias Private Key: 7
3,288,018 UART: [art] Extend RT PCRs Done
3,288,446 UART: [art] Lock RT PCRs Done
3,290,134 UART: [art] Populate DV Done
3,298,245 UART: [fht] FMC Alias Private Key: 7
3,299,199 UART: [art] Derive CDI
3,299,479 UART: [art] Store in in slot 0x4
3,385,498 UART: [art] Derive Key Pair
3,385,858 UART: [art] Store priv key in slot 0x5
3,399,536 UART: [art] Derive Key Pair - Done
3,414,316 UART: [art] Signing Cert with AUTHO
3,414,796 UART: RITY.KEYID = 7
3,429,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,685 UART: [art] PUB.X = 95687F0F511AAD50FAB1142ED6581196BE3F406127DA56421554CC10B1FE1E89A8DA194BC4D4AE2C337B890B4D53F031
3,437,455 UART: [art] PUB.Y = ED2D24ABE85071723AD9BAEC6CF2046EA32D9E47CE04750ECBC9C77CF67147C7492F92D2DE4BF725FD18E42A30A501F4
3,444,411 UART: [art] SIG.R = 898DA3A93AB4B815539113C3AF2720FFE609E1B57EE3F61AB1535687D0372D2D16DF1F8B3BADDB6BF3EA07F284BAB4F5
3,451,193 UART: [art] SIG.S = 0D38816ED43512DD39013B491A9E13B3778957CC9DEEDA42BC79D034C7B717ED85E5AC2C2986413C0BBD84BF6A50AA1B
3,475,339 UART: Caliptra RT
3,475,684 UART: [state] CFI Enabled
3,583,093 UART: [rt] RT listening for mailbox commands...
3,583,763 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,215 UART: [rt]cmd =0x53574545, len=84
3,615,961 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,474 ready_for_fw is high
1,363,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,111 >>> mbox cmd response: success
2,991,043 UART:
2,991,059 UART: Running Caliptra FMC ...
2,991,467 UART:
2,991,610 UART: [state] CFI Enabled
3,002,305 UART: [fht] FMC Alias Private Key: 7
3,110,518 UART: [art] Extend RT PCRs Done
3,110,946 UART: [art] Lock RT PCRs Done
3,112,726 UART: [art] Populate DV Done
3,121,023 UART: [fht] FMC Alias Private Key: 7
3,122,199 UART: [art] Derive CDI
3,122,479 UART: [art] Store in in slot 0x4
3,208,130 UART: [art] Derive Key Pair
3,208,490 UART: [art] Store priv key in slot 0x5
3,221,516 UART: [art] Derive Key Pair - Done
3,236,564 UART: [art] Signing Cert with AUTHO
3,237,044 UART: RITY.KEYID = 7
3,252,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,873 UART: [art] PUB.X = 79069CFDFA6404B9C3DF8C94DB5E0B475DB12834CF289B14D421CC686A7F4567F46A63453BDE0BAB136A2613C0DF7262
3,259,641 UART: [art] PUB.Y = 05A268929740384308472203DAE69A38F3ED31CDE453FCCEACAD06F57825E7F6A05198A233025617B33FA12E87052CBB
3,266,573 UART: [art] SIG.R = E96CE07B9960E35C8F925A15F647A3A4AAC4E464A9F6E399BD952CBBBA62389C7C7EAC2CA299EE2A80F70603542EB327
3,273,351 UART: [art] SIG.S = 4ADDEC37C855ACC651480E187612EEBC14F28C22AABF94EBF9D87C5018D3D98D450C65B34BDA12D6A988C81A99FA7A63
3,296,854 UART: Caliptra RT
3,297,199 UART: [state] CFI Enabled
3,404,758 UART: [rt] RT listening for mailbox commands...
3,405,428 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,670 UART: [rt]cmd =0x53574545, len=84
3,436,888 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,384 UART: [kat] SHA2-512-ACC
908,285 UART: [kat] ECC-384
917,566 UART: [kat] HMAC-384Kdf
922,220 UART: [kat] LMS
1,170,548 UART: [kat] --
1,171,267 UART: [cold-reset] ++
1,171,631 UART: [fht] FHT @ 0x50003400
1,174,164 UART: [idev] ++
1,174,332 UART: [idev] CDI.KEYID = 6
1,174,692 UART: [idev] SUBJECT.KEYID = 7
1,175,116 UART: [idev] UDS.KEYID = 0
1,175,461 ready_for_fw is high
1,175,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,102 UART: [idev] Erasing UDS.KEYID = 0
1,200,265 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,288 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,285 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,771 >>> mbox cmd response: success
2,773,993 UART: [afmc] ++
2,774,161 UART: [afmc] CDI.KEYID = 6
2,774,523 UART: [afmc] SUBJECT.KEYID = 7
2,774,948 UART: [afmc] AUTHORITY.KEYID = 5
2,810,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,467 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,998 UART: [afmc] --
2,853,970 UART: [cold-reset] --
2,854,616 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,933 UART: [exit] Launching FMC @ 0x40000130
2,862,262 UART:
2,862,278 UART: Running Caliptra FMC ...
2,862,686 UART:
2,862,740 UART: [state] CFI Enabled
2,873,189 UART: [fht] FMC Alias Private Key: 7
2,981,014 UART: [art] Extend RT PCRs Done
2,981,442 UART: [art] Lock RT PCRs Done
2,982,770 UART: [art] Populate DV Done
2,990,783 UART: [fht] FMC Alias Private Key: 7
2,991,905 UART: [art] Derive CDI
2,992,185 UART: [art] Store in in slot 0x4
3,077,628 UART: [art] Derive Key Pair
3,077,988 UART: [art] Store priv key in slot 0x5
3,090,800 UART: [art] Derive Key Pair - Done
3,105,531 UART: [art] Signing Cert with AUTHO
3,106,011 UART: RITY.KEYID = 7
3,121,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,122 UART: [art] PUB.X = F3C973B68C7FB1E19632ABB9BB83127F03724C219EBDCFB77584E73BCAFDCFA0FEAC7424D7C85BE1C8322CC10A951534
3,128,906 UART: [art] PUB.Y = 6EA100EB42CC1AAD124F0AA98ABB840F589C2AD0AA205C5C1C61B5B315CF8430C04A90793E87BDDD8DA1C7BB388439E0
3,135,848 UART: [art] SIG.R = 43F32BCBF2B791422BC1B5CE920B2ECED6F8156A7CD7B1FEE7F210B5268D99B23B8FE4D507FEB188EDE834A2D5E47DDD
3,142,638 UART: [art] SIG.S = B6E513A1643241DAE33AC2140366D18C1023DE88546EBDE600CB68B02D877A65A7E521D25C8CDD28EA9040070B312243
3,166,122 UART: Caliptra RT
3,166,375 UART: [state] CFI Enabled
3,274,090 UART: [rt] RT listening for mailbox commands...
3,274,760 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,198 UART: [rt]cmd =0x53574545, len=84
3,306,618 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,915 ready_for_fw is high
1,060,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,754 >>> mbox cmd response: success
2,688,254 UART:
2,688,270 UART: Running Caliptra FMC ...
2,688,678 UART:
2,688,732 UART: [state] CFI Enabled
2,699,105 UART: [fht] FMC Alias Private Key: 7
2,806,518 UART: [art] Extend RT PCRs Done
2,806,946 UART: [art] Lock RT PCRs Done
2,808,178 UART: [art] Populate DV Done
2,816,477 UART: [fht] FMC Alias Private Key: 7
2,817,547 UART: [art] Derive CDI
2,817,827 UART: [art] Store in in slot 0x4
2,903,520 UART: [art] Derive Key Pair
2,903,880 UART: [art] Store priv key in slot 0x5
2,917,332 UART: [art] Derive Key Pair - Done
2,931,892 UART: [art] Signing Cert with AUTHO
2,932,372 UART: RITY.KEYID = 7
2,947,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,697 UART: [art] PUB.X = F006E0692AE4A546E2EF79ECC91788869C71E559189D456F3B774501411F6C30C2A24AEC34AD54F9DDE04C533F901D88
2,955,463 UART: [art] PUB.Y = 4057507B49D12299710848099E7AEB66A49B80D1CA8A791FAF06950F36FE0445AB8BD4B1D924FF2D505CE368E2A866B6
2,962,400 UART: [art] SIG.R = 553995E71A13E9D17CEBE8F3789E668A252040FA3C42D1CAECDDC57B003B55057F58704985ED84B3FF6B17FF10FEA942
2,969,155 UART: [art] SIG.S = 715DF69B9717E43595F7F4AB0D0CFC8FB8A4BE09F4633D31E307CDA39594FC33DBCB48BCE60481E0E73CD60E7666666B
2,992,770 UART: Caliptra RT
2,993,023 UART: [state] CFI Enabled
3,100,312 UART: [rt] RT listening for mailbox commands...
3,100,982 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,070 UART: [rt]cmd =0x53574545, len=84
3,132,520 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,165 UART: [kat] SHA2-512-ACC
909,066 UART: [kat] ECC-384
918,913 UART: [kat] HMAC-384Kdf
923,521 UART: [kat] LMS
1,171,849 UART: [kat] --
1,172,568 UART: [cold-reset] ++
1,172,980 UART: [fht] FHT @ 0x50003400
1,175,715 UART: [idev] ++
1,175,883 UART: [idev] CDI.KEYID = 6
1,176,243 UART: [idev] SUBJECT.KEYID = 7
1,176,667 UART: [idev] UDS.KEYID = 0
1,177,012 ready_for_fw is high
1,177,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,907 UART: [idev] Erasing UDS.KEYID = 0
1,202,426 UART: [idev] Sha1 KeyId Algorithm
1,210,876 UART: [idev] --
1,211,850 UART: [ldev] ++
1,212,018 UART: [ldev] CDI.KEYID = 6
1,212,381 UART: [ldev] SUBJECT.KEYID = 5
1,212,807 UART: [ldev] AUTHORITY.KEYID = 7
1,213,270 UART: [ldev] FE.KEYID = 1
1,218,870 UART: [ldev] Erasing FE.KEYID = 1
1,245,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,556 UART: [ldev] --
1,284,845 UART: [fwproc] Wait for Commands...
1,285,639 UART: [fwproc] Recv command 0x46574c44
1,286,367 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,604 >>> mbox cmd response: success
2,776,718 UART: [afmc] ++
2,776,886 UART: [afmc] CDI.KEYID = 6
2,777,248 UART: [afmc] SUBJECT.KEYID = 7
2,777,673 UART: [afmc] AUTHORITY.KEYID = 5
2,813,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,507 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,839 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,693 UART: [afmc] --
2,856,745 UART: [cold-reset] --
2,857,571 UART: [state] Locking Datavault
2,858,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,456 UART: [state] Locking ICCM
2,860,052 UART: [exit] Launching FMC @ 0x40000130
2,865,381 UART:
2,865,397 UART: Running Caliptra FMC ...
2,865,805 UART:
2,865,948 UART: [state] CFI Enabled
2,876,765 UART: [fht] FMC Alias Private Key: 7
2,984,666 UART: [art] Extend RT PCRs Done
2,985,094 UART: [art] Lock RT PCRs Done
2,986,804 UART: [art] Populate DV Done
2,994,865 UART: [fht] FMC Alias Private Key: 7
2,996,025 UART: [art] Derive CDI
2,996,305 UART: [art] Store in in slot 0x4
3,081,918 UART: [art] Derive Key Pair
3,082,278 UART: [art] Store priv key in slot 0x5
3,095,616 UART: [art] Derive Key Pair - Done
3,110,396 UART: [art] Signing Cert with AUTHO
3,110,876 UART: RITY.KEYID = 7
3,126,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,245 UART: [art] PUB.X = 2EED78D42BD8E50D97F0552C4995A511351057E4DB9CE561286B1293AB53366368D40950E0301E7CE7EDE2712B72BE77
3,134,007 UART: [art] PUB.Y = CBAA0B2574D5496A365411FE2474C23B642CFE9873A9A65F7E9E9F6C5D5425DA4F710F10460388AF59565FFF66F64324
3,140,950 UART: [art] SIG.R = 3DF2F64050BD7BC0DB9A6D77B5B93C47470FBF7CA543918A482F4447A4CB759CB2C164344C7ACE936B1A613DA03D1CB1
3,147,731 UART: [art] SIG.S = C2B9AF876987EE067ED17FF329737C8647190ECBB71EB01985BFBF50640C16536A307210520C78C38C9D431CD743941F
3,171,010 UART: Caliptra RT
3,171,355 UART: [state] CFI Enabled
3,279,968 UART: [rt] RT listening for mailbox commands...
3,280,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,892 UART: [rt]cmd =0x53574545, len=84
3,312,316 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,312 ready_for_fw is high
1,060,312 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,217 >>> mbox cmd response: success
2,688,515 UART:
2,688,531 UART: Running Caliptra FMC ...
2,688,939 UART:
2,689,082 UART: [state] CFI Enabled
2,699,605 UART: [fht] FMC Alias Private Key: 7
2,806,722 UART: [art] Extend RT PCRs Done
2,807,150 UART: [art] Lock RT PCRs Done
2,808,648 UART: [art] Populate DV Done
2,816,949 UART: [fht] FMC Alias Private Key: 7
2,817,963 UART: [art] Derive CDI
2,818,243 UART: [art] Store in in slot 0x4
2,904,240 UART: [art] Derive Key Pair
2,904,600 UART: [art] Store priv key in slot 0x5
2,917,588 UART: [art] Derive Key Pair - Done
2,932,483 UART: [art] Signing Cert with AUTHO
2,932,963 UART: RITY.KEYID = 7
2,948,253 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,018 UART: [art] PUB.X = C3E5672BBFFBF31708C1E740114CA5FDC5E82A6C069E8CBFA77124E23FFEE8A95ADB534C2A842BB65C9976F1EF880A02
2,955,796 UART: [art] PUB.Y = 39F8D3B2228BA5F23DF7440DD90E8166636D0BFC726E3A07886BF2F6137978D9E8C5D9F83FD8612A3CB5E4FDA64D012F
2,962,741 UART: [art] SIG.R = 96F3F183C23FCB5AB6805459A0BAA08F9A698F79EA5FED2A096928218DDCD79B68B9A13559620A4F2CA46A61D7B22726
2,969,513 UART: [art] SIG.S = D828D49B07F3AEAA77FC0FF43700E4D726089FEB285F036636779747A15C813671265F0B1FE4A2B1168082C14BD73BA8
2,993,525 UART: Caliptra RT
2,993,870 UART: [state] CFI Enabled
3,101,978 UART: [rt] RT listening for mailbox commands...
3,102,648 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,054 UART: [rt]cmd =0x53574545, len=84
3,134,572 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,174,333 ready_for_fw is high
1,174,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,873 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,608 UART: [ldev] ++
1,208,776 UART: [ldev] CDI.KEYID = 6
1,209,140 UART: [ldev] SUBJECT.KEYID = 5
1,209,567 UART: [ldev] AUTHORITY.KEYID = 7
1,210,030 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,962 UART: [fwproc] Wait for Commands...
1,281,601 UART: [fwproc] Recv command 0x46574c44
1,282,334 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,799 >>> mbox cmd response: success
2,773,010 UART: [afmc] ++
2,773,178 UART: [afmc] CDI.KEYID = 6
2,773,541 UART: [afmc] SUBJECT.KEYID = 7
2,773,967 UART: [afmc] AUTHORITY.KEYID = 5
2,808,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,122 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,005 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,724 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,665 UART: [afmc] --
2,852,673 UART: [cold-reset] --
2,853,611 UART: [state] Locking Datavault
2,854,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,456 UART: [state] Locking ICCM
2,855,920 UART: [exit] Launching FMC @ 0x40000130
2,861,249 UART:
2,861,265 UART: Running Caliptra FMC ...
2,861,673 UART:
2,861,727 UART: [state] CFI Enabled
2,872,304 UART: [fht] FMC Alias Private Key: 7
2,980,653 UART: [art] Extend RT PCRs Done
2,981,081 UART: [art] Lock RT PCRs Done
2,982,409 UART: [art] Populate DV Done
2,990,618 UART: [fht] FMC Alias Private Key: 7
2,991,604 UART: [art] Derive CDI
2,991,884 UART: [art] Store in in slot 0x4
3,077,253 UART: [art] Derive Key Pair
3,077,613 UART: [art] Store priv key in slot 0x5
3,090,333 UART: [art] Derive Key Pair - Done
3,105,306 UART: [art] Signing Cert with AUTHO
3,105,786 UART: RITY.KEYID = 7
3,120,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,487 UART: [art] PUB.X = 95C358AEF28E4A49A7E2A89D6A47974A8AB5B32C943E5679FA55DCF7C83D48B4EF3468E689054FA503F672EC7F8AAC17
3,128,263 UART: [art] PUB.Y = 3A257B92673C58B1D4B3BA09A6425037EA480BE450DA015B45359B2A1A754CD15D8493BEEE8025F6758C8EE418F7123B
3,135,206 UART: [art] SIG.R = 16A156DDA59925EB09E45B18FFCAD93A84B79951D8C1524AFFF788694EE05EC3D9FF0B5560DAE6492D6361CCB029A364
3,141,982 UART: [art] SIG.S = 12C905ED80BC2311081D4DCC1E920E97D699B3B4FBA6F7CA50FD29AD0FDFDAAB3A34803FF54AC862CC3051E134635E96
3,165,923 UART: Caliptra RT
3,166,176 UART: [state] CFI Enabled
3,274,319 UART: [rt] RT listening for mailbox commands...
3,274,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,095 UART: [rt]cmd =0x53574545, len=84
3,306,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,972 ready_for_fw is high
1,055,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,349 >>> mbox cmd response: success
2,684,005 UART:
2,684,021 UART: Running Caliptra FMC ...
2,684,429 UART:
2,684,483 UART: [state] CFI Enabled
2,694,942 UART: [fht] FMC Alias Private Key: 7
2,802,857 UART: [art] Extend RT PCRs Done
2,803,285 UART: [art] Lock RT PCRs Done
2,804,721 UART: [art] Populate DV Done
2,812,816 UART: [fht] FMC Alias Private Key: 7
2,813,992 UART: [art] Derive CDI
2,814,272 UART: [art] Store in in slot 0x4
2,900,089 UART: [art] Derive Key Pair
2,900,449 UART: [art] Store priv key in slot 0x5
2,913,781 UART: [art] Derive Key Pair - Done
2,928,522 UART: [art] Signing Cert with AUTHO
2,929,002 UART: RITY.KEYID = 7
2,943,916 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,681 UART: [art] PUB.X = E441D3496A7E1DB6229A96C3440FFAAB40EBB9747A24D6BF4346B7BDAE93E1D8353CF54C602FDBF39303D499CEE361EF
2,951,463 UART: [art] PUB.Y = 2E2C95A327ADB186A33C60FF745F570BA2437143FCFE6E11C6B269865759860E1205070A5D7C7B76C9C669B9653824F6
2,958,394 UART: [art] SIG.R = 23C51234DD89B2EDCABBE31C603AB1AD7D99B8905C1D8BD7DFAB00778E01EA90DF710F2372E8B53D7A00BF43B5BA3265
2,965,134 UART: [art] SIG.S = E244CB8569C02F48418621F2A285221F18EE24EE83551E1E6ACFF19E30F8CC346520FC46364C16E7F265C539A43CE406
2,989,012 UART: Caliptra RT
2,989,265 UART: [state] CFI Enabled
3,098,216 UART: [rt] RT listening for mailbox commands...
3,098,886 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,060 UART: [rt]cmd =0x53574545, len=84
3,130,406 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,174,296 ready_for_fw is high
1,174,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,684 UART: [idev] Erasing UDS.KEYID = 0
1,198,964 UART: [idev] Sha1 KeyId Algorithm
1,207,674 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,021 UART: [ldev] --
1,281,483 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,945 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,872 >>> mbox cmd response: success
2,773,951 UART: [afmc] ++
2,774,119 UART: [afmc] CDI.KEYID = 6
2,774,482 UART: [afmc] SUBJECT.KEYID = 7
2,774,908 UART: [afmc] AUTHORITY.KEYID = 5
2,810,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,698 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,310 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,029 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,910 UART: [afmc] --
2,853,884 UART: [cold-reset] --
2,854,750 UART: [state] Locking Datavault
2,855,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,511 UART: [state] Locking ICCM
2,856,985 UART: [exit] Launching FMC @ 0x40000130
2,862,314 UART:
2,862,330 UART: Running Caliptra FMC ...
2,862,738 UART:
2,862,881 UART: [state] CFI Enabled
2,873,346 UART: [fht] FMC Alias Private Key: 7
2,981,353 UART: [art] Extend RT PCRs Done
2,981,781 UART: [art] Lock RT PCRs Done
2,983,329 UART: [art] Populate DV Done
2,991,598 UART: [fht] FMC Alias Private Key: 7
2,992,594 UART: [art] Derive CDI
2,992,874 UART: [art] Store in in slot 0x4
3,078,367 UART: [art] Derive Key Pair
3,078,727 UART: [art] Store priv key in slot 0x5
3,092,781 UART: [art] Derive Key Pair - Done
3,107,642 UART: [art] Signing Cert with AUTHO
3,108,122 UART: RITY.KEYID = 7
3,123,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,891 UART: [art] PUB.X = 82BAA790D8E62278EB040C07677D635B6B64870AD899930A7BA6881BCA983ABA7E5241116B248ACD11DBD436C823B0C6
3,130,650 UART: [art] PUB.Y = 8A1F9A802A6CFDE5F425F660A6CC03E5E1D1A1C9F5926F9C72A3A9C03EE708B5E716A6ABDA63B14F83CDD67D51A36B0F
3,137,613 UART: [art] SIG.R = 77F5DD7EEDC8D1EE3004E1371F0E05D6AA30E6439A4474ED7DBBEEBFFA7A06881EACE89CAA55F4966AB54B789D065229
3,144,390 UART: [art] SIG.S = DFFEF2925843A113081FB6F0AB7E78029AC6184E321599390917319A5AE73A14E4A5C1E29CC3A1D78369FA2FBE256A73
3,168,622 UART: Caliptra RT
3,168,967 UART: [state] CFI Enabled
3,277,350 UART: [rt] RT listening for mailbox commands...
3,278,020 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,356 UART: [rt]cmd =0x53574545, len=84
3,309,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,719 ready_for_fw is high
1,055,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,254 >>> mbox cmd response: success
2,683,902 UART:
2,683,918 UART: Running Caliptra FMC ...
2,684,326 UART:
2,684,469 UART: [state] CFI Enabled
2,695,330 UART: [fht] FMC Alias Private Key: 7
2,803,575 UART: [art] Extend RT PCRs Done
2,804,003 UART: [art] Lock RT PCRs Done
2,805,387 UART: [art] Populate DV Done
2,813,820 UART: [fht] FMC Alias Private Key: 7
2,814,996 UART: [art] Derive CDI
2,815,276 UART: [art] Store in in slot 0x4
2,900,697 UART: [art] Derive Key Pair
2,901,057 UART: [art] Store priv key in slot 0x5
2,914,705 UART: [art] Derive Key Pair - Done
2,929,662 UART: [art] Signing Cert with AUTHO
2,930,142 UART: RITY.KEYID = 7
2,945,198 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,963 UART: [art] PUB.X = B29FB61942AF34ABCEECA11E775CD17439CF75186D4D6F0B8BFA0665F805E3860906FA445BEA0CA28DE9FB3A06FA2603
2,952,727 UART: [art] PUB.Y = 2C299FA7A710F950CC3DC6EED345783EBFED024F81FF78C3765076260AE0B6C86CCE4E6054BAB38104A6F8E146DEB43E
2,959,684 UART: [art] SIG.R = 5A329E02FA905DB5A38AE05EF07A73F92ED826BC7AEAAD16AE4E19FD3742AF6BB50315752145FE39636EBEFCC14C89E7
2,966,468 UART: [art] SIG.S = D60910CE1E0B4ABBD0E447015DF900FA63618BFFE9BDB92A286D393AD8CE11E887E147D1E86A105D1CA69EC5B57E3000
2,990,384 UART: Caliptra RT
2,990,729 UART: [state] CFI Enabled
3,099,092 UART: [rt] RT listening for mailbox commands...
3,099,762 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,988 UART: [rt]cmd =0x53574545, len=84
3,131,104 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,682 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,476,083 UART: [cold-reset] ++
1,476,433 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,505,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,637 UART: [ldev] ++
1,514,805 UART: [ldev] CDI.KEYID = 6
1,515,168 UART: [ldev] SUBJECT.KEYID = 5
1,515,594 UART: [ldev] AUTHORITY.KEYID = 7
1,516,057 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,547,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,940 UART: [ldev] --
1,586,313 UART: [fwproc] Waiting for Commands...
1,587,068 UART: [fwproc] Received command 0x46574c44
1,587,859 UART: [fwproc] Received Image of size 114332 bytes
2,885,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,085 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,326 >>> mbox cmd response: success
3,078,374 UART: [afmc] ++
3,078,542 UART: [afmc] CDI.KEYID = 6
3,078,904 UART: [afmc] SUBJECT.KEYID = 7
3,079,329 UART: [afmc] AUTHORITY.KEYID = 5
3,114,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,328 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,721 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,411 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,374 UART: [afmc] --
3,157,282 UART: [cold-reset] --
3,158,244 UART: [state] Locking Datavault
3,159,315 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,919 UART: [state] Locking ICCM
3,160,501 UART: [exit] Launching FMC @ 0x40000130
3,165,830 UART:
3,165,846 UART: Running Caliptra FMC ...
3,166,254 UART:
3,166,308 UART: [state] CFI Enabled
3,176,911 UART: [fht] FMC Alias Private Key: 7
3,284,272 UART: [art] Extend RT PCRs Done
3,284,700 UART: [art] Lock RT PCRs Done
3,286,182 UART: [art] Populate DV Done
3,294,199 UART: [fht] FMC Alias Private Key: 7
3,295,359 UART: [art] Derive CDI
3,295,639 UART: [art] Store in in slot 0x4
3,381,544 UART: [art] Derive Key Pair
3,381,904 UART: [art] Store priv key in slot 0x5
3,395,940 UART: [art] Derive Key Pair - Done
3,410,488 UART: [art] Signing Cert with AUTHO
3,410,968 UART: RITY.KEYID = 7
3,426,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,193 UART: [art] PUB.X = 36D01CAFD5E658A300974C15B6CDA7056FA95425A9E38A2FDAF5658458E165C25E26777B487B98E6D564AB758B7F8C28
3,433,942 UART: [art] PUB.Y = BBD3ABADBAA4DF56AF677D8B8E3495F5AF5410248CC12EC1A3A89A3961B36275E3E29E526559845ADCFF1AE4159753FB
3,440,910 UART: [art] SIG.R = 4C5B8E4E76B9589CAB95B0632300CAE6D3D34534EE0E02A9DE242F008F547B65619B88814CAC85574C4D8A8CEBEA8A9A
3,447,642 UART: [art] SIG.S = BCDAF8C4DAD0ED8E955C2EB5867D4C9464E7C31ACF20590D5F0FA59B824D969C81178FFF0D8FB72EE692E6F76B5472AF
3,471,514 UART: Caliptra RT
3,471,767 UART: [state] CFI Enabled
3,580,120 UART: [rt] RT listening for mailbox commands...
3,580,790 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,198 UART: [rt]cmd =0x4d454153, len=108
3,612,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,103 ready_for_fw is high
1,362,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,302 >>> mbox cmd response: success
2,987,450 UART:
2,987,466 UART: Running Caliptra FMC ...
2,987,874 UART:
2,987,928 UART: [state] CFI Enabled
2,998,519 UART: [fht] FMC Alias Private Key: 7
3,106,680 UART: [art] Extend RT PCRs Done
3,107,108 UART: [art] Lock RT PCRs Done
3,108,508 UART: [art] Populate DV Done
3,116,575 UART: [fht] FMC Alias Private Key: 7
3,117,615 UART: [art] Derive CDI
3,117,895 UART: [art] Store in in slot 0x4
3,203,478 UART: [art] Derive Key Pair
3,203,838 UART: [art] Store priv key in slot 0x5
3,217,160 UART: [art] Derive Key Pair - Done
3,232,107 UART: [art] Signing Cert with AUTHO
3,232,587 UART: RITY.KEYID = 7
3,247,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,468 UART: [art] PUB.X = D17359565D55FC32BB671B7175BBBA175CC879D845E546B3B318BDCE6B444444FA3693182701A5EB6654D9D6A6E52E02
3,255,234 UART: [art] PUB.Y = FB062033B0CF258295BF3BD03A41706A53B192F06883EAD330EDCA631B762C3150A842C4E5CA99B7C9DD5A3900BA65F0
3,262,167 UART: [art] SIG.R = 285504BCFBDEB04D59CBD8CE41EF884CA421E936C4962336406A9795D6E7806393D286C81D2B31754ACCE29848CB656D
3,268,938 UART: [art] SIG.S = B56F65A8CCFF708BBDEDD5264095A0234106975ECD73858F87D2F6FB6F8305A6AF66F495BA8A74F286560CE795EC66BF
3,293,090 UART: Caliptra RT
3,293,343 UART: [state] CFI Enabled
3,401,622 UART: [rt] RT listening for mailbox commands...
3,402,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,900 UART: [rt]cmd =0x4d454153, len=108
3,434,689 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,430 UART: [kat] SHA2-256
892,368 UART: [kat] SHA2-384
895,019 UART: [kat] SHA2-512-ACC
896,920 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,361 UART: [kat] LMS
1,475,557 UART: [kat] --
1,476,392 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,533 UART: [idev] Erasing UDS.KEYID = 0
1,505,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,945 UART: [idev] --
1,514,818 UART: [ldev] ++
1,514,986 UART: [ldev] CDI.KEYID = 6
1,515,349 UART: [ldev] SUBJECT.KEYID = 5
1,515,775 UART: [ldev] AUTHORITY.KEYID = 7
1,516,238 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,546,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,601 UART: [ldev] --
1,586,064 UART: [fwproc] Waiting for Commands...
1,586,819 UART: [fwproc] Received command 0x46574c44
1,587,610 UART: [fwproc] Received Image of size 114332 bytes
2,886,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,818 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,985 >>> mbox cmd response: success
3,080,165 UART: [afmc] ++
3,080,333 UART: [afmc] CDI.KEYID = 6
3,080,695 UART: [afmc] SUBJECT.KEYID = 7
3,081,120 UART: [afmc] AUTHORITY.KEYID = 5
3,116,755 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,668 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,358 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,379 UART: [afmc] --
3,160,371 UART: [cold-reset] --
3,161,251 UART: [state] Locking Datavault
3,162,430 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,034 UART: [state] Locking ICCM
3,163,458 UART: [exit] Launching FMC @ 0x40000130
3,168,787 UART:
3,168,803 UART: Running Caliptra FMC ...
3,169,211 UART:
3,169,354 UART: [state] CFI Enabled
3,179,921 UART: [fht] FMC Alias Private Key: 7
3,288,200 UART: [art] Extend RT PCRs Done
3,288,628 UART: [art] Lock RT PCRs Done
3,290,190 UART: [art] Populate DV Done
3,298,421 UART: [fht] FMC Alias Private Key: 7
3,299,513 UART: [art] Derive CDI
3,299,793 UART: [art] Store in in slot 0x4
3,385,592 UART: [art] Derive Key Pair
3,385,952 UART: [art] Store priv key in slot 0x5
3,398,978 UART: [art] Derive Key Pair - Done
3,414,060 UART: [art] Signing Cert with AUTHO
3,414,540 UART: RITY.KEYID = 7
3,429,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,335 UART: [art] PUB.X = B63BBC4E4FE4B60772447AE38BD19A7019DB32143DEA8B7EC9809B5D7386306E7258DD494B3FC40A49525545E29D8790
3,437,101 UART: [art] PUB.Y = 0A4B856E8020565D773FE7E51CD31FAC86E40413A3C65323AD62EB7C391C0CBA162C9E6DF13C3BC6F36B1096EE97CA14
3,444,054 UART: [art] SIG.R = 5293E94E69F9B265B56853FF92ABBFC0D6055D87018F546DEE3EBA87A5CA99E920CBFDFD44B659D43C67A86CBB845A50
3,450,834 UART: [art] SIG.S = A52942CFB72B8DBCBD3354B2727B2C24EA4513D172D7E548E34C8CFA4279A11FF21B19CA9DA91AB8A02CC523EA98D5AC
3,474,791 UART: Caliptra RT
3,475,136 UART: [state] CFI Enabled
3,583,065 UART: [rt] RT listening for mailbox commands...
3,583,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,291 UART: [rt]cmd =0x4d454153, len=108
3,615,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 ready_for_fw is high
1,363,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,537 >>> mbox cmd response: success
2,990,231 UART:
2,990,247 UART: Running Caliptra FMC ...
2,990,655 UART:
2,990,798 UART: [state] CFI Enabled
3,001,249 UART: [fht] FMC Alias Private Key: 7
3,109,424 UART: [art] Extend RT PCRs Done
3,109,852 UART: [art] Lock RT PCRs Done
3,111,452 UART: [art] Populate DV Done
3,119,563 UART: [fht] FMC Alias Private Key: 7
3,120,609 UART: [art] Derive CDI
3,120,889 UART: [art] Store in in slot 0x4
3,206,480 UART: [art] Derive Key Pair
3,206,840 UART: [art] Store priv key in slot 0x5
3,220,578 UART: [art] Derive Key Pair - Done
3,235,247 UART: [art] Signing Cert with AUTHO
3,235,727 UART: RITY.KEYID = 7
3,251,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,188 UART: [art] PUB.X = 12B90B32CCD1326DDEB6DB0E06FA3B756A10136AFF68B71DB47BDB6F9C627D6FD23DDE93C5B527DA63173EB5AF2DAF71
3,258,975 UART: [art] PUB.Y = B891BCA5B5D6EE26BD94BDBF6A51A98DF242F8DC20AC28DE2299DAC4CA0FEA1132425F123F2702DE5279B8DF660E30A6
3,265,938 UART: [art] SIG.R = 49A419C9F8C2D1FFFEBE8619C87BCDB04860E96F32F2A3B7DC1D825350F2FB70DB625FD11B223F274D6CE238FC1B50D1
3,272,726 UART: [art] SIG.S = B9D39DFDADF1C13C834D7FBCD040C64521C25D82C90614BDB60EE6E5F7AC1CA5F33B3568DB6B41EF487F2A519FE55D0D
3,297,058 UART: Caliptra RT
3,297,403 UART: [state] CFI Enabled
3,406,136 UART: [rt] RT listening for mailbox commands...
3,406,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,216 UART: [rt]cmd =0x4d454153, len=108
3,438,851 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,570 UART: [kat] SHA2-512-ACC
908,471 UART: [kat] ECC-384
918,360 UART: [kat] HMAC-384Kdf
922,938 UART: [kat] LMS
1,171,266 UART: [kat] --
1,172,369 UART: [cold-reset] ++
1,172,879 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 ready_for_fw is high
1,176,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,482 UART: [idev] Erasing UDS.KEYID = 0
1,201,163 UART: [idev] Sha1 KeyId Algorithm
1,209,609 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,298 UART: [ldev] SUBJECT.KEYID = 5
1,211,724 UART: [ldev] AUTHORITY.KEYID = 7
1,212,187 UART: [ldev] FE.KEYID = 1
1,217,669 UART: [ldev] Erasing FE.KEYID = 1
1,245,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,457 UART: [ldev] --
1,283,860 UART: [fwproc] Wait for Commands...
1,284,576 UART: [fwproc] Recv command 0x46574c44
1,285,304 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,113 >>> mbox cmd response: success
2,776,223 UART: [afmc] ++
2,776,391 UART: [afmc] CDI.KEYID = 6
2,776,753 UART: [afmc] SUBJECT.KEYID = 7
2,777,178 UART: [afmc] AUTHORITY.KEYID = 5
2,812,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,666 UART: [afmc] --
2,855,732 UART: [cold-reset] --
2,856,642 UART: [state] Locking Datavault
2,857,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,393 UART: [state] Locking ICCM
2,858,859 UART: [exit] Launching FMC @ 0x40000130
2,864,188 UART:
2,864,204 UART: Running Caliptra FMC ...
2,864,612 UART:
2,864,666 UART: [state] CFI Enabled
2,875,675 UART: [fht] FMC Alias Private Key: 7
2,984,420 UART: [art] Extend RT PCRs Done
2,984,848 UART: [art] Lock RT PCRs Done
2,986,530 UART: [art] Populate DV Done
2,994,667 UART: [fht] FMC Alias Private Key: 7
2,995,693 UART: [art] Derive CDI
2,995,973 UART: [art] Store in in slot 0x4
3,081,966 UART: [art] Derive Key Pair
3,082,326 UART: [art] Store priv key in slot 0x5
3,095,338 UART: [art] Derive Key Pair - Done
3,110,219 UART: [art] Signing Cert with AUTHO
3,110,699 UART: RITY.KEYID = 7
3,125,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,620 UART: [art] PUB.X = 52BBA3A2FBC8AF9A06C530EB81DCDAD3E56AAE3A5912CA4A6AE0FFC9DE7BDF1C48A2AE88B564F2753DAF1CEB6BFCFD04
3,133,428 UART: [art] PUB.Y = 519410F2D09AB6EB127316956EFCD2F2E21AF16A1D5589126074185E589A130A648E9B70B434AD64FC53CD9C17F7AE63
3,140,377 UART: [art] SIG.R = FA79EFDAAAB8883FCE6BC7D771AC7420F9BF33D15A2CF72DC68479923A66E29EB9A745368CE58BB82C2C6B35848116F7
3,147,163 UART: [art] SIG.S = FE9D290EA426726D15C901D92EA6912C40C367BA9CB1712AAA490293A38C7FA744F0A64666965C78B79E954ACFE45977
3,170,961 UART: Caliptra RT
3,171,214 UART: [state] CFI Enabled
3,278,996 UART: [rt] RT listening for mailbox commands...
3,279,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,214 UART: [rt]cmd =0x4d454153, len=108
3,311,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,178 >>> mbox cmd response: success
2,688,232 UART:
2,688,248 UART: Running Caliptra FMC ...
2,688,656 UART:
2,688,710 UART: [state] CFI Enabled
2,699,231 UART: [fht] FMC Alias Private Key: 7
2,806,918 UART: [art] Extend RT PCRs Done
2,807,346 UART: [art] Lock RT PCRs Done
2,808,724 UART: [art] Populate DV Done
2,816,909 UART: [fht] FMC Alias Private Key: 7
2,817,983 UART: [art] Derive CDI
2,818,263 UART: [art] Store in in slot 0x4
2,904,012 UART: [art] Derive Key Pair
2,904,372 UART: [art] Store priv key in slot 0x5
2,917,904 UART: [art] Derive Key Pair - Done
2,932,738 UART: [art] Signing Cert with AUTHO
2,933,218 UART: RITY.KEYID = 7
2,948,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,821 UART: [art] PUB.X = C34E7E6FF3A99E883AF55679262DED6123A6F405D654A23A1112A8022E9037151C9F12D8DD5427C4DE8C146A38FCB2E9
2,955,589 UART: [art] PUB.Y = C2266B023E0ABAF190E240FE86C3227CAE8FB769A4AC2B4A47178286CA6FAD8A6CB922FD3594988C797A2EA5D97A209C
2,962,547 UART: [art] SIG.R = 400D96FBE9FECFF31821762067ABEE8F523A4100D4D6E1E122D28134CD158870046F5C84DAB37B4292D6564DF0A7E328
2,969,293 UART: [art] SIG.S = E35832166C642AD7771904467B6C0920A5969D84B919F62ADC9CDA605B42E76A01CB194847526C010FB4594E48591AAD
2,992,723 UART: Caliptra RT
2,992,976 UART: [state] CFI Enabled
3,100,309 UART: [rt] RT listening for mailbox commands...
3,100,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,633 UART: [rt]cmd =0x4d454153, len=108
3,133,266 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
893,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,536 UART: [kat] ++
897,688 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,436 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,521 UART: [idev] ++
1,175,689 UART: [idev] CDI.KEYID = 6
1,176,049 UART: [idev] SUBJECT.KEYID = 7
1,176,473 UART: [idev] UDS.KEYID = 0
1,176,818 ready_for_fw is high
1,176,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,201,450 UART: [idev] Sha1 KeyId Algorithm
1,209,714 UART: [idev] --
1,210,886 UART: [ldev] ++
1,211,054 UART: [ldev] CDI.KEYID = 6
1,211,417 UART: [ldev] SUBJECT.KEYID = 5
1,211,843 UART: [ldev] AUTHORITY.KEYID = 7
1,212,306 UART: [ldev] FE.KEYID = 1
1,217,626 UART: [ldev] Erasing FE.KEYID = 1
1,243,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,062 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,313 UART: [fwproc] Recv command 0x46574c44
1,285,041 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,530 >>> mbox cmd response: success
2,776,582 UART: [afmc] ++
2,776,750 UART: [afmc] CDI.KEYID = 6
2,777,112 UART: [afmc] SUBJECT.KEYID = 7
2,777,537 UART: [afmc] AUTHORITY.KEYID = 5
2,813,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,958 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,677 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,467 UART: [afmc] --
2,856,349 UART: [cold-reset] --
2,857,239 UART: [state] Locking Datavault
2,858,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,778 UART: [state] Locking ICCM
2,859,226 UART: [exit] Launching FMC @ 0x40000130
2,864,555 UART:
2,864,571 UART: Running Caliptra FMC ...
2,864,979 UART:
2,865,122 UART: [state] CFI Enabled
2,876,113 UART: [fht] FMC Alias Private Key: 7
2,983,870 UART: [art] Extend RT PCRs Done
2,984,298 UART: [art] Lock RT PCRs Done
2,986,036 UART: [art] Populate DV Done
2,994,303 UART: [fht] FMC Alias Private Key: 7
2,995,313 UART: [art] Derive CDI
2,995,593 UART: [art] Store in in slot 0x4
3,080,902 UART: [art] Derive Key Pair
3,081,262 UART: [art] Store priv key in slot 0x5
3,094,784 UART: [art] Derive Key Pair - Done
3,109,317 UART: [art] Signing Cert with AUTHO
3,109,797 UART: RITY.KEYID = 7
3,125,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,844 UART: [art] PUB.X = AE6457743F42B0954B6764C64A414E1F0E8D53FFA9D00EF2C2A81E97FB8A0C57F69C731D661891D9FEC7228DDE1EC744
3,132,615 UART: [art] PUB.Y = 5585FEC9009B4C2A5660667E371E85A91042FCC81B14EF90F3BA26A136A015040405AF6C0A47EDBA2BE578CB59F79AD7
3,139,539 UART: [art] SIG.R = 53C0504AD44E7A4162FF14FA044996AF901F14FF423AEC07D0884D77974579FFA0ACA922D52141D4796E500AFB2B9306
3,146,299 UART: [art] SIG.S = 811553B6AE90C5663A117286A46C0B64A95EE48AC80E86B620C37A58D5748115FD025B12DACA4A5354BDD2B212E84A9E
3,169,489 UART: Caliptra RT
3,169,834 UART: [state] CFI Enabled
3,276,969 UART: [rt] RT listening for mailbox commands...
3,277,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,227 UART: [rt]cmd =0x4d454153, len=108
3,309,910 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 ready_for_fw is high
1,060,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,531 >>> mbox cmd response: success
2,691,429 UART:
2,691,445 UART: Running Caliptra FMC ...
2,691,853 UART:
2,691,996 UART: [state] CFI Enabled
2,702,719 UART: [fht] FMC Alias Private Key: 7
2,810,486 UART: [art] Extend RT PCRs Done
2,810,914 UART: [art] Lock RT PCRs Done
2,812,442 UART: [art] Populate DV Done
2,820,453 UART: [fht] FMC Alias Private Key: 7
2,821,427 UART: [art] Derive CDI
2,821,707 UART: [art] Store in in slot 0x4
2,907,206 UART: [art] Derive Key Pair
2,907,566 UART: [art] Store priv key in slot 0x5
2,921,170 UART: [art] Derive Key Pair - Done
2,935,558 UART: [art] Signing Cert with AUTHO
2,936,038 UART: RITY.KEYID = 7
2,951,378 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,143 UART: [art] PUB.X = A7A73A3A8FE5EF6095920614E226D2005489E787CFA78B118DC207E009E06151E21B95B74D13EC62EBAC263C2A889D1C
2,958,886 UART: [art] PUB.Y = 70BE9F54E664915A1E9070739402414109D82FA38BD70899FA07E7DA96AD8692CB008E8D393A8E1815D1532EA7702074
2,965,794 UART: [art] SIG.R = 53F07092C54EE137D56717140AADDC7852A22D33AD4883827DC90B91A90CD6F2D0715F3B89BE34893A7615C680ECD9BA
2,972,559 UART: [art] SIG.S = 6857FDB1D34CD87112E8F41F29CF56A466FF1C3441EA9422484580E82998538D701D4BAEF3DF23CD94D5C28F4D9E78BD
2,996,096 UART: Caliptra RT
2,996,441 UART: [state] CFI Enabled
3,103,962 UART: [rt] RT listening for mailbox commands...
3,104,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,064 UART: [rt]cmd =0x4d454153, len=108
3,136,601 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,174,387 ready_for_fw is high
1,174,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,841 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,157 UART: [fwproc] Recv command 0x46574c44
1,282,890 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,667 >>> mbox cmd response: success
2,773,826 UART: [afmc] ++
2,773,994 UART: [afmc] CDI.KEYID = 6
2,774,357 UART: [afmc] SUBJECT.KEYID = 7
2,774,783 UART: [afmc] AUTHORITY.KEYID = 5
2,810,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,785 UART: [afmc] --
2,853,871 UART: [cold-reset] --
2,854,993 UART: [state] Locking Datavault
2,856,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,634 UART: [state] Locking ICCM
2,857,062 UART: [exit] Launching FMC @ 0x40000130
2,862,391 UART:
2,862,407 UART: Running Caliptra FMC ...
2,862,815 UART:
2,862,869 UART: [state] CFI Enabled
2,873,554 UART: [fht] FMC Alias Private Key: 7
2,981,675 UART: [art] Extend RT PCRs Done
2,982,103 UART: [art] Lock RT PCRs Done
2,983,715 UART: [art] Populate DV Done
2,991,924 UART: [fht] FMC Alias Private Key: 7
2,993,026 UART: [art] Derive CDI
2,993,306 UART: [art] Store in in slot 0x4
3,079,447 UART: [art] Derive Key Pair
3,079,807 UART: [art] Store priv key in slot 0x5
3,093,251 UART: [art] Derive Key Pair - Done
3,107,533 UART: [art] Signing Cert with AUTHO
3,108,013 UART: RITY.KEYID = 7
3,123,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,860 UART: [art] PUB.X = BE66BF0D7320C105A890382715679C6898D18FF087769C06D57BFD06C24E7BDC6A4EFC541A1441692E3D86C06493F81C
3,130,618 UART: [art] PUB.Y = 223F1117D03CD91B86DA4A859A95E37B8C34A8032C4A2D55BD458E9EE2C99FB1821DC8421306621CEDA424CA3569C782
3,137,566 UART: [art] SIG.R = AF09A3FE5AE7946D6B6ADF01047673C9178FDDEA3C2C89CB195108C3C72C43869E7E6EDDBDD8E413FCD4B9D523B127E8
3,144,344 UART: [art] SIG.S = BF39AED6B9FEBDEE4774A82551DB2360FFF5E46650DC533CDD37C157BE32F161CE53DAA81B7BDA3C36D7BBE4FC26C822
3,168,689 UART: Caliptra RT
3,168,942 UART: [state] CFI Enabled
3,277,606 UART: [rt] RT listening for mailbox commands...
3,278,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,870 UART: [rt]cmd =0x4d454153, len=108
3,310,471 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,448 ready_for_fw is high
1,056,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,325 >>> mbox cmd response: success
2,684,249 UART:
2,684,265 UART: Running Caliptra FMC ...
2,684,673 UART:
2,684,727 UART: [state] CFI Enabled
2,695,312 UART: [fht] FMC Alias Private Key: 7
2,803,453 UART: [art] Extend RT PCRs Done
2,803,881 UART: [art] Lock RT PCRs Done
2,805,377 UART: [art] Populate DV Done
2,813,518 UART: [fht] FMC Alias Private Key: 7
2,814,560 UART: [art] Derive CDI
2,814,840 UART: [art] Store in in slot 0x4
2,900,639 UART: [art] Derive Key Pair
2,900,999 UART: [art] Store priv key in slot 0x5
2,914,695 UART: [art] Derive Key Pair - Done
2,929,949 UART: [art] Signing Cert with AUTHO
2,930,429 UART: RITY.KEYID = 7
2,945,713 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,478 UART: [art] PUB.X = FBC658015E5245DFEA8FDC93FA91CF9EA3F5BA24EB77F74725416DED8C5A4C7596A23D5C60024389FC382EAC0FCA8FCC
2,953,263 UART: [art] PUB.Y = 6DA8CB74F55D411CA5EEAA78F67970711C5172DF57F6F0B7FD64579573C626D8DF884FED7A9229F9F55CA54DBD92A489
2,960,225 UART: [art] SIG.R = F930F382C3CCF5F5C1DF55AEEDB07CD9572FAE3B2008D3F40168790568EF862E874B57438D82F7FBC75DB99B651CEB4B
2,967,002 UART: [art] SIG.S = 29BE2BDE1036E96A30CAEF261378C32951617D4F1D926FFC9DCE436698A02F040206C1F30A883758FE14A5904D4141EF
2,990,677 UART: Caliptra RT
2,990,930 UART: [state] CFI Enabled
3,098,327 UART: [rt] RT listening for mailbox commands...
3,098,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,879 UART: [rt]cmd =0x4d454153, len=108
3,131,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
891,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,078 UART: [kat] ++
896,230 UART: [kat] sha1
900,354 UART: [kat] SHA2-256
902,294 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,175,024 ready_for_fw is high
1,175,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,734 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,680 UART: [idev] --
1,209,801 UART: [ldev] ++
1,209,969 UART: [ldev] CDI.KEYID = 6
1,210,333 UART: [ldev] SUBJECT.KEYID = 5
1,210,760 UART: [ldev] AUTHORITY.KEYID = 7
1,211,223 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,299 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,715 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,226 >>> mbox cmd response: success
2,775,417 UART: [afmc] ++
2,775,585 UART: [afmc] CDI.KEYID = 6
2,775,948 UART: [afmc] SUBJECT.KEYID = 7
2,776,374 UART: [afmc] AUTHORITY.KEYID = 5
2,812,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,636 UART: [afmc] --
2,855,598 UART: [cold-reset] --
2,856,366 UART: [state] Locking Datavault
2,857,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,047 UART: [state] Locking ICCM
2,858,553 UART: [exit] Launching FMC @ 0x40000130
2,863,882 UART:
2,863,898 UART: Running Caliptra FMC ...
2,864,306 UART:
2,864,449 UART: [state] CFI Enabled
2,875,252 UART: [fht] FMC Alias Private Key: 7
2,983,397 UART: [art] Extend RT PCRs Done
2,983,825 UART: [art] Lock RT PCRs Done
2,985,439 UART: [art] Populate DV Done
2,993,854 UART: [fht] FMC Alias Private Key: 7
2,994,848 UART: [art] Derive CDI
2,995,128 UART: [art] Store in in slot 0x4
3,080,799 UART: [art] Derive Key Pair
3,081,159 UART: [art] Store priv key in slot 0x5
3,094,547 UART: [art] Derive Key Pair - Done
3,109,097 UART: [art] Signing Cert with AUTHO
3,109,577 UART: RITY.KEYID = 7
3,124,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,544 UART: [art] PUB.X = 3229D6F9437DD6577847BDA782F63A70E154E6626642B4FA425283E09498CAC5759362C228DE849A92ACB101D8AD18BB
3,132,309 UART: [art] PUB.Y = 6AEDA741124E077298E2303995505F9B32E06C2591D5D3D5B94BB70787EB3652370F134D882623C069A68E731473EB56
3,139,238 UART: [art] SIG.R = A8E10679D4651362E7D9029D8087FB99565DE97AD47F089A518BB439425F7289DB214F328408B32895879CF2E81218C6
3,145,984 UART: [art] SIG.S = 652E86DA28C1EE1F0F2527770DC79C659A751B1F69F5F6FFBA08C043E5643A073259ADE8361089A73D1BBA4310A172F4
3,169,617 UART: Caliptra RT
3,169,962 UART: [state] CFI Enabled
3,277,715 UART: [rt] RT listening for mailbox commands...
3,278,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,157 UART: [rt]cmd =0x4d454153, len=108
3,310,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,545 ready_for_fw is high
1,056,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,050 >>> mbox cmd response: success
2,687,302 UART:
2,687,318 UART: Running Caliptra FMC ...
2,687,726 UART:
2,687,869 UART: [state] CFI Enabled
2,698,572 UART: [fht] FMC Alias Private Key: 7
2,806,611 UART: [art] Extend RT PCRs Done
2,807,039 UART: [art] Lock RT PCRs Done
2,808,177 UART: [art] Populate DV Done
2,816,238 UART: [fht] FMC Alias Private Key: 7
2,817,358 UART: [art] Derive CDI
2,817,638 UART: [art] Store in in slot 0x4
2,903,205 UART: [art] Derive Key Pair
2,903,565 UART: [art] Store priv key in slot 0x5
2,916,643 UART: [art] Derive Key Pair - Done
2,931,572 UART: [art] Signing Cert with AUTHO
2,932,052 UART: RITY.KEYID = 7
2,947,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,925 UART: [art] PUB.X = 5CDC3E9241A01A70395965901B08E63E0163B4321343834CE9F5517F3DB8F39BA42C8A46767B22F03637DB9DDE64C47A
2,954,687 UART: [art] PUB.Y = C39E8D83560D067E8E059BEC7229D346AD58945E9D62C18BB949603A614F940FECFDA6A3DCCFB438B7878DB72034CFC9
2,961,637 UART: [art] SIG.R = E8C454D534CBC1B87E942D84745DCF2773623E75607FCF985DE4044AD5C0EFD03FCFC44C85AF1B42D01BCD0811ABCC79
2,968,419 UART: [art] SIG.S = 146FA4E775C03EBB226E6E917C1C8FB6EA47F8F5AA0347B2FF5C34FA78C12C4B570545B7A8143CEC45533BD98B6465A7
2,991,820 UART: Caliptra RT
2,992,165 UART: [state] CFI Enabled
3,099,708 UART: [rt] RT listening for mailbox commands...
3,100,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,816 UART: [rt]cmd =0x4d454153, len=108
3,132,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
903,112 UART: [kat] HMAC-384Kdf
907,610 UART: [kat] LMS
1,475,806 UART: [kat] --
1,476,699 UART: [cold-reset] ++
1,477,189 UART: [fht] Storing FHT @ 0x50003400
1,479,850 UART: [idev] ++
1,480,018 UART: [idev] CDI.KEYID = 6
1,480,378 UART: [idev] SUBJECT.KEYID = 7
1,480,802 UART: [idev] UDS.KEYID = 0
1,481,147 ready_for_fw is high
1,481,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,638 UART: [idev] Erasing UDS.KEYID = 0
1,505,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,148 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,202 UART: [ldev] --
1,586,635 UART: [fwproc] Waiting for Commands...
1,587,342 UART: [fwproc] Received command 0x46574c44
1,588,133 UART: [fwproc] Received Image of size 114332 bytes
2,884,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,186 >>> mbox cmd response: success
3,078,398 UART: [afmc] ++
3,078,566 UART: [afmc] CDI.KEYID = 6
3,078,928 UART: [afmc] SUBJECT.KEYID = 7
3,079,353 UART: [afmc] AUTHORITY.KEYID = 5
3,114,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,790 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,403 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,093 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,014 UART: [afmc] --
3,158,080 UART: [cold-reset] --
3,158,712 UART: [state] Locking Datavault
3,159,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,587 UART: [state] Locking ICCM
3,161,125 UART: [exit] Launching FMC @ 0x40000130
3,166,454 UART:
3,166,470 UART: Running Caliptra FMC ...
3,166,878 UART:
3,166,932 UART: [state] CFI Enabled
3,177,401 UART: [fht] FMC Alias Private Key: 7
3,284,762 UART: [art] Extend RT PCRs Done
3,285,190 UART: [art] Lock RT PCRs Done
3,286,460 UART: [art] Populate DV Done
3,294,685 UART: [fht] FMC Alias Private Key: 7
3,295,637 UART: [art] Derive CDI
3,295,917 UART: [art] Store in in slot 0x4
3,381,190 UART: [art] Derive Key Pair
3,381,550 UART: [art] Store priv key in slot 0x5
3,393,972 UART: [art] Derive Key Pair - Done
3,408,902 UART: [art] Signing Cert with AUTHO
3,409,382 UART: RITY.KEYID = 7
3,424,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,103 UART: [art] PUB.X = 58FF4BDC4B4B922C7EEF9E793F466B19FE8736010313852FE56B7F0E2D572F6D258BC94CD2D02DBFB8B02351010FE539
3,431,868 UART: [art] PUB.Y = AFEBE42E5240DCF70D6265A0B566D5E780F57DDF36A1B495F8630C6F75C1C0B2A9E83C7CACF2EBABB24BAF8558D394B1
3,438,836 UART: [art] SIG.R = FEFD17BDBED15FCE8434597D9A302ED37F126906B09E49943AB4C2A57CECD99505058284CBF66D4134AB8CBD2FF006E7
3,445,610 UART: [art] SIG.S = D8734F1DB8D636D327DDAC45B458A747EE2B1678746B4AC3BA36CD97D5DA2B8D76EEC1DF7FF2A442056F33540A4AF331
3,468,825 UART: Caliptra RT
3,469,078 UART: [state] CFI Enabled
3,577,638 UART: [rt] RT listening for mailbox commands...
3,578,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,064 UART: [rt]cmd =0x4d454153, len=108
3,628,917 >>> mbox cmd response data (12 bytes)
3,628,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,021 UART: [rt]cmd =0x4d454153, len=108
3,679,286 >>> mbox cmd response data (12 bytes)
3,679,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,382 UART: [rt]cmd =0x4d454153, len=108
3,730,395 >>> mbox cmd response data (12 bytes)
3,730,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,427 UART: [rt]cmd =0x4d454153, len=108
3,780,530 >>> mbox cmd response data (12 bytes)
3,780,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,764 UART: [rt]cmd =0x4d454153, len=108
3,832,159 >>> mbox cmd response data (12 bytes)
3,832,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,261 UART: [rt]cmd =0x4d454153, len=108
3,883,054 >>> mbox cmd response data (12 bytes)
3,883,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,146 UART: [rt]cmd =0x4d454153, len=108
3,933,963 >>> mbox cmd response data (12 bytes)
3,933,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,005 UART: [rt]cmd =0x4d454153, len=108
3,984,606 >>> mbox cmd response data (12 bytes)
3,984,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,680 UART: [rt]cmd =0x4d454153, len=108
4,035,267 >>> mbox cmd response data (12 bytes)
4,035,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,369 UART: [rt]cmd =0x4d454153, len=108
4,086,492 >>> mbox cmd response data (12 bytes)
4,086,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,116,588 UART: [rt]cmd =0x4d454153, len=108
4,137,153 >>> mbox cmd response data (12 bytes)
4,137,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,121 UART: [rt]cmd =0x4d454153, len=108
4,189,266 >>> mbox cmd response data (12 bytes)
4,189,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,482 UART: [rt]cmd =0x4d454153, len=108
4,239,585 >>> mbox cmd response data (12 bytes)
4,239,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,531 UART: [rt]cmd =0x4d454153, len=108
4,289,768 >>> mbox cmd response data (12 bytes)
4,289,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,319,756 UART: [rt]cmd =0x4d454153, len=108
4,340,795 >>> mbox cmd response data (12 bytes)
4,340,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,107 UART: [rt]cmd =0x4d454153, len=108
4,372,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 ready_for_fw is high
1,362,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,580 >>> mbox cmd response: success
2,989,388 UART:
2,989,404 UART: Running Caliptra FMC ...
2,989,812 UART:
2,989,866 UART: [state] CFI Enabled
3,000,231 UART: [fht] FMC Alias Private Key: 7
3,107,988 UART: [art] Extend RT PCRs Done
3,108,416 UART: [art] Lock RT PCRs Done
3,109,814 UART: [art] Populate DV Done
3,117,865 UART: [fht] FMC Alias Private Key: 7
3,118,943 UART: [art] Derive CDI
3,119,223 UART: [art] Store in in slot 0x4
3,204,798 UART: [art] Derive Key Pair
3,205,158 UART: [art] Store priv key in slot 0x5
3,218,056 UART: [art] Derive Key Pair - Done
3,233,102 UART: [art] Signing Cert with AUTHO
3,233,582 UART: RITY.KEYID = 7
3,248,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,001 UART: [art] PUB.X = 083EB020335D5325AB7C1E089AF9EC1BC8DA81F46A9EB80B6EB1F56FF2F8230B2E6C8D4C99147E4CE46E7F584AF539DD
3,255,777 UART: [art] PUB.Y = 8525E34534EDB6411FCEB81EF4449EB5B5FF56ED2E97D975C4098DB6FB8963505CD66F4E83F6FF4C8831C2ABB886F54F
3,262,738 UART: [art] SIG.R = 2627DB26B4890514DF7A6738EE500F4D66F7F733E6DBFB811155999AE49BE08D6A2F743D6E54C0A27DAFD2652DD6A335
3,269,510 UART: [art] SIG.S = D2BF1D38EA9F197EC2A093C9C5DA4DB006C5E20D823F49774643C3415D12A14B55535EED306F8C48F64F28EA0166C591
3,293,776 UART: Caliptra RT
3,294,029 UART: [state] CFI Enabled
3,401,570 UART: [rt] RT listening for mailbox commands...
3,402,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,652 UART: [rt]cmd =0x4d454153, len=108
3,454,183 >>> mbox cmd response data (12 bytes)
3,454,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,195 UART: [rt]cmd =0x4d454153, len=108
3,504,160 >>> mbox cmd response data (12 bytes)
3,504,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,352 UART: [rt]cmd =0x4d454153, len=108
3,555,323 >>> mbox cmd response data (12 bytes)
3,555,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,267 UART: [rt]cmd =0x4d454153, len=108
3,605,940 >>> mbox cmd response data (12 bytes)
3,605,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,874 UART: [rt]cmd =0x4d454153, len=108
3,656,819 >>> mbox cmd response data (12 bytes)
3,656,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,827 UART: [rt]cmd =0x4d454153, len=108
3,707,536 >>> mbox cmd response data (12 bytes)
3,707,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,474 UART: [rt]cmd =0x4d454153, len=108
3,758,507 >>> mbox cmd response data (12 bytes)
3,758,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,617 UART: [rt]cmd =0x4d454153, len=108
3,809,012 >>> mbox cmd response data (12 bytes)
3,809,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,210 UART: [rt]cmd =0x4d454153, len=108
3,859,555 >>> mbox cmd response data (12 bytes)
3,859,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,667 UART: [rt]cmd =0x4d454153, len=108
3,911,010 >>> mbox cmd response data (12 bytes)
3,911,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,884 UART: [rt]cmd =0x4d454153, len=108
3,961,223 >>> mbox cmd response data (12 bytes)
3,961,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,269 UART: [rt]cmd =0x4d454153, len=108
4,011,692 >>> mbox cmd response data (12 bytes)
4,011,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,698 UART: [rt]cmd =0x4d454153, len=108
4,063,427 >>> mbox cmd response data (12 bytes)
4,063,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,423 UART: [rt]cmd =0x4d454153, len=108
4,114,102 >>> mbox cmd response data (12 bytes)
4,114,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,020 UART: [rt]cmd =0x4d454153, len=108
4,164,691 >>> mbox cmd response data (12 bytes)
4,164,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,717 UART: [rt]cmd =0x4d454153, len=108
4,196,521 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,897 UART: [kat] LMS
1,476,093 UART: [kat] --
1,476,994 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 ready_for_fw is high
1,481,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,403 UART: [idev] Erasing UDS.KEYID = 0
1,506,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,927 UART: [idev] --
1,515,990 UART: [ldev] ++
1,516,158 UART: [ldev] CDI.KEYID = 6
1,516,521 UART: [ldev] SUBJECT.KEYID = 5
1,516,947 UART: [ldev] AUTHORITY.KEYID = 7
1,517,410 UART: [ldev] FE.KEYID = 1
1,522,678 UART: [ldev] Erasing FE.KEYID = 1
1,548,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,743 UART: [ldev] --
1,588,138 UART: [fwproc] Waiting for Commands...
1,588,813 UART: [fwproc] Received command 0x46574c44
1,589,604 UART: [fwproc] Received Image of size 114332 bytes
2,888,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,757 >>> mbox cmd response: success
3,081,847 UART: [afmc] ++
3,082,015 UART: [afmc] CDI.KEYID = 6
3,082,377 UART: [afmc] SUBJECT.KEYID = 7
3,082,802 UART: [afmc] AUTHORITY.KEYID = 5
3,117,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,756 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,446 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,161 UART: [afmc] --
3,161,217 UART: [cold-reset] --
3,162,053 UART: [state] Locking Datavault
3,163,040 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,644 UART: [state] Locking ICCM
3,164,180 UART: [exit] Launching FMC @ 0x40000130
3,169,509 UART:
3,169,525 UART: Running Caliptra FMC ...
3,169,933 UART:
3,170,076 UART: [state] CFI Enabled
3,180,603 UART: [fht] FMC Alias Private Key: 7
3,288,814 UART: [art] Extend RT PCRs Done
3,289,242 UART: [art] Lock RT PCRs Done
3,290,592 UART: [art] Populate DV Done
3,298,775 UART: [fht] FMC Alias Private Key: 7
3,299,723 UART: [art] Derive CDI
3,300,003 UART: [art] Store in in slot 0x4
3,385,556 UART: [art] Derive Key Pair
3,385,916 UART: [art] Store priv key in slot 0x5
3,399,110 UART: [art] Derive Key Pair - Done
3,413,625 UART: [art] Signing Cert with AUTHO
3,414,105 UART: RITY.KEYID = 7
3,429,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,798 UART: [art] PUB.X = 9D7EAD5850836FD4BE3F00F726A4143DAD6C630B245F571AB3741CBDDBD5B6E6B76B91E209BB5EC9E514F6BCE5C5BB95
3,436,562 UART: [art] PUB.Y = 3010E275D1A271C9DE6613BE7ECF01CF006E8EE0C25B2CE97E8738262AA6809ECD69FE0E896DBCB53DDD3DBF425A8559
3,443,502 UART: [art] SIG.R = 33269B5B3347CB9EE0B7353C39F20631EDF1238605D18DCD09B0D2C504AE453EF4D4895735AB10C25AA5DB50959AD40D
3,450,263 UART: [art] SIG.S = F504C831C55B9BEBA2DDFAD01EACF5D1D3F83E785D35F301327853760725AA5E81D36D6053CAD9D28F13288BA156B36D
3,474,057 UART: Caliptra RT
3,474,402 UART: [state] CFI Enabled
3,582,123 UART: [rt] RT listening for mailbox commands...
3,582,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,565 UART: [rt]cmd =0x4d454153, len=108
3,634,052 >>> mbox cmd response data (12 bytes)
3,634,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,330 UART: [rt]cmd =0x4d454153, len=108
3,685,263 >>> mbox cmd response data (12 bytes)
3,685,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,171 UART: [rt]cmd =0x4d454153, len=108
3,735,862 >>> mbox cmd response data (12 bytes)
3,735,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,004 UART: [rt]cmd =0x4d454153, len=108
3,786,279 >>> mbox cmd response data (12 bytes)
3,786,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,469 UART: [rt]cmd =0x4d454153, len=108
3,836,846 >>> mbox cmd response data (12 bytes)
3,836,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,836 UART: [rt]cmd =0x4d454153, len=108
3,887,279 >>> mbox cmd response data (12 bytes)
3,887,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,357 UART: [rt]cmd =0x4d454153, len=108
3,937,596 >>> mbox cmd response data (12 bytes)
3,937,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,720 UART: [rt]cmd =0x4d454153, len=108
3,988,853 >>> mbox cmd response data (12 bytes)
3,988,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,789 UART: [rt]cmd =0x4d454153, len=108
4,040,176 >>> mbox cmd response data (12 bytes)
4,040,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,964 UART: [rt]cmd =0x4d454153, len=108
4,090,921 >>> mbox cmd response data (12 bytes)
4,090,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,995 UART: [rt]cmd =0x4d454153, len=108
4,141,404 >>> mbox cmd response data (12 bytes)
4,141,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,358 UART: [rt]cmd =0x4d454153, len=108
4,191,295 >>> mbox cmd response data (12 bytes)
4,191,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,285 UART: [rt]cmd =0x4d454153, len=108
4,242,358 >>> mbox cmd response data (12 bytes)
4,242,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,348 UART: [rt]cmd =0x4d454153, len=108
4,293,559 >>> mbox cmd response data (12 bytes)
4,293,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,691 UART: [rt]cmd =0x4d454153, len=108
4,344,138 >>> mbox cmd response data (12 bytes)
4,344,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,880 UART: [rt]cmd =0x4d454153, len=108
4,375,804 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 ready_for_fw is high
1,362,800 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,027 >>> mbox cmd response: success
2,990,075 UART:
2,990,091 UART: Running Caliptra FMC ...
2,990,499 UART:
2,990,642 UART: [state] CFI Enabled
3,001,059 UART: [fht] FMC Alias Private Key: 7
3,109,134 UART: [art] Extend RT PCRs Done
3,109,562 UART: [art] Lock RT PCRs Done
3,111,140 UART: [art] Populate DV Done
3,119,269 UART: [fht] FMC Alias Private Key: 7
3,120,337 UART: [art] Derive CDI
3,120,617 UART: [art] Store in in slot 0x4
3,206,612 UART: [art] Derive Key Pair
3,206,972 UART: [art] Store priv key in slot 0x5
3,220,580 UART: [art] Derive Key Pair - Done
3,235,277 UART: [art] Signing Cert with AUTHO
3,235,757 UART: RITY.KEYID = 7
3,250,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,342 UART: [art] PUB.X = 49FE76CCA575EBE737DF87495425C3BBF0164E244B7C7EC12A7264E97CF14339002DCFE08F9892D0AD4FC9E93C9B8346
3,258,100 UART: [art] PUB.Y = 4744B22A9D76772E6CE5096C586336457A04EC5EFDCFF1E1F939A8524A6C5248B65A28BC4D103893314F4C3F48C67B6B
3,265,046 UART: [art] SIG.R = 3E6D3BCD98E8E69C5EE89C9708D65D41DCCCED095C9B229158930A8A76AEC3D942963A146A4303AD0EC4AFFB2DD3FD55
3,271,821 UART: [art] SIG.S = 0C0627F5EF1012D692A9DC293F099896B484F25353C39B0B9F788E03BE33E2DEA8716F4D0FF9F1A7812A9DC9255272C1
3,295,304 UART: Caliptra RT
3,295,649 UART: [state] CFI Enabled
3,403,489 UART: [rt] RT listening for mailbox commands...
3,404,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,543 UART: [rt]cmd =0x4d454153, len=108
3,455,260 >>> mbox cmd response data (12 bytes)
3,455,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,102 UART: [rt]cmd =0x4d454153, len=108
3,506,667 >>> mbox cmd response data (12 bytes)
3,506,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,715 UART: [rt]cmd =0x4d454153, len=108
3,557,470 >>> mbox cmd response data (12 bytes)
3,557,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,746 UART: [rt]cmd =0x4d454153, len=108
3,609,093 >>> mbox cmd response data (12 bytes)
3,609,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,047 UART: [rt]cmd =0x4d454153, len=108
3,659,768 >>> mbox cmd response data (12 bytes)
3,659,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,734 UART: [rt]cmd =0x4d454153, len=108
3,710,489 >>> mbox cmd response data (12 bytes)
3,710,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,777 UART: [rt]cmd =0x4d454153, len=108
3,762,196 >>> mbox cmd response data (12 bytes)
3,762,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,108 UART: [rt]cmd =0x4d454153, len=108
3,813,005 >>> mbox cmd response data (12 bytes)
3,813,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,127 UART: [rt]cmd =0x4d454153, len=108
3,863,704 >>> mbox cmd response data (12 bytes)
3,863,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,914 UART: [rt]cmd =0x4d454153, len=108
3,913,941 >>> mbox cmd response data (12 bytes)
3,913,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,009 UART: [rt]cmd =0x4d454153, len=108
3,964,968 >>> mbox cmd response data (12 bytes)
3,964,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,994,962 UART: [rt]cmd =0x4d454153, len=108
4,015,841 >>> mbox cmd response data (12 bytes)
4,015,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,031 UART: [rt]cmd =0x4d454153, len=108
4,066,958 >>> mbox cmd response data (12 bytes)
4,066,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,902 UART: [rt]cmd =0x4d454153, len=108
4,117,799 >>> mbox cmd response data (12 bytes)
4,117,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,041 UART: [rt]cmd =0x4d454153, len=108
4,168,874 >>> mbox cmd response data (12 bytes)
4,168,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,828 UART: [rt]cmd =0x4d454153, len=108
4,200,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,871 UART: [kat] SHA2-256
903,811 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 ready_for_fw is high
1,176,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,114 UART: [idev] Erasing UDS.KEYID = 0
1,201,519 UART: [idev] Sha1 KeyId Algorithm
1,210,115 UART: [idev] --
1,211,081 UART: [ldev] ++
1,211,249 UART: [ldev] CDI.KEYID = 6
1,211,612 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,056 UART: [fwproc] Wait for Commands...
1,283,796 UART: [fwproc] Recv command 0x46574c44
1,284,524 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,103 >>> mbox cmd response: success
2,775,301 UART: [afmc] ++
2,775,469 UART: [afmc] CDI.KEYID = 6
2,775,831 UART: [afmc] SUBJECT.KEYID = 7
2,776,256 UART: [afmc] AUTHORITY.KEYID = 5
2,811,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,030 UART: [afmc] --
2,855,086 UART: [cold-reset] --
2,855,870 UART: [state] Locking Datavault
2,856,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,581 UART: [state] Locking ICCM
2,858,007 UART: [exit] Launching FMC @ 0x40000130
2,863,336 UART:
2,863,352 UART: Running Caliptra FMC ...
2,863,760 UART:
2,863,814 UART: [state] CFI Enabled
2,874,457 UART: [fht] FMC Alias Private Key: 7
2,982,034 UART: [art] Extend RT PCRs Done
2,982,462 UART: [art] Lock RT PCRs Done
2,983,908 UART: [art] Populate DV Done
2,991,959 UART: [fht] FMC Alias Private Key: 7
2,992,987 UART: [art] Derive CDI
2,993,267 UART: [art] Store in in slot 0x4
3,078,738 UART: [art] Derive Key Pair
3,079,098 UART: [art] Store priv key in slot 0x5
3,092,024 UART: [art] Derive Key Pair - Done
3,106,668 UART: [art] Signing Cert with AUTHO
3,107,148 UART: RITY.KEYID = 7
3,122,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,179 UART: [art] PUB.X = 327876CA9C6DF2C25D2AF3C0993E59D14F1A4D6501439491F987F08E29DE950C46BC6C19497E522744B7111D40779119
3,129,935 UART: [art] PUB.Y = BE853B13AB2EFFB8A435560CDC540F4E9A1496FCC451A9D813576D68D9BB7C7585D0D1DA2440B4FF2BDC69E580E9F58B
3,136,897 UART: [art] SIG.R = 18454488FBD656BE9F18EF494A69371ED484D3AE6ECFE5ED2FF6FFB2C259FBE34B332BBD811C3CBACE61384DF7C3FA87
3,143,693 UART: [art] SIG.S = 1685442F6386E7D6CD035D2114F7C88DF387CC19EA265094A7DD5934300E795496CD2FA1DC8703BF6B488002201B5621
3,167,524 UART: Caliptra RT
3,167,777 UART: [state] CFI Enabled
3,275,656 UART: [rt] RT listening for mailbox commands...
3,276,326 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,992 UART: [rt]cmd =0x4d454153, len=108
3,327,881 >>> mbox cmd response data (12 bytes)
3,327,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,905 UART: [rt]cmd =0x4d454153, len=108
3,378,316 >>> mbox cmd response data (12 bytes)
3,378,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,356 UART: [rt]cmd =0x4d454153, len=108
3,429,811 >>> mbox cmd response data (12 bytes)
3,429,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,681 UART: [rt]cmd =0x4d454153, len=108
3,480,770 >>> mbox cmd response data (12 bytes)
3,480,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,918 UART: [rt]cmd =0x4d454153, len=108
3,532,535 >>> mbox cmd response data (12 bytes)
3,532,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,561 UART: [rt]cmd =0x4d454153, len=108
3,583,114 >>> mbox cmd response data (12 bytes)
3,583,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,038 UART: [rt]cmd =0x4d454153, len=108
3,633,743 >>> mbox cmd response data (12 bytes)
3,633,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,743 UART: [rt]cmd =0x4d454153, len=108
3,684,302 >>> mbox cmd response data (12 bytes)
3,684,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,338 UART: [rt]cmd =0x4d454153, len=108
3,735,033 >>> mbox cmd response data (12 bytes)
3,735,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,825 UART: [rt]cmd =0x4d454153, len=108
3,785,458 >>> mbox cmd response data (12 bytes)
3,785,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,416 UART: [rt]cmd =0x4d454153, len=108
3,836,113 >>> mbox cmd response data (12 bytes)
3,836,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,373 UART: [rt]cmd =0x4d454153, len=108
3,886,532 >>> mbox cmd response data (12 bytes)
3,886,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,796 UART: [rt]cmd =0x4d454153, len=108
3,937,697 >>> mbox cmd response data (12 bytes)
3,937,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,851 UART: [rt]cmd =0x4d454153, len=108
3,988,278 >>> mbox cmd response data (12 bytes)
3,988,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,420 UART: [rt]cmd =0x4d454153, len=108
4,039,355 >>> mbox cmd response data (12 bytes)
4,039,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,327 UART: [rt]cmd =0x4d454153, len=108
4,071,393 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,959 ready_for_fw is high
1,059,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,990 >>> mbox cmd response: success
2,687,426 UART:
2,687,442 UART: Running Caliptra FMC ...
2,687,850 UART:
2,687,904 UART: [state] CFI Enabled
2,698,307 UART: [fht] FMC Alias Private Key: 7
2,806,438 UART: [art] Extend RT PCRs Done
2,806,866 UART: [art] Lock RT PCRs Done
2,808,122 UART: [art] Populate DV Done
2,816,487 UART: [fht] FMC Alias Private Key: 7
2,817,601 UART: [art] Derive CDI
2,817,881 UART: [art] Store in in slot 0x4
2,903,532 UART: [art] Derive Key Pair
2,903,892 UART: [art] Store priv key in slot 0x5
2,916,790 UART: [art] Derive Key Pair - Done
2,931,505 UART: [art] Signing Cert with AUTHO
2,931,985 UART: RITY.KEYID = 7
2,947,451 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,216 UART: [art] PUB.X = 30C3148C3EB18AE325958A21612EE0B613628262A816A74FF6261CBE5C7D3F7B8DC5D560866E22781DB3B3AD63918ED8
2,954,988 UART: [art] PUB.Y = 24F6FD6378A797F22AC3D441654F1F70E2D63B3C3469117B79F6FF7B4947DC467F823E23E71C87A393DA341B39D0FCDA
2,961,944 UART: [art] SIG.R = CEC778176B045D9AAA505F4FEFF546E9A46C94ABFFE9D29A05FB513B1AA77DBEE9A51813C01F4B6E5A2868D278621ED8
2,968,728 UART: [art] SIG.S = 33577590B9451B71C479AAC4AEE0028019F4121E1CB5BCB30E1CCE69D9D8FB115B32AEAAA0A6397D07A1CB5145979197
2,992,560 UART: Caliptra RT
2,992,813 UART: [state] CFI Enabled
3,099,892 UART: [rt] RT listening for mailbox commands...
3,100,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,364 UART: [rt]cmd =0x4d454153, len=108
3,151,815 >>> mbox cmd response data (12 bytes)
3,151,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,847 UART: [rt]cmd =0x4d454153, len=108
3,202,374 >>> mbox cmd response data (12 bytes)
3,202,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,418 UART: [rt]cmd =0x4d454153, len=108
3,253,263 >>> mbox cmd response data (12 bytes)
3,253,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,173 UART: [rt]cmd =0x4d454153, len=108
3,303,566 >>> mbox cmd response data (12 bytes)
3,303,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,412 UART: [rt]cmd =0x4d454153, len=108
3,354,513 >>> mbox cmd response data (12 bytes)
3,354,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,563 UART: [rt]cmd =0x4d454153, len=108
3,405,292 >>> mbox cmd response data (12 bytes)
3,405,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,446 UART: [rt]cmd =0x4d454153, len=108
3,456,003 >>> mbox cmd response data (12 bytes)
3,456,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,269 UART: [rt]cmd =0x4d454153, len=108
3,506,900 >>> mbox cmd response data (12 bytes)
3,506,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,990 UART: [rt]cmd =0x4d454153, len=108
3,558,055 >>> mbox cmd response data (12 bytes)
3,558,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,103 UART: [rt]cmd =0x4d454153, len=108
3,608,136 >>> mbox cmd response data (12 bytes)
3,608,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,136 UART: [rt]cmd =0x4d454153, len=108
3,658,979 >>> mbox cmd response data (12 bytes)
3,658,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,061 UART: [rt]cmd =0x4d454153, len=108
3,710,332 >>> mbox cmd response data (12 bytes)
3,710,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,360 UART: [rt]cmd =0x4d454153, len=108
3,760,999 >>> mbox cmd response data (12 bytes)
3,761,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,097 UART: [rt]cmd =0x4d454153, len=108
3,811,578 >>> mbox cmd response data (12 bytes)
3,811,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,574 UART: [rt]cmd =0x4d454153, len=108
3,863,019 >>> mbox cmd response data (12 bytes)
3,863,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,045 UART: [rt]cmd =0x4d454153, len=108
3,894,979 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,465 UART: [kat] HMAC-384Kdf
923,081 UART: [kat] LMS
1,171,409 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 ready_for_fw is high
1,176,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,093 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,602 UART: [idev] --
1,211,440 UART: [ldev] ++
1,211,608 UART: [ldev] CDI.KEYID = 6
1,211,971 UART: [ldev] SUBJECT.KEYID = 5
1,212,397 UART: [ldev] AUTHORITY.KEYID = 7
1,212,860 UART: [ldev] FE.KEYID = 1
1,218,376 UART: [ldev] Erasing FE.KEYID = 1
1,244,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,942 UART: [ldev] --
1,283,203 UART: [fwproc] Wait for Commands...
1,284,015 UART: [fwproc] Recv command 0x46574c44
1,284,743 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,056 >>> mbox cmd response: success
2,775,306 UART: [afmc] ++
2,775,474 UART: [afmc] CDI.KEYID = 6
2,775,836 UART: [afmc] SUBJECT.KEYID = 7
2,776,261 UART: [afmc] AUTHORITY.KEYID = 5
2,812,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,693 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,441 UART: [afmc] --
2,855,465 UART: [cold-reset] --
2,856,387 UART: [state] Locking Datavault
2,857,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,192 UART: [state] Locking ICCM
2,858,614 UART: [exit] Launching FMC @ 0x40000130
2,863,943 UART:
2,863,959 UART: Running Caliptra FMC ...
2,864,367 UART:
2,864,510 UART: [state] CFI Enabled
2,875,075 UART: [fht] FMC Alias Private Key: 7
2,983,362 UART: [art] Extend RT PCRs Done
2,983,790 UART: [art] Lock RT PCRs Done
2,985,248 UART: [art] Populate DV Done
2,993,571 UART: [fht] FMC Alias Private Key: 7
2,994,559 UART: [art] Derive CDI
2,994,839 UART: [art] Store in in slot 0x4
3,080,890 UART: [art] Derive Key Pair
3,081,250 UART: [art] Store priv key in slot 0x5
3,094,736 UART: [art] Derive Key Pair - Done
3,109,444 UART: [art] Signing Cert with AUTHO
3,109,924 UART: RITY.KEYID = 7
3,125,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,969 UART: [art] PUB.X = 84784368D3A8ED7389356F6C27157E676A358C787EA0CCAB7A3A34A327F3344E311C455A0D466EC34F48D0C43D2CF986
3,132,736 UART: [art] PUB.Y = 3E5586C5920912EDC7FF21211023733D3A3730B86D657927AD0A973D4A8D5097DE0F3F57D0833BE41DE4A2E7063A03FE
3,139,671 UART: [art] SIG.R = C9E7705B2A3B88E4AB7FC8139FD51FA81A1334F1900967635898E54A7897894FE564DBE0A18A0EDDDCD5FE037A1DA895
3,146,442 UART: [art] SIG.S = 9A2B6C41476E416E66091132D7434D87F4FBBF581EFD6347094788C5CA92D75F9F5E76701FE9A3067A5EF27380C55690
3,169,846 UART: Caliptra RT
3,170,191 UART: [state] CFI Enabled
3,278,309 UART: [rt] RT listening for mailbox commands...
3,278,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,311 UART: [rt]cmd =0x4d454153, len=108
3,329,628 >>> mbox cmd response data (12 bytes)
3,329,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,678 UART: [rt]cmd =0x4d454153, len=108
3,379,223 >>> mbox cmd response data (12 bytes)
3,379,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,439 UART: [rt]cmd =0x4d454153, len=108
3,430,514 >>> mbox cmd response data (12 bytes)
3,430,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,532 UART: [rt]cmd =0x4d454153, len=108
3,481,767 >>> mbox cmd response data (12 bytes)
3,481,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,841 UART: [rt]cmd =0x4d454153, len=108
3,532,342 >>> mbox cmd response data (12 bytes)
3,532,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,288 UART: [rt]cmd =0x4d454153, len=108
3,582,831 >>> mbox cmd response data (12 bytes)
3,582,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,793 UART: [rt]cmd =0x4d454153, len=108
3,633,264 >>> mbox cmd response data (12 bytes)
3,633,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,530 UART: [rt]cmd =0x4d454153, len=108
3,684,479 >>> mbox cmd response data (12 bytes)
3,684,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,563 UART: [rt]cmd =0x4d454153, len=108
3,734,804 >>> mbox cmd response data (12 bytes)
3,734,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,624 UART: [rt]cmd =0x4d454153, len=108
3,786,131 >>> mbox cmd response data (12 bytes)
3,786,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,923 UART: [rt]cmd =0x4d454153, len=108
3,836,662 >>> mbox cmd response data (12 bytes)
3,836,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,680 UART: [rt]cmd =0x4d454153, len=108
3,888,213 >>> mbox cmd response data (12 bytes)
3,888,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,025 UART: [rt]cmd =0x4d454153, len=108
3,938,602 >>> mbox cmd response data (12 bytes)
3,938,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,802 UART: [rt]cmd =0x4d454153, len=108
3,989,489 >>> mbox cmd response data (12 bytes)
3,989,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,695 UART: [rt]cmd =0x4d454153, len=108
4,040,864 >>> mbox cmd response data (12 bytes)
4,040,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,866 UART: [rt]cmd =0x4d454153, len=108
4,072,982 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 ready_for_fw is high
1,060,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,875 >>> mbox cmd response: success
2,686,309 UART:
2,686,325 UART: Running Caliptra FMC ...
2,686,733 UART:
2,686,876 UART: [state] CFI Enabled
2,697,279 UART: [fht] FMC Alias Private Key: 7
2,804,908 UART: [art] Extend RT PCRs Done
2,805,336 UART: [art] Lock RT PCRs Done
2,806,728 UART: [art] Populate DV Done
2,814,977 UART: [fht] FMC Alias Private Key: 7
2,815,915 UART: [art] Derive CDI
2,816,195 UART: [art] Store in in slot 0x4
2,901,672 UART: [art] Derive Key Pair
2,902,032 UART: [art] Store priv key in slot 0x5
2,915,594 UART: [art] Derive Key Pair - Done
2,930,371 UART: [art] Signing Cert with AUTHO
2,930,851 UART: RITY.KEYID = 7
2,945,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,694 UART: [art] PUB.X = 8D044831AFD0F74D47993F66EADD048270C72157D2886638C25BA7E898C2F70FD723316F89EBDDA70AD939085EC3C54F
2,953,453 UART: [art] PUB.Y = E14AE26ADDA80FDA9BD36FF85E6CDD73FD40B73383EE5CB1A3F8B97700CB79BF14D63F860BDF2C8864E5FF89624081F1
2,960,397 UART: [art] SIG.R = CF3278713A4F53BCCBCDD86CAB90E4B60ECF20416B2FED6636C14262B8002928AA8227E901A5CBC516269A54F2516C59
2,967,147 UART: [art] SIG.S = AE68AE23A493611936181E2F79844896D5BD353114A7F00696269933CFE5C8F35E8964AF9621595AAB547411A56EF970
2,991,087 UART: Caliptra RT
2,991,432 UART: [state] CFI Enabled
3,099,964 UART: [rt] RT listening for mailbox commands...
3,100,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,872 UART: [rt]cmd =0x4d454153, len=108
3,151,607 >>> mbox cmd response data (12 bytes)
3,151,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,551 UART: [rt]cmd =0x4d454153, len=108
3,201,914 >>> mbox cmd response data (12 bytes)
3,201,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,672 UART: [rt]cmd =0x4d454153, len=108
3,251,839 >>> mbox cmd response data (12 bytes)
3,251,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,993 UART: [rt]cmd =0x4d454153, len=108
3,303,074 >>> mbox cmd response data (12 bytes)
3,303,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,078 UART: [rt]cmd =0x4d454153, len=108
3,353,343 >>> mbox cmd response data (12 bytes)
3,353,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,201 UART: [rt]cmd =0x4d454153, len=108
3,404,634 >>> mbox cmd response data (12 bytes)
3,404,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,452 UART: [rt]cmd =0x4d454153, len=108
3,455,787 >>> mbox cmd response data (12 bytes)
3,455,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,891 UART: [rt]cmd =0x4d454153, len=108
3,507,256 >>> mbox cmd response data (12 bytes)
3,507,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,312 UART: [rt]cmd =0x4d454153, len=108
3,557,863 >>> mbox cmd response data (12 bytes)
3,557,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,785 UART: [rt]cmd =0x4d454153, len=108
3,608,384 >>> mbox cmd response data (12 bytes)
3,608,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,612 UART: [rt]cmd =0x4d454153, len=108
3,660,167 >>> mbox cmd response data (12 bytes)
3,660,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,089 UART: [rt]cmd =0x4d454153, len=108
3,710,942 >>> mbox cmd response data (12 bytes)
3,710,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,840 UART: [rt]cmd =0x4d454153, len=108
3,761,427 >>> mbox cmd response data (12 bytes)
3,761,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,571 UART: [rt]cmd =0x4d454153, len=108
3,812,904 >>> mbox cmd response data (12 bytes)
3,812,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,752 UART: [rt]cmd =0x4d454153, len=108
3,863,409 >>> mbox cmd response data (12 bytes)
3,863,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,529 UART: [rt]cmd =0x4d454153, len=108
3,895,125 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,174,095 ready_for_fw is high
1,174,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,085 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,268 UART: [ldev] Erasing FE.KEYID = 1
1,240,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,566 UART: [ldev] --
1,279,990 UART: [fwproc] Wait for Commands...
1,280,627 UART: [fwproc] Recv command 0x46574c44
1,281,360 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,091 >>> mbox cmd response: success
2,771,320 UART: [afmc] ++
2,771,488 UART: [afmc] CDI.KEYID = 6
2,771,851 UART: [afmc] SUBJECT.KEYID = 7
2,772,277 UART: [afmc] AUTHORITY.KEYID = 5
2,807,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,485 UART: [afmc] --
2,850,525 UART: [cold-reset] --
2,851,455 UART: [state] Locking Datavault
2,852,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,076 UART: [state] Locking ICCM
2,853,608 UART: [exit] Launching FMC @ 0x40000130
2,858,937 UART:
2,858,953 UART: Running Caliptra FMC ...
2,859,361 UART:
2,859,415 UART: [state] CFI Enabled
2,869,644 UART: [fht] FMC Alias Private Key: 7
2,978,227 UART: [art] Extend RT PCRs Done
2,978,655 UART: [art] Lock RT PCRs Done
2,980,485 UART: [art] Populate DV Done
2,988,560 UART: [fht] FMC Alias Private Key: 7
2,989,522 UART: [art] Derive CDI
2,989,802 UART: [art] Store in in slot 0x4
3,075,487 UART: [art] Derive Key Pair
3,075,847 UART: [art] Store priv key in slot 0x5
3,088,883 UART: [art] Derive Key Pair - Done
3,103,837 UART: [art] Signing Cert with AUTHO
3,104,317 UART: RITY.KEYID = 7
3,119,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,532 UART: [art] PUB.X = 62E949E4523A4E42B0BF7413E1574E5255866CA8CF6C712D2D1C4A78628E25A64122D8AB73CC1D9A37C1B40937CF7BD0
3,127,303 UART: [art] PUB.Y = D157136E2A073BB33B4AC293A4AD0DA0D63088A9379B5F9E25FA0DEA286D2DE160B6F0CE5B53765BA05FC2CE52F9F982
3,134,260 UART: [art] SIG.R = 4D3168F6519A84C1FF0094495A3642375A8861D60BE5F369A2D131D3BF7307F0FCD5D52E3A4D28DEA0A3DC47433E43DF
3,141,008 UART: [art] SIG.S = 0D90CA93ACBEFDA71979BD68562C87C4E817FDD0040C6699CF886F3AE9FB3DD6ED28B366FC97943E935C0EDEB450F232
3,164,823 UART: Caliptra RT
3,165,076 UART: [state] CFI Enabled
3,273,435 UART: [rt] RT listening for mailbox commands...
3,274,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,647 UART: [rt]cmd =0x4d454153, len=108
3,325,080 >>> mbox cmd response data (12 bytes)
3,325,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,136 UART: [rt]cmd =0x4d454153, len=108
3,376,139 >>> mbox cmd response data (12 bytes)
3,376,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,417 UART: [rt]cmd =0x4d454153, len=108
3,426,988 >>> mbox cmd response data (12 bytes)
3,426,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,038 UART: [rt]cmd =0x4d454153, len=108
3,478,405 >>> mbox cmd response data (12 bytes)
3,478,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,313 UART: [rt]cmd =0x4d454153, len=108
3,529,252 >>> mbox cmd response data (12 bytes)
3,529,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,328 UART: [rt]cmd =0x4d454153, len=108
3,580,003 >>> mbox cmd response data (12 bytes)
3,580,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,141 UART: [rt]cmd =0x4d454153, len=108
3,631,478 >>> mbox cmd response data (12 bytes)
3,631,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,328 UART: [rt]cmd =0x4d454153, len=108
3,681,841 >>> mbox cmd response data (12 bytes)
3,681,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,635 UART: [rt]cmd =0x4d454153, len=108
3,732,356 >>> mbox cmd response data (12 bytes)
3,732,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,104 UART: [rt]cmd =0x4d454153, len=108
3,782,673 >>> mbox cmd response data (12 bytes)
3,782,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,819 UART: [rt]cmd =0x4d454153, len=108
3,833,848 >>> mbox cmd response data (12 bytes)
3,833,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,938 UART: [rt]cmd =0x4d454153, len=108
3,884,851 >>> mbox cmd response data (12 bytes)
3,884,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,879 UART: [rt]cmd =0x4d454153, len=108
3,935,898 >>> mbox cmd response data (12 bytes)
3,935,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,898 UART: [rt]cmd =0x4d454153, len=108
3,986,387 >>> mbox cmd response data (12 bytes)
3,986,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,341 UART: [rt]cmd =0x4d454153, len=108
4,037,032 >>> mbox cmd response data (12 bytes)
4,037,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,978 UART: [rt]cmd =0x4d454153, len=108
4,068,984 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,408 ready_for_fw is high
1,056,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,627 >>> mbox cmd response: success
2,686,037 UART:
2,686,053 UART: Running Caliptra FMC ...
2,686,461 UART:
2,686,515 UART: [state] CFI Enabled
2,696,872 UART: [fht] FMC Alias Private Key: 7
2,804,677 UART: [art] Extend RT PCRs Done
2,805,105 UART: [art] Lock RT PCRs Done
2,806,727 UART: [art] Populate DV Done
2,814,716 UART: [fht] FMC Alias Private Key: 7
2,815,764 UART: [art] Derive CDI
2,816,044 UART: [art] Store in in slot 0x4
2,901,771 UART: [art] Derive Key Pair
2,902,131 UART: [art] Store priv key in slot 0x5
2,915,465 UART: [art] Derive Key Pair - Done
2,930,343 UART: [art] Signing Cert with AUTHO
2,930,823 UART: RITY.KEYID = 7
2,946,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,074 UART: [art] PUB.X = 3BFDBC9527B972684342A7904EF30D99AB6093028FF6174CE81C378E6782E44FE1D10E997E33698EDBE7A979719FAD34
2,953,837 UART: [art] PUB.Y = AD05E8EE3A98E9154F4B6EDFED797AF2D217BAFCD73A1AA9CD769A401E8E7D2C128ED22B30FD342355FAA95A0FB68C56
2,960,807 UART: [art] SIG.R = F3D21FBC8A2444B484915EBC4752B6B72712C96D929C281DAB996161A8A2DB91B72A0231C94761EA464BB27CA4442697
2,967,574 UART: [art] SIG.S = F2105558F4D9E92704A8A1662650121309E70A26DA6FCD07B840616B73BA973A0A8A4D039548C54531CF55BB4BF207AF
2,991,528 UART: Caliptra RT
2,991,781 UART: [state] CFI Enabled
3,099,003 UART: [rt] RT listening for mailbox commands...
3,099,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,195 UART: [rt]cmd =0x4d454153, len=108
3,150,964 >>> mbox cmd response data (12 bytes)
3,150,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,812 UART: [rt]cmd =0x4d454153, len=108
3,201,947 >>> mbox cmd response data (12 bytes)
3,201,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,931 UART: [rt]cmd =0x4d454153, len=108
3,251,898 >>> mbox cmd response data (12 bytes)
3,251,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,230 UART: [rt]cmd =0x4d454153, len=108
3,302,689 >>> mbox cmd response data (12 bytes)
3,302,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,787 UART: [rt]cmd =0x4d454153, len=108
3,354,408 >>> mbox cmd response data (12 bytes)
3,354,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,230 UART: [rt]cmd =0x4d454153, len=108
3,404,527 >>> mbox cmd response data (12 bytes)
3,404,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,427 UART: [rt]cmd =0x4d454153, len=108
3,455,326 >>> mbox cmd response data (12 bytes)
3,455,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,466 UART: [rt]cmd =0x4d454153, len=108
3,507,309 >>> mbox cmd response data (12 bytes)
3,507,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,407 UART: [rt]cmd =0x4d454153, len=108
3,558,100 >>> mbox cmd response data (12 bytes)
3,558,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,918 UART: [rt]cmd =0x4d454153, len=108
3,608,645 >>> mbox cmd response data (12 bytes)
3,608,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,825 UART: [rt]cmd =0x4d454153, len=108
3,658,996 >>> mbox cmd response data (12 bytes)
3,658,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,274 UART: [rt]cmd =0x4d454153, len=108
3,709,867 >>> mbox cmd response data (12 bytes)
3,709,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,917 UART: [rt]cmd =0x4d454153, len=108
3,760,978 >>> mbox cmd response data (12 bytes)
3,760,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,984 UART: [rt]cmd =0x4d454153, len=108
3,811,537 >>> mbox cmd response data (12 bytes)
3,811,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,403 UART: [rt]cmd =0x4d454153, len=108
3,861,770 >>> mbox cmd response data (12 bytes)
3,861,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,938 UART: [rt]cmd =0x4d454153, len=108
3,893,956 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,124 >>> mbox cmd response: success
2,773,159 UART: [afmc] ++
2,773,327 UART: [afmc] CDI.KEYID = 6
2,773,690 UART: [afmc] SUBJECT.KEYID = 7
2,774,116 UART: [afmc] AUTHORITY.KEYID = 5
2,810,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,670 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,001 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,810 UART: [afmc] --
2,853,892 UART: [cold-reset] --
2,854,584 UART: [state] Locking Datavault
2,856,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,695 UART: [state] Locking ICCM
2,857,249 UART: [exit] Launching FMC @ 0x40000130
2,862,578 UART:
2,862,594 UART: Running Caliptra FMC ...
2,863,002 UART:
2,863,145 UART: [state] CFI Enabled
2,873,550 UART: [fht] FMC Alias Private Key: 7
2,981,257 UART: [art] Extend RT PCRs Done
2,981,685 UART: [art] Lock RT PCRs Done
2,983,105 UART: [art] Populate DV Done
2,991,340 UART: [fht] FMC Alias Private Key: 7
2,992,492 UART: [art] Derive CDI
2,992,772 UART: [art] Store in in slot 0x4
3,078,199 UART: [art] Derive Key Pair
3,078,559 UART: [art] Store priv key in slot 0x5
3,091,947 UART: [art] Derive Key Pair - Done
3,106,817 UART: [art] Signing Cert with AUTHO
3,107,297 UART: RITY.KEYID = 7
3,122,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,574 UART: [art] PUB.X = BA1E6B77242F8D4C73289F3B6838F375183E883A5FAF369386AA4E23AC379169881B1B057561567796EB41BE1E8C9071
3,130,335 UART: [art] PUB.Y = 607C12CDB4BA641745EFD3D88F8D4006CCE249BB48598BE5C6E3D8E003210CEA77C08191B71AF54A2ADEFE437A213F69
3,137,290 UART: [art] SIG.R = 7934883FB23615B9A4D517A088252151119CB850B664C9559AC749184CCB5F2B83424C630A1CDBF594B7D812FB641F5B
3,144,053 UART: [art] SIG.S = 85D74C756A5C0BD23AEBA06E859C34C9488819B2E4A0FCA14D88A537273E75F479C04EA12BAD587FB5485BB2DA714F22
3,167,567 UART: Caliptra RT
3,167,912 UART: [state] CFI Enabled
3,274,729 UART: [rt] RT listening for mailbox commands...
3,275,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,827 UART: [rt]cmd =0x4d454153, len=108
3,326,382 >>> mbox cmd response data (12 bytes)
3,326,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,102 UART: [rt]cmd =0x4d454153, len=108
3,376,701 >>> mbox cmd response data (12 bytes)
3,376,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,887 UART: [rt]cmd =0x4d454153, len=108
3,427,688 >>> mbox cmd response data (12 bytes)
3,427,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,928 UART: [rt]cmd =0x4d454153, len=108
3,479,241 >>> mbox cmd response data (12 bytes)
3,479,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,055 UART: [rt]cmd =0x4d454153, len=108
3,529,442 >>> mbox cmd response data (12 bytes)
3,529,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,416 UART: [rt]cmd =0x4d454153, len=108
3,580,277 >>> mbox cmd response data (12 bytes)
3,580,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,619 UART: [rt]cmd =0x4d454153, len=108
3,631,752 >>> mbox cmd response data (12 bytes)
3,631,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,666 UART: [rt]cmd =0x4d454153, len=108
3,682,525 >>> mbox cmd response data (12 bytes)
3,682,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,691 UART: [rt]cmd =0x4d454153, len=108
3,733,522 >>> mbox cmd response data (12 bytes)
3,733,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,464 UART: [rt]cmd =0x4d454153, len=108
3,783,985 >>> mbox cmd response data (12 bytes)
3,783,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,727 UART: [rt]cmd =0x4d454153, len=108
3,834,308 >>> mbox cmd response data (12 bytes)
3,834,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,364 UART: [rt]cmd =0x4d454153, len=108
3,885,413 >>> mbox cmd response data (12 bytes)
3,885,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,559 UART: [rt]cmd =0x4d454153, len=108
3,935,074 >>> mbox cmd response data (12 bytes)
3,935,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,012 UART: [rt]cmd =0x4d454153, len=108
3,985,397 >>> mbox cmd response data (12 bytes)
3,985,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,107 UART: [rt]cmd =0x4d454153, len=108
4,036,574 >>> mbox cmd response data (12 bytes)
4,036,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,580 UART: [rt]cmd =0x4d454153, len=108
4,068,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,913 ready_for_fw is high
1,056,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,752 >>> mbox cmd response: success
2,684,820 UART:
2,684,836 UART: Running Caliptra FMC ...
2,685,244 UART:
2,685,387 UART: [state] CFI Enabled
2,696,356 UART: [fht] FMC Alias Private Key: 7
2,804,491 UART: [art] Extend RT PCRs Done
2,804,919 UART: [art] Lock RT PCRs Done
2,806,681 UART: [art] Populate DV Done
2,814,868 UART: [fht] FMC Alias Private Key: 7
2,815,980 UART: [art] Derive CDI
2,816,260 UART: [art] Store in in slot 0x4
2,902,071 UART: [art] Derive Key Pair
2,902,431 UART: [art] Store priv key in slot 0x5
2,915,745 UART: [art] Derive Key Pair - Done
2,930,408 UART: [art] Signing Cert with AUTHO
2,930,888 UART: RITY.KEYID = 7
2,945,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,573 UART: [art] PUB.X = E95F6DC6902C5130DDA8C8BAFBCEB73553A3C2BA6DE0CCEDE29DF0D664545F04F51C82ACCCC3101F29F9BE4E1A7B8EA4
2,953,372 UART: [art] PUB.Y = 638CB95178F78D0E45C12EF5402EF385263551480DEC3748B026391A73BD98B8767D4913579B8CCF8DB280209F6EDAB9
2,960,314 UART: [art] SIG.R = 534A75CC1F8D4227623586F60DF87D0AC6DB908461D8388775A84D7BE896B43CA6063FA2FB11955009B7E55BAFCF547B
2,967,076 UART: [art] SIG.S = 5E53E99C093D5AD53C193C12A6BBAA873C8F927D04A923FE1CA0B36DCDE69FCCF4DADF7EDAB07469C487C6C51B1169ED
2,990,535 UART: Caliptra RT
2,990,880 UART: [state] CFI Enabled
3,098,869 UART: [rt] RT listening for mailbox commands...
3,099,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,365 UART: [rt]cmd =0x4d454153, len=108
3,150,952 >>> mbox cmd response data (12 bytes)
3,150,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,898 UART: [rt]cmd =0x4d454153, len=108
3,200,745 >>> mbox cmd response data (12 bytes)
3,200,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,703 UART: [rt]cmd =0x4d454153, len=108
3,250,662 >>> mbox cmd response data (12 bytes)
3,250,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,762 UART: [rt]cmd =0x4d454153, len=108
3,301,771 >>> mbox cmd response data (12 bytes)
3,301,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,725 UART: [rt]cmd =0x4d454153, len=108
3,352,498 >>> mbox cmd response data (12 bytes)
3,352,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,320 UART: [rt]cmd =0x4d454153, len=108
3,403,053 >>> mbox cmd response data (12 bytes)
3,403,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,133 UART: [rt]cmd =0x4d454153, len=108
3,454,186 >>> mbox cmd response data (12 bytes)
3,454,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,252 UART: [rt]cmd =0x4d454153, len=108
3,505,099 >>> mbox cmd response data (12 bytes)
3,505,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,097 UART: [rt]cmd =0x4d454153, len=108
3,556,156 >>> mbox cmd response data (12 bytes)
3,556,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,350 UART: [rt]cmd =0x4d454153, len=108
3,606,789 >>> mbox cmd response data (12 bytes)
3,606,790 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,731 UART: [rt]cmd =0x4d454153, len=108
3,656,894 >>> mbox cmd response data (12 bytes)
3,656,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,972 UART: [rt]cmd =0x4d454153, len=108
3,707,811 >>> mbox cmd response data (12 bytes)
3,707,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,655 UART: [rt]cmd =0x4d454153, len=108
3,758,504 >>> mbox cmd response data (12 bytes)
3,758,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,582 UART: [rt]cmd =0x4d454153, len=108
3,809,375 >>> mbox cmd response data (12 bytes)
3,809,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,487 UART: [rt]cmd =0x4d454153, len=108
3,860,382 >>> mbox cmd response data (12 bytes)
3,860,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,676 UART: [rt]cmd =0x4d454153, len=108
3,892,540 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,687 UART: [cold-reset] ++
1,477,079 UART: [fht] Storing FHT @ 0x50003400
1,480,070 UART: [idev] ++
1,480,238 UART: [idev] CDI.KEYID = 6
1,480,598 UART: [idev] SUBJECT.KEYID = 7
1,481,022 UART: [idev] UDS.KEYID = 0
1,488,700 UART: [idev] Erasing UDS.KEYID = 0
1,505,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,515,045 UART: [ldev] ++
1,515,213 UART: [ldev] CDI.KEYID = 6
1,515,576 UART: [ldev] SUBJECT.KEYID = 5
1,516,002 UART: [ldev] AUTHORITY.KEYID = 7
1,516,465 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,258 UART: [ldev] --
1,586,753 UART: [fwproc] Waiting for Commands...
1,587,618 UART: [fwproc] Received command 0x46574c44
1,588,409 UART: [fwproc] Received Image of size 114332 bytes
2,886,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,537 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,694 >>> mbox cmd response: success
3,079,914 UART: [afmc] ++
3,080,082 UART: [afmc] CDI.KEYID = 6
3,080,444 UART: [afmc] SUBJECT.KEYID = 7
3,080,869 UART: [afmc] AUTHORITY.KEYID = 5
3,115,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,141 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,831 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,698 UART: [afmc] --
3,158,760 UART: [cold-reset] --
3,159,440 UART: [state] Locking Datavault
3,160,529 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,133 UART: [state] Locking ICCM
3,161,793 UART: [exit] Launching FMC @ 0x40000130
3,167,122 UART:
3,167,138 UART: Running Caliptra FMC ...
3,167,546 UART:
3,167,600 UART: [state] CFI Enabled
3,177,691 UART: [fht] FMC Alias Private Key: 7
3,285,612 UART: [art] Extend RT PCRs Done
3,286,040 UART: [art] Lock RT PCRs Done
3,287,804 UART: [art] Populate DV Done
3,295,981 UART: [fht] FMC Alias Private Key: 7
3,296,995 UART: [art] Derive CDI
3,297,275 UART: [art] Store in in slot 0x4
3,382,466 UART: [art] Derive Key Pair
3,382,826 UART: [art] Store priv key in slot 0x5
3,395,136 UART: [art] Derive Key Pair - Done
3,409,295 UART: [art] Signing Cert with AUTHO
3,409,775 UART: RITY.KEYID = 7
3,425,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,806 UART: [art] PUB.X = 82C6280374BEA6DC0CD0236E5488CC5EB4E73FB6D90FBD79CC4CDEBD44AFE1E85A793413FCDB1CEAD2915F2E44C4B270
3,432,593 UART: [art] PUB.Y = DF937EACF6F013476F3AE64B41873EE2624E1FF54B05E390F884CBA09ED2118C19304CD49DD70E4DF9FABB6944B96AEC
3,439,555 UART: [art] SIG.R = B98E94FEDE58A8B0D9846BD4510E48E6EF265356A491AC5C4B0F1388EC900F7C8F9F9CA03BDEB4A98FA60A9FD18B5F15
3,446,333 UART: [art] SIG.S = F330B458FE94A888EE7E8C62F72382066C0E1A50E536E3DDA44D209FD44806C7D35EF2515909D7287AF937974D62A47E
3,470,136 UART: Caliptra RT
3,470,389 UART: [state] CFI Enabled
3,578,245 UART: [rt] RT listening for mailbox commands...
3,578,915 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,391 UART: [rt]cmd =0x44504543, len=92
3,616,385 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,236 >>> mbox cmd response: success
2,989,470 UART:
2,989,486 UART: Running Caliptra FMC ...
2,989,894 UART:
2,989,948 UART: [state] CFI Enabled
3,000,287 UART: [fht] FMC Alias Private Key: 7
3,108,036 UART: [art] Extend RT PCRs Done
3,108,464 UART: [art] Lock RT PCRs Done
3,110,130 UART: [art] Populate DV Done
3,118,157 UART: [fht] FMC Alias Private Key: 7
3,119,161 UART: [art] Derive CDI
3,119,441 UART: [art] Store in in slot 0x4
3,204,988 UART: [art] Derive Key Pair
3,205,348 UART: [art] Store priv key in slot 0x5
3,217,842 UART: [art] Derive Key Pair - Done
3,232,802 UART: [art] Signing Cert with AUTHO
3,233,282 UART: RITY.KEYID = 7
3,248,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,325 UART: [art] PUB.X = 1EDB1E313BDC2FC8714B114416C6951963F910D09AE6528CC409418920D7368DEB3EC735A2B82B3AC45792FA9B1ACC39
3,256,098 UART: [art] PUB.Y = D47A0989D78A91920775213D2BACAAC80D8831BE94C25D6123E905FCE1E851BCFE87B31DCD98397E93C6E52C7323CF25
3,263,044 UART: [art] SIG.R = B0FC60BE0518EA92D8BACB2C945AC58A1600D33EDD22769C03D1DEAE49657A138AA479F970700AF9766DC61F616FF3B4
3,269,797 UART: [art] SIG.S = A5B19F29220F502D7FD01036F03DB3C97978840A7392B232B6DC4C1F6A0DEEF114E72EC626427646A1836309400C40ED
3,293,811 UART: Caliptra RT
3,294,064 UART: [state] CFI Enabled
3,402,370 UART: [rt] RT listening for mailbox commands...
3,403,040 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,474 UART: [rt]cmd =0x44504543, len=92
3,440,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,487 UART: [kat] SHA2-512-ACC
897,388 UART: [kat] ECC-384
903,013 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,582 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,488,889 UART: [idev] Erasing UDS.KEYID = 0
1,506,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,015 UART: [idev] --
1,516,128 UART: [ldev] ++
1,516,296 UART: [ldev] CDI.KEYID = 6
1,516,659 UART: [ldev] SUBJECT.KEYID = 5
1,517,085 UART: [ldev] AUTHORITY.KEYID = 7
1,517,548 UART: [ldev] FE.KEYID = 1
1,522,908 UART: [ldev] Erasing FE.KEYID = 1
1,548,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,063 UART: [ldev] --
1,588,382 UART: [fwproc] Waiting for Commands...
1,589,067 UART: [fwproc] Received command 0x46574c44
1,589,858 UART: [fwproc] Received Image of size 114332 bytes
2,888,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,231 >>> mbox cmd response: success
3,082,371 UART: [afmc] ++
3,082,539 UART: [afmc] CDI.KEYID = 6
3,082,901 UART: [afmc] SUBJECT.KEYID = 7
3,083,326 UART: [afmc] AUTHORITY.KEYID = 5
3,118,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,274 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,964 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,765 UART: [afmc] --
3,161,813 UART: [cold-reset] --
3,162,659 UART: [state] Locking Datavault
3,163,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,590 UART: [state] Locking ICCM
3,165,114 UART: [exit] Launching FMC @ 0x40000130
3,170,443 UART:
3,170,459 UART: Running Caliptra FMC ...
3,170,867 UART:
3,171,010 UART: [state] CFI Enabled
3,181,959 UART: [fht] FMC Alias Private Key: 7
3,289,662 UART: [art] Extend RT PCRs Done
3,290,090 UART: [art] Lock RT PCRs Done
3,291,998 UART: [art] Populate DV Done
3,300,283 UART: [fht] FMC Alias Private Key: 7
3,301,227 UART: [art] Derive CDI
3,301,507 UART: [art] Store in in slot 0x4
3,386,654 UART: [art] Derive Key Pair
3,387,014 UART: [art] Store priv key in slot 0x5
3,400,376 UART: [art] Derive Key Pair - Done
3,415,016 UART: [art] Signing Cert with AUTHO
3,415,496 UART: RITY.KEYID = 7
3,430,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,503 UART: [art] PUB.X = 52752E51F72399DBFBE80E78AB05429D6811985A268FEC364C10DB399D0DB7190DAAF58A1050DF6B2F3AF0FEEFE2354C
3,438,275 UART: [art] PUB.Y = 2B97A79295AFF04885FAC944E6AC1847893DF6EEA4A51449DD297AAEFE1F733B3A650303C09D0209512F810F021B45B8
3,445,211 UART: [art] SIG.R = DAD72A6B0B2DD85BE8B1825EA57441C64D1F89CE95EBF707F272C831DA535ECF67B2A52A7274B76E9CFA0AB4A0EEE491
3,451,994 UART: [art] SIG.S = 56EA50D4F6D5AE736750147317DC8888A3488CD4CB743D459803419C9DB906922EF21C2B8CBB0C71C6B116DE058A212E
3,475,577 UART: Caliptra RT
3,475,922 UART: [state] CFI Enabled
3,583,169 UART: [rt] RT listening for mailbox commands...
3,583,839 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,059 UART: [rt]cmd =0x44504543, len=92
3,621,491 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,687 >>> mbox cmd response: success
2,988,303 UART:
2,988,319 UART: Running Caliptra FMC ...
2,988,727 UART:
2,988,870 UART: [state] CFI Enabled
2,999,395 UART: [fht] FMC Alias Private Key: 7
3,107,380 UART: [art] Extend RT PCRs Done
3,107,808 UART: [art] Lock RT PCRs Done
3,109,264 UART: [art] Populate DV Done
3,117,589 UART: [fht] FMC Alias Private Key: 7
3,118,575 UART: [art] Derive CDI
3,118,855 UART: [art] Store in in slot 0x4
3,204,658 UART: [art] Derive Key Pair
3,205,018 UART: [art] Store priv key in slot 0x5
3,218,580 UART: [art] Derive Key Pair - Done
3,233,220 UART: [art] Signing Cert with AUTHO
3,233,700 UART: RITY.KEYID = 7
3,248,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,505 UART: [art] PUB.X = 6748F6AD0E3A3B1048843720E533EB8D9F0F41DC1D00307A6B6BF5C190A93E051925E99CA410D4D61E78BC87BE205757
3,256,246 UART: [art] PUB.Y = 3080C58EB0A7A077131C506FADF39EE35E075D38679056E898925E78E9726EFA624613D6DE0857F6A1365B245D47B369
3,263,184 UART: [art] SIG.R = C531622E095BC8E4AEAC43FF59B05FB742994C7E1E1E1A2ED2F93D531F5B09432F5A665CB94B8E39CA90997172EEC798
3,269,958 UART: [art] SIG.S = C51204FAB7CF2EFFFE0C17640415CD62F09F1465EDC6561395FADB61AF3CEBFE946F2C5796964C865F17A0ADE60F3275
3,294,647 UART: Caliptra RT
3,294,992 UART: [state] CFI Enabled
3,402,650 UART: [rt] RT listening for mailbox commands...
3,403,320 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,270 UART: [rt]cmd =0x44504543, len=92
3,440,404 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,781 UART: [kat] SHA2-256
903,721 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,272 UART: [kat] LMS
1,170,600 UART: [kat] --
1,171,429 UART: [cold-reset] ++
1,171,803 UART: [fht] FHT @ 0x50003400
1,174,496 UART: [idev] ++
1,174,664 UART: [idev] CDI.KEYID = 6
1,175,024 UART: [idev] SUBJECT.KEYID = 7
1,175,448 UART: [idev] UDS.KEYID = 0
1,183,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,449 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,708 UART: [fwproc] Wait for Commands...
1,283,504 UART: [fwproc] Recv command 0x46574c44
1,284,232 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,429 >>> mbox cmd response: success
2,774,565 UART: [afmc] ++
2,774,733 UART: [afmc] CDI.KEYID = 6
2,775,095 UART: [afmc] SUBJECT.KEYID = 7
2,775,520 UART: [afmc] AUTHORITY.KEYID = 5
2,810,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,757 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,476 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,178 UART: [afmc] --
2,854,118 UART: [cold-reset] --
2,854,996 UART: [state] Locking Datavault
2,856,057 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,661 UART: [state] Locking ICCM
2,857,283 UART: [exit] Launching FMC @ 0x40000130
2,862,612 UART:
2,862,628 UART: Running Caliptra FMC ...
2,863,036 UART:
2,863,090 UART: [state] CFI Enabled
2,873,293 UART: [fht] FMC Alias Private Key: 7
2,981,408 UART: [art] Extend RT PCRs Done
2,981,836 UART: [art] Lock RT PCRs Done
2,983,188 UART: [art] Populate DV Done
2,991,711 UART: [fht] FMC Alias Private Key: 7
2,992,691 UART: [art] Derive CDI
2,992,971 UART: [art] Store in in slot 0x4
3,078,730 UART: [art] Derive Key Pair
3,079,090 UART: [art] Store priv key in slot 0x5
3,092,380 UART: [art] Derive Key Pair - Done
3,107,329 UART: [art] Signing Cert with AUTHO
3,107,809 UART: RITY.KEYID = 7
3,123,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,070 UART: [art] PUB.X = C3A55AD31F84D1A8AC26C3867390A5898FFA6B4F5CE3465287C5F6FABCE67FA7B49BA24E4C564015054A0E954A6E8F8A
3,130,848 UART: [art] PUB.Y = 891BF223F435214AEED5B8766713BC418BBBDA3EA808A2483C59AF89EA261A2E8150E442059B41C1D0140199D2364310
3,137,787 UART: [art] SIG.R = 6D54B68E0AA2D33F75B6D840BDF66D2D907EB1C6F6ADE367EEDEB303526EE42BB1D12A5E5D36D5568863F6520F8012B4
3,144,562 UART: [art] SIG.S = 909795A4870CC9FA2313D07FE7961D55BC64E17A4FF3AC25EBA7635CD44100E70B55C0D67C96B6F4C8F9115516668FD7
3,167,947 UART: Caliptra RT
3,168,200 UART: [state] CFI Enabled
3,275,939 UART: [rt] RT listening for mailbox commands...
3,276,609 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,029 UART: [rt]cmd =0x44504543, len=92
3,314,469 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,552 >>> mbox cmd response: success
2,688,564 UART:
2,688,580 UART: Running Caliptra FMC ...
2,688,988 UART:
2,689,042 UART: [state] CFI Enabled
2,699,735 UART: [fht] FMC Alias Private Key: 7
2,807,304 UART: [art] Extend RT PCRs Done
2,807,732 UART: [art] Lock RT PCRs Done
2,809,406 UART: [art] Populate DV Done
2,817,637 UART: [fht] FMC Alias Private Key: 7
2,818,591 UART: [art] Derive CDI
2,818,871 UART: [art] Store in in slot 0x4
2,905,096 UART: [art] Derive Key Pair
2,905,456 UART: [art] Store priv key in slot 0x5
2,918,724 UART: [art] Derive Key Pair - Done
2,933,087 UART: [art] Signing Cert with AUTHO
2,933,567 UART: RITY.KEYID = 7
2,948,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,110 UART: [art] PUB.X = 87F3E62B307557EA8319C51B425ED0029B93AA12E3681220CFF7ADAE7FB8468EAE710C155D9F0546434C644AE70227F6
2,955,870 UART: [art] PUB.Y = FCF4C8E856919D4F3D67DD05ADF32FF9F9E36AF318F4F2CD76BB83DA35253627A5FCCAF4DE2BFB70B4143D0F02C09793
2,962,833 UART: [art] SIG.R = 00F3FE2F96B2B4327FBD85EF457AB3FEC3BC74C43ECC3F12E53BFC44DED064FB7BEEF9FD50B3D6BA5CD86EC578D20D31
2,969,612 UART: [art] SIG.S = C5517334A28CC9D112DBD745662CEA65EE75188454BF9239DEF54CC00D6C4CEA5FC1D23CF9721C8CB86553131A2578F8
2,993,014 UART: Caliptra RT
2,993,267 UART: [state] CFI Enabled
3,100,823 UART: [rt] RT listening for mailbox commands...
3,101,493 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,783 UART: [rt]cmd =0x44504543, len=92
3,139,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
86,050 UART: [state] WD Timer not started. Device not locked for debugging
87,279 UART: [kat] SHA2-256
892,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,054 UART: [kat] ++
897,206 UART: [kat] sha1
901,454 UART: [kat] SHA2-256
903,394 UART: [kat] SHA2-384
906,171 UART: [kat] SHA2-512-ACC
908,072 UART: [kat] ECC-384
918,017 UART: [kat] HMAC-384Kdf
922,549 UART: [kat] LMS
1,170,877 UART: [kat] --
1,171,542 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,611 UART: [idev] ++
1,174,779 UART: [idev] CDI.KEYID = 6
1,175,139 UART: [idev] SUBJECT.KEYID = 7
1,175,563 UART: [idev] UDS.KEYID = 0
1,183,859 UART: [idev] Erasing UDS.KEYID = 0
1,200,598 UART: [idev] Sha1 KeyId Algorithm
1,209,146 UART: [idev] --
1,210,224 UART: [ldev] ++
1,210,392 UART: [ldev] CDI.KEYID = 6
1,210,755 UART: [ldev] SUBJECT.KEYID = 5
1,211,181 UART: [ldev] AUTHORITY.KEYID = 7
1,211,644 UART: [ldev] FE.KEYID = 1
1,216,954 UART: [ldev] Erasing FE.KEYID = 1
1,243,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,558 UART: [ldev] --
1,282,857 UART: [fwproc] Wait for Commands...
1,283,467 UART: [fwproc] Recv command 0x46574c44
1,284,195 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,704 >>> mbox cmd response: success
2,775,780 UART: [afmc] ++
2,775,948 UART: [afmc] CDI.KEYID = 6
2,776,310 UART: [afmc] SUBJECT.KEYID = 7
2,776,735 UART: [afmc] AUTHORITY.KEYID = 5
2,812,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,771 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,375 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,227 UART: [afmc] --
2,856,341 UART: [cold-reset] --
2,857,147 UART: [state] Locking Datavault
2,858,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,762 UART: [state] Locking ICCM
2,859,202 UART: [exit] Launching FMC @ 0x40000130
2,864,531 UART:
2,864,547 UART: Running Caliptra FMC ...
2,864,955 UART:
2,865,098 UART: [state] CFI Enabled
2,875,855 UART: [fht] FMC Alias Private Key: 7
2,983,780 UART: [art] Extend RT PCRs Done
2,984,208 UART: [art] Lock RT PCRs Done
2,985,518 UART: [art] Populate DV Done
2,993,589 UART: [fht] FMC Alias Private Key: 7
2,994,613 UART: [art] Derive CDI
2,994,893 UART: [art] Store in in slot 0x4
3,080,516 UART: [art] Derive Key Pair
3,080,876 UART: [art] Store priv key in slot 0x5
3,094,326 UART: [art] Derive Key Pair - Done
3,109,386 UART: [art] Signing Cert with AUTHO
3,109,866 UART: RITY.KEYID = 7
3,124,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,591 UART: [art] PUB.X = 20D232875C0F69E195CE3B202910F791936114123AA0874CAA6A1CE05C9158154A6947EE1A56056A3C5EF364CA24FF85
3,132,351 UART: [art] PUB.Y = 27CFBE9B48E2157D5CEB6F0428961215E2C19EDCEC92F95EF488CCEB407CBF0A7CF438F0706C67985FB383FC89787FA6
3,139,311 UART: [art] SIG.R = A3EDE7DBB774955BB010536A5A6BC98E4BE42EFB82950AD4595EF7E513DD2C9154B65615A17654BA46EF98A81B876D30
3,146,088 UART: [art] SIG.S = 89D5A1C7BEC0E712A8CA5412CB58B0E8A7833FF66241B0DDD5953E8D5B9AA4A3534ACEDB6F6F0A31887027B80567C020
3,170,073 UART: Caliptra RT
3,170,418 UART: [state] CFI Enabled
3,278,164 UART: [rt] RT listening for mailbox commands...
3,278,834 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,526 UART: [rt]cmd =0x44504543, len=92
3,316,962 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,025 >>> mbox cmd response: success
2,689,953 UART:
2,689,969 UART: Running Caliptra FMC ...
2,690,377 UART:
2,690,520 UART: [state] CFI Enabled
2,701,625 UART: [fht] FMC Alias Private Key: 7
2,809,632 UART: [art] Extend RT PCRs Done
2,810,060 UART: [art] Lock RT PCRs Done
2,811,550 UART: [art] Populate DV Done
2,819,837 UART: [fht] FMC Alias Private Key: 7
2,820,795 UART: [art] Derive CDI
2,821,075 UART: [art] Store in in slot 0x4
2,906,724 UART: [art] Derive Key Pair
2,907,084 UART: [art] Store priv key in slot 0x5
2,920,748 UART: [art] Derive Key Pair - Done
2,935,619 UART: [art] Signing Cert with AUTHO
2,936,099 UART: RITY.KEYID = 7
2,951,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,896 UART: [art] PUB.X = D23C133EE8F5A340429362DF0AEC976D1911D48A0CE39DB7F1ED1C348F132B0EDCE77552DD91EA3384E23776A37C1909
2,958,662 UART: [art] PUB.Y = 94B8F7C62DA9A827059C13F191476CDF8710908CC2B7290B82F771D55A6B7773293B98F70A59D9B21BAFFD1B680F61BB
2,965,604 UART: [art] SIG.R = CAAF481561FB2D6FC86D5D36C4482213B9B07DEA2372241B8F7881818917C843918AD6B62118B7C1D0D9A2DC9FB52FDB
2,972,382 UART: [art] SIG.S = 97E98E4A01EA169805D7CD3D7ACE1A7AF08A3F4A138DD43C4FEEC7577CD5BEC53E1904EEF619D77CDA366C91C1346A8E
2,996,068 UART: Caliptra RT
2,996,413 UART: [state] CFI Enabled
3,104,833 UART: [rt] RT listening for mailbox commands...
3,105,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,169 UART: [rt]cmd =0x44504543, len=92
3,143,531 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,344 UART: [kat] HMAC-384Kdf
919,856 UART: [kat] LMS
1,168,168 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,841 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,081 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,208,996 UART: [ldev] ++
1,209,164 UART: [ldev] CDI.KEYID = 6
1,209,528 UART: [ldev] SUBJECT.KEYID = 5
1,209,955 UART: [ldev] AUTHORITY.KEYID = 7
1,210,418 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,973 >>> mbox cmd response: success
2,772,992 UART: [afmc] ++
2,773,160 UART: [afmc] CDI.KEYID = 6
2,773,523 UART: [afmc] SUBJECT.KEYID = 7
2,773,949 UART: [afmc] AUTHORITY.KEYID = 5
2,810,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,113 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,771 UART: [afmc] --
2,853,729 UART: [cold-reset] --
2,854,745 UART: [state] Locking Datavault
2,856,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,816 UART: [state] Locking ICCM
2,857,468 UART: [exit] Launching FMC @ 0x40000130
2,862,797 UART:
2,862,813 UART: Running Caliptra FMC ...
2,863,221 UART:
2,863,275 UART: [state] CFI Enabled
2,873,926 UART: [fht] FMC Alias Private Key: 7
2,982,157 UART: [art] Extend RT PCRs Done
2,982,585 UART: [art] Lock RT PCRs Done
2,984,187 UART: [art] Populate DV Done
2,992,500 UART: [fht] FMC Alias Private Key: 7
2,993,498 UART: [art] Derive CDI
2,993,778 UART: [art] Store in in slot 0x4
3,079,339 UART: [art] Derive Key Pair
3,079,699 UART: [art] Store priv key in slot 0x5
3,093,149 UART: [art] Derive Key Pair - Done
3,107,897 UART: [art] Signing Cert with AUTHO
3,108,377 UART: RITY.KEYID = 7
3,123,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,472 UART: [art] PUB.X = A80AFEB6049CECA16BC7CC7B951011D7B44607D599C597450FF019229BB14ADB241687B1DB43CF0C69A03D54A377994F
3,131,235 UART: [art] PUB.Y = BF15A5A73063387D4C2A74DC99927267EB8F477BE5895DA8FD4407B17BF5FA6EB91FAFEE8B04356E7CE7734FC93C35C7
3,138,193 UART: [art] SIG.R = 79EE7A54BC89F4749D4FE6FB4FC669EA4674EAEE5D376DAC6EE0C15A4CB6A5DDBBD21907F35F29709178BD45AAAEF46C
3,144,988 UART: [art] SIG.S = F7A84ACF0009D8649128E37E2F15A8B418528BC6924AF9D3A40E3661E42F9E7E4015E3C39F479764A09DC04296F1EEDF
3,168,583 UART: Caliptra RT
3,168,836 UART: [state] CFI Enabled
3,276,593 UART: [rt] RT listening for mailbox commands...
3,277,263 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,665 UART: [rt]cmd =0x44504543, len=92
3,314,749 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,125 >>> mbox cmd response: success
2,683,883 UART:
2,683,899 UART: Running Caliptra FMC ...
2,684,307 UART:
2,684,361 UART: [state] CFI Enabled
2,694,796 UART: [fht] FMC Alias Private Key: 7
2,802,881 UART: [art] Extend RT PCRs Done
2,803,309 UART: [art] Lock RT PCRs Done
2,804,709 UART: [art] Populate DV Done
2,812,778 UART: [fht] FMC Alias Private Key: 7
2,813,896 UART: [art] Derive CDI
2,814,176 UART: [art] Store in in slot 0x4
2,899,681 UART: [art] Derive Key Pair
2,900,041 UART: [art] Store priv key in slot 0x5
2,913,279 UART: [art] Derive Key Pair - Done
2,927,865 UART: [art] Signing Cert with AUTHO
2,928,345 UART: RITY.KEYID = 7
2,943,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,344 UART: [art] PUB.X = B4AD0AC8367473DA50D6B0BDA2536DCC954C104EEE9B5CA3F5D599F6383EB2C265211ED3250BAC5707CBBD6FD41723AC
2,951,125 UART: [art] PUB.Y = 6C8610A090745F273699A8EE3BB42650B6462B4807EDFCF1B83D9AEA780E66D8D47B9F2E4E7B5235AA3C9A307D8E9F99
2,958,077 UART: [art] SIG.R = A12B2F5375F78BB8BF8FF03370F9B12B6EF42A48D85430FEE5967803804E68A30FCC060D0ABA2F68057826A38BB8AAA6
2,964,839 UART: [art] SIG.S = A21E89001D56D5721D0082F25C14C90E5FC5841B11DEBE0E0174DCD82FDF705E4AD11FD4BEC6DE8B0E40A0C90C947A70
2,988,157 UART: Caliptra RT
2,988,410 UART: [state] CFI Enabled
3,095,040 UART: [rt] RT listening for mailbox commands...
3,095,710 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,218 UART: [rt]cmd =0x44504543, len=92
3,133,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,958 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,648 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,449 UART: [ldev] Erasing FE.KEYID = 1
1,241,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,681 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,030 >>> mbox cmd response: success
2,774,173 UART: [afmc] ++
2,774,341 UART: [afmc] CDI.KEYID = 6
2,774,704 UART: [afmc] SUBJECT.KEYID = 7
2,775,130 UART: [afmc] AUTHORITY.KEYID = 5
2,810,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,464 UART: [afmc] --
2,854,532 UART: [cold-reset] --
2,855,304 UART: [state] Locking Datavault
2,856,637 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,241 UART: [state] Locking ICCM
2,857,733 UART: [exit] Launching FMC @ 0x40000130
2,863,062 UART:
2,863,078 UART: Running Caliptra FMC ...
2,863,486 UART:
2,863,629 UART: [state] CFI Enabled
2,874,262 UART: [fht] FMC Alias Private Key: 7
2,982,913 UART: [art] Extend RT PCRs Done
2,983,341 UART: [art] Lock RT PCRs Done
2,985,131 UART: [art] Populate DV Done
2,993,356 UART: [fht] FMC Alias Private Key: 7
2,994,420 UART: [art] Derive CDI
2,994,700 UART: [art] Store in in slot 0x4
3,080,339 UART: [art] Derive Key Pair
3,080,699 UART: [art] Store priv key in slot 0x5
3,094,511 UART: [art] Derive Key Pair - Done
3,109,424 UART: [art] Signing Cert with AUTHO
3,109,904 UART: RITY.KEYID = 7
3,125,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,943 UART: [art] PUB.X = 481A83353775F7E3FDA4E5A299DBB7A3D4DEF72D2FE9BD0F136DC34FC88D3F2692EB311B70CB9AFAEF3B58E76161657E
3,132,730 UART: [art] PUB.Y = CCAADC6E95E74B585FAC7E8FFCAA68CC95FAB23F31613D105FED10E6BF07E9AACEB35C169D930B67A507E9F28E521BD7
3,139,701 UART: [art] SIG.R = E021A8B36FF5AD9124DBAF228DA9937B58A3012388DC202705550F147B38060AB6981B505F30E3EF78E7A379521BC848
3,146,454 UART: [art] SIG.S = 01B6C01D82EDC9636769AB36AD8A8C50A898FE9FEEECC311D99D92B4CF429307C243CC0CAE8B03A4C8063081C53663E6
3,170,004 UART: Caliptra RT
3,170,349 UART: [state] CFI Enabled
3,277,534 UART: [rt] RT listening for mailbox commands...
3,278,204 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,496 UART: [rt]cmd =0x44504543, len=92
3,315,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,096 >>> mbox cmd response: success
2,684,528 UART:
2,684,544 UART: Running Caliptra FMC ...
2,684,952 UART:
2,685,095 UART: [state] CFI Enabled
2,695,968 UART: [fht] FMC Alias Private Key: 7
2,804,609 UART: [art] Extend RT PCRs Done
2,805,037 UART: [art] Lock RT PCRs Done
2,806,633 UART: [art] Populate DV Done
2,814,936 UART: [fht] FMC Alias Private Key: 7
2,815,946 UART: [art] Derive CDI
2,816,226 UART: [art] Store in in slot 0x4
2,901,977 UART: [art] Derive Key Pair
2,902,337 UART: [art] Store priv key in slot 0x5
2,915,633 UART: [art] Derive Key Pair - Done
2,930,201 UART: [art] Signing Cert with AUTHO
2,930,681 UART: RITY.KEYID = 7
2,945,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,242 UART: [art] PUB.X = 3874FB9685C830D80AC2383878585198D630F00B68F3C837256058EF3A3F64904EAEB869D1DECC1BED19AB76F4ECBF6C
2,953,014 UART: [art] PUB.Y = A6E7827A98A68887B71EF153960A8E58A4EE34C7528273F9DBBEB4F5BC656B95A5B840421283AFA1B72D6F1D85D661EA
2,959,969 UART: [art] SIG.R = 44566785C6E33164A16A0DF358DC51D8C6D432628F322ED857E3DD97B88A693F786940A9219FCA39ED18C74AD2A534EB
2,966,738 UART: [art] SIG.S = C0BC9FFEB1B67C4918FF8871EF064BD1383400438B1CC966CB7304C76C2D510D3F56A5C8E24E341E5CA80FA2B679692A
2,990,211 UART: Caliptra RT
2,990,556 UART: [state] CFI Enabled
3,099,291 UART: [rt] RT listening for mailbox commands...
3,099,961 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,523 UART: [rt]cmd =0x44504543, len=92
3,137,773 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,433 UART: [kat] SHA2-256
882,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,479 UART: [kat] ++
886,631 UART: [kat] sha1
890,895 UART: [kat] SHA2-256
892,833 UART: [kat] SHA2-384
895,628 UART: [kat] SHA2-512-ACC
897,529 UART: [kat] ECC-384
903,068 UART: [kat] HMAC-384Kdf
907,752 UART: [kat] LMS
1,475,948 UART: [kat] --
1,476,945 UART: [cold-reset] ++
1,477,389 UART: [fht] Storing FHT @ 0x50003400
1,480,002 UART: [idev] ++
1,480,170 UART: [idev] CDI.KEYID = 6
1,480,530 UART: [idev] SUBJECT.KEYID = 7
1,480,954 UART: [idev] UDS.KEYID = 0
1,481,299 ready_for_fw is high
1,481,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,220 UART: [idev] Erasing UDS.KEYID = 0
1,506,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,932 UART: [idev] --
1,516,177 UART: [ldev] ++
1,516,345 UART: [ldev] CDI.KEYID = 6
1,516,708 UART: [ldev] SUBJECT.KEYID = 5
1,517,134 UART: [ldev] AUTHORITY.KEYID = 7
1,517,597 UART: [ldev] FE.KEYID = 1
1,522,567 UART: [ldev] Erasing FE.KEYID = 1
1,548,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,368 UART: [ldev] --
1,587,705 UART: [fwproc] Waiting for Commands...
1,588,538 UART: [fwproc] Received command 0x46574c44
1,589,329 UART: [fwproc] Received Image of size 114332 bytes
2,888,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,374 >>> mbox cmd response: success
3,081,374 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,082,424 UART: [afmc] ++
3,082,592 UART: [afmc] CDI.KEYID = 6
3,082,954 UART: [afmc] SUBJECT.KEYID = 7
3,083,379 UART: [afmc] AUTHORITY.KEYID = 5
3,118,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,331 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,021 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,002 UART: [afmc] --
3,162,096 UART: [cold-reset] --
3,162,818 UART: [state] Locking Datavault
3,163,851 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,455 UART: [state] Locking ICCM
3,165,029 UART: [exit] Launching FMC @ 0x40000130
3,170,358 UART:
3,170,374 UART: Running Caliptra FMC ...
3,170,782 UART:
3,170,836 UART: [state] CFI Enabled
3,181,415 UART: [fht] FMC Alias Private Key: 7
3,289,424 UART: [art] Extend RT PCRs Done
3,289,852 UART: [art] Lock RT PCRs Done
3,291,322 UART: [art] Populate DV Done
3,299,581 UART: [fht] FMC Alias Private Key: 7
3,300,733 UART: [art] Derive CDI
3,301,013 UART: [art] Store in in slot 0x4
3,386,780 UART: [art] Derive Key Pair
3,387,140 UART: [art] Store priv key in slot 0x5
3,399,846 UART: [art] Derive Key Pair - Done
3,414,847 UART: [art] Signing Cert with AUTHO
3,415,327 UART: RITY.KEYID = 7
3,430,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,514 UART: [art] PUB.X = A2383996314AD366F37DBBB6CAF6EC52D6922D910275F1C79C43B9097DCF63B39798E8A0DEA6326420FE99192E8367CB
3,438,282 UART: [art] PUB.Y = FE9BC3FD26000F507CC93DC6A83A0E84067B7FC979204E0CC62777FC0593219B55E03B813957421FDD956455F738EEC1
3,445,197 UART: [art] SIG.R = 689EBB0F86FD684E1A55C719F1EC9CE612FC7412F057049B47E5513888190250311EF59682F03F8105131DE85A37681E
3,451,947 UART: [art] SIG.S = 051F79CC06CEE635D5770D122AC980ACBF3C8B4FEE13CBCC31D0527E7AAFB036E651C6F82822635CAD1E5878FE8DF28E
3,475,893 UART: Caliptra RT
3,476,146 UART: [state] CFI Enabled
3,583,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,534 UART: [rt]cmd =0x50435245, len=56
3,616,339 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,635 ready_for_fw is high
1,361,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,006 >>> mbox cmd response: success
2,927,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,988,146 UART:
2,988,162 UART: Running Caliptra FMC ...
2,988,570 UART:
2,988,624 UART: [state] CFI Enabled
2,999,177 UART: [fht] FMC Alias Private Key: 7
3,106,984 UART: [art] Extend RT PCRs Done
3,107,412 UART: [art] Lock RT PCRs Done
3,109,102 UART: [art] Populate DV Done
3,117,447 UART: [fht] FMC Alias Private Key: 7
3,118,403 UART: [art] Derive CDI
3,118,683 UART: [art] Store in in slot 0x4
3,204,318 UART: [art] Derive Key Pair
3,204,678 UART: [art] Store priv key in slot 0x5
3,217,768 UART: [art] Derive Key Pair - Done
3,232,522 UART: [art] Signing Cert with AUTHO
3,233,002 UART: RITY.KEYID = 7
3,248,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,295 UART: [art] PUB.X = D7E83E99210600664D076CA4EF44963BD0C22B93C957E0484C29920C8CCC40C8AA8DA1388EEA04976245DC2799AA8369
3,256,031 UART: [art] PUB.Y = 26999F6797311676FD1EC781BF28283F5D2C9AB2C4A70F86D3FD2B0B4451DF59B8861773402A67DC13687F5A63E18C0F
3,262,972 UART: [art] SIG.R = 2A1CC6F93177C727C420972D1E3255D06A0E9E3E577A1B45185373231185ED810503D5CE18811AD75BB81CC5291E4C0A
3,269,726 UART: [art] SIG.S = 5879A17A336D96C77A6B0530001121D58D45271DBCAD52CFBCF08E6EA6627304C339E4FAB4E17F6E30A0C94807437663
3,293,384 UART: Caliptra RT
3,293,637 UART: [state] CFI Enabled
3,402,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,305 UART: [rt]cmd =0x50435245, len=56
3,434,794 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,422 UART: [kat] SHA2-256
892,360 UART: [kat] SHA2-384
894,991 UART: [kat] SHA2-512-ACC
896,892 UART: [kat] ECC-384
902,433 UART: [kat] HMAC-384Kdf
907,055 UART: [kat] LMS
1,475,251 UART: [kat] --
1,476,352 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,567 UART: [idev] ++
1,479,735 UART: [idev] CDI.KEYID = 6
1,480,095 UART: [idev] SUBJECT.KEYID = 7
1,480,519 UART: [idev] UDS.KEYID = 0
1,480,864 ready_for_fw is high
1,480,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,504,961 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,589 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,284 UART: [ldev] Erasing FE.KEYID = 1
1,547,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,939 UART: [ldev] --
1,586,394 UART: [fwproc] Waiting for Commands...
1,587,107 UART: [fwproc] Received command 0x46574c44
1,587,898 UART: [fwproc] Received Image of size 114332 bytes
2,885,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,959 >>> mbox cmd response: success
3,077,959 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,173 UART: [afmc] ++
3,079,341 UART: [afmc] CDI.KEYID = 6
3,079,703 UART: [afmc] SUBJECT.KEYID = 7
3,080,128 UART: [afmc] AUTHORITY.KEYID = 5
3,115,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,806 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,496 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,401 UART: [afmc] --
3,158,301 UART: [cold-reset] --
3,159,339 UART: [state] Locking Datavault
3,160,440 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,044 UART: [state] Locking ICCM
3,161,548 UART: [exit] Launching FMC @ 0x40000130
3,166,877 UART:
3,166,893 UART: Running Caliptra FMC ...
3,167,301 UART:
3,167,444 UART: [state] CFI Enabled
3,178,171 UART: [fht] FMC Alias Private Key: 7
3,286,500 UART: [art] Extend RT PCRs Done
3,286,928 UART: [art] Lock RT PCRs Done
3,288,412 UART: [art] Populate DV Done
3,296,701 UART: [fht] FMC Alias Private Key: 7
3,297,679 UART: [art] Derive CDI
3,297,959 UART: [art] Store in in slot 0x4
3,383,770 UART: [art] Derive Key Pair
3,384,130 UART: [art] Store priv key in slot 0x5
3,397,596 UART: [art] Derive Key Pair - Done
3,412,398 UART: [art] Signing Cert with AUTHO
3,412,878 UART: RITY.KEYID = 7
3,427,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,741 UART: [art] PUB.X = 8694194F3DCFBE32C7A112E5549B8F89AFCCF145AB1BF598EDED97482435B8F9AE8A67845AA90B709E6AE3BCDECED129
3,435,530 UART: [art] PUB.Y = 7FB32CABB889D18D8D0348690CCBCA05881DFDC921D0FAF449F217F51B3E9E5063D9FDF6D9917BD7209DB0F56366C55D
3,442,487 UART: [art] SIG.R = FBA144F5D86113296B60FC9A3C024DB8DBBF743063E5A90279BB73E735B1BF6F76A507CE4BBBC98107DF87ACB480DEB3
3,449,263 UART: [art] SIG.S = 01AA9B163B80132AEE81E43731EF373D161C960522F34E2C83D9ABFF41EBDD5ECFE17F5E73BEE5AA6F350B61560E4775
3,473,268 UART: Caliptra RT
3,473,613 UART: [state] CFI Enabled
3,581,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,028 UART: [rt]cmd =0x50435245, len=56
3,614,407 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,196 ready_for_fw is high
1,363,196 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,971 >>> mbox cmd response: success
2,928,971 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,991,011 UART:
2,991,027 UART: Running Caliptra FMC ...
2,991,435 UART:
2,991,578 UART: [state] CFI Enabled
3,002,367 UART: [fht] FMC Alias Private Key: 7
3,111,084 UART: [art] Extend RT PCRs Done
3,111,512 UART: [art] Lock RT PCRs Done
3,113,170 UART: [art] Populate DV Done
3,121,507 UART: [fht] FMC Alias Private Key: 7
3,122,463 UART: [art] Derive CDI
3,122,743 UART: [art] Store in in slot 0x4
3,208,234 UART: [art] Derive Key Pair
3,208,594 UART: [art] Store priv key in slot 0x5
3,222,184 UART: [art] Derive Key Pair - Done
3,237,192 UART: [art] Signing Cert with AUTHO
3,237,672 UART: RITY.KEYID = 7
3,253,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,023 UART: [art] PUB.X = F173B8538630EAD266AF48551F20E9768860CC0713C8194D92960766E5FF0FB3B9D1D596199A8701653B2D03EEE541C0
3,260,772 UART: [art] PUB.Y = CD398CA970CEEFA75AA17F85A6B31328FD4112721DFD0378DF445C2E00604207B15D7C56437871301A6386EE57F98758
3,267,692 UART: [art] SIG.R = AFE3AE3B6CCCD729ED0240CC1757738C3D6D9110A692DC0C9093F4497E7622F94FA84BFB4D479D0F026DC6711ADE55AC
3,274,466 UART: [art] SIG.S = 814A943E9684FDDAEC8898C6096114627D885DCFFDAB24E2F987E575B3BEF463DC9E6E86F8A8B9997615EF6B298A04E9
3,298,467 UART: Caliptra RT
3,298,812 UART: [state] CFI Enabled
3,406,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,732 UART: [rt]cmd =0x50435245, len=56
3,439,195 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,732 UART: [kat] SHA2-512-ACC
908,633 UART: [kat] ECC-384
918,816 UART: [kat] HMAC-384Kdf
923,524 UART: [kat] LMS
1,171,852 UART: [kat] --
1,172,879 UART: [cold-reset] ++
1,173,317 UART: [fht] FHT @ 0x50003400
1,175,980 UART: [idev] ++
1,176,148 UART: [idev] CDI.KEYID = 6
1,176,508 UART: [idev] SUBJECT.KEYID = 7
1,176,932 UART: [idev] UDS.KEYID = 0
1,177,277 ready_for_fw is high
1,177,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,050 UART: [idev] Erasing UDS.KEYID = 0
1,202,261 UART: [idev] Sha1 KeyId Algorithm
1,210,839 UART: [idev] --
1,211,837 UART: [ldev] ++
1,212,005 UART: [ldev] CDI.KEYID = 6
1,212,368 UART: [ldev] SUBJECT.KEYID = 5
1,212,794 UART: [ldev] AUTHORITY.KEYID = 7
1,213,257 UART: [ldev] FE.KEYID = 1
1,218,523 UART: [ldev] Erasing FE.KEYID = 1
1,244,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,569 UART: [ldev] --
1,283,860 UART: [fwproc] Wait for Commands...
1,284,596 UART: [fwproc] Recv command 0x46574c44
1,285,324 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,127 >>> mbox cmd response: success
2,776,127 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,149 UART: [afmc] ++
2,777,317 UART: [afmc] CDI.KEYID = 6
2,777,679 UART: [afmc] SUBJECT.KEYID = 7
2,778,104 UART: [afmc] AUTHORITY.KEYID = 5
2,812,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,204 UART: [afmc] --
2,856,226 UART: [cold-reset] --
2,857,208 UART: [state] Locking Datavault
2,858,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,353 UART: [state] Locking ICCM
2,860,027 UART: [exit] Launching FMC @ 0x40000130
2,865,356 UART:
2,865,372 UART: Running Caliptra FMC ...
2,865,780 UART:
2,865,834 UART: [state] CFI Enabled
2,876,635 UART: [fht] FMC Alias Private Key: 7
2,984,826 UART: [art] Extend RT PCRs Done
2,985,254 UART: [art] Lock RT PCRs Done
2,986,846 UART: [art] Populate DV Done
2,994,975 UART: [fht] FMC Alias Private Key: 7
2,996,053 UART: [art] Derive CDI
2,996,333 UART: [art] Store in in slot 0x4
3,081,934 UART: [art] Derive Key Pair
3,082,294 UART: [art] Store priv key in slot 0x5
3,095,052 UART: [art] Derive Key Pair - Done
3,109,590 UART: [art] Signing Cert with AUTHO
3,110,070 UART: RITY.KEYID = 7
3,124,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,755 UART: [art] PUB.X = 1C56B4E4D77F382EFF2BFA800933F1678BCECC2FF888AF05FD2848B85571A6D0A9C6F386C43D7164CADCC950DF30005C
3,132,513 UART: [art] PUB.Y = 6FFBD2FD30550E37539FAB68D86E39D5389D70610FE82F4A814D903A4891416CC76C62CB8FE8461F5F87C1EC1CCE27C7
3,139,467 UART: [art] SIG.R = EFAF4830AB0E8BE163AE530DED2FA69FC829EDE02255332A8D19DE5D0CD5630299557AC60A50261D7E01D7A9F478B6E1
3,146,233 UART: [art] SIG.S = 16A4E624ACFBA885F117B0684226ADE4B593FF09C5BC3C1F275BB7DCA1C799A8B6B3FFEDB9375E7D59D4E2901EA1E657
3,170,793 UART: Caliptra RT
3,171,046 UART: [state] CFI Enabled
3,279,285 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,903 UART: [rt]cmd =0x50435245, len=56
3,311,274 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,287 ready_for_fw is high
1,060,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,848 >>> mbox cmd response: success
2,624,848 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,538 UART:
2,686,554 UART: Running Caliptra FMC ...
2,686,962 UART:
2,687,016 UART: [state] CFI Enabled
2,697,739 UART: [fht] FMC Alias Private Key: 7
2,806,112 UART: [art] Extend RT PCRs Done
2,806,540 UART: [art] Lock RT PCRs Done
2,808,404 UART: [art] Populate DV Done
2,816,413 UART: [fht] FMC Alias Private Key: 7
2,817,513 UART: [art] Derive CDI
2,817,793 UART: [art] Store in in slot 0x4
2,903,130 UART: [art] Derive Key Pair
2,903,490 UART: [art] Store priv key in slot 0x5
2,916,564 UART: [art] Derive Key Pair - Done
2,931,161 UART: [art] Signing Cert with AUTHO
2,931,641 UART: RITY.KEYID = 7
2,947,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,072 UART: [art] PUB.X = 0D9E860CA19DD6ABCB6E0E6A12FBB3C5DAE788AD814125CEC0DD4AEC4AEFF93C61333F9A97F9C8F8025F7C2458A04282
2,954,854 UART: [art] PUB.Y = F3E98AF2F32EE349163E79833EB1CFBBC2CBE660CEA127C556C73BAA2259F00783507461891F7F03E93CBCFA57C07F02
2,961,807 UART: [art] SIG.R = 2323EC496AD0F6CD6B9ED65F78F3C45DFA2F3C3A62453E9F57C98E571C021B7A2655C6419BFC210627AE8A3B364413A6
2,968,579 UART: [art] SIG.S = 63C4D3F0DD6DA2BC50994CC9F35BD4D4A7D731F46C137A11748C4838E7096EF375D2D55E9C383761A793884570EF9B6B
2,992,821 UART: Caliptra RT
2,993,074 UART: [state] CFI Enabled
3,102,505 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,429 UART: [rt]cmd =0x50435245, len=56
3,135,018 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
893,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,402 UART: [kat] ++
897,554 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,283 UART: [kat] HMAC-384Kdf
922,775 UART: [kat] LMS
1,171,103 UART: [kat] --
1,171,800 UART: [cold-reset] ++
1,172,198 UART: [fht] FHT @ 0x50003400
1,174,739 UART: [idev] ++
1,174,907 UART: [idev] CDI.KEYID = 6
1,175,267 UART: [idev] SUBJECT.KEYID = 7
1,175,691 UART: [idev] UDS.KEYID = 0
1,176,036 ready_for_fw is high
1,176,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,641 UART: [idev] Erasing UDS.KEYID = 0
1,200,466 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,210,102 UART: [ldev] ++
1,210,270 UART: [ldev] CDI.KEYID = 6
1,210,633 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,488 UART: [ldev] Erasing FE.KEYID = 1
1,243,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,772 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,274 >>> mbox cmd response: success
2,772,274 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,348 UART: [afmc] ++
2,773,516 UART: [afmc] CDI.KEYID = 6
2,773,878 UART: [afmc] SUBJECT.KEYID = 7
2,774,303 UART: [afmc] AUTHORITY.KEYID = 5
2,809,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,793 UART: [afmc] --
2,852,785 UART: [cold-reset] --
2,853,637 UART: [state] Locking Datavault
2,855,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,838 UART: [state] Locking ICCM
2,856,386 UART: [exit] Launching FMC @ 0x40000130
2,861,715 UART:
2,861,731 UART: Running Caliptra FMC ...
2,862,139 UART:
2,862,282 UART: [state] CFI Enabled
2,873,083 UART: [fht] FMC Alias Private Key: 7
2,981,898 UART: [art] Extend RT PCRs Done
2,982,326 UART: [art] Lock RT PCRs Done
2,983,704 UART: [art] Populate DV Done
2,992,093 UART: [fht] FMC Alias Private Key: 7
2,993,183 UART: [art] Derive CDI
2,993,463 UART: [art] Store in in slot 0x4
3,079,008 UART: [art] Derive Key Pair
3,079,368 UART: [art] Store priv key in slot 0x5
3,092,470 UART: [art] Derive Key Pair - Done
3,107,100 UART: [art] Signing Cert with AUTHO
3,107,580 UART: RITY.KEYID = 7
3,122,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,279 UART: [art] PUB.X = 35F5ABDE5D8894A2A68811267C607A99C379B460E99A80A7B9AE4FAD98A7AFE2B7EF6B9B007DEFB8BDE2936143EAF841
3,130,045 UART: [art] PUB.Y = 110BDFEF638D3BAA809AD9DF3B35E261C7293B38B48A878ECE22C9C98CEA6DCF43B6BDBF404844A405619E4AE8E0923A
3,137,009 UART: [art] SIG.R = 1D647AC910C74262D14852B47091CB076963FCA08E3B785166F09A1C82339AA5C2D8AE6404C6E61FE591922A422AB4D3
3,143,771 UART: [art] SIG.S = 12FA6B342DB0ADA360FFEEA85A4947895A56A70AD854F40DDE1C318A79F79481B98530E4A6560DCA814759FC130E787E
3,167,206 UART: Caliptra RT
3,167,551 UART: [state] CFI Enabled
3,275,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,534 UART: [rt]cmd =0x50435245, len=56
3,307,995 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,854 ready_for_fw is high
1,060,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,971 >>> mbox cmd response: success
2,627,971 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,325 UART:
2,690,341 UART: Running Caliptra FMC ...
2,690,749 UART:
2,690,892 UART: [state] CFI Enabled
2,701,651 UART: [fht] FMC Alias Private Key: 7
2,809,466 UART: [art] Extend RT PCRs Done
2,809,894 UART: [art] Lock RT PCRs Done
2,811,458 UART: [art] Populate DV Done
2,819,513 UART: [fht] FMC Alias Private Key: 7
2,820,487 UART: [art] Derive CDI
2,820,767 UART: [art] Store in in slot 0x4
2,906,632 UART: [art] Derive Key Pair
2,906,992 UART: [art] Store priv key in slot 0x5
2,920,174 UART: [art] Derive Key Pair - Done
2,934,963 UART: [art] Signing Cert with AUTHO
2,935,443 UART: RITY.KEYID = 7
2,950,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,404 UART: [art] PUB.X = F11998BCF27E315381D382820A52E93EDF2792CF1D128D19838A2B6BEB1D34CA2308D5B5E5332307B28861692A0FCD1C
2,958,164 UART: [art] PUB.Y = 66B14C76E02FF9444349C2B91DE0338E2C4A7D8FC20799693E01A4D50109654E60501638F5805AABD21A5F626B8DE5C8
2,965,100 UART: [art] SIG.R = EDDBF1CB1C7612689CD2EA7AE11C8D5643DE84AC3910C8A786570B31CBCCD6466FB7F7730572C130F4DB5FFC866B8AE5
2,971,884 UART: [art] SIG.S = BEBECEC45DE92CBA6AC24F00E45604B1E5AFDC9B2D15E45D4AD92121C48D286C768D7E2F25D6B95F83641524980977F6
2,995,487 UART: Caliptra RT
2,995,832 UART: [state] CFI Enabled
3,103,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,848 UART: [rt]cmd =0x50435245, len=56
3,136,169 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,720 UART: [state] LifecycleState = Unprovisioned
86,375 UART: [state] DebugLocked = No
86,929 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,813 UART: [kat] ++
895,965 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,970 UART: [kat] SHA2-512-ACC
906,871 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,174,737 ready_for_fw is high
1,174,737 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,549 UART: [idev] Erasing UDS.KEYID = 0
1,199,629 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,780 UART: [ldev] ++
1,209,948 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,739 UART: [ldev] AUTHORITY.KEYID = 7
1,211,202 UART: [ldev] FE.KEYID = 1
1,216,494 UART: [ldev] Erasing FE.KEYID = 1
1,242,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,290 UART: [ldev] --
1,281,730 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,483 >>> mbox cmd response: success
2,772,483 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,538 UART: [afmc] ++
2,773,706 UART: [afmc] CDI.KEYID = 6
2,774,069 UART: [afmc] SUBJECT.KEYID = 7
2,774,495 UART: [afmc] AUTHORITY.KEYID = 5
2,810,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,327 UART: [afmc] --
2,853,409 UART: [cold-reset] --
2,854,439 UART: [state] Locking Datavault
2,855,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,118 UART: [state] Locking ICCM
2,856,654 UART: [exit] Launching FMC @ 0x40000130
2,861,983 UART:
2,861,999 UART: Running Caliptra FMC ...
2,862,407 UART:
2,862,461 UART: [state] CFI Enabled
2,872,970 UART: [fht] FMC Alias Private Key: 7
2,980,985 UART: [art] Extend RT PCRs Done
2,981,413 UART: [art] Lock RT PCRs Done
2,983,069 UART: [art] Populate DV Done
2,991,122 UART: [fht] FMC Alias Private Key: 7
2,992,248 UART: [art] Derive CDI
2,992,528 UART: [art] Store in in slot 0x4
3,077,987 UART: [art] Derive Key Pair
3,078,347 UART: [art] Store priv key in slot 0x5
3,091,259 UART: [art] Derive Key Pair - Done
3,106,309 UART: [art] Signing Cert with AUTHO
3,106,789 UART: RITY.KEYID = 7
3,122,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,900 UART: [art] PUB.X = ADF69CDFA2CA2E97AC5C9BCF99BFDEB7DAFC4722D709DE97B25A1C3D61FB78859C71E118BE8D45A430D0C03A3E42CFB6
3,129,699 UART: [art] PUB.Y = 5D251E59C7684ADB06E906D3B01F02B7EA21D15A235F52790F3540DEB785DA00DC0A0D98CBD0FCC87279FEC0061A2404
3,136,613 UART: [art] SIG.R = 135BC24CFD0742DF34710906D7D8501C3B157EB245045CDCA172A605BB2F1E665B628E28AADAD77A37319CAF6A48DBDE
3,143,382 UART: [art] SIG.S = B91738F7A2F382AC1D9FF40697EBA229368EEE1A75FEDCAF7CF55BF4B3E972C2E8304BD6529D97B09138A3FDB72BD8F0
3,167,394 UART: Caliptra RT
3,167,647 UART: [state] CFI Enabled
3,276,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,868 UART: [rt]cmd =0x50435245, len=56
3,308,249 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 ready_for_fw is high
1,055,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,231 >>> mbox cmd response: success
2,620,231 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,681,793 UART:
2,681,809 UART: Running Caliptra FMC ...
2,682,217 UART:
2,682,271 UART: [state] CFI Enabled
2,692,754 UART: [fht] FMC Alias Private Key: 7
2,800,755 UART: [art] Extend RT PCRs Done
2,801,183 UART: [art] Lock RT PCRs Done
2,802,715 UART: [art] Populate DV Done
2,811,172 UART: [fht] FMC Alias Private Key: 7
2,812,352 UART: [art] Derive CDI
2,812,632 UART: [art] Store in in slot 0x4
2,898,741 UART: [art] Derive Key Pair
2,899,101 UART: [art] Store priv key in slot 0x5
2,912,663 UART: [art] Derive Key Pair - Done
2,927,628 UART: [art] Signing Cert with AUTHO
2,928,108 UART: RITY.KEYID = 7
2,943,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,817 UART: [art] PUB.X = 841B6BE35FC2E0DA692F3C27FA5684D9F3D39DE41B48B3C4BB9A9769EA73E81461D3352680DE85B7C0E0C04212BEB24E
2,950,599 UART: [art] PUB.Y = 2260A8A226841DFB0B78BAF25537A6C83CE24A56FD6A7ACBAD780EA286C8606AFBF2E4EEFCFFBEEE719498DEC7EA93FE
2,957,575 UART: [art] SIG.R = 61DFE2E3EFE25207170685903F749A95B964DE7026AA57CEEEB6D42528657738EC34D879F0F85EF7DE73691414C6563A
2,964,339 UART: [art] SIG.S = BC8203844757EE587023E93121DE2D6AB6EF9C2F327E4BC1EEF3E160F87D97AAB569AD6D2287D2591A1C99705DE76474
2,988,089 UART: Caliptra RT
2,988,342 UART: [state] CFI Enabled
3,096,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,313 UART: [rt]cmd =0x50435245, len=56
3,128,778 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,394 UART: [idev] ++
1,173,562 UART: [idev] CDI.KEYID = 6
1,173,923 UART: [idev] SUBJECT.KEYID = 7
1,174,348 UART: [idev] UDS.KEYID = 0
1,174,694 ready_for_fw is high
1,174,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,163 UART: [ldev] ++
1,209,331 UART: [ldev] CDI.KEYID = 6
1,209,695 UART: [ldev] SUBJECT.KEYID = 5
1,210,122 UART: [ldev] AUTHORITY.KEYID = 7
1,210,585 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,516 UART: [fwproc] Recv command 0x46574c44
1,283,249 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,444 >>> mbox cmd response: success
2,773,444 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,563 UART: [afmc] ++
2,774,731 UART: [afmc] CDI.KEYID = 6
2,775,094 UART: [afmc] SUBJECT.KEYID = 7
2,775,520 UART: [afmc] AUTHORITY.KEYID = 5
2,811,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,660 UART: [afmc] --
2,854,710 UART: [cold-reset] --
2,855,602 UART: [state] Locking Datavault
2,856,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,401 UART: [state] Locking ICCM
2,857,991 UART: [exit] Launching FMC @ 0x40000130
2,863,320 UART:
2,863,336 UART: Running Caliptra FMC ...
2,863,744 UART:
2,863,887 UART: [state] CFI Enabled
2,874,582 UART: [fht] FMC Alias Private Key: 7
2,982,573 UART: [art] Extend RT PCRs Done
2,983,001 UART: [art] Lock RT PCRs Done
2,984,655 UART: [art] Populate DV Done
2,992,858 UART: [fht] FMC Alias Private Key: 7
2,993,802 UART: [art] Derive CDI
2,994,082 UART: [art] Store in in slot 0x4
3,079,817 UART: [art] Derive Key Pair
3,080,177 UART: [art] Store priv key in slot 0x5
3,092,981 UART: [art] Derive Key Pair - Done
3,107,665 UART: [art] Signing Cert with AUTHO
3,108,145 UART: RITY.KEYID = 7
3,123,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,906 UART: [art] PUB.X = 0E4126EE84133C44116D94F4B2593059BC648233BB97C4D49790FA7A4A1FA68C0772EA88D407A8E2BE7ABE37372E5045
3,130,667 UART: [art] PUB.Y = CC0A896A7AD4A60EC246B896099F185557AB630074DCDBD56AF643D642EC697599FFFA19BFD9643AFD7D910D703CC81D
3,137,597 UART: [art] SIG.R = DDC6DA6FC932DE3048FBB5EF7C6944AE79562E1CCA9879B8DF66A9ECAD90CE6DE4CD9FE6E5318A493E9331485DE48B9C
3,144,393 UART: [art] SIG.S = 49C3E088CDB6B4DC60102BDA4DB2454C52C9A0E43D5A7921CC496B074165712891D9D002A69AA393B1F2E2A2ACBB3236
3,168,484 UART: Caliptra RT
3,168,829 UART: [state] CFI Enabled
3,276,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,512 UART: [rt]cmd =0x50435245, len=56
3,309,089 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 ready_for_fw is high
1,056,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,596 >>> mbox cmd response: success
2,624,596 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,388 UART:
2,687,404 UART: Running Caliptra FMC ...
2,687,812 UART:
2,687,955 UART: [state] CFI Enabled
2,698,302 UART: [fht] FMC Alias Private Key: 7
2,806,215 UART: [art] Extend RT PCRs Done
2,806,643 UART: [art] Lock RT PCRs Done
2,808,233 UART: [art] Populate DV Done
2,816,578 UART: [fht] FMC Alias Private Key: 7
2,817,636 UART: [art] Derive CDI
2,817,916 UART: [art] Store in in slot 0x4
2,903,003 UART: [art] Derive Key Pair
2,903,363 UART: [art] Store priv key in slot 0x5
2,916,377 UART: [art] Derive Key Pair - Done
2,930,966 UART: [art] Signing Cert with AUTHO
2,931,446 UART: RITY.KEYID = 7
2,946,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,373 UART: [art] PUB.X = 611891B8F11D4F245B2E0A37096E021116612C593EEC392C8071040C4B370E6EE7CCEC3FD16DE76FF461F7983F6F162C
2,954,127 UART: [art] PUB.Y = 81BC52D68B1216442435454C6A7718ADBB298EF8AAE14008154E077A47AE9C336587F97D7AADF906205CB463A5F4E182
2,961,068 UART: [art] SIG.R = 26375F36C190DB23A0AE430CFA1EA59AA3411DE6737E97DCFC4E7BC0042B12EF97150B9B44A89B3AF2D0856D9734F4AF
2,967,843 UART: [art] SIG.S = D9F0BC8D6534D86AF0C238B5C8A1A494686B0A1D127C54B3DF85B3EC8306054414A923FA1513A4FF5EFB5AE64D90206A
2,991,373 UART: Caliptra RT
2,991,718 UART: [state] CFI Enabled
3,099,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,465 UART: [rt]cmd =0x50435245, len=56
3,131,986 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,631 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,479,962 UART: [idev] ++
1,480,130 UART: [idev] CDI.KEYID = 6
1,480,490 UART: [idev] SUBJECT.KEYID = 7
1,480,914 UART: [idev] UDS.KEYID = 0
1,481,259 ready_for_fw is high
1,481,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,972 UART: [idev] Erasing UDS.KEYID = 0
1,505,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,578 UART: [idev] --
1,515,741 UART: [ldev] ++
1,515,909 UART: [ldev] CDI.KEYID = 6
1,516,272 UART: [ldev] SUBJECT.KEYID = 5
1,516,698 UART: [ldev] AUTHORITY.KEYID = 7
1,517,161 UART: [ldev] FE.KEYID = 1
1,522,253 UART: [ldev] Erasing FE.KEYID = 1
1,547,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,458 UART: [ldev] --
1,586,881 UART: [fwproc] Waiting for Commands...
1,587,636 UART: [fwproc] Received command 0x46574c44
1,588,427 UART: [fwproc] Received Image of size 114332 bytes
2,887,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,743 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,924 >>> mbox cmd response: success
3,079,924 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,080,988 UART: [afmc] ++
3,081,156 UART: [afmc] CDI.KEYID = 6
3,081,518 UART: [afmc] SUBJECT.KEYID = 7
3,081,943 UART: [afmc] AUTHORITY.KEYID = 5
3,116,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,657 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,347 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,212 UART: [afmc] --
3,160,274 UART: [cold-reset] --
3,161,264 UART: [state] Locking Datavault
3,162,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,943 UART: [state] Locking ICCM
3,163,517 UART: [exit] Launching FMC @ 0x40000130
3,168,846 UART:
3,168,862 UART: Running Caliptra FMC ...
3,169,270 UART:
3,169,324 UART: [state] CFI Enabled
3,179,869 UART: [fht] FMC Alias Private Key: 7
3,287,694 UART: [art] Extend RT PCRs Done
3,288,122 UART: [art] Lock RT PCRs Done
3,289,644 UART: [art] Populate DV Done
3,297,803 UART: [fht] FMC Alias Private Key: 7
3,298,943 UART: [art] Derive CDI
3,299,223 UART: [art] Store in in slot 0x4
3,384,680 UART: [art] Derive Key Pair
3,385,040 UART: [art] Store priv key in slot 0x5
3,398,330 UART: [art] Derive Key Pair - Done
3,412,995 UART: [art] Signing Cert with AUTHO
3,413,475 UART: RITY.KEYID = 7
3,428,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,384 UART: [art] PUB.X = F31432C2335F754FE147AEE7E0797EFB8277C4A8477DF61B0B18CBDABFC5E73ACF3AEEB8C47CDA240A250A7ED97FAB6D
3,436,173 UART: [art] PUB.Y = 1AE5C80DD07A9FF4878562E5C27940FF62CE24C757C1E054C0F1BC7E52D308ED8C6F439BA9F3E9D6966A54DD6B03E910
3,443,126 UART: [art] SIG.R = 92A55C3EA92167EF547EBF158958E4C0731C81B9FDA078337CE17DAB59B3A8F6305DD83D66EC4433D6F5FCAD4261A757
3,449,906 UART: [art] SIG.S = 0FE6BC2140199C4346F208D12731E181232496A33179C2BCCDDD5A9347E0CE5CEF3B95FC6F053DFE6875540711C28A41
3,473,919 UART: Caliptra RT
3,474,172 UART: [state] CFI Enabled
3,582,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,953 UART: [rt]cmd =0x50435251, len=36
3,780,184 >>> mbox cmd response data (1848 bytes)
3,780,185 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,776 UART: [rt]cmd =0x50435245, len=56
3,813,506 >>> mbox cmd response data (8 bytes)
3,813,507 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,006 UART: [rt]cmd =0x50435251, len=36
4,010,473 >>> mbox cmd response data (1848 bytes)
4,010,474 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,085 UART: [rt]cmd =0x50435245, len=56
4,043,929 >>> mbox cmd response data (8 bytes)
4,043,930 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,507 UART: [rt]cmd =0x50435251, len=36
4,240,610 >>> mbox cmd response data (1848 bytes)
4,240,611 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,542 UART: [rt]cmd =0x50435245, len=56
4,274,202 >>> mbox cmd response data (8 bytes)
4,274,203 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,904 UART: [rt]cmd =0x50435251, len=36
4,471,233 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 ready_for_fw is high
1,362,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,880 >>> mbox cmd response: success
2,926,880 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,988,964 UART:
2,988,980 UART: Running Caliptra FMC ...
2,989,388 UART:
2,989,442 UART: [state] CFI Enabled
3,000,039 UART: [fht] FMC Alias Private Key: 7
3,108,384 UART: [art] Extend RT PCRs Done
3,108,812 UART: [art] Lock RT PCRs Done
3,110,030 UART: [art] Populate DV Done
3,118,187 UART: [fht] FMC Alias Private Key: 7
3,119,201 UART: [art] Derive CDI
3,119,481 UART: [art] Store in in slot 0x4
3,205,246 UART: [art] Derive Key Pair
3,205,606 UART: [art] Store priv key in slot 0x5
3,218,524 UART: [art] Derive Key Pair - Done
3,233,353 UART: [art] Signing Cert with AUTHO
3,233,833 UART: RITY.KEYID = 7
3,248,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,918 UART: [art] PUB.X = 1ACF6CC907CE2E805601D3147DF3B46A7351798987DE69893B41B26CABE3DD4DACAB56EF3A36C551161FCAB65D9DB4C2
3,255,700 UART: [art] PUB.Y = A05199B8F40EC4B6F2ED6B09A70D8DC9B77815168208F4018E747972E8A649C2C89C3B6D681560EBCD9BC40E601E3362
3,262,634 UART: [art] SIG.R = 6EBED3652AF8F09E8676A7729E4F0C23161D58142E1A98448E8B7C7C4A7CE614780951D909B0CB0751A98A2953A9D120
3,269,390 UART: [art] SIG.S = 57D85347889058798C31A7DD5BEE387CA21B830E8EDF8CD78E1EA774F371D300480478001C9651E4EE2D27E528B4C78D
3,293,427 UART: Caliptra RT
3,293,680 UART: [state] CFI Enabled
3,401,734 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,606 UART: [rt]cmd =0x50435251, len=36
3,600,097 >>> mbox cmd response data (1848 bytes)
3,600,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,739 UART: [rt]cmd =0x50435245, len=56
3,633,255 >>> mbox cmd response data (8 bytes)
3,633,256 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,771 UART: [rt]cmd =0x50435251, len=36
3,830,160 >>> mbox cmd response data (1848 bytes)
3,830,161 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,966 UART: [rt]cmd =0x50435245, len=56
3,863,846 >>> mbox cmd response data (8 bytes)
3,863,847 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,266 UART: [rt]cmd =0x50435251, len=36
4,060,635 >>> mbox cmd response data (1848 bytes)
4,060,636 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,247 UART: [rt]cmd =0x50435245, len=56
4,093,849 >>> mbox cmd response data (8 bytes)
4,093,850 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,439 UART: [rt]cmd =0x50435251, len=36
4,290,510 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,605 UART: [idev] --
1,515,588 UART: [ldev] ++
1,515,756 UART: [ldev] CDI.KEYID = 6
1,516,119 UART: [ldev] SUBJECT.KEYID = 5
1,516,545 UART: [ldev] AUTHORITY.KEYID = 7
1,517,008 UART: [ldev] FE.KEYID = 1
1,522,248 UART: [ldev] Erasing FE.KEYID = 1
1,548,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,541 UART: [ldev] --
1,587,996 UART: [fwproc] Waiting for Commands...
1,588,719 UART: [fwproc] Received command 0x46574c44
1,589,510 UART: [fwproc] Received Image of size 114332 bytes
2,886,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,493 >>> mbox cmd response: success
3,079,493 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,080,595 UART: [afmc] ++
3,080,763 UART: [afmc] CDI.KEYID = 6
3,081,125 UART: [afmc] SUBJECT.KEYID = 7
3,081,550 UART: [afmc] AUTHORITY.KEYID = 5
3,117,319 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,100 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,790 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,653 UART: [afmc] --
3,160,533 UART: [cold-reset] --
3,161,397 UART: [state] Locking Datavault
3,162,598 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,202 UART: [state] Locking ICCM
3,163,802 UART: [exit] Launching FMC @ 0x40000130
3,169,131 UART:
3,169,147 UART: Running Caliptra FMC ...
3,169,555 UART:
3,169,698 UART: [state] CFI Enabled
3,180,467 UART: [fht] FMC Alias Private Key: 7
3,288,712 UART: [art] Extend RT PCRs Done
3,289,140 UART: [art] Lock RT PCRs Done
3,290,520 UART: [art] Populate DV Done
3,298,679 UART: [fht] FMC Alias Private Key: 7
3,299,693 UART: [art] Derive CDI
3,299,973 UART: [art] Store in in slot 0x4
3,385,794 UART: [art] Derive Key Pair
3,386,154 UART: [art] Store priv key in slot 0x5
3,399,164 UART: [art] Derive Key Pair - Done
3,413,847 UART: [art] Signing Cert with AUTHO
3,414,327 UART: RITY.KEYID = 7
3,430,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,816 UART: [art] PUB.X = 0E611928B94452E84110D3822394557C4A687110BCD8406B2EBCFCD8FFB029A5C087901E591365595DB36042A66E5B9F
3,437,577 UART: [art] PUB.Y = 1BD3B3B8066A9DC19725C7DFAD4702D404547DBEEA9CBD08F282092C9C988BB98D767FC87E4F657E0F042CBEE6102F88
3,444,520 UART: [art] SIG.R = 5E7017A87C7DF24CDDC3BB12CAD7B6556250EFFF937E3C0B9AB950F06C761F120F98F475E833C5045C3617F53C8E645C
3,451,291 UART: [art] SIG.S = 3A2E97D5B55DF4198795672CE9121753DAF22824727992B25045525441637627F8DE8B750470CC25C9F5F81734EB8E97
3,474,617 UART: Caliptra RT
3,474,962 UART: [state] CFI Enabled
3,583,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,366 UART: [rt]cmd =0x50435251, len=36
3,781,875 >>> mbox cmd response data (1848 bytes)
3,781,876 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,491 UART: [rt]cmd =0x50435245, len=56
3,815,151 >>> mbox cmd response data (8 bytes)
3,815,152 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,643 UART: [rt]cmd =0x50435251, len=36
4,011,970 >>> mbox cmd response data (1848 bytes)
4,011,971 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,600 UART: [rt]cmd =0x50435245, len=56
4,045,182 >>> mbox cmd response data (8 bytes)
4,045,183 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,650 UART: [rt]cmd =0x50435251, len=36
4,241,983 >>> mbox cmd response data (1848 bytes)
4,241,984 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,627 UART: [rt]cmd =0x50435245, len=56
4,275,233 >>> mbox cmd response data (8 bytes)
4,275,234 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,304,863 UART: [rt]cmd =0x50435251, len=36
4,472,138 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,248 ready_for_fw is high
1,362,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,205 >>> mbox cmd response: success
2,927,205 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,988,439 UART:
2,988,455 UART: Running Caliptra FMC ...
2,988,863 UART:
2,989,006 UART: [state] CFI Enabled
2,999,471 UART: [fht] FMC Alias Private Key: 7
3,107,816 UART: [art] Extend RT PCRs Done
3,108,244 UART: [art] Lock RT PCRs Done
3,109,600 UART: [art] Populate DV Done
3,117,877 UART: [fht] FMC Alias Private Key: 7
3,118,837 UART: [art] Derive CDI
3,119,117 UART: [art] Store in in slot 0x4
3,204,646 UART: [art] Derive Key Pair
3,205,006 UART: [art] Store priv key in slot 0x5
3,218,270 UART: [art] Derive Key Pair - Done
3,233,164 UART: [art] Signing Cert with AUTHO
3,233,644 UART: RITY.KEYID = 7
3,248,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,653 UART: [art] PUB.X = 00481246D7A5F73AE328B39D5D503E4CAC850B86E916DFFD281DF0B3AB11BA02B2A8A74101AD1AB6F070F75157DBAD63
3,256,406 UART: [art] PUB.Y = 442D65748AF80A9BA70EA09270142AF9BF0521C41233E9F0970E0CD0E94D32E659582C2CB5795DE373A5D54151CC1F13
3,263,341 UART: [art] SIG.R = DDBD593A8D344E3DAB086431663E5F81E628C325D9FA2534F5A9941FDE438DEF2E091315395F2A428E535B72672572EC
3,270,107 UART: [art] SIG.S = 59E7E03B06E58A7DC80AC78B04098D092AFCE31F51652C7FA559EC1BBD0E123C837702D435CC64E888A53F17717F8055
3,293,643 UART: Caliptra RT
3,293,988 UART: [state] CFI Enabled
3,401,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,371 UART: [rt]cmd =0x50435251, len=36
3,599,846 >>> mbox cmd response data (1848 bytes)
3,599,847 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,528 UART: [rt]cmd =0x50435245, len=56
3,633,088 >>> mbox cmd response data (8 bytes)
3,633,089 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,718 UART: [rt]cmd =0x50435251, len=36
3,830,107 >>> mbox cmd response data (1848 bytes)
3,830,108 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,871 UART: [rt]cmd =0x50435245, len=56
3,863,529 >>> mbox cmd response data (8 bytes)
3,863,530 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,949 UART: [rt]cmd =0x50435251, len=36
4,060,420 >>> mbox cmd response data (1848 bytes)
4,060,421 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,226 UART: [rt]cmd =0x50435245, len=56
4,093,710 >>> mbox cmd response data (8 bytes)
4,093,711 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,150 UART: [rt]cmd =0x50435251, len=36
4,290,293 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,735 UART: [kat] SHA2-256
903,675 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,000 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,791 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 ready_for_fw is high
1,176,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,417 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,626 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,119 >>> mbox cmd response: success
2,774,119 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,775,149 UART: [afmc] ++
2,775,317 UART: [afmc] CDI.KEYID = 6
2,775,679 UART: [afmc] SUBJECT.KEYID = 7
2,776,104 UART: [afmc] AUTHORITY.KEYID = 5
2,811,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,299 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,018 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,882 UART: [afmc] --
2,854,846 UART: [cold-reset] --
2,855,634 UART: [state] Locking Datavault
2,856,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,233 UART: [state] Locking ICCM
2,857,831 UART: [exit] Launching FMC @ 0x40000130
2,863,160 UART:
2,863,176 UART: Running Caliptra FMC ...
2,863,584 UART:
2,863,638 UART: [state] CFI Enabled
2,874,313 UART: [fht] FMC Alias Private Key: 7
2,982,476 UART: [art] Extend RT PCRs Done
2,982,904 UART: [art] Lock RT PCRs Done
2,984,464 UART: [art] Populate DV Done
2,992,815 UART: [fht] FMC Alias Private Key: 7
2,993,957 UART: [art] Derive CDI
2,994,237 UART: [art] Store in in slot 0x4
3,080,382 UART: [art] Derive Key Pair
3,080,742 UART: [art] Store priv key in slot 0x5
3,094,626 UART: [art] Derive Key Pair - Done
3,109,398 UART: [art] Signing Cert with AUTHO
3,109,878 UART: RITY.KEYID = 7
3,124,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,505 UART: [art] PUB.X = ADD9E4C45293D7155AAFA052CBD74CB5B30752E93D86A364D497E9B9693227FF860F5CD42E52441DE60277F75E442DC6
3,132,272 UART: [art] PUB.Y = 0FF0D42918779E4AC2C63314A7D2ED778FE34A98FB1D626AD75F3FBF3B1DE957C7C976BBB047B8EFFA568F5239770CDD
3,139,234 UART: [art] SIG.R = 185E4DE510FE762E5142BB602055440CC331F2BF5A1FD2A9DD1F5AE8630DDF35CF1BE6E7F0075F1A2ED7D6E7D4CB805D
3,146,015 UART: [art] SIG.S = BC071EEB1DCAA49BA55A9A04844B0A3C9C8DE59CF9B9D7C9EE84E220D4E53C14BAB9A5E1CBFE67479FAE847CD388088C
3,170,264 UART: Caliptra RT
3,170,517 UART: [state] CFI Enabled
3,278,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,016 UART: [rt]cmd =0x50435251, len=36
3,476,271 >>> mbox cmd response data (1848 bytes)
3,476,272 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,011 UART: [rt]cmd =0x50435245, len=56
3,509,687 >>> mbox cmd response data (8 bytes)
3,509,688 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,141 UART: [rt]cmd =0x50435251, len=36
3,706,864 >>> mbox cmd response data (1848 bytes)
3,706,865 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,474 UART: [rt]cmd =0x50435245, len=56
3,739,948 >>> mbox cmd response data (8 bytes)
3,739,949 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,372 UART: [rt]cmd =0x50435251, len=36
3,936,735 >>> mbox cmd response data (1848 bytes)
3,936,736 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,421 UART: [rt]cmd =0x50435245, len=56
3,970,015 >>> mbox cmd response data (8 bytes)
3,970,016 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,371 UART: [rt]cmd =0x50435251, len=36
4,166,962 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 ready_for_fw is high
1,060,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,054 >>> mbox cmd response: success
2,626,054 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,687,796 UART:
2,687,812 UART: Running Caliptra FMC ...
2,688,220 UART:
2,688,274 UART: [state] CFI Enabled
2,698,607 UART: [fht] FMC Alias Private Key: 7
2,806,610 UART: [art] Extend RT PCRs Done
2,807,038 UART: [art] Lock RT PCRs Done
2,808,354 UART: [art] Populate DV Done
2,816,553 UART: [fht] FMC Alias Private Key: 7
2,817,681 UART: [art] Derive CDI
2,817,961 UART: [art] Store in in slot 0x4
2,903,552 UART: [art] Derive Key Pair
2,903,912 UART: [art] Store priv key in slot 0x5
2,916,924 UART: [art] Derive Key Pair - Done
2,931,720 UART: [art] Signing Cert with AUTHO
2,932,200 UART: RITY.KEYID = 7
2,947,322 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,087 UART: [art] PUB.X = 6FADEAF5FEBE9EB09EC354B7670B80DCAD242C288734FEA48275A81847A29639017C4A75FC0E8A46DAE0F26EED463B7B
2,954,868 UART: [art] PUB.Y = A8823DFF1A2B52E39B56D18403DF4834A7F6300D67FA94A28A6A3ED1C2BA9805768630A298F982790641EE8AE3A96BB1
2,961,810 UART: [art] SIG.R = 871E2D46B79AB57A9E56BAEAA75C93BC81812D6CF4CF52DBF1BD1DA8CA3A7F30005B49865DFAD4980303B9B897ECBDA4
2,968,576 UART: [art] SIG.S = 04399EA4646EA5F186D4DA0291C05F9BA7216AD120949723ADA2662D2280CD8789839D19C9A9F6DF9EE51BFD995107E6
2,991,846 UART: Caliptra RT
2,992,099 UART: [state] CFI Enabled
3,099,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,528 UART: [rt]cmd =0x50435251, len=36
3,297,699 >>> mbox cmd response data (1848 bytes)
3,297,700 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,699 UART: [rt]cmd =0x50435245, len=56
3,331,269 >>> mbox cmd response data (8 bytes)
3,331,270 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,949 UART: [rt]cmd =0x50435251, len=36
3,528,552 >>> mbox cmd response data (1848 bytes)
3,528,553 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,274 UART: [rt]cmd =0x50435245, len=56
3,561,948 >>> mbox cmd response data (8 bytes)
3,561,949 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,404 UART: [rt]cmd =0x50435251, len=36
3,758,683 >>> mbox cmd response data (1848 bytes)
3,758,684 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,369 UART: [rt]cmd =0x50435245, len=56
3,791,829 >>> mbox cmd response data (8 bytes)
3,791,830 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,427 UART: [rt]cmd =0x50435251, len=36
3,988,646 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
893,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,394 UART: [kat] ++
897,546 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,383 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,224 UART: [cold-reset] ++
1,172,726 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 ready_for_fw is high
1,176,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,200,970 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,466 UART: [ldev] ++
1,210,634 UART: [ldev] CDI.KEYID = 6
1,210,997 UART: [ldev] SUBJECT.KEYID = 5
1,211,423 UART: [ldev] AUTHORITY.KEYID = 7
1,211,886 UART: [ldev] FE.KEYID = 1
1,217,190 UART: [ldev] Erasing FE.KEYID = 1
1,243,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,358 UART: [ldev] --
1,282,871 UART: [fwproc] Wait for Commands...
1,283,501 UART: [fwproc] Recv command 0x46574c44
1,284,229 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,700 >>> mbox cmd response: success
2,774,700 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,775,798 UART: [afmc] ++
2,775,966 UART: [afmc] CDI.KEYID = 6
2,776,328 UART: [afmc] SUBJECT.KEYID = 7
2,776,753 UART: [afmc] AUTHORITY.KEYID = 5
2,812,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,685 UART: [afmc] --
2,855,575 UART: [cold-reset] --
2,856,375 UART: [state] Locking Datavault
2,857,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,244 UART: [state] Locking ICCM
2,858,822 UART: [exit] Launching FMC @ 0x40000130
2,864,151 UART:
2,864,167 UART: Running Caliptra FMC ...
2,864,575 UART:
2,864,718 UART: [state] CFI Enabled
2,874,967 UART: [fht] FMC Alias Private Key: 7
2,982,754 UART: [art] Extend RT PCRs Done
2,983,182 UART: [art] Lock RT PCRs Done
2,984,582 UART: [art] Populate DV Done
2,992,703 UART: [fht] FMC Alias Private Key: 7
2,993,757 UART: [art] Derive CDI
2,994,037 UART: [art] Store in in slot 0x4
3,080,290 UART: [art] Derive Key Pair
3,080,650 UART: [art] Store priv key in slot 0x5
3,094,156 UART: [art] Derive Key Pair - Done
3,108,733 UART: [art] Signing Cert with AUTHO
3,109,213 UART: RITY.KEYID = 7
3,124,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,234 UART: [art] PUB.X = 5349B405E55F60070ADCC5949AB856B3DFBB2754A2D916A3D3B0A0504AEAE902E578F5EFF9E23ECFD3EAAA1CB7B07E00
3,131,992 UART: [art] PUB.Y = BE1A4579E7DAA721B2D0D545BB90BDE97A7070FB93D135248DFCE58577F4497BB8BB97674F4C3735739D4069C5D3AC2E
3,138,952 UART: [art] SIG.R = F7B719D15468DCDB5AB57987790DD4404BBC21E6545A9B56B9B57E35BF68D2D8E701A09CB5FA88E9D714AE9F1A34EF15
3,145,730 UART: [art] SIG.S = 93C35935C2D931899B125950370AEDC3388C7E7840A3285F9DAD400098A6A85C814311B4935AE426A4613BFCE2473696
3,169,638 UART: Caliptra RT
3,169,983 UART: [state] CFI Enabled
3,276,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,669 UART: [rt]cmd =0x50435251, len=36
3,475,054 >>> mbox cmd response data (1848 bytes)
3,475,055 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,738 UART: [rt]cmd =0x50435245, len=56
3,508,462 >>> mbox cmd response data (8 bytes)
3,508,463 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,842 UART: [rt]cmd =0x50435251, len=36
3,705,089 >>> mbox cmd response data (1848 bytes)
3,705,090 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,037 UART: [rt]cmd =0x50435245, len=56
3,738,285 >>> mbox cmd response data (8 bytes)
3,738,286 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,663 UART: [rt]cmd =0x50435251, len=36
3,935,016 >>> mbox cmd response data (1848 bytes)
3,935,017 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,852 UART: [rt]cmd =0x50435245, len=56
3,968,258 >>> mbox cmd response data (8 bytes)
3,968,259 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,772 UART: [rt]cmd =0x50435251, len=36
4,165,301 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,084 ready_for_fw is high
1,060,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,157 >>> mbox cmd response: success
2,625,157 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,688,795 UART:
2,688,811 UART: Running Caliptra FMC ...
2,689,219 UART:
2,689,362 UART: [state] CFI Enabled
2,700,119 UART: [fht] FMC Alias Private Key: 7
2,808,218 UART: [art] Extend RT PCRs Done
2,808,646 UART: [art] Lock RT PCRs Done
2,810,348 UART: [art] Populate DV Done
2,818,619 UART: [fht] FMC Alias Private Key: 7
2,819,755 UART: [art] Derive CDI
2,820,035 UART: [art] Store in in slot 0x4
2,905,700 UART: [art] Derive Key Pair
2,906,060 UART: [art] Store priv key in slot 0x5
2,919,574 UART: [art] Derive Key Pair - Done
2,934,507 UART: [art] Signing Cert with AUTHO
2,934,987 UART: RITY.KEYID = 7
2,950,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,012 UART: [art] PUB.X = D24D4ECAB7C99B3D185C100BB0E32F403E144DB8F0CAADB29E3F19B4FB8AF6DA3B95123A4555AA74A7B639F6D435E635
2,957,799 UART: [art] PUB.Y = BF3BD65634486F4C5BC4B316A30E601FC586F81BC0053BA28FB8ECDE9C964D6AE2CC629A5708C736368AF437B9DA6D70
2,964,754 UART: [art] SIG.R = 480342ADF473A0EF0F1C78D7D9D61A3AB984F9392268901BBEE4283D990B3A06AAF29655BDB6BF613AA176C1BE90AB4C
2,971,526 UART: [art] SIG.S = 5F34961623BA7DC4471BAE8CC2AE1751C8A5457067BB8FF74862236499BB0303108F455D28D045DB3AD61CDAEC7F2D71
2,995,521 UART: Caliptra RT
2,995,866 UART: [state] CFI Enabled
3,103,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,421 UART: [rt]cmd =0x50435251, len=36
3,302,276 >>> mbox cmd response data (1848 bytes)
3,302,277 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,104 UART: [rt]cmd =0x50435245, len=56
3,335,786 >>> mbox cmd response data (8 bytes)
3,335,787 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,118 UART: [rt]cmd =0x50435251, len=36
3,532,581 >>> mbox cmd response data (1848 bytes)
3,532,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,359 UART: [rt]cmd =0x50435245, len=56
3,566,061 >>> mbox cmd response data (8 bytes)
3,566,062 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,399 UART: [rt]cmd =0x50435251, len=36
3,762,852 >>> mbox cmd response data (1848 bytes)
3,762,853 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,402 UART: [rt]cmd =0x50435245, len=56
3,795,750 >>> mbox cmd response data (8 bytes)
3,795,751 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,506 UART: [rt]cmd =0x50435251, len=36
3,992,683 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 ready_for_fw is high
1,174,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,280,912 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,497 >>> mbox cmd response: success
2,772,497 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,594 UART: [afmc] ++
2,773,762 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,551 UART: [afmc] AUTHORITY.KEYID = 5
2,810,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,429 UART: [afmc] --
2,853,441 UART: [cold-reset] --
2,854,193 UART: [state] Locking Datavault
2,855,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,104 UART: [state] Locking ICCM
2,856,704 UART: [exit] Launching FMC @ 0x40000130
2,862,033 UART:
2,862,049 UART: Running Caliptra FMC ...
2,862,457 UART:
2,862,511 UART: [state] CFI Enabled
2,872,916 UART: [fht] FMC Alias Private Key: 7
2,980,693 UART: [art] Extend RT PCRs Done
2,981,121 UART: [art] Lock RT PCRs Done
2,982,867 UART: [art] Populate DV Done
2,991,126 UART: [fht] FMC Alias Private Key: 7
2,992,186 UART: [art] Derive CDI
2,992,466 UART: [art] Store in in slot 0x4
3,078,115 UART: [art] Derive Key Pair
3,078,475 UART: [art] Store priv key in slot 0x5
3,092,161 UART: [art] Derive Key Pair - Done
3,107,106 UART: [art] Signing Cert with AUTHO
3,107,586 UART: RITY.KEYID = 7
3,122,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,349 UART: [art] PUB.X = E95BEBFF3148BDAF5CFD2FBBE54376B7133FF4B242C7117F6B0D3ED82C3DFD3221C5062CD1F2D6AC227562CAD5A41782
3,130,135 UART: [art] PUB.Y = 798463FCCEF42DE84C599B260ABFDFBCF3E9C7CD24E069D3283AF567268D23864E75DD5C96177F02891E16837F0EB7BE
3,137,088 UART: [art] SIG.R = E48385ED1482879806C5499A04AEFD127495CAD5EF16507E3FBCA6E86A5BCC9E1AEEDCE9A4EF6A2B2774CAE10DF71320
3,143,869 UART: [art] SIG.S = F56A4A6E617E0C52E055C67A10DF7B7FB0348D6F0D26E016F3318970A7EBE6A5C59D27EE0F5799E852A70634E860A487
3,167,594 UART: Caliptra RT
3,167,847 UART: [state] CFI Enabled
3,274,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,257 UART: [rt]cmd =0x50435251, len=36
3,472,954 >>> mbox cmd response data (1848 bytes)
3,472,955 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,588 UART: [rt]cmd =0x50435245, len=56
3,505,848 >>> mbox cmd response data (8 bytes)
3,505,849 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,484 UART: [rt]cmd =0x50435251, len=36
3,702,961 >>> mbox cmd response data (1848 bytes)
3,702,962 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,603 UART: [rt]cmd =0x50435245, len=56
3,736,353 >>> mbox cmd response data (8 bytes)
3,736,354 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,851 UART: [rt]cmd =0x50435251, len=36
3,933,052 >>> mbox cmd response data (1848 bytes)
3,933,053 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,890 UART: [rt]cmd =0x50435245, len=56
3,966,410 >>> mbox cmd response data (8 bytes)
3,966,411 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,966 UART: [rt]cmd =0x50435251, len=36
4,163,259 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,740 ready_for_fw is high
1,055,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,345 >>> mbox cmd response: success
2,622,345 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,683,025 UART:
2,683,041 UART: Running Caliptra FMC ...
2,683,449 UART:
2,683,503 UART: [state] CFI Enabled
2,694,112 UART: [fht] FMC Alias Private Key: 7
2,801,945 UART: [art] Extend RT PCRs Done
2,802,373 UART: [art] Lock RT PCRs Done
2,803,827 UART: [art] Populate DV Done
2,812,288 UART: [fht] FMC Alias Private Key: 7
2,813,376 UART: [art] Derive CDI
2,813,656 UART: [art] Store in in slot 0x4
2,899,115 UART: [art] Derive Key Pair
2,899,475 UART: [art] Store priv key in slot 0x5
2,912,899 UART: [art] Derive Key Pair - Done
2,927,685 UART: [art] Signing Cert with AUTHO
2,928,165 UART: RITY.KEYID = 7
2,943,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,648 UART: [art] PUB.X = 89A268ED52707C1228D467B59BCC5B4729F38C52F7DE45FADF2A3C3469C6AD0697754C5357CA61135163BB5A50634C7A
2,951,417 UART: [art] PUB.Y = D3C145230802B277B3FD7571FA038BAD12C504BB4B2D246D9EC2EC9DC4077A0E7ADF8CC3EAA490B173EB5A81AE180FCF
2,958,368 UART: [art] SIG.R = 78AD4D799CE6A076BAD4D2442631410544601F95AD888FF7039075AF9391542899C79CA96FD5AD04905CE010DD845C11
2,965,125 UART: [art] SIG.S = 1978718515884BC910F28D98BB267DA10DFBAB8289600BD2E26D36F07E34A023008C05EB78BA2F342B78A21209C3F25C
2,989,042 UART: Caliptra RT
2,989,295 UART: [state] CFI Enabled
3,097,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,156 UART: [rt]cmd =0x50435251, len=36
3,295,615 >>> mbox cmd response data (1848 bytes)
3,295,616 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,409 UART: [rt]cmd =0x50435245, len=56
3,329,035 >>> mbox cmd response data (8 bytes)
3,329,036 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,445 UART: [rt]cmd =0x50435251, len=36
3,525,748 >>> mbox cmd response data (1848 bytes)
3,525,749 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,382 UART: [rt]cmd =0x50435245, len=56
3,558,660 >>> mbox cmd response data (8 bytes)
3,558,661 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,152 UART: [rt]cmd =0x50435251, len=36
3,755,223 >>> mbox cmd response data (1848 bytes)
3,755,224 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,113 UART: [rt]cmd =0x50435245, len=56
3,789,035 >>> mbox cmd response data (8 bytes)
3,789,036 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,563 UART: [rt]cmd =0x50435251, len=36
3,985,902 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 ready_for_fw is high
1,174,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,281,887 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,430 >>> mbox cmd response: success
2,772,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,685 UART: [afmc] ++
2,773,853 UART: [afmc] CDI.KEYID = 6
2,774,216 UART: [afmc] SUBJECT.KEYID = 7
2,774,642 UART: [afmc] AUTHORITY.KEYID = 5
2,810,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,375 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,388 UART: [afmc] --
2,854,296 UART: [cold-reset] --
2,855,176 UART: [state] Locking Datavault
2,856,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,179 UART: [state] Locking ICCM
2,857,753 UART: [exit] Launching FMC @ 0x40000130
2,863,082 UART:
2,863,098 UART: Running Caliptra FMC ...
2,863,506 UART:
2,863,649 UART: [state] CFI Enabled
2,873,862 UART: [fht] FMC Alias Private Key: 7
2,981,265 UART: [art] Extend RT PCRs Done
2,981,693 UART: [art] Lock RT PCRs Done
2,983,153 UART: [art] Populate DV Done
2,991,574 UART: [fht] FMC Alias Private Key: 7
2,992,584 UART: [art] Derive CDI
2,992,864 UART: [art] Store in in slot 0x4
3,078,545 UART: [art] Derive Key Pair
3,078,905 UART: [art] Store priv key in slot 0x5
3,092,349 UART: [art] Derive Key Pair - Done
3,107,235 UART: [art] Signing Cert with AUTHO
3,107,715 UART: RITY.KEYID = 7
3,122,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,586 UART: [art] PUB.X = 1B854CBA5024458FCC93FC66C596E8F3EA1D51D58646137C6C39BEB9D396727B96E7424EBA679C98495E69A733B8147B
3,130,358 UART: [art] PUB.Y = D6393A324C588DD5308A3D15E0ACDB49827BFB9F8DF851803D3109AF04D8812DF9A2DF29B30F64FB9B430D2B9F2A4B9A
3,137,310 UART: [art] SIG.R = DD90E16CB9846355F69E580088E6C85FF0F05E33304DED1DE4141EBFB21087378D1519C969D88350A57317066678A503
3,144,044 UART: [art] SIG.S = B80F3B421996EA7DFB3FC5BF16650B2615DE260CD1BD4176E56A017224287BF83C36DE6E524A78E430720A0F80376582
3,168,307 UART: Caliptra RT
3,168,652 UART: [state] CFI Enabled
3,276,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,764 UART: [rt]cmd =0x50435251, len=36
3,474,391 >>> mbox cmd response data (1848 bytes)
3,474,392 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,947 UART: [rt]cmd =0x50435245, len=56
3,507,429 >>> mbox cmd response data (8 bytes)
3,507,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,821 UART: [rt]cmd =0x50435251, len=36
3,704,200 >>> mbox cmd response data (1848 bytes)
3,704,201 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,026 UART: [rt]cmd =0x50435245, len=56
3,737,736 >>> mbox cmd response data (8 bytes)
3,737,737 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,400 UART: [rt]cmd =0x50435251, len=36
3,934,751 >>> mbox cmd response data (1848 bytes)
3,934,752 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,299 UART: [rt]cmd =0x50435245, len=56
3,967,601 >>> mbox cmd response data (8 bytes)
3,967,602 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,975 UART: [rt]cmd =0x50435251, len=36
4,164,330 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,663 ready_for_fw is high
1,056,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,874 >>> mbox cmd response: success
2,620,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,683,198 UART:
2,683,214 UART: Running Caliptra FMC ...
2,683,622 UART:
2,683,765 UART: [state] CFI Enabled
2,694,302 UART: [fht] FMC Alias Private Key: 7
2,802,245 UART: [art] Extend RT PCRs Done
2,802,673 UART: [art] Lock RT PCRs Done
2,803,907 UART: [art] Populate DV Done
2,812,104 UART: [fht] FMC Alias Private Key: 7
2,813,120 UART: [art] Derive CDI
2,813,400 UART: [art] Store in in slot 0x4
2,899,069 UART: [art] Derive Key Pair
2,899,429 UART: [art] Store priv key in slot 0x5
2,913,519 UART: [art] Derive Key Pair - Done
2,928,233 UART: [art] Signing Cert with AUTHO
2,928,713 UART: RITY.KEYID = 7
2,944,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,882 UART: [art] PUB.X = 6652923C3D0DC2128B5E7E2E4219CF9063B616D6272031B7FDAF8770207745F173CE8EDC1E65F6D30CDB74BF9AB88F13
2,951,652 UART: [art] PUB.Y = 495F65029FB313B396C6F09EC30B43B6F9F92092D545435753F82E139E993B45EDCBECD4823C36CDA74B613395334459
2,958,592 UART: [art] SIG.R = C4CA39E3FD90775E396558625B1269EC8A39F522F9F388631AA1DF3219CE57785928F19CA4C979B03082C550127519A6
2,965,354 UART: [art] SIG.S = 1CDF7C032A139C8E8FE4999DE4A6FD118E3670F9E95F108639915488D3C9B5D598453B258B6C7B67D36D3EDFD4C86F9F
2,988,988 UART: Caliptra RT
2,989,333 UART: [state] CFI Enabled
3,096,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,486 UART: [rt]cmd =0x50435251, len=36
3,295,013 >>> mbox cmd response data (1848 bytes)
3,295,014 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,765 UART: [rt]cmd =0x50435245, len=56
3,328,191 >>> mbox cmd response data (8 bytes)
3,328,192 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,781 UART: [rt]cmd =0x50435251, len=36
3,525,080 >>> mbox cmd response data (1848 bytes)
3,525,081 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,686 UART: [rt]cmd =0x50435245, len=56
3,558,292 >>> mbox cmd response data (8 bytes)
3,558,293 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,800 UART: [rt]cmd =0x50435251, len=36
3,755,005 >>> mbox cmd response data (1848 bytes)
3,755,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,671 UART: [rt]cmd =0x50435245, len=56
3,788,173 >>> mbox cmd response data (8 bytes)
3,788,174 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,615 UART: [rt]cmd =0x50435251, len=36
3,984,926 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,199 UART: [kat] SHA2-256
892,137 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,124 UART: [kat] HMAC-384Kdf
906,632 UART: [kat] LMS
1,474,828 UART: [kat] --
1,475,867 UART: [cold-reset] ++
1,476,245 UART: [fht] Storing FHT @ 0x50003400
1,479,112 UART: [idev] ++
1,479,280 UART: [idev] CDI.KEYID = 6
1,479,640 UART: [idev] SUBJECT.KEYID = 7
1,480,064 UART: [idev] UDS.KEYID = 0
1,480,409 ready_for_fw is high
1,480,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,074 UART: [idev] Erasing UDS.KEYID = 0
1,504,492 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,136 UART: [idev] --
1,514,211 UART: [ldev] ++
1,514,379 UART: [ldev] CDI.KEYID = 6
1,514,742 UART: [ldev] SUBJECT.KEYID = 5
1,515,168 UART: [ldev] AUTHORITY.KEYID = 7
1,515,631 UART: [ldev] FE.KEYID = 1
1,521,021 UART: [ldev] Erasing FE.KEYID = 1
1,546,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,668 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 114332 bytes
2,886,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,600 >>> mbox cmd response: success
3,078,600 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,734 UART: [afmc] ++
3,079,902 UART: [afmc] CDI.KEYID = 6
3,080,264 UART: [afmc] SUBJECT.KEYID = 7
3,080,689 UART: [afmc] AUTHORITY.KEYID = 5
3,116,220 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,886 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,499 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,189 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,104 UART: [afmc] --
3,160,066 UART: [cold-reset] --
3,160,994 UART: [state] Locking Datavault
3,161,947 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,551 UART: [state] Locking ICCM
3,163,109 UART: [exit] Launching FMC @ 0x40000130
3,168,438 UART:
3,168,454 UART: Running Caliptra FMC ...
3,168,862 UART:
3,168,916 UART: [state] CFI Enabled
3,179,497 UART: [fht] FMC Alias Private Key: 7
3,287,620 UART: [art] Extend RT PCRs Done
3,288,048 UART: [art] Lock RT PCRs Done
3,289,558 UART: [art] Populate DV Done
3,297,869 UART: [fht] FMC Alias Private Key: 7
3,298,903 UART: [art] Derive CDI
3,299,183 UART: [art] Store in in slot 0x4
3,384,468 UART: [art] Derive Key Pair
3,384,828 UART: [art] Store priv key in slot 0x5
3,397,452 UART: [art] Derive Key Pair - Done
3,412,074 UART: [art] Signing Cert with AUTHO
3,412,554 UART: RITY.KEYID = 7
3,428,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,779 UART: [art] PUB.X = 9247470B28767423313A9341E81FCE441A4D00CD9758C0971BBF50A3B8E531F2C7C662B61320977A7E4597C97B610383
3,435,509 UART: [art] PUB.Y = 5CE059F6911C5FBAB2EC6551DECE215E1CCE1B1885E4DC5B089BEE154E8B0BA00E1AEC6B54D0142440B8D8C819358059
3,442,466 UART: [art] SIG.R = 8275062EE2FE84C9A7410634BDC9D192E942E0AD283C33C81BD4AE4A3AFDF82E8CC868111C9A98E622794360BCC12C27
3,449,238 UART: [art] SIG.S = 1FE1B77D8A26AF3ED20519971DB92182B6FE8C94DC797B8AF30A69DC7EE32142FBCD0B46DF05A56F58455D20B2278E03
3,472,844 UART: Caliptra RT
3,473,097 UART: [state] CFI Enabled
3,581,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,160 UART: [rt]cmd =0x50435245, len=56
3,613,707 >>> mbox cmd response: failed
3,613,707 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,337 UART: [rt]cmd =0x50435245, len=56
3,644,784 >>> mbox cmd response: failed
3,644,784 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,608 UART: [rt]cmd =0x50435245, len=56
3,676,045 >>> mbox cmd response: failed
3,676,045 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,763 UART: [rt]cmd =0x50435245, len=56
3,707,032 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 ready_for_fw is high
1,362,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,496 >>> mbox cmd response: success
2,926,496 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,988,304 UART:
2,988,320 UART: Running Caliptra FMC ...
2,988,728 UART:
2,988,782 UART: [state] CFI Enabled
2,999,451 UART: [fht] FMC Alias Private Key: 7
3,107,148 UART: [art] Extend RT PCRs Done
3,107,576 UART: [art] Lock RT PCRs Done
3,108,880 UART: [art] Populate DV Done
3,117,199 UART: [fht] FMC Alias Private Key: 7
3,118,263 UART: [art] Derive CDI
3,118,543 UART: [art] Store in in slot 0x4
3,204,070 UART: [art] Derive Key Pair
3,204,430 UART: [art] Store priv key in slot 0x5
3,217,198 UART: [art] Derive Key Pair - Done
3,232,061 UART: [art] Signing Cert with AUTHO
3,232,541 UART: RITY.KEYID = 7
3,247,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,258 UART: [art] PUB.X = D93DCA52CB46613BA1E502747E3342E0AF51E8E6C898FD836896FEFC23B42A2898859006632F4C635FDB624BF9973CB7
3,255,026 UART: [art] PUB.Y = 55237B137861E45720E483B060F32EB44DCAB319FD3D761CA1442C18CA3A42C1042E366D0587BB75BA05541A298FD50F
3,261,964 UART: [art] SIG.R = 2E903907D5B689BF5EF051B3CC5327482C3EE7B8AF38BA9543846DCDC96014CB54CDD2BF2B43F165993DC4D64BA1CCFA
3,268,749 UART: [art] SIG.S = BEAC8892D2042BDED3B48D93770FFFB79D765739AC68A4F13819D97DB85BE1ED4833D5D884B055703AB466C93672902B
3,292,782 UART: Caliptra RT
3,293,035 UART: [state] CFI Enabled
3,400,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,834 UART: [rt]cmd =0x50435245, len=56
3,433,317 >>> mbox cmd response: failed
3,433,317 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,957 UART: [rt]cmd =0x50435245, len=56
3,464,686 >>> mbox cmd response: failed
3,464,686 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,272 UART: [rt]cmd =0x50435245, len=56
3,495,847 >>> mbox cmd response: failed
3,495,847 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,311 UART: [rt]cmd =0x50435245, len=56
3,526,704 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,514 UART: [kat] SHA2-256
882,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,560 UART: [kat] ++
886,712 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,057 UART: [kat] HMAC-384Kdf
907,847 UART: [kat] LMS
1,476,043 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 ready_for_fw is high
1,481,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,505,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,713 UART: [idev] --
1,514,762 UART: [ldev] ++
1,514,930 UART: [ldev] CDI.KEYID = 6
1,515,293 UART: [ldev] SUBJECT.KEYID = 5
1,515,719 UART: [ldev] AUTHORITY.KEYID = 7
1,516,182 UART: [ldev] FE.KEYID = 1
1,521,400 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,269 UART: [fwproc] Received command 0x46574c44
1,588,060 UART: [fwproc] Received Image of size 114332 bytes
2,885,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,736 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,831 >>> mbox cmd response: success
3,077,831 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,078,999 UART: [afmc] ++
3,079,167 UART: [afmc] CDI.KEYID = 6
3,079,529 UART: [afmc] SUBJECT.KEYID = 7
3,079,954 UART: [afmc] AUTHORITY.KEYID = 5
3,114,907 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,105 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,498 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,188 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,915 UART: [afmc] --
3,158,043 UART: [cold-reset] --
3,158,845 UART: [state] Locking Datavault
3,160,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,712 UART: [state] Locking ICCM
3,161,338 UART: [exit] Launching FMC @ 0x40000130
3,166,667 UART:
3,166,683 UART: Running Caliptra FMC ...
3,167,091 UART:
3,167,234 UART: [state] CFI Enabled
3,177,833 UART: [fht] FMC Alias Private Key: 7
3,286,698 UART: [art] Extend RT PCRs Done
3,287,126 UART: [art] Lock RT PCRs Done
3,288,842 UART: [art] Populate DV Done
3,297,183 UART: [fht] FMC Alias Private Key: 7
3,298,165 UART: [art] Derive CDI
3,298,445 UART: [art] Store in in slot 0x4
3,384,046 UART: [art] Derive Key Pair
3,384,406 UART: [art] Store priv key in slot 0x5
3,397,498 UART: [art] Derive Key Pair - Done
3,412,486 UART: [art] Signing Cert with AUTHO
3,412,966 UART: RITY.KEYID = 7
3,428,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,969 UART: [art] PUB.X = CC6E464E3BD1AEE9BFD0D4129F306B9CEFFB6A3F679A7FAFD9DD810AF92275067E6C0AF8E775F0B504F2DAC330DC0C48
3,435,752 UART: [art] PUB.Y = 9702C711EAFBA99BBAF82B1EF97FFEFAD3E62B4AC2546B81A93883332F27710254DC72BFA55D9FEA5D11EDDDBBD9C46F
3,442,724 UART: [art] SIG.R = 7C49E6DCB1B8AD1177C500DCCBB8E17BC3BEDD14FF8045056F4078D8BB434EDA0EB1C8424E7059639BD45CE01A825B3C
3,449,486 UART: [art] SIG.S = 8F7C89F9EFD0CD0A5FFC8BA2CD9BA09692B921EAC226D581DA8C28BFBFDAB4660629549E62C11FC44589CCABD1617417
3,473,183 UART: Caliptra RT
3,473,528 UART: [state] CFI Enabled
3,581,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,315 UART: [rt]cmd =0x50435245, len=56
3,613,980 >>> mbox cmd response: failed
3,613,980 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,474 UART: [rt]cmd =0x50435245, len=56
3,644,907 >>> mbox cmd response: failed
3,644,907 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,883 UART: [rt]cmd =0x50435245, len=56
3,676,374 >>> mbox cmd response: failed
3,676,374 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,104 UART: [rt]cmd =0x50435245, len=56
3,707,427 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,498 ready_for_fw is high
1,363,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,469 >>> mbox cmd response: success
2,928,469 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,927 UART:
2,989,943 UART: Running Caliptra FMC ...
2,990,351 UART:
2,990,494 UART: [state] CFI Enabled
3,000,893 UART: [fht] FMC Alias Private Key: 7
3,109,478 UART: [art] Extend RT PCRs Done
3,109,906 UART: [art] Lock RT PCRs Done
3,111,648 UART: [art] Populate DV Done
3,119,977 UART: [fht] FMC Alias Private Key: 7
3,121,151 UART: [art] Derive CDI
3,121,431 UART: [art] Store in in slot 0x4
3,206,818 UART: [art] Derive Key Pair
3,207,178 UART: [art] Store priv key in slot 0x5
3,220,354 UART: [art] Derive Key Pair - Done
3,235,003 UART: [art] Signing Cert with AUTHO
3,235,483 UART: RITY.KEYID = 7
3,250,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,652 UART: [art] PUB.X = 20F58F96FB5B20DD7C6017A9BE88A9E0284DEF9DEE0BD35FEF6388A940E66925E827E618E30F72763ECE94F7C60D3090
3,258,423 UART: [art] PUB.Y = 31E20ADAD93151F3A919F20D5B79DB7A743D056B5DC10FDF064267B346BAFD601313B046D0D8CFC3BAADE4F35C90C959
3,265,374 UART: [art] SIG.R = 289494EED79A13CE023D01533404713F314A272BEE9C41E580E86766526F0D63174F11914C9E623D1F8C2DD7A842C9A3
3,272,126 UART: [art] SIG.S = 9409F9C83FC6E8E6E1E40C8CEF1D2CF9A5D4DB844A1FEF07931DCEB55043BAD0DC18690D4D62D5718EAB8A0CA05B4087
3,295,186 UART: Caliptra RT
3,295,531 UART: [state] CFI Enabled
3,404,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,850 UART: [rt]cmd =0x50435245, len=56
3,436,341 >>> mbox cmd response: failed
3,436,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,343 UART: [rt]cmd =0x50435245, len=56
3,467,612 >>> mbox cmd response: failed
3,467,612 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,290 UART: [rt]cmd =0x50435245, len=56
3,498,769 >>> mbox cmd response: failed
3,498,769 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,637 UART: [rt]cmd =0x50435245, len=56
3,530,376 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,803 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 ready_for_fw is high
1,176,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,308 UART: [idev] Erasing UDS.KEYID = 0
1,201,855 UART: [idev] Sha1 KeyId Algorithm
1,210,483 UART: [idev] --
1,211,459 UART: [ldev] ++
1,211,627 UART: [ldev] CDI.KEYID = 6
1,211,990 UART: [ldev] SUBJECT.KEYID = 5
1,212,416 UART: [ldev] AUTHORITY.KEYID = 7
1,212,879 UART: [ldev] FE.KEYID = 1
1,218,067 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,833 UART: [ldev] --
1,283,098 UART: [fwproc] Wait for Commands...
1,283,818 UART: [fwproc] Recv command 0x46574c44
1,284,546 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,281 >>> mbox cmd response: success
2,776,281 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,421 UART: [afmc] ++
2,777,589 UART: [afmc] CDI.KEYID = 6
2,777,951 UART: [afmc] SUBJECT.KEYID = 7
2,778,376 UART: [afmc] AUTHORITY.KEYID = 5
2,813,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,506 UART: [afmc] --
2,857,474 UART: [cold-reset] --
2,858,370 UART: [state] Locking Datavault
2,859,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,071 UART: [state] Locking ICCM
2,860,535 UART: [exit] Launching FMC @ 0x40000130
2,865,864 UART:
2,865,880 UART: Running Caliptra FMC ...
2,866,288 UART:
2,866,342 UART: [state] CFI Enabled
2,876,497 UART: [fht] FMC Alias Private Key: 7
2,985,216 UART: [art] Extend RT PCRs Done
2,985,644 UART: [art] Lock RT PCRs Done
2,987,036 UART: [art] Populate DV Done
2,995,533 UART: [fht] FMC Alias Private Key: 7
2,996,647 UART: [art] Derive CDI
2,996,927 UART: [art] Store in in slot 0x4
3,082,222 UART: [art] Derive Key Pair
3,082,582 UART: [art] Store priv key in slot 0x5
3,095,924 UART: [art] Derive Key Pair - Done
3,110,933 UART: [art] Signing Cert with AUTHO
3,111,413 UART: RITY.KEYID = 7
3,126,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,250 UART: [art] PUB.X = F0C708628A4B69936D5CFAD2CE09C75CA8F9E3603476C1568512B5C9F0086A0A48FCDA9390F813E17933679FA1BC7C8C
3,134,014 UART: [art] PUB.Y = A8894759150C86EE2A09B0C14E537F91C83A6FD73790AF562C2ED411E0822162ABEB01396AC8011D05877AE9CB8D4C34
3,140,951 UART: [art] SIG.R = 15A3E7055027FA7CAAD2AE42752646421963BB56DB21B7F249FBF1464A679BA5BF256AC3F40B92E397213CEC3C95F60D
3,147,720 UART: [art] SIG.S = 57F0691E041CBB2C7C87C3181293134DF60EB96DC4E2EBA34F7B609CC8F34E49F79EB403704654929AB0D3EC946248F7
3,171,002 UART: Caliptra RT
3,171,255 UART: [state] CFI Enabled
3,279,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,060 UART: [rt]cmd =0x50435245, len=56
3,311,479 >>> mbox cmd response: failed
3,311,479 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,167 UART: [rt]cmd =0x50435245, len=56
3,342,654 >>> mbox cmd response: failed
3,342,654 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,366 UART: [rt]cmd =0x50435245, len=56
3,373,895 >>> mbox cmd response: failed
3,373,895 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,791 UART: [rt]cmd =0x50435245, len=56
3,405,036 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 ready_for_fw is high
1,059,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,326 >>> mbox cmd response: success
2,626,326 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,848 UART:
2,687,864 UART: Running Caliptra FMC ...
2,688,272 UART:
2,688,326 UART: [state] CFI Enabled
2,698,709 UART: [fht] FMC Alias Private Key: 7
2,806,858 UART: [art] Extend RT PCRs Done
2,807,286 UART: [art] Lock RT PCRs Done
2,808,994 UART: [art] Populate DV Done
2,817,139 UART: [fht] FMC Alias Private Key: 7
2,818,135 UART: [art] Derive CDI
2,818,415 UART: [art] Store in in slot 0x4
2,904,172 UART: [art] Derive Key Pair
2,904,532 UART: [art] Store priv key in slot 0x5
2,917,378 UART: [art] Derive Key Pair - Done
2,932,203 UART: [art] Signing Cert with AUTHO
2,932,683 UART: RITY.KEYID = 7
2,948,085 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,850 UART: [art] PUB.X = 87A179085C25ABD6A537C983EB3E8289FF8D52D68139CF43A5A4F17A7C2C4BE54ECC4F16A34F06EA46F576DF5F6577FF
2,955,628 UART: [art] PUB.Y = 8ECD2D4665FBCB02DDFC2691B88A534BF63CCA1C7C0D1547BFD92CFBC23A6509213921A87BA859677C415BD6FB788C2B
2,962,587 UART: [art] SIG.R = F944D99F16294C4E61D6A2954162EF1E09CEC82ECA94180F75427AB51C3449FCEB163D55EF772D3A24B98E34A81B072A
2,969,354 UART: [art] SIG.S = E29BD5D7A75885EA3043D5107E756B44798D75DD6AC3860C0D9AF75BDD38F5ED1AAAED1E567A351C3CA9AC26A63196FE
2,992,893 UART: Caliptra RT
2,993,146 UART: [state] CFI Enabled
3,100,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,422 UART: [rt]cmd =0x50435245, len=56
3,132,931 >>> mbox cmd response: failed
3,132,931 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,433 UART: [rt]cmd =0x50435245, len=56
3,163,918 >>> mbox cmd response: failed
3,163,918 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,678 UART: [rt]cmd =0x50435245, len=56
3,195,035 >>> mbox cmd response: failed
3,195,035 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,603 UART: [rt]cmd =0x50435245, len=56
3,226,216 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
893,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,074 UART: [kat] ++
898,226 UART: [kat] sha1
902,386 UART: [kat] SHA2-256
904,326 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
918,961 UART: [kat] HMAC-384Kdf
923,637 UART: [kat] LMS
1,171,965 UART: [kat] --
1,172,784 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,175,999 UART: [idev] ++
1,176,167 UART: [idev] CDI.KEYID = 6
1,176,527 UART: [idev] SUBJECT.KEYID = 7
1,176,951 UART: [idev] UDS.KEYID = 0
1,177,296 ready_for_fw is high
1,177,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,905 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,542 UART: [ldev] ++
1,210,710 UART: [ldev] CDI.KEYID = 6
1,211,073 UART: [ldev] SUBJECT.KEYID = 5
1,211,499 UART: [ldev] AUTHORITY.KEYID = 7
1,211,962 UART: [ldev] FE.KEYID = 1
1,217,188 UART: [ldev] Erasing FE.KEYID = 1
1,243,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,134 UART: [ldev] --
1,282,443 UART: [fwproc] Wait for Commands...
1,283,149 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,418 >>> mbox cmd response: success
2,774,418 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,626 UART: [afmc] ++
2,775,794 UART: [afmc] CDI.KEYID = 6
2,776,156 UART: [afmc] SUBJECT.KEYID = 7
2,776,581 UART: [afmc] AUTHORITY.KEYID = 5
2,811,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,341 UART: [afmc] --
2,855,331 UART: [cold-reset] --
2,856,015 UART: [state] Locking Datavault
2,857,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,948 UART: [state] Locking ICCM
2,858,492 UART: [exit] Launching FMC @ 0x40000130
2,863,821 UART:
2,863,837 UART: Running Caliptra FMC ...
2,864,245 UART:
2,864,388 UART: [state] CFI Enabled
2,875,331 UART: [fht] FMC Alias Private Key: 7
2,983,676 UART: [art] Extend RT PCRs Done
2,984,104 UART: [art] Lock RT PCRs Done
2,985,422 UART: [art] Populate DV Done
2,993,499 UART: [fht] FMC Alias Private Key: 7
2,994,565 UART: [art] Derive CDI
2,994,845 UART: [art] Store in in slot 0x4
3,080,342 UART: [art] Derive Key Pair
3,080,702 UART: [art] Store priv key in slot 0x5
3,094,530 UART: [art] Derive Key Pair - Done
3,109,198 UART: [art] Signing Cert with AUTHO
3,109,678 UART: RITY.KEYID = 7
3,124,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,315 UART: [art] PUB.X = 718667A9936CCA557FAC558ADB0705FE46EB5C4E504881D2E60226999EF6003AEF09376EA981FF8855EEA4FDB67A53DF
3,132,061 UART: [art] PUB.Y = 26F74B7A965A43555787894E616A598F2B4504385FB39270E9EB8B5CD3E7EE80CE526032DED21DB14ACB29DACA37BCC1
3,139,018 UART: [art] SIG.R = 23BFA7621A76630A3CCDBDCE9A51A22591631157802C6B38C23EAB198D5310A6F00DA30CBBC1D6B9DF96E76008204A55
3,145,784 UART: [art] SIG.S = 85BE6CD4EF69B7F758C69A51347B16782D28E7F063DD3D414F5D35F4C06EF6669EB52568531179D88A7B3569EC442AE3
3,169,861 UART: Caliptra RT
3,170,206 UART: [state] CFI Enabled
3,278,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,823 UART: [rt]cmd =0x50435245, len=56
3,311,134 >>> mbox cmd response: failed
3,311,134 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,932 UART: [rt]cmd =0x50435245, len=56
3,342,575 >>> mbox cmd response: failed
3,342,575 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,221 UART: [rt]cmd =0x50435245, len=56
3,373,806 >>> mbox cmd response: failed
3,373,806 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,654 UART: [rt]cmd =0x50435245, len=56
3,405,001 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,540 ready_for_fw is high
1,060,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,465 >>> mbox cmd response: success
2,625,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,531 UART:
2,687,547 UART: Running Caliptra FMC ...
2,687,955 UART:
2,688,098 UART: [state] CFI Enabled
2,699,067 UART: [fht] FMC Alias Private Key: 7
2,807,088 UART: [art] Extend RT PCRs Done
2,807,516 UART: [art] Lock RT PCRs Done
2,809,388 UART: [art] Populate DV Done
2,817,679 UART: [fht] FMC Alias Private Key: 7
2,818,629 UART: [art] Derive CDI
2,818,909 UART: [art] Store in in slot 0x4
2,904,786 UART: [art] Derive Key Pair
2,905,146 UART: [art] Store priv key in slot 0x5
2,918,172 UART: [art] Derive Key Pair - Done
2,932,945 UART: [art] Signing Cert with AUTHO
2,933,425 UART: RITY.KEYID = 7
2,948,779 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,544 UART: [art] PUB.X = 7F2E44FBB239B50900C88944EE3DCCDDA3F4F3232627B3D32C3752768DAA556A1AB38CB15E009112499C70CD28777787
2,956,269 UART: [art] PUB.Y = 3611147E7BE5C9A946404C63F11CE3C579D3634BAF0A9831A958C3E68A234B47D27A8B20A720A5B34C74DF9A3E4E7C50
2,963,220 UART: [art] SIG.R = 05127D84B339EE682D377384C71F278C752AF475B2441FAD12164C3F85620E942EADE6CF16766F8183F0CB1B8766438D
2,969,980 UART: [art] SIG.S = E37950D1B98CF7738F72454ADB1AC825B309BF7F10D31AD70280BBE7BA516C1F8D2FA27CF16D2F6E6FD5DEAA4D4A01B1
2,993,556 UART: Caliptra RT
2,993,901 UART: [state] CFI Enabled
3,102,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,436 UART: [rt]cmd =0x50435245, len=56
3,134,437 >>> mbox cmd response: failed
3,134,437 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,275 UART: [rt]cmd =0x50435245, len=56
3,166,066 >>> mbox cmd response: failed
3,166,066 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,742 UART: [rt]cmd =0x50435245, len=56
3,197,087 >>> mbox cmd response: failed
3,197,087 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,753 UART: [rt]cmd =0x50435245, len=56
3,228,176 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,344 UART: [state] LifecycleState = Unprovisioned
84,999 UART: [state] DebugLocked = No
85,493 UART: [state] WD Timer not started. Device not locked for debugging
86,602 UART: [kat] SHA2-256
890,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,281 UART: [kat] ++
894,433 UART: [kat] sha1
898,745 UART: [kat] SHA2-256
900,685 UART: [kat] SHA2-384
903,370 UART: [kat] SHA2-512-ACC
905,271 UART: [kat] ECC-384
914,730 UART: [kat] HMAC-384Kdf
919,260 UART: [kat] LMS
1,167,572 UART: [kat] --
1,168,587 UART: [cold-reset] ++
1,169,033 UART: [fht] FHT @ 0x50003400
1,171,809 UART: [idev] ++
1,171,977 UART: [idev] CDI.KEYID = 6
1,172,338 UART: [idev] SUBJECT.KEYID = 7
1,172,763 UART: [idev] UDS.KEYID = 0
1,173,109 ready_for_fw is high
1,173,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,729 UART: [idev] Erasing UDS.KEYID = 0
1,198,113 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,293 >>> mbox cmd response: success
2,773,293 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,394 UART: [afmc] ++
2,774,562 UART: [afmc] CDI.KEYID = 6
2,774,925 UART: [afmc] SUBJECT.KEYID = 7
2,775,351 UART: [afmc] AUTHORITY.KEYID = 5
2,811,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,389 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,001 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,720 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,547 UART: [afmc] --
2,854,491 UART: [cold-reset] --
2,855,223 UART: [state] Locking Datavault
2,856,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,870 UART: [state] Locking ICCM
2,857,458 UART: [exit] Launching FMC @ 0x40000130
2,862,787 UART:
2,862,803 UART: Running Caliptra FMC ...
2,863,211 UART:
2,863,265 UART: [state] CFI Enabled
2,873,756 UART: [fht] FMC Alias Private Key: 7
2,981,521 UART: [art] Extend RT PCRs Done
2,981,949 UART: [art] Lock RT PCRs Done
2,983,407 UART: [art] Populate DV Done
2,991,336 UART: [fht] FMC Alias Private Key: 7
2,992,516 UART: [art] Derive CDI
2,992,796 UART: [art] Store in in slot 0x4
3,078,277 UART: [art] Derive Key Pair
3,078,637 UART: [art] Store priv key in slot 0x5
3,092,257 UART: [art] Derive Key Pair - Done
3,107,009 UART: [art] Signing Cert with AUTHO
3,107,489 UART: RITY.KEYID = 7
3,122,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,324 UART: [art] PUB.X = 14990C9A0905182A665CE449F984CC4C9139EAB1D245577859A5C45E9731BDD7E5797BE09F3BC46BBD90108A7A94A2C0
3,130,087 UART: [art] PUB.Y = 078A1C4B69854A70DD7DFD93582F54909903BC8B79C30DF270FFD72DE07AFC54F9F37E6DDBB5DAE680F201CC05DB43AE
3,137,042 UART: [art] SIG.R = 3DE64C9374019626B28D74F071D0AF059EBCE4DCD0EB2E216F1DBE5EA26C725F07494831890ABAE859E713E9233F7103
3,143,803 UART: [art] SIG.S = E4C46344A73E9BCB69CE41A7F11ECDE1587E5FFCC37AA8A3B683287AF59B37CD7030E42CAB99A702D8D7D83E7D847D86
3,167,829 UART: Caliptra RT
3,168,082 UART: [state] CFI Enabled
3,276,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,757 UART: [rt]cmd =0x50435245, len=56
3,308,266 >>> mbox cmd response: failed
3,308,266 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,932 UART: [rt]cmd =0x50435245, len=56
3,339,311 >>> mbox cmd response: failed
3,339,311 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,851 UART: [rt]cmd =0x50435245, len=56
3,370,562 >>> mbox cmd response: failed
3,370,562 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,240 UART: [rt]cmd =0x50435245, len=56
3,401,995 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,632 ready_for_fw is high
1,055,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,047 >>> mbox cmd response: success
2,622,047 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,683,979 UART:
2,683,995 UART: Running Caliptra FMC ...
2,684,403 UART:
2,684,457 UART: [state] CFI Enabled
2,695,310 UART: [fht] FMC Alias Private Key: 7
2,803,243 UART: [art] Extend RT PCRs Done
2,803,671 UART: [art] Lock RT PCRs Done
2,805,441 UART: [art] Populate DV Done
2,813,658 UART: [fht] FMC Alias Private Key: 7
2,814,762 UART: [art] Derive CDI
2,815,042 UART: [art] Store in in slot 0x4
2,900,215 UART: [art] Derive Key Pair
2,900,575 UART: [art] Store priv key in slot 0x5
2,913,861 UART: [art] Derive Key Pair - Done
2,928,363 UART: [art] Signing Cert with AUTHO
2,928,843 UART: RITY.KEYID = 7
2,944,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,024 UART: [art] PUB.X = 7279C24539C5A4715A0148CA6897AEB1D8748C6EA24C5FA1359C0A8B9AE201D9166D390BD27C04DAEBFF50831181A8D2
2,951,785 UART: [art] PUB.Y = E48B98263BEA46E0953DBDA44892D52F09DD994BD2DA36061B2C459DC278BC08BDCA23237B2025FFE6A7DE7412EA200B
2,958,737 UART: [art] SIG.R = 7E7BDF79A0675A85CDC4BE79D0D2B76F980FC0A53AF4C62885690E80709E2A927ACA9E160A054518C2AC32B04B47A7F3
2,965,505 UART: [art] SIG.S = 24AFA1ACDF37782ACEB06179277C863DE320A7976638ACD8D537A2FFF0DC7E6E3211A6A3DB69DEC95259857961F28E02
2,989,035 UART: Caliptra RT
2,989,288 UART: [state] CFI Enabled
3,096,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,537 UART: [rt]cmd =0x50435245, len=56
3,128,950 >>> mbox cmd response: failed
3,128,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,656 UART: [rt]cmd =0x50435245, len=56
3,160,217 >>> mbox cmd response: failed
3,160,217 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,923 UART: [rt]cmd =0x50435245, len=56
3,191,038 >>> mbox cmd response: failed
3,191,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,732 UART: [rt]cmd =0x50435245, len=56
3,222,133 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,174,804 ready_for_fw is high
1,174,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,517 UART: [ldev] SUBJECT.KEYID = 5
1,210,944 UART: [ldev] AUTHORITY.KEYID = 7
1,211,407 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,477 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,742 >>> mbox cmd response: success
2,773,742 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,949 UART: [afmc] ++
2,775,117 UART: [afmc] CDI.KEYID = 6
2,775,480 UART: [afmc] SUBJECT.KEYID = 7
2,775,906 UART: [afmc] AUTHORITY.KEYID = 5
2,811,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,308 UART: [afmc] --
2,855,352 UART: [cold-reset] --
2,856,278 UART: [state] Locking Datavault
2,857,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,887 UART: [state] Locking ICCM
2,858,537 UART: [exit] Launching FMC @ 0x40000130
2,863,866 UART:
2,863,882 UART: Running Caliptra FMC ...
2,864,290 UART:
2,864,433 UART: [state] CFI Enabled
2,875,066 UART: [fht] FMC Alias Private Key: 7
2,983,239 UART: [art] Extend RT PCRs Done
2,983,667 UART: [art] Lock RT PCRs Done
2,985,061 UART: [art] Populate DV Done
2,993,230 UART: [fht] FMC Alias Private Key: 7
2,994,212 UART: [art] Derive CDI
2,994,492 UART: [art] Store in in slot 0x4
3,080,585 UART: [art] Derive Key Pair
3,080,945 UART: [art] Store priv key in slot 0x5
3,093,787 UART: [art] Derive Key Pair - Done
3,108,595 UART: [art] Signing Cert with AUTHO
3,109,075 UART: RITY.KEYID = 7
3,124,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,808 UART: [art] PUB.X = FFAADC7A541C20F24570F6E8122FE2320E92228DBA24C82D89F4A2F88DE066C78F68BDA6A70F5F1F65641469F4FD6F26
3,131,584 UART: [art] PUB.Y = B2795EE03FB5C0EC16F96E7207D0AEE2AEB7AC972779AA7C6D5E7359259124E210F9024BFFA2886787DEE212852772E5
3,138,534 UART: [art] SIG.R = E4EF827B5E947E253572D7E0E7221F701515CE97356666ED0C7260BE86F74A7B99A4D5D59A9C1A60C5CC6B5CEECADF6B
3,145,315 UART: [art] SIG.S = 88562EF6291B63DF3CF8952E348C20EB808EDCC51D1305E0D8B0F5D6BE8BCF9869F95F1C533A9CB441DC87724C971CD4
3,169,269 UART: Caliptra RT
3,169,614 UART: [state] CFI Enabled
3,278,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,854 UART: [rt]cmd =0x50435245, len=56
3,310,399 >>> mbox cmd response: failed
3,310,399 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,061 UART: [rt]cmd =0x50435245, len=56
3,341,450 >>> mbox cmd response: failed
3,341,450 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,358 UART: [rt]cmd =0x50435245, len=56
3,372,665 >>> mbox cmd response: failed
3,372,665 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,519 UART: [rt]cmd =0x50435245, len=56
3,403,902 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,495 ready_for_fw is high
1,056,495 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,104 >>> mbox cmd response: success
2,623,104 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,684,676 UART:
2,684,692 UART: Running Caliptra FMC ...
2,685,100 UART:
2,685,243 UART: [state] CFI Enabled
2,696,440 UART: [fht] FMC Alias Private Key: 7
2,804,479 UART: [art] Extend RT PCRs Done
2,804,907 UART: [art] Lock RT PCRs Done
2,806,335 UART: [art] Populate DV Done
2,814,214 UART: [fht] FMC Alias Private Key: 7
2,815,324 UART: [art] Derive CDI
2,815,604 UART: [art] Store in in slot 0x4
2,901,215 UART: [art] Derive Key Pair
2,901,575 UART: [art] Store priv key in slot 0x5
2,915,099 UART: [art] Derive Key Pair - Done
2,929,948 UART: [art] Signing Cert with AUTHO
2,930,428 UART: RITY.KEYID = 7
2,945,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,903 UART: [art] PUB.X = D7E205A6EE6DCBAA608ED0A994C8D84923104EF746056EB687202855DF421534608ED4B8770B0450C310FE10A20311F6
2,952,656 UART: [art] PUB.Y = DB5008E9776A0BA24CFB5A728CB3409224F7F483CC109B550EB28D6FB1E68663DEDF1A2D283C538093479061ADDA7B0B
2,959,604 UART: [art] SIG.R = 9C3DE7904A03402A4070F64C2574FA30EDF0418860328E6EEDD068FEE6EF482EAFF30C750CC4F03E18F99DD9E16863EC
2,966,377 UART: [art] SIG.S = C4EC0120CA05458A2148ED090DB74A8D4BD0A4BFD108CE7110FF2F17F01323AFB949C9522FDCE34E68CCD65FAA2C10CD
2,989,991 UART: Caliptra RT
2,990,336 UART: [state] CFI Enabled
3,098,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,870 UART: [rt]cmd =0x50435245, len=56
3,131,093 >>> mbox cmd response: failed
3,131,093 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,985 UART: [rt]cmd =0x50435245, len=56
3,162,504 >>> mbox cmd response: failed
3,162,504 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,120 UART: [rt]cmd =0x50435245, len=56
3,193,449 >>> mbox cmd response: failed
3,193,449 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,097 UART: [rt]cmd =0x50435245, len=56
3,224,462 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,385 UART: [kat] SHA2-256
892,323 UART: [kat] SHA2-384
895,128 UART: [kat] SHA2-512-ACC
897,029 UART: [kat] ECC-384
902,842 UART: [kat] HMAC-384Kdf
907,310 UART: [kat] LMS
1,475,506 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 ready_for_fw is high
1,480,737 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,882 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,286 UART: [idev] --
1,514,155 UART: [ldev] ++
1,514,323 UART: [ldev] CDI.KEYID = 6
1,514,686 UART: [ldev] SUBJECT.KEYID = 5
1,515,112 UART: [ldev] AUTHORITY.KEYID = 7
1,515,575 UART: [ldev] FE.KEYID = 1
1,520,957 UART: [ldev] Erasing FE.KEYID = 1
1,545,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,458 UART: [ldev] --
1,584,873 UART: [fwproc] Waiting for Commands...
1,585,730 UART: [fwproc] Received command 0x46574c44
1,586,521 UART: [fwproc] Received Image of size 114332 bytes
2,884,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,976 >>> mbox cmd response: success
3,076,976 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,078,060 UART: [afmc] ++
3,078,228 UART: [afmc] CDI.KEYID = 6
3,078,590 UART: [afmc] SUBJECT.KEYID = 7
3,079,015 UART: [afmc] AUTHORITY.KEYID = 5
3,113,520 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,632 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,025 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,715 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,640 UART: [afmc] --
3,156,750 UART: [cold-reset] --
3,157,524 UART: [state] Locking Datavault
3,158,639 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,243 UART: [state] Locking ICCM
3,159,917 UART: [exit] Launching FMC @ 0x40000130
3,165,246 UART:
3,165,262 UART: Running Caliptra FMC ...
3,165,670 UART:
3,165,724 UART: [state] CFI Enabled
3,176,129 UART: [fht] FMC Alias Private Key: 7
3,284,038 UART: [art] Extend RT PCRs Done
3,284,466 UART: [art] Lock RT PCRs Done
3,285,778 UART: [art] Populate DV Done
3,294,063 UART: [fht] FMC Alias Private Key: 7
3,295,079 UART: [art] Derive CDI
3,295,359 UART: [art] Store in in slot 0x4
3,380,886 UART: [art] Derive Key Pair
3,381,246 UART: [art] Store priv key in slot 0x5
3,394,138 UART: [art] Derive Key Pair - Done
3,408,787 UART: [art] Signing Cert with AUTHO
3,409,267 UART: RITY.KEYID = 7
3,424,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,706 UART: [art] PUB.X = F2B1C4DB439E0733892DB9B85D87AB432DA0BA2BA9762E11848F73C9899457E29DD607B43582F77461995CFE93BD3968
3,432,470 UART: [art] PUB.Y = 9D3AF8D26A9A43B6ABCED45B4CC03B31A347D4BEE7A47E86C6173DAC6C53A00BDA15FDD261ED55DC0FF445090E7E5BA3
3,439,436 UART: [art] SIG.R = 9F3C3EF2559AB650721AE420C9A0ECD0D149F4403577C046519F4D56C6589E5F7A75398E84D1D3597F3CBB864B5448B4
3,446,206 UART: [art] SIG.S = 81D657679D557E10247FB81E2DE97DBFC636F347529B305F63F12FBBE4708638C0A18F426E8D86BE581141159EECD0C0
3,470,263 UART: Caliptra RT
3,470,516 UART: [state] CFI Enabled
3,578,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,372 UART: [rt]cmd =0x50435252, len=8
3,610,872 >>> mbox cmd response data (8 bytes)
3,610,873 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,306 UART: [rt]cmd =0x50435251, len=36
3,808,023 >>> mbox cmd response data (1848 bytes)
3,808,024 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,321 UART: [rt]cmd =0x43455246, len=4
3,849,650 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,729 ready_for_fw is high
1,362,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,776 >>> mbox cmd response: success
2,926,776 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,987,614 UART:
2,987,630 UART: Running Caliptra FMC ...
2,988,038 UART:
2,988,092 UART: [state] CFI Enabled
2,998,643 UART: [fht] FMC Alias Private Key: 7
3,107,170 UART: [art] Extend RT PCRs Done
3,107,598 UART: [art] Lock RT PCRs Done
3,109,180 UART: [art] Populate DV Done
3,117,183 UART: [fht] FMC Alias Private Key: 7
3,118,247 UART: [art] Derive CDI
3,118,527 UART: [art] Store in in slot 0x4
3,204,082 UART: [art] Derive Key Pair
3,204,442 UART: [art] Store priv key in slot 0x5
3,217,574 UART: [art] Derive Key Pair - Done
3,232,255 UART: [art] Signing Cert with AUTHO
3,232,735 UART: RITY.KEYID = 7
3,248,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,766 UART: [art] PUB.X = B2FA816D956323AA96CB238833D108F1661181C6EAA3034574EBB4A1E0CBDF94069E480262E459804125129A41CB6FF2
3,255,522 UART: [art] PUB.Y = 0A6F130F6EE65B46DBA2E631043BFB431750DE6133B1C1F607CD757FEB6BFF66F85039E39A947E95D44EBFCD7A6F30BF
3,262,478 UART: [art] SIG.R = CC528E1DD61A38A75299E82BE0CDB1C2016E1EAE8C5C69144D32103AB7144433F1FB5647E3C4608F5E629956D046B67B
3,269,249 UART: [art] SIG.S = 2694CBD7B45C6F8C5481DAEA30BE7CC6500994A9858A7336E1BC9E8EEBA4A74BA56BCA1458B7E5EEC864AF26DA53676A
3,293,213 UART: Caliptra RT
3,293,466 UART: [state] CFI Enabled
3,400,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,579 UART: [rt]cmd =0x50435252, len=8
3,432,873 >>> mbox cmd response data (8 bytes)
3,432,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,299 UART: [rt]cmd =0x50435251, len=36
3,629,678 >>> mbox cmd response data (1848 bytes)
3,629,679 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,024 UART: [rt]cmd =0x43455246, len=4
3,671,259 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,075 UART: [state] LifecycleState = Unprovisioned
86,730 UART: [state] DebugLocked = No
87,230 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,776 UART: [kat] SHA2-256
882,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,822 UART: [kat] ++
886,974 UART: [kat] sha1
891,158 UART: [kat] SHA2-256
893,096 UART: [kat] SHA2-384
895,841 UART: [kat] SHA2-512-ACC
897,742 UART: [kat] ECC-384
903,533 UART: [kat] HMAC-384Kdf
908,211 UART: [kat] LMS
1,476,407 UART: [kat] --
1,477,550 UART: [cold-reset] ++
1,478,118 UART: [fht] Storing FHT @ 0x50003400
1,480,953 UART: [idev] ++
1,481,121 UART: [idev] CDI.KEYID = 6
1,481,481 UART: [idev] SUBJECT.KEYID = 7
1,481,905 UART: [idev] UDS.KEYID = 0
1,482,250 ready_for_fw is high
1,482,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,761 UART: [idev] Erasing UDS.KEYID = 0
1,506,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,947 UART: [idev] --
1,516,094 UART: [ldev] ++
1,516,262 UART: [ldev] CDI.KEYID = 6
1,516,625 UART: [ldev] SUBJECT.KEYID = 5
1,517,051 UART: [ldev] AUTHORITY.KEYID = 7
1,517,514 UART: [ldev] FE.KEYID = 1
1,522,442 UART: [ldev] Erasing FE.KEYID = 1
1,547,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,145 UART: [ldev] --
1,587,502 UART: [fwproc] Waiting for Commands...
1,588,229 UART: [fwproc] Received command 0x46574c44
1,589,020 UART: [fwproc] Received Image of size 114332 bytes
2,885,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,375 >>> mbox cmd response: success
3,079,375 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,080,479 UART: [afmc] ++
3,080,647 UART: [afmc] CDI.KEYID = 6
3,081,009 UART: [afmc] SUBJECT.KEYID = 7
3,081,434 UART: [afmc] AUTHORITY.KEYID = 5
3,116,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,402 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,092 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,049 UART: [afmc] --
3,159,933 UART: [cold-reset] --
3,160,909 UART: [state] Locking Datavault
3,162,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,886 UART: [state] Locking ICCM
3,163,530 UART: [exit] Launching FMC @ 0x40000130
3,168,859 UART:
3,168,875 UART: Running Caliptra FMC ...
3,169,283 UART:
3,169,426 UART: [state] CFI Enabled
3,179,909 UART: [fht] FMC Alias Private Key: 7
3,287,374 UART: [art] Extend RT PCRs Done
3,287,802 UART: [art] Lock RT PCRs Done
3,289,110 UART: [art] Populate DV Done
3,297,393 UART: [fht] FMC Alias Private Key: 7
3,298,523 UART: [art] Derive CDI
3,298,803 UART: [art] Store in in slot 0x4
3,384,446 UART: [art] Derive Key Pair
3,384,806 UART: [art] Store priv key in slot 0x5
3,397,848 UART: [art] Derive Key Pair - Done
3,412,726 UART: [art] Signing Cert with AUTHO
3,413,206 UART: RITY.KEYID = 7
3,428,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,155 UART: [art] PUB.X = 3ADB44030FA1DD622C5E15CC184361B1FFBF1A8E78B11BD05B16C31729C0494D3BF8521C5166650272C24B42FF6FA2C9
3,435,924 UART: [art] PUB.Y = 5ABA16AD5CE4CF93D4726045DD8C5483C34B6F29660FA9C2DB25B38613F424B537C273AEDCF6285A8B0C8443B9F33C9A
3,442,880 UART: [art] SIG.R = 313E07831232F888073DBE0AF8CCC2AA0E3FE51EFDAA80E31CFB67F1637BD7C23A7C0B38A2C35A56F09543F70CEB41BD
3,449,652 UART: [art] SIG.S = 53FDD23C8521C8021E49AE9141FC97949B7DC7C5E88E0118EB29F31BB36D8F78B0986A14EFC34651FE8A00C04F6FAE26
3,473,363 UART: Caliptra RT
3,473,708 UART: [state] CFI Enabled
3,582,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,546 UART: [rt]cmd =0x50435252, len=8
3,614,160 >>> mbox cmd response data (8 bytes)
3,614,161 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,840 UART: [rt]cmd =0x50435251, len=36
3,811,315 >>> mbox cmd response data (1848 bytes)
3,811,316 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,589 UART: [rt]cmd =0x43455246, len=4
3,853,008 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,442 ready_for_fw is high
1,362,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,557 >>> mbox cmd response: success
2,927,557 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,989,227 UART:
2,989,243 UART: Running Caliptra FMC ...
2,989,651 UART:
2,989,794 UART: [state] CFI Enabled
3,000,421 UART: [fht] FMC Alias Private Key: 7
3,108,050 UART: [art] Extend RT PCRs Done
3,108,478 UART: [art] Lock RT PCRs Done
3,109,652 UART: [art] Populate DV Done
3,117,581 UART: [fht] FMC Alias Private Key: 7
3,118,541 UART: [art] Derive CDI
3,118,821 UART: [art] Store in in slot 0x4
3,204,554 UART: [art] Derive Key Pair
3,204,914 UART: [art] Store priv key in slot 0x5
3,218,176 UART: [art] Derive Key Pair - Done
3,232,821 UART: [art] Signing Cert with AUTHO
3,233,301 UART: RITY.KEYID = 7
3,248,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,656 UART: [art] PUB.X = 8776C74FEE7E8830A03CDD218CB39E65A6BC654AC2DE0C0149B0881B7269FD7FFB18A6F59C7A2CCE90FF27A752B3BCDF
3,256,442 UART: [art] PUB.Y = FD582E7C9A90744121686B929095AF47F51AA2CE3C75449817386EC60A06260566DDCDF5A81BE3485BA8CF13626B07BF
3,263,382 UART: [art] SIG.R = B3E011901D3E2CE6B8855E0B33C7AD4582124D7D89B42A0A5B0928B2A98DACBBD34FBFDED8A1EF76D56C6973AB273C48
3,270,161 UART: [art] SIG.S = 6186060D101AE7474FDBE6FF364ABC1FBF363AA4A11D9C99A457DD1593C08B1816CA4A655BFAF0EA7637034248E57906
3,293,996 UART: Caliptra RT
3,294,341 UART: [state] CFI Enabled
3,403,214 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,638 UART: [rt]cmd =0x50435252, len=8
3,435,408 >>> mbox cmd response data (8 bytes)
3,435,409 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,824 UART: [rt]cmd =0x50435251, len=36
3,632,243 >>> mbox cmd response data (1848 bytes)
3,632,244 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,731 UART: [rt]cmd =0x43455246, len=4
3,674,042 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,532 UART: [kat] LMS
1,170,860 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,271 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 ready_for_fw is high
1,176,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,410 UART: [idev] Erasing UDS.KEYID = 0
1,201,227 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,875 UART: [ldev] ++
1,211,043 UART: [ldev] CDI.KEYID = 6
1,211,406 UART: [ldev] SUBJECT.KEYID = 5
1,211,832 UART: [ldev] AUTHORITY.KEYID = 7
1,212,295 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,085 UART: [ldev] --
1,283,408 UART: [fwproc] Wait for Commands...
1,284,224 UART: [fwproc] Recv command 0x46574c44
1,284,952 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,135 >>> mbox cmd response: success
2,775,135 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,776,211 UART: [afmc] ++
2,776,379 UART: [afmc] CDI.KEYID = 6
2,776,741 UART: [afmc] SUBJECT.KEYID = 7
2,777,166 UART: [afmc] AUTHORITY.KEYID = 5
2,812,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,019 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,738 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,712 UART: [afmc] --
2,855,776 UART: [cold-reset] --
2,856,762 UART: [state] Locking Datavault
2,857,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,579 UART: [state] Locking ICCM
2,859,145 UART: [exit] Launching FMC @ 0x40000130
2,864,474 UART:
2,864,490 UART: Running Caliptra FMC ...
2,864,898 UART:
2,864,952 UART: [state] CFI Enabled
2,875,479 UART: [fht] FMC Alias Private Key: 7
2,983,116 UART: [art] Extend RT PCRs Done
2,983,544 UART: [art] Lock RT PCRs Done
2,984,900 UART: [art] Populate DV Done
2,993,387 UART: [fht] FMC Alias Private Key: 7
2,994,473 UART: [art] Derive CDI
2,994,753 UART: [art] Store in in slot 0x4
3,080,296 UART: [art] Derive Key Pair
3,080,656 UART: [art] Store priv key in slot 0x5
3,094,076 UART: [art] Derive Key Pair - Done
3,108,532 UART: [art] Signing Cert with AUTHO
3,109,012 UART: RITY.KEYID = 7
3,124,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,993 UART: [art] PUB.X = 84F75861AA01AA53935A4F7F6F864841D40231AFC36FF71E0FD5A40FC4FDA595E21C09FEE9A2BD346F79D48B05D23BA9
3,131,759 UART: [art] PUB.Y = 85F72C897D9F148062C103AA1B92A4D5EFD469072B2B3E2CEB9365D6828507787F412F4E6217136FCC8DAEB7D8680D63
3,138,699 UART: [art] SIG.R = 67EC2F524FC5E02A9A65A23C4EB0FA2AF0230654BEDD4F7D659F2C363D1EE8A27206B29CB4D2DBD219552D87AE5FDE8F
3,145,485 UART: [art] SIG.S = B3D7F3F902FA70313F002504C03496F1E33D0B4E77EE9A61D74A77F3B3B2379D1F17AD0C2757B7B4E0AF666B8ED89DF6
3,169,220 UART: Caliptra RT
3,169,473 UART: [state] CFI Enabled
3,276,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,192 UART: [rt]cmd =0x50435252, len=8
3,308,712 >>> mbox cmd response data (8 bytes)
3,308,713 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,498 UART: [rt]cmd =0x50435251, len=36
3,505,947 >>> mbox cmd response data (1848 bytes)
3,505,948 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,461 UART: [rt]cmd =0x43455246, len=4
3,547,702 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,877 ready_for_fw is high
1,060,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,890 >>> mbox cmd response: success
2,626,890 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,689,080 UART:
2,689,096 UART: Running Caliptra FMC ...
2,689,504 UART:
2,689,558 UART: [state] CFI Enabled
2,699,757 UART: [fht] FMC Alias Private Key: 7
2,807,516 UART: [art] Extend RT PCRs Done
2,807,944 UART: [art] Lock RT PCRs Done
2,809,814 UART: [art] Populate DV Done
2,818,085 UART: [fht] FMC Alias Private Key: 7
2,819,023 UART: [art] Derive CDI
2,819,303 UART: [art] Store in in slot 0x4
2,904,818 UART: [art] Derive Key Pair
2,905,178 UART: [art] Store priv key in slot 0x5
2,918,480 UART: [art] Derive Key Pair - Done
2,933,539 UART: [art] Signing Cert with AUTHO
2,934,019 UART: RITY.KEYID = 7
2,949,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,146 UART: [art] PUB.X = 85D4A5DEE119339BDED0FE7BDB39FB6B643F1C951A9F6921A65806071AFD0F05EAED789F56276F8FF17A2BACE7872458
2,956,920 UART: [art] PUB.Y = 4F840F7781B4C2C1920BFB919BBF3AB6850158645CCEBB04D223C631A6ECE59E5DFAF40ACC1E4541E3E48AAFDE8CEC96
2,963,879 UART: [art] SIG.R = 355D3A2B750B8DD8BCF246FF368B4F78CB75577DB801CD0B583C3831BC96D402145F27454931BACA584F5DAEB3F49E70
2,970,647 UART: [art] SIG.S = C44B9F7F80196A47394C9E90A81758C34728C960CC5F4BAC9D60663812C90205DBB4E423B0DF07CE46AC8DC98748DD3F
2,994,323 UART: Caliptra RT
2,994,576 UART: [state] CFI Enabled
3,103,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,215 UART: [rt]cmd =0x50435252, len=8
3,134,721 >>> mbox cmd response data (8 bytes)
3,134,722 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,153 UART: [rt]cmd =0x50435251, len=36
3,331,320 >>> mbox cmd response data (1848 bytes)
3,331,321 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,954 UART: [rt]cmd =0x43455246, len=4
3,372,933 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
901,990 UART: [kat] SHA2-256
903,930 UART: [kat] SHA2-384
906,569 UART: [kat] SHA2-512-ACC
908,470 UART: [kat] ECC-384
918,661 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,974 UART: [fht] FHT @ 0x50003400
1,175,525 UART: [idev] ++
1,175,693 UART: [idev] CDI.KEYID = 6
1,176,053 UART: [idev] SUBJECT.KEYID = 7
1,176,477 UART: [idev] UDS.KEYID = 0
1,176,822 ready_for_fw is high
1,176,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,201,444 UART: [idev] Sha1 KeyId Algorithm
1,209,726 UART: [idev] --
1,210,738 UART: [ldev] ++
1,210,906 UART: [ldev] CDI.KEYID = 6
1,211,269 UART: [ldev] SUBJECT.KEYID = 5
1,211,695 UART: [ldev] AUTHORITY.KEYID = 7
1,212,158 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,243,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,446 UART: [ldev] --
1,282,857 UART: [fwproc] Wait for Commands...
1,283,567 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,626 >>> mbox cmd response: success
2,773,626 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,820 UART: [afmc] ++
2,774,988 UART: [afmc] CDI.KEYID = 6
2,775,350 UART: [afmc] SUBJECT.KEYID = 7
2,775,775 UART: [afmc] AUTHORITY.KEYID = 5
2,810,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,099 UART: [afmc] --
2,854,211 UART: [cold-reset] --
2,855,173 UART: [state] Locking Datavault
2,856,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,912 UART: [state] Locking ICCM
2,857,566 UART: [exit] Launching FMC @ 0x40000130
2,862,895 UART:
2,862,911 UART: Running Caliptra FMC ...
2,863,319 UART:
2,863,462 UART: [state] CFI Enabled
2,874,133 UART: [fht] FMC Alias Private Key: 7
2,982,696 UART: [art] Extend RT PCRs Done
2,983,124 UART: [art] Lock RT PCRs Done
2,984,590 UART: [art] Populate DV Done
2,992,927 UART: [fht] FMC Alias Private Key: 7
2,993,921 UART: [art] Derive CDI
2,994,201 UART: [art] Store in in slot 0x4
3,079,954 UART: [art] Derive Key Pair
3,080,314 UART: [art] Store priv key in slot 0x5
3,094,062 UART: [art] Derive Key Pair - Done
3,108,911 UART: [art] Signing Cert with AUTHO
3,109,391 UART: RITY.KEYID = 7
3,124,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,370 UART: [art] PUB.X = F2F15B2480EF7885061C3690188D4F8401C8296F9AA5C8F9D76744A9A15C1B6D1EEEF638A7694F4D77D6F47889C3B3C0
3,132,136 UART: [art] PUB.Y = 035905F1A2C116BD0083A241465A79B82179358EECF4FDCD76F5818AAD0F372770AB35FF6A7C74841A61B964C8C9DF09
3,139,056 UART: [art] SIG.R = 668AB7839C9268E81CCC287202DC2B35CE699189EC2ADCEC9620E3475F21CD8F0F374B6AA8F183EFDE10B04D0AC45931
3,145,829 UART: [art] SIG.S = 2AFFF8C9606E2056E68B09809FC8D226CE218CBFEAD4D028D54F7FCBFD5E72F9BF710C81F751554DD590835ACE70282E
3,169,822 UART: Caliptra RT
3,170,167 UART: [state] CFI Enabled
3,277,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,646 UART: [rt]cmd =0x50435252, len=8
3,309,294 >>> mbox cmd response data (8 bytes)
3,309,295 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,898 UART: [rt]cmd =0x50435251, len=36
3,506,407 >>> mbox cmd response data (1848 bytes)
3,506,408 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,545 UART: [rt]cmd =0x43455246, len=4
3,547,516 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 ready_for_fw is high
1,060,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,113 >>> mbox cmd response: success
2,628,113 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,690,311 UART:
2,690,327 UART: Running Caliptra FMC ...
2,690,735 UART:
2,690,878 UART: [state] CFI Enabled
2,701,645 UART: [fht] FMC Alias Private Key: 7
2,809,688 UART: [art] Extend RT PCRs Done
2,810,116 UART: [art] Lock RT PCRs Done
2,811,618 UART: [art] Populate DV Done
2,819,919 UART: [fht] FMC Alias Private Key: 7
2,820,959 UART: [art] Derive CDI
2,821,239 UART: [art] Store in in slot 0x4
2,907,100 UART: [art] Derive Key Pair
2,907,460 UART: [art] Store priv key in slot 0x5
2,920,606 UART: [art] Derive Key Pair - Done
2,935,610 UART: [art] Signing Cert with AUTHO
2,936,090 UART: RITY.KEYID = 7
2,951,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,097 UART: [art] PUB.X = 6950C5E267ED71A99EE6A59D751B65EF94849D2734D071B2276705C93DA1DFCB41EF9E8C7269201B93EE40AB47AEBFAB
2,958,876 UART: [art] PUB.Y = C1321AF938199CA27BACACA3C14E604960FA3066BE4805548099B0200711EA865C0226333762276BD35EFAE7DF52D6DC
2,965,819 UART: [art] SIG.R = 0269284B178C6707BBA177A0E311E29A7A081BBB0D71DF724BD26BE844708B329FDCDDDC4196A1D33DF9EE97E24167C1
2,972,587 UART: [art] SIG.S = A6A6EC40481228AF0351CD331BEB0A2DFD07A9E6AE5C15E684BCDBD29FA5471ECCB09EF1728F9CBE6CB35FF27F92405B
2,996,345 UART: Caliptra RT
2,996,690 UART: [state] CFI Enabled
3,104,599 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,193 UART: [rt]cmd =0x50435252, len=8
3,136,717 >>> mbox cmd response data (8 bytes)
3,136,718 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,331 UART: [rt]cmd =0x50435251, len=36
3,333,654 >>> mbox cmd response data (1848 bytes)
3,333,655 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,226 UART: [rt]cmd =0x43455246, len=4
3,375,255 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,174,407 ready_for_fw is high
1,174,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,199,491 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,602 UART: [ldev] ++
1,209,770 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,216,094 UART: [ldev] Erasing FE.KEYID = 1
1,242,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,854 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,282,129 UART: [fwproc] Recv command 0x46574c44
1,282,862 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,915 >>> mbox cmd response: success
2,772,915 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,773,980 UART: [afmc] ++
2,774,148 UART: [afmc] CDI.KEYID = 6
2,774,511 UART: [afmc] SUBJECT.KEYID = 7
2,774,937 UART: [afmc] AUTHORITY.KEYID = 5
2,810,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,957 UART: [afmc] --
2,853,895 UART: [cold-reset] --
2,854,803 UART: [state] Locking Datavault
2,855,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,582 UART: [state] Locking ICCM
2,857,216 UART: [exit] Launching FMC @ 0x40000130
2,862,545 UART:
2,862,561 UART: Running Caliptra FMC ...
2,862,969 UART:
2,863,023 UART: [state] CFI Enabled
2,873,548 UART: [fht] FMC Alias Private Key: 7
2,981,671 UART: [art] Extend RT PCRs Done
2,982,099 UART: [art] Lock RT PCRs Done
2,983,709 UART: [art] Populate DV Done
2,991,982 UART: [fht] FMC Alias Private Key: 7
2,993,026 UART: [art] Derive CDI
2,993,306 UART: [art] Store in in slot 0x4
3,079,153 UART: [art] Derive Key Pair
3,079,513 UART: [art] Store priv key in slot 0x5
3,092,405 UART: [art] Derive Key Pair - Done
3,107,222 UART: [art] Signing Cert with AUTHO
3,107,702 UART: RITY.KEYID = 7
3,122,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,279 UART: [art] PUB.X = 50773A4A5DBF4F36B00D3DF9B58E793B907ADCD2C9A66C7FA0AACB64233C3FBC71E742B02353AC11FEC87D1CF7A7C366
3,130,068 UART: [art] PUB.Y = 2F15486B1ED2FDAC07B51B266BE83441BA09F6D174124198D64B6071DFB4E7D47BAC65250DEB20303776F2786347D29C
3,137,011 UART: [art] SIG.R = 79063DE14376F3AC30E7104503D3B740E2F533DC9877850D3A65977EC9DAF031DD66F5F04B1202E1FF188B51371A0A8C
3,143,766 UART: [art] SIG.S = 31BCB2DD2F9D8A7997DD4730D65F092DB76DB84B2DBFCCCFC98A2D9D820210548D7F82DC43C672B343930281D57500EE
3,167,430 UART: Caliptra RT
3,167,683 UART: [state] CFI Enabled
3,275,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,214 UART: [rt]cmd =0x50435252, len=8
3,307,540 >>> mbox cmd response data (8 bytes)
3,307,541 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,158 UART: [rt]cmd =0x50435251, len=36
3,504,471 >>> mbox cmd response data (1848 bytes)
3,504,472 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,725 UART: [rt]cmd =0x43455246, len=4
3,545,882 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,328 ready_for_fw is high
1,056,328 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,105 >>> mbox cmd response: success
2,622,105 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,683,851 UART:
2,683,867 UART: Running Caliptra FMC ...
2,684,275 UART:
2,684,329 UART: [state] CFI Enabled
2,694,668 UART: [fht] FMC Alias Private Key: 7
2,802,857 UART: [art] Extend RT PCRs Done
2,803,285 UART: [art] Lock RT PCRs Done
2,804,445 UART: [art] Populate DV Done
2,812,794 UART: [fht] FMC Alias Private Key: 7
2,813,768 UART: [art] Derive CDI
2,814,048 UART: [art] Store in in slot 0x4
2,899,179 UART: [art] Derive Key Pair
2,899,539 UART: [art] Store priv key in slot 0x5
2,912,949 UART: [art] Derive Key Pair - Done
2,927,750 UART: [art] Signing Cert with AUTHO
2,928,230 UART: RITY.KEYID = 7
2,943,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,971 UART: [art] PUB.X = 9954152ED5EA2AF9BF2483B0EDE7CC5BA1C54E760CF1189B88EF480F66C96A45C867EA97CC8A150D742DD8E3330D079A
2,950,740 UART: [art] PUB.Y = 9A11BD45B68CE9C079660897D35891D96E99C4BC5D7E932E92D686D80146E0A388193363230D3C4C7C6DE3BD586534FD
2,957,679 UART: [art] SIG.R = 94241A4678A8626D8B3CD852FB8F7BBAE14EC9F0EBE35C3D541ABAD5250743413E9B30A5B73CBEB8BBFCF06CB8B40293
2,964,463 UART: [art] SIG.S = D0751F920C23E79D044C716067B1D21FF68CFD85F5F147339067B49086FB7F75386D4DBF608712EF632668C393F6D509
2,988,361 UART: Caliptra RT
2,988,614 UART: [state] CFI Enabled
3,096,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,416 UART: [rt]cmd =0x50435252, len=8
3,128,772 >>> mbox cmd response data (8 bytes)
3,128,773 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,178 UART: [rt]cmd =0x50435251, len=36
3,325,619 >>> mbox cmd response data (1848 bytes)
3,325,620 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,845 UART: [rt]cmd =0x43455246, len=4
3,366,868 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,757 UART: [state] LifecycleState = Unprovisioned
85,412 UART: [state] DebugLocked = No
85,982 UART: [state] WD Timer not started. Device not locked for debugging
87,197 UART: [kat] SHA2-256
890,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,876 UART: [kat] ++
895,028 UART: [kat] sha1
899,292 UART: [kat] SHA2-256
901,232 UART: [kat] SHA2-384
903,837 UART: [kat] SHA2-512-ACC
905,738 UART: [kat] ECC-384
915,587 UART: [kat] HMAC-384Kdf
920,179 UART: [kat] LMS
1,168,491 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,174,142 ready_for_fw is high
1,174,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,198,800 UART: [idev] Sha1 KeyId Algorithm
1,207,730 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,511 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,157 UART: [ldev] --
1,281,583 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,212 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,008 >>> mbox cmd response: success
2,774,008 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,775,239 UART: [afmc] ++
2,775,407 UART: [afmc] CDI.KEYID = 6
2,775,770 UART: [afmc] SUBJECT.KEYID = 7
2,776,196 UART: [afmc] AUTHORITY.KEYID = 5
2,811,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,294 UART: [afmc] --
2,855,298 UART: [cold-reset] --
2,856,130 UART: [state] Locking Datavault
2,857,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,755 UART: [state] Locking ICCM
2,858,277 UART: [exit] Launching FMC @ 0x40000130
2,863,606 UART:
2,863,622 UART: Running Caliptra FMC ...
2,864,030 UART:
2,864,173 UART: [state] CFI Enabled
2,874,714 UART: [fht] FMC Alias Private Key: 7
2,982,241 UART: [art] Extend RT PCRs Done
2,982,669 UART: [art] Lock RT PCRs Done
2,984,081 UART: [art] Populate DV Done
2,991,986 UART: [fht] FMC Alias Private Key: 7
2,993,162 UART: [art] Derive CDI
2,993,442 UART: [art] Store in in slot 0x4
3,078,973 UART: [art] Derive Key Pair
3,079,333 UART: [art] Store priv key in slot 0x5
3,092,559 UART: [art] Derive Key Pair - Done
3,107,169 UART: [art] Signing Cert with AUTHO
3,107,649 UART: RITY.KEYID = 7
3,122,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,346 UART: [art] PUB.X = 0A5194792A0D38A0177E4A4437BAB6EA01D61BC934A0790FEC51C8C52F21F645480087235FEF21BB13768DAC5FB07A79
3,130,086 UART: [art] PUB.Y = CF5FD42466357F1EB7DF725A27300F69DFFBADE5C5714056D59F3C6FD58F2AFE5914DF3693D7C5EC0F79485443BF4CC0
3,137,046 UART: [art] SIG.R = 80BB27E15701B413A3194C59BA9015F35DA14C3FC67F6E741CDF03F351764927421D3D5F475672159E0CC796AEF82742
3,143,803 UART: [art] SIG.S = DDE462D3C294151A6AAC7FA9CF9EDA613C514DEFCB231F6D9B97F67038C608EFE5878DB0A6B420770CD99D04128836A0
3,167,321 UART: Caliptra RT
3,167,666 UART: [state] CFI Enabled
3,275,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,764 UART: [rt]cmd =0x50435252, len=8
3,307,458 >>> mbox cmd response data (8 bytes)
3,307,459 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,868 UART: [rt]cmd =0x50435251, len=36
3,504,367 >>> mbox cmd response data (1848 bytes)
3,504,368 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,587 UART: [rt]cmd =0x43455246, len=4
3,545,598 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,917 ready_for_fw is high
1,056,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,346 >>> mbox cmd response: success
2,622,346 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,685,126 UART:
2,685,142 UART: Running Caliptra FMC ...
2,685,550 UART:
2,685,693 UART: [state] CFI Enabled
2,696,352 UART: [fht] FMC Alias Private Key: 7
2,804,619 UART: [art] Extend RT PCRs Done
2,805,047 UART: [art] Lock RT PCRs Done
2,806,679 UART: [art] Populate DV Done
2,815,056 UART: [fht] FMC Alias Private Key: 7
2,816,234 UART: [art] Derive CDI
2,816,514 UART: [art] Store in in slot 0x4
2,902,505 UART: [art] Derive Key Pair
2,902,865 UART: [art] Store priv key in slot 0x5
2,916,369 UART: [art] Derive Key Pair - Done
2,931,143 UART: [art] Signing Cert with AUTHO
2,931,623 UART: RITY.KEYID = 7
2,946,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,354 UART: [art] PUB.X = 5063A702A72871DEDC48BD449A962BC08F5E4CEB7D608C56FB98035D6C8BB1DD197F3FEAA5C1EDD51B677CE68FD9F3F2
2,954,140 UART: [art] PUB.Y = 7D036759FEBCF9A7D08970A5A295D5D4CF58B6E47734A1F8397C905071A5CDD3319BBD7B0C8241F4C4CF8577B50B6CA1
2,961,091 UART: [art] SIG.R = F07A4FECDB6500B6C5CBB26C9DF83BC2329746DE0B64B3CBE0CA81A0DCDACCCEE86E1390101D22AE933CFE2D68907DC6
2,967,866 UART: [art] SIG.S = 158133B382C8C2F37F1D75ACD7853DEF16C87C8FEF1FB82CF53B3367FFFF8A0EE23EBB0852950CB281BD0DF406B9FFB6
2,992,374 UART: Caliptra RT
2,992,719 UART: [state] CFI Enabled
3,100,932 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,508 UART: [rt]cmd =0x50435252, len=8
3,133,282 >>> mbox cmd response data (8 bytes)
3,133,283 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,580 UART: [rt]cmd =0x50435251, len=36
3,329,797 >>> mbox cmd response data (1848 bytes)
3,329,798 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,099 UART: [rt]cmd =0x43455246, len=4
3,371,266 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,155 UART: [kat] SHA2-256
892,093 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,696 UART: [idev] ++
1,479,864 UART: [idev] CDI.KEYID = 6
1,480,224 UART: [idev] SUBJECT.KEYID = 7
1,480,648 UART: [idev] UDS.KEYID = 0
1,480,993 ready_for_fw is high
1,480,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,544 UART: [idev] Erasing UDS.KEYID = 0
1,505,110 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,873 UART: [ldev] Erasing FE.KEYID = 1
1,547,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,580 UART: [ldev] --
1,587,087 UART: [fwproc] Waiting for Commands...
1,587,772 UART: [fwproc] Received command 0x46574c44
1,588,563 UART: [fwproc] Received Image of size 114332 bytes
2,886,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,388 >>> mbox cmd response: success
3,079,412 UART: [afmc] ++
3,079,580 UART: [afmc] CDI.KEYID = 6
3,079,942 UART: [afmc] SUBJECT.KEYID = 7
3,080,367 UART: [afmc] AUTHORITY.KEYID = 5
3,115,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,848 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,356 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,241 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,931 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,846 UART: [afmc] --
3,158,854 UART: [cold-reset] --
3,159,648 UART: [state] Locking Datavault
3,160,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,387 UART: [state] Locking ICCM
3,161,945 UART: [exit] Launching FMC @ 0x40000130
3,167,274 UART:
3,167,290 UART: Running Caliptra FMC ...
3,167,698 UART:
3,167,752 UART: [state] CFI Enabled
3,178,437 UART: [fht] FMC Alias Private Key: 7
3,285,968 UART: [art] Extend RT PCRs Done
3,286,396 UART: [art] Lock RT PCRs Done
3,287,880 UART: [art] Populate DV Done
3,296,229 UART: [fht] FMC Alias Private Key: 7
3,297,389 UART: [art] Derive CDI
3,297,669 UART: [art] Store in in slot 0x4
3,383,208 UART: [art] Derive Key Pair
3,383,568 UART: [art] Store priv key in slot 0x5
3,396,464 UART: [art] Derive Key Pair - Done
3,411,255 UART: [art] Signing Cert with AUTHO
3,411,735 UART: RITY.KEYID = 7
3,427,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,770 UART: [art] PUB.X = 9146863698F2111EBE32A5F147E623D0DFF4951DC15109974075367AA03A254D0B94F8EAE73AB5DF49A830AD2383B73D
3,434,534 UART: [art] PUB.Y = D9CB128F5A9A82E64425D4557F06D76F0F9E86B1FC0B9B07510DC50772CBFCCCCA4696F1D2292F6E625F5B8865C82877
3,441,474 UART: [art] SIG.R = CF49691D571E49E64CEFA6BC27CEF37F648F7D55C59968A922C778E38ED6D673B274FBB401205962A1746E6953E65FC5
3,448,245 UART: [art] SIG.S = B0C0AB9764F3047B6EB9930A9E0D2F66E43133C5A3B86CF2E3809E7925CF3294B7DF6326E35ECEC5F25F7F2AA71EAE6D
3,471,769 UART: Caliptra RT
3,472,022 UART: [state] CFI Enabled
3,578,286 UART: [rt] RT listening for mailbox commands...
3,578,956 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,986 UART: [rt]cmd =0x44504543, len=28
3,651,922 >>> mbox cmd response data (2076 bytes)
3,651,923 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,312 UART: [rt]cmd =0x44504543, len=28
3,722,328 >>> mbox cmd response data (2076 bytes)
3,722,329 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,120 UART: [rt]cmd =0x49444550, len=352
3,764,879 >>> mbox cmd response data (8 bytes)
3,764,880 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,459 UART: [rt]cmd =0x44504543, len=28
3,837,925 >>> mbox cmd response data (2076 bytes)
3,837,926 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,553 UART: [rt]cmd =0x44504543, len=28
3,909,137 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,151 ready_for_fw is high
1,362,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,530 >>> mbox cmd response: success
2,988,574 UART:
2,988,590 UART: Running Caliptra FMC ...
2,988,998 UART:
2,989,052 UART: [state] CFI Enabled
2,999,581 UART: [fht] FMC Alias Private Key: 7
3,107,492 UART: [art] Extend RT PCRs Done
3,107,920 UART: [art] Lock RT PCRs Done
3,109,576 UART: [art] Populate DV Done
3,117,949 UART: [fht] FMC Alias Private Key: 7
3,118,893 UART: [art] Derive CDI
3,119,173 UART: [art] Store in in slot 0x4
3,204,756 UART: [art] Derive Key Pair
3,205,116 UART: [art] Store priv key in slot 0x5
3,218,070 UART: [art] Derive Key Pair - Done
3,233,336 UART: [art] Signing Cert with AUTHO
3,233,816 UART: RITY.KEYID = 7
3,249,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,865 UART: [art] PUB.X = 1DA383C6DD25277C817C4DFD66372F01C04EDC6AD23628795E69435AFFFD7CB679F9935E26F2346B0838C8A36A673326
3,256,631 UART: [art] PUB.Y = 5FE99FB239E104A540E72815C9D2D3A35A929488B38F5108856557ABB6F87ABA61A7EABDF149CD5D33B1B40B3FB2682B
3,263,582 UART: [art] SIG.R = 61A9224AAAA5FFC9CFCF313B06D67F64132F4C7B6443283D85B6CDF46670FC133CCD4B9841958448215430732BA1A3E2
3,270,353 UART: [art] SIG.S = C316E8952173331BFFC33ED04B520FE013539EAC11A7F9F42CADA0BE1581BA666E9D70A978D800F1C35EA2D5502B0673
3,293,890 UART: Caliptra RT
3,294,143 UART: [state] CFI Enabled
3,402,908 UART: [rt] RT listening for mailbox commands...
3,403,578 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,488 UART: [rt]cmd =0x44504543, len=28
3,476,692 >>> mbox cmd response data (2076 bytes)
3,476,693 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,984 UART: [rt]cmd =0x44504543, len=28
3,546,967 >>> mbox cmd response data (2076 bytes)
3,546,968 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,350 UART: [rt]cmd =0x49444550, len=353
3,591,472 >>> mbox cmd response data (8 bytes)
3,591,473 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,000 UART: [rt]cmd =0x44504543, len=28
3,664,138 >>> mbox cmd response data (2076 bytes)
3,664,139 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,610 UART: [rt]cmd =0x44504543, len=28
3,735,058 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,794 UART: [kat] SHA2-256
892,732 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,104 UART: [fht] Storing FHT @ 0x50003400
1,479,827 UART: [idev] ++
1,479,995 UART: [idev] CDI.KEYID = 6
1,480,355 UART: [idev] SUBJECT.KEYID = 7
1,480,779 UART: [idev] UDS.KEYID = 0
1,481,124 ready_for_fw is high
1,481,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,833 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,461 UART: [idev] --
1,515,556 UART: [ldev] ++
1,515,724 UART: [ldev] CDI.KEYID = 6
1,516,087 UART: [ldev] SUBJECT.KEYID = 5
1,516,513 UART: [ldev] AUTHORITY.KEYID = 7
1,516,976 UART: [ldev] FE.KEYID = 1
1,522,354 UART: [ldev] Erasing FE.KEYID = 1
1,547,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,697 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,965 UART: [fwproc] Received command 0x46574c44
1,588,756 UART: [fwproc] Received Image of size 114332 bytes
2,886,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,497 >>> mbox cmd response: success
3,079,711 UART: [afmc] ++
3,079,879 UART: [afmc] CDI.KEYID = 6
3,080,241 UART: [afmc] SUBJECT.KEYID = 7
3,080,666 UART: [afmc] AUTHORITY.KEYID = 5
3,115,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,143 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,923 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,651 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,536 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,226 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,005 UART: [afmc] --
3,159,115 UART: [cold-reset] --
3,159,847 UART: [state] Locking Datavault
3,160,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,586 UART: [state] Locking ICCM
3,162,200 UART: [exit] Launching FMC @ 0x40000130
3,167,529 UART:
3,167,545 UART: Running Caliptra FMC ...
3,167,953 UART:
3,168,096 UART: [state] CFI Enabled
3,178,541 UART: [fht] FMC Alias Private Key: 7
3,286,322 UART: [art] Extend RT PCRs Done
3,286,750 UART: [art] Lock RT PCRs Done
3,287,932 UART: [art] Populate DV Done
3,296,193 UART: [fht] FMC Alias Private Key: 7
3,297,237 UART: [art] Derive CDI
3,297,517 UART: [art] Store in in slot 0x4
3,383,402 UART: [art] Derive Key Pair
3,383,762 UART: [art] Store priv key in slot 0x5
3,396,828 UART: [art] Derive Key Pair - Done
3,411,876 UART: [art] Signing Cert with AUTHO
3,412,356 UART: RITY.KEYID = 7
3,427,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,287 UART: [art] PUB.X = 86137975C8BB7520BC248AF86990006C77E8864B9177DBE9B7681EB741292B97315B857BE5722CE16536FCF65FD19EAA
3,435,033 UART: [art] PUB.Y = 3321E4506ABCE2EAF745BF27A14F643F074DDEE0356E3BC727618C04896E35F00C4BBFCF092E60EC2D180947BB2093DF
3,441,980 UART: [art] SIG.R = FDAD451D64B4421B5BC7CB5363EBBBC9DB5B3880E282FB25F38A5A0E6F8F2E997D1E86370CC390CFADB755328AD5B5E2
3,448,766 UART: [art] SIG.S = 55A89007FF8BF79A0CCC455A78312BD2841E4C5F77C09408114D6B78547E54C299748C1372F2145E8121B399A01CEB36
3,472,684 UART: Caliptra RT
3,473,029 UART: [state] CFI Enabled
3,581,642 UART: [rt] RT listening for mailbox commands...
3,582,312 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,408 UART: [rt]cmd =0x44504543, len=28
3,655,478 >>> mbox cmd response data (2076 bytes)
3,655,479 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,046 UART: [rt]cmd =0x44504543, len=28
3,726,077 >>> mbox cmd response data (2076 bytes)
3,726,078 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,784 UART: [rt]cmd =0x49444550, len=353
3,771,132 >>> mbox cmd response data (8 bytes)
3,771,133 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,628 UART: [rt]cmd =0x44504543, len=28
3,843,352 >>> mbox cmd response data (2076 bytes)
3,843,353 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,872,836 UART: [rt]cmd =0x44504543, len=28
3,914,240 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,372 ready_for_fw is high
1,362,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,445 >>> mbox cmd response: success
2,990,813 UART:
2,990,829 UART: Running Caliptra FMC ...
2,991,237 UART:
2,991,380 UART: [state] CFI Enabled
3,001,825 UART: [fht] FMC Alias Private Key: 7
3,109,986 UART: [art] Extend RT PCRs Done
3,110,414 UART: [art] Lock RT PCRs Done
3,112,152 UART: [art] Populate DV Done
3,120,655 UART: [fht] FMC Alias Private Key: 7
3,121,753 UART: [art] Derive CDI
3,122,033 UART: [art] Store in in slot 0x4
3,207,374 UART: [art] Derive Key Pair
3,207,734 UART: [art] Store priv key in slot 0x5
3,220,658 UART: [art] Derive Key Pair - Done
3,235,329 UART: [art] Signing Cert with AUTHO
3,235,809 UART: RITY.KEYID = 7
3,250,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,574 UART: [art] PUB.X = 0B3F3A66BE7DE3059A58DCF21267765E86786869FE35779488EE39A04E138A74D0D7EC641E17EF1BB56AD5E1D65BA04C
3,258,346 UART: [art] PUB.Y = 8C54467CDE842E32DD81DCE70BE73DA347D9F1FAF7053D68A1A02825E09D366CF441F46EC7F9673E303682B87E146BA3
3,265,298 UART: [art] SIG.R = 9DE447B99E84DB1560D041A49BF13ADEAF423BB61A76CA0D65BCC8375FC043E81B2C6DAD7DA18CF0C51D85CBDB8C60FB
3,272,093 UART: [art] SIG.S = AA40D1680AE3318E549E41AE0B59CE50F23DF66AC5056325E7E7E14487A64217BD9DE872232076852339C7E532717EE9
3,295,803 UART: Caliptra RT
3,296,148 UART: [state] CFI Enabled
3,404,326 UART: [rt] RT listening for mailbox commands...
3,404,996 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,700 UART: [rt]cmd =0x44504543, len=28
3,478,044 >>> mbox cmd response data (2076 bytes)
3,478,045 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,518 UART: [rt]cmd =0x44504543, len=28
3,548,156 >>> mbox cmd response data (2076 bytes)
3,548,157 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,804 UART: [rt]cmd =0x49444550, len=354
3,593,065 >>> mbox cmd response data (8 bytes)
3,593,066 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,781 UART: [rt]cmd =0x44504543, len=28
3,665,931 >>> mbox cmd response data (2076 bytes)
3,665,932 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,451 UART: [rt]cmd =0x44504543, len=28
3,736,958 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,791 UART: [kat] SHA2-256
903,731 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
918,250 UART: [kat] HMAC-384Kdf
922,990 UART: [kat] LMS
1,171,318 UART: [kat] --
1,172,061 UART: [cold-reset] ++
1,172,541 UART: [fht] FHT @ 0x50003400
1,175,192 UART: [idev] ++
1,175,360 UART: [idev] CDI.KEYID = 6
1,175,720 UART: [idev] SUBJECT.KEYID = 7
1,176,144 UART: [idev] UDS.KEYID = 0
1,176,489 ready_for_fw is high
1,176,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,254 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,641 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,349 UART: [ldev] Erasing FE.KEYID = 1
1,244,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,875 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,283,826 UART: [fwproc] Recv command 0x46574c44
1,284,554 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,211 >>> mbox cmd response: success
2,775,239 UART: [afmc] ++
2,775,407 UART: [afmc] CDI.KEYID = 6
2,775,769 UART: [afmc] SUBJECT.KEYID = 7
2,776,194 UART: [afmc] AUTHORITY.KEYID = 5
2,811,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,044 UART: [afmc] --
2,855,128 UART: [cold-reset] --
2,855,826 UART: [state] Locking Datavault
2,857,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,785 UART: [state] Locking ICCM
2,858,353 UART: [exit] Launching FMC @ 0x40000130
2,863,682 UART:
2,863,698 UART: Running Caliptra FMC ...
2,864,106 UART:
2,864,160 UART: [state] CFI Enabled
2,874,645 UART: [fht] FMC Alias Private Key: 7
2,982,620 UART: [art] Extend RT PCRs Done
2,983,048 UART: [art] Lock RT PCRs Done
2,984,426 UART: [art] Populate DV Done
2,992,541 UART: [fht] FMC Alias Private Key: 7
2,993,627 UART: [art] Derive CDI
2,993,907 UART: [art] Store in in slot 0x4
3,079,748 UART: [art] Derive Key Pair
3,080,108 UART: [art] Store priv key in slot 0x5
3,093,538 UART: [art] Derive Key Pair - Done
3,108,758 UART: [art] Signing Cert with AUTHO
3,109,238 UART: RITY.KEYID = 7
3,124,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,317 UART: [art] PUB.X = 2BF5B18A637D67F7E04C81A2341D176379F7049C7EF61C780A12EBFAB6F39C54802144F175E6FAEF09CA26F1835BC74B
3,132,086 UART: [art] PUB.Y = 52AC509B1552D02B65EB9281559E71DE9FAE0C9DEA2DF52C0360148192BF31AA2E20EC91451DEB0120FD123B1D59319B
3,139,035 UART: [art] SIG.R = 06EE17282ADD0124F60DE584CC2571E356047E09D8040E3474EBDA524FE21339E683D3A67F0C3DAA6E158BA7E0F87E00
3,145,765 UART: [art] SIG.S = 270CA697E4BEF921BEB8C98ECA5C1477619BE6E668271395AD34F4E9B01E31AC3DB1A15870A3CA6D9A5E606A90906366
3,169,249 UART: Caliptra RT
3,169,502 UART: [state] CFI Enabled
3,276,853 UART: [rt] RT listening for mailbox commands...
3,277,523 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,577 UART: [rt]cmd =0x44504543, len=28
3,350,675 >>> mbox cmd response data (2076 bytes)
3,350,676 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,177 UART: [rt]cmd =0x44504543, len=28
3,420,787 >>> mbox cmd response data (2076 bytes)
3,420,788 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,443 UART: [rt]cmd =0x49444550, len=352
3,463,286 >>> mbox cmd response data (8 bytes)
3,463,287 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,864 UART: [rt]cmd =0x44504543, len=28
3,536,332 >>> mbox cmd response data (2076 bytes)
3,536,333 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,770 UART: [rt]cmd =0x44504543, len=28
3,607,374 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,745 ready_for_fw is high
1,059,745 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,336 >>> mbox cmd response: success
2,687,074 UART:
2,687,090 UART: Running Caliptra FMC ...
2,687,498 UART:
2,687,552 UART: [state] CFI Enabled
2,697,875 UART: [fht] FMC Alias Private Key: 7
2,805,520 UART: [art] Extend RT PCRs Done
2,805,948 UART: [art] Lock RT PCRs Done
2,807,466 UART: [art] Populate DV Done
2,815,641 UART: [fht] FMC Alias Private Key: 7
2,816,791 UART: [art] Derive CDI
2,817,071 UART: [art] Store in in slot 0x4
2,902,352 UART: [art] Derive Key Pair
2,902,712 UART: [art] Store priv key in slot 0x5
2,915,970 UART: [art] Derive Key Pair - Done
2,930,756 UART: [art] Signing Cert with AUTHO
2,931,236 UART: RITY.KEYID = 7
2,946,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,711 UART: [art] PUB.X = B981C1458B4FFC996C216B88FA64236ABA1FFAA08D35AB0EEA64574EC7C34C83F239303CB1261EE4610A2BBA8A9C14F9
2,954,491 UART: [art] PUB.Y = 1D4CEDD3CF4E8197A9E8F5A9DEA79200B4D6FF9FE257CDE1A6C0A0DA980798A426DA411B366B3CA7511EF612B55F615B
2,961,436 UART: [art] SIG.R = 6279A0E32BB94898E4BE00F2027189F02FAD06C00177C591796438534DBB717B441264309EF81C984FBF447814079FAC
2,968,164 UART: [art] SIG.S = C87996AEB3C34970BDD4A91510FCC0D3BEB15CD1ECA0AE3F93ED963639E9A99EE2A3FE7E207AF4887D23F1F220B9FF11
2,992,175 UART: Caliptra RT
2,992,428 UART: [state] CFI Enabled
3,100,801 UART: [rt] RT listening for mailbox commands...
3,101,471 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,487 UART: [rt]cmd =0x44504543, len=28
3,174,751 >>> mbox cmd response data (2076 bytes)
3,174,752 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,289 UART: [rt]cmd =0x44504543, len=28
3,245,027 >>> mbox cmd response data (2076 bytes)
3,245,028 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,546 UART: [rt]cmd =0x49444550, len=353
3,289,701 >>> mbox cmd response data (8 bytes)
3,289,702 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,521 UART: [rt]cmd =0x44504543, len=28
3,362,655 >>> mbox cmd response data (2076 bytes)
3,362,656 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,451 UART: [rt]cmd =0x44504543, len=28
3,433,808 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,651 UART: [kat] LMS
1,170,979 UART: [kat] --
1,171,968 UART: [cold-reset] ++
1,172,548 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 ready_for_fw is high
1,176,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,303 UART: [idev] Erasing UDS.KEYID = 0
1,201,320 UART: [idev] Sha1 KeyId Algorithm
1,209,888 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,726 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,213 UART: [fwproc] Wait for Commands...
1,283,969 UART: [fwproc] Recv command 0x46574c44
1,284,697 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,376 >>> mbox cmd response: success
2,776,540 UART: [afmc] ++
2,776,708 UART: [afmc] CDI.KEYID = 6
2,777,070 UART: [afmc] SUBJECT.KEYID = 7
2,777,495 UART: [afmc] AUTHORITY.KEYID = 5
2,813,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,151 UART: [afmc] --
2,857,249 UART: [cold-reset] --
2,858,395 UART: [state] Locking Datavault
2,859,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,214 UART: [state] Locking ICCM
2,860,770 UART: [exit] Launching FMC @ 0x40000130
2,866,099 UART:
2,866,115 UART: Running Caliptra FMC ...
2,866,523 UART:
2,866,666 UART: [state] CFI Enabled
2,877,387 UART: [fht] FMC Alias Private Key: 7
2,985,390 UART: [art] Extend RT PCRs Done
2,985,818 UART: [art] Lock RT PCRs Done
2,987,340 UART: [art] Populate DV Done
2,995,559 UART: [fht] FMC Alias Private Key: 7
2,996,673 UART: [art] Derive CDI
2,996,953 UART: [art] Store in in slot 0x4
3,082,346 UART: [art] Derive Key Pair
3,082,706 UART: [art] Store priv key in slot 0x5
3,095,698 UART: [art] Derive Key Pair - Done
3,110,614 UART: [art] Signing Cert with AUTHO
3,111,094 UART: RITY.KEYID = 7
3,126,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,181 UART: [art] PUB.X = 5BCCBAD74C69AFE25923C7927779311B91E73A28CA55DBF1265020125B38827E234B5E604DF9F94385A560AA17787D47
3,133,949 UART: [art] PUB.Y = 24B97500B881E1DC5752358D834CA08CE251DC8DF3B883868FFE6894D46D757EC72EF0475D197FB1EEBCA1A50A4D5697
3,140,882 UART: [art] SIG.R = D0FBCB31D6630AE32E46CF78ADC5BE9E8A69A28F1D721494C30CEED5E28EAEF80984E74CA84A6076C5FA0DA596493B1E
3,147,662 UART: [art] SIG.S = F7E4C22C017688843DEB326FD85292DC4BCC548E2E88274D1A1399CCD2B21E72DB01FA577CB8D16A1F006ECCCD39BB9C
3,171,719 UART: Caliptra RT
3,172,064 UART: [state] CFI Enabled
3,279,958 UART: [rt] RT listening for mailbox commands...
3,280,628 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,566 UART: [rt]cmd =0x44504543, len=28
3,353,968 >>> mbox cmd response data (2076 bytes)
3,353,969 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,370 UART: [rt]cmd =0x44504543, len=28
3,424,537 >>> mbox cmd response data (2076 bytes)
3,424,538 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,050 UART: [rt]cmd =0x49444550, len=353
3,469,332 >>> mbox cmd response data (8 bytes)
3,469,333 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,904 UART: [rt]cmd =0x44504543, len=28
3,541,890 >>> mbox cmd response data (2076 bytes)
3,541,891 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,572 UART: [rt]cmd =0x44504543, len=28
3,612,904 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,814 ready_for_fw is high
1,059,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,807 >>> mbox cmd response: success
2,687,773 UART:
2,687,789 UART: Running Caliptra FMC ...
2,688,197 UART:
2,688,340 UART: [state] CFI Enabled
2,699,225 UART: [fht] FMC Alias Private Key: 7
2,807,288 UART: [art] Extend RT PCRs Done
2,807,716 UART: [art] Lock RT PCRs Done
2,808,850 UART: [art] Populate DV Done
2,817,289 UART: [fht] FMC Alias Private Key: 7
2,818,461 UART: [art] Derive CDI
2,818,741 UART: [art] Store in in slot 0x4
2,905,022 UART: [art] Derive Key Pair
2,905,382 UART: [art] Store priv key in slot 0x5
2,918,760 UART: [art] Derive Key Pair - Done
2,933,347 UART: [art] Signing Cert with AUTHO
2,933,827 UART: RITY.KEYID = 7
2,948,695 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,460 UART: [art] PUB.X = 62C11FA9400D7848D94765093F5D8018D0AB50A47087F021835854D79FCA6360A0CC2D874598F9F8606F8EA98DC72C8F
2,956,220 UART: [art] PUB.Y = 1EF39BA68DAA13517DA38339C6E34C79DACD994A8001875CD2F73D9201F34B3BD997913C23A6FE5521893976C1415326
2,963,162 UART: [art] SIG.R = 3D43FCBA6EEEDF75A2F4D3A63C57D7F04F784BC1CC0A8F3C0C8E750E6DCCAE70FA0E1FD769AD48D295BB99BA5287DFA1
2,969,954 UART: [art] SIG.S = C325667A61B557ADBAD57093A8B6D6FEF43B1F975EF82D3A6881F4C2E43D16333854EA80272BD406162C7325B0AF240F
2,994,273 UART: Caliptra RT
2,994,618 UART: [state] CFI Enabled
3,101,837 UART: [rt] RT listening for mailbox commands...
3,102,507 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,341 UART: [rt]cmd =0x44504543, len=28
3,175,543 >>> mbox cmd response data (2076 bytes)
3,175,544 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,943 UART: [rt]cmd =0x44504543, len=28
3,245,957 >>> mbox cmd response data (2076 bytes)
3,245,958 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,491 UART: [rt]cmd =0x49444550, len=352
3,288,224 >>> mbox cmd response data (8 bytes)
3,288,225 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,732 UART: [rt]cmd =0x44504543, len=28
3,360,650 >>> mbox cmd response data (2076 bytes)
3,360,651 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,094 UART: [rt]cmd =0x44504543, len=28
3,431,498 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,174,039 ready_for_fw is high
1,174,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,760 UART: [ldev] ++
1,208,928 UART: [ldev] CDI.KEYID = 6
1,209,292 UART: [ldev] SUBJECT.KEYID = 5
1,209,719 UART: [ldev] AUTHORITY.KEYID = 7
1,210,182 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,275 >>> mbox cmd response: success
2,772,524 UART: [afmc] ++
2,772,692 UART: [afmc] CDI.KEYID = 6
2,773,055 UART: [afmc] SUBJECT.KEYID = 7
2,773,481 UART: [afmc] AUTHORITY.KEYID = 5
2,809,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,749 UART: [afmc] --
2,852,875 UART: [cold-reset] --
2,853,689 UART: [state] Locking Datavault
2,854,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,320 UART: [state] Locking ICCM
2,855,900 UART: [exit] Launching FMC @ 0x40000130
2,861,229 UART:
2,861,245 UART: Running Caliptra FMC ...
2,861,653 UART:
2,861,707 UART: [state] CFI Enabled
2,872,282 UART: [fht] FMC Alias Private Key: 7
2,980,297 UART: [art] Extend RT PCRs Done
2,980,725 UART: [art] Lock RT PCRs Done
2,982,373 UART: [art] Populate DV Done
2,990,974 UART: [fht] FMC Alias Private Key: 7
2,992,138 UART: [art] Derive CDI
2,992,418 UART: [art] Store in in slot 0x4
3,078,281 UART: [art] Derive Key Pair
3,078,641 UART: [art] Store priv key in slot 0x5
3,092,349 UART: [art] Derive Key Pair - Done
3,107,128 UART: [art] Signing Cert with AUTHO
3,107,608 UART: RITY.KEYID = 7
3,122,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,465 UART: [art] PUB.X = 94A64CCC2AD3EDDDC3DDF580D6E155E137CE8BA41A234AB6E760E56EECE9093A3DD54EC9076C729D46D9AF0DC75839C4
3,130,250 UART: [art] PUB.Y = ECA437475398DA9ADFDEC2AC354555156841B574AA9F8201745B342DCBFB14C2CC6B7CF896B9B089937808CC5B5D67D5
3,137,204 UART: [art] SIG.R = D02C717CC72656440F309BD2F8B43FD534A1994AB3F5DDEC962E7B99AE1880C48F1C27C77D160509285F711D97E5ADBB
3,143,973 UART: [art] SIG.S = CEE64E67DC4E63121F72536771C74A02D5155BF1F3A9490A17F704D16DAC7EFAAD22D82A9EC2B56AE5A1959F295477A5
3,168,229 UART: Caliptra RT
3,168,482 UART: [state] CFI Enabled
3,276,508 UART: [rt] RT listening for mailbox commands...
3,277,178 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,892 UART: [rt]cmd =0x44504543, len=28
3,349,854 >>> mbox cmd response data (2076 bytes)
3,349,855 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,462 UART: [rt]cmd =0x44504543, len=28
3,420,209 >>> mbox cmd response data (2076 bytes)
3,420,210 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,777 UART: [rt]cmd =0x49444550, len=352
3,462,723 >>> mbox cmd response data (8 bytes)
3,462,724 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,165 UART: [rt]cmd =0x44504543, len=28
3,535,769 >>> mbox cmd response data (2076 bytes)
3,535,770 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,167 UART: [rt]cmd =0x44504543, len=28
3,606,758 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,534 ready_for_fw is high
1,055,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,725 >>> mbox cmd response: success
2,684,625 UART:
2,684,641 UART: Running Caliptra FMC ...
2,685,049 UART:
2,685,103 UART: [state] CFI Enabled
2,695,540 UART: [fht] FMC Alias Private Key: 7
2,803,299 UART: [art] Extend RT PCRs Done
2,803,727 UART: [art] Lock RT PCRs Done
2,805,499 UART: [art] Populate DV Done
2,813,650 UART: [fht] FMC Alias Private Key: 7
2,814,804 UART: [art] Derive CDI
2,815,084 UART: [art] Store in in slot 0x4
2,900,261 UART: [art] Derive Key Pair
2,900,621 UART: [art] Store priv key in slot 0x5
2,913,475 UART: [art] Derive Key Pair - Done
2,928,382 UART: [art] Signing Cert with AUTHO
2,928,862 UART: RITY.KEYID = 7
2,944,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,969 UART: [art] PUB.X = B2B1F4EE65356C7A654F0DDBB466550070F3CB3D5F3F473F152D3C86115824815C837D0604D9E1E815BB8F5A3B671F54
2,951,710 UART: [art] PUB.Y = F877C6B468590C10FD386B814A41DED6243043FFBAE75647EFD37967E04BADB6B1608980FE8063EB3C251F5D21D73FB4
2,958,665 UART: [art] SIG.R = 9837A02AFB3C7F2038E8694009C8EEC3853CB114B1B1A9C42A067DDBD3E7608A0A3AF8C085720D57D69719B860AF24B6
2,965,429 UART: [art] SIG.S = B799644416462D0E11D5F5312FC22C394E891CEAB9EC47075E715B23C7E0D69826081F119564F28D165196AF2C037011
2,988,990 UART: Caliptra RT
2,989,243 UART: [state] CFI Enabled
3,096,517 UART: [rt] RT listening for mailbox commands...
3,097,187 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,259 UART: [rt]cmd =0x44504543, len=28
3,170,523 >>> mbox cmd response data (2076 bytes)
3,170,524 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,011 UART: [rt]cmd =0x44504543, len=28
3,240,838 >>> mbox cmd response data (2076 bytes)
3,240,839 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,577 UART: [rt]cmd =0x49444550, len=353
3,285,555 >>> mbox cmd response data (8 bytes)
3,285,556 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,085 UART: [rt]cmd =0x44504543, len=28
3,358,401 >>> mbox cmd response data (2076 bytes)
3,358,402 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,861 UART: [rt]cmd =0x44504543, len=28
3,429,591 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,174,646 ready_for_fw is high
1,174,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,539 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,945 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,348 >>> mbox cmd response: success
2,773,405 UART: [afmc] ++
2,773,573 UART: [afmc] CDI.KEYID = 6
2,773,936 UART: [afmc] SUBJECT.KEYID = 7
2,774,362 UART: [afmc] AUTHORITY.KEYID = 5
2,809,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,126 UART: [afmc] --
2,853,148 UART: [cold-reset] --
2,853,998 UART: [state] Locking Datavault
2,855,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,757 UART: [state] Locking ICCM
2,856,189 UART: [exit] Launching FMC @ 0x40000130
2,861,518 UART:
2,861,534 UART: Running Caliptra FMC ...
2,861,942 UART:
2,862,085 UART: [state] CFI Enabled
2,872,904 UART: [fht] FMC Alias Private Key: 7
2,981,195 UART: [art] Extend RT PCRs Done
2,981,623 UART: [art] Lock RT PCRs Done
2,983,137 UART: [art] Populate DV Done
2,991,356 UART: [fht] FMC Alias Private Key: 7
2,992,534 UART: [art] Derive CDI
2,992,814 UART: [art] Store in in slot 0x4
3,078,271 UART: [art] Derive Key Pair
3,078,631 UART: [art] Store priv key in slot 0x5
3,092,197 UART: [art] Derive Key Pair - Done
3,106,744 UART: [art] Signing Cert with AUTHO
3,107,224 UART: RITY.KEYID = 7
3,122,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,001 UART: [art] PUB.X = 9C63A34C6351449E3EA8D34DD1966DE0CEAC5D70B69713127DB6F37955A4D2BBA9E312EF2869A994433D9125F3982E79
3,129,773 UART: [art] PUB.Y = C5F8ACDB7CC3AFE9EA817638C8F7FB6C2733E505F238D636AFDAEE84CEFDCD0F2CCBFF27311D17CA8BC85DF8C8E071C7
3,136,753 UART: [art] SIG.R = B5C598EED144F3EC7E9393E855AF97769E411E609E3EF2045E5A9F708B731776611AF94AF24B3A09F3D86B33A1486E95
3,143,519 UART: [art] SIG.S = 18A99F69AD7495DF61E4DE262FEACD330D72D2BB636D5EDD7D3D8DA79C7F80E6FEEB869474ED473A4832771E2F810612
3,167,332 UART: Caliptra RT
3,167,677 UART: [state] CFI Enabled
3,275,176 UART: [rt] RT listening for mailbox commands...
3,275,846 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,758 UART: [rt]cmd =0x44504543, len=28
3,348,810 >>> mbox cmd response data (2076 bytes)
3,348,811 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,118 UART: [rt]cmd =0x44504543, len=28
3,419,340 >>> mbox cmd response data (2076 bytes)
3,419,341 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,886 UART: [rt]cmd =0x49444550, len=354
3,464,032 >>> mbox cmd response data (8 bytes)
3,464,033 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,600 UART: [rt]cmd =0x44504543, len=28
3,536,962 >>> mbox cmd response data (2076 bytes)
3,536,963 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,484 UART: [rt]cmd =0x44504543, len=28
3,607,952 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,991 ready_for_fw is high
1,055,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,950 >>> mbox cmd response: success
2,685,144 UART:
2,685,160 UART: Running Caliptra FMC ...
2,685,568 UART:
2,685,711 UART: [state] CFI Enabled
2,695,670 UART: [fht] FMC Alias Private Key: 7
2,803,937 UART: [art] Extend RT PCRs Done
2,804,365 UART: [art] Lock RT PCRs Done
2,805,687 UART: [art] Populate DV Done
2,813,576 UART: [fht] FMC Alias Private Key: 7
2,814,594 UART: [art] Derive CDI
2,814,874 UART: [art] Store in in slot 0x4
2,900,583 UART: [art] Derive Key Pair
2,900,943 UART: [art] Store priv key in slot 0x5
2,914,701 UART: [art] Derive Key Pair - Done
2,929,679 UART: [art] Signing Cert with AUTHO
2,930,159 UART: RITY.KEYID = 7
2,945,315 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,080 UART: [art] PUB.X = 8324E40F7684A5C3B378B2120B0BF5E93F8E78CB4063DB9EE38CE083074103499E18C769FB7A94F1A598A659090E5465
2,952,825 UART: [art] PUB.Y = D3C6AB85A72F9905751E00CF60C3B0CDE08D36A00DCFF796B69A3034FA6C4D2E690B028417A327BDB3A89E0FDE7F1895
2,959,752 UART: [art] SIG.R = A57E05EB4D9190FBFCE1FDF9A7E59664474684F61612394F2E3F7678B888B6D2153FF5D66CB9D21AEC2E2A126D8BC45E
2,966,531 UART: [art] SIG.S = 70EA3C00817CAD3F25C15AE96B644E7EF62ED3C7649B72A9F514A923C8173431A2507BDE9D85D1ACB2541DB94581A911
2,990,414 UART: Caliptra RT
2,990,759 UART: [state] CFI Enabled
3,098,884 UART: [rt] RT listening for mailbox commands...
3,099,554 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,616 UART: [rt]cmd =0x44504543, len=28
3,172,668 >>> mbox cmd response data (2076 bytes)
3,172,669 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,202,138 UART: [rt]cmd =0x44504543, len=28
3,242,736 >>> mbox cmd response data (2076 bytes)
3,242,737 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,182 UART: [rt]cmd =0x49444550, len=352
3,285,021 >>> mbox cmd response data (8 bytes)
3,285,022 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,373 UART: [rt]cmd =0x44504543, len=28
3,357,845 >>> mbox cmd response data (2076 bytes)
3,357,846 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,449 UART: [rt]cmd =0x44504543, len=28
3,429,163 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,571 UART: [kat] SHA2-256
881,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,617 UART: [kat] ++
885,769 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,340 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,717 UART: [cold-reset] ++
1,476,271 UART: [fht] Storing FHT @ 0x50003400
1,479,034 UART: [idev] ++
1,479,202 UART: [idev] CDI.KEYID = 6
1,479,562 UART: [idev] SUBJECT.KEYID = 7
1,479,986 UART: [idev] UDS.KEYID = 0
1,480,331 ready_for_fw is high
1,480,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,120 UART: [idev] --
1,514,117 UART: [ldev] ++
1,514,285 UART: [ldev] CDI.KEYID = 6
1,514,648 UART: [ldev] SUBJECT.KEYID = 5
1,515,074 UART: [ldev] AUTHORITY.KEYID = 7
1,515,537 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,810 UART: [ldev] --
1,585,295 UART: [fwproc] Waiting for Commands...
1,585,910 UART: [fwproc] Received command 0x46574c44
1,586,701 UART: [fwproc] Received Image of size 114332 bytes
2,884,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,458 >>> mbox cmd response: success
3,078,676 UART: [afmc] ++
3,078,844 UART: [afmc] CDI.KEYID = 6
3,079,206 UART: [afmc] SUBJECT.KEYID = 7
3,079,631 UART: [afmc] AUTHORITY.KEYID = 5
3,115,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,651 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,341 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,408 UART: [afmc] --
3,158,512 UART: [cold-reset] --
3,159,350 UART: [state] Locking Datavault
3,160,605 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,209 UART: [state] Locking ICCM
3,161,797 UART: [exit] Launching FMC @ 0x40000130
3,167,126 UART:
3,167,142 UART: Running Caliptra FMC ...
3,167,550 UART:
3,167,604 UART: [state] CFI Enabled
3,178,301 UART: [fht] FMC Alias Private Key: 7
3,286,682 UART: [art] Extend RT PCRs Done
3,287,110 UART: [art] Lock RT PCRs Done
3,288,586 UART: [art] Populate DV Done
3,296,835 UART: [fht] FMC Alias Private Key: 7
3,298,005 UART: [art] Derive CDI
3,298,285 UART: [art] Store in in slot 0x4
3,383,658 UART: [art] Derive Key Pair
3,384,018 UART: [art] Store priv key in slot 0x5
3,397,130 UART: [art] Derive Key Pair - Done
3,411,832 UART: [art] Signing Cert with AUTHO
3,412,312 UART: RITY.KEYID = 7
3,427,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,039 UART: [art] PUB.X = A3B4C370675E0A7C6C0A01656F2D2F3882EB0EF27FC9F7C8929D74E1E4977BA36ED647CF0F3B6C7190147783A3DFBB4D
3,434,806 UART: [art] PUB.Y = 872C6756A04F4DC6C42825E6B04D6D75793C0E8046D9D70B7171D2CB62493FCA65599867E16DA1C0DD7FDEE10AC6EA32
3,441,755 UART: [art] SIG.R = 91F6C74DBF8F381A976CF98CF20BF187DBEC5A0A097FC1C3436A74D2060947457E11FDBE04E9E617E731789E1F8F7DC0
3,448,519 UART: [art] SIG.S = 321C5AA7725A812F26251AF7E5C61E9A0ABAC6AB4AF244A8DA5917FD2FD0AEBB9B7F418563B99522E8DF819F40403737
3,472,617 UART: Caliptra RT
3,472,870 UART: [state] CFI Enabled
3,581,735 UART: [rt] RT listening for mailbox commands...
3,582,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,837 UART: [rt]cmd =0x44504543, len=96
3,793,098 >>> mbox cmd response data (6236 bytes)
3,793,099 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,916 UART: [rt]cmd =0x52564348, len=36
3,825,181 >>> mbox cmd response data (8 bytes)
3,825,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,199 UART: [rt]cmd =0x44504543, len=96
4,034,626 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,971 ready_for_fw is high
1,361,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,004 >>> mbox cmd response: success
2,985,756 UART:
2,985,772 UART: Running Caliptra FMC ...
2,986,180 UART:
2,986,234 UART: [state] CFI Enabled
2,996,865 UART: [fht] FMC Alias Private Key: 7
3,104,848 UART: [art] Extend RT PCRs Done
3,105,276 UART: [art] Lock RT PCRs Done
3,107,024 UART: [art] Populate DV Done
3,115,201 UART: [fht] FMC Alias Private Key: 7
3,116,169 UART: [art] Derive CDI
3,116,449 UART: [art] Store in in slot 0x4
3,202,174 UART: [art] Derive Key Pair
3,202,534 UART: [art] Store priv key in slot 0x5
3,215,322 UART: [art] Derive Key Pair - Done
3,230,533 UART: [art] Signing Cert with AUTHO
3,231,013 UART: RITY.KEYID = 7
3,246,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,688 UART: [art] PUB.X = 7314884CA9965853952EC4A3E18409A12B0478809CA1EB397108CDF88C3C2B84207F0DB8EBF88905704A8668AC0B60B4
3,254,436 UART: [art] PUB.Y = A4DE701D797670E81F40074A090C5674C6BE6BF50CDDF9F28F2DCDF772593D8AEA3AD79C8A36265B8518B0F41D9B7836
3,261,384 UART: [art] SIG.R = 5D1E8803D4B435BB2EAE8D5A25162132878467AC1CDCBBE162CF9675D1539DCF2DD6F7E58786B035CB5A214D6EFBFA0E
3,268,166 UART: [art] SIG.S = 39F6BF752CAC868015C71599AF3BEBFBA8696D1B1FB782A21BC899C5CD385B3647144575F731FB7A731DCEE24CE83C00
3,291,887 UART: Caliptra RT
3,292,140 UART: [state] CFI Enabled
3,399,774 UART: [rt] RT listening for mailbox commands...
3,400,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,890 UART: [rt]cmd =0x44504543, len=96
3,611,494 >>> mbox cmd response data (6236 bytes)
3,611,495 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,146 UART: [rt]cmd =0x52564348, len=36
3,643,511 >>> mbox cmd response data (8 bytes)
3,643,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,307 UART: [rt]cmd =0x44504543, len=96
3,853,779 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,704 UART: [kat] SHA2-256
892,642 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,775 UART: [idev] ++
1,479,943 UART: [idev] CDI.KEYID = 6
1,480,303 UART: [idev] SUBJECT.KEYID = 7
1,480,727 UART: [idev] UDS.KEYID = 0
1,481,072 ready_for_fw is high
1,481,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,505,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,385 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,521,762 UART: [ldev] Erasing FE.KEYID = 1
1,547,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,505 UART: [ldev] --
1,586,818 UART: [fwproc] Waiting for Commands...
1,587,563 UART: [fwproc] Received command 0x46574c44
1,588,354 UART: [fwproc] Received Image of size 114332 bytes
2,885,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,118 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,287 >>> mbox cmd response: success
3,080,355 UART: [afmc] ++
3,080,523 UART: [afmc] CDI.KEYID = 6
3,080,885 UART: [afmc] SUBJECT.KEYID = 7
3,081,310 UART: [afmc] AUTHORITY.KEYID = 5
3,116,191 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,938 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,628 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,471 UART: [afmc] --
3,159,425 UART: [cold-reset] --
3,160,309 UART: [state] Locking Datavault
3,161,358 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,962 UART: [state] Locking ICCM
3,162,448 UART: [exit] Launching FMC @ 0x40000130
3,167,777 UART:
3,167,793 UART: Running Caliptra FMC ...
3,168,201 UART:
3,168,344 UART: [state] CFI Enabled
3,179,021 UART: [fht] FMC Alias Private Key: 7
3,286,812 UART: [art] Extend RT PCRs Done
3,287,240 UART: [art] Lock RT PCRs Done
3,288,742 UART: [art] Populate DV Done
3,297,177 UART: [fht] FMC Alias Private Key: 7
3,298,277 UART: [art] Derive CDI
3,298,557 UART: [art] Store in in slot 0x4
3,384,406 UART: [art] Derive Key Pair
3,384,766 UART: [art] Store priv key in slot 0x5
3,397,528 UART: [art] Derive Key Pair - Done
3,412,279 UART: [art] Signing Cert with AUTHO
3,412,759 UART: RITY.KEYID = 7
3,427,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,654 UART: [art] PUB.X = BD531AE0D00A15F9B19082237233892DE87E0582AF6BCF9E5852117E74F97BC368D09A45DE0A1EF0CA96FAFD77EA9DA9
3,435,429 UART: [art] PUB.Y = 0FCF0D0A5A969D3ADFB727D57403EEE483166DE23CF1B311BB46E02CFBBBCF08476E56BAFE96C8E681571D13F0DEC3D7
3,442,388 UART: [art] SIG.R = 9AB20EC4ADB6C84FD5DC40F78BB812862681C47E92C595282931E6CD690ECA8824D920BF93E0CAFE4D733FED8D46E034
3,449,166 UART: [art] SIG.S = 5A06B16F14C83614B3E2B49DFBEB905145F877551212EDC74282942CFB6F226BE10F7120CD8EACB4286051BB46B1530C
3,472,940 UART: Caliptra RT
3,473,285 UART: [state] CFI Enabled
3,580,824 UART: [rt] RT listening for mailbox commands...
3,581,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,970 UART: [rt]cmd =0x44504543, len=96
3,793,020 >>> mbox cmd response data (6236 bytes)
3,793,021 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,474 UART: [rt]cmd =0x52564348, len=36
3,824,775 >>> mbox cmd response data (8 bytes)
3,824,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,013 UART: [rt]cmd =0x44504543, len=96
4,035,569 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,388 ready_for_fw is high
1,362,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,815 >>> mbox cmd response: success
2,991,219 UART:
2,991,235 UART: Running Caliptra FMC ...
2,991,643 UART:
2,991,786 UART: [state] CFI Enabled
3,002,185 UART: [fht] FMC Alias Private Key: 7
3,109,822 UART: [art] Extend RT PCRs Done
3,110,250 UART: [art] Lock RT PCRs Done
3,111,500 UART: [art] Populate DV Done
3,119,693 UART: [fht] FMC Alias Private Key: 7
3,120,855 UART: [art] Derive CDI
3,121,135 UART: [art] Store in in slot 0x4
3,207,098 UART: [art] Derive Key Pair
3,207,458 UART: [art] Store priv key in slot 0x5
3,221,118 UART: [art] Derive Key Pair - Done
3,235,679 UART: [art] Signing Cert with AUTHO
3,236,159 UART: RITY.KEYID = 7
3,251,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,038 UART: [art] PUB.X = 81DEC2A9A6F5E5FB1EC27FD9F159425739A3A72A59C90C5E4D39D179C6C1B372C63094AD89D382423BE7580BC704F93A
3,258,807 UART: [art] PUB.Y = 0B7E47FA99D9DAA39352448237677167EEEACE42C7810416039125EC8C06B843945FF5DD4A6DF3AB5F0DA99AEF23884C
3,265,750 UART: [art] SIG.R = D6A2C9459D67C0216DD75C85E0DBA8DCE00B156DC7331BA0A2070AE92D362B9EB3DEA8068089EBDDB45A2D7130D19760
3,272,522 UART: [art] SIG.S = 9152B114BA9903448280286CBAC693B6B18B3B0EAE3111AF63136C9D8FCFBE1CEFBFFE6A2AF91DF2B967751F1379540A
3,296,806 UART: Caliptra RT
3,297,151 UART: [state] CFI Enabled
3,405,367 UART: [rt] RT listening for mailbox commands...
3,406,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,643 UART: [rt]cmd =0x44504543, len=96
3,618,035 >>> mbox cmd response data (6236 bytes)
3,618,036 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,547 UART: [rt]cmd =0x52564348, len=36
3,649,566 >>> mbox cmd response data (8 bytes)
3,649,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,508 UART: [rt]cmd =0x44504543, len=96
3,861,138 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,872 UART: [kat] SHA2-512-ACC
908,773 UART: [kat] ECC-384
918,376 UART: [kat] HMAC-384Kdf
923,026 UART: [kat] LMS
1,171,354 UART: [kat] --
1,172,485 UART: [cold-reset] ++
1,172,873 UART: [fht] FHT @ 0x50003400
1,175,616 UART: [idev] ++
1,175,784 UART: [idev] CDI.KEYID = 6
1,176,144 UART: [idev] SUBJECT.KEYID = 7
1,176,568 UART: [idev] UDS.KEYID = 0
1,176,913 ready_for_fw is high
1,176,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,560 UART: [idev] Erasing UDS.KEYID = 0
1,201,839 UART: [idev] Sha1 KeyId Algorithm
1,210,329 UART: [idev] --
1,211,251 UART: [ldev] ++
1,211,419 UART: [ldev] CDI.KEYID = 6
1,211,782 UART: [ldev] SUBJECT.KEYID = 5
1,212,208 UART: [ldev] AUTHORITY.KEYID = 7
1,212,671 UART: [ldev] FE.KEYID = 1
1,217,657 UART: [ldev] Erasing FE.KEYID = 1
1,243,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,491 UART: [ldev] --
1,282,812 UART: [fwproc] Wait for Commands...
1,283,472 UART: [fwproc] Recv command 0x46574c44
1,284,200 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,351 >>> mbox cmd response: success
2,775,415 UART: [afmc] ++
2,775,583 UART: [afmc] CDI.KEYID = 6
2,775,945 UART: [afmc] SUBJECT.KEYID = 7
2,776,370 UART: [afmc] AUTHORITY.KEYID = 5
2,811,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,502 UART: [afmc] --
2,855,510 UART: [cold-reset] --
2,856,288 UART: [state] Locking Datavault
2,857,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,013 UART: [state] Locking ICCM
2,858,575 UART: [exit] Launching FMC @ 0x40000130
2,863,904 UART:
2,863,920 UART: Running Caliptra FMC ...
2,864,328 UART:
2,864,382 UART: [state] CFI Enabled
2,874,931 UART: [fht] FMC Alias Private Key: 7
2,983,330 UART: [art] Extend RT PCRs Done
2,983,758 UART: [art] Lock RT PCRs Done
2,985,412 UART: [art] Populate DV Done
2,993,447 UART: [fht] FMC Alias Private Key: 7
2,994,489 UART: [art] Derive CDI
2,994,769 UART: [art] Store in in slot 0x4
3,080,378 UART: [art] Derive Key Pair
3,080,738 UART: [art] Store priv key in slot 0x5
3,093,874 UART: [art] Derive Key Pair - Done
3,108,875 UART: [art] Signing Cert with AUTHO
3,109,355 UART: RITY.KEYID = 7
3,124,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,360 UART: [art] PUB.X = 7CEFA8622C209900FDE845DAEBDA1F52BC6A4AF7F6FD03994C8F149194EC1A451772AB28D036B38A75A9C2B838CB63F3
3,132,121 UART: [art] PUB.Y = F79CC31B710669CB0AB95922578BD517E782387A52DB4F3A3C9172CC720B57087EA6B8FDE7233F221CB2E2495317A11E
3,139,061 UART: [art] SIG.R = 6797E84536926C5783CB1410E2CABAC31605A095F007A30A6173F235C18A02D6DD488152FFE95B9909A3EE7706E19842
3,145,807 UART: [art] SIG.S = FDAAD0D9E27C3AD988574414A613FBF568F6A496BB59EBC464467A2C3FEF948DFDC55CBD8795CCE85D0FDE80FA3F2540
3,169,409 UART: Caliptra RT
3,169,662 UART: [state] CFI Enabled
3,277,399 UART: [rt] RT listening for mailbox commands...
3,278,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,703 UART: [rt]cmd =0x44504543, len=96
3,490,608 >>> mbox cmd response data (6236 bytes)
3,490,609 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,024 UART: [rt]cmd =0x52564348, len=36
3,522,373 >>> mbox cmd response data (8 bytes)
3,522,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,345 UART: [rt]cmd =0x44504543, len=96
3,733,758 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,705 ready_for_fw is high
1,059,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,646 >>> mbox cmd response: success
2,688,780 UART:
2,688,796 UART: Running Caliptra FMC ...
2,689,204 UART:
2,689,258 UART: [state] CFI Enabled
2,699,509 UART: [fht] FMC Alias Private Key: 7
2,807,250 UART: [art] Extend RT PCRs Done
2,807,678 UART: [art] Lock RT PCRs Done
2,809,462 UART: [art] Populate DV Done
2,817,771 UART: [fht] FMC Alias Private Key: 7
2,818,881 UART: [art] Derive CDI
2,819,161 UART: [art] Store in in slot 0x4
2,904,626 UART: [art] Derive Key Pair
2,904,986 UART: [art] Store priv key in slot 0x5
2,918,146 UART: [art] Derive Key Pair - Done
2,932,927 UART: [art] Signing Cert with AUTHO
2,933,407 UART: RITY.KEYID = 7
2,948,591 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,356 UART: [art] PUB.X = C13C1EBBDC106D7BA73C43C1BF18A7E0670EEE58CF5A127B59CBC29497535B7AC4D3F2F3AC04CAFFDA86AAEF81C50B70
2,956,147 UART: [art] PUB.Y = D04E2A0CB527A4223D76890F6C4C4D6CA5D3E282525C156AD3C41E8BF4C23F923202DFD919475B8717617AB7241B71E4
2,963,090 UART: [art] SIG.R = FA9A3083BEC34EB62C51352A108C1D853FE09759CFC282D39B28BE23B1B85E136B7EF0C00331253B23EDD21F14A6A30E
2,969,864 UART: [art] SIG.S = 05C5F9CBE09DDE9B7FA4E05797BAD72947A74119C50876F863735AB932A7920D07B9705936117DEFCD2CE35EAE0B6FC2
2,993,888 UART: Caliptra RT
2,994,141 UART: [state] CFI Enabled
3,100,748 UART: [rt] RT listening for mailbox commands...
3,101,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,078 UART: [rt]cmd =0x44504543, len=96
3,313,175 >>> mbox cmd response data (6236 bytes)
3,313,176 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,769 UART: [rt]cmd =0x52564348, len=36
3,345,008 >>> mbox cmd response data (8 bytes)
3,345,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,836 UART: [rt]cmd =0x44504543, len=96
3,555,805 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,473 UART: [kat] SHA2-512-ACC
908,374 UART: [kat] ECC-384
917,941 UART: [kat] HMAC-384Kdf
922,629 UART: [kat] LMS
1,170,957 UART: [kat] --
1,171,740 UART: [cold-reset] ++
1,172,092 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 ready_for_fw is high
1,176,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,233 UART: [idev] Erasing UDS.KEYID = 0
1,200,610 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] --
1,210,128 UART: [ldev] ++
1,210,296 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,085 UART: [ldev] AUTHORITY.KEYID = 7
1,211,548 UART: [ldev] FE.KEYID = 1
1,216,696 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,448 UART: [ldev] --
1,282,809 UART: [fwproc] Wait for Commands...
1,283,543 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,118 >>> mbox cmd response: success
2,775,136 UART: [afmc] ++
2,775,304 UART: [afmc] CDI.KEYID = 6
2,775,666 UART: [afmc] SUBJECT.KEYID = 7
2,776,091 UART: [afmc] AUTHORITY.KEYID = 5
2,811,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,513 UART: [afmc] --
2,854,463 UART: [cold-reset] --
2,855,303 UART: [state] Locking Datavault
2,856,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,166 UART: [state] Locking ICCM
2,857,604 UART: [exit] Launching FMC @ 0x40000130
2,862,933 UART:
2,862,949 UART: Running Caliptra FMC ...
2,863,357 UART:
2,863,500 UART: [state] CFI Enabled
2,873,981 UART: [fht] FMC Alias Private Key: 7
2,982,282 UART: [art] Extend RT PCRs Done
2,982,710 UART: [art] Lock RT PCRs Done
2,984,336 UART: [art] Populate DV Done
2,992,643 UART: [fht] FMC Alias Private Key: 7
2,993,715 UART: [art] Derive CDI
2,993,995 UART: [art] Store in in slot 0x4
3,079,830 UART: [art] Derive Key Pair
3,080,190 UART: [art] Store priv key in slot 0x5
3,093,340 UART: [art] Derive Key Pair - Done
3,108,042 UART: [art] Signing Cert with AUTHO
3,108,522 UART: RITY.KEYID = 7
3,124,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,859 UART: [art] PUB.X = D1960DCB2EF986614C259C3020205B9C0A8036D25094D5A9845AA82E7599352CE2DF3333C01E4B0A84A95C1972F17871
3,131,614 UART: [art] PUB.Y = DE8DCB076A4ABF916CEA4B639A455E9F6B0A4435E03C9A17F695B409ABD86DAB807379266A65ABACAB2C000ECEC53C83
3,138,552 UART: [art] SIG.R = 22783B8A07784B29DDE5118C02C3F0F131E44CAA3B681415CBC7206185036825FDC62835F7EA4CA06CD4961CEF22DC5E
3,145,319 UART: [art] SIG.S = B93DBFD9049F449504230709F4636A9F1277668CCDF25D7AFA623F864F97D43798512349B1F9E2058063F4F5183E1331
3,169,085 UART: Caliptra RT
3,169,430 UART: [state] CFI Enabled
3,278,083 UART: [rt] RT listening for mailbox commands...
3,278,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,827 UART: [rt]cmd =0x44504543, len=96
3,489,848 >>> mbox cmd response data (6236 bytes)
3,489,849 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,170 UART: [rt]cmd =0x52564348, len=36
3,521,481 >>> mbox cmd response data (8 bytes)
3,521,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,555 UART: [rt]cmd =0x44504543, len=96
3,732,260 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,122 ready_for_fw is high
1,061,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,249 >>> mbox cmd response: success
2,691,339 UART:
2,691,355 UART: Running Caliptra FMC ...
2,691,763 UART:
2,691,906 UART: [state] CFI Enabled
2,702,337 UART: [fht] FMC Alias Private Key: 7
2,810,522 UART: [art] Extend RT PCRs Done
2,810,950 UART: [art] Lock RT PCRs Done
2,812,332 UART: [art] Populate DV Done
2,820,503 UART: [fht] FMC Alias Private Key: 7
2,821,503 UART: [art] Derive CDI
2,821,783 UART: [art] Store in in slot 0x4
2,907,734 UART: [art] Derive Key Pair
2,908,094 UART: [art] Store priv key in slot 0x5
2,921,314 UART: [art] Derive Key Pair - Done
2,935,807 UART: [art] Signing Cert with AUTHO
2,936,287 UART: RITY.KEYID = 7
2,951,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,202 UART: [art] PUB.X = CB64D797DB1ACD63D1C18A6AA8E25F071BBB90C0C4EE06707BE861FC77D2B107FACE4C6B64C2EECD86AD5322AAD26C46
2,958,991 UART: [art] PUB.Y = CF196C755E8DFE8514013CAE1B7D9B60E11E9198E71A3A15C22C64E678DC89A65BA163F7D2C2D405ACC7E0D37CA844BD
2,965,951 UART: [art] SIG.R = E9A641647FF06355C96381D73CBD7F2E3A0721575E20527CF18AE823D3C34B32351CD81FA4FFFB7159E6C724AD64AB4C
2,972,726 UART: [art] SIG.S = B31B53A74E6CADD4FCF235D31AC3601F7B1DB6197CEDECB7E715312D1DC35EA66A11643809B7AB0BE800FBEB5EF93E07
2,995,862 UART: Caliptra RT
2,996,207 UART: [state] CFI Enabled
3,105,041 UART: [rt] RT listening for mailbox commands...
3,105,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,121 UART: [rt]cmd =0x44504543, len=96
3,316,694 >>> mbox cmd response data (6236 bytes)
3,316,695 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,206 UART: [rt]cmd =0x52564348, len=36
3,348,251 >>> mbox cmd response data (8 bytes)
3,348,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,051 UART: [rt]cmd =0x44504543, len=96
3,559,410 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,174,485 ready_for_fw is high
1,174,485 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,231 UART: [idev] Sha1 KeyId Algorithm
1,208,311 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,564 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,705 UART: [fwproc] Recv command 0x46574c44
1,283,438 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,121 >>> mbox cmd response: success
2,774,338 UART: [afmc] ++
2,774,506 UART: [afmc] CDI.KEYID = 6
2,774,869 UART: [afmc] SUBJECT.KEYID = 7
2,775,295 UART: [afmc] AUTHORITY.KEYID = 5
2,810,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,850 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,763 UART: [afmc] --
2,853,781 UART: [cold-reset] --
2,854,663 UART: [state] Locking Datavault
2,855,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,430 UART: [state] Locking ICCM
2,856,862 UART: [exit] Launching FMC @ 0x40000130
2,862,191 UART:
2,862,207 UART: Running Caliptra FMC ...
2,862,615 UART:
2,862,669 UART: [state] CFI Enabled
2,873,304 UART: [fht] FMC Alias Private Key: 7
2,981,261 UART: [art] Extend RT PCRs Done
2,981,689 UART: [art] Lock RT PCRs Done
2,983,189 UART: [art] Populate DV Done
2,991,370 UART: [fht] FMC Alias Private Key: 7
2,992,330 UART: [art] Derive CDI
2,992,610 UART: [art] Store in in slot 0x4
3,078,583 UART: [art] Derive Key Pair
3,078,943 UART: [art] Store priv key in slot 0x5
3,091,627 UART: [art] Derive Key Pair - Done
3,106,624 UART: [art] Signing Cert with AUTHO
3,107,104 UART: RITY.KEYID = 7
3,122,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,087 UART: [art] PUB.X = 93835DB95C54CB82DE569087427185F0BB160F27EC89FA25B72790B4921EBB1AA1D9E8B8FF11980A02D110CBFAC1A043
3,129,856 UART: [art] PUB.Y = 0D3484F93E2FC4B399C568118ED1701B9802CDCA351960AF53060FECF14F96755FE6C8742C26334A9B6C878566D819B4
3,136,792 UART: [art] SIG.R = 25573EF1093CCC5DD19F2A3DF2167DB20C138003AD8DED5AE24FC76F1714F76EF366848D92843D120BB7D82706BFA207
3,143,552 UART: [art] SIG.S = 0FDFA9908C127857ECE8405841DA04448A08497ACE8B5DFAA26F2B2DB9F0C561277F66F99E434CEEB2E743258EB819E5
3,167,254 UART: Caliptra RT
3,167,507 UART: [state] CFI Enabled
3,275,100 UART: [rt] RT listening for mailbox commands...
3,275,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,120 UART: [rt]cmd =0x44504543, len=96
3,486,189 >>> mbox cmd response data (6236 bytes)
3,486,190 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,883 UART: [rt]cmd =0x52564348, len=36
3,518,128 >>> mbox cmd response data (8 bytes)
3,518,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,048 UART: [rt]cmd =0x44504543, len=96
3,729,239 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,384 ready_for_fw is high
1,056,384 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,771 >>> mbox cmd response: success
2,684,465 UART:
2,684,481 UART: Running Caliptra FMC ...
2,684,889 UART:
2,684,943 UART: [state] CFI Enabled
2,695,740 UART: [fht] FMC Alias Private Key: 7
2,803,487 UART: [art] Extend RT PCRs Done
2,803,915 UART: [art] Lock RT PCRs Done
2,805,295 UART: [art] Populate DV Done
2,813,350 UART: [fht] FMC Alias Private Key: 7
2,814,518 UART: [art] Derive CDI
2,814,798 UART: [art] Store in in slot 0x4
2,900,313 UART: [art] Derive Key Pair
2,900,673 UART: [art] Store priv key in slot 0x5
2,913,985 UART: [art] Derive Key Pair - Done
2,929,013 UART: [art] Signing Cert with AUTHO
2,929,493 UART: RITY.KEYID = 7
2,944,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,032 UART: [art] PUB.X = AC8F50EAD508D521E45CA8491F6130421BB576688E19B065D68772832F47E6D61A70D122CF2D861BF763592E1D79D3B2
2,951,797 UART: [art] PUB.Y = F9FA1914E7E64DBB0ED4CF88B7940E7F68B5478F110CB777330137178139CA4699642687F15242D9862B1CE20C69DF29
2,958,728 UART: [art] SIG.R = B4958C8317C2E74B5EFE58AC6B9329C012B47F8B93F9EA5380734583F4D0C1FFA7DD9D76E07D0C3FE7973DC9894C2FF0
2,965,507 UART: [art] SIG.S = C22DB04BAECD8BC28740E91E18779EA8B0D3376125F066DE0288E769CA8F91DCF13D8B0BBF303F87375FDBC330136962
2,989,110 UART: Caliptra RT
2,989,363 UART: [state] CFI Enabled
3,097,353 UART: [rt] RT listening for mailbox commands...
3,098,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,365 UART: [rt]cmd =0x44504543, len=96
3,309,508 >>> mbox cmd response data (6236 bytes)
3,309,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,830 UART: [rt]cmd =0x52564348, len=36
3,341,145 >>> mbox cmd response data (8 bytes)
3,341,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,143 UART: [rt]cmd =0x44504543, len=96
3,552,794 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,256 UART: [idev] ++
1,173,424 UART: [idev] CDI.KEYID = 6
1,173,785 UART: [idev] SUBJECT.KEYID = 7
1,174,210 UART: [idev] UDS.KEYID = 0
1,174,556 ready_for_fw is high
1,174,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,776 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,587 UART: [ldev] --
1,283,001 UART: [fwproc] Wait for Commands...
1,283,674 UART: [fwproc] Recv command 0x46574c44
1,284,407 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,960 >>> mbox cmd response: success
2,776,105 UART: [afmc] ++
2,776,273 UART: [afmc] CDI.KEYID = 6
2,776,636 UART: [afmc] SUBJECT.KEYID = 7
2,777,062 UART: [afmc] AUTHORITY.KEYID = 5
2,812,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,894 UART: [afmc] --
2,855,946 UART: [cold-reset] --
2,856,742 UART: [state] Locking Datavault
2,858,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,631 UART: [state] Locking ICCM
2,859,235 UART: [exit] Launching FMC @ 0x40000130
2,864,564 UART:
2,864,580 UART: Running Caliptra FMC ...
2,864,988 UART:
2,865,131 UART: [state] CFI Enabled
2,875,976 UART: [fht] FMC Alias Private Key: 7
2,984,189 UART: [art] Extend RT PCRs Done
2,984,617 UART: [art] Lock RT PCRs Done
2,986,171 UART: [art] Populate DV Done
2,994,480 UART: [fht] FMC Alias Private Key: 7
2,995,632 UART: [art] Derive CDI
2,995,912 UART: [art] Store in in slot 0x4
3,081,629 UART: [art] Derive Key Pair
3,081,989 UART: [art] Store priv key in slot 0x5
3,095,529 UART: [art] Derive Key Pair - Done
3,110,418 UART: [art] Signing Cert with AUTHO
3,110,898 UART: RITY.KEYID = 7
3,126,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,051 UART: [art] PUB.X = D2CF8F6ADB4D084091C7B2F5C901C68100D39B3A7A9DECB1210460F406D859D082D197F4E5CD092BDE39E61D69554693
3,133,790 UART: [art] PUB.Y = 2956E273A7E8C19F4864FAC287562A1F38FA8DF971629A79663E99D7EF25C3370D824093CB5F8BBB5C1D9A65BD041997
3,140,736 UART: [art] SIG.R = 40D77E0D8553A015A4B12F0DAE4B72A67B8FA7BE2A5EABD27A6773025FD7DDAA5A7AF0522786C650DD34B89BD35092C7
3,147,513 UART: [art] SIG.S = CB04D5073D2477CE6C2FE215A69316D23E6687DBF97A5C8A2DD99606DC3EC7273D0FACBE146D84446C69F6833DE64D1F
3,171,422 UART: Caliptra RT
3,171,767 UART: [state] CFI Enabled
3,279,104 UART: [rt] RT listening for mailbox commands...
3,279,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,980 UART: [rt]cmd =0x44504543, len=96
3,490,898 >>> mbox cmd response data (6236 bytes)
3,490,899 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,592 UART: [rt]cmd =0x52564348, len=36
3,522,603 >>> mbox cmd response data (8 bytes)
3,522,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,487 UART: [rt]cmd =0x44504543, len=96
3,733,157 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,885 ready_for_fw is high
1,055,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,048 >>> mbox cmd response: success
2,684,018 UART:
2,684,034 UART: Running Caliptra FMC ...
2,684,442 UART:
2,684,585 UART: [state] CFI Enabled
2,695,092 UART: [fht] FMC Alias Private Key: 7
2,803,239 UART: [art] Extend RT PCRs Done
2,803,667 UART: [art] Lock RT PCRs Done
2,805,155 UART: [art] Populate DV Done
2,813,608 UART: [fht] FMC Alias Private Key: 7
2,814,616 UART: [art] Derive CDI
2,814,896 UART: [art] Store in in slot 0x4
2,900,371 UART: [art] Derive Key Pair
2,900,731 UART: [art] Store priv key in slot 0x5
2,914,137 UART: [art] Derive Key Pair - Done
2,928,946 UART: [art] Signing Cert with AUTHO
2,929,426 UART: RITY.KEYID = 7
2,944,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,549 UART: [art] PUB.X = 000725E50B837FBB3D020097A6D27C540462658AA43F1DDE8348A11330D1B2C6E0CDBFF6D934B7DCF2965D2832D874C9
2,952,267 UART: [art] PUB.Y = E681E00C2ED37F637CE2B6CEE2863A21D5C22A40351EF3B12F53F274CDA837B74DD3261FCB52D0FB2826C4BDDFB19CD2
2,959,234 UART: [art] SIG.R = A8B150E63F22719551942F426158A40382B07A15779ECD7EE3A56BDF88434A65C564B0E53113066C338515A7BE062FB1
2,965,987 UART: [art] SIG.S = 093AD563CFBB28DE84FCCE6ECF37CBDD081CD6ACE35D24F3F2B039B19B928C4EF7472D347F7A91EBD0DB001378C69D3A
2,989,344 UART: Caliptra RT
2,989,689 UART: [state] CFI Enabled
3,097,040 UART: [rt] RT listening for mailbox commands...
3,097,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,310 UART: [rt]cmd =0x44504543, len=96
3,308,820 >>> mbox cmd response data (6236 bytes)
3,308,821 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,364 UART: [rt]cmd =0x52564348, len=36
3,340,397 >>> mbox cmd response data (8 bytes)
3,340,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,393 UART: [rt]cmd =0x44504543, len=96
3,551,211 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,035 UART: [kat] SHA2-256
881,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,081 UART: [kat] ++
886,233 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,220 UART: [kat] SHA2-512-ACC
897,121 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,418 UART: [kat] LMS
1,475,614 UART: [kat] --
1,476,473 UART: [cold-reset] ++
1,477,037 UART: [fht] Storing FHT @ 0x50003400
1,479,920 UART: [idev] ++
1,480,088 UART: [idev] CDI.KEYID = 6
1,480,448 UART: [idev] SUBJECT.KEYID = 7
1,480,872 UART: [idev] UDS.KEYID = 0
1,481,217 ready_for_fw is high
1,481,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,078 UART: [idev] Erasing UDS.KEYID = 0
1,505,116 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,786 UART: [idev] --
1,514,753 UART: [ldev] ++
1,514,921 UART: [ldev] CDI.KEYID = 6
1,515,284 UART: [ldev] SUBJECT.KEYID = 5
1,515,710 UART: [ldev] AUTHORITY.KEYID = 7
1,516,173 UART: [ldev] FE.KEYID = 1
1,521,559 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,992 UART: [ldev] --
1,586,351 UART: [fwproc] Waiting for Commands...
1,587,044 UART: [fwproc] Received command 0x46574c44
1,587,835 UART: [fwproc] Received Image of size 114332 bytes
2,885,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,830 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,995 >>> mbox cmd response: success
3,079,191 UART: [afmc] ++
3,079,359 UART: [afmc] CDI.KEYID = 6
3,079,721 UART: [afmc] SUBJECT.KEYID = 7
3,080,146 UART: [afmc] AUTHORITY.KEYID = 5
3,115,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,758 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,448 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,497 UART: [afmc] --
3,158,477 UART: [cold-reset] --
3,159,275 UART: [state] Locking Datavault
3,160,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,026 UART: [state] Locking ICCM
3,161,564 UART: [exit] Launching FMC @ 0x40000130
3,166,893 UART:
3,166,909 UART: Running Caliptra FMC ...
3,167,317 UART:
3,167,371 UART: [state] CFI Enabled
3,178,024 UART: [fht] FMC Alias Private Key: 7
3,286,697 UART: [art] Extend RT PCRs Done
3,287,125 UART: [art] Lock RT PCRs Done
3,289,047 UART: [art] Populate DV Done
3,297,440 UART: [fht] FMC Alias Private Key: 7
3,298,446 UART: [art] Derive CDI
3,298,726 UART: [art] Store in in slot 0x4
3,384,377 UART: [art] Derive Key Pair
3,384,737 UART: [art] Store priv key in slot 0x5
3,397,905 UART: [art] Derive Key Pair - Done
3,412,721 UART: [art] Signing Cert with AUTHO
3,413,201 UART: RITY.KEYID = 7
3,428,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,046 UART: [art] PUB.X = 210ABD4D241C2F97033B284F85D355750573CA0902217AEDDCED7F2BBA57CFA82016F007F2FE411D571CCCF8F62F7049
3,435,808 UART: [art] PUB.Y = 9AA85CE4EF928A1FA1669F20F8823E111D08971B9CEF0627162BA35EF545B76B6C80DB31A9379F6F98C97FF704AE7040
3,442,755 UART: [art] SIG.R = 8EC9C14B0EA986AFAC2FCC0D070197C7AE6C6B6087C464BF569044369977862925BE5960D8A4B071F2DF40FE42A1F0A9
3,449,521 UART: [art] SIG.S = 23154097C9907F0C3CC7D664A6597F2504370AED5170AA58DB8DA2D9200147BC7280279A17141235B8597F2DAE6298A6
3,473,348 UART: Caliptra RT
3,473,601 UART: [state] CFI Enabled
3,581,158 UART: [rt] RT listening for mailbox commands...
3,581,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,404 UART: [rt]cmd =0x44504543, len=96
3,792,729 >>> mbox cmd response data (6236 bytes)
3,792,730 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,481 UART: [rt]cmd =0x52564348, len=36
3,824,536 >>> mbox cmd response data (8 bytes)
3,824,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,182 UART: [rt]cmd =0x52564348, len=36
3,855,672 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,133 ready_for_fw is high
1,363,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,234 >>> mbox cmd response: success
2,988,710 UART:
2,988,726 UART: Running Caliptra FMC ...
2,989,134 UART:
2,989,188 UART: [state] CFI Enabled
2,999,527 UART: [fht] FMC Alias Private Key: 7
3,107,208 UART: [art] Extend RT PCRs Done
3,107,636 UART: [art] Lock RT PCRs Done
3,109,244 UART: [art] Populate DV Done
3,117,457 UART: [fht] FMC Alias Private Key: 7
3,118,465 UART: [art] Derive CDI
3,118,745 UART: [art] Store in in slot 0x4
3,204,630 UART: [art] Derive Key Pair
3,204,990 UART: [art] Store priv key in slot 0x5
3,218,270 UART: [art] Derive Key Pair - Done
3,233,271 UART: [art] Signing Cert with AUTHO
3,233,751 UART: RITY.KEYID = 7
3,249,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,796 UART: [art] PUB.X = E43B4D1DB14C5229F8548D1056A505EA39AF6C260F18BB093664D49B40E884CB47B236868BDE708F89350AE95483313C
3,256,552 UART: [art] PUB.Y = C180924786779E0F6F95BC714E00FB8D174F37F7D596838BD65EC5A545AADD206E06C66C8F55A7F3D18B89306EC279EC
3,263,480 UART: [art] SIG.R = C9E98FF3CA16AF26D4B7AC86FE7EF146F9BBBD913FBF8F8D66895A3475720FC114637E218874B5FB4C91FA22D29086E7
3,270,261 UART: [art] SIG.S = 00C61B7BF35950A2E586B1BDA57F71335C79002455A841F90ACA0EE3CEA3ABE6D8CD37B199630BB1B9F17E720CA5D4A3
3,294,010 UART: Caliptra RT
3,294,263 UART: [state] CFI Enabled
3,401,929 UART: [rt] RT listening for mailbox commands...
3,402,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,651 UART: [rt]cmd =0x44504543, len=96
3,613,381 >>> mbox cmd response data (6236 bytes)
3,613,382 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,099 UART: [rt]cmd =0x52564348, len=36
3,645,144 >>> mbox cmd response data (8 bytes)
3,645,145 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,696 UART: [rt]cmd =0x52564348, len=36
3,676,112 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,925 UART: [state] LifecycleState = Unprovisioned
86,580 UART: [state] DebugLocked = No
87,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,792 UART: [kat] SHA2-256
882,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,838 UART: [kat] ++
886,990 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,785 UART: [kat] SHA2-512-ACC
897,686 UART: [kat] ECC-384
903,443 UART: [kat] HMAC-384Kdf
908,077 UART: [kat] LMS
1,476,273 UART: [kat] --
1,477,080 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 ready_for_fw is high
1,481,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,451 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,647 UART: [idev] --
1,514,804 UART: [ldev] ++
1,514,972 UART: [ldev] CDI.KEYID = 6
1,515,335 UART: [ldev] SUBJECT.KEYID = 5
1,515,761 UART: [ldev] AUTHORITY.KEYID = 7
1,516,224 UART: [ldev] FE.KEYID = 1
1,521,584 UART: [ldev] Erasing FE.KEYID = 1
1,546,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,111 UART: [ldev] --
1,585,500 UART: [fwproc] Waiting for Commands...
1,586,323 UART: [fwproc] Received command 0x46574c44
1,587,114 UART: [fwproc] Received Image of size 114332 bytes
2,884,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,418 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,325 >>> mbox cmd response: success
3,077,375 UART: [afmc] ++
3,077,543 UART: [afmc] CDI.KEYID = 6
3,077,905 UART: [afmc] SUBJECT.KEYID = 7
3,078,330 UART: [afmc] AUTHORITY.KEYID = 5
3,113,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,668 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,358 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,215 UART: [afmc] --
3,157,281 UART: [cold-reset] --
3,158,239 UART: [state] Locking Datavault
3,159,308 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,912 UART: [state] Locking ICCM
3,160,382 UART: [exit] Launching FMC @ 0x40000130
3,165,711 UART:
3,165,727 UART: Running Caliptra FMC ...
3,166,135 UART:
3,166,278 UART: [state] CFI Enabled
3,177,047 UART: [fht] FMC Alias Private Key: 7
3,284,980 UART: [art] Extend RT PCRs Done
3,285,408 UART: [art] Lock RT PCRs Done
3,287,102 UART: [art] Populate DV Done
3,295,319 UART: [fht] FMC Alias Private Key: 7
3,296,357 UART: [art] Derive CDI
3,296,637 UART: [art] Store in in slot 0x4
3,381,654 UART: [art] Derive Key Pair
3,382,014 UART: [art] Store priv key in slot 0x5
3,396,332 UART: [art] Derive Key Pair - Done
3,410,987 UART: [art] Signing Cert with AUTHO
3,411,467 UART: RITY.KEYID = 7
3,426,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,254 UART: [art] PUB.X = 4B9AA232CB147FDECD1A1FA6148B1A51462A9357D4593494617CFE05BF252CE0E7994B2A014EF9924B7507B252489269
3,434,015 UART: [art] PUB.Y = 6ED2E5963747DF4D754390D4467AD122CD23FA192BBF8D299370C8DD98C595629799D964715EE3BF54BC27F60F95E47D
3,440,964 UART: [art] SIG.R = 3174345D4A672F90BEB885EF4082B6BC8B18BA734634417DE05F7EE7CFF4CB59B342621933A52AB24FB6658B27F544FA
3,447,740 UART: [art] SIG.S = CA2ABBFD5ABCEC4DE13BD91EF51291EB9E508659C52DAED76C987DE3B1E28F918EC2148A60276C9599D71E507B6504DD
3,471,722 UART: Caliptra RT
3,472,067 UART: [state] CFI Enabled
3,581,298 UART: [rt] RT listening for mailbox commands...
3,581,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,444 UART: [rt]cmd =0x44504543, len=96
3,794,252 >>> mbox cmd response data (6236 bytes)
3,794,253 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,858 UART: [rt]cmd =0x52564348, len=36
3,826,125 >>> mbox cmd response data (8 bytes)
3,826,126 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,769 UART: [rt]cmd =0x52564348, len=36
3,857,149 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,118 ready_for_fw is high
1,363,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,239 >>> mbox cmd response: success
2,988,069 UART:
2,988,085 UART: Running Caliptra FMC ...
2,988,493 UART:
2,988,636 UART: [state] CFI Enabled
2,999,101 UART: [fht] FMC Alias Private Key: 7
3,107,766 UART: [art] Extend RT PCRs Done
3,108,194 UART: [art] Lock RT PCRs Done
3,109,708 UART: [art] Populate DV Done
3,117,995 UART: [fht] FMC Alias Private Key: 7
3,119,163 UART: [art] Derive CDI
3,119,443 UART: [art] Store in in slot 0x4
3,204,946 UART: [art] Derive Key Pair
3,205,306 UART: [art] Store priv key in slot 0x5
3,218,686 UART: [art] Derive Key Pair - Done
3,233,803 UART: [art] Signing Cert with AUTHO
3,234,283 UART: RITY.KEYID = 7
3,249,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,368 UART: [art] PUB.X = 4BB271E11B8D7F34816B51581EC5698AF7A7CD0B7139F46FBA232B6D1C6BC18071D85C4E74207360EFF2FF5F7A6780C7
3,257,143 UART: [art] PUB.Y = 75B9BD3ACCC512467D4BA8F5B705C98913AC4F46B0A6030710458C81DDE386A968D4AB9AE71C18B6199497FAD6B4D3EE
3,264,096 UART: [art] SIG.R = 50C7DAA3CDD816B25CDDB2D70D7E6479F3BBC0676E7F51FC8AB5D2BAFC4163CD5323AE2D930200331105712617AF34AB
3,270,851 UART: [art] SIG.S = F56AC674993BEA261E684216EC9F8A1EDEE4418CCA2D8C7AFAE6C73040A226246AF5076B03592F549CE9A85E1A4C9738
3,294,254 UART: Caliptra RT
3,294,599 UART: [state] CFI Enabled
3,403,976 UART: [rt] RT listening for mailbox commands...
3,404,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,136 UART: [rt]cmd =0x44504543, len=96
3,614,624 >>> mbox cmd response data (6236 bytes)
3,614,625 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,340 UART: [rt]cmd =0x52564348, len=36
3,646,407 >>> mbox cmd response data (8 bytes)
3,646,408 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,049 UART: [rt]cmd =0x52564348, len=36
3,677,343 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,843 UART: [kat] SHA2-256
903,783 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,892 UART: [kat] HMAC-384Kdf
922,438 UART: [kat] LMS
1,170,766 UART: [kat] --
1,171,397 UART: [cold-reset] ++
1,171,907 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,912 UART: [idev] SUBJECT.KEYID = 7
1,175,336 UART: [idev] UDS.KEYID = 0
1,175,681 ready_for_fw is high
1,175,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,395 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,170 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,641 UART: [ldev] --
1,282,150 UART: [fwproc] Wait for Commands...
1,282,932 UART: [fwproc] Recv command 0x46574c44
1,283,660 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,851 >>> mbox cmd response: success
2,776,011 UART: [afmc] ++
2,776,179 UART: [afmc] CDI.KEYID = 6
2,776,541 UART: [afmc] SUBJECT.KEYID = 7
2,776,966 UART: [afmc] AUTHORITY.KEYID = 5
2,812,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,696 UART: [afmc] --
2,855,728 UART: [cold-reset] --
2,856,670 UART: [state] Locking Datavault
2,857,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,411 UART: [state] Locking ICCM
2,859,077 UART: [exit] Launching FMC @ 0x40000130
2,864,406 UART:
2,864,422 UART: Running Caliptra FMC ...
2,864,830 UART:
2,864,884 UART: [state] CFI Enabled
2,875,209 UART: [fht] FMC Alias Private Key: 7
2,982,964 UART: [art] Extend RT PCRs Done
2,983,392 UART: [art] Lock RT PCRs Done
2,985,182 UART: [art] Populate DV Done
2,993,289 UART: [fht] FMC Alias Private Key: 7
2,994,395 UART: [art] Derive CDI
2,994,675 UART: [art] Store in in slot 0x4
3,080,158 UART: [art] Derive Key Pair
3,080,518 UART: [art] Store priv key in slot 0x5
3,093,630 UART: [art] Derive Key Pair - Done
3,108,580 UART: [art] Signing Cert with AUTHO
3,109,060 UART: RITY.KEYID = 7
3,124,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,047 UART: [art] PUB.X = 58EE95515BB8B8E902A1E5612C27B132602750C6CE8A372F924D15C96A945F0BCE4122C293E82C22B9EFBA99132BE58B
3,131,815 UART: [art] PUB.Y = D31335E45201FA811903B0509D7279091AF8391F61D3B72C6B92D92B86CBBFAF8F2D07F34F239C0FFE536F7E8D96A534
3,138,754 UART: [art] SIG.R = 6F3808CD455CD2F1A0FDF020B4B2D12373496148278975BAD2545A693BD972B13DA1E2B956CB1A866A418B5DBA469164
3,145,523 UART: [art] SIG.S = CDAF4C2F6447074C24EE6B436EB83794C7A5D70CA099C0E8C491D618C1A35EAF99952499CF8C9B8AB612A194CDC01971
3,169,326 UART: Caliptra RT
3,169,579 UART: [state] CFI Enabled
3,277,028 UART: [rt] RT listening for mailbox commands...
3,277,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,914 UART: [rt]cmd =0x44504543, len=96
3,487,659 >>> mbox cmd response data (6236 bytes)
3,487,660 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,013 UART: [rt]cmd =0x52564348, len=36
3,519,224 >>> mbox cmd response data (8 bytes)
3,519,225 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,826 UART: [rt]cmd =0x52564348, len=36
3,550,276 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,031 ready_for_fw is high
1,061,031 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,340 >>> mbox cmd response: success
2,690,278 UART:
2,690,294 UART: Running Caliptra FMC ...
2,690,702 UART:
2,690,756 UART: [state] CFI Enabled
2,700,623 UART: [fht] FMC Alias Private Key: 7
2,808,760 UART: [art] Extend RT PCRs Done
2,809,188 UART: [art] Lock RT PCRs Done
2,810,496 UART: [art] Populate DV Done
2,818,621 UART: [fht] FMC Alias Private Key: 7
2,819,743 UART: [art] Derive CDI
2,820,023 UART: [art] Store in in slot 0x4
2,905,614 UART: [art] Derive Key Pair
2,905,974 UART: [art] Store priv key in slot 0x5
2,918,848 UART: [art] Derive Key Pair - Done
2,933,668 UART: [art] Signing Cert with AUTHO
2,934,148 UART: RITY.KEYID = 7
2,949,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,097 UART: [art] PUB.X = 0F7E142923B5ED6AB92649BF0751A0BCC70F2DC9E76C7226A073C8704F432396E8EF1536E7D445827697BF67A3BCE039
2,956,860 UART: [art] PUB.Y = 25350453288AD3C40136B91F197464175C07D7DCCF41DB690DA0127B6C07C02D82BC8D19956FBC7933099A254C05E1DE
2,963,787 UART: [art] SIG.R = 5EAB74438F6D67F5592110FA889D35F9CBD8FEE21F0CFADE34476C0047078877E250F64C0877928761289D6E24710E4B
2,970,521 UART: [art] SIG.S = 3613C63064439ED51933397298554C1F7C81706AAAD702ED603A3E08CFB5152DA2D5F3E7D67AA243F35107238976B321
2,993,561 UART: Caliptra RT
2,993,814 UART: [state] CFI Enabled
3,101,387 UART: [rt] RT listening for mailbox commands...
3,102,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,327 UART: [rt]cmd =0x44504543, len=96
3,313,135 >>> mbox cmd response data (6236 bytes)
3,313,136 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,609 UART: [rt]cmd =0x52564348, len=36
3,344,762 >>> mbox cmd response data (8 bytes)
3,344,763 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,248 UART: [rt]cmd =0x52564348, len=36
3,375,424 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,465 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,550 UART: [cold-reset] ++
1,173,000 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 ready_for_fw is high
1,176,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,298 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,210,822 UART: [ldev] ++
1,210,990 UART: [ldev] CDI.KEYID = 6
1,211,353 UART: [ldev] SUBJECT.KEYID = 5
1,211,779 UART: [ldev] AUTHORITY.KEYID = 7
1,212,242 UART: [ldev] FE.KEYID = 1
1,217,614 UART: [ldev] Erasing FE.KEYID = 1
1,244,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,254 UART: [ldev] --
1,283,701 UART: [fwproc] Wait for Commands...
1,284,357 UART: [fwproc] Recv command 0x46574c44
1,285,085 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,740 >>> mbox cmd response: success
2,775,822 UART: [afmc] ++
2,775,990 UART: [afmc] CDI.KEYID = 6
2,776,352 UART: [afmc] SUBJECT.KEYID = 7
2,776,777 UART: [afmc] AUTHORITY.KEYID = 5
2,812,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,683 UART: [afmc] --
2,855,717 UART: [cold-reset] --
2,856,371 UART: [state] Locking Datavault
2,857,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,230 UART: [state] Locking ICCM
2,858,760 UART: [exit] Launching FMC @ 0x40000130
2,864,089 UART:
2,864,105 UART: Running Caliptra FMC ...
2,864,513 UART:
2,864,656 UART: [state] CFI Enabled
2,875,663 UART: [fht] FMC Alias Private Key: 7
2,983,740 UART: [art] Extend RT PCRs Done
2,984,168 UART: [art] Lock RT PCRs Done
2,985,958 UART: [art] Populate DV Done
2,993,855 UART: [fht] FMC Alias Private Key: 7
2,994,931 UART: [art] Derive CDI
2,995,211 UART: [art] Store in in slot 0x4
3,080,698 UART: [art] Derive Key Pair
3,081,058 UART: [art] Store priv key in slot 0x5
3,095,118 UART: [art] Derive Key Pair - Done
3,109,803 UART: [art] Signing Cert with AUTHO
3,110,283 UART: RITY.KEYID = 7
3,125,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,274 UART: [art] PUB.X = CD060EBA1B83E9C196AB9EE32C7813D4B4DCE58BAB66D79ACA2FA68695D1251C5757C8E15F9CB0B4CFD3440A2B604C67
3,133,055 UART: [art] PUB.Y = 72722861A554F49256819FBF192D1F97031A60D7205578FE908FC97A1CEEB6D1EC1BBBA8797DB8B4716AE84753F27B6A
3,140,006 UART: [art] SIG.R = 86CC9A6FF270CB89A1D50DE9F9605679A8C1B8CAE2C17F57C84C14FF4A004A7F10C054F90260F92B45C86F77C5025E92
3,146,753 UART: [art] SIG.S = 3C200134234C831BB3F5867F160CA275070A2FCF883B240877BB3EAC76E6A869E4285335FF8FF91878F87C66D5FFAFCC
3,169,967 UART: Caliptra RT
3,170,312 UART: [state] CFI Enabled
3,278,125 UART: [rt] RT listening for mailbox commands...
3,278,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,131 UART: [rt]cmd =0x44504543, len=96
3,489,880 >>> mbox cmd response data (6236 bytes)
3,489,881 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,376 UART: [rt]cmd =0x52564348, len=36
3,521,531 >>> mbox cmd response data (8 bytes)
3,521,532 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,087 UART: [rt]cmd =0x52564348, len=36
3,552,275 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,612 ready_for_fw is high
1,061,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,375 >>> mbox cmd response: success
2,689,939 UART:
2,689,955 UART: Running Caliptra FMC ...
2,690,363 UART:
2,690,506 UART: [state] CFI Enabled
2,700,709 UART: [fht] FMC Alias Private Key: 7
2,808,738 UART: [art] Extend RT PCRs Done
2,809,166 UART: [art] Lock RT PCRs Done
2,810,868 UART: [art] Populate DV Done
2,818,993 UART: [fht] FMC Alias Private Key: 7
2,820,073 UART: [art] Derive CDI
2,820,353 UART: [art] Store in in slot 0x4
2,905,522 UART: [art] Derive Key Pair
2,905,882 UART: [art] Store priv key in slot 0x5
2,919,640 UART: [art] Derive Key Pair - Done
2,934,440 UART: [art] Signing Cert with AUTHO
2,934,920 UART: RITY.KEYID = 7
2,950,342 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,107 UART: [art] PUB.X = 0F553A82FE445FF255C5982816FE8DB43571E4EA1EFC49D078C8C8225E243B29D76ECBADE70FEE81734D428A790233E2
2,957,876 UART: [art] PUB.Y = FBC502E116039B63FE4D90B9B5454FF00596D29A6871D48C154ED144385C57B9BF40ABA628FBFB38A5B465E80FF57B8F
2,964,824 UART: [art] SIG.R = 3635BC509742A38792F3EEBB3D0693253B7C965725551B49EE71F745DD31AA2859A7A9BEE91E8B0012416C9D8B16D22A
2,971,569 UART: [art] SIG.S = 243FF424215CD5666433C661854E45F5058D5114AF7569EB137750BBC24CB0D3DAEC5A8AF9412F2FDA665CDF5141F87C
2,995,691 UART: Caliptra RT
2,996,036 UART: [state] CFI Enabled
3,104,535 UART: [rt] RT listening for mailbox commands...
3,105,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,529 UART: [rt]cmd =0x44504543, len=96
3,316,534 >>> mbox cmd response data (6236 bytes)
3,316,535 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,246 UART: [rt]cmd =0x52564348, len=36
3,348,213 >>> mbox cmd response data (8 bytes)
3,348,214 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,887 UART: [rt]cmd =0x52564348, len=36
3,379,273 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,174,381 ready_for_fw is high
1,174,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,323 UART: [idev] Sha1 KeyId Algorithm
1,208,199 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,254 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,559 >>> mbox cmd response: success
2,774,780 UART: [afmc] ++
2,774,948 UART: [afmc] CDI.KEYID = 6
2,775,311 UART: [afmc] SUBJECT.KEYID = 7
2,775,737 UART: [afmc] AUTHORITY.KEYID = 5
2,811,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,019 UART: [afmc] --
2,855,069 UART: [cold-reset] --
2,855,909 UART: [state] Locking Datavault
2,857,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,632 UART: [state] Locking ICCM
2,858,150 UART: [exit] Launching FMC @ 0x40000130
2,863,479 UART:
2,863,495 UART: Running Caliptra FMC ...
2,863,903 UART:
2,863,957 UART: [state] CFI Enabled
2,874,466 UART: [fht] FMC Alias Private Key: 7
2,982,701 UART: [art] Extend RT PCRs Done
2,983,129 UART: [art] Lock RT PCRs Done
2,985,059 UART: [art] Populate DV Done
2,993,114 UART: [fht] FMC Alias Private Key: 7
2,994,146 UART: [art] Derive CDI
2,994,426 UART: [art] Store in in slot 0x4
3,079,617 UART: [art] Derive Key Pair
3,079,977 UART: [art] Store priv key in slot 0x5
3,093,681 UART: [art] Derive Key Pair - Done
3,108,562 UART: [art] Signing Cert with AUTHO
3,109,042 UART: RITY.KEYID = 7
3,124,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,783 UART: [art] PUB.X = E2D53F768F8AAEAF0EC2DDE9CEDAF6EA47F7B2F155B0AA7C870DA393A962C1B45AEA459166E8FDF86FC9DA286EAC34AE
3,131,583 UART: [art] PUB.Y = C9EDC567C215375EC3295FAF479B604D8CF85E2B33D4B6AEB9BFB37661D5E267745E5044E63C08EEF1D31B7F3F5217B0
3,138,542 UART: [art] SIG.R = DCA317F0219C7C04D29CA8331B23FD018F6AB065A034A3AA890C18463AFC76DA0E81F9E766DD8B54DAD5F64F218499C2
3,145,312 UART: [art] SIG.S = 2C07B6A69A7B9D8784DFF3B5E86CBA7AAB31556240255087062678CFAF2384CF1CE692F2A6AB558B9248BAF9A7941E64
3,169,397 UART: Caliptra RT
3,169,650 UART: [state] CFI Enabled
3,278,391 UART: [rt] RT listening for mailbox commands...
3,279,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,729 UART: [rt]cmd =0x44504543, len=96
3,490,215 >>> mbox cmd response data (6236 bytes)
3,490,216 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,799 UART: [rt]cmd =0x52564348, len=36
3,522,158 >>> mbox cmd response data (8 bytes)
3,522,159 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,772 UART: [rt]cmd =0x52564348, len=36
3,553,350 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,248 ready_for_fw is high
1,056,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,763 >>> mbox cmd response: success
2,683,331 UART:
2,683,347 UART: Running Caliptra FMC ...
2,683,755 UART:
2,683,809 UART: [state] CFI Enabled
2,694,300 UART: [fht] FMC Alias Private Key: 7
2,801,809 UART: [art] Extend RT PCRs Done
2,802,237 UART: [art] Lock RT PCRs Done
2,803,915 UART: [art] Populate DV Done
2,812,008 UART: [fht] FMC Alias Private Key: 7
2,813,182 UART: [art] Derive CDI
2,813,462 UART: [art] Store in in slot 0x4
2,899,423 UART: [art] Derive Key Pair
2,899,783 UART: [art] Store priv key in slot 0x5
2,912,485 UART: [art] Derive Key Pair - Done
2,927,131 UART: [art] Signing Cert with AUTHO
2,927,611 UART: RITY.KEYID = 7
2,942,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,210 UART: [art] PUB.X = 5DD119489D9E00C91952D11A1ED325320DB85E5D363A16D77B14F9BC522ED69AD16729D1ED1A60D86B7C03CEDAEE7DB9
2,949,966 UART: [art] PUB.Y = CB2049FD799F92803329D4AF9623E57AAA0F263D4431DD8B221EBC9BF16CBCD089D2E45DF8C52BE52393035F61DB18A5
2,956,922 UART: [art] SIG.R = E68EE44BFA82A43BB73A96439866242DDA8CAD98A86193B7AC51F7D84877FD33656C130DBB9FA06B4397FFB5F6F318E9
2,963,701 UART: [art] SIG.S = 242AB7EDFC97CAA5B0F41566285AF0B372D3458F5802CFEC48F2C3F74C5BE7DFA1D17BB26976F74D695204293519049E
2,986,991 UART: Caliptra RT
2,987,244 UART: [state] CFI Enabled
3,094,613 UART: [rt] RT listening for mailbox commands...
3,095,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,739 UART: [rt]cmd =0x44504543, len=96
3,306,508 >>> mbox cmd response data (6236 bytes)
3,306,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,182 UART: [rt]cmd =0x52564348, len=36
3,338,335 >>> mbox cmd response data (8 bytes)
3,338,336 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,887 UART: [rt]cmd =0x52564348, len=36
3,369,367 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,709 UART: [kat] HMAC-384Kdf
921,271 UART: [kat] LMS
1,169,583 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,080 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,175,022 ready_for_fw is high
1,175,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,200,096 UART: [idev] Sha1 KeyId Algorithm
1,209,150 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,217,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,019 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,018 UART: [fwproc] Recv command 0x46574c44
1,284,751 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,988 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,724 >>> mbox cmd response: success
2,774,939 UART: [afmc] ++
2,775,107 UART: [afmc] CDI.KEYID = 6
2,775,470 UART: [afmc] SUBJECT.KEYID = 7
2,775,896 UART: [afmc] AUTHORITY.KEYID = 5
2,812,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,476 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,144 UART: [afmc] --
2,855,128 UART: [cold-reset] --
2,856,106 UART: [state] Locking Datavault
2,857,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,933 UART: [state] Locking ICCM
2,858,481 UART: [exit] Launching FMC @ 0x40000130
2,863,810 UART:
2,863,826 UART: Running Caliptra FMC ...
2,864,234 UART:
2,864,377 UART: [state] CFI Enabled
2,875,080 UART: [fht] FMC Alias Private Key: 7
2,982,259 UART: [art] Extend RT PCRs Done
2,982,687 UART: [art] Lock RT PCRs Done
2,984,355 UART: [art] Populate DV Done
2,992,784 UART: [fht] FMC Alias Private Key: 7
2,993,812 UART: [art] Derive CDI
2,994,092 UART: [art] Store in in slot 0x4
3,079,875 UART: [art] Derive Key Pair
3,080,235 UART: [art] Store priv key in slot 0x5
3,093,375 UART: [art] Derive Key Pair - Done
3,108,257 UART: [art] Signing Cert with AUTHO
3,108,737 UART: RITY.KEYID = 7
3,123,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,386 UART: [art] PUB.X = 775072C706DF367D188D5490BCD57D95D03452A4C501F9A4360AAF1E22A7C5192A567C5BB96420083E5B47BE3FAED6A7
3,131,148 UART: [art] PUB.Y = EEC6939E4899CF620E13B2FE803CCA735B972C51DCDFC65C71A3419A00318EAC47D35BC65089391AACB11B9063F60B5D
3,138,082 UART: [art] SIG.R = AB1F47A5B78AC488DE4BC9E73030723520F7038E9AF65DFEA901DE4D70A4EE1DEE127E186E6DEA87A3D9339540BA98E2
3,144,862 UART: [art] SIG.S = 5C802E1398DEC562622FF4AA309EDCBD425B0536849B878421296C14BECA98740888E9F03A70A390CA1DE95FFDEC345F
3,168,821 UART: Caliptra RT
3,169,166 UART: [state] CFI Enabled
3,277,151 UART: [rt] RT listening for mailbox commands...
3,277,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,183 UART: [rt]cmd =0x44504543, len=96
3,488,623 >>> mbox cmd response data (6236 bytes)
3,488,624 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,161 UART: [rt]cmd =0x52564348, len=36
3,520,462 >>> mbox cmd response data (8 bytes)
3,520,463 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,264 UART: [rt]cmd =0x52564348, len=36
3,551,534 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,399 ready_for_fw is high
1,056,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,692 >>> mbox cmd response: success
2,685,490 UART:
2,685,506 UART: Running Caliptra FMC ...
2,685,914 UART:
2,686,057 UART: [state] CFI Enabled
2,696,736 UART: [fht] FMC Alias Private Key: 7
2,804,323 UART: [art] Extend RT PCRs Done
2,804,751 UART: [art] Lock RT PCRs Done
2,806,197 UART: [art] Populate DV Done
2,814,280 UART: [fht] FMC Alias Private Key: 7
2,815,250 UART: [art] Derive CDI
2,815,530 UART: [art] Store in in slot 0x4
2,901,197 UART: [art] Derive Key Pair
2,901,557 UART: [art] Store priv key in slot 0x5
2,914,917 UART: [art] Derive Key Pair - Done
2,929,340 UART: [art] Signing Cert with AUTHO
2,929,820 UART: RITY.KEYID = 7
2,944,898 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,663 UART: [art] PUB.X = DABA2D6D517C256B445FB944F89EA86DD81210F1DC2636628D67C0ED5FBDBF84591844EB7A6D6453294FA783AA17E44C
2,952,445 UART: [art] PUB.Y = FAA1040189D1E8235E7A7F28F7FCEBEFC03865A3489BA681C5607F2BF21AF263F226AB223259AFA6C9B62517D5AFB11A
2,959,403 UART: [art] SIG.R = 5B18D44DCAB9516042600BF8F98F890A06C6E1D439FC23F06B8ABEB0A0F932A40113045895BCAAA1D709F76C38FF209F
2,966,165 UART: [art] SIG.S = 40DBE1DCA09226C679EC6EC1FCA29D487E36650D070ED07544A093611E22A773847CD04F331B9FBE8424EE4CB7C54A43
2,989,491 UART: Caliptra RT
2,989,836 UART: [state] CFI Enabled
3,097,015 UART: [rt] RT listening for mailbox commands...
3,097,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,019 UART: [rt]cmd =0x44504543, len=96
3,308,239 >>> mbox cmd response data (6236 bytes)
3,308,240 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,831 UART: [rt]cmd =0x52564348, len=36
3,339,834 >>> mbox cmd response data (8 bytes)
3,339,835 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,366 UART: [rt]cmd =0x52564348, len=36
3,370,864 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
86,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,727 UART: [kat] SHA2-256
881,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,773 UART: [kat] ++
885,925 UART: [kat] sha1
890,213 UART: [kat] SHA2-256
892,151 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,358 UART: [kat] LMS
1,475,554 UART: [kat] --
1,476,507 UART: [cold-reset] ++
1,476,983 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 ready_for_fw is high
1,480,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,342 UART: [idev] Erasing UDS.KEYID = 0
1,504,724 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,256 UART: [idev] --
1,514,319 UART: [ldev] ++
1,514,487 UART: [ldev] CDI.KEYID = 6
1,514,850 UART: [ldev] SUBJECT.KEYID = 5
1,515,276 UART: [ldev] AUTHORITY.KEYID = 7
1,515,739 UART: [ldev] FE.KEYID = 1
1,520,955 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,410 UART: [ldev] --
1,585,925 UART: [fwproc] Waiting for Commands...
1,586,672 UART: [fwproc] Received command 0x46574c44
1,587,463 UART: [fwproc] Received Image of size 114332 bytes
2,885,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,518 >>> mbox cmd response: success
3,078,654 UART: [afmc] ++
3,078,822 UART: [afmc] CDI.KEYID = 6
3,079,184 UART: [afmc] SUBJECT.KEYID = 7
3,079,609 UART: [afmc] AUTHORITY.KEYID = 5
3,114,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,685 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,375 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,346 UART: [afmc] --
3,158,342 UART: [cold-reset] --
3,159,002 UART: [state] Locking Datavault
3,160,393 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,997 UART: [state] Locking ICCM
3,161,499 UART: [exit] Launching FMC @ 0x40000130
3,166,828 UART:
3,166,844 UART: Running Caliptra FMC ...
3,167,252 UART:
3,167,306 UART: [state] CFI Enabled
3,178,035 UART: [fht] FMC Alias Private Key: 7
3,286,052 UART: [art] Extend RT PCRs Done
3,286,480 UART: [art] Lock RT PCRs Done
3,288,296 UART: [art] Populate DV Done
3,296,513 UART: [fht] FMC Alias Private Key: 7
3,297,513 UART: [art] Derive CDI
3,297,793 UART: [art] Store in in slot 0x4
3,383,506 UART: [art] Derive Key Pair
3,383,866 UART: [art] Store priv key in slot 0x5
3,397,334 UART: [art] Derive Key Pair - Done
3,412,117 UART: [art] Signing Cert with AUTHO
3,412,597 UART: RITY.KEYID = 7
3,427,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,576 UART: [art] PUB.X = 05804DF33E49CF7173BE2751397E59356FD987B3FB3818D0F6854ABEE1A8501B2A9D031B1701B10B2714BA09A715A124
3,435,329 UART: [art] PUB.Y = F4AF75B7A117345BF4B10DBBF0A8862DFDE85F5D1F60C38042DC49E87411D63B504CEF8B7E8297778ACAE449C86EC5EA
3,442,294 UART: [art] SIG.R = 9BE6431C6D3DC2A195C3ACBDB1598D4FCC0C920962573BB22CA3B87F2C3946DECA3D4BAD1AD43C88C45DAE50C24FCC76
3,449,084 UART: [art] SIG.S = 0536A6FD6F493CF52759858D3B6A9A6CE929BF95F15FB34DC6F213DE29E81535A364BF46D4C60E8F25D4237C8393782A
3,472,775 UART: Caliptra RT
3,473,028 UART: [state] CFI Enabled
3,581,651 UART: [rt] RT listening for mailbox commands...
3,582,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,653 UART: [rt]cmd =0x44504543, len=96
3,791,996 >>> mbox cmd response data (6236 bytes)
3,791,997 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,432 UART: [rt]cmd =0x52564348, len=36
3,823,457 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,719 ready_for_fw is high
1,361,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,108 >>> mbox cmd response: success
2,989,500 UART:
2,989,516 UART: Running Caliptra FMC ...
2,989,924 UART:
2,989,978 UART: [state] CFI Enabled
3,000,499 UART: [fht] FMC Alias Private Key: 7
3,108,788 UART: [art] Extend RT PCRs Done
3,109,216 UART: [art] Lock RT PCRs Done
3,110,508 UART: [art] Populate DV Done
3,118,717 UART: [fht] FMC Alias Private Key: 7
3,119,657 UART: [art] Derive CDI
3,119,937 UART: [art] Store in in slot 0x4
3,205,814 UART: [art] Derive Key Pair
3,206,174 UART: [art] Store priv key in slot 0x5
3,218,792 UART: [art] Derive Key Pair - Done
3,234,032 UART: [art] Signing Cert with AUTHO
3,234,512 UART: RITY.KEYID = 7
3,250,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,869 UART: [art] PUB.X = 87C65F60CF2574B929C1AC168395568475C0C5EE434365ECB61B018885839F6F74950F7C37A0A2E8E4A203C0818E0EB6
3,257,623 UART: [art] PUB.Y = 5452B79B1FD741B6D58B6B587802C4C90E4AA42A3C2C2876742679FADAB09361B247D7CB5E43DB94BD230349A63D90B7
3,264,568 UART: [art] SIG.R = B6ED2247A520EF6E0AF61F180D16636EF161156F80E2A4DDBF5B3A99E038AA2DACC781620D0A8BE89ADF64B7318DCEA7
3,271,346 UART: [art] SIG.S = BD5F81100A6E3F667C5BED3EFE5E3900C42C4061C54524E737DAE1C23FE0A0F31F59E269A656CAE9980AB3BC598AA29A
3,295,123 UART: Caliptra RT
3,295,376 UART: [state] CFI Enabled
3,404,550 UART: [rt] RT listening for mailbox commands...
3,405,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,672 UART: [rt]cmd =0x44504543, len=96
3,616,555 >>> mbox cmd response data (6236 bytes)
3,616,556 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,181 UART: [rt]cmd =0x52564348, len=36
3,648,006 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,800 UART: [kat] SHA2-256
892,738 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
907,965 UART: [kat] LMS
1,476,161 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 ready_for_fw is high
1,481,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,989 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,407 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,521,950 UART: [ldev] Erasing FE.KEYID = 1
1,547,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,371 UART: [ldev] --
1,586,834 UART: [fwproc] Waiting for Commands...
1,587,587 UART: [fwproc] Received command 0x46574c44
1,588,378 UART: [fwproc] Received Image of size 114332 bytes
2,886,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,931 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,092 >>> mbox cmd response: success
3,080,240 UART: [afmc] ++
3,080,408 UART: [afmc] CDI.KEYID = 6
3,080,770 UART: [afmc] SUBJECT.KEYID = 7
3,081,195 UART: [afmc] AUTHORITY.KEYID = 5
3,116,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,590 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,983 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,673 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,500 UART: [afmc] --
3,159,566 UART: [cold-reset] --
3,160,340 UART: [state] Locking Datavault
3,161,263 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,867 UART: [state] Locking ICCM
3,162,449 UART: [exit] Launching FMC @ 0x40000130
3,167,778 UART:
3,167,794 UART: Running Caliptra FMC ...
3,168,202 UART:
3,168,345 UART: [state] CFI Enabled
3,179,192 UART: [fht] FMC Alias Private Key: 7
3,286,695 UART: [art] Extend RT PCRs Done
3,287,123 UART: [art] Lock RT PCRs Done
3,288,609 UART: [art] Populate DV Done
3,297,068 UART: [fht] FMC Alias Private Key: 7
3,297,998 UART: [art] Derive CDI
3,298,278 UART: [art] Store in in slot 0x4
3,383,345 UART: [art] Derive Key Pair
3,383,705 UART: [art] Store priv key in slot 0x5
3,397,019 UART: [art] Derive Key Pair - Done
3,411,837 UART: [art] Signing Cert with AUTHO
3,412,317 UART: RITY.KEYID = 7
3,428,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,828 UART: [art] PUB.X = 93B3B408F3EFF377A7067E0BBAEF5CC906BFFD0FE114EB4B92CA17246BB40A5918A58F256E1ED81A370123CB430A1DFC
3,435,594 UART: [art] PUB.Y = F2CBD27C4A3DE9EB799E829DF1B2910F713E72287015734514E9BAE9DED6A1A5FE59D257D2D0677AAF3A3E253AA8827E
3,442,555 UART: [art] SIG.R = 21E97F833DC8584B785602C564E4B0AB185FAE44B91C3D5E7DC4001C7D7587F50BD3A86090BA6CE971837AE284A20154
3,449,296 UART: [art] SIG.S = 71B34AB206CE5339C6D0E497B8DD541183D58749983C53AE50ED8668BBC79CFA7077EE4E95BB9A51AFB3ADFE2C93CC50
3,473,340 UART: Caliptra RT
3,473,685 UART: [state] CFI Enabled
3,582,911 UART: [rt] RT listening for mailbox commands...
3,583,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,061 UART: [rt]cmd =0x44504543, len=96
3,794,783 >>> mbox cmd response data (6236 bytes)
3,794,784 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,333 UART: [rt]cmd =0x52564348, len=36
3,826,470 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,565 >>> mbox cmd response: success
2,991,799 UART:
2,991,815 UART: Running Caliptra FMC ...
2,992,223 UART:
2,992,366 UART: [state] CFI Enabled
3,002,649 UART: [fht] FMC Alias Private Key: 7
3,111,300 UART: [art] Extend RT PCRs Done
3,111,728 UART: [art] Lock RT PCRs Done
3,113,518 UART: [art] Populate DV Done
3,121,873 UART: [fht] FMC Alias Private Key: 7
3,123,055 UART: [art] Derive CDI
3,123,335 UART: [art] Store in in slot 0x4
3,209,088 UART: [art] Derive Key Pair
3,209,448 UART: [art] Store priv key in slot 0x5
3,222,772 UART: [art] Derive Key Pair - Done
3,237,972 UART: [art] Signing Cert with AUTHO
3,238,452 UART: RITY.KEYID = 7
3,253,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,531 UART: [art] PUB.X = 454F4021CE158098DDE53A4DEFA91035692A89E73A6AC48025AD12B04ADEA2B3C4678D548F8B4EED4443216A995D806A
3,261,307 UART: [art] PUB.Y = 818D7E25FCD9984D56AEC071DD49A1EC86937CB0BC8B5CEB5BDD3A420DE35868F70AB16B451BC9E63C702ED3476EC787
3,268,269 UART: [art] SIG.R = E0B9E756406E988500577021D57BFCD202FBD6F646E6BCD49E1917D5B7A9F26483BD8C5AC20955CAA4720A56D9364623
3,275,010 UART: [art] SIG.S = D86FC1929555F6571BCF0456AEDC906A7F59ED5294EDC75616BA33CB4743E580E0221219339D5B3C987EC8D1BCAD66DF
3,298,992 UART: Caliptra RT
3,299,337 UART: [state] CFI Enabled
3,407,731 UART: [rt] RT listening for mailbox commands...
3,408,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,853 UART: [rt]cmd =0x44504543, len=96
3,619,008 >>> mbox cmd response data (6236 bytes)
3,619,009 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,496 UART: [rt]cmd =0x52564348, len=36
3,650,473 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
892,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,043 UART: [kat] ++
897,195 UART: [kat] sha1
901,553 UART: [kat] SHA2-256
903,493 UART: [kat] SHA2-384
906,380 UART: [kat] SHA2-512-ACC
908,281 UART: [kat] ECC-384
918,230 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,999 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 ready_for_fw is high
1,176,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,659 UART: [idev] Sha1 KeyId Algorithm
1,210,175 UART: [idev] --
1,211,363 UART: [ldev] ++
1,211,531 UART: [ldev] CDI.KEYID = 6
1,211,894 UART: [ldev] SUBJECT.KEYID = 5
1,212,320 UART: [ldev] AUTHORITY.KEYID = 7
1,212,783 UART: [ldev] FE.KEYID = 1
1,218,059 UART: [ldev] Erasing FE.KEYID = 1
1,244,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,453 UART: [ldev] --
1,283,938 UART: [fwproc] Wait for Commands...
1,284,626 UART: [fwproc] Recv command 0x46574c44
1,285,354 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,027 >>> mbox cmd response: success
2,776,183 UART: [afmc] ++
2,776,351 UART: [afmc] CDI.KEYID = 6
2,776,713 UART: [afmc] SUBJECT.KEYID = 7
2,777,138 UART: [afmc] AUTHORITY.KEYID = 5
2,812,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,526 UART: [afmc] --
2,856,476 UART: [cold-reset] --
2,857,550 UART: [state] Locking Datavault
2,858,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,397 UART: [state] Locking ICCM
2,859,925 UART: [exit] Launching FMC @ 0x40000130
2,865,254 UART:
2,865,270 UART: Running Caliptra FMC ...
2,865,678 UART:
2,865,732 UART: [state] CFI Enabled
2,876,453 UART: [fht] FMC Alias Private Key: 7
2,983,432 UART: [art] Extend RT PCRs Done
2,983,860 UART: [art] Lock RT PCRs Done
2,985,598 UART: [art] Populate DV Done
2,994,045 UART: [fht] FMC Alias Private Key: 7
2,994,987 UART: [art] Derive CDI
2,995,267 UART: [art] Store in in slot 0x4
3,081,190 UART: [art] Derive Key Pair
3,081,550 UART: [art] Store priv key in slot 0x5
3,094,640 UART: [art] Derive Key Pair - Done
3,109,168 UART: [art] Signing Cert with AUTHO
3,109,648 UART: RITY.KEYID = 7
3,124,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,675 UART: [art] PUB.X = A61DA609F75A2B3C357E12B2115E1481DA2BE5BA2FE06B936A556B72A365D27D243908706B2AF277FB4676D445B7BCAD
3,132,447 UART: [art] PUB.Y = 9B64541357EC4786F891A99094E737E26204C6251B0C40B74FED4D43276AE5BC3B55AE71A314311F3EE8C26F49FB970E
3,139,388 UART: [art] SIG.R = 78AA3A446C14E7E03717A92F88134A1E186BC8629AE44ADEC60733326F012FE81BCD97AF45BB519FBEA52DFD8B06EDF3
3,146,165 UART: [art] SIG.S = 6F4580A24A42017051041BC9F0D48AEB1D15DCB3B7BADBD272D4588B9C09A1EB2EAAA2923FFA7CCFD74B715D2E21FA22
3,169,943 UART: Caliptra RT
3,170,196 UART: [state] CFI Enabled
3,277,327 UART: [rt] RT listening for mailbox commands...
3,277,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,415 UART: [rt]cmd =0x44504543, len=96
3,488,507 >>> mbox cmd response data (6236 bytes)
3,488,508 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,073 UART: [rt]cmd =0x52564348, len=36
3,519,984 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,147 ready_for_fw is high
1,061,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,588 >>> mbox cmd response: success
2,690,136 UART:
2,690,152 UART: Running Caliptra FMC ...
2,690,560 UART:
2,690,614 UART: [state] CFI Enabled
2,701,219 UART: [fht] FMC Alias Private Key: 7
2,808,988 UART: [art] Extend RT PCRs Done
2,809,416 UART: [art] Lock RT PCRs Done
2,811,150 UART: [art] Populate DV Done
2,819,229 UART: [fht] FMC Alias Private Key: 7
2,820,291 UART: [art] Derive CDI
2,820,571 UART: [art] Store in in slot 0x4
2,906,212 UART: [art] Derive Key Pair
2,906,572 UART: [art] Store priv key in slot 0x5
2,919,656 UART: [art] Derive Key Pair - Done
2,934,195 UART: [art] Signing Cert with AUTHO
2,934,675 UART: RITY.KEYID = 7
2,950,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,782 UART: [art] PUB.X = E13A3A2CB4A76DA5624B79EEF822659804EE5C5CDAAA3436328A644087C07F35D95FADF7032ED36BB7BADBABDF674452
2,957,564 UART: [art] PUB.Y = 750D231985D53588FE7E809CC561749DC84422FBADF3A1D4C76ED7F4D1515298E9AA1A4E1CFB3EC7B19A110475B27B4E
2,964,518 UART: [art] SIG.R = A1D0FE0272AA7C5DEA5FDA645DC3E0557B641193442346BD47E32F9B93D67CE029A285F312D3BBB8AA1D11AB21E73710
2,971,297 UART: [art] SIG.S = AC7261BB2F7C5B9F147F9596A606756B4B3EE3CD37F225376B63D0E57CFEA3717E4252F74823E98A9B806397407FB3E6
2,995,071 UART: Caliptra RT
2,995,324 UART: [state] CFI Enabled
3,103,244 UART: [rt] RT listening for mailbox commands...
3,103,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,594 UART: [rt]cmd =0x44504543, len=96
3,313,979 >>> mbox cmd response data (6236 bytes)
3,313,980 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,557 UART: [rt]cmd =0x52564348, len=36
3,346,002 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
893,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,814 UART: [kat] ++
897,966 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
907,087 UART: [kat] SHA2-512-ACC
908,988 UART: [kat] ECC-384
919,341 UART: [kat] HMAC-384Kdf
923,967 UART: [kat] LMS
1,172,295 UART: [kat] --
1,173,266 UART: [cold-reset] ++
1,173,678 UART: [fht] FHT @ 0x50003400
1,176,393 UART: [idev] ++
1,176,561 UART: [idev] CDI.KEYID = 6
1,176,921 UART: [idev] SUBJECT.KEYID = 7
1,177,345 UART: [idev] UDS.KEYID = 0
1,177,690 ready_for_fw is high
1,177,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,729 UART: [idev] Erasing UDS.KEYID = 0
1,203,272 UART: [idev] Sha1 KeyId Algorithm
1,211,840 UART: [idev] --
1,212,938 UART: [ldev] ++
1,213,106 UART: [ldev] CDI.KEYID = 6
1,213,469 UART: [ldev] SUBJECT.KEYID = 5
1,213,895 UART: [ldev] AUTHORITY.KEYID = 7
1,214,358 UART: [ldev] FE.KEYID = 1
1,219,420 UART: [ldev] Erasing FE.KEYID = 1
1,245,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,566 UART: [ldev] --
1,284,877 UART: [fwproc] Wait for Commands...
1,285,665 UART: [fwproc] Recv command 0x46574c44
1,286,393 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,648 >>> mbox cmd response: success
2,777,784 UART: [afmc] ++
2,777,952 UART: [afmc] CDI.KEYID = 6
2,778,314 UART: [afmc] SUBJECT.KEYID = 7
2,778,739 UART: [afmc] AUTHORITY.KEYID = 5
2,814,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,103 UART: [afmc] --
2,858,043 UART: [cold-reset] --
2,859,005 UART: [state] Locking Datavault
2,860,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,620 UART: [state] Locking ICCM
2,861,214 UART: [exit] Launching FMC @ 0x40000130
2,866,543 UART:
2,866,559 UART: Running Caliptra FMC ...
2,866,967 UART:
2,867,110 UART: [state] CFI Enabled
2,877,783 UART: [fht] FMC Alias Private Key: 7
2,985,312 UART: [art] Extend RT PCRs Done
2,985,740 UART: [art] Lock RT PCRs Done
2,987,456 UART: [art] Populate DV Done
2,995,677 UART: [fht] FMC Alias Private Key: 7
2,996,833 UART: [art] Derive CDI
2,997,113 UART: [art] Store in in slot 0x4
3,083,302 UART: [art] Derive Key Pair
3,083,662 UART: [art] Store priv key in slot 0x5
3,097,216 UART: [art] Derive Key Pair - Done
3,112,407 UART: [art] Signing Cert with AUTHO
3,112,887 UART: RITY.KEYID = 7
3,128,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,362 UART: [art] PUB.X = F0BB9AD8789BBDD2B47A3145C9031634C1F05DC96483E5B7283B5C2A724E52020D20914C67EF276F2F2150C4FC16A3AE
3,136,129 UART: [art] PUB.Y = 0129DD6376757D76A7DF39D9123994EDA9704F91FC19D726191A589E7B69BA2966F7DF50DB262C6823C273EDDECCD6C4
3,143,082 UART: [art] SIG.R = 8F80CCAD14F28BA9103E12B3B575615960AFB5D81BA5E06FE13637C2F773B6B0F4F3B530A1CA5DF174F8DB26B9F8C5B2
3,149,868 UART: [art] SIG.S = 40097E23B544C7B21484F62D17E3C11D80EEBECCDA645B6FBB2D0ECD6DC09FCEB5635B16E8A7BCB842144CF076F835E2
3,173,885 UART: Caliptra RT
3,174,230 UART: [state] CFI Enabled
3,282,147 UART: [rt] RT listening for mailbox commands...
3,282,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,875 UART: [rt]cmd =0x44504543, len=96
3,494,249 >>> mbox cmd response data (6236 bytes)
3,494,250 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,825 UART: [rt]cmd =0x52564348, len=36
3,525,988 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,063 >>> mbox cmd response: success
2,688,937 UART:
2,688,953 UART: Running Caliptra FMC ...
2,689,361 UART:
2,689,504 UART: [state] CFI Enabled
2,700,297 UART: [fht] FMC Alias Private Key: 7
2,808,242 UART: [art] Extend RT PCRs Done
2,808,670 UART: [art] Lock RT PCRs Done
2,810,258 UART: [art] Populate DV Done
2,818,307 UART: [fht] FMC Alias Private Key: 7
2,819,371 UART: [art] Derive CDI
2,819,651 UART: [art] Store in in slot 0x4
2,905,684 UART: [art] Derive Key Pair
2,906,044 UART: [art] Store priv key in slot 0x5
2,919,406 UART: [art] Derive Key Pair - Done
2,934,260 UART: [art] Signing Cert with AUTHO
2,934,740 UART: RITY.KEYID = 7
2,950,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,953 UART: [art] PUB.X = E16E9EF0FF00484F96CC8EB335115E4341506C4DE3642E5A21D4DEA37844FD9908DD50ED5D77580EDDD6010FD2CD8102
2,957,696 UART: [art] PUB.Y = A81C8FFCD809C38D56006F12835EDFF475F2ABC2488F93E01D895FCEDF77794AD1DAEB24E4A94C936C33A2E2F49127D8
2,964,637 UART: [art] SIG.R = 771C2BD424419D709A119F08E3EE3384D9963E06C2085211D1A17DA8082AE1D9EB6030D505DA231C11118928539667BC
2,971,384 UART: [art] SIG.S = C01C0EB446F08D9BEFDBF9801332EDE7F1D120C798EFF55D10B5054EFBA4EBB2CB8AB2028AC7B482210E232ED8366DCE
2,995,269 UART: Caliptra RT
2,995,614 UART: [state] CFI Enabled
3,103,225 UART: [rt] RT listening for mailbox commands...
3,103,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,259 UART: [rt]cmd =0x44504543, len=96
3,314,601 >>> mbox cmd response data (6236 bytes)
3,314,602 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,107 UART: [rt]cmd =0x52564348, len=36
3,346,240 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,174,007 ready_for_fw is high
1,174,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,488 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,711 >>> mbox cmd response: success
2,772,746 UART: [afmc] ++
2,772,914 UART: [afmc] CDI.KEYID = 6
2,773,277 UART: [afmc] SUBJECT.KEYID = 7
2,773,703 UART: [afmc] AUTHORITY.KEYID = 5
2,809,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,147 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,866 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,609 UART: [afmc] --
2,852,611 UART: [cold-reset] --
2,853,491 UART: [state] Locking Datavault
2,854,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,158 UART: [state] Locking ICCM
2,855,626 UART: [exit] Launching FMC @ 0x40000130
2,860,955 UART:
2,860,971 UART: Running Caliptra FMC ...
2,861,379 UART:
2,861,433 UART: [state] CFI Enabled
2,871,550 UART: [fht] FMC Alias Private Key: 7
2,979,715 UART: [art] Extend RT PCRs Done
2,980,143 UART: [art] Lock RT PCRs Done
2,981,513 UART: [art] Populate DV Done
2,989,716 UART: [fht] FMC Alias Private Key: 7
2,990,754 UART: [art] Derive CDI
2,991,034 UART: [art] Store in in slot 0x4
3,076,667 UART: [art] Derive Key Pair
3,077,027 UART: [art] Store priv key in slot 0x5
3,090,153 UART: [art] Derive Key Pair - Done
3,104,933 UART: [art] Signing Cert with AUTHO
3,105,413 UART: RITY.KEYID = 7
3,120,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,442 UART: [art] PUB.X = 49D04D7C1B8D9F93025C175604EE1F11B53EF9DBA36C1C2FD3D4C31186B360C6B54F12A65084345551A16B69CD48D5CB
3,128,212 UART: [art] PUB.Y = 73C2B93F9E6B79B9B3031238BD50CB29925473A57089377D082F3D4B465F91A89C05651655957F78946CFD23B9A55B56
3,135,143 UART: [art] SIG.R = 56EFF3143D25439458667BE2E1D17F736C646CEFC15077CDB66270F3AC728D34F7AC6334DEC278E95179199222B4ADE9
3,141,915 UART: [art] SIG.S = 1BD9E2173D0A84EB5F50A8D9DE9055C445210C96BED060C19F12A565C67D29B6AB4DD3C207F708343400846634026FA5
3,165,779 UART: Caliptra RT
3,166,032 UART: [state] CFI Enabled
3,272,959 UART: [rt] RT listening for mailbox commands...
3,273,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,053 UART: [rt]cmd =0x44504543, len=96
3,483,085 >>> mbox cmd response data (6236 bytes)
3,483,086 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,533 UART: [rt]cmd =0x52564348, len=36
3,514,778 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,350 ready_for_fw is high
1,056,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,919 >>> mbox cmd response: success
2,683,443 UART:
2,683,459 UART: Running Caliptra FMC ...
2,683,867 UART:
2,683,921 UART: [state] CFI Enabled
2,694,066 UART: [fht] FMC Alias Private Key: 7
2,802,475 UART: [art] Extend RT PCRs Done
2,802,903 UART: [art] Lock RT PCRs Done
2,804,333 UART: [art] Populate DV Done
2,812,408 UART: [fht] FMC Alias Private Key: 7
2,813,540 UART: [art] Derive CDI
2,813,820 UART: [art] Store in in slot 0x4
2,899,805 UART: [art] Derive Key Pair
2,900,165 UART: [art] Store priv key in slot 0x5
2,912,773 UART: [art] Derive Key Pair - Done
2,927,651 UART: [art] Signing Cert with AUTHO
2,928,131 UART: RITY.KEYID = 7
2,943,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,160 UART: [art] PUB.X = 3E1A2531B65A66A352421A685F663988A57C59AB9165278C234384E43BDD89D94D4050E85D98C9F66EDFFCCAC4CA9707
2,950,929 UART: [art] PUB.Y = A7CB021BCF8A8FF13F299DD66112AE38BD1F13A0EE1B41763C31D11231F761F54DF9E59782A5653D56F22DFF7A8896D6
2,957,886 UART: [art] SIG.R = 5417071EEC9B4CAC9DEFDB338C296EAC2A648F5D4443204F875EB9C80A421AEF0D977E9559E51656E1F090B66B18EC7D
2,964,659 UART: [art] SIG.S = 18F48ABDE2EEBC6C6C1C8A5751006A500D9A980C16B8A788740013C371D8A4636137251D1811EBAE9703DE46C61E29A2
2,988,587 UART: Caliptra RT
2,988,840 UART: [state] CFI Enabled
3,096,447 UART: [rt] RT listening for mailbox commands...
3,097,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,773 UART: [rt]cmd =0x44504543, len=96
3,306,721 >>> mbox cmd response data (6236 bytes)
3,306,722 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,419 UART: [rt]cmd =0x52564348, len=36
3,338,432 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,174,368 ready_for_fw is high
1,174,368 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,293 UART: [fwproc] Wait for Commands...
1,282,076 UART: [fwproc] Recv command 0x46574c44
1,282,809 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,658 >>> mbox cmd response: success
2,773,771 UART: [afmc] ++
2,773,939 UART: [afmc] CDI.KEYID = 6
2,774,302 UART: [afmc] SUBJECT.KEYID = 7
2,774,728 UART: [afmc] AUTHORITY.KEYID = 5
2,810,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,194 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,913 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,624 UART: [afmc] --
2,853,656 UART: [cold-reset] --
2,854,352 UART: [state] Locking Datavault
2,855,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,361 UART: [state] Locking ICCM
2,856,839 UART: [exit] Launching FMC @ 0x40000130
2,862,168 UART:
2,862,184 UART: Running Caliptra FMC ...
2,862,592 UART:
2,862,735 UART: [state] CFI Enabled
2,873,336 UART: [fht] FMC Alias Private Key: 7
2,981,007 UART: [art] Extend RT PCRs Done
2,981,435 UART: [art] Lock RT PCRs Done
2,983,181 UART: [art] Populate DV Done
2,991,550 UART: [fht] FMC Alias Private Key: 7
2,992,718 UART: [art] Derive CDI
2,992,998 UART: [art] Store in in slot 0x4
3,078,555 UART: [art] Derive Key Pair
3,078,915 UART: [art] Store priv key in slot 0x5
3,092,129 UART: [art] Derive Key Pair - Done
3,106,837 UART: [art] Signing Cert with AUTHO
3,107,317 UART: RITY.KEYID = 7
3,122,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,268 UART: [art] PUB.X = 4E7B4B77757D1D08F99D16CD9D043F0280CC2EDD6C8AAB28047D3089B946C3FC6EE8B6689CC51E8F496960E9150CD652
3,130,031 UART: [art] PUB.Y = 0D8FEF5CB554C095B21C062E1C94D3F52CC0BC620B323C091E6C64E1B9378031C60264F2C1D02308E579D6076C51D46E
3,136,962 UART: [art] SIG.R = 9AF13E5E70A3D1F3F79D6830BD1F8905CA93C8B9DBFA2999DD59EB41AB6B76A8AE16A511E85BC9ACFC5ABD7FDABBADB4
3,143,765 UART: [art] SIG.S = 550D704AF7216A438FD6B8D29D1904884280EEDC9D7663B01533314B4B627906E0315AF9DD75E4EB47BC0BB70FC2810E
3,167,798 UART: Caliptra RT
3,168,143 UART: [state] CFI Enabled
3,276,260 UART: [rt] RT listening for mailbox commands...
3,276,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,200 UART: [rt]cmd =0x44504543, len=96
3,488,565 >>> mbox cmd response data (6236 bytes)
3,488,566 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,201 UART: [rt]cmd =0x52564348, len=36
3,519,906 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,653 ready_for_fw is high
1,056,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,280 >>> mbox cmd response: success
2,684,882 UART:
2,684,898 UART: Running Caliptra FMC ...
2,685,306 UART:
2,685,449 UART: [state] CFI Enabled
2,696,224 UART: [fht] FMC Alias Private Key: 7
2,803,505 UART: [art] Extend RT PCRs Done
2,803,933 UART: [art] Lock RT PCRs Done
2,805,347 UART: [art] Populate DV Done
2,813,776 UART: [fht] FMC Alias Private Key: 7
2,814,878 UART: [art] Derive CDI
2,815,158 UART: [art] Store in in slot 0x4
2,900,617 UART: [art] Derive Key Pair
2,900,977 UART: [art] Store priv key in slot 0x5
2,914,103 UART: [art] Derive Key Pair - Done
2,929,125 UART: [art] Signing Cert with AUTHO
2,929,605 UART: RITY.KEYID = 7
2,944,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,690 UART: [art] PUB.X = D272C8A9BDECC06DB05B058B6E68ED38E3AC7B6C5F8CED9E39A31414610AF3A338D72AE43FEF9853C9F23356BBF0C272
2,952,474 UART: [art] PUB.Y = E774E4574BBD836EDEBD0D86140B24A9A36A108AB96F1D2D37656AB2882A9FB96F673027D82DC0E40B34E1C3E2A304DD
2,959,424 UART: [art] SIG.R = C0657159A498122A1CB73E8DA8AB5EC1E293593F6B76F4B506CE437E8CBFCD4F87639F10C1F1E61602EF2C6AC83D48F9
2,966,200 UART: [art] SIG.S = CD2E4E4307837F67B83DAD2D8DAC7A5A0AE21EBB47C2AC5575353FF8B0F0D612C961093B1084B25CCC818DBB865B0B65
2,989,591 UART: Caliptra RT
2,989,936 UART: [state] CFI Enabled
3,097,494 UART: [rt] RT listening for mailbox commands...
3,098,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,300 UART: [rt]cmd =0x44504543, len=96
3,307,791 >>> mbox cmd response data (6236 bytes)
3,307,792 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,067 UART: [rt]cmd =0x52564348, len=36
3,339,106 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,299 UART: [kat] SHA2-256
882,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,345 UART: [kat] ++
886,497 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,402 UART: [kat] SHA2-512-ACC
897,303 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,302 UART: [kat] LMS
1,475,498 UART: [kat] --
1,476,331 UART: [cold-reset] ++
1,476,899 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 ready_for_fw is high
1,480,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,572 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,074 UART: [idev] --
1,515,091 UART: [ldev] ++
1,515,259 UART: [ldev] CDI.KEYID = 6
1,515,622 UART: [ldev] SUBJECT.KEYID = 5
1,516,048 UART: [ldev] AUTHORITY.KEYID = 7
1,516,511 UART: [ldev] FE.KEYID = 1
1,521,717 UART: [ldev] Erasing FE.KEYID = 1
1,547,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,256 UART: [ldev] --
1,586,549 UART: [fwproc] Waiting for Commands...
1,587,358 UART: [fwproc] Received command 0x46574c44
1,588,149 UART: [fwproc] Received Image of size 114332 bytes
2,886,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,293 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,618 >>> mbox cmd response: success
3,080,662 UART: [afmc] ++
3,080,830 UART: [afmc] CDI.KEYID = 6
3,081,192 UART: [afmc] SUBJECT.KEYID = 7
3,081,617 UART: [afmc] AUTHORITY.KEYID = 5
3,116,784 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,459 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,149 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,202 UART: [afmc] --
3,160,146 UART: [cold-reset] --
3,161,024 UART: [state] Locking Datavault
3,162,295 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,899 UART: [state] Locking ICCM
3,163,405 UART: [exit] Launching FMC @ 0x40000130
3,168,734 UART:
3,168,750 UART: Running Caliptra FMC ...
3,169,158 UART:
3,169,212 UART: [state] CFI Enabled
3,179,817 UART: [fht] FMC Alias Private Key: 7
3,287,764 UART: [art] Extend RT PCRs Done
3,288,192 UART: [art] Lock RT PCRs Done
3,289,444 UART: [art] Populate DV Done
3,297,643 UART: [fht] FMC Alias Private Key: 7
3,298,593 UART: [art] Derive CDI
3,298,873 UART: [art] Store in in slot 0x4
3,385,018 UART: [art] Derive Key Pair
3,385,378 UART: [art] Store priv key in slot 0x5
3,397,888 UART: [art] Derive Key Pair - Done
3,412,350 UART: [art] Signing Cert with AUTHO
3,412,830 UART: RITY.KEYID = 7
3,428,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,815 UART: [art] PUB.X = 7A2451EE652796AEE441A45A81189C916EDEE3C64222989153A87EE2CB99E8AAB09FEAEF008852776CA417A1A58878FA
3,435,569 UART: [art] PUB.Y = 08E30728051B2ADB3C6C553C1A0C2E9E937A7D33FD1BED6A7C1C271EAF533F61F1E924007238AEA738DB642CBE176CA9
3,442,499 UART: [art] SIG.R = BC2056A2A1CA38AF2394D969E629BE5BC41C5513F8EC229063AC7481D772642E18F4325603993E47F0F01DC4FA86B7C2
3,449,268 UART: [art] SIG.S = EF7212127FBFCA0292EA5F8CEBBE70E80E14AEA560C0A6084CEA2B9CABA7A86EAC92A382424EAAE7D27FB776394C94D5
3,473,188 UART: Caliptra RT
3,473,441 UART: [state] CFI Enabled
3,581,521 UART: [rt] RT listening for mailbox commands...
3,582,191 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,427 UART: [rt]cmd =0x52564348, len=36
3,613,789 >>> mbox cmd response: failed
3,613,789 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,221 UART: [rt]cmd =0x52564348, len=36
3,644,655 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,753 ready_for_fw is high
1,362,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,688 >>> mbox cmd response: success
2,987,996 UART:
2,988,012 UART: Running Caliptra FMC ...
2,988,420 UART:
2,988,474 UART: [state] CFI Enabled
2,999,311 UART: [fht] FMC Alias Private Key: 7
3,107,180 UART: [art] Extend RT PCRs Done
3,107,608 UART: [art] Lock RT PCRs Done
3,109,112 UART: [art] Populate DV Done
3,117,367 UART: [fht] FMC Alias Private Key: 7
3,118,485 UART: [art] Derive CDI
3,118,765 UART: [art] Store in in slot 0x4
3,204,584 UART: [art] Derive Key Pair
3,204,944 UART: [art] Store priv key in slot 0x5
3,218,214 UART: [art] Derive Key Pair - Done
3,233,013 UART: [art] Signing Cert with AUTHO
3,233,493 UART: RITY.KEYID = 7
3,248,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,342 UART: [art] PUB.X = 2DA00E56F844584766C8A66CD7B08B8344005F8EADF6A66E7477660FFA52B8EEC76D3DAEAC17A31F9EB96C540BC24B16
3,256,095 UART: [art] PUB.Y = 2E12E60CCDFD1D9ABD40BF5821B9775B87A865EB181DB5D04DA6B97E004327860740C4CDBAFE3BF03E0D98EF4849893A
3,263,030 UART: [art] SIG.R = 1796B02FCDF7C5F56B76099BFD9583903089BD07835F67FC61E577FC7BBF3E8363C2F048C9A05280C14449CC5B4D4560
3,269,796 UART: [art] SIG.S = 049A1CD034A1937E01E5C7CF163C08F383FBC8F6ADA8D30B6706FF1C725B694FB1DD9344733A1D09E0157C3143C2D91A
3,293,475 UART: Caliptra RT
3,293,728 UART: [state] CFI Enabled
3,401,674 UART: [rt] RT listening for mailbox commands...
3,402,344 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,182 UART: [rt]cmd =0x52564348, len=36
3,433,448 >>> mbox cmd response: failed
3,433,448 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,894 UART: [rt]cmd =0x52564348, len=36
3,464,338 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,935 UART: [state] LifecycleState = Unprovisioned
86,590 UART: [state] DebugLocked = No
87,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,681 UART: [kat] SHA2-512-ACC
897,582 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,773 UART: [kat] LMS
1,475,969 UART: [kat] --
1,477,026 UART: [cold-reset] ++
1,477,478 UART: [fht] Storing FHT @ 0x50003400
1,480,241 UART: [idev] ++
1,480,409 UART: [idev] CDI.KEYID = 6
1,480,769 UART: [idev] SUBJECT.KEYID = 7
1,481,193 UART: [idev] UDS.KEYID = 0
1,481,538 ready_for_fw is high
1,481,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,557 UART: [idev] --
1,515,658 UART: [ldev] ++
1,515,826 UART: [ldev] CDI.KEYID = 6
1,516,189 UART: [ldev] SUBJECT.KEYID = 5
1,516,615 UART: [ldev] AUTHORITY.KEYID = 7
1,517,078 UART: [ldev] FE.KEYID = 1
1,522,244 UART: [ldev] Erasing FE.KEYID = 1
1,547,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,725 UART: [ldev] --
1,587,130 UART: [fwproc] Waiting for Commands...
1,587,961 UART: [fwproc] Received command 0x46574c44
1,588,752 UART: [fwproc] Received Image of size 114332 bytes
2,886,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,509 >>> mbox cmd response: success
3,080,551 UART: [afmc] ++
3,080,719 UART: [afmc] CDI.KEYID = 6
3,081,081 UART: [afmc] SUBJECT.KEYID = 7
3,081,506 UART: [afmc] AUTHORITY.KEYID = 5
3,115,995 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,794 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,484 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,437 UART: [afmc] --
3,159,409 UART: [cold-reset] --
3,160,425 UART: [state] Locking Datavault
3,161,642 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,246 UART: [state] Locking ICCM
3,162,914 UART: [exit] Launching FMC @ 0x40000130
3,168,243 UART:
3,168,259 UART: Running Caliptra FMC ...
3,168,667 UART:
3,168,810 UART: [state] CFI Enabled
3,179,573 UART: [fht] FMC Alias Private Key: 7
3,287,714 UART: [art] Extend RT PCRs Done
3,288,142 UART: [art] Lock RT PCRs Done
3,289,514 UART: [art] Populate DV Done
3,297,935 UART: [fht] FMC Alias Private Key: 7
3,298,951 UART: [art] Derive CDI
3,299,231 UART: [art] Store in in slot 0x4
3,384,238 UART: [art] Derive Key Pair
3,384,598 UART: [art] Store priv key in slot 0x5
3,398,570 UART: [art] Derive Key Pair - Done
3,413,185 UART: [art] Signing Cert with AUTHO
3,413,665 UART: RITY.KEYID = 7
3,429,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,784 UART: [art] PUB.X = 39EABE23BFF66B56CCF7CBD9FF80A90F6838EDA333579A7E2AC13E829D6FE9C640572CE70453E990D354F4BB10F5B9EE
3,436,568 UART: [art] PUB.Y = 0B08107E595FABF0153A19B91CF0A9A0458A1263311224CC479A6BE5C86061CF131C0AD076B3EA4574B5E95278540553
3,443,502 UART: [art] SIG.R = 41BFE0B98A5F7A2CAF223BC2DB47E79CEC0C2F207A5C1647C14425D9B65FEAAEEFB89184BF3FE49B3B01498A7B3029C3
3,450,288 UART: [art] SIG.S = 0AECCBC111F269F819717ED4F4A646BB0EADE71FE6E470DDC209BCB93F2DFFA4F419541515D788CEB1A2FAD7502C3B43
3,473,358 UART: Caliptra RT
3,473,703 UART: [state] CFI Enabled
3,582,031 UART: [rt] RT listening for mailbox commands...
3,582,701 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,705 UART: [rt]cmd =0x52564348, len=36
3,614,155 >>> mbox cmd response: failed
3,614,155 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,921 UART: [rt]cmd =0x52564348, len=36
3,645,613 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,263 >>> mbox cmd response: success
2,990,325 UART:
2,990,341 UART: Running Caliptra FMC ...
2,990,749 UART:
2,990,892 UART: [state] CFI Enabled
3,001,727 UART: [fht] FMC Alias Private Key: 7
3,109,648 UART: [art] Extend RT PCRs Done
3,110,076 UART: [art] Lock RT PCRs Done
3,111,512 UART: [art] Populate DV Done
3,119,753 UART: [fht] FMC Alias Private Key: 7
3,120,803 UART: [art] Derive CDI
3,121,083 UART: [art] Store in in slot 0x4
3,206,888 UART: [art] Derive Key Pair
3,207,248 UART: [art] Store priv key in slot 0x5
3,220,482 UART: [art] Derive Key Pair - Done
3,234,980 UART: [art] Signing Cert with AUTHO
3,235,460 UART: RITY.KEYID = 7
3,250,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,207 UART: [art] PUB.X = EEC80EF040F42EEB9067E4EDCFC7F9EC7B104D209B6969D541517815CACA4E61DF526DFB77DD933038737E7110962039
3,257,982 UART: [art] PUB.Y = 44B37AF41F74840695DDAB851DBE3118D5F7626030A024A9E5564277BE5ABDF3ABC3DB14A69697E2F7FF40B2824E6208
3,264,932 UART: [art] SIG.R = 4E54D4363A6CEC3CE53D811E74D2CD087448623A53E9C4B70AA0BA46DB955348ADE76A377BB7D5A4B6EA7EF008FBD6A2
3,271,711 UART: [art] SIG.S = 9FF77B96B71D66996E33C0BB89F934D77E44FF7A6265E6CC6433B48C0A5BF0CACFB63BF2E9A9035AC560918984384BAB
3,295,476 UART: Caliptra RT
3,295,821 UART: [state] CFI Enabled
3,404,572 UART: [rt] RT listening for mailbox commands...
3,405,242 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,088 UART: [rt]cmd =0x52564348, len=36
3,436,424 >>> mbox cmd response: failed
3,436,424 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,928 UART: [rt]cmd =0x52564348, len=36
3,467,392 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
901,971 UART: [kat] SHA2-256
903,911 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,172,017 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,170 UART: [idev] ++
1,175,338 UART: [idev] CDI.KEYID = 6
1,175,698 UART: [idev] SUBJECT.KEYID = 7
1,176,122 UART: [idev] UDS.KEYID = 0
1,176,467 ready_for_fw is high
1,176,467 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,351 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,734 UART: [fwproc] Wait for Commands...
1,283,392 UART: [fwproc] Recv command 0x46574c44
1,284,120 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,431 >>> mbox cmd response: success
2,775,449 UART: [afmc] ++
2,775,617 UART: [afmc] CDI.KEYID = 6
2,775,979 UART: [afmc] SUBJECT.KEYID = 7
2,776,404 UART: [afmc] AUTHORITY.KEYID = 5
2,811,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,248 UART: [afmc] --
2,855,162 UART: [cold-reset] --
2,856,184 UART: [state] Locking Datavault
2,857,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,873 UART: [state] Locking ICCM
2,858,295 UART: [exit] Launching FMC @ 0x40000130
2,863,624 UART:
2,863,640 UART: Running Caliptra FMC ...
2,864,048 UART:
2,864,102 UART: [state] CFI Enabled
2,874,103 UART: [fht] FMC Alias Private Key: 7
2,981,548 UART: [art] Extend RT PCRs Done
2,981,976 UART: [art] Lock RT PCRs Done
2,983,624 UART: [art] Populate DV Done
2,991,673 UART: [fht] FMC Alias Private Key: 7
2,992,659 UART: [art] Derive CDI
2,992,939 UART: [art] Store in in slot 0x4
3,079,126 UART: [art] Derive Key Pair
3,079,486 UART: [art] Store priv key in slot 0x5
3,092,938 UART: [art] Derive Key Pair - Done
3,108,139 UART: [art] Signing Cert with AUTHO
3,108,619 UART: RITY.KEYID = 7
3,123,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,140 UART: [art] PUB.X = 4A9C6EE1AD63E19540089254E47877B62BC7E05BB756C7DC298851D894CCD79592A5E86D84C2246211C2AB88D7A32E5A
3,130,909 UART: [art] PUB.Y = 91632E7FCE1EC3A157962BA9B4680401D6077FE5C91AB3DEF8FC6F7E079117D8B76DEA85C98D60810856A1F3295F6145
3,137,848 UART: [art] SIG.R = 6AF0FB2CC19AA0C456460FE06720C31193AD8D36326306EA33BDBD06E02369003C7B35111CA82418A214B6CCB68DE27A
3,144,593 UART: [art] SIG.S = D23FA1705BEAC8815D0A2455DAB39E83EE325CA855AD76D7E1C5CD3F83E36FED7DD512678785A57EBEB83483976E6D55
3,168,315 UART: Caliptra RT
3,168,568 UART: [state] CFI Enabled
3,275,259 UART: [rt] RT listening for mailbox commands...
3,275,929 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,957 UART: [rt]cmd =0x52564348, len=36
3,307,337 >>> mbox cmd response: failed
3,307,337 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,961 UART: [rt]cmd =0x52564348, len=36
3,338,157 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 ready_for_fw is high
1,060,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,258 >>> mbox cmd response: success
2,688,904 UART:
2,688,920 UART: Running Caliptra FMC ...
2,689,328 UART:
2,689,382 UART: [state] CFI Enabled
2,699,843 UART: [fht] FMC Alias Private Key: 7
2,808,100 UART: [art] Extend RT PCRs Done
2,808,528 UART: [art] Lock RT PCRs Done
2,810,296 UART: [art] Populate DV Done
2,818,515 UART: [fht] FMC Alias Private Key: 7
2,819,491 UART: [art] Derive CDI
2,819,771 UART: [art] Store in in slot 0x4
2,905,738 UART: [art] Derive Key Pair
2,906,098 UART: [art] Store priv key in slot 0x5
2,919,004 UART: [art] Derive Key Pair - Done
2,933,646 UART: [art] Signing Cert with AUTHO
2,934,126 UART: RITY.KEYID = 7
2,949,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,125 UART: [art] PUB.X = 1CFE43B879135F814600A55CA425CD5C0BF0456B97CCEA3DECA2330157ED9C97E4E53BD0BB30415CCDAA56CBE09E076C
2,956,884 UART: [art] PUB.Y = AD92FA54B664B0CEC1192BCCE934E5CA4D678406F100A19AD1981B04D782FCC74D3615B4220EDEBE66C50DB5FC8E7C7A
2,963,820 UART: [art] SIG.R = 856F9AEC22062ECC838F1C616A576EA94D58C6E4A2D0986D1539CC6B96D91C615787610386EA5A4C11FB6584C0CF2DF7
2,970,590 UART: [art] SIG.S = 5749A8C9FAD8F8FD41AD5192E011DE8106D17F99B30760DF1AD66AF800576FD7541A9827426CD37A87FE305A70B18B29
2,994,115 UART: Caliptra RT
2,994,368 UART: [state] CFI Enabled
3,102,037 UART: [rt] RT listening for mailbox commands...
3,102,707 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,825 UART: [rt]cmd =0x52564348, len=36
3,134,271 >>> mbox cmd response: failed
3,134,271 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,595 UART: [rt]cmd =0x52564348, len=36
3,165,061 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,789 UART: [kat] SHA2-512-ACC
908,690 UART: [kat] ECC-384
918,139 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,202 UART: [cold-reset] ++
1,172,588 UART: [fht] FHT @ 0x50003400
1,175,263 UART: [idev] ++
1,175,431 UART: [idev] CDI.KEYID = 6
1,175,791 UART: [idev] SUBJECT.KEYID = 7
1,176,215 UART: [idev] UDS.KEYID = 0
1,176,560 ready_for_fw is high
1,176,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,165 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,210,238 UART: [ldev] ++
1,210,406 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,195 UART: [ldev] AUTHORITY.KEYID = 7
1,211,658 UART: [ldev] FE.KEYID = 1
1,217,128 UART: [ldev] Erasing FE.KEYID = 1
1,243,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,894 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,951 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,762 >>> mbox cmd response: success
2,775,854 UART: [afmc] ++
2,776,022 UART: [afmc] CDI.KEYID = 6
2,776,384 UART: [afmc] SUBJECT.KEYID = 7
2,776,809 UART: [afmc] AUTHORITY.KEYID = 5
2,812,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,198 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,681 UART: [afmc] --
2,855,711 UART: [cold-reset] --
2,856,385 UART: [state] Locking Datavault
2,857,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,022 UART: [state] Locking ICCM
2,858,590 UART: [exit] Launching FMC @ 0x40000130
2,863,919 UART:
2,863,935 UART: Running Caliptra FMC ...
2,864,343 UART:
2,864,486 UART: [state] CFI Enabled
2,874,887 UART: [fht] FMC Alias Private Key: 7
2,982,818 UART: [art] Extend RT PCRs Done
2,983,246 UART: [art] Lock RT PCRs Done
2,984,624 UART: [art] Populate DV Done
2,992,889 UART: [fht] FMC Alias Private Key: 7
2,993,855 UART: [art] Derive CDI
2,994,135 UART: [art] Store in in slot 0x4
3,079,852 UART: [art] Derive Key Pair
3,080,212 UART: [art] Store priv key in slot 0x5
3,093,840 UART: [art] Derive Key Pair - Done
3,108,915 UART: [art] Signing Cert with AUTHO
3,109,395 UART: RITY.KEYID = 7
3,124,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,328 UART: [art] PUB.X = 4BF2432B3CC28497EE21A6918F850AB020E7DBDDB5513A740EA453B4D64D7CC1978E36244EAB3E1ECA907B0D660BD27D
3,132,100 UART: [art] PUB.Y = 08D90F1806F936F755E8E780B298651EC73C3E0CEE6B8509EB87C4DE757175337AFF6967FC40DB3C35CA64918BC138FE
3,139,041 UART: [art] SIG.R = 6D7B8254EF2B7FFA553165EE70721BC88218A089AC6B22FFB8278AC8912A7BB50C92AAF1F4E84E736809351F978ED4E4
3,145,813 UART: [art] SIG.S = B5539E6B5916E6C583B9BC7FEDD127F4D7439991F30EA6886690CBBF1A0105FBEFAC47DA8C2198F6A080FCC315450B89
3,169,748 UART: Caliptra RT
3,170,093 UART: [state] CFI Enabled
3,278,694 UART: [rt] RT listening for mailbox commands...
3,279,364 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,464 UART: [rt]cmd =0x52564348, len=36
3,310,710 >>> mbox cmd response: failed
3,310,710 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,228 UART: [rt]cmd =0x52564348, len=36
3,341,494 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 ready_for_fw is high
1,060,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,315 >>> mbox cmd response: success
2,689,309 UART:
2,689,325 UART: Running Caliptra FMC ...
2,689,733 UART:
2,689,876 UART: [state] CFI Enabled
2,700,977 UART: [fht] FMC Alias Private Key: 7
2,808,856 UART: [art] Extend RT PCRs Done
2,809,284 UART: [art] Lock RT PCRs Done
2,811,028 UART: [art] Populate DV Done
2,819,177 UART: [fht] FMC Alias Private Key: 7
2,820,137 UART: [art] Derive CDI
2,820,417 UART: [art] Store in in slot 0x4
2,906,472 UART: [art] Derive Key Pair
2,906,832 UART: [art] Store priv key in slot 0x5
2,919,764 UART: [art] Derive Key Pair - Done
2,934,535 UART: [art] Signing Cert with AUTHO
2,935,015 UART: RITY.KEYID = 7
2,950,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,008 UART: [art] PUB.X = 255B9F4DB8C84F9F2E3419211AD7AC49D9C62164BBB89E93FC18E3EFCE0DA2A0B9DB97E35AAB26DFB2D28123BFEDDF9B
2,957,805 UART: [art] PUB.Y = 41BF3643514B9604091BC6A69A436344FE332BDCDF77EA60367F0D499063A392C014E484C23860D29216B229507DBAD1
2,964,740 UART: [art] SIG.R = 3FC55B04D6A85A253363CE70F3610E1660F630C7CAD4523AA31EA1949AD092B0EB7B9A2D4DD8F48BD87DCF104DA71016
2,971,516 UART: [art] SIG.S = A9AF1DEFEAECCC6FB1ACF1DB4308F1A428C8EF9A7BCA029BBFF0B5DA37BB87564723670D7AA5927199E5EA6AAB90B3E5
2,995,430 UART: Caliptra RT
2,995,775 UART: [state] CFI Enabled
3,103,642 UART: [rt] RT listening for mailbox commands...
3,104,312 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,416 UART: [rt]cmd =0x52564348, len=36
3,135,810 >>> mbox cmd response: failed
3,135,810 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,352 UART: [rt]cmd =0x52564348, len=36
3,166,556 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,174,043 ready_for_fw is high
1,174,043 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,061 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,728 UART: [ldev] ++
1,207,896 UART: [ldev] CDI.KEYID = 6
1,208,260 UART: [ldev] SUBJECT.KEYID = 5
1,208,687 UART: [ldev] AUTHORITY.KEYID = 7
1,209,150 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,448 UART: [ldev] --
1,279,902 UART: [fwproc] Wait for Commands...
1,280,615 UART: [fwproc] Recv command 0x46574c44
1,281,348 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,955 >>> mbox cmd response: success
2,773,060 UART: [afmc] ++
2,773,228 UART: [afmc] CDI.KEYID = 6
2,773,591 UART: [afmc] SUBJECT.KEYID = 7
2,774,017 UART: [afmc] AUTHORITY.KEYID = 5
2,809,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,449 UART: [afmc] --
2,852,495 UART: [cold-reset] --
2,853,341 UART: [state] Locking Datavault
2,854,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,114 UART: [state] Locking ICCM
2,855,620 UART: [exit] Launching FMC @ 0x40000130
2,860,949 UART:
2,860,965 UART: Running Caliptra FMC ...
2,861,373 UART:
2,861,427 UART: [state] CFI Enabled
2,871,998 UART: [fht] FMC Alias Private Key: 7
2,980,169 UART: [art] Extend RT PCRs Done
2,980,597 UART: [art] Lock RT PCRs Done
2,982,331 UART: [art] Populate DV Done
2,990,416 UART: [fht] FMC Alias Private Key: 7
2,991,458 UART: [art] Derive CDI
2,991,738 UART: [art] Store in in slot 0x4
3,077,497 UART: [art] Derive Key Pair
3,077,857 UART: [art] Store priv key in slot 0x5
3,090,673 UART: [art] Derive Key Pair - Done
3,105,050 UART: [art] Signing Cert with AUTHO
3,105,530 UART: RITY.KEYID = 7
3,120,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,373 UART: [art] PUB.X = B0B920D91B5E203F4F0A4CEFA76297E327DA655B9BA295FCFA781FC469D21DC6F68A4E32CCAEB12903FAA04E969EE0AC
3,128,161 UART: [art] PUB.Y = 9B275F7B35815A47CA3497A200FF4854C8353F9786B13C73E1AA534753020F127293E53382D1BCA7F7E653B27990AB6C
3,135,077 UART: [art] SIG.R = C77B44C9F80A9B78E57E60E1D76485FAA53F4CD4753C1E8A47CDA95839AAB6B3F3AEF138ECB6633D61005075177F884E
3,141,832 UART: [art] SIG.S = 4D8031653AAB0641C7CA3ADF449F7067071CFE5EBA25AB66B9A6D723C66772B604731C05C8BE7C4FC60338ABE35BE48F
3,165,590 UART: Caliptra RT
3,165,843 UART: [state] CFI Enabled
3,273,474 UART: [rt] RT listening for mailbox commands...
3,274,144 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,132 UART: [rt]cmd =0x52564348, len=36
3,305,184 >>> mbox cmd response: failed
3,305,184 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,672 UART: [rt]cmd =0x52564348, len=36
3,336,122 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,960 ready_for_fw is high
1,056,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,351 >>> mbox cmd response: success
2,685,069 UART:
2,685,085 UART: Running Caliptra FMC ...
2,685,493 UART:
2,685,547 UART: [state] CFI Enabled
2,695,784 UART: [fht] FMC Alias Private Key: 7
2,803,449 UART: [art] Extend RT PCRs Done
2,803,877 UART: [art] Lock RT PCRs Done
2,805,449 UART: [art] Populate DV Done
2,813,850 UART: [fht] FMC Alias Private Key: 7
2,814,948 UART: [art] Derive CDI
2,815,228 UART: [art] Store in in slot 0x4
2,900,935 UART: [art] Derive Key Pair
2,901,295 UART: [art] Store priv key in slot 0x5
2,914,645 UART: [art] Derive Key Pair - Done
2,929,385 UART: [art] Signing Cert with AUTHO
2,929,865 UART: RITY.KEYID = 7
2,944,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,494 UART: [art] PUB.X = A5622F3D29C31263999049125CA0213FE0CF11072582133A2B5E96E8A0FD80AC5FB37592EAE70B63B430886DFF34DF42
2,952,258 UART: [art] PUB.Y = 663AFCFB52016A3BD33458D6AE50655D8815A6497F21483DB1EAF558AAFA701BFD279D0BE47354D359A8DF40DC5DE024
2,959,214 UART: [art] SIG.R = F1311173F294BD0F465BBC6EC984E4891222F4C5EFEF40ED1AB8BC4D735737C2A368FF862D51B4019F39F0FEE142D358
2,965,988 UART: [art] SIG.S = AB82235B217708ACF2400752AF81DADD3CCEE246E02535D036A370A8FF0EC15CE197A264B0F65CFA77BEFB3852799351
2,989,794 UART: Caliptra RT
2,990,047 UART: [state] CFI Enabled
3,098,571 UART: [rt] RT listening for mailbox commands...
3,099,241 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,023 UART: [rt]cmd =0x52564348, len=36
3,130,509 >>> mbox cmd response: failed
3,130,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,949 UART: [rt]cmd =0x52564348, len=36
3,161,291 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,144 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [kat] SHA2-256
892,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,178 UART: [kat] ++
896,330 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
905,249 UART: [kat] SHA2-512-ACC
907,150 UART: [kat] ECC-384
917,327 UART: [kat] HMAC-384Kdf
921,915 UART: [kat] LMS
1,170,227 UART: [kat] --
1,171,056 UART: [cold-reset] ++
1,171,514 UART: [fht] FHT @ 0x50003400
1,174,314 UART: [idev] ++
1,174,482 UART: [idev] CDI.KEYID = 6
1,174,843 UART: [idev] SUBJECT.KEYID = 7
1,175,268 UART: [idev] UDS.KEYID = 0
1,175,614 ready_for_fw is high
1,175,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,762 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,239 UART: [ldev] ++
1,211,407 UART: [ldev] CDI.KEYID = 6
1,211,771 UART: [ldev] SUBJECT.KEYID = 5
1,212,198 UART: [ldev] AUTHORITY.KEYID = 7
1,212,661 UART: [ldev] FE.KEYID = 1
1,217,785 UART: [ldev] Erasing FE.KEYID = 1
1,244,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,282,887 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,191 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,364 >>> mbox cmd response: success
2,775,581 UART: [afmc] ++
2,775,749 UART: [afmc] CDI.KEYID = 6
2,776,112 UART: [afmc] SUBJECT.KEYID = 7
2,776,538 UART: [afmc] AUTHORITY.KEYID = 5
2,811,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,621 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,460 UART: [afmc] --
2,855,536 UART: [cold-reset] --
2,856,422 UART: [state] Locking Datavault
2,857,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,987 UART: [state] Locking ICCM
2,858,605 UART: [exit] Launching FMC @ 0x40000130
2,863,934 UART:
2,863,950 UART: Running Caliptra FMC ...
2,864,358 UART:
2,864,501 UART: [state] CFI Enabled
2,875,170 UART: [fht] FMC Alias Private Key: 7
2,983,945 UART: [art] Extend RT PCRs Done
2,984,373 UART: [art] Lock RT PCRs Done
2,986,003 UART: [art] Populate DV Done
2,994,446 UART: [fht] FMC Alias Private Key: 7
2,995,552 UART: [art] Derive CDI
2,995,832 UART: [art] Store in in slot 0x4
3,081,691 UART: [art] Derive Key Pair
3,082,051 UART: [art] Store priv key in slot 0x5
3,095,439 UART: [art] Derive Key Pair - Done
3,110,654 UART: [art] Signing Cert with AUTHO
3,111,134 UART: RITY.KEYID = 7
3,126,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,213 UART: [art] PUB.X = 1BBEA9784118C0E61045A3B169AA6435DDB05617106A8478ABEABEC03344773442DD704530001BAA6750259D1E0C519C
3,133,956 UART: [art] PUB.Y = C9D8F73C823A416A8249DFA5A2DDEF80E1E481424AC3FF4846B28241452922037C8A0C11E34370D3FD7648297B65BE51
3,140,900 UART: [art] SIG.R = EFB4D241F0820E02A7A822FE0B3935C5E30E85435BECD3AA6F32AB92D4935C41E688F4E6E2591306AD96DECBF1D7DDA0
3,147,673 UART: [art] SIG.S = BE1E6D719AD3399E384F1CA08A861D42A8805F65DBBE000B189A0F5E66AA49B48305BD44E28D3E5CB9B227494BD3EBCE
3,171,875 UART: Caliptra RT
3,172,220 UART: [state] CFI Enabled
3,280,112 UART: [rt] RT listening for mailbox commands...
3,280,782 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,702 UART: [rt]cmd =0x52564348, len=36
3,312,240 >>> mbox cmd response: failed
3,312,240 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,752 UART: [rt]cmd =0x52564348, len=36
3,343,070 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,179 ready_for_fw is high
1,056,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,912 >>> mbox cmd response: success
2,683,872 UART:
2,683,888 UART: Running Caliptra FMC ...
2,684,296 UART:
2,684,439 UART: [state] CFI Enabled
2,695,050 UART: [fht] FMC Alias Private Key: 7
2,803,357 UART: [art] Extend RT PCRs Done
2,803,785 UART: [art] Lock RT PCRs Done
2,804,955 UART: [art] Populate DV Done
2,813,184 UART: [fht] FMC Alias Private Key: 7
2,814,218 UART: [art] Derive CDI
2,814,498 UART: [art] Store in in slot 0x4
2,899,985 UART: [art] Derive Key Pair
2,900,345 UART: [art] Store priv key in slot 0x5
2,913,031 UART: [art] Derive Key Pair - Done
2,927,886 UART: [art] Signing Cert with AUTHO
2,928,366 UART: RITY.KEYID = 7
2,943,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,099 UART: [art] PUB.X = F4C9FE8B4968AB6C74C1D5ADE9C0122F59D655E34D33C5B7B278F1E1A33AD8975EB73AA9D37D8EC72666E65A80A62E52
2,950,883 UART: [art] PUB.Y = 5A388B5A524217079644B43332FF7026FE8A2F979F83BE79D725CEE35FF18AA90EFD65274679AF3087EF4FA517EC7094
2,957,829 UART: [art] SIG.R = F6A885B1156E34E44CC1FAC5D015BB1B5C6160C163D6A524D19D25462330ECA15AC4CB93154BE386BE31317A17A77CFE
2,964,609 UART: [art] SIG.S = 86C3278227409E346FAB21C007C0528573E0D3D2433623CBCC1D2ED985FD3A1810CFA3E42B4427854138B4B02E8E1DD8
2,988,879 UART: Caliptra RT
2,989,224 UART: [state] CFI Enabled
3,096,894 UART: [rt] RT listening for mailbox commands...
3,097,564 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,574 UART: [rt]cmd =0x52564348, len=36
3,129,056 >>> mbox cmd response: failed
3,129,056 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,468 UART: [rt]cmd =0x52564348, len=36
3,159,864 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,020 UART: [kat] LMS
1,475,216 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,493 UART: [fht] Storing FHT @ 0x50003400
1,479,332 UART: [idev] ++
1,479,500 UART: [idev] CDI.KEYID = 6
1,479,860 UART: [idev] SUBJECT.KEYID = 7
1,480,284 UART: [idev] UDS.KEYID = 0
1,480,629 ready_for_fw is high
1,480,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,860 UART: [idev] --
1,514,783 UART: [ldev] ++
1,514,951 UART: [ldev] CDI.KEYID = 6
1,515,314 UART: [ldev] SUBJECT.KEYID = 5
1,515,740 UART: [ldev] AUTHORITY.KEYID = 7
1,516,203 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,284 UART: [ldev] --
1,586,799 UART: [fwproc] Waiting for Commands...
1,587,454 UART: [fwproc] Received command 0x46574c44
1,588,245 UART: [fwproc] Received Image of size 114332 bytes
5,159,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,187,213 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,538 >>> mbox cmd response: success
5,353,604 UART: [afmc] ++
5,353,772 UART: [afmc] CDI.KEYID = 6
5,354,134 UART: [afmc] SUBJECT.KEYID = 7
5,354,559 UART: [afmc] AUTHORITY.KEYID = 5
5,389,451 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,645 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,354 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,246 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,947 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,853 UART: [afmc] --
5,432,975 UART: [cold-reset] --
5,433,821 UART: [state] Locking Datavault
5,434,806 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,410 UART: [state] Locking ICCM
5,435,926 UART: [exit] Launching FMC @ 0x40000130
5,441,255 UART:
5,441,271 UART: Running Caliptra FMC ...
5,441,679 UART:
5,441,733 UART: [state] CFI Enabled
5,452,219 UART: [fht] FMC Alias Private Key: 7
5,560,343 UART: [art] Extend RT PCRs Done
5,560,771 UART: [art] Lock RT PCRs Done
5,562,407 UART: [art] Populate DV Done
5,570,793 UART: [fht] FMC Alias Private Key: 7
5,571,867 UART: [art] Derive CDI
5,572,147 UART: [art] Store in in slot 0x4
5,657,778 UART: [art] Derive Key Pair
5,658,138 UART: [art] Store priv key in slot 0x5
5,670,588 UART: [art] Derive Key Pair - Done
5,685,386 UART: [art] Signing Cert with AUTHO
5,685,866 UART: RITY.KEYID = 7
5,701,142 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,907 UART: [art] PUB.X = 6E79831303B20476BC31C3A3D12D46260F8A504DFF5732282541C59AC6E920F1A85329D30E8D1C5A4C4DAAE139B5A99A
5,708,667 UART: [art] PUB.Y = 615A450FB35D84623EBBB58C24622B3A74ED71392E64FBAFF91A2951B7342F085A3FF5A9240E60C77DFF6C96039C23B7
5,715,611 UART: [art] SIG.R = D480E88227F91E08BF407F6C20EE8C50C54F06858173D53DFD5EAAB357E96A138392B5F6A3DFAB4F07B180B0F3C68A26
5,722,382 UART: [art] SIG.S = 6D82C545C0A81193C98CDD396348F26EF7E5704388E0A5B9673C4CAD60425E10D75063C04B0061F9EC48ABF41B48F07C
5,746,605 UART: Caliptra RT
5,746,858 UART: [state] CFI Enabled
5,854,499 UART: [rt] RT listening for mailbox commands...
5,855,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,117 UART: [rt]cmd =0x41544d4e, len=14344
7,374,282 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,327 ready_for_fw is high
1,362,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,352,622 >>> mbox cmd response: success
5,414,367 UART:
5,414,383 UART: Running Caliptra FMC ...
5,414,791 UART:
5,414,845 UART: [state] CFI Enabled
5,425,173 UART: [fht] FMC Alias Private Key: 7
5,532,941 UART: [art] Extend RT PCRs Done
5,533,369 UART: [art] Lock RT PCRs Done
5,534,843 UART: [art] Populate DV Done
5,542,895 UART: [fht] FMC Alias Private Key: 7
5,544,055 UART: [art] Derive CDI
5,544,335 UART: [art] Store in in slot 0x4
5,629,958 UART: [art] Derive Key Pair
5,630,318 UART: [art] Store priv key in slot 0x5
5,643,690 UART: [art] Derive Key Pair - Done
5,658,313 UART: [art] Signing Cert with AUTHO
5,658,793 UART: RITY.KEYID = 7
5,673,657 UART: [art] Erasing AUTHORITY.KEYID = 7
5,674,422 UART: [art] PUB.X = D86A448EEBD524EBF626F73FBB9DFE2BCDCD9A2C0F56C22CDC905A466A517FB93546ADBC3F86BA8F05A40717FD73F290
5,681,209 UART: [art] PUB.Y = E8023B80DD8870A1B1DC43C3B09894962B20D831F87E972351BC635749CF90206CC14E71DF4A16AC98F53D4860ECA72E
5,688,158 UART: [art] SIG.R = D1B44B7FFCAB3F835278417BBD63BC170D61F258AEB475E1A607341B21EE1AA31B017681B66E3ED3ED1D406723A751D4
5,694,929 UART: [art] SIG.S = 2DBD4BF8A891DED728EEA28598F7BB1B5A5ADA4F6D7AAC0A885159FAC870BA2F772C2F60C83E9C7E712C67A0EEC565DA
5,719,045 UART: Caliptra RT
5,719,298 UART: [state] CFI Enabled
5,827,267 UART: [rt] RT listening for mailbox commands...
5,827,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,951,141 UART: [rt]cmd =0x41544d4e, len=14344
7,357,158 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 ready_for_fw is high
1,481,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,913 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,343 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,521,790 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,981 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,279 UART: [fwproc] Received command 0x46574c44
1,589,070 UART: [fwproc] Received Image of size 114332 bytes
5,084,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,408 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,760 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,277,545 >>> mbox cmd response: success
5,278,657 UART: [afmc] ++
5,278,825 UART: [afmc] CDI.KEYID = 6
5,279,187 UART: [afmc] SUBJECT.KEYID = 7
5,279,612 UART: [afmc] AUTHORITY.KEYID = 5
5,314,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,330,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,331,636 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,345 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,237 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,348,938 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,356,808 UART: [afmc] --
5,357,904 UART: [cold-reset] --
5,358,884 UART: [state] Locking Datavault
5,360,085 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,689 UART: [state] Locking ICCM
5,361,143 UART: [exit] Launching FMC @ 0x40000130
5,366,472 UART:
5,366,488 UART: Running Caliptra FMC ...
5,366,896 UART:
5,367,039 UART: [state] CFI Enabled
5,377,937 UART: [fht] FMC Alias Private Key: 7
5,485,693 UART: [art] Extend RT PCRs Done
5,486,121 UART: [art] Lock RT PCRs Done
5,487,577 UART: [art] Populate DV Done
5,495,645 UART: [fht] FMC Alias Private Key: 7
5,496,669 UART: [art] Derive CDI
5,496,949 UART: [art] Store in in slot 0x4
5,582,322 UART: [art] Derive Key Pair
5,582,682 UART: [art] Store priv key in slot 0x5
5,596,002 UART: [art] Derive Key Pair - Done
5,610,456 UART: [art] Signing Cert with AUTHO
5,610,936 UART: RITY.KEYID = 7
5,625,892 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,657 UART: [art] PUB.X = EF93EFAE97632111F71A58EA4A026999D896093CF1B0C6BD28FD557424FC6C9AC2EB38555CA80B0255A3EE2B4905A559
5,633,420 UART: [art] PUB.Y = E1C9298C0E28B3B477D86B1B290511878F2474331D6624C37382814EA735356596F262738805E4FC48DE01F3B101273B
5,640,339 UART: [art] SIG.R = FAAB96DEA447AA24DBC77306C59307BF41CA82CA01DC63870A9831B117191C897AD5D4043B7960F1D0F77558D7A4A525
5,647,100 UART: [art] SIG.S = 5FC24C902B18EDC26A0BC16F18E4A6B03DD7894F30E9F9C63DD46945C9E3CCCB72D1ECF5676AE142E097AB0CCEF3BE25
5,671,129 UART: Caliptra RT
5,671,474 UART: [state] CFI Enabled
5,779,133 UART: [rt] RT listening for mailbox commands...
5,779,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,771 UART: [rt]cmd =0x41544d4e, len=14344
7,310,725 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 ready_for_fw is high
1,362,954 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,127,397 >>> mbox cmd response: success
5,188,698 UART:
5,188,714 UART: Running Caliptra FMC ...
5,189,122 UART:
5,189,265 UART: [state] CFI Enabled
5,199,743 UART: [fht] FMC Alias Private Key: 7
5,307,439 UART: [art] Extend RT PCRs Done
5,307,867 UART: [art] Lock RT PCRs Done
5,309,425 UART: [art] Populate DV Done
5,317,695 UART: [fht] FMC Alias Private Key: 7
5,318,731 UART: [art] Derive CDI
5,319,011 UART: [art] Store in in slot 0x4
5,404,650 UART: [art] Derive Key Pair
5,405,010 UART: [art] Store priv key in slot 0x5
5,418,122 UART: [art] Derive Key Pair - Done
5,432,975 UART: [art] Signing Cert with AUTHO
5,433,455 UART: RITY.KEYID = 7
5,448,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,616 UART: [art] PUB.X = 89DADB430F44B54415AA45581E62CC837CFB2A47452CA19A6F4596EF951D7D63362AA7892995A74B8D4965BE6F9FB883
5,456,387 UART: [art] PUB.Y = A0F2BED094928EEA599C00E198A975EA5AC9275C94107C11C21CBC3E525AAEB354B2BA495B56BA4E0918D4CBE697FCF6
5,463,330 UART: [art] SIG.R = 6F83937A45153A9105409AAAEDC4F852444B218B060408DCE72B6C8A558B6FF9C6798BDCA03923C2123AFF73F584A4BA
5,470,094 UART: [art] SIG.S = 95B35F2609BABE7CDB2B694813FCBB95D550E62C51E69570D466AC0923B75D6EA3E6CA7050206CD5D4EC5B8D2FC9EB15
5,494,329 UART: Caliptra RT
5,494,674 UART: [state] CFI Enabled
5,602,699 UART: [rt] RT listening for mailbox commands...
5,603,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,623 UART: [rt]cmd =0x41544d4e, len=14344
7,124,685 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
917,832 UART: [kat] HMAC-384Kdf
922,524 UART: [kat] LMS
1,170,852 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,171,951 UART: [fht] FHT @ 0x50003400
1,174,576 UART: [idev] ++
1,174,744 UART: [idev] CDI.KEYID = 6
1,175,104 UART: [idev] SUBJECT.KEYID = 7
1,175,528 UART: [idev] UDS.KEYID = 0
1,175,873 ready_for_fw is high
1,175,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,486 UART: [idev] Erasing UDS.KEYID = 0
1,200,251 UART: [idev] Sha1 KeyId Algorithm
1,208,757 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,470 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,607 UART: [ldev] --
1,282,992 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 114332 bytes
3,111,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,168,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,304,545 >>> mbox cmd response: success
3,305,781 UART: [afmc] ++
3,305,949 UART: [afmc] CDI.KEYID = 6
3,306,311 UART: [afmc] SUBJECT.KEYID = 7
3,306,736 UART: [afmc] AUTHORITY.KEYID = 5
3,342,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,359,771 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,480 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,372 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,083 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,384,836 UART: [afmc] --
3,385,890 UART: [cold-reset] --
3,386,796 UART: [state] Locking Datavault
3,387,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,271 UART: [state] Locking ICCM
3,388,891 UART: [exit] Launching FMC @ 0x40000130
3,394,220 UART:
3,394,236 UART: Running Caliptra FMC ...
3,394,644 UART:
3,394,698 UART: [state] CFI Enabled
3,405,146 UART: [fht] FMC Alias Private Key: 7
3,512,952 UART: [art] Extend RT PCRs Done
3,513,380 UART: [art] Lock RT PCRs Done
3,514,986 UART: [art] Populate DV Done
3,523,370 UART: [fht] FMC Alias Private Key: 7
3,524,504 UART: [art] Derive CDI
3,524,784 UART: [art] Store in in slot 0x4
3,610,929 UART: [art] Derive Key Pair
3,611,289 UART: [art] Store priv key in slot 0x5
3,624,057 UART: [art] Derive Key Pair - Done
3,638,583 UART: [art] Signing Cert with AUTHO
3,639,063 UART: RITY.KEYID = 7
3,654,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,012 UART: [art] PUB.X = 0E145C2801F2E72C5FA57A58329A930950816980DEAA7F8ADBDF3D4BD1790C2ADA8F6D27550C894420E4C81BC3F5F6F5
3,661,777 UART: [art] PUB.Y = 7F4E443172019E458EAB3F061807F74BDDF42CEEDF77364BDD5A7E48C4F8533F425BACDD8794958C029EF8DE5B8E0396
3,668,724 UART: [art] SIG.R = F576989DBE14C372C75C9BBCBE968F61BC457D6D9757781740253ECB61A414458796F1DC61A3896F4FF77353199C9E91
3,675,492 UART: [art] SIG.S = 2CA42049A81CFEEABA9332746233A26D80C30D2B436E7050B3FF48FCE6739596D25940C47268C1335B5AD036ED80B89D
3,699,652 UART: Caliptra RT
3,699,905 UART: [state] CFI Enabled
3,806,881 UART: [rt] RT listening for mailbox commands...
3,807,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,611 UART: [rt]cmd =0x41544d4e, len=14344
5,346,788 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,605 ready_for_fw is high
1,060,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,892 >>> mbox cmd response: success
3,234,863 UART:
3,234,879 UART: Running Caliptra FMC ...
3,235,287 UART:
3,235,341 UART: [state] CFI Enabled
3,245,955 UART: [fht] FMC Alias Private Key: 7
3,353,675 UART: [art] Extend RT PCRs Done
3,354,103 UART: [art] Lock RT PCRs Done
3,355,747 UART: [art] Populate DV Done
3,363,903 UART: [fht] FMC Alias Private Key: 7
3,364,881 UART: [art] Derive CDI
3,365,161 UART: [art] Store in in slot 0x4
3,450,768 UART: [art] Derive Key Pair
3,451,128 UART: [art] Store priv key in slot 0x5
3,464,126 UART: [art] Derive Key Pair - Done
3,478,929 UART: [art] Signing Cert with AUTHO
3,479,409 UART: RITY.KEYID = 7
3,494,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,138 UART: [art] PUB.X = 9AF8C84F747A81BCE159E736DF61881383A82171D7C7E6B8184F46AF3D82611A7D9942A75063B50FC230F2DB83E37B33
3,501,905 UART: [art] PUB.Y = 0BB8F79FF5815810E58BCAF5940A9DFE4B2D5AF7BD6D0437EB57E89B0410D066362E46411C75B4A2BA4B450F5172F036
3,508,848 UART: [art] SIG.R = 076D9D0CCE52D93784254A627BDDFD54B1228465FA6E2F23F1B364047AD02606C3FD9FDC0A7788A3B28C9E151B0D24CA
3,515,610 UART: [art] SIG.S = 31BC43F4C26E59D0AACE7AF536852C51E387B5A0B9EDEE9A9336C9B83D8E5540DCA4D16415AF45F2515D4DC51BDD201A
3,538,851 UART: Caliptra RT
3,539,104 UART: [state] CFI Enabled
3,647,547 UART: [rt] RT listening for mailbox commands...
3,648,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,413 UART: [rt]cmd =0x41544d4e, len=14344
5,163,158 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,426 UART: [fht] FHT @ 0x50003400
1,175,059 UART: [idev] ++
1,175,227 UART: [idev] CDI.KEYID = 6
1,175,587 UART: [idev] SUBJECT.KEYID = 7
1,176,011 UART: [idev] UDS.KEYID = 0
1,176,356 ready_for_fw is high
1,176,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,997 UART: [idev] Erasing UDS.KEYID = 0
1,201,340 UART: [idev] Sha1 KeyId Algorithm
1,209,974 UART: [idev] --
1,210,972 UART: [ldev] ++
1,211,140 UART: [ldev] CDI.KEYID = 6
1,211,503 UART: [ldev] SUBJECT.KEYID = 5
1,211,929 UART: [ldev] AUTHORITY.KEYID = 7
1,212,392 UART: [ldev] FE.KEYID = 1
1,217,694 UART: [ldev] Erasing FE.KEYID = 1
1,243,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,162 UART: [ldev] --
1,282,559 UART: [fwproc] Wait for Commands...
1,283,169 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,309 >>> mbox cmd response: success
3,323,523 UART: [afmc] ++
3,323,691 UART: [afmc] CDI.KEYID = 6
3,324,053 UART: [afmc] SUBJECT.KEYID = 7
3,324,478 UART: [afmc] AUTHORITY.KEYID = 5
3,359,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,853 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,562 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,454 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,165 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,016 UART: [afmc] --
3,402,940 UART: [cold-reset] --
3,403,726 UART: [state] Locking Datavault
3,404,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,355 UART: [state] Locking ICCM
3,405,929 UART: [exit] Launching FMC @ 0x40000130
3,411,258 UART:
3,411,274 UART: Running Caliptra FMC ...
3,411,682 UART:
3,411,825 UART: [state] CFI Enabled
3,422,709 UART: [fht] FMC Alias Private Key: 7
3,530,163 UART: [art] Extend RT PCRs Done
3,530,591 UART: [art] Lock RT PCRs Done
3,532,213 UART: [art] Populate DV Done
3,540,671 UART: [fht] FMC Alias Private Key: 7
3,541,603 UART: [art] Derive CDI
3,541,883 UART: [art] Store in in slot 0x4
3,627,896 UART: [art] Derive Key Pair
3,628,256 UART: [art] Store priv key in slot 0x5
3,641,570 UART: [art] Derive Key Pair - Done
3,656,527 UART: [art] Signing Cert with AUTHO
3,657,007 UART: RITY.KEYID = 7
3,672,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,818 UART: [art] PUB.X = 554D981A8FAFBE0296837D0A3624754A73C15559CF10E705D663CB3F40ADCBEBB5AA8EDDEE5438BD25855C0194B3846D
3,679,588 UART: [art] PUB.Y = A41263AF3CE126F7B84C04BE88E4A1A1181FFBB6262448C41224F9A569DBBEDA0A23A807A859492490A84120AC692A98
3,686,533 UART: [art] SIG.R = 276C9D529F259307EA8E5C5F71E9EDC64EE5106DADE696ECE4C629DFB6DB735275B5DDE57F5048E54500FD0FCF21DB93
3,693,293 UART: [art] SIG.S = CC2C2810919F5CACD5F4D30F32FAF821A89ECCBA43DDFFFD2E97735B95F5E910636377D0F8A627EAAB6EE9306DA821D4
3,716,883 UART: Caliptra RT
3,717,228 UART: [state] CFI Enabled
3,824,766 UART: [rt] RT listening for mailbox commands...
3,825,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,888 UART: [rt]cmd =0x41544d4e, len=14344
5,362,594 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 ready_for_fw is high
1,060,346 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,106 >>> mbox cmd response: success
3,230,591 UART:
3,230,607 UART: Running Caliptra FMC ...
3,231,015 UART:
3,231,158 UART: [state] CFI Enabled
3,241,970 UART: [fht] FMC Alias Private Key: 7
3,349,952 UART: [art] Extend RT PCRs Done
3,350,380 UART: [art] Lock RT PCRs Done
3,352,254 UART: [art] Populate DV Done
3,360,304 UART: [fht] FMC Alias Private Key: 7
3,361,274 UART: [art] Derive CDI
3,361,554 UART: [art] Store in in slot 0x4
3,447,389 UART: [art] Derive Key Pair
3,447,749 UART: [art] Store priv key in slot 0x5
3,460,935 UART: [art] Derive Key Pair - Done
3,475,765 UART: [art] Signing Cert with AUTHO
3,476,245 UART: RITY.KEYID = 7
3,491,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,096 UART: [art] PUB.X = 40926A6C2B8B8F07174C522AF1DC5062D8B1C9E7FD5F74331DAF10BAAEA1A2B3C1588E644AC2A908157D420156976A35
3,498,863 UART: [art] PUB.Y = 5FCEDE9B5F0E268A74110E5C39BAA431A70E97675EDBB9A472478A0B5EF914BC92FD9310C8AA764C2FEF086E3953AEA1
3,505,816 UART: [art] SIG.R = F143977B3CE87CF18E08217BE5BB4DC856EF497338D38681857396975A8244EB59FA01F4F1A8FBA0ED7DA2527CB59899
3,512,584 UART: [art] SIG.S = 6D9B5CA71A7D510E01334900125A5404F61D7369A002B232108B632BEA9FA32BD830C42A2EE32AE8F102E224F6CDA433
3,536,524 UART: Caliptra RT
3,536,869 UART: [state] CFI Enabled
3,645,003 UART: [rt] RT listening for mailbox commands...
3,645,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,703 UART: [rt]cmd =0x41544d4e, len=14344
5,168,039 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,379 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,231 UART: [idev] ++
1,172,399 UART: [idev] CDI.KEYID = 6
1,172,760 UART: [idev] SUBJECT.KEYID = 7
1,173,185 UART: [idev] UDS.KEYID = 0
1,173,531 ready_for_fw is high
1,173,531 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,895 UART: [idev] Erasing UDS.KEYID = 0
1,197,599 UART: [idev] Sha1 KeyId Algorithm
1,206,457 UART: [idev] --
1,207,610 UART: [ldev] ++
1,207,778 UART: [ldev] CDI.KEYID = 6
1,208,142 UART: [ldev] SUBJECT.KEYID = 5
1,208,569 UART: [ldev] AUTHORITY.KEYID = 7
1,209,032 UART: [ldev] FE.KEYID = 1
1,214,362 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,346 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,048 >>> mbox cmd response: success
3,318,173 UART: [afmc] ++
3,318,341 UART: [afmc] CDI.KEYID = 6
3,318,704 UART: [afmc] SUBJECT.KEYID = 7
3,319,130 UART: [afmc] AUTHORITY.KEYID = 5
3,354,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,501 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,211 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,101 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,812 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,652 UART: [afmc] --
3,397,626 UART: [cold-reset] --
3,398,286 UART: [state] Locking Datavault
3,399,371 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,975 UART: [state] Locking ICCM
3,400,609 UART: [exit] Launching FMC @ 0x40000130
3,405,938 UART:
3,405,954 UART: Running Caliptra FMC ...
3,406,362 UART:
3,406,416 UART: [state] CFI Enabled
3,417,186 UART: [fht] FMC Alias Private Key: 7
3,525,154 UART: [art] Extend RT PCRs Done
3,525,582 UART: [art] Lock RT PCRs Done
3,527,140 UART: [art] Populate DV Done
3,535,098 UART: [fht] FMC Alias Private Key: 7
3,536,110 UART: [art] Derive CDI
3,536,390 UART: [art] Store in in slot 0x4
3,622,077 UART: [art] Derive Key Pair
3,622,437 UART: [art] Store priv key in slot 0x5
3,635,199 UART: [art] Derive Key Pair - Done
3,649,947 UART: [art] Signing Cert with AUTHO
3,650,427 UART: RITY.KEYID = 7
3,665,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,360 UART: [art] PUB.X = 6998825D7E291F753B9A1A8D17D4DC01E80E7E3001535E0B0030A3229CC062CBF944A8336E8F292D1404E75E6C36E1F9
3,673,091 UART: [art] PUB.Y = BEA132E033149DD87A4AE75496B60744AE11844619CC39D902500B38DD6BEF1BB5A91064F6E2BB995F8B9465A10C87D3
3,680,033 UART: [art] SIG.R = 55F73B9D64A2CB2E1006343CFB44C0DE363708EFA7B1A0399C7221DBB9D5838FDF9CB0A7B3460E350F191D3B678D47DD
3,686,803 UART: [art] SIG.S = 7036B334AAAF0035FB18DFC356D75036BE148154652A0B897FD2D26F554E9040EC0BD1C4CBF89F1A556F210D86680941
3,710,842 UART: Caliptra RT
3,711,095 UART: [state] CFI Enabled
3,818,396 UART: [rt] RT listening for mailbox commands...
3,819,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,158 UART: [rt]cmd =0x41544d4e, len=14344
5,350,430 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,570 ready_for_fw is high
1,055,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,264 >>> mbox cmd response: success
3,230,251 UART:
3,230,267 UART: Running Caliptra FMC ...
3,230,675 UART:
3,230,729 UART: [state] CFI Enabled
3,241,211 UART: [fht] FMC Alias Private Key: 7
3,348,493 UART: [art] Extend RT PCRs Done
3,348,921 UART: [art] Lock RT PCRs Done
3,350,525 UART: [art] Populate DV Done
3,358,789 UART: [fht] FMC Alias Private Key: 7
3,359,901 UART: [art] Derive CDI
3,360,181 UART: [art] Store in in slot 0x4
3,445,454 UART: [art] Derive Key Pair
3,445,814 UART: [art] Store priv key in slot 0x5
3,458,890 UART: [art] Derive Key Pair - Done
3,473,322 UART: [art] Signing Cert with AUTHO
3,473,802 UART: RITY.KEYID = 7
3,489,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,901 UART: [art] PUB.X = 78938D8275666317A32F0CAEAC8D495E753A0438003567A31101CA92F6E7F34D49D2A82CAED1BA45BF0C78F48878E641
3,496,637 UART: [art] PUB.Y = D95D8553527D81E9560BF37F165A338EC759C3BA2E849275C6A4697025BE07FB193112B72E80C71B6DD6F24D65A3A7F3
3,503,581 UART: [art] SIG.R = 548DB57EE144D84ED87D3B7E973D9B5D865592CF24143BF5ED394EC7933D5A808FEF705591D8C401E7C6BD8998A14E23
3,510,354 UART: [art] SIG.S = F0C0F361DB010C447878AB9E0F8653BA574B0E83C4FD5E0E954CDEA3C17370B0C6C1EEA863C5DB9171BCD4BB5DDAAE5F
3,534,168 UART: Caliptra RT
3,534,421 UART: [state] CFI Enabled
3,642,507 UART: [rt] RT listening for mailbox commands...
3,643,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,175 UART: [rt]cmd =0x41544d4e, len=14344
5,174,289 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,174,202 ready_for_fw is high
1,174,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,559 UART: [fwproc] Wait for Commands...
1,282,264 UART: [fwproc] Recv command 0x46574c44
1,282,997 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,306 >>> mbox cmd response: success
3,326,537 UART: [afmc] ++
3,326,705 UART: [afmc] CDI.KEYID = 6
3,327,068 UART: [afmc] SUBJECT.KEYID = 7
3,327,494 UART: [afmc] AUTHORITY.KEYID = 5
3,363,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,759 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,469 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,359 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,070 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,058 UART: [afmc] --
3,407,002 UART: [cold-reset] --
3,407,904 UART: [state] Locking Datavault
3,409,119 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,723 UART: [state] Locking ICCM
3,410,169 UART: [exit] Launching FMC @ 0x40000130
3,415,498 UART:
3,415,514 UART: Running Caliptra FMC ...
3,415,922 UART:
3,416,065 UART: [state] CFI Enabled
3,426,611 UART: [fht] FMC Alias Private Key: 7
3,534,403 UART: [art] Extend RT PCRs Done
3,534,831 UART: [art] Lock RT PCRs Done
3,536,095 UART: [art] Populate DV Done
3,544,275 UART: [fht] FMC Alias Private Key: 7
3,545,235 UART: [art] Derive CDI
3,545,515 UART: [art] Store in in slot 0x4
3,631,298 UART: [art] Derive Key Pair
3,631,658 UART: [art] Store priv key in slot 0x5
3,645,084 UART: [art] Derive Key Pair - Done
3,659,899 UART: [art] Signing Cert with AUTHO
3,660,379 UART: RITY.KEYID = 7
3,675,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,560 UART: [art] PUB.X = 6CDBF9E894D9D79A494DED7579932146D8E9E3E00758363C50AAEB728B48E9296E50D110DBB033EDC1BECA9805F180CD
3,683,336 UART: [art] PUB.Y = 7BDDF53E3E5DEF01F936CDD1A1BF1D7BBE6F714CA82965BA16D9D6A262D0DFCB6D3619896E4C3CEC8E36171C89127615
3,690,303 UART: [art] SIG.R = 9372725429292F4A78D16180D9E3124AD5038539076C73E385C137B13AE2DEA0F353631924C7E0C4F3DBF43825149539
3,697,053 UART: [art] SIG.S = D0AEF14F81BE284F082B44B3ED8325490F1631B0A1067BB4E63BA36831D463780BA9C08FC4E4ED24312F2E22E3DD4A6C
3,720,490 UART: Caliptra RT
3,720,835 UART: [state] CFI Enabled
3,828,956 UART: [rt] RT listening for mailbox commands...
3,829,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,770 UART: [rt]cmd =0x41544d4e, len=14344
5,356,070 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,289 ready_for_fw is high
1,056,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,365 >>> mbox cmd response: success
3,230,966 UART:
3,230,982 UART: Running Caliptra FMC ...
3,231,390 UART:
3,231,533 UART: [state] CFI Enabled
3,242,417 UART: [fht] FMC Alias Private Key: 7
3,350,539 UART: [art] Extend RT PCRs Done
3,350,967 UART: [art] Lock RT PCRs Done
3,352,345 UART: [art] Populate DV Done
3,360,765 UART: [fht] FMC Alias Private Key: 7
3,361,871 UART: [art] Derive CDI
3,362,151 UART: [art] Store in in slot 0x4
3,448,032 UART: [art] Derive Key Pair
3,448,392 UART: [art] Store priv key in slot 0x5
3,462,120 UART: [art] Derive Key Pair - Done
3,476,938 UART: [art] Signing Cert with AUTHO
3,477,418 UART: RITY.KEYID = 7
3,492,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,355 UART: [art] PUB.X = 8030115F906C378C10CA5E1058DE4D72B352A7CFA6A80A12A002F21AF5B542FE17258F219053CBC2E84AF3074A9A33F7
3,500,120 UART: [art] PUB.Y = 10BDFAA17884A814167BF483EC9652FB0803C314E708437AD88BF3D089FC9FBF0BB6AF82D5A63A777B35C82F884D51BF
3,507,070 UART: [art] SIG.R = D534669006CD4DD0EFA7FFA9144C589D28E73968715BB854CC20590C9B81B8CAF6624A0619F23DEAF9245152BBF8311B
3,513,837 UART: [art] SIG.S = 53EBFF48B119A1DC3677DFCD20F4F12AD28FD16A166747F777B668D4E0849D507CF6856D8E3EAB593927E146F818FC9B
3,537,344 UART: Caliptra RT
3,537,689 UART: [state] CFI Enabled
3,645,223 UART: [rt] RT listening for mailbox commands...
3,645,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,621 UART: [rt]cmd =0x41544d4e, len=14344
5,156,751 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,704 UART: [state] LifecycleState = Unprovisioned
86,359 UART: [state] DebugLocked = No
86,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,493 UART: [kat] SHA2-256
882,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,539 UART: [kat] ++
886,691 UART: [kat] sha1
890,947 UART: [kat] SHA2-256
892,885 UART: [kat] SHA2-384
895,512 UART: [kat] SHA2-512-ACC
897,413 UART: [kat] ECC-384
903,312 UART: [kat] HMAC-384Kdf
908,126 UART: [kat] LMS
1,476,322 UART: [kat] --
1,477,081 UART: [cold-reset] ++
1,477,411 UART: [fht] Storing FHT @ 0x50003400
1,480,278 UART: [idev] ++
1,480,446 UART: [idev] CDI.KEYID = 6
1,480,806 UART: [idev] SUBJECT.KEYID = 7
1,481,230 UART: [idev] UDS.KEYID = 0
1,481,575 ready_for_fw is high
1,481,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,994 UART: [idev] Erasing UDS.KEYID = 0
1,505,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,514,941 UART: [ldev] ++
1,515,109 UART: [ldev] CDI.KEYID = 6
1,515,472 UART: [ldev] SUBJECT.KEYID = 5
1,515,898 UART: [ldev] AUTHORITY.KEYID = 7
1,516,361 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,547,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,192 UART: [ldev] --
1,586,663 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 114332 bytes
5,083,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,142,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,278,138 >>> mbox cmd response: success
5,279,204 UART: [afmc] ++
5,279,372 UART: [afmc] CDI.KEYID = 6
5,279,734 UART: [afmc] SUBJECT.KEYID = 7
5,280,159 UART: [afmc] AUTHORITY.KEYID = 5
5,315,603 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,727 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,436 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,328 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,350,029 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,975 UART: [afmc] --
5,358,887 UART: [cold-reset] --
5,359,677 UART: [state] Locking Datavault
5,360,700 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,304 UART: [state] Locking ICCM
5,361,754 UART: [exit] Launching FMC @ 0x40000130
5,367,083 UART:
5,367,099 UART: Running Caliptra FMC ...
5,367,507 UART:
5,367,561 UART: [state] CFI Enabled
5,377,699 UART: [fht] FMC Alias Private Key: 7
5,485,093 UART: [art] Extend RT PCRs Done
5,485,521 UART: [art] Lock RT PCRs Done
5,486,955 UART: [art] Populate DV Done
5,495,403 UART: [fht] FMC Alias Private Key: 7
5,496,571 UART: [art] Derive CDI
5,496,851 UART: [art] Store in in slot 0x4
5,581,872 UART: [art] Derive Key Pair
5,582,232 UART: [art] Store priv key in slot 0x5
5,595,240 UART: [art] Derive Key Pair - Done
5,609,839 UART: [art] Signing Cert with AUTHO
5,610,319 UART: RITY.KEYID = 7
5,625,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,324 UART: [art] PUB.X = 39434DDC199782C1D19D42C02B1D676BFDDFB79961A105AFC2ED68A8C093013F282A664091477300EA3C28B9B6F40D16
5,633,065 UART: [art] PUB.Y = 08FB8235ACC1A02CE6AAC9DFC340E71721F44D4BC2FB8BDFAC672C90D766061B9A861EC25B0637815793EDA193A280DD
5,640,022 UART: [art] SIG.R = 49A233E4F0ED926D6A4F08686BBBD8E0EEDBEB77576DD27FBFCB5928DEEAE555A3079FE7663C0DCC4FF81D5D3E1EE044
5,646,811 UART: [art] SIG.S = 97F436DC9F03A117112AAAAEC163AE453CCE93E1326B4AA4FA576E574EC798796C5B649DAC022F3DEDC0263AB1FF6F5E
5,671,066 UART: Caliptra RT
5,671,319 UART: [state] CFI Enabled
5,779,438 UART: [rt] RT listening for mailbox commands...
5,780,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,903,124 UART: [rt]cmd =0x41544d4e, len=14344
7,008,789 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,183 ready_for_fw is high
1,362,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,074 >>> mbox cmd response: success
5,262,223 UART:
5,262,239 UART: Running Caliptra FMC ...
5,262,647 UART:
5,262,701 UART: [state] CFI Enabled
5,272,905 UART: [fht] FMC Alias Private Key: 7
5,380,687 UART: [art] Extend RT PCRs Done
5,381,115 UART: [art] Lock RT PCRs Done
5,382,403 UART: [art] Populate DV Done
5,390,689 UART: [fht] FMC Alias Private Key: 7
5,391,635 UART: [art] Derive CDI
5,391,915 UART: [art] Store in in slot 0x4
5,477,326 UART: [art] Derive Key Pair
5,477,686 UART: [art] Store priv key in slot 0x5
5,490,990 UART: [art] Derive Key Pair - Done
5,506,054 UART: [art] Signing Cert with AUTHO
5,506,534 UART: RITY.KEYID = 7
5,521,822 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,587 UART: [art] PUB.X = 7ADCEFE5D33F996BF1BA3236A775A34EC1AF31DA95B3D5376D5040D1307204E1C61AC4784C8352EE3BAEA9DF83853A24
5,529,368 UART: [art] PUB.Y = CB3C46AB0DDB0B321D80153C4AAC6F77E275B183E96D29EE5A38ED3859EF34819ACAE6DE4CE99E4C0C2E5A1624981417
5,536,325 UART: [art] SIG.R = EE1D9AC2AC6B1360B6CA9826A263BBB663C158F5EF5AE68B231D1B4C3E31215D15C158E171E0AE06CBD3689A8F6DE33C
5,543,110 UART: [art] SIG.S = A66EF4C940B05A8046696434B7E56CAC3D07E51C6F7EA12256AE14B279C1B738CF0B3A1F984A50D61F62FCEE64A27201
5,566,798 UART: Caliptra RT
5,567,051 UART: [state] CFI Enabled
5,675,617 UART: [rt] RT listening for mailbox commands...
5,676,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,049 UART: [rt]cmd =0x41544d4e, len=14344
6,929,328 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,950 UART: [kat] SHA2-256
892,888 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
908,197 UART: [kat] LMS
1,476,393 UART: [kat] --
1,477,286 UART: [cold-reset] ++
1,477,660 UART: [fht] Storing FHT @ 0x50003400
1,480,613 UART: [idev] ++
1,480,781 UART: [idev] CDI.KEYID = 6
1,481,141 UART: [idev] SUBJECT.KEYID = 7
1,481,565 UART: [idev] UDS.KEYID = 0
1,481,910 ready_for_fw is high
1,481,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,555 UART: [idev] Erasing UDS.KEYID = 0
1,506,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,243 UART: [idev] --
1,516,258 UART: [ldev] ++
1,516,426 UART: [ldev] CDI.KEYID = 6
1,516,789 UART: [ldev] SUBJECT.KEYID = 5
1,517,215 UART: [ldev] AUTHORITY.KEYID = 7
1,517,678 UART: [ldev] FE.KEYID = 1
1,523,072 UART: [ldev] Erasing FE.KEYID = 1
1,548,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,427 UART: [ldev] --
1,586,722 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46574c44
1,588,208 UART: [fwproc] Received Image of size 114332 bytes
5,159,086 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,351,957 >>> mbox cmd response: success
5,353,007 UART: [afmc] ++
5,353,175 UART: [afmc] CDI.KEYID = 6
5,353,537 UART: [afmc] SUBJECT.KEYID = 7
5,353,962 UART: [afmc] AUTHORITY.KEYID = 5
5,389,556 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,406,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,407,090 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,799 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,691 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,424,392 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,432,234 UART: [afmc] --
5,433,146 UART: [cold-reset] --
5,433,896 UART: [state] Locking Datavault
5,434,885 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,489 UART: [state] Locking ICCM
5,436,119 UART: [exit] Launching FMC @ 0x40000130
5,441,448 UART:
5,441,464 UART: Running Caliptra FMC ...
5,441,872 UART:
5,442,015 UART: [state] CFI Enabled
5,452,771 UART: [fht] FMC Alias Private Key: 7
5,561,687 UART: [art] Extend RT PCRs Done
5,562,115 UART: [art] Lock RT PCRs Done
5,563,777 UART: [art] Populate DV Done
5,572,305 UART: [fht] FMC Alias Private Key: 7
5,573,277 UART: [art] Derive CDI
5,573,557 UART: [art] Store in in slot 0x4
5,659,174 UART: [art] Derive Key Pair
5,659,534 UART: [art] Store priv key in slot 0x5
5,672,522 UART: [art] Derive Key Pair - Done
5,687,478 UART: [art] Signing Cert with AUTHO
5,687,958 UART: RITY.KEYID = 7
5,703,110 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,875 UART: [art] PUB.X = 703C671B7D105340A12046A8BFF136D42D4CBACBFD9DE9B17A6A8860551DA227A99CD0FDE13D71A0D5EE52AA758ECC85
5,710,663 UART: [art] PUB.Y = 181E2B1FAFD560306EE8952B3BC93D9F13E4781ECEC2D567B3ED799996F4C18E661D4BCF24085F95D253EFAD61D62678
5,717,620 UART: [art] SIG.R = 54CD6CF817EA467908A5D4F9C02AC9C4A6341E743AF3DC56400B80052857E7624ED67147E6972602A1E0585A2DAADD5E
5,724,382 UART: [art] SIG.S = 20FE5DB892592AFC173E13CA3F0DE94AA7983A5DCB21693B4AD58FE56920F9F53EC90AC143761A79C0245714310DB01B
5,748,088 UART: Caliptra RT
5,748,433 UART: [state] CFI Enabled
5,856,291 UART: [rt] RT listening for mailbox commands...
5,856,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,963 UART: [rt]cmd =0x41544d4e, len=14344
7,112,387 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,924 ready_for_fw is high
1,362,924 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,241,560 >>> mbox cmd response: success
5,302,275 UART:
5,302,291 UART: Running Caliptra FMC ...
5,302,699 UART:
5,302,842 UART: [state] CFI Enabled
5,313,670 UART: [fht] FMC Alias Private Key: 7
5,421,474 UART: [art] Extend RT PCRs Done
5,421,902 UART: [art] Lock RT PCRs Done
5,423,644 UART: [art] Populate DV Done
5,432,046 UART: [fht] FMC Alias Private Key: 7
5,433,086 UART: [art] Derive CDI
5,433,366 UART: [art] Store in in slot 0x4
5,518,829 UART: [art] Derive Key Pair
5,519,189 UART: [art] Store priv key in slot 0x5
5,533,049 UART: [art] Derive Key Pair - Done
5,547,917 UART: [art] Signing Cert with AUTHO
5,548,397 UART: RITY.KEYID = 7
5,563,815 UART: [art] Erasing AUTHORITY.KEYID = 7
5,564,580 UART: [art] PUB.X = 7BC80390463833E439BA63DBEE44A3929D850D730A800140CE14AF76A05691BFBB5B34DB7DD29F168C6EC025FA16656C
5,571,344 UART: [art] PUB.Y = CF2CB4E4633F95B58712B572B69AB43F61F4F6EC8DA4C952D5E67682D7F2CADBBD2AF88AB237E5D85A0CE0DE4C0DA3BE
5,578,316 UART: [art] SIG.R = 05A6F0858726CBD87C6920A82D94851B64E9A8FBA43FE6DD20E96A4FAD765D2127D9DCFD1E518081FAABD6A3594268ED
5,585,097 UART: [art] SIG.S = 80204D9D78788EA2D82E9E911F001045ED1209F3EAE455750599D8463840D1E85CC7A11698BC1A03B2F74045FD438BAC
5,608,359 UART: Caliptra RT
5,608,704 UART: [state] CFI Enabled
5,716,897 UART: [rt] RT listening for mailbox commands...
5,717,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,509 UART: [rt]cmd =0x41544d4e, len=14344
6,958,561 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,868 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,971 UART: [fht] FHT @ 0x50003400
1,174,698 UART: [idev] ++
1,174,866 UART: [idev] CDI.KEYID = 6
1,175,226 UART: [idev] SUBJECT.KEYID = 7
1,175,650 UART: [idev] UDS.KEYID = 0
1,175,995 ready_for_fw is high
1,175,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,527 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,655 UART: [ldev] --
1,283,024 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,191 >>> mbox cmd response: success
3,320,205 UART: [afmc] ++
3,320,373 UART: [afmc] CDI.KEYID = 6
3,320,735 UART: [afmc] SUBJECT.KEYID = 7
3,321,160 UART: [afmc] AUTHORITY.KEYID = 5
3,356,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,579 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,288 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,180 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,891 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,554 UART: [afmc] --
3,399,660 UART: [cold-reset] --
3,400,354 UART: [state] Locking Datavault
3,401,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,223 UART: [state] Locking ICCM
3,402,691 UART: [exit] Launching FMC @ 0x40000130
3,408,020 UART:
3,408,036 UART: Running Caliptra FMC ...
3,408,444 UART:
3,408,498 UART: [state] CFI Enabled
3,419,192 UART: [fht] FMC Alias Private Key: 7
3,527,624 UART: [art] Extend RT PCRs Done
3,528,052 UART: [art] Lock RT PCRs Done
3,529,660 UART: [art] Populate DV Done
3,538,014 UART: [fht] FMC Alias Private Key: 7
3,539,106 UART: [art] Derive CDI
3,539,386 UART: [art] Store in in slot 0x4
3,625,199 UART: [art] Derive Key Pair
3,625,559 UART: [art] Store priv key in slot 0x5
3,639,075 UART: [art] Derive Key Pair - Done
3,653,946 UART: [art] Signing Cert with AUTHO
3,654,426 UART: RITY.KEYID = 7
3,669,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,561 UART: [art] PUB.X = 0A5B072E9D3CD8FE82B519F9B4B4DCE65E954DB42D292BA72BDE07FA1C5CCF68114A959B688A5C51618012001E5D49B5
3,677,312 UART: [art] PUB.Y = E179B57FF187836368B2098D49B5BC9D437CC6DC65D2CBB6C1DCEE2D86E96802AAC4E1273126BC85568587241B18E939
3,684,260 UART: [art] SIG.R = 3C621A19351DF3F61EC9A49243C00E88B54599ECF234452A48730298A832C4701D7BB51183281DE8F0B7EE0A43FFCCC7
3,691,023 UART: [art] SIG.S = 4A1F174AC1423C368F07DC6077A50A95A7E4335CBDC9B55D37AEC0760FC06A580D945BE57655A56D39AEA16C4DCD117D
3,714,672 UART: Caliptra RT
3,714,925 UART: [state] CFI Enabled
3,822,354 UART: [rt] RT listening for mailbox commands...
3,823,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,056 UART: [rt]cmd =0x41544d4e, len=14344
5,063,436 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,963 ready_for_fw is high
1,059,963 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,041 >>> mbox cmd response: success
3,235,378 UART:
3,235,394 UART: Running Caliptra FMC ...
3,235,802 UART:
3,235,856 UART: [state] CFI Enabled
3,246,108 UART: [fht] FMC Alias Private Key: 7
3,353,346 UART: [art] Extend RT PCRs Done
3,353,774 UART: [art] Lock RT PCRs Done
3,355,526 UART: [art] Populate DV Done
3,363,922 UART: [fht] FMC Alias Private Key: 7
3,364,960 UART: [art] Derive CDI
3,365,240 UART: [art] Store in in slot 0x4
3,450,975 UART: [art] Derive Key Pair
3,451,335 UART: [art] Store priv key in slot 0x5
3,464,493 UART: [art] Derive Key Pair - Done
3,479,276 UART: [art] Signing Cert with AUTHO
3,479,756 UART: RITY.KEYID = 7
3,494,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,629 UART: [art] PUB.X = 3B7AE9DFDE894F0556C8B6D97951667EFC855BA6A7936D72875D81F21B1D80CA89B57B0AABDBE0C677979BB225594D0D
3,502,402 UART: [art] PUB.Y = 54CCCCD0288511E616624832EF8372FF0C8B32DC64B286794EDAF7408D02032E413B2F3F734C62D13A2F3B315049F2B1
3,509,343 UART: [art] SIG.R = 50BB8B3A810E6E78F44BC4B84F667282B75080D960486ED097E67D4EE20B8A6D2783B89C4509CAAF1B93FB17CA1B52FB
3,516,114 UART: [art] SIG.S = F4101B24F3417AE8D956075FCC153545A4509C9CD5B275781487AD18E3547EB5E26E833F9E76DA618D3DD7E86AF92DEB
3,539,548 UART: Caliptra RT
3,539,801 UART: [state] CFI Enabled
3,647,849 UART: [rt] RT listening for mailbox commands...
3,648,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,549 UART: [rt]cmd =0x41544d4e, len=14344
4,896,120 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,208 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
894,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,134 UART: [kat] ++
898,286 UART: [kat] sha1
902,378 UART: [kat] SHA2-256
904,318 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,055 UART: [kat] LMS
1,171,383 UART: [kat] --
1,172,284 UART: [cold-reset] ++
1,172,738 UART: [fht] FHT @ 0x50003400
1,175,299 UART: [idev] ++
1,175,467 UART: [idev] CDI.KEYID = 6
1,175,827 UART: [idev] SUBJECT.KEYID = 7
1,176,251 UART: [idev] UDS.KEYID = 0
1,176,596 ready_for_fw is high
1,176,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,979 UART: [idev] Erasing UDS.KEYID = 0
1,200,644 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,358 UART: [ldev] ++
1,210,526 UART: [ldev] CDI.KEYID = 6
1,210,889 UART: [ldev] SUBJECT.KEYID = 5
1,211,315 UART: [ldev] AUTHORITY.KEYID = 7
1,211,778 UART: [ldev] FE.KEYID = 1
1,217,198 UART: [ldev] Erasing FE.KEYID = 1
1,243,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,299 UART: [fwproc] Wait for Commands...
1,284,029 UART: [fwproc] Recv command 0x46574c44
1,284,757 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,699 >>> mbox cmd response: success
3,316,891 UART: [afmc] ++
3,317,059 UART: [afmc] CDI.KEYID = 6
3,317,421 UART: [afmc] SUBJECT.KEYID = 7
3,317,846 UART: [afmc] AUTHORITY.KEYID = 5
3,353,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,793 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,502 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,394 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,105 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,924 UART: [afmc] --
3,397,038 UART: [cold-reset] --
3,397,598 UART: [state] Locking Datavault
3,398,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,249 UART: [state] Locking ICCM
3,399,833 UART: [exit] Launching FMC @ 0x40000130
3,405,162 UART:
3,405,178 UART: Running Caliptra FMC ...
3,405,586 UART:
3,405,729 UART: [state] CFI Enabled
3,416,705 UART: [fht] FMC Alias Private Key: 7
3,523,469 UART: [art] Extend RT PCRs Done
3,523,897 UART: [art] Lock RT PCRs Done
3,525,367 UART: [art] Populate DV Done
3,533,695 UART: [fht] FMC Alias Private Key: 7
3,534,829 UART: [art] Derive CDI
3,535,109 UART: [art] Store in in slot 0x4
3,621,124 UART: [art] Derive Key Pair
3,621,484 UART: [art] Store priv key in slot 0x5
3,634,544 UART: [art] Derive Key Pair - Done
3,649,333 UART: [art] Signing Cert with AUTHO
3,649,813 UART: RITY.KEYID = 7
3,664,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,558 UART: [art] PUB.X = 66A0BF8B6CC5213253004686020CF2F2E305B4031836FC6CE8B8FA8FE0AB38075C1E93A795057B46BE214F125A6A28E0
3,672,290 UART: [art] PUB.Y = CE7F7DD5F8E7B9A745154AD05CADC25E06AADC09BE7D98DAF021CF952A81463B107DFD8658CD2970487D1320CA705BA0
3,679,252 UART: [art] SIG.R = 8D25620ED0176A6D34D1AE7CDF05FB045BD61A24647A1C68AC43AE66A8DCC31CE4C9C8839934E80B69E8089AB0BBE5AC
3,686,025 UART: [art] SIG.S = E939341A675401FD1920AE42552549F3413407E0417F042423FCCB7EE5924A53E66A60D54D080CC719123958CD00D846
3,709,929 UART: Caliptra RT
3,710,274 UART: [state] CFI Enabled
3,818,061 UART: [rt] RT listening for mailbox commands...
3,818,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,017 UART: [rt]cmd =0x41544d4e, len=14344
5,062,154 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,354 ready_for_fw is high
1,060,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,497 >>> mbox cmd response: success
3,229,070 UART:
3,229,086 UART: Running Caliptra FMC ...
3,229,494 UART:
3,229,637 UART: [state] CFI Enabled
3,240,361 UART: [fht] FMC Alias Private Key: 7
3,348,385 UART: [art] Extend RT PCRs Done
3,348,813 UART: [art] Lock RT PCRs Done
3,350,413 UART: [art] Populate DV Done
3,358,629 UART: [fht] FMC Alias Private Key: 7
3,359,609 UART: [art] Derive CDI
3,359,889 UART: [art] Store in in slot 0x4
3,445,476 UART: [art] Derive Key Pair
3,445,836 UART: [art] Store priv key in slot 0x5
3,458,956 UART: [art] Derive Key Pair - Done
3,473,660 UART: [art] Signing Cert with AUTHO
3,474,140 UART: RITY.KEYID = 7
3,489,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,099 UART: [art] PUB.X = FCC317E9587B68975D82BBE8376D5CC5AC3A3E25A751461763A9F6EE3C3FF0088C8637A3FC07B905844F46D45D614405
3,496,859 UART: [art] PUB.Y = D8573B32117CF6F029D0C62A422A63142C5AE48DFD247DEA103BA0DFA321B4B171EFA9D553C80025BEB32FC5061BE161
3,503,796 UART: [art] SIG.R = 64585A3E7DA8B2FAAD6FB53D6105CF83730C18F502DC9DC954BB13F616A0B4E2EF01241F6129E009BA4DAA1E65A7EDE3
3,510,569 UART: [art] SIG.S = D0EE0DA8E9A759BAFA34443505269E6B77CE6F171E8C74ACB83A55305D469467AD8EFCBE0E81AB2A3EE6600EB7E541D5
3,534,362 UART: Caliptra RT
3,534,707 UART: [state] CFI Enabled
3,642,787 UART: [rt] RT listening for mailbox commands...
3,643,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,615 UART: [rt]cmd =0x41544d4e, len=14344
4,891,870 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
920,980 UART: [kat] LMS
1,169,292 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,563 UART: [fht] FHT @ 0x50003400
1,173,425 UART: [idev] ++
1,173,593 UART: [idev] CDI.KEYID = 6
1,173,954 UART: [idev] SUBJECT.KEYID = 7
1,174,379 UART: [idev] UDS.KEYID = 0
1,174,725 ready_for_fw is high
1,174,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,310 UART: [ldev] ++
1,209,478 UART: [ldev] CDI.KEYID = 6
1,209,842 UART: [ldev] SUBJECT.KEYID = 5
1,210,269 UART: [ldev] AUTHORITY.KEYID = 7
1,210,732 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,879 UART: [fwproc] Recv command 0x46574c44
1,282,612 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,195 >>> mbox cmd response: success
3,317,210 UART: [afmc] ++
3,317,378 UART: [afmc] CDI.KEYID = 6
3,317,741 UART: [afmc] SUBJECT.KEYID = 7
3,318,167 UART: [afmc] AUTHORITY.KEYID = 5
3,353,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,468 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,178 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,068 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,779 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,817 UART: [afmc] --
3,396,945 UART: [cold-reset] --
3,397,811 UART: [state] Locking Datavault
3,399,030 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,634 UART: [state] Locking ICCM
3,400,118 UART: [exit] Launching FMC @ 0x40000130
3,405,447 UART:
3,405,463 UART: Running Caliptra FMC ...
3,405,871 UART:
3,405,925 UART: [state] CFI Enabled
3,416,591 UART: [fht] FMC Alias Private Key: 7
3,524,583 UART: [art] Extend RT PCRs Done
3,525,011 UART: [art] Lock RT PCRs Done
3,526,747 UART: [art] Populate DV Done
3,535,101 UART: [fht] FMC Alias Private Key: 7
3,536,267 UART: [art] Derive CDI
3,536,547 UART: [art] Store in in slot 0x4
3,622,332 UART: [art] Derive Key Pair
3,622,692 UART: [art] Store priv key in slot 0x5
3,636,592 UART: [art] Derive Key Pair - Done
3,651,422 UART: [art] Signing Cert with AUTHO
3,651,902 UART: RITY.KEYID = 7
3,667,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,903 UART: [art] PUB.X = 135C889680B310DA97EFF6BD3E3C555F4774BBA0F581A0F4C9821923F09469194BE256A6BCCD5ED5D70AB9FAC725EB67
3,674,682 UART: [art] PUB.Y = 5ABDE4868D02FC2F96175EE9C44FB766AE259200AAE91F82E2E70B01BFAB179F0CB555DE681C8EFADE2792CF94F0EB0E
3,681,619 UART: [art] SIG.R = 9923F7D24B7825F8813FBA42D001AF902E064443B430D87DEC448CFBE707885D01B0D95E0CC865D701D64E3FAFDA65D1
3,688,379 UART: [art] SIG.S = C493E6E93035658F3E4453DC91D9D490C80B9BFB4C64385BD87BDC495FCDF2EE16CF5679EF2535B188E35A8EBF3BE11D
3,711,759 UART: Caliptra RT
3,712,012 UART: [state] CFI Enabled
3,819,561 UART: [rt] RT listening for mailbox commands...
3,820,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,301 UART: [rt]cmd =0x41544d4e, len=14344
5,061,009 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,722 ready_for_fw is high
1,055,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,155 >>> mbox cmd response: success
3,230,484 UART:
3,230,500 UART: Running Caliptra FMC ...
3,230,908 UART:
3,230,962 UART: [state] CFI Enabled
3,241,198 UART: [fht] FMC Alias Private Key: 7
3,349,208 UART: [art] Extend RT PCRs Done
3,349,636 UART: [art] Lock RT PCRs Done
3,351,292 UART: [art] Populate DV Done
3,359,168 UART: [fht] FMC Alias Private Key: 7
3,360,304 UART: [art] Derive CDI
3,360,584 UART: [art] Store in in slot 0x4
3,446,021 UART: [art] Derive Key Pair
3,446,381 UART: [art] Store priv key in slot 0x5
3,459,735 UART: [art] Derive Key Pair - Done
3,474,563 UART: [art] Signing Cert with AUTHO
3,475,043 UART: RITY.KEYID = 7
3,490,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,166 UART: [art] PUB.X = F4E8CC47F6027F7E9FFD00E28A0FDFF47104E97426BF786C2FE6FDCBDD7D482F9A03DB9BE90C8CF04B9FE67C363F286C
3,497,925 UART: [art] PUB.Y = E61816139855F5022C45F9525FDA11C9D2D55FA979267DC93F993C14512A91945F2827EDB69B92B2A76544DAEF37913E
3,504,868 UART: [art] SIG.R = 8A5892B5335AEA9CD3AD9F8D4E8B63F795A4D08BA69276BB2DD6101D83F81916327779B498B668CF1A4A2FF2448653DB
3,511,644 UART: [art] SIG.S = 25AF529592F2D24FB55566A6095FB6C9ECD62A30914C0123712B0924B73BAD0FDCF44C9402E0FD19E2E6DEE6096946A7
3,535,545 UART: Caliptra RT
3,535,798 UART: [state] CFI Enabled
3,643,600 UART: [rt] RT listening for mailbox commands...
3,644,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,284 UART: [rt]cmd =0x41544d4e, len=14344
4,880,270 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,791 UART: [state] LifecycleState = Unprovisioned
85,446 UART: [state] DebugLocked = No
85,978 UART: [state] WD Timer not started. Device not locked for debugging
87,149 UART: [kat] SHA2-256
890,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,828 UART: [kat] ++
894,980 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,939 UART: [kat] SHA2-512-ACC
905,840 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,373 UART: [kat] LMS
1,168,685 UART: [kat] --
1,169,462 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,173,926 ready_for_fw is high
1,173,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,191 UART: [ldev] ++
1,209,359 UART: [ldev] CDI.KEYID = 6
1,209,723 UART: [ldev] SUBJECT.KEYID = 5
1,210,150 UART: [ldev] AUTHORITY.KEYID = 7
1,210,613 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,795 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,983 >>> mbox cmd response: success
3,319,040 UART: [afmc] ++
3,319,208 UART: [afmc] CDI.KEYID = 6
3,319,571 UART: [afmc] SUBJECT.KEYID = 7
3,319,997 UART: [afmc] AUTHORITY.KEYID = 5
3,355,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,506 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,216 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,106 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,817 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,729 UART: [afmc] --
3,398,849 UART: [cold-reset] --
3,399,851 UART: [state] Locking Datavault
3,401,106 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,710 UART: [state] Locking ICCM
3,402,134 UART: [exit] Launching FMC @ 0x40000130
3,407,463 UART:
3,407,479 UART: Running Caliptra FMC ...
3,407,887 UART:
3,408,030 UART: [state] CFI Enabled
3,418,650 UART: [fht] FMC Alias Private Key: 7
3,526,648 UART: [art] Extend RT PCRs Done
3,527,076 UART: [art] Lock RT PCRs Done
3,528,406 UART: [art] Populate DV Done
3,536,556 UART: [fht] FMC Alias Private Key: 7
3,537,536 UART: [art] Derive CDI
3,537,816 UART: [art] Store in in slot 0x4
3,623,479 UART: [art] Derive Key Pair
3,623,839 UART: [art] Store priv key in slot 0x5
3,637,131 UART: [art] Derive Key Pair - Done
3,651,914 UART: [art] Signing Cert with AUTHO
3,652,394 UART: RITY.KEYID = 7
3,667,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,911 UART: [art] PUB.X = 357FD57DFBC814556E6CBE535EDE1F8DF3E4BCD179095C1D0E7C0D17C6CB1CF94625AB8A234B7D1DB37A0AE7F5750A28
3,674,688 UART: [art] PUB.Y = F4A88A93A16D9311A70EF3DE2FB19428FD36DC991D12F35BF8F0F9D0F20D726D7963F4941BB3D8FA7788AE3C7DF1A85E
3,681,648 UART: [art] SIG.R = B3549B35883944C2CC41D42C4160A284F6898CC2A7CAA00EA8658F74B06FD8B67A1FFD54B7E0B769C970C356FBB6B73C
3,688,425 UART: [art] SIG.S = 700917B5EF535E1FB6230CE647528DE5851F8571FC4E5E9E3EB872E5F48A70C67F95FC88E5E338DC264DB9007C11F284
3,711,650 UART: Caliptra RT
3,711,995 UART: [state] CFI Enabled
3,820,171 UART: [rt] RT listening for mailbox commands...
3,820,841 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,749 UART: [rt]cmd =0x41544d4e, len=14344
5,075,985 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,069 ready_for_fw is high
1,056,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,630 >>> mbox cmd response: success
3,233,155 UART:
3,233,171 UART: Running Caliptra FMC ...
3,233,579 UART:
3,233,722 UART: [state] CFI Enabled
3,244,556 UART: [fht] FMC Alias Private Key: 7
3,352,332 UART: [art] Extend RT PCRs Done
3,352,760 UART: [art] Lock RT PCRs Done
3,354,550 UART: [art] Populate DV Done
3,362,768 UART: [fht] FMC Alias Private Key: 7
3,363,802 UART: [art] Derive CDI
3,364,082 UART: [art] Store in in slot 0x4
3,449,423 UART: [art] Derive Key Pair
3,449,783 UART: [art] Store priv key in slot 0x5
3,463,145 UART: [art] Derive Key Pair - Done
3,478,031 UART: [art] Signing Cert with AUTHO
3,478,511 UART: RITY.KEYID = 7
3,493,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,666 UART: [art] PUB.X = 04EF5556DE704D41CEC2B50D75197E312974AF8BB6781C81EEAA684229465D57EEB6C1D6337BF8E10CEE04D01CDA70CE
3,501,438 UART: [art] PUB.Y = A6A51E3B301C95BBF382C52F494F810188382FE98D921D8EA4A133955AB71EB3AA6C8E255A6E808EC1BF92AC22552BB8
3,508,395 UART: [art] SIG.R = 88EDCC0B37654DE805E2AC333118C871C5AEF3F3DBEC92AE51C9767CE980912469DB75B5183642437DD3E04A6BAEDFA0
3,515,173 UART: [art] SIG.S = 38EDEC68E77B28FF49EA51B565CACC59E84A9AC48F6A3712BAF43CF11E1CE56204EFE0293F716E41F2BAB048508FEDC5
3,538,927 UART: Caliptra RT
3,539,272 UART: [state] CFI Enabled
3,646,726 UART: [rt] RT listening for mailbox commands...
3,647,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,252 UART: [rt]cmd =0x41544d4e, len=14344
4,897,798 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,775 UART: [kat] SHA2-256
892,713 UART: [kat] SHA2-384
895,500 UART: [kat] SHA2-512-ACC
897,401 UART: [kat] ECC-384
902,646 UART: [kat] HMAC-384Kdf
907,206 UART: [kat] LMS
1,475,402 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,735 ready_for_fw is high
1,480,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,296 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,520,869 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,040 UART: [ldev] --
1,585,523 UART: [fwproc] Waiting for Commands...
1,586,212 UART: [fwproc] Received command 0x46574c44
1,587,003 UART: [fwproc] Received Image of size 114332 bytes
5,043,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,071,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,101,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,237,025 >>> mbox cmd response: success
5,238,187 UART: [afmc] ++
5,238,355 UART: [afmc] CDI.KEYID = 6
5,238,717 UART: [afmc] SUBJECT.KEYID = 7
5,239,142 UART: [afmc] AUTHORITY.KEYID = 5
5,274,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,290,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,291,268 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,296,977 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,869 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,308,570 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,316,544 UART: [afmc] --
5,317,492 UART: [cold-reset] --
5,318,256 UART: [state] Locking Datavault
5,319,343 UART: [state] Locking PCR0, PCR1 and PCR31
5,319,947 UART: [state] Locking ICCM
5,320,513 UART: [exit] Launching FMC @ 0x40000130
5,325,842 UART:
5,325,858 UART: Running Caliptra FMC ...
5,326,266 UART:
5,326,320 UART: [state] CFI Enabled
5,336,834 UART: [fht] FMC Alias Private Key: 7
5,444,828 UART: [art] Extend RT PCRs Done
5,445,256 UART: [art] Lock RT PCRs Done
5,446,842 UART: [art] Populate DV Done
5,455,122 UART: [fht] FMC Alias Private Key: 7
5,456,140 UART: [art] Derive CDI
5,456,420 UART: [art] Store in in slot 0x4
5,542,115 UART: [art] Derive Key Pair
5,542,475 UART: [art] Store priv key in slot 0x5
5,555,837 UART: [art] Derive Key Pair - Done
5,570,594 UART: [art] Signing Cert with AUTHO
5,571,074 UART: RITY.KEYID = 7
5,586,376 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,141 UART: [art] PUB.X = 454B24E2C9EE1D0B4F4576975158817217A0021E0A92A47D4AA5D0149F107E5ECAA416AC6AD510A5D51F8361EFF7AEEC
5,593,912 UART: [art] PUB.Y = 3F026D0EEFE14A374E2ADA2E72D59DEF052D9099B9015A658BD1E60F7879A0715F2D6CCA790DB4FAA3A8D4E9844E2CD8
5,600,862 UART: [art] SIG.R = EF23101497CDF52C2F16EA2988AA4DEB08193DC2778FA0616013CF8A6E7D910D692CD2735854972BB6A6CA28B53C82A8
5,607,632 UART: [art] SIG.S = B84D8ECC51C985402EB4E4353748B0565EA926A33BC0A0D975AA0620C8C339E561A98E5FCCE3698E76478C66DD6BE09B
5,631,134 UART: Caliptra RT
5,631,387 UART: [state] CFI Enabled
5,740,133 UART: [rt] RT listening for mailbox commands...
5,740,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,864,021 UART: [rt]cmd =0x41544d4e, len=14344
6,994,760 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 ready_for_fw is high
1,362,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,314,677 >>> mbox cmd response: success
5,376,686 UART:
5,376,702 UART: Running Caliptra FMC ...
5,377,110 UART:
5,377,164 UART: [state] CFI Enabled
5,387,754 UART: [fht] FMC Alias Private Key: 7
5,495,444 UART: [art] Extend RT PCRs Done
5,495,872 UART: [art] Lock RT PCRs Done
5,497,232 UART: [art] Populate DV Done
5,505,292 UART: [fht] FMC Alias Private Key: 7
5,506,244 UART: [art] Derive CDI
5,506,524 UART: [art] Store in in slot 0x4
5,591,617 UART: [art] Derive Key Pair
5,591,977 UART: [art] Store priv key in slot 0x5
5,605,271 UART: [art] Derive Key Pair - Done
5,619,766 UART: [art] Signing Cert with AUTHO
5,620,246 UART: RITY.KEYID = 7
5,635,614 UART: [art] Erasing AUTHORITY.KEYID = 7
5,636,379 UART: [art] PUB.X = 6AF98AC5198C98021D9CA4E0BB199D996919B675FD1D745F1B608B84C15F06EA0E6DEBF198171BE789ED29B0E1AF98CC
5,643,154 UART: [art] PUB.Y = A23C6235D3707574C2B647BCC8333294FE3D8F9E8BF5A443143826CED54DC20D3B221B1872A842B54020FB1F7208E0F3
5,650,098 UART: [art] SIG.R = 2276A2645778B63A58FD23171015C212998336A27AA90AD44D6DD2663F9A68B9415CD1358B85F5DA65D12574A58A0BCC
5,656,858 UART: [art] SIG.S = A88260373E80FCC7CE6A7CD89517AEA8B5FA2E956319E830DE264476929AFF7AFEF9E486405850E2770044ADD497BED2
5,680,989 UART: Caliptra RT
5,681,242 UART: [state] CFI Enabled
5,789,947 UART: [rt] RT listening for mailbox commands...
5,790,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,471 UART: [rt]cmd =0x41544d4e, len=14344
7,043,072 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,024 UART: [kat] SHA2-256
881,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,070 UART: [kat] ++
886,222 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,477,088 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 ready_for_fw is high
1,481,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,021 UART: [idev] Erasing UDS.KEYID = 0
1,505,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,332 UART: [ldev] ++
1,515,500 UART: [ldev] CDI.KEYID = 6
1,515,863 UART: [ldev] SUBJECT.KEYID = 5
1,516,289 UART: [ldev] AUTHORITY.KEYID = 7
1,516,752 UART: [ldev] FE.KEYID = 1
1,522,302 UART: [ldev] Erasing FE.KEYID = 1
1,547,871 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,345 UART: [ldev] --
1,587,708 UART: [fwproc] Waiting for Commands...
1,588,367 UART: [fwproc] Received command 0x46574c44
1,589,158 UART: [fwproc] Received Image of size 114332 bytes
5,274,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,466,392 >>> mbox cmd response: success
5,467,408 UART: [afmc] ++
5,467,576 UART: [afmc] CDI.KEYID = 6
5,467,938 UART: [afmc] SUBJECT.KEYID = 7
5,468,363 UART: [afmc] AUTHORITY.KEYID = 5
5,503,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,520,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,825 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,534 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,426 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,538,127 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,546,003 UART: [afmc] --
5,547,133 UART: [cold-reset] --
5,548,035 UART: [state] Locking Datavault
5,549,058 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,662 UART: [state] Locking ICCM
5,550,254 UART: [exit] Launching FMC @ 0x40000130
5,555,583 UART:
5,555,599 UART: Running Caliptra FMC ...
5,556,007 UART:
5,556,150 UART: [state] CFI Enabled
5,566,830 UART: [fht] FMC Alias Private Key: 7
5,674,680 UART: [art] Extend RT PCRs Done
5,675,108 UART: [art] Lock RT PCRs Done
5,676,850 UART: [art] Populate DV Done
5,685,258 UART: [fht] FMC Alias Private Key: 7
5,686,390 UART: [art] Derive CDI
5,686,670 UART: [art] Store in in slot 0x4
5,772,151 UART: [art] Derive Key Pair
5,772,511 UART: [art] Store priv key in slot 0x5
5,786,127 UART: [art] Derive Key Pair - Done
5,800,603 UART: [art] Signing Cert with AUTHO
5,801,083 UART: RITY.KEYID = 7
5,816,071 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,836 UART: [art] PUB.X = 375662E13325E541BB1E3A1B593550351E825FD042CA67CEC2A460251C307915A53DD6348FDC0F8BD05B8D0D02302A1A
5,823,597 UART: [art] PUB.Y = 6EF81B2BA9B841B203EFB94D3999B3C840AC228BD90F628670308A6C482075297DB551FEEAF6028365157B592369E143
5,830,534 UART: [art] SIG.R = CB4897D909299D12DBF0BC27C787595D11E6E50B994B6661B608F45200B6D882A727FC1E097CF2E457FC13B93804EF41
5,837,267 UART: [art] SIG.S = 120E40E79EFDEB60DCC4D418A2B3E577B1AC6C9EA4689C9AB044A976742932403711C1B7943A0240BA802D50C414029F
5,860,877 UART: Caliptra RT
5,861,222 UART: [state] CFI Enabled
5,970,117 UART: [rt] RT listening for mailbox commands...
5,970,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,651 UART: [rt]cmd =0x41544d4e, len=14344
7,218,990 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,996 ready_for_fw is high
1,362,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,279,119 >>> mbox cmd response: success
5,340,108 UART:
5,340,124 UART: Running Caliptra FMC ...
5,340,532 UART:
5,340,675 UART: [state] CFI Enabled
5,351,583 UART: [fht] FMC Alias Private Key: 7
5,459,555 UART: [art] Extend RT PCRs Done
5,459,983 UART: [art] Lock RT PCRs Done
5,461,291 UART: [art] Populate DV Done
5,469,587 UART: [fht] FMC Alias Private Key: 7
5,470,709 UART: [art] Derive CDI
5,470,989 UART: [art] Store in in slot 0x4
5,556,810 UART: [art] Derive Key Pair
5,557,170 UART: [art] Store priv key in slot 0x5
5,570,604 UART: [art] Derive Key Pair - Done
5,585,276 UART: [art] Signing Cert with AUTHO
5,585,756 UART: RITY.KEYID = 7
5,600,640 UART: [art] Erasing AUTHORITY.KEYID = 7
5,601,405 UART: [art] PUB.X = 33F3D5790721003CC851D3AEE4B90163D0E693C0C67FC0AEFA00691D84C19D57C385321321F3658005AF0492A8FAEE7F
5,608,121 UART: [art] PUB.Y = A289586BA2C3322A54CF2388F88A17F50CEBC331AE3F2400C92F1A0D5A140CABE1B3E50BAEFFB962243582CAB5EE2957
5,615,053 UART: [art] SIG.R = A51DF828E4D42BFBA622A5098DE249070F586C7096F455D1563689AEB37C8D1989EFBA7FC051B0563F7D629AB7B164C6
5,621,820 UART: [art] SIG.S = CB1480241C2A23AE1649217A5C76F78B9AE0CBFCCBF3FE6A27BDCD51D88171212CCCEAB8A6C9973B0B76D0B204D6FE22
5,645,405 UART: Caliptra RT
5,645,750 UART: [state] CFI Enabled
5,754,048 UART: [rt] RT listening for mailbox commands...
5,754,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,694 UART: [rt]cmd =0x41544d4e, len=14344
7,015,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
893,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,757 UART: [kat] ++
897,909 UART: [kat] sha1
902,243 UART: [kat] SHA2-256
904,183 UART: [kat] SHA2-384
906,950 UART: [kat] SHA2-512-ACC
908,851 UART: [kat] ECC-384
918,722 UART: [kat] HMAC-384Kdf
923,316 UART: [kat] LMS
1,171,644 UART: [kat] --
1,172,433 UART: [cold-reset] ++
1,172,825 UART: [fht] FHT @ 0x50003400
1,175,638 UART: [idev] ++
1,175,806 UART: [idev] CDI.KEYID = 6
1,176,166 UART: [idev] SUBJECT.KEYID = 7
1,176,590 UART: [idev] UDS.KEYID = 0
1,176,935 ready_for_fw is high
1,176,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,328 UART: [idev] Erasing UDS.KEYID = 0
1,201,327 UART: [idev] Sha1 KeyId Algorithm
1,209,653 UART: [idev] --
1,210,711 UART: [ldev] ++
1,210,879 UART: [ldev] CDI.KEYID = 6
1,211,242 UART: [ldev] SUBJECT.KEYID = 5
1,211,668 UART: [ldev] AUTHORITY.KEYID = 7
1,212,131 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,418 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,270 >>> mbox cmd response: success
3,322,510 UART: [afmc] ++
3,322,678 UART: [afmc] CDI.KEYID = 6
3,323,040 UART: [afmc] SUBJECT.KEYID = 7
3,323,465 UART: [afmc] AUTHORITY.KEYID = 5
3,358,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,150 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,859 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,751 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,462 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,395 UART: [afmc] --
3,402,395 UART: [cold-reset] --
3,403,421 UART: [state] Locking Datavault
3,404,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,160 UART: [state] Locking ICCM
3,405,776 UART: [exit] Launching FMC @ 0x40000130
3,411,105 UART:
3,411,121 UART: Running Caliptra FMC ...
3,411,529 UART:
3,411,583 UART: [state] CFI Enabled
3,422,255 UART: [fht] FMC Alias Private Key: 7
3,530,573 UART: [art] Extend RT PCRs Done
3,531,001 UART: [art] Lock RT PCRs Done
3,532,435 UART: [art] Populate DV Done
3,540,699 UART: [fht] FMC Alias Private Key: 7
3,541,717 UART: [art] Derive CDI
3,541,997 UART: [art] Store in in slot 0x4
3,627,512 UART: [art] Derive Key Pair
3,627,872 UART: [art] Store priv key in slot 0x5
3,641,362 UART: [art] Derive Key Pair - Done
3,656,084 UART: [art] Signing Cert with AUTHO
3,656,564 UART: RITY.KEYID = 7
3,671,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,073 UART: [art] PUB.X = 118CA49CDBA12BAB8CEDC84B17BE384B96BAAB3ADBC563C651A22274E37D49B3AA2647BDC0F5CE098B208A13EDCF66EF
3,678,870 UART: [art] PUB.Y = 9346D79DF94A71DDAA518C2ECCFFFCCC72EDE1E8CCB9ACA4C9F8246964217586D160DD8DC8F2CA200AD4E0D1D089929D
3,685,843 UART: [art] SIG.R = 488A6760F13543E94D1E8BD2AC46EBA6CCF90F6AE47E317161E8BBE2B9DC7593041894EA18BE8895DBD1C4C5FBBD1895
3,692,623 UART: [art] SIG.S = 982EF74449B815EEF57731D8026825A6B3C8848BEDF1E578803ED328FA5A3A88308ECFADB162A751E2744D6955955BB6
3,716,545 UART: Caliptra RT
3,716,798 UART: [state] CFI Enabled
3,825,560 UART: [rt] RT listening for mailbox commands...
3,826,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,174 UART: [rt]cmd =0x41544d4e, len=14344
5,074,317 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 ready_for_fw is high
1,059,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,986 >>> mbox cmd response: success
3,228,341 UART:
3,228,357 UART: Running Caliptra FMC ...
3,228,765 UART:
3,228,819 UART: [state] CFI Enabled
3,239,015 UART: [fht] FMC Alias Private Key: 7
3,346,429 UART: [art] Extend RT PCRs Done
3,346,857 UART: [art] Lock RT PCRs Done
3,348,449 UART: [art] Populate DV Done
3,356,833 UART: [fht] FMC Alias Private Key: 7
3,357,883 UART: [art] Derive CDI
3,358,163 UART: [art] Store in in slot 0x4
3,444,176 UART: [art] Derive Key Pair
3,444,536 UART: [art] Store priv key in slot 0x5
3,457,764 UART: [art] Derive Key Pair - Done
3,472,403 UART: [art] Signing Cert with AUTHO
3,472,883 UART: RITY.KEYID = 7
3,488,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,802 UART: [art] PUB.X = 3BD433A6FA83F444E019EAF865B2D2D74DD7FF7F18AF2EE5BB6AF7A1AA3EF61473973C9E48FC49A5132D13B3A65203EF
3,495,589 UART: [art] PUB.Y = 056BC950DBEC1085B540E5A6D3D1A95E6011A10298F412004A2219D5855DD33F08146B9BF8FD072C1C4945330ED7D989
3,502,500 UART: [art] SIG.R = 9FB5D17B87105F4A8CA3C63523D526591A282C24C5E061553D540780CE9AAAC5BAD45E51267155FF1FF6D57F7824416D
3,509,269 UART: [art] SIG.S = 1369028A4B81AC463EBE23EEACA0F33ED90D5A0FC1106A2CE0E52AA1CCE51168EF2DD18860066001104BBFB8F162CB8A
3,533,103 UART: Caliptra RT
3,533,356 UART: [state] CFI Enabled
3,640,844 UART: [rt] RT listening for mailbox commands...
3,641,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,466 UART: [rt]cmd =0x41544d4e, len=14344
4,894,279 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
893,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,920 UART: [kat] ++
898,072 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,781 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,568 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 ready_for_fw is high
1,176,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,365 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,256 UART: [idev] --
1,211,234 UART: [ldev] ++
1,211,402 UART: [ldev] CDI.KEYID = 6
1,211,765 UART: [ldev] SUBJECT.KEYID = 5
1,212,191 UART: [ldev] AUTHORITY.KEYID = 7
1,212,654 UART: [ldev] FE.KEYID = 1
1,218,040 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,788 UART: [ldev] --
1,284,111 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,397 >>> mbox cmd response: success
3,319,589 UART: [afmc] ++
3,319,757 UART: [afmc] CDI.KEYID = 6
3,320,119 UART: [afmc] SUBJECT.KEYID = 7
3,320,544 UART: [afmc] AUTHORITY.KEYID = 5
3,355,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,735 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,444 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,336 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,047 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,944 UART: [afmc] --
3,398,850 UART: [cold-reset] --
3,399,536 UART: [state] Locking Datavault
3,401,035 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,639 UART: [state] Locking ICCM
3,402,063 UART: [exit] Launching FMC @ 0x40000130
3,407,392 UART:
3,407,408 UART: Running Caliptra FMC ...
3,407,816 UART:
3,407,959 UART: [state] CFI Enabled
3,418,651 UART: [fht] FMC Alias Private Key: 7
3,526,785 UART: [art] Extend RT PCRs Done
3,527,213 UART: [art] Lock RT PCRs Done
3,528,775 UART: [art] Populate DV Done
3,536,985 UART: [fht] FMC Alias Private Key: 7
3,538,133 UART: [art] Derive CDI
3,538,413 UART: [art] Store in in slot 0x4
3,623,758 UART: [art] Derive Key Pair
3,624,118 UART: [art] Store priv key in slot 0x5
3,636,910 UART: [art] Derive Key Pair - Done
3,651,279 UART: [art] Signing Cert with AUTHO
3,651,759 UART: RITY.KEYID = 7
3,667,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,852 UART: [art] PUB.X = 7BFF4FEE784E592B0692CFEF903F57A21760048D3BED8FFE6FA29C2A1DE893E9F46BC0BA012933ED63CA3C6EFA1B34C4
3,674,637 UART: [art] PUB.Y = B853A6D93F150E87CDB5107D3041EF422E839FB42ACC856422C538D405D6BC6E3F6AE1EF678957AF22CF4CF803830C20
3,681,583 UART: [art] SIG.R = 0835E039EBA704E2D3C3A2C3BEA6BF2997BF80A7C7D24A7DC1BA797C2B726975BE3E39419DE564750A8248E5322884FD
3,688,352 UART: [art] SIG.S = 5BCAB59732CC1EFD9AF1FF42C3647D5C22CECEDE966557DB0220A26A700F3F1E15C380BCEC0594DFF436E2FACB172819
3,712,188 UART: Caliptra RT
3,712,533 UART: [state] CFI Enabled
3,819,522 UART: [rt] RT listening for mailbox commands...
3,820,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,098 UART: [rt]cmd =0x41544d4e, len=14344
5,063,419 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 ready_for_fw is high
1,061,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,933 >>> mbox cmd response: success
3,233,136 UART:
3,233,152 UART: Running Caliptra FMC ...
3,233,560 UART:
3,233,703 UART: [state] CFI Enabled
3,244,481 UART: [fht] FMC Alias Private Key: 7
3,352,005 UART: [art] Extend RT PCRs Done
3,352,433 UART: [art] Lock RT PCRs Done
3,353,781 UART: [art] Populate DV Done
3,361,849 UART: [fht] FMC Alias Private Key: 7
3,362,931 UART: [art] Derive CDI
3,363,211 UART: [art] Store in in slot 0x4
3,449,124 UART: [art] Derive Key Pair
3,449,484 UART: [art] Store priv key in slot 0x5
3,462,822 UART: [art] Derive Key Pair - Done
3,477,562 UART: [art] Signing Cert with AUTHO
3,478,042 UART: RITY.KEYID = 7
3,493,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,371 UART: [art] PUB.X = F7105C6FEEE5B1BECE7A35599674B0B6C465DB8B228914C55B4DD061768EC2171BD73961963FAC7AE1B8DA042295FDE8
3,501,150 UART: [art] PUB.Y = D6A5C2A8E6440987F865E68A552B374754B1F60FA9C07C2DBCA69076056C775AB39C6D34A3FC9E7EBBA51B2784F79384
3,508,097 UART: [art] SIG.R = C355317B5C0B2AED4311095B93F39135448BB7722407229967A61441117E6726ACBB2A7D4EFCD8B702D0BF2D5E57F4EA
3,514,857 UART: [art] SIG.S = 0C24AB299D1A7C26CF24E079BC7DB1488666DFEBE1BC987BDBD596B449A2970F01CC2F24DD144CA6A0F2E3586B0FF036
3,538,626 UART: Caliptra RT
3,538,971 UART: [state] CFI Enabled
3,646,315 UART: [rt] RT listening for mailbox commands...
3,646,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,205 UART: [rt]cmd =0x41544d4e, len=14344
4,897,669 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,392 UART: [kat] HMAC-384Kdf
920,016 UART: [kat] LMS
1,168,328 UART: [kat] --
1,169,333 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,173,877 ready_for_fw is high
1,173,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,720 UART: [fwproc] Wait for Commands...
1,281,377 UART: [fwproc] Recv command 0x46574c44
1,282,110 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,040 >>> mbox cmd response: success
3,318,285 UART: [afmc] ++
3,318,453 UART: [afmc] CDI.KEYID = 6
3,318,816 UART: [afmc] SUBJECT.KEYID = 7
3,319,242 UART: [afmc] AUTHORITY.KEYID = 5
3,354,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,631 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,341 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,231 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,942 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,768 UART: [afmc] --
3,397,734 UART: [cold-reset] --
3,398,612 UART: [state] Locking Datavault
3,399,825 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,429 UART: [state] Locking ICCM
3,400,927 UART: [exit] Launching FMC @ 0x40000130
3,406,256 UART:
3,406,272 UART: Running Caliptra FMC ...
3,406,680 UART:
3,406,734 UART: [state] CFI Enabled
3,417,020 UART: [fht] FMC Alias Private Key: 7
3,524,538 UART: [art] Extend RT PCRs Done
3,524,966 UART: [art] Lock RT PCRs Done
3,526,620 UART: [art] Populate DV Done
3,534,976 UART: [fht] FMC Alias Private Key: 7
3,536,052 UART: [art] Derive CDI
3,536,332 UART: [art] Store in in slot 0x4
3,622,225 UART: [art] Derive Key Pair
3,622,585 UART: [art] Store priv key in slot 0x5
3,635,611 UART: [art] Derive Key Pair - Done
3,650,056 UART: [art] Signing Cert with AUTHO
3,650,536 UART: RITY.KEYID = 7
3,665,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,529 UART: [art] PUB.X = 1D148F066BB9F6359DCF6756EA1E324DB354FB9BE31CEAF70F1760E086479FC79912E9C7C73397752285F3B9FDF2109D
3,673,299 UART: [art] PUB.Y = F29D50967F70AC4ADA8425C05B198D44EF76020AF80548E8D5E4B72D86D4B3A3E94F6A204D9D0FC3E9EC2E487C36A819
3,680,247 UART: [art] SIG.R = 432555597B0ED0AB71805F2738A7C737410B82F4E13EA758C13A6806C1090963E7D78CEA9E705CAC12BA11815C53D8EE
3,687,002 UART: [art] SIG.S = EB5E7ED8C5E5737ABDA02EB542753C0E10C259E555A9E09C07228ED6A7EDEF8373E6FD3E3D08D0293667DAAFFC565C64
3,710,504 UART: Caliptra RT
3,710,757 UART: [state] CFI Enabled
3,818,707 UART: [rt] RT listening for mailbox commands...
3,819,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,235 UART: [rt]cmd =0x41544d4e, len=14344
5,074,587 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,274 ready_for_fw is high
1,056,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,178,496 >>> mbox cmd response: success
3,240,195 UART:
3,240,211 UART: Running Caliptra FMC ...
3,240,619 UART:
3,240,673 UART: [state] CFI Enabled
3,250,957 UART: [fht] FMC Alias Private Key: 7
3,358,611 UART: [art] Extend RT PCRs Done
3,359,039 UART: [art] Lock RT PCRs Done
3,360,539 UART: [art] Populate DV Done
3,368,551 UART: [fht] FMC Alias Private Key: 7
3,369,511 UART: [art] Derive CDI
3,369,791 UART: [art] Store in in slot 0x4
3,455,420 UART: [art] Derive Key Pair
3,455,780 UART: [art] Store priv key in slot 0x5
3,468,852 UART: [art] Derive Key Pair - Done
3,483,522 UART: [art] Signing Cert with AUTHO
3,484,002 UART: RITY.KEYID = 7
3,498,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,507 UART: [art] PUB.X = 80B9E9D1EECBE55FFE9E2605D7C1694526AF63139DCD3DAB4C7363BF1E2F8EF8A290C6EBDCD35EBADA2AF155D6FD19DF
3,506,308 UART: [art] PUB.Y = 4B9AFFBD9F1955A775A3FD51628F58B8E7E6D614EBC0497535A2D2E14E2AEEE113643E2DB49FA168BF4BBD267DEF72DB
3,513,280 UART: [art] SIG.R = 0BF68044D2858E7EB8483430A217FEE6D424F00252E7590D3B7F8C79D604D914831563768B008090884A3437CC4FAA39
3,520,006 UART: [art] SIG.S = 3E2B7742A4549334D195F847ADBFD8554FCA34D1C5842EBB7407D0811D1D7B8EDE576A44FB8936CBEDB22E7098019360
3,543,785 UART: Caliptra RT
3,544,038 UART: [state] CFI Enabled
3,651,205 UART: [rt] RT listening for mailbox commands...
3,651,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,107 UART: [rt]cmd =0x41544d4e, len=14344
4,895,212 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
891,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,074 UART: [kat] ++
896,226 UART: [kat] sha1
900,482 UART: [kat] SHA2-256
902,422 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
917,039 UART: [kat] HMAC-384Kdf
921,771 UART: [kat] LMS
1,170,083 UART: [kat] --
1,170,868 UART: [cold-reset] ++
1,171,340 UART: [fht] FHT @ 0x50003400
1,173,936 UART: [idev] ++
1,174,104 UART: [idev] CDI.KEYID = 6
1,174,465 UART: [idev] SUBJECT.KEYID = 7
1,174,890 UART: [idev] UDS.KEYID = 0
1,175,236 ready_for_fw is high
1,175,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,652 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,068 >>> mbox cmd response: success
3,317,289 UART: [afmc] ++
3,317,457 UART: [afmc] CDI.KEYID = 6
3,317,820 UART: [afmc] SUBJECT.KEYID = 7
3,318,246 UART: [afmc] AUTHORITY.KEYID = 5
3,354,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,725 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,435 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,325 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,036 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,794 UART: [afmc] --
3,397,722 UART: [cold-reset] --
3,398,404 UART: [state] Locking Datavault
3,399,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,099 UART: [state] Locking ICCM
3,400,685 UART: [exit] Launching FMC @ 0x40000130
3,406,014 UART:
3,406,030 UART: Running Caliptra FMC ...
3,406,438 UART:
3,406,581 UART: [state] CFI Enabled
3,417,279 UART: [fht] FMC Alias Private Key: 7
3,524,903 UART: [art] Extend RT PCRs Done
3,525,331 UART: [art] Lock RT PCRs Done
3,526,697 UART: [art] Populate DV Done
3,534,697 UART: [fht] FMC Alias Private Key: 7
3,535,811 UART: [art] Derive CDI
3,536,091 UART: [art] Store in in slot 0x4
3,622,016 UART: [art] Derive Key Pair
3,622,376 UART: [art] Store priv key in slot 0x5
3,635,088 UART: [art] Derive Key Pair - Done
3,650,030 UART: [art] Signing Cert with AUTHO
3,650,510 UART: RITY.KEYID = 7
3,665,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,071 UART: [art] PUB.X = 6087B95297F15DB3D48D7F678CA2007851D29043781C4C10CA5BC32826CB14FC14718BC5B407156ED99688EE58655917
3,672,808 UART: [art] PUB.Y = 0D04880E3DFCEE521794EB6BC2CB25A0CFD2BA9ABB9DD863B52DE1819A4E00439F52008A41C812AF40130E3C707B5939
3,679,714 UART: [art] SIG.R = C30B46A04FCFB00FF5457642B815FE0A79438B666C25E09675071206A4352922285B08FF2D42311F5FEE5B008C66470B
3,686,435 UART: [art] SIG.S = 2299E108FBB7531404EC3D525ED3E6FC8F19CEE1707A3FB3FE7A340E663E140A34C9C126F0DCD484DD56FA999448337C
3,709,938 UART: Caliptra RT
3,710,283 UART: [state] CFI Enabled
3,817,541 UART: [rt] RT listening for mailbox commands...
3,818,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,215 UART: [rt]cmd =0x41544d4e, len=14344
5,071,224 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,437 ready_for_fw is high
1,056,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,159,636 >>> mbox cmd response: success
3,221,869 UART:
3,221,885 UART: Running Caliptra FMC ...
3,222,293 UART:
3,222,436 UART: [state] CFI Enabled
3,233,064 UART: [fht] FMC Alias Private Key: 7
3,340,842 UART: [art] Extend RT PCRs Done
3,341,270 UART: [art] Lock RT PCRs Done
3,342,428 UART: [art] Populate DV Done
3,350,506 UART: [fht] FMC Alias Private Key: 7
3,351,596 UART: [art] Derive CDI
3,351,876 UART: [art] Store in in slot 0x4
3,437,645 UART: [art] Derive Key Pair
3,438,005 UART: [art] Store priv key in slot 0x5
3,452,033 UART: [art] Derive Key Pair - Done
3,466,927 UART: [art] Signing Cert with AUTHO
3,467,407 UART: RITY.KEYID = 7
3,482,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,646 UART: [art] PUB.X = 6F1487C93F828673354B457E218546CFFF64E3D91151C13F4FDD58A3B4AAFF84BD6A84FC46D81576A4373DFF3B464FC9
3,490,424 UART: [art] PUB.Y = A9721EFC75142115184F505199960832988AFFD6741FD6B6970481858CBCF451D1730DB1709E0A19E01EF056277A26C4
3,497,352 UART: [art] SIG.R = 10E82E5C02A95BE1701A41DC4AFCEE21E98518071BACFB95CC37D86B5072012964C07397653B623B08FB5AE24DAB8845
3,504,116 UART: [art] SIG.S = 730CED9C63970A244906822F50310F92FCD94447453940AB58D6B5410055DD016ED6CF241EA98A1ED4ADC1B0D0DF61D6
3,528,048 UART: Caliptra RT
3,528,393 UART: [state] CFI Enabled
3,636,492 UART: [rt] RT listening for mailbox commands...
3,637,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,038 UART: [rt]cmd =0x41544d4e, len=14344
4,878,180 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,505 UART: [cold-reset] ++
1,476,845 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 ready_for_fw is high
1,480,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,702 UART: [idev] Erasing UDS.KEYID = 0
1,504,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,861 UART: [ldev] ++
1,515,029 UART: [ldev] CDI.KEYID = 6
1,515,392 UART: [ldev] SUBJECT.KEYID = 5
1,515,818 UART: [ldev] AUTHORITY.KEYID = 7
1,516,281 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,698 UART: [fwproc] Received command 0x46574c44
1,587,489 UART: [fwproc] Received Image of size 114332 bytes
5,423,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,452,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,481,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,617,294 >>> mbox cmd response: success
5,618,306 UART: [afmc] ++
5,618,474 UART: [afmc] CDI.KEYID = 6
5,618,836 UART: [afmc] SUBJECT.KEYID = 7
5,619,261 UART: [afmc] AUTHORITY.KEYID = 5
5,654,155 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,670,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,671,293 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,677,002 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,682,894 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,688,595 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,696,493 UART: [afmc] --
5,697,487 UART: [cold-reset] --
5,698,505 UART: [state] Locking Datavault
5,699,910 UART: [state] Locking PCR0, PCR1 and PCR31
5,700,514 UART: [state] Locking ICCM
5,700,940 UART: [exit] Launching FMC @ 0x40000130
5,706,269 UART:
5,706,285 UART: Running Caliptra FMC ...
5,706,693 UART:
5,706,747 UART: [state] CFI Enabled
5,717,287 UART: [fht] FMC Alias Private Key: 7
5,825,157 UART: [art] Extend RT PCRs Done
5,825,585 UART: [art] Lock RT PCRs Done
5,827,327 UART: [art] Populate DV Done
5,835,561 UART: [fht] FMC Alias Private Key: 7
5,836,539 UART: [art] Derive CDI
5,836,819 UART: [art] Store in in slot 0x4
5,922,150 UART: [art] Derive Key Pair
5,922,510 UART: [art] Store priv key in slot 0x5
5,935,462 UART: [art] Derive Key Pair - Done
5,950,456 UART: [art] Signing Cert with AUTHO
5,950,936 UART: RITY.KEYID = 7
5,966,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,966,775 UART: [art] PUB.X = 7496A1DA3873715311D18A7F1C05CFE8B21ECF2C600C31B6480806690ADE9BB84C446432A5DC13A39D46D61E9E0120B2
5,973,529 UART: [art] PUB.Y = FA5BAFFF0307BD7BBA5662F795DC85B53F84EF02254E3B515006DD1F6A642FCA7C528DDF1E635B592FD9129B97099482
5,980,476 UART: [art] SIG.R = E6816D6F16729C419CD273AF3C6274F91D3530286A05D832DA9E955CD7D05C92C2400BCFD29DEB5B9A1918242A55D17D
5,987,244 UART: [art] SIG.S = 37F06837E7313D545F45272390B4B9CA7B1CDA26A004CF5DE9A920EFA7DE2BCDFE51B526E114C86191CF4292D3003C90
6,010,690 UART: Caliptra RT
6,010,943 UART: [state] CFI Enabled
6,118,752 UART: [rt] RT listening for mailbox commands...
6,119,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,242,438 UART: [rt]cmd =0x41544d4e, len=14344
6,244,121 >>> mbox cmd response: failed
6,244,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,366,525 UART: [rt]cmd =0x41544d4e, len=14344
6,368,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,173 ready_for_fw is high
1,362,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,163,001 >>> mbox cmd response: success
5,224,598 UART:
5,224,614 UART: Running Caliptra FMC ...
5,225,022 UART:
5,225,076 UART: [state] CFI Enabled
5,235,668 UART: [fht] FMC Alias Private Key: 7
5,343,858 UART: [art] Extend RT PCRs Done
5,344,286 UART: [art] Lock RT PCRs Done
5,345,674 UART: [art] Populate DV Done
5,353,720 UART: [fht] FMC Alias Private Key: 7
5,354,726 UART: [art] Derive CDI
5,355,006 UART: [art] Store in in slot 0x4
5,440,675 UART: [art] Derive Key Pair
5,441,035 UART: [art] Store priv key in slot 0x5
5,453,721 UART: [art] Derive Key Pair - Done
5,468,329 UART: [art] Signing Cert with AUTHO
5,468,809 UART: RITY.KEYID = 7
5,483,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,764 UART: [art] PUB.X = 37E6A021FCE08757113EC8A2577246803A557BCD207E99C19C63FF7F3FC4D8537FCD4777AE54B3A023E6D4DBBD23FDF2
5,491,546 UART: [art] PUB.Y = ABBE299C712997CEC8359BF6BD560E7D22E223DF10217471E479B61C7EC5CEC838D13EB68676C64EB97DD8F6BD5A5AB4
5,498,509 UART: [art] SIG.R = 9004811E657E6505FE91AE9E84F6515D565A391809DA4C25C065B1020F6369842BCF3152D6F1F02348EF120071AB82E3
5,505,234 UART: [art] SIG.S = D0B9447C3884073821AEA655606829726E0CF787E20FB6C769BDFADFEE2A1D5320A0CA94DB969D76FBF10780E22E4CDB
5,528,987 UART: Caliptra RT
5,529,240 UART: [state] CFI Enabled
5,637,134 UART: [rt] RT listening for mailbox commands...
5,637,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,658 UART: [rt]cmd =0x41544d4e, len=14344
5,762,205 >>> mbox cmd response: failed
5,762,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,817 UART: [rt]cmd =0x41544d4e, len=14344
5,886,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,366 UART: [kat] SHA2-256
892,304 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
902,265 UART: [kat] HMAC-384Kdf
906,777 UART: [kat] LMS
1,474,973 UART: [kat] --
1,475,862 UART: [cold-reset] ++
1,476,308 UART: [fht] Storing FHT @ 0x50003400
1,479,057 UART: [idev] ++
1,479,225 UART: [idev] CDI.KEYID = 6
1,479,585 UART: [idev] SUBJECT.KEYID = 7
1,480,009 UART: [idev] UDS.KEYID = 0
1,480,354 ready_for_fw is high
1,480,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,489 UART: [idev] Erasing UDS.KEYID = 0
1,504,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,725 UART: [idev] --
1,513,772 UART: [ldev] ++
1,513,940 UART: [ldev] CDI.KEYID = 6
1,514,303 UART: [ldev] SUBJECT.KEYID = 5
1,514,729 UART: [ldev] AUTHORITY.KEYID = 7
1,515,192 UART: [ldev] FE.KEYID = 1
1,520,512 UART: [ldev] Erasing FE.KEYID = 1
1,546,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,331 UART: [ldev] --
1,585,714 UART: [fwproc] Waiting for Commands...
1,586,451 UART: [fwproc] Received command 0x46574c44
1,587,242 UART: [fwproc] Received Image of size 114332 bytes
5,083,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,098 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,277,261 >>> mbox cmd response: success
5,278,403 UART: [afmc] ++
5,278,571 UART: [afmc] CDI.KEYID = 6
5,278,933 UART: [afmc] SUBJECT.KEYID = 7
5,279,358 UART: [afmc] AUTHORITY.KEYID = 5
5,314,748 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,331,956 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,665 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,557 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,258 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,212 UART: [afmc] --
5,358,324 UART: [cold-reset] --
5,359,132 UART: [state] Locking Datavault
5,360,311 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,915 UART: [state] Locking ICCM
5,361,481 UART: [exit] Launching FMC @ 0x40000130
5,366,810 UART:
5,366,826 UART: Running Caliptra FMC ...
5,367,234 UART:
5,367,377 UART: [state] CFI Enabled
5,377,975 UART: [fht] FMC Alias Private Key: 7
5,486,025 UART: [art] Extend RT PCRs Done
5,486,453 UART: [art] Lock RT PCRs Done
5,488,337 UART: [art] Populate DV Done
5,496,545 UART: [fht] FMC Alias Private Key: 7
5,497,489 UART: [art] Derive CDI
5,497,769 UART: [art] Store in in slot 0x4
5,583,110 UART: [art] Derive Key Pair
5,583,470 UART: [art] Store priv key in slot 0x5
5,596,920 UART: [art] Derive Key Pair - Done
5,611,711 UART: [art] Signing Cert with AUTHO
5,612,191 UART: RITY.KEYID = 7
5,627,573 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,338 UART: [art] PUB.X = A404ADCEF2A2E2F22EB22338891B17185BD5693C3495DFA0BE233CB66E0D9C0FA554568195E95760DEE1CB8313A77931
5,635,105 UART: [art] PUB.Y = 51C2E1FC1E3E3ECB68EECECAECD21BF509AA619A9391D9BFFA2BAEDE541F21F1E87A811DB3E5FF3FDE3EEAEE4EA0DAEC
5,642,102 UART: [art] SIG.R = F45A3FCE7FA03093D79CEA95CFB4FC213F935BF3F1B6F89C241EB8931FE5FEF5B1AE0A338E6DDFF0523B112744C1E618
5,648,891 UART: [art] SIG.S = 7F3DBC965D81AD25C75BB411075D5A04DD8E5564456823B3A61DA5CF81C1980B5ABFD05E7CC24AB7E5249FC87C1B39CF
5,672,435 UART: Caliptra RT
5,672,780 UART: [state] CFI Enabled
5,781,173 UART: [rt] RT listening for mailbox commands...
5,781,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,953 UART: [rt]cmd =0x41544d4e, len=14344
5,906,468 >>> mbox cmd response: failed
5,906,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,029,034 UART: [rt]cmd =0x41544d4e, len=14344
6,030,603 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 ready_for_fw is high
1,362,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,278,257 >>> mbox cmd response: success
5,340,404 UART:
5,340,420 UART: Running Caliptra FMC ...
5,340,828 UART:
5,340,971 UART: [state] CFI Enabled
5,351,521 UART: [fht] FMC Alias Private Key: 7
5,459,079 UART: [art] Extend RT PCRs Done
5,459,507 UART: [art] Lock RT PCRs Done
5,460,919 UART: [art] Populate DV Done
5,469,273 UART: [fht] FMC Alias Private Key: 7
5,470,319 UART: [art] Derive CDI
5,470,599 UART: [art] Store in in slot 0x4
5,556,210 UART: [art] Derive Key Pair
5,556,570 UART: [art] Store priv key in slot 0x5
5,570,054 UART: [art] Derive Key Pair - Done
5,584,735 UART: [art] Signing Cert with AUTHO
5,585,215 UART: RITY.KEYID = 7
5,600,633 UART: [art] Erasing AUTHORITY.KEYID = 7
5,601,398 UART: [art] PUB.X = 1AFFD4598A877774114E29F1227EB7F8B2A20C678FC743F09958023C51E7C9D618AA53D5A08B3CC3DB100516C17551FB
5,608,161 UART: [art] PUB.Y = 74230F19C1311655714D40D3A27BA61ABCDBD6539125276EF2AD462CB8E04B48C87C4D3703A456CA220144FE1B4F4304
5,615,099 UART: [art] SIG.R = 82C68059697732AD25B79DFDAB8318F94B6029D8435C35922A48E8FE91BE89A55DA6DE0099D83A980D711D42C4DE95F8
5,621,846 UART: [art] SIG.S = F94C2F578BB0DF6217CC3B4F8063D046034A0370EF9306E14A16CA7109051538B275E549136B52B0CB8FF3247D9284F0
5,645,554 UART: Caliptra RT
5,645,899 UART: [state] CFI Enabled
5,754,735 UART: [rt] RT listening for mailbox commands...
5,755,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,517 UART: [rt]cmd =0x41544d4e, len=14344
5,880,164 >>> mbox cmd response: failed
5,880,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,002,866 UART: [rt]cmd =0x41544d4e, len=14344
6,004,421 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
902,039 UART: [kat] SHA2-256
903,979 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
922,852 UART: [kat] LMS
1,171,180 UART: [kat] --
1,172,227 UART: [cold-reset] ++
1,172,615 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,508 UART: [idev] Erasing UDS.KEYID = 0
1,201,677 UART: [idev] Sha1 KeyId Algorithm
1,210,093 UART: [idev] --
1,210,933 UART: [ldev] ++
1,211,101 UART: [ldev] CDI.KEYID = 6
1,211,464 UART: [ldev] SUBJECT.KEYID = 5
1,211,890 UART: [ldev] AUTHORITY.KEYID = 7
1,212,353 UART: [ldev] FE.KEYID = 1
1,217,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,784 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 114332 bytes
3,114,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,308,075 >>> mbox cmd response: success
3,309,327 UART: [afmc] ++
3,309,495 UART: [afmc] CDI.KEYID = 6
3,309,857 UART: [afmc] SUBJECT.KEYID = 7
3,310,282 UART: [afmc] AUTHORITY.KEYID = 5
3,346,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,297 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,006 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,898 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,609 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,408 UART: [afmc] --
3,389,296 UART: [cold-reset] --
3,389,934 UART: [state] Locking Datavault
3,391,215 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,819 UART: [state] Locking ICCM
3,392,369 UART: [exit] Launching FMC @ 0x40000130
3,397,698 UART:
3,397,714 UART: Running Caliptra FMC ...
3,398,122 UART:
3,398,176 UART: [state] CFI Enabled
3,408,846 UART: [fht] FMC Alias Private Key: 7
3,516,642 UART: [art] Extend RT PCRs Done
3,517,070 UART: [art] Lock RT PCRs Done
3,518,544 UART: [art] Populate DV Done
3,526,750 UART: [fht] FMC Alias Private Key: 7
3,527,890 UART: [art] Derive CDI
3,528,170 UART: [art] Store in in slot 0x4
3,613,939 UART: [art] Derive Key Pair
3,614,299 UART: [art] Store priv key in slot 0x5
3,627,673 UART: [art] Derive Key Pair - Done
3,642,510 UART: [art] Signing Cert with AUTHO
3,642,990 UART: RITY.KEYID = 7
3,658,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,957 UART: [art] PUB.X = 59C28B6402220EDA5375B1A8E8BF173A39AC02DDE4B6735321B7759CF2CCD87678042F6E79684D5542474DF9AACF5C95
3,665,719 UART: [art] PUB.Y = 7881576EF209888A11582F2549780F0E64616A485F058247917D5D5A88F4A57229C6F12620D5FE040EC2F1CE48B17356
3,672,637 UART: [art] SIG.R = 75079ABB29AF344E7EAC392F2F9014DE3F9AA32EBF7357601A3DA10F0A9E2262EA9FE61E1820A4E5D7413A091C914E40
3,679,405 UART: [art] SIG.S = 8E5E7940650DBDE7DC5CDC47A76474B8968B5B76043119A498588020FC327F2C6E16ADD95308CC427072FE1C451C5CE7
3,703,633 UART: Caliptra RT
3,703,886 UART: [state] CFI Enabled
3,811,442 UART: [rt] RT listening for mailbox commands...
3,812,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,128 UART: [rt]cmd =0x41544d4e, len=14344
3,936,641 >>> mbox cmd response: failed
3,936,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,329 UART: [rt]cmd =0x41544d4e, len=14344
4,060,842 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,121 ready_for_fw is high
1,059,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,941 >>> mbox cmd response: success
3,225,002 UART:
3,225,018 UART: Running Caliptra FMC ...
3,225,426 UART:
3,225,480 UART: [state] CFI Enabled
3,235,992 UART: [fht] FMC Alias Private Key: 7
3,343,670 UART: [art] Extend RT PCRs Done
3,344,098 UART: [art] Lock RT PCRs Done
3,345,582 UART: [art] Populate DV Done
3,353,972 UART: [fht] FMC Alias Private Key: 7
3,355,092 UART: [art] Derive CDI
3,355,372 UART: [art] Store in in slot 0x4
3,440,999 UART: [art] Derive Key Pair
3,441,359 UART: [art] Store priv key in slot 0x5
3,454,313 UART: [art] Derive Key Pair - Done
3,468,962 UART: [art] Signing Cert with AUTHO
3,469,442 UART: RITY.KEYID = 7
3,484,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,491 UART: [art] PUB.X = 2E936943AD602F991F932E91E8B895AC280A82FF0F0E324A6E977996A7F9D9BCF842D16B9943562A35111F76142478DF
3,492,248 UART: [art] PUB.Y = F634F6300AFE2445F5971ED3EB15FD28CF456634AF80D499E3E00A5599DF4DE4869898BDAFBF3C9261DCE1A2E6FC5045
3,499,206 UART: [art] SIG.R = 9A73533EC99563FDAD0C01024419841E64EE9978820A1C02D6628EBF5A82D211BC2362EA294EC8CA5952C093F23ECAEC
3,505,967 UART: [art] SIG.S = D3E9009414090F484EEFC8FD5FA42AFF368C7FA8DAF7543E0B584B200D7ED5340767A057C49ECD07A4E9C564B5EE279A
3,530,474 UART: Caliptra RT
3,530,727 UART: [state] CFI Enabled
3,638,648 UART: [rt] RT listening for mailbox commands...
3,639,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,464 UART: [rt]cmd =0x41544d4e, len=14344
3,764,027 >>> mbox cmd response: failed
3,764,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,503 UART: [rt]cmd =0x41544d4e, len=14344
3,887,988 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
893,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,702 UART: [kat] ++
897,854 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,387 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,560 UART: [fht] FHT @ 0x50003400
1,175,245 UART: [idev] ++
1,175,413 UART: [idev] CDI.KEYID = 6
1,175,773 UART: [idev] SUBJECT.KEYID = 7
1,176,197 UART: [idev] UDS.KEYID = 0
1,176,542 ready_for_fw is high
1,176,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,687 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,112 UART: [ldev] ++
1,211,280 UART: [ldev] CDI.KEYID = 6
1,211,643 UART: [ldev] SUBJECT.KEYID = 5
1,212,069 UART: [ldev] AUTHORITY.KEYID = 7
1,212,532 UART: [ldev] FE.KEYID = 1
1,217,886 UART: [ldev] Erasing FE.KEYID = 1
1,243,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,106 UART: [ldev] --
1,283,565 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46574c44
1,285,013 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,893 >>> mbox cmd response: success
3,322,087 UART: [afmc] ++
3,322,255 UART: [afmc] CDI.KEYID = 6
3,322,617 UART: [afmc] SUBJECT.KEYID = 7
3,323,042 UART: [afmc] AUTHORITY.KEYID = 5
3,358,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,277 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,986 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,878 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,589 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,340 UART: [afmc] --
3,401,436 UART: [cold-reset] --
3,402,624 UART: [state] Locking Datavault
3,403,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,465 UART: [state] Locking ICCM
3,404,889 UART: [exit] Launching FMC @ 0x40000130
3,410,218 UART:
3,410,234 UART: Running Caliptra FMC ...
3,410,642 UART:
3,410,785 UART: [state] CFI Enabled
3,421,701 UART: [fht] FMC Alias Private Key: 7
3,529,639 UART: [art] Extend RT PCRs Done
3,530,067 UART: [art] Lock RT PCRs Done
3,531,329 UART: [art] Populate DV Done
3,539,615 UART: [fht] FMC Alias Private Key: 7
3,540,607 UART: [art] Derive CDI
3,540,887 UART: [art] Store in in slot 0x4
3,626,512 UART: [art] Derive Key Pair
3,626,872 UART: [art] Store priv key in slot 0x5
3,639,904 UART: [art] Derive Key Pair - Done
3,654,665 UART: [art] Signing Cert with AUTHO
3,655,145 UART: RITY.KEYID = 7
3,670,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,032 UART: [art] PUB.X = BDCEA1B4E9FAFBDD488095C3F8C574726D66D3A9E6A6F48FE16AC1FD1BA5E9B916EA449DFA55B6DE9A2A1F870CAC2D8A
3,677,833 UART: [art] PUB.Y = DC11C2CAA6A9648F5B29305426C70E2B41D3AD6DC09734E148DF5313F3A9A7786CFD14BA1DE44C81861011C0491F8113
3,684,784 UART: [art] SIG.R = 621E69CAA8D4EFFF315652C993C6FD39BA66604E5A36CE9892921F789DBE34F54399C7F0ED09FA27B6A643216E3C5763
3,691,557 UART: [art] SIG.S = F0ADB0681D85DAD3A54B821C67C77A47441114E10436D2ACD3E8E2EE2214184D4FAACD146595C2804057FAD0534266F3
3,715,573 UART: Caliptra RT
3,715,918 UART: [state] CFI Enabled
3,824,006 UART: [rt] RT listening for mailbox commands...
3,824,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,708 UART: [rt]cmd =0x41544d4e, len=14344
3,949,445 >>> mbox cmd response: failed
3,949,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,759 UART: [rt]cmd =0x41544d4e, len=14344
4,073,050 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 ready_for_fw is high
1,060,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,163,850 >>> mbox cmd response: success
3,226,229 UART:
3,226,245 UART: Running Caliptra FMC ...
3,226,653 UART:
3,226,796 UART: [state] CFI Enabled
3,237,518 UART: [fht] FMC Alias Private Key: 7
3,345,602 UART: [art] Extend RT PCRs Done
3,346,030 UART: [art] Lock RT PCRs Done
3,347,504 UART: [art] Populate DV Done
3,355,472 UART: [fht] FMC Alias Private Key: 7
3,356,468 UART: [art] Derive CDI
3,356,748 UART: [art] Store in in slot 0x4
3,442,755 UART: [art] Derive Key Pair
3,443,115 UART: [art] Store priv key in slot 0x5
3,456,959 UART: [art] Derive Key Pair - Done
3,471,638 UART: [art] Signing Cert with AUTHO
3,472,118 UART: RITY.KEYID = 7
3,487,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,999 UART: [art] PUB.X = A55BE1729409C036731BCDBD8248180AB55495E019ADF484A70E6BF6C19A1341969EA7990EE98DA8F87449F49E698DA9
3,494,759 UART: [art] PUB.Y = 000D600418BB621BE605C0CF794024B177F9978AE3A35F42720FD13FFEA2A0A11B9AB58D444D3D63660C091939FF53C9
3,501,671 UART: [art] SIG.R = B79A5D79E3B47AFE0B778093AB51DADEBC56BDC9BA0B02468F9985BD482D623686803E4A55919541D9CB8CACE15D96C0
3,508,446 UART: [art] SIG.S = 55B3E681E616B45C80C9715EBDAC49A04531C010D0F75866BD21DED4396E5B9093544E415A96DC84E1DD557DE1FF1904
3,532,606 UART: Caliptra RT
3,532,951 UART: [state] CFI Enabled
3,641,117 UART: [rt] RT listening for mailbox commands...
3,641,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,997 UART: [rt]cmd =0x41544d4e, len=14344
3,766,748 >>> mbox cmd response: failed
3,766,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,224 UART: [rt]cmd =0x41544d4e, len=14344
3,890,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,229 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,505 UART: [idev] ++
1,172,673 UART: [idev] CDI.KEYID = 6
1,173,034 UART: [idev] SUBJECT.KEYID = 7
1,173,459 UART: [idev] UDS.KEYID = 0
1,173,805 ready_for_fw is high
1,173,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,713 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,796 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,276 >>> mbox cmd response: success
3,317,459 UART: [afmc] ++
3,317,627 UART: [afmc] CDI.KEYID = 6
3,317,990 UART: [afmc] SUBJECT.KEYID = 7
3,318,416 UART: [afmc] AUTHORITY.KEYID = 5
3,353,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,271 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,981 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,871 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,582 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,324 UART: [afmc] --
3,397,214 UART: [cold-reset] --
3,397,840 UART: [state] Locking Datavault
3,399,065 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,669 UART: [state] Locking ICCM
3,400,267 UART: [exit] Launching FMC @ 0x40000130
3,405,596 UART:
3,405,612 UART: Running Caliptra FMC ...
3,406,020 UART:
3,406,074 UART: [state] CFI Enabled
3,416,368 UART: [fht] FMC Alias Private Key: 7
3,524,518 UART: [art] Extend RT PCRs Done
3,524,946 UART: [art] Lock RT PCRs Done
3,526,202 UART: [art] Populate DV Done
3,534,336 UART: [fht] FMC Alias Private Key: 7
3,535,360 UART: [art] Derive CDI
3,535,640 UART: [art] Store in in slot 0x4
3,621,515 UART: [art] Derive Key Pair
3,621,875 UART: [art] Store priv key in slot 0x5
3,634,631 UART: [art] Derive Key Pair - Done
3,649,403 UART: [art] Signing Cert with AUTHO
3,649,883 UART: RITY.KEYID = 7
3,664,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,342 UART: [art] PUB.X = B2B71865D0B607DE8763121723A1F3BC3A56C9502670CDD5AF76B12C2ED4A836147A5320BF2FA75561316C4FE4908B32
3,672,109 UART: [art] PUB.Y = 3468A2D215D1154FE346B1B98ADC8EF9E4363332969873251BF8D4AFDB85D03326920C5CB99C7E758CB245F572335A03
3,679,051 UART: [art] SIG.R = 84469C4E48DD43D5491D4098D90C76851FC9EDA2282B537C88A244B37F3EF68B2183912CB7D33D044EB1107DD5203108
3,685,808 UART: [art] SIG.S = 0FE842E6FAB41DFDFBDB0BACB01794841C0E9A23A1BA5AC9142AE59DA807B00307936D18C519519DA1DF15295816FA95
3,709,779 UART: Caliptra RT
3,710,032 UART: [state] CFI Enabled
3,817,792 UART: [rt] RT listening for mailbox commands...
3,818,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,652 UART: [rt]cmd =0x41544d4e, len=14344
3,943,117 >>> mbox cmd response: failed
3,943,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,967 UART: [rt]cmd =0x41544d4e, len=14344
4,067,392 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,068 ready_for_fw is high
1,056,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,159,105 >>> mbox cmd response: success
3,221,114 UART:
3,221,130 UART: Running Caliptra FMC ...
3,221,538 UART:
3,221,592 UART: [state] CFI Enabled
3,231,804 UART: [fht] FMC Alias Private Key: 7
3,339,712 UART: [art] Extend RT PCRs Done
3,340,140 UART: [art] Lock RT PCRs Done
3,341,806 UART: [art] Populate DV Done
3,349,984 UART: [fht] FMC Alias Private Key: 7
3,351,072 UART: [art] Derive CDI
3,351,352 UART: [art] Store in in slot 0x4
3,436,857 UART: [art] Derive Key Pair
3,437,217 UART: [art] Store priv key in slot 0x5
3,450,919 UART: [art] Derive Key Pair - Done
3,465,502 UART: [art] Signing Cert with AUTHO
3,465,982 UART: RITY.KEYID = 7
3,480,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,513 UART: [art] PUB.X = 587AC55DE2595A88F0B1DC17FC84F5D5EF2EF66230D33C42478C1990C66790C39030872397D63900DC4E0697BDAD9C36
3,488,258 UART: [art] PUB.Y = 5DCCBA87C4385A0EABDDC59C43EAD0DD1352C915EF56CAC890C2932F89BC1DF9AC9FCCB8F697B55A3D9D8CFF27ABED85
3,495,241 UART: [art] SIG.R = 3746B791C8F8FE84F2691AA0D997B5C33D99E5AB8D92350FDA2C315C1213B33E8E20C1D92DBD27E7A02D284C3B0B8AD8
3,502,017 UART: [art] SIG.S = 4B05B1C2D589B15B4FA0F0EBF6D145F14548B91DD4E431CC82730E16ABB62534CB140C41161E6DAA45AA9B00B0302A72
3,526,129 UART: Caliptra RT
3,526,382 UART: [state] CFI Enabled
3,634,331 UART: [rt] RT listening for mailbox commands...
3,635,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,025 UART: [rt]cmd =0x41544d4e, len=14344
3,759,578 >>> mbox cmd response: failed
3,759,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,180 UART: [rt]cmd =0x41544d4e, len=14344
3,883,673 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,174,400 ready_for_fw is high
1,174,400 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,198,658 UART: [idev] Sha1 KeyId Algorithm
1,207,404 UART: [idev] --
1,208,401 UART: [ldev] ++
1,208,569 UART: [ldev] CDI.KEYID = 6
1,208,933 UART: [ldev] SUBJECT.KEYID = 5
1,209,360 UART: [ldev] AUTHORITY.KEYID = 7
1,209,823 UART: [ldev] FE.KEYID = 1
1,215,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,467 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,884 >>> mbox cmd response: success
3,327,005 UART: [afmc] ++
3,327,173 UART: [afmc] CDI.KEYID = 6
3,327,536 UART: [afmc] SUBJECT.KEYID = 7
3,327,962 UART: [afmc] AUTHORITY.KEYID = 5
3,363,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,709 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,419 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,309 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,020 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,066 UART: [afmc] --
3,407,192 UART: [cold-reset] --
3,408,256 UART: [state] Locking Datavault
3,409,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,801 UART: [state] Locking ICCM
3,410,271 UART: [exit] Launching FMC @ 0x40000130
3,415,600 UART:
3,415,616 UART: Running Caliptra FMC ...
3,416,024 UART:
3,416,167 UART: [state] CFI Enabled
3,426,539 UART: [fht] FMC Alias Private Key: 7
3,534,167 UART: [art] Extend RT PCRs Done
3,534,595 UART: [art] Lock RT PCRs Done
3,536,347 UART: [art] Populate DV Done
3,544,421 UART: [fht] FMC Alias Private Key: 7
3,545,381 UART: [art] Derive CDI
3,545,661 UART: [art] Store in in slot 0x4
3,631,710 UART: [art] Derive Key Pair
3,632,070 UART: [art] Store priv key in slot 0x5
3,645,330 UART: [art] Derive Key Pair - Done
3,660,183 UART: [art] Signing Cert with AUTHO
3,660,663 UART: RITY.KEYID = 7
3,675,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,470 UART: [art] PUB.X = 17718D94CA870255111C34323B4905FEE07A99B6172679DD8C9799B7CFB41B0ED33A4F02FA5E98F132F0BD0A15268713
3,683,223 UART: [art] PUB.Y = 8E4DACCA649F7AC30D525326EB51D8FE57864E0374501622DC2F7E559DE7443F15C2323C1F8DCB2154056E847BC250E6
3,690,168 UART: [art] SIG.R = DFCBB035B35773A1BE7745D8902DCFE21FC8C188F075113FF69A1E5FDFAF12892C0D7E229DAF61288255F160574CD833
3,696,945 UART: [art] SIG.S = E73EF41C4DC7AD5177C4B0AA462A04FA02DF3B566B77F759F41EBF55EF84300F6D8D95F4C1CE28E8663C4C6B59F7DF35
3,720,249 UART: Caliptra RT
3,720,594 UART: [state] CFI Enabled
3,829,983 UART: [rt] RT listening for mailbox commands...
3,830,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,725 UART: [rt]cmd =0x41544d4e, len=14344
3,954,916 >>> mbox cmd response: failed
3,954,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,508 UART: [rt]cmd =0x41544d4e, len=14344
4,079,083 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,687 ready_for_fw is high
1,055,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,163,297 >>> mbox cmd response: success
3,225,516 UART:
3,225,532 UART: Running Caliptra FMC ...
3,225,940 UART:
3,226,083 UART: [state] CFI Enabled
3,236,659 UART: [fht] FMC Alias Private Key: 7
3,344,789 UART: [art] Extend RT PCRs Done
3,345,217 UART: [art] Lock RT PCRs Done
3,346,573 UART: [art] Populate DV Done
3,354,731 UART: [fht] FMC Alias Private Key: 7
3,355,847 UART: [art] Derive CDI
3,356,127 UART: [art] Store in in slot 0x4
3,442,172 UART: [art] Derive Key Pair
3,442,532 UART: [art] Store priv key in slot 0x5
3,455,468 UART: [art] Derive Key Pair - Done
3,469,972 UART: [art] Signing Cert with AUTHO
3,470,452 UART: RITY.KEYID = 7
3,485,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,369 UART: [art] PUB.X = F36659DAF1FDFE5AAE2C5E739DA0BBAC25003B069B3AADAFEBA196160DCBB7E2EFB6B3912EC5327A48DB9F5A10524E3B
3,493,143 UART: [art] PUB.Y = B35B1A258118A272FFE2F2461553C82F7A54F7FA531D0F0A53DD35759A944F352CABFF27DC84697ADBBC096D8D2F8DC4
3,500,098 UART: [art] SIG.R = A7753C4A18B604F309CDF397F826C61B14E8D6A64309B0D5894EC4E1B0CD2631D769ED10C72CCBCA0461114BA4E4B166
3,506,864 UART: [art] SIG.S = 6A13729126C910C07952F49E1E012A9683386A1CD5A76558F1618372F82DF2D230A1108FB57C39EDE0C13FEC0DD655D0
3,530,843 UART: Caliptra RT
3,531,188 UART: [state] CFI Enabled
3,639,878 UART: [rt] RT listening for mailbox commands...
3,640,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,520 UART: [rt]cmd =0x41544d4e, len=14344
3,764,879 >>> mbox cmd response: failed
3,764,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,503 UART: [rt]cmd =0x41544d4e, len=14344
3,889,126 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,318 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,476,035 UART: [cold-reset] ++
1,476,475 UART: [fht] Storing FHT @ 0x50003400
1,479,084 UART: [idev] ++
1,479,252 UART: [idev] CDI.KEYID = 6
1,479,612 UART: [idev] SUBJECT.KEYID = 7
1,480,036 UART: [idev] UDS.KEYID = 0
1,480,381 ready_for_fw is high
1,480,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,180 UART: [idev] Erasing UDS.KEYID = 0
1,504,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,988 UART: [idev] --
1,514,077 UART: [ldev] ++
1,514,245 UART: [ldev] CDI.KEYID = 6
1,514,608 UART: [ldev] SUBJECT.KEYID = 5
1,515,034 UART: [ldev] AUTHORITY.KEYID = 7
1,515,497 UART: [ldev] FE.KEYID = 1
1,520,851 UART: [ldev] Erasing FE.KEYID = 1
1,546,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,968 UART: [ldev] --
1,585,467 UART: [fwproc] Waiting for Commands...
1,586,206 UART: [fwproc] Received command 0x46574c44
1,586,997 UART: [fwproc] Received Image of size 114332 bytes
5,195,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,260 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,253,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,389,411 >>> mbox cmd response: success
5,390,615 UART: [afmc] ++
5,390,783 UART: [afmc] CDI.KEYID = 6
5,391,145 UART: [afmc] SUBJECT.KEYID = 7
5,391,570 UART: [afmc] AUTHORITY.KEYID = 5
5,426,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,092 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,443,872 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,449,581 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,455,473 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,174 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,004 UART: [afmc] --
5,470,122 UART: [cold-reset] --
5,470,860 UART: [state] Locking Datavault
5,471,951 UART: [state] Locking PCR0, PCR1 and PCR31
5,472,555 UART: [state] Locking ICCM
5,473,101 UART: [exit] Launching FMC @ 0x40000130
5,478,430 UART:
5,478,446 UART: Running Caliptra FMC ...
5,478,854 UART:
5,478,908 UART: [state] CFI Enabled
5,489,662 UART: [fht] FMC Alias Private Key: 7
5,597,610 UART: [art] Extend RT PCRs Done
5,598,038 UART: [art] Lock RT PCRs Done
5,599,844 UART: [art] Populate DV Done
5,608,116 UART: [fht] FMC Alias Private Key: 7
5,609,266 UART: [art] Derive CDI
5,609,546 UART: [art] Store in in slot 0x4
5,695,311 UART: [art] Derive Key Pair
5,695,671 UART: [art] Store priv key in slot 0x5
5,708,649 UART: [art] Derive Key Pair - Done
5,723,257 UART: [art] Signing Cert with AUTHO
5,723,737 UART: RITY.KEYID = 7
5,738,789 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,554 UART: [art] PUB.X = 9EE29C967ECEC87302F23994C5D220DA3F04CD1CE8E8C106F33A5AD41F4643163276283E3CDA38A386901E85B855A969
5,746,317 UART: [art] PUB.Y = DF7BFCA62C62BABD18A032C849797F26E4501BE05BD583FBD83F78E86C7B2F401FA11E731D366C4C717DAF97E555D0E2
5,753,283 UART: [art] SIG.R = 4BCDFF480E081477462112096685AD269312536B848470A81C8680E90182AEF4894847487A0304C9F7A28878C8135D0A
5,760,014 UART: [art] SIG.S = 61CBAEF8F236934AECAF0C4B291CEBB74F387EDB8641666FDF44A53831F2DD6B671F9F8F2393009101AD66B76968E3A1
5,784,251 UART: Caliptra RT
5,784,504 UART: [state] CFI Enabled
5,892,986 UART: [rt] RT listening for mailbox commands...
5,893,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,592 UART: [rt]cmd =0x41544d4e, len=14344
7,419,495 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 ready_for_fw is high
1,362,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,200,904 >>> mbox cmd response: success
5,262,885 UART:
5,262,901 UART: Running Caliptra FMC ...
5,263,309 UART:
5,263,363 UART: [state] CFI Enabled
5,273,809 UART: [fht] FMC Alias Private Key: 7
5,381,813 UART: [art] Extend RT PCRs Done
5,382,241 UART: [art] Lock RT PCRs Done
5,383,843 UART: [art] Populate DV Done
5,392,107 UART: [fht] FMC Alias Private Key: 7
5,393,143 UART: [art] Derive CDI
5,393,423 UART: [art] Store in in slot 0x4
5,479,248 UART: [art] Derive Key Pair
5,479,608 UART: [art] Store priv key in slot 0x5
5,492,748 UART: [art] Derive Key Pair - Done
5,507,589 UART: [art] Signing Cert with AUTHO
5,508,069 UART: RITY.KEYID = 7
5,523,349 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,114 UART: [art] PUB.X = 27EA36148B42A7FFFA5546A2A61926BAD09662B96830048FA7966F95E34C8FBCE8718CDB61A5DAC02E4B75A8CCA3CA28
5,530,895 UART: [art] PUB.Y = A1C2B21E400CCE44A3A9A1B0779A6271F0FFE8C160814E9D98B55FF76D24792A59FD7ED5EB24A707B7A1D91DE6286A20
5,537,851 UART: [art] SIG.R = BD4432AC85A1BF2E9A6CA49E7272B79DF2C47EE00A990D0EE965CD00B625CAC0BA8FC41CA24DCCC5E2EC89AE3F19F7E9
5,544,620 UART: [art] SIG.S = 5DD57503CD692427B9D629F475446B6FD91307E683E28090B11057CC32C1170FDD2CBE8FFCD1C0EDDAC03AEA328C9279
5,568,404 UART: Caliptra RT
5,568,657 UART: [state] CFI Enabled
5,676,474 UART: [rt] RT listening for mailbox commands...
5,677,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,330 UART: [rt]cmd =0x41544d4e, len=14344
7,203,021 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,459 UART: [kat] LMS
1,475,655 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,813 UART: [idev] ++
1,479,981 UART: [idev] CDI.KEYID = 6
1,480,341 UART: [idev] SUBJECT.KEYID = 7
1,480,765 UART: [idev] UDS.KEYID = 0
1,481,110 ready_for_fw is high
1,481,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,793 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,451 UART: [idev] --
1,515,566 UART: [ldev] ++
1,515,734 UART: [ldev] CDI.KEYID = 6
1,516,097 UART: [ldev] SUBJECT.KEYID = 5
1,516,523 UART: [ldev] AUTHORITY.KEYID = 7
1,516,986 UART: [ldev] FE.KEYID = 1
1,522,132 UART: [ldev] Erasing FE.KEYID = 1
1,547,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,675 UART: [ldev] --
1,587,032 UART: [fwproc] Waiting for Commands...
1,587,749 UART: [fwproc] Received command 0x46574c44
1,588,540 UART: [fwproc] Received Image of size 114332 bytes
5,348,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,375,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,405,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,541,028 >>> mbox cmd response: success
5,542,146 UART: [afmc] ++
5,542,314 UART: [afmc] CDI.KEYID = 6
5,542,676 UART: [afmc] SUBJECT.KEYID = 7
5,543,101 UART: [afmc] AUTHORITY.KEYID = 5
5,577,851 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,594,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,594,887 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,600,596 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,606,488 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,612,189 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,225 UART: [afmc] --
5,621,299 UART: [cold-reset] --
5,622,071 UART: [state] Locking Datavault
5,623,238 UART: [state] Locking PCR0, PCR1 and PCR31
5,623,842 UART: [state] Locking ICCM
5,624,336 UART: [exit] Launching FMC @ 0x40000130
5,629,665 UART:
5,629,681 UART: Running Caliptra FMC ...
5,630,089 UART:
5,630,232 UART: [state] CFI Enabled
5,641,214 UART: [fht] FMC Alias Private Key: 7
5,749,186 UART: [art] Extend RT PCRs Done
5,749,614 UART: [art] Lock RT PCRs Done
5,751,550 UART: [art] Populate DV Done
5,760,068 UART: [fht] FMC Alias Private Key: 7
5,761,032 UART: [art] Derive CDI
5,761,312 UART: [art] Store in in slot 0x4
5,846,915 UART: [art] Derive Key Pair
5,847,275 UART: [art] Store priv key in slot 0x5
5,860,419 UART: [art] Derive Key Pair - Done
5,875,431 UART: [art] Signing Cert with AUTHO
5,875,911 UART: RITY.KEYID = 7
5,891,037 UART: [art] Erasing AUTHORITY.KEYID = 7
5,891,802 UART: [art] PUB.X = E9E492170A29AF55E7E8F448AC6B44775FB56CD836DF4B18359CD35D30D8DADD1E4754BA3355DF47CF0D2DA808DEFF36
5,898,581 UART: [art] PUB.Y = 9AAEF61270B3DA2D328225295881F455887B25D15A5360E1738C96EF7EC6D70EBCF069F9CB9C0CDF65E3C6308C4A56B3
5,905,533 UART: [art] SIG.R = 68BB2A2B2121BF17C38A3702BE1DA0A551C6CA567AB35C798D3CA4AB325405589D99B6E149DAA4A802C8EDA6E6603F00
5,912,284 UART: [art] SIG.S = 65CAE4482FE2FBB8A7DD52BFDFE21FCBA117F976AB931FD558C503D0E2FB08B91E78875C98EEF3F37C9D86E02488457B
5,935,921 UART: Caliptra RT
5,936,266 UART: [state] CFI Enabled
6,044,452 UART: [rt] RT listening for mailbox commands...
6,045,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,220 UART: [rt]cmd =0x41544d4e, len=14344
7,558,566 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,648 ready_for_fw is high
1,363,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,126,859 >>> mbox cmd response: success
5,188,426 UART:
5,188,442 UART: Running Caliptra FMC ...
5,188,850 UART:
5,188,993 UART: [state] CFI Enabled
5,199,423 UART: [fht] FMC Alias Private Key: 7
5,307,657 UART: [art] Extend RT PCRs Done
5,308,085 UART: [art] Lock RT PCRs Done
5,309,501 UART: [art] Populate DV Done
5,317,615 UART: [fht] FMC Alias Private Key: 7
5,318,733 UART: [art] Derive CDI
5,319,013 UART: [art] Store in in slot 0x4
5,405,110 UART: [art] Derive Key Pair
5,405,470 UART: [art] Store priv key in slot 0x5
5,418,494 UART: [art] Derive Key Pair - Done
5,433,308 UART: [art] Signing Cert with AUTHO
5,433,788 UART: RITY.KEYID = 7
5,449,268 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,033 UART: [art] PUB.X = CA6ADB44AEB1BCD032743B532491D857F87D8CFF0B7B6E110AC2A2E3DCA4D0057A42DAC656BDFDE29968565EA700AD0F
5,456,793 UART: [art] PUB.Y = 6BC6182157E6C74EDC0363B3C8207C8FB8FF7460B96C7A55298AABD8AED3E14E460F052146739AD1E987FAADB9B20011
5,463,722 UART: [art] SIG.R = 78DADB3665B7D5BE7A905BA703737ECA6376BDE9A922F9FD33CB06BD681989A4F502F2AA639569D8C004D2BC28059082
5,470,485 UART: [art] SIG.S = 103B941016178F516C370E2F6CBEBE473897AB62FAFA91F14652922420FB750DD148434C09553D91B80F7D51D1A6C6E6
5,493,888 UART: Caliptra RT
5,494,233 UART: [state] CFI Enabled
5,603,295 UART: [rt] RT listening for mailbox commands...
5,603,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,883 UART: [rt]cmd =0x41544d4e, len=14344
7,129,954 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
917,850 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,630 UART: [idev] ++
1,174,798 UART: [idev] CDI.KEYID = 6
1,175,158 UART: [idev] SUBJECT.KEYID = 7
1,175,582 UART: [idev] UDS.KEYID = 0
1,175,927 ready_for_fw is high
1,175,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,041 UART: [idev] Sha1 KeyId Algorithm
1,208,433 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,532 UART: [ldev] AUTHORITY.KEYID = 7
1,210,995 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,193 >>> mbox cmd response: success
3,313,343 UART: [afmc] ++
3,313,511 UART: [afmc] CDI.KEYID = 6
3,313,873 UART: [afmc] SUBJECT.KEYID = 7
3,314,298 UART: [afmc] AUTHORITY.KEYID = 5
3,349,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,883 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,592 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,484 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,195 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,214 UART: [afmc] --
3,393,326 UART: [cold-reset] --
3,393,970 UART: [state] Locking Datavault
3,395,299 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,903 UART: [state] Locking ICCM
3,396,549 UART: [exit] Launching FMC @ 0x40000130
3,401,878 UART:
3,401,894 UART: Running Caliptra FMC ...
3,402,302 UART:
3,402,356 UART: [state] CFI Enabled
3,412,642 UART: [fht] FMC Alias Private Key: 7
3,520,886 UART: [art] Extend RT PCRs Done
3,521,314 UART: [art] Lock RT PCRs Done
3,522,620 UART: [art] Populate DV Done
3,531,054 UART: [fht] FMC Alias Private Key: 7
3,532,006 UART: [art] Derive CDI
3,532,286 UART: [art] Store in in slot 0x4
3,618,171 UART: [art] Derive Key Pair
3,618,531 UART: [art] Store priv key in slot 0x5
3,631,757 UART: [art] Derive Key Pair - Done
3,646,393 UART: [art] Signing Cert with AUTHO
3,646,873 UART: RITY.KEYID = 7
3,661,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,468 UART: [art] PUB.X = AF4B4614138433AB141D6D071ED69B704964B05C1F168184E0EAC5D16483BD888AF1CC42A94EDD91C2BC431B9D1D1971
3,669,241 UART: [art] PUB.Y = 91A3AFD0EDCB6DB5F50DA514824620C02FAAEE9504462ADE3AD19AAE3FBFCD0849B2B1829BFBDAFB10E09CA8335652C5
3,676,210 UART: [art] SIG.R = 570570DA58342F7D2CC8F8944B25A6265C22B70EDE68D76C4D775E9D7E760A4849F1D290EAB3E7B4B2857606484E9367
3,682,966 UART: [art] SIG.S = E93F0FB3B0FCC3AA8C72BF1399EB7C21241CE1CA95CD185F53B2B4E1D0995E1E2B17E04B30A0B7BED71F49EBBE5B1109
3,707,233 UART: Caliptra RT
3,707,486 UART: [state] CFI Enabled
3,814,834 UART: [rt] RT listening for mailbox commands...
3,815,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,708 UART: [rt]cmd =0x41544d4e, len=14344
5,348,752 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,767 ready_for_fw is high
1,060,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,155,154 >>> mbox cmd response: success
3,216,359 UART:
3,216,375 UART: Running Caliptra FMC ...
3,216,783 UART:
3,216,837 UART: [state] CFI Enabled
3,227,429 UART: [fht] FMC Alias Private Key: 7
3,335,305 UART: [art] Extend RT PCRs Done
3,335,733 UART: [art] Lock RT PCRs Done
3,337,219 UART: [art] Populate DV Done
3,345,509 UART: [fht] FMC Alias Private Key: 7
3,346,605 UART: [art] Derive CDI
3,346,885 UART: [art] Store in in slot 0x4
3,432,380 UART: [art] Derive Key Pair
3,432,740 UART: [art] Store priv key in slot 0x5
3,445,406 UART: [art] Derive Key Pair - Done
3,460,385 UART: [art] Signing Cert with AUTHO
3,460,865 UART: RITY.KEYID = 7
3,475,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,476,422 UART: [art] PUB.X = DA6297627DC8DE596F2356DC750426D04E3D50E2C8DB2F6FAE386CE37FA7FF027272AB5B606AFC7ABC459BEBD814F848
3,483,204 UART: [art] PUB.Y = A9DB6A35D75CAF5326D3BB5F1427E2137ECBAAB7D59A57F3C787EAF6CAC9411C18D22803DB8311DC33E26FEA6C7EB3E4
3,490,175 UART: [art] SIG.R = 4340E79575DF7512A9D7BA673DE2C093839B640CFBBF3933F1A4DA753A60B41EB807F57D1B97AE2843AE6F74B288F31C
3,496,947 UART: [art] SIG.S = DB2BCF7252D87E645EF1FE8AE61C7C0DD108B4FAB5B727A342FB737536FB4DFFB3A9D09E566C0BE3B27620C46220D541
3,520,713 UART: Caliptra RT
3,520,966 UART: [state] CFI Enabled
3,628,738 UART: [rt] RT listening for mailbox commands...
3,629,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,306 UART: [rt]cmd =0x41544d4e, len=14344
5,153,074 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
919,195 UART: [kat] HMAC-384Kdf
923,783 UART: [kat] LMS
1,172,111 UART: [kat] --
1,173,074 UART: [cold-reset] ++
1,173,428 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 ready_for_fw is high
1,177,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,009 UART: [idev] Erasing UDS.KEYID = 0
1,201,912 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,217,948 UART: [ldev] Erasing FE.KEYID = 1
1,244,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,118 UART: [ldev] --
1,284,381 UART: [fwproc] Wait for Commands...
1,285,015 UART: [fwproc] Recv command 0x46574c44
1,285,743 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,305 >>> mbox cmd response: success
3,319,405 UART: [afmc] ++
3,319,573 UART: [afmc] CDI.KEYID = 6
3,319,935 UART: [afmc] SUBJECT.KEYID = 7
3,320,360 UART: [afmc] AUTHORITY.KEYID = 5
3,356,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,085 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,794 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,686 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,397 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,088 UART: [afmc] --
3,399,096 UART: [cold-reset] --
3,399,856 UART: [state] Locking Datavault
3,401,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,707 UART: [state] Locking ICCM
3,402,377 UART: [exit] Launching FMC @ 0x40000130
3,407,706 UART:
3,407,722 UART: Running Caliptra FMC ...
3,408,130 UART:
3,408,273 UART: [state] CFI Enabled
3,418,883 UART: [fht] FMC Alias Private Key: 7
3,526,981 UART: [art] Extend RT PCRs Done
3,527,409 UART: [art] Lock RT PCRs Done
3,528,941 UART: [art] Populate DV Done
3,537,075 UART: [fht] FMC Alias Private Key: 7
3,538,173 UART: [art] Derive CDI
3,538,453 UART: [art] Store in in slot 0x4
3,624,212 UART: [art] Derive Key Pair
3,624,572 UART: [art] Store priv key in slot 0x5
3,638,466 UART: [art] Derive Key Pair - Done
3,653,409 UART: [art] Signing Cert with AUTHO
3,653,889 UART: RITY.KEYID = 7
3,668,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,574 UART: [art] PUB.X = FCA67F831629567B15C1FCA57FD11416961355E97D0F4B65DFDC776D676BA7A97CA7BF0068EDFF021042482542EF877B
3,676,322 UART: [art] PUB.Y = 388B63B7D591DC5D97D19A53A7ABFB2F9ADB09C4D0E80C96FA26959952CA9340B7616ACD1F16009EC541616D440B892B
3,683,249 UART: [art] SIG.R = ABE7BCB58A91C5AC38FC62DFE496AE1BB06BD30A5C2C488EEB1D8E9FABA416C716B4C6146657EC8466E75998D0DAF445
3,690,040 UART: [art] SIG.S = 0A9EBBAB641C971D54A82000F5D0F43C90E09734723E72D1265730D40893FC9478F7D7250303E9DAC07BD9DC10FC5228
3,712,955 UART: Caliptra RT
3,713,300 UART: [state] CFI Enabled
3,820,780 UART: [rt] RT listening for mailbox commands...
3,821,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,488 UART: [rt]cmd =0x41544d4e, len=14344
5,349,792 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,018 ready_for_fw is high
1,060,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,697 >>> mbox cmd response: success
3,227,360 UART:
3,227,376 UART: Running Caliptra FMC ...
3,227,784 UART:
3,227,927 UART: [state] CFI Enabled
3,238,711 UART: [fht] FMC Alias Private Key: 7
3,346,823 UART: [art] Extend RT PCRs Done
3,347,251 UART: [art] Lock RT PCRs Done
3,348,745 UART: [art] Populate DV Done
3,356,909 UART: [fht] FMC Alias Private Key: 7
3,357,889 UART: [art] Derive CDI
3,358,169 UART: [art] Store in in slot 0x4
3,443,962 UART: [art] Derive Key Pair
3,444,322 UART: [art] Store priv key in slot 0x5
3,457,594 UART: [art] Derive Key Pair - Done
3,472,511 UART: [art] Signing Cert with AUTHO
3,472,991 UART: RITY.KEYID = 7
3,487,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,562 UART: [art] PUB.X = 841D3DF8528B7B4B5E4728F5C66014D5ADB4537765922ADCB769BBA4F80C4F4E833D7E9B4E6D6B39DA6EF580D599BE8F
3,495,343 UART: [art] PUB.Y = CB0A94F73F8960007CCC8A84E2B7E421101E56B1FA1F6AE0FAACDB9EFE29F44B5CACE97B26FEDBF23820BBA83EA966EF
3,502,300 UART: [art] SIG.R = DBBB6F39703FB533CCF856C7D91A3832E418D1D6A5CCF85A93D93FDAA895D5E78B351DB466B9DC363DD1E0FD2CC35934
3,509,090 UART: [art] SIG.S = ED36EA699BA874649EECA0D307BBFCACC83A2FF89839948A4CE22065D0252390ECF41EBFCED729DE696125C87ED2D286
3,532,596 UART: Caliptra RT
3,532,941 UART: [state] CFI Enabled
3,640,196 UART: [rt] RT listening for mailbox commands...
3,640,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,974 UART: [rt]cmd =0x41544d4e, len=14344
5,161,813 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 ready_for_fw is high
1,174,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,827 UART: [fwproc] Recv command 0x46574c44
1,282,560 UART: [fwproc] Recv'd Img size: 114332 bytes
3,114,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,307,158 >>> mbox cmd response: success
3,308,255 UART: [afmc] ++
3,308,423 UART: [afmc] CDI.KEYID = 6
3,308,786 UART: [afmc] SUBJECT.KEYID = 7
3,309,212 UART: [afmc] AUTHORITY.KEYID = 5
3,344,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,581 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,291 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,181 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,892 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,626 UART: [afmc] --
3,387,718 UART: [cold-reset] --
3,388,740 UART: [state] Locking Datavault
3,389,801 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,405 UART: [state] Locking ICCM
3,391,077 UART: [exit] Launching FMC @ 0x40000130
3,396,406 UART:
3,396,422 UART: Running Caliptra FMC ...
3,396,830 UART:
3,396,884 UART: [state] CFI Enabled
3,407,414 UART: [fht] FMC Alias Private Key: 7
3,515,460 UART: [art] Extend RT PCRs Done
3,515,888 UART: [art] Lock RT PCRs Done
3,517,512 UART: [art] Populate DV Done
3,525,758 UART: [fht] FMC Alias Private Key: 7
3,526,814 UART: [art] Derive CDI
3,527,094 UART: [art] Store in in slot 0x4
3,612,897 UART: [art] Derive Key Pair
3,613,257 UART: [art] Store priv key in slot 0x5
3,626,739 UART: [art] Derive Key Pair - Done
3,641,223 UART: [art] Signing Cert with AUTHO
3,641,703 UART: RITY.KEYID = 7
3,656,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,574 UART: [art] PUB.X = 968989091D672FC458155760EF8B73660A6CB50F775C00DFF1B10937FC37BA88FF2289CC74B5253CEA13480CE595491A
3,664,305 UART: [art] PUB.Y = 326C1C615127938D2588FFDED099DEF9FA3B49F92D3F07F984F3C878695126C25262AA898A0045C9300C04C956B6F5CC
3,671,224 UART: [art] SIG.R = C530BE1686211036591B62037EC8235EFDF5747E3C2D9FAEC1AF04B57A6024561A27842E7680E4FF36506A4ACF1D368C
3,677,990 UART: [art] SIG.S = DD145BF781393A752D0A1485B64770BBF8A40A9D54DEE1C467797CD1723FAECBCB8F2938E6918A32C3B78AE895A525A0
3,702,293 UART: Caliptra RT
3,702,546 UART: [state] CFI Enabled
3,809,947 UART: [rt] RT listening for mailbox commands...
3,810,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,577 UART: [rt]cmd =0x41544d4e, len=14344
5,331,494 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,158,603 >>> mbox cmd response: success
3,220,772 UART:
3,220,788 UART: Running Caliptra FMC ...
3,221,196 UART:
3,221,250 UART: [state] CFI Enabled
3,231,918 UART: [fht] FMC Alias Private Key: 7
3,339,936 UART: [art] Extend RT PCRs Done
3,340,364 UART: [art] Lock RT PCRs Done
3,341,806 UART: [art] Populate DV Done
3,350,092 UART: [fht] FMC Alias Private Key: 7
3,351,182 UART: [art] Derive CDI
3,351,462 UART: [art] Store in in slot 0x4
3,437,533 UART: [art] Derive Key Pair
3,437,893 UART: [art] Store priv key in slot 0x5
3,450,601 UART: [art] Derive Key Pair - Done
3,465,168 UART: [art] Signing Cert with AUTHO
3,465,648 UART: RITY.KEYID = 7
3,480,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,607 UART: [art] PUB.X = BA62F293734E0E1D5A254E93AE316F48BFE588C09AE76BF94E593C56C0A41AF94665C7E1FD815774577B895A5947BC05
3,488,375 UART: [art] PUB.Y = 95F561E0433C48D5174BD8A788762B260904231A6F777F0C1D88624ED76918466563FAEE22AF463F5C277E7314173DEC
3,495,308 UART: [art] SIG.R = B5325127A83E565B5D5BE9D778BC512B6E0FEFDA3F3EB6AC4989C7A0AC9FF0BCDB8611AFBB2546D70D9D118B9F64BDF3
3,502,098 UART: [art] SIG.S = 0E5999AEE42C268DB3CD705B75373DE30A7DE3647695F37D883ED0C4F30DA3AA4815978B5095E3AFECD31966C3CD52E1
3,526,088 UART: Caliptra RT
3,526,341 UART: [state] CFI Enabled
3,633,011 UART: [rt] RT listening for mailbox commands...
3,633,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,629 UART: [rt]cmd =0x41544d4e, len=14344
5,159,076 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 ready_for_fw is high
1,174,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,244 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,455 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,325 >>> mbox cmd response: success
3,318,464 UART: [afmc] ++
3,318,632 UART: [afmc] CDI.KEYID = 6
3,318,995 UART: [afmc] SUBJECT.KEYID = 7
3,319,421 UART: [afmc] AUTHORITY.KEYID = 5
3,355,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,510 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,220 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,110 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,821 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,819 UART: [afmc] --
3,398,809 UART: [cold-reset] --
3,399,467 UART: [state] Locking Datavault
3,400,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,162 UART: [state] Locking ICCM
3,401,726 UART: [exit] Launching FMC @ 0x40000130
3,407,055 UART:
3,407,071 UART: Running Caliptra FMC ...
3,407,479 UART:
3,407,622 UART: [state] CFI Enabled
3,418,262 UART: [fht] FMC Alias Private Key: 7
3,526,134 UART: [art] Extend RT PCRs Done
3,526,562 UART: [art] Lock RT PCRs Done
3,528,206 UART: [art] Populate DV Done
3,536,570 UART: [fht] FMC Alias Private Key: 7
3,537,734 UART: [art] Derive CDI
3,538,014 UART: [art] Store in in slot 0x4
3,623,455 UART: [art] Derive Key Pair
3,623,815 UART: [art] Store priv key in slot 0x5
3,636,795 UART: [art] Derive Key Pair - Done
3,651,540 UART: [art] Signing Cert with AUTHO
3,652,020 UART: RITY.KEYID = 7
3,666,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,407 UART: [art] PUB.X = 64FFB047850A68DC715520C48477F41810BBA42322056E42F2E1F7B49C75A27AA6B160EDC2B161DAACA71D7EF9154F54
3,674,177 UART: [art] PUB.Y = 25B81F489ED05EFE22CCAB652871F5A65EE788DD5C2A64528315A3EDBC90B4B4AB3C939A634982F418FB44CBB74F46B0
3,681,141 UART: [art] SIG.R = 2BE8875D97198493D39DE0609BF86867608B1BE704CA1C333E3B628C71631EFC6D210D1D64B45AFB9B341DB81D315150
3,687,905 UART: [art] SIG.S = 93287ED8995E41663591BDCA2A16722C31A9239EE89F2C1D8D3FFC9C710675906B94C34B60FA4963B5B1FC14382500FB
3,712,421 UART: Caliptra RT
3,712,766 UART: [state] CFI Enabled
3,821,196 UART: [rt] RT listening for mailbox commands...
3,821,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,762 UART: [rt]cmd =0x41544d4e, len=14344
5,352,111 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,089 ready_for_fw is high
1,056,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,517 >>> mbox cmd response: success
3,230,120 UART:
3,230,136 UART: Running Caliptra FMC ...
3,230,544 UART:
3,230,687 UART: [state] CFI Enabled
3,241,123 UART: [fht] FMC Alias Private Key: 7
3,349,147 UART: [art] Extend RT PCRs Done
3,349,575 UART: [art] Lock RT PCRs Done
3,351,307 UART: [art] Populate DV Done
3,359,285 UART: [fht] FMC Alias Private Key: 7
3,360,359 UART: [art] Derive CDI
3,360,639 UART: [art] Store in in slot 0x4
3,446,706 UART: [art] Derive Key Pair
3,447,066 UART: [art] Store priv key in slot 0x5
3,459,816 UART: [art] Derive Key Pair - Done
3,474,450 UART: [art] Signing Cert with AUTHO
3,474,930 UART: RITY.KEYID = 7
3,489,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,653 UART: [art] PUB.X = 936097C123FA16802CDDD869058ED1AB476F2AD47AFFA266F30C1FE32C098A362B125AAB9EEAC4BC95BDF78D81550090
3,497,406 UART: [art] PUB.Y = 164DB5868111667ADCF4A94B6B73796DB5CB4DB4F20608843726D1BA529CD0344AE3C21F49B53291ECEF60925276D055
3,504,350 UART: [art] SIG.R = E048E94FC141FD49395D8A7774EE1144AB9FC09DE32ABD4DB52736B18D812D1555BEA38D73B994BDAAC1C32E18D81D31
3,511,134 UART: [art] SIG.S = E242ACE5CC988DF226B4F7611C7E0B8FA4DF31581166FDE12614420687E2A33AF82DBAA3A1CBFB9B0519316880B27C43
3,535,356 UART: Caliptra RT
3,535,701 UART: [state] CFI Enabled
3,642,796 UART: [rt] RT listening for mailbox commands...
3,643,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,496 UART: [rt]cmd =0x41544d4e, len=14344
5,159,767 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,553 UART: [kat] SHA2-256
882,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,599 UART: [kat] ++
886,751 UART: [kat] sha1
891,005 UART: [kat] SHA2-256
892,943 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
903,094 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,921 UART: [fht] Storing FHT @ 0x50003400
1,479,616 UART: [idev] ++
1,479,784 UART: [idev] CDI.KEYID = 6
1,480,144 UART: [idev] SUBJECT.KEYID = 7
1,480,568 UART: [idev] UDS.KEYID = 0
1,480,913 ready_for_fw is high
1,480,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,320 UART: [idev] Erasing UDS.KEYID = 0
1,504,798 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,280 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,727 UART: [ldev] Erasing FE.KEYID = 1
1,546,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,146 UART: [ldev] --
1,585,465 UART: [fwproc] Waiting for Commands...
1,586,314 UART: [fwproc] Received command 0x46574c44
1,587,105 UART: [fwproc] Received Image of size 114332 bytes
5,158,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,351,986 >>> mbox cmd response: success
5,353,142 UART: [afmc] ++
5,353,310 UART: [afmc] CDI.KEYID = 6
5,353,672 UART: [afmc] SUBJECT.KEYID = 7
5,354,097 UART: [afmc] AUTHORITY.KEYID = 5
5,389,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,645 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,354 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,246 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,947 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,825 UART: [afmc] --
5,432,791 UART: [cold-reset] --
5,433,737 UART: [state] Locking Datavault
5,434,876 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,480 UART: [state] Locking ICCM
5,435,968 UART: [exit] Launching FMC @ 0x40000130
5,441,297 UART:
5,441,313 UART: Running Caliptra FMC ...
5,441,721 UART:
5,441,775 UART: [state] CFI Enabled
5,451,993 UART: [fht] FMC Alias Private Key: 7
5,559,609 UART: [art] Extend RT PCRs Done
5,560,037 UART: [art] Lock RT PCRs Done
5,561,813 UART: [art] Populate DV Done
5,570,117 UART: [fht] FMC Alias Private Key: 7
5,571,053 UART: [art] Derive CDI
5,571,333 UART: [art] Store in in slot 0x4
5,657,306 UART: [art] Derive Key Pair
5,657,666 UART: [art] Store priv key in slot 0x5
5,670,396 UART: [art] Derive Key Pair - Done
5,685,193 UART: [art] Signing Cert with AUTHO
5,685,673 UART: RITY.KEYID = 7
5,700,525 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,290 UART: [art] PUB.X = E225990F5FEFC23181277E2533908FAF76B65CB897617DBF08C406A2868CB1D0AFF5D5BDFACB71FF41A8211FAB69381A
5,708,065 UART: [art] PUB.Y = 1737FD88418E1C059F760AAD862E62F617F2470005C8280CB3788EDDD34530F42EFE9510C36DEB4EAF91C1994E153C92
5,714,983 UART: [art] SIG.R = 8E3E7932061852422229634410E3A5F2AC558F6DD89D10FF5EC0C2EDB8D541C2060CFE2F83A15B141ED8204D2EDDAA70
5,721,752 UART: [art] SIG.S = E761346832FCA333B70479242582EF0CCEA155451AAE826E7403009C5BAAA22C521F0822822A7683176E9A2DD94A36CF
5,745,541 UART: Caliptra RT
5,745,794 UART: [state] CFI Enabled
5,854,954 UART: [rt] RT listening for mailbox commands...
5,855,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,480 UART: [rt]cmd =0x41544d4e, len=14344
6,536,912 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,481 ready_for_fw is high
1,361,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,275,876 >>> mbox cmd response: success
5,337,723 UART:
5,337,739 UART: Running Caliptra FMC ...
5,338,147 UART:
5,338,201 UART: [state] CFI Enabled
5,348,673 UART: [fht] FMC Alias Private Key: 7
5,456,297 UART: [art] Extend RT PCRs Done
5,456,725 UART: [art] Lock RT PCRs Done
5,458,209 UART: [art] Populate DV Done
5,466,595 UART: [fht] FMC Alias Private Key: 7
5,467,579 UART: [art] Derive CDI
5,467,859 UART: [art] Store in in slot 0x4
5,553,504 UART: [art] Derive Key Pair
5,553,864 UART: [art] Store priv key in slot 0x5
5,567,214 UART: [art] Derive Key Pair - Done
5,581,903 UART: [art] Signing Cert with AUTHO
5,582,383 UART: RITY.KEYID = 7
5,597,929 UART: [art] Erasing AUTHORITY.KEYID = 7
5,598,694 UART: [art] PUB.X = 841C36EA369CD34223CD75AA20C51D16592C684E4604C1CAE7F162B32E611E58858D92B51A83FC9AA771CF4E17163B89
5,605,463 UART: [art] PUB.Y = B12C72A26484F7FEEDE6976004AA824B13C03A9D3F56FB5B751C6A82A3701D9BC277A5510AD2DA2C1687068034B780E3
5,612,408 UART: [art] SIG.R = FF822ECE349E641D59E9E197576E9DF444F8AD219CE90E7DA58F16C0344134B1981AC282A604918ABE779D120BDBE54E
5,619,177 UART: [art] SIG.S = D3DCF9A1896D46BC04FDA64041612A86E870F9B4D22950AF3F56E87B9E291C700BE851985E2CB0A1C6DE3668395F7D3C
5,642,686 UART: Caliptra RT
5,642,939 UART: [state] CFI Enabled
5,751,469 UART: [rt] RT listening for mailbox commands...
5,752,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,401 UART: [rt]cmd =0x41544d4e, len=14344
6,431,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,215 UART: [kat] LMS
1,475,411 UART: [kat] --
1,476,240 UART: [cold-reset] ++
1,476,634 UART: [fht] Storing FHT @ 0x50003400
1,479,439 UART: [idev] ++
1,479,607 UART: [idev] CDI.KEYID = 6
1,479,967 UART: [idev] SUBJECT.KEYID = 7
1,480,391 UART: [idev] UDS.KEYID = 0
1,480,736 ready_for_fw is high
1,480,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,447 UART: [idev] Erasing UDS.KEYID = 0
1,505,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,104 UART: [ldev] ++
1,515,272 UART: [ldev] CDI.KEYID = 6
1,515,635 UART: [ldev] SUBJECT.KEYID = 5
1,516,061 UART: [ldev] AUTHORITY.KEYID = 7
1,516,524 UART: [ldev] FE.KEYID = 1
1,521,568 UART: [ldev] Erasing FE.KEYID = 1
1,547,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,177 UART: [ldev] --
1,586,600 UART: [fwproc] Waiting for Commands...
1,587,337 UART: [fwproc] Received command 0x46574c44
1,588,128 UART: [fwproc] Received Image of size 114332 bytes
5,273,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,593 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,466,752 >>> mbox cmd response: success
5,467,974 UART: [afmc] ++
5,468,142 UART: [afmc] CDI.KEYID = 6
5,468,504 UART: [afmc] SUBJECT.KEYID = 7
5,468,929 UART: [afmc] AUTHORITY.KEYID = 5
5,504,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,520,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,521,559 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,527,268 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,533,160 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,538,861 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,546,725 UART: [afmc] --
5,547,659 UART: [cold-reset] --
5,548,781 UART: [state] Locking Datavault
5,549,898 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,502 UART: [state] Locking ICCM
5,550,936 UART: [exit] Launching FMC @ 0x40000130
5,556,265 UART:
5,556,281 UART: Running Caliptra FMC ...
5,556,689 UART:
5,556,832 UART: [state] CFI Enabled
5,567,184 UART: [fht] FMC Alias Private Key: 7
5,674,874 UART: [art] Extend RT PCRs Done
5,675,302 UART: [art] Lock RT PCRs Done
5,676,536 UART: [art] Populate DV Done
5,684,874 UART: [fht] FMC Alias Private Key: 7
5,685,832 UART: [art] Derive CDI
5,686,112 UART: [art] Store in in slot 0x4
5,771,835 UART: [art] Derive Key Pair
5,772,195 UART: [art] Store priv key in slot 0x5
5,785,725 UART: [art] Derive Key Pair - Done
5,800,233 UART: [art] Signing Cert with AUTHO
5,800,713 UART: RITY.KEYID = 7
5,815,969 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,734 UART: [art] PUB.X = 25767B7BE06E5A32312B6BAA78479B6DD6C800DC50784D6120843D8176412C2106292AB2B56576E2F3FB013ADB99087B
5,823,469 UART: [art] PUB.Y = DF0672C6DE6B63701B429D99215F9B1A784DC0F8ABEAC5832B20290ACA1B55B2B7EDEDCD546ED5E533AB509B4B8A956B
5,830,433 UART: [art] SIG.R = F7E8512A917115C0142B4A57180D619BB9508ABECDFAA7F340167849F9F0DD91F15374A511382E28ACB7AFA1D88F7426
5,837,204 UART: [art] SIG.S = BD54AF2FD2FCFF3B2D93403C5A790BAFD049F7F31B5DDD0D4BC23FA5DFFBDA04C5E00350DFDC20328081A07FFDDCBB2E
5,861,275 UART: Caliptra RT
5,861,620 UART: [state] CFI Enabled
5,970,192 UART: [rt] RT listening for mailbox commands...
5,970,862 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,912 UART: [rt]cmd =0x41544d4e, len=14344
6,647,230 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,414 ready_for_fw is high
1,363,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,013,746 >>> mbox cmd response: success
5,074,813 UART:
5,074,829 UART: Running Caliptra FMC ...
5,075,237 UART:
5,075,380 UART: [state] CFI Enabled
5,085,700 UART: [fht] FMC Alias Private Key: 7
5,193,920 UART: [art] Extend RT PCRs Done
5,194,348 UART: [art] Lock RT PCRs Done
5,195,744 UART: [art] Populate DV Done
5,203,948 UART: [fht] FMC Alias Private Key: 7
5,204,996 UART: [art] Derive CDI
5,205,276 UART: [art] Store in in slot 0x4
5,290,987 UART: [art] Derive Key Pair
5,291,347 UART: [art] Store priv key in slot 0x5
5,304,385 UART: [art] Derive Key Pair - Done
5,319,387 UART: [art] Signing Cert with AUTHO
5,319,867 UART: RITY.KEYID = 7
5,334,899 UART: [art] Erasing AUTHORITY.KEYID = 7
5,335,664 UART: [art] PUB.X = 912491C2192EFBBD3C7BCA9154CB6E2BAC941ACB5C85BEF16692ED452FC30727503FDD992CD34C2809C5D31C5AE9B0C7
5,342,446 UART: [art] PUB.Y = 6540C8543B847EB512302EF0A4A9D8DD8B866E16892402608BC0675D4AF371DCC39E1F0A0BD93FB58CB6BB2FDC86D82F
5,349,399 UART: [art] SIG.R = 76A5B7408CF4A1CB5C2CA1A0DF1A807F53B2CA138A57E3C319730B69985EC29C69CA5F6C0B2A612CCCD4F141FA5B3936
5,356,179 UART: [art] SIG.S = D76266CAA5EDF06B73B4DAAF9F07DC2CC372A9DA874F4F4FEAE6D02E9449BC54BE907CD3AB5681400226F9C323B9B067
5,380,406 UART: Caliptra RT
5,380,751 UART: [state] CFI Enabled
5,489,138 UART: [rt] RT listening for mailbox commands...
5,489,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,612,762 UART: [rt]cmd =0x41544d4e, len=14344
6,163,399 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,362 UART: [kat] LMS
1,170,690 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 ready_for_fw is high
1,176,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,128 UART: [idev] Erasing UDS.KEYID = 0
1,201,177 UART: [idev] Sha1 KeyId Algorithm
1,209,699 UART: [idev] --
1,210,683 UART: [ldev] ++
1,210,851 UART: [ldev] CDI.KEYID = 6
1,211,214 UART: [ldev] SUBJECT.KEYID = 5
1,211,640 UART: [ldev] AUTHORITY.KEYID = 7
1,212,103 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,288 UART: [fwproc] Recv command 0x46574c44
1,284,016 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,870 >>> mbox cmd response: success
3,321,948 UART: [afmc] ++
3,322,116 UART: [afmc] CDI.KEYID = 6
3,322,478 UART: [afmc] SUBJECT.KEYID = 7
3,322,903 UART: [afmc] AUTHORITY.KEYID = 5
3,358,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,378 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,087 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,979 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,690 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,693 UART: [afmc] --
3,401,783 UART: [cold-reset] --
3,402,663 UART: [state] Locking Datavault
3,403,984 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,588 UART: [state] Locking ICCM
3,405,204 UART: [exit] Launching FMC @ 0x40000130
3,410,533 UART:
3,410,549 UART: Running Caliptra FMC ...
3,410,957 UART:
3,411,011 UART: [state] CFI Enabled
3,421,659 UART: [fht] FMC Alias Private Key: 7
3,530,017 UART: [art] Extend RT PCRs Done
3,530,445 UART: [art] Lock RT PCRs Done
3,532,221 UART: [art] Populate DV Done
3,540,745 UART: [fht] FMC Alias Private Key: 7
3,541,811 UART: [art] Derive CDI
3,542,091 UART: [art] Store in in slot 0x4
3,627,694 UART: [art] Derive Key Pair
3,628,054 UART: [art] Store priv key in slot 0x5
3,641,540 UART: [art] Derive Key Pair - Done
3,656,143 UART: [art] Signing Cert with AUTHO
3,656,623 UART: RITY.KEYID = 7
3,671,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,642 UART: [art] PUB.X = 97E5FF2DAC4E23AA7E6426CF9CA6C6FECDEDCA4614C44641AA6BEF0B217C44C6658E583856BC5FBD3E2AFD8EFCCA87A6
3,679,443 UART: [art] PUB.Y = BE49FB133FB1FFF201EDECF079C2D4EC2EFE45A16DAB8A20C128F3DDBED87945DEBEBAAAD38C892333E479EC6325F793
3,686,422 UART: [art] SIG.R = 65B5ACC8863833A3F7EF539023F09EC648BBD81B52B0E28E6FAE76AEDC8FE9C19F89D875195AB0A1CD6F83D2FB76AAE7
3,693,214 UART: [art] SIG.S = FC17FCDC7B82893B4294B4A94988869CD4BED3F5F5F538DA6330C83A92D3F6BC56CBD5A74D1BED27F16ECF57110BC1B8
3,717,252 UART: Caliptra RT
3,717,505 UART: [state] CFI Enabled
3,825,333 UART: [rt] RT listening for mailbox commands...
3,826,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,935 UART: [rt]cmd =0x41544d4e, len=14344
4,516,925 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 ready_for_fw is high
1,060,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,675 >>> mbox cmd response: success
3,230,032 UART:
3,230,048 UART: Running Caliptra FMC ...
3,230,456 UART:
3,230,510 UART: [state] CFI Enabled
3,240,940 UART: [fht] FMC Alias Private Key: 7
3,348,282 UART: [art] Extend RT PCRs Done
3,348,710 UART: [art] Lock RT PCRs Done
3,350,544 UART: [art] Populate DV Done
3,358,812 UART: [fht] FMC Alias Private Key: 7
3,359,940 UART: [art] Derive CDI
3,360,220 UART: [art] Store in in slot 0x4
3,445,925 UART: [art] Derive Key Pair
3,446,285 UART: [art] Store priv key in slot 0x5
3,459,385 UART: [art] Derive Key Pair - Done
3,474,219 UART: [art] Signing Cert with AUTHO
3,474,699 UART: RITY.KEYID = 7
3,489,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,506 UART: [art] PUB.X = 95A177041DA276DD564DDC49D74C55F00C3E8249BBD9A5E9B9869C4307AC4246D454548872775260DEF7924A40667B6B
3,497,263 UART: [art] PUB.Y = DCC008129F0E95355C447CCC474F7BAE2EDE2C0153963F40E03F120E27E3523E9993D7CADF98E8243FD845E6822ECB54
3,504,209 UART: [art] SIG.R = 0761DB94B96A3C1F020F68E94F6E3911589C2D07E0BC1FFC0998E50E276EB734B32EDD9B7EBB1E6C1207F1636C144B1B
3,510,968 UART: [art] SIG.S = BC2350DD0DF334BA734A35FD0BDAE2B375DB0913960D5FE63D1F3DFEBC691DB328A044D3EC6DDC9AB82E43A44D0B64F5
3,535,652 UART: Caliptra RT
3,535,905 UART: [state] CFI Enabled
3,643,743 UART: [rt] RT listening for mailbox commands...
3,644,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,257 UART: [rt]cmd =0x41544d4e, len=14344
4,327,858 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,679 UART: [kat] SHA2-512-ACC
908,580 UART: [kat] ECC-384
918,837 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,764 UART: [cold-reset] ++
1,173,252 UART: [fht] FHT @ 0x50003400
1,175,833 UART: [idev] ++
1,176,001 UART: [idev] CDI.KEYID = 6
1,176,361 UART: [idev] SUBJECT.KEYID = 7
1,176,785 UART: [idev] UDS.KEYID = 0
1,177,130 ready_for_fw is high
1,177,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,053 UART: [idev] Erasing UDS.KEYID = 0
1,202,116 UART: [idev] Sha1 KeyId Algorithm
1,210,740 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,502 UART: [ldev] Erasing FE.KEYID = 1
1,245,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,188 UART: [ldev] --
1,284,525 UART: [fwproc] Wait for Commands...
1,285,149 UART: [fwproc] Recv command 0x46574c44
1,285,877 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,460 >>> mbox cmd response: success
3,318,684 UART: [afmc] ++
3,318,852 UART: [afmc] CDI.KEYID = 6
3,319,214 UART: [afmc] SUBJECT.KEYID = 7
3,319,639 UART: [afmc] AUTHORITY.KEYID = 5
3,355,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,074 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,783 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,675 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,386 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,385 UART: [afmc] --
3,399,409 UART: [cold-reset] --
3,400,185 UART: [state] Locking Datavault
3,401,128 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,732 UART: [state] Locking ICCM
3,402,250 UART: [exit] Launching FMC @ 0x40000130
3,407,579 UART:
3,407,595 UART: Running Caliptra FMC ...
3,408,003 UART:
3,408,146 UART: [state] CFI Enabled
3,418,968 UART: [fht] FMC Alias Private Key: 7
3,527,130 UART: [art] Extend RT PCRs Done
3,527,558 UART: [art] Lock RT PCRs Done
3,529,296 UART: [art] Populate DV Done
3,537,606 UART: [fht] FMC Alias Private Key: 7
3,538,662 UART: [art] Derive CDI
3,538,942 UART: [art] Store in in slot 0x4
3,624,567 UART: [art] Derive Key Pair
3,624,927 UART: [art] Store priv key in slot 0x5
3,637,733 UART: [art] Derive Key Pair - Done
3,652,352 UART: [art] Signing Cert with AUTHO
3,652,832 UART: RITY.KEYID = 7
3,668,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,005 UART: [art] PUB.X = 988CE5E4678B1321E5F1913B92920776FE7CB834DD12C0F66D94DE47FA8480F9CE3D98EBDF11F5DFA327940CAE317D73
3,675,779 UART: [art] PUB.Y = D4453071A456A94C9610A5F296660A8B9F7B5982D8608B76FC80F97F56275D66D5DBD1FA64C159ECD8E2B39FBC7C58C5
3,682,732 UART: [art] SIG.R = 4EE3B29298F015F45C539DB97E174569CF7F0AFB1915027F81A553BF5B5A83ED630474EF3B31E35A3291B57E07BDFA1A
3,689,498 UART: [art] SIG.S = 419848479A7F42B8B63126072F0EC29ACA4A1BEA650B380C0B8FC729A2F54C9EA10B9200F37DF30FAAA1885C49C0073B
3,713,103 UART: Caliptra RT
3,713,448 UART: [state] CFI Enabled
3,821,287 UART: [rt] RT listening for mailbox commands...
3,821,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,115 UART: [rt]cmd =0x41544d4e, len=14344
4,503,211 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 ready_for_fw is high
1,061,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,622 >>> mbox cmd response: success
3,236,421 UART:
3,236,437 UART: Running Caliptra FMC ...
3,236,845 UART:
3,236,988 UART: [state] CFI Enabled
3,247,980 UART: [fht] FMC Alias Private Key: 7
3,356,296 UART: [art] Extend RT PCRs Done
3,356,724 UART: [art] Lock RT PCRs Done
3,358,528 UART: [art] Populate DV Done
3,366,770 UART: [fht] FMC Alias Private Key: 7
3,367,744 UART: [art] Derive CDI
3,368,024 UART: [art] Store in in slot 0x4
3,453,905 UART: [art] Derive Key Pair
3,454,265 UART: [art] Store priv key in slot 0x5
3,467,967 UART: [art] Derive Key Pair - Done
3,482,866 UART: [art] Signing Cert with AUTHO
3,483,346 UART: RITY.KEYID = 7
3,498,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,041 UART: [art] PUB.X = 91AC1BA4D965EEBB6B99AE2EF41CA2FC82B93EC3E42D9C3BAB51007B183B8D57F5054CA7EC50A8EED4EBED9C68457B4C
3,505,816 UART: [art] PUB.Y = 748619673038E51C2433F3BB28D9CED3B353FE07C46A7D3B716BE51AFAF060D582F16C8F639F88DC368D4D51F6A3D82D
3,512,771 UART: [art] SIG.R = B9A25F16446F0896ACE65C01A8250D575D44DC52798F03CCD1968FFCE0221A0B36E4C240EE59BFBE5DCE180147282DCC
3,519,535 UART: [art] SIG.S = B2E0FECFF391A9999F9C74773D3E4607877BCB59D6084D1E4A2F436A2C4A648300BD1F0E723A5AE655D8C4D1276CF95F
3,543,837 UART: Caliptra RT
3,544,182 UART: [state] CFI Enabled
3,650,757 UART: [rt] RT listening for mailbox commands...
3,651,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,635 UART: [rt]cmd =0x41544d4e, len=14344
4,344,930 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,700 UART: [state] LifecycleState = Unprovisioned
86,355 UART: [state] DebugLocked = No
86,993 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
905,134 UART: [kat] SHA2-512-ACC
907,035 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 ready_for_fw is high
1,174,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,215 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,246 UART: [ldev] ++
1,209,414 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,205 UART: [ldev] AUTHORITY.KEYID = 7
1,210,668 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,412 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,341 UART: [fwproc] Recv command 0x46574c44
1,282,074 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,225 >>> mbox cmd response: success
3,320,446 UART: [afmc] ++
3,320,614 UART: [afmc] CDI.KEYID = 6
3,320,977 UART: [afmc] SUBJECT.KEYID = 7
3,321,403 UART: [afmc] AUTHORITY.KEYID = 5
3,357,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,528 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,238 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,128 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,839 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,669 UART: [afmc] --
3,400,681 UART: [cold-reset] --
3,401,473 UART: [state] Locking Datavault
3,402,802 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,406 UART: [state] Locking ICCM
3,403,840 UART: [exit] Launching FMC @ 0x40000130
3,409,169 UART:
3,409,185 UART: Running Caliptra FMC ...
3,409,593 UART:
3,409,647 UART: [state] CFI Enabled
3,419,815 UART: [fht] FMC Alias Private Key: 7
3,527,837 UART: [art] Extend RT PCRs Done
3,528,265 UART: [art] Lock RT PCRs Done
3,529,719 UART: [art] Populate DV Done
3,537,791 UART: [fht] FMC Alias Private Key: 7
3,538,817 UART: [art] Derive CDI
3,539,097 UART: [art] Store in in slot 0x4
3,624,412 UART: [art] Derive Key Pair
3,624,772 UART: [art] Store priv key in slot 0x5
3,638,610 UART: [art] Derive Key Pair - Done
3,653,428 UART: [art] Signing Cert with AUTHO
3,653,908 UART: RITY.KEYID = 7
3,669,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,989 UART: [art] PUB.X = 6A233A20B806C2E3652A56E613658C350A069BED371A78C2AC470D9ACF9AAF05B7ABAB83735E4F120764A89AC9B67BF0
3,676,751 UART: [art] PUB.Y = 0F2ECD89FF152C98167B1036E2FC26C4F5B385DEBF17E095E9605D33B2C12938282C428B675A2A30D4A6F5BDC6928E43
3,683,704 UART: [art] SIG.R = 0791F79BFA63EF39B7EBA28A9EE8C039EEFDE9ECCF296E93EC2FAC62BBA017CE95B72A223F0393A4B824CBCE7ACE3078
3,690,498 UART: [art] SIG.S = CB53C6020B654540A01E43D261AE5AAADDDE816849F495E77ADF2B4C835A8C63FD485531FC715FA2833FD069C4BC2DAD
3,714,483 UART: Caliptra RT
3,714,736 UART: [state] CFI Enabled
3,822,806 UART: [rt] RT listening for mailbox commands...
3,823,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,358 UART: [rt]cmd =0x41544d4e, len=14344
4,509,816 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,542 ready_for_fw is high
1,055,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,157,888 >>> mbox cmd response: success
3,219,915 UART:
3,219,931 UART: Running Caliptra FMC ...
3,220,339 UART:
3,220,393 UART: [state] CFI Enabled
3,230,851 UART: [fht] FMC Alias Private Key: 7
3,339,271 UART: [art] Extend RT PCRs Done
3,339,699 UART: [art] Lock RT PCRs Done
3,341,099 UART: [art] Populate DV Done
3,349,163 UART: [fht] FMC Alias Private Key: 7
3,350,161 UART: [art] Derive CDI
3,350,441 UART: [art] Store in in slot 0x4
3,435,900 UART: [art] Derive Key Pair
3,436,260 UART: [art] Store priv key in slot 0x5
3,449,406 UART: [art] Derive Key Pair - Done
3,464,181 UART: [art] Signing Cert with AUTHO
3,464,661 UART: RITY.KEYID = 7
3,480,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,972 UART: [art] PUB.X = C5E6E8F2E752D86D86258BCDBD9F92ED0C2871A8C25F41FD7138256A0DBD925D7BDE8AF9E83C84ADFBA06394E0339550
3,487,752 UART: [art] PUB.Y = FEAAB14C4CA7CF1439D9E57CF6D8E4FFEE981C3BC141994A7D7C55D661EA8CBE698953DB2D78A32919215B47825BC2D9
3,494,720 UART: [art] SIG.R = 279AF5B87BA12FC48ED566D666578CDC37C07C03DDFD7AB9ECA96AF96A99C5712D0DC298A7B921D8DED71153C87EC340
3,501,502 UART: [art] SIG.S = 5CA405532ED8B31A421E8A09F13AEA0963D2111B56CD4CE834C7BF2A45D75779554F8D2A7C9A26578E27BD83A8C0567E
3,525,726 UART: Caliptra RT
3,525,979 UART: [state] CFI Enabled
3,634,718 UART: [rt] RT listening for mailbox commands...
3,635,388 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,368 UART: [rt]cmd =0x41544d4e, len=14344
4,321,356 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,174,754 ready_for_fw is high
1,174,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,241,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,707 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,357 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,654 >>> mbox cmd response: success
3,324,849 UART: [afmc] ++
3,325,017 UART: [afmc] CDI.KEYID = 6
3,325,380 UART: [afmc] SUBJECT.KEYID = 7
3,325,806 UART: [afmc] AUTHORITY.KEYID = 5
3,361,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,671 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,381 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,271 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,982 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,860 UART: [afmc] --
3,404,814 UART: [cold-reset] --
3,405,706 UART: [state] Locking Datavault
3,406,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,495 UART: [state] Locking ICCM
3,408,141 UART: [exit] Launching FMC @ 0x40000130
3,413,470 UART:
3,413,486 UART: Running Caliptra FMC ...
3,413,894 UART:
3,414,037 UART: [state] CFI Enabled
3,424,871 UART: [fht] FMC Alias Private Key: 7
3,533,321 UART: [art] Extend RT PCRs Done
3,533,749 UART: [art] Lock RT PCRs Done
3,535,103 UART: [art] Populate DV Done
3,543,401 UART: [fht] FMC Alias Private Key: 7
3,544,375 UART: [art] Derive CDI
3,544,655 UART: [art] Store in in slot 0x4
3,630,520 UART: [art] Derive Key Pair
3,630,880 UART: [art] Store priv key in slot 0x5
3,644,096 UART: [art] Derive Key Pair - Done
3,658,590 UART: [art] Signing Cert with AUTHO
3,659,070 UART: RITY.KEYID = 7
3,674,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,271 UART: [art] PUB.X = 0689D419E336A3678839CD9C49F6FF859F0E0E8907CC3C90D368744CA3AF844849CA9C7A4B5DB065FF082BAC0EA20466
3,682,026 UART: [art] PUB.Y = 0E27B5A7A029B07648045AD9F8CEB2555A9E190BFB1E38F902E3C049764662BE2AAC67DAC1802FDFE5C2C4F89BBF75EA
3,688,982 UART: [art] SIG.R = CB17A118A92D2D2B0502A37143637212EDD1C09C4D17F94AF6C803CE23D62E7362650E900BF84A85F118D765460381DC
3,695,732 UART: [art] SIG.S = DA5592BBC3D4FA7446B755D08FA6E167801A779E307614B67A9491E9920ED388A63DED9C7DF40454B1A6E2E3259465C3
3,719,523 UART: Caliptra RT
3,719,868 UART: [state] CFI Enabled
3,827,201 UART: [rt] RT listening for mailbox commands...
3,827,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,009 UART: [rt]cmd =0x41544d4e, len=14344
4,509,239 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,031 ready_for_fw is high
1,057,031 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,527 >>> mbox cmd response: success
3,231,856 UART:
3,231,872 UART: Running Caliptra FMC ...
3,232,280 UART:
3,232,423 UART: [state] CFI Enabled
3,242,795 UART: [fht] FMC Alias Private Key: 7
3,350,541 UART: [art] Extend RT PCRs Done
3,350,969 UART: [art] Lock RT PCRs Done
3,352,545 UART: [art] Populate DV Done
3,360,845 UART: [fht] FMC Alias Private Key: 7
3,361,969 UART: [art] Derive CDI
3,362,249 UART: [art] Store in in slot 0x4
3,447,504 UART: [art] Derive Key Pair
3,447,864 UART: [art] Store priv key in slot 0x5
3,461,376 UART: [art] Derive Key Pair - Done
3,476,070 UART: [art] Signing Cert with AUTHO
3,476,550 UART: RITY.KEYID = 7
3,491,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,737 UART: [art] PUB.X = 3237341776890714F0AED50B1864F8A919CF83E99C59BCF5D7B166A5FA388566BD1F831BD90E0E71BB90BEE4E5F91117
3,499,499 UART: [art] PUB.Y = 2BB99CC14DF7902C71F1F5BCF2571DB8AF8BA60252A78B1DA70861A9730C908D81549CF8EB70B1810217619FAB25232F
3,506,443 UART: [art] SIG.R = A5205D3D0AEA6B573398AFF52898956556D6AC9C042C164B71F48A1ED349EB3BFCBF9A81814D331FC86934767478A8A4
3,513,211 UART: [art] SIG.S = E597F850B8CD024559BAFCA7D0698D779606482F60BA9136F38443E6D26B053C43BCA8B8D8BF102979E1C8B15CD20102
3,537,079 UART: Caliptra RT
3,537,424 UART: [state] CFI Enabled
3,644,977 UART: [rt] RT listening for mailbox commands...
3,645,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,093 UART: [rt]cmd =0x41544d4e, len=14344
4,334,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,121 UART: [kat] SHA2-256
882,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,167 UART: [kat] ++
886,319 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,723 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,479,738 UART: [idev] ++
1,479,906 UART: [idev] CDI.KEYID = 6
1,480,266 UART: [idev] SUBJECT.KEYID = 7
1,480,690 UART: [idev] UDS.KEYID = 0
1,481,035 ready_for_fw is high
1,481,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,328 UART: [idev] Erasing UDS.KEYID = 0
1,504,936 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,728 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,335 UART: [ldev] Erasing FE.KEYID = 1
1,546,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,762 UART: [ldev] --
1,585,207 UART: [fwproc] Waiting for Commands...
1,585,862 UART: [fwproc] Received command 0x46574c44
1,586,653 UART: [fwproc] Received Image of size 114332 bytes
5,082,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,276,008 >>> mbox cmd response: success
5,277,252 UART: [afmc] ++
5,277,420 UART: [afmc] CDI.KEYID = 6
5,277,782 UART: [afmc] SUBJECT.KEYID = 7
5,278,207 UART: [afmc] AUTHORITY.KEYID = 5
5,313,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,329,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,330,101 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,810 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,702 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,347,403 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,355,115 UART: [afmc] --
5,356,141 UART: [cold-reset] --
5,356,887 UART: [state] Locking Datavault
5,357,864 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,468 UART: [state] Locking ICCM
5,358,960 UART: [exit] Launching FMC @ 0x40000130
5,364,289 UART:
5,364,305 UART: Running Caliptra FMC ...
5,364,713 UART:
5,364,767 UART: [state] CFI Enabled
5,375,159 UART: [fht] FMC Alias Private Key: 7
5,483,951 UART: [art] Extend RT PCRs Done
5,484,379 UART: [art] Lock RT PCRs Done
5,485,829 UART: [art] Populate DV Done
5,493,909 UART: [fht] FMC Alias Private Key: 7
5,494,943 UART: [art] Derive CDI
5,495,223 UART: [art] Store in in slot 0x4
5,580,848 UART: [art] Derive Key Pair
5,581,208 UART: [art] Store priv key in slot 0x5
5,594,212 UART: [art] Derive Key Pair - Done
5,609,018 UART: [art] Signing Cert with AUTHO
5,609,498 UART: RITY.KEYID = 7
5,624,672 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,437 UART: [art] PUB.X = B0459F161842F4D3B4F478084F5E55DC9ADA8DDAE5601AB3A804B49CD1A58EDB10E28A3C62DF64AE3BE6BF9BD9B786D2
5,632,223 UART: [art] PUB.Y = 5817994246A5257D6BDA952C616C5F3A1B9CBBE13EB7F649470F7E77E1B8B9AFB12272FF251D59959C7F8A20E6D0D9D7
5,639,178 UART: [art] SIG.R = A9E220FA0EF5C6F91FB67342096D1A8EBF190439134B08D3EC32A6F07E381640AB47BB2BF70F26F507485F55BB7143D7
5,645,936 UART: [art] SIG.S = 700AABFF7B36AD1B03536E54F1AE2D030CDE30850A489E223FBFE26C07A38754F11899B6303F9F683639DBC1BB6198F9
5,669,681 UART: Caliptra RT
5,669,934 UART: [state] CFI Enabled
5,778,453 UART: [rt] RT listening for mailbox commands...
5,779,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,145 UART: [rt]cmd =0x41544d4e, len=14344
6,465,753 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,083 ready_for_fw is high
1,362,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,050,780 >>> mbox cmd response: success
5,112,627 UART:
5,112,643 UART: Running Caliptra FMC ...
5,113,051 UART:
5,113,105 UART: [state] CFI Enabled
5,123,461 UART: [fht] FMC Alias Private Key: 7
5,231,339 UART: [art] Extend RT PCRs Done
5,231,767 UART: [art] Lock RT PCRs Done
5,233,155 UART: [art] Populate DV Done
5,241,271 UART: [fht] FMC Alias Private Key: 7
5,242,283 UART: [art] Derive CDI
5,242,563 UART: [art] Store in in slot 0x4
5,328,098 UART: [art] Derive Key Pair
5,328,458 UART: [art] Store priv key in slot 0x5
5,341,426 UART: [art] Derive Key Pair - Done
5,356,502 UART: [art] Signing Cert with AUTHO
5,356,982 UART: RITY.KEYID = 7
5,372,118 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,883 UART: [art] PUB.X = D60862A15144738262DF80DC76F9C2B86E2DF8CF22EBA85F4EA4B2789A2EC0DD73D0343DD24D58DF49A7D77F410E569A
5,379,659 UART: [art] PUB.Y = 21C1951321602BAB0F02614DD83DB88F55AF1395392FD26BC952EE64FA860858D32D6B9F2FE4387180B4963CDA296CC7
5,386,602 UART: [art] SIG.R = 010DA85C3E56BAF965B4D724DC8F4296F4F8ECD73BE842FC1772A545F21C712C4AB8D26C69CBC8143219F160FE6B4AA4
5,393,380 UART: [art] SIG.S = 21E9255D64264FA85E4DAD6E54A83324CA0AC1BDC40DF9A536F85CAFAFE286B142389A9FF55C1F8564FAF64EC7743DD1
5,417,457 UART: Caliptra RT
5,417,710 UART: [state] CFI Enabled
5,525,644 UART: [rt] RT listening for mailbox commands...
5,526,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,262 UART: [rt]cmd =0x41544d4e, len=14344
6,212,578 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,719 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,908 UART: [fht] Storing FHT @ 0x50003400
1,479,721 UART: [idev] ++
1,479,889 UART: [idev] CDI.KEYID = 6
1,480,249 UART: [idev] SUBJECT.KEYID = 7
1,480,673 UART: [idev] UDS.KEYID = 0
1,481,018 ready_for_fw is high
1,481,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,665 UART: [idev] Erasing UDS.KEYID = 0
1,505,637 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,522,202 UART: [ldev] Erasing FE.KEYID = 1
1,547,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,401 UART: [fwproc] Received command 0x46574c44
1,588,192 UART: [fwproc] Received Image of size 114332 bytes
5,083,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,111,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,276,545 >>> mbox cmd response: success
5,277,559 UART: [afmc] ++
5,277,727 UART: [afmc] CDI.KEYID = 6
5,278,089 UART: [afmc] SUBJECT.KEYID = 7
5,278,514 UART: [afmc] AUTHORITY.KEYID = 5
5,314,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,330,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,331,174 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,336,883 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,342,775 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,348,476 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,356,388 UART: [afmc] --
5,357,456 UART: [cold-reset] --
5,358,140 UART: [state] Locking Datavault
5,359,205 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,809 UART: [state] Locking ICCM
5,360,387 UART: [exit] Launching FMC @ 0x40000130
5,365,716 UART:
5,365,732 UART: Running Caliptra FMC ...
5,366,140 UART:
5,366,283 UART: [state] CFI Enabled
5,377,039 UART: [fht] FMC Alias Private Key: 7
5,484,819 UART: [art] Extend RT PCRs Done
5,485,247 UART: [art] Lock RT PCRs Done
5,486,827 UART: [art] Populate DV Done
5,494,891 UART: [fht] FMC Alias Private Key: 7
5,496,029 UART: [art] Derive CDI
5,496,309 UART: [art] Store in in slot 0x4
5,581,888 UART: [art] Derive Key Pair
5,582,248 UART: [art] Store priv key in slot 0x5
5,595,676 UART: [art] Derive Key Pair - Done
5,610,313 UART: [art] Signing Cert with AUTHO
5,610,793 UART: RITY.KEYID = 7
5,625,863 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,628 UART: [art] PUB.X = 716A4735CE397462F775080581612F9FCBC25AAC7DC7DD7E83124EE337BD59DB432A4711237453CDE72D47F797EAB298
5,633,394 UART: [art] PUB.Y = BC2CC7816D322A4F483D5C320171610CE6DBE4B417F218B8A48E8E8C5A8B30226D44DE539DA0562D301E41DA90AE0776
5,640,341 UART: [art] SIG.R = BFE72BD67D95D2719C0D862FDC4057459DC4D6832173C92F0C770A13C0FA31C55677E58D9858387C4552E148D4245A27
5,647,098 UART: [art] SIG.S = 66F28E3D19124AF0905CD19318C98889A215B8D040CCAFCE53E7C4FB20B2FC8BE867FC8ED58FD4C60E389C0B3BC61582
5,670,519 UART: Caliptra RT
5,670,864 UART: [state] CFI Enabled
5,778,667 UART: [rt] RT listening for mailbox commands...
5,779,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,267 UART: [rt]cmd =0x41544d4e, len=14344
6,460,569 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 ready_for_fw is high
1,363,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,126,633 >>> mbox cmd response: success
5,188,618 UART:
5,188,634 UART: Running Caliptra FMC ...
5,189,042 UART:
5,189,185 UART: [state] CFI Enabled
5,199,973 UART: [fht] FMC Alias Private Key: 7
5,307,647 UART: [art] Extend RT PCRs Done
5,308,075 UART: [art] Lock RT PCRs Done
5,309,503 UART: [art] Populate DV Done
5,317,785 UART: [fht] FMC Alias Private Key: 7
5,318,965 UART: [art] Derive CDI
5,319,245 UART: [art] Store in in slot 0x4
5,404,930 UART: [art] Derive Key Pair
5,405,290 UART: [art] Store priv key in slot 0x5
5,418,892 UART: [art] Derive Key Pair - Done
5,433,730 UART: [art] Signing Cert with AUTHO
5,434,210 UART: RITY.KEYID = 7
5,449,314 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,079 UART: [art] PUB.X = AC20455370E5BA2311F31843A22A84CF9D2D9002F7FD859C58348680590CAAB6279106621C8B982FA8BEA6836A8C58B5
5,456,838 UART: [art] PUB.Y = 9103319881CB35664ED9A425C3635BBF8B45F9683EE205A486A78A624A584ED1C0187385E4327ED71BAA4CDDA7B01FB0
5,463,786 UART: [art] SIG.R = 4C11580743AAE5380A61E7ECFD2F213F3DD2F414212E92A7463A6EE5D87E5EC8E07A0F1B4CC8F462D4CD1D437318E871
5,470,557 UART: [art] SIG.S = 98AEBC0B95EDAB5DEA7FA831024E18F3273BC110860AA4A7491D0171B605FB7001B819D93561D5C25E4428FDCACB1F56
5,494,222 UART: Caliptra RT
5,494,567 UART: [state] CFI Enabled
5,602,466 UART: [rt] RT listening for mailbox commands...
5,603,136 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,725,930 UART: [rt]cmd =0x41544d4e, len=14344
6,291,073 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,719 UART: [kat] SHA2-256
903,659 UART: [kat] SHA2-384
906,502 UART: [kat] SHA2-512-ACC
908,403 UART: [kat] ECC-384
917,904 UART: [kat] HMAC-384Kdf
922,362 UART: [kat] LMS
1,170,690 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,820 UART: [idev] ++
1,174,988 UART: [idev] CDI.KEYID = 6
1,175,348 UART: [idev] SUBJECT.KEYID = 7
1,175,772 UART: [idev] UDS.KEYID = 0
1,176,117 ready_for_fw is high
1,176,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,152 UART: [idev] Erasing UDS.KEYID = 0
1,201,403 UART: [idev] Sha1 KeyId Algorithm
1,209,795 UART: [idev] --
1,210,785 UART: [ldev] ++
1,210,953 UART: [ldev] CDI.KEYID = 6
1,211,316 UART: [ldev] SUBJECT.KEYID = 5
1,211,742 UART: [ldev] AUTHORITY.KEYID = 7
1,212,205 UART: [ldev] FE.KEYID = 1
1,217,653 UART: [ldev] Erasing FE.KEYID = 1
1,244,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,733 UART: [ldev] --
1,284,086 UART: [fwproc] Wait for Commands...
1,284,658 UART: [fwproc] Recv command 0x46574c44
1,285,386 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,226 >>> mbox cmd response: success
3,319,406 UART: [afmc] ++
3,319,574 UART: [afmc] CDI.KEYID = 6
3,319,936 UART: [afmc] SUBJECT.KEYID = 7
3,320,361 UART: [afmc] AUTHORITY.KEYID = 5
3,355,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,230 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,939 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,831 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,542 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,335 UART: [afmc] --
3,399,431 UART: [cold-reset] --
3,400,423 UART: [state] Locking Datavault
3,401,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,354 UART: [state] Locking ICCM
3,402,908 UART: [exit] Launching FMC @ 0x40000130
3,408,237 UART:
3,408,253 UART: Running Caliptra FMC ...
3,408,661 UART:
3,408,715 UART: [state] CFI Enabled
3,419,501 UART: [fht] FMC Alias Private Key: 7
3,527,335 UART: [art] Extend RT PCRs Done
3,527,763 UART: [art] Lock RT PCRs Done
3,529,263 UART: [art] Populate DV Done
3,537,605 UART: [fht] FMC Alias Private Key: 7
3,538,717 UART: [art] Derive CDI
3,538,997 UART: [art] Store in in slot 0x4
3,624,446 UART: [art] Derive Key Pair
3,624,806 UART: [art] Store priv key in slot 0x5
3,638,284 UART: [art] Derive Key Pair - Done
3,652,953 UART: [art] Signing Cert with AUTHO
3,653,433 UART: RITY.KEYID = 7
3,668,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,214 UART: [art] PUB.X = 0244DB32687F281B2F5AF69A518DCB0C6BA469D7A0D754E5D1E0936016DB2D65F6C76595C09AB9E7C515ECEF11BB3729
3,675,988 UART: [art] PUB.Y = EFC4AB6C12411562588969C5D4D6F62169B9E6E551A164719C03E87EFBECE7227A4C724883D43C3F2166DA215C15F968
3,682,935 UART: [art] SIG.R = C085667A93C7D4A5964080469222DFDA3E3705988E9CD648C3397012CA2620F39E62F8077098F7206D0021096C2B2C79
3,689,660 UART: [art] SIG.S = DFDB6F3DB22FD94400F8A28346F7ADF29530B18828BFFBFABC95CB09DC7F5E99601394647DCAA9CD5941C6F79CEB48DA
3,713,140 UART: Caliptra RT
3,713,393 UART: [state] CFI Enabled
3,821,628 UART: [rt] RT listening for mailbox commands...
3,822,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,390 UART: [rt]cmd =0x41544d4e, len=14344
4,499,008 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,593 ready_for_fw is high
1,060,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,285 >>> mbox cmd response: success
3,236,510 UART:
3,236,526 UART: Running Caliptra FMC ...
3,236,934 UART:
3,236,988 UART: [state] CFI Enabled
3,247,596 UART: [fht] FMC Alias Private Key: 7
3,355,404 UART: [art] Extend RT PCRs Done
3,355,832 UART: [art] Lock RT PCRs Done
3,357,296 UART: [art] Populate DV Done
3,365,432 UART: [fht] FMC Alias Private Key: 7
3,366,374 UART: [art] Derive CDI
3,366,654 UART: [art] Store in in slot 0x4
3,452,493 UART: [art] Derive Key Pair
3,452,853 UART: [art] Store priv key in slot 0x5
3,465,783 UART: [art] Derive Key Pair - Done
3,480,943 UART: [art] Signing Cert with AUTHO
3,481,423 UART: RITY.KEYID = 7
3,496,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,752 UART: [art] PUB.X = 819A6C860FEEF94FA7970176898EE048A651C34501D4E22C69536BBEE7C9127ED0550B5814120B129D5C8872D3A6AC74
3,504,505 UART: [art] PUB.Y = 767F7119CF043DE1D43EC83F4D7DAC9F35812B502A0A0507F7653E60B3654885B6DE907B323CC7F6CFFD6FAAA5A795F9
3,511,455 UART: [art] SIG.R = 9778DA2F024E9FA4A78C8E5A36007784384812069D9682E2BB46CEC9C766AD7084FBBF3B518573092F7CA718A94CC662
3,518,194 UART: [art] SIG.S = E4CFA082696E8F40F929CCF5020EE0B49E07B3525458D2ECD4457BAF6B7E4271D3412A83861376D16A42067E5CCEE86A
3,541,605 UART: Caliptra RT
3,541,858 UART: [state] CFI Enabled
3,648,733 UART: [rt] RT listening for mailbox commands...
3,649,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,797 UART: [rt]cmd =0x41544d4e, len=14344
4,336,069 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,563 UART: [kat] SHA2-512-ACC
908,464 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,766 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,247 UART: [idev] Erasing UDS.KEYID = 0
1,201,210 UART: [idev] Sha1 KeyId Algorithm
1,209,650 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,232 UART: [ldev] Erasing FE.KEYID = 1
1,243,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,158 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,167 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,528 >>> mbox cmd response: success
3,324,554 UART: [afmc] ++
3,324,722 UART: [afmc] CDI.KEYID = 6
3,325,084 UART: [afmc] SUBJECT.KEYID = 7
3,325,509 UART: [afmc] AUTHORITY.KEYID = 5
3,361,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,598 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,307 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,199 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,910 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,611 UART: [afmc] --
3,404,739 UART: [cold-reset] --
3,405,509 UART: [state] Locking Datavault
3,406,612 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,216 UART: [state] Locking ICCM
3,407,758 UART: [exit] Launching FMC @ 0x40000130
3,413,087 UART:
3,413,103 UART: Running Caliptra FMC ...
3,413,511 UART:
3,413,654 UART: [state] CFI Enabled
3,424,508 UART: [fht] FMC Alias Private Key: 7
3,533,130 UART: [art] Extend RT PCRs Done
3,533,558 UART: [art] Lock RT PCRs Done
3,534,902 UART: [art] Populate DV Done
3,542,940 UART: [fht] FMC Alias Private Key: 7
3,543,918 UART: [art] Derive CDI
3,544,198 UART: [art] Store in in slot 0x4
3,629,877 UART: [art] Derive Key Pair
3,630,237 UART: [art] Store priv key in slot 0x5
3,643,953 UART: [art] Derive Key Pair - Done
3,659,062 UART: [art] Signing Cert with AUTHO
3,659,542 UART: RITY.KEYID = 7
3,674,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,179 UART: [art] PUB.X = F1FBFE1C12E50C72B2AE541EFC9F066CDE91F1B39D5D448D38FEC5D10B21F53538126F64E32F1A82C01C2309C9663E8C
3,681,951 UART: [art] PUB.Y = EA13BABAA92DE12CA54998D6D3B8FEC6C79755C29AB548ED3E321D7B5C0F1EB482BC6F76C667BA0BA9D7A872BEF52FC8
3,688,923 UART: [art] SIG.R = 7FC2A7BACD865B82BA3DEB218796C12A0D7236F29AE3DE94B231743D9727F85B134ABB8532BB1A67F903508FFC06D9D5
3,695,696 UART: [art] SIG.S = 6DCA3C9EF81A751F3662A509C09F5D83ED19757FAB7710DCD313960BBC4447E5EFCF3962A02D7A9A623F345CCF8D882F
3,719,767 UART: Caliptra RT
3,720,112 UART: [state] CFI Enabled
3,828,897 UART: [rt] RT listening for mailbox commands...
3,829,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,879 UART: [rt]cmd =0x41544d4e, len=14344
4,516,151 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 ready_for_fw is high
1,060,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,404 >>> mbox cmd response: success
3,232,231 UART:
3,232,247 UART: Running Caliptra FMC ...
3,232,655 UART:
3,232,798 UART: [state] CFI Enabled
3,243,446 UART: [fht] FMC Alias Private Key: 7
3,350,734 UART: [art] Extend RT PCRs Done
3,351,162 UART: [art] Lock RT PCRs Done
3,352,644 UART: [art] Populate DV Done
3,361,022 UART: [fht] FMC Alias Private Key: 7
3,362,130 UART: [art] Derive CDI
3,362,410 UART: [art] Store in in slot 0x4
3,448,333 UART: [art] Derive Key Pair
3,448,693 UART: [art] Store priv key in slot 0x5
3,461,919 UART: [art] Derive Key Pair - Done
3,476,583 UART: [art] Signing Cert with AUTHO
3,477,063 UART: RITY.KEYID = 7
3,492,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,078 UART: [art] PUB.X = D026A872E9DE304ACDAE656435F81E0F3298B6BF3C1FDA3F97806E20F74AF36681788207DF2B53B628F340C361F77C61
3,499,846 UART: [art] PUB.Y = 19017A1D3CFD45B8122B43A85C7E787A153E4290015378F4347F5186143D11F99B561CB37A0397216FC30C714081EAFB
3,506,776 UART: [art] SIG.R = CDC87A2B22FAD3885FC2D0991E0E7B622D0A8EE3415FAD8DEB2C4F9948FF87BC2F0EE18B992538B66A239F8217203FC0
3,513,553 UART: [art] SIG.S = 5D2BF7F6B5EB2FF96CC0758BB869550CF6D63D145CFF513204ADCB23E02619B48E9670F8E830D050E52C3A9B77D394E3
3,537,396 UART: Caliptra RT
3,537,741 UART: [state] CFI Enabled
3,645,773 UART: [rt] RT listening for mailbox commands...
3,646,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,599 UART: [rt]cmd =0x41544d4e, len=14344
4,327,393 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,684 UART: [state] LifecycleState = Unprovisioned
86,339 UART: [state] DebugLocked = No
86,947 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,759 UART: [kat] ++
895,911 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
917,090 UART: [kat] HMAC-384Kdf
921,664 UART: [kat] LMS
1,169,976 UART: [kat] --
1,170,963 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,174,239 UART: [idev] ++
1,174,407 UART: [idev] CDI.KEYID = 6
1,174,768 UART: [idev] SUBJECT.KEYID = 7
1,175,193 UART: [idev] UDS.KEYID = 0
1,175,539 ready_for_fw is high
1,175,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,037 UART: [idev] Erasing UDS.KEYID = 0
1,200,101 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,210,078 UART: [ldev] ++
1,210,246 UART: [ldev] CDI.KEYID = 6
1,210,610 UART: [ldev] SUBJECT.KEYID = 5
1,211,037 UART: [ldev] AUTHORITY.KEYID = 7
1,211,500 UART: [ldev] FE.KEYID = 1
1,216,814 UART: [ldev] Erasing FE.KEYID = 1
1,243,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,092 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,109 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 114332 bytes
3,115,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,310,130 >>> mbox cmd response: success
3,311,189 UART: [afmc] ++
3,311,357 UART: [afmc] CDI.KEYID = 6
3,311,720 UART: [afmc] SUBJECT.KEYID = 7
3,312,146 UART: [afmc] AUTHORITY.KEYID = 5
3,347,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,759 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,469 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,359 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,070 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,916 UART: [afmc] --
3,389,944 UART: [cold-reset] --
3,390,728 UART: [state] Locking Datavault
3,391,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,555 UART: [state] Locking ICCM
3,393,127 UART: [exit] Launching FMC @ 0x40000130
3,398,456 UART:
3,398,472 UART: Running Caliptra FMC ...
3,398,880 UART:
3,398,934 UART: [state] CFI Enabled
3,409,652 UART: [fht] FMC Alias Private Key: 7
3,517,018 UART: [art] Extend RT PCRs Done
3,517,446 UART: [art] Lock RT PCRs Done
3,519,310 UART: [art] Populate DV Done
3,527,496 UART: [fht] FMC Alias Private Key: 7
3,528,458 UART: [art] Derive CDI
3,528,738 UART: [art] Store in in slot 0x4
3,614,181 UART: [art] Derive Key Pair
3,614,541 UART: [art] Store priv key in slot 0x5
3,627,907 UART: [art] Derive Key Pair - Done
3,642,782 UART: [art] Signing Cert with AUTHO
3,643,262 UART: RITY.KEYID = 7
3,658,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,827 UART: [art] PUB.X = E924EE76899A9A90FD8594CFBD8BF7978F583745430323D5974A5C63B940B2DF8498C77D91449183441D035D1745B834
3,665,581 UART: [art] PUB.Y = 9551C58AD7E736B144DCBCCA6E0C18C6D906C5506CD3F9290A50C3657C66548C3C6A4318769BA0A996C02197A737AEFD
3,672,528 UART: [art] SIG.R = 9F30095018CF1D6497E61D1E976CA89925804D76496C5C1CCB5D6F569F4495FC6CE8013A73C687CBDD4D6E8AE38B2DF4
3,679,300 UART: [art] SIG.S = F45DD31CDC6EE60DA6CA14C1C98AD57AA301EA963046FBE5F47E0F347CC6149407442FD1C3DBAC2C3124B59C5597E60A
3,703,814 UART: Caliptra RT
3,704,067 UART: [state] CFI Enabled
3,812,624 UART: [rt] RT listening for mailbox commands...
3,813,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,136 UART: [rt]cmd =0x41544d4e, len=14344
4,487,205 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,988 ready_for_fw is high
1,055,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,183,062 >>> mbox cmd response: success
3,244,991 UART:
3,245,007 UART: Running Caliptra FMC ...
3,245,415 UART:
3,245,469 UART: [state] CFI Enabled
3,255,765 UART: [fht] FMC Alias Private Key: 7
3,364,305 UART: [art] Extend RT PCRs Done
3,364,733 UART: [art] Lock RT PCRs Done
3,366,445 UART: [art] Populate DV Done
3,374,889 UART: [fht] FMC Alias Private Key: 7
3,376,019 UART: [art] Derive CDI
3,376,299 UART: [art] Store in in slot 0x4
3,461,846 UART: [art] Derive Key Pair
3,462,206 UART: [art] Store priv key in slot 0x5
3,476,062 UART: [art] Derive Key Pair - Done
3,490,933 UART: [art] Signing Cert with AUTHO
3,491,413 UART: RITY.KEYID = 7
3,506,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,498 UART: [art] PUB.X = 3E4D551185F0FC3C77498385D4063CBE284C4D178D3CC75C3C14F23794BD13D7CECFAB5C5B1ADF1B94FFC6D021C2A557
3,514,281 UART: [art] PUB.Y = A856F2E5EDDA89D3060F81EAF0651F6B54DCB31172D3D1E89CB0564B48BF1C518CF1BCC858670651D5FDB746ADFF81E8
3,521,240 UART: [art] SIG.R = 5B879118050D9072DCDF85F83F9D24F9B760422083D2555FAFEA7D3AF2C28A618888863DDC51C0AA04DA0E8A2222C097
3,528,002 UART: [art] SIG.S = 6D5F98921D20AED4F20755888DDE30BFAA256A38E7C6B2A1686D6E9A764168638F98090990D6318342FD37B74F572A9D
3,551,700 UART: Caliptra RT
3,551,953 UART: [state] CFI Enabled
3,659,294 UART: [rt] RT listening for mailbox commands...
3,659,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,082 UART: [rt]cmd =0x41544d4e, len=14344
4,343,873 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,228 UART: [state] WD Timer not started. Device not locked for debugging
88,441 UART: [kat] SHA2-256
891,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,120 UART: [kat] ++
896,272 UART: [kat] sha1
900,738 UART: [kat] SHA2-256
902,678 UART: [kat] SHA2-384
905,345 UART: [kat] SHA2-512-ACC
907,246 UART: [kat] ECC-384
916,893 UART: [kat] HMAC-384Kdf
921,693 UART: [kat] LMS
1,170,005 UART: [kat] --
1,170,908 UART: [cold-reset] ++
1,171,452 UART: [fht] FHT @ 0x50003400
1,174,180 UART: [idev] ++
1,174,348 UART: [idev] CDI.KEYID = 6
1,174,709 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,175,480 ready_for_fw is high
1,175,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,334 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,341 UART: [ldev] ++
1,210,509 UART: [ldev] CDI.KEYID = 6
1,210,873 UART: [ldev] SUBJECT.KEYID = 5
1,211,300 UART: [ldev] AUTHORITY.KEYID = 7
1,211,763 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,836 >>> mbox cmd response: success
3,319,955 UART: [afmc] ++
3,320,123 UART: [afmc] CDI.KEYID = 6
3,320,486 UART: [afmc] SUBJECT.KEYID = 7
3,320,912 UART: [afmc] AUTHORITY.KEYID = 5
3,356,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,545 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,255 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,145 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,856 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,724 UART: [afmc] --
3,399,816 UART: [cold-reset] --
3,400,636 UART: [state] Locking Datavault
3,401,991 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,595 UART: [state] Locking ICCM
3,403,039 UART: [exit] Launching FMC @ 0x40000130
3,408,368 UART:
3,408,384 UART: Running Caliptra FMC ...
3,408,792 UART:
3,408,935 UART: [state] CFI Enabled
3,419,371 UART: [fht] FMC Alias Private Key: 7
3,527,897 UART: [art] Extend RT PCRs Done
3,528,325 UART: [art] Lock RT PCRs Done
3,530,077 UART: [art] Populate DV Done
3,538,343 UART: [fht] FMC Alias Private Key: 7
3,539,479 UART: [art] Derive CDI
3,539,759 UART: [art] Store in in slot 0x4
3,625,440 UART: [art] Derive Key Pair
3,625,800 UART: [art] Store priv key in slot 0x5
3,639,072 UART: [art] Derive Key Pair - Done
3,653,757 UART: [art] Signing Cert with AUTHO
3,654,237 UART: RITY.KEYID = 7
3,669,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,696 UART: [art] PUB.X = 6B147011523279F47DBE8170D3829B4C682B3A00B1012DF2326B7E079283BF992865070A64F0D0CFE8BC6F002D9445F5
3,677,404 UART: [art] PUB.Y = F2249A72AD8DF0DBD7AE88D50BCD284355634FDA9895AE2C9E3C75389B02F17319BC0DF63BCCE510D6B5C63F4A473406
3,684,356 UART: [art] SIG.R = B226BDD75739774EDEDD740A0A10C229C3B99B0FA65B1795C55F3E42E57BBD7D878804F11A663CF028A6F64D1B0843FA
3,691,121 UART: [art] SIG.S = B495B3C68AF4865EE02B1ACF89F47ECB01248AC74292FD34FC6C19F6F8890E7B5716F7343CD2E342A9A6976C9F269EA7
3,715,038 UART: Caliptra RT
3,715,383 UART: [state] CFI Enabled
3,823,432 UART: [rt] RT listening for mailbox commands...
3,824,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,846 UART: [rt]cmd =0x41544d4e, len=14344
4,505,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,825 ready_for_fw is high
1,055,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,735 >>> mbox cmd response: success
3,230,634 UART:
3,230,650 UART: Running Caliptra FMC ...
3,231,058 UART:
3,231,201 UART: [state] CFI Enabled
3,242,079 UART: [fht] FMC Alias Private Key: 7
3,350,347 UART: [art] Extend RT PCRs Done
3,350,775 UART: [art] Lock RT PCRs Done
3,352,253 UART: [art] Populate DV Done
3,360,479 UART: [fht] FMC Alias Private Key: 7
3,361,545 UART: [art] Derive CDI
3,361,825 UART: [art] Store in in slot 0x4
3,447,572 UART: [art] Derive Key Pair
3,447,932 UART: [art] Store priv key in slot 0x5
3,461,124 UART: [art] Derive Key Pair - Done
3,476,431 UART: [art] Signing Cert with AUTHO
3,476,911 UART: RITY.KEYID = 7
3,492,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,818 UART: [art] PUB.X = BCE92112B15613A575E5AA01DB9A103607C374E268FEC8EF7DB9AFB72C404F2C6941E519C6F62E5B471D867C2D7BBB7D
3,499,596 UART: [art] PUB.Y = 6F464266B16AD54CDCA026279B7921D3BAC4FD4A77665341BAFD8EE908A275484DD5E30B24DC929D5F764CA1F81F76A0
3,506,550 UART: [art] SIG.R = 4E27E1385D2E763B79E2C19524176C7672DCD6DF10A51271E569069D67B123B1325636A66429ED0A18A824020F4DADF0
3,513,302 UART: [art] SIG.S = 76AF5DF7AC2E7505CFDF9B7EA6155B39D54918AD42CFA26BB917493180B582D347C0307842E8891806903E6979EB3E49
3,537,055 UART: Caliptra RT
3,537,400 UART: [state] CFI Enabled
3,644,363 UART: [rt] RT listening for mailbox commands...
3,645,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,099 UART: [rt]cmd =0x41544d4e, len=14344
4,333,500 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,376 UART: [kat] SHA2-512-ACC
897,277 UART: [kat] ECC-384
903,078 UART: [kat] HMAC-384Kdf
907,870 UART: [kat] LMS
1,476,066 UART: [kat] --
1,477,073 UART: [cold-reset] ++
1,477,453 UART: [fht] Storing FHT @ 0x50003400
1,480,486 UART: [idev] ++
1,480,654 UART: [idev] CDI.KEYID = 6
1,481,014 UART: [idev] SUBJECT.KEYID = 7
1,481,438 UART: [idev] UDS.KEYID = 0
1,481,783 ready_for_fw is high
1,481,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,522 UART: [idev] Erasing UDS.KEYID = 0
1,506,258 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,702 UART: [idev] --
1,515,877 UART: [ldev] ++
1,516,045 UART: [ldev] CDI.KEYID = 6
1,516,408 UART: [ldev] SUBJECT.KEYID = 5
1,516,834 UART: [ldev] AUTHORITY.KEYID = 7
1,517,297 UART: [ldev] FE.KEYID = 1
1,522,433 UART: [ldev] Erasing FE.KEYID = 1
1,547,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,506 UART: [ldev] --
1,586,793 UART: [fwproc] Waiting for Commands...
1,587,492 UART: [fwproc] Received command 0x46574c44
1,588,283 UART: [fwproc] Received Image of size 114332 bytes
5,083,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,997 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,276,280 >>> mbox cmd response: success
5,277,306 UART: [afmc] ++
5,277,474 UART: [afmc] CDI.KEYID = 6
5,277,836 UART: [afmc] SUBJECT.KEYID = 7
5,278,261 UART: [afmc] AUTHORITY.KEYID = 5
5,312,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,673 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,382 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,274 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,975 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,841 UART: [afmc] --
5,355,765 UART: [cold-reset] --
5,356,723 UART: [state] Locking Datavault
5,357,912 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,516 UART: [state] Locking ICCM
5,359,010 UART: [exit] Launching FMC @ 0x40000130
5,364,339 UART:
5,364,355 UART: Running Caliptra FMC ...
5,364,763 UART:
5,364,817 UART: [state] CFI Enabled
5,375,443 UART: [fht] FMC Alias Private Key: 7
5,483,037 UART: [art] Extend RT PCRs Done
5,483,465 UART: [art] Lock RT PCRs Done
5,485,413 UART: [art] Populate DV Done
5,493,569 UART: [fht] FMC Alias Private Key: 7
5,494,671 UART: [art] Derive CDI
5,494,951 UART: [art] Store in in slot 0x4
5,580,484 UART: [art] Derive Key Pair
5,580,844 UART: [art] Store priv key in slot 0x5
5,593,990 UART: [art] Derive Key Pair - Done
5,608,626 UART: [art] Signing Cert with AUTHO
5,609,106 UART: RITY.KEYID = 7
5,624,474 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,239 UART: [art] PUB.X = A23EEBFC5493F6585278B9328B4B6993ECBAC7B2ACCD97FA8F3D26510F759ADFDF285A6BDF450EF4A48E032F165608A1
5,632,015 UART: [art] PUB.Y = 41396100FAA1B7FDB34E07BADE187E92CD535C246AC5349894436FE7FB48FC7A358C4ED0056408B363683EA7E0AE8614
5,638,940 UART: [art] SIG.R = BD34D654CF119276F46893D25F9F965E0CE136021070351C0E5CE7D34319E1857000FFB617F5C83AF560E92E86114DD4
5,645,675 UART: [art] SIG.S = 44C17A08F9B752E250250FCEEE8600717F2BD821D7ACC4ADE79C8C35A66F02E056326F129EE67CD827B6EE21EFECE2B2
5,669,349 UART: Caliptra RT
5,669,602 UART: [state] CFI Enabled
5,777,193 UART: [rt] RT listening for mailbox commands...
5,777,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,831 UART: [rt]cmd =0x41544d4e, len=14344
7,308,695 >>> mbox cmd response data (8 bytes)
7,308,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,338,153 UART: [rt]cmd =0x494e464f, len=4
7,341,792 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,289 ready_for_fw is high
1,362,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,088,895 >>> mbox cmd response: success
5,150,928 UART:
5,150,944 UART: Running Caliptra FMC ...
5,151,352 UART:
5,151,406 UART: [state] CFI Enabled
5,162,150 UART: [fht] FMC Alias Private Key: 7
5,270,444 UART: [art] Extend RT PCRs Done
5,270,872 UART: [art] Lock RT PCRs Done
5,272,290 UART: [art] Populate DV Done
5,280,276 UART: [fht] FMC Alias Private Key: 7
5,281,376 UART: [art] Derive CDI
5,281,656 UART: [art] Store in in slot 0x4
5,366,997 UART: [art] Derive Key Pair
5,367,357 UART: [art] Store priv key in slot 0x5
5,381,081 UART: [art] Derive Key Pair - Done
5,395,814 UART: [art] Signing Cert with AUTHO
5,396,294 UART: RITY.KEYID = 7
5,411,396 UART: [art] Erasing AUTHORITY.KEYID = 7
5,412,161 UART: [art] PUB.X = 3A83AE3CC462D23ABD3FBFE40D8757B615EF13C23D3C26809B99C980807662587544B6501A16D71F45D0441642C05916
5,418,922 UART: [art] PUB.Y = 6108C7275E7E7D631214B226412E8F9EDF4BDBC18E9206008A9DF34786433660C59D460AEDD853F0C1A5B63C6E653E10
5,425,841 UART: [art] SIG.R = 91A1A9E20D0A78F26165AC8739AEDD15B9F912727902DEE01650D77D544B6A098156F25A5FC90D48660361A593BF125B
5,432,591 UART: [art] SIG.S = 1162D34531375FE52D48E0B9DD5C5368A76B7CC7A8EAD3197EF8CA90847184082D0938B06DD44F9299769ED35941D3DC
5,456,278 UART: Caliptra RT
5,456,531 UART: [state] CFI Enabled
5,564,908 UART: [rt] RT listening for mailbox commands...
5,565,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,476 UART: [rt]cmd =0x41544d4e, len=14344
7,104,191 >>> mbox cmd response data (8 bytes)
7,104,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,133,519 UART: [rt]cmd =0x494e464f, len=4
7,137,156 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,460 UART: [kat] SHA2-256
882,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,506 UART: [kat] ++
886,658 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,353 UART: [kat] SHA2-512-ACC
897,254 UART: [kat] ECC-384
902,701 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,866 UART: [fht] Storing FHT @ 0x50003400
1,479,623 UART: [idev] ++
1,479,791 UART: [idev] CDI.KEYID = 6
1,480,151 UART: [idev] SUBJECT.KEYID = 7
1,480,575 UART: [idev] UDS.KEYID = 0
1,480,920 ready_for_fw is high
1,480,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,513 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,515,060 UART: [ldev] ++
1,515,228 UART: [ldev] CDI.KEYID = 6
1,515,591 UART: [ldev] SUBJECT.KEYID = 5
1,516,017 UART: [ldev] AUTHORITY.KEYID = 7
1,516,480 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,547,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,868 UART: [fwproc] Waiting for Commands...
1,587,559 UART: [fwproc] Received command 0x46574c44
1,588,350 UART: [fwproc] Received Image of size 114332 bytes
5,160,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,187,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,901 >>> mbox cmd response: success
5,353,957 UART: [afmc] ++
5,354,125 UART: [afmc] CDI.KEYID = 6
5,354,487 UART: [afmc] SUBJECT.KEYID = 7
5,354,912 UART: [afmc] AUTHORITY.KEYID = 5
5,389,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,754 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,463 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,355 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,424,056 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,944 UART: [afmc] --
5,432,952 UART: [cold-reset] --
5,433,682 UART: [state] Locking Datavault
5,434,915 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,519 UART: [state] Locking ICCM
5,436,053 UART: [exit] Launching FMC @ 0x40000130
5,441,382 UART:
5,441,398 UART: Running Caliptra FMC ...
5,441,806 UART:
5,441,949 UART: [state] CFI Enabled
5,452,561 UART: [fht] FMC Alias Private Key: 7
5,560,479 UART: [art] Extend RT PCRs Done
5,560,907 UART: [art] Lock RT PCRs Done
5,562,589 UART: [art] Populate DV Done
5,571,059 UART: [fht] FMC Alias Private Key: 7
5,572,001 UART: [art] Derive CDI
5,572,281 UART: [art] Store in in slot 0x4
5,657,748 UART: [art] Derive Key Pair
5,658,108 UART: [art] Store priv key in slot 0x5
5,671,762 UART: [art] Derive Key Pair - Done
5,686,385 UART: [art] Signing Cert with AUTHO
5,686,865 UART: RITY.KEYID = 7
5,702,145 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,910 UART: [art] PUB.X = C4F6A3493AD9CE974CD1C6215CACD679D9ED258CBCED4DF06A58B3DBFB5FE1E877CE80BC73504AC8DF6C0E3C5ADB20F0
5,709,711 UART: [art] PUB.Y = 3BC9BDBE924D94807608F28EC38A8CD684896A16E60DB5BCD8B60B3DBA703A6643B649DA28DAC036567F44F177E9DC93
5,716,664 UART: [art] SIG.R = 3175177E7FDDA69B2ACF847E38CE99625D2D9454F0A8F123421976BA5824DA9281737D42884B074B9E7A00CBA8164B25
5,723,407 UART: [art] SIG.S = 23C383C2D00B086AFD7CF2C94B6A248457687DAFCE9CFCA3652E42B0567C62A3C5FD2E5EAD590E4769300B334D1DB6F0
5,747,062 UART: Caliptra RT
5,747,407 UART: [state] CFI Enabled
5,855,497 UART: [rt] RT listening for mailbox commands...
5,856,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,027 UART: [rt]cmd =0x41544d4e, len=14344
7,372,659 >>> mbox cmd response data (8 bytes)
7,372,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,402,037 UART: [rt]cmd =0x494e464f, len=4
7,405,832 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,448 ready_for_fw is high
1,363,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,279,801 >>> mbox cmd response: success
5,341,322 UART:
5,341,338 UART: Running Caliptra FMC ...
5,341,746 UART:
5,341,889 UART: [state] CFI Enabled
5,352,399 UART: [fht] FMC Alias Private Key: 7
5,460,755 UART: [art] Extend RT PCRs Done
5,461,183 UART: [art] Lock RT PCRs Done
5,462,463 UART: [art] Populate DV Done
5,470,745 UART: [fht] FMC Alias Private Key: 7
5,471,697 UART: [art] Derive CDI
5,471,977 UART: [art] Store in in slot 0x4
5,557,662 UART: [art] Derive Key Pair
5,558,022 UART: [art] Store priv key in slot 0x5
5,571,066 UART: [art] Derive Key Pair - Done
5,585,680 UART: [art] Signing Cert with AUTHO
5,586,160 UART: RITY.KEYID = 7
5,601,618 UART: [art] Erasing AUTHORITY.KEYID = 7
5,602,383 UART: [art] PUB.X = 52025654ADDEC388920980C9D1C927EE5950504B2D6C585F88FC696D1A3945437D7FBBCBED90AD9FD7EEAFF1528EDA89
5,609,161 UART: [art] PUB.Y = 05BAB4D43922C21AC66FE7EA8CF62C899854E4C368F7B95A2A5EDB599F05F50E0722146D440BF90E8D5999131BBB799D
5,616,101 UART: [art] SIG.R = 36172EF5EB326634C81827D265B93604202A6C3139446264D1A588E1D10243556B20FD4E25C4D697648AE3D0F389B877
5,622,851 UART: [art] SIG.S = 81635B4BD4EEE05151893F9CA336591FFE90D85DEB3DC551C3B856AD22F6FBFDE470A755C668C5EDE2DA30F12A85352D
5,645,928 UART: Caliptra RT
5,646,273 UART: [state] CFI Enabled
5,754,854 UART: [rt] RT listening for mailbox commands...
5,755,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,658 UART: [rt]cmd =0x41544d4e, len=14344
7,272,868 >>> mbox cmd response data (8 bytes)
7,272,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,302,294 UART: [rt]cmd =0x494e464f, len=4
7,306,075 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,570 UART: [kat] SHA2-512-ACC
908,471 UART: [kat] ECC-384
917,960 UART: [kat] HMAC-384Kdf
922,488 UART: [kat] LMS
1,170,816 UART: [kat] --
1,171,577 UART: [cold-reset] ++
1,172,033 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 ready_for_fw is high
1,176,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,630 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,285 UART: [idev] --
1,210,253 UART: [ldev] ++
1,210,421 UART: [ldev] CDI.KEYID = 6
1,210,784 UART: [ldev] SUBJECT.KEYID = 5
1,211,210 UART: [ldev] AUTHORITY.KEYID = 7
1,211,673 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,021 >>> mbox cmd response: success
3,324,037 UART: [afmc] ++
3,324,205 UART: [afmc] CDI.KEYID = 6
3,324,567 UART: [afmc] SUBJECT.KEYID = 7
3,324,992 UART: [afmc] AUTHORITY.KEYID = 5
3,360,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,747 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,456 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,348 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,059 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,974 UART: [afmc] --
3,403,872 UART: [cold-reset] --
3,404,750 UART: [state] Locking Datavault
3,405,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,451 UART: [state] Locking ICCM
3,406,955 UART: [exit] Launching FMC @ 0x40000130
3,412,284 UART:
3,412,300 UART: Running Caliptra FMC ...
3,412,708 UART:
3,412,762 UART: [state] CFI Enabled
3,423,150 UART: [fht] FMC Alias Private Key: 7
3,530,856 UART: [art] Extend RT PCRs Done
3,531,284 UART: [art] Lock RT PCRs Done
3,532,992 UART: [art] Populate DV Done
3,541,066 UART: [fht] FMC Alias Private Key: 7
3,542,234 UART: [art] Derive CDI
3,542,514 UART: [art] Store in in slot 0x4
3,628,287 UART: [art] Derive Key Pair
3,628,647 UART: [art] Store priv key in slot 0x5
3,641,575 UART: [art] Derive Key Pair - Done
3,656,436 UART: [art] Signing Cert with AUTHO
3,656,916 UART: RITY.KEYID = 7
3,671,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,637 UART: [art] PUB.X = 74542218C6A129757F7A2B204B5132A34151BA0A668C0ED690EA6DDFB77A14A5BE2986E59ABFA499036B403FB7E3F84E
3,679,404 UART: [art] PUB.Y = 3ACF6D2B8623E6B51F894B1DF08AA9D8CC9F51D4F12DD0642866A62568C1454E997F6246F359A8EFA2EDE7A9BBBBE6D7
3,686,372 UART: [art] SIG.R = 59C730044D2C9F98B5668C82CD5F0FDFE7EF2F925C154EE8E1E38820AF193CDD7372AA5490C9250FCD3DFED6199EE669
3,693,147 UART: [art] SIG.S = 46269648D25CF307E39EC6C231022F352F094FF793770C0CB0DADDB768C86FA37ACB7D4C2CAA721C458FDA1560377874
3,716,975 UART: Caliptra RT
3,717,228 UART: [state] CFI Enabled
3,825,221 UART: [rt] RT listening for mailbox commands...
3,825,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,661 UART: [rt]cmd =0x41544d4e, len=14344
5,354,268 >>> mbox cmd response data (8 bytes)
5,354,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,383,476 UART: [rt]cmd =0x494e464f, len=4
5,387,381 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,447 ready_for_fw is high
1,060,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,093 >>> mbox cmd response: success
3,232,344 UART:
3,232,360 UART: Running Caliptra FMC ...
3,232,768 UART:
3,232,822 UART: [state] CFI Enabled
3,242,844 UART: [fht] FMC Alias Private Key: 7
3,350,854 UART: [art] Extend RT PCRs Done
3,351,282 UART: [art] Lock RT PCRs Done
3,352,876 UART: [art] Populate DV Done
3,361,094 UART: [fht] FMC Alias Private Key: 7
3,362,118 UART: [art] Derive CDI
3,362,398 UART: [art] Store in in slot 0x4
3,447,827 UART: [art] Derive Key Pair
3,448,187 UART: [art] Store priv key in slot 0x5
3,461,447 UART: [art] Derive Key Pair - Done
3,476,071 UART: [art] Signing Cert with AUTHO
3,476,551 UART: RITY.KEYID = 7
3,491,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,388 UART: [art] PUB.X = 22A3ED68EA022CFD65D54E7533974AFC754618878C3766168EB12CE664C6B1663558F56C5845222B55994E502A87646B
3,499,145 UART: [art] PUB.Y = 723257005E4EE401BA0174347ED5832A9353A60A0C54416778EFF4E54672C02BFF8B873314A3FBB4E66B8031EDD2F913
3,506,059 UART: [art] SIG.R = 56027E15D12E5145EFC4912A31B427A313D97ED73CA45DFD9BA88C915A87C676CDEE0995CB782689C3E853E52421F96B
3,512,827 UART: [art] SIG.S = C79E63D42970E8E9183E26CE3DAF7384B93013E3AF8487A9A5165EF4FC88FEB87E0AEC43535746ED9EED752741158EE4
3,537,067 UART: Caliptra RT
3,537,320 UART: [state] CFI Enabled
3,645,000 UART: [rt] RT listening for mailbox commands...
3,645,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,728 UART: [rt]cmd =0x41544d4e, len=14344
5,174,833 >>> mbox cmd response data (8 bytes)
5,174,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,204,253 UART: [rt]cmd =0x494e464f, len=4
5,208,062 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
917,875 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,304 UART: [fht] FHT @ 0x50003400
1,174,945 UART: [idev] ++
1,175,113 UART: [idev] CDI.KEYID = 6
1,175,473 UART: [idev] SUBJECT.KEYID = 7
1,175,897 UART: [idev] UDS.KEYID = 0
1,176,242 ready_for_fw is high
1,176,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,765 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,210,894 UART: [ldev] ++
1,211,062 UART: [ldev] CDI.KEYID = 6
1,211,425 UART: [ldev] SUBJECT.KEYID = 5
1,211,851 UART: [ldev] AUTHORITY.KEYID = 7
1,212,314 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,243,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,616 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,709 UART: [fwproc] Recv command 0x46574c44
1,284,437 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,445 >>> mbox cmd response: success
3,322,585 UART: [afmc] ++
3,322,753 UART: [afmc] CDI.KEYID = 6
3,323,115 UART: [afmc] SUBJECT.KEYID = 7
3,323,540 UART: [afmc] AUTHORITY.KEYID = 5
3,359,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,689 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,398 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,290 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,001 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,700 UART: [afmc] --
3,402,804 UART: [cold-reset] --
3,403,504 UART: [state] Locking Datavault
3,404,863 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,467 UART: [state] Locking ICCM
3,406,059 UART: [exit] Launching FMC @ 0x40000130
3,411,388 UART:
3,411,404 UART: Running Caliptra FMC ...
3,411,812 UART:
3,411,955 UART: [state] CFI Enabled
3,422,997 UART: [fht] FMC Alias Private Key: 7
3,531,049 UART: [art] Extend RT PCRs Done
3,531,477 UART: [art] Lock RT PCRs Done
3,533,199 UART: [art] Populate DV Done
3,541,069 UART: [fht] FMC Alias Private Key: 7
3,542,113 UART: [art] Derive CDI
3,542,393 UART: [art] Store in in slot 0x4
3,627,698 UART: [art] Derive Key Pair
3,628,058 UART: [art] Store priv key in slot 0x5
3,641,860 UART: [art] Derive Key Pair - Done
3,656,657 UART: [art] Signing Cert with AUTHO
3,657,137 UART: RITY.KEYID = 7
3,672,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,754 UART: [art] PUB.X = E1164D1C1DF35DF4EE671E8EB31F1A94BB9AD1867386938452DE11BDBC98618D433D20F0A4C989274ABF9F82C8163C58
3,680,532 UART: [art] PUB.Y = F989E516037BB0712ACD5B5CC9D7F23C2A8E01D9B71B46E63172D1811C4039A3D8EB841015E3476AA55E90EFBEDAA838
3,687,486 UART: [art] SIG.R = 00356C86F4BFB499E9A44CDAC4BC7BE477E12938A680135707436BF532E824BED48A096FA95A70192015FA952507E3C5
3,694,225 UART: [art] SIG.S = 8E4584567446A41E9B525896BDAEAE76BD470DD1412CC7D645DDF4B8E57288264E9999151021830E1E7F3D9D5010E0E4
3,718,020 UART: Caliptra RT
3,718,365 UART: [state] CFI Enabled
3,825,657 UART: [rt] RT listening for mailbox commands...
3,826,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,277 UART: [rt]cmd =0x41544d4e, len=14344
5,342,729 >>> mbox cmd response data (8 bytes)
5,342,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,372,145 UART: [rt]cmd =0x494e464f, len=4
5,375,834 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,272 ready_for_fw is high
1,060,272 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,403 >>> mbox cmd response: success
3,238,814 UART:
3,238,830 UART: Running Caliptra FMC ...
3,239,238 UART:
3,239,381 UART: [state] CFI Enabled
3,249,863 UART: [fht] FMC Alias Private Key: 7
3,357,447 UART: [art] Extend RT PCRs Done
3,357,875 UART: [art] Lock RT PCRs Done
3,359,395 UART: [art] Populate DV Done
3,367,573 UART: [fht] FMC Alias Private Key: 7
3,368,537 UART: [art] Derive CDI
3,368,817 UART: [art] Store in in slot 0x4
3,454,418 UART: [art] Derive Key Pair
3,454,778 UART: [art] Store priv key in slot 0x5
3,469,066 UART: [art] Derive Key Pair - Done
3,484,071 UART: [art] Signing Cert with AUTHO
3,484,551 UART: RITY.KEYID = 7
3,500,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,960 UART: [art] PUB.X = F29C8894A5B0479947C9EFF87A3C5B1A5F9802B705AB06CCB3E32185D37DA36E229A6222EF2ACCE71D4AA0E370EE93DA
3,507,737 UART: [art] PUB.Y = 5C6841F9159CF31DC3029C7188C4F2AED170DA8B4D9650B2EE7962A3AA26421B4B40330E0C7ECE796BE4AE315AC775C1
3,514,688 UART: [art] SIG.R = 3C3A573285EAF0FD280335DF19788DFF47ED0E418E260A190BB08348217242FF6F08F6F308219B58813B5720C2C552E6
3,521,436 UART: [art] SIG.S = 4EF0DF267493DC1769ABA9E6A79843C89A09C99D6C97B214F1B51836F8B3967B4E82690F0DD2B1E7C65F4EC44417D3FE
3,545,426 UART: Caliptra RT
3,545,771 UART: [state] CFI Enabled
3,652,948 UART: [rt] RT listening for mailbox commands...
3,653,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,490 UART: [rt]cmd =0x41544d4e, len=14344
5,172,591 >>> mbox cmd response data (8 bytes)
5,172,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,202,005 UART: [rt]cmd =0x494e464f, len=4
5,205,878 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,489 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,281,074 UART: [fwproc] Wait for Commands...
1,281,729 UART: [fwproc] Recv command 0x46574c44
1,282,462 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,864 >>> mbox cmd response: success
3,314,017 UART: [afmc] ++
3,314,185 UART: [afmc] CDI.KEYID = 6
3,314,548 UART: [afmc] SUBJECT.KEYID = 7
3,314,974 UART: [afmc] AUTHORITY.KEYID = 5
3,350,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,141 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,851 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,741 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,452 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,262 UART: [afmc] --
3,393,390 UART: [cold-reset] --
3,394,262 UART: [state] Locking Datavault
3,395,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,119 UART: [state] Locking ICCM
3,396,689 UART: [exit] Launching FMC @ 0x40000130
3,402,018 UART:
3,402,034 UART: Running Caliptra FMC ...
3,402,442 UART:
3,402,496 UART: [state] CFI Enabled
3,412,984 UART: [fht] FMC Alias Private Key: 7
3,520,704 UART: [art] Extend RT PCRs Done
3,521,132 UART: [art] Lock RT PCRs Done
3,522,704 UART: [art] Populate DV Done
3,530,788 UART: [fht] FMC Alias Private Key: 7
3,531,830 UART: [art] Derive CDI
3,532,110 UART: [art] Store in in slot 0x4
3,617,585 UART: [art] Derive Key Pair
3,617,945 UART: [art] Store priv key in slot 0x5
3,631,317 UART: [art] Derive Key Pair - Done
3,645,946 UART: [art] Signing Cert with AUTHO
3,646,426 UART: RITY.KEYID = 7
3,661,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,217 UART: [art] PUB.X = ED0E3855B2145D9EBBEB465C7D2C36BCA2870BE8686F0C720C397CC95131E112DE3A962BD9A30E05F436C1ABABF2B991
3,668,985 UART: [art] PUB.Y = E78C4BB6FEAF1CB12D2E69842EE66ABA0534E33B5502C74DB4B90943619821A61CDF883291033F01205C7A816BF256BC
3,675,926 UART: [art] SIG.R = 347B13CD9FE78E5C25A16DC844EC787131669F9318ABD8CB26A184C0A9F7FF5B5BF654FE82215BCA97C01DB436729AFA
3,682,710 UART: [art] SIG.S = BB84F360B6F9341E4BF0A8C82DD791EDD58FAF192B2FDF2405A6C44478DB5674CD4AD06BE023FC39F97D5FAEC9CC36BA
3,706,126 UART: Caliptra RT
3,706,379 UART: [state] CFI Enabled
3,813,799 UART: [rt] RT listening for mailbox commands...
3,814,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,691 UART: [rt]cmd =0x41544d4e, len=14344
5,338,816 >>> mbox cmd response data (8 bytes)
5,338,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,368,190 UART: [rt]cmd =0x494e464f, len=4
5,372,001 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,012 ready_for_fw is high
1,056,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,153,669 >>> mbox cmd response: success
3,215,558 UART:
3,215,574 UART: Running Caliptra FMC ...
3,215,982 UART:
3,216,036 UART: [state] CFI Enabled
3,226,756 UART: [fht] FMC Alias Private Key: 7
3,335,120 UART: [art] Extend RT PCRs Done
3,335,548 UART: [art] Lock RT PCRs Done
3,337,230 UART: [art] Populate DV Done
3,345,292 UART: [fht] FMC Alias Private Key: 7
3,346,384 UART: [art] Derive CDI
3,346,664 UART: [art] Store in in slot 0x4
3,432,387 UART: [art] Derive Key Pair
3,432,747 UART: [art] Store priv key in slot 0x5
3,446,117 UART: [art] Derive Key Pair - Done
3,460,850 UART: [art] Signing Cert with AUTHO
3,461,330 UART: RITY.KEYID = 7
3,476,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,477,369 UART: [art] PUB.X = 8BBA8990904196352CB0BE65A784C6A88519D78F79FFBCDF1CF6D191777BA5827E556B85693ACC2D4ADD010B807E704A
3,484,141 UART: [art] PUB.Y = 12AF4C1A9DBDE903CEB777B429E804868A9FDECA1AA23DD83A07191D9937CCCF6C35FF95F550EAEC55CBE2990B0CBBD8
3,491,104 UART: [art] SIG.R = DB543E81DB3B0C92D4CB55A218A400151D2749830017CE18154A5F56EC7E98467C0573711176CF3364C534437BEDF113
3,497,818 UART: [art] SIG.S = 5A68ACE38A31FD4C6D4A4BF6785938DC4F27D0BB657C46ECECD1B9C11FD8EB8355B263BF3C818C9524EB8E1C5467354C
3,521,515 UART: Caliptra RT
3,521,768 UART: [state] CFI Enabled
3,629,064 UART: [rt] RT listening for mailbox commands...
3,629,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,680 UART: [rt]cmd =0x41544d4e, len=14344
5,160,570 >>> mbox cmd response data (8 bytes)
5,160,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,189,996 UART: [rt]cmd =0x494e464f, len=4
5,193,719 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 ready_for_fw is high
1,174,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,919 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,283 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,575 >>> mbox cmd response: success
3,318,662 UART: [afmc] ++
3,318,830 UART: [afmc] CDI.KEYID = 6
3,319,193 UART: [afmc] SUBJECT.KEYID = 7
3,319,619 UART: [afmc] AUTHORITY.KEYID = 5
3,355,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,382 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,092 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,982 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,693 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,601 UART: [afmc] --
3,398,607 UART: [cold-reset] --
3,399,709 UART: [state] Locking Datavault
3,400,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,364 UART: [state] Locking ICCM
3,401,894 UART: [exit] Launching FMC @ 0x40000130
3,407,223 UART:
3,407,239 UART: Running Caliptra FMC ...
3,407,647 UART:
3,407,790 UART: [state] CFI Enabled
3,418,298 UART: [fht] FMC Alias Private Key: 7
3,526,296 UART: [art] Extend RT PCRs Done
3,526,724 UART: [art] Lock RT PCRs Done
3,527,962 UART: [art] Populate DV Done
3,536,226 UART: [fht] FMC Alias Private Key: 7
3,537,156 UART: [art] Derive CDI
3,537,436 UART: [art] Store in in slot 0x4
3,623,297 UART: [art] Derive Key Pair
3,623,657 UART: [art] Store priv key in slot 0x5
3,636,681 UART: [art] Derive Key Pair - Done
3,651,472 UART: [art] Signing Cert with AUTHO
3,651,952 UART: RITY.KEYID = 7
3,667,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,013 UART: [art] PUB.X = 06B06A3B5CA327FF120815427F7877CC07AAD95BA0B08285E7FCCDBE5BA923774DA8E18C50EEC452AA914EEB525E2CB3
3,674,792 UART: [art] PUB.Y = BDCBE9AD657078824E2EC442B13BBD74CB0679BEC01636DF2164096ABCB3BB9405D30373B2575F181B78219D13CEABAB
3,681,744 UART: [art] SIG.R = EB7EEAA1FCD8C7739C675A8D81A1F5FD93CC3000B4CF942A11129B91D3865D5AA888AFCE21A9EDF17488F6629D2D1411
3,688,508 UART: [art] SIG.S = 9FFD91E2804967FCB6DB4F002A15BFC710D7A968A35EAC966FA79A8DA77CAC5B19A22A6FE6D70A539E97F5F51105FBD1
3,712,493 UART: Caliptra RT
3,712,838 UART: [state] CFI Enabled
3,821,367 UART: [rt] RT listening for mailbox commands...
3,822,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,879 UART: [rt]cmd =0x41544d4e, len=14344
5,333,475 >>> mbox cmd response data (8 bytes)
5,333,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,362,867 UART: [rt]cmd =0x494e464f, len=4
5,366,632 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,509 ready_for_fw is high
1,056,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,082 >>> mbox cmd response: success
3,232,497 UART:
3,232,513 UART: Running Caliptra FMC ...
3,232,921 UART:
3,233,064 UART: [state] CFI Enabled
3,243,734 UART: [fht] FMC Alias Private Key: 7
3,352,068 UART: [art] Extend RT PCRs Done
3,352,496 UART: [art] Lock RT PCRs Done
3,354,332 UART: [art] Populate DV Done
3,362,352 UART: [fht] FMC Alias Private Key: 7
3,363,414 UART: [art] Derive CDI
3,363,694 UART: [art] Store in in slot 0x4
3,449,505 UART: [art] Derive Key Pair
3,449,865 UART: [art] Store priv key in slot 0x5
3,463,447 UART: [art] Derive Key Pair - Done
3,478,389 UART: [art] Signing Cert with AUTHO
3,478,869 UART: RITY.KEYID = 7
3,494,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,952 UART: [art] PUB.X = 05A15B92195C9B9B8108854C662F1B5006C590211582A3ED90DA041CA631620C1F851C8CC560AB7E2C7C6DC44CD9DEAA
3,501,713 UART: [art] PUB.Y = 9F9D68C5D2CE19412FC38A5E4EA5B8EA9F3D3525980D1DD56C00E2E8E75A53AE8FBA2A89A461EEFE2C7C093F1B4A8A48
3,508,657 UART: [art] SIG.R = 000DD2B412637AA96E8C2E45F161B7156CFD16FD482FAC048BCF13BB4E8F3223C4F42398A8CC7997B24BCE26912D3D9B
3,515,411 UART: [art] SIG.S = 3F84D99106131CF1023ADFC1577100A309F2AD20C66B779928D1C1CB66A553F682B3C44F3E028FCAFA66EEEDFECBF883
3,540,032 UART: Caliptra RT
3,540,377 UART: [state] CFI Enabled
3,648,705 UART: [rt] RT listening for mailbox commands...
3,649,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,153 UART: [rt]cmd =0x41544d4e, len=14344
5,180,731 >>> mbox cmd response data (8 bytes)
5,180,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,209,809 UART: [rt]cmd =0x494e464f, len=4
5,213,548 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,713 UART: [kat] SHA2-256
881,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,759 UART: [kat] ++
885,911 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,859 UART: [cold-reset] ++
1,476,189 UART: [fht] Storing FHT @ 0x50003400
1,478,814 UART: [idev] ++
1,478,982 UART: [idev] CDI.KEYID = 6
1,479,342 UART: [idev] SUBJECT.KEYID = 7
1,479,766 UART: [idev] UDS.KEYID = 0
1,480,111 ready_for_fw is high
1,480,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,770 UART: [idev] Erasing UDS.KEYID = 0
1,504,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,850 UART: [idev] --
1,513,961 UART: [ldev] ++
1,514,129 UART: [ldev] CDI.KEYID = 6
1,514,492 UART: [ldev] SUBJECT.KEYID = 5
1,514,918 UART: [ldev] AUTHORITY.KEYID = 7
1,515,381 UART: [ldev] FE.KEYID = 1
1,520,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,102 UART: [ldev] --
1,585,451 UART: [fwproc] Waiting for Commands...
1,586,080 UART: [fwproc] Received command 0x46574c44
1,586,871 UART: [fwproc] Received Image of size 114332 bytes
5,043,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,071,290 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,100,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,236,567 >>> mbox cmd response: success
5,237,743 UART: [afmc] ++
5,237,911 UART: [afmc] CDI.KEYID = 6
5,238,273 UART: [afmc] SUBJECT.KEYID = 7
5,238,698 UART: [afmc] AUTHORITY.KEYID = 5
5,273,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,289,430 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,290,210 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,295,919 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,301,811 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,307,512 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,315,368 UART: [afmc] --
5,316,358 UART: [cold-reset] --
5,317,210 UART: [state] Locking Datavault
5,318,141 UART: [state] Locking PCR0, PCR1 and PCR31
5,318,745 UART: [state] Locking ICCM
5,319,281 UART: [exit] Launching FMC @ 0x40000130
5,324,610 UART:
5,324,626 UART: Running Caliptra FMC ...
5,325,034 UART:
5,325,088 UART: [state] CFI Enabled
5,335,580 UART: [fht] FMC Alias Private Key: 7
5,443,516 UART: [art] Extend RT PCRs Done
5,443,944 UART: [art] Lock RT PCRs Done
5,445,554 UART: [art] Populate DV Done
5,454,048 UART: [fht] FMC Alias Private Key: 7
5,455,180 UART: [art] Derive CDI
5,455,460 UART: [art] Store in in slot 0x4
5,541,551 UART: [art] Derive Key Pair
5,541,911 UART: [art] Store priv key in slot 0x5
5,554,395 UART: [art] Derive Key Pair - Done
5,569,328 UART: [art] Signing Cert with AUTHO
5,569,808 UART: RITY.KEYID = 7
5,584,956 UART: [art] Erasing AUTHORITY.KEYID = 7
5,585,721 UART: [art] PUB.X = 1506577047FF23228A4E080F7C6B3123DE37B01675745758FD0D9AF817A109A633D7948330669B1DE3DE1CA881B41299
5,592,466 UART: [art] PUB.Y = 4E3D76B41C29E9072E1C81811EA40089590365D46F27A456DEB62ECA524E1D4F117761633B0A4A67DE1C2B0AEAAF20EA
5,599,390 UART: [art] SIG.R = 1320FFC3927A6931BB9542E531A81E9E08F9FB9D462FADA04F3F99C8FEF934226ABF964D53D21E2D658A8E26ED05DD30
5,606,166 UART: [art] SIG.S = 41BA7777110A54EC3EBD12EB5797B6FA263CB8F0CC23DB7EF733EEE9B3C3FA9F8F46196FCDC3CC21177FEFB4DD022F9D
5,629,593 UART: Caliptra RT
5,629,846 UART: [state] CFI Enabled
5,738,678 UART: [rt] RT listening for mailbox commands...
5,739,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,560 UART: [rt]cmd =0x41544d4e, len=14344
6,423,155 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,725 ready_for_fw is high
1,362,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,516 >>> mbox cmd response: success
5,263,501 UART:
5,263,517 UART: Running Caliptra FMC ...
5,263,925 UART:
5,263,979 UART: [state] CFI Enabled
5,274,249 UART: [fht] FMC Alias Private Key: 7
5,382,081 UART: [art] Extend RT PCRs Done
5,382,509 UART: [art] Lock RT PCRs Done
5,383,779 UART: [art] Populate DV Done
5,391,845 UART: [fht] FMC Alias Private Key: 7
5,392,923 UART: [art] Derive CDI
5,393,203 UART: [art] Store in in slot 0x4
5,478,572 UART: [art] Derive Key Pair
5,478,932 UART: [art] Store priv key in slot 0x5
5,492,420 UART: [art] Derive Key Pair - Done
5,507,245 UART: [art] Signing Cert with AUTHO
5,507,725 UART: RITY.KEYID = 7
5,522,775 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,540 UART: [art] PUB.X = 56101EBD2C9EDC2B47CD996E7AA2E3365877CAF321AC92EC911EC1FC9649B666B4836A18A01FC4EBEAC8F00261615339
5,530,319 UART: [art] PUB.Y = 2EEA85A1E7E3BA2F5C2D69BD0E66E18F6F3670E590C81A149432F236C44495C2074F86EBF86D05B606E4A68FE2E5EB7C
5,537,269 UART: [art] SIG.R = 3908C52EB2A8CBA6385AC6EF13922C40F97AEE0D832EC899E7725C5BCEFD74CD753D8644D9F86B536A82DBB6AE8EDC7A
5,544,055 UART: [art] SIG.S = 3AD3526E42746C1CD9B30362674948052A7D44809FAD10CFEF87A29B8EC6F4541A9C612B51E15469ACA9B4F948C82298
5,567,842 UART: Caliptra RT
5,568,095 UART: [state] CFI Enabled
5,675,793 UART: [rt] RT listening for mailbox commands...
5,676,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,439 UART: [rt]cmd =0x41544d4e, len=14344
6,366,955 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,391 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,476,684 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 ready_for_fw is high
1,481,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,543 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,157 UART: [idev] --
1,515,154 UART: [ldev] ++
1,515,322 UART: [ldev] CDI.KEYID = 6
1,515,685 UART: [ldev] SUBJECT.KEYID = 5
1,516,111 UART: [ldev] AUTHORITY.KEYID = 7
1,516,574 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,085 UART: [ldev] --
1,586,448 UART: [fwproc] Waiting for Commands...
1,587,215 UART: [fwproc] Received command 0x46574c44
1,588,006 UART: [fwproc] Received Image of size 114332 bytes
5,196,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,253,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,389,842 >>> mbox cmd response: success
5,390,960 UART: [afmc] ++
5,391,128 UART: [afmc] CDI.KEYID = 6
5,391,490 UART: [afmc] SUBJECT.KEYID = 7
5,391,915 UART: [afmc] AUTHORITY.KEYID = 5
5,427,139 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,535 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,444,315 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,024 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,455,916 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,617 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,383 UART: [afmc] --
5,470,433 UART: [cold-reset] --
5,471,117 UART: [state] Locking Datavault
5,471,988 UART: [state] Locking PCR0, PCR1 and PCR31
5,472,592 UART: [state] Locking ICCM
5,473,076 UART: [exit] Launching FMC @ 0x40000130
5,478,405 UART:
5,478,421 UART: Running Caliptra FMC ...
5,478,829 UART:
5,478,972 UART: [state] CFI Enabled
5,489,718 UART: [fht] FMC Alias Private Key: 7
5,597,386 UART: [art] Extend RT PCRs Done
5,597,814 UART: [art] Lock RT PCRs Done
5,599,286 UART: [art] Populate DV Done
5,607,746 UART: [fht] FMC Alias Private Key: 7
5,608,924 UART: [art] Derive CDI
5,609,204 UART: [art] Store in in slot 0x4
5,694,961 UART: [art] Derive Key Pair
5,695,321 UART: [art] Store priv key in slot 0x5
5,708,217 UART: [art] Derive Key Pair - Done
5,722,906 UART: [art] Signing Cert with AUTHO
5,723,386 UART: RITY.KEYID = 7
5,738,520 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,285 UART: [art] PUB.X = 877F6B7610BD541E0706F542BDE9B288EA3FC1EA460A5B11577518E08CA0685931E4D5BBBB30269A4E78A6B8AEB5847D
5,746,054 UART: [art] PUB.Y = D99F8BEC47694C70A4002C9AEFB5AA7930B493843E2B9570BAC331E435EE4C146CF77FAB7B4D13713571A099BB0A424C
5,752,989 UART: [art] SIG.R = 487F4C1D3C00FD29BD373D458FF371F02A7FCCD0D268029EAE001A50DB716F749ADB9C230BBDE88559509A9A8A068779
5,759,716 UART: [art] SIG.S = BDB722B213E12AE5A172D1683C50565D50FA2F2F2457CBC0C4CD0D84656D701B89EC116C24E538DF504E897855A27F70
5,782,944 UART: Caliptra RT
5,783,289 UART: [state] CFI Enabled
5,890,070 UART: [rt] RT listening for mailbox commands...
5,890,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,764 UART: [rt]cmd =0x41544d4e, len=14344
6,576,978 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,422 ready_for_fw is high
1,362,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,164,982 >>> mbox cmd response: success
5,226,255 UART:
5,226,271 UART: Running Caliptra FMC ...
5,226,679 UART:
5,226,822 UART: [state] CFI Enabled
5,237,522 UART: [fht] FMC Alias Private Key: 7
5,346,186 UART: [art] Extend RT PCRs Done
5,346,614 UART: [art] Lock RT PCRs Done
5,347,972 UART: [art] Populate DV Done
5,356,116 UART: [fht] FMC Alias Private Key: 7
5,357,148 UART: [art] Derive CDI
5,357,428 UART: [art] Store in in slot 0x4
5,442,887 UART: [art] Derive Key Pair
5,443,247 UART: [art] Store priv key in slot 0x5
5,456,415 UART: [art] Derive Key Pair - Done
5,470,965 UART: [art] Signing Cert with AUTHO
5,471,445 UART: RITY.KEYID = 7
5,487,001 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,766 UART: [art] PUB.X = 002E92FC80BD4174A515C7352151AF6453BB34C91C61497F87FAC7CBCC66777DCAE21D93BBA294E6E68F7E1A4DC52825
5,494,524 UART: [art] PUB.Y = 1E726776B2F6A3EA6A4E99F005B11F40FFA725AD92A64208AB728027E1ECB771102A0CE698F7AA868AD71BB664F1A092
5,501,473 UART: [art] SIG.R = FDC4A1590EC039F6C94F74C7FE477D2EE3E63467EB334159EFD2B046F134FCC408179888B99362BFB265CC1C62D50563
5,508,240 UART: [art] SIG.S = D22D3B988E5397A22AB4574D83398D143BD902627C55760B0B396CA9C44D5ECEDC856ADDE510039B712F4AD7E926127C
5,532,213 UART: Caliptra RT
5,532,558 UART: [state] CFI Enabled
5,640,572 UART: [rt] RT listening for mailbox commands...
5,641,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,402 UART: [rt]cmd =0x41544d4e, len=14344
6,327,716 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,988 UART: [idev] ++
1,175,156 UART: [idev] CDI.KEYID = 6
1,175,516 UART: [idev] SUBJECT.KEYID = 7
1,175,940 UART: [idev] UDS.KEYID = 0
1,176,285 ready_for_fw is high
1,176,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,646 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,209,955 UART: [ldev] ++
1,210,123 UART: [ldev] CDI.KEYID = 6
1,210,486 UART: [ldev] SUBJECT.KEYID = 5
1,210,912 UART: [ldev] AUTHORITY.KEYID = 7
1,211,375 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,406 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,830 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,311,250 >>> mbox cmd response: success
3,312,316 UART: [afmc] ++
3,312,484 UART: [afmc] CDI.KEYID = 6
3,312,846 UART: [afmc] SUBJECT.KEYID = 7
3,313,271 UART: [afmc] AUTHORITY.KEYID = 5
3,348,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,610 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,319 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,211 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,922 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,973 UART: [afmc] --
3,392,087 UART: [cold-reset] --
3,392,875 UART: [state] Locking Datavault
3,394,064 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,668 UART: [state] Locking ICCM
3,395,120 UART: [exit] Launching FMC @ 0x40000130
3,400,449 UART:
3,400,465 UART: Running Caliptra FMC ...
3,400,873 UART:
3,400,927 UART: [state] CFI Enabled
3,411,049 UART: [fht] FMC Alias Private Key: 7
3,519,439 UART: [art] Extend RT PCRs Done
3,519,867 UART: [art] Lock RT PCRs Done
3,521,327 UART: [art] Populate DV Done
3,529,637 UART: [fht] FMC Alias Private Key: 7
3,530,787 UART: [art] Derive CDI
3,531,067 UART: [art] Store in in slot 0x4
3,616,482 UART: [art] Derive Key Pair
3,616,842 UART: [art] Store priv key in slot 0x5
3,630,134 UART: [art] Derive Key Pair - Done
3,644,852 UART: [art] Signing Cert with AUTHO
3,645,332 UART: RITY.KEYID = 7
3,660,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,401 UART: [art] PUB.X = 52D16D9D3934172A6D3A6EA5391E9F7ADE7DFA57382BC17B82BEB403F5E56CC7E01CB6FB5994B9A662582106DCA6E864
3,668,177 UART: [art] PUB.Y = 1D12723D4183DCFC7C8451848A420E7456D52CF3289E5D98E813B92ECD130CA1E1087F867B88496E89E8344AC25179FF
3,675,116 UART: [art] SIG.R = 0FD76E6A5530AF647CD6292003631BC9EEAD39E839BEB3132FBC9D05EFE0B1F4058534BA8785B3F6525A83E8850DE017
3,681,879 UART: [art] SIG.S = 6C762FCB8F399DBC9E4DC7B21FFAD7CDD60C29DE091108E45CB334921E5E284B3CDAD3CE080C00B8B35EB8B201F03784
3,705,698 UART: Caliptra RT
3,705,951 UART: [state] CFI Enabled
3,814,558 UART: [rt] RT listening for mailbox commands...
3,815,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,384 UART: [rt]cmd =0x41544d4e, len=14344
4,496,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,335 ready_for_fw is high
1,060,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,868 >>> mbox cmd response: success
3,238,591 UART:
3,238,607 UART: Running Caliptra FMC ...
3,239,015 UART:
3,239,069 UART: [state] CFI Enabled
3,249,665 UART: [fht] FMC Alias Private Key: 7
3,357,443 UART: [art] Extend RT PCRs Done
3,357,871 UART: [art] Lock RT PCRs Done
3,359,417 UART: [art] Populate DV Done
3,367,847 UART: [fht] FMC Alias Private Key: 7
3,369,021 UART: [art] Derive CDI
3,369,301 UART: [art] Store in in slot 0x4
3,454,828 UART: [art] Derive Key Pair
3,455,188 UART: [art] Store priv key in slot 0x5
3,468,482 UART: [art] Derive Key Pair - Done
3,483,231 UART: [art] Signing Cert with AUTHO
3,483,711 UART: RITY.KEYID = 7
3,499,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,018 UART: [art] PUB.X = DCBB4E3F841A98E2DBB8E9B447E0297FC92407F8BC5036742F038C08887BF66C8AB7FF93112876B82B26728EB36D1E07
3,506,782 UART: [art] PUB.Y = EC0588BF9A713C07E826AE003759BC0AE26E3BB67C843B579235C4D897053A87FB2C7CC9EA1A81B41FBE3ABA0A5B55A1
3,513,711 UART: [art] SIG.R = 3D03DF5854A9FBEA0D8FF3B48D02B859955B9A96A3C31EBB7E265CB065ECE140FBEA9296DF3A1D29172D2B9F9F7D3FA0
3,520,494 UART: [art] SIG.S = CEBC88FDE587035311CA5B39B2097F118F7765E324497A8036DAC72F9B46345E1D2120DF548E23412AF2328E9C9C77F0
3,544,049 UART: Caliptra RT
3,544,302 UART: [state] CFI Enabled
3,651,702 UART: [rt] RT listening for mailbox commands...
3,652,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,244 UART: [rt]cmd =0x41544d4e, len=14344
4,335,575 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
901,880 UART: [kat] SHA2-256
903,820 UART: [kat] SHA2-384
906,421 UART: [kat] SHA2-512-ACC
908,322 UART: [kat] ECC-384
917,575 UART: [kat] HMAC-384Kdf
922,117 UART: [kat] LMS
1,170,445 UART: [kat] --
1,171,010 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,173,859 UART: [idev] ++
1,174,027 UART: [idev] CDI.KEYID = 6
1,174,387 UART: [idev] SUBJECT.KEYID = 7
1,174,811 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,037 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,264 UART: [ldev] ++
1,209,432 UART: [ldev] CDI.KEYID = 6
1,209,795 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,215,962 UART: [ldev] Erasing FE.KEYID = 1
1,242,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,622 UART: [ldev] --
1,281,899 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,091 >>> mbox cmd response: success
3,315,241 UART: [afmc] ++
3,315,409 UART: [afmc] CDI.KEYID = 6
3,315,771 UART: [afmc] SUBJECT.KEYID = 7
3,316,196 UART: [afmc] AUTHORITY.KEYID = 5
3,351,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,173 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,882 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,774 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,485 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,304 UART: [afmc] --
3,395,362 UART: [cold-reset] --
3,396,482 UART: [state] Locking Datavault
3,397,721 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,325 UART: [state] Locking ICCM
3,398,803 UART: [exit] Launching FMC @ 0x40000130
3,404,132 UART:
3,404,148 UART: Running Caliptra FMC ...
3,404,556 UART:
3,404,699 UART: [state] CFI Enabled
3,415,261 UART: [fht] FMC Alias Private Key: 7
3,523,185 UART: [art] Extend RT PCRs Done
3,523,613 UART: [art] Lock RT PCRs Done
3,525,121 UART: [art] Populate DV Done
3,533,121 UART: [fht] FMC Alias Private Key: 7
3,534,057 UART: [art] Derive CDI
3,534,337 UART: [art] Store in in slot 0x4
3,619,704 UART: [art] Derive Key Pair
3,620,064 UART: [art] Store priv key in slot 0x5
3,633,500 UART: [art] Derive Key Pair - Done
3,648,004 UART: [art] Signing Cert with AUTHO
3,648,484 UART: RITY.KEYID = 7
3,663,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,947 UART: [art] PUB.X = F8D8D5630802D284EC849F4CE1685A8E356569B2EB7AE3AE59C860088AC180E8F0BA2154F05F9C13A15F616451DD129C
3,670,712 UART: [art] PUB.Y = 70C888343F5D6AD1F3DAEE39EFFAFD765B69CB7144C4AF2AFDC91E1094E19DD4FF27A8CFC11AD2EBE089F83423C744C1
3,677,688 UART: [art] SIG.R = D171F9EB9254CDF8FB11913C9806897119D092D973162ACAE8CD8D0480F59B99545E2693DB11EDBFB215594AC9453A80
3,684,454 UART: [art] SIG.S = A3E70C05B8F4D384573D7000453F4318DBBEF3EFFCB2A97A51AB59ADAB820FEED61D40FE196223F54737707972B39A90
3,708,046 UART: Caliptra RT
3,708,391 UART: [state] CFI Enabled
3,815,898 UART: [rt] RT listening for mailbox commands...
3,816,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,476 UART: [rt]cmd =0x41544d4e, len=14344
4,499,997 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,828 ready_for_fw is high
1,059,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,974 >>> mbox cmd response: success
3,224,711 UART:
3,224,727 UART: Running Caliptra FMC ...
3,225,135 UART:
3,225,278 UART: [state] CFI Enabled
3,235,640 UART: [fht] FMC Alias Private Key: 7
3,343,282 UART: [art] Extend RT PCRs Done
3,343,710 UART: [art] Lock RT PCRs Done
3,345,408 UART: [art] Populate DV Done
3,353,516 UART: [fht] FMC Alias Private Key: 7
3,354,696 UART: [art] Derive CDI
3,354,976 UART: [art] Store in in slot 0x4
3,440,841 UART: [art] Derive Key Pair
3,441,201 UART: [art] Store priv key in slot 0x5
3,454,211 UART: [art] Derive Key Pair - Done
3,469,007 UART: [art] Signing Cert with AUTHO
3,469,487 UART: RITY.KEYID = 7
3,484,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,598 UART: [art] PUB.X = 1ED7703B72ADB52A7C6C5BCE61E86C18C540357E9DB46D9C60EA308C6AA1C8C98B06037062F15F403528E7AEC57CDE5B
3,492,376 UART: [art] PUB.Y = 12DEE6F00D0986271BA6880F9A018DD340329F723F5A21800B15629FD09D66221BE6068319C0F85F37378DB3E18474E2
3,499,300 UART: [art] SIG.R = 672538DACF63B77B1DA50FF4D3B51D4C753FA4C855CDF0330C31F9D032886B5FA318D2ECFF07D3760302EAF02EBB5DA7
3,506,073 UART: [art] SIG.S = F2B8C4FD6536FB18C5B5886268F3B2E4315ABB571966E75DFE9896605330B9EB0D782A109F584A3FE9EA8582D83951E4
3,529,641 UART: Caliptra RT
3,529,986 UART: [state] CFI Enabled
3,637,276 UART: [rt] RT listening for mailbox commands...
3,637,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,956 UART: [rt]cmd =0x41544d4e, len=14344
4,321,223 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,729 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,174,649 ready_for_fw is high
1,174,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,199,273 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,180 UART: [ldev] ++
1,209,348 UART: [ldev] CDI.KEYID = 6
1,209,712 UART: [ldev] SUBJECT.KEYID = 5
1,210,139 UART: [ldev] AUTHORITY.KEYID = 7
1,210,602 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,858 UART: [ldev] --
1,281,140 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,340 >>> mbox cmd response: success
3,323,437 UART: [afmc] ++
3,323,605 UART: [afmc] CDI.KEYID = 6
3,323,968 UART: [afmc] SUBJECT.KEYID = 7
3,324,394 UART: [afmc] AUTHORITY.KEYID = 5
3,358,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,145 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,855 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,745 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,456 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,386 UART: [afmc] --
3,402,506 UART: [cold-reset] --
3,403,358 UART: [state] Locking Datavault
3,404,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,183 UART: [state] Locking ICCM
3,405,763 UART: [exit] Launching FMC @ 0x40000130
3,411,092 UART:
3,411,108 UART: Running Caliptra FMC ...
3,411,516 UART:
3,411,570 UART: [state] CFI Enabled
3,422,184 UART: [fht] FMC Alias Private Key: 7
3,530,044 UART: [art] Extend RT PCRs Done
3,530,472 UART: [art] Lock RT PCRs Done
3,532,024 UART: [art] Populate DV Done
3,540,266 UART: [fht] FMC Alias Private Key: 7
3,541,314 UART: [art] Derive CDI
3,541,594 UART: [art] Store in in slot 0x4
3,627,271 UART: [art] Derive Key Pair
3,627,631 UART: [art] Store priv key in slot 0x5
3,640,801 UART: [art] Derive Key Pair - Done
3,655,926 UART: [art] Signing Cert with AUTHO
3,656,406 UART: RITY.KEYID = 7
3,671,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,269 UART: [art] PUB.X = 782006C95E833CEE3602FE4C0A21840353108BA5CE95663B58AB83960E4395CB0C01AFB73A633E265752B90E5FE2A25E
3,679,015 UART: [art] PUB.Y = C1B87DB84AC604855B8C56411CA77A09747DCB1DA77E2532F12351FBA23710A932F39FF4ED36F63165164396F67083DC
3,685,959 UART: [art] SIG.R = 3E3DBAA6C7E4AF3017B008BACE81D4ACA565DC87CFA0A1007AFEA89B2A08A72D778F0FF5F277556EBED6F5E9B747AB89
3,692,726 UART: [art] SIG.S = 6AAB037C578B2BA2062FD5A6359B5997DCD26703A6D3D492E452D83B7CE9BB9081B0E1596708DDA29F8125AEDE947B41
3,716,109 UART: Caliptra RT
3,716,362 UART: [state] CFI Enabled
3,823,539 UART: [rt] RT listening for mailbox commands...
3,824,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,395 UART: [rt]cmd =0x41544d4e, len=14344
4,503,076 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,602 ready_for_fw is high
1,055,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,989 >>> mbox cmd response: success
3,236,898 UART:
3,236,914 UART: Running Caliptra FMC ...
3,237,322 UART:
3,237,376 UART: [state] CFI Enabled
3,248,028 UART: [fht] FMC Alias Private Key: 7
3,355,854 UART: [art] Extend RT PCRs Done
3,356,282 UART: [art] Lock RT PCRs Done
3,357,824 UART: [art] Populate DV Done
3,366,186 UART: [fht] FMC Alias Private Key: 7
3,367,266 UART: [art] Derive CDI
3,367,546 UART: [art] Store in in slot 0x4
3,453,057 UART: [art] Derive Key Pair
3,453,417 UART: [art] Store priv key in slot 0x5
3,466,155 UART: [art] Derive Key Pair - Done
3,480,645 UART: [art] Signing Cert with AUTHO
3,481,125 UART: RITY.KEYID = 7
3,496,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,460 UART: [art] PUB.X = 55320D64A05CD644E70A5EBD44936FF37F7D3CF539B27B349368131B7E01A1F962D09CCE2E0B2D25A262A28E8F05094C
3,504,216 UART: [art] PUB.Y = 8022C2A0B41ED84A40B39106A23C18DD90BFC9371CC38D92ADDD4A9ED5BF4DFE74874A8F14FBCD7B2013CDEC6D23A9E3
3,511,187 UART: [art] SIG.R = 733187C2E79752F6FF287940DE107E20FFE0FB55976BF17E37C2B662FF8CCCF77D17EBBB53F2A27615D2884208A4AF6A
3,517,964 UART: [art] SIG.S = 04E2945E14151673BFBA280FCA836C4DB080146888823576BBC2D18D503C4CFBE79898E9C4DB3FB30FA95F1AF6308023
3,542,044 UART: Caliptra RT
3,542,297 UART: [state] CFI Enabled
3,649,132 UART: [rt] RT listening for mailbox commands...
3,649,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,704 UART: [rt]cmd =0x41544d4e, len=14344
4,331,120 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Unprovisioned
85,624 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,351 UART: [kat] SHA2-256
890,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,590 UART: [kat] SHA2-256
901,530 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,174,444 ready_for_fw is high
1,174,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,891 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,282,032 UART: [fwproc] Recv command 0x46574c44
1,282,765 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,116 >>> mbox cmd response: success
3,317,279 UART: [afmc] ++
3,317,447 UART: [afmc] CDI.KEYID = 6
3,317,810 UART: [afmc] SUBJECT.KEYID = 7
3,318,236 UART: [afmc] AUTHORITY.KEYID = 5
3,353,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,179 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,889 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,779 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,490 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,328 UART: [afmc] --
3,397,444 UART: [cold-reset] --
3,398,260 UART: [state] Locking Datavault
3,399,357 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,961 UART: [state] Locking ICCM
3,400,411 UART: [exit] Launching FMC @ 0x40000130
3,405,740 UART:
3,405,756 UART: Running Caliptra FMC ...
3,406,164 UART:
3,406,307 UART: [state] CFI Enabled
3,416,801 UART: [fht] FMC Alias Private Key: 7
3,525,023 UART: [art] Extend RT PCRs Done
3,525,451 UART: [art] Lock RT PCRs Done
3,526,811 UART: [art] Populate DV Done
3,535,093 UART: [fht] FMC Alias Private Key: 7
3,536,195 UART: [art] Derive CDI
3,536,475 UART: [art] Store in in slot 0x4
3,622,066 UART: [art] Derive Key Pair
3,622,426 UART: [art] Store priv key in slot 0x5
3,635,136 UART: [art] Derive Key Pair - Done
3,650,082 UART: [art] Signing Cert with AUTHO
3,650,562 UART: RITY.KEYID = 7
3,665,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,619 UART: [art] PUB.X = 3B3544493E919574CDED741AEBE8BD35588D428130889042D3054AD4A4A75265309C5C9858FFAED017113EC12D7C8BD4
3,673,386 UART: [art] PUB.Y = C5AC8BD6A1514ABB8CFDDD90D041E6B954C86BF57868C013A5EA3F9D7D18A7DB70965330DBC7CF7028525F17336B605F
3,680,350 UART: [art] SIG.R = 5BAD1914E805D5F17AD61D96D7299E348EDEDB587E2C47BB8E7773F081022ED14336164612D96597ED94A3D8F8498FC7
3,687,116 UART: [art] SIG.S = F9C2D149E7C1E4E0ED08A9A42C1F566547154A299B16478A8669C561CA330EB8F72AA04630B3165B9957A1B2DA7A22D1
3,710,991 UART: Caliptra RT
3,711,336 UART: [state] CFI Enabled
3,819,294 UART: [rt] RT listening for mailbox commands...
3,819,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,070 UART: [rt]cmd =0x41544d4e, len=14344
4,504,183 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,491 ready_for_fw is high
1,056,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,626 >>> mbox cmd response: success
3,233,365 UART:
3,233,381 UART: Running Caliptra FMC ...
3,233,789 UART:
3,233,932 UART: [state] CFI Enabled
3,244,550 UART: [fht] FMC Alias Private Key: 7
3,352,386 UART: [art] Extend RT PCRs Done
3,352,814 UART: [art] Lock RT PCRs Done
3,354,402 UART: [art] Populate DV Done
3,362,528 UART: [fht] FMC Alias Private Key: 7
3,363,650 UART: [art] Derive CDI
3,363,930 UART: [art] Store in in slot 0x4
3,449,707 UART: [art] Derive Key Pair
3,450,067 UART: [art] Store priv key in slot 0x5
3,462,847 UART: [art] Derive Key Pair - Done
3,477,423 UART: [art] Signing Cert with AUTHO
3,477,903 UART: RITY.KEYID = 7
3,493,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,416 UART: [art] PUB.X = 2317D13D17FADB1CB0EAA424D0A0570A75A13A430FDB48EC6D6556BDA20505DC629F775F11BBAFA8060FE01C9A083E77
3,501,181 UART: [art] PUB.Y = A50DCF9DE1548AF73C551060F3F33E4AC631085E7B537EC8BAFD096F94089F5B5BDC74567B87AB73BF1850C287B04F3C
3,508,131 UART: [art] SIG.R = 24EC9F719F7C674BFFD2234A4E9829F91331B46E9B399D6C0C1170CA1FCC8E95226FF65ADD06933C8610709F43456F66
3,514,897 UART: [art] SIG.S = 1DD544E29FA15E214F738DFBC0AC0B0B42A1B09C6AFE9585AC8FC67103144BDA666E17738E939A43A23170F4C114ABA8
3,538,945 UART: Caliptra RT
3,539,290 UART: [state] CFI Enabled
3,647,751 UART: [rt] RT listening for mailbox commands...
3,648,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,527 UART: [rt]cmd =0x41544d4e, len=14344
4,336,616 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
894,980 UART: [kat] SHA2-512-ACC
896,881 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,477,097 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 ready_for_fw is high
1,481,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,166 UART: [idev] Erasing UDS.KEYID = 0
1,505,756 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,328 UART: [idev] --
1,515,435 UART: [ldev] ++
1,515,603 UART: [ldev] CDI.KEYID = 6
1,515,966 UART: [ldev] SUBJECT.KEYID = 5
1,516,392 UART: [ldev] AUTHORITY.KEYID = 7
1,516,855 UART: [ldev] FE.KEYID = 1
1,521,835 UART: [ldev] Erasing FE.KEYID = 1
1,547,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,656 UART: [ldev] --
1,586,959 UART: [fwproc] Waiting for Commands...
1,587,612 UART: [fwproc] Received command 0x46574c44
1,588,403 UART: [fwproc] Received Image of size 114332 bytes
5,348,610 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,376,190 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,405,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,541,455 >>> mbox cmd response: success
5,542,561 UART: [afmc] ++
5,542,729 UART: [afmc] CDI.KEYID = 6
5,543,091 UART: [afmc] SUBJECT.KEYID = 7
5,543,516 UART: [afmc] AUTHORITY.KEYID = 5
5,578,526 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,594,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,595,564 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,601,273 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,607,165 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,612,866 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,826 UART: [afmc] --
5,621,764 UART: [cold-reset] --
5,622,568 UART: [state] Locking Datavault
5,623,743 UART: [state] Locking PCR0, PCR1 and PCR31
5,624,347 UART: [state] Locking ICCM
5,624,791 UART: [exit] Launching FMC @ 0x40000130
5,630,120 UART:
5,630,136 UART: Running Caliptra FMC ...
5,630,544 UART:
5,630,598 UART: [state] CFI Enabled
5,641,100 UART: [fht] FMC Alias Private Key: 7
5,749,220 UART: [art] Extend RT PCRs Done
5,749,648 UART: [art] Lock RT PCRs Done
5,751,502 UART: [art] Populate DV Done
5,760,092 UART: [fht] FMC Alias Private Key: 7
5,761,172 UART: [art] Derive CDI
5,761,452 UART: [art] Store in in slot 0x4
5,846,883 UART: [art] Derive Key Pair
5,847,243 UART: [art] Store priv key in slot 0x5
5,860,467 UART: [art] Derive Key Pair - Done
5,875,325 UART: [art] Signing Cert with AUTHO
5,875,805 UART: RITY.KEYID = 7
5,890,935 UART: [art] Erasing AUTHORITY.KEYID = 7
5,891,700 UART: [art] PUB.X = 66532B9A242BC770BA055F1A91A6A5F3C57BF4BF49FCA94020154A44E491DC11CBD13DB47521BC5930D67BC875CD5928
5,898,475 UART: [art] PUB.Y = EB8DF6E3B6445E16765A3F1CB7FE4A7F21A14F99C81F09C58EE48BA3BF17674D9371668EF39841F2076E887AFDA6C175
5,905,429 UART: [art] SIG.R = 3CA9275B2643615EEDF973A48C7E065D5E08C33FE1D6CB0BEE6F535BC5D99A61B3464C021108BEF23604F520ACE92620
5,912,189 UART: [art] SIG.S = 48C98894E397B792803DB2D19770E1EB9A6CA795695393D5729932B95949B0051E3A4084F5ABFA67E714F388CDE65776
5,936,053 UART: Caliptra RT
5,936,306 UART: [state] CFI Enabled
6,044,228 UART: [rt] RT listening for mailbox commands...
6,044,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,964 UART: [rt]cmd =0x41544d4e, len=14344
6,453,912 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,453 ready_for_fw is high
1,363,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,239,161 >>> mbox cmd response: success
5,300,456 UART:
5,300,472 UART: Running Caliptra FMC ...
5,300,880 UART:
5,300,934 UART: [state] CFI Enabled
5,311,280 UART: [fht] FMC Alias Private Key: 7
5,419,826 UART: [art] Extend RT PCRs Done
5,420,254 UART: [art] Lock RT PCRs Done
5,421,842 UART: [art] Populate DV Done
5,430,180 UART: [fht] FMC Alias Private Key: 7
5,431,174 UART: [art] Derive CDI
5,431,454 UART: [art] Store in in slot 0x4
5,517,071 UART: [art] Derive Key Pair
5,517,431 UART: [art] Store priv key in slot 0x5
5,530,421 UART: [art] Derive Key Pair - Done
5,545,301 UART: [art] Signing Cert with AUTHO
5,545,781 UART: RITY.KEYID = 7
5,561,061 UART: [art] Erasing AUTHORITY.KEYID = 7
5,561,826 UART: [art] PUB.X = EBC4517C5E50254CBDF4F62D381635F5EBA2A0CFCBD615E15C12A6047EBFCA8B9C69308BB6BDC65F86EC0C2BD3B33BF2
5,568,618 UART: [art] PUB.Y = 19B7B240C4AE39D01E8EBEBEFB31BD6B76C13FA6BE65148E8669D0437E31392B753BE092E992737A42C1011AB93B600C
5,575,570 UART: [art] SIG.R = 211C6B2BD31C68AD69BA9259908D23D148E6F3AF716DEBFC293EA7E43F64CED2595223D31E4970132D394FD40928DBDB
5,582,347 UART: [art] SIG.S = 7B89CF9527ECBAA45BC868F99FFD052A7B6645597F8E0919DED38AE85FAEF654A34A1767B0575782BCE444B6E49620DC
5,606,434 UART: Caliptra RT
5,606,687 UART: [state] CFI Enabled
5,715,167 UART: [rt] RT listening for mailbox commands...
5,715,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,857 UART: [rt]cmd =0x41544d4e, len=14344
6,124,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 ready_for_fw is high
1,480,954 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,333 UART: [idev] Erasing UDS.KEYID = 0
1,505,451 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,521,880 UART: [ldev] Erasing FE.KEYID = 1
1,547,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,535 UART: [ldev] --
1,586,808 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 114332 bytes
5,045,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,072,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,102,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,238,080 >>> mbox cmd response: success
5,239,296 UART: [afmc] ++
5,239,464 UART: [afmc] CDI.KEYID = 6
5,239,826 UART: [afmc] SUBJECT.KEYID = 7
5,240,251 UART: [afmc] AUTHORITY.KEYID = 5
5,275,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,291,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,292,739 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,298,448 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,304,340 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,310,041 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,318,037 UART: [afmc] --
5,318,969 UART: [cold-reset] --
5,319,893 UART: [state] Locking Datavault
5,321,160 UART: [state] Locking PCR0, PCR1 and PCR31
5,321,764 UART: [state] Locking ICCM
5,322,252 UART: [exit] Launching FMC @ 0x40000130
5,327,581 UART:
5,327,597 UART: Running Caliptra FMC ...
5,328,005 UART:
5,328,148 UART: [state] CFI Enabled
5,338,618 UART: [fht] FMC Alias Private Key: 7
5,446,560 UART: [art] Extend RT PCRs Done
5,446,988 UART: [art] Lock RT PCRs Done
5,448,620 UART: [art] Populate DV Done
5,456,876 UART: [fht] FMC Alias Private Key: 7
5,457,906 UART: [art] Derive CDI
5,458,186 UART: [art] Store in in slot 0x4
5,544,199 UART: [art] Derive Key Pair
5,544,559 UART: [art] Store priv key in slot 0x5
5,558,093 UART: [art] Derive Key Pair - Done
5,572,875 UART: [art] Signing Cert with AUTHO
5,573,355 UART: RITY.KEYID = 7
5,588,871 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,636 UART: [art] PUB.X = D3DB13AA0738E6ACBC8841C2BDFC3F90E22C44D98F27CA1DB6FE2E3E05DC2EEA76AC45146C21907F0A8C0D692158FCA2
5,596,418 UART: [art] PUB.Y = 1AFDCA6ACE6A0C0493334E8C07A9EB5DD37821D2BB7C5AF372B152D429A76545025918BD90059167016CC51222F63F20
5,603,352 UART: [art] SIG.R = 080F6391FC9F6BF3F7BF604D2F92F3D92DA8212A6ADF093318E00471CBBB5EB9445B15CF3FC3AAD779C7B4C11BA80404
5,610,120 UART: [art] SIG.S = F8C7B97B6832BCB22781E86326222D10F1C34FD500811D95E94F8DDF21318F78A709C3AF0315C6DF4F00DB8340D0D971
5,634,055 UART: Caliptra RT
5,634,400 UART: [state] CFI Enabled
5,742,091 UART: [rt] RT listening for mailbox commands...
5,742,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,583 UART: [rt]cmd =0x41544d4e, len=14344
6,159,258 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,014 ready_for_fw is high
1,362,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,353,179 >>> mbox cmd response: success
5,415,612 UART:
5,415,628 UART: Running Caliptra FMC ...
5,416,036 UART:
5,416,179 UART: [state] CFI Enabled
5,426,841 UART: [fht] FMC Alias Private Key: 7
5,535,195 UART: [art] Extend RT PCRs Done
5,535,623 UART: [art] Lock RT PCRs Done
5,537,007 UART: [art] Populate DV Done
5,545,263 UART: [fht] FMC Alias Private Key: 7
5,546,403 UART: [art] Derive CDI
5,546,683 UART: [art] Store in in slot 0x4
5,632,368 UART: [art] Derive Key Pair
5,632,728 UART: [art] Store priv key in slot 0x5
5,645,992 UART: [art] Derive Key Pair - Done
5,660,714 UART: [art] Signing Cert with AUTHO
5,661,194 UART: RITY.KEYID = 7
5,676,360 UART: [art] Erasing AUTHORITY.KEYID = 7
5,677,125 UART: [art] PUB.X = B117F461EDD481991F13B79895A72950CA068BF35EA60F8C20CDB3C567F118E1BEC6F0C7033127B8774F0AB67943B29E
5,683,887 UART: [art] PUB.Y = 17E1CCCC62F390B46E580CCBA25778E8DEE33D56FFAAEE45D91EC1BD96A468B098C21ECFD015C9C17E31AA14046C00EA
5,690,833 UART: [art] SIG.R = 49715DB6CB23DB56215AA4FF5721DB82F7EABABCFD9D6FEE06533D7E7BDB5790C524D8BFBC7BE6BE4C9A0C836B60BC44
5,697,627 UART: [art] SIG.S = 4A5007D7994AADACD365486E30DC03EA6B254A79FB5C9BDC8F9ED93C42CB798DC616CDF7C0BA1FEF394ABB3E5DA84595
5,721,278 UART: Caliptra RT
5,721,623 UART: [state] CFI Enabled
5,829,693 UART: [rt] RT listening for mailbox commands...
5,830,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,579 UART: [rt]cmd =0x41544d4e, len=14344
6,239,383 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
893,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,739 UART: [kat] ++
897,891 UART: [kat] sha1
902,049 UART: [kat] SHA2-256
903,989 UART: [kat] SHA2-384
906,896 UART: [kat] SHA2-512-ACC
908,797 UART: [kat] ECC-384
918,636 UART: [kat] HMAC-384Kdf
923,122 UART: [kat] LMS
1,171,450 UART: [kat] --
1,172,621 UART: [cold-reset] ++
1,173,171 UART: [fht] FHT @ 0x50003400
1,175,934 UART: [idev] ++
1,176,102 UART: [idev] CDI.KEYID = 6
1,176,462 UART: [idev] SUBJECT.KEYID = 7
1,176,886 UART: [idev] UDS.KEYID = 0
1,177,231 ready_for_fw is high
1,177,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,880 UART: [idev] Erasing UDS.KEYID = 0
1,201,919 UART: [idev] Sha1 KeyId Algorithm
1,210,527 UART: [idev] --
1,211,541 UART: [ldev] ++
1,211,709 UART: [ldev] CDI.KEYID = 6
1,212,072 UART: [ldev] SUBJECT.KEYID = 5
1,212,498 UART: [ldev] AUTHORITY.KEYID = 7
1,212,961 UART: [ldev] FE.KEYID = 1
1,217,903 UART: [ldev] Erasing FE.KEYID = 1
1,244,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,455 UART: [ldev] --
1,283,886 UART: [fwproc] Wait for Commands...
1,284,614 UART: [fwproc] Recv command 0x46574c44
1,285,342 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,206 >>> mbox cmd response: success
3,324,290 UART: [afmc] ++
3,324,458 UART: [afmc] CDI.KEYID = 6
3,324,820 UART: [afmc] SUBJECT.KEYID = 7
3,325,245 UART: [afmc] AUTHORITY.KEYID = 5
3,360,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,388 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,097 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,989 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,700 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,523 UART: [afmc] --
3,403,589 UART: [cold-reset] --
3,404,307 UART: [state] Locking Datavault
3,405,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,080 UART: [state] Locking ICCM
3,406,680 UART: [exit] Launching FMC @ 0x40000130
3,412,009 UART:
3,412,025 UART: Running Caliptra FMC ...
3,412,433 UART:
3,412,487 UART: [state] CFI Enabled
3,423,099 UART: [fht] FMC Alias Private Key: 7
3,530,447 UART: [art] Extend RT PCRs Done
3,530,875 UART: [art] Lock RT PCRs Done
3,532,493 UART: [art] Populate DV Done
3,540,573 UART: [fht] FMC Alias Private Key: 7
3,541,559 UART: [art] Derive CDI
3,541,839 UART: [art] Store in in slot 0x4
3,627,702 UART: [art] Derive Key Pair
3,628,062 UART: [art] Store priv key in slot 0x5
3,640,858 UART: [art] Derive Key Pair - Done
3,655,802 UART: [art] Signing Cert with AUTHO
3,656,282 UART: RITY.KEYID = 7
3,671,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,411 UART: [art] PUB.X = CB5338A772A9B483E7C3283E9A1DE692F5DF68014027A33524CDD33696F53ACEA2D4295C50241B95ACA946CF12073D87
3,679,177 UART: [art] PUB.Y = 48DF51FDDBB430C06A38A6554EF066F21EEE9CAE1D0172DC7EAB9A6A10D7AED2E1DD407725715E8D6F1B7A03BCC4857B
3,686,145 UART: [art] SIG.R = 7E0559BA88509237DB469164EBC80D082CCCADB0C0EB42AF57D724941943C0D922EDF1D4B25B75308355971A04FFEC8F
3,692,911 UART: [art] SIG.S = 6795BF5845F9417355DD7BC8E4996CCA972AB09D1861CD4EF5CAE711246BDEAD5C2B54857B1B9B59D1012CFAD16E948E
3,716,409 UART: Caliptra RT
3,716,662 UART: [state] CFI Enabled
3,824,129 UART: [rt] RT listening for mailbox commands...
3,824,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,739 UART: [rt]cmd =0x41544d4e, len=14344
4,236,132 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,581 ready_for_fw is high
1,060,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,832 >>> mbox cmd response: success
3,238,427 UART:
3,238,443 UART: Running Caliptra FMC ...
3,238,851 UART:
3,238,905 UART: [state] CFI Enabled
3,249,495 UART: [fht] FMC Alias Private Key: 7
3,357,481 UART: [art] Extend RT PCRs Done
3,357,909 UART: [art] Lock RT PCRs Done
3,359,539 UART: [art] Populate DV Done
3,368,009 UART: [fht] FMC Alias Private Key: 7
3,369,129 UART: [art] Derive CDI
3,369,409 UART: [art] Store in in slot 0x4
3,455,008 UART: [art] Derive Key Pair
3,455,368 UART: [art] Store priv key in slot 0x5
3,467,976 UART: [art] Derive Key Pair - Done
3,482,764 UART: [art] Signing Cert with AUTHO
3,483,244 UART: RITY.KEYID = 7
3,498,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,907 UART: [art] PUB.X = AD5D16E1CCF561C8D81ABA2620BDBDFC8E38E30BCFAD78378F78343A97F9A1E6A61286593483FDA154548A1A29556277
3,505,684 UART: [art] PUB.Y = F7069C138AC427EE005717E81BDCE9C82A68607A77DEA42F2C7A2DF94F1258410CD49D7830E08D5EED71014B8E8CF857
3,512,611 UART: [art] SIG.R = E61EF0105E554CB2498DE9ACB69A8A7758AA9332D7777C98267BCE59E1B89C4FC587F544A6996D9160DAD32A04124E08
3,519,379 UART: [art] SIG.S = 5C87E93D95AECA902967F53B5A68BA4A925521A65B30199B138A41EB4BAB2E69ECA90714CADA31164DDA173C3D64E835
3,543,349 UART: Caliptra RT
3,543,602 UART: [state] CFI Enabled
3,651,356 UART: [rt] RT listening for mailbox commands...
3,652,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,902 UART: [rt]cmd =0x41544d4e, len=14344
4,058,215 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,417 UART: [kat] SHA2-256
893,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,192 UART: [kat] ++
897,344 UART: [kat] sha1
901,564 UART: [kat] SHA2-256
903,504 UART: [kat] SHA2-384
906,283 UART: [kat] SHA2-512-ACC
908,184 UART: [kat] ECC-384
917,879 UART: [kat] HMAC-384Kdf
922,507 UART: [kat] LMS
1,170,835 UART: [kat] --
1,171,510 UART: [cold-reset] ++
1,171,974 UART: [fht] FHT @ 0x50003400
1,174,597 UART: [idev] ++
1,174,765 UART: [idev] CDI.KEYID = 6
1,175,125 UART: [idev] SUBJECT.KEYID = 7
1,175,549 UART: [idev] UDS.KEYID = 0
1,175,894 ready_for_fw is high
1,175,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,200,674 UART: [idev] Sha1 KeyId Algorithm
1,209,088 UART: [idev] --
1,210,070 UART: [ldev] ++
1,210,238 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,027 UART: [ldev] AUTHORITY.KEYID = 7
1,211,490 UART: [ldev] FE.KEYID = 1
1,216,848 UART: [ldev] Erasing FE.KEYID = 1
1,243,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,538 UART: [ldev] --
1,282,873 UART: [fwproc] Wait for Commands...
1,283,673 UART: [fwproc] Recv command 0x46574c44
1,284,401 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,241 >>> mbox cmd response: success
3,318,281 UART: [afmc] ++
3,318,449 UART: [afmc] CDI.KEYID = 6
3,318,811 UART: [afmc] SUBJECT.KEYID = 7
3,319,236 UART: [afmc] AUTHORITY.KEYID = 5
3,354,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,249 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,958 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,850 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,561 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,560 UART: [afmc] --
3,398,448 UART: [cold-reset] --
3,399,296 UART: [state] Locking Datavault
3,400,609 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,213 UART: [state] Locking ICCM
3,401,687 UART: [exit] Launching FMC @ 0x40000130
3,407,016 UART:
3,407,032 UART: Running Caliptra FMC ...
3,407,440 UART:
3,407,583 UART: [state] CFI Enabled
3,418,085 UART: [fht] FMC Alias Private Key: 7
3,526,209 UART: [art] Extend RT PCRs Done
3,526,637 UART: [art] Lock RT PCRs Done
3,528,389 UART: [art] Populate DV Done
3,536,807 UART: [fht] FMC Alias Private Key: 7
3,537,873 UART: [art] Derive CDI
3,538,153 UART: [art] Store in in slot 0x4
3,623,582 UART: [art] Derive Key Pair
3,623,942 UART: [art] Store priv key in slot 0x5
3,637,332 UART: [art] Derive Key Pair - Done
3,651,904 UART: [art] Signing Cert with AUTHO
3,652,384 UART: RITY.KEYID = 7
3,667,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,579 UART: [art] PUB.X = F5FF20F952AA6AFFA99255AA1BE8A78589D92A032679C177862D3A388502F5ADE168D9808F6919F2A554E20CDDDC1675
3,675,346 UART: [art] PUB.Y = 15DA53739F6383E797C1C1B2F5F0BC421BEC2F38100E2AA42DEFB23C6CC3197FACC105AD4282A30B46224DFE9B3BAAD3
3,682,307 UART: [art] SIG.R = 1BCBA3824C14D0001CE05E0E5731C9C0554435B1011E6A85BAC0B181AE334CA291EA7DEFEDBADEA918DC30AD6E2E5198
3,689,069 UART: [art] SIG.S = BC14166C5931C014FE56432C77D395B0E6566BAD0987FCF3C0F61D8FFB66F03132CAB56B740D32AACC1982A91ED24399
3,712,888 UART: Caliptra RT
3,713,233 UART: [state] CFI Enabled
3,820,385 UART: [rt] RT listening for mailbox commands...
3,821,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,123 UART: [rt]cmd =0x41544d4e, len=14344
4,227,272 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,380 ready_for_fw is high
1,060,380 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,184 >>> mbox cmd response: success
3,236,401 UART:
3,236,417 UART: Running Caliptra FMC ...
3,236,825 UART:
3,236,968 UART: [state] CFI Enabled
3,247,452 UART: [fht] FMC Alias Private Key: 7
3,355,524 UART: [art] Extend RT PCRs Done
3,355,952 UART: [art] Lock RT PCRs Done
3,357,532 UART: [art] Populate DV Done
3,365,680 UART: [fht] FMC Alias Private Key: 7
3,366,756 UART: [art] Derive CDI
3,367,036 UART: [art] Store in in slot 0x4
3,452,685 UART: [art] Derive Key Pair
3,453,045 UART: [art] Store priv key in slot 0x5
3,467,127 UART: [art] Derive Key Pair - Done
3,481,972 UART: [art] Signing Cert with AUTHO
3,482,452 UART: RITY.KEYID = 7
3,497,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,697 UART: [art] PUB.X = D3218C1F3388CDECE702AFA6AD8B8B8C5705B3290D065C2D49BD012B99B4A35EAD90BE3F3AD060E84FB4FAD8A7378D93
3,505,472 UART: [art] PUB.Y = D6DBCC207692E3419238F19E9FF628D6D5A5E96661FE2B13BEB8EF5B04028C98D41101030DB043CDBDA44416E01A15F6
3,512,415 UART: [art] SIG.R = C54C41B8194F38751460FC636A2D8C20F5FAB89B6E3D5D0CF5B410D5D84C03D09DF81D14B9501B9008BC161142FE5B50
3,519,182 UART: [art] SIG.S = F12AE729D6DA2AF5CD47A98E4F198AAE6B710E69596081C9A928579160D59EDE13A9DB5AECBCBC5A2514184874395550
3,543,250 UART: Caliptra RT
3,543,595 UART: [state] CFI Enabled
3,650,916 UART: [rt] RT listening for mailbox commands...
3,651,586 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,250 UART: [rt]cmd =0x41544d4e, len=14344
4,062,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,174,203 ready_for_fw is high
1,174,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,286 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,080 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 114332 bytes
3,114,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,306,578 >>> mbox cmd response: success
3,307,637 UART: [afmc] ++
3,307,805 UART: [afmc] CDI.KEYID = 6
3,308,168 UART: [afmc] SUBJECT.KEYID = 7
3,308,594 UART: [afmc] AUTHORITY.KEYID = 5
3,343,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,985 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,695 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,585 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,296 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,162 UART: [afmc] --
3,387,158 UART: [cold-reset] --
3,388,036 UART: [state] Locking Datavault
3,389,253 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,857 UART: [state] Locking ICCM
3,390,507 UART: [exit] Launching FMC @ 0x40000130
3,395,836 UART:
3,395,852 UART: Running Caliptra FMC ...
3,396,260 UART:
3,396,314 UART: [state] CFI Enabled
3,407,152 UART: [fht] FMC Alias Private Key: 7
3,515,292 UART: [art] Extend RT PCRs Done
3,515,720 UART: [art] Lock RT PCRs Done
3,517,308 UART: [art] Populate DV Done
3,525,498 UART: [fht] FMC Alias Private Key: 7
3,526,462 UART: [art] Derive CDI
3,526,742 UART: [art] Store in in slot 0x4
3,612,437 UART: [art] Derive Key Pair
3,612,797 UART: [art] Store priv key in slot 0x5
3,626,241 UART: [art] Derive Key Pair - Done
3,640,867 UART: [art] Signing Cert with AUTHO
3,641,347 UART: RITY.KEYID = 7
3,656,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,322 UART: [art] PUB.X = C08BB7AB2E094CD439CEACBCD1C7AEFA02A3A1A6EEE7E9E05271277B98234B9134C5A9C08E3EAD5B6AA20D78A8108DF9
3,664,109 UART: [art] PUB.Y = 7294CAA468E8D39D449F15647DF8419E092BCEB789DFC3FA1173509B398E9723782B1E742B68CE455157AB23B6BDB4CD
3,671,062 UART: [art] SIG.R = 62EF0E11E296F10B8280BBFD165632A5E5F202BA03585A9C289957ADCA1DA5B877D8CCFA25555022C33DE8C2C0D36E69
3,677,830 UART: [art] SIG.S = E77D64DB6DA3A6E40C865D3890B7A9F82624AF0269251F19955D5E2F39F21518189122A5C463EB49A4007B466256EB30
3,701,231 UART: Caliptra RT
3,701,484 UART: [state] CFI Enabled
3,809,102 UART: [rt] RT listening for mailbox commands...
3,809,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,828 UART: [rt]cmd =0x41544d4e, len=14344
4,216,313 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 ready_for_fw is high
1,056,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,406 >>> mbox cmd response: success
3,234,097 UART:
3,234,113 UART: Running Caliptra FMC ...
3,234,521 UART:
3,234,575 UART: [state] CFI Enabled
3,245,033 UART: [fht] FMC Alias Private Key: 7
3,352,377 UART: [art] Extend RT PCRs Done
3,352,805 UART: [art] Lock RT PCRs Done
3,354,593 UART: [art] Populate DV Done
3,362,855 UART: [fht] FMC Alias Private Key: 7
3,363,797 UART: [art] Derive CDI
3,364,077 UART: [art] Store in in slot 0x4
3,449,678 UART: [art] Derive Key Pair
3,450,038 UART: [art] Store priv key in slot 0x5
3,463,870 UART: [art] Derive Key Pair - Done
3,478,442 UART: [art] Signing Cert with AUTHO
3,478,922 UART: RITY.KEYID = 7
3,494,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,903 UART: [art] PUB.X = 046C1B1165E8394E9033D9F5AAC48ADB705037B595EA12C0F363474F52E23F83A1468ED6B09450F34833042D79D1A588
3,501,661 UART: [art] PUB.Y = A7B3F1D120937EF5F00439217A035F338595456D8568352C35D53D039C6DC79E528392C7C211EDDCBE1812DD6087DE4D
3,508,600 UART: [art] SIG.R = FAA6E4B2DCB53615262BD35460A0A2281CE4FB18A2ACBB7855F99BE63811527F83B61924355CD02A788B4751B6CD681A
3,515,376 UART: [art] SIG.S = C63DC6DBD7A364EB42E8E1CA987530C9FAFACF24743E791D752B8DB4119F420056D6EB30F95CBCD45D1E51021F8A608D
3,539,084 UART: Caliptra RT
3,539,337 UART: [state] CFI Enabled
3,647,636 UART: [rt] RT listening for mailbox commands...
3,648,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,114 UART: [rt]cmd =0x41544d4e, len=14344
4,054,905 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 ready_for_fw is high
1,174,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,198,644 UART: [idev] Sha1 KeyId Algorithm
1,207,498 UART: [idev] --
1,208,483 UART: [ldev] ++
1,208,651 UART: [ldev] CDI.KEYID = 6
1,209,015 UART: [ldev] SUBJECT.KEYID = 5
1,209,442 UART: [ldev] AUTHORITY.KEYID = 7
1,209,905 UART: [ldev] FE.KEYID = 1
1,215,183 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,957 UART: [fwproc] Wait for Commands...
1,281,670 UART: [fwproc] Recv command 0x46574c44
1,282,403 UART: [fwproc] Recv'd Img size: 114332 bytes
3,114,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,308,021 >>> mbox cmd response: success
3,309,230 UART: [afmc] ++
3,309,398 UART: [afmc] CDI.KEYID = 6
3,309,761 UART: [afmc] SUBJECT.KEYID = 7
3,310,187 UART: [afmc] AUTHORITY.KEYID = 5
3,346,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,890 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,600 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,490 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,201 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,163 UART: [afmc] --
3,390,195 UART: [cold-reset] --
3,391,157 UART: [state] Locking Datavault
3,392,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,142 UART: [state] Locking ICCM
3,393,706 UART: [exit] Launching FMC @ 0x40000130
3,399,035 UART:
3,399,051 UART: Running Caliptra FMC ...
3,399,459 UART:
3,399,602 UART: [state] CFI Enabled
3,410,166 UART: [fht] FMC Alias Private Key: 7
3,517,500 UART: [art] Extend RT PCRs Done
3,517,928 UART: [art] Lock RT PCRs Done
3,519,500 UART: [art] Populate DV Done
3,527,766 UART: [fht] FMC Alias Private Key: 7
3,528,816 UART: [art] Derive CDI
3,529,096 UART: [art] Store in in slot 0x4
3,615,339 UART: [art] Derive Key Pair
3,615,699 UART: [art] Store priv key in slot 0x5
3,628,507 UART: [art] Derive Key Pair - Done
3,643,380 UART: [art] Signing Cert with AUTHO
3,643,860 UART: RITY.KEYID = 7
3,659,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,987 UART: [art] PUB.X = 0CC26639E79AF5A59AE38B3EF145B09EDAE3B7D2662C3564E0A60AA87B5C0D1E4E0E7B283600A08817AB77F58C92DF23
3,666,735 UART: [art] PUB.Y = 0406FA778103EB5DC0DF0525B505DBADEE9CD87B6994D0232BBC07E303CEEA58E1551205ABE7DB910D38AD3D1FDD74ED
3,673,680 UART: [art] SIG.R = 8ABB1E0CC709598546A7A151428403B363D9612158E98A4D5E4A29120570391BED80C151339AF4B6AADF921DA8379C92
3,680,434 UART: [art] SIG.S = 4FA94E0342036FD86FDB3401077606210503DFADB05D2B18BBE5D19C27DBF423640EA828A7A771D0911C25EDDB8D4E5A
3,704,005 UART: Caliptra RT
3,704,350 UART: [state] CFI Enabled
3,812,142 UART: [rt] RT listening for mailbox commands...
3,812,812 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,886 UART: [rt]cmd =0x41544d4e, len=14344
4,221,314 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,023 ready_for_fw is high
1,057,023 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,980 >>> mbox cmd response: success
3,230,757 UART:
3,230,773 UART: Running Caliptra FMC ...
3,231,181 UART:
3,231,324 UART: [state] CFI Enabled
3,242,170 UART: [fht] FMC Alias Private Key: 7
3,350,372 UART: [art] Extend RT PCRs Done
3,350,800 UART: [art] Lock RT PCRs Done
3,352,298 UART: [art] Populate DV Done
3,360,332 UART: [fht] FMC Alias Private Key: 7
3,361,352 UART: [art] Derive CDI
3,361,632 UART: [art] Store in in slot 0x4
3,447,423 UART: [art] Derive Key Pair
3,447,783 UART: [art] Store priv key in slot 0x5
3,460,555 UART: [art] Derive Key Pair - Done
3,475,209 UART: [art] Signing Cert with AUTHO
3,475,689 UART: RITY.KEYID = 7
3,490,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,566 UART: [art] PUB.X = 7CB29C4059FEFA994B35A93FCAAC8931F7266BBB56AC8ADFD9A7037F663E8E3181A4E28D18E8B5E7155CF280ADA09058
3,498,349 UART: [art] PUB.Y = BDF677E9400525CD7229F4FFDFF06FF843B7FA5D17E2FA857F566A77E2547A96FA4E876D54E911AF738EB679AD95FC9D
3,505,312 UART: [art] SIG.R = 3588B21037F03A3CABCD30645085225177A930F47BA19C0C01FA1C170CD1F206406BA62BA384B5268556463C3947AE31
3,512,064 UART: [art] SIG.S = 6681E1FFE889696F7301706E9263B39DBD0C65C744F981FF4C1739EAF03C2BD7607FDD468FB9A131C7EBF3684EA4B12D
3,535,089 UART: Caliptra RT
3,535,434 UART: [state] CFI Enabled
3,642,973 UART: [rt] RT listening for mailbox commands...
3,643,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,675 UART: [rt]cmd =0x41544d4e, len=14344
4,047,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,381 UART: [kat] SHA2-256
882,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,427 UART: [kat] ++
886,579 UART: [kat] sha1
890,799 UART: [kat] SHA2-256
892,737 UART: [kat] SHA2-384
895,586 UART: [kat] SHA2-512-ACC
897,487 UART: [kat] ECC-384
902,690 UART: [kat] HMAC-384Kdf
907,090 UART: [kat] LMS
1,475,286 UART: [kat] --
1,476,383 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,566 UART: [idev] ++
1,479,734 UART: [idev] CDI.KEYID = 6
1,480,094 UART: [idev] SUBJECT.KEYID = 7
1,480,518 UART: [idev] UDS.KEYID = 0
1,480,863 ready_for_fw is high
1,480,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,004 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,514,117 UART: [ldev] ++
1,514,285 UART: [ldev] CDI.KEYID = 6
1,514,648 UART: [ldev] SUBJECT.KEYID = 5
1,515,074 UART: [ldev] AUTHORITY.KEYID = 7
1,515,537 UART: [ldev] FE.KEYID = 1
1,520,883 UART: [ldev] Erasing FE.KEYID = 1
1,545,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,060 UART: [ldev] --
1,585,389 UART: [fwproc] Waiting for Commands...
1,586,086 UART: [fwproc] Received command 0x46574c44
1,586,877 UART: [fwproc] Received Image of size 114332 bytes
5,157,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,351,520 >>> mbox cmd response: success
5,352,602 UART: [afmc] ++
5,352,770 UART: [afmc] CDI.KEYID = 6
5,353,132 UART: [afmc] SUBJECT.KEYID = 7
5,353,557 UART: [afmc] AUTHORITY.KEYID = 5
5,388,693 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,539 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,248 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,140 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,841 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,537 UART: [afmc] --
5,431,583 UART: [cold-reset] --
5,432,501 UART: [state] Locking Datavault
5,433,482 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,086 UART: [state] Locking ICCM
5,434,634 UART: [exit] Launching FMC @ 0x40000130
5,439,963 UART:
5,439,979 UART: Running Caliptra FMC ...
5,440,387 UART:
5,440,441 UART: [state] CFI Enabled
5,451,163 UART: [fht] FMC Alias Private Key: 7
5,559,235 UART: [art] Extend RT PCRs Done
5,559,663 UART: [art] Lock RT PCRs Done
5,561,423 UART: [art] Populate DV Done
5,569,451 UART: [fht] FMC Alias Private Key: 7
5,570,545 UART: [art] Derive CDI
5,570,825 UART: [art] Store in in slot 0x4
5,656,350 UART: [art] Derive Key Pair
5,656,710 UART: [art] Store priv key in slot 0x5
5,670,452 UART: [art] Derive Key Pair - Done
5,685,569 UART: [art] Signing Cert with AUTHO
5,686,049 UART: RITY.KEYID = 7
5,701,223 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,988 UART: [art] PUB.X = EE29ED0C0DBE3C235FF1046A681D899A839CA5997472C6F31D002827226BB7F16252F3F4B5DE8A2654AFC4687637A6C4
5,708,731 UART: [art] PUB.Y = B5134388C100EA03BBF574DA04AAE5EFB7AB752A421A52F3A70CB4E8882910B2D8FDF2FCB32E37C827C392B90AEF8F2A
5,715,667 UART: [art] SIG.R = 8CDBDB1D6E22BC14979B9F686EDCEF25E358D07FDFC793920FCF0AAC798A10802FDD350B8E22F33112D277CFA7400ED6
5,722,445 UART: [art] SIG.S = FD6298E893004EC1CD04F2134A2C0277E6AB5AD8A95393CCBE477755E9BE00400A812F81A5229CD39247CA4072AB8C74
5,746,465 UART: Caliptra RT
5,746,718 UART: [state] CFI Enabled
5,854,972 UART: [rt] RT listening for mailbox commands...
5,855,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,778 UART: [rt]cmd =0x41544d4e, len=14344
6,266,881 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,149 ready_for_fw is high
1,362,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,277,942 >>> mbox cmd response: success
5,340,173 UART:
5,340,189 UART: Running Caliptra FMC ...
5,340,597 UART:
5,340,651 UART: [state] CFI Enabled
5,351,241 UART: [fht] FMC Alias Private Key: 7
5,459,767 UART: [art] Extend RT PCRs Done
5,460,195 UART: [art] Lock RT PCRs Done
5,461,455 UART: [art] Populate DV Done
5,469,467 UART: [fht] FMC Alias Private Key: 7
5,470,437 UART: [art] Derive CDI
5,470,717 UART: [art] Store in in slot 0x4
5,556,578 UART: [art] Derive Key Pair
5,556,938 UART: [art] Store priv key in slot 0x5
5,570,548 UART: [art] Derive Key Pair - Done
5,585,367 UART: [art] Signing Cert with AUTHO
5,585,847 UART: RITY.KEYID = 7
5,600,879 UART: [art] Erasing AUTHORITY.KEYID = 7
5,601,644 UART: [art] PUB.X = 293DD7974D4210DE2B9EE7512FC086AC50EC5CC1819F0A6FFFE6BADBB9F04A01CAFFFC970859E8D844FA1F4D30449F5D
5,608,429 UART: [art] PUB.Y = 76550CFA3D98FB52E99B740FE27BA40E6F1592FC68B58712CCA968B201DC400A8B2D3288F9FA8A6687495C7969AA73B3
5,615,370 UART: [art] SIG.R = 7B66B24D83F850356E91BC63E18BADAB3AF246AABBA76D08940C718D538340A6B1391725CF07551CFAEFC934630E5C60
5,622,136 UART: [art] SIG.S = AB689C574F0E5225FD3FDD6008C0BC731E485450FC284F7D12BDA0F1185CEA31B011646B80477C431B33DC8D072D80C3
5,645,698 UART: Caliptra RT
5,645,951 UART: [state] CFI Enabled
5,753,974 UART: [rt] RT listening for mailbox commands...
5,754,644 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,728 UART: [rt]cmd =0x41544d4e, len=14344
6,170,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,788 UART: [kat] SHA2-256
882,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,834 UART: [kat] ++
886,986 UART: [kat] sha1
891,154 UART: [kat] SHA2-256
893,092 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,251 UART: [kat] HMAC-384Kdf
907,969 UART: [kat] LMS
1,476,165 UART: [kat] --
1,477,116 UART: [cold-reset] ++
1,477,686 UART: [fht] Storing FHT @ 0x50003400
1,480,285 UART: [idev] ++
1,480,453 UART: [idev] CDI.KEYID = 6
1,480,813 UART: [idev] SUBJECT.KEYID = 7
1,481,237 UART: [idev] UDS.KEYID = 0
1,481,582 ready_for_fw is high
1,481,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,241 UART: [idev] Erasing UDS.KEYID = 0
1,505,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,579 UART: [idev] --
1,515,738 UART: [ldev] ++
1,515,906 UART: [ldev] CDI.KEYID = 6
1,516,269 UART: [ldev] SUBJECT.KEYID = 5
1,516,695 UART: [ldev] AUTHORITY.KEYID = 7
1,517,158 UART: [ldev] FE.KEYID = 1
1,522,530 UART: [ldev] Erasing FE.KEYID = 1
1,548,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,551 UART: [ldev] --
1,587,912 UART: [fwproc] Waiting for Commands...
1,588,727 UART: [fwproc] Received command 0x46574c44
1,589,518 UART: [fwproc] Received Image of size 114332 bytes
4,934,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,962,078 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
4,991,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,127,421 >>> mbox cmd response: success
5,128,569 UART: [afmc] ++
5,128,737 UART: [afmc] CDI.KEYID = 6
5,129,099 UART: [afmc] SUBJECT.KEYID = 7
5,129,524 UART: [afmc] AUTHORITY.KEYID = 5
5,165,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,181,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,182,390 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,188,099 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,193,991 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,199,692 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,207,460 UART: [afmc] --
5,208,444 UART: [cold-reset] --
5,209,188 UART: [state] Locking Datavault
5,210,275 UART: [state] Locking PCR0, PCR1 and PCR31
5,210,879 UART: [state] Locking ICCM
5,211,377 UART: [exit] Launching FMC @ 0x40000130
5,216,706 UART:
5,216,722 UART: Running Caliptra FMC ...
5,217,130 UART:
5,217,273 UART: [state] CFI Enabled
5,228,261 UART: [fht] FMC Alias Private Key: 7
5,336,469 UART: [art] Extend RT PCRs Done
5,336,897 UART: [art] Lock RT PCRs Done
5,338,229 UART: [art] Populate DV Done
5,346,707 UART: [fht] FMC Alias Private Key: 7
5,347,855 UART: [art] Derive CDI
5,348,135 UART: [art] Store in in slot 0x4
5,433,876 UART: [art] Derive Key Pair
5,434,236 UART: [art] Store priv key in slot 0x5
5,447,508 UART: [art] Derive Key Pair - Done
5,462,421 UART: [art] Signing Cert with AUTHO
5,462,901 UART: RITY.KEYID = 7
5,477,951 UART: [art] Erasing AUTHORITY.KEYID = 7
5,478,716 UART: [art] PUB.X = D9E88B70EFFEE7D6EFB12AECC14C2335CF257C0A5214604627C636C2ABEC8FE8AC89A564C7122CE0CBE7CB72D2E2F5F4
5,485,509 UART: [art] PUB.Y = 6CCFC0F5826E7FA4C341F60854D2E18ABB97793F8D3F09DCA5F0AE4F95772D4B5841F836EF88ABDB780588002BEE25B3
5,492,442 UART: [art] SIG.R = 4CBB933C164E1DB43C71DFF3F45D332A09203538B4AEEA04D4422FCD68CFBA0DD7DE0F5AB98A9BDC2CDA3AF4AA6303BF
5,499,229 UART: [art] SIG.S = CCA4DCBE5B2AA51849BF22061275B253AFE9741FCB81D586FB4E94251A9577269D77ABCD4FD7CD92D58C077D844E8771
5,522,940 UART: Caliptra RT
5,523,285 UART: [state] CFI Enabled
5,631,090 UART: [rt] RT listening for mailbox commands...
5,631,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,754,756 UART: [rt]cmd =0x41544d4e, len=14344
6,038,029 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,239,228 >>> mbox cmd response: success
5,301,109 UART:
5,301,125 UART: Running Caliptra FMC ...
5,301,533 UART:
5,301,676 UART: [state] CFI Enabled
5,312,254 UART: [fht] FMC Alias Private Key: 7
5,420,312 UART: [art] Extend RT PCRs Done
5,420,740 UART: [art] Lock RT PCRs Done
5,422,544 UART: [art] Populate DV Done
5,430,756 UART: [fht] FMC Alias Private Key: 7
5,431,722 UART: [art] Derive CDI
5,432,002 UART: [art] Store in in slot 0x4
5,518,003 UART: [art] Derive Key Pair
5,518,363 UART: [art] Store priv key in slot 0x5
5,531,423 UART: [art] Derive Key Pair - Done
5,546,237 UART: [art] Signing Cert with AUTHO
5,546,717 UART: RITY.KEYID = 7
5,562,269 UART: [art] Erasing AUTHORITY.KEYID = 7
5,563,034 UART: [art] PUB.X = AA2D5F97C2CE039563381BD0F4B0E4CF4FF33944A3FE01C16513ECED5A968E676D7A98743763A7CCD0ED1B5B0666987E
5,569,807 UART: [art] PUB.Y = C77F95BE624279D5FBA02F61F236ACD733C177B9EF9EE8E32310CEC6A4997728E6B8F1EF20D31B6E1F041E9971C0BEF4
5,576,768 UART: [art] SIG.R = 4E28E790BBF521D862C8A57D97652DE65D8898B7321D40D51B4B9A9582784DFACA263311BB6C0FD28B838FF5BB95EBAF
5,583,547 UART: [art] SIG.S = 547E668A0B634DD3377A06C632875874C63C60D09C2687A9DB45C1722A0AB275EB019314FE00B50A3BDE175E08304D88
5,607,528 UART: Caliptra RT
5,607,873 UART: [state] CFI Enabled
5,716,717 UART: [rt] RT listening for mailbox commands...
5,717,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,573 UART: [rt]cmd =0x41544d4e, len=14344
6,131,013 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,776 UART: [kat] SHA2-512-ACC
908,677 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
923,106 UART: [kat] LMS
1,171,434 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,284 UART: [idev] ++
1,175,452 UART: [idev] CDI.KEYID = 6
1,175,812 UART: [idev] SUBJECT.KEYID = 7
1,176,236 UART: [idev] UDS.KEYID = 0
1,176,581 ready_for_fw is high
1,176,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,462 UART: [idev] Erasing UDS.KEYID = 0
1,202,027 UART: [idev] Sha1 KeyId Algorithm
1,210,579 UART: [idev] --
1,211,795 UART: [ldev] ++
1,211,963 UART: [ldev] CDI.KEYID = 6
1,212,326 UART: [ldev] SUBJECT.KEYID = 5
1,212,752 UART: [ldev] AUTHORITY.KEYID = 7
1,213,215 UART: [ldev] FE.KEYID = 1
1,218,523 UART: [ldev] Erasing FE.KEYID = 1
1,244,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,671 UART: [ldev] --
1,284,106 UART: [fwproc] Wait for Commands...
1,284,772 UART: [fwproc] Recv command 0x46574c44
1,285,500 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,826 >>> mbox cmd response: success
3,324,844 UART: [afmc] ++
3,325,012 UART: [afmc] CDI.KEYID = 6
3,325,374 UART: [afmc] SUBJECT.KEYID = 7
3,325,799 UART: [afmc] AUTHORITY.KEYID = 5
3,361,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,792 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,501 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,104 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,025 UART: [afmc] --
3,405,127 UART: [cold-reset] --
3,406,071 UART: [state] Locking Datavault
3,407,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,746 UART: [state] Locking ICCM
3,408,406 UART: [exit] Launching FMC @ 0x40000130
3,413,735 UART:
3,413,751 UART: Running Caliptra FMC ...
3,414,159 UART:
3,414,213 UART: [state] CFI Enabled
3,424,607 UART: [fht] FMC Alias Private Key: 7
3,532,723 UART: [art] Extend RT PCRs Done
3,533,151 UART: [art] Lock RT PCRs Done
3,534,617 UART: [art] Populate DV Done
3,542,811 UART: [fht] FMC Alias Private Key: 7
3,543,815 UART: [art] Derive CDI
3,544,095 UART: [art] Store in in slot 0x4
3,629,424 UART: [art] Derive Key Pair
3,629,784 UART: [art] Store priv key in slot 0x5
3,643,234 UART: [art] Derive Key Pair - Done
3,658,025 UART: [art] Signing Cert with AUTHO
3,658,505 UART: RITY.KEYID = 7
3,673,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,300 UART: [art] PUB.X = E8F8B533302AFE6FD4101D035D4EBCD970EEB7DAD18A03AB17CE9F82CC9AFC22F48BDD37C0E92CF0FB204E78966636C8
3,681,088 UART: [art] PUB.Y = 773D3A9F84398C0F1C2BD238CE1F53DCF5331F72E2B64E724063A484A00694D1D64E9D4F9A3B7B6640D453F6AD0A65A2
3,688,035 UART: [art] SIG.R = 04814913D8479EF6F82DAD1357609F103796C8FE2F40047AA102069BE4D0333AA4DA8B98D9F438089552C6A95AF2D144
3,694,786 UART: [art] SIG.S = 2066CD8FB38455D4DF36652929C3352EE6418FD92870626030EE25C8930877C8498842BD05DD57D05DA5F388CC6374D8
3,718,577 UART: Caliptra RT
3,718,830 UART: [state] CFI Enabled
3,826,875 UART: [rt] RT listening for mailbox commands...
3,827,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,433 UART: [rt]cmd =0x41544d4e, len=14344
4,233,500 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 ready_for_fw is high
1,060,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,805 >>> mbox cmd response: success
3,235,206 UART:
3,235,222 UART: Running Caliptra FMC ...
3,235,630 UART:
3,235,684 UART: [state] CFI Enabled
3,246,316 UART: [fht] FMC Alias Private Key: 7
3,354,324 UART: [art] Extend RT PCRs Done
3,354,752 UART: [art] Lock RT PCRs Done
3,356,564 UART: [art] Populate DV Done
3,364,706 UART: [fht] FMC Alias Private Key: 7
3,365,700 UART: [art] Derive CDI
3,365,980 UART: [art] Store in in slot 0x4
3,451,545 UART: [art] Derive Key Pair
3,451,905 UART: [art] Store priv key in slot 0x5
3,465,259 UART: [art] Derive Key Pair - Done
3,479,913 UART: [art] Signing Cert with AUTHO
3,480,393 UART: RITY.KEYID = 7
3,495,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,098 UART: [art] PUB.X = C37973DFAAF70B75619C63037A05D038C9047CCCEC49C37EDB9B7A051DF4CBEFF63A2DE4DBF073140BBAD901765B2D3C
3,502,869 UART: [art] PUB.Y = DD8B1FC52C229A3E8FE5F6E1D2FE9B17F1E389343C6BF09712BB54D8FBAD89B0145D22315155EF477CBA4D854909F4C9
3,509,830 UART: [art] SIG.R = 714AB8DFF8FA24FECD3BB910B6BC2FCE908D22CA4D9048A07BDEE39028C0655E720BAEA2A942149D1060E604E4600CB9
3,516,609 UART: [art] SIG.S = EE697693EDD1E07A5F89D0889157FD5C4420783324038AF51A0C7AA68E51655B3DAF9F5608BA223E0C80BB1DD1700BDF
3,540,993 UART: Caliptra RT
3,541,246 UART: [state] CFI Enabled
3,649,108 UART: [rt] RT listening for mailbox commands...
3,649,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,952 UART: [rt]cmd =0x41544d4e, len=14344
4,066,011 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
893,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,248 UART: [kat] ++
897,400 UART: [kat] sha1
901,562 UART: [kat] SHA2-256
903,502 UART: [kat] SHA2-384
906,157 UART: [kat] SHA2-512-ACC
908,058 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,172,006 UART: [cold-reset] ++
1,172,386 UART: [fht] FHT @ 0x50003400
1,175,029 UART: [idev] ++
1,175,197 UART: [idev] CDI.KEYID = 6
1,175,557 UART: [idev] SUBJECT.KEYID = 7
1,175,981 UART: [idev] UDS.KEYID = 0
1,176,326 ready_for_fw is high
1,176,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,581 UART: [idev] Erasing UDS.KEYID = 0
1,200,396 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,902 UART: [ldev] ++
1,210,070 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,859 UART: [ldev] AUTHORITY.KEYID = 7
1,211,322 UART: [ldev] FE.KEYID = 1
1,216,358 UART: [ldev] Erasing FE.KEYID = 1
1,243,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,000 UART: [ldev] --
1,282,515 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,406 >>> mbox cmd response: success
3,324,590 UART: [afmc] ++
3,324,758 UART: [afmc] CDI.KEYID = 6
3,325,120 UART: [afmc] SUBJECT.KEYID = 7
3,325,545 UART: [afmc] AUTHORITY.KEYID = 5
3,361,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,578 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,287 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,179 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,890 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,909 UART: [afmc] --
3,405,023 UART: [cold-reset] --
3,405,907 UART: [state] Locking Datavault
3,406,746 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,350 UART: [state] Locking ICCM
3,407,964 UART: [exit] Launching FMC @ 0x40000130
3,413,293 UART:
3,413,309 UART: Running Caliptra FMC ...
3,413,717 UART:
3,413,860 UART: [state] CFI Enabled
3,424,182 UART: [fht] FMC Alias Private Key: 7
3,532,164 UART: [art] Extend RT PCRs Done
3,532,592 UART: [art] Lock RT PCRs Done
3,534,056 UART: [art] Populate DV Done
3,542,166 UART: [fht] FMC Alias Private Key: 7
3,543,108 UART: [art] Derive CDI
3,543,388 UART: [art] Store in in slot 0x4
3,629,071 UART: [art] Derive Key Pair
3,629,431 UART: [art] Store priv key in slot 0x5
3,642,901 UART: [art] Derive Key Pair - Done
3,657,826 UART: [art] Signing Cert with AUTHO
3,658,306 UART: RITY.KEYID = 7
3,673,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,107 UART: [art] PUB.X = B574118234B98433A63094CBCF4E24385C934A8D72BDD6550F7DBCB96B65273FE6944610C4481E2CE8872DF60062C4CB
3,680,852 UART: [art] PUB.Y = 72A83A4FCD9A56CC9E5C5CF7C4852870F2574B489318035CA0FAF25638187FBB0BC19FF059891410A92F9FC4E741481E
3,687,800 UART: [art] SIG.R = 8F79F386EF13D6313A9EC976287FBBB49B47DBE7306C9F77BCDF67A08F78309F7639D4BF18B3545C0BB08EA6D214010A
3,694,571 UART: [art] SIG.S = 4561AF6DE3FD416259FEB5431A91B4BE9B92B038A3F7D141A219686CCB4B19D37886B1E9328A237304405F352C504C0E
3,718,974 UART: Caliptra RT
3,719,319 UART: [state] CFI Enabled
3,826,433 UART: [rt] RT listening for mailbox commands...
3,827,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,163 UART: [rt]cmd =0x41544d4e, len=14344
4,245,351 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,830 ready_for_fw is high
1,060,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,377 >>> mbox cmd response: success
3,232,388 UART:
3,232,404 UART: Running Caliptra FMC ...
3,232,812 UART:
3,232,955 UART: [state] CFI Enabled
3,243,591 UART: [fht] FMC Alias Private Key: 7
3,351,265 UART: [art] Extend RT PCRs Done
3,351,693 UART: [art] Lock RT PCRs Done
3,353,229 UART: [art] Populate DV Done
3,361,397 UART: [fht] FMC Alias Private Key: 7
3,362,403 UART: [art] Derive CDI
3,362,683 UART: [art] Store in in slot 0x4
3,448,618 UART: [art] Derive Key Pair
3,448,978 UART: [art] Store priv key in slot 0x5
3,462,102 UART: [art] Derive Key Pair - Done
3,476,828 UART: [art] Signing Cert with AUTHO
3,477,308 UART: RITY.KEYID = 7
3,492,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,603 UART: [art] PUB.X = 25000E7318DE299D193F50B14B7B792C2A894F74715D7D332C1B4E74D6156EFC632F99132073611FC9C6F266E480CFDB
3,500,346 UART: [art] PUB.Y = 9C7CCBBB55D4B317AA071A494936895B9DB09FC202671701C52756DB997B26EE0812141B0B97B75B4FC07499925D0540
3,507,274 UART: [art] SIG.R = 15061010EAF77B492BFF51A72525A170B35B590149A3363551C0B643A3D2792610F2F9148EE5C5D24B19F1CA2DEE5238
3,514,034 UART: [art] SIG.S = 2E2B09A24D9195F71C57B9E16B5FE9E2C5F4B53422721F5259F624A88C24D787D483F61587FFD1738E3D959355CF9BAF
3,537,966 UART: Caliptra RT
3,538,311 UART: [state] CFI Enabled
3,646,366 UART: [rt] RT listening for mailbox commands...
3,647,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,952 UART: [rt]cmd =0x41544d4e, len=14344
4,062,861 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,661 UART: [idev] ++
1,172,829 UART: [idev] CDI.KEYID = 6
1,173,190 UART: [idev] SUBJECT.KEYID = 7
1,173,615 UART: [idev] UDS.KEYID = 0
1,173,961 ready_for_fw is high
1,173,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,851 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,818 UART: [ldev] ++
1,208,986 UART: [ldev] CDI.KEYID = 6
1,209,350 UART: [ldev] SUBJECT.KEYID = 5
1,209,777 UART: [ldev] AUTHORITY.KEYID = 7
1,210,240 UART: [ldev] FE.KEYID = 1
1,215,554 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,874 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 114332 bytes
3,116,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,309,527 >>> mbox cmd response: success
3,310,736 UART: [afmc] ++
3,310,904 UART: [afmc] CDI.KEYID = 6
3,311,267 UART: [afmc] SUBJECT.KEYID = 7
3,311,693 UART: [afmc] AUTHORITY.KEYID = 5
3,347,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,462 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,172 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,062 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,773 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,717 UART: [afmc] --
3,390,823 UART: [cold-reset] --
3,391,591 UART: [state] Locking Datavault
3,392,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,242 UART: [state] Locking ICCM
3,393,816 UART: [exit] Launching FMC @ 0x40000130
3,399,145 UART:
3,399,161 UART: Running Caliptra FMC ...
3,399,569 UART:
3,399,623 UART: [state] CFI Enabled
3,409,883 UART: [fht] FMC Alias Private Key: 7
3,517,453 UART: [art] Extend RT PCRs Done
3,517,881 UART: [art] Lock RT PCRs Done
3,519,457 UART: [art] Populate DV Done
3,527,479 UART: [fht] FMC Alias Private Key: 7
3,528,509 UART: [art] Derive CDI
3,528,789 UART: [art] Store in in slot 0x4
3,614,826 UART: [art] Derive Key Pair
3,615,186 UART: [art] Store priv key in slot 0x5
3,627,942 UART: [art] Derive Key Pair - Done
3,642,916 UART: [art] Signing Cert with AUTHO
3,643,396 UART: RITY.KEYID = 7
3,658,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,353 UART: [art] PUB.X = CACFD4723D753C8AE11B88E6F14C39B780E23C98B227C244DBC39E31479EE5EA8E1758E73A692D0DEDEE5430F9360576
3,666,127 UART: [art] PUB.Y = CAA194ACBF206F4A407EF5750448698EBA48F6C44C35F60933829BB04BB6ECD413F2F12BFB409178F0084E2C10E9E348
3,673,076 UART: [art] SIG.R = CD42318FB79DE3BF0CE1E7510B59C6F72F5A9F8819E59B1A86BDD18353D8EB5B4A26F2E2147D53A633198A76740404D7
3,679,840 UART: [art] SIG.S = 1E9ADA076BEE4EC07961036329E92EAB5853E79DC37631D7D5BE3198C86F2E090C099987DA2D6357161361008FC08DD5
3,703,292 UART: Caliptra RT
3,703,545 UART: [state] CFI Enabled
3,810,833 UART: [rt] RT listening for mailbox commands...
3,811,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,425 UART: [rt]cmd =0x41544d4e, len=14344
4,215,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,060 ready_for_fw is high
1,056,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,435 >>> mbox cmd response: success
3,231,980 UART:
3,231,996 UART: Running Caliptra FMC ...
3,232,404 UART:
3,232,458 UART: [state] CFI Enabled
3,242,942 UART: [fht] FMC Alias Private Key: 7
3,350,968 UART: [art] Extend RT PCRs Done
3,351,396 UART: [art] Lock RT PCRs Done
3,353,008 UART: [art] Populate DV Done
3,361,336 UART: [fht] FMC Alias Private Key: 7
3,362,346 UART: [art] Derive CDI
3,362,626 UART: [art] Store in in slot 0x4
3,448,169 UART: [art] Derive Key Pair
3,448,529 UART: [art] Store priv key in slot 0x5
3,461,699 UART: [art] Derive Key Pair - Done
3,476,139 UART: [art] Signing Cert with AUTHO
3,476,619 UART: RITY.KEYID = 7
3,491,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,236 UART: [art] PUB.X = 78EE49205F4F43E049585627B7066753D69074FD003C7AB2BFC7114C6D4F8478D21A666DD50A4A24E9FA44B082B7AA66
3,498,978 UART: [art] PUB.Y = E1DA4176AAA0ABDD89F45DF210B792E7C9368B35FD1AF6EB681CC66FA66952B5DDEB824FF2D0C2912F2F0D18328D186A
3,505,945 UART: [art] SIG.R = BBC084F32EA7F1C6C3D68FBB55F4A4CD390BA6427E9EAA1E8353A381C823D01287DC9CB1EBF7DBAD584BB378178DC4F9
3,512,736 UART: [art] SIG.S = 77163BBB8AFA18C8796499382BD601BDFF460ACDBE83569932ED4ABE012A993627F96AD66327374FB33C863678BE52E8
3,537,168 UART: Caliptra RT
3,537,421 UART: [state] CFI Enabled
3,645,523 UART: [rt] RT listening for mailbox commands...
3,646,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,219 UART: [rt]cmd =0x41544d4e, len=14344
4,064,429 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 ready_for_fw is high
1,174,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,198,442 UART: [idev] Sha1 KeyId Algorithm
1,207,236 UART: [idev] --
1,208,239 UART: [ldev] ++
1,208,407 UART: [ldev] CDI.KEYID = 6
1,208,771 UART: [ldev] SUBJECT.KEYID = 5
1,209,198 UART: [ldev] AUTHORITY.KEYID = 7
1,209,661 UART: [ldev] FE.KEYID = 1
1,214,841 UART: [ldev] Erasing FE.KEYID = 1
1,240,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,425 UART: [ldev] --
1,279,869 UART: [fwproc] Wait for Commands...
1,280,472 UART: [fwproc] Recv command 0x46574c44
1,281,205 UART: [fwproc] Recv'd Img size: 114332 bytes
3,112,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,168,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,304,619 >>> mbox cmd response: success
3,305,808 UART: [afmc] ++
3,305,976 UART: [afmc] CDI.KEYID = 6
3,306,339 UART: [afmc] SUBJECT.KEYID = 7
3,306,765 UART: [afmc] AUTHORITY.KEYID = 5
3,342,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,359,916 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,626 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,516 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,227 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,384,999 UART: [afmc] --
3,385,947 UART: [cold-reset] --
3,386,975 UART: [state] Locking Datavault
3,388,140 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,744 UART: [state] Locking ICCM
3,389,374 UART: [exit] Launching FMC @ 0x40000130
3,394,703 UART:
3,394,719 UART: Running Caliptra FMC ...
3,395,127 UART:
3,395,270 UART: [state] CFI Enabled
3,405,882 UART: [fht] FMC Alias Private Key: 7
3,512,878 UART: [art] Extend RT PCRs Done
3,513,306 UART: [art] Lock RT PCRs Done
3,514,946 UART: [art] Populate DV Done
3,523,226 UART: [fht] FMC Alias Private Key: 7
3,524,270 UART: [art] Derive CDI
3,524,550 UART: [art] Store in in slot 0x4
3,610,479 UART: [art] Derive Key Pair
3,610,839 UART: [art] Store priv key in slot 0x5
3,624,469 UART: [art] Derive Key Pair - Done
3,639,231 UART: [art] Signing Cert with AUTHO
3,639,711 UART: RITY.KEYID = 7
3,654,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,456 UART: [art] PUB.X = EB79AD52DE37F6B06A1E9884B6C1A6DEB8FD5D058F33E3BF85179CFBCF90E687FA5995050CA3A325A77A836643E81098
3,662,229 UART: [art] PUB.Y = C9326AD4816ABE1856BCE6B37B9C6EF6C8AD39AEF66BAC81C11044AE12E141970B5B828BC0FC9502A3B0790BA20869A9
3,669,181 UART: [art] SIG.R = FD827E87CB5ACB1240C944446F2512EC331108ED30162FD6203B94A9F5C93A84208863380F1C7386DC76B7CAACBEF39F
3,675,951 UART: [art] SIG.S = 389B1CD67A754AD2FD0007B3C2651294810BA8509ED49B97D2054769BD9610BE86A2D14AA1F2CEDE6070E3DC93827C1C
3,700,135 UART: Caliptra RT
3,700,480 UART: [state] CFI Enabled
3,808,394 UART: [rt] RT listening for mailbox commands...
3,809,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,986 UART: [rt]cmd =0x41544d4e, len=14344
4,210,243 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,749 ready_for_fw is high
1,056,749 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,161,798 >>> mbox cmd response: success
3,223,985 UART:
3,224,001 UART: Running Caliptra FMC ...
3,224,409 UART:
3,224,552 UART: [state] CFI Enabled
3,235,300 UART: [fht] FMC Alias Private Key: 7
3,343,612 UART: [art] Extend RT PCRs Done
3,344,040 UART: [art] Lock RT PCRs Done
3,345,634 UART: [art] Populate DV Done
3,353,812 UART: [fht] FMC Alias Private Key: 7
3,354,926 UART: [art] Derive CDI
3,355,206 UART: [art] Store in in slot 0x4
3,440,697 UART: [art] Derive Key Pair
3,441,057 UART: [art] Store priv key in slot 0x5
3,454,683 UART: [art] Derive Key Pair - Done
3,469,725 UART: [art] Signing Cert with AUTHO
3,470,205 UART: RITY.KEYID = 7
3,485,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,906 UART: [art] PUB.X = 4CE86059DF351FCF2378AD7B25285977C40166FF9FA5B4243412B40C212F5625807A03A81CF1ACAFCA5DE1CEA7FBAC6A
3,492,683 UART: [art] PUB.Y = 447928665DF20DAC426FBE546E56E9492B791D7C888641CA7EB48E2A533F6E6AF7E7B2348BB24BC442EFC774295534D2
3,499,634 UART: [art] SIG.R = 05DF9DC82FE7B56C1760EA5324A20F59F139FF3CB3EAF9336AA51FC502DF3400206E05D833DF8351747C8BD37503BF43
3,506,375 UART: [art] SIG.S = F539FEDE667B37490B4AD34A039D5B255253AFED51DE7EC81808CE6B0D70643585F6976EE60C7877B1FD97EDC0F61FF3
3,530,335 UART: Caliptra RT
3,530,680 UART: [state] CFI Enabled
3,637,680 UART: [rt] RT listening for mailbox commands...
3,638,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,182 UART: [rt]cmd =0x41544d4e, len=14344
4,051,868 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,813 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 ready_for_fw is high
1,480,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,838 UART: [idev] Erasing UDS.KEYID = 0
1,505,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,168 UART: [idev] --
1,515,241 UART: [ldev] ++
1,515,409 UART: [ldev] CDI.KEYID = 6
1,515,772 UART: [ldev] SUBJECT.KEYID = 5
1,516,198 UART: [ldev] AUTHORITY.KEYID = 7
1,516,661 UART: [ldev] FE.KEYID = 1
1,521,697 UART: [ldev] Erasing FE.KEYID = 1
1,546,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,164 UART: [ldev] --
1,586,553 UART: [fwproc] Waiting for Commands...
1,587,222 UART: [fwproc] Received command 0x46574c44
1,588,013 UART: [fwproc] Received Image of size 114332 bytes
2,886,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,460 >>> mbox cmd response: success
3,079,668 UART: [afmc] ++
3,079,836 UART: [afmc] CDI.KEYID = 6
3,080,198 UART: [afmc] SUBJECT.KEYID = 7
3,080,623 UART: [afmc] AUTHORITY.KEYID = 5
3,115,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,432 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,160 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,045 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,735 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,660 UART: [afmc] --
3,158,664 UART: [cold-reset] --
3,159,336 UART: [state] Locking Datavault
3,160,523 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,127 UART: [state] Locking ICCM
3,161,549 UART: [exit] Launching FMC @ 0x40000130
3,166,878 UART:
3,166,894 UART: Running Caliptra FMC ...
3,167,302 UART:
3,167,356 UART: [state] CFI Enabled
3,177,661 UART: [fht] FMC Alias Private Key: 7
3,285,030 UART: [art] Extend RT PCRs Done
3,285,458 UART: [art] Lock RT PCRs Done
3,287,346 UART: [art] Populate DV Done
3,295,853 UART: [fht] FMC Alias Private Key: 7
3,296,785 UART: [art] Derive CDI
3,297,065 UART: [art] Store in in slot 0x4
3,382,734 UART: [art] Derive Key Pair
3,383,094 UART: [art] Store priv key in slot 0x5
3,396,704 UART: [art] Derive Key Pair - Done
3,411,637 UART: [art] Signing Cert with AUTHO
3,412,117 UART: RITY.KEYID = 7
3,427,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,148 UART: [art] PUB.X = DD3E58E33784B0A9F4BE32875BA19352E95CBA878D093D7FEC1B5F72C1DC22C6A3890818452931919258CFF5853C4335
3,434,912 UART: [art] PUB.Y = 082FD2BF2D9ECE6AD7220DF72A0032A4F3E79721E5A7C6233A5314C6350B909F34950A2985C35C0426770061074C5E0D
3,441,793 UART: [art] SIG.R = C39180C563A14F491E5D232BDBEC142E3535980381BB50488AEDC6972CC671CAD6F9FCF08464273BFE1A9C77AFFA995D
3,448,572 UART: [art] SIG.S = AF2C881599BF6A60E485F7906F51F03556BD64127662A12F5A8A58C4DDE53C8F7FAA66CA95B93168C8C5A609007E3CC9
3,472,010 UART: Caliptra RT
3,472,263 UART: [state] CFI Enabled
3,580,329 UART: [rt] RT listening for mailbox commands...
3,580,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,037 UART: [rt]cmd =0x41544d4e, len=14344
4,013,942 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,871 ready_for_fw is high
1,361,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,882 >>> mbox cmd response: success
2,987,308 UART:
2,987,324 UART: Running Caliptra FMC ...
2,987,732 UART:
2,987,786 UART: [state] CFI Enabled
2,997,861 UART: [fht] FMC Alias Private Key: 7
3,106,784 UART: [art] Extend RT PCRs Done
3,107,212 UART: [art] Lock RT PCRs Done
3,108,820 UART: [art] Populate DV Done
3,117,089 UART: [fht] FMC Alias Private Key: 7
3,118,111 UART: [art] Derive CDI
3,118,391 UART: [art] Store in in slot 0x4
3,204,086 UART: [art] Derive Key Pair
3,204,446 UART: [art] Store priv key in slot 0x5
3,217,350 UART: [art] Derive Key Pair - Done
3,232,052 UART: [art] Signing Cert with AUTHO
3,232,532 UART: RITY.KEYID = 7
3,247,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,657 UART: [art] PUB.X = 52FA23004C7E590D03D6ADB3ADAC460EF5D08E05EBA96EF75AD4009DF96931D9394541DDD4E05D20FA15E11671D2435B
3,255,383 UART: [art] PUB.Y = DADFD81EA5672C1B26B32C49BDFCD19F0980C9AF289A06485B01D57C46F07307E1F015756633A979F1F714991AA57A5D
3,262,327 UART: [art] SIG.R = E4EFE330D4D6CE66178982E4A5F38B69E0EA1FDC631DCA0BF73D1058D17B0C23CFA608CD0902D9F93CFF7AFF942E753C
3,269,104 UART: [art] SIG.S = 548D953AAA27DA3984D40A3D105EFBBCEE40A06F11F45E49E687A97F5386A53C3EA9D7F4AE343AE1D5E5FDE7E69ECB79
3,293,026 UART: Caliptra RT
3,293,279 UART: [state] CFI Enabled
3,401,992 UART: [rt] RT listening for mailbox commands...
3,402,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,944 UART: [rt]cmd =0x41544d4e, len=14344
3,836,311 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,002 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 ready_for_fw is high
1,481,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,519 UART: [idev] Erasing UDS.KEYID = 0
1,506,295 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,061 UART: [idev] --
1,516,030 UART: [ldev] ++
1,516,198 UART: [ldev] CDI.KEYID = 6
1,516,561 UART: [ldev] SUBJECT.KEYID = 5
1,516,987 UART: [ldev] AUTHORITY.KEYID = 7
1,517,450 UART: [ldev] FE.KEYID = 1
1,522,692 UART: [ldev] Erasing FE.KEYID = 1
1,548,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,289 UART: [ldev] --
1,587,572 UART: [fwproc] Waiting for Commands...
1,588,357 UART: [fwproc] Received command 0x46574c44
1,589,148 UART: [fwproc] Received Image of size 114332 bytes
2,886,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,625 >>> mbox cmd response: success
3,080,707 UART: [afmc] ++
3,080,875 UART: [afmc] CDI.KEYID = 6
3,081,237 UART: [afmc] SUBJECT.KEYID = 7
3,081,662 UART: [afmc] AUTHORITY.KEYID = 5
3,116,833 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,344 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,034 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,831 UART: [afmc] --
3,159,713 UART: [cold-reset] --
3,160,431 UART: [state] Locking Datavault
3,161,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,316 UART: [state] Locking ICCM
3,162,784 UART: [exit] Launching FMC @ 0x40000130
3,168,113 UART:
3,168,129 UART: Running Caliptra FMC ...
3,168,537 UART:
3,168,680 UART: [state] CFI Enabled
3,179,349 UART: [fht] FMC Alias Private Key: 7
3,287,576 UART: [art] Extend RT PCRs Done
3,288,004 UART: [art] Lock RT PCRs Done
3,289,418 UART: [art] Populate DV Done
3,297,605 UART: [fht] FMC Alias Private Key: 7
3,298,539 UART: [art] Derive CDI
3,298,819 UART: [art] Store in in slot 0x4
3,384,424 UART: [art] Derive Key Pair
3,384,784 UART: [art] Store priv key in slot 0x5
3,398,056 UART: [art] Derive Key Pair - Done
3,412,975 UART: [art] Signing Cert with AUTHO
3,413,455 UART: RITY.KEYID = 7
3,428,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,676 UART: [art] PUB.X = 52DA909B4A4409FD63663C9A41E2D0FD5E11B10416213CDBD17437E044E3C9FF022393C1D419A6484CBAEF6688D5DC0B
3,436,442 UART: [art] PUB.Y = 8DF8821D368B9025EF0908D0920C84AA9B68975AACC4574C349316221536EF44FC897A923DAC30B8C22E04301DA540CA
3,443,380 UART: [art] SIG.R = 0B0C4EBBE9413814DF0493E95E64C67509526188159B2FA982B417866E4F93E31E26F2E83EFFCFE81BB44F33F797BFFD
3,450,146 UART: [art] SIG.S = A386705F75C1173748A77671EA14D05A672AF142EBF52581A045A7262398AA2CE879123ABDFE2A8243F78DC616CB1FB2
3,473,723 UART: Caliptra RT
3,474,068 UART: [state] CFI Enabled
3,582,249 UART: [rt] RT listening for mailbox commands...
3,582,919 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,761 UART: [rt]cmd =0x41544d4e, len=14344
4,015,336 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,444 ready_for_fw is high
1,362,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,243 >>> mbox cmd response: success
2,989,533 UART:
2,989,549 UART: Running Caliptra FMC ...
2,989,957 UART:
2,990,100 UART: [state] CFI Enabled
3,001,011 UART: [fht] FMC Alias Private Key: 7
3,108,982 UART: [art] Extend RT PCRs Done
3,109,410 UART: [art] Lock RT PCRs Done
3,111,084 UART: [art] Populate DV Done
3,119,243 UART: [fht] FMC Alias Private Key: 7
3,120,183 UART: [art] Derive CDI
3,120,463 UART: [art] Store in in slot 0x4
3,206,258 UART: [art] Derive Key Pair
3,206,618 UART: [art] Store priv key in slot 0x5
3,219,610 UART: [art] Derive Key Pair - Done
3,234,237 UART: [art] Signing Cert with AUTHO
3,234,717 UART: RITY.KEYID = 7
3,250,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,824 UART: [art] PUB.X = 238F1BAA1AB8868524052AC700BE7F44F132E3A2BD979A63B273392240A320D01855A3BBC840B67969A75BB33781B1E5
3,257,567 UART: [art] PUB.Y = F1D69BE0D13375CAEF30D67E1A30C9D5237FC39777FA46D66B8C13C690902AB56A090FE38EF8BE74354819E5C4259BF5
3,264,519 UART: [art] SIG.R = C1FF98754D6B649B64D19CC66ADA36A33E38A5E485C1B605DC93026985BBCA62019F3F2160D258374E8F9A83A6914F48
3,271,282 UART: [art] SIG.S = 2AA5CCEDF2C7CCF1ECF1039A44B63A17B7AF8237F0E1469D61F3195EC22489CF689D4D0F7CAC6579857E148755206779
3,295,501 UART: Caliptra RT
3,295,846 UART: [state] CFI Enabled
3,404,033 UART: [rt] RT listening for mailbox commands...
3,404,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,827 UART: [rt]cmd =0x41544d4e, len=14344
3,837,922 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,607 UART: [kat] SHA2-256
903,547 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,950 UART: [kat] HMAC-384Kdf
922,668 UART: [kat] LMS
1,170,996 UART: [kat] --
1,171,769 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,956 UART: [idev] ++
1,175,124 UART: [idev] CDI.KEYID = 6
1,175,484 UART: [idev] SUBJECT.KEYID = 7
1,175,908 UART: [idev] UDS.KEYID = 0
1,176,253 ready_for_fw is high
1,176,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,018 UART: [idev] Erasing UDS.KEYID = 0
1,201,207 UART: [idev] Sha1 KeyId Algorithm
1,209,821 UART: [idev] --
1,210,823 UART: [ldev] ++
1,210,991 UART: [ldev] CDI.KEYID = 6
1,211,354 UART: [ldev] SUBJECT.KEYID = 5
1,211,780 UART: [ldev] AUTHORITY.KEYID = 7
1,212,243 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,839 UART: [ldev] --
1,283,354 UART: [fwproc] Wait for Commands...
1,284,060 UART: [fwproc] Recv command 0x46574c44
1,284,788 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,917 >>> mbox cmd response: success
2,775,025 UART: [afmc] ++
2,775,193 UART: [afmc] CDI.KEYID = 6
2,775,555 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,300 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,148 UART: [afmc] --
2,855,242 UART: [cold-reset] --
2,856,224 UART: [state] Locking Datavault
2,857,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,973 UART: [state] Locking ICCM
2,858,447 UART: [exit] Launching FMC @ 0x40000130
2,863,776 UART:
2,863,792 UART: Running Caliptra FMC ...
2,864,200 UART:
2,864,254 UART: [state] CFI Enabled
2,874,631 UART: [fht] FMC Alias Private Key: 7
2,982,706 UART: [art] Extend RT PCRs Done
2,983,134 UART: [art] Lock RT PCRs Done
2,985,030 UART: [art] Populate DV Done
2,993,439 UART: [fht] FMC Alias Private Key: 7
2,994,371 UART: [art] Derive CDI
2,994,651 UART: [art] Store in in slot 0x4
3,080,348 UART: [art] Derive Key Pair
3,080,708 UART: [art] Store priv key in slot 0x5
3,093,830 UART: [art] Derive Key Pair - Done
3,108,171 UART: [art] Signing Cert with AUTHO
3,108,651 UART: RITY.KEYID = 7
3,123,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,242 UART: [art] PUB.X = 8E2DC5E60E04C4520E745654E9D8A2C25E0E0CDD93361C6E1F69A3A3E71F44AB304E05367C91DB61D6E1852D93E63C1D
3,131,002 UART: [art] PUB.Y = 3E88D05B432673CFFCBF07E1526665C9C30D1A97122837224A9F414850A8FB9E154859AC5DC055658F61CF6F2770CE09
3,137,941 UART: [art] SIG.R = 5C739AA364BDF32AC1F9049F566F793380DC0092656B2C03F084C511D2D7DB78C7361DBAB0D7DEC4C0C29367E282825D
3,144,689 UART: [art] SIG.S = FF36DF6E7144680C54BBE77661F66F8FB93C5EDC5E753A519A76D7F3BA9CAE04BB09912C34DB44F4B6FA41856D1619BE
3,168,841 UART: Caliptra RT
3,169,094 UART: [state] CFI Enabled
3,277,659 UART: [rt] RT listening for mailbox commands...
3,278,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,057 UART: [rt]cmd =0x41544d4e, len=14344
3,710,930 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,506 >>> mbox cmd response: success
2,689,660 UART:
2,689,676 UART: Running Caliptra FMC ...
2,690,084 UART:
2,690,138 UART: [state] CFI Enabled
2,700,377 UART: [fht] FMC Alias Private Key: 7
2,808,396 UART: [art] Extend RT PCRs Done
2,808,824 UART: [art] Lock RT PCRs Done
2,810,366 UART: [art] Populate DV Done
2,818,665 UART: [fht] FMC Alias Private Key: 7
2,819,623 UART: [art] Derive CDI
2,819,903 UART: [art] Store in in slot 0x4
2,905,474 UART: [art] Derive Key Pair
2,905,834 UART: [art] Store priv key in slot 0x5
2,919,034 UART: [art] Derive Key Pair - Done
2,934,331 UART: [art] Signing Cert with AUTHO
2,934,811 UART: RITY.KEYID = 7
2,949,829 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,594 UART: [art] PUB.X = 80FAE31D727A15669E487B5A2128D3FD759DCDE5B27B8FCB886186E11BBD28AF33C4DE035916A92766C7C539B4998E7A
2,957,369 UART: [art] PUB.Y = E856B988AFBE833493C08F32E8E2BE8C5802D5EA8BBD23ABAA733D651BEA34AC0AB3A9D88AFCC4257480052FDC03B32F
2,964,329 UART: [art] SIG.R = 1E030C3F9FFCD7EB35F6519F4B2F2AE611FD84948662F8FBF61E2C41D7DE90008BE6F7900520EF29F8032914816C1378
2,971,069 UART: [art] SIG.S = F5DE218280C6DBB2082F66260FB3BDC8646D1BDECB46667DD7459FA575710E6037EB8D1221E39940514CD31C732DAB56
2,994,043 UART: Caliptra RT
2,994,296 UART: [state] CFI Enabled
3,101,841 UART: [rt] RT listening for mailbox commands...
3,102,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,625 UART: [rt]cmd =0x41544d4e, len=14344
3,535,748 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,598 UART: [kat] SHA2-256
904,538 UART: [kat] SHA2-384
907,163 UART: [kat] SHA2-512-ACC
909,064 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
922,937 UART: [kat] LMS
1,171,265 UART: [kat] --
1,172,268 UART: [cold-reset] ++
1,172,648 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 ready_for_fw is high
1,176,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,951 UART: [idev] Erasing UDS.KEYID = 0
1,201,196 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,243,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,570 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,507 UART: [fwproc] Recv command 0x46574c44
1,284,235 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,022 >>> mbox cmd response: success
2,775,208 UART: [afmc] ++
2,775,376 UART: [afmc] CDI.KEYID = 6
2,775,738 UART: [afmc] SUBJECT.KEYID = 7
2,776,163 UART: [afmc] AUTHORITY.KEYID = 5
2,812,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,529 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,663 UART: [afmc] --
2,855,787 UART: [cold-reset] --
2,856,711 UART: [state] Locking Datavault
2,858,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,692 UART: [state] Locking ICCM
2,859,182 UART: [exit] Launching FMC @ 0x40000130
2,864,511 UART:
2,864,527 UART: Running Caliptra FMC ...
2,864,935 UART:
2,865,078 UART: [state] CFI Enabled
2,875,639 UART: [fht] FMC Alias Private Key: 7
2,983,460 UART: [art] Extend RT PCRs Done
2,983,888 UART: [art] Lock RT PCRs Done
2,985,378 UART: [art] Populate DV Done
2,993,565 UART: [fht] FMC Alias Private Key: 7
2,994,733 UART: [art] Derive CDI
2,995,013 UART: [art] Store in in slot 0x4
3,080,676 UART: [art] Derive Key Pair
3,081,036 UART: [art] Store priv key in slot 0x5
3,094,494 UART: [art] Derive Key Pair - Done
3,109,234 UART: [art] Signing Cert with AUTHO
3,109,714 UART: RITY.KEYID = 7
3,124,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,735 UART: [art] PUB.X = C629DE5CABD6AA9A7E4A2F769BE25561A8AD52894F53A5919FDB91AA706AA041DD11FBB01F34B613B6F705039A8B4717
3,132,513 UART: [art] PUB.Y = 5535DDFDC7168CCD8A63904FCCA2D2A8FF280B98927C3FA5A172F1C7EE55F73117985AEDFA111974D364F551441CAE47
3,139,472 UART: [art] SIG.R = 406F37C4954946DCEBAA6257C0EDEA8A947F198271575CD360A85BDAAA6EEB6A66A101E5778743DE1AA04E004C4FACA6
3,146,233 UART: [art] SIG.S = 64B9EA1DC3EA6C6FBC78F1EBA6749F788FE84D27AEBF11FFFA23B4CD2CAF68470FE64C092055DE4C83C5603C848DD46F
3,170,222 UART: Caliptra RT
3,170,567 UART: [state] CFI Enabled
3,278,938 UART: [rt] RT listening for mailbox commands...
3,279,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,702 UART: [rt]cmd =0x41544d4e, len=14344
3,713,209 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,035 >>> mbox cmd response: success
2,689,547 UART:
2,689,563 UART: Running Caliptra FMC ...
2,689,971 UART:
2,690,114 UART: [state] CFI Enabled
2,700,653 UART: [fht] FMC Alias Private Key: 7
2,808,500 UART: [art] Extend RT PCRs Done
2,808,928 UART: [art] Lock RT PCRs Done
2,810,582 UART: [art] Populate DV Done
2,819,093 UART: [fht] FMC Alias Private Key: 7
2,820,091 UART: [art] Derive CDI
2,820,371 UART: [art] Store in in slot 0x4
2,905,808 UART: [art] Derive Key Pair
2,906,168 UART: [art] Store priv key in slot 0x5
2,919,818 UART: [art] Derive Key Pair - Done
2,934,387 UART: [art] Signing Cert with AUTHO
2,934,867 UART: RITY.KEYID = 7
2,949,645 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,410 UART: [art] PUB.X = 1E8BBE8065589F46EC2A8494003D85ACCDC5CD668CA1246A4A4F37E30F322B17EA428C90FEC725141D04758338D25588
2,957,154 UART: [art] PUB.Y = 920B2C89F57266CC969F78A713BE6BC7DC70FF7492069A4F7CF63CCB6236D7CB6C5B043BBB778A87CA29160C622425FB
2,964,102 UART: [art] SIG.R = A5951A74CF08B7B4BB5DCFD61DAF6F908729741BED8C8D570047A45BA2AD85875824ED27CF4C4D8E35048529036C1F7A
2,970,851 UART: [art] SIG.S = F8F0466D3EAA08E5444CF126134823859A85407CBA4F433CA7923D94099E01F483F4E22F08904FA08C8EAFFAD4587D45
2,994,494 UART: Caliptra RT
2,994,839 UART: [state] CFI Enabled
3,102,273 UART: [rt] RT listening for mailbox commands...
3,102,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,081 UART: [rt]cmd =0x41544d4e, len=14344
3,535,962 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,220 UART: [kat] LMS
1,168,532 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,427 UART: [idev] ++
1,172,595 UART: [idev] CDI.KEYID = 6
1,172,956 UART: [idev] SUBJECT.KEYID = 7
1,173,381 UART: [idev] UDS.KEYID = 0
1,173,727 ready_for_fw is high
1,173,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,986 UART: [ldev] --
1,280,316 UART: [fwproc] Wait for Commands...
1,280,993 UART: [fwproc] Recv command 0x46574c44
1,281,726 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,839 >>> mbox cmd response: success
2,772,010 UART: [afmc] ++
2,772,178 UART: [afmc] CDI.KEYID = 6
2,772,541 UART: [afmc] SUBJECT.KEYID = 7
2,772,967 UART: [afmc] AUTHORITY.KEYID = 5
2,808,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,983 UART: [afmc] --
2,851,993 UART: [cold-reset] --
2,852,721 UART: [state] Locking Datavault
2,853,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,542 UART: [state] Locking ICCM
2,855,090 UART: [exit] Launching FMC @ 0x40000130
2,860,419 UART:
2,860,435 UART: Running Caliptra FMC ...
2,860,843 UART:
2,860,897 UART: [state] CFI Enabled
2,871,598 UART: [fht] FMC Alias Private Key: 7
2,979,611 UART: [art] Extend RT PCRs Done
2,980,039 UART: [art] Lock RT PCRs Done
2,981,729 UART: [art] Populate DV Done
2,989,948 UART: [fht] FMC Alias Private Key: 7
2,990,964 UART: [art] Derive CDI
2,991,244 UART: [art] Store in in slot 0x4
3,076,905 UART: [art] Derive Key Pair
3,077,265 UART: [art] Store priv key in slot 0x5
3,090,099 UART: [art] Derive Key Pair - Done
3,104,949 UART: [art] Signing Cert with AUTHO
3,105,429 UART: RITY.KEYID = 7
3,120,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,328 UART: [art] PUB.X = 8A114F60B76952C210AC291181535D77F990E001509B0445EBEB8F0BFBA3BA66C562C92F3D74F9372AE374B34108FDDB
3,128,090 UART: [art] PUB.Y = D77C6589EE5AB6FB8DCFA1E38CE2B7D2F2CB83B5C6775A920B74308A03AAA8EA5317BDC26DE49C0A47EB4BEF72198C84
3,135,055 UART: [art] SIG.R = 3A69B3BB376FFD713F7A9C9F5AD4A288A307C5360C0F946CF96D49A5EAB1D3DEF1A4995AA636C40268C544EDD8B188E5
3,141,829 UART: [art] SIG.S = BAA598AAC41E115CBF1FD66AC75129D11D5446F2E534601B35FB1BA4DFAAD6852418D4C84F35FAAB9BA41A72A62D0969
3,165,317 UART: Caliptra RT
3,165,570 UART: [state] CFI Enabled
3,274,347 UART: [rt] RT listening for mailbox commands...
3,275,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,129 UART: [rt]cmd =0x41544d4e, len=14344
3,707,886 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,862 ready_for_fw is high
1,055,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,763 >>> mbox cmd response: success
2,683,437 UART:
2,683,453 UART: Running Caliptra FMC ...
2,683,861 UART:
2,683,915 UART: [state] CFI Enabled
2,694,374 UART: [fht] FMC Alias Private Key: 7
2,802,295 UART: [art] Extend RT PCRs Done
2,802,723 UART: [art] Lock RT PCRs Done
2,804,179 UART: [art] Populate DV Done
2,812,326 UART: [fht] FMC Alias Private Key: 7
2,813,358 UART: [art] Derive CDI
2,813,638 UART: [art] Store in in slot 0x4
2,899,197 UART: [art] Derive Key Pair
2,899,557 UART: [art] Store priv key in slot 0x5
2,913,005 UART: [art] Derive Key Pair - Done
2,927,587 UART: [art] Signing Cert with AUTHO
2,928,067 UART: RITY.KEYID = 7
2,942,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,754 UART: [art] PUB.X = 086A5829A83F0E75B74317BA352ED5A08251AB051433A811F8A4D3197F55408860DF9729EA25E67B414EBEFCDCC3E359
2,950,517 UART: [art] PUB.Y = 7749C4A31D60A97C647B65E032B14D9C4B5DB6CDA2EAFBF7665F55DD25CB4F53F9E101BC85BF35F3F68C42F68376BF1E
2,957,482 UART: [art] SIG.R = F196E34EA7E5CF4D75010BDBD35A4EA4B0CFC0AF4CEC23CCD2A617E23564294801EB6A99231EEE4EF69AE03ECBABAA19
2,964,273 UART: [art] SIG.S = 124540A80DA6E4C22197703988896A4D9D65D97ACC8811BBB85CFA3980C1A68D962E98683D4B76B1F7097753BB60A1A3
2,988,262 UART: Caliptra RT
2,988,515 UART: [state] CFI Enabled
3,095,452 UART: [rt] RT listening for mailbox commands...
3,096,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,988 UART: [rt]cmd =0x41544d4e, len=14344
3,528,695 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,138 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,414 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,739 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,527 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,770 >>> mbox cmd response: success
2,775,847 UART: [afmc] ++
2,776,015 UART: [afmc] CDI.KEYID = 6
2,776,378 UART: [afmc] SUBJECT.KEYID = 7
2,776,804 UART: [afmc] AUTHORITY.KEYID = 5
2,812,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,762 UART: [afmc] --
2,855,754 UART: [cold-reset] --
2,856,870 UART: [state] Locking Datavault
2,857,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,523 UART: [state] Locking ICCM
2,859,073 UART: [exit] Launching FMC @ 0x40000130
2,864,402 UART:
2,864,418 UART: Running Caliptra FMC ...
2,864,826 UART:
2,864,969 UART: [state] CFI Enabled
2,875,504 UART: [fht] FMC Alias Private Key: 7
2,984,175 UART: [art] Extend RT PCRs Done
2,984,603 UART: [art] Lock RT PCRs Done
2,986,079 UART: [art] Populate DV Done
2,994,418 UART: [fht] FMC Alias Private Key: 7
2,995,362 UART: [art] Derive CDI
2,995,642 UART: [art] Store in in slot 0x4
3,081,537 UART: [art] Derive Key Pair
3,081,897 UART: [art] Store priv key in slot 0x5
3,095,315 UART: [art] Derive Key Pair - Done
3,109,971 UART: [art] Signing Cert with AUTHO
3,110,451 UART: RITY.KEYID = 7
3,125,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,580 UART: [art] PUB.X = 0770BC7BAF19F62CB9CCE0C35196BEC99E04C81828F53D0FE3C2C88DF8F958699B2D73C4DD0ECBB600329E8EC94F7DDB
3,133,338 UART: [art] PUB.Y = 5B27DBE50DD6DDC9252E1C7AD24BE44AF99CE1E66BC2FC88AF1DB9F67254CB14E2E6F930D9A7A0CFC91287516AD59782
3,140,307 UART: [art] SIG.R = 03730500EEB3EDA6F9237A732A498A2FB3AC80EF3B65E685D6EF1A66666486B342D33BB6C78AC4A0004A265BBF0F23DD
3,147,036 UART: [art] SIG.S = 20118589F9BE0F0968407A7E5FDB987B07E8ED3EF868807C9C224D3CA9DF9E473E769259D226D063A8F5BD052BA956E9
3,171,347 UART: Caliptra RT
3,171,692 UART: [state] CFI Enabled
3,278,795 UART: [rt] RT listening for mailbox commands...
3,279,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,571 UART: [rt]cmd =0x41544d4e, len=14344
3,712,310 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,266 >>> mbox cmd response: success
2,685,224 UART:
2,685,240 UART: Running Caliptra FMC ...
2,685,648 UART:
2,685,791 UART: [state] CFI Enabled
2,695,918 UART: [fht] FMC Alias Private Key: 7
2,803,827 UART: [art] Extend RT PCRs Done
2,804,255 UART: [art] Lock RT PCRs Done
2,805,437 UART: [art] Populate DV Done
2,813,618 UART: [fht] FMC Alias Private Key: 7
2,814,780 UART: [art] Derive CDI
2,815,060 UART: [art] Store in in slot 0x4
2,900,927 UART: [art] Derive Key Pair
2,901,287 UART: [art] Store priv key in slot 0x5
2,914,505 UART: [art] Derive Key Pair - Done
2,929,245 UART: [art] Signing Cert with AUTHO
2,929,725 UART: RITY.KEYID = 7
2,944,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,184 UART: [art] PUB.X = C9600E4CC030B66C8A523828E60518D8CB62F51073168FEC379DF37F7037CA8300BE78831B994ACBA7ACC5CD2CA837B5
2,951,934 UART: [art] PUB.Y = F795A7550C0971307D63EFB3799C69A71F83DB4860C2D21CBD82DA8283AB7D86B990E4F4D7A1396E89DDC8AA267FA05A
2,958,888 UART: [art] SIG.R = 47B99560E3CEBF9A76847620936CCD678AD677D5AF56756F31634B1A531BC85B73C0295E488F22B435A4B3C355EEEF12
2,965,660 UART: [art] SIG.S = DA6FB071E7AEE7FAAD18D2F9376A1ED0BBC11CC61ADF16F2D9A0DAC0CF6104388A113C9113DEF393D0CDE957614E825E
2,989,390 UART: Caliptra RT
2,989,735 UART: [state] CFI Enabled
3,096,700 UART: [rt] RT listening for mailbox commands...
3,097,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,444 UART: [rt]cmd =0x41544d4e, len=14344
3,530,993 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,806 UART: [kat] HMAC-384Kdf
907,496 UART: [kat] LMS
1,475,692 UART: [kat] --
1,476,735 UART: [cold-reset] ++
1,477,225 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 ready_for_fw is high
1,481,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,084 UART: [idev] Erasing UDS.KEYID = 0
1,505,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,734 UART: [idev] --
1,515,873 UART: [ldev] ++
1,516,041 UART: [ldev] CDI.KEYID = 6
1,516,404 UART: [ldev] SUBJECT.KEYID = 5
1,516,830 UART: [ldev] AUTHORITY.KEYID = 7
1,517,293 UART: [ldev] FE.KEYID = 1
1,522,345 UART: [ldev] Erasing FE.KEYID = 1
1,547,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,178 UART: [ldev] --
1,586,603 UART: [fwproc] Waiting for Commands...
1,587,292 UART: [fwproc] Received command 0x46574c44
1,588,083 UART: [fwproc] Received Image of size 114332 bytes
5,158,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,187,303 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,630 >>> mbox cmd response: success
5,353,852 UART: [afmc] ++
5,354,020 UART: [afmc] CDI.KEYID = 6
5,354,382 UART: [afmc] SUBJECT.KEYID = 7
5,354,807 UART: [afmc] AUTHORITY.KEYID = 5
5,389,729 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,873 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,653 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,362 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,254 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,955 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,929 UART: [afmc] --
5,432,885 UART: [cold-reset] --
5,433,617 UART: [state] Locking Datavault
5,434,780 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,384 UART: [state] Locking ICCM
5,435,860 UART: [exit] Launching FMC @ 0x40000130
5,441,189 UART:
5,441,205 UART: Running Caliptra FMC ...
5,441,613 UART:
5,441,667 UART: [state] CFI Enabled
5,452,033 UART: [fht] FMC Alias Private Key: 7
5,560,375 UART: [art] Extend RT PCRs Done
5,560,803 UART: [art] Lock RT PCRs Done
5,562,729 UART: [art] Populate DV Done
5,570,985 UART: [fht] FMC Alias Private Key: 7
5,571,969 UART: [art] Derive CDI
5,572,249 UART: [art] Store in in slot 0x4
5,658,200 UART: [art] Derive Key Pair
5,658,560 UART: [art] Store priv key in slot 0x5
5,671,092 UART: [art] Derive Key Pair - Done
5,686,156 UART: [art] Signing Cert with AUTHO
5,686,636 UART: RITY.KEYID = 7
5,701,850 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,615 UART: [art] PUB.X = 26D6020CF9030407098902FE361AE37C7D8B01C50DBFDC0C84CA7A58FD3A99522EEC7C75D175DD8D1EAB91B5371D0420
5,709,362 UART: [art] PUB.Y = 627EC776EB2046728BAE4D8BC555D3C685CA1FDA2B0E9BF3EFC413DBA1D58675BF818BA3ABEC0824588E8ED1AEDECD7E
5,716,336 UART: [art] SIG.R = D692E6AAEBDBDDD30CD5BC3C77BD49335AF0F14A13A39B18B9E6CEAA438B1A61D38253E436D08497ADF8FAFCE27D8509
5,723,126 UART: [art] SIG.S = 1D2F9C888D63D0D2C64BEE1486E7FEECDE541CAF3813EBF994EDC1B133137D3A20319BDBE2B1CB40BDDE00D3A3C9EFA9
5,747,085 UART: Caliptra RT
5,747,338 UART: [state] CFI Enabled
5,856,631 UART: [rt] RT listening for mailbox commands...
5,857,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,335 UART: [rt]cmd =0x41544d4e, len=14344
6,910,731 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,631 ready_for_fw is high
1,362,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,087,227 >>> mbox cmd response: success
5,147,954 UART:
5,147,970 UART: Running Caliptra FMC ...
5,148,378 UART:
5,148,432 UART: [state] CFI Enabled
5,158,842 UART: [fht] FMC Alias Private Key: 7
5,266,186 UART: [art] Extend RT PCRs Done
5,266,614 UART: [art] Lock RT PCRs Done
5,268,282 UART: [art] Populate DV Done
5,276,328 UART: [fht] FMC Alias Private Key: 7
5,277,402 UART: [art] Derive CDI
5,277,682 UART: [art] Store in in slot 0x4
5,363,475 UART: [art] Derive Key Pair
5,363,835 UART: [art] Store priv key in slot 0x5
5,376,403 UART: [art] Derive Key Pair - Done
5,390,929 UART: [art] Signing Cert with AUTHO
5,391,409 UART: RITY.KEYID = 7
5,406,639 UART: [art] Erasing AUTHORITY.KEYID = 7
5,407,404 UART: [art] PUB.X = 53306901B78A76B551770A178708F03A568F772D7301690801B666EFF4F24EB8179508DE5A9C0CFBC2B9B124E814D9CE
5,414,146 UART: [art] PUB.Y = FC1D297EEC97F8E1B649ABCF45BE257C18DE02316CDD86BD4C780EDE1F2A66DDE409A5F6E12AA1329EAEA74ECECE7FF1
5,421,121 UART: [art] SIG.R = 017139AB48700EA689D9A55E7E998B1802C3038775CD48554BBC91F1238DB2F570E2BEE651DAE1D14765C664CEBC8615
5,427,881 UART: [art] SIG.S = B16DF300F7A47490ED5C2116CAECCCEDF162A1E6C2AEC63B69D94FF1ECA3ABFC4DFF1D56BFF049D1AD87A3665E960EAE
5,451,981 UART: Caliptra RT
5,452,234 UART: [state] CFI Enabled
5,558,825 UART: [rt] RT listening for mailbox commands...
5,559,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,682,155 UART: [rt]cmd =0x41544d4e, len=14344
6,600,446 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,538 UART: [kat] SHA2-256
892,476 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,506,117 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,657 UART: [idev] --
1,515,782 UART: [ldev] ++
1,515,950 UART: [ldev] CDI.KEYID = 6
1,516,313 UART: [ldev] SUBJECT.KEYID = 5
1,516,739 UART: [ldev] AUTHORITY.KEYID = 7
1,517,202 UART: [ldev] FE.KEYID = 1
1,522,726 UART: [ldev] Erasing FE.KEYID = 1
1,548,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,081 UART: [ldev] --
1,587,398 UART: [fwproc] Waiting for Commands...
1,588,021 UART: [fwproc] Received command 0x46574c44
1,588,812 UART: [fwproc] Received Image of size 114332 bytes
5,009,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,038,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,067,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,203,599 >>> mbox cmd response: success
5,204,681 UART: [afmc] ++
5,204,849 UART: [afmc] CDI.KEYID = 6
5,205,211 UART: [afmc] SUBJECT.KEYID = 7
5,205,636 UART: [afmc] AUTHORITY.KEYID = 5
5,240,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,256,458 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,257,238 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,262,947 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,268,839 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,274,540 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,282,418 UART: [afmc] --
5,283,454 UART: [cold-reset] --
5,284,362 UART: [state] Locking Datavault
5,285,485 UART: [state] Locking PCR0, PCR1 and PCR31
5,286,089 UART: [state] Locking ICCM
5,286,551 UART: [exit] Launching FMC @ 0x40000130
5,291,880 UART:
5,291,896 UART: Running Caliptra FMC ...
5,292,304 UART:
5,292,447 UART: [state] CFI Enabled
5,303,305 UART: [fht] FMC Alias Private Key: 7
5,411,443 UART: [art] Extend RT PCRs Done
5,411,871 UART: [art] Lock RT PCRs Done
5,413,337 UART: [art] Populate DV Done
5,421,459 UART: [fht] FMC Alias Private Key: 7
5,422,605 UART: [art] Derive CDI
5,422,885 UART: [art] Store in in slot 0x4
5,509,004 UART: [art] Derive Key Pair
5,509,364 UART: [art] Store priv key in slot 0x5
5,522,776 UART: [art] Derive Key Pair - Done
5,537,323 UART: [art] Signing Cert with AUTHO
5,537,803 UART: RITY.KEYID = 7
5,552,943 UART: [art] Erasing AUTHORITY.KEYID = 7
5,553,708 UART: [art] PUB.X = 6042E0F4FE321CD75EB9752C8CC63498A04D84F8D94544C5C99A2AC9F1E779F4C2793EC3688A3ADE3C560C58C0447060
5,560,479 UART: [art] PUB.Y = BDDC5F7EE14A54B8156553BD7A696E4B4AC4BA1415896C513A62003C4955D5E8E0426124E8217DD6F787CD982A6BCB2F
5,567,415 UART: [art] SIG.R = D2ADEC4AC8F9A7BDDAD290307B27C732F19DB8C33040CA97062B403A1866E0F735C9933E52263433DFB9550C50ED8231
5,574,185 UART: [art] SIG.S = B82301C88A1B79ED00A4EE4868A3443F50485B7E8BF9314C852D3C562C54E21506049E58D6650EBDF3BE91626B30C0F7
5,597,376 UART: Caliptra RT
5,597,721 UART: [state] CFI Enabled
5,705,471 UART: [rt] RT listening for mailbox commands...
5,706,141 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,829,145 UART: [rt]cmd =0x41544d4e, len=14344
6,759,335 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,162 ready_for_fw is high
1,363,162 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,164,178 >>> mbox cmd response: success
5,224,743 UART:
5,224,759 UART: Running Caliptra FMC ...
5,225,167 UART:
5,225,310 UART: [state] CFI Enabled
5,236,146 UART: [fht] FMC Alias Private Key: 7
5,344,398 UART: [art] Extend RT PCRs Done
5,344,826 UART: [art] Lock RT PCRs Done
5,346,322 UART: [art] Populate DV Done
5,354,466 UART: [fht] FMC Alias Private Key: 7
5,355,526 UART: [art] Derive CDI
5,355,806 UART: [art] Store in in slot 0x4
5,441,621 UART: [art] Derive Key Pair
5,441,981 UART: [art] Store priv key in slot 0x5
5,455,375 UART: [art] Derive Key Pair - Done
5,470,156 UART: [art] Signing Cert with AUTHO
5,470,636 UART: RITY.KEYID = 7
5,485,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,627 UART: [art] PUB.X = 14A4F6CC8CB35568389DBBDF29DF32DF10CAE8182B76C6467E01F6139456035AB296E579E9E57C3180406E20A53C9FF7
5,493,395 UART: [art] PUB.Y = F74A92520DCB1B7BBFA0FAD2915435A41C854FECB9E834D670C96F70A91AED4CF61F5AC8833D23D236E5C9C494F6A8A9
5,500,360 UART: [art] SIG.R = 60A406DCF5E04C064789438645CF75A8725F36B1CEB6A797D029476E3BB108E9B53E8C6B79732E313417011BFC125EE0
5,507,116 UART: [art] SIG.S = D1F707691D81171C62E5F07B170F89D1C57573A6374BD359EC9E2726DC468416C5A69A68ED4D89C1AAC57BE7A04A7310
5,530,081 UART: Caliptra RT
5,530,426 UART: [state] CFI Enabled
5,638,145 UART: [rt] RT listening for mailbox commands...
5,638,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,705 UART: [rt]cmd =0x41544d4e, len=14344
6,687,405 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,497 UART: [idev] Sha1 KeyId Algorithm
1,208,943 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,432 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,721 UART: [ldev] --
1,283,086 UART: [fwproc] Wait for Commands...
1,283,726 UART: [fwproc] Recv command 0x46574c44
1,284,454 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,818 >>> mbox cmd response: success
3,321,934 UART: [afmc] ++
3,322,102 UART: [afmc] CDI.KEYID = 6
3,322,464 UART: [afmc] SUBJECT.KEYID = 7
3,322,889 UART: [afmc] AUTHORITY.KEYID = 5
3,358,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,324 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,033 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,925 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,636 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,521 UART: [afmc] --
3,401,527 UART: [cold-reset] --
3,402,341 UART: [state] Locking Datavault
3,403,338 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,942 UART: [state] Locking ICCM
3,404,498 UART: [exit] Launching FMC @ 0x40000130
3,409,827 UART:
3,409,843 UART: Running Caliptra FMC ...
3,410,251 UART:
3,410,305 UART: [state] CFI Enabled
3,420,765 UART: [fht] FMC Alias Private Key: 7
3,529,039 UART: [art] Extend RT PCRs Done
3,529,467 UART: [art] Lock RT PCRs Done
3,531,139 UART: [art] Populate DV Done
3,539,387 UART: [fht] FMC Alias Private Key: 7
3,540,371 UART: [art] Derive CDI
3,540,651 UART: [art] Store in in slot 0x4
3,626,448 UART: [art] Derive Key Pair
3,626,808 UART: [art] Store priv key in slot 0x5
3,640,162 UART: [art] Derive Key Pair - Done
3,654,944 UART: [art] Signing Cert with AUTHO
3,655,424 UART: RITY.KEYID = 7
3,670,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,211 UART: [art] PUB.X = FCBA11E6969F13ED9ECAEC5E475EFBFA592AF5C369FAD8E380722166F29EE849E99CA526F77D53429A21241B5A184310
3,677,993 UART: [art] PUB.Y = AF71F747112EE58102E5C3EEF916F8BBB3F7834F3C8EF3A404EE522A83D2ED534F206B8DFAD6CA15DFB00031FE59ABFA
3,684,939 UART: [art] SIG.R = 4956FE0DA51E02F567FA2FA4EDD0F139F2035DC723C4F326D4EF163EA99C08A269FAEE4E7D44281D8CF64B448DEC1322
3,691,713 UART: [art] SIG.S = 0601FFB5BE1EEE73F6464779EB85DFECE395317567BF6838B2069C86DD7D78562C80C24B5DE4DBE5033D57266EFC373D
3,715,640 UART: Caliptra RT
3,715,893 UART: [state] CFI Enabled
3,824,456 UART: [rt] RT listening for mailbox commands...
3,825,126 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,348 UART: [rt]cmd =0x41544d4e, len=14344
4,861,159 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,507 ready_for_fw is high
1,059,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,679 >>> mbox cmd response: success
3,234,630 UART:
3,234,646 UART: Running Caliptra FMC ...
3,235,054 UART:
3,235,108 UART: [state] CFI Enabled
3,245,470 UART: [fht] FMC Alias Private Key: 7
3,353,216 UART: [art] Extend RT PCRs Done
3,353,644 UART: [art] Lock RT PCRs Done
3,355,262 UART: [art] Populate DV Done
3,363,546 UART: [fht] FMC Alias Private Key: 7
3,364,504 UART: [art] Derive CDI
3,364,784 UART: [art] Store in in slot 0x4
3,450,403 UART: [art] Derive Key Pair
3,450,763 UART: [art] Store priv key in slot 0x5
3,463,819 UART: [art] Derive Key Pair - Done
3,478,558 UART: [art] Signing Cert with AUTHO
3,479,038 UART: RITY.KEYID = 7
3,494,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,289 UART: [art] PUB.X = B28F69E6A45D3C46B8B6BC6DA6D429E0F049F7090503324A6945EE7C61C48195D8290297F720E71647D24892A74BCC7E
3,502,045 UART: [art] PUB.Y = 8295A50DDE54F3CCBDEF2EE9BB7C74B8DC7A63CD8CA0FABDB7A6BD2F5B44D3140B531127340A295D09EBC58C531D94F6
3,509,009 UART: [art] SIG.R = A23B2980AD986268E74D4BF959D3EB7F4874E4D171842C34D5D0DD0CE643E9C7C49FD0D2887F00242A6531DAAF00DD80
3,515,740 UART: [art] SIG.S = E57C24B5B3A3E7526BDF42A4D706AF731C182E879CCE43DF3E12AACB47AAB35A233B9054724288056E141D7686379336
3,538,561 UART: Caliptra RT
3,538,814 UART: [state] CFI Enabled
3,647,411 UART: [rt] RT listening for mailbox commands...
3,648,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,127 UART: [rt]cmd =0x41544d4e, len=14344
4,679,490 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,905 UART: [state] LifecycleState = Unprovisioned
85,560 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,483 UART: [kat] SHA2-256
893,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,258 UART: [kat] ++
897,410 UART: [kat] sha1
901,776 UART: [kat] SHA2-256
903,716 UART: [kat] SHA2-384
906,483 UART: [kat] SHA2-512-ACC
908,384 UART: [kat] ECC-384
917,901 UART: [kat] HMAC-384Kdf
922,625 UART: [kat] LMS
1,170,953 UART: [kat] --
1,171,526 UART: [cold-reset] ++
1,172,046 UART: [fht] FHT @ 0x50003400
1,174,589 UART: [idev] ++
1,174,757 UART: [idev] CDI.KEYID = 6
1,175,117 UART: [idev] SUBJECT.KEYID = 7
1,175,541 UART: [idev] UDS.KEYID = 0
1,175,886 ready_for_fw is high
1,175,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,641 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,220 UART: [ldev] ++
1,210,388 UART: [ldev] CDI.KEYID = 6
1,210,751 UART: [ldev] SUBJECT.KEYID = 5
1,211,177 UART: [ldev] AUTHORITY.KEYID = 7
1,211,640 UART: [ldev] FE.KEYID = 1
1,216,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,944 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,695 UART: [fwproc] Recv'd Img size: 114332 bytes
3,109,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,137,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,166,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,302,270 >>> mbox cmd response: success
3,303,460 UART: [afmc] ++
3,303,628 UART: [afmc] CDI.KEYID = 6
3,303,990 UART: [afmc] SUBJECT.KEYID = 7
3,304,415 UART: [afmc] AUTHORITY.KEYID = 5
3,339,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,356,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,357,002 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,362,711 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,368,603 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,374,314 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,382,235 UART: [afmc] --
3,383,265 UART: [cold-reset] --
3,384,061 UART: [state] Locking Datavault
3,385,002 UART: [state] Locking PCR0, PCR1 and PCR31
3,385,606 UART: [state] Locking ICCM
3,386,148 UART: [exit] Launching FMC @ 0x40000130
3,391,477 UART:
3,391,493 UART: Running Caliptra FMC ...
3,391,901 UART:
3,392,044 UART: [state] CFI Enabled
3,402,624 UART: [fht] FMC Alias Private Key: 7
3,510,052 UART: [art] Extend RT PCRs Done
3,510,480 UART: [art] Lock RT PCRs Done
3,512,114 UART: [art] Populate DV Done
3,520,438 UART: [fht] FMC Alias Private Key: 7
3,521,466 UART: [art] Derive CDI
3,521,746 UART: [art] Store in in slot 0x4
3,607,407 UART: [art] Derive Key Pair
3,607,767 UART: [art] Store priv key in slot 0x5
3,621,475 UART: [art] Derive Key Pair - Done
3,636,116 UART: [art] Signing Cert with AUTHO
3,636,596 UART: RITY.KEYID = 7
3,651,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,652,563 UART: [art] PUB.X = 67412CF65D180AC6A6693AEBC35A40E23EBA0FDAC34FEE81D07F6E36BAA393E6B86B6302AE534A144A63851E9C80F5A5
3,659,340 UART: [art] PUB.Y = 0DBF23B3E6A72CD0554131DB0BF9421D9AFD3D52A238B309136A45C33CDA98D723768A7C5706EA7C68DA15E6776FE036
3,666,286 UART: [art] SIG.R = 18BFF6F2A7E81607A43F531369D2DBB7C6B595EC3900EC3DE09EF4A322C87F78EC3B170035C433F2A731D3A100F08E08
3,672,992 UART: [art] SIG.S = 3378657438FAAC2CAAEEF64C6E535322E3CBF5688719717C2B2FEB8A663D03DFA8E6EE79643422E5C2DD696BA80D9B7F
3,696,929 UART: Caliptra RT
3,697,274 UART: [state] CFI Enabled
3,805,743 UART: [rt] RT listening for mailbox commands...
3,806,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,317 UART: [rt]cmd =0x41544d4e, len=14344
4,842,200 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 ready_for_fw is high
1,060,386 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,182,474 >>> mbox cmd response: success
3,244,581 UART:
3,244,597 UART: Running Caliptra FMC ...
3,245,005 UART:
3,245,148 UART: [state] CFI Enabled
3,255,858 UART: [fht] FMC Alias Private Key: 7
3,364,154 UART: [art] Extend RT PCRs Done
3,364,582 UART: [art] Lock RT PCRs Done
3,365,990 UART: [art] Populate DV Done
3,374,228 UART: [fht] FMC Alias Private Key: 7
3,375,370 UART: [art] Derive CDI
3,375,650 UART: [art] Store in in slot 0x4
3,461,267 UART: [art] Derive Key Pair
3,461,627 UART: [art] Store priv key in slot 0x5
3,474,321 UART: [art] Derive Key Pair - Done
3,489,411 UART: [art] Signing Cert with AUTHO
3,489,891 UART: RITY.KEYID = 7
3,505,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,974 UART: [art] PUB.X = 8B93E5F428DF5C7F5BDBD3A8A6DD500A82BDBF07077C818A11BCB6D4AA01601338BC25412767AAD9FB378050704082F3
3,512,742 UART: [art] PUB.Y = 6FBFF2A02CAD3F77E7996C40FD1174E1C04E0B596DE5E574B582C15F2DC479A0525C0161A71CB9779EFCD3C670F26D47
3,519,698 UART: [art] SIG.R = A11E7598381583DCD7DD4652D055D01C083A1FECE7E22319B6B4DC8EFA97AB51B178FCE2F36FCBDFEC000A016802D843
3,526,450 UART: [art] SIG.S = EB5D015654AE7FB60BBFD5BFC62CCCA89723D920DA7194035A4F1EC146BA95567CB8C66E9F6310A95A7279AB43E75FD0
3,550,210 UART: Caliptra RT
3,550,555 UART: [state] CFI Enabled
3,658,494 UART: [rt] RT listening for mailbox commands...
3,659,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,782,252 UART: [rt]cmd =0x41544d4e, len=14344
4,702,936 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
915,538 UART: [kat] HMAC-384Kdf
920,054 UART: [kat] LMS
1,168,366 UART: [kat] --
1,169,117 UART: [cold-reset] ++
1,169,447 UART: [fht] FHT @ 0x50003400
1,172,277 UART: [idev] ++
1,172,445 UART: [idev] CDI.KEYID = 6
1,172,806 UART: [idev] SUBJECT.KEYID = 7
1,173,231 UART: [idev] UDS.KEYID = 0
1,173,577 ready_for_fw is high
1,173,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,002 UART: [ldev] --
1,280,492 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,276 >>> mbox cmd response: success
3,320,357 UART: [afmc] ++
3,320,525 UART: [afmc] CDI.KEYID = 6
3,320,888 UART: [afmc] SUBJECT.KEYID = 7
3,321,314 UART: [afmc] AUTHORITY.KEYID = 5
3,357,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,917 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,627 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,517 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,228 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,274 UART: [afmc] --
3,401,320 UART: [cold-reset] --
3,402,168 UART: [state] Locking Datavault
3,403,357 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,961 UART: [state] Locking ICCM
3,404,593 UART: [exit] Launching FMC @ 0x40000130
3,409,922 UART:
3,409,938 UART: Running Caliptra FMC ...
3,410,346 UART:
3,410,400 UART: [state] CFI Enabled
3,420,874 UART: [fht] FMC Alias Private Key: 7
3,528,896 UART: [art] Extend RT PCRs Done
3,529,324 UART: [art] Lock RT PCRs Done
3,531,080 UART: [art] Populate DV Done
3,539,240 UART: [fht] FMC Alias Private Key: 7
3,540,370 UART: [art] Derive CDI
3,540,650 UART: [art] Store in in slot 0x4
3,626,525 UART: [art] Derive Key Pair
3,626,885 UART: [art] Store priv key in slot 0x5
3,640,263 UART: [art] Derive Key Pair - Done
3,655,265 UART: [art] Signing Cert with AUTHO
3,655,745 UART: RITY.KEYID = 7
3,670,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,366 UART: [art] PUB.X = 564C4C51D76F66134154D1FF964136A1CB4FA458BCF1BC087EC4100E9A8285BF461DC5376FAB0837D1284029582F706C
3,678,127 UART: [art] PUB.Y = 35AC87E8294438D24C37B6E4ECE48B9337998EFE28598DAC55BD7A4B1B84CA4C878CB033FDF9733ED5A5AC81A2855022
3,685,087 UART: [art] SIG.R = D164FE20E37161B507F339B8AD7FF94C663827B8080449C41F0A544E8A4C6E4E3A6EC5FF8B46DE8234D1350EAAF07016
3,691,848 UART: [art] SIG.S = 1B914F4E8888B40AA8B2F9338381CE333B4153A133DCD1128DE87D2E7E6CBF0EA4B077ABB5F7C7D20CDFC82A1953BFBD
3,715,808 UART: Caliptra RT
3,716,061 UART: [state] CFI Enabled
3,824,521 UART: [rt] RT listening for mailbox commands...
3,825,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,331 UART: [rt]cmd =0x41544d4e, len=14344
4,873,203 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,076 ready_for_fw is high
1,056,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,444 >>> mbox cmd response: success
3,229,679 UART:
3,229,695 UART: Running Caliptra FMC ...
3,230,103 UART:
3,230,157 UART: [state] CFI Enabled
3,240,395 UART: [fht] FMC Alias Private Key: 7
3,347,971 UART: [art] Extend RT PCRs Done
3,348,399 UART: [art] Lock RT PCRs Done
3,350,123 UART: [art] Populate DV Done
3,358,363 UART: [fht] FMC Alias Private Key: 7
3,359,423 UART: [art] Derive CDI
3,359,703 UART: [art] Store in in slot 0x4
3,445,316 UART: [art] Derive Key Pair
3,445,676 UART: [art] Store priv key in slot 0x5
3,459,428 UART: [art] Derive Key Pair - Done
3,474,147 UART: [art] Signing Cert with AUTHO
3,474,627 UART: RITY.KEYID = 7
3,489,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,152 UART: [art] PUB.X = 8DD002ACAF66D95DEF2A20CCECA788E8812DFEA71ED9DB3CC23F10AA398B80EABA4D48AB49DE43049828FFF28CEA6235
3,496,946 UART: [art] PUB.Y = 9405461BA2414B0F19F933A0BC521EFD013FFB9E695F774752B8699D427923CFA0CF6751A5983FF0AC74145C38F8AE06
3,503,886 UART: [art] SIG.R = FF96E6AC416D25AB67A2A03199FA67676B9DF38A1BD080CFC56FFCCAA993371CD962337FC9369C106F901BDF7CD496E2
3,510,672 UART: [art] SIG.S = 314B4D10399D2EAE9CD17BE01440D8388155C92DDC69B8851F14A00BBB8CD81754B4AB6A4701680FA3BD47D982614998
3,533,836 UART: Caliptra RT
3,534,089 UART: [state] CFI Enabled
3,642,031 UART: [rt] RT listening for mailbox commands...
3,642,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,567 UART: [rt]cmd =0x41544d4e, len=14344
4,678,440 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,174,228 ready_for_fw is high
1,174,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,769 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,365 UART: [fwproc] Wait for Commands...
1,283,074 UART: [fwproc] Recv command 0x46574c44
1,283,807 UART: [fwproc] Recv'd Img size: 114332 bytes
3,114,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,308,127 >>> mbox cmd response: success
3,309,346 UART: [afmc] ++
3,309,514 UART: [afmc] CDI.KEYID = 6
3,309,877 UART: [afmc] SUBJECT.KEYID = 7
3,310,303 UART: [afmc] AUTHORITY.KEYID = 5
3,345,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,988 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,698 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,588 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,299 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,061 UART: [afmc] --
3,389,181 UART: [cold-reset] --
3,390,339 UART: [state] Locking Datavault
3,391,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,232 UART: [state] Locking ICCM
3,392,726 UART: [exit] Launching FMC @ 0x40000130
3,398,055 UART:
3,398,071 UART: Running Caliptra FMC ...
3,398,479 UART:
3,398,622 UART: [state] CFI Enabled
3,408,970 UART: [fht] FMC Alias Private Key: 7
3,516,636 UART: [art] Extend RT PCRs Done
3,517,064 UART: [art] Lock RT PCRs Done
3,518,570 UART: [art] Populate DV Done
3,526,878 UART: [fht] FMC Alias Private Key: 7
3,527,938 UART: [art] Derive CDI
3,528,218 UART: [art] Store in in slot 0x4
3,613,801 UART: [art] Derive Key Pair
3,614,161 UART: [art] Store priv key in slot 0x5
3,627,045 UART: [art] Derive Key Pair - Done
3,641,837 UART: [art] Signing Cert with AUTHO
3,642,317 UART: RITY.KEYID = 7
3,657,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,528 UART: [art] PUB.X = 77C5B53B8960D7FA9F0301DC0C462495F14F6D5B141E2AD354D1D5D13165A20335F6FE4F625B34F789AB3560EF32722C
3,665,288 UART: [art] PUB.Y = 3D86B7A3C2D000A910FD4109151DDC6A00D75EFFEEB7FB3426A655418BA77C71146DFC4FCBF7050D0ED092BD70F6057A
3,672,195 UART: [art] SIG.R = 0CEBB3695926D504EF8518547A09B8F7F1B2D1CE547B2187BD2CB7F8B0C76CD082D2D89F84E13ACDC115D085142F5635
3,678,964 UART: [art] SIG.S = 482076657D5AF6034D0A169EAB7E5404B488581F547FF3CFA7CE59D5F3BD37E3D3E18A49EBFE0645B6EAEC62D5482651
3,703,561 UART: Caliptra RT
3,703,906 UART: [state] CFI Enabled
3,811,609 UART: [rt] RT listening for mailbox commands...
3,812,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,607 UART: [rt]cmd =0x41544d4e, len=14344
4,860,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,975 ready_for_fw is high
1,055,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,815 >>> mbox cmd response: success
3,236,046 UART:
3,236,062 UART: Running Caliptra FMC ...
3,236,470 UART:
3,236,613 UART: [state] CFI Enabled
3,247,519 UART: [fht] FMC Alias Private Key: 7
3,355,717 UART: [art] Extend RT PCRs Done
3,356,145 UART: [art] Lock RT PCRs Done
3,357,987 UART: [art] Populate DV Done
3,366,101 UART: [fht] FMC Alias Private Key: 7
3,367,109 UART: [art] Derive CDI
3,367,389 UART: [art] Store in in slot 0x4
3,452,778 UART: [art] Derive Key Pair
3,453,138 UART: [art] Store priv key in slot 0x5
3,466,654 UART: [art] Derive Key Pair - Done
3,481,546 UART: [art] Signing Cert with AUTHO
3,482,026 UART: RITY.KEYID = 7
3,496,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,593 UART: [art] PUB.X = D0B0224E1D1538063429D928239072F8A584F8ED06138D498752C2A4FF6B68E1D5E02C30E30728E226DC9E94C1855150
3,504,344 UART: [art] PUB.Y = 95E98CE977EFE1F37F1525D4274B0FCFD1F0898C52002A29AD6F9BF67BA14F95021778108387B39169AE29A92F528F91
3,511,266 UART: [art] SIG.R = 652AF3027CF4C9FFF6BEE88936298BA355110BBAC4F99294C33468919CDA9FE612F16582D39D1D897E632FCDF617B956
3,518,036 UART: [art] SIG.S = A46C3933CF3AE45F3BC369B421627A3996679047BF5A22115C471395F4A5514318615C11D162BFFB21E56F3547DDECE1
3,542,179 UART: Caliptra RT
3,542,524 UART: [state] CFI Enabled
3,650,356 UART: [rt] RT listening for mailbox commands...
3,651,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,162 UART: [rt]cmd =0x41544d4e, len=14344
4,684,584 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,774 UART: [kat] SHA2-512-ACC
896,675 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,457 UART: [fht] Storing FHT @ 0x50003400
1,479,190 UART: [idev] ++
1,479,358 UART: [idev] CDI.KEYID = 6
1,479,718 UART: [idev] SUBJECT.KEYID = 7
1,480,142 UART: [idev] UDS.KEYID = 0
1,480,487 ready_for_fw is high
1,480,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,792 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,516 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,520,903 UART: [ldev] Erasing FE.KEYID = 1
1,546,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,622 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,742 UART: [fwproc] Received command 0x46574c44
1,587,533 UART: [fwproc] Received Image of size 114332 bytes
5,044,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,073,330 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,102,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,238,609 >>> mbox cmd response: success
5,239,691 UART: [afmc] ++
5,239,859 UART: [afmc] CDI.KEYID = 6
5,240,221 UART: [afmc] SUBJECT.KEYID = 7
5,240,646 UART: [afmc] AUTHORITY.KEYID = 5
5,275,994 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,291,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,292,588 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,298,297 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,304,189 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,309,890 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,317,826 UART: [afmc] --
5,318,864 UART: [cold-reset] --
5,319,662 UART: [state] Locking Datavault
5,320,703 UART: [state] Locking PCR0, PCR1 and PCR31
5,321,307 UART: [state] Locking ICCM
5,321,817 UART: [exit] Launching FMC @ 0x40000130
5,327,146 UART:
5,327,162 UART: Running Caliptra FMC ...
5,327,570 UART:
5,327,624 UART: [state] CFI Enabled
5,338,120 UART: [fht] FMC Alias Private Key: 7
5,445,496 UART: [art] Extend RT PCRs Done
5,445,924 UART: [art] Lock RT PCRs Done
5,447,980 UART: [art] Populate DV Done
5,456,186 UART: [fht] FMC Alias Private Key: 7
5,457,226 UART: [art] Derive CDI
5,457,506 UART: [art] Store in in slot 0x4
5,543,305 UART: [art] Derive Key Pair
5,543,665 UART: [art] Store priv key in slot 0x5
5,556,765 UART: [art] Derive Key Pair - Done
5,571,171 UART: [art] Signing Cert with AUTHO
5,571,651 UART: RITY.KEYID = 7
5,587,207 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,972 UART: [art] PUB.X = 77AABDFF3B67E73A1007434F2307573BD7A35DC8DED1F426188789481DB1C3B47AEB125F2612C0646E02BB6854870008
5,594,708 UART: [art] PUB.Y = 3166FF69A23EABBB725D0AE70DA3CD11B0B6137E3BFAFFAD124D0A7942BA50DE6971E8A727D6CDBBC1C16F5154513FC0
5,601,673 UART: [art] SIG.R = 4D826CF100453A7FD0B760E5C94D1A7DBCD28D652F8B87E16A99BB3F174258CE5E3496E88C3C1B969C162CF14388F06B
5,608,429 UART: [art] SIG.S = BFD9623B8D6FEDE2DDE8A3F50DA43711B8C3CA204E86196BD6A7F7D8322F70B47BF81244C154C12B7EED1A68A388D8A8
5,632,459 UART: Caliptra RT
5,632,712 UART: [state] CFI Enabled
5,741,177 UART: [rt] RT listening for mailbox commands...
5,741,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,864,875 UART: [rt]cmd =0x41544d4e, len=14344
6,786,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 ready_for_fw is high
1,362,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,278,440 >>> mbox cmd response: success
5,340,241 UART:
5,340,257 UART: Running Caliptra FMC ...
5,340,665 UART:
5,340,719 UART: [state] CFI Enabled
5,351,267 UART: [fht] FMC Alias Private Key: 7
5,459,219 UART: [art] Extend RT PCRs Done
5,459,647 UART: [art] Lock RT PCRs Done
5,461,059 UART: [art] Populate DV Done
5,469,229 UART: [fht] FMC Alias Private Key: 7
5,470,231 UART: [art] Derive CDI
5,470,511 UART: [art] Store in in slot 0x4
5,556,242 UART: [art] Derive Key Pair
5,556,602 UART: [art] Store priv key in slot 0x5
5,569,832 UART: [art] Derive Key Pair - Done
5,584,728 UART: [art] Signing Cert with AUTHO
5,585,208 UART: RITY.KEYID = 7
5,599,922 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,687 UART: [art] PUB.X = 19A377DFDB566D98150AEF382F3696E7270E7602C9E1CF91AB7B0F27A2095E83934CF452E496649DAC2FF9DB2A04946F
5,607,445 UART: [art] PUB.Y = 0BF25E770DD5E0B10E776015CE33C5821EB283E3B760FDE4315AEEEC7783FE7CB3D7EE525B1789FD97C52AD87C7F9561
5,614,400 UART: [art] SIG.R = 3E611280F5BFF679711A6AB81B6C9866D684DF38A2BB759FE992A55DE3F4E471D236B7FB39443E50E46FFB0E951463D7
5,621,173 UART: [art] SIG.S = E65244AE246E566504B9C3750B652334B119F276AA18314CC17EB4061E34747E5382BFDA6F16009F1BD475F85D606A76
5,644,235 UART: Caliptra RT
5,644,488 UART: [state] CFI Enabled
5,752,901 UART: [rt] RT listening for mailbox commands...
5,753,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,876,297 UART: [rt]cmd =0x41544d4e, len=14344
6,793,511 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,032 UART: [kat] SHA2-256
881,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,078 UART: [kat] ++
886,230 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,001 UART: [kat] SHA2-512-ACC
896,902 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,357 UART: [kat] LMS
1,475,553 UART: [kat] --
1,476,116 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,189 UART: [idev] ++
1,479,357 UART: [idev] CDI.KEYID = 6
1,479,717 UART: [idev] SUBJECT.KEYID = 7
1,480,141 UART: [idev] UDS.KEYID = 0
1,480,486 ready_for_fw is high
1,480,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,995 UART: [idev] Erasing UDS.KEYID = 0
1,505,105 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,544 UART: [ldev] Erasing FE.KEYID = 1
1,547,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,965 UART: [ldev] --
1,586,328 UART: [fwproc] Waiting for Commands...
1,587,005 UART: [fwproc] Received command 0x46574c44
1,587,796 UART: [fwproc] Received Image of size 114332 bytes
5,120,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,313,990 >>> mbox cmd response: success
5,315,002 UART: [afmc] ++
5,315,170 UART: [afmc] CDI.KEYID = 6
5,315,532 UART: [afmc] SUBJECT.KEYID = 7
5,315,957 UART: [afmc] AUTHORITY.KEYID = 5
5,351,003 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,267 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,976 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,868 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,569 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,415 UART: [afmc] --
5,394,397 UART: [cold-reset] --
5,395,385 UART: [state] Locking Datavault
5,396,268 UART: [state] Locking PCR0, PCR1 and PCR31
5,396,872 UART: [state] Locking ICCM
5,397,352 UART: [exit] Launching FMC @ 0x40000130
5,402,681 UART:
5,402,697 UART: Running Caliptra FMC ...
5,403,105 UART:
5,403,248 UART: [state] CFI Enabled
5,414,050 UART: [fht] FMC Alias Private Key: 7
5,521,482 UART: [art] Extend RT PCRs Done
5,521,910 UART: [art] Lock RT PCRs Done
5,523,740 UART: [art] Populate DV Done
5,531,948 UART: [fht] FMC Alias Private Key: 7
5,532,940 UART: [art] Derive CDI
5,533,220 UART: [art] Store in in slot 0x4
5,619,129 UART: [art] Derive Key Pair
5,619,489 UART: [art] Store priv key in slot 0x5
5,632,843 UART: [art] Derive Key Pair - Done
5,647,674 UART: [art] Signing Cert with AUTHO
5,648,154 UART: RITY.KEYID = 7
5,663,064 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,829 UART: [art] PUB.X = 98C9B59FAB0E83BB6A51A31B74454714A63CC1B902F1444768BD40837D1A9DF19F9C881E2A596AF8462A74A01E4CAB8B
5,670,601 UART: [art] PUB.Y = A4B34CD8D06D03FB992AEEF4B7DDD009DD56B99895715311AE9E260C6D5928BE605B302D39349CE24A29618EDA0DB13B
5,677,551 UART: [art] SIG.R = 9BE65BD1B927D3F49FDF9332C23D966DD9AAEF76C84552BFA3139157AEE47E3CF87119B5B404ACC71B53044CB0404598
5,684,325 UART: [art] SIG.S = 6382DEAD6CD66F6B9FDC43EA71BADEB5D6AAABB659199F6748DBE03B3176DB88AC574A4E9D061FE28AF966B54E7EDC25
5,708,629 UART: Caliptra RT
5,708,974 UART: [state] CFI Enabled
5,816,953 UART: [rt] RT listening for mailbox commands...
5,817,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,779 UART: [rt]cmd =0x41544d4e, len=14344
6,865,858 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,684 ready_for_fw is high
1,363,684 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,165,034 >>> mbox cmd response: success
5,226,837 UART:
5,226,853 UART: Running Caliptra FMC ...
5,227,261 UART:
5,227,404 UART: [state] CFI Enabled
5,238,042 UART: [fht] FMC Alias Private Key: 7
5,345,152 UART: [art] Extend RT PCRs Done
5,345,580 UART: [art] Lock RT PCRs Done
5,347,090 UART: [art] Populate DV Done
5,355,114 UART: [fht] FMC Alias Private Key: 7
5,356,074 UART: [art] Derive CDI
5,356,354 UART: [art] Store in in slot 0x4
5,441,997 UART: [art] Derive Key Pair
5,442,357 UART: [art] Store priv key in slot 0x5
5,455,243 UART: [art] Derive Key Pair - Done
5,469,979 UART: [art] Signing Cert with AUTHO
5,470,459 UART: RITY.KEYID = 7
5,485,363 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,128 UART: [art] PUB.X = FEED46F57817C885569B0C710901A5C65D3ECBB3147F2A5DA6DB0B73FB9A777233DDB7BB86C2964025462D17397A858C
5,492,892 UART: [art] PUB.Y = 0C532FA7469D345450DC9E866B2BBE4B7E665160DB08735BF996737D12A00FE71B09CFB43E8816D274C8D79AED262C64
5,499,834 UART: [art] SIG.R = 182A23CB4E8612726E4EBC1F149C47E6522833887DF23507C302AE69F90211C808C13EFEEC0955D5C5F380F7F1A19764
5,506,587 UART: [art] SIG.S = 1A73261100E409399DDA7AA2CE416EF7C6A9FEB7E31DBCD33AAB51C4D64FEDD67FD04337A27370A29BF98B6BADBDFD18
5,531,503 UART: Caliptra RT
5,531,848 UART: [state] CFI Enabled
5,639,728 UART: [rt] RT listening for mailbox commands...
5,640,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,504 UART: [rt]cmd =0x41544d4e, len=14344
6,679,035 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,178 UART: [kat] LMS
1,171,506 UART: [kat] --
1,172,237 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,170 UART: [idev] ++
1,175,338 UART: [idev] CDI.KEYID = 6
1,175,698 UART: [idev] SUBJECT.KEYID = 7
1,176,122 UART: [idev] UDS.KEYID = 0
1,176,467 ready_for_fw is high
1,176,467 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,200,715 UART: [idev] Sha1 KeyId Algorithm
1,209,201 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,730 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,896 UART: [fwproc] Recv command 0x46574c44
1,283,624 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,792 >>> mbox cmd response: success
3,317,936 UART: [afmc] ++
3,318,104 UART: [afmc] CDI.KEYID = 6
3,318,466 UART: [afmc] SUBJECT.KEYID = 7
3,318,891 UART: [afmc] AUTHORITY.KEYID = 5
3,354,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,556 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,265 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,157 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,868 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,767 UART: [afmc] --
3,397,767 UART: [cold-reset] --
3,398,617 UART: [state] Locking Datavault
3,399,782 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,386 UART: [state] Locking ICCM
3,401,018 UART: [exit] Launching FMC @ 0x40000130
3,406,347 UART:
3,406,363 UART: Running Caliptra FMC ...
3,406,771 UART:
3,406,825 UART: [state] CFI Enabled
3,417,407 UART: [fht] FMC Alias Private Key: 7
3,525,321 UART: [art] Extend RT PCRs Done
3,525,749 UART: [art] Lock RT PCRs Done
3,527,537 UART: [art] Populate DV Done
3,535,969 UART: [fht] FMC Alias Private Key: 7
3,537,125 UART: [art] Derive CDI
3,537,405 UART: [art] Store in in slot 0x4
3,623,284 UART: [art] Derive Key Pair
3,623,644 UART: [art] Store priv key in slot 0x5
3,637,138 UART: [art] Derive Key Pair - Done
3,651,979 UART: [art] Signing Cert with AUTHO
3,652,459 UART: RITY.KEYID = 7
3,667,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,168 UART: [art] PUB.X = 7FF6BFFD9BDB882627A9863DFDF82CFFE03373C84BF10ECE5ED416753E00C20084E71E81625F44A6256840DF5DBF5633
3,674,903 UART: [art] PUB.Y = E89B4DB3D6FBE0FB489BACA387C576A44FA136619A3F4854B578F649F43818A7F2A0DE48C43091D97E14329B20DACEC1
3,681,865 UART: [art] SIG.R = D992587F00D46CFC3D216FE4BBA469F128FDA60BAEC68F24B846DE4C9C926845887AF085064AA28CA44E29365FD0CD85
3,688,619 UART: [art] SIG.S = 9CBC147231490FA8D00B3C05A1E26F0C5D421291D84F741BC66112970A3CA5E1347838A6D72212A5D01B47F30373DB82
3,711,926 UART: Caliptra RT
3,712,179 UART: [state] CFI Enabled
3,819,836 UART: [rt] RT listening for mailbox commands...
3,820,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,498 UART: [rt]cmd =0x41544d4e, len=14344
4,859,221 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,453 ready_for_fw is high
1,060,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,180,277 >>> mbox cmd response: success
3,241,994 UART:
3,242,010 UART: Running Caliptra FMC ...
3,242,418 UART:
3,242,472 UART: [state] CFI Enabled
3,253,072 UART: [fht] FMC Alias Private Key: 7
3,361,150 UART: [art] Extend RT PCRs Done
3,361,578 UART: [art] Lock RT PCRs Done
3,362,928 UART: [art] Populate DV Done
3,371,390 UART: [fht] FMC Alias Private Key: 7
3,372,486 UART: [art] Derive CDI
3,372,766 UART: [art] Store in in slot 0x4
3,458,497 UART: [art] Derive Key Pair
3,458,857 UART: [art] Store priv key in slot 0x5
3,471,745 UART: [art] Derive Key Pair - Done
3,486,234 UART: [art] Signing Cert with AUTHO
3,486,714 UART: RITY.KEYID = 7
3,501,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,445 UART: [art] PUB.X = DBDFAC880382E46915A18331D7A7902BBA1403FBE1DF0EF07F5568A3FE6354673B43D95AFD5CDF4BDC720B2BDF4F025E
3,509,220 UART: [art] PUB.Y = 1D8966C2455FB668DA466BE92A629DAAA96D575723537BCB41DB01E344A32B9F200C9C2B9CF575F10DA0141B922D1195
3,516,165 UART: [art] SIG.R = 2E823C1AD7BFAE8E90F5079E2535C87CA933F43C93BB6D9B58EE0263BE9E92B9EC26183CB992BF161FEA9C6380D4FF01
3,522,942 UART: [art] SIG.S = A4BC62D56808775C6B4DB14F7CE0D01C1A0637FCEF5FFF4D85E2A10F6ECDE77D16C8316D5CEC366A8D1C42EAB15E3FD2
3,546,738 UART: Caliptra RT
3,546,991 UART: [state] CFI Enabled
3,654,867 UART: [rt] RT listening for mailbox commands...
3,655,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,375 UART: [rt]cmd =0x41544d4e, len=14344
4,702,580 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,505 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,476 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,683 UART: [idev] ++
1,175,851 UART: [idev] CDI.KEYID = 6
1,176,211 UART: [idev] SUBJECT.KEYID = 7
1,176,635 UART: [idev] UDS.KEYID = 0
1,176,980 ready_for_fw is high
1,176,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,305 UART: [idev] Erasing UDS.KEYID = 0
1,202,352 UART: [idev] Sha1 KeyId Algorithm
1,210,738 UART: [idev] --
1,211,722 UART: [ldev] ++
1,211,890 UART: [ldev] CDI.KEYID = 6
1,212,253 UART: [ldev] SUBJECT.KEYID = 5
1,212,679 UART: [ldev] AUTHORITY.KEYID = 7
1,213,142 UART: [ldev] FE.KEYID = 1
1,218,334 UART: [ldev] Erasing FE.KEYID = 1
1,245,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,180 UART: [ldev] --
1,284,589 UART: [fwproc] Wait for Commands...
1,285,281 UART: [fwproc] Recv command 0x46574c44
1,286,009 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,432 >>> mbox cmd response: success
3,323,504 UART: [afmc] ++
3,323,672 UART: [afmc] CDI.KEYID = 6
3,324,034 UART: [afmc] SUBJECT.KEYID = 7
3,324,459 UART: [afmc] AUTHORITY.KEYID = 5
3,360,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,622 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,331 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,223 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,934 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,745 UART: [afmc] --
3,403,695 UART: [cold-reset] --
3,404,449 UART: [state] Locking Datavault
3,405,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,306 UART: [state] Locking ICCM
3,406,794 UART: [exit] Launching FMC @ 0x40000130
3,412,123 UART:
3,412,139 UART: Running Caliptra FMC ...
3,412,547 UART:
3,412,690 UART: [state] CFI Enabled
3,423,392 UART: [fht] FMC Alias Private Key: 7
3,532,004 UART: [art] Extend RT PCRs Done
3,532,432 UART: [art] Lock RT PCRs Done
3,533,968 UART: [art] Populate DV Done
3,542,282 UART: [fht] FMC Alias Private Key: 7
3,543,262 UART: [art] Derive CDI
3,543,542 UART: [art] Store in in slot 0x4
3,629,273 UART: [art] Derive Key Pair
3,629,633 UART: [art] Store priv key in slot 0x5
3,643,031 UART: [art] Derive Key Pair - Done
3,657,733 UART: [art] Signing Cert with AUTHO
3,658,213 UART: RITY.KEYID = 7
3,673,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,398 UART: [art] PUB.X = 931DF449B179C51AA4DDE96AE66CFEDD7511BF30134C67065E4C1BE8B41F8880FB2717F492F3708CD1D54ED38183594B
3,681,173 UART: [art] PUB.Y = 5DAD3055F4CAC922B8AEF1FCC2950F3D670A5643BCE1FF5634BE0FC0E983218DDFC188AA7CC65D15408BBA4B3CA5DD63
3,688,140 UART: [art] SIG.R = 876E4C4648F224152F32C0755970C0150F372F8942275F4DD5F96CB01026A9F72C4BFC49C71B20D10F131AFCCC3C05CD
3,694,903 UART: [art] SIG.S = 28377EBE04D35735F045C195450438E533BDC585FF299A83A142AE7DFED0C0CDB64189097D0BB3CE69701965487128A9
3,718,800 UART: Caliptra RT
3,719,145 UART: [state] CFI Enabled
3,826,791 UART: [rt] RT listening for mailbox commands...
3,827,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,471 UART: [rt]cmd =0x41544d4e, len=14344
4,865,846 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,208 ready_for_fw is high
1,061,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,229 >>> mbox cmd response: success
3,234,490 UART:
3,234,506 UART: Running Caliptra FMC ...
3,234,914 UART:
3,235,057 UART: [state] CFI Enabled
3,245,751 UART: [fht] FMC Alias Private Key: 7
3,353,641 UART: [art] Extend RT PCRs Done
3,354,069 UART: [art] Lock RT PCRs Done
3,355,589 UART: [art] Populate DV Done
3,363,523 UART: [fht] FMC Alias Private Key: 7
3,364,553 UART: [art] Derive CDI
3,364,833 UART: [art] Store in in slot 0x4
3,451,018 UART: [art] Derive Key Pair
3,451,378 UART: [art] Store priv key in slot 0x5
3,464,766 UART: [art] Derive Key Pair - Done
3,479,459 UART: [art] Signing Cert with AUTHO
3,479,939 UART: RITY.KEYID = 7
3,494,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,574 UART: [art] PUB.X = 0EDA27C61C242F3B2B671B66C26EFBD8150B38C865256FAFBDAA769D889B81140B096D8CC465B88AF00C0FA79A50C7FA
3,502,342 UART: [art] PUB.Y = 9984AB078F72A46F72682AC19E7E7FCE2DD5491D14BB695110F9E2AF3662EA761C97B61F21D89BBAEFF108AB668BAB10
3,509,300 UART: [art] SIG.R = B3D85C7E330513ED17A2002273300B1B021787966601FD0D21DC133F714E00CD3638CE7061FB2F0B6A73F1CBCD82D449
3,516,008 UART: [art] SIG.S = 770DD0A41020F944B4676CBD3245BF368A736D55300D2E523B468E48931298E8428A50FEE142AFF7488CC9AC19F69969
3,539,941 UART: Caliptra RT
3,540,286 UART: [state] CFI Enabled
3,646,800 UART: [rt] RT listening for mailbox commands...
3,647,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,626 UART: [rt]cmd =0x41544d4e, len=14344
4,693,638 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,902 UART: [ldev] ++
1,209,070 UART: [ldev] CDI.KEYID = 6
1,209,434 UART: [ldev] SUBJECT.KEYID = 5
1,209,861 UART: [ldev] AUTHORITY.KEYID = 7
1,210,324 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,576 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,798 >>> mbox cmd response: success
3,324,865 UART: [afmc] ++
3,325,033 UART: [afmc] CDI.KEYID = 6
3,325,396 UART: [afmc] SUBJECT.KEYID = 7
3,325,822 UART: [afmc] AUTHORITY.KEYID = 5
3,361,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,387 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,097 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,987 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,698 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,504 UART: [afmc] --
3,404,612 UART: [cold-reset] --
3,405,290 UART: [state] Locking Datavault
3,406,733 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,337 UART: [state] Locking ICCM
3,407,901 UART: [exit] Launching FMC @ 0x40000130
3,413,230 UART:
3,413,246 UART: Running Caliptra FMC ...
3,413,654 UART:
3,413,708 UART: [state] CFI Enabled
3,423,946 UART: [fht] FMC Alias Private Key: 7
3,531,112 UART: [art] Extend RT PCRs Done
3,531,540 UART: [art] Lock RT PCRs Done
3,532,796 UART: [art] Populate DV Done
3,541,118 UART: [fht] FMC Alias Private Key: 7
3,542,162 UART: [art] Derive CDI
3,542,442 UART: [art] Store in in slot 0x4
3,628,139 UART: [art] Derive Key Pair
3,628,499 UART: [art] Store priv key in slot 0x5
3,642,303 UART: [art] Derive Key Pair - Done
3,656,814 UART: [art] Signing Cert with AUTHO
3,657,294 UART: RITY.KEYID = 7
3,672,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,297 UART: [art] PUB.X = 5C646810FE0671010EEF306274A20E4265C681EF205412616C7A59200D83489D0AB70376AD125366B79E19AE61336A8C
3,680,034 UART: [art] PUB.Y = C00D287FCF3D26BBCAEC690FC04C37C177F7523291502656F7DD328E8EBE2B26F88E1A130B94F78E6ECE9D4D31B170D3
3,686,989 UART: [art] SIG.R = 2D6796E11FB86D0F656F0036EF126B7B070FF952FA867029904DE453FE1DF219074224D2EBBF449EA00D8FE0769C65E0
3,693,726 UART: [art] SIG.S = 93F39FA36BC9E446C02BF271EF78A61A3FBBE215F3423B177F89A36659576002C5894F44D4C6590DE25E271DA29A787E
3,717,693 UART: Caliptra RT
3,717,946 UART: [state] CFI Enabled
3,825,312 UART: [rt] RT listening for mailbox commands...
3,825,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,220 UART: [rt]cmd =0x41544d4e, len=14344
4,879,067 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,716 ready_for_fw is high
1,055,716 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,076 >>> mbox cmd response: success
3,223,421 UART:
3,223,437 UART: Running Caliptra FMC ...
3,223,845 UART:
3,223,899 UART: [state] CFI Enabled
3,234,201 UART: [fht] FMC Alias Private Key: 7
3,341,997 UART: [art] Extend RT PCRs Done
3,342,425 UART: [art] Lock RT PCRs Done
3,343,785 UART: [art] Populate DV Done
3,351,979 UART: [fht] FMC Alias Private Key: 7
3,353,055 UART: [art] Derive CDI
3,353,335 UART: [art] Store in in slot 0x4
3,438,996 UART: [art] Derive Key Pair
3,439,356 UART: [art] Store priv key in slot 0x5
3,452,886 UART: [art] Derive Key Pair - Done
3,467,394 UART: [art] Signing Cert with AUTHO
3,467,874 UART: RITY.KEYID = 7
3,483,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,823 UART: [art] PUB.X = FB2EB2E83586EFEFC715A8A2B6C41C8BB2CE3A6FA3E1A28BA261608CD87E06D5125C193F3DFF58A58D38B828BBA35E7D
3,490,614 UART: [art] PUB.Y = 3BC5D5AA5F237310E3A8B03AB0A45A432CF39582F864A95D779BA5DFEF1679A43AABCD3CFF8F65CDAB49981B4FEAA432
3,497,588 UART: [art] SIG.R = 424143A455E53720853DCE5F1254831207F993FA01BA407839BD84947E36A621E7C591AEF1D1CE032D66FCCF4DC83840
3,504,347 UART: [art] SIG.S = 746E5B8E957EEF630FB226144A2590A7512E127BD6D33944F2ECEA28C0E0A24C13181EBCD9261B8D1F31CBD1D8ABAE1F
3,528,431 UART: Caliptra RT
3,528,684 UART: [state] CFI Enabled
3,636,825 UART: [rt] RT listening for mailbox commands...
3,637,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,545 UART: [rt]cmd =0x41544d4e, len=14344
4,695,548 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 ready_for_fw is high
1,174,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,974 UART: [idev] Erasing UDS.KEYID = 0
1,198,806 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 114332 bytes
3,135,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,328,860 >>> mbox cmd response: success
3,330,119 UART: [afmc] ++
3,330,287 UART: [afmc] CDI.KEYID = 6
3,330,650 UART: [afmc] SUBJECT.KEYID = 7
3,331,076 UART: [afmc] AUTHORITY.KEYID = 5
3,366,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,429 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,389,139 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,395,029 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,740 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,518 UART: [afmc] --
3,409,562 UART: [cold-reset] --
3,410,608 UART: [state] Locking Datavault
3,411,507 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,111 UART: [state] Locking ICCM
3,412,685 UART: [exit] Launching FMC @ 0x40000130
3,418,014 UART:
3,418,030 UART: Running Caliptra FMC ...
3,418,438 UART:
3,418,581 UART: [state] CFI Enabled
3,429,253 UART: [fht] FMC Alias Private Key: 7
3,537,145 UART: [art] Extend RT PCRs Done
3,537,573 UART: [art] Lock RT PCRs Done
3,539,087 UART: [art] Populate DV Done
3,547,169 UART: [fht] FMC Alias Private Key: 7
3,548,129 UART: [art] Derive CDI
3,548,409 UART: [art] Store in in slot 0x4
3,633,922 UART: [art] Derive Key Pair
3,634,282 UART: [art] Store priv key in slot 0x5
3,647,712 UART: [art] Derive Key Pair - Done
3,662,837 UART: [art] Signing Cert with AUTHO
3,663,317 UART: RITY.KEYID = 7
3,679,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,772 UART: [art] PUB.X = 0218FC125472C51B56C46EAD89CC8A97AAEDF25A0A0501914304DC93F8072969366859689E045F2CBDA0E3D8B7A093D8
3,686,523 UART: [art] PUB.Y = 02B0FFD54B2569BCAC5AFED683140A3B354382E06EE9F9660C226E3C5B4A4DB693A610B8F1203FBB2B50059C6BC302DB
3,693,472 UART: [art] SIG.R = B65AA5EE3985B7682FE081F51D83191EA32724A9DDEF79C0DAD5EA242CA230D06AB9272CB343F2390480286F2DEA6A13
3,700,249 UART: [art] SIG.S = 9DCEEE2078D30FAA821DA3050547EAA01ED8632D6918DF255C4D4C0B5FFB1568D027913DBA361B95BDD23F7D7D0839CC
3,723,911 UART: Caliptra RT
3,724,256 UART: [state] CFI Enabled
3,830,821 UART: [rt] RT listening for mailbox commands...
3,831,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,565 UART: [rt]cmd =0x41544d4e, len=14344
4,882,141 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,639 ready_for_fw is high
1,056,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,177,961 >>> mbox cmd response: success
3,241,526 UART:
3,241,542 UART: Running Caliptra FMC ...
3,241,950 UART:
3,242,093 UART: [state] CFI Enabled
3,252,371 UART: [fht] FMC Alias Private Key: 7
3,359,993 UART: [art] Extend RT PCRs Done
3,360,421 UART: [art] Lock RT PCRs Done
3,361,793 UART: [art] Populate DV Done
3,370,039 UART: [fht] FMC Alias Private Key: 7
3,371,201 UART: [art] Derive CDI
3,371,481 UART: [art] Store in in slot 0x4
3,456,734 UART: [art] Derive Key Pair
3,457,094 UART: [art] Store priv key in slot 0x5
3,470,514 UART: [art] Derive Key Pair - Done
3,485,235 UART: [art] Signing Cert with AUTHO
3,485,715 UART: RITY.KEYID = 7
3,501,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,898 UART: [art] PUB.X = D83EEE2796F040CAEF9CB90766E3B277FE6CF748830F51443FB8AEE6E8BC43454A1E648E05E31A70F38EBE03F2FED54E
3,508,674 UART: [art] PUB.Y = 39D31CE21689D3DE0CACC0F8EEFB44E2B14CA530CBC71592E178C34562F8D5EFF3866B38BD38C15D1570BE9A9635024E
3,515,632 UART: [art] SIG.R = 73C54F5D511DC2F6938B5E8607EEE3C3B67E35268CF9F556684E8A16EA432B3B496F55014C585A9656D81757C8F2526F
3,522,394 UART: [art] SIG.S = 022CF182BAD20D28DE3B4F0EE556192EE9E8A8B7C82625B6E4C486BEFD9C92D8009B4C69A8A8DAE8D64B3079F561473C
3,546,234 UART: Caliptra RT
3,546,579 UART: [state] CFI Enabled
3,653,638 UART: [rt] RT listening for mailbox commands...
3,654,308 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,316 UART: [rt]cmd =0x41544d4e, len=14344
4,702,179 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,665 UART: [cold-reset] ++
1,477,095 UART: [fht] Storing FHT @ 0x50003400
1,479,918 UART: [idev] ++
1,480,086 UART: [idev] CDI.KEYID = 6
1,480,446 UART: [idev] SUBJECT.KEYID = 7
1,480,870 UART: [idev] UDS.KEYID = 0
1,481,215 ready_for_fw is high
1,481,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,826 UART: [idev] --
1,514,841 UART: [ldev] ++
1,515,009 UART: [ldev] CDI.KEYID = 6
1,515,372 UART: [ldev] SUBJECT.KEYID = 5
1,515,798 UART: [ldev] AUTHORITY.KEYID = 7
1,516,261 UART: [ldev] FE.KEYID = 1
1,521,613 UART: [ldev] Erasing FE.KEYID = 1
1,546,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,870 UART: [ldev] --
1,585,269 UART: [fwproc] Waiting for Commands...
1,586,072 UART: [fwproc] Received command 0x46574c44
1,586,863 UART: [fwproc] Received Image of size 114332 bytes
2,884,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,146 >>> mbox cmd response: success
3,078,238 UART: [afmc] ++
3,078,406 UART: [afmc] CDI.KEYID = 6
3,078,768 UART: [afmc] SUBJECT.KEYID = 7
3,079,193 UART: [afmc] AUTHORITY.KEYID = 5
3,114,236 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,131 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,821 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,768 UART: [afmc] --
3,157,660 UART: [cold-reset] --
3,158,412 UART: [state] Locking Datavault
3,159,493 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,097 UART: [state] Locking ICCM
3,160,557 UART: [exit] Launching FMC @ 0x40000130
3,165,886 UART:
3,165,902 UART: Running Caliptra FMC ...
3,166,310 UART:
3,166,364 UART: [state] CFI Enabled
3,176,567 UART: [fht] FMC Alias Private Key: 7
3,284,898 UART: [art] Extend RT PCRs Done
3,285,326 UART: [art] Lock RT PCRs Done
3,286,776 UART: [art] Populate DV Done
3,295,105 UART: [fht] FMC Alias Private Key: 7
3,296,037 UART: [art] Derive CDI
3,296,317 UART: [art] Store in in slot 0x4
3,381,832 UART: [art] Derive Key Pair
3,382,192 UART: [art] Store priv key in slot 0x5
3,395,440 UART: [art] Derive Key Pair - Done
3,410,523 UART: [art] Signing Cert with AUTHO
3,411,003 UART: RITY.KEYID = 7
3,425,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,756 UART: [art] PUB.X = 799CFA27D862518E913842C1601ABE0E18A257CE5FB9A27B017043982E5442E966B15C3BD6F6E17BD47AB8D2B9A47360
3,433,522 UART: [art] PUB.Y = 29A654C6A627089FC34E953BEE80F38356B48E1889A27FD18618D95125671548B52D77E00843E8222A859A4FDCB8764B
3,440,458 UART: [art] SIG.R = D13F464C4C60BBD305A4CF6EB3636229928E388EE90042FF98827953C383311340DD70164E2215500E6AED41FFE29FC7
3,447,198 UART: [art] SIG.S = FEFBE8EB25A74243BD80E2059D298FED5309434246D61702C9BF28422A7BF04482248C33EBE09CF50E22F4FE348F647C
3,470,973 UART: Caliptra RT
3,471,226 UART: [state] CFI Enabled
3,579,702 UART: [rt] RT listening for mailbox commands...
3,580,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,384 UART: [rt]cmd =0x41544d4e, len=14344
4,013,437 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,645 ready_for_fw is high
1,362,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,800 >>> mbox cmd response: success
2,988,424 UART:
2,988,440 UART: Running Caliptra FMC ...
2,988,848 UART:
2,988,902 UART: [state] CFI Enabled
2,999,929 UART: [fht] FMC Alias Private Key: 7
3,108,144 UART: [art] Extend RT PCRs Done
3,108,572 UART: [art] Lock RT PCRs Done
3,110,034 UART: [art] Populate DV Done
3,118,479 UART: [fht] FMC Alias Private Key: 7
3,119,545 UART: [art] Derive CDI
3,119,825 UART: [art] Store in in slot 0x4
3,205,206 UART: [art] Derive Key Pair
3,205,566 UART: [art] Store priv key in slot 0x5
3,217,834 UART: [art] Derive Key Pair - Done
3,232,797 UART: [art] Signing Cert with AUTHO
3,233,277 UART: RITY.KEYID = 7
3,248,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,250 UART: [art] PUB.X = 67757C1F6783AD6E5F67B2461901119CF967C9B87FFC4FD65D96B34D790EA3930708B08C92AC642BEBE0AE39F4E69F48
3,256,014 UART: [art] PUB.Y = 0CF05B029DDDD174C24D9A64A7D83E1D2EDFCB9AE01E1C4AA71C4F49AC6A1C65B4B396162B242962F781586D4477A8A5
3,262,972 UART: [art] SIG.R = 358B8E95E5A980CE5FBF3CFDA2112EEFAE63F353C5E532FCA0C3D607C2C5C603FC80B4F285A5211A10083CFF026BF9DC
3,269,752 UART: [art] SIG.S = BCE5B9AA506CD5336F4221E3D1FB5B0FCAC835F37AC3AB605C70F9541FDFF46CD55F9A4578A5ACCC0451562CC8AEF57A
3,294,139 UART: Caliptra RT
3,294,392 UART: [state] CFI Enabled
3,402,979 UART: [rt] RT listening for mailbox commands...
3,403,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,717 UART: [rt]cmd =0x41544d4e, len=14344
3,836,280 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,665 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,290 UART: [cold-reset] ++
1,476,784 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 ready_for_fw is high
1,480,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,747 UART: [idev] Erasing UDS.KEYID = 0
1,505,901 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,393 UART: [idev] --
1,515,356 UART: [ldev] ++
1,515,524 UART: [ldev] CDI.KEYID = 6
1,515,887 UART: [ldev] SUBJECT.KEYID = 5
1,516,313 UART: [ldev] AUTHORITY.KEYID = 7
1,516,776 UART: [ldev] FE.KEYID = 1
1,522,018 UART: [ldev] Erasing FE.KEYID = 1
1,546,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,975 UART: [ldev] --
1,586,278 UART: [fwproc] Waiting for Commands...
1,586,967 UART: [fwproc] Received command 0x46574c44
1,587,758 UART: [fwproc] Received Image of size 114332 bytes
2,884,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,029 >>> mbox cmd response: success
3,078,085 UART: [afmc] ++
3,078,253 UART: [afmc] CDI.KEYID = 6
3,078,615 UART: [afmc] SUBJECT.KEYID = 7
3,079,040 UART: [afmc] AUTHORITY.KEYID = 5
3,113,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,001 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,394 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,084 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,921 UART: [afmc] --
3,156,977 UART: [cold-reset] --
3,157,609 UART: [state] Locking Datavault
3,158,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,252 UART: [state] Locking ICCM
3,159,722 UART: [exit] Launching FMC @ 0x40000130
3,165,051 UART:
3,165,067 UART: Running Caliptra FMC ...
3,165,475 UART:
3,165,618 UART: [state] CFI Enabled
3,176,315 UART: [fht] FMC Alias Private Key: 7
3,283,838 UART: [art] Extend RT PCRs Done
3,284,266 UART: [art] Lock RT PCRs Done
3,285,948 UART: [art] Populate DV Done
3,294,311 UART: [fht] FMC Alias Private Key: 7
3,295,347 UART: [art] Derive CDI
3,295,627 UART: [art] Store in in slot 0x4
3,381,222 UART: [art] Derive Key Pair
3,381,582 UART: [art] Store priv key in slot 0x5
3,394,930 UART: [art] Derive Key Pair - Done
3,409,804 UART: [art] Signing Cert with AUTHO
3,410,284 UART: RITY.KEYID = 7
3,425,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,171 UART: [art] PUB.X = EE45517DD480D7A426E1188F960064B1F7F4567C40702D25915B0FD098D08D57AE9C40613B067033A7155928B4072DBB
3,432,902 UART: [art] PUB.Y = 9511489DB378AD8A76A32860FF24282867788EF2AAD6B07328F9AF26AFB30E5CFBAA0811ADA2D24148E8A93B3913321E
3,439,852 UART: [art] SIG.R = 00BDD661E76F85B2777F8676A52149FA45EE1F9A4C3836E4BCFB6E5602727057F6337E699298C05C715F1B1384BC180A
3,446,592 UART: [art] SIG.S = 99652A85AD1B791513534AC66B5149194151C3B6417A90FA66297BC21BB7299E3A2FFBC0BAF32BE694D525E91B894ADB
3,469,707 UART: Caliptra RT
3,470,052 UART: [state] CFI Enabled
3,578,080 UART: [rt] RT listening for mailbox commands...
3,578,750 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,890 UART: [rt]cmd =0x41544d4e, len=14344
4,011,621 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,288 ready_for_fw is high
1,363,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,551 >>> mbox cmd response: success
2,990,927 UART:
2,990,943 UART: Running Caliptra FMC ...
2,991,351 UART:
2,991,494 UART: [state] CFI Enabled
3,001,849 UART: [fht] FMC Alias Private Key: 7
3,110,144 UART: [art] Extend RT PCRs Done
3,110,572 UART: [art] Lock RT PCRs Done
3,111,988 UART: [art] Populate DV Done
3,120,473 UART: [fht] FMC Alias Private Key: 7
3,121,573 UART: [art] Derive CDI
3,121,853 UART: [art] Store in in slot 0x4
3,207,682 UART: [art] Derive Key Pair
3,208,042 UART: [art] Store priv key in slot 0x5
3,221,522 UART: [art] Derive Key Pair - Done
3,236,320 UART: [art] Signing Cert with AUTHO
3,236,800 UART: RITY.KEYID = 7
3,251,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,603 UART: [art] PUB.X = F0EB28703720244F3D5997560665A38A9CE7B51DC62ACAE1283A787D0DB01FDD5A86FA1CB1E4AB81D050121FE86844DB
3,259,377 UART: [art] PUB.Y = 2C2EE1CCD7999A8D78D7295B847C035B88796F005E85D9B4214141BED88B89A9C740FE9A4B8EDA16787545A2EF97B0A5
3,266,308 UART: [art] SIG.R = 4DB6D61040FD239FF80D51F0DDA1F357E9111276E1EFCD29C089026F1A58E63BB6EC6684834DC4AC54AAD25A744E2FA2
3,273,086 UART: [art] SIG.S = 3302D7E8EFA19253041E90CD3288F154207DBCD39572CD8DADACF5E2016B4CD6843D15B0D3BF6CE2DFB49601F3643170
3,297,125 UART: Caliptra RT
3,297,470 UART: [state] CFI Enabled
3,405,020 UART: [rt] RT listening for mailbox commands...
3,405,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,942 UART: [rt]cmd =0x41544d4e, len=14344
3,838,651 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,088 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,171,903 UART: [cold-reset] ++
1,172,273 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 ready_for_fw is high
1,176,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,694 UART: [idev] Erasing UDS.KEYID = 0
1,200,937 UART: [idev] Sha1 KeyId Algorithm
1,209,393 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,956 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,272 UART: [fwproc] Recv command 0x46574c44
1,284,000 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,065 >>> mbox cmd response: success
2,774,131 UART: [afmc] ++
2,774,299 UART: [afmc] CDI.KEYID = 6
2,774,661 UART: [afmc] SUBJECT.KEYID = 7
2,775,086 UART: [afmc] AUTHORITY.KEYID = 5
2,810,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,930 UART: [afmc] --
2,854,006 UART: [cold-reset] --
2,854,924 UART: [state] Locking Datavault
2,856,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,679 UART: [state] Locking ICCM
2,857,335 UART: [exit] Launching FMC @ 0x40000130
2,862,664 UART:
2,862,680 UART: Running Caliptra FMC ...
2,863,088 UART:
2,863,142 UART: [state] CFI Enabled
2,873,829 UART: [fht] FMC Alias Private Key: 7
2,981,624 UART: [art] Extend RT PCRs Done
2,982,052 UART: [art] Lock RT PCRs Done
2,983,660 UART: [art] Populate DV Done
2,991,763 UART: [fht] FMC Alias Private Key: 7
2,992,691 UART: [art] Derive CDI
2,992,971 UART: [art] Store in in slot 0x4
3,078,506 UART: [art] Derive Key Pair
3,078,866 UART: [art] Store priv key in slot 0x5
3,092,252 UART: [art] Derive Key Pair - Done
3,106,696 UART: [art] Signing Cert with AUTHO
3,107,176 UART: RITY.KEYID = 7
3,122,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,087 UART: [art] PUB.X = 14D6CBF23E32B5EA147563BA0E365FAFE2C75649F24D38EE3F3251C573BE88A29413A0E55243D08427FCEF1D07B8DCBA
3,129,865 UART: [art] PUB.Y = 230F2C7616F29A493B88D9DFA87858F10EE04F210FA0DC2774DCF0238C8BEB8DFB00ABD54C44BF052347862888D570C8
3,136,789 UART: [art] SIG.R = CB290CDF5CEF48DA75ED1698090D1C4BA69EE3123A9A54DAA4EDB2D09B79E9F490C5FBCED417ECF11A0607BA4BFE0616
3,143,569 UART: [art] SIG.S = 2723EFE4EF8C689C1C562B4914E55FE06B5FEA8DC4C81C3D6E75FB923C576B7DD4B0A685C0117E53B4C75ADC4ED4C150
3,166,722 UART: Caliptra RT
3,166,975 UART: [state] CFI Enabled
3,273,730 UART: [rt] RT listening for mailbox commands...
3,274,400 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,338 UART: [rt]cmd =0x41544d4e, len=14344
3,707,673 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,371 ready_for_fw is high
1,061,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,402 >>> mbox cmd response: success
2,689,370 UART:
2,689,386 UART: Running Caliptra FMC ...
2,689,794 UART:
2,689,848 UART: [state] CFI Enabled
2,700,585 UART: [fht] FMC Alias Private Key: 7
2,808,018 UART: [art] Extend RT PCRs Done
2,808,446 UART: [art] Lock RT PCRs Done
2,809,850 UART: [art] Populate DV Done
2,818,059 UART: [fht] FMC Alias Private Key: 7
2,818,991 UART: [art] Derive CDI
2,819,271 UART: [art] Store in in slot 0x4
2,904,932 UART: [art] Derive Key Pair
2,905,292 UART: [art] Store priv key in slot 0x5
2,918,286 UART: [art] Derive Key Pair - Done
2,932,969 UART: [art] Signing Cert with AUTHO
2,933,449 UART: RITY.KEYID = 7
2,948,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,454 UART: [art] PUB.X = 9AE4E2867544FA60F4493427370DBEB5C6261D9F946467B4FA115DDAB615273611E0107DA7FD59625E63D46CC5938E2D
2,956,221 UART: [art] PUB.Y = 76D93E6B9D67AA588E5E9587583A42D82D5F0BD9CA426AB1CB91A09CB2890297ABCDABA160F12C9B53463E3CE0728853
2,963,175 UART: [art] SIG.R = 01797C12134456C9861DD3465120B7BA26CB2DEE1E56CB0A11BDE56C957FDAC482DE753C61B78EEE26E2F8D68A2BAD6D
2,969,955 UART: [art] SIG.S = 32566C59554923A10632F51D89ACC33DDEC960A559B73B295F7256846C441244846A2FE99DE9B78D3BC354DAFE7377A7
2,993,279 UART: Caliptra RT
2,993,532 UART: [state] CFI Enabled
3,101,291 UART: [rt] RT listening for mailbox commands...
3,101,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,141 UART: [rt]cmd =0x41544d4e, len=14344
3,534,516 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
893,541 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,666 UART: [kat] ++
897,818 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 ready_for_fw is high
1,177,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,481 UART: [idev] Erasing UDS.KEYID = 0
1,202,010 UART: [idev] Sha1 KeyId Algorithm
1,210,340 UART: [idev] --
1,211,442 UART: [ldev] ++
1,211,610 UART: [ldev] CDI.KEYID = 6
1,211,973 UART: [ldev] SUBJECT.KEYID = 5
1,212,399 UART: [ldev] AUTHORITY.KEYID = 7
1,212,862 UART: [ldev] FE.KEYID = 1
1,218,208 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,066 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,137 UART: [fwproc] Recv command 0x46574c44
1,284,865 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,576 >>> mbox cmd response: success
2,776,678 UART: [afmc] ++
2,776,846 UART: [afmc] CDI.KEYID = 6
2,777,208 UART: [afmc] SUBJECT.KEYID = 7
2,777,633 UART: [afmc] AUTHORITY.KEYID = 5
2,813,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,865 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,197 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,091 UART: [afmc] --
2,857,013 UART: [cold-reset] --
2,857,977 UART: [state] Locking Datavault
2,859,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,652 UART: [state] Locking ICCM
2,860,276 UART: [exit] Launching FMC @ 0x40000130
2,865,605 UART:
2,865,621 UART: Running Caliptra FMC ...
2,866,029 UART:
2,866,172 UART: [state] CFI Enabled
2,876,915 UART: [fht] FMC Alias Private Key: 7
2,985,028 UART: [art] Extend RT PCRs Done
2,985,456 UART: [art] Lock RT PCRs Done
2,986,680 UART: [art] Populate DV Done
2,994,855 UART: [fht] FMC Alias Private Key: 7
2,995,993 UART: [art] Derive CDI
2,996,273 UART: [art] Store in in slot 0x4
3,082,088 UART: [art] Derive Key Pair
3,082,448 UART: [art] Store priv key in slot 0x5
3,095,888 UART: [art] Derive Key Pair - Done
3,110,771 UART: [art] Signing Cert with AUTHO
3,111,251 UART: RITY.KEYID = 7
3,126,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,336 UART: [art] PUB.X = 4B22442E9F48980BF46F3A75AA9B84C4D76DCFEC8A8898F885562F17370EC12A71EE02B8119C8EF4ED0990920A912839
3,134,093 UART: [art] PUB.Y = F79DEAC1F38BEC46EDEF2561DEE3BB3EF5B20B6982AA08E0AE64F47FF4F14BB0940702A861ABB052AAADAF703A3AD099
3,141,061 UART: [art] SIG.R = 8CD2121A4F955536BA042807F81D4A47919CE091010BDA9E8B75F836F45A9847D0D1EE831CD14B7F13FF9359507C4785
3,147,817 UART: [art] SIG.S = 7C643C3A6DBF6615FC64A9687EF8F74FD959AA9E3ACDC6C7062D8AD3AD852826D29431F7A36057665267DFE2F61CD7CC
3,171,983 UART: Caliptra RT
3,172,328 UART: [state] CFI Enabled
3,279,991 UART: [rt] RT listening for mailbox commands...
3,280,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,431 UART: [rt]cmd =0x41544d4e, len=14344
3,713,634 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,604 ready_for_fw is high
1,060,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,661 >>> mbox cmd response: success
2,689,191 UART:
2,689,207 UART: Running Caliptra FMC ...
2,689,615 UART:
2,689,758 UART: [state] CFI Enabled
2,700,473 UART: [fht] FMC Alias Private Key: 7
2,808,804 UART: [art] Extend RT PCRs Done
2,809,232 UART: [art] Lock RT PCRs Done
2,810,544 UART: [art] Populate DV Done
2,818,607 UART: [fht] FMC Alias Private Key: 7
2,819,777 UART: [art] Derive CDI
2,820,057 UART: [art] Store in in slot 0x4
2,905,838 UART: [art] Derive Key Pair
2,906,198 UART: [art] Store priv key in slot 0x5
2,919,936 UART: [art] Derive Key Pair - Done
2,935,092 UART: [art] Signing Cert with AUTHO
2,935,572 UART: RITY.KEYID = 7
2,950,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,649 UART: [art] PUB.X = 128B69F8118D39D2DC538FA884A37E4431F1255023583851C41D3CEF48FF3A2B83AD3D5B0AAA278569611A370C761AC4
2,958,413 UART: [art] PUB.Y = 0CE618748D8B72B027D84D74A2A922BFD89757AEBC0E57CAFAD041B11C0C10704B0045B10EF2CFFF2397165CD815B203
2,965,336 UART: [art] SIG.R = AF5CD5AC92A447991F305D506E129CE876538ED77B4DD319810285D1D6750DA986B4335973E10B3CFD98670268EF338D
2,972,092 UART: [art] SIG.S = B478CEB96195A3EA058D2C7DAD0BF64D7FE445438C876CFF9559773A17E75A71050A1A0AC32E15EF9D27EE62F37F745B
2,996,072 UART: Caliptra RT
2,996,417 UART: [state] CFI Enabled
3,104,297 UART: [rt] RT listening for mailbox commands...
3,104,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,859 UART: [rt]cmd =0x41544d4e, len=14344
3,538,008 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,169,993 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 ready_for_fw is high
1,173,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,209,066 UART: [ldev] ++
1,209,234 UART: [ldev] CDI.KEYID = 6
1,209,598 UART: [ldev] SUBJECT.KEYID = 5
1,210,025 UART: [ldev] AUTHORITY.KEYID = 7
1,210,488 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,314 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,157 >>> mbox cmd response: success
2,775,420 UART: [afmc] ++
2,775,588 UART: [afmc] CDI.KEYID = 6
2,775,951 UART: [afmc] SUBJECT.KEYID = 7
2,776,377 UART: [afmc] AUTHORITY.KEYID = 5
2,812,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,275 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,935 UART: [afmc] --
2,855,925 UART: [cold-reset] --
2,856,835 UART: [state] Locking Datavault
2,858,052 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,656 UART: [state] Locking ICCM
2,859,144 UART: [exit] Launching FMC @ 0x40000130
2,864,473 UART:
2,864,489 UART: Running Caliptra FMC ...
2,864,897 UART:
2,864,951 UART: [state] CFI Enabled
2,875,434 UART: [fht] FMC Alias Private Key: 7
2,983,449 UART: [art] Extend RT PCRs Done
2,983,877 UART: [art] Lock RT PCRs Done
2,985,159 UART: [art] Populate DV Done
2,993,576 UART: [fht] FMC Alias Private Key: 7
2,994,634 UART: [art] Derive CDI
2,994,914 UART: [art] Store in in slot 0x4
3,080,477 UART: [art] Derive Key Pair
3,080,837 UART: [art] Store priv key in slot 0x5
3,094,229 UART: [art] Derive Key Pair - Done
3,108,898 UART: [art] Signing Cert with AUTHO
3,109,378 UART: RITY.KEYID = 7
3,124,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,213 UART: [art] PUB.X = 1D4F49FCE86D2AB4B87ED81C52F47BD786461F15A0B9B7D524C19928B1E7067BFB0B471476BEBED20930161723262D5C
3,131,980 UART: [art] PUB.Y = 1873B3A8675DCA68ADA685893586BFBC15876BD15833BCD1F396EE5D5487E462CC1F9AB9EF060776CBDE5BB4083EA4D6
3,138,935 UART: [art] SIG.R = F5D19EC81B0435E4065E99456564BD0A4BFBB4AD227F227CEC4F891FF08F0B4357A5810DB986D645AF6D657A0F9FBD67
3,145,699 UART: [art] SIG.S = D99B7992FECB80722DECC6743601753D8830681F8EB3DC0B6D8A5ACE6A216D438B230BA3B02F22A35A74C57BF170C703
3,170,098 UART: Caliptra RT
3,170,351 UART: [state] CFI Enabled
3,278,111 UART: [rt] RT listening for mailbox commands...
3,278,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,879 UART: [rt]cmd =0x41544d4e, len=14344
3,711,516 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 ready_for_fw is high
1,055,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,109 >>> mbox cmd response: success
2,685,659 UART:
2,685,675 UART: Running Caliptra FMC ...
2,686,083 UART:
2,686,137 UART: [state] CFI Enabled
2,696,550 UART: [fht] FMC Alias Private Key: 7
2,805,333 UART: [art] Extend RT PCRs Done
2,805,761 UART: [art] Lock RT PCRs Done
2,807,567 UART: [art] Populate DV Done
2,815,858 UART: [fht] FMC Alias Private Key: 7
2,816,932 UART: [art] Derive CDI
2,817,212 UART: [art] Store in in slot 0x4
2,902,937 UART: [art] Derive Key Pair
2,903,297 UART: [art] Store priv key in slot 0x5
2,915,865 UART: [art] Derive Key Pair - Done
2,930,725 UART: [art] Signing Cert with AUTHO
2,931,205 UART: RITY.KEYID = 7
2,945,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,764 UART: [art] PUB.X = 8D2A949884543DEA28E828235510D32B05103D2D27A0989D5AFBBB2E2F71D566F10888E022AED8E1317EE89E001BB215
2,953,506 UART: [art] PUB.Y = 7F5D4E8FCEF086F0F8D59E7FA44566DB8A84A576B875A88DF4662A1429125DD439BEA8FB8D9B281A3474E095C6EBE729
2,960,468 UART: [art] SIG.R = FD5C69E8DDE3C7F2D0E40BAAEB6ABA198A49BA65ECCA871AC97A44C73B7FD02F553B368540F5A1F20BF798FBDC295FE3
2,967,262 UART: [art] SIG.S = 9FFE769D3480C623F4340639F47B539BA41FBFB87D23CE2DD67AE116EC7D0F23C532543B5E1EAA764E8FF1812CB1724B
2,990,863 UART: Caliptra RT
2,991,116 UART: [state] CFI Enabled
3,099,906 UART: [rt] RT listening for mailbox commands...
3,100,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,822 UART: [rt]cmd =0x41544d4e, len=14344
3,533,705 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,174,794 ready_for_fw is high
1,174,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,850 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,283,098 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,398 >>> mbox cmd response: success
2,775,585 UART: [afmc] ++
2,775,753 UART: [afmc] CDI.KEYID = 6
2,776,116 UART: [afmc] SUBJECT.KEYID = 7
2,776,542 UART: [afmc] AUTHORITY.KEYID = 5
2,812,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,424 UART: [afmc] --
2,855,412 UART: [cold-reset] --
2,856,152 UART: [state] Locking Datavault
2,857,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,873 UART: [state] Locking ICCM
2,858,485 UART: [exit] Launching FMC @ 0x40000130
2,863,814 UART:
2,863,830 UART: Running Caliptra FMC ...
2,864,238 UART:
2,864,381 UART: [state] CFI Enabled
2,874,984 UART: [fht] FMC Alias Private Key: 7
2,982,869 UART: [art] Extend RT PCRs Done
2,983,297 UART: [art] Lock RT PCRs Done
2,984,809 UART: [art] Populate DV Done
2,993,074 UART: [fht] FMC Alias Private Key: 7
2,994,054 UART: [art] Derive CDI
2,994,334 UART: [art] Store in in slot 0x4
3,079,961 UART: [art] Derive Key Pair
3,080,321 UART: [art] Store priv key in slot 0x5
3,093,419 UART: [art] Derive Key Pair - Done
3,107,926 UART: [art] Signing Cert with AUTHO
3,108,406 UART: RITY.KEYID = 7
3,123,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,063 UART: [art] PUB.X = 67A013AD33ADA00EB9635BBDE2CB1728D57CFC2BD3AF2D82B2AD275CC27C58B24C92792DEA6B891B4AFAA4A82C1CAA27
3,130,858 UART: [art] PUB.Y = 0C76CEA47B8C2BAD565334217E0D7FBEE1C45B034A22CC76A8F3F0497C3399C3E1F907265C3C33F372F924D988C811EE
3,137,804 UART: [art] SIG.R = 3BA3EF6F409352440D41A3C824E2092CD37F2E5AC0D562CCF6E764EED55391A0835B73B2E3093A188D86D5536315A46B
3,144,567 UART: [art] SIG.S = A6A9070E34265753E34263FC7AA412BF189A9302D7B83E66AF1C434BD7D0B05A1ACC684CE49CA36AC8C01763E75C20BB
3,168,149 UART: Caliptra RT
3,168,494 UART: [state] CFI Enabled
3,276,005 UART: [rt] RT listening for mailbox commands...
3,276,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,987 UART: [rt]cmd =0x41544d4e, len=14344
3,710,032 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,553 ready_for_fw is high
1,056,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,242 >>> mbox cmd response: success
2,687,938 UART:
2,687,954 UART: Running Caliptra FMC ...
2,688,362 UART:
2,688,505 UART: [state] CFI Enabled
2,699,424 UART: [fht] FMC Alias Private Key: 7
2,806,591 UART: [art] Extend RT PCRs Done
2,807,019 UART: [art] Lock RT PCRs Done
2,808,705 UART: [art] Populate DV Done
2,816,934 UART: [fht] FMC Alias Private Key: 7
2,817,880 UART: [art] Derive CDI
2,818,160 UART: [art] Store in in slot 0x4
2,903,753 UART: [art] Derive Key Pair
2,904,113 UART: [art] Store priv key in slot 0x5
2,917,373 UART: [art] Derive Key Pair - Done
2,932,101 UART: [art] Signing Cert with AUTHO
2,932,581 UART: RITY.KEYID = 7
2,947,347 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,112 UART: [art] PUB.X = 3187ED513AEB770A834C931E2482B056A7399C3BF7D3F886C2A4C2AD1B89F48B31AE24803AE0CA914F2F52D84EA17E34
2,954,887 UART: [art] PUB.Y = AF99CFEE221180C720294737373DFFF80461425861F01CFC2C55EDE3E794F927D070AF1859D5998F1D2296BEB57CBE44
2,961,838 UART: [art] SIG.R = 3A81D93F4154BC3527755299919DDB6C711327558F66084A0A8A063F633F9019166226C91F6DEF0B5E5390D3FD2995BE
2,968,588 UART: [art] SIG.S = 194759E39BFADE537205A849C8983CCFE9D6491F1296812031E1CDE6BEB5203AFED8334057BC63FD0324F7992A96D8F0
2,992,523 UART: Caliptra RT
2,992,868 UART: [state] CFI Enabled
3,100,263 UART: [rt] RT listening for mailbox commands...
3,100,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,091 UART: [rt]cmd =0x41544d4e, len=14344
3,534,074 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,611 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,758 UART: [idev] ++
1,479,926 UART: [idev] CDI.KEYID = 6
1,480,286 UART: [idev] SUBJECT.KEYID = 7
1,480,710 UART: [idev] UDS.KEYID = 0
1,481,055 ready_for_fw is high
1,481,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,688 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,810 UART: [ldev] --
1,585,151 UART: [fwproc] Waiting for Commands...
1,585,778 UART: [fwproc] Received command 0x46574c44
1,586,569 UART: [fwproc] Received Image of size 114332 bytes
5,270,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,464,869 >>> mbox cmd response: success
5,466,093 UART: [afmc] ++
5,466,261 UART: [afmc] CDI.KEYID = 6
5,466,623 UART: [afmc] SUBJECT.KEYID = 7
5,467,048 UART: [afmc] AUTHORITY.KEYID = 5
5,501,998 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,518,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,518,836 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,524,545 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,530,437 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,536,138 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,543,838 UART: [afmc] --
5,544,736 UART: [cold-reset] --
5,545,360 UART: [state] Locking Datavault
5,546,523 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,127 UART: [state] Locking ICCM
5,547,651 UART: [exit] Launching FMC @ 0x40000130
5,552,980 UART:
5,552,996 UART: Running Caliptra FMC ...
5,553,404 UART:
5,553,458 UART: [state] CFI Enabled
5,563,802 UART: [fht] FMC Alias Private Key: 7
5,671,572 UART: [art] Extend RT PCRs Done
5,672,000 UART: [art] Lock RT PCRs Done
5,673,570 UART: [art] Populate DV Done
5,681,690 UART: [fht] FMC Alias Private Key: 7
5,682,652 UART: [art] Derive CDI
5,682,932 UART: [art] Store in in slot 0x4
5,768,985 UART: [art] Derive Key Pair
5,769,345 UART: [art] Store priv key in slot 0x5
5,782,549 UART: [art] Derive Key Pair - Done
5,796,880 UART: [art] Signing Cert with AUTHO
5,797,360 UART: RITY.KEYID = 7
5,812,322 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,087 UART: [art] PUB.X = F1BCBD6A936597C030BC8707E7971158537F168DE81C26ADA265891DC4907C053ED831FBB4E449C5C2336177C1E9FCE7
5,819,855 UART: [art] PUB.Y = CC170F21F969D047DE5CA470BCE98EA3AF1CB6F09D34783388769FDA118709182797D67C74C3E90A9B392569C55B6252
5,826,796 UART: [art] SIG.R = 5C6456EC2A5EF21A89D051A69585C475D31D3EA7FACA0EB8BFAE7F1D8510A973A1FA4CC644C6175C04A5F0D6D63926DF
5,833,578 UART: [art] SIG.S = B1E32203A171068F738EE47E48AA442C803F09B915C72E6116A55E899C55CF52BDFD30CE198D88387FD96EF8CCEB0D39
5,857,851 UART: Caliptra RT
5,858,104 UART: [state] CFI Enabled
5,966,715 UART: [rt] RT listening for mailbox commands...
5,967,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,315 UART: [rt]cmd =0x41544d4e, len=14344
6,091,922 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,791 ready_for_fw is high
1,362,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,389,893 >>> mbox cmd response: success
5,452,210 UART:
5,452,226 UART: Running Caliptra FMC ...
5,452,634 UART:
5,452,688 UART: [state] CFI Enabled
5,462,828 UART: [fht] FMC Alias Private Key: 7
5,570,324 UART: [art] Extend RT PCRs Done
5,570,752 UART: [art] Lock RT PCRs Done
5,572,334 UART: [art] Populate DV Done
5,580,866 UART: [fht] FMC Alias Private Key: 7
5,581,882 UART: [art] Derive CDI
5,582,162 UART: [art] Store in in slot 0x4
5,667,919 UART: [art] Derive Key Pair
5,668,279 UART: [art] Store priv key in slot 0x5
5,681,421 UART: [art] Derive Key Pair - Done
5,696,418 UART: [art] Signing Cert with AUTHO
5,696,898 UART: RITY.KEYID = 7
5,711,338 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,103 UART: [art] PUB.X = A7640C03382CFC5A2BACF2FE2C3CEE16169ECBA82A3893CD73DAF22ADFC409F9EBE13ED131E4A4B9D14EAFD802CF6029
5,718,891 UART: [art] PUB.Y = 4C7D37A6A589EBEF0E90DF05653136B537892689FD98310587FCC9CAECA8C2A4FB5C6E0EFF749B4D19B8CA8A00FA69C1
5,725,825 UART: [art] SIG.R = 45FAD8C8F9B3E908257A78BEDFAF3064FF10388A36771E5D24D47AC732C309ECBE8D41E36B586ACEC540236F8C1AC64C
5,732,605 UART: [art] SIG.S = AC460DB40A2E8EE14EE4EDAA9445162D239DA06BA541213ADF904FF2428CA9D8FC3D30D395B4384E5221F0FFD6597EF9
5,756,588 UART: Caliptra RT
5,756,841 UART: [state] CFI Enabled
5,865,576 UART: [rt] RT listening for mailbox commands...
5,866,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,989,316 UART: [rt]cmd =0x41544d4e, len=14344
5,990,947 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,875 UART: [kat] SHA2-512-ACC
897,776 UART: [kat] ECC-384
903,297 UART: [kat] HMAC-384Kdf
908,009 UART: [kat] LMS
1,476,205 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,382 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 ready_for_fw is high
1,481,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,231 UART: [idev] Erasing UDS.KEYID = 0
1,506,651 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,271 UART: [idev] --
1,516,304 UART: [ldev] ++
1,516,472 UART: [ldev] CDI.KEYID = 6
1,516,835 UART: [ldev] SUBJECT.KEYID = 5
1,517,261 UART: [ldev] AUTHORITY.KEYID = 7
1,517,724 UART: [ldev] FE.KEYID = 1
1,523,058 UART: [ldev] Erasing FE.KEYID = 1
1,548,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,607 UART: [ldev] --
1,588,094 UART: [fwproc] Waiting for Commands...
1,588,801 UART: [fwproc] Received command 0x46574c44
1,589,592 UART: [fwproc] Received Image of size 114332 bytes
5,122,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,315,524 >>> mbox cmd response: success
5,316,636 UART: [afmc] ++
5,316,804 UART: [afmc] CDI.KEYID = 6
5,317,166 UART: [afmc] SUBJECT.KEYID = 7
5,317,591 UART: [afmc] AUTHORITY.KEYID = 5
5,353,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,265 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,974 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,381,866 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,567 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,413 UART: [afmc] --
5,396,399 UART: [cold-reset] --
5,396,937 UART: [state] Locking Datavault
5,397,932 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,536 UART: [state] Locking ICCM
5,399,092 UART: [exit] Launching FMC @ 0x40000130
5,404,421 UART:
5,404,437 UART: Running Caliptra FMC ...
5,404,845 UART:
5,404,988 UART: [state] CFI Enabled
5,415,752 UART: [fht] FMC Alias Private Key: 7
5,523,408 UART: [art] Extend RT PCRs Done
5,523,836 UART: [art] Lock RT PCRs Done
5,525,176 UART: [art] Populate DV Done
5,533,344 UART: [fht] FMC Alias Private Key: 7
5,534,400 UART: [art] Derive CDI
5,534,680 UART: [art] Store in in slot 0x4
5,620,387 UART: [art] Derive Key Pair
5,620,747 UART: [art] Store priv key in slot 0x5
5,634,183 UART: [art] Derive Key Pair - Done
5,649,046 UART: [art] Signing Cert with AUTHO
5,649,526 UART: RITY.KEYID = 7
5,665,088 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,853 UART: [art] PUB.X = 56B7F41DC50039BC6B44F8D9DB83B4528B507B9D03095771A1A133355ED211122E8BFC0A464C9EDC42C1844E87B5389B
5,672,594 UART: [art] PUB.Y = 270BA3466BE3C07802B9F2AD5A8EB7FD9245A850223DA88BB28B246E8FF28EB7C5BB0E666872A375772E6A17568C4AFC
5,679,545 UART: [art] SIG.R = B7DD0FA0A3562445FEEE1ED7436388BFFC8D7AD3A44AE3A13676781295F5778305FDE536436F93A032460F29C9132F4B
5,686,310 UART: [art] SIG.S = 8098BCB34A3726F8DDE4F670ACEEE24F848A946EFFB878386997CF8849711D00A2098281F004F82442EA0A6BB92ECE68
5,709,956 UART: Caliptra RT
5,710,301 UART: [state] CFI Enabled
5,818,519 UART: [rt] RT listening for mailbox commands...
5,819,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,942,131 UART: [rt]cmd =0x41544d4e, len=14344
5,943,658 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,128 ready_for_fw is high
1,363,128 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,278,791 >>> mbox cmd response: success
5,340,474 UART:
5,340,490 UART: Running Caliptra FMC ...
5,340,898 UART:
5,341,041 UART: [state] CFI Enabled
5,351,619 UART: [fht] FMC Alias Private Key: 7
5,459,667 UART: [art] Extend RT PCRs Done
5,460,095 UART: [art] Lock RT PCRs Done
5,461,727 UART: [art] Populate DV Done
5,470,083 UART: [fht] FMC Alias Private Key: 7
5,471,095 UART: [art] Derive CDI
5,471,375 UART: [art] Store in in slot 0x4
5,556,946 UART: [art] Derive Key Pair
5,557,306 UART: [art] Store priv key in slot 0x5
5,570,928 UART: [art] Derive Key Pair - Done
5,585,811 UART: [art] Signing Cert with AUTHO
5,586,291 UART: RITY.KEYID = 7
5,601,483 UART: [art] Erasing AUTHORITY.KEYID = 7
5,602,248 UART: [art] PUB.X = 6080C46C753368D048232B77BEEDBCBBAC4983DC6B6FCE1B39B8F7583CFD532E0624BEF98023CBBB3A30CECF220021AF
5,609,013 UART: [art] PUB.Y = 6FDAF5864F7D32B1D83178275B7E8DB36B2DC33A4EC022ECEA56DCBBA9E0ED85743BB5A090D80FB1D6614901DFC9B084
5,615,977 UART: [art] SIG.R = C4A0F6B66A4184680126E5EAF6BBDC4AD3716CDF424493E8037F86869A5AE0AEE90D1592B5BFD7E86DB416C31E79F28D
5,622,752 UART: [art] SIG.S = 08993623F18D3C8A6735DC6F325A2C9619698ED1A25F5B7E5C37A83BB9E061615770564BEDFBFB90B19F8F4499AEA192
5,646,956 UART: Caliptra RT
5,647,301 UART: [state] CFI Enabled
5,754,760 UART: [rt] RT listening for mailbox commands...
5,755,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,352 UART: [rt]cmd =0x41544d4e, len=14344
5,879,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,806 UART: [state] LifecycleState = Unprovisioned
86,461 UART: [state] DebugLocked = No
87,153 UART: [state] WD Timer not started. Device not locked for debugging
88,422 UART: [kat] SHA2-256
894,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,197 UART: [kat] ++
898,349 UART: [kat] sha1
902,505 UART: [kat] SHA2-256
904,445 UART: [kat] SHA2-384
907,350 UART: [kat] SHA2-512-ACC
909,251 UART: [kat] ECC-384
919,196 UART: [kat] HMAC-384Kdf
923,638 UART: [kat] LMS
1,171,966 UART: [kat] --
1,172,775 UART: [cold-reset] ++
1,173,181 UART: [fht] FHT @ 0x50003400
1,175,770 UART: [idev] ++
1,175,938 UART: [idev] CDI.KEYID = 6
1,176,298 UART: [idev] SUBJECT.KEYID = 7
1,176,722 UART: [idev] UDS.KEYID = 0
1,177,067 ready_for_fw is high
1,177,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,614 UART: [idev] Erasing UDS.KEYID = 0
1,201,585 UART: [idev] Sha1 KeyId Algorithm
1,209,929 UART: [idev] --
1,211,151 UART: [ldev] ++
1,211,319 UART: [ldev] CDI.KEYID = 6
1,211,682 UART: [ldev] SUBJECT.KEYID = 5
1,212,108 UART: [ldev] AUTHORITY.KEYID = 7
1,212,571 UART: [ldev] FE.KEYID = 1
1,217,559 UART: [ldev] Erasing FE.KEYID = 1
1,244,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,443 UART: [ldev] --
1,283,772 UART: [fwproc] Wait for Commands...
1,284,402 UART: [fwproc] Recv command 0x46574c44
1,285,130 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,639 >>> mbox cmd response: success
3,316,805 UART: [afmc] ++
3,316,973 UART: [afmc] CDI.KEYID = 6
3,317,335 UART: [afmc] SUBJECT.KEYID = 7
3,317,760 UART: [afmc] AUTHORITY.KEYID = 5
3,353,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,471 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,180 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,072 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,783 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,658 UART: [afmc] --
3,396,746 UART: [cold-reset] --
3,397,662 UART: [state] Locking Datavault
3,398,741 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,345 UART: [state] Locking ICCM
3,399,867 UART: [exit] Launching FMC @ 0x40000130
3,405,196 UART:
3,405,212 UART: Running Caliptra FMC ...
3,405,620 UART:
3,405,674 UART: [state] CFI Enabled
3,416,030 UART: [fht] FMC Alias Private Key: 7
3,523,234 UART: [art] Extend RT PCRs Done
3,523,662 UART: [art] Lock RT PCRs Done
3,525,114 UART: [art] Populate DV Done
3,532,908 UART: [fht] FMC Alias Private Key: 7
3,533,846 UART: [art] Derive CDI
3,534,126 UART: [art] Store in in slot 0x4
3,620,081 UART: [art] Derive Key Pair
3,620,441 UART: [art] Store priv key in slot 0x5
3,634,001 UART: [art] Derive Key Pair - Done
3,648,804 UART: [art] Signing Cert with AUTHO
3,649,284 UART: RITY.KEYID = 7
3,664,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,581 UART: [art] PUB.X = 61217B7869367C6EB595509ED58E6D574AEE8A6BF9F721163A7FADAA330D72ECC776320E41CB8F0C9A28F68EDB34FE28
3,672,354 UART: [art] PUB.Y = 878D7E37FF1CB10A0E170FEE5DE296CF49A25ABDAEB9AC0E067E3E24D3E310F501B15B55B721819780D94ECFBA737351
3,679,302 UART: [art] SIG.R = 8A2309DDE568B41A31620C2AD9D057199A5091BED801DD64D2EE1D6B3710E1694BB806021E22C9D5D5C67D9F9ACF1F88
3,686,065 UART: [art] SIG.S = 2756AFFFBF8C1D4FCB1C89E18A8266FB5EE493B952AB92F47C20BEAA0B8ED3A0A014A70897B087BB7386E78320D3DF99
3,709,484 UART: Caliptra RT
3,709,737 UART: [state] CFI Enabled
3,817,639 UART: [rt] RT listening for mailbox commands...
3,818,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,231 UART: [rt]cmd =0x41544d4e, len=14344
3,942,650 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 ready_for_fw is high
1,060,777 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,240 >>> mbox cmd response: success
3,234,961 UART:
3,234,977 UART: Running Caliptra FMC ...
3,235,385 UART:
3,235,439 UART: [state] CFI Enabled
3,245,519 UART: [fht] FMC Alias Private Key: 7
3,353,121 UART: [art] Extend RT PCRs Done
3,353,549 UART: [art] Lock RT PCRs Done
3,354,927 UART: [art] Populate DV Done
3,363,183 UART: [fht] FMC Alias Private Key: 7
3,364,219 UART: [art] Derive CDI
3,364,499 UART: [art] Store in in slot 0x4
3,450,164 UART: [art] Derive Key Pair
3,450,524 UART: [art] Store priv key in slot 0x5
3,464,426 UART: [art] Derive Key Pair - Done
3,478,908 UART: [art] Signing Cert with AUTHO
3,479,388 UART: RITY.KEYID = 7
3,494,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,321 UART: [art] PUB.X = 7FF1E428CE8D4119A16E28CA5CA3D080E43045067BB6921A0FFAC07BB9B8332F2F9D8E2365423172F2F2CA4F21B65F74
3,502,093 UART: [art] PUB.Y = 478C96F291B6F02988F10C3014E60CB5E90A0666A5985CABDA80F955FEE1882325A12F55CCF113F9C82820FF9760C9E4
3,509,033 UART: [art] SIG.R = 3A9EA47766224AB941A6297018C7FF55EF27602356E2496EEE0DA0D0CBD5542431511D28B08AD8028A2698E75D791BBF
3,515,797 UART: [art] SIG.S = 896F4CDA4D68CE54D9874DD7196FB9E51028F65417BF1B349B4A6DE2279A7D0C37DD77297B0B37BC9F133DB4E718438A
3,539,302 UART: Caliptra RT
3,539,555 UART: [state] CFI Enabled
3,647,229 UART: [rt] RT listening for mailbox commands...
3,647,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,969 UART: [rt]cmd =0x41544d4e, len=14344
3,772,696 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
906,863 UART: [kat] SHA2-512-ACC
908,764 UART: [kat] ECC-384
919,065 UART: [kat] HMAC-384Kdf
923,747 UART: [kat] LMS
1,172,075 UART: [kat] --
1,172,764 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,763 UART: [idev] ++
1,175,931 UART: [idev] CDI.KEYID = 6
1,176,291 UART: [idev] SUBJECT.KEYID = 7
1,176,715 UART: [idev] UDS.KEYID = 0
1,177,060 ready_for_fw is high
1,177,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,458 UART: [idev] Sha1 KeyId Algorithm
1,210,948 UART: [idev] --
1,212,036 UART: [ldev] ++
1,212,204 UART: [ldev] CDI.KEYID = 6
1,212,567 UART: [ldev] SUBJECT.KEYID = 5
1,212,993 UART: [ldev] AUTHORITY.KEYID = 7
1,213,456 UART: [ldev] FE.KEYID = 1
1,219,012 UART: [ldev] Erasing FE.KEYID = 1
1,245,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,214 UART: [ldev] --
1,284,619 UART: [fwproc] Wait for Commands...
1,285,431 UART: [fwproc] Recv command 0x46574c44
1,286,159 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,311,294 >>> mbox cmd response: success
3,312,406 UART: [afmc] ++
3,312,574 UART: [afmc] CDI.KEYID = 6
3,312,936 UART: [afmc] SUBJECT.KEYID = 7
3,313,361 UART: [afmc] AUTHORITY.KEYID = 5
3,348,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,206 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,915 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,807 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,518 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,381 UART: [afmc] --
3,392,429 UART: [cold-reset] --
3,393,321 UART: [state] Locking Datavault
3,394,438 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,042 UART: [state] Locking ICCM
3,395,572 UART: [exit] Launching FMC @ 0x40000130
3,400,901 UART:
3,400,917 UART: Running Caliptra FMC ...
3,401,325 UART:
3,401,468 UART: [state] CFI Enabled
3,411,810 UART: [fht] FMC Alias Private Key: 7
3,519,950 UART: [art] Extend RT PCRs Done
3,520,378 UART: [art] Lock RT PCRs Done
3,521,844 UART: [art] Populate DV Done
3,530,246 UART: [fht] FMC Alias Private Key: 7
3,531,410 UART: [art] Derive CDI
3,531,690 UART: [art] Store in in slot 0x4
3,617,295 UART: [art] Derive Key Pair
3,617,655 UART: [art] Store priv key in slot 0x5
3,630,975 UART: [art] Derive Key Pair - Done
3,645,878 UART: [art] Signing Cert with AUTHO
3,646,358 UART: RITY.KEYID = 7
3,661,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,617 UART: [art] PUB.X = 6885DC840E623BEE4E1A42227442E5BE79E638CA3012E1FE32D57B6743A8D51DEF9336A8A2EE386D8EF01996C4C89829
3,669,388 UART: [art] PUB.Y = 47C0236679D1BC47B13C2F4A487FC4A8E49744AF0DF50F33A7FB34214F4D5464E135113FAE038A09A14222DB9547D1AF
3,676,330 UART: [art] SIG.R = 86B80EAFDBD37D3834DA9BE6445E790E0BE5A8C11F06D1B326E81DC7D301D919A184ACDA8A4AF725B1552BF7FCDD70C1
3,683,107 UART: [art] SIG.S = D81B0BD01CE109530817DA6ADD2C1476BA16FEBEB8A9AB425DAB41249B712A161EFBBF95CAB31DC1ED22FDA4D31407AE
3,707,090 UART: Caliptra RT
3,707,435 UART: [state] CFI Enabled
3,815,140 UART: [rt] RT listening for mailbox commands...
3,815,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,102 UART: [rt]cmd =0x41544d4e, len=14344
3,940,645 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,649 >>> mbox cmd response: success
3,233,704 UART:
3,233,720 UART: Running Caliptra FMC ...
3,234,128 UART:
3,234,271 UART: [state] CFI Enabled
3,244,957 UART: [fht] FMC Alias Private Key: 7
3,352,923 UART: [art] Extend RT PCRs Done
3,353,351 UART: [art] Lock RT PCRs Done
3,354,587 UART: [art] Populate DV Done
3,363,057 UART: [fht] FMC Alias Private Key: 7
3,364,145 UART: [art] Derive CDI
3,364,425 UART: [art] Store in in slot 0x4
3,449,520 UART: [art] Derive Key Pair
3,449,880 UART: [art] Store priv key in slot 0x5
3,463,078 UART: [art] Derive Key Pair - Done
3,477,773 UART: [art] Signing Cert with AUTHO
3,478,253 UART: RITY.KEYID = 7
3,493,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,018 UART: [art] PUB.X = DA9A67DCC5299C8EBF32022CD11911B1EF4AFB8AA9209F87A9FEA094C7B832F62514D0991B6A716C0362292F50A5DBC3
3,500,794 UART: [art] PUB.Y = 0C8E4B876C838EB8800081E7DB8890187C62A4DE1710FCDF0C2F2F3B89D151A0746B58F6D979EB3F855D7DD366F58FFA
3,507,726 UART: [art] SIG.R = 9FAAA9C4DB8FF7AD32417CD1AEF4ECA6BAFC7CA1B6324FABD46765B8D7C38BF7CF2FB4CA3ADEC8AF2D9DB202901C2182
3,514,533 UART: [art] SIG.S = 0783A744BC6D15D0252653BA3904490D8E671E6DC4B12CC167DFBCC37C026E04905D2CA15F09E1E3AD53096A25946308
3,538,344 UART: Caliptra RT
3,538,689 UART: [state] CFI Enabled
3,646,721 UART: [rt] RT listening for mailbox commands...
3,647,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,623 UART: [rt]cmd =0x41544d4e, len=14344
3,772,330 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 ready_for_fw is high
1,174,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,419 UART: [idev] Sha1 KeyId Algorithm
1,207,313 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,487 UART: [fwproc] Recv command 0x46574c44
1,282,220 UART: [fwproc] Recv'd Img size: 114332 bytes
3,120,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,340 >>> mbox cmd response: success
3,314,387 UART: [afmc] ++
3,314,555 UART: [afmc] CDI.KEYID = 6
3,314,918 UART: [afmc] SUBJECT.KEYID = 7
3,315,344 UART: [afmc] AUTHORITY.KEYID = 5
3,350,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,873 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,583 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,473 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,184 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,986 UART: [afmc] --
3,394,118 UART: [cold-reset] --
3,395,002 UART: [state] Locking Datavault
3,396,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,741 UART: [state] Locking ICCM
3,397,375 UART: [exit] Launching FMC @ 0x40000130
3,402,704 UART:
3,402,720 UART: Running Caliptra FMC ...
3,403,128 UART:
3,403,182 UART: [state] CFI Enabled
3,413,432 UART: [fht] FMC Alias Private Key: 7
3,520,976 UART: [art] Extend RT PCRs Done
3,521,404 UART: [art] Lock RT PCRs Done
3,522,966 UART: [art] Populate DV Done
3,531,090 UART: [fht] FMC Alias Private Key: 7
3,532,270 UART: [art] Derive CDI
3,532,550 UART: [art] Store in in slot 0x4
3,618,331 UART: [art] Derive Key Pair
3,618,691 UART: [art] Store priv key in slot 0x5
3,631,665 UART: [art] Derive Key Pair - Done
3,646,707 UART: [art] Signing Cert with AUTHO
3,647,187 UART: RITY.KEYID = 7
3,662,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,102 UART: [art] PUB.X = 88757079F8E23D630C3A71CE00440C133D5DC1194BF8C83AFB457AED93056E895DD65509B2C09FC421F50DF9251E5FD3
3,669,839 UART: [art] PUB.Y = 285CE0188EC2C4F87C7FDB5B2F4C9FC4845D137B55D828F38CC42B99179DB046FBDF5CEF6FE49DD78645AE205A40EAC1
3,676,809 UART: [art] SIG.R = 9EC8AF8E0D1A54517D836F73DB30B0863D870C611DFDB10E47003446276B99D4D6466E8BDA83B8A76D401404962852EC
3,683,545 UART: [art] SIG.S = 2F2078031C51B74E111EC0A7C28995547D99E8B8E4E83820F3CE8E4C7E283C972BCD8C858F2B321AFD9B212579EC516D
3,707,105 UART: Caliptra RT
3,707,358 UART: [state] CFI Enabled
3,814,148 UART: [rt] RT listening for mailbox commands...
3,814,818 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,582 UART: [rt]cmd =0x41544d4e, len=14344
3,938,879 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,900 ready_for_fw is high
1,055,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,524 >>> mbox cmd response: success
3,232,441 UART:
3,232,457 UART: Running Caliptra FMC ...
3,232,865 UART:
3,232,919 UART: [state] CFI Enabled
3,243,499 UART: [fht] FMC Alias Private Key: 7
3,351,337 UART: [art] Extend RT PCRs Done
3,351,765 UART: [art] Lock RT PCRs Done
3,353,513 UART: [art] Populate DV Done
3,361,853 UART: [fht] FMC Alias Private Key: 7
3,362,845 UART: [art] Derive CDI
3,363,125 UART: [art] Store in in slot 0x4
3,448,704 UART: [art] Derive Key Pair
3,449,064 UART: [art] Store priv key in slot 0x5
3,462,564 UART: [art] Derive Key Pair - Done
3,477,213 UART: [art] Signing Cert with AUTHO
3,477,693 UART: RITY.KEYID = 7
3,492,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,354 UART: [art] PUB.X = 67F0B8F2A7D66B2639A4286FA3E9B45CD802546505E5FD18F56F9CBAB9939AB026CFF1CBBC37BA76FD0C00FF82036046
3,500,104 UART: [art] PUB.Y = D8EA78BF090360AD548F0362DFA1F726ABBC02304CCBF4BB0D1AC1B2FFBE305B965F0E1953D4DAD34E8CE029CEFB19F1
3,507,064 UART: [art] SIG.R = 58CDF38EB84A30A070D0A6CA2B54F03FFABADF4E62F2439E2F64F5EE883E15A88C326A33737DAF87D1A63AEE84E621D0
3,513,854 UART: [art] SIG.S = 9AC3FF2FB04FB170610B009C6BB75CB933B693A6785267EAB86857284DA459E873CEEB8377DE5C4BE803E38E2AF040D3
3,536,977 UART: Caliptra RT
3,537,230 UART: [state] CFI Enabled
3,645,946 UART: [rt] RT listening for mailbox commands...
3,646,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,670 UART: [rt]cmd =0x41544d4e, len=14344
3,771,081 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,317 UART: [kat] LMS
1,169,629 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,870 UART: [idev] ++
1,174,038 UART: [idev] CDI.KEYID = 6
1,174,399 UART: [idev] SUBJECT.KEYID = 7
1,174,824 UART: [idev] UDS.KEYID = 0
1,175,170 ready_for_fw is high
1,175,170 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,600 UART: [idev] Sha1 KeyId Algorithm
1,209,536 UART: [idev] --
1,210,393 UART: [ldev] ++
1,210,561 UART: [ldev] CDI.KEYID = 6
1,210,925 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,115 UART: [fwproc] Wait for Commands...
1,283,712 UART: [fwproc] Recv command 0x46574c44
1,284,445 UART: [fwproc] Recv'd Img size: 114332 bytes
3,113,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,307,348 >>> mbox cmd response: success
3,308,505 UART: [afmc] ++
3,308,673 UART: [afmc] CDI.KEYID = 6
3,309,036 UART: [afmc] SUBJECT.KEYID = 7
3,309,462 UART: [afmc] AUTHORITY.KEYID = 5
3,345,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,479 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,189 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,079 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,790 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,774 UART: [afmc] --
3,388,840 UART: [cold-reset] --
3,389,652 UART: [state] Locking Datavault
3,390,931 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,535 UART: [state] Locking ICCM
3,392,145 UART: [exit] Launching FMC @ 0x40000130
3,397,474 UART:
3,397,490 UART: Running Caliptra FMC ...
3,397,898 UART:
3,398,041 UART: [state] CFI Enabled
3,408,781 UART: [fht] FMC Alias Private Key: 7
3,516,549 UART: [art] Extend RT PCRs Done
3,516,977 UART: [art] Lock RT PCRs Done
3,518,331 UART: [art] Populate DV Done
3,526,729 UART: [fht] FMC Alias Private Key: 7
3,527,833 UART: [art] Derive CDI
3,528,113 UART: [art] Store in in slot 0x4
3,613,768 UART: [art] Derive Key Pair
3,614,128 UART: [art] Store priv key in slot 0x5
3,627,056 UART: [art] Derive Key Pair - Done
3,641,732 UART: [art] Signing Cert with AUTHO
3,642,212 UART: RITY.KEYID = 7
3,657,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,029 UART: [art] PUB.X = 2D001A8E8C0CFBE8248299A4203D44CA92E8203D127A1C3F160F9B31B513946B019A13A8D14551E5EE55CDA74563D869
3,664,768 UART: [art] PUB.Y = F7C65B96B3EB6E766E804932312089895F7E8E92C4CB6D80F0C6FC059E27A1FEC5E604506ECFDD2887FD6F059760A4FB
3,671,719 UART: [art] SIG.R = F1827C39A2A359E57902DEE27E9A4ABC4958928FACD0FA90BA3682C358FE876C1F42B42203731A1FB6E4DE2E18E03A93
3,678,493 UART: [art] SIG.S = D16F326B3CD6A6938E7BD87D97603DB27AEEF622FF81913F174D93B1F1E23D6BD36D55C0D2ADE77CB1BD7EE069564D96
3,702,338 UART: Caliptra RT
3,702,683 UART: [state] CFI Enabled
3,809,930 UART: [rt] RT listening for mailbox commands...
3,810,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,920 UART: [rt]cmd =0x41544d4e, len=14344
3,935,255 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,921 ready_for_fw is high
1,056,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,220 >>> mbox cmd response: success
3,228,991 UART:
3,229,007 UART: Running Caliptra FMC ...
3,229,415 UART:
3,229,558 UART: [state] CFI Enabled
3,240,652 UART: [fht] FMC Alias Private Key: 7
3,348,284 UART: [art] Extend RT PCRs Done
3,348,712 UART: [art] Lock RT PCRs Done
3,350,470 UART: [art] Populate DV Done
3,358,490 UART: [fht] FMC Alias Private Key: 7
3,359,438 UART: [art] Derive CDI
3,359,718 UART: [art] Store in in slot 0x4
3,445,491 UART: [art] Derive Key Pair
3,445,851 UART: [art] Store priv key in slot 0x5
3,458,791 UART: [art] Derive Key Pair - Done
3,473,400 UART: [art] Signing Cert with AUTHO
3,473,880 UART: RITY.KEYID = 7
3,489,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,935 UART: [art] PUB.X = 30B59262D8C7E7FF910305D0CD70D5C286EE3449050D94D72FEB1F62064C290C1570EC3484788583C2805C9CE0331B80
3,496,681 UART: [art] PUB.Y = D7906ED401856711C32D10A69C66A5B051A6C4B3AA99B377523BBF71FDA91F30DD63986D7D719EBCE9A0B9695771F584
3,503,632 UART: [art] SIG.R = 4BBC350B6193618F1A59F5DB58AB86657D3F1BDDE1D300F4E49685BE159EA1829FBA3DB09722D919A3BADD90DE9FF8A5
3,510,395 UART: [art] SIG.S = 71DAC981BB7947965ED35A66511EB1253C205EE44D8D75FA1646A29C3C78E52D47720C9D5D30E07ABD424EF039C618A2
3,534,561 UART: Caliptra RT
3,534,906 UART: [state] CFI Enabled
3,642,879 UART: [rt] RT listening for mailbox commands...
3,643,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,741 UART: [rt]cmd =0x41544d4e, len=14344
3,768,444 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,048 UART: [kat] SHA2-512-ACC
896,949 UART: [kat] ECC-384
902,388 UART: [kat] HMAC-384Kdf
906,748 UART: [kat] LMS
1,474,944 UART: [kat] --
1,476,117 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,294 UART: [idev] ++
1,479,462 UART: [idev] CDI.KEYID = 6
1,479,822 UART: [idev] SUBJECT.KEYID = 7
1,480,246 UART: [idev] UDS.KEYID = 0
1,480,591 ready_for_fw is high
1,480,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,930 UART: [idev] Erasing UDS.KEYID = 0
1,504,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,558 UART: [idev] --
1,513,649 UART: [ldev] ++
1,513,817 UART: [ldev] CDI.KEYID = 6
1,514,180 UART: [ldev] SUBJECT.KEYID = 5
1,514,606 UART: [ldev] AUTHORITY.KEYID = 7
1,515,069 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,794 UART: [ldev] --
1,585,183 UART: [fwproc] Waiting for Commands...
1,585,994 UART: [fwproc] Received command 0x46574c44
1,586,785 UART: [fwproc] Received Image of size 114332 bytes
5,346,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,374,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,403,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,539,501 >>> mbox cmd response: success
5,540,633 UART: [afmc] ++
5,540,801 UART: [afmc] CDI.KEYID = 6
5,541,163 UART: [afmc] SUBJECT.KEYID = 7
5,541,588 UART: [afmc] AUTHORITY.KEYID = 5
5,576,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,592,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,593,762 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,599,471 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,605,363 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,611,064 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,618,820 UART: [afmc] --
5,619,780 UART: [cold-reset] --
5,620,832 UART: [state] Locking Datavault
5,622,139 UART: [state] Locking PCR0, PCR1 and PCR31
5,622,743 UART: [state] Locking ICCM
5,623,167 UART: [exit] Launching FMC @ 0x40000130
5,628,496 UART:
5,628,512 UART: Running Caliptra FMC ...
5,628,920 UART:
5,628,974 UART: [state] CFI Enabled
5,639,288 UART: [fht] FMC Alias Private Key: 7
5,747,482 UART: [art] Extend RT PCRs Done
5,747,910 UART: [art] Lock RT PCRs Done
5,749,614 UART: [art] Populate DV Done
5,757,810 UART: [fht] FMC Alias Private Key: 7
5,758,928 UART: [art] Derive CDI
5,759,208 UART: [art] Store in in slot 0x4
5,844,819 UART: [art] Derive Key Pair
5,845,179 UART: [art] Store priv key in slot 0x5
5,858,411 UART: [art] Derive Key Pair - Done
5,873,508 UART: [art] Signing Cert with AUTHO
5,873,988 UART: RITY.KEYID = 7
5,889,364 UART: [art] Erasing AUTHORITY.KEYID = 7
5,890,129 UART: [art] PUB.X = 6C8A2FA4153314069AC4FF1C548C11FA797AB0A4C9003B5BF31F12D577AB7F759D218B556358D08395ABE4CDE6C909AB
5,896,881 UART: [art] PUB.Y = F71A6547A8A2ADEA193F1A2EAADD3754D7D87D6A784EED4CFAD07AD12CEE0112692600930C4CFFFE79F7E1CEBF911839
5,903,827 UART: [art] SIG.R = 8632B567188A6A360CC876B50FA4A96B4CFA10E44B529F1F82B64678BD43FE68B0E383A320D533534C198B5C461342A9
5,910,589 UART: [art] SIG.S = 00C5D371E92A4B45BD95F45CE6159D6152EDC9B37DAD2E3BE8B5AB0B24AEAE69752678A2F0827383DDDA5DD9B92372D7
5,934,677 UART: Caliptra RT
5,934,930 UART: [state] CFI Enabled
6,043,168 UART: [rt] RT listening for mailbox commands...
6,043,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,834 UART: [rt]cmd =0x41544d4e, len=14344
6,168,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,295 ready_for_fw is high
1,362,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,125,914 >>> mbox cmd response: success
5,188,049 UART:
5,188,065 UART: Running Caliptra FMC ...
5,188,473 UART:
5,188,527 UART: [state] CFI Enabled
5,198,921 UART: [fht] FMC Alias Private Key: 7
5,307,239 UART: [art] Extend RT PCRs Done
5,307,667 UART: [art] Lock RT PCRs Done
5,309,339 UART: [art] Populate DV Done
5,317,595 UART: [fht] FMC Alias Private Key: 7
5,318,587 UART: [art] Derive CDI
5,318,867 UART: [art] Store in in slot 0x4
5,404,088 UART: [art] Derive Key Pair
5,404,448 UART: [art] Store priv key in slot 0x5
5,417,660 UART: [art] Derive Key Pair - Done
5,432,140 UART: [art] Signing Cert with AUTHO
5,432,620 UART: RITY.KEYID = 7
5,448,002 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,767 UART: [art] PUB.X = E129805D760B42ADE96B881CE45DC5BA1BBC40F11C15ABB7CEA11A52FCC1F2521D99820B90BE30E836573461E1C762A0
5,455,543 UART: [art] PUB.Y = 05CB075D81F0D40AF719C4E76E90F545D57ACC422DA730360ACF1F70A92366635E3387DF0B2D481050DC8B5CD6035110
5,462,477 UART: [art] SIG.R = 6B849634EDB560A130BCDAD8B150DE25F2993B5521C9BBBAC7FD183B5981461DBCC65242C55B3FB543E480587BB31C6A
5,469,259 UART: [art] SIG.S = 8B341B1A33A857CACB04FCD16F497DCAE0A0B4279102B64572E0847D435D3E0D8FF96E8ACC4CD6752F4786BD4E7F8408
5,493,334 UART: Caliptra RT
5,493,587 UART: [state] CFI Enabled
5,602,802 UART: [rt] RT listening for mailbox commands...
5,603,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,454 UART: [rt]cmd =0x41544d4e, len=14344
5,728,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,410 UART: [kat] SHA2-256
892,348 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,601 UART: [kat] LMS
1,475,797 UART: [kat] --
1,476,770 UART: [cold-reset] ++
1,477,200 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 ready_for_fw is high
1,481,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,113 UART: [idev] --
1,515,214 UART: [ldev] ++
1,515,382 UART: [ldev] CDI.KEYID = 6
1,515,745 UART: [ldev] SUBJECT.KEYID = 5
1,516,171 UART: [ldev] AUTHORITY.KEYID = 7
1,516,634 UART: [ldev] FE.KEYID = 1
1,521,864 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,681 UART: [ldev] --
1,587,142 UART: [fwproc] Waiting for Commands...
1,587,757 UART: [fwproc] Received command 0x46574c44
1,588,548 UART: [fwproc] Received Image of size 114332 bytes
5,007,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,035,328 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,064,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,200,473 >>> mbox cmd response: success
5,201,537 UART: [afmc] ++
5,201,705 UART: [afmc] CDI.KEYID = 6
5,202,067 UART: [afmc] SUBJECT.KEYID = 7
5,202,492 UART: [afmc] AUTHORITY.KEYID = 5
5,238,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,254,204 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,254,984 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,260,693 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,266,585 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,272,286 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,280,254 UART: [afmc] --
5,281,270 UART: [cold-reset] --
5,282,164 UART: [state] Locking Datavault
5,283,355 UART: [state] Locking PCR0, PCR1 and PCR31
5,283,959 UART: [state] Locking ICCM
5,284,473 UART: [exit] Launching FMC @ 0x40000130
5,289,802 UART:
5,289,818 UART: Running Caliptra FMC ...
5,290,226 UART:
5,290,369 UART: [state] CFI Enabled
5,301,061 UART: [fht] FMC Alias Private Key: 7
5,408,305 UART: [art] Extend RT PCRs Done
5,408,733 UART: [art] Lock RT PCRs Done
5,410,171 UART: [art] Populate DV Done
5,418,387 UART: [fht] FMC Alias Private Key: 7
5,419,551 UART: [art] Derive CDI
5,419,831 UART: [art] Store in in slot 0x4
5,505,666 UART: [art] Derive Key Pair
5,506,026 UART: [art] Store priv key in slot 0x5
5,519,312 UART: [art] Derive Key Pair - Done
5,534,447 UART: [art] Signing Cert with AUTHO
5,534,927 UART: RITY.KEYID = 7
5,550,143 UART: [art] Erasing AUTHORITY.KEYID = 7
5,550,908 UART: [art] PUB.X = 0CF0B417BC37FB7EE32BD5DD30844B97EE8FAD2B33EEF84DA9342D23AB37F2B1E6CFF0CEB8CA0101F675596307AFF3D1
5,557,692 UART: [art] PUB.Y = 25443D5938E0AB6DEDD6B7DF54960A64D4B4BF7DC20CCE0CE9F33DF3CF132750C1EFA532ACA5A3A9A69A07508A0D8817
5,564,647 UART: [art] SIG.R = B1F8DAF0F3DE040C7A8448BC000151DED92D52396E880547C45A35D8CF0A82762C7B9D67F70B0544053203D25BDBA4C4
5,571,374 UART: [art] SIG.S = 80D34915AD0A4A4942ADA070D4D08EF1C0EE42BC03F2991091CB18B417BFC1D43D721EA7B99A3F433345E0D398DDD984
5,595,601 UART: Caliptra RT
5,595,946 UART: [state] CFI Enabled
5,705,050 UART: [rt] RT listening for mailbox commands...
5,705,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,828,766 UART: [rt]cmd =0x41544d4e, len=14344
5,830,071 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,900 ready_for_fw is high
1,362,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,202,987 >>> mbox cmd response: success
5,264,392 UART:
5,264,408 UART: Running Caliptra FMC ...
5,264,816 UART:
5,264,959 UART: [state] CFI Enabled
5,275,485 UART: [fht] FMC Alias Private Key: 7
5,383,367 UART: [art] Extend RT PCRs Done
5,383,795 UART: [art] Lock RT PCRs Done
5,385,285 UART: [art] Populate DV Done
5,393,467 UART: [fht] FMC Alias Private Key: 7
5,394,495 UART: [art] Derive CDI
5,394,775 UART: [art] Store in in slot 0x4
5,480,244 UART: [art] Derive Key Pair
5,480,604 UART: [art] Store priv key in slot 0x5
5,494,002 UART: [art] Derive Key Pair - Done
5,509,081 UART: [art] Signing Cert with AUTHO
5,509,561 UART: RITY.KEYID = 7
5,525,141 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,906 UART: [art] PUB.X = 0FBCD8062BA7A539E76BFC91E47D135C4C70F2F988D01953A7519F57D1AFEFE27E5A5A8B1067FD8D70A1FD9CCF4F2389
5,532,688 UART: [art] PUB.Y = 564FBB8C11A4D65E819E60EBDB38169BF24ED70AB12900C2D29225537901AF4346A66D468CF5A66ECEDC1C74996EE4E8
5,539,620 UART: [art] SIG.R = 1F3518320A78187848434505CBFB33CADFEE3FF293C05C8A0CE86698E53D2ECD502F42561435A936CB02AAA2EE4F3820
5,546,384 UART: [art] SIG.S = D64D2E663C101036BC5502DFDB31232C7D5406B63971DD71E1DB88E1F02B33DC58EA76BC4585175B6ADF68F012DEA0AE
5,570,241 UART: Caliptra RT
5,570,586 UART: [state] CFI Enabled
5,678,867 UART: [rt] RT listening for mailbox commands...
5,679,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,802,889 UART: [rt]cmd =0x41544d4e, len=14344
5,804,734 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,404 UART: [kat] HMAC-384Kdf
921,942 UART: [kat] LMS
1,170,270 UART: [kat] --
1,171,325 UART: [cold-reset] ++
1,171,743 UART: [fht] FHT @ 0x50003400
1,174,472 UART: [idev] ++
1,174,640 UART: [idev] CDI.KEYID = 6
1,175,000 UART: [idev] SUBJECT.KEYID = 7
1,175,424 UART: [idev] UDS.KEYID = 0
1,175,769 ready_for_fw is high
1,175,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,349 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,492 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,900 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,230 >>> mbox cmd response: success
3,313,386 UART: [afmc] ++
3,313,554 UART: [afmc] CDI.KEYID = 6
3,313,916 UART: [afmc] SUBJECT.KEYID = 7
3,314,341 UART: [afmc] AUTHORITY.KEYID = 5
3,349,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,600 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,309 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,201 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,912 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,697 UART: [afmc] --
3,392,713 UART: [cold-reset] --
3,393,561 UART: [state] Locking Datavault
3,394,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,396 UART: [state] Locking ICCM
3,395,932 UART: [exit] Launching FMC @ 0x40000130
3,401,261 UART:
3,401,277 UART: Running Caliptra FMC ...
3,401,685 UART:
3,401,739 UART: [state] CFI Enabled
3,412,127 UART: [fht] FMC Alias Private Key: 7
3,520,081 UART: [art] Extend RT PCRs Done
3,520,509 UART: [art] Lock RT PCRs Done
3,521,821 UART: [art] Populate DV Done
3,529,773 UART: [fht] FMC Alias Private Key: 7
3,530,929 UART: [art] Derive CDI
3,531,209 UART: [art] Store in in slot 0x4
3,616,592 UART: [art] Derive Key Pair
3,616,952 UART: [art] Store priv key in slot 0x5
3,629,968 UART: [art] Derive Key Pair - Done
3,644,847 UART: [art] Signing Cert with AUTHO
3,645,327 UART: RITY.KEYID = 7
3,660,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,572 UART: [art] PUB.X = C5D3FCDA7D53363B4026B4B9BC02B5CD71300688B7F962B5EAA6FD44DB7AD16AD379E142BB0AE68D409EFE3987BEA1B6
3,668,355 UART: [art] PUB.Y = 10B01345FF87ADC3750FDFFB21B4F16617EB988405303C75A8C071BC9C58956D07233948048AD8CDC9FED6367BF19AFF
3,675,301 UART: [art] SIG.R = 3786D53C7C4C1F260D6C38176CCD06E79BD617BBA83F4D9D4A4A6B9BACBC58ECC8892D159F58BC06FEEB78BB17995964
3,682,080 UART: [art] SIG.S = ADD2750D6EFA0E01788A9640807E24B1D5B38122DD3FA3DBFA44419C248B942C2F77D6D48227535F32D4324F90A4D346
3,705,894 UART: Caliptra RT
3,706,147 UART: [state] CFI Enabled
3,813,531 UART: [rt] RT listening for mailbox commands...
3,814,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,439 UART: [rt]cmd =0x41544d4e, len=14344
3,938,782 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,178,233 >>> mbox cmd response: success
3,240,416 UART:
3,240,432 UART: Running Caliptra FMC ...
3,240,840 UART:
3,240,894 UART: [state] CFI Enabled
3,251,772 UART: [fht] FMC Alias Private Key: 7
3,359,142 UART: [art] Extend RT PCRs Done
3,359,570 UART: [art] Lock RT PCRs Done
3,361,102 UART: [art] Populate DV Done
3,369,478 UART: [fht] FMC Alias Private Key: 7
3,370,626 UART: [art] Derive CDI
3,370,906 UART: [art] Store in in slot 0x4
3,456,247 UART: [art] Derive Key Pair
3,456,607 UART: [art] Store priv key in slot 0x5
3,470,671 UART: [art] Derive Key Pair - Done
3,485,362 UART: [art] Signing Cert with AUTHO
3,485,842 UART: RITY.KEYID = 7
3,501,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,965 UART: [art] PUB.X = 2696A3059950C1D96C67D11115DB4E5F0976E24F2F5DCBD9CC87BBDA760D528CE76CA8BF00AAD60EF6EDB4FB59782A49
3,508,719 UART: [art] PUB.Y = EB66AC1D5246EFF9C5C78C98A6DFEA37ECCA64E87C237BE2A3590E730386E79F6D9EB81F9F02D82C37EB832D86259F49
3,515,676 UART: [art] SIG.R = 36CEAAEABA132267B390FCC9D053A973CC09C9FD00B80A93CB98A07C91687C9AAC235B7FF561886C6DA1AC3B3746D55B
3,522,436 UART: [art] SIG.S = 7886D4A3BA832AA969775FFDF65B33B2FC50B8D1F955377C98E308E70295F5E710568EE0FAFDA1AB6220B6A18CCDD1A1
3,546,479 UART: Caliptra RT
3,546,732 UART: [state] CFI Enabled
3,653,641 UART: [rt] RT listening for mailbox commands...
3,654,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,251 UART: [rt]cmd =0x41544d4e, len=14344
3,778,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
893,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,332 UART: [kat] ++
897,484 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,371 UART: [kat] SHA2-512-ACC
908,272 UART: [kat] ECC-384
918,067 UART: [kat] HMAC-384Kdf
922,751 UART: [kat] LMS
1,171,079 UART: [kat] --
1,172,030 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 ready_for_fw is high
1,176,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,991 UART: [idev] Erasing UDS.KEYID = 0
1,201,818 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,198 UART: [ldev] ++
1,211,366 UART: [ldev] CDI.KEYID = 6
1,211,729 UART: [ldev] SUBJECT.KEYID = 5
1,212,155 UART: [ldev] AUTHORITY.KEYID = 7
1,212,618 UART: [ldev] FE.KEYID = 1
1,218,214 UART: [ldev] Erasing FE.KEYID = 1
1,244,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,194 UART: [ldev] --
1,283,699 UART: [fwproc] Wait for Commands...
1,284,483 UART: [fwproc] Recv command 0x46574c44
1,285,211 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,668 >>> mbox cmd response: success
3,321,872 UART: [afmc] ++
3,322,040 UART: [afmc] CDI.KEYID = 6
3,322,402 UART: [afmc] SUBJECT.KEYID = 7
3,322,827 UART: [afmc] AUTHORITY.KEYID = 5
3,358,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,190 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,899 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,791 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,502 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,191 UART: [afmc] --
3,402,179 UART: [cold-reset] --
3,403,021 UART: [state] Locking Datavault
3,404,300 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,904 UART: [state] Locking ICCM
3,405,452 UART: [exit] Launching FMC @ 0x40000130
3,410,781 UART:
3,410,797 UART: Running Caliptra FMC ...
3,411,205 UART:
3,411,348 UART: [state] CFI Enabled
3,422,340 UART: [fht] FMC Alias Private Key: 7
3,530,646 UART: [art] Extend RT PCRs Done
3,531,074 UART: [art] Lock RT PCRs Done
3,532,630 UART: [art] Populate DV Done
3,540,866 UART: [fht] FMC Alias Private Key: 7
3,541,918 UART: [art] Derive CDI
3,542,198 UART: [art] Store in in slot 0x4
3,627,943 UART: [art] Derive Key Pair
3,628,303 UART: [art] Store priv key in slot 0x5
3,641,403 UART: [art] Derive Key Pair - Done
3,656,193 UART: [art] Signing Cert with AUTHO
3,656,673 UART: RITY.KEYID = 7
3,672,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,198 UART: [art] PUB.X = 9EB6DFEFCEEDAD9B19C1EFB61177D2B7530CD573912D5E820816EC2A60192A1D99AF0586FF7B04A1DFB1E322357D553B
3,679,974 UART: [art] PUB.Y = 5E554BF5715B9FB8AF79026236A4F2A979731396B0DDEBFD86187DCF96940A02359523BFDCD8D0A68A9EBE7FAC4007AC
3,686,926 UART: [art] SIG.R = 11AE1622DBD7D1D033B5F32A3B0C5B1CF8E1980EAF3D921C7DE8960756F0DE2F86AD629DD88160BD174AD1D750593017
3,693,697 UART: [art] SIG.S = E569A9170F21FD405A92EA8FCA003156379028FF7DF933E9E8D52DBB078B3EB8D440E647A0574D9E79639B64FDA880FD
3,718,090 UART: Caliptra RT
3,718,435 UART: [state] CFI Enabled
3,826,255 UART: [rt] RT listening for mailbox commands...
3,826,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,807 UART: [rt]cmd =0x41544d4e, len=14344
3,951,222 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 ready_for_fw is high
1,060,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,548 >>> mbox cmd response: success
3,233,853 UART:
3,233,869 UART: Running Caliptra FMC ...
3,234,277 UART:
3,234,420 UART: [state] CFI Enabled
3,244,814 UART: [fht] FMC Alias Private Key: 7
3,352,186 UART: [art] Extend RT PCRs Done
3,352,614 UART: [art] Lock RT PCRs Done
3,354,266 UART: [art] Populate DV Done
3,362,378 UART: [fht] FMC Alias Private Key: 7
3,363,516 UART: [art] Derive CDI
3,363,796 UART: [art] Store in in slot 0x4
3,449,893 UART: [art] Derive Key Pair
3,450,253 UART: [art] Store priv key in slot 0x5
3,463,191 UART: [art] Derive Key Pair - Done
3,477,691 UART: [art] Signing Cert with AUTHO
3,478,171 UART: RITY.KEYID = 7
3,493,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,340 UART: [art] PUB.X = FE82BCD0B9B89595DB330BB4330A99830B024080013F217DE8468E511E08E8A682C42C48C949D5A002091DFDF49129ED
3,501,086 UART: [art] PUB.Y = 1D8AC7F66BD77D9B8BC070AB2E3065127887E69B7B280A521EAB3A0611590900AE076D56645EDBCA838C9A6BA0EB56B7
3,508,012 UART: [art] SIG.R = 2B82188B863801844FF472B02A9039F1B01867463BDA9C0DD9D757989D3EFBD9353233F8609E1550BE97741E67F4817D
3,514,768 UART: [art] SIG.S = BA7BDBC7B45F7B383C8827E8F46E67477CBCAF086F657A8E9C598FF2CBE6070C652EF7049ADFF8198D96859433ACFECA
3,538,975 UART: Caliptra RT
3,539,320 UART: [state] CFI Enabled
3,647,370 UART: [rt] RT listening for mailbox commands...
3,648,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,026 UART: [rt]cmd =0x41544d4e, len=14344
3,772,935 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,287 UART: [cold-reset] ++
1,169,659 UART: [fht] FHT @ 0x50003400
1,172,115 UART: [idev] ++
1,172,283 UART: [idev] CDI.KEYID = 6
1,172,644 UART: [idev] SUBJECT.KEYID = 7
1,173,069 UART: [idev] UDS.KEYID = 0
1,173,415 ready_for_fw is high
1,173,415 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,430 UART: [ldev] --
1,280,820 UART: [fwproc] Wait for Commands...
1,281,571 UART: [fwproc] Recv command 0x46574c44
1,282,304 UART: [fwproc] Recv'd Img size: 114332 bytes
3,116,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,309,709 >>> mbox cmd response: success
3,310,820 UART: [afmc] ++
3,310,988 UART: [afmc] CDI.KEYID = 6
3,311,351 UART: [afmc] SUBJECT.KEYID = 7
3,311,777 UART: [afmc] AUTHORITY.KEYID = 5
3,347,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,414 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,124 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,014 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,725 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,337 UART: [afmc] --
3,390,367 UART: [cold-reset] --
3,390,955 UART: [state] Locking Datavault
3,392,262 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,866 UART: [state] Locking ICCM
3,393,526 UART: [exit] Launching FMC @ 0x40000130
3,398,855 UART:
3,398,871 UART: Running Caliptra FMC ...
3,399,279 UART:
3,399,333 UART: [state] CFI Enabled
3,409,647 UART: [fht] FMC Alias Private Key: 7
3,517,379 UART: [art] Extend RT PCRs Done
3,517,807 UART: [art] Lock RT PCRs Done
3,519,383 UART: [art] Populate DV Done
3,527,723 UART: [fht] FMC Alias Private Key: 7
3,528,715 UART: [art] Derive CDI
3,528,995 UART: [art] Store in in slot 0x4
3,614,062 UART: [art] Derive Key Pair
3,614,422 UART: [art] Store priv key in slot 0x5
3,627,300 UART: [art] Derive Key Pair - Done
3,641,966 UART: [art] Signing Cert with AUTHO
3,642,446 UART: RITY.KEYID = 7
3,657,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,353 UART: [art] PUB.X = 112729E1DB1BB60EF1D1DCE0637ED10F8A112D2199B5813FBEB9A060533B1A6CF804B99DA256E4B2B11FA4073CEB3053
3,665,123 UART: [art] PUB.Y = 5DED8EC06277283B03EA3A153114B304AB5385A90C8496AC250C2635EA5D0B14F6FC757D7BE73532F852CBB39212359C
3,672,060 UART: [art] SIG.R = 666C4F6D5477C84DD0E391C0B991F60D007D57D1FD7B88581BE02C388D383CEA81ECB4D633D2D71280FF56A573BE5116
3,678,811 UART: [art] SIG.S = BACC219C88BE0D3F2E727B0B3E233546F5B17BFFC43CB6784FA7C33B2CE8BCFE695AE9C397BCB0F049B4AF3EEE6EA64E
3,702,070 UART: Caliptra RT
3,702,323 UART: [state] CFI Enabled
3,811,327 UART: [rt] RT listening for mailbox commands...
3,811,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,969 UART: [rt]cmd =0x41544d4e, len=14344
3,936,760 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,036 ready_for_fw is high
1,056,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,905 >>> mbox cmd response: success
3,226,110 UART:
3,226,126 UART: Running Caliptra FMC ...
3,226,534 UART:
3,226,588 UART: [state] CFI Enabled
3,236,818 UART: [fht] FMC Alias Private Key: 7
3,344,222 UART: [art] Extend RT PCRs Done
3,344,650 UART: [art] Lock RT PCRs Done
3,345,894 UART: [art] Populate DV Done
3,353,930 UART: [fht] FMC Alias Private Key: 7
3,354,968 UART: [art] Derive CDI
3,355,248 UART: [art] Store in in slot 0x4
3,440,575 UART: [art] Derive Key Pair
3,440,935 UART: [art] Store priv key in slot 0x5
3,454,141 UART: [art] Derive Key Pair - Done
3,469,058 UART: [art] Signing Cert with AUTHO
3,469,538 UART: RITY.KEYID = 7
3,484,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,133 UART: [art] PUB.X = EEA61A81F6586FFBAC947EF01A24DF95C2FF0A3484C8127A429578631710AD34D8EA893A57C7818CFA3848441F036681
3,491,899 UART: [art] PUB.Y = 333CE9B6AA139DA4B35270484C7886C51181AE3E6A75D508219D6E2D5AFCEAEE85DEAA8944D34AFA6B44D828653824F1
3,498,856 UART: [art] SIG.R = EC3BAA5948161F4B72DA1472B7EB9F46FAE768FEE1F7BD243B87BAABEE2C9C53B018391A1CF6FDDFC328015097AE1DE2
3,505,649 UART: [art] SIG.S = EBFE61584BB25A14F119C981A99EB3AA1754EAA44EAFEC739DF488E6593170FCE7A8A3B35D7CA3CE9D3F4F3CCEFEA3D6
3,529,892 UART: Caliptra RT
3,530,145 UART: [state] CFI Enabled
3,637,392 UART: [rt] RT listening for mailbox commands...
3,638,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,178 UART: [rt]cmd =0x41544d4e, len=14344
3,762,593 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,207 UART: [kat] SHA2-512-ACC
906,108 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 ready_for_fw is high
1,174,492 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,836 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,369 UART: [ldev] Erasing FE.KEYID = 1
1,241,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,495 UART: [ldev] --
1,280,939 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46574c44
1,282,341 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,095 >>> mbox cmd response: success
3,318,330 UART: [afmc] ++
3,318,498 UART: [afmc] CDI.KEYID = 6
3,318,861 UART: [afmc] SUBJECT.KEYID = 7
3,319,287 UART: [afmc] AUTHORITY.KEYID = 5
3,354,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,220 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,930 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,820 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,531 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,463 UART: [afmc] --
3,398,397 UART: [cold-reset] --
3,399,237 UART: [state] Locking Datavault
3,400,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,192 UART: [state] Locking ICCM
3,401,766 UART: [exit] Launching FMC @ 0x40000130
3,407,095 UART:
3,407,111 UART: Running Caliptra FMC ...
3,407,519 UART:
3,407,662 UART: [state] CFI Enabled
3,418,542 UART: [fht] FMC Alias Private Key: 7
3,526,956 UART: [art] Extend RT PCRs Done
3,527,384 UART: [art] Lock RT PCRs Done
3,528,974 UART: [art] Populate DV Done
3,537,228 UART: [fht] FMC Alias Private Key: 7
3,538,388 UART: [art] Derive CDI
3,538,668 UART: [art] Store in in slot 0x4
3,624,257 UART: [art] Derive Key Pair
3,624,617 UART: [art] Store priv key in slot 0x5
3,637,621 UART: [art] Derive Key Pair - Done
3,652,412 UART: [art] Signing Cert with AUTHO
3,652,892 UART: RITY.KEYID = 7
3,667,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,605 UART: [art] PUB.X = 028346E7DF491423DF1BDEF34175C8D2524AA026A75F326739B9BA8EE66EE8EDA20389157FE40332E9126ED377FB22DD
3,675,372 UART: [art] PUB.Y = 73F65CD94A13598A3C0339D69D2F0C1C2B81FF2900D734C53567449C4C3FE082CFD6FE2B0903C03DB2B7F77668521A8E
3,682,292 UART: [art] SIG.R = 69A6D750899643DD0624745D320A6C556B08EBCA9F3A18D182ACEB87737A66C07929A92669C81B72D41C2636E34DCC9B
3,689,053 UART: [art] SIG.S = F347F7D3DD5BD4CFB2B173CB4D6576071949B54186BA158AECECBC0E0D4075338E1A17CD27415F01899931AC137E6375
3,712,942 UART: Caliptra RT
3,713,287 UART: [state] CFI Enabled
3,821,297 UART: [rt] RT listening for mailbox commands...
3,821,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,827 UART: [rt]cmd =0x41544d4e, len=14344
3,946,180 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,771 ready_for_fw is high
1,056,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,515 >>> mbox cmd response: success
3,226,596 UART:
3,226,612 UART: Running Caliptra FMC ...
3,227,020 UART:
3,227,163 UART: [state] CFI Enabled
3,237,697 UART: [fht] FMC Alias Private Key: 7
3,345,529 UART: [art] Extend RT PCRs Done
3,345,957 UART: [art] Lock RT PCRs Done
3,347,271 UART: [art] Populate DV Done
3,355,347 UART: [fht] FMC Alias Private Key: 7
3,356,363 UART: [art] Derive CDI
3,356,643 UART: [art] Store in in slot 0x4
3,442,418 UART: [art] Derive Key Pair
3,442,778 UART: [art] Store priv key in slot 0x5
3,455,848 UART: [art] Derive Key Pair - Done
3,470,374 UART: [art] Signing Cert with AUTHO
3,470,854 UART: RITY.KEYID = 7
3,486,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,949 UART: [art] PUB.X = F4D1026B21326B83FB535665BF806772FEC3652D39579D98D4F25E09A9BAA47FE65AE6607A1C1B00932A9AB6C6A4AA2B
3,493,699 UART: [art] PUB.Y = 2D251B3AFF48744A0D1720A4D8FC0C409871EC9243F5959F346514A0E91D43FF8402F8E1B343B0F5E43849DAE83A045A
3,500,639 UART: [art] SIG.R = 199334697215474B03EEB6F4D190A4FFBA15B7C084767F07F1381387F7D18DC7AA2668E30B030B187BBD7261CF5B909E
3,507,394 UART: [art] SIG.S = 3FC08FFC1AA85D4C0CF40754DA48165F45E0D126E1F9E6244B9CF55AAEDAED60F3D82CCA127D55E01E8ABAA4233B3BBC
3,531,279 UART: Caliptra RT
3,531,624 UART: [state] CFI Enabled
3,638,813 UART: [rt] RT listening for mailbox commands...
3,639,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,495 UART: [rt]cmd =0x41544d4e, len=14344
3,763,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,526 UART: [idev] Erasing UDS.KEYID = 0
1,505,042 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,620 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,073 UART: [ldev] Erasing FE.KEYID = 1
1,546,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,302 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,592 UART: [fwproc] Received command 0x46574c44
1,587,383 UART: [fwproc] Received Image of size 114332 bytes
5,195,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,223,028 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,252,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,388,303 >>> mbox cmd response: success
5,389,333 UART: [afmc] ++
5,389,501 UART: [afmc] CDI.KEYID = 6
5,389,863 UART: [afmc] SUBJECT.KEYID = 7
5,390,288 UART: [afmc] AUTHORITY.KEYID = 5
5,425,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,441,918 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,442,698 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,448,407 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,454,299 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,460,000 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,467,842 UART: [afmc] --
5,468,902 UART: [cold-reset] --
5,469,626 UART: [state] Locking Datavault
5,471,001 UART: [state] Locking PCR0, PCR1 and PCR31
5,471,605 UART: [state] Locking ICCM
5,472,045 UART: [exit] Launching FMC @ 0x40000130
5,477,374 UART:
5,477,390 UART: Running Caliptra FMC ...
5,477,798 UART:
5,477,852 UART: [state] CFI Enabled
5,488,628 UART: [fht] FMC Alias Private Key: 7
5,596,754 UART: [art] Extend RT PCRs Done
5,597,182 UART: [art] Lock RT PCRs Done
5,598,680 UART: [art] Populate DV Done
5,606,856 UART: [fht] FMC Alias Private Key: 7
5,607,944 UART: [art] Derive CDI
5,608,224 UART: [art] Store in in slot 0x4
5,693,337 UART: [art] Derive Key Pair
5,693,697 UART: [art] Store priv key in slot 0x5
5,707,093 UART: [art] Derive Key Pair - Done
5,721,895 UART: [art] Signing Cert with AUTHO
5,722,375 UART: RITY.KEYID = 7
5,737,787 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,552 UART: [art] PUB.X = EF54C7C1557A4681ECCA2BB6D8AF6A06BC4F187E619C6765A2233FCE09A620316C2A67F3865CD7CD6610E15BD3813A89
5,745,326 UART: [art] PUB.Y = 5EB2AFA97669B86D089198794A68D691822AD789CF42A4E1E76A7C9159BD7259BAD5C749C784008312A2A244C9A7E958
5,752,249 UART: [art] SIG.R = C9969EEDBCA18517B1D2B5CF5429F3EAEBFB3E5AA58D241674D29EDBCFB818D58CD997DDC997FD50F4EF8E99C365AE73
5,759,047 UART: [art] SIG.S = 61436EF430734D0182A79BE9BC4D2917F73DFCC5EE1EF256B7BD75F30D43587E9C6932CF85C64EEF79567E0B71946218
5,782,385 UART: Caliptra RT
5,782,638 UART: [state] CFI Enabled
5,891,257 UART: [rt] RT listening for mailbox commands...
5,891,927 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,963 UART: [rt]cmd =0x41544d4e, len=14344
6,021,020 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,705 ready_for_fw is high
1,361,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,086,091 >>> mbox cmd response: success
5,147,210 UART:
5,147,226 UART: Running Caliptra FMC ...
5,147,634 UART:
5,147,688 UART: [state] CFI Enabled
5,157,990 UART: [fht] FMC Alias Private Key: 7
5,265,740 UART: [art] Extend RT PCRs Done
5,266,168 UART: [art] Lock RT PCRs Done
5,267,878 UART: [art] Populate DV Done
5,276,348 UART: [fht] FMC Alias Private Key: 7
5,277,440 UART: [art] Derive CDI
5,277,720 UART: [art] Store in in slot 0x4
5,363,341 UART: [art] Derive Key Pair
5,363,701 UART: [art] Store priv key in slot 0x5
5,377,149 UART: [art] Derive Key Pair - Done
5,391,804 UART: [art] Signing Cert with AUTHO
5,392,284 UART: RITY.KEYID = 7
5,407,556 UART: [art] Erasing AUTHORITY.KEYID = 7
5,408,321 UART: [art] PUB.X = E75AD6A5C430E2839CF08CCD2CCB7545E97BA9ADD6FF4DC1F2CD576BFE8F336CF96E8BF4CE068246F6A71A7E5005FBAD
5,415,115 UART: [art] PUB.Y = 98D2DBF3444751DB5DF0853BE88A4B628B425E68541B49F85662E71E321B602A0BFD1EAE9217023CB8158307EF4AC0FD
5,422,062 UART: [art] SIG.R = 54826ED95A6920D55000C00788D264B48C262DDB5637CAB9A110895895623DFD75FD119471EF658740C447F19A4CD7C1
5,428,801 UART: [art] SIG.S = 865B31E0B5D798B9B4167925626B2886ADE8E1533096EA52D17F65E2418CECEE7D6A2547EB97BA868BD6FA850EB216E2
5,452,969 UART: Caliptra RT
5,453,222 UART: [state] CFI Enabled
5,561,983 UART: [rt] RT listening for mailbox commands...
5,562,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,345 UART: [rt]cmd =0x41544d4e, len=14344
5,691,450 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,894 UART: [kat] SHA2-256
881,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,940 UART: [kat] ++
886,092 UART: [kat] sha1
890,272 UART: [kat] SHA2-256
892,210 UART: [kat] SHA2-384
895,071 UART: [kat] SHA2-512-ACC
896,972 UART: [kat] ECC-384
902,269 UART: [kat] HMAC-384Kdf
906,987 UART: [kat] LMS
1,475,183 UART: [kat] --
1,476,234 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,337 UART: [idev] ++
1,479,505 UART: [idev] CDI.KEYID = 6
1,479,865 UART: [idev] SUBJECT.KEYID = 7
1,480,289 UART: [idev] UDS.KEYID = 0
1,480,634 ready_for_fw is high
1,480,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,299 UART: [idev] Erasing UDS.KEYID = 0
1,504,493 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,069 UART: [idev] --
1,514,046 UART: [ldev] ++
1,514,214 UART: [ldev] CDI.KEYID = 6
1,514,577 UART: [ldev] SUBJECT.KEYID = 5
1,515,003 UART: [ldev] AUTHORITY.KEYID = 7
1,515,466 UART: [ldev] FE.KEYID = 1
1,520,884 UART: [ldev] Erasing FE.KEYID = 1
1,546,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,411 UART: [ldev] --
1,585,722 UART: [fwproc] Waiting for Commands...
1,586,491 UART: [fwproc] Received command 0x46574c44
1,587,282 UART: [fwproc] Received Image of size 114332 bytes
5,159,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,818 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,019 >>> mbox cmd response: success
5,353,243 UART: [afmc] ++
5,353,411 UART: [afmc] CDI.KEYID = 6
5,353,773 UART: [afmc] SUBJECT.KEYID = 7
5,354,198 UART: [afmc] AUTHORITY.KEYID = 5
5,389,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,594 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,303 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,195 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,896 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,750 UART: [afmc] --
5,432,786 UART: [cold-reset] --
5,433,536 UART: [state] Locking Datavault
5,434,723 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,327 UART: [state] Locking ICCM
5,435,925 UART: [exit] Launching FMC @ 0x40000130
5,441,254 UART:
5,441,270 UART: Running Caliptra FMC ...
5,441,678 UART:
5,441,821 UART: [state] CFI Enabled
5,452,403 UART: [fht] FMC Alias Private Key: 7
5,560,345 UART: [art] Extend RT PCRs Done
5,560,773 UART: [art] Lock RT PCRs Done
5,562,157 UART: [art] Populate DV Done
5,570,143 UART: [fht] FMC Alias Private Key: 7
5,571,321 UART: [art] Derive CDI
5,571,601 UART: [art] Store in in slot 0x4
5,657,038 UART: [art] Derive Key Pair
5,657,398 UART: [art] Store priv key in slot 0x5
5,670,744 UART: [art] Derive Key Pair - Done
5,685,699 UART: [art] Signing Cert with AUTHO
5,686,179 UART: RITY.KEYID = 7
5,701,593 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,358 UART: [art] PUB.X = ECC68681BBD8D5D38176C562B8D3EA92C82ABCF03938BE3EAF957893F364E211D4979213A76FA99E8D1D461930B0FCF9
5,709,138 UART: [art] PUB.Y = 7F7BCFFFBC062B48B095ED4F28E8F4CFA18D39FB4FB7EA69F851C92B50657A3214393B6D8DE68F6A0AB1506D689EEB2D
5,716,104 UART: [art] SIG.R = C5CB8B157C49AAC4375CA66DF887C293A2EAB226E65C4130973C45EA66ED26D675E6A2C3E9C929D816EC59FBB187A859
5,722,886 UART: [art] SIG.S = DD9AC21FC2EB1889833A79C5F9E6DCCDFDF7F88AC48CFDF8385E6C98A48E244C1128B5E1B9A40B6520FD6D5A97DE7D49
5,746,612 UART: Caliptra RT
5,746,957 UART: [state] CFI Enabled
5,855,205 UART: [rt] RT listening for mailbox commands...
5,855,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,727 UART: [rt]cmd =0x41544d4e, len=14344
5,985,582 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,164,982 >>> mbox cmd response: success
5,226,425 UART:
5,226,441 UART: Running Caliptra FMC ...
5,226,849 UART:
5,226,992 UART: [state] CFI Enabled
5,237,724 UART: [fht] FMC Alias Private Key: 7
5,346,084 UART: [art] Extend RT PCRs Done
5,346,512 UART: [art] Lock RT PCRs Done
5,348,142 UART: [art] Populate DV Done
5,356,336 UART: [fht] FMC Alias Private Key: 7
5,357,266 UART: [art] Derive CDI
5,357,546 UART: [art] Store in in slot 0x4
5,443,061 UART: [art] Derive Key Pair
5,443,421 UART: [art] Store priv key in slot 0x5
5,456,671 UART: [art] Derive Key Pair - Done
5,471,225 UART: [art] Signing Cert with AUTHO
5,471,705 UART: RITY.KEYID = 7
5,486,947 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,712 UART: [art] PUB.X = AD94A165C3E91DCF549ABF3897CDA31898B4783B32F288CF376C8B18D449B0B019E08366D7A6BFF420EE3793F63B4955
5,494,488 UART: [art] PUB.Y = 71DB1F165051BED2816CFCACFED4D012CEF935FAF5874B1CAAAAFBB4EEC57D621BCFA2251B09CACD37B3F18A1B8B84F0
5,501,471 UART: [art] SIG.R = 9952C638F34C425BA1DF65A8F1070740C3B2E510F29931320BFD0E9B78CAC0A91214BAD9C31752295DEF8A0982E1DAA8
5,508,232 UART: [art] SIG.S = F6E34CE55B28F3741AAE6F4B2C5DA54E4A2240B2C65032BD92A33432190910114352A82C048CE8708E61867095A9A440
5,532,695 UART: Caliptra RT
5,533,040 UART: [state] CFI Enabled
5,641,536 UART: [rt] RT listening for mailbox commands...
5,642,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,765,158 UART: [rt]cmd =0x41544d4e, len=14344
5,771,429 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
893,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,411 UART: [kat] ++
897,563 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
922,766 UART: [kat] LMS
1,171,094 UART: [kat] --
1,171,709 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 ready_for_fw is high
1,176,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,201,319 UART: [idev] Sha1 KeyId Algorithm
1,209,775 UART: [idev] --
1,210,897 UART: [ldev] ++
1,211,065 UART: [ldev] CDI.KEYID = 6
1,211,428 UART: [ldev] SUBJECT.KEYID = 5
1,211,854 UART: [ldev] AUTHORITY.KEYID = 7
1,212,317 UART: [ldev] FE.KEYID = 1
1,217,623 UART: [ldev] Erasing FE.KEYID = 1
1,244,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,569 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,656 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 114332 bytes
3,138,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,166,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,195,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,331,240 >>> mbox cmd response: success
3,332,350 UART: [afmc] ++
3,332,518 UART: [afmc] CDI.KEYID = 6
3,332,880 UART: [afmc] SUBJECT.KEYID = 7
3,333,305 UART: [afmc] AUTHORITY.KEYID = 5
3,369,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,385,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,386,080 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,391,789 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,681 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,403,392 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,411,221 UART: [afmc] --
3,412,147 UART: [cold-reset] --
3,412,955 UART: [state] Locking Datavault
3,413,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,502 UART: [state] Locking ICCM
3,414,930 UART: [exit] Launching FMC @ 0x40000130
3,420,259 UART:
3,420,275 UART: Running Caliptra FMC ...
3,420,683 UART:
3,420,737 UART: [state] CFI Enabled
3,431,535 UART: [fht] FMC Alias Private Key: 7
3,539,461 UART: [art] Extend RT PCRs Done
3,539,889 UART: [art] Lock RT PCRs Done
3,541,455 UART: [art] Populate DV Done
3,549,707 UART: [fht] FMC Alias Private Key: 7
3,550,763 UART: [art] Derive CDI
3,551,043 UART: [art] Store in in slot 0x4
3,636,712 UART: [art] Derive Key Pair
3,637,072 UART: [art] Store priv key in slot 0x5
3,650,154 UART: [art] Derive Key Pair - Done
3,664,734 UART: [art] Signing Cert with AUTHO
3,665,214 UART: RITY.KEYID = 7
3,680,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,963 UART: [art] PUB.X = EFBCDF07A9262CE7F8B78A1F66DA48AAEECB40206EC53906CD88D1CA8B5B4FB3FB4102BFA6C237004C821B896C13CB27
3,687,726 UART: [art] PUB.Y = 0B050F26CEAA946A5AF528E271A51FB401948C0F1C0BFACC3E3951EEC15692C77F9313B66D337D5BC51F7921080B7425
3,694,658 UART: [art] SIG.R = 26D9147C83324E2F9938BAD9ACD535D09FA7CACCA85963AC3A430E318434EE6A324F2470922F4170C36D64B5D38780DC
3,701,429 UART: [art] SIG.S = 674916CFE69C0AB9DBBD48ABE117C9A0C7B396F3ED1332D7E988AC63497CC47C0938C6CB58DF97B0DB787ADAB1ECE5D0
3,724,974 UART: Caliptra RT
3,725,227 UART: [state] CFI Enabled
3,833,820 UART: [rt] RT listening for mailbox commands...
3,834,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,768 UART: [rt]cmd =0x41544d4e, len=14344
3,963,985 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 ready_for_fw is high
1,060,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,961 >>> mbox cmd response: success
3,235,904 UART:
3,235,920 UART: Running Caliptra FMC ...
3,236,328 UART:
3,236,382 UART: [state] CFI Enabled
3,246,612 UART: [fht] FMC Alias Private Key: 7
3,354,892 UART: [art] Extend RT PCRs Done
3,355,320 UART: [art] Lock RT PCRs Done
3,356,958 UART: [art] Populate DV Done
3,365,368 UART: [fht] FMC Alias Private Key: 7
3,366,396 UART: [art] Derive CDI
3,366,676 UART: [art] Store in in slot 0x4
3,452,689 UART: [art] Derive Key Pair
3,453,049 UART: [art] Store priv key in slot 0x5
3,466,259 UART: [art] Derive Key Pair - Done
3,481,281 UART: [art] Signing Cert with AUTHO
3,481,761 UART: RITY.KEYID = 7
3,496,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,680 UART: [art] PUB.X = B2ED5A241D0231D376EE1D65518094082B42A4838C606AD2CD4C33CA5A980961A364E259DD3C732E4EC6DFDB8F7F92B7
3,504,449 UART: [art] PUB.Y = 349056922D3AE11AADB57D23098B39A6D1411A03F7DCE8DB164ABEFE6E32E753AC1906B5516A106882F23609D6D4A5E6
3,511,393 UART: [art] SIG.R = 8419849A26828BC67D0D0F5AB65A2C62BAF2F5A0F57037CD52698CB0B13D5256C1B2A3D1F7441F1E18E574DEA6881EE4
3,518,165 UART: [art] SIG.S = 1A696C38282D09911FC8E030F184F2A9D8121FE59DC93106105666BE24B3732C09212C29B083525887AC202E282D4A6E
3,542,341 UART: Caliptra RT
3,542,594 UART: [state] CFI Enabled
3,650,686 UART: [rt] RT listening for mailbox commands...
3,651,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,496 UART: [rt]cmd =0x41544d4e, len=14344
3,780,815 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
917,895 UART: [kat] HMAC-384Kdf
922,489 UART: [kat] LMS
1,170,817 UART: [kat] --
1,171,744 UART: [cold-reset] ++
1,172,324 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 ready_for_fw is high
1,176,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,375 UART: [idev] Erasing UDS.KEYID = 0
1,201,786 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,211,086 UART: [ldev] ++
1,211,254 UART: [ldev] CDI.KEYID = 6
1,211,617 UART: [ldev] SUBJECT.KEYID = 5
1,212,043 UART: [ldev] AUTHORITY.KEYID = 7
1,212,506 UART: [ldev] FE.KEYID = 1
1,217,658 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,168 UART: [ldev] --
1,283,543 UART: [fwproc] Wait for Commands...
1,284,143 UART: [fwproc] Recv command 0x46574c44
1,284,871 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,290 >>> mbox cmd response: success
3,326,476 UART: [afmc] ++
3,326,644 UART: [afmc] CDI.KEYID = 6
3,327,006 UART: [afmc] SUBJECT.KEYID = 7
3,327,431 UART: [afmc] AUTHORITY.KEYID = 5
3,363,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,500 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,209 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,101 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,812 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,629 UART: [afmc] --
3,406,725 UART: [cold-reset] --
3,407,571 UART: [state] Locking Datavault
3,409,038 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,642 UART: [state] Locking ICCM
3,410,256 UART: [exit] Launching FMC @ 0x40000130
3,415,585 UART:
3,415,601 UART: Running Caliptra FMC ...
3,416,009 UART:
3,416,152 UART: [state] CFI Enabled
3,426,794 UART: [fht] FMC Alias Private Key: 7
3,535,000 UART: [art] Extend RT PCRs Done
3,535,428 UART: [art] Lock RT PCRs Done
3,537,486 UART: [art] Populate DV Done
3,545,720 UART: [fht] FMC Alias Private Key: 7
3,546,684 UART: [art] Derive CDI
3,546,964 UART: [art] Store in in slot 0x4
3,632,317 UART: [art] Derive Key Pair
3,632,677 UART: [art] Store priv key in slot 0x5
3,646,489 UART: [art] Derive Key Pair - Done
3,661,018 UART: [art] Signing Cert with AUTHO
3,661,498 UART: RITY.KEYID = 7
3,676,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,681 UART: [art] PUB.X = 4518BF71498D29D24A93DDCAE6B601309EB0D89D8CA0A72C29C53832F58480AE1F07CECE3121A6850A313AF037F54D11
3,684,448 UART: [art] PUB.Y = BF8FAFCE4D1E05044A0FD18CBE489FADA4D3E4980AA4F86C9B2B45B64BC27182E7FE2C9311AC2CEA5284916780C8FB56
3,691,408 UART: [art] SIG.R = 72BF635D60F443CFFDB9035D896AED872E9F8287EF6764A577C1DBEEFE8F7D0052664EB21AD314259CC02006E665446B
3,698,158 UART: [art] SIG.S = 47EE588651A9DB54021EF443172B3E3654FEBE5234688057F651E822CAD1FDBF4064056D310222355A56623A0FA78207
3,721,758 UART: Caliptra RT
3,722,103 UART: [state] CFI Enabled
3,830,460 UART: [rt] RT listening for mailbox commands...
3,831,130 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,210 UART: [rt]cmd =0x41544d4e, len=14344
3,960,515 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,078 ready_for_fw is high
1,060,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,178,794 >>> mbox cmd response: success
3,241,635 UART:
3,241,651 UART: Running Caliptra FMC ...
3,242,059 UART:
3,242,202 UART: [state] CFI Enabled
3,252,772 UART: [fht] FMC Alias Private Key: 7
3,360,218 UART: [art] Extend RT PCRs Done
3,360,646 UART: [art] Lock RT PCRs Done
3,362,018 UART: [art] Populate DV Done
3,370,182 UART: [fht] FMC Alias Private Key: 7
3,371,140 UART: [art] Derive CDI
3,371,420 UART: [art] Store in in slot 0x4
3,457,535 UART: [art] Derive Key Pair
3,457,895 UART: [art] Store priv key in slot 0x5
3,471,011 UART: [art] Derive Key Pair - Done
3,485,911 UART: [art] Signing Cert with AUTHO
3,486,391 UART: RITY.KEYID = 7
3,501,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,674 UART: [art] PUB.X = CAF62EBF777BA28F3198387AE6DC63136B8FB6B2AA63AA617950FB219F2E6AD04E3F8497BCB2647DDED185C98111E444
3,509,458 UART: [art] PUB.Y = 3151B4620BCB1DC011E14E824CE3FBC9F6FA82E2AB5BCAF921AF6C687E647C982339BC98BDF4279AAB87E281AC7B811A
3,516,425 UART: [art] SIG.R = 93B87D13A2D173C5499914A66285653711E3157AEC0C5C2F651053153FE79DE0DC8039823D9B55B9CBEF565C40E8E681
3,523,188 UART: [art] SIG.S = FB17DF6D9E940A4668C7581664B5C1083571CED17C91C64ED41043CF19CD67E7D02BEE5592F17D972CC8D5BBF96BC59A
3,547,421 UART: Caliptra RT
3,547,766 UART: [state] CFI Enabled
3,656,099 UART: [rt] RT listening for mailbox commands...
3,656,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,551 UART: [rt]cmd =0x41544d4e, len=14344
3,785,972 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 ready_for_fw is high
1,174,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,804 UART: [ldev] ++
1,208,972 UART: [ldev] CDI.KEYID = 6
1,209,336 UART: [ldev] SUBJECT.KEYID = 5
1,209,763 UART: [ldev] AUTHORITY.KEYID = 7
1,210,226 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,736 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114332 bytes
3,135,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,164,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,329,731 >>> mbox cmd response: success
3,330,826 UART: [afmc] ++
3,330,994 UART: [afmc] CDI.KEYID = 6
3,331,357 UART: [afmc] SUBJECT.KEYID = 7
3,331,783 UART: [afmc] AUTHORITY.KEYID = 5
3,367,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,126 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,836 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,726 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,402,437 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,343 UART: [afmc] --
3,411,259 UART: [cold-reset] --
3,412,303 UART: [state] Locking Datavault
3,413,510 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,114 UART: [state] Locking ICCM
3,414,708 UART: [exit] Launching FMC @ 0x40000130
3,420,037 UART:
3,420,053 UART: Running Caliptra FMC ...
3,420,461 UART:
3,420,515 UART: [state] CFI Enabled
3,430,881 UART: [fht] FMC Alias Private Key: 7
3,538,573 UART: [art] Extend RT PCRs Done
3,539,001 UART: [art] Lock RT PCRs Done
3,540,361 UART: [art] Populate DV Done
3,548,607 UART: [fht] FMC Alias Private Key: 7
3,549,579 UART: [art] Derive CDI
3,549,859 UART: [art] Store in in slot 0x4
3,635,872 UART: [art] Derive Key Pair
3,636,232 UART: [art] Store priv key in slot 0x5
3,649,442 UART: [art] Derive Key Pair - Done
3,664,491 UART: [art] Signing Cert with AUTHO
3,664,971 UART: RITY.KEYID = 7
3,680,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,980 UART: [art] PUB.X = A5D6D0BB11A4878C65FC889E305B0C7CA2AB241E31373E0953F5381AB8B119071B489F43966593AA55C39AFAEC34C354
3,687,745 UART: [art] PUB.Y = F2A893190790436E0B329EFB5CA19AEB8EB87F102399BFC9A328CC44AD1488ADDC5F2FFF100A523E1DB1921BD678D244
3,694,700 UART: [art] SIG.R = 793CEE2623E819D807CAF219FBA75734DB211937977700543A06339129BD8D0D909143C05EDE79B8D99A24656FBBD299
3,701,435 UART: [art] SIG.S = 2FE9A92B6FE1E1296C67B0DE5A7A2764E78267A02643120F253D261C4F51AA290B9ED6CC203122CC30573EADF93FAB95
3,725,238 UART: Caliptra RT
3,725,491 UART: [state] CFI Enabled
3,833,764 UART: [rt] RT listening for mailbox commands...
3,834,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,496 UART: [rt]cmd =0x41544d4e, len=14344
3,963,911 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,358 ready_for_fw is high
1,056,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,621 >>> mbox cmd response: success
3,230,720 UART:
3,230,736 UART: Running Caliptra FMC ...
3,231,144 UART:
3,231,198 UART: [state] CFI Enabled
3,241,834 UART: [fht] FMC Alias Private Key: 7
3,350,454 UART: [art] Extend RT PCRs Done
3,350,882 UART: [art] Lock RT PCRs Done
3,352,462 UART: [art] Populate DV Done
3,360,496 UART: [fht] FMC Alias Private Key: 7
3,361,424 UART: [art] Derive CDI
3,361,704 UART: [art] Store in in slot 0x4
3,447,051 UART: [art] Derive Key Pair
3,447,411 UART: [art] Store priv key in slot 0x5
3,461,323 UART: [art] Derive Key Pair - Done
3,475,802 UART: [art] Signing Cert with AUTHO
3,476,282 UART: RITY.KEYID = 7
3,491,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,909 UART: [art] PUB.X = 43C0E0BFDBD7505053D36204ECAA29294EB8E666481083B734F86BE7945FD9C96E2579E74142DCC71744A5004DF5BBBE
3,498,660 UART: [art] PUB.Y = D4BBCA63E8EAC7423633158FC0F09BAAE9E52311627770CF1016CE3C5CB49A13C50327A2B40670218D7944DD36781952
3,505,604 UART: [art] SIG.R = C82E2BE666C9911879693665D28056EC35E6C4976C1330F04ED4AFC68FA1A7E648098F3F622806AFD211969B66E2DBF1
3,512,368 UART: [art] SIG.S = 4385D56DAAE5AF20FAD7C2FCD87B9525AE85C326AB2B86EABD38DBC2A18763BD2F22783EEA622E52D42949CD7B2A407A
3,536,601 UART: Caliptra RT
3,536,854 UART: [state] CFI Enabled
3,645,364 UART: [rt] RT listening for mailbox commands...
3,646,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,096 UART: [rt]cmd =0x41544d4e, len=14344
3,775,217 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 ready_for_fw is high
1,174,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,810 UART: [idev] Erasing UDS.KEYID = 0
1,198,342 UART: [idev] Sha1 KeyId Algorithm
1,207,180 UART: [idev] --
1,208,239 UART: [ldev] ++
1,208,407 UART: [ldev] CDI.KEYID = 6
1,208,771 UART: [ldev] SUBJECT.KEYID = 5
1,209,198 UART: [ldev] AUTHORITY.KEYID = 7
1,209,661 UART: [ldev] FE.KEYID = 1
1,215,071 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,685 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,870 UART: [fwproc] Recv command 0x46574c44
1,282,603 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,074 >>> mbox cmd response: success
3,316,317 UART: [afmc] ++
3,316,485 UART: [afmc] CDI.KEYID = 6
3,316,848 UART: [afmc] SUBJECT.KEYID = 7
3,317,274 UART: [afmc] AUTHORITY.KEYID = 5
3,352,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,981 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,691 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,581 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,292 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,950 UART: [afmc] --
3,396,010 UART: [cold-reset] --
3,396,840 UART: [state] Locking Datavault
3,397,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,547 UART: [state] Locking ICCM
3,399,107 UART: [exit] Launching FMC @ 0x40000130
3,404,436 UART:
3,404,452 UART: Running Caliptra FMC ...
3,404,860 UART:
3,405,003 UART: [state] CFI Enabled
3,415,531 UART: [fht] FMC Alias Private Key: 7
3,523,329 UART: [art] Extend RT PCRs Done
3,523,757 UART: [art] Lock RT PCRs Done
3,525,417 UART: [art] Populate DV Done
3,533,535 UART: [fht] FMC Alias Private Key: 7
3,534,627 UART: [art] Derive CDI
3,534,907 UART: [art] Store in in slot 0x4
3,620,404 UART: [art] Derive Key Pair
3,620,764 UART: [art] Store priv key in slot 0x5
3,634,008 UART: [art] Derive Key Pair - Done
3,648,817 UART: [art] Signing Cert with AUTHO
3,649,297 UART: RITY.KEYID = 7
3,664,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,748 UART: [art] PUB.X = 71CF85B14475E77A7E5C8784310C2A3C0AD3FA74C897B43D681C8731D41C055032D8594B9A4E072005898A121E48BFD6
3,672,499 UART: [art] PUB.Y = 79298838937EF3C680E4912671E27E0A9916F5D839977702672323A758EF5912CE5BCC4BA5177B7895896D7FF0E75355
3,679,429 UART: [art] SIG.R = 891CDBC180FB0FEFFBBF220FE88CA729F223471C4688F403B26C40591016F06386B835F8C7054594CB46E588FDFD9DF0
3,686,195 UART: [art] SIG.S = ACA3C890484BE9118E42AE358BC2E434D6AF43D9958F4572BEE522A562DCB69EE3162A942ED1F5B085BDB5B9DE90D7C7
3,710,552 UART: Caliptra RT
3,710,897 UART: [state] CFI Enabled
3,817,636 UART: [rt] RT listening for mailbox commands...
3,818,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,258 UART: [rt]cmd =0x41544d4e, len=14344
3,947,583 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 ready_for_fw is high
1,056,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,159,669 >>> mbox cmd response: success
3,222,358 UART:
3,222,374 UART: Running Caliptra FMC ...
3,222,782 UART:
3,222,925 UART: [state] CFI Enabled
3,233,469 UART: [fht] FMC Alias Private Key: 7
3,340,899 UART: [art] Extend RT PCRs Done
3,341,327 UART: [art] Lock RT PCRs Done
3,342,639 UART: [art] Populate DV Done
3,350,911 UART: [fht] FMC Alias Private Key: 7
3,351,991 UART: [art] Derive CDI
3,352,271 UART: [art] Store in in slot 0x4
3,437,756 UART: [art] Derive Key Pair
3,438,116 UART: [art] Store priv key in slot 0x5
3,451,422 UART: [art] Derive Key Pair - Done
3,466,755 UART: [art] Signing Cert with AUTHO
3,467,235 UART: RITY.KEYID = 7
3,482,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,260 UART: [art] PUB.X = 7D4282874C99F9837E92E782F809E0498A65099918B613B4FDC9110B9D5BC58CA23E3597289837B0AD6562B4C71B0DAE
3,490,014 UART: [art] PUB.Y = A9E3D46D4ABF68C603828575D278E172121DD22D054590389F394AF6AE331B245263A8BCE143A0E63DC12457483F235E
3,496,954 UART: [art] SIG.R = 27965FE499E42E3252EFCB58AD026A758A89E4E16D30EF0936FC4C6C200A8631FC6CB0D89F27CF11F7E0F8818D76CDA1
3,503,727 UART: [art] SIG.S = 02AD0BD623E83CCDDB20EA117D6637D5A3798277F212FA0893525061D7809320274BFF6A96A07850E72F5462203D9705
3,527,306 UART: Caliptra RT
3,527,651 UART: [state] CFI Enabled
3,635,132 UART: [rt] RT listening for mailbox commands...
3,635,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,908 UART: [rt]cmd =0x41544d4e, len=14344
3,765,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,914 UART: [kat] SHA2-512-ACC
896,815 UART: [kat] ECC-384
901,828 UART: [kat] HMAC-384Kdf
906,510 UART: [kat] LMS
1,474,706 UART: [kat] --
1,475,641 UART: [cold-reset] ++
1,476,055 UART: [fht] Storing FHT @ 0x50003400
1,478,976 UART: [idev] ++
1,479,144 UART: [idev] CDI.KEYID = 6
1,479,504 UART: [idev] SUBJECT.KEYID = 7
1,479,928 UART: [idev] UDS.KEYID = 0
1,480,273 ready_for_fw is high
1,480,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,544 UART: [idev] Erasing UDS.KEYID = 0
1,504,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,828 UART: [idev] --
1,514,067 UART: [ldev] ++
1,514,235 UART: [ldev] CDI.KEYID = 6
1,514,598 UART: [ldev] SUBJECT.KEYID = 5
1,515,024 UART: [ldev] AUTHORITY.KEYID = 7
1,515,487 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,984 UART: [ldev] --
1,585,491 UART: [fwproc] Waiting for Commands...
1,586,184 UART: [fwproc] Received command 0x46574c44
1,586,975 UART: [fwproc] Received Image of size 114332 bytes
5,310,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,339,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,368,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,504,332 >>> mbox cmd response: success
5,505,500 UART: [afmc] ++
5,505,668 UART: [afmc] CDI.KEYID = 6
5,506,030 UART: [afmc] SUBJECT.KEYID = 7
5,506,455 UART: [afmc] AUTHORITY.KEYID = 5
5,541,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,581 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,558,361 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,564,070 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,569,962 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,663 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,489 UART: [afmc] --
5,584,379 UART: [cold-reset] --
5,585,335 UART: [state] Locking Datavault
5,586,648 UART: [state] Locking PCR0, PCR1 and PCR31
5,587,252 UART: [state] Locking ICCM
5,587,892 UART: [exit] Launching FMC @ 0x40000130
5,593,221 UART:
5,593,237 UART: Running Caliptra FMC ...
5,593,645 UART:
5,593,699 UART: [state] CFI Enabled
5,603,827 UART: [fht] FMC Alias Private Key: 7
5,710,655 UART: [art] Extend RT PCRs Done
5,711,083 UART: [art] Lock RT PCRs Done
5,712,623 UART: [art] Populate DV Done
5,720,749 UART: [fht] FMC Alias Private Key: 7
5,721,709 UART: [art] Derive CDI
5,721,989 UART: [art] Store in in slot 0x4
5,807,728 UART: [art] Derive Key Pair
5,808,088 UART: [art] Store priv key in slot 0x5
5,821,384 UART: [art] Derive Key Pair - Done
5,835,817 UART: [art] Signing Cert with AUTHO
5,836,297 UART: RITY.KEYID = 7
5,851,765 UART: [art] Erasing AUTHORITY.KEYID = 7
5,852,530 UART: [art] PUB.X = 40D8FA5E4679EB12B61428D12EAA7D565F54C4196698EB9EE8A0C6633A1F834A7D6EFE0F9F013361A4D2B560AE5937F2
5,859,302 UART: [art] PUB.Y = AB6D01770A39CBEF75B195BAD63F661FA197DA9E5624E35B30019CF1342CDB6BD157AD49A7199EB6DAB415C74EFE90BB
5,866,263 UART: [art] SIG.R = 9B6DBAA6376373501AC597CC8FFEA9D3277F4B58A4CD4CD75A12A4654278151DD6AF30861AB53A8F5437FDED482821C4
5,873,043 UART: [art] SIG.S = 738822B8C118754CC92BC6314755E8FBF32F7509501020A5E583FEA23D485B73A2AAA67E2FE82795BCB1B5A9D09F7B3F
5,896,767 UART: Caliptra RT
5,897,020 UART: [state] CFI Enabled
6,005,659 UART: [rt] RT listening for mailbox commands...
6,006,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,239 UART: [rt]cmd =0x41544d4e, len=14344
6,137,841 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,200,450 >>> mbox cmd response: success
5,261,553 UART:
5,261,569 UART: Running Caliptra FMC ...
5,261,977 UART:
5,262,031 UART: [state] CFI Enabled
5,272,721 UART: [fht] FMC Alias Private Key: 7
5,380,855 UART: [art] Extend RT PCRs Done
5,381,283 UART: [art] Lock RT PCRs Done
5,382,763 UART: [art] Populate DV Done
5,390,993 UART: [fht] FMC Alias Private Key: 7
5,392,077 UART: [art] Derive CDI
5,392,357 UART: [art] Store in in slot 0x4
5,477,852 UART: [art] Derive Key Pair
5,478,212 UART: [art] Store priv key in slot 0x5
5,491,324 UART: [art] Derive Key Pair - Done
5,506,046 UART: [art] Signing Cert with AUTHO
5,506,526 UART: RITY.KEYID = 7
5,521,742 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,507 UART: [art] PUB.X = B8350E86E99638A532CBDEF9AD71B3B2740EC2133C0D296D13B699BA5112678E9B2E5B22ACE0ACA7D1CA9AFF3FAE7D4A
5,529,290 UART: [art] PUB.Y = 0695492EF8CE613453457113799CD163E4B8536F886B8AB66FB85AE5375743887411B1E88CD6A27CD9A1206AB5BE28B8
5,536,233 UART: [art] SIG.R = 70B4ACA155C18FED2B7E4D0DAC8B24EB9B8B07150E8710E9CB5D3A57DBA93F744F6A3E02859876D30F78452B1BA91ECE
5,543,006 UART: [art] SIG.S = 09018F7832EFCDC4E0B895322CB065B0D648B902B044E8BA04DEA9F82A924F45C1FB69CD6523EFD6FF5C587E87FC868C
5,567,059 UART: Caliptra RT
5,567,312 UART: [state] CFI Enabled
5,674,644 UART: [rt] RT listening for mailbox commands...
5,675,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,076 UART: [rt]cmd =0x41544d4e, len=14344
5,806,538 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
903,253 UART: [kat] HMAC-384Kdf
907,971 UART: [kat] LMS
1,476,167 UART: [kat] --
1,477,350 UART: [cold-reset] ++
1,477,916 UART: [fht] Storing FHT @ 0x50003400
1,480,763 UART: [idev] ++
1,480,931 UART: [idev] CDI.KEYID = 6
1,481,291 UART: [idev] SUBJECT.KEYID = 7
1,481,715 UART: [idev] UDS.KEYID = 0
1,482,060 ready_for_fw is high
1,482,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,669 UART: [idev] Erasing UDS.KEYID = 0
1,506,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,221 UART: [idev] --
1,516,290 UART: [ldev] ++
1,516,458 UART: [ldev] CDI.KEYID = 6
1,516,821 UART: [ldev] SUBJECT.KEYID = 5
1,517,247 UART: [ldev] AUTHORITY.KEYID = 7
1,517,710 UART: [ldev] FE.KEYID = 1
1,522,908 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,023 UART: [ldev] --
1,587,524 UART: [fwproc] Waiting for Commands...
1,588,213 UART: [fwproc] Received command 0x46574c44
1,589,004 UART: [fwproc] Received Image of size 114332 bytes
4,971,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,000,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,029,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,165,348 >>> mbox cmd response: success
5,166,468 UART: [afmc] ++
5,166,636 UART: [afmc] CDI.KEYID = 6
5,166,998 UART: [afmc] SUBJECT.KEYID = 7
5,167,423 UART: [afmc] AUTHORITY.KEYID = 5
5,202,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,219,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,219,873 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,225,582 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,231,474 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,237,175 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,245,057 UART: [afmc] --
5,246,067 UART: [cold-reset] --
5,247,001 UART: [state] Locking Datavault
5,247,846 UART: [state] Locking PCR0, PCR1 and PCR31
5,248,450 UART: [state] Locking ICCM
5,248,878 UART: [exit] Launching FMC @ 0x40000130
5,254,207 UART:
5,254,223 UART: Running Caliptra FMC ...
5,254,631 UART:
5,254,774 UART: [state] CFI Enabled
5,265,602 UART: [fht] FMC Alias Private Key: 7
5,373,850 UART: [art] Extend RT PCRs Done
5,374,278 UART: [art] Lock RT PCRs Done
5,375,744 UART: [art] Populate DV Done
5,383,992 UART: [fht] FMC Alias Private Key: 7
5,385,042 UART: [art] Derive CDI
5,385,322 UART: [art] Store in in slot 0x4
5,470,939 UART: [art] Derive Key Pair
5,471,299 UART: [art] Store priv key in slot 0x5
5,484,755 UART: [art] Derive Key Pair - Done
5,499,370 UART: [art] Signing Cert with AUTHO
5,499,850 UART: RITY.KEYID = 7
5,515,356 UART: [art] Erasing AUTHORITY.KEYID = 7
5,516,121 UART: [art] PUB.X = 094122051D170EEA3DBA95DE7D7D308443117F993759E2578ABDA7C39E0B39610B85A29AD1BC14F1396619E6962457B2
5,522,872 UART: [art] PUB.Y = 4F2416772C056B3429371F96E75BD46D487BC1420629A8AA1A71ABF6AD8E9FD862BFF9B02382A47F31793876A6518F00
5,529,792 UART: [art] SIG.R = 6BC573DD9052B11374A61ADDE000FFC81721AEDBA852CB9D98380A6F56DCE80331E66BA581B074FD6CC971CFECADD857
5,536,554 UART: [art] SIG.S = 4E99E9CB14C2A4F5BF10C9618F1864DB41F09B9C5BA71164A06C45353DCF6FBE3C70F7D11A77111480D76BE0C713781B
5,560,143 UART: Caliptra RT
5,560,488 UART: [state] CFI Enabled
5,667,924 UART: [rt] RT listening for mailbox commands...
5,668,594 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,791,812 UART: [rt]cmd =0x41544d4e, len=14344
5,800,504 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,132 ready_for_fw is high
1,363,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,278,253 >>> mbox cmd response: success
5,339,782 UART:
5,339,798 UART: Running Caliptra FMC ...
5,340,206 UART:
5,340,349 UART: [state] CFI Enabled
5,351,051 UART: [fht] FMC Alias Private Key: 7
5,459,277 UART: [art] Extend RT PCRs Done
5,459,705 UART: [art] Lock RT PCRs Done
5,461,409 UART: [art] Populate DV Done
5,469,877 UART: [fht] FMC Alias Private Key: 7
5,470,821 UART: [art] Derive CDI
5,471,101 UART: [art] Store in in slot 0x4
5,556,982 UART: [art] Derive Key Pair
5,557,342 UART: [art] Store priv key in slot 0x5
5,570,478 UART: [art] Derive Key Pair - Done
5,585,286 UART: [art] Signing Cert with AUTHO
5,585,766 UART: RITY.KEYID = 7
5,601,442 UART: [art] Erasing AUTHORITY.KEYID = 7
5,602,207 UART: [art] PUB.X = CD424B11476483459A0A372FDE1990197292C6C1D539E0DA7E618EDA3B9E0D4F41FCAAB4868FB8EAB14DC655EA6FE3E0
5,608,987 UART: [art] PUB.Y = 99E933646F2E3492C532C28DA3FF425019DB63CF3451D2F79BE9C510AAAF54FAFBB708F84EEEB0CE6218B5FC2B585386
5,615,948 UART: [art] SIG.R = 4EECF669EE955C5E7364F481BE64924E8F85CA16B4B63D8DF4BDEA6CAC8F2F6869CE79CA24B119F1414C384554E5D386
5,622,732 UART: [art] SIG.S = 730F6464C6FB92CA11DB834F6CC78D7B8CAE1E2408EFD39C21070E80A4EDEB34C86AF93A5FC76C8FDC231316CA3C54C4
5,645,967 UART: Caliptra RT
5,646,312 UART: [state] CFI Enabled
5,754,626 UART: [rt] RT listening for mailbox commands...
5,755,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,256 UART: [rt]cmd =0x41544d4e, len=14344
5,886,752 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,971 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
892,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,003 UART: [kat] ++
897,155 UART: [kat] sha1
901,517 UART: [kat] SHA2-256
903,457 UART: [kat] SHA2-384
905,972 UART: [kat] SHA2-512-ACC
907,873 UART: [kat] ECC-384
917,498 UART: [kat] HMAC-384Kdf
921,982 UART: [kat] LMS
1,170,310 UART: [kat] --
1,171,199 UART: [cold-reset] ++
1,171,557 UART: [fht] FHT @ 0x50003400
1,174,302 UART: [idev] ++
1,174,470 UART: [idev] CDI.KEYID = 6
1,174,830 UART: [idev] SUBJECT.KEYID = 7
1,175,254 UART: [idev] UDS.KEYID = 0
1,175,599 ready_for_fw is high
1,175,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,913 UART: [idev] Sha1 KeyId Algorithm
1,208,339 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,828 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,256 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,108 >>> mbox cmd response: success
3,322,196 UART: [afmc] ++
3,322,364 UART: [afmc] CDI.KEYID = 6
3,322,726 UART: [afmc] SUBJECT.KEYID = 7
3,323,151 UART: [afmc] AUTHORITY.KEYID = 5
3,358,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,090 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,799 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,691 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,402 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,289 UART: [afmc] --
3,402,413 UART: [cold-reset] --
3,403,251 UART: [state] Locking Datavault
3,404,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,308 UART: [state] Locking ICCM
3,405,828 UART: [exit] Launching FMC @ 0x40000130
3,411,157 UART:
3,411,173 UART: Running Caliptra FMC ...
3,411,581 UART:
3,411,635 UART: [state] CFI Enabled
3,422,097 UART: [fht] FMC Alias Private Key: 7
3,529,845 UART: [art] Extend RT PCRs Done
3,530,273 UART: [art] Lock RT PCRs Done
3,531,967 UART: [art] Populate DV Done
3,539,849 UART: [fht] FMC Alias Private Key: 7
3,540,859 UART: [art] Derive CDI
3,541,139 UART: [art] Store in in slot 0x4
3,626,464 UART: [art] Derive Key Pair
3,626,824 UART: [art] Store priv key in slot 0x5
3,640,572 UART: [art] Derive Key Pair - Done
3,655,443 UART: [art] Signing Cert with AUTHO
3,655,923 UART: RITY.KEYID = 7
3,670,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,462 UART: [art] PUB.X = 2D8D6D0902AD31ABCE5573E2CBBE80C07B623FA1B8B1689074725B626A563931014B30A92DA6330226562EA1092EEB14
3,678,217 UART: [art] PUB.Y = A20A7F596993DED953DE84E105CDF6CFD71B30495468CB2193A54BB71ACA72500724C17464B6B245592A6C9E55946247
3,685,156 UART: [art] SIG.R = 58E104FC079A9E05C9C8D333C0C939EAE6A4ADAF82FB55868354F390A71611B22BA0C3FF557DDA54E8C1AA370C35E198
3,691,926 UART: [art] SIG.S = E840DA88363A723B0646F345E7A86146F41B8F6ED4EEBA2BA5F4099FC356B18BE0DF5DE85B5BB20A24F50C5DBCF89A27
3,715,771 UART: Caliptra RT
3,716,024 UART: [state] CFI Enabled
3,823,376 UART: [rt] RT listening for mailbox commands...
3,824,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,332 UART: [rt]cmd =0x41544d4e, len=14344
3,955,970 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 ready_for_fw is high
1,060,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,073 >>> mbox cmd response: success
3,231,556 UART:
3,231,572 UART: Running Caliptra FMC ...
3,231,980 UART:
3,232,034 UART: [state] CFI Enabled
3,242,406 UART: [fht] FMC Alias Private Key: 7
3,349,802 UART: [art] Extend RT PCRs Done
3,350,230 UART: [art] Lock RT PCRs Done
3,351,478 UART: [art] Populate DV Done
3,359,872 UART: [fht] FMC Alias Private Key: 7
3,360,806 UART: [art] Derive CDI
3,361,086 UART: [art] Store in in slot 0x4
3,446,685 UART: [art] Derive Key Pair
3,447,045 UART: [art] Store priv key in slot 0x5
3,460,039 UART: [art] Derive Key Pair - Done
3,474,791 UART: [art] Signing Cert with AUTHO
3,475,271 UART: RITY.KEYID = 7
3,490,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,272 UART: [art] PUB.X = 87AF6EA3C0F2D3421EC41FCE7ACADD851046859BF98C5C09515FEB81A08E809808A2D0552396F8A48033B98F5CDE0CED
3,498,047 UART: [art] PUB.Y = FE0222165BD20281D7DCF565E29D2B56960BAA61AF457800CCC2650F964D32F7568251A6CCB30BFC02952E7E85E54261
3,504,959 UART: [art] SIG.R = C67C58E1BEF11E5811D738663B830CDCE9A2A444FEF7D65FB8A38BF8BDBDF3C452E1323177D1010CE602D9D3CBCAA19C
3,511,739 UART: [art] SIG.S = 5ADEB5FEC0C5AD361C8480C500FE39D29F420F840832D8A00619191DEF125B39378C8838A9959883FCD92E01D84B1275
3,535,804 UART: Caliptra RT
3,536,057 UART: [state] CFI Enabled
3,642,335 UART: [rt] RT listening for mailbox commands...
3,643,005 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,027 UART: [rt]cmd =0x41544d4e, len=14344
3,774,461 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,626 UART: [fht] FHT @ 0x50003400
1,175,397 UART: [idev] ++
1,175,565 UART: [idev] CDI.KEYID = 6
1,175,925 UART: [idev] SUBJECT.KEYID = 7
1,176,349 UART: [idev] UDS.KEYID = 0
1,176,694 ready_for_fw is high
1,176,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,367 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,209,854 UART: [idev] --
1,210,710 UART: [ldev] ++
1,210,878 UART: [ldev] CDI.KEYID = 6
1,211,241 UART: [ldev] SUBJECT.KEYID = 5
1,211,667 UART: [ldev] AUTHORITY.KEYID = 7
1,212,130 UART: [ldev] FE.KEYID = 1
1,217,462 UART: [ldev] Erasing FE.KEYID = 1
1,243,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,726 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,777 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,903 >>> mbox cmd response: success
3,314,965 UART: [afmc] ++
3,315,133 UART: [afmc] CDI.KEYID = 6
3,315,495 UART: [afmc] SUBJECT.KEYID = 7
3,315,920 UART: [afmc] AUTHORITY.KEYID = 5
3,351,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,243 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,952 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,844 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,555 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,410 UART: [afmc] --
3,395,394 UART: [cold-reset] --
3,396,102 UART: [state] Locking Datavault
3,397,209 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,813 UART: [state] Locking ICCM
3,398,309 UART: [exit] Launching FMC @ 0x40000130
3,403,638 UART:
3,403,654 UART: Running Caliptra FMC ...
3,404,062 UART:
3,404,205 UART: [state] CFI Enabled
3,415,187 UART: [fht] FMC Alias Private Key: 7
3,522,913 UART: [art] Extend RT PCRs Done
3,523,341 UART: [art] Lock RT PCRs Done
3,524,865 UART: [art] Populate DV Done
3,533,115 UART: [fht] FMC Alias Private Key: 7
3,534,243 UART: [art] Derive CDI
3,534,523 UART: [art] Store in in slot 0x4
3,619,934 UART: [art] Derive Key Pair
3,620,294 UART: [art] Store priv key in slot 0x5
3,633,406 UART: [art] Derive Key Pair - Done
3,647,911 UART: [art] Signing Cert with AUTHO
3,648,391 UART: RITY.KEYID = 7
3,663,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,402 UART: [art] PUB.X = 5F3D6D3F9D803EEA14C2DDF14DC067B9CAB94DCEE7BB60E63DFBAACE042202C1D43A25AB027356840E3DF3F43B7BCFD2
3,671,190 UART: [art] PUB.Y = 6AAFBD15A1D52B8148310B478B7ADBDD88ADB5242BD10749499B8E814C3DBB7DA7FD16AEEEF6AEEA8DFF1028B6536DFB
3,678,164 UART: [art] SIG.R = 4C8036B2B5AFB61AEFB14C59C908E0B41E57F297DBAEC594D7A28079AAA926FCB827BE1B8A6A72F5C811DD50B6E2468B
3,684,951 UART: [art] SIG.S = A5ABD19F2503A61C1B1EC5676254C4A244262BE5B2603F1F265CA4856DDED6ED8E20C0886995B874C943BF768CBF5DE4
3,708,517 UART: Caliptra RT
3,708,862 UART: [state] CFI Enabled
3,817,168 UART: [rt] RT listening for mailbox commands...
3,817,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,952 UART: [rt]cmd =0x41544d4e, len=14344
3,949,532 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,130 ready_for_fw is high
1,060,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,010 >>> mbox cmd response: success
3,235,949 UART:
3,235,965 UART: Running Caliptra FMC ...
3,236,373 UART:
3,236,516 UART: [state] CFI Enabled
3,247,198 UART: [fht] FMC Alias Private Key: 7
3,354,830 UART: [art] Extend RT PCRs Done
3,355,258 UART: [art] Lock RT PCRs Done
3,357,322 UART: [art] Populate DV Done
3,365,738 UART: [fht] FMC Alias Private Key: 7
3,366,850 UART: [art] Derive CDI
3,367,130 UART: [art] Store in in slot 0x4
3,452,505 UART: [art] Derive Key Pair
3,452,865 UART: [art] Store priv key in slot 0x5
3,466,285 UART: [art] Derive Key Pair - Done
3,481,052 UART: [art] Signing Cert with AUTHO
3,481,532 UART: RITY.KEYID = 7
3,496,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,649 UART: [art] PUB.X = AC7786D3FF6116679E163CBF294F3409330DBE0CE4C276245433B04FDA63EAB1FEA6F6B04C6C06D3760C22CFE893A643
3,504,414 UART: [art] PUB.Y = 0B14603FF12317AFD440B7C8046CE699877358A6B6DCA2594476033222CCC21ABCF31D26CC0B104E49946E122194296E
3,511,348 UART: [art] SIG.R = 84C102147334E22E0FB73C9A732666FF6315588F4A0D023901BFE9D07F94F2CE20782C0439DC1666328DA5A6E7B3B026
3,518,096 UART: [art] SIG.S = C1387709FACDED2522E84BB53D810AF76928BC283636D554B42F89B8EE76D3A14E59E585F2AC997470A21761FA071E08
3,542,383 UART: Caliptra RT
3,542,728 UART: [state] CFI Enabled
3,650,801 UART: [rt] RT listening for mailbox commands...
3,651,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,613 UART: [rt]cmd =0x41544d4e, len=14344
3,783,501 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,174,745 ready_for_fw is high
1,174,745 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,199,117 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,209,000 UART: [ldev] ++
1,209,168 UART: [ldev] CDI.KEYID = 6
1,209,532 UART: [ldev] SUBJECT.KEYID = 5
1,209,959 UART: [ldev] AUTHORITY.KEYID = 7
1,210,422 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,583 UART: [fwproc] Recv command 0x46574c44
1,282,316 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,324,181 >>> mbox cmd response: success
3,325,404 UART: [afmc] ++
3,325,572 UART: [afmc] CDI.KEYID = 6
3,325,935 UART: [afmc] SUBJECT.KEYID = 7
3,326,361 UART: [afmc] AUTHORITY.KEYID = 5
3,361,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,722 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,432 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,322 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,033 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,859 UART: [afmc] --
3,404,969 UART: [cold-reset] --
3,405,765 UART: [state] Locking Datavault
3,406,770 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,374 UART: [state] Locking ICCM
3,407,846 UART: [exit] Launching FMC @ 0x40000130
3,413,175 UART:
3,413,191 UART: Running Caliptra FMC ...
3,413,599 UART:
3,413,653 UART: [state] CFI Enabled
3,424,369 UART: [fht] FMC Alias Private Key: 7
3,532,345 UART: [art] Extend RT PCRs Done
3,532,773 UART: [art] Lock RT PCRs Done
3,534,333 UART: [art] Populate DV Done
3,542,337 UART: [fht] FMC Alias Private Key: 7
3,543,265 UART: [art] Derive CDI
3,543,545 UART: [art] Store in in slot 0x4
3,629,474 UART: [art] Derive Key Pair
3,629,834 UART: [art] Store priv key in slot 0x5
3,642,940 UART: [art] Derive Key Pair - Done
3,657,730 UART: [art] Signing Cert with AUTHO
3,658,210 UART: RITY.KEYID = 7
3,673,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,963 UART: [art] PUB.X = 4E2511D65E5FC83D78A9ABA6E3BDE54E6DBBD462F8E67E7522E69693243BBF486AA3D295E09C3C0D057C96B7B643A404
3,680,736 UART: [art] PUB.Y = 17EBE94AF5D527BA06364D7D1D68ACDFDF337CDFD2DD3D95674848870D5039428DA74C191375FD2D8AB3AFB8A0A5E0E5
3,687,698 UART: [art] SIG.R = 4728C242C425ECB5877EC952BF2CF10998B8C0C7B44031184BA411032E3E0DA35EF12F5B45AC025355F9EAFDC49A679C
3,694,464 UART: [art] SIG.S = A0FC66DF0F0D017BF04B67A3ED6DC91217B3BBB708954127314B70ACFFB3FC944D6B3B64CDB6ADDAD8B27A5A32CEDF52
3,718,241 UART: Caliptra RT
3,718,494 UART: [state] CFI Enabled
3,825,832 UART: [rt] RT listening for mailbox commands...
3,826,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,452 UART: [rt]cmd =0x41544d4e, len=14344
3,957,846 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,582 ready_for_fw is high
1,056,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,164 >>> mbox cmd response: success
3,213,969 UART:
3,213,985 UART: Running Caliptra FMC ...
3,214,393 UART:
3,214,447 UART: [state] CFI Enabled
3,225,085 UART: [fht] FMC Alias Private Key: 7
3,333,299 UART: [art] Extend RT PCRs Done
3,333,727 UART: [art] Lock RT PCRs Done
3,335,341 UART: [art] Populate DV Done
3,343,335 UART: [fht] FMC Alias Private Key: 7
3,344,507 UART: [art] Derive CDI
3,344,787 UART: [art] Store in in slot 0x4
3,430,688 UART: [art] Derive Key Pair
3,431,048 UART: [art] Store priv key in slot 0x5
3,444,728 UART: [art] Derive Key Pair - Done
3,459,288 UART: [art] Signing Cert with AUTHO
3,459,768 UART: RITY.KEYID = 7
3,474,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,475,589 UART: [art] PUB.X = 6ACEC18A30423077C53C6E9034F5419294EF83622220B6A1479D74412783CEFBD2D501EC276168663AB02F91EF3A5A06
3,482,349 UART: [art] PUB.Y = 4647ED54EF74294AEBACA66FF41B1B3EB17FD250A096992B0242B1A369F506CA6BFEB778D27C5BEDE577D81DA7500F2B
3,489,308 UART: [art] SIG.R = 37C602E2D934A8F71E381C48577DF09EAF4F786BEDA2E46594F1B4408138534AE46E698D75BB10F712B6D715F002F43F
3,496,074 UART: [art] SIG.S = D13693A56F0952E2FF7E843825094B173298DD2C234134A5C08EF037F0875BA07F91D9F4EAD477B68E713E24387B953A
3,520,019 UART: Caliptra RT
3,520,272 UART: [state] CFI Enabled
3,627,910 UART: [rt] RT listening for mailbox commands...
3,628,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,720 UART: [rt]cmd =0x41544d4e, len=14344
3,760,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,215,643 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,310,913 >>> mbox cmd response: success
3,312,164 UART: [afmc] ++
3,312,332 UART: [afmc] CDI.KEYID = 6
3,312,695 UART: [afmc] SUBJECT.KEYID = 7
3,313,121 UART: [afmc] AUTHORITY.KEYID = 5
3,349,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,218 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,928 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,818 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,529 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,457 UART: [afmc] --
3,392,337 UART: [cold-reset] --
3,393,237 UART: [state] Locking Datavault
3,394,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,170 UART: [state] Locking ICCM
3,395,690 UART: [exit] Launching FMC @ 0x40000130
3,401,019 UART:
3,401,035 UART: Running Caliptra FMC ...
3,401,443 UART:
3,401,586 UART: [state] CFI Enabled
3,412,190 UART: [fht] FMC Alias Private Key: 7
3,520,390 UART: [art] Extend RT PCRs Done
3,520,818 UART: [art] Lock RT PCRs Done
3,522,478 UART: [art] Populate DV Done
3,531,082 UART: [fht] FMC Alias Private Key: 7
3,532,136 UART: [art] Derive CDI
3,532,416 UART: [art] Store in in slot 0x4
3,618,271 UART: [art] Derive Key Pair
3,618,631 UART: [art] Store priv key in slot 0x5
3,631,761 UART: [art] Derive Key Pair - Done
3,646,388 UART: [art] Signing Cert with AUTHO
3,646,868 UART: RITY.KEYID = 7
3,661,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,525 UART: [art] PUB.X = DAD0135D9B356E4FEE374627C72A089A5B64406127416464DDB5380B7FF4C5E9D7112AD55B9BBD642AC53CF0F6B91C0A
3,669,296 UART: [art] PUB.Y = D521386D4B261C30DCA3F9BFE100BD042A107A8E06EE1AFCAC731361E811919A780DF79349BD6BD240984D1E1159BCEB
3,676,227 UART: [art] SIG.R = 321686966026C337285AD3026F754165C555911C10997CE4412BB3F953C46566401D8476989C58E336E743B6A2155EA0
3,682,972 UART: [art] SIG.S = 8BA9D989B088744584A2FEFA507F15D15158D5FBC4D5E0FB00E0AB03FA8CBEEEDD0375A50ACFB325655AB693CB870BB4
3,706,373 UART: Caliptra RT
3,706,718 UART: [state] CFI Enabled
3,814,028 UART: [rt] RT listening for mailbox commands...
3,814,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,936 UART: [rt]cmd =0x41544d4e, len=14344
3,946,258 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,565 ready_for_fw is high
1,056,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,400 >>> mbox cmd response: success
3,233,587 UART:
3,233,603 UART: Running Caliptra FMC ...
3,234,011 UART:
3,234,154 UART: [state] CFI Enabled
3,244,922 UART: [fht] FMC Alias Private Key: 7
3,352,594 UART: [art] Extend RT PCRs Done
3,353,022 UART: [art] Lock RT PCRs Done
3,354,752 UART: [art] Populate DV Done
3,363,072 UART: [fht] FMC Alias Private Key: 7
3,364,236 UART: [art] Derive CDI
3,364,516 UART: [art] Store in in slot 0x4
3,449,719 UART: [art] Derive Key Pair
3,450,079 UART: [art] Store priv key in slot 0x5
3,463,987 UART: [art] Derive Key Pair - Done
3,478,639 UART: [art] Signing Cert with AUTHO
3,479,119 UART: RITY.KEYID = 7
3,494,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,300 UART: [art] PUB.X = 3BC5770F401B16F02F8BB3E8FF165068F42B15A34657FA0C528CBDC7F20736E22F7E35C9F8A24E1C9CBBDA083AED2E21
3,502,074 UART: [art] PUB.Y = 6ADD9643B6DC95B3BCE24774657C141C79E6FEBD36D28CA24324586712B73F8084B2AE1A9482598049A5C70C113425FE
3,509,021 UART: [art] SIG.R = A28F7F5C8E9EA22FEC2A2E8140E7017540243F3F3CB0C8172CB195419E315EAE2FBC3E5EC30CB425F95C85DDD3B079E3
3,515,801 UART: [art] SIG.S = 2EEFDEFDFC2D73BA70BA95931B165B61F114B4901628D6D7604F654EBE7BB31D3C97CC4F43172BC66BEC39AB1B518374
3,539,316 UART: Caliptra RT
3,539,661 UART: [state] CFI Enabled
3,647,719 UART: [rt] RT listening for mailbox commands...
3,648,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,647 UART: [rt]cmd =0x41544d4e, len=14344
3,779,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,044 UART: [kat] LMS
1,475,240 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,743 UART: [fht] Storing FHT @ 0x50003400
1,479,384 UART: [idev] ++
1,479,552 UART: [idev] CDI.KEYID = 6
1,479,912 UART: [idev] SUBJECT.KEYID = 7
1,480,336 UART: [idev] UDS.KEYID = 0
1,480,681 ready_for_fw is high
1,480,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,056 UART: [idev] Erasing UDS.KEYID = 0
1,504,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,682 UART: [idev] --
1,514,881 UART: [ldev] ++
1,515,049 UART: [ldev] CDI.KEYID = 6
1,515,412 UART: [ldev] SUBJECT.KEYID = 5
1,515,838 UART: [ldev] AUTHORITY.KEYID = 7
1,516,301 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,547,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,082 UART: [ldev] --
1,586,575 UART: [fwproc] Waiting for Commands...
1,587,210 UART: [fwproc] Received command 0x46574c44
1,588,001 UART: [fwproc] Received Image of size 114332 bytes
2,884,229 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,243 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,536 >>> mbox cmd response: success
3,078,636 UART: [afmc] ++
3,078,804 UART: [afmc] CDI.KEYID = 6
3,079,166 UART: [afmc] SUBJECT.KEYID = 7
3,079,591 UART: [afmc] AUTHORITY.KEYID = 5
3,114,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,541 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,231 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,090 UART: [afmc] --
3,157,132 UART: [cold-reset] --
3,157,990 UART: [state] Locking Datavault
3,159,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,771 UART: [state] Locking ICCM
3,160,343 UART: [exit] Launching FMC @ 0x40000130
3,165,672 UART:
3,165,688 UART: Running Caliptra FMC ...
3,166,096 UART:
3,166,150 UART: [state] CFI Enabled
3,176,605 UART: [fht] FMC Alias Private Key: 7
3,284,670 UART: [art] Extend RT PCRs Done
3,285,098 UART: [art] Lock RT PCRs Done
3,286,590 UART: [art] Populate DV Done
3,294,789 UART: [fht] FMC Alias Private Key: 7
3,295,755 UART: [art] Derive CDI
3,296,035 UART: [art] Store in in slot 0x4
3,381,952 UART: [art] Derive Key Pair
3,382,312 UART: [art] Store priv key in slot 0x5
3,395,358 UART: [art] Derive Key Pair - Done
3,409,985 UART: [art] Signing Cert with AUTHO
3,410,465 UART: RITY.KEYID = 7
3,425,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,228 UART: [art] PUB.X = 2A63E14AEC1DA638C36E3FFF4B1FBFD98B64F798DEF6CFECA67B8A7F8418C2A8DC102E271692A9BAA18F8860E4C7D932
3,433,022 UART: [art] PUB.Y = BD8BFE717686507FD7E1ADBD71A00D8FD74F072C9A2524FC16ED94ABCECD38C96959F3E6D3076250DD2DB3817A92D8A9
3,439,981 UART: [art] SIG.R = 5A4D73B3A17D0FE2226C9232D3DEE68AAB7131CC3FE4476195B73B9AD78DF49D2C3C19D645965C689E4BCB8A169D26C8
3,446,760 UART: [art] SIG.S = C4F266355DCEC31D682EDDD725BCC5F78B32B7CC89D681A395399D13D5C86FA3382500F6B225AADC2B1F88A91E8CB7FF
3,470,455 UART: Caliptra RT
3,470,708 UART: [state] CFI Enabled
3,578,737 UART: [rt] RT listening for mailbox commands...
3,579,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,611 UART: [rt]cmd =0x41544d4e, len=14344
4,012,218 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 ready_for_fw is high
1,362,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,274 >>> mbox cmd response: success
2,990,934 UART:
2,990,950 UART: Running Caliptra FMC ...
2,991,358 UART:
2,991,412 UART: [state] CFI Enabled
3,001,655 UART: [fht] FMC Alias Private Key: 7
3,110,050 UART: [art] Extend RT PCRs Done
3,110,478 UART: [art] Lock RT PCRs Done
3,111,826 UART: [art] Populate DV Done
3,120,217 UART: [fht] FMC Alias Private Key: 7
3,121,315 UART: [art] Derive CDI
3,121,595 UART: [art] Store in in slot 0x4
3,207,196 UART: [art] Derive Key Pair
3,207,556 UART: [art] Store priv key in slot 0x5
3,220,872 UART: [art] Derive Key Pair - Done
3,235,611 UART: [art] Signing Cert with AUTHO
3,236,091 UART: RITY.KEYID = 7
3,251,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,968 UART: [art] PUB.X = F6444DFE61D0925D383FB03005D7D62D3FA91BD3C5271C2F48C7B7AFE1FDC3A8C2B29D46C095497B108F94F6A7D7EC50
3,258,749 UART: [art] PUB.Y = 5423DD3C3F47A4B3D7257A7D0CEF50FAC55136260D5EC87E812867A66E8168B2F94B51D6B789F86456DCA8801AA690DB
3,265,699 UART: [art] SIG.R = 0CF6B203989D08FEA7EE70D7B6F14350E472222764CD0B142ACB05EE1E6B2C50E76EC7F00FA1762AC24D240FD595DA4F
3,272,462 UART: [art] SIG.S = BB17CEA2A5CC0F0A51D52E75BCB7B7A742D98253A5C320C3F93DC993D6D8DA1D29AAEAB124CEDB989434223062440906
3,296,675 UART: Caliptra RT
3,296,928 UART: [state] CFI Enabled
3,404,577 UART: [rt] RT listening for mailbox commands...
3,405,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,889 UART: [rt]cmd =0x41544d4e, len=14344
3,837,746 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
86,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,837 UART: [kat] SHA2-512-ACC
897,738 UART: [kat] ECC-384
903,417 UART: [kat] HMAC-384Kdf
908,007 UART: [kat] LMS
1,476,203 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,518 UART: [fht] Storing FHT @ 0x50003400
1,480,251 UART: [idev] ++
1,480,419 UART: [idev] CDI.KEYID = 6
1,480,779 UART: [idev] SUBJECT.KEYID = 7
1,481,203 UART: [idev] UDS.KEYID = 0
1,481,548 ready_for_fw is high
1,481,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,489 UART: [idev] Erasing UDS.KEYID = 0
1,505,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,747 UART: [ldev] --
1,587,168 UART: [fwproc] Waiting for Commands...
1,587,977 UART: [fwproc] Received command 0x46574c44
1,588,768 UART: [fwproc] Received Image of size 114332 bytes
2,885,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,364 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,455 >>> mbox cmd response: success
3,078,697 UART: [afmc] ++
3,078,865 UART: [afmc] CDI.KEYID = 6
3,079,227 UART: [afmc] SUBJECT.KEYID = 7
3,079,652 UART: [afmc] AUTHORITY.KEYID = 5
3,115,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,763 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,543 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,156 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,846 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,763 UART: [afmc] --
3,158,641 UART: [cold-reset] --
3,159,603 UART: [state] Locking Datavault
3,160,562 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,166 UART: [state] Locking ICCM
3,161,680 UART: [exit] Launching FMC @ 0x40000130
3,167,009 UART:
3,167,025 UART: Running Caliptra FMC ...
3,167,433 UART:
3,167,576 UART: [state] CFI Enabled
3,178,135 UART: [fht] FMC Alias Private Key: 7
3,285,340 UART: [art] Extend RT PCRs Done
3,285,768 UART: [art] Lock RT PCRs Done
3,287,458 UART: [art] Populate DV Done
3,295,559 UART: [fht] FMC Alias Private Key: 7
3,296,601 UART: [art] Derive CDI
3,296,881 UART: [art] Store in in slot 0x4
3,382,426 UART: [art] Derive Key Pair
3,382,786 UART: [art] Store priv key in slot 0x5
3,396,002 UART: [art] Derive Key Pair - Done
3,411,038 UART: [art] Signing Cert with AUTHO
3,411,518 UART: RITY.KEYID = 7
3,426,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,379 UART: [art] PUB.X = DFAE81A83CB5D5623F07CEDFBAC54D5CC1F026CB45FF2F808DC8268BDB695F1F8A6CAAEB6590CFD8B97A5164A2B7E2B6
3,434,178 UART: [art] PUB.Y = B7C2DC4858CAD9C37D2EE0B3059D91AD2820290BDE03AA30247C1AD4327049206D6114DDBEAC9D058CB10FCBFC875660
3,441,127 UART: [art] SIG.R = E765CF9D4A67F68D4D4C5B0ABC981EDF5084718959C0E2657466F8AEECEEBE3F17836797FAD8E87ABC127D6343DAC564
3,447,910 UART: [art] SIG.S = 9F1910A6A1307C2CE73EC1940192C1370314DC682BBDE92B9E7A9ECE260ACA74BA2EDA16BDCCE5C2AD109E81349046BC
3,472,218 UART: Caliptra RT
3,472,563 UART: [state] CFI Enabled
3,580,033 UART: [rt] RT listening for mailbox commands...
3,580,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,757 UART: [rt]cmd =0x41544d4e, len=14344
4,014,162 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,200 ready_for_fw is high
1,362,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,629 >>> mbox cmd response: success
2,991,553 UART:
2,991,569 UART: Running Caliptra FMC ...
2,991,977 UART:
2,992,120 UART: [state] CFI Enabled
3,002,599 UART: [fht] FMC Alias Private Key: 7
3,110,354 UART: [art] Extend RT PCRs Done
3,110,782 UART: [art] Lock RT PCRs Done
3,112,336 UART: [art] Populate DV Done
3,120,745 UART: [fht] FMC Alias Private Key: 7
3,121,863 UART: [art] Derive CDI
3,122,143 UART: [art] Store in in slot 0x4
3,208,216 UART: [art] Derive Key Pair
3,208,576 UART: [art] Store priv key in slot 0x5
3,221,850 UART: [art] Derive Key Pair - Done
3,236,769 UART: [art] Signing Cert with AUTHO
3,237,249 UART: RITY.KEYID = 7
3,252,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,624 UART: [art] PUB.X = 04BA9FFBE13A8689CEFB6D132304CDA27EEF30A954CE345D4EB501C2C6686A71863F9CFBC75068CDF09AD62CDA63A2FA
3,260,409 UART: [art] PUB.Y = ED0F95DE076A7DEE2C0BBD5551141351D9F2F3FDFB5405B4FA5E9D3753240D2F311F4222876E2D2BFB6BE5195AF89E50
3,267,358 UART: [art] SIG.R = 4422C8AD8039A4CE4029AAF9BD3710A923A7EB45C876F9123844AA15F49D14BAD5D6A93ADCFF7D7B1A33025443B7A599
3,274,135 UART: [art] SIG.S = FF779260AC89B5771E8D03EB1D1077EB9E052AEAF2BCE3CBA70EB5D14AD23015242D66F1C757523CE7680E55D902E73B
3,297,781 UART: Caliptra RT
3,298,126 UART: [state] CFI Enabled
3,405,987 UART: [rt] RT listening for mailbox commands...
3,406,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,577 UART: [rt]cmd =0x41544d4e, len=14344
3,839,594 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
917,286 UART: [kat] HMAC-384Kdf
922,024 UART: [kat] LMS
1,170,352 UART: [kat] --
1,171,427 UART: [cold-reset] ++
1,171,847 UART: [fht] FHT @ 0x50003400
1,174,346 UART: [idev] ++
1,174,514 UART: [idev] CDI.KEYID = 6
1,174,874 UART: [idev] SUBJECT.KEYID = 7
1,175,298 UART: [idev] UDS.KEYID = 0
1,175,643 ready_for_fw is high
1,175,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,001 UART: [idev] Sha1 KeyId Algorithm
1,208,445 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,066 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,242,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,282,032 UART: [fwproc] Wait for Commands...
1,282,708 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,743 >>> mbox cmd response: success
2,775,815 UART: [afmc] ++
2,775,983 UART: [afmc] CDI.KEYID = 6
2,776,345 UART: [afmc] SUBJECT.KEYID = 7
2,776,770 UART: [afmc] AUTHORITY.KEYID = 5
2,813,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,851 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,610 UART: [afmc] --
2,856,584 UART: [cold-reset] --
2,857,378 UART: [state] Locking Datavault
2,858,485 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,089 UART: [state] Locking ICCM
2,859,599 UART: [exit] Launching FMC @ 0x40000130
2,864,928 UART:
2,864,944 UART: Running Caliptra FMC ...
2,865,352 UART:
2,865,406 UART: [state] CFI Enabled
2,875,627 UART: [fht] FMC Alias Private Key: 7
2,983,546 UART: [art] Extend RT PCRs Done
2,983,974 UART: [art] Lock RT PCRs Done
2,985,448 UART: [art] Populate DV Done
2,993,627 UART: [fht] FMC Alias Private Key: 7
2,994,725 UART: [art] Derive CDI
2,995,005 UART: [art] Store in in slot 0x4
3,080,242 UART: [art] Derive Key Pair
3,080,602 UART: [art] Store priv key in slot 0x5
3,093,274 UART: [art] Derive Key Pair - Done
3,108,323 UART: [art] Signing Cert with AUTHO
3,108,803 UART: RITY.KEYID = 7
3,123,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,604 UART: [art] PUB.X = 7235830D312071ED58CD12CC5DAD3CDB3403A312D4A2C7673E6F732B1DC110FC32242BEEDE9D10E16E459FC3AA214E8F
3,131,382 UART: [art] PUB.Y = 64F4BF761BC464712DA5C7561B6807FB0A8B7367585DAA1A35DB51D86221221F0D94F0BEC3B62C4EE72EAA74E42282BE
3,138,333 UART: [art] SIG.R = 25E5877733ACEB21937DA42C2FE016DF31351BC471039E66C4A63FBFE3FBCB773649B5BECBED5B518A13BE190F2BB3EF
3,145,117 UART: [art] SIG.S = CFCDEA162BCDAA57E57D24638CBB7F44DABF3D84A20C0EECB505563E1AC26ABEBC82166A17D016CC2FF804096212E56E
3,168,913 UART: Caliptra RT
3,169,166 UART: [state] CFI Enabled
3,277,673 UART: [rt] RT listening for mailbox commands...
3,278,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,475 UART: [rt]cmd =0x41544d4e, len=14344
3,710,714 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,759 ready_for_fw is high
1,060,759 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,620 >>> mbox cmd response: success
2,689,278 UART:
2,689,294 UART: Running Caliptra FMC ...
2,689,702 UART:
2,689,756 UART: [state] CFI Enabled
2,700,257 UART: [fht] FMC Alias Private Key: 7
2,808,718 UART: [art] Extend RT PCRs Done
2,809,146 UART: [art] Lock RT PCRs Done
2,810,834 UART: [art] Populate DV Done
2,818,935 UART: [fht] FMC Alias Private Key: 7
2,819,887 UART: [art] Derive CDI
2,820,167 UART: [art] Store in in slot 0x4
2,905,588 UART: [art] Derive Key Pair
2,905,948 UART: [art] Store priv key in slot 0x5
2,919,322 UART: [art] Derive Key Pair - Done
2,934,129 UART: [art] Signing Cert with AUTHO
2,934,609 UART: RITY.KEYID = 7
2,950,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,002 UART: [art] PUB.X = 19146E70A3EA5476A07DAFF8A50D7352E626A0FA9916A8AEF5B5F45B87F27EF0BBCF6474AEFB3CBCFC0F579C31FD30D8
2,957,790 UART: [art] PUB.Y = 3DE016A4C934CF1790284B8CD0B63895CE39B87A53386D90A5A6D15C32A602B37CFC1EE1F2B144EF84B20C1E0AC66046
2,964,739 UART: [art] SIG.R = E01E9C776F1DE89A927BBD6E0829EFB205236D9A655B35D899923B59A1636526B97527468A8712089417D80376F75A79
2,971,485 UART: [art] SIG.S = 8831CBBA5FC74B6E8BC77269AB4A2B00CF693E2945F309A34E8ED554D60293B4369097A4F1AC4C74D8DE6FBE2272B554
2,995,266 UART: Caliptra RT
2,995,519 UART: [state] CFI Enabled
3,102,571 UART: [rt] RT listening for mailbox commands...
3,103,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,355 UART: [rt]cmd =0x41544d4e, len=14344
3,536,514 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,192 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
894,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,164 UART: [kat] ++
898,316 UART: [kat] sha1
902,728 UART: [kat] SHA2-256
904,668 UART: [kat] SHA2-384
907,325 UART: [kat] SHA2-512-ACC
909,226 UART: [kat] ECC-384
918,871 UART: [kat] HMAC-384Kdf
923,661 UART: [kat] LMS
1,171,989 UART: [kat] --
1,172,702 UART: [cold-reset] ++
1,173,248 UART: [fht] FHT @ 0x50003400
1,175,995 UART: [idev] ++
1,176,163 UART: [idev] CDI.KEYID = 6
1,176,523 UART: [idev] SUBJECT.KEYID = 7
1,176,947 UART: [idev] UDS.KEYID = 0
1,177,292 ready_for_fw is high
1,177,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,499 UART: [idev] Erasing UDS.KEYID = 0
1,202,524 UART: [idev] Sha1 KeyId Algorithm
1,211,144 UART: [idev] --
1,212,138 UART: [ldev] ++
1,212,306 UART: [ldev] CDI.KEYID = 6
1,212,669 UART: [ldev] SUBJECT.KEYID = 5
1,213,095 UART: [ldev] AUTHORITY.KEYID = 7
1,213,558 UART: [ldev] FE.KEYID = 1
1,219,030 UART: [ldev] Erasing FE.KEYID = 1
1,245,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,390 UART: [ldev] --
1,284,763 UART: [fwproc] Wait for Commands...
1,285,399 UART: [fwproc] Recv command 0x46574c44
1,286,127 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,488 >>> mbox cmd response: success
2,777,594 UART: [afmc] ++
2,777,762 UART: [afmc] CDI.KEYID = 6
2,778,124 UART: [afmc] SUBJECT.KEYID = 7
2,778,549 UART: [afmc] AUTHORITY.KEYID = 5
2,815,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,347 UART: [afmc] --
2,858,361 UART: [cold-reset] --
2,859,097 UART: [state] Locking Datavault
2,860,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,734 UART: [state] Locking ICCM
2,861,296 UART: [exit] Launching FMC @ 0x40000130
2,866,625 UART:
2,866,641 UART: Running Caliptra FMC ...
2,867,049 UART:
2,867,192 UART: [state] CFI Enabled
2,878,025 UART: [fht] FMC Alias Private Key: 7
2,985,736 UART: [art] Extend RT PCRs Done
2,986,164 UART: [art] Lock RT PCRs Done
2,987,494 UART: [art] Populate DV Done
2,995,623 UART: [fht] FMC Alias Private Key: 7
2,996,601 UART: [art] Derive CDI
2,996,881 UART: [art] Store in in slot 0x4
3,082,488 UART: [art] Derive Key Pair
3,082,848 UART: [art] Store priv key in slot 0x5
3,096,034 UART: [art] Derive Key Pair - Done
3,111,171 UART: [art] Signing Cert with AUTHO
3,111,651 UART: RITY.KEYID = 7
3,127,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,882 UART: [art] PUB.X = E01ADB32D21957090F69D0E4D9FC78FC47CD8C6F715BF3B66A475C5B7AFFBD9FCABE676DF7691860EA764399D7C8ADF7
3,134,668 UART: [art] PUB.Y = 29649625F3D1FCCEB6BBA1CF17C37E0DB1F0284D7A4B28DE0EAA50F3A3C7CF44440F79631E57E6362E413F86FCBCE399
3,141,627 UART: [art] SIG.R = BB8C9FE95C140025A771B2FEED16D28CCB1DA4B01FC62D853E0E4DF396C8746CD381F4E0C26E886E5D261F644DCC1212
3,148,388 UART: [art] SIG.S = 81B120A249232C1BBACC1E324B09313C875384D14F3B077CC624610ED8393BA30873C28191190E6F42621A0AB3360DF3
3,172,008 UART: Caliptra RT
3,172,353 UART: [state] CFI Enabled
3,281,163 UART: [rt] RT listening for mailbox commands...
3,281,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,013 UART: [rt]cmd =0x41544d4e, len=14344
3,714,838 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,808 ready_for_fw is high
1,060,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,453 >>> mbox cmd response: success
2,690,273 UART:
2,690,289 UART: Running Caliptra FMC ...
2,690,697 UART:
2,690,840 UART: [state] CFI Enabled
2,701,337 UART: [fht] FMC Alias Private Key: 7
2,809,072 UART: [art] Extend RT PCRs Done
2,809,500 UART: [art] Lock RT PCRs Done
2,811,276 UART: [art] Populate DV Done
2,819,303 UART: [fht] FMC Alias Private Key: 7
2,820,457 UART: [art] Derive CDI
2,820,737 UART: [art] Store in in slot 0x4
2,906,566 UART: [art] Derive Key Pair
2,906,926 UART: [art] Store priv key in slot 0x5
2,920,090 UART: [art] Derive Key Pair - Done
2,935,030 UART: [art] Signing Cert with AUTHO
2,935,510 UART: RITY.KEYID = 7
2,950,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,329 UART: [art] PUB.X = 9B2F7F1B693519F7D84F50223E6F35A7D22691DD7312E910ABB856BA014F98B578D012366AB50C021DFFBA8DEABEEEF6
2,958,104 UART: [art] PUB.Y = D1E182EF397C0C13B2E7323FE177284210B464B73B569DAF653B22312968300DAA0CC51F5DE3F84D2043CB8EDB558C83
2,965,049 UART: [art] SIG.R = FF5244418D225098A79732FCE9486B137BF3C5042367EC760008C45B357C01C5E95A4B4892C5157815A29C2C922C1422
2,971,776 UART: [art] SIG.S = D4FB8E073D1062E9AA7DAAA216EC25F5201DA0970EA46B9776B6FFDBDCF1684567395CDAD68B517D741F8D64AF87AEFF
2,995,989 UART: Caliptra RT
2,996,334 UART: [state] CFI Enabled
3,104,312 UART: [rt] RT listening for mailbox commands...
3,104,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,888 UART: [rt]cmd =0x41544d4e, len=14344
3,537,989 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,899 UART: [state] WD Timer not started. Device not locked for debugging
87,014 UART: [kat] SHA2-256
890,564 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,693 UART: [kat] ++
894,845 UART: [kat] sha1
898,973 UART: [kat] SHA2-256
900,913 UART: [kat] SHA2-384
903,522 UART: [kat] SHA2-512-ACC
905,423 UART: [kat] ECC-384
914,770 UART: [kat] HMAC-384Kdf
919,240 UART: [kat] LMS
1,167,552 UART: [kat] --
1,168,451 UART: [cold-reset] ++
1,168,777 UART: [fht] FHT @ 0x50003400
1,171,349 UART: [idev] ++
1,171,517 UART: [idev] CDI.KEYID = 6
1,171,878 UART: [idev] SUBJECT.KEYID = 7
1,172,303 UART: [idev] UDS.KEYID = 0
1,172,649 ready_for_fw is high
1,172,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,077 UART: [idev] Erasing UDS.KEYID = 0
1,196,829 UART: [idev] Sha1 KeyId Algorithm
1,205,581 UART: [idev] --
1,206,716 UART: [ldev] ++
1,206,884 UART: [ldev] CDI.KEYID = 6
1,207,248 UART: [ldev] SUBJECT.KEYID = 5
1,207,675 UART: [ldev] AUTHORITY.KEYID = 7
1,208,138 UART: [ldev] FE.KEYID = 1
1,213,222 UART: [ldev] Erasing FE.KEYID = 1
1,239,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,706 UART: [ldev] --
1,279,140 UART: [fwproc] Wait for Commands...
1,279,851 UART: [fwproc] Recv command 0x46574c44
1,280,584 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,641 >>> mbox cmd response: success
2,770,750 UART: [afmc] ++
2,770,918 UART: [afmc] CDI.KEYID = 6
2,771,281 UART: [afmc] SUBJECT.KEYID = 7
2,771,707 UART: [afmc] AUTHORITY.KEYID = 5
2,807,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,725 UART: [afmc] --
2,850,657 UART: [cold-reset] --
2,851,431 UART: [state] Locking Datavault
2,852,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,258 UART: [state] Locking ICCM
2,853,818 UART: [exit] Launching FMC @ 0x40000130
2,859,147 UART:
2,859,163 UART: Running Caliptra FMC ...
2,859,571 UART:
2,859,625 UART: [state] CFI Enabled
2,869,892 UART: [fht] FMC Alias Private Key: 7
2,977,895 UART: [art] Extend RT PCRs Done
2,978,323 UART: [art] Lock RT PCRs Done
2,979,799 UART: [art] Populate DV Done
2,987,998 UART: [fht] FMC Alias Private Key: 7
2,988,958 UART: [art] Derive CDI
2,989,238 UART: [art] Store in in slot 0x4
3,075,007 UART: [art] Derive Key Pair
3,075,367 UART: [art] Store priv key in slot 0x5
3,088,989 UART: [art] Derive Key Pair - Done
3,103,867 UART: [art] Signing Cert with AUTHO
3,104,347 UART: RITY.KEYID = 7
3,119,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,456 UART: [art] PUB.X = 4A79090DB59169E7B0C1DB534DA310B7CDC1ECAD41A3B3573343D0878EBFC2BAC95CA28A7A68D58E6D9A90B870B79BDA
3,127,240 UART: [art] PUB.Y = 2F71AF6B6B83BE56BAF83885705A6B645BF49BB42E11CD2276EC34FF9A00001DDA64BA9C4201AA1F8C70AF1A8036ADF3
3,134,161 UART: [art] SIG.R = 018B37A7851C8B56DC60EB15DDF11F7107EA23C9701552E9CF7CA57224C673CFC74E9D5B64BDC7E4D75E40625384D76F
3,140,933 UART: [art] SIG.S = 3E01765C8327367E732704003AB75B2F4CA5F26E6675A6CBB222CF2EC0A537178F6B9D586FF2D433D1307657A49F4CD7
3,165,004 UART: Caliptra RT
3,165,257 UART: [state] CFI Enabled
3,272,512 UART: [rt] RT listening for mailbox commands...
3,273,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,018 UART: [rt]cmd =0x41544d4e, len=14344
3,705,819 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,146 ready_for_fw is high
1,056,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,309 >>> mbox cmd response: success
2,685,399 UART:
2,685,415 UART: Running Caliptra FMC ...
2,685,823 UART:
2,685,877 UART: [state] CFI Enabled
2,696,584 UART: [fht] FMC Alias Private Key: 7
2,804,089 UART: [art] Extend RT PCRs Done
2,804,517 UART: [art] Lock RT PCRs Done
2,805,843 UART: [art] Populate DV Done
2,814,060 UART: [fht] FMC Alias Private Key: 7
2,815,196 UART: [art] Derive CDI
2,815,476 UART: [art] Store in in slot 0x4
2,901,611 UART: [art] Derive Key Pair
2,901,971 UART: [art] Store priv key in slot 0x5
2,914,971 UART: [art] Derive Key Pair - Done
2,929,540 UART: [art] Signing Cert with AUTHO
2,930,020 UART: RITY.KEYID = 7
2,944,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,467 UART: [art] PUB.X = 66FC7F60480C177DD1E5272457A3574E606917F1B344A341AFC5C80EBA71CF26E504D0AE0B8DEABEAEDA320A71C3FE8D
2,952,240 UART: [art] PUB.Y = 79FDEE0D194384314BE7900A2597C89BA50A68CF454C543C3645B2723E0065E56E1385C75000DC2B4A8CA82B0193E927
2,959,130 UART: [art] SIG.R = 7E19A5E9EF90DA847B8C4392C436175F6423D59568D9CE9811819BBEE3AA16FD870D5650CAEB8FF722491290428BEDD5
2,965,903 UART: [art] SIG.S = 46A352971D7FFA8FD6AD3AF480A9AEA8556A4B830B3C2A611B53F1CF538A796543C77DEF340EC8F4FC76687D915EA0FC
2,989,952 UART: Caliptra RT
2,990,205 UART: [state] CFI Enabled
3,097,560 UART: [rt] RT listening for mailbox commands...
3,098,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,100 UART: [rt]cmd =0x41544d4e, len=14344
3,530,753 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,781 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,344 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 ready_for_fw is high
1,174,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,500 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,209,087 UART: [ldev] ++
1,209,255 UART: [ldev] CDI.KEYID = 6
1,209,619 UART: [ldev] SUBJECT.KEYID = 5
1,210,046 UART: [ldev] AUTHORITY.KEYID = 7
1,210,509 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,867 UART: [fwproc] Wait for Commands...
1,282,546 UART: [fwproc] Recv command 0x46574c44
1,283,279 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,910 >>> mbox cmd response: success
2,773,941 UART: [afmc] ++
2,774,109 UART: [afmc] CDI.KEYID = 6
2,774,472 UART: [afmc] SUBJECT.KEYID = 7
2,774,898 UART: [afmc] AUTHORITY.KEYID = 5
2,810,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,670 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,001 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,778 UART: [afmc] --
2,853,738 UART: [cold-reset] --
2,854,660 UART: [state] Locking Datavault
2,856,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,681 UART: [state] Locking ICCM
2,857,201 UART: [exit] Launching FMC @ 0x40000130
2,862,530 UART:
2,862,546 UART: Running Caliptra FMC ...
2,862,954 UART:
2,863,097 UART: [state] CFI Enabled
2,873,606 UART: [fht] FMC Alias Private Key: 7
2,981,573 UART: [art] Extend RT PCRs Done
2,982,001 UART: [art] Lock RT PCRs Done
2,983,961 UART: [art] Populate DV Done
2,992,294 UART: [fht] FMC Alias Private Key: 7
2,993,284 UART: [art] Derive CDI
2,993,564 UART: [art] Store in in slot 0x4
3,079,391 UART: [art] Derive Key Pair
3,079,751 UART: [art] Store priv key in slot 0x5
3,093,509 UART: [art] Derive Key Pair - Done
3,107,929 UART: [art] Signing Cert with AUTHO
3,108,409 UART: RITY.KEYID = 7
3,124,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,012 UART: [art] PUB.X = B19D911674ADE492020A2B9E3E26E589C7FB46112D5740FED40E049A42379B7BE7F0611769BF32080B372B23BAAA334A
3,131,766 UART: [art] PUB.Y = DCDAE378400FE3E179871761C13B663B4DB94F275A9825EAB07B2D1B9EB95D514DD9D187E07384A5660252525170DC2E
3,138,712 UART: [art] SIG.R = CF79A901444DD1699CB89EAEB364CA3B50A668012A9838CCEEF4F0D4C251C400C185277E94A51B74063A022861605622
3,145,446 UART: [art] SIG.S = DC1407414C50F56B484B3AA29DDD93DEA9167EAA522DEB1D43F0814C2D48D799B192EC47FB69DC55D726273D8F64A6F5
3,169,396 UART: Caliptra RT
3,169,741 UART: [state] CFI Enabled
3,278,345 UART: [rt] RT listening for mailbox commands...
3,279,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,039 UART: [rt]cmd =0x41544d4e, len=14344
3,712,352 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,941 ready_for_fw is high
1,056,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,880 >>> mbox cmd response: success
2,686,632 UART:
2,686,648 UART: Running Caliptra FMC ...
2,687,056 UART:
2,687,199 UART: [state] CFI Enabled
2,697,876 UART: [fht] FMC Alias Private Key: 7
2,805,745 UART: [art] Extend RT PCRs Done
2,806,173 UART: [art] Lock RT PCRs Done
2,807,535 UART: [art] Populate DV Done
2,815,822 UART: [fht] FMC Alias Private Key: 7
2,816,752 UART: [art] Derive CDI
2,817,032 UART: [art] Store in in slot 0x4
2,902,643 UART: [art] Derive Key Pair
2,903,003 UART: [art] Store priv key in slot 0x5
2,916,407 UART: [art] Derive Key Pair - Done
2,931,119 UART: [art] Signing Cert with AUTHO
2,931,599 UART: RITY.KEYID = 7
2,947,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,012 UART: [art] PUB.X = 96B8EE70308E2D864031A26EDBAC2B1D7FC6EDCBBCA3BC885ECB78B503EE2BF109AF697C607E2B1F8DA7893EB0C89669
2,954,800 UART: [art] PUB.Y = F90ED044EBD842A2873A252C2484A0B08E08AF23BC83A9061C85F8F28CEEF7DEE6EA2922AF5DBC2DA3243B380D44093E
2,961,751 UART: [art] SIG.R = 8425E80C5D229A9E46912635BFA673FFD2B9A1F83F19B52BB5C0354847E1B7737491DA3409AD6CEBB03DD70C247B1828
2,968,516 UART: [art] SIG.S = DF17078F219BA43AFE9FABA15F83FB5ADEEBEC206437A7887B6D30F89DCB0DCEC1B45BE963D1059192A3081A39180595
2,992,154 UART: Caliptra RT
2,992,499 UART: [state] CFI Enabled
3,101,959 UART: [rt] RT listening for mailbox commands...
3,102,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,653 UART: [rt]cmd =0x41544d4e, len=14344
3,535,552 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,757 UART: [kat] SHA2-256
892,695 UART: [kat] SHA2-384
895,482 UART: [kat] SHA2-512-ACC
897,383 UART: [kat] ECC-384
903,262 UART: [kat] HMAC-384Kdf
908,016 UART: [kat] LMS
1,476,212 UART: [kat] --
1,476,893 UART: [cold-reset] ++
1,477,309 UART: [fht] Storing FHT @ 0x50003400
1,480,142 UART: [idev] ++
1,480,310 UART: [idev] CDI.KEYID = 6
1,480,670 UART: [idev] SUBJECT.KEYID = 7
1,481,094 UART: [idev] UDS.KEYID = 0
1,481,439 ready_for_fw is high
1,481,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,880 UART: [idev] Erasing UDS.KEYID = 0
1,505,556 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,058 UART: [idev] --
1,514,993 UART: [ldev] ++
1,515,161 UART: [ldev] CDI.KEYID = 6
1,515,524 UART: [ldev] SUBJECT.KEYID = 5
1,515,950 UART: [ldev] AUTHORITY.KEYID = 7
1,516,413 UART: [ldev] FE.KEYID = 1
1,521,433 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,534 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,760 UART: [fwproc] Received command 0x46574c44
1,587,551 UART: [fwproc] Received Image of size 114332 bytes
5,121,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,330 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,315,517 >>> mbox cmd response: success
5,316,633 UART: [afmc] ++
5,316,801 UART: [afmc] CDI.KEYID = 6
5,317,163 UART: [afmc] SUBJECT.KEYID = 7
5,317,588 UART: [afmc] AUTHORITY.KEYID = 5
5,352,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,976 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,685 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,381,577 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,278 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,248 UART: [afmc] --
5,396,310 UART: [cold-reset] --
5,396,960 UART: [state] Locking Datavault
5,398,251 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,855 UART: [state] Locking ICCM
5,399,365 UART: [exit] Launching FMC @ 0x40000130
5,404,694 UART:
5,404,710 UART: Running Caliptra FMC ...
5,405,118 UART:
5,405,172 UART: [state] CFI Enabled
5,415,520 UART: [fht] FMC Alias Private Key: 7
5,523,382 UART: [art] Extend RT PCRs Done
5,523,810 UART: [art] Lock RT PCRs Done
5,525,078 UART: [art] Populate DV Done
5,533,292 UART: [fht] FMC Alias Private Key: 7
5,534,472 UART: [art] Derive CDI
5,534,752 UART: [art] Store in in slot 0x4
5,619,735 UART: [art] Derive Key Pair
5,620,095 UART: [art] Store priv key in slot 0x5
5,633,413 UART: [art] Derive Key Pair - Done
5,648,507 UART: [art] Signing Cert with AUTHO
5,648,987 UART: RITY.KEYID = 7
5,663,983 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,748 UART: [art] PUB.X = 204DD8F2BA224DE795426E2A023B1358E86AB60544874F148305EEC74C98544036B09D3D67314EE1B3D653C10B6E6C67
5,671,502 UART: [art] PUB.Y = 3712C93D545730081994842E3D60D92E1BC127A012362696BFEBA8416965CF0D4A081B2C7DF7E6C9039C303AF45FCD3F
5,678,440 UART: [art] SIG.R = 1AF314640DCD0F8E0A43579C02FF4A4D56C6CB32A963EB473D1C7D0DE5731DAE248B356E89A34059928DE350E013B915
5,685,201 UART: [art] SIG.S = 4715940D4AC92810794FBA92FC3F10BD4EC02F88F94CA7C631C60923FC0BF16926ACCA8EFFCFA2E34DEF06E41006E949
5,709,293 UART: Caliptra RT
5,709,546 UART: [state] CFI Enabled
5,817,454 UART: [rt] RT listening for mailbox commands...
5,818,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,000 UART: [rt]cmd =0x41544d4e, len=14344
6,588,264 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,235 ready_for_fw is high
1,363,235 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,278,400 >>> mbox cmd response: success
5,340,035 UART:
5,340,051 UART: Running Caliptra FMC ...
5,340,459 UART:
5,340,513 UART: [state] CFI Enabled
5,350,945 UART: [fht] FMC Alias Private Key: 7
5,458,483 UART: [art] Extend RT PCRs Done
5,458,911 UART: [art] Lock RT PCRs Done
5,460,593 UART: [art] Populate DV Done
5,468,957 UART: [fht] FMC Alias Private Key: 7
5,469,945 UART: [art] Derive CDI
5,470,225 UART: [art] Store in in slot 0x4
5,556,150 UART: [art] Derive Key Pair
5,556,510 UART: [art] Store priv key in slot 0x5
5,569,722 UART: [art] Derive Key Pair - Done
5,584,176 UART: [art] Signing Cert with AUTHO
5,584,656 UART: RITY.KEYID = 7
5,600,214 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,979 UART: [art] PUB.X = 09369E42218F18B511043B29DEB3F68AEE95ADB7678DE0D51AA234560BFDB45DC4D395CD70DE53D68B82C37EA2F55B39
5,607,752 UART: [art] PUB.Y = 2ECE476EB153478A11E1F6238A6433736879E93705573ABA2CF38C86D4D5C1E0A261DEA8991A98DAAABFA4FCF51E2E79
5,614,711 UART: [art] SIG.R = DB12C204C7D41EDB0C3DE23096A873A9E14AEBBE1C246FF45B45B2E1AD50CF24A94A91509B1E41FF9E0F67D87DA990AC
5,621,494 UART: [art] SIG.S = 4324952D0C49F23B0959BCAF0439DC5A6993619CEC645098730327FE7BAD9F6860C8EF4284A3C4BE18C5F13A9DF7C0C1
5,645,625 UART: Caliptra RT
5,645,878 UART: [state] CFI Enabled
5,755,265 UART: [rt] RT listening for mailbox commands...
5,755,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,111 UART: [rt]cmd =0x41544d4e, len=14344
6,521,391 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,813 UART: [kat] SHA2-512-ACC
897,714 UART: [kat] ECC-384
903,279 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,348 UART: [fht] Storing FHT @ 0x50003400
1,480,113 UART: [idev] ++
1,480,281 UART: [idev] CDI.KEYID = 6
1,480,641 UART: [idev] SUBJECT.KEYID = 7
1,481,065 UART: [idev] UDS.KEYID = 0
1,481,410 ready_for_fw is high
1,481,410 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,506,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,095 UART: [idev] --
1,516,342 UART: [ldev] ++
1,516,510 UART: [ldev] CDI.KEYID = 6
1,516,873 UART: [ldev] SUBJECT.KEYID = 5
1,517,299 UART: [ldev] AUTHORITY.KEYID = 7
1,517,762 UART: [ldev] FE.KEYID = 1
1,522,822 UART: [ldev] Erasing FE.KEYID = 1
1,548,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,563 UART: [ldev] --
1,588,028 UART: [fwproc] Waiting for Commands...
1,588,721 UART: [fwproc] Received command 0x46574c44
1,589,512 UART: [fwproc] Received Image of size 114332 bytes
5,122,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,315,540 >>> mbox cmd response: success
5,316,650 UART: [afmc] ++
5,316,818 UART: [afmc] CDI.KEYID = 6
5,317,180 UART: [afmc] SUBJECT.KEYID = 7
5,317,605 UART: [afmc] AUTHORITY.KEYID = 5
5,352,701 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,941 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,650 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,381,542 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,243 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,209 UART: [afmc] --
5,396,167 UART: [cold-reset] --
5,397,017 UART: [state] Locking Datavault
5,397,944 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,548 UART: [state] Locking ICCM
5,399,068 UART: [exit] Launching FMC @ 0x40000130
5,404,397 UART:
5,404,413 UART: Running Caliptra FMC ...
5,404,821 UART:
5,404,964 UART: [state] CFI Enabled
5,415,358 UART: [fht] FMC Alias Private Key: 7
5,523,614 UART: [art] Extend RT PCRs Done
5,524,042 UART: [art] Lock RT PCRs Done
5,525,552 UART: [art] Populate DV Done
5,533,764 UART: [fht] FMC Alias Private Key: 7
5,534,716 UART: [art] Derive CDI
5,534,996 UART: [art] Store in in slot 0x4
5,620,933 UART: [art] Derive Key Pair
5,621,293 UART: [art] Store priv key in slot 0x5
5,634,661 UART: [art] Derive Key Pair - Done
5,649,280 UART: [art] Signing Cert with AUTHO
5,649,760 UART: RITY.KEYID = 7
5,664,288 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,053 UART: [art] PUB.X = 3F7FAFF107C562479A90BE9E424CA6712D0DBF09633ABEEE6356661C3327E3AEE590DF2F6720CE44D4146F056C15458B
5,671,819 UART: [art] PUB.Y = F5C158D2E3D3CDFF4B671B07CABA048B5FB7F6BDA99F9FADDAAD3115F2DC9989D7F8D4842BF9FB9B28C922F7069FB883
5,678,788 UART: [art] SIG.R = E1F6D7A96B14B76A20DD181AAC30717715E090139B1D1BDC4478226C0197B458791F0E6CFC429743B71BC4F775C4F456
5,685,552 UART: [art] SIG.S = F8AA7FB4A72422883E449281FE3C5D13D2E08D9106DCE1CFCA5DBF34A5054CEE855E988E335BA8BB4981927F77482770
5,709,353 UART: Caliptra RT
5,709,698 UART: [state] CFI Enabled
5,817,982 UART: [rt] RT listening for mailbox commands...
5,818,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,512 UART: [rt]cmd =0x41544d4e, len=14344
6,586,251 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,528 ready_for_fw is high
1,363,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,166,830 >>> mbox cmd response: success
5,228,497 UART:
5,228,513 UART: Running Caliptra FMC ...
5,228,921 UART:
5,229,064 UART: [state] CFI Enabled
5,239,872 UART: [fht] FMC Alias Private Key: 7
5,347,480 UART: [art] Extend RT PCRs Done
5,347,908 UART: [art] Lock RT PCRs Done
5,349,210 UART: [art] Populate DV Done
5,357,278 UART: [fht] FMC Alias Private Key: 7
5,358,236 UART: [art] Derive CDI
5,358,516 UART: [art] Store in in slot 0x4
5,443,937 UART: [art] Derive Key Pair
5,444,297 UART: [art] Store priv key in slot 0x5
5,457,729 UART: [art] Derive Key Pair - Done
5,472,429 UART: [art] Signing Cert with AUTHO
5,472,909 UART: RITY.KEYID = 7
5,488,067 UART: [art] Erasing AUTHORITY.KEYID = 7
5,488,832 UART: [art] PUB.X = A059A1D0D654177D2888F561F96A4DBAAAD716FD475B822EF91C151BBA20450BCEAE4A387F40E2CDBB969517180DEB99
5,495,610 UART: [art] PUB.Y = DF5FA860DD3129A5D5ABF388936E0C43B793B4DF6D29E3061C52B89F38E6B02725CAAC09E875C1FEDD25125B46637A0F
5,502,560 UART: [art] SIG.R = 022E0A9753EEF17394542E42AF295BEE05EB6CDB0D5FBD740D689D79908616CA99AF8D84124113E97B3B7E80D6A6CC8D
5,509,325 UART: [art] SIG.S = 68B1D4BBE6B191429ACEC7CE796ABD4EACDC5C0B7201EE95BF5FBA5CA496F971D882B5315947DB7BB4A30ED91EBCF744
5,533,135 UART: Caliptra RT
5,533,480 UART: [state] CFI Enabled
5,641,878 UART: [rt] RT listening for mailbox commands...
5,642,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,765,586 UART: [rt]cmd =0x41544d4e, len=14344
6,417,714 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,663 UART: [kat] SHA2-256
903,603 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,111 UART: [cold-reset] ++
1,172,629 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 ready_for_fw is high
1,176,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,233 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,898 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,343 >>> mbox cmd response: success
3,318,503 UART: [afmc] ++
3,318,671 UART: [afmc] CDI.KEYID = 6
3,319,033 UART: [afmc] SUBJECT.KEYID = 7
3,319,458 UART: [afmc] AUTHORITY.KEYID = 5
3,355,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,239 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,948 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,840 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,551 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,568 UART: [afmc] --
3,398,544 UART: [cold-reset] --
3,399,374 UART: [state] Locking Datavault
3,400,311 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,915 UART: [state] Locking ICCM
3,401,399 UART: [exit] Launching FMC @ 0x40000130
3,406,728 UART:
3,406,744 UART: Running Caliptra FMC ...
3,407,152 UART:
3,407,206 UART: [state] CFI Enabled
3,417,888 UART: [fht] FMC Alias Private Key: 7
3,526,384 UART: [art] Extend RT PCRs Done
3,526,812 UART: [art] Lock RT PCRs Done
3,528,384 UART: [art] Populate DV Done
3,536,446 UART: [fht] FMC Alias Private Key: 7
3,537,478 UART: [art] Derive CDI
3,537,758 UART: [art] Store in in slot 0x4
3,623,819 UART: [art] Derive Key Pair
3,624,179 UART: [art] Store priv key in slot 0x5
3,637,609 UART: [art] Derive Key Pair - Done
3,652,149 UART: [art] Signing Cert with AUTHO
3,652,629 UART: RITY.KEYID = 7
3,667,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,084 UART: [art] PUB.X = A6D07CBAB6DD91E40437BA975295B940A591785FEE091267992AFA04DFB8B4C9BD287A6A55832D4702C64CB9222C9A02
3,674,845 UART: [art] PUB.Y = 5966999ECEC5667E504A8413F245BABAB5F64AEABC75054BB077E536B215E1CFFD27C288CB56A8CB529F9CD7B6A217AA
3,681,810 UART: [art] SIG.R = DE7FA72CF81AB2D60B30E3E71FE33C67138640CF6A1289A2CCB7CA79227ED7DF68633B11EDCBAE10CF34299DD95C1202
3,688,592 UART: [art] SIG.S = C8C9B21277AC42EA672C4A3B038A2FFF35C0F2F2C47C351D09E89093B326692D6A5585C0027598D30CBA08DB1C76585F
3,712,804 UART: Caliptra RT
3,713,057 UART: [state] CFI Enabled
3,820,984 UART: [rt] RT listening for mailbox commands...
3,821,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,832 UART: [rt]cmd =0x41544d4e, len=14344
4,587,338 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,939 ready_for_fw is high
1,060,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,489 >>> mbox cmd response: success
3,229,676 UART:
3,229,692 UART: Running Caliptra FMC ...
3,230,100 UART:
3,230,154 UART: [state] CFI Enabled
3,240,538 UART: [fht] FMC Alias Private Key: 7
3,348,404 UART: [art] Extend RT PCRs Done
3,348,832 UART: [art] Lock RT PCRs Done
3,350,538 UART: [art] Populate DV Done
3,359,016 UART: [fht] FMC Alias Private Key: 7
3,360,132 UART: [art] Derive CDI
3,360,412 UART: [art] Store in in slot 0x4
3,446,039 UART: [art] Derive Key Pair
3,446,399 UART: [art] Store priv key in slot 0x5
3,459,283 UART: [art] Derive Key Pair - Done
3,474,037 UART: [art] Signing Cert with AUTHO
3,474,517 UART: RITY.KEYID = 7
3,489,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,184 UART: [art] PUB.X = E470EBE2CF980596120C575B2DADC71981F33752FA5679FF103F71EBCD37FEBC67A3036259E7F1222E3E02B8704FC9BD
3,496,952 UART: [art] PUB.Y = 2EEAE1C393DF5C2A26AE09D12974C017F4639CA928913FA7DB1BBFAA4FC6CB793E4EB8DDE424B06A106D165533B5A075
3,503,917 UART: [art] SIG.R = 0FF722D1A2FEDA0E4D79D5CEF0944DA472F15F14C40E63C274BE65F3DFE4081BB2499EC392B1FB5F802129D2F28BAFE6
3,510,695 UART: [art] SIG.S = 00971F5901B5E9D99D957D959C726B31C0408971C0A186572213DB66398ACA323960462AEF6E24DC5A693E9F8B7CB7E1
3,534,573 UART: Caliptra RT
3,534,826 UART: [state] CFI Enabled
3,642,020 UART: [rt] RT listening for mailbox commands...
3,642,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,922 UART: [rt]cmd =0x41544d4e, len=14344
4,405,379 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,387 UART: [kat] HMAC-384Kdf
923,153 UART: [kat] LMS
1,171,481 UART: [kat] --
1,172,366 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,529 UART: [idev] ++
1,175,697 UART: [idev] CDI.KEYID = 6
1,176,057 UART: [idev] SUBJECT.KEYID = 7
1,176,481 UART: [idev] UDS.KEYID = 0
1,176,826 ready_for_fw is high
1,176,826 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,060 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,398 UART: [ldev] ++
1,210,566 UART: [ldev] CDI.KEYID = 6
1,210,929 UART: [ldev] SUBJECT.KEYID = 5
1,211,355 UART: [ldev] AUTHORITY.KEYID = 7
1,211,818 UART: [ldev] FE.KEYID = 1
1,217,064 UART: [ldev] Erasing FE.KEYID = 1
1,243,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,700 UART: [ldev] --
1,282,975 UART: [fwproc] Wait for Commands...
1,283,577 UART: [fwproc] Recv command 0x46574c44
1,284,305 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,337 >>> mbox cmd response: success
3,318,415 UART: [afmc] ++
3,318,583 UART: [afmc] CDI.KEYID = 6
3,318,945 UART: [afmc] SUBJECT.KEYID = 7
3,319,370 UART: [afmc] AUTHORITY.KEYID = 5
3,354,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,125 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,834 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,726 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,437 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,332 UART: [afmc] --
3,398,318 UART: [cold-reset] --
3,399,262 UART: [state] Locking Datavault
3,400,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,905 UART: [state] Locking ICCM
3,401,421 UART: [exit] Launching FMC @ 0x40000130
3,406,750 UART:
3,406,766 UART: Running Caliptra FMC ...
3,407,174 UART:
3,407,317 UART: [state] CFI Enabled
3,418,301 UART: [fht] FMC Alias Private Key: 7
3,526,359 UART: [art] Extend RT PCRs Done
3,526,787 UART: [art] Lock RT PCRs Done
3,528,423 UART: [art] Populate DV Done
3,536,623 UART: [fht] FMC Alias Private Key: 7
3,537,569 UART: [art] Derive CDI
3,537,849 UART: [art] Store in in slot 0x4
3,623,554 UART: [art] Derive Key Pair
3,623,914 UART: [art] Store priv key in slot 0x5
3,637,160 UART: [art] Derive Key Pair - Done
3,651,684 UART: [art] Signing Cert with AUTHO
3,652,164 UART: RITY.KEYID = 7
3,667,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,181 UART: [art] PUB.X = A230E746F2531F25D078EC88D603FBDE6616D820847A742BFB21C12DFC9D1C8CDEE687C9C9DBC7886F481EBE3DEF87EA
3,674,968 UART: [art] PUB.Y = 6EC6513B4885A17F2A0E8AD1FD2FE7F754A553878D01EE8D809665DB6985B19D347E293DD2C4A08ED34656DF1FEF30A2
3,681,922 UART: [art] SIG.R = 35041F678011F98F64F4C51EF9C816768D8C0DD61D10A2E6FF0BF768AA5AE1DA9DBAC47D2A21CB8D168161BCE948CE34
3,688,699 UART: [art] SIG.S = 51779DD2A3BA52CD2C175906BA9C12827F3AB8EDB967C17235A8CF65D8BD87AC539AAA9F5417E5308DA2DF151A747BE2
3,712,317 UART: Caliptra RT
3,712,662 UART: [state] CFI Enabled
3,821,017 UART: [rt] RT listening for mailbox commands...
3,821,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,759 UART: [rt]cmd =0x41544d4e, len=14344
4,589,140 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,011 >>> mbox cmd response: success
3,235,950 UART:
3,235,966 UART: Running Caliptra FMC ...
3,236,374 UART:
3,236,517 UART: [state] CFI Enabled
3,247,463 UART: [fht] FMC Alias Private Key: 7
3,354,887 UART: [art] Extend RT PCRs Done
3,355,315 UART: [art] Lock RT PCRs Done
3,356,677 UART: [art] Populate DV Done
3,365,245 UART: [fht] FMC Alias Private Key: 7
3,366,383 UART: [art] Derive CDI
3,366,663 UART: [art] Store in in slot 0x4
3,452,758 UART: [art] Derive Key Pair
3,453,118 UART: [art] Store priv key in slot 0x5
3,465,970 UART: [art] Derive Key Pair - Done
3,480,938 UART: [art] Signing Cert with AUTHO
3,481,418 UART: RITY.KEYID = 7
3,496,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,679 UART: [art] PUB.X = 2E83F7F33AD2C3234D36739FD7D83AE88621068555DCAAD27425A7D4410FB684685700B25A5D0049F3CA792643A68147
3,504,393 UART: [art] PUB.Y = 333B7590AD266BEACA6DD7096021EFE6147D519914B9C2A777BA7013B11D4946F8BB31BEC1DD4A294E39E64C54250B3D
3,511,345 UART: [art] SIG.R = 68994FA77B08F3E3CA5CB18C755578F010851D708091A229C8C73DA6EAB3D9F7E200E20454385CC0D5DB3D8E0AC67FEC
3,518,094 UART: [art] SIG.S = 29861079ABA1E9D64AAD64F92D269483C0B57716DA6C43D8F0F3F38B79A4FC4481F650B372A2D24D5BAF894EA8B77B1C
3,541,241 UART: Caliptra RT
3,541,586 UART: [state] CFI Enabled
3,649,407 UART: [rt] RT listening for mailbox commands...
3,650,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,081 UART: [rt]cmd =0x41544d4e, len=14344
4,407,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
916,348 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,935 UART: [fht] FHT @ 0x50003400
1,173,599 UART: [idev] ++
1,173,767 UART: [idev] CDI.KEYID = 6
1,174,128 UART: [idev] SUBJECT.KEYID = 7
1,174,553 UART: [idev] UDS.KEYID = 0
1,174,899 ready_for_fw is high
1,174,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,663 UART: [idev] Erasing UDS.KEYID = 0
1,199,429 UART: [idev] Sha1 KeyId Algorithm
1,208,549 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,412 UART: [ldev] Erasing FE.KEYID = 1
1,242,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,320 UART: [ldev] --
1,281,650 UART: [fwproc] Wait for Commands...
1,282,403 UART: [fwproc] Recv command 0x46574c44
1,283,136 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,083 >>> mbox cmd response: success
3,326,214 UART: [afmc] ++
3,326,382 UART: [afmc] CDI.KEYID = 6
3,326,745 UART: [afmc] SUBJECT.KEYID = 7
3,327,171 UART: [afmc] AUTHORITY.KEYID = 5
3,363,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,742 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,452 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,342 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,053 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,763 UART: [afmc] --
3,406,869 UART: [cold-reset] --
3,407,801 UART: [state] Locking Datavault
3,408,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,598 UART: [state] Locking ICCM
3,410,104 UART: [exit] Launching FMC @ 0x40000130
3,415,433 UART:
3,415,449 UART: Running Caliptra FMC ...
3,415,857 UART:
3,415,911 UART: [state] CFI Enabled
3,426,457 UART: [fht] FMC Alias Private Key: 7
3,534,677 UART: [art] Extend RT PCRs Done
3,535,105 UART: [art] Lock RT PCRs Done
3,536,745 UART: [art] Populate DV Done
3,544,985 UART: [fht] FMC Alias Private Key: 7
3,545,949 UART: [art] Derive CDI
3,546,229 UART: [art] Store in in slot 0x4
3,632,012 UART: [art] Derive Key Pair
3,632,372 UART: [art] Store priv key in slot 0x5
3,645,624 UART: [art] Derive Key Pair - Done
3,660,322 UART: [art] Signing Cert with AUTHO
3,660,802 UART: RITY.KEYID = 7
3,676,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,987 UART: [art] PUB.X = 74C0F0C01C5AB69546523ABE0EEE62EDFA7F3D972F2D4F54F5868BE5D7993F455A65691D277F825C13D0564ABD993CEC
3,683,766 UART: [art] PUB.Y = 55AA1383E4B40C4CF406C6CD8F756E9761BF1D2341066ACE8FCAE7D05FCC7D10F2A3B50111AFA9DC8A6F61A722AB8862
3,690,722 UART: [art] SIG.R = F668E2E4840034F9E85495753D57C8A975C0709F647C44B3FF5225ED3F27745CCD363848AA9B0486B13F1B591B1607C4
3,697,458 UART: [art] SIG.S = 8C8DC06D881781E5CFF7D97E1F42353DD63B28A98C4CE4B38F3CCBC6BE1FB6EF64C035CF38DC0EDC1CF281980099DA73
3,720,990 UART: Caliptra RT
3,721,243 UART: [state] CFI Enabled
3,829,046 UART: [rt] RT listening for mailbox commands...
3,829,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,604 UART: [rt]cmd =0x41544d4e, len=14344
4,587,231 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,164 ready_for_fw is high
1,055,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,451 >>> mbox cmd response: success
3,234,390 UART:
3,234,406 UART: Running Caliptra FMC ...
3,234,814 UART:
3,234,868 UART: [state] CFI Enabled
3,245,362 UART: [fht] FMC Alias Private Key: 7
3,352,802 UART: [art] Extend RT PCRs Done
3,353,230 UART: [art] Lock RT PCRs Done
3,354,566 UART: [art] Populate DV Done
3,362,672 UART: [fht] FMC Alias Private Key: 7
3,363,792 UART: [art] Derive CDI
3,364,072 UART: [art] Store in in slot 0x4
3,449,597 UART: [art] Derive Key Pair
3,449,957 UART: [art] Store priv key in slot 0x5
3,462,647 UART: [art] Derive Key Pair - Done
3,477,472 UART: [art] Signing Cert with AUTHO
3,477,952 UART: RITY.KEYID = 7
3,493,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,117 UART: [art] PUB.X = 1E30BAA0D0F29A3BC30CB6E76DF6F4B955E144BF789D3A787EC7D09E5CF26675F6C57AEE1270D4ABA00D73D12EBEB3C8
3,500,905 UART: [art] PUB.Y = 39259B52A529756D1BCDAD7FDB414B630A27091EF98BA05AF97E183D11F9A8E5F6FB375129589A79ACE50087F5738F2C
3,507,833 UART: [art] SIG.R = 48ED47246A2C3B892A3E376BAEDF9B0D67986D421DB6701897CC4C00C3ABC764E9FCD20FBC2F3B7B72B8C2DBFC3D4739
3,514,595 UART: [art] SIG.S = A25FCDEC92A794537292322F5D2AC1835E8F68F848951EA0187531C4DC8E9B49F52DF49CF7B6409C6555AEC0682F9122
3,538,078 UART: Caliptra RT
3,538,331 UART: [state] CFI Enabled
3,646,227 UART: [rt] RT listening for mailbox commands...
3,646,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,795 UART: [rt]cmd =0x41544d4e, len=14344
4,412,069 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,887 UART: [state] LifecycleState = Unprovisioned
85,542 UART: [state] DebugLocked = No
86,040 UART: [state] WD Timer not started. Device not locked for debugging
87,343 UART: [kat] SHA2-256
890,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,550 UART: [kat] SHA2-256
901,490 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,208,896 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,515 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,326,146 >>> mbox cmd response: success
3,327,163 UART: [afmc] ++
3,327,331 UART: [afmc] CDI.KEYID = 6
3,327,694 UART: [afmc] SUBJECT.KEYID = 7
3,328,120 UART: [afmc] AUTHORITY.KEYID = 5
3,364,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,209 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,919 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,809 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,520 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,324 UART: [afmc] --
3,407,338 UART: [cold-reset] --
3,408,220 UART: [state] Locking Datavault
3,409,365 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,969 UART: [state] Locking ICCM
3,410,461 UART: [exit] Launching FMC @ 0x40000130
3,415,790 UART:
3,415,806 UART: Running Caliptra FMC ...
3,416,214 UART:
3,416,357 UART: [state] CFI Enabled
3,426,827 UART: [fht] FMC Alias Private Key: 7
3,535,019 UART: [art] Extend RT PCRs Done
3,535,447 UART: [art] Lock RT PCRs Done
3,537,481 UART: [art] Populate DV Done
3,545,641 UART: [fht] FMC Alias Private Key: 7
3,546,715 UART: [art] Derive CDI
3,546,995 UART: [art] Store in in slot 0x4
3,633,176 UART: [art] Derive Key Pair
3,633,536 UART: [art] Store priv key in slot 0x5
3,646,588 UART: [art] Derive Key Pair - Done
3,661,482 UART: [art] Signing Cert with AUTHO
3,661,962 UART: RITY.KEYID = 7
3,677,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,191 UART: [art] PUB.X = AD85C6FDF41451BC89EB49238F6163729C3F62D4FADFC4C28A84E3F15BC093D53DBFF98DF24EB37B71DB2B534B33736B
3,684,979 UART: [art] PUB.Y = 3FE77A813797E5BC5B316F81F2592D28E9698394DDED599BBE7CEF73EA2698E792F97318BE9A14BA2B88A36EAD5C0656
3,691,936 UART: [art] SIG.R = 0DB140A48858F69DB46E70C028701A8430C3174C2614F051AD4CEE57C3CCBA2F453E24200A4C8CF36F8B81C3F2ABE8E7
3,698,710 UART: [art] SIG.S = 8DF34819A2417308C1CF8EC6D984210F1F57F24DD8607DD098640D35AF7B01E72C72452FC31E7CBE2E4B1145D0913994
3,721,825 UART: Caliptra RT
3,722,170 UART: [state] CFI Enabled
3,830,672 UART: [rt] RT listening for mailbox commands...
3,831,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,514 UART: [rt]cmd =0x41544d4e, len=14344
4,599,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,065 ready_for_fw is high
1,056,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,769 >>> mbox cmd response: success
3,235,380 UART:
3,235,396 UART: Running Caliptra FMC ...
3,235,804 UART:
3,235,947 UART: [state] CFI Enabled
3,246,431 UART: [fht] FMC Alias Private Key: 7
3,355,103 UART: [art] Extend RT PCRs Done
3,355,531 UART: [art] Lock RT PCRs Done
3,357,177 UART: [art] Populate DV Done
3,365,383 UART: [fht] FMC Alias Private Key: 7
3,366,405 UART: [art] Derive CDI
3,366,685 UART: [art] Store in in slot 0x4
3,452,002 UART: [art] Derive Key Pair
3,452,362 UART: [art] Store priv key in slot 0x5
3,465,634 UART: [art] Derive Key Pair - Done
3,480,574 UART: [art] Signing Cert with AUTHO
3,481,054 UART: RITY.KEYID = 7
3,496,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,235 UART: [art] PUB.X = 7D5183C907D774A9895F5F7DE007A6762379F934123B8B746E3E5F21124BA5E1BFF90733CAF909515B44BAC8F2F974D7
3,503,993 UART: [art] PUB.Y = EDE0164E6ABBBF17D53B895645A7F8DABBE4FC172622DC84EBA47C63A54B2D3070B713CE445BB83C6726AA07A0926358
3,510,954 UART: [art] SIG.R = 2E3B8D9D40BD3C0FE558F4BA0F32FBF753DBBCC83634FA8590C7B21F2E487951E3877A65791975A6026BCDCA65763B8C
3,517,727 UART: [art] SIG.S = FB1C2620F684B9EE27A8DC0E4D0AE221758EE57A4BF5DDFCAA0B6EBB6DD9F34317D3EF35407482C3C093566A93BF94F9
3,541,317 UART: Caliptra RT
3,541,662 UART: [state] CFI Enabled
3,649,540 UART: [rt] RT listening for mailbox commands...
3,650,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,248 UART: [rt]cmd =0x41544d4e, len=14344
4,425,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,353 UART: [cold-reset] ++
1,476,901 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 ready_for_fw is high
1,481,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,414 UART: [idev] --
1,514,485 UART: [ldev] ++
1,514,653 UART: [ldev] CDI.KEYID = 6
1,515,016 UART: [ldev] SUBJECT.KEYID = 5
1,515,442 UART: [ldev] AUTHORITY.KEYID = 7
1,515,905 UART: [ldev] FE.KEYID = 1
1,520,643 UART: [ldev] Erasing FE.KEYID = 1
1,545,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,296 UART: [ldev] --
1,584,759 UART: [fwproc] Waiting for Commands...
1,585,508 UART: [fwproc] Received command 0x46574c44
1,586,299 UART: [fwproc] Received Image of size 114332 bytes
5,118,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,146,792 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,176,144 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,311,929 >>> mbox cmd response: success
5,313,163 UART: [afmc] ++
5,313,331 UART: [afmc] CDI.KEYID = 6
5,313,693 UART: [afmc] SUBJECT.KEYID = 7
5,314,118 UART: [afmc] AUTHORITY.KEYID = 5
5,349,060 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,365,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,366,134 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,371,843 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,377,735 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,383,436 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,391,172 UART: [afmc] --
5,392,240 UART: [cold-reset] --
5,393,098 UART: [state] Locking Datavault
5,394,125 UART: [state] Locking PCR0, PCR1 and PCR31
5,394,729 UART: [state] Locking ICCM
5,395,149 UART: [exit] Launching FMC @ 0x40000130
5,400,478 UART:
5,400,494 UART: Running Caliptra FMC ...
5,400,902 UART:
5,400,956 UART: [state] CFI Enabled
5,411,494 UART: [fht] FMC Alias Private Key: 7
5,518,836 UART: [art] Extend RT PCRs Done
5,519,264 UART: [art] Lock RT PCRs Done
5,520,818 UART: [art] Populate DV Done
5,528,740 UART: [fht] FMC Alias Private Key: 7
5,529,702 UART: [art] Derive CDI
5,529,982 UART: [art] Store in in slot 0x4
5,615,531 UART: [art] Derive Key Pair
5,615,891 UART: [art] Store priv key in slot 0x5
5,628,673 UART: [art] Derive Key Pair - Done
5,643,559 UART: [art] Signing Cert with AUTHO
5,644,039 UART: RITY.KEYID = 7
5,659,193 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,958 UART: [art] PUB.X = 05D128E629D25636B0EBD9BF74838AA787383FA88AD60808223238F3BB4A54602396D15F7747B3ADCAF0FA3A4D42F50F
5,666,720 UART: [art] PUB.Y = CA105189FA16A2E16C26666BA41E77F585DE3ECC1FA7148C2A6338D6294B784C1B21441D5531796F4897DC790E6288F8
5,673,665 UART: [art] SIG.R = E96AE80A64D082C0FA3C1D131A4A17440B757F20D91577DF0422F89A2108100C2441690C4656ABDD24917556134588B0
5,680,407 UART: [art] SIG.S = 7CE48B6F81F4806BBC38E253F7CD5A06D6229B3A80E229247B565F9C4102D92144899375513815FA16624EBAB7C91B97
5,704,328 UART: Caliptra RT
5,704,581 UART: [state] CFI Enabled
5,812,528 UART: [rt] RT listening for mailbox commands...
5,813,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,358 UART: [rt]cmd =0x41544d4e, len=14344
6,578,307 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,352,752 >>> mbox cmd response: success
5,414,651 UART:
5,414,667 UART: Running Caliptra FMC ...
5,415,075 UART:
5,415,129 UART: [state] CFI Enabled
5,425,517 UART: [fht] FMC Alias Private Key: 7
5,533,187 UART: [art] Extend RT PCRs Done
5,533,615 UART: [art] Lock RT PCRs Done
5,535,037 UART: [art] Populate DV Done
5,543,231 UART: [fht] FMC Alias Private Key: 7
5,544,363 UART: [art] Derive CDI
5,544,643 UART: [art] Store in in slot 0x4
5,630,422 UART: [art] Derive Key Pair
5,630,782 UART: [art] Store priv key in slot 0x5
5,644,028 UART: [art] Derive Key Pair - Done
5,658,542 UART: [art] Signing Cert with AUTHO
5,659,022 UART: RITY.KEYID = 7
5,674,262 UART: [art] Erasing AUTHORITY.KEYID = 7
5,675,027 UART: [art] PUB.X = E9F039E8C49407AF7E1045540B788464BFB849ADF0F8255F24A7B9D86E59AB03050635D8A6F0BBCA31522821A2FAACE9
5,681,790 UART: [art] PUB.Y = 0EEE26E47063407ED6E6687E2215B2FE37F9515E656C9AC052939DBD92C318D198046FE12D157F787519E02AC348DC8A
5,688,734 UART: [art] SIG.R = 48BF4DDF0A08E7EB80B2C3DA31ED8B1F5688E1128524B3EE2D2CD9524A07DD0B4AEA7FDBDD9F665D74B94C4144018C2E
5,695,511 UART: [art] SIG.S = 4D4B3A3F51A2B006E1D985AA6B7962B54202DE4D479757FA2DCAE8C096A2827F65F785F1829A08455789B005864D215A
5,719,406 UART: Caliptra RT
5,719,659 UART: [state] CFI Enabled
5,827,919 UART: [rt] RT listening for mailbox commands...
5,828,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,951,653 UART: [rt]cmd =0x41544d4e, len=14344
6,596,147 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,734 UART: [kat] SHA2-256
881,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,780 UART: [kat] ++
885,932 UART: [kat] sha1
890,158 UART: [kat] SHA2-256
892,096 UART: [kat] SHA2-384
894,891 UART: [kat] SHA2-512-ACC
896,792 UART: [kat] ECC-384
902,211 UART: [kat] HMAC-384Kdf
906,955 UART: [kat] LMS
1,475,151 UART: [kat] --
1,475,762 UART: [cold-reset] ++
1,476,132 UART: [fht] Storing FHT @ 0x50003400
1,478,961 UART: [idev] ++
1,479,129 UART: [idev] CDI.KEYID = 6
1,479,489 UART: [idev] SUBJECT.KEYID = 7
1,479,913 UART: [idev] UDS.KEYID = 0
1,480,258 ready_for_fw is high
1,480,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,899 UART: [idev] Erasing UDS.KEYID = 0
1,504,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,641 UART: [idev] --
1,513,556 UART: [ldev] ++
1,513,724 UART: [ldev] CDI.KEYID = 6
1,514,087 UART: [ldev] SUBJECT.KEYID = 5
1,514,513 UART: [ldev] AUTHORITY.KEYID = 7
1,514,976 UART: [ldev] FE.KEYID = 1
1,519,754 UART: [ldev] Erasing FE.KEYID = 1
1,545,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,065 UART: [ldev] --
1,584,514 UART: [fwproc] Waiting for Commands...
1,585,319 UART: [fwproc] Received command 0x46574c44
1,586,110 UART: [fwproc] Received Image of size 114332 bytes
5,119,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,367 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,719 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,313,494 >>> mbox cmd response: success
5,314,580 UART: [afmc] ++
5,314,748 UART: [afmc] CDI.KEYID = 6
5,315,110 UART: [afmc] SUBJECT.KEYID = 7
5,315,535 UART: [afmc] AUTHORITY.KEYID = 5
5,350,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,366,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,367,647 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,356 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,248 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,384,949 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,392,831 UART: [afmc] --
5,393,939 UART: [cold-reset] --
5,395,105 UART: [state] Locking Datavault
5,396,224 UART: [state] Locking PCR0, PCR1 and PCR31
5,396,828 UART: [state] Locking ICCM
5,397,280 UART: [exit] Launching FMC @ 0x40000130
5,402,609 UART:
5,402,625 UART: Running Caliptra FMC ...
5,403,033 UART:
5,403,176 UART: [state] CFI Enabled
5,413,568 UART: [fht] FMC Alias Private Key: 7
5,521,122 UART: [art] Extend RT PCRs Done
5,521,550 UART: [art] Lock RT PCRs Done
5,523,028 UART: [art] Populate DV Done
5,531,434 UART: [fht] FMC Alias Private Key: 7
5,532,512 UART: [art] Derive CDI
5,532,792 UART: [art] Store in in slot 0x4
5,618,405 UART: [art] Derive Key Pair
5,618,765 UART: [art] Store priv key in slot 0x5
5,632,497 UART: [art] Derive Key Pair - Done
5,647,338 UART: [art] Signing Cert with AUTHO
5,647,818 UART: RITY.KEYID = 7
5,662,892 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,657 UART: [art] PUB.X = BF25485714000491F0F67E670AD5FB7139903500D8A6F633BB2C42F064D6C366634A26B226632D506DB69B39B93BC2DC
5,670,373 UART: [art] PUB.Y = AFC462030B9858E3E56260AFC96A0322DC523C20712C7A327F4FA71EEC415BDFF24B3EC7EEB0C7B0A5E34866F3BBBC63
5,677,332 UART: [art] SIG.R = 4005A484D88C45C5FD323C885A1F2E8C761A846175EF1071169D69734A9D884241C6594FECFD81868FF309385ACCB630
5,684,092 UART: [art] SIG.S = E8AF0EE8F78C554A13015EBF19B30424584D89F9F4F808D96D09F9652AE099BDF8194FD00D6014A24614F0E72348256A
5,709,131 UART: Caliptra RT
5,709,476 UART: [state] CFI Enabled
5,818,693 UART: [rt] RT listening for mailbox commands...
5,819,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,942,139 UART: [rt]cmd =0x41544d4e, len=14344
6,589,318 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 ready_for_fw is high
1,363,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,240,665 >>> mbox cmd response: success
5,302,140 UART:
5,302,156 UART: Running Caliptra FMC ...
5,302,564 UART:
5,302,707 UART: [state] CFI Enabled
5,313,101 UART: [fht] FMC Alias Private Key: 7
5,420,843 UART: [art] Extend RT PCRs Done
5,421,271 UART: [art] Lock RT PCRs Done
5,422,683 UART: [art] Populate DV Done
5,431,015 UART: [fht] FMC Alias Private Key: 7
5,432,123 UART: [art] Derive CDI
5,432,403 UART: [art] Store in in slot 0x4
5,517,972 UART: [art] Derive Key Pair
5,518,332 UART: [art] Store priv key in slot 0x5
5,531,244 UART: [art] Derive Key Pair - Done
5,546,105 UART: [art] Signing Cert with AUTHO
5,546,585 UART: RITY.KEYID = 7
5,561,539 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,304 UART: [art] PUB.X = 5C7A837B04B783495BD010906B9102AA57325352B70F79AC548C71E066B3B93BC53A2248B83719EDCE6793B77647732F
5,569,057 UART: [art] PUB.Y = DDE43D2790614DD0345DF1508A078B537BDE69762AE857774D76DFC808D5E2C574AD18301C4E88EC9789555C83D2DB15
5,576,003 UART: [art] SIG.R = BBE342CE98DD946331598DBB8999C2CCA1F2987CB13359E10707C761C4786CFD5C4B9D423DFE73774C3AB782FFCF992E
5,582,779 UART: [art] SIG.S = FE57DDDD40F18DA5BC9A4BABDA2B962A848E34A9BFEA88FA99B7D93F17D45BB080E2E75DDEC10AF3CB3D9F45C31FA3EA
5,606,961 UART: Caliptra RT
5,607,306 UART: [state] CFI Enabled
5,716,220 UART: [rt] RT listening for mailbox commands...
5,716,890 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,874 UART: [rt]cmd =0x41544d4e, len=14344
6,486,563 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
892,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,069 UART: [kat] ++
897,221 UART: [kat] sha1
901,391 UART: [kat] SHA2-256
903,331 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,658 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,399 UART: [cold-reset] ++
1,171,821 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,942 UART: [idev] SUBJECT.KEYID = 7
1,175,366 UART: [idev] UDS.KEYID = 0
1,175,711 ready_for_fw is high
1,175,711 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,859 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,210 UART: [fwproc] Wait for Commands...
1,281,830 UART: [fwproc] Recv command 0x46574c44
1,282,558 UART: [fwproc] Recv'd Img size: 114332 bytes
3,112,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,305,492 >>> mbox cmd response: success
3,306,744 UART: [afmc] ++
3,306,912 UART: [afmc] CDI.KEYID = 6
3,307,274 UART: [afmc] SUBJECT.KEYID = 7
3,307,699 UART: [afmc] AUTHORITY.KEYID = 5
3,342,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,182 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,891 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,783 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,494 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,411 UART: [afmc] --
3,386,407 UART: [cold-reset] --
3,386,961 UART: [state] Locking Datavault
3,388,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,826 UART: [state] Locking ICCM
3,389,264 UART: [exit] Launching FMC @ 0x40000130
3,394,593 UART:
3,394,609 UART: Running Caliptra FMC ...
3,395,017 UART:
3,395,071 UART: [state] CFI Enabled
3,405,627 UART: [fht] FMC Alias Private Key: 7
3,513,235 UART: [art] Extend RT PCRs Done
3,513,663 UART: [art] Lock RT PCRs Done
3,515,111 UART: [art] Populate DV Done
3,523,347 UART: [fht] FMC Alias Private Key: 7
3,524,501 UART: [art] Derive CDI
3,524,781 UART: [art] Store in in slot 0x4
3,610,226 UART: [art] Derive Key Pair
3,610,586 UART: [art] Store priv key in slot 0x5
3,623,192 UART: [art] Derive Key Pair - Done
3,637,710 UART: [art] Signing Cert with AUTHO
3,638,190 UART: RITY.KEYID = 7
3,653,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,081 UART: [art] PUB.X = 86850929F35650DFAB2B25402B77829AD8740A9CC3DBAC837D52D43138463278458CF9D65AE7350683197254C94989E6
3,660,830 UART: [art] PUB.Y = 480C75CBF75E61CF733E83A5D7C623FBC81F13B58B4E5C7F4685B54641340AF18A86AD8179A26E0360B52FECA37F14B6
3,667,779 UART: [art] SIG.R = 81356F852DEFCB634C54E111C4FC557062E3357EC8D4C5998F2C1F6105E140BF345F00E218929A10AE380B9041B52B68
3,674,519 UART: [art] SIG.S = 29E8F76AD27CFD78B0BD1B848A40AB909901CF4C25F680A68C2B3B7F4B5DE953BC38DDD297AD8602BAB6B9FA90610ADE
3,697,899 UART: Caliptra RT
3,698,152 UART: [state] CFI Enabled
3,806,356 UART: [rt] RT listening for mailbox commands...
3,807,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,156 UART: [rt]cmd =0x41544d4e, len=14344
4,576,931 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,169 ready_for_fw is high
1,060,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,632 >>> mbox cmd response: success
3,235,993 UART:
3,236,009 UART: Running Caliptra FMC ...
3,236,417 UART:
3,236,471 UART: [state] CFI Enabled
3,247,207 UART: [fht] FMC Alias Private Key: 7
3,355,067 UART: [art] Extend RT PCRs Done
3,355,495 UART: [art] Lock RT PCRs Done
3,357,159 UART: [art] Populate DV Done
3,365,351 UART: [fht] FMC Alias Private Key: 7
3,366,525 UART: [art] Derive CDI
3,366,805 UART: [art] Store in in slot 0x4
3,452,196 UART: [art] Derive Key Pair
3,452,556 UART: [art] Store priv key in slot 0x5
3,466,218 UART: [art] Derive Key Pair - Done
3,480,876 UART: [art] Signing Cert with AUTHO
3,481,356 UART: RITY.KEYID = 7
3,496,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,315 UART: [art] PUB.X = BD6875C9F1BE36CA1EAE8E505B004A50CCEDC726E1534A81912DA70E77B9866865D97EC18E1A6871A0FD62596DF64C31
3,504,070 UART: [art] PUB.Y = EF2665D2C3543B5C74D5DB85E6CC33F85233D5C7FCE76E79A038B4A2A520386D7D420B0E7FC3ADCD0C0D575BC3A0F9FA
3,511,028 UART: [art] SIG.R = 475EED433C8F8E486BC9843BC5E9EB2E6993389EEDBC8AA31E7F808CC121423F3C0ACD907457CED4CE5880E707B14CC5
3,517,808 UART: [art] SIG.S = 0350F5B93744B56162A692CD4A4C58EED55112F7A187A8DF81E889BDC9A5D705450CDFB2FCE09924E7FB10DBCC85CB61
3,542,008 UART: Caliptra RT
3,542,261 UART: [state] CFI Enabled
3,650,132 UART: [rt] RT listening for mailbox commands...
3,650,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,524 UART: [rt]cmd =0x41544d4e, len=14344
4,415,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
907,165 UART: [kat] SHA2-512-ACC
909,066 UART: [kat] ECC-384
918,831 UART: [kat] HMAC-384Kdf
923,507 UART: [kat] LMS
1,171,835 UART: [kat] --
1,172,820 UART: [cold-reset] ++
1,173,320 UART: [fht] FHT @ 0x50003400
1,175,941 UART: [idev] ++
1,176,109 UART: [idev] CDI.KEYID = 6
1,176,469 UART: [idev] SUBJECT.KEYID = 7
1,176,893 UART: [idev] UDS.KEYID = 0
1,177,238 ready_for_fw is high
1,177,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,865 UART: [idev] Erasing UDS.KEYID = 0
1,202,870 UART: [idev] Sha1 KeyId Algorithm
1,211,418 UART: [idev] --
1,212,658 UART: [ldev] ++
1,212,826 UART: [ldev] CDI.KEYID = 6
1,213,189 UART: [ldev] SUBJECT.KEYID = 5
1,213,615 UART: [ldev] AUTHORITY.KEYID = 7
1,214,078 UART: [ldev] FE.KEYID = 1
1,219,434 UART: [ldev] Erasing FE.KEYID = 1
1,246,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,214 UART: [ldev] --
1,285,547 UART: [fwproc] Wait for Commands...
1,286,347 UART: [fwproc] Recv command 0x46574c44
1,287,075 UART: [fwproc] Recv'd Img size: 114332 bytes
3,136,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,164,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,329,145 >>> mbox cmd response: success
3,330,155 UART: [afmc] ++
3,330,323 UART: [afmc] CDI.KEYID = 6
3,330,685 UART: [afmc] SUBJECT.KEYID = 7
3,331,110 UART: [afmc] AUTHORITY.KEYID = 5
3,367,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,861 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,570 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,462 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,402,173 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,409,870 UART: [afmc] --
3,410,816 UART: [cold-reset] --
3,411,548 UART: [state] Locking Datavault
3,412,633 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,237 UART: [state] Locking ICCM
3,413,737 UART: [exit] Launching FMC @ 0x40000130
3,419,066 UART:
3,419,082 UART: Running Caliptra FMC ...
3,419,490 UART:
3,419,633 UART: [state] CFI Enabled
3,430,193 UART: [fht] FMC Alias Private Key: 7
3,538,281 UART: [art] Extend RT PCRs Done
3,538,709 UART: [art] Lock RT PCRs Done
3,540,383 UART: [art] Populate DV Done
3,548,565 UART: [fht] FMC Alias Private Key: 7
3,549,609 UART: [art] Derive CDI
3,549,889 UART: [art] Store in in slot 0x4
3,635,638 UART: [art] Derive Key Pair
3,635,998 UART: [art] Store priv key in slot 0x5
3,649,412 UART: [art] Derive Key Pair - Done
3,664,024 UART: [art] Signing Cert with AUTHO
3,664,504 UART: RITY.KEYID = 7
3,679,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,253 UART: [art] PUB.X = 7DD5CF6CC5D50D7413B10116DB976EEB2F31BE186E2033006C328C7B46A23364EE8C2218AA609E8EABE8329FEDD66248
3,687,005 UART: [art] PUB.Y = 2A4412EDCE789F357370510ADBD44F986636AB6F63AFEFB9752404B92F5FC7B2A1954E25844C1C557E0C332F85A8FDBF
3,693,956 UART: [art] SIG.R = 52AA2BE3D58C7EC5FAD1E9499AA58B632A6C176D6A0080C335BAA85674C51B7055214127E02F9EACBAC18FA540A86C89
3,700,716 UART: [art] SIG.S = 460CB8509D5D4D2C8512C0B10E747C57AB828D1E320F6CF99160C46F621A5EC3464A457840A9FEB0458EB675086315E5
3,724,789 UART: Caliptra RT
3,725,134 UART: [state] CFI Enabled
3,832,791 UART: [rt] RT listening for mailbox commands...
3,833,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,399 UART: [rt]cmd =0x41544d4e, len=14344
4,611,149 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,040 ready_for_fw is high
1,061,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,319 >>> mbox cmd response: success
3,231,684 UART:
3,231,700 UART: Running Caliptra FMC ...
3,232,108 UART:
3,232,251 UART: [state] CFI Enabled
3,242,933 UART: [fht] FMC Alias Private Key: 7
3,350,989 UART: [art] Extend RT PCRs Done
3,351,417 UART: [art] Lock RT PCRs Done
3,352,927 UART: [art] Populate DV Done
3,361,061 UART: [fht] FMC Alias Private Key: 7
3,362,189 UART: [art] Derive CDI
3,362,469 UART: [art] Store in in slot 0x4
3,448,198 UART: [art] Derive Key Pair
3,448,558 UART: [art] Store priv key in slot 0x5
3,461,912 UART: [art] Derive Key Pair - Done
3,476,606 UART: [art] Signing Cert with AUTHO
3,477,086 UART: RITY.KEYID = 7
3,491,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,649 UART: [art] PUB.X = 74858BD6BA6F8E77B7225C67BE6878BF9489D44CE8324D0713492D37471BDAD9B72CE8969994550CD87763EF38312CF4
3,499,411 UART: [art] PUB.Y = 54527551C5D1E3ECC80EAB63F03266EB0689D65A6CD79DBAB1FC27B36C7425A47D01F55E4A6DDE25E6DBB8C197452EFA
3,506,370 UART: [art] SIG.R = 30BA2134048F0F533EDF09A22C89F393BB986932B652613E73738CF54AF17E965DBDCBA1DD07809AD3C4E886798AF32C
3,513,134 UART: [art] SIG.S = 4269EE570141C5142A418134E82D7233914B43BBDDCB2A3C6155B065256EFF4E2FD3D1AF613ABB1AE1073C22C87BCE0C
3,536,494 UART: Caliptra RT
3,536,839 UART: [state] CFI Enabled
3,644,550 UART: [rt] RT listening for mailbox commands...
3,645,220 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,300 UART: [rt]cmd =0x41544d4e, len=14344
4,410,353 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 ready_for_fw is high
1,173,911 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,199,343 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,382 UART: [ldev] ++
1,209,550 UART: [ldev] CDI.KEYID = 6
1,209,914 UART: [ldev] SUBJECT.KEYID = 5
1,210,341 UART: [ldev] AUTHORITY.KEYID = 7
1,210,804 UART: [ldev] FE.KEYID = 1
1,216,172 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,522 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,489 UART: [fwproc] Recv command 0x46574c44
1,283,222 UART: [fwproc] Recv'd Img size: 114332 bytes
3,115,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,308,802 >>> mbox cmd response: success
3,310,023 UART: [afmc] ++
3,310,191 UART: [afmc] CDI.KEYID = 6
3,310,554 UART: [afmc] SUBJECT.KEYID = 7
3,310,980 UART: [afmc] AUTHORITY.KEYID = 5
3,346,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,105 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,815 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,705 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,416 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,388 UART: [afmc] --
3,390,332 UART: [cold-reset] --
3,391,186 UART: [state] Locking Datavault
3,392,505 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,109 UART: [state] Locking ICCM
3,393,645 UART: [exit] Launching FMC @ 0x40000130
3,398,974 UART:
3,398,990 UART: Running Caliptra FMC ...
3,399,398 UART:
3,399,452 UART: [state] CFI Enabled
3,409,920 UART: [fht] FMC Alias Private Key: 7
3,517,692 UART: [art] Extend RT PCRs Done
3,518,120 UART: [art] Lock RT PCRs Done
3,519,266 UART: [art] Populate DV Done
3,527,756 UART: [fht] FMC Alias Private Key: 7
3,528,772 UART: [art] Derive CDI
3,529,052 UART: [art] Store in in slot 0x4
3,615,119 UART: [art] Derive Key Pair
3,615,479 UART: [art] Store priv key in slot 0x5
3,629,121 UART: [art] Derive Key Pair - Done
3,643,724 UART: [art] Signing Cert with AUTHO
3,644,204 UART: RITY.KEYID = 7
3,659,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,305 UART: [art] PUB.X = 5E8AEA1A91C010353BB9E791200B16C939B0CEB5A4EDA4DCC4E09E0BD8BE69240EF72A23828B30AF1F9423E6646F7988
3,667,078 UART: [art] PUB.Y = 364C19503EAABB9E866D0D6DD8F772B1132B3E65C5E004291480403CF3476FF66E5D011218128DAB3C59778ACEFCBE6C
3,674,027 UART: [art] SIG.R = DF6AE20A2C72F3B2D158EFFACFAE84B494F223F53926CBA58735484599A087B9BCE672DD64DD259DE2167CF7EB22C44C
3,680,812 UART: [art] SIG.S = 09B7316BD754ADDDA6C963FB68652795E359743E1C1B84E5B30CB74A3D41BDB7DAF7838D867A23F413498BB92097AD4A
3,705,051 UART: Caliptra RT
3,705,304 UART: [state] CFI Enabled
3,812,726 UART: [rt] RT listening for mailbox commands...
3,813,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,608 UART: [rt]cmd =0x41544d4e, len=14344
4,578,403 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,282 ready_for_fw is high
1,056,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,238 >>> mbox cmd response: success
3,234,111 UART:
3,234,127 UART: Running Caliptra FMC ...
3,234,535 UART:
3,234,589 UART: [state] CFI Enabled
3,245,315 UART: [fht] FMC Alias Private Key: 7
3,353,187 UART: [art] Extend RT PCRs Done
3,353,615 UART: [art] Lock RT PCRs Done
3,355,277 UART: [art] Populate DV Done
3,363,551 UART: [fht] FMC Alias Private Key: 7
3,364,577 UART: [art] Derive CDI
3,364,857 UART: [art] Store in in slot 0x4
3,450,972 UART: [art] Derive Key Pair
3,451,332 UART: [art] Store priv key in slot 0x5
3,464,906 UART: [art] Derive Key Pair - Done
3,479,998 UART: [art] Signing Cert with AUTHO
3,480,478 UART: RITY.KEYID = 7
3,495,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,247 UART: [art] PUB.X = 0A0B0F3A64E013AED1EEC3BFB57C367D062DE9A38061C8E838C5809BADF59B6BDE86E089DC978D73B12EE4499D26922F
3,503,021 UART: [art] PUB.Y = 447B34692391F39AE383EC5ABCB40357CAF957A6332B2BC344B0AC6AA63312CF198FE24DAD570A2FEB03168BA210CF12
3,509,974 UART: [art] SIG.R = DECD7CC9E4C611170485D72B3F32CD9A32545BA63EEBD3DDAB0CAC84D51539FEB6C65265F69724A462295BEB9A095148
3,516,749 UART: [art] SIG.S = 4390AD4772CDD871DDF6E1810623A80D8412C6F095A06CDE82F846F3FACB6799FD513D66A236DDE293C2E7E75827DA84
3,540,670 UART: Caliptra RT
3,540,923 UART: [state] CFI Enabled
3,649,013 UART: [rt] RT listening for mailbox commands...
3,649,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,627 UART: [rt]cmd =0x41544d4e, len=14344
4,418,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 ready_for_fw is high
1,174,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,334 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,478 UART: [idev] --
1,208,465 UART: [ldev] ++
1,208,633 UART: [ldev] CDI.KEYID = 6
1,208,997 UART: [ldev] SUBJECT.KEYID = 5
1,209,424 UART: [ldev] AUTHORITY.KEYID = 7
1,209,887 UART: [ldev] FE.KEYID = 1
1,215,261 UART: [ldev] Erasing FE.KEYID = 1
1,241,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,280,971 UART: [fwproc] Wait for Commands...
1,281,730 UART: [fwproc] Recv command 0x46574c44
1,282,463 UART: [fwproc] Recv'd Img size: 114332 bytes
3,120,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,322 >>> mbox cmd response: success
3,315,359 UART: [afmc] ++
3,315,527 UART: [afmc] CDI.KEYID = 6
3,315,890 UART: [afmc] SUBJECT.KEYID = 7
3,316,316 UART: [afmc] AUTHORITY.KEYID = 5
3,352,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,431 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,141 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,031 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,742 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,656 UART: [afmc] --
3,396,614 UART: [cold-reset] --
3,397,260 UART: [state] Locking Datavault
3,398,331 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,935 UART: [state] Locking ICCM
3,399,501 UART: [exit] Launching FMC @ 0x40000130
3,404,830 UART:
3,404,846 UART: Running Caliptra FMC ...
3,405,254 UART:
3,405,397 UART: [state] CFI Enabled
3,415,765 UART: [fht] FMC Alias Private Key: 7
3,524,139 UART: [art] Extend RT PCRs Done
3,524,567 UART: [art] Lock RT PCRs Done
3,526,171 UART: [art] Populate DV Done
3,534,553 UART: [fht] FMC Alias Private Key: 7
3,535,733 UART: [art] Derive CDI
3,536,013 UART: [art] Store in in slot 0x4
3,622,024 UART: [art] Derive Key Pair
3,622,384 UART: [art] Store priv key in slot 0x5
3,635,990 UART: [art] Derive Key Pair - Done
3,650,770 UART: [art] Signing Cert with AUTHO
3,651,250 UART: RITY.KEYID = 7
3,666,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,159 UART: [art] PUB.X = A4EEA44203CD5883C5FC6355A42162D4E034E1DD93AA0B531350B6257E9BD08C462DC858310D966B311DA0755935036B
3,673,915 UART: [art] PUB.Y = F590033BFD1610DF059CC8137ADADE8C67C1A977B666D99AF3189D133A7C8468980699E1B47A94C5E18C5C3380A06C72
3,680,858 UART: [art] SIG.R = 9FDDD631C9E44FE306DA67F5094C0606C03618F760AA00F778C829B9BA5FC846A0838D724FA1140F98B7B1F139D6B8AD
3,687,599 UART: [art] SIG.S = 6DDD92C07CD6A21883A971735EC131633740C20FDF341BF3DE6D2A8E58C5F29055BF471A50D6AE3C862ABDE552865587
3,711,677 UART: Caliptra RT
3,712,022 UART: [state] CFI Enabled
3,819,796 UART: [rt] RT listening for mailbox commands...
3,820,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,586 UART: [rt]cmd =0x41544d4e, len=14344
4,593,620 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 ready_for_fw is high
1,056,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,977 >>> mbox cmd response: success
3,225,264 UART:
3,225,280 UART: Running Caliptra FMC ...
3,225,688 UART:
3,225,831 UART: [state] CFI Enabled
3,236,047 UART: [fht] FMC Alias Private Key: 7
3,343,601 UART: [art] Extend RT PCRs Done
3,344,029 UART: [art] Lock RT PCRs Done
3,345,769 UART: [art] Populate DV Done
3,353,779 UART: [fht] FMC Alias Private Key: 7
3,354,769 UART: [art] Derive CDI
3,355,049 UART: [art] Store in in slot 0x4
3,441,016 UART: [art] Derive Key Pair
3,441,376 UART: [art] Store priv key in slot 0x5
3,455,218 UART: [art] Derive Key Pair - Done
3,469,739 UART: [art] Signing Cert with AUTHO
3,470,219 UART: RITY.KEYID = 7
3,485,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,918 UART: [art] PUB.X = 680C977A9064DBF67EAF50276144DE29C66BB977B43DB7D62B7BE436614CFC4148B49AFEDA0033FDEAC6F09DFED4F681
3,492,681 UART: [art] PUB.Y = 4901995F5DB408DFD334AA8E4D9E41B982626D12BC8227A11507555D154B7C6E080AFC4956ACC9EC78DC591E409340BE
3,499,620 UART: [art] SIG.R = 3BC4C647BB2665A2D5DDEC38D64D48AF508524FA49F75966D7F81662E268F2E9C2235905350628616AC9A7E7BBDC105A
3,506,388 UART: [art] SIG.S = F2880F601B315726A6664D51491B2C62C1149E7146D3E874E783BE61582060E5A9F1B637CC9FFB5EB1F0F2445FBDD2C2
3,530,494 UART: Caliptra RT
3,530,839 UART: [state] CFI Enabled
3,638,547 UART: [rt] RT listening for mailbox commands...
3,639,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,327 UART: [rt]cmd =0x41544d4e, len=14344
4,406,581 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,097 UART: [kat] SHA2-256
892,035 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,192 UART: [kat] HMAC-384Kdf
906,722 UART: [kat] LMS
1,474,918 UART: [kat] --
1,475,809 UART: [cold-reset] ++
1,476,297 UART: [fht] Storing FHT @ 0x50003400
1,479,088 UART: [idev] ++
1,479,256 UART: [idev] CDI.KEYID = 6
1,479,616 UART: [idev] SUBJECT.KEYID = 7
1,480,040 UART: [idev] UDS.KEYID = 0
1,480,385 ready_for_fw is high
1,480,385 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,994 UART: [idev] Erasing UDS.KEYID = 0
1,504,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,000 UART: [idev] --
1,514,241 UART: [ldev] ++
1,514,409 UART: [ldev] CDI.KEYID = 6
1,514,772 UART: [ldev] SUBJECT.KEYID = 5
1,515,198 UART: [ldev] AUTHORITY.KEYID = 7
1,515,661 UART: [ldev] FE.KEYID = 1
1,520,695 UART: [ldev] Erasing FE.KEYID = 1
1,546,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,736 UART: [ldev] --
1,585,159 UART: [fwproc] Waiting for Commands...
1,585,982 UART: [fwproc] Received command 0x46574c44
1,586,773 UART: [fwproc] Received Image of size 114332 bytes
2,886,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,802 >>> mbox cmd response: success
3,080,056 UART: [afmc] ++
3,080,224 UART: [afmc] CDI.KEYID = 6
3,080,586 UART: [afmc] SUBJECT.KEYID = 7
3,081,011 UART: [afmc] AUTHORITY.KEYID = 5
3,116,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,515 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,205 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,082 UART: [afmc] --
3,159,138 UART: [cold-reset] --
3,160,040 UART: [state] Locking Datavault
3,160,849 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,453 UART: [state] Locking ICCM
3,162,099 UART: [exit] Launching FMC @ 0x40000130
3,167,428 UART:
3,167,444 UART: Running Caliptra FMC ...
3,167,852 UART:
3,167,906 UART: [state] CFI Enabled
3,178,349 UART: [fht] FMC Alias Private Key: 7
3,286,352 UART: [art] Extend RT PCRs Done
3,286,780 UART: [art] Lock RT PCRs Done
3,288,178 UART: [art] Populate DV Done
3,296,491 UART: [fht] FMC Alias Private Key: 7
3,297,519 UART: [art] Derive CDI
3,297,799 UART: [art] Store in in slot 0x4
3,383,884 UART: [art] Derive Key Pair
3,384,244 UART: [art] Store priv key in slot 0x5
3,397,516 UART: [art] Derive Key Pair - Done
3,412,417 UART: [art] Signing Cert with AUTHO
3,412,897 UART: RITY.KEYID = 7
3,428,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,836 UART: [art] PUB.X = 6F954C8D32A5B098E5CCC5989182F1F4BAA16BD1189B7A13A73D2ACC51D1006B83B0D8B8CD8ECDFEA6A6CF89FC1C8D23
3,435,608 UART: [art] PUB.Y = 28E14BACA03CB4F1C40DF8A59FE8762170284A141BF3EF1CCE1321FF33E4213113A6428B597A4B942B00CF75213933D2
3,442,537 UART: [art] SIG.R = BE404CCB6F5E9850623F7FE177DF13519C33B6215ADA969516A39AEAA5A30DE0F1BA814F64C31FDCBBB58762606D8EC5
3,449,320 UART: [art] SIG.S = E068DBD000FD4DF14FD032497CBDC071A3628D11846A63BD007CAE04C67CD14E65FC3ACCB274ADC85BB12DCDC2F7BFF2
3,472,570 UART: Caliptra RT
3,472,823 UART: [state] CFI Enabled
3,581,601 UART: [rt] RT listening for mailbox commands...
3,582,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,247 UART: [rt]cmd =0x41544d4e, len=14344
4,015,494 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,809 ready_for_fw is high
1,361,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,200 >>> mbox cmd response: success
2,988,886 UART:
2,988,902 UART: Running Caliptra FMC ...
2,989,310 UART:
2,989,364 UART: [state] CFI Enabled
2,999,405 UART: [fht] FMC Alias Private Key: 7
3,107,168 UART: [art] Extend RT PCRs Done
3,107,596 UART: [art] Lock RT PCRs Done
3,108,818 UART: [art] Populate DV Done
3,116,871 UART: [fht] FMC Alias Private Key: 7
3,117,999 UART: [art] Derive CDI
3,118,279 UART: [art] Store in in slot 0x4
3,203,782 UART: [art] Derive Key Pair
3,204,142 UART: [art] Store priv key in slot 0x5
3,217,174 UART: [art] Derive Key Pair - Done
3,231,785 UART: [art] Signing Cert with AUTHO
3,232,265 UART: RITY.KEYID = 7
3,247,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,456 UART: [art] PUB.X = EF1F9FB59B160B82F637683C74260E7EB0CF1351B77C5FB7436380A6FAC052A50AFDD80E1E0B6246190105242099D2AC
3,255,209 UART: [art] PUB.Y = CEEB3D22330F9A361AD5A0FF877CBA916BCE0829758AC1CFEAF9D8EFA14BEF6EDDC2895577173B1ADD28E072CE99FBE3
3,262,183 UART: [art] SIG.R = 5409E01B059F602687D8DBAD0F51118626F7CA1561278E69001A6E20764540598B8C00CA71167B851357659B0BF1750E
3,268,880 UART: [art] SIG.S = A1A313080DDDEA8BB3DDC13BE3C18AC39D22B57271B12975BD497DFF5B20F1A24C0B948643C67799F8FE129AB231D906
3,292,467 UART: Caliptra RT
3,292,720 UART: [state] CFI Enabled
3,400,883 UART: [rt] RT listening for mailbox commands...
3,401,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,567 UART: [rt]cmd =0x41544d4e, len=14344
3,834,832 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,443 UART: [kat] SHA2-512-ACC
897,344 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,649 UART: [kat] LMS
1,475,845 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,477,050 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 ready_for_fw is high
1,481,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,067 UART: [idev] --
1,514,910 UART: [ldev] ++
1,515,078 UART: [ldev] CDI.KEYID = 6
1,515,441 UART: [ldev] SUBJECT.KEYID = 5
1,515,867 UART: [ldev] AUTHORITY.KEYID = 7
1,516,330 UART: [ldev] FE.KEYID = 1
1,521,484 UART: [ldev] Erasing FE.KEYID = 1
1,547,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,191 UART: [ldev] --
1,586,502 UART: [fwproc] Waiting for Commands...
1,587,291 UART: [fwproc] Received command 0x46574c44
1,588,082 UART: [fwproc] Received Image of size 114332 bytes
2,885,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,377 >>> mbox cmd response: success
3,078,407 UART: [afmc] ++
3,078,575 UART: [afmc] CDI.KEYID = 6
3,078,937 UART: [afmc] SUBJECT.KEYID = 7
3,079,362 UART: [afmc] AUTHORITY.KEYID = 5
3,114,173 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,978 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,668 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,513 UART: [afmc] --
3,157,597 UART: [cold-reset] --
3,158,417 UART: [state] Locking Datavault
3,159,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,132 UART: [state] Locking ICCM
3,160,628 UART: [exit] Launching FMC @ 0x40000130
3,165,957 UART:
3,165,973 UART: Running Caliptra FMC ...
3,166,381 UART:
3,166,524 UART: [state] CFI Enabled
3,177,139 UART: [fht] FMC Alias Private Key: 7
3,284,670 UART: [art] Extend RT PCRs Done
3,285,098 UART: [art] Lock RT PCRs Done
3,286,794 UART: [art] Populate DV Done
3,294,873 UART: [fht] FMC Alias Private Key: 7
3,295,957 UART: [art] Derive CDI
3,296,237 UART: [art] Store in in slot 0x4
3,382,070 UART: [art] Derive Key Pair
3,382,430 UART: [art] Store priv key in slot 0x5
3,395,266 UART: [art] Derive Key Pair - Done
3,409,850 UART: [art] Signing Cert with AUTHO
3,410,330 UART: RITY.KEYID = 7
3,425,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,301 UART: [art] PUB.X = 537DC17454D8FB5BA862615D757265022A22C565DE1BC53C483C53B6CF24A61DE644B1FF4156038944B67EAAB74E21DC
3,433,069 UART: [art] PUB.Y = 2558FFCA31AF263FA4BDA6E1A9CA0A37419F70910EA3DCB576E3BCA5B851434F7B30AAB56035EB6E4EFABABFBB47E6B2
3,440,043 UART: [art] SIG.R = AD2251B6F7A89C657D76B5254C73C15A2BF3516ED98F167AB2B65BFB22DA19729A6499567C55431B83C4F5869636074A
3,446,808 UART: [art] SIG.S = F14C6EDBF3C9132100F919244556029D20BC31C8AA86672264B44920D371E03728E1782EE9611D85260B287607888A31
3,470,220 UART: Caliptra RT
3,470,565 UART: [state] CFI Enabled
3,578,591 UART: [rt] RT listening for mailbox commands...
3,579,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,241 UART: [rt]cmd =0x41544d4e, len=14344
4,011,846 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,916 ready_for_fw is high
1,362,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,323 >>> mbox cmd response: success
2,991,247 UART:
2,991,263 UART: Running Caliptra FMC ...
2,991,671 UART:
2,991,814 UART: [state] CFI Enabled
3,002,535 UART: [fht] FMC Alias Private Key: 7
3,111,262 UART: [art] Extend RT PCRs Done
3,111,690 UART: [art] Lock RT PCRs Done
3,113,196 UART: [art] Populate DV Done
3,121,641 UART: [fht] FMC Alias Private Key: 7
3,122,751 UART: [art] Derive CDI
3,123,031 UART: [art] Store in in slot 0x4
3,208,574 UART: [art] Derive Key Pair
3,208,934 UART: [art] Store priv key in slot 0x5
3,222,126 UART: [art] Derive Key Pair - Done
3,236,859 UART: [art] Signing Cert with AUTHO
3,237,339 UART: RITY.KEYID = 7
3,252,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,428 UART: [art] PUB.X = 9F21BD0969AFC6196FA8318EB721719C285525B1CB9DCD79412298B41E866623DBD06BE2874E9AA7AB5F96A03E18C5AD
3,260,203 UART: [art] PUB.Y = 3451E6A1B63912D65C0839BD5C0AE786A20D79BA0C24F2070D72669FFC7D619D20414D3F9730B82B09CA87EE4B4A45D8
3,267,136 UART: [art] SIG.R = E1771144F58A54965A9A8126884F58183BF1EE54B47BCB0239EBF3ABA8FE337593744ED043A6500A15D3CA342C97860B
3,273,897 UART: [art] SIG.S = 29F57946DB94281721AB7E4A583240D5FCCA9980BF6CFFA140E9EC3DA2207C42B848ACDFC6FB8F17A02E86363991CC93
3,297,682 UART: Caliptra RT
3,298,027 UART: [state] CFI Enabled
3,406,680 UART: [rt] RT listening for mailbox commands...
3,407,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,284 UART: [rt]cmd =0x41544d4e, len=14344
3,840,337 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
893,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,611 UART: [kat] ++
897,763 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
917,934 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 ready_for_fw is high
1,176,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,076 UART: [idev] Erasing UDS.KEYID = 0
1,201,131 UART: [idev] Sha1 KeyId Algorithm
1,209,729 UART: [idev] --
1,210,789 UART: [ldev] ++
1,210,957 UART: [ldev] CDI.KEYID = 6
1,211,320 UART: [ldev] SUBJECT.KEYID = 5
1,211,746 UART: [ldev] AUTHORITY.KEYID = 7
1,212,209 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,559 >>> mbox cmd response: success
2,775,653 UART: [afmc] ++
2,775,821 UART: [afmc] CDI.KEYID = 6
2,776,183 UART: [afmc] SUBJECT.KEYID = 7
2,776,608 UART: [afmc] AUTHORITY.KEYID = 5
2,811,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,672 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,484 UART: [afmc] --
2,855,454 UART: [cold-reset] --
2,856,450 UART: [state] Locking Datavault
2,857,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,045 UART: [state] Locking ICCM
2,858,689 UART: [exit] Launching FMC @ 0x40000130
2,864,018 UART:
2,864,034 UART: Running Caliptra FMC ...
2,864,442 UART:
2,864,496 UART: [state] CFI Enabled
2,874,659 UART: [fht] FMC Alias Private Key: 7
2,982,884 UART: [art] Extend RT PCRs Done
2,983,312 UART: [art] Lock RT PCRs Done
2,984,624 UART: [art] Populate DV Done
2,992,543 UART: [fht] FMC Alias Private Key: 7
2,993,603 UART: [art] Derive CDI
2,993,883 UART: [art] Store in in slot 0x4
3,079,362 UART: [art] Derive Key Pair
3,079,722 UART: [art] Store priv key in slot 0x5
3,093,122 UART: [art] Derive Key Pair - Done
3,107,921 UART: [art] Signing Cert with AUTHO
3,108,401 UART: RITY.KEYID = 7
3,123,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,574 UART: [art] PUB.X = E99776D43415738671B9DFE66070BE70EF04F98733E3010D3674930B0AF9B852521617DCFC29F720A125CB4A816F975F
3,131,323 UART: [art] PUB.Y = 60BAB3DD78FC1649FEB0889F6B087B9DADB1CDD05AAC50341B15199A431612B292489A6C351BBFB6DA49072242D4FA69
3,138,279 UART: [art] SIG.R = B50C34DC6F25144A5A630EB0DF03275E41E6420C96BE02A4BE19CF11C03863D0518F0EA4A37EEE214FA7799659A93829
3,145,035 UART: [art] SIG.S = B9FAA268EF299AE009AD8E87EB16081064F9700843281CB3CF9095977BC03B1D21BD0DB56610F06FBEC98C85230306DD
3,168,816 UART: Caliptra RT
3,169,069 UART: [state] CFI Enabled
3,277,261 UART: [rt] RT listening for mailbox commands...
3,277,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,867 UART: [rt]cmd =0x41544d4e, len=14344
3,711,378 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,733 ready_for_fw is high
1,060,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,280 >>> mbox cmd response: success
2,689,166 UART:
2,689,182 UART: Running Caliptra FMC ...
2,689,590 UART:
2,689,644 UART: [state] CFI Enabled
2,700,215 UART: [fht] FMC Alias Private Key: 7
2,808,254 UART: [art] Extend RT PCRs Done
2,808,682 UART: [art] Lock RT PCRs Done
2,810,322 UART: [art] Populate DV Done
2,818,435 UART: [fht] FMC Alias Private Key: 7
2,819,567 UART: [art] Derive CDI
2,819,847 UART: [art] Store in in slot 0x4
2,905,552 UART: [art] Derive Key Pair
2,905,912 UART: [art] Store priv key in slot 0x5
2,919,264 UART: [art] Derive Key Pair - Done
2,933,856 UART: [art] Signing Cert with AUTHO
2,934,336 UART: RITY.KEYID = 7
2,949,714 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,479 UART: [art] PUB.X = E0B569A0A5D10577482D585043AF457E9E797F6DBD9F9A76D515FF090903CD08CA5F08273A0BE195EA6A28C38AA0EE2D
2,957,238 UART: [art] PUB.Y = 320F71AFE3DE3DDB9156CBA59DEC72CEE701CBDAB40023654BBF15CCBF89D5468AF0ACF9EDEE35D338B596CA3ED945C5
2,964,192 UART: [art] SIG.R = 62F50B0FEE3FEC0E79C7B8258AEFCB72071F35FDED371B629FBC3C86FAB82AAFB44ED11EB29C05F331A8B16A7B8311A4
2,970,973 UART: [art] SIG.S = 512C8750F8A493A4FCF5BAE3C402BBD188E03FC9D9303C625C871E3E3BD1AB1204201DBFF8BD40684230628E1E300A2E
2,994,409 UART: Caliptra RT
2,994,662 UART: [state] CFI Enabled
3,102,723 UART: [rt] RT listening for mailbox commands...
3,103,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,305 UART: [rt]cmd =0x41544d4e, len=14344
3,536,272 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,857 UART: [kat] SHA2-512-ACC
908,758 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 ready_for_fw is high
1,176,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,155 UART: [idev] Erasing UDS.KEYID = 0
1,200,924 UART: [idev] Sha1 KeyId Algorithm
1,209,412 UART: [idev] --
1,210,444 UART: [ldev] ++
1,210,612 UART: [ldev] CDI.KEYID = 6
1,210,975 UART: [ldev] SUBJECT.KEYID = 5
1,211,401 UART: [ldev] AUTHORITY.KEYID = 7
1,211,864 UART: [ldev] FE.KEYID = 1
1,216,908 UART: [ldev] Erasing FE.KEYID = 1
1,243,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,680 UART: [ldev] --
1,282,961 UART: [fwproc] Wait for Commands...
1,283,661 UART: [fwproc] Recv command 0x46574c44
1,284,389 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,942 >>> mbox cmd response: success
2,776,174 UART: [afmc] ++
2,776,342 UART: [afmc] CDI.KEYID = 6
2,776,704 UART: [afmc] SUBJECT.KEYID = 7
2,777,129 UART: [afmc] AUTHORITY.KEYID = 5
2,813,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,935 UART: [afmc] --
2,857,043 UART: [cold-reset] --
2,857,993 UART: [state] Locking Datavault
2,859,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,752 UART: [state] Locking ICCM
2,860,362 UART: [exit] Launching FMC @ 0x40000130
2,865,691 UART:
2,865,707 UART: Running Caliptra FMC ...
2,866,115 UART:
2,866,258 UART: [state] CFI Enabled
2,876,877 UART: [fht] FMC Alias Private Key: 7
2,985,072 UART: [art] Extend RT PCRs Done
2,985,500 UART: [art] Lock RT PCRs Done
2,987,218 UART: [art] Populate DV Done
2,995,617 UART: [fht] FMC Alias Private Key: 7
2,996,677 UART: [art] Derive CDI
2,996,957 UART: [art] Store in in slot 0x4
3,082,380 UART: [art] Derive Key Pair
3,082,740 UART: [art] Store priv key in slot 0x5
3,096,022 UART: [art] Derive Key Pair - Done
3,110,768 UART: [art] Signing Cert with AUTHO
3,111,248 UART: RITY.KEYID = 7
3,125,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,621 UART: [art] PUB.X = E223A90C0C8CBECC23AB8E3208902C91E2F5AAAFA1736724AB6B0C8960A6D27EDE284E12AF7E908F196583455C31660E
3,133,386 UART: [art] PUB.Y = 677DCEE52A209857484180681C426C5C09A8DA13422FD63F91D667EEFBF827F118A223FA2E1AB4DF672CA8E33F123787
3,140,337 UART: [art] SIG.R = D47DC120D19304317A36A466BC8C65F5888FD43D3EA9D1B902AC64530639953DC81B1BC88D4972B3E4E11BC6690DD556
3,147,097 UART: [art] SIG.S = 0D4995CF31641E99A81A877EC8548CCB75AFA75519C452F9F9FBD2C33383B55651473FAF954803EF5A741EEE6C9A1534
3,170,942 UART: Caliptra RT
3,171,287 UART: [state] CFI Enabled
3,279,628 UART: [rt] RT listening for mailbox commands...
3,280,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,456 UART: [rt]cmd =0x41544d4e, len=14344
3,712,941 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,382 ready_for_fw is high
1,060,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,945 >>> mbox cmd response: success
2,690,131 UART:
2,690,147 UART: Running Caliptra FMC ...
2,690,555 UART:
2,690,698 UART: [state] CFI Enabled
2,701,443 UART: [fht] FMC Alias Private Key: 7
2,809,570 UART: [art] Extend RT PCRs Done
2,809,998 UART: [art] Lock RT PCRs Done
2,811,500 UART: [art] Populate DV Done
2,819,619 UART: [fht] FMC Alias Private Key: 7
2,820,767 UART: [art] Derive CDI
2,821,047 UART: [art] Store in in slot 0x4
2,906,654 UART: [art] Derive Key Pair
2,907,014 UART: [art] Store priv key in slot 0x5
2,920,620 UART: [art] Derive Key Pair - Done
2,935,105 UART: [art] Signing Cert with AUTHO
2,935,585 UART: RITY.KEYID = 7
2,950,853 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,618 UART: [art] PUB.X = 82D5E78C8EA2E34AF2B5AADBE153BE9CF11E686A2602CAEEE82B2C637A1DEE507A270A145B4AEA6328FC53343409A77B
2,958,399 UART: [art] PUB.Y = C4846F16E7F32EE7E4991426440753E66C674BF913EC9EF0F6B08528089BA5B02EC3A487C886D585FDAEEC34688D5D0C
2,965,346 UART: [art] SIG.R = 52340DF4D0EAB097A2ECDF29142D3CDFA1336497F3E1EF9D95CB6CDD0A581E68F28E1C0C39EAFC080F018CB6A170D650
2,972,118 UART: [art] SIG.S = A5DB248081C194B6D80A9595D4F94E5CCE3C71C93265D1CE0ABC93ED7FB294AF93D32A4A9FB34830269D3B0893E7CCA3
2,995,596 UART: Caliptra RT
2,995,941 UART: [state] CFI Enabled
3,103,728 UART: [rt] RT listening for mailbox commands...
3,104,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,430 UART: [rt]cmd =0x41544d4e, len=14344
3,537,427 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 ready_for_fw is high
1,174,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,064 UART: [ldev] --
1,281,330 UART: [fwproc] Wait for Commands...
1,282,065 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,189 >>> mbox cmd response: success
2,773,360 UART: [afmc] ++
2,773,528 UART: [afmc] CDI.KEYID = 6
2,773,891 UART: [afmc] SUBJECT.KEYID = 7
2,774,317 UART: [afmc] AUTHORITY.KEYID = 5
2,809,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,273 UART: [afmc] --
2,853,235 UART: [cold-reset] --
2,854,079 UART: [state] Locking Datavault
2,855,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,862 UART: [state] Locking ICCM
2,856,294 UART: [exit] Launching FMC @ 0x40000130
2,861,623 UART:
2,861,639 UART: Running Caliptra FMC ...
2,862,047 UART:
2,862,101 UART: [state] CFI Enabled
2,872,450 UART: [fht] FMC Alias Private Key: 7
2,980,439 UART: [art] Extend RT PCRs Done
2,980,867 UART: [art] Lock RT PCRs Done
2,982,445 UART: [art] Populate DV Done
2,990,762 UART: [fht] FMC Alias Private Key: 7
2,991,928 UART: [art] Derive CDI
2,992,208 UART: [art] Store in in slot 0x4
3,077,797 UART: [art] Derive Key Pair
3,078,157 UART: [art] Store priv key in slot 0x5
3,091,715 UART: [art] Derive Key Pair - Done
3,106,280 UART: [art] Signing Cert with AUTHO
3,106,760 UART: RITY.KEYID = 7
3,122,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,057 UART: [art] PUB.X = 289BDE9B87E9E4B8E612A4371CC2FDDAE113C7969288120BBB6E819F8FCF535E98028D5E5018E2A12925F0CFCBFF15F9
3,129,835 UART: [art] PUB.Y = FF204BD4E58AF15F01B7753E657DB3AF1CD23D8CE799D0BA35C3F89A3F3A71B928ED8BF3D1AF0116B58CC45751100B19
3,136,792 UART: [art] SIG.R = 1C2C06CF1BD8498C6F4AA4E917981FCF0F43C02EBBF0A00BC6BFC6C37C931534EADAA3FF08C14E0228D54A8DF5481F56
3,143,569 UART: [art] SIG.S = 140312271D4B75F8D615451B15FA11D685E6A72C345CF952AE03BE21C95E13E9A3B551B6616C55EFA99975E5CDE60BC3
3,166,661 UART: Caliptra RT
3,166,914 UART: [state] CFI Enabled
3,273,769 UART: [rt] RT listening for mailbox commands...
3,274,439 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,815 UART: [rt]cmd =0x41544d4e, len=14344
3,707,092 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,382 ready_for_fw is high
1,055,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,097 >>> mbox cmd response: success
2,682,709 UART:
2,682,725 UART: Running Caliptra FMC ...
2,683,133 UART:
2,683,187 UART: [state] CFI Enabled
2,693,722 UART: [fht] FMC Alias Private Key: 7
2,801,601 UART: [art] Extend RT PCRs Done
2,802,029 UART: [art] Lock RT PCRs Done
2,803,641 UART: [art] Populate DV Done
2,811,744 UART: [fht] FMC Alias Private Key: 7
2,812,906 UART: [art] Derive CDI
2,813,186 UART: [art] Store in in slot 0x4
2,898,959 UART: [art] Derive Key Pair
2,899,319 UART: [art] Store priv key in slot 0x5
2,912,577 UART: [art] Derive Key Pair - Done
2,927,241 UART: [art] Signing Cert with AUTHO
2,927,721 UART: RITY.KEYID = 7
2,943,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,820 UART: [art] PUB.X = AA449DDA58339264E6C51076E11A070FEEDB75337F8B97CB6467F8C84149388AC360F9A1906F9BA3C91148754DE39355
2,950,582 UART: [art] PUB.Y = 80F2BF59F461B9BC516B2449BF7AF0793F8BA0C032A0BAE4A72F361E858EB11BDB4893891D2ECAFB1905ED56097B57FA
2,957,542 UART: [art] SIG.R = 81EA9920D9D605460844B1F84399A1280FF7D1A7824BEDA419BF7D86BBD789FA46887B7959989F7FFAC351ED8CDED155
2,964,311 UART: [art] SIG.S = 7AA12C940D4C3815FD96A437EB119D7CDC13900455D2AA2CE8CA86F4509CE4D2268AEFF63DC7618DEBF9A4F3E1760AE9
2,987,755 UART: Caliptra RT
2,988,008 UART: [state] CFI Enabled
3,095,777 UART: [rt] RT listening for mailbox commands...
3,096,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,497 UART: [rt]cmd =0x41544d4e, len=14344
3,529,576 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,388 UART: [cold-reset] ++
1,169,944 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 ready_for_fw is high
1,173,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,241,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,485 UART: [ldev] --
1,280,985 UART: [fwproc] Wait for Commands...
1,281,670 UART: [fwproc] Recv command 0x46574c44
1,282,403 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,406 >>> mbox cmd response: success
2,775,569 UART: [afmc] ++
2,775,737 UART: [afmc] CDI.KEYID = 6
2,776,100 UART: [afmc] SUBJECT.KEYID = 7
2,776,526 UART: [afmc] AUTHORITY.KEYID = 5
2,813,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,832 UART: [afmc] --
2,856,762 UART: [cold-reset] --
2,857,634 UART: [state] Locking Datavault
2,858,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,231 UART: [state] Locking ICCM
2,859,899 UART: [exit] Launching FMC @ 0x40000130
2,865,228 UART:
2,865,244 UART: Running Caliptra FMC ...
2,865,652 UART:
2,865,795 UART: [state] CFI Enabled
2,876,302 UART: [fht] FMC Alias Private Key: 7
2,984,727 UART: [art] Extend RT PCRs Done
2,985,155 UART: [art] Lock RT PCRs Done
2,986,461 UART: [art] Populate DV Done
2,994,662 UART: [fht] FMC Alias Private Key: 7
2,995,818 UART: [art] Derive CDI
2,996,098 UART: [art] Store in in slot 0x4
3,081,847 UART: [art] Derive Key Pair
3,082,207 UART: [art] Store priv key in slot 0x5
3,095,459 UART: [art] Derive Key Pair - Done
3,110,174 UART: [art] Signing Cert with AUTHO
3,110,654 UART: RITY.KEYID = 7
3,125,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,579 UART: [art] PUB.X = 4316E299293F8F725C42DB1E193AB62A2C6E8FE272AB5C6D16674EBFA822E47A6F19875A80328AB3227DBD8525223A32
3,133,351 UART: [art] PUB.Y = 972B82647C032CCAB94D4C7010D731ACE0DBE89515C552612ADDFA76514D79996B0B525165D1E209F06F7DAB3F6A69E5
3,140,298 UART: [art] SIG.R = D54286A4D94BD09730D64F22D7C5510CC3B16E3297ED5A1D22E86AD19EA5B522BEBB1BE55A594190DE66DF57717C8F84
3,147,075 UART: [art] SIG.S = FEABD54D8E234133C51039344F9BAD7D5D0EAC641CDEF23A65664E2B0D373415BE82D4A91B75739C025298A00281177C
3,170,762 UART: Caliptra RT
3,171,107 UART: [state] CFI Enabled
3,279,215 UART: [rt] RT listening for mailbox commands...
3,279,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,951 UART: [rt]cmd =0x41544d4e, len=14344
3,713,016 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,784 >>> mbox cmd response: success
2,686,454 UART:
2,686,470 UART: Running Caliptra FMC ...
2,686,878 UART:
2,687,021 UART: [state] CFI Enabled
2,697,510 UART: [fht] FMC Alias Private Key: 7
2,806,155 UART: [art] Extend RT PCRs Done
2,806,583 UART: [art] Lock RT PCRs Done
2,807,907 UART: [art] Populate DV Done
2,816,086 UART: [fht] FMC Alias Private Key: 7
2,817,226 UART: [art] Derive CDI
2,817,506 UART: [art] Store in in slot 0x4
2,903,285 UART: [art] Derive Key Pair
2,903,645 UART: [art] Store priv key in slot 0x5
2,916,903 UART: [art] Derive Key Pair - Done
2,931,573 UART: [art] Signing Cert with AUTHO
2,932,053 UART: RITY.KEYID = 7
2,947,103 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,868 UART: [art] PUB.X = 0737E8AC78203695DF382772C68B60DF0C0A6C00EDBE72780EBCD735FAFA02A39B905D3DE0BC60DB71A4EE0989AE27AB
2,954,616 UART: [art] PUB.Y = 32D55FF797579D3FABAB8E518A2D2021E1BA20251D7794C2A4FB80DFF6A5A7A84A21A7C5311424D169DD3AF96D7B06E1
2,961,575 UART: [art] SIG.R = 4281024EF28142BD043681FE163E6369A19F71A9A5C15E3474E3F3BBAF5C0663C7439AD6FDF91766B0D5BDA6C5173782
2,968,338 UART: [art] SIG.S = 4A1931C21CE6C31BB4D3AE31CD6D3816E34E7850BC25EAF7481F8F71475CBEA935175BAB3BB0E816650DD4DFE4D8059F
2,991,811 UART: Caliptra RT
2,992,156 UART: [state] CFI Enabled
3,099,685 UART: [rt] RT listening for mailbox commands...
3,100,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,567 UART: [rt]cmd =0x41544d4e, len=14344
3,533,116 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,357 UART: [kat] SHA2-256
882,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,403 UART: [kat] ++
886,555 UART: [kat] sha1
890,849 UART: [kat] SHA2-256
892,787 UART: [kat] SHA2-384
895,552 UART: [kat] SHA2-512-ACC
897,453 UART: [kat] ECC-384
903,240 UART: [kat] HMAC-384Kdf
907,966 UART: [kat] LMS
1,476,162 UART: [kat] --
1,477,029 UART: [cold-reset] ++
1,477,465 UART: [fht] Storing FHT @ 0x50003400
1,480,280 UART: [idev] ++
1,480,448 UART: [idev] CDI.KEYID = 6
1,480,808 UART: [idev] SUBJECT.KEYID = 7
1,481,232 UART: [idev] UDS.KEYID = 0
1,481,577 ready_for_fw is high
1,481,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,226 UART: [idev] Erasing UDS.KEYID = 0
1,505,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,739 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,385 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 114332 bytes
2,885,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,780 >>> mbox cmd response: success
3,078,874 UART: [afmc] ++
3,079,042 UART: [afmc] CDI.KEYID = 6
3,079,404 UART: [afmc] SUBJECT.KEYID = 7
3,079,829 UART: [afmc] AUTHORITY.KEYID = 5
3,114,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,496 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,889 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,579 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,358 UART: [afmc] --
3,158,322 UART: [cold-reset] --
3,159,160 UART: [state] Locking Datavault
3,160,403 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,007 UART: [state] Locking ICCM
3,161,527 UART: [exit] Launching FMC @ 0x40000130
3,166,856 UART:
3,166,872 UART: Running Caliptra FMC ...
3,167,280 UART:
3,167,334 UART: [state] CFI Enabled
3,177,571 UART: [fht] FMC Alias Private Key: 7
3,285,558 UART: [art] Extend RT PCRs Done
3,285,986 UART: [art] Lock RT PCRs Done
3,287,544 UART: [art] Populate DV Done
3,295,667 UART: [fht] FMC Alias Private Key: 7
3,296,729 UART: [art] Derive CDI
3,297,009 UART: [art] Store in in slot 0x4
3,382,376 UART: [art] Derive Key Pair
3,382,736 UART: [art] Store priv key in slot 0x5
3,396,254 UART: [art] Derive Key Pair - Done
3,411,218 UART: [art] Signing Cert with AUTHO
3,411,698 UART: RITY.KEYID = 7
3,426,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,661 UART: [art] PUB.X = F434B52A605EF504816871BDBD4BB0874362E9E8CA0F0BC02235040B47658626990515E4CDB50338251883BA616ED0D2
3,434,404 UART: [art] PUB.Y = F677BB50BE7E74F628A925E18BE6E1BF85E518F3FA7C254C230279A9252DFB18F36850C9174B99219CDFC72837E2C78F
3,441,357 UART: [art] SIG.R = C3E8555CD1ADD47E2DD0753FA6F291B358178BEEDD26921EE90E2F4444833CAE3A9DB2958A7A7C6E0A32EB303DA45F05
3,448,134 UART: [art] SIG.S = DCC1B6240B1F81739A14916A7D2DF1606D3B85A8CAB9ADC546375284F8AB053E6985EFDE8ABC2051047964AA995B9AC0
3,471,700 UART: Caliptra RT
3,471,953 UART: [state] CFI Enabled
3,580,669 UART: [rt] RT listening for mailbox commands...
3,581,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,681 UART: [rt]cmd =0x44504543, len=96
3,791,665 >>> mbox cmd response data (6236 bytes)
3,791,666 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,579 UART: [rt]cmd =0x53574545, len=84
3,846,884 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,653 ready_for_fw is high
1,362,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,322 >>> mbox cmd response: success
2,990,348 UART:
2,990,364 UART: Running Caliptra FMC ...
2,990,772 UART:
2,990,826 UART: [state] CFI Enabled
3,001,321 UART: [fht] FMC Alias Private Key: 7
3,109,134 UART: [art] Extend RT PCRs Done
3,109,562 UART: [art] Lock RT PCRs Done
3,111,020 UART: [art] Populate DV Done
3,118,899 UART: [fht] FMC Alias Private Key: 7
3,120,055 UART: [art] Derive CDI
3,120,335 UART: [art] Store in in slot 0x4
3,206,136 UART: [art] Derive Key Pair
3,206,496 UART: [art] Store priv key in slot 0x5
3,219,338 UART: [art] Derive Key Pair - Done
3,233,915 UART: [art] Signing Cert with AUTHO
3,234,395 UART: RITY.KEYID = 7
3,249,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,840 UART: [art] PUB.X = 0C7D8141AD714FC34360DD139B66CCF4C2A822B53196B538996BF5E784A9D734402B03C124A14292A4801638B1030975
3,256,588 UART: [art] PUB.Y = 786920E306AA794E695EBDE26F1D882531F92E039F9D49DD48A85D58FE12C026C7045964D3E06CC3081B7D9AFA073AA1
3,263,527 UART: [art] SIG.R = 25CFCDF5C6C27DCDE571972E90C5BD4EAE7F075EAB6310174CB15E7FB384A177CFD605FD98E757EEF5E469E0FF86D2F2
3,270,315 UART: [art] SIG.S = ED77C997832995D4CF0A5E39AF56F507E6320597649F7791D3F5097E144EB534FAEEABFFF581D8D62DE832631AF857E0
3,293,730 UART: Caliptra RT
3,293,983 UART: [state] CFI Enabled
3,401,652 UART: [rt] RT listening for mailbox commands...
3,402,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,430 UART: [rt]cmd =0x44504543, len=96
3,613,271 >>> mbox cmd response data (6236 bytes)
3,613,272 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,073 UART: [rt]cmd =0x53574545, len=84
3,668,358 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,195 UART: [state] LifecycleState = Unprovisioned
86,850 UART: [state] DebugLocked = No
87,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,028 UART: [kat] SHA2-256
882,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,074 UART: [kat] ++
887,226 UART: [kat] sha1
891,578 UART: [kat] SHA2-256
893,516 UART: [kat] SHA2-384
896,217 UART: [kat] SHA2-512-ACC
898,118 UART: [kat] ECC-384
903,607 UART: [kat] HMAC-384Kdf
908,259 UART: [kat] LMS
1,476,455 UART: [kat] --
1,477,268 UART: [cold-reset] ++
1,477,786 UART: [fht] Storing FHT @ 0x50003400
1,480,643 UART: [idev] ++
1,480,811 UART: [idev] CDI.KEYID = 6
1,481,171 UART: [idev] SUBJECT.KEYID = 7
1,481,595 UART: [idev] UDS.KEYID = 0
1,481,940 ready_for_fw is high
1,481,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,899 UART: [idev] --
1,515,848 UART: [ldev] ++
1,516,016 UART: [ldev] CDI.KEYID = 6
1,516,379 UART: [ldev] SUBJECT.KEYID = 5
1,516,805 UART: [ldev] AUTHORITY.KEYID = 7
1,517,268 UART: [ldev] FE.KEYID = 1
1,522,810 UART: [ldev] Erasing FE.KEYID = 1
1,548,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,973 UART: [ldev] --
1,588,288 UART: [fwproc] Waiting for Commands...
1,589,127 UART: [fwproc] Received command 0x46574c44
1,589,918 UART: [fwproc] Received Image of size 114332 bytes
2,887,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,386 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,337 >>> mbox cmd response: success
3,080,503 UART: [afmc] ++
3,080,671 UART: [afmc] CDI.KEYID = 6
3,081,033 UART: [afmc] SUBJECT.KEYID = 7
3,081,458 UART: [afmc] AUTHORITY.KEYID = 5
3,116,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,705 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,098 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,788 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,621 UART: [afmc] --
3,159,563 UART: [cold-reset] --
3,160,443 UART: [state] Locking Datavault
3,161,508 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,112 UART: [state] Locking ICCM
3,162,718 UART: [exit] Launching FMC @ 0x40000130
3,168,047 UART:
3,168,063 UART: Running Caliptra FMC ...
3,168,471 UART:
3,168,614 UART: [state] CFI Enabled
3,179,137 UART: [fht] FMC Alias Private Key: 7
3,287,056 UART: [art] Extend RT PCRs Done
3,287,484 UART: [art] Lock RT PCRs Done
3,289,080 UART: [art] Populate DV Done
3,297,527 UART: [fht] FMC Alias Private Key: 7
3,298,475 UART: [art] Derive CDI
3,298,755 UART: [art] Store in in slot 0x4
3,384,520 UART: [art] Derive Key Pair
3,384,880 UART: [art] Store priv key in slot 0x5
3,398,208 UART: [art] Derive Key Pair - Done
3,412,921 UART: [art] Signing Cert with AUTHO
3,413,401 UART: RITY.KEYID = 7
3,428,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,614 UART: [art] PUB.X = 451B5845221219531BCF6DF31FA2A54ABA214CE4ADD3191B81E47BB32342929F094F686ABD9E4392A99D6E9120D3D2E5
3,436,385 UART: [art] PUB.Y = 4249DA8BBC3B5C4598B838E839FD73967CC8FD69B16B39748961ED230B674E90FAA223EF67295BD74AD4D138185D86AE
3,443,338 UART: [art] SIG.R = 145CE0123F0470AAEEFA3AC8A6C97BDA91478C164A323C967F90D20FBC8B9068FFD5D37CAA1D2B749C9231A0440E59D5
3,450,113 UART: [art] SIG.S = 64F3382358961F5E3AAD108F0AB10A209E7ACCA05D1655E73BD188A640DB7A223E10F98031AF49ED9196CECC18CF7446
3,474,266 UART: Caliptra RT
3,474,611 UART: [state] CFI Enabled
3,583,001 UART: [rt] RT listening for mailbox commands...
3,583,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,123 UART: [rt]cmd =0x44504543, len=96
3,794,629 >>> mbox cmd response data (6236 bytes)
3,794,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,467 UART: [rt]cmd =0x53574545, len=84
3,850,064 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,676 ready_for_fw is high
1,363,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,993 >>> mbox cmd response: success
2,992,455 UART:
2,992,471 UART: Running Caliptra FMC ...
2,992,879 UART:
2,993,022 UART: [state] CFI Enabled
3,003,571 UART: [fht] FMC Alias Private Key: 7
3,111,672 UART: [art] Extend RT PCRs Done
3,112,100 UART: [art] Lock RT PCRs Done
3,113,500 UART: [art] Populate DV Done
3,121,619 UART: [fht] FMC Alias Private Key: 7
3,122,565 UART: [art] Derive CDI
3,122,845 UART: [art] Store in in slot 0x4
3,208,462 UART: [art] Derive Key Pair
3,208,822 UART: [art] Store priv key in slot 0x5
3,222,202 UART: [art] Derive Key Pair - Done
3,237,214 UART: [art] Signing Cert with AUTHO
3,237,694 UART: RITY.KEYID = 7
3,253,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,817 UART: [art] PUB.X = E1407F9046F1E0CB880BEBE7EC4A505A3735EDDD4462B316089AFE08A5EBEEFFB8018487BA3B228F9AA688024755E807
3,260,581 UART: [art] PUB.Y = 0BE1B6D89BCD1AA41F897CAFEF374FD29F5536BC7AA4B57621CDC5777A4FC4186E92F1492649AF4C901DA33E014DF861
3,267,541 UART: [art] SIG.R = 0C62342812DB3BF2C8879B501CE4A3014B0F9802F74332B56A31D11561B2E9D643076B859855C050C2C7E041F44673B3
3,274,286 UART: [art] SIG.S = E53EB826BAEE0D5F956622319184886B6E805649CC1ECD420E857989A93377B3A971800FD41D6654D54E3E76D752D940
3,297,876 UART: Caliptra RT
3,298,221 UART: [state] CFI Enabled
3,405,828 UART: [rt] RT listening for mailbox commands...
3,406,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,818 UART: [rt]cmd =0x44504543, len=96
3,617,762 >>> mbox cmd response data (6236 bytes)
3,617,763 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,878 UART: [rt]cmd =0x53574545, len=84
3,673,711 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
893,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,533 UART: [kat] ++
897,685 UART: [kat] sha1
902,029 UART: [kat] SHA2-256
903,969 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,604 UART: [kat] HMAC-384Kdf
923,288 UART: [kat] LMS
1,171,616 UART: [kat] --
1,172,503 UART: [cold-reset] ++
1,172,993 UART: [fht] FHT @ 0x50003400
1,175,554 UART: [idev] ++
1,175,722 UART: [idev] CDI.KEYID = 6
1,176,082 UART: [idev] SUBJECT.KEYID = 7
1,176,506 UART: [idev] UDS.KEYID = 0
1,176,851 ready_for_fw is high
1,176,851 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,414 UART: [idev] Erasing UDS.KEYID = 0
1,201,071 UART: [idev] Sha1 KeyId Algorithm
1,209,401 UART: [idev] --
1,210,335 UART: [ldev] ++
1,210,503 UART: [ldev] CDI.KEYID = 6
1,210,866 UART: [ldev] SUBJECT.KEYID = 5
1,211,292 UART: [ldev] AUTHORITY.KEYID = 7
1,211,755 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,641 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,638 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,061 >>> mbox cmd response: success
2,774,319 UART: [afmc] ++
2,774,487 UART: [afmc] CDI.KEYID = 6
2,774,849 UART: [afmc] SUBJECT.KEYID = 7
2,775,274 UART: [afmc] AUTHORITY.KEYID = 5
2,811,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,819 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,538 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,326 UART: [afmc] --
2,854,384 UART: [cold-reset] --
2,855,294 UART: [state] Locking Datavault
2,856,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,149 UART: [state] Locking ICCM
2,857,717 UART: [exit] Launching FMC @ 0x40000130
2,863,046 UART:
2,863,062 UART: Running Caliptra FMC ...
2,863,470 UART:
2,863,524 UART: [state] CFI Enabled
2,874,155 UART: [fht] FMC Alias Private Key: 7
2,982,560 UART: [art] Extend RT PCRs Done
2,982,988 UART: [art] Lock RT PCRs Done
2,984,532 UART: [art] Populate DV Done
2,992,579 UART: [fht] FMC Alias Private Key: 7
2,993,673 UART: [art] Derive CDI
2,993,953 UART: [art] Store in in slot 0x4
3,079,320 UART: [art] Derive Key Pair
3,079,680 UART: [art] Store priv key in slot 0x5
3,092,716 UART: [art] Derive Key Pair - Done
3,107,859 UART: [art] Signing Cert with AUTHO
3,108,339 UART: RITY.KEYID = 7
3,123,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,362 UART: [art] PUB.X = FAD55454E929426CED54106650F809F04E5DB932BF7D450BDCA293D16FAC15BC296F5EA9CC8B57A10419C06DFCB36982
3,131,135 UART: [art] PUB.Y = 5672D0C7585CB4FB7BCE41C67AE1AB64F44B1F6BC1FFE674052A1A1694B96942CBADDA5684CE66C37CC5B36518F43B7B
3,138,100 UART: [art] SIG.R = 7C254053DBBC8BC85DE5945DB82FE9185CB4C63DF4C36B25D8B71652CB2A2418ABAEDDF823CCC23992FE2426FF265772
3,144,886 UART: [art] SIG.S = EA6AA78E39C0DC41A8ADDD47BB9A754C7A8F7BC190B5BFBF89614CDFE76182759A05EB26DA5884BBCD46037923CE779B
3,168,843 UART: Caliptra RT
3,169,096 UART: [state] CFI Enabled
3,277,015 UART: [rt] RT listening for mailbox commands...
3,277,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,177 UART: [rt]cmd =0x44504543, len=96
3,489,062 >>> mbox cmd response data (6236 bytes)
3,489,063 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,992 UART: [rt]cmd =0x53574545, len=84
3,544,577 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,495 ready_for_fw is high
1,059,495 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,106 >>> mbox cmd response: success
2,685,644 UART:
2,685,660 UART: Running Caliptra FMC ...
2,686,068 UART:
2,686,122 UART: [state] CFI Enabled
2,696,487 UART: [fht] FMC Alias Private Key: 7
2,803,998 UART: [art] Extend RT PCRs Done
2,804,426 UART: [art] Lock RT PCRs Done
2,806,136 UART: [art] Populate DV Done
2,814,405 UART: [fht] FMC Alias Private Key: 7
2,815,357 UART: [art] Derive CDI
2,815,637 UART: [art] Store in in slot 0x4
2,901,736 UART: [art] Derive Key Pair
2,902,096 UART: [art] Store priv key in slot 0x5
2,914,878 UART: [art] Derive Key Pair - Done
2,929,651 UART: [art] Signing Cert with AUTHO
2,930,131 UART: RITY.KEYID = 7
2,945,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,980 UART: [art] PUB.X = F7C56048ACD15EF0D9A8920D96E7704A6BC882AD91181B4F463CAEC8B8D4851EDD8262A5D5D58C7A35C76024CC76CE39
2,952,759 UART: [art] PUB.Y = CA68B6A2447C9F0F35BC9313F8FD5BFA079FA5D75650E7484CF27E909FF561B0F635D01C2F2937FB6550118B3A30FFD4
2,959,713 UART: [art] SIG.R = 5B1E9B00CCC3C38E29705131F65038BD4315F9838606A068541EC19088D3D5AC1E7269551896ABFC98039C0EE932F4F6
2,966,448 UART: [art] SIG.S = 1BF7DFABC58B5665781D32D4EEB2EC4DC9F3B228AA7DE5688B720061A7FDFB8ECC222925AC4712EF37A64083987164FD
2,989,991 UART: Caliptra RT
2,990,244 UART: [state] CFI Enabled
3,098,549 UART: [rt] RT listening for mailbox commands...
3,099,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,437 UART: [rt]cmd =0x44504543, len=96
3,308,471 >>> mbox cmd response data (6236 bytes)
3,308,472 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,181 UART: [rt]cmd =0x53574545, len=84
3,363,656 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,505 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,172,996 UART: [fht] FHT @ 0x50003400
1,175,735 UART: [idev] ++
1,175,903 UART: [idev] CDI.KEYID = 6
1,176,263 UART: [idev] SUBJECT.KEYID = 7
1,176,687 UART: [idev] UDS.KEYID = 0
1,177,032 ready_for_fw is high
1,177,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,465 UART: [idev] Erasing UDS.KEYID = 0
1,201,378 UART: [idev] Sha1 KeyId Algorithm
1,210,078 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,674 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,592 UART: [ldev] --
1,284,007 UART: [fwproc] Wait for Commands...
1,284,657 UART: [fwproc] Recv command 0x46574c44
1,285,385 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,616 >>> mbox cmd response: success
2,775,732 UART: [afmc] ++
2,775,900 UART: [afmc] CDI.KEYID = 6
2,776,262 UART: [afmc] SUBJECT.KEYID = 7
2,776,687 UART: [afmc] AUTHORITY.KEYID = 5
2,811,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,674 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,041 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,143 UART: [state] Locking Datavault
2,857,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,690 UART: [state] Locking ICCM
2,858,306 UART: [exit] Launching FMC @ 0x40000130
2,863,635 UART:
2,863,651 UART: Running Caliptra FMC ...
2,864,059 UART:
2,864,202 UART: [state] CFI Enabled
2,874,677 UART: [fht] FMC Alias Private Key: 7
2,982,694 UART: [art] Extend RT PCRs Done
2,983,122 UART: [art] Lock RT PCRs Done
2,984,636 UART: [art] Populate DV Done
2,993,005 UART: [fht] FMC Alias Private Key: 7
2,993,953 UART: [art] Derive CDI
2,994,233 UART: [art] Store in in slot 0x4
3,080,124 UART: [art] Derive Key Pair
3,080,484 UART: [art] Store priv key in slot 0x5
3,093,632 UART: [art] Derive Key Pair - Done
3,108,401 UART: [art] Signing Cert with AUTHO
3,108,881 UART: RITY.KEYID = 7
3,123,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,704 UART: [art] PUB.X = 8C63720DFD21BE32FE71404716F61CA6363AD709A07CCA10FC7C7CD9F0B7EE07CCB15D6C0435E3D07CF09BC83EC38AFD
3,131,484 UART: [art] PUB.Y = 5091261CF5A11B229565019DD11F7B94BEEF20DDAF0109E5D105F4779283FE5F5CC00CA2EA26D1504BDCA6C3B9C4D760
3,138,431 UART: [art] SIG.R = 05365DA4AF027F0EC0C228B3E5652B8851BAE67C5B4EEF5C804A5F1FC19E18E6DECA31FAA5384C15A994CA88A862BCC5
3,145,212 UART: [art] SIG.S = 98457401C4FFD99DF310056EC9DB9082C6BBCEBDEE29D8EAAD2C7FB7B09034EFB885663042CC94A3B50A0E31B1CA2AC5
3,169,209 UART: Caliptra RT
3,169,554 UART: [state] CFI Enabled
3,278,101 UART: [rt] RT listening for mailbox commands...
3,278,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,031 UART: [rt]cmd =0x44504543, len=96
3,489,254 >>> mbox cmd response data (6236 bytes)
3,489,255 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,164 UART: [rt]cmd =0x53574545, len=84
3,544,441 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,080 ready_for_fw is high
1,060,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,811 >>> mbox cmd response: success
2,688,483 UART:
2,688,499 UART: Running Caliptra FMC ...
2,688,907 UART:
2,689,050 UART: [state] CFI Enabled
2,699,407 UART: [fht] FMC Alias Private Key: 7
2,807,782 UART: [art] Extend RT PCRs Done
2,808,210 UART: [art] Lock RT PCRs Done
2,809,756 UART: [art] Populate DV Done
2,818,005 UART: [fht] FMC Alias Private Key: 7
2,819,069 UART: [art] Derive CDI
2,819,349 UART: [art] Store in in slot 0x4
2,905,250 UART: [art] Derive Key Pair
2,905,610 UART: [art] Store priv key in slot 0x5
2,918,412 UART: [art] Derive Key Pair - Done
2,932,957 UART: [art] Signing Cert with AUTHO
2,933,437 UART: RITY.KEYID = 7
2,948,421 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,186 UART: [art] PUB.X = 5A3BE1297DF4836043D523357FD145DBEEE713AD47E92E9AB4232E2D4ECC8A6B2A0A9D3C6B73C7FD9AF9BC320E52C455
2,955,968 UART: [art] PUB.Y = 05C326804FF3EAA3A12087F052358812632FFB85337C7E1B3D840A47A22F7A6528DBB7D1B5BFEC7FA8F835E091E8385F
2,962,918 UART: [art] SIG.R = 613144CA0C195DA8780509411B288442C6D56C4E2ACECCFD52794B1C57680FB51DFA640F3B58966367816384B4CB67E6
2,969,671 UART: [art] SIG.S = 20B305F49C9FEF05F25B06FF0CEB809355D1FE9F5515B3CB69D56AB1C77BFA1507BEEA04576B8C7175D5676E27124863
2,993,326 UART: Caliptra RT
2,993,671 UART: [state] CFI Enabled
3,101,486 UART: [rt] RT listening for mailbox commands...
3,102,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,592 UART: [rt]cmd =0x44504543, len=96
3,313,110 >>> mbox cmd response data (6236 bytes)
3,313,111 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,874 UART: [rt]cmd =0x53574545, len=84
3,368,581 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,328 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,174,391 ready_for_fw is high
1,174,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,459 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,778 UART: [fwproc] Wait for Commands...
1,281,455 UART: [fwproc] Recv command 0x46574c44
1,282,188 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,799 >>> mbox cmd response: success
2,772,024 UART: [afmc] ++
2,772,192 UART: [afmc] CDI.KEYID = 6
2,772,555 UART: [afmc] SUBJECT.KEYID = 7
2,772,981 UART: [afmc] AUTHORITY.KEYID = 5
2,807,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,993 UART: [afmc] --
2,851,081 UART: [cold-reset] --
2,851,695 UART: [state] Locking Datavault
2,852,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,548 UART: [state] Locking ICCM
2,854,038 UART: [exit] Launching FMC @ 0x40000130
2,859,367 UART:
2,859,383 UART: Running Caliptra FMC ...
2,859,791 UART:
2,859,845 UART: [state] CFI Enabled
2,870,558 UART: [fht] FMC Alias Private Key: 7
2,978,749 UART: [art] Extend RT PCRs Done
2,979,177 UART: [art] Lock RT PCRs Done
2,980,695 UART: [art] Populate DV Done
2,988,812 UART: [fht] FMC Alias Private Key: 7
2,989,854 UART: [art] Derive CDI
2,990,134 UART: [art] Store in in slot 0x4
3,075,839 UART: [art] Derive Key Pair
3,076,199 UART: [art] Store priv key in slot 0x5
3,089,299 UART: [art] Derive Key Pair - Done
3,104,085 UART: [art] Signing Cert with AUTHO
3,104,565 UART: RITY.KEYID = 7
3,119,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,504 UART: [art] PUB.X = 94F494781CB877EF1454A03E7FCB11EF98C95CC96C7C5051DC04DD52C5075A159D845982E760DA743BAD4E4CC63752C7
3,127,274 UART: [art] PUB.Y = FD3B68617B0B7F3535FC94B894BB4700D005404E7CCDB0440EE3FB736D52FB1663F215C9A88763DC0C68C7D2F08C1122
3,134,196 UART: [art] SIG.R = 828609029FEF4BA8B1D917D87E9D31B0E7E42EB16999A6F05772D511412350761AD7AF67E1301EB2973EC8C0E3F3123C
3,140,960 UART: [art] SIG.S = B7C69F45C849A258F0C0D463FD841D2F8D19142E7113A538C0552C4269F684DEC174272E6BFA73C12382E955197B4810
3,165,121 UART: Caliptra RT
3,165,374 UART: [state] CFI Enabled
3,273,046 UART: [rt] RT listening for mailbox commands...
3,273,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,066 UART: [rt]cmd =0x44504543, len=96
3,484,939 >>> mbox cmd response data (6236 bytes)
3,484,940 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,867 UART: [rt]cmd =0x53574545, len=84
3,540,168 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,510 ready_for_fw is high
1,055,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,507 >>> mbox cmd response: success
2,682,279 UART:
2,682,295 UART: Running Caliptra FMC ...
2,682,703 UART:
2,682,757 UART: [state] CFI Enabled
2,693,128 UART: [fht] FMC Alias Private Key: 7
2,800,131 UART: [art] Extend RT PCRs Done
2,800,559 UART: [art] Lock RT PCRs Done
2,801,725 UART: [art] Populate DV Done
2,809,836 UART: [fht] FMC Alias Private Key: 7
2,811,018 UART: [art] Derive CDI
2,811,298 UART: [art] Store in in slot 0x4
2,897,037 UART: [art] Derive Key Pair
2,897,397 UART: [art] Store priv key in slot 0x5
2,910,465 UART: [art] Derive Key Pair - Done
2,925,239 UART: [art] Signing Cert with AUTHO
2,925,719 UART: RITY.KEYID = 7
2,940,691 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,456 UART: [art] PUB.X = 9EB25ED9A338585D006BA07A7452EE75F9F2191FF9822BA8EEDA33796ED30637CE5305E5953B7BC7512D41CB153836A6
2,948,202 UART: [art] PUB.Y = 6E03A7B624512DAF24D57C2143FA6970E7E4D9098024D3119C3B3BF4A521C4C25FF2517E17A9B11A9E7A5CC2E9732CC3
2,955,152 UART: [art] SIG.R = 50A19503889858AD6C65CF04E48E9EA883979C18DBE960E02B50DE643F8D73FAC7298E3C19616DDF923A050F790971CC
2,961,909 UART: [art] SIG.S = 62F8B5314748D842DFE9BDB8AB7A160E3C4649040A0137C7338BDA3C9A28F10FF771AB92FFFAEFE3C72E0479B6412C97
2,986,144 UART: Caliptra RT
2,986,397 UART: [state] CFI Enabled
3,094,588 UART: [rt] RT listening for mailbox commands...
3,095,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,688 UART: [rt]cmd =0x44504543, len=96
3,305,674 >>> mbox cmd response data (6236 bytes)
3,305,675 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,646 UART: [rt]cmd =0x53574545, len=84
3,361,355 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,511 UART: [kat] LMS
1,168,823 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 ready_for_fw is high
1,174,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,198,862 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,365 UART: [ldev] Erasing FE.KEYID = 1
1,241,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,765 UART: [ldev] --
1,280,159 UART: [fwproc] Wait for Commands...
1,280,748 UART: [fwproc] Recv command 0x46574c44
1,281,481 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,876 >>> mbox cmd response: success
2,773,015 UART: [afmc] ++
2,773,183 UART: [afmc] CDI.KEYID = 6
2,773,546 UART: [afmc] SUBJECT.KEYID = 7
2,773,972 UART: [afmc] AUTHORITY.KEYID = 5
2,809,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,286 UART: [afmc] --
2,853,340 UART: [cold-reset] --
2,854,318 UART: [state] Locking Datavault
2,855,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,071 UART: [state] Locking ICCM
2,856,647 UART: [exit] Launching FMC @ 0x40000130
2,861,976 UART:
2,861,992 UART: Running Caliptra FMC ...
2,862,400 UART:
2,862,543 UART: [state] CFI Enabled
2,873,540 UART: [fht] FMC Alias Private Key: 7
2,982,175 UART: [art] Extend RT PCRs Done
2,982,603 UART: [art] Lock RT PCRs Done
2,984,013 UART: [art] Populate DV Done
2,992,402 UART: [fht] FMC Alias Private Key: 7
2,993,426 UART: [art] Derive CDI
2,993,706 UART: [art] Store in in slot 0x4
3,079,019 UART: [art] Derive Key Pair
3,079,379 UART: [art] Store priv key in slot 0x5
3,093,873 UART: [art] Derive Key Pair - Done
3,108,837 UART: [art] Signing Cert with AUTHO
3,109,317 UART: RITY.KEYID = 7
3,124,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,994 UART: [art] PUB.X = 330A6087F1A87AEA166449F21F07B13E4B59DBE0FAD07ABCCAAC29539F1B074748ABE7D6F0021BCC6F6211B4F9382C01
3,131,763 UART: [art] PUB.Y = B0BF63CDA6ED4AE802854D2A808634029CE902C1274E1B5C0D77CCF00C0370B5B821DCF00A64AABC37ED0F3CB625478B
3,138,705 UART: [art] SIG.R = 3CA73C4E628B7E87E4E0A0139A8C44477C65A5259F28FA518F0E845B3DBD4E8DA87A6D14E42A4928B8CD2A94EB413A29
3,145,482 UART: [art] SIG.S = BD9B39EA2E84FB915DA335D175D75C9F76C5FF9991F40E1E5413DA7EBFE6FB77CABD9864EB704A8DD7ECFF0C1FF28E2A
3,169,533 UART: Caliptra RT
3,169,878 UART: [state] CFI Enabled
3,277,793 UART: [rt] RT listening for mailbox commands...
3,278,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,025 UART: [rt]cmd =0x44504543, len=96
3,490,047 >>> mbox cmd response data (6236 bytes)
3,490,048 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,029 UART: [rt]cmd =0x53574545, len=84
3,545,116 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,577 ready_for_fw is high
1,056,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,600 >>> mbox cmd response: success
2,684,184 UART:
2,684,200 UART: Running Caliptra FMC ...
2,684,608 UART:
2,684,751 UART: [state] CFI Enabled
2,695,738 UART: [fht] FMC Alias Private Key: 7
2,803,815 UART: [art] Extend RT PCRs Done
2,804,243 UART: [art] Lock RT PCRs Done
2,805,713 UART: [art] Populate DV Done
2,813,762 UART: [fht] FMC Alias Private Key: 7
2,814,926 UART: [art] Derive CDI
2,815,206 UART: [art] Store in in slot 0x4
2,900,541 UART: [art] Derive Key Pair
2,900,901 UART: [art] Store priv key in slot 0x5
2,914,051 UART: [art] Derive Key Pair - Done
2,928,951 UART: [art] Signing Cert with AUTHO
2,929,431 UART: RITY.KEYID = 7
2,944,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,100 UART: [art] PUB.X = DAA082151B4449C0F34B9C2C983BCBF28F593DE027B3375BD9963D0E9B63EEEAB19046E8F33179850AEFB49F0DE712DA
2,951,875 UART: [art] PUB.Y = 81A7D1CAFFE6F47075F6EF2CF10BF648D35DBC9BD8344A2C9040672F4D1649A58C280DD56BF21EC004405411AD1FC5E8
2,958,830 UART: [art] SIG.R = 8BE9DC45E1F927DAF078385D8DC93D8C0F8CC79C6DC28498EE008A0D61C2047FA9BD86C2AFDEEA04BF72B8F85421ED93
2,965,588 UART: [art] SIG.S = 8B20A8F603D7A4F3F7BA804F4B9B381526240DF8E6919CCEBC9CF04E283AABC53655B0B49FAD30DB04FD8FF1C1724031
2,989,626 UART: Caliptra RT
2,989,971 UART: [state] CFI Enabled
3,096,893 UART: [rt] RT listening for mailbox commands...
3,097,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,173 UART: [rt]cmd =0x44504543, len=96
3,309,024 >>> mbox cmd response data (6236 bytes)
3,309,025 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,866 UART: [rt]cmd =0x53574545, len=84
3,365,051 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,121 UART: [kat] SHA2-256
882,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,167 UART: [kat] ++
886,319 UART: [kat] sha1
890,611 UART: [kat] SHA2-256
892,549 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,240 UART: [kat] LMS
1,475,436 UART: [kat] --
1,476,225 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 ready_for_fw is high
1,480,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,120 UART: [idev] Erasing UDS.KEYID = 0
1,504,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,456 UART: [idev] --
1,514,561 UART: [ldev] ++
1,514,729 UART: [ldev] CDI.KEYID = 6
1,515,092 UART: [ldev] SUBJECT.KEYID = 5
1,515,518 UART: [ldev] AUTHORITY.KEYID = 7
1,515,981 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,545,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,354 UART: [ldev] --
1,585,793 UART: [fwproc] Waiting for Commands...
1,586,412 UART: [fwproc] Received command 0x46574c44
1,587,203 UART: [fwproc] Received Image of size 114332 bytes
2,884,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,011 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,304 >>> mbox cmd response: success
3,078,404 UART: [afmc] ++
3,078,572 UART: [afmc] CDI.KEYID = 6
3,078,934 UART: [afmc] SUBJECT.KEYID = 7
3,079,359 UART: [afmc] AUTHORITY.KEYID = 5
3,114,698 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,554 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,947 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,637 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,430 UART: [afmc] --
3,157,554 UART: [cold-reset] --
3,158,566 UART: [state] Locking Datavault
3,159,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,281 UART: [state] Locking ICCM
3,160,859 UART: [exit] Launching FMC @ 0x40000130
3,166,188 UART:
3,166,204 UART: Running Caliptra FMC ...
3,166,612 UART:
3,166,666 UART: [state] CFI Enabled
3,177,613 UART: [fht] FMC Alias Private Key: 7
3,285,402 UART: [art] Extend RT PCRs Done
3,285,830 UART: [art] Lock RT PCRs Done
3,287,670 UART: [art] Populate DV Done
3,295,841 UART: [fht] FMC Alias Private Key: 7
3,296,825 UART: [art] Derive CDI
3,297,105 UART: [art] Store in in slot 0x4
3,382,564 UART: [art] Derive Key Pair
3,382,924 UART: [art] Store priv key in slot 0x5
3,395,890 UART: [art] Derive Key Pair - Done
3,410,424 UART: [art] Signing Cert with AUTHO
3,410,904 UART: RITY.KEYID = 7
3,425,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,639 UART: [art] PUB.X = 7F423155C023CA00373213E6F2300C8FF0EFF02E14323F0A1CEAA51A08AC7C5244A1B847511038578C6E631E175920B0
3,433,374 UART: [art] PUB.Y = FB323FE3F6A4CAF7B63211CD63704F9A395A4DD0F53A262943DEECEF8398AD6C65A9DDBCE33A9339ACFF7D35EB9B2071
3,440,348 UART: [art] SIG.R = BE97C2799875C0023708582131709893316D2123630E8115923B7BF087331B838F611FDECD96A0FE2D204A41C2A8701D
3,447,095 UART: [art] SIG.S = 366590F0EB880C25262A31DA42BC8F862C4454C46589EE647129CC4737897ED398B40494B5F525E4011F6C437C7D74DC
3,471,341 UART: Caliptra RT
3,471,594 UART: [state] CFI Enabled
3,580,069 UART: [rt] RT listening for mailbox commands...
3,580,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,101 UART: [rt]cmd =0x44504543, len=96
3,791,706 >>> mbox cmd response data (6236 bytes)
3,791,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,848 UART: [rt]cmd =0x44504543, len=96
3,853,935 >>> mbox cmd response data (56 bytes)
3,853,936 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,507 UART: [rt]cmd =0x52564348, len=36
3,885,700 >>> mbox cmd response data (8 bytes)
3,885,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,546 UART: [rt]cmd =0x44504543, len=96
4,096,299 >>> mbox cmd response data (6236 bytes)
4,096,300 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,019 UART: [rt]cmd =0x53574545, len=84
4,151,206 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,791 ready_for_fw is high
1,362,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,922 >>> mbox cmd response: success
2,989,496 UART:
2,989,512 UART: Running Caliptra FMC ...
2,989,920 UART:
2,989,974 UART: [state] CFI Enabled
3,000,583 UART: [fht] FMC Alias Private Key: 7
3,108,782 UART: [art] Extend RT PCRs Done
3,109,210 UART: [art] Lock RT PCRs Done
3,111,052 UART: [art] Populate DV Done
3,119,221 UART: [fht] FMC Alias Private Key: 7
3,120,283 UART: [art] Derive CDI
3,120,563 UART: [art] Store in in slot 0x4
3,205,876 UART: [art] Derive Key Pair
3,206,236 UART: [art] Store priv key in slot 0x5
3,219,914 UART: [art] Derive Key Pair - Done
3,234,497 UART: [art] Signing Cert with AUTHO
3,234,977 UART: RITY.KEYID = 7
3,250,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,098 UART: [art] PUB.X = E59AA528391FF8BC43A3577364C87C10126DC6C4558316EF7CCE54686C78519ABD810B19763424C37A2CF65C74C89D63
3,257,863 UART: [art] PUB.Y = 36232C04CFAF5F787FADC0F941DDBA7649D3F64B7C9600D5FCB455025D82220F88651CF154B5191B875BEDE132AC40B1
3,264,792 UART: [art] SIG.R = 280DEB5F4534E71B4218E3760047ABB726D2F3F1450BE3CF48988C4FD9BE9748B9156366C7F7CB399BA387AF4257FBF9
3,271,540 UART: [art] SIG.S = 6DCAC42325358361FCE20F631D9AFBD61462180F73B282233243146C7538ED4E3AF6609FB451936569F5FA7C8F7B33B5
3,295,735 UART: Caliptra RT
3,295,988 UART: [state] CFI Enabled
3,403,900 UART: [rt] RT listening for mailbox commands...
3,404,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,662 UART: [rt]cmd =0x44504543, len=96
3,615,157 >>> mbox cmd response data (6236 bytes)
3,615,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,241 UART: [rt]cmd =0x44504543, len=96
3,675,804 >>> mbox cmd response data (56 bytes)
3,675,805 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,216 UART: [rt]cmd =0x52564348, len=36
3,707,417 >>> mbox cmd response data (8 bytes)
3,707,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,453 UART: [rt]cmd =0x44504543, len=96
3,917,520 >>> mbox cmd response data (6236 bytes)
3,917,521 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,334 UART: [rt]cmd =0x53574545, len=84
3,973,225 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,964 UART: [kat] SHA2-256
881,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,010 UART: [kat] ++
886,162 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,159 UART: [kat] SHA2-512-ACC
897,060 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,168 UART: [cold-reset] ++
1,476,602 UART: [fht] Storing FHT @ 0x50003400
1,479,341 UART: [idev] ++
1,479,509 UART: [idev] CDI.KEYID = 6
1,479,869 UART: [idev] SUBJECT.KEYID = 7
1,480,293 UART: [idev] UDS.KEYID = 0
1,480,638 ready_for_fw is high
1,480,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,251 UART: [idev] Erasing UDS.KEYID = 0
1,504,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,089 UART: [idev] --
1,514,160 UART: [ldev] ++
1,514,328 UART: [ldev] CDI.KEYID = 6
1,514,691 UART: [ldev] SUBJECT.KEYID = 5
1,515,117 UART: [ldev] AUTHORITY.KEYID = 7
1,515,580 UART: [ldev] FE.KEYID = 1
1,520,962 UART: [ldev] Erasing FE.KEYID = 1
1,546,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,585 UART: [ldev] --
1,586,032 UART: [fwproc] Waiting for Commands...
1,586,747 UART: [fwproc] Received command 0x46574c44
1,587,538 UART: [fwproc] Received Image of size 114332 bytes
2,884,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,582 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,909 >>> mbox cmd response: success
3,078,107 UART: [afmc] ++
3,078,275 UART: [afmc] CDI.KEYID = 6
3,078,637 UART: [afmc] SUBJECT.KEYID = 7
3,079,062 UART: [afmc] AUTHORITY.KEYID = 5
3,114,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,218 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,908 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,915 UART: [afmc] --
3,157,869 UART: [cold-reset] --
3,158,795 UART: [state] Locking Datavault
3,160,160 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,764 UART: [state] Locking ICCM
3,161,380 UART: [exit] Launching FMC @ 0x40000130
3,166,709 UART:
3,166,725 UART: Running Caliptra FMC ...
3,167,133 UART:
3,167,276 UART: [state] CFI Enabled
3,177,735 UART: [fht] FMC Alias Private Key: 7
3,285,520 UART: [art] Extend RT PCRs Done
3,285,948 UART: [art] Lock RT PCRs Done
3,287,310 UART: [art] Populate DV Done
3,295,523 UART: [fht] FMC Alias Private Key: 7
3,296,615 UART: [art] Derive CDI
3,296,895 UART: [art] Store in in slot 0x4
3,382,738 UART: [art] Derive Key Pair
3,383,098 UART: [art] Store priv key in slot 0x5
3,396,386 UART: [art] Derive Key Pair - Done
3,411,408 UART: [art] Signing Cert with AUTHO
3,411,888 UART: RITY.KEYID = 7
3,427,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,197 UART: [art] PUB.X = CEDBD6330C47A0F115DFA2F4F90DB134A86BDE41B485B563342747363EC62FAA50E9F1D0566CD11BE12EBC4F7CFA9DE9
3,434,983 UART: [art] PUB.Y = F89EF29DD8148E8274119BE1914E6AAB58E4A50DA07E39F02E888929C8B0AC28766CE8E75B435B81E707542A632EE483
3,441,929 UART: [art] SIG.R = C1260165ACD9F0E37F28C82C46522620001ABB91E4C85A882208B4AD332548E4ADC2F3D3E6CF70C0A2697922B0B2BACE
3,448,679 UART: [art] SIG.S = 1DFC3FF57513E859F84D9B34F9EF4BD877A5E029856E16D4023986D1427053FC57E6C598F3E1BD8F268FF583138F8222
3,472,585 UART: Caliptra RT
3,472,930 UART: [state] CFI Enabled
3,581,193 UART: [rt] RT listening for mailbox commands...
3,581,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,271 UART: [rt]cmd =0x44504543, len=96
3,792,687 >>> mbox cmd response data (6236 bytes)
3,792,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,655 UART: [rt]cmd =0x44504543, len=96
3,855,124 >>> mbox cmd response data (56 bytes)
3,855,125 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,692 UART: [rt]cmd =0x52564348, len=36
3,886,673 >>> mbox cmd response data (8 bytes)
3,886,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,401 UART: [rt]cmd =0x44504543, len=96
4,097,171 >>> mbox cmd response data (6236 bytes)
4,097,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,127,021 UART: [rt]cmd =0x53574545, len=84
4,152,326 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,764 ready_for_fw is high
1,362,764 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,543 >>> mbox cmd response: success
2,988,275 UART:
2,988,291 UART: Running Caliptra FMC ...
2,988,699 UART:
2,988,842 UART: [state] CFI Enabled
2,999,567 UART: [fht] FMC Alias Private Key: 7
3,107,384 UART: [art] Extend RT PCRs Done
3,107,812 UART: [art] Lock RT PCRs Done
3,109,718 UART: [art] Populate DV Done
3,117,823 UART: [fht] FMC Alias Private Key: 7
3,118,961 UART: [art] Derive CDI
3,119,241 UART: [art] Store in in slot 0x4
3,204,698 UART: [art] Derive Key Pair
3,205,058 UART: [art] Store priv key in slot 0x5
3,218,532 UART: [art] Derive Key Pair - Done
3,233,017 UART: [art] Signing Cert with AUTHO
3,233,497 UART: RITY.KEYID = 7
3,249,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,930 UART: [art] PUB.X = 8EBF7CBC86B183A50C6B962216CBDDFFD112928D11DA281045DD120C7B1F6A1A9A3B57CD9D94026C095E850F21721BD1
3,256,697 UART: [art] PUB.Y = 6855FE1C76F08ECC031C2E3AF63508C9E8153E8665C96009BABAA2E479E7547E05189D8C528E22614836E9855E40BE8A
3,263,635 UART: [art] SIG.R = 7861AF14245F165D22AEC4534530E344C8736D38724DA6B2E5372BADDD356BEF31E4BEBF49E1537A01714B77EEA2B129
3,270,408 UART: [art] SIG.S = 84B64EB6C37B1FDCFA7308EC7626B3D2AD5713FCAEF90904F7EFFF4B91852A430A690551CAA5947F99D7453F27B548C8
3,294,470 UART: Caliptra RT
3,294,815 UART: [state] CFI Enabled
3,402,904 UART: [rt] RT listening for mailbox commands...
3,403,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,098 UART: [rt]cmd =0x44504543, len=96
3,614,552 >>> mbox cmd response data (6236 bytes)
3,614,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,404 UART: [rt]cmd =0x44504543, len=96
3,676,067 >>> mbox cmd response data (56 bytes)
3,676,068 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,483 UART: [rt]cmd =0x52564348, len=36
3,707,464 >>> mbox cmd response data (8 bytes)
3,707,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,508 UART: [rt]cmd =0x44504543, len=96
3,919,051 >>> mbox cmd response data (6236 bytes)
3,919,052 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,897 UART: [rt]cmd =0x53574545, len=84
3,974,632 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,135 UART: [kat] SHA2-256
904,075 UART: [kat] SHA2-384
906,940 UART: [kat] SHA2-512-ACC
908,841 UART: [kat] ECC-384
918,658 UART: [kat] HMAC-384Kdf
923,192 UART: [kat] LMS
1,171,520 UART: [kat] --
1,172,355 UART: [cold-reset] ++
1,172,707 UART: [fht] FHT @ 0x50003400
1,175,322 UART: [idev] ++
1,175,490 UART: [idev] CDI.KEYID = 6
1,175,850 UART: [idev] SUBJECT.KEYID = 7
1,176,274 UART: [idev] UDS.KEYID = 0
1,176,619 ready_for_fw is high
1,176,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,201,613 UART: [idev] Sha1 KeyId Algorithm
1,210,149 UART: [idev] --
1,211,163 UART: [ldev] ++
1,211,331 UART: [ldev] CDI.KEYID = 6
1,211,694 UART: [ldev] SUBJECT.KEYID = 5
1,212,120 UART: [ldev] AUTHORITY.KEYID = 7
1,212,583 UART: [ldev] FE.KEYID = 1
1,217,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,879 UART: [ldev] --
1,283,242 UART: [fwproc] Wait for Commands...
1,284,034 UART: [fwproc] Recv command 0x46574c44
1,284,762 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,461 >>> mbox cmd response: success
2,775,573 UART: [afmc] ++
2,775,741 UART: [afmc] CDI.KEYID = 6
2,776,103 UART: [afmc] SUBJECT.KEYID = 7
2,776,528 UART: [afmc] AUTHORITY.KEYID = 5
2,812,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,322 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,166 UART: [afmc] --
2,856,222 UART: [cold-reset] --
2,856,990 UART: [state] Locking Datavault
2,858,031 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,635 UART: [state] Locking ICCM
2,859,121 UART: [exit] Launching FMC @ 0x40000130
2,864,450 UART:
2,864,466 UART: Running Caliptra FMC ...
2,864,874 UART:
2,864,928 UART: [state] CFI Enabled
2,875,273 UART: [fht] FMC Alias Private Key: 7
2,982,758 UART: [art] Extend RT PCRs Done
2,983,186 UART: [art] Lock RT PCRs Done
2,984,698 UART: [art] Populate DV Done
2,992,991 UART: [fht] FMC Alias Private Key: 7
2,994,045 UART: [art] Derive CDI
2,994,325 UART: [art] Store in in slot 0x4
3,079,884 UART: [art] Derive Key Pair
3,080,244 UART: [art] Store priv key in slot 0x5
3,093,938 UART: [art] Derive Key Pair - Done
3,108,786 UART: [art] Signing Cert with AUTHO
3,109,266 UART: RITY.KEYID = 7
3,124,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,279 UART: [art] PUB.X = 3A4F20C96AA04613442335C90E43F310D7A954E08CE42898582C56BAA9C1B115B4199AC0D74E50870FF05785A8FA82C2
3,132,041 UART: [art] PUB.Y = 5FD3A044EEDEF61E1766ECF9472372E65AD59FBC9376BC506358FADF07A910C4A5453E5976367461B63D96064F10FD7B
3,138,991 UART: [art] SIG.R = C298DAE7EE64F6E291553B37E68E51A1A7CFEFADA37CC75F124C58BE58D947357C95A6D6A24E74AA4FE1D8CDA783DD09
3,145,780 UART: [art] SIG.S = FF0080095352029E391125D786B0DC482900C93A2B53604D970EA152CD7C9241622935DC0404805236A94BB0274F899B
3,169,448 UART: Caliptra RT
3,169,701 UART: [state] CFI Enabled
3,278,223 UART: [rt] RT listening for mailbox commands...
3,278,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,331 UART: [rt]cmd =0x44504543, len=96
3,490,039 >>> mbox cmd response data (6236 bytes)
3,490,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,959 UART: [rt]cmd =0x44504543, len=96
3,551,628 >>> mbox cmd response data (56 bytes)
3,551,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,106 UART: [rt]cmd =0x52564348, len=36
3,583,239 >>> mbox cmd response data (8 bytes)
3,583,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,257 UART: [rt]cmd =0x44504543, len=96
3,794,280 >>> mbox cmd response data (6236 bytes)
3,794,281 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,080 UART: [rt]cmd =0x53574545, len=84
3,848,989 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 ready_for_fw is high
1,059,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,016 >>> mbox cmd response: success
2,689,790 UART:
2,689,806 UART: Running Caliptra FMC ...
2,690,214 UART:
2,690,268 UART: [state] CFI Enabled
2,700,641 UART: [fht] FMC Alias Private Key: 7
2,808,396 UART: [art] Extend RT PCRs Done
2,808,824 UART: [art] Lock RT PCRs Done
2,810,632 UART: [art] Populate DV Done
2,819,079 UART: [fht] FMC Alias Private Key: 7
2,820,227 UART: [art] Derive CDI
2,820,507 UART: [art] Store in in slot 0x4
2,906,444 UART: [art] Derive Key Pair
2,906,804 UART: [art] Store priv key in slot 0x5
2,919,846 UART: [art] Derive Key Pair - Done
2,934,776 UART: [art] Signing Cert with AUTHO
2,935,256 UART: RITY.KEYID = 7
2,950,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,429 UART: [art] PUB.X = A4B7090A5DD7B38C53B69A08A40E26E959773C1FC39FE8A01454B5F60B3411625EA273A11F414F39B74FC1AD23A4E8EA
2,958,192 UART: [art] PUB.Y = 1B789F8CE8692304F63CFC9FF47600BD0332EF29971A9EEDEDBA28B6380FF139F589800DFB402DA01757F4AF824D0863
2,965,113 UART: [art] SIG.R = 6F6282BEB267775B060B9C9DD8AD3732CB78BF9C7925446294EC0FC4AE27E0FAB6FE474DF4FC2B34FE0485EFF5D3EAE7
2,971,893 UART: [art] SIG.S = EE8E2047586E6E8EDD74EBC11D23A93253371340662578B8C72A8CB6BFBA29657F6E1F83FD40A104EF862379D3219E66
2,995,507 UART: Caliptra RT
2,995,760 UART: [state] CFI Enabled
3,103,555 UART: [rt] RT listening for mailbox commands...
3,104,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,675 UART: [rt]cmd =0x44504543, len=96
3,315,930 >>> mbox cmd response data (6236 bytes)
3,315,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,022 UART: [rt]cmd =0x44504543, len=96
3,378,123 >>> mbox cmd response data (56 bytes)
3,378,124 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,691 UART: [rt]cmd =0x52564348, len=36
3,409,804 >>> mbox cmd response data (8 bytes)
3,409,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,708 UART: [rt]cmd =0x44504543, len=96
3,620,443 >>> mbox cmd response data (6236 bytes)
3,620,444 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,571 UART: [rt]cmd =0x53574545, len=84
3,676,098 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
893,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,788 UART: [kat] ++
897,940 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,173,000 UART: [fht] FHT @ 0x50003400
1,175,855 UART: [idev] ++
1,176,023 UART: [idev] CDI.KEYID = 6
1,176,383 UART: [idev] SUBJECT.KEYID = 7
1,176,807 UART: [idev] UDS.KEYID = 0
1,177,152 ready_for_fw is high
1,177,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,075 UART: [idev] Erasing UDS.KEYID = 0
1,202,022 UART: [idev] Sha1 KeyId Algorithm
1,210,552 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,168 UART: [ldev] Erasing FE.KEYID = 1
1,245,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,034 UART: [ldev] --
1,285,387 UART: [fwproc] Wait for Commands...
1,286,117 UART: [fwproc] Recv command 0x46574c44
1,286,845 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,106 >>> mbox cmd response: success
2,777,266 UART: [afmc] ++
2,777,434 UART: [afmc] CDI.KEYID = 6
2,777,796 UART: [afmc] SUBJECT.KEYID = 7
2,778,221 UART: [afmc] AUTHORITY.KEYID = 5
2,813,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,947 UART: [afmc] --
2,856,965 UART: [cold-reset] --
2,857,835 UART: [state] Locking Datavault
2,859,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,640 UART: [state] Locking ICCM
2,860,182 UART: [exit] Launching FMC @ 0x40000130
2,865,511 UART:
2,865,527 UART: Running Caliptra FMC ...
2,865,935 UART:
2,866,078 UART: [state] CFI Enabled
2,876,807 UART: [fht] FMC Alias Private Key: 7
2,984,990 UART: [art] Extend RT PCRs Done
2,985,418 UART: [art] Lock RT PCRs Done
2,987,004 UART: [art] Populate DV Done
2,995,301 UART: [fht] FMC Alias Private Key: 7
2,996,387 UART: [art] Derive CDI
2,996,667 UART: [art] Store in in slot 0x4
3,082,344 UART: [art] Derive Key Pair
3,082,704 UART: [art] Store priv key in slot 0x5
3,095,786 UART: [art] Derive Key Pair - Done
3,110,490 UART: [art] Signing Cert with AUTHO
3,110,970 UART: RITY.KEYID = 7
3,126,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,147 UART: [art] PUB.X = 087DF90DA888DE75F21105829FC86D14FF5C8FF7F27F8714A6FACA9C32DFD096D4A57AF1E3C8BE211832E6A2A97E1DD1
3,133,926 UART: [art] PUB.Y = 48EC9DA2DFBAB5D7C042FCD8077A52B8565B11690AACD0DC11807420D0E485223F77E82020EC5BBD18AAB91277A1EDB4
3,140,886 UART: [art] SIG.R = 5FBA43BF015F308F14B9E52DB1D6A714EFC4D7DDC255DB00C69E19048A6A5D8741BBEF92BA33994C4C2B53D528C71307
3,147,639 UART: [art] SIG.S = F89CD4516F76AEE79A8CE820358BA14E344987ACC7B4D35968D6E566BBF96E9B0D9581D8873C975D5563874F845E8AC2
3,171,687 UART: Caliptra RT
3,172,032 UART: [state] CFI Enabled
3,279,229 UART: [rt] RT listening for mailbox commands...
3,279,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,115 UART: [rt]cmd =0x44504543, len=96
3,492,306 >>> mbox cmd response data (6236 bytes)
3,492,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,214 UART: [rt]cmd =0x44504543, len=96
3,554,473 >>> mbox cmd response data (56 bytes)
3,554,474 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,795 UART: [rt]cmd =0x52564348, len=36
3,585,790 >>> mbox cmd response data (8 bytes)
3,585,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,694 UART: [rt]cmd =0x44504543, len=96
3,796,951 >>> mbox cmd response data (6236 bytes)
3,796,952 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,795 UART: [rt]cmd =0x53574545, len=84
3,852,958 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,726 ready_for_fw is high
1,060,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,161 >>> mbox cmd response: success
2,688,873 UART:
2,688,889 UART: Running Caliptra FMC ...
2,689,297 UART:
2,689,440 UART: [state] CFI Enabled
2,700,047 UART: [fht] FMC Alias Private Key: 7
2,808,214 UART: [art] Extend RT PCRs Done
2,808,642 UART: [art] Lock RT PCRs Done
2,810,368 UART: [art] Populate DV Done
2,818,473 UART: [fht] FMC Alias Private Key: 7
2,819,447 UART: [art] Derive CDI
2,819,727 UART: [art] Store in in slot 0x4
2,904,916 UART: [art] Derive Key Pair
2,905,276 UART: [art] Store priv key in slot 0x5
2,919,092 UART: [art] Derive Key Pair - Done
2,934,018 UART: [art] Signing Cert with AUTHO
2,934,498 UART: RITY.KEYID = 7
2,950,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,835 UART: [art] PUB.X = FCA2369726CAA9ECC86F03F382D91333CD7FCD83A2F7197E5DC410946DB85595626FFD223BC8E09246C4DACA7AF00AEA
2,957,617 UART: [art] PUB.Y = 4AFC1B4373437B9C025349A0251B6049026DAF79BBDB0A46F86C424E40D413414C17BD5AEDFA5D387A61AB955CC5DEDB
2,964,572 UART: [art] SIG.R = 6FF76FF1E396F7C231C6B8E8D0C72596B109312EC4769149A918C1168C0402AAEF3B4CCECF258F5E9B8B696A2DD881D4
2,971,343 UART: [art] SIG.S = 215F8D5C50B5FC692B4F38646C5761D95DF27AF7814C3BB82F6C57D3B12F93DF6ACBFCC6EE596CC9139795C8FBDF1105
2,995,479 UART: Caliptra RT
2,995,824 UART: [state] CFI Enabled
3,104,467 UART: [rt] RT listening for mailbox commands...
3,105,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,569 UART: [rt]cmd =0x44504543, len=96
3,315,668 >>> mbox cmd response data (6236 bytes)
3,315,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,782 UART: [rt]cmd =0x44504543, len=96
3,377,935 >>> mbox cmd response data (56 bytes)
3,377,936 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,607 UART: [rt]cmd =0x52564348, len=36
3,409,798 >>> mbox cmd response data (8 bytes)
3,409,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,796 UART: [rt]cmd =0x44504543, len=96
3,621,637 >>> mbox cmd response data (6236 bytes)
3,621,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,507 UART: [rt]cmd =0x53574545, len=84
3,677,462 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,174,139 ready_for_fw is high
1,174,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,707 UART: [fwproc] Recv command 0x46574c44
1,282,440 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,785 >>> mbox cmd response: success
2,773,836 UART: [afmc] ++
2,774,004 UART: [afmc] CDI.KEYID = 6
2,774,367 UART: [afmc] SUBJECT.KEYID = 7
2,774,793 UART: [afmc] AUTHORITY.KEYID = 5
2,809,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,541 UART: [afmc] --
2,852,665 UART: [cold-reset] --
2,853,663 UART: [state] Locking Datavault
2,854,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,314 UART: [state] Locking ICCM
2,855,956 UART: [exit] Launching FMC @ 0x40000130
2,861,285 UART:
2,861,301 UART: Running Caliptra FMC ...
2,861,709 UART:
2,861,763 UART: [state] CFI Enabled
2,872,340 UART: [fht] FMC Alias Private Key: 7
2,980,251 UART: [art] Extend RT PCRs Done
2,980,679 UART: [art] Lock RT PCRs Done
2,982,339 UART: [art] Populate DV Done
2,990,512 UART: [fht] FMC Alias Private Key: 7
2,991,570 UART: [art] Derive CDI
2,991,850 UART: [art] Store in in slot 0x4
3,077,825 UART: [art] Derive Key Pair
3,078,185 UART: [art] Store priv key in slot 0x5
3,091,901 UART: [art] Derive Key Pair - Done
3,106,551 UART: [art] Signing Cert with AUTHO
3,107,031 UART: RITY.KEYID = 7
3,122,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,862 UART: [art] PUB.X = 810A37796BF0AFA174FB53E7FAB94B3F8A8A4D1F9DD5BDF6A607ED51FB2131A73C886F13C13954E60A6C55090871C62B
3,129,629 UART: [art] PUB.Y = 4D08CD81144C53D73CE0026F56C8362A381881C2E6541414632FECE325A8E73F4D9A6A5C51D35F7FCB4BDC78C978D77F
3,136,579 UART: [art] SIG.R = 23554F36D2C83BB3AD13B2478DCABBEC83CF9D6C95A8F9717962800E3C16AEC050AFE192563EF03A78BC54D563EBDF5C
3,143,364 UART: [art] SIG.S = 4CC7EC343C3F683DF462A735BD86483ED56A60215B3428CBDA1F4232AFC5AF206AFEDD3FDC7C9418E363A3EF46E49BB0
3,167,059 UART: Caliptra RT
3,167,312 UART: [state] CFI Enabled
3,274,895 UART: [rt] RT listening for mailbox commands...
3,275,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,715 UART: [rt]cmd =0x44504543, len=96
3,486,277 >>> mbox cmd response data (6236 bytes)
3,486,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,255 UART: [rt]cmd =0x44504543, len=96
3,548,480 >>> mbox cmd response data (56 bytes)
3,548,481 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,152 UART: [rt]cmd =0x52564348, len=36
3,580,565 >>> mbox cmd response data (8 bytes)
3,580,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,671 UART: [rt]cmd =0x44504543, len=96
3,791,050 >>> mbox cmd response data (6236 bytes)
3,791,051 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,830 UART: [rt]cmd =0x53574545, len=84
3,847,091 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,526 ready_for_fw is high
1,056,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,217 >>> mbox cmd response: success
2,683,815 UART:
2,683,831 UART: Running Caliptra FMC ...
2,684,239 UART:
2,684,293 UART: [state] CFI Enabled
2,694,842 UART: [fht] FMC Alias Private Key: 7
2,802,879 UART: [art] Extend RT PCRs Done
2,803,307 UART: [art] Lock RT PCRs Done
2,804,993 UART: [art] Populate DV Done
2,813,258 UART: [fht] FMC Alias Private Key: 7
2,814,372 UART: [art] Derive CDI
2,814,652 UART: [art] Store in in slot 0x4
2,900,007 UART: [art] Derive Key Pair
2,900,367 UART: [art] Store priv key in slot 0x5
2,913,897 UART: [art] Derive Key Pair - Done
2,928,914 UART: [art] Signing Cert with AUTHO
2,929,394 UART: RITY.KEYID = 7
2,944,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,363 UART: [art] PUB.X = BE73145236FA1849FB2FE0AEEE61A326670CA040EA31D7DA24E09583513B6D4B051CDB52D33EAABB54901E994E5A9923
2,952,137 UART: [art] PUB.Y = 481571A6B7B63810D33AD1BD824E9704275C5242B832D8C0B56424DB449CF1645D2617E75AE5CC9274B22D1024C88D85
2,959,078 UART: [art] SIG.R = 827D10817813E8AB6545109807D3C273B0ACE9D9D0B3B8F7AFC4B39F45B1357DAD1B88611B855DB7CDD9B4F4834E38D8
2,965,853 UART: [art] SIG.S = 571B6413D524D258B6FED102080F31823FADB3F46B05919E7AA9CCE41519E666606C1CE45556085D12497D78F3EB3B84
2,989,351 UART: Caliptra RT
2,989,604 UART: [state] CFI Enabled
3,097,705 UART: [rt] RT listening for mailbox commands...
3,098,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,411 UART: [rt]cmd =0x44504543, len=96
3,309,487 >>> mbox cmd response data (6236 bytes)
3,309,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,155 UART: [rt]cmd =0x44504543, len=96
3,371,678 >>> mbox cmd response data (56 bytes)
3,371,679 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,218 UART: [rt]cmd =0x52564348, len=36
3,403,361 >>> mbox cmd response data (8 bytes)
3,403,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,417 UART: [rt]cmd =0x44504543, len=96
3,614,629 >>> mbox cmd response data (6236 bytes)
3,614,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,745 UART: [rt]cmd =0x53574545, len=84
3,669,492 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 ready_for_fw is high
1,174,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,833 UART: [fwproc] Wait for Commands...
1,282,642 UART: [fwproc] Recv command 0x46574c44
1,283,375 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,764 >>> mbox cmd response: success
2,772,869 UART: [afmc] ++
2,773,037 UART: [afmc] CDI.KEYID = 6
2,773,400 UART: [afmc] SUBJECT.KEYID = 7
2,773,826 UART: [afmc] AUTHORITY.KEYID = 5
2,809,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,100 UART: [afmc] --
2,853,098 UART: [cold-reset] --
2,853,678 UART: [state] Locking Datavault
2,855,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,723 UART: [state] Locking ICCM
2,856,247 UART: [exit] Launching FMC @ 0x40000130
2,861,576 UART:
2,861,592 UART: Running Caliptra FMC ...
2,862,000 UART:
2,862,143 UART: [state] CFI Enabled
2,872,860 UART: [fht] FMC Alias Private Key: 7
2,980,985 UART: [art] Extend RT PCRs Done
2,981,413 UART: [art] Lock RT PCRs Done
2,983,033 UART: [art] Populate DV Done
2,991,248 UART: [fht] FMC Alias Private Key: 7
2,992,372 UART: [art] Derive CDI
2,992,652 UART: [art] Store in in slot 0x4
3,078,365 UART: [art] Derive Key Pair
3,078,725 UART: [art] Store priv key in slot 0x5
3,091,279 UART: [art] Derive Key Pair - Done
3,106,290 UART: [art] Signing Cert with AUTHO
3,106,770 UART: RITY.KEYID = 7
3,122,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,095 UART: [art] PUB.X = BECBCFCB6C70F0439A368CA2E35A47FDC1E2F54044749CCA8B58FB776DBC9231775F02A8C70AE1EC719D8F3368BA94ED
3,129,881 UART: [art] PUB.Y = 0E03D9B96184AED19F571CC2A2BEA74A708A6950A9825B54966F4BF230340A6C0C9556ED90C519CAC649A67281259F2E
3,136,821 UART: [art] SIG.R = D73BE1B31F2753C008818BD2135F3EF3C47FF0695DDA8BB53D1A1ADFF18D0B4091CF549BFADBD179D0A6A5021DDA5CCC
3,143,608 UART: [art] SIG.S = FD10248BB202E88BA81339B97F06E1A11E2158D28DAED604224F2655413F4119412F96EDB9F52EF193835101E3D4FF99
3,167,755 UART: Caliptra RT
3,168,100 UART: [state] CFI Enabled
3,275,520 UART: [rt] RT listening for mailbox commands...
3,276,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,648 UART: [rt]cmd =0x44504543, len=96
3,488,479 >>> mbox cmd response data (6236 bytes)
3,488,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,509 UART: [rt]cmd =0x44504543, len=96
3,550,274 >>> mbox cmd response data (56 bytes)
3,550,275 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,928 UART: [rt]cmd =0x52564348, len=36
3,582,117 >>> mbox cmd response data (8 bytes)
3,582,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,949 UART: [rt]cmd =0x44504543, len=96
3,793,544 >>> mbox cmd response data (6236 bytes)
3,793,545 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,418 UART: [rt]cmd =0x53574545, len=84
3,849,437 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 ready_for_fw is high
1,055,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,094 >>> mbox cmd response: success
2,684,086 UART:
2,684,102 UART: Running Caliptra FMC ...
2,684,510 UART:
2,684,653 UART: [state] CFI Enabled
2,694,866 UART: [fht] FMC Alias Private Key: 7
2,803,137 UART: [art] Extend RT PCRs Done
2,803,565 UART: [art] Lock RT PCRs Done
2,804,771 UART: [art] Populate DV Done
2,813,150 UART: [fht] FMC Alias Private Key: 7
2,814,320 UART: [art] Derive CDI
2,814,600 UART: [art] Store in in slot 0x4
2,900,127 UART: [art] Derive Key Pair
2,900,487 UART: [art] Store priv key in slot 0x5
2,913,839 UART: [art] Derive Key Pair - Done
2,928,429 UART: [art] Signing Cert with AUTHO
2,928,909 UART: RITY.KEYID = 7
2,944,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,022 UART: [art] PUB.X = A5A43941881C3C776687144127395137DFD73571F4E96790EBEB091665A128CEE400308F1549BA3BE55A0D4A89F73626
2,951,754 UART: [art] PUB.Y = 720A3C50980BA71A7BD557953746721A123E8B97AF79088FACA21849203AB7E6D935D57277F48C1005861AB0729F175F
2,958,684 UART: [art] SIG.R = 6BDA12115E1014F10A36B4EF5A107C5370F08277DB4A498BD278CBFE9E121EB272F33625F0602EFA0BD9FDD712A82D77
2,965,458 UART: [art] SIG.S = CBF4708E5CC73AF58B8305B2772439515F469FD94069D6C1D9361A4AF9456E1ACD097E1B54370C6897B016ED82110032
2,989,750 UART: Caliptra RT
2,990,095 UART: [state] CFI Enabled
3,098,202 UART: [rt] RT listening for mailbox commands...
3,098,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,250 UART: [rt]cmd =0x44504543, len=96
3,310,791 >>> mbox cmd response data (6236 bytes)
3,310,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,823 UART: [rt]cmd =0x44504543, len=96
3,372,852 >>> mbox cmd response data (56 bytes)
3,372,853 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,698 UART: [rt]cmd =0x52564348, len=36
3,405,103 >>> mbox cmd response data (8 bytes)
3,405,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,233 UART: [rt]cmd =0x44504543, len=96
3,616,223 >>> mbox cmd response data (6236 bytes)
3,616,224 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,245 UART: [rt]cmd =0x53574545, len=84
3,672,206 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,441 UART: [kat] SHA2-256
892,379 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,810 UART: [kat] HMAC-384Kdf
907,254 UART: [kat] LMS
1,475,450 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,687 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 ready_for_fw is high
1,480,869 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,708 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,100 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,522,005 UART: [ldev] Erasing FE.KEYID = 1
1,547,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,360 UART: [ldev] --
1,586,843 UART: [fwproc] Waiting for Commands...
1,587,550 UART: [fwproc] Received command 0x46574c44
1,588,341 UART: [fwproc] Received Image of size 114332 bytes
2,886,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,614 >>> mbox cmd response: success
3,079,750 UART: [afmc] ++
3,079,918 UART: [afmc] CDI.KEYID = 6
3,080,280 UART: [afmc] SUBJECT.KEYID = 7
3,080,705 UART: [afmc] AUTHORITY.KEYID = 5
3,115,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,525 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,215 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,994 UART: [afmc] --
3,158,872 UART: [cold-reset] --
3,159,764 UART: [state] Locking Datavault
3,160,779 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,383 UART: [state] Locking ICCM
3,162,019 UART: [exit] Launching FMC @ 0x40000130
3,167,348 UART:
3,167,364 UART: Running Caliptra FMC ...
3,167,772 UART:
3,167,826 UART: [state] CFI Enabled
3,177,955 UART: [fht] FMC Alias Private Key: 7
3,285,686 UART: [art] Extend RT PCRs Done
3,286,114 UART: [art] Lock RT PCRs Done
3,287,378 UART: [art] Populate DV Done
3,295,759 UART: [fht] FMC Alias Private Key: 7
3,296,701 UART: [art] Derive CDI
3,296,981 UART: [art] Store in in slot 0x4
3,382,686 UART: [art] Derive Key Pair
3,383,046 UART: [art] Store priv key in slot 0x5
3,396,204 UART: [art] Derive Key Pair - Done
3,411,068 UART: [art] Signing Cert with AUTHO
3,411,548 UART: RITY.KEYID = 7
3,426,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,745 UART: [art] PUB.X = EA8B5C91F687D1F96D16FBFCAD147AE530FEE02AF3F55D35E1E1BC7EC8E5C4FCB9CC88E553F6FCD09D63B50316DDDD36
3,434,544 UART: [art] PUB.Y = AC281BB3C4A510DDE3B5229D87EEEAA4B085F69FEEE98643B675E67014BBA1920DE76433A2B11D131E8B38D0F2BEAF2E
3,441,511 UART: [art] SIG.R = ECF868DC1D8E8FCFA1A54BE71CAA93546BA505E6B68E34C649AFD49589EFD3EEFC6BBA9FD23A0FBB857D6690CAE57727
3,448,305 UART: [art] SIG.S = C50A28CBACDAA6A9B9A6953B844CF6E1528C29BABDA58CC8740C690728D32583A2436DCF4450E91E94965947F559BDBE
3,472,065 UART: Caliptra RT
3,472,318 UART: [state] CFI Enabled
3,580,208 UART: [rt] RT listening for mailbox commands...
3,580,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,198 UART: [rt]cmd =0x44504543, len=96
3,792,123 >>> mbox cmd response data (6236 bytes)
3,792,124 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,775 UART: [rt]cmd =0x53574545, len=84
3,847,226 >>> mbox cmd response data (200 bytes)
3,847,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,138 UART: [rt]cmd =0x44504543, len=96
3,908,143 >>> mbox cmd response data (56 bytes)
3,908,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,073 UART: [rt]cmd =0x44504543, len=96
3,978,001 >>> mbox cmd response data (24 bytes)
3,978,002 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,905 UART: [rt]cmd =0x53574545, len=84
4,032,770 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,163 ready_for_fw is high
1,362,163 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,518 >>> mbox cmd response: success
2,988,314 UART:
2,988,330 UART: Running Caliptra FMC ...
2,988,738 UART:
2,988,792 UART: [state] CFI Enabled
2,998,837 UART: [fht] FMC Alias Private Key: 7
3,106,900 UART: [art] Extend RT PCRs Done
3,107,328 UART: [art] Lock RT PCRs Done
3,108,490 UART: [art] Populate DV Done
3,116,993 UART: [fht] FMC Alias Private Key: 7
3,118,101 UART: [art] Derive CDI
3,118,381 UART: [art] Store in in slot 0x4
3,204,184 UART: [art] Derive Key Pair
3,204,544 UART: [art] Store priv key in slot 0x5
3,218,236 UART: [art] Derive Key Pair - Done
3,232,836 UART: [art] Signing Cert with AUTHO
3,233,316 UART: RITY.KEYID = 7
3,248,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,061 UART: [art] PUB.X = C0D73956BC00B7AAE69DD2AEEF7798E1819E153E280CE85F42173CC603FCBC25692115929499E982126C260D1739108D
3,255,798 UART: [art] PUB.Y = ECA8D3981DEE09950554A3F70C911469A2385E71D7D619923A39482286DA91C7581C28B2E004192AF658666689B2C273
3,262,724 UART: [art] SIG.R = 79F7EF43CE774A1CB9E18BD512D347AC68FF6DEB93E50D488AE8080379EEF0B34A8A0B80877B85C963D585AA48F393E5
3,269,494 UART: [art] SIG.S = 6F9B9E89368E9BE953EF54AFFB6ED3A3B43327D18657E57F1D3468886AE965D5E319B0A562650786D38FE2ABCA975997
3,293,056 UART: Caliptra RT
3,293,309 UART: [state] CFI Enabled
3,401,551 UART: [rt] RT listening for mailbox commands...
3,402,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,401 UART: [rt]cmd =0x44504543, len=96
3,613,257 >>> mbox cmd response data (6236 bytes)
3,613,258 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,021 UART: [rt]cmd =0x53574545, len=84
3,669,010 >>> mbox cmd response data (200 bytes)
3,669,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,908 UART: [rt]cmd =0x44504543, len=96
3,730,905 >>> mbox cmd response data (56 bytes)
3,730,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,669 UART: [rt]cmd =0x44504543, len=96
3,801,287 >>> mbox cmd response data (24 bytes)
3,801,288 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,195 UART: [rt]cmd =0x53574545, len=84
3,856,144 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,523 UART: [kat] SHA2-512-ACC
897,424 UART: [kat] ECC-384
903,175 UART: [kat] HMAC-384Kdf
907,849 UART: [kat] LMS
1,476,045 UART: [kat] --
1,476,810 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 ready_for_fw is high
1,481,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,423 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,587 UART: [idev] --
1,515,634 UART: [ldev] ++
1,515,802 UART: [ldev] CDI.KEYID = 6
1,516,165 UART: [ldev] SUBJECT.KEYID = 5
1,516,591 UART: [ldev] AUTHORITY.KEYID = 7
1,517,054 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,137 UART: [ldev] --
1,586,438 UART: [fwproc] Waiting for Commands...
1,587,235 UART: [fwproc] Received command 0x46574c44
1,588,026 UART: [fwproc] Received Image of size 114332 bytes
2,886,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,121 >>> mbox cmd response: success
3,080,215 UART: [afmc] ++
3,080,383 UART: [afmc] CDI.KEYID = 6
3,080,745 UART: [afmc] SUBJECT.KEYID = 7
3,081,170 UART: [afmc] AUTHORITY.KEYID = 5
3,116,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,014 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,704 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,627 UART: [afmc] --
3,159,507 UART: [cold-reset] --
3,160,339 UART: [state] Locking Datavault
3,161,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,000 UART: [state] Locking ICCM
3,162,468 UART: [exit] Launching FMC @ 0x40000130
3,167,797 UART:
3,167,813 UART: Running Caliptra FMC ...
3,168,221 UART:
3,168,364 UART: [state] CFI Enabled
3,179,113 UART: [fht] FMC Alias Private Key: 7
3,287,050 UART: [art] Extend RT PCRs Done
3,287,478 UART: [art] Lock RT PCRs Done
3,289,028 UART: [art] Populate DV Done
3,297,133 UART: [fht] FMC Alias Private Key: 7
3,298,129 UART: [art] Derive CDI
3,298,409 UART: [art] Store in in slot 0x4
3,384,324 UART: [art] Derive Key Pair
3,384,684 UART: [art] Store priv key in slot 0x5
3,398,320 UART: [art] Derive Key Pair - Done
3,412,886 UART: [art] Signing Cert with AUTHO
3,413,366 UART: RITY.KEYID = 7
3,428,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,183 UART: [art] PUB.X = 22E453E7E4D124D50C5084EAC6CFD6D0CE36D4EE41734B2CAD9D19539CA0881AFE7BDBC7E557432CE5D20901F618BB30
3,435,960 UART: [art] PUB.Y = 6CA9A9AC744FE4EF21DF3CD3CB398222F9E833A2533D9EA298F7E53329EB45DDBF9A6BF62340E4DE927D307136481199
3,442,920 UART: [art] SIG.R = 53E457089540ADFC0A96A763FA2FA05B8C585BC44364D83C0202CE8C09637103F84EAE1B5B24C82CA9F509E5552ED30C
3,449,672 UART: [art] SIG.S = A3156C7F3C834A0C12B23DAF98771F4A35D962447BCE9D8998F428195287BA1C88C17539380189E9B6CA94B83257E2C4
3,473,305 UART: Caliptra RT
3,473,650 UART: [state] CFI Enabled
3,582,455 UART: [rt] RT listening for mailbox commands...
3,583,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,355 UART: [rt]cmd =0x44504543, len=96
3,794,156 >>> mbox cmd response data (6236 bytes)
3,794,157 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,904 UART: [rt]cmd =0x53574545, len=84
3,850,045 >>> mbox cmd response data (200 bytes)
3,850,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,119 UART: [rt]cmd =0x44504543, len=96
3,912,274 >>> mbox cmd response data (56 bytes)
3,912,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,306 UART: [rt]cmd =0x44504543, len=96
3,982,710 >>> mbox cmd response data (24 bytes)
3,982,711 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,012,704 UART: [rt]cmd =0x53574545, len=84
4,039,293 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 ready_for_fw is high
1,362,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,939 >>> mbox cmd response: success
2,991,989 UART:
2,992,005 UART: Running Caliptra FMC ...
2,992,413 UART:
2,992,556 UART: [state] CFI Enabled
3,003,315 UART: [fht] FMC Alias Private Key: 7
3,111,780 UART: [art] Extend RT PCRs Done
3,112,208 UART: [art] Lock RT PCRs Done
3,114,000 UART: [art] Populate DV Done
3,122,059 UART: [fht] FMC Alias Private Key: 7
3,123,021 UART: [art] Derive CDI
3,123,301 UART: [art] Store in in slot 0x4
3,209,074 UART: [art] Derive Key Pair
3,209,434 UART: [art] Store priv key in slot 0x5
3,222,550 UART: [art] Derive Key Pair - Done
3,237,334 UART: [art] Signing Cert with AUTHO
3,237,814 UART: RITY.KEYID = 7
3,253,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,267 UART: [art] PUB.X = 582A01CCFBB514FAFF80937A875ADCC05EF9AD9822342E5AD6C7E11E58CE553A921666814573347BF7828D3E1939B017
3,261,038 UART: [art] PUB.Y = 1BF9CF6E3BCD5E2A055124B56CDD4B9F2FB96D55E506D7BEC76846DA2FCCFBE412EC8E684EAA1DD06EB4EA6CC5552688
3,268,012 UART: [art] SIG.R = FB714BEE0C46788766CF9FBA96E692BF2033089F83DC1281486BE956BA6895060691031F98FB19D19C9FC69AA71141C2
3,274,767 UART: [art] SIG.S = 89B688DC02AC6ABCF9D3C3B361341DD8D7132852696EFBF3E181DFEE77EB1CE0DDC6AA5A88C19DC820362B5D23DCFA7B
3,298,755 UART: Caliptra RT
3,299,100 UART: [state] CFI Enabled
3,407,594 UART: [rt] RT listening for mailbox commands...
3,408,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,902 UART: [rt]cmd =0x44504543, len=96
3,618,682 >>> mbox cmd response data (6236 bytes)
3,618,683 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,630 UART: [rt]cmd =0x53574545, len=84
3,674,527 >>> mbox cmd response data (200 bytes)
3,674,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,413 UART: [rt]cmd =0x44504543, len=96
3,735,670 >>> mbox cmd response data (56 bytes)
3,735,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,634 UART: [rt]cmd =0x44504543, len=96
3,805,800 >>> mbox cmd response data (24 bytes)
3,805,801 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,514 UART: [rt]cmd =0x53574545, len=84
3,861,617 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,158 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,459 UART: [cold-reset] ++
1,171,987 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 ready_for_fw is high
1,176,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,644 UART: [idev] Erasing UDS.KEYID = 0
1,200,559 UART: [idev] Sha1 KeyId Algorithm
1,209,059 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,602 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,080 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,693 >>> mbox cmd response: success
2,774,711 UART: [afmc] ++
2,774,879 UART: [afmc] CDI.KEYID = 6
2,775,241 UART: [afmc] SUBJECT.KEYID = 7
2,775,666 UART: [afmc] AUTHORITY.KEYID = 5
2,811,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,762 UART: [afmc] --
2,854,886 UART: [cold-reset] --
2,855,580 UART: [state] Locking Datavault
2,856,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,385 UART: [state] Locking ICCM
2,857,925 UART: [exit] Launching FMC @ 0x40000130
2,863,254 UART:
2,863,270 UART: Running Caliptra FMC ...
2,863,678 UART:
2,863,732 UART: [state] CFI Enabled
2,874,395 UART: [fht] FMC Alias Private Key: 7
2,982,362 UART: [art] Extend RT PCRs Done
2,982,790 UART: [art] Lock RT PCRs Done
2,984,686 UART: [art] Populate DV Done
2,993,073 UART: [fht] FMC Alias Private Key: 7
2,994,051 UART: [art] Derive CDI
2,994,331 UART: [art] Store in in slot 0x4
3,080,384 UART: [art] Derive Key Pair
3,080,744 UART: [art] Store priv key in slot 0x5
3,094,202 UART: [art] Derive Key Pair - Done
3,109,275 UART: [art] Signing Cert with AUTHO
3,109,755 UART: RITY.KEYID = 7
3,124,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,620 UART: [art] PUB.X = 40B59077B16CAA52110831CBEF4FD05A72C35ED1B9221092ADEE48591E76D314B152E6F5913866D82ACE3404D26E3AF3
3,132,388 UART: [art] PUB.Y = 0AA2B2F9F4A1524D53A5DA08A691A4B1111A8E7D1B968A7C999B3A4AA663C2E6B37914E1C8A845BB0734BA6EB76A02DE
3,139,340 UART: [art] SIG.R = C303B45F61E5635449DB10055103CE14EF267C55A038B66CC7A0901ED8D4E1DCB0D503BD9B21E17D8915818ADE83750D
3,146,099 UART: [art] SIG.S = ECE0B951612A9643941BAD0CA2BCAD782E5F9C09B8416E87DBED853FC1702EB95A041FD97F14F8E1FF8E8E4C539D217A
3,169,855 UART: Caliptra RT
3,170,108 UART: [state] CFI Enabled
3,277,284 UART: [rt] RT listening for mailbox commands...
3,277,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,604 UART: [rt]cmd =0x44504543, len=96
3,489,071 >>> mbox cmd response data (6236 bytes)
3,489,072 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,007 UART: [rt]cmd =0x53574545, len=84
3,544,704 >>> mbox cmd response data (200 bytes)
3,544,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,652 UART: [rt]cmd =0x44504543, len=96
3,606,575 >>> mbox cmd response data (56 bytes)
3,606,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,459 UART: [rt]cmd =0x44504543, len=96
3,676,683 >>> mbox cmd response data (24 bytes)
3,676,684 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,511 UART: [rt]cmd =0x53574545, len=84
3,731,982 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,639 ready_for_fw is high
1,060,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,668 >>> mbox cmd response: success
2,689,112 UART:
2,689,128 UART: Running Caliptra FMC ...
2,689,536 UART:
2,689,590 UART: [state] CFI Enabled
2,699,889 UART: [fht] FMC Alias Private Key: 7
2,807,412 UART: [art] Extend RT PCRs Done
2,807,840 UART: [art] Lock RT PCRs Done
2,809,320 UART: [art] Populate DV Done
2,817,367 UART: [fht] FMC Alias Private Key: 7
2,818,333 UART: [art] Derive CDI
2,818,613 UART: [art] Store in in slot 0x4
2,903,882 UART: [art] Derive Key Pair
2,904,242 UART: [art] Store priv key in slot 0x5
2,917,520 UART: [art] Derive Key Pair - Done
2,932,167 UART: [art] Signing Cert with AUTHO
2,932,647 UART: RITY.KEYID = 7
2,947,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,088 UART: [art] PUB.X = DCD41EBF530005C4CC610C4FA3F5E5643895D92CAD3C53F115DAB7EED1D0EC9FBB2DC1ADB2F48873E3295B2C3E05AFB5
2,954,855 UART: [art] PUB.Y = 588390973D15418BC9B2818196A143CDFB6CC911B2D988C539595267DD76D99493A443CB75362B25DB3263B43EA8C549
2,961,797 UART: [art] SIG.R = 0531D6AC023CAE80D92B3D9C9012FE32B14C208C2B08EE9574522683E55CE81C4145BEDA105487F663920E9530C602D8
2,968,550 UART: [art] SIG.S = 023B3033B445992C08E7F207C14A54A7F380B64B59C9F8C62C6F22BE916E4B203C6E866718D4C718C850D604D8D3CC7C
2,992,189 UART: Caliptra RT
2,992,442 UART: [state] CFI Enabled
3,099,375 UART: [rt] RT listening for mailbox commands...
3,100,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,385 UART: [rt]cmd =0x44504543, len=96
3,310,750 >>> mbox cmd response data (6236 bytes)
3,310,751 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,688 UART: [rt]cmd =0x53574545, len=84
3,366,455 >>> mbox cmd response data (200 bytes)
3,366,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,447 UART: [rt]cmd =0x44504543, len=96
3,429,266 >>> mbox cmd response data (56 bytes)
3,429,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,136 UART: [rt]cmd =0x44504543, len=96
3,499,496 >>> mbox cmd response data (24 bytes)
3,499,497 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,236 UART: [rt]cmd =0x53574545, len=84
3,554,955 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
893,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,992 UART: [kat] ++
898,144 UART: [kat] sha1
902,288 UART: [kat] SHA2-256
904,228 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,825 UART: [kat] HMAC-384Kdf
923,339 UART: [kat] LMS
1,171,667 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,173,132 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,957 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,209,986 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,384 UART: [ldev] Erasing FE.KEYID = 1
1,244,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,480 UART: [ldev] --
1,283,811 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,774 >>> mbox cmd response: success
2,775,844 UART: [afmc] ++
2,776,012 UART: [afmc] CDI.KEYID = 6
2,776,374 UART: [afmc] SUBJECT.KEYID = 7
2,776,799 UART: [afmc] AUTHORITY.KEYID = 5
2,812,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,423 UART: [afmc] --
2,855,317 UART: [cold-reset] --
2,856,267 UART: [state] Locking Datavault
2,857,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,960 UART: [state] Locking ICCM
2,858,402 UART: [exit] Launching FMC @ 0x40000130
2,863,731 UART:
2,863,747 UART: Running Caliptra FMC ...
2,864,155 UART:
2,864,298 UART: [state] CFI Enabled
2,874,703 UART: [fht] FMC Alias Private Key: 7
2,982,650 UART: [art] Extend RT PCRs Done
2,983,078 UART: [art] Lock RT PCRs Done
2,984,704 UART: [art] Populate DV Done
2,992,909 UART: [fht] FMC Alias Private Key: 7
2,993,967 UART: [art] Derive CDI
2,994,247 UART: [art] Store in in slot 0x4
3,079,964 UART: [art] Derive Key Pair
3,080,324 UART: [art] Store priv key in slot 0x5
3,094,070 UART: [art] Derive Key Pair - Done
3,108,683 UART: [art] Signing Cert with AUTHO
3,109,163 UART: RITY.KEYID = 7
3,124,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,124 UART: [art] PUB.X = 246F53C3E4A40A003CCA8FF055477762AE50C46EA63DFF03BB25BC1365EAADF3023ABD7EDEBDE4534280D8D9938D9A60
3,131,881 UART: [art] PUB.Y = 6E51E3128EF22FEB12E6D0CF6741DDC8EBE310631DAA26D6CBCA659C9EA0461FFCE87CFA1683298B2C6324525E0AE2C2
3,138,848 UART: [art] SIG.R = 1AA952D43ED0B7B4D594F17BC82414AED6B86BC6ADE0D2C060D38BE375003B19B499F3DB2AB18586675BA994E5042C87
3,145,603 UART: [art] SIG.S = 2D715645EC0810043ED4EB73677229375A16DD46BEEF6DB7DA6940CD54650DF16AE5FF8999C695F13491EB37DBB0961E
3,169,515 UART: Caliptra RT
3,169,860 UART: [state] CFI Enabled
3,277,983 UART: [rt] RT listening for mailbox commands...
3,278,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,245 UART: [rt]cmd =0x44504543, len=96
3,490,215 >>> mbox cmd response data (6236 bytes)
3,490,216 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,287 UART: [rt]cmd =0x53574545, len=84
3,545,766 >>> mbox cmd response data (200 bytes)
3,545,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,538 UART: [rt]cmd =0x44504543, len=96
3,607,363 >>> mbox cmd response data (56 bytes)
3,607,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,497 UART: [rt]cmd =0x44504543, len=96
3,677,035 >>> mbox cmd response data (24 bytes)
3,677,036 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,853 UART: [rt]cmd =0x53574545, len=84
3,732,758 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,952 ready_for_fw is high
1,059,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,029 >>> mbox cmd response: success
2,688,345 UART:
2,688,361 UART: Running Caliptra FMC ...
2,688,769 UART:
2,688,912 UART: [state] CFI Enabled
2,699,229 UART: [fht] FMC Alias Private Key: 7
2,807,650 UART: [art] Extend RT PCRs Done
2,808,078 UART: [art] Lock RT PCRs Done
2,809,608 UART: [art] Populate DV Done
2,817,945 UART: [fht] FMC Alias Private Key: 7
2,819,099 UART: [art] Derive CDI
2,819,379 UART: [art] Store in in slot 0x4
2,905,254 UART: [art] Derive Key Pair
2,905,614 UART: [art] Store priv key in slot 0x5
2,918,874 UART: [art] Derive Key Pair - Done
2,933,272 UART: [art] Signing Cert with AUTHO
2,933,752 UART: RITY.KEYID = 7
2,949,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,765 UART: [art] PUB.X = 88A74D81D085F15ACBD93236C69068F056770FB593ACC851278E308854F1F27A99DD4537B868AE4A42F0B33ABDC76B06
2,956,531 UART: [art] PUB.Y = A8AFAFE579AB01603476CAB59191A1337053592A8EB9BE2541440B3BA89453667E950BA0391A91F391F54D0B6C5151E9
2,963,467 UART: [art] SIG.R = 6D47688621E26FEB9B91ECA9B1E979B957CFE2A92F6C1FA090983FB74BAD930220C786A6E9F903FC33CEB6A0654C059C
2,970,240 UART: [art] SIG.S = F80C34224B2F9C031337EDEC8C9344E6CA9E05E58149399ED82518EB8CB2AC461AD6FEE53A7702AF86D32D1BD4DAB06B
2,993,369 UART: Caliptra RT
2,993,714 UART: [state] CFI Enabled
3,100,923 UART: [rt] RT listening for mailbox commands...
3,101,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,969 UART: [rt]cmd =0x44504543, len=96
3,313,549 >>> mbox cmd response data (6236 bytes)
3,313,550 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,185 UART: [rt]cmd =0x53574545, len=84
3,369,106 >>> mbox cmd response data (200 bytes)
3,369,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,854 UART: [rt]cmd =0x44504543, len=96
3,431,039 >>> mbox cmd response data (56 bytes)
3,431,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,969 UART: [rt]cmd =0x44504543, len=96
3,500,287 >>> mbox cmd response data (24 bytes)
3,500,288 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,149 UART: [rt]cmd =0x53574545, len=84
3,555,792 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,174,599 ready_for_fw is high
1,174,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,199,673 UART: [idev] Sha1 KeyId Algorithm
1,208,587 UART: [idev] --
1,209,684 UART: [ldev] ++
1,209,852 UART: [ldev] CDI.KEYID = 6
1,210,216 UART: [ldev] SUBJECT.KEYID = 5
1,210,643 UART: [ldev] AUTHORITY.KEYID = 7
1,211,106 UART: [ldev] FE.KEYID = 1
1,216,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,261 >>> mbox cmd response: success
2,774,330 UART: [afmc] ++
2,774,498 UART: [afmc] CDI.KEYID = 6
2,774,861 UART: [afmc] SUBJECT.KEYID = 7
2,775,287 UART: [afmc] AUTHORITY.KEYID = 5
2,811,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,907 UART: [afmc] --
2,854,837 UART: [cold-reset] --
2,855,907 UART: [state] Locking Datavault
2,856,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,318 UART: [state] Locking ICCM
2,857,822 UART: [exit] Launching FMC @ 0x40000130
2,863,151 UART:
2,863,167 UART: Running Caliptra FMC ...
2,863,575 UART:
2,863,629 UART: [state] CFI Enabled
2,873,816 UART: [fht] FMC Alias Private Key: 7
2,981,047 UART: [art] Extend RT PCRs Done
2,981,475 UART: [art] Lock RT PCRs Done
2,982,739 UART: [art] Populate DV Done
2,991,192 UART: [fht] FMC Alias Private Key: 7
2,992,184 UART: [art] Derive CDI
2,992,464 UART: [art] Store in in slot 0x4
3,078,179 UART: [art] Derive Key Pair
3,078,539 UART: [art] Store priv key in slot 0x5
3,091,483 UART: [art] Derive Key Pair - Done
3,106,635 UART: [art] Signing Cert with AUTHO
3,107,115 UART: RITY.KEYID = 7
3,122,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,880 UART: [art] PUB.X = 58021A001AEC2E52E76495B0E8CC68A759B880CAAB9C4801B2B5D8107EA2B4BB0C0F9D3D658CC10B2AE2B2A9ED489434
3,129,627 UART: [art] PUB.Y = E469D3D405ACEE323C62523E1727BD6F90C379E2BC0535CC27157B7320372B2AEF84DDBAD856DC23B68A4E58F73AD73E
3,136,583 UART: [art] SIG.R = BD01C5ABBDC54629CB672E1E057E695ABABDA8E58DA4B5A9DE944AB49B0B45844FEAB44F780C384722EE21ECE2AFD22B
3,143,369 UART: [art] SIG.S = 10C0B39C6BB29F484D0983A64D476B2C181F07F930C594F8E261E47AE25210C8A968269845920AF95F7D50E88C208F79
3,167,309 UART: Caliptra RT
3,167,562 UART: [state] CFI Enabled
3,275,725 UART: [rt] RT listening for mailbox commands...
3,276,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,723 UART: [rt]cmd =0x44504543, len=96
3,487,975 >>> mbox cmd response data (6236 bytes)
3,487,976 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,917 UART: [rt]cmd =0x53574545, len=84
3,543,326 >>> mbox cmd response data (200 bytes)
3,543,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,230 UART: [rt]cmd =0x44504543, len=96
3,604,811 >>> mbox cmd response data (56 bytes)
3,604,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,711 UART: [rt]cmd =0x44504543, len=96
3,674,487 >>> mbox cmd response data (24 bytes)
3,674,488 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,355 UART: [rt]cmd =0x53574545, len=84
3,729,634 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,316 ready_for_fw is high
1,056,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,621 >>> mbox cmd response: success
2,685,575 UART:
2,685,591 UART: Running Caliptra FMC ...
2,685,999 UART:
2,686,053 UART: [state] CFI Enabled
2,696,816 UART: [fht] FMC Alias Private Key: 7
2,805,001 UART: [art] Extend RT PCRs Done
2,805,429 UART: [art] Lock RT PCRs Done
2,806,803 UART: [art] Populate DV Done
2,814,956 UART: [fht] FMC Alias Private Key: 7
2,816,036 UART: [art] Derive CDI
2,816,316 UART: [art] Store in in slot 0x4
2,901,539 UART: [art] Derive Key Pair
2,901,899 UART: [art] Store priv key in slot 0x5
2,914,761 UART: [art] Derive Key Pair - Done
2,929,550 UART: [art] Signing Cert with AUTHO
2,930,030 UART: RITY.KEYID = 7
2,945,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,053 UART: [art] PUB.X = 491EB79639187770A9D54390E7CB0E3CCE18471BF2A82800DCBF78604E47144C7739B8258F8A0B9CC45630190DEB83DF
2,952,792 UART: [art] PUB.Y = 532EB797CE2F999D87CF08FA1E8B788B8B536EEFCE275762483C5A6C53E4C5174F1016EFA3AD78F181568C2E8D881E31
2,959,747 UART: [art] SIG.R = 35E263B9CDCB844363AC58B6818314693E912EDD61F84354D5C5BFE14E2832F4D32065489E22CA9EA76200EDB7C83B9F
2,966,499 UART: [art] SIG.S = D49D00D4345973E78B4F9660F3F9AB8571AE6EDD1DE06C789C062D5C8DBCC823C959D6CFF3ADB3914B7A30960EC78144
2,990,282 UART: Caliptra RT
2,990,535 UART: [state] CFI Enabled
3,098,022 UART: [rt] RT listening for mailbox commands...
3,098,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,896 UART: [rt]cmd =0x44504543, len=96
3,309,936 >>> mbox cmd response data (6236 bytes)
3,309,937 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,776 UART: [rt]cmd =0x53574545, len=84
3,365,071 >>> mbox cmd response data (200 bytes)
3,365,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,779 UART: [rt]cmd =0x44504543, len=96
3,426,402 >>> mbox cmd response data (56 bytes)
3,426,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,120 UART: [rt]cmd =0x44504543, len=96
3,495,616 >>> mbox cmd response data (24 bytes)
3,495,617 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,612 UART: [rt]cmd =0x53574545, len=84
3,551,767 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,603 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,291 UART: [idev] SUBJECT.KEYID = 7
1,174,716 UART: [idev] UDS.KEYID = 0
1,175,062 ready_for_fw is high
1,175,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,144 UART: [idev] Sha1 KeyId Algorithm
1,208,990 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,587 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,215 UART: [ldev] --
1,282,727 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,117 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,060 >>> mbox cmd response: success
2,776,269 UART: [afmc] ++
2,776,437 UART: [afmc] CDI.KEYID = 6
2,776,800 UART: [afmc] SUBJECT.KEYID = 7
2,777,226 UART: [afmc] AUTHORITY.KEYID = 5
2,813,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,710 UART: [afmc] --
2,856,818 UART: [cold-reset] --
2,857,756 UART: [state] Locking Datavault
2,859,095 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,699 UART: [state] Locking ICCM
2,860,181 UART: [exit] Launching FMC @ 0x40000130
2,865,510 UART:
2,865,526 UART: Running Caliptra FMC ...
2,865,934 UART:
2,866,077 UART: [state] CFI Enabled
2,876,476 UART: [fht] FMC Alias Private Key: 7
2,984,841 UART: [art] Extend RT PCRs Done
2,985,269 UART: [art] Lock RT PCRs Done
2,986,623 UART: [art] Populate DV Done
2,994,864 UART: [fht] FMC Alias Private Key: 7
2,995,926 UART: [art] Derive CDI
2,996,206 UART: [art] Store in in slot 0x4
3,081,973 UART: [art] Derive Key Pair
3,082,333 UART: [art] Store priv key in slot 0x5
3,095,553 UART: [art] Derive Key Pair - Done
3,110,395 UART: [art] Signing Cert with AUTHO
3,110,875 UART: RITY.KEYID = 7
3,126,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,898 UART: [art] PUB.X = F621238F490D1260C9B1205F191A9F0A1C15C5736B20C30915A9B4698F3237C900D136876ED1F966462DEFBA3254D1C4
3,133,631 UART: [art] PUB.Y = ECDC11127A38BAB412A166C4D6009FD51AE983E7B425524DEC68394EFAC1C51D9C120E2ACC9772EEEB882E58961D83CF
3,140,572 UART: [art] SIG.R = 3F56475D4FF1919317251DFE7B9DA9F980C84BA413747BE34EE9D324CBFBE9A41F9227D983AD0A97ABEAD27B71CB5445
3,147,353 UART: [art] SIG.S = 8C0B048F9F1C61D146BE358147616CF75A105A9D9CC66D6DDA32FFF3658396B4AAAB7C3721E424AF15E5894E79C3FA87
3,171,588 UART: Caliptra RT
3,171,933 UART: [state] CFI Enabled
3,279,872 UART: [rt] RT listening for mailbox commands...
3,280,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,058 UART: [rt]cmd =0x44504543, len=96
3,492,274 >>> mbox cmd response data (6236 bytes)
3,492,275 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,356 UART: [rt]cmd =0x53574545, len=84
3,548,365 >>> mbox cmd response data (200 bytes)
3,548,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,431 UART: [rt]cmd =0x44504543, len=96
3,610,194 >>> mbox cmd response data (56 bytes)
3,610,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,134 UART: [rt]cmd =0x44504543, len=96
3,680,382 >>> mbox cmd response data (24 bytes)
3,680,383 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,120 UART: [rt]cmd =0x53574545, len=84
3,736,149 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,927 ready_for_fw is high
1,055,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,084 >>> mbox cmd response: success
2,683,468 UART:
2,683,484 UART: Running Caliptra FMC ...
2,683,892 UART:
2,684,035 UART: [state] CFI Enabled
2,694,590 UART: [fht] FMC Alias Private Key: 7
2,802,743 UART: [art] Extend RT PCRs Done
2,803,171 UART: [art] Lock RT PCRs Done
2,804,921 UART: [art] Populate DV Done
2,813,092 UART: [fht] FMC Alias Private Key: 7
2,814,110 UART: [art] Derive CDI
2,814,390 UART: [art] Store in in slot 0x4
2,900,175 UART: [art] Derive Key Pair
2,900,535 UART: [art] Store priv key in slot 0x5
2,914,023 UART: [art] Derive Key Pair - Done
2,928,564 UART: [art] Signing Cert with AUTHO
2,929,044 UART: RITY.KEYID = 7
2,944,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,803 UART: [art] PUB.X = 2B596C637062F7F52E02E5D39757F92C6FD249F5231359D905A77E296790C444F8AD013A94F92C64D2772502946BE7C9
2,951,551 UART: [art] PUB.Y = CD1DC83F01909AD806BDD9A98E47C0922A24EC525E94C35E1CB1195E8C9C4B4B51B36BFC6113FF73EC70C61BB12E17DE
2,958,513 UART: [art] SIG.R = C3229DEFEB00A104E12F81785E5705E7B3F4162511C5FAE4437A38CC2EE58DB8559159786BA030471326AC5C5B040864
2,965,247 UART: [art] SIG.S = 3511C325F7BF036CC5D09FB00C39117D2081B685F1808857DCC41B0BD96F87C7CA4F9AF97DDCC049B1FFD658CE21F659
2,989,339 UART: Caliptra RT
2,989,684 UART: [state] CFI Enabled
3,097,189 UART: [rt] RT listening for mailbox commands...
3,097,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,383 UART: [rt]cmd =0x44504543, len=96
3,309,986 >>> mbox cmd response data (6236 bytes)
3,309,987 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,748 UART: [rt]cmd =0x53574545, len=84
3,364,945 >>> mbox cmd response data (200 bytes)
3,364,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,095 UART: [rt]cmd =0x44504543, len=96
3,426,862 >>> mbox cmd response data (56 bytes)
3,426,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,858 UART: [rt]cmd =0x44504543, len=96
3,496,378 >>> mbox cmd response data (24 bytes)
3,496,379 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,386 UART: [rt]cmd =0x53574545, len=84
3,552,137 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,309 UART: [kat] SHA2-256
882,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,355 UART: [kat] ++
886,507 UART: [kat] sha1
890,869 UART: [kat] SHA2-256
892,807 UART: [kat] SHA2-384
895,494 UART: [kat] SHA2-512-ACC
897,395 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,550 UART: [kat] LMS
1,475,746 UART: [kat] --
1,476,721 UART: [cold-reset] ++
1,477,301 UART: [fht] Storing FHT @ 0x50003400
1,480,126 UART: [idev] ++
1,480,294 UART: [idev] CDI.KEYID = 6
1,480,654 UART: [idev] SUBJECT.KEYID = 7
1,481,078 UART: [idev] UDS.KEYID = 0
1,481,423 ready_for_fw is high
1,481,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,900 UART: [idev] Erasing UDS.KEYID = 0
1,505,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,758 UART: [idev] --
1,514,841 UART: [ldev] ++
1,515,009 UART: [ldev] CDI.KEYID = 6
1,515,372 UART: [ldev] SUBJECT.KEYID = 5
1,515,798 UART: [ldev] AUTHORITY.KEYID = 7
1,516,261 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,864 UART: [ldev] --
1,586,323 UART: [fwproc] Waiting for Commands...
1,587,142 UART: [fwproc] Received command 0x46574c44
1,587,933 UART: [fwproc] Received Image of size 114332 bytes
2,886,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,517 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,674 >>> mbox cmd response: success
3,079,808 UART: [afmc] ++
3,079,976 UART: [afmc] CDI.KEYID = 6
3,080,338 UART: [afmc] SUBJECT.KEYID = 7
3,080,763 UART: [afmc] AUTHORITY.KEYID = 5
3,115,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,245 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,935 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,824 UART: [afmc] --
3,158,846 UART: [cold-reset] --
3,159,528 UART: [state] Locking Datavault
3,160,903 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,507 UART: [state] Locking ICCM
3,162,149 UART: [exit] Launching FMC @ 0x40000130
3,167,478 UART:
3,167,494 UART: Running Caliptra FMC ...
3,167,902 UART:
3,167,956 UART: [state] CFI Enabled
3,178,343 UART: [fht] FMC Alias Private Key: 7
3,286,412 UART: [art] Extend RT PCRs Done
3,286,840 UART: [art] Lock RT PCRs Done
3,288,422 UART: [art] Populate DV Done
3,296,905 UART: [fht] FMC Alias Private Key: 7
3,297,965 UART: [art] Derive CDI
3,298,245 UART: [art] Store in in slot 0x4
3,383,688 UART: [art] Derive Key Pair
3,384,048 UART: [art] Store priv key in slot 0x5
3,397,702 UART: [art] Derive Key Pair - Done
3,412,731 UART: [art] Signing Cert with AUTHO
3,413,211 UART: RITY.KEYID = 7
3,428,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,058 UART: [art] PUB.X = 0089C0C1D589CAB1C16947E8E49C62DD088A686050FA9B8701326461ED3E91DE1193CF3039B24CD17DC2D419E89E8F19
3,435,802 UART: [art] PUB.Y = D8D4ACB976AA8D074E26381774CE2221526014CB2AC2F9E5FEC2D33EA146B493A55707C89A1777CAE31FDB9FBECAEC0E
3,442,763 UART: [art] SIG.R = AF3FF8ABFC0D483EBF5F8682E81B802542BE7E06BD198E57A92ACF9097F4B20A11F5EE889B94CF8B7E9DFD30234A358F
3,449,544 UART: [art] SIG.S = F51712D27B393065A7239EE1011009EDD161532AA0C6BA8FBEBF81187464B6B3C99A65437E9F0E52DF73586E62A1576C
3,473,804 UART: Caliptra RT
3,474,057 UART: [state] CFI Enabled
3,581,991 UART: [rt] RT listening for mailbox commands...
3,582,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,843 UART: [rt]cmd =0x44504543, len=96
3,793,024 >>> mbox cmd response data (6236 bytes)
3,793,025 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,064 UART: [rt]cmd =0x53574545, len=84
3,826,001 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,059 ready_for_fw is high
1,362,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,824 >>> mbox cmd response: success
2,987,816 UART:
2,987,832 UART: Running Caliptra FMC ...
2,988,240 UART:
2,988,294 UART: [state] CFI Enabled
2,998,791 UART: [fht] FMC Alias Private Key: 7
3,106,538 UART: [art] Extend RT PCRs Done
3,106,966 UART: [art] Lock RT PCRs Done
3,108,668 UART: [art] Populate DV Done
3,117,089 UART: [fht] FMC Alias Private Key: 7
3,118,129 UART: [art] Derive CDI
3,118,409 UART: [art] Store in in slot 0x4
3,204,188 UART: [art] Derive Key Pair
3,204,548 UART: [art] Store priv key in slot 0x5
3,218,124 UART: [art] Derive Key Pair - Done
3,232,596 UART: [art] Signing Cert with AUTHO
3,233,076 UART: RITY.KEYID = 7
3,248,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,281 UART: [art] PUB.X = 166AD1A07FC13E03B1984C5E5C3F69DB1612BEB1AC9AFA6BB6697C5EB02231F5C3545D8DB06B4CD87BE3C862D716DBD2
3,256,068 UART: [art] PUB.Y = 0C4A2C7F2959FB6466BCB20203CA45EDBCE18A0188CB978F07DE7FE7F9365377646168FB10C60D86BB1A3AF02CC015C4
3,263,012 UART: [art] SIG.R = 18F66E00EC2262B53798343A5632472CAA4E0A6A68F2E6A9D5063DF16706BF7C407EA4CFB600B1804A918EA4E0F82AA8
3,269,735 UART: [art] SIG.S = E63CF6D96AE4D91F1117016287E1BC313CE79915AB4EE91B9AAB2F79C9ED87A7C77C6A5D172810C1DC32F4395E32DBD6
3,292,811 UART: Caliptra RT
3,293,064 UART: [state] CFI Enabled
3,401,633 UART: [rt] RT listening for mailbox commands...
3,402,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,621 UART: [rt]cmd =0x44504543, len=96
3,612,416 >>> mbox cmd response data (6236 bytes)
3,612,417 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,222 UART: [rt]cmd =0x53574545, len=84
3,645,745 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,063 UART: [state] LifecycleState = Unprovisioned
86,718 UART: [state] DebugLocked = No
87,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,862 UART: [kat] SHA2-256
882,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,908 UART: [kat] ++
887,060 UART: [kat] sha1
891,404 UART: [kat] SHA2-256
893,342 UART: [kat] SHA2-384
896,103 UART: [kat] SHA2-512-ACC
898,004 UART: [kat] ECC-384
903,259 UART: [kat] HMAC-384Kdf
908,061 UART: [kat] LMS
1,476,257 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,520 UART: [fht] Storing FHT @ 0x50003400
1,480,229 UART: [idev] ++
1,480,397 UART: [idev] CDI.KEYID = 6
1,480,757 UART: [idev] SUBJECT.KEYID = 7
1,481,181 UART: [idev] UDS.KEYID = 0
1,481,526 ready_for_fw is high
1,481,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,283 UART: [idev] Erasing UDS.KEYID = 0
1,505,895 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,526 UART: [ldev] ++
1,515,694 UART: [ldev] CDI.KEYID = 6
1,516,057 UART: [ldev] SUBJECT.KEYID = 5
1,516,483 UART: [ldev] AUTHORITY.KEYID = 7
1,516,946 UART: [ldev] FE.KEYID = 1
1,521,982 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,269 UART: [ldev] --
1,586,692 UART: [fwproc] Waiting for Commands...
1,587,509 UART: [fwproc] Received command 0x46574c44
1,588,300 UART: [fwproc] Received Image of size 114332 bytes
2,886,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,629 >>> mbox cmd response: success
3,079,681 UART: [afmc] ++
3,079,849 UART: [afmc] CDI.KEYID = 6
3,080,211 UART: [afmc] SUBJECT.KEYID = 7
3,080,636 UART: [afmc] AUTHORITY.KEYID = 5
3,116,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,603 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,996 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,686 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,599 UART: [afmc] --
3,159,691 UART: [cold-reset] --
3,160,613 UART: [state] Locking Datavault
3,161,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,560 UART: [state] Locking ICCM
3,163,186 UART: [exit] Launching FMC @ 0x40000130
3,168,515 UART:
3,168,531 UART: Running Caliptra FMC ...
3,168,939 UART:
3,169,082 UART: [state] CFI Enabled
3,179,537 UART: [fht] FMC Alias Private Key: 7
3,287,538 UART: [art] Extend RT PCRs Done
3,287,966 UART: [art] Lock RT PCRs Done
3,289,514 UART: [art] Populate DV Done
3,297,635 UART: [fht] FMC Alias Private Key: 7
3,298,653 UART: [art] Derive CDI
3,298,933 UART: [art] Store in in slot 0x4
3,384,730 UART: [art] Derive Key Pair
3,385,090 UART: [art] Store priv key in slot 0x5
3,398,136 UART: [art] Derive Key Pair - Done
3,413,066 UART: [art] Signing Cert with AUTHO
3,413,546 UART: RITY.KEYID = 7
3,428,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,597 UART: [art] PUB.X = 11A055F699C37261E676D5A687650176AA7B32048493623790D96D09136590B6569D171C58026D181804D585BCCB46DF
3,436,334 UART: [art] PUB.Y = 6CD44EB640D9FE25ED3007BF5EF7951BD2441849CE7BDDB60CC5E540F200F87EBCC0700A6616D48BEF618B90AB4ADBB0
3,443,275 UART: [art] SIG.R = 3E344E226E536587D02B4735B5AA0CDA1D7A8C894DA2CD735A7DD89A2EA6FD5B3DC9A0CAB7DFFB0A3A2128E7394DD7DD
3,450,065 UART: [art] SIG.S = D9DECBDBD4B4F8D5944976A10AD6E50A2CE0B0BDB006FD94D5A65CC5BD4C884A9E70541446363E61BCF6F18DF715A4DA
3,474,385 UART: Caliptra RT
3,474,730 UART: [state] CFI Enabled
3,583,229 UART: [rt] RT listening for mailbox commands...
3,583,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,521 UART: [rt]cmd =0x44504543, len=96
3,795,007 >>> mbox cmd response data (6236 bytes)
3,795,008 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,981 UART: [rt]cmd =0x53574545, len=84
3,828,100 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,196 ready_for_fw is high
1,363,196 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,383 >>> mbox cmd response: success
2,989,109 UART:
2,989,125 UART: Running Caliptra FMC ...
2,989,533 UART:
2,989,676 UART: [state] CFI Enabled
3,000,061 UART: [fht] FMC Alias Private Key: 7
3,107,584 UART: [art] Extend RT PCRs Done
3,108,012 UART: [art] Lock RT PCRs Done
3,109,504 UART: [art] Populate DV Done
3,117,791 UART: [fht] FMC Alias Private Key: 7
3,118,873 UART: [art] Derive CDI
3,119,153 UART: [art] Store in in slot 0x4
3,205,186 UART: [art] Derive Key Pair
3,205,546 UART: [art] Store priv key in slot 0x5
3,219,138 UART: [art] Derive Key Pair - Done
3,233,919 UART: [art] Signing Cert with AUTHO
3,234,399 UART: RITY.KEYID = 7
3,249,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,344 UART: [art] PUB.X = AF4E583ECBF181D38433F59A0F18765AB91477736A571E601E7C83F9F32FD5C02F35C5B5D72A26D9F39DDC900A0DA542
3,257,113 UART: [art] PUB.Y = E429CFD8EBDFE1D5B3199A127FAAA4ABE0A18F93EE2D41FDCD7780B0D3D5140605D6BC0F286830C7C10401B4A185E840
3,264,066 UART: [art] SIG.R = 02DA29C3B207F935D81D8B8F8215251A39854AB7683AC573F17551E73609D70B8747F9740AE19E89F67596045E6A17A5
3,270,808 UART: [art] SIG.S = BABEDB358A410A254DB051286559B9ACD2B9B7E6B494827E3283F112B04CCA67D02D43B54A4C779946F5428352995108
3,294,081 UART: Caliptra RT
3,294,426 UART: [state] CFI Enabled
3,402,585 UART: [rt] RT listening for mailbox commands...
3,403,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,843 UART: [rt]cmd =0x44504543, len=96
3,615,238 >>> mbox cmd response data (6236 bytes)
3,615,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,098 UART: [rt]cmd =0x53574545, len=84
3,648,377 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
901,989 UART: [kat] SHA2-256
903,929 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,171,797 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,692 UART: [idev] ++
1,174,860 UART: [idev] CDI.KEYID = 6
1,175,220 UART: [idev] SUBJECT.KEYID = 7
1,175,644 UART: [idev] UDS.KEYID = 0
1,175,989 ready_for_fw is high
1,175,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,899 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,838 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,585 >>> mbox cmd response: success
2,774,679 UART: [afmc] ++
2,774,847 UART: [afmc] CDI.KEYID = 6
2,775,209 UART: [afmc] SUBJECT.KEYID = 7
2,775,634 UART: [afmc] AUTHORITY.KEYID = 5
2,811,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,851 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,392 UART: [afmc] --
2,854,348 UART: [cold-reset] --
2,855,120 UART: [state] Locking Datavault
2,856,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,831 UART: [state] Locking ICCM
2,857,495 UART: [exit] Launching FMC @ 0x40000130
2,862,824 UART:
2,862,840 UART: Running Caliptra FMC ...
2,863,248 UART:
2,863,302 UART: [state] CFI Enabled
2,873,879 UART: [fht] FMC Alias Private Key: 7
2,982,468 UART: [art] Extend RT PCRs Done
2,982,896 UART: [art] Lock RT PCRs Done
2,984,242 UART: [art] Populate DV Done
2,992,475 UART: [fht] FMC Alias Private Key: 7
2,993,591 UART: [art] Derive CDI
2,993,871 UART: [art] Store in in slot 0x4
3,079,572 UART: [art] Derive Key Pair
3,079,932 UART: [art] Store priv key in slot 0x5
3,093,286 UART: [art] Derive Key Pair - Done
3,108,062 UART: [art] Signing Cert with AUTHO
3,108,542 UART: RITY.KEYID = 7
3,123,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,597 UART: [art] PUB.X = FFEDD858DAB04F89246535193BE5B7ACF68F7B10CE508094740B13E7544C6F26A9512857FCD7B97677BD895770D2DCED
3,131,372 UART: [art] PUB.Y = 04436B5C1864210DBD4DDC0BBA6E0B80249303EFDF217CAD2107C4E8FA65D894814DE0552BD0063BEA54531117D47EFE
3,138,311 UART: [art] SIG.R = 60E898D45B9CFA8AAF5B335220ABE5A46B23D90CE275C780D45F9ABC044352C5CA25FAA38F26E5A8D7E9BB9B4F10AADC
3,145,099 UART: [art] SIG.S = 3E35EBAD86F707288D79C4FF33FA3A34051659412AC51054F8EEECDE4594C08D217D787666D6F95AA10A5E5D8E9E9120
3,168,633 UART: Caliptra RT
3,168,886 UART: [state] CFI Enabled
3,277,209 UART: [rt] RT listening for mailbox commands...
3,277,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,177 UART: [rt]cmd =0x44504543, len=96
3,488,074 >>> mbox cmd response data (6236 bytes)
3,488,075 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,206 UART: [rt]cmd =0x53574545, len=84
3,521,303 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,303 ready_for_fw is high
1,060,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,156 >>> mbox cmd response: success
2,687,496 UART:
2,687,512 UART: Running Caliptra FMC ...
2,687,920 UART:
2,687,974 UART: [state] CFI Enabled
2,697,899 UART: [fht] FMC Alias Private Key: 7
2,806,172 UART: [art] Extend RT PCRs Done
2,806,600 UART: [art] Lock RT PCRs Done
2,808,366 UART: [art] Populate DV Done
2,816,635 UART: [fht] FMC Alias Private Key: 7
2,817,689 UART: [art] Derive CDI
2,817,969 UART: [art] Store in in slot 0x4
2,903,858 UART: [art] Derive Key Pair
2,904,218 UART: [art] Store priv key in slot 0x5
2,917,498 UART: [art] Derive Key Pair - Done
2,932,349 UART: [art] Signing Cert with AUTHO
2,932,829 UART: RITY.KEYID = 7
2,947,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,394 UART: [art] PUB.X = 7276971B70D5A72A9DFEE5F6BB3B8A2EEC2349EC3B81227C5D1B13D179C9CC6BDA6875C1BD11CF22E8E1603459EC4013
2,955,178 UART: [art] PUB.Y = 629CB1B347CBE7861F245AD6598369FA29B8BF9D4C5727EB1B8F596F77595EFAE97323A88F1E17DA1177000213ED305B
2,962,107 UART: [art] SIG.R = A04BDCF185227FC8D1F3EC022FB338BABC2A8EC098D801A25D950BDCEE8775BB7B0302DC61D03D3B5EA70B6A8B35A54C
2,968,883 UART: [art] SIG.S = CD4A083B4E3D71D79BD0F7DE57E3FA8FA369B9E815CCD66454B56A00BE509F0DE3B44D9AC93A7585CDEAE44B19BF30C2
2,992,468 UART: Caliptra RT
2,992,721 UART: [state] CFI Enabled
3,099,841 UART: [rt] RT listening for mailbox commands...
3,100,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,629 UART: [rt]cmd =0x44504543, len=96
3,310,392 >>> mbox cmd response data (6236 bytes)
3,310,393 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,238 UART: [rt]cmd =0x53574545, len=84
3,343,919 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,502 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 ready_for_fw is high
1,176,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,317 UART: [idev] Erasing UDS.KEYID = 0
1,201,502 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,552 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,206 UART: [ldev] --
1,283,615 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,963 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,096 >>> mbox cmd response: success
2,777,202 UART: [afmc] ++
2,777,370 UART: [afmc] CDI.KEYID = 6
2,777,732 UART: [afmc] SUBJECT.KEYID = 7
2,778,157 UART: [afmc] AUTHORITY.KEYID = 5
2,814,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,859 UART: [afmc] --
2,857,945 UART: [cold-reset] --
2,858,989 UART: [state] Locking Datavault
2,860,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,786 UART: [state] Locking ICCM
2,861,246 UART: [exit] Launching FMC @ 0x40000130
2,866,575 UART:
2,866,591 UART: Running Caliptra FMC ...
2,866,999 UART:
2,867,142 UART: [state] CFI Enabled
2,877,903 UART: [fht] FMC Alias Private Key: 7
2,986,476 UART: [art] Extend RT PCRs Done
2,986,904 UART: [art] Lock RT PCRs Done
2,988,450 UART: [art] Populate DV Done
2,996,369 UART: [fht] FMC Alias Private Key: 7
2,997,463 UART: [art] Derive CDI
2,997,743 UART: [art] Store in in slot 0x4
3,083,448 UART: [art] Derive Key Pair
3,083,808 UART: [art] Store priv key in slot 0x5
3,096,674 UART: [art] Derive Key Pair - Done
3,111,386 UART: [art] Signing Cert with AUTHO
3,111,866 UART: RITY.KEYID = 7
3,127,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,207 UART: [art] PUB.X = F8EFA02E5CD1D3463E8D60EC3DCB0D0A224791C6ED754C9A0FC70FBBCC270277DD266616912AC6C7526E78C6624E5F56
3,134,976 UART: [art] PUB.Y = C3C64609C033A7C3F99F4E1105C8B00230EA59E515A8485A5CE31DD5F4A59F389B7A8F9F7A9D846BB7DCB6F46ADE98D2
3,141,931 UART: [art] SIG.R = 24837EA5E44D272736092B56DFAB0680BDE3E7DDFA5F35D9F40E1DA6CFFD7D90F88C875987F5C2957032FE4891133145
3,148,698 UART: [art] SIG.S = 6300FEFBA62A65A126170ED0C0EB441487CD565D8D26EF5BF472F822B11359AF00091DA58CCBB0166DE22440D7E5ABB6
3,171,847 UART: Caliptra RT
3,172,192 UART: [state] CFI Enabled
3,279,711 UART: [rt] RT listening for mailbox commands...
3,280,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,753 UART: [rt]cmd =0x44504543, len=96
3,490,249 >>> mbox cmd response data (6236 bytes)
3,490,250 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,067 UART: [rt]cmd =0x53574545, len=84
3,523,388 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,580 ready_for_fw is high
1,059,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,449 >>> mbox cmd response: success
2,686,367 UART:
2,686,383 UART: Running Caliptra FMC ...
2,686,791 UART:
2,686,934 UART: [state] CFI Enabled
2,697,975 UART: [fht] FMC Alias Private Key: 7
2,806,060 UART: [art] Extend RT PCRs Done
2,806,488 UART: [art] Lock RT PCRs Done
2,808,034 UART: [art] Populate DV Done
2,816,505 UART: [fht] FMC Alias Private Key: 7
2,817,641 UART: [art] Derive CDI
2,817,921 UART: [art] Store in in slot 0x4
2,903,426 UART: [art] Derive Key Pair
2,903,786 UART: [art] Store priv key in slot 0x5
2,917,196 UART: [art] Derive Key Pair - Done
2,932,017 UART: [art] Signing Cert with AUTHO
2,932,497 UART: RITY.KEYID = 7
2,947,655 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,420 UART: [art] PUB.X = 37FC73B9E254C2CD1F9AA0AEF8F69749E5259BD545B4A5ACCCC6A6DB8F519D90CF47A231CAD1A4969248CB06CD42EA2A
2,955,211 UART: [art] PUB.Y = 8E36B4427E8C912A18B191D33990E743BE7DA63632DAD7B228C77A3C94128862B1A1ED62FDA7397C0122432131D59EE6
2,962,156 UART: [art] SIG.R = 59B10D03E689BD3CA9BC26CE39EE0DD555B451ADEA300A98009A0469DFEB3B45D8401440AABF1058ADFA39A667628314
2,968,901 UART: [art] SIG.S = C088CC55FD549AE71CFE16DDBD2ECFD1CA931C9D73CC6FDAB62087885CBA5E57D5C93D1BC3A5557058F9E7B98F1869C8
2,992,660 UART: Caliptra RT
2,993,005 UART: [state] CFI Enabled
3,101,172 UART: [rt] RT listening for mailbox commands...
3,101,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,312 UART: [rt]cmd =0x44504543, len=96
3,312,999 >>> mbox cmd response data (6236 bytes)
3,313,000 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,933 UART: [rt]cmd =0x53574545, len=84
3,346,210 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,274 UART: [kat] LMS
1,168,586 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 ready_for_fw is high
1,173,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,409 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,313 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,030 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,938 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,053 UART: [fwproc] Recv command 0x46574c44
1,282,786 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,081 >>> mbox cmd response: success
2,773,148 UART: [afmc] ++
2,773,316 UART: [afmc] CDI.KEYID = 6
2,773,679 UART: [afmc] SUBJECT.KEYID = 7
2,774,105 UART: [afmc] AUTHORITY.KEYID = 5
2,809,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,579 UART: [afmc] --
2,853,479 UART: [cold-reset] --
2,854,319 UART: [state] Locking Datavault
2,855,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,964 UART: [state] Locking ICCM
2,856,422 UART: [exit] Launching FMC @ 0x40000130
2,861,751 UART:
2,861,767 UART: Running Caliptra FMC ...
2,862,175 UART:
2,862,229 UART: [state] CFI Enabled
2,872,974 UART: [fht] FMC Alias Private Key: 7
2,980,759 UART: [art] Extend RT PCRs Done
2,981,187 UART: [art] Lock RT PCRs Done
2,982,735 UART: [art] Populate DV Done
2,990,886 UART: [fht] FMC Alias Private Key: 7
2,992,060 UART: [art] Derive CDI
2,992,340 UART: [art] Store in in slot 0x4
3,077,519 UART: [art] Derive Key Pair
3,077,879 UART: [art] Store priv key in slot 0x5
3,090,811 UART: [art] Derive Key Pair - Done
3,105,401 UART: [art] Signing Cert with AUTHO
3,105,881 UART: RITY.KEYID = 7
3,121,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,924 UART: [art] PUB.X = 3A98C264FF3A1190DAD88F503C4FD537E891D7777EF83FC33EA5CE877C1C3019804CC0BDA4C4E7AB527390DAA4CCCE60
3,128,712 UART: [art] PUB.Y = E985A362FFA864BF3C89BBC3E5A2811322F9649CD3046A8A5D80DA82A9352F81D615258CD6312180347C3A8D06A1E753
3,135,656 UART: [art] SIG.R = 0CF2BE95678E827E1610B75D55010135D350F54F16B04B6D6B63F47D222D341F8A047302E987DCFCDC7B8B6D20E4C59A
3,142,415 UART: [art] SIG.S = 3B9DA971D40A29EF4F549D440B19C92200E3AF5FCD475687D3879AF15D34D853AB296F43E307150BE7FFC61222EF83DE
3,165,612 UART: Caliptra RT
3,165,865 UART: [state] CFI Enabled
3,273,474 UART: [rt] RT listening for mailbox commands...
3,274,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,652 UART: [rt]cmd =0x44504543, len=96
3,484,288 >>> mbox cmd response data (6236 bytes)
3,484,289 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,158 UART: [rt]cmd =0x53574545, len=84
3,517,179 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,412 ready_for_fw is high
1,055,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,377 >>> mbox cmd response: success
2,686,061 UART:
2,686,077 UART: Running Caliptra FMC ...
2,686,485 UART:
2,686,539 UART: [state] CFI Enabled
2,697,036 UART: [fht] FMC Alias Private Key: 7
2,805,285 UART: [art] Extend RT PCRs Done
2,805,713 UART: [art] Lock RT PCRs Done
2,807,079 UART: [art] Populate DV Done
2,815,370 UART: [fht] FMC Alias Private Key: 7
2,816,388 UART: [art] Derive CDI
2,816,668 UART: [art] Store in in slot 0x4
2,902,681 UART: [art] Derive Key Pair
2,903,041 UART: [art] Store priv key in slot 0x5
2,916,171 UART: [art] Derive Key Pair - Done
2,930,961 UART: [art] Signing Cert with AUTHO
2,931,441 UART: RITY.KEYID = 7
2,946,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,386 UART: [art] PUB.X = B952C9C9683F385D98401D5981ABA5D6401ED64A443DC0336860EC8BF8DAD7D31292DDD1DED7DB6AA90F529BF0E8FD26
2,954,169 UART: [art] PUB.Y = C1532901E2CB48F53971FD4A95E44305152AB205807ADACA77415CDFDD671F46AA5AD9645324037EDB518D66C9053AFD
2,961,110 UART: [art] SIG.R = C518014ECBAD241E66188B9ED903B26E3AB3F43801C282F8923DD67C8199CEFE3D870BC81A9F32666F98639E626769F8
2,967,870 UART: [art] SIG.S = 6215A4257A9434EB6E41D3145D2EB41C0E6409EF0D1D6570E7C77868A92078B123B357B874BF97AD78F0DDA14603BD07
2,991,632 UART: Caliptra RT
2,991,885 UART: [state] CFI Enabled
3,099,324 UART: [rt] RT listening for mailbox commands...
3,099,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,148 UART: [rt]cmd =0x44504543, len=96
3,310,707 >>> mbox cmd response data (6236 bytes)
3,310,708 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,653 UART: [rt]cmd =0x53574545, len=84
3,343,754 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
905,209 UART: [kat] SHA2-512-ACC
907,110 UART: [kat] ECC-384
916,927 UART: [kat] HMAC-384Kdf
921,567 UART: [kat] LMS
1,169,879 UART: [kat] --
1,170,912 UART: [cold-reset] ++
1,171,258 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,268 UART: [idev] Erasing UDS.KEYID = 0
1,200,842 UART: [idev] Sha1 KeyId Algorithm
1,209,788 UART: [idev] --
1,210,831 UART: [ldev] ++
1,210,999 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,577 UART: [ldev] Erasing FE.KEYID = 1
1,244,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,573 UART: [ldev] --
1,283,993 UART: [fwproc] Wait for Commands...
1,284,712 UART: [fwproc] Recv command 0x46574c44
1,285,445 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,274 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,184 >>> mbox cmd response: success
2,776,277 UART: [afmc] ++
2,776,445 UART: [afmc] CDI.KEYID = 6
2,776,808 UART: [afmc] SUBJECT.KEYID = 7
2,777,234 UART: [afmc] AUTHORITY.KEYID = 5
2,812,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,022 UART: [afmc] --
2,855,930 UART: [cold-reset] --
2,856,594 UART: [state] Locking Datavault
2,857,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,283 UART: [state] Locking ICCM
2,858,741 UART: [exit] Launching FMC @ 0x40000130
2,864,070 UART:
2,864,086 UART: Running Caliptra FMC ...
2,864,494 UART:
2,864,637 UART: [state] CFI Enabled
2,875,730 UART: [fht] FMC Alias Private Key: 7
2,983,531 UART: [art] Extend RT PCRs Done
2,983,959 UART: [art] Lock RT PCRs Done
2,985,667 UART: [art] Populate DV Done
2,993,974 UART: [fht] FMC Alias Private Key: 7
2,995,044 UART: [art] Derive CDI
2,995,324 UART: [art] Store in in slot 0x4
3,080,781 UART: [art] Derive Key Pair
3,081,141 UART: [art] Store priv key in slot 0x5
3,093,791 UART: [art] Derive Key Pair - Done
3,108,680 UART: [art] Signing Cert with AUTHO
3,109,160 UART: RITY.KEYID = 7
3,124,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,819 UART: [art] PUB.X = 1EE2BFAC55786D42A7E9D819B607694F552D22ACACD7CF25A865F68FCC450D544C7E85062D752034B5A596C0541C6BC1
3,131,588 UART: [art] PUB.Y = 524C790FA71ECDCC6A955D9CC6E8DA3612F0D2CC5329769B5EEBA29102F0D8D45350792AC80962BAF5312EFD00E2D215
3,138,519 UART: [art] SIG.R = 2BB735482C7BFD94B679AF60138727CEF99B9234F2181ED701B358629E751CEDFB6D264769728FBE4BBCD71EE98C2CFB
3,145,298 UART: [art] SIG.S = A461A2B9F678D240D1DBB34DB198687E8DBD3FA30295E4AD9F908FB9A808EC9EAE9A2270E244339D70FE399F1A2F7248
3,169,081 UART: Caliptra RT
3,169,426 UART: [state] CFI Enabled
3,277,575 UART: [rt] RT listening for mailbox commands...
3,278,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,909 UART: [rt]cmd =0x44504543, len=96
3,488,994 >>> mbox cmd response data (6236 bytes)
3,488,995 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,780 UART: [rt]cmd =0x53574545, len=84
3,521,803 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,927 ready_for_fw is high
1,055,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,226 >>> mbox cmd response: success
2,683,952 UART:
2,683,968 UART: Running Caliptra FMC ...
2,684,376 UART:
2,684,519 UART: [state] CFI Enabled
2,694,962 UART: [fht] FMC Alias Private Key: 7
2,802,381 UART: [art] Extend RT PCRs Done
2,802,809 UART: [art] Lock RT PCRs Done
2,804,383 UART: [art] Populate DV Done
2,812,694 UART: [fht] FMC Alias Private Key: 7
2,813,810 UART: [art] Derive CDI
2,814,090 UART: [art] Store in in slot 0x4
2,900,161 UART: [art] Derive Key Pair
2,900,521 UART: [art] Store priv key in slot 0x5
2,913,717 UART: [art] Derive Key Pair - Done
2,928,537 UART: [art] Signing Cert with AUTHO
2,929,017 UART: RITY.KEYID = 7
2,943,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,642 UART: [art] PUB.X = CAB429879EB216E76B473BCC4911B63F04B6BBA3434F2EBF1B983993BA238DAEBC6D5DF2D9C36EB6629120354E063BAF
2,951,422 UART: [art] PUB.Y = 64069F269C25252F1E75E1855902F71D42B096AA06FD1794B6478D2149B22B3288FE90872571200D3C86A480D3AEB61C
2,958,350 UART: [art] SIG.R = B580AC88C1D7DCD728316D1214692B3057FADEF10BF621E5444FAB2BE5CCA95B1B7426BC9C910088B3A5DDF9867E797B
2,965,109 UART: [art] SIG.S = 0CEFE9BE3A240C9FC944829DFF2A0ED0B12751042DF97B096C9B494EDEBD1826C62CA8255DE80F3086198F751EF1D5EE
2,988,860 UART: Caliptra RT
2,989,205 UART: [state] CFI Enabled
3,097,054 UART: [rt] RT listening for mailbox commands...
3,097,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,616 UART: [rt]cmd =0x44504543, len=96
3,308,416 >>> mbox cmd response data (6236 bytes)
3,308,417 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,310 UART: [rt]cmd =0x53574545, len=84
3,341,445 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,368 UART: [kat] SHA2-512-ACC
897,269 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,474 UART: [idev] ++
1,479,642 UART: [idev] CDI.KEYID = 6
1,480,002 UART: [idev] SUBJECT.KEYID = 7
1,480,426 UART: [idev] UDS.KEYID = 0
1,480,771 ready_for_fw is high
1,480,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,160 UART: [idev] Erasing UDS.KEYID = 0
1,504,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,858 UART: [idev] --
1,513,715 UART: [ldev] ++
1,513,883 UART: [ldev] CDI.KEYID = 6
1,514,246 UART: [ldev] SUBJECT.KEYID = 5
1,514,672 UART: [ldev] AUTHORITY.KEYID = 7
1,515,135 UART: [ldev] FE.KEYID = 1
1,520,297 UART: [ldev] Erasing FE.KEYID = 1
1,545,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,662 UART: [ldev] --
1,585,071 UART: [fwproc] Waiting for Commands...
1,585,890 UART: [fwproc] Received command 0x46574c44
1,586,681 UART: [fwproc] Received Image of size 114332 bytes
2,883,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,580 >>> mbox cmd response: success
3,077,828 UART: [afmc] ++
3,077,996 UART: [afmc] CDI.KEYID = 6
3,078,358 UART: [afmc] SUBJECT.KEYID = 7
3,078,783 UART: [afmc] AUTHORITY.KEYID = 5
3,114,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,881 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,571 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,620 UART: [afmc] --
3,157,750 UART: [cold-reset] --
3,158,434 UART: [state] Locking Datavault
3,159,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,245 UART: [state] Locking ICCM
3,160,831 UART: [exit] Launching FMC @ 0x40000130
3,166,160 UART:
3,166,176 UART: Running Caliptra FMC ...
3,166,584 UART:
3,166,638 UART: [state] CFI Enabled
3,177,111 UART: [fht] FMC Alias Private Key: 7
3,284,910 UART: [art] Extend RT PCRs Done
3,285,338 UART: [art] Lock RT PCRs Done
3,286,964 UART: [art] Populate DV Done
3,295,123 UART: [fht] FMC Alias Private Key: 7
3,296,137 UART: [art] Derive CDI
3,296,417 UART: [art] Store in in slot 0x4
3,382,028 UART: [art] Derive Key Pair
3,382,388 UART: [art] Store priv key in slot 0x5
3,394,778 UART: [art] Derive Key Pair - Done
3,409,616 UART: [art] Signing Cert with AUTHO
3,410,096 UART: RITY.KEYID = 7
3,425,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,187 UART: [art] PUB.X = 4F883BC7758DBFADC49E5394A6D8E58F8442912B5629A46539697096558A888D3D149991842E5050527F5A7A26781813
3,432,941 UART: [art] PUB.Y = B838E34A10907B10533C1B4B176C1009B81C6E3DFB482CF89EC6B4472AA204603225906E7646DA3B2B2A2B622252BE1D
3,439,885 UART: [art] SIG.R = 8BF1207D5665E262FB5934E2154FA06B229134F261DF321865C196745490C3297227DE33E2540A867FC0F8AF1B8CC5E6
3,446,646 UART: [art] SIG.S = 297B056201AA18ED300EDDDC19DC1CA4F21390D8DFD51EF93AFFD8FEC8CFCF3AC2F95C2444A9EC9BFBD07E0909BC2C48
3,470,930 UART: Caliptra RT
3,471,183 UART: [state] CFI Enabled
3,578,262 UART: [rt] RT listening for mailbox commands...
3,578,932 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,146 UART: [rt]cmd =0x53574545, len=84
3,612,108 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,417 ready_for_fw is high
1,362,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,912 >>> mbox cmd response: success
2,987,556 UART:
2,987,572 UART: Running Caliptra FMC ...
2,987,980 UART:
2,988,034 UART: [state] CFI Enabled
2,998,817 UART: [fht] FMC Alias Private Key: 7
3,106,520 UART: [art] Extend RT PCRs Done
3,106,948 UART: [art] Lock RT PCRs Done
3,108,574 UART: [art] Populate DV Done
3,117,005 UART: [fht] FMC Alias Private Key: 7
3,117,967 UART: [art] Derive CDI
3,118,247 UART: [art] Store in in slot 0x4
3,203,776 UART: [art] Derive Key Pair
3,204,136 UART: [art] Store priv key in slot 0x5
3,217,438 UART: [art] Derive Key Pair - Done
3,232,090 UART: [art] Signing Cert with AUTHO
3,232,570 UART: RITY.KEYID = 7
3,247,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,391 UART: [art] PUB.X = 5D7AE0A009EC92E38997DFCD038479065AFDD163ACA0A7C6B329F9AED198B9495D43DB8C0EDA819339D7289FDEBBAEFE
3,255,173 UART: [art] PUB.Y = E6138736172ED8E8D756157BA17FEE93F9F63B6D880C92E70D19270D4DFB88740240CF7529C3229E23DDCD060E725399
3,262,103 UART: [art] SIG.R = D766454C8F81735DD87448A07480EBF133CC46A56CE2782DF8FF3556D6658281AD79D070B680DABA529DDDF2C09CD0F7
3,268,881 UART: [art] SIG.S = D23AED4C28BD062059276C1E33A19284AAE0BE0B578750507F11DBFE6640E98621D9F8A8DFBF838F08F4D7826D753251
3,292,409 UART: Caliptra RT
3,292,662 UART: [state] CFI Enabled
3,400,902 UART: [rt] RT listening for mailbox commands...
3,401,572 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,018 UART: [rt]cmd =0x53574545, len=84
3,435,142 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,008 UART: [fht] Storing FHT @ 0x50003400
1,479,757 UART: [idev] ++
1,479,925 UART: [idev] CDI.KEYID = 6
1,480,285 UART: [idev] SUBJECT.KEYID = 7
1,480,709 UART: [idev] UDS.KEYID = 0
1,481,054 ready_for_fw is high
1,481,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,465 UART: [idev] Erasing UDS.KEYID = 0
1,505,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,752 UART: [ldev] ++
1,514,920 UART: [ldev] CDI.KEYID = 6
1,515,283 UART: [ldev] SUBJECT.KEYID = 5
1,515,709 UART: [ldev] AUTHORITY.KEYID = 7
1,516,172 UART: [ldev] FE.KEYID = 1
1,521,242 UART: [ldev] Erasing FE.KEYID = 1
1,546,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,287 UART: [ldev] --
1,585,748 UART: [fwproc] Waiting for Commands...
1,586,537 UART: [fwproc] Received command 0x46574c44
1,587,328 UART: [fwproc] Received Image of size 114332 bytes
2,885,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,427 >>> mbox cmd response: success
3,078,489 UART: [afmc] ++
3,078,657 UART: [afmc] CDI.KEYID = 6
3,079,019 UART: [afmc] SUBJECT.KEYID = 7
3,079,444 UART: [afmc] AUTHORITY.KEYID = 5
3,114,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,139 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,532 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,222 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,295 UART: [afmc] --
3,158,365 UART: [cold-reset] --
3,159,109 UART: [state] Locking Datavault
3,160,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,836 UART: [state] Locking ICCM
3,161,360 UART: [exit] Launching FMC @ 0x40000130
3,166,689 UART:
3,166,705 UART: Running Caliptra FMC ...
3,167,113 UART:
3,167,256 UART: [state] CFI Enabled
3,177,783 UART: [fht] FMC Alias Private Key: 7
3,285,916 UART: [art] Extend RT PCRs Done
3,286,344 UART: [art] Lock RT PCRs Done
3,287,854 UART: [art] Populate DV Done
3,296,373 UART: [fht] FMC Alias Private Key: 7
3,297,485 UART: [art] Derive CDI
3,297,765 UART: [art] Store in in slot 0x4
3,383,364 UART: [art] Derive Key Pair
3,383,724 UART: [art] Store priv key in slot 0x5
3,397,226 UART: [art] Derive Key Pair - Done
3,412,016 UART: [art] Signing Cert with AUTHO
3,412,496 UART: RITY.KEYID = 7
3,427,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,631 UART: [art] PUB.X = CD8B448200B089016E157E16BEE4A1DB119EFF637D4938EF425B3C853BED3605269C27C56C0D613B92CF48E76F55199F
3,435,374 UART: [art] PUB.Y = 64A016B118F0BFC92B30D9E35B3439DCE6233EA9D07E6C31EFAC22E79F93F8BC2D69D7FA85C2A3EE8509B3A59EB351A2
3,442,339 UART: [art] SIG.R = 4329AC8F487D8FA21C391F89EB0CB1D81860B5CD2F66293E9B553A7FBD87DF47F8585EDCA5257949C901E3419DC65B8A
3,449,113 UART: [art] SIG.S = 26A38D79697288D4CC3D35C2FB2E5CD06E57CFEF6D5465410961DA67A2EF8BD1DDBCD3425F4F415FE84266776E8F2EE9
3,473,087 UART: Caliptra RT
3,473,432 UART: [state] CFI Enabled
3,581,326 UART: [rt] RT listening for mailbox commands...
3,581,996 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,496 UART: [rt]cmd =0x53574545, len=84
3,615,782 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,830 ready_for_fw is high
1,362,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,825 >>> mbox cmd response: success
2,990,169 UART:
2,990,185 UART: Running Caliptra FMC ...
2,990,593 UART:
2,990,736 UART: [state] CFI Enabled
3,001,319 UART: [fht] FMC Alias Private Key: 7
3,108,720 UART: [art] Extend RT PCRs Done
3,109,148 UART: [art] Lock RT PCRs Done
3,110,770 UART: [art] Populate DV Done
3,118,897 UART: [fht] FMC Alias Private Key: 7
3,119,941 UART: [art] Derive CDI
3,120,221 UART: [art] Store in in slot 0x4
3,206,074 UART: [art] Derive Key Pair
3,206,434 UART: [art] Store priv key in slot 0x5
3,219,418 UART: [art] Derive Key Pair - Done
3,234,146 UART: [art] Signing Cert with AUTHO
3,234,626 UART: RITY.KEYID = 7
3,249,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,173 UART: [art] PUB.X = 59D18D30DF915CC16FE485D9BD7E8FC352E3CF8E57F16D926D24DBCC34E49F291A2986ED3E9256EC1D8D1286FB5B27C4
3,256,959 UART: [art] PUB.Y = B300459591F76C743071B67B2FEC6C27194B5A81C9CC601019BD53FA7A7C90C5494A2D3325A26FB3BE59F8C5CAAA1D70
3,263,895 UART: [art] SIG.R = E3DB7E5A9E253AE2344D4590C69D93806232CF17DC8725D975238C30045ACE8BB3912BBDA40A0346AA9CBCC79AD16558
3,270,664 UART: [art] SIG.S = FD09E8360DFA693FFA412B1F012FA02CDFE9344A7E0CBC1DA5CC6A8385ABFF108B772FAC8D0CC1095A503D902F50D7E4
3,294,595 UART: Caliptra RT
3,294,940 UART: [state] CFI Enabled
3,402,856 UART: [rt] RT listening for mailbox commands...
3,403,526 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,704 UART: [rt]cmd =0x53574545, len=84
3,436,594 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
893,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,499 UART: [kat] ++
897,651 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,802 UART: [idev] ++
1,174,970 UART: [idev] CDI.KEYID = 6
1,175,330 UART: [idev] SUBJECT.KEYID = 7
1,175,754 UART: [idev] UDS.KEYID = 0
1,176,099 ready_for_fw is high
1,176,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,758 UART: [idev] Erasing UDS.KEYID = 0
1,200,755 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,461 UART: [ldev] ++
1,210,629 UART: [ldev] CDI.KEYID = 6
1,210,992 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,896 UART: [fwproc] Recv command 0x46574c44
1,282,624 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,515 >>> mbox cmd response: success
2,773,625 UART: [afmc] ++
2,773,793 UART: [afmc] CDI.KEYID = 6
2,774,155 UART: [afmc] SUBJECT.KEYID = 7
2,774,580 UART: [afmc] AUTHORITY.KEYID = 5
2,809,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,662 UART: [afmc] --
2,852,640 UART: [cold-reset] --
2,853,486 UART: [state] Locking Datavault
2,855,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,627 UART: [state] Locking ICCM
2,856,215 UART: [exit] Launching FMC @ 0x40000130
2,861,544 UART:
2,861,560 UART: Running Caliptra FMC ...
2,861,968 UART:
2,862,022 UART: [state] CFI Enabled
2,872,449 UART: [fht] FMC Alias Private Key: 7
2,980,480 UART: [art] Extend RT PCRs Done
2,980,908 UART: [art] Lock RT PCRs Done
2,982,448 UART: [art] Populate DV Done
2,991,057 UART: [fht] FMC Alias Private Key: 7
2,992,235 UART: [art] Derive CDI
2,992,515 UART: [art] Store in in slot 0x4
3,078,350 UART: [art] Derive Key Pair
3,078,710 UART: [art] Store priv key in slot 0x5
3,092,394 UART: [art] Derive Key Pair - Done
3,107,036 UART: [art] Signing Cert with AUTHO
3,107,516 UART: RITY.KEYID = 7
3,123,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,831 UART: [art] PUB.X = 0815DC3E1D14433E0A1EEF0E0D6AE4CD2CFCA74ED7FB65FD5D992A421D904C3DE08EAE0D5067FCFB8B6C5AC341D71B1B
3,130,616 UART: [art] PUB.Y = FB137A3FA74B13223A1CAA6E48E6386BF24CEB4BFD9A1CA2E094DAE5B3D2D7AF9BF38AEE26DD0E7889184386945B0CC7
3,137,584 UART: [art] SIG.R = 3D05DC2360C87BE170505AF6E65D110C5CC785E7D1253C2A978B9394E190CE725F78449E3F7AA0BD75614041AFF5E53A
3,144,352 UART: [art] SIG.S = BF5E16FD15B093C94965442AB589C68C1223F196017DABC8BC356487FF6CABB58C32F63CF671F43D65865B077BDB62A1
3,168,763 UART: Caliptra RT
3,169,016 UART: [state] CFI Enabled
3,276,079 UART: [rt] RT listening for mailbox commands...
3,276,749 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,117 UART: [rt]cmd =0x53574545, len=84
3,310,173 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,201 ready_for_fw is high
1,060,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,246 >>> mbox cmd response: success
2,688,498 UART:
2,688,514 UART: Running Caliptra FMC ...
2,688,922 UART:
2,688,976 UART: [state] CFI Enabled
2,699,255 UART: [fht] FMC Alias Private Key: 7
2,806,974 UART: [art] Extend RT PCRs Done
2,807,402 UART: [art] Lock RT PCRs Done
2,808,904 UART: [art] Populate DV Done
2,816,871 UART: [fht] FMC Alias Private Key: 7
2,817,827 UART: [art] Derive CDI
2,818,107 UART: [art] Store in in slot 0x4
2,903,154 UART: [art] Derive Key Pair
2,903,514 UART: [art] Store priv key in slot 0x5
2,916,666 UART: [art] Derive Key Pair - Done
2,931,377 UART: [art] Signing Cert with AUTHO
2,931,857 UART: RITY.KEYID = 7
2,947,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,968 UART: [art] PUB.X = 601ADBABD98A8B63079F39C1E7A910E591911CDCA3F2159A72A99BB67B626D5A75B790716E242054DD453502333988A8
2,954,730 UART: [art] PUB.Y = 32D8C002040D63B770D5DBB5DFDD9CBA56A57FC0AE4060E6FA2365F158A51305E8A89911EDF580FA2D22058CD5642831
2,961,673 UART: [art] SIG.R = C0FEA916FC230AB62A5343DE8CE2258D02C11C794235C1F9486EF3CBAF34EF427C82B4748C6B836ED91FF08E3E7F2316
2,968,449 UART: [art] SIG.S = 7F0D6A88C22432032C4014A7802EE1595D9177DF4422B5BB8B84B25B14362EBC59CA8E211FC63DEA4E991608BE8FBE5A
2,992,361 UART: Caliptra RT
2,992,614 UART: [state] CFI Enabled
3,100,671 UART: [rt] RT listening for mailbox commands...
3,101,341 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,007 UART: [rt]cmd =0x53574545, len=84
3,135,453 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
893,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,452 UART: [kat] ++
897,604 UART: [kat] sha1
901,836 UART: [kat] SHA2-256
903,776 UART: [kat] SHA2-384
906,339 UART: [kat] SHA2-512-ACC
908,240 UART: [kat] ECC-384
918,085 UART: [kat] HMAC-384Kdf
922,825 UART: [kat] LMS
1,171,153 UART: [kat] --
1,172,222 UART: [cold-reset] ++
1,172,666 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 ready_for_fw is high
1,176,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,696 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,211,042 UART: [ldev] ++
1,211,210 UART: [ldev] CDI.KEYID = 6
1,211,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,999 UART: [ldev] AUTHORITY.KEYID = 7
1,212,462 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,244,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,368 UART: [ldev] --
1,283,701 UART: [fwproc] Wait for Commands...
1,284,455 UART: [fwproc] Recv command 0x46574c44
1,285,183 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,742 >>> mbox cmd response: success
2,775,876 UART: [afmc] ++
2,776,044 UART: [afmc] CDI.KEYID = 6
2,776,406 UART: [afmc] SUBJECT.KEYID = 7
2,776,831 UART: [afmc] AUTHORITY.KEYID = 5
2,812,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,918 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,361 UART: [afmc] --
2,855,245 UART: [cold-reset] --
2,856,141 UART: [state] Locking Datavault
2,857,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,924 UART: [state] Locking ICCM
2,858,562 UART: [exit] Launching FMC @ 0x40000130
2,863,891 UART:
2,863,907 UART: Running Caliptra FMC ...
2,864,315 UART:
2,864,458 UART: [state] CFI Enabled
2,874,899 UART: [fht] FMC Alias Private Key: 7
2,983,010 UART: [art] Extend RT PCRs Done
2,983,438 UART: [art] Lock RT PCRs Done
2,984,798 UART: [art] Populate DV Done
2,992,899 UART: [fht] FMC Alias Private Key: 7
2,994,005 UART: [art] Derive CDI
2,994,285 UART: [art] Store in in slot 0x4
3,079,970 UART: [art] Derive Key Pair
3,080,330 UART: [art] Store priv key in slot 0x5
3,093,850 UART: [art] Derive Key Pair - Done
3,108,889 UART: [art] Signing Cert with AUTHO
3,109,369 UART: RITY.KEYID = 7
3,124,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,212 UART: [art] PUB.X = 87ECF3C1533909899C86C24CDCB2BB7B66FD5F3619E76FF377ACEBB82C10A919271B4B4D7AF9BCE1DEDA7E1C856CE3BA
3,132,005 UART: [art] PUB.Y = 9294C28B56D96C82F79D2924C93A82132B92405E2FBEFD78752C9DC27662562FB98A6A1BAAEF12E87E422E3DE0154E43
3,138,959 UART: [art] SIG.R = 524F000461EF4D534103C150ED343286FDA4CBED11A7A341273D8AD4030B5A62BF9AFE9B16F5AEAEB22AFBF98017B8A1
3,145,711 UART: [art] SIG.S = 51EF1A5ADB3A8544267EF5A6EF8AB990B154A6741408000989FB11AF6752161CF997E432DC43F0EC17EE5A13FE4B5C3C
3,169,450 UART: Caliptra RT
3,169,795 UART: [state] CFI Enabled
3,277,574 UART: [rt] RT listening for mailbox commands...
3,278,244 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,562 UART: [rt]cmd =0x53574545, len=84
3,311,906 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,198 ready_for_fw is high
1,060,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,267 >>> mbox cmd response: success
2,689,053 UART:
2,689,069 UART: Running Caliptra FMC ...
2,689,477 UART:
2,689,620 UART: [state] CFI Enabled
2,699,915 UART: [fht] FMC Alias Private Key: 7
2,808,168 UART: [art] Extend RT PCRs Done
2,808,596 UART: [art] Lock RT PCRs Done
2,810,026 UART: [art] Populate DV Done
2,818,357 UART: [fht] FMC Alias Private Key: 7
2,819,287 UART: [art] Derive CDI
2,819,567 UART: [art] Store in in slot 0x4
2,904,830 UART: [art] Derive Key Pair
2,905,190 UART: [art] Store priv key in slot 0x5
2,918,082 UART: [art] Derive Key Pair - Done
2,932,910 UART: [art] Signing Cert with AUTHO
2,933,390 UART: RITY.KEYID = 7
2,948,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,491 UART: [art] PUB.X = AC057B8F6BF75D44C4ABEB0108C7F14527E70063956D3F4FB96989F37F97A416F47781F5E7378AAACCB1F6D23CCEB89A
2,956,244 UART: [art] PUB.Y = A9573BA3A02AAE8A5F5F654FEA128560FADF5B2048F6BB6C06C4E6703E7B6B6D448CFF42421207953797E7E1B8F07AAA
2,963,202 UART: [art] SIG.R = 65F8E6881B1DFB8E04557453B7DBB2C662B43586330865D4A4C0BECB2E8644376F8A000BBD8E48890AB6A2AB59952FB8
2,969,944 UART: [art] SIG.S = F128C4B107B31B5A1D00C67AF235B95F14400D70D0C0EE2E1F3C9FB3525EAD3B037F870E5832D628EFCA2D74E7FA78F5
2,992,957 UART: Caliptra RT
2,993,302 UART: [state] CFI Enabled
3,101,491 UART: [rt] RT listening for mailbox commands...
3,102,161 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,603 UART: [rt]cmd =0x53574545, len=84
3,135,753 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,704 UART: [kat] HMAC-384Kdf
921,456 UART: [kat] LMS
1,169,768 UART: [kat] --
1,170,723 UART: [cold-reset] ++
1,171,249 UART: [fht] FHT @ 0x50003400
1,173,725 UART: [idev] ++
1,173,893 UART: [idev] CDI.KEYID = 6
1,174,254 UART: [idev] SUBJECT.KEYID = 7
1,174,679 UART: [idev] UDS.KEYID = 0
1,175,025 ready_for_fw is high
1,175,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,707 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,209,091 UART: [idev] --
1,210,080 UART: [ldev] ++
1,210,248 UART: [ldev] CDI.KEYID = 6
1,210,612 UART: [ldev] SUBJECT.KEYID = 5
1,211,039 UART: [ldev] AUTHORITY.KEYID = 7
1,211,502 UART: [ldev] FE.KEYID = 1
1,216,398 UART: [ldev] Erasing FE.KEYID = 1
1,242,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,746 UART: [ldev] --
1,282,124 UART: [fwproc] Wait for Commands...
1,282,833 UART: [fwproc] Recv command 0x46574c44
1,283,566 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,653 >>> mbox cmd response: success
2,773,672 UART: [afmc] ++
2,773,840 UART: [afmc] CDI.KEYID = 6
2,774,203 UART: [afmc] SUBJECT.KEYID = 7
2,774,629 UART: [afmc] AUTHORITY.KEYID = 5
2,809,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,981 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,711 UART: [afmc] --
2,853,709 UART: [cold-reset] --
2,854,311 UART: [state] Locking Datavault
2,855,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,896 UART: [state] Locking ICCM
2,856,568 UART: [exit] Launching FMC @ 0x40000130
2,861,897 UART:
2,861,913 UART: Running Caliptra FMC ...
2,862,321 UART:
2,862,375 UART: [state] CFI Enabled
2,873,034 UART: [fht] FMC Alias Private Key: 7
2,981,405 UART: [art] Extend RT PCRs Done
2,981,833 UART: [art] Lock RT PCRs Done
2,983,109 UART: [art] Populate DV Done
2,991,118 UART: [fht] FMC Alias Private Key: 7
2,992,132 UART: [art] Derive CDI
2,992,412 UART: [art] Store in in slot 0x4
3,077,927 UART: [art] Derive Key Pair
3,078,287 UART: [art] Store priv key in slot 0x5
3,091,469 UART: [art] Derive Key Pair - Done
3,105,996 UART: [art] Signing Cert with AUTHO
3,106,476 UART: RITY.KEYID = 7
3,122,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,137 UART: [art] PUB.X = 404F6D16196AAA3C0621E4811FBD7FCFE593D60045A34CDB8B03594130B3F7B337AA5128AC45D6BB5F197B88473D7FA1
3,129,887 UART: [art] PUB.Y = 474698D2A5509577A18D66074658C1A75E060E19C31FCC30787D17AA9FDB9D5A026634689BB737E8091CD0602B9765A9
3,136,814 UART: [art] SIG.R = 4B8D6F93C4DE14B9675C0E17517270F89C83C87B2CE60CF998947A4CD17D8E841B1FF756DA8E6598FF3618EF3539633E
3,143,582 UART: [art] SIG.S = 4C9B27622A38A7D02AE2C0012388EA008BEEBF8B2C5BA64F41C105FF320A988E5CE5CF175B9802889DAAFAF4BFEE217E
3,167,027 UART: Caliptra RT
3,167,280 UART: [state] CFI Enabled
3,275,163 UART: [rt] RT listening for mailbox commands...
3,275,833 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,199 UART: [rt]cmd =0x53574545, len=84
3,309,467 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 ready_for_fw is high
1,056,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,741 >>> mbox cmd response: success
2,683,173 UART:
2,683,189 UART: Running Caliptra FMC ...
2,683,597 UART:
2,683,651 UART: [state] CFI Enabled
2,694,098 UART: [fht] FMC Alias Private Key: 7
2,802,099 UART: [art] Extend RT PCRs Done
2,802,527 UART: [art] Lock RT PCRs Done
2,804,385 UART: [art] Populate DV Done
2,812,600 UART: [fht] FMC Alias Private Key: 7
2,813,700 UART: [art] Derive CDI
2,813,980 UART: [art] Store in in slot 0x4
2,899,513 UART: [art] Derive Key Pair
2,899,873 UART: [art] Store priv key in slot 0x5
2,912,929 UART: [art] Derive Key Pair - Done
2,927,433 UART: [art] Signing Cert with AUTHO
2,927,913 UART: RITY.KEYID = 7
2,943,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,834 UART: [art] PUB.X = 3E1F58C6C5697C1937D63BED84D4BD1CFC5742CA76B1B229C36A02A658E0499F8A24B75AF85F7EE621E1B0B17413144B
2,950,609 UART: [art] PUB.Y = DD626194C5C7BCC20D1387ED57E657B2DA4F7D589D091B26E959E7ECD5ABC69FAA2F5D526D7AD5F934F2CE6682535A71
2,957,569 UART: [art] SIG.R = 99848E85843CB19E7280AA1B860E7515FADF8AD46CDCE529C90EC3EF7096902EB82D556CE1EE041ADB084E7063B81394
2,964,335 UART: [art] SIG.S = 2576347D90D998E59B331F2388219FEB8412BEDB95DE17EC001980896EFB6752DF55632E34F4ED13E2077BB6155133CA
2,988,431 UART: Caliptra RT
2,988,684 UART: [state] CFI Enabled
3,096,419 UART: [rt] RT listening for mailbox commands...
3,097,089 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,403 UART: [rt]cmd =0x53574545, len=84
3,130,761 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,293 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46574c44
1,282,609 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,980 >>> mbox cmd response: success
2,773,083 UART: [afmc] ++
2,773,251 UART: [afmc] CDI.KEYID = 6
2,773,614 UART: [afmc] SUBJECT.KEYID = 7
2,774,040 UART: [afmc] AUTHORITY.KEYID = 5
2,809,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,712 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,228 UART: [afmc] --
2,853,344 UART: [cold-reset] --
2,854,300 UART: [state] Locking Datavault
2,855,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,203 UART: [state] Locking ICCM
2,856,877 UART: [exit] Launching FMC @ 0x40000130
2,862,206 UART:
2,862,222 UART: Running Caliptra FMC ...
2,862,630 UART:
2,862,773 UART: [state] CFI Enabled
2,873,680 UART: [fht] FMC Alias Private Key: 7
2,982,161 UART: [art] Extend RT PCRs Done
2,982,589 UART: [art] Lock RT PCRs Done
2,984,167 UART: [art] Populate DV Done
2,992,338 UART: [fht] FMC Alias Private Key: 7
2,993,452 UART: [art] Derive CDI
2,993,732 UART: [art] Store in in slot 0x4
3,079,583 UART: [art] Derive Key Pair
3,079,943 UART: [art] Store priv key in slot 0x5
3,092,879 UART: [art] Derive Key Pair - Done
3,107,569 UART: [art] Signing Cert with AUTHO
3,108,049 UART: RITY.KEYID = 7
3,122,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,696 UART: [art] PUB.X = 211CAA28AE291751803F509CAC41AF95355F72AB0EAC04168B4124676E5891D9D95BFFDEA8E3064F1E2A94FF758BF5C7
3,130,467 UART: [art] PUB.Y = 2C22B12AB22CB3DDC4F0DD3BE29EF735286F721E9911FB3BF4A28FD4622B5F63E642C65B1B5DF64BE2DD4E08128F60DD
3,137,434 UART: [art] SIG.R = BBE21FC33229C506BA293AC405F571EB63F61FD81745E9DDCB0E75D1E19744A6393426C97BF42A208F85F4FF7FAA1447
3,144,205 UART: [art] SIG.S = 586DDE671E7B0AB0A8D642A4932E0CB026EC6B44CF2105E8F7D6EA63971B202B73E9E2EED248F711BEB59DA0AA437B01
3,167,826 UART: Caliptra RT
3,168,171 UART: [state] CFI Enabled
3,275,954 UART: [rt] RT listening for mailbox commands...
3,276,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,898 UART: [rt]cmd =0x53574545, len=84
3,309,896 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,055 ready_for_fw is high
1,056,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,226 >>> mbox cmd response: success
2,687,266 UART:
2,687,282 UART: Running Caliptra FMC ...
2,687,690 UART:
2,687,833 UART: [state] CFI Enabled
2,698,536 UART: [fht] FMC Alias Private Key: 7
2,806,083 UART: [art] Extend RT PCRs Done
2,806,511 UART: [art] Lock RT PCRs Done
2,808,215 UART: [art] Populate DV Done
2,816,356 UART: [fht] FMC Alias Private Key: 7
2,817,398 UART: [art] Derive CDI
2,817,678 UART: [art] Store in in slot 0x4
2,903,769 UART: [art] Derive Key Pair
2,904,129 UART: [art] Store priv key in slot 0x5
2,917,347 UART: [art] Derive Key Pair - Done
2,932,190 UART: [art] Signing Cert with AUTHO
2,932,670 UART: RITY.KEYID = 7
2,947,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,603 UART: [art] PUB.X = 9F2363F70217B6A865041693830EB91F1E630878D8D8CBD56C5733F99B5D93CEC76F4CD19690BF5060BFFFF1C10E5581
2,955,360 UART: [art] PUB.Y = D3821FE0E32A17D03B7C587EDD1A237CD1437094EE059AE2C58D032824B5D10ACDC7DA25EBE61AB74680B5C054D424B1
2,962,313 UART: [art] SIG.R = 14783B9464604AB6D28C4F37C4A28F47AE8413CA1F204DAFFC6285C7BA92C1C178AF1FF48D50FDCF6F885B5AF81C3BB4
2,969,101 UART: [art] SIG.S = 8782D825D42C94EF32C3C0403CB7DFF7D9A3A7A6B484EA51FEC90FE2A57DCE442ADCAC7E61AE4902436DCEF451496F80
2,993,298 UART: Caliptra RT
2,993,643 UART: [state] CFI Enabled
3,100,998 UART: [rt] RT listening for mailbox commands...
3,101,668 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,646 UART: [rt]cmd =0x53574545, len=84
3,134,832 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,755 UART: [kat] SHA2-256
881,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,801 UART: [kat] ++
885,953 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
906,918 UART: [kat] LMS
1,475,114 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,701 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 ready_for_fw is high
1,480,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,444 UART: [idev] Erasing UDS.KEYID = 0
1,504,910 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,484 UART: [idev] --
1,514,417 UART: [ldev] ++
1,514,585 UART: [ldev] CDI.KEYID = 6
1,514,948 UART: [ldev] SUBJECT.KEYID = 5
1,515,374 UART: [ldev] AUTHORITY.KEYID = 7
1,515,837 UART: [ldev] FE.KEYID = 1
1,521,285 UART: [ldev] Erasing FE.KEYID = 1
1,546,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,410 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,354 UART: [fwproc] Received command 0x46574c44
1,587,145 UART: [fwproc] Received Image of size 114332 bytes
2,885,397 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,600 >>> mbox cmd response: success
3,078,786 UART: [afmc] ++
3,078,954 UART: [afmc] CDI.KEYID = 6
3,079,316 UART: [afmc] SUBJECT.KEYID = 7
3,079,741 UART: [afmc] AUTHORITY.KEYID = 5
3,114,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,708 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,488 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,101 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,791 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,556 UART: [afmc] --
3,157,680 UART: [cold-reset] --
3,158,402 UART: [state] Locking Datavault
3,159,525 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,129 UART: [state] Locking ICCM
3,160,565 UART: [exit] Launching FMC @ 0x40000130
3,165,894 UART:
3,165,910 UART: Running Caliptra FMC ...
3,166,318 UART:
3,166,372 UART: [state] CFI Enabled
3,176,877 UART: [fht] FMC Alias Private Key: 7
3,284,678 UART: [art] Extend RT PCRs Done
3,285,106 UART: [art] Lock RT PCRs Done
3,286,820 UART: [art] Populate DV Done
3,295,129 UART: [fht] FMC Alias Private Key: 7
3,296,155 UART: [art] Derive CDI
3,296,435 UART: [art] Store in in slot 0x4
3,382,164 UART: [art] Derive Key Pair
3,382,524 UART: [art] Store priv key in slot 0x5
3,395,322 UART: [art] Derive Key Pair - Done
3,410,155 UART: [art] Signing Cert with AUTHO
3,410,635 UART: RITY.KEYID = 7
3,425,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,192 UART: [art] PUB.X = E94DC206C3D5C020F7691EEFF804DC0FCC07E9FDFD7410DACCE3FE61E70C58784ECAA35F92C6261352AF100881FDE664
3,432,964 UART: [art] PUB.Y = F2968BADEA331AF81874739E5C441754A1AAEFA75F49595BFC5AF3D31847D7B4E22C3E6AE8EAC9B57DAF9770DA6AB747
3,439,934 UART: [art] SIG.R = 1CFD44F7356C48195CDAA16B40F0BBD3B963B8F06FF7EDF26381A608A2C9E487B9D8434F2115CF019E66D2A0D339B568
3,446,708 UART: [art] SIG.S = 986DC805F2ABDEF6BF048179F134D37B2EF620C457D0F33B50532B3D5EEABCFF61702645C9D815BC035644BB4CCD0353
3,470,145 UART: Caliptra RT
3,470,398 UART: [state] CFI Enabled
3,578,471 UART: [rt] RT listening for mailbox commands...
3,579,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,525 UART: [rt]cmd =0x44504543, len=96
3,789,178 >>> mbox cmd response data (6236 bytes)
3,789,179 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,188 UART: [rt]cmd =0x53574545, len=84
3,844,155 >>> mbox cmd response data (200 bytes)
3,844,156 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,873,541 UART: [rt]cmd =0x52564348, len=36
3,875,836 >>> mbox cmd response data (8 bytes)
3,875,837 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,620 UART: [rt]cmd =0x53574545, len=84
3,909,012 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 ready_for_fw is high
1,361,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,324 >>> mbox cmd response: success
2,987,496 UART:
2,987,512 UART: Running Caliptra FMC ...
2,987,920 UART:
2,987,974 UART: [state] CFI Enabled
2,998,383 UART: [fht] FMC Alias Private Key: 7
3,106,040 UART: [art] Extend RT PCRs Done
3,106,468 UART: [art] Lock RT PCRs Done
3,107,856 UART: [art] Populate DV Done
3,116,191 UART: [fht] FMC Alias Private Key: 7
3,117,311 UART: [art] Derive CDI
3,117,591 UART: [art] Store in in slot 0x4
3,203,130 UART: [art] Derive Key Pair
3,203,490 UART: [art] Store priv key in slot 0x5
3,216,268 UART: [art] Derive Key Pair - Done
3,231,207 UART: [art] Signing Cert with AUTHO
3,231,687 UART: RITY.KEYID = 7
3,246,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,618 UART: [art] PUB.X = E5882FD64A60A781701C80ADEB1252791F7D02453B57D42A82B9222F148A49E8184697D7F7E9F0EF3F42CAEB85EF9BD4
3,254,391 UART: [art] PUB.Y = BCD6AE01B8A84C587405B74D0F87689694009FDDDC410EFC578EE9B7F85710DF0EA03B16A6CF37662EF57DC7C7222055
3,261,314 UART: [art] SIG.R = 70A8E0093DEDECB0AF64243C974A8AC16A4801209B3935A4FE277E02C17DD187300358EC508BEEA1764AD0D171D611BE
3,268,080 UART: [art] SIG.S = 13DA3172A9EF8399C6315A8B186054BD3E157348C66AFE53C6DD5ABCC730F25EA37F01A3C356B567A46EE910C9F7F332
3,292,050 UART: Caliptra RT
3,292,303 UART: [state] CFI Enabled
3,400,531 UART: [rt] RT listening for mailbox commands...
3,401,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,751 UART: [rt]cmd =0x44504543, len=96
3,612,315 >>> mbox cmd response data (6236 bytes)
3,612,316 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,291 UART: [rt]cmd =0x53574545, len=84
3,667,926 >>> mbox cmd response data (200 bytes)
3,667,927 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,788 UART: [rt]cmd =0x52564348, len=36
3,699,997 >>> mbox cmd response data (8 bytes)
3,699,998 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,729,941 UART: [rt]cmd =0x53574545, len=84
3,732,989 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,450 UART: [kat] SHA2-256
882,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,496 UART: [kat] ++
886,648 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,868 UART: [fht] Storing FHT @ 0x50003400
1,479,729 UART: [idev] ++
1,479,897 UART: [idev] CDI.KEYID = 6
1,480,257 UART: [idev] SUBJECT.KEYID = 7
1,480,681 UART: [idev] UDS.KEYID = 0
1,481,026 ready_for_fw is high
1,481,026 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,721 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,631 UART: [idev] --
1,514,754 UART: [ldev] ++
1,514,922 UART: [ldev] CDI.KEYID = 6
1,515,285 UART: [ldev] SUBJECT.KEYID = 5
1,515,711 UART: [ldev] AUTHORITY.KEYID = 7
1,516,174 UART: [ldev] FE.KEYID = 1
1,521,354 UART: [ldev] Erasing FE.KEYID = 1
1,546,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,805 UART: [ldev] --
1,586,152 UART: [fwproc] Waiting for Commands...
1,586,829 UART: [fwproc] Received command 0x46574c44
1,587,620 UART: [fwproc] Received Image of size 114332 bytes
2,885,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,903 >>> mbox cmd response: success
3,079,057 UART: [afmc] ++
3,079,225 UART: [afmc] CDI.KEYID = 6
3,079,587 UART: [afmc] SUBJECT.KEYID = 7
3,080,012 UART: [afmc] AUTHORITY.KEYID = 5
3,115,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,780 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,470 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,253 UART: [afmc] --
3,158,233 UART: [cold-reset] --
3,158,897 UART: [state] Locking Datavault
3,159,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,344 UART: [state] Locking ICCM
3,160,848 UART: [exit] Launching FMC @ 0x40000130
3,166,177 UART:
3,166,193 UART: Running Caliptra FMC ...
3,166,601 UART:
3,166,744 UART: [state] CFI Enabled
3,177,245 UART: [fht] FMC Alias Private Key: 7
3,285,336 UART: [art] Extend RT PCRs Done
3,285,764 UART: [art] Lock RT PCRs Done
3,287,202 UART: [art] Populate DV Done
3,295,247 UART: [fht] FMC Alias Private Key: 7
3,296,195 UART: [art] Derive CDI
3,296,475 UART: [art] Store in in slot 0x4
3,381,814 UART: [art] Derive Key Pair
3,382,174 UART: [art] Store priv key in slot 0x5
3,395,734 UART: [art] Derive Key Pair - Done
3,410,191 UART: [art] Signing Cert with AUTHO
3,410,671 UART: RITY.KEYID = 7
3,425,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,698 UART: [art] PUB.X = B3EE5481FAD4100D7B3052F1D779CF41887ADE7410576394F8DE9608818376A86872C73F84B912DC6D5595C63871C6BE
3,433,458 UART: [art] PUB.Y = 9100084FFA32B35FFA30321297C6F0556AB6C74C2D416C6AB3BB1685C6F0A51B4FF63CDF13BBA0AC528C6F5B05B19AD3
3,440,396 UART: [art] SIG.R = ABF217260DB52C1CB243C52798B7AC99FE4D139B426A6DD473AF2BA9281FCD120A41F570548837CA90403A83220EB62A
3,447,163 UART: [art] SIG.S = 8258B78A7DBADA1A764574AA18DE16D03C7294DCED7C2A83AF59B295EC77E336425AFC7EBD6301445631992BC9C99D19
3,471,075 UART: Caliptra RT
3,471,420 UART: [state] CFI Enabled
3,579,544 UART: [rt] RT listening for mailbox commands...
3,580,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,590 UART: [rt]cmd =0x44504543, len=96
3,791,356 >>> mbox cmd response data (6236 bytes)
3,791,357 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,342 UART: [rt]cmd =0x53574545, len=84
3,847,503 >>> mbox cmd response data (200 bytes)
3,847,504 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,789 UART: [rt]cmd =0x52564348, len=36
3,878,524 >>> mbox cmd response data (8 bytes)
3,878,525 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,596 UART: [rt]cmd =0x53574545, len=84
3,911,734 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,808 ready_for_fw is high
1,362,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,107 >>> mbox cmd response: success
2,990,923 UART:
2,990,939 UART: Running Caliptra FMC ...
2,991,347 UART:
2,991,490 UART: [state] CFI Enabled
3,001,801 UART: [fht] FMC Alias Private Key: 7
3,109,742 UART: [art] Extend RT PCRs Done
3,110,170 UART: [art] Lock RT PCRs Done
3,111,652 UART: [art] Populate DV Done
3,119,797 UART: [fht] FMC Alias Private Key: 7
3,120,925 UART: [art] Derive CDI
3,121,205 UART: [art] Store in in slot 0x4
3,207,204 UART: [art] Derive Key Pair
3,207,564 UART: [art] Store priv key in slot 0x5
3,220,682 UART: [art] Derive Key Pair - Done
3,235,623 UART: [art] Signing Cert with AUTHO
3,236,103 UART: RITY.KEYID = 7
3,251,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,014 UART: [art] PUB.X = D3AA6E2AD25AADC049563745F422BF93DF289B1DD92F0F5B84FF22AF2EE9F3CBB52598EFEF5A19E52E5D51718A69DC52
3,258,803 UART: [art] PUB.Y = 4C6676248D5D53D9B37F8EEB7E30855D8AE81751E99B7CEEC3D4913AD5A44A16BA248FC5F0F632F4A888308C29944510
3,265,757 UART: [art] SIG.R = A3DDE294096258DCAC936AF6453E560AC0FD9B8A1CAC1E788B11C2161D963CC987DDFC7CB6A125A4D3811DAD24008087
3,272,513 UART: [art] SIG.S = C45F5DA64A724652F5355A0990FA0F6E885CAE0071B9E4470B1F124B45741C678BCD3675BA5A11C0028B14A4716B3770
3,296,072 UART: Caliptra RT
3,296,417 UART: [state] CFI Enabled
3,404,863 UART: [rt] RT listening for mailbox commands...
3,405,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,099 UART: [rt]cmd =0x44504543, len=96
3,616,050 >>> mbox cmd response data (6236 bytes)
3,616,051 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,964 UART: [rt]cmd =0x53574545, len=84
3,671,357 >>> mbox cmd response data (200 bytes)
3,671,358 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,741 UART: [rt]cmd =0x52564348, len=36
3,702,756 >>> mbox cmd response data (8 bytes)
3,702,757 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,760 UART: [rt]cmd =0x53574545, len=84
3,735,518 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,607 UART: [kat] SHA2-256
903,547 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,332 UART: [kat] HMAC-384Kdf
922,036 UART: [kat] LMS
1,170,364 UART: [kat] --
1,171,333 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,530 UART: [idev] ++
1,174,698 UART: [idev] CDI.KEYID = 6
1,175,058 UART: [idev] SUBJECT.KEYID = 7
1,175,482 UART: [idev] UDS.KEYID = 0
1,175,827 ready_for_fw is high
1,175,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,201,151 UART: [idev] Sha1 KeyId Algorithm
1,209,415 UART: [idev] --
1,210,593 UART: [ldev] ++
1,210,761 UART: [ldev] CDI.KEYID = 6
1,211,124 UART: [ldev] SUBJECT.KEYID = 5
1,211,550 UART: [ldev] AUTHORITY.KEYID = 7
1,212,013 UART: [ldev] FE.KEYID = 1
1,216,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,609 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,474 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,517 >>> mbox cmd response: success
2,774,777 UART: [afmc] ++
2,774,945 UART: [afmc] CDI.KEYID = 6
2,775,307 UART: [afmc] SUBJECT.KEYID = 7
2,775,732 UART: [afmc] AUTHORITY.KEYID = 5
2,811,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,359 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,938 UART: [afmc] --
2,855,012 UART: [cold-reset] --
2,855,810 UART: [state] Locking Datavault
2,856,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,401 UART: [state] Locking ICCM
2,857,877 UART: [exit] Launching FMC @ 0x40000130
2,863,206 UART:
2,863,222 UART: Running Caliptra FMC ...
2,863,630 UART:
2,863,684 UART: [state] CFI Enabled
2,874,155 UART: [fht] FMC Alias Private Key: 7
2,981,614 UART: [art] Extend RT PCRs Done
2,982,042 UART: [art] Lock RT PCRs Done
2,983,808 UART: [art] Populate DV Done
2,991,957 UART: [fht] FMC Alias Private Key: 7
2,993,093 UART: [art] Derive CDI
2,993,373 UART: [art] Store in in slot 0x4
3,079,096 UART: [art] Derive Key Pair
3,079,456 UART: [art] Store priv key in slot 0x5
3,092,284 UART: [art] Derive Key Pair - Done
3,106,794 UART: [art] Signing Cert with AUTHO
3,107,274 UART: RITY.KEYID = 7
3,122,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,253 UART: [art] PUB.X = 9E43BF7395C3EC35F20FFCEEB820A7C2ABF931015C2548A9552EFBEA5BDBA0A5D41D5984CAF4A83584A9D035608343BB
3,130,035 UART: [art] PUB.Y = 4979310F51BA4B085C39227C76AEDE8CCDD29521B66825B57D4F80794DFC5FACB921E69498458CC66ED9E950B5483F00
3,136,961 UART: [art] SIG.R = 343063F18EE30AF303387C65A1C4B713C99F19AF0F8525CDA6A5C230DDD8F5AA5F4096D54A8DED31C561A89B88AB3037
3,143,732 UART: [art] SIG.S = FCB77F5FECCE0139BCCED2BF4336E691FE90DE1C20B0A0C2B3671B9FD5C1707B1852F5A809B32D6E3F29F58483DFB66A
3,168,219 UART: Caliptra RT
3,168,472 UART: [state] CFI Enabled
3,277,165 UART: [rt] RT listening for mailbox commands...
3,277,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,235 UART: [rt]cmd =0x44504543, len=96
3,487,965 >>> mbox cmd response data (6236 bytes)
3,487,966 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,985 UART: [rt]cmd =0x53574545, len=84
3,543,674 >>> mbox cmd response data (200 bytes)
3,543,675 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,052 UART: [rt]cmd =0x52564348, len=36
3,575,667 >>> mbox cmd response data (8 bytes)
3,575,668 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,393 UART: [rt]cmd =0x53574545, len=84
3,608,461 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 ready_for_fw is high
1,060,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,550 >>> mbox cmd response: success
2,689,670 UART:
2,689,686 UART: Running Caliptra FMC ...
2,690,094 UART:
2,690,148 UART: [state] CFI Enabled
2,700,945 UART: [fht] FMC Alias Private Key: 7
2,808,644 UART: [art] Extend RT PCRs Done
2,809,072 UART: [art] Lock RT PCRs Done
2,810,576 UART: [art] Populate DV Done
2,818,877 UART: [fht] FMC Alias Private Key: 7
2,820,057 UART: [art] Derive CDI
2,820,337 UART: [art] Store in in slot 0x4
2,906,314 UART: [art] Derive Key Pair
2,906,674 UART: [art] Store priv key in slot 0x5
2,919,152 UART: [art] Derive Key Pair - Done
2,933,925 UART: [art] Signing Cert with AUTHO
2,934,405 UART: RITY.KEYID = 7
2,949,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,472 UART: [art] PUB.X = 54B1B946E399DF52E6E0796E4A3C51BD5527267AC4A25D8FB63DA33423173A350E9E6997930F9912FC9D70C4CA2D8313
2,957,236 UART: [art] PUB.Y = 56147212C7F2BEB69F509C9E9B3F3D699E0A1A02EB2E530C3A5A88B7EB3CA9C8C31C9FDEB63364E3034524B4B875992B
2,964,184 UART: [art] SIG.R = BC5E29F2B71D852249C6386108426AF65784FCC1EC4711F21C6093933C28825B2D82667EC1F10CD29E3E17F146A82565
2,970,942 UART: [art] SIG.S = 47FD83D6B334CFB729AC1B24C2AED83554C57FF8E7ECF771DAD0E151EB1913395B61F6BB2BCC0DC6DABB941D6B243712
2,994,508 UART: Caliptra RT
2,994,761 UART: [state] CFI Enabled
3,102,546 UART: [rt] RT listening for mailbox commands...
3,103,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,628 UART: [rt]cmd =0x44504543, len=96
3,314,573 >>> mbox cmd response data (6236 bytes)
3,314,574 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,429 UART: [rt]cmd =0x53574545, len=84
3,370,080 >>> mbox cmd response data (200 bytes)
3,370,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,704 UART: [rt]cmd =0x52564348, len=36
3,402,189 >>> mbox cmd response data (8 bytes)
3,402,190 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,175 UART: [rt]cmd =0x53574545, len=84
3,435,405 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,242 UART: [kat] SHA2-256
904,182 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,895 UART: [kat] HMAC-384Kdf
923,543 UART: [kat] LMS
1,171,871 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,460 UART: [fht] FHT @ 0x50003400
1,176,187 UART: [idev] ++
1,176,355 UART: [idev] CDI.KEYID = 6
1,176,715 UART: [idev] SUBJECT.KEYID = 7
1,177,139 UART: [idev] UDS.KEYID = 0
1,177,484 ready_for_fw is high
1,177,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,003 UART: [idev] Erasing UDS.KEYID = 0
1,202,232 UART: [idev] Sha1 KeyId Algorithm
1,210,578 UART: [idev] --
1,211,572 UART: [ldev] ++
1,211,740 UART: [ldev] CDI.KEYID = 6
1,212,103 UART: [ldev] SUBJECT.KEYID = 5
1,212,529 UART: [ldev] AUTHORITY.KEYID = 7
1,212,992 UART: [ldev] FE.KEYID = 1
1,217,946 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,394 UART: [ldev] --
1,283,779 UART: [fwproc] Wait for Commands...
1,284,521 UART: [fwproc] Recv command 0x46574c44
1,285,249 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,314 >>> mbox cmd response: success
2,777,516 UART: [afmc] ++
2,777,684 UART: [afmc] CDI.KEYID = 6
2,778,046 UART: [afmc] SUBJECT.KEYID = 7
2,778,471 UART: [afmc] AUTHORITY.KEYID = 5
2,814,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,333 UART: [afmc] --
2,857,407 UART: [cold-reset] --
2,858,101 UART: [state] Locking Datavault
2,859,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,648 UART: [state] Locking ICCM
2,860,102 UART: [exit] Launching FMC @ 0x40000130
2,865,431 UART:
2,865,447 UART: Running Caliptra FMC ...
2,865,855 UART:
2,865,998 UART: [state] CFI Enabled
2,876,437 UART: [fht] FMC Alias Private Key: 7
2,983,976 UART: [art] Extend RT PCRs Done
2,984,404 UART: [art] Lock RT PCRs Done
2,985,802 UART: [art] Populate DV Done
2,993,871 UART: [fht] FMC Alias Private Key: 7
2,994,863 UART: [art] Derive CDI
2,995,143 UART: [art] Store in in slot 0x4
3,080,824 UART: [art] Derive Key Pair
3,081,184 UART: [art] Store priv key in slot 0x5
3,094,650 UART: [art] Derive Key Pair - Done
3,109,715 UART: [art] Signing Cert with AUTHO
3,110,195 UART: RITY.KEYID = 7
3,125,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,000 UART: [art] PUB.X = A5F2C2E0DEE446991F726762FE7FA5FE8253E623C0C1B52AC4581358C9541BEDEA104B96751E0A678261097A6A8D024A
3,132,765 UART: [art] PUB.Y = 36A310EC4F144DC704224C4F5DC83629204FC42F4F52EB34957758B364C8FA195C8B5FEFEB08D8AF8418C9405D141137
3,139,711 UART: [art] SIG.R = 8780FF8782440B22ED71AE02B81E39CB47CF971CDCF1798580710DD562D31B3025C53BD8618209B34A8B1F6B364819C3
3,146,467 UART: [art] SIG.S = C620AC8C2DAAFD463F18F70295CF1D96B24A040C387AA0B74FCC4D7CC6EF7A5E6527DD84139B13C336CE86E525254DA0
3,169,997 UART: Caliptra RT
3,170,342 UART: [state] CFI Enabled
3,276,860 UART: [rt] RT listening for mailbox commands...
3,277,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,068 UART: [rt]cmd =0x44504543, len=96
3,488,636 >>> mbox cmd response data (6236 bytes)
3,488,637 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,602 UART: [rt]cmd =0x53574545, len=84
3,544,651 >>> mbox cmd response data (200 bytes)
3,544,652 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,157 UART: [rt]cmd =0x52564348, len=36
3,576,704 >>> mbox cmd response data (8 bytes)
3,576,705 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,834 UART: [rt]cmd =0x53574545, len=84
3,610,516 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,078 ready_for_fw is high
1,061,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,587 >>> mbox cmd response: success
2,689,495 UART:
2,689,511 UART: Running Caliptra FMC ...
2,689,919 UART:
2,690,062 UART: [state] CFI Enabled
2,700,683 UART: [fht] FMC Alias Private Key: 7
2,808,428 UART: [art] Extend RT PCRs Done
2,808,856 UART: [art] Lock RT PCRs Done
2,810,138 UART: [art] Populate DV Done
2,818,083 UART: [fht] FMC Alias Private Key: 7
2,819,033 UART: [art] Derive CDI
2,819,313 UART: [art] Store in in slot 0x4
2,905,002 UART: [art] Derive Key Pair
2,905,362 UART: [art] Store priv key in slot 0x5
2,918,582 UART: [art] Derive Key Pair - Done
2,933,365 UART: [art] Signing Cert with AUTHO
2,933,845 UART: RITY.KEYID = 7
2,949,347 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,112 UART: [art] PUB.X = 9FEE3E405907BC1A526F94E908B6B83E5E38A78750B4AAB02E17C6433ADB8B9A38EBEDAF4AE6BE8232B0185251350F81
2,956,885 UART: [art] PUB.Y = 131DAB7D15341BE90042E69538669F3635B67F824600E0D42CA51F968F1C0C12C5BB463AB59455524450EBC751245A1B
2,963,782 UART: [art] SIG.R = 053FD85590D6BFF3EB3B537145ED55E3F4F5195017ED2491A0684809DCC7D7047617ED82026300B958FC6943235F8302
2,970,507 UART: [art] SIG.S = 4A4CB6DFFCB9E67E584B6370920D4158AAADAC812AD1BF5E3672B4FE3F47D81161B27CC72E68E1A600BC906062F3DFEA
2,993,761 UART: Caliptra RT
2,994,106 UART: [state] CFI Enabled
3,102,143 UART: [rt] RT listening for mailbox commands...
3,102,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,171 UART: [rt]cmd =0x44504543, len=96
3,314,120 >>> mbox cmd response data (6236 bytes)
3,314,121 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,884 UART: [rt]cmd =0x53574545, len=84
3,369,905 >>> mbox cmd response data (200 bytes)
3,369,906 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,211 UART: [rt]cmd =0x52564348, len=36
3,401,518 >>> mbox cmd response data (8 bytes)
3,401,519 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,348 UART: [rt]cmd =0x53574545, len=84
3,434,994 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,844 UART: [ldev] --
1,281,190 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,385 >>> mbox cmd response: success
2,773,648 UART: [afmc] ++
2,773,816 UART: [afmc] CDI.KEYID = 6
2,774,179 UART: [afmc] SUBJECT.KEYID = 7
2,774,605 UART: [afmc] AUTHORITY.KEYID = 5
2,809,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,227 UART: [afmc] --
2,853,255 UART: [cold-reset] --
2,854,261 UART: [state] Locking Datavault
2,855,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,932 UART: [state] Locking ICCM
2,856,502 UART: [exit] Launching FMC @ 0x40000130
2,861,831 UART:
2,861,847 UART: Running Caliptra FMC ...
2,862,255 UART:
2,862,309 UART: [state] CFI Enabled
2,872,622 UART: [fht] FMC Alias Private Key: 7
2,980,121 UART: [art] Extend RT PCRs Done
2,980,549 UART: [art] Lock RT PCRs Done
2,982,133 UART: [art] Populate DV Done
2,990,456 UART: [fht] FMC Alias Private Key: 7
2,991,568 UART: [art] Derive CDI
2,991,848 UART: [art] Store in in slot 0x4
3,077,877 UART: [art] Derive Key Pair
3,078,237 UART: [art] Store priv key in slot 0x5
3,091,433 UART: [art] Derive Key Pair - Done
3,106,455 UART: [art] Signing Cert with AUTHO
3,106,935 UART: RITY.KEYID = 7
3,122,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,296 UART: [art] PUB.X = EDE9E61F28C543DBAA90DB959D8A6D4C7DF488DA1F127367CE8F49956821D190EF4E4F95096CAD5A2CF91F034CF4CF2F
3,130,080 UART: [art] PUB.Y = 78643F6A24DC0F1E10370537AF43ACB9D633FCA9D306C6C8B9720A7EC4BA60E533E7D7AAB4416865BF9BA55162D61C6C
3,137,030 UART: [art] SIG.R = 8DC56637C8BAF9B35FD0E6E67724C5595FBE0B07756251AB925B781E151DE9A391D964014F95BE7029F26A83551DD7F4
3,143,793 UART: [art] SIG.S = 312DE7F924978AE56BF2DA9A41F3305CB2D777459DB68FB92EEE378D137561718B722D3CA788378FA7B88DA95BD27353
3,167,354 UART: Caliptra RT
3,167,607 UART: [state] CFI Enabled
3,275,480 UART: [rt] RT listening for mailbox commands...
3,276,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,946 UART: [rt]cmd =0x44504543, len=96
3,487,273 >>> mbox cmd response data (6236 bytes)
3,487,274 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,073 UART: [rt]cmd =0x53574545, len=84
3,542,640 >>> mbox cmd response data (200 bytes)
3,542,641 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,150 UART: [rt]cmd =0x52564348, len=36
3,574,249 >>> mbox cmd response data (8 bytes)
3,574,250 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,149 UART: [rt]cmd =0x53574545, len=84
3,607,373 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,110 ready_for_fw is high
1,056,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,227 >>> mbox cmd response: success
2,682,297 UART:
2,682,313 UART: Running Caliptra FMC ...
2,682,721 UART:
2,682,775 UART: [state] CFI Enabled
2,692,818 UART: [fht] FMC Alias Private Key: 7
2,800,705 UART: [art] Extend RT PCRs Done
2,801,133 UART: [art] Lock RT PCRs Done
2,802,547 UART: [art] Populate DV Done
2,811,008 UART: [fht] FMC Alias Private Key: 7
2,812,052 UART: [art] Derive CDI
2,812,332 UART: [art] Store in in slot 0x4
2,897,961 UART: [art] Derive Key Pair
2,898,321 UART: [art] Store priv key in slot 0x5
2,911,533 UART: [art] Derive Key Pair - Done
2,925,882 UART: [art] Signing Cert with AUTHO
2,926,362 UART: RITY.KEYID = 7
2,941,412 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,177 UART: [art] PUB.X = E182E0428E0209D8059E0E9EC058B3228DF08320D0084628D032F01E4144CF060C9D3F391178F77855D3F92AA995E76E
2,948,918 UART: [art] PUB.Y = 7C23A2A378FE10CD1A69BF9135F0EF45621184C1FAE4234254D8FAA381889956DDD731D5B51062CBB86509DC422FD58C
2,955,871 UART: [art] SIG.R = D54E3E67E9D3E482EE8F114A2378BF576A6AC835FF5C62FCB6119FBE600CC33326DED254580A280F9BFCFE783134E2CC
2,962,648 UART: [art] SIG.S = B5529B5782FD2D1DA3AF3C67FB9424131B9855235B41E5E6C96E1E5A72494A93491BE029750F5D5C328E693A08BBD188
2,986,835 UART: Caliptra RT
2,987,088 UART: [state] CFI Enabled
3,095,018 UART: [rt] RT listening for mailbox commands...
3,095,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,130 UART: [rt]cmd =0x44504543, len=96
3,306,295 >>> mbox cmd response data (6236 bytes)
3,306,296 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,087 UART: [rt]cmd =0x53574545, len=84
3,361,084 >>> mbox cmd response data (200 bytes)
3,361,085 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,672 UART: [rt]cmd =0x52564348, len=36
3,392,853 >>> mbox cmd response data (8 bytes)
3,392,854 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,727 UART: [rt]cmd =0x53574545, len=84
3,426,147 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 ready_for_fw is high
1,174,790 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,177 UART: [fwproc] Wait for Commands...
1,282,820 UART: [fwproc] Recv command 0x46574c44
1,283,553 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,584 >>> mbox cmd response: success
2,775,711 UART: [afmc] ++
2,775,879 UART: [afmc] CDI.KEYID = 6
2,776,242 UART: [afmc] SUBJECT.KEYID = 7
2,776,668 UART: [afmc] AUTHORITY.KEYID = 5
2,811,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,524 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,232 UART: [afmc] --
2,855,364 UART: [cold-reset] --
2,856,272 UART: [state] Locking Datavault
2,857,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,269 UART: [state] Locking ICCM
2,858,709 UART: [exit] Launching FMC @ 0x40000130
2,864,038 UART:
2,864,054 UART: Running Caliptra FMC ...
2,864,462 UART:
2,864,605 UART: [state] CFI Enabled
2,875,354 UART: [fht] FMC Alias Private Key: 7
2,983,523 UART: [art] Extend RT PCRs Done
2,983,951 UART: [art] Lock RT PCRs Done
2,985,341 UART: [art] Populate DV Done
2,993,830 UART: [fht] FMC Alias Private Key: 7
2,994,982 UART: [art] Derive CDI
2,995,262 UART: [art] Store in in slot 0x4
3,081,085 UART: [art] Derive Key Pair
3,081,445 UART: [art] Store priv key in slot 0x5
3,094,715 UART: [art] Derive Key Pair - Done
3,109,503 UART: [art] Signing Cert with AUTHO
3,109,983 UART: RITY.KEYID = 7
3,125,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,876 UART: [art] PUB.X = 662C80AB8A79438418BB1C9EE7B92975680A4BC2A555154D1C3701E04A59C1DFA61332B2F38873B514B08CD86CA0BB60
3,132,642 UART: [art] PUB.Y = 4224A3D322CFB186D07976BF4C075BA48A3603290097F53619CAB5D4B275B3871428117DA52BDDDF8A28BEEE5084D9D6
3,139,568 UART: [art] SIG.R = 8D96030F20489971F3D56D2E19816610DC75495103E0E6C0EDB0321EAB7CDA522D5448D69DBBADB1D7A35816296B7FF2
3,146,333 UART: [art] SIG.S = FF1B72500F26E0305AF3BBD01AB3809210DA7AFC506D4D5DB4E2DB9ED6BADAF72D4329E2ABCEB719FF169DD66444B410
3,170,159 UART: Caliptra RT
3,170,504 UART: [state] CFI Enabled
3,278,914 UART: [rt] RT listening for mailbox commands...
3,279,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,254 UART: [rt]cmd =0x44504543, len=96
3,490,515 >>> mbox cmd response data (6236 bytes)
3,490,516 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,469 UART: [rt]cmd =0x53574545, len=84
3,546,756 >>> mbox cmd response data (200 bytes)
3,546,757 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,274 UART: [rt]cmd =0x52564348, len=36
3,578,275 >>> mbox cmd response data (8 bytes)
3,578,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,985 UART: [rt]cmd =0x53574545, len=84
3,611,259 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,711 ready_for_fw is high
1,056,711 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,006 >>> mbox cmd response: success
2,684,626 UART:
2,684,642 UART: Running Caliptra FMC ...
2,685,050 UART:
2,685,193 UART: [state] CFI Enabled
2,695,702 UART: [fht] FMC Alias Private Key: 7
2,804,201 UART: [art] Extend RT PCRs Done
2,804,629 UART: [art] Lock RT PCRs Done
2,806,159 UART: [art] Populate DV Done
2,814,238 UART: [fht] FMC Alias Private Key: 7
2,815,336 UART: [art] Derive CDI
2,815,616 UART: [art] Store in in slot 0x4
2,901,579 UART: [art] Derive Key Pair
2,901,939 UART: [art] Store priv key in slot 0x5
2,914,739 UART: [art] Derive Key Pair - Done
2,929,809 UART: [art] Signing Cert with AUTHO
2,930,289 UART: RITY.KEYID = 7
2,945,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,340 UART: [art] PUB.X = 8F7424AE59B95F460C04FFA1E69197D2B279BDC2879D5B6305A51CE6EA4647F62164C2991B4C7488BB61443EEA3BF165
2,953,105 UART: [art] PUB.Y = 6EDEF374D4C3E0CD79DDFD7BDD0C2074B872AFC0D587BF3BC02D0D193BAE1AD1665C93C039DFC1E236824459DE012F18
2,960,068 UART: [art] SIG.R = A19A9DABDEED6B673E4EA749CF350B5A726C5ACCE7BDA75411EFC0D83F549C6F9E569DE84A2917A0BC710B1647F5F1A9
2,966,856 UART: [art] SIG.S = 3DD0D7D893065590CFE7AB07F325CFA337AD44B01DD0CBC5B324270FACB34DA1625E1D1D0E8963CEE6A1D0E954CA0E65
2,990,328 UART: Caliptra RT
2,990,673 UART: [state] CFI Enabled
3,098,062 UART: [rt] RT listening for mailbox commands...
3,098,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,164 UART: [rt]cmd =0x44504543, len=96
3,309,845 >>> mbox cmd response data (6236 bytes)
3,309,846 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,593 UART: [rt]cmd =0x53574545, len=84
3,365,734 >>> mbox cmd response data (200 bytes)
3,365,735 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,086 UART: [rt]cmd =0x52564348, len=36
3,397,459 >>> mbox cmd response data (8 bytes)
3,397,460 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,387 UART: [rt]cmd =0x53574545, len=84
3,430,527 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,504,631 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,450 >>> mbox cmd response: success
2,616,450 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,617,620 UART: [afmc] ++
2,617,788 UART: [afmc] CDI.KEYID = 6
2,618,150 UART: [afmc] SUBJECT.KEYID = 7
2,618,575 UART: [afmc] AUTHORITY.KEYID = 5
2,653,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,315 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,005 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,846 UART: [afmc] --
2,696,832 UART: [cold-reset] --
2,697,714 UART: [state] Locking Datavault
2,698,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,481 UART: [state] Locking ICCM
2,699,945 UART: [exit] Launching FMC @ 0x40000130
2,705,274 UART:
2,705,290 UART: Running Caliptra FMC ...
2,705,698 UART:
2,705,752 UART: [state] CFI Enabled
2,716,041 UART: [fht] FMC Alias Private Key: 7
2,823,750 UART: [art] Extend RT PCRs Done
2,824,178 UART: [art] Lock RT PCRs Done
2,825,406 UART: [art] Populate DV Done
2,833,473 UART: [fht] FMC Alias Private Key: 7
2,834,547 UART: [art] Derive CDI
2,834,827 UART: [art] Store in in slot 0x4
2,920,774 UART: [art] Derive Key Pair
2,921,134 UART: [art] Store priv key in slot 0x5
2,934,944 UART: [art] Derive Key Pair - Done
2,949,475 UART: [art] Signing Cert with AUTHO
2,949,955 UART: RITY.KEYID = 7
2,965,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,076 UART: [art] PUB.X = 9C2379AB7E94227D5A5F8E30CD4F75DFCE88D175C7E74A4F8B996FF51EFAD64B04B67D7661A0B441027EB0D7B4D9DE60
2,972,856 UART: [art] PUB.Y = 4220C4729874513E571082CFB7A1B40717BB1DB91FBF974B3B8FAEDA8FD9476EAA39EF8B8077D347A13172B204610828
2,979,799 UART: [art] SIG.R = 14968FD13AB16D6F63C77B9C1F268EF81EA318C8B39DE1C195A4E8FA751BD04A107256AD3A9FEAFDE6C5C2EA52E5D856
2,986,589 UART: [art] SIG.S = 8801D20D956B6FD5477F90B604DB4A3FEE8205FD722AC934454F5FD8ED660357B860FF51CC683EF94BE6FD4D42116CF4
3,010,949 UART: mbox::rt_entry...
3,011,321 UART: ____ _ _ _ ____ _____
3,012,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,209 UART: |_|
3,015,521 UART:
3,123,383 UART: [rt] Runtime listening for mailbox commands...
3,124,570 >>> mbox cmd response data (48 bytes)
3,124,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,124,685 UART:
3,124,701 UART: Running Caliptra ROM ...
3,125,109 UART:
3,125,163 UART: [state] CFI Enabled
3,127,817 UART: [state] LifecycleState = Unprovisioned
3,128,472 UART: [state] DebugLocked = No
3,128,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,625 UART: [kat] SHA2-256
3,924,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,671 UART: [kat] ++
3,928,823 UART: [kat] sha1
3,933,101 UART: [kat] SHA2-256
3,935,039 UART: [kat] SHA2-384
3,937,670 UART: [kat] SHA2-512-ACC
3,939,570 UART: [kat] ECC-384
3,945,223 UART: [kat] HMAC-384Kdf
3,949,945 UART: [kat] LMS
4,518,141 UART: [kat] --
4,518,834 UART: [update-reset] ++
5,853,282 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,854,482 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,004,358 >>> mbox cmd response: success
6,004,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,004,697 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,711 UART: [update-reset Success] --
6,013,692 UART: [state] Locking Datavault
6,014,576 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,180 UART: [state] Locking ICCM
6,015,720 UART: [exit] Launching FMC @ 0x40000130
6,021,049 UART:
6,021,065 UART: Running Caliptra FMC ...
6,021,473 UART:
6,021,527 UART: [state] CFI Enabled
6,110,770 UART: [art] Extend RT PCRs Done
6,111,198 UART: [art] Lock RT PCRs Done
6,112,829 UART: [art] Populate DV Done
6,120,950 UART: [fht] FMC Alias Private Key: 7
6,122,070 UART: [art] Derive CDI
6,122,350 UART: [art] Store in in slot 0x4
6,208,027 UART: [art] Derive Key Pair
6,208,387 UART: [art] Store priv key in slot 0x5
6,221,931 UART: [art] Derive Key Pair - Done
6,237,113 UART: [art] Signing Cert with AUTHO
6,237,593 UART: RITY.KEYID = 7
6,252,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,516 UART: [art] PUB.X = 8040459BC9A7C8403B0F5AB693D0D58FA3079431C4467C65E4502B1EB450FCDCFB74CC4CAB8AB9FD10586E52BDB2B85B
6,260,296 UART: [art] PUB.Y = 4CA7537A57BA30677C91DE903912CD6E26E6166AC744485AD03668DEB915EB015BD8B831650BD89F3AD6D03BD5BD750C
6,267,245 UART: [art] SIG.R = 198244127A5329705658D9AEAEFB7953C31531C0116ED65EF64F272907359A9AD65840589D58DD2DCFD7418E7E5EA532
6,274,008 UART: [art] SIG.S = C8F5B180FC8DC4CC97756ABDE7B4C99E35DD9630420268DF6CCF92FF8AF105C1843D2219B94001A3871776AF201B3285
6,297,156 UART: Caliptra RT
6,297,409 UART: [state] CFI Enabled
6,577,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,608,940 UART: [rt]cmd =0x4d454153, len=108
6,629,887 >>> mbox cmd response data (12 bytes)
6,629,888 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,630,616 UART:
6,630,632 UART: Running Caliptra ROM ...
6,631,040 UART:
6,631,094 UART: [state] CFI Enabled
6,633,868 UART: [state] LifecycleState = Unprovisioned
6,634,523 UART: [state] DebugLocked = No
6,635,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,636,574 UART: [kat] SHA2-256
7,430,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,434,620 UART: [kat] ++
7,434,772 UART: [kat] sha1
7,439,042 UART: [kat] SHA2-256
7,440,980 UART: [kat] SHA2-384
7,443,623 UART: [kat] SHA2-512-ACC
7,445,523 UART: [kat] ECC-384
7,451,028 UART: [kat] HMAC-384Kdf
7,455,530 UART: [kat] LMS
8,023,726 UART: [kat] --
8,024,817 UART: [update-reset] ++
8,951,623 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,952,753 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,049,187 >>> mbox cmd response: success
9,049,187 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,049,498 UART: [update-reset] Copying MAN_2 To MAN_1
9,057,512 UART: [update-reset Success] --
9,058,285 UART: [state] Locking Datavault
9,058,877 UART: [state] Locking PCR0, PCR1 and PCR31
9,059,481 UART: [state] Locking ICCM
9,059,925 UART: [exit] Launching FMC @ 0x40000130
9,065,254 UART:
9,065,270 UART: Running Caliptra FMC ...
9,065,678 UART:
9,065,732 UART: [state] CFI Enabled
9,154,551 UART: [art] Extend RT PCRs Done
9,154,979 UART: [art] Lock RT PCRs Done
9,155,924 UART: [art] Populate DV Done
9,164,195 UART: [fht] FMC Alias Private Key: 7
9,165,251 UART: [art] Derive CDI
9,165,531 UART: [art] Store in in slot 0x4
9,251,142 UART: [art] Derive Key Pair
9,251,502 UART: [art] Store priv key in slot 0x5
9,264,540 UART: [art] Derive Key Pair - Done
9,279,703 UART: [art] Signing Cert with AUTHO
9,280,183 UART: RITY.KEYID = 7
9,295,135 UART: [art] Erasing AUTHORITY.KEYID = 7
9,295,900 UART: [art] PUB.X = 713B7ACD24F1642E54B45308E54A1EEE20AACA9D83066A785AF8AAEEC24031180EF0972F4FF7DB37E15B3882FABB10BD
9,302,679 UART: [art] PUB.Y = F5048EFBB1C734C8125E873019ED574EC6D3814CD5AD5AD7EA25F0C182E36B15D6410AAA56E60534D1725C4576BA9237
9,309,626 UART: [art] SIG.R = 33939DF4F1A6CDB40B22E8D5EB829F124A7DA38A781EF9C66F9BDBB88B32C65338C833ABD3FEC5F5EAF8441522BB237C
9,316,413 UART: [art] SIG.S = 07251BB9F8B1A8E35B7F77C041B05FCEB8D6EF433026FFD033BEA82032CCF109CB934FD964034DD7BDE32918AC9B79FF
9,340,529 UART: mbox::rt_entry...
9,340,901 UART: ____ _ _ _ ____ _____
9,341,685 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,342,485 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,343,253 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,344,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,344,789 UART: |_|
9,345,101 UART:
9,620,488 UART: [rt] Runtime listening for mailbox commands...
9,621,455 UART:
9,621,471 UART: Running Caliptra ROM ...
9,621,879 UART:
9,621,933 UART: [state] CFI Enabled
9,624,601 UART: [state] LifecycleState = Unprovisioned
9,625,256 UART: [state] DebugLocked = No
9,625,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,627,377 UART: [kat] SHA2-256
10,421,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,425,423 UART: [kat] ++
10,425,575 UART: [kat] sha1
10,429,893 UART: [kat] SHA2-256
10,431,831 UART: [kat] SHA2-384
10,434,578 UART: [kat] SHA2-512-ACC
10,436,478 UART: [kat] ECC-384
10,442,109 UART: [kat] HMAC-384Kdf
10,446,571 UART: [kat] LMS
11,014,767 UART: [kat] --
11,015,890 UART: [update-reset] ++
11,942,846 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,943,952 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,040,386 >>> mbox cmd response: success
12,040,386 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,040,709 UART: [update-reset] Copying MAN_2 To MAN_1
12,048,723 UART: [update-reset Success] --
12,049,812 UART: [state] Locking Datavault
12,050,484 UART: [state] Locking PCR0, PCR1 and PCR31
12,051,088 UART: [state] Locking ICCM
12,051,722 UART: [exit] Launching FMC @ 0x40000130
12,057,051 UART:
12,057,067 UART: Running Caliptra FMC ...
12,057,475 UART:
12,057,529 UART: [state] CFI Enabled
12,146,762 UART: [art] Extend RT PCRs Done
12,147,190 UART: [art] Lock RT PCRs Done
12,148,787 UART: [art] Populate DV Done
12,156,764 UART: [fht] FMC Alias Private Key: 7
12,157,704 UART: [art] Derive CDI
12,157,984 UART: [art] Store in in slot 0x4
12,243,923 UART: [art] Derive Key Pair
12,244,283 UART: [art] Store priv key in slot 0x5
12,256,959 UART: [art] Derive Key Pair - Done
12,271,832 UART: [art] Signing Cert with AUTHO
12,272,312 UART: RITY.KEYID = 7
12,287,294 UART: [art] Erasing AUTHORITY.KEYID = 7
12,288,059 UART: [art] PUB.X = 48664802A8E6E88D6D83D72383E105379123D8A5A67D1477B6B48355B056108E74D7F34E0E4F7BFBFE04112BDADCA8CB
12,294,821 UART: [art] PUB.Y = 99B83B6CF199C2293BBB1F1336004773291F240E9B67DCDB039B5A74359722BFCC969F2B01627704E9CC50B17332D026
12,301,733 UART: [art] SIG.R = 1C5AC8884B0D0AC66B76FB52E81541795A02E0A23C35BAD4ADE420B1F965AB9CAE739401126C7959CA4903A0CB0A5980
12,308,493 UART: [art] SIG.S = 80DE5F99602CA3A9BB592DABCB0E0427069B214621FE022A7CF39AC9110065379C3ACBED7695FEDC68CEA8E0AD5F7788
12,331,748 UART: mbox::rt_entry...
12,332,120 UART: ____ _ _ _ ____ _____
12,332,904 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,333,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,334,472 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,335,240 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,336,008 UART: |_|
12,336,320 UART:
12,617,290 UART: [rt] Runtime listening for mailbox commands...
12,618,486 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 ready_for_fw is high
1,362,517 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,674 >>> mbox cmd response: success
2,466,674 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,527,800 UART:
2,527,816 UART: Running Caliptra FMC ...
2,528,224 UART:
2,528,278 UART: [state] CFI Enabled
2,538,823 UART: [fht] FMC Alias Private Key: 7
2,646,440 UART: [art] Extend RT PCRs Done
2,646,868 UART: [art] Lock RT PCRs Done
2,648,338 UART: [art] Populate DV Done
2,656,561 UART: [fht] FMC Alias Private Key: 7
2,657,631 UART: [art] Derive CDI
2,657,911 UART: [art] Store in in slot 0x4
2,743,756 UART: [art] Derive Key Pair
2,744,116 UART: [art] Store priv key in slot 0x5
2,757,624 UART: [art] Derive Key Pair - Done
2,772,558 UART: [art] Signing Cert with AUTHO
2,773,038 UART: RITY.KEYID = 7
2,788,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,113 UART: [art] PUB.X = 98D1CF84DFFAA59E582E167793E09273EC4F45AA8E3ACFC2F8E432FB957CA3B1E0E5BE0A4D501578C03A90DEE52E95BA
2,795,902 UART: [art] PUB.Y = 22895CB510B5C636FA322F007B0387A2397A0AB01C0EE10DCAE9B5EF1803CE74337D8F2312681728783C6D27306D660B
2,802,810 UART: [art] SIG.R = 20B19F4F78167A91141D15D1F80AF7461022827451B00C22341A1F24258AC9E5A266232A5029C4D0F7E71D6657FF1880
2,809,562 UART: [art] SIG.S = E5C0BD0E933952395E1A47A4D0B73798AAFCE937AA8F6395122E1EB3A805C72255288C6B72E288774D368C90AC8075BC
2,833,347 UART: mbox::rt_entry...
2,833,719 UART: ____ _ _ _ ____ _____
2,834,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,071 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,839 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,607 UART: |_|
2,837,919 UART:
2,944,507 UART: [rt] Runtime listening for mailbox commands...
2,945,694 >>> mbox cmd response data (48 bytes)
2,945,695 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,705,792 >>> mbox cmd response: success
5,705,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,719,505 UART:
5,719,521 UART: Running Caliptra FMC ...
5,719,929 UART:
5,719,983 UART: [state] CFI Enabled
5,808,878 UART: [art] Extend RT PCRs Done
5,809,306 UART: [art] Lock RT PCRs Done
5,810,547 UART: [art] Populate DV Done
5,818,912 UART: [fht] FMC Alias Private Key: 7
5,819,970 UART: [art] Derive CDI
5,820,250 UART: [art] Store in in slot 0x4
5,906,129 UART: [art] Derive Key Pair
5,906,489 UART: [art] Store priv key in slot 0x5
5,919,635 UART: [art] Derive Key Pair - Done
5,934,463 UART: [art] Signing Cert with AUTHO
5,934,943 UART: RITY.KEYID = 7
5,950,109 UART: [art] Erasing AUTHORITY.KEYID = 7
5,950,874 UART: [art] PUB.X = 2A91C412C1368D5926E98D3828CDA8571793F69A18F4176FEA43CECD04A020086001954790B061A88F0A68403D46F8E0
5,957,624 UART: [art] PUB.Y = F6ECDB81C40AEA9FF844760566C704DD7DC4748A39934864D31BDD40DFF77F4E88647FA57847BA0BDA0485E0596E3801
5,964,564 UART: [art] SIG.R = 3F42AA62D0510473FB0DC3B697E0F5B9F3360E7E791ADB8FBDE0CE9EC2BF4A72B5E4AF98B6D42FD3406CF21987C63204
5,971,340 UART: [art] SIG.S = B940F9D92336DCD925B8F9D31C15665D5A10C9F86A0778AE61D073D88C88B9B99CA36F2E48B21BA3D2844D03E65C7EBE
5,994,939 UART: Caliptra RT
5,995,192 UART: [state] CFI Enabled
6,282,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,313,335 UART: [rt]cmd =0x4d454153, len=108
6,333,824 >>> mbox cmd response data (12 bytes)
6,333,825 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,633,644 >>> mbox cmd response: success
8,633,644 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,647,017 UART:
8,647,033 UART: Running Caliptra FMC ...
8,647,441 UART:
8,647,495 UART: [state] CFI Enabled
8,736,796 UART: [art] Extend RT PCRs Done
8,737,224 UART: [art] Lock RT PCRs Done
8,738,355 UART: [art] Populate DV Done
8,746,278 UART: [fht] FMC Alias Private Key: 7
8,747,290 UART: [art] Derive CDI
8,747,570 UART: [art] Store in in slot 0x4
8,833,069 UART: [art] Derive Key Pair
8,833,429 UART: [art] Store priv key in slot 0x5
8,846,257 UART: [art] Derive Key Pair - Done
8,861,216 UART: [art] Signing Cert with AUTHO
8,861,696 UART: RITY.KEYID = 7
8,876,752 UART: [art] Erasing AUTHORITY.KEYID = 7
8,877,517 UART: [art] PUB.X = CACCF58F53A236B45C1634A9503E6E611B8A521C877AFE57ABEE9952CDD97012F72DB21713EE017C60E3C4BCE60B308F
8,884,295 UART: [art] PUB.Y = D6A7686CA7BD58F5F100EA531DE741DE16F2F784D16E936D1F25830A2577B2D9C82F5A2DAFE8F1B911D1E51D4270002F
8,891,208 UART: [art] SIG.R = 04561EB76DC50BEC20C46F1886B9244B4B359CD7D13C3F6465E9B1B4EC6A11B75B9447E7DFA0EA493DD06BB0325496C3
8,897,982 UART: [art] SIG.S = F05B2C77293E4D125565742F29CB1C5FCCE9D030252824083E85D9729BAD87F9EAD6B193753A8A6C3ED5C4957484A602
8,921,781 UART: mbox::rt_entry...
8,922,153 UART: ____ _ _ _ ____ _____
8,922,937 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,923,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,924,505 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,925,273 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,926,041 UART: |_|
8,926,353 UART:
9,204,751 UART: [rt] Runtime listening for mailbox commands...
11,504,963 >>> mbox cmd response: success
11,504,963 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,518,540 UART:
11,518,556 UART: Running Caliptra FMC ...
11,518,964 UART:
11,519,018 UART: [state] CFI Enabled
11,607,617 UART: [art] Extend RT PCRs Done
11,608,045 UART: [art] Lock RT PCRs Done
11,609,462 UART: [art] Populate DV Done
11,617,559 UART: [fht] FMC Alias Private Key: 7
11,618,619 UART: [art] Derive CDI
11,618,899 UART: [art] Store in in slot 0x4
11,704,234 UART: [art] Derive Key Pair
11,704,594 UART: [art] Store priv key in slot 0x5
11,717,734 UART: [art] Derive Key Pair - Done
11,732,584 UART: [art] Signing Cert with AUTHO
11,733,064 UART: RITY.KEYID = 7
11,748,430 UART: [art] Erasing AUTHORITY.KEYID = 7
11,749,195 UART: [art] PUB.X = C58C37AB992CFE0A9912F4EFAA925E3ABEAE81214741496017E4E816D95F1D5ADBBD263E46B1D6891844F0DA9FF329C1
11,755,976 UART: [art] PUB.Y = 1BE7D3FD90A67E31019828CEAE270254227B302E05075CE76319D4800D295B9FF16351A9C47BDA83AF1CE1DEA9D4EE06
11,762,916 UART: [art] SIG.R = 1759ED1F9E9A7DA191FDB1D1F6F3AC300EBDA9744AD8DAE0AA1E82FFEAF80EFF2CA250AF2F8CD918A9C952B059D59984
11,769,710 UART: [art] SIG.S = BF65A396D656EB17C3E246E0C3E502A380EACC66AC9C250A1F7F3BDE51F8CDE7288AF9A1B07FFA1919F7C9398F4FFE56
11,793,485 UART: mbox::rt_entry...
11,793,857 UART: ____ _ _ _ ____ _____
11,794,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,795,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,796,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,796,977 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,797,745 UART: |_|
11,798,057 UART:
12,080,981 UART: [rt] Runtime listening for mailbox commands...
12,082,177 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.74s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,504,282 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,125 >>> mbox cmd response: success
2,616,125 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,617,279 UART: [afmc] ++
2,617,447 UART: [afmc] CDI.KEYID = 6
2,617,809 UART: [afmc] SUBJECT.KEYID = 7
2,618,234 UART: [afmc] AUTHORITY.KEYID = 5
2,654,375 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,878 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,568 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,643 UART: [afmc] --
2,697,705 UART: [cold-reset] --
2,698,455 UART: [state] Locking Datavault
2,699,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,242 UART: [state] Locking ICCM
2,700,780 UART: [exit] Launching FMC @ 0x40000130
2,706,109 UART:
2,706,125 UART: Running Caliptra FMC ...
2,706,533 UART:
2,706,676 UART: [state] CFI Enabled
2,717,269 UART: [fht] FMC Alias Private Key: 7
2,825,534 UART: [art] Extend RT PCRs Done
2,825,962 UART: [art] Lock RT PCRs Done
2,827,466 UART: [art] Populate DV Done
2,835,701 UART: [fht] FMC Alias Private Key: 7
2,836,759 UART: [art] Derive CDI
2,837,039 UART: [art] Store in in slot 0x4
2,922,848 UART: [art] Derive Key Pair
2,923,208 UART: [art] Store priv key in slot 0x5
2,936,214 UART: [art] Derive Key Pair - Done
2,951,181 UART: [art] Signing Cert with AUTHO
2,951,661 UART: RITY.KEYID = 7
2,966,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,710 UART: [art] PUB.X = 3A15F5F53BE9E0231BD9EF332C8AA95FA5C76BFA1C9F46A504DAD4C623B3240ACEA86C4B6A07913FAE9C9585E3F6F52A
2,974,493 UART: [art] PUB.Y = 45D5BE06D5741BD8B5C859AC6AF57FAEB503895A0119374874CE8FB590DC7D3E5345C2591747AB5C22C1543D4A2A62C7
2,981,440 UART: [art] SIG.R = E1CDF848B2FE0EAB3DCCA7C62CE3FACF4C902603E18B7C38A9139F66B164ED9B67A3B53E10B58F6C86A6170BA4BFC7D1
2,988,227 UART: [art] SIG.S = 92AB9DC654A750E82B3EDD2B6A52943E906CC574851605BB08987CAC246957CE333AE33D8EF91D4697D14E409A8BDF39
3,012,278 UART: mbox::rt_entry...
3,012,650 UART: ____ _ _ _ ____ _____
3,013,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,234 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,002 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,770 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,538 UART: |_|
3,016,850 UART:
3,123,291 UART: [rt] Runtime listening for mailbox commands...
3,124,478 >>> mbox cmd response data (48 bytes)
3,124,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,124,593 UART:
3,124,609 UART: Running Caliptra ROM ...
3,125,017 UART:
3,125,158 UART: [state] CFI Enabled
3,127,956 UART: [state] LifecycleState = Unprovisioned
3,128,611 UART: [state] DebugLocked = No
3,129,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,790 UART: [kat] SHA2-256
3,924,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,836 UART: [kat] ++
3,928,988 UART: [kat] sha1
3,933,332 UART: [kat] SHA2-256
3,935,270 UART: [kat] SHA2-384
3,937,885 UART: [kat] SHA2-512-ACC
3,939,785 UART: [kat] ECC-384
3,945,352 UART: [kat] HMAC-384Kdf
3,949,938 UART: [kat] LMS
4,518,134 UART: [kat] --
4,518,607 UART: [update-reset] ++
5,853,593 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,854,717 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,004,593 >>> mbox cmd response: success
6,004,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,004,912 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,926 UART: [update-reset Success] --
6,014,173 UART: [state] Locking Datavault
6,014,913 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,517 UART: [state] Locking ICCM
6,016,035 UART: [exit] Launching FMC @ 0x40000130
6,021,364 UART:
6,021,380 UART: Running Caliptra FMC ...
6,021,788 UART:
6,021,931 UART: [state] CFI Enabled
6,111,186 UART: [art] Extend RT PCRs Done
6,111,614 UART: [art] Lock RT PCRs Done
6,113,029 UART: [art] Populate DV Done
6,121,472 UART: [fht] FMC Alias Private Key: 7
6,122,560 UART: [art] Derive CDI
6,122,840 UART: [art] Store in in slot 0x4
6,208,537 UART: [art] Derive Key Pair
6,208,897 UART: [art] Store priv key in slot 0x5
6,222,631 UART: [art] Derive Key Pair - Done
6,237,229 UART: [art] Signing Cert with AUTHO
6,237,709 UART: RITY.KEYID = 7
6,252,995 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,760 UART: [art] PUB.X = 38FDC31AD0E33DDC264B88BA82CA9458C5032E3059F9DE736C11A3D4E7B4616AC5F59E25248BA7BCE07E891C3095504E
6,260,537 UART: [art] PUB.Y = F0AF09ED7F821B4CE60852463A25AD2E876281AB0246B6DBB8DC14E244888F8C549AB0A59FC8FE8D452B46868F9183CD
6,267,488 UART: [art] SIG.R = 9257173C17C61C7BDC00F83918D80C69D48E31BD301FD3462863BA43367890575A58AB2B3C45517EA90CBC0737F928DE
6,274,225 UART: [art] SIG.S = B2882683AFA5C735EF5E994CCB0830C964422962FBF8B203A17A178A8A86617852A75A19034DF7EE46B4A699BF252038
6,297,815 UART: Caliptra RT
6,298,160 UART: [state] CFI Enabled
6,580,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,860 UART: [rt]cmd =0x4d454153, len=108
6,632,403 >>> mbox cmd response data (12 bytes)
6,632,404 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,633,310 UART:
6,633,326 UART: Running Caliptra ROM ...
6,633,734 UART:
6,633,875 UART: [state] CFI Enabled
6,637,147 UART: [state] LifecycleState = Unprovisioned
6,637,802 UART: [state] DebugLocked = No
6,638,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,640,093 UART: [kat] SHA2-256
7,434,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,438,139 UART: [kat] ++
7,438,291 UART: [kat] sha1
7,442,349 UART: [kat] SHA2-256
7,444,287 UART: [kat] SHA2-384
7,447,048 UART: [kat] SHA2-512-ACC
7,448,948 UART: [kat] ECC-384
7,454,433 UART: [kat] HMAC-384Kdf
7,458,949 UART: [kat] LMS
8,027,145 UART: [kat] --
8,027,932 UART: [update-reset] ++
8,955,468 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,956,550 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,052,984 >>> mbox cmd response: success
9,052,984 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,053,221 UART: [update-reset] Copying MAN_2 To MAN_1
9,061,235 UART: [update-reset Success] --
9,062,106 UART: [state] Locking Datavault
9,062,936 UART: [state] Locking PCR0, PCR1 and PCR31
9,063,540 UART: [state] Locking ICCM
9,064,136 UART: [exit] Launching FMC @ 0x40000130
9,069,465 UART:
9,069,481 UART: Running Caliptra FMC ...
9,069,889 UART:
9,070,032 UART: [state] CFI Enabled
9,158,897 UART: [art] Extend RT PCRs Done
9,159,325 UART: [art] Lock RT PCRs Done
9,160,604 UART: [art] Populate DV Done
9,168,725 UART: [fht] FMC Alias Private Key: 7
9,169,891 UART: [art] Derive CDI
9,170,171 UART: [art] Store in in slot 0x4
9,256,106 UART: [art] Derive Key Pair
9,256,466 UART: [art] Store priv key in slot 0x5
9,269,336 UART: [art] Derive Key Pair - Done
9,284,006 UART: [art] Signing Cert with AUTHO
9,284,486 UART: RITY.KEYID = 7
9,299,640 UART: [art] Erasing AUTHORITY.KEYID = 7
9,300,405 UART: [art] PUB.X = 28A8C0040D1D08DC5A605F1AB487AEE9E4B575088899AD197E6984B0AC62DCF0B0E5B6353ED2A1201C835B92DC24877E
9,307,171 UART: [art] PUB.Y = 48BDFB5D3DB8DAD2DF987F2EC69E9A928B449B5B0ECE37F6FC4784603F1F1302CB5F30DCA1C2EDE99F23359B8C595E39
9,314,137 UART: [art] SIG.R = 3963FAD45D98FA46416B84F98AA8F2AF1F0317E840B85DA7930E2D29DAFDB1DF7342C2B29CB6E223222302B8E5593AA9
9,320,908 UART: [art] SIG.S = 18E4F4FCA73D32A8A3503B15CACB5961913338A8A7E442947EEC604476776F5E0A95088489396E7B6C11E369157E55AF
9,343,973 UART: mbox::rt_entry...
9,344,345 UART: ____ _ _ _ ____ _____
9,345,129 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,345,929 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,346,697 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,347,465 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,348,233 UART: |_|
9,348,545 UART:
9,629,180 UART: [rt] Runtime listening for mailbox commands...
9,630,147 UART:
9,630,163 UART: Running Caliptra ROM ...
9,630,571 UART:
9,630,712 UART: [state] CFI Enabled
9,633,716 UART: [state] LifecycleState = Unprovisioned
9,634,371 UART: [state] DebugLocked = No
9,634,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,636,668 UART: [kat] SHA2-256
10,430,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,434,714 UART: [kat] ++
10,434,866 UART: [kat] sha1
10,439,210 UART: [kat] SHA2-256
10,441,148 UART: [kat] SHA2-384
10,443,817 UART: [kat] SHA2-512-ACC
10,445,717 UART: [kat] ECC-384
10,451,586 UART: [kat] HMAC-384Kdf
10,456,284 UART: [kat] LMS
11,024,480 UART: [kat] --
11,025,255 UART: [update-reset] ++
11,951,973 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,953,229 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,049,663 >>> mbox cmd response: success
12,049,663 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,049,928 UART: [update-reset] Copying MAN_2 To MAN_1
12,057,942 UART: [update-reset Success] --
12,058,887 UART: [state] Locking Datavault
12,059,591 UART: [state] Locking PCR0, PCR1 and PCR31
12,060,195 UART: [state] Locking ICCM
12,060,825 UART: [exit] Launching FMC @ 0x40000130
12,066,154 UART:
12,066,170 UART: Running Caliptra FMC ...
12,066,578 UART:
12,066,721 UART: [state] CFI Enabled
12,156,198 UART: [art] Extend RT PCRs Done
12,156,626 UART: [art] Lock RT PCRs Done
12,158,199 UART: [art] Populate DV Done
12,166,240 UART: [fht] FMC Alias Private Key: 7
12,167,366 UART: [art] Derive CDI
12,167,646 UART: [art] Store in in slot 0x4
12,253,469 UART: [art] Derive Key Pair
12,253,829 UART: [art] Store priv key in slot 0x5
12,267,423 UART: [art] Derive Key Pair - Done
12,282,405 UART: [art] Signing Cert with AUTHO
12,282,885 UART: RITY.KEYID = 7
12,297,965 UART: [art] Erasing AUTHORITY.KEYID = 7
12,298,730 UART: [art] PUB.X = 471648545C7404888FB0BFBAC1B9497DE3D5DB04ADAEB48994A75514EAD799481311F5F1765D4B2E19DCB8CDD51ED98E
12,305,506 UART: [art] PUB.Y = E8CB82C5A82502B1016FCF364E7ADBF30CAF6475FF03EE18A7C289CA0D4629780068006D02B68744BCE80AF72A82F999
12,312,399 UART: [art] SIG.R = 50F1104881C6820715FBE9FD79B67F921FB48DD822136F96C338A81FCE18BD8727677BAA0D07BA6060503957378709EC
12,319,153 UART: [art] SIG.S = F0E93964D569B5ED4B79C0AFF8FBD0640B4DFA054FA2CCB0932A25C9C64C3DC95E26EDA044A19600196C66D2F3FE77D9
12,343,764 UART: mbox::rt_entry...
12,344,136 UART: ____ _ _ _ ____ _____
12,344,920 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,345,720 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,346,488 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,347,256 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,348,024 UART: |_|
12,348,336 UART:
12,628,394 UART: [rt] Runtime listening for mailbox commands...
12,629,590 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,596 ready_for_fw is high
1,362,596 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,633 >>> mbox cmd response: success
2,467,633 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,528,903 UART:
2,528,919 UART: Running Caliptra FMC ...
2,529,327 UART:
2,529,470 UART: [state] CFI Enabled
2,539,721 UART: [fht] FMC Alias Private Key: 7
2,648,084 UART: [art] Extend RT PCRs Done
2,648,512 UART: [art] Lock RT PCRs Done
2,649,914 UART: [art] Populate DV Done
2,658,219 UART: [fht] FMC Alias Private Key: 7
2,659,325 UART: [art] Derive CDI
2,659,605 UART: [art] Store in in slot 0x4
2,745,398 UART: [art] Derive Key Pair
2,745,758 UART: [art] Store priv key in slot 0x5
2,758,616 UART: [art] Derive Key Pair - Done
2,773,335 UART: [art] Signing Cert with AUTHO
2,773,815 UART: RITY.KEYID = 7
2,789,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,828 UART: [art] PUB.X = 8260F2031A694C2190B2343FAC242D6D1EF7ADB38E84D96F8732FA923F16EE6ECF482FF877FFF2B04E3D1D8726B01305
2,796,600 UART: [art] PUB.Y = 09B90B535A5E8D161B0ED430F6E542CFF6FEC7020F6ABC4680603E6E38FEDCC92763FDF544D340C48932CFEC2F6EAFB4
2,803,555 UART: [art] SIG.R = 429FDA76BE1EF1C1EAC1F54A387A6D032FEC4E75F3B2F6578ADD3AA70B916DA124AB0EB5138BE46864F9BA87539DEA54
2,810,338 UART: [art] SIG.S = A7150F10FCA0BD606210255F3F4588B2ED7BCC5CD76EDD520296794E16C1112FB00C0CA194B9A54865E2EE5DFCA273D2
2,834,115 UART: mbox::rt_entry...
2,834,487 UART: ____ _ _ _ ____ _____
2,835,271 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,071 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,839 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,607 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,375 UART: |_|
2,838,687 UART:
2,946,049 UART: [rt] Runtime listening for mailbox commands...
2,947,236 >>> mbox cmd response data (48 bytes)
2,947,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,707,699 >>> mbox cmd response: success
5,707,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,721,172 UART:
5,721,188 UART: Running Caliptra FMC ...
5,721,596 UART:
5,721,739 UART: [state] CFI Enabled
5,811,098 UART: [art] Extend RT PCRs Done
5,811,526 UART: [art] Lock RT PCRs Done
5,812,867 UART: [art] Populate DV Done
5,821,068 UART: [fht] FMC Alias Private Key: 7
5,822,148 UART: [art] Derive CDI
5,822,428 UART: [art] Store in in slot 0x4
5,908,245 UART: [art] Derive Key Pair
5,908,605 UART: [art] Store priv key in slot 0x5
5,922,079 UART: [art] Derive Key Pair - Done
5,936,730 UART: [art] Signing Cert with AUTHO
5,937,210 UART: RITY.KEYID = 7
5,952,516 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,281 UART: [art] PUB.X = D3EB046847836D7E6B489D2D371E671E37791E9ADB50FF36FDC16FDA76D8F4C62D2D1CF008CAAC2366E11177B4468D18
5,960,055 UART: [art] PUB.Y = 998DFDDDCBE0B81499FB0F754E9FFD635BC0EDCB6D719153670B5FF3685CCF2867E0304FD0D99423CE2D794C7A382CA7
5,967,017 UART: [art] SIG.R = C0AC8A02AD4C12910D2ADCD179DD7CF6DD8957892E00A5A1AECCB71E0210E5D8EAE6CEE220D31E270C392177EEE1C4FC
5,973,779 UART: [art] SIG.S = BF9B99F264153978BCD359AC8B8AC4FB1FBA4671514C28733110638E45CC61B1027D37804F93DE4715ADE9A69683FABB
5,997,921 UART: Caliptra RT
5,998,266 UART: [state] CFI Enabled
6,278,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,309,334 UART: [rt]cmd =0x4d454153, len=108
6,329,607 >>> mbox cmd response data (12 bytes)
6,329,608 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,631,010 >>> mbox cmd response: success
8,631,010 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,644,139 UART:
8,644,155 UART: Running Caliptra FMC ...
8,644,563 UART:
8,644,706 UART: [state] CFI Enabled
8,733,871 UART: [art] Extend RT PCRs Done
8,734,299 UART: [art] Lock RT PCRs Done
8,735,794 UART: [art] Populate DV Done
8,744,021 UART: [fht] FMC Alias Private Key: 7
8,745,143 UART: [art] Derive CDI
8,745,423 UART: [art] Store in in slot 0x4
8,831,022 UART: [art] Derive Key Pair
8,831,382 UART: [art] Store priv key in slot 0x5
8,844,634 UART: [art] Derive Key Pair - Done
8,859,543 UART: [art] Signing Cert with AUTHO
8,860,023 UART: RITY.KEYID = 7
8,875,179 UART: [art] Erasing AUTHORITY.KEYID = 7
8,875,944 UART: [art] PUB.X = AF37E736DB61F340EBEDD002B79BBB2892BC20B7C90D0BA046C84812DD85126E511EEB28F030A8B79C42F3137C2966EB
8,882,717 UART: [art] PUB.Y = 5F2BC527F2CFB13FE2F2B2EC8D6191970420D9EBEC6690B285A8213F986C826BE2ED166D6E2D5E0EDC76A210A932A16C
8,889,675 UART: [art] SIG.R = 086FBD971B3F3982C5CB9116B226F5B75E2A97F89ABB3B0B3FAA22E0B72F4423C68CDA9C3DDE9730857FB76F1D1BBA9D
8,896,459 UART: [art] SIG.S = CEABEFEC6BA29453C32DA5CAE65EACEFEDB7F9958682AFC24CEAA0609946035CF8776CE46A908718075124B08568314D
8,920,290 UART: mbox::rt_entry...
8,920,662 UART: ____ _ _ _ ____ _____
8,921,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,922,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,923,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,923,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,924,550 UART: |_|
8,924,862 UART:
9,203,052 UART: [rt] Runtime listening for mailbox commands...
11,504,267 >>> mbox cmd response: success
11,504,267 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,517,750 UART:
11,517,766 UART: Running Caliptra FMC ...
11,518,174 UART:
11,518,317 UART: [state] CFI Enabled
11,607,704 UART: [art] Extend RT PCRs Done
11,608,132 UART: [art] Lock RT PCRs Done
11,609,345 UART: [art] Populate DV Done
11,617,394 UART: [fht] FMC Alias Private Key: 7
11,618,476 UART: [art] Derive CDI
11,618,756 UART: [art] Store in in slot 0x4
11,704,265 UART: [art] Derive Key Pair
11,704,625 UART: [art] Store priv key in slot 0x5
11,717,995 UART: [art] Derive Key Pair - Done
11,732,820 UART: [art] Signing Cert with AUTHO
11,733,300 UART: RITY.KEYID = 7
11,748,586 UART: [art] Erasing AUTHORITY.KEYID = 7
11,749,351 UART: [art] PUB.X = 2263D510BE10A15EA645D3E8B8718E173FB50B127EA061F8E0AF3ECAA04CB0FDA21ACA19CC05892DAC016F622B5345B9
11,756,128 UART: [art] PUB.Y = 9E8F039C60F7EF9CF89C5AC8BD89F11F7A30BC0457ECE8D1057E3AF9D65041985D50551855EAFB6BD3BAE5232E2D5AFC
11,763,089 UART: [art] SIG.R = 6ABB00B4EAA8BC24508C85BE7F48A669B77DD4DECB05C4127EC77886151F4760584495B98A6DBD56DEBCC6B82FC8C4DF
11,769,854 UART: [art] SIG.S = E67FC55B2396D5B32B483F16535A0F252C87AAFB2EEB82E4234087AF638E99A3AD91E67759F7675B641E2B44EDBCA883
11,793,540 UART: mbox::rt_entry...
11,793,912 UART: ____ _ _ _ ____ _____
11,794,696 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,795,496 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,796,264 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,797,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,797,800 UART: |_|
11,798,112 UART:
12,081,818 UART: [rt] Runtime listening for mailbox commands...
12,083,014 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.56s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,628 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,338 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,619 >>> mbox cmd response: success
2,313,619 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,314,727 UART: [afmc] ++
2,314,895 UART: [afmc] CDI.KEYID = 6
2,315,257 UART: [afmc] SUBJECT.KEYID = 7
2,315,682 UART: [afmc] AUTHORITY.KEYID = 5
2,351,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,524 UART: [afmc] --
2,394,448 UART: [cold-reset] --
2,395,464 UART: [state] Locking Datavault
2,396,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,355 UART: [state] Locking ICCM
2,397,951 UART: [exit] Launching FMC @ 0x40000130
2,403,280 UART:
2,403,296 UART: Running Caliptra FMC ...
2,403,704 UART:
2,403,758 UART: [state] CFI Enabled
2,413,935 UART: [fht] FMC Alias Private Key: 7
2,521,874 UART: [art] Extend RT PCRs Done
2,522,302 UART: [art] Lock RT PCRs Done
2,523,916 UART: [art] Populate DV Done
2,532,137 UART: [fht] FMC Alias Private Key: 7
2,533,257 UART: [art] Derive CDI
2,533,537 UART: [art] Store in in slot 0x4
2,618,772 UART: [art] Derive Key Pair
2,619,132 UART: [art] Store priv key in slot 0x5
2,631,510 UART: [art] Derive Key Pair - Done
2,646,651 UART: [art] Signing Cert with AUTHO
2,647,131 UART: RITY.KEYID = 7
2,662,539 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,304 UART: [art] PUB.X = CAF78147D12ED2B69B9478758372BD0E01A5C9D3AAD12D5CB5777E19214A52B0BB461F5C2AA757D76C04694B0E5C7622
2,670,068 UART: [art] PUB.Y = 78F1FEDEE152EFC7F70D2E77D5F59D1705C1F5355689CAADEAA5A86DD4AA543A50D2911E5D56865D69E51F9A5FB5D93C
2,677,032 UART: [art] SIG.R = 3A215D7F0AA7ED36CF68D3A2EF8C2C3CB0DDA5BFDAE59332266F4B70A907D1BCF8DAF9163CEE97000DA31C541491917D
2,683,793 UART: [art] SIG.S = A96B0AB7A849DDAA921B5BF4342577B5E8D5A1A5432BA0D08B74C469CEF9FB87344FF292EB1F03C3CA02E5497B6BB5D7
2,707,739 UART: mbox::rt_entry...
2,708,111 UART: ____ _ _ _ ____ _____
2,708,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,999 UART: |_|
2,712,311 UART:
2,818,751 UART: [rt] Runtime listening for mailbox commands...
2,819,938 >>> mbox cmd response data (48 bytes)
2,819,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,820,050 UART:
2,820,066 UART: Running Caliptra ROM ...
2,820,474 UART:
2,820,529 UART: [state] CFI Enabled
2,823,467 UART: [state] LifecycleState = Unprovisioned
2,824,122 UART: [state] DebugLocked = No
2,824,634 UART: [state] WD Timer not started. Device not locked for debugging
2,825,900 UART: [kat] SHA2-256
3,631,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,635,675 UART: [kat] ++
3,635,827 UART: [kat] sha1
3,640,235 UART: [kat] SHA2-256
3,642,175 UART: [kat] SHA2-384
3,645,004 UART: [kat] SHA2-512-ACC
3,646,904 UART: [kat] ECC-384
3,656,671 UART: [kat] HMAC-384Kdf
3,661,109 UART: [kat] LMS
3,909,437 UART: [kat] --
3,910,077 UART: [update-reset] ++
5,223,213 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,232 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,056 >>> mbox cmd response: success
5,374,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,374,383 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,397 UART: [update-reset Success] --
5,383,304 UART: [state] Locking Datavault
5,384,140 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,744 UART: [state] Locking ICCM
5,385,192 UART: [exit] Launching FMC @ 0x40000130
5,390,521 UART:
5,390,537 UART: Running Caliptra FMC ...
5,390,945 UART:
5,390,999 UART: [state] CFI Enabled
5,480,002 UART: [art] Extend RT PCRs Done
5,480,430 UART: [art] Lock RT PCRs Done
5,481,775 UART: [art] Populate DV Done
5,490,252 UART: [fht] FMC Alias Private Key: 7
5,491,364 UART: [art] Derive CDI
5,491,644 UART: [art] Store in in slot 0x4
5,577,083 UART: [art] Derive Key Pair
5,577,443 UART: [art] Store priv key in slot 0x5
5,590,055 UART: [art] Derive Key Pair - Done
5,604,836 UART: [art] Signing Cert with AUTHO
5,605,316 UART: RITY.KEYID = 7
5,620,744 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,509 UART: [art] PUB.X = A9F057AFD6D83682C39CE1CB4DFFE220A47E93FE3814EB34F1F04C10716B69407F4BAEC797CBE8447CD61A9FFBEBD3CB
5,628,305 UART: [art] PUB.Y = 5589FAD6D8663785CE9B9BBCF4019A048BC4529627F66B45FC00BF1286BA8F254FBF263DE528E3DC91D7B366EC5CEE88
5,635,241 UART: [art] SIG.R = 102DAB15DFF80870CF6D54E3D877AB8782EB7ACB8687E25B727F16F345009C8B17F63B9D3800F8771AF4C88587AAB076
5,641,970 UART: [art] SIG.S = E8AC54A9FD17A8B150DE71AF4DA80378339F5ADDAD7AAD97044BE81C4094233872CFADCFCE7FF35BFAC858103EC0BA09
5,665,158 UART: Caliptra RT
5,665,411 UART: [state] CFI Enabled
5,947,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,050 UART: [rt]cmd =0x4d454153, len=108
5,999,939 >>> mbox cmd response data (12 bytes)
5,999,940 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,465 UART:
6,000,481 UART: Running Caliptra ROM ...
6,000,889 UART:
6,000,944 UART: [state] CFI Enabled
6,003,674 UART: [state] LifecycleState = Unprovisioned
6,004,329 UART: [state] DebugLocked = No
6,004,995 UART: [state] WD Timer not started. Device not locked for debugging
6,006,287 UART: [kat] SHA2-256
6,811,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,816,062 UART: [kat] ++
6,816,214 UART: [kat] sha1
6,820,458 UART: [kat] SHA2-256
6,822,398 UART: [kat] SHA2-384
6,824,959 UART: [kat] SHA2-512-ACC
6,826,859 UART: [kat] ECC-384
6,836,556 UART: [kat] HMAC-384Kdf
6,841,160 UART: [kat] LMS
7,089,488 UART: [kat] --
7,090,496 UART: [update-reset] ++
7,996,176 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,997,259 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,093,641 >>> mbox cmd response: success
8,093,641 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,093,856 UART: [update-reset] Copying MAN_2 To MAN_1
8,101,870 UART: [update-reset Success] --
8,102,817 UART: [state] Locking Datavault
8,103,575 UART: [state] Locking PCR0, PCR1 and PCR31
8,104,179 UART: [state] Locking ICCM
8,104,665 UART: [exit] Launching FMC @ 0x40000130
8,109,994 UART:
8,110,010 UART: Running Caliptra FMC ...
8,110,418 UART:
8,110,472 UART: [state] CFI Enabled
8,199,677 UART: [art] Extend RT PCRs Done
8,200,105 UART: [art] Lock RT PCRs Done
8,201,358 UART: [art] Populate DV Done
8,209,859 UART: [fht] FMC Alias Private Key: 7
8,210,941 UART: [art] Derive CDI
8,211,221 UART: [art] Store in in slot 0x4
8,296,712 UART: [art] Derive Key Pair
8,297,072 UART: [art] Store priv key in slot 0x5
8,310,164 UART: [art] Derive Key Pair - Done
8,324,884 UART: [art] Signing Cert with AUTHO
8,325,364 UART: RITY.KEYID = 7
8,340,532 UART: [art] Erasing AUTHORITY.KEYID = 7
8,341,297 UART: [art] PUB.X = 39447F2A1FBA9CB61A6FE368841FDBE49C101F066E527405ED0E99C5817706CB1F6647B1C7E7975F7637434CA3EE7809
8,348,054 UART: [art] PUB.Y = 44691070124B78EE2D9CD25CDB8BBDE89436AAF96F8E01D4BB728277A335BB02B8E5641648F831B4A4BC7B9601B9C20B
8,355,000 UART: [art] SIG.R = 688D4DB6A10C06B116AA7CA8ADD9D9108FDD2D15319F86086C83023B13F8335EE7210D980F5AB78CBD4225CFE02C2996
8,361,760 UART: [art] SIG.S = D8AF91DBC1AA0D752A64561C0D902AC7466FFFD6258051F50B94584C1E935618BD961BD537B40D78C59429B2CF9E8235
8,385,137 UART: mbox::rt_entry...
8,385,509 UART: ____ _ _ _ ____ _____
8,386,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,387,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,387,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,388,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,389,397 UART: |_|
8,389,709 UART:
8,671,483 UART: [rt] Runtime listening for mailbox commands...
8,672,447 UART:
8,672,463 UART: Running Caliptra ROM ...
8,672,871 UART:
8,672,926 UART: [state] CFI Enabled
8,675,794 UART: [state] LifecycleState = Unprovisioned
8,676,449 UART: [state] DebugLocked = No
8,677,125 UART: [state] WD Timer not started. Device not locked for debugging
8,678,355 UART: [kat] SHA2-256
9,484,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,488,130 UART: [kat] ++
9,488,282 UART: [kat] sha1
9,492,678 UART: [kat] SHA2-256
9,494,618 UART: [kat] SHA2-384
9,497,369 UART: [kat] SHA2-512-ACC
9,499,269 UART: [kat] ECC-384
9,509,178 UART: [kat] HMAC-384Kdf
9,513,780 UART: [kat] LMS
9,762,108 UART: [kat] --
9,762,936 UART: [update-reset] ++
10,667,612 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,668,593 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,764,975 >>> mbox cmd response: success
10,764,975 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,765,208 UART: [update-reset] Copying MAN_2 To MAN_1
10,773,222 UART: [update-reset Success] --
10,774,129 UART: [state] Locking Datavault
10,774,879 UART: [state] Locking PCR0, PCR1 and PCR31
10,775,483 UART: [state] Locking ICCM
10,776,015 UART: [exit] Launching FMC @ 0x40000130
10,781,344 UART:
10,781,360 UART: Running Caliptra FMC ...
10,781,768 UART:
10,781,822 UART: [state] CFI Enabled
10,870,507 UART: [art] Extend RT PCRs Done
10,870,935 UART: [art] Lock RT PCRs Done
10,872,528 UART: [art] Populate DV Done
10,880,603 UART: [fht] FMC Alias Private Key: 7
10,881,563 UART: [art] Derive CDI
10,881,843 UART: [art] Store in in slot 0x4
10,967,452 UART: [art] Derive Key Pair
10,967,812 UART: [art] Store priv key in slot 0x5
10,981,558 UART: [art] Derive Key Pair - Done
10,996,377 UART: [art] Signing Cert with AUTHO
10,996,857 UART: RITY.KEYID = 7
11,012,377 UART: [art] Erasing AUTHORITY.KEYID = 7
11,013,142 UART: [art] PUB.X = 551EDFB9D5EC3F2BDE06E81E85F7B5022D0115703F8374C468C2A362CC3CC6590F812B06BD2C4966AE7ABB5B155BA96C
11,019,911 UART: [art] PUB.Y = C8F76FA0C0682CE51584A1BA9EB38EFC8502B9D350CE787A5E4B8ED86F8C1ABEA8E1031F2CBF7A192725653256D40DAC
11,026,870 UART: [art] SIG.R = 83E2A546D2BAC8D557FF8BA411C4323DF22503DC31AF55A29AA35FB5D1BC1FC3E567FD3F44828F11E2FE06CF965C222C
11,033,652 UART: [art] SIG.S = 89954B2BCD636AE9D108B207DCE3A8099886D9B8C39AEA21C05352F45A3C5AF5C0C0CE021C2EA07C997C024656BC6AC8
11,057,714 UART: mbox::rt_entry...
11,058,086 UART: ____ _ _ _ ____ _____
11,058,870 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,059,670 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,060,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,061,206 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,061,974 UART: |_|
11,062,286 UART:
11,340,521 UART: [rt] Runtime listening for mailbox commands...
11,341,717 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,305 ready_for_fw is high
1,060,305 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,510 >>> mbox cmd response: success
2,166,510 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,229,108 UART:
2,229,124 UART: Running Caliptra FMC ...
2,229,532 UART:
2,229,586 UART: [state] CFI Enabled
2,240,043 UART: [fht] FMC Alias Private Key: 7
2,348,544 UART: [art] Extend RT PCRs Done
2,348,972 UART: [art] Lock RT PCRs Done
2,350,834 UART: [art] Populate DV Done
2,359,365 UART: [fht] FMC Alias Private Key: 7
2,360,397 UART: [art] Derive CDI
2,360,677 UART: [art] Store in in slot 0x4
2,446,614 UART: [art] Derive Key Pair
2,446,974 UART: [art] Store priv key in slot 0x5
2,460,476 UART: [art] Derive Key Pair - Done
2,475,233 UART: [art] Signing Cert with AUTHO
2,475,713 UART: RITY.KEYID = 7
2,491,005 UART: [art] Erasing AUTHORITY.KEYID = 7
2,491,770 UART: [art] PUB.X = 9A1AC8CEDAF3751315E8C49CB02ADB272083E33E72F2971CB1EFAFA145FB29E0121BB5BDF612090DBDFCFEE5DDA370B2
2,498,562 UART: [art] PUB.Y = 2E5215312C78DFCFEE20441EB202F7EC26D27786ABC058A78D5444DC5B70F76FC93989171F456316999B284482948A61
2,505,503 UART: [art] SIG.R = 92D03396B9C25FD05D1054F1AD52B349958DCD6E37A1BE4E7067D8CC89BC72A4D715FDD6068057F189221FE995CF63AE
2,512,278 UART: [art] SIG.S = F5F9D2D3B40DB3EAFC1D5003FE2679C1DBCA96C0BA9FACEB51C99904258F94D5D5D9828CE0CFC4C194B814F10C7E9CEB
2,535,825 UART: mbox::rt_entry...
2,536,197 UART: ____ _ _ _ ____ _____
2,536,981 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,537,781 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,538,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,539,317 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,540,085 UART: |_|
2,540,397 UART:
2,645,572 UART: [rt] Runtime listening for mailbox commands...
2,646,759 >>> mbox cmd response data (48 bytes)
2,646,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,083,222 >>> mbox cmd response: success
5,083,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,096,666 UART:
5,096,682 UART: Running Caliptra FMC ...
5,097,090 UART:
5,097,144 UART: [state] CFI Enabled
5,186,467 UART: [art] Extend RT PCRs Done
5,186,895 UART: [art] Lock RT PCRs Done
5,187,882 UART: [art] Populate DV Done
5,195,873 UART: [fht] FMC Alias Private Key: 7
5,196,875 UART: [art] Derive CDI
5,197,155 UART: [art] Store in in slot 0x4
5,282,520 UART: [art] Derive Key Pair
5,282,880 UART: [art] Store priv key in slot 0x5
5,295,860 UART: [art] Derive Key Pair - Done
5,310,748 UART: [art] Signing Cert with AUTHO
5,311,228 UART: RITY.KEYID = 7
5,326,158 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,923 UART: [art] PUB.X = 6C9DB642F45E0680F7B85980CF71A52EC6DE588E7BC5D3010B8F6533A5C0BB76CBCB197D1206B73C41F035BDDF27EC8D
5,333,697 UART: [art] PUB.Y = A4FF0B1E8187A16BCB17DF1369894887F7752482DE5395A45D8DED8AACE3070EC1C2187A3DF08F02309C2269A40BC2B8
5,340,640 UART: [art] SIG.R = 539BBEFFD6D8D1CFFBEB890EBD5EDB38FD720547EB4E8CD8521C6C82D7FF67A51B1D338B15E983320175A8D42061A155
5,347,419 UART: [art] SIG.S = 47CE7A6A5669375816EE8CD9494E178F32097A5FC84A867EB114A574B0B31B2A43B15393AB346B6B1B72D1B99524FED6
5,371,287 UART: Caliptra RT
5,371,540 UART: [state] CFI Enabled
5,653,561 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,684,769 UART: [rt]cmd =0x4d454153, len=108
5,705,724 >>> mbox cmd response data (12 bytes)
5,705,725 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,682,747 >>> mbox cmd response: success
7,682,747 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,696,421 UART:
7,696,437 UART: Running Caliptra FMC ...
7,696,845 UART:
7,696,899 UART: [state] CFI Enabled
7,786,196 UART: [art] Extend RT PCRs Done
7,786,624 UART: [art] Lock RT PCRs Done
7,787,963 UART: [art] Populate DV Done
7,796,082 UART: [fht] FMC Alias Private Key: 7
7,797,050 UART: [art] Derive CDI
7,797,330 UART: [art] Store in in slot 0x4
7,882,965 UART: [art] Derive Key Pair
7,883,325 UART: [art] Store priv key in slot 0x5
7,896,767 UART: [art] Derive Key Pair - Done
7,911,446 UART: [art] Signing Cert with AUTHO
7,911,926 UART: RITY.KEYID = 7
7,926,978 UART: [art] Erasing AUTHORITY.KEYID = 7
7,927,743 UART: [art] PUB.X = 1C126DB474E7B037DA304767E69BA02CD2F389B3B69A5264BFABF4545A5FFCDEBDCA3CC4AAB0F7B91B00A8EAABF1D2F9
7,934,523 UART: [art] PUB.Y = 235DBD18DBA8BD13F62C11002AC20D95BB001B5762846D382201D74E2EAA0205C4F70994144405F9719E6E4C082893ED
7,941,406 UART: [art] SIG.R = D180C4867ADD523DD7C3579190895746F4774F7AEE4DEA3F731ACA6A238BC5E5A609E5CEF9835BFE1DE26A8197A6E0CB
7,948,189 UART: [art] SIG.S = 5914CED5159BB570731560A1813625F66D41DF18AEC4030969AA7D8D8903943A95A6CC828970473EF00B28F4ADABBC17
7,971,668 UART: mbox::rt_entry...
7,972,040 UART: ____ _ _ _ ____ _____
7,972,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,973,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,974,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,975,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,975,928 UART: |_|
7,976,240 UART:
8,253,678 UART: [rt] Runtime listening for mailbox commands...
10,229,461 >>> mbox cmd response: success
10,229,461 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,242,745 UART:
10,242,761 UART: Running Caliptra FMC ...
10,243,169 UART:
10,243,223 UART: [state] CFI Enabled
10,332,434 UART: [art] Extend RT PCRs Done
10,332,862 UART: [art] Lock RT PCRs Done
10,334,037 UART: [art] Populate DV Done
10,342,458 UART: [fht] FMC Alias Private Key: 7
10,343,386 UART: [art] Derive CDI
10,343,666 UART: [art] Store in in slot 0x4
10,429,445 UART: [art] Derive Key Pair
10,429,805 UART: [art] Store priv key in slot 0x5
10,442,709 UART: [art] Derive Key Pair - Done
10,457,380 UART: [art] Signing Cert with AUTHO
10,457,860 UART: RITY.KEYID = 7
10,472,766 UART: [art] Erasing AUTHORITY.KEYID = 7
10,473,531 UART: [art] PUB.X = A140986F71165227A8BFDC7FB36DBED6522ED33523EFAA7C480285DFAC7043B6607EEF802F0C3F4A8DD3635EBE638546
10,480,307 UART: [art] PUB.Y = 056C11EE85DE8F2B1E9C1E74BE5EC33F3857F2D75179956B2FE7A5C68D1A4F908FF9BD07D9E00D26EED32236C90FDFD9
10,487,263 UART: [art] SIG.R = ABCB4D258076538A80519C5130E540BD33CC0F0B5EE041154616AEA759978DD77A5682514DD8864E16BF19F2BBA222B3
10,494,029 UART: [art] SIG.S = 3650CDE6C1FBD382ECB7D6D9400D9DC67793535F481D1ED38B5D20B237D981AF6B7A1C8E8B7BB58AD6B3969817D154E0
10,517,517 UART: mbox::rt_entry...
10,517,889 UART: ____ _ _ _ ____ _____
10,518,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,519,473 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,520,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,521,009 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,521,777 UART: |_|
10,522,089 UART:
10,802,659 UART: [rt] Runtime listening for mailbox commands...
10,803,855 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.38s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,495 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,181 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,658 >>> mbox cmd response: success
2,314,658 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,315,822 UART: [afmc] ++
2,315,990 UART: [afmc] CDI.KEYID = 6
2,316,352 UART: [afmc] SUBJECT.KEYID = 7
2,316,777 UART: [afmc] AUTHORITY.KEYID = 5
2,353,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,939 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,824 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,543 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,441 UART: [afmc] --
2,396,355 UART: [cold-reset] --
2,397,331 UART: [state] Locking Datavault
2,398,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,168 UART: [state] Locking ICCM
2,399,652 UART: [exit] Launching FMC @ 0x40000130
2,404,981 UART:
2,404,997 UART: Running Caliptra FMC ...
2,405,405 UART:
2,405,548 UART: [state] CFI Enabled
2,416,387 UART: [fht] FMC Alias Private Key: 7
2,524,610 UART: [art] Extend RT PCRs Done
2,525,038 UART: [art] Lock RT PCRs Done
2,526,562 UART: [art] Populate DV Done
2,534,563 UART: [fht] FMC Alias Private Key: 7
2,535,561 UART: [art] Derive CDI
2,535,841 UART: [art] Store in in slot 0x4
2,621,982 UART: [art] Derive Key Pair
2,622,342 UART: [art] Store priv key in slot 0x5
2,636,452 UART: [art] Derive Key Pair - Done
2,651,718 UART: [art] Signing Cert with AUTHO
2,652,198 UART: RITY.KEYID = 7
2,667,526 UART: [art] Erasing AUTHORITY.KEYID = 7
2,668,291 UART: [art] PUB.X = 252F85A9357B95C473D667EC533BAC05CAF30D3624A90E3F25FBAAA90F0BD28F3164362F710667477F222509FC9B1022
2,675,040 UART: [art] PUB.Y = 8A24FAFC4D9F9B21B86CECF630A0AF1647342914884AE6FCAA0CC45C8B914FB1D9BB094AACD59CC0F5CA001F1F271C9F
2,681,988 UART: [art] SIG.R = 49DD7A352EC1FFDB446CCE5941AA220C44CBC754CB3A36A345FE9CEE1EE411E678E9D14C9CA3FABF16AEBF56B0104FBA
2,688,787 UART: [art] SIG.S = 427359D01B07D61735FBB22012DD1438BCE013E8B54BA622F0480AFF55960B4C22CB09F5D2265BDCF240DC0E3AB25480
2,712,821 UART: mbox::rt_entry...
2,713,193 UART: ____ _ _ _ ____ _____
2,713,977 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,714,777 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,715,545 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,716,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,717,081 UART: |_|
2,717,393 UART:
2,824,183 UART: [rt] Runtime listening for mailbox commands...
2,825,370 >>> mbox cmd response data (48 bytes)
2,825,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,825,482 UART:
2,825,498 UART: Running Caliptra ROM ...
2,825,906 UART:
2,826,048 UART: [state] CFI Enabled
2,828,842 UART: [state] LifecycleState = Unprovisioned
2,829,497 UART: [state] DebugLocked = No
2,830,131 UART: [state] WD Timer not started. Device not locked for debugging
2,831,373 UART: [kat] SHA2-256
3,637,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,641,148 UART: [kat] ++
3,641,300 UART: [kat] sha1
3,645,666 UART: [kat] SHA2-256
3,647,606 UART: [kat] SHA2-384
3,650,299 UART: [kat] SHA2-512-ACC
3,652,199 UART: [kat] ECC-384
3,661,888 UART: [kat] HMAC-384Kdf
3,666,602 UART: [kat] LMS
3,914,930 UART: [kat] --
3,915,548 UART: [update-reset] ++
5,228,468 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,229,643 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,379,467 >>> mbox cmd response: success
5,379,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,379,646 UART: [update-reset] Copying MAN_2 To MAN_1
5,387,660 UART: [update-reset Success] --
5,388,723 UART: [state] Locking Datavault
5,389,455 UART: [state] Locking PCR0, PCR1 and PCR31
5,390,059 UART: [state] Locking ICCM
5,390,613 UART: [exit] Launching FMC @ 0x40000130
5,395,942 UART:
5,395,958 UART: Running Caliptra FMC ...
5,396,366 UART:
5,396,509 UART: [state] CFI Enabled
5,485,628 UART: [art] Extend RT PCRs Done
5,486,056 UART: [art] Lock RT PCRs Done
5,487,219 UART: [art] Populate DV Done
5,495,576 UART: [fht] FMC Alias Private Key: 7
5,496,662 UART: [art] Derive CDI
5,496,942 UART: [art] Store in in slot 0x4
5,582,401 UART: [art] Derive Key Pair
5,582,761 UART: [art] Store priv key in slot 0x5
5,595,843 UART: [art] Derive Key Pair - Done
5,610,531 UART: [art] Signing Cert with AUTHO
5,611,011 UART: RITY.KEYID = 7
5,626,305 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,070 UART: [art] PUB.X = FE5CE0406EE395CA2461FA710666A42CAC4DF81E9EBA7477E005D1F43AB4350D7968BE2E217DA7199B59B98DCB87CD94
5,633,845 UART: [art] PUB.Y = 034F31935C998AD2DC15B841FDDF00DB72F33D723A7E17C45F846D22E398486CE65B2800E207BD49255744F78718DEAE
5,640,747 UART: [art] SIG.R = 1B553B6D63BE0145DD17E2AE03CA8E521DDBF855C1B84D5BF34ADEF6D6640A1DA03A8DFB7C2F3F1F09A8E40094534A2C
5,647,505 UART: [art] SIG.S = EF082396344E61A47FF76D6B2BAF65926A0292B33BEF5D990385F92F52F4FCE47CA31BED0984484A9D49F8E9C2A5F9AF
5,671,286 UART: Caliptra RT
5,671,631 UART: [state] CFI Enabled
5,951,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,983,092 UART: [rt]cmd =0x4d454153, len=108
6,003,385 >>> mbox cmd response data (12 bytes)
6,003,386 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,137 UART:
6,004,153 UART: Running Caliptra ROM ...
6,004,561 UART:
6,004,703 UART: [state] CFI Enabled
6,007,731 UART: [state] LifecycleState = Unprovisioned
6,008,386 UART: [state] DebugLocked = No
6,009,112 UART: [state] WD Timer not started. Device not locked for debugging
6,010,468 UART: [kat] SHA2-256
6,816,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,820,243 UART: [kat] ++
6,820,395 UART: [kat] sha1
6,824,541 UART: [kat] SHA2-256
6,826,481 UART: [kat] SHA2-384
6,829,378 UART: [kat] SHA2-512-ACC
6,831,278 UART: [kat] ECC-384
6,840,833 UART: [kat] HMAC-384Kdf
6,845,469 UART: [kat] LMS
7,093,797 UART: [kat] --
7,094,863 UART: [update-reset] ++
7,998,438 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,999,623 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,096,005 >>> mbox cmd response: success
8,096,005 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,096,246 UART: [update-reset] Copying MAN_2 To MAN_1
8,104,260 UART: [update-reset Success] --
8,105,299 UART: [state] Locking Datavault
8,106,193 UART: [state] Locking PCR0, PCR1 and PCR31
8,106,797 UART: [state] Locking ICCM
8,107,263 UART: [exit] Launching FMC @ 0x40000130
8,112,592 UART:
8,112,608 UART: Running Caliptra FMC ...
8,113,016 UART:
8,113,159 UART: [state] CFI Enabled
8,202,026 UART: [art] Extend RT PCRs Done
8,202,454 UART: [art] Lock RT PCRs Done
8,203,833 UART: [art] Populate DV Done
8,212,036 UART: [fht] FMC Alias Private Key: 7
8,213,178 UART: [art] Derive CDI
8,213,458 UART: [art] Store in in slot 0x4
8,299,065 UART: [art] Derive Key Pair
8,299,425 UART: [art] Store priv key in slot 0x5
8,312,907 UART: [art] Derive Key Pair - Done
8,327,837 UART: [art] Signing Cert with AUTHO
8,328,317 UART: RITY.KEYID = 7
8,343,835 UART: [art] Erasing AUTHORITY.KEYID = 7
8,344,600 UART: [art] PUB.X = 96F1915397D41CD0687091FA74BA65F19F632F570DA1FD92453B53701B4E419E21EBEFB4052290979BEA215C47CD7E48
8,351,364 UART: [art] PUB.Y = D71C1D800AE8FE2ADDAA2D4EB813ABF0255B2ACF75957EB30D0485E2666AC6402CC0C0F1DD1E69078368D15F6B5DBECD
8,358,326 UART: [art] SIG.R = 115633D8D2952AD7D581C1232481C3F8C87FE5C4193128DE8A3964BDED950329AC0106BEF7309CA25378982C28F0D441
8,365,083 UART: [art] SIG.S = 4FC6A95BE6F40E637BCD74970DBE87A916F7F880CEE4151CA1733B89AF7CEE1634D31163F30E63F8DDCF806D9EA8E682
8,388,675 UART: mbox::rt_entry...
8,389,047 UART: ____ _ _ _ ____ _____
8,389,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,390,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,391,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,392,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,392,935 UART: |_|
8,393,247 UART:
8,674,775 UART: [rt] Runtime listening for mailbox commands...
8,675,739 UART:
8,675,755 UART: Running Caliptra ROM ...
8,676,163 UART:
8,676,305 UART: [state] CFI Enabled
8,678,739 UART: [state] LifecycleState = Unprovisioned
8,679,394 UART: [state] DebugLocked = No
8,679,880 UART: [state] WD Timer not started. Device not locked for debugging
8,681,050 UART: [kat] SHA2-256
9,486,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,490,825 UART: [kat] ++
9,490,977 UART: [kat] sha1
9,495,309 UART: [kat] SHA2-256
9,497,249 UART: [kat] SHA2-384
9,500,204 UART: [kat] SHA2-512-ACC
9,502,104 UART: [kat] ECC-384
9,511,693 UART: [kat] HMAC-384Kdf
9,516,347 UART: [kat] LMS
9,764,675 UART: [kat] --
9,765,589 UART: [update-reset] ++
10,670,313 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,671,468 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,767,850 >>> mbox cmd response: success
10,767,850 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,767,985 UART: [update-reset] Copying MAN_2 To MAN_1
10,775,999 UART: [update-reset Success] --
10,776,902 UART: [state] Locking Datavault
10,777,794 UART: [state] Locking PCR0, PCR1 and PCR31
10,778,398 UART: [state] Locking ICCM
10,779,020 UART: [exit] Launching FMC @ 0x40000130
10,784,349 UART:
10,784,365 UART: Running Caliptra FMC ...
10,784,773 UART:
10,784,916 UART: [state] CFI Enabled
10,873,913 UART: [art] Extend RT PCRs Done
10,874,341 UART: [art] Lock RT PCRs Done
10,875,650 UART: [art] Populate DV Done
10,884,073 UART: [fht] FMC Alias Private Key: 7
10,885,041 UART: [art] Derive CDI
10,885,321 UART: [art] Store in in slot 0x4
10,970,864 UART: [art] Derive Key Pair
10,971,224 UART: [art] Store priv key in slot 0x5
10,984,946 UART: [art] Derive Key Pair - Done
10,999,414 UART: [art] Signing Cert with AUTHO
10,999,894 UART: RITY.KEYID = 7
11,015,140 UART: [art] Erasing AUTHORITY.KEYID = 7
11,015,905 UART: [art] PUB.X = E2A52E66CE83CB62B281F534A4928C54F676F7C360602B9309BF5D2C7B913F96759B4550B2E762271A9862D25F9BB529
11,022,668 UART: [art] PUB.Y = 8196B18B831C2F192E269AE0A60FFBA195B103F0667ADC251F9AA6012769FA8C6B2D0144DC1E0B09F83B93B926E3AA29
11,029,608 UART: [art] SIG.R = 524AC9D0656071A34E79950ABF6E2391AFC4903375D48D555350799773F105092E2EC87C60F68F2C916027465F428A26
11,036,355 UART: [art] SIG.S = FDCC01BCB7C7D7F059D72EEF197251D5DCE54CBB6E5F1C0C76C03F4448FFF62A0818BBD49B37E7FFCC50A3A7453379E4
11,059,753 UART: mbox::rt_entry...
11,060,125 UART: ____ _ _ _ ____ _____
11,060,909 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,061,709 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,062,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,063,245 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,064,013 UART: |_|
11,064,325 UART:
11,348,183 UART: [rt] Runtime listening for mailbox commands...
11,349,379 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 ready_for_fw is high
1,060,276 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,993 >>> mbox cmd response: success
2,164,993 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,226,923 UART:
2,226,939 UART: Running Caliptra FMC ...
2,227,347 UART:
2,227,490 UART: [state] CFI Enabled
2,238,321 UART: [fht] FMC Alias Private Key: 7
2,346,512 UART: [art] Extend RT PCRs Done
2,346,940 UART: [art] Lock RT PCRs Done
2,348,502 UART: [art] Populate DV Done
2,356,739 UART: [fht] FMC Alias Private Key: 7
2,357,751 UART: [art] Derive CDI
2,358,031 UART: [art] Store in in slot 0x4
2,443,426 UART: [art] Derive Key Pair
2,443,786 UART: [art] Store priv key in slot 0x5
2,456,764 UART: [art] Derive Key Pair - Done
2,471,535 UART: [art] Signing Cert with AUTHO
2,472,015 UART: RITY.KEYID = 7
2,487,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,568 UART: [art] PUB.X = D2CCDC6178757A985F3700099C195371058CCB5A282BAEBC8CCBE5924BF9A04F88ECE7965B458F50D02B79F3AE8E4766
2,495,320 UART: [art] PUB.Y = 3A9138BDD2D428A2065300121E6AF529D972B4E7049A29BA7DF57A829CEA1E86C4CA0B928456C30FBFA3A94816AC867A
2,502,244 UART: [art] SIG.R = A192F140095269A5A72F0FF3915B7420461F75C11A4EBED4A8599F285D26EEA152860198A43D4F2D86E14DA0202F4A24
2,509,003 UART: [art] SIG.S = CE0893FFD8B98290D02226BCB2DFA6400A544FD9BE1DCB7C2FB8BF1BD4230888A3E8F86B985F7065EDE0A9D39683E570
2,533,001 UART: mbox::rt_entry...
2,533,373 UART: ____ _ _ _ ____ _____
2,534,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,261 UART: |_|
2,537,573 UART:
2,643,876 UART: [rt] Runtime listening for mailbox commands...
2,645,063 >>> mbox cmd response data (48 bytes)
2,645,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,555 >>> mbox cmd response: success
5,082,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,096,271 UART:
5,096,287 UART: Running Caliptra FMC ...
5,096,695 UART:
5,096,838 UART: [state] CFI Enabled
5,185,949 UART: [art] Extend RT PCRs Done
5,186,377 UART: [art] Lock RT PCRs Done
5,187,934 UART: [art] Populate DV Done
5,196,035 UART: [fht] FMC Alias Private Key: 7
5,197,075 UART: [art] Derive CDI
5,197,355 UART: [art] Store in in slot 0x4
5,283,116 UART: [art] Derive Key Pair
5,283,476 UART: [art] Store priv key in slot 0x5
5,296,396 UART: [art] Derive Key Pair - Done
5,311,100 UART: [art] Signing Cert with AUTHO
5,311,580 UART: RITY.KEYID = 7
5,326,576 UART: [art] Erasing AUTHORITY.KEYID = 7
5,327,341 UART: [art] PUB.X = 1B953D711EC659837E9A45548C87A3D31A1801FCA3B3CFA02C290FC8310AAC641A5FDE32038525D27852C1E34850B60D
5,334,098 UART: [art] PUB.Y = 96BED22F53DFA0287C575968DA9C8B7090309280AA93911E24AD155DE9043A33FB11317EDD4E4DFB23B3457863AD477F
5,341,049 UART: [art] SIG.R = 138E9A586513D1B7633D502B78AC3B78CEF5E5B084116CD548534EBA4A5F5D5BB9B0564A0EDF035B3A54BA1C40B33CBA
5,347,827 UART: [art] SIG.S = 00F4C317B31D1EC3F122CEA9595799133C5AF4CFC60CB22F82621E93E718CF3EDA7D96454B5BF435DD2722E2014263F2
5,371,764 UART: Caliptra RT
5,372,109 UART: [state] CFI Enabled
5,655,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,799 UART: [rt]cmd =0x4d454153, len=108
5,707,494 >>> mbox cmd response data (12 bytes)
5,707,495 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,683,742 >>> mbox cmd response: success
7,683,742 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,697,060 UART:
7,697,076 UART: Running Caliptra FMC ...
7,697,484 UART:
7,697,627 UART: [state] CFI Enabled
7,786,692 UART: [art] Extend RT PCRs Done
7,787,120 UART: [art] Lock RT PCRs Done
7,788,481 UART: [art] Populate DV Done
7,796,790 UART: [fht] FMC Alias Private Key: 7
7,797,814 UART: [art] Derive CDI
7,798,094 UART: [art] Store in in slot 0x4
7,883,527 UART: [art] Derive Key Pair
7,883,887 UART: [art] Store priv key in slot 0x5
7,897,115 UART: [art] Derive Key Pair - Done
7,911,841 UART: [art] Signing Cert with AUTHO
7,912,321 UART: RITY.KEYID = 7
7,927,165 UART: [art] Erasing AUTHORITY.KEYID = 7
7,927,930 UART: [art] PUB.X = 716FA886DB5D934F5CEED8319D586DAFC2F13ACACCAB1EDA7DA04FBAD3B15DC2F657EF5579DFF7A3C01342C3A182B32C
7,934,732 UART: [art] PUB.Y = AE361C5C6BC40A9F3024996D467B54D1DB456A6D67E1E8161BA3C0B8887AE5F93D483425EEEC640384EE60E482C988E3
7,941,682 UART: [art] SIG.R = 0251311D595BEEF5D4B4C2F555ED761975F2DA89A4BEDC60C17C1F7A01B703F8142A7CDA0F0A0DE3233F93CAD7D0A7CA
7,948,454 UART: [art] SIG.S = 7985DFD15A29B7F98BB68266F28DB5CCB8740B1C10AEE3CC9669E9A305F4E105576382510DDB46C91323A30CDBF8BE3D
7,972,320 UART: mbox::rt_entry...
7,972,692 UART: ____ _ _ _ ____ _____
7,973,476 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,974,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,975,044 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,975,812 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,976,580 UART: |_|
7,976,892 UART:
8,255,464 UART: [rt] Runtime listening for mailbox commands...
10,232,906 >>> mbox cmd response: success
10,232,906 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,246,074 UART:
10,246,090 UART: Running Caliptra FMC ...
10,246,498 UART:
10,246,641 UART: [state] CFI Enabled
10,335,754 UART: [art] Extend RT PCRs Done
10,336,182 UART: [art] Lock RT PCRs Done
10,337,367 UART: [art] Populate DV Done
10,345,840 UART: [fht] FMC Alias Private Key: 7
10,346,948 UART: [art] Derive CDI
10,347,228 UART: [art] Store in in slot 0x4
10,433,159 UART: [art] Derive Key Pair
10,433,519 UART: [art] Store priv key in slot 0x5
10,446,313 UART: [art] Derive Key Pair - Done
10,461,199 UART: [art] Signing Cert with AUTHO
10,461,679 UART: RITY.KEYID = 7
10,477,203 UART: [art] Erasing AUTHORITY.KEYID = 7
10,477,968 UART: [art] PUB.X = EF6D295756634C2945B899FC4AF19E890BB0A73DDCD3D0DEA4E18EDC12B9451D1A98632605FDCB501CE7F5CB60297720
10,484,744 UART: [art] PUB.Y = EA448E3EA627B6F3303E822E010895F7E4258E50F085152099975DA3DA536735A68529A72DF0302B6835BB459F56B613
10,491,678 UART: [art] SIG.R = 05696039F772695A1E9D97EF91F789A86C734BF9052D6D844C841EAD3405A1346C28F60095ACF183A8A0C68F25DDDF6A
10,498,419 UART: [art] SIG.S = 25952CF074A7B4F33F1260ADE36ABB8B50E11692040FBC3DC05BAF2BD22B533E33126E6F8CDE2084D737C65752117AAE
10,521,868 UART: mbox::rt_entry...
10,522,240 UART: ____ _ _ _ ____ _____
10,523,024 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,523,824 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,524,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,525,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,526,128 UART: |_|
10,526,440 UART:
10,802,284 UART: [rt] Runtime listening for mailbox commands...
10,803,480 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.48s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,642 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,425 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,883 >>> mbox cmd response: success
2,311,883 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,312,928 UART: [afmc] ++
2,313,096 UART: [afmc] CDI.KEYID = 6
2,313,459 UART: [afmc] SUBJECT.KEYID = 7
2,313,885 UART: [afmc] AUTHORITY.KEYID = 5
2,349,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,773 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,492 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,303 UART: [afmc] --
2,393,417 UART: [cold-reset] --
2,394,119 UART: [state] Locking Datavault
2,395,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,840 UART: [state] Locking ICCM
2,396,504 UART: [exit] Launching FMC @ 0x40000130
2,401,833 UART:
2,401,849 UART: Running Caliptra FMC ...
2,402,257 UART:
2,402,311 UART: [state] CFI Enabled
2,412,736 UART: [fht] FMC Alias Private Key: 7
2,520,685 UART: [art] Extend RT PCRs Done
2,521,113 UART: [art] Lock RT PCRs Done
2,522,705 UART: [art] Populate DV Done
2,531,046 UART: [fht] FMC Alias Private Key: 7
2,532,140 UART: [art] Derive CDI
2,532,420 UART: [art] Store in in slot 0x4
2,617,715 UART: [art] Derive Key Pair
2,618,075 UART: [art] Store priv key in slot 0x5
2,631,331 UART: [art] Derive Key Pair - Done
2,646,201 UART: [art] Signing Cert with AUTHO
2,646,681 UART: RITY.KEYID = 7
2,661,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,638 UART: [art] PUB.X = E9FA77A2CD105B5C5B3509081303BD3639088661C667CC6AA0AC50A07C21738F75A23AAE674607D84B63B27E49C80E74
2,669,390 UART: [art] PUB.Y = 281BAF077027B1540548EC67684F19444EB1CF7B75138C94802EB6E34EFD41FB3AAB37540CD615E9183B383F36F5E9F3
2,676,333 UART: [art] SIG.R = 52E05F42F90F24F6DAE8271E41B685870FF1D9C3A31ED0A684495D7849F734FBDBF645F62FD63452ACD57E46A8F3AD1A
2,683,109 UART: [art] SIG.S = B9A45201582DFBAA8CE85324BD30B8980FEA8070B8ACF7EEE43E82B6B73C41B3A18481A31C15C8D93FD051B6E6C0B258
2,707,318 UART: mbox::rt_entry...
2,707,690 UART: ____ _ _ _ ____ _____
2,708,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,274 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,042 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,810 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,578 UART: |_|
2,711,890 UART:
2,819,474 UART: [rt] Runtime listening for mailbox commands...
2,820,661 >>> mbox cmd response data (48 bytes)
2,820,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,820,773 UART:
2,820,789 UART: Running Caliptra ROM ...
2,821,197 UART:
2,821,252 UART: [state] CFI Enabled
2,823,962 UART: [state] LifecycleState = Unprovisioned
2,824,617 UART: [state] DebugLocked = No
2,825,253 UART: [state] WD Timer not started. Device not locked for debugging
2,826,509 UART: [kat] SHA2-256
3,630,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,188 UART: [kat] ++
3,634,340 UART: [kat] sha1
3,638,596 UART: [kat] SHA2-256
3,640,536 UART: [kat] SHA2-384
3,643,359 UART: [kat] SHA2-512-ACC
3,645,259 UART: [kat] ECC-384
3,655,024 UART: [kat] HMAC-384Kdf
3,659,646 UART: [kat] LMS
3,907,958 UART: [kat] --
3,908,762 UART: [update-reset] ++
5,221,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,158 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,982 >>> mbox cmd response: success
5,371,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,372,223 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,237 UART: [update-reset Success] --
5,381,228 UART: [state] Locking Datavault
5,382,064 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,668 UART: [state] Locking ICCM
5,383,266 UART: [exit] Launching FMC @ 0x40000130
5,388,595 UART:
5,388,611 UART: Running Caliptra FMC ...
5,389,019 UART:
5,389,073 UART: [state] CFI Enabled
5,477,890 UART: [art] Extend RT PCRs Done
5,478,318 UART: [art] Lock RT PCRs Done
5,479,857 UART: [art] Populate DV Done
5,488,166 UART: [fht] FMC Alias Private Key: 7
5,489,314 UART: [art] Derive CDI
5,489,594 UART: [art] Store in in slot 0x4
5,575,179 UART: [art] Derive Key Pair
5,575,539 UART: [art] Store priv key in slot 0x5
5,588,635 UART: [art] Derive Key Pair - Done
5,603,817 UART: [art] Signing Cert with AUTHO
5,604,297 UART: RITY.KEYID = 7
5,619,621 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,386 UART: [art] PUB.X = B159E2D30DAB209E7ABC195F05DCE6CFA6011501C12C6A1815093B032E7D65C4407C061E6712ECC24442B8AEF6DA9048
5,627,143 UART: [art] PUB.Y = DBB65A40D05123866122BDE934CC3A715079B775C71934B73449B4F224075892D8E932D83E18E2C4DA7635AB308583BD
5,634,084 UART: [art] SIG.R = 1E1A805AA14DD2984B2E0E7556A008225F2B270510D5D590FCA245450C5FEA6D856D2A3D0B1B15478D730BFB58D5F5BF
5,640,844 UART: [art] SIG.S = BF838C6A7F630131B69AB343602E7E33836FD0A8F58BBE896A2FBD44112D73ED215AE14290A8023C8EAF74C40C201449
5,664,740 UART: Caliptra RT
5,664,993 UART: [state] CFI Enabled
5,945,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,668 UART: [rt]cmd =0x4d454153, len=108
5,997,481 >>> mbox cmd response data (12 bytes)
5,997,482 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,417 UART:
5,998,433 UART: Running Caliptra ROM ...
5,998,841 UART:
5,998,896 UART: [state] CFI Enabled
6,001,606 UART: [state] LifecycleState = Unprovisioned
6,002,261 UART: [state] DebugLocked = No
6,002,841 UART: [state] WD Timer not started. Device not locked for debugging
6,004,107 UART: [kat] SHA2-256
6,807,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,811,786 UART: [kat] ++
6,811,938 UART: [kat] sha1
6,816,044 UART: [kat] SHA2-256
6,817,984 UART: [kat] SHA2-384
6,820,749 UART: [kat] SHA2-512-ACC
6,822,649 UART: [kat] ECC-384
6,832,656 UART: [kat] HMAC-384Kdf
6,837,226 UART: [kat] LMS
7,085,538 UART: [kat] --
7,086,532 UART: [update-reset] ++
7,991,285 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,992,428 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,088,810 >>> mbox cmd response: success
8,088,810 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,089,157 UART: [update-reset] Copying MAN_2 To MAN_1
8,097,171 UART: [update-reset Success] --
8,098,200 UART: [state] Locking Datavault
8,098,926 UART: [state] Locking PCR0, PCR1 and PCR31
8,099,530 UART: [state] Locking ICCM
8,100,054 UART: [exit] Launching FMC @ 0x40000130
8,105,383 UART:
8,105,399 UART: Running Caliptra FMC ...
8,105,807 UART:
8,105,861 UART: [state] CFI Enabled
8,195,022 UART: [art] Extend RT PCRs Done
8,195,450 UART: [art] Lock RT PCRs Done
8,196,563 UART: [art] Populate DV Done
8,204,598 UART: [fht] FMC Alias Private Key: 7
8,205,584 UART: [art] Derive CDI
8,205,864 UART: [art] Store in in slot 0x4
8,291,579 UART: [art] Derive Key Pair
8,291,939 UART: [art] Store priv key in slot 0x5
8,305,125 UART: [art] Derive Key Pair - Done
8,319,787 UART: [art] Signing Cert with AUTHO
8,320,267 UART: RITY.KEYID = 7
8,335,683 UART: [art] Erasing AUTHORITY.KEYID = 7
8,336,448 UART: [art] PUB.X = 6F9333D818245E140F654BFC67DDC14A189EF322CD072F0CCC20AF53D2CCDB2BCA7C5F46AE398741F5C14513CACE0E81
8,343,224 UART: [art] PUB.Y = 499EA366DC3D687FF1E67E0FA7294DA5B83DCE89BA599D1A95EFEB6AA678CCB44BAB420EF9F4C9C4C9E095C18FD2C1F9
8,350,196 UART: [art] SIG.R = D8CACD69D87BA09744FB3C053E91CF4696D9DE7495A6EE7904E0E41A92599C515E0009366B954870C9A06F96F32E2D13
8,356,937 UART: [art] SIG.S = 5FEC60F6EF9D537A9FBBBA4FDAA31879921356285D4DA48701B40BAF0A2BA155FBE7A73C3C3D386B195803B0D92ACBF9
8,380,396 UART: mbox::rt_entry...
8,380,768 UART: ____ _ _ _ ____ _____
8,381,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,382,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,383,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,383,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,384,656 UART: |_|
8,384,968 UART:
8,662,094 UART: [rt] Runtime listening for mailbox commands...
8,663,058 UART:
8,663,074 UART: Running Caliptra ROM ...
8,663,482 UART:
8,663,537 UART: [state] CFI Enabled
8,666,073 UART: [state] LifecycleState = Unprovisioned
8,666,728 UART: [state] DebugLocked = No
8,667,426 UART: [state] WD Timer not started. Device not locked for debugging
8,668,662 UART: [kat] SHA2-256
9,472,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,476,341 UART: [kat] ++
9,476,493 UART: [kat] sha1
9,480,687 UART: [kat] SHA2-256
9,482,627 UART: [kat] SHA2-384
9,485,340 UART: [kat] SHA2-512-ACC
9,487,240 UART: [kat] ECC-384
9,496,919 UART: [kat] HMAC-384Kdf
9,501,479 UART: [kat] LMS
9,749,791 UART: [kat] --
9,750,887 UART: [update-reset] ++
10,655,510 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,656,723 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,753,105 >>> mbox cmd response: success
10,753,105 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,753,372 UART: [update-reset] Copying MAN_2 To MAN_1
10,761,386 UART: [update-reset Success] --
10,762,237 UART: [state] Locking Datavault
10,762,933 UART: [state] Locking PCR0, PCR1 and PCR31
10,763,537 UART: [state] Locking ICCM
10,764,031 UART: [exit] Launching FMC @ 0x40000130
10,769,360 UART:
10,769,376 UART: Running Caliptra FMC ...
10,769,784 UART:
10,769,838 UART: [state] CFI Enabled
10,858,685 UART: [art] Extend RT PCRs Done
10,859,113 UART: [art] Lock RT PCRs Done
10,860,510 UART: [art] Populate DV Done
10,868,989 UART: [fht] FMC Alias Private Key: 7
10,870,087 UART: [art] Derive CDI
10,870,367 UART: [art] Store in in slot 0x4
10,956,412 UART: [art] Derive Key Pair
10,956,772 UART: [art] Store priv key in slot 0x5
10,969,912 UART: [art] Derive Key Pair - Done
10,984,426 UART: [art] Signing Cert with AUTHO
10,984,906 UART: RITY.KEYID = 7
10,999,886 UART: [art] Erasing AUTHORITY.KEYID = 7
11,000,651 UART: [art] PUB.X = 77C802098654FC0C641CB86337740E11F5AB9DB38AB21DAC1065ECA39E6A1782373B7394EA93203270E6E489E2B5AACB
11,007,413 UART: [art] PUB.Y = 1F498B2997E2C841CEFF2069D7C2F7F5F5B7544F23E9370CE82A975F344B715CF8B75DE5F473B05451DC1A8BACDF4903
11,014,367 UART: [art] SIG.R = FDE0D4C4819629DCA1F5E67922CF73274009A5766F9659323C890C3C5D3C52FEF6A12CD7F964E61A79C52828E7B4C95A
11,021,135 UART: [art] SIG.S = 51F3A8BA7202885C41169BD6043C9D5CA3E22C804C632E6DA21E95E9161A59D9D8F4DBFC6436DDEAA440FB10C4B93B7A
11,044,590 UART: mbox::rt_entry...
11,044,962 UART: ____ _ _ _ ____ _____
11,045,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,046,546 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,047,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,048,082 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,048,850 UART: |_|
11,049,162 UART:
11,329,162 UART: [rt] Runtime listening for mailbox commands...
11,330,358 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 ready_for_fw is high
1,055,964 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,363 >>> mbox cmd response: success
2,159,363 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,221,215 UART:
2,221,231 UART: Running Caliptra FMC ...
2,221,639 UART:
2,221,693 UART: [state] CFI Enabled
2,232,016 UART: [fht] FMC Alias Private Key: 7
2,339,675 UART: [art] Extend RT PCRs Done
2,340,103 UART: [art] Lock RT PCRs Done
2,341,533 UART: [art] Populate DV Done
2,349,756 UART: [fht] FMC Alias Private Key: 7
2,350,858 UART: [art] Derive CDI
2,351,138 UART: [art] Store in in slot 0x4
2,436,709 UART: [art] Derive Key Pair
2,437,069 UART: [art] Store priv key in slot 0x5
2,450,575 UART: [art] Derive Key Pair - Done
2,465,446 UART: [art] Signing Cert with AUTHO
2,465,926 UART: RITY.KEYID = 7
2,481,260 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,025 UART: [art] PUB.X = 409B776AD1395414253581758AC18BBEC1FDB824278D229D2AA81F297C56E38599BFCB26BD82FFDEAF1E43AD4C61CEC6
2,488,809 UART: [art] PUB.Y = 32432424ED37B3460CDB0E0989D613B8F75FAEC8D773A262ED8B27E0ADF15CC84C4E831B91D0A84A9EAB40E36A886566
2,495,760 UART: [art] SIG.R = 589DB8219D7761DF079CB4CD801F006FF43CA3D6B78F7874FEB87507A63A77E473EDA17142D55448BC6D50A7024D7ABF
2,502,507 UART: [art] SIG.S = 069DA6D87BFD09FE4FEC12E5116E25FA36DC7F9F0A94286E0E0D38571B4B5C56D420AC3BFD49CD99AF17E7FF8A306F91
2,525,753 UART: mbox::rt_entry...
2,526,125 UART: ____ _ _ _ ____ _____
2,526,909 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,709 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,245 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,013 UART: |_|
2,530,325 UART:
2,637,555 UART: [rt] Runtime listening for mailbox commands...
2,638,742 >>> mbox cmd response data (48 bytes)
2,638,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,070,884 >>> mbox cmd response: success
5,070,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,084,304 UART:
5,084,320 UART: Running Caliptra FMC ...
5,084,728 UART:
5,084,782 UART: [state] CFI Enabled
5,173,957 UART: [art] Extend RT PCRs Done
5,174,385 UART: [art] Lock RT PCRs Done
5,175,758 UART: [art] Populate DV Done
5,183,963 UART: [fht] FMC Alias Private Key: 7
5,185,097 UART: [art] Derive CDI
5,185,377 UART: [art] Store in in slot 0x4
5,271,206 UART: [art] Derive Key Pair
5,271,566 UART: [art] Store priv key in slot 0x5
5,284,506 UART: [art] Derive Key Pair - Done
5,299,450 UART: [art] Signing Cert with AUTHO
5,299,930 UART: RITY.KEYID = 7
5,315,220 UART: [art] Erasing AUTHORITY.KEYID = 7
5,315,985 UART: [art] PUB.X = 3AEADB10A5A60F12E83B468737D8709352E69996C4DC0A77DF8838AC1D9FFAB07E414C3F85D3E23085F6338194B81784
5,322,751 UART: [art] PUB.Y = DF15037C83A65D091CE7068947D28BABD2F553519E6CE3010C2C4E9C4A930345AED2C078C120A2B4C90F0309D076BAFC
5,329,682 UART: [art] SIG.R = 9C72CD5D2F71F19C0526D527D0BD9A64CF6AACDD31AFA07A4DCA9DDD3060B2C972D3EBA6025EB3BAD2E96DDDD5DF534C
5,336,480 UART: [art] SIG.S = B589790699A22D96A89A8067594549C265FB5B7BD32D877C6AC1DFF8062E64DECCDAC6EC4A9AB7A52C7E4335160080BF
5,360,967 UART: Caliptra RT
5,361,220 UART: [state] CFI Enabled
5,645,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,242 UART: [rt]cmd =0x4d454153, len=108
5,696,837 >>> mbox cmd response data (12 bytes)
5,696,838 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,670,335 >>> mbox cmd response: success
7,670,335 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,683,999 UART:
7,684,015 UART: Running Caliptra FMC ...
7,684,423 UART:
7,684,477 UART: [state] CFI Enabled
7,773,450 UART: [art] Extend RT PCRs Done
7,773,878 UART: [art] Lock RT PCRs Done
7,775,101 UART: [art] Populate DV Done
7,783,054 UART: [fht] FMC Alias Private Key: 7
7,784,150 UART: [art] Derive CDI
7,784,430 UART: [art] Store in in slot 0x4
7,869,905 UART: [art] Derive Key Pair
7,870,265 UART: [art] Store priv key in slot 0x5
7,883,461 UART: [art] Derive Key Pair - Done
7,898,351 UART: [art] Signing Cert with AUTHO
7,898,831 UART: RITY.KEYID = 7
7,914,489 UART: [art] Erasing AUTHORITY.KEYID = 7
7,915,254 UART: [art] PUB.X = FA76D92CBFDE3575B8BADB1741E57CDB82E1E79BA948609146DDCE5C449A3FAE8D34B606783B0332AC9884EE5BED0564
7,922,033 UART: [art] PUB.Y = 53621703CDB62F6490352E557DEEB1BE043E6C071CD1F5CF83790B2A203CFB8D2DBE0F14A598CD07588C718A8425185E
7,928,971 UART: [art] SIG.R = 781A8485C8C8341C2C67A94E7A1C80FB58A9994EB7A00B0A5EBEA25581E5F53CE81980FEAC60A49BF0F6BB6B7303E0F4
7,935,746 UART: [art] SIG.S = A4FD6DC55E27ECEF10089D60C56000CEBEA0853E9AE0312AF5CB22E5817D607AA65E7756198B4AE442ECF0E24794A9A1
7,959,470 UART: mbox::rt_entry...
7,959,842 UART: ____ _ _ _ ____ _____
7,960,626 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,961,426 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,962,194 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,962,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,963,730 UART: |_|
7,964,042 UART:
8,246,988 UART: [rt] Runtime listening for mailbox commands...
10,219,036 >>> mbox cmd response: success
10,219,036 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,232,432 UART:
10,232,448 UART: Running Caliptra FMC ...
10,232,856 UART:
10,232,910 UART: [state] CFI Enabled
10,322,175 UART: [art] Extend RT PCRs Done
10,322,603 UART: [art] Lock RT PCRs Done
10,324,190 UART: [art] Populate DV Done
10,332,513 UART: [fht] FMC Alias Private Key: 7
10,333,631 UART: [art] Derive CDI
10,333,911 UART: [art] Store in in slot 0x4
10,419,586 UART: [art] Derive Key Pair
10,419,946 UART: [art] Store priv key in slot 0x5
10,432,946 UART: [art] Derive Key Pair - Done
10,448,051 UART: [art] Signing Cert with AUTHO
10,448,531 UART: RITY.KEYID = 7
10,463,765 UART: [art] Erasing AUTHORITY.KEYID = 7
10,464,530 UART: [art] PUB.X = E18C8D552205A7DCE69CC4E97075B7DB693411FBD601D27CCC64835DE8B27F0D08826F4C80390B302A641D4A9FBF5F6D
10,471,295 UART: [art] PUB.Y = 2215E8DB2C4FE04434CB9F61C0F3CDC66D4C8BC59DDBF8CFAE3E7F80E2EA8B0D4756E6E4C2F2F5F7102AE038CDB7E4AC
10,478,274 UART: [art] SIG.R = EA07EABE2FE4936489AA08A08558B438A4C5DBCCB9BFA8D7CBE03097678FD8CBC53DD8B84121C91798D6B50C6E91FBEA
10,485,059 UART: [art] SIG.S = 1155175140E24DA90586C5CAB8271826213C6652C82AA3ACB8B69A8A4112D9CDDFE4B82B1561D58058E61B835110E28D
10,508,375 UART: mbox::rt_entry...
10,508,747 UART: ____ _ _ _ ____ _____
10,509,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,510,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,511,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,511,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,512,635 UART: |_|
10,512,947 UART:
10,792,767 UART: [rt] Runtime listening for mailbox commands...
10,793,963 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.34s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,210 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,570 >>> mbox cmd response: success
2,310,570 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,721 UART: [afmc] ++
2,311,889 UART: [afmc] CDI.KEYID = 6
2,312,252 UART: [afmc] SUBJECT.KEYID = 7
2,312,678 UART: [afmc] AUTHORITY.KEYID = 5
2,348,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,030 UART: [afmc] --
2,392,144 UART: [cold-reset] --
2,392,790 UART: [state] Locking Datavault
2,393,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,219 UART: [state] Locking ICCM
2,394,755 UART: [exit] Launching FMC @ 0x40000130
2,400,084 UART:
2,400,100 UART: Running Caliptra FMC ...
2,400,508 UART:
2,400,651 UART: [state] CFI Enabled
2,411,136 UART: [fht] FMC Alias Private Key: 7
2,518,607 UART: [art] Extend RT PCRs Done
2,519,035 UART: [art] Lock RT PCRs Done
2,520,749 UART: [art] Populate DV Done
2,528,846 UART: [fht] FMC Alias Private Key: 7
2,529,804 UART: [art] Derive CDI
2,530,084 UART: [art] Store in in slot 0x4
2,615,771 UART: [art] Derive Key Pair
2,616,131 UART: [art] Store priv key in slot 0x5
2,629,595 UART: [art] Derive Key Pair - Done
2,644,445 UART: [art] Signing Cert with AUTHO
2,644,925 UART: RITY.KEYID = 7
2,659,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,182 UART: [art] PUB.X = FEF55DE5D4A49F2D68A12D56F7DFB115EA3667CA57D9019F6664FB8507F0BC4E8C4D25D16C4D1ECF143880AEB5A38A2D
2,666,966 UART: [art] PUB.Y = 960F7C94F4CB03A821DF9378C6FFA40E44331853BE936B3D41A37B767C77EB90F4C27C2DDB22E9301D9DA61B9E9C83D1
2,673,917 UART: [art] SIG.R = 0ABE826BD8224E7B80B8A3DEC80B1DA16FAF2623BFF15F3B8E5813AD3CDEF8B4D42C3EB26E86D92F4DEA6F3BEE565B64
2,680,711 UART: [art] SIG.S = 09109D05CE8BA257ABB129547CF362F334CF0ABF741459588FF446162CC499F3017422AFA684F88FC10DABB29A5122A3
2,703,741 UART: mbox::rt_entry...
2,704,113 UART: ____ _ _ _ ____ _____
2,704,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,001 UART: |_|
2,708,313 UART:
2,813,883 UART: [rt] Runtime listening for mailbox commands...
2,815,070 >>> mbox cmd response data (48 bytes)
2,815,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,815,182 UART:
2,815,198 UART: Running Caliptra ROM ...
2,815,606 UART:
2,815,748 UART: [state] CFI Enabled
2,818,374 UART: [state] LifecycleState = Unprovisioned
2,819,029 UART: [state] DebugLocked = No
2,819,527 UART: [state] WD Timer not started. Device not locked for debugging
2,820,785 UART: [kat] SHA2-256
3,624,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,628,464 UART: [kat] ++
3,628,616 UART: [kat] sha1
3,633,022 UART: [kat] SHA2-256
3,634,962 UART: [kat] SHA2-384
3,637,519 UART: [kat] SHA2-512-ACC
3,639,419 UART: [kat] ECC-384
3,648,998 UART: [kat] HMAC-384Kdf
3,653,840 UART: [kat] LMS
3,902,152 UART: [kat] --
3,903,306 UART: [update-reset] ++
5,216,259 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,217,282 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,367,106 >>> mbox cmd response: success
5,367,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,367,291 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,305 UART: [update-reset Success] --
5,376,292 UART: [state] Locking Datavault
5,377,110 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,714 UART: [state] Locking ICCM
5,378,198 UART: [exit] Launching FMC @ 0x40000130
5,383,527 UART:
5,383,543 UART: Running Caliptra FMC ...
5,383,951 UART:
5,384,094 UART: [state] CFI Enabled
5,473,459 UART: [art] Extend RT PCRs Done
5,473,887 UART: [art] Lock RT PCRs Done
5,475,316 UART: [art] Populate DV Done
5,483,627 UART: [fht] FMC Alias Private Key: 7
5,484,565 UART: [art] Derive CDI
5,484,845 UART: [art] Store in in slot 0x4
5,570,698 UART: [art] Derive Key Pair
5,571,058 UART: [art] Store priv key in slot 0x5
5,584,040 UART: [art] Derive Key Pair - Done
5,598,771 UART: [art] Signing Cert with AUTHO
5,599,251 UART: RITY.KEYID = 7
5,614,455 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,220 UART: [art] PUB.X = AF8C71EF09A515C7C3BF55090330A36C95B19F169DAC1D74EAF4429930A14BBF37B83F0A49B058D4BE482E5E7B8E756B
5,621,990 UART: [art] PUB.Y = 9AA465AE6C4BD955B9FC389D92D28E6849A24F88D1BDE2107A8D0891871C1B9DDB01EB828F38F112BC8995493CC32B40
5,628,942 UART: [art] SIG.R = 49D99223102C2E54CC3B89BDAC98D607851287D5E1DE1EFA60637B992556DE7A421E17F2ED7175371FC9D68FB28B5211
5,635,711 UART: [art] SIG.S = C655A2C2EAAD2FBC2F35943C246F9B013B0DAE422FCF106618369C7ADD4BD3AC35BFCC6148DC995807CAF716CCAA4E1F
5,659,879 UART: Caliptra RT
5,660,224 UART: [state] CFI Enabled
5,944,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,053 UART: [rt]cmd =0x4d454153, len=108
5,996,942 >>> mbox cmd response data (12 bytes)
5,996,943 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,954 UART:
5,997,970 UART: Running Caliptra ROM ...
5,998,378 UART:
5,998,520 UART: [state] CFI Enabled
6,001,432 UART: [state] LifecycleState = Unprovisioned
6,002,087 UART: [state] DebugLocked = No
6,002,737 UART: [state] WD Timer not started. Device not locked for debugging
6,003,879 UART: [kat] SHA2-256
6,807,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,811,558 UART: [kat] ++
6,811,710 UART: [kat] sha1
6,815,796 UART: [kat] SHA2-256
6,817,736 UART: [kat] SHA2-384
6,820,237 UART: [kat] SHA2-512-ACC
6,822,137 UART: [kat] ECC-384
6,831,742 UART: [kat] HMAC-384Kdf
6,836,340 UART: [kat] LMS
7,084,652 UART: [kat] --
7,085,486 UART: [update-reset] ++
7,990,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,992,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,088,382 >>> mbox cmd response: success
8,088,382 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,088,655 UART: [update-reset] Copying MAN_2 To MAN_1
8,096,669 UART: [update-reset Success] --
8,097,668 UART: [state] Locking Datavault
8,098,624 UART: [state] Locking PCR0, PCR1 and PCR31
8,099,228 UART: [state] Locking ICCM
8,099,694 UART: [exit] Launching FMC @ 0x40000130
8,105,023 UART:
8,105,039 UART: Running Caliptra FMC ...
8,105,447 UART:
8,105,590 UART: [state] CFI Enabled
8,194,687 UART: [art] Extend RT PCRs Done
8,195,115 UART: [art] Lock RT PCRs Done
8,196,286 UART: [art] Populate DV Done
8,204,415 UART: [fht] FMC Alias Private Key: 7
8,205,455 UART: [art] Derive CDI
8,205,735 UART: [art] Store in in slot 0x4
8,291,656 UART: [art] Derive Key Pair
8,292,016 UART: [art] Store priv key in slot 0x5
8,305,726 UART: [art] Derive Key Pair - Done
8,320,682 UART: [art] Signing Cert with AUTHO
8,321,162 UART: RITY.KEYID = 7
8,336,576 UART: [art] Erasing AUTHORITY.KEYID = 7
8,337,341 UART: [art] PUB.X = 580BAEC5CAF8739123065E417BE38032BD3A9A33B02278179C1B8B846418041C6AADAE18E7673EC541A38846F139A40C
8,344,099 UART: [art] PUB.Y = E94D091284F12D33FC7D2ED1A425D28AA83DB42FC9A5FCE5A842186E380AD34DCBD01CE151063926D0940C11586541D9
8,351,043 UART: [art] SIG.R = 569C5E2195971465889F3843684CDCC98138EB4D815035361C25B08CAE3486BF1D5E6CBB7EF8ED20BA7AC0DC7BDB5859
8,357,821 UART: [art] SIG.S = A491387D1432696BA013BFE860038ECCF3E7BBD71526D41226D373928D9D19C3425D1CB2079F079EA06B51F61D96CC84
8,382,049 UART: mbox::rt_entry...
8,382,421 UART: ____ _ _ _ ____ _____
8,383,205 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,384,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,384,773 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,385,541 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,386,309 UART: |_|
8,386,621 UART:
8,662,687 UART: [rt] Runtime listening for mailbox commands...
8,663,651 UART:
8,663,667 UART: Running Caliptra ROM ...
8,664,075 UART:
8,664,217 UART: [state] CFI Enabled
8,667,101 UART: [state] LifecycleState = Unprovisioned
8,667,756 UART: [state] DebugLocked = No
8,668,256 UART: [state] WD Timer not started. Device not locked for debugging
8,669,568 UART: [kat] SHA2-256
9,473,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,477,247 UART: [kat] ++
9,477,399 UART: [kat] sha1
9,481,557 UART: [kat] SHA2-256
9,483,497 UART: [kat] SHA2-384
9,486,346 UART: [kat] SHA2-512-ACC
9,488,246 UART: [kat] ECC-384
9,498,089 UART: [kat] HMAC-384Kdf
9,502,649 UART: [kat] LMS
9,750,961 UART: [kat] --
9,751,789 UART: [update-reset] ++
10,655,580 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,656,719 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,753,101 >>> mbox cmd response: success
10,753,101 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,753,316 UART: [update-reset] Copying MAN_2 To MAN_1
10,761,330 UART: [update-reset Success] --
10,762,177 UART: [state] Locking Datavault
10,762,991 UART: [state] Locking PCR0, PCR1 and PCR31
10,763,595 UART: [state] Locking ICCM
10,764,031 UART: [exit] Launching FMC @ 0x40000130
10,769,360 UART:
10,769,376 UART: Running Caliptra FMC ...
10,769,784 UART:
10,769,927 UART: [state] CFI Enabled
10,859,130 UART: [art] Extend RT PCRs Done
10,859,558 UART: [art] Lock RT PCRs Done
10,860,739 UART: [art] Populate DV Done
10,868,906 UART: [fht] FMC Alias Private Key: 7
10,870,040 UART: [art] Derive CDI
10,870,320 UART: [art] Store in in slot 0x4
10,956,013 UART: [art] Derive Key Pair
10,956,373 UART: [art] Store priv key in slot 0x5
10,969,523 UART: [art] Derive Key Pair - Done
10,984,611 UART: [art] Signing Cert with AUTHO
10,985,091 UART: RITY.KEYID = 7
11,000,575 UART: [art] Erasing AUTHORITY.KEYID = 7
11,001,340 UART: [art] PUB.X = 65F973F8EC579A5F55F83B4A33874D677DF0BF9480392268C5C6C59155721B31E2CEB810702C03DB6C23B517C376883A
11,008,103 UART: [art] PUB.Y = 8F8E3F9A138082DE6F9B41D5919106419ACAE7FAFFC9001DE12D3E3EF1EF3EE29AAB8DA1FAF10BCE1B0AE51656F2BA78
11,015,050 UART: [art] SIG.R = F4B2635F56245AA6C7DD83FD7B23F18172FE9ADF8D7728BA42E861B72A2982A92FC7136FBCCBD67750AF99B01AF6C10A
11,021,833 UART: [art] SIG.S = 29EF55C4E38F5C6800FB45BA6B3258B5077FB65629CEBFA86CD3696714EB7BE7C4682C4FFA199463662138B9B933605E
11,045,943 UART: mbox::rt_entry...
11,046,315 UART: ____ _ _ _ ____ _____
11,047,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,047,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,048,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,049,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,050,203 UART: |_|
11,050,515 UART:
11,333,317 UART: [rt] Runtime listening for mailbox commands...
11,334,513 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,833 ready_for_fw is high
1,056,833 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,218 >>> mbox cmd response: success
2,163,218 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,225,674 UART:
2,225,690 UART: Running Caliptra FMC ...
2,226,098 UART:
2,226,241 UART: [state] CFI Enabled
2,236,872 UART: [fht] FMC Alias Private Key: 7
2,344,529 UART: [art] Extend RT PCRs Done
2,344,957 UART: [art] Lock RT PCRs Done
2,346,179 UART: [art] Populate DV Done
2,354,188 UART: [fht] FMC Alias Private Key: 7
2,355,188 UART: [art] Derive CDI
2,355,468 UART: [art] Store in in slot 0x4
2,441,287 UART: [art] Derive Key Pair
2,441,647 UART: [art] Store priv key in slot 0x5
2,454,713 UART: [art] Derive Key Pair - Done
2,469,521 UART: [art] Signing Cert with AUTHO
2,470,001 UART: RITY.KEYID = 7
2,485,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,064 UART: [art] PUB.X = FD811AE8D81E46AABDE59AF0A17D710CC9E2D9BF568C907C2BC25BE47478900B3689B6BE93171334042D39587625674A
2,492,829 UART: [art] PUB.Y = D0A1C2197F092C00237E8F95E08F7B7563E02FEE0C680616086FD51862E314DFD0AC2D84C3AC71BB74E9DB568981A892
2,499,749 UART: [art] SIG.R = 4BB1967FDA799C6539046220D6A45C98AD161DD0A6B2AF31FBC6F8F56F60C7257AC05C196AA330799C958775EA69E0A6
2,506,522 UART: [art] SIG.S = 75A26CA3CFB55B1764CE79EFC018240A0675CC8497D6711B2410C846A32BB0C05D3C98691DADD5600DB1D17B8620BB16
2,530,852 UART: mbox::rt_entry...
2,531,224 UART: ____ _ _ _ ____ _____
2,532,008 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,808 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,576 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,112 UART: |_|
2,535,424 UART:
2,641,300 UART: [rt] Runtime listening for mailbox commands...
2,642,487 >>> mbox cmd response data (48 bytes)
2,642,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,075,622 >>> mbox cmd response: success
5,075,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,088,952 UART:
5,088,968 UART: Running Caliptra FMC ...
5,089,376 UART:
5,089,519 UART: [state] CFI Enabled
5,178,078 UART: [art] Extend RT PCRs Done
5,178,506 UART: [art] Lock RT PCRs Done
5,179,581 UART: [art] Populate DV Done
5,187,760 UART: [fht] FMC Alias Private Key: 7
5,188,860 UART: [art] Derive CDI
5,189,140 UART: [art] Store in in slot 0x4
5,274,941 UART: [art] Derive Key Pair
5,275,301 UART: [art] Store priv key in slot 0x5
5,289,063 UART: [art] Derive Key Pair - Done
5,303,702 UART: [art] Signing Cert with AUTHO
5,304,182 UART: RITY.KEYID = 7
5,319,248 UART: [art] Erasing AUTHORITY.KEYID = 7
5,320,013 UART: [art] PUB.X = 4031FA820AF172792E50C9407442D011480F03DA9EB87456BEA438FA11100D881C5152CF25A9F59741A3355EBB589807
5,326,760 UART: [art] PUB.Y = 31D719C4FA056D53288136F5C560789046A1E962A449662D36576EBA8EB130FF32B54CAF609820FDACEA9F1CFAB0FCE4
5,333,717 UART: [art] SIG.R = FF4C109D910EF5371FAB95413F2658C719350D439306A7A4684C860BE0831694ADF91172F0B6BB4D9B018FC9F6B7963A
5,340,472 UART: [art] SIG.S = C7D5BF48FF1DE015FF5F63AED1EB2E09BD309EBDF653E2D4959DBF0C3FC91EBE5B3B39060DB1D79C50A395CEDAF0CD64
5,364,485 UART: Caliptra RT
5,364,830 UART: [state] CFI Enabled
5,645,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,366 UART: [rt]cmd =0x4d454153, len=108
5,696,391 >>> mbox cmd response data (12 bytes)
5,696,392 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,668,336 >>> mbox cmd response: success
7,668,336 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,682,188 UART:
7,682,204 UART: Running Caliptra FMC ...
7,682,612 UART:
7,682,755 UART: [state] CFI Enabled
7,771,530 UART: [art] Extend RT PCRs Done
7,771,958 UART: [art] Lock RT PCRs Done
7,773,125 UART: [art] Populate DV Done
7,781,516 UART: [fht] FMC Alias Private Key: 7
7,782,484 UART: [art] Derive CDI
7,782,764 UART: [art] Store in in slot 0x4
7,868,145 UART: [art] Derive Key Pair
7,868,505 UART: [art] Store priv key in slot 0x5
7,881,521 UART: [art] Derive Key Pair - Done
7,896,307 UART: [art] Signing Cert with AUTHO
7,896,787 UART: RITY.KEYID = 7
7,912,105 UART: [art] Erasing AUTHORITY.KEYID = 7
7,912,870 UART: [art] PUB.X = AD60A209958B668AA47A8385D7FB24D62AA2779E62CF7991B8D6C84DAB5384CEE2C1B2647FD9801795E4F072BD87534E
7,919,643 UART: [art] PUB.Y = 9820DC27FACD91692F644E0DA1171F0E604CC3C0BDB11502C399D8EB77CD20BCDD20AE25C08FCC35A5F552A0265CC99E
7,926,602 UART: [art] SIG.R = 5C415BC77C9D989E7B0168E91C0A0E4EDA724C8EA7DFF50F45757F1573AFCA59A308BF4E0CF86EB79E1A28C23D62B987
7,933,370 UART: [art] SIG.S = E08BB43EB42F9241FD489BE429FD76C482838C70FE70CF61501C432DEB52B6064694194D5784EC6B0C4CC34FF3DB7F75
7,956,599 UART: mbox::rt_entry...
7,956,971 UART: ____ _ _ _ ____ _____
7,957,755 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,958,555 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,959,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,091 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,960,859 UART: |_|
7,961,171 UART:
8,243,473 UART: [rt] Runtime listening for mailbox commands...
10,216,410 >>> mbox cmd response: success
10,216,410 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,229,890 UART:
10,229,906 UART: Running Caliptra FMC ...
10,230,314 UART:
10,230,457 UART: [state] CFI Enabled
10,320,664 UART: [art] Extend RT PCRs Done
10,321,092 UART: [art] Lock RT PCRs Done
10,322,369 UART: [art] Populate DV Done
10,330,762 UART: [fht] FMC Alias Private Key: 7
10,331,702 UART: [art] Derive CDI
10,331,982 UART: [art] Store in in slot 0x4
10,417,801 UART: [art] Derive Key Pair
10,418,161 UART: [art] Store priv key in slot 0x5
10,431,099 UART: [art] Derive Key Pair - Done
10,445,713 UART: [art] Signing Cert with AUTHO
10,446,193 UART: RITY.KEYID = 7
10,461,487 UART: [art] Erasing AUTHORITY.KEYID = 7
10,462,252 UART: [art] PUB.X = 774627B58C1761144F87E32D45BBBE573154A02675D0A0CE6545FA1534BA557A5504AFBCB1109EEF2FA865BC779BE583
10,469,023 UART: [art] PUB.Y = FA7876C7858786A29F30B4EE5B1D0761251F7D96A0A9D0E6CA78F5E74470F6B5FF22469D9C38C625A7761B14DB7D77E6
10,475,974 UART: [art] SIG.R = C98066977F41BB9E1432AE9615ED2992A32C36C1285EAA5427B39C11C9AB97944CE58BFF6ECD32E3EC9AEC99F887C514
10,482,754 UART: [art] SIG.S = 8C308AC5D5935A71ED0D455016C8967A62383AA2171AFF84BBF5D5A87493CB3512D60C41844AE362FCBAE737FC7451F4
10,506,693 UART: mbox::rt_entry...
10,507,065 UART: ____ _ _ _ ____ _____
10,507,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,508,649 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,509,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,510,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,510,953 UART: |_|
10,511,265 UART:
10,792,004 UART: [rt] Runtime listening for mailbox commands...
10,793,200 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,476,129 UART: [cold-reset] ++
1,476,513 UART: [fht] Storing FHT @ 0x50003400
1,479,292 UART: [idev] ++
1,479,460 UART: [idev] CDI.KEYID = 6
1,479,820 UART: [idev] SUBJECT.KEYID = 7
1,480,244 UART: [idev] UDS.KEYID = 0
1,480,589 ready_for_fw is high
1,480,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,412 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,026 UART: [idev] --
1,514,083 UART: [ldev] ++
1,514,251 UART: [ldev] CDI.KEYID = 6
1,514,614 UART: [ldev] SUBJECT.KEYID = 5
1,515,040 UART: [ldev] AUTHORITY.KEYID = 7
1,515,503 UART: [ldev] FE.KEYID = 1
1,520,761 UART: [ldev] Erasing FE.KEYID = 1
1,545,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,790 UART: [ldev] --
1,585,287 UART: [fwproc] Waiting for Commands...
1,586,038 UART: [fwproc] Received command 0x46574c44
1,586,829 UART: [fwproc] Received Image of size 114332 bytes
2,884,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,730 >>> mbox cmd response: success
3,077,904 UART: [afmc] ++
3,078,072 UART: [afmc] CDI.KEYID = 6
3,078,434 UART: [afmc] SUBJECT.KEYID = 7
3,078,859 UART: [afmc] AUTHORITY.KEYID = 5
3,113,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,389 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,079 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,990 UART: [afmc] --
3,157,082 UART: [cold-reset] --
3,157,954 UART: [state] Locking Datavault
3,159,199 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,803 UART: [state] Locking ICCM
3,160,429 UART: [exit] Launching FMC @ 0x40000130
3,165,758 UART:
3,165,774 UART: Running Caliptra FMC ...
3,166,182 UART:
3,166,236 UART: [state] CFI Enabled
3,176,843 UART: [fht] FMC Alias Private Key: 7
3,284,866 UART: [art] Extend RT PCRs Done
3,285,294 UART: [art] Lock RT PCRs Done
3,287,046 UART: [art] Populate DV Done
3,295,041 UART: [fht] FMC Alias Private Key: 7
3,296,189 UART: [art] Derive CDI
3,296,469 UART: [art] Store in in slot 0x4
3,382,036 UART: [art] Derive Key Pair
3,382,396 UART: [art] Store priv key in slot 0x5
3,395,542 UART: [art] Derive Key Pair - Done
3,410,284 UART: [art] Signing Cert with AUTHO
3,410,764 UART: RITY.KEYID = 7
3,425,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,601 UART: [art] PUB.X = AC703B899ACE1F593EB9F1154E7A2C3185332F45900C76951A8D129DEC3C14B7F3F393AA07A8E53A1FCAB91F57ED353E
3,433,377 UART: [art] PUB.Y = 2CF1D5E1FF414A6B2777381D3795A7FCE4BE5FDBA2852956401B9536A9510407569E2B3B2DA9DF3C629471BCF17C520F
3,440,324 UART: [art] SIG.R = 04FF463FE25007C3ABCD1A382A0C822B5B330D8496895BB38B5705BFF81A32E9E031CA1DB419D777885FDDD4D6CB5646
3,447,089 UART: [art] SIG.S = 106A8860C17088E8594DAE00C0ABC7272623796CA6485D153C91D15980A7C616CA46C5D3B0836AF2B34E285BF0EE723D
3,470,520 UART: Caliptra RT
3,470,773 UART: [state] CFI Enabled
3,579,149 UART: [rt] RT listening for mailbox commands...
3,579,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,121 UART: [rt]cmd =0x4d454153, len=108
3,631,394 >>> mbox cmd response data (12 bytes)
3,631,395 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,183 UART:
3,632,199 UART: Running Caliptra ROM ...
3,632,607 UART:
3,632,661 UART: [state] CFI Enabled
3,635,351 UART: [state] LifecycleState = Unprovisioned
3,636,006 UART: [state] DebugLocked = No
3,636,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,638,403 UART: [kat] SHA2-256
4,432,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,436,449 UART: [kat] ++
4,436,601 UART: [kat] sha1
4,440,917 UART: [kat] SHA2-256
4,442,855 UART: [kat] SHA2-384
4,445,586 UART: [kat] SHA2-512-ACC
4,447,486 UART: [kat] ECC-384
4,453,229 UART: [kat] HMAC-384Kdf
4,457,809 UART: [kat] LMS
5,026,005 UART: [kat] --
5,026,944 UART: [update-reset] ++
5,953,208 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,954,468 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,050,902 >>> mbox cmd response: success
6,050,902 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,051,025 UART: [update-reset] Copying MAN_2 To MAN_1
6,059,039 UART: [update-reset Success] --
6,060,138 UART: [state] Locking Datavault
6,060,906 UART: [state] Locking PCR0, PCR1 and PCR31
6,061,510 UART: [state] Locking ICCM
6,062,008 UART: [exit] Launching FMC @ 0x40000130
6,067,337 UART:
6,067,353 UART: Running Caliptra FMC ...
6,067,761 UART:
6,067,815 UART: [state] CFI Enabled
6,157,436 UART: [art] Extend RT PCRs Done
6,157,864 UART: [art] Lock RT PCRs Done
6,159,037 UART: [art] Populate DV Done
6,167,064 UART: [fht] FMC Alias Private Key: 7
6,168,218 UART: [art] Derive CDI
6,168,498 UART: [art] Store in in slot 0x4
6,254,499 UART: [art] Derive Key Pair
6,254,859 UART: [art] Store priv key in slot 0x5
6,267,735 UART: [art] Derive Key Pair - Done
6,282,398 UART: [art] Signing Cert with AUTHO
6,282,878 UART: RITY.KEYID = 7
6,298,054 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,819 UART: [art] PUB.X = 2CC0A871F870253EA5AB27E8AC8B3958808FAB172C3636FC030839CD4BB52CE0BA471C54B5848403FCCDE4C3F15237C6
6,305,590 UART: [art] PUB.Y = 58DD2879F70509F967873DF327CC0129C81B39986327D455702322105360EDEC46CDC3B4107A2533B595831059C24DED
6,312,519 UART: [art] SIG.R = 2E26D679EE03D50ACB83FF14458C9F3FBC3430FD32997A6733311D5F324B7DBAAF04201A836A19ED35355B183BAEB57C
6,319,290 UART: [art] SIG.S = 5C92470E7E7B5E2006515FDA97C82D89EDB106F658B419B980C5D3C889A581D55589A0A3018032A893D816AF15735D4C
6,343,051 UART: mbox::rt_entry...
6,343,423 UART: ____ _ _ _ ____ _____
6,344,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,345,007 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,345,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,346,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,347,311 UART: |_|
6,347,623 UART:
6,628,598 UART: [rt] Runtime listening for mailbox commands...
6,629,788 >>> mbox cmd response data (48 bytes)
6,629,789 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,632,572 >>> mbox cmd response data (48 bytes)
6,632,573 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,647,710 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,725 ready_for_fw is high
1,362,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,898 >>> mbox cmd response: success
2,990,748 UART:
2,990,764 UART: Running Caliptra FMC ...
2,991,172 UART:
2,991,226 UART: [state] CFI Enabled
3,001,619 UART: [fht] FMC Alias Private Key: 7
3,110,010 UART: [art] Extend RT PCRs Done
3,110,438 UART: [art] Lock RT PCRs Done
3,111,660 UART: [art] Populate DV Done
3,120,209 UART: [fht] FMC Alias Private Key: 7
3,121,303 UART: [art] Derive CDI
3,121,583 UART: [art] Store in in slot 0x4
3,207,280 UART: [art] Derive Key Pair
3,207,640 UART: [art] Store priv key in slot 0x5
3,221,200 UART: [art] Derive Key Pair - Done
3,235,704 UART: [art] Signing Cert with AUTHO
3,236,184 UART: RITY.KEYID = 7
3,251,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,909 UART: [art] PUB.X = 436993A27CAB6996D8F79318EB59A3AD1ECB46E9EC6138CA28C160FC716B939E8A033E601937CCAB533EBF8165961FA9
3,258,684 UART: [art] PUB.Y = 2BA36C21A01A70C608ED58F67412F36AAED35E08FE2BD7D8337D75E94573D06D07A37565AE5587F104D995D444FEA516
3,265,626 UART: [art] SIG.R = 2CA2F804AA6D49E4A0F7864ABE3D84E2C295CA4CCE4362A94ACF0EA0EE58337B96AD541BFBB23670AC5FBC1C5D495804
3,272,409 UART: [art] SIG.S = EFA9BC04A82601B75AD1E5EBD9F1989CE89E429C0EC3A21B7BC99B053E5D6EE859A1764044D2AFCC5F72A80F2C4D9B02
3,296,702 UART: Caliptra RT
3,296,955 UART: [state] CFI Enabled
3,405,198 UART: [rt] RT listening for mailbox commands...
3,405,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,554 UART: [rt]cmd =0x4d454153, len=108
3,458,087 >>> mbox cmd response data (12 bytes)
3,458,088 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,343 >>> mbox cmd response: success
5,758,343 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,771,386 UART:
5,771,402 UART: Running Caliptra FMC ...
5,771,810 UART:
5,771,864 UART: [state] CFI Enabled
5,860,815 UART: [art] Extend RT PCRs Done
5,861,243 UART: [art] Lock RT PCRs Done
5,862,280 UART: [art] Populate DV Done
5,870,463 UART: [fht] FMC Alias Private Key: 7
5,871,587 UART: [art] Derive CDI
5,871,867 UART: [art] Store in in slot 0x4
5,957,834 UART: [art] Derive Key Pair
5,958,194 UART: [art] Store priv key in slot 0x5
5,971,766 UART: [art] Derive Key Pair - Done
5,986,442 UART: [art] Signing Cert with AUTHO
5,986,922 UART: RITY.KEYID = 7
6,002,398 UART: [art] Erasing AUTHORITY.KEYID = 7
6,003,163 UART: [art] PUB.X = ADAF8BC9A738DF9E860013A67357EF7D8BD2AFB9047BEB950EF82630FAD409C5119363F5416134E9F2143E03A6EF5F23
6,009,909 UART: [art] PUB.Y = 1CCA58D09997CFE8D70E1CDB443B016E0D3F7F813BCEA165094F21ADC97ED1CA1D809EAE7510DE3DCE90832610A96363
6,016,863 UART: [art] SIG.R = 4E1E41CD96B76D7E95481638FAB5D4AD71B9B1563C9A0E5BFBB526A8ECD5B1CE086A626357A9BB26394E3311A0CF806C
6,023,641 UART: [art] SIG.S = 4F4207175421F8B0870324D9FC71351BC7556D89CCC267D8BF21DCB13A90B60A4E45DBBD923E2161B854392B380C5DD4
6,048,124 UART: mbox::rt_entry...
6,048,496 UART: ____ _ _ _ ____ _____
6,049,280 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,050,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,050,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,051,616 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,052,384 UART: |_|
6,052,696 UART:
6,335,145 UART: [rt] Runtime listening for mailbox commands...
6,336,335 >>> mbox cmd response data (48 bytes)
6,336,336 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,339,119 >>> mbox cmd response data (48 bytes)
6,339,120 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,354,257 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,681 UART: [kat] SHA2-512-ACC
897,582 UART: [kat] ECC-384
903,207 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,746 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,506,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,923 UART: [idev] --
1,515,916 UART: [ldev] ++
1,516,084 UART: [ldev] CDI.KEYID = 6
1,516,447 UART: [ldev] SUBJECT.KEYID = 5
1,516,873 UART: [ldev] AUTHORITY.KEYID = 7
1,517,336 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,043 UART: [ldev] --
1,586,510 UART: [fwproc] Waiting for Commands...
1,587,283 UART: [fwproc] Received command 0x46574c44
1,588,074 UART: [fwproc] Received Image of size 114332 bytes
2,884,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,859 >>> mbox cmd response: success
3,078,929 UART: [afmc] ++
3,079,097 UART: [afmc] CDI.KEYID = 6
3,079,459 UART: [afmc] SUBJECT.KEYID = 7
3,079,884 UART: [afmc] AUTHORITY.KEYID = 5
3,115,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,198 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,888 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,677 UART: [afmc] --
3,158,645 UART: [cold-reset] --
3,159,379 UART: [state] Locking Datavault
3,160,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,110 UART: [state] Locking ICCM
3,161,672 UART: [exit] Launching FMC @ 0x40000130
3,167,001 UART:
3,167,017 UART: Running Caliptra FMC ...
3,167,425 UART:
3,167,568 UART: [state] CFI Enabled
3,178,077 UART: [fht] FMC Alias Private Key: 7
3,286,806 UART: [art] Extend RT PCRs Done
3,287,234 UART: [art] Lock RT PCRs Done
3,288,720 UART: [art] Populate DV Done
3,296,963 UART: [fht] FMC Alias Private Key: 7
3,298,125 UART: [art] Derive CDI
3,298,405 UART: [art] Store in in slot 0x4
3,383,506 UART: [art] Derive Key Pair
3,383,866 UART: [art] Store priv key in slot 0x5
3,396,974 UART: [art] Derive Key Pair - Done
3,411,931 UART: [art] Signing Cert with AUTHO
3,412,411 UART: RITY.KEYID = 7
3,427,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,302 UART: [art] PUB.X = 43BAFFBEF23739D16AA4AC5F710132CFC94A99E5B63239A78316825463BA31535000FC7F18C17C30FE8329F34CB61494
3,435,049 UART: [art] PUB.Y = 06063634C7177486D1FD29A00F34B7DAED752596CC453AD93A880D270785CD36020A7947666D408D259EBCA335CBCFC6
3,441,978 UART: [art] SIG.R = 14BBF77F9C54D5EE6F095CA9623EEC6F5CE9FF9C63F38B3DE31D3A801C704EB270A36E6ADD0634801BA279B23148A0FC
3,448,760 UART: [art] SIG.S = 6CA890E76313C6D180939E5061F35D0E602AAA6116FE5E0FEEE17774AE6E4D00586E1EFD405A9B3BB0EDB01BB89AD25D
3,472,561 UART: Caliptra RT
3,472,906 UART: [state] CFI Enabled
3,580,784 UART: [rt] RT listening for mailbox commands...
3,581,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,782 UART: [rt]cmd =0x4d454153, len=108
3,632,743 >>> mbox cmd response data (12 bytes)
3,632,744 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,648 UART:
3,633,664 UART: Running Caliptra ROM ...
3,634,072 UART:
3,634,213 UART: [state] CFI Enabled
3,636,797 UART: [state] LifecycleState = Unprovisioned
3,637,452 UART: [state] DebugLocked = No
3,638,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,639,531 UART: [kat] SHA2-256
4,433,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,437,577 UART: [kat] ++
4,437,729 UART: [kat] sha1
4,441,927 UART: [kat] SHA2-256
4,443,865 UART: [kat] SHA2-384
4,446,654 UART: [kat] SHA2-512-ACC
4,448,554 UART: [kat] ECC-384
4,453,949 UART: [kat] HMAC-384Kdf
4,458,545 UART: [kat] LMS
5,026,741 UART: [kat] --
5,027,684 UART: [update-reset] ++
5,954,976 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,956,222 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,052,656 >>> mbox cmd response: success
6,052,656 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,052,789 UART: [update-reset] Copying MAN_2 To MAN_1
6,060,803 UART: [update-reset Success] --
6,061,824 UART: [state] Locking Datavault
6,062,454 UART: [state] Locking PCR0, PCR1 and PCR31
6,063,058 UART: [state] Locking ICCM
6,063,530 UART: [exit] Launching FMC @ 0x40000130
6,068,859 UART:
6,068,875 UART: Running Caliptra FMC ...
6,069,283 UART:
6,069,426 UART: [state] CFI Enabled
6,158,551 UART: [art] Extend RT PCRs Done
6,158,979 UART: [art] Lock RT PCRs Done
6,160,338 UART: [art] Populate DV Done
6,168,787 UART: [fht] FMC Alias Private Key: 7
6,169,879 UART: [art] Derive CDI
6,170,159 UART: [art] Store in in slot 0x4
6,256,254 UART: [art] Derive Key Pair
6,256,614 UART: [art] Store priv key in slot 0x5
6,270,542 UART: [art] Derive Key Pair - Done
6,285,231 UART: [art] Signing Cert with AUTHO
6,285,711 UART: RITY.KEYID = 7
6,300,969 UART: [art] Erasing AUTHORITY.KEYID = 7
6,301,734 UART: [art] PUB.X = 4B36FB7ED44783CF2208172DC94FB339CD66B4FA68972B10AD7BD9D8EF95AB47EE0AC1D8D1B133AC1A66C874D238E2D6
6,308,516 UART: [art] PUB.Y = 222FD9879997C8FD138EDF3D05CC4BC81769E174716B226A61C635344A1108E3E21A4122B6E2BCB362E8ECB71BC43AEB
6,315,468 UART: [art] SIG.R = 5F1409994297AA697158257A5A536F4D9AE0478DA06EF8775B5C1633D083066AA0A9E452E26C8D5FA68128B255FCCB3B
6,322,232 UART: [art] SIG.S = 3D18FE5A8C5A25E396BAA59A58091533C31CC9DCDA16B5688832172EC1BD9CF5C205C13D0E2DABFD5B72AC57F5ABCCA4
6,345,796 UART: mbox::rt_entry...
6,346,168 UART: ____ _ _ _ ____ _____
6,346,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,347,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,348,520 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,349,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,350,056 UART: |_|
6,350,368 UART:
6,628,701 UART: [rt] Runtime listening for mailbox commands...
6,629,891 >>> mbox cmd response data (48 bytes)
6,629,892 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,632,675 >>> mbox cmd response data (48 bytes)
6,632,676 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,647,813 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,358 ready_for_fw is high
1,363,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,361 >>> mbox cmd response: success
2,991,607 UART:
2,991,623 UART: Running Caliptra FMC ...
2,992,031 UART:
2,992,174 UART: [state] CFI Enabled
3,002,749 UART: [fht] FMC Alias Private Key: 7
3,109,720 UART: [art] Extend RT PCRs Done
3,110,148 UART: [art] Lock RT PCRs Done
3,111,920 UART: [art] Populate DV Done
3,119,963 UART: [fht] FMC Alias Private Key: 7
3,121,039 UART: [art] Derive CDI
3,121,319 UART: [art] Store in in slot 0x4
3,206,958 UART: [art] Derive Key Pair
3,207,318 UART: [art] Store priv key in slot 0x5
3,221,318 UART: [art] Derive Key Pair - Done
3,235,894 UART: [art] Signing Cert with AUTHO
3,236,374 UART: RITY.KEYID = 7
3,251,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,431 UART: [art] PUB.X = E928BFDAF215492B238A979DBDA6DEECBB1CA9805AB0925C0341AAA5F1E43759A62A064AC5A5D17ACD1A2B689B681C00
3,259,193 UART: [art] PUB.Y = 2CE6AA283DB74FF4735401C7CC02245190BC4B66B3A96E6C3E3021B19288D0C450A895656F82D6222DADCD0DC820C788
3,266,138 UART: [art] SIG.R = 7F267B0841CBFE70D87BFBAA83D44F7A6DB33D34B457E037F88454B0D03C1A5AA211FD68FB328038ACE99BFA95239A83
3,272,919 UART: [art] SIG.S = B9C2A564FA298BEC9F8694DF5021C0563F61275BF6FA518798F2D662FF157B13E253588045F9E7AD146E3A30343401BB
3,296,695 UART: Caliptra RT
3,297,040 UART: [state] CFI Enabled
3,404,899 UART: [rt] RT listening for mailbox commands...
3,405,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,907 UART: [rt]cmd =0x4d454153, len=108
3,456,802 >>> mbox cmd response data (12 bytes)
3,456,803 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,773 >>> mbox cmd response: success
5,758,773 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,772,192 UART:
5,772,208 UART: Running Caliptra FMC ...
5,772,616 UART:
5,772,759 UART: [state] CFI Enabled
5,861,496 UART: [art] Extend RT PCRs Done
5,861,924 UART: [art] Lock RT PCRs Done
5,863,401 UART: [art] Populate DV Done
5,871,346 UART: [fht] FMC Alias Private Key: 7
5,872,374 UART: [art] Derive CDI
5,872,654 UART: [art] Store in in slot 0x4
5,958,305 UART: [art] Derive Key Pair
5,958,665 UART: [art] Store priv key in slot 0x5
5,972,341 UART: [art] Derive Key Pair - Done
5,987,057 UART: [art] Signing Cert with AUTHO
5,987,537 UART: RITY.KEYID = 7
6,003,071 UART: [art] Erasing AUTHORITY.KEYID = 7
6,003,836 UART: [art] PUB.X = E5FE96CC760EF9E282994DAEAE4882380272BD82A5E2619DD67CA834EAE3295EE07F10295EA75B7E90D0B0C0C08C68D4
6,010,612 UART: [art] PUB.Y = 4CFC8461763DBE1C9DC786E4FC9FB95471363325F990F691EA73D4ADDAA6194ADF545DD2D4DB04985F3BD8BFC9DA1F07
6,017,576 UART: [art] SIG.R = F24BCC88D154A912460FC27CA8A15196AE2F731DF275DA9AB020BD3F103A4E675BB507FFE7142ABE2CE5D682CD9D472C
6,024,358 UART: [art] SIG.S = 5A7E3896257371FC36AA2E44D30C5D95935C5353883DCA57A6FAA7B644F1A1948991AE9CE256C27EA5469CCF758DE9EC
6,047,756 UART: mbox::rt_entry...
6,048,128 UART: ____ _ _ _ ____ _____
6,048,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,049,712 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,050,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,051,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,052,016 UART: |_|
6,052,328 UART:
6,331,204 UART: [rt] Runtime listening for mailbox commands...
6,332,394 >>> mbox cmd response data (48 bytes)
6,332,395 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,335,178 >>> mbox cmd response data (48 bytes)
6,335,179 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,350,316 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,619 UART: [idev] --
1,210,811 UART: [ldev] ++
1,210,979 UART: [ldev] CDI.KEYID = 6
1,211,342 UART: [ldev] SUBJECT.KEYID = 5
1,211,768 UART: [ldev] AUTHORITY.KEYID = 7
1,212,231 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,007 UART: [ldev] --
1,283,438 UART: [fwproc] Wait for Commands...
1,284,110 UART: [fwproc] Recv command 0x46574c44
1,284,838 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,819 >>> mbox cmd response: success
2,776,873 UART: [afmc] ++
2,777,041 UART: [afmc] CDI.KEYID = 6
2,777,403 UART: [afmc] SUBJECT.KEYID = 7
2,777,828 UART: [afmc] AUTHORITY.KEYID = 5
2,813,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,356 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,744 UART: [afmc] --
2,856,836 UART: [cold-reset] --
2,857,708 UART: [state] Locking Datavault
2,858,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,531 UART: [state] Locking ICCM
2,859,967 UART: [exit] Launching FMC @ 0x40000130
2,865,296 UART:
2,865,312 UART: Running Caliptra FMC ...
2,865,720 UART:
2,865,774 UART: [state] CFI Enabled
2,876,473 UART: [fht] FMC Alias Private Key: 7
2,984,172 UART: [art] Extend RT PCRs Done
2,984,600 UART: [art] Lock RT PCRs Done
2,986,412 UART: [art] Populate DV Done
2,994,661 UART: [fht] FMC Alias Private Key: 7
2,995,843 UART: [art] Derive CDI
2,996,123 UART: [art] Store in in slot 0x4
3,081,532 UART: [art] Derive Key Pair
3,081,892 UART: [art] Store priv key in slot 0x5
3,094,956 UART: [art] Derive Key Pair - Done
3,109,810 UART: [art] Signing Cert with AUTHO
3,110,290 UART: RITY.KEYID = 7
3,125,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,819 UART: [art] PUB.X = 437A4CD221CA1A6CA844CF1052DF1D26BC225B07B91EF3E0440C951AB4098DAC6D0693BC8F2CB831D7C3D8AA24962455
3,132,589 UART: [art] PUB.Y = E74007B23E67BC2B81C797C6130A1C51070DEAF73ED8D3A6FF737A3111AE38A5763B5500698210E550D5C84D36DDFAF3
3,139,511 UART: [art] SIG.R = 1A3F958DCDF75C6C5A3FEF68F8BFA128BCC042A9811365B0E3A681BE23896048848288DC1E4BDD294F4EA72DD305DB4B
3,146,294 UART: [art] SIG.S = C7923E7CE88E8E88050CAE5724CF1D6AFD73B031B1C917A358A31C25FD2A92B80541C74BC3BBB6CD776007E77D5BE1FE
3,169,985 UART: Caliptra RT
3,170,238 UART: [state] CFI Enabled
3,278,049 UART: [rt] RT listening for mailbox commands...
3,278,719 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,461 UART: [rt]cmd =0x4d454153, len=108
3,329,564 >>> mbox cmd response data (12 bytes)
3,329,565 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,616 UART:
3,330,632 UART: Running Caliptra ROM ...
3,331,040 UART:
3,331,095 UART: [state] CFI Enabled
3,333,103 UART: [state] LifecycleState = Unprovisioned
3,333,758 UART: [state] DebugLocked = No
3,334,324 UART: [state] WD Timer not started. Device not locked for debugging
3,335,582 UART: [kat] SHA2-256
4,141,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,145,357 UART: [kat] ++
4,145,509 UART: [kat] sha1
4,149,811 UART: [kat] SHA2-256
4,151,751 UART: [kat] SHA2-384
4,154,516 UART: [kat] SHA2-512-ACC
4,156,416 UART: [kat] ECC-384
4,165,989 UART: [kat] HMAC-384Kdf
4,170,735 UART: [kat] LMS
4,419,063 UART: [kat] --
4,419,891 UART: [update-reset] ++
5,324,501 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,325,470 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,421,852 >>> mbox cmd response: success
5,421,852 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,422,021 UART: [update-reset] Copying MAN_2 To MAN_1
5,430,035 UART: [update-reset Success] --
5,430,986 UART: [state] Locking Datavault
5,431,700 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,304 UART: [state] Locking ICCM
5,432,788 UART: [exit] Launching FMC @ 0x40000130
5,438,117 UART:
5,438,133 UART: Running Caliptra FMC ...
5,438,541 UART:
5,438,595 UART: [state] CFI Enabled
5,528,128 UART: [art] Extend RT PCRs Done
5,528,556 UART: [art] Lock RT PCRs Done
5,529,881 UART: [art] Populate DV Done
5,538,164 UART: [fht] FMC Alias Private Key: 7
5,539,162 UART: [art] Derive CDI
5,539,442 UART: [art] Store in in slot 0x4
5,625,269 UART: [art] Derive Key Pair
5,625,629 UART: [art] Store priv key in slot 0x5
5,638,595 UART: [art] Derive Key Pair - Done
5,653,144 UART: [art] Signing Cert with AUTHO
5,653,624 UART: RITY.KEYID = 7
5,668,350 UART: [art] Erasing AUTHORITY.KEYID = 7
5,669,115 UART: [art] PUB.X = 10F22F964A97176E0EA9ADFE449774CB3A5D71E736641DA4E6219062731FA86758FA989D835F8BD14FE69C22FD880F13
5,675,881 UART: [art] PUB.Y = 52FEE84D3163EF1565F7D0C29488CCE776E5687548F479366C7DBAF5A229CDC78B33155501F731D4A29341D920EDCD15
5,682,830 UART: [art] SIG.R = FB902853AA64E4C5B3C7EDD8ACD5A9F2C033538D102DF0682019796EAC6FDEC79B93DCFE85E37B73A67C95932BCC749F
5,689,618 UART: [art] SIG.S = E346EA4E2695BC22BA92854FE2D23C11AB8B68D9B57C47B1CF63B2DE4F6FAC1C4023CE060A1FB465DC5BB3A0D5BE2589
5,713,255 UART: mbox::rt_entry...
5,713,627 UART: ____ _ _ _ ____ _____
5,714,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,715,211 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,715,979 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,716,747 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,717,515 UART: |_|
5,717,827 UART:
5,997,588 UART: [rt] Runtime listening for mailbox commands...
5,998,778 >>> mbox cmd response data (48 bytes)
5,998,779 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,001,562 >>> mbox cmd response data (48 bytes)
6,001,563 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,016,700 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,063 ready_for_fw is high
1,061,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,966 >>> mbox cmd response: success
2,689,462 UART:
2,689,478 UART: Running Caliptra FMC ...
2,689,886 UART:
2,689,940 UART: [state] CFI Enabled
2,700,483 UART: [fht] FMC Alias Private Key: 7
2,808,384 UART: [art] Extend RT PCRs Done
2,808,812 UART: [art] Lock RT PCRs Done
2,810,168 UART: [art] Populate DV Done
2,818,215 UART: [fht] FMC Alias Private Key: 7
2,819,339 UART: [art] Derive CDI
2,819,619 UART: [art] Store in in slot 0x4
2,905,248 UART: [art] Derive Key Pair
2,905,608 UART: [art] Store priv key in slot 0x5
2,918,488 UART: [art] Derive Key Pair - Done
2,933,010 UART: [art] Signing Cert with AUTHO
2,933,490 UART: RITY.KEYID = 7
2,948,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,697 UART: [art] PUB.X = FC536FDF350FE5BC120A6B0D0176D8732409D8B2B145D02922CFBB2C4CAE838D3153B33797626744D5C58097DE9A0F7A
2,956,455 UART: [art] PUB.Y = A8022F262E5CD7DBFA16B8018B4ABBF3781CFAA3D42C39F54CC9D532CF9B32D3245954B7AB0E55E23451F7B1EB3D33A0
2,963,414 UART: [art] SIG.R = 1E5A7FEAC81719E3A33D43F8EB26C272CAF71C993214294CCA28252ABF97B9A3795DBE38F0B4E36D80050BA1B6C3FE30
2,970,192 UART: [art] SIG.S = 569D105718DBC36965D2A56568CAAA6B821BE1A50A5E8FE0C8DCEB3DA75D2B7A87A139E9FF736EBDB7E57752275E5DEB
2,993,904 UART: Caliptra RT
2,994,157 UART: [state] CFI Enabled
3,102,024 UART: [rt] RT listening for mailbox commands...
3,102,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,106 UART: [rt]cmd =0x4d454153, len=108
3,153,507 >>> mbox cmd response data (12 bytes)
3,153,508 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,044 >>> mbox cmd response: success
5,131,044 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,144,356 UART:
5,144,372 UART: Running Caliptra FMC ...
5,144,780 UART:
5,144,834 UART: [state] CFI Enabled
5,233,955 UART: [art] Extend RT PCRs Done
5,234,383 UART: [art] Lock RT PCRs Done
5,235,828 UART: [art] Populate DV Done
5,244,199 UART: [fht] FMC Alias Private Key: 7
5,245,245 UART: [art] Derive CDI
5,245,525 UART: [art] Store in in slot 0x4
5,331,040 UART: [art] Derive Key Pair
5,331,400 UART: [art] Store priv key in slot 0x5
5,344,816 UART: [art] Derive Key Pair - Done
5,359,318 UART: [art] Signing Cert with AUTHO
5,359,798 UART: RITY.KEYID = 7
5,375,256 UART: [art] Erasing AUTHORITY.KEYID = 7
5,376,021 UART: [art] PUB.X = 1263696C8B444E00A810DFAEAC01F0A6F5C0891B7F733EDCFB0B192C3DF2009F9DA92339B3CEC573DC2C1FB00F050435
5,382,746 UART: [art] PUB.Y = 0D650FD43334170076E2E92827B71CF31AFD609731D312E17A90BCA1790553BCFD9FD6420E14482FF260E8B697D6D6D9
5,389,662 UART: [art] SIG.R = 771E5B3D9A55E0AEB88028027248F239A6B7108DEC3BA92EB636AD12F136D5645730319486F7B4EC54A0B1C308A3B908
5,396,423 UART: [art] SIG.S = 514219F8497741906332FA18C0F23F966FAB4EA5058FBBB7358B7589ABEF0C795E822864FC974DAA175338FE393E9201
5,420,169 UART: mbox::rt_entry...
5,420,541 UART: ____ _ _ _ ____ _____
5,421,325 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,422,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,422,893 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,423,661 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,424,429 UART: |_|
5,424,741 UART:
5,701,161 UART: [rt] Runtime listening for mailbox commands...
5,702,351 >>> mbox cmd response data (48 bytes)
5,702,352 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,705,135 >>> mbox cmd response data (48 bytes)
5,705,136 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,720,273 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,719 UART: [kat] LMS
1,171,047 UART: [kat] --
1,172,212 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 ready_for_fw is high
1,176,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,580 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,210,950 UART: [ldev] ++
1,211,118 UART: [ldev] CDI.KEYID = 6
1,211,481 UART: [ldev] SUBJECT.KEYID = 5
1,211,907 UART: [ldev] AUTHORITY.KEYID = 7
1,212,370 UART: [ldev] FE.KEYID = 1
1,217,756 UART: [ldev] Erasing FE.KEYID = 1
1,243,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,861 UART: [fwproc] Recv command 0x46574c44
1,284,589 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,700 >>> mbox cmd response: success
2,776,768 UART: [afmc] ++
2,776,936 UART: [afmc] CDI.KEYID = 6
2,777,298 UART: [afmc] SUBJECT.KEYID = 7
2,777,723 UART: [afmc] AUTHORITY.KEYID = 5
2,813,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,813 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,053 UART: [afmc] --
2,857,129 UART: [cold-reset] --
2,858,179 UART: [state] Locking Datavault
2,859,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,064 UART: [state] Locking ICCM
2,860,578 UART: [exit] Launching FMC @ 0x40000130
2,865,907 UART:
2,865,923 UART: Running Caliptra FMC ...
2,866,331 UART:
2,866,474 UART: [state] CFI Enabled
2,877,077 UART: [fht] FMC Alias Private Key: 7
2,985,200 UART: [art] Extend RT PCRs Done
2,985,628 UART: [art] Lock RT PCRs Done
2,987,048 UART: [art] Populate DV Done
2,995,405 UART: [fht] FMC Alias Private Key: 7
2,996,471 UART: [art] Derive CDI
2,996,751 UART: [art] Store in in slot 0x4
3,082,534 UART: [art] Derive Key Pair
3,082,894 UART: [art] Store priv key in slot 0x5
3,096,394 UART: [art] Derive Key Pair - Done
3,111,027 UART: [art] Signing Cert with AUTHO
3,111,507 UART: RITY.KEYID = 7
3,127,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,802 UART: [art] PUB.X = D80E0F85B9D34E9A28E8E6C6CB36282151180889F00FC52CFA78ABF7DF9D616302D30ACEB3B2D44357C35879718D24D4
3,134,560 UART: [art] PUB.Y = E85FE86F82E1BBC235A42F433C37D2F78CC470DCE509A4E6B6995287FF85E51FC674A0249D28565E3DED4ADF79F8D540
3,141,519 UART: [art] SIG.R = C1EC90EF6D76C90584F257CE5BDD5853D4739C07C87D68299067EEF2D1EE95688078FA9DF0CE4A329195F789CAA031CD
3,148,293 UART: [art] SIG.S = 6DFD5BE51B79D076A6D867AC807513DBCD3327D4943EEB969A4033D377DEB2301C0466B6C0C03102FC42A19761C2D68F
3,171,600 UART: Caliptra RT
3,171,945 UART: [state] CFI Enabled
3,279,734 UART: [rt] RT listening for mailbox commands...
3,280,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,958 UART: [rt]cmd =0x4d454153, len=108
3,332,147 >>> mbox cmd response data (12 bytes)
3,332,148 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,905 UART:
3,332,921 UART: Running Caliptra ROM ...
3,333,329 UART:
3,333,471 UART: [state] CFI Enabled
3,336,215 UART: [state] LifecycleState = Unprovisioned
3,336,870 UART: [state] DebugLocked = No
3,337,400 UART: [state] WD Timer not started. Device not locked for debugging
3,338,528 UART: [kat] SHA2-256
4,144,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,148,303 UART: [kat] ++
4,148,455 UART: [kat] sha1
4,152,549 UART: [kat] SHA2-256
4,154,489 UART: [kat] SHA2-384
4,157,214 UART: [kat] SHA2-512-ACC
4,159,114 UART: [kat] ECC-384
4,168,921 UART: [kat] HMAC-384Kdf
4,173,707 UART: [kat] LMS
4,422,035 UART: [kat] --
4,422,563 UART: [update-reset] ++
5,328,227 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,329,350 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,425,732 >>> mbox cmd response: success
5,425,732 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,425,999 UART: [update-reset] Copying MAN_2 To MAN_1
5,434,013 UART: [update-reset Success] --
5,435,066 UART: [state] Locking Datavault
5,435,924 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,528 UART: [state] Locking ICCM
5,437,132 UART: [exit] Launching FMC @ 0x40000130
5,442,461 UART:
5,442,477 UART: Running Caliptra FMC ...
5,442,885 UART:
5,443,028 UART: [state] CFI Enabled
5,532,075 UART: [art] Extend RT PCRs Done
5,532,503 UART: [art] Lock RT PCRs Done
5,533,972 UART: [art] Populate DV Done
5,542,215 UART: [fht] FMC Alias Private Key: 7
5,543,195 UART: [art] Derive CDI
5,543,475 UART: [art] Store in in slot 0x4
5,629,398 UART: [art] Derive Key Pair
5,629,758 UART: [art] Store priv key in slot 0x5
5,643,142 UART: [art] Derive Key Pair - Done
5,658,021 UART: [art] Signing Cert with AUTHO
5,658,501 UART: RITY.KEYID = 7
5,673,773 UART: [art] Erasing AUTHORITY.KEYID = 7
5,674,538 UART: [art] PUB.X = C49D78AF3FE72271316D82C9ED3FF0AFBFED79EC68DC13E09F6A60F0EAF7B0C6770C0A31351A3F1337EBDE859FCEC6A4
5,681,328 UART: [art] PUB.Y = 7CB112A4F65FF493491A8BB5EE328311A65DD89C6AFBF43CE779770E59FFEA09F171182477D4F74CCB6696B0A4562D03
5,688,277 UART: [art] SIG.R = AFCF9FB1AAC6B744A0BF4A5D1C40C9D4A245897C3B14BE087CD9F0AC155F5C761A94FB9F19FB388E7BB78F214671894C
5,695,064 UART: [art] SIG.S = 6C8C1405C82DC10DD67755289D09585795226E98C6F336DD8A064B23B7D113730381826B8D209F60BE38E6084D2501A5
5,717,966 UART: mbox::rt_entry...
5,718,338 UART: ____ _ _ _ ____ _____
5,719,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,719,922 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,720,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,721,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,722,226 UART: |_|
5,722,538 UART:
6,002,150 UART: [rt] Runtime listening for mailbox commands...
6,003,340 >>> mbox cmd response data (48 bytes)
6,003,341 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,006,124 >>> mbox cmd response data (48 bytes)
6,006,125 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,021,262 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,610 ready_for_fw is high
1,060,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,009 >>> mbox cmd response: success
2,689,211 UART:
2,689,227 UART: Running Caliptra FMC ...
2,689,635 UART:
2,689,778 UART: [state] CFI Enabled
2,700,469 UART: [fht] FMC Alias Private Key: 7
2,807,962 UART: [art] Extend RT PCRs Done
2,808,390 UART: [art] Lock RT PCRs Done
2,809,918 UART: [art] Populate DV Done
2,818,061 UART: [fht] FMC Alias Private Key: 7
2,819,077 UART: [art] Derive CDI
2,819,357 UART: [art] Store in in slot 0x4
2,904,962 UART: [art] Derive Key Pair
2,905,322 UART: [art] Store priv key in slot 0x5
2,918,946 UART: [art] Derive Key Pair - Done
2,933,837 UART: [art] Signing Cert with AUTHO
2,934,317 UART: RITY.KEYID = 7
2,949,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,196 UART: [art] PUB.X = C951FA2599BFAFD60129ACB6E9A9E6C8DFE776041F8A58B1AFC8CD1D6C65C3901FF6B46ACB88613ADCEDD717FB0B385C
2,956,985 UART: [art] PUB.Y = 18D7F2313136537153E9B22884FE1882A279041526BCFFB6A07F0EA06456A59FD6ACA607E17BF4B1DBB2200D0B36D6D8
2,963,924 UART: [art] SIG.R = A2A1C8D2ED749CFFE3C7D792D619AA2C16F168836EB1DF8B90FA2D585AA52395725B939D738A09FB10C8A5373E9CA595
2,970,703 UART: [art] SIG.S = F1E2E61D189D819A6949DD680FEFEADDB2209727C5A30B8F2E7426F0BDC31FFA9C3D52AD43DDA81EA47D82730F40A63B
2,994,733 UART: Caliptra RT
2,995,078 UART: [state] CFI Enabled
3,102,044 UART: [rt] RT listening for mailbox commands...
3,102,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,110 UART: [rt]cmd =0x4d454153, len=108
3,153,895 >>> mbox cmd response data (12 bytes)
3,153,896 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,130,787 >>> mbox cmd response: success
5,130,787 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,144,191 UART:
5,144,207 UART: Running Caliptra FMC ...
5,144,615 UART:
5,144,758 UART: [state] CFI Enabled
5,234,001 UART: [art] Extend RT PCRs Done
5,234,429 UART: [art] Lock RT PCRs Done
5,235,896 UART: [art] Populate DV Done
5,244,319 UART: [fht] FMC Alias Private Key: 7
5,245,431 UART: [art] Derive CDI
5,245,711 UART: [art] Store in in slot 0x4
5,331,252 UART: [art] Derive Key Pair
5,331,612 UART: [art] Store priv key in slot 0x5
5,344,754 UART: [art] Derive Key Pair - Done
5,359,671 UART: [art] Signing Cert with AUTHO
5,360,151 UART: RITY.KEYID = 7
5,375,699 UART: [art] Erasing AUTHORITY.KEYID = 7
5,376,464 UART: [art] PUB.X = 998F9A1837B3CD95A6582B5BA90B2640B8F854426F032946EC80AA2FEC8781558DF5ABBC9D0315D40A9A6F93B7FB0BEF
5,383,231 UART: [art] PUB.Y = 667373B720FE7C68500B718C946F28240C3AFF6A51979C53560B37B32389B2EF02F723C5A205822337D11713B5F3A73B
5,390,156 UART: [art] SIG.R = 3CDCC51F9FCA94DCD3531E97447A9EF1E1F6B38FE9E10FAEA364180994706642029C64A8763B0EB8E330035FA22B0B73
5,396,916 UART: [art] SIG.S = F5AE7B76D75C87AE53E1D2BA694BE52D602BB0CBE210CE83FCEEA665027EA9BA4887726BA318A6561C67B73796B17546
5,420,646 UART: mbox::rt_entry...
5,421,018 UART: ____ _ _ _ ____ _____
5,421,802 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,422,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,423,370 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,424,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,424,906 UART: |_|
5,425,218 UART:
5,703,124 UART: [rt] Runtime listening for mailbox commands...
5,704,314 >>> mbox cmd response data (48 bytes)
5,704,315 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,707,098 >>> mbox cmd response data (48 bytes)
5,707,099 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,722,236 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,031 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,173,769 ready_for_fw is high
1,173,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,604 UART: [ldev] --
1,280,012 UART: [fwproc] Wait for Commands...
1,280,783 UART: [fwproc] Recv command 0x46574c44
1,281,516 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,029 >>> mbox cmd response: success
2,773,182 UART: [afmc] ++
2,773,350 UART: [afmc] CDI.KEYID = 6
2,773,713 UART: [afmc] SUBJECT.KEYID = 7
2,774,139 UART: [afmc] AUTHORITY.KEYID = 5
2,809,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,275 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,903 UART: [afmc] --
2,852,991 UART: [cold-reset] --
2,853,859 UART: [state] Locking Datavault
2,854,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,532 UART: [state] Locking ICCM
2,856,118 UART: [exit] Launching FMC @ 0x40000130
2,861,447 UART:
2,861,463 UART: Running Caliptra FMC ...
2,861,871 UART:
2,861,925 UART: [state] CFI Enabled
2,872,380 UART: [fht] FMC Alias Private Key: 7
2,980,355 UART: [art] Extend RT PCRs Done
2,980,783 UART: [art] Lock RT PCRs Done
2,982,281 UART: [art] Populate DV Done
2,990,628 UART: [fht] FMC Alias Private Key: 7
2,991,624 UART: [art] Derive CDI
2,991,904 UART: [art] Store in in slot 0x4
3,077,249 UART: [art] Derive Key Pair
3,077,609 UART: [art] Store priv key in slot 0x5
3,090,573 UART: [art] Derive Key Pair - Done
3,105,302 UART: [art] Signing Cert with AUTHO
3,105,782 UART: RITY.KEYID = 7
3,120,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,621 UART: [art] PUB.X = F608EABAE0BF2B9634D7033569D498E1AD93849F2601843B8E2FB9678E799CB7B60ABF50CA9A1507561E78C109E2D3FC
3,128,381 UART: [art] PUB.Y = A1D87CED3BC9A275E31E826656341AD2F166C3830003A522FD4B5F7042F7F9A48B9EC38876C7104E6641A8C165B6F21A
3,135,308 UART: [art] SIG.R = F977E41E9729CC6E5284D74AEDBB9913E10EE4260912DA4CB59FECEDAB88F6B6CDCEEF17525F301087692883F5E7F30E
3,142,085 UART: [art] SIG.S = F6D8D8D477512AE7328FFDF32F3A5CD18751B5025C4D5AFE6D90A2B3642B900E635D743461CA22B1FCC610F705756FAE
3,165,749 UART: Caliptra RT
3,166,002 UART: [state] CFI Enabled
3,274,070 UART: [rt] RT listening for mailbox commands...
3,274,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,050 UART: [rt]cmd =0x4d454153, len=108
3,325,243 >>> mbox cmd response data (12 bytes)
3,325,244 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,767 UART:
3,325,783 UART: Running Caliptra ROM ...
3,326,191 UART:
3,326,246 UART: [state] CFI Enabled
3,328,888 UART: [state] LifecycleState = Unprovisioned
3,329,543 UART: [state] DebugLocked = No
3,330,067 UART: [state] WD Timer not started. Device not locked for debugging
3,331,333 UART: [kat] SHA2-256
4,134,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,139,012 UART: [kat] ++
4,139,164 UART: [kat] sha1
4,143,376 UART: [kat] SHA2-256
4,145,316 UART: [kat] SHA2-384
4,147,963 UART: [kat] SHA2-512-ACC
4,149,863 UART: [kat] ECC-384
4,159,516 UART: [kat] HMAC-384Kdf
4,164,188 UART: [kat] LMS
4,412,500 UART: [kat] --
4,413,294 UART: [update-reset] ++
5,317,771 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,318,794 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,415,176 >>> mbox cmd response: success
5,415,176 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,415,425 UART: [update-reset] Copying MAN_2 To MAN_1
5,423,439 UART: [update-reset Success] --
5,424,422 UART: [state] Locking Datavault
5,425,124 UART: [state] Locking PCR0, PCR1 and PCR31
5,425,728 UART: [state] Locking ICCM
5,426,392 UART: [exit] Launching FMC @ 0x40000130
5,431,721 UART:
5,431,737 UART: Running Caliptra FMC ...
5,432,145 UART:
5,432,199 UART: [state] CFI Enabled
5,521,032 UART: [art] Extend RT PCRs Done
5,521,460 UART: [art] Lock RT PCRs Done
5,522,723 UART: [art] Populate DV Done
5,531,130 UART: [fht] FMC Alias Private Key: 7
5,532,272 UART: [art] Derive CDI
5,532,552 UART: [art] Store in in slot 0x4
5,618,357 UART: [art] Derive Key Pair
5,618,717 UART: [art] Store priv key in slot 0x5
5,631,441 UART: [art] Derive Key Pair - Done
5,646,300 UART: [art] Signing Cert with AUTHO
5,646,780 UART: RITY.KEYID = 7
5,662,076 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,841 UART: [art] PUB.X = 6A417425F140D5345951C6862AAA0BCBB6DB41CC45EB7162F8E52BCE6A310EF531928CB9D1250B085F6B5CC7C2F4659D
5,669,609 UART: [art] PUB.Y = 4518A17FCA5E6333B9422AB13CA330A5C1D0FA480183699EBD0122DCECBA81646C580375DF0336957BF1C7F713E56F11
5,676,551 UART: [art] SIG.R = FDD8DF53BA45A5E9C1ED8E5234022C7DB7C6BCD1B7587BD5E1F40CAF01F0477054550001705C317E930F84D6CA712552
5,683,292 UART: [art] SIG.S = 7CC2EE6BD6A69993B010E749CDFB300CF830A970F2E6C37A97EE45D0720B742C361E732B227E30EC877B612EF81D6CDB
5,706,885 UART: mbox::rt_entry...
5,707,257 UART: ____ _ _ _ ____ _____
5,708,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,708,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,709,609 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,710,377 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,711,145 UART: |_|
5,711,457 UART:
5,987,709 UART: [rt] Runtime listening for mailbox commands...
5,988,899 >>> mbox cmd response data (48 bytes)
5,988,900 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,991,683 >>> mbox cmd response data (48 bytes)
5,991,684 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,006,821 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,420 ready_for_fw is high
1,055,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,129 >>> mbox cmd response: success
2,684,195 UART:
2,684,211 UART: Running Caliptra FMC ...
2,684,619 UART:
2,684,673 UART: [state] CFI Enabled
2,695,300 UART: [fht] FMC Alias Private Key: 7
2,803,615 UART: [art] Extend RT PCRs Done
2,804,043 UART: [art] Lock RT PCRs Done
2,805,459 UART: [art] Populate DV Done
2,813,746 UART: [fht] FMC Alias Private Key: 7
2,814,698 UART: [art] Derive CDI
2,814,978 UART: [art] Store in in slot 0x4
2,900,491 UART: [art] Derive Key Pair
2,900,851 UART: [art] Store priv key in slot 0x5
2,913,607 UART: [art] Derive Key Pair - Done
2,928,559 UART: [art] Signing Cert with AUTHO
2,929,039 UART: RITY.KEYID = 7
2,943,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,608 UART: [art] PUB.X = EBF672AFD37E9B85C633F978C304EA09263C27A22EB1442CF74E54CC5240598B66D66EBA03FC81577F73F712724EF920
2,951,373 UART: [art] PUB.Y = 8FD7DFA8D8371898519ECD0E3CC68137B50DA9C414EBA8D4AD07002EC4AA1AC40EC1FEE4F2848A3BF1E2A275502B9046
2,958,307 UART: [art] SIG.R = 0C014616DC0FEBB40DF7ED1DEECA28D617E9959A878F3FDD0E550BC412546905E3682CBDFE82A550672E9C4DDE1C72FD
2,965,076 UART: [art] SIG.S = FC19935F9AB3CDEB69A1BF2A49D127E538C4B9EEFB93A53CCE1AFAAE9C6491CB7DEE4C07790A3AD86CFF63A3110C9556
2,988,856 UART: Caliptra RT
2,989,109 UART: [state] CFI Enabled
3,096,630 UART: [rt] RT listening for mailbox commands...
3,097,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,034 UART: [rt]cmd =0x4d454153, len=108
3,147,983 >>> mbox cmd response data (12 bytes)
3,147,984 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,120,891 >>> mbox cmd response: success
5,120,891 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,134,259 UART:
5,134,275 UART: Running Caliptra FMC ...
5,134,683 UART:
5,134,737 UART: [state] CFI Enabled
5,224,088 UART: [art] Extend RT PCRs Done
5,224,516 UART: [art] Lock RT PCRs Done
5,225,889 UART: [art] Populate DV Done
5,234,196 UART: [fht] FMC Alias Private Key: 7
5,235,142 UART: [art] Derive CDI
5,235,422 UART: [art] Store in in slot 0x4
5,320,885 UART: [art] Derive Key Pair
5,321,245 UART: [art] Store priv key in slot 0x5
5,334,243 UART: [art] Derive Key Pair - Done
5,348,839 UART: [art] Signing Cert with AUTHO
5,349,319 UART: RITY.KEYID = 7
5,364,147 UART: [art] Erasing AUTHORITY.KEYID = 7
5,364,912 UART: [art] PUB.X = 510C9AEB27380DD5E295137340E4F08C78DA9DE0597C321A6636CF7E4FD85679693798797584D978BC1DB2B1A47D8C28
5,371,674 UART: [art] PUB.Y = 164F6454CA81E20E4A1F93C86DF29290E8B363F3CBD65131D967237FE14FC4651EEA775D49BADAAE80BC285513596E25
5,378,627 UART: [art] SIG.R = 979C302D4F65FE1946DC28B5903C04FD053BD4C5EF663C2244956AABF3EB446269DA670D586011EBEE291EDDE2C07967
5,385,396 UART: [art] SIG.S = 5C37E09DCE98093C57700A995A69BDCF8B0E0D60D581C1605165C8DE7440B5B615B649F14E2C579EF2F37EA79B8C93B8
5,408,353 UART: mbox::rt_entry...
5,408,725 UART: ____ _ _ _ ____ _____
5,409,509 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,410,309 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,411,077 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,411,845 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,412,613 UART: |_|
5,412,925 UART:
5,691,193 UART: [rt] Runtime listening for mailbox commands...
5,692,383 >>> mbox cmd response data (48 bytes)
5,692,384 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,695,167 >>> mbox cmd response data (48 bytes)
5,695,168 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,710,305 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
890,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,354 UART: [kat] SHA2-256
901,294 UART: [kat] SHA2-384
904,027 UART: [kat] SHA2-512-ACC
905,928 UART: [kat] ECC-384
915,671 UART: [kat] HMAC-384Kdf
920,325 UART: [kat] LMS
1,168,637 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,284 UART: [idev] ++
1,172,452 UART: [idev] CDI.KEYID = 6
1,172,813 UART: [idev] SUBJECT.KEYID = 7
1,173,238 UART: [idev] UDS.KEYID = 0
1,173,584 ready_for_fw is high
1,173,584 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,694 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,871 UART: [ldev] ++
1,209,039 UART: [ldev] CDI.KEYID = 6
1,209,403 UART: [ldev] SUBJECT.KEYID = 5
1,209,830 UART: [ldev] AUTHORITY.KEYID = 7
1,210,293 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,189 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x46574c44
1,282,925 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,174 >>> mbox cmd response: success
2,773,253 UART: [afmc] ++
2,773,421 UART: [afmc] CDI.KEYID = 6
2,773,784 UART: [afmc] SUBJECT.KEYID = 7
2,774,210 UART: [afmc] AUTHORITY.KEYID = 5
2,810,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,058 UART: [afmc] --
2,853,006 UART: [cold-reset] --
2,853,688 UART: [state] Locking Datavault
2,854,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,309 UART: [state] Locking ICCM
2,855,741 UART: [exit] Launching FMC @ 0x40000130
2,861,070 UART:
2,861,086 UART: Running Caliptra FMC ...
2,861,494 UART:
2,861,637 UART: [state] CFI Enabled
2,872,054 UART: [fht] FMC Alias Private Key: 7
2,980,223 UART: [art] Extend RT PCRs Done
2,980,651 UART: [art] Lock RT PCRs Done
2,982,099 UART: [art] Populate DV Done
2,990,398 UART: [fht] FMC Alias Private Key: 7
2,991,418 UART: [art] Derive CDI
2,991,698 UART: [art] Store in in slot 0x4
3,077,593 UART: [art] Derive Key Pair
3,077,953 UART: [art] Store priv key in slot 0x5
3,091,469 UART: [art] Derive Key Pair - Done
3,106,229 UART: [art] Signing Cert with AUTHO
3,106,709 UART: RITY.KEYID = 7
3,121,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,702 UART: [art] PUB.X = C8F9BA7D6CA35FE1DBD8EAD60ABA4E9D1FE525888930D3B142BD08E32546E32E0F2DB2EA5455D85011AFC22A8892CD54
3,129,483 UART: [art] PUB.Y = EE3FA08513D3290C71A268088562E15D1D06343ACC845D1B6904D001B9B50994347B16276C77B8040DDABD07C66D83C0
3,136,402 UART: [art] SIG.R = 706EC0747A0ED40F101B9F18674D2AED6A6268849F9C046CC18C8E106E83E2EA244CDEB37B6DECA517506F4DF1F3280F
3,143,172 UART: [art] SIG.S = B953A41565FBD6D0852C9C28C840FFF5103FE82434F8F06F14102363BB081687DBA5D7AB172615C59B3F0238B3E1E47F
3,166,917 UART: Caliptra RT
3,167,262 UART: [state] CFI Enabled
3,276,119 UART: [rt] RT listening for mailbox commands...
3,276,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,093 UART: [rt]cmd =0x4d454153, len=108
3,327,920 >>> mbox cmd response data (12 bytes)
3,327,921 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,838 UART:
3,328,854 UART: Running Caliptra ROM ...
3,329,262 UART:
3,329,404 UART: [state] CFI Enabled
3,331,842 UART: [state] LifecycleState = Unprovisioned
3,332,497 UART: [state] DebugLocked = No
3,333,187 UART: [state] WD Timer not started. Device not locked for debugging
3,334,305 UART: [kat] SHA2-256
4,137,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,141,984 UART: [kat] ++
4,142,136 UART: [kat] sha1
4,146,148 UART: [kat] SHA2-256
4,148,088 UART: [kat] SHA2-384
4,150,795 UART: [kat] SHA2-512-ACC
4,152,695 UART: [kat] ECC-384
4,162,846 UART: [kat] HMAC-384Kdf
4,167,398 UART: [kat] LMS
4,415,710 UART: [kat] --
4,416,530 UART: [update-reset] ++
5,318,987 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,320,020 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,416,402 >>> mbox cmd response: success
5,416,402 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,675 UART: [update-reset] Copying MAN_2 To MAN_1
5,424,689 UART: [update-reset Success] --
5,425,770 UART: [state] Locking Datavault
5,426,468 UART: [state] Locking PCR0, PCR1 and PCR31
5,427,072 UART: [state] Locking ICCM
5,427,534 UART: [exit] Launching FMC @ 0x40000130
5,432,863 UART:
5,432,879 UART: Running Caliptra FMC ...
5,433,287 UART:
5,433,430 UART: [state] CFI Enabled
5,522,775 UART: [art] Extend RT PCRs Done
5,523,203 UART: [art] Lock RT PCRs Done
5,524,480 UART: [art] Populate DV Done
5,532,771 UART: [fht] FMC Alias Private Key: 7
5,533,927 UART: [art] Derive CDI
5,534,207 UART: [art] Store in in slot 0x4
5,619,798 UART: [art] Derive Key Pair
5,620,158 UART: [art] Store priv key in slot 0x5
5,633,782 UART: [art] Derive Key Pair - Done
5,648,692 UART: [art] Signing Cert with AUTHO
5,649,172 UART: RITY.KEYID = 7
5,664,154 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,919 UART: [art] PUB.X = EFB66AA0D816F433B7435C38EF38C0C823FA77DA9157801BB34BCCE9E8F8B9BB2C50F19DCC10FB9BE3A84663F3F1D8D0
5,671,711 UART: [art] PUB.Y = 9EE39386D4626158ED48E923CACAA145A9AFB673BBD6AED01DFC24D4C7C4E11E913CE57891AD9B9B66F505DC10ECA6D9
5,678,680 UART: [art] SIG.R = 544CD845588BFACE76880B0BDC9A0C71B4FD02778ED01159CFD8E1DA8496DFE85B23468A6A6CB37DD92B8B7F992617A2
5,685,452 UART: [art] SIG.S = B4690E0ED249475073BED66418E15E795F4BD2249DB0135AA135DF4744E27390479F0E3E7F195F5C343CE3A0CF917B50
5,709,596 UART: mbox::rt_entry...
5,709,968 UART: ____ _ _ _ ____ _____
5,710,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,711,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,712,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,713,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,713,856 UART: |_|
5,714,168 UART:
5,990,834 UART: [rt] Runtime listening for mailbox commands...
5,992,024 >>> mbox cmd response data (48 bytes)
5,992,025 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,994,808 >>> mbox cmd response data (48 bytes)
5,994,809 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,009,946 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,215 ready_for_fw is high
1,057,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,360 >>> mbox cmd response: success
2,687,918 UART:
2,687,934 UART: Running Caliptra FMC ...
2,688,342 UART:
2,688,485 UART: [state] CFI Enabled
2,699,316 UART: [fht] FMC Alias Private Key: 7
2,806,705 UART: [art] Extend RT PCRs Done
2,807,133 UART: [art] Lock RT PCRs Done
2,808,923 UART: [art] Populate DV Done
2,817,194 UART: [fht] FMC Alias Private Key: 7
2,818,276 UART: [art] Derive CDI
2,818,556 UART: [art] Store in in slot 0x4
2,904,629 UART: [art] Derive Key Pair
2,904,989 UART: [art] Store priv key in slot 0x5
2,918,153 UART: [art] Derive Key Pair - Done
2,933,042 UART: [art] Signing Cert with AUTHO
2,933,522 UART: RITY.KEYID = 7
2,948,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,399 UART: [art] PUB.X = 2BC1298D34294CA30E3DEDC411C67D8002544CC6A041D52F0FC87F60F75594E3A0E0259D4BB8E958294CDC486C82D866
2,956,164 UART: [art] PUB.Y = 4796D450F33670230AF982E3FB44FF856025FA80BC966CCFF23240BDBFD6AB87A330631DE562A0B3D656B6B76FB3DB4D
2,963,123 UART: [art] SIG.R = E2A841B9E700A90A8A31348C43DBA59E102AB3B3367DC7E9BC8475E1A3C07E80FE1B08D412752B7DCE7C2F34132697ED
2,969,875 UART: [art] SIG.S = C4B9399A8AF43335167C1843E03903349459A942DA4C7868FF859B33ED9A6039F11FA7BFBFC36580069F50A9ADC5A4D0
2,993,562 UART: Caliptra RT
2,993,907 UART: [state] CFI Enabled
3,101,803 UART: [rt] RT listening for mailbox commands...
3,102,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,741 UART: [rt]cmd =0x4d454153, len=108
3,153,358 >>> mbox cmd response data (12 bytes)
3,153,359 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,125,743 >>> mbox cmd response: success
5,125,743 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,139,225 UART:
5,139,241 UART: Running Caliptra FMC ...
5,139,649 UART:
5,139,792 UART: [state] CFI Enabled
5,228,877 UART: [art] Extend RT PCRs Done
5,229,305 UART: [art] Lock RT PCRs Done
5,230,396 UART: [art] Populate DV Done
5,238,399 UART: [fht] FMC Alias Private Key: 7
5,239,533 UART: [art] Derive CDI
5,239,813 UART: [art] Store in in slot 0x4
5,325,470 UART: [art] Derive Key Pair
5,325,830 UART: [art] Store priv key in slot 0x5
5,338,936 UART: [art] Derive Key Pair - Done
5,353,612 UART: [art] Signing Cert with AUTHO
5,354,092 UART: RITY.KEYID = 7
5,369,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,401 UART: [art] PUB.X = B00BF8ABBB99BA1165FDF1B28E8AB945C074D620EC9EC87462A94F6A87F5A3096C5B88ECB1DE6BC262997692CB8E610F
5,377,180 UART: [art] PUB.Y = 9034F9BD884914A242A112F3B4C59819E563D4817A7CD8826F8CA26C6C7BFC53CEAA63D88484206DF38F2F5B319D5C32
5,384,134 UART: [art] SIG.R = F8FA9BEE55634F3471A3156BA464404057B3A07B711FA836760DA25A6DBF74C2D8593D98A9EF72EB0BB26FC54EE90032
5,390,884 UART: [art] SIG.S = 1AEC0FADA0021DEA58DD896CCCD8A2B11ADED04414DB07CF08DF1CCBF7D1272A08A94460E0EF1FA1CC7C454A2182C224
5,414,688 UART: mbox::rt_entry...
5,415,060 UART: ____ _ _ _ ____ _____
5,415,844 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,416,644 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,417,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,418,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,418,948 UART: |_|
5,419,260 UART:
5,697,004 UART: [rt] Runtime listening for mailbox commands...
5,698,194 >>> mbox cmd response data (48 bytes)
5,698,195 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,700,978 >>> mbox cmd response data (48 bytes)
5,700,979 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,716,116 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
894,982 UART: [kat] SHA2-512-ACC
896,883 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,725 UART: [fht] Storing FHT @ 0x50003400
1,479,462 UART: [idev] ++
1,479,630 UART: [idev] CDI.KEYID = 6
1,479,990 UART: [idev] SUBJECT.KEYID = 7
1,480,414 UART: [idev] UDS.KEYID = 0
1,480,759 ready_for_fw is high
1,480,759 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,504,940 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,464 UART: [idev] --
1,514,657 UART: [ldev] ++
1,514,825 UART: [ldev] CDI.KEYID = 6
1,515,188 UART: [ldev] SUBJECT.KEYID = 5
1,515,614 UART: [ldev] AUTHORITY.KEYID = 7
1,516,077 UART: [ldev] FE.KEYID = 1
1,521,367 UART: [ldev] Erasing FE.KEYID = 1
1,546,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,330 UART: [ldev] --
1,586,607 UART: [fwproc] Waiting for Commands...
1,587,286 UART: [fwproc] Received command 0x46574c44
1,588,077 UART: [fwproc] Received Image of size 114332 bytes
2,886,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,754 >>> mbox cmd response: success
3,078,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,004 UART: [afmc] ++
3,080,172 UART: [afmc] CDI.KEYID = 6
3,080,534 UART: [afmc] SUBJECT.KEYID = 7
3,080,959 UART: [afmc] AUTHORITY.KEYID = 5
3,116,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,452 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,232 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,845 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,535 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,320 UART: [afmc] --
3,159,250 UART: [cold-reset] --
3,160,128 UART: [state] Locking Datavault
3,161,175 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,779 UART: [state] Locking ICCM
3,162,265 UART: [exit] Launching FMC @ 0x40000130
3,167,594 UART:
3,167,610 UART: Running Caliptra FMC ...
3,168,018 UART:
3,168,072 UART: [state] CFI Enabled
3,178,499 UART: [fht] FMC Alias Private Key: 7
3,286,452 UART: [art] Extend RT PCRs Done
3,286,880 UART: [art] Lock RT PCRs Done
3,288,248 UART: [art] Populate DV Done
3,296,565 UART: [fht] FMC Alias Private Key: 7
3,297,707 UART: [art] Derive CDI
3,297,987 UART: [art] Store in in slot 0x4
3,383,432 UART: [art] Derive Key Pair
3,383,792 UART: [art] Store priv key in slot 0x5
3,396,244 UART: [art] Derive Key Pair - Done
3,411,104 UART: [art] Signing Cert with AUTHO
3,411,584 UART: RITY.KEYID = 7
3,426,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,727 UART: [art] PUB.X = 527E5441844E38A7ECD74E2E70D98C5031B01F5C2F0FFE402672C6DA140080FAFFEA5EC3BA44D28AFCF48EAE0568640E
3,434,482 UART: [art] PUB.Y = 2DAB167E1A617403758233839BAE129F8B8A910CF6A6A9B0A68945CAB8AA4A55BC006A0EADED5A415EE02621C81EE89D
3,441,415 UART: [art] SIG.R = 3442C3ABD3354D31926B5A8C10B891F80939BCEC65218670DF9A47A8230076509E127807259D34D6FC92CB07A177C638
3,448,146 UART: [art] SIG.S = B6128B613C622DA7758D50F72A104FA3A0F3265E026604D802876C9075246110FF0AF88E3457F6C5D33C980F451D7AC4
3,471,370 UART: Caliptra RT
3,471,623 UART: [state] CFI Enabled
3,579,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,422 UART: [rt]cmd =0x54514754, len=24
3,612,379 >>> mbox cmd response data (8 bytes)
3,612,380 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,815 UART: [rt]cmd =0x54514754, len=24
3,643,501 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,679 ready_for_fw is high
1,362,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,340 >>> mbox cmd response: success
2,927,340 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,626 UART:
2,988,642 UART: Running Caliptra FMC ...
2,989,050 UART:
2,989,104 UART: [state] CFI Enabled
2,999,561 UART: [fht] FMC Alias Private Key: 7
3,107,534 UART: [art] Extend RT PCRs Done
3,107,962 UART: [art] Lock RT PCRs Done
3,109,666 UART: [art] Populate DV Done
3,117,855 UART: [fht] FMC Alias Private Key: 7
3,118,917 UART: [art] Derive CDI
3,119,197 UART: [art] Store in in slot 0x4
3,204,934 UART: [art] Derive Key Pair
3,205,294 UART: [art] Store priv key in slot 0x5
3,218,402 UART: [art] Derive Key Pair - Done
3,233,515 UART: [art] Signing Cert with AUTHO
3,233,995 UART: RITY.KEYID = 7
3,249,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,932 UART: [art] PUB.X = ED5ABA72FDCF9AB992342BD9B9EA026D582A0C194892126852B38D2D4BFFF9FD75CB5FDA95F42513D4DD59C95676A94B
3,256,714 UART: [art] PUB.Y = 5359318FCA1B013CBEC378030407EA1965680BC7E2063DFB90AE63FDE4D29F63D490AC8A285E1A44B20BBABA75018C2A
3,263,652 UART: [art] SIG.R = C310A9F001A2D473A7989A643DD80878C91183E93F430F38828067D04CEF4D1E547CD40ACDD2427F0A2860EEF58094EA
3,270,409 UART: [art] SIG.S = 359F73DF6628B4B115EA1FC3968F53AC8530E356181C7F03C50029BDFAF79D891DC60BAFCC75888EEAC0F7967E1CAB09
3,294,413 UART: Caliptra RT
3,294,666 UART: [state] CFI Enabled
3,403,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,033 UART: [rt]cmd =0x54514754, len=24
3,436,148 >>> mbox cmd response data (8 bytes)
3,436,149 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,570 UART: [rt]cmd =0x54514754, len=24
3,466,842 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,776 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 ready_for_fw is high
1,481,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,505,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,883 UART: [idev] --
1,514,824 UART: [ldev] ++
1,514,992 UART: [ldev] CDI.KEYID = 6
1,515,355 UART: [ldev] SUBJECT.KEYID = 5
1,515,781 UART: [ldev] AUTHORITY.KEYID = 7
1,516,244 UART: [ldev] FE.KEYID = 1
1,521,338 UART: [ldev] Erasing FE.KEYID = 1
1,547,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,841 UART: [ldev] --
1,586,316 UART: [fwproc] Waiting for Commands...
1,586,933 UART: [fwproc] Received command 0x46574c44
1,587,724 UART: [fwproc] Received Image of size 114332 bytes
2,884,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,824 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,099 >>> mbox cmd response: success
3,077,099 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,135 UART: [afmc] ++
3,078,303 UART: [afmc] CDI.KEYID = 6
3,078,665 UART: [afmc] SUBJECT.KEYID = 7
3,079,090 UART: [afmc] AUTHORITY.KEYID = 5
3,114,609 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,607 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,492 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,182 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,045 UART: [afmc] --
3,158,121 UART: [cold-reset] --
3,159,075 UART: [state] Locking Datavault
3,160,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,772 UART: [state] Locking ICCM
3,161,260 UART: [exit] Launching FMC @ 0x40000130
3,166,589 UART:
3,166,605 UART: Running Caliptra FMC ...
3,167,013 UART:
3,167,156 UART: [state] CFI Enabled
3,177,851 UART: [fht] FMC Alias Private Key: 7
3,285,422 UART: [art] Extend RT PCRs Done
3,285,850 UART: [art] Lock RT PCRs Done
3,287,468 UART: [art] Populate DV Done
3,295,691 UART: [fht] FMC Alias Private Key: 7
3,296,723 UART: [art] Derive CDI
3,297,003 UART: [art] Store in in slot 0x4
3,382,600 UART: [art] Derive Key Pair
3,382,960 UART: [art] Store priv key in slot 0x5
3,395,948 UART: [art] Derive Key Pair - Done
3,410,791 UART: [art] Signing Cert with AUTHO
3,411,271 UART: RITY.KEYID = 7
3,426,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,660 UART: [art] PUB.X = BA59CBC170DF6092966E0340093DC470640BED7389ACE4D62CD30B5FBBBDD555598A93707F529E769575A237CF3F1C10
3,434,424 UART: [art] PUB.Y = 88D4962556965F282F820235CF18F1DEE3CDC9F5F7F3C48181B83EB2F076B40282E9D55FDEDA432E731072704E1EA648
3,441,370 UART: [art] SIG.R = A5AE16E4F6AACAB8209A7CAB080AE96E09196F48BFE765F4BF6B2F58095CCD1752640D6A478948C91F50CB4026AC8703
3,448,134 UART: [art] SIG.S = F2EAA54ED72936CCA8FE075BEC8DF7BF5977F2DD3044557CE5797C8FB62F00881E428ECCD5CB918DCBBFCF58299B0256
3,471,767 UART: Caliptra RT
3,472,112 UART: [state] CFI Enabled
3,579,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,568 UART: [rt]cmd =0x54514754, len=24
3,612,899 >>> mbox cmd response data (8 bytes)
3,612,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,675 UART: [rt]cmd =0x54514754, len=24
3,643,949 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,698 ready_for_fw is high
1,362,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,791 >>> mbox cmd response: success
2,928,791 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,171 UART:
2,991,187 UART: Running Caliptra FMC ...
2,991,595 UART:
2,991,738 UART: [state] CFI Enabled
3,002,587 UART: [fht] FMC Alias Private Key: 7
3,110,142 UART: [art] Extend RT PCRs Done
3,110,570 UART: [art] Lock RT PCRs Done
3,111,854 UART: [art] Populate DV Done
3,120,207 UART: [fht] FMC Alias Private Key: 7
3,121,313 UART: [art] Derive CDI
3,121,593 UART: [art] Store in in slot 0x4
3,207,544 UART: [art] Derive Key Pair
3,207,904 UART: [art] Store priv key in slot 0x5
3,220,996 UART: [art] Derive Key Pair - Done
3,235,970 UART: [art] Signing Cert with AUTHO
3,236,450 UART: RITY.KEYID = 7
3,251,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,311 UART: [art] PUB.X = A12DA069CE656DAC3EF5A8D210A6B3EA302DDEABD273180D4B5A0F81CE6E9738A5BF794772BF5074F0675B8C85112326
3,259,087 UART: [art] PUB.Y = 80E3575444EDCAEA46BBEAD0148F68F3BE92F02872F3FBF443DFC41D6D56792958BDA4C1F31D063B29C12452E94A17A7
3,266,046 UART: [art] SIG.R = BF2759675461D4A4F8DB1766D625FD43CB34B561F6BC0ADA0549BF87A9FA4F83352B918CA8D548ED38E7BC37EBF07736
3,272,822 UART: [art] SIG.S = 9594F7A72177486EF58270D66AF57CE49F862B0190D36B0BA44BE94BD7B7ECA676DB39860F3E9FF46ED4437DC0C0989B
3,296,668 UART: Caliptra RT
3,297,013 UART: [state] CFI Enabled
3,405,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,471 UART: [rt]cmd =0x54514754, len=24
3,438,840 >>> mbox cmd response data (8 bytes)
3,438,841 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,204 UART: [rt]cmd =0x54514754, len=24
3,469,618 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
893,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,729 UART: [kat] ++
897,881 UART: [kat] sha1
902,259 UART: [kat] SHA2-256
904,199 UART: [kat] SHA2-384
906,810 UART: [kat] SHA2-512-ACC
908,711 UART: [kat] ECC-384
918,392 UART: [kat] HMAC-384Kdf
922,922 UART: [kat] LMS
1,171,250 UART: [kat] --
1,172,131 UART: [cold-reset] ++
1,172,505 UART: [fht] FHT @ 0x50003400
1,175,152 UART: [idev] ++
1,175,320 UART: [idev] CDI.KEYID = 6
1,175,680 UART: [idev] SUBJECT.KEYID = 7
1,176,104 UART: [idev] UDS.KEYID = 0
1,176,449 ready_for_fw is high
1,176,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,108 UART: [idev] Erasing UDS.KEYID = 0
1,201,323 UART: [idev] Sha1 KeyId Algorithm
1,209,847 UART: [idev] --
1,211,081 UART: [ldev] ++
1,211,249 UART: [ldev] CDI.KEYID = 6
1,211,612 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,807 UART: [ldev] Erasing FE.KEYID = 1
1,244,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,191 UART: [ldev] --
1,283,522 UART: [fwproc] Wait for Commands...
1,284,200 UART: [fwproc] Recv command 0x46574c44
1,284,928 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,570 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,801 >>> mbox cmd response: success
2,774,801 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,945 UART: [afmc] ++
2,776,113 UART: [afmc] CDI.KEYID = 6
2,776,475 UART: [afmc] SUBJECT.KEYID = 7
2,776,900 UART: [afmc] AUTHORITY.KEYID = 5
2,812,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,592 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,338 UART: [afmc] --
2,855,238 UART: [cold-reset] --
2,856,192 UART: [state] Locking Datavault
2,857,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,035 UART: [state] Locking ICCM
2,858,527 UART: [exit] Launching FMC @ 0x40000130
2,863,856 UART:
2,863,872 UART: Running Caliptra FMC ...
2,864,280 UART:
2,864,334 UART: [state] CFI Enabled
2,874,969 UART: [fht] FMC Alias Private Key: 7
2,983,086 UART: [art] Extend RT PCRs Done
2,983,514 UART: [art] Lock RT PCRs Done
2,985,128 UART: [art] Populate DV Done
2,993,509 UART: [fht] FMC Alias Private Key: 7
2,994,445 UART: [art] Derive CDI
2,994,725 UART: [art] Store in in slot 0x4
3,080,568 UART: [art] Derive Key Pair
3,080,928 UART: [art] Store priv key in slot 0x5
3,093,916 UART: [art] Derive Key Pair - Done
3,108,784 UART: [art] Signing Cert with AUTHO
3,109,264 UART: RITY.KEYID = 7
3,124,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,959 UART: [art] PUB.X = 76504C27D3C08FDFC48C7B3287212E42D33A3A4AACFE5B740ED5ED5CDD447DEBF2BF1152D56658A72090227E06A409ED
3,131,734 UART: [art] PUB.Y = 6DB96D8DE31BF292E4DA72C42CD475A167F04DD8F8EF3FD0FA0FE4E6865E9C52ACBDA35A323067E2DBA6AD2C6EC54136
3,138,707 UART: [art] SIG.R = 2B60138A73C8C502BF76ECB55897290E1DE5EB85D55BBB3D8BC18B6A81F74E3C19020C5405759BE6AB8585C97BD2FE6C
3,145,474 UART: [art] SIG.S = 9D13802E998A8FA35B8D162A689474B47FF3B398AEC862DD0FEDDE0C7069EC16CBA6BC0B9E989DDA5B74ADE2E17F15C9
3,168,636 UART: Caliptra RT
3,168,889 UART: [state] CFI Enabled
3,277,834 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,230 UART: [rt]cmd =0x54514754, len=24
3,310,623 >>> mbox cmd response data (8 bytes)
3,310,624 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,165 UART: [rt]cmd =0x54514754, len=24
3,341,579 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,201 ready_for_fw is high
1,061,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,720 >>> mbox cmd response: success
2,627,720 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,050 UART:
2,690,066 UART: Running Caliptra FMC ...
2,690,474 UART:
2,690,528 UART: [state] CFI Enabled
2,700,951 UART: [fht] FMC Alias Private Key: 7
2,809,250 UART: [art] Extend RT PCRs Done
2,809,678 UART: [art] Lock RT PCRs Done
2,811,384 UART: [art] Populate DV Done
2,819,753 UART: [fht] FMC Alias Private Key: 7
2,820,699 UART: [art] Derive CDI
2,820,979 UART: [art] Store in in slot 0x4
2,906,760 UART: [art] Derive Key Pair
2,907,120 UART: [art] Store priv key in slot 0x5
2,919,356 UART: [art] Derive Key Pair - Done
2,934,159 UART: [art] Signing Cert with AUTHO
2,934,639 UART: RITY.KEYID = 7
2,949,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,390 UART: [art] PUB.X = 764E995A8AC48322CFD50326B0B354D5779EE57C1CA49226C5F9B5693C211CCD31D0E7FA31FC93CE434837979008412D
2,957,154 UART: [art] PUB.Y = 0A7A980781A5526DC729F6CED7D053FC146A8BE0AB5ACC923AA22BD9A2B098987629EC0F2595649460EFD7F3DB20EC8F
2,964,109 UART: [art] SIG.R = B7A6AA89630C8F33562862492DE26E70AEF841A3A2FC340DB721426793F71BA3106B08B7A6847DA0152536A56FE2B0E9
2,970,870 UART: [art] SIG.S = 9F96127CFF43BD83103F472115B8E1F4AB0DFC6DBFFBB641A1D90A594B6502BF095E138FBEAB9B2825B30A80E8E426E7
2,994,686 UART: Caliptra RT
2,994,939 UART: [state] CFI Enabled
3,103,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,309 UART: [rt]cmd =0x54514754, len=24
3,136,234 >>> mbox cmd response data (8 bytes)
3,136,235 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,626 UART: [rt]cmd =0x54514754, len=24
3,167,030 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,913 UART: [kat] HMAC-384Kdf
923,521 UART: [kat] LMS
1,171,849 UART: [kat] --
1,172,930 UART: [cold-reset] ++
1,173,380 UART: [fht] FHT @ 0x50003400
1,176,137 UART: [idev] ++
1,176,305 UART: [idev] CDI.KEYID = 6
1,176,665 UART: [idev] SUBJECT.KEYID = 7
1,177,089 UART: [idev] UDS.KEYID = 0
1,177,434 ready_for_fw is high
1,177,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,469 UART: [idev] Erasing UDS.KEYID = 0
1,202,154 UART: [idev] Sha1 KeyId Algorithm
1,210,782 UART: [idev] --
1,211,602 UART: [ldev] ++
1,211,770 UART: [ldev] CDI.KEYID = 6
1,212,133 UART: [ldev] SUBJECT.KEYID = 5
1,212,559 UART: [ldev] AUTHORITY.KEYID = 7
1,213,022 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,245,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,964 UART: [ldev] --
1,284,295 UART: [fwproc] Wait for Commands...
1,285,043 UART: [fwproc] Recv command 0x46574c44
1,285,771 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,128 >>> mbox cmd response: success
2,775,128 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,172 UART: [afmc] ++
2,776,340 UART: [afmc] CDI.KEYID = 6
2,776,702 UART: [afmc] SUBJECT.KEYID = 7
2,777,127 UART: [afmc] AUTHORITY.KEYID = 5
2,812,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,461 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,074 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,595 UART: [afmc] --
2,855,547 UART: [cold-reset] --
2,856,547 UART: [state] Locking Datavault
2,857,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,316 UART: [state] Locking ICCM
2,858,836 UART: [exit] Launching FMC @ 0x40000130
2,864,165 UART:
2,864,181 UART: Running Caliptra FMC ...
2,864,589 UART:
2,864,732 UART: [state] CFI Enabled
2,875,465 UART: [fht] FMC Alias Private Key: 7
2,983,672 UART: [art] Extend RT PCRs Done
2,984,100 UART: [art] Lock RT PCRs Done
2,985,686 UART: [art] Populate DV Done
2,993,703 UART: [fht] FMC Alias Private Key: 7
2,994,769 UART: [art] Derive CDI
2,995,049 UART: [art] Store in in slot 0x4
3,080,868 UART: [art] Derive Key Pair
3,081,228 UART: [art] Store priv key in slot 0x5
3,094,776 UART: [art] Derive Key Pair - Done
3,110,042 UART: [art] Signing Cert with AUTHO
3,110,522 UART: RITY.KEYID = 7
3,126,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,873 UART: [art] PUB.X = 4717E54070C568F6C833F8F548800191FCA951B01FF8AD7409A42D315DE573DD8E9477B5143438C566F8A4A8A10FC215
3,133,630 UART: [art] PUB.Y = 2C0BF0559629765379D2527018854461737D2E8F76E190FD20215EAFEFA0FC7CB3CDA0E482803E88C437656CE2EA3CD1
3,140,579 UART: [art] SIG.R = 8A974BD892835EFD26DA6F88AD84A29ED0D101301B0B801EC4B35EB73A24DBD7932547FC8474407F9427292B02D6878C
3,147,342 UART: [art] SIG.S = 0460E93DB55CD5BE40DA88D288773CFB3572BF9FA7242D52B3C65B8B3946940A7473D6B65EACE54057B7DF4AC626335B
3,170,943 UART: Caliptra RT
3,171,288 UART: [state] CFI Enabled
3,279,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,737 UART: [rt]cmd =0x54514754, len=24
3,311,884 >>> mbox cmd response data (8 bytes)
3,311,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,318 UART: [rt]cmd =0x54514754, len=24
3,342,478 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 ready_for_fw is high
1,060,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,713 >>> mbox cmd response: success
2,627,713 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,085 UART:
2,690,101 UART: Running Caliptra FMC ...
2,690,509 UART:
2,690,652 UART: [state] CFI Enabled
2,701,079 UART: [fht] FMC Alias Private Key: 7
2,808,996 UART: [art] Extend RT PCRs Done
2,809,424 UART: [art] Lock RT PCRs Done
2,811,088 UART: [art] Populate DV Done
2,819,139 UART: [fht] FMC Alias Private Key: 7
2,820,259 UART: [art] Derive CDI
2,820,539 UART: [art] Store in in slot 0x4
2,905,980 UART: [art] Derive Key Pair
2,906,340 UART: [art] Store priv key in slot 0x5
2,919,826 UART: [art] Derive Key Pair - Done
2,934,466 UART: [art] Signing Cert with AUTHO
2,934,946 UART: RITY.KEYID = 7
2,950,240 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,005 UART: [art] PUB.X = F3E15E9F0F21C4AB7244E168C01B30C8F447D8E86D4E8A6687FD26E9599A170FEB85C7E99729472F8828AC74DE9EC62B
2,957,777 UART: [art] PUB.Y = 97A6833E945A3C9C463D96DF31664429521CA214CF7C40F89487411097F5B89ADE57D2523BD39B5A974426775CCFA2F4
2,964,723 UART: [art] SIG.R = 43F15457714C5396BD1E1CC468CF3B52EA6E9BD890FB115B9453399DBD292B09CE70D5301185CD2DA6E0671DD5D1F315
2,971,496 UART: [art] SIG.S = FEC61E18907AE0F98B2AE2A1D43F04CBA29FEDA042C18E4876C5159116387926206D913B6519618AEC8A45C36B1FD5F2
2,995,366 UART: Caliptra RT
2,995,711 UART: [state] CFI Enabled
3,103,434 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,856 UART: [rt]cmd =0x54514754, len=24
3,135,949 >>> mbox cmd response data (8 bytes)
3,135,950 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,321 UART: [rt]cmd =0x54514754, len=24
3,166,887 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 ready_for_fw is high
1,174,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,199,439 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,354 UART: [ldev] ++
1,209,522 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,313 UART: [ldev] AUTHORITY.KEYID = 7
1,210,776 UART: [ldev] FE.KEYID = 1
1,216,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,234 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,885 >>> mbox cmd response: success
2,772,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,128 UART: [afmc] ++
2,774,296 UART: [afmc] CDI.KEYID = 6
2,774,659 UART: [afmc] SUBJECT.KEYID = 7
2,775,085 UART: [afmc] AUTHORITY.KEYID = 5
2,810,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,811 UART: [afmc] --
2,853,695 UART: [cold-reset] --
2,854,657 UART: [state] Locking Datavault
2,855,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,462 UART: [state] Locking ICCM
2,857,068 UART: [exit] Launching FMC @ 0x40000130
2,862,397 UART:
2,862,413 UART: Running Caliptra FMC ...
2,862,821 UART:
2,862,875 UART: [state] CFI Enabled
2,873,740 UART: [fht] FMC Alias Private Key: 7
2,981,419 UART: [art] Extend RT PCRs Done
2,981,847 UART: [art] Lock RT PCRs Done
2,983,241 UART: [art] Populate DV Done
2,991,358 UART: [fht] FMC Alias Private Key: 7
2,992,514 UART: [art] Derive CDI
2,992,794 UART: [art] Store in in slot 0x4
3,078,253 UART: [art] Derive Key Pair
3,078,613 UART: [art] Store priv key in slot 0x5
3,091,819 UART: [art] Derive Key Pair - Done
3,106,316 UART: [art] Signing Cert with AUTHO
3,106,796 UART: RITY.KEYID = 7
3,122,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,267 UART: [art] PUB.X = 92608302FDE97D885C20044C2AEE9BA239E8AAA6A848A368588579176B75092C6595DFA458FD6BF6D342EBED462E04F7
3,130,029 UART: [art] PUB.Y = 80DD946E5D36C167D778FDD4A9DA50E05481909F26724A62099FCD0BC53C1D7BA45C0C23A5C72F1DB0E00866F682E796
3,136,973 UART: [art] SIG.R = 5E77D02AD9201288C291C53CC156AC4BD14F3E874B1C0ECA437165FF419EDA3B6F1BEECD3302A1675A167A476D03AF8B
3,143,748 UART: [art] SIG.S = EFFF57A6F586A3CA391DDB506E664F82B4649AB82420364B89F200EBE58B9C5B2B046BD80C9DA422F43F40ABADA97AC3
3,167,681 UART: Caliptra RT
3,167,934 UART: [state] CFI Enabled
3,275,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,807 UART: [rt]cmd =0x54514754, len=24
3,307,878 >>> mbox cmd response data (8 bytes)
3,307,879 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,514 UART: [rt]cmd =0x54514754, len=24
3,339,100 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,746 ready_for_fw is high
1,055,746 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,069 >>> mbox cmd response: success
2,621,069 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,531 UART:
2,682,547 UART: Running Caliptra FMC ...
2,682,955 UART:
2,683,009 UART: [state] CFI Enabled
2,693,606 UART: [fht] FMC Alias Private Key: 7
2,801,497 UART: [art] Extend RT PCRs Done
2,801,925 UART: [art] Lock RT PCRs Done
2,803,389 UART: [art] Populate DV Done
2,811,924 UART: [fht] FMC Alias Private Key: 7
2,813,020 UART: [art] Derive CDI
2,813,300 UART: [art] Store in in slot 0x4
2,898,853 UART: [art] Derive Key Pair
2,899,213 UART: [art] Store priv key in slot 0x5
2,912,317 UART: [art] Derive Key Pair - Done
2,927,407 UART: [art] Signing Cert with AUTHO
2,927,887 UART: RITY.KEYID = 7
2,943,021 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,786 UART: [art] PUB.X = 69001AFDAA1CCEB37DCC698E677CC668E83B618E87F6131D5B99DEF9AC283F4A4786A31BA1E66C7469CE6073FE4C5167
2,950,548 UART: [art] PUB.Y = EF42B58ED96BCC91E58A06C2C5C0D720B46557D69C856B33D8BC75BCAC424440FD225A6FBC38BA31EF903A25F44123EE
2,957,511 UART: [art] SIG.R = 9FED8205416D2BE6DF17B42178BDFFE472CC76D561FE0D17A4A18B5DEC6C6F0479D29017A9B5296BD344E5FB3E8BF8C1
2,964,290 UART: [art] SIG.S = 4A08EDC9733385BF6E83F79870806179CD5BD15D833E136B71C6B53CABFAEAC83D9607CBC949F3A356060355F6DEC28D
2,988,261 UART: Caliptra RT
2,988,514 UART: [state] CFI Enabled
3,095,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,349 UART: [rt]cmd =0x54514754, len=24
3,128,266 >>> mbox cmd response data (8 bytes)
3,128,267 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,848 UART: [rt]cmd =0x54514754, len=24
3,159,230 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,948 UART: [idev] ++
1,173,116 UART: [idev] CDI.KEYID = 6
1,173,477 UART: [idev] SUBJECT.KEYID = 7
1,173,902 UART: [idev] UDS.KEYID = 0
1,174,248 ready_for_fw is high
1,174,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,859 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,295 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,870 >>> mbox cmd response: success
2,772,870 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,979 UART: [afmc] ++
2,774,147 UART: [afmc] CDI.KEYID = 6
2,774,510 UART: [afmc] SUBJECT.KEYID = 7
2,774,936 UART: [afmc] AUTHORITY.KEYID = 5
2,810,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,630 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,022 UART: [afmc] --
2,853,910 UART: [cold-reset] --
2,854,752 UART: [state] Locking Datavault
2,855,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,533 UART: [state] Locking ICCM
2,857,077 UART: [exit] Launching FMC @ 0x40000130
2,862,406 UART:
2,862,422 UART: Running Caliptra FMC ...
2,862,830 UART:
2,862,973 UART: [state] CFI Enabled
2,873,318 UART: [fht] FMC Alias Private Key: 7
2,981,397 UART: [art] Extend RT PCRs Done
2,981,825 UART: [art] Lock RT PCRs Done
2,983,491 UART: [art] Populate DV Done
2,991,734 UART: [fht] FMC Alias Private Key: 7
2,992,756 UART: [art] Derive CDI
2,993,036 UART: [art] Store in in slot 0x4
3,078,279 UART: [art] Derive Key Pair
3,078,639 UART: [art] Store priv key in slot 0x5
3,091,657 UART: [art] Derive Key Pair - Done
3,106,577 UART: [art] Signing Cert with AUTHO
3,107,057 UART: RITY.KEYID = 7
3,121,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,634 UART: [art] PUB.X = ADF8D5384D36C8914729FCF8B1E3EAB2B11FCAF86A42C7EE11A9A90A628D0E8274F39064F414C70A8D5C90BCA38EE8E5
3,129,413 UART: [art] PUB.Y = EDA3E0408B4381A03703A332B8994129B37FA505B484C718E05E6418BA2EA3D9EFE72FBDE978755D29AA4275008C1890
3,136,335 UART: [art] SIG.R = 4ECB7EAE43BFAD728A2F017F745F10C92A1A885985CEBCBB1D324FB675488417AF05D6275B8734D3403E119EB3EA0AC7
3,143,110 UART: [art] SIG.S = 14E369A4E32307EE6CCCA7016CC6E9D43426F2861605FB8700750A04D1CA2C5F12C18072E9D6B208CD5E003241ED420C
3,167,176 UART: Caliptra RT
3,167,521 UART: [state] CFI Enabled
3,275,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,084 UART: [rt]cmd =0x54514754, len=24
3,308,113 >>> mbox cmd response data (8 bytes)
3,308,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,841 UART: [rt]cmd =0x54514754, len=24
3,339,321 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,217 ready_for_fw is high
1,056,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,528 >>> mbox cmd response: success
2,621,528 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,360 UART:
2,683,376 UART: Running Caliptra FMC ...
2,683,784 UART:
2,683,927 UART: [state] CFI Enabled
2,694,654 UART: [fht] FMC Alias Private Key: 7
2,802,035 UART: [art] Extend RT PCRs Done
2,802,463 UART: [art] Lock RT PCRs Done
2,803,691 UART: [art] Populate DV Done
2,811,930 UART: [fht] FMC Alias Private Key: 7
2,813,070 UART: [art] Derive CDI
2,813,350 UART: [art] Store in in slot 0x4
2,899,275 UART: [art] Derive Key Pair
2,899,635 UART: [art] Store priv key in slot 0x5
2,913,053 UART: [art] Derive Key Pair - Done
2,927,829 UART: [art] Signing Cert with AUTHO
2,928,309 UART: RITY.KEYID = 7
2,943,281 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,046 UART: [art] PUB.X = FB860B1044C37E12A3C4CB31536161ABB5E3C9AE1784B940E651C713FB5DB3DAB23FE6FA7E92BD27B009FBAFAE6B1DCC
2,950,836 UART: [art] PUB.Y = 716BB018B930CD038A3A939F734356321B35BCC92AFB2A2E31CC5CBF4FAED621CAF590CD124FACA29052D28A414D8DF4
2,957,801 UART: [art] SIG.R = CC90EA94E4C59D8E6D706738D9094FEE2D349A4F9AB395A3B68FDB36FF5A5CCCECD7B8A1AB19A5B20E419E85C8C5EFEE
2,964,595 UART: [art] SIG.S = 25EEADD31E8904DA03CE51FFC85DCBE5A26BAA2261ECD3E7366C5AAA52843D1C17E15BBB581D5D07A398EFE3305704D2
2,988,118 UART: Caliptra RT
2,988,463 UART: [state] CFI Enabled
3,096,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,904 UART: [rt]cmd =0x54514754, len=24
3,129,101 >>> mbox cmd response data (8 bytes)
3,129,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,425 UART: [rt]cmd =0x54514754, len=24
3,159,615 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,353 UART: [kat] SHA2-256
882,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,399 UART: [kat] ++
886,551 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,464 UART: [kat] SHA2-512-ACC
897,365 UART: [kat] ECC-384
902,690 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,503 UART: [cold-reset] ++
1,477,039 UART: [fht] Storing FHT @ 0x50003400
1,479,920 UART: [idev] ++
1,480,088 UART: [idev] CDI.KEYID = 6
1,480,448 UART: [idev] SUBJECT.KEYID = 7
1,480,872 UART: [idev] UDS.KEYID = 0
1,481,217 ready_for_fw is high
1,481,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,734 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,686 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,770 UART: [ldev] --
1,586,167 UART: [fwproc] Waiting for Commands...
1,586,790 UART: [fwproc] Received command 0x46574c44
1,587,581 UART: [fwproc] Received Image of size 114332 bytes
2,885,769 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,373 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,552 >>> mbox cmd response: success
3,078,552 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,079,602 UART: [afmc] ++
3,079,770 UART: [afmc] CDI.KEYID = 6
3,080,132 UART: [afmc] SUBJECT.KEYID = 7
3,080,557 UART: [afmc] AUTHORITY.KEYID = 5
3,115,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,438 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,831 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,521 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,430 UART: [afmc] --
3,158,560 UART: [cold-reset] --
3,159,698 UART: [state] Locking Datavault
3,160,845 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,449 UART: [state] Locking ICCM
3,162,077 UART: [exit] Launching FMC @ 0x40000130
3,167,406 UART:
3,167,422 UART: Running Caliptra FMC ...
3,167,830 UART:
3,167,884 UART: [state] CFI Enabled
3,178,853 UART: [fht] FMC Alias Private Key: 7
3,287,236 UART: [art] Extend RT PCRs Done
3,287,664 UART: [art] Lock RT PCRs Done
3,289,088 UART: [art] Populate DV Done
3,297,365 UART: [fht] FMC Alias Private Key: 7
3,298,327 UART: [art] Derive CDI
3,298,607 UART: [art] Store in in slot 0x4
3,384,566 UART: [art] Derive Key Pair
3,384,926 UART: [art] Store priv key in slot 0x5
3,397,836 UART: [art] Derive Key Pair - Done
3,412,653 UART: [art] Signing Cert with AUTHO
3,413,133 UART: RITY.KEYID = 7
3,428,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,382 UART: [art] PUB.X = AAEA598E98B1F1094B02F8DE89C0985EC2A25453D23E0B55C19C5BFD60B8BFEEA825E63C2400FF253A07979BD8778101
3,436,125 UART: [art] PUB.Y = D766ADA6765B7EF5DA1E98A3B6C830FA3ED3378ACAE2977497DE4721D33F34647D81A105AC083EE432D7C108120FD413
3,443,071 UART: [art] SIG.R = ED446FBDB51DAE2472F884827AA3CD582F94E7712750C5A94A933A060B904B81F8B3DE83AEBCBB41CED57F9BF96EE3F6
3,449,855 UART: [art] SIG.S = 523108F27CDF3FD8047067E8B466FC793D764E6F4DA031C0788340C6AF32522CDE7E6B49E663471599C70C7EF3DAF11A
3,473,763 UART: Caliptra RT
3,474,016 UART: [state] CFI Enabled
3,581,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,201 UART: [rt]cmd =0x47544744, len=8
3,613,734 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,251 ready_for_fw is high
1,362,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,158 >>> mbox cmd response: success
2,926,158 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,988,088 UART:
2,988,104 UART: Running Caliptra FMC ...
2,988,512 UART:
2,988,566 UART: [state] CFI Enabled
2,998,873 UART: [fht] FMC Alias Private Key: 7
3,107,154 UART: [art] Extend RT PCRs Done
3,107,582 UART: [art] Lock RT PCRs Done
3,109,116 UART: [art] Populate DV Done
3,117,405 UART: [fht] FMC Alias Private Key: 7
3,118,395 UART: [art] Derive CDI
3,118,675 UART: [art] Store in in slot 0x4
3,204,146 UART: [art] Derive Key Pair
3,204,506 UART: [art] Store priv key in slot 0x5
3,217,710 UART: [art] Derive Key Pair - Done
3,232,457 UART: [art] Signing Cert with AUTHO
3,232,937 UART: RITY.KEYID = 7
3,248,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,150 UART: [art] PUB.X = 63A456B22AA20EBCF4C7460935C0220C2979242843F61BA14758B76127845207E4DF5B899E8AAD1F105E00E1A507E5EF
3,255,881 UART: [art] PUB.Y = AC03A62BEC232221720B8F343BEBE9C8862444AF7CE95E31C66C2D88B021F70979B683DEA9C1AA72C1360935BF418B10
3,262,825 UART: [art] SIG.R = 54C0F96102F9BF6E215B1C4C61BA6F4E32DB0A03DDD9A511E9541528CAE97187B111765236EFEC9F3723F4E89E5D3001
3,269,589 UART: [art] SIG.S = C20B20959F95FE427A90C906F1C0B0F93ED73F1BF472599F6F9AA2E7A78D107C179E5221A0CEA5A801FAF08511175A23
3,293,147 UART: Caliptra RT
3,293,400 UART: [state] CFI Enabled
3,402,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,101 UART: [rt]cmd =0x47544744, len=8
3,434,512 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,468 UART: [kat] SHA2-256
892,406 UART: [kat] SHA2-384
895,099 UART: [kat] SHA2-512-ACC
897,000 UART: [kat] ECC-384
902,601 UART: [kat] HMAC-384Kdf
907,211 UART: [kat] LMS
1,475,407 UART: [kat] --
1,476,502 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,579 UART: [idev] ++
1,479,747 UART: [idev] CDI.KEYID = 6
1,480,107 UART: [idev] SUBJECT.KEYID = 7
1,480,531 UART: [idev] UDS.KEYID = 0
1,480,876 ready_for_fw is high
1,480,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,541 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,041 UART: [idev] --
1,515,198 UART: [ldev] ++
1,515,366 UART: [ldev] CDI.KEYID = 6
1,515,729 UART: [ldev] SUBJECT.KEYID = 5
1,516,155 UART: [ldev] AUTHORITY.KEYID = 7
1,516,618 UART: [ldev] FE.KEYID = 1
1,521,870 UART: [ldev] Erasing FE.KEYID = 1
1,547,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,881 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,879 UART: [fwproc] Received command 0x46574c44
1,588,670 UART: [fwproc] Received Image of size 114332 bytes
2,885,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,137 >>> mbox cmd response: success
3,078,137 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,079,285 UART: [afmc] ++
3,079,453 UART: [afmc] CDI.KEYID = 6
3,079,815 UART: [afmc] SUBJECT.KEYID = 7
3,080,240 UART: [afmc] AUTHORITY.KEYID = 5
3,114,515 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,699 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,312 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,002 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,079 UART: [afmc] --
3,158,089 UART: [cold-reset] --
3,159,003 UART: [state] Locking Datavault
3,159,984 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,588 UART: [state] Locking ICCM
3,161,158 UART: [exit] Launching FMC @ 0x40000130
3,166,487 UART:
3,166,503 UART: Running Caliptra FMC ...
3,166,911 UART:
3,167,054 UART: [state] CFI Enabled
3,177,643 UART: [fht] FMC Alias Private Key: 7
3,285,720 UART: [art] Extend RT PCRs Done
3,286,148 UART: [art] Lock RT PCRs Done
3,287,660 UART: [art] Populate DV Done
3,295,877 UART: [fht] FMC Alias Private Key: 7
3,296,855 UART: [art] Derive CDI
3,297,135 UART: [art] Store in in slot 0x4
3,382,776 UART: [art] Derive Key Pair
3,383,136 UART: [art] Store priv key in slot 0x5
3,396,670 UART: [art] Derive Key Pair - Done
3,411,251 UART: [art] Signing Cert with AUTHO
3,411,731 UART: RITY.KEYID = 7
3,426,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,468 UART: [art] PUB.X = E143DBF45A5DD3DE5E57F396AE0F50AA99E39796D96116F00311996CFCD15F3A51BBCD21B7AE41272C694B05469603B7
3,434,234 UART: [art] PUB.Y = 70D3C83B61AFC1E71F06A613BEDC21FB19EFD0C86DEC12319E17237D0A3BFE1596A39183CE9CC43B6AB80B6A346C126A
3,441,193 UART: [art] SIG.R = 913C5987E4A730CC8AFE604C197BCD95BD96EF543A07BFF7E18DC5E35963276D1D723283BA0F82B3EE5367AD01E16B2E
3,447,966 UART: [art] SIG.S = ADF0389903BFFA5EF653242A02259F6CE7920773171D75B2291076011DAC3D52AB8F24DA6D1A6DA5BF1C047EBC1436CE
3,471,724 UART: Caliptra RT
3,472,069 UART: [state] CFI Enabled
3,580,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,823 UART: [rt]cmd =0x47544744, len=8
3,612,286 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,538 ready_for_fw is high
1,363,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,929 >>> mbox cmd response: success
2,928,929 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,989,745 UART:
2,989,761 UART: Running Caliptra FMC ...
2,990,169 UART:
2,990,312 UART: [state] CFI Enabled
3,001,171 UART: [fht] FMC Alias Private Key: 7
3,109,478 UART: [art] Extend RT PCRs Done
3,109,906 UART: [art] Lock RT PCRs Done
3,111,428 UART: [art] Populate DV Done
3,119,937 UART: [fht] FMC Alias Private Key: 7
3,120,913 UART: [art] Derive CDI
3,121,193 UART: [art] Store in in slot 0x4
3,207,208 UART: [art] Derive Key Pair
3,207,568 UART: [art] Store priv key in slot 0x5
3,221,112 UART: [art] Derive Key Pair - Done
3,235,918 UART: [art] Signing Cert with AUTHO
3,236,398 UART: RITY.KEYID = 7
3,251,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,403 UART: [art] PUB.X = 8F73746AEC7C576A6601073392BFC7B798D6B1B6411BB6032F9123E571188850538BD38311A36F6AD42A35351C4B3FAD
3,259,160 UART: [art] PUB.Y = D9424366E4D1D7D26F77C0AB421C5C0090FB3E512671DFA77E9662E08A39499D51317BE38A62EDA231C6109413A30E3A
3,266,085 UART: [art] SIG.R = C7F4B8DA5C4784353966DFF60B6F57DCC10C27E9627233B96159616403D58B5DC12C3607F09F4B60D78BCF609680F2E0
3,272,843 UART: [art] SIG.S = B642B41EFB46E8131CE35B7BE97D2824C47E2EC264B4B5B9AE5BF128974E01495906FFC77CEA1995960947CC550A1AB0
3,296,416 UART: Caliptra RT
3,296,761 UART: [state] CFI Enabled
3,404,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,875 UART: [rt]cmd =0x47544744, len=8
3,436,540 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
893,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,285 UART: [kat] ++
897,437 UART: [kat] sha1
901,579 UART: [kat] SHA2-256
903,519 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,622 UART: [kat] LMS
1,170,950 UART: [kat] --
1,171,903 UART: [cold-reset] ++
1,172,397 UART: [fht] FHT @ 0x50003400
1,174,996 UART: [idev] ++
1,175,164 UART: [idev] CDI.KEYID = 6
1,175,524 UART: [idev] SUBJECT.KEYID = 7
1,175,948 UART: [idev] UDS.KEYID = 0
1,176,293 ready_for_fw is high
1,176,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,122 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,234 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,363 UART: [ldev] --
1,282,632 UART: [fwproc] Wait for Commands...
1,283,316 UART: [fwproc] Recv command 0x46574c44
1,284,044 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,569 >>> mbox cmd response: success
2,774,569 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,775,621 UART: [afmc] ++
2,775,789 UART: [afmc] CDI.KEYID = 6
2,776,151 UART: [afmc] SUBJECT.KEYID = 7
2,776,576 UART: [afmc] AUTHORITY.KEYID = 5
2,811,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,014 UART: [afmc] --
2,854,978 UART: [cold-reset] --
2,855,872 UART: [state] Locking Datavault
2,857,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,851 UART: [state] Locking ICCM
2,858,485 UART: [exit] Launching FMC @ 0x40000130
2,863,814 UART:
2,863,830 UART: Running Caliptra FMC ...
2,864,238 UART:
2,864,292 UART: [state] CFI Enabled
2,874,631 UART: [fht] FMC Alias Private Key: 7
2,982,950 UART: [art] Extend RT PCRs Done
2,983,378 UART: [art] Lock RT PCRs Done
2,984,822 UART: [art] Populate DV Done
2,993,105 UART: [fht] FMC Alias Private Key: 7
2,994,181 UART: [art] Derive CDI
2,994,461 UART: [art] Store in in slot 0x4
3,079,366 UART: [art] Derive Key Pair
3,079,726 UART: [art] Store priv key in slot 0x5
3,092,998 UART: [art] Derive Key Pair - Done
3,107,452 UART: [art] Signing Cert with AUTHO
3,107,932 UART: RITY.KEYID = 7
3,123,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,365 UART: [art] PUB.X = BC233FD6EE5028866D4FDE144C57D16D57EC6F1664AAC4905BEC07F19AA199AB82EA455E1E089BA270D271A3D4C9ED3B
3,131,147 UART: [art] PUB.Y = 6B0DD424EFFC7BC4E0539684E7F5BE83484CDD16FA6A4C465AFBB6CD0EB55AFB8F15FED35767433BCAFCD63EC2A1D7F8
3,138,123 UART: [art] SIG.R = 3ACA84C6D502F861ADA87E864D1238FAEC5F2F34DD3873AB8A9267358069C8CA27420165A0CCEDBA9C8BEACEA5DE85E5
3,144,909 UART: [art] SIG.S = 1FC12321933498ABCE064645E3F010661F1DD01918C963ADF5A8EB8F2FAF49FAECFE10B6D1C8CB9B6B734E26D47DBD9E
3,168,919 UART: Caliptra RT
3,169,172 UART: [state] CFI Enabled
3,276,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,397 UART: [rt]cmd =0x47544744, len=8
3,308,872 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,115 ready_for_fw is high
1,060,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,380 >>> mbox cmd response: success
2,623,380 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,078 UART:
2,685,094 UART: Running Caliptra FMC ...
2,685,502 UART:
2,685,556 UART: [state] CFI Enabled
2,695,793 UART: [fht] FMC Alias Private Key: 7
2,803,954 UART: [art] Extend RT PCRs Done
2,804,382 UART: [art] Lock RT PCRs Done
2,806,036 UART: [art] Populate DV Done
2,814,479 UART: [fht] FMC Alias Private Key: 7
2,815,609 UART: [art] Derive CDI
2,815,889 UART: [art] Store in in slot 0x4
2,901,218 UART: [art] Derive Key Pair
2,901,578 UART: [art] Store priv key in slot 0x5
2,915,088 UART: [art] Derive Key Pair - Done
2,929,895 UART: [art] Signing Cert with AUTHO
2,930,375 UART: RITY.KEYID = 7
2,945,565 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,330 UART: [art] PUB.X = 46CD357B36418FC4CF8A4537E8E30538D11F7EB7584C79ADC20EA389EF9D4F33167A5345C1A03BB7DACD67D3DBDF4222
2,953,108 UART: [art] PUB.Y = 4611F9CED71E40C842927ED1D0AB96341CA3ED7333BEDA2472B2909B6E96D7589A1142BD1A08FE0D3D9381ABF2539876
2,960,058 UART: [art] SIG.R = E71308E618691192D625C68CE1413A818C85D3056BC78D9EB7AF847285CFB36F8CCBE122DF98FCCCB0A18385D33AB4FA
2,966,834 UART: [art] SIG.S = 01158B2952C227C3A678694769953C8043814297CE5251DE03483E33626BE8F3A64B1882C0C75F778BDB3EA29EE5C275
2,990,815 UART: Caliptra RT
2,991,068 UART: [state] CFI Enabled
3,098,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,085 UART: [rt]cmd =0x47544744, len=8
3,130,652 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,829 UART: [kat] SHA2-512-ACC
908,730 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,756 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 ready_for_fw is high
1,177,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,001 UART: [idev] Erasing UDS.KEYID = 0
1,202,720 UART: [idev] Sha1 KeyId Algorithm
1,211,190 UART: [idev] --
1,212,256 UART: [ldev] ++
1,212,424 UART: [ldev] CDI.KEYID = 6
1,212,787 UART: [ldev] SUBJECT.KEYID = 5
1,213,213 UART: [ldev] AUTHORITY.KEYID = 7
1,213,676 UART: [ldev] FE.KEYID = 1
1,218,704 UART: [ldev] Erasing FE.KEYID = 1
1,244,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,486 UART: [ldev] --
1,283,861 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,206 >>> mbox cmd response: success
2,775,206 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,776,324 UART: [afmc] ++
2,776,492 UART: [afmc] CDI.KEYID = 6
2,776,854 UART: [afmc] SUBJECT.KEYID = 7
2,777,279 UART: [afmc] AUTHORITY.KEYID = 5
2,813,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,245 UART: [afmc] --
2,856,303 UART: [cold-reset] --
2,857,093 UART: [state] Locking Datavault
2,858,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,042 UART: [state] Locking ICCM
2,859,504 UART: [exit] Launching FMC @ 0x40000130
2,864,833 UART:
2,864,849 UART: Running Caliptra FMC ...
2,865,257 UART:
2,865,400 UART: [state] CFI Enabled
2,875,985 UART: [fht] FMC Alias Private Key: 7
2,984,508 UART: [art] Extend RT PCRs Done
2,984,936 UART: [art] Lock RT PCRs Done
2,986,442 UART: [art] Populate DV Done
2,994,633 UART: [fht] FMC Alias Private Key: 7
2,995,581 UART: [art] Derive CDI
2,995,861 UART: [art] Store in in slot 0x4
3,081,462 UART: [art] Derive Key Pair
3,081,822 UART: [art] Store priv key in slot 0x5
3,095,558 UART: [art] Derive Key Pair - Done
3,110,474 UART: [art] Signing Cert with AUTHO
3,110,954 UART: RITY.KEYID = 7
3,126,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,179 UART: [art] PUB.X = 17B7D8FC0DFE0A61B393DBF343441B9F17A98427AE3EA5EF145C8296A8E7AAB9EB415C6B40C7CFDF8ED874237389B323
3,133,959 UART: [art] PUB.Y = AA0572FA3753A9F3534FA63D5D686DF7706DA02B051219A758B8E6220BFBF799484C6AB90D65AB613003148E574C4529
3,140,892 UART: [art] SIG.R = C26A81F7C81D434580501AADE913C8D07D5F87F55381DBE30201192A5F7CEAC1323249CB19346CAD0FA8574118A4736E
3,147,655 UART: [art] SIG.S = E983A1DBD3336361B23D527580DF32760F4C22FD66B1801C54618113DF8D51BFF4C11C65CEE2BEC414F9092AC166BA82
3,171,422 UART: Caliptra RT
3,171,767 UART: [state] CFI Enabled
3,279,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,413 UART: [rt]cmd =0x47544744, len=8
3,311,808 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 ready_for_fw is high
1,060,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,313 >>> mbox cmd response: success
2,626,313 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,688,517 UART:
2,688,533 UART: Running Caliptra FMC ...
2,688,941 UART:
2,689,084 UART: [state] CFI Enabled
2,699,759 UART: [fht] FMC Alias Private Key: 7
2,807,374 UART: [art] Extend RT PCRs Done
2,807,802 UART: [art] Lock RT PCRs Done
2,809,018 UART: [art] Populate DV Done
2,817,323 UART: [fht] FMC Alias Private Key: 7
2,818,385 UART: [art] Derive CDI
2,818,665 UART: [art] Store in in slot 0x4
2,904,478 UART: [art] Derive Key Pair
2,904,838 UART: [art] Store priv key in slot 0x5
2,918,674 UART: [art] Derive Key Pair - Done
2,933,492 UART: [art] Signing Cert with AUTHO
2,933,972 UART: RITY.KEYID = 7
2,949,390 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,155 UART: [art] PUB.X = 30298309F92CA4A107B1B936512BAE6117AF91B2EBD49A1AC79DC7E3977A485D1CA46809739F82F8EA6596B67BE1E286
2,956,920 UART: [art] PUB.Y = BFC0195835FCCE4FEE5004E46F30B514578F4F21FA99E89FD8E36356B77E5CB37B907A2602D49099562C7DF9BEA471C3
2,963,872 UART: [art] SIG.R = 9FAA49DF75AB348E00971216C486D758EA04231D375F6E658514DCC6FBE338095FDA3A6D19EF950BFF992BD5A4F66DBD
2,970,625 UART: [art] SIG.S = C130E5F8C1A7C75CF7FBD00583226CDE33060FB9A41AD549B91347FE2DB71739C853C1BBC65896E570998C007C591D86
2,994,523 UART: Caliptra RT
2,994,868 UART: [state] CFI Enabled
3,103,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,536 UART: [rt]cmd =0x47544744, len=8
3,135,209 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,874 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,825 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,174,833 ready_for_fw is high
1,174,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,285 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x46574c44
1,282,124 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,117 >>> mbox cmd response: success
2,772,117 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,773,214 UART: [afmc] ++
2,773,382 UART: [afmc] CDI.KEYID = 6
2,773,745 UART: [afmc] SUBJECT.KEYID = 7
2,774,171 UART: [afmc] AUTHORITY.KEYID = 5
2,809,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,097 UART: [afmc] --
2,853,043 UART: [cold-reset] --
2,853,855 UART: [state] Locking Datavault
2,855,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,954 UART: [state] Locking ICCM
2,856,430 UART: [exit] Launching FMC @ 0x40000130
2,861,759 UART:
2,861,775 UART: Running Caliptra FMC ...
2,862,183 UART:
2,862,237 UART: [state] CFI Enabled
2,873,080 UART: [fht] FMC Alias Private Key: 7
2,981,525 UART: [art] Extend RT PCRs Done
2,981,953 UART: [art] Lock RT PCRs Done
2,983,509 UART: [art] Populate DV Done
2,991,616 UART: [fht] FMC Alias Private Key: 7
2,992,648 UART: [art] Derive CDI
2,992,928 UART: [art] Store in in slot 0x4
3,078,691 UART: [art] Derive Key Pair
3,079,051 UART: [art] Store priv key in slot 0x5
3,092,501 UART: [art] Derive Key Pair - Done
3,107,088 UART: [art] Signing Cert with AUTHO
3,107,568 UART: RITY.KEYID = 7
3,122,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,351 UART: [art] PUB.X = 05557DE131DE9896D4500CF485AFAABAE222B4D4AA2691A78431635D15EDA3BEA21A07D7FF6E1D35E0128776C18F2C8B
3,130,124 UART: [art] PUB.Y = C9E983CD5D74199FCBE83D1A99121096D2F74B0A2AC291C027F5D519FC78B1AA91639875DE8123DAF4F0A84E76583050
3,137,075 UART: [art] SIG.R = 5D03F72B93EA9409CC6E35D0626A7F9D3F5FAFE5218DCD2D211D7D51E6BF445594C979AA3E7F9702AE954C637E6BBE50
3,143,850 UART: [art] SIG.S = DE991BDB0403F81FA767321F34E51C3E93E2A1301F22D50B1CF583D1EA9F98AA8ECD402164803E79734C1311DCA9D09C
3,166,876 UART: Caliptra RT
3,167,129 UART: [state] CFI Enabled
3,276,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,558 UART: [rt]cmd =0x47544744, len=8
3,308,227 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,576 ready_for_fw is high
1,056,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,799 >>> mbox cmd response: success
2,624,799 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,629 UART:
2,685,645 UART: Running Caliptra FMC ...
2,686,053 UART:
2,686,107 UART: [state] CFI Enabled
2,696,762 UART: [fht] FMC Alias Private Key: 7
2,805,181 UART: [art] Extend RT PCRs Done
2,805,609 UART: [art] Lock RT PCRs Done
2,807,203 UART: [art] Populate DV Done
2,815,378 UART: [fht] FMC Alias Private Key: 7
2,816,388 UART: [art] Derive CDI
2,816,668 UART: [art] Store in in slot 0x4
2,902,253 UART: [art] Derive Key Pair
2,902,613 UART: [art] Store priv key in slot 0x5
2,916,045 UART: [art] Derive Key Pair - Done
2,930,883 UART: [art] Signing Cert with AUTHO
2,931,363 UART: RITY.KEYID = 7
2,946,795 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,560 UART: [art] PUB.X = 8A1AB00525D456794F8D1FFF8E969D24C7C743773768CCA58C052D4E10C7968B350FD9586D3B4EDA6B39E2CDF14A1E6A
2,954,331 UART: [art] PUB.Y = 9BDB78006EBB0457E3EC0DBF840A649D956D18A04F9C4722C7C84E71011024D5E0AA26548EED042930BD2E967A5712F7
2,961,248 UART: [art] SIG.R = DFB708268740C7E98E44232B9B0B5BA91312DF76527AEA19824AC66DBD5B111A82B5BF6A7D5C3694A523680D8E86219D
2,968,013 UART: [art] SIG.S = EAB3F1B4D1C472A585BFBD1B379E51B64BA021388F7228970C1CFE955E7BB8AD3284E27CB91AD26AD88DF383CBE45B84
2,991,509 UART: Caliptra RT
2,991,762 UART: [state] CFI Enabled
3,099,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,610 UART: [rt]cmd =0x47544744, len=8
3,131,107 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,966 UART: [kat] ++
896,118 UART: [kat] sha1
900,496 UART: [kat] SHA2-256
902,436 UART: [kat] SHA2-384
905,363 UART: [kat] SHA2-512-ACC
907,264 UART: [kat] ECC-384
917,139 UART: [kat] HMAC-384Kdf
921,805 UART: [kat] LMS
1,170,117 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,348 UART: [fht] FHT @ 0x50003400
1,174,024 UART: [idev] ++
1,174,192 UART: [idev] CDI.KEYID = 6
1,174,553 UART: [idev] SUBJECT.KEYID = 7
1,174,978 UART: [idev] UDS.KEYID = 0
1,175,324 ready_for_fw is high
1,175,324 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,048 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,781 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,343 UART: [fwproc] Wait for Commands...
1,283,074 UART: [fwproc] Recv command 0x46574c44
1,283,807 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,274 >>> mbox cmd response: success
2,774,274 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,775,319 UART: [afmc] ++
2,775,487 UART: [afmc] CDI.KEYID = 6
2,775,850 UART: [afmc] SUBJECT.KEYID = 7
2,776,276 UART: [afmc] AUTHORITY.KEYID = 5
2,811,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,058 UART: [afmc] --
2,855,134 UART: [cold-reset] --
2,856,010 UART: [state] Locking Datavault
2,857,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,617 UART: [state] Locking ICCM
2,858,275 UART: [exit] Launching FMC @ 0x40000130
2,863,604 UART:
2,863,620 UART: Running Caliptra FMC ...
2,864,028 UART:
2,864,171 UART: [state] CFI Enabled
2,874,944 UART: [fht] FMC Alias Private Key: 7
2,982,899 UART: [art] Extend RT PCRs Done
2,983,327 UART: [art] Lock RT PCRs Done
2,984,969 UART: [art] Populate DV Done
2,993,194 UART: [fht] FMC Alias Private Key: 7
2,994,212 UART: [art] Derive CDI
2,994,492 UART: [art] Store in in slot 0x4
3,080,387 UART: [art] Derive Key Pair
3,080,747 UART: [art] Store priv key in slot 0x5
3,093,621 UART: [art] Derive Key Pair - Done
3,108,340 UART: [art] Signing Cert with AUTHO
3,108,820 UART: RITY.KEYID = 7
3,123,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,729 UART: [art] PUB.X = 0714B7F5140251F128221735BF4CEC9E207FFB2C8F0BFABBB0D85872EFED072951F86963D7DCF11CE6C672CFE93F93C9
3,131,501 UART: [art] PUB.Y = 7855D3CEA17845585CBFE1649B281AF16BE3A14BA64549087E33BF81816B26FA40C1A8130AC5C78FC628137B1137904C
3,138,445 UART: [art] SIG.R = B0C4E1469FD5FD9E07AA36C58C1B746879836BF945DA6388D894973B75F0AAEE9E2AA1B7A2658AB73662CA958A6B3904
3,145,217 UART: [art] SIG.S = 8D37BC6CA304996186DBA88E03AC799854F350D6B517E3E9638F682D24E7617F69AD3E9F3DAF866ED3024A7CE2C7A0A5
3,169,515 UART: Caliptra RT
3,169,860 UART: [state] CFI Enabled
3,277,932 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,596 UART: [rt]cmd =0x47544744, len=8
3,309,843 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,520 >>> mbox cmd response: success
2,623,520 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,806 UART:
2,685,822 UART: Running Caliptra FMC ...
2,686,230 UART:
2,686,373 UART: [state] CFI Enabled
2,697,448 UART: [fht] FMC Alias Private Key: 7
2,805,405 UART: [art] Extend RT PCRs Done
2,805,833 UART: [art] Lock RT PCRs Done
2,807,121 UART: [art] Populate DV Done
2,815,302 UART: [fht] FMC Alias Private Key: 7
2,816,344 UART: [art] Derive CDI
2,816,624 UART: [art] Store in in slot 0x4
2,902,453 UART: [art] Derive Key Pair
2,902,813 UART: [art] Store priv key in slot 0x5
2,916,321 UART: [art] Derive Key Pair - Done
2,930,862 UART: [art] Signing Cert with AUTHO
2,931,342 UART: RITY.KEYID = 7
2,946,522 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,287 UART: [art] PUB.X = 9E2BDC980B04A66389CCC11986A42220F5EDFFBB03B516A72597EBAB23A96657555FFB2601747FB74962EB54C4B109C0
2,954,048 UART: [art] PUB.Y = C24491E6E5F31A38BE347112F4C302988B94CF7B356E92CE1576FD25CBEF39C29BEE8163ECF98BC47DE5DA4E34037752
2,961,002 UART: [art] SIG.R = E0C59C487308A90B7EE901EA8B00821BA8708BB90BD86D4DE1692FCD7AB8F3335C106E6D18D54BC01C91742AD0646806
2,967,741 UART: [art] SIG.S = 19ADD03713413332CA7B9BDC8011F39F08924AC4AD231BC62D425781CEA33E1BBCFC3A48D2F2B166FDAB12E7C5B3A865
2,991,943 UART: Caliptra RT
2,992,288 UART: [state] CFI Enabled
3,099,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,611 UART: [rt]cmd =0x47544744, len=8
3,132,416 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,853 UART: [fht] Storing FHT @ 0x50003400
1,479,592 UART: [idev] ++
1,479,760 UART: [idev] CDI.KEYID = 6
1,480,120 UART: [idev] SUBJECT.KEYID = 7
1,480,544 UART: [idev] UDS.KEYID = 0
1,480,889 ready_for_fw is high
1,480,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,136 UART: [idev] Erasing UDS.KEYID = 0
1,505,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,812 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,547,182 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,968 UART: [ldev] --
1,586,277 UART: [fwproc] Waiting for Commands...
1,587,108 UART: [fwproc] Received command 0x46574c44
1,587,899 UART: [fwproc] Received Image of size 114332 bytes
2,885,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,857 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,980 >>> mbox cmd response: success
3,077,980 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,000 UART: [afmc] ++
3,079,168 UART: [afmc] CDI.KEYID = 6
3,079,530 UART: [afmc] SUBJECT.KEYID = 7
3,079,955 UART: [afmc] AUTHORITY.KEYID = 5
3,114,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,213 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,903 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,796 UART: [afmc] --
3,158,710 UART: [cold-reset] --
3,159,450 UART: [state] Locking Datavault
3,160,553 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,157 UART: [state] Locking ICCM
3,161,709 UART: [exit] Launching FMC @ 0x40000130
3,167,038 UART:
3,167,054 UART: Running Caliptra FMC ...
3,167,462 UART:
3,167,516 UART: [state] CFI Enabled
3,178,071 UART: [fht] FMC Alias Private Key: 7
3,286,520 UART: [art] Extend RT PCRs Done
3,286,948 UART: [art] Lock RT PCRs Done
3,288,456 UART: [art] Populate DV Done
3,296,637 UART: [fht] FMC Alias Private Key: 7
3,297,699 UART: [art] Derive CDI
3,297,979 UART: [art] Store in in slot 0x4
3,383,792 UART: [art] Derive Key Pair
3,384,152 UART: [art] Store priv key in slot 0x5
3,397,112 UART: [art] Derive Key Pair - Done
3,411,904 UART: [art] Signing Cert with AUTHO
3,412,384 UART: RITY.KEYID = 7
3,426,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,739 UART: [art] PUB.X = EE6E7E9A1E53B3A85B817389C4F59D6BB5263FC31DC56679D221EE8AD9F6E206C066DB15A61D10F409CAC5DB959818B1
3,434,515 UART: [art] PUB.Y = FDEF6D3A9714A44BFA2D8304BBC4EC28F223E7264DE950FB3E55105F594CC6AB66DED81AAA985751D74C78A178C9ED4E
3,441,482 UART: [art] SIG.R = 814D77D8B071AC24C6B09BC37A05D8A792269A6CA7BA4FCEDA7B14D824DC90E7709891CD42F04A52511EBFB75F71426D
3,448,261 UART: [art] SIG.S = 35F0917ACD8719980169C0359DB02E16919977A95F60D4295E8E3A3CB9DD3B34A5795FF6072C85FB62294B19EDD97E2F
3,472,340 UART: Caliptra RT
3,472,593 UART: [state] CFI Enabled
3,581,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,602 UART: [rt]cmd =0x54514754, len=24
3,614,903 >>> mbox cmd response data (8 bytes)
3,614,904 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,379 UART: [rt]cmd =0x54514754, len=24
3,646,290 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,619 ready_for_fw is high
1,362,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,074 >>> mbox cmd response: success
2,928,074 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,244 UART:
2,990,260 UART: Running Caliptra FMC ...
2,990,668 UART:
2,990,722 UART: [state] CFI Enabled
3,001,417 UART: [fht] FMC Alias Private Key: 7
3,109,672 UART: [art] Extend RT PCRs Done
3,110,100 UART: [art] Lock RT PCRs Done
3,111,718 UART: [art] Populate DV Done
3,120,007 UART: [fht] FMC Alias Private Key: 7
3,120,955 UART: [art] Derive CDI
3,121,235 UART: [art] Store in in slot 0x4
3,206,826 UART: [art] Derive Key Pair
3,207,186 UART: [art] Store priv key in slot 0x5
3,220,230 UART: [art] Derive Key Pair - Done
3,234,806 UART: [art] Signing Cert with AUTHO
3,235,286 UART: RITY.KEYID = 7
3,250,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,635 UART: [art] PUB.X = 51D2A2587A5AC64CC64DC3DFEDFC0F3B8DF97C87CA8C3AC06A18D76D0166FAC6424F04C5D0C6DDFB6E13308071A1E305
3,258,415 UART: [art] PUB.Y = F331AD2FCC98ACD6FF7AD8A37A4C835E622AC0A25D8030C2BC98727DF779934EF1C71F70A4011ED711A272096BEEEF4B
3,265,377 UART: [art] SIG.R = BC3E70E1C86D24B503757DBCDE482E89136B6CEDB8F74C377C13143639C06DAF886C31C6C0545E6F05FAFFA5E9DD9D31
3,272,157 UART: [art] SIG.S = A3DC59BDC7898547B70EEACA570C6F44FBA0E70990528EDB34D322D599D4E10D8EB6F5E7CC31CEC989000C189D5A74C2
3,296,127 UART: Caliptra RT
3,296,380 UART: [state] CFI Enabled
3,404,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,052 UART: [rt]cmd =0x54514754, len=24
3,436,987 >>> mbox cmd response data (8 bytes)
3,436,988 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,647 UART: [rt]cmd =0x54514754, len=24
3,468,690 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,102 UART: [kat] SHA2-256
893,040 UART: [kat] SHA2-384
895,795 UART: [kat] SHA2-512-ACC
897,696 UART: [kat] ECC-384
903,511 UART: [kat] HMAC-384Kdf
908,133 UART: [kat] LMS
1,476,329 UART: [kat] --
1,477,456 UART: [cold-reset] ++
1,477,872 UART: [fht] Storing FHT @ 0x50003400
1,480,553 UART: [idev] ++
1,480,721 UART: [idev] CDI.KEYID = 6
1,481,081 UART: [idev] SUBJECT.KEYID = 7
1,481,505 UART: [idev] UDS.KEYID = 0
1,481,850 ready_for_fw is high
1,481,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,123 UART: [idev] Erasing UDS.KEYID = 0
1,505,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,855 UART: [idev] --
1,514,726 UART: [ldev] ++
1,514,894 UART: [ldev] CDI.KEYID = 6
1,515,257 UART: [ldev] SUBJECT.KEYID = 5
1,515,683 UART: [ldev] AUTHORITY.KEYID = 7
1,516,146 UART: [ldev] FE.KEYID = 1
1,521,222 UART: [ldev] Erasing FE.KEYID = 1
1,547,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,853 UART: [ldev] --
1,586,232 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 114332 bytes
2,886,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,002 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,289 >>> mbox cmd response: success
3,079,289 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,449 UART: [afmc] ++
3,080,617 UART: [afmc] CDI.KEYID = 6
3,080,979 UART: [afmc] SUBJECT.KEYID = 7
3,081,404 UART: [afmc] AUTHORITY.KEYID = 5
3,116,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,635 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,028 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,718 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,669 UART: [afmc] --
3,159,687 UART: [cold-reset] --
3,160,465 UART: [state] Locking Datavault
3,161,550 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,154 UART: [state] Locking ICCM
3,162,618 UART: [exit] Launching FMC @ 0x40000130
3,167,947 UART:
3,167,963 UART: Running Caliptra FMC ...
3,168,371 UART:
3,168,514 UART: [state] CFI Enabled
3,178,853 UART: [fht] FMC Alias Private Key: 7
3,286,978 UART: [art] Extend RT PCRs Done
3,287,406 UART: [art] Lock RT PCRs Done
3,288,672 UART: [art] Populate DV Done
3,296,773 UART: [fht] FMC Alias Private Key: 7
3,297,843 UART: [art] Derive CDI
3,298,123 UART: [art] Store in in slot 0x4
3,383,486 UART: [art] Derive Key Pair
3,383,846 UART: [art] Store priv key in slot 0x5
3,397,060 UART: [art] Derive Key Pair - Done
3,411,888 UART: [art] Signing Cert with AUTHO
3,412,368 UART: RITY.KEYID = 7
3,427,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,143 UART: [art] PUB.X = 5BFA266037349F9753F3CD6D3C6736560067DD2A4F6F29321FD62F2BAFD19B2508645C2BCFA14D17BDCDDB8FCB96BC67
3,434,904 UART: [art] PUB.Y = AE53A2CA604A2D4749AD8421F029982FBECCACB5929BFE540B78293A0E807445DAFC0C1EC159E8FDFD0F8378C417E058
3,441,858 UART: [art] SIG.R = 960E0665ED016282ED84898D6C116FE59E9EF12EE1C4B93A0E15A09D05424C4D8DA4DF9B21D3140BF0020582B22602CA
3,448,605 UART: [art] SIG.S = FE86BBF8FD2F840C16082A0B73923022533CCDD0B0CA5C0CF5E8FAC42D5D62C93A5D9CF6958DD0964C87D95FBF0D7CBC
3,472,411 UART: Caliptra RT
3,472,756 UART: [state] CFI Enabled
3,581,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,832 UART: [rt]cmd =0x54514754, len=24
3,613,927 >>> mbox cmd response data (8 bytes)
3,613,928 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,441 UART: [rt]cmd =0x54514754, len=24
3,645,358 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,640 ready_for_fw is high
1,362,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,013 >>> mbox cmd response: success
2,929,013 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,761 UART:
2,990,777 UART: Running Caliptra FMC ...
2,991,185 UART:
2,991,328 UART: [state] CFI Enabled
3,001,813 UART: [fht] FMC Alias Private Key: 7
3,109,152 UART: [art] Extend RT PCRs Done
3,109,580 UART: [art] Lock RT PCRs Done
3,111,204 UART: [art] Populate DV Done
3,119,313 UART: [fht] FMC Alias Private Key: 7
3,120,327 UART: [art] Derive CDI
3,120,607 UART: [art] Store in in slot 0x4
3,206,622 UART: [art] Derive Key Pair
3,206,982 UART: [art] Store priv key in slot 0x5
3,220,158 UART: [art] Derive Key Pair - Done
3,235,129 UART: [art] Signing Cert with AUTHO
3,235,609 UART: RITY.KEYID = 7
3,250,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,720 UART: [art] PUB.X = 063148EFFE5C622523CDE32F5FD5C8BA2184EFD2B5B11829C5DB54EC42C3F67B90C7B2FD58901BB5DC97846BFC79E83E
3,258,505 UART: [art] PUB.Y = AF5E5E9DE5F7F83EAE7CFB8260E70849A13402DA26712FDCBAD444C4DBE58030B83C166D0DCDD2E0672DE0F60576DF93
3,265,463 UART: [art] SIG.R = 38B1FAC1222A222BAB66BB2B42558D02080B614AA8DFF17C30A31DDA970B7B2D0CCFF9639499AE7B046922B8065F2393
3,272,220 UART: [art] SIG.S = 937C032636866E9C4CE1702CA5673939CF9C36840BE65BFF6F399CDA75C0CA77285D7C06473257344E37C684905D25AE
3,295,994 UART: Caliptra RT
3,296,339 UART: [state] CFI Enabled
3,404,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,126 UART: [rt]cmd =0x54514754, len=24
3,437,247 >>> mbox cmd response data (8 bytes)
3,437,248 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,923 UART: [rt]cmd =0x54514754, len=24
3,469,050 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,695 UART: [kat] SHA2-256
903,635 UART: [kat] SHA2-384
906,460 UART: [kat] SHA2-512-ACC
908,361 UART: [kat] ECC-384
918,416 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,172,079 UART: [cold-reset] ++
1,172,557 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 ready_for_fw is high
1,176,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,904 UART: [idev] Erasing UDS.KEYID = 0
1,200,577 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] --
1,210,141 UART: [ldev] ++
1,210,309 UART: [ldev] CDI.KEYID = 6
1,210,672 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,627 >>> mbox cmd response: success
2,773,627 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,807 UART: [afmc] ++
2,774,975 UART: [afmc] CDI.KEYID = 6
2,775,337 UART: [afmc] SUBJECT.KEYID = 7
2,775,762 UART: [afmc] AUTHORITY.KEYID = 5
2,811,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,538 UART: [afmc] --
2,854,484 UART: [cold-reset] --
2,855,304 UART: [state] Locking Datavault
2,856,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,069 UART: [state] Locking ICCM
2,857,499 UART: [exit] Launching FMC @ 0x40000130
2,862,828 UART:
2,862,844 UART: Running Caliptra FMC ...
2,863,252 UART:
2,863,306 UART: [state] CFI Enabled
2,873,927 UART: [fht] FMC Alias Private Key: 7
2,982,070 UART: [art] Extend RT PCRs Done
2,982,498 UART: [art] Lock RT PCRs Done
2,984,210 UART: [art] Populate DV Done
2,992,293 UART: [fht] FMC Alias Private Key: 7
2,993,373 UART: [art] Derive CDI
2,993,653 UART: [art] Store in in slot 0x4
3,079,368 UART: [art] Derive Key Pair
3,079,728 UART: [art] Store priv key in slot 0x5
3,092,624 UART: [art] Derive Key Pair - Done
3,107,553 UART: [art] Signing Cert with AUTHO
3,108,033 UART: RITY.KEYID = 7
3,123,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,216 UART: [art] PUB.X = EEAC7B2EFECAA7293E854FE617809959D4938007D2B398D5C120C4A59A9DEA80351E047DBD24EAD0EC10A23300A44FC3
3,130,972 UART: [art] PUB.Y = 2E9E88FD133D9F66D4F52CE716B5D9E43C4D4A4F86EFFD554C570EEE98F03C3C9FB506336514DE2D18D90F327C7188D6
3,137,925 UART: [art] SIG.R = 5B5BF280B3294A7AA6332C072DD1BC6CCEA2B202C4D54E97ADF08390A9F62995828F067A1BB72725DF81227ADB93E509
3,144,691 UART: [art] SIG.S = 9FC3F3B8324CF16122A97B8BD84B1B41A6AAE983A825DC1CDE6A2E80376C38B56962F691CF5A7B281FF1426E17EE28AF
3,168,084 UART: Caliptra RT
3,168,337 UART: [state] CFI Enabled
3,275,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,338 UART: [rt]cmd =0x54514754, len=24
3,308,497 >>> mbox cmd response data (8 bytes)
3,308,498 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,953 UART: [rt]cmd =0x54514754, len=24
3,340,080 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 ready_for_fw is high
1,060,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,154 >>> mbox cmd response: success
2,628,154 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,500 UART:
2,690,516 UART: Running Caliptra FMC ...
2,690,924 UART:
2,690,978 UART: [state] CFI Enabled
2,701,623 UART: [fht] FMC Alias Private Key: 7
2,809,720 UART: [art] Extend RT PCRs Done
2,810,148 UART: [art] Lock RT PCRs Done
2,811,872 UART: [art] Populate DV Done
2,820,353 UART: [fht] FMC Alias Private Key: 7
2,821,475 UART: [art] Derive CDI
2,821,755 UART: [art] Store in in slot 0x4
2,907,650 UART: [art] Derive Key Pair
2,908,010 UART: [art] Store priv key in slot 0x5
2,920,740 UART: [art] Derive Key Pair - Done
2,935,644 UART: [art] Signing Cert with AUTHO
2,936,124 UART: RITY.KEYID = 7
2,951,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,283 UART: [art] PUB.X = 8FC206B74ECECE768E9445435780ED038ABFA91616AA8F175661D23E0EA44D23E388F121D4702E52068ACC420FCC2B1D
2,959,046 UART: [art] PUB.Y = ED13A793F949DD29C245647047B2EBF6F599CC91E3280EF4D0A2733A30ABBE64946322AE6A194A346E1768D49E091212
2,965,990 UART: [art] SIG.R = 094F75C6E483C8924E0114FEA2AA26F432F3FA63F244FED52F175D0CE332BB2A0064FB2624ED27B459CBB3E6317A9EEF
2,972,743 UART: [art] SIG.S = 55FFA789FCA74D979BA03BD7B1A2280E828AB2661C5FCF84B4D9E112BF6B2A1D23650BFC717D4D0E4DBF07E6721C58DD
2,996,140 UART: Caliptra RT
2,996,393 UART: [state] CFI Enabled
3,104,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,278 UART: [rt]cmd =0x54514754, len=24
3,137,307 >>> mbox cmd response data (8 bytes)
3,137,308 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,979 UART: [rt]cmd =0x54514754, len=24
3,168,878 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,502 UART: [cold-reset] ++
1,172,886 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,823 UART: [idev] Erasing UDS.KEYID = 0
1,201,898 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] --
1,211,430 UART: [ldev] ++
1,211,598 UART: [ldev] CDI.KEYID = 6
1,211,961 UART: [ldev] SUBJECT.KEYID = 5
1,212,387 UART: [ldev] AUTHORITY.KEYID = 7
1,212,850 UART: [ldev] FE.KEYID = 1
1,218,274 UART: [ldev] Erasing FE.KEYID = 1
1,244,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,720 UART: [ldev] --
1,284,083 UART: [fwproc] Wait for Commands...
1,284,669 UART: [fwproc] Recv command 0x46574c44
1,285,397 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,352 >>> mbox cmd response: success
2,774,352 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,472 UART: [afmc] ++
2,775,640 UART: [afmc] CDI.KEYID = 6
2,776,002 UART: [afmc] SUBJECT.KEYID = 7
2,776,427 UART: [afmc] AUTHORITY.KEYID = 5
2,811,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,121 UART: [afmc] --
2,855,121 UART: [cold-reset] --
2,855,987 UART: [state] Locking Datavault
2,857,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,760 UART: [state] Locking ICCM
2,858,284 UART: [exit] Launching FMC @ 0x40000130
2,863,613 UART:
2,863,629 UART: Running Caliptra FMC ...
2,864,037 UART:
2,864,180 UART: [state] CFI Enabled
2,875,153 UART: [fht] FMC Alias Private Key: 7
2,983,302 UART: [art] Extend RT PCRs Done
2,983,730 UART: [art] Lock RT PCRs Done
2,984,990 UART: [art] Populate DV Done
2,993,265 UART: [fht] FMC Alias Private Key: 7
2,994,445 UART: [art] Derive CDI
2,994,725 UART: [art] Store in in slot 0x4
3,080,434 UART: [art] Derive Key Pair
3,080,794 UART: [art] Store priv key in slot 0x5
3,093,598 UART: [art] Derive Key Pair - Done
3,108,109 UART: [art] Signing Cert with AUTHO
3,108,589 UART: RITY.KEYID = 7
3,124,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,856 UART: [art] PUB.X = 312C03BC3698ADD76E3DD18E70C88F8DD945FDBB395F1D3DBAD1A4AA78355327EF4C8AFEB62991FB6FFBCA6D247F8C13
3,131,649 UART: [art] PUB.Y = CAC69E194F39A50BECA91B50A47787E1B5C2FC72070F2F104CA8C2813373F6F30FC6C47F334EC15BC767D73BE97A5DBD
3,138,603 UART: [art] SIG.R = 717BF7CBD3DBD9FE1E148451FAE281620ED4071DD6F78F957564EF62028EFAFF23415585A04A62E5D3CFA312A4EE8D9F
3,145,380 UART: [art] SIG.S = 15F801363C77E3D7731177E26F66053855329FEB2897704E6CE3613D24D314F5599C7B642A9CC9669D9641617F8D0B41
3,169,412 UART: Caliptra RT
3,169,757 UART: [state] CFI Enabled
3,277,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,374 UART: [rt]cmd =0x54514754, len=24
3,310,277 >>> mbox cmd response data (8 bytes)
3,310,278 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,993 UART: [rt]cmd =0x54514754, len=24
3,342,032 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,084 ready_for_fw is high
1,060,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,083 >>> mbox cmd response: success
2,625,083 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,111 UART:
2,688,127 UART: Running Caliptra FMC ...
2,688,535 UART:
2,688,678 UART: [state] CFI Enabled
2,699,439 UART: [fht] FMC Alias Private Key: 7
2,807,572 UART: [art] Extend RT PCRs Done
2,808,000 UART: [art] Lock RT PCRs Done
2,809,568 UART: [art] Populate DV Done
2,817,771 UART: [fht] FMC Alias Private Key: 7
2,818,807 UART: [art] Derive CDI
2,819,087 UART: [art] Store in in slot 0x4
2,905,064 UART: [art] Derive Key Pair
2,905,424 UART: [art] Store priv key in slot 0x5
2,918,872 UART: [art] Derive Key Pair - Done
2,933,583 UART: [art] Signing Cert with AUTHO
2,934,063 UART: RITY.KEYID = 7
2,948,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,458 UART: [art] PUB.X = 3F605448225DB8BE971816B32FAC9B9BF09B54440BCF5CE27469C850EF2D4D7D8EC71D214695A7761528EBE1D6130F0B
2,956,225 UART: [art] PUB.Y = FCFC70E1A38AEFFDB451BB4E1FA7C020AC82CE3E8CFD31325B5E011B89EE854076AE86A9CD3CF9D040173C7FC280C58A
2,963,198 UART: [art] SIG.R = 11EAAD4BF6068D5431165AE792F89B4AE373FF11CF3E1751B0FC983C68A9E976665B0CD666EB088624E9DDE664B197AD
2,969,969 UART: [art] SIG.S = 9333C141ADF755CBDBE70FC462110C6D0AC03B29B6FD3BE3537A881535196D3321D85D378F4F0123DC577C819AFACB41
2,994,068 UART: Caliptra RT
2,994,413 UART: [state] CFI Enabled
3,101,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,048 UART: [rt]cmd =0x54514754, len=24
3,134,185 >>> mbox cmd response data (8 bytes)
3,134,186 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,435 UART: [rt]cmd =0x54514754, len=24
3,165,510 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,771 UART: [idev] ++
1,172,939 UART: [idev] CDI.KEYID = 6
1,173,300 UART: [idev] SUBJECT.KEYID = 7
1,173,725 UART: [idev] UDS.KEYID = 0
1,174,071 ready_for_fw is high
1,174,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,305 UART: [idev] Sha1 KeyId Algorithm
1,207,295 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,526 UART: [ldev] --
1,280,880 UART: [fwproc] Wait for Commands...
1,281,497 UART: [fwproc] Recv command 0x46574c44
1,282,230 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,889 >>> mbox cmd response: success
2,771,889 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,954 UART: [afmc] ++
2,773,122 UART: [afmc] CDI.KEYID = 6
2,773,485 UART: [afmc] SUBJECT.KEYID = 7
2,773,911 UART: [afmc] AUTHORITY.KEYID = 5
2,809,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,489 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,101 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,820 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,765 UART: [afmc] --
2,852,677 UART: [cold-reset] --
2,853,471 UART: [state] Locking Datavault
2,854,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,398 UART: [state] Locking ICCM
2,855,986 UART: [exit] Launching FMC @ 0x40000130
2,861,315 UART:
2,861,331 UART: Running Caliptra FMC ...
2,861,739 UART:
2,861,793 UART: [state] CFI Enabled
2,871,870 UART: [fht] FMC Alias Private Key: 7
2,979,047 UART: [art] Extend RT PCRs Done
2,979,475 UART: [art] Lock RT PCRs Done
2,981,073 UART: [art] Populate DV Done
2,989,456 UART: [fht] FMC Alias Private Key: 7
2,990,574 UART: [art] Derive CDI
2,990,854 UART: [art] Store in in slot 0x4
3,076,539 UART: [art] Derive Key Pair
3,076,899 UART: [art] Store priv key in slot 0x5
3,089,625 UART: [art] Derive Key Pair - Done
3,104,817 UART: [art] Signing Cert with AUTHO
3,105,297 UART: RITY.KEYID = 7
3,120,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,286 UART: [art] PUB.X = A62952A3A326B63637BCA044B7E79490E2313C19312268DA75E26C4F75CE0C51FB658EC3D15991B17C3E5489D4FDF13F
3,128,055 UART: [art] PUB.Y = 67EC1747582B2CE4930404CC5E493FE39B9A853A1B0422E35ED93B01D1C4BD847900BC2EB0B7842B115E17CA8A26EB0C
3,134,976 UART: [art] SIG.R = A5D638B6983D64EB17E12B6F6FE4D803A2F0B6D7E0E00E778E09F6C45D479205B2EEE271A601C4B776F7A258344A983C
3,141,737 UART: [art] SIG.S = D3F286EF4D591D8A998163410935A1F7E3E155B4A4E822E72DB6AB82910E4FADA4B8230EF17BAD6AD15B18EF3F500D3D
3,165,898 UART: Caliptra RT
3,166,151 UART: [state] CFI Enabled
3,273,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,105 UART: [rt]cmd =0x54514754, len=24
3,306,270 >>> mbox cmd response data (8 bytes)
3,306,271 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,708 UART: [rt]cmd =0x54514754, len=24
3,337,587 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,784 ready_for_fw is high
1,055,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,747 >>> mbox cmd response: success
2,623,747 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,167 UART:
2,686,183 UART: Running Caliptra FMC ...
2,686,591 UART:
2,686,645 UART: [state] CFI Enabled
2,697,374 UART: [fht] FMC Alias Private Key: 7
2,805,123 UART: [art] Extend RT PCRs Done
2,805,551 UART: [art] Lock RT PCRs Done
2,807,011 UART: [art] Populate DV Done
2,815,156 UART: [fht] FMC Alias Private Key: 7
2,816,102 UART: [art] Derive CDI
2,816,382 UART: [art] Store in in slot 0x4
2,902,011 UART: [art] Derive Key Pair
2,902,371 UART: [art] Store priv key in slot 0x5
2,916,015 UART: [art] Derive Key Pair - Done
2,931,030 UART: [art] Signing Cert with AUTHO
2,931,510 UART: RITY.KEYID = 7
2,946,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,615 UART: [art] PUB.X = 99D4B0D1238EF57EA8811A361C4DDB48E1889B31914E74098AD5723039C4BE96FDC1D0FC63CE0D0BC8D2E7DB2F384967
2,954,386 UART: [art] PUB.Y = 87B5FBCC43E4BBB17B005F021EBEEB74513ABF191F911A7E4D6AFAF5952EA689FFD48D9CB26B39A75967A2EE49B2F65B
2,961,335 UART: [art] SIG.R = 420F34FB1319B6EFA01105130D6C5340B9EE5D15315E3A0AB93964BA848BDED2823CF336E479F2F075EEF49FCBC89C10
2,968,103 UART: [art] SIG.S = 754A9138E81D1DFB2CEDDA176AB9A78A7CBE9639855021753FC4A30245B152CE8E9C4CE93DAD27791D4717A6A57A7BCC
2,991,655 UART: Caliptra RT
2,991,908 UART: [state] CFI Enabled
3,098,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,749 UART: [rt]cmd =0x54514754, len=24
3,131,974 >>> mbox cmd response data (8 bytes)
3,131,975 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,456 UART: [rt]cmd =0x54514754, len=24
3,163,399 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,118 UART: [state] WD Timer not started. Device not locked for debugging
87,271 UART: [kat] SHA2-256
890,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,950 UART: [kat] ++
895,102 UART: [kat] sha1
899,332 UART: [kat] SHA2-256
901,272 UART: [kat] SHA2-384
903,957 UART: [kat] SHA2-512-ACC
905,858 UART: [kat] ECC-384
915,411 UART: [kat] HMAC-384Kdf
920,101 UART: [kat] LMS
1,168,413 UART: [kat] --
1,169,166 UART: [cold-reset] ++
1,169,542 UART: [fht] FHT @ 0x50003400
1,172,220 UART: [idev] ++
1,172,388 UART: [idev] CDI.KEYID = 6
1,172,749 UART: [idev] SUBJECT.KEYID = 7
1,173,174 UART: [idev] UDS.KEYID = 0
1,173,520 ready_for_fw is high
1,173,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,452 UART: [idev] Erasing UDS.KEYID = 0
1,198,318 UART: [idev] Sha1 KeyId Algorithm
1,207,164 UART: [idev] --
1,208,209 UART: [ldev] ++
1,208,377 UART: [ldev] CDI.KEYID = 6
1,208,741 UART: [ldev] SUBJECT.KEYID = 5
1,209,168 UART: [ldev] AUTHORITY.KEYID = 7
1,209,631 UART: [ldev] FE.KEYID = 1
1,214,861 UART: [ldev] Erasing FE.KEYID = 1
1,241,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,147 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,310 UART: [fwproc] Recv command 0x46574c44
1,282,043 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,872 >>> mbox cmd response: success
2,772,872 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,139 UART: [afmc] ++
2,774,307 UART: [afmc] CDI.KEYID = 6
2,774,670 UART: [afmc] SUBJECT.KEYID = 7
2,775,096 UART: [afmc] AUTHORITY.KEYID = 5
2,809,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,368 UART: [afmc] --
2,853,336 UART: [cold-reset] --
2,854,012 UART: [state] Locking Datavault
2,855,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,885 UART: [state] Locking ICCM
2,856,489 UART: [exit] Launching FMC @ 0x40000130
2,861,818 UART:
2,861,834 UART: Running Caliptra FMC ...
2,862,242 UART:
2,862,385 UART: [state] CFI Enabled
2,873,214 UART: [fht] FMC Alias Private Key: 7
2,981,857 UART: [art] Extend RT PCRs Done
2,982,285 UART: [art] Lock RT PCRs Done
2,983,671 UART: [art] Populate DV Done
2,992,004 UART: [fht] FMC Alias Private Key: 7
2,993,130 UART: [art] Derive CDI
2,993,410 UART: [art] Store in in slot 0x4
3,079,169 UART: [art] Derive Key Pair
3,079,529 UART: [art] Store priv key in slot 0x5
3,093,859 UART: [art] Derive Key Pair - Done
3,108,519 UART: [art] Signing Cert with AUTHO
3,108,999 UART: RITY.KEYID = 7
3,124,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,032 UART: [art] PUB.X = 42DFE0519AB5EC74CF501C1EF60D370FA27619074D9B38533D4DBB6AF6563B1B3148DD6163CA898DF8390DEB44BF76D0
3,131,802 UART: [art] PUB.Y = E572382D04574E52C22E152444FF95F6CD3E3F791352C550DC6AF5468B2A5BDDCA2AEF39A50C732A26AED60E9DB2C90E
3,138,754 UART: [art] SIG.R = 0505AB88BCD9EC79EA40D595DE0C6458AFF9B2874868D70C7FB27112F2443717751F9FFC0663745407CE4F748DDAFCDA
3,145,516 UART: [art] SIG.S = 0F3E0C8055F214DE3BC42D237439E121E898CEF550335E2AB1048F69A823B84E86B74CC9209BB509211FD20A6F258B0B
3,169,707 UART: Caliptra RT
3,170,052 UART: [state] CFI Enabled
3,278,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,251 UART: [rt]cmd =0x54514754, len=24
3,311,200 >>> mbox cmd response data (8 bytes)
3,311,201 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,810 UART: [rt]cmd =0x54514754, len=24
3,342,687 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,735 ready_for_fw is high
1,056,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,686 >>> mbox cmd response: success
2,624,686 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,014 UART:
2,687,030 UART: Running Caliptra FMC ...
2,687,438 UART:
2,687,581 UART: [state] CFI Enabled
2,698,120 UART: [fht] FMC Alias Private Key: 7
2,806,405 UART: [art] Extend RT PCRs Done
2,806,833 UART: [art] Lock RT PCRs Done
2,808,239 UART: [art] Populate DV Done
2,816,480 UART: [fht] FMC Alias Private Key: 7
2,817,556 UART: [art] Derive CDI
2,817,836 UART: [art] Store in in slot 0x4
2,903,493 UART: [art] Derive Key Pair
2,903,853 UART: [art] Store priv key in slot 0x5
2,917,193 UART: [art] Derive Key Pair - Done
2,931,617 UART: [art] Signing Cert with AUTHO
2,932,097 UART: RITY.KEYID = 7
2,947,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,938 UART: [art] PUB.X = 039D1079F9EE376E4B47ACA853AC37D9251CC6829895496A657F53C59C934FC8C020E6F464CF7490D97D0F4D62F1EC5C
2,954,706 UART: [art] PUB.Y = 8291D1FF3374E390946968C3293D1DB6EA9FC5596ADC3E112DBC9610DDA7F5A567E32AEB826478FE3A0C2356472C498C
2,961,659 UART: [art] SIG.R = 8329B18F4076C14A1C60B95A369563EB9BA0ECF838DAFC133C3AC90ED38786D5D1E66B03955A6A542C83D52C0EB0049E
2,968,425 UART: [art] SIG.S = 2351837DC218241CA3842483130675923D5EA89495266A1B43677CCBB4A4D6DF1752973E370B11F1767D534D12348EA0
2,992,264 UART: Caliptra RT
2,992,609 UART: [state] CFI Enabled
3,100,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,060 UART: [rt]cmd =0x54514754, len=24
3,133,209 >>> mbox cmd response data (8 bytes)
3,133,210 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,591 UART: [rt]cmd =0x54514754, len=24
3,164,570 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
895,090 UART: [kat] SHA2-512-ACC
896,991 UART: [kat] ECC-384
902,436 UART: [kat] HMAC-384Kdf
907,076 UART: [kat] LMS
1,475,272 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,264 UART: [idev] ++
1,479,432 UART: [idev] CDI.KEYID = 6
1,479,792 UART: [idev] SUBJECT.KEYID = 7
1,480,216 UART: [idev] UDS.KEYID = 0
1,480,561 ready_for_fw is high
1,480,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,938 UART: [idev] --
1,514,165 UART: [ldev] ++
1,514,333 UART: [ldev] CDI.KEYID = 6
1,514,696 UART: [ldev] SUBJECT.KEYID = 5
1,515,122 UART: [ldev] AUTHORITY.KEYID = 7
1,515,585 UART: [ldev] FE.KEYID = 1
1,520,595 UART: [ldev] Erasing FE.KEYID = 1
1,545,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,758 UART: [ldev] --
1,585,183 UART: [fwproc] Waiting for Commands...
1,586,030 UART: [fwproc] Received command 0x46574c44
1,586,821 UART: [fwproc] Received Image of size 114332 bytes
2,884,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,023 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,375 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,336 >>> mbox cmd response: success
3,077,336 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,446 UART: [afmc] ++
3,078,614 UART: [afmc] CDI.KEYID = 6
3,078,976 UART: [afmc] SUBJECT.KEYID = 7
3,079,401 UART: [afmc] AUTHORITY.KEYID = 5
3,114,110 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,130 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,523 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,213 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,210 UART: [afmc] --
3,157,242 UART: [cold-reset] --
3,158,200 UART: [state] Locking Datavault
3,159,523 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,127 UART: [state] Locking ICCM
3,160,771 UART: [exit] Launching FMC @ 0x40000130
3,166,100 UART:
3,166,116 UART: Running Caliptra FMC ...
3,166,524 UART:
3,166,578 UART: [state] CFI Enabled
3,177,427 UART: [fht] FMC Alias Private Key: 7
3,285,120 UART: [art] Extend RT PCRs Done
3,285,548 UART: [art] Lock RT PCRs Done
3,287,132 UART: [art] Populate DV Done
3,295,407 UART: [fht] FMC Alias Private Key: 7
3,296,445 UART: [art] Derive CDI
3,296,725 UART: [art] Store in in slot 0x4
3,382,606 UART: [art] Derive Key Pair
3,382,966 UART: [art] Store priv key in slot 0x5
3,396,008 UART: [art] Derive Key Pair - Done
3,410,735 UART: [art] Signing Cert with AUTHO
3,411,215 UART: RITY.KEYID = 7
3,426,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,164 UART: [art] PUB.X = B9CE203D6DC66D97C3995A4C1DC16657C5AFF61F6A70CB6B198CA8D647D2869B96E520CF557D408A0F658B2756A4725F
3,433,939 UART: [art] PUB.Y = 3E4674DD60FF2F594BF50A3C13191479FA9E80CE48DCFBCC043F16164F531F3924139B024E62DDF3F8464939026EB5C1
3,440,881 UART: [art] SIG.R = 9953D506CCECF7D8160F144E30707FD35884CB72B7BE64A3E9656FFAFBE633C77999C0B959FF696BD190412C26559D01
3,447,646 UART: [art] SIG.S = 2BB8D5FCFA0B346D079126C328BF853CD2BB200F23EB4BC2CCB125DDF29CB794B704008F4E4F611C30FEDB71ED622925
3,471,109 UART: Caliptra RT
3,471,362 UART: [state] CFI Enabled
3,580,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,075 UART: [rt]cmd =0x54514754, len=24
3,613,060 >>> mbox cmd response data (8 bytes)
3,613,061 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,674 UART: [rt]cmd =0x47544744, len=8
3,645,182 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,211 ready_for_fw is high
1,362,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,866 >>> mbox cmd response: success
2,927,866 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,300 UART:
2,989,316 UART: Running Caliptra FMC ...
2,989,724 UART:
2,989,778 UART: [state] CFI Enabled
3,000,259 UART: [fht] FMC Alias Private Key: 7
3,108,490 UART: [art] Extend RT PCRs Done
3,108,918 UART: [art] Lock RT PCRs Done
3,110,206 UART: [art] Populate DV Done
3,118,411 UART: [fht] FMC Alias Private Key: 7
3,119,513 UART: [art] Derive CDI
3,119,793 UART: [art] Store in in slot 0x4
3,205,216 UART: [art] Derive Key Pair
3,205,576 UART: [art] Store priv key in slot 0x5
3,218,340 UART: [art] Derive Key Pair - Done
3,233,306 UART: [art] Signing Cert with AUTHO
3,233,786 UART: RITY.KEYID = 7
3,249,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,841 UART: [art] PUB.X = 8F3AF4F887B4841E0855CEDD2A5653A7000C64057A547A8FAE1D7D5E0E4E0D99E2B42A0415B601F4404F0B339139C1B3
3,256,569 UART: [art] PUB.Y = CA78B4F4251D15DFE12EF373A12DAA7AC5C9978D6AB37968C17DAAB6625D4DFA657B5B2B83E9F59927B572578B1158FE
3,263,533 UART: [art] SIG.R = B771D7390DA26CC3E952C81EE54159206F174581F76A959306181DDCB744D31FD5586EFE252E15CC808677E702FB3E80
3,270,292 UART: [art] SIG.S = C206C3540FA88768E4AB6FA92F7BE4AF7A4DF82F1F68A83DB0A4B6A4E127AC58FE352BF90EF54C30C22307B6D7F2923C
3,293,663 UART: Caliptra RT
3,293,916 UART: [state] CFI Enabled
3,402,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,734 UART: [rt]cmd =0x54514754, len=24
3,435,085 >>> mbox cmd response data (8 bytes)
3,435,086 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,301 UART: [rt]cmd =0x47544744, len=8
3,466,795 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,621 UART: [kat] LMS
1,475,817 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,158 UART: [fht] Storing FHT @ 0x50003400
1,479,895 UART: [idev] ++
1,480,063 UART: [idev] CDI.KEYID = 6
1,480,423 UART: [idev] SUBJECT.KEYID = 7
1,480,847 UART: [idev] UDS.KEYID = 0
1,481,192 ready_for_fw is high
1,481,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,505,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,546,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,167 UART: [ldev] --
1,586,670 UART: [fwproc] Waiting for Commands...
1,587,521 UART: [fwproc] Received command 0x46574c44
1,588,312 UART: [fwproc] Received Image of size 114332 bytes
2,885,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,679 >>> mbox cmd response: success
3,077,679 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,749 UART: [afmc] ++
3,078,917 UART: [afmc] CDI.KEYID = 6
3,079,279 UART: [afmc] SUBJECT.KEYID = 7
3,079,704 UART: [afmc] AUTHORITY.KEYID = 5
3,114,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,399 UART: [afmc] --
3,158,391 UART: [cold-reset] --
3,159,077 UART: [state] Locking Datavault
3,160,014 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,618 UART: [state] Locking ICCM
3,161,150 UART: [exit] Launching FMC @ 0x40000130
3,166,479 UART:
3,166,495 UART: Running Caliptra FMC ...
3,166,903 UART:
3,167,046 UART: [state] CFI Enabled
3,177,349 UART: [fht] FMC Alias Private Key: 7
3,285,760 UART: [art] Extend RT PCRs Done
3,286,188 UART: [art] Lock RT PCRs Done
3,287,512 UART: [art] Populate DV Done
3,295,667 UART: [fht] FMC Alias Private Key: 7
3,296,795 UART: [art] Derive CDI
3,297,075 UART: [art] Store in in slot 0x4
3,382,826 UART: [art] Derive Key Pair
3,383,186 UART: [art] Store priv key in slot 0x5
3,395,992 UART: [art] Derive Key Pair - Done
3,410,850 UART: [art] Signing Cert with AUTHO
3,411,330 UART: RITY.KEYID = 7
3,426,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,349 UART: [art] PUB.X = 6DEBC7F183BDE984713B6F62F9E1C98F1F6C1021E89B3FD5783EF61CECA93FAB9B49F1C1CAE890B272350FDEBE261DE5
3,434,140 UART: [art] PUB.Y = C94411FEC87E58FE3E8D61CC98EC27AFE5E83DE76D690845DE035C4D6209C5951A88953D7D08AD30E445B6759F549AAC
3,441,088 UART: [art] SIG.R = 2392333DCEDFEFA317383523A6A8F70AA15F4278DD5826772D304E5C5011A494CF0F857FC749F74C7CE89C15215053B9
3,447,852 UART: [art] SIG.S = 616A87D049ABF52AE9C6A86792EED511DC7A400CCDB54470DFC7074A17143F6C45322214CB59C7E53CF733EE31997B15
3,472,267 UART: Caliptra RT
3,472,612 UART: [state] CFI Enabled
3,581,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,074 UART: [rt]cmd =0x54514754, len=24
3,614,069 >>> mbox cmd response data (8 bytes)
3,614,070 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,757 UART: [rt]cmd =0x47544744, len=8
3,646,061 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,230 ready_for_fw is high
1,363,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,435 >>> mbox cmd response: success
2,928,435 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,307 UART:
2,990,323 UART: Running Caliptra FMC ...
2,990,731 UART:
2,990,874 UART: [state] CFI Enabled
3,001,523 UART: [fht] FMC Alias Private Key: 7
3,109,446 UART: [art] Extend RT PCRs Done
3,109,874 UART: [art] Lock RT PCRs Done
3,111,598 UART: [art] Populate DV Done
3,119,605 UART: [fht] FMC Alias Private Key: 7
3,120,567 UART: [art] Derive CDI
3,120,847 UART: [art] Store in in slot 0x4
3,206,390 UART: [art] Derive Key Pair
3,206,750 UART: [art] Store priv key in slot 0x5
3,220,162 UART: [art] Derive Key Pair - Done
3,235,136 UART: [art] Signing Cert with AUTHO
3,235,616 UART: RITY.KEYID = 7
3,250,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,393 UART: [art] PUB.X = A9A7B63B11E115D5521BDD2735ED6E2F38DFE69DBD26450B4541680D5BB5C720A57E341272D4586D1843B1D6142D7207
3,258,154 UART: [art] PUB.Y = 297B06D9452D274F159537A7A61FC7E28232B409AEFD6CCF57F7DD91C5A7BF55E610D80B9BA4420BA26F1F0556577FBF
3,265,099 UART: [art] SIG.R = AF8EEA1686A1BDE228D6B5CC349AAE548489BDB77A3589A32DE85F9FA1C3E10FEABC1C27B86193F62E1469D7451D4F5F
3,271,886 UART: [art] SIG.S = E14BE8B7B1FAC1A821476388A6D40579BD9A9F3DAF16B4503DDFF611AB98239A58665F1B91C289350AD73C243BD4FF4A
3,296,273 UART: Caliptra RT
3,296,618 UART: [state] CFI Enabled
3,405,310 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,774 UART: [rt]cmd =0x54514754, len=24
3,437,615 >>> mbox cmd response data (8 bytes)
3,437,616 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,183 UART: [rt]cmd =0x47544744, len=8
3,469,559 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,587 UART: [kat] SHA2-256
903,527 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,363 UART: [cold-reset] ++
1,171,731 UART: [fht] FHT @ 0x50003400
1,174,256 UART: [idev] ++
1,174,424 UART: [idev] CDI.KEYID = 6
1,174,784 UART: [idev] SUBJECT.KEYID = 7
1,175,208 UART: [idev] UDS.KEYID = 0
1,175,553 ready_for_fw is high
1,175,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,547 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,286 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,541 >>> mbox cmd response: success
2,773,541 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,653 UART: [afmc] ++
2,774,821 UART: [afmc] CDI.KEYID = 6
2,775,183 UART: [afmc] SUBJECT.KEYID = 7
2,775,608 UART: [afmc] AUTHORITY.KEYID = 5
2,810,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,627 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,346 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,130 UART: [afmc] --
2,854,210 UART: [cold-reset] --
2,855,014 UART: [state] Locking Datavault
2,856,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,795 UART: [state] Locking ICCM
2,857,421 UART: [exit] Launching FMC @ 0x40000130
2,862,750 UART:
2,862,766 UART: Running Caliptra FMC ...
2,863,174 UART:
2,863,228 UART: [state] CFI Enabled
2,873,615 UART: [fht] FMC Alias Private Key: 7
2,982,002 UART: [art] Extend RT PCRs Done
2,982,430 UART: [art] Lock RT PCRs Done
2,983,660 UART: [art] Populate DV Done
2,992,069 UART: [fht] FMC Alias Private Key: 7
2,993,173 UART: [art] Derive CDI
2,993,453 UART: [art] Store in in slot 0x4
3,079,408 UART: [art] Derive Key Pair
3,079,768 UART: [art] Store priv key in slot 0x5
3,092,952 UART: [art] Derive Key Pair - Done
3,107,983 UART: [art] Signing Cert with AUTHO
3,108,463 UART: RITY.KEYID = 7
3,123,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,294 UART: [art] PUB.X = 11F49552CAC36A5C42157B890D7B206382462DF3DBD04EF8C4483280B266E0D82672F81F8C058D1467B7EC7056CC37D7
3,131,056 UART: [art] PUB.Y = 3DABEE5122D5FBF9D8BF919741A88AEEB466019BD54CCDF739D70E226EB977B4387E472EE995ABB26F23FD288838D0F4
3,138,016 UART: [art] SIG.R = 00BDB8629D0E1BB0887C34337174FDD74E339CDB9EDCF9CCB954BD043539C3926EDBAAAAFE1AF1E0AD804D7CD70B6AAB
3,144,785 UART: [art] SIG.S = 1871E713C35D5E3F3A2EF8F84A190D0B2BF25797768FA540FC1124BE7679AC2B837C7923A52953CB00B2795A93D3ED9B
3,168,342 UART: Caliptra RT
3,168,595 UART: [state] CFI Enabled
3,275,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,927 UART: [rt]cmd =0x54514754, len=24
3,308,212 >>> mbox cmd response data (8 bytes)
3,308,213 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,806 UART: [rt]cmd =0x47544744, len=8
3,340,282 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,103 ready_for_fw is high
1,060,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,132 >>> mbox cmd response: success
2,624,132 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,436 UART:
2,685,452 UART: Running Caliptra FMC ...
2,685,860 UART:
2,685,914 UART: [state] CFI Enabled
2,696,621 UART: [fht] FMC Alias Private Key: 7
2,805,034 UART: [art] Extend RT PCRs Done
2,805,462 UART: [art] Lock RT PCRs Done
2,806,946 UART: [art] Populate DV Done
2,815,137 UART: [fht] FMC Alias Private Key: 7
2,816,081 UART: [art] Derive CDI
2,816,361 UART: [art] Store in in slot 0x4
2,902,160 UART: [art] Derive Key Pair
2,902,520 UART: [art] Store priv key in slot 0x5
2,915,946 UART: [art] Derive Key Pair - Done
2,930,619 UART: [art] Signing Cert with AUTHO
2,931,099 UART: RITY.KEYID = 7
2,945,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,622 UART: [art] PUB.X = F204A3C21DB2B179671C0D615C838ACF7B3054D62A084EB7DD06543E4D0B7A1E12837490D1757C9674A72C51F8FEE67F
2,953,381 UART: [art] PUB.Y = 9AD53F3AD9D75F738AE4C3634B8969295F5417A69C31F2150BB2392624D10736363F6CE450204F6B75E4F01D466DB150
2,960,319 UART: [art] SIG.R = FFCB2ABCA99AC364578E03F3AFE9DECEC5AFA21F83F9985A84A54D87A0B7B1D4DCE6ED04527E5E58438D274EB36D03C5
2,967,106 UART: [art] SIG.S = EB3A8FB0BD58814B8BA90B89487EF5018FECCB7B7B45484513E0025CF755E1D791D5CB9D182DC22636A7E4039CE0E5CC
2,990,989 UART: Caliptra RT
2,991,242 UART: [state] CFI Enabled
3,097,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,456 UART: [rt]cmd =0x54514754, len=24
3,130,471 >>> mbox cmd response data (8 bytes)
3,130,472 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,959 UART: [rt]cmd =0x47544744, len=8
3,162,465 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
902,032 UART: [kat] SHA2-256
903,972 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,121 UART: [kat] HMAC-384Kdf
922,669 UART: [kat] LMS
1,170,997 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,378 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 ready_for_fw is high
1,176,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,123 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,734 UART: [idev] --
1,210,804 UART: [ldev] ++
1,210,972 UART: [ldev] CDI.KEYID = 6
1,211,335 UART: [ldev] SUBJECT.KEYID = 5
1,211,761 UART: [ldev] AUTHORITY.KEYID = 7
1,212,224 UART: [ldev] FE.KEYID = 1
1,217,500 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,313 UART: [fwproc] Wait for Commands...
1,284,107 UART: [fwproc] Recv command 0x46574c44
1,284,835 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,362 >>> mbox cmd response: success
2,774,362 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,494 UART: [afmc] ++
2,775,662 UART: [afmc] CDI.KEYID = 6
2,776,024 UART: [afmc] SUBJECT.KEYID = 7
2,776,449 UART: [afmc] AUTHORITY.KEYID = 5
2,811,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,571 UART: [afmc] --
2,855,515 UART: [cold-reset] --
2,856,289 UART: [state] Locking Datavault
2,857,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,958 UART: [state] Locking ICCM
2,858,520 UART: [exit] Launching FMC @ 0x40000130
2,863,849 UART:
2,863,865 UART: Running Caliptra FMC ...
2,864,273 UART:
2,864,416 UART: [state] CFI Enabled
2,875,087 UART: [fht] FMC Alias Private Key: 7
2,983,152 UART: [art] Extend RT PCRs Done
2,983,580 UART: [art] Lock RT PCRs Done
2,985,200 UART: [art] Populate DV Done
2,993,585 UART: [fht] FMC Alias Private Key: 7
2,994,683 UART: [art] Derive CDI
2,994,963 UART: [art] Store in in slot 0x4
3,080,324 UART: [art] Derive Key Pair
3,080,684 UART: [art] Store priv key in slot 0x5
3,093,922 UART: [art] Derive Key Pair - Done
3,109,002 UART: [art] Signing Cert with AUTHO
3,109,482 UART: RITY.KEYID = 7
3,124,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,031 UART: [art] PUB.X = AB9E206F78AAF9939B981BD9350128F0B73DF0A4E26885497E70D33C27D2E681DB61A24E32D8ACDE7BBA804E032F1098
3,131,803 UART: [art] PUB.Y = 3BDEEDDFCC17337BE41082BF7D24F6C42290C082B190A65531C5B3A7BCED8767216F5353CAA0B84DF6E6D5BAAFD96446
3,138,771 UART: [art] SIG.R = CABA2B892DE57AEC48CBFBDCFE45F3B8C54DE594426A06BF5F0F9EBCC09EB50A779C20E6326AF07ED82C048DD4F6F9B2
3,145,561 UART: [art] SIG.S = 1E41F292F9F996E25423DF1984145FDB094EEE78DD13CA1B9E4A0DE9EB19F2F774B469A0E2513D220F398FF5384A0E5C
3,169,166 UART: Caliptra RT
3,169,511 UART: [state] CFI Enabled
3,277,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,822 UART: [rt]cmd =0x54514754, len=24
3,309,589 >>> mbox cmd response data (8 bytes)
3,309,590 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,975 UART: [rt]cmd =0x47544744, len=8
3,341,405 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,912 ready_for_fw is high
1,060,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,943 >>> mbox cmd response: success
2,628,943 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,193 UART:
2,691,209 UART: Running Caliptra FMC ...
2,691,617 UART:
2,691,760 UART: [state] CFI Enabled
2,702,579 UART: [fht] FMC Alias Private Key: 7
2,810,710 UART: [art] Extend RT PCRs Done
2,811,138 UART: [art] Lock RT PCRs Done
2,812,762 UART: [art] Populate DV Done
2,821,001 UART: [fht] FMC Alias Private Key: 7
2,822,103 UART: [art] Derive CDI
2,822,383 UART: [art] Store in in slot 0x4
2,908,342 UART: [art] Derive Key Pair
2,908,702 UART: [art] Store priv key in slot 0x5
2,921,866 UART: [art] Derive Key Pair - Done
2,936,719 UART: [art] Signing Cert with AUTHO
2,937,199 UART: RITY.KEYID = 7
2,952,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,486 UART: [art] PUB.X = C0F7EE71DFC6183B85A24254AD1A6834AACFE808B4151EFDA7765D0D8FCD882FD7D3A991CDC16ECB51069C67311616DA
2,960,265 UART: [art] PUB.Y = 9CF9B499057A47EC2846AF17092D9E089C0228FFB7A27851E10383013911EB4C75858173429B0B3CC86FEEC4F62342D3
2,967,190 UART: [art] SIG.R = 4A79DA9C727B36A6EC2E54AAAF03950DCCEB38A3CA7AC5429DD3C27F3463B80D9B2BB28A23F0C8A4119E15140597B2B9
2,973,964 UART: [art] SIG.S = FF1EEA16C027BD35AE3A46EA73594A66050D19BE6BEA109F0E14FAC703DB1EC5A7ADE4367AB14749FEE49D8D4D8C34EB
2,996,887 UART: Caliptra RT
2,997,232 UART: [state] CFI Enabled
3,104,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,889 UART: [rt]cmd =0x54514754, len=24
3,136,764 >>> mbox cmd response data (8 bytes)
3,136,765 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,974 UART: [rt]cmd =0x47544744, len=8
3,168,538 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,511 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
1,173,847 ready_for_fw is high
1,173,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,369 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,362 UART: [ldev] ++
1,208,530 UART: [ldev] CDI.KEYID = 6
1,208,894 UART: [ldev] SUBJECT.KEYID = 5
1,209,321 UART: [ldev] AUTHORITY.KEYID = 7
1,209,784 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,334 UART: [fwproc] Wait for Commands...
1,281,159 UART: [fwproc] Recv command 0x46574c44
1,281,892 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,449 >>> mbox cmd response: success
2,771,449 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,608 UART: [afmc] ++
2,772,776 UART: [afmc] CDI.KEYID = 6
2,773,139 UART: [afmc] SUBJECT.KEYID = 7
2,773,565 UART: [afmc] AUTHORITY.KEYID = 5
2,808,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,301 UART: [afmc] --
2,852,267 UART: [cold-reset] --
2,853,265 UART: [state] Locking Datavault
2,854,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,188 UART: [state] Locking ICCM
2,855,694 UART: [exit] Launching FMC @ 0x40000130
2,861,023 UART:
2,861,039 UART: Running Caliptra FMC ...
2,861,447 UART:
2,861,501 UART: [state] CFI Enabled
2,872,054 UART: [fht] FMC Alias Private Key: 7
2,979,913 UART: [art] Extend RT PCRs Done
2,980,341 UART: [art] Lock RT PCRs Done
2,981,939 UART: [art] Populate DV Done
2,990,398 UART: [fht] FMC Alias Private Key: 7
2,991,550 UART: [art] Derive CDI
2,991,830 UART: [art] Store in in slot 0x4
3,077,919 UART: [art] Derive Key Pair
3,078,279 UART: [art] Store priv key in slot 0x5
3,091,333 UART: [art] Derive Key Pair - Done
3,106,156 UART: [art] Signing Cert with AUTHO
3,106,636 UART: RITY.KEYID = 7
3,122,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,819 UART: [art] PUB.X = E49757AD26A4FD99D2EFFA67FF58A426128E126E228DEBDEF070246D17C643ED97D87D99A290A018873BAF05E28EF692
3,129,596 UART: [art] PUB.Y = A7AA980D471BAE882C968E90173D074A8DDE3639A335DF1B46FABD85A33967154C20507C6800B283F8C78654AE1EA6B1
3,136,522 UART: [art] SIG.R = 34196CDF56370D8E1C06B642DDD35CBAD74199EC2D63A0470B96AB238FD99FBA6784426ED299D474A7FF9D8646FE53A6
3,143,293 UART: [art] SIG.S = 245B477DAA1AEB24C4AFE1340941BAF036755B8EBB06144B4CB6A36DAC5FC3C173E17EF97BFDC251A94868C45D6FEAE3
3,167,086 UART: Caliptra RT
3,167,339 UART: [state] CFI Enabled
3,274,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,836 UART: [rt]cmd =0x54514754, len=24
3,308,059 >>> mbox cmd response data (8 bytes)
3,308,060 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,365 UART: [rt]cmd =0x47544744, len=8
3,339,839 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,628 ready_for_fw is high
1,056,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,461 >>> mbox cmd response: success
2,622,461 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,303 UART:
2,685,319 UART: Running Caliptra FMC ...
2,685,727 UART:
2,685,781 UART: [state] CFI Enabled
2,696,486 UART: [fht] FMC Alias Private Key: 7
2,804,097 UART: [art] Extend RT PCRs Done
2,804,525 UART: [art] Lock RT PCRs Done
2,806,127 UART: [art] Populate DV Done
2,814,344 UART: [fht] FMC Alias Private Key: 7
2,815,272 UART: [art] Derive CDI
2,815,552 UART: [art] Store in in slot 0x4
2,901,075 UART: [art] Derive Key Pair
2,901,435 UART: [art] Store priv key in slot 0x5
2,914,757 UART: [art] Derive Key Pair - Done
2,930,017 UART: [art] Signing Cert with AUTHO
2,930,497 UART: RITY.KEYID = 7
2,945,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,640 UART: [art] PUB.X = 9FAA031686204A11E59A6F20858BE99F9C8ACFAE14503673263BC85C3036D47806944289D515F45B8C90B4926B9715CB
2,953,398 UART: [art] PUB.Y = 184ED8562F8AE9BC08CB8E1A468BB416858D79180477C23D0A11A378E3835B667506DE6D5F7F3C33C0FDA60CBD076897
2,960,334 UART: [art] SIG.R = 9558AE3171F75911F6130179B21410467DC87258DEEA8D2E58B7AD8630C420DB2E20BB02050E79745858D32D1ABF7A0C
2,967,087 UART: [art] SIG.S = 48D3476E170C48ADA223C1B3E3DB71A79CF77DDB7D894003BB6C346E583726013B292C25D9C6C9E863D9BA239438058E
2,990,202 UART: Caliptra RT
2,990,455 UART: [state] CFI Enabled
3,098,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,880 UART: [rt]cmd =0x54514754, len=24
3,131,237 >>> mbox cmd response data (8 bytes)
3,131,238 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,553 UART: [rt]cmd =0x47544744, len=8
3,162,959 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,174,052 ready_for_fw is high
1,174,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,198,690 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,143 UART: [ldev] Erasing FE.KEYID = 1
1,240,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,473 UART: [ldev] --
1,279,989 UART: [fwproc] Wait for Commands...
1,280,740 UART: [fwproc] Recv command 0x46574c44
1,281,473 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,470 >>> mbox cmd response: success
2,771,470 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,599 UART: [afmc] ++
2,772,767 UART: [afmc] CDI.KEYID = 6
2,773,130 UART: [afmc] SUBJECT.KEYID = 7
2,773,556 UART: [afmc] AUTHORITY.KEYID = 5
2,809,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,886 UART: [afmc] --
2,852,992 UART: [cold-reset] --
2,853,930 UART: [state] Locking Datavault
2,855,049 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,653 UART: [state] Locking ICCM
2,856,305 UART: [exit] Launching FMC @ 0x40000130
2,861,634 UART:
2,861,650 UART: Running Caliptra FMC ...
2,862,058 UART:
2,862,201 UART: [state] CFI Enabled
2,872,840 UART: [fht] FMC Alias Private Key: 7
2,981,139 UART: [art] Extend RT PCRs Done
2,981,567 UART: [art] Lock RT PCRs Done
2,983,069 UART: [art] Populate DV Done
2,991,122 UART: [fht] FMC Alias Private Key: 7
2,992,250 UART: [art] Derive CDI
2,992,530 UART: [art] Store in in slot 0x4
3,078,537 UART: [art] Derive Key Pair
3,078,897 UART: [art] Store priv key in slot 0x5
3,092,331 UART: [art] Derive Key Pair - Done
3,106,975 UART: [art] Signing Cert with AUTHO
3,107,455 UART: RITY.KEYID = 7
3,122,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,454 UART: [art] PUB.X = D23F6F365E122FE08A3D2E797E5432101418E4A1D317C347D68C50BFADFC266E3D42E96CCFF53AF6515DB2373B5929E4
3,130,232 UART: [art] PUB.Y = 617D7CDBA1F0A2D03766EEED085F6ACC325AC0A99D3E7C348FC128807FA1BCA33449999436B97AEF40CFE8A0D7DB251A
3,137,199 UART: [art] SIG.R = E9E405C90752716B130AFEE8BA827B8C9AFA808B797C21AFCBEBB8B7D556E5D9EFBB70F457E95F96925C2647501A6E72
3,143,974 UART: [art] SIG.S = 632FBACDC40A1272ABE5323437EB4765DEFA5E6A562463B670A6940BA31AD1F8EAB570C0E9D187A86AD898C29A5DFE6F
3,167,427 UART: Caliptra RT
3,167,772 UART: [state] CFI Enabled
3,275,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,455 UART: [rt]cmd =0x54514754, len=24
3,308,400 >>> mbox cmd response data (8 bytes)
3,308,401 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,592 UART: [rt]cmd =0x47544744, len=8
3,339,922 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,377 ready_for_fw is high
1,056,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,620 >>> mbox cmd response: success
2,622,620 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,218 UART:
2,685,234 UART: Running Caliptra FMC ...
2,685,642 UART:
2,685,785 UART: [state] CFI Enabled
2,696,442 UART: [fht] FMC Alias Private Key: 7
2,804,801 UART: [art] Extend RT PCRs Done
2,805,229 UART: [art] Lock RT PCRs Done
2,806,605 UART: [art] Populate DV Done
2,814,758 UART: [fht] FMC Alias Private Key: 7
2,815,806 UART: [art] Derive CDI
2,816,086 UART: [art] Store in in slot 0x4
2,901,657 UART: [art] Derive Key Pair
2,902,017 UART: [art] Store priv key in slot 0x5
2,915,593 UART: [art] Derive Key Pair - Done
2,930,177 UART: [art] Signing Cert with AUTHO
2,930,657 UART: RITY.KEYID = 7
2,945,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,598 UART: [art] PUB.X = 277F68D9F284C934368194A75ACD828968E689693FD4236ED4386ECBF795C3E8DF79ECF6A8366CFEDD95482ABFF9EC50
2,953,378 UART: [art] PUB.Y = D47AB5EC0567FF28F57616E7B9151BA522EBF84DB12A3C4A45A9BD2CBCC82112EBD06B5E01BB14FD932EBFF6C7BA30E2
2,960,348 UART: [art] SIG.R = 5DFE50C7E7CAD7FD9F0B6E134F8FDD951A6C32F38E68BF6E3799877EA175AA3D4D5677076136681FAA03EB686571F2D8
2,967,121 UART: [art] SIG.S = 2C0D9345AC943F15A5EEF3C83CEDF4A767795F855CB9734E93E09D570A5454ED4C357A86F72D9EA6B6400B220EA96A6E
2,990,506 UART: Caliptra RT
2,990,851 UART: [state] CFI Enabled
3,099,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,504 UART: [rt]cmd =0x54514754, len=24
3,131,917 >>> mbox cmd response data (8 bytes)
3,131,918 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,221 UART: [rt]cmd =0x47544744, len=8
3,163,811 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,442 UART: [idev] ++
1,479,610 UART: [idev] CDI.KEYID = 6
1,479,970 UART: [idev] SUBJECT.KEYID = 7
1,480,394 UART: [idev] UDS.KEYID = 0
1,480,739 ready_for_fw is high
1,480,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,420 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,520,969 UART: [ldev] Erasing FE.KEYID = 1
1,546,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,226 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,388 UART: [fwproc] Received command 0x46574c44
1,587,179 UART: [fwproc] Received Image of size 114332 bytes
2,885,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,651 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,888 >>> mbox cmd response: success
3,077,888 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,146 UART: [afmc] ++
3,079,314 UART: [afmc] CDI.KEYID = 6
3,079,676 UART: [afmc] SUBJECT.KEYID = 7
3,080,101 UART: [afmc] AUTHORITY.KEYID = 5
3,115,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,203 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,893 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,634 UART: [afmc] --
3,158,696 UART: [cold-reset] --
3,159,300 UART: [state] Locking Datavault
3,160,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,099 UART: [state] Locking ICCM
3,161,673 UART: [exit] Launching FMC @ 0x40000130
3,167,002 UART:
3,167,018 UART: Running Caliptra FMC ...
3,167,426 UART:
3,167,480 UART: [state] CFI Enabled
3,177,813 UART: [fht] FMC Alias Private Key: 7
3,286,468 UART: [art] Extend RT PCRs Done
3,286,896 UART: [art] Lock RT PCRs Done
3,288,430 UART: [art] Populate DV Done
3,296,967 UART: [fht] FMC Alias Private Key: 7
3,298,031 UART: [art] Derive CDI
3,298,311 UART: [art] Store in in slot 0x4
3,383,702 UART: [art] Derive Key Pair
3,384,062 UART: [art] Store priv key in slot 0x5
3,396,894 UART: [art] Derive Key Pair - Done
3,411,271 UART: [art] Signing Cert with AUTHO
3,411,751 UART: RITY.KEYID = 7
3,427,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,802 UART: [art] PUB.X = A778B3E352500495761C7E138EB2DE8C9CD6D326A60D5CFA4547163A700072C59C824D6A15305FC000843F65C181C930
3,434,516 UART: [art] PUB.Y = 7AD6E6EA64B7275560650A5F2450D374AA8EC05534B4F375D4C63B021080C7B2F4DE64DDD76AEF03A35ADAC102945543
3,441,460 UART: [art] SIG.R = 7081226920A14DBF591D56D7B734ED130FB70543AF42911431808BD8FFA11D9CF2D3630757829025A1B09EA0968A3CA8
3,448,217 UART: [art] SIG.S = 4C4322389B82A119EC80B69D3EE072380744326074331DEBB2D3AAEB966969AFE6E2AE0A3F2FA6AE0750DAC1AAF476AC
3,472,223 UART: Caliptra RT
3,472,476 UART: [state] CFI Enabled
3,581,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,372 UART: [rt]cmd =0x54514754, len=24
3,614,617 >>> mbox cmd response data (8 bytes)
3,614,618 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,949 UART: [rt]cmd =0x44504543, len=36
3,681,394 >>> mbox cmd response data (24 bytes)
3,681,395 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,606 UART: [rt]cmd =0x47544744, len=8
3,712,131 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,331 ready_for_fw is high
1,362,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,418 >>> mbox cmd response: success
2,927,418 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,134 UART:
2,989,150 UART: Running Caliptra FMC ...
2,989,558 UART:
2,989,612 UART: [state] CFI Enabled
2,999,859 UART: [fht] FMC Alias Private Key: 7
3,107,952 UART: [art] Extend RT PCRs Done
3,108,380 UART: [art] Lock RT PCRs Done
3,109,816 UART: [art] Populate DV Done
3,118,129 UART: [fht] FMC Alias Private Key: 7
3,119,183 UART: [art] Derive CDI
3,119,463 UART: [art] Store in in slot 0x4
3,205,540 UART: [art] Derive Key Pair
3,205,900 UART: [art] Store priv key in slot 0x5
3,219,298 UART: [art] Derive Key Pair - Done
3,233,969 UART: [art] Signing Cert with AUTHO
3,234,449 UART: RITY.KEYID = 7
3,249,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,408 UART: [art] PUB.X = AF6D4AE5B7562D8912114ECA82FA9030B43CE8FDDE5CB8B6EB9675160C513DAB6C9743DB66573CA4D3778BE7B22E5456
3,257,189 UART: [art] PUB.Y = BB8D22C081CE3FC0C1B61E82D2DCB59FA2368DBDD796FCAFD0766F36770BB6812623FBD095670ECEB27697C58748B787
3,264,147 UART: [art] SIG.R = 050E830DD25B0C263EF868967AB6752A0C0355F9590A110C231C6D2309A076B72C947EFD9DE0381E40C3DB9B4CE2034F
3,270,889 UART: [art] SIG.S = 09F74D9EA447B956328C5E229ED4225C552FBDD62459719B98ED87084A4A1BB2BC0A840387C14F1A5007936A66B36318
3,294,607 UART: Caliptra RT
3,294,860 UART: [state] CFI Enabled
3,402,516 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,028 UART: [rt]cmd =0x54514754, len=24
3,435,157 >>> mbox cmd response data (8 bytes)
3,435,158 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,837 UART: [rt]cmd =0x44504543, len=36
3,503,648 >>> mbox cmd response data (24 bytes)
3,503,649 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,002 UART: [rt]cmd =0x47544744, len=8
3,534,335 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,037 UART: [kat] SHA2-512-ACC
896,938 UART: [kat] ECC-384
902,419 UART: [kat] HMAC-384Kdf
906,863 UART: [kat] LMS
1,475,059 UART: [kat] --
1,475,906 UART: [cold-reset] ++
1,476,314 UART: [fht] Storing FHT @ 0x50003400
1,479,081 UART: [idev] ++
1,479,249 UART: [idev] CDI.KEYID = 6
1,479,609 UART: [idev] SUBJECT.KEYID = 7
1,480,033 UART: [idev] UDS.KEYID = 0
1,480,378 ready_for_fw is high
1,480,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,327 UART: [idev] Erasing UDS.KEYID = 0
1,505,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,967 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,670 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,845 UART: [ldev] --
1,586,226 UART: [fwproc] Waiting for Commands...
1,587,029 UART: [fwproc] Received command 0x46574c44
1,587,820 UART: [fwproc] Received Image of size 114332 bytes
2,886,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,625 >>> mbox cmd response: success
3,078,625 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,777 UART: [afmc] ++
3,079,945 UART: [afmc] CDI.KEYID = 6
3,080,307 UART: [afmc] SUBJECT.KEYID = 7
3,080,732 UART: [afmc] AUTHORITY.KEYID = 5
3,115,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,374 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,064 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,977 UART: [afmc] --
3,159,075 UART: [cold-reset] --
3,159,927 UART: [state] Locking Datavault
3,160,952 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,556 UART: [state] Locking ICCM
3,162,124 UART: [exit] Launching FMC @ 0x40000130
3,167,453 UART:
3,167,469 UART: Running Caliptra FMC ...
3,167,877 UART:
3,168,020 UART: [state] CFI Enabled
3,178,649 UART: [fht] FMC Alias Private Key: 7
3,286,416 UART: [art] Extend RT PCRs Done
3,286,844 UART: [art] Lock RT PCRs Done
3,288,536 UART: [art] Populate DV Done
3,296,771 UART: [fht] FMC Alias Private Key: 7
3,297,929 UART: [art] Derive CDI
3,298,209 UART: [art] Store in in slot 0x4
3,383,732 UART: [art] Derive Key Pair
3,384,092 UART: [art] Store priv key in slot 0x5
3,397,102 UART: [art] Derive Key Pair - Done
3,412,089 UART: [art] Signing Cert with AUTHO
3,412,569 UART: RITY.KEYID = 7
3,427,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,660 UART: [art] PUB.X = 536F733EBB63FB04834B03440BF3842E0FEB5158651F0571461A271BD1E37AD458DCADA28F8545D313C215A1EF3C3CBC
3,435,423 UART: [art] PUB.Y = 92DF145F6988EE97FCF02D98788ED81F492C9AD71A43AFE684355A0904D8167BF7E5883A7DD3D6BCD84AE1C06093C05D
3,442,377 UART: [art] SIG.R = 87CA9105CEE7E457E1E79E5B16388757AAA319D722424488E7753F6E1B7FC92325FD194717178B5254467F6626F759A9
3,449,134 UART: [art] SIG.S = ABB8F5664C04F377554AAC134E0C5565E46B1B85F74B9A352B4FE7BFF30214BD933ADAD7AF2ECD22FABF04FDEF358A9A
3,472,977 UART: Caliptra RT
3,473,322 UART: [state] CFI Enabled
3,581,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,888 UART: [rt]cmd =0x54514754, len=24
3,613,987 >>> mbox cmd response data (8 bytes)
3,613,988 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,809 UART: [rt]cmd =0x44504543, len=36
3,682,246 >>> mbox cmd response data (24 bytes)
3,682,247 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,532 UART: [rt]cmd =0x47544744, len=8
3,713,085 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 ready_for_fw is high
1,362,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,945 >>> mbox cmd response: success
2,927,945 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,313 UART:
2,990,329 UART: Running Caliptra FMC ...
2,990,737 UART:
2,990,880 UART: [state] CFI Enabled
3,001,413 UART: [fht] FMC Alias Private Key: 7
3,110,344 UART: [art] Extend RT PCRs Done
3,110,772 UART: [art] Lock RT PCRs Done
3,111,834 UART: [art] Populate DV Done
3,120,165 UART: [fht] FMC Alias Private Key: 7
3,121,279 UART: [art] Derive CDI
3,121,559 UART: [art] Store in in slot 0x4
3,207,266 UART: [art] Derive Key Pair
3,207,626 UART: [art] Store priv key in slot 0x5
3,220,778 UART: [art] Derive Key Pair - Done
3,235,540 UART: [art] Signing Cert with AUTHO
3,236,020 UART: RITY.KEYID = 7
3,250,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,723 UART: [art] PUB.X = 75A20CDAEFCB5F15E935999277477BE934643059AB7C2F6088D2A5BEBFF90BDD86630F7FF340B1325CA55C564BF34C6B
3,258,496 UART: [art] PUB.Y = D3A9F07EEEFA9591CD7B524B51AFF2DAADAE1AD2798A5D0D5DFC3B2C0821EC2CE87B8B0A4C4F72EE1157C31D1CD9F206
3,265,466 UART: [art] SIG.R = 5F1FE3A36EDEBC2B32BB59351F91FE8252B627753582AAD7981F6D4EBF89DCACB0E46D3B3C436D94FBFB55BEDD23A4F8
3,272,262 UART: [art] SIG.S = 15F5330ACA0104FEB567FB35BA7C4E03DFF238D33EFF3E691DED3EC32EE5B23532E6EF5E2B1BFFD1E68B5728BD3B4F76
3,295,791 UART: Caliptra RT
3,296,136 UART: [state] CFI Enabled
3,404,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,036 UART: [rt]cmd =0x54514754, len=24
3,437,163 >>> mbox cmd response data (8 bytes)
3,437,164 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,737 UART: [rt]cmd =0x44504543, len=36
3,504,074 >>> mbox cmd response data (24 bytes)
3,504,075 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,192 UART: [rt]cmd =0x47544744, len=8
3,534,717 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
892,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,059 UART: [kat] ++
897,211 UART: [kat] sha1
901,535 UART: [kat] SHA2-256
903,475 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
917,812 UART: [kat] HMAC-384Kdf
922,566 UART: [kat] LMS
1,170,894 UART: [kat] --
1,171,781 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,758 UART: [idev] ++
1,174,926 UART: [idev] CDI.KEYID = 6
1,175,286 UART: [idev] SUBJECT.KEYID = 7
1,175,710 UART: [idev] UDS.KEYID = 0
1,176,055 ready_for_fw is high
1,176,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,813 UART: [idev] --
1,210,857 UART: [ldev] ++
1,211,025 UART: [ldev] CDI.KEYID = 6
1,211,388 UART: [ldev] SUBJECT.KEYID = 5
1,211,814 UART: [ldev] AUTHORITY.KEYID = 7
1,212,277 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,143 UART: [ldev] --
1,282,406 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,687 >>> mbox cmd response: success
2,774,687 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,807 UART: [afmc] ++
2,775,975 UART: [afmc] CDI.KEYID = 6
2,776,337 UART: [afmc] SUBJECT.KEYID = 7
2,776,762 UART: [afmc] AUTHORITY.KEYID = 5
2,811,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,086 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,814 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,699 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,418 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,438 UART: [afmc] --
2,855,494 UART: [cold-reset] --
2,856,358 UART: [state] Locking Datavault
2,857,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,149 UART: [state] Locking ICCM
2,858,777 UART: [exit] Launching FMC @ 0x40000130
2,864,106 UART:
2,864,122 UART: Running Caliptra FMC ...
2,864,530 UART:
2,864,584 UART: [state] CFI Enabled
2,875,073 UART: [fht] FMC Alias Private Key: 7
2,982,848 UART: [art] Extend RT PCRs Done
2,983,276 UART: [art] Lock RT PCRs Done
2,985,056 UART: [art] Populate DV Done
2,993,585 UART: [fht] FMC Alias Private Key: 7
2,994,661 UART: [art] Derive CDI
2,994,941 UART: [art] Store in in slot 0x4
3,080,514 UART: [art] Derive Key Pair
3,080,874 UART: [art] Store priv key in slot 0x5
3,094,394 UART: [art] Derive Key Pair - Done
3,109,278 UART: [art] Signing Cert with AUTHO
3,109,758 UART: RITY.KEYID = 7
3,125,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,837 UART: [art] PUB.X = 23FE8FB10590CEC634D991D7F6409C940F8B2D51FA2BE93BDD9F34E5D82E21DB1E448BA05F1C6B848FB83553A710DBF3
3,132,617 UART: [art] PUB.Y = 0DFFED87C5B9532B70E8CAE16A1470038272C035A9DA8B443133B824D30740632F5332A5590F94014B1293D6529A12C7
3,139,544 UART: [art] SIG.R = F3E2A71B14A7D535CDB7E3765C4C6E7B6B4F31B48661FF61A8A79061B80FAF597AB2020DC5540B454F625E85A133B41C
3,146,310 UART: [art] SIG.S = 2F5AD3A75718E4416D1CE1514253E0F203736B09AF389556FCF7D33F638157B8FD05C946DB3CF52AFEC6A70F992586BD
3,169,835 UART: Caliptra RT
3,170,088 UART: [state] CFI Enabled
3,277,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,487 UART: [rt]cmd =0x54514754, len=24
3,310,560 >>> mbox cmd response data (8 bytes)
3,310,561 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,030 UART: [rt]cmd =0x44504543, len=36
3,377,869 >>> mbox cmd response data (24 bytes)
3,377,870 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,283 UART: [rt]cmd =0x47544744, len=8
3,408,688 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,689 ready_for_fw is high
1,060,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,416 >>> mbox cmd response: success
2,624,416 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,890 UART:
2,686,906 UART: Running Caliptra FMC ...
2,687,314 UART:
2,687,368 UART: [state] CFI Enabled
2,697,741 UART: [fht] FMC Alias Private Key: 7
2,805,666 UART: [art] Extend RT PCRs Done
2,806,094 UART: [art] Lock RT PCRs Done
2,807,292 UART: [art] Populate DV Done
2,815,493 UART: [fht] FMC Alias Private Key: 7
2,816,493 UART: [art] Derive CDI
2,816,773 UART: [art] Store in in slot 0x4
2,902,286 UART: [art] Derive Key Pair
2,902,646 UART: [art] Store priv key in slot 0x5
2,915,680 UART: [art] Derive Key Pair - Done
2,931,105 UART: [art] Signing Cert with AUTHO
2,931,585 UART: RITY.KEYID = 7
2,947,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,914 UART: [art] PUB.X = F08032B20D75FA9C501CC65263667045C0CE0B7AC4172F7E586DB795D517DF57E4AC450316188789D2FFAB449224066A
2,954,670 UART: [art] PUB.Y = CD6FD0846337ADCAC99E6F78ADCCAF17DB7FE64225F20176E70B21985A66B8CEA60A2D35127324463D037DBA54DDFF5D
2,961,626 UART: [art] SIG.R = 003188E0D480CBCB44B3A89EC5277F1454963DA7923F9DACC7CA8B50C154EFA54AC9CD176606DDE7FFF33871254E0EF1
2,968,382 UART: [art] SIG.S = 427E842F372BFDE7BC6ACFD302AC573524E4E3E3D491D32EBBBC7C7B5D9564A9324EABA3FE2E2185DDF0A38C82AAAEF5
2,992,318 UART: Caliptra RT
2,992,571 UART: [state] CFI Enabled
3,099,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,856 UART: [rt]cmd =0x54514754, len=24
3,132,295 >>> mbox cmd response data (8 bytes)
3,132,296 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,171 UART: [rt]cmd =0x44504543, len=36
3,199,756 >>> mbox cmd response data (24 bytes)
3,199,757 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,242 UART: [rt]cmd =0x47544744, len=8
3,230,659 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
893,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,444 UART: [kat] ++
897,596 UART: [kat] sha1
901,808 UART: [kat] SHA2-256
903,748 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,262 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 ready_for_fw is high
1,176,620 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,114 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] --
1,210,818 UART: [ldev] ++
1,210,986 UART: [ldev] CDI.KEYID = 6
1,211,349 UART: [ldev] SUBJECT.KEYID = 5
1,211,775 UART: [ldev] AUTHORITY.KEYID = 7
1,212,238 UART: [ldev] FE.KEYID = 1
1,217,698 UART: [ldev] Erasing FE.KEYID = 1
1,244,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,416 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,545 UART: [fwproc] Recv command 0x46574c44
1,285,273 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,902 >>> mbox cmd response: success
2,775,902 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,104 UART: [afmc] ++
2,777,272 UART: [afmc] CDI.KEYID = 6
2,777,634 UART: [afmc] SUBJECT.KEYID = 7
2,778,059 UART: [afmc] AUTHORITY.KEYID = 5
2,813,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,191 UART: [afmc] --
2,857,187 UART: [cold-reset] --
2,858,305 UART: [state] Locking Datavault
2,859,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,964 UART: [state] Locking ICCM
2,860,594 UART: [exit] Launching FMC @ 0x40000130
2,865,923 UART:
2,865,939 UART: Running Caliptra FMC ...
2,866,347 UART:
2,866,490 UART: [state] CFI Enabled
2,877,501 UART: [fht] FMC Alias Private Key: 7
2,985,594 UART: [art] Extend RT PCRs Done
2,986,022 UART: [art] Lock RT PCRs Done
2,987,626 UART: [art] Populate DV Done
2,995,799 UART: [fht] FMC Alias Private Key: 7
2,996,791 UART: [art] Derive CDI
2,997,071 UART: [art] Store in in slot 0x4
3,082,802 UART: [art] Derive Key Pair
3,083,162 UART: [art] Store priv key in slot 0x5
3,097,032 UART: [art] Derive Key Pair - Done
3,111,742 UART: [art] Signing Cert with AUTHO
3,112,222 UART: RITY.KEYID = 7
3,127,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,641 UART: [art] PUB.X = 388A7E3CDE208D7D995114E58E7BD14319CA81BA41B557EB4684C898F0D14B853D0A6DF41C186425303ADEAAD69E8609
3,135,411 UART: [art] PUB.Y = 89C28DE9AD15E60FD371117795C853DDDBF441F4662A7E99945CA088A52D239B0BDBDF1AB1A91F8BD85DC4800EF15AC7
3,142,368 UART: [art] SIG.R = 6F7419301BBA64E48A7F95F8122019B34F91EE1E609F0B55D4A8F18ECE28E6A484AB44E2E0F807DF6A890B5EE46358A2
3,149,137 UART: [art] SIG.S = 458E2C11DBFAAF48DC0FADF471C45C68599E6E5B9F02189E65B6D173F0FF26E01AA2F8C295DD0FE0BA441AC72C13F6EE
3,172,799 UART: Caliptra RT
3,173,144 UART: [state] CFI Enabled
3,280,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,109 UART: [rt]cmd =0x54514754, len=24
3,313,056 >>> mbox cmd response data (8 bytes)
3,313,057 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,486 UART: [rt]cmd =0x44504543, len=36
3,380,639 >>> mbox cmd response data (24 bytes)
3,380,640 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,821 UART: [rt]cmd =0x47544744, len=8
3,411,600 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,962 ready_for_fw is high
1,059,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,611 >>> mbox cmd response: success
2,627,611 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,825 UART:
2,690,841 UART: Running Caliptra FMC ...
2,691,249 UART:
2,691,392 UART: [state] CFI Enabled
2,702,035 UART: [fht] FMC Alias Private Key: 7
2,809,528 UART: [art] Extend RT PCRs Done
2,809,956 UART: [art] Lock RT PCRs Done
2,811,368 UART: [art] Populate DV Done
2,819,579 UART: [fht] FMC Alias Private Key: 7
2,820,589 UART: [art] Derive CDI
2,820,869 UART: [art] Store in in slot 0x4
2,906,058 UART: [art] Derive Key Pair
2,906,418 UART: [art] Store priv key in slot 0x5
2,919,734 UART: [art] Derive Key Pair - Done
2,934,453 UART: [art] Signing Cert with AUTHO
2,934,933 UART: RITY.KEYID = 7
2,950,447 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,212 UART: [art] PUB.X = E7FDC90E96207D10C7624E384C4B73E851097B3F81E3EEEC6ED06E0C4CAC3D534350370D8259E334C0CAFA92592816E8
2,957,976 UART: [art] PUB.Y = 238E692F2FD0FF5507AB44A7B7667B4903717D72C65D9F828F26346516F9B99EFCE838E24886A5C2432320976D0A968A
2,964,911 UART: [art] SIG.R = D5CAB4D43C4FD69E9CA2165A8FC8E895C7B80D9782DC673BAB7D56A5E57C7221BFBE5EE1DEE193D759081F47D52663A6
2,971,693 UART: [art] SIG.S = E8A96686E8AE55C344A24CA4DAD0C28A7BD72C6BF6E9EEA5C046BAD6190E401599A47C5E4287EAA6397DAFEAEE83C60C
2,996,032 UART: Caliptra RT
2,996,377 UART: [state] CFI Enabled
3,103,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,203 UART: [rt]cmd =0x54514754, len=24
3,136,634 >>> mbox cmd response data (8 bytes)
3,136,635 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,358 UART: [rt]cmd =0x44504543, len=36
3,204,065 >>> mbox cmd response data (24 bytes)
3,204,066 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,491 UART: [rt]cmd =0x47544744, len=8
3,235,070 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,714 UART: [state] LifecycleState = Unprovisioned
86,369 UART: [state] DebugLocked = No
87,011 UART: [state] WD Timer not started. Device not locked for debugging
88,230 UART: [kat] SHA2-256
891,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,909 UART: [kat] ++
896,061 UART: [kat] sha1
900,479 UART: [kat] SHA2-256
902,419 UART: [kat] SHA2-384
905,206 UART: [kat] SHA2-512-ACC
907,107 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,104 UART: [kat] LMS
1,169,416 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,785 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,174,817 ready_for_fw is high
1,174,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,581 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,470 UART: [ldev] ++
1,209,638 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,429 UART: [ldev] AUTHORITY.KEYID = 7
1,210,892 UART: [ldev] FE.KEYID = 1
1,216,134 UART: [ldev] Erasing FE.KEYID = 1
1,242,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,847 UART: [fwproc] Recv command 0x46574c44
1,282,580 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,351 >>> mbox cmd response: success
2,772,351 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,544 UART: [afmc] ++
2,773,712 UART: [afmc] CDI.KEYID = 6
2,774,075 UART: [afmc] SUBJECT.KEYID = 7
2,774,501 UART: [afmc] AUTHORITY.KEYID = 5
2,810,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,673 UART: [afmc] --
2,853,611 UART: [cold-reset] --
2,854,357 UART: [state] Locking Datavault
2,855,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,974 UART: [state] Locking ICCM
2,856,470 UART: [exit] Launching FMC @ 0x40000130
2,861,799 UART:
2,861,815 UART: Running Caliptra FMC ...
2,862,223 UART:
2,862,277 UART: [state] CFI Enabled
2,872,698 UART: [fht] FMC Alias Private Key: 7
2,980,353 UART: [art] Extend RT PCRs Done
2,980,781 UART: [art] Lock RT PCRs Done
2,982,275 UART: [art] Populate DV Done
2,990,674 UART: [fht] FMC Alias Private Key: 7
2,991,604 UART: [art] Derive CDI
2,991,884 UART: [art] Store in in slot 0x4
3,077,533 UART: [art] Derive Key Pair
3,077,893 UART: [art] Store priv key in slot 0x5
3,090,747 UART: [art] Derive Key Pair - Done
3,105,468 UART: [art] Signing Cert with AUTHO
3,105,948 UART: RITY.KEYID = 7
3,121,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,279 UART: [art] PUB.X = C4895FE4A5A464BEB8BFB61E0AF2B66655649613079B69F399F7ADAE33F575B63F5208E488CD52F3B94175046F57E8B2
3,129,041 UART: [art] PUB.Y = EB6719610340897D5EF5A14EE288BB18C904EDF067903BAE0FA98CD35EF97B86A80885929246DF270EF3EEDAE3FBFA28
3,135,990 UART: [art] SIG.R = F80C9C854BAD15F7D8019B4FE8FD016EF207EDE738B0774F876CF3D7A928C02001F3F101C245F7E7D0C023B412C6282E
3,142,750 UART: [art] SIG.S = 9B79161250D82A18B85402466390A164E73D981C19498F8A689DE5D653F62E3CA6FA4D6E0CCF05F43315F3106823459E
3,166,560 UART: Caliptra RT
3,166,813 UART: [state] CFI Enabled
3,274,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,439 UART: [rt]cmd =0x54514754, len=24
3,307,852 >>> mbox cmd response data (8 bytes)
3,307,853 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,278 UART: [rt]cmd =0x44504543, len=36
3,375,325 >>> mbox cmd response data (24 bytes)
3,375,326 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,711 UART: [rt]cmd =0x47544744, len=8
3,406,230 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,850 ready_for_fw is high
1,055,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,283 >>> mbox cmd response: success
2,622,283 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,815 UART:
2,684,831 UART: Running Caliptra FMC ...
2,685,239 UART:
2,685,293 UART: [state] CFI Enabled
2,695,992 UART: [fht] FMC Alias Private Key: 7
2,803,825 UART: [art] Extend RT PCRs Done
2,804,253 UART: [art] Lock RT PCRs Done
2,805,759 UART: [art] Populate DV Done
2,814,020 UART: [fht] FMC Alias Private Key: 7
2,815,172 UART: [art] Derive CDI
2,815,452 UART: [art] Store in in slot 0x4
2,901,065 UART: [art] Derive Key Pair
2,901,425 UART: [art] Store priv key in slot 0x5
2,914,609 UART: [art] Derive Key Pair - Done
2,929,439 UART: [art] Signing Cert with AUTHO
2,929,919 UART: RITY.KEYID = 7
2,944,717 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,482 UART: [art] PUB.X = 234FA7C6B008D17962008BCDCF5A652DC1356B72D7F0E03144802956216550EA27E42EC07DD110983A41B0D934A4C23A
2,952,225 UART: [art] PUB.Y = CB79A57873204367FA2E7CE508DC1D03622A99557B85BBBAA1653DA7306BB6C0C8063C8676CE3782549B5A95AA8E8618
2,959,168 UART: [art] SIG.R = D81E6CDBE39AD74AF3CCD341F5D1B86BC235300DD36D36D58EB6B0A8A16094E781840FC1DAC3C9C06D28534730B7180D
2,965,943 UART: [art] SIG.S = 182738BC7EA67DF741ADAB3986EE87B4CBA92EEF7E72FAEFB623D8F00DFC9603AEB39E27E5C5D8FDDB5AFAF9ABFEB829
2,989,508 UART: Caliptra RT
2,989,761 UART: [state] CFI Enabled
3,098,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,916 UART: [rt]cmd =0x54514754, len=24
3,130,865 >>> mbox cmd response data (8 bytes)
3,130,866 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,423 UART: [rt]cmd =0x44504543, len=36
3,199,166 >>> mbox cmd response data (24 bytes)
3,199,167 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,620 UART: [rt]cmd =0x47544744, len=8
3,230,395 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,789 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,722 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,675 UART: [ldev] ++
1,208,843 UART: [ldev] CDI.KEYID = 6
1,209,207 UART: [ldev] SUBJECT.KEYID = 5
1,209,634 UART: [ldev] AUTHORITY.KEYID = 7
1,210,097 UART: [ldev] FE.KEYID = 1
1,215,301 UART: [ldev] Erasing FE.KEYID = 1
1,241,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,280,953 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,690 >>> mbox cmd response: success
2,771,690 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,867 UART: [afmc] ++
2,773,035 UART: [afmc] CDI.KEYID = 6
2,773,398 UART: [afmc] SUBJECT.KEYID = 7
2,773,824 UART: [afmc] AUTHORITY.KEYID = 5
2,809,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,614 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,180 UART: [afmc] --
2,852,170 UART: [cold-reset] --
2,853,146 UART: [state] Locking Datavault
2,854,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,031 UART: [state] Locking ICCM
2,855,511 UART: [exit] Launching FMC @ 0x40000130
2,860,840 UART:
2,860,856 UART: Running Caliptra FMC ...
2,861,264 UART:
2,861,407 UART: [state] CFI Enabled
2,872,106 UART: [fht] FMC Alias Private Key: 7
2,979,811 UART: [art] Extend RT PCRs Done
2,980,239 UART: [art] Lock RT PCRs Done
2,981,899 UART: [art] Populate DV Done
2,990,266 UART: [fht] FMC Alias Private Key: 7
2,991,284 UART: [art] Derive CDI
2,991,564 UART: [art] Store in in slot 0x4
3,077,351 UART: [art] Derive Key Pair
3,077,711 UART: [art] Store priv key in slot 0x5
3,091,099 UART: [art] Derive Key Pair - Done
3,105,646 UART: [art] Signing Cert with AUTHO
3,106,126 UART: RITY.KEYID = 7
3,121,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,021 UART: [art] PUB.X = 3B08402710CE5917F8063245D4682201270391503BDB821C7E186B7D99D803AD28C2FCF3D071634E7B5CA6C952BA83C1
3,128,770 UART: [art] PUB.Y = 5EF799D6C9C0C2963E5CFEA33FEA28F0A2861D05BA8EDDA2C6BCE57F8C701037A3DDE4C36A8115F82929418935D88C80
3,135,731 UART: [art] SIG.R = A65F65A5595848972DBD4AE02AFAD31AE18A33096591A37C9D8E1ADBD0C17E7263EFA1080CD55472FA4D036E339B99D1
3,142,499 UART: [art] SIG.S = 82AC4FF252DD3E738B762BE8410FCEBC6FE6558832A465EE46106901C605A2B6872410EB21DA7C211013769C2F7962A6
3,166,805 UART: Caliptra RT
3,167,150 UART: [state] CFI Enabled
3,275,358 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,002 UART: [rt]cmd =0x54514754, len=24
3,307,967 >>> mbox cmd response data (8 bytes)
3,307,968 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,533 UART: [rt]cmd =0x44504543, len=36
3,375,544 >>> mbox cmd response data (24 bytes)
3,375,545 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,888 UART: [rt]cmd =0x47544744, len=8
3,406,349 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,991 ready_for_fw is high
1,056,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,974 >>> mbox cmd response: success
2,624,974 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,878 UART:
2,686,894 UART: Running Caliptra FMC ...
2,687,302 UART:
2,687,445 UART: [state] CFI Enabled
2,698,334 UART: [fht] FMC Alias Private Key: 7
2,806,241 UART: [art] Extend RT PCRs Done
2,806,669 UART: [art] Lock RT PCRs Done
2,808,009 UART: [art] Populate DV Done
2,816,676 UART: [fht] FMC Alias Private Key: 7
2,817,698 UART: [art] Derive CDI
2,817,978 UART: [art] Store in in slot 0x4
2,903,635 UART: [art] Derive Key Pair
2,903,995 UART: [art] Store priv key in slot 0x5
2,917,027 UART: [art] Derive Key Pair - Done
2,931,783 UART: [art] Signing Cert with AUTHO
2,932,263 UART: RITY.KEYID = 7
2,947,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,348 UART: [art] PUB.X = C792F5C2A733F1A09BBA2D4FA3B217AF99E219171EB3563B6772BC1075AD248BB8C1F4FF7913776675493019DF89A640
2,955,120 UART: [art] PUB.Y = DDBDD9BF88646EEE7C98FB925CDA0567BE11343CA8F2D469D04AF522D45B10343ADF3B1D933A65DCF254A4ACA48B8A87
2,962,089 UART: [art] SIG.R = FFE103A9FC9B924FE053CB7EDA7F55D5A4D3E5C6435B7F1F3D76B930CDB662FDA446EE0E1AA1457163DA1908504470F1
2,968,866 UART: [art] SIG.S = 10AEF2A4CAC957A4BF0446BE32B7A092E409BE7BFBB7FDB68D74DE3FD4CF90C2AC3185360C5D2130C79749440D2B95A2
2,993,167 UART: Caliptra RT
2,993,512 UART: [state] CFI Enabled
3,100,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,363 UART: [rt]cmd =0x54514754, len=24
3,133,484 >>> mbox cmd response data (8 bytes)
3,133,485 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,022 UART: [rt]cmd =0x44504543, len=36
3,200,753 >>> mbox cmd response data (24 bytes)
3,200,754 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,073 UART: [rt]cmd =0x47544744, len=8
3,231,732 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,391 UART: [kat] SHA2-256
881,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,437 UART: [kat] ++
885,589 UART: [kat] sha1
889,985 UART: [kat] SHA2-256
891,923 UART: [kat] SHA2-384
894,740 UART: [kat] SHA2-512-ACC
896,641 UART: [kat] ECC-384
901,904 UART: [kat] HMAC-384Kdf
906,334 UART: [kat] LMS
1,474,530 UART: [kat] --
1,475,273 UART: [cold-reset] ++
1,475,617 UART: [fht] Storing FHT @ 0x50003400
1,478,400 UART: [idev] ++
1,478,568 UART: [idev] CDI.KEYID = 6
1,478,928 UART: [idev] SUBJECT.KEYID = 7
1,479,352 UART: [idev] UDS.KEYID = 0
1,479,697 ready_for_fw is high
1,479,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,726 UART: [idev] Erasing UDS.KEYID = 0
1,504,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,992 UART: [idev] --
1,514,061 UART: [ldev] ++
1,514,229 UART: [ldev] CDI.KEYID = 6
1,514,592 UART: [ldev] SUBJECT.KEYID = 5
1,515,018 UART: [ldev] AUTHORITY.KEYID = 7
1,515,481 UART: [ldev] FE.KEYID = 1
1,520,817 UART: [ldev] Erasing FE.KEYID = 1
1,545,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,972 UART: [ldev] --
1,585,421 UART: [fwproc] Waiting for Commands...
1,586,272 UART: [fwproc] Received command 0x46574c44
1,587,063 UART: [fwproc] Received Image of size 114332 bytes
2,884,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,319 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,671 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,462 >>> mbox cmd response: success
3,076,462 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,640 UART: [afmc] ++
3,077,808 UART: [afmc] CDI.KEYID = 6
3,078,170 UART: [afmc] SUBJECT.KEYID = 7
3,078,595 UART: [afmc] AUTHORITY.KEYID = 5
3,113,760 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,459 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,149 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,824 UART: [afmc] --
3,156,850 UART: [cold-reset] --
3,157,888 UART: [state] Locking Datavault
3,159,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,707 UART: [state] Locking ICCM
3,160,207 UART: [exit] Launching FMC @ 0x40000130
3,165,536 UART:
3,165,552 UART: Running Caliptra FMC ...
3,165,960 UART:
3,166,014 UART: [state] CFI Enabled
3,176,213 UART: [fht] FMC Alias Private Key: 7
3,283,680 UART: [art] Extend RT PCRs Done
3,284,108 UART: [art] Lock RT PCRs Done
3,285,716 UART: [art] Populate DV Done
3,294,041 UART: [fht] FMC Alias Private Key: 7
3,295,177 UART: [art] Derive CDI
3,295,457 UART: [art] Store in in slot 0x4
3,380,972 UART: [art] Derive Key Pair
3,381,332 UART: [art] Store priv key in slot 0x5
3,393,998 UART: [art] Derive Key Pair - Done
3,408,685 UART: [art] Signing Cert with AUTHO
3,409,165 UART: RITY.KEYID = 7
3,424,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,340 UART: [art] PUB.X = A06593F64E7C25871EBF49EF20FDD0A55485CC3E5B2823C1CC439E83476CCE4D524E4D16290425E818D2D741B28A8C6A
3,432,113 UART: [art] PUB.Y = B02F1E1A795F45339F131F6B4F8C32F3334BA5A047EA33A39817442898FE33C758739EEC6EFA846CF61F0FE4B0B546AD
3,439,068 UART: [art] SIG.R = 8F353B92FC04910FA8BD69B9EAAF207BD9B06BCBB2D033B828A8A2DAD104B609D9D0F293686D66C82C86BA6693D77D1B
3,445,842 UART: [art] SIG.S = 9ABB3F3B1576519F655EE9476942DD4F797A90844F3144F92435D6AE397CF2BC790E2F7386F7DA7E2E590D8640531637
3,469,335 UART: Caliptra RT
3,469,588 UART: [state] CFI Enabled
3,577,942 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,412 UART: [rt]cmd =0x54514754, len=24
3,610,336 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,303 ready_for_fw is high
1,362,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,296 >>> mbox cmd response: success
2,925,296 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,108 UART:
2,986,124 UART: Running Caliptra FMC ...
2,986,532 UART:
2,986,586 UART: [state] CFI Enabled
2,996,961 UART: [fht] FMC Alias Private Key: 7
3,105,740 UART: [art] Extend RT PCRs Done
3,106,168 UART: [art] Lock RT PCRs Done
3,107,822 UART: [art] Populate DV Done
3,116,179 UART: [fht] FMC Alias Private Key: 7
3,117,137 UART: [art] Derive CDI
3,117,417 UART: [art] Store in in slot 0x4
3,203,046 UART: [art] Derive Key Pair
3,203,406 UART: [art] Store priv key in slot 0x5
3,216,808 UART: [art] Derive Key Pair - Done
3,231,627 UART: [art] Signing Cert with AUTHO
3,232,107 UART: RITY.KEYID = 7
3,246,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,470 UART: [art] PUB.X = 0D5CF188636410CBB9794CF0C4EBE92DA1E6DA9B66C265B8322308BAA856D0AC6FF74BABC7E5BC4425FCFB7178012FE7
3,254,251 UART: [art] PUB.Y = B456B2F35E767F1EEEDCC370ABB0466E1D10E0C55474097BFAA60C82559C85BE2A77562C40A642C9B8E3D682A5F66ED4
3,261,207 UART: [art] SIG.R = 44848F57563D026BEC7DC5FA3905E1E5EF477D38E9B026391CD741A18961578AEB25B4EE3018B5ECD5340F5FDFF62DB1
3,267,978 UART: [art] SIG.S = 97F5CB290DAEC478203097A7DED9AC88F91265FFBF223A4800A5675961920C104A20C8C22CDA2AB6311631F910895E9F
3,291,863 UART: Caliptra RT
3,292,116 UART: [state] CFI Enabled
3,399,419 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,093 UART: [rt]cmd =0x54514754, len=24
3,432,237 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,655 UART: [kat] SHA2-512-ACC
897,556 UART: [kat] ECC-384
903,385 UART: [kat] HMAC-384Kdf
907,965 UART: [kat] LMS
1,476,161 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,442 UART: [fht] Storing FHT @ 0x50003400
1,480,175 UART: [idev] ++
1,480,343 UART: [idev] CDI.KEYID = 6
1,480,703 UART: [idev] SUBJECT.KEYID = 7
1,481,127 UART: [idev] UDS.KEYID = 0
1,481,472 ready_for_fw is high
1,481,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,073 UART: [idev] Erasing UDS.KEYID = 0
1,505,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,003 UART: [idev] --
1,514,976 UART: [ldev] ++
1,515,144 UART: [ldev] CDI.KEYID = 6
1,515,507 UART: [ldev] SUBJECT.KEYID = 5
1,515,933 UART: [ldev] AUTHORITY.KEYID = 7
1,516,396 UART: [ldev] FE.KEYID = 1
1,521,418 UART: [ldev] Erasing FE.KEYID = 1
1,546,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,173 UART: [ldev] --
1,586,606 UART: [fwproc] Waiting for Commands...
1,587,349 UART: [fwproc] Received command 0x46574c44
1,588,140 UART: [fwproc] Received Image of size 114332 bytes
2,886,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,224 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,315 >>> mbox cmd response: success
3,078,315 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,403 UART: [afmc] ++
3,079,571 UART: [afmc] CDI.KEYID = 6
3,079,933 UART: [afmc] SUBJECT.KEYID = 7
3,080,358 UART: [afmc] AUTHORITY.KEYID = 5
3,115,375 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,292 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,982 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,879 UART: [afmc] --
3,158,859 UART: [cold-reset] --
3,159,489 UART: [state] Locking Datavault
3,160,708 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,312 UART: [state] Locking ICCM
3,161,740 UART: [exit] Launching FMC @ 0x40000130
3,167,069 UART:
3,167,085 UART: Running Caliptra FMC ...
3,167,493 UART:
3,167,636 UART: [state] CFI Enabled
3,178,215 UART: [fht] FMC Alias Private Key: 7
3,286,324 UART: [art] Extend RT PCRs Done
3,286,752 UART: [art] Lock RT PCRs Done
3,288,280 UART: [art] Populate DV Done
3,296,373 UART: [fht] FMC Alias Private Key: 7
3,297,501 UART: [art] Derive CDI
3,297,781 UART: [art] Store in in slot 0x4
3,383,444 UART: [art] Derive Key Pair
3,383,804 UART: [art] Store priv key in slot 0x5
3,397,312 UART: [art] Derive Key Pair - Done
3,411,967 UART: [art] Signing Cert with AUTHO
3,412,447 UART: RITY.KEYID = 7
3,427,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,506 UART: [art] PUB.X = A54991F37C3B3AD36A5F6F03DD0DE5D185485BE1AE8786F2E449A99E01D86BA896EBBD720BFE6EDB75FCABFA3179F914
3,435,286 UART: [art] PUB.Y = 335D24F3F90BE36F52484496914CDA1E77B3C6BE1B4369D6735DA66053772B6062AEB0BEB628E0C8B89904FFD772D2F7
3,442,234 UART: [art] SIG.R = 2FC909793134F93EDFB716CE0EB011BE832DEAE3971A265DBC0F3D79BBD6BC7AAE4EC3123D7FE41BBD4DB000459DEB27
3,448,999 UART: [art] SIG.S = 1EDC7DCA50B5E110C1363CF24C065EF771D501AB48472F373623E6A4F330BA46F6A838155DAE58CE369617A1129CDF3C
3,473,040 UART: Caliptra RT
3,473,385 UART: [state] CFI Enabled
3,581,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,393 UART: [rt]cmd =0x54514754, len=24
3,614,249 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 ready_for_fw is high
1,362,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,959 >>> mbox cmd response: success
2,928,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,151 UART:
2,990,167 UART: Running Caliptra FMC ...
2,990,575 UART:
2,990,718 UART: [state] CFI Enabled
3,001,449 UART: [fht] FMC Alias Private Key: 7
3,109,874 UART: [art] Extend RT PCRs Done
3,110,302 UART: [art] Lock RT PCRs Done
3,111,812 UART: [art] Populate DV Done
3,119,935 UART: [fht] FMC Alias Private Key: 7
3,121,013 UART: [art] Derive CDI
3,121,293 UART: [art] Store in in slot 0x4
3,206,990 UART: [art] Derive Key Pair
3,207,350 UART: [art] Store priv key in slot 0x5
3,221,160 UART: [art] Derive Key Pair - Done
3,235,803 UART: [art] Signing Cert with AUTHO
3,236,283 UART: RITY.KEYID = 7
3,251,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,440 UART: [art] PUB.X = A7C739EF388A3BC5235DC33827332655EE39BD3D17E66D683B5623D63DA3589E45B4F9B98E7AF84C59CAC58EA75170CF
3,259,218 UART: [art] PUB.Y = B4567A363C926596FC9A2445722C56CE7ABAD7404E48B4C18426A70C217DCF2FC5B738061AB2B845FF1BB850C874D36E
3,266,168 UART: [art] SIG.R = 20D4574F69B8A84665BC731987B0818AF33E52762ACB674B280F2F52AEB4C496767C9C75B56C4CE6B1F23D86F4AC1591
3,272,937 UART: [art] SIG.S = 8144C30AC12D568361B13B5309358CF546CD8BAE55F688241211E84ACF6471578327779E5BBE5F524E059372B39CCBF9
3,296,607 UART: Caliptra RT
3,296,952 UART: [state] CFI Enabled
3,405,049 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,727 UART: [rt]cmd =0x54514754, len=24
3,437,665 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
893,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,765 UART: [kat] ++
897,917 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,172,099 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 ready_for_fw is high
1,176,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,804 UART: [idev] Erasing UDS.KEYID = 0
1,201,079 UART: [idev] Sha1 KeyId Algorithm
1,209,535 UART: [idev] --
1,210,635 UART: [ldev] ++
1,210,803 UART: [ldev] CDI.KEYID = 6
1,211,166 UART: [ldev] SUBJECT.KEYID = 5
1,211,592 UART: [ldev] AUTHORITY.KEYID = 7
1,212,055 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,023 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,291 >>> mbox cmd response: success
2,773,291 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,359 UART: [afmc] ++
2,774,527 UART: [afmc] CDI.KEYID = 6
2,774,889 UART: [afmc] SUBJECT.KEYID = 7
2,775,314 UART: [afmc] AUTHORITY.KEYID = 5
2,811,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,536 UART: [afmc] --
2,854,570 UART: [cold-reset] --
2,855,266 UART: [state] Locking Datavault
2,856,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,087 UART: [state] Locking ICCM
2,857,683 UART: [exit] Launching FMC @ 0x40000130
2,863,012 UART:
2,863,028 UART: Running Caliptra FMC ...
2,863,436 UART:
2,863,490 UART: [state] CFI Enabled
2,874,279 UART: [fht] FMC Alias Private Key: 7
2,982,528 UART: [art] Extend RT PCRs Done
2,982,956 UART: [art] Lock RT PCRs Done
2,984,300 UART: [art] Populate DV Done
2,992,533 UART: [fht] FMC Alias Private Key: 7
2,993,553 UART: [art] Derive CDI
2,993,833 UART: [art] Store in in slot 0x4
3,079,462 UART: [art] Derive Key Pair
3,079,822 UART: [art] Store priv key in slot 0x5
3,092,844 UART: [art] Derive Key Pair - Done
3,107,699 UART: [art] Signing Cert with AUTHO
3,108,179 UART: RITY.KEYID = 7
3,123,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,200 UART: [art] PUB.X = 3C1211976CF10F4AB05B1EBBABD8D1B274C770BB877978C3A1A4A43EC7ED126028BF263AAD9E37C390518DEF90910B5B
3,130,978 UART: [art] PUB.Y = 20625A01B1722908453351E801A313F655CA0691B89CD0DDD9D0EF2DC47030976C04E9DB15324E173AA8313851125069
3,137,901 UART: [art] SIG.R = 22B3BE5A594A4D88F78EF8C5C64D9FE6B8708DFC80F472482823813A2135593F0D5A9B777430B4BEBD80B94C11A200E3
3,144,650 UART: [art] SIG.S = 57807777CA9D302D58C8D1BFEC529E4F7184458084059DD81FC835B9D9692C26AB384F41B87EE43247D3BFAD244D5A6E
3,168,316 UART: Caliptra RT
3,168,569 UART: [state] CFI Enabled
3,275,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,306 UART: [rt]cmd =0x54514754, len=24
3,308,140 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,443 ready_for_fw is high
1,059,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,172 >>> mbox cmd response: success
2,627,172 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,164 UART:
2,689,180 UART: Running Caliptra FMC ...
2,689,588 UART:
2,689,642 UART: [state] CFI Enabled
2,700,337 UART: [fht] FMC Alias Private Key: 7
2,808,772 UART: [art] Extend RT PCRs Done
2,809,200 UART: [art] Lock RT PCRs Done
2,810,944 UART: [art] Populate DV Done
2,819,261 UART: [fht] FMC Alias Private Key: 7
2,820,253 UART: [art] Derive CDI
2,820,533 UART: [art] Store in in slot 0x4
2,905,856 UART: [art] Derive Key Pair
2,906,216 UART: [art] Store priv key in slot 0x5
2,919,598 UART: [art] Derive Key Pair - Done
2,934,347 UART: [art] Signing Cert with AUTHO
2,934,827 UART: RITY.KEYID = 7
2,949,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,686 UART: [art] PUB.X = 08FE24FC70ADB5BE89D9927F877D2706CF385FFB2CC7AF83A68A4704078945A31AEFE4666362D9834112AE650B99EEDD
2,957,451 UART: [art] PUB.Y = B29D81971D85A4BD0F96D5B70EA57A6AC210328E389FDF7DE01D9AA18A7700BC94C801BB11990E63C3D715C15F2B7D7F
2,964,379 UART: [art] SIG.R = 474ED6C64478F5D1EA3F26B4EAE5E4828EB01FC22E498112FB133E787ED5E95C9EDFBAF10F6D338B348BD50123574B53
2,971,155 UART: [art] SIG.S = E888466D6FDA72756618C1D58F5979AAF0D3B17DEDC0F1AB4C6C682ED5752E0FE3991508882063CAB635092333A46158
2,994,727 UART: Caliptra RT
2,994,980 UART: [state] CFI Enabled
3,102,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,243 UART: [rt]cmd =0x54514754, len=24
3,135,219 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
893,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,162 UART: [kat] ++
897,314 UART: [kat] sha1
901,388 UART: [kat] SHA2-256
903,328 UART: [kat] SHA2-384
906,137 UART: [kat] SHA2-512-ACC
908,038 UART: [kat] ECC-384
917,845 UART: [kat] HMAC-384Kdf
922,625 UART: [kat] LMS
1,170,953 UART: [kat] --
1,171,860 UART: [cold-reset] ++
1,172,434 UART: [fht] FHT @ 0x50003400
1,175,131 UART: [idev] ++
1,175,299 UART: [idev] CDI.KEYID = 6
1,175,659 UART: [idev] SUBJECT.KEYID = 7
1,176,083 UART: [idev] UDS.KEYID = 0
1,176,428 ready_for_fw is high
1,176,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,151 UART: [idev] Erasing UDS.KEYID = 0
1,201,090 UART: [idev] Sha1 KeyId Algorithm
1,209,426 UART: [idev] --
1,210,518 UART: [ldev] ++
1,210,686 UART: [ldev] CDI.KEYID = 6
1,211,049 UART: [ldev] SUBJECT.KEYID = 5
1,211,475 UART: [ldev] AUTHORITY.KEYID = 7
1,211,938 UART: [ldev] FE.KEYID = 1
1,216,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,004 UART: [ldev] --
1,282,373 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,840 >>> mbox cmd response: success
2,772,840 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,938 UART: [afmc] ++
2,774,106 UART: [afmc] CDI.KEYID = 6
2,774,468 UART: [afmc] SUBJECT.KEYID = 7
2,774,893 UART: [afmc] AUTHORITY.KEYID = 5
2,810,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,999 UART: [afmc] --
2,853,981 UART: [cold-reset] --
2,854,751 UART: [state] Locking Datavault
2,855,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,452 UART: [state] Locking ICCM
2,857,016 UART: [exit] Launching FMC @ 0x40000130
2,862,345 UART:
2,862,361 UART: Running Caliptra FMC ...
2,862,769 UART:
2,862,912 UART: [state] CFI Enabled
2,873,715 UART: [fht] FMC Alias Private Key: 7
2,981,718 UART: [art] Extend RT PCRs Done
2,982,146 UART: [art] Lock RT PCRs Done
2,983,658 UART: [art] Populate DV Done
2,991,951 UART: [fht] FMC Alias Private Key: 7
2,992,963 UART: [art] Derive CDI
2,993,243 UART: [art] Store in in slot 0x4
3,078,852 UART: [art] Derive Key Pair
3,079,212 UART: [art] Store priv key in slot 0x5
3,092,352 UART: [art] Derive Key Pair - Done
3,107,508 UART: [art] Signing Cert with AUTHO
3,107,988 UART: RITY.KEYID = 7
3,123,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,569 UART: [art] PUB.X = 0871BDE8F087DA3F1F1AA3A74853D14106BF36083C7A0BAD1248E60BA4598C3DC61C985F7B4890F4FA8A60C224AF3877
3,131,332 UART: [art] PUB.Y = 280AE00F028B06F7260DACC74430593771D76DD18F1497F45E86A84382794DF366D8F9C54B003AAA0B77A2670782F9C4
3,138,235 UART: [art] SIG.R = 92FE603CE4BC4094681290AA43F3F794B52CDC3FA799DCDBC227B4D98B387B303739CD2FD41D627153EFF7FCA77FE855
3,145,019 UART: [art] SIG.S = 5D2837245823946A9E9A3036A04614FD99A9121F0CD3B63B8FE949FECB5FF78CB269E65329672BA7D7890DB1E97868B7
3,168,880 UART: Caliptra RT
3,169,225 UART: [state] CFI Enabled
3,277,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,250 UART: [rt]cmd =0x54514754, len=24
3,310,402 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,694 ready_for_fw is high
1,060,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,905 >>> mbox cmd response: success
2,627,905 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,377 UART:
2,690,393 UART: Running Caliptra FMC ...
2,690,801 UART:
2,690,944 UART: [state] CFI Enabled
2,701,273 UART: [fht] FMC Alias Private Key: 7
2,809,898 UART: [art] Extend RT PCRs Done
2,810,326 UART: [art] Lock RT PCRs Done
2,811,656 UART: [art] Populate DV Done
2,819,773 UART: [fht] FMC Alias Private Key: 7
2,820,745 UART: [art] Derive CDI
2,821,025 UART: [art] Store in in slot 0x4
2,906,712 UART: [art] Derive Key Pair
2,907,072 UART: [art] Store priv key in slot 0x5
2,920,812 UART: [art] Derive Key Pair - Done
2,935,369 UART: [art] Signing Cert with AUTHO
2,935,849 UART: RITY.KEYID = 7
2,950,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,738 UART: [art] PUB.X = 9E49F8343855697F53DCAACDFCD859F4A669E8CBDC793F8DC479B3E4BDA24289A93E9E45212F90B0E74FB01151213D78
2,958,518 UART: [art] PUB.Y = A4B888CB8650B020537B2DCE794418E944DB33A0593DCEC71CDE3FB150507EE1DC934C3E97C75334905F3B866DDEB461
2,965,476 UART: [art] SIG.R = BC413E3FFC9E168D64A4E32092CF367809E2B0B769DBA5356FCBF4C1323E42CCC6F600F3AFD3962671ACB09972E6B2F0
2,972,235 UART: [art] SIG.S = C695752FCA5C3180DF0D2A0F3DBC9D33EE52261FF23EBF0ED8507813CE5A291A4EBAE20FD9F3B6945FCDF3AF0DF0191D
2,995,829 UART: Caliptra RT
2,996,174 UART: [state] CFI Enabled
3,104,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,194 UART: [rt]cmd =0x54514754, len=24
3,137,204 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 ready_for_fw is high
1,174,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,818 UART: [ldev] ++
1,208,986 UART: [ldev] CDI.KEYID = 6
1,209,350 UART: [ldev] SUBJECT.KEYID = 5
1,209,777 UART: [ldev] AUTHORITY.KEYID = 7
1,210,240 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,031 >>> mbox cmd response: success
2,771,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,048 UART: [afmc] ++
2,772,216 UART: [afmc] CDI.KEYID = 6
2,772,579 UART: [afmc] SUBJECT.KEYID = 7
2,773,005 UART: [afmc] AUTHORITY.KEYID = 5
2,808,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,550 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,561 UART: [afmc] --
2,852,477 UART: [cold-reset] --
2,853,349 UART: [state] Locking Datavault
2,854,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,242 UART: [state] Locking ICCM
2,855,836 UART: [exit] Launching FMC @ 0x40000130
2,861,165 UART:
2,861,181 UART: Running Caliptra FMC ...
2,861,589 UART:
2,861,643 UART: [state] CFI Enabled
2,872,034 UART: [fht] FMC Alias Private Key: 7
2,980,067 UART: [art] Extend RT PCRs Done
2,980,495 UART: [art] Lock RT PCRs Done
2,981,849 UART: [art] Populate DV Done
2,990,136 UART: [fht] FMC Alias Private Key: 7
2,991,084 UART: [art] Derive CDI
2,991,364 UART: [art] Store in in slot 0x4
3,077,303 UART: [art] Derive Key Pair
3,077,663 UART: [art] Store priv key in slot 0x5
3,091,053 UART: [art] Derive Key Pair - Done
3,105,796 UART: [art] Signing Cert with AUTHO
3,106,276 UART: RITY.KEYID = 7
3,121,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,237 UART: [art] PUB.X = 6200376AF28B6DABDDA221ED2B27CE565611B616A5E20141C734216D81A0CE6CCE3E86EB3626E85DC918627212588598
3,128,982 UART: [art] PUB.Y = 38141B9656E3C2E65A712DDC248644C46A8F7E5EC2C25DC376296FB81B18D38999D8C6F1B5461E4885794B508BBE2531
3,135,930 UART: [art] SIG.R = F95B9B1967364761E2538135C699A0BD3EF17C087D680E8ED6A4F0B2D56AE13BB20350A021D617B5665149BB346057DA
3,142,689 UART: [art] SIG.S = AA251890A0378B4BBBD6742CAABF725C997AAF49196E75D99740EE864B40B77299C29090E56282869815C5BE996D9797
3,166,774 UART: Caliptra RT
3,167,027 UART: [state] CFI Enabled
3,274,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,427 UART: [rt]cmd =0x54514754, len=24
3,307,405 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 ready_for_fw is high
1,055,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,065 >>> mbox cmd response: success
2,621,065 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,667 UART:
2,682,683 UART: Running Caliptra FMC ...
2,683,091 UART:
2,683,145 UART: [state] CFI Enabled
2,693,510 UART: [fht] FMC Alias Private Key: 7
2,801,705 UART: [art] Extend RT PCRs Done
2,802,133 UART: [art] Lock RT PCRs Done
2,803,547 UART: [art] Populate DV Done
2,811,684 UART: [fht] FMC Alias Private Key: 7
2,812,854 UART: [art] Derive CDI
2,813,134 UART: [art] Store in in slot 0x4
2,899,111 UART: [art] Derive Key Pair
2,899,471 UART: [art] Store priv key in slot 0x5
2,912,759 UART: [art] Derive Key Pair - Done
2,927,560 UART: [art] Signing Cert with AUTHO
2,928,040 UART: RITY.KEYID = 7
2,942,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,557 UART: [art] PUB.X = DA4A298ACEE53194D4D6B738A3BF08FD1B11161C1F649E1AE8575FAE8DED6D2248FAE212AA5552E9A0E053E1B6746773
2,950,338 UART: [art] PUB.Y = FBBC274D53B410ED825BD232251085681E0C00CE5182F29D7CF34210A79195824275853182D86B87BE7499B5C43456A4
2,957,253 UART: [art] SIG.R = FBC4DCFCF046DEE5729B9F4196EE78F45CAA8F53C21DD73D56D6A6363878B4ACF20E7AA8595755D5DE71330A52765F41
2,964,031 UART: [art] SIG.S = 89B610612AAE60C2F56783BB87CB4AC386B50DBECCFD6238F1EF00161CC4325314D47F0DA2063D6CAE06C3FCDD91939F
2,986,872 UART: Caliptra RT
2,987,125 UART: [state] CFI Enabled
3,094,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,633 UART: [rt]cmd =0x54514754, len=24
3,127,501 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 ready_for_fw is high
1,174,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,585 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,940 >>> mbox cmd response: success
2,771,940 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,057 UART: [afmc] ++
2,773,225 UART: [afmc] CDI.KEYID = 6
2,773,588 UART: [afmc] SUBJECT.KEYID = 7
2,774,014 UART: [afmc] AUTHORITY.KEYID = 5
2,809,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,680 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,399 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,170 UART: [afmc] --
2,852,100 UART: [cold-reset] --
2,853,006 UART: [state] Locking Datavault
2,854,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,741 UART: [state] Locking ICCM
2,855,271 UART: [exit] Launching FMC @ 0x40000130
2,860,600 UART:
2,860,616 UART: Running Caliptra FMC ...
2,861,024 UART:
2,861,167 UART: [state] CFI Enabled
2,871,562 UART: [fht] FMC Alias Private Key: 7
2,979,433 UART: [art] Extend RT PCRs Done
2,979,861 UART: [art] Lock RT PCRs Done
2,981,349 UART: [art] Populate DV Done
2,989,672 UART: [fht] FMC Alias Private Key: 7
2,990,786 UART: [art] Derive CDI
2,991,066 UART: [art] Store in in slot 0x4
3,076,613 UART: [art] Derive Key Pair
3,076,973 UART: [art] Store priv key in slot 0x5
3,090,197 UART: [art] Derive Key Pair - Done
3,104,902 UART: [art] Signing Cert with AUTHO
3,105,382 UART: RITY.KEYID = 7
3,120,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,425 UART: [art] PUB.X = 30B90C67FB08507964F1243D000519D554EFEBA57123D214BEF153D67C3DB8C4FA387637901214CC1D30B206B2868619
3,128,155 UART: [art] PUB.Y = 7D7D5B88157F385BFD5E9CF119BEBD4EA594D19B86A7FAE1253974B611062B17CD628007E73FF8FC7E8FD7274A5E437E
3,135,111 UART: [art] SIG.R = 384DDB47311978EE7C0C8A4FA751270E7D5CE0E08C4E5E701219CF316DE85886D86B7E91309D8FB2CF3A4112E6457F86
3,141,879 UART: [art] SIG.S = 8BD810567F40D6F282678393F3968C46D2D71BFB68238CDD93CE6EF7558D486A1AAEF8CFC03535852E988B1C1AFC0805
3,165,632 UART: Caliptra RT
3,165,977 UART: [state] CFI Enabled
3,274,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,522 UART: [rt]cmd =0x54514754, len=24
3,307,320 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 ready_for_fw is high
1,056,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,138 >>> mbox cmd response: success
2,622,138 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,144 UART:
2,684,160 UART: Running Caliptra FMC ...
2,684,568 UART:
2,684,711 UART: [state] CFI Enabled
2,695,530 UART: [fht] FMC Alias Private Key: 7
2,803,657 UART: [art] Extend RT PCRs Done
2,804,085 UART: [art] Lock RT PCRs Done
2,805,739 UART: [art] Populate DV Done
2,813,720 UART: [fht] FMC Alias Private Key: 7
2,814,814 UART: [art] Derive CDI
2,815,094 UART: [art] Store in in slot 0x4
2,900,453 UART: [art] Derive Key Pair
2,900,813 UART: [art] Store priv key in slot 0x5
2,914,167 UART: [art] Derive Key Pair - Done
2,928,671 UART: [art] Signing Cert with AUTHO
2,929,151 UART: RITY.KEYID = 7
2,944,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,314 UART: [art] PUB.X = 525A0265D45D45DFFE879AF0565601A0D91288BD768498E55BA0F2E513A635E5E30066B28F958591F6C9D9DB60136A0F
2,952,051 UART: [art] PUB.Y = D7515D62AE3A91200B31E99B325B65EC1E8728D1B2DADC5B4D6EE15081645614AD0475599E84EF2B634471B0D02D5B65
2,958,997 UART: [art] SIG.R = 7749F0914D8F671843E58F7049386593AAA7147FFEC5FCCD039E1574A2113331E4CC7CBC703B4CF5C55291C00CD05465
2,965,761 UART: [art] SIG.S = AC3DE2BC1CF839087BB01F3ED333FD5C5C20CB425EC7BA60B96EA8029715DE02190752A45CAF102596892949A84330D9
2,989,654 UART: Caliptra RT
2,989,999 UART: [state] CFI Enabled
3,097,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,202 UART: [rt]cmd =0x54514754, len=24
3,130,094 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,513 UART: [kat] SHA2-256
882,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,559 UART: [kat] ++
886,711 UART: [kat] sha1
891,037 UART: [kat] SHA2-256
892,975 UART: [kat] SHA2-384
895,830 UART: [kat] SHA2-512-ACC
897,731 UART: [kat] ECC-384
903,056 UART: [kat] HMAC-384Kdf
907,710 UART: [kat] LMS
1,475,906 UART: [kat] --
1,476,801 UART: [cold-reset] ++
1,477,189 UART: [fht] Storing FHT @ 0x50003400
1,479,936 UART: [idev] ++
1,480,104 UART: [idev] CDI.KEYID = 6
1,480,464 UART: [idev] SUBJECT.KEYID = 7
1,480,888 UART: [idev] UDS.KEYID = 0
1,481,233 ready_for_fw is high
1,481,233 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,190 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,971 UART: [ldev] ++
1,515,139 UART: [ldev] CDI.KEYID = 6
1,515,502 UART: [ldev] SUBJECT.KEYID = 5
1,515,928 UART: [ldev] AUTHORITY.KEYID = 7
1,516,391 UART: [ldev] FE.KEYID = 1
1,521,755 UART: [ldev] Erasing FE.KEYID = 1
1,546,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,558 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,670 UART: [fwproc] Received command 0x46574c44
1,587,461 UART: [fwproc] Received Image of size 114332 bytes
2,886,377 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,863 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,984 >>> mbox cmd response: success
3,078,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,080,196 UART: [afmc] ++
3,080,364 UART: [afmc] CDI.KEYID = 6
3,080,726 UART: [afmc] SUBJECT.KEYID = 7
3,081,151 UART: [afmc] AUTHORITY.KEYID = 5
3,116,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,664 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,057 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,747 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,506 UART: [afmc] --
3,159,434 UART: [cold-reset] --
3,160,096 UART: [state] Locking Datavault
3,161,557 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,161 UART: [state] Locking ICCM
3,162,671 UART: [exit] Launching FMC @ 0x40000130
3,168,000 UART:
3,168,016 UART: Running Caliptra FMC ...
3,168,424 UART:
3,168,478 UART: [state] CFI Enabled
3,179,261 UART: [fht] FMC Alias Private Key: 7
3,286,606 UART: [art] Extend RT PCRs Done
3,287,034 UART: [art] Lock RT PCRs Done
3,288,662 UART: [art] Populate DV Done
3,296,767 UART: [fht] FMC Alias Private Key: 7
3,297,819 UART: [art] Derive CDI
3,298,099 UART: [art] Store in in slot 0x4
3,383,996 UART: [art] Derive Key Pair
3,384,356 UART: [art] Store priv key in slot 0x5
3,397,178 UART: [art] Derive Key Pair - Done
3,411,958 UART: [art] Signing Cert with AUTHO
3,412,438 UART: RITY.KEYID = 7
3,427,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,065 UART: [art] PUB.X = B3FBD314E8D7801A0F0BFCFB9FD78881031F012A81E2BD5D6C1CBCC086E1800B72C50D7A56D781B03B606E38EB90C444
3,434,831 UART: [art] PUB.Y = B2274448A2E6B0D0D162916E1B1F7AB50C6B1F46E2552DC7C339B76A9071D3C36BABA45B9E97B2CD1128046FBA8E564D
3,441,785 UART: [art] SIG.R = 95170942374F37CD75D6BF466EFD3A44209A482C0EAE74BC22C957944ECAD0176C2E1CC62BFAD8937220B931109436FF
3,448,553 UART: [art] SIG.S = 23E2F7676AEE4015E305E68463CDBBD3714D0F56545FFD20B4A5C416A6DB3C571D5CBB0010BC40FD2537AC3E833110E5
3,472,616 UART: Caliptra RT
3,472,869 UART: [state] CFI Enabled
3,581,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,432 UART: [rt]cmd =0x44504543, len=96
3,649,194 >>> mbox cmd response data (56 bytes)
3,649,195 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,614 UART: [rt]cmd =0x54514754, len=24
3,680,460 >>> mbox cmd response: failed
3,680,460 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,988 UART: [rt]cmd =0x54514754, len=24
3,712,098 >>> mbox cmd response data (8 bytes)
3,712,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,026 UART: [rt]cmd =0x44504543, len=96
3,779,111 >>> mbox cmd response data (56 bytes)
3,779,112 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,211 UART: [rt]cmd =0x47544744, len=8
3,810,479 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 ready_for_fw is high
1,362,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,564 >>> mbox cmd response: success
2,928,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,264 UART:
2,990,280 UART: Running Caliptra FMC ...
2,990,688 UART:
2,990,742 UART: [state] CFI Enabled
3,001,371 UART: [fht] FMC Alias Private Key: 7
3,108,994 UART: [art] Extend RT PCRs Done
3,109,422 UART: [art] Lock RT PCRs Done
3,111,128 UART: [art] Populate DV Done
3,119,531 UART: [fht] FMC Alias Private Key: 7
3,120,647 UART: [art] Derive CDI
3,120,927 UART: [art] Store in in slot 0x4
3,206,346 UART: [art] Derive Key Pair
3,206,706 UART: [art] Store priv key in slot 0x5
3,219,644 UART: [art] Derive Key Pair - Done
3,234,480 UART: [art] Signing Cert with AUTHO
3,234,960 UART: RITY.KEYID = 7
3,250,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,819 UART: [art] PUB.X = 082B623DA80BDB763C36CEC7082B6BDB73FD89953E1B6637CD285B807AB173C6991580613AE93E557F9612025DCCF376
3,257,579 UART: [art] PUB.Y = EF7F3C3D96D2CAEFAAACC5A2B5A239186F8CED1D768A429AA050F5D4664873E6A32114005E118DC74B58A91E1D673A63
3,264,521 UART: [art] SIG.R = B8DBE65D5B4F474C9B167043401E5F19EB62513802E2F6D66AD8A1FB3E9A4D710DE8FC689F00DDD379467F5EC46748CE
3,271,275 UART: [art] SIG.S = 046D2E9E529466F90293FCB9FC91A4AEA054E982929D3477C0CED5116F53B21F3D6F48544D6FADA7132D60240EC6BEA3
3,295,823 UART: Caliptra RT
3,296,076 UART: [state] CFI Enabled
3,403,975 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,839 UART: [rt]cmd =0x44504543, len=96
3,472,171 >>> mbox cmd response data (56 bytes)
3,472,172 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,661 UART: [rt]cmd =0x54514754, len=24
3,503,753 >>> mbox cmd response: failed
3,503,753 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,389 UART: [rt]cmd =0x54514754, len=24
3,535,445 >>> mbox cmd response data (8 bytes)
3,535,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,327 UART: [rt]cmd =0x44504543, len=96
3,602,748 >>> mbox cmd response data (56 bytes)
3,602,749 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,234 UART: [rt]cmd =0x47544744, len=8
3,634,964 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,205 UART: [kat] LMS
1,475,401 UART: [kat] --
1,476,428 UART: [cold-reset] ++
1,476,818 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 ready_for_fw is high
1,480,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,293 UART: [idev] Erasing UDS.KEYID = 0
1,504,867 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,421 UART: [idev] --
1,514,498 UART: [ldev] ++
1,514,666 UART: [ldev] CDI.KEYID = 6
1,515,029 UART: [ldev] SUBJECT.KEYID = 5
1,515,455 UART: [ldev] AUTHORITY.KEYID = 7
1,515,918 UART: [ldev] FE.KEYID = 1
1,521,124 UART: [ldev] Erasing FE.KEYID = 1
1,546,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,479 UART: [ldev] --
1,585,786 UART: [fwproc] Waiting for Commands...
1,586,499 UART: [fwproc] Received command 0x46574c44
1,587,290 UART: [fwproc] Received Image of size 114332 bytes
2,884,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,422 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,651 >>> mbox cmd response: success
3,076,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,077,715 UART: [afmc] ++
3,077,883 UART: [afmc] CDI.KEYID = 6
3,078,245 UART: [afmc] SUBJECT.KEYID = 7
3,078,670 UART: [afmc] AUTHORITY.KEYID = 5
3,113,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,136 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,826 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,703 UART: [afmc] --
3,156,785 UART: [cold-reset] --
3,157,407 UART: [state] Locking Datavault
3,158,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,180 UART: [state] Locking ICCM
3,159,630 UART: [exit] Launching FMC @ 0x40000130
3,164,959 UART:
3,164,975 UART: Running Caliptra FMC ...
3,165,383 UART:
3,165,526 UART: [state] CFI Enabled
3,176,337 UART: [fht] FMC Alias Private Key: 7
3,284,104 UART: [art] Extend RT PCRs Done
3,284,532 UART: [art] Lock RT PCRs Done
3,286,006 UART: [art] Populate DV Done
3,294,233 UART: [fht] FMC Alias Private Key: 7
3,295,305 UART: [art] Derive CDI
3,295,585 UART: [art] Store in in slot 0x4
3,381,134 UART: [art] Derive Key Pair
3,381,494 UART: [art] Store priv key in slot 0x5
3,395,110 UART: [art] Derive Key Pair - Done
3,409,579 UART: [art] Signing Cert with AUTHO
3,410,059 UART: RITY.KEYID = 7
3,425,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,168 UART: [art] PUB.X = E791447A13A2E4A55BFDA2BD10F228D7759061FF37B7B00DAF3C286B9480BB02036023672F3A71B8028FB9C78EF8A623
3,432,930 UART: [art] PUB.Y = AEBB68D759341C4848D0DA78BC5F8CB27AFE1A29C1ADCC6604724D4CC35BF5772B06CAA54D68585C827A320FF052A522
3,439,885 UART: [art] SIG.R = 9587EF6D7EA2C269692C3A54C658F9C88FBAED6996DFF9354E8A770201E55A8F8084538E9EDA34918E79D35777209F8C
3,446,651 UART: [art] SIG.S = EFFC7DBCA5374BC244CEBD38DA92DFA2ED7FE5E8D4B320B5359680303CA20C381E085F4B6C5500C2B065A254CAECFB03
3,470,359 UART: Caliptra RT
3,470,704 UART: [state] CFI Enabled
3,577,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,128 UART: [rt]cmd =0x44504543, len=96
3,645,134 >>> mbox cmd response data (56 bytes)
3,645,135 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,636 UART: [rt]cmd =0x54514754, len=24
3,676,566 >>> mbox cmd response: failed
3,676,566 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,074 UART: [rt]cmd =0x54514754, len=24
3,708,270 >>> mbox cmd response data (8 bytes)
3,708,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,144 UART: [rt]cmd =0x44504543, len=96
3,774,185 >>> mbox cmd response data (56 bytes)
3,774,186 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,297 UART: [rt]cmd =0x47544744, len=8
3,805,939 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 ready_for_fw is high
1,363,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,547 >>> mbox cmd response: success
2,927,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,988,963 UART:
2,988,979 UART: Running Caliptra FMC ...
2,989,387 UART:
2,989,530 UART: [state] CFI Enabled
2,999,963 UART: [fht] FMC Alias Private Key: 7
3,108,022 UART: [art] Extend RT PCRs Done
3,108,450 UART: [art] Lock RT PCRs Done
3,109,924 UART: [art] Populate DV Done
3,118,207 UART: [fht] FMC Alias Private Key: 7
3,119,187 UART: [art] Derive CDI
3,119,467 UART: [art] Store in in slot 0x4
3,204,944 UART: [art] Derive Key Pair
3,205,304 UART: [art] Store priv key in slot 0x5
3,218,136 UART: [art] Derive Key Pair - Done
3,233,332 UART: [art] Signing Cert with AUTHO
3,233,812 UART: RITY.KEYID = 7
3,249,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,103 UART: [art] PUB.X = 3D6ED268B98C3A71CEA7463367C9039E87C5202CA264687AD81954EFB2FE8A3AA15C0AA0954C7B29E0F09C6190DBAE62
3,256,877 UART: [art] PUB.Y = 7CC11CF3913F6B7FA13FE7D027F57DC5E998B6682827C307CB6FA40DA3865FA900B5B409ABCE8FCB9B718C3EC9A98E97
3,263,814 UART: [art] SIG.R = F2CBFE65EE469AC35A31EF72C75C6DB5408C62EB254290480BCAAEF0CCDDABE14C509976DB61110D6806E45917917DC6
3,270,591 UART: [art] SIG.S = DD5B443CF2E8CD6A4DCF7DE33257F1B343728BEF4F81213F8BF01A29B3CFEF57B2389B7245ED9F8B6272BCD0B1CF9A0D
3,294,149 UART: Caliptra RT
3,294,494 UART: [state] CFI Enabled
3,402,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,888 UART: [rt]cmd =0x44504543, len=96
3,470,776 >>> mbox cmd response data (56 bytes)
3,470,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,056 UART: [rt]cmd =0x54514754, len=24
3,502,190 >>> mbox cmd response: failed
3,502,190 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,494 UART: [rt]cmd =0x54514754, len=24
3,533,480 >>> mbox cmd response data (8 bytes)
3,533,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,486 UART: [rt]cmd =0x44504543, len=96
3,599,829 >>> mbox cmd response data (56 bytes)
3,599,830 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,063 UART: [rt]cmd =0x47544744, len=8
3,631,595 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
892,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,123 UART: [kat] ++
897,275 UART: [kat] sha1
901,493 UART: [kat] SHA2-256
903,433 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,448 UART: [kat] LMS
1,170,776 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,257 UART: [idev] --
1,210,135 UART: [ldev] ++
1,210,303 UART: [ldev] CDI.KEYID = 6
1,210,666 UART: [ldev] SUBJECT.KEYID = 5
1,211,092 UART: [ldev] AUTHORITY.KEYID = 7
1,211,555 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,243,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,156 UART: [fwproc] Recv command 0x46574c44
1,283,884 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,271 >>> mbox cmd response: success
2,774,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,403 UART: [afmc] ++
2,775,571 UART: [afmc] CDI.KEYID = 6
2,775,933 UART: [afmc] SUBJECT.KEYID = 7
2,776,358 UART: [afmc] AUTHORITY.KEYID = 5
2,811,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,852 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,465 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,184 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,132 UART: [afmc] --
2,855,088 UART: [cold-reset] --
2,856,228 UART: [state] Locking Datavault
2,857,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,181 UART: [state] Locking ICCM
2,858,847 UART: [exit] Launching FMC @ 0x40000130
2,864,176 UART:
2,864,192 UART: Running Caliptra FMC ...
2,864,600 UART:
2,864,654 UART: [state] CFI Enabled
2,875,351 UART: [fht] FMC Alias Private Key: 7
2,983,558 UART: [art] Extend RT PCRs Done
2,983,986 UART: [art] Lock RT PCRs Done
2,985,738 UART: [art] Populate DV Done
2,994,121 UART: [fht] FMC Alias Private Key: 7
2,995,193 UART: [art] Derive CDI
2,995,473 UART: [art] Store in in slot 0x4
3,081,068 UART: [art] Derive Key Pair
3,081,428 UART: [art] Store priv key in slot 0x5
3,094,698 UART: [art] Derive Key Pair - Done
3,109,451 UART: [art] Signing Cert with AUTHO
3,109,931 UART: RITY.KEYID = 7
3,125,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,168 UART: [art] PUB.X = 59E22D32E2EF8FFEA1577F3F28C951C47FE493B1455F45A6EE2F88C317AC80DCE92697DD30C0C9E6DB21E21F729266DF
3,132,952 UART: [art] PUB.Y = 681D91C3FCAD811DF8F9B668A513CB0173EB120AA527D9AB6D7C4C48D3B1239D31397787824FBE63B03C2DC2F39B3B9A
3,139,908 UART: [art] SIG.R = 8A2B23C56CC50957B6BAFB80FCD24B81881A31F35B5EC2FE2F9355240666345837F7176E10D68EAF7BBFF123EA9972F5
3,146,680 UART: [art] SIG.S = C199EB85CD0E8F8B508CA261D46F9CEB2EEDD1C6908FBD2D67C619D4EB04ED989C45B64EB7FA99D6013AF7B6C545F6BE
3,170,646 UART: Caliptra RT
3,170,899 UART: [state] CFI Enabled
3,279,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,151 UART: [rt]cmd =0x44504543, len=96
3,346,707 >>> mbox cmd response data (56 bytes)
3,346,708 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,103 UART: [rt]cmd =0x54514754, len=24
3,377,873 >>> mbox cmd response: failed
3,377,873 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,387 UART: [rt]cmd =0x54514754, len=24
3,409,657 >>> mbox cmd response data (8 bytes)
3,409,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,907 UART: [rt]cmd =0x44504543, len=96
3,476,322 >>> mbox cmd response data (56 bytes)
3,476,323 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,732 UART: [rt]cmd =0x47544744, len=8
3,508,214 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,258 >>> mbox cmd response: success
2,624,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,510 UART:
2,686,526 UART: Running Caliptra FMC ...
2,686,934 UART:
2,686,988 UART: [state] CFI Enabled
2,697,385 UART: [fht] FMC Alias Private Key: 7
2,805,306 UART: [art] Extend RT PCRs Done
2,805,734 UART: [art] Lock RT PCRs Done
2,806,868 UART: [art] Populate DV Done
2,815,085 UART: [fht] FMC Alias Private Key: 7
2,816,119 UART: [art] Derive CDI
2,816,399 UART: [art] Store in in slot 0x4
2,901,912 UART: [art] Derive Key Pair
2,902,272 UART: [art] Store priv key in slot 0x5
2,915,894 UART: [art] Derive Key Pair - Done
2,930,808 UART: [art] Signing Cert with AUTHO
2,931,288 UART: RITY.KEYID = 7
2,946,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,315 UART: [art] PUB.X = 66ADB71269AEC168D568386C2ECD8EF789A7EF2674EE257BCC53705DA80550AD339C8539CAA304DE978960688A6D0FE7
2,954,084 UART: [art] PUB.Y = BA61297A0B00DF37053D06DF144C68D323F43CA74BD6BF12CF8D3DCE637D52396B10B893F2BF2FF3CBF7BD3243E59B40
2,961,019 UART: [art] SIG.R = 24F3C51F09980E393D9DE17669564A14F00B3CA6FC945F6AC6776F7270028C28DE7C7BD20A0031F5A856B90C33A7537F
2,967,749 UART: [art] SIG.S = 7B72F0EE764D04F7FEDC6EAAB6DC50897153F615342C1814B675902423924CC19CA986E0F29B50CC9419D51A871EB6AC
2,991,219 UART: Caliptra RT
2,991,472 UART: [state] CFI Enabled
3,099,521 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,437 UART: [rt]cmd =0x44504543, len=96
3,166,975 >>> mbox cmd response data (56 bytes)
3,166,976 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,321 UART: [rt]cmd =0x54514754, len=24
3,198,299 >>> mbox cmd response: failed
3,198,299 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,609 UART: [rt]cmd =0x54514754, len=24
3,229,875 >>> mbox cmd response data (8 bytes)
3,229,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,719 UART: [rt]cmd =0x44504543, len=96
3,296,324 >>> mbox cmd response data (56 bytes)
3,296,325 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,610 UART: [rt]cmd =0x47544744, len=8
3,328,392 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,723 UART: [state] LifecycleState = Unprovisioned
85,378 UART: [state] DebugLocked = No
85,958 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
892,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,064 UART: [kat] ++
897,216 UART: [kat] sha1
901,442 UART: [kat] SHA2-256
903,382 UART: [kat] SHA2-384
906,241 UART: [kat] SHA2-512-ACC
908,142 UART: [kat] ECC-384
918,009 UART: [kat] HMAC-384Kdf
922,633 UART: [kat] LMS
1,170,961 UART: [kat] --
1,171,670 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,174,923 UART: [idev] ++
1,175,091 UART: [idev] CDI.KEYID = 6
1,175,451 UART: [idev] SUBJECT.KEYID = 7
1,175,875 UART: [idev] UDS.KEYID = 0
1,176,220 ready_for_fw is high
1,176,220 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,155 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,211,194 UART: [ldev] ++
1,211,362 UART: [ldev] CDI.KEYID = 6
1,211,725 UART: [ldev] SUBJECT.KEYID = 5
1,212,151 UART: [ldev] AUTHORITY.KEYID = 7
1,212,614 UART: [ldev] FE.KEYID = 1
1,217,630 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,412 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,471 UART: [fwproc] Recv command 0x46574c44
1,284,199 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,878 >>> mbox cmd response: success
2,773,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,042 UART: [afmc] ++
2,775,210 UART: [afmc] CDI.KEYID = 6
2,775,572 UART: [afmc] SUBJECT.KEYID = 7
2,775,997 UART: [afmc] AUTHORITY.KEYID = 5
2,811,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,628 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,347 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,257 UART: [afmc] --
2,855,289 UART: [cold-reset] --
2,856,073 UART: [state] Locking Datavault
2,857,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,868 UART: [state] Locking ICCM
2,858,408 UART: [exit] Launching FMC @ 0x40000130
2,863,737 UART:
2,863,753 UART: Running Caliptra FMC ...
2,864,161 UART:
2,864,304 UART: [state] CFI Enabled
2,874,735 UART: [fht] FMC Alias Private Key: 7
2,981,710 UART: [art] Extend RT PCRs Done
2,982,138 UART: [art] Lock RT PCRs Done
2,983,732 UART: [art] Populate DV Done
2,991,743 UART: [fht] FMC Alias Private Key: 7
2,992,889 UART: [art] Derive CDI
2,993,169 UART: [art] Store in in slot 0x4
3,078,668 UART: [art] Derive Key Pair
3,079,028 UART: [art] Store priv key in slot 0x5
3,092,288 UART: [art] Derive Key Pair - Done
3,107,142 UART: [art] Signing Cert with AUTHO
3,107,622 UART: RITY.KEYID = 7
3,122,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,453 UART: [art] PUB.X = 0051B6D9F9DF097B276C5CDB4E8009042D3CC01B95A9B141B276290C2CBAFB5D787397147C1782226444918117B98B31
3,130,183 UART: [art] PUB.Y = D9F3E5F7B14502CFAFB353C4801057400C5862E0954470CB3E6DB5E2920147BA63168C86338F2C7E9B814980A331D8DE
3,137,122 UART: [art] SIG.R = 7022C780FD9142E0F302CED9E6446E7541CA73470A640A3C7CB70150E0528CE41632C2261C764C38AEB9CDAC288F545F
3,143,882 UART: [art] SIG.S = A02E19D1483DF6300FB14C27429A86FB684A94C5EB9552633FBAA88B724C3E9ABF716A523A59DACC1697AA83A3629760
3,167,612 UART: Caliptra RT
3,167,957 UART: [state] CFI Enabled
3,275,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,068 UART: [rt]cmd =0x44504543, len=96
3,343,746 >>> mbox cmd response data (56 bytes)
3,343,747 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,248 UART: [rt]cmd =0x54514754, len=24
3,375,168 >>> mbox cmd response: failed
3,375,168 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,724 UART: [rt]cmd =0x54514754, len=24
3,406,654 >>> mbox cmd response data (8 bytes)
3,406,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,606 UART: [rt]cmd =0x44504543, len=96
3,473,639 >>> mbox cmd response data (56 bytes)
3,473,640 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,815 UART: [rt]cmd =0x47544744, len=8
3,505,395 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,560 ready_for_fw is high
1,061,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,925 >>> mbox cmd response: success
2,628,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,692,101 UART:
2,692,117 UART: Running Caliptra FMC ...
2,692,525 UART:
2,692,668 UART: [state] CFI Enabled
2,703,041 UART: [fht] FMC Alias Private Key: 7
2,811,304 UART: [art] Extend RT PCRs Done
2,811,732 UART: [art] Lock RT PCRs Done
2,813,288 UART: [art] Populate DV Done
2,821,431 UART: [fht] FMC Alias Private Key: 7
2,822,537 UART: [art] Derive CDI
2,822,817 UART: [art] Store in in slot 0x4
2,908,840 UART: [art] Derive Key Pair
2,909,200 UART: [art] Store priv key in slot 0x5
2,922,218 UART: [art] Derive Key Pair - Done
2,937,293 UART: [art] Signing Cert with AUTHO
2,937,773 UART: RITY.KEYID = 7
2,952,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,582 UART: [art] PUB.X = 6952CCC2FF48DD47BD5F59BB22B77C1F70BABA1AF79AD7B3891FC121792972B4917457F717021DDBE2C953C194430AA6
2,960,356 UART: [art] PUB.Y = AC8682501A19AE63A334C4CDF489E82AABD77E25B4A803935FADDE14638A282BDE3CCECC73B1A9E4A15E224BB852B2B2
2,967,323 UART: [art] SIG.R = 33EC89F4A83ABD038340F563CF2579243047BCB07DCBBE45ED802FE5A9B7F23D900104A5D753895379AEC7D1EDC3C8FF
2,974,098 UART: [art] SIG.S = EBD5757050232C36FB97676143BA08AEC03E3FD5DE315F0DA4A6258098072307324B050E7AB3FC094674910A8D0A8963
2,997,806 UART: Caliptra RT
2,998,151 UART: [state] CFI Enabled
3,106,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,464 UART: [rt]cmd =0x44504543, len=96
3,174,790 >>> mbox cmd response data (56 bytes)
3,174,791 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,308 UART: [rt]cmd =0x54514754, len=24
3,206,350 >>> mbox cmd response: failed
3,206,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,720 UART: [rt]cmd =0x54514754, len=24
3,237,954 >>> mbox cmd response data (8 bytes)
3,237,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,267,738 UART: [rt]cmd =0x44504543, len=96
3,304,443 >>> mbox cmd response data (56 bytes)
3,304,444 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,703 UART: [rt]cmd =0x47544744, len=8
3,336,101 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 ready_for_fw is high
1,174,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,321 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,078 UART: [ldev] ++
1,209,246 UART: [ldev] CDI.KEYID = 6
1,209,610 UART: [ldev] SUBJECT.KEYID = 5
1,210,037 UART: [ldev] AUTHORITY.KEYID = 7
1,210,500 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,813 >>> mbox cmd response: success
2,771,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,930 UART: [afmc] ++
2,773,098 UART: [afmc] CDI.KEYID = 6
2,773,461 UART: [afmc] SUBJECT.KEYID = 7
2,773,887 UART: [afmc] AUTHORITY.KEYID = 5
2,809,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,189 UART: [afmc] --
2,852,225 UART: [cold-reset] --
2,853,067 UART: [state] Locking Datavault
2,854,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,820 UART: [state] Locking ICCM
2,855,290 UART: [exit] Launching FMC @ 0x40000130
2,860,619 UART:
2,860,635 UART: Running Caliptra FMC ...
2,861,043 UART:
2,861,097 UART: [state] CFI Enabled
2,871,482 UART: [fht] FMC Alias Private Key: 7
2,979,187 UART: [art] Extend RT PCRs Done
2,979,615 UART: [art] Lock RT PCRs Done
2,981,337 UART: [art] Populate DV Done
2,989,386 UART: [fht] FMC Alias Private Key: 7
2,990,340 UART: [art] Derive CDI
2,990,620 UART: [art] Store in in slot 0x4
3,076,119 UART: [art] Derive Key Pair
3,076,479 UART: [art] Store priv key in slot 0x5
3,089,345 UART: [art] Derive Key Pair - Done
3,104,311 UART: [art] Signing Cert with AUTHO
3,104,791 UART: RITY.KEYID = 7
3,120,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,012 UART: [art] PUB.X = C231D6228DDC8ABD15B3A09B51027404007C083F173F9B8C0764630B2FE3EC86EA754338FAAEEABCD3A5396E1DA36D15
3,127,757 UART: [art] PUB.Y = DFA81EA90160CAA3FD1195EC943BB7BD22C21F5902E40E9ADB39F94EDB8C5FE863160F5393C1AF324E2819EF29048CFB
3,134,710 UART: [art] SIG.R = E8F6718FF6709B4047A06B19FE3FFA77F51BF22735C8C1151F5D02769B8FE49A835D47EA728F20E3E10C7637FA4403D1
3,141,475 UART: [art] SIG.S = 6A005C065D6E425C2B730B3062E988DFC9D9AC264D531ACDC3785FCB1797A2202A7085BCF007A0865F4A0093D6E41F50
3,165,219 UART: Caliptra RT
3,165,472 UART: [state] CFI Enabled
3,273,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,127 UART: [rt]cmd =0x44504543, len=96
3,340,669 >>> mbox cmd response data (56 bytes)
3,340,670 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,991 UART: [rt]cmd =0x54514754, len=24
3,371,805 >>> mbox cmd response: failed
3,371,805 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,301 UART: [rt]cmd =0x54514754, len=24
3,403,627 >>> mbox cmd response data (8 bytes)
3,403,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,357 UART: [rt]cmd =0x44504543, len=96
3,469,678 >>> mbox cmd response data (56 bytes)
3,469,679 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,156 UART: [rt]cmd =0x47544744, len=8
3,501,494 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,844 ready_for_fw is high
1,056,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,733 >>> mbox cmd response: success
2,623,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,259 UART:
2,685,275 UART: Running Caliptra FMC ...
2,685,683 UART:
2,685,737 UART: [state] CFI Enabled
2,696,382 UART: [fht] FMC Alias Private Key: 7
2,803,291 UART: [art] Extend RT PCRs Done
2,803,719 UART: [art] Lock RT PCRs Done
2,805,021 UART: [art] Populate DV Done
2,813,312 UART: [fht] FMC Alias Private Key: 7
2,814,368 UART: [art] Derive CDI
2,814,648 UART: [art] Store in in slot 0x4
2,900,075 UART: [art] Derive Key Pair
2,900,435 UART: [art] Store priv key in slot 0x5
2,913,835 UART: [art] Derive Key Pair - Done
2,928,016 UART: [art] Signing Cert with AUTHO
2,928,496 UART: RITY.KEYID = 7
2,943,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,181 UART: [art] PUB.X = 4C42253E3D2A84656B026BD9446C1DD8CA6A543AFE6139CCD81ACE139D510A5B98C905A087B7C859AEAB32333F7F11AD
2,950,954 UART: [art] PUB.Y = 15D9DCA525147F1268B0E51D7360FEFFB7C2A9FEF421698ABD33BF43B057956C4ED3A537B63B78D646B3D2CA75308AE8
2,957,916 UART: [art] SIG.R = B8E8BF3E9A375972DDC9B2F259136D4E370B9ACFEDB13D7FD8B5ABD2A450585346221B7DD8805BCEC97994222ED7A559
2,964,697 UART: [art] SIG.S = 8DC2D9995B070CE73DD6087FE70CC3A9CF993B834C9A6382D1DB28EB67B369220C594FB4AA8D74642501F97E248B2C9D
2,988,506 UART: Caliptra RT
2,988,759 UART: [state] CFI Enabled
3,095,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,303 UART: [rt]cmd =0x44504543, len=96
3,163,199 >>> mbox cmd response data (56 bytes)
3,163,200 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,535 UART: [rt]cmd =0x54514754, len=24
3,194,641 >>> mbox cmd response: failed
3,194,641 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,255 UART: [rt]cmd =0x54514754, len=24
3,226,321 >>> mbox cmd response data (8 bytes)
3,226,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,193 UART: [rt]cmd =0x44504543, len=96
3,292,300 >>> mbox cmd response data (56 bytes)
3,292,301 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,612 UART: [rt]cmd =0x47544744, len=8
3,323,986 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,186 UART: [kat] SHA2-256
902,126 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,174,646 ready_for_fw is high
1,174,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,906 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,720 UART: [idev] --
1,208,675 UART: [ldev] ++
1,208,843 UART: [ldev] CDI.KEYID = 6
1,209,207 UART: [ldev] SUBJECT.KEYID = 5
1,209,634 UART: [ldev] AUTHORITY.KEYID = 7
1,210,097 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,817 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,185 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,328 >>> mbox cmd response: success
2,772,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,489 UART: [afmc] ++
2,773,657 UART: [afmc] CDI.KEYID = 6
2,774,020 UART: [afmc] SUBJECT.KEYID = 7
2,774,446 UART: [afmc] AUTHORITY.KEYID = 5
2,809,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,268 UART: [afmc] --
2,853,380 UART: [cold-reset] --
2,854,082 UART: [state] Locking Datavault
2,855,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,923 UART: [state] Locking ICCM
2,856,493 UART: [exit] Launching FMC @ 0x40000130
2,861,822 UART:
2,861,838 UART: Running Caliptra FMC ...
2,862,246 UART:
2,862,389 UART: [state] CFI Enabled
2,873,144 UART: [fht] FMC Alias Private Key: 7
2,981,065 UART: [art] Extend RT PCRs Done
2,981,493 UART: [art] Lock RT PCRs Done
2,983,079 UART: [art] Populate DV Done
2,991,556 UART: [fht] FMC Alias Private Key: 7
2,992,716 UART: [art] Derive CDI
2,992,996 UART: [art] Store in in slot 0x4
3,078,567 UART: [art] Derive Key Pair
3,078,927 UART: [art] Store priv key in slot 0x5
3,092,069 UART: [art] Derive Key Pair - Done
3,106,886 UART: [art] Signing Cert with AUTHO
3,107,366 UART: RITY.KEYID = 7
3,122,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,317 UART: [art] PUB.X = 8E1C546D953C5548F46FAF96537B64DE0B3ADA2719D2E077560876AE395F32BE144FC47582696533A7E6E18183973FF7
3,130,077 UART: [art] PUB.Y = E1FAF50832A36786BA870E6C76DEAE72E26823937C5DF4C0FFF43A9C84C81AF1435538EFCF2C1459B94C27106ED39959
3,137,029 UART: [art] SIG.R = 3345E2D8D995FA1544B02DDBE8CB6752C16D79CE0676F7970D5C35958E20ED2D24FBB8428A1CEF69E0D9ECBB55D21B23
3,143,807 UART: [art] SIG.S = BCB13D4FEAD8D37A2C0C6AD3D88A8240690E90EBC6B15BD38BB37C1E3DE2FEA95A44B3830F5D1D16744A9021F7CB54CA
3,167,491 UART: Caliptra RT
3,167,836 UART: [state] CFI Enabled
3,275,291 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,367 UART: [rt]cmd =0x44504543, len=96
3,342,701 >>> mbox cmd response data (56 bytes)
3,342,702 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,283 UART: [rt]cmd =0x54514754, len=24
3,374,171 >>> mbox cmd response: failed
3,374,171 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,767 UART: [rt]cmd =0x54514754, len=24
3,405,977 >>> mbox cmd response data (8 bytes)
3,405,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,057 UART: [rt]cmd =0x44504543, len=96
3,473,014 >>> mbox cmd response data (56 bytes)
3,473,015 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,520 UART: [rt]cmd =0x47544744, len=8
3,504,828 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,987 ready_for_fw is high
1,056,987 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,128 >>> mbox cmd response: success
2,622,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,274 UART:
2,685,290 UART: Running Caliptra FMC ...
2,685,698 UART:
2,685,841 UART: [state] CFI Enabled
2,696,690 UART: [fht] FMC Alias Private Key: 7
2,805,635 UART: [art] Extend RT PCRs Done
2,806,063 UART: [art] Lock RT PCRs Done
2,807,723 UART: [art] Populate DV Done
2,815,922 UART: [fht] FMC Alias Private Key: 7
2,816,978 UART: [art] Derive CDI
2,817,258 UART: [art] Store in in slot 0x4
2,902,917 UART: [art] Derive Key Pair
2,903,277 UART: [art] Store priv key in slot 0x5
2,916,349 UART: [art] Derive Key Pair - Done
2,930,975 UART: [art] Signing Cert with AUTHO
2,931,455 UART: RITY.KEYID = 7
2,946,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,626 UART: [art] PUB.X = AB2EA657FA253D12A06842CD074BB331D6DFB9AB4FD6AFF4DDAC72F696AC6FF5517870CBE532B22173588157B610FE9F
2,954,411 UART: [art] PUB.Y = 9A18727748AE78CA9067DB91230596B1295FE0970337A225940B79D86ED1F49E712D8199E58CCD8F0472144CFB89943F
2,961,341 UART: [art] SIG.R = 9496B893247555E6821791F9827C32E7C2B0B11EF839D3DA668CA7D76A06078D0C1E9AA3FDC3BFDE91220CE585A14651
2,968,101 UART: [art] SIG.S = C2F891B351789BE0490CC04A98FACF9309B77F1073D9BDAB92316CAE9FB74E52F774A9FDE22D21B0345A623FCD56CB42
2,991,668 UART: Caliptra RT
2,992,013 UART: [state] CFI Enabled
3,099,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,383 UART: [rt]cmd =0x44504543, len=96
3,167,799 >>> mbox cmd response data (56 bytes)
3,167,800 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,381 UART: [rt]cmd =0x54514754, len=24
3,199,291 >>> mbox cmd response: failed
3,199,291 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,873 UART: [rt]cmd =0x54514754, len=24
3,231,221 >>> mbox cmd response data (8 bytes)
3,231,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,261,155 UART: [rt]cmd =0x44504543, len=96
3,297,022 >>> mbox cmd response data (56 bytes)
3,297,023 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,224 UART: [rt]cmd =0x47544744, len=8
3,328,894 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,586 UART: [state] LifecycleState = Unprovisioned
85,241 UART: [state] DebugLocked = No
85,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,507 UART: [kat] SHA2-256
881,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,553 UART: [kat] ++
885,705 UART: [kat] sha1
889,953 UART: [kat] SHA2-256
891,891 UART: [kat] SHA2-384
894,540 UART: [kat] SHA2-512-ACC
896,441 UART: [kat] ECC-384
902,028 UART: [kat] HMAC-384Kdf
906,624 UART: [kat] LMS
1,474,820 UART: [kat] --
1,475,787 UART: [cold-reset] ++
1,476,209 UART: [fht] Storing FHT @ 0x50003400
1,479,086 UART: [idev] ++
1,479,254 UART: [idev] CDI.KEYID = 6
1,479,614 UART: [idev] SUBJECT.KEYID = 7
1,480,038 UART: [idev] UDS.KEYID = 0
1,480,383 ready_for_fw is high
1,480,383 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,622 UART: [idev] --
1,514,783 UART: [ldev] ++
1,514,951 UART: [ldev] CDI.KEYID = 6
1,515,314 UART: [ldev] SUBJECT.KEYID = 5
1,515,740 UART: [ldev] AUTHORITY.KEYID = 7
1,516,203 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,420 UART: [ldev] --
1,585,813 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 78704 bytes
2,477,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,951 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,818 >>> mbox cmd response: success
2,615,818 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,616,922 UART: [afmc] ++
2,617,090 UART: [afmc] CDI.KEYID = 6
2,617,452 UART: [afmc] SUBJECT.KEYID = 7
2,617,877 UART: [afmc] AUTHORITY.KEYID = 5
2,653,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,366 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,874 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,759 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,449 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,576 UART: [afmc] --
2,696,472 UART: [cold-reset] --
2,697,200 UART: [state] Locking Datavault
2,698,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,745 UART: [state] Locking ICCM
2,699,329 UART: [exit] Launching FMC @ 0x40000130
2,704,658 UART:
2,704,674 UART: Running Caliptra FMC ...
2,705,082 UART:
2,705,136 UART: [state] CFI Enabled
2,715,675 UART: [fht] FMC Alias Private Key: 7
2,824,330 UART: [art] Extend RT PCRs Done
2,824,758 UART: [art] Lock RT PCRs Done
2,826,170 UART: [art] Populate DV Done
2,834,425 UART: [fht] FMC Alias Private Key: 7
2,835,433 UART: [art] Derive CDI
2,835,713 UART: [art] Store in in slot 0x4
2,920,976 UART: [art] Derive Key Pair
2,921,336 UART: [art] Store priv key in slot 0x5
2,934,570 UART: [art] Derive Key Pair - Done
2,949,448 UART: [art] Signing Cert with AUTHO
2,949,928 UART: RITY.KEYID = 7
2,965,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,891 UART: [art] PUB.X = 6041EB5F843C8DE5D3EC30D66F3A6F87F947CD72B3B4B74E8F6CCAE7EFE893CB1953076638FF08228BC5FD37D517B1F0
2,972,671 UART: [art] PUB.Y = AB623E1B5CB621CA29B91AA602EBD129A23BB652F55005171713831F763D1F1BBD14ED08CCDD656CD76EF10B2BB0C9F9
2,979,625 UART: [art] SIG.R = 8E0880B590CCC76BAD247FB56D22C2A33932C3B16C803294A4DB3FAAE5F9429A7A0E85276A5363BDC74870842B722E73
2,986,393 UART: [art] SIG.S = CA6F2FC5197FCFD58553BC5263FA48AAEF42CD18EE3F13E9761A60ABE1D95F26ACCEE624B4CA6DA9EFEFEA1F4928CBC3
3,010,700 UART: mbox::rt_entry...
3,011,072 UART: ____ _ _ _ ____ _____
3,011,856 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,192 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,960 UART: |_|
3,015,272 UART:
3,122,165 UART: [rt] Runtime listening for mailbox commands...
3,123,099 >>> mbox cmd response data (0 bytes)
3,123,100 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,123,214 UART:
3,123,230 UART: Running Caliptra ROM ...
3,123,638 UART:
3,123,692 UART: [state] CFI Enabled
3,126,188 UART: [state] LifecycleState = Unprovisioned
3,126,843 UART: [state] DebugLocked = No
3,127,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,222 UART: [kat] SHA2-256
3,923,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,268 UART: [kat] ++
3,927,420 UART: [kat] sha1
3,931,748 UART: [kat] SHA2-256
3,933,686 UART: [kat] SHA2-384
3,936,305 UART: [kat] SHA2-512-ACC
3,938,205 UART: [kat] ECC-384
3,943,834 UART: [kat] HMAC-384Kdf
3,948,294 UART: [kat] LMS
4,516,490 UART: [kat] --
4,517,275 UART: [update-reset] ++
5,851,827 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,003 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,002,879 >>> mbox cmd response: success
6,003,218 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,232 UART: [update-reset Success] --
6,011,961 UART: [state] Locking Datavault
6,012,849 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,453 UART: [state] Locking ICCM
6,014,117 UART: [exit] Launching FMC @ 0x40000130
6,019,446 UART:
6,019,462 UART: Running Caliptra FMC ...
6,019,870 UART:
6,019,924 UART: [state] CFI Enabled
6,108,335 UART: [art] Extend RT PCRs Done
6,108,763 UART: [art] Lock RT PCRs Done
6,110,098 UART: [art] Populate DV Done
6,118,413 UART: [fht] FMC Alias Private Key: 7
6,119,529 UART: [art] Derive CDI
6,119,809 UART: [art] Store in in slot 0x4
6,205,604 UART: [art] Derive Key Pair
6,205,964 UART: [art] Store priv key in slot 0x5
6,219,162 UART: [art] Derive Key Pair - Done
6,234,036 UART: [art] Signing Cert with AUTHO
6,234,516 UART: RITY.KEYID = 7
6,249,842 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,607 UART: [art] PUB.X = 8D05FB08B6889219A9761477F10F89EEBAC64EBC7A8B6C5DB01168D89165D29115BAC494A85E1FF61BFBC906F86E603D
6,257,375 UART: [art] PUB.Y = F97AA968ED652F8ECB3D864C0BCC1C4FA1A364570DF686C98D40C136A8148DB54C78859F4426959AA7CD8CA81E121268
6,264,327 UART: [art] SIG.R = A386B4ADAECE4797AD9FEDDFB5F485EF4A90ABF785331C7346AE87DE01CEB4DBC612DC0960D7F6631DE89A1576F7EC92
6,271,117 UART: [art] SIG.S = 1277605B067830A7AF0A74085CBFD604A9618E6457455AB7C8AA6CB0E3B101A01567F7B6E25169C81941451332C72F9C
6,294,697 UART: Caliptra RT
6,294,950 UART: [state] CFI Enabled
6,577,338 UART: [rt] RT failed reset flow
6,577,769 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,137 ready_for_fw is high
1,362,137 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,970 >>> mbox cmd response: success
2,466,970 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,528,022 UART:
2,528,038 UART: Running Caliptra FMC ...
2,528,446 UART:
2,528,500 UART: [state] CFI Enabled
2,538,837 UART: [fht] FMC Alias Private Key: 7
2,647,090 UART: [art] Extend RT PCRs Done
2,647,518 UART: [art] Lock RT PCRs Done
2,649,206 UART: [art] Populate DV Done
2,657,533 UART: [fht] FMC Alias Private Key: 7
2,658,577 UART: [art] Derive CDI
2,658,857 UART: [art] Store in in slot 0x4
2,744,682 UART: [art] Derive Key Pair
2,745,042 UART: [art] Store priv key in slot 0x5
2,758,482 UART: [art] Derive Key Pair - Done
2,773,503 UART: [art] Signing Cert with AUTHO
2,773,983 UART: RITY.KEYID = 7
2,788,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,580 UART: [art] PUB.X = D26D7861ED1E17BDF468BAAA53A90720A9A3197A040AE57CA1C5D9CFD20D3A9ED888CA028D09A0CAC71899AAE456387C
2,796,350 UART: [art] PUB.Y = D5BEAD2982C221A28EC4474B5B58EA1B5905C2A5A05CA945E3F6BD0B1B76262DC0F9BDBFD4AF83F3AC491499EF460218
2,803,309 UART: [art] SIG.R = 81DA17B9BB9C73BDA2C3F99501C6283450E1A8181C71EA299396B5353628286505A97048EA4DE08B6BC7618069CFDC84
2,810,071 UART: [art] SIG.S = BF0CAD545B632AE94C1059EDE6EE424AB9C7E3F0F1F525F1438F45C989B087AD96D1468D36D4C5B66DE7F3E2245A66E0
2,834,271 UART: mbox::rt_entry...
2,834,643 UART: ____ _ _ _ ____ _____
2,835,427 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,227 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,995 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,763 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,531 UART: |_|
2,838,843 UART:
2,946,792 UART: [rt] Runtime listening for mailbox commands...
2,947,726 >>> mbox cmd response data (0 bytes)
2,947,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,709,840 >>> mbox cmd response: success
5,723,195 UART:
5,723,211 UART: Running Caliptra FMC ...
5,723,619 UART:
5,723,673 UART: [state] CFI Enabled
5,812,442 UART: [art] Extend RT PCRs Done
5,812,870 UART: [art] Lock RT PCRs Done
5,814,277 UART: [art] Populate DV Done
5,822,234 UART: [fht] FMC Alias Private Key: 7
5,823,232 UART: [art] Derive CDI
5,823,512 UART: [art] Store in in slot 0x4
5,908,855 UART: [art] Derive Key Pair
5,909,215 UART: [art] Store priv key in slot 0x5
5,922,343 UART: [art] Derive Key Pair - Done
5,937,416 UART: [art] Signing Cert with AUTHO
5,937,896 UART: RITY.KEYID = 7
5,953,004 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,769 UART: [art] PUB.X = 760495D1080182014A834A93F811E87679580B907FB4FB9A03A0C318B7B8A1E68FA055D18F8B32F88336770D0335B3C7
5,960,505 UART: [art] PUB.Y = 4D93B9EA995422E2B0538F4B4C99EA23F6683C7DD197F6B7ECA5683D087F5AE86E281D9D66C92ADE29B9687702AA9DF8
5,967,459 UART: [art] SIG.R = 1ADCA1D325A22DD7F27A9BBD7D6DE3DF972AD0D01ED78EBAB85F7FC40F83FABAE7B37C6FCF5D0F7434ACC7FC7C85807D
5,974,261 UART: [art] SIG.S = 2439CB932951F2F10FB180A4FFA6840F67AC8EFD1CB2A4E40E596AF8B484911C517C743D6E83A4A6DF2F4B7E6D3B6868
5,997,971 UART: Caliptra RT
5,998,224 UART: [state] CFI Enabled
6,274,299 UART: [rt] RT failed reset flow
6,274,730 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,670 UART: [kat] SHA2-256
882,601 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,716 UART: [kat] ++
886,868 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,731 UART: [kat] SHA2-512-ACC
897,632 UART: [kat] ECC-384
903,635 UART: [kat] HMAC-384Kdf
908,269 UART: [kat] LMS
1,476,465 UART: [kat] --
1,477,272 UART: [cold-reset] ++
1,477,762 UART: [fht] Storing FHT @ 0x50003400
1,480,671 UART: [idev] ++
1,480,839 UART: [idev] CDI.KEYID = 6
1,481,199 UART: [idev] SUBJECT.KEYID = 7
1,481,623 UART: [idev] UDS.KEYID = 0
1,481,968 ready_for_fw is high
1,481,968 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,957 UART: [idev] Erasing UDS.KEYID = 0
1,506,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,381 UART: [idev] --
1,516,424 UART: [ldev] ++
1,516,592 UART: [ldev] CDI.KEYID = 6
1,516,955 UART: [ldev] SUBJECT.KEYID = 5
1,517,381 UART: [ldev] AUTHORITY.KEYID = 7
1,517,844 UART: [ldev] FE.KEYID = 1
1,523,152 UART: [ldev] Erasing FE.KEYID = 1
1,548,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,341 UART: [ldev] --
1,587,622 UART: [fwproc] Waiting for Commands...
1,588,453 UART: [fwproc] Received command 0x46574c44
1,589,244 UART: [fwproc] Received Image of size 78704 bytes
2,479,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,059 >>> mbox cmd response: success
2,618,059 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,619,305 UART: [afmc] ++
2,619,473 UART: [afmc] CDI.KEYID = 6
2,619,835 UART: [afmc] SUBJECT.KEYID = 7
2,620,260 UART: [afmc] AUTHORITY.KEYID = 5
2,654,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,272 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,962 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,045 UART: [afmc] --
2,698,047 UART: [cold-reset] --
2,698,823 UART: [state] Locking Datavault
2,699,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,488 UART: [state] Locking ICCM
2,700,978 UART: [exit] Launching FMC @ 0x40000130
2,706,307 UART:
2,706,323 UART: Running Caliptra FMC ...
2,706,731 UART:
2,706,874 UART: [state] CFI Enabled
2,717,773 UART: [fht] FMC Alias Private Key: 7
2,826,632 UART: [art] Extend RT PCRs Done
2,827,060 UART: [art] Lock RT PCRs Done
2,828,648 UART: [art] Populate DV Done
2,836,969 UART: [fht] FMC Alias Private Key: 7
2,838,071 UART: [art] Derive CDI
2,838,351 UART: [art] Store in in slot 0x4
2,924,224 UART: [art] Derive Key Pair
2,924,584 UART: [art] Store priv key in slot 0x5
2,938,140 UART: [art] Derive Key Pair - Done
2,953,056 UART: [art] Signing Cert with AUTHO
2,953,536 UART: RITY.KEYID = 7
2,968,944 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,709 UART: [art] PUB.X = 2E2D07C0E5892C736797C2978421E0C2B485EB406917E7AA4A3985A40A6A7AED895FB09D30F2A40F58B7E4CC08D7E523
2,976,471 UART: [art] PUB.Y = 7D06D2F7CB95F7EDA3CEB85C2FB9FB1635302CFC6B69E31A08623A85045B7D9F2817034DD3F5AB2C82F0C277F8323131
2,983,419 UART: [art] SIG.R = D15104B465F6178013E14CCC5A276164FBCD6FA4BE4A35697FFA129A42E66029317AB32F503B82A0AE94C4F5C0A59190
2,990,190 UART: [art] SIG.S = 590325B201840BA141B028B94F64F7D8C5FD9AE4CCE88C84BF966B581C6F0C837DB9F55B5E18CCF5E41374BC936BB550
3,014,311 UART: mbox::rt_entry...
3,014,683 UART: ____ _ _ _ ____ _____
3,015,467 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,267 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,035 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,571 UART: |_|
3,018,883 UART:
3,125,199 UART: [rt] Runtime listening for mailbox commands...
3,126,133 >>> mbox cmd response data (0 bytes)
3,126,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,126,248 UART:
3,126,264 UART: Running Caliptra ROM ...
3,126,672 UART:
3,126,813 UART: [state] CFI Enabled
3,129,473 UART: [state] LifecycleState = Unprovisioned
3,130,128 UART: [state] DebugLocked = No
3,130,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,132,549 UART: [kat] SHA2-256
3,926,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,930,595 UART: [kat] ++
3,930,747 UART: [kat] sha1
3,934,973 UART: [kat] SHA2-256
3,936,911 UART: [kat] SHA2-384
3,939,690 UART: [kat] SHA2-512-ACC
3,941,590 UART: [kat] ECC-384
3,947,327 UART: [kat] HMAC-384Kdf
3,951,927 UART: [kat] LMS
4,520,123 UART: [kat] --
4,520,850 UART: [update-reset] ++
5,856,170 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,857,300 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,007,176 >>> mbox cmd response: success
6,007,375 UART: [update-reset] Copying MAN_2 To MAN_1
6,015,389 UART: [update-reset Success] --
6,016,322 UART: [state] Locking Datavault
6,017,042 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,646 UART: [state] Locking ICCM
6,018,164 UART: [exit] Launching FMC @ 0x40000130
6,023,493 UART:
6,023,509 UART: Running Caliptra FMC ...
6,023,917 UART:
6,024,060 UART: [state] CFI Enabled
6,113,431 UART: [art] Extend RT PCRs Done
6,113,859 UART: [art] Lock RT PCRs Done
6,114,972 UART: [art] Populate DV Done
6,123,047 UART: [fht] FMC Alias Private Key: 7
6,124,023 UART: [art] Derive CDI
6,124,303 UART: [art] Store in in slot 0x4
6,209,818 UART: [art] Derive Key Pair
6,210,178 UART: [art] Store priv key in slot 0x5
6,223,804 UART: [art] Derive Key Pair - Done
6,238,633 UART: [art] Signing Cert with AUTHO
6,239,113 UART: RITY.KEYID = 7
6,254,205 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,970 UART: [art] PUB.X = 34C6906927797D4E4B1B3815E13BD45360A13DB0466506344FC2BF79C98D719523D72B9EEFF9FFAC97B191C32B5522C3
6,261,737 UART: [art] PUB.Y = 24DC81834C7912506A033BF50345E3B084F67C26313746E2096501CC3588CFEF61FD34E14C38DD0252CED40FAF19A1B4
6,268,669 UART: [art] SIG.R = FF53EFB7464A4905CBD56A5C3B5795A5664926C616216E7813EB7B38FE3C752C9B7BFA9B90AFA61B07A151C49E4AA92D
6,275,445 UART: [art] SIG.S = 0A89B767B47B81E3511DC5394699E3F3281F87B495428B5FBD87800B02FDBF775FEF3A340B5182113BB36218706BAD2E
6,298,856 UART: Caliptra RT
6,299,201 UART: [state] CFI Enabled
6,582,017 UART: [rt] RT failed reset flow
6,582,448 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,728 ready_for_fw is high
1,362,728 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,201 >>> mbox cmd response: success
2,467,201 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,528,633 UART:
2,528,649 UART: Running Caliptra FMC ...
2,529,057 UART:
2,529,200 UART: [state] CFI Enabled
2,539,889 UART: [fht] FMC Alias Private Key: 7
2,647,694 UART: [art] Extend RT PCRs Done
2,648,122 UART: [art] Lock RT PCRs Done
2,649,684 UART: [art] Populate DV Done
2,658,225 UART: [fht] FMC Alias Private Key: 7
2,659,159 UART: [art] Derive CDI
2,659,439 UART: [art] Store in in slot 0x4
2,745,606 UART: [art] Derive Key Pair
2,745,966 UART: [art] Store priv key in slot 0x5
2,759,162 UART: [art] Derive Key Pair - Done
2,773,644 UART: [art] Signing Cert with AUTHO
2,774,124 UART: RITY.KEYID = 7
2,789,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,329 UART: [art] PUB.X = DEABB6776920E1E9AB424A8EBE0AB1520C12EA6339AEF9C2D5E09E39E8D8B56D9A432BA6427DD4DD0CF882B23FAEBFF7
2,797,118 UART: [art] PUB.Y = D16EC3E4C29E3B19A15CECD6177438C812C628393168F6D70EAB1E66EBBE37A0EDB3EC0EBC352C316525F589EDA4D346
2,804,078 UART: [art] SIG.R = 063BC03CA54DEB972A4B89BC92180CB61147D4105E357FE6176A628512BBC698648AB0F7EB188C3B11C1F0C09A78941D
2,810,846 UART: [art] SIG.S = 0A538DF755A30585065C1E004FD968AF970328D56CF9E98DF2BA6123E2BFF5EA2C89F510605597FEF9C16AC45F7153AC
2,834,737 UART: mbox::rt_entry...
2,835,109 UART: ____ _ _ _ ____ _____
2,835,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,997 UART: |_|
2,839,309 UART:
2,947,146 UART: [rt] Runtime listening for mailbox commands...
2,948,080 >>> mbox cmd response data (0 bytes)
2,948,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,709,475 >>> mbox cmd response: success
5,722,608 UART:
5,722,624 UART: Running Caliptra FMC ...
5,723,032 UART:
5,723,175 UART: [state] CFI Enabled
5,811,976 UART: [art] Extend RT PCRs Done
5,812,404 UART: [art] Lock RT PCRs Done
5,813,621 UART: [art] Populate DV Done
5,821,874 UART: [fht] FMC Alias Private Key: 7
5,822,928 UART: [art] Derive CDI
5,823,208 UART: [art] Store in in slot 0x4
5,908,585 UART: [art] Derive Key Pair
5,908,945 UART: [art] Store priv key in slot 0x5
5,921,897 UART: [art] Derive Key Pair - Done
5,936,477 UART: [art] Signing Cert with AUTHO
5,936,957 UART: RITY.KEYID = 7
5,951,929 UART: [art] Erasing AUTHORITY.KEYID = 7
5,952,694 UART: [art] PUB.X = 2E35F94B8CA9E830DFE0B45FD153E6BB3C506A44788532997B9ED3348B5BBD488B0F89C720BB70CA7FA7898679355A76
5,959,467 UART: [art] PUB.Y = B20596072CFE5E256AE66935C19E26CD1AEFD418BD087B143FFEA5F6E8AC1B51EB779FC2698BA17BAD04CAC857FC738F
5,966,427 UART: [art] SIG.R = 943B3CEF798E2E8F50BE70D740358C043701B6C4F21714EFD121D9B173C1DD7321F5BB6FB36B65B5EED1130C00D31B15
5,973,174 UART: [art] SIG.S = 5B6FC077AFB99E4210D173FB0699A20F10DF30F1D428FBA832571B3C14A0284D1E0C146104A1B8E74B3A1428A2D69195
5,996,843 UART: Caliptra RT
5,997,188 UART: [state] CFI Enabled
6,278,486 UART: [rt] RT failed reset flow
6,278,917 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,637 UART: [kat] SHA2-256
903,577 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,443 UART: [idev] Sha1 KeyId Algorithm
1,208,889 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,614 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,350 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,122 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,593 >>> mbox cmd response: success
2,312,593 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,611 UART: [afmc] ++
2,313,779 UART: [afmc] CDI.KEYID = 6
2,314,141 UART: [afmc] SUBJECT.KEYID = 7
2,314,566 UART: [afmc] AUTHORITY.KEYID = 5
2,349,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,312 UART: [afmc] --
2,393,252 UART: [cold-reset] --
2,394,180 UART: [state] Locking Datavault
2,395,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,145 UART: [state] Locking ICCM
2,396,689 UART: [exit] Launching FMC @ 0x40000130
2,402,018 UART:
2,402,034 UART: Running Caliptra FMC ...
2,402,442 UART:
2,402,496 UART: [state] CFI Enabled
2,413,207 UART: [fht] FMC Alias Private Key: 7
2,521,126 UART: [art] Extend RT PCRs Done
2,521,554 UART: [art] Lock RT PCRs Done
2,523,034 UART: [art] Populate DV Done
2,531,023 UART: [fht] FMC Alias Private Key: 7
2,531,959 UART: [art] Derive CDI
2,532,239 UART: [art] Store in in slot 0x4
2,617,616 UART: [art] Derive Key Pair
2,617,976 UART: [art] Store priv key in slot 0x5
2,631,120 UART: [art] Derive Key Pair - Done
2,645,755 UART: [art] Signing Cert with AUTHO
2,646,235 UART: RITY.KEYID = 7
2,661,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,374 UART: [art] PUB.X = 5580B1406D69F469160F377DCA311E8C9E9188030843D481C81F17042A9001E4E9D2FC56A808B40E03540FF991C96D84
2,669,107 UART: [art] PUB.Y = E6B47379697904A7F9B4F3B572C380396546BAE39734B14A20A031EF9F889E971632A36918D20B2AA599CBF719E252B9
2,676,045 UART: [art] SIG.R = 33E06FA363E0E3208DFA802A73DA6D692B97620BBCBBA98008238D4978E3C594B2D2C75A1ED35BA537121301FF551F5B
2,682,812 UART: [art] SIG.S = F0EB9411E720B51C72369DA89114E56B76A10485EA6909B2E0DB86214E6FE510A2C4E24BCBFBFC0DD8883014E589F390
2,706,696 UART: mbox::rt_entry...
2,707,068 UART: ____ _ _ _ ____ _____
2,707,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,652 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,420 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,188 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,956 UART: |_|
2,711,268 UART:
2,818,604 UART: [rt] Runtime listening for mailbox commands...
2,819,538 >>> mbox cmd response data (0 bytes)
2,819,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,819,650 UART:
2,819,666 UART: Running Caliptra ROM ...
2,820,074 UART:
2,820,129 UART: [state] CFI Enabled
2,822,343 UART: [state] LifecycleState = Unprovisioned
2,822,998 UART: [state] DebugLocked = No
2,823,728 UART: [state] WD Timer not started. Device not locked for debugging
2,824,938 UART: [kat] SHA2-256
3,630,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,713 UART: [kat] ++
3,634,865 UART: [kat] sha1
3,639,147 UART: [kat] SHA2-256
3,641,087 UART: [kat] SHA2-384
3,643,972 UART: [kat] SHA2-512-ACC
3,645,872 UART: [kat] ECC-384
3,655,687 UART: [kat] HMAC-384Kdf
3,660,385 UART: [kat] LMS
3,908,713 UART: [kat] --
3,909,603 UART: [update-reset] ++
5,221,051 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,174 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,998 >>> mbox cmd response: success
5,372,153 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,167 UART: [update-reset Success] --
5,381,026 UART: [state] Locking Datavault
5,381,780 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,384 UART: [state] Locking ICCM
5,382,892 UART: [exit] Launching FMC @ 0x40000130
5,388,221 UART:
5,388,237 UART: Running Caliptra FMC ...
5,388,645 UART:
5,388,699 UART: [state] CFI Enabled
5,477,828 UART: [art] Extend RT PCRs Done
5,478,256 UART: [art] Lock RT PCRs Done
5,479,517 UART: [art] Populate DV Done
5,487,758 UART: [fht] FMC Alias Private Key: 7
5,488,740 UART: [art] Derive CDI
5,489,020 UART: [art] Store in in slot 0x4
5,574,567 UART: [art] Derive Key Pair
5,574,927 UART: [art] Store priv key in slot 0x5
5,587,903 UART: [art] Derive Key Pair - Done
5,602,737 UART: [art] Signing Cert with AUTHO
5,603,217 UART: RITY.KEYID = 7
5,618,603 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,368 UART: [art] PUB.X = 08094EEB5E700FBC0E66D908B331462F5DC74D8A13CA53E805A1C20276AB5323A622D0AFF1E6BFB8EC661E17E19FBCF3
5,626,133 UART: [art] PUB.Y = E2626BEDB6AB0A4F71B9B78D473493D2CD2BF3E765187F77585908AFE319C1367F63F8AA933A607674DCD931F9666B90
5,633,081 UART: [art] SIG.R = C3DE686795E57A5B81179EADD3F3EDAB3A66E9A30FB261213BE5F64B8E49AE8629FCFD48FDAAA2B79B1C902F1CA46939
5,639,870 UART: [art] SIG.S = FE90C0BA9E53ABF457C4920865755B28AE1CDB36774707CAAD22A0EF3A0968C413AF682215DF55A977A06FD20CDB65F3
5,663,001 UART: Caliptra RT
5,663,254 UART: [state] CFI Enabled
5,945,095 UART: [rt] RT failed reset flow
5,945,526 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,380 >>> mbox cmd response: success
2,166,380 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,228,348 UART:
2,228,364 UART: Running Caliptra FMC ...
2,228,772 UART:
2,228,826 UART: [state] CFI Enabled
2,239,475 UART: [fht] FMC Alias Private Key: 7
2,348,202 UART: [art] Extend RT PCRs Done
2,348,630 UART: [art] Lock RT PCRs Done
2,350,090 UART: [art] Populate DV Done
2,358,523 UART: [fht] FMC Alias Private Key: 7
2,359,581 UART: [art] Derive CDI
2,359,861 UART: [art] Store in in slot 0x4
2,445,734 UART: [art] Derive Key Pair
2,446,094 UART: [art] Store priv key in slot 0x5
2,458,946 UART: [art] Derive Key Pair - Done
2,473,840 UART: [art] Signing Cert with AUTHO
2,474,320 UART: RITY.KEYID = 7
2,489,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,159 UART: [art] PUB.X = C8FAF171405EFBA342E0C10556259B1E7AD6B61F1C9375898400E3B5E08C19D9236CBB2E9002FB903EC274E586139FBC
2,496,907 UART: [art] PUB.Y = B266508A3BCBC7A27854828B8FF18B8389655A2053F83BF25ADC5EC568262D9952E099754EA74F893BBC6DDACD75C52D
2,503,865 UART: [art] SIG.R = E244735B3CA53D0D897F00E41CE6564181A547ADDD385212898830E8BEC00FF1AB872D7403B756C6798753DAA30A1806
2,510,596 UART: [art] SIG.S = D8EEE233B4DA6070857DA965304A518AAD59E8E8B00FB8DFC17944EA4EF03810145B12DF94EF51C65F14B27915176A61
2,535,248 UART: mbox::rt_entry...
2,535,620 UART: ____ _ _ _ ____ _____
2,536,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,537,204 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,508 UART: |_|
2,539,820 UART:
2,646,145 UART: [rt] Runtime listening for mailbox commands...
2,647,079 >>> mbox cmd response data (0 bytes)
2,647,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,084,438 >>> mbox cmd response: success
5,097,846 UART:
5,097,862 UART: Running Caliptra FMC ...
5,098,270 UART:
5,098,324 UART: [state] CFI Enabled
5,186,959 UART: [art] Extend RT PCRs Done
5,187,387 UART: [art] Lock RT PCRs Done
5,188,622 UART: [art] Populate DV Done
5,196,621 UART: [fht] FMC Alias Private Key: 7
5,197,653 UART: [art] Derive CDI
5,197,933 UART: [art] Store in in slot 0x4
5,283,416 UART: [art] Derive Key Pair
5,283,776 UART: [art] Store priv key in slot 0x5
5,296,866 UART: [art] Derive Key Pair - Done
5,311,836 UART: [art] Signing Cert with AUTHO
5,312,316 UART: RITY.KEYID = 7
5,327,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,291 UART: [art] PUB.X = 3BBA861F66E4B9C8F6C1C5E6A1BE1D2C1FDB86C88F762F972894446B9F1D52ED2FA28ED6208B729CB1E4FAF8B089D355
5,335,079 UART: [art] PUB.Y = F4ECBA3DCA6498FB72DCC16F7CF81FF0E746BB76B765F948D9242A85BBFC5E1366F434AED95931025280FCE2788580DB
5,342,042 UART: [art] SIG.R = 41738ED15A4269D518D433E9BD7163140BE8D7FEDFD74313E369BC1AECFB0A289D9C269A8E6241CCBED2FC0CEE161820
5,348,819 UART: [art] SIG.S = F02B6EC7A5EC9CF31AFCA60DF5506AA207E50CA78C81D300483970856C90592D28A2720A3AA5CADE944C643F33EEE8BB
5,372,282 UART: Caliptra RT
5,372,535 UART: [state] CFI Enabled
5,652,827 UART: [rt] RT failed reset flow
5,653,258 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,123 UART: [kat] SHA2-512-ACC
909,024 UART: [kat] ECC-384
919,101 UART: [kat] HMAC-384Kdf
923,733 UART: [kat] LMS
1,172,061 UART: [kat] --
1,173,032 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,176,251 UART: [idev] ++
1,176,419 UART: [idev] CDI.KEYID = 6
1,176,779 UART: [idev] SUBJECT.KEYID = 7
1,177,203 UART: [idev] UDS.KEYID = 0
1,177,548 ready_for_fw is high
1,177,548 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,597 UART: [idev] Erasing UDS.KEYID = 0
1,202,358 UART: [idev] Sha1 KeyId Algorithm
1,210,946 UART: [idev] --
1,212,016 UART: [ldev] ++
1,212,184 UART: [ldev] CDI.KEYID = 6
1,212,547 UART: [ldev] SUBJECT.KEYID = 5
1,212,973 UART: [ldev] AUTHORITY.KEYID = 7
1,213,436 UART: [ldev] FE.KEYID = 1
1,218,526 UART: [ldev] Erasing FE.KEYID = 1
1,244,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,476 UART: [ldev] --
1,283,829 UART: [fwproc] Wait for Commands...
1,284,415 UART: [fwproc] Recv command 0x46574c44
1,285,143 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,987 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,470 >>> mbox cmd response: success
2,314,470 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,315,664 UART: [afmc] ++
2,315,832 UART: [afmc] CDI.KEYID = 6
2,316,194 UART: [afmc] SUBJECT.KEYID = 7
2,316,619 UART: [afmc] AUTHORITY.KEYID = 5
2,352,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,763 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,376 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,095 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,973 UART: [afmc] --
2,395,987 UART: [cold-reset] --
2,396,835 UART: [state] Locking Datavault
2,397,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,542 UART: [state] Locking ICCM
2,399,008 UART: [exit] Launching FMC @ 0x40000130
2,404,337 UART:
2,404,353 UART: Running Caliptra FMC ...
2,404,761 UART:
2,404,904 UART: [state] CFI Enabled
2,415,641 UART: [fht] FMC Alias Private Key: 7
2,523,966 UART: [art] Extend RT PCRs Done
2,524,394 UART: [art] Lock RT PCRs Done
2,525,870 UART: [art] Populate DV Done
2,534,107 UART: [fht] FMC Alias Private Key: 7
2,535,141 UART: [art] Derive CDI
2,535,421 UART: [art] Store in in slot 0x4
2,621,258 UART: [art] Derive Key Pair
2,621,618 UART: [art] Store priv key in slot 0x5
2,634,864 UART: [art] Derive Key Pair - Done
2,649,966 UART: [art] Signing Cert with AUTHO
2,650,446 UART: RITY.KEYID = 7
2,665,738 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,503 UART: [art] PUB.X = 29B57B4F4B5B919A7A65F54B4E8C2CBF9C7F52FF04BE898833E4A7FAD992FBFDB293075726B8827F2012802AF0EF89A8
2,673,279 UART: [art] PUB.Y = F136104359BA00AF76034D27294A8C826ACAD32E395FDF123AE302EDD3FD525C550BC297F92732A9F97931EEF6221D3B
2,680,204 UART: [art] SIG.R = A8C21A08FEE8398971F9A0BA021716FB0FA391DF87336B901D17B3BEBB00CA9A8C68010F643101EB8372303E122C9EE7
2,686,940 UART: [art] SIG.S = F001DE8336FA5FDE72AD983C2A7BB3C04E70ED7B2ED6F43814A0E048D2F92DD43B131CBED29D79C53C2BB02D488C864A
2,710,484 UART: mbox::rt_entry...
2,710,856 UART: ____ _ _ _ ____ _____
2,711,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,744 UART: |_|
2,715,056 UART:
2,822,199 UART: [rt] Runtime listening for mailbox commands...
2,823,133 >>> mbox cmd response data (0 bytes)
2,823,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,823,245 UART:
2,823,261 UART: Running Caliptra ROM ...
2,823,669 UART:
2,823,811 UART: [state] CFI Enabled
2,826,733 UART: [state] LifecycleState = Unprovisioned
2,827,388 UART: [state] DebugLocked = No
2,827,946 UART: [state] WD Timer not started. Device not locked for debugging
2,829,124 UART: [kat] SHA2-256
3,634,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,638,899 UART: [kat] ++
3,639,051 UART: [kat] sha1
3,643,527 UART: [kat] SHA2-256
3,645,467 UART: [kat] SHA2-384
3,648,334 UART: [kat] SHA2-512-ACC
3,650,234 UART: [kat] ECC-384
3,660,121 UART: [kat] HMAC-384Kdf
3,664,905 UART: [kat] LMS
3,913,233 UART: [kat] --
3,913,907 UART: [update-reset] ++
5,227,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,228,478 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,378,302 >>> mbox cmd response: success
5,378,529 UART: [update-reset] Copying MAN_2 To MAN_1
5,386,543 UART: [update-reset Success] --
5,387,260 UART: [state] Locking Datavault
5,387,932 UART: [state] Locking PCR0, PCR1 and PCR31
5,388,536 UART: [state] Locking ICCM
5,389,146 UART: [exit] Launching FMC @ 0x40000130
5,394,475 UART:
5,394,491 UART: Running Caliptra FMC ...
5,394,899 UART:
5,395,042 UART: [state] CFI Enabled
5,484,263 UART: [art] Extend RT PCRs Done
5,484,691 UART: [art] Lock RT PCRs Done
5,486,030 UART: [art] Populate DV Done
5,494,163 UART: [fht] FMC Alias Private Key: 7
5,495,257 UART: [art] Derive CDI
5,495,537 UART: [art] Store in in slot 0x4
5,581,196 UART: [art] Derive Key Pair
5,581,556 UART: [art] Store priv key in slot 0x5
5,594,888 UART: [art] Derive Key Pair - Done
5,609,639 UART: [art] Signing Cert with AUTHO
5,610,119 UART: RITY.KEYID = 7
5,625,549 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,314 UART: [art] PUB.X = 78129FB9952A2238E2C321AA635BD63CE0DF9C5909660CC9C9B085642B0F46DDE73C67CD6F998E83D4F647105F5937A6
5,633,077 UART: [art] PUB.Y = F0548DDA857B8C8672CCFBCCE75A44A8E8EE5286FDBA5DFE4BB0926AC5BC201DDFB941985383E6CA8E31083A5959269C
5,640,044 UART: [art] SIG.R = 5ECE2ACAF8B4534F2AB21373FB51A84C9B88898EE57F05EE9034A58067C18CFAC10EBA69D3751BA58556EABE50C84741
5,646,822 UART: [art] SIG.S = 86FFC8011EDD46583E15E89E64C2E50BB7FA5F29AE40571E7B28E8762A5C667E292F461CF6D490547F66BB6C1A38D465
5,670,217 UART: Caliptra RT
5,670,562 UART: [state] CFI Enabled
5,953,954 UART: [rt] RT failed reset flow
5,954,385 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 ready_for_fw is high
1,060,052 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,589 >>> mbox cmd response: success
2,165,589 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,227,579 UART:
2,227,595 UART: Running Caliptra FMC ...
2,228,003 UART:
2,228,146 UART: [state] CFI Enabled
2,238,435 UART: [fht] FMC Alias Private Key: 7
2,346,616 UART: [art] Extend RT PCRs Done
2,347,044 UART: [art] Lock RT PCRs Done
2,348,632 UART: [art] Populate DV Done
2,356,703 UART: [fht] FMC Alias Private Key: 7
2,357,877 UART: [art] Derive CDI
2,358,157 UART: [art] Store in in slot 0x4
2,443,982 UART: [art] Derive Key Pair
2,444,342 UART: [art] Store priv key in slot 0x5
2,457,226 UART: [art] Derive Key Pair - Done
2,471,794 UART: [art] Signing Cert with AUTHO
2,472,274 UART: RITY.KEYID = 7
2,487,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,121 UART: [art] PUB.X = 2DC613AA538D3E3EBEFE6147C337F9DC64B9FF25A5040AE99D52FB34AF145109B61236FE009E20D3B1A6787AD4813C96
2,494,870 UART: [art] PUB.Y = D88D619A4FDB1EC8F02162B5C2E0011EEBD3A2C182CA51CA7CD611D4F8C77BEAB8886157540E9FCCF28C1F0EF0ECFEA4
2,501,839 UART: [art] SIG.R = 26CD0DCA648145248117BE357C91ACC7D1038DEDE2E61D1D4C30A32203188F5F6A889CD929033813DE99B25277E0E2D7
2,508,599 UART: [art] SIG.S = 2B7C40FB5275AE4C7E93CC9B88206129766AEFDFC28929D184FDCC8DA5CE4B67BD625461D6EBD1924E3EF7E614332C6A
2,531,764 UART: mbox::rt_entry...
2,532,136 UART: ____ _ _ _ ____ _____
2,532,920 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,720 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,488 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,256 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,024 UART: |_|
2,536,336 UART:
2,642,868 UART: [rt] Runtime listening for mailbox commands...
2,643,802 >>> mbox cmd response data (0 bytes)
2,643,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,842 >>> mbox cmd response: success
5,096,494 UART:
5,096,510 UART: Running Caliptra FMC ...
5,096,918 UART:
5,097,061 UART: [state] CFI Enabled
5,185,904 UART: [art] Extend RT PCRs Done
5,186,332 UART: [art] Lock RT PCRs Done
5,187,671 UART: [art] Populate DV Done
5,196,094 UART: [fht] FMC Alias Private Key: 7
5,197,166 UART: [art] Derive CDI
5,197,446 UART: [art] Store in in slot 0x4
5,282,939 UART: [art] Derive Key Pair
5,283,299 UART: [art] Store priv key in slot 0x5
5,297,097 UART: [art] Derive Key Pair - Done
5,311,716 UART: [art] Signing Cert with AUTHO
5,312,196 UART: RITY.KEYID = 7
5,327,562 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,327 UART: [art] PUB.X = 707B40EF91883AC0406C09113447CAFB1835792EE080969340F2A283F6645A9F548B50D87AD5E4F6C156400B586AEC37
5,335,085 UART: [art] PUB.Y = EABD7DB17BB6437E0C447C1D1608A703BE4FD394332EB7B8A3C689204C17D981F6A00EE88BCDF524BFF22EFCA3BD9815
5,342,043 UART: [art] SIG.R = 6A8EC1916EABCB6EB8936E303F73C63EC5EE9665BE376E9D4FE078EAB27AF4B00C2F5F67AE28060DAE96CBF46501FF47
5,348,823 UART: [art] SIG.S = 9FA5C85A3C187AA0025863845AD8CECB0DEC05CAB7ED23BF03BEA58894FEC4711EFDA784A14683C5EC7E9F50ED69C4C7
5,372,470 UART: Caliptra RT
5,372,815 UART: [state] CFI Enabled
5,654,671 UART: [rt] RT failed reset flow
5,655,102 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
903,916 UART: [kat] SHA2-512-ACC
905,817 UART: [kat] ECC-384
915,408 UART: [kat] HMAC-384Kdf
919,884 UART: [kat] LMS
1,168,196 UART: [kat] --
1,169,105 UART: [cold-reset] ++
1,169,641 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,173,643 ready_for_fw is high
1,173,643 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,265 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,206,811 UART: [idev] --
1,207,982 UART: [ldev] ++
1,208,150 UART: [ldev] CDI.KEYID = 6
1,208,514 UART: [ldev] SUBJECT.KEYID = 5
1,208,941 UART: [ldev] AUTHORITY.KEYID = 7
1,209,404 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,098 UART: [ldev] --
1,280,448 UART: [fwproc] Wait for Commands...
1,281,243 UART: [fwproc] Recv command 0x46574c44
1,281,976 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,285 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,671 >>> mbox cmd response: success
2,310,671 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,311,786 UART: [afmc] ++
2,311,954 UART: [afmc] CDI.KEYID = 6
2,312,317 UART: [afmc] SUBJECT.KEYID = 7
2,312,743 UART: [afmc] AUTHORITY.KEYID = 5
2,348,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,209 UART: [afmc] --
2,392,187 UART: [cold-reset] --
2,393,047 UART: [state] Locking Datavault
2,394,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,010 UART: [state] Locking ICCM
2,395,608 UART: [exit] Launching FMC @ 0x40000130
2,400,937 UART:
2,400,953 UART: Running Caliptra FMC ...
2,401,361 UART:
2,401,415 UART: [state] CFI Enabled
2,411,896 UART: [fht] FMC Alias Private Key: 7
2,519,545 UART: [art] Extend RT PCRs Done
2,519,973 UART: [art] Lock RT PCRs Done
2,521,773 UART: [art] Populate DV Done
2,529,708 UART: [fht] FMC Alias Private Key: 7
2,530,834 UART: [art] Derive CDI
2,531,114 UART: [art] Store in in slot 0x4
2,617,083 UART: [art] Derive Key Pair
2,617,443 UART: [art] Store priv key in slot 0x5
2,631,353 UART: [art] Derive Key Pair - Done
2,646,081 UART: [art] Signing Cert with AUTHO
2,646,561 UART: RITY.KEYID = 7
2,661,401 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,166 UART: [art] PUB.X = 623DDBA7E894B1E9E328DEC7C6B300DBABCA4DF65A1A5323255701D8296296930B30A21C533AC5C3302A7F09BDBDE617
2,668,917 UART: [art] PUB.Y = FB40CC5EA417EBAB5A7C9AB67EFFC3EE05E9F08241DB239725A10D1657FE7A70B3CAD4BE7988C4254F29F8524B253BE9
2,675,881 UART: [art] SIG.R = E64A6D5F8893CF5C0DDB878235D746F24D929DF54B7D5AB71FB3E32EFE976EEA4A48FDE8C2A96CB8C7D4810D7E1857CA
2,682,667 UART: [art] SIG.S = FA28C33EE43B3D4981EB2A3D50234E74B9CB53044924D92B8F84A6775F588C6AE22639C7488676CA2A065B324D03D0D7
2,706,261 UART: mbox::rt_entry...
2,706,633 UART: ____ _ _ _ ____ _____
2,707,417 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,217 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,985 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,753 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,521 UART: |_|
2,710,833 UART:
2,816,838 UART: [rt] Runtime listening for mailbox commands...
2,817,772 >>> mbox cmd response data (0 bytes)
2,817,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,817,884 UART:
2,817,900 UART: Running Caliptra ROM ...
2,818,308 UART:
2,818,363 UART: [state] CFI Enabled
2,821,011 UART: [state] LifecycleState = Unprovisioned
2,821,666 UART: [state] DebugLocked = No
2,822,320 UART: [state] WD Timer not started. Device not locked for debugging
2,823,620 UART: [kat] SHA2-256
3,627,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,299 UART: [kat] ++
3,631,451 UART: [kat] sha1
3,635,629 UART: [kat] SHA2-256
3,637,569 UART: [kat] SHA2-384
3,640,352 UART: [kat] SHA2-512-ACC
3,642,252 UART: [kat] ECC-384
3,651,645 UART: [kat] HMAC-384Kdf
3,656,275 UART: [kat] LMS
3,904,587 UART: [kat] --
3,905,443 UART: [update-reset] ++
5,217,466 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,218,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,368,389 >>> mbox cmd response: success
5,368,564 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,578 UART: [update-reset Success] --
5,377,579 UART: [state] Locking Datavault
5,378,423 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,027 UART: [state] Locking ICCM
5,379,619 UART: [exit] Launching FMC @ 0x40000130
5,384,948 UART:
5,384,964 UART: Running Caliptra FMC ...
5,385,372 UART:
5,385,426 UART: [state] CFI Enabled
5,475,023 UART: [art] Extend RT PCRs Done
5,475,451 UART: [art] Lock RT PCRs Done
5,476,804 UART: [art] Populate DV Done
5,484,973 UART: [fht] FMC Alias Private Key: 7
5,486,079 UART: [art] Derive CDI
5,486,359 UART: [art] Store in in slot 0x4
5,571,938 UART: [art] Derive Key Pair
5,572,298 UART: [art] Store priv key in slot 0x5
5,585,678 UART: [art] Derive Key Pair - Done
5,600,193 UART: [art] Signing Cert with AUTHO
5,600,673 UART: RITY.KEYID = 7
5,615,963 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,728 UART: [art] PUB.X = CE593A439700F0E8DAFB0BCF63D5F082F3F853036F96200818CDAE5AB68353D0F6219DEB8CC4364F162F8B9AF7201F7D
5,623,479 UART: [art] PUB.Y = 6E17682A08538C7C38B748B8A43BAD268C47BA062190EAB7AB7691056D99D18028BA6D5E7E8B749DC4748BF724D2288E
5,630,422 UART: [art] SIG.R = DEE7B80985957A560E7E01A5FEBA3CF833FC8F1AADE9F7A228695C7A97A593BD3AD7F5EA73573A13CB8041C0E7F43A20
5,637,201 UART: [art] SIG.S = B5254FE796970A2D4E1F5B958C2AB462AF670296A0120FCD7BDA4CABF5068F03655AB0F4871E3C2154CA310859979314
5,660,594 UART: Caliptra RT
5,660,847 UART: [state] CFI Enabled
5,939,030 UART: [rt] RT failed reset flow
5,939,461 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,386 ready_for_fw is high
1,055,386 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,085 >>> mbox cmd response: success
2,161,085 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,222,857 UART:
2,222,873 UART: Running Caliptra FMC ...
2,223,281 UART:
2,223,335 UART: [state] CFI Enabled
2,233,586 UART: [fht] FMC Alias Private Key: 7
2,342,291 UART: [art] Extend RT PCRs Done
2,342,719 UART: [art] Lock RT PCRs Done
2,344,539 UART: [art] Populate DV Done
2,352,642 UART: [fht] FMC Alias Private Key: 7
2,353,700 UART: [art] Derive CDI
2,353,980 UART: [art] Store in in slot 0x4
2,439,573 UART: [art] Derive Key Pair
2,439,933 UART: [art] Store priv key in slot 0x5
2,453,487 UART: [art] Derive Key Pair - Done
2,468,505 UART: [art] Signing Cert with AUTHO
2,468,985 UART: RITY.KEYID = 7
2,484,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,196 UART: [art] PUB.X = FF8AB58557C9B85A25170C3A1EB1FD5CDBACF27BBB69DFFA7829711B11FBE6924C323778D5BD869CC3FA09FB88D91AFF
2,491,986 UART: [art] PUB.Y = C053243FCD3EC86D456599618A354401ECED35AE401D68B87807A13D5E4DB2C1C6188984EFBB5A131008AC505A7E1A7E
2,498,933 UART: [art] SIG.R = 6038FE154BC9241C8795C46CAFFE843727F9A3964D7D9828F12E1CDFDB59289D6087D9F802D7CB316B4165706678F59A
2,505,700 UART: [art] SIG.S = 15A614D5AF1D50CA09F1B29B8C36092253D344425C3E95C47D6ACA8286698D805D0357F0175E079C0E01B34C64C2D708
2,528,910 UART: mbox::rt_entry...
2,529,282 UART: ____ _ _ _ ____ _____
2,530,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,170 UART: |_|
2,533,482 UART:
2,639,408 UART: [rt] Runtime listening for mailbox commands...
2,640,342 >>> mbox cmd response data (0 bytes)
2,640,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,073,060 >>> mbox cmd response: success
5,086,464 UART:
5,086,480 UART: Running Caliptra FMC ...
5,086,888 UART:
5,086,942 UART: [state] CFI Enabled
5,175,353 UART: [art] Extend RT PCRs Done
5,175,781 UART: [art] Lock RT PCRs Done
5,177,030 UART: [art] Populate DV Done
5,185,247 UART: [fht] FMC Alias Private Key: 7
5,186,209 UART: [art] Derive CDI
5,186,489 UART: [art] Store in in slot 0x4
5,272,500 UART: [art] Derive Key Pair
5,272,860 UART: [art] Store priv key in slot 0x5
5,285,812 UART: [art] Derive Key Pair - Done
5,300,840 UART: [art] Signing Cert with AUTHO
5,301,320 UART: RITY.KEYID = 7
5,316,676 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,441 UART: [art] PUB.X = EE2D4F25C412F88B4900D234393474B5F888C3F3B283E0B83386422B2397F220DA26F7607B4AE44A3A666D6A69DF9F6D
5,324,189 UART: [art] PUB.Y = 7E56387386428BB5356C32367F2807DA98AFC26624775FC1AB9F83CEDFEAA207336F1543C3E7DB32CD9AE493A28F3930
5,331,137 UART: [art] SIG.R = 6E53BA017CBBC46694870CEC47BACFBA3C68B81111B97B484BBA6F0D623B1CFF6B0BEB808B5DF25DDB6B73A1025888FA
5,337,916 UART: [art] SIG.S = 57448C77FECC54C377B883073A8D29F4B2F9ABCE39CA4C71298F44102B578EF094400C3093BF4ECD16FCB5AB961372D5
5,362,171 UART: Caliptra RT
5,362,424 UART: [state] CFI Enabled
5,642,114 UART: [rt] RT failed reset flow
5,642,545 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,174,830 ready_for_fw is high
1,174,830 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,673 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,330 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,784 >>> mbox cmd response: success
2,312,784 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,993 UART: [afmc] ++
2,314,161 UART: [afmc] CDI.KEYID = 6
2,314,524 UART: [afmc] SUBJECT.KEYID = 7
2,314,950 UART: [afmc] AUTHORITY.KEYID = 5
2,350,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,610 UART: [afmc] --
2,393,570 UART: [cold-reset] --
2,394,498 UART: [state] Locking Datavault
2,395,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,989 UART: [state] Locking ICCM
2,396,511 UART: [exit] Launching FMC @ 0x40000130
2,401,840 UART:
2,401,856 UART: Running Caliptra FMC ...
2,402,264 UART:
2,402,407 UART: [state] CFI Enabled
2,413,556 UART: [fht] FMC Alias Private Key: 7
2,521,075 UART: [art] Extend RT PCRs Done
2,521,503 UART: [art] Lock RT PCRs Done
2,523,259 UART: [art] Populate DV Done
2,531,824 UART: [fht] FMC Alias Private Key: 7
2,532,804 UART: [art] Derive CDI
2,533,084 UART: [art] Store in in slot 0x4
2,619,233 UART: [art] Derive Key Pair
2,619,593 UART: [art] Store priv key in slot 0x5
2,632,743 UART: [art] Derive Key Pair - Done
2,647,570 UART: [art] Signing Cert with AUTHO
2,648,050 UART: RITY.KEYID = 7
2,663,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,451 UART: [art] PUB.X = BD91FD003C619D595BA83C48B514B1BBA7508CBEBF756EB3F796897EBC6E57BB3A8A3729BEE26AC39C20DF7621C31BAC
2,671,221 UART: [art] PUB.Y = DCF4E08D3D951776BE86C98FBDD6886A0C532679E325132CC5F84D58F457F94098E9C4965A5794F4CA2D4575F781408A
2,678,168 UART: [art] SIG.R = 736D352BFCDA4EE5A04B95023B2029E7409445A9808429350F7F30AD00A1E3E140607861303B16AE173BC1A17FE7E9EB
2,684,910 UART: [art] SIG.S = D6990DE97B3CC6E477F4E33205C4E2C129B417DB2F5D0A5A747CD3B5FD3F097B1FE417FB466A4479ECE5953461755A68
2,708,545 UART: mbox::rt_entry...
2,708,917 UART: ____ _ _ _ ____ _____
2,709,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,805 UART: |_|
2,713,117 UART:
2,819,871 UART: [rt] Runtime listening for mailbox commands...
2,820,805 >>> mbox cmd response data (0 bytes)
2,820,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,820,917 UART:
2,820,933 UART: Running Caliptra ROM ...
2,821,341 UART:
2,821,483 UART: [state] CFI Enabled
2,824,447 UART: [state] LifecycleState = Unprovisioned
2,825,102 UART: [state] DebugLocked = No
2,825,682 UART: [state] WD Timer not started. Device not locked for debugging
2,826,986 UART: [kat] SHA2-256
3,630,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,665 UART: [kat] ++
3,634,817 UART: [kat] sha1
3,639,151 UART: [kat] SHA2-256
3,641,091 UART: [kat] SHA2-384
3,643,910 UART: [kat] SHA2-512-ACC
3,645,810 UART: [kat] ECC-384
3,655,229 UART: [kat] HMAC-384Kdf
3,659,743 UART: [kat] LMS
3,908,055 UART: [kat] --
3,908,859 UART: [update-reset] ++
5,220,826 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,913 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,737 >>> mbox cmd response: success
5,371,924 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,938 UART: [update-reset Success] --
5,380,769 UART: [state] Locking Datavault
5,381,353 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,957 UART: [state] Locking ICCM
5,382,547 UART: [exit] Launching FMC @ 0x40000130
5,387,876 UART:
5,387,892 UART: Running Caliptra FMC ...
5,388,300 UART:
5,388,443 UART: [state] CFI Enabled
5,478,230 UART: [art] Extend RT PCRs Done
5,478,658 UART: [art] Lock RT PCRs Done
5,479,881 UART: [art] Populate DV Done
5,488,078 UART: [fht] FMC Alias Private Key: 7
5,489,098 UART: [art] Derive CDI
5,489,378 UART: [art] Store in in slot 0x4
5,575,071 UART: [art] Derive Key Pair
5,575,431 UART: [art] Store priv key in slot 0x5
5,588,785 UART: [art] Derive Key Pair - Done
5,603,425 UART: [art] Signing Cert with AUTHO
5,603,905 UART: RITY.KEYID = 7
5,619,239 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,004 UART: [art] PUB.X = 542BDACD35CF4A2332817AB629E51772EF7121B2CA6FC19FA134F57876AFE7F5D6E061F65042541D90DDF2417F61BAA1
5,626,784 UART: [art] PUB.Y = AB4E42292E1F36EF8B158CB061558A515839662C325093FF4EBFD50CF11841C1C73E3CBD6A8331886BF38ABAFF689833
5,633,737 UART: [art] SIG.R = 007AB79B794FC86D46DFF6DD1ADF3E517EC46BDDDB7C943C95D69C2A8D4E774F6BE36AD85E415FBCB619168F532D313F
5,640,507 UART: [art] SIG.S = 8684B262159B230257DCB68B9E84A804C1E04F12519B0BBBDAB0E7D1238AD722152777231460E0EFB96EBE7F9D32F937
5,664,131 UART: Caliptra RT
5,664,476 UART: [state] CFI Enabled
5,944,923 UART: [rt] RT failed reset flow
5,945,354 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,671 ready_for_fw is high
1,056,671 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,093 >>> mbox cmd response: success
2,162,093 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,223,763 UART:
2,223,779 UART: Running Caliptra FMC ...
2,224,187 UART:
2,224,330 UART: [state] CFI Enabled
2,234,785 UART: [fht] FMC Alias Private Key: 7
2,343,572 UART: [art] Extend RT PCRs Done
2,344,000 UART: [art] Lock RT PCRs Done
2,345,448 UART: [art] Populate DV Done
2,353,559 UART: [fht] FMC Alias Private Key: 7
2,354,711 UART: [art] Derive CDI
2,354,991 UART: [art] Store in in slot 0x4
2,440,364 UART: [art] Derive Key Pair
2,440,724 UART: [art] Store priv key in slot 0x5
2,454,194 UART: [art] Derive Key Pair - Done
2,468,766 UART: [art] Signing Cert with AUTHO
2,469,246 UART: RITY.KEYID = 7
2,484,584 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,349 UART: [art] PUB.X = FDC7B2B755DA17F847BE039B514645C22CFA6157CB653683F79853AFC2321B4494F0AA737FAA17C668525DB9DE78FC63
2,492,124 UART: [art] PUB.Y = B86AA78AF85B1128C6CB1156376B19AB82CB977CDB8811FE83B38340167D3DFD39A7A94C1D6887FE1D2A5E4A01BD80E4
2,499,083 UART: [art] SIG.R = 9ACA879ECEBAB0FAD2413AD133BF6405F921E8A8A0028DEE72DD16E23AC57CF4EC64EAB982F4C56FCB4401DB2B2A83BD
2,505,874 UART: [art] SIG.S = 16BE7CCDBF0424285720F4B0E60E71E7BE2425128165FA29D8959993C606AE18DFDF489A5EDE278A3A3EC8AE22BC52E9
2,529,420 UART: mbox::rt_entry...
2,529,792 UART: ____ _ _ _ ____ _____
2,530,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,376 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,144 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,912 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,680 UART: |_|
2,533,992 UART:
2,639,606 UART: [rt] Runtime listening for mailbox commands...
2,640,540 >>> mbox cmd response data (0 bytes)
2,640,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,073,453 >>> mbox cmd response: success
5,086,803 UART:
5,086,819 UART: Running Caliptra FMC ...
5,087,227 UART:
5,087,370 UART: [state] CFI Enabled
5,176,661 UART: [art] Extend RT PCRs Done
5,177,089 UART: [art] Lock RT PCRs Done
5,178,304 UART: [art] Populate DV Done
5,186,675 UART: [fht] FMC Alias Private Key: 7
5,187,635 UART: [art] Derive CDI
5,187,915 UART: [art] Store in in slot 0x4
5,273,736 UART: [art] Derive Key Pair
5,274,096 UART: [art] Store priv key in slot 0x5
5,287,402 UART: [art] Derive Key Pair - Done
5,301,768 UART: [art] Signing Cert with AUTHO
5,302,248 UART: RITY.KEYID = 7
5,317,550 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,315 UART: [art] PUB.X = F6BF2783F8A8D481617FC1C776FD2D046B75441B4228775BAF9C98024A4CB07A22852984CC6D984E1E2DE3AC0E43AEE0
5,325,084 UART: [art] PUB.Y = 96899868D558475B7A601E036B3E4AED8129A46FE1D4FFC9F20D3C62B6C320519F4AC2BCD187BB11A7B06A27799F89D1
5,332,034 UART: [art] SIG.R = 4AA3865FD59C85DAB02D4E464C71B6080557730828DAFAD6CD81209790DAE316FF093FE106E67DCEBDC442B8087A100D
5,338,793 UART: [art] SIG.S = 7156A20F586B7464F3D72B482F0C122EC93AF5A4CBE3FEC1C7073EBEC8C69D5D43796C9AD95571D5980CEA1E1411A912
5,362,634 UART: Caliptra RT
5,362,979 UART: [state] CFI Enabled
5,646,245 UART: [rt] RT failed reset flow
5,646,676 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,077 UART: [kat] SHA2-256
882,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,123 UART: [kat] ++
886,275 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,506 UART: [kat] LMS
1,475,702 UART: [kat] --
1,476,607 UART: [cold-reset] ++
1,476,949 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,946 UART: [idev] Erasing UDS.KEYID = 0
1,505,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,202 UART: [idev] --
1,515,223 UART: [ldev] ++
1,515,391 UART: [ldev] CDI.KEYID = 6
1,515,754 UART: [ldev] SUBJECT.KEYID = 5
1,516,180 UART: [ldev] AUTHORITY.KEYID = 7
1,516,643 UART: [ldev] FE.KEYID = 1
1,522,027 UART: [ldev] Erasing FE.KEYID = 1
1,547,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,894 UART: [ldev] --
1,586,389 UART: [fwproc] Waiting for Commands...
1,587,208 UART: [fwproc] Received command 0x46574c44
1,587,999 UART: [fwproc] Received Image of size 78704 bytes
2,479,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,404 >>> mbox cmd response: success
2,618,404 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,619,428 UART: [afmc] ++
2,619,596 UART: [afmc] CDI.KEYID = 6
2,619,958 UART: [afmc] SUBJECT.KEYID = 7
2,620,383 UART: [afmc] AUTHORITY.KEYID = 5
2,655,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,863 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,553 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,290 UART: [afmc] --
2,698,270 UART: [cold-reset] --
2,699,172 UART: [state] Locking Datavault
2,700,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,835 UART: [state] Locking ICCM
2,701,439 UART: [exit] Launching FMC @ 0x40000130
2,706,768 UART:
2,706,784 UART: Running Caliptra FMC ...
2,707,192 UART:
2,707,246 UART: [state] CFI Enabled
2,717,533 UART: [fht] FMC Alias Private Key: 7
2,825,456 UART: [art] Extend RT PCRs Done
2,825,884 UART: [art] Lock RT PCRs Done
2,827,272 UART: [art] Populate DV Done
2,835,455 UART: [fht] FMC Alias Private Key: 7
2,836,489 UART: [art] Derive CDI
2,836,769 UART: [art] Store in in slot 0x4
2,922,736 UART: [art] Derive Key Pair
2,923,096 UART: [art] Store priv key in slot 0x5
2,936,558 UART: [art] Derive Key Pair - Done
2,951,190 UART: [art] Signing Cert with AUTHO
2,951,670 UART: RITY.KEYID = 7
2,967,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,849 UART: [art] PUB.X = 2104457A41FEDA9BECB36D468875A50421DB0584C29C2EDA307ED55389814DAB0EF3A2AC758C7B4566748C66284D0511
2,974,606 UART: [art] PUB.Y = 772EBD41323ED361FBD8A9344340FEC133B6EC928B1A424B447DB94F48C1F7268C2E9666744A00F6D06FB797419AB71D
2,981,538 UART: [art] SIG.R = 33C1530655A75ACB6ADC3599413AA5906A483E640A64BB62FF181358731FAA7B7079D6FA10951B5486B0EA90A2ECD9EF
2,988,308 UART: [art] SIG.S = E202045A95E071AE41ED1BF223D8ABD3A53F565C125EB8B761660EE306AFFE56B23A0EDD05E669CD0964A6C256C9B5C7
3,011,906 UART: mbox::rt_entry...
3,012,278 UART: ____ _ _ _ ____ _____
3,013,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,166 UART: |_|
3,016,478 UART:
3,123,756 UART: [rt] Runtime listening for mailbox commands...
3,124,907 >>> mbox cmd response data (0 bytes)
3,124,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,125,023 UART:
3,125,039 UART: Running Caliptra ROM ...
3,125,447 UART:
3,125,501 UART: [state] CFI Enabled
3,128,055 UART: [state] LifecycleState = Unprovisioned
3,128,710 UART: [state] DebugLocked = No
3,129,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,131,103 UART: [kat] SHA2-256
3,925,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,929,149 UART: [kat] ++
3,929,301 UART: [kat] sha1
3,933,553 UART: [kat] SHA2-256
3,935,491 UART: [kat] SHA2-384
3,938,330 UART: [kat] SHA2-512-ACC
3,940,230 UART: [kat] ECC-384
3,945,743 UART: [kat] HMAC-384Kdf
3,950,465 UART: [kat] LMS
4,518,661 UART: [kat] --
4,519,724 UART: [update-reset] ++
5,854,496 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,855,714 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,005,590 >>> mbox cmd response: success
6,005,783 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,797 UART: [update-reset Success] --
6,015,034 UART: [state] Locking Datavault
6,015,970 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,574 UART: [state] Locking ICCM
6,017,026 UART: [exit] Launching FMC @ 0x40000130
6,022,355 UART:
6,022,371 UART: Running Caliptra FMC ...
6,022,779 UART:
6,022,833 UART: [state] CFI Enabled
6,112,424 UART: [art] Extend RT PCRs Done
6,112,852 UART: [art] Lock RT PCRs Done
6,113,925 UART: [art] Populate DV Done
6,122,014 UART: [fht] FMC Alias Private Key: 7
6,123,192 UART: [art] Derive CDI
6,123,472 UART: [art] Store in in slot 0x4
6,208,933 UART: [art] Derive Key Pair
6,209,293 UART: [art] Store priv key in slot 0x5
6,222,697 UART: [art] Derive Key Pair - Done
6,237,881 UART: [art] Signing Cert with AUTHO
6,238,361 UART: RITY.KEYID = 7
6,253,573 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,338 UART: [art] PUB.X = 7D13FA8EAD58BDBFB07C3C4EAB32BD5E08289D318EE0E117B0ED1440E9190E5A9899C66F6C9BB6C6ADA65846B0F09BC9
6,261,124 UART: [art] PUB.Y = 803BB1E3510D3F6C2C0A03BDCA58CFE8BC68EF1DD1ABC19F6797A43B147AD5C62E2AD5045C69F849910A9D3F7C4DABA2
6,268,083 UART: [art] SIG.R = 6B2BDA90F58DDE1DCCBC398A8CB289AC6315AB22D7760E4438F966CB9582C6763FBBDCAAA107B4545024EC0A58BDB90C
6,274,863 UART: [art] SIG.S = E0B22F7CD4D9F02ED94996E6E4F7D061645D1CA72B2F49869F05ACFDE1CD7E0732709057DA1C1642403937EC9832EC42
6,298,364 UART: Caliptra RT
6,298,617 UART: [state] CFI Enabled
6,581,379 UART: [rt] RT failed reset flow
6,581,810 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,959 ready_for_fw is high
1,362,959 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,753 >>> mbox cmd response: success
2,465,753 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,527,459 UART:
2,527,475 UART: Running Caliptra FMC ...
2,527,883 UART:
2,527,937 UART: [state] CFI Enabled
2,538,570 UART: [fht] FMC Alias Private Key: 7
2,646,259 UART: [art] Extend RT PCRs Done
2,646,687 UART: [art] Lock RT PCRs Done
2,648,483 UART: [art] Populate DV Done
2,656,590 UART: [fht] FMC Alias Private Key: 7
2,657,532 UART: [art] Derive CDI
2,657,812 UART: [art] Store in in slot 0x4
2,743,589 UART: [art] Derive Key Pair
2,743,949 UART: [art] Store priv key in slot 0x5
2,757,191 UART: [art] Derive Key Pair - Done
2,772,026 UART: [art] Signing Cert with AUTHO
2,772,506 UART: RITY.KEYID = 7
2,787,922 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,687 UART: [art] PUB.X = EC28FAE0EE7D9F85975338482D636637B09BBB9AE58821CF101445FF020617575296318A62781A6344DB26115602884B
2,795,436 UART: [art] PUB.Y = FF6E7C2653CA7101B0666B3C22188BB397DB8A74F2D4B3C3797C69D4DB2575C70AFB36CD0731915066DDE00BAC44BD97
2,802,384 UART: [art] SIG.R = DAC1E194B3B13BE1F930E503B1A80B476B1838B8E65CBA3F081F42178B448686FC377D223D5E2141AA709E86E1C3431C
2,809,149 UART: [art] SIG.S = 42DECF6F263E743872BE950753ABC14B7C6EDEF320DDAF97EDC4412699D73810E21A4442D5A50177915E45E03384B904
2,832,237 UART: mbox::rt_entry...
2,832,609 UART: ____ _ _ _ ____ _____
2,833,393 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,193 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,961 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,729 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,497 UART: |_|
2,836,809 UART:
2,944,293 UART: [rt] Runtime listening for mailbox commands...
2,945,444 >>> mbox cmd response data (0 bytes)
2,945,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,707,113 >>> mbox cmd response: success
5,720,428 UART:
5,720,444 UART: Running Caliptra FMC ...
5,720,852 UART:
5,720,906 UART: [state] CFI Enabled
5,809,905 UART: [art] Extend RT PCRs Done
5,810,333 UART: [art] Lock RT PCRs Done
5,811,782 UART: [art] Populate DV Done
5,820,047 UART: [fht] FMC Alias Private Key: 7
5,821,095 UART: [art] Derive CDI
5,821,375 UART: [art] Store in in slot 0x4
5,906,744 UART: [art] Derive Key Pair
5,907,104 UART: [art] Store priv key in slot 0x5
5,920,392 UART: [art] Derive Key Pair - Done
5,935,026 UART: [art] Signing Cert with AUTHO
5,935,506 UART: RITY.KEYID = 7
5,950,596 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,361 UART: [art] PUB.X = 81D0FD8F04842B7627873ECC80F34579D9985AEDDD415076B00FF9B0F2F05B0DCE16132F3C97D3C34AF1B391D25F68C9
5,958,130 UART: [art] PUB.Y = 9317601540F5580E3686CA21FB94DF161B6B029528A42F4AF2D642F01FB0E2304BE330400020968EFD6A77215A97654F
5,965,044 UART: [art] SIG.R = 608EE065C388873985C7257E04AAF0B51014A81F80D6CC7730F7477B5B377764F6E84883E4848884BEDBB67AF63C00CE
5,971,787 UART: [art] SIG.S = 2EAECE8D16108678ED228B00367FDFA18EEA225BDCAC0186D88CCE7BD7C2322B55B3533982DBA740D823FF1D707A4D34
5,995,571 UART: Caliptra RT
5,995,824 UART: [state] CFI Enabled
6,283,017 UART: [rt] RT failed reset flow
6,283,448 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,728 UART: [kat] SHA2-256
882,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,774 UART: [kat] ++
886,926 UART: [kat] sha1
891,090 UART: [kat] SHA2-256
893,028 UART: [kat] SHA2-384
895,895 UART: [kat] SHA2-512-ACC
897,796 UART: [kat] ECC-384
903,901 UART: [kat] HMAC-384Kdf
908,417 UART: [kat] LMS
1,476,613 UART: [kat] --
1,477,714 UART: [cold-reset] ++
1,478,230 UART: [fht] Storing FHT @ 0x50003400
1,480,769 UART: [idev] ++
1,480,937 UART: [idev] CDI.KEYID = 6
1,481,297 UART: [idev] SUBJECT.KEYID = 7
1,481,721 UART: [idev] UDS.KEYID = 0
1,482,066 ready_for_fw is high
1,482,066 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,961 UART: [idev] Erasing UDS.KEYID = 0
1,506,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,099 UART: [idev] --
1,516,142 UART: [ldev] ++
1,516,310 UART: [ldev] CDI.KEYID = 6
1,516,673 UART: [ldev] SUBJECT.KEYID = 5
1,517,099 UART: [ldev] AUTHORITY.KEYID = 7
1,517,562 UART: [ldev] FE.KEYID = 1
1,522,532 UART: [ldev] Erasing FE.KEYID = 1
1,548,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,105 UART: [ldev] --
1,587,412 UART: [fwproc] Waiting for Commands...
1,588,151 UART: [fwproc] Received command 0x46574c44
1,588,942 UART: [fwproc] Received Image of size 78704 bytes
2,479,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,295 >>> mbox cmd response: success
2,617,295 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,618,531 UART: [afmc] ++
2,618,699 UART: [afmc] CDI.KEYID = 6
2,619,061 UART: [afmc] SUBJECT.KEYID = 7
2,619,486 UART: [afmc] AUTHORITY.KEYID = 5
2,655,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,730 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,420 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,303 UART: [afmc] --
2,698,251 UART: [cold-reset] --
2,699,221 UART: [state] Locking Datavault
2,700,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,038 UART: [state] Locking ICCM
2,701,492 UART: [exit] Launching FMC @ 0x40000130
2,706,821 UART:
2,706,837 UART: Running Caliptra FMC ...
2,707,245 UART:
2,707,388 UART: [state] CFI Enabled
2,717,889 UART: [fht] FMC Alias Private Key: 7
2,826,312 UART: [art] Extend RT PCRs Done
2,826,740 UART: [art] Lock RT PCRs Done
2,828,734 UART: [art] Populate DV Done
2,836,871 UART: [fht] FMC Alias Private Key: 7
2,837,973 UART: [art] Derive CDI
2,838,253 UART: [art] Store in in slot 0x4
2,924,006 UART: [art] Derive Key Pair
2,924,366 UART: [art] Store priv key in slot 0x5
2,937,852 UART: [art] Derive Key Pair - Done
2,952,710 UART: [art] Signing Cert with AUTHO
2,953,190 UART: RITY.KEYID = 7
2,968,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,925 UART: [art] PUB.X = 5081EB6CBEF19A6077B65F660335FAF41F1353D639696E3EFABBC030A916CD26D6F460EB54E2E970B87C608BF32C2F64
2,975,702 UART: [art] PUB.Y = 02E3B4D859F9DC559197CE453608C5BD83E216DF13C2542A5031172FE90FEBC31CF4AF522A1F67FF1EF0AF0EDEB6575B
2,982,656 UART: [art] SIG.R = 1037F66061F0ADB0B5CFC23290AABC358233DB5B70C13471C0ED7E2E01A34208B246BD335E932869C3D4B21213C9A73C
2,989,424 UART: [art] SIG.S = D16C24184527658390E1933FACFBDECE291DB3BBACE6C5D72A2C146A9B7D58E405CE365B6D52A103845FD34CD81195D3
3,013,169 UART: mbox::rt_entry...
3,013,541 UART: ____ _ _ _ ____ _____
3,014,325 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,893 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,661 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,429 UART: |_|
3,017,741 UART:
3,125,327 UART: [rt] Runtime listening for mailbox commands...
3,126,478 >>> mbox cmd response data (0 bytes)
3,126,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,126,594 UART:
3,126,610 UART: Running Caliptra ROM ...
3,127,018 UART:
3,127,159 UART: [state] CFI Enabled
3,130,227 UART: [state] LifecycleState = Unprovisioned
3,130,882 UART: [state] DebugLocked = No
3,131,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,132,973 UART: [kat] SHA2-256
3,926,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,931,019 UART: [kat] ++
3,931,171 UART: [kat] sha1
3,935,561 UART: [kat] SHA2-256
3,937,499 UART: [kat] SHA2-384
3,940,358 UART: [kat] SHA2-512-ACC
3,942,258 UART: [kat] ECC-384
3,948,169 UART: [kat] HMAC-384Kdf
3,952,921 UART: [kat] LMS
4,521,117 UART: [kat] --
4,521,940 UART: [update-reset] ++
5,856,092 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,857,346 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,007,222 >>> mbox cmd response: success
6,007,547 UART: [update-reset] Copying MAN_2 To MAN_1
6,015,561 UART: [update-reset Success] --
6,016,508 UART: [state] Locking Datavault
6,017,252 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,856 UART: [state] Locking ICCM
6,018,296 UART: [exit] Launching FMC @ 0x40000130
6,023,625 UART:
6,023,641 UART: Running Caliptra FMC ...
6,024,049 UART:
6,024,192 UART: [state] CFI Enabled
6,113,987 UART: [art] Extend RT PCRs Done
6,114,415 UART: [art] Lock RT PCRs Done
6,115,652 UART: [art] Populate DV Done
6,123,711 UART: [fht] FMC Alias Private Key: 7
6,124,653 UART: [art] Derive CDI
6,124,933 UART: [art] Store in in slot 0x4
6,210,380 UART: [art] Derive Key Pair
6,210,740 UART: [art] Store priv key in slot 0x5
6,224,186 UART: [art] Derive Key Pair - Done
6,238,750 UART: [art] Signing Cert with AUTHO
6,239,230 UART: RITY.KEYID = 7
6,254,148 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,913 UART: [art] PUB.X = CE6B954386862272AA0E48B1C9AF510B354F07058BE9B9BFFBE392664924E54EEA74E921982DC4CC9126E0BA67E4FC54
6,261,679 UART: [art] PUB.Y = 30050F6918DBDD7F7939908C09BCB4069B9B1180C848F2F223DD5B8E088494BCE051D8DC9736F61660CB91AEBA62B959
6,268,618 UART: [art] SIG.R = 920BFC22B1A9D4F1315B38596779F601B997E676D06BE090F20F3E5E960482595956B72311E0CC11B7579F49F5E7034D
6,275,365 UART: [art] SIG.S = 2D3BE5841141E21B30D9598E0DDBD482E71C1C25B2E576E065466F9ED7DF50708119EB53E5AADEC39E1B073894207EBB
6,299,380 UART: Caliptra RT
6,299,725 UART: [state] CFI Enabled
6,580,161 UART: [rt] RT failed reset flow
6,580,592 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,224 ready_for_fw is high
1,363,224 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,547 >>> mbox cmd response: success
2,468,547 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,530,679 UART:
2,530,695 UART: Running Caliptra FMC ...
2,531,103 UART:
2,531,246 UART: [state] CFI Enabled
2,541,885 UART: [fht] FMC Alias Private Key: 7
2,650,400 UART: [art] Extend RT PCRs Done
2,650,828 UART: [art] Lock RT PCRs Done
2,652,314 UART: [art] Populate DV Done
2,660,501 UART: [fht] FMC Alias Private Key: 7
2,661,507 UART: [art] Derive CDI
2,661,787 UART: [art] Store in in slot 0x4
2,747,518 UART: [art] Derive Key Pair
2,747,878 UART: [art] Store priv key in slot 0x5
2,761,100 UART: [art] Derive Key Pair - Done
2,775,639 UART: [art] Signing Cert with AUTHO
2,776,119 UART: RITY.KEYID = 7
2,791,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,236 UART: [art] PUB.X = 5B4E6F72A5C7D43BFEEA56B3683D136C8EC2D4824418EBDE2B0AE8EC2F6134871ACF3803D8DC3568B77B6C5F18C7832C
2,799,016 UART: [art] PUB.Y = 9226B79C7961980CAF7DBD686E067E6F83515F9948C5430C18EF36DF1BEE3C7BBA46FF1EC403777D70089E3B3885AF04
2,805,954 UART: [art] SIG.R = F7572E6DD00C323BA9CE2170123C17ECE14C462745FED163BD03BF552272BD7F87D84945CD84F464DBE24E3C414895EC
2,812,726 UART: [art] SIG.S = 5C5D7A86DD9A196118E1F18FBCBC6A3B8ECFA14733C8A74368D4C8DA8BAF634F9818F7ECEF0FE64BF88AFEE9350D1A95
2,836,505 UART: mbox::rt_entry...
2,836,877 UART: ____ _ _ _ ____ _____
2,837,661 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,461 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,229 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,997 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,765 UART: |_|
2,841,077 UART:
2,947,669 UART: [rt] Runtime listening for mailbox commands...
2,948,820 >>> mbox cmd response data (0 bytes)
2,948,821 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,709,104 >>> mbox cmd response: success
5,722,507 UART:
5,722,523 UART: Running Caliptra FMC ...
5,722,931 UART:
5,723,074 UART: [state] CFI Enabled
5,812,345 UART: [art] Extend RT PCRs Done
5,812,773 UART: [art] Lock RT PCRs Done
5,814,246 UART: [art] Populate DV Done
5,822,591 UART: [fht] FMC Alias Private Key: 7
5,823,581 UART: [art] Derive CDI
5,823,861 UART: [art] Store in in slot 0x4
5,909,682 UART: [art] Derive Key Pair
5,910,042 UART: [art] Store priv key in slot 0x5
5,923,486 UART: [art] Derive Key Pair - Done
5,938,441 UART: [art] Signing Cert with AUTHO
5,938,921 UART: RITY.KEYID = 7
5,954,017 UART: [art] Erasing AUTHORITY.KEYID = 7
5,954,782 UART: [art] PUB.X = 208FD5F88C2605D7E59432D5BEC20B2AC316C87EA9601E4C87ED72C53245C1E3EFCD2D94506BB7355FBEAD8CA325E751
5,961,560 UART: [art] PUB.Y = D2337DA0FCAB34F357979CFA62D68CA1AE5BF4BFB0E5B01E236CF4AF3BFE99853BD1844730B719615AB51D2CC4C3DE47
5,968,532 UART: [art] SIG.R = A4073FE6125E456937C25855BB3588437EA4486BCF7DE99A6DB96EEF7769FA4C7E4FC655268851D1D566F88A36719AC6
5,975,301 UART: [art] SIG.S = 0FF94D9BBB62CCDEA45632C6C53F574AA655AD5253DA4593E2192573F6D4E10D6E6F0D461B4C10BB17E281215605CC31
5,999,012 UART: Caliptra RT
5,999,357 UART: [state] CFI Enabled
6,283,445 UART: [rt] RT failed reset flow
6,283,876 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,500 UART: [kat] SHA2-512-ACC
908,401 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,522 UART: [kat] LMS
1,170,850 UART: [kat] --
1,171,767 UART: [cold-reset] ++
1,172,299 UART: [fht] FHT @ 0x50003400
1,174,916 UART: [idev] ++
1,175,084 UART: [idev] CDI.KEYID = 6
1,175,444 UART: [idev] SUBJECT.KEYID = 7
1,175,868 UART: [idev] UDS.KEYID = 0
1,176,213 ready_for_fw is high
1,176,213 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,823 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,517 UART: [ldev] ++
1,210,685 UART: [ldev] CDI.KEYID = 6
1,211,048 UART: [ldev] SUBJECT.KEYID = 5
1,211,474 UART: [ldev] AUTHORITY.KEYID = 7
1,211,937 UART: [ldev] FE.KEYID = 1
1,216,997 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,054 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,504 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,911 >>> mbox cmd response: success
2,313,911 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,315,005 UART: [afmc] ++
2,315,173 UART: [afmc] CDI.KEYID = 6
2,315,535 UART: [afmc] SUBJECT.KEYID = 7
2,315,960 UART: [afmc] AUTHORITY.KEYID = 5
2,350,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,929 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,448 UART: [afmc] --
2,394,578 UART: [cold-reset] --
2,395,500 UART: [state] Locking Datavault
2,396,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,067 UART: [state] Locking ICCM
2,397,499 UART: [exit] Launching FMC @ 0x40000130
2,402,828 UART:
2,402,844 UART: Running Caliptra FMC ...
2,403,252 UART:
2,403,306 UART: [state] CFI Enabled
2,413,529 UART: [fht] FMC Alias Private Key: 7
2,521,198 UART: [art] Extend RT PCRs Done
2,521,626 UART: [art] Lock RT PCRs Done
2,523,416 UART: [art] Populate DV Done
2,531,607 UART: [fht] FMC Alias Private Key: 7
2,532,627 UART: [art] Derive CDI
2,532,907 UART: [art] Store in in slot 0x4
2,618,280 UART: [art] Derive Key Pair
2,618,640 UART: [art] Store priv key in slot 0x5
2,632,068 UART: [art] Derive Key Pair - Done
2,646,830 UART: [art] Signing Cert with AUTHO
2,647,310 UART: RITY.KEYID = 7
2,662,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,215 UART: [art] PUB.X = 71545B983D0797781C595D8B25EF4F153DF9EA4A53033F7053A838AF607A6AB35B418EE8F834C664AA01B4D5AEC4CBD7
2,669,984 UART: [art] PUB.Y = 1902E2E571C49A37BC7BBC9730856C206DBFAA9BB54CA5C9CD2374EED68EB31A880014107B0F9F2CF23E436C738D259C
2,676,918 UART: [art] SIG.R = 9D54BA1D2D9493E4DE3F1D3E464ADDC67FD81748E76D922956833EF486CF52FFF63F0C565BD8BA86A512641BDEEF8C85
2,683,701 UART: [art] SIG.S = 094940D21FAA767CE4D08858B81DDFD91E31B76B1243F5DF7D7C6A5F5A6A2059D628BC628D584A961CAE2678DE468195
2,707,137 UART: mbox::rt_entry...
2,707,509 UART: ____ _ _ _ ____ _____
2,708,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,397 UART: |_|
2,711,709 UART:
2,818,431 UART: [rt] Runtime listening for mailbox commands...
2,819,582 >>> mbox cmd response data (0 bytes)
2,819,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,819,695 UART:
2,819,711 UART: Running Caliptra ROM ...
2,820,119 UART:
2,820,174 UART: [state] CFI Enabled
2,822,528 UART: [state] LifecycleState = Unprovisioned
2,823,183 UART: [state] DebugLocked = No
2,823,881 UART: [state] WD Timer not started. Device not locked for debugging
2,825,001 UART: [kat] SHA2-256
3,630,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,776 UART: [kat] ++
3,634,928 UART: [kat] sha1
3,639,158 UART: [kat] SHA2-256
3,641,098 UART: [kat] SHA2-384
3,643,989 UART: [kat] SHA2-512-ACC
3,645,889 UART: [kat] ECC-384
3,655,618 UART: [kat] HMAC-384Kdf
3,660,242 UART: [kat] LMS
3,908,570 UART: [kat] --
3,909,316 UART: [update-reset] ++
5,222,704 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,223,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,373,641 >>> mbox cmd response: success
5,373,890 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,904 UART: [update-reset Success] --
5,382,777 UART: [state] Locking Datavault
5,383,587 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,191 UART: [state] Locking ICCM
5,384,853 UART: [exit] Launching FMC @ 0x40000130
5,390,182 UART:
5,390,198 UART: Running Caliptra FMC ...
5,390,606 UART:
5,390,660 UART: [state] CFI Enabled
5,479,759 UART: [art] Extend RT PCRs Done
5,480,187 UART: [art] Lock RT PCRs Done
5,481,600 UART: [art] Populate DV Done
5,489,829 UART: [fht] FMC Alias Private Key: 7
5,490,937 UART: [art] Derive CDI
5,491,217 UART: [art] Store in in slot 0x4
5,576,952 UART: [art] Derive Key Pair
5,577,312 UART: [art] Store priv key in slot 0x5
5,590,526 UART: [art] Derive Key Pair - Done
5,605,042 UART: [art] Signing Cert with AUTHO
5,605,522 UART: RITY.KEYID = 7
5,620,262 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,027 UART: [art] PUB.X = 6DEF55F8A0AB8B0F7CC49E2ED9DC8EA1176EA369BF627865CA2CCCD160511CCE4F83A3DC537E01E68BF3909E5E19BECD
5,627,819 UART: [art] PUB.Y = 4464AC3A1F7EDA233EC9794B27F059E59C52569EBBA06B17F95017A954720C5A5D34F30C29E584654D043A2D8CC72073
5,634,760 UART: [art] SIG.R = F9D0D403350F999DE18967668A29DF5E1CE7F945EE579DA0B5F43F4956E1097B3065C25BFC532E771BB49062583E36C9
5,641,521 UART: [art] SIG.S = 292B5E88AC8B08CB19E57A93D88AFB67646FF9BE467A9D6F50004B29510A795A01EB764D3337229435913EB06E4C48D4
5,665,515 UART: Caliptra RT
5,665,768 UART: [state] CFI Enabled
5,946,888 UART: [rt] RT failed reset flow
5,947,319 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,441 ready_for_fw is high
1,060,441 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,648 >>> mbox cmd response: success
2,164,648 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,227,850 UART:
2,227,866 UART: Running Caliptra FMC ...
2,228,274 UART:
2,228,328 UART: [state] CFI Enabled
2,239,227 UART: [fht] FMC Alias Private Key: 7
2,347,062 UART: [art] Extend RT PCRs Done
2,347,490 UART: [art] Lock RT PCRs Done
2,348,976 UART: [art] Populate DV Done
2,357,239 UART: [fht] FMC Alias Private Key: 7
2,358,359 UART: [art] Derive CDI
2,358,639 UART: [art] Store in in slot 0x4
2,444,104 UART: [art] Derive Key Pair
2,444,464 UART: [art] Store priv key in slot 0x5
2,457,018 UART: [art] Derive Key Pair - Done
2,471,743 UART: [art] Signing Cert with AUTHO
2,472,223 UART: RITY.KEYID = 7
2,487,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,114 UART: [art] PUB.X = BE6B54DFD41D2B199FE710AB098C82C9600CAB52D8EE5F4E05A98F273842A859151D7095225765F82EF2F0D400C539B4
2,494,857 UART: [art] PUB.Y = 2581A42DF5FC339196499E6AAAF29C37C5DC47660AE0142A2E25A0E385F390D649B7EF35DFCC82228AF51A3D2005D3E4
2,501,809 UART: [art] SIG.R = DC9A0B03EC7F7C6B6C6E2D060FFE1CEAF18FD709EDB0FB31DB87E1AC76982F0994E0DBEF746311C4FDFDF6FB50FED268
2,508,595 UART: [art] SIG.S = D4E3B572FEFC45D07276C3C03EFB5EA14B5D85ADEAAFBDFD6D56F8514BD80019E9C0BF522290A182D69356F4AD994375
2,532,202 UART: mbox::rt_entry...
2,532,574 UART: ____ _ _ _ ____ _____
2,533,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,158 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,462 UART: |_|
2,536,774 UART:
2,642,861 UART: [rt] Runtime listening for mailbox commands...
2,644,012 >>> mbox cmd response data (0 bytes)
2,644,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,079,750 >>> mbox cmd response: success
5,093,042 UART:
5,093,058 UART: Running Caliptra FMC ...
5,093,466 UART:
5,093,520 UART: [state] CFI Enabled
5,182,761 UART: [art] Extend RT PCRs Done
5,183,189 UART: [art] Lock RT PCRs Done
5,184,416 UART: [art] Populate DV Done
5,192,503 UART: [fht] FMC Alias Private Key: 7
5,193,605 UART: [art] Derive CDI
5,193,885 UART: [art] Store in in slot 0x4
5,279,606 UART: [art] Derive Key Pair
5,279,966 UART: [art] Store priv key in slot 0x5
5,292,996 UART: [art] Derive Key Pair - Done
5,307,419 UART: [art] Signing Cert with AUTHO
5,307,899 UART: RITY.KEYID = 7
5,322,823 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,588 UART: [art] PUB.X = D0DE21907349F4491749773CECF68E331DD580F627C0CEF33B71AFCB32772DCF8BA74AE8F5B415856AAC2953A83878F3
5,330,366 UART: [art] PUB.Y = B9C31E34E99BFBBF3ED11091A9872BA67F2B205AF5CD7331992341E18F1A186ACF16DBF967F90EDC584DD525EC186536
5,337,325 UART: [art] SIG.R = 15AFD63FEAB657BE3AC52B42935DA460BF85933DA43F71FB701EFAE6E32536068642266B47C204686609ED9CEE5FB2D1
5,344,096 UART: [art] SIG.S = ECF3BD865FE7A2EA4861C54B7ABE90DF4C02C3D033936B544FAFC2F76E2087F4E7CAE417F9F0E2FABA164CD886899103
5,368,123 UART: Caliptra RT
5,368,376 UART: [state] CFI Enabled
5,648,478 UART: [rt] RT failed reset flow
5,648,909 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
907,079 UART: [kat] SHA2-512-ACC
908,980 UART: [kat] ECC-384
918,591 UART: [kat] HMAC-384Kdf
923,031 UART: [kat] LMS
1,171,359 UART: [kat] --
1,172,302 UART: [cold-reset] ++
1,172,880 UART: [fht] FHT @ 0x50003400
1,175,617 UART: [idev] ++
1,175,785 UART: [idev] CDI.KEYID = 6
1,176,145 UART: [idev] SUBJECT.KEYID = 7
1,176,569 UART: [idev] UDS.KEYID = 0
1,176,914 ready_for_fw is high
1,176,914 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,152 UART: [ldev] ++
1,211,320 UART: [ldev] CDI.KEYID = 6
1,211,683 UART: [ldev] SUBJECT.KEYID = 5
1,212,109 UART: [ldev] AUTHORITY.KEYID = 7
1,212,572 UART: [ldev] FE.KEYID = 1
1,217,856 UART: [ldev] Erasing FE.KEYID = 1
1,244,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,054 UART: [ldev] --
1,284,553 UART: [fwproc] Wait for Commands...
1,285,219 UART: [fwproc] Recv command 0x46574c44
1,285,947 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,835 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,124 >>> mbox cmd response: success
2,315,124 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,316,142 UART: [afmc] ++
2,316,310 UART: [afmc] CDI.KEYID = 6
2,316,672 UART: [afmc] SUBJECT.KEYID = 7
2,317,097 UART: [afmc] AUTHORITY.KEYID = 5
2,352,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,075 UART: [afmc] --
2,395,953 UART: [cold-reset] --
2,396,773 UART: [state] Locking Datavault
2,398,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,636 UART: [state] Locking ICCM
2,399,302 UART: [exit] Launching FMC @ 0x40000130
2,404,631 UART:
2,404,647 UART: Running Caliptra FMC ...
2,405,055 UART:
2,405,198 UART: [state] CFI Enabled
2,415,779 UART: [fht] FMC Alias Private Key: 7
2,523,380 UART: [art] Extend RT PCRs Done
2,523,808 UART: [art] Lock RT PCRs Done
2,525,146 UART: [art] Populate DV Done
2,533,197 UART: [fht] FMC Alias Private Key: 7
2,534,255 UART: [art] Derive CDI
2,534,535 UART: [art] Store in in slot 0x4
2,620,452 UART: [art] Derive Key Pair
2,620,812 UART: [art] Store priv key in slot 0x5
2,634,062 UART: [art] Derive Key Pair - Done
2,648,807 UART: [art] Signing Cert with AUTHO
2,649,287 UART: RITY.KEYID = 7
2,664,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,608 UART: [art] PUB.X = A3614E405B3D4CC755422DF8750F075771ED953983A685EBAD1990FB3D2591F44BA5F0D848E9BCE67205DCFBABA25DB6
2,672,381 UART: [art] PUB.Y = F608EAA8C1525E64680DDB9FC9AC54F208A3DE411445FB07A29D444BA77D3513ADB580239BEFD109FEE5FBCE58619D75
2,679,332 UART: [art] SIG.R = BE7BE84017578AF3789107E443D6670302795A2CA4D48C3D2A4E7C61F3C9310097F5ED2B61016DDA96AD45338FBD1DED
2,686,074 UART: [art] SIG.S = F2816336B862D8730C3DC31EBFA1FF5C1CC331DD7AC69E8D7E7A639955EADCB4CB3F2F6436714C51EB15F95624EF2404
2,709,927 UART: mbox::rt_entry...
2,710,299 UART: ____ _ _ _ ____ _____
2,711,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,187 UART: |_|
2,714,499 UART:
2,820,956 UART: [rt] Runtime listening for mailbox commands...
2,822,107 >>> mbox cmd response data (0 bytes)
2,822,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,822,220 UART:
2,822,236 UART: Running Caliptra ROM ...
2,822,644 UART:
2,822,786 UART: [state] CFI Enabled
2,825,584 UART: [state] LifecycleState = Unprovisioned
2,826,239 UART: [state] DebugLocked = No
2,826,875 UART: [state] WD Timer not started. Device not locked for debugging
2,828,043 UART: [kat] SHA2-256
3,633,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,637,818 UART: [kat] ++
3,637,970 UART: [kat] sha1
3,642,248 UART: [kat] SHA2-256
3,644,188 UART: [kat] SHA2-384
3,646,881 UART: [kat] SHA2-512-ACC
3,648,781 UART: [kat] ECC-384
3,658,670 UART: [kat] HMAC-384Kdf
3,663,286 UART: [kat] LMS
3,911,614 UART: [kat] --
3,912,378 UART: [update-reset] ++
5,223,882 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,225,047 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,871 >>> mbox cmd response: success
5,375,162 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,176 UART: [update-reset Success] --
5,384,017 UART: [state] Locking Datavault
5,384,969 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,573 UART: [state] Locking ICCM
5,386,231 UART: [exit] Launching FMC @ 0x40000130
5,391,560 UART:
5,391,576 UART: Running Caliptra FMC ...
5,391,984 UART:
5,392,127 UART: [state] CFI Enabled
5,481,338 UART: [art] Extend RT PCRs Done
5,481,766 UART: [art] Lock RT PCRs Done
5,482,915 UART: [art] Populate DV Done
5,491,322 UART: [fht] FMC Alias Private Key: 7
5,492,296 UART: [art] Derive CDI
5,492,576 UART: [art] Store in in slot 0x4
5,578,205 UART: [art] Derive Key Pair
5,578,565 UART: [art] Store priv key in slot 0x5
5,592,217 UART: [art] Derive Key Pair - Done
5,607,007 UART: [art] Signing Cert with AUTHO
5,607,487 UART: RITY.KEYID = 7
5,622,837 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,602 UART: [art] PUB.X = 993D586E7BD0AC6886EE458C6F0805A541B5F27A27B51CB59C7DDAB7169704096D301937DD86FD2C564A18C9DB93F1CC
5,630,368 UART: [art] PUB.Y = 19CDDF12202FBC62ECDE69E76870F106A6FFCBF2C547ECE9D104BAB30469CD58AB96B835D22045402A58BDC9A919BBCF
5,637,331 UART: [art] SIG.R = 2D9047DF63A38C92C678D2DF9194D392B623BB17AE2CA9B0AF5A53A8348013B03F89032E7AED9AFE28CE73E911E70A20
5,644,105 UART: [art] SIG.S = 451F85FE4E5D7FFEC20AB800A2FC663BE1C80F658A0D61D5B5298749D6C5FBA69BF08CC279CBEB3DA4398878C3BACD51
5,668,203 UART: Caliptra RT
5,668,548 UART: [state] CFI Enabled
5,953,688 UART: [rt] RT failed reset flow
5,954,119 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 ready_for_fw is high
1,060,298 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,773 >>> mbox cmd response: success
2,165,773 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,228,111 UART:
2,228,127 UART: Running Caliptra FMC ...
2,228,535 UART:
2,228,678 UART: [state] CFI Enabled
2,239,211 UART: [fht] FMC Alias Private Key: 7
2,346,054 UART: [art] Extend RT PCRs Done
2,346,482 UART: [art] Lock RT PCRs Done
2,347,944 UART: [art] Populate DV Done
2,356,223 UART: [fht] FMC Alias Private Key: 7
2,357,297 UART: [art] Derive CDI
2,357,577 UART: [art] Store in in slot 0x4
2,443,534 UART: [art] Derive Key Pair
2,443,894 UART: [art] Store priv key in slot 0x5
2,457,198 UART: [art] Derive Key Pair - Done
2,471,745 UART: [art] Signing Cert with AUTHO
2,472,225 UART: RITY.KEYID = 7
2,487,567 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,332 UART: [art] PUB.X = 942FEC688E6A35EC1BF5F619F3148199D54105D284FFB58AD734C46FA9725CD23552C92F206D4B4D606F722E2FCB2E86
2,495,105 UART: [art] PUB.Y = FA6582A9FBFA446E4952B9B490273AEDFA1CCDDA9EEE6678804A54F17CCCC2830456FAA755E33121098A902D3C481540
2,502,059 UART: [art] SIG.R = 31A95E73DA0D90824785FE99FBD9A0C4C8B30C61F421DB16CF5E94EF34D65E83F7C4142B81DDBF1E799F213B650143CA
2,508,832 UART: [art] SIG.S = 725C433691345394B1016084488BE5FE27153F07C878727AD7CE1B16AA052AB77BAAB6689CABB47BD30B0BB305D2DB1F
2,532,697 UART: mbox::rt_entry...
2,533,069 UART: ____ _ _ _ ____ _____
2,533,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,653 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,421 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,189 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,957 UART: |_|
2,537,269 UART:
2,644,097 UART: [rt] Runtime listening for mailbox commands...
2,645,248 >>> mbox cmd response data (0 bytes)
2,645,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,215 >>> mbox cmd response: success
5,095,495 UART:
5,095,511 UART: Running Caliptra FMC ...
5,095,919 UART:
5,096,062 UART: [state] CFI Enabled
5,185,365 UART: [art] Extend RT PCRs Done
5,185,793 UART: [art] Lock RT PCRs Done
5,187,072 UART: [art] Populate DV Done
5,195,173 UART: [fht] FMC Alias Private Key: 7
5,196,325 UART: [art] Derive CDI
5,196,605 UART: [art] Store in in slot 0x4
5,282,436 UART: [art] Derive Key Pair
5,282,796 UART: [art] Store priv key in slot 0x5
5,296,896 UART: [art] Derive Key Pair - Done
5,311,697 UART: [art] Signing Cert with AUTHO
5,312,177 UART: RITY.KEYID = 7
5,327,787 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,552 UART: [art] PUB.X = D58ACA17F3A35DC066DDC95C0EFAB81F7D2BC179C110B8498593421C531F94B89C161ACB15509F166B9572F8445EBB2F
5,335,329 UART: [art] PUB.Y = DA0648E26CDA1F171EFE829B7EE131C92787D3CDCE3888F4D36E5CF2E41CFD0179B6AB4477D92F1D9CE44CE35859A306
5,342,286 UART: [art] SIG.R = A7AFAC8BBB31AE31F66A61EC47AB161C4DC627D3EE002B54EB3439D47734F980CB9D510384A7B452850CD102CD147ADF
5,349,041 UART: [art] SIG.S = 868BC311CF76377FFA36DBAA3E3332EDB7F3B3A65618C27316FBF49F4097203AFC61C60770DD2A60D4017B11E72F286E
5,372,974 UART: Caliptra RT
5,373,319 UART: [state] CFI Enabled
5,650,712 UART: [rt] RT failed reset flow
5,651,143 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,644 UART: [state] LifecycleState = Unprovisioned
85,299 UART: [state] DebugLocked = No
85,863 UART: [state] WD Timer not started. Device not locked for debugging
87,018 UART: [kat] SHA2-256
890,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,697 UART: [kat] ++
894,849 UART: [kat] sha1
898,865 UART: [kat] SHA2-256
900,805 UART: [kat] SHA2-384
903,554 UART: [kat] SHA2-512-ACC
905,455 UART: [kat] ECC-384
914,846 UART: [kat] HMAC-384Kdf
919,456 UART: [kat] LMS
1,167,768 UART: [kat] --
1,168,613 UART: [cold-reset] ++
1,169,045 UART: [fht] FHT @ 0x50003400
1,171,485 UART: [idev] ++
1,171,653 UART: [idev] CDI.KEYID = 6
1,172,014 UART: [idev] SUBJECT.KEYID = 7
1,172,439 UART: [idev] UDS.KEYID = 0
1,172,785 ready_for_fw is high
1,172,785 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,180,623 UART: [idev] Erasing UDS.KEYID = 0
1,197,769 UART: [idev] Sha1 KeyId Algorithm
1,206,615 UART: [idev] --
1,207,738 UART: [ldev] ++
1,207,906 UART: [ldev] CDI.KEYID = 6
1,208,270 UART: [ldev] SUBJECT.KEYID = 5
1,208,697 UART: [ldev] AUTHORITY.KEYID = 7
1,209,160 UART: [ldev] FE.KEYID = 1
1,214,126 UART: [ldev] Erasing FE.KEYID = 1
1,240,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,912 UART: [ldev] --
1,279,228 UART: [fwproc] Wait for Commands...
1,279,863 UART: [fwproc] Recv command 0x46574c44
1,280,596 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,095 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,377 >>> mbox cmd response: success
2,310,377 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,311,476 UART: [afmc] ++
2,311,644 UART: [afmc] CDI.KEYID = 6
2,312,007 UART: [afmc] SUBJECT.KEYID = 7
2,312,433 UART: [afmc] AUTHORITY.KEYID = 5
2,347,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,273 UART: [afmc] --
2,391,345 UART: [cold-reset] --
2,392,317 UART: [state] Locking Datavault
2,393,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,312 UART: [state] Locking ICCM
2,394,772 UART: [exit] Launching FMC @ 0x40000130
2,400,101 UART:
2,400,117 UART: Running Caliptra FMC ...
2,400,525 UART:
2,400,579 UART: [state] CFI Enabled
2,410,824 UART: [fht] FMC Alias Private Key: 7
2,518,641 UART: [art] Extend RT PCRs Done
2,519,069 UART: [art] Lock RT PCRs Done
2,521,057 UART: [art] Populate DV Done
2,529,358 UART: [fht] FMC Alias Private Key: 7
2,530,520 UART: [art] Derive CDI
2,530,800 UART: [art] Store in in slot 0x4
2,616,449 UART: [art] Derive Key Pair
2,616,809 UART: [art] Store priv key in slot 0x5
2,630,691 UART: [art] Derive Key Pair - Done
2,645,184 UART: [art] Signing Cert with AUTHO
2,645,664 UART: RITY.KEYID = 7
2,660,918 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,683 UART: [art] PUB.X = 7F9BA872305992D9B97AC3D69001D25EDEDFB95E1B41AD3F6FE3F584552E921B46FA66DEA066123A2CADB9F506E51A66
2,668,461 UART: [art] PUB.Y = 2F2DF03B5D5438F1929103595C1B44E4E2964F5F6C9C40052409AC28995FA013676C8E00FB5A03E74C65BBD06B6C8D13
2,675,377 UART: [art] SIG.R = B5377185DE83483D1A005035A8D550C706FC8B5B2A13C9ECFA6F8F0227810BF69B508DAD0E00CE9C9EFD9E3C2DE8AB12
2,682,107 UART: [art] SIG.S = 3A06AE0A7242C82CDE7ECE2208BE01BF84483E1F78051D540DDBF8F66407B58A322638C892D996002A30D62C4557080A
2,705,759 UART: mbox::rt_entry...
2,706,131 UART: ____ _ _ _ ____ _____
2,706,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,019 UART: |_|
2,710,331 UART:
2,816,611 UART: [rt] Runtime listening for mailbox commands...
2,817,762 >>> mbox cmd response data (0 bytes)
2,817,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,817,875 UART:
2,817,891 UART: Running Caliptra ROM ...
2,818,299 UART:
2,818,354 UART: [state] CFI Enabled
2,820,934 UART: [state] LifecycleState = Unprovisioned
2,821,589 UART: [state] DebugLocked = No
2,822,249 UART: [state] WD Timer not started. Device not locked for debugging
2,823,531 UART: [kat] SHA2-256
3,627,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,210 UART: [kat] ++
3,631,362 UART: [kat] sha1
3,635,404 UART: [kat] SHA2-256
3,637,344 UART: [kat] SHA2-384
3,639,933 UART: [kat] SHA2-512-ACC
3,641,833 UART: [kat] ECC-384
3,651,936 UART: [kat] HMAC-384Kdf
3,656,560 UART: [kat] LMS
3,904,872 UART: [kat] --
3,905,550 UART: [update-reset] ++
5,218,423 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,544 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,369,368 >>> mbox cmd response: success
5,369,695 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,709 UART: [update-reset Success] --
5,378,564 UART: [state] Locking Datavault
5,379,354 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,958 UART: [state] Locking ICCM
5,380,546 UART: [exit] Launching FMC @ 0x40000130
5,385,875 UART:
5,385,891 UART: Running Caliptra FMC ...
5,386,299 UART:
5,386,353 UART: [state] CFI Enabled
5,475,174 UART: [art] Extend RT PCRs Done
5,475,602 UART: [art] Lock RT PCRs Done
5,476,983 UART: [art] Populate DV Done
5,485,078 UART: [fht] FMC Alias Private Key: 7
5,486,100 UART: [art] Derive CDI
5,486,380 UART: [art] Store in in slot 0x4
5,572,591 UART: [art] Derive Key Pair
5,572,951 UART: [art] Store priv key in slot 0x5
5,586,419 UART: [art] Derive Key Pair - Done
5,601,457 UART: [art] Signing Cert with AUTHO
5,601,937 UART: RITY.KEYID = 7
5,617,089 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,854 UART: [art] PUB.X = 6670772F8D040082AAE2BFC9B3AE7E665DF1C89D0B92ED6996F7F36B4A3D07CEAFFD0EE5F8A47DD0F4CE420190C0443A
5,624,607 UART: [art] PUB.Y = 8C5F9B308CB9DE136A1976C60130E298418A55F3ECEB094888F49B421187C18856DBCC62BC6E32D9FF4644B0944AB9B4
5,631,555 UART: [art] SIG.R = 7C97A4670908E2FC511FE1CC831CF65042730A7627D1CDE519873B3541E6E483B1735509B258F77BF0B0D73B0F28D827
5,638,306 UART: [art] SIG.S = E30709599E002BCF366CCC6736D53783603ED3CD24B635043FF63B1A242A36B6C6800D2AC158D008EAC3D351ABBC9AC9
5,662,556 UART: Caliptra RT
5,662,809 UART: [state] CFI Enabled
5,942,685 UART: [rt] RT failed reset flow
5,943,116 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,416 ready_for_fw is high
1,056,416 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,011 >>> mbox cmd response: success
2,161,011 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,553 UART:
2,223,569 UART: Running Caliptra FMC ...
2,223,977 UART:
2,224,031 UART: [state] CFI Enabled
2,234,670 UART: [fht] FMC Alias Private Key: 7
2,341,677 UART: [art] Extend RT PCRs Done
2,342,105 UART: [art] Lock RT PCRs Done
2,343,407 UART: [art] Populate DV Done
2,351,538 UART: [fht] FMC Alias Private Key: 7
2,352,482 UART: [art] Derive CDI
2,352,762 UART: [art] Store in in slot 0x4
2,438,387 UART: [art] Derive Key Pair
2,438,747 UART: [art] Store priv key in slot 0x5
2,452,277 UART: [art] Derive Key Pair - Done
2,466,904 UART: [art] Signing Cert with AUTHO
2,467,384 UART: RITY.KEYID = 7
2,482,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,197 UART: [art] PUB.X = B3303E8D397E069FCC2929A413254DD6AB8DBAA6815BE8FD15748007E10B5D50501A347FCE45408C2CF4511BB63DB652
2,489,964 UART: [art] PUB.Y = 2FC4DE8059A25697F1C9CD0943FD74D62304E9CE58669E88F83C32D77947B1689E8513D7701BCDB05E696E97AE50FBE8
2,496,912 UART: [art] SIG.R = D878CE4C4DC7DDB487D949464FB2848EA9332BB2EDF5ED9ADE1E3712AABBC25E7ED8DF65A0BEB02F4BFAA96B9A7F6B64
2,503,716 UART: [art] SIG.S = 6ECBE058ED8E1393E9E2A5882FBC06882B74B831DBE930FF3FE69A1AEC3148C88D43292DA86ABCC98B9B16ECFB5CB632
2,527,144 UART: mbox::rt_entry...
2,527,516 UART: ____ _ _ _ ____ _____
2,528,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,404 UART: |_|
2,531,716 UART:
2,637,166 UART: [rt] Runtime listening for mailbox commands...
2,638,317 >>> mbox cmd response data (0 bytes)
2,638,318 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,071,072 >>> mbox cmd response: success
5,084,140 UART:
5,084,156 UART: Running Caliptra FMC ...
5,084,564 UART:
5,084,618 UART: [state] CFI Enabled
5,173,333 UART: [art] Extend RT PCRs Done
5,173,761 UART: [art] Lock RT PCRs Done
5,175,138 UART: [art] Populate DV Done
5,183,151 UART: [fht] FMC Alias Private Key: 7
5,184,195 UART: [art] Derive CDI
5,184,475 UART: [art] Store in in slot 0x4
5,270,266 UART: [art] Derive Key Pair
5,270,626 UART: [art] Store priv key in slot 0x5
5,283,744 UART: [art] Derive Key Pair - Done
5,298,313 UART: [art] Signing Cert with AUTHO
5,298,793 UART: RITY.KEYID = 7
5,314,033 UART: [art] Erasing AUTHORITY.KEYID = 7
5,314,798 UART: [art] PUB.X = 688DCC94F92DEB872FFDEAF130302D9AD87508B3BBD010A3216D6DAEDD0DCC38D58E2EFD34EE2C221D86B940EA6E879B
5,321,588 UART: [art] PUB.Y = F0C78DEBE6B7279A2CEA513DE04ACF3C41B3B3A0B135CBCB620ADD73D38E3BB35CC1370431564983F6DF8FE208A863C1
5,328,549 UART: [art] SIG.R = 6A85C2D430D5EDE630DD3F74703525C65820635582DC303EF7F315C9D8634AACF5784A143C8B9BCB9058AFF17A967905
5,335,318 UART: [art] SIG.S = 3005C3819B0005E734ABC2D322D873BF3207FA961C2128107893C1641BB215444C029A442DDB84B5839FCB1B1940C668
5,359,441 UART: Caliptra RT
5,359,694 UART: [state] CFI Enabled
5,642,844 UART: [rt] RT failed reset flow
5,643,275 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,092 UART: [state] WD Timer not started. Device not locked for debugging
87,281 UART: [kat] SHA2-256
890,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,960 UART: [kat] ++
895,112 UART: [kat] sha1
899,204 UART: [kat] SHA2-256
901,144 UART: [kat] SHA2-384
903,999 UART: [kat] SHA2-512-ACC
905,900 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,324 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,132 UART: [idev] ++
1,172,300 UART: [idev] CDI.KEYID = 6
1,172,661 UART: [idev] SUBJECT.KEYID = 7
1,173,086 UART: [idev] UDS.KEYID = 0
1,173,432 ready_for_fw is high
1,173,432 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,138 UART: [idev] Erasing UDS.KEYID = 0
1,198,474 UART: [idev] Sha1 KeyId Algorithm
1,207,444 UART: [idev] --
1,208,327 UART: [ldev] ++
1,208,495 UART: [ldev] CDI.KEYID = 6
1,208,859 UART: [ldev] SUBJECT.KEYID = 5
1,209,286 UART: [ldev] AUTHORITY.KEYID = 7
1,209,749 UART: [ldev] FE.KEYID = 1
1,214,961 UART: [ldev] Erasing FE.KEYID = 1
1,241,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,117 UART: [ldev] --
1,280,603 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,160 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,656 >>> mbox cmd response: success
2,310,656 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,311,805 UART: [afmc] ++
2,311,973 UART: [afmc] CDI.KEYID = 6
2,312,336 UART: [afmc] SUBJECT.KEYID = 7
2,312,762 UART: [afmc] AUTHORITY.KEYID = 5
2,347,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,130 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,618 UART: [afmc] --
2,390,670 UART: [cold-reset] --
2,391,342 UART: [state] Locking Datavault
2,392,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,365 UART: [state] Locking ICCM
2,393,905 UART: [exit] Launching FMC @ 0x40000130
2,399,234 UART:
2,399,250 UART: Running Caliptra FMC ...
2,399,658 UART:
2,399,801 UART: [state] CFI Enabled
2,410,208 UART: [fht] FMC Alias Private Key: 7
2,517,591 UART: [art] Extend RT PCRs Done
2,518,019 UART: [art] Lock RT PCRs Done
2,519,603 UART: [art] Populate DV Done
2,527,574 UART: [fht] FMC Alias Private Key: 7
2,528,750 UART: [art] Derive CDI
2,529,030 UART: [art] Store in in slot 0x4
2,615,105 UART: [art] Derive Key Pair
2,615,465 UART: [art] Store priv key in slot 0x5
2,628,727 UART: [art] Derive Key Pair - Done
2,643,584 UART: [art] Signing Cert with AUTHO
2,644,064 UART: RITY.KEYID = 7
2,659,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,373 UART: [art] PUB.X = 6FB0A60009D33C7B578E86A7CEBC809437189388C14C0B7113A8BCEF8045A065421749F2B5BF76BD1AAE050A2A2414C8
2,667,113 UART: [art] PUB.Y = 5C151A81552C69D6F39FC3F506FE896A31A81E0F114B1B399F89BBDF27562A7DEBA3822F499E061238A7C6D39C9CA807
2,674,057 UART: [art] SIG.R = A2E33A3EEF8DA385AFB6470C0B37C07286B6722D4411A83BFE62EE9106A9E667F9D630F97A530D99EA4F95ACE3BDA987
2,680,829 UART: [art] SIG.S = 54C72FA598EF4E31893247DE30D1FFE62EDF412BEECE509884B1EDE57440E45933CE9FF9ADE3B0E6D05F33A3CE5E4613
2,704,846 UART: mbox::rt_entry...
2,705,218 UART: ____ _ _ _ ____ _____
2,706,002 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,802 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,570 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,338 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,106 UART: |_|
2,709,418 UART:
2,815,732 UART: [rt] Runtime listening for mailbox commands...
2,816,883 >>> mbox cmd response data (0 bytes)
2,816,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,816,996 UART:
2,817,012 UART: Running Caliptra ROM ...
2,817,420 UART:
2,817,562 UART: [state] CFI Enabled
2,820,088 UART: [state] LifecycleState = Unprovisioned
2,820,743 UART: [state] DebugLocked = No
2,821,241 UART: [state] WD Timer not started. Device not locked for debugging
2,822,429 UART: [kat] SHA2-256
3,625,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,108 UART: [kat] ++
3,630,260 UART: [kat] sha1
3,634,272 UART: [kat] SHA2-256
3,636,212 UART: [kat] SHA2-384
3,639,127 UART: [kat] SHA2-512-ACC
3,641,027 UART: [kat] ECC-384
3,650,990 UART: [kat] HMAC-384Kdf
3,655,554 UART: [kat] LMS
3,903,866 UART: [kat] --
3,904,608 UART: [update-reset] ++
5,217,183 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,218,238 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,368,062 >>> mbox cmd response: success
5,368,409 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,423 UART: [update-reset Success] --
5,377,426 UART: [state] Locking Datavault
5,378,340 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,944 UART: [state] Locking ICCM
5,379,470 UART: [exit] Launching FMC @ 0x40000130
5,384,799 UART:
5,384,815 UART: Running Caliptra FMC ...
5,385,223 UART:
5,385,366 UART: [state] CFI Enabled
5,474,761 UART: [art] Extend RT PCRs Done
5,475,189 UART: [art] Lock RT PCRs Done
5,476,338 UART: [art] Populate DV Done
5,484,879 UART: [fht] FMC Alias Private Key: 7
5,485,893 UART: [art] Derive CDI
5,486,173 UART: [art] Store in in slot 0x4
5,571,752 UART: [art] Derive Key Pair
5,572,112 UART: [art] Store priv key in slot 0x5
5,585,246 UART: [art] Derive Key Pair - Done
5,600,008 UART: [art] Signing Cert with AUTHO
5,600,488 UART: RITY.KEYID = 7
5,615,624 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,389 UART: [art] PUB.X = 5DAB2A84CFFB50FBB3219829E92FFDF91A552E2CFA245DABA1CD51D586A0F22ADF0A7A2F84B05352F5BCA9388FE62576
5,623,180 UART: [art] PUB.Y = 7047152E349A49CE437B820F718F4B4BB382AE7A5CEB96017CE958F37BA44C6C525223B5CC9CFFA2710EC9CFAAF6569E
5,630,135 UART: [art] SIG.R = 0DBF32F44DB3C9413CD35AB42924780779405021086A2E335F20C6C01347FD2C1EABAC575641B54C0E584470E8EA46BE
5,636,895 UART: [art] SIG.S = 6181AA7B195A995527371E469ADC55053C5D30F8113A906982F05F1BC0A59BC7C623980C1562127206A79071B1B6F3FC
5,660,893 UART: Caliptra RT
5,661,238 UART: [state] CFI Enabled
5,941,272 UART: [rt] RT failed reset flow
5,941,703 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,001 ready_for_fw is high
1,056,001 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,030 >>> mbox cmd response: success
2,161,030 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,556 UART:
2,223,572 UART: Running Caliptra FMC ...
2,223,980 UART:
2,224,123 UART: [state] CFI Enabled
2,234,690 UART: [fht] FMC Alias Private Key: 7
2,343,383 UART: [art] Extend RT PCRs Done
2,343,811 UART: [art] Lock RT PCRs Done
2,345,517 UART: [art] Populate DV Done
2,353,520 UART: [fht] FMC Alias Private Key: 7
2,354,564 UART: [art] Derive CDI
2,354,844 UART: [art] Store in in slot 0x4
2,440,349 UART: [art] Derive Key Pair
2,440,709 UART: [art] Store priv key in slot 0x5
2,454,449 UART: [art] Derive Key Pair - Done
2,469,252 UART: [art] Signing Cert with AUTHO
2,469,732 UART: RITY.KEYID = 7
2,485,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,809 UART: [art] PUB.X = 56CC628C461DC1845E0E50D38FE68D542030FC4FEFC21A22B8571DDC9D065F8B4F25311C2CF0781C9990D604B2E44088
2,492,574 UART: [art] PUB.Y = 3AEEE71794596035DCE0DB2CAE6F47F0B2718903C8C1CB8900FB5025518E1879055C4DA01B4F11ECD4FCB815787F3311
2,499,502 UART: [art] SIG.R = 3237CCA1307E1F62DB204C977C774613924372C586E6CE249F5A460981DF079364CD05DD0EB513D0B9D889F9133FDD9A
2,506,260 UART: [art] SIG.S = E085E65F6F43452FFEAD6B05237C6C7DF7EC6C33C03AEBDC028F2F05DF229B83907404F6BBD1C13EA1C8CF48BCCCB108
2,529,948 UART: mbox::rt_entry...
2,530,320 UART: ____ _ _ _ ____ _____
2,531,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,904 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,440 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,208 UART: |_|
2,534,520 UART:
2,641,444 UART: [rt] Runtime listening for mailbox commands...
2,642,595 >>> mbox cmd response data (0 bytes)
2,642,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,077,091 >>> mbox cmd response: success
5,090,569 UART:
5,090,585 UART: Running Caliptra FMC ...
5,090,993 UART:
5,091,136 UART: [state] CFI Enabled
5,180,559 UART: [art] Extend RT PCRs Done
5,180,987 UART: [art] Lock RT PCRs Done
5,182,330 UART: [art] Populate DV Done
5,190,535 UART: [fht] FMC Alias Private Key: 7
5,191,577 UART: [art] Derive CDI
5,191,857 UART: [art] Store in in slot 0x4
5,277,572 UART: [art] Derive Key Pair
5,277,932 UART: [art] Store priv key in slot 0x5
5,291,518 UART: [art] Derive Key Pair - Done
5,306,081 UART: [art] Signing Cert with AUTHO
5,306,561 UART: RITY.KEYID = 7
5,321,803 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,568 UART: [art] PUB.X = ADA9BC2C47BFC1CC4B559675F4E2AF8A8A3A1CB359D718FD24D736C870DFAD2EDDE7A6F2F279D45009FCF179AAB6BA55
5,329,365 UART: [art] PUB.Y = A4F1628CF1EFB99B643473EC7D90093E1B225ED4BC121D4DAB6887B4393EF71E9B32DEC339AF02E5B1BC92CEABC69832
5,336,327 UART: [art] SIG.R = D7964BD8CF83161A82AB6031275FB5C9E4C07F0E606B41897D931D27CEE747E7D661D58639D394F75E89810C483298BB
5,343,089 UART: [art] SIG.S = BF75EEAF81795D1A8C20DB910BEBBC2AB405FC1E878041CF3006D181571C7BD1EFFA069A43F6D5B74EB783C9F9608C78
5,366,742 UART: Caliptra RT
5,367,087 UART: [state] CFI Enabled
5,648,758 UART: [rt] RT failed reset flow
5,649,189 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,111 UART: [kat] SHA2-256
892,049 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,198 UART: [kat] HMAC-384Kdf
906,738 UART: [kat] LMS
1,474,934 UART: [kat] --
1,475,811 UART: [cold-reset] ++
1,476,353 UART: [fht] Storing FHT @ 0x50003400
1,479,086 UART: [idev] ++
1,479,254 UART: [idev] CDI.KEYID = 6
1,479,614 UART: [idev] SUBJECT.KEYID = 7
1,480,038 UART: [idev] UDS.KEYID = 0
1,480,383 ready_for_fw is high
1,480,383 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,487,926 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,106 UART: [idev] --
1,514,081 UART: [ldev] ++
1,514,249 UART: [ldev] CDI.KEYID = 6
1,514,612 UART: [ldev] SUBJECT.KEYID = 5
1,515,038 UART: [ldev] AUTHORITY.KEYID = 7
1,515,501 UART: [ldev] FE.KEYID = 1
1,520,381 UART: [ldev] Erasing FE.KEYID = 1
1,545,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,440 UART: [ldev] --
1,584,727 UART: [fwproc] Waiting for Commands...
1,585,430 UART: [fwproc] Received command 0x46574c44
1,586,221 UART: [fwproc] Received Image of size 78704 bytes
2,475,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,056 >>> mbox cmd response: success
2,615,056 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,190 UART: [afmc] ++
2,616,358 UART: [afmc] CDI.KEYID = 6
2,616,720 UART: [afmc] SUBJECT.KEYID = 7
2,617,145 UART: [afmc] AUTHORITY.KEYID = 5
2,651,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,359 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,049 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,994 UART: [afmc] --
2,695,028 UART: [cold-reset] --
2,696,044 UART: [state] Locking Datavault
2,697,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,625 UART: [state] Locking ICCM
2,698,177 UART: [exit] Launching FMC @ 0x40000130
2,703,506 UART:
2,703,522 UART: Running Caliptra FMC ...
2,703,930 UART:
2,703,984 UART: [state] CFI Enabled
2,714,445 UART: [fht] FMC Alias Private Key: 7
2,822,832 UART: [art] Extend RT PCRs Done
2,823,260 UART: [art] Lock RT PCRs Done
2,824,716 UART: [art] Populate DV Done
2,833,073 UART: [fht] FMC Alias Private Key: 7
2,834,079 UART: [art] Derive CDI
2,834,359 UART: [art] Store in in slot 0x4
2,920,098 UART: [art] Derive Key Pair
2,920,458 UART: [art] Store priv key in slot 0x5
2,933,658 UART: [art] Derive Key Pair - Done
2,948,478 UART: [art] Signing Cert with AUTHO
2,948,958 UART: RITY.KEYID = 7
2,964,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,947 UART: [art] PUB.X = F7B5F4F7B7EBECD7C0D334B3C2268AC67AA848C6D009CDF0088E8B395A54C9C337BBECEDC9826D7E3798A4AD215FE36D
2,971,735 UART: [art] PUB.Y = 7FD7BBCDD5E6470E92D8E07D75DA3CE8B65895ADCFA8DC5F5C1FFF661332AA29CB906A9A1CC63169BA61F0F59806F8D5
2,978,703 UART: [art] SIG.R = 25E90B6C5DD3916F5079FEA9C41B0BB7F880B80D4987953946E7B3B52863D8DD91C1054A1EFC22D22D925CC5C9F8EB61
2,985,469 UART: [art] SIG.S = DD5215BCCC981BE20A0F81E859457474C4E318488887571958249A68BEC04011545761E791344580D2367A80A5CDB8AB
3,009,446 UART: mbox::rt_entry...
3,009,818 UART: ____ _ _ _ ____ _____
3,010,602 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,402 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,938 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,706 UART: |_|
3,014,018 UART:
3,121,418 UART: [rt] Runtime listening for mailbox commands...
3,126,386 >>> mbox cmd response data (3272 bytes)
3,126,387 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,473 >>> mbox cmd response data (0 bytes)
3,149,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,149,594 UART:
3,149,610 UART: Running Caliptra ROM ...
3,150,018 UART:
3,150,072 UART: [state] CFI Enabled
3,152,232 UART: [state] LifecycleState = Unprovisioned
3,152,887 UART: [state] DebugLocked = No
3,153,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,272 UART: [kat] SHA2-256
3,949,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,318 UART: [kat] ++
3,953,470 UART: [kat] sha1
3,957,690 UART: [kat] SHA2-256
3,959,628 UART: [kat] SHA2-384
3,962,393 UART: [kat] SHA2-512-ACC
3,964,293 UART: [kat] ECC-384
3,970,020 UART: [kat] HMAC-384Kdf
3,974,640 UART: [kat] LMS
4,542,836 UART: [kat] --
4,543,689 UART: [update-reset] ++
5,877,823 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,878,941 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,028,817 >>> mbox cmd response: success
6,028,998 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,012 UART: [update-reset Success] --
6,038,107 UART: [state] Locking Datavault
6,038,867 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,471 UART: [state] Locking ICCM
6,040,111 UART: [exit] Launching FMC @ 0x40000130
6,045,440 UART:
6,045,456 UART: Running Caliptra FMC ...
6,045,864 UART:
6,045,918 UART: [state] CFI Enabled
6,135,047 UART: [art] Extend RT PCRs Done
6,135,475 UART: [art] Lock RT PCRs Done
6,136,738 UART: [art] Populate DV Done
6,145,209 UART: [fht] FMC Alias Private Key: 7
6,146,245 UART: [art] Derive CDI
6,146,525 UART: [art] Store in in slot 0x4
6,232,068 UART: [art] Derive Key Pair
6,232,428 UART: [art] Store priv key in slot 0x5
6,245,142 UART: [art] Derive Key Pair - Done
6,259,796 UART: [art] Signing Cert with AUTHO
6,260,276 UART: RITY.KEYID = 7
6,275,682 UART: [art] Erasing AUTHORITY.KEYID = 7
6,276,447 UART: [art] PUB.X = 26A41C625CA5BCED2EC823368926DBCC562F628FA22CD0221B569BA324A40E8D714C54770720685B0A8C2132AB8D4A7A
6,283,214 UART: [art] PUB.Y = EA5119B6251A99EEAD58582BD8362BC5E239BF5AD1EDD38241936C44BD60BC8C1C238291BF8D81C06AAC441D310216FF
6,290,173 UART: [art] SIG.R = E8CD5BE45E9F6184E89275ADD961F310E84FE572B1EC0271481D216BDCA6E47EC0F561EA09D485580B2896F04777EF24
6,296,940 UART: [art] SIG.S = 8D06905C960BD924A3B592E877FB06670E435908EAB62B0A4BAD676089E533854F349B20CFC1DC95C340BE23D1EA6F6B
6,320,801 UART: Caliptra RT
6,321,054 UART: [state] CFI Enabled
6,606,220 UART: Disabled attest: DPE valid fail
6,606,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,608,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,638,772 UART: [rt]cmd =0x494e464f, len=4
6,642,651 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,503 ready_for_fw is high
1,362,503 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,170 >>> mbox cmd response: success
2,467,170 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,528,774 UART:
2,528,790 UART: Running Caliptra FMC ...
2,529,198 UART:
2,529,252 UART: [state] CFI Enabled
2,539,699 UART: [fht] FMC Alias Private Key: 7
2,648,300 UART: [art] Extend RT PCRs Done
2,648,728 UART: [art] Lock RT PCRs Done
2,650,086 UART: [art] Populate DV Done
2,658,325 UART: [fht] FMC Alias Private Key: 7
2,659,429 UART: [art] Derive CDI
2,659,709 UART: [art] Store in in slot 0x4
2,745,352 UART: [art] Derive Key Pair
2,745,712 UART: [art] Store priv key in slot 0x5
2,759,400 UART: [art] Derive Key Pair - Done
2,773,946 UART: [art] Signing Cert with AUTHO
2,774,426 UART: RITY.KEYID = 7
2,789,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,321 UART: [art] PUB.X = EAB7C36AD31FE6D8574D92D5A99A7C77F977F23DB36C201D77CD13CCDDF5487A682966B78906C1EF244DE81D7A1C83FE
2,797,104 UART: [art] PUB.Y = 5450F4E60F76527D46E6F6BB01895CBE7C3099799E336098A7F5D469A35DE15383D470B638AE1A2CA3D84340CF578D92
2,804,046 UART: [art] SIG.R = F10FDB37B0E23372F2AD33BD1CF1513D6A21B394C014C4874A88573B107DDFB7597D3D40FBCD03FDC9593A44E5EC3C74
2,810,824 UART: [art] SIG.S = 50EB0CA8C846E9F325828E229982D5F6149F10A10C5E6AA833BCBCEEB240D306EC823C0DC1CB9FE54BB4A42334C3C455
2,835,109 UART: mbox::rt_entry...
2,835,481 UART: ____ _ _ _ ____ _____
2,836,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,369 UART: |_|
2,839,681 UART:
2,947,395 UART: [rt] Runtime listening for mailbox commands...
2,952,363 >>> mbox cmd response data (3272 bytes)
2,952,364 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,450 >>> mbox cmd response data (0 bytes)
2,975,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,735,806 >>> mbox cmd response: success
5,749,093 UART:
5,749,109 UART: Running Caliptra FMC ...
5,749,517 UART:
5,749,571 UART: [state] CFI Enabled
5,838,718 UART: [art] Extend RT PCRs Done
5,839,146 UART: [art] Lock RT PCRs Done
5,840,463 UART: [art] Populate DV Done
5,848,724 UART: [fht] FMC Alias Private Key: 7
5,849,876 UART: [art] Derive CDI
5,850,156 UART: [art] Store in in slot 0x4
5,936,027 UART: [art] Derive Key Pair
5,936,387 UART: [art] Store priv key in slot 0x5
5,948,891 UART: [art] Derive Key Pair - Done
5,963,443 UART: [art] Signing Cert with AUTHO
5,963,923 UART: RITY.KEYID = 7
5,979,133 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,898 UART: [art] PUB.X = 7302EB2198049D27F1836579C9A6B749BC5F8D4A37AE57F85A2C00FE5330099B8CE6DE40DC2F466F3A63B37A34013BC3
5,986,638 UART: [art] PUB.Y = 93EDCC510B7120781EDFE6B30881AD999ADBF58AC318525E93FBB98B15D11B84BBAFCE00EE2F010B62FD6041BD36AAD1
5,993,576 UART: [art] SIG.R = 59FD3BBDAA3A231FA1A85E5B533903DDBF1DA7CEDD33DB3C924368C7DD81898DBFA105F650A5DD5A13D8707819DF8604
6,000,357 UART: [art] SIG.S = 5A90BA39214F259CB78B2AF2CD7C2F69CC0DC88A461C7075F1BCF9292BDE9B1DD7E0AB54B3A4A26F726980AD1451C12F
6,024,155 UART: Caliptra RT
6,024,408 UART: [state] CFI Enabled
6,307,688 UART: Disabled attest: DPE valid fail
6,308,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,309,658 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,130 UART: [rt]cmd =0x494e464f, len=4
6,344,069 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
891,160 UART: [kat] SHA2-256
893,098 UART: [kat] SHA2-384
895,855 UART: [kat] SHA2-512-ACC
897,756 UART: [kat] ECC-384
903,719 UART: [kat] HMAC-384Kdf
908,425 UART: [kat] LMS
1,476,621 UART: [kat] --
1,477,432 UART: [cold-reset] ++
1,477,984 UART: [fht] Storing FHT @ 0x50003400
1,480,645 UART: [idev] ++
1,480,813 UART: [idev] CDI.KEYID = 6
1,481,173 UART: [idev] SUBJECT.KEYID = 7
1,481,597 UART: [idev] UDS.KEYID = 0
1,481,942 ready_for_fw is high
1,481,942 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,695 UART: [idev] Erasing UDS.KEYID = 0
1,506,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,205 UART: [idev] --
1,516,272 UART: [ldev] ++
1,516,440 UART: [ldev] CDI.KEYID = 6
1,516,803 UART: [ldev] SUBJECT.KEYID = 5
1,517,229 UART: [ldev] AUTHORITY.KEYID = 7
1,517,692 UART: [ldev] FE.KEYID = 1
1,522,694 UART: [ldev] Erasing FE.KEYID = 1
1,547,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,194 UART: [fwproc] Waiting for Commands...
1,587,833 UART: [fwproc] Received command 0x46574c44
1,588,624 UART: [fwproc] Received Image of size 78704 bytes
2,478,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,387 >>> mbox cmd response: success
2,617,387 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,595 UART: [afmc] ++
2,618,763 UART: [afmc] CDI.KEYID = 6
2,619,125 UART: [afmc] SUBJECT.KEYID = 7
2,619,550 UART: [afmc] AUTHORITY.KEYID = 5
2,655,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,579 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,972 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,662 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,475 UART: [afmc] --
2,698,491 UART: [cold-reset] --
2,699,443 UART: [state] Locking Datavault
2,700,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,170 UART: [state] Locking ICCM
2,701,612 UART: [exit] Launching FMC @ 0x40000130
2,706,941 UART:
2,706,957 UART: Running Caliptra FMC ...
2,707,365 UART:
2,707,508 UART: [state] CFI Enabled
2,717,835 UART: [fht] FMC Alias Private Key: 7
2,825,588 UART: [art] Extend RT PCRs Done
2,826,016 UART: [art] Lock RT PCRs Done
2,827,332 UART: [art] Populate DV Done
2,835,801 UART: [fht] FMC Alias Private Key: 7
2,836,913 UART: [art] Derive CDI
2,837,193 UART: [art] Store in in slot 0x4
2,923,126 UART: [art] Derive Key Pair
2,923,486 UART: [art] Store priv key in slot 0x5
2,936,372 UART: [art] Derive Key Pair - Done
2,951,340 UART: [art] Signing Cert with AUTHO
2,951,820 UART: RITY.KEYID = 7
2,966,782 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,547 UART: [art] PUB.X = 16075792B41F5CF20E2544FB23739B5E76AC72BD257703C9D7DDCE178482FDC4B0A4AB3A53B292CF5C90754C1E40721A
2,974,314 UART: [art] PUB.Y = 7A7A3A5D70DBCD48646FEB8441A85E1660E2DA683C0AFBE499766BE14B6A22D61E95DB5896629AD7F8D63248CC984FB1
2,981,273 UART: [art] SIG.R = 166A78DF212CFAABD5E86A75736A69A4478665BB89F0582930CD440C08ADE335D6C706292534D1B3203AB835270B63A9
2,988,029 UART: [art] SIG.S = E88B8B176350F327ECC1B1AFA5B97DAD34CD15679C199F5707ACFDEC6B8A8C2ACA2595E07E3460FA07D198243D3CD9A7
3,011,752 UART: mbox::rt_entry...
3,012,124 UART: ____ _ _ _ ____ _____
3,012,908 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,708 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,476 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,244 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,012 UART: |_|
3,016,324 UART:
3,124,298 UART: [rt] Runtime listening for mailbox commands...
3,129,266 >>> mbox cmd response data (3272 bytes)
3,129,267 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,353 >>> mbox cmd response data (0 bytes)
3,152,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,474 UART:
3,152,490 UART: Running Caliptra ROM ...
3,152,898 UART:
3,153,039 UART: [state] CFI Enabled
3,155,891 UART: [state] LifecycleState = Unprovisioned
3,156,546 UART: [state] DebugLocked = No
3,157,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,158,573 UART: [kat] SHA2-256
3,952,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,956,619 UART: [kat] ++
3,956,771 UART: [kat] sha1
3,961,105 UART: [kat] SHA2-256
3,963,043 UART: [kat] SHA2-384
3,965,802 UART: [kat] SHA2-512-ACC
3,967,702 UART: [kat] ECC-384
3,973,269 UART: [kat] HMAC-384Kdf
3,977,905 UART: [kat] LMS
4,546,101 UART: [kat] --
4,546,896 UART: [update-reset] ++
5,881,446 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,604 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,032,480 >>> mbox cmd response: success
6,032,653 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,667 UART: [update-reset Success] --
6,041,674 UART: [state] Locking Datavault
6,042,462 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,066 UART: [state] Locking ICCM
6,043,604 UART: [exit] Launching FMC @ 0x40000130
6,048,933 UART:
6,048,949 UART: Running Caliptra FMC ...
6,049,357 UART:
6,049,500 UART: [state] CFI Enabled
6,138,395 UART: [art] Extend RT PCRs Done
6,138,823 UART: [art] Lock RT PCRs Done
6,139,944 UART: [art] Populate DV Done
6,148,091 UART: [fht] FMC Alias Private Key: 7
6,149,089 UART: [art] Derive CDI
6,149,369 UART: [art] Store in in slot 0x4
6,234,818 UART: [art] Derive Key Pair
6,235,178 UART: [art] Store priv key in slot 0x5
6,249,034 UART: [art] Derive Key Pair - Done
6,263,738 UART: [art] Signing Cert with AUTHO
6,264,218 UART: RITY.KEYID = 7
6,279,276 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,041 UART: [art] PUB.X = FED519ABB04C5B35E6780CD4315F8A239BE781C38FF1AAF9B291D576175A052D21FBE5F31DE13C88C2C24551A5C9799F
6,286,817 UART: [art] PUB.Y = 06A3A1FA03FADB7C0ADC06236C6AF5FBF53EBC49349216C41655C06B8599C5A72C7891F54D100370A3D6C5F044799AE0
6,293,760 UART: [art] SIG.R = 1F2EE029D248868434B6D034B9C3250BF9BFDC77D59C12C9AD2FDBCE93733DA0B2209A07D74CAB75094A5B9C86A5F51A
6,300,535 UART: [art] SIG.S = 05E3BEFC2A9B992473DD67668CAB0841E1B578E95B77D7DED32A51E57D359BA10466212F7CE02029B878A4C043324AB8
6,324,707 UART: Caliptra RT
6,325,052 UART: [state] CFI Enabled
6,607,136 UART: Disabled attest: DPE valid fail
6,607,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,609,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,639,894 UART: [rt]cmd =0x494e464f, len=4
6,643,605 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,652 ready_for_fw is high
1,362,652 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,155 >>> mbox cmd response: success
2,467,155 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,043 UART:
2,529,059 UART: Running Caliptra FMC ...
2,529,467 UART:
2,529,610 UART: [state] CFI Enabled
2,540,317 UART: [fht] FMC Alias Private Key: 7
2,649,052 UART: [art] Extend RT PCRs Done
2,649,480 UART: [art] Lock RT PCRs Done
2,650,632 UART: [art] Populate DV Done
2,659,023 UART: [fht] FMC Alias Private Key: 7
2,660,123 UART: [art] Derive CDI
2,660,403 UART: [art] Store in in slot 0x4
2,745,734 UART: [art] Derive Key Pair
2,746,094 UART: [art] Store priv key in slot 0x5
2,759,014 UART: [art] Derive Key Pair - Done
2,773,620 UART: [art] Signing Cert with AUTHO
2,774,100 UART: RITY.KEYID = 7
2,789,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,827 UART: [art] PUB.X = 98D13D53CAE97088B82DD3E60570F5206392C07EEF74437287A76054B95A23D78CD98F0B797C54B5764348D9F3DCC49F
2,796,589 UART: [art] PUB.Y = E5F56620A8DDDD2A86E3020B78F8A3326A5FABDA4D72454ECB25E3BC32905F59B63F9728710CBE4EDC448AB37E1C5D52
2,803,546 UART: [art] SIG.R = F9E67A8BC8927E9DD4B1DD268DD3EC2E8BA301890C9B78A70F29797764067270D58E2C275764C811F66294823E16D26A
2,810,302 UART: [art] SIG.S = A0DD5AFFFA89030E52B07BCFCDBF1F5AF249FB56EE1D3FDE617AE9D435E97E8947471A631F8FE5ABCC74C4E5B5FE7ECC
2,834,451 UART: mbox::rt_entry...
2,834,823 UART: ____ _ _ _ ____ _____
2,835,607 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,407 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,175 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,943 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,711 UART: |_|
2,839,023 UART:
2,946,466 UART: [rt] Runtime listening for mailbox commands...
2,951,434 >>> mbox cmd response data (3272 bytes)
2,951,435 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,974,521 >>> mbox cmd response data (0 bytes)
2,974,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,735,952 >>> mbox cmd response: success
5,749,433 UART:
5,749,449 UART: Running Caliptra FMC ...
5,749,857 UART:
5,750,000 UART: [state] CFI Enabled
5,839,979 UART: [art] Extend RT PCRs Done
5,840,407 UART: [art] Lock RT PCRs Done
5,841,518 UART: [art] Populate DV Done
5,849,697 UART: [fht] FMC Alias Private Key: 7
5,850,641 UART: [art] Derive CDI
5,850,921 UART: [art] Store in in slot 0x4
5,936,586 UART: [art] Derive Key Pair
5,936,946 UART: [art] Store priv key in slot 0x5
5,950,388 UART: [art] Derive Key Pair - Done
5,965,397 UART: [art] Signing Cert with AUTHO
5,965,877 UART: RITY.KEYID = 7
5,981,313 UART: [art] Erasing AUTHORITY.KEYID = 7
5,982,078 UART: [art] PUB.X = 9C4C9956C0015975209EF1929C4983A492250F0BCF55C57C30785A158B3DBA9DD05CBCC36686CF24D3403F625CB0DD05
5,988,838 UART: [art] PUB.Y = 8CBE46426E6E804C52F673E4EC79CE5BAAAE8F9285B32AF7BD2D79CCD4370296F518633774E9D058FE0E6657A5493747
5,995,788 UART: [art] SIG.R = C9079F335B4C31A3F574375AB7453447452EA7BFFCD1FC56B96351D056D6F24093C2748EC37D99FF602ED34B40735A22
6,002,555 UART: [art] SIG.S = A01201C62450E09C508DDF3C67EEA6B69BD12DB10B8F8A5E5708153C8FC051DD4D67F6C9222CB5AD5F12684F172AE4CA
6,025,909 UART: Caliptra RT
6,026,254 UART: [state] CFI Enabled
6,308,018 UART: Disabled attest: DPE valid fail
6,308,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,310,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,750 UART: [rt]cmd =0x494e464f, len=4
6,344,321 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
902,087 UART: [kat] SHA2-256
904,027 UART: [kat] SHA2-384
906,722 UART: [kat] SHA2-512-ACC
908,623 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
923,046 UART: [kat] LMS
1,171,374 UART: [kat] --
1,172,113 UART: [cold-reset] ++
1,172,687 UART: [fht] FHT @ 0x50003400
1,175,430 UART: [idev] ++
1,175,598 UART: [idev] CDI.KEYID = 6
1,175,958 UART: [idev] SUBJECT.KEYID = 7
1,176,382 UART: [idev] UDS.KEYID = 0
1,176,727 ready_for_fw is high
1,176,727 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,022 UART: [idev] Erasing UDS.KEYID = 0
1,200,541 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,878 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,758 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,241 >>> mbox cmd response: success
2,315,241 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,316,477 UART: [afmc] ++
2,316,645 UART: [afmc] CDI.KEYID = 6
2,317,007 UART: [afmc] SUBJECT.KEYID = 7
2,317,432 UART: [afmc] AUTHORITY.KEYID = 5
2,352,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,788 UART: [afmc] --
2,395,780 UART: [cold-reset] --
2,396,518 UART: [state] Locking Datavault
2,397,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,313 UART: [state] Locking ICCM
2,398,849 UART: [exit] Launching FMC @ 0x40000130
2,404,178 UART:
2,404,194 UART: Running Caliptra FMC ...
2,404,602 UART:
2,404,656 UART: [state] CFI Enabled
2,414,867 UART: [fht] FMC Alias Private Key: 7
2,523,172 UART: [art] Extend RT PCRs Done
2,523,600 UART: [art] Lock RT PCRs Done
2,524,796 UART: [art] Populate DV Done
2,533,045 UART: [fht] FMC Alias Private Key: 7
2,534,105 UART: [art] Derive CDI
2,534,385 UART: [art] Store in in slot 0x4
2,620,146 UART: [art] Derive Key Pair
2,620,506 UART: [art] Store priv key in slot 0x5
2,633,896 UART: [art] Derive Key Pair - Done
2,648,522 UART: [art] Signing Cert with AUTHO
2,649,002 UART: RITY.KEYID = 7
2,664,260 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,025 UART: [art] PUB.X = DF1C0E97846DB050FE4FF0CB4B9A59C54EA8AACB9752453A451F490C9738F4DEEE2CBBE1D1E474168FA3D4A47FA4B1CB
2,671,815 UART: [art] PUB.Y = 0A82D1AD05EB573FF39E4FC5605FB479FBBF139615DC6CAE81AB23A42BD0549AF6023E416F3D1AF0C724C770A81A62EF
2,678,774 UART: [art] SIG.R = DE3020035E767174A4B62B6341B670865734087027176E545856742EF08E642D25CE3138A9A30CDE99363A14D4247F5B
2,685,519 UART: [art] SIG.S = 84FF0805CB649603C6A7E2834CDF8F7ED5F0DD48FECE54FF3AE21AF468301C882BB6C965ED4C8349CBA6DDB77F03CB16
2,709,202 UART: mbox::rt_entry...
2,709,574 UART: ____ _ _ _ ____ _____
2,710,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,158 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,462 UART: |_|
2,713,774 UART:
2,820,557 UART: [rt] Runtime listening for mailbox commands...
2,825,525 >>> mbox cmd response data (3272 bytes)
2,825,526 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,612 >>> mbox cmd response data (0 bytes)
2,848,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,730 UART:
2,848,746 UART: Running Caliptra ROM ...
2,849,154 UART:
2,849,209 UART: [state] CFI Enabled
2,851,765 UART: [state] LifecycleState = Unprovisioned
2,852,420 UART: [state] DebugLocked = No
2,852,946 UART: [state] WD Timer not started. Device not locked for debugging
2,854,096 UART: [kat] SHA2-256
3,659,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,871 UART: [kat] ++
3,664,023 UART: [kat] sha1
3,668,443 UART: [kat] SHA2-256
3,670,383 UART: [kat] SHA2-384
3,673,090 UART: [kat] SHA2-512-ACC
3,674,990 UART: [kat] ECC-384
3,684,545 UART: [kat] HMAC-384Kdf
3,689,097 UART: [kat] LMS
3,937,425 UART: [kat] --
3,938,367 UART: [update-reset] ++
5,249,945 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,046 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,400,870 >>> mbox cmd response: success
5,401,215 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,229 UART: [update-reset Success] --
5,410,300 UART: [state] Locking Datavault
5,411,074 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,678 UART: [state] Locking ICCM
5,412,344 UART: [exit] Launching FMC @ 0x40000130
5,417,673 UART:
5,417,689 UART: Running Caliptra FMC ...
5,418,097 UART:
5,418,151 UART: [state] CFI Enabled
5,507,232 UART: [art] Extend RT PCRs Done
5,507,660 UART: [art] Lock RT PCRs Done
5,508,947 UART: [art] Populate DV Done
5,517,414 UART: [fht] FMC Alias Private Key: 7
5,518,342 UART: [art] Derive CDI
5,518,622 UART: [art] Store in in slot 0x4
5,604,205 UART: [art] Derive Key Pair
5,604,565 UART: [art] Store priv key in slot 0x5
5,617,531 UART: [art] Derive Key Pair - Done
5,632,342 UART: [art] Signing Cert with AUTHO
5,632,822 UART: RITY.KEYID = 7
5,647,744 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,509 UART: [art] PUB.X = D4E4AFD53E414AEFB765581F2D5D5BC47453CC7A6F6C41A3ED7C4FBC9AC979B2629EAED49298FEE3A62C7BC51E837644
5,655,301 UART: [art] PUB.Y = 1B0B0C5A9B20009334A4E70E93BABC6339E857BB8BAB62F0578FF5D5D0CBA26FD75CCA3BE09BD63408D1777D1A626BF6
5,662,235 UART: [art] SIG.R = 0DAD0CFF3FFF377D93EAB1AECEBE1834AFD70052E401E89AE0AAB14437177F44177BD4010DF999435DB6BBC3FFC94374
5,668,990 UART: [art] SIG.S = BA0E8C7220C7F8E4874205466ED6D2E9857BD60501AE8328FC3B7F9EB09A5498D599440FF9815C72BEBF291865D6B26B
5,693,126 UART: Caliptra RT
5,693,379 UART: [state] CFI Enabled
5,977,496 UART: Disabled attest: DPE valid fail
5,978,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,979,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,054 UART: [rt]cmd =0x494e464f, len=4
6,013,767 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,441 ready_for_fw is high
1,060,441 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,002 >>> mbox cmd response: success
2,165,002 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,396 UART:
2,226,412 UART: Running Caliptra FMC ...
2,226,820 UART:
2,226,874 UART: [state] CFI Enabled
2,237,563 UART: [fht] FMC Alias Private Key: 7
2,345,720 UART: [art] Extend RT PCRs Done
2,346,148 UART: [art] Lock RT PCRs Done
2,347,776 UART: [art] Populate DV Done
2,356,201 UART: [fht] FMC Alias Private Key: 7
2,357,209 UART: [art] Derive CDI
2,357,489 UART: [art] Store in in slot 0x4
2,443,640 UART: [art] Derive Key Pair
2,444,000 UART: [art] Store priv key in slot 0x5
2,456,944 UART: [art] Derive Key Pair - Done
2,471,771 UART: [art] Signing Cert with AUTHO
2,472,251 UART: RITY.KEYID = 7
2,487,813 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,578 UART: [art] PUB.X = D52126338BEBA51F2CBF8658F9A0E4148DF2B916CF10BE640595785A9A066EDC13B45324E8F2AC21B74D5FA0416F85F6
2,495,350 UART: [art] PUB.Y = 4389877D1189A4DCEE6973C578D8C614FAF8F3BC8031D33B3E30C94528E3ABC65F3532D22F6829346AAA723FECB8A237
2,502,306 UART: [art] SIG.R = 408E0F7AF886FEFC287202D0B41221DD14F3DE176D766732579F7A3BF262360BA33F843A6C611D538366E38FC3F80A13
2,509,064 UART: [art] SIG.S = 1F667A4F2C427D5E42D63BC9716013105560B371CC732828214D0F5F5C9C416C877F21423D1CB1F1B37C8E24F1C018F8
2,532,666 UART: mbox::rt_entry...
2,533,038 UART: ____ _ _ _ ____ _____
2,533,822 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,622 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,390 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,158 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,926 UART: |_|
2,537,238 UART:
2,643,364 UART: [rt] Runtime listening for mailbox commands...
2,648,332 >>> mbox cmd response data (3272 bytes)
2,648,333 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,419 >>> mbox cmd response data (0 bytes)
2,671,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,108,170 >>> mbox cmd response: success
5,121,346 UART:
5,121,362 UART: Running Caliptra FMC ...
5,121,770 UART:
5,121,824 UART: [state] CFI Enabled
5,210,719 UART: [art] Extend RT PCRs Done
5,211,147 UART: [art] Lock RT PCRs Done
5,212,484 UART: [art] Populate DV Done
5,220,745 UART: [fht] FMC Alias Private Key: 7
5,221,763 UART: [art] Derive CDI
5,222,043 UART: [art] Store in in slot 0x4
5,307,604 UART: [art] Derive Key Pair
5,307,964 UART: [art] Store priv key in slot 0x5
5,322,062 UART: [art] Derive Key Pair - Done
5,337,080 UART: [art] Signing Cert with AUTHO
5,337,560 UART: RITY.KEYID = 7
5,352,430 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,195 UART: [art] PUB.X = 098D44261AF869901E635DC6C024C5B9E27A6D597E78AB6C47EF520FA3C42C9047A8BAC125325D71F879B457FF2D845E
5,359,963 UART: [art] PUB.Y = 8944EC3EA30C18AAEBA2085A4BEC36771D23E744CAB94924DA5B9C0CF5CD403678F17CDC557E9752DC0A74E45DCFA6FE
5,366,923 UART: [art] SIG.R = EA7DD10C75A3234D3B00A3126364ACB9C734177EF581C160A4E5A3521446CCE20DE9B52BCE709DC9461C5E0B189D612E
5,373,670 UART: [art] SIG.S = B73C03FFD5892C42FDA0529F51CD2A37D67A1D03D9145600ADB3F5BF6534DBB10875EE9160CF5A605FD93457A4D559F5
5,396,916 UART: Caliptra RT
5,397,169 UART: [state] CFI Enabled
5,678,559 UART: Disabled attest: DPE valid fail
5,679,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,680,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,710,603 UART: [rt]cmd =0x494e464f, len=4
5,714,344 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,903 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = No
87,252 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [kat] SHA2-256
894,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,236 UART: [kat] ++
898,388 UART: [kat] sha1
902,566 UART: [kat] SHA2-256
904,506 UART: [kat] SHA2-384
907,301 UART: [kat] SHA2-512-ACC
909,202 UART: [kat] ECC-384
918,817 UART: [kat] HMAC-384Kdf
923,467 UART: [kat] LMS
1,171,795 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,092 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,176,948 ready_for_fw is high
1,176,948 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,113 UART: [idev] Erasing UDS.KEYID = 0
1,202,268 UART: [idev] Sha1 KeyId Algorithm
1,210,780 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,190 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,510 UART: [ldev] --
1,283,985 UART: [fwproc] Wait for Commands...
1,284,747 UART: [fwproc] Recv command 0x46574c44
1,285,475 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,204,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,433 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,758 >>> mbox cmd response: success
2,315,758 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,316,906 UART: [afmc] ++
2,317,074 UART: [afmc] CDI.KEYID = 6
2,317,436 UART: [afmc] SUBJECT.KEYID = 7
2,317,861 UART: [afmc] AUTHORITY.KEYID = 5
2,353,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,629 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,457 UART: [afmc] --
2,396,481 UART: [cold-reset] --
2,397,397 UART: [state] Locking Datavault
2,398,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,404 UART: [state] Locking ICCM
2,400,040 UART: [exit] Launching FMC @ 0x40000130
2,405,369 UART:
2,405,385 UART: Running Caliptra FMC ...
2,405,793 UART:
2,405,936 UART: [state] CFI Enabled
2,416,749 UART: [fht] FMC Alias Private Key: 7
2,524,368 UART: [art] Extend RT PCRs Done
2,524,796 UART: [art] Lock RT PCRs Done
2,526,118 UART: [art] Populate DV Done
2,534,175 UART: [fht] FMC Alias Private Key: 7
2,535,141 UART: [art] Derive CDI
2,535,421 UART: [art] Store in in slot 0x4
2,621,072 UART: [art] Derive Key Pair
2,621,432 UART: [art] Store priv key in slot 0x5
2,634,614 UART: [art] Derive Key Pair - Done
2,649,643 UART: [art] Signing Cert with AUTHO
2,650,123 UART: RITY.KEYID = 7
2,665,373 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,138 UART: [art] PUB.X = 3C2379AFD12670AC3A6CF7BA55258382EF7CA995954EA6B146471A0FEDF6F9C1DBBF8B2C4FF9A0FB4A045A6E38A28691
2,672,920 UART: [art] PUB.Y = A0BA74339BB428341D90921F90F017B6ED9C308C6CC591045388ABDE207E20CD74C22625E2C3EB105F2901B22412B8D7
2,679,864 UART: [art] SIG.R = 3E53D3A87529624A6382F00244119E169054F2E8F1960D8BA5034806887441EBC07EF75E56845FB90E9DA7D92503A31E
2,686,606 UART: [art] SIG.S = 27F9CBE07F5A793D0A07E0B80B56FB80A22516603D00ACB341C4D80FC8C24C482FF523CB59D046670B7E320B8955E83B
2,710,557 UART: mbox::rt_entry...
2,710,929 UART: ____ _ _ _ ____ _____
2,711,713 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,049 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,817 UART: |_|
2,715,129 UART:
2,821,099 UART: [rt] Runtime listening for mailbox commands...
2,826,067 >>> mbox cmd response data (3272 bytes)
2,826,068 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,849,154 >>> mbox cmd response data (0 bytes)
2,849,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,849,272 UART:
2,849,288 UART: Running Caliptra ROM ...
2,849,696 UART:
2,849,838 UART: [state] CFI Enabled
2,852,414 UART: [state] LifecycleState = Unprovisioned
2,853,069 UART: [state] DebugLocked = No
2,853,623 UART: [state] WD Timer not started. Device not locked for debugging
2,854,879 UART: [kat] SHA2-256
3,660,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,654 UART: [kat] ++
3,664,806 UART: [kat] sha1
3,668,922 UART: [kat] SHA2-256
3,670,862 UART: [kat] SHA2-384
3,673,725 UART: [kat] SHA2-512-ACC
3,675,625 UART: [kat] ECC-384
3,685,780 UART: [kat] HMAC-384Kdf
3,690,454 UART: [kat] LMS
3,938,782 UART: [kat] --
3,939,502 UART: [update-reset] ++
5,252,564 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,253,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,403,389 >>> mbox cmd response: success
5,403,724 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,738 UART: [update-reset Success] --
5,412,805 UART: [state] Locking Datavault
5,413,799 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,403 UART: [state] Locking ICCM
5,414,991 UART: [exit] Launching FMC @ 0x40000130
5,420,320 UART:
5,420,336 UART: Running Caliptra FMC ...
5,420,744 UART:
5,420,887 UART: [state] CFI Enabled
5,510,440 UART: [art] Extend RT PCRs Done
5,510,868 UART: [art] Lock RT PCRs Done
5,512,305 UART: [art] Populate DV Done
5,520,548 UART: [fht] FMC Alias Private Key: 7
5,521,608 UART: [art] Derive CDI
5,521,888 UART: [art] Store in in slot 0x4
5,607,527 UART: [art] Derive Key Pair
5,607,887 UART: [art] Store priv key in slot 0x5
5,621,231 UART: [art] Derive Key Pair - Done
5,636,268 UART: [art] Signing Cert with AUTHO
5,636,748 UART: RITY.KEYID = 7
5,651,542 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,307 UART: [art] PUB.X = 306F0AE189EEC2FE9B6D171B7CC48463B72A7AB3896325C75AE51FEC4FDC20EA92C1774F9FA7A76E1058EEEAAA3F5AE0
5,659,098 UART: [art] PUB.Y = 313C7E7A3E9B362A4D1ADF48DB4279E88748B533D5750ACB39023A3E65C1813FD1BA3608CAE79ABB4BDFEC647E361F83
5,666,053 UART: [art] SIG.R = BA761C91FF08BE97537FA72CBC3C867E503E98A1A3FCB4FF2D759ED54C6B5DEC74FB505688B606C71289E5C2BA65DF77
5,672,835 UART: [art] SIG.S = 8A719FD949069274CF5D1EE753D659FF336773D42883875A7CD8918F60E349EF16EBA6CC467B197F9393831CC12062DD
5,697,175 UART: Caliptra RT
5,697,520 UART: [state] CFI Enabled
5,982,386 UART: Disabled attest: DPE valid fail
5,982,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,984,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,332 UART: [rt]cmd =0x494e464f, len=4
6,018,023 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,054 ready_for_fw is high
1,060,054 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,387 >>> mbox cmd response: success
2,164,387 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,361 UART:
2,226,377 UART: Running Caliptra FMC ...
2,226,785 UART:
2,226,928 UART: [state] CFI Enabled
2,237,625 UART: [fht] FMC Alias Private Key: 7
2,345,256 UART: [art] Extend RT PCRs Done
2,345,684 UART: [art] Lock RT PCRs Done
2,347,282 UART: [art] Populate DV Done
2,355,555 UART: [fht] FMC Alias Private Key: 7
2,356,613 UART: [art] Derive CDI
2,356,893 UART: [art] Store in in slot 0x4
2,442,936 UART: [art] Derive Key Pair
2,443,296 UART: [art] Store priv key in slot 0x5
2,456,302 UART: [art] Derive Key Pair - Done
2,471,046 UART: [art] Signing Cert with AUTHO
2,471,526 UART: RITY.KEYID = 7
2,486,720 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,485 UART: [art] PUB.X = 5D13D32955A9255B4CEF63E6B599C5A9A4BE806FB70805B5FB348A08C3B29B1E11E9225724D4C2A6F4396E4645BBA850
2,494,250 UART: [art] PUB.Y = E13A976460F193D87E4B6BF4B3C1C9D748C65CF82F163EAC1ADF9C8BF2C8015FE2B53731DCE010D0E5F799A428324CC7
2,501,211 UART: [art] SIG.R = 2B3A960674ADCB2751B924447E3A52D05E135B81B5AE94BA36CAB10B2E3EEB6E104EA6FBBAFF80A89492C7E3CEFBBC49
2,507,999 UART: [art] SIG.S = 74D14A8009771EA9FFAF57CC976377135AF58C5C4CAF982CD127FEA433A4B722096EB979D6D636BBD73683FF03EF0112
2,531,684 UART: mbox::rt_entry...
2,532,056 UART: ____ _ _ _ ____ _____
2,532,840 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,640 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,408 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,176 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,944 UART: |_|
2,536,256 UART:
2,643,368 UART: [rt] Runtime listening for mailbox commands...
2,648,336 >>> mbox cmd response data (3272 bytes)
2,648,337 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,423 >>> mbox cmd response data (0 bytes)
2,671,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,109,031 >>> mbox cmd response: success
5,122,763 UART:
5,122,779 UART: Running Caliptra FMC ...
5,123,187 UART:
5,123,330 UART: [state] CFI Enabled
5,212,667 UART: [art] Extend RT PCRs Done
5,213,095 UART: [art] Lock RT PCRs Done
5,214,012 UART: [art] Populate DV Done
5,222,223 UART: [fht] FMC Alias Private Key: 7
5,223,151 UART: [art] Derive CDI
5,223,431 UART: [art] Store in in slot 0x4
5,309,258 UART: [art] Derive Key Pair
5,309,618 UART: [art] Store priv key in slot 0x5
5,323,036 UART: [art] Derive Key Pair - Done
5,337,863 UART: [art] Signing Cert with AUTHO
5,338,343 UART: RITY.KEYID = 7
5,353,287 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,052 UART: [art] PUB.X = 2C4824C70A2DEEBFAABE6E133D54FA796E0C2F6A2F575E1C32DF941DE0A6C9FA2900AAFA1BDCA223D781CDE9CEBE7D12
5,360,828 UART: [art] PUB.Y = EC8F039A4F8146A338DDAD3240FC745BCF3466E2F9392D55B963C717F3C21F92A69B633E4C4625165EEC3277B331A85F
5,367,779 UART: [art] SIG.R = 5D22C8B82060331DC8B8A0B29B13BA3840D2C29597FF506245AFE09C27C38BC2D85E5D5C15F5D38351B02D78842F2308
5,374,546 UART: [art] SIG.S = 526243FDE82EBE1B6EE968957B948F29F8E5EDC1AE11B50BF5E1825A66AF04F85E7A4D79B675F2B17B241A1C953BBB20
5,398,297 UART: Caliptra RT
5,398,642 UART: [state] CFI Enabled
5,683,401 UART: Disabled attest: DPE valid fail
5,683,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,685,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,715,761 UART: [rt]cmd =0x494e464f, len=4
5,719,610 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,105 UART: [idev] ++
1,173,273 UART: [idev] CDI.KEYID = 6
1,173,634 UART: [idev] SUBJECT.KEYID = 7
1,174,059 UART: [idev] UDS.KEYID = 0
1,174,405 ready_for_fw is high
1,174,405 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,199,063 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,476 UART: [ldev] Erasing FE.KEYID = 1
1,242,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,121 UART: [fwproc] Recv command 0x46574c44
1,282,854 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,761 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,043 >>> mbox cmd response: success
2,313,043 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,092 UART: [afmc] ++
2,314,260 UART: [afmc] CDI.KEYID = 6
2,314,623 UART: [afmc] SUBJECT.KEYID = 7
2,315,049 UART: [afmc] AUTHORITY.KEYID = 5
2,350,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,512 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,114 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,859 UART: [afmc] --
2,393,875 UART: [cold-reset] --
2,394,829 UART: [state] Locking Datavault
2,395,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,448 UART: [state] Locking ICCM
2,397,032 UART: [exit] Launching FMC @ 0x40000130
2,402,361 UART:
2,402,377 UART: Running Caliptra FMC ...
2,402,785 UART:
2,402,839 UART: [state] CFI Enabled
2,412,866 UART: [fht] FMC Alias Private Key: 7
2,520,911 UART: [art] Extend RT PCRs Done
2,521,339 UART: [art] Lock RT PCRs Done
2,523,171 UART: [art] Populate DV Done
2,531,452 UART: [fht] FMC Alias Private Key: 7
2,532,398 UART: [art] Derive CDI
2,532,678 UART: [art] Store in in slot 0x4
2,618,249 UART: [art] Derive Key Pair
2,618,609 UART: [art] Store priv key in slot 0x5
2,631,903 UART: [art] Derive Key Pair - Done
2,646,567 UART: [art] Signing Cert with AUTHO
2,647,047 UART: RITY.KEYID = 7
2,661,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,744 UART: [art] PUB.X = FA8773D1283265596777231276EB9233DA86E88E94826D910B9FA84EBAAFF78B31CD1711029F16BB50D864E1117D2DBF
2,669,508 UART: [art] PUB.Y = FB1EE8D7E221CB3CCAFC457148526DAA5D50872DA35E1C5024A1E4B44919C613929326826E5090E52DC61B13E37AE039
2,676,462 UART: [art] SIG.R = BF352B6070C5894CDD20F1A3BEA2A0968D19FFA4AA84B5022E23C445D4CE7D9AE0A80CB0742D6C5932C603A80C457AF0
2,683,234 UART: [art] SIG.S = 4A0A2EB02F3EE521448FF438702FA7F26B72C3D43337C078EC52928F54F115FB7A82C3156AA7E175F136D30292AB28FE
2,706,915 UART: mbox::rt_entry...
2,707,287 UART: ____ _ _ _ ____ _____
2,708,071 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,871 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,639 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,407 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,175 UART: |_|
2,711,487 UART:
2,818,053 UART: [rt] Runtime listening for mailbox commands...
2,823,021 >>> mbox cmd response data (3272 bytes)
2,823,022 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,108 >>> mbox cmd response data (0 bytes)
2,846,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,846,226 UART:
2,846,242 UART: Running Caliptra ROM ...
2,846,650 UART:
2,846,705 UART: [state] CFI Enabled
2,849,501 UART: [state] LifecycleState = Unprovisioned
2,850,156 UART: [state] DebugLocked = No
2,850,784 UART: [state] WD Timer not started. Device not locked for debugging
2,852,122 UART: [kat] SHA2-256
3,655,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,801 UART: [kat] ++
3,659,953 UART: [kat] sha1
3,664,351 UART: [kat] SHA2-256
3,666,291 UART: [kat] SHA2-384
3,668,998 UART: [kat] SHA2-512-ACC
3,670,898 UART: [kat] ECC-384
3,680,699 UART: [kat] HMAC-384Kdf
3,685,153 UART: [kat] LMS
3,933,465 UART: [kat] --
3,934,459 UART: [update-reset] ++
5,246,530 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,497 >>> mbox cmd response: success
5,397,656 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,670 UART: [update-reset Success] --
5,406,561 UART: [state] Locking Datavault
5,407,193 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,797 UART: [state] Locking ICCM
5,408,247 UART: [exit] Launching FMC @ 0x40000130
5,413,576 UART:
5,413,592 UART: Running Caliptra FMC ...
5,414,000 UART:
5,414,054 UART: [state] CFI Enabled
5,502,859 UART: [art] Extend RT PCRs Done
5,503,287 UART: [art] Lock RT PCRs Done
5,504,758 UART: [art] Populate DV Done
5,512,661 UART: [fht] FMC Alias Private Key: 7
5,513,603 UART: [art] Derive CDI
5,513,883 UART: [art] Store in in slot 0x4
5,599,612 UART: [art] Derive Key Pair
5,599,972 UART: [art] Store priv key in slot 0x5
5,613,158 UART: [art] Derive Key Pair - Done
5,628,273 UART: [art] Signing Cert with AUTHO
5,628,753 UART: RITY.KEYID = 7
5,643,891 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,656 UART: [art] PUB.X = F2419D081AF9C59A33D91519E68E9400033B7D03002E9692CB154E291462231AC81BFD5027D1526EC383F594B71794C2
5,651,363 UART: [art] PUB.Y = EB76468EF84FE6449A81A2F0E79A5FFB57E7C65FDE4B72B01069A870C3AE3FEA9953B91255F639B832C36EA644DAE01A
5,658,327 UART: [art] SIG.R = 2069447696756A6EA46F35BD7177D89E57F6EB64F453339F0995BB70B92638F5313E8331737BCB760E4A9CA1F0B11A72
5,665,085 UART: [art] SIG.S = F059936D12625E749ADE6DC85F84FC8E8E35CBC00426B75B9E5DE9687E6B9B266BBE2E0BC71A192D14DEF178BAE6CFAF
5,688,766 UART: Caliptra RT
5,689,019 UART: [state] CFI Enabled
5,973,708 UART: Disabled attest: DPE valid fail
5,974,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,975,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,830 UART: [rt]cmd =0x494e464f, len=4
6,009,577 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,042 ready_for_fw is high
1,055,042 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,849 >>> mbox cmd response: success
2,159,849 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,221,183 UART:
2,221,199 UART: Running Caliptra FMC ...
2,221,607 UART:
2,221,661 UART: [state] CFI Enabled
2,232,404 UART: [fht] FMC Alias Private Key: 7
2,340,037 UART: [art] Extend RT PCRs Done
2,340,465 UART: [art] Lock RT PCRs Done
2,341,987 UART: [art] Populate DV Done
2,350,022 UART: [fht] FMC Alias Private Key: 7
2,350,978 UART: [art] Derive CDI
2,351,258 UART: [art] Store in in slot 0x4
2,437,083 UART: [art] Derive Key Pair
2,437,443 UART: [art] Store priv key in slot 0x5
2,451,037 UART: [art] Derive Key Pair - Done
2,465,751 UART: [art] Signing Cert with AUTHO
2,466,231 UART: RITY.KEYID = 7
2,481,249 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,014 UART: [art] PUB.X = 20818FAB185A408E7A6B49332DC8817B76EA84B1101C50FF66118244C366B8A060DA679459E3F82A526131E31707AFF9
2,488,775 UART: [art] PUB.Y = AD73124B1CF3FBD0C80CB46B8F53C572B12861CB3A516ADAA50DADC6E7A3F93B569BE757908D0B36057DEF09254B3EC7
2,495,728 UART: [art] SIG.R = 69846F53EA47EBF83FB9B7B70271A02876911CF3D6CB1DE90B41F0E59914B7CC2959A3DEC0F62AE9AC6BC01D5EBAE886
2,502,510 UART: [art] SIG.S = 4E0BBAF2CC70DA6E018E1ECA47C95585CA4975B302B436E7649C64B5C944221F88F79377C1E241C7DC0EFEB96AC5521C
2,526,931 UART: mbox::rt_entry...
2,527,303 UART: ____ _ _ _ ____ _____
2,528,087 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,655 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,423 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,191 UART: |_|
2,531,503 UART:
2,638,287 UART: [rt] Runtime listening for mailbox commands...
2,643,255 >>> mbox cmd response data (3272 bytes)
2,643,256 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,342 >>> mbox cmd response data (0 bytes)
2,666,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,098,192 >>> mbox cmd response: success
5,111,568 UART:
5,111,584 UART: Running Caliptra FMC ...
5,111,992 UART:
5,112,046 UART: [state] CFI Enabled
5,201,155 UART: [art] Extend RT PCRs Done
5,201,583 UART: [art] Lock RT PCRs Done
5,202,804 UART: [art] Populate DV Done
5,211,119 UART: [fht] FMC Alias Private Key: 7
5,212,193 UART: [art] Derive CDI
5,212,473 UART: [art] Store in in slot 0x4
5,298,076 UART: [art] Derive Key Pair
5,298,436 UART: [art] Store priv key in slot 0x5
5,311,832 UART: [art] Derive Key Pair - Done
5,326,636 UART: [art] Signing Cert with AUTHO
5,327,116 UART: RITY.KEYID = 7
5,342,642 UART: [art] Erasing AUTHORITY.KEYID = 7
5,343,407 UART: [art] PUB.X = BC09FFDFE917D1A3FED8BA3C153E72AFB628B26C6902658EC3447BFA959429AA413C57D4138720292325AB11CF8F8211
5,350,179 UART: [art] PUB.Y = 99B7A6EA6A24B852EB71746327840CFB2D4C883D55F19D9ED9EFF7DEA2A3E053E2F2860DBD17B8F48400D62F52F6229D
5,357,113 UART: [art] SIG.R = 1EF124620F9E014BC7D53CED22441E3DA72DD486D5258474C99EEEDCBA2D7B17F8D4D91DF65B3CDCF2AB8A8D7E8BAAAF
5,363,907 UART: [art] SIG.S = 28CF23AA25B05467F520163E86A8D8F7B51B8D9E3AC7B90CE775328DBDF518E5D7C5C32580CBEDCDA8052FE50165F982
5,387,149 UART: Caliptra RT
5,387,402 UART: [state] CFI Enabled
5,670,985 UART: Disabled attest: DPE valid fail
5,671,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,672,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,703,271 UART: [rt]cmd =0x494e464f, len=4
5,706,750 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,669 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,170,076 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,174,154 ready_for_fw is high
1,174,154 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,291 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,314 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,642 >>> mbox cmd response: success
2,313,642 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,743 UART: [afmc] ++
2,314,911 UART: [afmc] CDI.KEYID = 6
2,315,274 UART: [afmc] SUBJECT.KEYID = 7
2,315,700 UART: [afmc] AUTHORITY.KEYID = 5
2,351,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,875 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,790 UART: [afmc] --
2,394,894 UART: [cold-reset] --
2,395,584 UART: [state] Locking Datavault
2,396,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,499 UART: [state] Locking ICCM
2,397,953 UART: [exit] Launching FMC @ 0x40000130
2,403,282 UART:
2,403,298 UART: Running Caliptra FMC ...
2,403,706 UART:
2,403,849 UART: [state] CFI Enabled
2,414,340 UART: [fht] FMC Alias Private Key: 7
2,522,265 UART: [art] Extend RT PCRs Done
2,522,693 UART: [art] Lock RT PCRs Done
2,524,319 UART: [art] Populate DV Done
2,532,468 UART: [fht] FMC Alias Private Key: 7
2,533,558 UART: [art] Derive CDI
2,533,838 UART: [art] Store in in slot 0x4
2,619,895 UART: [art] Derive Key Pair
2,620,255 UART: [art] Store priv key in slot 0x5
2,632,945 UART: [art] Derive Key Pair - Done
2,648,093 UART: [art] Signing Cert with AUTHO
2,648,573 UART: RITY.KEYID = 7
2,663,713 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,478 UART: [art] PUB.X = 1B9E3AB6EF06D35514BD95272FCC722CD03A36473F51F57C365B02C689B85137DA1766A74835D355870F2D4E13AF8FB9
2,671,241 UART: [art] PUB.Y = FE23FCAD6B840B78A7E9AA61F6C84E74EB47052CAF40D0FD3D7BBC4C9E20AA60538C72438597176646B6D2A348162E3B
2,678,197 UART: [art] SIG.R = A2ACBF59A686B30498312F2C8193942D0A1C64D65DA9666ABAB92DF24065AE08C7266F51BC2CF2941147A0CC1256E79B
2,684,964 UART: [art] SIG.S = F982CB2F5E1A72070E8A6F95093AE287E3261AF0AD67163AEC5EE4BAFAB0C87918D14CB785E52F7ED91054A331D6671C
2,709,248 UART: mbox::rt_entry...
2,709,620 UART: ____ _ _ _ ____ _____
2,710,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,204 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,508 UART: |_|
2,713,820 UART:
2,819,949 UART: [rt] Runtime listening for mailbox commands...
2,824,917 >>> mbox cmd response data (3272 bytes)
2,824,918 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,004 >>> mbox cmd response data (0 bytes)
2,848,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,122 UART:
2,848,138 UART: Running Caliptra ROM ...
2,848,546 UART:
2,848,688 UART: [state] CFI Enabled
2,851,686 UART: [state] LifecycleState = Unprovisioned
2,852,341 UART: [state] DebugLocked = No
2,852,999 UART: [state] WD Timer not started. Device not locked for debugging
2,854,183 UART: [kat] SHA2-256
3,657,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,862 UART: [kat] ++
3,662,014 UART: [kat] sha1
3,666,174 UART: [kat] SHA2-256
3,668,114 UART: [kat] SHA2-384
3,670,919 UART: [kat] SHA2-512-ACC
3,672,819 UART: [kat] ECC-384
3,683,090 UART: [kat] HMAC-384Kdf
3,687,624 UART: [kat] LMS
3,935,936 UART: [kat] --
3,936,728 UART: [update-reset] ++
5,248,929 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,118 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,399,942 >>> mbox cmd response: success
5,400,185 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,199 UART: [update-reset Success] --
5,409,320 UART: [state] Locking Datavault
5,410,196 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,800 UART: [state] Locking ICCM
5,411,318 UART: [exit] Launching FMC @ 0x40000130
5,416,647 UART:
5,416,663 UART: Running Caliptra FMC ...
5,417,071 UART:
5,417,214 UART: [state] CFI Enabled
5,506,607 UART: [art] Extend RT PCRs Done
5,507,035 UART: [art] Lock RT PCRs Done
5,508,430 UART: [art] Populate DV Done
5,516,859 UART: [fht] FMC Alias Private Key: 7
5,517,939 UART: [art] Derive CDI
5,518,219 UART: [art] Store in in slot 0x4
5,603,720 UART: [art] Derive Key Pair
5,604,080 UART: [art] Store priv key in slot 0x5
5,617,964 UART: [art] Derive Key Pair - Done
5,632,814 UART: [art] Signing Cert with AUTHO
5,633,294 UART: RITY.KEYID = 7
5,648,546 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,311 UART: [art] PUB.X = 062F9DD999733C120297A52F29031A997143789879792CA70D67577B0428FB514E43F73CC66FE09BAB1651C50CF67FBE
5,656,057 UART: [art] PUB.Y = 6969EB362B5D71034D91F58F58AA625CCB7C19DBBEB0CF2351982F63E06AF9764B34D4A643F62052AB05A63BC2B78A8D
5,663,011 UART: [art] SIG.R = 4AC1C7FC4BA57E8E11340B75C02894629C65B5BB8D92993B25C38054DB0FE2A2725F419047BA480DEEA607E3CBDAEC09
5,669,778 UART: [art] SIG.S = 16E05786D1324C2E1BBAC8EFA16D9E1E07FC8855CDC402723318267F3C6A1D7070ADC97F8986F3F0DDCBBA6B99ED3608
5,693,668 UART: Caliptra RT
5,694,013 UART: [state] CFI Enabled
5,977,996 UART: Disabled attest: DPE valid fail
5,978,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,980,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,428 UART: [rt]cmd =0x494e464f, len=4
6,014,183 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,085 ready_for_fw is high
1,056,085 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,934 >>> mbox cmd response: success
2,161,934 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,796 UART:
2,223,812 UART: Running Caliptra FMC ...
2,224,220 UART:
2,224,363 UART: [state] CFI Enabled
2,234,992 UART: [fht] FMC Alias Private Key: 7
2,343,383 UART: [art] Extend RT PCRs Done
2,343,811 UART: [art] Lock RT PCRs Done
2,345,151 UART: [art] Populate DV Done
2,353,390 UART: [fht] FMC Alias Private Key: 7
2,354,480 UART: [art] Derive CDI
2,354,760 UART: [art] Store in in slot 0x4
2,440,613 UART: [art] Derive Key Pair
2,440,973 UART: [art] Store priv key in slot 0x5
2,453,973 UART: [art] Derive Key Pair - Done
2,468,907 UART: [art] Signing Cert with AUTHO
2,469,387 UART: RITY.KEYID = 7
2,484,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,434 UART: [art] PUB.X = B8AF98CE0A86E31017ADC1D05769C849909E2C00977035DF05C2C43DAF402A2ECD1130C1FF74CBFA1025ED0C28887EAD
2,492,187 UART: [art] PUB.Y = 54E7EA08597E01C35BF9FA528A85B614C678459573C519472E1459829EC9572CE5CFB1C7870A2399A535DE34AC88C50C
2,499,123 UART: [art] SIG.R = A7AD38F6077048CB338B39E30CC26F0B2B813C30E102A8EED8EB94743702D95AB93154BB46853EC1ED15B7E81A461047
2,505,882 UART: [art] SIG.S = E7494CD00331B4BFE2F0863EDD8BCEA67B425454BD32B8C54AB70073E71355DD89FF60CD28199CBEEEA501AEA0E25E39
2,529,679 UART: mbox::rt_entry...
2,530,051 UART: ____ _ _ _ ____ _____
2,530,835 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,635 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,403 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,171 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,939 UART: |_|
2,534,251 UART:
2,640,592 UART: [rt] Runtime listening for mailbox commands...
2,645,560 >>> mbox cmd response data (3272 bytes)
2,645,561 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,647 >>> mbox cmd response data (0 bytes)
2,668,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,100,554 >>> mbox cmd response: success
5,114,136 UART:
5,114,152 UART: Running Caliptra FMC ...
5,114,560 UART:
5,114,703 UART: [state] CFI Enabled
5,203,826 UART: [art] Extend RT PCRs Done
5,204,254 UART: [art] Lock RT PCRs Done
5,205,593 UART: [art] Populate DV Done
5,213,956 UART: [fht] FMC Alias Private Key: 7
5,215,036 UART: [art] Derive CDI
5,215,316 UART: [art] Store in in slot 0x4
5,300,881 UART: [art] Derive Key Pair
5,301,241 UART: [art] Store priv key in slot 0x5
5,314,643 UART: [art] Derive Key Pair - Done
5,329,506 UART: [art] Signing Cert with AUTHO
5,329,986 UART: RITY.KEYID = 7
5,345,226 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,991 UART: [art] PUB.X = AB99E63C4FBD74DC18ACB0026BEE7E88076487C2D123DABD7F1CFCC8BCAA226D2D7B3252E7D9DA13B2EF089156395932
5,352,772 UART: [art] PUB.Y = BF679E228CC329B5C9AB4D81F54972D5128FBFD46AC09A451B25B794CE50971AF39BB629C9E4BA561C7B776BDD6AB2AD
5,359,740 UART: [art] SIG.R = 00A9F7D190153D86863287426D17F5FBCAF17C1AB109E1B6EC725D1BDA6B97A5450D54BA146316438A49F37DEDBBBF4F
5,366,494 UART: [art] SIG.S = 92E5AAD251B1EFF27962F33D26D015273ECECB43F79A28091DB7C622FFCF1AE4AC139A16C669FB6422824D99DC51F7A5
5,390,290 UART: Caliptra RT
5,390,635 UART: [state] CFI Enabled
5,673,963 UART: Disabled attest: DPE valid fail
5,674,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,675,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,705,925 UART: [rt]cmd =0x494e464f, len=4
5,709,658 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,978 UART: [state] LifecycleState = Unprovisioned
86,633 UART: [state] DebugLocked = No
87,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,853 UART: [kat] SHA2-256
882,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,899 UART: [kat] ++
887,051 UART: [kat] sha1
891,269 UART: [kat] SHA2-256
893,207 UART: [kat] SHA2-384
895,846 UART: [kat] SHA2-512-ACC
897,747 UART: [kat] ECC-384
903,410 UART: [kat] HMAC-384Kdf
907,996 UART: [kat] LMS
1,476,192 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 ready_for_fw is high
1,481,041 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,754 UART: [idev] Erasing UDS.KEYID = 0
1,506,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,506 UART: [idev] --
1,515,403 UART: [ldev] ++
1,515,571 UART: [ldev] CDI.KEYID = 6
1,515,934 UART: [ldev] SUBJECT.KEYID = 5
1,516,360 UART: [ldev] AUTHORITY.KEYID = 7
1,516,823 UART: [ldev] FE.KEYID = 1
1,521,689 UART: [ldev] Erasing FE.KEYID = 1
1,546,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,622 UART: [ldev] --
1,585,965 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 78704 bytes
2,477,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,092 >>> mbox cmd response: success
2,617,092 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,194 UART: [afmc] ++
2,618,362 UART: [afmc] CDI.KEYID = 6
2,618,724 UART: [afmc] SUBJECT.KEYID = 7
2,619,149 UART: [afmc] AUTHORITY.KEYID = 5
2,653,814 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,715 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,405 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,268 UART: [afmc] --
2,697,328 UART: [cold-reset] --
2,697,916 UART: [state] Locking Datavault
2,699,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,987 UART: [state] Locking ICCM
2,700,533 UART: [exit] Launching FMC @ 0x40000130
2,705,862 UART:
2,705,878 UART: Running Caliptra FMC ...
2,706,286 UART:
2,706,340 UART: [state] CFI Enabled
2,716,611 UART: [fht] FMC Alias Private Key: 7
2,824,886 UART: [art] Extend RT PCRs Done
2,825,314 UART: [art] Lock RT PCRs Done
2,826,906 UART: [art] Populate DV Done
2,835,187 UART: [fht] FMC Alias Private Key: 7
2,836,267 UART: [art] Derive CDI
2,836,547 UART: [art] Store in in slot 0x4
2,922,134 UART: [art] Derive Key Pair
2,922,494 UART: [art] Store priv key in slot 0x5
2,936,010 UART: [art] Derive Key Pair - Done
2,950,983 UART: [art] Signing Cert with AUTHO
2,951,463 UART: RITY.KEYID = 7
2,966,601 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,366 UART: [art] PUB.X = 7C9817F88D03FD3E02A817BCBD24867E2BC8ED1E83487CCD68A202B663EEA1F926E411F4FF9156DB67DEE3C9CBBE76D6
2,974,147 UART: [art] PUB.Y = E9B1511ECBB6E251834153A732AEB0D600010E3CC237E4D4DE1F45C5F2A87B64364FD56D193FDDA3380509CB80C68598
2,981,069 UART: [art] SIG.R = 265DC1CDDA8002E54D61DC776081AC3B4BF5FDF48F15CF26041AC54068D6AC6122FCEC7D93CDB3861C2BB354A0CBEF16
2,987,855 UART: [art] SIG.S = B04811FD40F03956226B274AA31B880BFE63839E1F8E1D67812E8F2781FE8164ED70277F57453E437DC50BBC3790AFA0
3,011,758 UART: mbox::rt_entry...
3,012,130 UART: ____ _ _ _ ____ _____
3,012,914 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,714 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,482 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,250 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,018 UART: |_|
3,016,330 UART:
3,124,180 UART: [rt] Runtime listening for mailbox commands...
3,129,148 >>> mbox cmd response data (3272 bytes)
3,129,149 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,235 >>> mbox cmd response data (0 bytes)
3,152,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,356 UART:
3,152,372 UART: Running Caliptra ROM ...
3,152,780 UART:
3,152,834 UART: [state] CFI Enabled
3,155,212 UART: [state] LifecycleState = Unprovisioned
3,155,867 UART: [state] DebugLocked = No
3,156,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,157,872 UART: [kat] SHA2-256
3,951,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,955,918 UART: [kat] ++
3,956,070 UART: [kat] sha1
3,960,424 UART: [kat] SHA2-256
3,962,362 UART: [kat] SHA2-384
3,965,045 UART: [kat] SHA2-512-ACC
3,966,945 UART: [kat] ECC-384
3,972,322 UART: [kat] HMAC-384Kdf
3,976,894 UART: [kat] LMS
4,545,090 UART: [kat] --
4,546,129 UART: [update-reset] ++
5,880,115 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,311 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,031,187 >>> mbox cmd response: success
6,031,438 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,452 UART: [update-reset Success] --
6,040,365 UART: [state] Locking Datavault
6,041,079 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,683 UART: [state] Locking ICCM
6,042,193 UART: [exit] Launching FMC @ 0x40000130
6,047,522 UART:
6,047,538 UART: Running Caliptra FMC ...
6,047,946 UART:
6,048,000 UART: [state] CFI Enabled
6,136,547 UART: [art] Extend RT PCRs Done
6,136,975 UART: [art] Lock RT PCRs Done
6,138,242 UART: [art] Populate DV Done
6,146,671 UART: [fht] FMC Alias Private Key: 7
6,147,823 UART: [art] Derive CDI
6,148,103 UART: [art] Store in in slot 0x4
6,233,534 UART: [art] Derive Key Pair
6,233,894 UART: [art] Store priv key in slot 0x5
6,247,080 UART: [art] Derive Key Pair - Done
6,261,791 UART: [art] Signing Cert with AUTHO
6,262,271 UART: RITY.KEYID = 7
6,277,759 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,524 UART: [art] PUB.X = 846B86541FDECCE1B80BEA921F528EB4B580566A2E8C4173541D6DEA18DCCEBD5EAEA417EE864EB071EEEFE48F5EC639
6,285,317 UART: [art] PUB.Y = 8CC06D756C7E5658102AAEC0851FA314817BB23D3A7D526DF6A4B98641EC533F5C0ED867C34B0424E19AEA77E838B3E2
6,292,269 UART: [art] SIG.R = EEEECB9958DF061746189B2798838F2D844370372258256BCC063BC204741A6C98DEF07B91F6B724B2B42CC78EA79CAD
6,299,034 UART: [art] SIG.S = 141177834AE469C413CCCDF0A4A35B9C089DA34F6A77A613703F732BAD9DFCD33F87D0B364FDB3D3B183A45E7BFF44FF
6,322,522 UART: Caliptra RT
6,322,775 UART: [state] CFI Enabled
6,385,416 UART: Disabled attest: DPE valid fail
6,385,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,387,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,417,918 UART: [rt]cmd =0x494e464f, len=4
6,421,637 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,815 ready_for_fw is high
1,362,815 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,052 >>> mbox cmd response: success
2,468,052 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,108 UART:
2,529,124 UART: Running Caliptra FMC ...
2,529,532 UART:
2,529,586 UART: [state] CFI Enabled
2,540,009 UART: [fht] FMC Alias Private Key: 7
2,648,296 UART: [art] Extend RT PCRs Done
2,648,724 UART: [art] Lock RT PCRs Done
2,650,680 UART: [art] Populate DV Done
2,659,007 UART: [fht] FMC Alias Private Key: 7
2,660,177 UART: [art] Derive CDI
2,660,457 UART: [art] Store in in slot 0x4
2,746,430 UART: [art] Derive Key Pair
2,746,790 UART: [art] Store priv key in slot 0x5
2,760,628 UART: [art] Derive Key Pair - Done
2,775,262 UART: [art] Signing Cert with AUTHO
2,775,742 UART: RITY.KEYID = 7
2,790,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,749 UART: [art] PUB.X = C01022E9265B364AC96F4931A06C5703A3D5AF42D2100F8E2ACAE37C99B8591E8010D4F58426A118C422ABDA33FE0546
2,798,512 UART: [art] PUB.Y = 6866D5A0813AC4A7B8D2FEE200037A14A6A84734D197DC8D19F4155262537249FF0C34D5F8F2485E0E2CB8EC3F6C9624
2,805,433 UART: [art] SIG.R = 50C998CF761D52A9873AE8F147B27467BC1DCC869E22E7C9A6102626AECBE7BE2855A281E7A5A7331436D15E7554F68B
2,812,207 UART: [art] SIG.S = 2F7C38FCFCF4FB24632C05458FF8EE16E4E65D90565333FDBD922667C633B06A1429DECD38405F84694675834A34234C
2,836,119 UART: mbox::rt_entry...
2,836,491 UART: ____ _ _ _ ____ _____
2,837,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,379 UART: |_|
2,840,691 UART:
2,947,492 UART: [rt] Runtime listening for mailbox commands...
2,952,460 >>> mbox cmd response data (3272 bytes)
2,952,461 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,547 >>> mbox cmd response data (0 bytes)
2,975,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,737,291 >>> mbox cmd response: success
5,750,294 UART:
5,750,310 UART: Running Caliptra FMC ...
5,750,718 UART:
5,750,772 UART: [state] CFI Enabled
5,839,403 UART: [art] Extend RT PCRs Done
5,839,831 UART: [art] Lock RT PCRs Done
5,841,128 UART: [art] Populate DV Done
5,849,275 UART: [fht] FMC Alias Private Key: 7
5,850,457 UART: [art] Derive CDI
5,850,737 UART: [art] Store in in slot 0x4
5,936,248 UART: [art] Derive Key Pair
5,936,608 UART: [art] Store priv key in slot 0x5
5,949,476 UART: [art] Derive Key Pair - Done
5,964,121 UART: [art] Signing Cert with AUTHO
5,964,601 UART: RITY.KEYID = 7
5,980,075 UART: [art] Erasing AUTHORITY.KEYID = 7
5,980,840 UART: [art] PUB.X = EE69AF8196DDE661F1D3B1313D24B4A8E57B67E4F08F0652D87BCD833861C63E57159D0D451213F52F1CE4C320FE6795
5,987,608 UART: [art] PUB.Y = 700E37461CE04E66E08683FE70A7245560FB67DA7B1A463736766B2965F114C401DBD2DCE9226C259773A9707137AFD8
5,994,546 UART: [art] SIG.R = 40726D9D2466A187D7EE069427ECBFCF414655ABBABBA4D3AEB8DD38A910048D2972EB762659475D52712D9530025A99
6,001,309 UART: [art] SIG.S = 8EE63F180CC2BAA83BDA668A4E20C9A10EFA1D684FEB877F344CCD22370C78C570BD90C49724554F551735A411C9C7B3
6,024,609 UART: Caliptra RT
6,024,862 UART: [state] CFI Enabled
6,087,253 UART: Disabled attest: DPE valid fail
6,087,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,089,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,120,011 UART: [rt]cmd =0x494e464f, len=4
6,123,520 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,892 UART: [kat] SHA2-256
881,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,938 UART: [kat] ++
886,090 UART: [kat] sha1
890,320 UART: [kat] SHA2-256
892,258 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,243 UART: [kat] LMS
1,475,439 UART: [kat] --
1,476,346 UART: [cold-reset] ++
1,476,744 UART: [fht] Storing FHT @ 0x50003400
1,479,591 UART: [idev] ++
1,479,759 UART: [idev] CDI.KEYID = 6
1,480,119 UART: [idev] SUBJECT.KEYID = 7
1,480,543 UART: [idev] UDS.KEYID = 0
1,480,888 ready_for_fw is high
1,480,888 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,089 UART: [idev] Erasing UDS.KEYID = 0
1,505,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,633 UART: [idev] --
1,514,886 UART: [ldev] ++
1,515,054 UART: [ldev] CDI.KEYID = 6
1,515,417 UART: [ldev] SUBJECT.KEYID = 5
1,515,843 UART: [ldev] AUTHORITY.KEYID = 7
1,516,306 UART: [ldev] FE.KEYID = 1
1,521,528 UART: [ldev] Erasing FE.KEYID = 1
1,546,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,477 UART: [ldev] --
1,585,984 UART: [fwproc] Waiting for Commands...
1,586,667 UART: [fwproc] Received command 0x46574c44
1,587,458 UART: [fwproc] Received Image of size 78704 bytes
2,478,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,139 >>> mbox cmd response: success
2,617,139 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,277 UART: [afmc] ++
2,618,445 UART: [afmc] CDI.KEYID = 6
2,618,807 UART: [afmc] SUBJECT.KEYID = 7
2,619,232 UART: [afmc] AUTHORITY.KEYID = 5
2,654,003 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,334 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,024 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,903 UART: [afmc] --
2,696,907 UART: [cold-reset] --
2,697,967 UART: [state] Locking Datavault
2,699,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,928 UART: [state] Locking ICCM
2,700,586 UART: [exit] Launching FMC @ 0x40000130
2,705,915 UART:
2,705,931 UART: Running Caliptra FMC ...
2,706,339 UART:
2,706,482 UART: [state] CFI Enabled
2,717,383 UART: [fht] FMC Alias Private Key: 7
2,825,998 UART: [art] Extend RT PCRs Done
2,826,426 UART: [art] Lock RT PCRs Done
2,828,070 UART: [art] Populate DV Done
2,836,039 UART: [fht] FMC Alias Private Key: 7
2,837,109 UART: [art] Derive CDI
2,837,389 UART: [art] Store in in slot 0x4
2,922,778 UART: [art] Derive Key Pair
2,923,138 UART: [art] Store priv key in slot 0x5
2,936,648 UART: [art] Derive Key Pair - Done
2,951,426 UART: [art] Signing Cert with AUTHO
2,951,906 UART: RITY.KEYID = 7
2,967,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,089 UART: [art] PUB.X = 9D2ECCC7260CA6BBAEF1B1C6BD062E18FCB52A6F2A1F4AED37F3B5C8581048691C7FA1AE2A18176363A02908670F75C2
2,974,863 UART: [art] PUB.Y = 65414B4F73A8082C63AF1B2C74885D100B9C1FAC927CDD3F58855D6E5DC237DFEE64B9B4E277F51B5FBC4C8088C0A627
2,981,819 UART: [art] SIG.R = 5E753881BF37DE5E44B873A7C7F212582E34AB32D90DE81E18B4F8A70D8E5076AD94C522E9731EC3493E1E77287FD71D
2,988,587 UART: [art] SIG.S = DAF0746D3B61F83D9EB4C4356289DBFA20F81E9AA07E70418AA75D5DC206D20A2300F91F69CB86027E66EEEAB09D8CB3
3,012,395 UART: mbox::rt_entry...
3,012,767 UART: ____ _ _ _ ____ _____
3,013,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,351 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,119 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,887 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,655 UART: |_|
3,016,967 UART:
3,124,705 UART: [rt] Runtime listening for mailbox commands...
3,129,673 >>> mbox cmd response data (3272 bytes)
3,129,674 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,760 >>> mbox cmd response data (0 bytes)
3,152,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,881 UART:
3,152,897 UART: Running Caliptra ROM ...
3,153,305 UART:
3,153,446 UART: [state] CFI Enabled
3,156,178 UART: [state] LifecycleState = Unprovisioned
3,156,833 UART: [state] DebugLocked = No
3,157,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,159,262 UART: [kat] SHA2-256
3,953,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,957,308 UART: [kat] ++
3,957,460 UART: [kat] sha1
3,961,626 UART: [kat] SHA2-256
3,963,564 UART: [kat] SHA2-384
3,966,419 UART: [kat] SHA2-512-ACC
3,968,319 UART: [kat] ECC-384
3,973,778 UART: [kat] HMAC-384Kdf
3,978,426 UART: [kat] LMS
4,546,622 UART: [kat] --
4,547,541 UART: [update-reset] ++
5,882,271 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,883,421 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,033,297 >>> mbox cmd response: success
6,033,592 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,606 UART: [update-reset Success] --
6,042,565 UART: [state] Locking Datavault
6,043,179 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,783 UART: [state] Locking ICCM
6,044,423 UART: [exit] Launching FMC @ 0x40000130
6,049,752 UART:
6,049,768 UART: Running Caliptra FMC ...
6,050,176 UART:
6,050,319 UART: [state] CFI Enabled
6,139,204 UART: [art] Extend RT PCRs Done
6,139,632 UART: [art] Lock RT PCRs Done
6,141,057 UART: [art] Populate DV Done
6,149,240 UART: [fht] FMC Alias Private Key: 7
6,150,272 UART: [art] Derive CDI
6,150,552 UART: [art] Store in in slot 0x4
6,236,391 UART: [art] Derive Key Pair
6,236,751 UART: [art] Store priv key in slot 0x5
6,250,117 UART: [art] Derive Key Pair - Done
6,264,916 UART: [art] Signing Cert with AUTHO
6,265,396 UART: RITY.KEYID = 7
6,280,992 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,757 UART: [art] PUB.X = 592189539AC8A30BDC0D67EC0E13AB044BFD8BB682697C608498CEBFC2817EE762719D7CCB414D75585666CC737B4372
6,288,519 UART: [art] PUB.Y = 5298A92E6B0660C37AFCD03091BED22EA97D57748E856B03ADB3EEDD923349912336933A4D7CF97D149930CFBA45FB35
6,295,469 UART: [art] SIG.R = E5C5867ACE075CEAEA26586FA91EF7FDB9CC9C3BBD7A5A5EFB7E73E51BE8C95354FB06A484EBA25DFBBC800EE4EBBD28
6,302,268 UART: [art] SIG.S = 2FEC702C5F8FD9F348D943AC2A21C71F8376FFAF8307F0641858FDF1C4F22178CC23CE04A3D43B6E413DA76AFDDC18DF
6,326,173 UART: Caliptra RT
6,326,518 UART: [state] CFI Enabled
6,389,961 UART: Disabled attest: DPE valid fail
6,390,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,391,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,422,293 UART: [rt]cmd =0x494e464f, len=4
6,426,160 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,618 ready_for_fw is high
1,362,618 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,685 >>> mbox cmd response: success
2,467,685 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,073 UART:
2,529,089 UART: Running Caliptra FMC ...
2,529,497 UART:
2,529,640 UART: [state] CFI Enabled
2,540,423 UART: [fht] FMC Alias Private Key: 7
2,648,412 UART: [art] Extend RT PCRs Done
2,648,840 UART: [art] Lock RT PCRs Done
2,650,400 UART: [art] Populate DV Done
2,658,631 UART: [fht] FMC Alias Private Key: 7
2,659,667 UART: [art] Derive CDI
2,659,947 UART: [art] Store in in slot 0x4
2,745,650 UART: [art] Derive Key Pair
2,746,010 UART: [art] Store priv key in slot 0x5
2,759,588 UART: [art] Derive Key Pair - Done
2,774,209 UART: [art] Signing Cert with AUTHO
2,774,689 UART: RITY.KEYID = 7
2,790,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,800 UART: [art] PUB.X = BFB137AC9C109074E9EB25E26A3021BBF70D1981BAC21775ACFE70DCFEA9ACDDA07BD0C65CDAD1E4D4C20A9003F9622B
2,797,589 UART: [art] PUB.Y = 75D0BC850F4B6D9E5040F3992951C5BF8ED14BD4E1FED41967429FB324CF2C13C7E2A8FABE2AA57A52C1D50F43A66317
2,804,547 UART: [art] SIG.R = 87F9108083A6ACDC1B8A32D64C7D859F32387FCAF32DD4EAB5E9685B892B63EB77C2A9F5A018C45854BD3A822BA613C8
2,811,329 UART: [art] SIG.S = A38A7B230A09CF7B41E020C0538827AB8FEC3948CB449F077F44C978E510D338B193F4125BDD6C4507005FCC4DB6EBBA
2,834,926 UART: mbox::rt_entry...
2,835,298 UART: ____ _ _ _ ____ _____
2,836,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,186 UART: |_|
2,839,498 UART:
2,945,467 UART: [rt] Runtime listening for mailbox commands...
2,950,435 >>> mbox cmd response data (3272 bytes)
2,950,436 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,973,522 >>> mbox cmd response data (0 bytes)
2,973,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,734,965 >>> mbox cmd response: success
5,748,186 UART:
5,748,202 UART: Running Caliptra FMC ...
5,748,610 UART:
5,748,753 UART: [state] CFI Enabled
5,837,630 UART: [art] Extend RT PCRs Done
5,838,058 UART: [art] Lock RT PCRs Done
5,839,327 UART: [art] Populate DV Done
5,847,660 UART: [fht] FMC Alias Private Key: 7
5,848,806 UART: [art] Derive CDI
5,849,086 UART: [art] Store in in slot 0x4
5,934,691 UART: [art] Derive Key Pair
5,935,051 UART: [art] Store priv key in slot 0x5
5,948,071 UART: [art] Derive Key Pair - Done
5,962,767 UART: [art] Signing Cert with AUTHO
5,963,247 UART: RITY.KEYID = 7
5,978,173 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,938 UART: [art] PUB.X = E89A9DE40A3743203835A41EDF5B40AD85EA7A5590CDC831BC6828A456F3E8CA2C1FC71D698CA8C33319312014CDCEB3
5,985,717 UART: [art] PUB.Y = B5DEDE2B8D6C010A3C63F256AC19B9CAA273A739BCC81A9AFDCBAFCF4C78F9E572F339BE7D3712F9836576C1A5BFB7AD
5,992,691 UART: [art] SIG.R = A9C659458182BBFF38CD722AF1C2716AC0BF1F40D9EDF0CC77A30FE5C17CD6113FF56F07085B5BB0B47DA7C47DE25C84
5,999,472 UART: [art] SIG.S = 7633C2750BB34DDA3B146CA61CCED978ED4ACADF6DB2A57AA07511C0F083392C4317D2F9B8F4571EF7266A76668E52D4
6,023,076 UART: Caliptra RT
6,023,421 UART: [state] CFI Enabled
6,086,422 UART: Disabled attest: DPE valid fail
6,086,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,088,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,118,686 UART: [rt]cmd =0x494e464f, len=4
6,122,347 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
893,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,263 UART: [kat] ++
897,415 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,478 UART: [kat] SHA2-512-ACC
908,379 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,606 UART: [kat] LMS
1,170,934 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,788 UART: [idev] Erasing UDS.KEYID = 0
1,200,621 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,698 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,599 UART: [ldev] --
1,283,104 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,090 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,407 >>> mbox cmd response: success
2,312,407 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,475 UART: [afmc] ++
2,313,643 UART: [afmc] CDI.KEYID = 6
2,314,005 UART: [afmc] SUBJECT.KEYID = 7
2,314,430 UART: [afmc] AUTHORITY.KEYID = 5
2,349,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,122 UART: [afmc] --
2,392,134 UART: [cold-reset] --
2,393,124 UART: [state] Locking Datavault
2,394,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,947 UART: [state] Locking ICCM
2,395,547 UART: [exit] Launching FMC @ 0x40000130
2,400,876 UART:
2,400,892 UART: Running Caliptra FMC ...
2,401,300 UART:
2,401,354 UART: [state] CFI Enabled
2,411,903 UART: [fht] FMC Alias Private Key: 7
2,519,160 UART: [art] Extend RT PCRs Done
2,519,588 UART: [art] Lock RT PCRs Done
2,521,164 UART: [art] Populate DV Done
2,529,471 UART: [fht] FMC Alias Private Key: 7
2,530,449 UART: [art] Derive CDI
2,530,729 UART: [art] Store in in slot 0x4
2,616,256 UART: [art] Derive Key Pair
2,616,616 UART: [art] Store priv key in slot 0x5
2,629,536 UART: [art] Derive Key Pair - Done
2,644,453 UART: [art] Signing Cert with AUTHO
2,644,933 UART: RITY.KEYID = 7
2,659,897 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,662 UART: [art] PUB.X = FDCE1B20125CA0A69AB0019F3616AB3DCADCB48B4F5AC22631B70E027545DB6BA46D5B75C7F85E9123D624C2A33355CE
2,667,439 UART: [art] PUB.Y = 957FE1AD29F59B5CFBE15C080D39A529C307E5A90AD5D449FCADA253284172EAC6CC8B765E0CD9164E45679A5024FFB6
2,674,388 UART: [art] SIG.R = CFE843E2A0E9C4AD1F910C4876A93C3D734ACD3E9624860E2A674DB3D068454D7A08FF5246C8FD2CB7D7122A02E40FEA
2,681,157 UART: [art] SIG.S = 6EE49E8D47F45A2929737CA618A235B02956A60469CD086DA08F179CE470F6DBAB307E97922DAED089BDC23178659771
2,705,198 UART: mbox::rt_entry...
2,705,570 UART: ____ _ _ _ ____ _____
2,706,354 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,154 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,922 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,690 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,458 UART: |_|
2,709,770 UART:
2,815,628 UART: [rt] Runtime listening for mailbox commands...
2,820,596 >>> mbox cmd response data (3272 bytes)
2,820,597 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,683 >>> mbox cmd response data (0 bytes)
2,843,684 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,843,801 UART:
2,843,817 UART: Running Caliptra ROM ...
2,844,225 UART:
2,844,280 UART: [state] CFI Enabled
2,847,242 UART: [state] LifecycleState = Unprovisioned
2,847,897 UART: [state] DebugLocked = No
2,848,411 UART: [state] WD Timer not started. Device not locked for debugging
2,849,517 UART: [kat] SHA2-256
3,655,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,659,292 UART: [kat] ++
3,659,444 UART: [kat] sha1
3,663,742 UART: [kat] SHA2-256
3,665,682 UART: [kat] SHA2-384
3,668,483 UART: [kat] SHA2-512-ACC
3,670,383 UART: [kat] ECC-384
3,680,018 UART: [kat] HMAC-384Kdf
3,684,534 UART: [kat] LMS
3,932,862 UART: [kat] --
3,933,920 UART: [update-reset] ++
5,246,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,677 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,501 >>> mbox cmd response: success
5,397,720 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,734 UART: [update-reset Success] --
5,406,877 UART: [state] Locking Datavault
5,407,663 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,267 UART: [state] Locking ICCM
5,408,761 UART: [exit] Launching FMC @ 0x40000130
5,414,090 UART:
5,414,106 UART: Running Caliptra FMC ...
5,414,514 UART:
5,414,568 UART: [state] CFI Enabled
5,502,687 UART: [art] Extend RT PCRs Done
5,503,115 UART: [art] Lock RT PCRs Done
5,504,366 UART: [art] Populate DV Done
5,512,625 UART: [fht] FMC Alias Private Key: 7
5,513,591 UART: [art] Derive CDI
5,513,871 UART: [art] Store in in slot 0x4
5,599,246 UART: [art] Derive Key Pair
5,599,606 UART: [art] Store priv key in slot 0x5
5,612,444 UART: [art] Derive Key Pair - Done
5,627,183 UART: [art] Signing Cert with AUTHO
5,627,663 UART: RITY.KEYID = 7
5,642,511 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,276 UART: [art] PUB.X = D1C58849DFA824A851883CA400CEFDB1C99F30889184E47D33DD307D36077EFDB313D4057A20CCC1E5879CB2AB596877
5,650,024 UART: [art] PUB.Y = F183092E1B0037D0D7DB3399662523FA51CACFC3E1EAD2D16B14025D6B6451F87371B8293C921E919E82AB5E3C859AB8
5,656,950 UART: [art] SIG.R = 560A70F44333F6E577162814B0E56B4BDA022D43A21ADE26906AABE2C96BE197212C417942B614693D7A7A3812D6A215
5,663,710 UART: [art] SIG.S = 95FFF44B72A8B921938AE3482DDC9DEB28F77C47C69A4E8642B2D176502F5956527BF50F5C4C0AFDAF543F7E2F143C64
5,687,479 UART: Caliptra RT
5,687,732 UART: [state] CFI Enabled
5,750,605 UART: Disabled attest: DPE valid fail
5,751,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,752,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,782,915 UART: [rt]cmd =0x494e464f, len=4
5,786,592 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,728 >>> mbox cmd response: success
2,166,728 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,232 UART:
2,228,248 UART: Running Caliptra FMC ...
2,228,656 UART:
2,228,710 UART: [state] CFI Enabled
2,239,039 UART: [fht] FMC Alias Private Key: 7
2,346,606 UART: [art] Extend RT PCRs Done
2,347,034 UART: [art] Lock RT PCRs Done
2,348,592 UART: [art] Populate DV Done
2,356,935 UART: [fht] FMC Alias Private Key: 7
2,357,939 UART: [art] Derive CDI
2,358,219 UART: [art] Store in in slot 0x4
2,444,062 UART: [art] Derive Key Pair
2,444,422 UART: [art] Store priv key in slot 0x5
2,457,998 UART: [art] Derive Key Pair - Done
2,472,874 UART: [art] Signing Cert with AUTHO
2,473,354 UART: RITY.KEYID = 7
2,488,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,083 UART: [art] PUB.X = ED23CE353870FD5F13EF66F1E11B6C339ABBF2E6D72F4782FEF0767942A18CE96521DC87300BD63547CDAD5FCDF29D49
2,495,866 UART: [art] PUB.Y = 4E897F43FCA1B3CD283D7C5F736E138D99BAAB650DD11DB81F966995F9465D7B4C114055A8CE1B81E1C042EAD2011570
2,502,818 UART: [art] SIG.R = 1C830F3B1259B617AECBE721DEA3B5EAF19989DBC30F39934916347744366F072ACBBBDBC956E5749ABE648ED597A924
2,509,589 UART: [art] SIG.S = 370C42ACD603A43C30B987AC4941C43F0CA606778391DFD991B79BD44519D5740047A58F9E87C39B26B9501B59026BF1
2,533,285 UART: mbox::rt_entry...
2,533,657 UART: ____ _ _ _ ____ _____
2,534,441 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,241 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,777 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,545 UART: |_|
2,537,857 UART:
2,644,791 UART: [rt] Runtime listening for mailbox commands...
2,649,759 >>> mbox cmd response data (3272 bytes)
2,649,760 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,846 >>> mbox cmd response data (0 bytes)
2,672,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,109,785 >>> mbox cmd response: success
5,123,295 UART:
5,123,311 UART: Running Caliptra FMC ...
5,123,719 UART:
5,123,773 UART: [state] CFI Enabled
5,212,514 UART: [art] Extend RT PCRs Done
5,212,942 UART: [art] Lock RT PCRs Done
5,214,245 UART: [art] Populate DV Done
5,222,668 UART: [fht] FMC Alias Private Key: 7
5,223,656 UART: [art] Derive CDI
5,223,936 UART: [art] Store in in slot 0x4
5,309,395 UART: [art] Derive Key Pair
5,309,755 UART: [art] Store priv key in slot 0x5
5,322,843 UART: [art] Derive Key Pair - Done
5,337,515 UART: [art] Signing Cert with AUTHO
5,337,995 UART: RITY.KEYID = 7
5,352,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,324 UART: [art] PUB.X = 19531B34DCA1DD38B6A7BB1700BFA7B732766C25DC0ABDA19EA44D2A0A4077C3B7DF5CF2BE9DF482ECF7FF6ED1551C45
5,360,092 UART: [art] PUB.Y = 2CC94FB3286B0A6C1CAB9648672A94E2118D0F32B9C42CC3DB45EDAB7EC756BEC6536F2F4249F143ED31B4CB163C9984
5,367,050 UART: [art] SIG.R = C4C10FEA56D8828E36FDC7FFA8FDC03F101DD2799B3C4457A44BE2221D17DEC49EDB611BE657981551617E24E3F1FE60
5,373,831 UART: [art] SIG.S = B1905D0EC794C29F08C0CC9F9CD0830377F90A2B2060F3DF6E9B0100FE45F32A6514E2893DE03ECEE2EFB1EDB9F61B41
5,397,365 UART: Caliptra RT
5,397,618 UART: [state] CFI Enabled
5,459,784 UART: Disabled attest: DPE valid fail
5,460,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,461,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,491,946 UART: [rt]cmd =0x494e464f, len=4
5,495,535 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
893,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,624 UART: [kat] ++
897,776 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,633 UART: [idev] ++
1,175,801 UART: [idev] CDI.KEYID = 6
1,176,161 UART: [idev] SUBJECT.KEYID = 7
1,176,585 UART: [idev] UDS.KEYID = 0
1,176,930 ready_for_fw is high
1,176,930 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,199 UART: [idev] Erasing UDS.KEYID = 0
1,201,614 UART: [idev] Sha1 KeyId Algorithm
1,210,084 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,658 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,116 UART: [ldev] --
1,283,463 UART: [fwproc] Wait for Commands...
1,284,083 UART: [fwproc] Recv command 0x46574c44
1,284,811 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,661 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,988 >>> mbox cmd response: success
2,313,988 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,202 UART: [afmc] ++
2,315,370 UART: [afmc] CDI.KEYID = 6
2,315,732 UART: [afmc] SUBJECT.KEYID = 7
2,316,157 UART: [afmc] AUTHORITY.KEYID = 5
2,351,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,557 UART: [afmc] --
2,395,625 UART: [cold-reset] --
2,396,295 UART: [state] Locking Datavault
2,397,482 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,086 UART: [state] Locking ICCM
2,398,592 UART: [exit] Launching FMC @ 0x40000130
2,403,921 UART:
2,403,937 UART: Running Caliptra FMC ...
2,404,345 UART:
2,404,488 UART: [state] CFI Enabled
2,415,035 UART: [fht] FMC Alias Private Key: 7
2,523,126 UART: [art] Extend RT PCRs Done
2,523,554 UART: [art] Lock RT PCRs Done
2,525,130 UART: [art] Populate DV Done
2,533,563 UART: [fht] FMC Alias Private Key: 7
2,534,723 UART: [art] Derive CDI
2,535,003 UART: [art] Store in in slot 0x4
2,620,948 UART: [art] Derive Key Pair
2,621,308 UART: [art] Store priv key in slot 0x5
2,634,578 UART: [art] Derive Key Pair - Done
2,649,194 UART: [art] Signing Cert with AUTHO
2,649,674 UART: RITY.KEYID = 7
2,664,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,183 UART: [art] PUB.X = A907552B8E1E9AF5D85E0D34D6BE66F74AC5BBDB6FE3C5E76C2A0F7A9959D2B1639E9053CA2A4AB89B7077A52CEE6223
2,671,962 UART: [art] PUB.Y = DDA7E0565894E70C7C830278166A13F2E6FEE6A9DFFB71BF349CDDACE414AC91DB626EBD7D3023ABF9B7520C0A07DF14
2,678,919 UART: [art] SIG.R = 457C347A4BE2D4A2B4A4A284AA64CA5E0A7FB8923726C415CFE08BAAFB4A29A130A1C16FCE65DCABC9AD9B050A24A56B
2,685,706 UART: [art] SIG.S = 741322BD7B2B6133CD5EBA1BFA0A6F8EDAF8AF7F33D0074B562A6BC901E586B3B8DE75A1AE3D6937D3A08DBF119E9A81
2,709,558 UART: mbox::rt_entry...
2,709,930 UART: ____ _ _ _ ____ _____
2,710,714 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,514 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,282 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,050 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,818 UART: |_|
2,714,130 UART:
2,820,100 UART: [rt] Runtime listening for mailbox commands...
2,825,068 >>> mbox cmd response data (3272 bytes)
2,825,069 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,155 >>> mbox cmd response data (0 bytes)
2,848,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,273 UART:
2,848,289 UART: Running Caliptra ROM ...
2,848,697 UART:
2,848,839 UART: [state] CFI Enabled
2,852,261 UART: [state] LifecycleState = Unprovisioned
2,852,916 UART: [state] DebugLocked = No
2,853,618 UART: [state] WD Timer not started. Device not locked for debugging
2,854,796 UART: [kat] SHA2-256
3,660,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,571 UART: [kat] ++
3,664,723 UART: [kat] sha1
3,669,139 UART: [kat] SHA2-256
3,671,079 UART: [kat] SHA2-384
3,673,666 UART: [kat] SHA2-512-ACC
3,675,566 UART: [kat] ECC-384
3,685,587 UART: [kat] HMAC-384Kdf
3,690,073 UART: [kat] LMS
3,938,401 UART: [kat] --
3,939,347 UART: [update-reset] ++
5,251,835 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,802 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,402,626 >>> mbox cmd response: success
5,402,869 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,883 UART: [update-reset Success] --
5,411,782 UART: [state] Locking Datavault
5,412,700 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,304 UART: [state] Locking ICCM
5,413,784 UART: [exit] Launching FMC @ 0x40000130
5,419,113 UART:
5,419,129 UART: Running Caliptra FMC ...
5,419,537 UART:
5,419,680 UART: [state] CFI Enabled
5,508,841 UART: [art] Extend RT PCRs Done
5,509,269 UART: [art] Lock RT PCRs Done
5,510,344 UART: [art] Populate DV Done
5,518,745 UART: [fht] FMC Alias Private Key: 7
5,519,777 UART: [art] Derive CDI
5,520,057 UART: [art] Store in in slot 0x4
5,605,934 UART: [art] Derive Key Pair
5,606,294 UART: [art] Store priv key in slot 0x5
5,619,464 UART: [art] Derive Key Pair - Done
5,634,298 UART: [art] Signing Cert with AUTHO
5,634,778 UART: RITY.KEYID = 7
5,650,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,071 UART: [art] PUB.X = FBA687E5CAAF758370591FECC5E42357D2D09A768AD4D91811D133F0BF5F96D2ECE432D08C12C5C2934FA30A585BBD5E
5,657,854 UART: [art] PUB.Y = DF2A87642996E164FCFDA565CE829172B29C2698FC17C22BA58A7DDB781D4DB67060BA4A3F54365C915D30BD44F5D203
5,664,809 UART: [art] SIG.R = 84B351CA4D5A181490FEE51C8E2AE369CB5D3D3656C225131B0BECEDA5073D37D726C48E6F29FEF37A23CCCE8EF27029
5,671,589 UART: [art] SIG.S = ED72023824DF2BEEFDC3EB278A27E19A59D07AEC4F17B7F90598C932A685D2DD55343505F8AF3E4225699908EBA94A87
5,695,548 UART: Caliptra RT
5,695,893 UART: [state] CFI Enabled
5,759,163 UART: Disabled attest: DPE valid fail
5,759,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,761,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,791,917 UART: [rt]cmd =0x494e464f, len=4
5,795,810 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,238 ready_for_fw is high
1,061,238 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,989 >>> mbox cmd response: success
2,166,989 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,229,419 UART:
2,229,435 UART: Running Caliptra FMC ...
2,229,843 UART:
2,229,986 UART: [state] CFI Enabled
2,240,533 UART: [fht] FMC Alias Private Key: 7
2,348,602 UART: [art] Extend RT PCRs Done
2,349,030 UART: [art] Lock RT PCRs Done
2,350,602 UART: [art] Populate DV Done
2,358,893 UART: [fht] FMC Alias Private Key: 7
2,359,937 UART: [art] Derive CDI
2,360,217 UART: [art] Store in in slot 0x4
2,445,494 UART: [art] Derive Key Pair
2,445,854 UART: [art] Store priv key in slot 0x5
2,458,880 UART: [art] Derive Key Pair - Done
2,474,105 UART: [art] Signing Cert with AUTHO
2,474,585 UART: RITY.KEYID = 7
2,489,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,744 UART: [art] PUB.X = EABAB862C9497BFBEED487F182E091F6E1E4DE3B3E4F27D5B7877B2317CEF011A99DF9DDA665F343D4DD88D5541941D0
2,497,532 UART: [art] PUB.Y = DF60BC19546E16E9984D9EA1CAA948868C9180A69EE30EB7C13171995EF020E8451C5865D3BB7774702A427999ED38D0
2,504,477 UART: [art] SIG.R = 8B047688A19D29DA8C5D2BAD517FFA9D7EDC82FBB195F4AD9646E1D333578A229016E66CD9E5FEC325F2B3813E75466D
2,511,256 UART: [art] SIG.S = 64A5C6F14FCD47E188AA482CE97FA49AE94CCDBE2CFE6EF098D2635075882B77661385651E001BDB66F7F8BB6ACBF54A
2,534,093 UART: mbox::rt_entry...
2,534,465 UART: ____ _ _ _ ____ _____
2,535,249 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,585 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,353 UART: |_|
2,538,665 UART:
2,644,365 UART: [rt] Runtime listening for mailbox commands...
2,649,333 >>> mbox cmd response data (3272 bytes)
2,649,334 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,420 >>> mbox cmd response data (0 bytes)
2,672,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,110,918 >>> mbox cmd response: success
5,124,124 UART:
5,124,140 UART: Running Caliptra FMC ...
5,124,548 UART:
5,124,691 UART: [state] CFI Enabled
5,213,450 UART: [art] Extend RT PCRs Done
5,213,878 UART: [art] Lock RT PCRs Done
5,215,315 UART: [art] Populate DV Done
5,223,700 UART: [fht] FMC Alias Private Key: 7
5,224,674 UART: [art] Derive CDI
5,224,954 UART: [art] Store in in slot 0x4
5,310,679 UART: [art] Derive Key Pair
5,311,039 UART: [art] Store priv key in slot 0x5
5,324,255 UART: [art] Derive Key Pair - Done
5,338,963 UART: [art] Signing Cert with AUTHO
5,339,443 UART: RITY.KEYID = 7
5,354,521 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,286 UART: [art] PUB.X = 903E0B4494BD6587F7E45649BA76A2688CE523BF70B6D8C038B5B6D96C23EBC6D4CB5E68DD01AB274C241C4E7A0A43DC
5,362,061 UART: [art] PUB.Y = 559D942BC3A49F4F1B558CFC832BB076897EE2F7FC0645C5F7D4D2B1C0376E97B8EF3DCD005ED2E7EAAF60981E07F672
5,368,999 UART: [art] SIG.R = 1117ED2BC17555EC20E3C8157597718A0F99430BBBFB2741FC4E23D8CCAE7EC2BC3206C0D68DFC1F3D1D95A3C87F6A3E
5,375,778 UART: [art] SIG.S = 64E8C344E92FDD8DB0C62A112834C1E912C765D36F0EEDF3537BF9FAB7D23968811628BFFD25DA2A530A8E5335DBB206
5,399,542 UART: Caliptra RT
5,399,887 UART: [state] CFI Enabled
5,461,744 UART: Disabled attest: DPE valid fail
5,462,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,463,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,494,352 UART: [rt]cmd =0x494e464f, len=4
5,498,075 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,174,185 ready_for_fw is high
1,174,185 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,978 UART: [ldev] ++
1,209,146 UART: [ldev] CDI.KEYID = 6
1,209,510 UART: [ldev] SUBJECT.KEYID = 5
1,209,937 UART: [ldev] AUTHORITY.KEYID = 7
1,210,400 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,539 UART: [fwproc] Recv command 0x46574c44
1,282,272 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,811 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,063 >>> mbox cmd response: success
2,311,063 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,104 UART: [afmc] ++
2,312,272 UART: [afmc] CDI.KEYID = 6
2,312,635 UART: [afmc] SUBJECT.KEYID = 7
2,313,061 UART: [afmc] AUTHORITY.KEYID = 5
2,348,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,583 UART: [afmc] --
2,391,569 UART: [cold-reset] --
2,392,577 UART: [state] Locking Datavault
2,393,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,208 UART: [state] Locking ICCM
2,394,658 UART: [exit] Launching FMC @ 0x40000130
2,399,987 UART:
2,400,003 UART: Running Caliptra FMC ...
2,400,411 UART:
2,400,465 UART: [state] CFI Enabled
2,411,084 UART: [fht] FMC Alias Private Key: 7
2,519,705 UART: [art] Extend RT PCRs Done
2,520,133 UART: [art] Lock RT PCRs Done
2,521,869 UART: [art] Populate DV Done
2,530,394 UART: [fht] FMC Alias Private Key: 7
2,531,436 UART: [art] Derive CDI
2,531,716 UART: [art] Store in in slot 0x4
2,617,295 UART: [art] Derive Key Pair
2,617,655 UART: [art] Store priv key in slot 0x5
2,630,405 UART: [art] Derive Key Pair - Done
2,645,426 UART: [art] Signing Cert with AUTHO
2,645,906 UART: RITY.KEYID = 7
2,661,190 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,955 UART: [art] PUB.X = A0E74BD60310B431412DCA4C1999B48338257C714CD59D1883FA6922631DE63818B55E391F80773A7D02413C868670D6
2,668,707 UART: [art] PUB.Y = 1B3A9BD05EA34355BDAD0D69482C515D953452488C2E00B3019F6A63A1848328DC827AA6E78379132AFF106F7D9A16C9
2,675,629 UART: [art] SIG.R = 95945D1E5F01A2EA1C51437693BC336D07CC23AE893CC95B7F30D25C1BC8E8795840F6CD97B6A9396D62D3F7CBA4937E
2,682,401 UART: [art] SIG.S = 9395CD48095BD1194BAD944C09CFFE4BD51BE879382FC3297B358CCD9E2296EDEC74003DB413BDFCAD77CFC41C2D3E46
2,707,032 UART: mbox::rt_entry...
2,707,404 UART: ____ _ _ _ ____ _____
2,708,188 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,292 UART: |_|
2,711,604 UART:
2,818,503 UART: [rt] Runtime listening for mailbox commands...
2,823,471 >>> mbox cmd response data (3272 bytes)
2,823,472 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,558 >>> mbox cmd response data (0 bytes)
2,846,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,846,676 UART:
2,846,692 UART: Running Caliptra ROM ...
2,847,100 UART:
2,847,155 UART: [state] CFI Enabled
2,850,017 UART: [state] LifecycleState = Unprovisioned
2,850,672 UART: [state] DebugLocked = No
2,851,232 UART: [state] WD Timer not started. Device not locked for debugging
2,852,584 UART: [kat] SHA2-256
3,656,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,263 UART: [kat] ++
3,660,415 UART: [kat] sha1
3,664,633 UART: [kat] SHA2-256
3,666,573 UART: [kat] SHA2-384
3,669,428 UART: [kat] SHA2-512-ACC
3,671,328 UART: [kat] ECC-384
3,680,931 UART: [kat] HMAC-384Kdf
3,685,319 UART: [kat] LMS
3,933,631 UART: [kat] --
3,934,585 UART: [update-reset] ++
5,246,602 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,573 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,397 >>> mbox cmd response: success
5,397,738 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,752 UART: [update-reset Success] --
5,406,615 UART: [state] Locking Datavault
5,407,553 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,157 UART: [state] Locking ICCM
5,408,799 UART: [exit] Launching FMC @ 0x40000130
5,414,128 UART:
5,414,144 UART: Running Caliptra FMC ...
5,414,552 UART:
5,414,606 UART: [state] CFI Enabled
5,503,501 UART: [art] Extend RT PCRs Done
5,503,929 UART: [art] Lock RT PCRs Done
5,504,914 UART: [art] Populate DV Done
5,513,157 UART: [fht] FMC Alias Private Key: 7
5,514,185 UART: [art] Derive CDI
5,514,465 UART: [art] Store in in slot 0x4
5,600,092 UART: [art] Derive Key Pair
5,600,452 UART: [art] Store priv key in slot 0x5
5,613,126 UART: [art] Derive Key Pair - Done
5,627,990 UART: [art] Signing Cert with AUTHO
5,628,470 UART: RITY.KEYID = 7
5,643,424 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,189 UART: [art] PUB.X = ABB27295105B5A76322CD7BE83A68ED2287D0AC36A9B6933D2E32568E20EB9063BBEF9888128582E02F0321F556A1E21
5,650,947 UART: [art] PUB.Y = 87EA4ED0347E9224E48FA5AC07B5C276C3C561C86C4E60859FEE596EAA6E20396660B183FEB9791B1AFFD8C3B4CB119C
5,657,908 UART: [art] SIG.R = F5B9078387CEF64FCF27803E46EBB3C31B9BA496575DB745673F95871D42D9F6070BB6AF379C450E6C95C30773D9E35C
5,664,667 UART: [art] SIG.S = 8DE66EC6382D50A6D05CA78C0C410FDA4A7192DF2575CAFD35621E9002AEB05D70309B759596DDD80CD4E314607EF184
5,688,580 UART: Caliptra RT
5,688,833 UART: [state] CFI Enabled
5,751,893 UART: Disabled attest: DPE valid fail
5,752,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,753,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,784,297 UART: [rt]cmd =0x494e464f, len=4
5,787,806 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 ready_for_fw is high
1,056,026 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,925 >>> mbox cmd response: success
2,160,925 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,115 UART:
2,223,131 UART: Running Caliptra FMC ...
2,223,539 UART:
2,223,593 UART: [state] CFI Enabled
2,234,338 UART: [fht] FMC Alias Private Key: 7
2,342,729 UART: [art] Extend RT PCRs Done
2,343,157 UART: [art] Lock RT PCRs Done
2,344,617 UART: [art] Populate DV Done
2,352,818 UART: [fht] FMC Alias Private Key: 7
2,353,868 UART: [art] Derive CDI
2,354,148 UART: [art] Store in in slot 0x4
2,439,861 UART: [art] Derive Key Pair
2,440,221 UART: [art] Store priv key in slot 0x5
2,453,355 UART: [art] Derive Key Pair - Done
2,468,217 UART: [art] Signing Cert with AUTHO
2,468,697 UART: RITY.KEYID = 7
2,483,967 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,732 UART: [art] PUB.X = B473C69D0736EF48980778C30F898B3899A6A33BC64FA7A758A878A7FF439607AA73E78DAD7890747DD0CC37C3250178
2,491,485 UART: [art] PUB.Y = DD869EFDC96B6453E7FB8E9DC9D03BA37CE4F23E930CEA3BE382DDC78A7ADC20666079D212EBB935702B2E581098C90D
2,498,447 UART: [art] SIG.R = E98254C15AC9DC9B33B2BC80B0BDFD9DBA6051BD0AD307BB57B2801D2719A388291BC02829BA75FA91B1A64AF638812E
2,505,225 UART: [art] SIG.S = 8AFCB1F77BCC52FA5A13788D2009F2B74BF2FC00A3D55E2CF0FE46813262DFE0D9C85A963ACCAD17011DDAD1F9D5FE7F
2,529,214 UART: mbox::rt_entry...
2,529,586 UART: ____ _ _ _ ____ _____
2,530,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,938 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,474 UART: |_|
2,533,786 UART:
2,641,583 UART: [rt] Runtime listening for mailbox commands...
2,646,551 >>> mbox cmd response data (3272 bytes)
2,646,552 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,638 >>> mbox cmd response data (0 bytes)
2,669,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,101,212 >>> mbox cmd response: success
5,114,534 UART:
5,114,550 UART: Running Caliptra FMC ...
5,114,958 UART:
5,115,012 UART: [state] CFI Enabled
5,204,347 UART: [art] Extend RT PCRs Done
5,204,775 UART: [art] Lock RT PCRs Done
5,206,306 UART: [art] Populate DV Done
5,214,507 UART: [fht] FMC Alias Private Key: 7
5,215,619 UART: [art] Derive CDI
5,215,899 UART: [art] Store in in slot 0x4
5,301,842 UART: [art] Derive Key Pair
5,302,202 UART: [art] Store priv key in slot 0x5
5,315,702 UART: [art] Derive Key Pair - Done
5,330,251 UART: [art] Signing Cert with AUTHO
5,330,731 UART: RITY.KEYID = 7
5,345,889 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,654 UART: [art] PUB.X = 85A4F06E7134FA4670BBB4EA9ADCCAE7C4CBE53FC089BECAAAA6278D78890492A0BA8D922055768F552E51F4CD847349
5,353,437 UART: [art] PUB.Y = F3BA87AEC213900B58A90FB4778E89AC03626E9FF8289254560A4F11D35858C633522715CB051502F2B28EBBDA297323
5,360,365 UART: [art] SIG.R = B5AC878282C1FE8B0C69B40A1F612D26DE13A549FCEA8A282E66CB0FD9F68BBF2C748BAECC0CDFBBDA46A0B940F464C0
5,367,153 UART: [art] SIG.S = 348C6DB3B440A533EE34EDCE1AAF8AE537A575D79C6DF9DBB8EE7EFC4666CE4F17F206ACA4E85928A0847D63F6DB7B0A
5,390,562 UART: Caliptra RT
5,390,815 UART: [state] CFI Enabled
5,453,280 UART: Disabled attest: DPE valid fail
5,453,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,455,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,485,642 UART: [rt]cmd =0x494e464f, len=4
5,489,139 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,174,196 ready_for_fw is high
1,174,196 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,198,862 UART: [idev] Sha1 KeyId Algorithm
1,207,680 UART: [idev] --
1,208,689 UART: [ldev] ++
1,208,857 UART: [ldev] CDI.KEYID = 6
1,209,221 UART: [ldev] SUBJECT.KEYID = 5
1,209,648 UART: [ldev] AUTHORITY.KEYID = 7
1,210,111 UART: [ldev] FE.KEYID = 1
1,215,299 UART: [ldev] Erasing FE.KEYID = 1
1,241,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,980 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,348 >>> mbox cmd response: success
2,311,348 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,587 UART: [afmc] ++
2,312,755 UART: [afmc] CDI.KEYID = 6
2,313,118 UART: [afmc] SUBJECT.KEYID = 7
2,313,544 UART: [afmc] AUTHORITY.KEYID = 5
2,349,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,525 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,127 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,160 UART: [afmc] --
2,393,040 UART: [cold-reset] --
2,393,548 UART: [state] Locking Datavault
2,394,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,335 UART: [state] Locking ICCM
2,395,959 UART: [exit] Launching FMC @ 0x40000130
2,401,288 UART:
2,401,304 UART: Running Caliptra FMC ...
2,401,712 UART:
2,401,855 UART: [state] CFI Enabled
2,412,284 UART: [fht] FMC Alias Private Key: 7
2,519,871 UART: [art] Extend RT PCRs Done
2,520,299 UART: [art] Lock RT PCRs Done
2,521,475 UART: [art] Populate DV Done
2,529,628 UART: [fht] FMC Alias Private Key: 7
2,530,788 UART: [art] Derive CDI
2,531,068 UART: [art] Store in in slot 0x4
2,617,265 UART: [art] Derive Key Pair
2,617,625 UART: [art] Store priv key in slot 0x5
2,631,269 UART: [art] Derive Key Pair - Done
2,646,187 UART: [art] Signing Cert with AUTHO
2,646,667 UART: RITY.KEYID = 7
2,662,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,960 UART: [art] PUB.X = B38B88B9037E2EC370B00D672D0A93C9DB6E2BCB9DFBF4003C5156B25D92BF16B8684CE652FBC6BD8031D95C19A10DB5
2,669,712 UART: [art] PUB.Y = 4B3B7243A35918570E5B1AF0F76682A592B9CCB4DE437435DB39AD10525F01739FD97CFC32134260FEDC71B3D4AC9537
2,676,660 UART: [art] SIG.R = F37F8490D36EC717D71587A709345F294CBE82411DF659C1A6A1B836BC1CF4BC91AD03B2F523B8A627746E510CB17B65
2,683,425 UART: [art] SIG.S = 6A6E52AA798F681107688477293F67A4057C668644D1932DEC8C77852987E3CCB8036093F7356499496E38116153F3C5
2,707,063 UART: mbox::rt_entry...
2,707,435 UART: ____ _ _ _ ____ _____
2,708,219 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,019 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,787 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,323 UART: |_|
2,711,635 UART:
2,818,195 UART: [rt] Runtime listening for mailbox commands...
2,823,163 >>> mbox cmd response data (3272 bytes)
2,823,164 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,250 >>> mbox cmd response data (0 bytes)
2,846,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,846,368 UART:
2,846,384 UART: Running Caliptra ROM ...
2,846,792 UART:
2,846,934 UART: [state] CFI Enabled
2,849,688 UART: [state] LifecycleState = Unprovisioned
2,850,343 UART: [state] DebugLocked = No
2,851,043 UART: [state] WD Timer not started. Device not locked for debugging
2,852,363 UART: [kat] SHA2-256
3,655,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,042 UART: [kat] ++
3,660,194 UART: [kat] sha1
3,664,428 UART: [kat] SHA2-256
3,666,368 UART: [kat] SHA2-384
3,669,255 UART: [kat] SHA2-512-ACC
3,671,155 UART: [kat] ECC-384
3,680,574 UART: [kat] HMAC-384Kdf
3,685,404 UART: [kat] LMS
3,933,716 UART: [kat] --
3,934,540 UART: [update-reset] ++
5,246,229 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,306 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,130 >>> mbox cmd response: success
5,397,451 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,465 UART: [update-reset Success] --
5,406,306 UART: [state] Locking Datavault
5,406,964 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,568 UART: [state] Locking ICCM
5,408,138 UART: [exit] Launching FMC @ 0x40000130
5,413,467 UART:
5,413,483 UART: Running Caliptra FMC ...
5,413,891 UART:
5,414,034 UART: [state] CFI Enabled
5,502,809 UART: [art] Extend RT PCRs Done
5,503,237 UART: [art] Lock RT PCRs Done
5,504,682 UART: [art] Populate DV Done
5,512,667 UART: [fht] FMC Alias Private Key: 7
5,513,813 UART: [art] Derive CDI
5,514,093 UART: [art] Store in in slot 0x4
5,599,748 UART: [art] Derive Key Pair
5,600,108 UART: [art] Store priv key in slot 0x5
5,613,724 UART: [art] Derive Key Pair - Done
5,628,460 UART: [art] Signing Cert with AUTHO
5,628,940 UART: RITY.KEYID = 7
5,644,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,291 UART: [art] PUB.X = 5D274902932D60C23669A5A8C94878296C58DC8A12C68A295442AF53DCE2530EC6E781530F8D305EA676AFD8CD03C97E
5,652,049 UART: [art] PUB.Y = DBFB09E0044DC1F75BC7A9C356A519A8B8FA09D8815ED99C2C30ED0A9AE8F3207CFAE04E94710344F875AD1E4D5F643B
5,659,002 UART: [art] SIG.R = 53F2DA1433A59627C5B08E761445D5DC2922D31E190ADA3C8ED6214BE2DC91FEDC99AB857F22EBFAD8CEC82C69C441BC
5,665,789 UART: [art] SIG.S = 03A5DD64D956C77AF61788786B9D41278221AA52B5C1348CE9C7B8243B0F4AF4516F1C53254E6D8064779FCA0ECA5FF7
5,689,267 UART: Caliptra RT
5,689,612 UART: [state] CFI Enabled
5,753,313 UART: Disabled attest: DPE valid fail
5,753,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,755,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,785,439 UART: [rt]cmd =0x494e464f, len=4
5,789,004 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,647 ready_for_fw is high
1,056,647 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,034 >>> mbox cmd response: success
2,162,034 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,808 UART:
2,223,824 UART: Running Caliptra FMC ...
2,224,232 UART:
2,224,375 UART: [state] CFI Enabled
2,235,122 UART: [fht] FMC Alias Private Key: 7
2,343,311 UART: [art] Extend RT PCRs Done
2,343,739 UART: [art] Lock RT PCRs Done
2,345,429 UART: [art] Populate DV Done
2,353,660 UART: [fht] FMC Alias Private Key: 7
2,354,652 UART: [art] Derive CDI
2,354,932 UART: [art] Store in in slot 0x4
2,440,617 UART: [art] Derive Key Pair
2,440,977 UART: [art] Store priv key in slot 0x5
2,454,275 UART: [art] Derive Key Pair - Done
2,469,314 UART: [art] Signing Cert with AUTHO
2,469,794 UART: RITY.KEYID = 7
2,484,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,447 UART: [art] PUB.X = 3F90B08637393A63453106EC2C1C3B95803A122FEF89C819E544CE622C261CF3A8A5C09871E7B092C52E22C71E25CAD5
2,492,214 UART: [art] PUB.Y = 246FB860AB1E4E73B418CD133518945C315F38FDC6E6EB3BDE15BC0B6EEBE2D1BDBFF7FBF69021A8D8E456984E9A52CE
2,499,185 UART: [art] SIG.R = A164B412D521B101C371BB50FBE05D8A346A29E62A8AEBF19CAFDDF4BEC103FC111CEFE76A272DCB6ED5DFD4F065CFBA
2,505,983 UART: [art] SIG.S = FE8648E5CB0FFF62912A0E8258573CC8B5901D12F2D60EE18D3EDDCEC53626FF137887061B716430A0ABBCABC45F11E4
2,530,218 UART: mbox::rt_entry...
2,530,590 UART: ____ _ _ _ ____ _____
2,531,374 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,174 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,942 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,710 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,478 UART: |_|
2,534,790 UART:
2,640,881 UART: [rt] Runtime listening for mailbox commands...
2,645,849 >>> mbox cmd response data (3272 bytes)
2,645,850 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,936 >>> mbox cmd response data (0 bytes)
2,668,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,101,835 >>> mbox cmd response: success
5,115,115 UART:
5,115,131 UART: Running Caliptra FMC ...
5,115,539 UART:
5,115,682 UART: [state] CFI Enabled
5,205,177 UART: [art] Extend RT PCRs Done
5,205,605 UART: [art] Lock RT PCRs Done
5,206,918 UART: [art] Populate DV Done
5,215,319 UART: [fht] FMC Alias Private Key: 7
5,216,319 UART: [art] Derive CDI
5,216,599 UART: [art] Store in in slot 0x4
5,302,184 UART: [art] Derive Key Pair
5,302,544 UART: [art] Store priv key in slot 0x5
5,316,796 UART: [art] Derive Key Pair - Done
5,331,797 UART: [art] Signing Cert with AUTHO
5,332,277 UART: RITY.KEYID = 7
5,347,057 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,822 UART: [art] PUB.X = 7D52EF752BD7ABCEBE770C2D36B8D52E4659AED7A8251090CD4AB27ECF5D22F5039205C85BED159F02BDA86CABDEDF4E
5,354,608 UART: [art] PUB.Y = 18D08CECBF2B523C9E003156107B70A95B45C84ED27863BA13633CE1DA63441AE485B1CB40494408D1E41090F5FCB4B8
5,361,537 UART: [art] SIG.R = E9E18D2E2883283DCB763B3FD9A6B1918BEEBD5E61D8B40632581434A708080BCDDE2C3E3274C3A480ED2DEFB8D553F6
5,368,309 UART: [art] SIG.S = E218E0E54295D3DE4163D77F91D62B285D46F1FD6615B113C55F70C1B04494CC8C6E31CAC8AC854754357C871ECA74A2
5,392,380 UART: Caliptra RT
5,392,725 UART: [state] CFI Enabled
5,455,901 UART: Disabled attest: DPE valid fail
5,456,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,457,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,488,181 UART: [rt]cmd =0x494e464f, len=4
5,491,986 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,167 UART: [kat] SHA2-256
882,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,213 UART: [kat] ++
886,365 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
907,024 UART: [kat] LMS
1,475,220 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 ready_for_fw is high
1,480,553 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,102 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,750 UART: [idev] --
1,514,709 UART: [ldev] ++
1,514,877 UART: [ldev] CDI.KEYID = 6
1,515,240 UART: [ldev] SUBJECT.KEYID = 5
1,515,666 UART: [ldev] AUTHORITY.KEYID = 7
1,516,129 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,545,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,920 UART: [ldev] --
1,585,227 UART: [fwproc] Waiting for Commands...
1,586,026 UART: [fwproc] Received command 0x46574c44
1,586,817 UART: [fwproc] Received Image of size 78704 bytes
2,476,121 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,081 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,614,810 >>> mbox cmd response: success
2,614,810 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,004 UART: [afmc] ++
2,616,172 UART: [afmc] CDI.KEYID = 6
2,616,534 UART: [afmc] SUBJECT.KEYID = 7
2,616,959 UART: [afmc] AUTHORITY.KEYID = 5
2,652,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,991 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,681 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,756 UART: [afmc] --
2,695,780 UART: [cold-reset] --
2,696,550 UART: [state] Locking Datavault
2,697,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,355 UART: [state] Locking ICCM
2,699,003 UART: [exit] Launching FMC @ 0x40000130
2,704,332 UART:
2,704,348 UART: Running Caliptra FMC ...
2,704,756 UART:
2,704,810 UART: [state] CFI Enabled
2,715,469 UART: [fht] FMC Alias Private Key: 7
2,823,308 UART: [art] Extend RT PCRs Done
2,823,736 UART: [art] Lock RT PCRs Done
2,825,406 UART: [art] Populate DV Done
2,833,715 UART: [fht] FMC Alias Private Key: 7
2,834,885 UART: [art] Derive CDI
2,835,165 UART: [art] Store in in slot 0x4
2,920,628 UART: [art] Derive Key Pair
2,920,988 UART: [art] Store priv key in slot 0x5
2,934,006 UART: [art] Derive Key Pair - Done
2,948,675 UART: [art] Signing Cert with AUTHO
2,949,155 UART: RITY.KEYID = 7
2,964,453 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,218 UART: [art] PUB.X = E520CA555F8640B6E3FF7A29A65DCAFC766F0FAEEDC97EE8323BEED4323CDC14908383DAC734FE12B1185C6DC11D2506
2,972,002 UART: [art] PUB.Y = AC750B537F6C99F4387C15958CE24C03413A60A45087ED47CEC54A59C5909F3AD42A2AFFA493BB44AD63856CB5346717
2,978,950 UART: [art] SIG.R = D5618661EA17E33114BC771A11C04459A467FB51C8BD9A99C67A643D0B67106164BFC3DFBC3D07A4F263FB350228DCF5
2,985,717 UART: [art] SIG.S = 909CC23DD15011CD4A1B4D48A1F99A8839435C86735949091012538D63D602BBCE7F247D00EE704EF2C1C34C387B14CD
3,009,288 UART: mbox::rt_entry...
3,009,660 UART: ____ _ _ _ ____ _____
3,010,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,780 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,548 UART: |_|
3,013,860 UART:
3,120,447 UART: [rt] Runtime listening for mailbox commands...
3,125,415 >>> mbox cmd response data (3272 bytes)
3,125,416 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,148,502 >>> mbox cmd response data (0 bytes)
3,148,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,148,623 UART:
3,148,639 UART: Running Caliptra ROM ...
3,149,047 UART:
3,149,101 UART: [state] CFI Enabled
3,151,971 UART: [state] LifecycleState = Unprovisioned
3,152,626 UART: [state] DebugLocked = No
3,153,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,154,771 UART: [kat] SHA2-256
3,948,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,952,817 UART: [kat] ++
3,952,969 UART: [kat] sha1
3,957,177 UART: [kat] SHA2-256
3,959,115 UART: [kat] SHA2-384
3,961,652 UART: [kat] SHA2-512-ACC
3,963,552 UART: [kat] ECC-384
3,968,913 UART: [kat] HMAC-384Kdf
3,973,523 UART: [kat] LMS
4,541,719 UART: [kat] --
4,542,770 UART: [update-reset] ++
5,876,120 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,877,272 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,027,148 >>> mbox cmd response: success
6,027,323 UART: [update-reset] Copying MAN_2 To MAN_1
6,035,337 UART: [update-reset Success] --
6,036,232 UART: [state] Locking Datavault
6,037,000 UART: [state] Locking PCR0, PCR1 and PCR31
6,037,604 UART: [state] Locking ICCM
6,038,124 UART: [exit] Launching FMC @ 0x40000130
6,043,453 UART:
6,043,469 UART: Running Caliptra FMC ...
6,043,877 UART:
6,043,931 UART: [state] CFI Enabled
6,133,114 UART: [art] Extend RT PCRs Done
6,133,542 UART: [art] Lock RT PCRs Done
6,134,661 UART: [art] Populate DV Done
6,143,000 UART: [fht] FMC Alias Private Key: 7
6,144,174 UART: [art] Derive CDI
6,144,454 UART: [art] Store in in slot 0x4
6,230,159 UART: [art] Derive Key Pair
6,230,519 UART: [art] Store priv key in slot 0x5
6,243,911 UART: [art] Derive Key Pair - Done
6,258,820 UART: [art] Signing Cert with AUTHO
6,259,300 UART: RITY.KEYID = 7
6,274,448 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,213 UART: [art] PUB.X = A9BDDC1A513916A1BAE08A8BF5A0800306C3B50F875B8B1660F4E94A7E153ED7F72AF5F9738450BBE2471947574C8B89
6,281,980 UART: [art] PUB.Y = 9090FC76330BB96DAD96A4F4272E7398B0B59DAADCC215261FF2A1400B47FA416C598350C19A6A17BAF64EF495EA57FD
6,288,936 UART: [art] SIG.R = 2B34981408B371656ABE1C34FB23E4EAA71B6998F6BA1D1A258DBD564638E0BF26759CFCA961D0C68E9D50C7EC7B5239
6,295,713 UART: [art] SIG.S = 3B5C11FA39336A735E3171F8A4DB6CABE1C23E4FB2F37D74A3E62CB076C5F4DE20B0DEFB75D9AC1BABCD6E2A7BDD2FAD
6,318,698 UART: Caliptra RT
6,318,951 UART: [state] CFI Enabled
6,615,923 UART: Disable attest DPE used context limit breach
6,616,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,618,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,536 UART: [rt]cmd =0x494e464f, len=4
6,652,293 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,464,862 >>> mbox cmd response: success
2,464,862 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,374 UART:
2,526,390 UART: Running Caliptra FMC ...
2,526,798 UART:
2,526,852 UART: [state] CFI Enabled
2,537,519 UART: [fht] FMC Alias Private Key: 7
2,645,322 UART: [art] Extend RT PCRs Done
2,645,750 UART: [art] Lock RT PCRs Done
2,647,188 UART: [art] Populate DV Done
2,655,599 UART: [fht] FMC Alias Private Key: 7
2,656,705 UART: [art] Derive CDI
2,656,985 UART: [art] Store in in slot 0x4
2,742,754 UART: [art] Derive Key Pair
2,743,114 UART: [art] Store priv key in slot 0x5
2,756,714 UART: [art] Derive Key Pair - Done
2,771,446 UART: [art] Signing Cert with AUTHO
2,771,926 UART: RITY.KEYID = 7
2,787,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,427 UART: [art] PUB.X = 6BABA16D5CF1C9AEDE5BEDCF5CD4C93F80D17E1BAD2AB5F78F25BFE65D3979ECFB4304D7ED7AB3B74287A64C8FA6E4AA
2,795,234 UART: [art] PUB.Y = 4F04DDA94F96777FEB4E0604CCD7EDB2D87AEC15A643BF6FD998E8F9CAF330AD80E14447E304680AA6DC30747A9E68A1
2,802,187 UART: [art] SIG.R = D0004AE4D65E3DAD48F2F0134928F72752D240D536FB4D99FC07079E2F4C00A8E66BF9148FC4A8AE2F072C03A151AE7D
2,808,911 UART: [art] SIG.S = A44ACC8D12779D3657C70EAB200090423DD96C62A96DA7A7D58F378BB342485071181F5A70596C83EB563EDC7C579524
2,832,541 UART: mbox::rt_entry...
2,832,913 UART: ____ _ _ _ ____ _____
2,833,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,801 UART: |_|
2,837,113 UART:
2,944,166 UART: [rt] Runtime listening for mailbox commands...
2,949,134 >>> mbox cmd response data (3272 bytes)
2,949,135 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,221 >>> mbox cmd response data (0 bytes)
2,972,222 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,733,563 >>> mbox cmd response: success
5,747,176 UART:
5,747,192 UART: Running Caliptra FMC ...
5,747,600 UART:
5,747,654 UART: [state] CFI Enabled
5,837,135 UART: [art] Extend RT PCRs Done
5,837,563 UART: [art] Lock RT PCRs Done
5,838,926 UART: [art] Populate DV Done
5,847,487 UART: [fht] FMC Alias Private Key: 7
5,848,535 UART: [art] Derive CDI
5,848,815 UART: [art] Store in in slot 0x4
5,934,564 UART: [art] Derive Key Pair
5,934,924 UART: [art] Store priv key in slot 0x5
5,948,520 UART: [art] Derive Key Pair - Done
5,963,484 UART: [art] Signing Cert with AUTHO
5,963,964 UART: RITY.KEYID = 7
5,979,062 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,827 UART: [art] PUB.X = E22E95E06906D1FDA82112D05BC0B5284261F7746F0472901F6EA565E6FA240BA9920F4C5CF3BF518C4476DB01F5D44F
5,986,586 UART: [art] PUB.Y = 6BA26D3AEBEC3BD43A4684A956ABCFAB625CA00FA4577B6F02C75570591093CDDD99BFBC8F1058080F7F494826150101
5,993,528 UART: [art] SIG.R = A155D7079217C603CF5DADE2D1A4BAB9EC39018B9123814BA5AD9E810EE91AA48DF3873A0EB81BDF7395BEE90BCF3037
6,000,298 UART: [art] SIG.S = EF07EA108937BC86733E40A63FB861AD646FDC535B1EB0723D1B115D90084D0BAE63B0DA05B95500BA99C124838FD24A
6,024,181 UART: Caliptra RT
6,024,434 UART: [state] CFI Enabled
6,316,810 UART: Disable attest DPE used context limit breach
6,317,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,318,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,279 UART: [rt]cmd =0x494e464f, len=4
6,353,140 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Unprovisioned
85,658 UART: [state] DebugLocked = No
86,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,998 UART: [kat] SHA2-256
881,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,044 UART: [kat] ++
886,196 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,333 UART: [kat] SHA2-512-ACC
897,234 UART: [kat] ECC-384
902,763 UART: [kat] HMAC-384Kdf
907,267 UART: [kat] LMS
1,475,463 UART: [kat] --
1,476,396 UART: [cold-reset] ++
1,476,872 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 ready_for_fw is high
1,481,028 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,593 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,521,786 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,103 UART: [fwproc] Received command 0x46574c44
1,587,894 UART: [fwproc] Received Image of size 78704 bytes
2,478,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,457 >>> mbox cmd response: success
2,616,457 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,709 UART: [afmc] ++
2,617,877 UART: [afmc] CDI.KEYID = 6
2,618,239 UART: [afmc] SUBJECT.KEYID = 7
2,618,664 UART: [afmc] AUTHORITY.KEYID = 5
2,653,869 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,333 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,726 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,416 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,413 UART: [afmc] --
2,697,507 UART: [cold-reset] --
2,698,255 UART: [state] Locking Datavault
2,699,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,160 UART: [state] Locking ICCM
2,700,736 UART: [exit] Launching FMC @ 0x40000130
2,706,065 UART:
2,706,081 UART: Running Caliptra FMC ...
2,706,489 UART:
2,706,632 UART: [state] CFI Enabled
2,717,565 UART: [fht] FMC Alias Private Key: 7
2,825,580 UART: [art] Extend RT PCRs Done
2,826,008 UART: [art] Lock RT PCRs Done
2,827,580 UART: [art] Populate DV Done
2,835,843 UART: [fht] FMC Alias Private Key: 7
2,836,859 UART: [art] Derive CDI
2,837,139 UART: [art] Store in in slot 0x4
2,922,816 UART: [art] Derive Key Pair
2,923,176 UART: [art] Store priv key in slot 0x5
2,937,066 UART: [art] Derive Key Pair - Done
2,951,704 UART: [art] Signing Cert with AUTHO
2,952,184 UART: RITY.KEYID = 7
2,967,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,213 UART: [art] PUB.X = 97730CF84ACF7C77FAAD4A52DEF013F3E7FDB530E2E3194BF9BA5E745E8D4E7197E9D7381B75D4ED49BC9454C56FC0E2
2,975,000 UART: [art] PUB.Y = 5034F668CE0CE0E45DD4373D782040EBE5E61A6B331797519963F56FD782378DD22CF1D3F6A2D6230FA90989C7035175
2,981,934 UART: [art] SIG.R = 4F05E71E5E5E85F700600A8897FFD67D05C98658860743566704A4DDDE3660B4893DC11324A892651704D2D94FF4F64D
2,988,656 UART: [art] SIG.S = F5C45C2DC767FA251F643389DDBA1F92DE235B23B9590E220A521AE47644F46C119D4C8CB2D3DE744D4EB551EF0CDAD5
3,012,564 UART: mbox::rt_entry...
3,012,936 UART: ____ _ _ _ ____ _____
3,013,720 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,520 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,288 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,824 UART: |_|
3,017,136 UART:
3,124,424 UART: [rt] Runtime listening for mailbox commands...
3,129,392 >>> mbox cmd response data (3272 bytes)
3,129,393 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,479 >>> mbox cmd response data (0 bytes)
3,152,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,600 UART:
3,152,616 UART: Running Caliptra ROM ...
3,153,024 UART:
3,153,165 UART: [state] CFI Enabled
3,156,099 UART: [state] LifecycleState = Unprovisioned
3,156,754 UART: [state] DebugLocked = No
3,157,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,158,849 UART: [kat] SHA2-256
3,952,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,956,895 UART: [kat] ++
3,957,047 UART: [kat] sha1
3,961,335 UART: [kat] SHA2-256
3,963,273 UART: [kat] SHA2-384
3,966,090 UART: [kat] SHA2-512-ACC
3,967,990 UART: [kat] ECC-384
3,973,901 UART: [kat] HMAC-384Kdf
3,978,525 UART: [kat] LMS
4,546,721 UART: [kat] --
4,547,360 UART: [update-reset] ++
5,881,628 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,678 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,032,554 >>> mbox cmd response: success
6,032,657 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,671 UART: [update-reset Success] --
6,041,818 UART: [state] Locking Datavault
6,042,682 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,286 UART: [state] Locking ICCM
6,043,908 UART: [exit] Launching FMC @ 0x40000130
6,049,237 UART:
6,049,253 UART: Running Caliptra FMC ...
6,049,661 UART:
6,049,804 UART: [state] CFI Enabled
6,138,901 UART: [art] Extend RT PCRs Done
6,139,329 UART: [art] Lock RT PCRs Done
6,140,570 UART: [art] Populate DV Done
6,148,801 UART: [fht] FMC Alias Private Key: 7
6,149,889 UART: [art] Derive CDI
6,150,169 UART: [art] Store in in slot 0x4
6,235,794 UART: [art] Derive Key Pair
6,236,154 UART: [art] Store priv key in slot 0x5
6,249,260 UART: [art] Derive Key Pair - Done
6,264,056 UART: [art] Signing Cert with AUTHO
6,264,536 UART: RITY.KEYID = 7
6,280,074 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,839 UART: [art] PUB.X = F7E3BE3BE1E97C421D6F7C239CC25C0F3675376949CB1C6124C26FBAECA95ACC5D4A43726F1BB4FACA1DEB83490162D0
6,287,623 UART: [art] PUB.Y = A1A6BE7BE5C02B63DCBF7936459769BE7970DD7BAA57293C27F9DB0604B1401510E24FC630F4D78B20E685D0E9F7BF9B
6,294,579 UART: [art] SIG.R = 9D81855B26D842ECC6E243B4CF589E5CAC97FF2A56AC633E0157BA62BB29BD7D83D3CAC33AF0A60A8CCC70B8B9BDA751
6,301,367 UART: [art] SIG.S = 91222EBB9E53458405E34CCD82B84E23692A373BDF814F60CFBCA65757790A397DC1E2816FA3E1EB7C63815C799D9897
6,325,044 UART: Caliptra RT
6,325,389 UART: [state] CFI Enabled
6,622,389 UART: Disable attest DPE used context limit breach
6,623,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,624,420 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,655,010 UART: [rt]cmd =0x494e464f, len=4
6,658,531 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,210 ready_for_fw is high
1,362,210 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,227 >>> mbox cmd response: success
2,465,227 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,109 UART:
2,527,125 UART: Running Caliptra FMC ...
2,527,533 UART:
2,527,676 UART: [state] CFI Enabled
2,538,463 UART: [fht] FMC Alias Private Key: 7
2,646,828 UART: [art] Extend RT PCRs Done
2,647,256 UART: [art] Lock RT PCRs Done
2,648,604 UART: [art] Populate DV Done
2,656,899 UART: [fht] FMC Alias Private Key: 7
2,657,915 UART: [art] Derive CDI
2,658,195 UART: [art] Store in in slot 0x4
2,743,672 UART: [art] Derive Key Pair
2,744,032 UART: [art] Store priv key in slot 0x5
2,757,416 UART: [art] Derive Key Pair - Done
2,771,930 UART: [art] Signing Cert with AUTHO
2,772,410 UART: RITY.KEYID = 7
2,787,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,491 UART: [art] PUB.X = EF761741C2E85B17DDE91386412018D3B38C27B8D178BD10C1E226BD1E0061266397F63D6FB879B8202C741CE43AF74F
2,795,239 UART: [art] PUB.Y = D8791CA9929300A4A5EAEE05864C476FE5BE4E6370434E2D1AF64A91CA252907BEFAB1431B1D2D1FB07ACF590DA396DB
2,802,174 UART: [art] SIG.R = 5DCA8D33086DB60DE1FDF3E86500E609A52F96DB483B8AA7692229DA06E449377A6AE12ACD715095546C517F3A3C85AA
2,808,918 UART: [art] SIG.S = 18430603769965044FF9136F2D48E4ABADB42D8D8AFAAF35399975F42D5038FE4A2A0FB7CFE58C3323F7A9FCCDC79D5E
2,832,405 UART: mbox::rt_entry...
2,832,777 UART: ____ _ _ _ ____ _____
2,833,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,129 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,897 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,665 UART: |_|
2,836,977 UART:
2,944,500 UART: [rt] Runtime listening for mailbox commands...
2,949,468 >>> mbox cmd response data (3272 bytes)
2,949,469 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,555 >>> mbox cmd response data (0 bytes)
2,972,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,735,336 >>> mbox cmd response: success
5,748,451 UART:
5,748,467 UART: Running Caliptra FMC ...
5,748,875 UART:
5,749,018 UART: [state] CFI Enabled
5,838,349 UART: [art] Extend RT PCRs Done
5,838,777 UART: [art] Lock RT PCRs Done
5,840,174 UART: [art] Populate DV Done
5,848,217 UART: [fht] FMC Alias Private Key: 7
5,849,149 UART: [art] Derive CDI
5,849,429 UART: [art] Store in in slot 0x4
5,935,066 UART: [art] Derive Key Pair
5,935,426 UART: [art] Store priv key in slot 0x5
5,948,844 UART: [art] Derive Key Pair - Done
5,963,649 UART: [art] Signing Cert with AUTHO
5,964,129 UART: RITY.KEYID = 7
5,979,547 UART: [art] Erasing AUTHORITY.KEYID = 7
5,980,312 UART: [art] PUB.X = CDC7F99FD977DC9DA4C8673D22CB99FF8404479120CB8DB6ED728EBBED76EFDD0BD83E0B5F3D5397324D85858CEC06FC
5,987,094 UART: [art] PUB.Y = 820BDD4F50944A1E1BF82F773836F73D8AC5073CC19777D41C0564C3537352756589452E6F08D20C2F5F8601B35D3CB0
5,994,020 UART: [art] SIG.R = 7BC1B6933C9A13A9F0C42CE6880B7AECE18A2B26C08095F87B94D65290D7077A937495B89337B63C83865B9D86BCB8D3
6,000,786 UART: [art] SIG.S = DE9D3B1739F6C82A6EBDD42AFF82298EFAE8DA889A8E9B316A1BB5DD3D237709439B21F987946825F18AB957416B925C
6,025,230 UART: Caliptra RT
6,025,575 UART: [state] CFI Enabled
6,317,124 UART: Disable attest DPE used context limit breach
6,317,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,319,125 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,587 UART: [rt]cmd =0x494e464f, len=4
6,353,296 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,730 UART: [kat] SHA2-512-ACC
908,631 UART: [kat] ECC-384
918,472 UART: [kat] HMAC-384Kdf
922,972 UART: [kat] LMS
1,171,300 UART: [kat] --
1,172,127 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,358 UART: [idev] ++
1,175,526 UART: [idev] CDI.KEYID = 6
1,175,886 UART: [idev] SUBJECT.KEYID = 7
1,176,310 UART: [idev] UDS.KEYID = 0
1,176,655 ready_for_fw is high
1,176,655 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,338 UART: [idev] Erasing UDS.KEYID = 0
1,201,313 UART: [idev] Sha1 KeyId Algorithm
1,209,705 UART: [idev] --
1,210,797 UART: [ldev] ++
1,210,965 UART: [ldev] CDI.KEYID = 6
1,211,328 UART: [ldev] SUBJECT.KEYID = 5
1,211,754 UART: [ldev] AUTHORITY.KEYID = 7
1,212,217 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,754 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,133 >>> mbox cmd response: success
2,313,133 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,193 UART: [afmc] ++
2,314,361 UART: [afmc] CDI.KEYID = 6
2,314,723 UART: [afmc] SUBJECT.KEYID = 7
2,315,148 UART: [afmc] AUTHORITY.KEYID = 5
2,350,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,488 UART: [afmc] --
2,393,412 UART: [cold-reset] --
2,394,298 UART: [state] Locking Datavault
2,395,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,067 UART: [state] Locking ICCM
2,396,613 UART: [exit] Launching FMC @ 0x40000130
2,401,942 UART:
2,401,958 UART: Running Caliptra FMC ...
2,402,366 UART:
2,402,420 UART: [state] CFI Enabled
2,413,113 UART: [fht] FMC Alias Private Key: 7
2,520,790 UART: [art] Extend RT PCRs Done
2,521,218 UART: [art] Lock RT PCRs Done
2,523,134 UART: [art] Populate DV Done
2,531,371 UART: [fht] FMC Alias Private Key: 7
2,532,343 UART: [art] Derive CDI
2,532,623 UART: [art] Store in in slot 0x4
2,618,784 UART: [art] Derive Key Pair
2,619,144 UART: [art] Store priv key in slot 0x5
2,632,224 UART: [art] Derive Key Pair - Done
2,647,221 UART: [art] Signing Cert with AUTHO
2,647,701 UART: RITY.KEYID = 7
2,663,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,766 UART: [art] PUB.X = 0B4B6440B65F26ADCD271C7B5F22B0644542ABC0FA15DDA1E76FB91466E6DED035E1FE7A2CB9DC2B26E11AEFD4F0F516
2,670,557 UART: [art] PUB.Y = B0E2CF81987B2AF84927DD85EC3884DBDB6A9227BEFAEB6DAE7158E53FAA961002B679A67CA94C1A5D8FB3F100EBE149
2,677,504 UART: [art] SIG.R = 525E4C287F0C836FD5F215D1B326E88B952456664B1C3A64F0BA21ECEBE999B0B78A982736847110BFDB1B16F7E3DE24
2,684,277 UART: [art] SIG.S = 430A41B25183EF8F35B71AF828DAACC8F21FD7441C005688141ABE1CA7FC9BF2B2598DD807137B8DF834065F1706803D
2,708,204 UART: mbox::rt_entry...
2,708,576 UART: ____ _ _ _ ____ _____
2,709,360 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,160 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,928 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,696 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,464 UART: |_|
2,712,776 UART:
2,819,498 UART: [rt] Runtime listening for mailbox commands...
2,824,466 >>> mbox cmd response data (3272 bytes)
2,824,467 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,553 >>> mbox cmd response data (0 bytes)
2,847,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,847,671 UART:
2,847,687 UART: Running Caliptra ROM ...
2,848,095 UART:
2,848,150 UART: [state] CFI Enabled
2,851,038 UART: [state] LifecycleState = Unprovisioned
2,851,693 UART: [state] DebugLocked = No
2,852,203 UART: [state] WD Timer not started. Device not locked for debugging
2,853,563 UART: [kat] SHA2-256
3,659,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,338 UART: [kat] ++
3,663,490 UART: [kat] sha1
3,667,694 UART: [kat] SHA2-256
3,669,634 UART: [kat] SHA2-384
3,672,445 UART: [kat] SHA2-512-ACC
3,674,345 UART: [kat] ECC-384
3,684,166 UART: [kat] HMAC-384Kdf
3,688,652 UART: [kat] LMS
3,936,980 UART: [kat] --
3,937,858 UART: [update-reset] ++
5,251,072 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,401,857 >>> mbox cmd response: success
5,402,058 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,072 UART: [update-reset Success] --
5,410,955 UART: [state] Locking Datavault
5,411,601 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,205 UART: [state] Locking ICCM
5,412,691 UART: [exit] Launching FMC @ 0x40000130
5,418,020 UART:
5,418,036 UART: Running Caliptra FMC ...
5,418,444 UART:
5,418,498 UART: [state] CFI Enabled
5,507,617 UART: [art] Extend RT PCRs Done
5,508,045 UART: [art] Lock RT PCRs Done
5,509,378 UART: [art] Populate DV Done
5,517,691 UART: [fht] FMC Alias Private Key: 7
5,518,745 UART: [art] Derive CDI
5,519,025 UART: [art] Store in in slot 0x4
5,604,784 UART: [art] Derive Key Pair
5,605,144 UART: [art] Store priv key in slot 0x5
5,617,120 UART: [art] Derive Key Pair - Done
5,631,951 UART: [art] Signing Cert with AUTHO
5,632,431 UART: RITY.KEYID = 7
5,647,691 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,456 UART: [art] PUB.X = 8F80A7AD4FE1B4F9E6986995A79E12CEA127BBA6CBD72B7F07A7C35F10360A0AB1ECB3CE0C3BB035963BCF77CE2B9FF7
5,655,240 UART: [art] PUB.Y = 3D471AF3F30C41FE0CA50CCE346BC7D6F10B6FBC3FE02B62C6AFDEA842C74379E21A14E87E90C43B64B1F04D15407EE1
5,662,198 UART: [art] SIG.R = 45EEBAA9A5B31F5B8C2FC779E121A415CF0582F3324ECFE33C4EDFFFD5E67A215621369D413780D5787262C877C0D02C
5,668,975 UART: [art] SIG.S = F072586CAFCE157A03CB97984F7D6CA331CF3F961DA756A2231F0B89A75204101B6999857A0C614E53E74BF5F3034729
5,692,653 UART: Caliptra RT
5,692,906 UART: [state] CFI Enabled
5,984,467 UART: Disable attest DPE used context limit breach
5,985,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,986,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,340 UART: [rt]cmd =0x494e464f, len=4
6,021,099 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 ready_for_fw is high
1,060,309 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,216 >>> mbox cmd response: success
2,164,216 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,758 UART:
2,225,774 UART: Running Caliptra FMC ...
2,226,182 UART:
2,226,236 UART: [state] CFI Enabled
2,236,949 UART: [fht] FMC Alias Private Key: 7
2,345,146 UART: [art] Extend RT PCRs Done
2,345,574 UART: [art] Lock RT PCRs Done
2,347,158 UART: [art] Populate DV Done
2,355,307 UART: [fht] FMC Alias Private Key: 7
2,356,449 UART: [art] Derive CDI
2,356,729 UART: [art] Store in in slot 0x4
2,442,410 UART: [art] Derive Key Pair
2,442,770 UART: [art] Store priv key in slot 0x5
2,455,894 UART: [art] Derive Key Pair - Done
2,470,770 UART: [art] Signing Cert with AUTHO
2,471,250 UART: RITY.KEYID = 7
2,486,510 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,275 UART: [art] PUB.X = 999081039469CD83DAF040ED6A9185F8B7B44E4DC962269F8C99D16DC582909F004B73B0CC2166DA1E80D42435485022
2,494,014 UART: [art] PUB.Y = 5676C6BB26C56A5D04BBE4F2383CB9DBC87FD0A715D6EE85E99ACA2C77E67A0E1795B53A6036EEFD6B973D2AFFE62B25
2,500,980 UART: [art] SIG.R = 016DA61EBC030D83BCC007A8F86E617253DDA2E1F4C1A0A476906F263DAD3B3D51466A06CC6CC5BBA65AC13676F2770F
2,507,746 UART: [art] SIG.S = DD80425AE6CEAD586C5C525206899009DB46FC230D1759FACDCFA055C036B27E462BFB1C06422D7A662F7107913E2AD2
2,531,288 UART: mbox::rt_entry...
2,531,660 UART: ____ _ _ _ ____ _____
2,532,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,780 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,548 UART: |_|
2,535,860 UART:
2,642,012 UART: [rt] Runtime listening for mailbox commands...
2,646,980 >>> mbox cmd response data (3272 bytes)
2,646,981 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,670,067 >>> mbox cmd response data (0 bytes)
2,670,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,106,776 >>> mbox cmd response: success
5,120,160 UART:
5,120,176 UART: Running Caliptra FMC ...
5,120,584 UART:
5,120,638 UART: [state] CFI Enabled
5,209,123 UART: [art] Extend RT PCRs Done
5,209,551 UART: [art] Lock RT PCRs Done
5,210,976 UART: [art] Populate DV Done
5,219,171 UART: [fht] FMC Alias Private Key: 7
5,220,343 UART: [art] Derive CDI
5,220,623 UART: [art] Store in in slot 0x4
5,306,916 UART: [art] Derive Key Pair
5,307,276 UART: [art] Store priv key in slot 0x5
5,320,158 UART: [art] Derive Key Pair - Done
5,334,487 UART: [art] Signing Cert with AUTHO
5,334,967 UART: RITY.KEYID = 7
5,350,273 UART: [art] Erasing AUTHORITY.KEYID = 7
5,351,038 UART: [art] PUB.X = 6326C3A12D3211E8BC1E39C39BCCA81D4BB1727F8C09352B79D097E00E38F4CD3D5A7F1B80047113727C7622F96C265B
5,357,801 UART: [art] PUB.Y = 5255DAD5C8E4373F27819815F1721BC28701C0EE494C396271FD8190A8295691E08062CD72CD0351557946AC767EB9DB
5,364,737 UART: [art] SIG.R = C0281D9C055D38427159517928C8DE2492E3DD634536E6BF2CB523BD68A1CB0483BC6362F3C36A15AF2AB117D2446F9E
5,371,503 UART: [art] SIG.S = 388160730F077ABDF0B87D9E942884098E5E398DF762859BBB0E0B93757953EBCFFADEC46C53D8C644E51AE65AF28A8F
5,395,057 UART: Caliptra RT
5,395,310 UART: [state] CFI Enabled
5,683,177 UART: Disable attest DPE used context limit breach
5,683,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,685,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,715,338 UART: [rt]cmd =0x494e464f, len=4
5,718,819 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
893,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,082 UART: [kat] ++
898,234 UART: [kat] sha1
902,554 UART: [kat] SHA2-256
904,494 UART: [kat] SHA2-384
907,265 UART: [kat] SHA2-512-ACC
909,166 UART: [kat] ECC-384
919,141 UART: [kat] HMAC-384Kdf
923,777 UART: [kat] LMS
1,172,105 UART: [kat] --
1,173,110 UART: [cold-reset] ++
1,173,482 UART: [fht] FHT @ 0x50003400
1,176,135 UART: [idev] ++
1,176,303 UART: [idev] CDI.KEYID = 6
1,176,663 UART: [idev] SUBJECT.KEYID = 7
1,177,087 UART: [idev] UDS.KEYID = 0
1,177,432 ready_for_fw is high
1,177,432 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,225 UART: [idev] Erasing UDS.KEYID = 0
1,202,140 UART: [idev] Sha1 KeyId Algorithm
1,210,686 UART: [idev] --
1,211,590 UART: [ldev] ++
1,211,758 UART: [ldev] CDI.KEYID = 6
1,212,121 UART: [ldev] SUBJECT.KEYID = 5
1,212,547 UART: [ldev] AUTHORITY.KEYID = 7
1,213,010 UART: [ldev] FE.KEYID = 1
1,218,260 UART: [ldev] Erasing FE.KEYID = 1
1,244,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,882 UART: [ldev] --
1,284,269 UART: [fwproc] Wait for Commands...
1,284,939 UART: [fwproc] Recv command 0x46574c44
1,285,667 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,377 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,760 >>> mbox cmd response: success
2,314,760 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,816 UART: [afmc] ++
2,315,984 UART: [afmc] CDI.KEYID = 6
2,316,346 UART: [afmc] SUBJECT.KEYID = 7
2,316,771 UART: [afmc] AUTHORITY.KEYID = 5
2,351,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,115 UART: [afmc] --
2,396,125 UART: [cold-reset] --
2,396,939 UART: [state] Locking Datavault
2,397,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,492 UART: [state] Locking ICCM
2,399,052 UART: [exit] Launching FMC @ 0x40000130
2,404,381 UART:
2,404,397 UART: Running Caliptra FMC ...
2,404,805 UART:
2,404,948 UART: [state] CFI Enabled
2,415,185 UART: [fht] FMC Alias Private Key: 7
2,522,974 UART: [art] Extend RT PCRs Done
2,523,402 UART: [art] Lock RT PCRs Done
2,524,686 UART: [art] Populate DV Done
2,532,681 UART: [fht] FMC Alias Private Key: 7
2,533,687 UART: [art] Derive CDI
2,533,967 UART: [art] Store in in slot 0x4
2,619,610 UART: [art] Derive Key Pair
2,619,970 UART: [art] Store priv key in slot 0x5
2,633,626 UART: [art] Derive Key Pair - Done
2,648,525 UART: [art] Signing Cert with AUTHO
2,649,005 UART: RITY.KEYID = 7
2,664,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,888 UART: [art] PUB.X = 9804F68B5257AB1DEA21073E632D1922A70302CC32E90B636D43E7A69EF685B4F61581DF780D05F1804876BC39F70D25
2,671,630 UART: [art] PUB.Y = 8868C9A1350C5FD5BC29E7D7871714655D30A9B1393A35E0C797083BAED5E7A4D125EE084E1976CC68D40D971C37C4F5
2,678,570 UART: [art] SIG.R = 2DD0814D2C667026F884AA326ABA8CDDCEEBAE90062F30355137D5B4D4D368DB08CCCD92FCCCD43C61C4B2830EEAA284
2,685,353 UART: [art] SIG.S = 6D1ACD26EFA4099DA634E2C459164D12B127A084A48C5F1646410186FFD56805B361945AD1FB5B932B50407B2F628CAE
2,709,123 UART: mbox::rt_entry...
2,709,495 UART: ____ _ _ _ ____ _____
2,710,279 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,615 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,383 UART: |_|
2,713,695 UART:
2,820,887 UART: [rt] Runtime listening for mailbox commands...
2,825,855 >>> mbox cmd response data (3272 bytes)
2,825,856 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,942 >>> mbox cmd response data (0 bytes)
2,848,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,849,060 UART:
2,849,076 UART: Running Caliptra ROM ...
2,849,484 UART:
2,849,626 UART: [state] CFI Enabled
2,852,052 UART: [state] LifecycleState = Unprovisioned
2,852,707 UART: [state] DebugLocked = No
2,853,405 UART: [state] WD Timer not started. Device not locked for debugging
2,854,621 UART: [kat] SHA2-256
3,660,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,396 UART: [kat] ++
3,664,548 UART: [kat] sha1
3,668,848 UART: [kat] SHA2-256
3,670,788 UART: [kat] SHA2-384
3,673,551 UART: [kat] SHA2-512-ACC
3,675,451 UART: [kat] ECC-384
3,685,080 UART: [kat] HMAC-384Kdf
3,689,704 UART: [kat] LMS
3,938,032 UART: [kat] --
3,938,790 UART: [update-reset] ++
5,250,588 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,711 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,401,535 >>> mbox cmd response: success
5,401,682 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,696 UART: [update-reset Success] --
5,410,765 UART: [state] Locking Datavault
5,411,491 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,095 UART: [state] Locking ICCM
5,412,565 UART: [exit] Launching FMC @ 0x40000130
5,417,894 UART:
5,417,910 UART: Running Caliptra FMC ...
5,418,318 UART:
5,418,461 UART: [state] CFI Enabled
5,507,676 UART: [art] Extend RT PCRs Done
5,508,104 UART: [art] Lock RT PCRs Done
5,509,285 UART: [art] Populate DV Done
5,517,324 UART: [fht] FMC Alias Private Key: 7
5,518,352 UART: [art] Derive CDI
5,518,632 UART: [art] Store in in slot 0x4
5,604,509 UART: [art] Derive Key Pair
5,604,869 UART: [art] Store priv key in slot 0x5
5,618,085 UART: [art] Derive Key Pair - Done
5,632,660 UART: [art] Signing Cert with AUTHO
5,633,140 UART: RITY.KEYID = 7
5,648,196 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,961 UART: [art] PUB.X = 009C2D734C64434BA59F00A2F5168330B1F032800482E237E8FFCC5592633548FF07D17CAB05E24471E13629CAE01079
5,655,670 UART: [art] PUB.Y = 6F14CB36724D17D22E172E73116CE430B4CC44AA2CAA72707D832A14A75F6D4B4E39381BD7BD146D3D325C5D61543D56
5,662,624 UART: [art] SIG.R = 038DAE4B16A65DD9DA4E78ED7DAE2A5929A3DB69BAE08D6B889C3C8E53BFA32B525D466B54D832D89F0F9BFB35FE40AF
5,669,414 UART: [art] SIG.S = 001F1136CBD21D6E12D796D63E1213B04328BC8A65DD3709BB80A45F88931AB30547BA2861D06330856B4D40998F3FB6
5,693,725 UART: Caliptra RT
5,694,070 UART: [state] CFI Enabled
5,984,206 UART: Disable attest DPE used context limit breach
5,984,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,986,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,945 UART: [rt]cmd =0x494e464f, len=4
6,020,634 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,936 ready_for_fw is high
1,060,936 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,717 >>> mbox cmd response: success
2,166,717 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,229,287 UART:
2,229,303 UART: Running Caliptra FMC ...
2,229,711 UART:
2,229,854 UART: [state] CFI Enabled
2,240,501 UART: [fht] FMC Alias Private Key: 7
2,348,286 UART: [art] Extend RT PCRs Done
2,348,714 UART: [art] Lock RT PCRs Done
2,350,076 UART: [art] Populate DV Done
2,358,433 UART: [fht] FMC Alias Private Key: 7
2,359,421 UART: [art] Derive CDI
2,359,701 UART: [art] Store in in slot 0x4
2,445,444 UART: [art] Derive Key Pair
2,445,804 UART: [art] Store priv key in slot 0x5
2,459,016 UART: [art] Derive Key Pair - Done
2,473,795 UART: [art] Signing Cert with AUTHO
2,474,275 UART: RITY.KEYID = 7
2,489,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,484 UART: [art] PUB.X = E6BAE4E620570A11220577B2611DFA7A8DE9D170BF76391722C667745E3BDFA4197A3296B068A516BC33EAF1EF12FF88
2,497,254 UART: [art] PUB.Y = 5505C1B006E7B9B9B622B44F562A2C3956813D73DDF2FA87616E76376C5FAFDEA51781C4C48D115FC24A97C99778CED1
2,504,204 UART: [art] SIG.R = 5A76F5744E82C751636D1283972CE563FBAC4684AD3E21062D8952146093891DA0C1D3F296199D1239412BB733961FCF
2,510,961 UART: [art] SIG.S = 9D659715D88941AE219B26851D91B2719711BCD52BCBDA54B4EE475D7EE799324AD6AB84658BD5ABFD295A1B1837AA27
2,534,936 UART: mbox::rt_entry...
2,535,308 UART: ____ _ _ _ ____ _____
2,536,092 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,892 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,660 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,428 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,196 UART: |_|
2,539,508 UART:
2,646,312 UART: [rt] Runtime listening for mailbox commands...
2,651,280 >>> mbox cmd response data (3272 bytes)
2,651,281 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,674,367 >>> mbox cmd response data (0 bytes)
2,674,368 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,111,127 >>> mbox cmd response: success
5,124,217 UART:
5,124,233 UART: Running Caliptra FMC ...
5,124,641 UART:
5,124,784 UART: [state] CFI Enabled
5,214,191 UART: [art] Extend RT PCRs Done
5,214,619 UART: [art] Lock RT PCRs Done
5,215,816 UART: [art] Populate DV Done
5,224,281 UART: [fht] FMC Alias Private Key: 7
5,225,449 UART: [art] Derive CDI
5,225,729 UART: [art] Store in in slot 0x4
5,311,098 UART: [art] Derive Key Pair
5,311,458 UART: [art] Store priv key in slot 0x5
5,324,706 UART: [art] Derive Key Pair - Done
5,339,709 UART: [art] Signing Cert with AUTHO
5,340,189 UART: RITY.KEYID = 7
5,355,545 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,310 UART: [art] PUB.X = 2E8B08B9C86FFBD528008345F93220BBD36438C0DC2D91432BF95D07EBF3C732063AAE7B057170612927DFF87A3090B4
5,363,048 UART: [art] PUB.Y = 0FE7E599CA9D2332AA37A5055FEED8E5A11A64EC9DC001585DCEA805642A29D2EEA2C78E07B672C5B00C96D78DC59BDF
5,370,000 UART: [art] SIG.R = 21A644AB6A3BFD9E2A185A5C75F32821C54D4F52E466BBBF76B7BF0DC04675B7020CF556A262B3D71AD41313726F754E
5,376,769 UART: [art] SIG.S = C5B948F25AD39A6977BF6A9CE9E62D0A58F1951CC254BB8056C7CF14B6A50ED8AB794AFC55B9B9AF05C82BC00FC34C49
5,400,578 UART: Caliptra RT
5,400,923 UART: [state] CFI Enabled
5,691,888 UART: Disable attest DPE used context limit breach
5,692,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,693,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,391 UART: [rt]cmd =0x494e464f, len=4
5,728,172 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
915,768 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,137 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,209,084 UART: [ldev] ++
1,209,252 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,043 UART: [ldev] AUTHORITY.KEYID = 7
1,210,506 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,272 UART: [ldev] --
1,280,788 UART: [fwproc] Wait for Commands...
1,281,443 UART: [fwproc] Recv command 0x46574c44
1,282,176 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,567 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,041 >>> mbox cmd response: success
2,311,041 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,204 UART: [afmc] ++
2,312,372 UART: [afmc] CDI.KEYID = 6
2,312,735 UART: [afmc] SUBJECT.KEYID = 7
2,313,161 UART: [afmc] AUTHORITY.KEYID = 5
2,348,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,978 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,975 UART: [afmc] --
2,391,945 UART: [cold-reset] --
2,392,839 UART: [state] Locking Datavault
2,394,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,836 UART: [state] Locking ICCM
2,395,346 UART: [exit] Launching FMC @ 0x40000130
2,400,675 UART:
2,400,691 UART: Running Caliptra FMC ...
2,401,099 UART:
2,401,153 UART: [state] CFI Enabled
2,411,776 UART: [fht] FMC Alias Private Key: 7
2,519,891 UART: [art] Extend RT PCRs Done
2,520,319 UART: [art] Lock RT PCRs Done
2,522,015 UART: [art] Populate DV Done
2,530,294 UART: [fht] FMC Alias Private Key: 7
2,531,366 UART: [art] Derive CDI
2,531,646 UART: [art] Store in in slot 0x4
2,616,967 UART: [art] Derive Key Pair
2,617,327 UART: [art] Store priv key in slot 0x5
2,630,657 UART: [art] Derive Key Pair - Done
2,645,180 UART: [art] Signing Cert with AUTHO
2,645,660 UART: RITY.KEYID = 7
2,660,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,395 UART: [art] PUB.X = A90CE33CDEE9F28B34BE6312385F55BC1C2C467F6294BF86E75A570657750F5CA7AA2EE77C67F910135B44CC994602B1
2,668,159 UART: [art] PUB.Y = A1604A6A5DC16365074C899F04DE41541B604AF10CAEE7F81957DAE4B067C7586C20B18D6112F5205238D2F6770C72C5
2,675,095 UART: [art] SIG.R = 72917E54FBABB1505C57AD145FD3FC37F6CE1324465043EBF48B5DC33A879D9ABFDC857CDD2F495D0E25BE24F3429A6E
2,681,880 UART: [art] SIG.S = 4922DDE01699E4BC1E53482FC26702DA5EEBCF4EC3853C10328C711D72676A369A212DD63E748AED8DBC8DC5657AE2A5
2,705,436 UART: mbox::rt_entry...
2,705,808 UART: ____ _ _ _ ____ _____
2,706,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,160 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,696 UART: |_|
2,710,008 UART:
2,816,118 UART: [rt] Runtime listening for mailbox commands...
2,821,086 >>> mbox cmd response data (3272 bytes)
2,821,087 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,173 >>> mbox cmd response data (0 bytes)
2,844,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,844,291 UART:
2,844,307 UART: Running Caliptra ROM ...
2,844,715 UART:
2,844,770 UART: [state] CFI Enabled
2,847,212 UART: [state] LifecycleState = Unprovisioned
2,847,867 UART: [state] DebugLocked = No
2,848,361 UART: [state] WD Timer not started. Device not locked for debugging
2,849,687 UART: [kat] SHA2-256
3,653,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,366 UART: [kat] ++
3,657,518 UART: [kat] sha1
3,661,832 UART: [kat] SHA2-256
3,663,772 UART: [kat] SHA2-384
3,666,545 UART: [kat] SHA2-512-ACC
3,668,445 UART: [kat] ECC-384
3,677,638 UART: [kat] HMAC-384Kdf
3,682,176 UART: [kat] LMS
3,930,488 UART: [kat] --
3,931,246 UART: [update-reset] ++
5,244,157 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,245,204 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,395,028 >>> mbox cmd response: success
5,395,205 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,219 UART: [update-reset Success] --
5,404,102 UART: [state] Locking Datavault
5,405,102 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,706 UART: [state] Locking ICCM
5,406,166 UART: [exit] Launching FMC @ 0x40000130
5,411,495 UART:
5,411,511 UART: Running Caliptra FMC ...
5,411,919 UART:
5,411,973 UART: [state] CFI Enabled
5,501,032 UART: [art] Extend RT PCRs Done
5,501,460 UART: [art] Lock RT PCRs Done
5,502,697 UART: [art] Populate DV Done
5,510,864 UART: [fht] FMC Alias Private Key: 7
5,511,898 UART: [art] Derive CDI
5,512,178 UART: [art] Store in in slot 0x4
5,598,063 UART: [art] Derive Key Pair
5,598,423 UART: [art] Store priv key in slot 0x5
5,611,661 UART: [art] Derive Key Pair - Done
5,626,205 UART: [art] Signing Cert with AUTHO
5,626,685 UART: RITY.KEYID = 7
5,641,841 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,606 UART: [art] PUB.X = 7F7180093CB8F9ACE78308BD1520E5147F3587F11515F3147FAB08A2F4397A8C46FB68014BA13B4B5E0900447FA3B358
5,649,337 UART: [art] PUB.Y = 65C14D18CBEC1631B1C30A50764F4DC95D94158FED607BEED7418C26CA669FA54DBB67B8CB7D648BAF05F3E72AE96165
5,656,297 UART: [art] SIG.R = 63F04F62A095C59D4229407DF1924F59372684C7D7ECF45EE1E071734E971200D944C6BCFE5F7D2B4B0BEB224DFBDF11
5,663,050 UART: [art] SIG.S = D559EC1366F651EBB2D6C5DBC44CB042C1945C6B0690337172B5FF9AE0231F7A1618A51582983F482EA99AA492CE4AC3
5,686,626 UART: Caliptra RT
5,686,879 UART: [state] CFI Enabled
5,979,324 UART: Disable attest DPE used context limit breach
5,980,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,981,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,783 UART: [rt]cmd =0x494e464f, len=4
6,015,568 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,379 >>> mbox cmd response: success
2,160,379 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,435 UART:
2,222,451 UART: Running Caliptra FMC ...
2,222,859 UART:
2,222,913 UART: [state] CFI Enabled
2,233,646 UART: [fht] FMC Alias Private Key: 7
2,342,035 UART: [art] Extend RT PCRs Done
2,342,463 UART: [art] Lock RT PCRs Done
2,344,021 UART: [art] Populate DV Done
2,352,164 UART: [fht] FMC Alias Private Key: 7
2,353,154 UART: [art] Derive CDI
2,353,434 UART: [art] Store in in slot 0x4
2,438,971 UART: [art] Derive Key Pair
2,439,331 UART: [art] Store priv key in slot 0x5
2,452,531 UART: [art] Derive Key Pair - Done
2,467,082 UART: [art] Signing Cert with AUTHO
2,467,562 UART: RITY.KEYID = 7
2,483,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,813 UART: [art] PUB.X = 5D1D2365736712FC1D70924B12F0A01749F6F3FDA2F3FE50E93AD3637536C5F730A63C8F60F4A967772699E173530429
2,490,572 UART: [art] PUB.Y = C5F5F2EEA7256EB42D8BCCF0490BECCF5EE1B5FCBC17EC077F01E72885668A7054617DC3D21742DD9BFD81F9094359C0
2,497,528 UART: [art] SIG.R = B434F7F436D528CE9290EAF276B8BDD085AC61C9309BBF5DA9F3744CD130A3F3784E24AEA5A399DF05330E9BDC62C636
2,504,306 UART: [art] SIG.S = 8A87F4EE03856CC8131B6165B3E7EC4BAC4CF4346959DE3EE85E6669078F6DE2B0B3951CC02C08773FD409FB97DA8684
2,528,401 UART: mbox::rt_entry...
2,528,773 UART: ____ _ _ _ ____ _____
2,529,557 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,661 UART: |_|
2,532,973 UART:
2,639,250 UART: [rt] Runtime listening for mailbox commands...
2,644,218 >>> mbox cmd response data (3272 bytes)
2,644,219 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,305 >>> mbox cmd response data (0 bytes)
2,667,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,098,991 >>> mbox cmd response: success
5,112,261 UART:
5,112,277 UART: Running Caliptra FMC ...
5,112,685 UART:
5,112,739 UART: [state] CFI Enabled
5,201,704 UART: [art] Extend RT PCRs Done
5,202,132 UART: [art] Lock RT PCRs Done
5,203,601 UART: [art] Populate DV Done
5,211,626 UART: [fht] FMC Alias Private Key: 7
5,212,650 UART: [art] Derive CDI
5,212,930 UART: [art] Store in in slot 0x4
5,298,671 UART: [art] Derive Key Pair
5,299,031 UART: [art] Store priv key in slot 0x5
5,312,251 UART: [art] Derive Key Pair - Done
5,327,441 UART: [art] Signing Cert with AUTHO
5,327,921 UART: RITY.KEYID = 7
5,343,103 UART: [art] Erasing AUTHORITY.KEYID = 7
5,343,868 UART: [art] PUB.X = 76943DC1D8C6A204F0098F948D9F952E30CE58D0DC835C457BF2083EDCAF8EE9197E042F712012F20385518852B70367
5,350,616 UART: [art] PUB.Y = D9757EFEAC41210BBE867188CFD5EB3E46DB71D7B1616508B3A1DF574A3281A049EF79D54A3844FAA47B25DF9A08E137
5,357,569 UART: [art] SIG.R = BB30DC10BFF70EBAD7FFA7A5A13085C6AEE0C339471D1BA98D9936167C7559AF98FB1963F193071AAE50B9FDC2ABC63F
5,364,355 UART: [art] SIG.S = 6A571C655C611652EA844CEAE65F3C24CFC94D9DE50CF27F66E71B92CCDE78FA108EF0575DC9707AD8AFCB69CB6C6A69
5,387,913 UART: Caliptra RT
5,388,166 UART: [state] CFI Enabled
5,679,065 UART: Disable attest DPE used context limit breach
5,679,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,681,166 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,711,634 UART: [rt]cmd =0x494e464f, len=4
5,715,223 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,174,452 ready_for_fw is high
1,174,452 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,022 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,156 UART: [fwproc] Recv command 0x46574c44
1,283,889 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,400 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,802 >>> mbox cmd response: success
2,312,802 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,033 UART: [afmc] ++
2,314,201 UART: [afmc] CDI.KEYID = 6
2,314,564 UART: [afmc] SUBJECT.KEYID = 7
2,314,990 UART: [afmc] AUTHORITY.KEYID = 5
2,350,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,054 UART: [afmc] --
2,393,974 UART: [cold-reset] --
2,395,076 UART: [state] Locking Datavault
2,396,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,169 UART: [state] Locking ICCM
2,397,801 UART: [exit] Launching FMC @ 0x40000130
2,403,130 UART:
2,403,146 UART: Running Caliptra FMC ...
2,403,554 UART:
2,403,697 UART: [state] CFI Enabled
2,414,576 UART: [fht] FMC Alias Private Key: 7
2,523,073 UART: [art] Extend RT PCRs Done
2,523,501 UART: [art] Lock RT PCRs Done
2,525,273 UART: [art] Populate DV Done
2,533,476 UART: [fht] FMC Alias Private Key: 7
2,534,478 UART: [art] Derive CDI
2,534,758 UART: [art] Store in in slot 0x4
2,620,417 UART: [art] Derive Key Pair
2,620,777 UART: [art] Store priv key in slot 0x5
2,633,869 UART: [art] Derive Key Pair - Done
2,648,405 UART: [art] Signing Cert with AUTHO
2,648,885 UART: RITY.KEYID = 7
2,664,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,852 UART: [art] PUB.X = E926C98E32BB7306BB06609CB7BB634BF5489DFE40186B9A223AE6C141EEAA1DB7FD447E73D450F58ECE8C20AFF5CA41
2,671,636 UART: [art] PUB.Y = 8522DBA15FF2B7C24F5DED20E27D3E589F71788A6148D9EA722968948EAD8EECB4811CAA49F04B460D1BFA3A5C0D6BE7
2,678,598 UART: [art] SIG.R = 88567EBE79D46AE1FA1A8C6A1DC8D5A7F604CF2B81DDE21CDAA611D4F57B7A6841E7CE83A6CE0FDC5AFCF400BA502E75
2,685,370 UART: [art] SIG.S = 7DBE9BA420A256F66852557D30BBDF91136646A5745DE5D2902DDA6EC5F32229022D0CE819F77A22E3C636A5A7A32897
2,709,373 UART: mbox::rt_entry...
2,709,745 UART: ____ _ _ _ ____ _____
2,710,529 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,329 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,865 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,633 UART: |_|
2,713,945 UART:
2,821,695 UART: [rt] Runtime listening for mailbox commands...
2,826,663 >>> mbox cmd response data (3272 bytes)
2,826,664 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,849,750 >>> mbox cmd response data (0 bytes)
2,849,751 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,849,868 UART:
2,849,884 UART: Running Caliptra ROM ...
2,850,292 UART:
2,850,434 UART: [state] CFI Enabled
2,853,224 UART: [state] LifecycleState = Unprovisioned
2,853,879 UART: [state] DebugLocked = No
2,854,429 UART: [state] WD Timer not started. Device not locked for debugging
2,855,549 UART: [kat] SHA2-256
3,659,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,228 UART: [kat] ++
3,663,380 UART: [kat] sha1
3,667,700 UART: [kat] SHA2-256
3,669,640 UART: [kat] SHA2-384
3,672,545 UART: [kat] SHA2-512-ACC
3,674,445 UART: [kat] ECC-384
3,684,236 UART: [kat] HMAC-384Kdf
3,688,914 UART: [kat] LMS
3,937,226 UART: [kat] --
3,938,178 UART: [update-reset] ++
5,250,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,668 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,401,492 >>> mbox cmd response: success
5,401,619 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,633 UART: [update-reset Success] --
5,410,694 UART: [state] Locking Datavault
5,411,584 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,188 UART: [state] Locking ICCM
5,412,716 UART: [exit] Launching FMC @ 0x40000130
5,418,045 UART:
5,418,061 UART: Running Caliptra FMC ...
5,418,469 UART:
5,418,612 UART: [state] CFI Enabled
5,508,247 UART: [art] Extend RT PCRs Done
5,508,675 UART: [art] Lock RT PCRs Done
5,509,836 UART: [art] Populate DV Done
5,518,079 UART: [fht] FMC Alias Private Key: 7
5,519,153 UART: [art] Derive CDI
5,519,433 UART: [art] Store in in slot 0x4
5,605,042 UART: [art] Derive Key Pair
5,605,402 UART: [art] Store priv key in slot 0x5
5,618,600 UART: [art] Derive Key Pair - Done
5,633,709 UART: [art] Signing Cert with AUTHO
5,634,189 UART: RITY.KEYID = 7
5,649,355 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,120 UART: [art] PUB.X = 971F57DE68697755CB0F174D8083F5E9F634728500A3F5C20D19F6531CC18FC50AEF2EDF0A72774437E0A62502174DCA
5,656,853 UART: [art] PUB.Y = F795645AD75407DD106EA0585E552D7BE326F5199605613CC39A0E30513BD8301F71907B78EBF52D577914B72D7478AB
5,663,788 UART: [art] SIG.R = 8678EDFD4FB41EF6606EC03E016FE4E7B8711D7BAAA60CEFAC7E5C5C0BCD430AF33DE45F62795DED096587EC61A1F0C6
5,670,569 UART: [art] SIG.S = F84B063253E1910802F47D0A72FF2F0F487DBFEEB942D83E2F2A015958EAEFF7AB52EEFB170970E9E9A6FA982EFC88B9
5,694,741 UART: Caliptra RT
5,695,086 UART: [state] CFI Enabled
5,981,146 UART: Disable attest DPE used context limit breach
5,981,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,983,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,931 UART: [rt]cmd =0x494e464f, len=4
6,017,530 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 ready_for_fw is high
1,056,567 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,334 >>> mbox cmd response: success
2,162,334 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,154 UART:
2,225,170 UART: Running Caliptra FMC ...
2,225,578 UART:
2,225,721 UART: [state] CFI Enabled
2,235,904 UART: [fht] FMC Alias Private Key: 7
2,343,629 UART: [art] Extend RT PCRs Done
2,344,057 UART: [art] Lock RT PCRs Done
2,345,749 UART: [art] Populate DV Done
2,354,152 UART: [fht] FMC Alias Private Key: 7
2,355,096 UART: [art] Derive CDI
2,355,376 UART: [art] Store in in slot 0x4
2,441,047 UART: [art] Derive Key Pair
2,441,407 UART: [art] Store priv key in slot 0x5
2,454,741 UART: [art] Derive Key Pair - Done
2,469,302 UART: [art] Signing Cert with AUTHO
2,469,782 UART: RITY.KEYID = 7
2,484,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,431 UART: [art] PUB.X = C3957DDA67FDC1E499503BC884D60B7598E68A9478A10008DE38D3D6A70DD2EF87E1D15FDBAADB01081EB87553C24DBA
2,492,180 UART: [art] PUB.Y = 87D09D80884203591A0E3CC90EF6BCFEA983EA79DE01DF6A6D093A91E31445BDE06757850B3746941EBF1698F00F7FF9
2,499,115 UART: [art] SIG.R = BB33567F25437392A2A8D17DCB7F51E71F236E9F45E0A810C79191FC093472D8D9E93A9258935C184B3D9D5B0A76836D
2,505,877 UART: [art] SIG.S = E365B52A6E6E91A86D519FC35AD96C11871537D39D3899124F8E1E18EB27BB0EB66EE979007B0D6F0E7AE642C08EB3A2
2,529,813 UART: mbox::rt_entry...
2,530,185 UART: ____ _ _ _ ____ _____
2,530,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,073 UART: |_|
2,534,385 UART:
2,641,910 UART: [rt] Runtime listening for mailbox commands...
2,646,878 >>> mbox cmd response data (3272 bytes)
2,646,879 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,965 >>> mbox cmd response data (0 bytes)
2,669,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,102,588 >>> mbox cmd response: success
5,115,906 UART:
5,115,922 UART: Running Caliptra FMC ...
5,116,330 UART:
5,116,473 UART: [state] CFI Enabled
5,205,490 UART: [art] Extend RT PCRs Done
5,205,918 UART: [art] Lock RT PCRs Done
5,206,995 UART: [art] Populate DV Done
5,215,328 UART: [fht] FMC Alias Private Key: 7
5,216,470 UART: [art] Derive CDI
5,216,750 UART: [art] Store in in slot 0x4
5,302,509 UART: [art] Derive Key Pair
5,302,869 UART: [art] Store priv key in slot 0x5
5,316,079 UART: [art] Derive Key Pair - Done
5,330,543 UART: [art] Signing Cert with AUTHO
5,331,023 UART: RITY.KEYID = 7
5,346,237 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,002 UART: [art] PUB.X = 0EDE7509FDE65F0AC4590D4CEB02431E60F10591C0695414B487923F3A62CBDD195A731D334649E7E33964305BF7941A
5,353,752 UART: [art] PUB.Y = 11B231AB5EE5A7D318A92083CE6FB04FD3FEEA3E248B955A84243E9F59FBE7494383AEFE15B25B8C2AE51FDE680980BB
5,360,717 UART: [art] SIG.R = 96931372E8DCD708D9FCED954D8422D4D4F4A39C47726A7420BB4D9DBE667DFB14DB3953DF69E85D3BCB8F3362D5D931
5,367,496 UART: [art] SIG.S = A1226D85CF903A918B63A085A0C8583AD1BCB56DF196F9EF753B4CB1F3C38002D3033ED24C35754118CDE5A6017EBBF2
5,391,440 UART: Caliptra RT
5,391,785 UART: [state] CFI Enabled
5,685,363 UART: Disable attest DPE used context limit breach
5,686,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,718,174 UART: [rt]cmd =0x494e464f, len=4
5,721,813 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,599 UART: [kat] SHA2-256
892,537 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,675 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 ready_for_fw is high
1,480,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,222 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,501 UART: [ldev] ++
1,514,669 UART: [ldev] CDI.KEYID = 6
1,515,032 UART: [ldev] SUBJECT.KEYID = 5
1,515,458 UART: [ldev] AUTHORITY.KEYID = 7
1,515,921 UART: [ldev] FE.KEYID = 1
1,521,291 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,950 UART: [ldev] --
1,585,443 UART: [fwproc] Waiting for Commands...
1,586,294 UART: [fwproc] Received command 0x46574c44
1,587,085 UART: [fwproc] Received Image of size 114332 bytes
2,885,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,631 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,826 >>> mbox cmd response: success
3,079,036 UART: [afmc] ++
3,079,204 UART: [afmc] CDI.KEYID = 6
3,079,566 UART: [afmc] SUBJECT.KEYID = 7
3,079,991 UART: [afmc] AUTHORITY.KEYID = 5
3,115,162 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,949 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,639 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,504 UART: [afmc] --
3,158,594 UART: [cold-reset] --
3,159,284 UART: [state] Locking Datavault
3,160,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,761 UART: [state] Locking ICCM
3,161,275 UART: [exit] Launching FMC @ 0x40000130
3,166,604 UART:
3,166,620 UART: Running Caliptra FMC ...
3,167,028 UART:
3,167,082 UART: [state] CFI Enabled
3,177,501 UART: [fht] FMC Alias Private Key: 7
3,285,576 UART: [art] Extend RT PCRs Done
3,286,004 UART: [art] Lock RT PCRs Done
3,287,748 UART: [art] Populate DV Done
3,296,027 UART: [fht] FMC Alias Private Key: 7
3,296,983 UART: [art] Derive CDI
3,297,263 UART: [art] Store in in slot 0x4
3,383,224 UART: [art] Derive Key Pair
3,383,584 UART: [art] Store priv key in slot 0x5
3,396,770 UART: [art] Derive Key Pair - Done
3,411,797 UART: [art] Signing Cert with AUTHO
3,412,277 UART: RITY.KEYID = 7
3,427,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,178 UART: [art] PUB.X = DAEF3F2ABDCF93CC9E5581FE1CF5BEBC46456DBDADC246F7643C71DFD47D5B27A8E6B01FA73E3ED204104088FEFA243D
3,434,977 UART: [art] PUB.Y = E0954B006F9FC5B2911B2EA5CC5A5889BF42B81F0F77D91508874E9353CB5714A974227F33ED47A2658B90B5E7B06E1C
3,441,901 UART: [art] SIG.R = EE31074B03EBCC9B765F4376EE138BCEEE2E3E0E819AAEEF4AA4AA1FC42A2980BE51F53825CEB6717D7524B48A6248AB
3,448,684 UART: [art] SIG.S = FCCCBF619665D6A880911FF2062663EED3458C1CB36B313A5606AB20A8F7C547A4C07BF57B6971BB1F669C91B13C66A3
3,472,501 UART: Caliptra RT
3,472,754 UART: [state] CFI Enabled
3,580,782 UART: [rt] RT listening for mailbox commands...
3,581,452 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,068 UART: [rt]cmd =0x50435252, len=8
3,612,716 >>> mbox cmd response data (8 bytes)
3,612,717 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,389 UART:
3,613,405 UART: Running Caliptra ROM ...
3,613,813 UART:
3,613,867 UART: [state] CFI Enabled
3,616,191 UART: [state] LifecycleState = Unprovisioned
3,616,846 UART: [state] DebugLocked = No
3,617,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,965 UART: [kat] SHA2-256
4,412,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,011 UART: [kat] ++
4,417,163 UART: [kat] sha1
4,421,325 UART: [kat] SHA2-256
4,423,263 UART: [kat] SHA2-384
4,425,812 UART: [kat] SHA2-512-ACC
4,427,712 UART: [kat] ECC-384
4,433,407 UART: [kat] HMAC-384Kdf
4,438,077 UART: [kat] LMS
5,006,273 UART: [kat] --
5,007,232 UART: [update-reset] ++
5,934,486 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,582 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,032,016 >>> mbox cmd response: success
6,032,016 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,032,299 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,313 UART: [update-reset Success] --
6,041,146 UART: [state] Locking Datavault
6,042,036 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,640 UART: [state] Locking ICCM
6,043,178 UART: [exit] Launching FMC @ 0x40000130
6,048,507 UART:
6,048,523 UART: Running Caliptra FMC ...
6,048,931 UART:
6,048,985 UART: [state] CFI Enabled
6,138,420 UART: [art] Extend RT PCRs Done
6,138,848 UART: [art] Lock RT PCRs Done
6,140,331 UART: [art] Populate DV Done
6,148,536 UART: [fht] FMC Alias Private Key: 7
6,149,526 UART: [art] Derive CDI
6,149,806 UART: [art] Store in in slot 0x4
6,235,367 UART: [art] Derive Key Pair
6,235,727 UART: [art] Store priv key in slot 0x5
6,248,745 UART: [art] Derive Key Pair - Done
6,263,375 UART: [art] Signing Cert with AUTHO
6,263,855 UART: RITY.KEYID = 7
6,278,715 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,480 UART: [art] PUB.X = 7B2E714312A9513BF73C4205CD4BE312ABC155357E515C66A824A44460603B30371554239D3DA1BE7F1FFA8462C8DC85
6,286,245 UART: [art] PUB.Y = 43D95D0A7F194F6F548390E21EDA4E1DA003C1F16492FBEEA91419D7458A103C67C4B9CFC8D7CB29341955C91B522908
6,293,190 UART: [art] SIG.R = B30FAB5739181A9B416B435CDB6BC684FF52A5021E6F8AEBF79C1A0D7CF97F81414F0111F0CF390DEE85A52BBACD2509
6,299,960 UART: [art] SIG.S = 8227D31B8F74202168EE2A6843B67490CB870DCD7491FC57410412133B8D9A07210742E50F288DD6C03A75BDCEF214D7
6,323,992 UART: mbox::rt_entry...
6,324,364 UART: ____ _ _ _ ____ _____
6,325,148 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,325,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,326,716 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,327,484 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,328,252 UART: |_|
6,328,564 UART:
6,609,881 UART: [rt] Runtime listening for mailbox commands...
6,610,928 >>> mbox cmd response data (128 bytes)
6,610,929 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,611,043 UART:
6,611,059 UART: Running Caliptra ROM ...
6,611,467 UART:
6,611,521 UART: [state] CFI Enabled
6,614,091 UART: [state] LifecycleState = Unprovisioned
6,614,746 UART: [state] DebugLocked = No
6,615,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,617,145 UART: [kat] SHA2-256
7,411,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,415,191 UART: [kat] ++
7,415,343 UART: [kat] sha1
7,419,673 UART: [kat] SHA2-256
7,421,611 UART: [kat] SHA2-384
7,424,220 UART: [kat] SHA2-512-ACC
7,426,120 UART: [kat] ECC-384
7,431,817 UART: [kat] HMAC-384Kdf
7,436,331 UART: [kat] LMS
8,004,527 UART: [kat] --
8,005,802 UART: [update-reset] ++
8,933,224 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,934,370 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,030,804 >>> mbox cmd response: success
9,030,804 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,031,021 UART: [update-reset] Copying MAN_2 To MAN_1
9,039,035 UART: [update-reset Success] --
9,039,716 UART: [state] Locking Datavault
9,040,396 UART: [state] Locking PCR0, PCR1 and PCR31
9,041,000 UART: [state] Locking ICCM
9,041,478 UART: [exit] Launching FMC @ 0x40000130
9,046,807 UART:
9,046,823 UART: Running Caliptra FMC ...
9,047,231 UART:
9,047,285 UART: [state] CFI Enabled
9,136,720 UART: [art] Extend RT PCRs Done
9,137,148 UART: [art] Lock RT PCRs Done
9,138,407 UART: [art] Populate DV Done
9,146,430 UART: [fht] FMC Alias Private Key: 7
9,147,494 UART: [art] Derive CDI
9,147,774 UART: [art] Store in in slot 0x4
9,233,481 UART: [art] Derive Key Pair
9,233,841 UART: [art] Store priv key in slot 0x5
9,246,541 UART: [art] Derive Key Pair - Done
9,261,495 UART: [art] Signing Cert with AUTHO
9,261,975 UART: RITY.KEYID = 7
9,277,337 UART: [art] Erasing AUTHORITY.KEYID = 7
9,278,102 UART: [art] PUB.X = 4B134C4D72B08F644B4E0FF2A008AF9D32960099ECA83073F2F72A28039FE8741403466719C902B5F844F994E0D7F997
9,284,829 UART: [art] PUB.Y = 958E604DCCB48F0794DDEB43BCD7C69BB8599D4AC1552C7CEDD08B5BF847BC17D8E64AE677D4D7CD78D0C17F1EA11305
9,291,795 UART: [art] SIG.R = 6AD68C8712BAC9A823E4CAC987A6BCA056DA4269DDE29F6E18A8E2D536DFCCD2CC94AB65F992FF4F11B1FABA21C5B112
9,298,593 UART: [art] SIG.S = 8577268646B8D54A9220978201B65C9202B562A15DCDA0871762B6BC050CB731B1350CA7E3FC7465185AB8EE4F309FD9
9,321,955 UART: mbox::rt_entry...
9,322,327 UART: ____ _ _ _ ____ _____
9,323,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,323,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,324,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,325,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,326,215 UART: |_|
9,326,527 UART:
9,607,647 UART: [rt] Runtime listening for mailbox commands...
9,608,694 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,731 ready_for_fw is high
1,362,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,880 >>> mbox cmd response: success
2,989,920 UART:
2,989,936 UART: Running Caliptra FMC ...
2,990,344 UART:
2,990,398 UART: [state] CFI Enabled
3,000,633 UART: [fht] FMC Alias Private Key: 7
3,108,922 UART: [art] Extend RT PCRs Done
3,109,350 UART: [art] Lock RT PCRs Done
3,110,538 UART: [art] Populate DV Done
3,118,805 UART: [fht] FMC Alias Private Key: 7
3,119,749 UART: [art] Derive CDI
3,120,029 UART: [art] Store in in slot 0x4
3,205,562 UART: [art] Derive Key Pair
3,205,922 UART: [art] Store priv key in slot 0x5
3,219,048 UART: [art] Derive Key Pair - Done
3,233,590 UART: [art] Signing Cert with AUTHO
3,234,070 UART: RITY.KEYID = 7
3,248,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,627 UART: [art] PUB.X = D429C854584BB612E21BCB64E349400BF8B42E6E0BB4294D9F93AE3EDF7C453F69E4D8A37AE23EDF473AC06BBF30EC07
3,256,406 UART: [art] PUB.Y = DB9DAA92276587F5E75A37B9110747061FEED615997C024D0A9F7D8391FADF49B8250931884380385B299363F703BCA4
3,263,332 UART: [art] SIG.R = 0151541E748520F1734D17C3184133B18EE6886B67326D458C560ACB64280A2C586C506BBC3D426E92F9704A21206A8F
3,270,081 UART: [art] SIG.S = 22B9EC2C3B85E97165732CEDA44D071D98B4F6FAF64702EB12070D13B779511BF32D4E3DC05694536D0A5FE1B9243D78
3,294,007 UART: Caliptra RT
3,294,260 UART: [state] CFI Enabled
3,402,470 UART: [rt] RT listening for mailbox commands...
3,403,140 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,820 UART: [rt]cmd =0x50435252, len=8
3,434,060 >>> mbox cmd response data (8 bytes)
3,434,061 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,734,912 >>> mbox cmd response: success
5,734,912 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,748,279 UART:
5,748,295 UART: Running Caliptra FMC ...
5,748,703 UART:
5,748,757 UART: [state] CFI Enabled
5,838,170 UART: [art] Extend RT PCRs Done
5,838,598 UART: [art] Lock RT PCRs Done
5,839,851 UART: [art] Populate DV Done
5,847,974 UART: [fht] FMC Alias Private Key: 7
5,849,152 UART: [art] Derive CDI
5,849,432 UART: [art] Store in in slot 0x4
5,935,115 UART: [art] Derive Key Pair
5,935,475 UART: [art] Store priv key in slot 0x5
5,948,355 UART: [art] Derive Key Pair - Done
5,963,199 UART: [art] Signing Cert with AUTHO
5,963,679 UART: RITY.KEYID = 7
5,978,799 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,564 UART: [art] PUB.X = 81ADB7F52D4B10BB3330C5386096F4E294ECF03964AC796C39EFD2EB9495E8BF660A5FF25884209AF85F666692CB9B33
5,986,337 UART: [art] PUB.Y = EDD1A341CA2B825B45A939F1AD35A4F1E036B7E2B13781EF805FF7B565A496CEC67C24059406FF11C940044B447918FC
5,993,284 UART: [art] SIG.R = 19398CC4E720E8FC441FC0C2A099FD5AF8798D8C324DD2AE0A6DDB2828529B634D94CC756C3980469FF62EB536CF3D4A
6,000,063 UART: [art] SIG.S = 5C291F0F39E3EEAE04E8863A87CA128DC0D099137D891C4C941ECEDEA637309FBA7BB1CB8C63ACE6253977F7787836F8
6,023,938 UART: mbox::rt_entry...
6,024,310 UART: ____ _ _ _ ____ _____
6,025,094 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,025,894 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,026,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,027,430 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,028,198 UART: |_|
6,028,510 UART:
6,311,353 UART: [rt] Runtime listening for mailbox commands...
6,312,400 >>> mbox cmd response data (128 bytes)
6,312,401 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,612,752 >>> mbox cmd response: success
8,612,752 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,625,901 UART:
8,625,917 UART: Running Caliptra FMC ...
8,626,325 UART:
8,626,379 UART: [state] CFI Enabled
8,716,038 UART: [art] Extend RT PCRs Done
8,716,466 UART: [art] Lock RT PCRs Done
8,717,629 UART: [art] Populate DV Done
8,726,008 UART: [fht] FMC Alias Private Key: 7
8,727,166 UART: [art] Derive CDI
8,727,446 UART: [art] Store in in slot 0x4
8,812,609 UART: [art] Derive Key Pair
8,812,969 UART: [art] Store priv key in slot 0x5
8,826,211 UART: [art] Derive Key Pair - Done
8,841,085 UART: [art] Signing Cert with AUTHO
8,841,565 UART: RITY.KEYID = 7
8,856,919 UART: [art] Erasing AUTHORITY.KEYID = 7
8,857,684 UART: [art] PUB.X = 89B5BBB3E1F3EF251945DF9B003EBCC2C44FA2A143C95090457361268154985C9D7BFCE059D9AA3A794DB806BFEDF49D
8,864,443 UART: [art] PUB.Y = 0C42E57DD78703CE89C7E85BFCA021B344682699B042F97021B1E53DF458B7292349213608EFE0C504D48D028CEF9199
8,871,374 UART: [art] SIG.R = 06D94BD4DBD4997BB0FDACF9968116CAA637289A7A153E48EDE12DFE33F7C329284D5A5D882C0F3E6485460B47FB4DBE
8,878,151 UART: [art] SIG.S = 794A4CF11F7D55FFE41413ACB1AEAC22D875557350E3D5C828B0C308D61B70CAA6DF64B9ED970549650297E9D69FA7ED
8,901,225 UART: mbox::rt_entry...
8,901,597 UART: ____ _ _ _ ____ _____
8,902,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,903,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,903,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,904,717 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,905,485 UART: |_|
8,905,797 UART:
9,187,834 UART: [rt] Runtime listening for mailbox commands...
9,188,881 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
895,173 UART: [kat] SHA2-512-ACC
897,074 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,477,102 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 ready_for_fw is high
1,481,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,201 UART: [idev] Erasing UDS.KEYID = 0
1,506,409 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,877 UART: [idev] --
1,515,884 UART: [ldev] ++
1,516,052 UART: [ldev] CDI.KEYID = 6
1,516,415 UART: [ldev] SUBJECT.KEYID = 5
1,516,841 UART: [ldev] AUTHORITY.KEYID = 7
1,517,304 UART: [ldev] FE.KEYID = 1
1,522,544 UART: [ldev] Erasing FE.KEYID = 1
1,547,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,695 UART: [ldev] --
1,587,074 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 114332 bytes
2,885,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,549 >>> mbox cmd response: success
3,079,727 UART: [afmc] ++
3,079,895 UART: [afmc] CDI.KEYID = 6
3,080,257 UART: [afmc] SUBJECT.KEYID = 7
3,080,682 UART: [afmc] AUTHORITY.KEYID = 5
3,116,107 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,471 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,864 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,554 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,275 UART: [afmc] --
3,159,369 UART: [cold-reset] --
3,160,127 UART: [state] Locking Datavault
3,161,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,102 UART: [state] Locking ICCM
3,162,626 UART: [exit] Launching FMC @ 0x40000130
3,167,955 UART:
3,167,971 UART: Running Caliptra FMC ...
3,168,379 UART:
3,168,522 UART: [state] CFI Enabled
3,178,879 UART: [fht] FMC Alias Private Key: 7
3,287,198 UART: [art] Extend RT PCRs Done
3,287,626 UART: [art] Lock RT PCRs Done
3,289,408 UART: [art] Populate DV Done
3,297,801 UART: [fht] FMC Alias Private Key: 7
3,298,789 UART: [art] Derive CDI
3,299,069 UART: [art] Store in in slot 0x4
3,384,746 UART: [art] Derive Key Pair
3,385,106 UART: [art] Store priv key in slot 0x5
3,398,312 UART: [art] Derive Key Pair - Done
3,413,253 UART: [art] Signing Cert with AUTHO
3,413,733 UART: RITY.KEYID = 7
3,429,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,076 UART: [art] PUB.X = A7A673FEA2CDCA1CFF46093C1C23333BEB2CA8B0B4F5AAA45C5CE1E33ABC330244418E1D43D674C2930CF81B5B293382
3,436,855 UART: [art] PUB.Y = 5E07E4ACA50747F12C38A31B89E80C080E1538FF5FCC094BAF04D272C8716D5D333F7ED3E8FBBEF28B5D3D54BE511DBD
3,443,804 UART: [art] SIG.R = AFFC47A1B2F04A752BF0FA607ECF5577836D9D486AAC983B73B6BF5D69D49306F1A7673490C6DE2ED38E5AC2E97FDFFE
3,450,593 UART: [art] SIG.S = 6D87CB91CC9DFF2121ACB3D89BC6ECF82E1284D232C271BC1A85ECEBD91BAEB035ECD04FB981DBA1748D686CCA9B9DA4
3,474,714 UART: Caliptra RT
3,475,059 UART: [state] CFI Enabled
3,583,012 UART: [rt] RT listening for mailbox commands...
3,583,682 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,910 UART: [rt]cmd =0x50435252, len=8
3,615,318 >>> mbox cmd response data (8 bytes)
3,615,319 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,253 UART:
3,616,269 UART: Running Caliptra ROM ...
3,616,677 UART:
3,616,818 UART: [state] CFI Enabled
3,619,640 UART: [state] LifecycleState = Unprovisioned
3,620,295 UART: [state] DebugLocked = No
3,620,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,358 UART: [kat] SHA2-256
4,416,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,404 UART: [kat] ++
4,420,556 UART: [kat] sha1
4,424,806 UART: [kat] SHA2-256
4,426,744 UART: [kat] SHA2-384
4,429,401 UART: [kat] SHA2-512-ACC
4,431,301 UART: [kat] ECC-384
4,436,882 UART: [kat] HMAC-384Kdf
4,441,624 UART: [kat] LMS
5,009,820 UART: [kat] --
5,010,631 UART: [update-reset] ++
5,938,277 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,939,317 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,035,751 >>> mbox cmd response: success
6,035,751 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,035,978 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,992 UART: [update-reset Success] --
6,044,989 UART: [state] Locking Datavault
6,045,735 UART: [state] Locking PCR0, PCR1 and PCR31
6,046,339 UART: [state] Locking ICCM
6,046,873 UART: [exit] Launching FMC @ 0x40000130
6,052,202 UART:
6,052,218 UART: Running Caliptra FMC ...
6,052,626 UART:
6,052,769 UART: [state] CFI Enabled
6,141,530 UART: [art] Extend RT PCRs Done
6,141,958 UART: [art] Lock RT PCRs Done
6,143,093 UART: [art] Populate DV Done
6,151,242 UART: [fht] FMC Alias Private Key: 7
6,152,386 UART: [art] Derive CDI
6,152,666 UART: [art] Store in in slot 0x4
6,237,809 UART: [art] Derive Key Pair
6,238,169 UART: [art] Store priv key in slot 0x5
6,250,851 UART: [art] Derive Key Pair - Done
6,265,479 UART: [art] Signing Cert with AUTHO
6,265,959 UART: RITY.KEYID = 7
6,281,147 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,912 UART: [art] PUB.X = DA4DFCA828EF392013F281B74CFF3CB6200899EC671D3C95D474CEA2AFAD0536D299004B95BA717A02C9B10E71536F2F
6,288,660 UART: [art] PUB.Y = E796C5F8047E0471B304DE814ABA3D0C405C256858A6949DF8B675421F3E6393BB78992062FC6CEFB70A70AC7A690826
6,295,592 UART: [art] SIG.R = A6B5AFA55E0A2966A6F8A61B2F190B3450252992DEE2A79B524329E853DE73170826B6750909DC9267906002C550403A
6,302,334 UART: [art] SIG.S = 7737A90B8F80F707A2101273BA5DA6FA982F7836D2006447946811114DAA43CCDB84BD6F15409FB99A2DECE18BCBF182
6,326,419 UART: mbox::rt_entry...
6,326,791 UART: ____ _ _ _ ____ _____
6,327,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,143 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,679 UART: |_|
6,330,991 UART:
6,611,409 UART: [rt] Runtime listening for mailbox commands...
6,612,456 >>> mbox cmd response data (128 bytes)
6,612,457 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,612,571 UART:
6,612,587 UART: Running Caliptra ROM ...
6,612,995 UART:
6,613,136 UART: [state] CFI Enabled
6,615,698 UART: [state] LifecycleState = Unprovisioned
6,616,353 UART: [state] DebugLocked = No
6,616,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,618,588 UART: [kat] SHA2-256
7,412,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,416,634 UART: [kat] ++
7,416,786 UART: [kat] sha1
7,420,968 UART: [kat] SHA2-256
7,422,906 UART: [kat] SHA2-384
7,425,653 UART: [kat] SHA2-512-ACC
7,427,553 UART: [kat] ECC-384
7,433,260 UART: [kat] HMAC-384Kdf
7,437,988 UART: [kat] LMS
8,006,184 UART: [kat] --
8,007,201 UART: [update-reset] ++
8,934,203 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,935,431 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,031,865 >>> mbox cmd response: success
9,031,865 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,032,050 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,064 UART: [update-reset Success] --
9,041,123 UART: [state] Locking Datavault
9,041,809 UART: [state] Locking PCR0, PCR1 and PCR31
9,042,413 UART: [state] Locking ICCM
9,042,905 UART: [exit] Launching FMC @ 0x40000130
9,048,234 UART:
9,048,250 UART: Running Caliptra FMC ...
9,048,658 UART:
9,048,801 UART: [state] CFI Enabled
9,137,906 UART: [art] Extend RT PCRs Done
9,138,334 UART: [art] Lock RT PCRs Done
9,139,695 UART: [art] Populate DV Done
9,147,764 UART: [fht] FMC Alias Private Key: 7
9,148,692 UART: [art] Derive CDI
9,148,972 UART: [art] Store in in slot 0x4
9,234,793 UART: [art] Derive Key Pair
9,235,153 UART: [art] Store priv key in slot 0x5
9,249,171 UART: [art] Derive Key Pair - Done
9,263,932 UART: [art] Signing Cert with AUTHO
9,264,412 UART: RITY.KEYID = 7
9,280,010 UART: [art] Erasing AUTHORITY.KEYID = 7
9,280,775 UART: [art] PUB.X = 3A51C7737234917D73CFEAE3591B84A97D6A676706A1504D24A95073FF48111A0EC25D68463AA647E9D5EB12C615E696
9,287,535 UART: [art] PUB.Y = 1D88090B0C29C5C701D82BBA1FA82F1444581A0674E2685E00FB9AE3EA1AFF02DA799D6394E83AF8FEA8390C08E35F10
9,294,449 UART: [art] SIG.R = CDBBD1A5D90FCF072669EC6ECF2297ABAC6706F47A75DF5E12B8C069E6F9AF4AA9B3B743AC8F6BFE72910A0B8A1182D9
9,301,230 UART: [art] SIG.S = 7715A5471134DF6941AB84A9CD5944D6C31DBF041A77B6C8F5367561A996F018BFD3BD2AFB32177F86973EF7A7203D5F
9,325,324 UART: mbox::rt_entry...
9,325,696 UART: ____ _ _ _ ____ _____
9,326,480 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,327,280 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,328,048 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,328,816 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,329,584 UART: |_|
9,329,896 UART:
9,608,568 UART: [rt] Runtime listening for mailbox commands...
9,609,615 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,895 >>> mbox cmd response: success
2,991,529 UART:
2,991,545 UART: Running Caliptra FMC ...
2,991,953 UART:
2,992,096 UART: [state] CFI Enabled
3,002,673 UART: [fht] FMC Alias Private Key: 7
3,110,494 UART: [art] Extend RT PCRs Done
3,110,922 UART: [art] Lock RT PCRs Done
3,112,926 UART: [art] Populate DV Done
3,121,281 UART: [fht] FMC Alias Private Key: 7
3,122,333 UART: [art] Derive CDI
3,122,613 UART: [art] Store in in slot 0x4
3,208,342 UART: [art] Derive Key Pair
3,208,702 UART: [art] Store priv key in slot 0x5
3,221,954 UART: [art] Derive Key Pair - Done
3,236,480 UART: [art] Signing Cert with AUTHO
3,236,960 UART: RITY.KEYID = 7
3,252,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,951 UART: [art] PUB.X = AB1B7B13322063E0BD8CA1325B8B485995CA0D9F51165E645A84DC51AB7618A43DB1EF4CBD14E2869AAF032EA39F3E04
3,259,724 UART: [art] PUB.Y = 09ACEE046172AB527CD113AD4711F8F53D2D8438C2D777FFFB904A58E1003078561AB40B9A221517C629473FA95D0BA8
3,266,642 UART: [art] SIG.R = B1B39549E048695BE60ED0A14B5845BD31D77A788B78BE9498430B6D9DFA0CD32621D551982A63545F83F1B97567AE98
3,273,401 UART: [art] SIG.S = D38F0E7F656B05596944CE277F8F866C61E69EE2B09B9C9147FF4598AB1F38E2290A39B0174D19DBC37D9151204FDE4F
3,296,733 UART: Caliptra RT
3,297,078 UART: [state] CFI Enabled
3,405,662 UART: [rt] RT listening for mailbox commands...
3,406,332 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,454 UART: [rt]cmd =0x50435252, len=8
3,438,082 >>> mbox cmd response data (8 bytes)
3,438,083 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,740,399 >>> mbox cmd response: success
5,740,399 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,753,826 UART:
5,753,842 UART: Running Caliptra FMC ...
5,754,250 UART:
5,754,393 UART: [state] CFI Enabled
5,843,824 UART: [art] Extend RT PCRs Done
5,844,252 UART: [art] Lock RT PCRs Done
5,845,339 UART: [art] Populate DV Done
5,853,452 UART: [fht] FMC Alias Private Key: 7
5,854,400 UART: [art] Derive CDI
5,854,680 UART: [art] Store in in slot 0x4
5,940,311 UART: [art] Derive Key Pair
5,940,671 UART: [art] Store priv key in slot 0x5
5,954,353 UART: [art] Derive Key Pair - Done
5,969,126 UART: [art] Signing Cert with AUTHO
5,969,606 UART: RITY.KEYID = 7
5,984,542 UART: [art] Erasing AUTHORITY.KEYID = 7
5,985,307 UART: [art] PUB.X = F44102C3CD859D10FACEE33A994DAECE3644AE12E7B2768610247D322D717D220BC68C0563B1EB20407B591EE0A99EAE
5,992,078 UART: [art] PUB.Y = D066F2FFCB306FEB5AB9476D63367DC0D121AA470B760299D54A1F44594BF554B5F373D848C6B4A12E117356F516D4A7
5,999,026 UART: [art] SIG.R = 235040DF39597AB7BB813AB0209EB2B272C1E69CEE1F4FCEF3BA65D5B84A28C85B72DE528B05D2F16AB7C33BFDAD9D1F
6,005,817 UART: [art] SIG.S = 5F1DA126C284A0D00CC9878F57409EA471D5F248FBAD08CD4CE8B3FA71A98E2AB5B156181303C4CE5411FEBC2092EDD0
6,029,239 UART: mbox::rt_entry...
6,029,611 UART: ____ _ _ _ ____ _____
6,030,395 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,031,195 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,031,963 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,032,731 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,033,499 UART: |_|
6,033,811 UART:
6,313,370 UART: [rt] Runtime listening for mailbox commands...
6,314,417 >>> mbox cmd response data (128 bytes)
6,314,418 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,613,748 >>> mbox cmd response: success
8,613,748 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,627,209 UART:
8,627,225 UART: Running Caliptra FMC ...
8,627,633 UART:
8,627,776 UART: [state] CFI Enabled
8,717,133 UART: [art] Extend RT PCRs Done
8,717,561 UART: [art] Lock RT PCRs Done
8,718,642 UART: [art] Populate DV Done
8,727,001 UART: [fht] FMC Alias Private Key: 7
8,727,929 UART: [art] Derive CDI
8,728,209 UART: [art] Store in in slot 0x4
8,813,744 UART: [art] Derive Key Pair
8,814,104 UART: [art] Store priv key in slot 0x5
8,827,340 UART: [art] Derive Key Pair - Done
8,842,023 UART: [art] Signing Cert with AUTHO
8,842,503 UART: RITY.KEYID = 7
8,857,925 UART: [art] Erasing AUTHORITY.KEYID = 7
8,858,690 UART: [art] PUB.X = 241480BD974166432EB7A4F822F313390F0B8DCA49DA4C965DCEA41A5CFECE58341C2ABCD4F662DB5D04648DDC828B38
8,865,465 UART: [art] PUB.Y = 3E9E2C7F06F1742810E334055143B95EA7F21C1F5FDF997635E86312F1D0020035DB773B7959E8FDB25582FFA7E3596D
8,872,382 UART: [art] SIG.R = 917DA4508AF9FCA7D583D1AAF68682A13CD08F6F79CC6E6509495F67973DD2E7DC558F02444B007452CC3638264D15D2
8,879,126 UART: [art] SIG.S = 530E416440EC8B57797ACB22A95BDD8D2552CC55A84A0FAF9715CABA71A480AA68827E613EF0C6C4EE160D12B4C89020
8,903,212 UART: mbox::rt_entry...
8,903,584 UART: ____ _ _ _ ____ _____
8,904,368 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,905,936 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,906,704 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,907,472 UART: |_|
8,907,784 UART:
9,186,458 UART: [rt] Runtime listening for mailbox commands...
9,187,505 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
892,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,117 UART: [kat] ++
897,269 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,424 UART: [idev] ++
1,175,592 UART: [idev] CDI.KEYID = 6
1,175,952 UART: [idev] SUBJECT.KEYID = 7
1,176,376 UART: [idev] UDS.KEYID = 0
1,176,721 ready_for_fw is high
1,176,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,201,333 UART: [idev] Sha1 KeyId Algorithm
1,209,811 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,402 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,579 UART: [ldev] Erasing FE.KEYID = 1
1,243,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,283,002 UART: [fwproc] Wait for Commands...
1,283,730 UART: [fwproc] Recv command 0x46574c44
1,284,458 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,135 >>> mbox cmd response: success
2,775,391 UART: [afmc] ++
2,775,559 UART: [afmc] CDI.KEYID = 6
2,775,921 UART: [afmc] SUBJECT.KEYID = 7
2,776,346 UART: [afmc] AUTHORITY.KEYID = 5
2,811,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,302 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,915 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,634 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,350 UART: [afmc] --
2,855,314 UART: [cold-reset] --
2,856,048 UART: [state] Locking Datavault
2,857,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,915 UART: [state] Locking ICCM
2,858,435 UART: [exit] Launching FMC @ 0x40000130
2,863,764 UART:
2,863,780 UART: Running Caliptra FMC ...
2,864,188 UART:
2,864,242 UART: [state] CFI Enabled
2,874,613 UART: [fht] FMC Alias Private Key: 7
2,981,892 UART: [art] Extend RT PCRs Done
2,982,320 UART: [art] Lock RT PCRs Done
2,983,804 UART: [art] Populate DV Done
2,991,979 UART: [fht] FMC Alias Private Key: 7
2,992,977 UART: [art] Derive CDI
2,993,257 UART: [art] Store in in slot 0x4
3,079,040 UART: [art] Derive Key Pair
3,079,400 UART: [art] Store priv key in slot 0x5
3,092,482 UART: [art] Derive Key Pair - Done
3,107,525 UART: [art] Signing Cert with AUTHO
3,108,005 UART: RITY.KEYID = 7
3,123,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,804 UART: [art] PUB.X = E19EF585C64D1620AC8EE113A3CFCBA96B4073D667E1FA5081FC231F7F39D2D8316EEA9081E7BD6E76431214C3344B5E
3,130,584 UART: [art] PUB.Y = D2FC8C17F8EFD7F8C7E84780F56C4612E895B3EC3FBC42AEDF61C6DE0603CB72E263AEEAEE79D058B6C8DB8C1F0AA647
3,137,553 UART: [art] SIG.R = B7ABD914B05E4DC095E30098FA8F7176799845FAE2680C7407565C972CD4EA11B9CA2BDDF2DFDB2140A60F8346BAB1AB
3,144,308 UART: [art] SIG.S = BB5F537248A1AB4E912593086EDFB446A258A9432BF17C06B30C86E13F2F0F4951F9B17ECCF4385E2F377BCAF16FBC6B
3,168,341 UART: Caliptra RT
3,168,594 UART: [state] CFI Enabled
3,276,394 UART: [rt] RT listening for mailbox commands...
3,277,064 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,886 UART: [rt]cmd =0x50435252, len=8
3,308,480 >>> mbox cmd response data (8 bytes)
3,308,481 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,386 UART:
3,309,402 UART: Running Caliptra ROM ...
3,309,810 UART:
3,309,865 UART: [state] CFI Enabled
3,312,675 UART: [state] LifecycleState = Unprovisioned
3,313,330 UART: [state] DebugLocked = No
3,314,016 UART: [state] WD Timer not started. Device not locked for debugging
3,315,310 UART: [kat] SHA2-256
4,120,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,085 UART: [kat] ++
4,125,237 UART: [kat] sha1
4,129,515 UART: [kat] SHA2-256
4,131,455 UART: [kat] SHA2-384
4,134,152 UART: [kat] SHA2-512-ACC
4,136,052 UART: [kat] ECC-384
4,146,009 UART: [kat] HMAC-384Kdf
4,150,493 UART: [kat] LMS
4,398,821 UART: [kat] --
4,399,745 UART: [update-reset] ++
5,304,803 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,824 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,206 >>> mbox cmd response: success
5,402,206 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,402,339 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,353 UART: [update-reset Success] --
5,411,418 UART: [state] Locking Datavault
5,412,134 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,738 UART: [state] Locking ICCM
5,413,384 UART: [exit] Launching FMC @ 0x40000130
5,418,713 UART:
5,418,729 UART: Running Caliptra FMC ...
5,419,137 UART:
5,419,191 UART: [state] CFI Enabled
5,508,228 UART: [art] Extend RT PCRs Done
5,508,656 UART: [art] Lock RT PCRs Done
5,510,147 UART: [art] Populate DV Done
5,518,418 UART: [fht] FMC Alias Private Key: 7
5,519,592 UART: [art] Derive CDI
5,519,872 UART: [art] Store in in slot 0x4
5,605,127 UART: [art] Derive Key Pair
5,605,487 UART: [art] Store priv key in slot 0x5
5,618,319 UART: [art] Derive Key Pair - Done
5,632,683 UART: [art] Signing Cert with AUTHO
5,633,163 UART: RITY.KEYID = 7
5,648,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,324 UART: [art] PUB.X = 92944EB7517382E669D92246DF24F19B98D4C3B330033241DEAFD062EAB1D217153A2B4060ACB4C740573CE61CC1798B
5,656,091 UART: [art] PUB.Y = 534EC9F5A1CEF096D7CF9DDDEE6745BE0EDAD902340BD071FB13176A22B045B64C8454902039D0458A271B02D5E31ADC
5,663,041 UART: [art] SIG.R = B589DB5E55EC3C818352DF8F866A4B6E59B0ACDD8A00D7B127224BC24F4ECE1A7F9B3A02B6A2C248F54BDE12CBF5D3D9
5,669,810 UART: [art] SIG.S = 189E6CC1B94F855587FB60184AD8F93B78CEED25A08AC5472ADBD22639F768C5B9F3D5DABBB77E1A8C0F2178AB141EF9
5,693,390 UART: mbox::rt_entry...
5,693,762 UART: ____ _ _ _ ____ _____
5,694,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,650 UART: |_|
5,697,962 UART:
5,977,394 UART: [rt] Runtime listening for mailbox commands...
5,978,441 >>> mbox cmd response data (128 bytes)
5,978,442 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,978,553 UART:
5,978,569 UART: Running Caliptra ROM ...
5,978,977 UART:
5,979,032 UART: [state] CFI Enabled
5,981,648 UART: [state] LifecycleState = Unprovisioned
5,982,303 UART: [state] DebugLocked = No
5,982,881 UART: [state] WD Timer not started. Device not locked for debugging
5,984,153 UART: [kat] SHA2-256
6,789,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,793,928 UART: [kat] ++
6,794,080 UART: [kat] sha1
6,798,358 UART: [kat] SHA2-256
6,800,298 UART: [kat] SHA2-384
6,803,077 UART: [kat] SHA2-512-ACC
6,804,977 UART: [kat] ECC-384
6,814,756 UART: [kat] HMAC-384Kdf
6,819,450 UART: [kat] LMS
7,067,778 UART: [kat] --
7,068,814 UART: [update-reset] ++
7,973,634 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,974,627 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,009 >>> mbox cmd response: success
8,071,009 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,071,230 UART: [update-reset] Copying MAN_2 To MAN_1
8,079,244 UART: [update-reset Success] --
8,080,265 UART: [state] Locking Datavault
8,080,943 UART: [state] Locking PCR0, PCR1 and PCR31
8,081,547 UART: [state] Locking ICCM
8,081,979 UART: [exit] Launching FMC @ 0x40000130
8,087,308 UART:
8,087,324 UART: Running Caliptra FMC ...
8,087,732 UART:
8,087,786 UART: [state] CFI Enabled
8,176,671 UART: [art] Extend RT PCRs Done
8,177,099 UART: [art] Lock RT PCRs Done
8,178,646 UART: [art] Populate DV Done
8,187,007 UART: [fht] FMC Alias Private Key: 7
8,188,075 UART: [art] Derive CDI
8,188,355 UART: [art] Store in in slot 0x4
8,274,278 UART: [art] Derive Key Pair
8,274,638 UART: [art] Store priv key in slot 0x5
8,287,922 UART: [art] Derive Key Pair - Done
8,302,425 UART: [art] Signing Cert with AUTHO
8,302,905 UART: RITY.KEYID = 7
8,318,269 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,034 UART: [art] PUB.X = 1B778DD946912853AB0DFB30A0574405656F8D04214C615FD4E719BEA13823751667A837961A5A25F6EF474FFD80CC79
8,325,791 UART: [art] PUB.Y = 71DE58ACBAB67E2FA3A22739ECC12A1C6905A9F13FDD23B324BDECB5B9FA52F4D888BE9E8ED5EB30FDF8CF1F6ADA422A
8,332,774 UART: [art] SIG.R = 7B7983C4767DFDAB4075EA6722CE862D3FF1555C5BFC2A713A6294FC577962B21F7AFF5B2239B4F30161E16F51C6C788
8,339,547 UART: [art] SIG.S = 6B3595E70F3BA9C4FA1D0731E4E1B3407545DCF6E4A18619E0365DD100C0AD583B3F2719DAF0A10634F00751E791634A
8,363,160 UART: mbox::rt_entry...
8,363,532 UART: ____ _ _ _ ____ _____
8,364,316 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,365,884 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,366,652 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,367,420 UART: |_|
8,367,732 UART:
8,648,430 UART: [rt] Runtime listening for mailbox commands...
8,649,477 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 ready_for_fw is high
1,060,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,194 >>> mbox cmd response: success
2,687,888 UART:
2,687,904 UART: Running Caliptra FMC ...
2,688,312 UART:
2,688,366 UART: [state] CFI Enabled
2,698,889 UART: [fht] FMC Alias Private Key: 7
2,806,948 UART: [art] Extend RT PCRs Done
2,807,376 UART: [art] Lock RT PCRs Done
2,808,650 UART: [art] Populate DV Done
2,816,969 UART: [fht] FMC Alias Private Key: 7
2,817,919 UART: [art] Derive CDI
2,818,199 UART: [art] Store in in slot 0x4
2,903,716 UART: [art] Derive Key Pair
2,904,076 UART: [art] Store priv key in slot 0x5
2,917,216 UART: [art] Derive Key Pair - Done
2,931,809 UART: [art] Signing Cert with AUTHO
2,932,289 UART: RITY.KEYID = 7
2,947,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,172 UART: [art] PUB.X = BA73268062906CC8811DAFA55E8D8D8D9BB57D8D55FB5309406D1D7226832949B7722E7FE40BE2610097C95BED769299
2,954,912 UART: [art] PUB.Y = 84657B093FC0ADF2549445D3F329598C963446E526A5BA39C3B61D3C89AF18DA4B96FC19F081FFEAB4A9E3790189C14C
2,961,862 UART: [art] SIG.R = C6740C818D83E1EA73C00149985281886EFDE1D960A6AE40F3EC1DD5FEE24D29C4002CCD8A39499E430BAAA33CB605CA
2,968,612 UART: [art] SIG.S = F134802523C54389DA127249869184644D517856F307C35321F112941E70576C750604A1DA31C071FE5BC2E5A3D5630E
2,992,179 UART: Caliptra RT
2,992,432 UART: [state] CFI Enabled
3,100,474 UART: [rt] RT listening for mailbox commands...
3,101,144 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,134 UART: [rt]cmd =0x50435252, len=8
3,132,574 >>> mbox cmd response data (8 bytes)
3,132,575 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,108,375 >>> mbox cmd response: success
5,108,375 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,121,719 UART:
5,121,735 UART: Running Caliptra FMC ...
5,122,143 UART:
5,122,197 UART: [state] CFI Enabled
5,210,892 UART: [art] Extend RT PCRs Done
5,211,320 UART: [art] Lock RT PCRs Done
5,212,531 UART: [art] Populate DV Done
5,220,806 UART: [fht] FMC Alias Private Key: 7
5,221,984 UART: [art] Derive CDI
5,222,264 UART: [art] Store in in slot 0x4
5,307,973 UART: [art] Derive Key Pair
5,308,333 UART: [art] Store priv key in slot 0x5
5,321,355 UART: [art] Derive Key Pair - Done
5,335,836 UART: [art] Signing Cert with AUTHO
5,336,316 UART: RITY.KEYID = 7
5,351,652 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,417 UART: [art] PUB.X = F8E9BE6CC97C656C18CB682DA3D5C9CB651E113FF7791A3D41946BDFB7D20FED46309948C85CACC55B7E74A7B1766ADF
5,359,204 UART: [art] PUB.Y = E3EA27562CA484C88F1F2E9A10598990E85773A1C0D91C2FF17B2E18D96925A8F6F558EA3FFAF5E47CE5602F6983091B
5,366,157 UART: [art] SIG.R = 4E61E28E47168AD86E2E043BB37FF58DA6F47ECBE05637AC3C1B17AE7C6162FF2B1EA175851AE6417EB16856A1CC088E
5,372,935 UART: [art] SIG.S = 395E16F34623722FD27544AB8BB6D36BA0FF4F1C81425EEE6A292AC47CFA8546654E090C5AE241802A2EA0841B668CE0
5,396,506 UART: mbox::rt_entry...
5,396,878 UART: ____ _ _ _ ____ _____
5,397,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,398,462 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,399,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,399,998 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,400,766 UART: |_|
5,401,078 UART:
5,680,480 UART: [rt] Runtime listening for mailbox commands...
5,681,527 >>> mbox cmd response data (128 bytes)
5,681,528 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,657,038 >>> mbox cmd response: success
7,657,038 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,670,192 UART:
7,670,208 UART: Running Caliptra FMC ...
7,670,616 UART:
7,670,670 UART: [state] CFI Enabled
7,759,573 UART: [art] Extend RT PCRs Done
7,760,001 UART: [art] Lock RT PCRs Done
7,761,284 UART: [art] Populate DV Done
7,769,333 UART: [fht] FMC Alias Private Key: 7
7,770,471 UART: [art] Derive CDI
7,770,751 UART: [art] Store in in slot 0x4
7,856,640 UART: [art] Derive Key Pair
7,857,000 UART: [art] Store priv key in slot 0x5
7,870,006 UART: [art] Derive Key Pair - Done
7,884,698 UART: [art] Signing Cert with AUTHO
7,885,178 UART: RITY.KEYID = 7
7,900,442 UART: [art] Erasing AUTHORITY.KEYID = 7
7,901,207 UART: [art] PUB.X = 680957DC027D8E833C0788470115B5B91618C66F7109B579A2067B6D0E97559F6781AA0EC718BE66BAF2D6AAB6E57E50
7,907,951 UART: [art] PUB.Y = DE38CFC3AE1C1C805CE20AB2EF5FEC534DA26A1899728008DB1DF65C179E1FE0FFA325B197967B8167037DD05D5D75FA
7,914,910 UART: [art] SIG.R = D4000BC54D4254DC0D5EAA2AF2A7134BC5FBB7FCD3AD145CE226551CF23538961574470CC268ABE26C1347E5C583D833
7,921,659 UART: [art] SIG.S = 79D7D59E7CD6C83F5CDC6F62FD3A867BC36ACB2269A3E038884638B6DB66F42A549DB8B9544A1E2DC6AD05A24225A7B0
7,945,217 UART: mbox::rt_entry...
7,945,589 UART: ____ _ _ _ ____ _____
7,946,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,947,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,947,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,948,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,949,477 UART: |_|
7,949,789 UART:
8,230,233 UART: [rt] Runtime listening for mailbox commands...
8,231,280 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,865 UART: [state] LifecycleState = Unprovisioned
85,520 UART: [state] DebugLocked = No
86,074 UART: [state] WD Timer not started. Device not locked for debugging
87,403 UART: [kat] SHA2-256
893,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,178 UART: [kat] ++
897,330 UART: [kat] sha1
901,650 UART: [kat] SHA2-256
903,590 UART: [kat] SHA2-384
906,297 UART: [kat] SHA2-512-ACC
908,198 UART: [kat] ECC-384
917,891 UART: [kat] HMAC-384Kdf
922,423 UART: [kat] LMS
1,170,751 UART: [kat] --
1,171,736 UART: [cold-reset] ++
1,172,224 UART: [fht] FHT @ 0x50003400
1,174,683 UART: [idev] ++
1,174,851 UART: [idev] CDI.KEYID = 6
1,175,211 UART: [idev] SUBJECT.KEYID = 7
1,175,635 UART: [idev] UDS.KEYID = 0
1,175,980 ready_for_fw is high
1,175,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,517 UART: [idev] Erasing UDS.KEYID = 0
1,200,398 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,210,168 UART: [ldev] ++
1,210,336 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,125 UART: [ldev] AUTHORITY.KEYID = 7
1,211,588 UART: [ldev] FE.KEYID = 1
1,217,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,074 UART: [ldev] --
1,282,375 UART: [fwproc] Wait for Commands...
1,282,953 UART: [fwproc] Recv command 0x46574c44
1,283,681 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,494 >>> mbox cmd response: success
2,774,594 UART: [afmc] ++
2,774,762 UART: [afmc] CDI.KEYID = 6
2,775,124 UART: [afmc] SUBJECT.KEYID = 7
2,775,549 UART: [afmc] AUTHORITY.KEYID = 5
2,810,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,109 UART: [afmc] --
2,854,137 UART: [cold-reset] --
2,854,881 UART: [state] Locking Datavault
2,856,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,736 UART: [state] Locking ICCM
2,857,338 UART: [exit] Launching FMC @ 0x40000130
2,862,667 UART:
2,862,683 UART: Running Caliptra FMC ...
2,863,091 UART:
2,863,234 UART: [state] CFI Enabled
2,873,779 UART: [fht] FMC Alias Private Key: 7
2,981,440 UART: [art] Extend RT PCRs Done
2,981,868 UART: [art] Lock RT PCRs Done
2,983,584 UART: [art] Populate DV Done
2,991,813 UART: [fht] FMC Alias Private Key: 7
2,992,951 UART: [art] Derive CDI
2,993,231 UART: [art] Store in in slot 0x4
3,078,950 UART: [art] Derive Key Pair
3,079,310 UART: [art] Store priv key in slot 0x5
3,092,368 UART: [art] Derive Key Pair - Done
3,107,038 UART: [art] Signing Cert with AUTHO
3,107,518 UART: RITY.KEYID = 7
3,122,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,481 UART: [art] PUB.X = 23294808E95773E7879003DFB872F54150CB324F5BE369CA5F1AD9A606BE34DE923B90919936C0D3DF37BE924757C03F
3,130,240 UART: [art] PUB.Y = 0AB16BEEC776A81FE60DE839F7086BF4EC15DED13EA972D6A0F817BA6FEEC3E7F6C3FF2A4AFB9F8BB75D3A783E572A11
3,137,211 UART: [art] SIG.R = DC09001315A22A03DDA6A22D7095241234927C9DD0A1897EC80D7D936D9E26AC3DD85B3D039C3ABF5F8228D1CF0CBE6D
3,143,956 UART: [art] SIG.S = C500B5CBFBA630627C7885C46D2955864078A44F9C7325851F03D11F20E6313E56F949DC9372F0DD95BF3B3172E8705A
3,167,828 UART: Caliptra RT
3,168,173 UART: [state] CFI Enabled
3,275,985 UART: [rt] RT listening for mailbox commands...
3,276,655 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,503 UART: [rt]cmd =0x50435252, len=8
3,308,119 >>> mbox cmd response data (8 bytes)
3,308,120 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,061 UART:
3,309,077 UART: Running Caliptra ROM ...
3,309,485 UART:
3,309,627 UART: [state] CFI Enabled
3,312,375 UART: [state] LifecycleState = Unprovisioned
3,313,030 UART: [state] DebugLocked = No
3,313,570 UART: [state] WD Timer not started. Device not locked for debugging
3,314,906 UART: [kat] SHA2-256
4,120,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,681 UART: [kat] ++
4,124,833 UART: [kat] sha1
4,128,953 UART: [kat] SHA2-256
4,130,893 UART: [kat] SHA2-384
4,133,608 UART: [kat] SHA2-512-ACC
4,135,508 UART: [kat] ECC-384
4,145,321 UART: [kat] HMAC-384Kdf
4,149,963 UART: [kat] LMS
4,398,291 UART: [kat] --
4,399,005 UART: [update-reset] ++
5,303,537 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,646 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,028 >>> mbox cmd response: success
5,401,028 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,401,263 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,277 UART: [update-reset Success] --
5,410,394 UART: [state] Locking Datavault
5,411,252 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,856 UART: [state] Locking ICCM
5,412,382 UART: [exit] Launching FMC @ 0x40000130
5,417,711 UART:
5,417,727 UART: Running Caliptra FMC ...
5,418,135 UART:
5,418,278 UART: [state] CFI Enabled
5,507,933 UART: [art] Extend RT PCRs Done
5,508,361 UART: [art] Lock RT PCRs Done
5,509,388 UART: [art] Populate DV Done
5,517,707 UART: [fht] FMC Alias Private Key: 7
5,518,721 UART: [art] Derive CDI
5,519,001 UART: [art] Store in in slot 0x4
5,604,844 UART: [art] Derive Key Pair
5,605,204 UART: [art] Store priv key in slot 0x5
5,618,108 UART: [art] Derive Key Pair - Done
5,633,065 UART: [art] Signing Cert with AUTHO
5,633,545 UART: RITY.KEYID = 7
5,648,735 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,500 UART: [art] PUB.X = 30AF922CC34F2A787354ACD179ADF102E76371413AE76FEABFD4C5269CB933780DDB61267E6EC5148605DC493E5FAB03
5,656,268 UART: [art] PUB.Y = F59B27143B700EBDDF0AA7CC5225D5D0714F17BC49DDBD98EB883063BE83E626BC10ADF1E02E0140371C0D20F3712A9C
5,663,220 UART: [art] SIG.R = B24F56C5DB933648E6E155EA1C2BA83E421D82597FED25B52E9F32D00ADACFA259765F76E378109117FD433D149E300C
5,669,990 UART: [art] SIG.S = 0E5DA3CCE6F4A85049EA55E900435A7AC20A98D38DBEAE9E35F265635812A066D927BECC07C28B29B48FAB5B0D86D904
5,693,284 UART: mbox::rt_entry...
5,693,656 UART: ____ _ _ _ ____ _____
5,694,440 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,776 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,544 UART: |_|
5,697,856 UART:
5,977,864 UART: [rt] Runtime listening for mailbox commands...
5,978,911 >>> mbox cmd response data (128 bytes)
5,978,912 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,979,023 UART:
5,979,039 UART: Running Caliptra ROM ...
5,979,447 UART:
5,979,589 UART: [state] CFI Enabled
5,982,441 UART: [state] LifecycleState = Unprovisioned
5,983,096 UART: [state] DebugLocked = No
5,983,672 UART: [state] WD Timer not started. Device not locked for debugging
5,984,928 UART: [kat] SHA2-256
6,790,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,794,703 UART: [kat] ++
6,794,855 UART: [kat] sha1
6,799,097 UART: [kat] SHA2-256
6,801,037 UART: [kat] SHA2-384
6,803,880 UART: [kat] SHA2-512-ACC
6,805,780 UART: [kat] ECC-384
6,815,465 UART: [kat] HMAC-384Kdf
6,819,887 UART: [kat] LMS
7,068,215 UART: [kat] --
7,068,987 UART: [update-reset] ++
7,974,121 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,114 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,496 >>> mbox cmd response: success
8,071,496 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,071,633 UART: [update-reset] Copying MAN_2 To MAN_1
8,079,647 UART: [update-reset Success] --
8,080,584 UART: [state] Locking Datavault
8,081,434 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,038 UART: [state] Locking ICCM
8,082,710 UART: [exit] Launching FMC @ 0x40000130
8,088,039 UART:
8,088,055 UART: Running Caliptra FMC ...
8,088,463 UART:
8,088,606 UART: [state] CFI Enabled
8,177,415 UART: [art] Extend RT PCRs Done
8,177,843 UART: [art] Lock RT PCRs Done
8,179,182 UART: [art] Populate DV Done
8,187,233 UART: [fht] FMC Alias Private Key: 7
8,188,175 UART: [art] Derive CDI
8,188,455 UART: [art] Store in in slot 0x4
8,274,212 UART: [art] Derive Key Pair
8,274,572 UART: [art] Store priv key in slot 0x5
8,287,380 UART: [art] Derive Key Pair - Done
8,301,948 UART: [art] Signing Cert with AUTHO
8,302,428 UART: RITY.KEYID = 7
8,317,276 UART: [art] Erasing AUTHORITY.KEYID = 7
8,318,041 UART: [art] PUB.X = 5F2E4573DDC8CE8D6ADDE6D1DAA4762D1A95970C60C3521F43B02C793C08A6701B509B512141DC0551CD39E6F24A0D47
8,324,807 UART: [art] PUB.Y = FC89BCF81EEAC22A5E0C06832ADE249179A78CCD1C90B34EB265891E5DDFF88BB9C569941A5C5A45C092040B539B3B7D
8,331,761 UART: [art] SIG.R = 30558A08078AAA15FBABEA92A3CDAF6E0754223484F0341DF461A4A1B2B8B6CFDE7BB26EE5E2A8B7F839A479CF4ABA41
8,338,544 UART: [art] SIG.S = A81C4BD235CA43CAA1869BF882185D021C5DBF9512CC02567343A6FFE58E9B8D4A9872BC75E6D50D1841A13A56865416
8,362,076 UART: mbox::rt_entry...
8,362,448 UART: ____ _ _ _ ____ _____
8,363,232 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,364,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,364,800 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,365,568 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,366,336 UART: |_|
8,366,648 UART:
8,648,018 UART: [rt] Runtime listening for mailbox commands...
8,649,065 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,254 ready_for_fw is high
1,061,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,687 >>> mbox cmd response: success
2,688,457 UART:
2,688,473 UART: Running Caliptra FMC ...
2,688,881 UART:
2,689,024 UART: [state] CFI Enabled
2,700,055 UART: [fht] FMC Alias Private Key: 7
2,808,028 UART: [art] Extend RT PCRs Done
2,808,456 UART: [art] Lock RT PCRs Done
2,810,170 UART: [art] Populate DV Done
2,818,089 UART: [fht] FMC Alias Private Key: 7
2,819,141 UART: [art] Derive CDI
2,819,421 UART: [art] Store in in slot 0x4
2,904,718 UART: [art] Derive Key Pair
2,905,078 UART: [art] Store priv key in slot 0x5
2,918,068 UART: [art] Derive Key Pair - Done
2,932,835 UART: [art] Signing Cert with AUTHO
2,933,315 UART: RITY.KEYID = 7
2,948,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,528 UART: [art] PUB.X = 5BC50FB09C3126D816D7395AC8D1643806107DD25442AD6C2A49D8996E3146DA411A88D3C80916BD5B4192B6DE807A99
2,956,287 UART: [art] PUB.Y = D77D37BEB4C92C5B960F0E40DEE6D136FDA0A35DC9D57B0F6547E3398BC865729CB06DAC4075D7F2F4E1259D183832C6
2,963,240 UART: [art] SIG.R = 7C210413639F6BE2A595CAF4E38FD47987DCFAC3BA92FDB28422791D9C256319165FCA750B0AA030D77F2F9C6817C25C
2,970,009 UART: [art] SIG.S = CA152FB6B0C793E4F74DB7A4935094BB24007FF6065034D93B87EF2B7290EC613A9A8917C3DC8D1A340BD016231E4813
2,993,772 UART: Caliptra RT
2,994,117 UART: [state] CFI Enabled
3,102,242 UART: [rt] RT listening for mailbox commands...
3,102,912 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,304 UART: [rt]cmd =0x50435252, len=8
3,133,746 >>> mbox cmd response data (8 bytes)
3,133,747 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,406 >>> mbox cmd response: success
5,110,406 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,123,902 UART:
5,123,918 UART: Running Caliptra FMC ...
5,124,326 UART:
5,124,469 UART: [state] CFI Enabled
5,213,848 UART: [art] Extend RT PCRs Done
5,214,276 UART: [art] Lock RT PCRs Done
5,215,505 UART: [art] Populate DV Done
5,223,522 UART: [fht] FMC Alias Private Key: 7
5,224,538 UART: [art] Derive CDI
5,224,818 UART: [art] Store in in slot 0x4
5,310,289 UART: [art] Derive Key Pair
5,310,649 UART: [art] Store priv key in slot 0x5
5,323,751 UART: [art] Derive Key Pair - Done
5,338,615 UART: [art] Signing Cert with AUTHO
5,339,095 UART: RITY.KEYID = 7
5,354,283 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,048 UART: [art] PUB.X = 25B0821CE96F9D7FFA529AE66CFE4DC0B3CFFAB6632B4D84B23BD26FCE15AB589ACFC43C6DE27263B9C57FC8AB59602E
5,361,846 UART: [art] PUB.Y = 03FA1C71BFE720655F215DA08DC7B67AA19E3E36EFF6E3FB3E210354805EBE56BE655370A697B0DBA8CA09B32A8EC6EA
5,368,807 UART: [art] SIG.R = CEEDA8F6CE4E09769ABD2E2FCC36CEA904E875054A3985F2983C8830386E167A912BDCFD45F80B387588713B6F0EBEAE
5,375,578 UART: [art] SIG.S = 0A66C9F85CFCB9030D4B618F692149B2E0F3DB22397124B1AED9D59DB20EFB0538D07EBF9E7DC06144AD9CE2F7BE3649
5,399,558 UART: mbox::rt_entry...
5,399,930 UART: ____ _ _ _ ____ _____
5,400,714 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,401,514 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,402,282 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,403,050 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,403,818 UART: |_|
5,404,130 UART:
5,682,312 UART: [rt] Runtime listening for mailbox commands...
5,683,359 >>> mbox cmd response data (128 bytes)
5,683,360 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,657,759 >>> mbox cmd response: success
7,657,759 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,671,243 UART:
7,671,259 UART: Running Caliptra FMC ...
7,671,667 UART:
7,671,810 UART: [state] CFI Enabled
7,761,281 UART: [art] Extend RT PCRs Done
7,761,709 UART: [art] Lock RT PCRs Done
7,763,152 UART: [art] Populate DV Done
7,771,465 UART: [fht] FMC Alias Private Key: 7
7,772,519 UART: [art] Derive CDI
7,772,799 UART: [art] Store in in slot 0x4
7,858,076 UART: [art] Derive Key Pair
7,858,436 UART: [art] Store priv key in slot 0x5
7,872,042 UART: [art] Derive Key Pair - Done
7,886,741 UART: [art] Signing Cert with AUTHO
7,887,221 UART: RITY.KEYID = 7
7,902,639 UART: [art] Erasing AUTHORITY.KEYID = 7
7,903,404 UART: [art] PUB.X = 3E0650BE37CE3CE1973FA1B322C73EF51368CDF93D10E586E88B3D5C6E6F98E81E78FB9BD6D2A841B389C137ECB41002
7,910,180 UART: [art] PUB.Y = CD09328700F7B308D61B52F0581E6999280FBFE16847AD18363BBC889F9ED4D99086E05BA94ECD0CCB35BE12AD235C57
7,917,104 UART: [art] SIG.R = 3B688E05FA31FA510C17A56FC0E31483C1797F4BD814A9FA25836272231B70EBBB6FE923B4BFA9C004F2B890C3193DD9
7,923,873 UART: [art] SIG.S = 548B7799DB338B2C45EB77A3955096F85AEB2D6D1857CE38EFA8AD63AC7F3612978C840CB91A1230FA1BE67596297008
7,947,670 UART: mbox::rt_entry...
7,948,042 UART: ____ _ _ _ ____ _____
7,948,826 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,949,626 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,950,394 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,951,162 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,951,930 UART: |_|
7,952,242 UART:
8,234,074 UART: [rt] Runtime listening for mailbox commands...
8,235,121 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,252 UART: [kat] SHA2-256
890,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,931 UART: [kat] ++
895,083 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,481 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,497 UART: [idev] ++
1,172,665 UART: [idev] CDI.KEYID = 6
1,173,026 UART: [idev] SUBJECT.KEYID = 7
1,173,451 UART: [idev] UDS.KEYID = 0
1,173,797 ready_for_fw is high
1,173,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,607 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,574 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x46574c44
1,282,124 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,305 >>> mbox cmd response: success
2,773,476 UART: [afmc] ++
2,773,644 UART: [afmc] CDI.KEYID = 6
2,774,007 UART: [afmc] SUBJECT.KEYID = 7
2,774,433 UART: [afmc] AUTHORITY.KEYID = 5
2,810,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,573 UART: [afmc] --
2,853,633 UART: [cold-reset] --
2,854,299 UART: [state] Locking Datavault
2,855,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,000 UART: [state] Locking ICCM
2,856,504 UART: [exit] Launching FMC @ 0x40000130
2,861,833 UART:
2,861,849 UART: Running Caliptra FMC ...
2,862,257 UART:
2,862,311 UART: [state] CFI Enabled
2,872,570 UART: [fht] FMC Alias Private Key: 7
2,980,933 UART: [art] Extend RT PCRs Done
2,981,361 UART: [art] Lock RT PCRs Done
2,983,165 UART: [art] Populate DV Done
2,991,302 UART: [fht] FMC Alias Private Key: 7
2,992,376 UART: [art] Derive CDI
2,992,656 UART: [art] Store in in slot 0x4
3,078,087 UART: [art] Derive Key Pair
3,078,447 UART: [art] Store priv key in slot 0x5
3,091,813 UART: [art] Derive Key Pair - Done
3,106,709 UART: [art] Signing Cert with AUTHO
3,107,189 UART: RITY.KEYID = 7
3,122,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,520 UART: [art] PUB.X = ED8A3C9B5EA2907DC797AAA81DFC30CA9B312F3AE48535DE46418E54C5DEB7C1BE7CBB3B02F511BA4C7DD554E4449ACC
3,130,315 UART: [art] PUB.Y = 9D6ABB3E893EDD9BF6092BF438804C90A12DABAF528C55D1158C59D60EEEFF917701BAF7999DD18D915427D3EED0BB5D
3,137,276 UART: [art] SIG.R = B296EBB20AEE9D60D21CB9A53C9E195F1B182B5756470FD48A463A9EB90142741F57504662F6365965A05AD9ECEBD271
3,144,041 UART: [art] SIG.S = AB2B539067D47207AF56CD3DA49D3858E6C8096FD9FB186EA5029CB0C65EB8778CF4221FA734571D5115A2D426E0D8E3
3,167,913 UART: Caliptra RT
3,168,166 UART: [state] CFI Enabled
3,275,460 UART: [rt] RT listening for mailbox commands...
3,276,130 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,986 UART: [rt]cmd =0x50435252, len=8
3,307,594 >>> mbox cmd response data (8 bytes)
3,307,595 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,366 UART:
3,308,382 UART: Running Caliptra ROM ...
3,308,790 UART:
3,308,845 UART: [state] CFI Enabled
3,311,445 UART: [state] LifecycleState = Unprovisioned
3,312,100 UART: [state] DebugLocked = No
3,312,768 UART: [state] WD Timer not started. Device not locked for debugging
3,314,018 UART: [kat] SHA2-256
4,117,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,697 UART: [kat] ++
4,121,849 UART: [kat] sha1
4,126,141 UART: [kat] SHA2-256
4,128,081 UART: [kat] SHA2-384
4,130,966 UART: [kat] SHA2-512-ACC
4,132,866 UART: [kat] ECC-384
4,142,563 UART: [kat] HMAC-384Kdf
4,147,247 UART: [kat] LMS
4,395,559 UART: [kat] --
4,396,393 UART: [update-reset] ++
5,300,996 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,398,563 >>> mbox cmd response: success
5,398,563 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,398,912 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,926 UART: [update-reset Success] --
5,407,993 UART: [state] Locking Datavault
5,408,843 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,447 UART: [state] Locking ICCM
5,409,919 UART: [exit] Launching FMC @ 0x40000130
5,415,248 UART:
5,415,264 UART: Running Caliptra FMC ...
5,415,672 UART:
5,415,726 UART: [state] CFI Enabled
5,505,017 UART: [art] Extend RT PCRs Done
5,505,445 UART: [art] Lock RT PCRs Done
5,506,626 UART: [art] Populate DV Done
5,514,693 UART: [fht] FMC Alias Private Key: 7
5,515,623 UART: [art] Derive CDI
5,515,903 UART: [art] Store in in slot 0x4
5,601,400 UART: [art] Derive Key Pair
5,601,760 UART: [art] Store priv key in slot 0x5
5,614,768 UART: [art] Derive Key Pair - Done
5,629,384 UART: [art] Signing Cert with AUTHO
5,629,864 UART: RITY.KEYID = 7
5,644,870 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,635 UART: [art] PUB.X = 131AE198B45539F933F3082A51ABDCEC3C17991CD9ABB5334E3753501C7EC693C857689631EA68CD8B0624B4ED645289
5,652,399 UART: [art] PUB.Y = F9C0F432175647F3D3FA0467DDF02927BA5EC149FE2B1B585E20924D0AA87A8BF79B38A56773ACD894BCAFC690047FCC
5,659,354 UART: [art] SIG.R = F0C8A672ECC33D72D20FF09F4541A9A28DC4C406D10289D665F175D406FC7BF9CA1EA9345A50AAFC1652AE4A42048F15
5,666,121 UART: [art] SIG.S = EB3D9ADDA45513D2B61278EDB944386098C07D6E3ECB04C05CD8F80C1D689AE27D05A87F5BBC6490B485C8487B0756D7
5,690,018 UART: mbox::rt_entry...
5,690,390 UART: ____ _ _ _ ____ _____
5,691,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,974 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,742 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,510 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,278 UART: |_|
5,694,590 UART:
5,980,003 UART: [rt] Runtime listening for mailbox commands...
5,981,050 >>> mbox cmd response data (128 bytes)
5,981,051 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,162 UART:
5,981,178 UART: Running Caliptra ROM ...
5,981,586 UART:
5,981,641 UART: [state] CFI Enabled
5,984,007 UART: [state] LifecycleState = Unprovisioned
5,984,662 UART: [state] DebugLocked = No
5,985,384 UART: [state] WD Timer not started. Device not locked for debugging
5,986,660 UART: [kat] SHA2-256
6,790,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,339 UART: [kat] ++
6,794,491 UART: [kat] sha1
6,798,655 UART: [kat] SHA2-256
6,800,595 UART: [kat] SHA2-384
6,803,324 UART: [kat] SHA2-512-ACC
6,805,224 UART: [kat] ECC-384
6,814,761 UART: [kat] HMAC-384Kdf
6,819,327 UART: [kat] LMS
7,067,639 UART: [kat] --
7,068,743 UART: [update-reset] ++
7,973,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,974,815 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,197 >>> mbox cmd response: success
8,071,197 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,071,320 UART: [update-reset] Copying MAN_2 To MAN_1
8,079,334 UART: [update-reset Success] --
8,080,317 UART: [state] Locking Datavault
8,081,233 UART: [state] Locking PCR0, PCR1 and PCR31
8,081,837 UART: [state] Locking ICCM
8,082,289 UART: [exit] Launching FMC @ 0x40000130
8,087,618 UART:
8,087,634 UART: Running Caliptra FMC ...
8,088,042 UART:
8,088,096 UART: [state] CFI Enabled
8,176,901 UART: [art] Extend RT PCRs Done
8,177,329 UART: [art] Lock RT PCRs Done
8,178,640 UART: [art] Populate DV Done
8,186,919 UART: [fht] FMC Alias Private Key: 7
8,187,919 UART: [art] Derive CDI
8,188,199 UART: [art] Store in in slot 0x4
8,273,688 UART: [art] Derive Key Pair
8,274,048 UART: [art] Store priv key in slot 0x5
8,287,556 UART: [art] Derive Key Pair - Done
8,302,280 UART: [art] Signing Cert with AUTHO
8,302,760 UART: RITY.KEYID = 7
8,317,970 UART: [art] Erasing AUTHORITY.KEYID = 7
8,318,735 UART: [art] PUB.X = A9DD2177E139E8A443EE9D9371B81978C101E0B4F310B5F459716FCB8D7E9674F3C332DA90F018AFE8AD65D7F5183208
8,325,503 UART: [art] PUB.Y = E0B7C4B96B405E2D007DF11C12FC5381D978296C1667E47FB9BBC9B819C4183667FBEF0BF7BA89C107BBE94B6FFA032C
8,332,438 UART: [art] SIG.R = 37CC73C6181C9F848448B500916683244DFA5A4890FF25C4347338EA960E969C77E44D0246BF45D3A4FB9B15EAFCB56C
8,339,182 UART: [art] SIG.S = 9577B1592839E7F912F785F4A6A4209384E929B751F5AD96FA2C112BC67DEE77138BC7A3F616D7287C3E2EB784D66FE1
8,362,993 UART: mbox::rt_entry...
8,363,365 UART: ____ _ _ _ ____ _____
8,364,149 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,364,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,365,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,366,485 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,367,253 UART: |_|
8,367,565 UART:
8,648,531 UART: [rt] Runtime listening for mailbox commands...
8,649,578 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,932 ready_for_fw is high
1,055,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,707 >>> mbox cmd response: success
2,683,619 UART:
2,683,635 UART: Running Caliptra FMC ...
2,684,043 UART:
2,684,097 UART: [state] CFI Enabled
2,694,612 UART: [fht] FMC Alias Private Key: 7
2,802,535 UART: [art] Extend RT PCRs Done
2,802,963 UART: [art] Lock RT PCRs Done
2,804,513 UART: [art] Populate DV Done
2,812,706 UART: [fht] FMC Alias Private Key: 7
2,813,754 UART: [art] Derive CDI
2,814,034 UART: [art] Store in in slot 0x4
2,899,637 UART: [art] Derive Key Pair
2,899,997 UART: [art] Store priv key in slot 0x5
2,912,815 UART: [art] Derive Key Pair - Done
2,927,501 UART: [art] Signing Cert with AUTHO
2,927,981 UART: RITY.KEYID = 7
2,943,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,430 UART: [art] PUB.X = 53B49B2D07DE52D8BEF5D79EA80589D04BB7244E39D1F03C2E8B85FAC500BAB414010D60B5C9648F40D60990B359F729
2,951,169 UART: [art] PUB.Y = 11540071F4251F215F2ECD1EC71A6B4BB0AF85E7B45A7C11FD6DA83DAEDBAC65345A3F4D0C410347BAC89331E86688B9
2,958,105 UART: [art] SIG.R = E7522B38FD035DE60E0E2A610FC2D912483E286C9CD9226A0E98511A0FDAE8F7F30EF4B7419B41968A08D7E6C7B167CA
2,964,861 UART: [art] SIG.S = CA15595956C6345E55D2DC7D3AB1993E8062F060D748158CB8C9448F023AF782D3DE3F8BA913468DE16C71216B019980
2,988,054 UART: Caliptra RT
2,988,307 UART: [state] CFI Enabled
3,096,335 UART: [rt] RT listening for mailbox commands...
3,097,005 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,683 UART: [rt]cmd =0x50435252, len=8
3,127,995 >>> mbox cmd response data (8 bytes)
3,127,996 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,100,817 >>> mbox cmd response: success
5,100,817 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,113,687 UART:
5,113,703 UART: Running Caliptra FMC ...
5,114,111 UART:
5,114,165 UART: [state] CFI Enabled
5,203,430 UART: [art] Extend RT PCRs Done
5,203,858 UART: [art] Lock RT PCRs Done
5,205,081 UART: [art] Populate DV Done
5,213,268 UART: [fht] FMC Alias Private Key: 7
5,214,240 UART: [art] Derive CDI
5,214,520 UART: [art] Store in in slot 0x4
5,300,195 UART: [art] Derive Key Pair
5,300,555 UART: [art] Store priv key in slot 0x5
5,313,475 UART: [art] Derive Key Pair - Done
5,328,334 UART: [art] Signing Cert with AUTHO
5,328,814 UART: RITY.KEYID = 7
5,343,714 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,479 UART: [art] PUB.X = C028466A49D333F649689CBA9DA81EA1A6AA5B7E4334249CF2EFE6D7CBEC7DFEC665BEFF1835313231F39002FEC757BC
5,351,264 UART: [art] PUB.Y = D4E043457CABAAD10CFC0A62B50CC455B2AED86A5790718471B1DE3CB6A8870559FA9989EDFD721AF72104091E98765A
5,358,206 UART: [art] SIG.R = 3267C30658DEAFE610C8353B3D66FF7F5F3B623E724A5CAEAB9E8530C7A3FF1A9A4EF3E876D8562D997CBFA63867CB09
5,364,986 UART: [art] SIG.S = 9F5BE7C24328BB85FAA98B108B70A259CDF1BF6844B61FC3ABA9E9C4C368AF211C735CEFE12EBB31A33A2B958568C1FB
5,389,175 UART: mbox::rt_entry...
5,389,547 UART: ____ _ _ _ ____ _____
5,390,331 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,391,131 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,391,899 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,392,667 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,393,435 UART: |_|
5,393,747 UART:
5,672,855 UART: [rt] Runtime listening for mailbox commands...
5,673,902 >>> mbox cmd response data (128 bytes)
5,673,903 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,645,826 >>> mbox cmd response: success
7,645,826 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,659,416 UART:
7,659,432 UART: Running Caliptra FMC ...
7,659,840 UART:
7,659,894 UART: [state] CFI Enabled
7,748,929 UART: [art] Extend RT PCRs Done
7,749,357 UART: [art] Lock RT PCRs Done
7,750,804 UART: [art] Populate DV Done
7,758,871 UART: [fht] FMC Alias Private Key: 7
7,759,967 UART: [art] Derive CDI
7,760,247 UART: [art] Store in in slot 0x4
7,846,020 UART: [art] Derive Key Pair
7,846,380 UART: [art] Store priv key in slot 0x5
7,859,496 UART: [art] Derive Key Pair - Done
7,874,186 UART: [art] Signing Cert with AUTHO
7,874,666 UART: RITY.KEYID = 7
7,889,846 UART: [art] Erasing AUTHORITY.KEYID = 7
7,890,611 UART: [art] PUB.X = C47444ED2C0CDA50C033DAB832E212A4C097B40B65807C7EF618951B54CF4F4C3D6078FD30C81E5E20CDAABF757552D5
7,897,387 UART: [art] PUB.Y = F410B433E00C2CD3242671EE810ED6B485BF4EB2AA7F374B51BC6436DD06B5C794F7CD8EB26AD88C409B996D43629DF8
7,904,340 UART: [art] SIG.R = 669BFAD10FA39D943F34F271054190C0876751639C16A9F76A15922A9D12B58F941E959B57264410842906B6B0B1D2B0
7,911,089 UART: [art] SIG.S = DAE88BBE413AADE9C8ED4C6A7A79255185082F1550D8BF52DD3AD6504C94B9BF674941737CF6251845FE4D36019E225D
7,934,906 UART: mbox::rt_entry...
7,935,278 UART: ____ _ _ _ ____ _____
7,936,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,936,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,937,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,938,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,939,166 UART: |_|
7,939,478 UART:
8,223,148 UART: [rt] Runtime listening for mailbox commands...
8,224,195 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,174,868 ready_for_fw is high
1,174,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,282,225 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,212 >>> mbox cmd response: success
2,774,267 UART: [afmc] ++
2,774,435 UART: [afmc] CDI.KEYID = 6
2,774,798 UART: [afmc] SUBJECT.KEYID = 7
2,775,224 UART: [afmc] AUTHORITY.KEYID = 5
2,811,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,556 UART: [afmc] --
2,855,592 UART: [cold-reset] --
2,856,502 UART: [state] Locking Datavault
2,857,573 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,177 UART: [state] Locking ICCM
2,858,701 UART: [exit] Launching FMC @ 0x40000130
2,864,030 UART:
2,864,046 UART: Running Caliptra FMC ...
2,864,454 UART:
2,864,597 UART: [state] CFI Enabled
2,874,926 UART: [fht] FMC Alias Private Key: 7
2,983,253 UART: [art] Extend RT PCRs Done
2,983,681 UART: [art] Lock RT PCRs Done
2,985,363 UART: [art] Populate DV Done
2,993,662 UART: [fht] FMC Alias Private Key: 7
2,994,798 UART: [art] Derive CDI
2,995,078 UART: [art] Store in in slot 0x4
3,080,769 UART: [art] Derive Key Pair
3,081,129 UART: [art] Store priv key in slot 0x5
3,094,165 UART: [art] Derive Key Pair - Done
3,108,924 UART: [art] Signing Cert with AUTHO
3,109,404 UART: RITY.KEYID = 7
3,124,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,587 UART: [art] PUB.X = 277F4F29742F5CA36A3BECB931DB5F9796E60B0A1866C73F7AB339E9BDED364F16A3EC2536E0656502B74540B6554756
3,132,350 UART: [art] PUB.Y = F1D42F6F86CE71F2A63EE1376DA09F15C941BCBC08AE01A7E43CD7D04736764E2D2025BBCFC4A37379E0245B3CD502F8
3,139,305 UART: [art] SIG.R = 9E99166A5E0305AE66327A4F65863C378D40B7226E5270D58B58B70437AD0CF0F130A4E6A35AF4DB75C3CE2FBCC95D5A
3,146,071 UART: [art] SIG.S = 03259FEC9B23684E19C5A2F7C5F9015B4F1A27BBC41E88D210D3A51DA0E7AAD1D43800D00042065FDE7F20190A86DF39
3,169,696 UART: Caliptra RT
3,170,041 UART: [state] CFI Enabled
3,278,326 UART: [rt] RT listening for mailbox commands...
3,278,996 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,758 UART: [rt]cmd =0x50435252, len=8
3,310,356 >>> mbox cmd response data (8 bytes)
3,310,357 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,126 UART:
3,311,142 UART: Running Caliptra ROM ...
3,311,550 UART:
3,311,692 UART: [state] CFI Enabled
3,314,378 UART: [state] LifecycleState = Unprovisioned
3,315,033 UART: [state] DebugLocked = No
3,315,617 UART: [state] WD Timer not started. Device not locked for debugging
3,316,899 UART: [kat] SHA2-256
4,120,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,578 UART: [kat] ++
4,124,730 UART: [kat] sha1
4,128,986 UART: [kat] SHA2-256
4,130,926 UART: [kat] SHA2-384
4,133,543 UART: [kat] SHA2-512-ACC
4,135,443 UART: [kat] ECC-384
4,145,390 UART: [kat] HMAC-384Kdf
4,149,938 UART: [kat] LMS
4,398,250 UART: [kat] --
4,398,842 UART: [update-reset] ++
5,304,153 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,166 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,548 >>> mbox cmd response: success
5,401,548 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,401,847 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,861 UART: [update-reset Success] --
5,410,828 UART: [state] Locking Datavault
5,411,472 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,076 UART: [state] Locking ICCM
5,412,496 UART: [exit] Launching FMC @ 0x40000130
5,417,825 UART:
5,417,841 UART: Running Caliptra FMC ...
5,418,249 UART:
5,418,392 UART: [state] CFI Enabled
5,507,729 UART: [art] Extend RT PCRs Done
5,508,157 UART: [art] Lock RT PCRs Done
5,509,336 UART: [art] Populate DV Done
5,517,351 UART: [fht] FMC Alias Private Key: 7
5,518,389 UART: [art] Derive CDI
5,518,669 UART: [art] Store in in slot 0x4
5,604,202 UART: [art] Derive Key Pair
5,604,562 UART: [art] Store priv key in slot 0x5
5,617,302 UART: [art] Derive Key Pair - Done
5,632,313 UART: [art] Signing Cert with AUTHO
5,632,793 UART: RITY.KEYID = 7
5,647,793 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,558 UART: [art] PUB.X = AF26A848D01DDE35C84B848B331BC89522EB4E31E5675B961803B2F1BA557AD32A7FAE47005B51B4FF707EEC3BAC68D8
5,655,317 UART: [art] PUB.Y = 848331F9594F6B1035F9B7730F16FB8E796D16B02511DADCFE68F99F7C1B72ADD0C1E3613A24C7055187551FADE7B7A8
5,662,267 UART: [art] SIG.R = 1983BAD68C56AD33166197F57B3D4C5F933E7D5D19E85BFEC4713EF129E7481DD656934B3B67BC6F93688E6421D4CE9C
5,669,043 UART: [art] SIG.S = 6975ACBC617C0F4936E91BA0DF702365D32E8CE97CECCD415F40F339E4CD2128C28317D95F7BB8698A8194200B925F7A
5,692,846 UART: mbox::rt_entry...
5,693,218 UART: ____ _ _ _ ____ _____
5,694,002 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,802 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,570 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,338 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,106 UART: |_|
5,697,418 UART:
5,979,972 UART: [rt] Runtime listening for mailbox commands...
5,981,019 >>> mbox cmd response data (128 bytes)
5,981,020 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,131 UART:
5,981,147 UART: Running Caliptra ROM ...
5,981,555 UART:
5,981,697 UART: [state] CFI Enabled
5,984,477 UART: [state] LifecycleState = Unprovisioned
5,985,132 UART: [state] DebugLocked = No
5,985,866 UART: [state] WD Timer not started. Device not locked for debugging
5,987,032 UART: [kat] SHA2-256
6,790,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,711 UART: [kat] ++
6,794,863 UART: [kat] sha1
6,799,125 UART: [kat] SHA2-256
6,801,065 UART: [kat] SHA2-384
6,803,804 UART: [kat] SHA2-512-ACC
6,805,704 UART: [kat] ECC-384
6,815,323 UART: [kat] HMAC-384Kdf
6,820,115 UART: [kat] LMS
7,068,427 UART: [kat] --
7,069,329 UART: [update-reset] ++
7,973,848 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,415 >>> mbox cmd response: success
8,071,415 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,071,658 UART: [update-reset] Copying MAN_2 To MAN_1
8,079,672 UART: [update-reset Success] --
8,080,703 UART: [state] Locking Datavault
8,081,473 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,077 UART: [state] Locking ICCM
8,082,737 UART: [exit] Launching FMC @ 0x40000130
8,088,066 UART:
8,088,082 UART: Running Caliptra FMC ...
8,088,490 UART:
8,088,633 UART: [state] CFI Enabled
8,177,926 UART: [art] Extend RT PCRs Done
8,178,354 UART: [art] Lock RT PCRs Done
8,179,767 UART: [art] Populate DV Done
8,187,926 UART: [fht] FMC Alias Private Key: 7
8,189,070 UART: [art] Derive CDI
8,189,350 UART: [art] Store in in slot 0x4
8,274,997 UART: [art] Derive Key Pair
8,275,357 UART: [art] Store priv key in slot 0x5
8,288,503 UART: [art] Derive Key Pair - Done
8,302,963 UART: [art] Signing Cert with AUTHO
8,303,443 UART: RITY.KEYID = 7
8,318,883 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,648 UART: [art] PUB.X = 79A889E9AC07E6351424764B487953B8E2184F1D3DE4310BB7ED88DC9979C7442F23D0F71D0B7C515CF6DD80467C43BE
8,326,411 UART: [art] PUB.Y = E6313302841A03DD58FAAE75482FB9900C878F9E463EBBE448A43F4E152A865553B87FE1FBA18071F70DCA320FAE9497
8,333,352 UART: [art] SIG.R = AABA7E5EFD8D61D3CB8775077DC649E32A592B011993F9211BFB3C22E0CE79EFB66F73BB991F262A81E968C2E18ED560
8,340,130 UART: [art] SIG.S = 16D22582F67EEEF0CF580B45F6D4C9AA2D85B2D4DE36A561E67FD79E9E508EB48B7E8888B7AAE082C2EA0D55EB2E9953
8,363,673 UART: mbox::rt_entry...
8,364,045 UART: ____ _ _ _ ____ _____
8,364,829 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,629 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,165 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,367,933 UART: |_|
8,368,245 UART:
8,651,923 UART: [rt] Runtime listening for mailbox commands...
8,652,970 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,449 ready_for_fw is high
1,057,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,530 >>> mbox cmd response: success
2,686,260 UART:
2,686,276 UART: Running Caliptra FMC ...
2,686,684 UART:
2,686,827 UART: [state] CFI Enabled
2,697,332 UART: [fht] FMC Alias Private Key: 7
2,805,241 UART: [art] Extend RT PCRs Done
2,805,669 UART: [art] Lock RT PCRs Done
2,807,229 UART: [art] Populate DV Done
2,815,558 UART: [fht] FMC Alias Private Key: 7
2,816,514 UART: [art] Derive CDI
2,816,794 UART: [art] Store in in slot 0x4
2,902,151 UART: [art] Derive Key Pair
2,902,511 UART: [art] Store priv key in slot 0x5
2,915,579 UART: [art] Derive Key Pair - Done
2,930,862 UART: [art] Signing Cert with AUTHO
2,931,342 UART: RITY.KEYID = 7
2,946,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,667 UART: [art] PUB.X = 19F2C54BD7833FD9117FE1FE4DD010912EECFC849D07CF6B51B055FC93E4CD0FA9C9355B2052CF952ED22E653010541D
2,954,443 UART: [art] PUB.Y = 3815B2860E2145D7DDA26EF3B8A8030A0175EBA1FBDD01719331D24830E63AEB4907C498A36C14DDE1122CD9FF4D2556
2,961,381 UART: [art] SIG.R = 0212A0FAAB2FC1E6705987E1F9447140881E583BAF79F76AE7CA3CD3A3931AEA6D5A7E37A5F9FA763C696B9A50360A84
2,968,155 UART: [art] SIG.S = 502CFDD8955FEBB623F7EEAF812493AA753FC5F2D941F9F986CDB1B43986B16329C6F6A720B2B52E1D0E8A08743D99F8
2,992,304 UART: Caliptra RT
2,992,649 UART: [state] CFI Enabled
3,100,918 UART: [rt] RT listening for mailbox commands...
3,101,588 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,536 UART: [rt]cmd =0x50435252, len=8
3,132,908 >>> mbox cmd response data (8 bytes)
3,132,909 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,105,455 >>> mbox cmd response: success
5,105,455 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,118,695 UART:
5,118,711 UART: Running Caliptra FMC ...
5,119,119 UART:
5,119,262 UART: [state] CFI Enabled
5,208,695 UART: [art] Extend RT PCRs Done
5,209,123 UART: [art] Lock RT PCRs Done
5,210,422 UART: [art] Populate DV Done
5,218,491 UART: [fht] FMC Alias Private Key: 7
5,219,541 UART: [art] Derive CDI
5,219,821 UART: [art] Store in in slot 0x4
5,305,272 UART: [art] Derive Key Pair
5,305,632 UART: [art] Store priv key in slot 0x5
5,319,898 UART: [art] Derive Key Pair - Done
5,334,775 UART: [art] Signing Cert with AUTHO
5,335,255 UART: RITY.KEYID = 7
5,350,511 UART: [art] Erasing AUTHORITY.KEYID = 7
5,351,276 UART: [art] PUB.X = 0C67206511FC7FB5C09FCC627562E361F9385C5C324968C7D64D7A3C124BAE28FEDE22219CD4158A14217ECF32DB2DF8
5,358,051 UART: [art] PUB.Y = 6F49AA68F056930F4BFE19FF807A818F14AB5FE16A916BB32B8FFC517C92535988C1BB70F35E7BC43B7FFCE0567BFBBA
5,365,018 UART: [art] SIG.R = 41714785C78FA579E898D0AB475C1081B1E0CB7A3D4E6031D221151706B12E615CC23A9184B281701366303149FE48DD
5,371,775 UART: [art] SIG.S = 0563CDB8833ABD679101D36876F9A6CC94AF2A9DEAAFF0D17F3CF80BABC0967E436907D75B5462A747C9FE54463045FB
5,395,482 UART: mbox::rt_entry...
5,395,854 UART: ____ _ _ _ ____ _____
5,396,638 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,397,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,398,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,398,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,399,742 UART: |_|
5,400,054 UART:
5,682,644 UART: [rt] Runtime listening for mailbox commands...
5,683,691 >>> mbox cmd response data (128 bytes)
5,683,692 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,655,204 >>> mbox cmd response: success
7,655,204 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,668,748 UART:
7,668,764 UART: Running Caliptra FMC ...
7,669,172 UART:
7,669,315 UART: [state] CFI Enabled
7,758,226 UART: [art] Extend RT PCRs Done
7,758,654 UART: [art] Lock RT PCRs Done
7,759,795 UART: [art] Populate DV Done
7,767,896 UART: [fht] FMC Alias Private Key: 7
7,769,026 UART: [art] Derive CDI
7,769,306 UART: [art] Store in in slot 0x4
7,854,681 UART: [art] Derive Key Pair
7,855,041 UART: [art] Store priv key in slot 0x5
7,868,585 UART: [art] Derive Key Pair - Done
7,883,245 UART: [art] Signing Cert with AUTHO
7,883,725 UART: RITY.KEYID = 7
7,899,081 UART: [art] Erasing AUTHORITY.KEYID = 7
7,899,846 UART: [art] PUB.X = 79E060E74B64C8C2F1B6CF60A612443317CBA3BE10790DF783B1A04CC2F705AC66214B126A5FCEA07EB8377E2A9C9855
7,906,618 UART: [art] PUB.Y = D9677BCBA2E4BEFF88918BA34F181F18DD61C6CF451EDCB9FBBB93D7654E808A80BE902DAEF067CFAC4FC585643FBDE6
7,913,598 UART: [art] SIG.R = D2EAB3B618D1C66092E5B26630DC896E6557FC4C551AE288680F647F1DEDD787B58A76B93DA76651752F5110A8CCA6CA
7,920,373 UART: [art] SIG.S = 14730B97ED00767DC7A8820BCF1F41DF7A4073E8090A8CA3769F178D0CB6C6B6B0E0D3806256066A6DF4F39D4A8D5AD5
7,944,372 UART: mbox::rt_entry...
7,944,744 UART: ____ _ _ _ ____ _____
7,945,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,946,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,947,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,947,864 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,948,632 UART: |_|
7,948,944 UART:
8,228,474 UART: [rt] Runtime listening for mailbox commands...
8,229,521 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,326 UART: [kat] SHA2-512-ACC
897,227 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,629 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,828 UART: [idev] ++
1,479,996 UART: [idev] CDI.KEYID = 6
1,480,356 UART: [idev] SUBJECT.KEYID = 7
1,480,780 UART: [idev] UDS.KEYID = 0
1,481,125 ready_for_fw is high
1,481,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,644 UART: [idev] Erasing UDS.KEYID = 0
1,504,634 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,298 UART: [idev] --
1,514,241 UART: [ldev] ++
1,514,409 UART: [ldev] CDI.KEYID = 6
1,514,772 UART: [ldev] SUBJECT.KEYID = 5
1,515,198 UART: [ldev] AUTHORITY.KEYID = 7
1,515,661 UART: [ldev] FE.KEYID = 1
1,520,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,278 UART: [ldev] --
1,585,739 UART: [fwproc] Waiting for Commands...
1,586,416 UART: [fwproc] Received command 0x46574c44
1,587,207 UART: [fwproc] Received Image of size 114332 bytes
2,883,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,770 >>> mbox cmd response: success
3,076,814 UART: [afmc] ++
3,076,982 UART: [afmc] CDI.KEYID = 6
3,077,344 UART: [afmc] SUBJECT.KEYID = 7
3,077,769 UART: [afmc] AUTHORITY.KEYID = 5
3,112,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,093 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,783 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,642 UART: [afmc] --
3,155,526 UART: [cold-reset] --
3,156,324 UART: [state] Locking Datavault
3,157,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,391 UART: [state] Locking ICCM
3,158,855 UART: [exit] Launching FMC @ 0x40000130
3,164,184 UART:
3,164,200 UART: Running Caliptra FMC ...
3,164,608 UART:
3,164,662 UART: [state] CFI Enabled
3,175,009 UART: [fht] FMC Alias Private Key: 7
3,282,674 UART: [art] Extend RT PCRs Done
3,283,102 UART: [art] Lock RT PCRs Done
3,284,536 UART: [art] Populate DV Done
3,292,759 UART: [fht] FMC Alias Private Key: 7
3,293,941 UART: [art] Derive CDI
3,294,221 UART: [art] Store in in slot 0x4
3,379,542 UART: [art] Derive Key Pair
3,379,902 UART: [art] Store priv key in slot 0x5
3,393,006 UART: [art] Derive Key Pair - Done
3,407,583 UART: [art] Signing Cert with AUTHO
3,408,063 UART: RITY.KEYID = 7
3,423,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,024 UART: [art] PUB.X = 6789511AB53A2ABE1DA7B6015A1C9B3380B23BBA87DCD99E6F10289ABFDB918E1EEA4FC0E869C0BC8ACC58B4EDCF82EE
3,430,821 UART: [art] PUB.Y = 8C9F5DD93AE8C673D9817A2AC8C5427DD403660E61F712B98490ED76199B6D9A915B728D641C94CC345B2C839ABDF3C2
3,437,771 UART: [art] SIG.R = 3F42356A6479B8D5D2A5839A30A3A63ED14B11946688F43A0491152414215121FB43DD7AB22ED31BDA1E2A49EC08BC0D
3,444,534 UART: [art] SIG.S = 503FC0FAFCE2185EB9C409C132AE3C64FFF2A72E4FA3E69DEC550704A6215BD51D0BAD3EF67E69671E8282C1E3352436
3,467,959 UART: Caliptra RT
3,468,212 UART: [state] CFI Enabled
3,576,732 UART: [rt] RT listening for mailbox commands...
3,577,402 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,359 UART:
3,578,375 UART: Running Caliptra ROM ...
3,578,783 UART:
3,578,837 UART: [state] CFI Enabled
3,581,539 UART: [state] LifecycleState = Unprovisioned
3,582,194 UART: [state] DebugLocked = No
3,582,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,584,427 UART: [kat] SHA2-256
4,378,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,473 UART: [kat] ++
4,382,625 UART: [kat] sha1
4,386,701 UART: [kat] SHA2-256
4,388,639 UART: [kat] SHA2-384
4,391,372 UART: [kat] SHA2-512-ACC
4,393,272 UART: [kat] ECC-384
4,398,795 UART: [kat] HMAC-384Kdf
4,403,545 UART: [kat] LMS
4,971,741 UART: [kat] --
4,972,576 UART: [update-reset] ++
5,900,074 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,901,310 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
5,997,744 >>> mbox cmd response: success
5,997,744 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,998,053 UART: [update-reset] Copying MAN_2 To MAN_1
6,006,067 UART: [update-reset Success] --
6,006,872 UART: [state] Locking Datavault
6,007,826 UART: [state] Locking PCR0, PCR1 and PCR31
6,008,430 UART: [state] Locking ICCM
6,009,032 UART: [exit] Launching FMC @ 0x40000130
6,014,361 UART:
6,014,377 UART: Running Caliptra FMC ...
6,014,785 UART:
6,014,839 UART: [state] CFI Enabled
6,103,374 UART: [art] Extend RT PCRs Done
6,103,802 UART: [art] Lock RT PCRs Done
6,104,889 UART: [art] Populate DV Done
6,113,150 UART: [fht] FMC Alias Private Key: 7
6,114,314 UART: [art] Derive CDI
6,114,594 UART: [art] Store in in slot 0x4
6,200,355 UART: [art] Derive Key Pair
6,200,715 UART: [art] Store priv key in slot 0x5
6,213,393 UART: [art] Derive Key Pair - Done
6,228,544 UART: [art] Signing Cert with AUTHO
6,229,024 UART: RITY.KEYID = 7
6,244,558 UART: [art] Erasing AUTHORITY.KEYID = 7
6,245,323 UART: [art] PUB.X = 35C9C3052781300F17A2B01B31AE84E4698AF2B67B87DFF1713C0126AF93DE2AC18D961A89CEB799B1A4B239DE335AC3
6,252,092 UART: [art] PUB.Y = F4CC27E28789A8EAA6BF388E519B9BE8F2962E9ACBA039E690E43D372534E224F7F7D2E07057B7765EBAA06837396654
6,259,046 UART: [art] SIG.R = 50905AD139F4C02E66F891A30993E654644ECF25DAFF4148AE9CB5017DF072F3DB5FEA2BC379A5C705CB12B3FD8926C6
6,265,819 UART: [art] SIG.S = DD7CA6E14B826634FBCB73A620BE1A06FCF0E732168C08CCB91109DD7023CFF3B9197BE193E68454E29C4CDC322252A9
6,289,515 UART: mbox::rt_entry...
6,289,887 UART: ____ _ _ _ ____ _____
6,290,671 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,291,471 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,292,239 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,293,007 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,293,775 UART: |_|
6,294,087 UART:
6,580,061 UART: [rt] Runtime listening for mailbox commands...
6,581,251 >>> mbox cmd response data (48 bytes)
6,581,252 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,581,360 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,069 ready_for_fw is high
1,362,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,770 >>> mbox cmd response: success
2,988,398 UART:
2,988,414 UART: Running Caliptra FMC ...
2,988,822 UART:
2,988,876 UART: [state] CFI Enabled
2,999,229 UART: [fht] FMC Alias Private Key: 7
3,106,790 UART: [art] Extend RT PCRs Done
3,107,218 UART: [art] Lock RT PCRs Done
3,108,612 UART: [art] Populate DV Done
3,116,745 UART: [fht] FMC Alias Private Key: 7
3,117,775 UART: [art] Derive CDI
3,118,055 UART: [art] Store in in slot 0x4
3,203,456 UART: [art] Derive Key Pair
3,203,816 UART: [art] Store priv key in slot 0x5
3,216,992 UART: [art] Derive Key Pair - Done
3,231,869 UART: [art] Signing Cert with AUTHO
3,232,349 UART: RITY.KEYID = 7
3,247,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,418 UART: [art] PUB.X = 38837C3959B4A565218A8BE8C6677EA845C7D7BE8DD18E8601146180EFC085FA63D0397ADE6760540109DD2592C91A10
3,255,175 UART: [art] PUB.Y = C5514C04BCC0A8D8A8D72408BED5F7F6DE29E57A5BADF327A529B219700D9166A39059BC9ACC4B5285DF36C8FDE95F5F
3,262,134 UART: [art] SIG.R = B59C967A582538D85DFB2EBF526B035545FBE727668C938BFA863BE1AE2ACDF25CA61A3326298797EEA3582DE22BA1F6
3,268,913 UART: [art] SIG.S = 771027FBF5F92FA0CBD83BA72FC8BFC40DD2A97F8395ED9E4CBABAB7FE8C4F8B745994E38D79EA53699D87A7ACE46720
3,292,249 UART: Caliptra RT
3,292,502 UART: [state] CFI Enabled
3,400,249 UART: [rt] RT listening for mailbox commands...
3,400,919 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,703,311 >>> mbox cmd response: success
5,703,311 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,716,728 UART:
5,716,744 UART: Running Caliptra FMC ...
5,717,152 UART:
5,717,206 UART: [state] CFI Enabled
5,806,059 UART: [art] Extend RT PCRs Done
5,806,487 UART: [art] Lock RT PCRs Done
5,807,902 UART: [art] Populate DV Done
5,816,287 UART: [fht] FMC Alias Private Key: 7
5,817,221 UART: [art] Derive CDI
5,817,501 UART: [art] Store in in slot 0x4
5,902,904 UART: [art] Derive Key Pair
5,903,264 UART: [art] Store priv key in slot 0x5
5,916,116 UART: [art] Derive Key Pair - Done
5,931,142 UART: [art] Signing Cert with AUTHO
5,931,622 UART: RITY.KEYID = 7
5,947,052 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,817 UART: [art] PUB.X = C5F5E616475C004A0010B7E26A076C5EBFDEF76D029C59A4DABF390A93C1E7DA8A3603C675D0285120997C19B9202C83
5,954,535 UART: [art] PUB.Y = CE428FB4E489EE37AF030DE961A3C44A3BC7EA6BE696FF1411EA816F5921041C7698A3A578D9D500591E2385612174C9
5,961,456 UART: [art] SIG.R = AB4A075D3C3EC7181161C08CEFF1A9E3255787BEB13C86528F2FFB616B7B150F072E6DBD23B9382DFD7C738A5678E8F0
5,968,229 UART: [art] SIG.S = 4716732D5131C1702CCA1DB7A757B6A08E4165C16E5D91CA90049009A9BC22282928069FCCA765A5C867EB6061832291
5,992,259 UART: mbox::rt_entry...
5,992,631 UART: ____ _ _ _ ____ _____
5,993,415 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,994,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,994,983 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,995,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,996,519 UART: |_|
5,996,831 UART:
6,277,281 UART: [rt] Runtime listening for mailbox commands...
6,278,471 >>> mbox cmd response data (48 bytes)
6,278,472 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,278,580 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
890,800 UART: [kat] SHA2-256
892,738 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,475 UART: [kat] HMAC-384Kdf
907,925 UART: [kat] LMS
1,476,121 UART: [kat] --
1,477,226 UART: [cold-reset] ++
1,477,658 UART: [fht] Storing FHT @ 0x50003400
1,480,639 UART: [idev] ++
1,480,807 UART: [idev] CDI.KEYID = 6
1,481,167 UART: [idev] SUBJECT.KEYID = 7
1,481,591 UART: [idev] UDS.KEYID = 0
1,481,936 ready_for_fw is high
1,481,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,805 UART: [idev] Erasing UDS.KEYID = 0
1,506,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,473 UART: [idev] --
1,516,490 UART: [ldev] ++
1,516,658 UART: [ldev] CDI.KEYID = 6
1,517,021 UART: [ldev] SUBJECT.KEYID = 5
1,517,447 UART: [ldev] AUTHORITY.KEYID = 7
1,517,910 UART: [ldev] FE.KEYID = 1
1,523,324 UART: [ldev] Erasing FE.KEYID = 1
1,549,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,355 UART: [ldev] --
1,588,758 UART: [fwproc] Waiting for Commands...
1,589,595 UART: [fwproc] Received command 0x46574c44
1,590,386 UART: [fwproc] Received Image of size 114332 bytes
2,888,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,803 >>> mbox cmd response: success
3,081,935 UART: [afmc] ++
3,082,103 UART: [afmc] CDI.KEYID = 6
3,082,465 UART: [afmc] SUBJECT.KEYID = 7
3,082,890 UART: [afmc] AUTHORITY.KEYID = 5
3,118,627 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,721 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,114 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,804 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,627 UART: [afmc] --
3,161,679 UART: [cold-reset] --
3,162,369 UART: [state] Locking Datavault
3,163,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,262 UART: [state] Locking ICCM
3,164,758 UART: [exit] Launching FMC @ 0x40000130
3,170,087 UART:
3,170,103 UART: Running Caliptra FMC ...
3,170,511 UART:
3,170,654 UART: [state] CFI Enabled
3,181,203 UART: [fht] FMC Alias Private Key: 7
3,289,764 UART: [art] Extend RT PCRs Done
3,290,192 UART: [art] Lock RT PCRs Done
3,291,558 UART: [art] Populate DV Done
3,299,731 UART: [fht] FMC Alias Private Key: 7
3,300,759 UART: [art] Derive CDI
3,301,039 UART: [art] Store in in slot 0x4
3,386,556 UART: [art] Derive Key Pair
3,386,916 UART: [art] Store priv key in slot 0x5
3,400,272 UART: [art] Derive Key Pair - Done
3,415,042 UART: [art] Signing Cert with AUTHO
3,415,522 UART: RITY.KEYID = 7
3,430,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,333 UART: [art] PUB.X = 2C3F3DFC955B610C8CC4F53A35B014141D57824825B80FCB2D7D5B8D47B0910BCD2C72162126BC5C855D37B389E2B504
3,438,095 UART: [art] PUB.Y = D6F6A52199670CB58FD94FD1F790244EA09D9EBFDC6EDF7B5CB87F87B4BD6E7C7A57A5B4542688B4DEB626428B9C5C98
3,445,060 UART: [art] SIG.R = 5D4374859B7D9F6C38BCCEF87841E24FE5BA8FFFB49142B63136CCF349E6DEA6BC2C6A0E15BC146826F907825E83D898
3,451,836 UART: [art] SIG.S = D3AE3761795ED3F908369F4924509504475498C3F5D827553E73B9DB4894B1ABAA5D14DFAB4017C85A3BFE490336E19A
3,475,692 UART: Caliptra RT
3,476,037 UART: [state] CFI Enabled
3,584,182 UART: [rt] RT listening for mailbox commands...
3,584,852 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,263 UART:
3,586,279 UART: Running Caliptra ROM ...
3,586,687 UART:
3,586,828 UART: [state] CFI Enabled
3,589,638 UART: [state] LifecycleState = Unprovisioned
3,590,293 UART: [state] DebugLocked = No
3,590,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,592,478 UART: [kat] SHA2-256
4,386,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,524 UART: [kat] ++
4,390,676 UART: [kat] sha1
4,394,990 UART: [kat] SHA2-256
4,396,928 UART: [kat] SHA2-384
4,399,597 UART: [kat] SHA2-512-ACC
4,401,497 UART: [kat] ECC-384
4,407,058 UART: [kat] HMAC-384Kdf
4,411,728 UART: [kat] LMS
4,979,924 UART: [kat] --
4,980,791 UART: [update-reset] ++
5,907,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,908,447 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,004,881 >>> mbox cmd response: success
6,004,881 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,005,188 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,202 UART: [update-reset Success] --
6,014,193 UART: [state] Locking Datavault
6,014,861 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,465 UART: [state] Locking ICCM
6,015,963 UART: [exit] Launching FMC @ 0x40000130
6,021,292 UART:
6,021,308 UART: Running Caliptra FMC ...
6,021,716 UART:
6,021,859 UART: [state] CFI Enabled
6,111,458 UART: [art] Extend RT PCRs Done
6,111,886 UART: [art] Lock RT PCRs Done
6,113,151 UART: [art] Populate DV Done
6,121,380 UART: [fht] FMC Alias Private Key: 7
6,122,528 UART: [art] Derive CDI
6,122,808 UART: [art] Store in in slot 0x4
6,208,543 UART: [art] Derive Key Pair
6,208,903 UART: [art] Store priv key in slot 0x5
6,222,685 UART: [art] Derive Key Pair - Done
6,237,390 UART: [art] Signing Cert with AUTHO
6,237,870 UART: RITY.KEYID = 7
6,253,562 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,327 UART: [art] PUB.X = 264EDE5B4A4502CCADBAE175ABCACBF680CAD43728CEB57F556F0486AA3A065ABA9499C7D7769A65DA8AAF85DC85B2F3
6,261,116 UART: [art] PUB.Y = EF5FC25A8B76012BECE84DE9980A051EF476DA262565C5B73BA736BD9E5A9706D52DF6B55AA3E71EC1665A6CE979D678
6,268,068 UART: [art] SIG.R = 4B6F7337BD01DBC57EA131122E749B0D98120015A043F3B9B7CA7374466C53A20784757C64DF1151396C6165CB22EDB6
6,274,803 UART: [art] SIG.S = 6BFBA584C65B1BE60D61D116D19E17C39BCB9DDD347AEBB49AAF0AB64E52E27B14D4FC8EB76CC0BF53CF35ECD3E576B2
6,297,902 UART: mbox::rt_entry...
6,298,274 UART: ____ _ _ _ ____ _____
6,299,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,299,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,300,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,301,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,302,162 UART: |_|
6,302,474 UART:
6,584,165 UART: [rt] Runtime listening for mailbox commands...
6,585,355 >>> mbox cmd response data (48 bytes)
6,585,356 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,585,464 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,476 ready_for_fw is high
1,363,476 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,127 >>> mbox cmd response: success
2,990,867 UART:
2,990,883 UART: Running Caliptra FMC ...
2,991,291 UART:
2,991,434 UART: [state] CFI Enabled
3,001,803 UART: [fht] FMC Alias Private Key: 7
3,109,880 UART: [art] Extend RT PCRs Done
3,110,308 UART: [art] Lock RT PCRs Done
3,111,820 UART: [art] Populate DV Done
3,119,905 UART: [fht] FMC Alias Private Key: 7
3,121,063 UART: [art] Derive CDI
3,121,343 UART: [art] Store in in slot 0x4
3,206,722 UART: [art] Derive Key Pair
3,207,082 UART: [art] Store priv key in slot 0x5
3,220,406 UART: [art] Derive Key Pair - Done
3,235,462 UART: [art] Signing Cert with AUTHO
3,235,942 UART: RITY.KEYID = 7
3,250,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,555 UART: [art] PUB.X = E80479C2A137D9B378ED1AF28102F7AE56CF4461BD5CDC551CFDC36A57FE054E1F7DF85E3E93C1C61F399A4820492E88
3,258,328 UART: [art] PUB.Y = 4A8505E153E9E825176A157024AAC31A6321A48212EC2303024B9783FC66780932D6AF9E9F0A8F1673CFF3EC83C046A4
3,265,259 UART: [art] SIG.R = 10462C92CD9804AF4F662CBF0D98BA35DA2FB24685A15225E374265F2894DDB04A91643E09190E67DC7D6D88F2A41F12
3,272,019 UART: [art] SIG.S = D6600C20F12E3705AA3423F380A3A53DED312DC45CB68078DBBD593BC740571806F13D3C4B22A4A12FE1C40CEF1AAC16
3,296,130 UART: Caliptra RT
3,296,475 UART: [state] CFI Enabled
3,404,214 UART: [rt] RT listening for mailbox commands...
3,404,884 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,707,709 >>> mbox cmd response: success
5,707,709 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,721,054 UART:
5,721,070 UART: Running Caliptra FMC ...
5,721,478 UART:
5,721,621 UART: [state] CFI Enabled
5,810,956 UART: [art] Extend RT PCRs Done
5,811,384 UART: [art] Lock RT PCRs Done
5,812,679 UART: [art] Populate DV Done
5,820,932 UART: [fht] FMC Alias Private Key: 7
5,822,018 UART: [art] Derive CDI
5,822,298 UART: [art] Store in in slot 0x4
5,907,927 UART: [art] Derive Key Pair
5,908,287 UART: [art] Store priv key in slot 0x5
5,921,883 UART: [art] Derive Key Pair - Done
5,936,337 UART: [art] Signing Cert with AUTHO
5,936,817 UART: RITY.KEYID = 7
5,951,935 UART: [art] Erasing AUTHORITY.KEYID = 7
5,952,700 UART: [art] PUB.X = E0B17ECCF627EF695A2E31A2DB7F222C58D080F60137DE94830E67698D21C077F12FB875997E58AB38BE79EB235CF0F3
5,959,472 UART: [art] PUB.Y = 2255ECB3C344EC9B72415FFE264E027FC76F321AB7A5A0C14F7A8FDF0B2DE7228F1D494850EB77E681261E1C6DA5064A
5,966,425 UART: [art] SIG.R = 8BCB8AA7C101C0FB5CF80E9651BCB9C80C05E4C6BDF64DA022FEB4EF836A3145B5AE8DA0F815EAA4BF0D090E1ED76282
5,973,202 UART: [art] SIG.S = 154C42C02FB6BE5DD1EBFE62E8D07E53DE9B92C4135BAEDF5201C44DB6B78487E8F031E36EAB6E6012AADD5D7B9A5135
5,997,456 UART: mbox::rt_entry...
5,997,828 UART: ____ _ _ _ ____ _____
5,998,612 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,999,412 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,000,180 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,000,948 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,001,716 UART: |_|
6,002,028 UART:
6,286,794 UART: [rt] Runtime listening for mailbox commands...
6,287,984 >>> mbox cmd response data (48 bytes)
6,287,985 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,288,093 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,580 UART: [kat] HMAC-384Kdf
923,086 UART: [kat] LMS
1,171,414 UART: [kat] --
1,172,371 UART: [cold-reset] ++
1,172,819 UART: [fht] FHT @ 0x50003400
1,175,550 UART: [idev] ++
1,175,718 UART: [idev] CDI.KEYID = 6
1,176,078 UART: [idev] SUBJECT.KEYID = 7
1,176,502 UART: [idev] UDS.KEYID = 0
1,176,847 ready_for_fw is high
1,176,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,334 UART: [idev] Erasing UDS.KEYID = 0
1,201,139 UART: [idev] Sha1 KeyId Algorithm
1,209,823 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,302 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,652 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,855 >>> mbox cmd response: success
2,777,111 UART: [afmc] ++
2,777,279 UART: [afmc] CDI.KEYID = 6
2,777,641 UART: [afmc] SUBJECT.KEYID = 7
2,778,066 UART: [afmc] AUTHORITY.KEYID = 5
2,813,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,124 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,852 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,737 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,378 UART: [afmc] --
2,856,318 UART: [cold-reset] --
2,857,168 UART: [state] Locking Datavault
2,858,285 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,889 UART: [state] Locking ICCM
2,859,405 UART: [exit] Launching FMC @ 0x40000130
2,864,734 UART:
2,864,750 UART: Running Caliptra FMC ...
2,865,158 UART:
2,865,212 UART: [state] CFI Enabled
2,875,565 UART: [fht] FMC Alias Private Key: 7
2,983,748 UART: [art] Extend RT PCRs Done
2,984,176 UART: [art] Lock RT PCRs Done
2,985,754 UART: [art] Populate DV Done
2,993,957 UART: [fht] FMC Alias Private Key: 7
2,995,023 UART: [art] Derive CDI
2,995,303 UART: [art] Store in in slot 0x4
3,080,780 UART: [art] Derive Key Pair
3,081,140 UART: [art] Store priv key in slot 0x5
3,094,466 UART: [art] Derive Key Pair - Done
3,109,366 UART: [art] Signing Cert with AUTHO
3,109,846 UART: RITY.KEYID = 7
3,124,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,689 UART: [art] PUB.X = 919F6163091ED84ACA2A2EE2CE384DD5AD1D6141F06307D8F23491680F2436E7AC6D82288BDFAA3C7EAD6D3208E7CBDC
3,132,463 UART: [art] PUB.Y = 33EE1057383D274442BAD124AEB8132C317A3843DAEA5933926261D4B2F9EAA80414F690524067CA45FAD433510F6EA5
3,139,405 UART: [art] SIG.R = B300DC50C97CB302CE6B4CE5EE5891AEF29A87AD04B224604F2C289FFDF4405FADA8AB7F2866A1E13B7C063476A44A50
3,146,160 UART: [art] SIG.S = B3DD045D9D64364715CD9B06E26F38B62B7DA13766BA85625D0CC371CCB080470B4117A2300B91B970F039C915E9E19F
3,170,574 UART: Caliptra RT
3,170,827 UART: [state] CFI Enabled
3,278,257 UART: [rt] RT listening for mailbox commands...
3,278,927 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,105 UART:
3,280,121 UART: Running Caliptra ROM ...
3,280,529 UART:
3,280,584 UART: [state] CFI Enabled
3,283,088 UART: [state] LifecycleState = Unprovisioned
3,283,743 UART: [state] DebugLocked = No
3,284,473 UART: [state] WD Timer not started. Device not locked for debugging
3,285,633 UART: [kat] SHA2-256
4,091,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,408 UART: [kat] ++
4,095,560 UART: [kat] sha1
4,099,848 UART: [kat] SHA2-256
4,101,788 UART: [kat] SHA2-384
4,104,647 UART: [kat] SHA2-512-ACC
4,106,547 UART: [kat] ECC-384
4,116,570 UART: [kat] HMAC-384Kdf
4,121,212 UART: [kat] LMS
4,369,540 UART: [kat] --
4,370,788 UART: [update-reset] ++
5,275,602 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,583 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,372,965 >>> mbox cmd response: success
5,372,965 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,373,292 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,306 UART: [update-reset Success] --
5,382,027 UART: [state] Locking Datavault
5,382,865 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,469 UART: [state] Locking ICCM
5,383,901 UART: [exit] Launching FMC @ 0x40000130
5,389,230 UART:
5,389,246 UART: Running Caliptra FMC ...
5,389,654 UART:
5,389,708 UART: [state] CFI Enabled
5,479,185 UART: [art] Extend RT PCRs Done
5,479,613 UART: [art] Lock RT PCRs Done
5,480,858 UART: [art] Populate DV Done
5,488,755 UART: [fht] FMC Alias Private Key: 7
5,489,693 UART: [art] Derive CDI
5,489,973 UART: [art] Store in in slot 0x4
5,575,478 UART: [art] Derive Key Pair
5,575,838 UART: [art] Store priv key in slot 0x5
5,588,998 UART: [art] Derive Key Pair - Done
5,603,708 UART: [art] Signing Cert with AUTHO
5,604,188 UART: RITY.KEYID = 7
5,620,012 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,777 UART: [art] PUB.X = 28D691CDE3E0CA3117D57D80E0CD3E42C4DC4235937C4A08D5CA5BD3DEACB2A49924CD946EA5A0AA958FFEB4714CCA32
5,627,568 UART: [art] PUB.Y = 86B24702BD97F80DC15B56D2C82978CF94DECEC39C88670719F61C888F82CCBF048867DE27688D9EBA0DC889448B96CE
5,634,511 UART: [art] SIG.R = AE3269F4B8F49AB2D12AF0234B3C06F1A9AAD06905ECCCC7DAF7E7E7614DC219F0C41DA2018DBE62DEDC965A913D9BCC
5,641,300 UART: [art] SIG.S = 92239B8476A7B346582DC4F0D9A822F02CCC18D2A1114B1FB74EA12DE60A62D0DF147266D8722592748A5284D590C8F1
5,665,406 UART: mbox::rt_entry...
5,665,778 UART: ____ _ _ _ ____ _____
5,666,562 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,667,362 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,668,130 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,668,898 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,669,666 UART: |_|
5,669,978 UART:
5,948,051 UART: [rt] Runtime listening for mailbox commands...
5,949,241 >>> mbox cmd response data (48 bytes)
5,949,242 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,949,350 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,811 ready_for_fw is high
1,060,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,241 >>> mbox cmd response: success
2,690,199 UART:
2,690,215 UART: Running Caliptra FMC ...
2,690,623 UART:
2,690,677 UART: [state] CFI Enabled
2,701,392 UART: [fht] FMC Alias Private Key: 7
2,809,909 UART: [art] Extend RT PCRs Done
2,810,337 UART: [art] Lock RT PCRs Done
2,811,907 UART: [art] Populate DV Done
2,820,192 UART: [fht] FMC Alias Private Key: 7
2,821,140 UART: [art] Derive CDI
2,821,420 UART: [art] Store in in slot 0x4
2,907,305 UART: [art] Derive Key Pair
2,907,665 UART: [art] Store priv key in slot 0x5
2,920,599 UART: [art] Derive Key Pair - Done
2,935,212 UART: [art] Signing Cert with AUTHO
2,935,692 UART: RITY.KEYID = 7
2,950,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,513 UART: [art] PUB.X = E6B35162CE08B27DCC7370DB99CEDFE09B971F298857CB338D6D57758A6B6B30B3A7C1C42B00C6867BBCA5BECB071CF5
2,958,273 UART: [art] PUB.Y = 26F451BDB5872E2DD58E9A95CD0AB983059B2031F5A8ABFF71563F1441BAE3E14F9039025D54CA680EE6BC69986D10BB
2,965,221 UART: [art] SIG.R = AA187EC16A4CED06641CF059BC70F9824CC70557968E94980F962BA7B672ADDA2CD80438BCC10C3C7D32A1087E6CB769
2,971,983 UART: [art] SIG.S = 2B57C381A2A1A8A2A9152AAD85E06951B3FA808A92BACE507FC60442994B8B3F682A5CD268482D35B8C7BB198785DC13
2,995,775 UART: Caliptra RT
2,996,028 UART: [state] CFI Enabled
3,104,359 UART: [rt] RT listening for mailbox commands...
3,105,029 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,082,154 >>> mbox cmd response: success
5,082,154 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,095,538 UART:
5,095,554 UART: Running Caliptra FMC ...
5,095,962 UART:
5,096,016 UART: [state] CFI Enabled
5,184,807 UART: [art] Extend RT PCRs Done
5,185,235 UART: [art] Lock RT PCRs Done
5,186,566 UART: [art] Populate DV Done
5,194,931 UART: [fht] FMC Alias Private Key: 7
5,195,919 UART: [art] Derive CDI
5,196,199 UART: [art] Store in in slot 0x4
5,281,596 UART: [art] Derive Key Pair
5,281,956 UART: [art] Store priv key in slot 0x5
5,295,034 UART: [art] Derive Key Pair - Done
5,309,307 UART: [art] Signing Cert with AUTHO
5,309,787 UART: RITY.KEYID = 7
5,324,991 UART: [art] Erasing AUTHORITY.KEYID = 7
5,325,756 UART: [art] PUB.X = 766518F2EBC6C2F3CD77D3A2D05CC6D1759700BD7BD370FC5D6D2552BF208BF3BD3F121112E42E89C2BDC4A409C83747
5,332,513 UART: [art] PUB.Y = 07304C046E54E3E21D31947F7C3E646778A0B27779023DC7E5EF51F800C418115ED39CC940ADDC643C0044C9D285ED22
5,339,408 UART: [art] SIG.R = 45E2310CD9AA68BB7BA50F0E6B4D0DB4FA5180A42DF9036E443729BAD704596C46802D9828DACF3A939D763FBA8B81A5
5,346,172 UART: [art] SIG.S = 5A6B4ADA659064085B80745376EA9100C0CF6C7FE97939CA46C2B53BDF5642527442E7FFD3A5A11F512CEC01B1016F23
5,370,056 UART: mbox::rt_entry...
5,370,428 UART: ____ _ _ _ ____ _____
5,371,212 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,372,012 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,372,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,373,548 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,374,316 UART: |_|
5,374,628 UART:
5,656,208 UART: [rt] Runtime listening for mailbox commands...
5,657,398 >>> mbox cmd response data (48 bytes)
5,657,399 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,657,507 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,011 UART: [kat] HMAC-384Kdf
922,779 UART: [kat] LMS
1,171,107 UART: [kat] --
1,171,990 UART: [cold-reset] ++
1,172,444 UART: [fht] FHT @ 0x50003400
1,175,109 UART: [idev] ++
1,175,277 UART: [idev] CDI.KEYID = 6
1,175,637 UART: [idev] SUBJECT.KEYID = 7
1,176,061 UART: [idev] UDS.KEYID = 0
1,176,406 ready_for_fw is high
1,176,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,321 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,840 UART: [idev] --
1,210,872 UART: [ldev] ++
1,211,040 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,829 UART: [ldev] AUTHORITY.KEYID = 7
1,212,292 UART: [ldev] FE.KEYID = 1
1,217,556 UART: [ldev] Erasing FE.KEYID = 1
1,243,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,224 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,205 UART: [fwproc] Recv command 0x46574c44
1,283,933 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,198 >>> mbox cmd response: success
2,774,370 UART: [afmc] ++
2,774,538 UART: [afmc] CDI.KEYID = 6
2,774,900 UART: [afmc] SUBJECT.KEYID = 7
2,775,325 UART: [afmc] AUTHORITY.KEYID = 5
2,810,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,819 UART: [afmc] --
2,853,787 UART: [cold-reset] --
2,854,629 UART: [state] Locking Datavault
2,855,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,286 UART: [state] Locking ICCM
2,856,788 UART: [exit] Launching FMC @ 0x40000130
2,862,117 UART:
2,862,133 UART: Running Caliptra FMC ...
2,862,541 UART:
2,862,684 UART: [state] CFI Enabled
2,873,089 UART: [fht] FMC Alias Private Key: 7
2,981,188 UART: [art] Extend RT PCRs Done
2,981,616 UART: [art] Lock RT PCRs Done
2,983,228 UART: [art] Populate DV Done
2,991,413 UART: [fht] FMC Alias Private Key: 7
2,992,503 UART: [art] Derive CDI
2,992,783 UART: [art] Store in in slot 0x4
3,078,640 UART: [art] Derive Key Pair
3,079,000 UART: [art] Store priv key in slot 0x5
3,092,262 UART: [art] Derive Key Pair - Done
3,106,937 UART: [art] Signing Cert with AUTHO
3,107,417 UART: RITY.KEYID = 7
3,122,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,516 UART: [art] PUB.X = 421F2DB4244BEF05149C46ACFB2D360C188B0D65DE364CF4ACCFCD07FE88B738F1EE7665717667844DF07E699C72B006
3,130,281 UART: [art] PUB.Y = 45CD6AE6A1D7E35A0F7BA8CDA70DC57897D08836B07B5193C1D73FE0451AE591FDD63B5ED4B546C9017CCFFA8CD63C5E
3,137,244 UART: [art] SIG.R = 6CDF513D643F20F142BC5ADFE41531E997186832FC0A575B74AD65361DA3753B45F19858D44994DDA4A6A18CE7630609
3,144,005 UART: [art] SIG.S = 55723A67A57EAF3186ABA3CD600D1A5928FEDAA4B63FAB6C2CB3793EA8A8BE10EBE2D8971B9A5985DA44710C448F5069
3,167,540 UART: Caliptra RT
3,167,885 UART: [state] CFI Enabled
3,275,706 UART: [rt] RT listening for mailbox commands...
3,276,376 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,712 UART:
3,277,728 UART: Running Caliptra ROM ...
3,278,136 UART:
3,278,278 UART: [state] CFI Enabled
3,282,136 UART: [state] LifecycleState = Unprovisioned
3,282,791 UART: [state] DebugLocked = No
3,283,501 UART: [state] WD Timer not started. Device not locked for debugging
3,284,731 UART: [kat] SHA2-256
4,090,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,506 UART: [kat] ++
4,094,658 UART: [kat] sha1
4,099,008 UART: [kat] SHA2-256
4,100,948 UART: [kat] SHA2-384
4,103,581 UART: [kat] SHA2-512-ACC
4,105,481 UART: [kat] ECC-384
4,115,618 UART: [kat] HMAC-384Kdf
4,120,346 UART: [kat] LMS
4,368,674 UART: [kat] --
4,369,640 UART: [update-reset] ++
5,274,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,371,939 >>> mbox cmd response: success
5,371,939 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,372,066 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,080 UART: [update-reset Success] --
5,381,015 UART: [state] Locking Datavault
5,381,793 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,397 UART: [state] Locking ICCM
5,382,985 UART: [exit] Launching FMC @ 0x40000130
5,388,314 UART:
5,388,330 UART: Running Caliptra FMC ...
5,388,738 UART:
5,388,881 UART: [state] CFI Enabled
5,478,226 UART: [art] Extend RT PCRs Done
5,478,654 UART: [art] Lock RT PCRs Done
5,480,149 UART: [art] Populate DV Done
5,488,446 UART: [fht] FMC Alias Private Key: 7
5,489,398 UART: [art] Derive CDI
5,489,678 UART: [art] Store in in slot 0x4
5,575,451 UART: [art] Derive Key Pair
5,575,811 UART: [art] Store priv key in slot 0x5
5,589,453 UART: [art] Derive Key Pair - Done
5,604,436 UART: [art] Signing Cert with AUTHO
5,604,916 UART: RITY.KEYID = 7
5,620,000 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,765 UART: [art] PUB.X = 4F463AC9DACB511CB826A6F3CE3AF62CB5824052F95DCC8428175AD185F5A88F0480A5931C74B72AFB54FE2D4DFFD0F9
5,627,550 UART: [art] PUB.Y = A26721E69D4F6F916C8E43CF353CA017320A3881794D7AAFF827EB36B4C1E04A74CC30B1F77424E1726654632D7F4C45
5,634,497 UART: [art] SIG.R = 46AD0C73663F2207A3B31F5993C2C4E6EC214F94A1CAFAEB4A29DB34ABBCE98E7C355505104B7F882D29A039845B2845
5,641,266 UART: [art] SIG.S = 6A9749175B2FA9ABA344B8DE7154B4976E614A207B211A93E50178778D7068E018194E7518C74A4CE871DD1CFBFE6E01
5,665,331 UART: mbox::rt_entry...
5,665,703 UART: ____ _ _ _ ____ _____
5,666,487 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,667,287 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,668,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,668,823 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,669,591 UART: |_|
5,669,903 UART:
5,950,593 UART: [rt] Runtime listening for mailbox commands...
5,951,783 >>> mbox cmd response data (48 bytes)
5,951,784 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,951,892 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,616 ready_for_fw is high
1,061,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,769 >>> mbox cmd response: success
2,689,959 UART:
2,689,975 UART: Running Caliptra FMC ...
2,690,383 UART:
2,690,526 UART: [state] CFI Enabled
2,701,155 UART: [fht] FMC Alias Private Key: 7
2,808,980 UART: [art] Extend RT PCRs Done
2,809,408 UART: [art] Lock RT PCRs Done
2,810,914 UART: [art] Populate DV Done
2,819,159 UART: [fht] FMC Alias Private Key: 7
2,820,243 UART: [art] Derive CDI
2,820,523 UART: [art] Store in in slot 0x4
2,906,168 UART: [art] Derive Key Pair
2,906,528 UART: [art] Store priv key in slot 0x5
2,919,882 UART: [art] Derive Key Pair - Done
2,934,599 UART: [art] Signing Cert with AUTHO
2,935,079 UART: RITY.KEYID = 7
2,950,289 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,054 UART: [art] PUB.X = 14040B34993E67729E2F7137C414EE881EB1D251B782962536B598C824FB87B16C6E35A3F39EC97255D953D172B111BC
2,957,810 UART: [art] PUB.Y = C6C036F2D55D87653091AD7D38A85B2B3C5384544E03C9E35AA07B8CE74F5588F26A5DDD7E2B1DA38B7855696EBF41D4
2,964,765 UART: [art] SIG.R = 4473CCB55B57D06A566A9DBBF1940428A5FEEAD8FFAB7CE5AA0F6AEC305388E582E0B7549C67890F49C412787EE235E0
2,971,540 UART: [art] SIG.S = E54EA04E58430EC35BFE175305591C65DD7FB345E3E4270309043939AEE7FA419E0973D7293CCE99BADD9ECBC1AD5E1B
2,995,291 UART: Caliptra RT
2,995,636 UART: [state] CFI Enabled
3,103,723 UART: [rt] RT listening for mailbox commands...
3,104,393 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,081,845 >>> mbox cmd response: success
5,081,845 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,095,443 UART:
5,095,459 UART: Running Caliptra FMC ...
5,095,867 UART:
5,096,010 UART: [state] CFI Enabled
5,184,897 UART: [art] Extend RT PCRs Done
5,185,325 UART: [art] Lock RT PCRs Done
5,186,924 UART: [art] Populate DV Done
5,195,443 UART: [fht] FMC Alias Private Key: 7
5,196,439 UART: [art] Derive CDI
5,196,719 UART: [art] Store in in slot 0x4
5,282,252 UART: [art] Derive Key Pair
5,282,612 UART: [art] Store priv key in slot 0x5
5,295,930 UART: [art] Derive Key Pair - Done
5,310,523 UART: [art] Signing Cert with AUTHO
5,311,003 UART: RITY.KEYID = 7
5,325,953 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,718 UART: [art] PUB.X = 9E8886CE5507CC86A0B47C542556CDC201F9286D506D1877168896A412327E43420CE5F09F70E630792A027E32B88D70
5,333,464 UART: [art] PUB.Y = 60ED2B8F5DE5B065A246B23B18B1F87B039A1A91104C1FE2989BDDE10FC39161AB6BB309114F5912D977C3BC5A9E98A6
5,340,415 UART: [art] SIG.R = C318F85C1845C787C56AC44E2748B8ABDC3E0BBAEF3985E28D4CCC710FD76E2135C2DB47E9B795AF1BBDD39310C652C7
5,347,197 UART: [art] SIG.S = 31CA932BAE600287C5859E589D4C8C94F592FE434B9F7A9AE4C38C921A293B4C17FAF546091CE9AF9E1EA74EDEE61D8D
5,370,682 UART: mbox::rt_entry...
5,371,054 UART: ____ _ _ _ ____ _____
5,371,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,372,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,373,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,374,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,374,942 UART: |_|
5,375,254 UART:
5,652,334 UART: [rt] Runtime listening for mailbox commands...
5,653,524 >>> mbox cmd response data (48 bytes)
5,653,525 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,653,633 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,724 UART: [state] LifecycleState = Unprovisioned
86,379 UART: [state] DebugLocked = No
87,011 UART: [state] WD Timer not started. Device not locked for debugging
88,286 UART: [kat] SHA2-256
891,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,965 UART: [kat] ++
896,117 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
905,052 UART: [kat] SHA2-512-ACC
906,953 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 ready_for_fw is high
1,174,229 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,273 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,074 UART: [ldev] ++
1,208,242 UART: [ldev] CDI.KEYID = 6
1,208,606 UART: [ldev] SUBJECT.KEYID = 5
1,209,033 UART: [ldev] AUTHORITY.KEYID = 7
1,209,496 UART: [ldev] FE.KEYID = 1
1,214,808 UART: [ldev] Erasing FE.KEYID = 1
1,241,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,612 UART: [ldev] --
1,280,122 UART: [fwproc] Wait for Commands...
1,280,895 UART: [fwproc] Recv command 0x46574c44
1,281,628 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,911 >>> mbox cmd response: success
2,774,158 UART: [afmc] ++
2,774,326 UART: [afmc] CDI.KEYID = 6
2,774,689 UART: [afmc] SUBJECT.KEYID = 7
2,775,115 UART: [afmc] AUTHORITY.KEYID = 5
2,809,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,624 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,837 UART: [afmc] --
2,852,863 UART: [cold-reset] --
2,853,541 UART: [state] Locking Datavault
2,854,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,464 UART: [state] Locking ICCM
2,856,122 UART: [exit] Launching FMC @ 0x40000130
2,861,451 UART:
2,861,467 UART: Running Caliptra FMC ...
2,861,875 UART:
2,861,929 UART: [state] CFI Enabled
2,872,012 UART: [fht] FMC Alias Private Key: 7
2,979,641 UART: [art] Extend RT PCRs Done
2,980,069 UART: [art] Lock RT PCRs Done
2,981,565 UART: [art] Populate DV Done
2,989,918 UART: [fht] FMC Alias Private Key: 7
2,990,950 UART: [art] Derive CDI
2,991,230 UART: [art] Store in in slot 0x4
3,076,843 UART: [art] Derive Key Pair
3,077,203 UART: [art] Store priv key in slot 0x5
3,090,055 UART: [art] Derive Key Pair - Done
3,105,216 UART: [art] Signing Cert with AUTHO
3,105,696 UART: RITY.KEYID = 7
3,120,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,755 UART: [art] PUB.X = B247402A4291613B4544A9AC58C94CA849A224C5878F21C41D45404935422D742AB329790B6F11294BA72E4270F6DFF1
3,128,512 UART: [art] PUB.Y = CEAD4F34A367FC5A57E513DF5164BEB06AF9BC3D886356C56734BA7588450271A1D2A8755FB0020A5357492EF29DD664
3,135,457 UART: [art] SIG.R = 1FB1CA9E4EED55EFE0D47214AC51833D92AE653F29C55BBDF364C8A4E12D823F6326DC76B338987397AF4D9436951E46
3,142,235 UART: [art] SIG.S = AB797692262F404329E736A6FB1BFC1D342832B78D7C5730D55567AFE1E1E080ACF126242D170D097C793A4A5670F8B2
3,165,924 UART: Caliptra RT
3,166,177 UART: [state] CFI Enabled
3,273,816 UART: [rt] RT listening for mailbox commands...
3,274,486 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,862 UART:
3,275,878 UART: Running Caliptra ROM ...
3,276,286 UART:
3,276,341 UART: [state] CFI Enabled
3,279,253 UART: [state] LifecycleState = Unprovisioned
3,279,908 UART: [state] DebugLocked = No
3,280,470 UART: [state] WD Timer not started. Device not locked for debugging
3,281,724 UART: [kat] SHA2-256
4,085,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,403 UART: [kat] ++
4,089,555 UART: [kat] sha1
4,093,659 UART: [kat] SHA2-256
4,095,599 UART: [kat] SHA2-384
4,098,150 UART: [kat] SHA2-512-ACC
4,100,050 UART: [kat] ECC-384
4,109,931 UART: [kat] HMAC-384Kdf
4,114,653 UART: [kat] LMS
4,362,965 UART: [kat] --
4,363,911 UART: [update-reset] ++
5,269,670 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,367,049 >>> mbox cmd response: success
5,367,049 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,367,222 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,236 UART: [update-reset Success] --
5,376,237 UART: [state] Locking Datavault
5,376,941 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,545 UART: [state] Locking ICCM
5,377,987 UART: [exit] Launching FMC @ 0x40000130
5,383,316 UART:
5,383,332 UART: Running Caliptra FMC ...
5,383,740 UART:
5,383,794 UART: [state] CFI Enabled
5,472,585 UART: [art] Extend RT PCRs Done
5,473,013 UART: [art] Lock RT PCRs Done
5,474,252 UART: [art] Populate DV Done
5,482,391 UART: [fht] FMC Alias Private Key: 7
5,483,395 UART: [art] Derive CDI
5,483,675 UART: [art] Store in in slot 0x4
5,569,182 UART: [art] Derive Key Pair
5,569,542 UART: [art] Store priv key in slot 0x5
5,582,734 UART: [art] Derive Key Pair - Done
5,597,198 UART: [art] Signing Cert with AUTHO
5,597,678 UART: RITY.KEYID = 7
5,612,772 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,537 UART: [art] PUB.X = 252CB443BFCB5BE5BDFD899D9C7486494FCE1897A698D02DCD0D3AAF96B20BEF246C965587E0B81150E1003F2B09BE1A
5,620,292 UART: [art] PUB.Y = 94C32B9DC8DB0FC3941FDD4BAF4A3D712504E6D49E1687C5BEEF979A8D680CB22952938F82C10D88D4F6D3054CD251A0
5,627,239 UART: [art] SIG.R = 797991084F0AFE704DFD96EF5B5BB26A7746CFDC5617C4922CF07C0C2A6A7FFC7E9D13B0DD700635E3EBDEFDD87D05E1
5,634,016 UART: [art] SIG.S = DAC3556C09A1BE257F236C594B9C6BB6C0938F3162EB35A8933C6A7B8DDBD7AD38F8C74115421F389CC507CA900A1219
5,657,762 UART: mbox::rt_entry...
5,658,134 UART: ____ _ _ _ ____ _____
5,658,918 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,659,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,660,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,661,254 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,662,022 UART: |_|
5,662,334 UART:
5,942,422 UART: [rt] Runtime listening for mailbox commands...
5,943,612 >>> mbox cmd response data (48 bytes)
5,943,613 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,943,721 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,054 ready_for_fw is high
1,056,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,791 >>> mbox cmd response: success
2,682,715 UART:
2,682,731 UART: Running Caliptra FMC ...
2,683,139 UART:
2,683,193 UART: [state] CFI Enabled
2,694,082 UART: [fht] FMC Alias Private Key: 7
2,802,275 UART: [art] Extend RT PCRs Done
2,802,703 UART: [art] Lock RT PCRs Done
2,804,033 UART: [art] Populate DV Done
2,812,144 UART: [fht] FMC Alias Private Key: 7
2,813,266 UART: [art] Derive CDI
2,813,546 UART: [art] Store in in slot 0x4
2,899,445 UART: [art] Derive Key Pair
2,899,805 UART: [art] Store priv key in slot 0x5
2,912,977 UART: [art] Derive Key Pair - Done
2,927,497 UART: [art] Signing Cert with AUTHO
2,927,977 UART: RITY.KEYID = 7
2,943,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,928 UART: [art] PUB.X = 49D6EF757089404DE90B74BBCFFB369E59334FBBEC4C8647D47A247FE29953CD60C27C3D3E375F576AEE3E422AC9284C
2,950,707 UART: [art] PUB.Y = 23F20428D143CB268572ECD28130BE7F019A11A9932DDAB2D3CE8DB0CE351EAA6676C2B8E6C321188DED6C77569C291B
2,957,661 UART: [art] SIG.R = 31D41B2D9C5017A146BCC994886787CA8049BFBB62FA2FAF8BFAB12A55ED5FA209C205AC40B0B208B1F5F4A8E5B4ED5D
2,964,444 UART: [art] SIG.S = 8CEF248A2BBCDFEE3D60FFEF2D74A765332AEB75E3E49AAE02427CB707357A9519C7EC07400327AF24A256E3B3F2737B
2,987,945 UART: Caliptra RT
2,988,198 UART: [state] CFI Enabled
3,095,669 UART: [rt] RT listening for mailbox commands...
3,096,339 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,069,521 >>> mbox cmd response: success
5,069,521 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,082,753 UART:
5,082,769 UART: Running Caliptra FMC ...
5,083,177 UART:
5,083,231 UART: [state] CFI Enabled
5,172,260 UART: [art] Extend RT PCRs Done
5,172,688 UART: [art] Lock RT PCRs Done
5,174,049 UART: [art] Populate DV Done
5,182,270 UART: [fht] FMC Alias Private Key: 7
5,183,360 UART: [art] Derive CDI
5,183,640 UART: [art] Store in in slot 0x4
5,269,257 UART: [art] Derive Key Pair
5,269,617 UART: [art] Store priv key in slot 0x5
5,282,857 UART: [art] Derive Key Pair - Done
5,297,541 UART: [art] Signing Cert with AUTHO
5,298,021 UART: RITY.KEYID = 7
5,313,599 UART: [art] Erasing AUTHORITY.KEYID = 7
5,314,364 UART: [art] PUB.X = B000219AD8334B096A64FEB6B7A68416A1484098A1573B62D90A54BB0C3F2F3A2E90A98C91B6DDEC9A3CE27474D3834B
5,321,109 UART: [art] PUB.Y = 63540611D6A22499BBBD33CA46EC2F3F778634F06C8C0D4C52AB311E75A053E29523899E5D5F38C8ACBBE283028545EC
5,328,054 UART: [art] SIG.R = A8FBCE7738F12BF6C79BD247C2A13242F957E047B241D4BE0F6740960D0E976E1F8523BD84D8E3EEFCED01984FFE821C
5,334,826 UART: [art] SIG.S = BEBE0623C81ED9C75929A3F48FE80E96151B0E2E25A99CAB1D41D93BD2C355D97F56745CB23D96863071730889FD3AFB
5,358,773 UART: mbox::rt_entry...
5,359,145 UART: ____ _ _ _ ____ _____
5,359,929 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,360,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,361,497 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,362,265 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,363,033 UART: |_|
5,363,345 UART:
5,644,428 UART: [rt] Runtime listening for mailbox commands...
5,645,618 >>> mbox cmd response data (48 bytes)
5,645,619 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,645,727 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,546 UART: [kat] SHA2-256
901,486 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,829 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,834 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,173,748 ready_for_fw is high
1,173,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,306 UART: [idev] Erasing UDS.KEYID = 0
1,198,104 UART: [idev] Sha1 KeyId Algorithm
1,206,998 UART: [idev] --
1,208,073 UART: [ldev] ++
1,208,241 UART: [ldev] CDI.KEYID = 6
1,208,605 UART: [ldev] SUBJECT.KEYID = 5
1,209,032 UART: [ldev] AUTHORITY.KEYID = 7
1,209,495 UART: [ldev] FE.KEYID = 1
1,214,851 UART: [ldev] Erasing FE.KEYID = 1
1,240,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,921 UART: [ldev] --
1,279,251 UART: [fwproc] Wait for Commands...
1,279,876 UART: [fwproc] Recv command 0x46574c44
1,280,609 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,780 >>> mbox cmd response: success
2,771,885 UART: [afmc] ++
2,772,053 UART: [afmc] CDI.KEYID = 6
2,772,416 UART: [afmc] SUBJECT.KEYID = 7
2,772,842 UART: [afmc] AUTHORITY.KEYID = 5
2,807,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,552 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,271 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,920 UART: [afmc] --
2,850,834 UART: [cold-reset] --
2,851,688 UART: [state] Locking Datavault
2,853,001 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,605 UART: [state] Locking ICCM
2,854,053 UART: [exit] Launching FMC @ 0x40000130
2,859,382 UART:
2,859,398 UART: Running Caliptra FMC ...
2,859,806 UART:
2,859,949 UART: [state] CFI Enabled
2,870,698 UART: [fht] FMC Alias Private Key: 7
2,978,505 UART: [art] Extend RT PCRs Done
2,978,933 UART: [art] Lock RT PCRs Done
2,980,379 UART: [art] Populate DV Done
2,988,678 UART: [fht] FMC Alias Private Key: 7
2,989,736 UART: [art] Derive CDI
2,990,016 UART: [art] Store in in slot 0x4
3,075,645 UART: [art] Derive Key Pair
3,076,005 UART: [art] Store priv key in slot 0x5
3,089,129 UART: [art] Derive Key Pair - Done
3,104,044 UART: [art] Signing Cert with AUTHO
3,104,524 UART: RITY.KEYID = 7
3,119,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,607 UART: [art] PUB.X = 28F64D7ED69FB030994EE59AAFBA6B06A7CB37987DAD385158E6DA684D821B7041309E1DCA32A9D504C72944CE3B5E18
3,127,381 UART: [art] PUB.Y = DD7C1B5EA7A841AA51F7FDE3FD1C87EF6B7BFC7DE9FBB8D20DDD22E31C8FA0166D18908FA544EFF434FB06C9DFE1C1C9
3,134,361 UART: [art] SIG.R = E132DE1F90FB4DA0623407EF76E57CC489456642D7B094B279C673C1803BE8633EEF6A76B58F5AFE5520CD15665EBBC9
3,141,136 UART: [art] SIG.S = 40D8275F0DF9101290A5BC592556F3D1D379D44A531C4E1092FB9B14BC2C19CD123B8368EFAA12ED5F4E0F2A38ED9345
3,164,531 UART: Caliptra RT
3,164,876 UART: [state] CFI Enabled
3,273,517 UART: [rt] RT listening for mailbox commands...
3,274,187 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,471 UART:
3,275,487 UART: Running Caliptra ROM ...
3,275,895 UART:
3,276,037 UART: [state] CFI Enabled
3,279,105 UART: [state] LifecycleState = Unprovisioned
3,279,760 UART: [state] DebugLocked = No
3,280,274 UART: [state] WD Timer not started. Device not locked for debugging
3,281,498 UART: [kat] SHA2-256
4,085,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,177 UART: [kat] ++
4,089,329 UART: [kat] sha1
4,093,519 UART: [kat] SHA2-256
4,095,459 UART: [kat] SHA2-384
4,098,020 UART: [kat] SHA2-512-ACC
4,099,920 UART: [kat] ECC-384
4,109,421 UART: [kat] HMAC-384Kdf
4,114,039 UART: [kat] LMS
4,362,351 UART: [kat] --
4,363,347 UART: [update-reset] ++
5,267,574 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,268,563 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,364,945 >>> mbox cmd response: success
5,364,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,365,122 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,136 UART: [update-reset Success] --
5,374,165 UART: [state] Locking Datavault
5,374,815 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,419 UART: [state] Locking ICCM
5,375,963 UART: [exit] Launching FMC @ 0x40000130
5,381,292 UART:
5,381,308 UART: Running Caliptra FMC ...
5,381,716 UART:
5,381,859 UART: [state] CFI Enabled
5,471,366 UART: [art] Extend RT PCRs Done
5,471,794 UART: [art] Lock RT PCRs Done
5,472,987 UART: [art] Populate DV Done
5,481,194 UART: [fht] FMC Alias Private Key: 7
5,482,270 UART: [art] Derive CDI
5,482,550 UART: [art] Store in in slot 0x4
5,568,227 UART: [art] Derive Key Pair
5,568,587 UART: [art] Store priv key in slot 0x5
5,581,303 UART: [art] Derive Key Pair - Done
5,595,981 UART: [art] Signing Cert with AUTHO
5,596,461 UART: RITY.KEYID = 7
5,611,677 UART: [art] Erasing AUTHORITY.KEYID = 7
5,612,442 UART: [art] PUB.X = 43FD80A14AD695B826546D58ACC8E31FC3D64A0B0E3A90CAFF8A94CBE02C232438D88CBE9A7F2A38DF48FF2C83BFA96E
5,619,230 UART: [art] PUB.Y = 44106137386B664FB82B53709DC2417A3C5843438C89FBE36B2E2BCDA00D3866EEFCDFAE359C104A3847A72154750C0D
5,626,173 UART: [art] SIG.R = FDAD314B3CBF1D58FDEC59284769F4C05D490B44A71E528A9D2F38B818D2040D134514D560143E314BC289BB806DAB39
5,632,940 UART: [art] SIG.S = C2954A7318A85A2098D227C1A2482459D912B61FC8345AD3B6DA71F419A6E5625E634555C924EA95E651523A9D7CCC7E
5,656,415 UART: mbox::rt_entry...
5,656,787 UART: ____ _ _ _ ____ _____
5,657,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,658,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,659,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,659,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,660,675 UART: |_|
5,660,987 UART:
5,943,170 UART: [rt] Runtime listening for mailbox commands...
5,944,360 >>> mbox cmd response data (48 bytes)
5,944,361 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,944,469 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,041 ready_for_fw is high
1,057,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,850 >>> mbox cmd response: success
2,684,370 UART:
2,684,386 UART: Running Caliptra FMC ...
2,684,794 UART:
2,684,937 UART: [state] CFI Enabled
2,695,196 UART: [fht] FMC Alias Private Key: 7
2,803,337 UART: [art] Extend RT PCRs Done
2,803,765 UART: [art] Lock RT PCRs Done
2,805,831 UART: [art] Populate DV Done
2,814,130 UART: [fht] FMC Alias Private Key: 7
2,815,152 UART: [art] Derive CDI
2,815,432 UART: [art] Store in in slot 0x4
2,900,975 UART: [art] Derive Key Pair
2,901,335 UART: [art] Store priv key in slot 0x5
2,915,233 UART: [art] Derive Key Pair - Done
2,929,958 UART: [art] Signing Cert with AUTHO
2,930,438 UART: RITY.KEYID = 7
2,945,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,469 UART: [art] PUB.X = 777618DDA568A504F5A1ECA61215FFE0E3CC9628897AC2B957C9A8B99F6799473DD5B35B08FF8A5586FC5458D440DE65
2,953,239 UART: [art] PUB.Y = 50DB459709E9C6E5DA32B561580F3E7D2B57BA7CFB2D76140BB75D81C6B679A10D46AB04A6D96DB5DDEF08141914C23C
2,960,183 UART: [art] SIG.R = FB8B40A3D556A76A1BCDB94BADAA846A76A8E042C67058242334491516262DED7107FF58D4241ED308389D36193D61F1
2,966,947 UART: [art] SIG.S = FC2768A6B28D00E4C0DD7041BB31A685AB3D0AD3BC6FBB350A5A6CFA37898DB0D522E06787E732CD9A840B2B37E8C6D1
2,990,263 UART: Caliptra RT
2,990,608 UART: [state] CFI Enabled
3,098,448 UART: [rt] RT listening for mailbox commands...
3,099,118 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,072,259 >>> mbox cmd response: success
5,072,259 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,349 UART:
5,085,365 UART: Running Caliptra FMC ...
5,085,773 UART:
5,085,916 UART: [state] CFI Enabled
5,174,807 UART: [art] Extend RT PCRs Done
5,175,235 UART: [art] Lock RT PCRs Done
5,176,560 UART: [art] Populate DV Done
5,184,853 UART: [fht] FMC Alias Private Key: 7
5,185,791 UART: [art] Derive CDI
5,186,071 UART: [art] Store in in slot 0x4
5,272,084 UART: [art] Derive Key Pair
5,272,444 UART: [art] Store priv key in slot 0x5
5,286,022 UART: [art] Derive Key Pair - Done
5,300,698 UART: [art] Signing Cert with AUTHO
5,301,178 UART: RITY.KEYID = 7
5,315,952 UART: [art] Erasing AUTHORITY.KEYID = 7
5,316,717 UART: [art] PUB.X = 039D3D56428AE26D29FA059FD99A7D852DC7B85146CC5BD01CE16840AE0B684BED6D9A34C56E65526C1B73DDADBE5FA1
5,323,496 UART: [art] PUB.Y = 0803900FFF194AC3DED3038D0CAAAAFAF1411C9B362B519DCE3F3B6D76211A84771254BA19C3F3AA384AC2CAFF1017C4
5,330,449 UART: [art] SIG.R = 5A1F2B227546EAC89BD98C6218759B887243504CE7297814CCB1836A67D5D3283A9BC264793EBAD6668A22EA0B810E11
5,337,211 UART: [art] SIG.S = AB53F38BDDADCB674C4608D782261C4A3FFF46C5DE501C552337CB4E904D5D84AFBA1700E09F50B8DA868739115E624F
5,361,511 UART: mbox::rt_entry...
5,361,883 UART: ____ _ _ _ ____ _____
5,362,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,467 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,364,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,365,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,365,771 UART: |_|
5,366,083 UART:
5,647,463 UART: [rt] Runtime listening for mailbox commands...
5,648,653 >>> mbox cmd response data (48 bytes)
5,648,654 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,648,762 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,017 UART: [cold-reset] ++
1,476,353 UART: [fht] Storing FHT @ 0x50003400
1,479,180 UART: [idev] ++
1,479,348 UART: [idev] CDI.KEYID = 6
1,479,708 UART: [idev] SUBJECT.KEYID = 7
1,480,132 UART: [idev] UDS.KEYID = 0
1,480,477 ready_for_fw is high
1,480,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,354 UART: [idev] Erasing UDS.KEYID = 0
1,505,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,515,079 UART: [ldev] ++
1,515,247 UART: [ldev] CDI.KEYID = 6
1,515,610 UART: [ldev] SUBJECT.KEYID = 5
1,516,036 UART: [ldev] AUTHORITY.KEYID = 7
1,516,499 UART: [ldev] FE.KEYID = 1
1,521,317 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,428 UART: [ldev] --
1,585,759 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 114332 bytes
2,884,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,248 >>> mbox cmd response: success
3,077,430 UART: [afmc] ++
3,077,598 UART: [afmc] CDI.KEYID = 6
3,077,960 UART: [afmc] SUBJECT.KEYID = 7
3,078,385 UART: [afmc] AUTHORITY.KEYID = 5
3,114,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,761 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,451 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,196 UART: [afmc] --
3,157,138 UART: [cold-reset] --
3,158,190 UART: [state] Locking Datavault
3,159,127 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,731 UART: [state] Locking ICCM
3,160,273 UART: [exit] Launching FMC @ 0x40000130
3,165,602 UART:
3,165,618 UART: Running Caliptra FMC ...
3,166,026 UART:
3,166,080 UART: [state] CFI Enabled
3,176,561 UART: [fht] FMC Alias Private Key: 7
3,283,890 UART: [art] Extend RT PCRs Done
3,284,318 UART: [art] Lock RT PCRs Done
3,286,070 UART: [art] Populate DV Done
3,294,453 UART: [fht] FMC Alias Private Key: 7
3,295,569 UART: [art] Derive CDI
3,295,849 UART: [art] Store in in slot 0x4
3,381,524 UART: [art] Derive Key Pair
3,381,884 UART: [art] Store priv key in slot 0x5
3,395,184 UART: [art] Derive Key Pair - Done
3,409,660 UART: [art] Signing Cert with AUTHO
3,410,140 UART: RITY.KEYID = 7
3,425,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,505 UART: [art] PUB.X = DD64B5E80892A9FD2FF81018F5A75854FD7E996215E23EC34DD22887B262EFC072E466507C2FFAAEC741E307F7354254
3,433,273 UART: [art] PUB.Y = 1C6516FF5E531DB6AF1EC66A292C908B1EA9FCAB19CADE170E0AFD37249FBC98B36DF733EACDB314EF402D90ABB7EDED
3,440,251 UART: [art] SIG.R = A3DBD3EFFE58C8F6DD45F25BB6444CECA85D2C59AFC4DD77C87CC3415A427FB7BE812EA5E929CA2C93426E7B2F9ECE7B
3,447,053 UART: [art] SIG.S = DEFA27BE8AA72549D8FE908150D08E03B7AF4D7F54D3B9255D35BEE41D93F7B0FE07A69B60CAFECF3527FC992BD4D02E
3,470,684 UART: Caliptra RT
3,470,937 UART: [state] CFI Enabled
3,579,713 UART: [rt] RT listening for mailbox commands...
3,580,383 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,199 UART: [rt]cmd =0x54514754, len=24
3,612,140 >>> mbox cmd response data (8 bytes)
3,612,141 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,893 UART:
3,612,909 UART: Running Caliptra ROM ...
3,613,317 UART:
3,613,371 UART: [state] CFI Enabled
3,616,183 UART: [state] LifecycleState = Unprovisioned
3,616,838 UART: [state] DebugLocked = No
3,617,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,127 UART: [kat] SHA2-256
4,413,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,173 UART: [kat] ++
4,417,325 UART: [kat] sha1
4,421,513 UART: [kat] SHA2-256
4,423,451 UART: [kat] SHA2-384
4,426,166 UART: [kat] SHA2-512-ACC
4,428,066 UART: [kat] ECC-384
4,433,417 UART: [kat] HMAC-384Kdf
4,438,073 UART: [kat] LMS
5,006,269 UART: [kat] --
5,007,338 UART: [update-reset] ++
5,934,804 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,866 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,032,300 >>> mbox cmd response: success
6,032,300 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,032,481 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,495 UART: [update-reset Success] --
6,041,622 UART: [state] Locking Datavault
6,042,402 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,006 UART: [state] Locking ICCM
6,043,556 UART: [exit] Launching FMC @ 0x40000130
6,048,885 UART:
6,048,901 UART: Running Caliptra FMC ...
6,049,309 UART:
6,049,363 UART: [state] CFI Enabled
6,138,548 UART: [art] Extend RT PCRs Done
6,138,976 UART: [art] Lock RT PCRs Done
6,140,149 UART: [art] Populate DV Done
6,148,342 UART: [fht] FMC Alias Private Key: 7
6,149,328 UART: [art] Derive CDI
6,149,608 UART: [art] Store in in slot 0x4
6,235,637 UART: [art] Derive Key Pair
6,235,997 UART: [art] Store priv key in slot 0x5
6,248,775 UART: [art] Derive Key Pair - Done
6,263,282 UART: [art] Signing Cert with AUTHO
6,263,762 UART: RITY.KEYID = 7
6,279,202 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,967 UART: [art] PUB.X = 7D8BC3980AA1790037A2B0E7C5ECD978FE6E6CE088CE5CFC6C764853049B956B66AAE7D20F8AE14ADDA462202076AEAB
6,286,724 UART: [art] PUB.Y = 3F139B1D30CF097BF129CA18A008965102DDB151065977A089DF870C886CFD2F653B98BE35818DE78A8815F6D4F3EE1C
6,293,663 UART: [art] SIG.R = BCCDE0AD22B75765C8223FDBAD3CB3E3C7D22295ABB2D4F1A296996F79C4DA0231B0F50DD74A192A06B0290A4C32C477
6,300,437 UART: [art] SIG.S = 40BBC58C57E7213E052677790E5C1500C727EABDE308377FCAA231D85563F17F364784F117AB643DAD3F2813AF825F6A
6,324,135 UART: mbox::rt_entry...
6,324,507 UART: ____ _ _ _ ____ _____
6,325,291 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,326,091 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,326,859 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,327,627 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,328,395 UART: |_|
6,328,707 UART:
6,614,671 UART: [rt] Runtime listening for mailbox commands...
6,615,908 >>> mbox cmd response data (120 bytes)
6,615,909 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,616,023 UART:
6,616,039 UART: Running Caliptra ROM ...
6,616,447 UART:
6,616,501 UART: [state] CFI Enabled
6,619,223 UART: [state] LifecycleState = Unprovisioned
6,619,878 UART: [state] DebugLocked = No
6,620,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,622,021 UART: [kat] SHA2-256
7,415,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,420,067 UART: [kat] ++
7,420,219 UART: [kat] sha1
7,424,391 UART: [kat] SHA2-256
7,426,329 UART: [kat] SHA2-384
7,429,064 UART: [kat] SHA2-512-ACC
7,430,964 UART: [kat] ECC-384
7,436,473 UART: [kat] HMAC-384Kdf
7,441,231 UART: [kat] LMS
8,009,427 UART: [kat] --
8,009,980 UART: [update-reset] ++
8,937,792 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,938,946 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,035,380 >>> mbox cmd response: success
9,035,380 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,035,723 UART: [update-reset] Copying MAN_2 To MAN_1
9,043,737 UART: [update-reset Success] --
9,044,640 UART: [state] Locking Datavault
9,045,344 UART: [state] Locking PCR0, PCR1 and PCR31
9,045,948 UART: [state] Locking ICCM
9,046,424 UART: [exit] Launching FMC @ 0x40000130
9,051,753 UART:
9,051,769 UART: Running Caliptra FMC ...
9,052,177 UART:
9,052,231 UART: [state] CFI Enabled
9,141,072 UART: [art] Extend RT PCRs Done
9,141,500 UART: [art] Lock RT PCRs Done
9,142,749 UART: [art] Populate DV Done
9,150,986 UART: [fht] FMC Alias Private Key: 7
9,152,114 UART: [art] Derive CDI
9,152,394 UART: [art] Store in in slot 0x4
9,237,643 UART: [art] Derive Key Pair
9,238,003 UART: [art] Store priv key in slot 0x5
9,251,039 UART: [art] Derive Key Pair - Done
9,265,743 UART: [art] Signing Cert with AUTHO
9,266,223 UART: RITY.KEYID = 7
9,281,047 UART: [art] Erasing AUTHORITY.KEYID = 7
9,281,812 UART: [art] PUB.X = 33835CC3F1EADFAA43D87F47142366F1605666F6FD583D266B2E58B48E0C6BF8C16B713B329EA6859C5AB9782524F0E5
9,288,583 UART: [art] PUB.Y = B9645F57808A603DF56558549D9A058E7DD29970AA5F0872EA9F199406C6BA665D0C6303A2815F9B7228A6372943F737
9,295,508 UART: [art] SIG.R = 9A13FFFC7A108F259DB38FA1029CC67C154DE0AFCFAD63D132E0F670DE0F1AD83A004C6AC3B34A71E72757E579E29339
9,302,266 UART: [art] SIG.S = B691686B842EF83E4639CD45FB1197CF1B27C3AAE1ED4365A41FC373E8DE5867760DA938CDB17043EAE10D3409193F53
9,325,980 UART: mbox::rt_entry...
9,326,352 UART: ____ _ _ _ ____ _____
9,327,136 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,327,936 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,328,704 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,329,472 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,330,240 UART: |_|
9,330,552 UART:
9,610,443 UART: [rt] Runtime listening for mailbox commands...
9,611,680 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,731 ready_for_fw is high
1,362,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,424 >>> mbox cmd response: success
2,989,130 UART:
2,989,146 UART: Running Caliptra FMC ...
2,989,554 UART:
2,989,608 UART: [state] CFI Enabled
3,000,385 UART: [fht] FMC Alias Private Key: 7
3,108,868 UART: [art] Extend RT PCRs Done
3,109,296 UART: [art] Lock RT PCRs Done
3,110,586 UART: [art] Populate DV Done
3,118,911 UART: [fht] FMC Alias Private Key: 7
3,119,905 UART: [art] Derive CDI
3,120,185 UART: [art] Store in in slot 0x4
3,206,076 UART: [art] Derive Key Pair
3,206,436 UART: [art] Store priv key in slot 0x5
3,219,232 UART: [art] Derive Key Pair - Done
3,234,039 UART: [art] Signing Cert with AUTHO
3,234,519 UART: RITY.KEYID = 7
3,249,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,008 UART: [art] PUB.X = DAE68BEDA199E997C27D75AD2B0EB31BFC3C77189A4D762B6E59B656FF501D6064A43A59AB46DDD9E1F8D360DF14D519
3,256,793 UART: [art] PUB.Y = 5B33D6D6C9747037E5154BC2024E9FEF57478BA7B0818648BF59AE6AA91A227DC43845868661EA0DD691E30BDBA6CC82
3,263,740 UART: [art] SIG.R = B2EB929769242D9A7E47F8CF46C418057C34DD819BE65A3AC48B992C82BF0C8859FE97EF7E41F070CF5386231A2B4A55
3,270,510 UART: [art] SIG.S = D9F37D9AC299B145C7FF4140600BC60F102AC9085FADB7362E73B53915086DD798B1D33AA537E02EA04E74BA003C30A5
3,294,953 UART: Caliptra RT
3,295,206 UART: [state] CFI Enabled
3,403,352 UART: [rt] RT listening for mailbox commands...
3,404,022 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,850 UART: [rt]cmd =0x54514754, len=24
3,435,755 >>> mbox cmd response data (8 bytes)
3,435,756 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,565 >>> mbox cmd response: success
5,736,565 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,749,680 UART:
5,749,696 UART: Running Caliptra FMC ...
5,750,104 UART:
5,750,158 UART: [state] CFI Enabled
5,839,069 UART: [art] Extend RT PCRs Done
5,839,497 UART: [art] Lock RT PCRs Done
5,840,902 UART: [art] Populate DV Done
5,848,931 UART: [fht] FMC Alias Private Key: 7
5,849,887 UART: [art] Derive CDI
5,850,167 UART: [art] Store in in slot 0x4
5,935,862 UART: [art] Derive Key Pair
5,936,222 UART: [art] Store priv key in slot 0x5
5,949,866 UART: [art] Derive Key Pair - Done
5,964,888 UART: [art] Signing Cert with AUTHO
5,965,368 UART: RITY.KEYID = 7
5,980,548 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,313 UART: [art] PUB.X = 1352EE449698BD36E46487CFA9CDF0028C3CA80E75B65D968825B2897ACCC446C4D2D3F68C51494B9650E0873DFC347E
5,988,081 UART: [art] PUB.Y = C68068FEDC905DC044DF403D716FA6573C70920C1C54DE2F2C27B6BF4CDA800CD30150F576B0BA4F263F1CFB03776D6B
5,995,033 UART: [art] SIG.R = A4005993D9E2DFCBAF89D7F9E50A02C50380F3BC67D74672D3363FD3FC6FAC2119A7A7438942090DBAEE44DFB943F8E8
6,001,780 UART: [art] SIG.S = 36C222AE75A179B6B8302C40A2F782CFB4395446F69212A946115DE47294C1FD02982D45CA8EA45F2B14424B8FF68F9D
6,025,236 UART: mbox::rt_entry...
6,025,608 UART: ____ _ _ _ ____ _____
6,026,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,027,192 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,027,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,028,728 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,029,496 UART: |_|
6,029,808 UART:
6,313,784 UART: [rt] Runtime listening for mailbox commands...
6,315,021 >>> mbox cmd response data (120 bytes)
6,315,022 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,615,263 >>> mbox cmd response: success
8,615,263 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,628,580 UART:
8,628,596 UART: Running Caliptra FMC ...
8,629,004 UART:
8,629,058 UART: [state] CFI Enabled
8,718,257 UART: [art] Extend RT PCRs Done
8,718,685 UART: [art] Lock RT PCRs Done
8,719,884 UART: [art] Populate DV Done
8,728,151 UART: [fht] FMC Alias Private Key: 7
8,729,183 UART: [art] Derive CDI
8,729,463 UART: [art] Store in in slot 0x4
8,815,130 UART: [art] Derive Key Pair
8,815,490 UART: [art] Store priv key in slot 0x5
8,828,772 UART: [art] Derive Key Pair - Done
8,843,465 UART: [art] Signing Cert with AUTHO
8,843,945 UART: RITY.KEYID = 7
8,859,343 UART: [art] Erasing AUTHORITY.KEYID = 7
8,860,108 UART: [art] PUB.X = 94857EA5A7ADFF909B2DE68CE514A3A52FE4E89616316EAD4135898E3089FEDFE8D3D12B4C87BB4E97451F2227049BBD
8,866,887 UART: [art] PUB.Y = BA5414F867E160A05ACB724D13B534EC24AFF1E1D069743C3A933494EF63CD94CD38101F8EF356ABB54AD8CD79733E43
8,873,847 UART: [art] SIG.R = 0B5EC9C0C20A5F134C668ACDECA4510D53756C2E2A3DA6440E9E2CEE99FEFFDDB2056A6D577AE0CAAA3E97593853EB94
8,880,626 UART: [art] SIG.S = 355B4843A7DCB4C37EBCFFDA48C45103FEBC950E01682E84CB415E529F42351774BBDF246C7A09DA2665BF01CDB95617
8,903,770 UART: mbox::rt_entry...
8,904,142 UART: ____ _ _ _ ____ _____
8,904,926 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,906,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,907,262 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,908,030 UART: |_|
8,908,342 UART:
9,192,679 UART: [rt] Runtime listening for mailbox commands...
9,193,916 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,294 UART: [kat] SHA2-256
882,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,340 UART: [kat] ++
886,492 UART: [kat] sha1
890,920 UART: [kat] SHA2-256
892,858 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,243 UART: [kat] HMAC-384Kdf
907,967 UART: [kat] LMS
1,476,163 UART: [kat] --
1,477,156 UART: [cold-reset] ++
1,477,548 UART: [fht] Storing FHT @ 0x50003400
1,480,401 UART: [idev] ++
1,480,569 UART: [idev] CDI.KEYID = 6
1,480,929 UART: [idev] SUBJECT.KEYID = 7
1,481,353 UART: [idev] UDS.KEYID = 0
1,481,698 ready_for_fw is high
1,481,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,697 UART: [idev] Erasing UDS.KEYID = 0
1,506,109 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,773 UART: [idev] --
1,515,870 UART: [ldev] ++
1,516,038 UART: [ldev] CDI.KEYID = 6
1,516,401 UART: [ldev] SUBJECT.KEYID = 5
1,516,827 UART: [ldev] AUTHORITY.KEYID = 7
1,517,290 UART: [ldev] FE.KEYID = 1
1,522,550 UART: [ldev] Erasing FE.KEYID = 1
1,547,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,127 UART: [ldev] --
1,587,516 UART: [fwproc] Waiting for Commands...
1,588,297 UART: [fwproc] Received command 0x46574c44
1,589,088 UART: [fwproc] Received Image of size 114332 bytes
2,886,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,921 >>> mbox cmd response: success
3,080,097 UART: [afmc] ++
3,080,265 UART: [afmc] CDI.KEYID = 6
3,080,627 UART: [afmc] SUBJECT.KEYID = 7
3,081,052 UART: [afmc] AUTHORITY.KEYID = 5
3,116,345 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,308 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,998 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,925 UART: [afmc] --
3,159,905 UART: [cold-reset] --
3,160,631 UART: [state] Locking Datavault
3,161,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,366 UART: [state] Locking ICCM
3,162,864 UART: [exit] Launching FMC @ 0x40000130
3,168,193 UART:
3,168,209 UART: Running Caliptra FMC ...
3,168,617 UART:
3,168,760 UART: [state] CFI Enabled
3,179,139 UART: [fht] FMC Alias Private Key: 7
3,287,032 UART: [art] Extend RT PCRs Done
3,287,460 UART: [art] Lock RT PCRs Done
3,288,696 UART: [art] Populate DV Done
3,296,997 UART: [fht] FMC Alias Private Key: 7
3,298,063 UART: [art] Derive CDI
3,298,343 UART: [art] Store in in slot 0x4
3,384,356 UART: [art] Derive Key Pair
3,384,716 UART: [art] Store priv key in slot 0x5
3,397,190 UART: [art] Derive Key Pair - Done
3,412,293 UART: [art] Signing Cert with AUTHO
3,412,773 UART: RITY.KEYID = 7
3,428,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,876 UART: [art] PUB.X = AE9F64BEBD9A14FC0146536553112E46DFE86DD2702A6C352D09A7791478308CC55E0399695D4A782222B0B4E8DD02F8
3,435,634 UART: [art] PUB.Y = A5C820933142C84D0F800BCB963AA039F2FC95D1DBE43A1E1FC39D554B656035D46BBBC57672907D828B1F98A40ED9C8
3,442,583 UART: [art] SIG.R = 69D7EB64FB07AD454A0418F45799BA8EE820AFAD58B1BF09FED2E3DCC9A257C470C31F8E1E3740F4700F29D782E1C07B
3,449,357 UART: [art] SIG.S = B08E5890A3736F32BDA2347BC423743CDBF7DB8148C0041B9ED87A9B26548A678D177DC0490580F956D5547EF430B27E
3,472,536 UART: Caliptra RT
3,472,881 UART: [state] CFI Enabled
3,582,416 UART: [rt] RT listening for mailbox commands...
3,583,086 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,832 UART: [rt]cmd =0x54514754, len=24
3,614,989 >>> mbox cmd response data (8 bytes)
3,614,990 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,660 UART:
3,615,676 UART: Running Caliptra ROM ...
3,616,084 UART:
3,616,225 UART: [state] CFI Enabled
3,618,569 UART: [state] LifecycleState = Unprovisioned
3,619,224 UART: [state] DebugLocked = No
3,619,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,551 UART: [kat] SHA2-256
4,415,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,597 UART: [kat] ++
4,419,749 UART: [kat] sha1
4,424,101 UART: [kat] SHA2-256
4,426,039 UART: [kat] SHA2-384
4,428,734 UART: [kat] SHA2-512-ACC
4,430,634 UART: [kat] ECC-384
4,436,117 UART: [kat] HMAC-384Kdf
4,440,671 UART: [kat] LMS
5,008,867 UART: [kat] --
5,009,904 UART: [update-reset] ++
5,935,964 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,937,126 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,033,560 >>> mbox cmd response: success
6,033,560 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,033,873 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,887 UART: [update-reset Success] --
6,042,780 UART: [state] Locking Datavault
6,043,634 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,238 UART: [state] Locking ICCM
6,044,744 UART: [exit] Launching FMC @ 0x40000130
6,050,073 UART:
6,050,089 UART: Running Caliptra FMC ...
6,050,497 UART:
6,050,640 UART: [state] CFI Enabled
6,139,843 UART: [art] Extend RT PCRs Done
6,140,271 UART: [art] Lock RT PCRs Done
6,141,668 UART: [art] Populate DV Done
6,149,791 UART: [fht] FMC Alias Private Key: 7
6,150,929 UART: [art] Derive CDI
6,151,209 UART: [art] Store in in slot 0x4
6,236,986 UART: [art] Derive Key Pair
6,237,346 UART: [art] Store priv key in slot 0x5
6,250,758 UART: [art] Derive Key Pair - Done
6,265,693 UART: [art] Signing Cert with AUTHO
6,266,173 UART: RITY.KEYID = 7
6,281,019 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,784 UART: [art] PUB.X = C18483656ABD58035ADEE1FA624077A43D2D79D486433714C81D6BB0DEF74D89CBA0D9D0BA7D6AB579C9F677C443297B
6,288,561 UART: [art] PUB.Y = F76FC62E257312AAD7031A1510464961C63DF575DBF0A96B993C4C0424CB70CDB114A5550EC09AD97E80E129DCE5C1D9
6,295,510 UART: [art] SIG.R = 2F5510EF69F2C3A93250F5F505B60EC5916D1BA093B06C7171D304BE8B19C808D3D41CF00C13F8D2754ED9ED9725E597
6,302,269 UART: [art] SIG.S = C5B40ABA5B674A0F4CCFFD00504F4A5E5242DD4D75D300FD1E0CB43962EBE3EDBB386E6DDDF2ECFC6BD6D17E9DF8C89F
6,326,455 UART: mbox::rt_entry...
6,326,827 UART: ____ _ _ _ ____ _____
6,327,611 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,411 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,179 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,947 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,715 UART: |_|
6,331,027 UART:
6,614,103 UART: [rt] Runtime listening for mailbox commands...
6,615,340 >>> mbox cmd response data (120 bytes)
6,615,341 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,615,455 UART:
6,615,471 UART: Running Caliptra ROM ...
6,615,879 UART:
6,616,020 UART: [state] CFI Enabled
6,618,974 UART: [state] LifecycleState = Unprovisioned
6,619,629 UART: [state] DebugLocked = No
6,620,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,621,854 UART: [kat] SHA2-256
7,415,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,419,900 UART: [kat] ++
7,420,052 UART: [kat] sha1
7,424,324 UART: [kat] SHA2-256
7,426,262 UART: [kat] SHA2-384
7,429,037 UART: [kat] SHA2-512-ACC
7,430,937 UART: [kat] ECC-384
7,436,556 UART: [kat] HMAC-384Kdf
7,441,300 UART: [kat] LMS
8,009,496 UART: [kat] --
8,010,233 UART: [update-reset] ++
8,937,509 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,938,695 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,035,129 >>> mbox cmd response: success
9,035,129 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,035,328 UART: [update-reset] Copying MAN_2 To MAN_1
9,043,342 UART: [update-reset Success] --
9,044,457 UART: [state] Locking Datavault
9,045,253 UART: [state] Locking PCR0, PCR1 and PCR31
9,045,857 UART: [state] Locking ICCM
9,046,471 UART: [exit] Launching FMC @ 0x40000130
9,051,800 UART:
9,051,816 UART: Running Caliptra FMC ...
9,052,224 UART:
9,052,367 UART: [state] CFI Enabled
9,141,606 UART: [art] Extend RT PCRs Done
9,142,034 UART: [art] Lock RT PCRs Done
9,143,445 UART: [art] Populate DV Done
9,151,968 UART: [fht] FMC Alias Private Key: 7
9,153,034 UART: [art] Derive CDI
9,153,314 UART: [art] Store in in slot 0x4
9,239,275 UART: [art] Derive Key Pair
9,239,635 UART: [art] Store priv key in slot 0x5
9,252,749 UART: [art] Derive Key Pair - Done
9,267,805 UART: [art] Signing Cert with AUTHO
9,268,285 UART: RITY.KEYID = 7
9,283,387 UART: [art] Erasing AUTHORITY.KEYID = 7
9,284,152 UART: [art] PUB.X = 6C0EC8291B1C0CD124DBB0212AF5F9D1ECE3319CF33FAD7A8AB1F1A923183C3816A363662D124DE6BBF5F9AF3B09FC36
9,290,933 UART: [art] PUB.Y = ACCCAC0CB9891E77092EA35A38441DE389B0E9843A7B076CF7B888DCAC60795C04F9377E3DC68B911A8B063EE5FCB3F3
9,297,884 UART: [art] SIG.R = C6D6B1ED0E0E423882E6F6B6BE312C31C534B387A91E29BDD32303EFDBD9ECBCEFF53C8A118CD56BEAF9DCDDA68970A1
9,304,675 UART: [art] SIG.S = 205BC65C28C74B415767F25B6108BADC25929C16ADC4D47275843FB3DB4CB5A57E805536ADA04489C9C05E36FFC2E102
9,328,214 UART: mbox::rt_entry...
9,328,586 UART: ____ _ _ _ ____ _____
9,329,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,330,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,330,938 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,331,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,332,474 UART: |_|
9,332,786 UART:
9,614,058 UART: [rt] Runtime listening for mailbox commands...
9,615,295 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,626 ready_for_fw is high
1,362,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,835 >>> mbox cmd response: success
2,990,361 UART:
2,990,377 UART: Running Caliptra FMC ...
2,990,785 UART:
2,990,928 UART: [state] CFI Enabled
3,001,435 UART: [fht] FMC Alias Private Key: 7
3,108,890 UART: [art] Extend RT PCRs Done
3,109,318 UART: [art] Lock RT PCRs Done
3,110,532 UART: [art] Populate DV Done
3,118,773 UART: [fht] FMC Alias Private Key: 7
3,119,739 UART: [art] Derive CDI
3,120,019 UART: [art] Store in in slot 0x4
3,205,712 UART: [art] Derive Key Pair
3,206,072 UART: [art] Store priv key in slot 0x5
3,219,606 UART: [art] Derive Key Pair - Done
3,234,192 UART: [art] Signing Cert with AUTHO
3,234,672 UART: RITY.KEYID = 7
3,249,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,445 UART: [art] PUB.X = 2B9B110218D41516ECDBB9284D2ADAE4E174AD2A530BCCE5B49CB6E535D240DEA382B9391F49E77516DB720FF3207BFF
3,257,222 UART: [art] PUB.Y = ECECCAECF155EAE07D537069DF2566ECA8CA73DCA2FC9BFE0970EA197E2EA35A769C4618B5949687EB8BAC1F90308934
3,264,191 UART: [art] SIG.R = AF7AB28D3DE4F97070A6A890CD4CDD461546D094AA5DCE04C48C01312FA6DEAFBA2F0A2A8E741670161CC6606501958A
3,270,963 UART: [art] SIG.S = 74D455B7BBAEC0D09CE84ED06E558CC08A645598C01A69545660498993E623A7B19F9CD6DCC9B5F988AC11D38ACD8D5E
3,295,068 UART: Caliptra RT
3,295,413 UART: [state] CFI Enabled
3,403,826 UART: [rt] RT listening for mailbox commands...
3,404,496 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,560 UART: [rt]cmd =0x54514754, len=24
3,436,917 >>> mbox cmd response data (8 bytes)
3,436,918 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,737,656 >>> mbox cmd response: success
5,737,656 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,751,089 UART:
5,751,105 UART: Running Caliptra FMC ...
5,751,513 UART:
5,751,656 UART: [state] CFI Enabled
5,840,949 UART: [art] Extend RT PCRs Done
5,841,377 UART: [art] Lock RT PCRs Done
5,842,722 UART: [art] Populate DV Done
5,851,235 UART: [fht] FMC Alias Private Key: 7
5,852,265 UART: [art] Derive CDI
5,852,545 UART: [art] Store in in slot 0x4
5,938,638 UART: [art] Derive Key Pair
5,938,998 UART: [art] Store priv key in slot 0x5
5,952,518 UART: [art] Derive Key Pair - Done
5,967,685 UART: [art] Signing Cert with AUTHO
5,968,165 UART: RITY.KEYID = 7
5,983,193 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,958 UART: [art] PUB.X = AEA281E90A292B7D79EBC2F09C59DED770E0D0371D48ABD4663A559CE75E8557D23BC28FCF9674E71F78BDA0AE24A3F5
5,990,743 UART: [art] PUB.Y = C8F0FA6A75D7166C9F09103E071CCCDE39478C8E7F166A9274283E97AE5B2C855DDD7F901027496DB77E1F73F09F20D4
5,997,693 UART: [art] SIG.R = 90BF6324E866D1FFB0E3152701C84D2C5C1CE084F203497F6E3263642D5397997FB323A48501A21FC60051C0C9AAC5A3
6,004,430 UART: [art] SIG.S = 1A95A30CC0E7FD05EE3C88A134B25E17525DFB9472F28CAC253C30EA7817A14C7A84488ED75327928F49872DD670E5DA
6,028,073 UART: mbox::rt_entry...
6,028,445 UART: ____ _ _ _ ____ _____
6,029,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,030,797 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,031,565 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,333 UART: |_|
6,032,645 UART:
6,312,889 UART: [rt] Runtime listening for mailbox commands...
6,314,126 >>> mbox cmd response data (120 bytes)
6,314,127 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,613,475 >>> mbox cmd response: success
8,613,475 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,626,936 UART:
8,626,952 UART: Running Caliptra FMC ...
8,627,360 UART:
8,627,503 UART: [state] CFI Enabled
8,717,018 UART: [art] Extend RT PCRs Done
8,717,446 UART: [art] Lock RT PCRs Done
8,718,617 UART: [art] Populate DV Done
8,726,824 UART: [fht] FMC Alias Private Key: 7
8,727,966 UART: [art] Derive CDI
8,728,246 UART: [art] Store in in slot 0x4
8,814,143 UART: [art] Derive Key Pair
8,814,503 UART: [art] Store priv key in slot 0x5
8,827,701 UART: [art] Derive Key Pair - Done
8,842,436 UART: [art] Signing Cert with AUTHO
8,842,916 UART: RITY.KEYID = 7
8,858,230 UART: [art] Erasing AUTHORITY.KEYID = 7
8,858,995 UART: [art] PUB.X = 4EC54D297C37EC9484429A8080DC6288561C89D18E2BE98AD011EEEC853802F3DB97B4C9D6384E5403EA42CD473B0F06
8,865,757 UART: [art] PUB.Y = 49201CD5A449304478934EBB18F0EE56CC7CC5523AC67A61B91CEF7A7E8D5BEE24ACC430E9C68D48A37F4524102FA226
8,872,717 UART: [art] SIG.R = 63E9C8E46FB72EC2841754A46FDAF3FD780808803DC9F0D7F16688F53584E040B97DBC52DA1BB369EBBCFA083BC00037
8,879,468 UART: [art] SIG.S = B8F367C3F6A782BC2372C96AAEA24793762D3F0783700E1B55EED41E17661AF94E30603C0170F78B2CA1F1990CC869CC
8,903,071 UART: mbox::rt_entry...
8,903,443 UART: ____ _ _ _ ____ _____
8,904,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,027 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,905,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,906,563 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,907,331 UART: |_|
8,907,643 UART:
9,188,941 UART: [rt] Runtime listening for mailbox commands...
9,190,178 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
893,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,151 UART: [kat] ++
897,303 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,608 UART: [kat] LMS
1,170,936 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,541 UART: [fht] FHT @ 0x50003400
1,175,048 UART: [idev] ++
1,175,216 UART: [idev] CDI.KEYID = 6
1,175,576 UART: [idev] SUBJECT.KEYID = 7
1,176,000 UART: [idev] UDS.KEYID = 0
1,176,345 ready_for_fw is high
1,176,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,313 UART: [ldev] ++
1,210,481 UART: [ldev] CDI.KEYID = 6
1,210,844 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,896 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,761 >>> mbox cmd response: success
2,774,917 UART: [afmc] ++
2,775,085 UART: [afmc] CDI.KEYID = 6
2,775,447 UART: [afmc] SUBJECT.KEYID = 7
2,775,872 UART: [afmc] AUTHORITY.KEYID = 5
2,811,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,774 UART: [afmc] --
2,854,680 UART: [cold-reset] --
2,855,470 UART: [state] Locking Datavault
2,856,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,049 UART: [state] Locking ICCM
2,857,473 UART: [exit] Launching FMC @ 0x40000130
2,862,802 UART:
2,862,818 UART: Running Caliptra FMC ...
2,863,226 UART:
2,863,280 UART: [state] CFI Enabled
2,873,843 UART: [fht] FMC Alias Private Key: 7
2,982,540 UART: [art] Extend RT PCRs Done
2,982,968 UART: [art] Lock RT PCRs Done
2,984,430 UART: [art] Populate DV Done
2,992,857 UART: [fht] FMC Alias Private Key: 7
2,993,813 UART: [art] Derive CDI
2,994,093 UART: [art] Store in in slot 0x4
3,079,730 UART: [art] Derive Key Pair
3,080,090 UART: [art] Store priv key in slot 0x5
3,093,530 UART: [art] Derive Key Pair - Done
3,108,295 UART: [art] Signing Cert with AUTHO
3,108,775 UART: RITY.KEYID = 7
3,123,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,508 UART: [art] PUB.X = 9A0E52D282E3B27ACB211841C56E391722B0A820F1B0FEF8AB370C49F01A2D4E0C570BB37A7BFE9284C90BF1036F49BE
3,131,272 UART: [art] PUB.Y = 22A217DA685BE1B53A06F8CC598B384AACF84FBAD58CE20E995569268F93DEBAC7020629EA24EF1E396C156A513CBD5D
3,138,226 UART: [art] SIG.R = 2B802A7631293DBD733D6396153F4E40ECF5C8DA6B763685521B20CBDBE327CE893688FED6A9659192E46DFB7891C25E
3,145,000 UART: [art] SIG.S = 4CE225B4B0E0F58C8704B9A36A8E2F112207729A679F7CD688BFD7D0934E19F7C88E6188A248CCCC436EDA6407F7FF11
3,168,596 UART: Caliptra RT
3,168,849 UART: [state] CFI Enabled
3,276,520 UART: [rt] RT listening for mailbox commands...
3,277,190 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,956 UART: [rt]cmd =0x54514754, len=24
3,308,951 >>> mbox cmd response data (8 bytes)
3,308,952 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,767 UART:
3,309,783 UART: Running Caliptra ROM ...
3,310,191 UART:
3,310,246 UART: [state] CFI Enabled
3,312,988 UART: [state] LifecycleState = Unprovisioned
3,313,643 UART: [state] DebugLocked = No
3,314,189 UART: [state] WD Timer not started. Device not locked for debugging
3,315,337 UART: [kat] SHA2-256
4,120,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,112 UART: [kat] ++
4,125,264 UART: [kat] sha1
4,129,378 UART: [kat] SHA2-256
4,131,318 UART: [kat] SHA2-384
4,134,015 UART: [kat] SHA2-512-ACC
4,135,915 UART: [kat] ECC-384
4,145,606 UART: [kat] HMAC-384Kdf
4,150,054 UART: [kat] LMS
4,398,382 UART: [kat] --
4,399,194 UART: [update-reset] ++
5,304,934 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,377 >>> mbox cmd response: success
5,402,377 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,502 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,516 UART: [update-reset Success] --
5,411,447 UART: [state] Locking Datavault
5,412,277 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,881 UART: [state] Locking ICCM
5,413,303 UART: [exit] Launching FMC @ 0x40000130
5,418,632 UART:
5,418,648 UART: Running Caliptra FMC ...
5,419,056 UART:
5,419,110 UART: [state] CFI Enabled
5,508,587 UART: [art] Extend RT PCRs Done
5,509,015 UART: [art] Lock RT PCRs Done
5,510,344 UART: [art] Populate DV Done
5,518,839 UART: [fht] FMC Alias Private Key: 7
5,519,945 UART: [art] Derive CDI
5,520,225 UART: [art] Store in in slot 0x4
5,606,422 UART: [art] Derive Key Pair
5,606,782 UART: [art] Store priv key in slot 0x5
5,619,662 UART: [art] Derive Key Pair - Done
5,634,268 UART: [art] Signing Cert with AUTHO
5,634,748 UART: RITY.KEYID = 7
5,650,138 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,903 UART: [art] PUB.X = 70EDF916B86D93F9623FCC5249A8B78563E6838D3D8DBFA19D7BD7C860FAF5E23C718EE0068EE323C2DEBA13C04F9F40
5,657,686 UART: [art] PUB.Y = 9DD75D4EE08BE0ED101A4CF15C083EA22A33DC5F43774E2782D5C4EF594F721089F9162878B94B25ACC1F01A4E005738
5,664,617 UART: [art] SIG.R = 432403F1F3E9A708107AD502B2DB5C02C621C04A809E260AD6F096BD6ED256BADFE6ACC272C2DB8E3C3E473728013452
5,671,377 UART: [art] SIG.S = E0424EA48C092CC20CDEDBD538737CDDE770213E8A2F1108F22BD61CB89F91B9F337DEA227A60E8DFC7E1E8A317876B1
5,694,782 UART: mbox::rt_entry...
5,695,154 UART: ____ _ _ _ ____ _____
5,695,938 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,696,738 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,506 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,274 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,042 UART: |_|
5,699,354 UART:
5,981,424 UART: [rt] Runtime listening for mailbox commands...
5,982,661 >>> mbox cmd response data (120 bytes)
5,982,662 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,982,773 UART:
5,982,789 UART: Running Caliptra ROM ...
5,983,197 UART:
5,983,252 UART: [state] CFI Enabled
5,985,760 UART: [state] LifecycleState = Unprovisioned
5,986,415 UART: [state] DebugLocked = No
5,986,999 UART: [state] WD Timer not started. Device not locked for debugging
5,988,307 UART: [kat] SHA2-256
6,793,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,798,082 UART: [kat] ++
6,798,234 UART: [kat] sha1
6,802,446 UART: [kat] SHA2-256
6,804,386 UART: [kat] SHA2-384
6,807,147 UART: [kat] SHA2-512-ACC
6,809,047 UART: [kat] ECC-384
6,818,998 UART: [kat] HMAC-384Kdf
6,823,596 UART: [kat] LMS
7,071,924 UART: [kat] --
7,072,894 UART: [update-reset] ++
7,978,362 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,979,537 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,919 >>> mbox cmd response: success
8,075,919 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,076,216 UART: [update-reset] Copying MAN_2 To MAN_1
8,084,230 UART: [update-reset Success] --
8,085,493 UART: [state] Locking Datavault
8,086,293 UART: [state] Locking PCR0, PCR1 and PCR31
8,086,897 UART: [state] Locking ICCM
8,087,437 UART: [exit] Launching FMC @ 0x40000130
8,092,766 UART:
8,092,782 UART: Running Caliptra FMC ...
8,093,190 UART:
8,093,244 UART: [state] CFI Enabled
8,182,341 UART: [art] Extend RT PCRs Done
8,182,769 UART: [art] Lock RT PCRs Done
8,183,962 UART: [art] Populate DV Done
8,192,419 UART: [fht] FMC Alias Private Key: 7
8,193,455 UART: [art] Derive CDI
8,193,735 UART: [art] Store in in slot 0x4
8,279,796 UART: [art] Derive Key Pair
8,280,156 UART: [art] Store priv key in slot 0x5
8,293,410 UART: [art] Derive Key Pair - Done
8,307,942 UART: [art] Signing Cert with AUTHO
8,308,422 UART: RITY.KEYID = 7
8,323,594 UART: [art] Erasing AUTHORITY.KEYID = 7
8,324,359 UART: [art] PUB.X = 63E12D5D5ED15F31936BC0CEF1B0A8C6325D8DF2758D106F2363E0B769C4E81AB3344863ABBD9C258B912073E10BDDCA
8,331,138 UART: [art] PUB.Y = B88EEDDF1586A6976B364F6B7F4668D193562E7A2DFF67937E9EB39175814F4A52AF055786BFF83DC50953DF959B7EC1
8,338,088 UART: [art] SIG.R = DC340A5888251543EFE132CF987A18C7D15ECC2F0851038C30255FEAAB3669E865E9F4DD01E8B32588C0C34CFE2E8A2E
8,344,856 UART: [art] SIG.S = 81B3E66E3B0A3F18E35428680C33DCF50DE5963A4DD58B11896D41D58B8738D4EE09B93DEBD3FE5254B0787ADC182D78
8,368,629 UART: mbox::rt_entry...
8,369,001 UART: ____ _ _ _ ____ _____
8,369,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,370,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,371,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,372,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,372,889 UART: |_|
8,373,201 UART:
8,654,194 UART: [rt] Runtime listening for mailbox commands...
8,655,431 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,863 ready_for_fw is high
1,060,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,954 >>> mbox cmd response: success
2,687,470 UART:
2,687,486 UART: Running Caliptra FMC ...
2,687,894 UART:
2,687,948 UART: [state] CFI Enabled
2,698,275 UART: [fht] FMC Alias Private Key: 7
2,806,196 UART: [art] Extend RT PCRs Done
2,806,624 UART: [art] Lock RT PCRs Done
2,807,958 UART: [art] Populate DV Done
2,816,351 UART: [fht] FMC Alias Private Key: 7
2,817,489 UART: [art] Derive CDI
2,817,769 UART: [art] Store in in slot 0x4
2,902,836 UART: [art] Derive Key Pair
2,903,196 UART: [art] Store priv key in slot 0x5
2,916,778 UART: [art] Derive Key Pair - Done
2,931,641 UART: [art] Signing Cert with AUTHO
2,932,121 UART: RITY.KEYID = 7
2,947,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,180 UART: [art] PUB.X = 4D68CD8795821475E38F2125B92051F6157C9F73994541F6522A3235D724D10A26E53B058EC51447E1AE0FF679347A50
2,954,927 UART: [art] PUB.Y = 5887C1988E03F731E1B24C6F38458EE9D8E176AFC96035619F608637934C0B9D52696DA5CEB7A82FF18C8A7AEE8A0498
2,961,870 UART: [art] SIG.R = 62877710E338061C9D517E53F3B1C22C331FA77C197A7DFD46E25EC04C992016EE5CC1E25885C04EB910DC59839EFA4C
2,968,641 UART: [art] SIG.S = A46F1564A1D5A03A467370153BFD882C5283B37DBB8CE3C7C6685F1B355B5959B0708C1579F4D20A6D15087F14F61756
2,992,234 UART: Caliptra RT
2,992,487 UART: [state] CFI Enabled
3,101,182 UART: [rt] RT listening for mailbox commands...
3,101,852 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,662 UART: [rt]cmd =0x54514754, len=24
3,133,683 >>> mbox cmd response data (8 bytes)
3,133,684 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,634 >>> mbox cmd response: success
5,110,634 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,124,144 UART:
5,124,160 UART: Running Caliptra FMC ...
5,124,568 UART:
5,124,622 UART: [state] CFI Enabled
5,213,401 UART: [art] Extend RT PCRs Done
5,213,829 UART: [art] Lock RT PCRs Done
5,215,182 UART: [art] Populate DV Done
5,223,217 UART: [fht] FMC Alias Private Key: 7
5,224,337 UART: [art] Derive CDI
5,224,617 UART: [art] Store in in slot 0x4
5,310,214 UART: [art] Derive Key Pair
5,310,574 UART: [art] Store priv key in slot 0x5
5,323,692 UART: [art] Derive Key Pair - Done
5,338,384 UART: [art] Signing Cert with AUTHO
5,338,864 UART: RITY.KEYID = 7
5,354,454 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,219 UART: [art] PUB.X = D7FD7750B441B6E871E2269911E552456D00F1DE84D604A0296607181AAF7EDEEB999A7966FB2B7030C58FBAB3EFC48F
5,361,969 UART: [art] PUB.Y = E6F056B3F2E29E73F565EC016DE7B108F623E113804BC8214D23633890E4D5ED8DD05E2F92853F830E88309DC8D884A5
5,368,910 UART: [art] SIG.R = FCFEE08A3164086C458FE988BB90DFE2CE28080ADD1F0D1E7938079ED2003639E0E9C3CFA05BEC44C32090C16C64C78B
5,375,657 UART: [art] SIG.S = 2F2DDBA2E0B8A932C398E2557174090AD4D8C5799704AAA60CA6CDA05C9D58CCA51D3D0C21E1853F5CE9AF7DC70CD651
5,399,072 UART: mbox::rt_entry...
5,399,444 UART: ____ _ _ _ ____ _____
5,400,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,401,028 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,796 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,403,332 UART: |_|
5,403,644 UART:
5,683,196 UART: [rt] Runtime listening for mailbox commands...
5,684,433 >>> mbox cmd response data (120 bytes)
5,684,434 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,659,538 >>> mbox cmd response: success
7,659,538 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,672,974 UART:
7,672,990 UART: Running Caliptra FMC ...
7,673,398 UART:
7,673,452 UART: [state] CFI Enabled
7,762,727 UART: [art] Extend RT PCRs Done
7,763,155 UART: [art] Lock RT PCRs Done
7,764,314 UART: [art] Populate DV Done
7,772,871 UART: [fht] FMC Alias Private Key: 7
7,773,985 UART: [art] Derive CDI
7,774,265 UART: [art] Store in in slot 0x4
7,859,672 UART: [art] Derive Key Pair
7,860,032 UART: [art] Store priv key in slot 0x5
7,873,264 UART: [art] Derive Key Pair - Done
7,887,888 UART: [art] Signing Cert with AUTHO
7,888,368 UART: RITY.KEYID = 7
7,903,310 UART: [art] Erasing AUTHORITY.KEYID = 7
7,904,075 UART: [art] PUB.X = D4DB126780CAF7BEE27F5994B929E0AEF832B4B7AE4E003648F2FB21EF9DA2350380EC1D9FFD4218DABD5AA5CC0604E6
7,910,836 UART: [art] PUB.Y = FDA3995BF584C85F2DCF5C3813BA73BE3856417DBB13333FFE3229BCD48FFA38EFA640D947375906DA3151C7DA010870
7,917,787 UART: [art] SIG.R = F36612BCDEA948DD228CB682FCCCAAD6C65DBE126D66D1D37EE63C54CA5E5E305EA5FCFAFB231CA496A8B78453EF29E7
7,924,587 UART: [art] SIG.S = 69113086AD9D5B053F028B51F8216514FD5ABA6D06692826942D625C03CC275B437113A0588D6D9AFFB1B59C8312EC8B
7,948,578 UART: mbox::rt_entry...
7,948,950 UART: ____ _ _ _ ____ _____
7,949,734 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,950,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,951,302 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,952,070 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,952,838 UART: |_|
7,953,150 UART:
8,235,190 UART: [rt] Runtime listening for mailbox commands...
8,236,427 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,903 UART: [kat] SHA2-512-ACC
908,804 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,588 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 ready_for_fw is high
1,176,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] --
1,210,842 UART: [ldev] ++
1,211,010 UART: [ldev] CDI.KEYID = 6
1,211,373 UART: [ldev] SUBJECT.KEYID = 5
1,211,799 UART: [ldev] AUTHORITY.KEYID = 7
1,212,262 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,848 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,699 UART: [fwproc] Recv command 0x46574c44
1,284,427 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,598 >>> mbox cmd response: success
2,775,672 UART: [afmc] ++
2,775,840 UART: [afmc] CDI.KEYID = 6
2,776,202 UART: [afmc] SUBJECT.KEYID = 7
2,776,627 UART: [afmc] AUTHORITY.KEYID = 5
2,812,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,843 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,728 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,447 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,095 UART: [afmc] --
2,855,059 UART: [cold-reset] --
2,855,883 UART: [state] Locking Datavault
2,857,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,850 UART: [state] Locking ICCM
2,858,432 UART: [exit] Launching FMC @ 0x40000130
2,863,761 UART:
2,863,777 UART: Running Caliptra FMC ...
2,864,185 UART:
2,864,328 UART: [state] CFI Enabled
2,875,095 UART: [fht] FMC Alias Private Key: 7
2,983,716 UART: [art] Extend RT PCRs Done
2,984,144 UART: [art] Lock RT PCRs Done
2,985,966 UART: [art] Populate DV Done
2,994,105 UART: [fht] FMC Alias Private Key: 7
2,995,067 UART: [art] Derive CDI
2,995,347 UART: [art] Store in in slot 0x4
3,080,910 UART: [art] Derive Key Pair
3,081,270 UART: [art] Store priv key in slot 0x5
3,095,242 UART: [art] Derive Key Pair - Done
3,110,100 UART: [art] Signing Cert with AUTHO
3,110,580 UART: RITY.KEYID = 7
3,125,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,633 UART: [art] PUB.X = 16D197FB242873528AF46B263428F149D91A1C9F7D02A84D221BE518DADE38DB270D3868418B99AD3C7E9BEED7C0F38C
3,133,405 UART: [art] PUB.Y = A2619A8C5224FCF068D22FB124E66EAE359D981BE25AE442B7C886975ACB693464E8ED3E71B5E454511494E7EC3BC3F1
3,140,363 UART: [art] SIG.R = 8DE90736758A257DA072D5A53EEF2CC4FC7ED08533F94AC0FF35548912CD87744375666BA52EB18B7A27297DD6A52330
3,147,132 UART: [art] SIG.S = 1CB651DBFC732F5339C9C2585E77523D073D0BF99E9C3AAF8C1E4D8E530B2FE2510D76DBBE2ADCF53C50D91C5266C19E
3,170,187 UART: Caliptra RT
3,170,532 UART: [state] CFI Enabled
3,277,695 UART: [rt] RT listening for mailbox commands...
3,278,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,265 UART: [rt]cmd =0x54514754, len=24
3,310,544 >>> mbox cmd response data (8 bytes)
3,310,545 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,160 UART:
3,311,176 UART: Running Caliptra ROM ...
3,311,584 UART:
3,311,726 UART: [state] CFI Enabled
3,314,576 UART: [state] LifecycleState = Unprovisioned
3,315,231 UART: [state] DebugLocked = No
3,315,887 UART: [state] WD Timer not started. Device not locked for debugging
3,317,061 UART: [kat] SHA2-256
4,122,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,836 UART: [kat] ++
4,126,988 UART: [kat] sha1
4,131,302 UART: [kat] SHA2-256
4,133,242 UART: [kat] SHA2-384
4,135,859 UART: [kat] SHA2-512-ACC
4,137,759 UART: [kat] ECC-384
4,147,410 UART: [kat] HMAC-384Kdf
4,151,992 UART: [kat] LMS
4,400,320 UART: [kat] --
4,400,978 UART: [update-reset] ++
5,305,044 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,009 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,391 >>> mbox cmd response: success
5,402,391 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,616 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,630 UART: [update-reset Success] --
5,411,715 UART: [state] Locking Datavault
5,412,597 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,201 UART: [state] Locking ICCM
5,413,791 UART: [exit] Launching FMC @ 0x40000130
5,419,120 UART:
5,419,136 UART: Running Caliptra FMC ...
5,419,544 UART:
5,419,687 UART: [state] CFI Enabled
5,509,108 UART: [art] Extend RT PCRs Done
5,509,536 UART: [art] Lock RT PCRs Done
5,510,835 UART: [art] Populate DV Done
5,519,194 UART: [fht] FMC Alias Private Key: 7
5,520,264 UART: [art] Derive CDI
5,520,544 UART: [art] Store in in slot 0x4
5,606,277 UART: [art] Derive Key Pair
5,606,637 UART: [art] Store priv key in slot 0x5
5,619,719 UART: [art] Derive Key Pair - Done
5,634,478 UART: [art] Signing Cert with AUTHO
5,634,958 UART: RITY.KEYID = 7
5,650,562 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,327 UART: [art] PUB.X = 7FBB2872D0935FCA14FD785134DD99DA56E86C09DB0B287E4BF56C5CD9161BA013FC6694BDF679BA7EBA1220FAFC38AC
5,658,113 UART: [art] PUB.Y = C8EB317FB0FC1497B9C748F20ACE0B1A741BCF11FFA8BA8006D071F66BB1EEC20C65756BEA87361F0DF8DBF14BAE170F
5,665,071 UART: [art] SIG.R = B6330A01A99949F40EA6C2BC96769E3298CD05EA28A75E380D18A86A0CBA76B06CCE49474A95ADEE3C19270E0CFE3C15
5,671,829 UART: [art] SIG.S = 8F0EE2388D6CF9346C211BED2DFA604FDC7B6874813298CA3F9CAE2650EA7F4EE41A8553637D5F90AE4CC2A60C923088
5,695,332 UART: mbox::rt_entry...
5,695,704 UART: ____ _ _ _ ____ _____
5,696,488 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,824 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,592 UART: |_|
5,699,904 UART:
5,984,817 UART: [rt] Runtime listening for mailbox commands...
5,986,054 >>> mbox cmd response data (120 bytes)
5,986,055 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,986,166 UART:
5,986,182 UART: Running Caliptra ROM ...
5,986,590 UART:
5,986,732 UART: [state] CFI Enabled
5,989,714 UART: [state] LifecycleState = Unprovisioned
5,990,369 UART: [state] DebugLocked = No
5,990,947 UART: [state] WD Timer not started. Device not locked for debugging
5,992,061 UART: [kat] SHA2-256
6,797,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,801,836 UART: [kat] ++
6,801,988 UART: [kat] sha1
6,806,258 UART: [kat] SHA2-256
6,808,198 UART: [kat] SHA2-384
6,811,087 UART: [kat] SHA2-512-ACC
6,812,987 UART: [kat] ECC-384
6,822,542 UART: [kat] HMAC-384Kdf
6,827,362 UART: [kat] LMS
7,075,690 UART: [kat] --
7,076,550 UART: [update-reset] ++
7,980,978 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,982,065 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,078,447 >>> mbox cmd response: success
8,078,447 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,078,584 UART: [update-reset] Copying MAN_2 To MAN_1
8,086,598 UART: [update-reset Success] --
8,087,571 UART: [state] Locking Datavault
8,088,317 UART: [state] Locking PCR0, PCR1 and PCR31
8,088,921 UART: [state] Locking ICCM
8,089,343 UART: [exit] Launching FMC @ 0x40000130
8,094,672 UART:
8,094,688 UART: Running Caliptra FMC ...
8,095,096 UART:
8,095,239 UART: [state] CFI Enabled
8,184,740 UART: [art] Extend RT PCRs Done
8,185,168 UART: [art] Lock RT PCRs Done
8,186,443 UART: [art] Populate DV Done
8,194,600 UART: [fht] FMC Alias Private Key: 7
8,195,758 UART: [art] Derive CDI
8,196,038 UART: [art] Store in in slot 0x4
8,281,863 UART: [art] Derive Key Pair
8,282,223 UART: [art] Store priv key in slot 0x5
8,295,529 UART: [art] Derive Key Pair - Done
8,310,160 UART: [art] Signing Cert with AUTHO
8,310,640 UART: RITY.KEYID = 7
8,325,646 UART: [art] Erasing AUTHORITY.KEYID = 7
8,326,411 UART: [art] PUB.X = 5404A77B007CC96518C6D8F70C676854A8A9EAADAAFB1F0C00F37CF5825A4EF4DB45ADF851C3D860D42338E05FE67638
8,333,140 UART: [art] PUB.Y = 1766DC0D02EF3E4DD8B8080AAD7A1D377A530DA091A8DDFB29193FE10F0837FB3015A5A631258FAFE170907AB80F2FC4
8,340,080 UART: [art] SIG.R = 6EC5B83E7EF834FA9B4FFF3C9CF5D3B6DC0A7A66C4B545BD5D0E97FDE87DBBE5E5CF8F1BFAE20F16DBFDBB0CCDE3F08A
8,346,886 UART: [art] SIG.S = B59A24119B92A6818FB06E946E78B98A465825CC67D3E0B736659690768A4FDABF13F9561604BA4BF2E2C22CEC651DEE
8,370,436 UART: mbox::rt_entry...
8,370,808 UART: ____ _ _ _ ____ _____
8,371,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,372,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,373,160 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,373,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,374,696 UART: |_|
8,375,008 UART:
8,658,746 UART: [rt] Runtime listening for mailbox commands...
8,659,983 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,144 ready_for_fw is high
1,060,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,967 >>> mbox cmd response: success
2,688,131 UART:
2,688,147 UART: Running Caliptra FMC ...
2,688,555 UART:
2,688,698 UART: [state] CFI Enabled
2,699,207 UART: [fht] FMC Alias Private Key: 7
2,806,588 UART: [art] Extend RT PCRs Done
2,807,016 UART: [art] Lock RT PCRs Done
2,808,544 UART: [art] Populate DV Done
2,816,697 UART: [fht] FMC Alias Private Key: 7
2,817,705 UART: [art] Derive CDI
2,817,985 UART: [art] Store in in slot 0x4
2,903,546 UART: [art] Derive Key Pair
2,903,906 UART: [art] Store priv key in slot 0x5
2,917,374 UART: [art] Derive Key Pair - Done
2,931,804 UART: [art] Signing Cert with AUTHO
2,932,284 UART: RITY.KEYID = 7
2,947,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,625 UART: [art] PUB.X = 3CF480501EE78A9F5FA0EA0201EC9C448B6B88319E35B0C53DD0F041E0D7D53B6DC646C8CECA4FD1E334A459C728542F
2,955,403 UART: [art] PUB.Y = FA4D44C6BE09DC93D5DB3563A51D8C78828044B9F0F5CAB224E39C07A22F8E7514C0F099CDD3288E85E6DD13AA7AC01C
2,962,363 UART: [art] SIG.R = 380C431EB8B7238569E69D405DB30004E4CE6FB23DB8F8E511849B8834065CBDC418C04C128D06BA4508F0D7F4C332C1
2,969,098 UART: [art] SIG.S = D5F5EE97A7673C97C99D54AB485A3F794FC38D56AD3AEB1E6C57D8A8FC6EC53F2A718DE51E4FD3791065E8E8036896E1
2,992,760 UART: Caliptra RT
2,993,105 UART: [state] CFI Enabled
3,101,908 UART: [rt] RT listening for mailbox commands...
3,102,578 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,606 UART: [rt]cmd =0x54514754, len=24
3,134,743 >>> mbox cmd response data (8 bytes)
3,134,744 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,063 >>> mbox cmd response: success
5,111,063 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,124,827 UART:
5,124,843 UART: Running Caliptra FMC ...
5,125,251 UART:
5,125,394 UART: [state] CFI Enabled
5,214,377 UART: [art] Extend RT PCRs Done
5,214,805 UART: [art] Lock RT PCRs Done
5,215,890 UART: [art] Populate DV Done
5,224,253 UART: [fht] FMC Alias Private Key: 7
5,225,193 UART: [art] Derive CDI
5,225,473 UART: [art] Store in in slot 0x4
5,311,204 UART: [art] Derive Key Pair
5,311,564 UART: [art] Store priv key in slot 0x5
5,325,212 UART: [art] Derive Key Pair - Done
5,339,895 UART: [art] Signing Cert with AUTHO
5,340,375 UART: RITY.KEYID = 7
5,355,871 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,636 UART: [art] PUB.X = C0275A26C3DD21F51D8DB1294D0A5DFF539E0724F77E29AC163F10C3B6A6F21EA7A5F0E5B3FD48610891ACD61BC47E29
5,363,411 UART: [art] PUB.Y = 67360E31AB943CD74DF9A97C4F178654118B370E8C5BBAA52239742CAAD937E21AF7673FBB7B8F8E68FF5650792F66EF
5,370,363 UART: [art] SIG.R = A089D5E7168EC4C2CFC2C4B41956078B57EA33585D6B5EC1DB82F8696E83DCB4517FCA326A83B349E49E8458C37776CE
5,377,138 UART: [art] SIG.S = DC3ECD5F499F3ECBD2C3C4DFDAE4D0011CB77D0898BA8757B87CE571D315D9BC7EFD936E3FCD1098DD6E55B4BE023B96
5,400,410 UART: mbox::rt_entry...
5,400,782 UART: ____ _ _ _ ____ _____
5,401,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,403,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,404,670 UART: |_|
5,404,982 UART:
5,682,899 UART: [rt] Runtime listening for mailbox commands...
5,684,136 >>> mbox cmd response data (120 bytes)
5,684,137 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,661,212 >>> mbox cmd response: success
7,661,212 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,674,522 UART:
7,674,538 UART: Running Caliptra FMC ...
7,674,946 UART:
7,675,089 UART: [state] CFI Enabled
7,764,544 UART: [art] Extend RT PCRs Done
7,764,972 UART: [art] Lock RT PCRs Done
7,766,105 UART: [art] Populate DV Done
7,774,376 UART: [fht] FMC Alias Private Key: 7
7,775,516 UART: [art] Derive CDI
7,775,796 UART: [art] Store in in slot 0x4
7,861,927 UART: [art] Derive Key Pair
7,862,287 UART: [art] Store priv key in slot 0x5
7,875,553 UART: [art] Derive Key Pair - Done
7,890,467 UART: [art] Signing Cert with AUTHO
7,890,947 UART: RITY.KEYID = 7
7,905,935 UART: [art] Erasing AUTHORITY.KEYID = 7
7,906,700 UART: [art] PUB.X = 740DE46C23C428B167B659C95D9A807C6FAF4A509395FA148E460BAD986FA87C5862ED0E6626564B8B24BD9AE8DD991E
7,913,469 UART: [art] PUB.Y = E2C8631F1708907AF439603252A76275FAB8BECB574BFA4E8A1A97D3F2BDA6A5932A0352CBF23C15B3185DC9511F9C3D
7,920,423 UART: [art] SIG.R = 40484F91BFFCDE586CFDCD101BD741D722522FDC19F66B13CAE745C561DEFABE3F75DF1BE5670D18DB4235C3D795016E
7,927,207 UART: [art] SIG.S = E82A6BC4B5C392BE8CAFE75FC5B46B842A45CFF67957FE145BDF8DCEF2FA56CC088DD43DF5158BA44C16107FA1F079D3
7,950,939 UART: mbox::rt_entry...
7,951,311 UART: ____ _ _ _ ____ _____
7,952,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,952,895 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,953,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,954,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,955,199 UART: |_|
7,955,511 UART:
8,237,259 UART: [rt] Runtime listening for mailbox commands...
8,238,496 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,877 UART: [kat] ++
895,029 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,074 UART: [kat] HMAC-384Kdf
919,678 UART: [kat] LMS
1,167,990 UART: [kat] --
1,168,871 UART: [cold-reset] ++
1,169,197 UART: [fht] FHT @ 0x50003400
1,171,747 UART: [idev] ++
1,171,915 UART: [idev] CDI.KEYID = 6
1,172,276 UART: [idev] SUBJECT.KEYID = 7
1,172,701 UART: [idev] UDS.KEYID = 0
1,173,047 ready_for_fw is high
1,173,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,207,023 UART: [idev] --
1,208,074 UART: [ldev] ++
1,208,242 UART: [ldev] CDI.KEYID = 6
1,208,606 UART: [ldev] SUBJECT.KEYID = 5
1,209,033 UART: [ldev] AUTHORITY.KEYID = 7
1,209,496 UART: [ldev] FE.KEYID = 1
1,214,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,502 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,363 >>> mbox cmd response: success
2,771,448 UART: [afmc] ++
2,771,616 UART: [afmc] CDI.KEYID = 6
2,771,979 UART: [afmc] SUBJECT.KEYID = 7
2,772,405 UART: [afmc] AUTHORITY.KEYID = 5
2,807,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,107 UART: [afmc] --
2,851,169 UART: [cold-reset] --
2,852,127 UART: [state] Locking Datavault
2,853,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,718 UART: [state] Locking ICCM
2,854,346 UART: [exit] Launching FMC @ 0x40000130
2,859,675 UART:
2,859,691 UART: Running Caliptra FMC ...
2,860,099 UART:
2,860,153 UART: [state] CFI Enabled
2,870,744 UART: [fht] FMC Alias Private Key: 7
2,978,349 UART: [art] Extend RT PCRs Done
2,978,777 UART: [art] Lock RT PCRs Done
2,980,261 UART: [art] Populate DV Done
2,988,518 UART: [fht] FMC Alias Private Key: 7
2,989,672 UART: [art] Derive CDI
2,989,952 UART: [art] Store in in slot 0x4
3,075,853 UART: [art] Derive Key Pair
3,076,213 UART: [art] Store priv key in slot 0x5
3,089,771 UART: [art] Derive Key Pair - Done
3,104,513 UART: [art] Signing Cert with AUTHO
3,104,993 UART: RITY.KEYID = 7
3,120,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,952 UART: [art] PUB.X = E2767852731D4E6318BD680B9F26301952534ECF4EFB2C2D4A1DE095C62F9B98B4CDA268E0CBE3A0A444C85126E38A42
3,127,725 UART: [art] PUB.Y = B2BE9AF7F62B89561B6CC70C7F4D21FC06E8D5CF592FB0DCFA65B98B94673CB36E7679440F91E27FEBC47065759C7F18
3,134,680 UART: [art] SIG.R = F7416C28D56A6F485BAD0856D43447659D13246ECE8CC38DF9A3A485708080DC9E529A3F12B94C4DC2FD0B2670F47C73
3,141,448 UART: [art] SIG.S = A0E38CCF4F2CDFF48BA9A39BDD6030377D304E9E10A7AFEBD3E86597EDF08F0D916DA9FEC86AA6E8496F18FF019B742D
3,165,519 UART: Caliptra RT
3,165,772 UART: [state] CFI Enabled
3,273,952 UART: [rt] RT listening for mailbox commands...
3,274,622 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,660 UART: [rt]cmd =0x54514754, len=24
3,306,859 >>> mbox cmd response data (8 bytes)
3,306,860 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,801 UART:
3,307,817 UART: Running Caliptra ROM ...
3,308,225 UART:
3,308,280 UART: [state] CFI Enabled
3,310,900 UART: [state] LifecycleState = Unprovisioned
3,311,555 UART: [state] DebugLocked = No
3,312,063 UART: [state] WD Timer not started. Device not locked for debugging
3,313,233 UART: [kat] SHA2-256
4,116,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,912 UART: [kat] ++
4,121,064 UART: [kat] sha1
4,125,434 UART: [kat] SHA2-256
4,127,374 UART: [kat] SHA2-384
4,130,089 UART: [kat] SHA2-512-ACC
4,131,989 UART: [kat] ECC-384
4,141,686 UART: [kat] HMAC-384Kdf
4,146,208 UART: [kat] LMS
4,394,520 UART: [kat] --
4,395,518 UART: [update-reset] ++
5,299,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,300,706 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,397,088 >>> mbox cmd response: success
5,397,088 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,397,271 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,285 UART: [update-reset Success] --
5,406,352 UART: [state] Locking Datavault
5,407,132 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,736 UART: [state] Locking ICCM
5,408,218 UART: [exit] Launching FMC @ 0x40000130
5,413,547 UART:
5,413,563 UART: Running Caliptra FMC ...
5,413,971 UART:
5,414,025 UART: [state] CFI Enabled
5,502,978 UART: [art] Extend RT PCRs Done
5,503,406 UART: [art] Lock RT PCRs Done
5,504,511 UART: [art] Populate DV Done
5,512,766 UART: [fht] FMC Alias Private Key: 7
5,513,888 UART: [art] Derive CDI
5,514,168 UART: [art] Store in in slot 0x4
5,599,913 UART: [art] Derive Key Pair
5,600,273 UART: [art] Store priv key in slot 0x5
5,613,611 UART: [art] Derive Key Pair - Done
5,628,238 UART: [art] Signing Cert with AUTHO
5,628,718 UART: RITY.KEYID = 7
5,644,038 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,803 UART: [art] PUB.X = 0F6BABD64D80FFD9457A53FD534BD4269F018E6278824CD530AE0D59211B24EC2F5376ED7D4A97D04E0B03C67F0ACD5C
5,651,569 UART: [art] PUB.Y = 5DF9F1EACB99930DBF740AB859705D1497ACE202925C21056443CD017660B1270E2FC9C3A7AFE7B0EFA0A32FB88AFA8C
5,658,517 UART: [art] SIG.R = DC440061DE5D8C48026C7287B250EB3CD2097AD62AA40115CD5CB480637443374FDACED5741DE7A4EDE1B91C52160EB5
5,665,263 UART: [art] SIG.S = FC2C6D300A2DDA7A0E3A3BEFBE11B5E3197C3001ED16ABC020CF9323ACA5F921F65774D348C4DD5676ED88A8185F18C6
5,689,859 UART: mbox::rt_entry...
5,690,231 UART: ____ _ _ _ ____ _____
5,691,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,119 UART: |_|
5,694,431 UART:
5,975,222 UART: [rt] Runtime listening for mailbox commands...
5,976,459 >>> mbox cmd response data (120 bytes)
5,976,460 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,976,571 UART:
5,976,587 UART: Running Caliptra ROM ...
5,976,995 UART:
5,977,050 UART: [state] CFI Enabled
5,979,628 UART: [state] LifecycleState = Unprovisioned
5,980,283 UART: [state] DebugLocked = No
5,980,787 UART: [state] WD Timer not started. Device not locked for debugging
5,982,085 UART: [kat] SHA2-256
6,785,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,789,764 UART: [kat] ++
6,789,916 UART: [kat] sha1
6,794,190 UART: [kat] SHA2-256
6,796,130 UART: [kat] SHA2-384
6,798,803 UART: [kat] SHA2-512-ACC
6,800,703 UART: [kat] ECC-384
6,810,460 UART: [kat] HMAC-384Kdf
6,815,004 UART: [kat] LMS
7,063,316 UART: [kat] --
7,064,336 UART: [update-reset] ++
7,968,811 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,969,836 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,066,218 >>> mbox cmd response: success
8,066,218 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,066,495 UART: [update-reset] Copying MAN_2 To MAN_1
8,074,509 UART: [update-reset Success] --
8,075,400 UART: [state] Locking Datavault
8,076,230 UART: [state] Locking PCR0, PCR1 and PCR31
8,076,834 UART: [state] Locking ICCM
8,077,418 UART: [exit] Launching FMC @ 0x40000130
8,082,747 UART:
8,082,763 UART: Running Caliptra FMC ...
8,083,171 UART:
8,083,225 UART: [state] CFI Enabled
8,172,348 UART: [art] Extend RT PCRs Done
8,172,776 UART: [art] Lock RT PCRs Done
8,173,955 UART: [art] Populate DV Done
8,181,908 UART: [fht] FMC Alias Private Key: 7
8,183,090 UART: [art] Derive CDI
8,183,370 UART: [art] Store in in slot 0x4
8,268,899 UART: [art] Derive Key Pair
8,269,259 UART: [art] Store priv key in slot 0x5
8,282,295 UART: [art] Derive Key Pair - Done
8,297,184 UART: [art] Signing Cert with AUTHO
8,297,664 UART: RITY.KEYID = 7
8,313,380 UART: [art] Erasing AUTHORITY.KEYID = 7
8,314,145 UART: [art] PUB.X = 4A98933432ECF74A6F13EF39FB8AE9F5FEB2441E354C3D0D0831AC454B039581C379F25B806F94B44EC2259E447E79FC
8,320,912 UART: [art] PUB.Y = 742C34CFE202E440BD7BBEE265F34530726D528C888DDE9923A9F1A60134FC702BB42990ECBF80BBAB91506D5105B455
8,327,859 UART: [art] SIG.R = 1A799C3CAD2B2424EDD6C1833FDA92CC9E065565471480E5756F53BBB92F04FB5CA828A3CF29612669314735B248F883
8,334,623 UART: [art] SIG.S = 52705B4DB30BBF236B697B84B2C7D54790054620A20ED1590A4EDE8DA16C6A9F3A7BD01EFB66F100606BF6F0DD55232C
8,358,406 UART: mbox::rt_entry...
8,358,778 UART: ____ _ _ _ ____ _____
8,359,562 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,360,362 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,361,130 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,361,898 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,362,666 UART: |_|
8,362,978 UART:
8,640,974 UART: [rt] Runtime listening for mailbox commands...
8,642,211 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 ready_for_fw is high
1,055,826 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,317 >>> mbox cmd response: success
2,684,169 UART:
2,684,185 UART: Running Caliptra FMC ...
2,684,593 UART:
2,684,647 UART: [state] CFI Enabled
2,694,834 UART: [fht] FMC Alias Private Key: 7
2,803,329 UART: [art] Extend RT PCRs Done
2,803,757 UART: [art] Lock RT PCRs Done
2,805,059 UART: [art] Populate DV Done
2,813,322 UART: [fht] FMC Alias Private Key: 7
2,814,266 UART: [art] Derive CDI
2,814,546 UART: [art] Store in in slot 0x4
2,900,275 UART: [art] Derive Key Pair
2,900,635 UART: [art] Store priv key in slot 0x5
2,913,295 UART: [art] Derive Key Pair - Done
2,927,920 UART: [art] Signing Cert with AUTHO
2,928,400 UART: RITY.KEYID = 7
2,943,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,389 UART: [art] PUB.X = 52B2679F0DFD400B4CECE3CE07CE11909E0946FE926E94FC4D4B25EFED02067BEE863FF636753A84AF65B96859F2549C
2,951,153 UART: [art] PUB.Y = 81BDBFFB45C6D0EA20E16B490A75F6A32FD654A48D977C15F6EE8169DCC230986C7F4F193F05DC8327B7C2929589B0A9
2,958,107 UART: [art] SIG.R = 617D0D2E799E772D02937EAEE703D6F8C5B697BE834210E18CD40B1C9F75C29B192D00D1604608FBFFF232765B985AB1
2,964,844 UART: [art] SIG.S = 097834983DA08EBAB1DBB42D32DBE7D8ABF63E4709A38C684B8E3247D9502FB3DD22C5B1DD08FB5223CCBC6762CF0714
2,988,701 UART: Caliptra RT
2,988,954 UART: [state] CFI Enabled
3,097,027 UART: [rt] RT listening for mailbox commands...
3,097,697 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,657 UART: [rt]cmd =0x54514754, len=24
3,129,882 >>> mbox cmd response data (8 bytes)
3,129,883 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,101,038 >>> mbox cmd response: success
5,101,038 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,114,540 UART:
5,114,556 UART: Running Caliptra FMC ...
5,114,964 UART:
5,115,018 UART: [state] CFI Enabled
5,203,885 UART: [art] Extend RT PCRs Done
5,204,313 UART: [art] Lock RT PCRs Done
5,205,470 UART: [art] Populate DV Done
5,213,667 UART: [fht] FMC Alias Private Key: 7
5,214,603 UART: [art] Derive CDI
5,214,883 UART: [art] Store in in slot 0x4
5,300,242 UART: [art] Derive Key Pair
5,300,602 UART: [art] Store priv key in slot 0x5
5,313,404 UART: [art] Derive Key Pair - Done
5,327,714 UART: [art] Signing Cert with AUTHO
5,328,194 UART: RITY.KEYID = 7
5,342,916 UART: [art] Erasing AUTHORITY.KEYID = 7
5,343,681 UART: [art] PUB.X = 00B40DDEBF340239115E3258F08EE531D6DF2C01530473CE07737325770ED027237BAC88DBEF9E53351992ECF94CDE45
5,350,413 UART: [art] PUB.Y = 5F3D22ED9871792867C815B3B3ECBCF4429F439080F4DD136BC1BF511438A8B3D0FEE87ACE5D7D976E1F89A20771FA90
5,357,370 UART: [art] SIG.R = 58271E77C25A3A57C1AB330AC4EB82F0D603DDAA516E69402A199FEFACA939FBB8B46F00BBABDC6DA9D6D363B4616555
5,364,132 UART: [art] SIG.S = 607DDB9BB53780E82C8915A2FE121D375387F18D5881A99631B8F424EEE4B406FAA87F35CE02B473DECE1A0D3E6E1860
5,388,006 UART: mbox::rt_entry...
5,388,378 UART: ____ _ _ _ ____ _____
5,389,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,389,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,390,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,391,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,392,266 UART: |_|
5,392,578 UART:
5,675,138 UART: [rt] Runtime listening for mailbox commands...
5,676,375 >>> mbox cmd response data (120 bytes)
5,676,376 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,647,903 >>> mbox cmd response: success
7,647,903 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,661,377 UART:
7,661,393 UART: Running Caliptra FMC ...
7,661,801 UART:
7,661,855 UART: [state] CFI Enabled
7,751,168 UART: [art] Extend RT PCRs Done
7,751,596 UART: [art] Lock RT PCRs Done
7,752,737 UART: [art] Populate DV Done
7,761,206 UART: [fht] FMC Alias Private Key: 7
7,762,298 UART: [art] Derive CDI
7,762,578 UART: [art] Store in in slot 0x4
7,848,951 UART: [art] Derive Key Pair
7,849,311 UART: [art] Store priv key in slot 0x5
7,862,347 UART: [art] Derive Key Pair - Done
7,876,982 UART: [art] Signing Cert with AUTHO
7,877,462 UART: RITY.KEYID = 7
7,893,092 UART: [art] Erasing AUTHORITY.KEYID = 7
7,893,857 UART: [art] PUB.X = FC86ADFD9928E3589BCF6F57501D828C8A93143B4A4BB4263F7A8FAF7433946C6F9CD7BCA3F85417D2499AD5865CB2DC
7,900,641 UART: [art] PUB.Y = 3F57F0CCF68F952423B3875E6188BBEF30BC627AC44A42368841ADBA69EAAF5B6CA60908D4D2B465A2424D7DB526EB11
7,907,597 UART: [art] SIG.R = 529F52872D8E5CE518CA63C0AC5D188455B625257E8EA1BEEF2A384A6966F001D2254EEC3705D340C451B7D2806E9E64
7,914,363 UART: [art] SIG.S = 5822B27478620CF201F572774199712C23EF03A8F296B4B871EFF041D35EC3CFB9986526611919D603CB972586B69E37
7,938,242 UART: mbox::rt_entry...
7,938,614 UART: ____ _ _ _ ____ _____
7,939,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,940,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,940,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,941,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,942,502 UART: |_|
7,942,814 UART:
8,224,064 UART: [rt] Runtime listening for mailbox commands...
8,225,301 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 ready_for_fw is high
1,174,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,167 UART: [ldev] --
1,281,627 UART: [fwproc] Wait for Commands...
1,282,222 UART: [fwproc] Recv command 0x46574c44
1,282,955 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,930 >>> mbox cmd response: success
2,774,985 UART: [afmc] ++
2,775,153 UART: [afmc] CDI.KEYID = 6
2,775,516 UART: [afmc] SUBJECT.KEYID = 7
2,775,942 UART: [afmc] AUTHORITY.KEYID = 5
2,811,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,112 UART: [afmc] --
2,854,992 UART: [cold-reset] --
2,855,826 UART: [state] Locking Datavault
2,856,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,539 UART: [state] Locking ICCM
2,858,157 UART: [exit] Launching FMC @ 0x40000130
2,863,486 UART:
2,863,502 UART: Running Caliptra FMC ...
2,863,910 UART:
2,864,053 UART: [state] CFI Enabled
2,874,490 UART: [fht] FMC Alias Private Key: 7
2,982,411 UART: [art] Extend RT PCRs Done
2,982,839 UART: [art] Lock RT PCRs Done
2,984,391 UART: [art] Populate DV Done
2,992,562 UART: [fht] FMC Alias Private Key: 7
2,993,716 UART: [art] Derive CDI
2,993,996 UART: [art] Store in in slot 0x4
3,079,815 UART: [art] Derive Key Pair
3,080,175 UART: [art] Store priv key in slot 0x5
3,093,727 UART: [art] Derive Key Pair - Done
3,108,374 UART: [art] Signing Cert with AUTHO
3,108,854 UART: RITY.KEYID = 7
3,124,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,803 UART: [art] PUB.X = 5640334FC581DE6097D2FA5B2BF0710D904DC73CC617188398C75538047B2D7642F24F930DD7D9FDA8F23FE79356849A
3,131,562 UART: [art] PUB.Y = 7859F5B26F74F6B623982FB29FA7DAD416C3D1D8B74F6C6404B56267DB38763E55C773C52CC14B6DAC8257595B68DD93
3,138,513 UART: [art] SIG.R = BE22EA11BE7671DD1B880E3F8BE1FE552DB57BF6D14E9C4FCF2CB1E759D9BF280A09C1450E883E903ABF707DDE489C48
3,145,293 UART: [art] SIG.S = 2E021DB0ED8B6F8CD4FD43D8DCD53C0D98B268C013F7499735158EEC51B059A174118910E2A98CFE4BADA80DD0D8C74E
3,169,283 UART: Caliptra RT
3,169,628 UART: [state] CFI Enabled
3,277,449 UART: [rt] RT listening for mailbox commands...
3,278,119 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,293 UART: [rt]cmd =0x54514754, len=24
3,310,528 >>> mbox cmd response data (8 bytes)
3,310,529 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,364 UART:
3,311,380 UART: Running Caliptra ROM ...
3,311,788 UART:
3,311,930 UART: [state] CFI Enabled
3,315,268 UART: [state] LifecycleState = Unprovisioned
3,315,923 UART: [state] DebugLocked = No
3,316,441 UART: [state] WD Timer not started. Device not locked for debugging
3,317,657 UART: [kat] SHA2-256
4,121,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,336 UART: [kat] ++
4,125,488 UART: [kat] sha1
4,129,676 UART: [kat] SHA2-256
4,131,616 UART: [kat] SHA2-384
4,134,421 UART: [kat] SHA2-512-ACC
4,136,321 UART: [kat] ECC-384
4,145,686 UART: [kat] HMAC-384Kdf
4,150,414 UART: [kat] LMS
4,398,726 UART: [kat] --
4,399,626 UART: [update-reset] ++
5,304,973 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,156 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,538 >>> mbox cmd response: success
5,402,538 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,785 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,799 UART: [update-reset Success] --
5,411,710 UART: [state] Locking Datavault
5,412,548 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,152 UART: [state] Locking ICCM
5,413,802 UART: [exit] Launching FMC @ 0x40000130
5,419,131 UART:
5,419,147 UART: Running Caliptra FMC ...
5,419,555 UART:
5,419,698 UART: [state] CFI Enabled
5,509,619 UART: [art] Extend RT PCRs Done
5,510,047 UART: [art] Lock RT PCRs Done
5,511,356 UART: [art] Populate DV Done
5,519,745 UART: [fht] FMC Alias Private Key: 7
5,520,849 UART: [art] Derive CDI
5,521,129 UART: [art] Store in in slot 0x4
5,607,408 UART: [art] Derive Key Pair
5,607,768 UART: [art] Store priv key in slot 0x5
5,620,910 UART: [art] Derive Key Pair - Done
5,635,770 UART: [art] Signing Cert with AUTHO
5,636,250 UART: RITY.KEYID = 7
5,651,106 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,871 UART: [art] PUB.X = B2DCB2F63365E4D85E0D52C703BC0E63ABE0A5E1339ADC1BA5E433585784DDE9A58CB3F47654018CF33D425FB7172304
5,658,636 UART: [art] PUB.Y = D9F4B800BE9AC8F3E3A0B4668D49BA0A107733E374A45AA84E2B5A69E4ACBC7BA353F8B9DB02975E78B93C1E0B24D8D0
5,665,573 UART: [art] SIG.R = DCB36F4E540FF84106EF35F0DB51280089634C179757A3D01AC197D922435D8C7C9B94DB25198ED0814706291187E7BB
5,672,308 UART: [art] SIG.S = 395D3368C9F01C111FDD105228648388846D3CC23479D0F33C8523CEC6E5BD8BFE4D5C0BF91A94B43A7893ECC87906A3
5,696,147 UART: mbox::rt_entry...
5,696,519 UART: ____ _ _ _ ____ _____
5,697,303 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,103 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,871 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,639 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,407 UART: |_|
5,700,719 UART:
5,984,185 UART: [rt] Runtime listening for mailbox commands...
5,985,422 >>> mbox cmd response data (120 bytes)
5,985,423 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,985,534 UART:
5,985,550 UART: Running Caliptra ROM ...
5,985,958 UART:
5,986,100 UART: [state] CFI Enabled
5,988,446 UART: [state] LifecycleState = Unprovisioned
5,989,101 UART: [state] DebugLocked = No
5,989,589 UART: [state] WD Timer not started. Device not locked for debugging
5,990,909 UART: [kat] SHA2-256
6,794,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,798,588 UART: [kat] ++
6,798,740 UART: [kat] sha1
6,803,190 UART: [kat] SHA2-256
6,805,130 UART: [kat] SHA2-384
6,807,889 UART: [kat] SHA2-512-ACC
6,809,789 UART: [kat] ECC-384
6,819,474 UART: [kat] HMAC-384Kdf
6,824,108 UART: [kat] LMS
7,072,420 UART: [kat] --
7,073,504 UART: [update-reset] ++
7,978,311 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,979,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,692 >>> mbox cmd response: success
8,075,692 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,075,941 UART: [update-reset] Copying MAN_2 To MAN_1
8,083,955 UART: [update-reset Success] --
8,084,842 UART: [state] Locking Datavault
8,085,728 UART: [state] Locking PCR0, PCR1 and PCR31
8,086,332 UART: [state] Locking ICCM
8,086,784 UART: [exit] Launching FMC @ 0x40000130
8,092,113 UART:
8,092,129 UART: Running Caliptra FMC ...
8,092,537 UART:
8,092,680 UART: [state] CFI Enabled
8,181,625 UART: [art] Extend RT PCRs Done
8,182,053 UART: [art] Lock RT PCRs Done
8,183,066 UART: [art] Populate DV Done
8,191,059 UART: [fht] FMC Alias Private Key: 7
8,192,123 UART: [art] Derive CDI
8,192,403 UART: [art] Store in in slot 0x4
8,277,704 UART: [art] Derive Key Pair
8,278,064 UART: [art] Store priv key in slot 0x5
8,291,784 UART: [art] Derive Key Pair - Done
8,306,631 UART: [art] Signing Cert with AUTHO
8,307,111 UART: RITY.KEYID = 7
8,322,397 UART: [art] Erasing AUTHORITY.KEYID = 7
8,323,162 UART: [art] PUB.X = B8CD88E671262C4D86FA5D233F2C6BAA1D54C96FF6379D3C681FE2935F0AE9BAC36DBB4F67B50D579DAE05532D3FE694
8,329,941 UART: [art] PUB.Y = 7442EA483CBB366358A65178EE520C1D8E59431EB54DD2082CE4E8FA8D170BC3AAA71BCE2060C78FB79E906117C19A59
8,336,890 UART: [art] SIG.R = 1C2388F5135DCE7F997ECF1E63A70E89E812F539E0B0030B60EE4BFB16F5C20857637018537A7DF631C1D196BBE6A5EF
8,343,656 UART: [art] SIG.S = FDF1DB722249BD528BB41D91371E8402015760D7367289FE807995A5800F0B349AA19D2ECBD3FD95CE35B1072463A9A9
8,367,020 UART: mbox::rt_entry...
8,367,392 UART: ____ _ _ _ ____ _____
8,368,176 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,368,976 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,744 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,512 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,280 UART: |_|
8,371,592 UART:
8,653,272 UART: [rt] Runtime listening for mailbox commands...
8,654,509 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,507 ready_for_fw is high
1,056,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,272 >>> mbox cmd response: success
2,685,420 UART:
2,685,436 UART: Running Caliptra FMC ...
2,685,844 UART:
2,685,987 UART: [state] CFI Enabled
2,696,318 UART: [fht] FMC Alias Private Key: 7
2,803,595 UART: [art] Extend RT PCRs Done
2,804,023 UART: [art] Lock RT PCRs Done
2,805,653 UART: [art] Populate DV Done
2,813,898 UART: [fht] FMC Alias Private Key: 7
2,815,072 UART: [art] Derive CDI
2,815,352 UART: [art] Store in in slot 0x4
2,901,073 UART: [art] Derive Key Pair
2,901,433 UART: [art] Store priv key in slot 0x5
2,915,349 UART: [art] Derive Key Pair - Done
2,929,750 UART: [art] Signing Cert with AUTHO
2,930,230 UART: RITY.KEYID = 7
2,945,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,443 UART: [art] PUB.X = 621355310B178C76CA53D8DB2E39DE3AB5686F1823226E36F966FC231B71FC1A31F2F2B6CA42D79869BBA32D96747E5D
2,953,214 UART: [art] PUB.Y = C219F4486DB6FF3C4AA880752D5311E0B41D962F21AC82B7EF4F7A36B2B4952206C5ED8DC3C52FBDDF0B9438B9F2E979
2,960,172 UART: [art] SIG.R = 9F34594F8A1A40B74032F29C9165FC34E07AB31A58E98CC3D07A80B8E8C91C3F826F068355FDCC2F8CD88AB95A2E674C
2,966,949 UART: [art] SIG.S = C75FA3F71A551698D5D3E28A56916010898A9114F10F0A9BBB5879DB3DD0D72517EA3512CBDA5AC0DCCAE33AEAF3F417
2,990,676 UART: Caliptra RT
2,991,021 UART: [state] CFI Enabled
3,099,081 UART: [rt] RT listening for mailbox commands...
3,099,751 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,121 UART: [rt]cmd =0x54514754, len=24
3,132,116 >>> mbox cmd response data (8 bytes)
3,132,117 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,209 >>> mbox cmd response: success
5,102,209 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,115,749 UART:
5,115,765 UART: Running Caliptra FMC ...
5,116,173 UART:
5,116,316 UART: [state] CFI Enabled
5,205,663 UART: [art] Extend RT PCRs Done
5,206,091 UART: [art] Lock RT PCRs Done
5,207,544 UART: [art] Populate DV Done
5,216,063 UART: [fht] FMC Alias Private Key: 7
5,217,135 UART: [art] Derive CDI
5,217,415 UART: [art] Store in in slot 0x4
5,302,884 UART: [art] Derive Key Pair
5,303,244 UART: [art] Store priv key in slot 0x5
5,316,642 UART: [art] Derive Key Pair - Done
5,331,607 UART: [art] Signing Cert with AUTHO
5,332,087 UART: RITY.KEYID = 7
5,347,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,050 UART: [art] PUB.X = B9C709060904A779A098C4039F2CE810157854BF37FCB9984A364129D575F86B063B23A8565C3AD9EB5BB5D089A6FFEF
5,354,804 UART: [art] PUB.Y = 5CD447C90552197245FDD8BA1B9567CC6A17E156FB5506B81505F3BD9157E37D074C0EF3B7273C6B4B48DD63F9807557
5,361,739 UART: [art] SIG.R = 94C2F805F6A4260A86A8038AA401C8F8A7FF8B27C0A227B1E87597E43AAB5D43E8F17C9E7224667D14C00DAA16E670C5
5,368,500 UART: [art] SIG.S = F3A1B6FB7158CBA985CF0298DBC9CD23C2A655792D38217898565BD71FB22DB60589829DB9C74C56BFDF85DC703CEC9E
5,391,753 UART: mbox::rt_entry...
5,392,125 UART: ____ _ _ _ ____ _____
5,392,909 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,709 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,394,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,395,245 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,013 UART: |_|
5,396,325 UART:
5,678,550 UART: [rt] Runtime listening for mailbox commands...
5,679,787 >>> mbox cmd response data (120 bytes)
5,679,788 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,652,728 >>> mbox cmd response: success
7,652,728 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,666,160 UART:
7,666,176 UART: Running Caliptra FMC ...
7,666,584 UART:
7,666,727 UART: [state] CFI Enabled
7,755,364 UART: [art] Extend RT PCRs Done
7,755,792 UART: [art] Lock RT PCRs Done
7,756,975 UART: [art] Populate DV Done
7,765,200 UART: [fht] FMC Alias Private Key: 7
7,766,134 UART: [art] Derive CDI
7,766,414 UART: [art] Store in in slot 0x4
7,852,385 UART: [art] Derive Key Pair
7,852,745 UART: [art] Store priv key in slot 0x5
7,865,957 UART: [art] Derive Key Pair - Done
7,880,888 UART: [art] Signing Cert with AUTHO
7,881,368 UART: RITY.KEYID = 7
7,896,462 UART: [art] Erasing AUTHORITY.KEYID = 7
7,897,227 UART: [art] PUB.X = 7173B2C11BC9E9A3796B615E537FD9AFAF95983962A0B71ED8C0868FDC3F1A98BB8201042B5795B595A86B93D180DF02
7,903,992 UART: [art] PUB.Y = BBDEBDF3AAF57C9188C81313C0E908FC7F85DD8D6D1973A64C6ABCE7B09B58AF892A63D67D1CF0968FC6359D1A3ED026
7,910,961 UART: [art] SIG.R = C74A7BC03B643CCDF199482A6AFE8883FA7720B7E54D124E6606A8AB3A2DD3F950F0FA4B18F471CBB3DABA2C72BB5B4E
7,917,752 UART: [art] SIG.S = 4F1E40AFB72E19D4104BFE60178A31C15C97B8F37FEF37D2F73097EE6BA1751C3E1920F10A7D7FBC3003F7D15520AF25
7,941,955 UART: mbox::rt_entry...
7,942,327 UART: ____ _ _ _ ____ _____
7,943,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,943,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,944,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,945,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,946,215 UART: |_|
7,946,527 UART:
8,224,141 UART: [rt] Runtime listening for mailbox commands...
8,225,378 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Production
86,053 UART: [state] DebugLocked = Yes
86,563 UART: [state] Starting the WD Timer 40000000 cycles
88,276 UART: [kat] SHA2-256
891,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,385 UART: [kat] SHA2-256
902,325 UART: [kat] SHA2-384
904,952 UART: [kat] SHA2-512-ACC
906,853 UART: [kat] ECC-384
917,044 UART: [kat] HMAC-384Kdf
921,856 UART: [kat] LMS
1,170,168 UART: [kat] --
1,171,231 UART: [cold-reset] ++
1,171,638 UART: [fht] FHT @ 0x50003400
1,174,424 UART: [idev] ++
1,174,592 UART: [idev] CDI.KEYID = 6
1,174,953 UART: [idev] SUBJECT.KEYID = 7
1,175,378 UART: [idev] UDS.KEYID = 0
1,175,724 ready_for_fw is high
1,175,724 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,303 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,818 UART: [ldev] ++
1,209,986 UART: [ldev] CDI.KEYID = 6
1,210,350 UART: [ldev] SUBJECT.KEYID = 5
1,210,777 UART: [ldev] AUTHORITY.KEYID = 7
1,211,240 UART: [ldev] FE.KEYID = 1
1,216,554 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,543 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,237 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,107 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,813 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,865 UART: [ldev] --
1,281,247 UART: [fwproc] Wait for Commands...
1,282,002 UART: [fwproc] Recv command 0x46574c44
1,282,735 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,875 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,284 >>> mbox cmd response: success
2,338,410 UART: [afmc] ++
2,338,578 UART: [afmc] CDI.KEYID = 6
2,338,941 UART: [afmc] SUBJECT.KEYID = 7
2,339,367 UART: [afmc] AUTHORITY.KEYID = 5
2,374,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,017 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,736 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,629 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,336 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,311 UART: [afmc] --
2,418,278 UART: [cold-reset] --
2,419,186 UART: [state] Locking Datavault
2,420,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,095 UART: [state] Locking ICCM
2,421,583 UART: [exit] Launching FMC @ 0x40000130
2,426,912 UART:
2,426,928 UART: Running Caliptra FMC ...
2,427,336 UART:
2,427,390 UART: [state] CFI Enabled
2,437,747 UART: [fht] FMC Alias Private Key: 7
2,546,336 UART: [art] Extend RT PCRs Done
2,546,764 UART: [art] Lock RT PCRs Done
2,548,250 UART: [art] Populate DV Done
2,556,166 UART: [fht] FMC Alias Private Key: 7
2,557,206 UART: [art] Derive CDI
2,557,486 UART: [art] Store in in slot 0x4
2,643,495 UART: [art] Derive Key Pair
2,643,855 UART: [art] Store priv key in slot 0x5
2,656,799 UART: [art] Derive Key Pair - Done
2,671,706 UART: [art] Signing Cert with AUTHO
2,672,186 UART: RITY.KEYID = 7
2,687,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,057 UART: [art] PUB.X = 9A78AA140E1E52C2908C45141D73DBB23C6CDCADADE4E6D3F1A933877D4F4362633FFEB0B9E6DAE45C6EB1015807D232
2,694,834 UART: [art] PUB.Y = 8DAA1639FC74CA79FF1F0C0E9D223E21944E3FF927D77DDA7C4DCAE8F872F3FEC762292F9A9C811E1FB21F991B9B057A
2,701,795 UART: [art] SIG.R = 2A1402BD201F618D3DA3B756A5232C4B1784F334DB6616975A7566E99CB9796498600819BCD63C80A631838849C0161C
2,708,547 UART: [art] SIG.S = 04AE820B0C1AF9FEF35E3644C695511476274BD16E3D2E6FD4E559944E8AC96D82E71E99DEF0CBD2BEC987E1B9A1319F
2,731,417 UART: mbox::rt_entry...
2,731,789 UART: ____ _ _ _ ____ _____
2,732,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,373 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,141 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,909 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,677 UART: |_|
2,735,989 UART:
2,842,894 UART: [rt] Runtime listening for mailbox commands...
2,843,656 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,771 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,865 UART:
2,843,881 UART: Running Caliptra ROM ...
2,844,289 UART:
2,844,344 UART: [state] CFI Enabled
2,847,237 UART: [state] LifecycleState = Production
2,847,845 UART: [state] DebugLocked = Yes
2,848,547 UART: [state] Starting the WD Timer 40000000 cycles
2,850,144 UART: [kat] SHA2-256
3,653,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,823 UART: [kat] ++
3,657,975 UART: [kat] sha1
3,662,111 UART: [kat] SHA2-256
3,664,051 UART: [kat] SHA2-384
3,666,756 UART: [kat] SHA2-512-ACC
3,668,657 UART: [kat] ECC-384
3,678,330 UART: [kat] HMAC-384Kdf
3,682,784 UART: [kat] LMS
3,931,096 UART: [kat] --
3,932,206 UART: [warm-reset] ++
3,933,191 UART: [warm-reset] --
3,933,834 UART: [state] Locking Datavault
3,934,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,200 UART: [state] Locking ICCM
3,935,730 UART: [exit] Launching FMC @ 0x40000130
3,941,059 UART:
3,941,075 UART: Running Caliptra FMC ...
3,941,483 UART:
3,941,537 UART: [state] CFI Enabled
3,942,840 UART: [aliasrt :skip pcr extension
3,943,313 UART: [art] Extend RT PCRs Done
3,943,741 UART: [art] Lock RT PCRs Done
3,944,976 UART: [art] Populate DV Done
3,953,182 UART: [fht] FMC Alias Private Key: 7
3,954,360 UART: [art] Derive CDI
3,954,640 UART: [art] Store in in slot 0x4
4,039,997 UART: [art] Derive Key Pair
4,040,357 UART: [art] Store priv key in slot 0x5
4,053,381 UART: [art] Derive Key Pair - Done
4,068,110 UART: [art] Signing Cert with AUTHO
4,068,590 UART: RITY.KEYID = 7
4,083,676 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,441 UART: [art] PUB.X = 9A78AA140E1E52C2908C45141D73DBB23C6CDCADADE4E6D3F1A933877D4F4362633FFEB0B9E6DAE45C6EB1015807D232
4,091,218 UART: [art] PUB.Y = 8DAA1639FC74CA79FF1F0C0E9D223E21944E3FF927D77DDA7C4DCAE8F872F3FEC762292F9A9C811E1FB21F991B9B057A
4,098,179 UART: [art] SIG.R = 2A1402BD201F618D3DA3B756A5232C4B1784F334DB6616975A7566E99CB9796498600819BCD63C80A631838849C0161C
4,104,931 UART: [art] SIG.S = 04AE820B0C1AF9FEF35E3644C695511476274BD16E3D2E6FD4E559944E8AC96D82E71E99DEF0CBD2BEC987E1B9A1319F
4,128,863 UART: mbox::rt_entry...
4,129,235 UART: ____ _ _ _ ____ _____
4,130,019 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,819 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,587 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,123 UART: |_|
4,133,435 UART:
4,414,908 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,599 UART: [state] LifecycleState = Production
85,207 UART: [state] DebugLocked = Yes
85,909 UART: [state] Starting the WD Timer 40000000 cycles
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,156 UART: [fht] FHT @ 0x50003400
1,172,730 UART: [idev] ++
1,172,898 UART: [idev] CDI.KEYID = 6
1,173,259 UART: [idev] SUBJECT.KEYID = 7
1,173,684 UART: [idev] UDS.KEYID = 0
1,174,030 ready_for_fw is high
1,174,030 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,982 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,541 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,411 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,117 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,019 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,282,108 UART: [fwproc] Recv command 0x46574c44
1,282,841 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,971 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,424 >>> mbox cmd response: success
2,338,614 UART: [afmc] ++
2,338,782 UART: [afmc] CDI.KEYID = 6
2,339,145 UART: [afmc] SUBJECT.KEYID = 7
2,339,571 UART: [afmc] AUTHORITY.KEYID = 5
2,374,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,129 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,848 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,741 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,448 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,291 UART: [afmc] --
2,418,236 UART: [cold-reset] --
2,419,120 UART: [state] Locking Datavault
2,420,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,883 UART: [state] Locking ICCM
2,421,467 UART: [exit] Launching FMC @ 0x40000130
2,426,796 UART:
2,426,812 UART: Running Caliptra FMC ...
2,427,220 UART:
2,427,274 UART: [state] CFI Enabled
2,437,557 UART: [fht] FMC Alias Private Key: 7
2,545,096 UART: [art] Extend RT PCRs Done
2,545,524 UART: [art] Lock RT PCRs Done
2,547,010 UART: [art] Populate DV Done
2,555,526 UART: [fht] FMC Alias Private Key: 7
2,556,664 UART: [art] Derive CDI
2,556,944 UART: [art] Store in in slot 0x4
2,642,643 UART: [art] Derive Key Pair
2,643,003 UART: [art] Store priv key in slot 0x5
2,656,163 UART: [art] Derive Key Pair - Done
2,671,016 UART: [art] Signing Cert with AUTHO
2,671,496 UART: RITY.KEYID = 7
2,686,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,435 UART: [art] PUB.X = 1C8AE9BFEFD935CF1479A42DC436C0D72B9F1FE55C09C208614289F0449ABD6ABBD45877AF8784CBEB32806A7327404B
2,694,211 UART: [art] PUB.Y = 47347D6BF57FB897FB697011DE07D3829841BA9CAFC8D51B1DA6EA7A3B1AAC0363D0C8E71EB6B113B0704555CDDB65AC
2,701,173 UART: [art] SIG.R = 834E6FA7C6EBAE206E1EBD901D537727436EC6983E734D00B44C3B2F1084756D9E13B801CC209D12422E9D631698D69F
2,707,918 UART: [art] SIG.S = EF67ADC92A54A16F5C05842781F76D68A7EBBD5AD54F9391EF5C4A941B4E4C92E160C1476C291C647E353E0CB97FD52C
2,731,555 UART: mbox::rt_entry...
2,731,927 UART: ____ _ _ _ ____ _____
2,732,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,815 UART: |_|
2,736,127 UART:
2,842,585 UART: [rt] Runtime listening for mailbox commands...
2,843,347 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,462 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,556 UART:
2,843,572 UART: Running Caliptra ROM ...
2,843,980 UART:
2,844,035 UART: [state] CFI Enabled
2,847,070 UART: [state] LifecycleState = Production
2,847,678 UART: [state] DebugLocked = Yes
2,848,404 UART: [state] Starting the WD Timer 40000000 cycles
2,850,115 UART: [kat] SHA2-256
3,653,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,794 UART: [kat] ++
3,657,946 UART: [kat] sha1
3,662,362 UART: [kat] SHA2-256
3,664,302 UART: [kat] SHA2-384
3,666,885 UART: [kat] SHA2-512-ACC
3,668,786 UART: [kat] ECC-384
3,678,377 UART: [kat] HMAC-384Kdf
3,683,149 UART: [kat] LMS
3,931,461 UART: [kat] --
3,932,425 UART: [warm-reset] ++
3,933,260 UART: [warm-reset] --
3,934,177 UART: [state] Locking Datavault
3,935,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,773 UART: [state] Locking ICCM
3,936,417 UART: [exit] Launching FMC @ 0x40000130
3,941,746 UART:
3,941,762 UART: Running Caliptra FMC ...
3,942,170 UART:
3,942,224 UART: [state] CFI Enabled
3,943,379 UART: [aliasrt :skip pcr extension
3,943,852 UART: [art] Extend RT PCRs Done
3,944,280 UART: [art] Lock RT PCRs Done
3,945,629 UART: [art] Populate DV Done
3,953,955 UART: [fht] FMC Alias Private Key: 7
3,954,911 UART: [art] Derive CDI
3,955,191 UART: [art] Store in in slot 0x4
4,040,492 UART: [art] Derive Key Pair
4,040,852 UART: [art] Store priv key in slot 0x5
4,054,174 UART: [art] Derive Key Pair - Done
4,068,851 UART: [art] Signing Cert with AUTHO
4,069,331 UART: RITY.KEYID = 7
4,084,415 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,180 UART: [art] PUB.X = 1C8AE9BFEFD935CF1479A42DC436C0D72B9F1FE55C09C208614289F0449ABD6ABBD45877AF8784CBEB32806A7327404B
4,091,956 UART: [art] PUB.Y = 47347D6BF57FB897FB697011DE07D3829841BA9CAFC8D51B1DA6EA7A3B1AAC0363D0C8E71EB6B113B0704555CDDB65AC
4,098,918 UART: [art] SIG.R = 834E6FA7C6EBAE206E1EBD901D537727436EC6983E734D00B44C3B2F1084756D9E13B801CC209D12422E9D631698D69F
4,105,663 UART: [art] SIG.S = EF67ADC92A54A16F5C05842781F76D68A7EBBD5AD54F9391EF5C4A941B4E4C92E160C1476C291C647E353E0CB97FD52C
4,129,360 UART: mbox::rt_entry...
4,129,732 UART: ____ _ _ _ ____ _____
4,130,516 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,316 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,084 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,852 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,620 UART: |_|
4,133,932 UART:
4,413,632 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,616 UART: [state] LifecycleState = Production
86,224 UART: [state] DebugLocked = Yes
86,936 UART: [state] Starting the WD Timer 40000000 cycles
88,577 UART: [kat] SHA2-256
892,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,256 UART: [kat] ++
896,408 UART: [kat] sha1
900,748 UART: [kat] SHA2-256
902,688 UART: [kat] SHA2-384
905,417 UART: [kat] SHA2-512-ACC
907,318 UART: [kat] ECC-384
917,133 UART: [kat] HMAC-384Kdf
921,929 UART: [kat] LMS
1,170,241 UART: [kat] --
1,171,140 UART: [cold-reset] ++
1,171,663 UART: [fht] FHT @ 0x50003400
1,174,523 UART: [idev] ++
1,174,691 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,477 UART: [idev] UDS.KEYID = 0
1,175,823 ready_for_fw is high
1,175,823 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,117 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,308 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,178 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,884 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,044 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,282,981 UART: [fwproc] Recv command 0x46574c44
1,283,714 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,450 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,751 >>> mbox cmd response: success
2,336,769 UART: [afmc] ++
2,336,937 UART: [afmc] CDI.KEYID = 6
2,337,300 UART: [afmc] SUBJECT.KEYID = 7
2,337,726 UART: [afmc] AUTHORITY.KEYID = 5
2,373,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,640 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,359 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,252 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,959 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,946 UART: [afmc] --
2,416,849 UART: [cold-reset] --
2,417,499 UART: [state] Locking Datavault
2,418,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,486 UART: [state] Locking ICCM
2,420,154 UART: [exit] Launching FMC @ 0x40000130
2,425,483 UART:
2,425,499 UART: Running Caliptra FMC ...
2,425,907 UART:
2,426,050 UART: [state] CFI Enabled
2,436,537 UART: [fht] FMC Alias Private Key: 7
2,544,144 UART: [art] Extend RT PCRs Done
2,544,572 UART: [art] Lock RT PCRs Done
2,545,986 UART: [art] Populate DV Done
2,554,156 UART: [fht] FMC Alias Private Key: 7
2,555,088 UART: [art] Derive CDI
2,555,368 UART: [art] Store in in slot 0x4
2,641,121 UART: [art] Derive Key Pair
2,641,481 UART: [art] Store priv key in slot 0x5
2,655,291 UART: [art] Derive Key Pair - Done
2,670,123 UART: [art] Signing Cert with AUTHO
2,670,603 UART: RITY.KEYID = 7
2,685,717 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,482 UART: [art] PUB.X = B42776101858A26A87FBFD0A4216F95569E56F2EC11E931964D63AD06935201A2CF0D112992552EC1C9B961ADDD23FD9
2,693,249 UART: [art] PUB.Y = C6A8B53F09013A5E34F8F448F7B946922B1D0C94E714AC92B70C398C7FF42871942B3D770CC72A3446CAA82A4D4867AB
2,700,188 UART: [art] SIG.R = F7441A9F084AE01B9B005594D1A07FFDF7E82174A4D5CF0DB7830A9D2A1B5C0FD4B2EDA060C3DF8EC4C2C136C7D1BD11
2,706,946 UART: [art] SIG.S = CB8EDDEF6C24861EEB6873F2F6BF3F3EAA50BBB02DA0868B2B7F48ED9A7F7D4D89D3E14646D76BEC72FABCB6BA2E2E6C
2,730,995 UART: mbox::rt_entry...
2,731,367 UART: ____ _ _ _ ____ _____
2,732,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,255 UART: |_|
2,735,567 UART:
2,842,207 UART: [rt] Runtime listening for mailbox commands...
2,842,969 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,084 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,178 UART:
2,843,194 UART: Running Caliptra ROM ...
2,843,602 UART:
2,843,744 UART: [state] CFI Enabled
2,846,635 UART: [state] LifecycleState = Production
2,847,243 UART: [state] DebugLocked = Yes
2,847,753 UART: [state] Starting the WD Timer 40000000 cycles
2,849,406 UART: [kat] SHA2-256
3,652,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,085 UART: [kat] ++
3,657,237 UART: [kat] sha1
3,661,549 UART: [kat] SHA2-256
3,663,489 UART: [kat] SHA2-384
3,666,220 UART: [kat] SHA2-512-ACC
3,668,121 UART: [kat] ECC-384
3,677,824 UART: [kat] HMAC-384Kdf
3,682,442 UART: [kat] LMS
3,930,754 UART: [kat] --
3,931,692 UART: [warm-reset] ++
3,932,559 UART: [warm-reset] --
3,933,450 UART: [state] Locking Datavault
3,934,248 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,852 UART: [state] Locking ICCM
3,935,428 UART: [exit] Launching FMC @ 0x40000130
3,940,757 UART:
3,940,773 UART: Running Caliptra FMC ...
3,941,181 UART:
3,941,324 UART: [state] CFI Enabled
3,942,819 UART: [aliasrt :skip pcr extension
3,943,292 UART: [art] Extend RT PCRs Done
3,943,720 UART: [art] Lock RT PCRs Done
3,945,283 UART: [art] Populate DV Done
3,953,587 UART: [fht] FMC Alias Private Key: 7
3,954,521 UART: [art] Derive CDI
3,954,801 UART: [art] Store in in slot 0x4
4,040,594 UART: [art] Derive Key Pair
4,040,954 UART: [art] Store priv key in slot 0x5
4,054,082 UART: [art] Derive Key Pair - Done
4,068,674 UART: [art] Signing Cert with AUTHO
4,069,154 UART: RITY.KEYID = 7
4,084,504 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,269 UART: [art] PUB.X = B42776101858A26A87FBFD0A4216F95569E56F2EC11E931964D63AD06935201A2CF0D112992552EC1C9B961ADDD23FD9
4,092,036 UART: [art] PUB.Y = C6A8B53F09013A5E34F8F448F7B946922B1D0C94E714AC92B70C398C7FF42871942B3D770CC72A3446CAA82A4D4867AB
4,098,975 UART: [art] SIG.R = F7441A9F084AE01B9B005594D1A07FFDF7E82174A4D5CF0DB7830A9D2A1B5C0FD4B2EDA060C3DF8EC4C2C136C7D1BD11
4,105,733 UART: [art] SIG.S = CB8EDDEF6C24861EEB6873F2F6BF3F3EAA50BBB02DA0868B2B7F48ED9A7F7D4D89D3E14646D76BEC72FABCB6BA2E2E6C
4,129,466 UART: mbox::rt_entry...
4,129,838 UART: ____ _ _ _ ____ _____
4,130,622 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,422 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,958 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,726 UART: |_|
4,134,038 UART:
4,415,010 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,144 UART: [state] LifecycleState = Production
86,752 UART: [state] DebugLocked = Yes
87,272 UART: [state] Starting the WD Timer 40000000 cycles
88,943 UART: [kat] SHA2-256
892,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,622 UART: [kat] ++
896,774 UART: [kat] sha1
900,912 UART: [kat] SHA2-256
902,852 UART: [kat] SHA2-384
905,571 UART: [kat] SHA2-512-ACC
907,472 UART: [kat] ECC-384
917,095 UART: [kat] HMAC-384Kdf
921,803 UART: [kat] LMS
1,170,115 UART: [kat] --
1,171,006 UART: [cold-reset] ++
1,171,387 UART: [fht] FHT @ 0x50003400
1,174,139 UART: [idev] ++
1,174,307 UART: [idev] CDI.KEYID = 6
1,174,668 UART: [idev] SUBJECT.KEYID = 7
1,175,093 UART: [idev] UDS.KEYID = 0
1,175,439 ready_for_fw is high
1,175,439 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,200,089 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,243,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,642 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,512 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,218 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,284 UART: [ldev] --
1,282,740 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,292 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,306 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,807 >>> mbox cmd response: success
2,339,061 UART: [afmc] ++
2,339,229 UART: [afmc] CDI.KEYID = 6
2,339,592 UART: [afmc] SUBJECT.KEYID = 7
2,340,018 UART: [afmc] AUTHORITY.KEYID = 5
2,375,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,792 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,511 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,404 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,111 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,990 UART: [afmc] --
2,418,947 UART: [cold-reset] --
2,419,753 UART: [state] Locking Datavault
2,420,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,440 UART: [state] Locking ICCM
2,422,088 UART: [exit] Launching FMC @ 0x40000130
2,427,417 UART:
2,427,433 UART: Running Caliptra FMC ...
2,427,841 UART:
2,427,984 UART: [state] CFI Enabled
2,438,835 UART: [fht] FMC Alias Private Key: 7
2,546,578 UART: [art] Extend RT PCRs Done
2,547,006 UART: [art] Lock RT PCRs Done
2,548,650 UART: [art] Populate DV Done
2,556,826 UART: [fht] FMC Alias Private Key: 7
2,557,916 UART: [art] Derive CDI
2,558,196 UART: [art] Store in in slot 0x4
2,643,809 UART: [art] Derive Key Pair
2,644,169 UART: [art] Store priv key in slot 0x5
2,657,739 UART: [art] Derive Key Pair - Done
2,672,376 UART: [art] Signing Cert with AUTHO
2,672,856 UART: RITY.KEYID = 7
2,688,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,791 UART: [art] PUB.X = 9F2241067375918D5AE65C5B11796B117515E26021721C0DEA906213FF6DD28D4F162721772A6140B01464F287C528B0
2,695,539 UART: [art] PUB.Y = 47A0D1A7B842760D24BD8FE389B9C3977EFE6946559268BE4F0741468B80D3B529422A29EE2F00F26387AD0041EF020E
2,702,431 UART: [art] SIG.R = 29B2AAA9AA90B4E52094D7C5AAE6F11A35F5806405FEC5B4FA3F3B09DB36B317AD50C63D2392325ADD0A21E898A02257
2,709,204 UART: [art] SIG.S = A0BCDD8096C4A8F62D2664F3040C89ED464D03360C1C7FE83A0462E6B04879134FF0C43F685650B679378798A836334E
2,733,124 UART: mbox::rt_entry...
2,733,496 UART: ____ _ _ _ ____ _____
2,734,280 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,616 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,384 UART: |_|
2,737,696 UART:
2,844,212 UART: [rt] Runtime listening for mailbox commands...
2,844,974 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,089 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,183 UART:
2,845,199 UART: Running Caliptra ROM ...
2,845,607 UART:
2,845,749 UART: [state] CFI Enabled
2,848,410 UART: [state] LifecycleState = Production
2,849,018 UART: [state] DebugLocked = Yes
2,849,624 UART: [state] Starting the WD Timer 40000000 cycles
2,851,277 UART: [kat] SHA2-256
3,654,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,956 UART: [kat] ++
3,659,108 UART: [kat] sha1
3,663,382 UART: [kat] SHA2-256
3,665,322 UART: [kat] SHA2-384
3,668,067 UART: [kat] SHA2-512-ACC
3,669,968 UART: [kat] ECC-384
3,679,955 UART: [kat] HMAC-384Kdf
3,684,477 UART: [kat] LMS
3,932,789 UART: [kat] --
3,933,435 UART: [warm-reset] ++
3,934,350 UART: [warm-reset] --
3,935,145 UART: [state] Locking Datavault
3,935,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,555 UART: [state] Locking ICCM
3,937,169 UART: [exit] Launching FMC @ 0x40000130
3,942,498 UART:
3,942,514 UART: Running Caliptra FMC ...
3,942,922 UART:
3,943,065 UART: [state] CFI Enabled
3,944,446 UART: [aliasrt :skip pcr extension
3,944,919 UART: [art] Extend RT PCRs Done
3,945,347 UART: [art] Lock RT PCRs Done
3,946,450 UART: [art] Populate DV Done
3,954,538 UART: [fht] FMC Alias Private Key: 7
3,955,494 UART: [art] Derive CDI
3,955,774 UART: [art] Store in in slot 0x4
4,041,293 UART: [art] Derive Key Pair
4,041,653 UART: [art] Store priv key in slot 0x5
4,055,653 UART: [art] Derive Key Pair - Done
4,070,394 UART: [art] Signing Cert with AUTHO
4,070,874 UART: RITY.KEYID = 7
4,086,044 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,809 UART: [art] PUB.X = 9F2241067375918D5AE65C5B11796B117515E26021721C0DEA906213FF6DD28D4F162721772A6140B01464F287C528B0
4,093,557 UART: [art] PUB.Y = 47A0D1A7B842760D24BD8FE389B9C3977EFE6946559268BE4F0741468B80D3B529422A29EE2F00F26387AD0041EF020E
4,100,449 UART: [art] SIG.R = 29B2AAA9AA90B4E52094D7C5AAE6F11A35F5806405FEC5B4FA3F3B09DB36B317AD50C63D2392325ADD0A21E898A02257
4,107,222 UART: [art] SIG.S = A0BCDD8096C4A8F62D2664F3040C89ED464D03360C1C7FE83A0462E6B04879134FF0C43F685650B679378798A836334E
4,130,772 UART: mbox::rt_entry...
4,131,144 UART: ____ _ _ _ ____ _____
4,131,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,728 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,032 UART: |_|
4,135,344 UART:
4,415,354 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Production
85,753 UART: [state] DebugLocked = Yes
86,305 UART: [state] Starting the WD Timer 40000000 cycles
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,312 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,179 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,209,200 UART: [ldev] ++
1,209,368 UART: [ldev] CDI.KEYID = 6
1,209,732 UART: [ldev] SUBJECT.KEYID = 5
1,210,159 UART: [ldev] AUTHORITY.KEYID = 7
1,210,622 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,021 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,715 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,585 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,291 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,443 UART: [ldev] --
1,280,795 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,993 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,460 >>> mbox cmd response: success
2,336,656 UART: [afmc] ++
2,336,824 UART: [afmc] CDI.KEYID = 6
2,337,187 UART: [afmc] SUBJECT.KEYID = 7
2,337,613 UART: [afmc] AUTHORITY.KEYID = 5
2,373,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,597 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,316 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,209 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,916 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,883 UART: [afmc] --
2,416,914 UART: [cold-reset] --
2,417,708 UART: [state] Locking Datavault
2,418,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,501 UART: [state] Locking ICCM
2,419,937 UART: [exit] Launching FMC @ 0x40000130
2,425,266 UART:
2,425,282 UART: Running Caliptra FMC ...
2,425,690 UART:
2,425,744 UART: [state] CFI Enabled
2,436,143 UART: [fht] FMC Alias Private Key: 7
2,544,224 UART: [art] Extend RT PCRs Done
2,544,652 UART: [art] Lock RT PCRs Done
2,546,062 UART: [art] Populate DV Done
2,554,462 UART: [fht] FMC Alias Private Key: 7
2,555,516 UART: [art] Derive CDI
2,555,796 UART: [art] Store in in slot 0x4
2,641,847 UART: [art] Derive Key Pair
2,642,207 UART: [art] Store priv key in slot 0x5
2,654,809 UART: [art] Derive Key Pair - Done
2,669,308 UART: [art] Signing Cert with AUTHO
2,669,788 UART: RITY.KEYID = 7
2,685,014 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,779 UART: [art] PUB.X = 6769826C5854D0629E14CB83F9A7FE0D5E43D734020A56272CC3B34CC2BAC4AB273CE07E7CFB898E760471523631738E
2,692,537 UART: [art] PUB.Y = AB400581DB665BCD8E6754E278CCA9739DE053ABE3409B2964E97DE74305EF9775B0196B585E6C771F3A372FC8E6FA62
2,699,487 UART: [art] SIG.R = 4E24E081FC01A260436DC137C10D6EBA3466B906196A219CAF61A4C1A8945D0B542DB5736889A2F0DD23EBA0A3EC95E5
2,706,253 UART: [art] SIG.S = DD9E2756184F3B36FB6B753156E9FEFF1012C61C8305DFF48FC59C7462C0527C4E52E104A5ED62D38B7C8BA858C6E572
2,730,066 UART: mbox::rt_entry...
2,730,438 UART: ____ _ _ _ ____ _____
2,731,222 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,022 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,790 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,558 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,326 UART: |_|
2,734,638 UART:
2,841,492 UART: [rt] Runtime listening for mailbox commands...
2,842,254 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,369 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,463 UART:
2,842,479 UART: Running Caliptra ROM ...
2,842,887 UART:
2,842,942 UART: [state] CFI Enabled
2,845,389 UART: [state] LifecycleState = Production
2,845,997 UART: [state] DebugLocked = Yes
2,846,585 UART: [state] Starting the WD Timer 40000000 cycles
2,848,206 UART: [kat] SHA2-256
3,651,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,885 UART: [kat] ++
3,656,037 UART: [kat] sha1
3,660,361 UART: [kat] SHA2-256
3,662,301 UART: [kat] SHA2-384
3,665,116 UART: [kat] SHA2-512-ACC
3,667,017 UART: [kat] ECC-384
3,677,354 UART: [kat] HMAC-384Kdf
3,681,904 UART: [kat] LMS
3,930,216 UART: [kat] --
3,931,210 UART: [warm-reset] ++
3,932,139 UART: [warm-reset] --
3,932,768 UART: [state] Locking Datavault
3,933,610 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,214 UART: [state] Locking ICCM
3,934,718 UART: [exit] Launching FMC @ 0x40000130
3,940,047 UART:
3,940,063 UART: Running Caliptra FMC ...
3,940,471 UART:
3,940,525 UART: [state] CFI Enabled
3,942,056 UART: [aliasrt :skip pcr extension
3,942,529 UART: [art] Extend RT PCRs Done
3,942,957 UART: [art] Lock RT PCRs Done
3,944,336 UART: [art] Populate DV Done
3,952,952 UART: [fht] FMC Alias Private Key: 7
3,953,944 UART: [art] Derive CDI
3,954,224 UART: [art] Store in in slot 0x4
4,039,851 UART: [art] Derive Key Pair
4,040,211 UART: [art] Store priv key in slot 0x5
4,053,757 UART: [art] Derive Key Pair - Done
4,068,948 UART: [art] Signing Cert with AUTHO
4,069,428 UART: RITY.KEYID = 7
4,084,758 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,523 UART: [art] PUB.X = 6769826C5854D0629E14CB83F9A7FE0D5E43D734020A56272CC3B34CC2BAC4AB273CE07E7CFB898E760471523631738E
4,092,281 UART: [art] PUB.Y = AB400581DB665BCD8E6754E278CCA9739DE053ABE3409B2964E97DE74305EF9775B0196B585E6C771F3A372FC8E6FA62
4,099,231 UART: [art] SIG.R = 4E24E081FC01A260436DC137C10D6EBA3466B906196A219CAF61A4C1A8945D0B542DB5736889A2F0DD23EBA0A3EC95E5
4,105,997 UART: [art] SIG.S = DD9E2756184F3B36FB6B753156E9FEFF1012C61C8305DFF48FC59C7462C0527C4E52E104A5ED62D38B7C8BA858C6E572
4,129,566 UART: mbox::rt_entry...
4,129,938 UART: ____ _ _ _ ____ _____
4,130,722 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,290 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,058 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,826 UART: |_|
4,134,138 UART:
4,414,784 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Production
85,871 UART: [state] DebugLocked = Yes
86,467 UART: [state] Starting the WD Timer 40000000 cycles
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,987 UART: [idev] Erasing UDS.KEYID = 0
1,198,900 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,619 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,489 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,195 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,203 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,987 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,392 >>> mbox cmd response: success
2,336,658 UART: [afmc] ++
2,336,826 UART: [afmc] CDI.KEYID = 6
2,337,189 UART: [afmc] SUBJECT.KEYID = 7
2,337,615 UART: [afmc] AUTHORITY.KEYID = 5
2,372,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,061 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,780 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,673 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,380 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,303 UART: [afmc] --
2,416,340 UART: [cold-reset] --
2,417,244 UART: [state] Locking Datavault
2,418,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,073 UART: [state] Locking ICCM
2,419,541 UART: [exit] Launching FMC @ 0x40000130
2,424,870 UART:
2,424,886 UART: Running Caliptra FMC ...
2,425,294 UART:
2,425,348 UART: [state] CFI Enabled
2,436,063 UART: [fht] FMC Alias Private Key: 7
2,543,958 UART: [art] Extend RT PCRs Done
2,544,386 UART: [art] Lock RT PCRs Done
2,545,908 UART: [art] Populate DV Done
2,554,372 UART: [fht] FMC Alias Private Key: 7
2,555,430 UART: [art] Derive CDI
2,555,710 UART: [art] Store in in slot 0x4
2,641,451 UART: [art] Derive Key Pair
2,641,811 UART: [art] Store priv key in slot 0x5
2,655,407 UART: [art] Derive Key Pair - Done
2,670,281 UART: [art] Signing Cert with AUTHO
2,670,761 UART: RITY.KEYID = 7
2,685,847 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,612 UART: [art] PUB.X = 18757055048F9C3373FE79DC4BAE23803F4E491EF56DAB36CC1D02F1AA62796E7D8ECBA50C2F9D69A9E30D28C097E7E4
2,693,382 UART: [art] PUB.Y = 790CC0247F5C2AA41DA9CB3998D9EB64213CB9CC78FE2461B281C5999DB64397C73278C817098B1FC56E9C2FDD54C4D8
2,700,334 UART: [art] SIG.R = 1B6899314066A80C26DAA36CF6AB04BEDD10D566167E42282C115D6D0A5FA091355196D17CA2442DE22988059EA25C1C
2,707,092 UART: [art] SIG.S = 9F31821E1BA261549F87FFB7B057D11923F8D7014F09364B79E6254FFDBF85C913A20773C4842AB03EC0A5A2893AE7B9
2,730,010 UART: mbox::rt_entry...
2,730,382 UART: ____ _ _ _ ____ _____
2,731,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,734 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,502 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,270 UART: |_|
2,734,582 UART:
2,841,374 UART: [rt] Runtime listening for mailbox commands...
2,842,136 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,251 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,345 UART:
2,842,361 UART: Running Caliptra ROM ...
2,842,769 UART:
2,842,824 UART: [state] CFI Enabled
2,845,589 UART: [state] LifecycleState = Production
2,846,197 UART: [state] DebugLocked = Yes
2,846,731 UART: [state] Starting the WD Timer 40000000 cycles
2,848,418 UART: [kat] SHA2-256
3,651,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,097 UART: [kat] ++
3,656,249 UART: [kat] sha1
3,660,319 UART: [kat] SHA2-256
3,662,259 UART: [kat] SHA2-384
3,665,044 UART: [kat] SHA2-512-ACC
3,666,945 UART: [kat] ECC-384
3,676,968 UART: [kat] HMAC-384Kdf
3,681,496 UART: [kat] LMS
3,929,808 UART: [kat] --
3,930,732 UART: [warm-reset] ++
3,931,647 UART: [warm-reset] --
3,932,564 UART: [state] Locking Datavault
3,933,338 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,942 UART: [state] Locking ICCM
3,934,602 UART: [exit] Launching FMC @ 0x40000130
3,939,931 UART:
3,939,947 UART: Running Caliptra FMC ...
3,940,355 UART:
3,940,409 UART: [state] CFI Enabled
3,941,480 UART: [aliasrt :skip pcr extension
3,941,953 UART: [art] Extend RT PCRs Done
3,942,381 UART: [art] Lock RT PCRs Done
3,943,718 UART: [art] Populate DV Done
3,952,152 UART: [fht] FMC Alias Private Key: 7
3,953,314 UART: [art] Derive CDI
3,953,594 UART: [art] Store in in slot 0x4
4,039,563 UART: [art] Derive Key Pair
4,039,923 UART: [art] Store priv key in slot 0x5
4,052,987 UART: [art] Derive Key Pair - Done
4,067,883 UART: [art] Signing Cert with AUTHO
4,068,363 UART: RITY.KEYID = 7
4,083,119 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,884 UART: [art] PUB.X = 18757055048F9C3373FE79DC4BAE23803F4E491EF56DAB36CC1D02F1AA62796E7D8ECBA50C2F9D69A9E30D28C097E7E4
4,090,654 UART: [art] PUB.Y = 790CC0247F5C2AA41DA9CB3998D9EB64213CB9CC78FE2461B281C5999DB64397C73278C817098B1FC56E9C2FDD54C4D8
4,097,606 UART: [art] SIG.R = 1B6899314066A80C26DAA36CF6AB04BEDD10D566167E42282C115D6D0A5FA091355196D17CA2442DE22988059EA25C1C
4,104,364 UART: [art] SIG.S = 9F31821E1BA261549F87FFB7B057D11923F8D7014F09364B79E6254FFDBF85C913A20773C4842AB03EC0A5A2893AE7B9
4,127,792 UART: mbox::rt_entry...
4,128,164 UART: ____ _ _ _ ____ _____
4,128,948 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,748 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,516 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,284 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,052 UART: |_|
4,132,364 UART:
4,410,174 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Production
86,198 UART: [state] DebugLocked = Yes
86,840 UART: [state] Starting the WD Timer 40000000 cycles
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,066 UART: [kat] ++
896,218 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,530 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,174,955 ready_for_fw is high
1,174,955 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,662 UART: [idev] Erasing UDS.KEYID = 0
1,199,917 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,210,075 UART: [ldev] ++
1,210,243 UART: [ldev] CDI.KEYID = 6
1,210,607 UART: [ldev] SUBJECT.KEYID = 5
1,211,034 UART: [ldev] AUTHORITY.KEYID = 7
1,211,497 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,918 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,788 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,494 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,686 UART: [ldev] --
1,281,986 UART: [fwproc] Wait for Commands...
1,282,619 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,978 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,391 >>> mbox cmd response: success
2,337,581 UART: [afmc] ++
2,337,749 UART: [afmc] CDI.KEYID = 6
2,338,112 UART: [afmc] SUBJECT.KEYID = 7
2,338,538 UART: [afmc] AUTHORITY.KEYID = 5
2,374,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,738 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,457 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,350 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,057 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,120 UART: [afmc] --
2,418,017 UART: [cold-reset] --
2,418,985 UART: [state] Locking Datavault
2,419,892 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,496 UART: [state] Locking ICCM
2,420,998 UART: [exit] Launching FMC @ 0x40000130
2,426,327 UART:
2,426,343 UART: Running Caliptra FMC ...
2,426,751 UART:
2,426,894 UART: [state] CFI Enabled
2,437,589 UART: [fht] FMC Alias Private Key: 7
2,546,086 UART: [art] Extend RT PCRs Done
2,546,514 UART: [art] Lock RT PCRs Done
2,547,966 UART: [art] Populate DV Done
2,556,072 UART: [fht] FMC Alias Private Key: 7
2,557,130 UART: [art] Derive CDI
2,557,410 UART: [art] Store in in slot 0x4
2,643,179 UART: [art] Derive Key Pair
2,643,539 UART: [art] Store priv key in slot 0x5
2,657,115 UART: [art] Derive Key Pair - Done
2,671,997 UART: [art] Signing Cert with AUTHO
2,672,477 UART: RITY.KEYID = 7
2,687,777 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,542 UART: [art] PUB.X = 1F63E3AC3DD912ADCE5FD0E4689BCCE023D2AFB7B428FEE8AB23F3019A067B6BB487AD1617F65E173F64A87C3FFFE531
2,695,330 UART: [art] PUB.Y = B5EBD14DBF8DB2949C3EB4EFDA003ECCA4CE9BB33685EDB8433AC0D3ACE937DF2E2E0C6925E375A3960D808C951369A5
2,702,276 UART: [art] SIG.R = 8D0737A427F9BEBA5EB03C3AB7791F689E4F3F504D26A6D21B16D09ED96997A24236474A58770753EC6C230932100A4C
2,709,032 UART: [art] SIG.S = 468CBE9A76876E086CCB730FC36C359D6042238D3413C1C97FE69D7CCC627AF53A908DACCBA5197E9DD3FE410287BB7A
2,732,420 UART: mbox::rt_entry...
2,732,792 UART: ____ _ _ _ ____ _____
2,733,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,376 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,144 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,912 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,680 UART: |_|
2,736,992 UART:
2,844,404 UART: [rt] Runtime listening for mailbox commands...
2,845,166 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,281 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,375 UART:
2,845,391 UART: Running Caliptra ROM ...
2,845,799 UART:
2,845,941 UART: [state] CFI Enabled
2,848,602 UART: [state] LifecycleState = Production
2,849,210 UART: [state] DebugLocked = Yes
2,849,772 UART: [state] Starting the WD Timer 40000000 cycles
2,851,387 UART: [kat] SHA2-256
3,654,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,066 UART: [kat] ++
3,659,218 UART: [kat] sha1
3,663,486 UART: [kat] SHA2-256
3,665,426 UART: [kat] SHA2-384
3,668,053 UART: [kat] SHA2-512-ACC
3,669,954 UART: [kat] ECC-384
3,679,827 UART: [kat] HMAC-384Kdf
3,684,327 UART: [kat] LMS
3,932,639 UART: [kat] --
3,933,289 UART: [warm-reset] ++
3,934,098 UART: [warm-reset] --
3,934,881 UART: [state] Locking Datavault
3,935,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,121 UART: [state] Locking ICCM
3,936,741 UART: [exit] Launching FMC @ 0x40000130
3,942,070 UART:
3,942,086 UART: Running Caliptra FMC ...
3,942,494 UART:
3,942,637 UART: [state] CFI Enabled
3,944,004 UART: [aliasrt :skip pcr extension
3,944,477 UART: [art] Extend RT PCRs Done
3,944,905 UART: [art] Lock RT PCRs Done
3,946,296 UART: [art] Populate DV Done
3,954,554 UART: [fht] FMC Alias Private Key: 7
3,955,716 UART: [art] Derive CDI
3,955,996 UART: [art] Store in in slot 0x4
4,041,599 UART: [art] Derive Key Pair
4,041,959 UART: [art] Store priv key in slot 0x5
4,055,415 UART: [art] Derive Key Pair - Done
4,070,661 UART: [art] Signing Cert with AUTHO
4,071,141 UART: RITY.KEYID = 7
4,086,421 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,186 UART: [art] PUB.X = 1F63E3AC3DD912ADCE5FD0E4689BCCE023D2AFB7B428FEE8AB23F3019A067B6BB487AD1617F65E173F64A87C3FFFE531
4,093,974 UART: [art] PUB.Y = B5EBD14DBF8DB2949C3EB4EFDA003ECCA4CE9BB33685EDB8433AC0D3ACE937DF2E2E0C6925E375A3960D808C951369A5
4,100,920 UART: [art] SIG.R = 8D0737A427F9BEBA5EB03C3AB7791F689E4F3F504D26A6D21B16D09ED96997A24236474A58770753EC6C230932100A4C
4,107,676 UART: [art] SIG.S = 468CBE9A76876E086CCB730FC36C359D6042238D3413C1C97FE69D7CCC627AF53A908DACCBA5197E9DD3FE410287BB7A
4,131,494 UART: mbox::rt_entry...
4,131,866 UART: ____ _ _ _ ____ _____
4,132,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,754 UART: |_|
4,136,066 UART:
4,418,058 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Production
86,198 UART: [state] DebugLocked = Yes
86,948 UART: [state] Starting the WD Timer 40000000 cycles
88,533 UART: [kat] SHA2-256
892,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,212 UART: [kat] ++
896,364 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,183 UART: [kat] SHA2-512-ACC
907,084 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,863 UART: [idev] ++
1,174,031 UART: [idev] CDI.KEYID = 6
1,174,392 UART: [idev] SUBJECT.KEYID = 7
1,174,817 UART: [idev] UDS.KEYID = 0
1,175,163 ready_for_fw is high
1,175,163 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,569 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,914 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,784 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,490 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,560 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,703 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,616 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,929 >>> mbox cmd response: success
2,338,101 UART: [afmc] ++
2,338,269 UART: [afmc] CDI.KEYID = 6
2,338,632 UART: [afmc] SUBJECT.KEYID = 7
2,339,058 UART: [afmc] AUTHORITY.KEYID = 5
2,374,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,740 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,459 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,352 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,059 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,898 UART: [afmc] --
2,417,855 UART: [cold-reset] --
2,418,611 UART: [state] Locking Datavault
2,419,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,490 UART: [state] Locking ICCM
2,421,128 UART: [exit] Launching FMC @ 0x40000130
2,426,457 UART:
2,426,473 UART: Running Caliptra FMC ...
2,426,881 UART:
2,427,024 UART: [state] CFI Enabled
2,438,123 UART: [fht] FMC Alias Private Key: 7
2,545,792 UART: [art] Extend RT PCRs Done
2,546,220 UART: [art] Lock RT PCRs Done
2,547,596 UART: [art] Populate DV Done
2,555,756 UART: [fht] FMC Alias Private Key: 7
2,556,704 UART: [art] Derive CDI
2,556,984 UART: [art] Store in in slot 0x4
2,642,707 UART: [art] Derive Key Pair
2,643,067 UART: [art] Store priv key in slot 0x5
2,656,251 UART: [art] Derive Key Pair - Done
2,671,168 UART: [art] Signing Cert with AUTHO
2,671,648 UART: RITY.KEYID = 7
2,687,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,935 UART: [art] PUB.X = 82A8EC4828B747D8042A5F5F13B093BD099EE8A69D318F738A52B1C52E23C80E6BD7336D6545B436BED3BF03D6E26087
2,694,697 UART: [art] PUB.Y = 02105880504F72455FD99EA30176D4AC9B122EB37964C67C474226DD887F7AE3C273C23DC48272A48914646393DA8A1A
2,701,633 UART: [art] SIG.R = 366BFA1CD5AB2B8C848E78C12FE69E3AD21A6FB51DC4A38E07131725A2F8B3C137774FD9B6072A7F1AAB5130CF6CB4CC
2,708,417 UART: [art] SIG.S = 48241A704BA37B8461B95776CB65BDA73275F066D39CF755F21C180FDDCC16063DCEB0EC2B494CA583462AD1EDD1B927
2,732,472 UART: mbox::rt_entry...
2,732,844 UART: ____ _ _ _ ____ _____
2,733,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,428 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,732 UART: |_|
2,737,044 UART:
2,844,229 UART: [rt] Runtime listening for mailbox commands...
2,844,991 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,106 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,200 UART:
2,845,216 UART: Running Caliptra ROM ...
2,845,624 UART:
2,845,766 UART: [state] CFI Enabled
2,848,341 UART: [state] LifecycleState = Production
2,848,949 UART: [state] DebugLocked = Yes
2,849,537 UART: [state] Starting the WD Timer 40000000 cycles
2,851,148 UART: [kat] SHA2-256
3,654,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,827 UART: [kat] ++
3,658,979 UART: [kat] sha1
3,663,055 UART: [kat] SHA2-256
3,664,995 UART: [kat] SHA2-384
3,667,680 UART: [kat] SHA2-512-ACC
3,669,581 UART: [kat] ECC-384
3,678,996 UART: [kat] HMAC-384Kdf
3,683,476 UART: [kat] LMS
3,931,788 UART: [kat] --
3,932,664 UART: [warm-reset] ++
3,933,617 UART: [warm-reset] --
3,934,300 UART: [state] Locking Datavault
3,935,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,698 UART: [state] Locking ICCM
3,936,308 UART: [exit] Launching FMC @ 0x40000130
3,941,637 UART:
3,941,653 UART: Running Caliptra FMC ...
3,942,061 UART:
3,942,204 UART: [state] CFI Enabled
3,943,459 UART: [aliasrt :skip pcr extension
3,943,932 UART: [art] Extend RT PCRs Done
3,944,360 UART: [art] Lock RT PCRs Done
3,945,543 UART: [art] Populate DV Done
3,954,045 UART: [fht] FMC Alias Private Key: 7
3,955,043 UART: [art] Derive CDI
3,955,323 UART: [art] Store in in slot 0x4
4,041,478 UART: [art] Derive Key Pair
4,041,838 UART: [art] Store priv key in slot 0x5
4,054,580 UART: [art] Derive Key Pair - Done
4,069,359 UART: [art] Signing Cert with AUTHO
4,069,839 UART: RITY.KEYID = 7
4,085,365 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,130 UART: [art] PUB.X = 82A8EC4828B747D8042A5F5F13B093BD099EE8A69D318F738A52B1C52E23C80E6BD7336D6545B436BED3BF03D6E26087
4,092,892 UART: [art] PUB.Y = 02105880504F72455FD99EA30176D4AC9B122EB37964C67C474226DD887F7AE3C273C23DC48272A48914646393DA8A1A
4,099,828 UART: [art] SIG.R = 366BFA1CD5AB2B8C848E78C12FE69E3AD21A6FB51DC4A38E07131725A2F8B3C137774FD9B6072A7F1AAB5130CF6CB4CC
4,106,612 UART: [art] SIG.S = 48241A704BA37B8461B95776CB65BDA73275F066D39CF755F21C180FDDCC16063DCEB0EC2B494CA583462AD1EDD1B927
4,130,393 UART: mbox::rt_entry...
4,130,765 UART: ____ _ _ _ ____ _____
4,131,549 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,653 UART: |_|
4,134,965 UART:
4,418,050 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Production
85,877 UART: [state] DebugLocked = Yes
86,543 UART: [state] Starting the WD Timer 40000000 cycles
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,233 UART: [kat] SHA2-256
902,173 UART: [kat] SHA2-384
904,754 UART: [kat] SHA2-512-ACC
906,655 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,224 UART: [kat] LMS
1,169,536 UART: [kat] --
1,170,517 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,175,040 ready_for_fw is high
1,175,040 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,780 UART: [idev] Sha1 KeyId Algorithm
1,208,621 UART: [idev] --
1,209,846 UART: [ldev] ++
1,210,014 UART: [ldev] CDI.KEYID = 6
1,210,378 UART: [ldev] SUBJECT.KEYID = 5
1,210,805 UART: [ldev] AUTHORITY.KEYID = 7
1,211,268 UART: [ldev] FE.KEYID = 1
1,216,750 UART: [ldev] Erasing FE.KEYID = 1
1,242,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,227 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,097 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,803 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,819 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,659 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,899 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,388 >>> mbox cmd response: success
2,339,536 UART: [afmc] ++
2,339,704 UART: [afmc] CDI.KEYID = 6
2,340,067 UART: [afmc] SUBJECT.KEYID = 7
2,340,493 UART: [afmc] AUTHORITY.KEYID = 5
2,376,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,803 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,522 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,415 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,122 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,197 UART: [afmc] --
2,420,116 UART: [cold-reset] --
2,420,760 UART: [state] Locking Datavault
2,422,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,687 UART: [state] Locking ICCM
2,423,345 UART: [exit] Launching FMC @ 0x40000130
2,428,674 UART:
2,428,690 UART: Running Caliptra FMC ...
2,429,098 UART:
2,429,152 UART: [state] CFI Enabled
2,439,605 UART: [fht] FMC Alias Private Key: 7
2,547,680 UART: [art] Extend RT PCRs Done
2,548,108 UART: [art] Lock RT PCRs Done
2,549,488 UART: [art] Populate DV Done
2,557,750 UART: [fht] FMC Alias Private Key: 7
2,558,820 UART: [art] Derive CDI
2,559,100 UART: [art] Store in in slot 0x4
2,644,541 UART: [art] Derive Key Pair
2,644,901 UART: [art] Store priv key in slot 0x5
2,657,765 UART: [art] Derive Key Pair - Done
2,672,354 UART: [art] Signing Cert with AUTHO
2,672,834 UART: RITY.KEYID = 7
2,688,140 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,905 UART: [art] PUB.X = 8A6ED377A137D69A8FB970AB28C99219973E0992B8E073C46D2821B2A85478E4E75BA67B84D577CBC1F2E058DC783D92
2,695,674 UART: [art] PUB.Y = F6E33E30B5B5DE85FAE80F602859EE7E97A9004446CB2459F5298A1EAD418ED12262846E2967E72449274E18073065DC
2,702,592 UART: [art] SIG.R = BE74184175931908AF9476FA3967FA53893D5EF019E9AD414FFC6189E0F2A7A7699606C02EB38C96DA177631D4541681
2,709,350 UART: [art] SIG.S = B6DBB98DE09511D2939A34C1EBD2EF8B350D4ED4F4F8A041AFA8D39DF6136B5C4557DD94FC04A6ECF6EB4C91772529D1
2,732,767 UART: mbox::rt_entry...
2,733,139 UART: ____ _ _ _ ____ _____
2,733,923 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,723 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,491 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,027 UART: |_|
2,737,339 UART:
2,843,059 UART: [rt] Runtime listening for mailbox commands...
2,843,821 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,936 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,030 UART:
2,844,046 UART: Running Caliptra ROM ...
2,844,454 UART:
2,844,509 UART: [state] CFI Enabled
2,846,808 UART: [state] LifecycleState = Production
2,847,416 UART: [state] DebugLocked = Yes
2,847,982 UART: [state] Starting the WD Timer 40000000 cycles
2,849,513 UART: [kat] SHA2-256
3,653,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,192 UART: [kat] ++
3,657,344 UART: [kat] sha1
3,661,680 UART: [kat] SHA2-256
3,663,620 UART: [kat] SHA2-384
3,666,311 UART: [kat] SHA2-512-ACC
3,668,212 UART: [kat] ECC-384
3,678,255 UART: [kat] HMAC-384Kdf
3,682,985 UART: [kat] LMS
3,931,297 UART: [kat] --
3,931,989 UART: [warm-reset] ++
3,932,938 UART: [warm-reset] --
3,933,957 UART: [state] Locking Datavault
3,934,715 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,319 UART: [state] Locking ICCM
3,935,937 UART: [exit] Launching FMC @ 0x40000130
3,941,266 UART:
3,941,282 UART: Running Caliptra FMC ...
3,941,690 UART:
3,941,744 UART: [state] CFI Enabled
3,943,007 UART: [aliasrt :skip pcr extension
3,943,480 UART: [art] Extend RT PCRs Done
3,943,908 UART: [art] Lock RT PCRs Done
3,945,235 UART: [art] Populate DV Done
3,953,277 UART: [fht] FMC Alias Private Key: 7
3,954,235 UART: [art] Derive CDI
3,954,515 UART: [art] Store in in slot 0x4
4,039,902 UART: [art] Derive Key Pair
4,040,262 UART: [art] Store priv key in slot 0x5
4,052,958 UART: [art] Derive Key Pair - Done
4,067,779 UART: [art] Signing Cert with AUTHO
4,068,259 UART: RITY.KEYID = 7
4,083,581 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,346 UART: [art] PUB.X = 8A6ED377A137D69A8FB970AB28C99219973E0992B8E073C46D2821B2A85478E4E75BA67B84D577CBC1F2E058DC783D92
4,091,115 UART: [art] PUB.Y = F6E33E30B5B5DE85FAE80F602859EE7E97A9004446CB2459F5298A1EAD418ED12262846E2967E72449274E18073065DC
4,098,033 UART: [art] SIG.R = BE74184175931908AF9476FA3967FA53893D5EF019E9AD414FFC6189E0F2A7A7699606C02EB38C96DA177631D4541681
4,104,791 UART: [art] SIG.S = B6DBB98DE09511D2939A34C1EBD2EF8B350D4ED4F4F8A041AFA8D39DF6136B5C4557DD94FC04A6ECF6EB4C91772529D1
4,128,938 UART: mbox::rt_entry...
4,129,310 UART: ____ _ _ _ ____ _____
4,130,094 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,894 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,430 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,198 UART: |_|
4,133,510 UART:
4,415,004 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Production
85,753 UART: [state] DebugLocked = Yes
86,439 UART: [state] Starting the WD Timer 40000000 cycles
87,956 UART: [kat] SHA2-256
891,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,624 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,174,706 ready_for_fw is high
1,174,706 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,682 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,427 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,121 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,991 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,697 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,737 UART: [ldev] --
1,280,227 UART: [fwproc] Wait for Commands...
1,280,990 UART: [fwproc] Recv command 0x46574c44
1,281,723 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,769 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,270 >>> mbox cmd response: success
2,336,494 UART: [afmc] ++
2,336,662 UART: [afmc] CDI.KEYID = 6
2,337,025 UART: [afmc] SUBJECT.KEYID = 7
2,337,451 UART: [afmc] AUTHORITY.KEYID = 5
2,373,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,763 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,482 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,375 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,082 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,769 UART: [afmc] --
2,416,788 UART: [cold-reset] --
2,417,536 UART: [state] Locking Datavault
2,418,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,389 UART: [state] Locking ICCM
2,419,995 UART: [exit] Launching FMC @ 0x40000130
2,425,324 UART:
2,425,340 UART: Running Caliptra FMC ...
2,425,748 UART:
2,425,802 UART: [state] CFI Enabled
2,436,061 UART: [fht] FMC Alias Private Key: 7
2,543,682 UART: [art] Extend RT PCRs Done
2,544,110 UART: [art] Lock RT PCRs Done
2,546,110 UART: [art] Populate DV Done
2,554,442 UART: [fht] FMC Alias Private Key: 7
2,555,390 UART: [art] Derive CDI
2,555,670 UART: [art] Store in in slot 0x4
2,641,391 UART: [art] Derive Key Pair
2,641,751 UART: [art] Store priv key in slot 0x5
2,654,783 UART: [art] Derive Key Pair - Done
2,669,775 UART: [art] Signing Cert with AUTHO
2,670,255 UART: RITY.KEYID = 7
2,685,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,270 UART: [art] PUB.X = 8AB51CFD9164BCD202E9EB55CA58413DF2C377AF735B3C777C796791E13C53A43C0125AD405582FDCBCC320EE2816DD8
2,693,043 UART: [art] PUB.Y = 3AE5AF163DF0EBCD65F8A9893A72F56AA3C2FBF840791AB7BB208CD275AF5EB59FDC8C298F308322008BC3786D46FFB2
2,699,991 UART: [art] SIG.R = DD1B10E068ACFA779D3E1458FBB18DBB75E1609906FED181483B007D4A0C69E4A92BE0F2FB505BA739651CE487862CC6
2,706,745 UART: [art] SIG.S = 1E5D39DA8BABCF7BDFFF6A2F4D64FD4B37D875E5405CF4FC55B5D7A9333A4E9156DA8E120320E6D193DD1EA497D475B5
2,730,043 UART: mbox::rt_entry...
2,730,415 UART: ____ _ _ _ ____ _____
2,731,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,303 UART: |_|
2,734,615 UART:
2,841,067 UART: [rt] Runtime listening for mailbox commands...
2,841,829 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,944 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,038 UART:
2,842,054 UART: Running Caliptra ROM ...
2,842,462 UART:
2,842,517 UART: [state] CFI Enabled
2,845,426 UART: [state] LifecycleState = Production
2,846,034 UART: [state] DebugLocked = Yes
2,846,590 UART: [state] Starting the WD Timer 40000000 cycles
2,848,065 UART: [kat] SHA2-256
3,651,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,744 UART: [kat] ++
3,655,896 UART: [kat] sha1
3,660,146 UART: [kat] SHA2-256
3,662,086 UART: [kat] SHA2-384
3,664,761 UART: [kat] SHA2-512-ACC
3,666,662 UART: [kat] ECC-384
3,676,067 UART: [kat] HMAC-384Kdf
3,680,637 UART: [kat] LMS
3,928,949 UART: [kat] --
3,929,789 UART: [warm-reset] ++
3,930,780 UART: [warm-reset] --
3,931,445 UART: [state] Locking Datavault
3,932,329 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,933 UART: [state] Locking ICCM
3,933,395 UART: [exit] Launching FMC @ 0x40000130
3,938,724 UART:
3,938,740 UART: Running Caliptra FMC ...
3,939,148 UART:
3,939,202 UART: [state] CFI Enabled
3,940,331 UART: [aliasrt :skip pcr extension
3,940,804 UART: [art] Extend RT PCRs Done
3,941,232 UART: [art] Lock RT PCRs Done
3,942,501 UART: [art] Populate DV Done
3,950,777 UART: [fht] FMC Alias Private Key: 7
3,951,749 UART: [art] Derive CDI
3,952,029 UART: [art] Store in in slot 0x4
4,038,010 UART: [art] Derive Key Pair
4,038,370 UART: [art] Store priv key in slot 0x5
4,051,748 UART: [art] Derive Key Pair - Done
4,066,526 UART: [art] Signing Cert with AUTHO
4,067,006 UART: RITY.KEYID = 7
4,082,050 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,815 UART: [art] PUB.X = 8AB51CFD9164BCD202E9EB55CA58413DF2C377AF735B3C777C796791E13C53A43C0125AD405582FDCBCC320EE2816DD8
4,089,588 UART: [art] PUB.Y = 3AE5AF163DF0EBCD65F8A9893A72F56AA3C2FBF840791AB7BB208CD275AF5EB59FDC8C298F308322008BC3786D46FFB2
4,096,536 UART: [art] SIG.R = DD1B10E068ACFA779D3E1458FBB18DBB75E1609906FED181483B007D4A0C69E4A92BE0F2FB505BA739651CE487862CC6
4,103,290 UART: [art] SIG.S = 1E5D39DA8BABCF7BDFFF6A2F4D64FD4B37D875E5405CF4FC55B5D7A9333A4E9156DA8E120320E6D193DD1EA497D475B5
4,127,410 UART: mbox::rt_entry...
4,127,782 UART: ____ _ _ _ ____ _____
4,128,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,670 UART: |_|
4,131,982 UART:
4,413,500 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Production
86,198 UART: [state] DebugLocked = Yes
86,816 UART: [state] Starting the WD Timer 40000000 cycles
88,343 UART: [kat] SHA2-256
891,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,022 UART: [kat] ++
896,174 UART: [kat] sha1
900,548 UART: [kat] SHA2-256
902,488 UART: [kat] SHA2-384
905,363 UART: [kat] SHA2-512-ACC
907,264 UART: [kat] ECC-384
917,331 UART: [kat] HMAC-384Kdf
922,047 UART: [kat] LMS
1,170,359 UART: [kat] --
1,171,216 UART: [cold-reset] ++
1,171,709 UART: [fht] FHT @ 0x50003400
1,174,491 UART: [idev] ++
1,174,659 UART: [idev] CDI.KEYID = 6
1,175,020 UART: [idev] SUBJECT.KEYID = 7
1,175,445 UART: [idev] UDS.KEYID = 0
1,175,791 ready_for_fw is high
1,175,791 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,783 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,892 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,586 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,456 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,162 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,248 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,163 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,838 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,137 >>> mbox cmd response: success
2,338,341 UART: [afmc] ++
2,338,509 UART: [afmc] CDI.KEYID = 6
2,338,872 UART: [afmc] SUBJECT.KEYID = 7
2,339,298 UART: [afmc] AUTHORITY.KEYID = 5
2,374,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,244 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,963 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,856 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,563 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,422 UART: [afmc] --
2,418,427 UART: [cold-reset] --
2,419,187 UART: [state] Locking Datavault
2,420,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,100 UART: [state] Locking ICCM
2,421,736 UART: [exit] Launching FMC @ 0x40000130
2,427,065 UART:
2,427,081 UART: Running Caliptra FMC ...
2,427,489 UART:
2,427,632 UART: [state] CFI Enabled
2,438,263 UART: [fht] FMC Alias Private Key: 7
2,545,650 UART: [art] Extend RT PCRs Done
2,546,078 UART: [art] Lock RT PCRs Done
2,547,782 UART: [art] Populate DV Done
2,555,832 UART: [fht] FMC Alias Private Key: 7
2,556,766 UART: [art] Derive CDI
2,557,046 UART: [art] Store in in slot 0x4
2,642,731 UART: [art] Derive Key Pair
2,643,091 UART: [art] Store priv key in slot 0x5
2,656,791 UART: [art] Derive Key Pair - Done
2,671,549 UART: [art] Signing Cert with AUTHO
2,672,029 UART: RITY.KEYID = 7
2,687,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,844 UART: [art] PUB.X = BA4398E70DFFF76FA4B811048785AD3D21A9992C4A0936F0550A1F845D218BE9A05DAC7E07E806B210639113132517FC
2,694,596 UART: [art] PUB.Y = 0B5B2014B602B8C081867843C9190EC8570B13DA7EF50F724A7439AAC7BD0E17E78E320FA60E6BC99A393BBD37162EFF
2,701,530 UART: [art] SIG.R = 18B0FCA09DCF990DACDDA436021DCF9C98A06412A2A8E536541A4CEEFD551174563108783014F60F42B2614BB1164614
2,708,290 UART: [art] SIG.S = 841FB64817E37648623D6DC48F5565CF886D627D53409AE2293BE1AB66C6388EBC6B10DB645796AC0F72922E9B4AB2C3
2,732,544 UART: mbox::rt_entry...
2,732,916 UART: ____ _ _ _ ____ _____
2,733,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,500 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,268 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,804 UART: |_|
2,737,116 UART:
2,843,120 UART: [rt] Runtime listening for mailbox commands...
2,843,882 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,997 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,091 UART:
2,844,107 UART: Running Caliptra ROM ...
2,844,515 UART:
2,844,657 UART: [state] CFI Enabled
2,847,576 UART: [state] LifecycleState = Production
2,848,184 UART: [state] DebugLocked = Yes
2,848,720 UART: [state] Starting the WD Timer 40000000 cycles
2,850,281 UART: [kat] SHA2-256
3,653,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,960 UART: [kat] ++
3,658,112 UART: [kat] sha1
3,662,374 UART: [kat] SHA2-256
3,664,314 UART: [kat] SHA2-384
3,667,113 UART: [kat] SHA2-512-ACC
3,669,014 UART: [kat] ECC-384
3,678,673 UART: [kat] HMAC-384Kdf
3,683,109 UART: [kat] LMS
3,931,421 UART: [kat] --
3,932,391 UART: [warm-reset] ++
3,933,388 UART: [warm-reset] --
3,934,165 UART: [state] Locking Datavault
3,935,125 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,729 UART: [state] Locking ICCM
3,936,229 UART: [exit] Launching FMC @ 0x40000130
3,941,558 UART:
3,941,574 UART: Running Caliptra FMC ...
3,941,982 UART:
3,942,125 UART: [state] CFI Enabled
3,943,644 UART: [aliasrt :skip pcr extension
3,944,117 UART: [art] Extend RT PCRs Done
3,944,545 UART: [art] Lock RT PCRs Done
3,945,744 UART: [art] Populate DV Done
3,953,830 UART: [fht] FMC Alias Private Key: 7
3,954,980 UART: [art] Derive CDI
3,955,260 UART: [art] Store in in slot 0x4
4,041,037 UART: [art] Derive Key Pair
4,041,397 UART: [art] Store priv key in slot 0x5
4,054,853 UART: [art] Derive Key Pair - Done
4,069,895 UART: [art] Signing Cert with AUTHO
4,070,375 UART: RITY.KEYID = 7
4,085,677 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,442 UART: [art] PUB.X = BA4398E70DFFF76FA4B811048785AD3D21A9992C4A0936F0550A1F845D218BE9A05DAC7E07E806B210639113132517FC
4,093,194 UART: [art] PUB.Y = 0B5B2014B602B8C081867843C9190EC8570B13DA7EF50F724A7439AAC7BD0E17E78E320FA60E6BC99A393BBD37162EFF
4,100,128 UART: [art] SIG.R = 18B0FCA09DCF990DACDDA436021DCF9C98A06412A2A8E536541A4CEEFD551174563108783014F60F42B2614BB1164614
4,106,888 UART: [art] SIG.S = 841FB64817E37648623D6DC48F5565CF886D627D53409AE2293BE1AB66C6388EBC6B10DB645796AC0F72922E9B4AB2C3
4,131,582 UART: mbox::rt_entry...
4,131,954 UART: ____ _ _ _ ____ _____
4,132,738 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,538 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,135,074 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,842 UART: |_|
4,136,154 UART:
4,416,742 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Production
85,900 UART: [state] DebugLocked = Yes
86,650 UART: [state] Starting the WD Timer 40000000 cycles
88,245 UART: [kat] SHA2-256
891,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,924 UART: [kat] ++
896,076 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
905,141 UART: [kat] SHA2-512-ACC
907,042 UART: [kat] ECC-384
916,897 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,679 UART: [idev] ++
1,173,847 UART: [idev] CDI.KEYID = 6
1,174,208 UART: [idev] SUBJECT.KEYID = 7
1,174,633 UART: [idev] UDS.KEYID = 0
1,174,979 ready_for_fw is high
1,174,979 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,228 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,922 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,792 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,498 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,520 UART: [ldev] --
1,282,022 UART: [fwproc] Wait for Commands...
1,282,775 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,498 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,931 >>> mbox cmd response: success
2,338,067 UART: [afmc] ++
2,338,235 UART: [afmc] CDI.KEYID = 6
2,338,598 UART: [afmc] SUBJECT.KEYID = 7
2,339,024 UART: [afmc] AUTHORITY.KEYID = 5
2,374,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,902 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,621 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,514 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,221 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,166 UART: [afmc] --
2,418,201 UART: [cold-reset] --
2,419,133 UART: [state] Locking Datavault
2,420,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,056 UART: [state] Locking ICCM
2,421,646 UART: [exit] Launching FMC @ 0x40000130
2,426,975 UART:
2,426,991 UART: Running Caliptra FMC ...
2,427,399 UART:
2,427,542 UART: [state] CFI Enabled
2,438,325 UART: [fht] FMC Alias Private Key: 7
2,545,996 UART: [art] Extend RT PCRs Done
2,546,424 UART: [art] Lock RT PCRs Done
2,548,000 UART: [art] Populate DV Done
2,556,028 UART: [fht] FMC Alias Private Key: 7
2,557,026 UART: [art] Derive CDI
2,557,306 UART: [art] Store in in slot 0x4
2,642,841 UART: [art] Derive Key Pair
2,643,201 UART: [art] Store priv key in slot 0x5
2,656,677 UART: [art] Derive Key Pair - Done
2,671,326 UART: [art] Signing Cert with AUTHO
2,671,806 UART: RITY.KEYID = 7
2,686,994 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,759 UART: [art] PUB.X = 0F85EA91A87529E6ECC05DA0828608D8AB23DC2D4117485EF1940D45BE736C30805551E1FF08CFAFA5F08EF65D88A83E
2,694,527 UART: [art] PUB.Y = 2CBF5C42560BE004EF65613D7583B6E096FC260F931854D5CC96C0FE19FB93F9659F6B6B0EF1B99F822B7FA9D74817E9
2,701,473 UART: [art] SIG.R = CFA3C8304EA50EC6E144DAA7CB99B240A90A18F0E1CD312F09BCC4784623006FC2D8C64ADD366A239A06B72E8FD2AC20
2,708,227 UART: [art] SIG.S = 150D322721FB97101BCA7E232B8F70905FD38FE226B3468548C8AC057D3F91C98C392EE74929E1E28AF67412EA0F1AB5
2,731,907 UART: mbox::rt_entry...
2,732,279 UART: ____ _ _ _ ____ _____
2,733,063 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,863 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,631 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,167 UART: |_|
2,736,479 UART:
2,842,963 UART: [rt] Runtime listening for mailbox commands...
2,843,725 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,840 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,934 UART:
2,843,950 UART: Running Caliptra ROM ...
2,844,358 UART:
2,844,500 UART: [state] CFI Enabled
2,847,343 UART: [state] LifecycleState = Production
2,847,951 UART: [state] DebugLocked = Yes
2,848,585 UART: [state] Starting the WD Timer 40000000 cycles
2,850,210 UART: [kat] SHA2-256
3,653,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,889 UART: [kat] ++
3,658,041 UART: [kat] sha1
3,662,203 UART: [kat] SHA2-256
3,664,143 UART: [kat] SHA2-384
3,667,044 UART: [kat] SHA2-512-ACC
3,668,945 UART: [kat] ECC-384
3,678,952 UART: [kat] HMAC-384Kdf
3,683,758 UART: [kat] LMS
3,932,070 UART: [kat] --
3,932,906 UART: [warm-reset] ++
3,933,651 UART: [warm-reset] --
3,934,684 UART: [state] Locking Datavault
3,935,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,176 UART: [state] Locking ICCM
3,936,768 UART: [exit] Launching FMC @ 0x40000130
3,942,097 UART:
3,942,113 UART: Running Caliptra FMC ...
3,942,521 UART:
3,942,664 UART: [state] CFI Enabled
3,943,903 UART: [aliasrt :skip pcr extension
3,944,376 UART: [art] Extend RT PCRs Done
3,944,804 UART: [art] Lock RT PCRs Done
3,946,021 UART: [art] Populate DV Done
3,954,513 UART: [fht] FMC Alias Private Key: 7
3,955,631 UART: [art] Derive CDI
3,955,911 UART: [art] Store in in slot 0x4
4,041,454 UART: [art] Derive Key Pair
4,041,814 UART: [art] Store priv key in slot 0x5
4,054,862 UART: [art] Derive Key Pair - Done
4,069,411 UART: [art] Signing Cert with AUTHO
4,069,891 UART: RITY.KEYID = 7
4,085,077 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,842 UART: [art] PUB.X = 0F85EA91A87529E6ECC05DA0828608D8AB23DC2D4117485EF1940D45BE736C30805551E1FF08CFAFA5F08EF65D88A83E
4,092,610 UART: [art] PUB.Y = 2CBF5C42560BE004EF65613D7583B6E096FC260F931854D5CC96C0FE19FB93F9659F6B6B0EF1B99F822B7FA9D74817E9
4,099,556 UART: [art] SIG.R = CFA3C8304EA50EC6E144DAA7CB99B240A90A18F0E1CD312F09BCC4784623006FC2D8C64ADD366A239A06B72E8FD2AC20
4,106,310 UART: [art] SIG.S = 150D322721FB97101BCA7E232B8F70905FD38FE226B3468548C8AC057D3F91C98C392EE74929E1E28AF67412EA0F1AB5
4,129,874 UART: mbox::rt_entry...
4,130,246 UART: ____ _ _ _ ____ _____
4,131,030 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,830 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,598 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,366 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,134 UART: |_|
4,134,446 UART:
4,407,568 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Production
85,951 UART: [state] DebugLocked = Yes
86,475 UART: [state] Starting the WD Timer 40000000 cycles
88,086 UART: [kat] SHA2-256
891,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,369 UART: [kat] SHA2-256
902,309 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
916,786 UART: [kat] HMAC-384Kdf
921,316 UART: [kat] LMS
1,169,628 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 ready_for_fw is high
1,174,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,505 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,375 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,081 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,123 UART: [ldev] --
1,280,573 UART: [fwproc] Wait for Commands...
1,281,298 UART: [fwproc] Recv command 0x46574c44
1,282,031 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,816 >>> mbox cmd response: success
2,797,848 UART: [afmc] ++
2,798,016 UART: [afmc] CDI.KEYID = 6
2,798,379 UART: [afmc] SUBJECT.KEYID = 7
2,798,805 UART: [afmc] AUTHORITY.KEYID = 5
2,833,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,799 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,518 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,411 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,118 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,877 UART: [afmc] --
2,876,996 UART: [cold-reset] --
2,877,746 UART: [state] Locking Datavault
2,879,049 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,653 UART: [state] Locking ICCM
2,880,291 UART: [exit] Launching FMC @ 0x40000130
2,885,620 UART:
2,885,636 UART: Running Caliptra FMC ...
2,886,044 UART:
2,886,098 UART: [state] CFI Enabled
2,896,523 UART: [fht] FMC Alias Private Key: 7
3,004,546 UART: [art] Extend RT PCRs Done
3,004,974 UART: [art] Lock RT PCRs Done
3,006,712 UART: [art] Populate DV Done
3,014,676 UART: [fht] FMC Alias Private Key: 7
3,015,848 UART: [art] Derive CDI
3,016,128 UART: [art] Store in in slot 0x4
3,101,889 UART: [art] Derive Key Pair
3,102,249 UART: [art] Store priv key in slot 0x5
3,115,385 UART: [art] Derive Key Pair - Done
3,130,472 UART: [art] Signing Cert with AUTHO
3,130,952 UART: RITY.KEYID = 7
3,146,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,341 UART: [art] PUB.X = 947B55307111E1B8B8B9899F85510945193E6A910BB8A1A742935C2568FEB71B8A7C03988338D9CE575660233F4E648A
3,154,090 UART: [art] PUB.Y = D75CF94152265B0C0EF1A7E16973A1187261EBFD2ACD3507BBF0B61F12275716B404850D59B6E7543C2D244099D10719
3,161,018 UART: [art] SIG.R = D39F2EF40B77497579B6DB5F03CA4FB60C97DD8A93179AF3A0EC0DC16A9811EFD80BE3AE53F0F5FA804D7C125EF70DD6
3,167,792 UART: [art] SIG.S = 7B417B299047C081680FA93225A8B24E870FAB302CD137F12A5007CD77824ADF000B956AFAD24878944A266C0F7C8440
3,192,190 UART: Caliptra RT
3,192,443 UART: [state] CFI Enabled
3,299,662 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,418 UART:
3,300,434 UART: Running Caliptra ROM ...
3,300,842 UART:
3,300,897 UART: [state] CFI Enabled
3,303,424 UART: [state] LifecycleState = Production
3,304,032 UART: [state] DebugLocked = Yes
3,304,714 UART: [state] Starting the WD Timer 40000000 cycles
3,306,203 UART: [kat] SHA2-256
4,109,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,882 UART: [kat] ++
4,114,034 UART: [kat] sha1
4,118,040 UART: [kat] SHA2-256
4,119,980 UART: [kat] SHA2-384
4,122,833 UART: [kat] SHA2-512-ACC
4,124,734 UART: [kat] ECC-384
4,134,435 UART: [kat] HMAC-384Kdf
4,139,043 UART: [kat] LMS
4,387,355 UART: [kat] --
4,387,975 UART: [warm-reset] ++
4,389,024 UART: [warm-reset] --
4,389,989 UART: [state] Locking Datavault
4,390,853 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,457 UART: [state] Locking ICCM
4,392,067 UART: [exit] Launching FMC @ 0x40000130
4,397,396 UART:
4,397,412 UART: Running Caliptra FMC ...
4,397,820 UART:
4,397,874 UART: [state] CFI Enabled
4,399,279 UART: [aliasrt :skip pcr extension
4,399,752 UART: [art] Extend RT PCRs Done
4,400,180 UART: [art] Lock RT PCRs Done
4,401,487 UART: [art] Populate DV Done
4,409,693 UART: [fht] FMC Alias Private Key: 7
4,410,699 UART: [art] Derive CDI
4,410,979 UART: [art] Store in in slot 0x4
4,496,298 UART: [art] Derive Key Pair
4,496,658 UART: [art] Store priv key in slot 0x5
4,509,602 UART: [art] Derive Key Pair - Done
4,524,309 UART: [art] Signing Cert with AUTHO
4,524,789 UART: RITY.KEYID = 7
4,539,963 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,728 UART: [art] PUB.X = 947B55307111E1B8B8B9899F85510945193E6A910BB8A1A742935C2568FEB71B8A7C03988338D9CE575660233F4E648A
4,547,477 UART: [art] PUB.Y = D75CF94152265B0C0EF1A7E16973A1187261EBFD2ACD3507BBF0B61F12275716B404850D59B6E7543C2D244099D10719
4,554,405 UART: [art] SIG.R = D39F2EF40B77497579B6DB5F03CA4FB60C97DD8A93179AF3A0EC0DC16A9811EFD80BE3AE53F0F5FA804D7C125EF70DD6
4,561,179 UART: [art] SIG.S = 7B417B299047C081680FA93225A8B24E870FAB302CD137F12A5007CD77824ADF000B956AFAD24878944A266C0F7C8440
4,585,159 UART: Caliptra RT
4,585,412 UART: [state] CFI Enabled
4,865,919 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,667 UART: [state] LifecycleState = Production
85,275 UART: [state] DebugLocked = Yes
85,955 UART: [state] Starting the WD Timer 40000000 cycles
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,403 UART: [kat] SHA2-256
901,343 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,516 UART: [idev] ++
1,172,684 UART: [idev] CDI.KEYID = 6
1,173,045 UART: [idev] SUBJECT.KEYID = 7
1,173,470 UART: [idev] UDS.KEYID = 0
1,173,816 ready_for_fw is high
1,173,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,730 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,849 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,719 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,425 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,487 UART: [ldev] --
1,280,765 UART: [fwproc] Wait for Commands...
1,281,554 UART: [fwproc] Recv command 0x46574c44
1,282,287 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,438 >>> mbox cmd response: success
2,798,554 UART: [afmc] ++
2,798,722 UART: [afmc] CDI.KEYID = 6
2,799,085 UART: [afmc] SUBJECT.KEYID = 7
2,799,511 UART: [afmc] AUTHORITY.KEYID = 5
2,835,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,383 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,102 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,995 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,702 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,725 UART: [afmc] --
2,878,676 UART: [cold-reset] --
2,879,414 UART: [state] Locking Datavault
2,880,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,305 UART: [state] Locking ICCM
2,881,953 UART: [exit] Launching FMC @ 0x40000130
2,887,282 UART:
2,887,298 UART: Running Caliptra FMC ...
2,887,706 UART:
2,887,760 UART: [state] CFI Enabled
2,898,291 UART: [fht] FMC Alias Private Key: 7
3,005,952 UART: [art] Extend RT PCRs Done
3,006,380 UART: [art] Lock RT PCRs Done
3,008,046 UART: [art] Populate DV Done
3,016,378 UART: [fht] FMC Alias Private Key: 7
3,017,306 UART: [art] Derive CDI
3,017,586 UART: [art] Store in in slot 0x4
3,102,837 UART: [art] Derive Key Pair
3,103,197 UART: [art] Store priv key in slot 0x5
3,116,349 UART: [art] Derive Key Pair - Done
3,131,137 UART: [art] Signing Cert with AUTHO
3,131,617 UART: RITY.KEYID = 7
3,146,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,736 UART: [art] PUB.X = F7C559607B95234D8855D20A132DFDF85AABF147829870BA8B3783DB44C3AEA93F2062D7F6FA31ECD9456D4277376ED6
3,154,509 UART: [art] PUB.Y = 072E35C6664B2844D0C37732EBB85FB510A04D2E7661DE3C262FC7ACFB52A36F50B47EF22F392EDB29E30DC681B8AD20
3,161,465 UART: [art] SIG.R = B95A0CAF871A94CFB8F74648164EC6DDE28CB2316B537D44D811AD408DB945DE86095B0F52865DADE28F4376796DAEA6
3,168,238 UART: [art] SIG.S = 82D0D9952AB0AA787A1A1ADA513B94D5A0B709DE209FA9AB4EF234F73CCB79D3742FB1CFC38A972186FAFE6D964F837C
3,191,716 UART: Caliptra RT
3,191,969 UART: [state] CFI Enabled
3,300,758 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,514 UART:
3,301,530 UART: Running Caliptra ROM ...
3,301,938 UART:
3,301,993 UART: [state] CFI Enabled
3,304,496 UART: [state] LifecycleState = Production
3,305,104 UART: [state] DebugLocked = Yes
3,305,866 UART: [state] Starting the WD Timer 40000000 cycles
3,307,417 UART: [kat] SHA2-256
4,110,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,096 UART: [kat] ++
4,115,248 UART: [kat] sha1
4,119,546 UART: [kat] SHA2-256
4,121,486 UART: [kat] SHA2-384
4,124,281 UART: [kat] SHA2-512-ACC
4,126,182 UART: [kat] ECC-384
4,135,617 UART: [kat] HMAC-384Kdf
4,140,201 UART: [kat] LMS
4,388,513 UART: [kat] --
4,389,741 UART: [warm-reset] ++
4,390,714 UART: [warm-reset] --
4,391,693 UART: [state] Locking Datavault
4,392,619 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,223 UART: [state] Locking ICCM
4,393,683 UART: [exit] Launching FMC @ 0x40000130
4,399,012 UART:
4,399,028 UART: Running Caliptra FMC ...
4,399,436 UART:
4,399,490 UART: [state] CFI Enabled
4,400,669 UART: [aliasrt :skip pcr extension
4,401,142 UART: [art] Extend RT PCRs Done
4,401,570 UART: [art] Lock RT PCRs Done
4,402,999 UART: [art] Populate DV Done
4,411,215 UART: [fht] FMC Alias Private Key: 7
4,412,175 UART: [art] Derive CDI
4,412,455 UART: [art] Store in in slot 0x4
4,497,876 UART: [art] Derive Key Pair
4,498,236 UART: [art] Store priv key in slot 0x5
4,511,902 UART: [art] Derive Key Pair - Done
4,526,650 UART: [art] Signing Cert with AUTHO
4,527,130 UART: RITY.KEYID = 7
4,542,410 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,175 UART: [art] PUB.X = F7C559607B95234D8855D20A132DFDF85AABF147829870BA8B3783DB44C3AEA93F2062D7F6FA31ECD9456D4277376ED6
4,549,948 UART: [art] PUB.Y = 072E35C6664B2844D0C37732EBB85FB510A04D2E7661DE3C262FC7ACFB52A36F50B47EF22F392EDB29E30DC681B8AD20
4,556,904 UART: [art] SIG.R = B95A0CAF871A94CFB8F74648164EC6DDE28CB2316B537D44D811AD408DB945DE86095B0F52865DADE28F4376796DAEA6
4,563,677 UART: [art] SIG.S = 82D0D9952AB0AA787A1A1ADA513B94D5A0B709DE209FA9AB4EF234F73CCB79D3742FB1CFC38A972186FAFE6D964F837C
4,587,185 UART: Caliptra RT
4,587,438 UART: [state] CFI Enabled
4,870,659 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Production
85,824 UART: [state] DebugLocked = Yes
86,374 UART: [state] Starting the WD Timer 40000000 cycles
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: [kat] ++
895,892 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
917,095 UART: [kat] HMAC-384Kdf
921,745 UART: [kat] LMS
1,170,057 UART: [kat] --
1,171,184 UART: [cold-reset] ++
1,171,583 UART: [fht] FHT @ 0x50003400
1,174,331 UART: [idev] ++
1,174,499 UART: [idev] CDI.KEYID = 6
1,174,860 UART: [idev] SUBJECT.KEYID = 7
1,175,285 UART: [idev] UDS.KEYID = 0
1,175,631 ready_for_fw is high
1,175,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,734 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,207 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,244 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,114 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,820 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,028 UART: [ldev] --
1,283,432 UART: [fwproc] Wait for Commands...
1,284,121 UART: [fwproc] Recv command 0x46574c44
1,284,854 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,800,057 >>> mbox cmd response: success
2,801,305 UART: [afmc] ++
2,801,473 UART: [afmc] CDI.KEYID = 6
2,801,836 UART: [afmc] SUBJECT.KEYID = 7
2,802,262 UART: [afmc] AUTHORITY.KEYID = 5
2,838,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,430 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,149 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,042 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,749 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,464 UART: [afmc] --
2,881,523 UART: [cold-reset] --
2,882,249 UART: [state] Locking Datavault
2,883,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,050 UART: [state] Locking ICCM
2,884,478 UART: [exit] Launching FMC @ 0x40000130
2,889,807 UART:
2,889,823 UART: Running Caliptra FMC ...
2,890,231 UART:
2,890,374 UART: [state] CFI Enabled
2,900,901 UART: [fht] FMC Alias Private Key: 7
3,008,944 UART: [art] Extend RT PCRs Done
3,009,372 UART: [art] Lock RT PCRs Done
3,011,024 UART: [art] Populate DV Done
3,019,424 UART: [fht] FMC Alias Private Key: 7
3,020,366 UART: [art] Derive CDI
3,020,646 UART: [art] Store in in slot 0x4
3,105,901 UART: [art] Derive Key Pair
3,106,261 UART: [art] Store priv key in slot 0x5
3,119,491 UART: [art] Derive Key Pair - Done
3,134,345 UART: [art] Signing Cert with AUTHO
3,134,825 UART: RITY.KEYID = 7
3,149,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,708 UART: [art] PUB.X = 9F35FC90CEB4E0AAA41D736190C76E029DE16E6E9480729C0E09DAC7EEAFADD4B26AAA79F1D91F7568064368AC1C04C3
3,157,481 UART: [art] PUB.Y = 18C2238F956A7C312FEBC19F7956E65B28D2CDD4C81BCFC0579169A8D64C71F23FCB4043511420CB558AD9B88A75AF1E
3,164,441 UART: [art] SIG.R = 56E6F3E29E13A9B5C51422FD43B6005B4C3D3B15F468320E2B4D7A0599337F7C304787F9FFF584CD47D5EC3018F2DBBF
3,171,191 UART: [art] SIG.S = 4D47DC8CD92E1437407770516D64FC5C74C68E36C5409246B83FF1BB1138955F5C8F85544823465816F385A885B97A2A
3,195,178 UART: Caliptra RT
3,195,523 UART: [state] CFI Enabled
3,303,785 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,541 UART:
3,304,557 UART: Running Caliptra ROM ...
3,304,965 UART:
3,305,107 UART: [state] CFI Enabled
3,308,130 UART: [state] LifecycleState = Production
3,308,738 UART: [state] DebugLocked = Yes
3,309,370 UART: [state] Starting the WD Timer 40000000 cycles
3,310,969 UART: [kat] SHA2-256
4,114,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,648 UART: [kat] ++
4,118,800 UART: [kat] sha1
4,123,030 UART: [kat] SHA2-256
4,124,970 UART: [kat] SHA2-384
4,127,689 UART: [kat] SHA2-512-ACC
4,129,590 UART: [kat] ECC-384
4,139,253 UART: [kat] HMAC-384Kdf
4,143,843 UART: [kat] LMS
4,392,155 UART: [kat] --
4,392,829 UART: [warm-reset] ++
4,393,686 UART: [warm-reset] --
4,394,399 UART: [state] Locking Datavault
4,395,211 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,815 UART: [state] Locking ICCM
4,396,307 UART: [exit] Launching FMC @ 0x40000130
4,401,636 UART:
4,401,652 UART: Running Caliptra FMC ...
4,402,060 UART:
4,402,203 UART: [state] CFI Enabled
4,403,810 UART: [aliasrt :skip pcr extension
4,404,283 UART: [art] Extend RT PCRs Done
4,404,711 UART: [art] Lock RT PCRs Done
4,406,072 UART: [art] Populate DV Done
4,414,144 UART: [fht] FMC Alias Private Key: 7
4,415,098 UART: [art] Derive CDI
4,415,378 UART: [art] Store in in slot 0x4
4,501,117 UART: [art] Derive Key Pair
4,501,477 UART: [art] Store priv key in slot 0x5
4,514,765 UART: [art] Derive Key Pair - Done
4,529,341 UART: [art] Signing Cert with AUTHO
4,529,821 UART: RITY.KEYID = 7
4,545,023 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,788 UART: [art] PUB.X = 9F35FC90CEB4E0AAA41D736190C76E029DE16E6E9480729C0E09DAC7EEAFADD4B26AAA79F1D91F7568064368AC1C04C3
4,552,561 UART: [art] PUB.Y = 18C2238F956A7C312FEBC19F7956E65B28D2CDD4C81BCFC0579169A8D64C71F23FCB4043511420CB558AD9B88A75AF1E
4,559,521 UART: [art] SIG.R = 56E6F3E29E13A9B5C51422FD43B6005B4C3D3B15F468320E2B4D7A0599337F7C304787F9FFF584CD47D5EC3018F2DBBF
4,566,271 UART: [art] SIG.S = 4D47DC8CD92E1437407770516D64FC5C74C68E36C5409246B83FF1BB1138955F5C8F85544823465816F385A885B97A2A
4,590,198 UART: Caliptra RT
4,590,543 UART: [state] CFI Enabled
4,873,023 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Production
85,706 UART: [state] DebugLocked = Yes
86,390 UART: [state] Starting the WD Timer 40000000 cycles
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,828 UART: [cold-reset] ++
1,171,371 UART: [fht] FHT @ 0x50003400
1,174,035 UART: [idev] ++
1,174,203 UART: [idev] CDI.KEYID = 6
1,174,564 UART: [idev] SUBJECT.KEYID = 7
1,174,989 UART: [idev] UDS.KEYID = 0
1,175,335 ready_for_fw is high
1,175,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,543 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,438 UART: [ldev] AUTHORITY.KEYID = 7
1,211,901 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,330 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,024 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,894 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,600 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,650 UART: [ldev] --
1,282,932 UART: [fwproc] Wait for Commands...
1,283,735 UART: [fwproc] Recv command 0x46574c44
1,284,468 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,305 >>> mbox cmd response: success
2,799,377 UART: [afmc] ++
2,799,545 UART: [afmc] CDI.KEYID = 6
2,799,908 UART: [afmc] SUBJECT.KEYID = 7
2,800,334 UART: [afmc] AUTHORITY.KEYID = 5
2,836,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,564 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,283 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,176 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,883 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,654 UART: [afmc] --
2,879,683 UART: [cold-reset] --
2,880,285 UART: [state] Locking Datavault
2,881,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,174 UART: [state] Locking ICCM
2,882,670 UART: [exit] Launching FMC @ 0x40000130
2,887,999 UART:
2,888,015 UART: Running Caliptra FMC ...
2,888,423 UART:
2,888,566 UART: [state] CFI Enabled
2,898,695 UART: [fht] FMC Alias Private Key: 7
3,006,844 UART: [art] Extend RT PCRs Done
3,007,272 UART: [art] Lock RT PCRs Done
3,008,604 UART: [art] Populate DV Done
3,017,038 UART: [fht] FMC Alias Private Key: 7
3,018,158 UART: [art] Derive CDI
3,018,438 UART: [art] Store in in slot 0x4
3,103,647 UART: [art] Derive Key Pair
3,104,007 UART: [art] Store priv key in slot 0x5
3,117,637 UART: [art] Derive Key Pair - Done
3,132,366 UART: [art] Signing Cert with AUTHO
3,132,846 UART: RITY.KEYID = 7
3,147,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,575 UART: [art] PUB.X = B4F0E49A4A96D032FBC5B09BC6B94BA8283EFF2C0799A4A837454B5D3008637BE87FE0378E1557B52E0478EF0D573564
3,155,337 UART: [art] PUB.Y = 62879B31534B2DE15C067AA276C7B1B783B21F631EAB8B4C1AE867D3BAC1F0637C1647123C99B03E5D949BA3F62F631E
3,162,290 UART: [art] SIG.R = 89FF67E04605E83690684FC780BEB34E8704CC4B40DE63E0C124012C94CFA4D1A4E578A8A1E6B688ABC3FDA5B270EDAD
3,169,067 UART: [art] SIG.S = BD0EB9F0D503A8694694830BD3DE640B57827A79D89141E74C23E34FF3B19188164AB2BFCC1D2065ED6368F1C8C3DC34
3,192,624 UART: Caliptra RT
3,192,969 UART: [state] CFI Enabled
3,301,092 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,848 UART:
3,301,864 UART: Running Caliptra ROM ...
3,302,272 UART:
3,302,414 UART: [state] CFI Enabled
3,305,241 UART: [state] LifecycleState = Production
3,305,849 UART: [state] DebugLocked = Yes
3,306,585 UART: [state] Starting the WD Timer 40000000 cycles
3,308,146 UART: [kat] SHA2-256
4,111,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,825 UART: [kat] ++
4,115,977 UART: [kat] sha1
4,120,127 UART: [kat] SHA2-256
4,122,067 UART: [kat] SHA2-384
4,124,784 UART: [kat] SHA2-512-ACC
4,126,685 UART: [kat] ECC-384
4,136,832 UART: [kat] HMAC-384Kdf
4,141,650 UART: [kat] LMS
4,389,962 UART: [kat] --
4,391,006 UART: [warm-reset] ++
4,391,733 UART: [warm-reset] --
4,392,746 UART: [state] Locking Datavault
4,393,654 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,258 UART: [state] Locking ICCM
4,394,800 UART: [exit] Launching FMC @ 0x40000130
4,400,129 UART:
4,400,145 UART: Running Caliptra FMC ...
4,400,553 UART:
4,400,696 UART: [state] CFI Enabled
4,402,209 UART: [aliasrt :skip pcr extension
4,402,682 UART: [art] Extend RT PCRs Done
4,403,110 UART: [art] Lock RT PCRs Done
4,404,581 UART: [art] Populate DV Done
4,412,817 UART: [fht] FMC Alias Private Key: 7
4,413,757 UART: [art] Derive CDI
4,414,037 UART: [art] Store in in slot 0x4
4,499,272 UART: [art] Derive Key Pair
4,499,632 UART: [art] Store priv key in slot 0x5
4,512,732 UART: [art] Derive Key Pair - Done
4,527,617 UART: [art] Signing Cert with AUTHO
4,528,097 UART: RITY.KEYID = 7
4,543,247 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,012 UART: [art] PUB.X = B4F0E49A4A96D032FBC5B09BC6B94BA8283EFF2C0799A4A837454B5D3008637BE87FE0378E1557B52E0478EF0D573564
4,550,774 UART: [art] PUB.Y = 62879B31534B2DE15C067AA276C7B1B783B21F631EAB8B4C1AE867D3BAC1F0637C1647123C99B03E5D949BA3F62F631E
4,557,727 UART: [art] SIG.R = 89FF67E04605E83690684FC780BEB34E8704CC4B40DE63E0C124012C94CFA4D1A4E578A8A1E6B688ABC3FDA5B270EDAD
4,564,504 UART: [art] SIG.S = BD0EB9F0D503A8694694830BD3DE640B57827A79D89141E74C23E34FF3B19188164AB2BFCC1D2065ED6368F1C8C3DC34
4,587,947 UART: Caliptra RT
4,588,292 UART: [state] CFI Enabled
4,870,785 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Production
85,657 UART: [state] DebugLocked = Yes
86,375 UART: [state] Starting the WD Timer 40000000 cycles
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,828 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,471 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 ready_for_fw is high
1,174,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,817 UART: [idev] Erasing UDS.KEYID = 0
1,200,230 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,174 UART: [ldev] ++
1,210,342 UART: [ldev] CDI.KEYID = 6
1,210,706 UART: [ldev] SUBJECT.KEYID = 5
1,211,133 UART: [ldev] AUTHORITY.KEYID = 7
1,211,596 UART: [ldev] FE.KEYID = 1
1,216,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,713 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,407 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,277 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,983 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,981 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,283,200 UART: [fwproc] Recv command 0x46574c44
1,283,933 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,024 >>> mbox cmd response: success
2,800,130 UART: [afmc] ++
2,800,298 UART: [afmc] CDI.KEYID = 6
2,800,661 UART: [afmc] SUBJECT.KEYID = 7
2,801,087 UART: [afmc] AUTHORITY.KEYID = 5
2,836,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,115 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,834 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,727 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,434 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,433 UART: [afmc] --
2,879,320 UART: [cold-reset] --
2,880,296 UART: [state] Locking Datavault
2,881,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,039 UART: [state] Locking ICCM
2,882,661 UART: [exit] Launching FMC @ 0x40000130
2,887,990 UART:
2,888,006 UART: Running Caliptra FMC ...
2,888,414 UART:
2,888,468 UART: [state] CFI Enabled
2,898,773 UART: [fht] FMC Alias Private Key: 7
3,006,440 UART: [art] Extend RT PCRs Done
3,006,868 UART: [art] Lock RT PCRs Done
3,008,230 UART: [art] Populate DV Done
3,016,350 UART: [fht] FMC Alias Private Key: 7
3,017,486 UART: [art] Derive CDI
3,017,766 UART: [art] Store in in slot 0x4
3,103,237 UART: [art] Derive Key Pair
3,103,597 UART: [art] Store priv key in slot 0x5
3,116,667 UART: [art] Derive Key Pair - Done
3,131,072 UART: [art] Signing Cert with AUTHO
3,131,552 UART: RITY.KEYID = 7
3,146,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,721 UART: [art] PUB.X = 9C1158CA2D7E67ACF8085EAC1ED58E86FD479B19780E07892C6101C4B9723F07612028F7403F20831BA4A09E8A7823FA
3,154,476 UART: [art] PUB.Y = B617871FA5215FD62A3A2292348C915B01D4CF34CF852B72B20E6CC8486869E56A81C20811FCB60BF3E2B42E1FE963B5
3,161,418 UART: [art] SIG.R = 26F42D9ADFF2B2396FEFF397D15629FBFC95EBA9CF4C3D6C4328B8FBA58D15E09562E02486C8FDD807774808F2EBFF22
3,168,200 UART: [art] SIG.S = 72419BF6BAF305D3E151C4D5CAA32FD127D0096B872088748A359669419DF3ABEEC6FB190CFC2D6ED60A2D3B241F7F57
3,191,813 UART: Caliptra RT
3,192,066 UART: [state] CFI Enabled
3,299,040 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,796 UART:
3,299,812 UART: Running Caliptra ROM ...
3,300,220 UART:
3,300,275 UART: [state] CFI Enabled
3,303,434 UART: [state] LifecycleState = Production
3,304,042 UART: [state] DebugLocked = Yes
3,304,734 UART: [state] Starting the WD Timer 40000000 cycles
3,306,249 UART: [kat] SHA2-256
4,109,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,928 UART: [kat] ++
4,114,080 UART: [kat] sha1
4,118,218 UART: [kat] SHA2-256
4,120,158 UART: [kat] SHA2-384
4,122,979 UART: [kat] SHA2-512-ACC
4,124,880 UART: [kat] ECC-384
4,134,617 UART: [kat] HMAC-384Kdf
4,139,323 UART: [kat] LMS
4,387,635 UART: [kat] --
4,388,417 UART: [warm-reset] ++
4,389,238 UART: [warm-reset] --
4,390,347 UART: [state] Locking Datavault
4,391,269 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,873 UART: [state] Locking ICCM
4,392,315 UART: [exit] Launching FMC @ 0x40000130
4,397,644 UART:
4,397,660 UART: Running Caliptra FMC ...
4,398,068 UART:
4,398,122 UART: [state] CFI Enabled
4,399,157 UART: [aliasrt :skip pcr extension
4,399,630 UART: [art] Extend RT PCRs Done
4,400,058 UART: [art] Lock RT PCRs Done
4,401,399 UART: [art] Populate DV Done
4,409,585 UART: [fht] FMC Alias Private Key: 7
4,410,749 UART: [art] Derive CDI
4,411,029 UART: [art] Store in in slot 0x4
4,496,770 UART: [art] Derive Key Pair
4,497,130 UART: [art] Store priv key in slot 0x5
4,510,104 UART: [art] Derive Key Pair - Done
4,524,823 UART: [art] Signing Cert with AUTHO
4,525,303 UART: RITY.KEYID = 7
4,540,919 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,684 UART: [art] PUB.X = 9C1158CA2D7E67ACF8085EAC1ED58E86FD479B19780E07892C6101C4B9723F07612028F7403F20831BA4A09E8A7823FA
4,548,439 UART: [art] PUB.Y = B617871FA5215FD62A3A2292348C915B01D4CF34CF852B72B20E6CC8486869E56A81C20811FCB60BF3E2B42E1FE963B5
4,555,381 UART: [art] SIG.R = 26F42D9ADFF2B2396FEFF397D15629FBFC95EBA9CF4C3D6C4328B8FBA58D15E09562E02486C8FDD807774808F2EBFF22
4,562,163 UART: [art] SIG.S = 72419BF6BAF305D3E151C4D5CAA32FD127D0096B872088748A359669419DF3ABEEC6FB190CFC2D6ED60A2D3B241F7F57
4,585,664 UART: Caliptra RT
4,585,917 UART: [state] CFI Enabled
4,865,219 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,913 UART: [state] DebugLocked = Yes
86,665 UART: [state] Starting the WD Timer 40000000 cycles
88,184 UART: [kat] SHA2-256
891,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,863 UART: [kat] ++
896,015 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
905,142 UART: [kat] SHA2-512-ACC
907,043 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,174,572 ready_for_fw is high
1,174,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,611 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,481 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,187 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,103 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,247 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,012 >>> mbox cmd response: success
2,798,250 UART: [afmc] ++
2,798,418 UART: [afmc] CDI.KEYID = 6
2,798,781 UART: [afmc] SUBJECT.KEYID = 7
2,799,207 UART: [afmc] AUTHORITY.KEYID = 5
2,834,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,337 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,056 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,949 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,656 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,403 UART: [afmc] --
2,878,412 UART: [cold-reset] --
2,879,100 UART: [state] Locking Datavault
2,880,303 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,907 UART: [state] Locking ICCM
2,881,327 UART: [exit] Launching FMC @ 0x40000130
2,886,656 UART:
2,886,672 UART: Running Caliptra FMC ...
2,887,080 UART:
2,887,134 UART: [state] CFI Enabled
2,897,779 UART: [fht] FMC Alias Private Key: 7
3,005,592 UART: [art] Extend RT PCRs Done
3,006,020 UART: [art] Lock RT PCRs Done
3,007,804 UART: [art] Populate DV Done
3,015,970 UART: [fht] FMC Alias Private Key: 7
3,016,940 UART: [art] Derive CDI
3,017,220 UART: [art] Store in in slot 0x4
3,102,853 UART: [art] Derive Key Pair
3,103,213 UART: [art] Store priv key in slot 0x5
3,116,585 UART: [art] Derive Key Pair - Done
3,131,508 UART: [art] Signing Cert with AUTHO
3,131,988 UART: RITY.KEYID = 7
3,147,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,401 UART: [art] PUB.X = 7D1151E9822FB4253FDBC3ECB80481A9D1B652C0634E99A01B60F4E30F10DB9EA354A3EB1F62474DD281F398BB16ECAB
3,155,179 UART: [art] PUB.Y = DF720A342B80D9E1397CC81121380BCD65333E7260827B0873D0C92CDE0992D6B90DDEAE67FA0952663A30F64F005F7C
3,162,091 UART: [art] SIG.R = 34C1F3699DAABE5AB98E77E7095E36EA720443418C06CAC179EFDA6A52B5D514344711F77EF0FBEC357BC28A06B0B3B3
3,168,863 UART: [art] SIG.S = EF54E6F95AC1E4DDEA4FF2F27CA9CCCCBC99FD5AA69FDE89357CF2AB35A02E504B0EF5386ACD62441EFE4D076BC9FDC2
3,192,444 UART: Caliptra RT
3,192,697 UART: [state] CFI Enabled
3,300,986 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,742 UART:
3,301,758 UART: Running Caliptra ROM ...
3,302,166 UART:
3,302,221 UART: [state] CFI Enabled
3,304,584 UART: [state] LifecycleState = Production
3,305,192 UART: [state] DebugLocked = Yes
3,305,764 UART: [state] Starting the WD Timer 40000000 cycles
3,307,335 UART: [kat] SHA2-256
4,110,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,014 UART: [kat] ++
4,115,166 UART: [kat] sha1
4,119,292 UART: [kat] SHA2-256
4,121,232 UART: [kat] SHA2-384
4,123,959 UART: [kat] SHA2-512-ACC
4,125,860 UART: [kat] ECC-384
4,135,319 UART: [kat] HMAC-384Kdf
4,139,939 UART: [kat] LMS
4,388,251 UART: [kat] --
4,389,035 UART: [warm-reset] ++
4,390,218 UART: [warm-reset] --
4,391,263 UART: [state] Locking Datavault
4,392,015 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,619 UART: [state] Locking ICCM
4,393,277 UART: [exit] Launching FMC @ 0x40000130
4,398,606 UART:
4,398,622 UART: Running Caliptra FMC ...
4,399,030 UART:
4,399,084 UART: [state] CFI Enabled
4,400,367 UART: [aliasrt :skip pcr extension
4,400,840 UART: [art] Extend RT PCRs Done
4,401,268 UART: [art] Lock RT PCRs Done
4,402,643 UART: [art] Populate DV Done
4,411,001 UART: [fht] FMC Alias Private Key: 7
4,411,933 UART: [art] Derive CDI
4,412,213 UART: [art] Store in in slot 0x4
4,497,566 UART: [art] Derive Key Pair
4,497,926 UART: [art] Store priv key in slot 0x5
4,511,080 UART: [art] Derive Key Pair - Done
4,525,905 UART: [art] Signing Cert with AUTHO
4,526,385 UART: RITY.KEYID = 7
4,541,513 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,278 UART: [art] PUB.X = 7D1151E9822FB4253FDBC3ECB80481A9D1B652C0634E99A01B60F4E30F10DB9EA354A3EB1F62474DD281F398BB16ECAB
4,549,056 UART: [art] PUB.Y = DF720A342B80D9E1397CC81121380BCD65333E7260827B0873D0C92CDE0992D6B90DDEAE67FA0952663A30F64F005F7C
4,555,968 UART: [art] SIG.R = 34C1F3699DAABE5AB98E77E7095E36EA720443418C06CAC179EFDA6A52B5D514344711F77EF0FBEC357BC28A06B0B3B3
4,562,740 UART: [art] SIG.S = EF54E6F95AC1E4DDEA4FF2F27CA9CCCCBC99FD5AA69FDE89357CF2AB35A02E504B0EF5386ACD62441EFE4D076BC9FDC2
4,586,485 UART: Caliptra RT
4,586,738 UART: [state] CFI Enabled
4,870,017 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Production
85,964 UART: [state] DebugLocked = Yes
86,602 UART: [state] Starting the WD Timer 40000000 cycles
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,966 UART: [kat] ++
896,118 UART: [kat] sha1
900,416 UART: [kat] SHA2-256
902,356 UART: [kat] SHA2-384
905,135 UART: [kat] SHA2-512-ACC
907,036 UART: [kat] ECC-384
917,399 UART: [kat] HMAC-384Kdf
921,935 UART: [kat] LMS
1,170,247 UART: [kat] --
1,171,200 UART: [cold-reset] ++
1,171,531 UART: [fht] FHT @ 0x50003400
1,174,303 UART: [idev] ++
1,174,471 UART: [idev] CDI.KEYID = 6
1,174,832 UART: [idev] SUBJECT.KEYID = 7
1,175,257 UART: [idev] UDS.KEYID = 0
1,175,603 ready_for_fw is high
1,175,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,104 UART: [idev] Erasing UDS.KEYID = 0
1,199,973 UART: [idev] Sha1 KeyId Algorithm
1,208,822 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,539 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,178 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,872 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,742 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,448 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,568 UART: [ldev] --
1,281,902 UART: [fwproc] Wait for Commands...
1,282,481 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,800,095 >>> mbox cmd response: success
2,801,227 UART: [afmc] ++
2,801,395 UART: [afmc] CDI.KEYID = 6
2,801,758 UART: [afmc] SUBJECT.KEYID = 7
2,802,184 UART: [afmc] AUTHORITY.KEYID = 5
2,838,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,308 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,027 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,920 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,627 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,466 UART: [afmc] --
2,881,549 UART: [cold-reset] --
2,882,189 UART: [state] Locking Datavault
2,883,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,966 UART: [state] Locking ICCM
2,884,548 UART: [exit] Launching FMC @ 0x40000130
2,889,877 UART:
2,889,893 UART: Running Caliptra FMC ...
2,890,301 UART:
2,890,444 UART: [state] CFI Enabled
2,901,123 UART: [fht] FMC Alias Private Key: 7
3,008,708 UART: [art] Extend RT PCRs Done
3,009,136 UART: [art] Lock RT PCRs Done
3,010,584 UART: [art] Populate DV Done
3,019,078 UART: [fht] FMC Alias Private Key: 7
3,020,102 UART: [art] Derive CDI
3,020,382 UART: [art] Store in in slot 0x4
3,106,169 UART: [art] Derive Key Pair
3,106,529 UART: [art] Store priv key in slot 0x5
3,119,721 UART: [art] Derive Key Pair - Done
3,134,360 UART: [art] Signing Cert with AUTHO
3,134,840 UART: RITY.KEYID = 7
3,150,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,079 UART: [art] PUB.X = B24F8BA20EA14B098BDA544DADD0802CC6761F7BA4F07AC8ADB42BF8386575FDB2A3E0CB0554E771057A8C007E71B273
3,157,831 UART: [art] PUB.Y = F92CED791AD068BF1D53AAC3BF79BD58D25B519EC998A9DE52377B538C7D2404B87E689721A4D09A008E7C7377C4121C
3,164,764 UART: [art] SIG.R = E742341238DC079A6C524E13303C5FB8985C92122BBC3CE3ED9F6D6BC039C6D019A37ACBC4D3D08EE4A93E88B23EF219
3,171,543 UART: [art] SIG.S = EE36023CA549FE57D897F6731711170B9D668D969B07631503CF325968EC8233397E302244864DB3ECA9CE998E638F62
3,195,174 UART: Caliptra RT
3,195,519 UART: [state] CFI Enabled
3,303,100 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,856 UART:
3,303,872 UART: Running Caliptra ROM ...
3,304,280 UART:
3,304,422 UART: [state] CFI Enabled
3,306,731 UART: [state] LifecycleState = Production
3,307,339 UART: [state] DebugLocked = Yes
3,307,909 UART: [state] Starting the WD Timer 40000000 cycles
3,309,500 UART: [kat] SHA2-256
4,113,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,179 UART: [kat] ++
4,117,331 UART: [kat] sha1
4,121,613 UART: [kat] SHA2-256
4,123,553 UART: [kat] SHA2-384
4,126,302 UART: [kat] SHA2-512-ACC
4,128,203 UART: [kat] ECC-384
4,138,112 UART: [kat] HMAC-384Kdf
4,142,724 UART: [kat] LMS
4,391,036 UART: [kat] --
4,391,968 UART: [warm-reset] ++
4,392,635 UART: [warm-reset] --
4,393,348 UART: [state] Locking Datavault
4,394,086 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,690 UART: [state] Locking ICCM
4,395,124 UART: [exit] Launching FMC @ 0x40000130
4,400,453 UART:
4,400,469 UART: Running Caliptra FMC ...
4,400,877 UART:
4,401,020 UART: [state] CFI Enabled
4,402,631 UART: [aliasrt :skip pcr extension
4,403,104 UART: [art] Extend RT PCRs Done
4,403,532 UART: [art] Lock RT PCRs Done
4,404,929 UART: [art] Populate DV Done
4,413,355 UART: [fht] FMC Alias Private Key: 7
4,414,493 UART: [art] Derive CDI
4,414,773 UART: [art] Store in in slot 0x4
4,500,448 UART: [art] Derive Key Pair
4,500,808 UART: [art] Store priv key in slot 0x5
4,514,136 UART: [art] Derive Key Pair - Done
4,529,069 UART: [art] Signing Cert with AUTHO
4,529,549 UART: RITY.KEYID = 7
4,544,309 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,074 UART: [art] PUB.X = B24F8BA20EA14B098BDA544DADD0802CC6761F7BA4F07AC8ADB42BF8386575FDB2A3E0CB0554E771057A8C007E71B273
4,551,826 UART: [art] PUB.Y = F92CED791AD068BF1D53AAC3BF79BD58D25B519EC998A9DE52377B538C7D2404B87E689721A4D09A008E7C7377C4121C
4,558,759 UART: [art] SIG.R = E742341238DC079A6C524E13303C5FB8985C92122BBC3CE3ED9F6D6BC039C6D019A37ACBC4D3D08EE4A93E88B23EF219
4,565,538 UART: [art] SIG.S = EE36023CA549FE57D897F6731711170B9D668D969B07631503CF325968EC8233397E302244864DB3ECA9CE998E638F62
4,589,513 UART: Caliptra RT
4,589,858 UART: [state] CFI Enabled
4,875,515 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Production
86,270 UART: [state] DebugLocked = Yes
87,022 UART: [state] Starting the WD Timer 40000000 cycles
88,727 UART: [kat] SHA2-256
892,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,406 UART: [kat] ++
896,558 UART: [kat] sha1
900,720 UART: [kat] SHA2-256
902,660 UART: [kat] SHA2-384
905,479 UART: [kat] SHA2-512-ACC
907,380 UART: [kat] ECC-384
916,803 UART: [kat] HMAC-384Kdf
921,541 UART: [kat] LMS
1,169,853 UART: [kat] --
1,170,886 UART: [cold-reset] ++
1,171,441 UART: [fht] FHT @ 0x50003400
1,173,971 UART: [idev] ++
1,174,139 UART: [idev] CDI.KEYID = 6
1,174,500 UART: [idev] SUBJECT.KEYID = 7
1,174,925 UART: [idev] UDS.KEYID = 0
1,175,271 ready_for_fw is high
1,175,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,760 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,630 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,336 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,356 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,425 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,273 >>> mbox cmd response: success
2,799,513 UART: [afmc] ++
2,799,681 UART: [afmc] CDI.KEYID = 6
2,800,044 UART: [afmc] SUBJECT.KEYID = 7
2,800,470 UART: [afmc] AUTHORITY.KEYID = 5
2,836,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,622 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,341 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,234 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,941 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,882 UART: [afmc] --
2,879,967 UART: [cold-reset] --
2,880,775 UART: [state] Locking Datavault
2,881,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,550 UART: [state] Locking ICCM
2,883,124 UART: [exit] Launching FMC @ 0x40000130
2,888,453 UART:
2,888,469 UART: Running Caliptra FMC ...
2,888,877 UART:
2,889,020 UART: [state] CFI Enabled
2,899,633 UART: [fht] FMC Alias Private Key: 7
3,007,890 UART: [art] Extend RT PCRs Done
3,008,318 UART: [art] Lock RT PCRs Done
3,009,864 UART: [art] Populate DV Done
3,018,024 UART: [fht] FMC Alias Private Key: 7
3,018,952 UART: [art] Derive CDI
3,019,232 UART: [art] Store in in slot 0x4
3,105,217 UART: [art] Derive Key Pair
3,105,577 UART: [art] Store priv key in slot 0x5
3,118,859 UART: [art] Derive Key Pair - Done
3,133,540 UART: [art] Signing Cert with AUTHO
3,134,020 UART: RITY.KEYID = 7
3,149,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,811 UART: [art] PUB.X = 12DC29B47750BC2FE17B1BA1C61111637361E1148E90A286213B68B8DE1FE0CF8931DD12A44A1BB01F4C5971FFB02173
3,156,585 UART: [art] PUB.Y = F95DC067469D4A1A8176FEF55E3D6B85605231FB8E522B946C8D6CE0281CE2983C48A0D9A9A686008EE4C849B847585B
3,163,515 UART: [art] SIG.R = 4AC964D7307BE265EF5C6367B8D972B5AEEADD3E3A20E7CEBC761A88A707D88677C146DE5695CBF0EB86D0AC719FB483
3,170,300 UART: [art] SIG.S = E06DB06C687C00CB19E688D2D07B90D7E7051F6208F9A2E9ABC12ED5509D352B975E992A0ACE7211A8D603640AB565D9
3,194,152 UART: Caliptra RT
3,194,497 UART: [state] CFI Enabled
3,302,628 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,384 UART:
3,303,400 UART: Running Caliptra ROM ...
3,303,808 UART:
3,303,950 UART: [state] CFI Enabled
3,306,561 UART: [state] LifecycleState = Production
3,307,169 UART: [state] DebugLocked = Yes
3,307,883 UART: [state] Starting the WD Timer 40000000 cycles
3,309,444 UART: [kat] SHA2-256
4,112,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,123 UART: [kat] ++
4,117,275 UART: [kat] sha1
4,121,573 UART: [kat] SHA2-256
4,123,513 UART: [kat] SHA2-384
4,126,250 UART: [kat] SHA2-512-ACC
4,128,151 UART: [kat] ECC-384
4,137,884 UART: [kat] HMAC-384Kdf
4,142,558 UART: [kat] LMS
4,390,870 UART: [kat] --
4,391,802 UART: [warm-reset] ++
4,392,559 UART: [warm-reset] --
4,393,462 UART: [state] Locking Datavault
4,394,336 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,940 UART: [state] Locking ICCM
4,395,468 UART: [exit] Launching FMC @ 0x40000130
4,400,797 UART:
4,400,813 UART: Running Caliptra FMC ...
4,401,221 UART:
4,401,364 UART: [state] CFI Enabled
4,402,717 UART: [aliasrt :skip pcr extension
4,403,190 UART: [art] Extend RT PCRs Done
4,403,618 UART: [art] Lock RT PCRs Done
4,405,109 UART: [art] Populate DV Done
4,413,329 UART: [fht] FMC Alias Private Key: 7
4,414,387 UART: [art] Derive CDI
4,414,667 UART: [art] Store in in slot 0x4
4,500,374 UART: [art] Derive Key Pair
4,500,734 UART: [art] Store priv key in slot 0x5
4,513,606 UART: [art] Derive Key Pair - Done
4,528,437 UART: [art] Signing Cert with AUTHO
4,528,917 UART: RITY.KEYID = 7
4,543,775 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,540 UART: [art] PUB.X = 12DC29B47750BC2FE17B1BA1C61111637361E1148E90A286213B68B8DE1FE0CF8931DD12A44A1BB01F4C5971FFB02173
4,551,314 UART: [art] PUB.Y = F95DC067469D4A1A8176FEF55E3D6B85605231FB8E522B946C8D6CE0281CE2983C48A0D9A9A686008EE4C849B847585B
4,558,244 UART: [art] SIG.R = 4AC964D7307BE265EF5C6367B8D972B5AEEADD3E3A20E7CEBC761A88A707D88677C146DE5695CBF0EB86D0AC719FB483
4,565,029 UART: [art] SIG.S = E06DB06C687C00CB19E688D2D07B90D7E7051F6208F9A2E9ABC12ED5509D352B975E992A0ACE7211A8D603640AB565D9
4,588,553 UART: Caliptra RT
4,588,898 UART: [state] CFI Enabled
4,869,787 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Production
86,029 UART: [state] DebugLocked = Yes
86,791 UART: [state] Starting the WD Timer 40000000 cycles
88,506 UART: [kat] SHA2-256
892,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,185 UART: [kat] ++
896,337 UART: [kat] sha1
900,473 UART: [kat] SHA2-256
902,413 UART: [kat] SHA2-384
905,134 UART: [kat] SHA2-512-ACC
907,035 UART: [kat] ECC-384
916,944 UART: [kat] HMAC-384Kdf
921,446 UART: [kat] LMS
1,169,758 UART: [kat] --
1,170,697 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,752 UART: [idev] ++
1,173,920 UART: [idev] CDI.KEYID = 6
1,174,281 UART: [idev] SUBJECT.KEYID = 7
1,174,706 UART: [idev] UDS.KEYID = 0
1,175,052 ready_for_fw is high
1,175,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,631 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,912 UART: [ldev] ++
1,210,080 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,871 UART: [ldev] AUTHORITY.KEYID = 7
1,211,334 UART: [ldev] FE.KEYID = 1
1,216,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,227 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,097 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,803 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,791 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,711 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,098 >>> mbox cmd response: success
2,799,164 UART: [afmc] ++
2,799,332 UART: [afmc] CDI.KEYID = 6
2,799,695 UART: [afmc] SUBJECT.KEYID = 7
2,800,121 UART: [afmc] AUTHORITY.KEYID = 5
2,835,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,593 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,312 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,205 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,912 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,633 UART: [afmc] --
2,878,746 UART: [cold-reset] --
2,879,426 UART: [state] Locking Datavault
2,880,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,161 UART: [state] Locking ICCM
2,881,673 UART: [exit] Launching FMC @ 0x40000130
2,887,002 UART:
2,887,018 UART: Running Caliptra FMC ...
2,887,426 UART:
2,887,480 UART: [state] CFI Enabled
2,898,069 UART: [fht] FMC Alias Private Key: 7
3,006,566 UART: [art] Extend RT PCRs Done
3,006,994 UART: [art] Lock RT PCRs Done
3,008,176 UART: [art] Populate DV Done
3,016,584 UART: [fht] FMC Alias Private Key: 7
3,017,706 UART: [art] Derive CDI
3,017,986 UART: [art] Store in in slot 0x4
3,103,231 UART: [art] Derive Key Pair
3,103,591 UART: [art] Store priv key in slot 0x5
3,116,473 UART: [art] Derive Key Pair - Done
3,131,364 UART: [art] Signing Cert with AUTHO
3,131,844 UART: RITY.KEYID = 7
3,146,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,319 UART: [art] PUB.X = 289F44A0F5061CDF1933D8DCA207E6918C2CBB5732B8F545C3AFFAEE78EED0A25D4E22EFCBB99E261FBB667D3EB1EB0F
3,154,108 UART: [art] PUB.Y = 6A89BE3D5436504A0CDCC04431A8536D3543F173D7D3CC678B6D289B9FFEFF1D57CE6E277A4FD10F1368295B12149445
3,161,056 UART: [art] SIG.R = 13DCCBB8F2AC7A6B0CBCE7C9EC3D2B28FD1635812BAB4D6657F92EB93F54F6A7DA9021F7154075C52114C88C7CCEC8C6
3,167,845 UART: [art] SIG.S = 82CE91ECA1DB1D27EFE5551B1D0BD34D0F26662CD6A45408A1DE4C81BE37AD5FF551FE806DF33FF77D0EAC0A59A36658
3,191,975 UART: Caliptra RT
3,192,228 UART: [state] CFI Enabled
3,299,637 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,393 UART:
3,300,409 UART: Running Caliptra ROM ...
3,300,817 UART:
3,300,872 UART: [state] CFI Enabled
3,303,383 UART: [state] LifecycleState = Production
3,303,991 UART: [state] DebugLocked = Yes
3,304,581 UART: [state] Starting the WD Timer 40000000 cycles
3,306,126 UART: [kat] SHA2-256
4,109,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,805 UART: [kat] ++
4,113,957 UART: [kat] sha1
4,118,137 UART: [kat] SHA2-256
4,120,077 UART: [kat] SHA2-384
4,122,940 UART: [kat] SHA2-512-ACC
4,124,841 UART: [kat] ECC-384
4,134,452 UART: [kat] HMAC-384Kdf
4,139,124 UART: [kat] LMS
4,387,436 UART: [kat] --
4,388,546 UART: [warm-reset] ++
4,389,261 UART: [warm-reset] --
4,390,176 UART: [state] Locking Datavault
4,391,176 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,780 UART: [state] Locking ICCM
4,392,434 UART: [exit] Launching FMC @ 0x40000130
4,397,763 UART:
4,397,779 UART: Running Caliptra FMC ...
4,398,187 UART:
4,398,241 UART: [state] CFI Enabled
4,399,564 UART: [aliasrt :skip pcr extension
4,400,037 UART: [art] Extend RT PCRs Done
4,400,465 UART: [art] Lock RT PCRs Done
4,401,726 UART: [art] Populate DV Done
4,409,848 UART: [fht] FMC Alias Private Key: 7
4,410,912 UART: [art] Derive CDI
4,411,192 UART: [art] Store in in slot 0x4
4,497,181 UART: [art] Derive Key Pair
4,497,541 UART: [art] Store priv key in slot 0x5
4,510,287 UART: [art] Derive Key Pair - Done
4,524,928 UART: [art] Signing Cert with AUTHO
4,525,408 UART: RITY.KEYID = 7
4,540,446 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,211 UART: [art] PUB.X = 289F44A0F5061CDF1933D8DCA207E6918C2CBB5732B8F545C3AFFAEE78EED0A25D4E22EFCBB99E261FBB667D3EB1EB0F
4,548,000 UART: [art] PUB.Y = 6A89BE3D5436504A0CDCC04431A8536D3543F173D7D3CC678B6D289B9FFEFF1D57CE6E277A4FD10F1368295B12149445
4,554,948 UART: [art] SIG.R = 13DCCBB8F2AC7A6B0CBCE7C9EC3D2B28FD1635812BAB4D6657F92EB93F54F6A7DA9021F7154075C52114C88C7CCEC8C6
4,561,737 UART: [art] SIG.S = 82CE91ECA1DB1D27EFE5551B1D0BD34D0F26662CD6A45408A1DE4C81BE37AD5FF551FE806DF33FF77D0EAC0A59A36658
4,585,871 UART: Caliptra RT
4,586,124 UART: [state] CFI Enabled
4,864,455 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Production
85,487 UART: [state] DebugLocked = Yes
86,037 UART: [state] Starting the WD Timer 40000000 cycles
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,174,486 ready_for_fw is high
1,174,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,017 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,887 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,593 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,657 UART: [ldev] --
1,282,039 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,391 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,235 >>> mbox cmd response: success
2,799,485 UART: [afmc] ++
2,799,653 UART: [afmc] CDI.KEYID = 6
2,800,016 UART: [afmc] SUBJECT.KEYID = 7
2,800,442 UART: [afmc] AUTHORITY.KEYID = 5
2,835,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,852 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,571 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,464 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,171 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,986 UART: [afmc] --
2,878,909 UART: [cold-reset] --
2,879,575 UART: [state] Locking Datavault
2,880,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,554 UART: [state] Locking ICCM
2,882,142 UART: [exit] Launching FMC @ 0x40000130
2,887,471 UART:
2,887,487 UART: Running Caliptra FMC ...
2,887,895 UART:
2,887,949 UART: [state] CFI Enabled
2,898,768 UART: [fht] FMC Alias Private Key: 7
3,006,783 UART: [art] Extend RT PCRs Done
3,007,211 UART: [art] Lock RT PCRs Done
3,008,563 UART: [art] Populate DV Done
3,016,765 UART: [fht] FMC Alias Private Key: 7
3,017,855 UART: [art] Derive CDI
3,018,135 UART: [art] Store in in slot 0x4
3,103,536 UART: [art] Derive Key Pair
3,103,896 UART: [art] Store priv key in slot 0x5
3,117,384 UART: [art] Derive Key Pair - Done
3,132,592 UART: [art] Signing Cert with AUTHO
3,133,072 UART: RITY.KEYID = 7
3,148,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,103 UART: [art] PUB.X = D00E1557607D47762D487F7A4AACA28512C331EFC26561EAE5E0BF6EA0046B4F95892AA4A75BE468DBE9C956105F6A41
3,155,875 UART: [art] PUB.Y = 6B263894FC3CFE770BA01FFCA4805540B2471ECFDCC962CCB72FA0DA1FA20EEA0731060F494193393E77F5EB1F311CC9
3,162,826 UART: [art] SIG.R = 1B5BC163B8F1181B49822A3E473557B6234962C07977F2E19936001404FC7DC3703BE51A1BA6738C951286B931BE6B93
3,169,561 UART: [art] SIG.S = D0CB327291230E751478BC50C386B79D54EB0C7A21269441C9B60388EED9A2B654D228A54D894312443273BFD39966A1
3,193,133 UART: Caliptra RT
3,193,386 UART: [state] CFI Enabled
3,301,711 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,467 UART:
3,302,483 UART: Running Caliptra ROM ...
3,302,891 UART:
3,302,946 UART: [state] CFI Enabled
3,305,789 UART: [state] LifecycleState = Production
3,306,397 UART: [state] DebugLocked = Yes
3,306,969 UART: [state] Starting the WD Timer 40000000 cycles
3,308,458 UART: [kat] SHA2-256
4,112,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,137 UART: [kat] ++
4,116,289 UART: [kat] sha1
4,120,665 UART: [kat] SHA2-256
4,122,605 UART: [kat] SHA2-384
4,125,294 UART: [kat] SHA2-512-ACC
4,127,195 UART: [kat] ECC-384
4,136,812 UART: [kat] HMAC-384Kdf
4,141,382 UART: [kat] LMS
4,389,694 UART: [kat] --
4,390,646 UART: [warm-reset] ++
4,391,573 UART: [warm-reset] --
4,392,164 UART: [state] Locking Datavault
4,392,872 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,476 UART: [state] Locking ICCM
4,394,126 UART: [exit] Launching FMC @ 0x40000130
4,399,455 UART:
4,399,471 UART: Running Caliptra FMC ...
4,399,879 UART:
4,399,933 UART: [state] CFI Enabled
4,401,234 UART: [aliasrt :skip pcr extension
4,401,707 UART: [art] Extend RT PCRs Done
4,402,135 UART: [art] Lock RT PCRs Done
4,403,580 UART: [art] Populate DV Done
4,411,854 UART: [fht] FMC Alias Private Key: 7
4,412,900 UART: [art] Derive CDI
4,413,180 UART: [art] Store in in slot 0x4
4,498,651 UART: [art] Derive Key Pair
4,499,011 UART: [art] Store priv key in slot 0x5
4,512,433 UART: [art] Derive Key Pair - Done
4,527,095 UART: [art] Signing Cert with AUTHO
4,527,575 UART: RITY.KEYID = 7
4,542,741 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,506 UART: [art] PUB.X = D00E1557607D47762D487F7A4AACA28512C331EFC26561EAE5E0BF6EA0046B4F95892AA4A75BE468DBE9C956105F6A41
4,550,278 UART: [art] PUB.Y = 6B263894FC3CFE770BA01FFCA4805540B2471ECFDCC962CCB72FA0DA1FA20EEA0731060F494193393E77F5EB1F311CC9
4,557,229 UART: [art] SIG.R = 1B5BC163B8F1181B49822A3E473557B6234962C07977F2E19936001404FC7DC3703BE51A1BA6738C951286B931BE6B93
4,563,964 UART: [art] SIG.S = D0CB327291230E751478BC50C386B79D54EB0C7A21269441C9B60388EED9A2B654D228A54D894312443273BFD39966A1
4,587,606 UART: Caliptra RT
4,587,859 UART: [state] CFI Enabled
4,866,526 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Production
86,064 UART: [state] DebugLocked = Yes
86,772 UART: [state] Starting the WD Timer 40000000 cycles
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
917,025 UART: [kat] HMAC-384Kdf
921,805 UART: [kat] LMS
1,170,117 UART: [kat] --
1,171,052 UART: [cold-reset] ++
1,171,429 UART: [fht] FHT @ 0x50003400
1,174,065 UART: [idev] ++
1,174,233 UART: [idev] CDI.KEYID = 6
1,174,594 UART: [idev] SUBJECT.KEYID = 7
1,175,019 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,209,070 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,604 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,474 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,180 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,398 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,527 UART: [fwproc] Recv command 0x46574c44
1,284,260 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,819 >>> mbox cmd response: success
2,800,081 UART: [afmc] ++
2,800,249 UART: [afmc] CDI.KEYID = 6
2,800,612 UART: [afmc] SUBJECT.KEYID = 7
2,801,038 UART: [afmc] AUTHORITY.KEYID = 5
2,836,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,856 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,575 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,468 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,175 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,010 UART: [afmc] --
2,880,035 UART: [cold-reset] --
2,881,067 UART: [state] Locking Datavault
2,882,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,826 UART: [state] Locking ICCM
2,883,388 UART: [exit] Launching FMC @ 0x40000130
2,888,717 UART:
2,888,733 UART: Running Caliptra FMC ...
2,889,141 UART:
2,889,284 UART: [state] CFI Enabled
2,900,315 UART: [fht] FMC Alias Private Key: 7
3,008,342 UART: [art] Extend RT PCRs Done
3,008,770 UART: [art] Lock RT PCRs Done
3,010,036 UART: [art] Populate DV Done
3,017,958 UART: [fht] FMC Alias Private Key: 7
3,018,986 UART: [art] Derive CDI
3,019,266 UART: [art] Store in in slot 0x4
3,105,065 UART: [art] Derive Key Pair
3,105,425 UART: [art] Store priv key in slot 0x5
3,118,879 UART: [art] Derive Key Pair - Done
3,133,844 UART: [art] Signing Cert with AUTHO
3,134,324 UART: RITY.KEYID = 7
3,149,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,417 UART: [art] PUB.X = C048446DBEF70465084433F94109FB234612C18F70F334B3F88D6F9AFDBE012175A9A8FFC774FFF1E5C6A7BAB5BED78B
3,157,189 UART: [art] PUB.Y = 57959A6E4A2349455611F30ACEFA1B3E41AC0624607622E98664F754854A4DFFAAC876BAE7510CE4810D290D52BE3DA1
3,164,128 UART: [art] SIG.R = DBBDF5CF55E8DCEC1F5C208E2163FBFDB6DEFAC32DF28F28007904ACC966AD755253CA1D46BDC73BDD0A75B5DA2888C3
3,170,902 UART: [art] SIG.S = 47179C0F49D87FB09C98FC66D972882CB14396F0C10E6E84D5676C74796B8FBBD7BEC42D26CDC2C62423AB0A045C97E8
3,194,591 UART: Caliptra RT
3,194,936 UART: [state] CFI Enabled
3,303,171 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,927 UART:
3,303,943 UART: Running Caliptra ROM ...
3,304,351 UART:
3,304,493 UART: [state] CFI Enabled
3,307,036 UART: [state] LifecycleState = Production
3,307,644 UART: [state] DebugLocked = Yes
3,308,300 UART: [state] Starting the WD Timer 40000000 cycles
3,309,963 UART: [kat] SHA2-256
4,113,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,642 UART: [kat] ++
4,117,794 UART: [kat] sha1
4,122,178 UART: [kat] SHA2-256
4,124,118 UART: [kat] SHA2-384
4,126,997 UART: [kat] SHA2-512-ACC
4,128,898 UART: [kat] ECC-384
4,138,565 UART: [kat] HMAC-384Kdf
4,143,247 UART: [kat] LMS
4,391,559 UART: [kat] --
4,392,413 UART: [warm-reset] ++
4,393,462 UART: [warm-reset] --
4,394,479 UART: [state] Locking Datavault
4,395,347 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,951 UART: [state] Locking ICCM
4,396,617 UART: [exit] Launching FMC @ 0x40000130
4,401,946 UART:
4,401,962 UART: Running Caliptra FMC ...
4,402,370 UART:
4,402,513 UART: [state] CFI Enabled
4,403,782 UART: [aliasrt :skip pcr extension
4,404,255 UART: [art] Extend RT PCRs Done
4,404,683 UART: [art] Lock RT PCRs Done
4,405,748 UART: [art] Populate DV Done
4,413,984 UART: [fht] FMC Alias Private Key: 7
4,415,126 UART: [art] Derive CDI
4,415,406 UART: [art] Store in in slot 0x4
4,501,077 UART: [art] Derive Key Pair
4,501,437 UART: [art] Store priv key in slot 0x5
4,515,201 UART: [art] Derive Key Pair - Done
4,529,932 UART: [art] Signing Cert with AUTHO
4,530,412 UART: RITY.KEYID = 7
4,545,894 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,659 UART: [art] PUB.X = C048446DBEF70465084433F94109FB234612C18F70F334B3F88D6F9AFDBE012175A9A8FFC774FFF1E5C6A7BAB5BED78B
4,553,431 UART: [art] PUB.Y = 57959A6E4A2349455611F30ACEFA1B3E41AC0624607622E98664F754854A4DFFAAC876BAE7510CE4810D290D52BE3DA1
4,560,370 UART: [art] SIG.R = DBBDF5CF55E8DCEC1F5C208E2163FBFDB6DEFAC32DF28F28007904ACC966AD755253CA1D46BDC73BDD0A75B5DA2888C3
4,567,144 UART: [art] SIG.S = 47179C0F49D87FB09C98FC66D972882CB14396F0C10E6E84D5676C74796B8FBBD7BEC42D26CDC2C62423AB0A045C97E8
4,590,977 UART: Caliptra RT
4,591,322 UART: [state] CFI Enabled
4,872,101 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Production
86,062 UART: [state] DebugLocked = Yes
86,802 UART: [state] Starting the WD Timer 40000000 cycles
88,447 UART: [kat] SHA2-256
891,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,126 UART: [kat] ++
896,278 UART: [kat] sha1
900,594 UART: [kat] SHA2-256
902,534 UART: [kat] SHA2-384
905,245 UART: [kat] SHA2-512-ACC
907,146 UART: [kat] ECC-384
916,955 UART: [kat] HMAC-384Kdf
921,541 UART: [kat] LMS
1,169,853 UART: [kat] --
1,170,714 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,885 UART: [idev] ++
1,174,053 UART: [idev] CDI.KEYID = 6
1,174,414 UART: [idev] SUBJECT.KEYID = 7
1,174,839 UART: [idev] UDS.KEYID = 0
1,175,185 ready_for_fw is high
1,175,185 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,557 UART: [idev] Sha1 KeyId Algorithm
1,209,518 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,714 UART: [ldev] AUTHORITY.KEYID = 7
1,212,177 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,320 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,190 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,896 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,990 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,233 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,137 >>> mbox cmd response: success
2,799,221 UART: [afmc] ++
2,799,389 UART: [afmc] CDI.KEYID = 6
2,799,752 UART: [afmc] SUBJECT.KEYID = 7
2,800,178 UART: [afmc] AUTHORITY.KEYID = 5
2,835,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,260 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,979 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,872 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,579 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,320 UART: [afmc] --
2,879,233 UART: [cold-reset] --
2,880,157 UART: [state] Locking Datavault
2,881,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,896 UART: [state] Locking ICCM
2,882,386 UART: [exit] Launching FMC @ 0x40000130
2,887,715 UART:
2,887,731 UART: Running Caliptra FMC ...
2,888,139 UART:
2,888,282 UART: [state] CFI Enabled
2,898,779 UART: [fht] FMC Alias Private Key: 7
3,006,282 UART: [art] Extend RT PCRs Done
3,006,710 UART: [art] Lock RT PCRs Done
3,008,168 UART: [art] Populate DV Done
3,016,462 UART: [fht] FMC Alias Private Key: 7
3,017,510 UART: [art] Derive CDI
3,017,790 UART: [art] Store in in slot 0x4
3,103,617 UART: [art] Derive Key Pair
3,103,977 UART: [art] Store priv key in slot 0x5
3,117,843 UART: [art] Derive Key Pair - Done
3,132,735 UART: [art] Signing Cert with AUTHO
3,133,215 UART: RITY.KEYID = 7
3,148,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,066 UART: [art] PUB.X = 292E275F19FD87EC438208EDD832ADE1F493558F34A62D9625D835C9F2B805FAE1D5C379591DE377269399EB961FADD7
3,155,834 UART: [art] PUB.Y = 527668DA18529D62787622211D6A172E8183FADC56D567D3BDCBCE2EEAF0E4ACF353C261654EC529A95B7AFADF1AA521
3,162,798 UART: [art] SIG.R = 1F5D462A590CA6AE72BCE5FC0683F891E323B8311CBDCEF5852AFC1AFFBE12F0DFB8FAF3396AB80D748BD9FA0D7CFF0C
3,169,587 UART: [art] SIG.S = D7F03F93F94D62DB924525DD8DDE9E48F6E263B6E78AF7635A81FBC53A3A184CA6D9C17B3BC2B1B28D093512F84A0754
3,193,990 UART: Caliptra RT
3,194,335 UART: [state] CFI Enabled
3,302,840 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,596 UART:
3,303,612 UART: Running Caliptra ROM ...
3,304,020 UART:
3,304,162 UART: [state] CFI Enabled
3,307,137 UART: [state] LifecycleState = Production
3,307,745 UART: [state] DebugLocked = Yes
3,308,461 UART: [state] Starting the WD Timer 40000000 cycles
3,310,010 UART: [kat] SHA2-256
4,113,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,689 UART: [kat] ++
4,117,841 UART: [kat] sha1
4,122,245 UART: [kat] SHA2-256
4,124,185 UART: [kat] SHA2-384
4,127,072 UART: [kat] SHA2-512-ACC
4,128,973 UART: [kat] ECC-384
4,138,626 UART: [kat] HMAC-384Kdf
4,143,206 UART: [kat] LMS
4,391,518 UART: [kat] --
4,392,612 UART: [warm-reset] ++
4,393,533 UART: [warm-reset] --
4,394,118 UART: [state] Locking Datavault
4,394,932 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,536 UART: [state] Locking ICCM
4,396,102 UART: [exit] Launching FMC @ 0x40000130
4,401,431 UART:
4,401,447 UART: Running Caliptra FMC ...
4,401,855 UART:
4,401,998 UART: [state] CFI Enabled
4,403,181 UART: [aliasrt :skip pcr extension
4,403,654 UART: [art] Extend RT PCRs Done
4,404,082 UART: [art] Lock RT PCRs Done
4,405,445 UART: [art] Populate DV Done
4,413,695 UART: [fht] FMC Alias Private Key: 7
4,414,765 UART: [art] Derive CDI
4,415,045 UART: [art] Store in in slot 0x4
4,500,528 UART: [art] Derive Key Pair
4,500,888 UART: [art] Store priv key in slot 0x5
4,513,650 UART: [art] Derive Key Pair - Done
4,528,612 UART: [art] Signing Cert with AUTHO
4,529,092 UART: RITY.KEYID = 7
4,544,706 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,471 UART: [art] PUB.X = 292E275F19FD87EC438208EDD832ADE1F493558F34A62D9625D835C9F2B805FAE1D5C379591DE377269399EB961FADD7
4,552,239 UART: [art] PUB.Y = 527668DA18529D62787622211D6A172E8183FADC56D567D3BDCBCE2EEAF0E4ACF353C261654EC529A95B7AFADF1AA521
4,559,203 UART: [art] SIG.R = 1F5D462A590CA6AE72BCE5FC0683F891E323B8311CBDCEF5852AFC1AFFBE12F0DFB8FAF3396AB80D748BD9FA0D7CFF0C
4,565,992 UART: [art] SIG.S = D7F03F93F94D62DB924525DD8DDE9E48F6E263B6E78AF7635A81FBC53A3A184CA6D9C17B3BC2B1B28D093512F84A0754
4,589,635 UART: Caliptra RT
4,589,980 UART: [state] CFI Enabled
4,872,139 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Production
85,487 UART: [state] DebugLocked = Yes
86,137 UART: [state] Starting the WD Timer 40000000 cycles
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,372 UART: [idev] ++
1,173,540 UART: [idev] CDI.KEYID = 6
1,173,901 UART: [idev] SUBJECT.KEYID = 7
1,174,326 UART: [idev] UDS.KEYID = 0
1,174,672 ready_for_fw is high
1,174,672 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,505 UART: [idev] Erasing UDS.KEYID = 0
1,200,174 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,222 UART: [ldev] ++
1,210,390 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,181 UART: [ldev] AUTHORITY.KEYID = 7
1,211,644 UART: [ldev] FE.KEYID = 1
1,216,848 UART: [ldev] Erasing FE.KEYID = 1
1,243,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,617 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,311 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,181 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,887 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,153 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,192 UART: [fwproc] Recv command 0x46574c44
1,283,925 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,983 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,342 >>> mbox cmd response: success
2,339,392 UART: [afmc] ++
2,339,560 UART: [afmc] CDI.KEYID = 6
2,339,923 UART: [afmc] SUBJECT.KEYID = 7
2,340,349 UART: [afmc] AUTHORITY.KEYID = 5
2,376,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,479 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,198 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,091 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,798 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,871 UART: [afmc] --
2,419,788 UART: [cold-reset] --
2,420,798 UART: [state] Locking Datavault
2,422,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,683 UART: [state] Locking ICCM
2,423,187 UART: [exit] Launching FMC @ 0x40000130
2,428,516 UART:
2,428,532 UART: Running Caliptra FMC ...
2,428,940 UART:
2,428,994 UART: [state] CFI Enabled
2,439,429 UART: [fht] FMC Alias Private Key: 7
2,546,656 UART: [art] Extend RT PCRs Done
2,547,084 UART: [art] Lock RT PCRs Done
2,548,700 UART: [art] Populate DV Done
2,556,774 UART: [fht] FMC Alias Private Key: 7
2,557,950 UART: [art] Derive CDI
2,558,230 UART: [art] Store in in slot 0x4
2,643,657 UART: [art] Derive Key Pair
2,644,017 UART: [art] Store priv key in slot 0x5
2,657,021 UART: [art] Derive Key Pair - Done
2,671,832 UART: [art] Signing Cert with AUTHO
2,672,312 UART: RITY.KEYID = 7
2,687,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,893 UART: [art] PUB.X = 04D843AB2C68DBDAAF91E51624CE024DD66E9B569CB277B55C2208E905F5176828758DB7D72B73E657CA574EF595896D
2,694,655 UART: [art] PUB.Y = 37E7DE1EE49C54EA2DB4EABCDC6896DDF2CE13D0970C566E47E5B589086035A626A47A2ECFBBF997823ACFF6E407AE0C
2,701,617 UART: [art] SIG.R = B11A998A9C670C76705B42925C93B774E00C0CE718513FC689E1C4A4E923C270F8EFF52EC5D82BCFF9897DE4DC93222E
2,708,386 UART: [art] SIG.S = A1128673623594B29BE298897F8ADFBD3BE2482B2495F41B97FB4B50E005A9B4FFA29F225A7C077C2B74E1FC60204FE9
2,731,901 UART: mbox::rt_entry...
2,732,273 UART: ____ _ _ _ ____ _____
2,733,057 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,857 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,625 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,393 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,161 UART: |_|
2,736,473 UART:
2,843,325 UART: [rt] Runtime listening for mailbox commands...
2,844,087 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,307 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,401 UART:
2,844,417 UART: Running Caliptra ROM ...
2,844,825 UART:
2,844,880 UART: [state] CFI Enabled
2,847,269 UART: [state] LifecycleState = Production
2,847,877 UART: [state] DebugLocked = Yes
2,848,599 UART: [state] Starting the WD Timer 40000000 cycles
2,850,298 UART: [kat] SHA2-256
3,653,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,977 UART: [kat] ++
3,658,129 UART: [kat] sha1
3,662,327 UART: [kat] SHA2-256
3,664,267 UART: [kat] SHA2-384
3,666,888 UART: [kat] SHA2-512-ACC
3,668,789 UART: [kat] ECC-384
3,678,574 UART: [kat] HMAC-384Kdf
3,683,286 UART: [kat] LMS
3,931,598 UART: [kat] --
3,932,136 UART: [warm-reset] ++
3,932,857 UART: [warm-reset] --
3,933,544 UART: [state] Locking Datavault
3,934,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,020 UART: [state] Locking ICCM
3,935,464 UART: [exit] Launching FMC @ 0x40000130
3,940,793 UART:
3,940,809 UART: Running Caliptra FMC ...
3,941,217 UART:
3,941,271 UART: [state] CFI Enabled
3,942,444 UART: [aliasrt :skip pcr extension
3,942,917 UART: [art] Extend RT PCRs Done
3,943,345 UART: [art] Lock RT PCRs Done
3,944,658 UART: [art] Populate DV Done
3,952,852 UART: [fht] FMC Alias Private Key: 7
3,953,908 UART: [art] Derive CDI
3,954,188 UART: [art] Store in in slot 0x4
4,039,821 UART: [art] Derive Key Pair
4,040,181 UART: [art] Store priv key in slot 0x5
4,052,765 UART: [art] Derive Key Pair - Done
4,067,722 UART: [art] Signing Cert with AUTHO
4,068,202 UART: RITY.KEYID = 7
4,083,460 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,225 UART: [art] PUB.X = 04D843AB2C68DBDAAF91E51624CE024DD66E9B569CB277B55C2208E905F5176828758DB7D72B73E657CA574EF595896D
4,090,987 UART: [art] PUB.Y = 37E7DE1EE49C54EA2DB4EABCDC6896DDF2CE13D0970C566E47E5B589086035A626A47A2ECFBBF997823ACFF6E407AE0C
4,097,949 UART: [art] SIG.R = B11A998A9C670C76705B42925C93B774E00C0CE718513FC689E1C4A4E923C270F8EFF52EC5D82BCFF9897DE4DC93222E
4,104,718 UART: [art] SIG.S = A1128673623594B29BE298897F8ADFBD3BE2482B2495F41B97FB4B50E005A9B4FFA29F225A7C077C2B74E1FC60204FE9
4,128,545 UART: mbox::rt_entry...
4,128,917 UART: ____ _ _ _ ____ _____
4,129,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,805 UART: |_|
4,133,117 UART:
4,427,562 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,822 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,297 UART: [state] Starting the WD Timer 40000000 cycles
88,014 UART: [kat] SHA2-256
891,564 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,693 UART: [kat] ++
895,845 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,174,540 ready_for_fw is high
1,174,540 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,198,848 UART: [idev] Sha1 KeyId Algorithm
1,207,583 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,951 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,821 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,527 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,713 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,277 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,762 >>> mbox cmd response: success
2,336,854 UART: [afmc] ++
2,337,022 UART: [afmc] CDI.KEYID = 6
2,337,385 UART: [afmc] SUBJECT.KEYID = 7
2,337,811 UART: [afmc] AUTHORITY.KEYID = 5
2,372,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,031 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,750 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,643 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,350 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,371 UART: [afmc] --
2,416,344 UART: [cold-reset] --
2,417,166 UART: [state] Locking Datavault
2,418,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,769 UART: [state] Locking ICCM
2,419,245 UART: [exit] Launching FMC @ 0x40000130
2,424,574 UART:
2,424,590 UART: Running Caliptra FMC ...
2,424,998 UART:
2,425,052 UART: [state] CFI Enabled
2,435,337 UART: [fht] FMC Alias Private Key: 7
2,542,628 UART: [art] Extend RT PCRs Done
2,543,056 UART: [art] Lock RT PCRs Done
2,544,684 UART: [art] Populate DV Done
2,552,830 UART: [fht] FMC Alias Private Key: 7
2,553,764 UART: [art] Derive CDI
2,554,044 UART: [art] Store in in slot 0x4
2,639,829 UART: [art] Derive Key Pair
2,640,189 UART: [art] Store priv key in slot 0x5
2,653,427 UART: [art] Derive Key Pair - Done
2,668,164 UART: [art] Signing Cert with AUTHO
2,668,644 UART: RITY.KEYID = 7
2,683,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,135 UART: [art] PUB.X = A15101EC9EB8DC82E125BEEAD2019BAB787D3A30415DC71D6E1ECC6E7D72E7A29CF99515B599F4F0696DC010287444C5
2,690,911 UART: [art] PUB.Y = 8F7C76F4D2EF02C90F4E2847D79F665A35F3E29B5F70EA80D6EC671A844E6B9062A6E0CEAA965A30315B0C75F0FB81B5
2,697,864 UART: [art] SIG.R = 88E32931841197AA15934E0641E276B7EDC865B02B65DEBC7E68A48285113EC47CFC21E746E623C1F186304CD4EF2554
2,704,629 UART: [art] SIG.S = E4FC5285E56C6610E001391F5D19A0CFCAEF698808F4F80ACB8FFC1749030EBC84303F4144A7BC4F121A42CDC56C949A
2,728,039 UART: mbox::rt_entry...
2,728,411 UART: ____ _ _ _ ____ _____
2,729,195 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,995 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,763 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,531 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,299 UART: |_|
2,732,611 UART:
2,838,607 UART: [rt] Runtime listening for mailbox commands...
2,839,369 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,589 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,683 UART:
2,839,699 UART: Running Caliptra ROM ...
2,840,107 UART:
2,840,162 UART: [state] CFI Enabled
2,842,885 UART: [state] LifecycleState = Production
2,843,493 UART: [state] DebugLocked = Yes
2,844,129 UART: [state] Starting the WD Timer 40000000 cycles
2,845,766 UART: [kat] SHA2-256
3,649,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,445 UART: [kat] ++
3,653,597 UART: [kat] sha1
3,657,693 UART: [kat] SHA2-256
3,659,633 UART: [kat] SHA2-384
3,662,304 UART: [kat] SHA2-512-ACC
3,664,205 UART: [kat] ECC-384
3,673,986 UART: [kat] HMAC-384Kdf
3,678,540 UART: [kat] LMS
3,926,852 UART: [kat] --
3,927,720 UART: [warm-reset] ++
3,928,515 UART: [warm-reset] --
3,929,326 UART: [state] Locking Datavault
3,929,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,560 UART: [state] Locking ICCM
3,931,196 UART: [exit] Launching FMC @ 0x40000130
3,936,525 UART:
3,936,541 UART: Running Caliptra FMC ...
3,936,949 UART:
3,937,003 UART: [state] CFI Enabled
3,938,300 UART: [aliasrt :skip pcr extension
3,938,773 UART: [art] Extend RT PCRs Done
3,939,201 UART: [art] Lock RT PCRs Done
3,940,600 UART: [art] Populate DV Done
3,948,776 UART: [fht] FMC Alias Private Key: 7
3,949,852 UART: [art] Derive CDI
3,950,132 UART: [art] Store in in slot 0x4
4,035,695 UART: [art] Derive Key Pair
4,036,055 UART: [art] Store priv key in slot 0x5
4,048,807 UART: [art] Derive Key Pair - Done
4,063,778 UART: [art] Signing Cert with AUTHO
4,064,258 UART: RITY.KEYID = 7
4,079,256 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,021 UART: [art] PUB.X = A15101EC9EB8DC82E125BEEAD2019BAB787D3A30415DC71D6E1ECC6E7D72E7A29CF99515B599F4F0696DC010287444C5
4,086,797 UART: [art] PUB.Y = 8F7C76F4D2EF02C90F4E2847D79F665A35F3E29B5F70EA80D6EC671A844E6B9062A6E0CEAA965A30315B0C75F0FB81B5
4,093,750 UART: [art] SIG.R = 88E32931841197AA15934E0641E276B7EDC865B02B65DEBC7E68A48285113EC47CFC21E746E623C1F186304CD4EF2554
4,100,515 UART: [art] SIG.S = E4FC5285E56C6610E001391F5D19A0CFCAEF698808F4F80ACB8FFC1749030EBC84303F4144A7BC4F121A42CDC56C949A
4,123,355 UART: mbox::rt_entry...
4,123,727 UART: ____ _ _ _ ____ _____
4,124,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,615 UART: |_|
4,127,927 UART:
4,421,031 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,423,181 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Production
85,742 UART: [state] DebugLocked = Yes
86,302 UART: [state] Starting the WD Timer 40000000 cycles
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,174,523 ready_for_fw is high
1,174,523 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,032 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,902 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,608 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,822 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,917 UART: [fwproc] Recv command 0x46574c44
1,283,650 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,888 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,151 >>> mbox cmd response: success
2,338,351 UART: [afmc] ++
2,338,519 UART: [afmc] CDI.KEYID = 6
2,338,882 UART: [afmc] SUBJECT.KEYID = 7
2,339,308 UART: [afmc] AUTHORITY.KEYID = 5
2,374,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,230 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,949 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,842 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,549 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,332 UART: [afmc] --
2,418,419 UART: [cold-reset] --
2,419,457 UART: [state] Locking Datavault
2,420,686 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,290 UART: [state] Locking ICCM
2,421,854 UART: [exit] Launching FMC @ 0x40000130
2,427,183 UART:
2,427,199 UART: Running Caliptra FMC ...
2,427,607 UART:
2,427,750 UART: [state] CFI Enabled
2,438,513 UART: [fht] FMC Alias Private Key: 7
2,546,544 UART: [art] Extend RT PCRs Done
2,546,972 UART: [art] Lock RT PCRs Done
2,548,586 UART: [art] Populate DV Done
2,556,938 UART: [fht] FMC Alias Private Key: 7
2,557,880 UART: [art] Derive CDI
2,558,160 UART: [art] Store in in slot 0x4
2,643,669 UART: [art] Derive Key Pair
2,644,029 UART: [art] Store priv key in slot 0x5
2,657,619 UART: [art] Derive Key Pair - Done
2,672,305 UART: [art] Signing Cert with AUTHO
2,672,785 UART: RITY.KEYID = 7
2,688,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,936 UART: [art] PUB.X = D324A18AFEC3C30B482543CB4FF0F76A3B413895C6BFBA5D051BCFF830F02A0BE896DBEA7F912DFB1EA3FAA11F0F075A
2,695,719 UART: [art] PUB.Y = CD5EAF3684D42B7587E2819B9B0523FF5CA9B57ECB2B2B5EA82CD9AEC1F0782D7C6F4C56FD48540EFEAA8000A1D35E0D
2,702,662 UART: [art] SIG.R = 7FFFA8DDEED1B683EF2918EDD84B520AB439B8169033FBB5DFF33CC05C79D9368315FED0DC2736DEDFCFB1CC7F41ADAE
2,709,463 UART: [art] SIG.S = B21C61C370C44A67488AB12EAD503C44C2EC1E5686500EF34FFAB1A56D5642458250C94092B1BE56EF391A8346100DCF
2,733,106 UART: mbox::rt_entry...
2,733,478 UART: ____ _ _ _ ____ _____
2,734,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,830 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,598 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,366 UART: |_|
2,737,678 UART:
2,843,944 UART: [rt] Runtime listening for mailbox commands...
2,844,706 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,926 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,020 UART:
2,845,036 UART: Running Caliptra ROM ...
2,845,444 UART:
2,845,586 UART: [state] CFI Enabled
2,848,797 UART: [state] LifecycleState = Production
2,849,405 UART: [state] DebugLocked = Yes
2,849,915 UART: [state] Starting the WD Timer 40000000 cycles
2,851,428 UART: [kat] SHA2-256
3,654,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,107 UART: [kat] ++
3,659,259 UART: [kat] sha1
3,663,677 UART: [kat] SHA2-256
3,665,617 UART: [kat] SHA2-384
3,668,360 UART: [kat] SHA2-512-ACC
3,670,261 UART: [kat] ECC-384
3,680,310 UART: [kat] HMAC-384Kdf
3,684,922 UART: [kat] LMS
3,933,234 UART: [kat] --
3,934,268 UART: [warm-reset] ++
3,935,465 UART: [warm-reset] --
3,936,264 UART: [state] Locking Datavault
3,937,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,714 UART: [state] Locking ICCM
3,938,320 UART: [exit] Launching FMC @ 0x40000130
3,943,649 UART:
3,943,665 UART: Running Caliptra FMC ...
3,944,073 UART:
3,944,216 UART: [state] CFI Enabled
3,945,495 UART: [aliasrt :skip pcr extension
3,945,968 UART: [art] Extend RT PCRs Done
3,946,396 UART: [art] Lock RT PCRs Done
3,947,487 UART: [art] Populate DV Done
3,955,451 UART: [fht] FMC Alias Private Key: 7
3,956,429 UART: [art] Derive CDI
3,956,709 UART: [art] Store in in slot 0x4
4,042,598 UART: [art] Derive Key Pair
4,042,958 UART: [art] Store priv key in slot 0x5
4,056,418 UART: [art] Derive Key Pair - Done
4,071,142 UART: [art] Signing Cert with AUTHO
4,071,622 UART: RITY.KEYID = 7
4,087,060 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,825 UART: [art] PUB.X = D324A18AFEC3C30B482543CB4FF0F76A3B413895C6BFBA5D051BCFF830F02A0BE896DBEA7F912DFB1EA3FAA11F0F075A
4,094,608 UART: [art] PUB.Y = CD5EAF3684D42B7587E2819B9B0523FF5CA9B57ECB2B2B5EA82CD9AEC1F0782D7C6F4C56FD48540EFEAA8000A1D35E0D
4,101,551 UART: [art] SIG.R = 7FFFA8DDEED1B683EF2918EDD84B520AB439B8169033FBB5DFF33CC05C79D9368315FED0DC2736DEDFCFB1CC7F41ADAE
4,108,352 UART: [art] SIG.S = B21C61C370C44A67488AB12EAD503C44C2EC1E5686500EF34FFAB1A56D5642458250C94092B1BE56EF391A8346100DCF
4,131,633 UART: mbox::rt_entry...
4,132,005 UART: ____ _ _ _ ____ _____
4,132,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,135,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,893 UART: |_|
4,136,205 UART:
4,433,594 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,435,638 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Production
86,270 UART: [state] DebugLocked = Yes
86,950 UART: [state] Starting the WD Timer 40000000 cycles
88,583 UART: [kat] SHA2-256
892,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,262 UART: [kat] ++
896,414 UART: [kat] sha1
900,616 UART: [kat] SHA2-256
902,556 UART: [kat] SHA2-384
905,375 UART: [kat] SHA2-512-ACC
907,276 UART: [kat] ECC-384
916,675 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,326 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,196 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,902 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,894 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,282,137 UART: [fwproc] Recv command 0x46574c44
1,282,870 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,500 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,881 >>> mbox cmd response: success
2,339,107 UART: [afmc] ++
2,339,275 UART: [afmc] CDI.KEYID = 6
2,339,638 UART: [afmc] SUBJECT.KEYID = 7
2,340,064 UART: [afmc] AUTHORITY.KEYID = 5
2,376,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,394,096 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,815 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,708 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,415 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,032 UART: [afmc] --
2,420,073 UART: [cold-reset] --
2,421,011 UART: [state] Locking Datavault
2,422,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,852 UART: [state] Locking ICCM
2,423,318 UART: [exit] Launching FMC @ 0x40000130
2,428,647 UART:
2,428,663 UART: Running Caliptra FMC ...
2,429,071 UART:
2,429,214 UART: [state] CFI Enabled
2,439,781 UART: [fht] FMC Alias Private Key: 7
2,547,650 UART: [art] Extend RT PCRs Done
2,548,078 UART: [art] Lock RT PCRs Done
2,549,528 UART: [art] Populate DV Done
2,557,988 UART: [fht] FMC Alias Private Key: 7
2,559,070 UART: [art] Derive CDI
2,559,350 UART: [art] Store in in slot 0x4
2,645,107 UART: [art] Derive Key Pair
2,645,467 UART: [art] Store priv key in slot 0x5
2,658,373 UART: [art] Derive Key Pair - Done
2,673,324 UART: [art] Signing Cert with AUTHO
2,673,804 UART: RITY.KEYID = 7
2,689,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,805 UART: [art] PUB.X = 08CB82B2D9A87AAEEEBF201CAC32BF8507B5D20FFB292DCAD9EB71660A90F01C510E00385792F3555A63A99AAA8DD7C7
2,696,558 UART: [art] PUB.Y = 7D74CD0C1925123C18492FA538F509A39239DCCCA85832FBCAD22C03B7F4FCA27D753F9E1E4D72D9DEC69A6971FB29D2
2,703,513 UART: [art] SIG.R = 01CC8F3B1E679F4057B3B2AD6CCD1BD611FCE22420AF8C192E3CAFF0E2013E54DE99706779E7F54AF65254FB3E1D0835
2,710,288 UART: [art] SIG.S = 7E81EE83CAAE5DC85E816A4361F11CF085AC2E1191ED3707CC21B3B15B9336972AE13108B8D57AE10BA070C1E94B21A2
2,734,186 UART: mbox::rt_entry...
2,734,558 UART: ____ _ _ _ ____ _____
2,735,342 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,142 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,910 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,737,678 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,446 UART: |_|
2,738,758 UART:
2,846,009 UART: [rt] Runtime listening for mailbox commands...
2,846,771 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,846,991 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,847,085 UART:
2,847,101 UART: Running Caliptra ROM ...
2,847,509 UART:
2,847,651 UART: [state] CFI Enabled
2,850,542 UART: [state] LifecycleState = Production
2,851,150 UART: [state] DebugLocked = Yes
2,851,828 UART: [state] Starting the WD Timer 40000000 cycles
2,853,373 UART: [kat] SHA2-256
3,656,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,052 UART: [kat] ++
3,661,204 UART: [kat] sha1
3,665,454 UART: [kat] SHA2-256
3,667,394 UART: [kat] SHA2-384
3,670,337 UART: [kat] SHA2-512-ACC
3,672,238 UART: [kat] ECC-384
3,682,505 UART: [kat] HMAC-384Kdf
3,687,183 UART: [kat] LMS
3,935,495 UART: [kat] --
3,936,441 UART: [warm-reset] ++
3,937,344 UART: [warm-reset] --
3,938,025 UART: [state] Locking Datavault
3,938,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,285 UART: [state] Locking ICCM
3,939,881 UART: [exit] Launching FMC @ 0x40000130
3,945,210 UART:
3,945,226 UART: Running Caliptra FMC ...
3,945,634 UART:
3,945,777 UART: [state] CFI Enabled
3,947,210 UART: [aliasrt :skip pcr extension
3,947,683 UART: [art] Extend RT PCRs Done
3,948,111 UART: [art] Lock RT PCRs Done
3,949,096 UART: [art] Populate DV Done
3,957,496 UART: [fht] FMC Alias Private Key: 7
3,958,636 UART: [art] Derive CDI
3,958,916 UART: [art] Store in in slot 0x4
4,044,643 UART: [art] Derive Key Pair
4,045,003 UART: [art] Store priv key in slot 0x5
4,058,047 UART: [art] Derive Key Pair - Done
4,072,534 UART: [art] Signing Cert with AUTHO
4,073,014 UART: RITY.KEYID = 7
4,087,778 UART: [art] Erasing AUTHORITY.KEYID = 7
4,088,543 UART: [art] PUB.X = 08CB82B2D9A87AAEEEBF201CAC32BF8507B5D20FFB292DCAD9EB71660A90F01C510E00385792F3555A63A99AAA8DD7C7
4,095,296 UART: [art] PUB.Y = 7D74CD0C1925123C18492FA538F509A39239DCCCA85832FBCAD22C03B7F4FCA27D753F9E1E4D72D9DEC69A6971FB29D2
4,102,251 UART: [art] SIG.R = 01CC8F3B1E679F4057B3B2AD6CCD1BD611FCE22420AF8C192E3CAFF0E2013E54DE99706779E7F54AF65254FB3E1D0835
4,109,026 UART: [art] SIG.S = 7E81EE83CAAE5DC85E816A4361F11CF085AC2E1191ED3707CC21B3B15B9336972AE13108B8D57AE10BA070C1E94B21A2
4,133,282 UART: mbox::rt_entry...
4,133,654 UART: ____ _ _ _ ____ _____
4,134,438 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,135,238 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,136,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,136,774 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,137,542 UART: |_|
4,137,854 UART:
4,434,226 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,436,362 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = Yes
86,077 UART: [state] Starting the WD Timer 40000000 cycles
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,662 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,215,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,563 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,433 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,139 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,247 UART: [ldev] --
1,280,687 UART: [fwproc] Wait for Commands...
1,281,494 UART: [fwproc] Recv command 0x46574c44
1,282,227 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,233 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,606 >>> mbox cmd response: success
2,335,746 UART: [afmc] ++
2,335,914 UART: [afmc] CDI.KEYID = 6
2,336,277 UART: [afmc] SUBJECT.KEYID = 7
2,336,703 UART: [afmc] AUTHORITY.KEYID = 5
2,372,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,609 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,328 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,221 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,928 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,817 UART: [afmc] --
2,415,882 UART: [cold-reset] --
2,416,802 UART: [state] Locking Datavault
2,418,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,711 UART: [state] Locking ICCM
2,419,215 UART: [exit] Launching FMC @ 0x40000130
2,424,544 UART:
2,424,560 UART: Running Caliptra FMC ...
2,424,968 UART:
2,425,022 UART: [state] CFI Enabled
2,435,159 UART: [fht] FMC Alias Private Key: 7
2,542,920 UART: [art] Extend RT PCRs Done
2,543,348 UART: [art] Lock RT PCRs Done
2,544,708 UART: [art] Populate DV Done
2,552,958 UART: [fht] FMC Alias Private Key: 7
2,554,100 UART: [art] Derive CDI
2,554,380 UART: [art] Store in in slot 0x4
2,640,101 UART: [art] Derive Key Pair
2,640,461 UART: [art] Store priv key in slot 0x5
2,653,445 UART: [art] Derive Key Pair - Done
2,668,097 UART: [art] Signing Cert with AUTHO
2,668,577 UART: RITY.KEYID = 7
2,683,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,764 UART: [art] PUB.X = A984865406D40BA1BF4E56E1552C7D1FD81CAC0462675CBB6714714E81B4D492A7FD217C87807B0BBA0D7C04DC069126
2,691,517 UART: [art] PUB.Y = 0E5C5086454D89D336EEB41D845B98176F53FC3440F47F961ECD3BF6D8C7DB744942C86E1374DD002CD128983F1F2041
2,698,442 UART: [art] SIG.R = 18C8AF72793D1B5DD664969C880DD85EDB98C11F00275C86D8047501D902A309099B78ED68DF71D9EB443DBD956E6BFD
2,705,178 UART: [art] SIG.S = 0E948BCEC65FCC08C103D0259FC70B4BAA22803062F01E9EAFD7D0E9CAF2FA7AC3C8A2F1EC4826BEF9FD483E5547A9A4
2,728,859 UART: mbox::rt_entry...
2,729,231 UART: ____ _ _ _ ____ _____
2,730,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,119 UART: |_|
2,733,431 UART:
2,839,554 UART: [rt] Runtime listening for mailbox commands...
2,840,316 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,536 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,630 UART:
2,840,646 UART: Running Caliptra ROM ...
2,841,054 UART:
2,841,109 UART: [state] CFI Enabled
2,843,480 UART: [state] LifecycleState = Production
2,844,088 UART: [state] DebugLocked = Yes
2,844,602 UART: [state] Starting the WD Timer 40000000 cycles
2,846,297 UART: [kat] SHA2-256
3,649,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,976 UART: [kat] ++
3,654,128 UART: [kat] sha1
3,658,410 UART: [kat] SHA2-256
3,660,350 UART: [kat] SHA2-384
3,663,103 UART: [kat] SHA2-512-ACC
3,665,004 UART: [kat] ECC-384
3,674,431 UART: [kat] HMAC-384Kdf
3,679,143 UART: [kat] LMS
3,927,455 UART: [kat] --
3,928,127 UART: [warm-reset] ++
3,928,934 UART: [warm-reset] --
3,929,517 UART: [state] Locking Datavault
3,930,127 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,731 UART: [state] Locking ICCM
3,931,191 UART: [exit] Launching FMC @ 0x40000130
3,936,520 UART:
3,936,536 UART: Running Caliptra FMC ...
3,936,944 UART:
3,936,998 UART: [state] CFI Enabled
3,938,259 UART: [aliasrt :skip pcr extension
3,938,732 UART: [art] Extend RT PCRs Done
3,939,160 UART: [art] Lock RT PCRs Done
3,940,537 UART: [art] Populate DV Done
3,948,735 UART: [fht] FMC Alias Private Key: 7
3,949,705 UART: [art] Derive CDI
3,949,985 UART: [art] Store in in slot 0x4
4,035,626 UART: [art] Derive Key Pair
4,035,986 UART: [art] Store priv key in slot 0x5
4,049,092 UART: [art] Derive Key Pair - Done
4,063,690 UART: [art] Signing Cert with AUTHO
4,064,170 UART: RITY.KEYID = 7
4,079,970 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,735 UART: [art] PUB.X = A984865406D40BA1BF4E56E1552C7D1FD81CAC0462675CBB6714714E81B4D492A7FD217C87807B0BBA0D7C04DC069126
4,087,488 UART: [art] PUB.Y = 0E5C5086454D89D336EEB41D845B98176F53FC3440F47F961ECD3BF6D8C7DB744942C86E1374DD002CD128983F1F2041
4,094,413 UART: [art] SIG.R = 18C8AF72793D1B5DD664969C880DD85EDB98C11F00275C86D8047501D902A309099B78ED68DF71D9EB443DBD956E6BFD
4,101,149 UART: [art] SIG.S = 0E948BCEC65FCC08C103D0259FC70B4BAA22803062F01E9EAFD7D0E9CAF2FA7AC3C8A2F1EC4826BEF9FD483E5547A9A4
4,124,552 UART: mbox::rt_entry...
4,124,924 UART: ____ _ _ _ ____ _____
4,125,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,044 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,812 UART: |_|
4,129,124 UART:
4,418,250 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,420,364 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Production
86,105 UART: [state] DebugLocked = Yes
86,817 UART: [state] Starting the WD Timer 40000000 cycles
88,348 UART: [kat] SHA2-256
891,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,027 UART: [kat] ++
896,179 UART: [kat] sha1
900,383 UART: [kat] SHA2-256
902,323 UART: [kat] SHA2-384
905,142 UART: [kat] SHA2-512-ACC
907,043 UART: [kat] ECC-384
916,844 UART: [kat] HMAC-384Kdf
921,386 UART: [kat] LMS
1,169,698 UART: [kat] --
1,170,553 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 ready_for_fw is high
1,174,898 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,591 UART: [idev] Erasing UDS.KEYID = 0
1,199,930 UART: [idev] Sha1 KeyId Algorithm
1,208,779 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,212 UART: [ldev] SUBJECT.KEYID = 5
1,210,639 UART: [ldev] AUTHORITY.KEYID = 7
1,211,102 UART: [ldev] FE.KEYID = 1
1,216,106 UART: [ldev] Erasing FE.KEYID = 1
1,242,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,199 UART: [ldev] --
1,281,469 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,227 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,610 >>> mbox cmd response: success
2,337,628 UART: [afmc] ++
2,337,796 UART: [afmc] CDI.KEYID = 6
2,338,159 UART: [afmc] SUBJECT.KEYID = 7
2,338,585 UART: [afmc] AUTHORITY.KEYID = 5
2,373,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,813 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,532 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,425 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,132 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,993 UART: [afmc] --
2,416,904 UART: [cold-reset] --
2,417,694 UART: [state] Locking Datavault
2,418,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,195 UART: [state] Locking ICCM
2,419,749 UART: [exit] Launching FMC @ 0x40000130
2,425,078 UART:
2,425,094 UART: Running Caliptra FMC ...
2,425,502 UART:
2,425,556 UART: [state] CFI Enabled
2,436,003 UART: [fht] FMC Alias Private Key: 7
2,543,480 UART: [art] Extend RT PCRs Done
2,543,908 UART: [art] Lock RT PCRs Done
2,545,272 UART: [art] Populate DV Done
2,553,532 UART: [fht] FMC Alias Private Key: 7
2,554,704 UART: [art] Derive CDI
2,554,984 UART: [art] Store in in slot 0x4
2,640,171 UART: [art] Derive Key Pair
2,640,531 UART: [art] Store priv key in slot 0x5
2,653,361 UART: [art] Derive Key Pair - Done
2,668,389 UART: [art] Signing Cert with AUTHO
2,668,869 UART: RITY.KEYID = 7
2,684,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,414 UART: [art] PUB.X = 580E86B276320D0D0F8425A63DA9FCF1C901C3EC816F0269CF738E69A89E79A68506775F3A8DEFBFD55482DDBCF96144
2,692,171 UART: [art] PUB.Y = 434602E0C43AFF59961B5518D785D5D901ECD1459D906851B0314FD5BA8AFBBAE13050D9BCC6876D34D20BF59573F9AC
2,699,120 UART: [art] SIG.R = 54A2DDFFA5310D8770EA1897ECCADE9ED0B10448905050103B65E0008548259A529090C086649F45B2D75E7E073E1A2C
2,705,857 UART: [art] SIG.S = 8A88890D5B2B4D13BD4E99F14119AD83E1C1466E109E4C5E6A352EC7F36950840E5F17F13DB5B612AA7A4CEC2A2FC7BC
2,729,236 UART: mbox::rt_entry...
2,729,608 UART: ____ _ _ _ ____ _____
2,730,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,192 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,728 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,496 UART: |_|
2,733,808 UART:
2,840,202 UART: [rt] Runtime listening for mailbox commands...
2,840,964 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,184 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,278 UART:
2,841,294 UART: Running Caliptra ROM ...
2,841,702 UART:
2,841,757 UART: [state] CFI Enabled
2,844,532 UART: [state] LifecycleState = Production
2,845,140 UART: [state] DebugLocked = Yes
2,845,668 UART: [state] Starting the WD Timer 40000000 cycles
2,847,341 UART: [kat] SHA2-256
3,650,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,020 UART: [kat] ++
3,655,172 UART: [kat] sha1
3,659,344 UART: [kat] SHA2-256
3,661,284 UART: [kat] SHA2-384
3,664,013 UART: [kat] SHA2-512-ACC
3,665,914 UART: [kat] ECC-384
3,675,149 UART: [kat] HMAC-384Kdf
3,679,913 UART: [kat] LMS
3,928,225 UART: [kat] --
3,929,145 UART: [warm-reset] ++
3,930,008 UART: [warm-reset] --
3,930,541 UART: [state] Locking Datavault
3,931,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,089 UART: [state] Locking ICCM
3,932,757 UART: [exit] Launching FMC @ 0x40000130
3,938,086 UART:
3,938,102 UART: Running Caliptra FMC ...
3,938,510 UART:
3,938,564 UART: [state] CFI Enabled
3,940,105 UART: [aliasrt :skip pcr extension
3,940,578 UART: [art] Extend RT PCRs Done
3,941,006 UART: [art] Lock RT PCRs Done
3,942,363 UART: [art] Populate DV Done
3,950,449 UART: [fht] FMC Alias Private Key: 7
3,951,487 UART: [art] Derive CDI
3,951,767 UART: [art] Store in in slot 0x4
4,037,396 UART: [art] Derive Key Pair
4,037,756 UART: [art] Store priv key in slot 0x5
4,051,796 UART: [art] Derive Key Pair - Done
4,066,314 UART: [art] Signing Cert with AUTHO
4,066,794 UART: RITY.KEYID = 7
4,082,342 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,107 UART: [art] PUB.X = 580E86B276320D0D0F8425A63DA9FCF1C901C3EC816F0269CF738E69A89E79A68506775F3A8DEFBFD55482DDBCF96144
4,089,864 UART: [art] PUB.Y = 434602E0C43AFF59961B5518D785D5D901ECD1459D906851B0314FD5BA8AFBBAE13050D9BCC6876D34D20BF59573F9AC
4,096,813 UART: [art] SIG.R = 54A2DDFFA5310D8770EA1897ECCADE9ED0B10448905050103B65E0008548259A529090C086649F45B2D75E7E073E1A2C
4,103,550 UART: [art] SIG.S = 8A88890D5B2B4D13BD4E99F14119AD83E1C1466E109E4C5E6A352EC7F36950840E5F17F13DB5B612AA7A4CEC2A2FC7BC
4,127,633 UART: mbox::rt_entry...
4,128,005 UART: ____ _ _ _ ____ _____
4,128,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,893 UART: |_|
4,132,205 UART:
4,426,830 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,058 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,696 UART: [state] LifecycleState = Production
86,304 UART: [state] DebugLocked = Yes
86,834 UART: [state] Starting the WD Timer 40000000 cycles
88,541 UART: [kat] SHA2-256
892,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,220 UART: [kat] ++
896,372 UART: [kat] sha1
900,606 UART: [kat] SHA2-256
902,546 UART: [kat] SHA2-384
905,435 UART: [kat] SHA2-512-ACC
907,336 UART: [kat] ECC-384
917,495 UART: [kat] HMAC-384Kdf
922,219 UART: [kat] LMS
1,170,531 UART: [kat] --
1,171,322 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,549 UART: [idev] ++
1,174,717 UART: [idev] CDI.KEYID = 6
1,175,078 UART: [idev] SUBJECT.KEYID = 7
1,175,503 UART: [idev] UDS.KEYID = 0
1,175,849 ready_for_fw is high
1,175,849 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,384 UART: [idev] Erasing UDS.KEYID = 0
1,200,521 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,499 UART: [ldev] ++
1,210,667 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,458 UART: [ldev] AUTHORITY.KEYID = 7
1,211,921 UART: [ldev] FE.KEYID = 1
1,217,299 UART: [ldev] Erasing FE.KEYID = 1
1,244,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,158 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,028 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,734 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,726 UART: [ldev] --
1,283,030 UART: [fwproc] Wait for Commands...
1,283,623 UART: [fwproc] Recv command 0x46574c44
1,284,356 UART: [fwproc] Recv'd Img size: 78704 bytes
2,200,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,227,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,256,680 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,339,007 >>> mbox cmd response: success
2,340,093 UART: [afmc] ++
2,340,261 UART: [afmc] CDI.KEYID = 6
2,340,624 UART: [afmc] SUBJECT.KEYID = 7
2,341,050 UART: [afmc] AUTHORITY.KEYID = 5
2,376,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,844 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,563 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,456 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,163 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,906 UART: [afmc] --
2,419,971 UART: [cold-reset] --
2,421,013 UART: [state] Locking Datavault
2,422,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,896 UART: [state] Locking ICCM
2,423,364 UART: [exit] Launching FMC @ 0x40000130
2,428,693 UART:
2,428,709 UART: Running Caliptra FMC ...
2,429,117 UART:
2,429,260 UART: [state] CFI Enabled
2,439,713 UART: [fht] FMC Alias Private Key: 7
2,547,770 UART: [art] Extend RT PCRs Done
2,548,198 UART: [art] Lock RT PCRs Done
2,549,686 UART: [art] Populate DV Done
2,557,818 UART: [fht] FMC Alias Private Key: 7
2,558,946 UART: [art] Derive CDI
2,559,226 UART: [art] Store in in slot 0x4
2,644,887 UART: [art] Derive Key Pair
2,645,247 UART: [art] Store priv key in slot 0x5
2,659,019 UART: [art] Derive Key Pair - Done
2,674,026 UART: [art] Signing Cert with AUTHO
2,674,506 UART: RITY.KEYID = 7
2,689,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,515 UART: [art] PUB.X = D167B1167C9FDF79BF18B0819EECB21F05E6BDEEB75F742CEF695D2FBC62CC36867E2F0FA4700EDD1C320EE86B012AE5
2,697,294 UART: [art] PUB.Y = 924A326FD1141CA4A9A357E1CD7921E0A2550D93E3443C184E51B123EB0FD16C50130464DFCC30FE82A2A77A9024683C
2,704,237 UART: [art] SIG.R = 893445448C16BC6DF3CDA7B1E26521A4970826CD533BF5A54E1A3F9A3C009E51845B98E40130E3BA7320AEBE1A0BE510
2,710,982 UART: [art] SIG.S = 176F52B4ED7CB8CD786DA95ACF5F4D80C6343075CBF3041AE7A79112E8377B2302B0F01A9B5F60F23B6C23B276674D90
2,734,725 UART: mbox::rt_entry...
2,735,097 UART: ____ _ _ _ ____ _____
2,735,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,681 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,737,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,738,217 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,985 UART: |_|
2,739,297 UART:
2,847,133 UART: [rt] Runtime listening for mailbox commands...
2,847,895 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,848,115 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,848,209 UART:
2,848,225 UART: Running Caliptra ROM ...
2,848,633 UART:
2,848,775 UART: [state] CFI Enabled
2,851,384 UART: [state] LifecycleState = Production
2,851,992 UART: [state] DebugLocked = Yes
2,852,714 UART: [state] Starting the WD Timer 40000000 cycles
2,854,213 UART: [kat] SHA2-256
3,657,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,892 UART: [kat] ++
3,662,044 UART: [kat] sha1
3,666,344 UART: [kat] SHA2-256
3,668,284 UART: [kat] SHA2-384
3,670,951 UART: [kat] SHA2-512-ACC
3,672,852 UART: [kat] ECC-384
3,682,651 UART: [kat] HMAC-384Kdf
3,687,217 UART: [kat] LMS
3,935,529 UART: [kat] --
3,936,161 UART: [warm-reset] ++
3,937,034 UART: [warm-reset] --
3,937,889 UART: [state] Locking Datavault
3,938,781 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,385 UART: [state] Locking ICCM
3,939,969 UART: [exit] Launching FMC @ 0x40000130
3,945,298 UART:
3,945,314 UART: Running Caliptra FMC ...
3,945,722 UART:
3,945,865 UART: [state] CFI Enabled
3,946,942 UART: [aliasrt :skip pcr extension
3,947,415 UART: [art] Extend RT PCRs Done
3,947,843 UART: [art] Lock RT PCRs Done
3,949,044 UART: [art] Populate DV Done
3,957,574 UART: [fht] FMC Alias Private Key: 7
3,958,628 UART: [art] Derive CDI
3,958,908 UART: [art] Store in in slot 0x4
4,044,747 UART: [art] Derive Key Pair
4,045,107 UART: [art] Store priv key in slot 0x5
4,058,209 UART: [art] Derive Key Pair - Done
4,072,782 UART: [art] Signing Cert with AUTHO
4,073,262 UART: RITY.KEYID = 7
4,088,318 UART: [art] Erasing AUTHORITY.KEYID = 7
4,089,083 UART: [art] PUB.X = D167B1167C9FDF79BF18B0819EECB21F05E6BDEEB75F742CEF695D2FBC62CC36867E2F0FA4700EDD1C320EE86B012AE5
4,095,862 UART: [art] PUB.Y = 924A326FD1141CA4A9A357E1CD7921E0A2550D93E3443C184E51B123EB0FD16C50130464DFCC30FE82A2A77A9024683C
4,102,805 UART: [art] SIG.R = 893445448C16BC6DF3CDA7B1E26521A4970826CD533BF5A54E1A3F9A3C009E51845B98E40130E3BA7320AEBE1A0BE510
4,109,550 UART: [art] SIG.S = 176F52B4ED7CB8CD786DA95ACF5F4D80C6343075CBF3041AE7A79112E8377B2302B0F01A9B5F60F23B6C23B276674D90
4,132,949 UART: mbox::rt_entry...
4,133,321 UART: ____ _ _ _ ____ _____
4,134,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,134,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,135,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,136,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,137,209 UART: |_|
4,137,521 UART:
4,427,972 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,230 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Production
85,652 UART: [state] DebugLocked = Yes
86,394 UART: [state] Starting the WD Timer 40000000 cycles
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,355 UART: [idev] ++
1,173,523 UART: [idev] CDI.KEYID = 6
1,173,884 UART: [idev] SUBJECT.KEYID = 7
1,174,309 UART: [idev] UDS.KEYID = 0
1,174,655 ready_for_fw is high
1,174,655 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,283 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,430 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,300 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,006 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,020 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,215 UART: [fwproc] Recv command 0x46574c44
1,282,948 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,326 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,667 >>> mbox cmd response: success
2,336,707 UART: [afmc] ++
2,336,875 UART: [afmc] CDI.KEYID = 6
2,337,238 UART: [afmc] SUBJECT.KEYID = 7
2,337,664 UART: [afmc] AUTHORITY.KEYID = 5
2,373,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,726 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,445 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,338 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,045 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,918 UART: [afmc] --
2,416,885 UART: [cold-reset] --
2,417,657 UART: [state] Locking Datavault
2,419,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,678 UART: [state] Locking ICCM
2,420,144 UART: [exit] Launching FMC @ 0x40000130
2,425,473 UART:
2,425,489 UART: Running Caliptra FMC ...
2,425,897 UART:
2,426,040 UART: [state] CFI Enabled
2,436,375 UART: [fht] FMC Alias Private Key: 7
2,543,716 UART: [art] Extend RT PCRs Done
2,544,144 UART: [art] Lock RT PCRs Done
2,545,676 UART: [art] Populate DV Done
2,554,196 UART: [fht] FMC Alias Private Key: 7
2,555,336 UART: [art] Derive CDI
2,555,616 UART: [art] Store in in slot 0x4
2,641,083 UART: [art] Derive Key Pair
2,641,443 UART: [art] Store priv key in slot 0x5
2,654,587 UART: [art] Derive Key Pair - Done
2,669,870 UART: [art] Signing Cert with AUTHO
2,670,350 UART: RITY.KEYID = 7
2,685,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,233 UART: [art] PUB.X = 31A5A58F722F5BF5439A52E23E00329DB6F0F198C349077B343E4F9A4779EA83953C7F2A37742A173507D8392A3C66F7
2,692,969 UART: [art] PUB.Y = DE791EA8C0AC4B33A5C27577E633B0861CADDF54655E83AA59C6595CED563E5B40ECC4D29E2C45DA91E4AA24503BFB29
2,699,937 UART: [art] SIG.R = F2E71423D1630642E1F9182439CA793B1BA3666766D70C6337D4F5D85AFFF12877DDA5AACBA6B0F975A17AC0FF624A0F
2,706,708 UART: [art] SIG.S = FC27A4E4DC6E135F18A957C9E87B80CA6E363ABC79AAD18973723396E6FEA4CE336AF404F808274B1B1C00528AA43C23
2,730,813 UART: mbox::rt_entry...
2,731,185 UART: ____ _ _ _ ____ _____
2,731,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,073 UART: |_|
2,735,385 UART:
2,841,935 UART: [rt] Runtime listening for mailbox commands...
2,842,697 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,917 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,011 UART:
2,843,027 UART: Running Caliptra ROM ...
2,843,435 UART:
2,843,577 UART: [state] CFI Enabled
2,846,398 UART: [state] LifecycleState = Production
2,847,006 UART: [state] DebugLocked = Yes
2,847,574 UART: [state] Starting the WD Timer 40000000 cycles
2,849,167 UART: [kat] SHA2-256
3,652,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,846 UART: [kat] ++
3,656,998 UART: [kat] sha1
3,661,422 UART: [kat] SHA2-256
3,663,362 UART: [kat] SHA2-384
3,666,115 UART: [kat] SHA2-512-ACC
3,668,016 UART: [kat] ECC-384
3,677,911 UART: [kat] HMAC-384Kdf
3,682,409 UART: [kat] LMS
3,930,721 UART: [kat] --
3,931,455 UART: [warm-reset] ++
3,932,242 UART: [warm-reset] --
3,933,319 UART: [state] Locking Datavault
3,933,977 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,581 UART: [state] Locking ICCM
3,935,083 UART: [exit] Launching FMC @ 0x40000130
3,940,412 UART:
3,940,428 UART: Running Caliptra FMC ...
3,940,836 UART:
3,940,979 UART: [state] CFI Enabled
3,942,074 UART: [aliasrt :skip pcr extension
3,942,547 UART: [art] Extend RT PCRs Done
3,942,975 UART: [art] Lock RT PCRs Done
3,944,398 UART: [art] Populate DV Done
3,952,640 UART: [fht] FMC Alias Private Key: 7
3,953,780 UART: [art] Derive CDI
3,954,060 UART: [art] Store in in slot 0x4
4,039,893 UART: [art] Derive Key Pair
4,040,253 UART: [art] Store priv key in slot 0x5
4,053,563 UART: [art] Derive Key Pair - Done
4,068,406 UART: [art] Signing Cert with AUTHO
4,068,886 UART: RITY.KEYID = 7
4,084,136 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,901 UART: [art] PUB.X = 31A5A58F722F5BF5439A52E23E00329DB6F0F198C349077B343E4F9A4779EA83953C7F2A37742A173507D8392A3C66F7
4,091,637 UART: [art] PUB.Y = DE791EA8C0AC4B33A5C27577E633B0861CADDF54655E83AA59C6595CED563E5B40ECC4D29E2C45DA91E4AA24503BFB29
4,098,605 UART: [art] SIG.R = F2E71423D1630642E1F9182439CA793B1BA3666766D70C6337D4F5D85AFFF12877DDA5AACBA6B0F975A17AC0FF624A0F
4,105,376 UART: [art] SIG.S = FC27A4E4DC6E135F18A957C9E87B80CA6E363ABC79AAD18973723396E6FEA4CE336AF404F808274B1B1C00528AA43C23
4,129,557 UART: mbox::rt_entry...
4,129,929 UART: ____ _ _ _ ____ _____
4,130,713 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,049 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,817 UART: |_|
4,134,129 UART:
4,432,790 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,434,834 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Production
85,639 UART: [state] DebugLocked = Yes
86,325 UART: [state] Starting the WD Timer 40000000 cycles
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,174,332 ready_for_fw is high
1,174,332 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,455 UART: [idev] --
1,209,464 UART: [ldev] ++
1,209,632 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,423 UART: [ldev] AUTHORITY.KEYID = 7
1,210,886 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,763 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,633 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,339 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,277 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,011 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,438 >>> mbox cmd response: success
2,338,476 UART: [afmc] ++
2,338,644 UART: [afmc] CDI.KEYID = 6
2,339,007 UART: [afmc] SUBJECT.KEYID = 7
2,339,433 UART: [afmc] AUTHORITY.KEYID = 5
2,374,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,419 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,138 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,031 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,738 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,587 UART: [afmc] --
2,417,544 UART: [cold-reset] --
2,418,382 UART: [state] Locking Datavault
2,419,621 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,225 UART: [state] Locking ICCM
2,420,699 UART: [exit] Launching FMC @ 0x40000130
2,426,028 UART:
2,426,044 UART: Running Caliptra FMC ...
2,426,452 UART:
2,426,506 UART: [state] CFI Enabled
2,437,167 UART: [fht] FMC Alias Private Key: 7
2,545,532 UART: [art] Extend RT PCRs Done
2,545,960 UART: [art] Lock RT PCRs Done
2,547,444 UART: [art] Populate DV Done
2,555,620 UART: [fht] FMC Alias Private Key: 7
2,556,610 UART: [art] Derive CDI
2,556,890 UART: [art] Store in in slot 0x4
2,642,843 UART: [art] Derive Key Pair
2,643,203 UART: [art] Store priv key in slot 0x5
2,656,823 UART: [art] Derive Key Pair - Done
2,671,024 UART: [art] Signing Cert with AUTHO
2,671,504 UART: RITY.KEYID = 7
2,686,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,555 UART: [art] PUB.X = 4212E1D2E4E2D21E583E3479B5E7C2F36A3CF4100741256EE8F7A7D58D3A5C52759C604F533B039C6B6CB3B9580D781A
2,694,318 UART: [art] PUB.Y = 57F5A67B616DB3316B7B8739ADAE7D8A928C05003E8D69ACF3AB5E57B65B10558EC935FC0D9DF93B19626A34B103BB14
2,701,247 UART: [art] SIG.R = B218B96BD3CB437A271391803CDA6B39DE508B5B0EF67DA712F6508777D77B2FD4E770380FD2AD9A986A69AB831C899C
2,708,019 UART: [art] SIG.S = B40A6213BD8ACE8005403994235B02E0A6890E4D184C33799DF6449BC9AD0B0DFAD1441A7ED3108E0E32C82AD94303F1
2,731,426 UART: mbox::rt_entry...
2,731,798 UART: ____ _ _ _ ____ _____
2,732,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,150 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,686 UART: |_|
2,735,998 UART:
2,842,740 UART: [rt] Runtime listening for mailbox commands...
2,843,502 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,722 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,816 UART:
2,843,832 UART: Running Caliptra ROM ...
2,844,240 UART:
2,844,295 UART: [state] CFI Enabled
2,846,588 UART: [state] LifecycleState = Production
2,847,196 UART: [state] DebugLocked = Yes
2,847,846 UART: [state] Starting the WD Timer 40000000 cycles
2,849,431 UART: [kat] SHA2-256
3,652,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,110 UART: [kat] ++
3,657,262 UART: [kat] sha1
3,661,376 UART: [kat] SHA2-256
3,663,316 UART: [kat] SHA2-384
3,665,879 UART: [kat] SHA2-512-ACC
3,667,780 UART: [kat] ECC-384
3,677,687 UART: [kat] HMAC-384Kdf
3,682,405 UART: [kat] LMS
3,930,717 UART: [kat] --
3,931,131 UART: [warm-reset] ++
3,931,932 UART: [warm-reset] --
3,932,885 UART: [state] Locking Datavault
3,933,605 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,209 UART: [state] Locking ICCM
3,934,835 UART: [exit] Launching FMC @ 0x40000130
3,940,164 UART:
3,940,180 UART: Running Caliptra FMC ...
3,940,588 UART:
3,940,642 UART: [state] CFI Enabled
3,941,869 UART: [aliasrt :skip pcr extension
3,942,342 UART: [art] Extend RT PCRs Done
3,942,770 UART: [art] Lock RT PCRs Done
3,944,129 UART: [art] Populate DV Done
3,952,621 UART: [fht] FMC Alias Private Key: 7
3,953,661 UART: [art] Derive CDI
3,953,941 UART: [art] Store in in slot 0x4
4,039,064 UART: [art] Derive Key Pair
4,039,424 UART: [art] Store priv key in slot 0x5
4,052,470 UART: [art] Derive Key Pair - Done
4,067,239 UART: [art] Signing Cert with AUTHO
4,067,719 UART: RITY.KEYID = 7
4,083,067 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,832 UART: [art] PUB.X = 4212E1D2E4E2D21E583E3479B5E7C2F36A3CF4100741256EE8F7A7D58D3A5C52759C604F533B039C6B6CB3B9580D781A
4,090,595 UART: [art] PUB.Y = 57F5A67B616DB3316B7B8739ADAE7D8A928C05003E8D69ACF3AB5E57B65B10558EC935FC0D9DF93B19626A34B103BB14
4,097,524 UART: [art] SIG.R = B218B96BD3CB437A271391803CDA6B39DE508B5B0EF67DA712F6508777D77B2FD4E770380FD2AD9A986A69AB831C899C
4,104,296 UART: [art] SIG.S = B40A6213BD8ACE8005403994235B02E0A6890E4D184C33799DF6449BC9AD0B0DFAD1441A7ED3108E0E32C82AD94303F1
4,128,563 UART: mbox::rt_entry...
4,128,935 UART: ____ _ _ _ ____ _____
4,129,719 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,519 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,287 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,823 UART: |_|
4,133,135 UART:
4,428,210 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,304 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Production
85,655 UART: [state] DebugLocked = Yes
86,243 UART: [state] Starting the WD Timer 40000000 cycles
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 ready_for_fw is high
1,174,450 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,213 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,215,814 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,335 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,205 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,911 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,035 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,282,028 UART: [fwproc] Recv command 0x46574c44
1,282,761 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,303 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,732 >>> mbox cmd response: success
2,336,774 UART: [afmc] ++
2,336,942 UART: [afmc] CDI.KEYID = 6
2,337,305 UART: [afmc] SUBJECT.KEYID = 7
2,337,731 UART: [afmc] AUTHORITY.KEYID = 5
2,373,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,341 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,060 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,953 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,660 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,517 UART: [afmc] --
2,416,582 UART: [cold-reset] --
2,417,460 UART: [state] Locking Datavault
2,418,651 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,255 UART: [state] Locking ICCM
2,419,839 UART: [exit] Launching FMC @ 0x40000130
2,425,168 UART:
2,425,184 UART: Running Caliptra FMC ...
2,425,592 UART:
2,425,646 UART: [state] CFI Enabled
2,436,081 UART: [fht] FMC Alias Private Key: 7
2,543,438 UART: [art] Extend RT PCRs Done
2,543,866 UART: [art] Lock RT PCRs Done
2,545,460 UART: [art] Populate DV Done
2,553,674 UART: [fht] FMC Alias Private Key: 7
2,554,654 UART: [art] Derive CDI
2,554,934 UART: [art] Store in in slot 0x4
2,640,569 UART: [art] Derive Key Pair
2,640,929 UART: [art] Store priv key in slot 0x5
2,654,085 UART: [art] Derive Key Pair - Done
2,668,930 UART: [art] Signing Cert with AUTHO
2,669,410 UART: RITY.KEYID = 7
2,684,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,455 UART: [art] PUB.X = 8B2A312F4E5195F89DB0F7F0F5A7AA37BB7538DB6E0CC61E28B74A53CEADF5708C8124BBECF4CB5E2900C67655B4974E
2,692,218 UART: [art] PUB.Y = 09920A7FB724E5401F7C9861F19A1383DF6A9268564BA3FC422B4F427047039D6615ECB88E96A0BFE0DD55D4D44E0FAE
2,699,162 UART: [art] SIG.R = 82F3204F67444CF06C0AB2CCDBA9FB6761BC86DA3A391FBB8B9EAA00C614B0DB0ECE75653C84343C5B0BA691633612A4
2,705,917 UART: [art] SIG.S = BDCBBBA04AA1992F0E6E482EB85DDBA7C567C38F85FF245EF413899BB4BA417D2A334797397AE24D1C468C533F66B7FD
2,729,527 UART: mbox::rt_entry...
2,729,899 UART: ____ _ _ _ ____ _____
2,730,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,787 UART: |_|
2,734,099 UART:
2,840,527 UART: [rt] Runtime listening for mailbox commands...
2,841,289 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,509 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,603 UART:
2,841,619 UART: Running Caliptra ROM ...
2,842,027 UART:
2,842,082 UART: [state] CFI Enabled
2,844,961 UART: [state] LifecycleState = Production
2,845,569 UART: [state] DebugLocked = Yes
2,846,209 UART: [state] Starting the WD Timer 40000000 cycles
2,847,874 UART: [kat] SHA2-256
3,651,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,553 UART: [kat] ++
3,655,705 UART: [kat] sha1
3,660,049 UART: [kat] SHA2-256
3,661,989 UART: [kat] SHA2-384
3,664,848 UART: [kat] SHA2-512-ACC
3,666,749 UART: [kat] ECC-384
3,676,212 UART: [kat] HMAC-384Kdf
3,680,792 UART: [kat] LMS
3,929,104 UART: [kat] --
3,929,752 UART: [warm-reset] ++
3,930,751 UART: [warm-reset] --
3,931,550 UART: [state] Locking Datavault
3,932,446 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,050 UART: [state] Locking ICCM
3,933,618 UART: [exit] Launching FMC @ 0x40000130
3,938,947 UART:
3,938,963 UART: Running Caliptra FMC ...
3,939,371 UART:
3,939,425 UART: [state] CFI Enabled
3,940,920 UART: [aliasrt :skip pcr extension
3,941,393 UART: [art] Extend RT PCRs Done
3,941,821 UART: [art] Lock RT PCRs Done
3,943,274 UART: [art] Populate DV Done
3,951,498 UART: [fht] FMC Alias Private Key: 7
3,952,638 UART: [art] Derive CDI
3,952,918 UART: [art] Store in in slot 0x4
4,039,141 UART: [art] Derive Key Pair
4,039,501 UART: [art] Store priv key in slot 0x5
4,052,227 UART: [art] Derive Key Pair - Done
4,067,162 UART: [art] Signing Cert with AUTHO
4,067,642 UART: RITY.KEYID = 7
4,083,034 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,799 UART: [art] PUB.X = 8B2A312F4E5195F89DB0F7F0F5A7AA37BB7538DB6E0CC61E28B74A53CEADF5708C8124BBECF4CB5E2900C67655B4974E
4,090,562 UART: [art] PUB.Y = 09920A7FB724E5401F7C9861F19A1383DF6A9268564BA3FC422B4F427047039D6615ECB88E96A0BFE0DD55D4D44E0FAE
4,097,506 UART: [art] SIG.R = 82F3204F67444CF06C0AB2CCDBA9FB6761BC86DA3A391FBB8B9EAA00C614B0DB0ECE75653C84343C5B0BA691633612A4
4,104,261 UART: [art] SIG.S = BDCBBBA04AA1992F0E6E482EB85DDBA7C567C38F85FF245EF413899BB4BA417D2A334797397AE24D1C468C533F66B7FD
4,128,207 UART: mbox::rt_entry...
4,128,579 UART: ____ _ _ _ ____ _____
4,129,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,931 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,467 UART: |_|
4,132,779 UART:
4,425,232 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,450 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Production
85,690 UART: [state] DebugLocked = Yes
86,320 UART: [state] Starting the WD Timer 40000000 cycles
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
917,079 UART: [kat] HMAC-384Kdf
921,831 UART: [kat] LMS
1,170,143 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,369 UART: [fht] FHT @ 0x50003400
1,174,055 UART: [idev] ++
1,174,223 UART: [idev] CDI.KEYID = 6
1,174,584 UART: [idev] SUBJECT.KEYID = 7
1,175,009 UART: [idev] UDS.KEYID = 0
1,175,355 ready_for_fw is high
1,175,355 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,079 UART: [idev] Sha1 KeyId Algorithm
1,208,932 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,515 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,512 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,206 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,076 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,782 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,902 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,194 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,483 >>> mbox cmd response: success
2,337,715 UART: [afmc] ++
2,337,883 UART: [afmc] CDI.KEYID = 6
2,338,246 UART: [afmc] SUBJECT.KEYID = 7
2,338,672 UART: [afmc] AUTHORITY.KEYID = 5
2,374,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,262 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,981 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,874 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,581 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,360 UART: [afmc] --
2,417,477 UART: [cold-reset] --
2,418,363 UART: [state] Locking Datavault
2,419,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,990 UART: [state] Locking ICCM
2,420,566 UART: [exit] Launching FMC @ 0x40000130
2,425,895 UART:
2,425,911 UART: Running Caliptra FMC ...
2,426,319 UART:
2,426,462 UART: [state] CFI Enabled
2,437,389 UART: [fht] FMC Alias Private Key: 7
2,545,256 UART: [art] Extend RT PCRs Done
2,545,684 UART: [art] Lock RT PCRs Done
2,547,232 UART: [art] Populate DV Done
2,555,560 UART: [fht] FMC Alias Private Key: 7
2,556,702 UART: [art] Derive CDI
2,556,982 UART: [art] Store in in slot 0x4
2,642,447 UART: [art] Derive Key Pair
2,642,807 UART: [art] Store priv key in slot 0x5
2,655,625 UART: [art] Derive Key Pair - Done
2,670,549 UART: [art] Signing Cert with AUTHO
2,671,029 UART: RITY.KEYID = 7
2,686,315 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,080 UART: [art] PUB.X = 8DB89A4F457BE4F3B740796DF53D5182053675489BB702FFE7FD577672085A1202C93C68D9434F9F60038B3C6D969C2A
2,693,831 UART: [art] PUB.Y = AAF7525724226C81677CBEB18714FEC89DA48A4CD8C087A2BF4414A0EDDF8577367DE10123C62946ADF0275AEC934DFD
2,700,790 UART: [art] SIG.R = 20C13636C50776B1C69F4C434CB8188AEB9E202FAE7951914FA011AA5013756A1E1968F4438FAADC8D1D42232B538CFA
2,707,561 UART: [art] SIG.S = F1F1DD3B43B8768F5111951DE955B5B6C8EABA465D60F1248BAE70C98FC7273D77358436046A5EAB675DD40EEAC442FD
2,730,970 UART: mbox::rt_entry...
2,731,342 UART: ____ _ _ _ ____ _____
2,732,126 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,926 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,694 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,462 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,230 UART: |_|
2,735,542 UART:
2,841,518 UART: [rt] Runtime listening for mailbox commands...
2,842,280 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,500 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,594 UART:
2,842,610 UART: Running Caliptra ROM ...
2,843,018 UART:
2,843,160 UART: [state] CFI Enabled
2,846,185 UART: [state] LifecycleState = Production
2,846,793 UART: [state] DebugLocked = Yes
2,847,511 UART: [state] Starting the WD Timer 40000000 cycles
2,849,006 UART: [kat] SHA2-256
3,652,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,685 UART: [kat] ++
3,656,837 UART: [kat] sha1
3,661,251 UART: [kat] SHA2-256
3,663,191 UART: [kat] SHA2-384
3,665,754 UART: [kat] SHA2-512-ACC
3,667,655 UART: [kat] ECC-384
3,677,720 UART: [kat] HMAC-384Kdf
3,682,252 UART: [kat] LMS
3,930,564 UART: [kat] --
3,931,324 UART: [warm-reset] ++
3,932,199 UART: [warm-reset] --
3,933,030 UART: [state] Locking Datavault
3,933,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,416 UART: [state] Locking ICCM
3,934,980 UART: [exit] Launching FMC @ 0x40000130
3,940,309 UART:
3,940,325 UART: Running Caliptra FMC ...
3,940,733 UART:
3,940,876 UART: [state] CFI Enabled
3,942,457 UART: [aliasrt :skip pcr extension
3,942,930 UART: [art] Extend RT PCRs Done
3,943,358 UART: [art] Lock RT PCRs Done
3,944,825 UART: [art] Populate DV Done
3,953,109 UART: [fht] FMC Alias Private Key: 7
3,954,067 UART: [art] Derive CDI
3,954,347 UART: [art] Store in in slot 0x4
4,040,236 UART: [art] Derive Key Pair
4,040,596 UART: [art] Store priv key in slot 0x5
4,054,256 UART: [art] Derive Key Pair - Done
4,069,006 UART: [art] Signing Cert with AUTHO
4,069,486 UART: RITY.KEYID = 7
4,084,436 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,201 UART: [art] PUB.X = 8DB89A4F457BE4F3B740796DF53D5182053675489BB702FFE7FD577672085A1202C93C68D9434F9F60038B3C6D969C2A
4,091,952 UART: [art] PUB.Y = AAF7525724226C81677CBEB18714FEC89DA48A4CD8C087A2BF4414A0EDDF8577367DE10123C62946ADF0275AEC934DFD
4,098,911 UART: [art] SIG.R = 20C13636C50776B1C69F4C434CB8188AEB9E202FAE7951914FA011AA5013756A1E1968F4438FAADC8D1D42232B538CFA
4,105,682 UART: [art] SIG.S = F1F1DD3B43B8768F5111951DE955B5B6C8EABA465D60F1248BAE70C98FC7273D77358436046A5EAB675DD40EEAC442FD
4,129,383 UART: mbox::rt_entry...
4,129,755 UART: ____ _ _ _ ____ _____
4,130,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,643 UART: |_|
4,133,955 UART:
4,427,316 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,540 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Production
86,184 UART: [state] DebugLocked = Yes
86,908 UART: [state] Starting the WD Timer 40000000 cycles
88,399 UART: [kat] SHA2-256
891,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,078 UART: [kat] ++
896,230 UART: [kat] sha1
900,656 UART: [kat] SHA2-256
902,596 UART: [kat] SHA2-384
905,441 UART: [kat] SHA2-512-ACC
907,342 UART: [kat] ECC-384
917,521 UART: [kat] HMAC-384Kdf
922,323 UART: [kat] LMS
1,170,635 UART: [kat] --
1,171,686 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,723 UART: [idev] ++
1,174,891 UART: [idev] CDI.KEYID = 6
1,175,252 UART: [idev] SUBJECT.KEYID = 7
1,175,677 UART: [idev] UDS.KEYID = 0
1,176,023 ready_for_fw is high
1,176,023 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,756 UART: [idev] Erasing UDS.KEYID = 0
1,201,097 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] --
1,210,939 UART: [ldev] ++
1,211,107 UART: [ldev] CDI.KEYID = 6
1,211,471 UART: [ldev] SUBJECT.KEYID = 5
1,211,898 UART: [ldev] AUTHORITY.KEYID = 7
1,212,361 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,244,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,624 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,318 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,188 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,894 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,782 UART: [ldev] --
1,283,246 UART: [fwproc] Wait for Commands...
1,283,853 UART: [fwproc] Recv command 0x46574c44
1,284,586 UART: [fwproc] Recv'd Img size: 78704 bytes
2,200,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,227,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,256,658 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,339,137 >>> mbox cmd response: success
2,340,241 UART: [afmc] ++
2,340,409 UART: [afmc] CDI.KEYID = 6
2,340,772 UART: [afmc] SUBJECT.KEYID = 7
2,341,198 UART: [afmc] AUTHORITY.KEYID = 5
2,377,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,394,476 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,400,195 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,406,088 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,795 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,568 UART: [afmc] --
2,420,685 UART: [cold-reset] --
2,421,525 UART: [state] Locking Datavault
2,422,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,423,364 UART: [state] Locking ICCM
2,423,918 UART: [exit] Launching FMC @ 0x40000130
2,429,247 UART:
2,429,263 UART: Running Caliptra FMC ...
2,429,671 UART:
2,429,814 UART: [state] CFI Enabled
2,440,391 UART: [fht] FMC Alias Private Key: 7
2,548,096 UART: [art] Extend RT PCRs Done
2,548,524 UART: [art] Lock RT PCRs Done
2,550,108 UART: [art] Populate DV Done
2,558,098 UART: [fht] FMC Alias Private Key: 7
2,559,194 UART: [art] Derive CDI
2,559,474 UART: [art] Store in in slot 0x4
2,645,021 UART: [art] Derive Key Pair
2,645,381 UART: [art] Store priv key in slot 0x5
2,659,145 UART: [art] Derive Key Pair - Done
2,674,128 UART: [art] Signing Cert with AUTHO
2,674,608 UART: RITY.KEYID = 7
2,690,122 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,887 UART: [art] PUB.X = C95BBE3027FEC46F224CC94D9B454EC6ACA7982BD420C032C582ACF1FED419E86127C4145DCA69DBEB558CA1047F143D
2,697,672 UART: [art] PUB.Y = 72B47577C185BD3B76F686A98F0ADF75EB99E3334C6F7049C59E73DA513648D2C8FE7F8562DA813EAD4534064A2F81BA
2,704,622 UART: [art] SIG.R = 2BE027608332B55CE5BA70565DA0313445015430CE0695DD25BEBB5E925B388BA37922B170CDC1883066D818541C9908
2,711,375 UART: [art] SIG.S = 1A0902F7F39698AC3D131ACBCE21E48C8271B5A67F590D4D381484C086B70EC99434D1B13A63F28B718E00AD565C98E3
2,735,310 UART: mbox::rt_entry...
2,735,682 UART: ____ _ _ _ ____ _____
2,736,466 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,737,266 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,738,034 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,738,802 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,739,570 UART: |_|
2,739,882 UART:
2,845,115 UART: [rt] Runtime listening for mailbox commands...
2,845,877 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,846,097 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,846,191 UART:
2,846,207 UART: Running Caliptra ROM ...
2,846,615 UART:
2,846,757 UART: [state] CFI Enabled
2,849,800 UART: [state] LifecycleState = Production
2,850,408 UART: [state] DebugLocked = Yes
2,851,044 UART: [state] Starting the WD Timer 40000000 cycles
2,852,655 UART: [kat] SHA2-256
3,656,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,334 UART: [kat] ++
3,660,486 UART: [kat] sha1
3,664,586 UART: [kat] SHA2-256
3,666,526 UART: [kat] SHA2-384
3,669,317 UART: [kat] SHA2-512-ACC
3,671,218 UART: [kat] ECC-384
3,680,749 UART: [kat] HMAC-384Kdf
3,685,339 UART: [kat] LMS
3,933,651 UART: [kat] --
3,934,503 UART: [warm-reset] ++
3,935,224 UART: [warm-reset] --
3,936,133 UART: [state] Locking Datavault
3,937,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,619 UART: [state] Locking ICCM
3,938,225 UART: [exit] Launching FMC @ 0x40000130
3,943,554 UART:
3,943,570 UART: Running Caliptra FMC ...
3,943,978 UART:
3,944,121 UART: [state] CFI Enabled
3,945,444 UART: [aliasrt :skip pcr extension
3,945,917 UART: [art] Extend RT PCRs Done
3,946,345 UART: [art] Lock RT PCRs Done
3,947,674 UART: [art] Populate DV Done
3,956,060 UART: [fht] FMC Alias Private Key: 7
3,957,100 UART: [art] Derive CDI
3,957,380 UART: [art] Store in in slot 0x4
4,042,677 UART: [art] Derive Key Pair
4,043,037 UART: [art] Store priv key in slot 0x5
4,055,965 UART: [art] Derive Key Pair - Done
4,071,124 UART: [art] Signing Cert with AUTHO
4,071,604 UART: RITY.KEYID = 7
4,086,698 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,463 UART: [art] PUB.X = C95BBE3027FEC46F224CC94D9B454EC6ACA7982BD420C032C582ACF1FED419E86127C4145DCA69DBEB558CA1047F143D
4,094,248 UART: [art] PUB.Y = 72B47577C185BD3B76F686A98F0ADF75EB99E3334C6F7049C59E73DA513648D2C8FE7F8562DA813EAD4534064A2F81BA
4,101,198 UART: [art] SIG.R = 2BE027608332B55CE5BA70565DA0313445015430CE0695DD25BEBB5E925B388BA37922B170CDC1883066D818541C9908
4,107,951 UART: [art] SIG.S = 1A0902F7F39698AC3D131ACBCE21E48C8271B5A67F590D4D381484C086B70EC99434D1B13A63F28B718E00AD565C98E3
4,131,224 UART: mbox::rt_entry...
4,131,596 UART: ____ _ _ _ ____ _____
4,132,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,484 UART: |_|
4,135,796 UART:
4,428,462 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,692 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [fake-rom-cold-reset] ++
88,708 ready_for_fw is high
88,708 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
88,800 UART: [fht] FHT @ 0x50003400
92,053 UART: [fwproc] Wait for Commands...
92,890 UART: [fwproc] Recv command 0x46574c44
93,618 UART: [fwproc] Recv'd Img size: 99632 bytes
1,216,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,610 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,716 >>> mbox cmd response: success
1,387,874 UART: [fake-rom-cold-reset] --
1,388,650 UART: [state] Locking Datavault
1,390,053 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,657 UART: [state] Locking ICCM
1,391,227 UART: [exit] Launching FMC @ 0x40000130
1,396,549 UART:
1,396,565 UART: Running Caliptra FMC ...
1,396,973 UART:
1,397,027 UART: [state] CFI Enabled
1,399,546 UART: Caliptra RT
1,399,799 UART: [state] CFI Enabled
1,500,540 UART: [rt] RT listening for mailbox commands...
1,501,210 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,902 UART: [rt]cmd =0x4c444556, len=4
1,541,387 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,388 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,769 UART: [rt]cmd =0x43455246, len=4
1,582,772 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [fake-rom-cold-reset] ++
88,758 ready_for_fw is high
88,758 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
88,890 UART: [fht] FHT @ 0x50003400
92,343 UART: [fwproc] Wait for Commands...
93,158 UART: [fwproc] Recv command 0x46574c44
93,886 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,710 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,864 >>> mbox cmd response: success
1,390,022 UART: [fake-rom-cold-reset] --
1,390,840 UART: [state] Locking Datavault
1,391,911 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,515 UART: [state] Locking ICCM
1,392,977 UART: [exit] Launching FMC @ 0x40000130
1,398,299 UART:
1,398,315 UART: Running Caliptra FMC ...
1,398,723 UART:
1,398,777 UART: [state] CFI Enabled
1,401,492 UART: Caliptra RT
1,401,745 UART: [state] CFI Enabled
1,501,814 UART: [rt] RT listening for mailbox commands...
1,502,484 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,348 UART: [rt]cmd =0x4c444556, len=4
1,542,887 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,888 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,069 UART: [rt]cmd =0x43455246, len=4
1,584,300 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,017 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [fake-rom-cold-reset] ++
89,303 ready_for_fw is high
89,303 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,595 UART: [fht] FHT @ 0x50003400
92,836 UART: [fwproc] Wait for Commands...
93,435 UART: [fwproc] Recv command 0x46574c44
94,163 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,621 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,739 >>> mbox cmd response: success
1,388,897 UART: [fake-rom-cold-reset] --
1,389,547 UART: [state] Locking Datavault
1,390,960 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,564 UART: [state] Locking ICCM
1,392,054 UART: [exit] Launching FMC @ 0x40000130
1,397,376 UART:
1,397,392 UART: Running Caliptra FMC ...
1,397,800 UART:
1,397,941 UART: [state] CFI Enabled
1,400,577 UART: Caliptra RT
1,400,922 UART: [state] CFI Enabled
1,500,629 UART: [rt] RT listening for mailbox commands...
1,501,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,973 UART: [rt]cmd =0x4c444556, len=4
1,541,346 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,347 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,596 UART: [rt]cmd =0x43455246, len=4
1,582,555 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [fake-rom-cold-reset] ++
88,591 ready_for_fw is high
88,591 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
88,843 UART: [fht] FHT @ 0x50003400
92,124 UART: [fwproc] Wait for Commands...
92,891 UART: [fwproc] Recv command 0x46574c44
93,619 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,243 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,309 >>> mbox cmd response: success
1,388,467 UART: [fake-rom-cold-reset] --
1,389,217 UART: [state] Locking Datavault
1,390,466 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,070 UART: [state] Locking ICCM
1,391,508 UART: [exit] Launching FMC @ 0x40000130
1,396,830 UART:
1,396,846 UART: Running Caliptra FMC ...
1,397,254 UART:
1,397,395 UART: [state] CFI Enabled
1,400,035 UART: Caliptra RT
1,400,380 UART: [state] CFI Enabled
1,500,369 UART: [rt] RT listening for mailbox commands...
1,501,039 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,659 UART: [rt]cmd =0x4c444556, len=4
1,541,100 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,101 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,660 UART: [rt]cmd =0x43455246, len=4
1,582,781 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [fake-rom-cold-reset] ++
88,928 ready_for_fw is high
88,928 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,066 UART: [fht] FHT @ 0x50003400
92,297 UART: [fwproc] Wait for Commands...
92,946 UART: [fwproc] Recv command 0x46574c44
93,674 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,284 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,376 >>> mbox cmd response: success
1,389,534 UART: [fake-rom-cold-reset] --
1,390,464 UART: [state] Locking Datavault
1,391,949 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,553 UART: [state] Locking ICCM
1,393,219 UART: [exit] Launching FMC @ 0x40000130
1,398,541 UART:
1,398,557 UART: Running Caliptra FMC ...
1,398,965 UART:
1,399,019 UART: [state] CFI Enabled
1,401,532 UART: Caliptra RT
1,401,785 UART: [state] CFI Enabled
1,502,732 UART: [rt] RT listening for mailbox commands...
1,503,402 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,244 UART: [rt]cmd =0x4c444556, len=4
1,543,711 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,712 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,153 UART: [rt]cmd =0x43455246, len=4
1,585,360 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [fake-rom-cold-reset] ++
88,950 ready_for_fw is high
88,950 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,180 UART: [fht] FHT @ 0x50003400
92,491 UART: [fwproc] Wait for Commands...
93,134 UART: [fwproc] Recv command 0x46574c44
93,862 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,066 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,389,240 >>> mbox cmd response: success
1,390,398 UART: [fake-rom-cold-reset] --
1,391,274 UART: [state] Locking Datavault
1,392,153 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,757 UART: [state] Locking ICCM
1,393,287 UART: [exit] Launching FMC @ 0x40000130
1,398,609 UART:
1,398,625 UART: Running Caliptra FMC ...
1,399,033 UART:
1,399,087 UART: [state] CFI Enabled
1,401,616 UART: Caliptra RT
1,401,869 UART: [state] CFI Enabled
1,500,814 UART: [rt] RT listening for mailbox commands...
1,501,484 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,060 UART: [rt]cmd =0x4c444556, len=4
1,541,665 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,666 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,705 UART: [rt]cmd =0x43455246, len=4
1,582,576 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [fake-rom-cold-reset] ++
88,539 ready_for_fw is high
88,539 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
88,829 UART: [fht] FHT @ 0x50003400
92,052 UART: [fwproc] Wait for Commands...
92,777 UART: [fwproc] Recv command 0x46574c44
93,505 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,649 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,705 >>> mbox cmd response: success
1,388,863 UART: [fake-rom-cold-reset] --
1,389,787 UART: [state] Locking Datavault
1,390,938 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,542 UART: [state] Locking ICCM
1,392,086 UART: [exit] Launching FMC @ 0x40000130
1,397,408 UART:
1,397,424 UART: Running Caliptra FMC ...
1,397,832 UART:
1,397,973 UART: [state] CFI Enabled
1,400,821 UART: Caliptra RT
1,401,166 UART: [state] CFI Enabled
1,501,547 UART: [rt] RT listening for mailbox commands...
1,502,217 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,937 UART: [rt]cmd =0x4c444556, len=4
1,542,212 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,213 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,544 UART: [rt]cmd =0x43455246, len=4
1,583,507 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [fake-rom-cold-reset] ++
88,845 ready_for_fw is high
88,845 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,053 UART: [fht] FHT @ 0x50003400
92,350 UART: [fwproc] Wait for Commands...
93,015 UART: [fwproc] Recv command 0x46574c44
93,743 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,729 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,679 >>> mbox cmd response: success
1,387,837 UART: [fake-rom-cold-reset] --
1,388,629 UART: [state] Locking Datavault
1,389,598 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,202 UART: [state] Locking ICCM
1,390,708 UART: [exit] Launching FMC @ 0x40000130
1,396,030 UART:
1,396,046 UART: Running Caliptra FMC ...
1,396,454 UART:
1,396,595 UART: [state] CFI Enabled
1,399,505 UART: Caliptra RT
1,399,850 UART: [state] CFI Enabled
1,500,015 UART: [rt] RT listening for mailbox commands...
1,500,685 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,373 UART: [rt]cmd =0x4c444556, len=4
1,541,006 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,007 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,246 UART: [rt]cmd =0x43455246, len=4
1,582,395 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,748 UART: [state] LifecycleState = Unprovisioned
86,407 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,242 UART: [fake-rom-cold-reset] ++
89,170 ready_for_fw is high
89,170 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,440 UART: [fht] FHT @ 0x50003400
92,695 UART: [fwproc] Wait for Commands...
93,452 UART: [fwproc] Recv command 0x46574c44
94,180 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,826 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,892 >>> mbox cmd response: success
1,389,050 UART: [fake-rom-cold-reset] --
1,389,834 UART: [state] Locking Datavault
1,390,995 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,599 UART: [state] Locking ICCM
1,392,099 UART: [exit] Launching FMC @ 0x40000130
1,397,421 UART:
1,397,437 UART: Running Caliptra FMC ...
1,397,845 UART:
1,397,899 UART: [state] CFI Enabled
1,400,552 UART: Caliptra RT
1,400,805 UART: [state] CFI Enabled
1,501,422 UART: [rt] RT listening for mailbox commands...
1,502,092 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,830 UART: [rt]cmd =0x4c444556, len=4
1,542,253 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,254 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,593 UART: [rt]cmd =0x43455246, len=4
1,583,524 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [fake-rom-cold-reset] ++
88,720 ready_for_fw is high
88,720 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
88,924 UART: [fht] FHT @ 0x50003400
92,141 UART: [fwproc] Wait for Commands...
92,786 UART: [fwproc] Recv command 0x46574c44
93,514 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,472 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,588 >>> mbox cmd response: success
1,389,746 UART: [fake-rom-cold-reset] --
1,390,604 UART: [state] Locking Datavault
1,391,895 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,499 UART: [state] Locking ICCM
1,392,951 UART: [exit] Launching FMC @ 0x40000130
1,398,273 UART:
1,398,289 UART: Running Caliptra FMC ...
1,398,697 UART:
1,398,751 UART: [state] CFI Enabled
1,401,528 UART: Caliptra RT
1,401,781 UART: [state] CFI Enabled
1,501,874 UART: [rt] RT listening for mailbox commands...
1,502,544 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,214 UART: [rt]cmd =0x4c444556, len=4
1,542,669 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,670 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,011 UART: [rt]cmd =0x43455246, len=4
1,584,042 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [fake-rom-cold-reset] ++
88,899 ready_for_fw is high
88,899 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,003 UART: [fht] FHT @ 0x50003400
92,462 UART: [fwproc] Wait for Commands...
93,061 UART: [fwproc] Recv command 0x46574c44
93,789 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,469 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,449 >>> mbox cmd response: success
1,389,607 UART: [fake-rom-cold-reset] --
1,390,453 UART: [state] Locking Datavault
1,391,804 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,408 UART: [state] Locking ICCM
1,392,940 UART: [exit] Launching FMC @ 0x40000130
1,398,262 UART:
1,398,278 UART: Running Caliptra FMC ...
1,398,686 UART:
1,398,827 UART: [state] CFI Enabled
1,401,521 UART: Caliptra RT
1,401,866 UART: [state] CFI Enabled
1,502,093 UART: [rt] RT listening for mailbox commands...
1,502,763 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,649 UART: [rt]cmd =0x4c444556, len=4
1,543,074 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,075 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,324 UART: [rt]cmd =0x43455246, len=4
1,584,421 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,055 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [fake-rom-cold-reset] ++
89,355 ready_for_fw is high
89,355 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,499 UART: [fht] FHT @ 0x50003400
92,906 UART: [fwproc] Wait for Commands...
93,621 UART: [fwproc] Recv command 0x46574c44
94,349 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,233 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,273 >>> mbox cmd response: success
1,389,431 UART: [fake-rom-cold-reset] --
1,390,351 UART: [state] Locking Datavault
1,391,700 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,304 UART: [state] Locking ICCM
1,392,932 UART: [exit] Launching FMC @ 0x40000130
1,398,254 UART:
1,398,270 UART: Running Caliptra FMC ...
1,398,678 UART:
1,398,819 UART: [state] CFI Enabled
1,401,799 UART: Caliptra RT
1,402,144 UART: [state] CFI Enabled
1,502,739 UART: [rt] RT listening for mailbox commands...
1,503,409 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,577 UART: [rt]cmd =0x4c444556, len=4
1,543,810 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,811 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,952 UART: [rt]cmd =0x43455246, len=4
1,585,125 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = Yes
86,325 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,433 UART: [kat] SHA2-256
892,371 UART: [kat] SHA2-384
895,322 UART: [kat] SHA2-512-ACC
897,223 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,548 UART: [fht] Storing FHT @ 0x50003400
1,479,323 UART: [idev] ++
1,479,491 UART: [idev] CDI.KEYID = 6
1,479,851 UART: [idev] SUBJECT.KEYID = 7
1,480,275 UART: [idev] UDS.KEYID = 0
1,488,100 UART: [idev] Erasing UDS.KEYID = 0
1,504,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,243 UART: [idev] CSR upload requested
1,515,089 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,360 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,072 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,536,974 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,542,678 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,213 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = Yes
86,914 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,718 UART: [kat] SHA2-256
882,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,764 UART: [kat] ++
886,916 UART: [kat] sha1
891,208 UART: [kat] SHA2-256
893,146 UART: [kat] SHA2-384
895,811 UART: [kat] SHA2-512-ACC
897,712 UART: [kat] ECC-384
903,515 UART: [kat] HMAC-384Kdf
908,333 UART: [kat] LMS
1,476,529 UART: [kat] --
1,477,646 UART: [cold-reset] ++
1,478,125 UART: [fht] Storing FHT @ 0x50003400
1,480,920 UART: [idev] ++
1,481,088 UART: [idev] CDI.KEYID = 6
1,481,448 UART: [idev] SUBJECT.KEYID = 7
1,481,872 UART: [idev] UDS.KEYID = 0
1,489,761 UART: [idev] Erasing UDS.KEYID = 0
1,507,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,664 UART: [idev] CSR upload requested
1,517,510 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,528,747 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,534,459 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,540,361 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,546,065 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,554,600 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = Yes
86,463 UART: [state] Starting the WD Timer 40000000 cycles
87,958 UART: [kat] SHA2-256
893,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,733 UART: [kat] ++
897,885 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,898 UART: [kat] SHA2-512-ACC
908,799 UART: [kat] ECC-384
918,440 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,291 UART: [idev] ++
1,175,459 UART: [idev] CDI.KEYID = 6
1,175,819 UART: [idev] SUBJECT.KEYID = 7
1,176,243 UART: [idev] UDS.KEYID = 0
1,184,424 UART: [idev] Erasing UDS.KEYID = 0
1,201,530 UART: [idev] Sha1 KeyId Algorithm
1,209,889 UART: [idev] CSR upload begun
1,211,670 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,354 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,066 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,968 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,672 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,207 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,792 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = Yes
87,068 UART: [state] Starting the WD Timer 40000000 cycles
88,737 UART: [kat] SHA2-256
894,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,512 UART: [kat] ++
898,664 UART: [kat] sha1
902,926 UART: [kat] SHA2-256
904,866 UART: [kat] SHA2-384
907,579 UART: [kat] SHA2-512-ACC
909,480 UART: [kat] ECC-384
919,625 UART: [kat] HMAC-384Kdf
924,259 UART: [kat] LMS
1,172,587 UART: [kat] --
1,173,284 UART: [cold-reset] ++
1,173,833 UART: [fht] FHT @ 0x50003400
1,176,402 UART: [idev] ++
1,176,570 UART: [idev] CDI.KEYID = 6
1,176,930 UART: [idev] SUBJECT.KEYID = 7
1,177,354 UART: [idev] UDS.KEYID = 0
1,185,429 UART: [idev] Erasing UDS.KEYID = 0
1,202,621 UART: [idev] Sha1 KeyId Algorithm
1,210,750 UART: [idev] CSR upload begun
1,212,531 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,223,421 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,229,133 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,235,035 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,240,739 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,249,274 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = Yes
86,323 UART: [state] Starting the WD Timer 40000000 cycles
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,631 UART: [kat] ++
895,783 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,344 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,838 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] CSR upload begun
1,208,940 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,783 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,496 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,401 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,106 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,650 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = Yes
87,006 UART: [state] Starting the WD Timer 40000000 cycles
88,615 UART: [kat] SHA2-256
892,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,294 UART: [kat] ++
896,446 UART: [kat] sha1
900,696 UART: [kat] SHA2-256
902,636 UART: [kat] SHA2-384
905,437 UART: [kat] SHA2-512-ACC
907,338 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,519 UART: [kat] LMS
1,169,831 UART: [kat] --
1,170,900 UART: [cold-reset] ++
1,171,389 UART: [fht] FHT @ 0x50003400
1,173,975 UART: [idev] ++
1,174,143 UART: [idev] CDI.KEYID = 6
1,174,504 UART: [idev] SUBJECT.KEYID = 7
1,174,929 UART: [idev] UDS.KEYID = 0
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,731 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] CSR upload begun
1,209,809 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,594 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,226,307 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,232,212 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,917 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,461 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
Truncated 5408 bytes from beginning
556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,644 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,289 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:56:ec:56:2b:f0:c0:70:90:48:8b:91:3c:28:d4:10:a6:0c:27:8c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1156EC562BF0C07090488B913C28D410A60C278C47AED439BC0D01C88701F5FB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:23:4a:af:05:a8:e6:0a:fa:71:3d:fd:b5:56:1b:
f3:25:74:21:0e:3e:e0:88:73:3c:97:77:d3:09:02:
7b:15:a7:b4:23:08:6e:da:7e:7a:03:6d:78:0b:0d:
77:85:64:bf:b9:6f:1d:3a:34:b7:61:2a:d4:9d:92:
20:a9:d2:79:09:0e:a9:a3:96:27:ce:ac:c7:53:b1:
30:ce:eb:f6:f1:4f:ee:41:df:6d:0b:f4:33:c5:19:
76:4d:2c:2a:cd:2c:6d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
11:56:EC:56:2B:F0:C0:70:90:48:8B:91:3C:28:D4:10:A6:0C:27:8C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9c:9e:22:b3:04:61:a9:aa:ed:bc:55:55:d4:
b1:84:75:09:34:d0:76:69:44:b4:7f:77:65:ee:27:be:28:7b:
57:4b:88:2a:2a:d7:09:4b:02:1f:a8:41:31:00:3d:f2:3a:02:
31:00:e6:9e:1a:87:49:7c:60:21:9c:5d:90:10:90:5e:f2:49:
16:93:67:8e:3f:d9:e2:3d:c7:7a:ac:da:99:b4:74:db:56:ad:
d5:dc:aa:d1:ab:26:f2:a2:aa:17:a9:e6:c9:35
6,077,968 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,078,715 UART:
6,078,731 UART: Running Caliptra ROM ...
6,079,139 UART:
6,079,193 UART: [state] CFI Enabled
6,081,848 UART: [state] LifecycleState = Production
6,082,456 UART: [state] DebugLocked = Yes
6,083,140 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,084,767 UART: [kat] SHA2-256
6,878,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,882,813 UART: [kat] ++
6,882,965 UART: [kat] sha1
6,887,129 UART: [kat] SHA2-256
6,889,067 UART: [kat] SHA2-384
6,891,842 UART: [kat] SHA2-512-ACC
6,893,742 UART: [kat] ECC-384
6,899,133 UART: [kat] HMAC-384Kdf
6,903,681 UART: [kat] LMS
7,471,877 UART: [kat] --
7,472,872 UART: [update-reset] ++
11,044,201 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,045,283 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,192,123 >>> mbox cmd response: success
11,192,459 UART: [update-reset] Copying MAN_2 To MAN_1
11,200,471 UART: [update-reset Success] --
11,201,286 UART: [state] Locking Datavault
11,201,960 UART: [state] Locking PCR0, PCR1 and PCR31
11,202,564 UART: [state] Locking ICCM
11,203,054 UART: [exit] Launching FMC @ 0x40000130
11,208,383 UART:
11,208,399 UART: Running Caliptra FMC ...
11,208,807 UART:
11,208,861 UART: [state] CFI Enabled
11,298,152 UART: [art] Extend RT PCRs Done
11,298,580 UART: [art] Lock RT PCRs Done
11,299,793 UART: [art] Populate DV Done
11,308,137 UART: [fht] FMC Alias Private Key: 7
11,309,261 UART: [art] Derive CDI
11,309,541 UART: [art] Store in in slot 0x4
11,395,466 UART: [art] Derive Key Pair
11,395,826 UART: [art] Store priv key in slot 0x5
11,408,992 UART: [art] Derive Key Pair - Done
11,424,115 UART: [art] Signing Cert with AUTHO
11,424,595 UART: RITY.KEYID = 7
11,439,333 UART: [art] Erasing AUTHORITY.KEYID = 7
11,440,098 UART: [art] PUB.X = F3625F9302CE10AFE9D9058C0A639CE89588DB422D44E4AA6EF06A34B09A7C4139A186D9622393AC07802F99226876B4
11,446,854 UART: [art] PUB.Y = 234848C998C43B72E80F181978BEDAA343E12FC70C65519726D62959B82FB1147D889B3FD27E2243D1289DFD3ED9933D
11,453,796 UART: [art] SIG.R = 11439C33ADC8ED06E48EBF351C9B5E88B3AA86E98853BD19A97C2176C5E201BBF89F9C0FE2AD90FEB1352D60AE99CEC8
11,460,577 UART: [art] SIG.S = FB9ABB2E4B6DBEDB6682937C52B8FB9EAC3D7933055B3605C71234D7BFAFDA19B903F849BAA7A333B69936497DD8A4E3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:4f:06:f5:e5:3b:3e:9b:00:33:97:df:a8:95:0e:05:d8:91:06:84
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=214F06F5E53B3E9B003397DFA8950E05D891068429B7EE63A09ED23B3BFCA4B9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f3:62:5f:93:02:ce:10:af:e9:d9:05:8c:0a:63:
9c:e8:95:88:db:42:2d:44:e4:aa:6e:f0:6a:34:b0:
9a:7c:41:39:a1:86:d9:62:23:93:ac:07:80:2f:99:
22:68:76:b4:23:48:48:c9:98:c4:3b:72:e8:0f:18:
19:78:be:da:a3:43:e1:2f:c7:0c:65:51:97:26:d6:
29:59:b8:2f:b1:14:7d:88:9b:3f:d2:7e:22:43:d1:
28:9d:fd:3e:d9:93:3d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
21:4F:06:F5:E5:3B:3E:9B:00:33:97:DF:A8:95:0E:05:D8:91:06:84
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:11:43:9c:33:ad:c8:ed:06:e4:8e:bf:35:1c:9b:
5e:88:b3:aa:86:e9:88:53:bd:19:a9:7c:21:76:c5:e2:01:bb:
f8:9f:9c:0f:e2:ad:90:fe:b1:35:2d:60:ae:99:ce:c8:02:31:
00:fb:9a:bb:2e:4b:6d:be:db:66:82:93:7c:52:b8:fb:9e:ac:
3d:79:33:05:5b:36:05:c7:12:34:d7:bf:af:da:19:b9:03:f8:
49:ba:a7:a3:33:b6:99:36:49:7d:d8:a4:e3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.87s
Truncated 885 bytes from beginning
5,446,679 UART: [art] Populate DV Done
5,454,805 UART: [fht] FMC Alias Private Key: 7
5,455,783 UART: [art] Derive CDI
5,456,063 UART: [art] Store in in slot 0x4
5,541,532 UART: [art] Derive Key Pair
5,541,892 UART: [art] Store priv key in slot 0x5
5,555,362 UART: [art] Derive Key Pair - Done
5,570,040 UART: [art] Signing Cert with AUTHO
5,570,520 UART: RITY.KEYID = 7
5,586,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,975 UART: [art] PUB.X = 7C92C46E812D3641D90CD2D44360E0592CD388B1065777AF7154CC514E158A78A7006372FA9B20772DB0E367858F3F1A
5,593,711 UART: [art] PUB.Y = 3E4CD65B43DAA301678BE8A2A6938C2A13E1F294D29E42D009A9066C0DE75A1959CE94F4AFB51450D267A5CD78887FCD
5,600,659 UART: [art] SIG.R = DB9FB3D5E4ADD2A795CFA4C605558AC352DC074D1E6D2001D56CA8611D63FD362A434430EBAC0E5367E5FF22C887D8DA
5,607,435 UART: [art] SIG.S = C1E7E14B40135F53A8CDEA46909DDEB6995791F5DD7988E831BD5844FCD2049D66AC2CCF0BC1EBEF85E7DDF817C2B835
5,631,326 UART: Caliptra RT
5,631,579 UART: [state] CFI Enabled
5,739,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,770,162 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,810,113 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,851,846 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:17:3c:2f:12:44:f4:a0:27:df:10:cf:fc:15:75:5b:72:1d:fd:63
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AC173C2F1244F4A027DF10CFFC15755B721DFD631185C50CB1779243B30A0E47
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7c:92:c4:6e:81:2d:36:41:d9:0c:d2:d4:43:60:
e0:59:2c:d3:88:b1:06:57:77:af:71:54:cc:51:4e:
15:8a:78:a7:00:63:72:fa:9b:20:77:2d:b0:e3:67:
85:8f:3f:1a:3e:4c:d6:5b:43:da:a3:01:67:8b:e8:
a2:a6:93:8c:2a:13:e1:f2:94:d2:9e:42:d0:09:a9:
06:6c:0d:e7:5a:19:59:ce:94:f4:af:b5:14:50:d2:
67:a5:cd:78:88:7f:cd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
AC:17:3C:2F:12:44:F4:A0:27:DF:10:CF:FC:15:75:5B:72:1D:FD:63
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:db:9f:b3:d5:e4:ad:d2:a7:95:cf:a4:c6:05:
55:8a:c3:52:dc:07:4d:1e:6d:20:01:d5:6c:a8:61:1d:63:fd:
36:2a:43:44:30:eb:ac:0e:53:67:e5:ff:22:c8:87:d8:da:02:
31:00:c1:e7:e1:4b:40:13:5f:53:a8:cd:ea:46:90:9d:de:b6:
99:57:91:f5:dd:79:88:e8:31:bd:58:44:fc:d2:04:9d:66:ac:
2c:cf:0b:c1:eb:ef:85:e7:dd:f8:17:c2:b8:35
5,862,747 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,009,346 >>> mbox cmd response: success
11,022,858 UART:
11,022,874 UART: Running Caliptra FMC ...
11,023,282 UART:
11,023,336 UART: [state] CFI Enabled
11,112,053 UART: [art] Extend RT PCRs Done
11,112,481 UART: [art] Lock RT PCRs Done
11,113,802 UART: [art] Populate DV Done
11,122,086 UART: [fht] FMC Alias Private Key: 7
11,123,124 UART: [art] Derive CDI
11,123,404 UART: [art] Store in in slot 0x4
11,209,091 UART: [art] Derive Key Pair
11,209,451 UART: [art] Store priv key in slot 0x5
11,222,361 UART: [art] Derive Key Pair - Done
11,237,070 UART: [art] Signing Cert with AUTHO
11,237,550 UART: RITY.KEYID = 7
11,252,928 UART: [art] Erasing AUTHORITY.KEYID = 7
11,253,693 UART: [art] PUB.X = E4F0DC2CF2A8C1EAD52AB0E70EC5CD1272BCB7165A1DE604DFFC6CA09C0880B75A04BB866D882FBE62BFA581484C08C6
11,260,474 UART: [art] PUB.Y = 1623149E505A8AAD73AC0CCEBA56AD348BC531835663A158251DA70BBE3E32B88C3EE7F46AAF7F5CC9E00F3D440850A4
11,267,426 UART: [art] SIG.R = 004F2F07ED48636D01122D76D7729E770764BA6945BAB99A1AFCB7E8F7CE0B4452E61271DBD25D72BC3074589F747D71
11,274,164 UART: [art] SIG.S = FE1AEDCF4245B655E281F736C3004198D7F638F6EA6CEEAAC272CE295B9DC872E9E76FE711D08ADB13D9E9866189BB99
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:94:5e:b3:4a:f4:0d:ad:d6:31:f1:cb:48:d7:d6:bc:b6:57:72:5d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7C945EB34AF40DADD631F1CB48D7D6BCB657725D7826D7E2E61B840E8CB093EB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e4:f0:dc:2c:f2:a8:c1:ea:d5:2a:b0:e7:0e:c5:
cd:12:72:bc:b7:16:5a:1d:e6:04:df:fc:6c:a0:9c:
08:80:b7:5a:04:bb:86:6d:88:2f:be:62:bf:a5:81:
48:4c:08:c6:16:23:14:9e:50:5a:8a:ad:73:ac:0c:
ce:ba:56:ad:34:8b:c5:31:83:56:63:a1:58:25:1d:
a7:0b:be:3e:32:b8:8c:3e:e7:f4:6a:af:7f:5c:c9:
e0:0f:3d:44:08:50:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
7C:94:5E:B3:4A:F4:0D:AD:D6:31:F1:CB:48:D7:D6:BC:B6:57:72:5D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:2f:4f:2f:07:ed:48:63:6d:01:12:2d:76:d7:72:9e:
77:07:64:ba:69:45:ba:b9:9a:1a:fc:b7:e8:f7:ce:0b:44:52:
e6:12:71:db:d2:5d:72:bc:30:74:58:9f:74:7d:71:02:31:00:
fe:1a:ed:cf:42:45:b6:55:e2:81:f7:36:c3:00:41:98:d7:f6:
38:f6:ea:6c:ee:aa:c2:72:ce:29:5b:9d:c8:72:e9:e7:6f:e7:
11:d0:8a:db:13:d9:e9:86:61:89:bb:99
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.88s
Truncated 5408 bytes from beginning
556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,954,235 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,882 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:d2:4d:ac:79:2a:a7:12:e6:5f:7c:f4:dc:b1:16:7c:6c:9b:e2:3f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9CD24DAC792AA712E65F7CF4DCB1167C6C9BE23F5224D062AFE06BE9C777FB19
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:48:7e:07:4c:60:c3:b3:db:17:8f:67:5e:17:18:
35:99:25:22:0b:4a:f0:b1:76:a5:bf:43:d3:d4:33:
b9:80:73:5c:ec:d3:b0:47:a0:0b:5f:c2:22:d8:31:
75:93:f6:66:06:18:c5:04:cc:e4:99:ed:54:7a:de:
15:17:b1:5e:30:b2:3b:b2:ef:ae:d2:2f:8d:f6:06:
71:b1:0e:e8:55:a5:04:40:a1:cf:58:b4:e9:0e:30:
cf:9e:c2:f1:3c:7c:bb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
9C:D2:4D:AC:79:2A:A7:12:E6:5F:7C:F4:DC:B1:16:7C:6C:9B:E2:3F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d8:8d:74:0a:82:00:09:b6:f6:21:81:d5:d8:
a9:f2:b0:90:7a:d1:ae:77:b3:24:91:09:17:ef:42:73:85:6c:
48:9f:d2:ce:1c:fe:cc:0c:db:43:0a:07:dc:e3:2b:c7:73:02:
31:00:ff:8d:af:3d:6c:25:da:42:63:c7:fe:ce:b1:3d:35:8a:
d5:72:73:5a:33:5b:11:b0:f8:c9:15:ce:a6:13:5f:44:2b:83:
bf:f5:44:1f:3c:07:18:f9:91:ac:2a:e2:47:54
6,006,515 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,528 UART:
6,007,544 UART: Running Caliptra ROM ...
6,007,952 UART:
6,008,093 UART: [state] CFI Enabled
6,010,936 UART: [state] LifecycleState = Production
6,011,544 UART: [state] DebugLocked = Yes
6,012,270 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,013,843 UART: [kat] SHA2-256
6,807,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,811,889 UART: [kat] ++
6,812,041 UART: [kat] sha1
6,816,045 UART: [kat] SHA2-256
6,817,983 UART: [kat] SHA2-384
6,820,772 UART: [kat] SHA2-512-ACC
6,822,672 UART: [kat] ECC-384
6,828,085 UART: [kat] HMAC-384Kdf
6,832,763 UART: [kat] LMS
7,400,959 UART: [kat] --
7,401,864 UART: [update-reset] ++
11,012,252 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,013,418 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,160,258 >>> mbox cmd response: success
11,160,398 UART: [update-reset] Copying MAN_2 To MAN_1
11,168,410 UART: [update-reset Success] --
11,169,315 UART: [state] Locking Datavault
11,170,101 UART: [state] Locking PCR0, PCR1 and PCR31
11,170,705 UART: [state] Locking ICCM
11,171,207 UART: [exit] Launching FMC @ 0x40000130
11,176,536 UART:
11,176,552 UART: Running Caliptra FMC ...
11,176,960 UART:
11,177,103 UART: [state] CFI Enabled
11,265,954 UART: [art] Extend RT PCRs Done
11,266,382 UART: [art] Lock RT PCRs Done
11,267,665 UART: [art] Populate DV Done
11,275,611 UART: [fht] FMC Alias Private Key: 7
11,276,665 UART: [art] Derive CDI
11,276,945 UART: [art] Store in in slot 0x4
11,362,322 UART: [art] Derive Key Pair
11,362,682 UART: [art] Store priv key in slot 0x5
11,375,384 UART: [art] Derive Key Pair - Done
11,390,505 UART: [art] Signing Cert with AUTHO
11,390,985 UART: RITY.KEYID = 7
11,406,129 UART: [art] Erasing AUTHORITY.KEYID = 7
11,406,894 UART: [art] PUB.X = 4C140F6EEEB98A081AE556799E4393EFB01A4F82517A9416A20BA6088B754C4605083DAA80C61459E2DB11929442BD5B
11,413,646 UART: [art] PUB.Y = C70BBF514880DF9EF4336BDC85845F7370E28F3F64788E08CCD5B9B2A882F9649CDEBC011AFB2A1C6A9DEE5758D0C77B
11,420,605 UART: [art] SIG.R = E55365E8657554A249F2E8C8E5C1E26479C424297BA76D1BF02ABEC9ED5EE9B6806671F6448FB2892FF414D1331729B9
11,427,375 UART: [art] SIG.S = 4DD0211BE8F62475B8C21D6A1E85F9679F2E07684F620D59DA1331F7E38B8CC9D98F5AF909D408D9C955BEA861D576E2
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:cb:20:99:89:10:ab:51:35:5a:2e:4f:b9:f1:f2:a2:af:45:23:0e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=79CB20998910AB51355A2E4FB9F1F2A2AF45230E5ABF6792D1F9B15886BD9F94
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4c:14:0f:6e:ee:b9:8a:08:1a:e5:56:79:9e:43:
93:ef:b0:1a:4f:82:51:7a:94:16:a2:0b:a6:08:8b:
75:4c:46:05:08:3d:aa:80:c6:14:59:e2:db:11:92:
94:42:bd:5b:c7:0b:bf:51:48:80:df:9e:f4:33:6b:
dc:85:84:5f:73:70:e2:8f:3f:64:78:8e:08:cc:d5:
b9:b2:a8:82:f9:64:9c:de:bc:01:1a:fb:2a:1c:6a:
9d:ee:57:58:d0:c7:7b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
79:CB:20:99:89:10:AB:51:35:5A:2E:4F:B9:F1:F2:A2:AF:45:23:0E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e5:53:65:e8:65:75:54:a2:49:f2:e8:c8:e5:
c1:e2:64:79:c4:24:29:7b:a7:6d:1b:f0:2a:be:c9:ed:5e:e9:
b6:80:66:71:f6:44:8f:b2:89:2f:f4:14:d1:33:17:29:b9:02:
30:4d:d0:21:1b:e8:f6:24:75:b8:c2:1d:6a:1e:85:f9:67:9f:
2e:07:68:4f:62:0d:59:da:13:31:f7:e3:8b:8c:c9:d9:8f:5a:
f9:09:d4:08:d9:c9:55:be:a8:61:d5:76:e2
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.90s
Truncated 882 bytes from beginning
5,449,189 UART: [art] Populate DV Done
5,457,209 UART: [fht] FMC Alias Private Key: 7
5,458,275 UART: [art] Derive CDI
5,458,555 UART: [art] Store in in slot 0x4
5,544,606 UART: [art] Derive Key Pair
5,544,966 UART: [art] Store priv key in slot 0x5
5,558,108 UART: [art] Derive Key Pair - Done
5,573,349 UART: [art] Signing Cert with AUTHO
5,573,829 UART: RITY.KEYID = 7
5,589,287 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,052 UART: [art] PUB.X = 59246F509F7C2A7E8D30B76755F1092E42A74FC0919A10A16F405E59DA60C85B88D2429CBB49976E75FB6C80E2DA8F72
5,596,821 UART: [art] PUB.Y = A1E94A087B75F77B1EE9C651B7424B223DE56B61F9D8FF21FDE18A7B9F37E2FE2697665C751D47DACCE860BFBE9992B7
5,603,784 UART: [art] SIG.R = 114DB2EA67C156A431EF388C67A51086510CC492912777144345F2452DF6FD5F7C2824158A91B8CAEEB56DF1221E7CCB
5,610,553 UART: [art] SIG.S = 3FAF9854A631086D3DAC35FFD438E67AD09F7B256B5A3F8832A9055E68926A97C2974F427589C7018AFAC962A3D17281
5,634,383 UART: Caliptra RT
5,634,728 UART: [state] CFI Enabled
5,743,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,773,645 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,813,770 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,855,191 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:4c:63:d4:c7:b2:31:94:96:de:a0:9a:ca:7c:31:9f:a5:66:cd:8f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BB4C63D4C7B2319496DEA09ACA7C319FA566CD8F9D2B8FEFB70C0B4EE9D902CE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:59:24:6f:50:9f:7c:2a:7e:8d:30:b7:67:55:f1:
09:2e:42:a7:4f:c0:91:9a:10:a1:6f:40:5e:59:da:
60:c8:5b:88:d2:42:9c:bb:49:97:6e:75:fb:6c:80:
e2:da:8f:72:a1:e9:4a:08:7b:75:f7:7b:1e:e9:c6:
51:b7:42:4b:22:3d:e5:6b:61:f9:d8:ff:21:fd:e1:
8a:7b:9f:37:e2:fe:26:97:66:5c:75:1d:47:da:cc:
e8:60:bf:be:99:92:b7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
BB:4C:63:D4:C7:B2:31:94:96:DE:A0:9A:CA:7C:31:9F:A5:66:CD:8F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:11:4d:b2:ea:67:c1:56:a4:31:ef:38:8c:67:a5:
10:86:51:0c:c4:92:91:27:77:14:43:45:f2:45:2d:f6:fd:5f:
7c:28:24:15:8a:91:b8:ca:ee:b5:6d:f1:22:1e:7c:cb:02:30:
3f:af:98:54:a6:31:08:6d:3d:ac:35:ff:d4:38:e6:7a:d0:9f:
7b:25:6b:5a:3f:88:32:a9:05:5e:68:92:6a:97:c2:97:4f:42:
75:89:c7:01:8a:fa:c9:62:a3:d1:72:81
5,865,967 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,127,274 >>> mbox cmd response: success
11,140,644 UART:
11,140,660 UART: Running Caliptra FMC ...
11,141,068 UART:
11,141,211 UART: [state] CFI Enabled
11,230,772 UART: [art] Extend RT PCRs Done
11,231,200 UART: [art] Lock RT PCRs Done
11,232,383 UART: [art] Populate DV Done
11,240,405 UART: [fht] FMC Alias Private Key: 7
11,241,349 UART: [art] Derive CDI
11,241,629 UART: [art] Store in in slot 0x4
11,327,342 UART: [art] Derive Key Pair
11,327,702 UART: [art] Store priv key in slot 0x5
11,340,926 UART: [art] Derive Key Pair - Done
11,355,803 UART: [art] Signing Cert with AUTHO
11,356,283 UART: RITY.KEYID = 7
11,371,935 UART: [art] Erasing AUTHORITY.KEYID = 7
11,372,700 UART: [art] PUB.X = A474821FA5679C2CFA0890B141402501796181D6335900E69A0E486B6469976200C3359D0C5B5483C9F26DC99F33E795
11,379,398 UART: [art] PUB.Y = 5832A7204D521C83965D35A1A20CECD6209A8447CE68DE8EF4407DA768A8320DE0A67BC86AED3410C5CF4A0DB43E199B
11,386,349 UART: [art] SIG.R = 80E8F6AB8D1E675BE8BCB840CC1E6AC1179BDDEAC30AB844C5B481B32AE405975FF0BC0A594B431AF3028519B81C82BA
11,393,127 UART: [art] SIG.S = 046306BEAEB261B4128AA9CD72EC0C1C94ABEB42910ADB5BA2AAA3DB6341E4B568ED395D7F715F34D2F4EFF3FD8AAD09
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:70:00:f4:49:6a:4e:a0:2d:54:38:8c:c0:78:06:86:24:92:9e:df
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D67000F4496A4EA02D54388CC078068624929EDFCE8EC63579948BE39427F39A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a4:74:82:1f:a5:67:9c:2c:fa:08:90:b1:41:40:
25:01:79:61:81:d6:33:59:00:e6:9a:0e:48:6b:64:
69:97:62:00:c3:35:9d:0c:5b:54:83:c9:f2:6d:c9:
9f:33:e7:95:58:32:a7:20:4d:52:1c:83:96:5d:35:
a1:a2:0c:ec:d6:20:9a:84:47:ce:68:de:8e:f4:40:
7d:a7:68:a8:32:0d:e0:a6:7b:c8:6a:ed:34:10:c5:
cf:4a:0d:b4:3e:19:9b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
D6:70:00:F4:49:6A:4E:A0:2D:54:38:8C:C0:78:06:86:24:92:9E:DF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:80:e8:f6:ab:8d:1e:67:5b:e8:bc:b8:40:cc:
1e:6a:c1:17:9b:dd:ea:c3:0a:b8:44:c5:b4:81:b3:2a:e4:05:
97:5f:f0:bc:0a:59:4b:43:1a:f3:02:85:19:b8:1c:82:ba:02:
30:04:63:06:be:ae:b2:61:b4:12:8a:a9:cd:72:ec:0c:1c:94:
ab:eb:42:91:0a:db:5b:a2:aa:a3:db:63:41:e4:b5:68:ed:39:
5d:7f:71:5f:34:d2:f4:ef:f3:fd:8a:ad:09
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.92s
Truncated 5302 bytes from beginning
ext_pc=40005400
3,888,133 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,748 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,129 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:23:e9:2e:19:3f:9a:6d:27:73:00:ad:b2:2e:cb:2d:9a:7c:29:b0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9523E92E193F9A6D277300ADB22ECB2D9A7C29B00DD8060CB37ED4EA2BE05A1D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:41:28:80:1e:be:b4:03:91:e4:af:71:ca:33:e4:
80:23:76:c9:c4:35:63:79:8a:77:57:45:0f:6b:6d:
21:fd:82:c9:ba:f1:57:6a:af:57:d2:32:fb:1c:5a:
1e:94:e7:d3:2f:57:08:2b:88:60:4f:94:c0:5a:19:
83:44:7d:9d:c6:16:1d:82:38:59:5d:a7:5d:c5:fc:
74:61:8b:24:76:2f:d8:fe:fe:0d:b2:64:45:ff:50:
82:54:34:44:d8:6f:af
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
95:23:E9:2E:19:3F:9A:6D:27:73:00:AD:B2:2E:CB:2D:9A:7C:29:B0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a6:f3:03:05:31:67:64:f7:2c:60:1b:2a:20:
9a:43:2f:31:dd:7f:df:d6:fa:38:0f:0a:ba:b6:f9:13:3b:fd:
cf:90:fe:c6:c6:a7:df:87:63:ef:93:ad:32:13:c2:ce:fe:02:
31:00:ad:43:35:b1:90:c6:b3:5a:3c:7c:28:98:1f:3d:d5:3f:
57:6a:2d:79:14:69:cc:5b:69:ee:77:5e:43:c1:97:53:6f:fe:
81:b0:9a:d6:22:f9:82:13:b3:a6:c9:03:24:51
3,979,958 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,980,686 UART:
3,980,702 UART: Running Caliptra ROM ...
3,981,110 UART:
3,981,165 UART: [state] CFI Enabled
3,983,280 UART: [state] LifecycleState = Production
3,983,888 UART: [state] DebugLocked = Yes
3,984,558 UART: [state] Starting the WD Timer 40000000 cycles
3,986,044 UART: [kat] SHA2-256
4,791,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,795,819 UART: [kat] ++
4,795,971 UART: [kat] sha1
4,800,393 UART: [kat] SHA2-256
4,802,333 UART: [kat] SHA2-384
4,805,148 UART: [kat] SHA2-512-ACC
4,807,048 UART: [kat] ECC-384
4,816,937 UART: [kat] HMAC-384Kdf
4,821,313 UART: [kat] LMS
5,069,641 UART: [kat] --
5,070,309 UART: [update-reset] ++
6,921,182 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,922,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,068,969 >>> mbox cmd response: success
7,069,219 UART: [update-reset] Copying MAN_2 To MAN_1
7,077,231 UART: [update-reset Success] --
7,078,488 UART: [state] Locking Datavault
7,079,246 UART: [state] Locking PCR0, PCR1 and PCR31
7,079,850 UART: [state] Locking ICCM
7,080,406 UART: [exit] Launching FMC @ 0x40000130
7,085,735 UART:
7,085,751 UART: Running Caliptra FMC ...
7,086,159 UART:
7,086,213 UART: [state] CFI Enabled
7,174,838 UART: [art] Extend RT PCRs Done
7,175,266 UART: [art] Lock RT PCRs Done
7,176,409 UART: [art] Populate DV Done
7,184,871 UART: [fht] FMC Alias Private Key: 7
7,185,887 UART: [art] Derive CDI
7,186,167 UART: [art] Store in in slot 0x4
7,271,510 UART: [art] Derive Key Pair
7,271,870 UART: [art] Store priv key in slot 0x5
7,285,510 UART: [art] Derive Key Pair - Done
7,300,678 UART: [art] Signing Cert with AUTHO
7,301,158 UART: RITY.KEYID = 7
7,316,496 UART: [art] Erasing AUTHORITY.KEYID = 7
7,317,261 UART: [art] PUB.X = 93E8998115AAF183E21D60572427920DC34397FB90BD2BECE60CBEAF8F9EC8A22019F45054A49ECD0B9CD5C36A37C041
7,324,032 UART: [art] PUB.Y = 6439C2B2583C9CC583AF52E0D96A2C2ABF3CF732A28EB5B6CE7B717729AC2B568EA58BA47C4445F449D8FFA680D55314
7,330,994 UART: [art] SIG.R = 29E87BA3C935689437217782ACBF64C07FB9E8BE74CC27507D48871FA91197349B802B453D6B7B4651B2639D4A572BC6
7,337,760 UART: [art] SIG.S = EB32EA61DC2231008DD3A21D79CA5131D351C9C3C8EC19B1DCAD1C0E2EE075B5FE4AB5567A7F2BCFCB62EDF00B26F824
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:c4:ed:d1:54:e5:b5:38:34:a5:93:7f:e5:79:ad:20:0c:df:0f:7d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DAC4EDD154E5B53834A5937FE579AD200CDF0F7DCE611A887F79C543E8581867
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:93:e8:99:81:15:aa:f1:83:e2:1d:60:57:24:27:
92:0d:c3:43:97:fb:90:bd:2b:ec:e6:0c:be:af:8f:
9e:c8:a2:20:19:f4:50:54:a4:9e:cd:0b:9c:d5:c3:
6a:37:c0:41:64:39:c2:b2:58:3c:9c:c5:83:af:52:
e0:d9:6a:2c:2a:bf:3c:f7:32:a2:8e:b5:b6:ce:7b:
71:77:29:ac:2b:56:8e:a5:8b:a4:7c:44:45:f4:49:
d8:ff:a6:80:d5:53:14
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
DA:C4:ED:D1:54:E5:B5:38:34:A5:93:7F:E5:79:AD:20:0C:DF:0F:7D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:e8:7b:a3:c9:35:68:94:37:21:77:82:ac:bf:
64:c0:7f:b9:e8:be:74:cc:27:50:7d:48:87:1f:a9:11:97:34:
9b:80:2b:45:3d:6b:7b:46:51:b2:63:9d:4a:57:2b:c6:02:31:
00:eb:32:ea:61:dc:22:31:00:8d:d3:a2:1d:79:ca:51:31:d3:
51:c9:c3:c8:ec:19:b1:dc:ad:1c:0e:2e:e0:75:b5:fe:4a:b5:
56:7a:7f:2b:cf:cb:62:ed:f0:0b:26:f8:24
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
Truncated 849 bytes from beginning
490 UART: [art] Lock RT PCRs Done
3,375,146 UART: [art] Populate DV Done
3,383,374 UART: [fht] FMC Alias Private Key: 7
3,384,380 UART: [art] Derive CDI
3,384,660 UART: [art] Store in in slot 0x4
3,470,187 UART: [art] Derive Key Pair
3,470,547 UART: [art] Store priv key in slot 0x5
3,483,513 UART: [art] Derive Key Pair - Done
3,498,298 UART: [art] Signing Cert with AUTHO
3,498,778 UART: RITY.KEYID = 7
3,514,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,993 UART: [art] PUB.X = D480DA8217179A5C9B009B036D8143A9C3F970B98304C586FB01E3888624391254749CF08D45EF6081EFDB12672AE308
3,521,721 UART: [art] PUB.Y = 111157A1A9C73DD816C3F14CF77AD982B461727B4DAE26DA352D4038B9D8BDB1FE10B273311BFEEA9444DCD3D993F9C8
3,528,685 UART: [art] SIG.R = 0AAFF554F991E7DD92A5E04F581F93090C010596569619D51B9B97E2B51F9E23708D2619524085720E94A3978C744C4B
3,535,427 UART: [art] SIG.S = F4CC3A427BF0D8A41594AA6D1E588B1E6CA1BDDC1E5C2CA9E918B8674C8C9C695EE967BE2294CFF971C5F28B74E3299A
3,559,748 UART: Caliptra RT
3,560,001 UART: [state] CFI Enabled
3,666,800 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,955 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,446 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,985 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:ed:6e:c2:2a:03:1d:95:12:5a:b4:ef:e9:af:23:26:86:c2:7c:d1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=79ED6EC22A031D95125AB4EFE9AF232686C27CD15BED9EFAF095DC9831733371
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:80:da:82:17:17:9a:5c:9b:00:9b:03:6d:81:
43:a9:c3:f9:70:b9:83:04:c5:86:fb:01:e3:88:86:
24:39:12:54:74:9c:f0:8d:45:ef:60:81:ef:db:12:
67:2a:e3:08:11:11:57:a1:a9:c7:3d:d8:16:c3:f1:
4c:f7:7a:d9:82:b4:61:72:7b:4d:ae:26:da:35:2d:
40:38:b9:d8:bd:b1:fe:10:b2:73:31:1b:fe:ea:94:
44:dc:d3:d9:93:f9:c8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
79:ED:6E:C2:2A:03:1D:95:12:5A:B4:EF:E9:AF:23:26:86:C2:7C:D1
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0a:af:f5:54:f9:91:e7:dd:92:a5:e0:4f:58:1f:
93:09:0c:01:05:96:56:96:19:d5:1b:9b:97:e2:b5:1f:9e:23:
70:8d:26:19:52:40:85:72:0e:94:a3:97:8c:74:4c:4b:02:31:
00:f4:cc:3a:42:7b:f0:d8:a4:15:94:aa:6d:1e:58:8b:1e:6c:
a1:bd:dc:1e:5c:2c:a9:e9:18:b8:67:4c:8c:9c:69:5e:e9:67:
be:22:94:cf:f9:71:c5:f2:8b:74:e3:29:9a
3,788,965 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,762,847 >>> mbox cmd response: success
6,776,194 UART:
6,776,210 UART: Running Caliptra FMC ...
6,776,618 UART:
6,776,672 UART: [state] CFI Enabled
6,865,787 UART: [art] Extend RT PCRs Done
6,866,215 UART: [art] Lock RT PCRs Done
6,867,598 UART: [art] Populate DV Done
6,876,124 UART: [fht] FMC Alias Private Key: 7
6,877,166 UART: [art] Derive CDI
6,877,446 UART: [art] Store in in slot 0x4
6,962,841 UART: [art] Derive Key Pair
6,963,201 UART: [art] Store priv key in slot 0x5
6,976,971 UART: [art] Derive Key Pair - Done
6,991,616 UART: [art] Signing Cert with AUTHO
6,992,096 UART: RITY.KEYID = 7
7,007,340 UART: [art] Erasing AUTHORITY.KEYID = 7
7,008,105 UART: [art] PUB.X = 96B8AD5E517225D0738C9B21C30142B35B3E9CD77ADB77C25D05EA0423D7961A62FE7295DDB81298DFA0E6D52196E9B6
7,014,872 UART: [art] PUB.Y = 57DF3F3F1A49D0A74A49C0BEEF477BC09E2B232D58E18C1434C2BEDA1FD16D1DB71B4FACB19119E0124A900F08F40597
7,021,829 UART: [art] SIG.R = C145CA2D969D38626523F1B8A661456C6016949825C59D20C45034E1143D02C94E02D7F94388A79B9F93CC4A9BC014E3
7,028,585 UART: [art] SIG.S = 651A818F6009A4864CFA06C12C4F99DF7BE2DA9692A7F7E251466BD40882D2224A0FEDD03EA8465EF2908D2F9FC09979
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:48:35:bb:b7:2d:a5:87:88:e0:2a:fa:cd:e2:b2:33:ec:93:81:e6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=594835BBB72DA58788E02AFACDE2B233EC9381E68D708900EE55D172093553D1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:96:b8:ad:5e:51:72:25:d0:73:8c:9b:21:c3:01:
42:b3:5b:3e:9c:d7:7a:db:77:c2:5d:05:ea:04:23:
d7:96:1a:62:fe:72:95:dd:b8:12:98:df:a0:e6:d5:
21:96:e9:b6:57:df:3f:3f:1a:49:d0:a7:4a:49:c0:
be:ef:47:7b:c0:9e:2b:23:2d:58:e1:8c:14:34:c2:
be:da:1f:d1:6d:1d:b7:1b:4f:ac:b1:91:19:e0:12:
4a:90:0f:08:f4:05:97
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
59:48:35:BB:B7:2D:A5:87:88:E0:2A:FA:CD:E2:B2:33:EC:93:81:E6
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:c1:45:ca:2d:96:9d:38:62:65:23:f1:b8:a6:
61:45:6c:60:16:94:98:25:c5:9d:20:c4:50:34:e1:14:3d:02:
c9:4e:02:d7:f9:43:88:a7:9b:9f:93:cc:4a:9b:c0:14:e3:02:
30:65:1a:81:8f:60:09:a4:86:4c:fa:06:c1:2c:4f:99:df:7b:
e2:da:96:92:a7:f7:e2:51:46:6b:d4:08:82:d2:22:4a:0f:ed:
d0:3e:a8:46:5e:f2:90:8d:2f:9f:c0:99:79
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.10s
Truncated 5299 bytes from beginning
, next_pc=40005400
3,885,669 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,925,312 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,833 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:95:85:fe:fc:68:c3:6d:ff:c5:ee:75:bb:7f:4b:40:1e:4a:32:62
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=479585FEFC68C36DFFC5EE75BB7F4B401E4A32622E63042A3341EF86731DDFB5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:3a:bf:91:c9:37:b0:b4:2a:5c:36:a8:03:56:
f8:40:6b:ef:bb:7b:f4:74:0b:fc:d7:10:f5:ea:cc:
3f:d0:48:a2:66:60:4c:fa:a3:9e:ed:a7:c5:f9:a1:
da:ed:7d:16:cb:5e:56:2c:b0:64:b9:40:cd:38:f9:
18:de:51:c1:22:5f:02:5c:03:db:48:d4:7f:fb:b2:
10:80:d4:e0:fc:93:f9:d4:47:48:82:c8:c2:46:55:
4e:85:79:cd:bc:e0:36
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
47:95:85:FE:FC:68:C3:6D:FF:C5:EE:75:BB:7F:4B:40:1E:4A:32:62
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:05:b2:f2:f3:9d:b9:f6:da:ec:81:75:fd:ff:73:
97:b4:48:a0:0f:d4:28:62:c1:34:66:71:1b:0c:b2:d8:02:5f:
90:db:62:b6:d8:7f:e4:92:40:8b:e0:bd:7d:3a:c6:03:02:30:
41:00:8d:32:ac:0b:83:3a:7e:29:16:50:1a:5e:ef:2f:86:c6:
2e:02:82:cc:13:90:7a:37:c8:40:70:9a:e3:2e:00:9b:c4:6e:
00:12:84:c1:66:e8:f6:4e:e7:a9:c0:97
3,977,617 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,467 UART:
3,978,483 UART: Running Caliptra ROM ...
3,978,891 UART:
3,979,033 UART: [state] CFI Enabled
3,981,606 UART: [state] LifecycleState = Production
3,982,214 UART: [state] DebugLocked = Yes
3,982,834 UART: [state] Starting the WD Timer 40000000 cycles
3,984,438 UART: [kat] SHA2-256
4,790,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,794,213 UART: [kat] ++
4,794,365 UART: [kat] sha1
4,798,513 UART: [kat] SHA2-256
4,800,453 UART: [kat] SHA2-384
4,803,172 UART: [kat] SHA2-512-ACC
4,805,072 UART: [kat] ECC-384
4,814,689 UART: [kat] HMAC-384Kdf
4,819,309 UART: [kat] LMS
5,067,637 UART: [kat] --
5,068,711 UART: [update-reset] ++
6,929,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,930,599 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,077,387 >>> mbox cmd response: success
7,077,707 UART: [update-reset] Copying MAN_2 To MAN_1
7,085,719 UART: [update-reset Success] --
7,086,918 UART: [state] Locking Datavault
7,087,738 UART: [state] Locking PCR0, PCR1 and PCR31
7,088,342 UART: [state] Locking ICCM
7,088,960 UART: [exit] Launching FMC @ 0x40000130
7,094,289 UART:
7,094,305 UART: Running Caliptra FMC ...
7,094,713 UART:
7,094,856 UART: [state] CFI Enabled
7,183,993 UART: [art] Extend RT PCRs Done
7,184,421 UART: [art] Lock RT PCRs Done
7,185,776 UART: [art] Populate DV Done
7,194,056 UART: [fht] FMC Alias Private Key: 7
7,195,018 UART: [art] Derive CDI
7,195,298 UART: [art] Store in in slot 0x4
7,281,283 UART: [art] Derive Key Pair
7,281,643 UART: [art] Store priv key in slot 0x5
7,295,035 UART: [art] Derive Key Pair - Done
7,310,027 UART: [art] Signing Cert with AUTHO
7,310,507 UART: RITY.KEYID = 7
7,325,583 UART: [art] Erasing AUTHORITY.KEYID = 7
7,326,348 UART: [art] PUB.X = 257CAAF0DD4F6273F676D0BF49267F5252348D875109626BE8D5A126931651633848C3849E10AF53492393297E7F08DC
7,333,100 UART: [art] PUB.Y = 3AD3E887D0CEEBC591C1B486689B94737EEC3B3EF343494A630D45EDD785F733A0EFAF1EB27CE587D3CB7F05B0C8F9F8
7,340,064 UART: [art] SIG.R = D1D26CCE38A0965E11CD5FC47A279CE9948467F0117FE76430C5CE0F8A23843D3400A208AE34A28DDBB5DF5C640742DB
7,346,813 UART: [art] SIG.S = DD9A2545891CF395EEA92E7C7D08B3339788E413741FA3EC28045F0B59E6AA65CB2782AF1E5B28D23ED9D6B59942454E
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:e1:12:76:9a:77:1f:d2:90:4e:43:f0:7a:50:10:63:57:90:d6:40
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9EE112769A771FD2904E43F07A5010635790D640760DA3001946016AA982448A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:25:7c:aa:f0:dd:4f:62:73:f6:76:d0:bf:49:26:
7f:52:52:34:8d:87:51:09:62:6b:e8:d5:a1:26:93:
16:51:63:38:48:c3:84:9e:10:af:53:49:23:93:29:
7e:7f:08:dc:3a:d3:e8:87:d0:ce:eb:c5:91:c1:b4:
86:68:9b:94:73:7e:ec:3b:3e:f3:43:49:4a:63:0d:
45:ed:d7:85:f7:33:a0:ef:af:1e:b2:7c:e5:87:d3:
cb:7f:05:b0:c8:f9:f8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
9E:E1:12:76:9A:77:1F:D2:90:4E:43:F0:7A:50:10:63:57:90:D6:40
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d1:d2:6c:ce:38:a0:96:5e:11:cd:5f:c4:7a:
27:9c:e9:94:84:67:f0:11:7f:e7:64:30:c5:ce:0f:8a:23:84:
3d:34:00:a2:08:ae:34:a2:8d:db:b5:df:5c:64:07:42:db:02:
31:00:dd:9a:25:45:89:1c:f3:95:ee:a9:2e:7c:7d:08:b3:33:
97:88:e4:13:74:1f:a3:ec:28:04:5f:0b:59:e6:aa:65:cb:27:
82:af:1e:5b:28:d2:3e:d9:d6:b5:99:42:45:4e
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 846 bytes from beginning
76,167 UART: [art] Lock RT PCRs Done
3,377,471 UART: [art] Populate DV Done
3,385,691 UART: [fht] FMC Alias Private Key: 7
3,386,787 UART: [art] Derive CDI
3,387,067 UART: [art] Store in in slot 0x4
3,472,756 UART: [art] Derive Key Pair
3,473,116 UART: [art] Store priv key in slot 0x5
3,486,842 UART: [art] Derive Key Pair - Done
3,501,579 UART: [art] Signing Cert with AUTHO
3,502,059 UART: RITY.KEYID = 7
3,517,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,890 UART: [art] PUB.X = FDCADC3D01E7E2BA803B664204B5F186A2EA4FEADAA29DCD4F3F396BC07EEF951D0BC1F042A19D181C2FDFF7C4F23C04
3,524,680 UART: [art] PUB.Y = 6B686B0F9E3286C8C9BD82C42CEAC0E0392E872FA6C80E4EED65C95FEE347D070E0AC9367E020A522C69EB7EECD49ABB
3,531,631 UART: [art] SIG.R = 10DA5174CD8E03086B4842A571984807688398D8560C053BA3BB79CAA88EACCA8DC55F28F6D0F427F5C54A17994AEC29
3,538,390 UART: [art] SIG.S = E1DA4D18C06491D53AC95C53699F284B869EF35604C4AFDDA0E63EB02D021F191E3768C92648D7DC02CDE6EE31F91544
3,561,914 UART: Caliptra RT
3,562,259 UART: [state] CFI Enabled
3,670,488 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,035 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,718 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,782,255 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:11:5a:ed:f1:e1:be:cc:3c:a1:d6:b2:98:fc:e6:e2:d4:1b:a2:6d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2C115AEDF1E1BECC3CA1D6B298FCE6E2D41BA26D5E0732392B9334F9ADDE3735
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fd:ca:dc:3d:01:e7:e2:ba:80:3b:66:42:04:b5:
f1:86:a2:ea:4f:ea:da:a2:9d:cd:4f:3f:39:6b:c0:
7e:ef:95:1d:0b:c1:f0:42:a1:9d:18:1c:2f:df:f7:
c4:f2:3c:04:6b:68:6b:0f:9e:32:86:c8:c9:bd:82:
c4:2c:ea:c0:e0:39:2e:87:2f:a6:c8:0e:4e:ed:65:
c9:5f:ee:34:7d:07:0e:0a:c9:36:7e:02:0a:52:2c:
69:eb:7e:ec:d4:9a:bb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
2C:11:5A:ED:F1:E1:BE:CC:3C:A1:D6:B2:98:FC:E6:E2:D4:1B:A2:6D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:10:da:51:74:cd:8e:03:08:6b:48:42:a5:71:98:
48:07:68:83:98:d8:56:0c:05:3b:a3:bb:79:ca:a8:8e:ac:ca:
8d:c5:5f:28:f6:d0:f4:27:f5:c5:4a:17:99:4a:ec:29:02:31:
00:e1:da:4d:18:c0:64:91:d5:3a:c9:5c:53:69:9f:28:4b:86:
9e:f3:56:04:c4:af:dd:a0:e6:3e:b0:2d:02:1f:19:1e:37:68:
c9:26:48:d7:dc:02:cd:e6:ee:31:f9:15:44
3,793,121 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,774,473 >>> mbox cmd response: success
6,788,244 UART:
6,788,260 UART: Running Caliptra FMC ...
6,788,668 UART:
6,788,811 UART: [state] CFI Enabled
6,878,062 UART: [art] Extend RT PCRs Done
6,878,490 UART: [art] Lock RT PCRs Done
6,879,673 UART: [art] Populate DV Done
6,887,701 UART: [fht] FMC Alias Private Key: 7
6,888,689 UART: [art] Derive CDI
6,888,969 UART: [art] Store in in slot 0x4
6,974,352 UART: [art] Derive Key Pair
6,974,712 UART: [art] Store priv key in slot 0x5
6,988,134 UART: [art] Derive Key Pair - Done
7,003,125 UART: [art] Signing Cert with AUTHO
7,003,605 UART: RITY.KEYID = 7
7,019,055 UART: [art] Erasing AUTHORITY.KEYID = 7
7,019,820 UART: [art] PUB.X = 8F746A0D77757A491033A07F269E631A8B5F5D51BB9D143E9E9214BCD63602B7C75DD0CDF014A2713D9BBD6BA9FD5E96
7,026,594 UART: [art] PUB.Y = 62711611B13BE8EF1706CFE9707793C4F68CA9A71D486C7137A0FC334FDCCC30D77FE9C305CAE240459EEBB374566E65
7,033,546 UART: [art] SIG.R = 0B4CC16E0191FC5799803E4DC737F730E3F6470F81AAFC0A33F0371920D4CD3989F7DF49A8920781D8FB8A1BCDAB7DFF
7,040,315 UART: [art] SIG.S = 6C09E85F93FF2FCAB6D4FC741E4ED5DD9235D75C64E513F931DD6826EF9F71F7C15F430C79E22E9A52CF0F07A94D812B
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
24:7f:3f:26:8e:8e:80:76:d9:f4:08:49:e0:aa:57:81:9e:87:d9:38
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A07F3F268E8E8076D9F40849E0AA57819E87D938B0550E0CE073B1E393B8B34F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8f:74:6a:0d:77:75:7a:49:10:33:a0:7f:26:9e:
63:1a:8b:5f:5d:51:bb:9d:14:3e:9e:92:14:bc:d6:
36:02:b7:c7:5d:d0:cd:f0:14:a2:71:3d:9b:bd:6b:
a9:fd:5e:96:62:71:16:11:b1:3b:e8:ef:17:06:cf:
e9:70:77:93:c4:f6:8c:a9:a7:1d:48:6c:71:37:a0:
fc:33:4f:dc:cc:30:d7:7f:e9:c3:05:ca:e2:40:45:
9e:eb:b3:74:56:6e:65
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
A0:7F:3F:26:8E:8E:80:76:D9:F4:08:49:E0:AA:57:81:9E:87:D9:38
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:0b:4c:c1:6e:01:91:fc:57:99:80:3e:4d:c7:37:
f7:30:e3:f6:47:0f:81:aa:fc:0a:33:f0:37:19:20:d4:cd:39:
89:f7:df:49:a8:92:07:81:d8:fb:8a:1b:cd:ab:7d:ff:02:30:
6c:09:e8:5f:93:ff:2f:ca:b6:d4:fc:74:1e:4e:d5:dd:92:35:
d7:5c:64:e5:13:f9:31:dd:68:26:ef:9f:71:f7:c1:5f:43:0c:
79:e2:2e:9a:52:cf:0f:07:a9:4d:81:2b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 5302 bytes from beginning
ext_pc=40005400
3,877,375 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,832 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,958,169 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:cd:ff:77:b6:6d:de:f9:8a:8b:37:21:ff:e7:cf:86:c6:b8:32:49
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9BCDFF77B66DDEF98A8B3721FFE7CF86C6B83249CDADDD4A23F5B92C574464C9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5b:70:2c:56:7f:5f:47:08:3c:3f:21:58:d1:8c:
06:18:11:cc:4e:af:e0:cb:18:9f:6d:e9:2b:b9:56:
b6:56:80:71:68:67:b5:27:83:9c:bf:fc:68:1a:34:
c4:13:5c:ff:d7:79:c4:4a:f1:ce:8c:f8:58:25:a2:
87:27:2d:3b:d7:ee:bf:36:cd:af:09:9b:43:12:b0:
ae:46:b5:65:7a:13:35:1b:67:e9:ce:56:a9:05:5b:
9d:06:97:ef:7a:19:cc
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
9B:CD:FF:77:B6:6D:DE:F9:8A:8B:37:21:FF:E7:CF:86:C6:B8:32:49
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:fd:6c:85:d7:51:88:b7:5f:9e:a1:b0:21:43:
3d:b6:1b:e5:cc:a9:57:f7:26:b8:f4:5e:11:0c:f8:fa:ba:56:
da:36:1a:dd:8c:1a:26:57:4c:b5:37:39:12:34:d9:ec:ba:02:
31:00:a0:28:dd:4a:e1:bb:cb:f1:d2:62:41:15:0e:a5:f7:ed:
de:5e:eb:7d:b5:2a:aa:63:fe:7f:8f:df:64:08:9c:47:27:ed:
d6:19:35:4b:10:ea:93:32:09:cc:7c:3f:b5:a0
3,968,874 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,716 UART:
3,969,732 UART: Running Caliptra ROM ...
3,970,140 UART:
3,970,195 UART: [state] CFI Enabled
3,972,894 UART: [state] LifecycleState = Production
3,973,502 UART: [state] DebugLocked = Yes
3,974,138 UART: [state] Starting the WD Timer 40000000 cycles
3,975,644 UART: [kat] SHA2-256
4,779,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,783,323 UART: [kat] ++
4,783,475 UART: [kat] sha1
4,787,583 UART: [kat] SHA2-256
4,789,523 UART: [kat] SHA2-384
4,792,136 UART: [kat] SHA2-512-ACC
4,794,036 UART: [kat] ECC-384
4,804,219 UART: [kat] HMAC-384Kdf
4,808,823 UART: [kat] LMS
5,057,135 UART: [kat] --
5,057,949 UART: [update-reset] ++
6,908,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,909,732 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,056,520 >>> mbox cmd response: success
7,056,818 UART: [update-reset] Copying MAN_2 To MAN_1
7,064,830 UART: [update-reset Success] --
7,065,917 UART: [state] Locking Datavault
7,066,741 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,345 UART: [state] Locking ICCM
7,067,985 UART: [exit] Launching FMC @ 0x40000130
7,073,314 UART:
7,073,330 UART: Running Caliptra FMC ...
7,073,738 UART:
7,073,792 UART: [state] CFI Enabled
7,163,039 UART: [art] Extend RT PCRs Done
7,163,467 UART: [art] Lock RT PCRs Done
7,164,636 UART: [art] Populate DV Done
7,172,876 UART: [fht] FMC Alias Private Key: 7
7,173,934 UART: [art] Derive CDI
7,174,214 UART: [art] Store in in slot 0x4
7,259,843 UART: [art] Derive Key Pair
7,260,203 UART: [art] Store priv key in slot 0x5
7,273,061 UART: [art] Derive Key Pair - Done
7,287,864 UART: [art] Signing Cert with AUTHO
7,288,344 UART: RITY.KEYID = 7
7,303,388 UART: [art] Erasing AUTHORITY.KEYID = 7
7,304,153 UART: [art] PUB.X = B9CAC61F74824E20E7F98719DB0F0CCC2FA063A52C840F403DB91934882E7D3332B963DAFF08F10291184EACE982F631
7,310,914 UART: [art] PUB.Y = 4CF74FED3C6CBF417579D100B4F038FA896122DE1D4CB99A04B2B120E6FBE0550E6FF2D213485EBB993B5BBDB0411023
7,317,850 UART: [art] SIG.R = E409197306C0AE271EB12DB00C83DEB47A4230F16754D93CD81AB1037ED586AF45ABC04F8BDEE82AACD95C4890EC27CB
7,324,626 UART: [art] SIG.S = 78BA2A5822B22520E4B60F3A813D79E7D82C71C83D275B34554D19BC4B259BD29043D8580B6357018283812AACD0B247
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:d2:6f:aa:3a:7a:2b:da:5f:2b:cd:42:e7:b0:9f:fa:bb:2b:0d:00
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=85D26FAA3A7A2BDA5F2BCD42E7B09FFABB2B0D0020144A9BAE14D8060248F01A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b9:ca:c6:1f:74:82:4e:20:e7:f9:87:19:db:0f:
0c:cc:2f:a0:63:a5:2c:84:0f:40:3d:b9:19:34:88:
2e:7d:33:32:b9:63:da:ff:08:f1:02:91:18:4e:ac:
e9:82:f6:31:4c:f7:4f:ed:3c:6c:bf:41:75:79:d1:
00:b4:f0:38:fa:89:61:22:de:1d:4c:b9:9a:04:b2:
b1:20:e6:fb:e0:55:0e:6f:f2:d2:13:48:5e:bb:99:
3b:5b:bd:b0:41:10:23
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
85:D2:6F:AA:3A:7A:2B:DA:5F:2B:CD:42:E7:B0:9F:FA:BB:2B:0D:00
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e4:09:19:73:06:c0:ae:27:1e:b1:2d:b0:0c:
83:de:b4:7a:42:30:f1:67:54:d9:3c:d8:1a:b1:03:7e:d5:86:
af:45:ab:c0:4f:8b:de:e8:2a:ac:d9:5c:48:90:ec:27:cb:02:
30:78:ba:2a:58:22:b2:25:20:e4:b6:0f:3a:81:3d:79:e7:d8:
2c:71:c8:3d:27:5b:34:55:4d:19:bc:4b:25:9b:d2:90:43:d8:
58:0b:63:57:01:82:83:81:2a:ac:d0:b2:47
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 855 bytes from beginning
RT: [art] Lock RT PCRs Done
3,359,027 UART: [art] Populate DV Done
3,367,405 UART: [fht] FMC Alias Private Key: 7
3,368,529 UART: [art] Derive CDI
3,368,809 UART: [art] Store in in slot 0x4
3,454,550 UART: [art] Derive Key Pair
3,454,910 UART: [art] Store priv key in slot 0x5
3,468,138 UART: [art] Derive Key Pair - Done
3,482,466 UART: [art] Signing Cert with AUTHO
3,482,946 UART: RITY.KEYID = 7
3,498,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,787 UART: [art] PUB.X = 9864AF860AF51511100C70255DC73E68216194C26ED04FAF06B4C9A597DE6482F649E42E96F7695396EF5E6E168499D6
3,505,542 UART: [art] PUB.Y = 36EB55178B4528757086936899898AC3C92DEFBFAA1DBDB3DF7D221915821587242F546EA1EBEF7735A27600495BE1C3
3,512,470 UART: [art] SIG.R = 8D5C73C6FC900DD95A41F3F7ADD29BC78D93A685674B56145CC65B3A29D75EBEA36BFEC4904EF13DB5640EA7B27B9222
3,519,250 UART: [art] SIG.S = AA0AD77E817F95A825DA8174251B2D9EC38A5277DB29AFE0DFF2C07ACED5DAFF06AF4A9377DA7B73956CA1F3A798F861
3,542,899 UART: Caliptra RT
3,543,152 UART: [state] CFI Enabled
3,649,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,304 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,165 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,682 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:bb:11:e7:4d:a0:9a:26:ff:60:5e:28:38:bc:a9:92:e7:57:84:ea
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=59BB11E74DA09A26FF605E2838BCA992E75784EAD04866134DF59EBAF9543322
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:98:64:af:86:0a:f5:15:11:10:0c:70:25:5d:c7:
3e:68:21:61:94:c2:6e:d0:4f:af:06:b4:c9:a5:97:
de:64:82:f6:49:e4:2e:96:f7:69:53:96:ef:5e:6e:
16:84:99:d6:36:eb:55:17:8b:45:28:75:70:86:93:
68:99:89:8a:c3:c9:2d:ef:bf:aa:1d:bd:b3:df:7d:
22:19:15:82:15:87:24:2f:54:6e:a1:eb:ef:77:35:
a2:76:00:49:5b:e1:c3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
59:BB:11:E7:4D:A0:9A:26:FF:60:5E:28:38:BC:A9:92:E7:57:84:EA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:8d:5c:73:c6:fc:90:0d:d9:5a:41:f3:f7:ad:
d2:9b:c7:8d:93:a6:85:67:4b:56:14:5c:c6:5b:3a:29:d7:5e:
be:a3:6b:fe:c4:90:4e:f1:3d:b5:64:0e:a7:b2:7b:92:22:02:
31:00:aa:0a:d7:7e:81:7f:95:a8:25:da:81:74:25:1b:2d:9e:
c3:8a:52:77:db:29:af:e0:df:f2:c0:7a:ce:d5:da:ff:06:af:
4a:93:77:da:7b:73:95:6c:a1:f3:a7:98:f8:61
3,772,597 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,749,268 >>> mbox cmd response: success
6,762,779 UART:
6,762,795 UART: Running Caliptra FMC ...
6,763,203 UART:
6,763,257 UART: [state] CFI Enabled
6,852,828 UART: [art] Extend RT PCRs Done
6,853,256 UART: [art] Lock RT PCRs Done
6,854,405 UART: [art] Populate DV Done
6,862,671 UART: [fht] FMC Alias Private Key: 7
6,863,833 UART: [art] Derive CDI
6,864,113 UART: [art] Store in in slot 0x4
6,949,532 UART: [art] Derive Key Pair
6,949,892 UART: [art] Store priv key in slot 0x5
6,963,020 UART: [art] Derive Key Pair - Done
6,977,867 UART: [art] Signing Cert with AUTHO
6,978,347 UART: RITY.KEYID = 7
6,993,701 UART: [art] Erasing AUTHORITY.KEYID = 7
6,994,466 UART: [art] PUB.X = 19849A873049A5A7053B6D2D542815C9B97252521225629FDA4104AC2C322C96BFFBDD9B4DA07AB59CB297612A67A0EC
7,001,232 UART: [art] PUB.Y = 36E79824DE7B9462F2DE6F7BD93CDD8EDCB422655527503439A19E50172765D6367746BFA8711DF467F81CE6800BF29B
7,008,179 UART: [art] SIG.R = DE942647475114867AE50526E7E21CA3EC3D116DDEB2850396244DD46F0A58431EBCABD4AB0C7973F8BCED89D6D7EE56
7,014,949 UART: [art] SIG.S = EE00F8755C79B1A313FAB773DBEB9ED45098C5CAFF25FA0C713C2B78284DDD6994CB09E4ED2B39F7387D4FC2E8CCD253
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:91:58:7c:08:d6:1e:e2:77:9d:8a:f2:b8:97:55:ee:fc:c8:01:ea
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B091587C08D61EE2779D8AF2B89755EEFCC801EAAD0631EADD06CC1680D92BC4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:19:84:9a:87:30:49:a5:a7:05:3b:6d:2d:54:28:
15:c9:b9:72:52:52:12:25:62:9f:da:41:04:ac:2c:
32:2c:96:bf:fb:dd:9b:4d:a0:7a:b5:9c:b2:97:61:
2a:67:a0:ec:36:e7:98:24:de:7b:94:62:f2:de:6f:
7b:d9:3c:dd:8e:dc:b4:22:65:55:27:50:34:39:a1:
9e:50:17:27:65:d6:36:77:46:bf:a8:71:1d:f4:67:
f8:1c:e6:80:0b:f2:9b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
B0:91:58:7C:08:D6:1E:E2:77:9D:8A:F2:B8:97:55:EE:FC:C8:01:EA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:de:94:26:47:47:51:14:86:7a:e5:05:26:e7:
e2:1c:a3:ec:3d:11:6d:de:b2:85:03:96:24:4d:d4:6f:0a:58:
43:1e:bc:ab:d4:ab:0c:79:73:f8:bc:ed:89:d6:d7:ee:56:02:
31:00:ee:00:f8:75:5c:79:b1:a3:13:fa:b7:73:db:eb:9e:d4:
50:98:c5:ca:ff:25:fa:0c:71:3c:2b:78:28:4d:dd:69:94:cb:
09:e4:ed:2b:39:f7:38:7d:4f:c2:e8:cc:d2:53
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
Truncated 5296 bytes from beginning
l=0, next_pc=40005400
3,875,747 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,468 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,065 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:aa:d1:d8:89:a1:fe:42:bb:d0:20:37:50:d3:78:8c:5f:8c:0b:3b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=02AAD1D889A1FE42BBD0203750D3788C5F8C0B3B50852FF6AAEE25E3EB0099A9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fa:96:9a:73:4a:09:fb:18:90:a4:12:0f:43:19:
bc:72:b3:b2:55:90:40:81:31:9d:ea:c3:84:df:58:
06:6e:52:5a:0e:4a:ba:3e:ee:91:4f:ab:8b:03:39:
ef:66:8e:3e:16:ba:c8:0e:f3:69:b0:1f:9f:ab:7f:
98:35:5d:be:42:8c:b0:16:6e:ba:73:d4:20:b6:2f:
85:f2:10:70:04:25:c8:8d:b6:30:89:a4:44:d2:2b:
b5:5d:5e:ec:5f:e9:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
02:AA:D1:D8:89:A1:FE:42:BB:D0:20:37:50:D3:78:8C:5F:8C:0B:3B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:16:e0:15:b0:fd:c8:8e:0e:9b:91:b0:32:8c:ff:
8e:8f:53:1c:09:f2:b0:50:c1:d0:31:99:5b:fd:23:c0:b9:c8:
64:1b:54:3e:c3:dc:80:89:d7:da:22:c4:dc:09:f5:29:02:30:
0e:0d:a5:f4:a4:3d:8a:8e:eb:d2:93:cd:e5:51:86:5d:33:d2:
18:90:a5:0d:77:4d:c4:13:5e:dc:51:8a:a5:83:28:d1:c2:c4:
2a:53:6e:25:10:f0:44:bd:70:35:8d:1f
3,968,035 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,169 UART:
3,969,185 UART: Running Caliptra ROM ...
3,969,593 UART:
3,969,735 UART: [state] CFI Enabled
3,972,572 UART: [state] LifecycleState = Production
3,973,180 UART: [state] DebugLocked = Yes
3,973,690 UART: [state] Starting the WD Timer 40000000 cycles
3,975,286 UART: [kat] SHA2-256
4,778,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,782,965 UART: [kat] ++
4,783,117 UART: [kat] sha1
4,787,193 UART: [kat] SHA2-256
4,789,133 UART: [kat] SHA2-384
4,791,954 UART: [kat] SHA2-512-ACC
4,793,854 UART: [kat] ECC-384
4,803,605 UART: [kat] HMAC-384Kdf
4,808,209 UART: [kat] LMS
5,056,521 UART: [kat] --
5,057,473 UART: [update-reset] ++
6,910,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,911,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,057,987 >>> mbox cmd response: success
7,058,177 UART: [update-reset] Copying MAN_2 To MAN_1
7,066,189 UART: [update-reset Success] --
7,067,062 UART: [state] Locking Datavault
7,067,874 UART: [state] Locking PCR0, PCR1 and PCR31
7,068,478 UART: [state] Locking ICCM
7,068,954 UART: [exit] Launching FMC @ 0x40000130
7,074,283 UART:
7,074,299 UART: Running Caliptra FMC ...
7,074,707 UART:
7,074,850 UART: [state] CFI Enabled
7,164,755 UART: [art] Extend RT PCRs Done
7,165,183 UART: [art] Lock RT PCRs Done
7,166,236 UART: [art] Populate DV Done
7,174,472 UART: [fht] FMC Alias Private Key: 7
7,175,542 UART: [art] Derive CDI
7,175,822 UART: [art] Store in in slot 0x4
7,261,337 UART: [art] Derive Key Pair
7,261,697 UART: [art] Store priv key in slot 0x5
7,275,569 UART: [art] Derive Key Pair - Done
7,290,806 UART: [art] Signing Cert with AUTHO
7,291,286 UART: RITY.KEYID = 7
7,306,770 UART: [art] Erasing AUTHORITY.KEYID = 7
7,307,535 UART: [art] PUB.X = FFA26003B1D47192A3AB0B688F80780E97D0D930CB6D9BD139817CDBE02CA33259A1C8CD7FD268ACE9C4F447BC58BFD3
7,314,314 UART: [art] PUB.Y = 1AFE8DE1B9986FA5A8C725648F61A7E96BD162CEB2CC725F80A8805C30418E990CE20239538D4D7007408DDBA0C2B2E7
7,321,263 UART: [art] SIG.R = 692119729687E85F5DA9E112A3C56C907537E95A7C35736C9405044C8855D1F6FE6D44578C7AEADF3FFB593A44A8E43D
7,328,027 UART: [art] SIG.S = 86FA0B2BF6139F0D4858F851A519CAD99FBDACE5913D6364CC7DAEC318C9CCC1BCDE6D37B981895B0DBE55256C707403
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:3a:cb:67:8a:38:3b:09:f6:2e:95:88:bd:d5:53:7d:a9:e2:8b:04
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=343ACB678A383B09F62E9588BDD5537DA9E28B04C73BE80DF01BAB08410192D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ff:a2:60:03:b1:d4:71:92:a3:ab:0b:68:8f:80:
78:0e:97:d0:d9:30:cb:6d:9b:d1:39:81:7c:db:e0:
2c:a3:32:59:a1:c8:cd:7f:d2:68:ac:e9:c4:f4:47:
bc:58:bf:d3:1a:fe:8d:e1:b9:98:6f:a5:a8:c7:25:
64:8f:61:a7:e9:6b:d1:62:ce:b2:cc:72:5f:80:a8:
80:5c:30:41:8e:99:0c:e2:02:39:53:8d:4d:70:07:
40:8d:db:a0:c2:b2:e7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
34:3A:CB:67:8A:38:3B:09:F6:2E:95:88:BD:D5:53:7D:A9:E2:8B:04
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:69:21:19:72:96:87:e8:5f:5d:a9:e1:12:a3:c5:
6c:90:75:37:e9:5a:7c:35:73:6c:94:05:04:4c:88:55:d1:f6:
fe:6d:44:57:8c:7a:ea:df:3f:fb:59:3a:44:a8:e4:3d:02:31:
00:86:fa:0b:2b:f6:13:9f:0d:48:58:f8:51:a5:19:ca:d9:9f:
bd:ac:e5:91:3d:63:64:cc:7d:ae:c3:18:c9:cc:c1:bc:de:6d:
37:b9:81:89:5b:0d:be:55:25:6c:70:74:03
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.37s
Truncated 846 bytes from beginning
80,836 UART: [art] Lock RT PCRs Done
3,382,210 UART: [art] Populate DV Done
3,390,442 UART: [fht] FMC Alias Private Key: 7
3,391,372 UART: [art] Derive CDI
3,391,652 UART: [art] Store in in slot 0x4
3,477,177 UART: [art] Derive Key Pair
3,477,537 UART: [art] Store priv key in slot 0x5
3,490,873 UART: [art] Derive Key Pair - Done
3,505,383 UART: [art] Signing Cert with AUTHO
3,505,863 UART: RITY.KEYID = 7
3,521,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,522,370 UART: [art] PUB.X = 2BE2A858B5A3894D8DABAEA6B2BD6CBF523C45BB2552CB8F42E5AEDA8AAEB8DF0E99174D9E50EDFB4BFB013DA835C803
3,529,165 UART: [art] PUB.Y = 180BDBED275A9A18C7CCE71795DCA2640D2C904589B0B0F42D0E8BA520AA22D6E8256FF529E009F9BFD2F87300BECBF5
3,536,099 UART: [art] SIG.R = 65561FCCD44736F31EFDBFDCB03414A4473852A040A0891F843E7E30EDA8AC39155DF659D87748E2A577F330E706E16B
3,542,870 UART: [art] SIG.S = 3370642D1B94AFF14B56614A6657074F905F76EF2CCA008F21CE0C91B01C04442B4C3C9FA4E955C5D44B6FBCCA09C212
3,566,923 UART: Caliptra RT
3,567,268 UART: [state] CFI Enabled
3,675,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,675 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,402 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,045 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6e:78:27:d5:e4:6d:08:9f:0f:b1:a4:7c:13:83:7f:b0:f5:b6:eb:98
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EE7827D5E46D089F0FB1A47C13837FB0F5B6EB98BBFE3344E4EA5AEA7A52C2AB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2b:e2:a8:58:b5:a3:89:4d:8d:ab:ae:a6:b2:bd:
6c:bf:52:3c:45:bb:25:52:cb:8f:42:e5:ae:da:8a:
ae:b8:df:0e:99:17:4d:9e:50:ed:fb:4b:fb:01:3d:
a8:35:c8:03:18:0b:db:ed:27:5a:9a:18:c7:cc:e7:
17:95:dc:a2:64:0d:2c:90:45:89:b0:b0:f4:2d:0e:
8b:a5:20:aa:22:d6:e8:25:6f:f5:29:e0:09:f9:bf:
d2:f8:73:00:be:cb:f5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
EE:78:27:D5:E4:6D:08:9F:0F:B1:A4:7C:13:83:7F:B0:F5:B6:EB:98
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:65:56:1f:cc:d4:47:36:f3:1e:fd:bf:dc:b0:34:
14:a4:47:38:52:a0:40:a0:89:1f:84:3e:7e:30:ed:a8:ac:39:
15:5d:f6:59:d8:77:48:e2:a5:77:f3:30:e7:06:e1:6b:02:30:
33:70:64:2d:1b:94:af:f1:4b:56:61:4a:66:57:07:4f:90:5f:
76:ef:2c:ca:00:8f:21:ce:0c:91:b0:1c:04:44:2b:4c:3c:9f:
a4:e9:55:c5:d4:4b:6f:bc:ca:09:c2:12
3,797,959 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,774,358 >>> mbox cmd response: success
6,787,251 UART:
6,787,267 UART: Running Caliptra FMC ...
6,787,675 UART:
6,787,818 UART: [state] CFI Enabled
6,877,071 UART: [art] Extend RT PCRs Done
6,877,499 UART: [art] Lock RT PCRs Done
6,878,998 UART: [art] Populate DV Done
6,887,070 UART: [fht] FMC Alias Private Key: 7
6,888,070 UART: [art] Derive CDI
6,888,350 UART: [art] Store in in slot 0x4
6,973,897 UART: [art] Derive Key Pair
6,974,257 UART: [art] Store priv key in slot 0x5
6,987,639 UART: [art] Derive Key Pair - Done
7,002,730 UART: [art] Signing Cert with AUTHO
7,003,210 UART: RITY.KEYID = 7
7,018,002 UART: [art] Erasing AUTHORITY.KEYID = 7
7,018,767 UART: [art] PUB.X = F5096B22F7F60FEA49BA255014899DAB9B3CBACBC79437B584396FEFB96DAFE58585DE446163CF87FA693DC9F12FD3A2
7,025,549 UART: [art] PUB.Y = 553A5473DB801FD76AA8D96E682A6DD61F618B68A160F2CB9EDAEE4E8390DA65F78EF60DD2F85EC7F530D68293D3AF3E
7,032,514 UART: [art] SIG.R = D46E8D4C79EB50AC3A1170403A6FF30CFD48F0E42EF4E7369F7669CACD550A0C0E12FF30EB90872B5DC881655BA2A0CE
7,039,290 UART: [art] SIG.S = 781EB03BDA2B9BE6106BD795AC8701D37B430482E3634C784CABCA8F719D7B363248A1EAF61CF56A3601B6CDDAE83043
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:4d:27:60:db:b7:66:3b:86:68:2a:34:6a:9d:ee:ce:12:9c:f7:91
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DA4D2760DBB7663B86682A346A9DEECE129CF791E7ED0A2EAFABF0F1BFCB3480
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f5:09:6b:22:f7:f6:0f:ea:49:ba:25:50:14:89:
9d:ab:9b:3c:ba:cb:c7:94:37:b5:84:39:6f:ef:b9:
6d:af:e5:85:85:de:44:61:63:cf:87:fa:69:3d:c9:
f1:2f:d3:a2:55:3a:54:73:db:80:1f:d7:6a:a8:d9:
6e:68:2a:6d:d6:1f:61:8b:68:a1:60:f2:cb:9e:da:
ee:4e:83:90:da:65:f7:8e:f6:0d:d2:f8:5e:c7:f5:
30:d6:82:93:d3:af:3e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
DA:4D:27:60:DB:B7:66:3B:86:68:2A:34:6A:9D:EE:CE:12:9C:F7:91
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d4:6e:8d:4c:79:eb:50:ac:3a:11:70:40:3a:
6f:f3:0c:fd:48:f0:e4:2e:f4:e7:36:9f:76:69:ca:cd:55:0a:
0c:0e:12:ff:30:eb:90:87:2b:5d:c8:81:65:5b:a2:a0:ce:02:
30:78:1e:b0:3b:da:2b:9b:e6:10:6b:d7:95:ac:87:01:d3:7b:
43:04:82:e3:63:4c:78:4c:ab:ca:8f:71:9d:7b:36:32:48:a1:
ea:f6:1c:f5:6a:36:01:b6:cd:da:e8:30:43
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114332 bytes
2,883,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,210 >>> mbox cmd response: success
3,077,430 UART: [afmc] ++
3,077,598 UART: [afmc] CDI.KEYID = 6
3,077,960 UART: [afmc] SUBJECT.KEYID = 7
3,078,385 UART: [afmc] AUTHORITY.KEYID = 5
3,112,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,512 UART: [afmc] --
3,156,520 UART: [cold-reset] --
3,157,214 UART: [state] Locking Datavault
3,158,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,771 UART: [state] Locking ICCM
3,159,327 UART: [exit] Launching FMC @ 0x40000130
3,164,656 UART:
3,164,672 UART: Running Caliptra FMC ...
3,165,080 UART:
3,165,134 UART: [state] CFI Enabled
3,175,499 UART: [fht] FMC Alias Private Key: 7
3,283,424 UART: [art] Extend RT PCRs Done
3,283,852 UART: [art] Lock RT PCRs Done
3,285,340 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3197843 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114332 bytes
2,883,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,169 >>> mbox cmd response: success
3,077,386 UART: [afmc] ++
3,077,554 UART: [afmc] CDI.KEYID = 6
3,077,916 UART: [afmc] SUBJECT.KEYID = 7
3,078,341 UART: [afmc] AUTHORITY.KEYID = 5
3,112,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,074 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,785 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,685 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,414 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,488 UART: [afmc] --
3,156,495 UART: [cold-reset] --
3,157,189 UART: [state] Locking Datavault
3,158,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,746 UART: [state] Locking ICCM
3,159,302 UART: [exit] Launching FMC @ 0x40000130
3,164,631 UART:
3,164,647 UART: Running Caliptra FMC ...
3,165,055 UART:
3,165,109 UART: [state] CFI Enabled
3,175,475 UART: [fht] FMC Alias Private Key: 7
3,283,410 UART: [art] Extend RT PCRs Done
3,283,838 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,285,326 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,287,660 UART: WDT Expired
3,287,869 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,846 >>> mbox cmd response: success
2,986,934 UART:
2,986,950 UART: Running Caliptra FMC ...
2,987,358 UART:
2,987,412 UART: [state] CFI Enabled
2,997,777 UART: [fht] FMC Alias Private Key: 7
3,105,702 UART: [art] Extend RT PCRs Done
3,106,130 UART: [art] Lock RT PCRs Done
3,107,618 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,987,170 UART:
2,987,186 UART: Running Caliptra FMC ...
2,987,594 UART:
2,987,648 UART: [state] CFI Enabled
2,998,014 UART: [fht] FMC Alias Private Key: 7
3,105,949 UART: [art] Extend RT PCRs Done
3,106,377 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,107,865 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,110,182 UART: WDT Expired
3,110,391 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114332 bytes
2,885,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,369 >>> mbox cmd response: success
3,078,601 UART: [afmc] ++
3,078,769 UART: [afmc] CDI.KEYID = 6
3,079,131 UART: [afmc] SUBJECT.KEYID = 7
3,079,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,505 UART: [afmc] --
3,158,445 UART: [cold-reset] --
3,159,381 UART: [state] Locking Datavault
3,160,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,142 UART: [state] Locking ICCM
3,161,748 UART: [exit] Launching FMC @ 0x40000130
3,167,077 UART:
3,167,093 UART: Running Caliptra FMC ...
3,167,501 UART:
3,167,644 UART: [state] CFI Enabled
3,178,271 UART: [fht] FMC Alias Private Key: 7
3,286,020 UART: [art] Extend RT PCRs Done
3,286,448 UART: [art] Lock RT PCRs Done
3,287,750 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3199264 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114332 bytes
2,885,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,328 >>> mbox cmd response: success
3,078,557 UART: [afmc] ++
3,078,725 UART: [afmc] CDI.KEYID = 6
3,079,087 UART: [afmc] SUBJECT.KEYID = 7
3,079,512 UART: [afmc] AUTHORITY.KEYID = 5
3,115,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,908 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,808 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,537 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,481 UART: [afmc] --
3,158,420 UART: [cold-reset] --
3,159,356 UART: [state] Locking Datavault
3,160,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,117 UART: [state] Locking ICCM
3,161,723 UART: [exit] Launching FMC @ 0x40000130
3,167,052 UART:
3,167,068 UART: Running Caliptra FMC ...
3,167,476 UART:
3,167,619 UART: [state] CFI Enabled
3,178,247 UART: [fht] FMC Alias Private Key: 7
3,286,006 UART: [art] Extend RT PCRs Done
3,286,434 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,287,736 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,290,060 UART: WDT Expired
3,290,269 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,005 >>> mbox cmd response: success
2,989,355 UART:
2,989,371 UART: Running Caliptra FMC ...
2,989,779 UART:
2,989,922 UART: [state] CFI Enabled
3,000,549 UART: [fht] FMC Alias Private Key: 7
3,108,298 UART: [art] Extend RT PCRs Done
3,108,726 UART: [art] Lock RT PCRs Done
3,110,028 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,252 >>> mbox cmd response: success
2,989,591 UART:
2,989,607 UART: Running Caliptra FMC ...
2,990,015 UART:
2,990,158 UART: [state] CFI Enabled
3,000,786 UART: [fht] FMC Alias Private Key: 7
3,108,545 UART: [art] Extend RT PCRs Done
3,108,973 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,110,275 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,112,584 UART: WDT Expired
3,112,793 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,439 >>> mbox cmd response: success
2,773,595 UART: [afmc] ++
2,773,763 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,550 UART: [afmc] AUTHORITY.KEYID = 5
2,809,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,810 UART: [afmc] --
2,852,882 UART: [cold-reset] --
2,853,802 UART: [state] Locking Datavault
2,854,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,597 UART: [state] Locking ICCM
2,856,017 UART: [exit] Launching FMC @ 0x40000130
2,861,346 UART:
2,861,362 UART: Running Caliptra FMC ...
2,861,770 UART:
2,861,824 UART: [state] CFI Enabled
2,872,409 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,910 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2894782 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,677 >>> mbox cmd response: success
2,773,830 UART: [afmc] ++
2,773,998 UART: [afmc] CDI.KEYID = 6
2,774,360 UART: [afmc] SUBJECT.KEYID = 7
2,774,785 UART: [afmc] AUTHORITY.KEYID = 5
2,810,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,959 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,670 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,570 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,267 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,002 UART: [afmc] --
2,853,073 UART: [cold-reset] --
2,853,993 UART: [state] Locking Datavault
2,855,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,788 UART: [state] Locking ICCM
2,856,208 UART: [exit] Launching FMC @ 0x40000130
2,861,537 UART:
2,861,553 UART: Running Caliptra FMC ...
2,861,961 UART:
2,862,015 UART: [state] CFI Enabled
2,872,601 UART: [fht] FMC Alias Private Key: 7
2,979,952 UART: [art] Extend RT PCRs Done
2,980,380 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,982,112 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CEerror_internal_intr_r=00000040
2,984,501 UART: WDT Expired
2,984,710 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,420 >>> mbox cmd response: success
2,685,990 UART:
2,686,006 UART: Running Caliptra FMC ...
2,686,414 UART:
2,686,468 UART: [state] CFI Enabled
2,697,053 UART: [fht] FMC Alias Private Key: 7
2,804,394 UART: [art] Extend RT PCRs Done
2,804,822 UART: [art] Lock RT PCRs Done
2,806,554 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,667 >>> mbox cmd response: success
2,686,226 UART:
2,686,242 UART: Running Caliptra FMC ...
2,686,650 UART:
2,686,704 UART: [state] CFI Enabled
2,697,290 UART: [fht] FMC Alias Private Key: 7
2,804,641 UART: [art] Extend RT PCRs Done
2,805,069 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,806,801 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,809,119 UART: WDT Expired
2,809,328 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,820 >>> mbox cmd response: success
2,774,836 UART: [afmc] ++
2,775,004 UART: [afmc] CDI.KEYID = 6
2,775,366 UART: [afmc] SUBJECT.KEYID = 7
2,775,791 UART: [afmc] AUTHORITY.KEYID = 5
2,811,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,347 UART: [afmc] --
2,855,225 UART: [cold-reset] --
2,856,269 UART: [state] Locking Datavault
2,857,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,216 UART: [state] Locking ICCM
2,858,690 UART: [exit] Launching FMC @ 0x40000130
2,864,019 UART:
2,864,035 UART: Running Caliptra FMC ...
2,864,443 UART:
2,864,586 UART: [state] CFI Enabled
2,875,515 UART: [fht] FMC Alias Private Key: 7
2,984,224 UART: [art] Extend RT PCRs Done
2,984,652 UART: [art] Lock RT PCRs Done
2,986,260 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2898143 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,051 >>> mbox cmd response: success
2,775,064 UART: [afmc] ++
2,775,232 UART: [afmc] CDI.KEYID = 6
2,775,594 UART: [afmc] SUBJECT.KEYID = 7
2,776,019 UART: [afmc] AUTHORITY.KEYID = 5
2,812,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,373 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,084 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,984 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,681 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,532 UART: [afmc] --
2,855,409 UART: [cold-reset] --
2,856,453 UART: [state] Locking Datavault
2,857,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,400 UART: [state] Locking ICCM
2,858,874 UART: [exit] Launching FMC @ 0x40000130
2,864,203 UART:
2,864,219 UART: Running Caliptra FMC ...
2,864,627 UART:
2,864,770 UART: [state] CFI Enabled
2,875,700 UART: [fht] FMC Alias Private Key: 7
2,984,419 UART: [art] Extend RT PCRs Done
2,984,847 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,986,455 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,988,843 UART: WDT Expired
2,989,052 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,801 >>> mbox cmd response: success
2,688,663 UART:
2,688,679 UART: Running Caliptra FMC ...
2,689,087 UART:
2,689,230 UART: [state] CFI Enabled
2,700,159 UART: [fht] FMC Alias Private Key: 7
2,808,868 UART: [art] Extend RT PCRs Done
2,809,296 UART: [art] Lock RT PCRs Done
2,810,904 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,048 >>> mbox cmd response: success
2,688,899 UART:
2,688,915 UART: Running Caliptra FMC ...
2,689,323 UART:
2,689,466 UART: [state] CFI Enabled
2,700,396 UART: [fht] FMC Alias Private Key: 7
2,809,115 UART: [art] Extend RT PCRs Done
2,809,543 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,811,151 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,813,459 UART: WDT Expired
2,813,668 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,539 >>> mbox cmd response: success
2,771,702 UART: [afmc] ++
2,771,870 UART: [afmc] CDI.KEYID = 6
2,772,233 UART: [afmc] SUBJECT.KEYID = 7
2,772,659 UART: [afmc] AUTHORITY.KEYID = 5
2,808,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,947 UART: [afmc] --
2,851,019 UART: [cold-reset] --
2,851,939 UART: [state] Locking Datavault
2,853,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,734 UART: [state] Locking ICCM
2,854,154 UART: [exit] Launching FMC @ 0x40000130
2,859,483 UART:
2,859,499 UART: Running Caliptra FMC ...
2,859,907 UART:
2,859,961 UART: [state] CFI Enabled
2,870,546 UART: [fht] FMC Alias Private Key: 7
2,977,887 UART: [art] Extend RT PCRs Done
2,978,315 UART: [art] Lock RT PCRs Done
2,980,047 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2892949 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,770 >>> mbox cmd response: success
2,771,930 UART: [afmc] ++
2,772,098 UART: [afmc] CDI.KEYID = 6
2,772,461 UART: [afmc] SUBJECT.KEYID = 7
2,772,887 UART: [afmc] AUTHORITY.KEYID = 5
2,808,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,085 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,797 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,695 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,392 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,132 UART: [afmc] --
2,851,203 UART: [cold-reset] --
2,852,123 UART: [state] Locking Datavault
2,853,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,918 UART: [state] Locking ICCM
2,854,338 UART: [exit] Launching FMC @ 0x40000130
2,859,667 UART:
2,859,683 UART: Running Caliptra FMC ...
2,860,091 UART:
2,860,145 UART: [state] CFI Enabled
2,870,731 UART: [fht] FMC Alias Private Key: 7
2,978,082 UART: [art] Extend RT PCRs Done
2,978,510 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,980,242 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,982,636 UART: WDT Expired
2,982,845 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,405 >>> mbox cmd response: success
2,682,005 UART:
2,682,021 UART: Running Caliptra FMC ...
2,682,429 UART:
2,682,483 UART: [state] CFI Enabled
2,693,068 UART: [fht] FMC Alias Private Key: 7
2,800,409 UART: [art] Extend RT PCRs Done
2,800,837 UART: [art] Lock RT PCRs Done
2,802,569 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,652 >>> mbox cmd response: success
2,682,241 UART:
2,682,257 UART: Running Caliptra FMC ...
2,682,665 UART:
2,682,719 UART: [state] CFI Enabled
2,693,305 UART: [fht] FMC Alias Private Key: 7
2,800,656 UART: [art] Extend RT PCRs Done
2,801,084 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,802,816 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,805,134 UART: WDT Expired
2,805,343 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,920 >>> mbox cmd response: success
2,772,943 UART: [afmc] ++
2,773,111 UART: [afmc] CDI.KEYID = 6
2,773,474 UART: [afmc] SUBJECT.KEYID = 7
2,773,900 UART: [afmc] AUTHORITY.KEYID = 5
2,810,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,484 UART: [afmc] --
2,853,362 UART: [cold-reset] --
2,854,406 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,827 UART: [exit] Launching FMC @ 0x40000130
2,862,156 UART:
2,862,172 UART: Running Caliptra FMC ...
2,862,580 UART:
2,862,723 UART: [state] CFI Enabled
2,873,652 UART: [fht] FMC Alias Private Key: 7
2,982,361 UART: [art] Extend RT PCRs Done
2,982,789 UART: [art] Lock RT PCRs Done
2,984,397 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2896310 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,151 >>> mbox cmd response: success
2,773,171 UART: [afmc] ++
2,773,339 UART: [afmc] CDI.KEYID = 6
2,773,702 UART: [afmc] SUBJECT.KEYID = 7
2,774,128 UART: [afmc] AUTHORITY.KEYID = 5
2,810,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,506 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,218 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,116 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,813 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,669 UART: [afmc] --
2,853,546 UART: [cold-reset] --
2,854,590 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,011 UART: [exit] Launching FMC @ 0x40000130
2,862,340 UART:
2,862,356 UART: Running Caliptra FMC ...
2,862,764 UART:
2,862,907 UART: [state] CFI Enabled
2,873,837 UART: [fht] FMC Alias Private Key: 7
2,982,556 UART: [art] Extend RT PCRs Done
2,982,984 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,984,592 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,986,980 UART: WDT Expired
2,987,189 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,786 >>> mbox cmd response: success
2,684,678 UART:
2,684,694 UART: Running Caliptra FMC ...
2,685,102 UART:
2,685,245 UART: [state] CFI Enabled
2,696,174 UART: [fht] FMC Alias Private Key: 7
2,804,883 UART: [art] Extend RT PCRs Done
2,805,311 UART: [art] Lock RT PCRs Done
2,806,919 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,033 >>> mbox cmd response: success
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,481 UART: [state] CFI Enabled
2,696,411 UART: [fht] FMC Alias Private Key: 7
2,805,130 UART: [art] Extend RT PCRs Done
2,805,558 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,807,166 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,809,474 UART: WDT Expired
2,809,683 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.88s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114332 bytes
2,883,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,210 >>> mbox cmd response: success
3,077,430 UART: [afmc] ++
3,077,598 UART: [afmc] CDI.KEYID = 6
3,077,960 UART: [afmc] SUBJECT.KEYID = 7
3,078,385 UART: [afmc] AUTHORITY.KEYID = 5
3,112,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,512 UART: [afmc] --
3,156,520 UART: [cold-reset] --
3,157,214 UART: [state] Locking Datavault
3,158,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,771 UART: [state] Locking ICCM
3,159,327 UART: [exit] Launching FMC @ 0x40000130
3,164,656 UART:
3,164,672 UART: Running Caliptra FMC ...
3,165,080 UART:
3,165,134 UART: [state] CFI Enabled
3,175,499 UART: [fht] FMC Alias Private Key: 7
3,283,424 UART: [art] Extend RT PCRs Done
3,283,852 UART: [art] Lock RT PCRs Done
3,285,340 UART: [art] Populate DV Done
3,293,559 UART: [fht] FMC Alias Private Key: 7
3,294,583 UART: [art] Derive CDI
3,294,863 UART: [art] Store in in slot 0x4
3,380,052 UART: [art] Derive Key Pair
3,380,412 UART: [art] Store priv key in slot 0x5
3,393,516 UART: [art] Derive Key Pair - Done
3,408,104 UART: [art] Signing Cert with AUTHO
3,408,584 UART: RITY.KEYID = 7
3,423,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,755 UART: [art] PUB.X = B8245E733DF61294EFA6DE641CFC11CEF42999F70EC718297268303A9D2D5ED1419C7AE3CB07F543C9F9CB86C21B5AA3
3,431,531 UART: [art] PUB.Y = 8C4002787B37E71B4BB7D6B73D506E7E5E9FCE94D407C7DBF7417294FE478FCC601A63A4CDA48E5D0F3682042572F0C5
3,438,477 UART: [art] SIG.R = D28DD12E87BE70B40FAA148767995DCFF876B29A8EBEA45A37CD1790C33E8E210DA4F6851C2E4BE6F9D9E0469A6374A9
3,445,255 UART: [art] SIG.S = 0114B521C0FB094D530B6198461ABA476A576F72290B42388437108F9E4F46739AB6E123BB8A092DADFDD02259CB2E6A
3,469,561 UART: Caliptra RT
3,469,814 UART: [state] CFI Enabled
3,577,597 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3485408 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114332 bytes
2,883,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,169 >>> mbox cmd response: success
3,077,386 UART: [afmc] ++
3,077,554 UART: [afmc] CDI.KEYID = 6
3,077,916 UART: [afmc] SUBJECT.KEYID = 7
3,078,341 UART: [afmc] AUTHORITY.KEYID = 5
3,112,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,074 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,785 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,685 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,414 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,488 UART: [afmc] --
3,156,495 UART: [cold-reset] --
3,157,189 UART: [state] Locking Datavault
3,158,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,746 UART: [state] Locking ICCM
3,159,302 UART: [exit] Launching FMC @ 0x40000130
3,164,631 UART:
3,164,647 UART: Running Caliptra FMC ...
3,165,055 UART:
3,165,109 UART: [state] CFI Enabled
3,175,475 UART: [fht] FMC Alias Private Key: 7
3,283,410 UART: [art] Extend RT PCRs Done
3,283,838 UART: [art] Lock RT PCRs Done
3,285,326 UART: [art] Populate DV Done
3,293,545 UART: [fht] FMC Alias Private Key: 7
3,294,569 UART: [art] Derive CDI
3,294,849 UART: [art] Store in in slot 0x4
3,380,036 UART: [art] Derive Key Pair
3,380,396 UART: [art] Store priv key in slot 0x5
3,393,500 UART: [art] Derive Key Pair - Done
3,408,084 UART: [art] Signing Cert with AUTHO
3,408,564 UART: RITY.KEYID = 7
3,423,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,735 UART: [art] PUB.X = E75726CF347992DECDB9B13DD59D0E29DE45B3DDB957D5196792C6980315204769F965CE6FAD14CAF76AFFCD0C6AAAB3
3,431,514 UART: [art] PUB.Y = CA33CA1B97F7AF6A69921B2D00ABCFD2359DBA06DA153BA95D614FBE05D514D0D9AC6CC551476F96666D30BD8223BBC1
3,438,456 UART: [art] SIG.R = C2309138C5EC418FC5EC49EE10710F364C4E2CCCC6919A3B298FC142B4B66FDBEA7B5F87E6D453BA576A1685BA785FDE
3,445,241 UART: [art] SIG.S = CFFE73EA491878705FF1ED8AB25828667CF9B54DAAE54C6063202ABCDCCCF6D6C89F4E4F8A3154F4335CC692F30FCE55
3,469,577 UART: Caliptra RT
3,469,830 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,573,128 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7E ra=0x40007056 error_internal_intr_r=00000040
3,575,570 UART: [rt] WDT Expired
3,575,857 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,846 >>> mbox cmd response: success
2,986,934 UART:
2,986,950 UART: Running Caliptra FMC ...
2,987,358 UART:
2,987,412 UART: [state] CFI Enabled
2,997,777 UART: [fht] FMC Alias Private Key: 7
3,105,702 UART: [art] Extend RT PCRs Done
3,106,130 UART: [art] Lock RT PCRs Done
3,107,618 UART: [art] Populate DV Done
3,115,837 UART: [fht] FMC Alias Private Key: 7
3,116,861 UART: [art] Derive CDI
3,117,141 UART: [art] Store in in slot 0x4
3,202,330 UART: [art] Derive Key Pair
3,202,690 UART: [art] Store priv key in slot 0x5
3,215,794 UART: [art] Derive Key Pair - Done
3,230,376 UART: [art] Signing Cert with AUTHO
3,230,856 UART: RITY.KEYID = 7
3,246,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,027 UART: [art] PUB.X = 379433695F90A4F5B311BB8FF955CCAB336D804958C56F96F4B3352A4B2B3D67D215BAEA1312F73221E9BED8A094142E
3,253,801 UART: [art] PUB.Y = 35863670DE93689908BF99871923781335D7EA2C6A87B1F673C7B46D5C5A6237576EC86F560AFCD943430D58866D3872
3,260,730 UART: [art] SIG.R = CF384EA00305256E3EB553254748149D3F3B41B9BA9EA5E8EA295800CFC45E5BFAAC0642DB505CA3002F740552D5699B
3,267,450 UART: [art] SIG.S = D7D248F8F78E1ED396D39C925B73CEE32014A5C1518573179539A89B2A6C9346268BC1FD7D2FCD5828FAC42001ECACB0
3,291,776 UART: Caliptra RT
3,292,029 UART: [state] CFI Enabled
3,399,829 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,987,170 UART:
2,987,186 UART: Running Caliptra FMC ...
2,987,594 UART:
2,987,648 UART: [state] CFI Enabled
2,998,014 UART: [fht] FMC Alias Private Key: 7
3,105,949 UART: [art] Extend RT PCRs Done
3,106,377 UART: [art] Lock RT PCRs Done
3,107,865 UART: [art] Populate DV Done
3,116,084 UART: [fht] FMC Alias Private Key: 7
3,117,108 UART: [art] Derive CDI
3,117,388 UART: [art] Store in in slot 0x4
3,202,575 UART: [art] Derive Key Pair
3,202,935 UART: [art] Store priv key in slot 0x5
3,216,039 UART: [art] Derive Key Pair - Done
3,230,625 UART: [art] Signing Cert with AUTHO
3,231,105 UART: RITY.KEYID = 7
3,246,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,276 UART: [art] PUB.X = BDB8A24072EBB4F6C32A78F401D2F01CF71FB5DEDDA01AD704C5E7B18B109CC41EFBCB5A6A9B79513D68414941EE03CA
3,254,061 UART: [art] PUB.Y = EF5F932BA9B324F158A33AD565E7CBB8C51BE3752AA54543D1384DFE3A557F56AFF2A2DE369645184050AD0F18F628B3
3,261,018 UART: [art] SIG.R = 8246998D73DC7A2FA7A78A4F5685BA6FFE09D1F3524887175FBD2C285AB522091F157ED99923912150EB2C3ECE89D98D
3,267,786 UART: [art] SIG.S = 2E8A593255171BA9C60A158E4A300CD220EB4B8FD2773F07E3AB7C30C3D6212C947ABCB5D5D634750F94E0B519D6AD31
3,292,101 UART: Caliptra RT
3,292,354 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,395,606 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D80 ra=0x40007056 error_internal_intr_r=00000040
3,398,046 UART: [rt] WDT Expired
3,398,333 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114332 bytes
2,885,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,369 >>> mbox cmd response: success
3,078,601 UART: [afmc] ++
3,078,769 UART: [afmc] CDI.KEYID = 6
3,079,131 UART: [afmc] SUBJECT.KEYID = 7
3,079,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,505 UART: [afmc] --
3,158,445 UART: [cold-reset] --
3,159,381 UART: [state] Locking Datavault
3,160,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,142 UART: [state] Locking ICCM
3,161,748 UART: [exit] Launching FMC @ 0x40000130
3,167,077 UART:
3,167,093 UART: Running Caliptra FMC ...
3,167,501 UART:
3,167,644 UART: [state] CFI Enabled
3,178,271 UART: [fht] FMC Alias Private Key: 7
3,286,020 UART: [art] Extend RT PCRs Done
3,286,448 UART: [art] Lock RT PCRs Done
3,287,750 UART: [art] Populate DV Done
3,295,989 UART: [fht] FMC Alias Private Key: 7
3,297,003 UART: [art] Derive CDI
3,297,283 UART: [art] Store in in slot 0x4
3,383,048 UART: [art] Derive Key Pair
3,383,408 UART: [art] Store priv key in slot 0x5
3,396,626 UART: [art] Derive Key Pair - Done
3,411,414 UART: [art] Signing Cert with AUTHO
3,411,894 UART: RITY.KEYID = 7
3,427,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,049 UART: [art] PUB.X = 1E7219B8A1CA28BCD8B832050C4E98AB629177493D5AA9B3A682A446E2B710368D01A565D920ECC132C5BC0802F36B10
3,434,806 UART: [art] PUB.Y = 250447BAAE310CA97EF91DD609BFE86409C6A8DBB777168D7C61451B83B961DAD87DB0AAE3370D5D0EC7466165A21C3D
3,441,750 UART: [art] SIG.R = 5FE92C694BE2775EED2DC777762BEF5806027E093028018A5584B2D9D10C4013A5552AE67D59A90250BACC43BB924D92
3,448,502 UART: [art] SIG.S = E15897FB57B67CB19AB877EB2A7C390805438001669258FDAD67A86BE0E788E513CD39343C18F4B1CFB80FFF5DA937D5
3,472,125 UART: Caliptra RT
3,472,470 UART: [state] CFI Enabled
3,581,173 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3487995 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114332 bytes
2,885,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,328 >>> mbox cmd response: success
3,078,557 UART: [afmc] ++
3,078,725 UART: [afmc] CDI.KEYID = 6
3,079,087 UART: [afmc] SUBJECT.KEYID = 7
3,079,512 UART: [afmc] AUTHORITY.KEYID = 5
3,115,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,908 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,808 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,537 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,481 UART: [afmc] --
3,158,420 UART: [cold-reset] --
3,159,356 UART: [state] Locking Datavault
3,160,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,117 UART: [state] Locking ICCM
3,161,723 UART: [exit] Launching FMC @ 0x40000130
3,167,052 UART:
3,167,068 UART: Running Caliptra FMC ...
3,167,476 UART:
3,167,619 UART: [state] CFI Enabled
3,178,247 UART: [fht] FMC Alias Private Key: 7
3,286,006 UART: [art] Extend RT PCRs Done
3,286,434 UART: [art] Lock RT PCRs Done
3,287,736 UART: [art] Populate DV Done
3,295,975 UART: [fht] FMC Alias Private Key: 7
3,296,989 UART: [art] Derive CDI
3,297,269 UART: [art] Store in in slot 0x4
3,383,032 UART: [art] Derive Key Pair
3,383,392 UART: [art] Store priv key in slot 0x5
3,396,610 UART: [art] Derive Key Pair - Done
3,411,399 UART: [art] Signing Cert with AUTHO
3,411,879 UART: RITY.KEYID = 7
3,427,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,034 UART: [art] PUB.X = A086C9330F7804CFACB499B9D6559E22BC8995D133DC206FD13286F9AACA00CDD9F2136DA2304E29F33F4E7B25CEDE29
3,434,790 UART: [art] PUB.Y = 48B712B9A7AE469E3D522EA48B547879EFDA4366442D78D8CD86BBECF3E0729F8A220DA9BFD662997C41135C7087C135
3,441,743 UART: [art] SIG.R = 02D61E782B777A018725332645E22A4BBAC93394821F7B556CEB77F099F3216EEDEFD9A37B9E9AD917DDFC076748EE18
3,448,510 UART: [art] SIG.S = FAED45CA9675CFC2325D68859140119A9788E38AC0AE08947C014D677C56681195D59675B6B1A0920EB977158C4DA573
3,472,120 UART: Caliptra RT
3,472,465 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,576,696 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D78 ra=0x40007056 error_internal_intr_r=00000040
3,579,136 UART: [rt] WDT Expired
3,579,423 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,005 >>> mbox cmd response: success
2,989,355 UART:
2,989,371 UART: Running Caliptra FMC ...
2,989,779 UART:
2,989,922 UART: [state] CFI Enabled
3,000,549 UART: [fht] FMC Alias Private Key: 7
3,108,298 UART: [art] Extend RT PCRs Done
3,108,726 UART: [art] Lock RT PCRs Done
3,110,028 UART: [art] Populate DV Done
3,118,267 UART: [fht] FMC Alias Private Key: 7
3,119,281 UART: [art] Derive CDI
3,119,561 UART: [art] Store in in slot 0x4
3,205,326 UART: [art] Derive Key Pair
3,205,686 UART: [art] Store priv key in slot 0x5
3,218,904 UART: [art] Derive Key Pair - Done
3,233,697 UART: [art] Signing Cert with AUTHO
3,234,177 UART: RITY.KEYID = 7
3,249,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,332 UART: [art] PUB.X = 3A0C49FC62FECCEA9E7B715C2CA8DCE1A32209F5683AA1177AE25D52D33D5600FF87D7003C6C47B49FBB68659E8942D3
3,257,066 UART: [art] PUB.Y = B56472E218DC8C7A169C83CE779360AA564C6E8EE3BE898C72A308F23B6765542E3F8C7E5BDADA456AA9A0DEFB87AF38
3,264,029 UART: [art] SIG.R = 04E3610CEFEBEB0456DF5D4E02F86D633F662EB0091AA4059764A8BAAA5AF59C58165264583FB0787E7C0CF37CEA74EE
3,270,792 UART: [art] SIG.S = CA643D1461BC19A05F350EB87B353882C99D59E62D3C7F77DD445005CC0FB8307B3B7DEF7A08D56DF6D17792F5CFF7CD
3,294,421 UART: Caliptra RT
3,294,766 UART: [state] CFI Enabled
3,403,469 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,252 >>> mbox cmd response: success
2,989,591 UART:
2,989,607 UART: Running Caliptra FMC ...
2,990,015 UART:
2,990,158 UART: [state] CFI Enabled
3,000,786 UART: [fht] FMC Alias Private Key: 7
3,108,545 UART: [art] Extend RT PCRs Done
3,108,973 UART: [art] Lock RT PCRs Done
3,110,275 UART: [art] Populate DV Done
3,118,514 UART: [fht] FMC Alias Private Key: 7
3,119,528 UART: [art] Derive CDI
3,119,808 UART: [art] Store in in slot 0x4
3,205,571 UART: [art] Derive Key Pair
3,205,931 UART: [art] Store priv key in slot 0x5
3,219,149 UART: [art] Derive Key Pair - Done
3,233,944 UART: [art] Signing Cert with AUTHO
3,234,424 UART: RITY.KEYID = 7
3,249,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,579 UART: [art] PUB.X = D90BF0B5494DDD8284E7575A9335D67D53BC8DD18C18DA0954499F1158B91EBC1E1FDA102F99D262B0C6FEE432162B7E
3,257,353 UART: [art] PUB.Y = 8475D8DF24DD125A9E9DD7B688B905D1014C6B539D4105B16062CE2FA4DA97E5D2559B89055D3B19A2DA7C88113F3615
3,264,293 UART: [art] SIG.R = A349D9190D223C9423A791B4E519627D05E81E2B775D8B785AB7663CD7C026F744A2D5928DA2EF7EA3150A65483ED55C
3,271,054 UART: [art] SIG.S = 6C3B7F5C4E2A3B8F3171EA85B534A0BAD8B6C5E3B0B93519AA0A80D31918BBC68959C5BEBEAB3FF2E83D2DBBE978DFD7
3,294,704 UART: Caliptra RT
3,295,049 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,399,238 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7A ra=0x40007056 error_internal_intr_r=00000040
3,401,680 UART: [rt] WDT Expired
3,401,967 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,439 >>> mbox cmd response: success
2,773,595 UART: [afmc] ++
2,773,763 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,550 UART: [afmc] AUTHORITY.KEYID = 5
2,809,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,810 UART: [afmc] --
2,852,882 UART: [cold-reset] --
2,853,802 UART: [state] Locking Datavault
2,854,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,597 UART: [state] Locking ICCM
2,856,017 UART: [exit] Launching FMC @ 0x40000130
2,861,346 UART:
2,861,362 UART: Running Caliptra FMC ...
2,861,770 UART:
2,861,824 UART: [state] CFI Enabled
2,872,409 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,910 UART: [art] Populate DV Done
2,990,189 UART: [fht] FMC Alias Private Key: 7
2,991,181 UART: [art] Derive CDI
2,991,461 UART: [art] Store in in slot 0x4
3,076,532 UART: [art] Derive Key Pair
3,076,892 UART: [art] Store priv key in slot 0x5
3,090,518 UART: [art] Derive Key Pair - Done
3,105,508 UART: [art] Signing Cert with AUTHO
3,105,988 UART: RITY.KEYID = 7
3,121,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,941 UART: [art] PUB.X = 015ACF2E9C53E563984DE879FAD1C3B1F868CDB16D93E047F5CBA4B712FC4016388CEE36A912F87D43EBD9C0054F4855
3,128,717 UART: [art] PUB.Y = D465B7C83B7D5C501A8DBC2AF294106C905C64834F513404ACBBFB70E433B1E6643E9BE7B96140F0C4A3DC0C9F90321B
3,135,671 UART: [art] SIG.R = 5242BFDB607B56BD835233EC553D7178EBE9C67ADCACC19E956427B2CF5354AE0E5B1882EE62BC2A5A376BC36FD61CCA
3,142,458 UART: [art] SIG.S = 94E818733F9F9A340A37B8F71FA332044AC35FC519D54E9EB64543C67C7B5CC3B7A015B1AB0081C5ED5AEB586E67309C
3,166,009 UART: Caliptra RT
3,166,262 UART: [state] CFI Enabled
3,274,049 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3182229 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,670 >>> mbox cmd response: success
2,773,823 UART: [afmc] ++
2,773,991 UART: [afmc] CDI.KEYID = 6
2,774,353 UART: [afmc] SUBJECT.KEYID = 7
2,774,778 UART: [afmc] AUTHORITY.KEYID = 5
2,810,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,952 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,663 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,563 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,260 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,995 UART: [afmc] --
2,853,066 UART: [cold-reset] --
2,853,986 UART: [state] Locking Datavault
2,855,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,781 UART: [state] Locking ICCM
2,856,201 UART: [exit] Launching FMC @ 0x40000130
2,861,530 UART:
2,861,546 UART: Running Caliptra FMC ...
2,861,954 UART:
2,862,008 UART: [state] CFI Enabled
2,872,594 UART: [fht] FMC Alias Private Key: 7
2,979,945 UART: [art] Extend RT PCRs Done
2,980,373 UART: [art] Lock RT PCRs Done
2,982,105 UART: [art] Populate DV Done
2,990,384 UART: [fht] FMC Alias Private Key: 7
2,991,376 UART: [art] Derive CDI
2,991,656 UART: [art] Store in in slot 0x4
3,076,725 UART: [art] Derive Key Pair
3,077,085 UART: [art] Store priv key in slot 0x5
3,090,711 UART: [art] Derive Key Pair - Done
3,105,702 UART: [art] Signing Cert with AUTHO
3,106,182 UART: RITY.KEYID = 7
3,121,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,135 UART: [art] PUB.X = 64311525D3743BCB2B10942E556911275F207D03C3065E14444DF4CA7555FA238599A5664C1CF5100B1E84B612E72281
3,128,882 UART: [art] PUB.Y = 3286DA4AB209834E113377EF6C8D4248C6C1641567FF72BA5F851AE9A24A65B8BE1E010D69CB261A95CA10C70ED0FAA1
3,135,830 UART: [art] SIG.R = 1FE2798125895362FE678BC4D7E36E9830DC59DDFB717EFF55BEC693DC64D638D56A1AD144E74485027FB0B966F702DA
3,142,602 UART: [art] SIG.S = DB1FB096D563D4DAD4F045DDBF5E803D9CF6CBC6290DD4D3A5C62FB3DC58A2E2B894F86FB05B7065C14ABD4677CA47CC
3,166,196 UART: Caliptra RT
3,166,449 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,851 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,272,291 UART: [rt] WDT Expired
3,272,578 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,420 >>> mbox cmd response: success
2,685,990 UART:
2,686,006 UART: Running Caliptra FMC ...
2,686,414 UART:
2,686,468 UART: [state] CFI Enabled
2,697,053 UART: [fht] FMC Alias Private Key: 7
2,804,394 UART: [art] Extend RT PCRs Done
2,804,822 UART: [art] Lock RT PCRs Done
2,806,554 UART: [art] Populate DV Done
2,814,833 UART: [fht] FMC Alias Private Key: 7
2,815,825 UART: [art] Derive CDI
2,816,105 UART: [art] Store in in slot 0x4
2,901,176 UART: [art] Derive Key Pair
2,901,536 UART: [art] Store priv key in slot 0x5
2,915,162 UART: [art] Derive Key Pair - Done
2,930,154 UART: [art] Signing Cert with AUTHO
2,930,634 UART: RITY.KEYID = 7
2,945,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,587 UART: [art] PUB.X = 82CC0A9781A04CB87A97CAB9084AA073070E01A689D5ED4C7A0EBC8389B188F6F3C8BF5CA6CAA7C04B98324251E17DC1
2,953,353 UART: [art] PUB.Y = 02EFFAB8294E8B4884C8FA56D0E1FCA66C8F018C2AB20F51FBDAF5B2FE8E1CA500B3FC9E1F05CAC90CC6CFED1B2BA37A
2,960,304 UART: [art] SIG.R = CACC0B9CA1C8411BF29FA207E966EAA98E4920E9F6391EA3F4E6C0E015366BAB50714BC19F297A77EC31143F6A066333
2,967,075 UART: [art] SIG.S = 87840CF87C3A7AE8A1D92DCBD74057CD181D084BB2653BACD05284AEA30812E8858909E6A242B8DEFF723277D721F110
2,990,640 UART: Caliptra RT
2,990,893 UART: [state] CFI Enabled
3,098,629 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,667 >>> mbox cmd response: success
2,686,226 UART:
2,686,242 UART: Running Caliptra FMC ...
2,686,650 UART:
2,686,704 UART: [state] CFI Enabled
2,697,290 UART: [fht] FMC Alias Private Key: 7
2,804,641 UART: [art] Extend RT PCRs Done
2,805,069 UART: [art] Lock RT PCRs Done
2,806,801 UART: [art] Populate DV Done
2,815,080 UART: [fht] FMC Alias Private Key: 7
2,816,072 UART: [art] Derive CDI
2,816,352 UART: [art] Store in in slot 0x4
2,901,421 UART: [art] Derive Key Pair
2,901,781 UART: [art] Store priv key in slot 0x5
2,915,407 UART: [art] Derive Key Pair - Done
2,930,398 UART: [art] Signing Cert with AUTHO
2,930,878 UART: RITY.KEYID = 7
2,946,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,831 UART: [art] PUB.X = 59A42A073243289EBC2F0FCF859A0826EA6B4D7831CD55DDF357FD4950552392B2CC2FC8BDC3A63315DC76C29FAC1A4E
2,953,606 UART: [art] PUB.Y = B856F443336F84BF48671465FE2FE8D59FFA113B06599F16B867F962C5A1F3B02A9F4B856503F71A509D26227B7C3ED4
2,960,550 UART: [art] SIG.R = 5A94821882971C646416FC4DA1E8260A39634A0D984A8C19AB6229E35DE5ED25593E85D94E8F5763FFEFE2EFDA451F56
2,967,318 UART: [art] SIG.S = 23B192E2090902B97DC825A917965D68AE04BCA78739694A9DA4B66C584815DFE0212FD23FCC743FF7D273C448E3475C
2,990,875 UART: Caliptra RT
2,991,128 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,094,405 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7E ra=0x40007056 error_internal_intr_r=00000040
3,096,847 UART: [rt] WDT Expired
3,097,134 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,820 >>> mbox cmd response: success
2,774,836 UART: [afmc] ++
2,775,004 UART: [afmc] CDI.KEYID = 6
2,775,366 UART: [afmc] SUBJECT.KEYID = 7
2,775,791 UART: [afmc] AUTHORITY.KEYID = 5
2,811,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,347 UART: [afmc] --
2,855,225 UART: [cold-reset] --
2,856,269 UART: [state] Locking Datavault
2,857,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,216 UART: [state] Locking ICCM
2,858,690 UART: [exit] Launching FMC @ 0x40000130
2,864,019 UART:
2,864,035 UART: Running Caliptra FMC ...
2,864,443 UART:
2,864,586 UART: [state] CFI Enabled
2,875,515 UART: [fht] FMC Alias Private Key: 7
2,984,224 UART: [art] Extend RT PCRs Done
2,984,652 UART: [art] Lock RT PCRs Done
2,986,260 UART: [art] Populate DV Done
2,994,335 UART: [fht] FMC Alias Private Key: 7
2,995,275 UART: [art] Derive CDI
2,995,555 UART: [art] Store in in slot 0x4
3,081,136 UART: [art] Derive Key Pair
3,081,496 UART: [art] Store priv key in slot 0x5
3,094,802 UART: [art] Derive Key Pair - Done
3,109,674 UART: [art] Signing Cert with AUTHO
3,110,154 UART: RITY.KEYID = 7
3,125,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,121 UART: [art] PUB.X = 49107591DE4C4699B0C7AC3270808E5CF392312FD8F4DB96AC526EA75636A7A345AD320F009BADB31404454C136F57E6
3,132,863 UART: [art] PUB.Y = B8EF00C845BE7210BEA005956590C566040E601B436189E1DF4A61CB3A4B516DB4ECA950A076C8820B46CA00AFD59597
3,139,761 UART: [art] SIG.R = 8CBDF7CE952AA7F99EA4D4BB6BF2913D0EE1C8F83440F89DFE87EC05DA8540DD59290CC09254DEEFA1AE59CC0A2E18A3
3,146,547 UART: [art] SIG.S = 5BB6D8DD40159457A36FF319D8A0E53E9374C0C360A969D20B1034E6460585DFAD12A81DA75E55E3B35FACB87EAFF11E
3,170,852 UART: Caliptra RT
3,171,197 UART: [state] CFI Enabled
3,279,104 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3186295 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,051 >>> mbox cmd response: success
2,775,064 UART: [afmc] ++
2,775,232 UART: [afmc] CDI.KEYID = 6
2,775,594 UART: [afmc] SUBJECT.KEYID = 7
2,776,019 UART: [afmc] AUTHORITY.KEYID = 5
2,812,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,373 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,084 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,984 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,681 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,532 UART: [afmc] --
2,855,409 UART: [cold-reset] --
2,856,453 UART: [state] Locking Datavault
2,857,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,400 UART: [state] Locking ICCM
2,858,874 UART: [exit] Launching FMC @ 0x40000130
2,864,203 UART:
2,864,219 UART: Running Caliptra FMC ...
2,864,627 UART:
2,864,770 UART: [state] CFI Enabled
2,875,700 UART: [fht] FMC Alias Private Key: 7
2,984,419 UART: [art] Extend RT PCRs Done
2,984,847 UART: [art] Lock RT PCRs Done
2,986,455 UART: [art] Populate DV Done
2,994,530 UART: [fht] FMC Alias Private Key: 7
2,995,470 UART: [art] Derive CDI
2,995,750 UART: [art] Store in in slot 0x4
3,081,329 UART: [art] Derive Key Pair
3,081,689 UART: [art] Store priv key in slot 0x5
3,094,995 UART: [art] Derive Key Pair - Done
3,109,866 UART: [art] Signing Cert with AUTHO
3,110,346 UART: RITY.KEYID = 7
3,125,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,313 UART: [art] PUB.X = 4D4494E6131F23EA6DAD0061030C2BA3DE35CAFC8E04EED4E4598A0BE90994185D0EDFF6C1BB317867B2ACF95D3E1A61
3,133,061 UART: [art] PUB.Y = 96CF63B34725552696B2CB7E0F493033BC3FFA4B13539932123D0B872C6393559299F915CC24F359A1F295EC24D17246
3,139,995 UART: [art] SIG.R = 84E7D2A1DD528EA38D5596D3BFB2AE74ED390989C8F8AD6C7D4B190997DE16720E04DE751338A96A281FD04800BDFBF5
3,146,743 UART: [art] SIG.S = 783F082153A4CA20416DAF114026B70FEA8259290B8B33BC5C5BAC802E8139086DBEE1F6829C8A092EF88CA576B8E57B
3,171,031 UART: Caliptra RT
3,171,376 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,274,898 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7A ra=0x40007056 error_internal_intr_r=00000040
3,277,340 UART: [rt] WDT Expired
3,277,627 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,801 >>> mbox cmd response: success
2,688,663 UART:
2,688,679 UART: Running Caliptra FMC ...
2,689,087 UART:
2,689,230 UART: [state] CFI Enabled
2,700,159 UART: [fht] FMC Alias Private Key: 7
2,808,868 UART: [art] Extend RT PCRs Done
2,809,296 UART: [art] Lock RT PCRs Done
2,810,904 UART: [art] Populate DV Done
2,818,979 UART: [fht] FMC Alias Private Key: 7
2,819,919 UART: [art] Derive CDI
2,820,199 UART: [art] Store in in slot 0x4
2,905,780 UART: [art] Derive Key Pair
2,906,140 UART: [art] Store priv key in slot 0x5
2,919,446 UART: [art] Derive Key Pair - Done
2,934,321 UART: [art] Signing Cert with AUTHO
2,934,801 UART: RITY.KEYID = 7
2,950,003 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,768 UART: [art] PUB.X = 46B03D042FD7E3A698A6D95AD3FB915F6ADE3F7AB59D881533F7D97A0E08704EF1633D6D319028A697ADBEFC8ABAF7CE
2,957,549 UART: [art] PUB.Y = 00B99C352DCC5103EAC129C897D3111AB38899D8B31D8A04467CF4EE57701A0491FEF5303E9A291AB56C4F01EBF844A6
2,964,471 UART: [art] SIG.R = 1BB4C2FAF8AC1D6EF46893B72931C7FB454C062AC914A15C19CB41FC1EFC9A3D1D2E47D9BE7322DA0DDE252C1750CA00
2,971,235 UART: [art] SIG.S = 33D96174074612B90AFAEC2E844367D1E2EB25B5460DB39E157E7E5E19DCBB0E6F14510C420A125CD18CE1BB68F21235
2,995,522 UART: Caliptra RT
2,995,867 UART: [state] CFI Enabled
3,103,824 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,048 >>> mbox cmd response: success
2,688,899 UART:
2,688,915 UART: Running Caliptra FMC ...
2,689,323 UART:
2,689,466 UART: [state] CFI Enabled
2,700,396 UART: [fht] FMC Alias Private Key: 7
2,809,115 UART: [art] Extend RT PCRs Done
2,809,543 UART: [art] Lock RT PCRs Done
2,811,151 UART: [art] Populate DV Done
2,819,226 UART: [fht] FMC Alias Private Key: 7
2,820,166 UART: [art] Derive CDI
2,820,446 UART: [art] Store in in slot 0x4
2,906,025 UART: [art] Derive Key Pair
2,906,385 UART: [art] Store priv key in slot 0x5
2,919,691 UART: [art] Derive Key Pair - Done
2,934,556 UART: [art] Signing Cert with AUTHO
2,935,036 UART: RITY.KEYID = 7
2,950,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,003 UART: [art] PUB.X = CB66905F18092D3BE1751A53B5E1C09080D3F535BCFD31DA86A68942C7A6401761465F56CDB8B8B561AD00394D19D693
2,957,748 UART: [art] PUB.Y = 5A4E1BFB74B60B530C41EE29B8652E58CB547F0F46D250FA19E42660A7ADB0463D24A224162E30E56F9EAA5B59CC44FA
2,964,701 UART: [art] SIG.R = 632D8503C89C80C257EC0CABCE2F88AEAA86A014F13805037497F3EA3CB37C3430F4E792216F02C13CCD2C0B56264D04
2,971,456 UART: [art] SIG.S = 45332B9CC544BC99E1E48A221034E440DB215B83B4B0BC85545B54B0F74F81C55C704A484E74F969946E0016EE5422E1
2,995,727 UART: Caliptra RT
2,996,072 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,099,592 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,102,032 UART: [rt] WDT Expired
3,102,319 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,539 >>> mbox cmd response: success
2,771,702 UART: [afmc] ++
2,771,870 UART: [afmc] CDI.KEYID = 6
2,772,233 UART: [afmc] SUBJECT.KEYID = 7
2,772,659 UART: [afmc] AUTHORITY.KEYID = 5
2,808,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,947 UART: [afmc] --
2,851,019 UART: [cold-reset] --
2,851,939 UART: [state] Locking Datavault
2,853,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,734 UART: [state] Locking ICCM
2,854,154 UART: [exit] Launching FMC @ 0x40000130
2,859,483 UART:
2,859,499 UART: Running Caliptra FMC ...
2,859,907 UART:
2,859,961 UART: [state] CFI Enabled
2,870,546 UART: [fht] FMC Alias Private Key: 7
2,977,887 UART: [art] Extend RT PCRs Done
2,978,315 UART: [art] Lock RT PCRs Done
2,980,047 UART: [art] Populate DV Done
2,988,326 UART: [fht] FMC Alias Private Key: 7
2,989,318 UART: [art] Derive CDI
2,989,598 UART: [art] Store in in slot 0x4
3,074,669 UART: [art] Derive Key Pair
3,075,029 UART: [art] Store priv key in slot 0x5
3,088,655 UART: [art] Derive Key Pair - Done
3,103,650 UART: [art] Signing Cert with AUTHO
3,104,130 UART: RITY.KEYID = 7
3,119,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,083 UART: [art] PUB.X = 37D37B9EBB8AF7AF9C4BFC6716494851631F48527F94E4DF9DC02A21B1E05EBB13394F179E0409A67476DDE19CBF972E
3,126,857 UART: [art] PUB.Y = 4C855D90EF81E2EE77222F64767D039205D9DAA70E6E933487B69996CC3014728DBE08C2B4085D07EB204A71D8DE3F55
3,133,789 UART: [art] SIG.R = 93E37DBCE7C114F4B926739CB72A76BC3BC16FB844406A98B83F002A0D476AB7D63A558F87FC5947FB809FD77713DD06
3,140,539 UART: [art] SIG.S = 1EB04CD688FF8A5667C1065B2D82DBD438DC65BB828D338EDF02F302F39B18EF5A0CDB69FBDD0F52897A5AE5945E5F67
3,164,113 UART: Caliptra RT
3,164,366 UART: [state] CFI Enabled
3,272,085 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3180295 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,770 >>> mbox cmd response: success
2,771,930 UART: [afmc] ++
2,772,098 UART: [afmc] CDI.KEYID = 6
2,772,461 UART: [afmc] SUBJECT.KEYID = 7
2,772,887 UART: [afmc] AUTHORITY.KEYID = 5
2,808,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,085 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,797 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,695 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,392 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,132 UART: [afmc] --
2,851,203 UART: [cold-reset] --
2,852,123 UART: [state] Locking Datavault
2,853,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,918 UART: [state] Locking ICCM
2,854,338 UART: [exit] Launching FMC @ 0x40000130
2,859,667 UART:
2,859,683 UART: Running Caliptra FMC ...
2,860,091 UART:
2,860,145 UART: [state] CFI Enabled
2,870,731 UART: [fht] FMC Alias Private Key: 7
2,978,082 UART: [art] Extend RT PCRs Done
2,978,510 UART: [art] Lock RT PCRs Done
2,980,242 UART: [art] Populate DV Done
2,988,521 UART: [fht] FMC Alias Private Key: 7
2,989,513 UART: [art] Derive CDI
2,989,793 UART: [art] Store in in slot 0x4
3,074,862 UART: [art] Derive Key Pair
3,075,222 UART: [art] Store priv key in slot 0x5
3,088,848 UART: [art] Derive Key Pair - Done
3,103,835 UART: [art] Signing Cert with AUTHO
3,104,315 UART: RITY.KEYID = 7
3,119,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,268 UART: [art] PUB.X = 47E551C1FC13150442ED655B95929888144E584D842552FBC78B9C80484126EDB9A3B38BA3EA0C76B8064AECE2FCADA3
3,127,035 UART: [art] PUB.Y = 2403A34561F7E057A6A1CFFDA28BB089757DA8B51B938213FE2E2843347E0D3BD8E13D97BBBD9ADEDB0244FD6FD2107C
3,133,992 UART: [art] SIG.R = 3AA2EF8C93726191BD6D8447E5160AA054BD8B1C1D239C52444DC4900DB4CC08F7AB4BBA1A77ACBB424108B398E58913
3,140,760 UART: [art] SIG.S = C64E57CD73B01F94138854CF42C1451A4BEEE3C7076858CBD1275A65624DCE20FF15B407EA1A3522D9B85B1553A7585F
3,164,327 UART: Caliptra RT
3,164,580 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,267,887 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,270,327 UART: [rt] WDT Expired
3,270,614 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,405 >>> mbox cmd response: success
2,682,005 UART:
2,682,021 UART: Running Caliptra FMC ...
2,682,429 UART:
2,682,483 UART: [state] CFI Enabled
2,693,068 UART: [fht] FMC Alias Private Key: 7
2,800,409 UART: [art] Extend RT PCRs Done
2,800,837 UART: [art] Lock RT PCRs Done
2,802,569 UART: [art] Populate DV Done
2,810,848 UART: [fht] FMC Alias Private Key: 7
2,811,840 UART: [art] Derive CDI
2,812,120 UART: [art] Store in in slot 0x4
2,897,191 UART: [art] Derive Key Pair
2,897,551 UART: [art] Store priv key in slot 0x5
2,911,177 UART: [art] Derive Key Pair - Done
2,926,168 UART: [art] Signing Cert with AUTHO
2,926,648 UART: RITY.KEYID = 7
2,941,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,601 UART: [art] PUB.X = A7C0E09A1953FA443090CBF26B6FF12699E475360793F09E3CC205DA0DC8B05EEA02D34B6307BF1352FA31985F9C39F7
2,949,362 UART: [art] PUB.Y = 354625BCA9CD47E31070DCB16D88FBB19D2BD07C23DF3748ED4CC84B17C63AA916D6A55C688CCF1D535E33440D8263D0
2,956,321 UART: [art] SIG.R = 8120333B91F82354C50BEC4BA1805ADE084D9023BB7C8496777137B4EDDE8FEBE0EA4DF5AA7B5152022A830FEA46EFF5
2,963,093 UART: [art] SIG.S = AE077B8879DE859370D0FD69CDACD1402EC14FA67E334BEDAB0A03A5473E55694E620341B0E1DCA0C281829FF500BD26
2,986,642 UART: Caliptra RT
2,986,895 UART: [state] CFI Enabled
3,094,631 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,652 >>> mbox cmd response: success
2,682,241 UART:
2,682,257 UART: Running Caliptra FMC ...
2,682,665 UART:
2,682,719 UART: [state] CFI Enabled
2,693,305 UART: [fht] FMC Alias Private Key: 7
2,800,656 UART: [art] Extend RT PCRs Done
2,801,084 UART: [art] Lock RT PCRs Done
2,802,816 UART: [art] Populate DV Done
2,811,095 UART: [fht] FMC Alias Private Key: 7
2,812,087 UART: [art] Derive CDI
2,812,367 UART: [art] Store in in slot 0x4
2,897,436 UART: [art] Derive Key Pair
2,897,796 UART: [art] Store priv key in slot 0x5
2,911,422 UART: [art] Derive Key Pair - Done
2,926,408 UART: [art] Signing Cert with AUTHO
2,926,888 UART: RITY.KEYID = 7
2,942,076 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,841 UART: [art] PUB.X = BD45653868C739C4D1FD030BA43A701ADDFC882D7006967B547EAE515E5D94FA7BAE930D86621A8471181830D189E56A
2,949,601 UART: [art] PUB.Y = 866362AD94ADD75DA9A57C36DC24458B2D0341FA25D2B26A2AC493DC335F6EB886B68FEF96DC38B8677EF5E96DF7D401
2,956,559 UART: [art] SIG.R = 10192F3B0B2FE10ACFA2574D91688BF054F3CF18C58BD498807BB791B4316150A42A74C8210834614BB5FFE20A0F73E0
2,963,316 UART: [art] SIG.S = 972538C27809CE567C0032E3C6FD66CDF436085AE81E08F0CF7DD7438F87A57CBB8FE3D1387FBD2D2B3D4CEFC1BF9905
2,986,867 UART: Caliptra RT
2,987,120 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,090,407 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,092,847 UART: [rt] WDT Expired
3,093,134 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,920 >>> mbox cmd response: success
2,772,943 UART: [afmc] ++
2,773,111 UART: [afmc] CDI.KEYID = 6
2,773,474 UART: [afmc] SUBJECT.KEYID = 7
2,773,900 UART: [afmc] AUTHORITY.KEYID = 5
2,810,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,484 UART: [afmc] --
2,853,362 UART: [cold-reset] --
2,854,406 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,827 UART: [exit] Launching FMC @ 0x40000130
2,862,156 UART:
2,862,172 UART: Running Caliptra FMC ...
2,862,580 UART:
2,862,723 UART: [state] CFI Enabled
2,873,652 UART: [fht] FMC Alias Private Key: 7
2,982,361 UART: [art] Extend RT PCRs Done
2,982,789 UART: [art] Lock RT PCRs Done
2,984,397 UART: [art] Populate DV Done
2,992,472 UART: [fht] FMC Alias Private Key: 7
2,993,412 UART: [art] Derive CDI
2,993,692 UART: [art] Store in in slot 0x4
3,079,273 UART: [art] Derive Key Pair
3,079,633 UART: [art] Store priv key in slot 0x5
3,092,939 UART: [art] Derive Key Pair - Done
3,107,815 UART: [art] Signing Cert with AUTHO
3,108,295 UART: RITY.KEYID = 7
3,123,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,262 UART: [art] PUB.X = BB1964D18EE62944531BC6E378B23114521671187D239F0310B71ED422F42BD1858052BEF5EA2E326DE40E3845CD7EFF
3,131,026 UART: [art] PUB.Y = 88396C57E30C8F769A8C6B93BC28324499780518BE1C11A3B4A25C7A62BAA00FCAF48455A986D2B03FBC8EEA20823B59
3,137,973 UART: [art] SIG.R = BFEAE1AC1EBE14A6BC56774DBAC38A062A4D19062A9F3F14A4E22B276D4CD7949D04441A443F53A61B751C01AC080F6D
3,144,741 UART: [art] SIG.S = FEC3C7C9FE5B6EF10A37DEED38D9F57373EC66F6532B52A3CF2FEBF45C0A9CFC0BD0DA56F9BD2509AE9D21D0F9EACBA3
3,169,066 UART: Caliptra RT
3,169,411 UART: [state] CFI Enabled
3,277,335 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3184556 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,151 >>> mbox cmd response: success
2,773,171 UART: [afmc] ++
2,773,339 UART: [afmc] CDI.KEYID = 6
2,773,702 UART: [afmc] SUBJECT.KEYID = 7
2,774,128 UART: [afmc] AUTHORITY.KEYID = 5
2,810,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,506 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,218 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,116 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,813 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,669 UART: [afmc] --
2,853,546 UART: [cold-reset] --
2,854,590 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,011 UART: [exit] Launching FMC @ 0x40000130
2,862,340 UART:
2,862,356 UART: Running Caliptra FMC ...
2,862,764 UART:
2,862,907 UART: [state] CFI Enabled
2,873,837 UART: [fht] FMC Alias Private Key: 7
2,982,556 UART: [art] Extend RT PCRs Done
2,982,984 UART: [art] Lock RT PCRs Done
2,984,592 UART: [art] Populate DV Done
2,992,667 UART: [fht] FMC Alias Private Key: 7
2,993,607 UART: [art] Derive CDI
2,993,887 UART: [art] Store in in slot 0x4
3,079,466 UART: [art] Derive Key Pair
3,079,826 UART: [art] Store priv key in slot 0x5
3,093,132 UART: [art] Derive Key Pair - Done
3,108,000 UART: [art] Signing Cert with AUTHO
3,108,480 UART: RITY.KEYID = 7
3,123,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,447 UART: [art] PUB.X = 17C562781D7DCA10F351743ABBB9FD3C908746606BFC16109A169195B4932E69FDBC51CDE78F2718400CB0389A0BBD41
3,131,215 UART: [art] PUB.Y = DC1E1A9A04095911A96650F30EADF3EC981EAC27004ACBDFF13D65FE01049D08C68605B30976C0632D97AD29089DA94B
3,138,124 UART: [art] SIG.R = 58055BA936326B9C130E669DA6F70883DFC13AB9FDA85FDB93A3EF63B466B23CAD4B6AB354ECB47E87B728E95434708C
3,144,897 UART: [art] SIG.S = 7B477602EBEF3BAAB6E4C66D053E6286B1A2783786F7DAAC319707A6685FBF04C1B100360DDCF88246E73DD48D9B85D6
3,169,167 UART: Caliptra RT
3,169,512 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,273,129 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7A ra=0x40007056 error_internal_intr_r=00000040
3,275,571 UART: [rt] WDT Expired
3,275,858 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,786 >>> mbox cmd response: success
2,684,678 UART:
2,684,694 UART: Running Caliptra FMC ...
2,685,102 UART:
2,685,245 UART: [state] CFI Enabled
2,696,174 UART: [fht] FMC Alias Private Key: 7
2,804,883 UART: [art] Extend RT PCRs Done
2,805,311 UART: [art] Lock RT PCRs Done
2,806,919 UART: [art] Populate DV Done
2,814,994 UART: [fht] FMC Alias Private Key: 7
2,815,934 UART: [art] Derive CDI
2,816,214 UART: [art] Store in in slot 0x4
2,901,795 UART: [art] Derive Key Pair
2,902,155 UART: [art] Store priv key in slot 0x5
2,915,461 UART: [art] Derive Key Pair - Done
2,930,335 UART: [art] Signing Cert with AUTHO
2,930,815 UART: RITY.KEYID = 7
2,946,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,782 UART: [art] PUB.X = 68A5150ACCF60DA71E00894756692DFC8DEA1A5DF8A068622F76357E4572AF633D4D53506ED8716A76080DEB0FF12B43
2,953,519 UART: [art] PUB.Y = A0BBAEF97C68EDC27B06B77C57CFBB210FCED8C6C127B82FAAA9336E4BF87E6CE2B8D7C6133D527250B9C718855CBC7C
2,960,489 UART: [art] SIG.R = ADE15589911B44A9D042DAB48E090EB52F9449E5B74EBD9822E7AEFF33ED8ECFDC8363071E61855CB2EA891EC1B9DBF0
2,967,270 UART: [art] SIG.S = 7DDFD04E03D61B0B2E095ECFB80A8AC350BC6937B4A8BA8C062B43249F7F7E2C6BF132C5B14A93E1D8402504E1CF241D
2,991,567 UART: Caliptra RT
2,991,912 UART: [state] CFI Enabled
3,099,819 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,033 >>> mbox cmd response: success
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,481 UART: [state] CFI Enabled
2,696,411 UART: [fht] FMC Alias Private Key: 7
2,805,130 UART: [art] Extend RT PCRs Done
2,805,558 UART: [art] Lock RT PCRs Done
2,807,166 UART: [art] Populate DV Done
2,815,241 UART: [fht] FMC Alias Private Key: 7
2,816,181 UART: [art] Derive CDI
2,816,461 UART: [art] Store in in slot 0x4
2,902,040 UART: [art] Derive Key Pair
2,902,400 UART: [art] Store priv key in slot 0x5
2,915,706 UART: [art] Derive Key Pair - Done
2,930,579 UART: [art] Signing Cert with AUTHO
2,931,059 UART: RITY.KEYID = 7
2,946,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,026 UART: [art] PUB.X = 6AE276C24A101AF1B231A678F92A3C6AF0F10CACEFC9B90EA510AC850E4D53830F49FBFFADA1A8287F24F9268E4DB582
2,953,804 UART: [art] PUB.Y = 5447658473BD0071091BFAE1B6A2E52F440429F38CAC3E0C20FFD526BE8F57C346689E58CB0EEA01F74F3918F4BCB415
2,960,725 UART: [art] SIG.R = 90B6F6643ABEDE32767A6360DE3FE55B2892A1E6E57CF4CC2A706A635AC06E49D3865E688778F36452BE217A1C0A807D
2,967,498 UART: [art] SIG.S = 309681DFEC9B45F88675C0A67BBA9907FBD12F3122D924C1B660FB35CD5989B71138B42624583D00BCE56561587BBB9E
2,991,772 UART: Caliptra RT
2,992,117 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,095,587 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,098,027 UART: [rt] WDT Expired
3,098,314 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
905,141 UART: [kat] SHA2-512-ACC
907,042 UART: [kat] ECC-384
917,069 UART: [kat] HMAC-384Kdf
921,793 UART: [kat] LMS
1,170,105 UART: [kat] --
1,171,270 UART: [cold-reset] ++
1,171,692 UART: [fht] FHT @ 0x50003400
1,174,340 UART: [idev] ++
1,174,508 UART: [idev] CDI.KEYID = 6
1,174,869 UART: [idev] SUBJECT.KEYID = 7
1,175,294 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,937 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
905,014 UART: [kat] SHA2-512-ACC
906,915 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,594 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,756 UART: [idev] ++
1,173,924 UART: [idev] CDI.KEYID = 6
1,174,285 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Production
85,699 UART: [state] DebugLocked = Yes
86,361 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,390 UART: [fht] Storing FHT @ 0x50003400
1,479,283 UART: [idev] ++
1,479,451 UART: [idev] CDI.KEYID = 6
1,479,811 UART: [idev] SUBJECT.KEYID = 7
1,480,235 UART: [idev] UDS.KEYID = 0
1,480,580 ready_for_fw is high
1,480,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,082 UART: [idev] Erasing UDS.KEYID = 0
1,504,581 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,016 UART: [idev] --
1,514,215 UART: [ldev] ++
1,514,383 UART: [ldev] CDI.KEYID = 6
1,514,746 UART: [ldev] SUBJECT.KEYID = 5
1,515,172 UART: [ldev] AUTHORITY.KEYID = 7
1,515,635 UART: [ldev] FE.KEYID = 1
1,520,839 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,957 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,651 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,523 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,229 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,351 UART: [ldev] --
1,585,742 UART: [fwproc] Waiting for Commands...
1,586,445 UART: [fwproc] Received command 0x46574c44
1,587,236 UART: [fwproc] Received Image of size 114332 bytes
2,910,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,667 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,102,843 >>> mbox cmd response: success
3,103,848 UART: [afmc] ++
3,104,016 UART: [afmc] CDI.KEYID = 6
3,104,378 UART: [afmc] SUBJECT.KEYID = 7
3,104,803 UART: [afmc] AUTHORITY.KEYID = 5
3,139,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,156,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,156,876 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,162,594 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,168,489 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,174,200 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,182,218 UART: [afmc] --
3,183,273 UART: [cold-reset] --
3,184,079 UART: [state] Locking Datavault
3,185,172 UART: [state] Locking PCR0, PCR1 and PCR31
3,185,776 UART: [state] Locking ICCM
3,186,232 UART: [exit] Launching FMC @ 0x40000130
3,191,561 UART:
3,191,577 UART: Running Caliptra FMC ...
3,191,985 UART:
3,192,039 UART: [state] CFI Enabled
3,202,424 UART: [fht] FMC Alias Private Key: 7
3,310,447 UART: [art] Extend RT PCRs Done
3,310,875 UART: [art] Lock RT PCRs Done
3,312,109 UART: [art] Populate DV Done
3,320,225 UART: [fht] FMC Alias Private Key: 7
3,321,167 UART: [art] Derive CDI
3,321,447 UART: [art] Store in in slot 0x4
3,406,882 UART: [art] Derive Key Pair
3,407,242 UART: [art] Store priv key in slot 0x5
3,420,142 UART: [art] Derive Key Pair - Done
3,434,876 UART: [art] Signing Cert with AUTHO
3,435,356 UART: RITY.KEYID = 7
3,450,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,451,083 UART: [art] PUB.X = 133633248694E55FB11A0094BF891A55F06FE3E929452F4C4B56D794E8BE313CDCA99B647F4F4C23A51C1C32B9FE5373
3,457,833 UART: [art] PUB.Y = 820ACFDCD48C0D77E229BA82ECA3276D6D4F09F2AF166112173D83C177A2AC7EB27BFB455CDE8890A0763D26A09BA5F9
3,464,790 UART: [art] SIG.R = 1A3D4D801D4033490307507E7C3E74C170C9DE3914E4C2E238AD1AAC5383F8438D66175C04F8579C4CC34F18D6B27978
3,471,547 UART: [art] SIG.S = D3BB3B8D8A58991C608E7EEE7D6F48F1F32473EE407C15A65662620D85450CC4A28EF398F5B7C746B1C5F8B643EF096E
3,495,397 UART: Caliptra RT
3,495,650 UART: [state] CFI Enabled
3,603,443 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,604,202 UART:
3,604,218 UART: Running Caliptra ROM ...
3,604,626 UART:
3,604,680 UART: [state] CFI Enabled
3,607,309 UART: [state] LifecycleState = Production
3,607,917 UART: [state] DebugLocked = Yes
3,608,487 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,610,085 UART: [kat] SHA2-256
4,404,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,408,131 UART: [kat] ++
4,408,283 UART: [kat] sha1
4,412,561 UART: [kat] SHA2-256
4,414,499 UART: [kat] SHA2-384
4,417,134 UART: [kat] SHA2-512-ACC
4,419,035 UART: [kat] ECC-384
4,424,424 UART: [kat] HMAC-384Kdf
4,428,974 UART: [kat] LMS
4,997,170 UART: [kat] --
4,998,156 UART: [warm-reset] ++
4,998,889 UART: [warm-reset] --
4,999,560 UART: [state] Locking Datavault
5,000,314 UART: [state] Locking PCR0, PCR1 and PCR31
5,000,918 UART: [state] Locking ICCM
5,001,346 UART: [exit] Launching FMC @ 0x40000130
5,006,675 UART:
5,006,691 UART: Running Caliptra FMC ...
5,007,099 UART:
5,007,153 UART: [state] CFI Enabled
5,008,382 UART: [aliasrt :skip pcr extension
5,008,855 UART: [art] Extend RT PCRs Done
5,009,283 UART: [art] Lock RT PCRs Done
5,010,790 UART: [art] Populate DV Done
5,018,926 UART: [fht] FMC Alias Private Key: 7
5,019,994 UART: [art] Derive CDI
5,020,274 UART: [art] Store in in slot 0x4
5,106,051 UART: [art] Derive Key Pair
5,106,411 UART: [art] Store priv key in slot 0x5
5,119,391 UART: [art] Derive Key Pair - Done
5,134,693 UART: [art] Signing Cert with AUTHO
5,135,173 UART: RITY.KEYID = 7
5,150,493 UART: [art] Erasing AUTHORITY.KEYID = 7
5,151,258 UART: [art] PUB.X = 133633248694E55FB11A0094BF891A55F06FE3E929452F4C4B56D794E8BE313CDCA99B647F4F4C23A51C1C32B9FE5373
5,158,008 UART: [art] PUB.Y = 820ACFDCD48C0D77E229BA82ECA3276D6D4F09F2AF166112173D83C177A2AC7EB27BFB455CDE8890A0763D26A09BA5F9
5,164,965 UART: [art] SIG.R = 1A3D4D801D4033490307507E7C3E74C170C9DE3914E4C2E238AD1AAC5383F8438D66175C04F8579C4CC34F18D6B27978
5,171,722 UART: [art] SIG.S = D3BB3B8D8A58991C608E7EEE7D6F48F1F32473EE407C15A65662620D85450CC4A28EF398F5B7C746B1C5F8B643EF096E
5,195,810 UART: Caliptra RT
5,196,063 UART: [state] CFI Enabled
5,478,250 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 ready_for_fw is high
1,362,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,952,015 >>> mbox cmd response: success
3,013,322 UART:
3,013,338 UART: Running Caliptra FMC ...
3,013,746 UART:
3,013,800 UART: [state] CFI Enabled
3,024,263 UART: [fht] FMC Alias Private Key: 7
3,131,388 UART: [art] Extend RT PCRs Done
3,131,816 UART: [art] Lock RT PCRs Done
3,133,738 UART: [art] Populate DV Done
3,141,990 UART: [fht] FMC Alias Private Key: 7
3,142,936 UART: [art] Derive CDI
3,143,216 UART: [art] Store in in slot 0x4
3,228,809 UART: [art] Derive Key Pair
3,229,169 UART: [art] Store priv key in slot 0x5
3,242,565 UART: [art] Derive Key Pair - Done
3,257,154 UART: [art] Signing Cert with AUTHO
3,257,634 UART: RITY.KEYID = 7
3,272,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,273,299 UART: [art] PUB.X = C57BFA89D8E93FE711A75368D85783EEC24F848184A6082E3C032F9AC7A796698D1C9216D884760EB93BFD1823D54980
3,280,058 UART: [art] PUB.Y = 072019D12A6A642CB661A4F3FF1BB68DEC8CD9F2BBFC0E474447D17E7C26A5DADA7AD3E1547CA4F945CA0720AA592894
3,287,017 UART: [art] SIG.R = 4C0B1008B64437B6C55E578D430D9282A79B4F78A569EBF6EABFA0D89F7F07A90451880FA3A43BF516A073D837F84DA3
3,293,775 UART: [art] SIG.S = B593D56EC566DE91E366460CDED0F5AA88D60181F0A99CF9EB3F12F7907B9D277FA7DE2A50C0AD4699DD4EF8C0046D74
3,317,829 UART: Caliptra RT
3,318,082 UART: [state] CFI Enabled
3,426,259 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,711,919 UART:
4,711,935 UART: Running Caliptra FMC ...
4,712,343 UART:
4,712,397 UART: [state] CFI Enabled
4,713,544 UART: [aliasrt :skip pcr extension
4,714,017 UART: [art] Extend RT PCRs Done
4,714,445 UART: [art] Lock RT PCRs Done
4,715,544 UART: [art] Populate DV Done
4,723,742 UART: [fht] FMC Alias Private Key: 7
4,724,730 UART: [art] Derive CDI
4,725,010 UART: [art] Store in in slot 0x4
4,810,253 UART: [art] Derive Key Pair
4,810,613 UART: [art] Store priv key in slot 0x5
4,823,915 UART: [art] Derive Key Pair - Done
4,838,340 UART: [art] Signing Cert with AUTHO
4,838,820 UART: RITY.KEYID = 7
4,854,380 UART: [art] Erasing AUTHORITY.KEYID = 7
4,855,145 UART: [art] PUB.X = C57BFA89D8E93FE711A75368D85783EEC24F848184A6082E3C032F9AC7A796698D1C9216D884760EB93BFD1823D54980
4,861,904 UART: [art] PUB.Y = 072019D12A6A642CB661A4F3FF1BB68DEC8CD9F2BBFC0E474447D17E7C26A5DADA7AD3E1547CA4F945CA0720AA592894
4,868,863 UART: [art] SIG.R = 4C0B1008B64437B6C55E578D430D9282A79B4F78A569EBF6EABFA0D89F7F07A90451880FA3A43BF516A073D837F84DA3
4,875,621 UART: [art] SIG.S = B593D56EC566DE91E366460CDED0F5AA88D60181F0A99CF9EB3F12F7907B9D277FA7DE2A50C0AD4699DD4EF8C0046D74
4,899,359 UART: Caliptra RT
4,899,612 UART: [state] CFI Enabled
5,181,241 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Production
86,154 UART: [state] DebugLocked = Yes
86,836 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,968 UART: [kat] SHA2-256
892,906 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,075 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,209 UART: [fht] Storing FHT @ 0x50003400
1,480,048 UART: [idev] ++
1,480,216 UART: [idev] CDI.KEYID = 6
1,480,576 UART: [idev] SUBJECT.KEYID = 7
1,481,000 UART: [idev] UDS.KEYID = 0
1,481,345 ready_for_fw is high
1,481,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,051 UART: [idev] Erasing UDS.KEYID = 0
1,505,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,159 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,521,756 UART: [ldev] Erasing FE.KEYID = 1
1,546,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,090 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,784 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,656 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,362 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,306 UART: [ldev] --
1,585,569 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 114332 bytes
2,910,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,102,992 >>> mbox cmd response: success
3,104,171 UART: [afmc] ++
3,104,339 UART: [afmc] CDI.KEYID = 6
3,104,701 UART: [afmc] SUBJECT.KEYID = 7
3,105,126 UART: [afmc] AUTHORITY.KEYID = 5
3,140,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,156,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,157,563 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,163,281 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,169,176 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,174,887 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,182,791 UART: [afmc] --
3,183,918 UART: [cold-reset] --
3,184,836 UART: [state] Locking Datavault
3,186,045 UART: [state] Locking PCR0, PCR1 and PCR31
3,186,649 UART: [state] Locking ICCM
3,187,245 UART: [exit] Launching FMC @ 0x40000130
3,192,574 UART:
3,192,590 UART: Running Caliptra FMC ...
3,192,998 UART:
3,193,141 UART: [state] CFI Enabled
3,203,552 UART: [fht] FMC Alias Private Key: 7
3,311,769 UART: [art] Extend RT PCRs Done
3,312,197 UART: [art] Lock RT PCRs Done
3,313,635 UART: [art] Populate DV Done
3,321,781 UART: [fht] FMC Alias Private Key: 7
3,322,937 UART: [art] Derive CDI
3,323,217 UART: [art] Store in in slot 0x4
3,409,282 UART: [art] Derive Key Pair
3,409,642 UART: [art] Store priv key in slot 0x5
3,422,772 UART: [art] Derive Key Pair - Done
3,437,215 UART: [art] Signing Cert with AUTHO
3,437,695 UART: RITY.KEYID = 7
3,453,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,454,002 UART: [art] PUB.X = FB4EA4C5D71788365F925B6EB0D3ADD44F7CF260484C1412DAFE9AF6EE03EB78BABDF554818E9DFF9EE4E69F21E5CF00
3,460,773 UART: [art] PUB.Y = BDF54364DA39E21B069E07D36C2626D2D8CD866B1DAB7FC3494D4E338B13DB9F8A3D8D798F122DAD9C84D03F5654EC7C
3,467,733 UART: [art] SIG.R = A184838F59F9EF5CAA924BDFB6CC7620EAA7B470DD2468ED0F686E41732A37D8247FB47859AA3EDBCA3E4386BEAD33A2
3,474,520 UART: [art] SIG.S = DD5E0DEC428780FC3A3AE7B4323506E70E29CFEFE296451005EED593693532942CC2C1357710AC530CED61A92E42FCF5
3,498,112 UART: Caliptra RT
3,498,457 UART: [state] CFI Enabled
3,607,151 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,607,910 UART:
3,607,926 UART: Running Caliptra ROM ...
3,608,334 UART:
3,608,475 UART: [state] CFI Enabled
3,610,720 UART: [state] LifecycleState = Production
3,611,328 UART: [state] DebugLocked = Yes
3,612,022 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,613,642 UART: [kat] SHA2-256
4,407,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,411,688 UART: [kat] ++
4,411,840 UART: [kat] sha1
4,416,088 UART: [kat] SHA2-256
4,418,026 UART: [kat] SHA2-384
4,420,883 UART: [kat] SHA2-512-ACC
4,422,784 UART: [kat] ECC-384
4,428,319 UART: [kat] HMAC-384Kdf
4,433,079 UART: [kat] LMS
5,001,275 UART: [kat] --
5,002,005 UART: [warm-reset] ++
5,003,182 UART: [warm-reset] --
5,004,039 UART: [state] Locking Datavault
5,004,861 UART: [state] Locking PCR0, PCR1 and PCR31
5,005,465 UART: [state] Locking ICCM
5,006,065 UART: [exit] Launching FMC @ 0x40000130
5,011,394 UART:
5,011,410 UART: Running Caliptra FMC ...
5,011,818 UART:
5,011,961 UART: [state] CFI Enabled
5,013,376 UART: [aliasrt :skip pcr extension
5,013,849 UART: [art] Extend RT PCRs Done
5,014,277 UART: [art] Lock RT PCRs Done
5,015,536 UART: [art] Populate DV Done
5,023,804 UART: [fht] FMC Alias Private Key: 7
5,024,782 UART: [art] Derive CDI
5,025,062 UART: [art] Store in in slot 0x4
5,110,733 UART: [art] Derive Key Pair
5,111,093 UART: [art] Store priv key in slot 0x5
5,125,005 UART: [art] Derive Key Pair - Done
5,139,798 UART: [art] Signing Cert with AUTHO
5,140,278 UART: RITY.KEYID = 7
5,155,298 UART: [art] Erasing AUTHORITY.KEYID = 7
5,156,063 UART: [art] PUB.X = FB4EA4C5D71788365F925B6EB0D3ADD44F7CF260484C1412DAFE9AF6EE03EB78BABDF554818E9DFF9EE4E69F21E5CF00
5,162,834 UART: [art] PUB.Y = BDF54364DA39E21B069E07D36C2626D2D8CD866B1DAB7FC3494D4E338B13DB9F8A3D8D798F122DAD9C84D03F5654EC7C
5,169,794 UART: [art] SIG.R = A184838F59F9EF5CAA924BDFB6CC7620EAA7B470DD2468ED0F686E41732A37D8247FB47859AA3EDBCA3E4386BEAD33A2
5,176,581 UART: [art] SIG.S = DD5E0DEC428780FC3A3AE7B4323506E70E29CFEFE296451005EED593693532942CC2C1357710AC530CED61A92E42FCF5
5,199,995 UART: Caliptra RT
5,200,340 UART: [state] CFI Enabled
5,485,144 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,527 ready_for_fw is high
1,362,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,953,287 >>> mbox cmd response: success
3,015,012 UART:
3,015,028 UART: Running Caliptra FMC ...
3,015,436 UART:
3,015,579 UART: [state] CFI Enabled
3,026,124 UART: [fht] FMC Alias Private Key: 7
3,133,439 UART: [art] Extend RT PCRs Done
3,133,867 UART: [art] Lock RT PCRs Done
3,135,297 UART: [art] Populate DV Done
3,143,557 UART: [fht] FMC Alias Private Key: 7
3,144,645 UART: [art] Derive CDI
3,144,925 UART: [art] Store in in slot 0x4
3,230,612 UART: [art] Derive Key Pair
3,230,972 UART: [art] Store priv key in slot 0x5
3,244,130 UART: [art] Derive Key Pair - Done
3,258,857 UART: [art] Signing Cert with AUTHO
3,259,337 UART: RITY.KEYID = 7
3,274,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,275,194 UART: [art] PUB.X = 3A7D78D7E1449AF45EC804D91979BF95F840232B140C8D58D404B2824A06FC9E7C73A7096FA33D8F74906FA66251E8C7
3,281,949 UART: [art] PUB.Y = DA5ADF5EBD1B528958B25F724D384D7EB32F039D62A705EECF1872C161490B0C8DD9F57C06DF1BB04B76455BE7BB1E99
3,288,900 UART: [art] SIG.R = 0ED6A1843325623B194216017E8C3360CE9C12D8A7432FCE59665867F756D08BE75D67A4AEC6090020C4EA7422B515D8
3,295,633 UART: [art] SIG.S = E20605215F0025D01068E1B1379658D4121BD2E35C0D97AFC365BC62F0529894E793BFDB9EBA79E27843956CD59BE097
3,319,283 UART: Caliptra RT
3,319,628 UART: [state] CFI Enabled
3,427,537 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,713,994 UART:
4,714,010 UART: Running Caliptra FMC ...
4,714,418 UART:
4,714,561 UART: [state] CFI Enabled
4,715,988 UART: [aliasrt :skip pcr extension
4,716,461 UART: [art] Extend RT PCRs Done
4,716,889 UART: [art] Lock RT PCRs Done
4,717,782 UART: [art] Populate DV Done
4,725,768 UART: [fht] FMC Alias Private Key: 7
4,726,866 UART: [art] Derive CDI
4,727,146 UART: [art] Store in in slot 0x4
4,812,837 UART: [art] Derive Key Pair
4,813,197 UART: [art] Store priv key in slot 0x5
4,826,541 UART: [art] Derive Key Pair - Done
4,841,542 UART: [art] Signing Cert with AUTHO
4,842,022 UART: RITY.KEYID = 7
4,857,358 UART: [art] Erasing AUTHORITY.KEYID = 7
4,858,123 UART: [art] PUB.X = 3A7D78D7E1449AF45EC804D91979BF95F840232B140C8D58D404B2824A06FC9E7C73A7096FA33D8F74906FA66251E8C7
4,864,878 UART: [art] PUB.Y = DA5ADF5EBD1B528958B25F724D384D7EB32F039D62A705EECF1872C161490B0C8DD9F57C06DF1BB04B76455BE7BB1E99
4,871,829 UART: [art] SIG.R = 0ED6A1843325623B194216017E8C3360CE9C12D8A7432FCE59665867F756D08BE75D67A4AEC6090020C4EA7422B515D8
4,878,562 UART: [art] SIG.S = E20605215F0025D01068E1B1379658D4121BD2E35C0D97AFC365BC62F0529894E793BFDB9EBA79E27843956CD59BE097
4,901,970 UART: Caliptra RT
4,902,315 UART: [state] CFI Enabled
5,184,264 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Production
85,589 UART: [state] DebugLocked = Yes
86,261 UART: [state] Starting the WD Timer 40000000 cycles
87,952 UART: [kat] SHA2-256
893,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,727 UART: [kat] ++
897,879 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,566 UART: [kat] LMS
1,170,894 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,853 UART: [idev] ++
1,175,021 UART: [idev] CDI.KEYID = 6
1,175,381 UART: [idev] SUBJECT.KEYID = 7
1,175,805 UART: [idev] UDS.KEYID = 0
1,176,150 ready_for_fw is high
1,176,150 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,548 UART: [idev] Erasing UDS.KEYID = 0
1,200,690 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,179 UART: [ldev] ++
1,210,347 UART: [ldev] CDI.KEYID = 6
1,210,710 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,045 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,739 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,611 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,317 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,558 UART: [ldev] --
1,282,913 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,914 >>> mbox cmd response: success
2,801,111 UART: [afmc] ++
2,801,279 UART: [afmc] CDI.KEYID = 6
2,801,641 UART: [afmc] SUBJECT.KEYID = 7
2,802,066 UART: [afmc] AUTHORITY.KEYID = 5
2,837,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,050 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,768 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,663 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,370 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,006 UART: [afmc] --
2,880,921 UART: [cold-reset] --
2,881,741 UART: [state] Locking Datavault
2,882,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,460 UART: [state] Locking ICCM
2,884,026 UART: [exit] Launching FMC @ 0x40000130
2,889,355 UART:
2,889,371 UART: Running Caliptra FMC ...
2,889,779 UART:
2,889,833 UART: [state] CFI Enabled
2,900,558 UART: [fht] FMC Alias Private Key: 7
3,008,349 UART: [art] Extend RT PCRs Done
3,008,777 UART: [art] Lock RT PCRs Done
3,010,025 UART: [art] Populate DV Done
3,018,281 UART: [fht] FMC Alias Private Key: 7
3,019,341 UART: [art] Derive CDI
3,019,621 UART: [art] Store in in slot 0x4
3,105,408 UART: [art] Derive Key Pair
3,105,768 UART: [art] Store priv key in slot 0x5
3,119,328 UART: [art] Derive Key Pair - Done
3,134,074 UART: [art] Signing Cert with AUTHO
3,134,554 UART: RITY.KEYID = 7
3,149,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,349 UART: [art] PUB.X = 80174FE793C80FF952B5462C0D8D9C8CB3A88FEFC8226A220A3EB1F27E7B8BF4A9EC4FF117BBBCE03874C4EFE57B3604
3,157,127 UART: [art] PUB.Y = 6017209928D4433036E4FC50F154CE2A5BA3289A74643D9F96794FD7B691950A10A3335795362734A9E9996990E0B757
3,164,056 UART: [art] SIG.R = 1609C0F85DF8B3FE29ADB905E02446E95BAC07373ABF108B814005725304DA547897254001C717B5B3A9FAA7F103FFF3
3,170,807 UART: [art] SIG.S = 664082881865DB2EBDEC7B8DF2CA9E98B9D9737C1CE88D1DF5CBB21172F8704C5D598DF8CCA8BE7CD80C6DC099FAEDE5
3,194,259 UART: Caliptra RT
3,194,512 UART: [state] CFI Enabled
3,301,834 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,590 UART:
3,302,606 UART: Running Caliptra ROM ...
3,303,014 UART:
3,303,069 UART: [state] CFI Enabled
3,305,674 UART: [state] LifecycleState = Production
3,306,282 UART: [state] DebugLocked = Yes
3,306,912 UART: [state] Starting the WD Timer 40000000 cycles
3,308,501 UART: [kat] SHA2-256
4,114,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,118,276 UART: [kat] ++
4,118,428 UART: [kat] sha1
4,122,748 UART: [kat] SHA2-256
4,124,688 UART: [kat] SHA2-384
4,127,349 UART: [kat] SHA2-512-ACC
4,129,250 UART: [kat] ECC-384
4,139,141 UART: [kat] HMAC-384Kdf
4,143,651 UART: [kat] LMS
4,391,979 UART: [kat] --
4,392,765 UART: [warm-reset] ++
4,393,594 UART: [warm-reset] --
4,394,321 UART: [state] Locking Datavault
4,395,117 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,721 UART: [state] Locking ICCM
4,396,191 UART: [exit] Launching FMC @ 0x40000130
4,401,520 UART:
4,401,536 UART: Running Caliptra FMC ...
4,401,944 UART:
4,401,998 UART: [state] CFI Enabled
4,403,393 UART: [aliasrt :skip pcr extension
4,403,866 UART: [art] Extend RT PCRs Done
4,404,294 UART: [art] Lock RT PCRs Done
4,405,603 UART: [art] Populate DV Done
4,413,751 UART: [fht] FMC Alias Private Key: 7
4,414,851 UART: [art] Derive CDI
4,415,131 UART: [art] Store in in slot 0x4
4,500,834 UART: [art] Derive Key Pair
4,501,194 UART: [art] Store priv key in slot 0x5
4,514,598 UART: [art] Derive Key Pair - Done
4,529,152 UART: [art] Signing Cert with AUTHO
4,529,632 UART: RITY.KEYID = 7
4,544,850 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,615 UART: [art] PUB.X = 80174FE793C80FF952B5462C0D8D9C8CB3A88FEFC8226A220A3EB1F27E7B8BF4A9EC4FF117BBBCE03874C4EFE57B3604
4,552,393 UART: [art] PUB.Y = 6017209928D4433036E4FC50F154CE2A5BA3289A74643D9F96794FD7B691950A10A3335795362734A9E9996990E0B757
4,559,322 UART: [art] SIG.R = 1609C0F85DF8B3FE29ADB905E02446E95BAC07373ABF108B814005725304DA547897254001C717B5B3A9FAA7F103FFF3
4,566,073 UART: [art] SIG.S = 664082881865DB2EBDEC7B8DF2CA9E98B9D9737C1CE88D1DF5CBB21172F8704C5D598DF8CCA8BE7CD80C6DC099FAEDE5
4,589,749 UART: Caliptra RT
4,590,002 UART: [state] CFI Enabled
4,870,028 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,812 ready_for_fw is high
1,061,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,651,851 >>> mbox cmd response: success
2,714,678 UART:
2,714,694 UART: Running Caliptra FMC ...
2,715,102 UART:
2,715,156 UART: [state] CFI Enabled
2,725,493 UART: [fht] FMC Alias Private Key: 7
2,833,856 UART: [art] Extend RT PCRs Done
2,834,284 UART: [art] Lock RT PCRs Done
2,835,770 UART: [art] Populate DV Done
2,843,932 UART: [fht] FMC Alias Private Key: 7
2,845,108 UART: [art] Derive CDI
2,845,388 UART: [art] Store in in slot 0x4
2,930,835 UART: [art] Derive Key Pair
2,931,195 UART: [art] Store priv key in slot 0x5
2,944,401 UART: [art] Derive Key Pair - Done
2,959,002 UART: [art] Signing Cert with AUTHO
2,959,482 UART: RITY.KEYID = 7
2,974,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,321 UART: [art] PUB.X = 9AD49B9FDEDF12D437E01F7B2A384F107495B405A5D4F2B9A739B536B8E5C83F2D27E32612BDD008DDE74EE161FDE520
2,982,099 UART: [art] PUB.Y = 40944745F57AD1AAD1C0AA88DAD77BA0F79D714DAB9F19B139894FF499811BE660AF38CFC72CDA228B9798502F9FF1B0
2,989,063 UART: [art] SIG.R = 49354D306BA8F9CE0F55598B72818E016F368D3708127D008CD7F8B772E266B140C0884E1C3BDD15174A3BF82769E1F6
2,995,798 UART: [art] SIG.S = E642F163380D1064E7F2BFCD359DC0B4587AB5926EACE3463A0803A8A98645706A8A1AF93E5CE7D3D15AC2A32849CA2A
3,019,984 UART: Caliptra RT
3,020,237 UART: [state] CFI Enabled
3,128,350 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,111,912 UART:
4,111,928 UART: Running Caliptra FMC ...
4,112,336 UART:
4,112,390 UART: [state] CFI Enabled
4,113,915 UART: [aliasrt :skip pcr extension
4,114,388 UART: [art] Extend RT PCRs Done
4,114,816 UART: [art] Lock RT PCRs Done
4,116,137 UART: [art] Populate DV Done
4,124,231 UART: [fht] FMC Alias Private Key: 7
4,125,225 UART: [art] Derive CDI
4,125,505 UART: [art] Store in in slot 0x4
4,211,210 UART: [art] Derive Key Pair
4,211,570 UART: [art] Store priv key in slot 0x5
4,224,890 UART: [art] Derive Key Pair - Done
4,239,647 UART: [art] Signing Cert with AUTHO
4,240,127 UART: RITY.KEYID = 7
4,255,351 UART: [art] Erasing AUTHORITY.KEYID = 7
4,256,116 UART: [art] PUB.X = 9AD49B9FDEDF12D437E01F7B2A384F107495B405A5D4F2B9A739B536B8E5C83F2D27E32612BDD008DDE74EE161FDE520
4,262,894 UART: [art] PUB.Y = 40944745F57AD1AAD1C0AA88DAD77BA0F79D714DAB9F19B139894FF499811BE660AF38CFC72CDA228B9798502F9FF1B0
4,269,858 UART: [art] SIG.R = 49354D306BA8F9CE0F55598B72818E016F368D3708127D008CD7F8B772E266B140C0884E1C3BDD15174A3BF82769E1F6
4,276,593 UART: [art] SIG.S = E642F163380D1064E7F2BFCD359DC0B4587AB5926EACE3463A0803A8A98645706A8A1AF93E5CE7D3D15AC2A32849CA2A
4,300,101 UART: Caliptra RT
4,300,354 UART: [state] CFI Enabled
4,585,293 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Production
86,020 UART: [state] DebugLocked = Yes
86,712 UART: [state] Starting the WD Timer 40000000 cycles
88,419 UART: [kat] SHA2-256
894,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,194 UART: [kat] ++
898,346 UART: [kat] sha1
902,718 UART: [kat] SHA2-256
904,658 UART: [kat] SHA2-384
907,451 UART: [kat] SHA2-512-ACC
909,352 UART: [kat] ECC-384
919,383 UART: [kat] HMAC-384Kdf
923,883 UART: [kat] LMS
1,172,211 UART: [kat] --
1,173,168 UART: [cold-reset] ++
1,173,647 UART: [fht] FHT @ 0x50003400
1,176,322 UART: [idev] ++
1,176,490 UART: [idev] CDI.KEYID = 6
1,176,850 UART: [idev] SUBJECT.KEYID = 7
1,177,274 UART: [idev] UDS.KEYID = 0
1,177,619 ready_for_fw is high
1,177,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,513 UART: [idev] Erasing UDS.KEYID = 0
1,202,607 UART: [idev] Sha1 KeyId Algorithm
1,211,074 UART: [idev] --
1,212,174 UART: [ldev] ++
1,212,342 UART: [ldev] CDI.KEYID = 6
1,212,705 UART: [ldev] SUBJECT.KEYID = 5
1,213,131 UART: [ldev] AUTHORITY.KEYID = 7
1,213,594 UART: [ldev] FE.KEYID = 1
1,218,636 UART: [ldev] Erasing FE.KEYID = 1
1,245,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,728 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,422 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,294 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,000 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,995 UART: [ldev] --
1,284,476 UART: [fwproc] Wait for Commands...
1,285,162 UART: [fwproc] Recv command 0x46574c44
1,285,890 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,801,047 >>> mbox cmd response: success
2,802,296 UART: [afmc] ++
2,802,464 UART: [afmc] CDI.KEYID = 6
2,802,826 UART: [afmc] SUBJECT.KEYID = 7
2,803,251 UART: [afmc] AUTHORITY.KEYID = 5
2,839,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,856,293 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,862,011 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,906 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,613 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,509 UART: [afmc] --
2,882,600 UART: [cold-reset] --
2,883,704 UART: [state] Locking Datavault
2,884,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,885,411 UART: [state] Locking ICCM
2,886,059 UART: [exit] Launching FMC @ 0x40000130
2,891,388 UART:
2,891,404 UART: Running Caliptra FMC ...
2,891,812 UART:
2,891,955 UART: [state] CFI Enabled
2,902,884 UART: [fht] FMC Alias Private Key: 7
3,010,813 UART: [art] Extend RT PCRs Done
3,011,241 UART: [art] Lock RT PCRs Done
3,012,785 UART: [art] Populate DV Done
3,020,779 UART: [fht] FMC Alias Private Key: 7
3,021,747 UART: [art] Derive CDI
3,022,027 UART: [art] Store in in slot 0x4
3,107,960 UART: [art] Derive Key Pair
3,108,320 UART: [art] Store priv key in slot 0x5
3,121,776 UART: [art] Derive Key Pair - Done
3,136,571 UART: [art] Signing Cert with AUTHO
3,137,051 UART: RITY.KEYID = 7
3,152,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,153,004 UART: [art] PUB.X = 386828717F75B09FA96C3E38B718982B536F45FD44D3941A5913D839011B5A9CC67AAE68B30C2970D808CDCBEE18A189
3,159,765 UART: [art] PUB.Y = 59CBA05FAB75423FA032C53084E795FDDA0F80618CFC50FA865B899F995E0C8235BCD6ED3E1D718771B650BC6637D05F
3,166,719 UART: [art] SIG.R = 510F773945752B26C0DB316BBB9DA6626099FB750FDB83F17A2A68640FB374E39EF9F3AD8B81CE5DC2838DC9FB3F9D7B
3,173,494 UART: [art] SIG.S = E36D4D21DC9545E585215C622E998C06479F20AFA6BCC8FACD0CC11F30AEB9DC986D58CF3ADBDBA5202C03C8FC4E724A
3,197,388 UART: Caliptra RT
3,197,733 UART: [state] CFI Enabled
3,306,160 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,306,916 UART:
3,306,932 UART: Running Caliptra ROM ...
3,307,340 UART:
3,307,482 UART: [state] CFI Enabled
3,310,829 UART: [state] LifecycleState = Production
3,311,437 UART: [state] DebugLocked = Yes
3,312,143 UART: [state] Starting the WD Timer 40000000 cycles
3,313,710 UART: [kat] SHA2-256
4,119,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,123,485 UART: [kat] ++
4,123,637 UART: [kat] sha1
4,127,895 UART: [kat] SHA2-256
4,129,835 UART: [kat] SHA2-384
4,132,600 UART: [kat] SHA2-512-ACC
4,134,501 UART: [kat] ECC-384
4,144,656 UART: [kat] HMAC-384Kdf
4,149,250 UART: [kat] LMS
4,397,578 UART: [kat] --
4,398,516 UART: [warm-reset] ++
4,399,601 UART: [warm-reset] --
4,400,688 UART: [state] Locking Datavault
4,401,582 UART: [state] Locking PCR0, PCR1 and PCR31
4,402,186 UART: [state] Locking ICCM
4,402,608 UART: [exit] Launching FMC @ 0x40000130
4,407,937 UART:
4,407,953 UART: Running Caliptra FMC ...
4,408,361 UART:
4,408,504 UART: [state] CFI Enabled
4,410,017 UART: [aliasrt :skip pcr extension
4,410,490 UART: [art] Extend RT PCRs Done
4,410,918 UART: [art] Lock RT PCRs Done
4,412,393 UART: [art] Populate DV Done
4,420,347 UART: [fht] FMC Alias Private Key: 7
4,421,385 UART: [art] Derive CDI
4,421,665 UART: [art] Store in in slot 0x4
4,507,670 UART: [art] Derive Key Pair
4,508,030 UART: [art] Store priv key in slot 0x5
4,521,306 UART: [art] Derive Key Pair - Done
4,536,377 UART: [art] Signing Cert with AUTHO
4,536,857 UART: RITY.KEYID = 7
4,552,247 UART: [art] Erasing AUTHORITY.KEYID = 7
4,553,012 UART: [art] PUB.X = 386828717F75B09FA96C3E38B718982B536F45FD44D3941A5913D839011B5A9CC67AAE68B30C2970D808CDCBEE18A189
4,559,773 UART: [art] PUB.Y = 59CBA05FAB75423FA032C53084E795FDDA0F80618CFC50FA865B899F995E0C8235BCD6ED3E1D718771B650BC6637D05F
4,566,727 UART: [art] SIG.R = 510F773945752B26C0DB316BBB9DA6626099FB750FDB83F17A2A68640FB374E39EF9F3AD8B81CE5DC2838DC9FB3F9D7B
4,573,502 UART: [art] SIG.S = E36D4D21DC9545E585215C622E998C06479F20AFA6BCC8FACD0CC11F30AEB9DC986D58CF3ADBDBA5202C03C8FC4E724A
4,597,888 UART: Caliptra RT
4,598,233 UART: [state] CFI Enabled
4,879,716 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 ready_for_fw is high
1,060,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,652,604 >>> mbox cmd response: success
2,715,313 UART:
2,715,329 UART: Running Caliptra FMC ...
2,715,737 UART:
2,715,880 UART: [state] CFI Enabled
2,726,113 UART: [fht] FMC Alias Private Key: 7
2,834,270 UART: [art] Extend RT PCRs Done
2,834,698 UART: [art] Lock RT PCRs Done
2,836,004 UART: [art] Populate DV Done
2,844,112 UART: [fht] FMC Alias Private Key: 7
2,845,160 UART: [art] Derive CDI
2,845,440 UART: [art] Store in in slot 0x4
2,931,125 UART: [art] Derive Key Pair
2,931,485 UART: [art] Store priv key in slot 0x5
2,944,201 UART: [art] Derive Key Pair - Done
2,959,199 UART: [art] Signing Cert with AUTHO
2,959,679 UART: RITY.KEYID = 7
2,974,777 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,542 UART: [art] PUB.X = 79F17B4EF8AF31259C8459EF50366624F57AC9A70967FA97546BE890940A5C01B9ADB6285CABDF1626372D3492906D60
2,982,301 UART: [art] PUB.Y = 96D8387619AEF6E942E8459981FB67280AB6FB0A3B821A1453CA1171F6B7CA5F86D94D5A217C98ABFAE804BB14298345
2,989,246 UART: [art] SIG.R = 44CC819CFE5423977745DC59D7D557FD5635D7F5CAD650D0CE4B3354181884F94DE4FD4115CBC9D990FA9F2BFA4A6600
2,996,004 UART: [art] SIG.S = D877FC552EDE7B4285BCD299845C74587145D14DB2B8250A5322D37CC811496C7D7EEDDAE668C9A92D2FEFDC1D6903A8
3,019,981 UART: Caliptra RT
3,020,326 UART: [state] CFI Enabled
3,128,581 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,112,172 UART:
4,112,188 UART: Running Caliptra FMC ...
4,112,596 UART:
4,112,739 UART: [state] CFI Enabled
4,114,052 UART: [aliasrt :skip pcr extension
4,114,525 UART: [art] Extend RT PCRs Done
4,114,953 UART: [art] Lock RT PCRs Done
4,116,054 UART: [art] Populate DV Done
4,124,166 UART: [fht] FMC Alias Private Key: 7
4,125,222 UART: [art] Derive CDI
4,125,502 UART: [art] Store in in slot 0x4
4,211,029 UART: [art] Derive Key Pair
4,211,389 UART: [art] Store priv key in slot 0x5
4,225,099 UART: [art] Derive Key Pair - Done
4,240,035 UART: [art] Signing Cert with AUTHO
4,240,515 UART: RITY.KEYID = 7
4,256,171 UART: [art] Erasing AUTHORITY.KEYID = 7
4,256,936 UART: [art] PUB.X = 79F17B4EF8AF31259C8459EF50366624F57AC9A70967FA97546BE890940A5C01B9ADB6285CABDF1626372D3492906D60
4,263,695 UART: [art] PUB.Y = 96D8387619AEF6E942E8459981FB67280AB6FB0A3B821A1453CA1171F6B7CA5F86D94D5A217C98ABFAE804BB14298345
4,270,640 UART: [art] SIG.R = 44CC819CFE5423977745DC59D7D557FD5635D7F5CAD650D0CE4B3354181884F94DE4FD4115CBC9D990FA9F2BFA4A6600
4,277,398 UART: [art] SIG.S = D877FC552EDE7B4285BCD299845C74587145D14DB2B8250A5322D37CC811496C7D7EEDDAE668C9A92D2FEFDC1D6903A8
4,301,287 UART: Caliptra RT
4,301,632 UART: [state] CFI Enabled
4,582,363 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,861 UART: [state] LifecycleState = Production
85,469 UART: [state] DebugLocked = Yes
86,177 UART: [state] Starting the WD Timer 40000000 cycles
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,614 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,878 UART: [idev] ++
1,173,046 UART: [idev] CDI.KEYID = 6
1,173,407 UART: [idev] SUBJECT.KEYID = 7
1,173,832 UART: [idev] UDS.KEYID = 0
1,174,178 ready_for_fw is high
1,174,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,542 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,240,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,687 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,381 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,251 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,957 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,047 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,128 UART: [fwproc] Recv command 0x46574c44
1,281,861 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,016 >>> mbox cmd response: success
2,798,202 UART: [afmc] ++
2,798,370 UART: [afmc] CDI.KEYID = 6
2,798,733 UART: [afmc] SUBJECT.KEYID = 7
2,799,159 UART: [afmc] AUTHORITY.KEYID = 5
2,833,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,465 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,184 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,077 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,784 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,759 UART: [afmc] --
2,876,868 UART: [cold-reset] --
2,877,604 UART: [state] Locking Datavault
2,878,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,275 UART: [state] Locking ICCM
2,879,841 UART: [exit] Launching FMC @ 0x40000130
2,885,170 UART:
2,885,186 UART: Running Caliptra FMC ...
2,885,594 UART:
2,885,648 UART: [state] CFI Enabled
2,896,487 UART: [fht] FMC Alias Private Key: 7
3,004,290 UART: [art] Extend RT PCRs Done
3,004,718 UART: [art] Lock RT PCRs Done
3,006,218 UART: [art] Populate DV Done
3,014,290 UART: [fht] FMC Alias Private Key: 7
3,015,234 UART: [art] Derive CDI
3,015,514 UART: [art] Store in in slot 0x4
3,101,261 UART: [art] Derive Key Pair
3,101,621 UART: [art] Store priv key in slot 0x5
3,114,447 UART: [art] Derive Key Pair - Done
3,129,440 UART: [art] Signing Cert with AUTHO
3,129,920 UART: RITY.KEYID = 7
3,144,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,527 UART: [art] PUB.X = 7094E6A7FB09BD338BB3C9D77D4AAA1B401F5763EE4E06A6C7E18BA5A212E595794838D56EFEC260974DCD8000EF7E30
3,152,281 UART: [art] PUB.Y = 5789D5EAA5BBCF2CD128468E562BADDA9D49B4543EAFC26A5CB23DB40ED95C92CEC9B80E99FA3473D5A6BFF8E482FE79
3,159,253 UART: [art] SIG.R = 6D7C5B6A1ABE9214293D90B1FD7D9184294C17B3FA0F1CF3B19B64A14B658DB037B6E4D69F86DFAF0D56B13A9DA9C2ED
3,166,037 UART: [art] SIG.S = 4D8CA1253442B0FB725ACAEEFF5046A8EF1825500F75B80599CF08B0F798AA4373AE5B9213AE15CE01A85559A5CE142D
3,189,878 UART: Caliptra RT
3,190,131 UART: [state] CFI Enabled
3,298,305 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,061 UART:
3,299,077 UART: Running Caliptra ROM ...
3,299,485 UART:
3,299,540 UART: [state] CFI Enabled
3,301,999 UART: [state] LifecycleState = Production
3,302,607 UART: [state] DebugLocked = Yes
3,303,267 UART: [state] Starting the WD Timer 40000000 cycles
3,304,920 UART: [kat] SHA2-256
4,108,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,599 UART: [kat] ++
4,112,751 UART: [kat] sha1
4,117,025 UART: [kat] SHA2-256
4,118,965 UART: [kat] SHA2-384
4,121,712 UART: [kat] SHA2-512-ACC
4,123,613 UART: [kat] ECC-384
4,133,196 UART: [kat] HMAC-384Kdf
4,137,588 UART: [kat] LMS
4,385,900 UART: [kat] --
4,386,690 UART: [warm-reset] ++
4,387,281 UART: [warm-reset] --
4,387,918 UART: [state] Locking Datavault
4,388,598 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,202 UART: [state] Locking ICCM
4,389,796 UART: [exit] Launching FMC @ 0x40000130
4,395,125 UART:
4,395,141 UART: Running Caliptra FMC ...
4,395,549 UART:
4,395,603 UART: [state] CFI Enabled
4,396,906 UART: [aliasrt :skip pcr extension
4,397,379 UART: [art] Extend RT PCRs Done
4,397,807 UART: [art] Lock RT PCRs Done
4,398,978 UART: [art] Populate DV Done
4,407,202 UART: [fht] FMC Alias Private Key: 7
4,408,234 UART: [art] Derive CDI
4,408,514 UART: [art] Store in in slot 0x4
4,494,555 UART: [art] Derive Key Pair
4,494,915 UART: [art] Store priv key in slot 0x5
4,508,319 UART: [art] Derive Key Pair - Done
4,523,130 UART: [art] Signing Cert with AUTHO
4,523,610 UART: RITY.KEYID = 7
4,538,572 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,337 UART: [art] PUB.X = 7094E6A7FB09BD338BB3C9D77D4AAA1B401F5763EE4E06A6C7E18BA5A212E595794838D56EFEC260974DCD8000EF7E30
4,546,091 UART: [art] PUB.Y = 5789D5EAA5BBCF2CD128468E562BADDA9D49B4543EAFC26A5CB23DB40ED95C92CEC9B80E99FA3473D5A6BFF8E482FE79
4,553,063 UART: [art] SIG.R = 6D7C5B6A1ABE9214293D90B1FD7D9184294C17B3FA0F1CF3B19B64A14B658DB037B6E4D69F86DFAF0D56B13A9DA9C2ED
4,559,847 UART: [art] SIG.S = 4D8CA1253442B0FB725ACAEEFF5046A8EF1825500F75B80599CF08B0F798AA4373AE5B9213AE15CE01A85559A5CE142D
4,583,472 UART: Caliptra RT
4,583,725 UART: [state] CFI Enabled
4,863,625 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,378 >>> mbox cmd response: success
2,709,477 UART:
2,709,493 UART: Running Caliptra FMC ...
2,709,901 UART:
2,709,955 UART: [state] CFI Enabled
2,720,188 UART: [fht] FMC Alias Private Key: 7
2,828,673 UART: [art] Extend RT PCRs Done
2,829,101 UART: [art] Lock RT PCRs Done
2,830,781 UART: [art] Populate DV Done
2,838,637 UART: [fht] FMC Alias Private Key: 7
2,839,765 UART: [art] Derive CDI
2,840,045 UART: [art] Store in in slot 0x4
2,925,538 UART: [art] Derive Key Pair
2,925,898 UART: [art] Store priv key in slot 0x5
2,938,816 UART: [art] Derive Key Pair - Done
2,953,603 UART: [art] Signing Cert with AUTHO
2,954,083 UART: RITY.KEYID = 7
2,969,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,424 UART: [art] PUB.X = DBF86F4B6E017CB9012F0B9379A797314651760400656B9F3BE7C9EABC403295F233839A8A31E4771E747A16D6615C10
2,977,154 UART: [art] PUB.Y = 6898BB8E528026030CF38B83CE79E4B513BFC44FA9DF440AEBD0D8AC3AB8A02BB5A371FBC50A4CC528562AD83BEFB675
2,984,114 UART: [art] SIG.R = F9B5E00D99C7142E55777055E36F832C20FBD938EC5EAC0CAD3C76D7DCF35FAADE23D96404543C0182982EF32EEEC70A
2,990,885 UART: [art] SIG.S = 3B5EA5B087CE091895F2D2C04CA3DC4F3A9B5862D2C96763A94EBF7AF36A9245CA2B3C89ABCC898DDE6EF153CB241FFC
3,014,423 UART: Caliptra RT
3,014,676 UART: [state] CFI Enabled
3,122,237 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,101,519 UART:
4,101,535 UART: Running Caliptra FMC ...
4,101,943 UART:
4,101,997 UART: [state] CFI Enabled
4,103,402 UART: [aliasrt :skip pcr extension
4,103,875 UART: [art] Extend RT PCRs Done
4,104,303 UART: [art] Lock RT PCRs Done
4,105,366 UART: [art] Populate DV Done
4,113,532 UART: [fht] FMC Alias Private Key: 7
4,114,546 UART: [art] Derive CDI
4,114,826 UART: [art] Store in in slot 0x4
4,200,599 UART: [art] Derive Key Pair
4,200,959 UART: [art] Store priv key in slot 0x5
4,214,265 UART: [art] Derive Key Pair - Done
4,229,060 UART: [art] Signing Cert with AUTHO
4,229,540 UART: RITY.KEYID = 7
4,244,442 UART: [art] Erasing AUTHORITY.KEYID = 7
4,245,207 UART: [art] PUB.X = DBF86F4B6E017CB9012F0B9379A797314651760400656B9F3BE7C9EABC403295F233839A8A31E4771E747A16D6615C10
4,251,937 UART: [art] PUB.Y = 6898BB8E528026030CF38B83CE79E4B513BFC44FA9DF440AEBD0D8AC3AB8A02BB5A371FBC50A4CC528562AD83BEFB675
4,258,897 UART: [art] SIG.R = F9B5E00D99C7142E55777055E36F832C20FBD938EC5EAC0CAD3C76D7DCF35FAADE23D96404543C0182982EF32EEEC70A
4,265,668 UART: [art] SIG.S = 3B5EA5B087CE091895F2D2C04CA3DC4F3A9B5862D2C96763A94EBF7AF36A9245CA2B3C89ABCC898DDE6EF153CB241FFC
4,289,522 UART: Caliptra RT
4,289,775 UART: [state] CFI Enabled
4,572,820 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Production
85,696 UART: [state] DebugLocked = Yes
86,250 UART: [state] Starting the WD Timer 40000000 cycles
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 ready_for_fw is high
1,174,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,664 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,466 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,428 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,298 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,004 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,112 UART: [ldev] --
1,281,600 UART: [fwproc] Wait for Commands...
1,282,265 UART: [fwproc] Recv command 0x46574c44
1,282,998 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,183 >>> mbox cmd response: success
2,797,351 UART: [afmc] ++
2,797,519 UART: [afmc] CDI.KEYID = 6
2,797,882 UART: [afmc] SUBJECT.KEYID = 7
2,798,308 UART: [afmc] AUTHORITY.KEYID = 5
2,833,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,506 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,225 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,118 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,825 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,628 UART: [afmc] --
2,877,609 UART: [cold-reset] --
2,878,337 UART: [state] Locking Datavault
2,879,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,282 UART: [state] Locking ICCM
2,880,924 UART: [exit] Launching FMC @ 0x40000130
2,886,253 UART:
2,886,269 UART: Running Caliptra FMC ...
2,886,677 UART:
2,886,820 UART: [state] CFI Enabled
2,897,365 UART: [fht] FMC Alias Private Key: 7
3,005,330 UART: [art] Extend RT PCRs Done
3,005,758 UART: [art] Lock RT PCRs Done
3,007,242 UART: [art] Populate DV Done
3,015,438 UART: [fht] FMC Alias Private Key: 7
3,016,518 UART: [art] Derive CDI
3,016,798 UART: [art] Store in in slot 0x4
3,102,455 UART: [art] Derive Key Pair
3,102,815 UART: [art] Store priv key in slot 0x5
3,116,073 UART: [art] Derive Key Pair - Done
3,130,801 UART: [art] Signing Cert with AUTHO
3,131,281 UART: RITY.KEYID = 7
3,146,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,160 UART: [art] PUB.X = 7820BCD21B491407B415054F3CB9BCFAD0684F8CC700D7F9619825FDAD8DEA38D589F362AE9446D1B657E8FDF61D67BA
3,153,916 UART: [art] PUB.Y = 0E87C1B1439DF4E4E2B27C0E66AE63E8DF5A5E6C591BF073D358AFE90938D009F0ABFD49682F26AD86DBD7C0564C86C8
3,160,870 UART: [art] SIG.R = 42DE493E6DD812F689A62AC90C7778483C876C8F7E596FDBEF386F5515D833229F8407B3D4BF92F48EFAA8B72D63677C
3,167,640 UART: [art] SIG.S = 99D407711FC5D6983A655F5B66952E867C2760572AC83236828BE00DD96ADB6059A7895BA341FF39C18E0C61C10B6CAD
3,191,583 UART: Caliptra RT
3,191,928 UART: [state] CFI Enabled
3,300,533 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,289 UART:
3,301,305 UART: Running Caliptra ROM ...
3,301,713 UART:
3,301,855 UART: [state] CFI Enabled
3,304,572 UART: [state] LifecycleState = Production
3,305,180 UART: [state] DebugLocked = Yes
3,305,880 UART: [state] Starting the WD Timer 40000000 cycles
3,307,589 UART: [kat] SHA2-256
4,111,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,268 UART: [kat] ++
4,115,420 UART: [kat] sha1
4,119,720 UART: [kat] SHA2-256
4,121,660 UART: [kat] SHA2-384
4,124,211 UART: [kat] SHA2-512-ACC
4,126,112 UART: [kat] ECC-384
4,135,859 UART: [kat] HMAC-384Kdf
4,140,657 UART: [kat] LMS
4,388,969 UART: [kat] --
4,390,053 UART: [warm-reset] ++
4,390,984 UART: [warm-reset] --
4,391,929 UART: [state] Locking Datavault
4,392,695 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,299 UART: [state] Locking ICCM
4,393,921 UART: [exit] Launching FMC @ 0x40000130
4,399,250 UART:
4,399,266 UART: Running Caliptra FMC ...
4,399,674 UART:
4,399,817 UART: [state] CFI Enabled
4,401,018 UART: [aliasrt :skip pcr extension
4,401,491 UART: [art] Extend RT PCRs Done
4,401,919 UART: [art] Lock RT PCRs Done
4,403,128 UART: [art] Populate DV Done
4,411,090 UART: [fht] FMC Alias Private Key: 7
4,412,192 UART: [art] Derive CDI
4,412,472 UART: [art] Store in in slot 0x4
4,498,069 UART: [art] Derive Key Pair
4,498,429 UART: [art] Store priv key in slot 0x5
4,511,063 UART: [art] Derive Key Pair - Done
4,525,889 UART: [art] Signing Cert with AUTHO
4,526,369 UART: RITY.KEYID = 7
4,541,479 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,244 UART: [art] PUB.X = 7820BCD21B491407B415054F3CB9BCFAD0684F8CC700D7F9619825FDAD8DEA38D589F362AE9446D1B657E8FDF61D67BA
4,549,000 UART: [art] PUB.Y = 0E87C1B1439DF4E4E2B27C0E66AE63E8DF5A5E6C591BF073D358AFE90938D009F0ABFD49682F26AD86DBD7C0564C86C8
4,555,954 UART: [art] SIG.R = 42DE493E6DD812F689A62AC90C7778483C876C8F7E596FDBEF386F5515D833229F8407B3D4BF92F48EFAA8B72D63677C
4,562,724 UART: [art] SIG.S = 99D407711FC5D6983A655F5B66952E867C2760572AC83236828BE00DD96ADB6059A7895BA341FF39C18E0C61C10B6CAD
4,586,457 UART: Caliptra RT
4,586,802 UART: [state] CFI Enabled
4,869,131 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,282 ready_for_fw is high
1,056,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,243 >>> mbox cmd response: success
2,711,690 UART:
2,711,706 UART: Running Caliptra FMC ...
2,712,114 UART:
2,712,257 UART: [state] CFI Enabled
2,722,494 UART: [fht] FMC Alias Private Key: 7
2,830,191 UART: [art] Extend RT PCRs Done
2,830,619 UART: [art] Lock RT PCRs Done
2,832,569 UART: [art] Populate DV Done
2,841,045 UART: [fht] FMC Alias Private Key: 7
2,841,977 UART: [art] Derive CDI
2,842,257 UART: [art] Store in in slot 0x4
2,928,212 UART: [art] Derive Key Pair
2,928,572 UART: [art] Store priv key in slot 0x5
2,942,122 UART: [art] Derive Key Pair - Done
2,956,706 UART: [art] Signing Cert with AUTHO
2,957,186 UART: RITY.KEYID = 7
2,972,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,973,703 UART: [art] PUB.X = 8F2A3976629E7D01705C2C456D9376C3573B9A40767F124B26B962D2383B635810E17BC7F5E872A31D7E4AC354368774
2,980,458 UART: [art] PUB.Y = 766A31AC3F5871397C5CD5A6AB154C82B388A4CD4F6A26EC4ABDDD3068A9FCB4A1CEC7F4420A7E99E43F6532B9005A37
2,987,399 UART: [art] SIG.R = B1191C1B9E5B4C1DF40E6EF75D178FE9E01693103BADBCEA12641903D5CE14C0BB38B585826643AFDFB2F7F99FD2AA7E
2,994,183 UART: [art] SIG.S = 9118C14205DB22DDB07E71543333A3A3A5F492425007EFF1DE83AA60C3F37DC7E12208B0F65BD8CED12FBBBEF8680F26
3,018,028 UART: Caliptra RT
3,018,373 UART: [state] CFI Enabled
3,125,524 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,104,423 UART:
4,104,439 UART: Running Caliptra FMC ...
4,104,847 UART:
4,104,990 UART: [state] CFI Enabled
4,106,441 UART: [aliasrt :skip pcr extension
4,106,914 UART: [art] Extend RT PCRs Done
4,107,342 UART: [art] Lock RT PCRs Done
4,108,747 UART: [art] Populate DV Done
4,117,265 UART: [fht] FMC Alias Private Key: 7
4,118,439 UART: [art] Derive CDI
4,118,719 UART: [art] Store in in slot 0x4
4,204,662 UART: [art] Derive Key Pair
4,205,022 UART: [art] Store priv key in slot 0x5
4,218,296 UART: [art] Derive Key Pair - Done
4,232,818 UART: [art] Signing Cert with AUTHO
4,233,298 UART: RITY.KEYID = 7
4,248,504 UART: [art] Erasing AUTHORITY.KEYID = 7
4,249,269 UART: [art] PUB.X = 8F2A3976629E7D01705C2C456D9376C3573B9A40767F124B26B962D2383B635810E17BC7F5E872A31D7E4AC354368774
4,256,024 UART: [art] PUB.Y = 766A31AC3F5871397C5CD5A6AB154C82B388A4CD4F6A26EC4ABDDD3068A9FCB4A1CEC7F4420A7E99E43F6532B9005A37
4,262,965 UART: [art] SIG.R = B1191C1B9E5B4C1DF40E6EF75D178FE9E01693103BADBCEA12641903D5CE14C0BB38B585826643AFDFB2F7F99FD2AA7E
4,269,749 UART: [art] SIG.S = 9118C14205DB22DDB07E71543333A3A3A5F492425007EFF1DE83AA60C3F37DC7E12208B0F65BD8CED12FBBBEF8680F26
4,293,602 UART: Caliptra RT
4,293,947 UART: [state] CFI Enabled
4,576,610 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Production
85,981 UART: [state] DebugLocked = Yes
86,593 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
906,888 UART: [kat] LMS
1,475,084 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,130 UART:
1,481,146 UART: Running Caliptra ROM ...
1,481,554 UART:
1,481,608 UART: [state] CFI Enabled
1,484,655 UART: [state] LifecycleState = Production
1,485,263 UART: [state] DebugLocked = Yes
1,485,861 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,647 UART: [kat] SHA2-256
2,281,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,693 UART: [kat] ++
2,285,845 UART: [kat] sha1
2,289,975 UART: [kat] SHA2-256
2,291,913 UART: [kat] SHA2-384
2,294,666 UART: [kat] SHA2-512-ACC
2,296,567 UART: [kat] ECC-384
2,302,072 UART: [kat] HMAC-384Kdf
2,306,712 UART: [kat] LMS
2,874,908 UART: [kat] --
2,875,670 UART: [warm-reset] ++
2,875,941 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,384 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Production
85,372 UART: [state] DebugLocked = Yes
85,962 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,754 UART: [kat] SHA2-256
881,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,800 UART: [kat] ++
885,952 UART: [kat] sha1
890,078 UART: [kat] SHA2-256
892,016 UART: [kat] SHA2-384
894,829 UART: [kat] SHA2-512-ACC
896,730 UART: [kat] ECC-384
902,573 UART: [kat] HMAC-384Kdf
907,231 UART: [kat] LMS
1,475,427 UART: [kat] --
1,476,284 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,765 UART:
1,480,781 UART: Running Caliptra ROM ...
1,481,189 UART:
1,481,330 UART: [state] CFI Enabled
1,483,867 UART: [state] LifecycleState = Production
1,484,475 UART: [state] DebugLocked = Yes
1,485,079 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,747 UART: [kat] SHA2-256
2,280,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,284,793 UART: [kat] ++
2,284,945 UART: [kat] sha1
2,289,221 UART: [kat] SHA2-256
2,291,159 UART: [kat] SHA2-384
2,293,912 UART: [kat] SHA2-512-ACC
2,295,813 UART: [kat] ECC-384
2,301,586 UART: [kat] HMAC-384Kdf
2,306,294 UART: [kat] LMS
2,874,490 UART: [kat] --
2,875,138 UART: [warm-reset] ++
2,875,409 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,676 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Production
85,977 UART: [state] DebugLocked = Yes
86,493 UART: [state] Starting the WD Timer 40000000 cycles
88,024 UART: [kat] SHA2-256
893,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,799 UART: [kat] ++
897,951 UART: [kat] sha1
902,187 UART: [kat] SHA2-256
904,127 UART: [kat] SHA2-384
907,102 UART: [kat] SHA2-512-ACC
909,003 UART: [kat] ECC-384
919,104 UART: [kat] HMAC-384Kdf
923,802 UART: [kat] LMS
1,172,130 UART: [kat] --
1,172,905 UART: [cold-reset] ++
1,173,362 UART: [fht] FHT @ 0x50003400
1,176,003 UART: [idev] ++
1,176,171 UART: [idev] CDI.KEYID = 6
1,176,531 UART: [idev] SUBJECT.KEYID = 7
1,176,955 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,393 UART:
1,177,409 UART: Running Caliptra ROM ...
1,177,817 UART:
1,177,872 UART: [state] CFI Enabled
1,180,643 UART: [state] LifecycleState = Production
1,181,251 UART: [state] DebugLocked = Yes
1,181,903 UART: [state] Starting the WD Timer 40000000 cycles
1,183,370 UART: [kat] SHA2-256
1,989,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,145 UART: [kat] ++
1,993,297 UART: [kat] sha1
1,997,759 UART: [kat] SHA2-256
1,999,699 UART: [kat] SHA2-384
2,002,452 UART: [kat] SHA2-512-ACC
2,004,353 UART: [kat] ECC-384
2,014,312 UART: [kat] HMAC-384Kdf
2,018,886 UART: [kat] LMS
2,267,214 UART: [kat] --
2,268,290 UART: [warm-reset] ++
2,268,561 UART: [warm-reset] Prev Cold-Reset failed
2,269,646 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,814 UART: [state] LifecycleState = Production
86,422 UART: [state] DebugLocked = Yes
87,076 UART: [state] Starting the WD Timer 40000000 cycles
88,719 UART: [kat] SHA2-256
894,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,494 UART: [kat] ++
898,646 UART: [kat] sha1
902,896 UART: [kat] SHA2-256
904,836 UART: [kat] SHA2-384
907,693 UART: [kat] SHA2-512-ACC
909,594 UART: [kat] ECC-384
919,373 UART: [kat] HMAC-384Kdf
923,905 UART: [kat] LMS
1,172,233 UART: [kat] --
1,173,092 UART: [cold-reset] ++
1,173,457 UART: [fht] FHT @ 0x50003400
1,175,910 UART: [idev] ++
1,176,078 UART: [idev] CDI.KEYID = 6
1,176,438 UART: [idev] SUBJECT.KEYID = 7
1,176,862 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,300 UART:
1,177,316 UART: Running Caliptra ROM ...
1,177,724 UART:
1,177,866 UART: [state] CFI Enabled
1,180,641 UART: [state] LifecycleState = Production
1,181,249 UART: [state] DebugLocked = Yes
1,181,877 UART: [state] Starting the WD Timer 40000000 cycles
1,183,454 UART: [kat] SHA2-256
1,989,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,229 UART: [kat] ++
1,993,381 UART: [kat] sha1
1,997,425 UART: [kat] SHA2-256
1,999,365 UART: [kat] SHA2-384
2,002,054 UART: [kat] SHA2-512-ACC
2,003,955 UART: [kat] ECC-384
2,013,962 UART: [kat] HMAC-384Kdf
2,018,520 UART: [kat] LMS
2,266,848 UART: [kat] --
2,267,556 UART: [warm-reset] ++
2,267,827 UART: [warm-reset] Prev Cold-Reset failed
2,268,804 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Production
85,793 UART: [state] DebugLocked = Yes
86,423 UART: [state] Starting the WD Timer 40000000 cycles
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,219 UART: [kat] SHA2-256
902,159 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,861 UART:
1,174,877 UART: Running Caliptra ROM ...
1,175,285 UART:
1,175,340 UART: [state] CFI Enabled
1,177,677 UART: [state] LifecycleState = Production
1,178,285 UART: [state] DebugLocked = Yes
1,179,005 UART: [state] Starting the WD Timer 40000000 cycles
1,180,594 UART: [kat] SHA2-256
1,984,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,273 UART: [kat] ++
1,988,425 UART: [kat] sha1
1,992,665 UART: [kat] SHA2-256
1,994,605 UART: [kat] SHA2-384
1,997,458 UART: [kat] SHA2-512-ACC
1,999,359 UART: [kat] ECC-384
2,008,796 UART: [kat] HMAC-384Kdf
2,013,354 UART: [kat] LMS
2,261,666 UART: [kat] --
2,262,612 UART: [warm-reset] ++
2,262,880 UART: [warm-reset] Prev Cold-Reset failed
2,263,985 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Production
86,100 UART: [state] DebugLocked = Yes
86,630 UART: [state] Starting the WD Timer 40000000 cycles
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,473 UART: [kat] LMS
1,169,785 UART: [kat] --
1,170,708 UART: [cold-reset] ++
1,171,193 UART: [fht] FHT @ 0x50003400
1,173,961 UART: [idev] ++
1,174,129 UART: [idev] CDI.KEYID = 6
1,174,490 UART: [idev] SUBJECT.KEYID = 7
1,174,915 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,354 UART:
1,175,370 UART: Running Caliptra ROM ...
1,175,778 UART:
1,175,920 UART: [state] CFI Enabled
1,178,435 UART: [state] LifecycleState = Production
1,179,043 UART: [state] DebugLocked = Yes
1,179,719 UART: [state] Starting the WD Timer 40000000 cycles
1,181,372 UART: [kat] SHA2-256
1,984,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,051 UART: [kat] ++
1,989,203 UART: [kat] sha1
1,993,199 UART: [kat] SHA2-256
1,995,139 UART: [kat] SHA2-384
1,997,880 UART: [kat] SHA2-512-ACC
1,999,781 UART: [kat] ECC-384
2,009,454 UART: [kat] HMAC-384Kdf
2,013,958 UART: [kat] LMS
2,262,270 UART: [kat] --
2,262,938 UART: [warm-reset] ++
2,263,206 UART: [warm-reset] Prev Cold-Reset failed
2,264,303 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,745 UART: [kat] SHA2-256
881,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,791 UART: [kat] ++
885,943 UART: [kat] sha1
890,089 UART: [kat] SHA2-256
892,027 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,515 UART: [fht] Storing FHT @ 0x50003400
1,479,286 UART: [idev] ++
1,479,454 UART: [idev] CDI.KEYID = 6
1,479,814 UART: [idev] SUBJECT.KEYID = 7
1,480,238 UART: [idev] UDS.KEYID = 0
1,480,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,504,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,470 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,546,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,870 UART: [ldev] --
1,585,211 UART: [fwproc] Waiting for Commands...
1,585,998 UART: [fwproc] Received command 0x46574c44
1,586,789 UART: [fwproc] Received Image of size 114332 bytes
2,882,723 UART: ROM Fatal Error: 0x000B0016
2,883,880 >>> mbox cmd response: failed
2,883,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,886 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,736,850 >>> mbox cmd response: failed
2,736,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,856 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,220 UART: [kat] SHA2-256
882,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,266 UART: [kat] ++
886,418 UART: [kat] sha1
890,516 UART: [kat] SHA2-256
892,454 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,651 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,164 UART: [ldev] ++
1,515,332 UART: [ldev] CDI.KEYID = 6
1,515,695 UART: [ldev] SUBJECT.KEYID = 5
1,516,121 UART: [ldev] AUTHORITY.KEYID = 7
1,516,584 UART: [ldev] FE.KEYID = 1
1,521,600 UART: [ldev] Erasing FE.KEYID = 1
1,547,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,865 UART: [ldev] --
1,586,148 UART: [fwproc] Waiting for Commands...
1,586,859 UART: [fwproc] Received command 0x46574c44
1,587,650 UART: [fwproc] Received Image of size 114332 bytes
2,883,384 UART: ROM Fatal Error: 0x000B0016
2,884,541 >>> mbox cmd response: failed
2,884,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,547 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,596 >>> mbox cmd response: failed
2,738,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,602 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
892,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,115 UART: [kat] ++
897,267 UART: [kat] sha1
901,413 UART: [kat] SHA2-256
903,353 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,172,153 UART: [cold-reset] ++
1,172,695 UART: [fht] FHT @ 0x50003400
1,175,324 UART: [idev] ++
1,175,492 UART: [idev] CDI.KEYID = 6
1,175,852 UART: [idev] SUBJECT.KEYID = 7
1,176,276 UART: [idev] UDS.KEYID = 0
1,176,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,346 UART: [idev] Erasing UDS.KEYID = 0
1,201,009 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,635 UART: [ldev] ++
1,210,803 UART: [ldev] CDI.KEYID = 6
1,211,166 UART: [ldev] SUBJECT.KEYID = 5
1,211,592 UART: [ldev] AUTHORITY.KEYID = 7
1,212,055 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,591 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,584 UART: [fwproc] Recv command 0x46574c44
1,284,312 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,406 UART: ROM Fatal Error: 0x000B0016
2,581,563 >>> mbox cmd response: failed
2,581,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,569 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,437,930 >>> mbox cmd response: failed
2,437,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,936 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
893,349 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,474 UART: [kat] ++
897,626 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,365 UART: [kat] SHA2-512-ACC
908,266 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,631 UART: [kat] LMS
1,170,959 UART: [kat] --
1,171,528 UART: [cold-reset] ++
1,171,974 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,003 UART: [idev] Erasing UDS.KEYID = 0
1,201,234 UART: [idev] Sha1 KeyId Algorithm
1,209,600 UART: [idev] --
1,210,698 UART: [ldev] ++
1,210,866 UART: [ldev] CDI.KEYID = 6
1,211,229 UART: [ldev] SUBJECT.KEYID = 5
1,211,655 UART: [ldev] AUTHORITY.KEYID = 7
1,212,118 UART: [ldev] FE.KEYID = 1
1,217,650 UART: [ldev] Erasing FE.KEYID = 1
1,243,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,874 UART: [ldev] --
1,283,247 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,505 UART: ROM Fatal Error: 0x000B0016
2,581,662 >>> mbox cmd response: failed
2,581,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,668 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,979 >>> mbox cmd response: failed
2,436,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,985 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,058 UART: ROM Fatal Error: 0x000B0016
2,579,215 >>> mbox cmd response: failed
2,579,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,221 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,322 >>> mbox cmd response: failed
2,433,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,328 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,144 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [kat] SHA2-256
892,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,178 UART: [kat] ++
896,330 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,259 UART: [kat] SHA2-512-ACC
907,160 UART: [kat] ECC-384
916,749 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,174,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,199,820 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,812 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,909 UART: ROM Fatal Error: 0x000B0016
2,582,066 >>> mbox cmd response: failed
2,582,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,072 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,177 >>> mbox cmd response: failed
2,432,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,183 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Production
85,877 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,376 UART: [kat] SHA2-512-ACC
897,277 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,342 UART: [kat] LMS
1,475,538 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,480,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,716 UART: [idev] Erasing UDS.KEYID = 0
1,504,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,601 UART: [ldev] ++
1,514,769 UART: [ldev] CDI.KEYID = 6
1,515,132 UART: [ldev] SUBJECT.KEYID = 5
1,515,558 UART: [ldev] AUTHORITY.KEYID = 7
1,516,021 UART: [ldev] FE.KEYID = 1
1,521,313 UART: [ldev] Erasing FE.KEYID = 1
1,546,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,848 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,946 UART: [fwproc] Received command 0x46574c44
1,587,737 UART: [fwproc] Received Image of size 114332 bytes
1,637,668 UART: ROM Fatal Error: 0x000B0007
1,638,825 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,366 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Production
85,872 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,111 UART: [kat] LMS
1,475,307 UART: [kat] --
1,476,106 UART: [cold-reset] ++
1,476,442 UART: [fht] Storing FHT @ 0x50003400
1,479,299 UART: [idev] ++
1,479,467 UART: [idev] CDI.KEYID = 6
1,479,827 UART: [idev] SUBJECT.KEYID = 7
1,480,251 UART: [idev] UDS.KEYID = 0
1,480,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,205 UART: [idev] Erasing UDS.KEYID = 0
1,504,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,511 UART: [idev] --
1,514,742 UART: [ldev] ++
1,514,910 UART: [ldev] CDI.KEYID = 6
1,515,273 UART: [ldev] SUBJECT.KEYID = 5
1,515,699 UART: [ldev] AUTHORITY.KEYID = 7
1,516,162 UART: [ldev] FE.KEYID = 1
1,521,246 UART: [ldev] Erasing FE.KEYID = 1
1,546,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,291 UART: [ldev] --
1,585,758 UART: [fwproc] Waiting for Commands...
1,586,609 UART: [fwproc] Received command 0x46574c44
1,587,400 UART: [fwproc] Received Image of size 114332 bytes
1,636,925 UART: ROM Fatal Error: 0x000B0007
1,638,082 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,491,155 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Production
85,407 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,200 UART: [kat] SHA2-256
892,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,975 UART: [kat] ++
897,127 UART: [kat] sha1
901,483 UART: [kat] SHA2-256
903,423 UART: [kat] SHA2-384
906,046 UART: [kat] SHA2-512-ACC
907,947 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,663 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,676 UART: [idev] ++
1,174,844 UART: [idev] CDI.KEYID = 6
1,175,204 UART: [idev] SUBJECT.KEYID = 7
1,175,628 UART: [idev] UDS.KEYID = 0
1,175,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,076 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,693 UART: [idev] --
1,210,831 UART: [ldev] ++
1,210,999 UART: [ldev] CDI.KEYID = 6
1,211,362 UART: [ldev] SUBJECT.KEYID = 5
1,211,788 UART: [ldev] AUTHORITY.KEYID = 7
1,212,251 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,409 UART: ROM Fatal Error: 0x000B0007
1,333,566 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,665 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Production
86,280 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,505 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,784 UART: [cold-reset] ++
1,173,300 UART: [fht] FHT @ 0x50003400
1,175,845 UART: [idev] ++
1,176,013 UART: [idev] CDI.KEYID = 6
1,176,373 UART: [idev] SUBJECT.KEYID = 7
1,176,797 UART: [idev] UDS.KEYID = 0
1,177,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,881 UART: [idev] Erasing UDS.KEYID = 0
1,201,810 UART: [idev] Sha1 KeyId Algorithm
1,210,170 UART: [idev] --
1,211,258 UART: [ldev] ++
1,211,426 UART: [ldev] CDI.KEYID = 6
1,211,789 UART: [ldev] SUBJECT.KEYID = 5
1,212,215 UART: [ldev] AUTHORITY.KEYID = 7
1,212,678 UART: [ldev] FE.KEYID = 1
1,218,104 UART: [ldev] Erasing FE.KEYID = 1
1,244,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,658 UART: [ldev] --
1,284,083 UART: [fwproc] Wait for Commands...
1,284,897 UART: [fwproc] Recv command 0x46574c44
1,285,625 UART: [fwproc] Recv'd Img size: 114332 bytes
1,334,454 UART: ROM Fatal Error: 0x000B0007
1,335,611 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,190,094 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Production
85,457 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,939 UART: [kat] ++
895,091 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,170,113 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,174,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,351 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,242,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,000 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,239 UART: [fwproc] Recv command 0x46574c44
1,282,972 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,381 UART: ROM Fatal Error: 0x000B0007
1,333,538 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,989 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Production
85,982 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,287 UART: [kat] LMS
1,169,599 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,682 UART: [idev] ++
1,173,850 UART: [idev] CDI.KEYID = 6
1,174,211 UART: [idev] SUBJECT.KEYID = 7
1,174,636 UART: [idev] UDS.KEYID = 0
1,174,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,142 UART: [idev] Sha1 KeyId Algorithm
1,208,968 UART: [idev] --
1,210,081 UART: [ldev] ++
1,210,249 UART: [ldev] CDI.KEYID = 6
1,210,613 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,243,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,889 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,284,168 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,156 UART: ROM Fatal Error: 0x000B0007
1,334,313 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,148 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Production
85,727 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,456 UART: [kat] LMS
1,475,652 UART: [kat] --
1,476,615 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,944 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,352 UART: [idev] --
1,515,241 UART: [ldev] ++
1,515,409 UART: [ldev] CDI.KEYID = 6
1,515,772 UART: [ldev] SUBJECT.KEYID = 5
1,516,198 UART: [ldev] AUTHORITY.KEYID = 7
1,516,661 UART: [ldev] FE.KEYID = 1
1,521,807 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,276 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,428 UART: [fwproc] Received command 0x46574c44
1,587,219 UART: [fwproc] Received Image of size 114332 bytes
1,636,230 UART: ROM Fatal Error: 0x000B0007
1,637,387 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,244 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Production
85,800 UART: [state] DebugLocked = No
86,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,930 UART: [kat] SHA2-256
881,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,976 UART: [kat] ++
886,128 UART: [kat] sha1
890,378 UART: [kat] SHA2-256
892,316 UART: [kat] SHA2-384
895,127 UART: [kat] SHA2-512-ACC
897,028 UART: [kat] ECC-384
902,517 UART: [kat] HMAC-384Kdf
906,987 UART: [kat] LMS
1,475,183 UART: [kat] --
1,476,198 UART: [cold-reset] ++
1,476,722 UART: [fht] Storing FHT @ 0x50003400
1,479,495 UART: [idev] ++
1,479,663 UART: [idev] CDI.KEYID = 6
1,480,023 UART: [idev] SUBJECT.KEYID = 7
1,480,447 UART: [idev] UDS.KEYID = 0
1,480,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,897 UART: [idev] --
1,514,916 UART: [ldev] ++
1,515,084 UART: [ldev] CDI.KEYID = 6
1,515,447 UART: [ldev] SUBJECT.KEYID = 5
1,515,873 UART: [ldev] AUTHORITY.KEYID = 7
1,516,336 UART: [ldev] FE.KEYID = 1
1,521,194 UART: [ldev] Erasing FE.KEYID = 1
1,546,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,993 UART: [ldev] --
1,586,382 UART: [fwproc] Waiting for Commands...
1,587,191 UART: [fwproc] Received command 0x46574c44
1,587,982 UART: [fwproc] Received Image of size 114332 bytes
1,637,473 UART: ROM Fatal Error: 0x000B0007
1,638,630 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,858 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,492,131 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Production
85,557 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,218 UART: [kat] SHA2-512-ACC
908,119 UART: [kat] ECC-384
917,732 UART: [kat] HMAC-384Kdf
922,548 UART: [kat] LMS
1,170,876 UART: [kat] --
1,171,711 UART: [cold-reset] ++
1,172,083 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,785 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,764 UART: [fwproc] Recv command 0x46574c44
1,284,492 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,769 UART: ROM Fatal Error: 0x000B0007
1,334,926 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,043 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Production
86,078 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
893,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,782 UART: [kat] ++
897,934 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,705 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,412 UART: [cold-reset] ++
1,172,936 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,669 UART: [idev] Erasing UDS.KEYID = 0
1,202,222 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,722 UART: [ldev] ++
1,211,890 UART: [ldev] CDI.KEYID = 6
1,212,253 UART: [ldev] SUBJECT.KEYID = 5
1,212,679 UART: [ldev] AUTHORITY.KEYID = 7
1,213,142 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,172 UART: [ldev] --
1,283,437 UART: [fwproc] Wait for Commands...
1,284,053 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 114332 bytes
1,334,062 UART: ROM Fatal Error: 0x000B0007
1,335,219 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,189,976 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Production
85,739 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,595 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,369 UART: [idev] Erasing UDS.KEYID = 0
1,199,085 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,698 UART: [ldev] --
1,280,122 UART: [fwproc] Wait for Commands...
1,280,737 UART: [fwproc] Recv command 0x46574c44
1,281,470 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,615 UART: ROM Fatal Error: 0x000B0007
1,330,772 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,773 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Production
85,712 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,861 UART: [kat] LMS
1,169,173 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,438 UART: [idev] Erasing UDS.KEYID = 0
1,198,584 UART: [idev] Sha1 KeyId Algorithm
1,207,426 UART: [idev] --
1,208,327 UART: [ldev] ++
1,208,495 UART: [ldev] CDI.KEYID = 6
1,208,859 UART: [ldev] SUBJECT.KEYID = 5
1,209,286 UART: [ldev] AUTHORITY.KEYID = 7
1,209,749 UART: [ldev] FE.KEYID = 1
1,214,785 UART: [ldev] Erasing FE.KEYID = 1
1,240,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,941 UART: [ldev] --
1,280,373 UART: [fwproc] Wait for Commands...
1,281,122 UART: [fwproc] Recv command 0x46574c44
1,281,855 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,458 UART: ROM Fatal Error: 0x000B0007
1,331,615 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,660 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Production
86,037 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,265 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,580 UART: [idev] ++
1,479,748 UART: [idev] CDI.KEYID = 6
1,480,108 UART: [idev] SUBJECT.KEYID = 7
1,480,532 UART: [idev] UDS.KEYID = 0
1,480,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,342 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,287 UART: [ldev] ++
1,515,455 UART: [ldev] CDI.KEYID = 6
1,515,818 UART: [ldev] SUBJECT.KEYID = 5
1,516,244 UART: [ldev] AUTHORITY.KEYID = 7
1,516,707 UART: [ldev] FE.KEYID = 1
1,522,043 UART: [ldev] Erasing FE.KEYID = 1
1,547,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,302 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,316 UART: [fwproc] Received command 0x46574c44
1,588,107 UART: [fwproc] Received Image of size 114332 bytes
1,633,192 UART: ROM Fatal Error: 0x000B0005
1,634,349 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,218 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Production
86,212 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,633 UART: [kat] LMS
1,475,829 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,186 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,461 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,126 UART: [ldev] Erasing FE.KEYID = 1
1,547,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,580 UART: [fwproc] Waiting for Commands...
1,587,331 UART: [fwproc] Received command 0x46574c44
1,588,122 UART: [fwproc] Received Image of size 114332 bytes
1,632,705 UART: ROM Fatal Error: 0x000B0005
1,633,862 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,009 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Production
85,911 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,456 UART: [kat] HMAC-384Kdf
923,004 UART: [kat] LMS
1,171,332 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,675 UART: [fht] FHT @ 0x50003400
1,175,436 UART: [idev] ++
1,175,604 UART: [idev] CDI.KEYID = 6
1,175,964 UART: [idev] SUBJECT.KEYID = 7
1,176,388 UART: [idev] UDS.KEYID = 0
1,176,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,201,575 UART: [idev] Sha1 KeyId Algorithm
1,210,031 UART: [idev] --
1,211,053 UART: [ldev] ++
1,211,221 UART: [ldev] CDI.KEYID = 6
1,211,584 UART: [ldev] SUBJECT.KEYID = 5
1,212,010 UART: [ldev] AUTHORITY.KEYID = 7
1,212,473 UART: [ldev] FE.KEYID = 1
1,217,431 UART: [ldev] Erasing FE.KEYID = 1
1,243,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,159 UART: [ldev] --
1,283,436 UART: [fwproc] Wait for Commands...
1,284,180 UART: [fwproc] Recv command 0x46574c44
1,284,908 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,079 UART: ROM Fatal Error: 0x000B0005
1,331,236 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,747 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Production
86,086 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,193 UART: [kat] HMAC-384Kdf
922,935 UART: [kat] LMS
1,171,263 UART: [kat] --
1,172,044 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,174,903 UART: [idev] ++
1,175,071 UART: [idev] CDI.KEYID = 6
1,175,431 UART: [idev] SUBJECT.KEYID = 7
1,175,855 UART: [idev] UDS.KEYID = 0
1,176,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,479 UART: [idev] Erasing UDS.KEYID = 0
1,200,472 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,092 UART: [ldev] ++
1,210,260 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,049 UART: [ldev] AUTHORITY.KEYID = 7
1,211,512 UART: [ldev] FE.KEYID = 1
1,216,550 UART: [ldev] Erasing FE.KEYID = 1
1,243,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,936 UART: [ldev] --
1,282,359 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,588 UART: ROM Fatal Error: 0x000B0005
1,329,745 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,122 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Production
85,649 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,628 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,173 UART: [cold-reset] ++
1,169,639 UART: [fht] FHT @ 0x50003400
1,172,081 UART: [idev] ++
1,172,249 UART: [idev] CDI.KEYID = 6
1,172,610 UART: [idev] SUBJECT.KEYID = 7
1,173,035 UART: [idev] UDS.KEYID = 0
1,173,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,143 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,218 UART: [ldev] --
1,280,562 UART: [fwproc] Wait for Commands...
1,281,369 UART: [fwproc] Recv command 0x46574c44
1,282,102 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,855 UART: ROM Fatal Error: 0x000B0005
1,328,012 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,318 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,145 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Production
85,580 UART: [state] DebugLocked = No
86,120 UART: [state] WD Timer not started. Device not locked for debugging
87,239 UART: [kat] SHA2-256
890,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,918 UART: [kat] ++
895,070 UART: [kat] sha1
899,264 UART: [kat] SHA2-256
901,204 UART: [kat] SHA2-384
903,961 UART: [kat] SHA2-512-ACC
905,862 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,235 UART: [kat] LMS
1,168,547 UART: [kat] --
1,169,418 UART: [cold-reset] ++
1,169,902 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,174,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,384 UART: [idev] Erasing UDS.KEYID = 0
1,198,666 UART: [idev] Sha1 KeyId Algorithm
1,207,572 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,036 UART: ROM Fatal Error: 0x000B0005
1,328,193 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,298 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Production
85,759 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,929 UART: [kat] SHA2-256
881,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,975 UART: [kat] ++
886,127 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,286 UART: [kat] SHA2-512-ACC
897,187 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,464 UART: [kat] LMS
1,475,660 UART: [kat] --
1,476,291 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,450 UART: [idev] ++
1,479,618 UART: [idev] CDI.KEYID = 6
1,479,978 UART: [idev] SUBJECT.KEYID = 7
1,480,402 UART: [idev] UDS.KEYID = 0
1,480,747 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,564 UART: [idev] Erasing UDS.KEYID = 0
1,505,348 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,004 UART: [idev] --
1,514,927 UART: [ldev] ++
1,515,095 UART: [ldev] CDI.KEYID = 6
1,515,458 UART: [ldev] SUBJECT.KEYID = 5
1,515,884 UART: [ldev] AUTHORITY.KEYID = 7
1,516,347 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,704 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,546 UART: [ldev] --
1,586,031 UART: [fwproc] Waiting for Commands...
1,586,660 UART: [fwproc] Received command 0x46574c44
1,587,451 UART: [fwproc] Received Image of size 114332 bytes
1,632,112 UART: ROM Fatal Error: 0x000B0005
1,633,269 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,304 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Production
86,174 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,030 UART: [kat] SHA2-256
892,968 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,145 UART: [kat] HMAC-384Kdf
907,913 UART: [kat] LMS
1,476,109 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,416 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,217 UART: [idev] Erasing UDS.KEYID = 0
1,505,739 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,255 UART: [idev] --
1,515,422 UART: [ldev] ++
1,515,590 UART: [ldev] CDI.KEYID = 6
1,515,953 UART: [ldev] SUBJECT.KEYID = 5
1,516,379 UART: [ldev] AUTHORITY.KEYID = 7
1,516,842 UART: [ldev] FE.KEYID = 1
1,522,228 UART: [ldev] Erasing FE.KEYID = 1
1,547,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,859 UART: [ldev] --
1,586,160 UART: [fwproc] Waiting for Commands...
1,586,801 UART: [fwproc] Received command 0x46574c44
1,587,592 UART: [fwproc] Received Image of size 114332 bytes
1,632,473 UART: ROM Fatal Error: 0x000B0005
1,633,630 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,515 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Production
85,673 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
893,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,295 UART: [kat] ++
897,447 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,323 UART: [fht] FHT @ 0x50003400
1,174,958 UART: [idev] ++
1,175,126 UART: [idev] CDI.KEYID = 6
1,175,486 UART: [idev] SUBJECT.KEYID = 7
1,175,910 UART: [idev] UDS.KEYID = 0
1,176,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,619 UART: [idev] Sha1 KeyId Algorithm
1,209,117 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,516 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,813 UART: ROM Fatal Error: 0x000B0005
1,329,970 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,107 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Production
85,980 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
907,033 UART: [kat] SHA2-512-ACC
908,934 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,509 UART: [kat] LMS
1,171,837 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,948 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,326 UART: [ldev] ++
1,211,494 UART: [ldev] CDI.KEYID = 6
1,211,857 UART: [ldev] SUBJECT.KEYID = 5
1,212,283 UART: [ldev] AUTHORITY.KEYID = 7
1,212,746 UART: [ldev] FE.KEYID = 1
1,217,862 UART: [ldev] Erasing FE.KEYID = 1
1,243,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,600 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,587 UART: [fwproc] Recv command 0x46574c44
1,284,315 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,358 UART: ROM Fatal Error: 0x000B0005
1,330,515 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,646 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Production
85,605 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,173,981 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,197,975 UART: [idev] Sha1 KeyId Algorithm
1,206,643 UART: [idev] --
1,207,708 UART: [ldev] ++
1,207,876 UART: [ldev] CDI.KEYID = 6
1,208,240 UART: [ldev] SUBJECT.KEYID = 5
1,208,667 UART: [ldev] AUTHORITY.KEYID = 7
1,209,130 UART: [ldev] FE.KEYID = 1
1,214,352 UART: [ldev] Erasing FE.KEYID = 1
1,240,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,000 UART: [ldev] --
1,279,518 UART: [fwproc] Wait for Commands...
1,280,175 UART: [fwproc] Recv command 0x46574c44
1,280,908 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,157 UART: ROM Fatal Error: 0x000B0005
1,326,314 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,259 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Production
86,120 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,627 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,342 UART: ROM Fatal Error: 0x000B0005
1,329,499 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,908 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Production
85,759 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,360 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,701 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,515,091 UART: [ldev] ++
1,515,259 UART: [ldev] CDI.KEYID = 6
1,515,622 UART: [ldev] SUBJECT.KEYID = 5
1,516,048 UART: [ldev] AUTHORITY.KEYID = 7
1,516,511 UART: [ldev] FE.KEYID = 1
1,521,319 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,426 UART: [fwproc] Received command 0x46574c44
1,587,217 UART: [fwproc] Received Image of size 114332 bytes
1,607,453 UART: ROM Fatal Error: 0x000B0003
1,608,610 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,963 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,965 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Production
85,874 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,776 UART: [kat] SHA2-256
892,714 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,940 UART: [cold-reset] ++
1,477,508 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,481,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,385 UART: [idev] Erasing UDS.KEYID = 0
1,505,981 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,593 UART: [idev] --
1,515,610 UART: [ldev] ++
1,515,778 UART: [ldev] CDI.KEYID = 6
1,516,141 UART: [ldev] SUBJECT.KEYID = 5
1,516,567 UART: [ldev] AUTHORITY.KEYID = 7
1,517,030 UART: [ldev] FE.KEYID = 1
1,522,158 UART: [ldev] Erasing FE.KEYID = 1
1,547,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,271 UART: [ldev] --
1,586,704 UART: [fwproc] Waiting for Commands...
1,587,437 UART: [fwproc] Received command 0x46574c44
1,588,228 UART: [fwproc] Received Image of size 114332 bytes
1,608,038 UART: ROM Fatal Error: 0x000B0003
1,609,195 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,732 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,444 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Production
85,565 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,140 UART: [kat] SHA2-512-ACC
908,041 UART: [kat] ECC-384
917,598 UART: [kat] HMAC-384Kdf
922,098 UART: [kat] LMS
1,170,426 UART: [kat] --
1,171,305 UART: [cold-reset] ++
1,171,707 UART: [fht] FHT @ 0x50003400
1,174,310 UART: [idev] ++
1,174,478 UART: [idev] CDI.KEYID = 6
1,174,838 UART: [idev] SUBJECT.KEYID = 7
1,175,262 UART: [idev] UDS.KEYID = 0
1,175,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,199 UART: [idev] Sha1 KeyId Algorithm
1,208,801 UART: [idev] --
1,209,863 UART: [ldev] ++
1,210,031 UART: [ldev] CDI.KEYID = 6
1,210,394 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,090 UART: ROM Fatal Error: 0x000B0003
1,305,247 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,912 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,849 UART: [state] LifecycleState = Production
85,456 UART: [state] DebugLocked = No
86,146 UART: [state] WD Timer not started. Device not locked for debugging
87,327 UART: [kat] SHA2-256
892,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,102 UART: [kat] ++
897,254 UART: [kat] sha1
901,572 UART: [kat] SHA2-256
903,512 UART: [kat] SHA2-384
906,479 UART: [kat] SHA2-512-ACC
908,380 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,018 UART: [cold-reset] ++
1,172,352 UART: [fht] FHT @ 0x50003400
1,174,905 UART: [idev] ++
1,175,073 UART: [idev] CDI.KEYID = 6
1,175,433 UART: [idev] SUBJECT.KEYID = 7
1,175,857 UART: [idev] UDS.KEYID = 0
1,176,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,485 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,208,986 UART: [idev] --
1,210,084 UART: [ldev] ++
1,210,252 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,041 UART: [ldev] AUTHORITY.KEYID = 7
1,211,504 UART: [ldev] FE.KEYID = 1
1,216,544 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,576 UART: [ldev] --
1,281,981 UART: [fwproc] Wait for Commands...
1,282,561 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,489 UART: ROM Fatal Error: 0x000B0003
1,304,646 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,295 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Production
85,783 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: [kat] ++
895,325 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,174,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,353 UART: ROM Fatal Error: 0x000B0003
1,303,510 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,203 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Production
86,110 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,198,970 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,057 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,687 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,150 UART: ROM Fatal Error: 0x000B0003
1,304,307 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,484 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Production
85,455 UART: [state] DebugLocked = No
86,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,781 UART: [kat] SHA2-256
881,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,827 UART: [kat] ++
885,979 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
895,064 UART: [kat] SHA2-512-ACC
896,965 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,827 UART: [ldev] ++
1,514,995 UART: [ldev] CDI.KEYID = 6
1,515,358 UART: [ldev] SUBJECT.KEYID = 5
1,515,784 UART: [ldev] AUTHORITY.KEYID = 7
1,516,247 UART: [ldev] FE.KEYID = 1
1,521,525 UART: [ldev] Erasing FE.KEYID = 1
1,547,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,862 UART: [ldev] --
1,587,139 UART: [fwproc] Waiting for Commands...
1,587,830 UART: [fwproc] Received command 0x46574c44
1,588,621 UART: [fwproc] Received Image of size 114332 bytes
1,634,112 UART: ROM Fatal Error: 0x000B0005
1,635,269 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,976 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Production
86,422 UART: [state] DebugLocked = No
87,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,874 UART: [kat] SHA2-256
882,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,920 UART: [kat] ++
887,072 UART: [kat] sha1
891,132 UART: [kat] SHA2-256
893,070 UART: [kat] SHA2-384
895,809 UART: [kat] SHA2-512-ACC
897,710 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,476,916 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,915 UART: [idev] Erasing UDS.KEYID = 0
1,504,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,567 UART: [idev] --
1,514,608 UART: [ldev] ++
1,514,776 UART: [ldev] CDI.KEYID = 6
1,515,139 UART: [ldev] SUBJECT.KEYID = 5
1,515,565 UART: [ldev] AUTHORITY.KEYID = 7
1,516,028 UART: [ldev] FE.KEYID = 1
1,521,442 UART: [ldev] Erasing FE.KEYID = 1
1,546,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,763 UART: [ldev] --
1,586,178 UART: [fwproc] Waiting for Commands...
1,586,833 UART: [fwproc] Received command 0x46574c44
1,587,624 UART: [fwproc] Received Image of size 114332 bytes
1,632,757 UART: ROM Fatal Error: 0x000B0005
1,633,914 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,923 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Production
85,249 UART: [state] DebugLocked = No
85,823 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
892,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,863 UART: [kat] ++
897,015 UART: [kat] sha1
901,197 UART: [kat] SHA2-256
903,137 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,714 UART: [kat] HMAC-384Kdf
922,258 UART: [kat] LMS
1,170,586 UART: [kat] --
1,171,377 UART: [cold-reset] ++
1,171,905 UART: [fht] FHT @ 0x50003400
1,174,576 UART: [idev] ++
1,174,744 UART: [idev] CDI.KEYID = 6
1,175,104 UART: [idev] SUBJECT.KEYID = 7
1,175,528 UART: [idev] UDS.KEYID = 0
1,175,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,444 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,261 UART: [idev] --
1,210,397 UART: [ldev] ++
1,210,565 UART: [ldev] CDI.KEYID = 6
1,210,928 UART: [ldev] SUBJECT.KEYID = 5
1,211,354 UART: [ldev] AUTHORITY.KEYID = 7
1,211,817 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,912 UART: [fwproc] Recv command 0x46574c44
1,284,640 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,995 UART: ROM Fatal Error: 0x000B0005
1,331,152 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,345 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Production
86,190 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,199 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,171,822 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,175,011 UART: [idev] ++
1,175,179 UART: [idev] CDI.KEYID = 6
1,175,539 UART: [idev] SUBJECT.KEYID = 7
1,175,963 UART: [idev] UDS.KEYID = 0
1,176,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,783 UART: [idev] Erasing UDS.KEYID = 0
1,201,522 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,210,802 UART: [ldev] ++
1,210,970 UART: [ldev] CDI.KEYID = 6
1,211,333 UART: [ldev] SUBJECT.KEYID = 5
1,211,759 UART: [ldev] AUTHORITY.KEYID = 7
1,212,222 UART: [ldev] FE.KEYID = 1
1,217,270 UART: [ldev] Erasing FE.KEYID = 1
1,243,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,199 UART: [fwproc] Wait for Commands...
1,284,009 UART: [fwproc] Recv command 0x46574c44
1,284,737 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,854 UART: ROM Fatal Error: 0x000B0005
1,331,011 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,024 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Production
85,833 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,565 UART: [idev] Sha1 KeyId Algorithm
1,208,359 UART: [idev] --
1,209,514 UART: [ldev] ++
1,209,682 UART: [ldev] CDI.KEYID = 6
1,210,046 UART: [ldev] SUBJECT.KEYID = 5
1,210,473 UART: [ldev] AUTHORITY.KEYID = 7
1,210,936 UART: [ldev] FE.KEYID = 1
1,216,132 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,542 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,541 UART: ROM Fatal Error: 0x000B0005
1,328,698 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,397 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Production
86,238 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,530 UART: [fwproc] Recv command 0x46574c44
1,283,263 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,736 UART: ROM Fatal Error: 0x000B0005
1,328,893 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,408 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,205,750 >>> mbox cmd response: failed
1,205,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,756 >>> mbox cmd response: failed
1,205,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,811 UART: [kat] SHA2-256
881,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,857 UART: [kat] ++
886,009 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,476,075 UART: [cold-reset] ++
1,476,403 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,272 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,652 UART: [idev] --
1,514,869 UART: [ldev] ++
1,515,037 UART: [ldev] CDI.KEYID = 6
1,515,400 UART: [ldev] SUBJECT.KEYID = 5
1,515,826 UART: [ldev] AUTHORITY.KEYID = 7
1,516,289 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,806 UART: [ldev] --
1,585,181 UART: [fwproc] Waiting for Commands...
1,585,864 UART: [fwproc] Received command 0x46574c44
1,586,655 UART: [fwproc] Received Image of size 114332 bytes
2,883,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,205 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,204,852 >>> mbox cmd response: failed
1,204,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,858 >>> mbox cmd response: failed
1,204,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,387 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,352 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,209,089 >>> mbox cmd response: failed
1,209,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,095 >>> mbox cmd response: failed
1,209,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
902,909 UART: [kat] HMAC-384Kdf
907,621 UART: [kat] LMS
1,475,817 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,849 UART: [idev] ++
1,480,017 UART: [idev] CDI.KEYID = 6
1,480,377 UART: [idev] SUBJECT.KEYID = 7
1,480,801 UART: [idev] UDS.KEYID = 0
1,481,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,487 UART: [idev] Erasing UDS.KEYID = 0
1,504,983 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,553 UART: [idev] --
1,514,494 UART: [ldev] ++
1,514,662 UART: [ldev] CDI.KEYID = 6
1,515,025 UART: [ldev] SUBJECT.KEYID = 5
1,515,451 UART: [ldev] AUTHORITY.KEYID = 7
1,515,914 UART: [ldev] FE.KEYID = 1
1,521,132 UART: [ldev] Erasing FE.KEYID = 1
1,546,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,467 UART: [ldev] --
1,585,864 UART: [fwproc] Waiting for Commands...
1,586,677 UART: [fwproc] Received command 0x46574c44
1,587,468 UART: [fwproc] Received Image of size 114332 bytes
2,884,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,485 >>> mbox cmd response: failed
1,207,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,491 >>> mbox cmd response: failed
1,207,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,926 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,497 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,954 >>> mbox cmd response: failed
1,207,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,960 >>> mbox cmd response: failed
1,207,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,059 UART: [kat] SHA2-256
903,999 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,171,981 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,375 UART: [idev] Sha1 KeyId Algorithm
1,208,793 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,764 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,206,612 >>> mbox cmd response: failed
1,206,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,618 >>> mbox cmd response: failed
1,206,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,373 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,771 >>> mbox cmd response: failed
1,207,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,777 >>> mbox cmd response: failed
1,207,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
893,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,516 UART: [kat] ++
897,668 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,669 UART: [kat] LMS
1,170,997 UART: [kat] --
1,171,586 UART: [cold-reset] ++
1,172,002 UART: [fht] FHT @ 0x50003400
1,174,619 UART: [idev] ++
1,174,787 UART: [idev] CDI.KEYID = 6
1,175,147 UART: [idev] SUBJECT.KEYID = 7
1,175,571 UART: [idev] UDS.KEYID = 0
1,175,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,719 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,906 UART: [ldev] ++
1,210,074 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,863 UART: [ldev] AUTHORITY.KEYID = 7
1,211,326 UART: [ldev] FE.KEYID = 1
1,216,612 UART: [ldev] Erasing FE.KEYID = 1
1,243,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,282,993 UART: [fwproc] Wait for Commands...
1,283,601 UART: [fwproc] Recv command 0x46574c44
1,284,329 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,781 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,389 >>> mbox cmd response: failed
1,207,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,395 >>> mbox cmd response: failed
1,207,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,602 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,206,198 >>> mbox cmd response: failed
1,206,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,204 >>> mbox cmd response: failed
1,206,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,852 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,208,864 >>> mbox cmd response: failed
1,208,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,870 >>> mbox cmd response: failed
1,208,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,592 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,261 >>> mbox cmd response: failed
1,207,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,267 >>> mbox cmd response: failed
1,207,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
891,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,876 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,531 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,045 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,221 >>> mbox cmd response: failed
1,207,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,227 >>> mbox cmd response: failed
1,207,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
87,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,799 UART: [kat] SHA2-256
882,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,845 UART: [kat] ++
886,997 UART: [kat] sha1
891,109 UART: [kat] SHA2-256
893,047 UART: [kat] SHA2-384
895,672 UART: [kat] SHA2-512-ACC
897,573 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,616 UART: [kat] LMS
1,475,812 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,105 UART: [fht] Storing FHT @ 0x50003400
1,479,868 UART: [idev] ++
1,480,036 UART: [idev] CDI.KEYID = 6
1,480,396 UART: [idev] SUBJECT.KEYID = 7
1,480,820 UART: [idev] UDS.KEYID = 0
1,481,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,466 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,810 UART: [idev] --
1,514,757 UART: [ldev] ++
1,514,925 UART: [ldev] CDI.KEYID = 6
1,515,288 UART: [ldev] SUBJECT.KEYID = 5
1,515,714 UART: [ldev] AUTHORITY.KEYID = 7
1,516,177 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,547,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,954 UART: [ldev] --
1,586,447 UART: [fwproc] Waiting for Commands...
1,587,070 UART: [fwproc] Received command 0x46574c44
1,587,861 UART: [fwproc] Received Image of size 114332 bytes
1,853,419 UART: ROM Fatal Error: 0x000B0014
1,854,576 >>> mbox cmd response: failed
1,854,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,582 >>> mbox cmd response: failed
1,854,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,493 UART: [fht] Storing FHT @ 0x50003400
1,479,186 UART: [idev] ++
1,479,354 UART: [idev] CDI.KEYID = 6
1,479,714 UART: [idev] SUBJECT.KEYID = 7
1,480,138 UART: [idev] UDS.KEYID = 0
1,480,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,944 UART: [idev] Erasing UDS.KEYID = 0
1,504,872 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,334 UART: [idev] --
1,514,381 UART: [ldev] ++
1,514,549 UART: [ldev] CDI.KEYID = 6
1,514,912 UART: [ldev] SUBJECT.KEYID = 5
1,515,338 UART: [ldev] AUTHORITY.KEYID = 7
1,515,801 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,332 UART: [ldev] --
1,585,777 UART: [fwproc] Waiting for Commands...
1,586,526 UART: [fwproc] Received command 0x46574c44
1,587,317 UART: [fwproc] Received Image of size 114332 bytes
2,885,502 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,131 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,379 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,708,297 >>> mbox cmd response: failed
1,708,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,303 >>> mbox cmd response: failed
1,708,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,051 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,958 UART: [kat] SHA2-256
881,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,004 UART: [kat] ++
886,156 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
902,665 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,964 UART: [fht] Storing FHT @ 0x50003400
1,479,761 UART: [idev] ++
1,479,929 UART: [idev] CDI.KEYID = 6
1,480,289 UART: [idev] SUBJECT.KEYID = 7
1,480,713 UART: [idev] UDS.KEYID = 0
1,481,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,721 UART: [idev] --
1,514,874 UART: [ldev] ++
1,515,042 UART: [ldev] CDI.KEYID = 6
1,515,405 UART: [ldev] SUBJECT.KEYID = 5
1,515,831 UART: [ldev] AUTHORITY.KEYID = 7
1,516,294 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,546,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,753 UART: [ldev] --
1,586,026 UART: [fwproc] Waiting for Commands...
1,586,837 UART: [fwproc] Received command 0x46574c44
1,587,628 UART: [fwproc] Received Image of size 114332 bytes
1,852,886 UART: ROM Fatal Error: 0x000B0014
1,854,043 >>> mbox cmd response: failed
1,854,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,049 >>> mbox cmd response: failed
1,854,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,473 UART: [kat] SHA2-512-ACC
897,374 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,243 UART: [kat] LMS
1,475,439 UART: [kat] --
1,476,284 UART: [cold-reset] ++
1,476,648 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,617 UART: [idev] Erasing UDS.KEYID = 0
1,505,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,149 UART: [idev] --
1,515,128 UART: [ldev] ++
1,515,296 UART: [ldev] CDI.KEYID = 6
1,515,659 UART: [ldev] SUBJECT.KEYID = 5
1,516,085 UART: [ldev] AUTHORITY.KEYID = 7
1,516,548 UART: [ldev] FE.KEYID = 1
1,521,850 UART: [ldev] Erasing FE.KEYID = 1
1,547,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,225 UART: [ldev] --
1,586,684 UART: [fwproc] Waiting for Commands...
1,587,353 UART: [fwproc] Received command 0x46574c44
1,588,144 UART: [fwproc] Received Image of size 114332 bytes
2,885,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,530 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,709,462 >>> mbox cmd response: failed
1,709,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,468 >>> mbox cmd response: failed
1,709,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,112 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
892,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,887 UART: [kat] ++
897,039 UART: [kat] sha1
901,245 UART: [kat] SHA2-256
903,185 UART: [kat] SHA2-384
906,034 UART: [kat] SHA2-512-ACC
907,935 UART: [kat] ECC-384
917,478 UART: [kat] HMAC-384Kdf
921,982 UART: [kat] LMS
1,170,310 UART: [kat] --
1,171,125 UART: [cold-reset] ++
1,171,565 UART: [fht] FHT @ 0x50003400
1,174,074 UART: [idev] ++
1,174,242 UART: [idev] CDI.KEYID = 6
1,174,602 UART: [idev] SUBJECT.KEYID = 7
1,175,026 UART: [idev] UDS.KEYID = 0
1,175,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,776 UART: [idev] Erasing UDS.KEYID = 0
1,199,689 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,674 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,824 UART: ROM Fatal Error: 0x000B0014
1,549,981 >>> mbox cmd response: failed
1,549,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,987 >>> mbox cmd response: failed
1,549,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,430 UART: [idev] Erasing UDS.KEYID = 0
1,202,143 UART: [idev] Sha1 KeyId Algorithm
1,210,565 UART: [idev] --
1,211,569 UART: [ldev] ++
1,211,737 UART: [ldev] CDI.KEYID = 6
1,212,100 UART: [ldev] SUBJECT.KEYID = 5
1,212,526 UART: [ldev] AUTHORITY.KEYID = 7
1,212,989 UART: [ldev] FE.KEYID = 1
1,218,335 UART: [ldev] Erasing FE.KEYID = 1
1,244,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,013 UART: [ldev] --
1,283,484 UART: [fwproc] Wait for Commands...
1,284,248 UART: [fwproc] Recv command 0x46574c44
1,284,976 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,426 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,407,276 >>> mbox cmd response: failed
1,407,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,282 >>> mbox cmd response: failed
1,407,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,533 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
893,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,910 UART: [kat] ++
898,062 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,171,776 UART: [cold-reset] ++
1,172,180 UART: [fht] FHT @ 0x50003400
1,175,017 UART: [idev] ++
1,175,185 UART: [idev] CDI.KEYID = 6
1,175,545 UART: [idev] SUBJECT.KEYID = 7
1,175,969 UART: [idev] UDS.KEYID = 0
1,176,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,297 UART: [idev] Erasing UDS.KEYID = 0
1,201,672 UART: [idev] Sha1 KeyId Algorithm
1,210,056 UART: [idev] --
1,211,258 UART: [ldev] ++
1,211,426 UART: [ldev] CDI.KEYID = 6
1,211,789 UART: [ldev] SUBJECT.KEYID = 5
1,212,215 UART: [ldev] AUTHORITY.KEYID = 7
1,212,678 UART: [ldev] FE.KEYID = 1
1,218,096 UART: [ldev] Erasing FE.KEYID = 1
1,245,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,484 UART: [ldev] --
1,284,927 UART: [fwproc] Wait for Commands...
1,285,507 UART: [fwproc] Recv command 0x46574c44
1,286,235 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,241 UART: ROM Fatal Error: 0x000B0014
1,552,398 >>> mbox cmd response: failed
1,552,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,404 >>> mbox cmd response: failed
1,552,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,889 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,360 UART: [ldev] ++
1,210,528 UART: [ldev] CDI.KEYID = 6
1,210,891 UART: [ldev] SUBJECT.KEYID = 5
1,211,317 UART: [ldev] AUTHORITY.KEYID = 7
1,211,780 UART: [ldev] FE.KEYID = 1
1,216,850 UART: [ldev] Erasing FE.KEYID = 1
1,243,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,622 UART: [ldev] --
1,282,965 UART: [fwproc] Wait for Commands...
1,283,691 UART: [fwproc] Recv command 0x46574c44
1,284,419 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,851 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,954 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,907 >>> mbox cmd response: failed
1,406,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,913 >>> mbox cmd response: failed
1,406,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,290 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
1,174,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,682 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,157 UART: ROM Fatal Error: 0x000B0014
1,549,314 >>> mbox cmd response: failed
1,549,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,320 >>> mbox cmd response: failed
1,549,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,281 UART: [cold-reset] ++
1,169,617 UART: [fht] FHT @ 0x50003400
1,172,305 UART: [idev] ++
1,172,473 UART: [idev] CDI.KEYID = 6
1,172,834 UART: [idev] SUBJECT.KEYID = 7
1,173,259 UART: [idev] UDS.KEYID = 0
1,173,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,197,917 UART: [idev] Sha1 KeyId Algorithm
1,206,665 UART: [idev] --
1,207,792 UART: [ldev] ++
1,207,960 UART: [ldev] CDI.KEYID = 6
1,208,324 UART: [ldev] SUBJECT.KEYID = 5
1,208,751 UART: [ldev] AUTHORITY.KEYID = 7
1,209,214 UART: [ldev] FE.KEYID = 1
1,214,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,922 UART: [ldev] --
1,280,292 UART: [fwproc] Wait for Commands...
1,281,021 UART: [fwproc] Recv command 0x46574c44
1,281,754 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,426 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,413 >>> mbox cmd response: failed
1,401,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,419 >>> mbox cmd response: failed
1,401,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,499 UART: [ldev] SUBJECT.KEYID = 5
1,209,926 UART: [ldev] AUTHORITY.KEYID = 7
1,210,389 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,240 UART: ROM Fatal Error: 0x000B0014
1,550,397 >>> mbox cmd response: failed
1,550,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,403 >>> mbox cmd response: failed
1,550,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,646 UART: [idev] ++
1,173,814 UART: [idev] CDI.KEYID = 6
1,174,175 UART: [idev] SUBJECT.KEYID = 7
1,174,600 UART: [idev] UDS.KEYID = 0
1,174,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,275 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,120 >>> mbox cmd response: failed
1,403,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,126 >>> mbox cmd response: failed
1,403,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,811 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
902,508 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,475,967 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,164 UART: [idev] ++
1,479,332 UART: [idev] CDI.KEYID = 6
1,479,692 UART: [idev] SUBJECT.KEYID = 7
1,480,116 UART: [idev] UDS.KEYID = 0
1,480,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,970 UART: [idev] Erasing UDS.KEYID = 0
1,504,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,138 UART: [idev] --
1,514,235 UART: [ldev] ++
1,514,403 UART: [ldev] CDI.KEYID = 6
1,514,766 UART: [ldev] SUBJECT.KEYID = 5
1,515,192 UART: [ldev] AUTHORITY.KEYID = 7
1,515,655 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,762 UART: [ldev] --
1,586,105 UART: [fwproc] Waiting for Commands...
1,586,906 UART: [fwproc] Received command 0x46574c44
1,587,697 UART: [fwproc] Received Image of size 114332 bytes
1,853,662 UART: ROM Fatal Error: 0x000B0023
1,854,819 >>> mbox cmd response: failed
1,854,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,825 >>> mbox cmd response: failed
1,854,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,625 UART: [kat] SHA2-256
881,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,671 UART: [kat] ++
885,823 UART: [kat] sha1
890,111 UART: [kat] SHA2-256
892,049 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,252 UART: [kat] LMS
1,475,448 UART: [kat] --
1,476,371 UART: [cold-reset] ++
1,476,787 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,484 UART: [idev] Erasing UDS.KEYID = 0
1,505,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,654 UART: [idev] --
1,514,787 UART: [ldev] ++
1,514,955 UART: [ldev] CDI.KEYID = 6
1,515,318 UART: [ldev] SUBJECT.KEYID = 5
1,515,744 UART: [ldev] AUTHORITY.KEYID = 7
1,516,207 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,536 UART: [ldev] --
1,585,875 UART: [fwproc] Waiting for Commands...
1,586,712 UART: [fwproc] Received command 0x46574c44
1,587,503 UART: [fwproc] Received Image of size 114332 bytes
2,883,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,362 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,708,266 >>> mbox cmd response: failed
1,708,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,272 >>> mbox cmd response: failed
1,708,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,405 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,759 UART: [kat] SHA2-512-ACC
897,660 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,779 UART: [kat] LMS
1,475,975 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,147 UART: [idev] ++
1,480,315 UART: [idev] CDI.KEYID = 6
1,480,675 UART: [idev] SUBJECT.KEYID = 7
1,481,099 UART: [idev] UDS.KEYID = 0
1,481,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,505,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,228 UART: [ldev] ++
1,515,396 UART: [ldev] CDI.KEYID = 6
1,515,759 UART: [ldev] SUBJECT.KEYID = 5
1,516,185 UART: [ldev] AUTHORITY.KEYID = 7
1,516,648 UART: [ldev] FE.KEYID = 1
1,521,614 UART: [ldev] Erasing FE.KEYID = 1
1,546,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,465 UART: [ldev] --
1,585,898 UART: [fwproc] Waiting for Commands...
1,586,767 UART: [fwproc] Received command 0x46574c44
1,587,558 UART: [fwproc] Received Image of size 114332 bytes
1,853,921 UART: ROM Fatal Error: 0x000B0023
1,855,078 >>> mbox cmd response: failed
1,855,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,084 >>> mbox cmd response: failed
1,855,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,544 UART: [state] DebugLocked = No
86,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,694 UART: [kat] SHA2-256
881,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,740 UART: [kat] ++
885,892 UART: [kat] sha1
890,122 UART: [kat] SHA2-256
892,060 UART: [kat] SHA2-384
894,831 UART: [kat] SHA2-512-ACC
896,732 UART: [kat] ECC-384
902,417 UART: [kat] HMAC-384Kdf
906,995 UART: [kat] LMS
1,475,191 UART: [kat] --
1,475,942 UART: [cold-reset] ++
1,476,520 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,993 UART: [idev] Erasing UDS.KEYID = 0
1,504,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,075 UART: [idev] --
1,513,950 UART: [ldev] ++
1,514,118 UART: [ldev] CDI.KEYID = 6
1,514,481 UART: [ldev] SUBJECT.KEYID = 5
1,514,907 UART: [ldev] AUTHORITY.KEYID = 7
1,515,370 UART: [ldev] FE.KEYID = 1
1,520,870 UART: [ldev] Erasing FE.KEYID = 1
1,546,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,727 UART: [ldev] --
1,586,170 UART: [fwproc] Waiting for Commands...
1,586,941 UART: [fwproc] Received command 0x46574c44
1,587,732 UART: [fwproc] Received Image of size 114332 bytes
2,885,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,193 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,534 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,708,215 >>> mbox cmd response: failed
1,708,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,221 >>> mbox cmd response: failed
1,708,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,666 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,980 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,671 UART: [cold-reset] ++
1,172,091 UART: [fht] FHT @ 0x50003400
1,174,820 UART: [idev] ++
1,174,988 UART: [idev] CDI.KEYID = 6
1,175,348 UART: [idev] SUBJECT.KEYID = 7
1,175,772 UART: [idev] UDS.KEYID = 0
1,176,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,881 UART: [idev] Sha1 KeyId Algorithm
1,209,331 UART: [idev] --
1,210,453 UART: [ldev] ++
1,210,621 UART: [ldev] CDI.KEYID = 6
1,210,984 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,686 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,743 UART: ROM Fatal Error: 0x000B0023
1,551,900 >>> mbox cmd response: failed
1,551,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,906 >>> mbox cmd response: failed
1,551,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
918,198 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,171,929 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,170 UART: [idev] Erasing UDS.KEYID = 0
1,201,097 UART: [idev] Sha1 KeyId Algorithm
1,209,445 UART: [idev] --
1,210,471 UART: [ldev] ++
1,210,639 UART: [ldev] CDI.KEYID = 6
1,211,002 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,617 UART: [ldev] --
1,283,004 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,112 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,189 >>> mbox cmd response: failed
1,404,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,195 >>> mbox cmd response: failed
1,404,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,811 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,171,850 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,174,999 UART: [idev] ++
1,175,167 UART: [idev] CDI.KEYID = 6
1,175,527 UART: [idev] SUBJECT.KEYID = 7
1,175,951 UART: [idev] UDS.KEYID = 0
1,176,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,985 UART: [idev] Erasing UDS.KEYID = 0
1,200,874 UART: [idev] Sha1 KeyId Algorithm
1,209,320 UART: [idev] --
1,210,478 UART: [ldev] ++
1,210,646 UART: [ldev] CDI.KEYID = 6
1,211,009 UART: [ldev] SUBJECT.KEYID = 5
1,211,435 UART: [ldev] AUTHORITY.KEYID = 7
1,211,898 UART: [ldev] FE.KEYID = 1
1,217,530 UART: [ldev] Erasing FE.KEYID = 1
1,243,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,062 UART: [ldev] --
1,282,373 UART: [fwproc] Wait for Commands...
1,283,113 UART: [fwproc] Recv command 0x46574c44
1,283,841 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,648 UART: ROM Fatal Error: 0x000B0023
1,550,805 >>> mbox cmd response: failed
1,550,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,811 >>> mbox cmd response: failed
1,550,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,531 UART: [kat] SHA2-256
894,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,306 UART: [kat] ++
898,458 UART: [kat] sha1
902,714 UART: [kat] SHA2-256
904,654 UART: [kat] SHA2-384
907,227 UART: [kat] SHA2-512-ACC
909,128 UART: [kat] ECC-384
919,263 UART: [kat] HMAC-384Kdf
923,885 UART: [kat] LMS
1,172,213 UART: [kat] --
1,173,216 UART: [cold-reset] ++
1,173,580 UART: [fht] FHT @ 0x50003400
1,176,179 UART: [idev] ++
1,176,347 UART: [idev] CDI.KEYID = 6
1,176,707 UART: [idev] SUBJECT.KEYID = 7
1,177,131 UART: [idev] UDS.KEYID = 0
1,177,476 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,897 UART: [idev] Erasing UDS.KEYID = 0
1,202,224 UART: [idev] Sha1 KeyId Algorithm
1,210,696 UART: [idev] --
1,211,788 UART: [ldev] ++
1,211,956 UART: [ldev] CDI.KEYID = 6
1,212,319 UART: [ldev] SUBJECT.KEYID = 5
1,212,745 UART: [ldev] AUTHORITY.KEYID = 7
1,213,208 UART: [ldev] FE.KEYID = 1
1,218,378 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,632 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,679 UART: [fwproc] Recv command 0x46574c44
1,285,407 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,733 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,408,160 >>> mbox cmd response: failed
1,408,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,166 >>> mbox cmd response: failed
1,408,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,208 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,068 UART: [kat] SHA2-256
890,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,747 UART: [kat] ++
894,899 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,365 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,240,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,652 UART: [ldev] --
1,280,010 UART: [fwproc] Wait for Commands...
1,280,727 UART: [fwproc] Recv command 0x46574c44
1,281,460 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,622 UART: ROM Fatal Error: 0x000B0023
1,549,779 >>> mbox cmd response: failed
1,549,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,785 >>> mbox cmd response: failed
1,549,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,411 UART: [kat] SHA2-256
901,351 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,328 UART: [kat] HMAC-384Kdf
919,964 UART: [kat] LMS
1,168,276 UART: [kat] --
1,169,183 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,415 UART: [idev] ++
1,172,583 UART: [idev] CDI.KEYID = 6
1,172,944 UART: [idev] SUBJECT.KEYID = 7
1,173,369 UART: [idev] UDS.KEYID = 0
1,173,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,215 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,098 UART: [ldev] ++
1,208,266 UART: [ldev] CDI.KEYID = 6
1,208,630 UART: [ldev] SUBJECT.KEYID = 5
1,209,057 UART: [ldev] AUTHORITY.KEYID = 7
1,209,520 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,530 UART: [ldev] --
1,280,798 UART: [fwproc] Wait for Commands...
1,281,531 UART: [fwproc] Recv command 0x46574c44
1,282,264 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,256 >>> mbox cmd response: failed
1,403,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,262 >>> mbox cmd response: failed
1,403,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,352 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,174,154 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,567 UART: [ldev] ++
1,208,735 UART: [ldev] CDI.KEYID = 6
1,209,099 UART: [ldev] SUBJECT.KEYID = 5
1,209,526 UART: [ldev] AUTHORITY.KEYID = 7
1,209,989 UART: [ldev] FE.KEYID = 1
1,215,335 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,723 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,399 UART: ROM Fatal Error: 0x000B0023
1,549,556 >>> mbox cmd response: failed
1,549,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,562 >>> mbox cmd response: failed
1,549,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,396 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,174,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,980 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,417 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,661 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,703 >>> mbox cmd response: failed
1,401,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,709 >>> mbox cmd response: failed
1,401,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,477 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,717 UART: [kat] SHA2-256
892,655 UART: [kat] SHA2-384
895,626 UART: [kat] SHA2-512-ACC
897,527 UART: [kat] ECC-384
902,990 UART: [kat] HMAC-384Kdf
907,626 UART: [kat] LMS
1,475,822 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,405 UART: [fht] Storing FHT @ 0x50003400
1,480,162 UART: [idev] ++
1,480,330 UART: [idev] CDI.KEYID = 6
1,480,690 UART: [idev] SUBJECT.KEYID = 7
1,481,114 UART: [idev] UDS.KEYID = 0
1,481,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,126 UART: [idev] Erasing UDS.KEYID = 0
1,505,934 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,438 UART: [idev] --
1,515,431 UART: [ldev] ++
1,515,599 UART: [ldev] CDI.KEYID = 6
1,515,962 UART: [ldev] SUBJECT.KEYID = 5
1,516,388 UART: [ldev] AUTHORITY.KEYID = 7
1,516,851 UART: [ldev] FE.KEYID = 1
1,522,017 UART: [ldev] Erasing FE.KEYID = 1
1,547,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,378 UART: [ldev] --
1,586,661 UART: [fwproc] Waiting for Commands...
1,587,452 UART: [fwproc] Received command 0x46574c44
1,588,243 UART: [fwproc] Received Image of size 114332 bytes
1,854,195 UART: ROM Fatal Error: 0x000B0024
1,855,352 >>> mbox cmd response: failed
1,855,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,358 >>> mbox cmd response: failed
1,855,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,308 UART: [kat] SHA2-512-ACC
897,209 UART: [kat] ECC-384
902,568 UART: [kat] HMAC-384Kdf
907,220 UART: [kat] LMS
1,475,416 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,408 UART: [idev] Erasing UDS.KEYID = 0
1,505,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,062 UART: [idev] --
1,515,079 UART: [ldev] ++
1,515,247 UART: [ldev] CDI.KEYID = 6
1,515,610 UART: [ldev] SUBJECT.KEYID = 5
1,516,036 UART: [ldev] AUTHORITY.KEYID = 7
1,516,499 UART: [ldev] FE.KEYID = 1
1,521,823 UART: [ldev] Erasing FE.KEYID = 1
1,546,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,260 UART: [ldev] --
1,585,755 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 114332 bytes
2,884,822 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,394 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,583 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,393 >>> mbox cmd response: failed
1,707,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,399 >>> mbox cmd response: failed
1,707,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,470 UART: [kat] SHA2-256
892,408 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,339 UART: [kat] LMS
1,475,535 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,762 UART: [fht] Storing FHT @ 0x50003400
1,479,727 UART: [idev] ++
1,479,895 UART: [idev] CDI.KEYID = 6
1,480,255 UART: [idev] SUBJECT.KEYID = 7
1,480,679 UART: [idev] UDS.KEYID = 0
1,481,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,705 UART: [idev] --
1,515,924 UART: [ldev] ++
1,516,092 UART: [ldev] CDI.KEYID = 6
1,516,455 UART: [ldev] SUBJECT.KEYID = 5
1,516,881 UART: [ldev] AUTHORITY.KEYID = 7
1,517,344 UART: [ldev] FE.KEYID = 1
1,522,486 UART: [ldev] Erasing FE.KEYID = 1
1,547,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,651 UART: [ldev] --
1,587,028 UART: [fwproc] Waiting for Commands...
1,587,781 UART: [fwproc] Received command 0x46574c44
1,588,572 UART: [fwproc] Received Image of size 114332 bytes
1,854,972 UART: ROM Fatal Error: 0x000B0024
1,856,129 >>> mbox cmd response: failed
1,856,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,135 >>> mbox cmd response: failed
1,856,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,607 UART: [kat] HMAC-384Kdf
907,099 UART: [kat] LMS
1,475,295 UART: [kat] --
1,475,962 UART: [cold-reset] ++
1,476,524 UART: [fht] Storing FHT @ 0x50003400
1,479,249 UART: [idev] ++
1,479,417 UART: [idev] CDI.KEYID = 6
1,479,777 UART: [idev] SUBJECT.KEYID = 7
1,480,201 UART: [idev] UDS.KEYID = 0
1,480,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,137 UART: [idev] Erasing UDS.KEYID = 0
1,504,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,557 UART: [idev] --
1,514,564 UART: [ldev] ++
1,514,732 UART: [ldev] CDI.KEYID = 6
1,515,095 UART: [ldev] SUBJECT.KEYID = 5
1,515,521 UART: [ldev] AUTHORITY.KEYID = 7
1,515,984 UART: [ldev] FE.KEYID = 1
1,521,236 UART: [ldev] Erasing FE.KEYID = 1
1,546,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,365 UART: [ldev] --
1,585,760 UART: [fwproc] Waiting for Commands...
1,586,493 UART: [fwproc] Received command 0x46574c44
1,587,284 UART: [fwproc] Received Image of size 114332 bytes
2,884,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,064 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,260 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,542 >>> mbox cmd response: failed
1,707,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,548 >>> mbox cmd response: failed
1,707,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,120 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,264 UART: [kat] SHA2-512-ACC
908,165 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,233 UART: [fht] FHT @ 0x50003400
1,174,912 UART: [idev] ++
1,175,080 UART: [idev] CDI.KEYID = 6
1,175,440 UART: [idev] SUBJECT.KEYID = 7
1,175,864 UART: [idev] UDS.KEYID = 0
1,176,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,209,171 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,668 UART: [ldev] SUBJECT.KEYID = 5
1,211,094 UART: [ldev] AUTHORITY.KEYID = 7
1,211,557 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,874 UART: [fwproc] Wait for Commands...
1,283,684 UART: [fwproc] Recv command 0x46574c44
1,284,412 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,694 UART: ROM Fatal Error: 0x000B0024
1,551,851 >>> mbox cmd response: failed
1,551,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,857 >>> mbox cmd response: failed
1,551,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
901,989 UART: [kat] SHA2-256
903,929 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,267 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,276 UART: [idev] ++
1,175,444 UART: [idev] CDI.KEYID = 6
1,175,804 UART: [idev] SUBJECT.KEYID = 7
1,176,228 UART: [idev] UDS.KEYID = 0
1,176,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,545 UART: [idev] Sha1 KeyId Algorithm
1,208,989 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,282,858 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,478 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,407,130 >>> mbox cmd response: failed
1,407,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,136 >>> mbox cmd response: failed
1,407,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,197 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,865 UART: [kat] SHA2-512-ACC
908,766 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,532 UART: [idev] Sha1 KeyId Algorithm
1,209,930 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,608 UART: [ldev] Erasing FE.KEYID = 1
1,244,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,058 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,373 UART: [fwproc] Recv command 0x46574c44
1,285,101 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,753 UART: ROM Fatal Error: 0x000B0024
1,551,910 >>> mbox cmd response: failed
1,551,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,916 >>> mbox cmd response: failed
1,551,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
893,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,394 UART: [kat] ++
897,546 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
917,867 UART: [kat] HMAC-384Kdf
922,397 UART: [kat] LMS
1,170,725 UART: [kat] --
1,171,622 UART: [cold-reset] ++
1,172,048 UART: [fht] FHT @ 0x50003400
1,174,521 UART: [idev] ++
1,174,689 UART: [idev] CDI.KEYID = 6
1,175,049 UART: [idev] SUBJECT.KEYID = 7
1,175,473 UART: [idev] UDS.KEYID = 0
1,175,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,653 UART: [idev] Erasing UDS.KEYID = 0
1,200,554 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] --
1,210,024 UART: [ldev] ++
1,210,192 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,981 UART: [ldev] AUTHORITY.KEYID = 7
1,211,444 UART: [ldev] FE.KEYID = 1
1,216,758 UART: [ldev] Erasing FE.KEYID = 1
1,243,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,094 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,135 UART: [fwproc] Recv command 0x46574c44
1,283,863 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,965 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,839 >>> mbox cmd response: failed
1,404,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,845 >>> mbox cmd response: failed
1,404,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,685 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,174,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,072 UART: [ldev] Erasing FE.KEYID = 1
1,241,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,466 UART: [fwproc] Wait for Commands...
1,281,189 UART: [fwproc] Recv command 0x46574c44
1,281,922 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,473 UART: ROM Fatal Error: 0x000B0024
1,548,630 >>> mbox cmd response: failed
1,548,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,636 >>> mbox cmd response: failed
1,548,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,565 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,363 UART: [idev] --
1,209,390 UART: [ldev] ++
1,209,558 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,349 UART: [ldev] AUTHORITY.KEYID = 7
1,210,812 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,372 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,172 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,897 >>> mbox cmd response: failed
1,401,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,903 >>> mbox cmd response: failed
1,401,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,918 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,174,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,250 UART: [idev] Sha1 KeyId Algorithm
1,207,972 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,123 UART: [ldev] --
1,282,497 UART: [fwproc] Wait for Commands...
1,283,108 UART: [fwproc] Recv command 0x46574c44
1,283,841 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,470 UART: ROM Fatal Error: 0x000B0024
1,552,627 >>> mbox cmd response: failed
1,552,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,633 >>> mbox cmd response: failed
1,552,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,174,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,878 UART: [idev] Sha1 KeyId Algorithm
1,208,916 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,281 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,513 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,098 >>> mbox cmd response: failed
1,403,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,104 >>> mbox cmd response: failed
1,403,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,631 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,193 UART: [kat] SHA2-256
892,131 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,238 UART: [kat] HMAC-384Kdf
906,708 UART: [kat] LMS
1,474,904 UART: [kat] --
1,475,625 UART: [cold-reset] ++
1,476,003 UART: [fht] Storing FHT @ 0x50003400
1,478,834 UART: [idev] ++
1,479,002 UART: [idev] CDI.KEYID = 6
1,479,362 UART: [idev] SUBJECT.KEYID = 7
1,479,786 UART: [idev] UDS.KEYID = 0
1,480,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,652 UART: [idev] --
1,514,735 UART: [ldev] ++
1,514,903 UART: [ldev] CDI.KEYID = 6
1,515,266 UART: [ldev] SUBJECT.KEYID = 5
1,515,692 UART: [ldev] AUTHORITY.KEYID = 7
1,516,155 UART: [ldev] FE.KEYID = 1
1,521,111 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,802 UART: [ldev] --
1,586,165 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 114332 bytes
1,853,987 UART: ROM Fatal Error: 0x000B0021
1,855,144 >>> mbox cmd response: failed
1,855,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,150 >>> mbox cmd response: failed
1,855,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,562 UART: [kat] LMS
1,475,758 UART: [kat] --
1,476,727 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,094 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,646 UART: [idev] --
1,514,863 UART: [ldev] ++
1,515,031 UART: [ldev] CDI.KEYID = 6
1,515,394 UART: [ldev] SUBJECT.KEYID = 5
1,515,820 UART: [ldev] AUTHORITY.KEYID = 7
1,516,283 UART: [ldev] FE.KEYID = 1
1,521,395 UART: [ldev] Erasing FE.KEYID = 1
1,546,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,397 UART: [fwproc] Waiting for Commands...
1,586,252 UART: [fwproc] Received command 0x46574c44
1,587,043 UART: [fwproc] Received Image of size 114332 bytes
2,883,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,309 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,893 >>> mbox cmd response: failed
1,707,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,899 >>> mbox cmd response: failed
1,707,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,851 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,081 UART: [kat] HMAC-384Kdf
907,783 UART: [kat] LMS
1,475,979 UART: [kat] --
1,476,660 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,479,821 UART: [idev] ++
1,479,989 UART: [idev] CDI.KEYID = 6
1,480,349 UART: [idev] SUBJECT.KEYID = 7
1,480,773 UART: [idev] UDS.KEYID = 0
1,481,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,635 UART: [idev] --
1,515,808 UART: [ldev] ++
1,515,976 UART: [ldev] CDI.KEYID = 6
1,516,339 UART: [ldev] SUBJECT.KEYID = 5
1,516,765 UART: [ldev] AUTHORITY.KEYID = 7
1,517,228 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,548,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,567 UART: [ldev] --
1,587,076 UART: [fwproc] Waiting for Commands...
1,587,791 UART: [fwproc] Received command 0x46574c44
1,588,582 UART: [fwproc] Received Image of size 114332 bytes
1,856,210 UART: ROM Fatal Error: 0x000B0021
1,857,367 >>> mbox cmd response: failed
1,857,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,373 >>> mbox cmd response: failed
1,857,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,378 UART: [kat] SHA2-256
892,316 UART: [kat] SHA2-384
895,063 UART: [kat] SHA2-512-ACC
896,964 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,320 UART: [cold-reset] ++
1,476,878 UART: [fht] Storing FHT @ 0x50003400
1,479,665 UART: [idev] ++
1,479,833 UART: [idev] CDI.KEYID = 6
1,480,193 UART: [idev] SUBJECT.KEYID = 7
1,480,617 UART: [idev] UDS.KEYID = 0
1,480,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,583 UART: [idev] Erasing UDS.KEYID = 0
1,505,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,340 UART: [ldev] Erasing FE.KEYID = 1
1,546,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,503 UART: [ldev] --
1,585,894 UART: [fwproc] Waiting for Commands...
1,586,683 UART: [fwproc] Received command 0x46574c44
1,587,474 UART: [fwproc] Received Image of size 114332 bytes
2,884,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,459 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,690 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,766 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,709,334 >>> mbox cmd response: failed
1,709,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,340 >>> mbox cmd response: failed
1,709,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,402 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,152 UART: [kat] SHA2-512-ACC
908,053 UART: [kat] ECC-384
917,752 UART: [kat] HMAC-384Kdf
922,476 UART: [kat] LMS
1,170,804 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,200,699 UART: [idev] Sha1 KeyId Algorithm
1,209,001 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,648 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,390 UART: [fwproc] Wait for Commands...
1,283,042 UART: [fwproc] Recv command 0x46574c44
1,283,770 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,548 UART: ROM Fatal Error: 0x000B0021
1,551,705 >>> mbox cmd response: failed
1,551,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,711 >>> mbox cmd response: failed
1,551,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
917,516 UART: [kat] HMAC-384Kdf
922,102 UART: [kat] LMS
1,170,430 UART: [kat] --
1,171,205 UART: [cold-reset] ++
1,171,717 UART: [fht] FHT @ 0x50003400
1,174,404 UART: [idev] ++
1,174,572 UART: [idev] CDI.KEYID = 6
1,174,932 UART: [idev] SUBJECT.KEYID = 7
1,175,356 UART: [idev] UDS.KEYID = 0
1,175,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,414 UART: [idev] Erasing UDS.KEYID = 0
1,200,249 UART: [idev] Sha1 KeyId Algorithm
1,208,583 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,306 UART: [ldev] SUBJECT.KEYID = 5
1,210,732 UART: [ldev] AUTHORITY.KEYID = 7
1,211,195 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,241,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,789 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,850 UART: [fwproc] Recv command 0x46574c44
1,282,578 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,888 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,405,294 >>> mbox cmd response: failed
1,405,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,300 >>> mbox cmd response: failed
1,405,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,123 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
893,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,814 UART: [kat] ++
897,966 UART: [kat] sha1
902,096 UART: [kat] SHA2-256
904,036 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,201,672 UART: [idev] Sha1 KeyId Algorithm
1,210,132 UART: [idev] --
1,211,078 UART: [ldev] ++
1,211,246 UART: [ldev] CDI.KEYID = 6
1,211,609 UART: [ldev] SUBJECT.KEYID = 5
1,212,035 UART: [ldev] AUTHORITY.KEYID = 7
1,212,498 UART: [ldev] FE.KEYID = 1
1,217,678 UART: [ldev] Erasing FE.KEYID = 1
1,244,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,354 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,471 UART: ROM Fatal Error: 0x000B0021
1,552,628 >>> mbox cmd response: failed
1,552,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,634 >>> mbox cmd response: failed
1,552,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
893,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,566 UART: [kat] ++
897,718 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,140 UART: [cold-reset] ++
1,172,694 UART: [fht] FHT @ 0x50003400
1,175,117 UART: [idev] ++
1,175,285 UART: [idev] CDI.KEYID = 6
1,175,645 UART: [idev] SUBJECT.KEYID = 7
1,176,069 UART: [idev] UDS.KEYID = 0
1,176,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,041 UART: [idev] Erasing UDS.KEYID = 0
1,201,164 UART: [idev] Sha1 KeyId Algorithm
1,209,558 UART: [idev] --
1,210,656 UART: [ldev] ++
1,210,824 UART: [ldev] CDI.KEYID = 6
1,211,187 UART: [ldev] SUBJECT.KEYID = 5
1,211,613 UART: [ldev] AUTHORITY.KEYID = 7
1,212,076 UART: [ldev] FE.KEYID = 1
1,217,608 UART: [ldev] Erasing FE.KEYID = 1
1,244,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,660 UART: [ldev] --
1,284,071 UART: [fwproc] Wait for Commands...
1,284,813 UART: [fwproc] Recv command 0x46574c44
1,285,541 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,341 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,623 >>> mbox cmd response: failed
1,406,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,629 >>> mbox cmd response: failed
1,406,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,026 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,048 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,331 UART: [kat] SHA2-256
901,271 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,188 UART: [kat] HMAC-384Kdf
919,876 UART: [kat] LMS
1,168,188 UART: [kat] --
1,169,185 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,173,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,572 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,013 UART: ROM Fatal Error: 0x000B0021
1,549,170 >>> mbox cmd response: failed
1,549,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,176 >>> mbox cmd response: failed
1,549,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,173,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,240,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,176 UART: [ldev] --
1,279,686 UART: [fwproc] Wait for Commands...
1,280,451 UART: [fwproc] Recv command 0x46574c44
1,281,184 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,174 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,751 >>> mbox cmd response: failed
1,400,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,757 >>> mbox cmd response: failed
1,400,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,030 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,434 UART: [kat] SHA2-256
901,374 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,208,851 UART: [ldev] ++
1,209,019 UART: [ldev] CDI.KEYID = 6
1,209,383 UART: [ldev] SUBJECT.KEYID = 5
1,209,810 UART: [ldev] AUTHORITY.KEYID = 7
1,210,273 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,241,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,945 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,034 UART: ROM Fatal Error: 0x000B0021
1,550,191 >>> mbox cmd response: failed
1,550,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,197 >>> mbox cmd response: failed
1,550,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,794 UART: [idev] ++
1,172,962 UART: [idev] CDI.KEYID = 6
1,173,323 UART: [idev] SUBJECT.KEYID = 7
1,173,748 UART: [idev] UDS.KEYID = 0
1,174,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,590 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,689 UART: [ldev] ++
1,208,857 UART: [ldev] CDI.KEYID = 6
1,209,221 UART: [ldev] SUBJECT.KEYID = 5
1,209,648 UART: [ldev] AUTHORITY.KEYID = 7
1,210,111 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,479 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,355 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,648 >>> mbox cmd response: failed
1,404,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,654 >>> mbox cmd response: failed
1,404,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,463 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,605 UART: [kat] SHA2-256
881,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,651 UART: [kat] ++
885,803 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,696 UART: [kat] SHA2-512-ACC
896,597 UART: [kat] ECC-384
902,056 UART: [kat] HMAC-384Kdf
906,700 UART: [kat] LMS
1,474,896 UART: [kat] --
1,475,971 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,204 UART: [idev] ++
1,479,372 UART: [idev] CDI.KEYID = 6
1,479,732 UART: [idev] SUBJECT.KEYID = 7
1,480,156 UART: [idev] UDS.KEYID = 0
1,480,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,698 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,406 UART: [idev] --
1,514,607 UART: [ldev] ++
1,514,775 UART: [ldev] CDI.KEYID = 6
1,515,138 UART: [ldev] SUBJECT.KEYID = 5
1,515,564 UART: [ldev] AUTHORITY.KEYID = 7
1,516,027 UART: [ldev] FE.KEYID = 1
1,521,157 UART: [ldev] Erasing FE.KEYID = 1
1,546,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,772 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,812 UART: [fwproc] Received command 0x46574c44
1,587,603 UART: [fwproc] Received Image of size 114332 bytes
1,853,883 UART: ROM Fatal Error: 0x000B0022
1,855,040 >>> mbox cmd response: failed
1,855,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,046 >>> mbox cmd response: failed
1,855,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,282 UART: [kat] LMS
1,475,478 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,696 UART: [idev] ++
1,479,864 UART: [idev] CDI.KEYID = 6
1,480,224 UART: [idev] SUBJECT.KEYID = 7
1,480,648 UART: [idev] UDS.KEYID = 0
1,480,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,504,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,496 UART: [idev] --
1,514,621 UART: [ldev] ++
1,514,789 UART: [ldev] CDI.KEYID = 6
1,515,152 UART: [ldev] SUBJECT.KEYID = 5
1,515,578 UART: [ldev] AUTHORITY.KEYID = 7
1,516,041 UART: [ldev] FE.KEYID = 1
1,521,127 UART: [ldev] Erasing FE.KEYID = 1
1,546,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,710 UART: [fwproc] Received command 0x46574c44
1,587,501 UART: [fwproc] Received Image of size 114332 bytes
2,884,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,524 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,747 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,479 >>> mbox cmd response: failed
1,707,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,485 >>> mbox cmd response: failed
1,707,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,211 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,479,825 UART: [idev] ++
1,479,993 UART: [idev] CDI.KEYID = 6
1,480,353 UART: [idev] SUBJECT.KEYID = 7
1,480,777 UART: [idev] UDS.KEYID = 0
1,481,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,045 UART: [idev] --
1,515,058 UART: [ldev] ++
1,515,226 UART: [ldev] CDI.KEYID = 6
1,515,589 UART: [ldev] SUBJECT.KEYID = 5
1,516,015 UART: [ldev] AUTHORITY.KEYID = 7
1,516,478 UART: [ldev] FE.KEYID = 1
1,521,728 UART: [ldev] Erasing FE.KEYID = 1
1,546,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,415 UART: [ldev] --
1,585,890 UART: [fwproc] Waiting for Commands...
1,586,681 UART: [fwproc] Received command 0x46574c44
1,587,472 UART: [fwproc] Received Image of size 114332 bytes
1,853,152 UART: ROM Fatal Error: 0x000B0022
1,854,309 >>> mbox cmd response: failed
1,854,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,315 >>> mbox cmd response: failed
1,854,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,317 UART: [kat] SHA2-512-ACC
897,218 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,412 UART: [cold-reset] ++
1,476,764 UART: [fht] Storing FHT @ 0x50003400
1,479,495 UART: [idev] ++
1,479,663 UART: [idev] CDI.KEYID = 6
1,480,023 UART: [idev] SUBJECT.KEYID = 7
1,480,447 UART: [idev] UDS.KEYID = 0
1,480,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,817 UART: [idev] Erasing UDS.KEYID = 0
1,505,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,871 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,521,740 UART: [ldev] Erasing FE.KEYID = 1
1,547,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,965 UART: [ldev] --
1,586,392 UART: [fwproc] Waiting for Commands...
1,587,009 UART: [fwproc] Received command 0x46574c44
1,587,800 UART: [fwproc] Received Image of size 114332 bytes
2,884,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,881 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,980 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,709,196 >>> mbox cmd response: failed
1,709,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,202 >>> mbox cmd response: failed
1,709,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,472 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,612 UART: [state] LifecycleState = Unprovisioned
85,267 UART: [state] DebugLocked = No
85,977 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
892,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,067 UART: [kat] ++
897,219 UART: [kat] sha1
901,399 UART: [kat] SHA2-256
903,339 UART: [kat] SHA2-384
906,092 UART: [kat] SHA2-512-ACC
907,993 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,635 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,942 UART: [idev] ++
1,175,110 UART: [idev] CDI.KEYID = 6
1,175,470 UART: [idev] SUBJECT.KEYID = 7
1,175,894 UART: [idev] UDS.KEYID = 0
1,176,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,979 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,389 UART: [ldev] ++
1,210,557 UART: [ldev] CDI.KEYID = 6
1,210,920 UART: [ldev] SUBJECT.KEYID = 5
1,211,346 UART: [ldev] AUTHORITY.KEYID = 7
1,211,809 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,200 UART: [fwproc] Wait for Commands...
1,283,780 UART: [fwproc] Recv command 0x46574c44
1,284,508 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,062 UART: ROM Fatal Error: 0x000B0022
1,552,219 >>> mbox cmd response: failed
1,552,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,225 >>> mbox cmd response: failed
1,552,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,646 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,467 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,668 UART: [idev] ++
1,174,836 UART: [idev] CDI.KEYID = 6
1,175,196 UART: [idev] SUBJECT.KEYID = 7
1,175,620 UART: [idev] UDS.KEYID = 0
1,175,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,200,881 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,302 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,548 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,408,106 >>> mbox cmd response: failed
1,408,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,112 >>> mbox cmd response: failed
1,408,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,829 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
893,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,632 UART: [kat] ++
897,784 UART: [kat] sha1
901,840 UART: [kat] SHA2-256
903,780 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,633 UART: [kat] HMAC-384Kdf
923,265 UART: [kat] LMS
1,171,593 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,650 UART: [fht] FHT @ 0x50003400
1,175,359 UART: [idev] ++
1,175,527 UART: [idev] CDI.KEYID = 6
1,175,887 UART: [idev] SUBJECT.KEYID = 7
1,176,311 UART: [idev] UDS.KEYID = 0
1,176,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,719 UART: [idev] Erasing UDS.KEYID = 0
1,201,580 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,384 UART: [ldev] Erasing FE.KEYID = 1
1,244,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,384 UART: [ldev] --
1,283,863 UART: [fwproc] Wait for Commands...
1,284,473 UART: [fwproc] Recv command 0x46574c44
1,285,201 UART: [fwproc] Recv'd Img size: 114332 bytes
1,554,001 UART: ROM Fatal Error: 0x000B0022
1,555,158 >>> mbox cmd response: failed
1,555,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,555,164 >>> mbox cmd response: failed
1,555,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,555,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,476 UART: [kat] SHA2-256
904,416 UART: [kat] SHA2-384
907,323 UART: [kat] SHA2-512-ACC
909,224 UART: [kat] ECC-384
918,959 UART: [kat] HMAC-384Kdf
923,537 UART: [kat] LMS
1,171,865 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,202,210 UART: [idev] Sha1 KeyId Algorithm
1,210,740 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,244,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,164 UART: [ldev] --
1,283,575 UART: [fwproc] Wait for Commands...
1,284,363 UART: [fwproc] Recv command 0x46574c44
1,285,091 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,427 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,521 >>> mbox cmd response: failed
1,406,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,527 >>> mbox cmd response: failed
1,406,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,452 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,100 UART: [ldev] Erasing FE.KEYID = 1
1,240,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,920 UART: [ldev] --
1,280,282 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,295 UART: ROM Fatal Error: 0x000B0022
1,547,452 >>> mbox cmd response: failed
1,547,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,547,458 >>> mbox cmd response: failed
1,547,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,547,464 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,497 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,424 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,388 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,637 >>> mbox cmd response: failed
1,401,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,643 >>> mbox cmd response: failed
1,401,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,160 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,117 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,226 UART: ROM Fatal Error: 0x000B0022
1,551,383 >>> mbox cmd response: failed
1,551,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,389 >>> mbox cmd response: failed
1,551,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,271 UART: [kat] LMS
1,169,583 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,175,106 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,223 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,287 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,500 >>> mbox cmd response: failed
1,403,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,506 >>> mbox cmd response: failed
1,403,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,273 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,671 UART: [kat] SHA2-256
881,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,717 UART: [kat] ++
885,869 UART: [kat] sha1
890,143 UART: [kat] SHA2-256
892,081 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,292 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,475,931 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,479,046 UART: [idev] ++
1,479,214 UART: [idev] CDI.KEYID = 6
1,479,574 UART: [idev] SUBJECT.KEYID = 7
1,479,998 UART: [idev] UDS.KEYID = 0
1,480,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,614 UART: [idev] Erasing UDS.KEYID = 0
1,504,538 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,978 UART: [idev] --
1,514,177 UART: [ldev] ++
1,514,345 UART: [ldev] CDI.KEYID = 6
1,514,708 UART: [ldev] SUBJECT.KEYID = 5
1,515,134 UART: [ldev] AUTHORITY.KEYID = 7
1,515,597 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,545,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,322 UART: [ldev] --
1,584,693 UART: [fwproc] Waiting for Commands...
1,585,352 UART: [fwproc] Received command 0x46574c44
1,586,143 UART: [fwproc] Received Image of size 114332 bytes
1,633,431 UART: ROM Fatal Error: 0x000B003E
1,634,590 >>> mbox cmd response: failed
1,634,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,596 >>> mbox cmd response: failed
1,634,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
890,107 UART: [kat] SHA2-256
892,045 UART: [kat] SHA2-384
894,718 UART: [kat] SHA2-512-ACC
896,619 UART: [kat] ECC-384
901,856 UART: [kat] HMAC-384Kdf
906,518 UART: [kat] LMS
1,474,714 UART: [kat] --
1,475,427 UART: [cold-reset] ++
1,475,827 UART: [fht] Storing FHT @ 0x50003400
1,478,410 UART: [idev] ++
1,478,578 UART: [idev] CDI.KEYID = 6
1,478,938 UART: [idev] SUBJECT.KEYID = 7
1,479,362 UART: [idev] UDS.KEYID = 0
1,479,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,794 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,661 UART: [ldev] ++
1,514,829 UART: [ldev] CDI.KEYID = 6
1,515,192 UART: [ldev] SUBJECT.KEYID = 5
1,515,618 UART: [ldev] AUTHORITY.KEYID = 7
1,516,081 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,148 UART: [ldev] --
1,586,529 UART: [fwproc] Waiting for Commands...
1,587,322 UART: [fwproc] Received command 0x46574c44
1,588,113 UART: [fwproc] Received Image of size 114332 bytes
2,884,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,223 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,611 >>> mbox cmd response: failed
1,487,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,617 >>> mbox cmd response: failed
1,487,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,093 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
895,315 UART: [kat] SHA2-512-ACC
897,216 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,574 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,506,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,835 UART: [idev] --
1,515,958 UART: [ldev] ++
1,516,126 UART: [ldev] CDI.KEYID = 6
1,516,489 UART: [ldev] SUBJECT.KEYID = 5
1,516,915 UART: [ldev] AUTHORITY.KEYID = 7
1,517,378 UART: [ldev] FE.KEYID = 1
1,522,626 UART: [ldev] Erasing FE.KEYID = 1
1,548,531 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,259 UART: [ldev] --
1,587,766 UART: [fwproc] Waiting for Commands...
1,588,535 UART: [fwproc] Received command 0x46574c44
1,589,326 UART: [fwproc] Received Image of size 114332 bytes
1,636,438 UART: ROM Fatal Error: 0x000B003E
1,637,597 >>> mbox cmd response: failed
1,637,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,603 >>> mbox cmd response: failed
1,637,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,496 UART: [kat] SHA2-256
892,434 UART: [kat] SHA2-384
895,177 UART: [kat] SHA2-512-ACC
897,078 UART: [kat] ECC-384
902,711 UART: [kat] HMAC-384Kdf
907,271 UART: [kat] LMS
1,475,467 UART: [kat] --
1,476,398 UART: [cold-reset] ++
1,476,900 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,505,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,711 UART: [idev] --
1,515,680 UART: [ldev] ++
1,515,848 UART: [ldev] CDI.KEYID = 6
1,516,211 UART: [ldev] SUBJECT.KEYID = 5
1,516,637 UART: [ldev] AUTHORITY.KEYID = 7
1,517,100 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,547,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,143 UART: [ldev] --
1,586,606 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114332 bytes
2,884,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,086 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,260 >>> mbox cmd response: failed
1,488,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,266 >>> mbox cmd response: failed
1,488,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,002 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
893,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,815 UART: [kat] ++
897,967 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,956 UART: [kat] SHA2-512-ACC
908,857 UART: [kat] ECC-384
919,042 UART: [kat] HMAC-384Kdf
923,492 UART: [kat] LMS
1,171,820 UART: [kat] --
1,172,789 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,878 UART: [idev] ++
1,176,046 UART: [idev] CDI.KEYID = 6
1,176,406 UART: [idev] SUBJECT.KEYID = 7
1,176,830 UART: [idev] UDS.KEYID = 0
1,177,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,892 UART: [idev] Erasing UDS.KEYID = 0
1,201,923 UART: [idev] Sha1 KeyId Algorithm
1,210,517 UART: [idev] --
1,211,735 UART: [ldev] ++
1,211,903 UART: [ldev] CDI.KEYID = 6
1,212,266 UART: [ldev] SUBJECT.KEYID = 5
1,212,692 UART: [ldev] AUTHORITY.KEYID = 7
1,213,155 UART: [ldev] FE.KEYID = 1
1,218,393 UART: [ldev] Erasing FE.KEYID = 1
1,244,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,169 UART: [ldev] --
1,284,454 UART: [fwproc] Wait for Commands...
1,285,212 UART: [fwproc] Recv command 0x46574c44
1,285,940 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,048 UART: ROM Fatal Error: 0x000B003E
1,334,207 >>> mbox cmd response: failed
1,334,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,213 >>> mbox cmd response: failed
1,334,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,363 UART: [kat] SHA2-256
904,303 UART: [kat] SHA2-384
907,060 UART: [kat] SHA2-512-ACC
908,961 UART: [kat] ECC-384
918,566 UART: [kat] HMAC-384Kdf
923,266 UART: [kat] LMS
1,171,594 UART: [kat] --
1,172,395 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,558 UART: [idev] ++
1,175,726 UART: [idev] CDI.KEYID = 6
1,176,086 UART: [idev] SUBJECT.KEYID = 7
1,176,510 UART: [idev] UDS.KEYID = 0
1,176,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,706 UART: [idev] Erasing UDS.KEYID = 0
1,201,573 UART: [idev] Sha1 KeyId Algorithm
1,210,065 UART: [idev] --
1,211,183 UART: [ldev] ++
1,211,351 UART: [ldev] CDI.KEYID = 6
1,211,714 UART: [ldev] SUBJECT.KEYID = 5
1,212,140 UART: [ldev] AUTHORITY.KEYID = 7
1,212,603 UART: [ldev] FE.KEYID = 1
1,217,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,693 UART: [ldev] --
1,283,166 UART: [fwproc] Wait for Commands...
1,283,834 UART: [fwproc] Recv command 0x46574c44
1,284,562 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,240 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,356 >>> mbox cmd response: failed
1,186,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,362 >>> mbox cmd response: failed
1,186,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,909 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
893,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,398 UART: [kat] ++
897,550 UART: [kat] sha1
901,706 UART: [kat] SHA2-256
903,646 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
918,597 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,830 UART: [cold-reset] ++
1,173,250 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,806 UART: [idev] Sha1 KeyId Algorithm
1,210,312 UART: [idev] --
1,211,352 UART: [ldev] ++
1,211,520 UART: [ldev] CDI.KEYID = 6
1,211,883 UART: [ldev] SUBJECT.KEYID = 5
1,212,309 UART: [ldev] AUTHORITY.KEYID = 7
1,212,772 UART: [ldev] FE.KEYID = 1
1,218,162 UART: [ldev] Erasing FE.KEYID = 1
1,244,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,719 UART: [fwproc] Wait for Commands...
1,284,343 UART: [fwproc] Recv command 0x46574c44
1,285,071 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,595 UART: ROM Fatal Error: 0x000B003E
1,333,754 >>> mbox cmd response: failed
1,333,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,760 >>> mbox cmd response: failed
1,333,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,557 UART: [kat] SHA2-512-ACC
908,458 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,685 UART: [kat] LMS
1,171,013 UART: [kat] --
1,171,886 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,087 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,684 UART: [idev] --
1,211,578 UART: [ldev] ++
1,211,746 UART: [ldev] CDI.KEYID = 6
1,212,109 UART: [ldev] SUBJECT.KEYID = 5
1,212,535 UART: [ldev] AUTHORITY.KEYID = 7
1,212,998 UART: [ldev] FE.KEYID = 1
1,218,238 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,102 UART: [ldev] --
1,283,423 UART: [fwproc] Wait for Commands...
1,284,137 UART: [fwproc] Recv command 0x46574c44
1,284,865 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,781 >>> mbox cmd response: failed
1,187,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,787 >>> mbox cmd response: failed
1,187,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,824 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,911 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,177 UART: [idev] --
1,209,054 UART: [ldev] ++
1,209,222 UART: [ldev] CDI.KEYID = 6
1,209,586 UART: [ldev] SUBJECT.KEYID = 5
1,210,013 UART: [ldev] AUTHORITY.KEYID = 7
1,210,476 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,694 UART: [fwproc] Wait for Commands...
1,281,517 UART: [fwproc] Recv command 0x46574c44
1,282,250 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,645 UART: ROM Fatal Error: 0x000B003E
1,330,804 >>> mbox cmd response: failed
1,330,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,810 >>> mbox cmd response: failed
1,330,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,269 UART: [cold-reset] ++
1,170,753 UART: [fht] FHT @ 0x50003400
1,173,397 UART: [idev] ++
1,173,565 UART: [idev] CDI.KEYID = 6
1,173,926 UART: [idev] SUBJECT.KEYID = 7
1,174,351 UART: [idev] UDS.KEYID = 0
1,174,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,369 UART: [idev] Sha1 KeyId Algorithm
1,208,379 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,666 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,571 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,761 >>> mbox cmd response: failed
1,183,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,767 >>> mbox cmd response: failed
1,183,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,198,976 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,349 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,607 UART: [ldev] --
1,280,969 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,372 UART: ROM Fatal Error: 0x000B003E
1,331,531 >>> mbox cmd response: failed
1,331,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,537 >>> mbox cmd response: failed
1,331,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,174,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,698 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,499 UART: [ldev] Erasing FE.KEYID = 1
1,241,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,677 UART: [ldev] --
1,280,977 UART: [fwproc] Wait for Commands...
1,281,550 UART: [fwproc] Recv command 0x46574c44
1,282,283 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,971 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,192 >>> mbox cmd response: failed
1,183,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,198 >>> mbox cmd response: failed
1,183,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,499 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,256 UART: [kat] LMS
1,475,452 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,763 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,602 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,111 UART: [ldev] Erasing FE.KEYID = 1
1,546,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,638 UART: [fwproc] Received command 0x46574c44
1,587,429 UART: [fwproc] Received Image of size 114332 bytes
1,635,530 UART: ROM Fatal Error: 0x000B0018
1,636,687 >>> mbox cmd response: failed
1,636,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,693 >>> mbox cmd response: failed
1,636,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
902,646 UART: [kat] HMAC-384Kdf
907,282 UART: [kat] LMS
1,475,478 UART: [kat] --
1,476,621 UART: [cold-reset] ++
1,477,153 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,196 UART: [idev] Erasing UDS.KEYID = 0
1,506,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,054 UART: [idev] --
1,516,181 UART: [ldev] ++
1,516,349 UART: [ldev] CDI.KEYID = 6
1,516,712 UART: [ldev] SUBJECT.KEYID = 5
1,517,138 UART: [ldev] AUTHORITY.KEYID = 7
1,517,601 UART: [ldev] FE.KEYID = 1
1,522,769 UART: [ldev] Erasing FE.KEYID = 1
1,547,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,614 UART: [ldev] --
1,586,953 UART: [fwproc] Waiting for Commands...
1,587,716 UART: [fwproc] Received command 0x46574c44
1,588,507 UART: [fwproc] Received Image of size 114332 bytes
2,886,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,508 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,835 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,944 >>> mbox cmd response: failed
1,487,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,950 >>> mbox cmd response: failed
1,487,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,892 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,903 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = No
87,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,624 UART: [kat] SHA2-256
882,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,670 UART: [kat] ++
886,822 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,315 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,477,182 UART: [cold-reset] ++
1,477,732 UART: [fht] Storing FHT @ 0x50003400
1,480,339 UART: [idev] ++
1,480,507 UART: [idev] CDI.KEYID = 6
1,480,867 UART: [idev] SUBJECT.KEYID = 7
1,481,291 UART: [idev] UDS.KEYID = 0
1,481,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,505,671 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,209 UART: [idev] --
1,515,424 UART: [ldev] ++
1,515,592 UART: [ldev] CDI.KEYID = 6
1,515,955 UART: [ldev] SUBJECT.KEYID = 5
1,516,381 UART: [ldev] AUTHORITY.KEYID = 7
1,516,844 UART: [ldev] FE.KEYID = 1
1,522,180 UART: [ldev] Erasing FE.KEYID = 1
1,547,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,529 UART: [ldev] --
1,586,954 UART: [fwproc] Waiting for Commands...
1,587,777 UART: [fwproc] Received command 0x46574c44
1,588,568 UART: [fwproc] Received Image of size 114332 bytes
1,636,087 UART: ROM Fatal Error: 0x000B0018
1,637,244 >>> mbox cmd response: failed
1,637,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,250 >>> mbox cmd response: failed
1,637,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,832 UART: [kat] SHA2-256
881,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,878 UART: [kat] ++
886,030 UART: [kat] sha1
890,318 UART: [kat] SHA2-256
892,256 UART: [kat] SHA2-384
894,873 UART: [kat] SHA2-512-ACC
896,774 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,165 UART: [kat] LMS
1,475,361 UART: [kat] --
1,476,038 UART: [cold-reset] ++
1,476,378 UART: [fht] Storing FHT @ 0x50003400
1,479,291 UART: [idev] ++
1,479,459 UART: [idev] CDI.KEYID = 6
1,479,819 UART: [idev] SUBJECT.KEYID = 7
1,480,243 UART: [idev] UDS.KEYID = 0
1,480,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,377 UART: [idev] Erasing UDS.KEYID = 0
1,504,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,256 UART: [ldev] Erasing FE.KEYID = 1
1,546,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,111 UART: [ldev] --
1,585,500 UART: [fwproc] Waiting for Commands...
1,586,199 UART: [fwproc] Received command 0x46574c44
1,586,990 UART: [fwproc] Received Image of size 114332 bytes
2,884,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,248 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,565 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,707 >>> mbox cmd response: failed
1,487,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,713 >>> mbox cmd response: failed
1,487,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,008 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
85,855 UART: [state] WD Timer not started. Device not locked for debugging
86,990 UART: [kat] SHA2-256
892,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,765 UART: [kat] ++
896,917 UART: [kat] sha1
901,167 UART: [kat] SHA2-256
903,107 UART: [kat] SHA2-384
905,860 UART: [kat] SHA2-512-ACC
907,761 UART: [kat] ECC-384
917,412 UART: [kat] HMAC-384Kdf
922,134 UART: [kat] LMS
1,170,462 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,172,029 UART: [fht] FHT @ 0x50003400
1,174,642 UART: [idev] ++
1,174,810 UART: [idev] CDI.KEYID = 6
1,175,170 UART: [idev] SUBJECT.KEYID = 7
1,175,594 UART: [idev] UDS.KEYID = 0
1,175,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,758 UART: [idev] Erasing UDS.KEYID = 0
1,200,155 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,624 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,106 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,857 UART: ROM Fatal Error: 0x000B0018
1,331,014 >>> mbox cmd response: failed
1,331,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,020 >>> mbox cmd response: failed
1,331,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,855 UART: [kat] SHA2-256
903,795 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
918,100 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,857 UART: [cold-reset] ++
1,172,417 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,164 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,777 UART: [ldev] ++
1,210,945 UART: [ldev] CDI.KEYID = 6
1,211,308 UART: [ldev] SUBJECT.KEYID = 5
1,211,734 UART: [ldev] AUTHORITY.KEYID = 7
1,212,197 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,282,852 UART: [fwproc] Wait for Commands...
1,283,532 UART: [fwproc] Recv command 0x46574c44
1,284,260 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,544 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,743 >>> mbox cmd response: failed
1,185,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,749 >>> mbox cmd response: failed
1,185,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,199 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
893,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,104 UART: [kat] ++
898,256 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,666 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,276 UART: [ldev] Erasing FE.KEYID = 1
1,245,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,822 UART: [ldev] --
1,284,271 UART: [fwproc] Wait for Commands...
1,284,921 UART: [fwproc] Recv command 0x46574c44
1,285,649 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,010 UART: ROM Fatal Error: 0x000B0018
1,333,167 >>> mbox cmd response: failed
1,333,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,173 >>> mbox cmd response: failed
1,333,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,352 UART: [kat] SHA2-256
904,292 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,577 UART: [kat] HMAC-384Kdf
923,173 UART: [kat] LMS
1,171,501 UART: [kat] --
1,172,082 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,786 UART: [ldev] Erasing FE.KEYID = 1
1,243,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,716 UART: [ldev] --
1,283,141 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,215 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,370 >>> mbox cmd response: failed
1,188,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,376 >>> mbox cmd response: failed
1,188,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,486 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,610 UART: [ldev] --
1,280,070 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,720 UART: ROM Fatal Error: 0x000B0018
1,329,877 >>> mbox cmd response: failed
1,329,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,883 >>> mbox cmd response: failed
1,329,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,222 UART: [kat] LMS
1,169,534 UART: [kat] --
1,170,479 UART: [cold-reset] ++
1,170,927 UART: [fht] FHT @ 0x50003400
1,173,721 UART: [idev] ++
1,173,889 UART: [idev] CDI.KEYID = 6
1,174,250 UART: [idev] SUBJECT.KEYID = 7
1,174,675 UART: [idev] UDS.KEYID = 0
1,175,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,339 UART: [idev] Erasing UDS.KEYID = 0
1,200,583 UART: [idev] Sha1 KeyId Algorithm
1,209,559 UART: [idev] --
1,210,636 UART: [ldev] ++
1,210,804 UART: [ldev] CDI.KEYID = 6
1,211,168 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,217,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,954 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,283,095 UART: [fwproc] Recv command 0x46574c44
1,283,828 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,996 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,086 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,024 >>> mbox cmd response: failed
1,182,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,030 >>> mbox cmd response: failed
1,182,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,238 UART: [kat] SHA2-256
902,178 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
917,055 UART: [kat] HMAC-384Kdf
921,637 UART: [kat] LMS
1,169,949 UART: [kat] --
1,170,944 UART: [cold-reset] ++
1,171,340 UART: [fht] FHT @ 0x50003400
1,174,128 UART: [idev] ++
1,174,296 UART: [idev] CDI.KEYID = 6
1,174,657 UART: [idev] SUBJECT.KEYID = 7
1,175,082 UART: [idev] UDS.KEYID = 0
1,175,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,764 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,343 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46574c44
1,283,693 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,727 UART: ROM Fatal Error: 0x000B0018
1,331,884 >>> mbox cmd response: failed
1,331,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,890 >>> mbox cmd response: failed
1,331,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,969 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,803 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,833 >>> mbox cmd response: failed
1,182,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,839 >>> mbox cmd response: failed
1,182,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,929 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
903,214 UART: [kat] HMAC-384Kdf
907,898 UART: [kat] LMS
1,476,094 UART: [kat] --
1,476,993 UART: [cold-reset] ++
1,477,335 UART: [fht] Storing FHT @ 0x50003400
1,480,034 UART: [idev] ++
1,480,202 UART: [idev] CDI.KEYID = 6
1,480,562 UART: [idev] SUBJECT.KEYID = 7
1,480,986 UART: [idev] UDS.KEYID = 0
1,481,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,234 UART: [idev] Erasing UDS.KEYID = 0
1,505,886 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,512 UART: [idev] --
1,515,477 UART: [ldev] ++
1,515,645 UART: [ldev] CDI.KEYID = 6
1,516,008 UART: [ldev] SUBJECT.KEYID = 5
1,516,434 UART: [ldev] AUTHORITY.KEYID = 7
1,516,897 UART: [ldev] FE.KEYID = 1
1,522,149 UART: [ldev] Erasing FE.KEYID = 1
1,547,586 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,930 UART: [ldev] --
1,587,431 UART: [fwproc] Waiting for Commands...
1,588,294 UART: [fwproc] Received command 0x46574c44
1,589,085 UART: [fwproc] Received Image of size 114332 bytes
1,636,536 UART: ROM Fatal Error: 0x000B0034
1,637,693 >>> mbox cmd response: failed
1,637,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,699 >>> mbox cmd response: failed
1,637,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,737 UART: [kat] SHA2-256
881,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,783 UART: [kat] ++
885,935 UART: [kat] sha1
890,139 UART: [kat] SHA2-256
892,077 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,418 UART: [idev] ++
1,479,586 UART: [idev] CDI.KEYID = 6
1,479,946 UART: [idev] SUBJECT.KEYID = 7
1,480,370 UART: [idev] UDS.KEYID = 0
1,480,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,594 UART: [idev] Erasing UDS.KEYID = 0
1,504,884 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,554 UART: [idev] --
1,514,729 UART: [ldev] ++
1,514,897 UART: [ldev] CDI.KEYID = 6
1,515,260 UART: [ldev] SUBJECT.KEYID = 5
1,515,686 UART: [ldev] AUTHORITY.KEYID = 7
1,516,149 UART: [ldev] FE.KEYID = 1
1,521,493 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,608 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,832 UART: [fwproc] Received command 0x46574c44
1,587,623 UART: [fwproc] Received Image of size 114332 bytes
2,884,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,207 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,260 >>> mbox cmd response: failed
1,485,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,266 >>> mbox cmd response: failed
1,485,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,230 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,780 UART: [kat] SHA2-256
882,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,826 UART: [kat] ++
886,978 UART: [kat] sha1
891,198 UART: [kat] SHA2-256
893,136 UART: [kat] SHA2-384
895,979 UART: [kat] SHA2-512-ACC
897,880 UART: [kat] ECC-384
903,583 UART: [kat] HMAC-384Kdf
908,237 UART: [kat] LMS
1,476,433 UART: [kat] --
1,477,528 UART: [cold-reset] ++
1,477,896 UART: [fht] Storing FHT @ 0x50003400
1,480,871 UART: [idev] ++
1,481,039 UART: [idev] CDI.KEYID = 6
1,481,399 UART: [idev] SUBJECT.KEYID = 7
1,481,823 UART: [idev] UDS.KEYID = 0
1,482,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,849 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,437 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,522,038 UART: [ldev] Erasing FE.KEYID = 1
1,548,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,163 UART: [ldev] --
1,587,602 UART: [fwproc] Waiting for Commands...
1,588,257 UART: [fwproc] Received command 0x46574c44
1,589,048 UART: [fwproc] Received Image of size 114332 bytes
1,636,045 UART: ROM Fatal Error: 0x000B0034
1,637,202 >>> mbox cmd response: failed
1,637,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,208 >>> mbox cmd response: failed
1,637,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,620 UART: [kat] SHA2-256
882,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,666 UART: [kat] ++
886,818 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,219 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,822 UART: [cold-reset] ++
1,477,308 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,205 UART: [idev] Erasing UDS.KEYID = 0
1,506,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,153 UART: [idev] --
1,516,228 UART: [ldev] ++
1,516,396 UART: [ldev] CDI.KEYID = 6
1,516,759 UART: [ldev] SUBJECT.KEYID = 5
1,517,185 UART: [ldev] AUTHORITY.KEYID = 7
1,517,648 UART: [ldev] FE.KEYID = 1
1,522,996 UART: [ldev] Erasing FE.KEYID = 1
1,548,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,755 UART: [ldev] --
1,588,202 UART: [fwproc] Waiting for Commands...
1,588,853 UART: [fwproc] Received command 0x46574c44
1,589,644 UART: [fwproc] Received Image of size 114332 bytes
2,888,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,917 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,224 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,989 >>> mbox cmd response: failed
1,487,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,995 >>> mbox cmd response: failed
1,487,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,812 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,428 UART: [kat] LMS
1,170,756 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,463 UART: [fht] FHT @ 0x50003400
1,174,972 UART: [idev] ++
1,175,140 UART: [idev] CDI.KEYID = 6
1,175,500 UART: [idev] SUBJECT.KEYID = 7
1,175,924 UART: [idev] UDS.KEYID = 0
1,176,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,030 UART: [idev] Erasing UDS.KEYID = 0
1,200,799 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,391 UART: [ldev] ++
1,210,559 UART: [ldev] CDI.KEYID = 6
1,210,922 UART: [ldev] SUBJECT.KEYID = 5
1,211,348 UART: [ldev] AUTHORITY.KEYID = 7
1,211,811 UART: [ldev] FE.KEYID = 1
1,217,189 UART: [ldev] Erasing FE.KEYID = 1
1,244,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,351 UART: [ldev] --
1,283,616 UART: [fwproc] Wait for Commands...
1,284,270 UART: [fwproc] Recv command 0x46574c44
1,284,998 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,185 UART: ROM Fatal Error: 0x000B0034
1,334,342 >>> mbox cmd response: failed
1,334,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,348 >>> mbox cmd response: failed
1,334,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
893,770 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,895 UART: [kat] ++
898,047 UART: [kat] sha1
902,397 UART: [kat] SHA2-256
904,337 UART: [kat] SHA2-384
907,300 UART: [kat] SHA2-512-ACC
909,201 UART: [kat] ECC-384
919,148 UART: [kat] HMAC-384Kdf
923,758 UART: [kat] LMS
1,172,086 UART: [kat] --
1,173,113 UART: [cold-reset] ++
1,173,525 UART: [fht] FHT @ 0x50003400
1,176,138 UART: [idev] ++
1,176,306 UART: [idev] CDI.KEYID = 6
1,176,666 UART: [idev] SUBJECT.KEYID = 7
1,177,090 UART: [idev] UDS.KEYID = 0
1,177,435 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,038 UART: [idev] Erasing UDS.KEYID = 0
1,202,329 UART: [idev] Sha1 KeyId Algorithm
1,210,821 UART: [idev] --
1,211,939 UART: [ldev] ++
1,212,107 UART: [ldev] CDI.KEYID = 6
1,212,470 UART: [ldev] SUBJECT.KEYID = 5
1,212,896 UART: [ldev] AUTHORITY.KEYID = 7
1,213,359 UART: [ldev] FE.KEYID = 1
1,218,745 UART: [ldev] Erasing FE.KEYID = 1
1,244,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,563 UART: [ldev] --
1,283,990 UART: [fwproc] Wait for Commands...
1,284,578 UART: [fwproc] Recv command 0x46574c44
1,285,306 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,020 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,577 >>> mbox cmd response: failed
1,186,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,583 >>> mbox cmd response: failed
1,186,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,255 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,505 UART: [kat] SHA2-512-ACC
908,406 UART: [kat] ECC-384
918,511 UART: [kat] HMAC-384Kdf
923,291 UART: [kat] LMS
1,171,619 UART: [kat] --
1,172,592 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,669 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,762 UART: [ldev] ++
1,210,930 UART: [ldev] CDI.KEYID = 6
1,211,293 UART: [ldev] SUBJECT.KEYID = 5
1,211,719 UART: [ldev] AUTHORITY.KEYID = 7
1,212,182 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,016 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,701 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,628 UART: ROM Fatal Error: 0x000B0034
1,332,785 >>> mbox cmd response: failed
1,332,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,791 >>> mbox cmd response: failed
1,332,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,196 UART: [state] WD Timer not started. Device not locked for debugging
88,539 UART: [kat] SHA2-256
894,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,314 UART: [kat] ++
898,466 UART: [kat] sha1
902,872 UART: [kat] SHA2-256
904,812 UART: [kat] SHA2-384
907,801 UART: [kat] SHA2-512-ACC
909,702 UART: [kat] ECC-384
919,165 UART: [kat] HMAC-384Kdf
923,631 UART: [kat] LMS
1,171,959 UART: [kat] --
1,173,038 UART: [cold-reset] ++
1,173,458 UART: [fht] FHT @ 0x50003400
1,176,145 UART: [idev] ++
1,176,313 UART: [idev] CDI.KEYID = 6
1,176,673 UART: [idev] SUBJECT.KEYID = 7
1,177,097 UART: [idev] UDS.KEYID = 0
1,177,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,063 UART: [idev] Erasing UDS.KEYID = 0
1,202,552 UART: [idev] Sha1 KeyId Algorithm
1,210,834 UART: [idev] --
1,211,964 UART: [ldev] ++
1,212,132 UART: [ldev] CDI.KEYID = 6
1,212,495 UART: [ldev] SUBJECT.KEYID = 5
1,212,921 UART: [ldev] AUTHORITY.KEYID = 7
1,213,384 UART: [ldev] FE.KEYID = 1
1,218,750 UART: [ldev] Erasing FE.KEYID = 1
1,245,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,100 UART: [ldev] --
1,284,573 UART: [fwproc] Wait for Commands...
1,285,207 UART: [fwproc] Recv command 0x46574c44
1,285,935 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,884 >>> mbox cmd response: failed
1,186,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,890 >>> mbox cmd response: failed
1,186,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,274 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,174,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,285 UART: [idev] --
1,209,348 UART: [ldev] ++
1,209,516 UART: [ldev] CDI.KEYID = 6
1,209,880 UART: [ldev] SUBJECT.KEYID = 5
1,210,307 UART: [ldev] AUTHORITY.KEYID = 7
1,210,770 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,242,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,180 UART: [ldev] --
1,281,468 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,234 UART: ROM Fatal Error: 0x000B0034
1,331,391 >>> mbox cmd response: failed
1,331,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,397 >>> mbox cmd response: failed
1,331,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: [kat] ++
895,325 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,244 UART: [kat] HMAC-384Kdf
919,696 UART: [kat] LMS
1,168,008 UART: [kat] --
1,168,683 UART: [cold-reset] ++
1,169,243 UART: [fht] FHT @ 0x50003400
1,171,845 UART: [idev] ++
1,172,013 UART: [idev] CDI.KEYID = 6
1,172,374 UART: [idev] SUBJECT.KEYID = 7
1,172,799 UART: [idev] UDS.KEYID = 0
1,173,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,158 UART: [fwproc] Wait for Commands...
1,281,755 UART: [fwproc] Recv command 0x46574c44
1,282,488 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,076 >>> mbox cmd response: failed
1,182,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,082 >>> mbox cmd response: failed
1,182,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,274 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,813 UART: [state] LifecycleState = Unprovisioned
85,468 UART: [state] DebugLocked = No
86,054 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,062 UART: [kat] ++
895,214 UART: [kat] sha1
899,314 UART: [kat] SHA2-256
901,254 UART: [kat] SHA2-384
904,053 UART: [kat] SHA2-512-ACC
905,954 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,174,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,559 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,121 UART: ROM Fatal Error: 0x000B0034
1,333,278 >>> mbox cmd response: failed
1,333,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,284 >>> mbox cmd response: failed
1,333,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [kat] SHA2-256
890,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,440 UART: [kat] SHA2-256
901,380 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
915,635 UART: [kat] HMAC-384Kdf
920,195 UART: [kat] LMS
1,168,507 UART: [kat] --
1,169,334 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,614 UART: [idev] ++
1,172,782 UART: [idev] CDI.KEYID = 6
1,173,143 UART: [idev] SUBJECT.KEYID = 7
1,173,568 UART: [idev] UDS.KEYID = 0
1,173,914 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,281,105 UART: [fwproc] Wait for Commands...
1,281,716 UART: [fwproc] Recv command 0x46574c44
1,282,449 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,489 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,367 >>> mbox cmd response: failed
1,184,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,373 >>> mbox cmd response: failed
1,184,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,289 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,143 UART: [kat] SHA2-256
882,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,189 UART: [kat] ++
886,341 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,784 UART: [kat] HMAC-384Kdf
907,410 UART: [kat] LMS
1,475,606 UART: [kat] --
1,476,679 UART: [cold-reset] ++
1,477,089 UART: [fht] Storing FHT @ 0x50003400
1,479,934 UART: [idev] ++
1,480,102 UART: [idev] CDI.KEYID = 6
1,480,462 UART: [idev] SUBJECT.KEYID = 7
1,480,886 UART: [idev] UDS.KEYID = 0
1,481,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,505,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,308 UART: [idev] --
1,515,433 UART: [ldev] ++
1,515,601 UART: [ldev] CDI.KEYID = 6
1,515,964 UART: [ldev] SUBJECT.KEYID = 5
1,516,390 UART: [ldev] AUTHORITY.KEYID = 7
1,516,853 UART: [ldev] FE.KEYID = 1
1,522,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,260 UART: [ldev] --
1,586,713 UART: [fwproc] Waiting for Commands...
1,587,422 UART: [fwproc] Received command 0x46574c44
1,588,213 UART: [fwproc] Received Image of size 114332 bytes
1,635,572 UART: ROM Fatal Error: 0x000B0017
1,636,729 >>> mbox cmd response: failed
1,636,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,735 >>> mbox cmd response: failed
1,636,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,418 UART: [idev] ++
1,479,586 UART: [idev] CDI.KEYID = 6
1,479,946 UART: [idev] SUBJECT.KEYID = 7
1,480,370 UART: [idev] UDS.KEYID = 0
1,480,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,620 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,273 UART: [ldev] ++
1,514,441 UART: [ldev] CDI.KEYID = 6
1,514,804 UART: [ldev] SUBJECT.KEYID = 5
1,515,230 UART: [ldev] AUTHORITY.KEYID = 7
1,515,693 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,222 UART: [ldev] --
1,585,535 UART: [fwproc] Waiting for Commands...
1,586,204 UART: [fwproc] Received command 0x46574c44
1,586,995 UART: [fwproc] Received Image of size 114332 bytes
2,884,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,831 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,410 >>> mbox cmd response: failed
1,488,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,416 >>> mbox cmd response: failed
1,488,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,003 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,357 UART: [kat] SHA2-512-ACC
897,258 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,604 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,987 UART: [idev] ++
1,480,155 UART: [idev] CDI.KEYID = 6
1,480,515 UART: [idev] SUBJECT.KEYID = 7
1,480,939 UART: [idev] UDS.KEYID = 0
1,481,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,805 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,298 UART: [ldev] ++
1,515,466 UART: [ldev] CDI.KEYID = 6
1,515,829 UART: [ldev] SUBJECT.KEYID = 5
1,516,255 UART: [ldev] AUTHORITY.KEYID = 7
1,516,718 UART: [ldev] FE.KEYID = 1
1,521,836 UART: [ldev] Erasing FE.KEYID = 1
1,547,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,399 UART: [ldev] --
1,586,864 UART: [fwproc] Waiting for Commands...
1,587,625 UART: [fwproc] Received command 0x46574c44
1,588,416 UART: [fwproc] Received Image of size 114332 bytes
1,635,483 UART: ROM Fatal Error: 0x000B0017
1,636,640 >>> mbox cmd response: failed
1,636,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,646 >>> mbox cmd response: failed
1,636,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,177 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,741 UART: [idev] ++
1,479,909 UART: [idev] CDI.KEYID = 6
1,480,269 UART: [idev] SUBJECT.KEYID = 7
1,480,693 UART: [idev] UDS.KEYID = 0
1,481,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,169 UART: [idev] --
1,515,304 UART: [ldev] ++
1,515,472 UART: [ldev] CDI.KEYID = 6
1,515,835 UART: [ldev] SUBJECT.KEYID = 5
1,516,261 UART: [ldev] AUTHORITY.KEYID = 7
1,516,724 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,661 UART: [ldev] --
1,587,172 UART: [fwproc] Waiting for Commands...
1,587,883 UART: [fwproc] Received command 0x46574c44
1,588,674 UART: [fwproc] Received Image of size 114332 bytes
2,887,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,561 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,722 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,595 >>> mbox cmd response: failed
1,489,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,601 >>> mbox cmd response: failed
1,489,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,020 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,941 UART: [kat] SHA2-256
903,881 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,636 UART: [kat] HMAC-384Kdf
923,354 UART: [kat] LMS
1,171,682 UART: [kat] --
1,172,389 UART: [cold-reset] ++
1,172,845 UART: [fht] FHT @ 0x50003400
1,175,714 UART: [idev] ++
1,175,882 UART: [idev] CDI.KEYID = 6
1,176,242 UART: [idev] SUBJECT.KEYID = 7
1,176,666 UART: [idev] UDS.KEYID = 0
1,177,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,922 UART: [idev] Erasing UDS.KEYID = 0
1,201,863 UART: [idev] Sha1 KeyId Algorithm
1,210,301 UART: [idev] --
1,211,377 UART: [ldev] ++
1,211,545 UART: [ldev] CDI.KEYID = 6
1,211,908 UART: [ldev] SUBJECT.KEYID = 5
1,212,334 UART: [ldev] AUTHORITY.KEYID = 7
1,212,797 UART: [ldev] FE.KEYID = 1
1,218,219 UART: [ldev] Erasing FE.KEYID = 1
1,244,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,592 UART: [fwproc] Recv command 0x46574c44
1,284,320 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,379 UART: ROM Fatal Error: 0x000B0017
1,332,536 >>> mbox cmd response: failed
1,332,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,542 >>> mbox cmd response: failed
1,332,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
892,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,069 UART: [kat] ++
897,221 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
918,132 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,174,776 UART: [idev] ++
1,174,944 UART: [idev] CDI.KEYID = 6
1,175,304 UART: [idev] SUBJECT.KEYID = 7
1,175,728 UART: [idev] UDS.KEYID = 0
1,176,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,537 UART: [idev] Sha1 KeyId Algorithm
1,208,905 UART: [idev] --
1,209,937 UART: [ldev] ++
1,210,105 UART: [ldev] CDI.KEYID = 6
1,210,468 UART: [ldev] SUBJECT.KEYID = 5
1,210,894 UART: [ldev] AUTHORITY.KEYID = 7
1,211,357 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,800 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,292 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,799 >>> mbox cmd response: failed
1,186,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,805 >>> mbox cmd response: failed
1,186,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,165 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,665 UART: [state] LifecycleState = Unprovisioned
85,320 UART: [state] DebugLocked = No
85,964 UART: [state] WD Timer not started. Device not locked for debugging
87,161 UART: [kat] SHA2-256
892,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,936 UART: [kat] ++
897,088 UART: [kat] sha1
901,482 UART: [kat] SHA2-256
903,422 UART: [kat] SHA2-384
906,179 UART: [kat] SHA2-512-ACC
908,080 UART: [kat] ECC-384
918,109 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,172,348 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,433 UART: [idev] ++
1,175,601 UART: [idev] CDI.KEYID = 6
1,175,961 UART: [idev] SUBJECT.KEYID = 7
1,176,385 UART: [idev] UDS.KEYID = 0
1,176,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,463 UART: [idev] Erasing UDS.KEYID = 0
1,201,296 UART: [idev] Sha1 KeyId Algorithm
1,209,722 UART: [idev] --
1,210,798 UART: [ldev] ++
1,210,966 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,755 UART: [ldev] AUTHORITY.KEYID = 7
1,212,218 UART: [ldev] FE.KEYID = 1
1,217,370 UART: [ldev] Erasing FE.KEYID = 1
1,243,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,600 UART: [ldev] --
1,282,947 UART: [fwproc] Wait for Commands...
1,283,747 UART: [fwproc] Recv command 0x46574c44
1,284,475 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,890 UART: ROM Fatal Error: 0x000B0017
1,333,047 >>> mbox cmd response: failed
1,333,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,053 >>> mbox cmd response: failed
1,333,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
893,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,624 UART: [kat] ++
897,776 UART: [kat] sha1
901,976 UART: [kat] SHA2-256
903,916 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,498 UART: [fht] FHT @ 0x50003400
1,174,969 UART: [idev] ++
1,175,137 UART: [idev] CDI.KEYID = 6
1,175,497 UART: [idev] SUBJECT.KEYID = 7
1,175,921 UART: [idev] UDS.KEYID = 0
1,176,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,755 UART: [idev] Erasing UDS.KEYID = 0
1,201,348 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,210,850 UART: [ldev] ++
1,211,018 UART: [ldev] CDI.KEYID = 6
1,211,381 UART: [ldev] SUBJECT.KEYID = 5
1,211,807 UART: [ldev] AUTHORITY.KEYID = 7
1,212,270 UART: [ldev] FE.KEYID = 1
1,217,420 UART: [ldev] Erasing FE.KEYID = 1
1,243,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,860 UART: [ldev] --
1,283,249 UART: [fwproc] Wait for Commands...
1,283,919 UART: [fwproc] Recv command 0x46574c44
1,284,647 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,533 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,794 >>> mbox cmd response: failed
1,186,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,800 >>> mbox cmd response: failed
1,186,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,432 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,170,149 UART: [cold-reset] ++
1,170,673 UART: [fht] FHT @ 0x50003400
1,173,541 UART: [idev] ++
1,173,709 UART: [idev] CDI.KEYID = 6
1,174,070 UART: [idev] SUBJECT.KEYID = 7
1,174,495 UART: [idev] UDS.KEYID = 0
1,174,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,595 UART: [idev] Sha1 KeyId Algorithm
1,208,597 UART: [idev] --
1,209,630 UART: [ldev] ++
1,209,798 UART: [ldev] CDI.KEYID = 6
1,210,162 UART: [ldev] SUBJECT.KEYID = 5
1,210,589 UART: [ldev] AUTHORITY.KEYID = 7
1,211,052 UART: [ldev] FE.KEYID = 1
1,216,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,792 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,283,063 UART: [fwproc] Recv command 0x46574c44
1,283,796 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,816 UART: ROM Fatal Error: 0x000B0017
1,331,973 >>> mbox cmd response: failed
1,331,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,979 >>> mbox cmd response: failed
1,331,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,174,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,199,095 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,882 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,528 >>> mbox cmd response: failed
1,182,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,534 >>> mbox cmd response: failed
1,182,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,240 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,278 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,878 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,851 UART: [ldev] ++
1,210,019 UART: [ldev] CDI.KEYID = 6
1,210,383 UART: [ldev] SUBJECT.KEYID = 5
1,210,810 UART: [ldev] AUTHORITY.KEYID = 7
1,211,273 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,587 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,079 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,233 UART: ROM Fatal Error: 0x000B0017
1,332,390 >>> mbox cmd response: failed
1,332,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,396 >>> mbox cmd response: failed
1,332,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,137 UART: [ldev] --
1,281,633 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,027 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,883 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,067 >>> mbox cmd response: failed
1,184,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,073 >>> mbox cmd response: failed
1,184,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,033 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,341 UART: [kat] SHA2-256
882,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,387 UART: [kat] ++
886,539 UART: [kat] sha1
890,861 UART: [kat] SHA2-256
892,799 UART: [kat] SHA2-384
895,674 UART: [kat] SHA2-512-ACC
897,575 UART: [kat] ECC-384
903,156 UART: [kat] HMAC-384Kdf
907,664 UART: [kat] LMS
1,475,860 UART: [kat] --
1,476,799 UART: [cold-reset] ++
1,477,349 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,986 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,042 UART: [idev] --
1,514,877 UART: [ldev] ++
1,515,045 UART: [ldev] CDI.KEYID = 6
1,515,408 UART: [ldev] SUBJECT.KEYID = 5
1,515,834 UART: [ldev] AUTHORITY.KEYID = 7
1,516,297 UART: [ldev] FE.KEYID = 1
1,521,427 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,918 UART: [ldev] --
1,586,413 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 114332 bytes
1,634,764 UART: ROM Fatal Error: 0x000B003B
1,635,923 >>> mbox cmd response: failed
1,635,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,929 >>> mbox cmd response: failed
1,635,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,767 UART: [kat] SHA2-256
881,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,813 UART: [kat] ++
885,965 UART: [kat] sha1
890,341 UART: [kat] SHA2-256
892,279 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,153 UART: [cold-reset] ++
1,476,509 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,974 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,608 UART: [idev] --
1,514,443 UART: [ldev] ++
1,514,611 UART: [ldev] CDI.KEYID = 6
1,514,974 UART: [ldev] SUBJECT.KEYID = 5
1,515,400 UART: [ldev] AUTHORITY.KEYID = 7
1,515,863 UART: [ldev] FE.KEYID = 1
1,521,019 UART: [ldev] Erasing FE.KEYID = 1
1,546,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,977 UART: [fwproc] Waiting for Commands...
1,586,690 UART: [fwproc] Received command 0x46574c44
1,587,481 UART: [fwproc] Received Image of size 114332 bytes
2,884,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,411 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,332 >>> mbox cmd response: failed
1,486,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,338 >>> mbox cmd response: failed
1,486,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,615 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,476,906 UART: [fht] Storing FHT @ 0x50003400
1,479,649 UART: [idev] ++
1,479,817 UART: [idev] CDI.KEYID = 6
1,480,177 UART: [idev] SUBJECT.KEYID = 7
1,480,601 UART: [idev] UDS.KEYID = 0
1,480,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,504,927 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,447 UART: [idev] --
1,514,382 UART: [ldev] ++
1,514,550 UART: [ldev] CDI.KEYID = 6
1,514,913 UART: [ldev] SUBJECT.KEYID = 5
1,515,339 UART: [ldev] AUTHORITY.KEYID = 7
1,515,802 UART: [ldev] FE.KEYID = 1
1,520,958 UART: [ldev] Erasing FE.KEYID = 1
1,546,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,293 UART: [ldev] --
1,585,782 UART: [fwproc] Waiting for Commands...
1,586,525 UART: [fwproc] Received command 0x46574c44
1,587,316 UART: [fwproc] Received Image of size 114332 bytes
1,635,091 UART: ROM Fatal Error: 0x000B003B
1,636,250 >>> mbox cmd response: failed
1,636,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,256 >>> mbox cmd response: failed
1,636,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,560 UART: [kat] SHA2-256
881,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,606 UART: [kat] ++
885,758 UART: [kat] sha1
890,004 UART: [kat] SHA2-256
891,942 UART: [kat] SHA2-384
894,687 UART: [kat] SHA2-512-ACC
896,588 UART: [kat] ECC-384
902,157 UART: [kat] HMAC-384Kdf
906,765 UART: [kat] LMS
1,474,961 UART: [kat] --
1,475,706 UART: [cold-reset] ++
1,476,252 UART: [fht] Storing FHT @ 0x50003400
1,478,827 UART: [idev] ++
1,478,995 UART: [idev] CDI.KEYID = 6
1,479,355 UART: [idev] SUBJECT.KEYID = 7
1,479,779 UART: [idev] UDS.KEYID = 0
1,480,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,721 UART: [idev] Erasing UDS.KEYID = 0
1,504,271 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,073 UART: [idev] --
1,514,006 UART: [ldev] ++
1,514,174 UART: [ldev] CDI.KEYID = 6
1,514,537 UART: [ldev] SUBJECT.KEYID = 5
1,514,963 UART: [ldev] AUTHORITY.KEYID = 7
1,515,426 UART: [ldev] FE.KEYID = 1
1,520,584 UART: [ldev] Erasing FE.KEYID = 1
1,545,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,179 UART: [ldev] --
1,585,492 UART: [fwproc] Waiting for Commands...
1,586,325 UART: [fwproc] Received command 0x46574c44
1,587,116 UART: [fwproc] Received Image of size 114332 bytes
2,884,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,644 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,787 >>> mbox cmd response: failed
1,489,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,793 >>> mbox cmd response: failed
1,489,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,278 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,733 UART: [kat] SHA2-256
903,673 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,617 UART: [fht] FHT @ 0x50003400
1,175,474 UART: [idev] ++
1,175,642 UART: [idev] CDI.KEYID = 6
1,176,002 UART: [idev] SUBJECT.KEYID = 7
1,176,426 UART: [idev] UDS.KEYID = 0
1,176,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,176 UART: [idev] Erasing UDS.KEYID = 0
1,201,719 UART: [idev] Sha1 KeyId Algorithm
1,210,139 UART: [idev] --
1,211,063 UART: [ldev] ++
1,211,231 UART: [ldev] CDI.KEYID = 6
1,211,594 UART: [ldev] SUBJECT.KEYID = 5
1,212,020 UART: [ldev] AUTHORITY.KEYID = 7
1,212,483 UART: [ldev] FE.KEYID = 1
1,217,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,283,148 UART: [fwproc] Wait for Commands...
1,283,752 UART: [fwproc] Recv command 0x46574c44
1,284,480 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,265 UART: ROM Fatal Error: 0x000B003B
1,331,424 >>> mbox cmd response: failed
1,331,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,430 >>> mbox cmd response: failed
1,331,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,010 UART: [kat] SHA2-512-ACC
907,911 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,467 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,333 UART: [idev] Sha1 KeyId Algorithm
1,208,751 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,241,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,697 UART: [ldev] --
1,281,084 UART: [fwproc] Wait for Commands...
1,281,794 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,742 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,131 >>> mbox cmd response: failed
1,185,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,137 >>> mbox cmd response: failed
1,185,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,915 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
923,075 UART: [kat] LMS
1,171,403 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,620 UART: [fht] FHT @ 0x50003400
1,175,045 UART: [idev] ++
1,175,213 UART: [idev] CDI.KEYID = 6
1,175,573 UART: [idev] SUBJECT.KEYID = 7
1,175,997 UART: [idev] UDS.KEYID = 0
1,176,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,870 UART: [idev] --
1,210,798 UART: [ldev] ++
1,210,966 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,755 UART: [ldev] AUTHORITY.KEYID = 7
1,212,218 UART: [ldev] FE.KEYID = 1
1,217,188 UART: [ldev] Erasing FE.KEYID = 1
1,243,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,666 UART: [ldev] --
1,283,029 UART: [fwproc] Wait for Commands...
1,283,625 UART: [fwproc] Recv command 0x46574c44
1,284,353 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,918 UART: ROM Fatal Error: 0x000B003B
1,332,077 >>> mbox cmd response: failed
1,332,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,083 >>> mbox cmd response: failed
1,332,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,546 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,396 UART: [idev] Sha1 KeyId Algorithm
1,209,708 UART: [idev] --
1,210,796 UART: [ldev] ++
1,210,964 UART: [ldev] CDI.KEYID = 6
1,211,327 UART: [ldev] SUBJECT.KEYID = 5
1,211,753 UART: [ldev] AUTHORITY.KEYID = 7
1,212,216 UART: [ldev] FE.KEYID = 1
1,217,514 UART: [ldev] Erasing FE.KEYID = 1
1,244,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,076 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,963 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,747 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,344 >>> mbox cmd response: failed
1,188,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,350 >>> mbox cmd response: failed
1,188,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,012 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,476 UART: [kat] LMS
1,169,788 UART: [kat] --
1,170,645 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,667 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,208,195 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,666 UART: [ldev] Erasing FE.KEYID = 1
1,242,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,292 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,814 UART: ROM Fatal Error: 0x000B003B
1,331,973 >>> mbox cmd response: failed
1,331,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,979 >>> mbox cmd response: failed
1,331,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,537 UART: [fht] FHT @ 0x50003400
1,172,201 UART: [idev] ++
1,172,369 UART: [idev] CDI.KEYID = 6
1,172,730 UART: [idev] SUBJECT.KEYID = 7
1,173,155 UART: [idev] UDS.KEYID = 0
1,173,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,340 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,162 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,768 >>> mbox cmd response: failed
1,180,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,774 >>> mbox cmd response: failed
1,180,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,669 UART: [kat] LMS
1,168,981 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,174,324 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,884 UART: [idev] Erasing UDS.KEYID = 0
1,198,670 UART: [idev] Sha1 KeyId Algorithm
1,207,444 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,103 UART: [ldev] SUBJECT.KEYID = 5
1,209,530 UART: [ldev] AUTHORITY.KEYID = 7
1,209,993 UART: [ldev] FE.KEYID = 1
1,215,439 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,149 UART: [fwproc] Wait for Commands...
1,281,838 UART: [fwproc] Recv command 0x46574c44
1,282,571 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,369 UART: ROM Fatal Error: 0x000B003B
1,331,528 >>> mbox cmd response: failed
1,331,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,534 >>> mbox cmd response: failed
1,331,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,174,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,425 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,155 >>> mbox cmd response: failed
1,183,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,161 >>> mbox cmd response: failed
1,183,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,903 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Manufacturing
85,555 UART: [state] DebugLocked = No
86,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,753 UART: [kat] SHA2-256
881,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,799 UART: [kat] ++
885,951 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
894,998 UART: [kat] SHA2-512-ACC
896,899 UART: [kat] ECC-384
902,404 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,404 UART: [idev] ++
1,479,572 UART: [idev] CDI.KEYID = 6
1,479,932 UART: [idev] SUBJECT.KEYID = 7
1,480,356 UART: [idev] UDS.KEYID = 0
1,480,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,494 UART: [idev] Erasing UDS.KEYID = 0
1,505,382 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,034 UART: [idev] --
1,515,167 UART: [ldev] ++
1,515,335 UART: [ldev] CDI.KEYID = 6
1,515,698 UART: [ldev] SUBJECT.KEYID = 5
1,516,124 UART: [ldev] AUTHORITY.KEYID = 7
1,516,587 UART: [ldev] FE.KEYID = 1
1,521,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,034 UART: [ldev] --
1,586,455 UART: [fwproc] Waiting for Commands...
1,587,138 UART: [fwproc] Received command 0x46574c44
1,587,929 UART: [fwproc] Received Image of size 114332 bytes
1,880,202 UART: ROM Fatal Error: 0x000B0025
1,881,359 >>> mbox cmd response: failed
1,881,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,365 >>> mbox cmd response: failed
1,881,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,623 UART: [kat] SHA2-256
892,561 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,872 UART: [kat] HMAC-384Kdf
907,504 UART: [kat] LMS
1,475,700 UART: [kat] --
1,476,485 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,890 UART: [idev] Erasing UDS.KEYID = 0
1,505,326 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,810 UART: [idev] --
1,514,907 UART: [ldev] ++
1,515,075 UART: [ldev] CDI.KEYID = 6
1,515,438 UART: [ldev] SUBJECT.KEYID = 5
1,515,864 UART: [ldev] AUTHORITY.KEYID = 7
1,516,327 UART: [ldev] FE.KEYID = 1
1,521,375 UART: [ldev] Erasing FE.KEYID = 1
1,546,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,822 UART: [ldev] --
1,586,125 UART: [fwproc] Waiting for Commands...
1,586,808 UART: [fwproc] Received command 0x46574c44
1,587,599 UART: [fwproc] Received Image of size 114332 bytes
2,884,436 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,189 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,257 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,732,258 >>> mbox cmd response: failed
1,732,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,264 >>> mbox cmd response: failed
1,732,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,971 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Manufacturing
86,090 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,879 UART: [kat] LMS
1,476,075 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,247 UART: [idev] ++
1,480,415 UART: [idev] CDI.KEYID = 6
1,480,775 UART: [idev] SUBJECT.KEYID = 7
1,481,199 UART: [idev] UDS.KEYID = 0
1,481,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,211 UART: [idev] Erasing UDS.KEYID = 0
1,505,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,415 UART: [idev] --
1,515,444 UART: [ldev] ++
1,515,612 UART: [ldev] CDI.KEYID = 6
1,515,975 UART: [ldev] SUBJECT.KEYID = 5
1,516,401 UART: [ldev] AUTHORITY.KEYID = 7
1,516,864 UART: [ldev] FE.KEYID = 1
1,522,332 UART: [ldev] Erasing FE.KEYID = 1
1,547,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,867 UART: [ldev] --
1,587,338 UART: [fwproc] Waiting for Commands...
1,588,067 UART: [fwproc] Received command 0x46574c44
1,588,858 UART: [fwproc] Received Image of size 114332 bytes
1,879,921 UART: ROM Fatal Error: 0x000B0025
1,881,078 >>> mbox cmd response: failed
1,881,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,084 >>> mbox cmd response: failed
1,881,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,312 UART: [kat] SHA2-256
882,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,358 UART: [kat] ++
886,510 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,636 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,703 UART: [idev] ++
1,479,871 UART: [idev] CDI.KEYID = 6
1,480,231 UART: [idev] SUBJECT.KEYID = 7
1,480,655 UART: [idev] UDS.KEYID = 0
1,481,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,506,091 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,667 UART: [idev] --
1,515,892 UART: [ldev] ++
1,516,060 UART: [ldev] CDI.KEYID = 6
1,516,423 UART: [ldev] SUBJECT.KEYID = 5
1,516,849 UART: [ldev] AUTHORITY.KEYID = 7
1,517,312 UART: [ldev] FE.KEYID = 1
1,522,600 UART: [ldev] Erasing FE.KEYID = 1
1,548,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,567 UART: [ldev] --
1,588,040 UART: [fwproc] Waiting for Commands...
1,588,817 UART: [fwproc] Received command 0x46574c44
1,589,608 UART: [fwproc] Received Image of size 114332 bytes
2,887,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,734,593 >>> mbox cmd response: failed
1,734,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,599 >>> mbox cmd response: failed
1,734,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,816 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Manufacturing
85,763 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,580 UART: [kat] LMS
1,170,908 UART: [kat] --
1,171,799 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,942 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,367 UART: [ldev] ++
1,210,535 UART: [ldev] CDI.KEYID = 6
1,210,898 UART: [ldev] SUBJECT.KEYID = 5
1,211,324 UART: [ldev] AUTHORITY.KEYID = 7
1,211,787 UART: [ldev] FE.KEYID = 1
1,216,783 UART: [ldev] Erasing FE.KEYID = 1
1,243,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,540 UART: [fwproc] Wait for Commands...
1,283,276 UART: [fwproc] Recv command 0x46574c44
1,284,004 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,551 UART: ROM Fatal Error: 0x000B0025
1,576,708 >>> mbox cmd response: failed
1,576,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,714 >>> mbox cmd response: failed
1,576,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
893,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,785 UART: [kat] ++
897,937 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,600 UART: [kat] HMAC-384Kdf
923,176 UART: [kat] LMS
1,171,504 UART: [kat] --
1,172,495 UART: [cold-reset] ++
1,173,051 UART: [fht] FHT @ 0x50003400
1,175,644 UART: [idev] ++
1,175,812 UART: [idev] CDI.KEYID = 6
1,176,172 UART: [idev] SUBJECT.KEYID = 7
1,176,596 UART: [idev] UDS.KEYID = 0
1,176,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,834 UART: [idev] Erasing UDS.KEYID = 0
1,201,613 UART: [idev] Sha1 KeyId Algorithm
1,210,139 UART: [idev] --
1,211,297 UART: [ldev] ++
1,211,465 UART: [ldev] CDI.KEYID = 6
1,211,828 UART: [ldev] SUBJECT.KEYID = 5
1,212,254 UART: [ldev] AUTHORITY.KEYID = 7
1,212,717 UART: [ldev] FE.KEYID = 1
1,217,615 UART: [ldev] Erasing FE.KEYID = 1
1,244,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,953 UART: [ldev] --
1,283,312 UART: [fwproc] Wait for Commands...
1,284,132 UART: [fwproc] Recv command 0x46574c44
1,284,860 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,923 >>> mbox cmd response: failed
1,429,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,929 >>> mbox cmd response: failed
1,429,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,993 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Manufacturing
86,054 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
893,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,690 UART: [kat] ++
897,842 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,267 UART: [kat] LMS
1,171,595 UART: [kat] --
1,172,302 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,365 UART: [idev] ++
1,175,533 UART: [idev] CDI.KEYID = 6
1,175,893 UART: [idev] SUBJECT.KEYID = 7
1,176,317 UART: [idev] UDS.KEYID = 0
1,176,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,201,974 UART: [idev] Sha1 KeyId Algorithm
1,210,448 UART: [idev] --
1,211,612 UART: [ldev] ++
1,211,780 UART: [ldev] CDI.KEYID = 6
1,212,143 UART: [ldev] SUBJECT.KEYID = 5
1,212,569 UART: [ldev] AUTHORITY.KEYID = 7
1,213,032 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,620 UART: [ldev] --
1,284,039 UART: [fwproc] Wait for Commands...
1,284,637 UART: [fwproc] Recv command 0x46574c44
1,285,365 UART: [fwproc] Recv'd Img size: 114332 bytes
1,578,070 UART: ROM Fatal Error: 0x000B0025
1,579,227 >>> mbox cmd response: failed
1,579,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,579,233 >>> mbox cmd response: failed
1,579,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,579,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
893,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,410 UART: [kat] ++
897,562 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
917,815 UART: [kat] HMAC-384Kdf
922,241 UART: [kat] LMS
1,170,569 UART: [kat] --
1,171,482 UART: [cold-reset] ++
1,171,988 UART: [fht] FHT @ 0x50003400
1,174,559 UART: [idev] ++
1,174,727 UART: [idev] CDI.KEYID = 6
1,175,087 UART: [idev] SUBJECT.KEYID = 7
1,175,511 UART: [idev] UDS.KEYID = 0
1,175,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,385 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,208,864 UART: [idev] --
1,209,910 UART: [ldev] ++
1,210,078 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,867 UART: [ldev] AUTHORITY.KEYID = 7
1,211,330 UART: [ldev] FE.KEYID = 1
1,216,618 UART: [ldev] Erasing FE.KEYID = 1
1,243,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,072 UART: [ldev] --
1,282,361 UART: [fwproc] Wait for Commands...
1,282,965 UART: [fwproc] Recv command 0x46574c44
1,283,693 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,001 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,432,956 >>> mbox cmd response: failed
1,432,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,962 >>> mbox cmd response: failed
1,432,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,439 UART: [idev] ++
1,173,607 UART: [idev] CDI.KEYID = 6
1,173,968 UART: [idev] SUBJECT.KEYID = 7
1,174,393 UART: [idev] UDS.KEYID = 0
1,174,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,830 UART: [ldev] ++
1,208,998 UART: [ldev] CDI.KEYID = 6
1,209,362 UART: [ldev] SUBJECT.KEYID = 5
1,209,789 UART: [ldev] AUTHORITY.KEYID = 7
1,210,252 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,496 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,707 UART: ROM Fatal Error: 0x000B0025
1,574,864 >>> mbox cmd response: failed
1,574,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,870 >>> mbox cmd response: failed
1,574,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,955 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,522 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,994 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,950 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,424,757 >>> mbox cmd response: failed
1,424,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,424,763 >>> mbox cmd response: failed
1,424,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,424,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,502 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Manufacturing
85,810 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,174,394 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,630 UART: [idev] Sha1 KeyId Algorithm
1,207,332 UART: [idev] --
1,208,219 UART: [ldev] ++
1,208,387 UART: [ldev] CDI.KEYID = 6
1,208,751 UART: [ldev] SUBJECT.KEYID = 5
1,209,178 UART: [ldev] AUTHORITY.KEYID = 7
1,209,641 UART: [ldev] FE.KEYID = 1
1,214,585 UART: [ldev] Erasing FE.KEYID = 1
1,240,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,505 UART: [ldev] --
1,279,991 UART: [fwproc] Wait for Commands...
1,280,616 UART: [fwproc] Recv command 0x46574c44
1,281,349 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,552 UART: ROM Fatal Error: 0x000B0025
1,574,709 >>> mbox cmd response: failed
1,574,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,715 >>> mbox cmd response: failed
1,574,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,294 UART: [kat] SHA2-256
902,234 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,573 UART: [kat] LMS
1,169,885 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,174 UART: [fht] FHT @ 0x50003400
1,173,830 UART: [idev] ++
1,173,998 UART: [idev] CDI.KEYID = 6
1,174,359 UART: [idev] SUBJECT.KEYID = 7
1,174,784 UART: [idev] UDS.KEYID = 0
1,175,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,285 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,523 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,137 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,324 >>> mbox cmd response: failed
1,426,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,330 >>> mbox cmd response: failed
1,426,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,727 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,592 UART: [state] LifecycleState = Manufacturing
85,247 UART: [state] DebugLocked = No
85,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,367 UART: [kat] SHA2-256
881,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,413 UART: [kat] ++
885,565 UART: [kat] sha1
889,865 UART: [kat] SHA2-256
891,803 UART: [kat] SHA2-384
894,568 UART: [kat] SHA2-512-ACC
896,469 UART: [kat] ECC-384
902,138 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,717 UART: [cold-reset] ++
1,476,253 UART: [fht] Storing FHT @ 0x50003400
1,478,930 UART: [idev] ++
1,479,098 UART: [idev] CDI.KEYID = 6
1,479,458 UART: [idev] SUBJECT.KEYID = 7
1,479,882 UART: [idev] UDS.KEYID = 0
1,480,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,444 UART: [idev] Erasing UDS.KEYID = 0
1,505,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,084 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,412 UART: [ldev] --
1,585,797 UART: [fwproc] Waiting for Commands...
1,586,476 UART: [fwproc] Received command 0x46574c44
1,587,267 UART: [fwproc] Received Image of size 114332 bytes
1,879,841 UART: ROM Fatal Error: 0x000B0027
1,880,998 >>> mbox cmd response: failed
1,880,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,004 >>> mbox cmd response: failed
1,881,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,539 UART: [kat] SHA2-256
881,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,585 UART: [kat] ++
885,737 UART: [kat] sha1
890,195 UART: [kat] SHA2-256
892,133 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,482 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,195 UART: [cold-reset] ++
1,476,573 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,828 UART: [idev] Erasing UDS.KEYID = 0
1,505,134 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,327 UART: [ldev] Erasing FE.KEYID = 1
1,546,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,622 UART: [ldev] --
1,586,099 UART: [fwproc] Waiting for Commands...
1,586,952 UART: [fwproc] Received command 0x46574c44
1,587,743 UART: [fwproc] Received Image of size 114332 bytes
2,885,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,581 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,233 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,734,334 >>> mbox cmd response: failed
1,734,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,340 >>> mbox cmd response: failed
1,734,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Manufacturing
86,130 UART: [state] DebugLocked = No
86,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,813 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,306 UART: [cold-reset] ++
1,476,660 UART: [fht] Storing FHT @ 0x50003400
1,479,379 UART: [idev] ++
1,479,547 UART: [idev] CDI.KEYID = 6
1,479,907 UART: [idev] SUBJECT.KEYID = 7
1,480,331 UART: [idev] UDS.KEYID = 0
1,480,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,027 UART: [idev] Erasing UDS.KEYID = 0
1,504,951 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,676 UART: [ldev] ++
1,514,844 UART: [ldev] CDI.KEYID = 6
1,515,207 UART: [ldev] SUBJECT.KEYID = 5
1,515,633 UART: [ldev] AUTHORITY.KEYID = 7
1,516,096 UART: [ldev] FE.KEYID = 1
1,521,514 UART: [ldev] Erasing FE.KEYID = 1
1,547,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,761 UART: [ldev] --
1,586,090 UART: [fwproc] Waiting for Commands...
1,586,831 UART: [fwproc] Received command 0x46574c44
1,587,622 UART: [fwproc] Received Image of size 114332 bytes
1,878,567 UART: ROM Fatal Error: 0x000B0027
1,879,724 >>> mbox cmd response: failed
1,879,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,730 >>> mbox cmd response: failed
1,879,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,696 UART: [kat] SHA2-256
882,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,742 UART: [kat] ++
886,894 UART: [kat] sha1
891,140 UART: [kat] SHA2-256
893,078 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,991 UART: [kat] LMS
1,476,187 UART: [kat] --
1,477,012 UART: [cold-reset] ++
1,477,542 UART: [fht] Storing FHT @ 0x50003400
1,480,307 UART: [idev] ++
1,480,475 UART: [idev] CDI.KEYID = 6
1,480,835 UART: [idev] SUBJECT.KEYID = 7
1,481,259 UART: [idev] UDS.KEYID = 0
1,481,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,499 UART: [idev] Erasing UDS.KEYID = 0
1,506,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,141 UART: [idev] --
1,516,374 UART: [ldev] ++
1,516,542 UART: [ldev] CDI.KEYID = 6
1,516,905 UART: [ldev] SUBJECT.KEYID = 5
1,517,331 UART: [ldev] AUTHORITY.KEYID = 7
1,517,794 UART: [ldev] FE.KEYID = 1
1,522,926 UART: [ldev] Erasing FE.KEYID = 1
1,548,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,215 UART: [ldev] --
1,587,712 UART: [fwproc] Waiting for Commands...
1,588,549 UART: [fwproc] Received command 0x46574c44
1,589,340 UART: [fwproc] Received Image of size 114332 bytes
2,886,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,026 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,733,741 >>> mbox cmd response: failed
1,733,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,747 >>> mbox cmd response: failed
1,733,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,300 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Manufacturing
86,031 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,492 UART: [kat] HMAC-384Kdf
923,178 UART: [kat] LMS
1,171,506 UART: [kat] --
1,172,383 UART: [cold-reset] ++
1,172,777 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,523 UART: [idev] Sha1 KeyId Algorithm
1,209,041 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,434 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,160 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,613 UART: ROM Fatal Error: 0x000B0027
1,576,770 >>> mbox cmd response: failed
1,576,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,776 >>> mbox cmd response: failed
1,576,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,749 UART: [kat] SHA2-256
903,689 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
918,168 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,208,917 UART: [idev] --
1,209,917 UART: [ldev] ++
1,210,085 UART: [ldev] CDI.KEYID = 6
1,210,448 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,613 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,690 UART: [fwproc] Recv command 0x46574c44
1,283,418 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,244 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,430,383 >>> mbox cmd response: failed
1,430,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,389 >>> mbox cmd response: failed
1,430,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Manufacturing
85,940 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
893,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,546 UART: [kat] ++
897,698 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
918,217 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,201,392 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,728 UART: [ldev] Erasing FE.KEYID = 1
1,244,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,404 UART: [ldev] --
1,283,803 UART: [fwproc] Wait for Commands...
1,284,533 UART: [fwproc] Recv command 0x46574c44
1,285,261 UART: [fwproc] Recv'd Img size: 114332 bytes
1,577,032 UART: ROM Fatal Error: 0x000B0027
1,578,189 >>> mbox cmd response: failed
1,578,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,195 >>> mbox cmd response: failed
1,578,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,660 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,691 UART: [idev] ++
1,175,859 UART: [idev] CDI.KEYID = 6
1,176,219 UART: [idev] SUBJECT.KEYID = 7
1,176,643 UART: [idev] UDS.KEYID = 0
1,176,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,823 UART: [idev] Erasing UDS.KEYID = 0
1,202,150 UART: [idev] Sha1 KeyId Algorithm
1,210,482 UART: [idev] --
1,211,404 UART: [ldev] ++
1,211,572 UART: [ldev] CDI.KEYID = 6
1,211,935 UART: [ldev] SUBJECT.KEYID = 5
1,212,361 UART: [ldev] AUTHORITY.KEYID = 7
1,212,824 UART: [ldev] FE.KEYID = 1
1,218,104 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,283,933 UART: [fwproc] Wait for Commands...
1,284,559 UART: [fwproc] Recv command 0x46574c44
1,285,287 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,677 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,431,534 >>> mbox cmd response: failed
1,431,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,540 >>> mbox cmd response: failed
1,431,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,360 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,196 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Manufacturing
86,041 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,174,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,241,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,496 UART: [ldev] --
1,280,828 UART: [fwproc] Wait for Commands...
1,281,563 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,433 UART: ROM Fatal Error: 0x000B0027
1,575,590 >>> mbox cmd response: failed
1,575,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,596 >>> mbox cmd response: failed
1,575,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,191 UART: [cold-reset] ++
1,169,639 UART: [fht] FHT @ 0x50003400
1,172,169 UART: [idev] ++
1,172,337 UART: [idev] CDI.KEYID = 6
1,172,698 UART: [idev] SUBJECT.KEYID = 7
1,173,123 UART: [idev] UDS.KEYID = 0
1,173,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,549 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,888 UART: [ldev] --
1,280,238 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,638 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,997 >>> mbox cmd response: failed
1,426,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,003 >>> mbox cmd response: failed
1,427,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,342 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Manufacturing
86,168 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,174,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,164 UART: [idev] --
1,209,057 UART: [ldev] ++
1,209,225 UART: [ldev] CDI.KEYID = 6
1,209,589 UART: [ldev] SUBJECT.KEYID = 5
1,210,016 UART: [ldev] AUTHORITY.KEYID = 7
1,210,479 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,281,007 UART: [fwproc] Wait for Commands...
1,281,618 UART: [fwproc] Recv command 0x46574c44
1,282,351 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,246 UART: ROM Fatal Error: 0x000B0027
1,575,403 >>> mbox cmd response: failed
1,575,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,409 >>> mbox cmd response: failed
1,575,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,919 UART: [kat] HMAC-384Kdf
921,505 UART: [kat] LMS
1,169,817 UART: [kat] --
1,170,742 UART: [cold-reset] ++
1,171,242 UART: [fht] FHT @ 0x50003400
1,173,958 UART: [idev] ++
1,174,126 UART: [idev] CDI.KEYID = 6
1,174,487 UART: [idev] SUBJECT.KEYID = 7
1,174,912 UART: [idev] UDS.KEYID = 0
1,175,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,811 UART: [ldev] ++
1,209,979 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,770 UART: [ldev] AUTHORITY.KEYID = 7
1,211,233 UART: [ldev] FE.KEYID = 1
1,216,833 UART: [ldev] Erasing FE.KEYID = 1
1,243,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,819 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,545 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,311 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,677 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,394 >>> mbox cmd response: failed
1,428,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,400 >>> mbox cmd response: failed
1,428,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,507 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,367 UART: [kat] SHA2-256
892,305 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,722 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,766 UART: [idev] Erasing UDS.KEYID = 0
1,505,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,608 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,740 UART: [ldev] --
1,586,105 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 114332 bytes
1,635,261 UART: ROM Fatal Error: 0x000B002F
1,636,420 >>> mbox cmd response: failed
1,636,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,426 >>> mbox cmd response: failed
1,636,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,466 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,475,917 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,150 UART: [idev] ++
1,479,318 UART: [idev] CDI.KEYID = 6
1,479,678 UART: [idev] SUBJECT.KEYID = 7
1,480,102 UART: [idev] UDS.KEYID = 0
1,480,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,260 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,760 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,351 UART: [ldev] Erasing FE.KEYID = 1
1,547,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,092 UART: [ldev] --
1,586,397 UART: [fwproc] Waiting for Commands...
1,587,062 UART: [fwproc] Received command 0x46574c44
1,587,853 UART: [fwproc] Received Image of size 114332 bytes
2,885,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,292 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,644 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,407 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,035 >>> mbox cmd response: failed
1,487,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,041 >>> mbox cmd response: failed
1,487,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,735 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,213 UART: [kat] SHA2-512-ACC
897,114 UART: [kat] ECC-384
902,699 UART: [kat] HMAC-384Kdf
907,203 UART: [kat] LMS
1,475,399 UART: [kat] --
1,476,168 UART: [cold-reset] ++
1,476,522 UART: [fht] Storing FHT @ 0x50003400
1,479,361 UART: [idev] ++
1,479,529 UART: [idev] CDI.KEYID = 6
1,479,889 UART: [idev] SUBJECT.KEYID = 7
1,480,313 UART: [idev] UDS.KEYID = 0
1,480,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,191 UART: [idev] Erasing UDS.KEYID = 0
1,504,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,555 UART: [idev] --
1,514,532 UART: [ldev] ++
1,514,700 UART: [ldev] CDI.KEYID = 6
1,515,063 UART: [ldev] SUBJECT.KEYID = 5
1,515,489 UART: [ldev] AUTHORITY.KEYID = 7
1,515,952 UART: [ldev] FE.KEYID = 1
1,521,254 UART: [ldev] Erasing FE.KEYID = 1
1,546,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,291 UART: [ldev] --
1,585,654 UART: [fwproc] Waiting for Commands...
1,586,297 UART: [fwproc] Received command 0x46574c44
1,587,088 UART: [fwproc] Received Image of size 114332 bytes
1,633,846 UART: ROM Fatal Error: 0x000B002F
1,635,005 >>> mbox cmd response: failed
1,635,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,011 >>> mbox cmd response: failed
1,635,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,651 UART: [kat] LMS
1,475,847 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,332 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,185 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,747 UART: [idev] --
1,515,022 UART: [ldev] ++
1,515,190 UART: [ldev] CDI.KEYID = 6
1,515,553 UART: [ldev] SUBJECT.KEYID = 5
1,515,979 UART: [ldev] AUTHORITY.KEYID = 7
1,516,442 UART: [ldev] FE.KEYID = 1
1,521,760 UART: [ldev] Erasing FE.KEYID = 1
1,546,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,591 UART: [ldev] --
1,585,982 UART: [fwproc] Waiting for Commands...
1,586,817 UART: [fwproc] Received command 0x46574c44
1,587,608 UART: [fwproc] Received Image of size 114332 bytes
2,885,957 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,833 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,994 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,402 >>> mbox cmd response: failed
1,490,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,408 >>> mbox cmd response: failed
1,490,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,158 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,274 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,181 UART: [fht] FHT @ 0x50003400
1,174,860 UART: [idev] ++
1,175,028 UART: [idev] CDI.KEYID = 6
1,175,388 UART: [idev] SUBJECT.KEYID = 7
1,175,812 UART: [idev] UDS.KEYID = 0
1,176,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,556 UART: [ldev] AUTHORITY.KEYID = 7
1,212,019 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,003 UART: [ldev] --
1,283,482 UART: [fwproc] Wait for Commands...
1,284,296 UART: [fwproc] Recv command 0x46574c44
1,285,024 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,952 UART: ROM Fatal Error: 0x000B002F
1,334,111 >>> mbox cmd response: failed
1,334,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,117 >>> mbox cmd response: failed
1,334,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,834 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,369 UART: [cold-reset] ++
1,171,785 UART: [fht] FHT @ 0x50003400
1,174,586 UART: [idev] ++
1,174,754 UART: [idev] CDI.KEYID = 6
1,175,114 UART: [idev] SUBJECT.KEYID = 7
1,175,538 UART: [idev] UDS.KEYID = 0
1,175,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,696 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,067 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,670 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,424 UART: [fwproc] Wait for Commands...
1,282,226 UART: [fwproc] Recv command 0x46574c44
1,282,954 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,508 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,434 >>> mbox cmd response: failed
1,186,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,440 >>> mbox cmd response: failed
1,186,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,085 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,747 UART: [kat] SHA2-512-ACC
908,648 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,095 UART: [kat] LMS
1,171,423 UART: [kat] --
1,172,352 UART: [cold-reset] ++
1,172,764 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,201,498 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,336 UART: [ldev] Erasing FE.KEYID = 1
1,243,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,380 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,277 UART: [fwproc] Recv command 0x46574c44
1,284,005 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,113 UART: ROM Fatal Error: 0x000B002F
1,332,272 >>> mbox cmd response: failed
1,332,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,278 >>> mbox cmd response: failed
1,332,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,205 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,028 UART: [cold-reset] ++
1,172,412 UART: [fht] FHT @ 0x50003400
1,175,103 UART: [idev] ++
1,175,271 UART: [idev] CDI.KEYID = 6
1,175,631 UART: [idev] SUBJECT.KEYID = 7
1,176,055 UART: [idev] UDS.KEYID = 0
1,176,400 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,067 UART: [idev] Erasing UDS.KEYID = 0
1,200,522 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,209,880 UART: [ldev] ++
1,210,048 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,837 UART: [ldev] AUTHORITY.KEYID = 7
1,211,300 UART: [ldev] FE.KEYID = 1
1,216,792 UART: [ldev] Erasing FE.KEYID = 1
1,243,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,724 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,901 UART: [fwproc] Recv command 0x46574c44
1,284,629 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,473 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,047 >>> mbox cmd response: failed
1,188,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,053 >>> mbox cmd response: failed
1,188,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,502 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,541 UART: ROM Fatal Error: 0x000B002F
1,331,700 >>> mbox cmd response: failed
1,331,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,706 >>> mbox cmd response: failed
1,331,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,199,059 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,209,148 UART: [ldev] ++
1,209,316 UART: [ldev] CDI.KEYID = 6
1,209,680 UART: [ldev] SUBJECT.KEYID = 5
1,210,107 UART: [ldev] AUTHORITY.KEYID = 7
1,210,570 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,490 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,717 >>> mbox cmd response: failed
1,182,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,723 >>> mbox cmd response: failed
1,182,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,136 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
891,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,978 UART: [kat] ++
896,130 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,919 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,782 UART: [cold-reset] ++
1,171,292 UART: [fht] FHT @ 0x50003400
1,173,790 UART: [idev] ++
1,173,958 UART: [idev] CDI.KEYID = 6
1,174,319 UART: [idev] SUBJECT.KEYID = 7
1,174,744 UART: [idev] UDS.KEYID = 0
1,175,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,877 UART: [ldev] ++
1,210,045 UART: [ldev] CDI.KEYID = 6
1,210,409 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,749 UART: [ldev] --
1,283,107 UART: [fwproc] Wait for Commands...
1,283,824 UART: [fwproc] Recv command 0x46574c44
1,284,557 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,612 UART: ROM Fatal Error: 0x000B002F
1,331,771 >>> mbox cmd response: failed
1,331,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,777 >>> mbox cmd response: failed
1,331,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,472 UART: [idev] Erasing UDS.KEYID = 0
1,198,254 UART: [idev] Sha1 KeyId Algorithm
1,207,070 UART: [idev] --
1,208,061 UART: [ldev] ++
1,208,229 UART: [ldev] CDI.KEYID = 6
1,208,593 UART: [ldev] SUBJECT.KEYID = 5
1,209,020 UART: [ldev] AUTHORITY.KEYID = 7
1,209,483 UART: [ldev] FE.KEYID = 1
1,214,933 UART: [ldev] Erasing FE.KEYID = 1
1,241,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,089 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,188 UART: [fwproc] Recv command 0x46574c44
1,281,921 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,507 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,416 >>> mbox cmd response: failed
1,183,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,422 >>> mbox cmd response: failed
1,183,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,475 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,427 UART: [kat] SHA2-256
882,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,473 UART: [kat] ++
886,625 UART: [kat] sha1
891,041 UART: [kat] SHA2-256
892,979 UART: [kat] SHA2-384
895,860 UART: [kat] SHA2-512-ACC
897,761 UART: [kat] ECC-384
903,292 UART: [kat] HMAC-384Kdf
907,924 UART: [kat] LMS
1,476,120 UART: [kat] --
1,477,271 UART: [cold-reset] ++
1,477,601 UART: [fht] Storing FHT @ 0x50003400
1,480,296 UART: [idev] ++
1,480,464 UART: [idev] CDI.KEYID = 6
1,480,824 UART: [idev] SUBJECT.KEYID = 7
1,481,248 UART: [idev] UDS.KEYID = 0
1,481,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,958 UART: [idev] Erasing UDS.KEYID = 0
1,505,500 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,114 UART: [idev] --
1,515,235 UART: [ldev] ++
1,515,403 UART: [ldev] CDI.KEYID = 6
1,515,766 UART: [ldev] SUBJECT.KEYID = 5
1,516,192 UART: [ldev] AUTHORITY.KEYID = 7
1,516,655 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,258 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,296 UART: [ldev] --
1,586,609 UART: [fwproc] Waiting for Commands...
1,587,472 UART: [fwproc] Received command 0x46574c44
1,588,263 UART: [fwproc] Received Image of size 114332 bytes
1,607,935 UART: ROM Fatal Error: 0x000B0001
1,609,092 >>> mbox cmd response: failed
1,609,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,098 >>> mbox cmd response: failed
1,609,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
894,960 UART: [kat] SHA2-512-ACC
896,861 UART: [kat] ECC-384
902,248 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,487 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,938 UART: [idev] Erasing UDS.KEYID = 0
1,504,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,096 UART: [idev] --
1,514,217 UART: [ldev] ++
1,514,385 UART: [ldev] CDI.KEYID = 6
1,514,748 UART: [ldev] SUBJECT.KEYID = 5
1,515,174 UART: [ldev] AUTHORITY.KEYID = 7
1,515,637 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,546,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,844 UART: [ldev] --
1,586,345 UART: [fwproc] Waiting for Commands...
1,587,128 UART: [fwproc] Received command 0x46574c44
1,587,919 UART: [fwproc] Received Image of size 114332 bytes
2,886,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,084 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,415 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,459,173 >>> mbox cmd response: failed
1,459,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,179 >>> mbox cmd response: failed
1,459,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,683 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,641 UART: [kat] LMS
1,475,837 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,290 UART: [fht] Storing FHT @ 0x50003400
1,479,885 UART: [idev] ++
1,480,053 UART: [idev] CDI.KEYID = 6
1,480,413 UART: [idev] SUBJECT.KEYID = 7
1,480,837 UART: [idev] UDS.KEYID = 0
1,481,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,269 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,571 UART: [idev] --
1,515,764 UART: [ldev] ++
1,515,932 UART: [ldev] CDI.KEYID = 6
1,516,295 UART: [ldev] SUBJECT.KEYID = 5
1,516,721 UART: [ldev] AUTHORITY.KEYID = 7
1,517,184 UART: [ldev] FE.KEYID = 1
1,522,598 UART: [ldev] Erasing FE.KEYID = 1
1,547,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,371 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,563 UART: [fwproc] Received command 0x46574c44
1,588,354 UART: [fwproc] Received Image of size 114332 bytes
1,607,774 UART: ROM Fatal Error: 0x000B0001
1,608,931 >>> mbox cmd response: failed
1,608,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,937 >>> mbox cmd response: failed
1,608,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,156 UART: [fht] Storing FHT @ 0x50003400
1,479,871 UART: [idev] ++
1,480,039 UART: [idev] CDI.KEYID = 6
1,480,399 UART: [idev] SUBJECT.KEYID = 7
1,480,823 UART: [idev] UDS.KEYID = 0
1,481,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,523 UART: [idev] Erasing UDS.KEYID = 0
1,505,429 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,263 UART: [idev] --
1,515,324 UART: [ldev] ++
1,515,492 UART: [ldev] CDI.KEYID = 6
1,515,855 UART: [ldev] SUBJECT.KEYID = 5
1,516,281 UART: [ldev] AUTHORITY.KEYID = 7
1,516,744 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,546,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,893 UART: [ldev] --
1,586,250 UART: [fwproc] Waiting for Commands...
1,587,035 UART: [fwproc] Received command 0x46574c44
1,587,826 UART: [fwproc] Received Image of size 114332 bytes
2,884,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,682 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,278 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,462,016 >>> mbox cmd response: failed
1,462,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,022 >>> mbox cmd response: failed
1,462,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,596 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,626 UART: [state] LifecycleState = Unprovisioned
85,281 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
892,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,913 UART: [kat] ++
897,065 UART: [kat] sha1
901,423 UART: [kat] SHA2-256
903,363 UART: [kat] SHA2-384
906,046 UART: [kat] SHA2-512-ACC
907,947 UART: [kat] ECC-384
917,366 UART: [kat] HMAC-384Kdf
922,084 UART: [kat] LMS
1,170,412 UART: [kat] --
1,171,349 UART: [cold-reset] ++
1,171,705 UART: [fht] FHT @ 0x50003400
1,174,514 UART: [idev] ++
1,174,682 UART: [idev] CDI.KEYID = 6
1,175,042 UART: [idev] SUBJECT.KEYID = 7
1,175,466 UART: [idev] UDS.KEYID = 0
1,175,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,200,741 UART: [idev] Sha1 KeyId Algorithm
1,209,309 UART: [idev] --
1,210,337 UART: [ldev] ++
1,210,505 UART: [ldev] CDI.KEYID = 6
1,210,868 UART: [ldev] SUBJECT.KEYID = 5
1,211,294 UART: [ldev] AUTHORITY.KEYID = 7
1,211,757 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,782 UART: [fwproc] Wait for Commands...
1,283,496 UART: [fwproc] Recv command 0x46574c44
1,284,224 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,334 UART: ROM Fatal Error: 0x000B0001
1,304,491 >>> mbox cmd response: failed
1,304,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,497 >>> mbox cmd response: failed
1,304,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,737 UART: [kat] SHA2-256
903,677 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,171,931 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,884 UART: [idev] ++
1,175,052 UART: [idev] CDI.KEYID = 6
1,175,412 UART: [idev] SUBJECT.KEYID = 7
1,175,836 UART: [idev] UDS.KEYID = 0
1,176,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,612 UART: [idev] Erasing UDS.KEYID = 0
1,200,339 UART: [idev] Sha1 KeyId Algorithm
1,208,901 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,070 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,118 >>> mbox cmd response: failed
1,159,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,124 >>> mbox cmd response: failed
1,159,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,047 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
893,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,448 UART: [kat] ++
897,600 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,315 UART: [kat] SHA2-512-ACC
908,216 UART: [kat] ECC-384
917,905 UART: [kat] HMAC-384Kdf
922,719 UART: [kat] LMS
1,171,047 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,592 UART: [fht] FHT @ 0x50003400
1,175,163 UART: [idev] ++
1,175,331 UART: [idev] CDI.KEYID = 6
1,175,691 UART: [idev] SUBJECT.KEYID = 7
1,176,115 UART: [idev] UDS.KEYID = 0
1,176,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,529 UART: [idev] Erasing UDS.KEYID = 0
1,201,074 UART: [idev] Sha1 KeyId Algorithm
1,209,538 UART: [idev] --
1,210,566 UART: [ldev] ++
1,210,734 UART: [ldev] CDI.KEYID = 6
1,211,097 UART: [ldev] SUBJECT.KEYID = 5
1,211,523 UART: [ldev] AUTHORITY.KEYID = 7
1,211,986 UART: [ldev] FE.KEYID = 1
1,217,132 UART: [ldev] Erasing FE.KEYID = 1
1,243,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,284 UART: [ldev] --
1,282,699 UART: [fwproc] Wait for Commands...
1,283,323 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,355 UART: ROM Fatal Error: 0x000B0001
1,304,512 >>> mbox cmd response: failed
1,304,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,518 >>> mbox cmd response: failed
1,304,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,521 UART: [kat] LMS
1,171,849 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,446 UART: [ldev] ++
1,211,614 UART: [ldev] CDI.KEYID = 6
1,211,977 UART: [ldev] SUBJECT.KEYID = 5
1,212,403 UART: [ldev] AUTHORITY.KEYID = 7
1,212,866 UART: [ldev] FE.KEYID = 1
1,218,116 UART: [ldev] Erasing FE.KEYID = 1
1,244,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,022 UART: [ldev] --
1,284,341 UART: [fwproc] Wait for Commands...
1,284,983 UART: [fwproc] Recv command 0x46574c44
1,285,711 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,819 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,899 >>> mbox cmd response: failed
1,159,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,905 >>> mbox cmd response: failed
1,159,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,158 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,991 UART: [kat] ++
895,143 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,722 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,495 UART: [idev] ++
1,172,663 UART: [idev] CDI.KEYID = 6
1,173,024 UART: [idev] SUBJECT.KEYID = 7
1,173,449 UART: [idev] UDS.KEYID = 0
1,173,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,339 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,000 UART: [ldev] Erasing FE.KEYID = 1
1,240,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,932 UART: [ldev] --
1,280,234 UART: [fwproc] Wait for Commands...
1,280,921 UART: [fwproc] Recv command 0x46574c44
1,281,654 UART: [fwproc] Recv'd Img size: 114332 bytes
1,300,679 UART: ROM Fatal Error: 0x000B0001
1,301,836 >>> mbox cmd response: failed
1,301,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,842 >>> mbox cmd response: failed
1,301,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,628 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,171 UART: [cold-reset] ++
1,169,581 UART: [fht] FHT @ 0x50003400
1,172,369 UART: [idev] ++
1,172,537 UART: [idev] CDI.KEYID = 6
1,172,898 UART: [idev] SUBJECT.KEYID = 7
1,173,323 UART: [idev] UDS.KEYID = 0
1,173,669 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,199,057 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,764 UART: [ldev] ++
1,208,932 UART: [ldev] CDI.KEYID = 6
1,209,296 UART: [ldev] SUBJECT.KEYID = 5
1,209,723 UART: [ldev] AUTHORITY.KEYID = 7
1,210,186 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,440 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,432 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,153,949 >>> mbox cmd response: failed
1,153,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,153,955 >>> mbox cmd response: failed
1,153,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,153,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,536 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,174,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,786 UART: [fwproc] Recv command 0x46574c44
1,283,519 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,408 UART: ROM Fatal Error: 0x000B0001
1,303,565 >>> mbox cmd response: failed
1,303,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,571 >>> mbox cmd response: failed
1,303,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,174,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,154 UART: [fwproc] Recv command 0x46574c44
1,282,887 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,711 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,458 >>> mbox cmd response: failed
1,157,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,464 >>> mbox cmd response: failed
1,157,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,915 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,079 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,436 UART: [idev] ++
1,479,604 UART: [idev] CDI.KEYID = 6
1,479,964 UART: [idev] SUBJECT.KEYID = 7
1,480,388 UART: [idev] UDS.KEYID = 0
1,480,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,716 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] --
1,515,085 UART: [ldev] ++
1,515,253 UART: [ldev] CDI.KEYID = 6
1,515,616 UART: [ldev] SUBJECT.KEYID = 5
1,516,042 UART: [ldev] AUTHORITY.KEYID = 7
1,516,505 UART: [ldev] FE.KEYID = 1
1,521,445 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,908 UART: [ldev] --
1,586,367 UART: [fwproc] Waiting for Commands...
1,587,016 UART: [fwproc] Received command 0x46574c44
1,587,807 UART: [fwproc] Received Image of size 114332 bytes
1,607,132 UART: ROM Fatal Error: 0x000B0002
1,608,289 >>> mbox cmd response: failed
1,608,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,295 >>> mbox cmd response: failed
1,608,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,041 UART: [kat] SHA2-256
881,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,087 UART: [kat] ++
886,239 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
907,248 UART: [kat] LMS
1,475,444 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,052 UART: [idev] Erasing UDS.KEYID = 0
1,504,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,726 UART: [idev] --
1,513,899 UART: [ldev] ++
1,514,067 UART: [ldev] CDI.KEYID = 6
1,514,430 UART: [ldev] SUBJECT.KEYID = 5
1,514,856 UART: [ldev] AUTHORITY.KEYID = 7
1,515,319 UART: [ldev] FE.KEYID = 1
1,520,753 UART: [ldev] Erasing FE.KEYID = 1
1,546,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,862 UART: [ldev] --
1,586,169 UART: [fwproc] Waiting for Commands...
1,586,908 UART: [fwproc] Received command 0x46574c44
1,587,699 UART: [fwproc] Received Image of size 114332 bytes
2,885,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,507 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,460,272 >>> mbox cmd response: failed
1,460,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,278 >>> mbox cmd response: failed
1,460,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,387 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,197 UART: [kat] HMAC-384Kdf
907,759 UART: [kat] LMS
1,475,955 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,929 UART: [idev] ++
1,480,097 UART: [idev] CDI.KEYID = 6
1,480,457 UART: [idev] SUBJECT.KEYID = 7
1,480,881 UART: [idev] UDS.KEYID = 0
1,481,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,869 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,385 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,521,984 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,079 UART: [ldev] --
1,587,568 UART: [fwproc] Waiting for Commands...
1,588,363 UART: [fwproc] Received command 0x46574c44
1,589,154 UART: [fwproc] Received Image of size 114332 bytes
1,608,263 UART: ROM Fatal Error: 0x000B0002
1,609,420 >>> mbox cmd response: failed
1,609,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,426 >>> mbox cmd response: failed
1,609,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,438 UART: [kat] SHA2-256
882,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,484 UART: [kat] ++
886,636 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,911 UART: [kat] SHA2-512-ACC
897,812 UART: [kat] ECC-384
903,769 UART: [kat] HMAC-384Kdf
908,461 UART: [kat] LMS
1,476,657 UART: [kat] --
1,477,620 UART: [cold-reset] ++
1,478,064 UART: [fht] Storing FHT @ 0x50003400
1,480,739 UART: [idev] ++
1,480,907 UART: [idev] CDI.KEYID = 6
1,481,267 UART: [idev] SUBJECT.KEYID = 7
1,481,691 UART: [idev] UDS.KEYID = 0
1,482,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,517 UART: [idev] Erasing UDS.KEYID = 0
1,506,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,663 UART: [idev] --
1,516,652 UART: [ldev] ++
1,516,820 UART: [ldev] CDI.KEYID = 6
1,517,183 UART: [ldev] SUBJECT.KEYID = 5
1,517,609 UART: [ldev] AUTHORITY.KEYID = 7
1,518,072 UART: [ldev] FE.KEYID = 1
1,523,132 UART: [ldev] Erasing FE.KEYID = 1
1,548,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,634 UART: [fwproc] Waiting for Commands...
1,588,375 UART: [fwproc] Received command 0x46574c44
1,589,166 UART: [fwproc] Received Image of size 114332 bytes
2,887,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,744 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,963 >>> mbox cmd response: failed
1,461,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,969 >>> mbox cmd response: failed
1,461,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,750 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
892,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,949 UART: [kat] ++
897,101 UART: [kat] sha1
901,379 UART: [kat] SHA2-256
903,319 UART: [kat] SHA2-384
905,904 UART: [kat] SHA2-512-ACC
907,805 UART: [kat] ECC-384
917,182 UART: [kat] HMAC-384Kdf
921,736 UART: [kat] LMS
1,170,064 UART: [kat] --
1,171,141 UART: [cold-reset] ++
1,171,709 UART: [fht] FHT @ 0x50003400
1,174,204 UART: [idev] ++
1,174,372 UART: [idev] CDI.KEYID = 6
1,174,732 UART: [idev] SUBJECT.KEYID = 7
1,175,156 UART: [idev] UDS.KEYID = 0
1,175,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,061 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,401 UART: [ldev] ++
1,209,569 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,419 UART: ROM Fatal Error: 0x000B0002
1,304,576 >>> mbox cmd response: failed
1,304,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,582 >>> mbox cmd response: failed
1,304,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
917,792 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,269 UART: [cold-reset] ++
1,171,809 UART: [fht] FHT @ 0x50003400
1,174,686 UART: [idev] ++
1,174,854 UART: [idev] CDI.KEYID = 6
1,175,214 UART: [idev] SUBJECT.KEYID = 7
1,175,638 UART: [idev] UDS.KEYID = 0
1,175,983 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,814 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,415 UART: [idev] --
1,210,507 UART: [ldev] ++
1,210,675 UART: [ldev] CDI.KEYID = 6
1,211,038 UART: [ldev] SUBJECT.KEYID = 5
1,211,464 UART: [ldev] AUTHORITY.KEYID = 7
1,211,927 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,315 UART: [ldev] --
1,282,736 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,168 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,112 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,087 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,083 >>> mbox cmd response: failed
1,159,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,089 >>> mbox cmd response: failed
1,159,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,671 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,777 UART: [kat] SHA2-512-ACC
908,678 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,571 UART: [idev] Erasing UDS.KEYID = 0
1,202,198 UART: [idev] Sha1 KeyId Algorithm
1,210,788 UART: [idev] --
1,211,802 UART: [ldev] ++
1,211,970 UART: [ldev] CDI.KEYID = 6
1,212,333 UART: [ldev] SUBJECT.KEYID = 5
1,212,759 UART: [ldev] AUTHORITY.KEYID = 7
1,213,222 UART: [ldev] FE.KEYID = 1
1,218,054 UART: [ldev] Erasing FE.KEYID = 1
1,244,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,358 UART: [ldev] --
1,283,693 UART: [fwproc] Wait for Commands...
1,284,321 UART: [fwproc] Recv command 0x46574c44
1,285,049 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,550 UART: ROM Fatal Error: 0x000B0002
1,305,707 >>> mbox cmd response: failed
1,305,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,713 >>> mbox cmd response: failed
1,305,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,847 UART: [state] LifecycleState = Unprovisioned
85,502 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,397 UART: [kat] SHA2-256
893,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,172 UART: [kat] ++
897,324 UART: [kat] sha1
901,682 UART: [kat] SHA2-256
903,622 UART: [kat] SHA2-384
906,433 UART: [kat] SHA2-512-ACC
908,334 UART: [kat] ECC-384
918,171 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,595 UART: [idev] Erasing UDS.KEYID = 0
1,202,262 UART: [idev] Sha1 KeyId Algorithm
1,210,796 UART: [idev] --
1,211,678 UART: [ldev] ++
1,211,846 UART: [ldev] CDI.KEYID = 6
1,212,209 UART: [ldev] SUBJECT.KEYID = 5
1,212,635 UART: [ldev] AUTHORITY.KEYID = 7
1,213,098 UART: [ldev] FE.KEYID = 1
1,218,204 UART: [ldev] Erasing FE.KEYID = 1
1,244,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,646 UART: [ldev] --
1,283,973 UART: [fwproc] Wait for Commands...
1,284,755 UART: [fwproc] Recv command 0x46574c44
1,285,483 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,561 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,222 >>> mbox cmd response: failed
1,161,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,228 >>> mbox cmd response: failed
1,161,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,184 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,653 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,174,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,373 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,306 UART: ROM Fatal Error: 0x000B0002
1,302,463 >>> mbox cmd response: failed
1,302,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,469 >>> mbox cmd response: failed
1,302,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,174,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,206,975 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,870 UART: [ldev] --
1,280,298 UART: [fwproc] Wait for Commands...
1,280,969 UART: [fwproc] Recv command 0x46574c44
1,281,702 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,320 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,900 >>> mbox cmd response: failed
1,155,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,906 >>> mbox cmd response: failed
1,155,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,722 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,765 UART: ROM Fatal Error: 0x000B0002
1,303,922 >>> mbox cmd response: failed
1,303,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,928 >>> mbox cmd response: failed
1,303,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,879 UART: [kat] HMAC-384Kdf
921,649 UART: [kat] LMS
1,169,961 UART: [kat] --
1,170,828 UART: [cold-reset] ++
1,171,398 UART: [fht] FHT @ 0x50003400
1,174,078 UART: [idev] ++
1,174,246 UART: [idev] CDI.KEYID = 6
1,174,607 UART: [idev] SUBJECT.KEYID = 7
1,175,032 UART: [idev] UDS.KEYID = 0
1,175,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,212 UART: [idev] Erasing UDS.KEYID = 0
1,200,304 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,713 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,331 UART: [ldev] --
1,282,845 UART: [fwproc] Wait for Commands...
1,283,654 UART: [fwproc] Recv command 0x46574c44
1,284,387 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,341 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,773 >>> mbox cmd response: failed
1,154,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,779 >>> mbox cmd response: failed
1,154,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,284 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
85,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,513 UART: [kat] SHA2-256
881,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,559 UART: [kat] ++
885,711 UART: [kat] sha1
890,035 UART: [kat] SHA2-256
891,973 UART: [kat] SHA2-384
894,832 UART: [kat] SHA2-512-ACC
896,733 UART: [kat] ECC-384
902,256 UART: [kat] HMAC-384Kdf
906,896 UART: [kat] LMS
1,475,092 UART: [kat] --
1,475,807 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,479,040 UART: [idev] ++
1,479,208 UART: [idev] CDI.KEYID = 6
1,479,568 UART: [idev] SUBJECT.KEYID = 7
1,479,992 UART: [idev] UDS.KEYID = 0
1,480,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,994 UART: [idev] Erasing UDS.KEYID = 0
1,504,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,432 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,520,757 UART: [ldev] Erasing FE.KEYID = 1
1,546,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,972 UART: [ldev] --
1,585,281 UART: [fwproc] Waiting for Commands...
1,586,118 UART: [fwproc] Received command 0x46574c44
1,586,909 UART: [fwproc] Received Image of size 114332 bytes
1,625,336 UART: ROM Fatal Error: 0x000B0019
1,626,493 >>> mbox cmd response: failed
1,626,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,499 >>> mbox cmd response: failed
1,626,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,807 UART: [kat] SHA2-256
881,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,853 UART: [kat] ++
886,005 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,304 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,039 UART: [cold-reset] ++
1,476,615 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,130 UART: [idev] Erasing UDS.KEYID = 0
1,504,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,496 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,475 UART: [ldev] Erasing FE.KEYID = 1
1,546,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,356 UART: [ldev] --
1,585,793 UART: [fwproc] Waiting for Commands...
1,586,542 UART: [fwproc] Received command 0x46574c44
1,587,333 UART: [fwproc] Received Image of size 114332 bytes
2,884,708 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,479,774 >>> mbox cmd response: failed
1,479,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,780 >>> mbox cmd response: failed
1,479,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
894,985 UART: [kat] SHA2-512-ACC
896,886 UART: [kat] ECC-384
902,233 UART: [kat] HMAC-384Kdf
906,919 UART: [kat] LMS
1,475,115 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,550 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,487 UART: [idev] Erasing UDS.KEYID = 0
1,504,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,819 UART: [idev] --
1,513,938 UART: [ldev] ++
1,514,106 UART: [ldev] CDI.KEYID = 6
1,514,469 UART: [ldev] SUBJECT.KEYID = 5
1,514,895 UART: [ldev] AUTHORITY.KEYID = 7
1,515,358 UART: [ldev] FE.KEYID = 1
1,520,426 UART: [ldev] Erasing FE.KEYID = 1
1,546,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,097 UART: [ldev] --
1,585,568 UART: [fwproc] Waiting for Commands...
1,586,353 UART: [fwproc] Received command 0x46574c44
1,587,144 UART: [fwproc] Received Image of size 114332 bytes
1,626,477 UART: ROM Fatal Error: 0x000B0019
1,627,634 >>> mbox cmd response: failed
1,627,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,640 >>> mbox cmd response: failed
1,627,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,047 UART: [idev] ++
1,480,215 UART: [idev] CDI.KEYID = 6
1,480,575 UART: [idev] SUBJECT.KEYID = 7
1,480,999 UART: [idev] UDS.KEYID = 0
1,481,344 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,081 UART: [idev] Erasing UDS.KEYID = 0
1,505,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,689 UART: [idev] --
1,514,658 UART: [ldev] ++
1,514,826 UART: [ldev] CDI.KEYID = 6
1,515,189 UART: [ldev] SUBJECT.KEYID = 5
1,515,615 UART: [ldev] AUTHORITY.KEYID = 7
1,516,078 UART: [ldev] FE.KEYID = 1
1,521,202 UART: [ldev] Erasing FE.KEYID = 1
1,546,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,893 UART: [ldev] --
1,586,202 UART: [fwproc] Waiting for Commands...
1,586,969 UART: [fwproc] Received command 0x46574c44
1,587,760 UART: [fwproc] Received Image of size 114332 bytes
2,884,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,600 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,480,833 >>> mbox cmd response: failed
1,480,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,839 >>> mbox cmd response: failed
1,480,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,380 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
893,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,325 UART: [kat] ++
897,477 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,272 UART: [kat] SHA2-512-ACC
908,173 UART: [kat] ECC-384
917,990 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,723 UART: [cold-reset] ++
1,172,277 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,502 UART: [idev] Erasing UDS.KEYID = 0
1,200,595 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,522 UART: [fwproc] Wait for Commands...
1,283,248 UART: [fwproc] Recv command 0x46574c44
1,283,976 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,253 UART: ROM Fatal Error: 0x000B0019
1,324,410 >>> mbox cmd response: failed
1,324,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,416 >>> mbox cmd response: failed
1,324,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
893,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,583 UART: [kat] ++
897,735 UART: [kat] sha1
901,817 UART: [kat] SHA2-256
903,757 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
918,114 UART: [kat] HMAC-384Kdf
922,728 UART: [kat] LMS
1,171,056 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,321 UART: [fht] FHT @ 0x50003400
1,174,878 UART: [idev] ++
1,175,046 UART: [idev] CDI.KEYID = 6
1,175,406 UART: [idev] SUBJECT.KEYID = 7
1,175,830 UART: [idev] UDS.KEYID = 0
1,176,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,247 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,258 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,894 UART: [fwproc] Wait for Commands...
1,283,650 UART: [fwproc] Recv command 0x46574c44
1,284,378 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,740 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,749 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,461 >>> mbox cmd response: failed
1,178,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,467 >>> mbox cmd response: failed
1,178,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,201,400 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,040 UART: [ldev] ++
1,211,208 UART: [ldev] CDI.KEYID = 6
1,211,571 UART: [ldev] SUBJECT.KEYID = 5
1,211,997 UART: [ldev] AUTHORITY.KEYID = 7
1,212,460 UART: [ldev] FE.KEYID = 1
1,217,580 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,283,949 UART: [fwproc] Wait for Commands...
1,284,577 UART: [fwproc] Recv command 0x46574c44
1,285,305 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,512 UART: ROM Fatal Error: 0x000B0019
1,325,669 >>> mbox cmd response: failed
1,325,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,675 >>> mbox cmd response: failed
1,325,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,746 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,837 UART: [idev] ++
1,175,005 UART: [idev] CDI.KEYID = 6
1,175,365 UART: [idev] SUBJECT.KEYID = 7
1,175,789 UART: [idev] UDS.KEYID = 0
1,176,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,859 UART: [idev] Erasing UDS.KEYID = 0
1,200,942 UART: [idev] Sha1 KeyId Algorithm
1,209,364 UART: [idev] --
1,210,420 UART: [ldev] ++
1,210,588 UART: [ldev] CDI.KEYID = 6
1,210,951 UART: [ldev] SUBJECT.KEYID = 5
1,211,377 UART: [ldev] AUTHORITY.KEYID = 7
1,211,840 UART: [ldev] FE.KEYID = 1
1,217,134 UART: [ldev] Erasing FE.KEYID = 1
1,243,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,096 UART: [ldev] --
1,283,513 UART: [fwproc] Wait for Commands...
1,284,259 UART: [fwproc] Recv command 0x46574c44
1,284,987 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,773 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,790 >>> mbox cmd response: failed
1,178,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,796 >>> mbox cmd response: failed
1,178,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,240 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,614 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,220 UART: [kat] LMS
1,168,532 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,279,916 UART: [fwproc] Wait for Commands...
1,280,583 UART: [fwproc] Recv command 0x46574c44
1,281,316 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,010 UART: ROM Fatal Error: 0x000B0019
1,321,167 >>> mbox cmd response: failed
1,321,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,173 >>> mbox cmd response: failed
1,321,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,078 UART: [kat] LMS
1,169,390 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,241 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,710 UART: [ldev] Erasing FE.KEYID = 1
1,240,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,732 UART: [ldev] --
1,280,240 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,598 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,594 >>> mbox cmd response: failed
1,175,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,600 >>> mbox cmd response: failed
1,175,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,038 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,447 UART: [fwproc] Wait for Commands...
1,283,250 UART: [fwproc] Recv command 0x46574c44
1,283,983 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,865 UART: ROM Fatal Error: 0x000B0019
1,323,022 >>> mbox cmd response: failed
1,323,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,028 >>> mbox cmd response: failed
1,323,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,171,098 UART: [fht] FHT @ 0x50003400
1,173,930 UART: [idev] ++
1,174,098 UART: [idev] CDI.KEYID = 6
1,174,459 UART: [idev] SUBJECT.KEYID = 7
1,174,884 UART: [idev] UDS.KEYID = 0
1,175,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,581 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,589 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,555 >>> mbox cmd response: failed
1,174,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,561 >>> mbox cmd response: failed
1,174,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,447 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,041 UART: [kat] SHA2-256
881,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,087 UART: [kat] ++
886,239 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,467 UART: [fht] Storing FHT @ 0x50003400
1,479,138 UART: [idev] ++
1,479,306 UART: [idev] CDI.KEYID = 6
1,479,666 UART: [idev] SUBJECT.KEYID = 7
1,480,090 UART: [idev] UDS.KEYID = 0
1,480,435 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,406 UART: [idev] Erasing UDS.KEYID = 0
1,505,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,300 UART: [idev] --
1,515,283 UART: [ldev] ++
1,515,451 UART: [ldev] CDI.KEYID = 6
1,515,814 UART: [ldev] SUBJECT.KEYID = 5
1,516,240 UART: [ldev] AUTHORITY.KEYID = 7
1,516,703 UART: [ldev] FE.KEYID = 1
1,521,949 UART: [ldev] Erasing FE.KEYID = 1
1,547,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,486 UART: [fwproc] Received command 0x46574c44
1,588,277 UART: [fwproc] Received Image of size 114332 bytes
1,630,083 UART: ROM Fatal Error: 0x000B000F
1,631,242 >>> mbox cmd response: failed
1,631,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,248 >>> mbox cmd response: failed
1,631,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,259 UART: [kat] SHA2-256
882,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,305 UART: [kat] ++
886,457 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,438 UART: [kat] SHA2-512-ACC
897,339 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,766 UART: [kat] LMS
1,475,962 UART: [kat] --
1,476,903 UART: [cold-reset] ++
1,477,461 UART: [fht] Storing FHT @ 0x50003400
1,480,176 UART: [idev] ++
1,480,344 UART: [idev] CDI.KEYID = 6
1,480,704 UART: [idev] SUBJECT.KEYID = 7
1,481,128 UART: [idev] UDS.KEYID = 0
1,481,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,132 UART: [idev] Erasing UDS.KEYID = 0
1,505,718 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,434 UART: [idev] --
1,515,671 UART: [ldev] ++
1,515,839 UART: [ldev] CDI.KEYID = 6
1,516,202 UART: [ldev] SUBJECT.KEYID = 5
1,516,628 UART: [ldev] AUTHORITY.KEYID = 7
1,517,091 UART: [ldev] FE.KEYID = 1
1,522,291 UART: [ldev] Erasing FE.KEYID = 1
1,547,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,514 UART: [ldev] --
1,586,803 UART: [fwproc] Waiting for Commands...
1,587,496 UART: [fwproc] Received command 0x46574c44
1,588,287 UART: [fwproc] Received Image of size 114332 bytes
2,885,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,091 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,484,289 >>> mbox cmd response: failed
1,484,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,295 >>> mbox cmd response: failed
1,484,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,685 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,555 UART: [kat] SHA2-512-ACC
897,456 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,997 UART: [kat] LMS
1,476,193 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,480,361 UART: [idev] ++
1,480,529 UART: [idev] CDI.KEYID = 6
1,480,889 UART: [idev] SUBJECT.KEYID = 7
1,481,313 UART: [idev] UDS.KEYID = 0
1,481,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,377 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,514,872 UART: [ldev] ++
1,515,040 UART: [ldev] CDI.KEYID = 6
1,515,403 UART: [ldev] SUBJECT.KEYID = 5
1,515,829 UART: [ldev] AUTHORITY.KEYID = 7
1,516,292 UART: [ldev] FE.KEYID = 1
1,521,610 UART: [ldev] Erasing FE.KEYID = 1
1,547,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,123 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,385 UART: [fwproc] Received command 0x46574c44
1,588,176 UART: [fwproc] Received Image of size 114332 bytes
1,628,708 UART: ROM Fatal Error: 0x000B000F
1,629,867 >>> mbox cmd response: failed
1,629,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,873 >>> mbox cmd response: failed
1,629,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,480,087 UART: [idev] ++
1,480,255 UART: [idev] CDI.KEYID = 6
1,480,615 UART: [idev] SUBJECT.KEYID = 7
1,481,039 UART: [idev] UDS.KEYID = 0
1,481,384 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,203 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,522,234 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,379 UART: [ldev] --
1,586,876 UART: [fwproc] Waiting for Commands...
1,587,609 UART: [fwproc] Received command 0x46574c44
1,588,400 UART: [fwproc] Received Image of size 114332 bytes
2,886,639 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,657 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,954 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,770 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,483,971 >>> mbox cmd response: failed
1,483,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,977 >>> mbox cmd response: failed
1,483,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,232 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,174 UART: [kat] LMS
1,171,502 UART: [kat] --
1,172,279 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,244 UART: [idev] ++
1,175,412 UART: [idev] CDI.KEYID = 6
1,175,772 UART: [idev] SUBJECT.KEYID = 7
1,176,196 UART: [idev] UDS.KEYID = 0
1,176,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,964 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,273 UART: [idev] --
1,210,395 UART: [ldev] ++
1,210,563 UART: [ldev] CDI.KEYID = 6
1,210,926 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46574c44
1,283,688 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,210 UART: ROM Fatal Error: 0x000B000F
1,326,369 >>> mbox cmd response: failed
1,326,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,375 >>> mbox cmd response: failed
1,326,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,588 UART: [kat] SHA2-512-ACC
908,489 UART: [kat] ECC-384
918,628 UART: [kat] HMAC-384Kdf
923,264 UART: [kat] LMS
1,171,592 UART: [kat] --
1,172,779 UART: [cold-reset] ++
1,173,345 UART: [fht] FHT @ 0x50003400
1,176,102 UART: [idev] ++
1,176,270 UART: [idev] CDI.KEYID = 6
1,176,630 UART: [idev] SUBJECT.KEYID = 7
1,177,054 UART: [idev] UDS.KEYID = 0
1,177,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,792 UART: [idev] Erasing UDS.KEYID = 0
1,202,133 UART: [idev] Sha1 KeyId Algorithm
1,210,647 UART: [idev] --
1,211,743 UART: [ldev] ++
1,211,911 UART: [ldev] CDI.KEYID = 6
1,212,274 UART: [ldev] SUBJECT.KEYID = 5
1,212,700 UART: [ldev] AUTHORITY.KEYID = 7
1,213,163 UART: [ldev] FE.KEYID = 1
1,218,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,434 UART: [fwproc] Recv command 0x46574c44
1,284,162 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,290 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,628 >>> mbox cmd response: failed
1,180,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,634 >>> mbox cmd response: failed
1,180,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,883 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,171,980 UART: [cold-reset] ++
1,172,390 UART: [fht] FHT @ 0x50003400
1,174,961 UART: [idev] ++
1,175,129 UART: [idev] CDI.KEYID = 6
1,175,489 UART: [idev] SUBJECT.KEYID = 7
1,175,913 UART: [idev] UDS.KEYID = 0
1,176,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,117 UART: [idev] Erasing UDS.KEYID = 0
1,201,748 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,392 UART: [ldev] ++
1,211,560 UART: [ldev] CDI.KEYID = 6
1,211,923 UART: [ldev] SUBJECT.KEYID = 5
1,212,349 UART: [ldev] AUTHORITY.KEYID = 7
1,212,812 UART: [ldev] FE.KEYID = 1
1,218,466 UART: [ldev] Erasing FE.KEYID = 1
1,245,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,586 UART: [ldev] --
1,284,899 UART: [fwproc] Wait for Commands...
1,285,597 UART: [fwproc] Recv command 0x46574c44
1,286,325 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,145 UART: ROM Fatal Error: 0x000B000F
1,329,304 >>> mbox cmd response: failed
1,329,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,310 >>> mbox cmd response: failed
1,329,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
907,097 UART: [kat] SHA2-512-ACC
908,998 UART: [kat] ECC-384
919,059 UART: [kat] HMAC-384Kdf
923,691 UART: [kat] LMS
1,172,019 UART: [kat] --
1,173,002 UART: [cold-reset] ++
1,173,502 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,085 UART: [idev] Erasing UDS.KEYID = 0
1,202,180 UART: [idev] Sha1 KeyId Algorithm
1,210,724 UART: [idev] --
1,211,750 UART: [ldev] ++
1,211,918 UART: [ldev] CDI.KEYID = 6
1,212,281 UART: [ldev] SUBJECT.KEYID = 5
1,212,707 UART: [ldev] AUTHORITY.KEYID = 7
1,213,170 UART: [ldev] FE.KEYID = 1
1,218,442 UART: [ldev] Erasing FE.KEYID = 1
1,244,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,442 UART: [ldev] --
1,283,809 UART: [fwproc] Wait for Commands...
1,284,419 UART: [fwproc] Recv command 0x46574c44
1,285,147 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,715 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,263 >>> mbox cmd response: failed
1,182,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,269 >>> mbox cmd response: failed
1,182,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,684 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,048 UART: [kat] LMS
1,168,360 UART: [kat] --
1,169,093 UART: [cold-reset] ++
1,169,429 UART: [fht] FHT @ 0x50003400
1,172,093 UART: [idev] ++
1,172,261 UART: [idev] CDI.KEYID = 6
1,172,622 UART: [idev] SUBJECT.KEYID = 7
1,173,047 UART: [idev] UDS.KEYID = 0
1,173,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,053 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,782 UART: [ldev] ++
1,207,950 UART: [ldev] CDI.KEYID = 6
1,208,314 UART: [ldev] SUBJECT.KEYID = 5
1,208,741 UART: [ldev] AUTHORITY.KEYID = 7
1,209,204 UART: [ldev] FE.KEYID = 1
1,214,392 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,618 UART: [ldev] --
1,280,094 UART: [fwproc] Wait for Commands...
1,280,809 UART: [fwproc] Recv command 0x46574c44
1,281,542 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,532 UART: ROM Fatal Error: 0x000B000F
1,324,691 >>> mbox cmd response: failed
1,324,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,697 >>> mbox cmd response: failed
1,324,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,661 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,174,235 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,961 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,626 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,741 UART: [fwproc] Recv command 0x46574c44
1,282,474 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,482 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,524 >>> mbox cmd response: failed
1,176,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,530 >>> mbox cmd response: failed
1,176,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,572 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,198,712 UART: [idev] Sha1 KeyId Algorithm
1,207,540 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,215,023 UART: [ldev] Erasing FE.KEYID = 1
1,241,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,083 UART: [ldev] --
1,280,443 UART: [fwproc] Wait for Commands...
1,281,040 UART: [fwproc] Recv command 0x46574c44
1,281,773 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,491 UART: ROM Fatal Error: 0x000B000F
1,324,650 >>> mbox cmd response: failed
1,324,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,656 >>> mbox cmd response: failed
1,324,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,928 UART: [idev] Erasing UDS.KEYID = 0
1,198,704 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,505 UART: [ldev] Erasing FE.KEYID = 1
1,241,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,407 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,448 UART: [fwproc] Recv command 0x46574c44
1,282,181 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,863 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,757 >>> mbox cmd response: failed
1,176,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,763 >>> mbox cmd response: failed
1,176,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,179 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,269 UART: [kat] SHA2-256
892,207 UART: [kat] SHA2-384
894,998 UART: [kat] SHA2-512-ACC
896,899 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,165 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,656 UART: [idev] ++
1,479,824 UART: [idev] CDI.KEYID = 6
1,480,184 UART: [idev] SUBJECT.KEYID = 7
1,480,608 UART: [idev] UDS.KEYID = 0
1,480,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,506,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,546 UART: [idev] --
1,515,479 UART: [ldev] ++
1,515,647 UART: [ldev] CDI.KEYID = 6
1,516,010 UART: [ldev] SUBJECT.KEYID = 5
1,516,436 UART: [ldev] AUTHORITY.KEYID = 7
1,516,899 UART: [ldev] FE.KEYID = 1
1,522,191 UART: [ldev] Erasing FE.KEYID = 1
1,547,746 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,700 UART: [ldev] --
1,587,209 UART: [fwproc] Waiting for Commands...
1,587,920 UART: [fwproc] Received command 0x46574c44
1,588,711 UART: [fwproc] Received Image of size 114332 bytes
1,627,571 UART: ROM Fatal Error: 0x000B001A
1,628,730 >>> mbox cmd response: failed
1,628,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,736 >>> mbox cmd response: failed
1,628,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,441 UART: [kat] SHA2-256
892,379 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,186 UART: [idev] Erasing UDS.KEYID = 0
1,504,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,853 UART: [ldev] ++
1,515,021 UART: [ldev] CDI.KEYID = 6
1,515,384 UART: [ldev] SUBJECT.KEYID = 5
1,515,810 UART: [ldev] AUTHORITY.KEYID = 7
1,516,273 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,546,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,564 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,896 UART: [fwproc] Received command 0x46574c44
1,587,687 UART: [fwproc] Received Image of size 114332 bytes
2,884,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,290 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,423 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,480,873 >>> mbox cmd response: failed
1,480,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,879 >>> mbox cmd response: failed
1,480,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,985 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,870 UART: [kat] SHA2-256
881,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,916 UART: [kat] ++
886,068 UART: [kat] sha1
890,310 UART: [kat] SHA2-256
892,248 UART: [kat] SHA2-384
895,005 UART: [kat] SHA2-512-ACC
896,906 UART: [kat] ECC-384
902,533 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,774 UART: [fht] Storing FHT @ 0x50003400
1,479,483 UART: [idev] ++
1,479,651 UART: [idev] CDI.KEYID = 6
1,480,011 UART: [idev] SUBJECT.KEYID = 7
1,480,435 UART: [idev] UDS.KEYID = 0
1,480,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,264 UART: [ldev] ++
1,515,432 UART: [ldev] CDI.KEYID = 6
1,515,795 UART: [ldev] SUBJECT.KEYID = 5
1,516,221 UART: [ldev] AUTHORITY.KEYID = 7
1,516,684 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,133 UART: [ldev] --
1,587,562 UART: [fwproc] Waiting for Commands...
1,588,399 UART: [fwproc] Received command 0x46574c44
1,589,190 UART: [fwproc] Received Image of size 114332 bytes
1,628,396 UART: ROM Fatal Error: 0x000B001A
1,629,555 >>> mbox cmd response: failed
1,629,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,561 >>> mbox cmd response: failed
1,629,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,148 UART: [kat] SHA2-256
893,086 UART: [kat] SHA2-384
895,815 UART: [kat] SHA2-512-ACC
897,716 UART: [kat] ECC-384
903,219 UART: [kat] HMAC-384Kdf
907,961 UART: [kat] LMS
1,476,157 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,454 UART: [fht] Storing FHT @ 0x50003400
1,480,129 UART: [idev] ++
1,480,297 UART: [idev] CDI.KEYID = 6
1,480,657 UART: [idev] SUBJECT.KEYID = 7
1,481,081 UART: [idev] UDS.KEYID = 0
1,481,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,555 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,116 UART: [ldev] ++
1,515,284 UART: [ldev] CDI.KEYID = 6
1,515,647 UART: [ldev] SUBJECT.KEYID = 5
1,516,073 UART: [ldev] AUTHORITY.KEYID = 7
1,516,536 UART: [ldev] FE.KEYID = 1
1,522,046 UART: [ldev] Erasing FE.KEYID = 1
1,547,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,199 UART: [ldev] --
1,586,696 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114332 bytes
2,885,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,094 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,483,194 >>> mbox cmd response: failed
1,483,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,200 >>> mbox cmd response: failed
1,483,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,494 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,408 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,253 UART: [fht] FHT @ 0x50003400
1,174,730 UART: [idev] ++
1,174,898 UART: [idev] CDI.KEYID = 6
1,175,258 UART: [idev] SUBJECT.KEYID = 7
1,175,682 UART: [idev] UDS.KEYID = 0
1,176,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,577 UART: [idev] Sha1 KeyId Algorithm
1,209,041 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,462 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,286 UART: ROM Fatal Error: 0x000B001A
1,324,445 >>> mbox cmd response: failed
1,324,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,451 >>> mbox cmd response: failed
1,324,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,728 UART: [kat] LMS
1,171,056 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,617 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,422 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,008 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,237 UART: [ldev] Erasing FE.KEYID = 1
1,243,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,949 UART: [ldev] --
1,283,324 UART: [fwproc] Wait for Commands...
1,284,124 UART: [fwproc] Recv command 0x46574c44
1,284,852 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,241 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,332 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,536 >>> mbox cmd response: failed
1,179,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,542 >>> mbox cmd response: failed
1,179,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,507 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,683 UART: [kat] SHA2-512-ACC
908,584 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
922,783 UART: [kat] LMS
1,171,111 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,569 UART: [idev] ++
1,175,737 UART: [idev] CDI.KEYID = 6
1,176,097 UART: [idev] SUBJECT.KEYID = 7
1,176,521 UART: [idev] UDS.KEYID = 0
1,176,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,327 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,600 UART: [ldev] ++
1,210,768 UART: [ldev] CDI.KEYID = 6
1,211,131 UART: [ldev] SUBJECT.KEYID = 5
1,211,557 UART: [ldev] AUTHORITY.KEYID = 7
1,212,020 UART: [ldev] FE.KEYID = 1
1,217,228 UART: [ldev] Erasing FE.KEYID = 1
1,243,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,928 UART: [ldev] --
1,283,205 UART: [fwproc] Wait for Commands...
1,283,907 UART: [fwproc] Recv command 0x46574c44
1,284,635 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,987 UART: ROM Fatal Error: 0x000B001A
1,325,146 >>> mbox cmd response: failed
1,325,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,152 >>> mbox cmd response: failed
1,325,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,097 UART: [state] LifecycleState = Unprovisioned
86,752 UART: [state] DebugLocked = No
87,442 UART: [state] WD Timer not started. Device not locked for debugging
88,751 UART: [kat] SHA2-256
894,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,526 UART: [kat] ++
898,678 UART: [kat] sha1
902,984 UART: [kat] SHA2-256
904,924 UART: [kat] SHA2-384
907,819 UART: [kat] SHA2-512-ACC
909,720 UART: [kat] ECC-384
919,533 UART: [kat] HMAC-384Kdf
923,957 UART: [kat] LMS
1,172,285 UART: [kat] --
1,173,080 UART: [cold-reset] ++
1,173,520 UART: [fht] FHT @ 0x50003400
1,176,429 UART: [idev] ++
1,176,597 UART: [idev] CDI.KEYID = 6
1,176,957 UART: [idev] SUBJECT.KEYID = 7
1,177,381 UART: [idev] UDS.KEYID = 0
1,177,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,837 UART: [idev] Erasing UDS.KEYID = 0
1,203,112 UART: [idev] Sha1 KeyId Algorithm
1,211,760 UART: [idev] --
1,212,978 UART: [ldev] ++
1,213,146 UART: [ldev] CDI.KEYID = 6
1,213,509 UART: [ldev] SUBJECT.KEYID = 5
1,213,935 UART: [ldev] AUTHORITY.KEYID = 7
1,214,398 UART: [ldev] FE.KEYID = 1
1,219,868 UART: [ldev] Erasing FE.KEYID = 1
1,245,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,980 UART: [ldev] --
1,285,445 UART: [fwproc] Wait for Commands...
1,286,163 UART: [fwproc] Recv command 0x46574c44
1,286,891 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,099 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,245 >>> mbox cmd response: failed
1,180,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,251 >>> mbox cmd response: failed
1,180,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,616 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,500 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,403 UART: [fwproc] Recv command 0x46574c44
1,282,136 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,195 UART: ROM Fatal Error: 0x000B001A
1,322,354 >>> mbox cmd response: failed
1,322,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,360 >>> mbox cmd response: failed
1,322,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,240,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,650 UART: [ldev] --
1,279,940 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,124 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,229 >>> mbox cmd response: failed
1,175,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,235 >>> mbox cmd response: failed
1,175,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,790 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,969 UART: [kat] SHA2-512-ACC
906,870 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,344 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,174,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,862 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,329 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,114 UART: ROM Fatal Error: 0x000B001A
1,323,273 >>> mbox cmd response: failed
1,323,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,279 >>> mbox cmd response: failed
1,323,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,317 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,095 UART: [ldev] --
1,281,561 UART: [fwproc] Wait for Commands...
1,282,368 UART: [fwproc] Recv command 0x46574c44
1,283,101 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,817 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,066 >>> mbox cmd response: failed
1,176,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,072 >>> mbox cmd response: failed
1,176,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,525 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,861 >>> mbox cmd response: failed
1,199,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,867 >>> mbox cmd response: failed
1,199,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,811 UART: [kat] SHA2-256
881,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,857 UART: [kat] ++
886,009 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
895,018 UART: [kat] SHA2-512-ACC
896,919 UART: [kat] ECC-384
902,302 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,475,841 UART: [cold-reset] ++
1,476,219 UART: [fht] Storing FHT @ 0x50003400
1,478,962 UART: [idev] ++
1,479,130 UART: [idev] CDI.KEYID = 6
1,479,490 UART: [idev] SUBJECT.KEYID = 7
1,479,914 UART: [idev] UDS.KEYID = 0
1,480,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,044 UART: [idev] Erasing UDS.KEYID = 0
1,504,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,566 UART: [idev] --
1,513,555 UART: [ldev] ++
1,513,723 UART: [ldev] CDI.KEYID = 6
1,514,086 UART: [ldev] SUBJECT.KEYID = 5
1,514,512 UART: [ldev] AUTHORITY.KEYID = 7
1,514,975 UART: [ldev] FE.KEYID = 1
1,520,559 UART: [ldev] Erasing FE.KEYID = 1
1,545,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,642 UART: [ldev] --
1,585,133 UART: [fwproc] Waiting for Commands...
1,585,904 UART: [fwproc] Received command 0x46574c44
1,586,695 UART: [fwproc] Received Image of size 114332 bytes
2,884,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,408 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,760 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,509 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,489 >>> mbox cmd response: failed
1,198,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,495 >>> mbox cmd response: failed
1,198,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,508 >>> mbox cmd response: failed
1,200,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,514 >>> mbox cmd response: failed
1,200,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,777 UART: [kat] SHA2-512-ACC
897,678 UART: [kat] ECC-384
903,477 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,213 UART: [idev] ++
1,480,381 UART: [idev] CDI.KEYID = 6
1,480,741 UART: [idev] SUBJECT.KEYID = 7
1,481,165 UART: [idev] UDS.KEYID = 0
1,481,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,211 UART: [idev] Erasing UDS.KEYID = 0
1,506,085 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,709 UART: [idev] --
1,515,706 UART: [ldev] ++
1,515,874 UART: [ldev] CDI.KEYID = 6
1,516,237 UART: [ldev] SUBJECT.KEYID = 5
1,516,663 UART: [ldev] AUTHORITY.KEYID = 7
1,517,126 UART: [ldev] FE.KEYID = 1
1,522,476 UART: [ldev] Erasing FE.KEYID = 1
1,548,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,163 UART: [ldev] --
1,587,438 UART: [fwproc] Waiting for Commands...
1,588,119 UART: [fwproc] Received command 0x46574c44
1,588,910 UART: [fwproc] Received Image of size 114332 bytes
2,886,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,388 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,764 >>> mbox cmd response: failed
1,199,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,770 >>> mbox cmd response: failed
1,199,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,262 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,286 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,907 >>> mbox cmd response: failed
1,198,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,913 >>> mbox cmd response: failed
1,198,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,842 UART: [idev] ++
1,175,010 UART: [idev] CDI.KEYID = 6
1,175,370 UART: [idev] SUBJECT.KEYID = 7
1,175,794 UART: [idev] UDS.KEYID = 0
1,176,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,968 UART: [idev] Erasing UDS.KEYID = 0
1,201,075 UART: [idev] Sha1 KeyId Algorithm
1,209,387 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,916 UART: [ldev] SUBJECT.KEYID = 5
1,211,342 UART: [ldev] AUTHORITY.KEYID = 7
1,211,805 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,866 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,254 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,180 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,547 >>> mbox cmd response: failed
1,198,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,553 >>> mbox cmd response: failed
1,198,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,733 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,446 >>> mbox cmd response: failed
1,200,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,452 >>> mbox cmd response: failed
1,200,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,119 UART: [kat] LMS
1,171,447 UART: [kat] --
1,172,294 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,949 UART: [idev] Erasing UDS.KEYID = 0
1,200,906 UART: [idev] Sha1 KeyId Algorithm
1,209,236 UART: [idev] --
1,210,212 UART: [ldev] ++
1,210,380 UART: [ldev] CDI.KEYID = 6
1,210,743 UART: [ldev] SUBJECT.KEYID = 5
1,211,169 UART: [ldev] AUTHORITY.KEYID = 7
1,211,632 UART: [ldev] FE.KEYID = 1
1,217,032 UART: [ldev] Erasing FE.KEYID = 1
1,243,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,776 UART: [ldev] --
1,283,195 UART: [fwproc] Wait for Commands...
1,283,775 UART: [fwproc] Recv command 0x46574c44
1,284,503 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,321 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,604 >>> mbox cmd response: failed
1,200,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,610 >>> mbox cmd response: failed
1,200,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,998 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,389 >>> mbox cmd response: failed
1,198,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,395 >>> mbox cmd response: failed
1,198,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,634 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,239 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,609 UART: [idev] ++
1,172,777 UART: [idev] CDI.KEYID = 6
1,173,138 UART: [idev] SUBJECT.KEYID = 7
1,173,563 UART: [idev] UDS.KEYID = 0
1,173,909 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,168 UART: [ldev] --
1,280,598 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,046 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,597 >>> mbox cmd response: failed
1,199,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,603 >>> mbox cmd response: failed
1,199,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,764 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,854 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,268 >>> mbox cmd response: failed
1,200,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,274 >>> mbox cmd response: failed
1,200,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,058 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,451 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,284 >>> mbox cmd response: failed
1,199,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,290 >>> mbox cmd response: failed
1,199,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,219 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
907,068 UART: [kat] LMS
1,475,264 UART: [kat] --
1,475,787 UART: [cold-reset] ++
1,476,317 UART: [fht] Storing FHT @ 0x50003400
1,479,178 UART: [idev] ++
1,479,346 UART: [idev] CDI.KEYID = 6
1,479,706 UART: [idev] SUBJECT.KEYID = 7
1,480,130 UART: [idev] UDS.KEYID = 0
1,480,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,598 UART: [idev] --
1,513,627 UART: [ldev] ++
1,513,795 UART: [ldev] CDI.KEYID = 6
1,514,158 UART: [ldev] SUBJECT.KEYID = 5
1,514,584 UART: [ldev] AUTHORITY.KEYID = 7
1,515,047 UART: [ldev] FE.KEYID = 1
1,520,129 UART: [ldev] Erasing FE.KEYID = 1
1,545,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,104 UART: [ldev] --
1,584,367 UART: [fwproc] Waiting for Commands...
1,585,012 UART: [fwproc] Received command 0x46574c44
1,585,803 UART: [fwproc] Received Image of size 114332 bytes
3,863,946 UART: ROM Fatal Error: 0x000B0038
3,865,103 >>> mbox cmd response: failed
3,865,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,109 >>> mbox cmd response: failed
3,865,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,929 UART: [kat] SHA2-256
881,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,975 UART: [kat] ++
886,127 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,262 UART: [kat] HMAC-384Kdf
906,742 UART: [kat] LMS
1,474,938 UART: [kat] --
1,475,769 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,478,844 UART: [idev] ++
1,479,012 UART: [idev] CDI.KEYID = 6
1,479,372 UART: [idev] SUBJECT.KEYID = 7
1,479,796 UART: [idev] UDS.KEYID = 0
1,480,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,620 UART: [idev] --
1,514,625 UART: [ldev] ++
1,514,793 UART: [ldev] CDI.KEYID = 6
1,515,156 UART: [ldev] SUBJECT.KEYID = 5
1,515,582 UART: [ldev] AUTHORITY.KEYID = 7
1,516,045 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,546,780 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,928 UART: [ldev] --
1,586,261 UART: [fwproc] Waiting for Commands...
1,586,988 UART: [fwproc] Received command 0x46574c44
1,587,779 UART: [fwproc] Received Image of size 114332 bytes
2,886,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,574 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,663 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,604,445 >>> mbox cmd response: failed
3,604,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,604,451 >>> mbox cmd response: failed
3,604,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,604,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,909 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,877 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
895,021 UART: [kat] SHA2-512-ACC
896,922 UART: [kat] ECC-384
902,545 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,764 UART: [fht] Storing FHT @ 0x50003400
1,479,495 UART: [idev] ++
1,479,663 UART: [idev] CDI.KEYID = 6
1,480,023 UART: [idev] SUBJECT.KEYID = 7
1,480,447 UART: [idev] UDS.KEYID = 0
1,480,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,571 UART: [idev] --
1,514,656 UART: [ldev] ++
1,514,824 UART: [ldev] CDI.KEYID = 6
1,515,187 UART: [ldev] SUBJECT.KEYID = 5
1,515,613 UART: [ldev] AUTHORITY.KEYID = 7
1,516,076 UART: [ldev] FE.KEYID = 1
1,521,416 UART: [ldev] Erasing FE.KEYID = 1
1,546,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,753 UART: [ldev] --
1,586,038 UART: [fwproc] Waiting for Commands...
1,586,779 UART: [fwproc] Received command 0x46574c44
1,587,570 UART: [fwproc] Received Image of size 114332 bytes
4,015,929 UART: ROM Fatal Error: 0x000B0038
4,017,086 >>> mbox cmd response: failed
4,017,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,017,092 >>> mbox cmd response: failed
4,017,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,017,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,906 UART: [kat] SHA2-256
892,844 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,573 UART: [kat] LMS
1,475,769 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,104 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,522,164 UART: [ldev] Erasing FE.KEYID = 1
1,548,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,739 UART: [ldev] --
1,587,136 UART: [fwproc] Waiting for Commands...
1,587,765 UART: [fwproc] Received command 0x46574c44
1,588,556 UART: [fwproc] Received Image of size 114332 bytes
2,886,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,475 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,827 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,740 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,871,535 >>> mbox cmd response: failed
3,871,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,871,541 >>> mbox cmd response: failed
3,871,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,871,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,474 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,710 UART: [kat] SHA2-512-ACC
908,611 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,171,933 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,917 UART: [idev] --
1,210,971 UART: [ldev] ++
1,211,139 UART: [ldev] CDI.KEYID = 6
1,211,502 UART: [ldev] SUBJECT.KEYID = 5
1,211,928 UART: [ldev] AUTHORITY.KEYID = 7
1,212,391 UART: [ldev] FE.KEYID = 1
1,217,323 UART: [ldev] Erasing FE.KEYID = 1
1,244,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,056 UART: [fwproc] Wait for Commands...
1,283,734 UART: [fwproc] Recv command 0x46574c44
1,284,462 UART: [fwproc] Recv'd Img size: 114332 bytes
1,873,017 UART: ROM Fatal Error: 0x000B0038
1,874,174 >>> mbox cmd response: failed
1,874,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,874,180 >>> mbox cmd response: failed
1,874,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,874,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,646 UART: [kat] HMAC-384Kdf
923,186 UART: [kat] LMS
1,171,514 UART: [kat] --
1,172,355 UART: [cold-reset] ++
1,172,883 UART: [fht] FHT @ 0x50003400
1,175,536 UART: [idev] ++
1,175,704 UART: [idev] CDI.KEYID = 6
1,176,064 UART: [idev] SUBJECT.KEYID = 7
1,176,488 UART: [idev] UDS.KEYID = 0
1,176,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,648 UART: [idev] Erasing UDS.KEYID = 0
1,201,217 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,661 UART: [ldev] ++
1,210,829 UART: [ldev] CDI.KEYID = 6
1,211,192 UART: [ldev] SUBJECT.KEYID = 5
1,211,618 UART: [ldev] AUTHORITY.KEYID = 7
1,212,081 UART: [ldev] FE.KEYID = 1
1,217,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,805 UART: [ldev] --
1,283,316 UART: [fwproc] Wait for Commands...
1,283,962 UART: [fwproc] Recv command 0x46574c44
1,284,690 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,054 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,722,885 >>> mbox cmd response: failed
1,722,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,891 >>> mbox cmd response: failed
1,722,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,821 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,045 UART: [state] LifecycleState = Unprovisioned
86,700 UART: [state] DebugLocked = No
87,292 UART: [state] WD Timer not started. Device not locked for debugging
88,507 UART: [kat] SHA2-256
894,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,282 UART: [kat] ++
898,434 UART: [kat] sha1
902,754 UART: [kat] SHA2-256
904,694 UART: [kat] SHA2-384
907,379 UART: [kat] SHA2-512-ACC
909,280 UART: [kat] ECC-384
919,003 UART: [kat] HMAC-384Kdf
923,735 UART: [kat] LMS
1,172,063 UART: [kat] --
1,172,896 UART: [cold-reset] ++
1,173,356 UART: [fht] FHT @ 0x50003400
1,176,139 UART: [idev] ++
1,176,307 UART: [idev] CDI.KEYID = 6
1,176,667 UART: [idev] SUBJECT.KEYID = 7
1,177,091 UART: [idev] UDS.KEYID = 0
1,177,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,639 UART: [idev] Erasing UDS.KEYID = 0
1,203,114 UART: [idev] Sha1 KeyId Algorithm
1,211,628 UART: [idev] --
1,212,752 UART: [ldev] ++
1,212,920 UART: [ldev] CDI.KEYID = 6
1,213,283 UART: [ldev] SUBJECT.KEYID = 5
1,213,709 UART: [ldev] AUTHORITY.KEYID = 7
1,214,172 UART: [ldev] FE.KEYID = 1
1,219,614 UART: [ldev] Erasing FE.KEYID = 1
1,245,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,484 UART: [ldev] --
1,284,857 UART: [fwproc] Wait for Commands...
1,285,595 UART: [fwproc] Recv command 0x46574c44
1,286,323 UART: [fwproc] Recv'd Img size: 114332 bytes
1,883,085 UART: ROM Fatal Error: 0x000B0038
1,884,242 >>> mbox cmd response: failed
1,884,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,884,248 >>> mbox cmd response: failed
1,884,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,884,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,103 UART: [state] LifecycleState = Unprovisioned
86,758 UART: [state] DebugLocked = No
87,258 UART: [state] WD Timer not started. Device not locked for debugging
88,533 UART: [kat] SHA2-256
894,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,308 UART: [kat] ++
898,460 UART: [kat] sha1
902,474 UART: [kat] SHA2-256
904,414 UART: [kat] SHA2-384
907,105 UART: [kat] SHA2-512-ACC
909,006 UART: [kat] ECC-384
918,637 UART: [kat] HMAC-384Kdf
923,119 UART: [kat] LMS
1,171,447 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,259 UART: [idev] ++
1,175,427 UART: [idev] CDI.KEYID = 6
1,175,787 UART: [idev] SUBJECT.KEYID = 7
1,176,211 UART: [idev] UDS.KEYID = 0
1,176,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,299 UART: [idev] Erasing UDS.KEYID = 0
1,201,654 UART: [idev] Sha1 KeyId Algorithm
1,210,144 UART: [idev] --
1,211,190 UART: [ldev] ++
1,211,358 UART: [ldev] CDI.KEYID = 6
1,211,721 UART: [ldev] SUBJECT.KEYID = 5
1,212,147 UART: [ldev] AUTHORITY.KEYID = 7
1,212,610 UART: [ldev] FE.KEYID = 1
1,217,472 UART: [ldev] Erasing FE.KEYID = 1
1,243,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,368 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,261 UART: [fwproc] Recv command 0x46574c44
1,283,989 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,879 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,732,832 >>> mbox cmd response: failed
1,732,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,838 >>> mbox cmd response: failed
1,732,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,818 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,771 UART: [idev] ++
1,172,939 UART: [idev] CDI.KEYID = 6
1,173,300 UART: [idev] SUBJECT.KEYID = 7
1,173,725 UART: [idev] UDS.KEYID = 0
1,174,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,569 UART: [idev] Erasing UDS.KEYID = 0
1,198,283 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,370 UART: [ldev] ++
1,208,538 UART: [ldev] CDI.KEYID = 6
1,208,902 UART: [ldev] SUBJECT.KEYID = 5
1,209,329 UART: [ldev] AUTHORITY.KEYID = 7
1,209,792 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,112 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,191 UART: [fwproc] Recv command 0x46574c44
1,281,924 UART: [fwproc] Recv'd Img size: 114332 bytes
1,858,000 UART: ROM Fatal Error: 0x000B0038
1,859,157 >>> mbox cmd response: failed
1,859,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,859,163 >>> mbox cmd response: failed
1,859,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,859,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,174,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,624 UART: [ldev] ++
1,209,792 UART: [ldev] CDI.KEYID = 6
1,210,156 UART: [ldev] SUBJECT.KEYID = 5
1,210,583 UART: [ldev] AUTHORITY.KEYID = 7
1,211,046 UART: [ldev] FE.KEYID = 1
1,216,190 UART: [ldev] Erasing FE.KEYID = 1
1,242,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,149 UART: [fwproc] Recv command 0x46574c44
1,282,882 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,338 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,713,927 >>> mbox cmd response: failed
1,713,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,713,933 >>> mbox cmd response: failed
1,713,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,713,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,435 UART: [kat] LMS
1,169,747 UART: [kat] --
1,170,660 UART: [cold-reset] ++
1,171,106 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,174,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,688 UART: [idev] Erasing UDS.KEYID = 0
1,199,836 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,103 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,931 UART: [fwproc] Recv'd Img size: 114332 bytes
1,869,909 UART: ROM Fatal Error: 0x000B0038
1,871,066 >>> mbox cmd response: failed
1,871,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,871,072 >>> mbox cmd response: failed
1,871,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,871,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,743 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,976 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,174,896 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,708 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,411 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,955 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,875 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,722,005 >>> mbox cmd response: failed
1,722,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,011 >>> mbox cmd response: failed
1,722,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,955 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,483 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,471,881 >>> mbox cmd response: failed
1,471,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,887 >>> mbox cmd response: failed
1,471,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,813 UART: [kat] SHA2-256
881,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,859 UART: [kat] ++
886,011 UART: [kat] sha1
890,295 UART: [kat] SHA2-256
892,233 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,174 UART: [kat] HMAC-384Kdf
906,836 UART: [kat] LMS
1,475,032 UART: [kat] --
1,475,715 UART: [cold-reset] ++
1,476,129 UART: [fht] Storing FHT @ 0x50003400
1,478,856 UART: [idev] ++
1,479,024 UART: [idev] CDI.KEYID = 6
1,479,384 UART: [idev] SUBJECT.KEYID = 7
1,479,808 UART: [idev] UDS.KEYID = 0
1,480,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,960 UART: [idev] --
1,513,937 UART: [ldev] ++
1,514,105 UART: [ldev] CDI.KEYID = 6
1,514,468 UART: [ldev] SUBJECT.KEYID = 5
1,514,894 UART: [ldev] AUTHORITY.KEYID = 7
1,515,357 UART: [ldev] FE.KEYID = 1
1,520,527 UART: [ldev] Erasing FE.KEYID = 1
1,546,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,356 UART: [ldev] --
1,585,733 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114332 bytes
2,885,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,314 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,601 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,472,596 >>> mbox cmd response: failed
1,472,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,602 >>> mbox cmd response: failed
1,472,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,717 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,472,460 >>> mbox cmd response: failed
1,472,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,466 >>> mbox cmd response: failed
1,472,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
903,349 UART: [kat] HMAC-384Kdf
908,055 UART: [kat] LMS
1,476,251 UART: [kat] --
1,477,342 UART: [cold-reset] ++
1,477,676 UART: [fht] Storing FHT @ 0x50003400
1,480,285 UART: [idev] ++
1,480,453 UART: [idev] CDI.KEYID = 6
1,480,813 UART: [idev] SUBJECT.KEYID = 7
1,481,237 UART: [idev] UDS.KEYID = 0
1,481,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,506,781 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,555 UART: [idev] --
1,516,792 UART: [ldev] ++
1,516,960 UART: [ldev] CDI.KEYID = 6
1,517,323 UART: [ldev] SUBJECT.KEYID = 5
1,517,749 UART: [ldev] AUTHORITY.KEYID = 7
1,518,212 UART: [ldev] FE.KEYID = 1
1,523,718 UART: [ldev] Erasing FE.KEYID = 1
1,549,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,569,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,575,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,588,067 UART: [ldev] --
1,589,372 UART: [fwproc] Waiting for Commands...
1,590,109 UART: [fwproc] Received command 0x46574c44
1,590,900 UART: [fwproc] Received Image of size 114332 bytes
2,889,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,005 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,082,302 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,467,094 >>> mbox cmd response: failed
1,467,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,100 >>> mbox cmd response: failed
1,467,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,390 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,731 >>> mbox cmd response: failed
1,476,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,737 >>> mbox cmd response: failed
1,476,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,172 UART: [kat] HMAC-384Kdf
922,764 UART: [kat] LMS
1,171,092 UART: [kat] --
1,171,693 UART: [cold-reset] ++
1,172,221 UART: [fht] FHT @ 0x50003400
1,174,890 UART: [idev] ++
1,175,058 UART: [idev] CDI.KEYID = 6
1,175,418 UART: [idev] SUBJECT.KEYID = 7
1,175,842 UART: [idev] UDS.KEYID = 0
1,176,187 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,501 UART: [idev] --
1,210,737 UART: [ldev] ++
1,210,905 UART: [ldev] CDI.KEYID = 6
1,211,268 UART: [ldev] SUBJECT.KEYID = 5
1,211,694 UART: [ldev] AUTHORITY.KEYID = 7
1,212,157 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,551 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,566 UART: [fwproc] Recv command 0x46574c44
1,284,294 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,793 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,602 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,470,263 >>> mbox cmd response: failed
1,470,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,269 >>> mbox cmd response: failed
1,470,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,431 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,472,661 >>> mbox cmd response: failed
1,472,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,667 >>> mbox cmd response: failed
1,472,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,495 UART: [kat] SHA2-512-ACC
908,396 UART: [kat] ECC-384
918,439 UART: [kat] HMAC-384Kdf
922,891 UART: [kat] LMS
1,171,219 UART: [kat] --
1,172,194 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,685 UART: [idev] Erasing UDS.KEYID = 0
1,201,580 UART: [idev] Sha1 KeyId Algorithm
1,209,988 UART: [idev] --
1,211,142 UART: [ldev] ++
1,211,310 UART: [ldev] CDI.KEYID = 6
1,211,673 UART: [ldev] SUBJECT.KEYID = 5
1,212,099 UART: [ldev] AUTHORITY.KEYID = 7
1,212,562 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,510 UART: [ldev] --
1,283,797 UART: [fwproc] Wait for Commands...
1,284,535 UART: [fwproc] Recv command 0x46574c44
1,285,263 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,143 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,758 >>> mbox cmd response: failed
1,465,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,764 >>> mbox cmd response: failed
1,465,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,000 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,762 >>> mbox cmd response: failed
1,477,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,768 >>> mbox cmd response: failed
1,477,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,311 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,173,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,567 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,694 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,040 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,481,311 >>> mbox cmd response: failed
1,481,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,317 >>> mbox cmd response: failed
1,481,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,246 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,911 >>> mbox cmd response: failed
1,475,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,917 >>> mbox cmd response: failed
1,475,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,174,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,103 UART: [ldev] --
1,280,369 UART: [fwproc] Wait for Commands...
1,281,086 UART: [fwproc] Recv command 0x46574c44
1,281,819 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,677 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,926 >>> mbox cmd response: failed
1,476,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,932 >>> mbox cmd response: failed
1,476,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,121 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,382 >>> mbox cmd response: failed
1,179,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,388 >>> mbox cmd response: failed
1,179,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,195 UART: [kat] SHA2-256
882,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,241 UART: [kat] ++
886,393 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,477,149 UART: [fht] Storing FHT @ 0x50003400
1,480,096 UART: [idev] ++
1,480,264 UART: [idev] CDI.KEYID = 6
1,480,624 UART: [idev] SUBJECT.KEYID = 7
1,481,048 UART: [idev] UDS.KEYID = 0
1,481,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,994 UART: [idev] Erasing UDS.KEYID = 0
1,505,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,646 UART: [idev] --
1,515,649 UART: [ldev] ++
1,515,817 UART: [ldev] CDI.KEYID = 6
1,516,180 UART: [ldev] SUBJECT.KEYID = 5
1,516,606 UART: [ldev] AUTHORITY.KEYID = 7
1,517,069 UART: [ldev] FE.KEYID = 1
1,522,153 UART: [ldev] Erasing FE.KEYID = 1
1,547,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,810 UART: [ldev] --
1,587,261 UART: [fwproc] Waiting for Commands...
1,587,972 UART: [fwproc] Received command 0x46574c44
1,588,763 UART: [fwproc] Received Image of size 114332 bytes
2,886,046 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,222 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,361 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,196 >>> mbox cmd response: failed
1,180,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,202 >>> mbox cmd response: failed
1,180,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,079 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,087 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,194 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,821 >>> mbox cmd response: failed
1,179,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,827 >>> mbox cmd response: failed
1,179,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,666 UART: [kat] SHA2-256
881,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,712 UART: [kat] ++
885,864 UART: [kat] sha1
890,230 UART: [kat] SHA2-256
892,168 UART: [kat] SHA2-384
894,963 UART: [kat] SHA2-512-ACC
896,864 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,263 UART: [kat] LMS
1,475,459 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,757 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,083 UART: [idev] --
1,514,972 UART: [ldev] ++
1,515,140 UART: [ldev] CDI.KEYID = 6
1,515,503 UART: [ldev] SUBJECT.KEYID = 5
1,515,929 UART: [ldev] AUTHORITY.KEYID = 7
1,516,392 UART: [ldev] FE.KEYID = 1
1,521,596 UART: [ldev] Erasing FE.KEYID = 1
1,546,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,526 UART: [fwproc] Waiting for Commands...
1,587,267 UART: [fwproc] Received command 0x46574c44
1,588,058 UART: [fwproc] Received Image of size 114332 bytes
2,885,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,820 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,417 >>> mbox cmd response: failed
1,180,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,423 >>> mbox cmd response: failed
1,180,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,208 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,880 >>> mbox cmd response: failed
1,177,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,886 >>> mbox cmd response: failed
1,177,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
892,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,949 UART: [kat] ++
897,101 UART: [kat] sha1
901,321 UART: [kat] SHA2-256
903,261 UART: [kat] SHA2-384
906,086 UART: [kat] SHA2-512-ACC
907,987 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,258 UART: [kat] LMS
1,170,586 UART: [kat] --
1,171,425 UART: [cold-reset] ++
1,171,773 UART: [fht] FHT @ 0x50003400
1,174,584 UART: [idev] ++
1,174,752 UART: [idev] CDI.KEYID = 6
1,175,112 UART: [idev] SUBJECT.KEYID = 7
1,175,536 UART: [idev] UDS.KEYID = 0
1,175,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,873 UART: [idev] Sha1 KeyId Algorithm
1,209,341 UART: [idev] --
1,210,519 UART: [ldev] ++
1,210,687 UART: [ldev] CDI.KEYID = 6
1,211,050 UART: [ldev] SUBJECT.KEYID = 5
1,211,476 UART: [ldev] AUTHORITY.KEYID = 7
1,211,939 UART: [ldev] FE.KEYID = 1
1,217,077 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,118 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,618 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,070 >>> mbox cmd response: failed
1,179,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,076 >>> mbox cmd response: failed
1,179,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,531 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,661 >>> mbox cmd response: failed
1,179,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,667 >>> mbox cmd response: failed
1,179,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,773 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,558 UART: [cold-reset] ++
1,173,020 UART: [fht] FHT @ 0x50003400
1,175,579 UART: [idev] ++
1,175,747 UART: [idev] CDI.KEYID = 6
1,176,107 UART: [idev] SUBJECT.KEYID = 7
1,176,531 UART: [idev] UDS.KEYID = 0
1,176,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,667 UART: [idev] Erasing UDS.KEYID = 0
1,202,018 UART: [idev] Sha1 KeyId Algorithm
1,210,534 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,217,986 UART: [ldev] Erasing FE.KEYID = 1
1,244,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,228 UART: [ldev] --
1,283,661 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46574c44
1,285,013 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,923 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,800 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,145 >>> mbox cmd response: failed
1,180,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,151 >>> mbox cmd response: failed
1,180,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,996 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,376 >>> mbox cmd response: failed
1,179,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,382 >>> mbox cmd response: failed
1,179,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,238 UART: [ldev] ++
1,209,406 UART: [ldev] CDI.KEYID = 6
1,209,770 UART: [ldev] SUBJECT.KEYID = 5
1,210,197 UART: [ldev] AUTHORITY.KEYID = 7
1,210,660 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,355 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,966 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,842 >>> mbox cmd response: failed
1,178,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,848 >>> mbox cmd response: failed
1,178,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,262 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,665 >>> mbox cmd response: failed
1,179,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,671 >>> mbox cmd response: failed
1,179,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,054 UART: [kat] ++
896,206 UART: [kat] sha1
900,528 UART: [kat] SHA2-256
902,468 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,043 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,991 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,747 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,657 >>> mbox cmd response: failed
1,180,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,663 >>> mbox cmd response: failed
1,180,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,839 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,741 UART: [kat] SHA2-256
881,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,787 UART: [kat] ++
885,939 UART: [kat] sha1
890,191 UART: [kat] SHA2-256
892,129 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,134 UART: [kat] LMS
1,475,330 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,753 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,504,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,521,249 UART: [ldev] Erasing FE.KEYID = 1
1,546,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,676 UART: [ldev] --
1,586,187 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 114332 bytes
1,611,536 UART: ROM Fatal Error: 0x000B0007
1,612,693 >>> mbox cmd response: failed
1,612,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,699 >>> mbox cmd response: failed
1,612,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,783 UART: [cold-reset] ++
1,476,197 UART: [fht] Storing FHT @ 0x50003400
1,478,872 UART: [idev] ++
1,479,040 UART: [idev] CDI.KEYID = 6
1,479,400 UART: [idev] SUBJECT.KEYID = 7
1,479,824 UART: [idev] UDS.KEYID = 0
1,480,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,650 UART: [idev] Erasing UDS.KEYID = 0
1,504,510 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,074 UART: [idev] --
1,514,109 UART: [ldev] ++
1,514,277 UART: [ldev] CDI.KEYID = 6
1,514,640 UART: [ldev] SUBJECT.KEYID = 5
1,515,066 UART: [ldev] AUTHORITY.KEYID = 7
1,515,529 UART: [ldev] FE.KEYID = 1
1,520,565 UART: [ldev] Erasing FE.KEYID = 1
1,545,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,710 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,878 UART: [fwproc] Received command 0x46574c44
1,586,669 UART: [fwproc] Received Image of size 114332 bytes
2,883,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,161 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,480 >>> mbox cmd response: failed
1,465,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,486 >>> mbox cmd response: failed
1,465,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,811 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,331 UART: [kat] HMAC-384Kdf
907,009 UART: [kat] LMS
1,475,205 UART: [kat] --
1,476,278 UART: [cold-reset] ++
1,476,676 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,675 UART: [idev] Erasing UDS.KEYID = 0
1,505,275 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,069 UART: [idev] --
1,515,240 UART: [ldev] ++
1,515,408 UART: [ldev] CDI.KEYID = 6
1,515,771 UART: [ldev] SUBJECT.KEYID = 5
1,516,197 UART: [ldev] AUTHORITY.KEYID = 7
1,516,660 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,546,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,443 UART: [ldev] --
1,585,732 UART: [fwproc] Waiting for Commands...
1,586,599 UART: [fwproc] Received command 0x46574c44
1,587,390 UART: [fwproc] Received Image of size 114332 bytes
1,611,211 UART: ROM Fatal Error: 0x000B0007
1,612,368 >>> mbox cmd response: failed
1,612,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,374 >>> mbox cmd response: failed
1,612,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,998 UART: [kat] SHA2-256
881,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,044 UART: [kat] ++
886,196 UART: [kat] sha1
890,260 UART: [kat] SHA2-256
892,198 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,879 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,945 UART: [idev] ++
1,480,113 UART: [idev] CDI.KEYID = 6
1,480,473 UART: [idev] SUBJECT.KEYID = 7
1,480,897 UART: [idev] UDS.KEYID = 0
1,481,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,153 UART: [idev] Erasing UDS.KEYID = 0
1,505,765 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,467 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,547,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,587,014 UART: [fwproc] Waiting for Commands...
1,587,753 UART: [fwproc] Received command 0x46574c44
1,588,544 UART: [fwproc] Received Image of size 114332 bytes
2,884,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,433 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,726 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,323 >>> mbox cmd response: failed
1,465,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,329 >>> mbox cmd response: failed
1,465,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,954 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
901,941 UART: [kat] SHA2-256
903,881 UART: [kat] SHA2-384
906,836 UART: [kat] SHA2-512-ACC
908,737 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,397 UART: [fht] FHT @ 0x50003400
1,175,236 UART: [idev] ++
1,175,404 UART: [idev] CDI.KEYID = 6
1,175,764 UART: [idev] SUBJECT.KEYID = 7
1,176,188 UART: [idev] UDS.KEYID = 0
1,176,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,659 UART: [idev] Sha1 KeyId Algorithm
1,209,035 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,428 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,099 UART: ROM Fatal Error: 0x000B0007
1,308,256 >>> mbox cmd response: failed
1,308,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,262 >>> mbox cmd response: failed
1,308,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,244 UART: [kat] SHA2-256
892,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,019 UART: [kat] ++
897,171 UART: [kat] sha1
901,283 UART: [kat] SHA2-256
903,223 UART: [kat] SHA2-384
906,052 UART: [kat] SHA2-512-ACC
907,953 UART: [kat] ECC-384
917,328 UART: [kat] HMAC-384Kdf
921,934 UART: [kat] LMS
1,170,262 UART: [kat] --
1,171,365 UART: [cold-reset] ++
1,171,753 UART: [fht] FHT @ 0x50003400
1,174,454 UART: [idev] ++
1,174,622 UART: [idev] CDI.KEYID = 6
1,174,982 UART: [idev] SUBJECT.KEYID = 7
1,175,406 UART: [idev] UDS.KEYID = 0
1,175,751 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,883 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,128 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,900 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,758 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,483 >>> mbox cmd response: failed
1,163,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,489 >>> mbox cmd response: failed
1,163,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,187 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,690 UART: [kat] SHA2-256
903,630 UART: [kat] SHA2-384
906,563 UART: [kat] SHA2-512-ACC
908,464 UART: [kat] ECC-384
917,915 UART: [kat] HMAC-384Kdf
922,563 UART: [kat] LMS
1,170,891 UART: [kat] --
1,171,672 UART: [cold-reset] ++
1,172,086 UART: [fht] FHT @ 0x50003400
1,174,807 UART: [idev] ++
1,174,975 UART: [idev] CDI.KEYID = 6
1,175,335 UART: [idev] SUBJECT.KEYID = 7
1,175,759 UART: [idev] UDS.KEYID = 0
1,176,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,025 UART: [idev] Erasing UDS.KEYID = 0
1,200,902 UART: [idev] Sha1 KeyId Algorithm
1,209,348 UART: [idev] --
1,210,290 UART: [ldev] ++
1,210,458 UART: [ldev] CDI.KEYID = 6
1,210,821 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,216,832 UART: [ldev] Erasing FE.KEYID = 1
1,243,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,536 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,561 UART: [fwproc] Recv command 0x46574c44
1,284,289 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,478 UART: ROM Fatal Error: 0x000B0007
1,309,635 >>> mbox cmd response: failed
1,309,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,641 >>> mbox cmd response: failed
1,309,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,574 UART: [kat] SHA2-256
903,514 UART: [kat] SHA2-384
906,253 UART: [kat] SHA2-512-ACC
908,154 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,208 UART: [cold-reset] ++
1,172,542 UART: [fht] FHT @ 0x50003400
1,175,157 UART: [idev] ++
1,175,325 UART: [idev] CDI.KEYID = 6
1,175,685 UART: [idev] SUBJECT.KEYID = 7
1,176,109 UART: [idev] UDS.KEYID = 0
1,176,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,237 UART: [idev] Erasing UDS.KEYID = 0
1,201,436 UART: [idev] Sha1 KeyId Algorithm
1,209,894 UART: [idev] --
1,211,036 UART: [ldev] ++
1,211,204 UART: [ldev] CDI.KEYID = 6
1,211,567 UART: [ldev] SUBJECT.KEYID = 5
1,211,993 UART: [ldev] AUTHORITY.KEYID = 7
1,212,456 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,440 UART: [ldev] --
1,283,805 UART: [fwproc] Wait for Commands...
1,284,393 UART: [fwproc] Recv command 0x46574c44
1,285,121 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,919 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,736 >>> mbox cmd response: failed
1,164,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,742 >>> mbox cmd response: failed
1,164,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,610 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,266 UART: [kat] SHA2-256
891,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,397 UART: [kat] SHA2-256
902,337 UART: [kat] SHA2-384
904,984 UART: [kat] SHA2-512-ACC
906,885 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,174,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,214,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,762 UART: [fwproc] Wait for Commands...
1,281,333 UART: [fwproc] Recv command 0x46574c44
1,282,066 UART: [fwproc] Recv'd Img size: 114332 bytes
1,305,769 UART: ROM Fatal Error: 0x000B0007
1,306,926 >>> mbox cmd response: failed
1,306,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,932 >>> mbox cmd response: failed
1,306,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,339 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,256 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,431 UART: [fwproc] Recv command 0x46574c44
1,282,164 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,360 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,299 >>> mbox cmd response: failed
1,159,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,305 >>> mbox cmd response: failed
1,159,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,506 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,168 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,344 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,174,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,198,806 UART: [idev] Sha1 KeyId Algorithm
1,207,666 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,282,042 UART: [fwproc] Recv command 0x46574c44
1,282,775 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,424 UART: ROM Fatal Error: 0x000B0007
1,307,581 >>> mbox cmd response: failed
1,307,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,587 >>> mbox cmd response: failed
1,307,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,077 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x46574c44
1,282,933 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,442 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,320 >>> mbox cmd response: failed
1,159,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,326 >>> mbox cmd response: failed
1,159,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,853 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,823 >>> mbox cmd response: failed
1,426,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,829 >>> mbox cmd response: failed
1,426,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,557 UART: [kat] SHA2-256
881,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,603 UART: [kat] ++
885,755 UART: [kat] sha1
890,117 UART: [kat] SHA2-256
892,055 UART: [kat] SHA2-384
894,684 UART: [kat] SHA2-512-ACC
896,585 UART: [kat] ECC-384
902,214 UART: [kat] HMAC-384Kdf
906,768 UART: [kat] LMS
1,474,964 UART: [kat] --
1,475,885 UART: [cold-reset] ++
1,476,219 UART: [fht] Storing FHT @ 0x50003400
1,479,050 UART: [idev] ++
1,479,218 UART: [idev] CDI.KEYID = 6
1,479,578 UART: [idev] SUBJECT.KEYID = 7
1,480,002 UART: [idev] UDS.KEYID = 0
1,480,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,814 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,573 UART: [ldev] ++
1,514,741 UART: [ldev] CDI.KEYID = 6
1,515,104 UART: [ldev] SUBJECT.KEYID = 5
1,515,530 UART: [ldev] AUTHORITY.KEYID = 7
1,515,993 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,436 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,720 UART: [fwproc] Received command 0x46574c44
1,587,511 UART: [fwproc] Received Image of size 114332 bytes
2,885,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,595 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,065 >>> mbox cmd response: failed
1,428,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,071 >>> mbox cmd response: failed
1,428,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,163 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,906 >>> mbox cmd response: failed
1,429,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,912 >>> mbox cmd response: failed
1,429,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,402 UART: [kat] SHA2-256
892,340 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,524 UART: [fht] Storing FHT @ 0x50003400
1,480,465 UART: [idev] ++
1,480,633 UART: [idev] CDI.KEYID = 6
1,480,993 UART: [idev] SUBJECT.KEYID = 7
1,481,417 UART: [idev] UDS.KEYID = 0
1,481,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,543 UART: [idev] Erasing UDS.KEYID = 0
1,506,681 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,251 UART: [idev] --
1,516,238 UART: [ldev] ++
1,516,406 UART: [ldev] CDI.KEYID = 6
1,516,769 UART: [ldev] SUBJECT.KEYID = 5
1,517,195 UART: [ldev] AUTHORITY.KEYID = 7
1,517,658 UART: [ldev] FE.KEYID = 1
1,523,026 UART: [ldev] Erasing FE.KEYID = 1
1,548,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,217 UART: [ldev] --
1,588,580 UART: [fwproc] Waiting for Commands...
1,589,231 UART: [fwproc] Received command 0x46574c44
1,590,022 UART: [fwproc] Received Image of size 114332 bytes
2,887,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,710 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,430,176 >>> mbox cmd response: failed
1,430,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,182 >>> mbox cmd response: failed
1,430,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,884 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,249 >>> mbox cmd response: failed
1,427,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,255 >>> mbox cmd response: failed
1,427,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,216 UART: [kat] SHA2-512-ACC
908,117 UART: [kat] ECC-384
918,152 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,201 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,644 UART: [idev] ++
1,175,812 UART: [idev] CDI.KEYID = 6
1,176,172 UART: [idev] SUBJECT.KEYID = 7
1,176,596 UART: [idev] UDS.KEYID = 0
1,176,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,719 UART: [idev] Sha1 KeyId Algorithm
1,209,177 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,907 UART: [ldev] --
1,282,382 UART: [fwproc] Wait for Commands...
1,283,074 UART: [fwproc] Recv command 0x46574c44
1,283,802 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,596 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,425,883 >>> mbox cmd response: failed
1,425,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,889 >>> mbox cmd response: failed
1,425,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,303 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,068 >>> mbox cmd response: failed
1,429,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,074 >>> mbox cmd response: failed
1,429,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,405 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,608 UART: [cold-reset] ++
1,173,154 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,303 UART: [idev] Erasing UDS.KEYID = 0
1,201,298 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,722 UART: [ldev] ++
1,210,890 UART: [ldev] CDI.KEYID = 6
1,211,253 UART: [ldev] SUBJECT.KEYID = 5
1,211,679 UART: [ldev] AUTHORITY.KEYID = 7
1,212,142 UART: [ldev] FE.KEYID = 1
1,217,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,192 UART: [ldev] --
1,283,559 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,861 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,717 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,924 >>> mbox cmd response: failed
1,427,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,930 >>> mbox cmd response: failed
1,427,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,410 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,123 >>> mbox cmd response: failed
1,427,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,129 >>> mbox cmd response: failed
1,427,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,211 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,174,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,321 UART: [idev] --
1,209,240 UART: [ldev] ++
1,209,408 UART: [ldev] CDI.KEYID = 6
1,209,772 UART: [ldev] SUBJECT.KEYID = 5
1,210,199 UART: [ldev] AUTHORITY.KEYID = 7
1,210,662 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,242 UART: [ldev] --
1,281,650 UART: [fwproc] Wait for Commands...
1,282,411 UART: [fwproc] Recv command 0x46574c44
1,283,144 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,552 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,727 >>> mbox cmd response: failed
1,426,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,733 >>> mbox cmd response: failed
1,426,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,096 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,020 >>> mbox cmd response: failed
1,429,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,026 >>> mbox cmd response: failed
1,429,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,980 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,089 UART: [ldev] ++
1,209,257 UART: [ldev] CDI.KEYID = 6
1,209,621 UART: [ldev] SUBJECT.KEYID = 5
1,210,048 UART: [ldev] AUTHORITY.KEYID = 7
1,210,511 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,737 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,810 UART: [fwproc] Recv command 0x46574c44
1,282,543 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,557 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,486 >>> mbox cmd response: failed
1,429,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,492 >>> mbox cmd response: failed
1,429,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,907 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,022 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,845 UART: [cold-reset] ++
1,477,247 UART: [fht] Storing FHT @ 0x50003400
1,479,920 UART: [idev] ++
1,480,088 UART: [idev] CDI.KEYID = 6
1,480,448 UART: [idev] SUBJECT.KEYID = 7
1,480,872 UART: [idev] UDS.KEYID = 0
1,481,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,710 UART: [idev] --
1,514,703 UART: [ldev] ++
1,514,871 UART: [ldev] CDI.KEYID = 6
1,515,234 UART: [ldev] SUBJECT.KEYID = 5
1,515,660 UART: [ldev] AUTHORITY.KEYID = 7
1,516,123 UART: [ldev] FE.KEYID = 1
1,521,275 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,618 UART: [ldev] --
1,585,957 UART: [fwproc] Waiting for Commands...
1,586,694 UART: [fwproc] Received command 0x46574c44
1,587,485 UART: [fwproc] Received Image of size 114332 bytes
2,884,729 UART: ROM Fatal Error: 0x000B0016
2,885,886 >>> mbox cmd response: failed
2,885,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,892 >>> mbox cmd response: failed
2,885,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,990 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,477,013 UART: [fht] Storing FHT @ 0x50003400
1,479,818 UART: [idev] ++
1,479,986 UART: [idev] CDI.KEYID = 6
1,480,346 UART: [idev] SUBJECT.KEYID = 7
1,480,770 UART: [idev] UDS.KEYID = 0
1,481,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,250 UART: [idev] --
1,515,297 UART: [ldev] ++
1,515,465 UART: [ldev] CDI.KEYID = 6
1,515,828 UART: [ldev] SUBJECT.KEYID = 5
1,516,254 UART: [ldev] AUTHORITY.KEYID = 7
1,516,717 UART: [ldev] FE.KEYID = 1
1,522,267 UART: [ldev] Erasing FE.KEYID = 1
1,548,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,104 UART: [ldev] --
1,587,545 UART: [fwproc] Waiting for Commands...
1,588,372 UART: [fwproc] Received command 0x46574c44
1,589,163 UART: [fwproc] Received Image of size 114332 bytes
2,885,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,375 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,751 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,249 >>> mbox cmd response: failed
2,737,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,255 >>> mbox cmd response: failed
2,737,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,475 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,844 UART: [kat] SHA2-256
882,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,890 UART: [kat] ++
887,042 UART: [kat] sha1
891,116 UART: [kat] SHA2-256
893,054 UART: [kat] SHA2-384
895,929 UART: [kat] SHA2-512-ACC
897,830 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
908,123 UART: [kat] LMS
1,476,319 UART: [kat] --
1,476,956 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,117 UART: [idev] ++
1,480,285 UART: [idev] CDI.KEYID = 6
1,480,645 UART: [idev] SUBJECT.KEYID = 7
1,481,069 UART: [idev] UDS.KEYID = 0
1,481,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,109 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,777 UART: [idev] --
1,514,822 UART: [ldev] ++
1,514,990 UART: [ldev] CDI.KEYID = 6
1,515,353 UART: [ldev] SUBJECT.KEYID = 5
1,515,779 UART: [ldev] AUTHORITY.KEYID = 7
1,516,242 UART: [ldev] FE.KEYID = 1
1,521,644 UART: [ldev] Erasing FE.KEYID = 1
1,546,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,237 UART: [fwproc] Received command 0x46574c44
1,588,028 UART: [fwproc] Received Image of size 114332 bytes
2,884,144 UART: ROM Fatal Error: 0x000B0016
2,885,301 >>> mbox cmd response: failed
2,885,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,307 >>> mbox cmd response: failed
2,885,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,273 UART: [kat] SHA2-512-ACC
897,174 UART: [kat] ECC-384
902,517 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,054 UART: [cold-reset] ++
1,476,558 UART: [fht] Storing FHT @ 0x50003400
1,479,351 UART: [idev] ++
1,479,519 UART: [idev] CDI.KEYID = 6
1,479,879 UART: [idev] SUBJECT.KEYID = 7
1,480,303 UART: [idev] UDS.KEYID = 0
1,480,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,493 UART: [idev] Erasing UDS.KEYID = 0
1,504,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,485 UART: [idev] --
1,514,410 UART: [ldev] ++
1,514,578 UART: [ldev] CDI.KEYID = 6
1,514,941 UART: [ldev] SUBJECT.KEYID = 5
1,515,367 UART: [ldev] AUTHORITY.KEYID = 7
1,515,830 UART: [ldev] FE.KEYID = 1
1,520,996 UART: [ldev] Erasing FE.KEYID = 1
1,546,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,521 UART: [ldev] --
1,585,886 UART: [fwproc] Waiting for Commands...
1,586,609 UART: [fwproc] Received command 0x46574c44
1,587,400 UART: [fwproc] Received Image of size 114332 bytes
2,884,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,588 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,739,334 >>> mbox cmd response: failed
2,739,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,340 >>> mbox cmd response: failed
2,739,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,634 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,883 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,493 UART: [ldev] ++
1,210,661 UART: [ldev] CDI.KEYID = 6
1,211,024 UART: [ldev] SUBJECT.KEYID = 5
1,211,450 UART: [ldev] AUTHORITY.KEYID = 7
1,211,913 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,122 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,204 UART: ROM Fatal Error: 0x000B0016
2,581,361 >>> mbox cmd response: failed
2,581,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,367 >>> mbox cmd response: failed
2,581,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,204 UART: [kat] LMS
1,170,532 UART: [kat] --
1,171,525 UART: [cold-reset] ++
1,172,053 UART: [fht] FHT @ 0x50003400
1,174,552 UART: [idev] ++
1,174,720 UART: [idev] CDI.KEYID = 6
1,175,080 UART: [idev] SUBJECT.KEYID = 7
1,175,504 UART: [idev] UDS.KEYID = 0
1,175,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,630 UART: [idev] Erasing UDS.KEYID = 0
1,201,043 UART: [idev] Sha1 KeyId Algorithm
1,209,641 UART: [idev] --
1,210,537 UART: [ldev] ++
1,210,705 UART: [ldev] CDI.KEYID = 6
1,211,068 UART: [ldev] SUBJECT.KEYID = 5
1,211,494 UART: [ldev] AUTHORITY.KEYID = 7
1,211,957 UART: [ldev] FE.KEYID = 1
1,217,375 UART: [ldev] Erasing FE.KEYID = 1
1,243,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,473 UART: [ldev] --
1,282,926 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46574c44
1,284,268 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,676 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,378 >>> mbox cmd response: failed
2,435,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,384 >>> mbox cmd response: failed
2,435,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,665 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,871 UART: [state] LifecycleState = Unprovisioned
86,526 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
893,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,038 UART: [kat] ++
898,190 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,261 UART: [kat] SHA2-512-ACC
909,162 UART: [kat] ECC-384
918,943 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,173,018 UART: [cold-reset] ++
1,173,450 UART: [fht] FHT @ 0x50003400
1,176,051 UART: [idev] ++
1,176,219 UART: [idev] CDI.KEYID = 6
1,176,579 UART: [idev] SUBJECT.KEYID = 7
1,177,003 UART: [idev] UDS.KEYID = 0
1,177,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,971 UART: [idev] Erasing UDS.KEYID = 0
1,202,436 UART: [idev] Sha1 KeyId Algorithm
1,210,804 UART: [idev] --
1,211,872 UART: [ldev] ++
1,212,040 UART: [ldev] CDI.KEYID = 6
1,212,403 UART: [ldev] SUBJECT.KEYID = 5
1,212,829 UART: [ldev] AUTHORITY.KEYID = 7
1,213,292 UART: [ldev] FE.KEYID = 1
1,218,592 UART: [ldev] Erasing FE.KEYID = 1
1,244,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,162 UART: [ldev] --
1,284,613 UART: [fwproc] Wait for Commands...
1,285,227 UART: [fwproc] Recv command 0x46574c44
1,285,955 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,457 UART: ROM Fatal Error: 0x000B0016
2,583,614 >>> mbox cmd response: failed
2,583,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,620 >>> mbox cmd response: failed
2,583,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,731 UART: [kat] HMAC-384Kdf
923,285 UART: [kat] LMS
1,171,613 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,874 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,202,028 UART: [idev] Sha1 KeyId Algorithm
1,210,602 UART: [idev] --
1,211,634 UART: [ldev] ++
1,211,802 UART: [ldev] CDI.KEYID = 6
1,212,165 UART: [ldev] SUBJECT.KEYID = 5
1,212,591 UART: [ldev] AUTHORITY.KEYID = 7
1,213,054 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,245,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,310 UART: [ldev] --
1,284,777 UART: [fwproc] Wait for Commands...
1,285,515 UART: [fwproc] Recv command 0x46574c44
1,286,243 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,905 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,438,019 >>> mbox cmd response: failed
2,438,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,025 >>> mbox cmd response: failed
2,438,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,092 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,461 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,313 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,617 UART: [fwproc] Recv command 0x46574c44
1,282,350 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,016 UART: ROM Fatal Error: 0x000B0016
2,580,173 >>> mbox cmd response: failed
2,580,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,179 >>> mbox cmd response: failed
2,580,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,283 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,698 UART: [ldev] Erasing FE.KEYID = 1
1,242,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,758 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,274 >>> mbox cmd response: failed
2,431,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,280 >>> mbox cmd response: failed
2,431,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,174,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,805 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,799 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,711 UART: ROM Fatal Error: 0x000B0016
2,578,868 >>> mbox cmd response: failed
2,578,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,874 >>> mbox cmd response: failed
2,578,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,847 UART: [state] LifecycleState = Unprovisioned
85,502 UART: [state] DebugLocked = No
86,072 UART: [state] WD Timer not started. Device not locked for debugging
87,373 UART: [kat] SHA2-256
890,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,052 UART: [kat] ++
895,204 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
903,787 UART: [kat] SHA2-512-ACC
905,688 UART: [kat] ECC-384
915,587 UART: [kat] HMAC-384Kdf
920,095 UART: [kat] LMS
1,168,407 UART: [kat] --
1,169,238 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,322 UART: [idev] ++
1,172,490 UART: [idev] CDI.KEYID = 6
1,172,851 UART: [idev] SUBJECT.KEYID = 7
1,173,276 UART: [idev] UDS.KEYID = 0
1,173,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,518 UART: [idev] Erasing UDS.KEYID = 0
1,198,796 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,469 UART: [ldev] ++
1,208,637 UART: [ldev] CDI.KEYID = 6
1,209,001 UART: [ldev] SUBJECT.KEYID = 5
1,209,428 UART: [ldev] AUTHORITY.KEYID = 7
1,209,891 UART: [ldev] FE.KEYID = 1
1,215,189 UART: [ldev] Erasing FE.KEYID = 1
1,241,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,289 UART: [ldev] --
1,280,575 UART: [fwproc] Wait for Commands...
1,281,320 UART: [fwproc] Recv command 0x46574c44
1,282,053 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,959 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,539 >>> mbox cmd response: failed
2,432,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,545 >>> mbox cmd response: failed
2,432,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
890,041 UART: [kat] SHA2-256
891,979 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,690 UART: [kat] LMS
1,474,886 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,261 UART: [fht] Storing FHT @ 0x50003400
1,478,948 UART: [idev] ++
1,479,116 UART: [idev] CDI.KEYID = 6
1,479,476 UART: [idev] SUBJECT.KEYID = 7
1,479,900 UART: [idev] UDS.KEYID = 0
1,480,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,834 UART: [idev] Erasing UDS.KEYID = 0
1,504,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,906 UART: [idev] --
1,513,841 UART: [ldev] ++
1,514,009 UART: [ldev] CDI.KEYID = 6
1,514,372 UART: [ldev] SUBJECT.KEYID = 5
1,514,798 UART: [ldev] AUTHORITY.KEYID = 7
1,515,261 UART: [ldev] FE.KEYID = 1
1,520,809 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,755 UART: [fwproc] Waiting for Commands...
1,586,434 UART: [fwproc] Received command 0x46574c44
1,587,225 UART: [fwproc] Received Image of size 114332 bytes
2,884,997 UART: ROM Fatal Error: 0x000B002A
2,886,156 >>> mbox cmd response: failed
2,886,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,162 >>> mbox cmd response: failed
2,886,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
902,516 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,671 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,050 UART: [idev] --
1,515,143 UART: [ldev] ++
1,515,311 UART: [ldev] CDI.KEYID = 6
1,515,674 UART: [ldev] SUBJECT.KEYID = 5
1,516,100 UART: [ldev] AUTHORITY.KEYID = 7
1,516,563 UART: [ldev] FE.KEYID = 1
1,521,897 UART: [ldev] Erasing FE.KEYID = 1
1,547,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,676 UART: [ldev] --
1,587,025 UART: [fwproc] Waiting for Commands...
1,587,888 UART: [fwproc] Received command 0x46574c44
1,588,679 UART: [fwproc] Received Image of size 114332 bytes
2,887,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,061 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,438 >>> mbox cmd response: failed
2,737,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,444 >>> mbox cmd response: failed
2,737,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,363 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,824 UART: [kat] SHA2-256
881,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,870 UART: [kat] ++
886,022 UART: [kat] sha1
890,164 UART: [kat] SHA2-256
892,102 UART: [kat] SHA2-384
894,843 UART: [kat] SHA2-512-ACC
896,744 UART: [kat] ECC-384
902,335 UART: [kat] HMAC-384Kdf
907,085 UART: [kat] LMS
1,475,281 UART: [kat] --
1,476,172 UART: [cold-reset] ++
1,476,610 UART: [fht] Storing FHT @ 0x50003400
1,479,251 UART: [idev] ++
1,479,419 UART: [idev] CDI.KEYID = 6
1,479,779 UART: [idev] SUBJECT.KEYID = 7
1,480,203 UART: [idev] UDS.KEYID = 0
1,480,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,075 UART: [idev] Erasing UDS.KEYID = 0
1,504,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,563 UART: [idev] --
1,514,628 UART: [ldev] ++
1,514,796 UART: [ldev] CDI.KEYID = 6
1,515,159 UART: [ldev] SUBJECT.KEYID = 5
1,515,585 UART: [ldev] AUTHORITY.KEYID = 7
1,516,048 UART: [ldev] FE.KEYID = 1
1,521,274 UART: [ldev] Erasing FE.KEYID = 1
1,546,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,681 UART: [ldev] --
1,586,080 UART: [fwproc] Waiting for Commands...
1,586,753 UART: [fwproc] Received command 0x46574c44
1,587,544 UART: [fwproc] Received Image of size 114332 bytes
2,883,685 UART: ROM Fatal Error: 0x000B002A
2,884,844 >>> mbox cmd response: failed
2,884,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,850 >>> mbox cmd response: failed
2,884,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,817 UART: [kat] SHA2-512-ACC
897,718 UART: [kat] ECC-384
903,759 UART: [kat] HMAC-384Kdf
908,341 UART: [kat] LMS
1,476,537 UART: [kat] --
1,477,382 UART: [cold-reset] ++
1,477,902 UART: [fht] Storing FHT @ 0x50003400
1,480,583 UART: [idev] ++
1,480,751 UART: [idev] CDI.KEYID = 6
1,481,111 UART: [idev] SUBJECT.KEYID = 7
1,481,535 UART: [idev] UDS.KEYID = 0
1,481,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,647 UART: [idev] Erasing UDS.KEYID = 0
1,506,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,341 UART: [idev] --
1,516,394 UART: [ldev] ++
1,516,562 UART: [ldev] CDI.KEYID = 6
1,516,925 UART: [ldev] SUBJECT.KEYID = 5
1,517,351 UART: [ldev] AUTHORITY.KEYID = 7
1,517,814 UART: [ldev] FE.KEYID = 1
1,523,266 UART: [ldev] Erasing FE.KEYID = 1
1,548,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,791 UART: [ldev] --
1,588,086 UART: [fwproc] Waiting for Commands...
1,588,859 UART: [fwproc] Received command 0x46574c44
1,589,650 UART: [fwproc] Received Image of size 114332 bytes
2,887,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,127 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,274 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,893 >>> mbox cmd response: failed
2,738,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,899 >>> mbox cmd response: failed
2,738,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,500 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
893,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,699 UART: [kat] ++
897,851 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,876 UART: [kat] SHA2-512-ACC
908,777 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
923,112 UART: [kat] LMS
1,171,440 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,172,971 UART: [fht] FHT @ 0x50003400
1,175,468 UART: [idev] ++
1,175,636 UART: [idev] CDI.KEYID = 6
1,175,996 UART: [idev] SUBJECT.KEYID = 7
1,176,420 UART: [idev] UDS.KEYID = 0
1,176,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,644 UART: [idev] Erasing UDS.KEYID = 0
1,201,131 UART: [idev] Sha1 KeyId Algorithm
1,209,639 UART: [idev] --
1,210,937 UART: [ldev] ++
1,211,105 UART: [ldev] CDI.KEYID = 6
1,211,468 UART: [ldev] SUBJECT.KEYID = 5
1,211,894 UART: [ldev] AUTHORITY.KEYID = 7
1,212,357 UART: [ldev] FE.KEYID = 1
1,217,337 UART: [ldev] Erasing FE.KEYID = 1
1,243,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,122 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,305 UART: ROM Fatal Error: 0x000B002A
2,582,464 >>> mbox cmd response: failed
2,582,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,470 >>> mbox cmd response: failed
2,582,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
892,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,071 UART: [kat] ++
897,223 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,142 UART: [kat] SHA2-512-ACC
908,043 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,443 UART: [cold-reset] ++
1,171,963 UART: [fht] FHT @ 0x50003400
1,174,708 UART: [idev] ++
1,174,876 UART: [idev] CDI.KEYID = 6
1,175,236 UART: [idev] SUBJECT.KEYID = 7
1,175,660 UART: [idev] UDS.KEYID = 0
1,176,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,895 UART: [idev] Sha1 KeyId Algorithm
1,209,209 UART: [idev] --
1,210,343 UART: [ldev] ++
1,210,511 UART: [ldev] CDI.KEYID = 6
1,210,874 UART: [ldev] SUBJECT.KEYID = 5
1,211,300 UART: [ldev] AUTHORITY.KEYID = 7
1,211,763 UART: [ldev] FE.KEYID = 1
1,217,237 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,672 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,219 >>> mbox cmd response: failed
2,436,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,225 >>> mbox cmd response: failed
2,436,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,993 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,130 UART: [kat] SHA2-256
904,070 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,919 UART: [kat] HMAC-384Kdf
923,709 UART: [kat] LMS
1,172,037 UART: [kat] --
1,172,994 UART: [cold-reset] ++
1,173,334 UART: [fht] FHT @ 0x50003400
1,175,937 UART: [idev] ++
1,176,105 UART: [idev] CDI.KEYID = 6
1,176,465 UART: [idev] SUBJECT.KEYID = 7
1,176,889 UART: [idev] UDS.KEYID = 0
1,177,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,967 UART: [idev] Erasing UDS.KEYID = 0
1,202,022 UART: [idev] Sha1 KeyId Algorithm
1,210,522 UART: [idev] --
1,211,734 UART: [ldev] ++
1,211,902 UART: [ldev] CDI.KEYID = 6
1,212,265 UART: [ldev] SUBJECT.KEYID = 5
1,212,691 UART: [ldev] AUTHORITY.KEYID = 7
1,213,154 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,245,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,040 UART: [ldev] --
1,284,545 UART: [fwproc] Wait for Commands...
1,285,163 UART: [fwproc] Recv command 0x46574c44
1,285,891 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,418 UART: ROM Fatal Error: 0x000B002A
2,584,577 >>> mbox cmd response: failed
2,584,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,583 >>> mbox cmd response: failed
2,584,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
893,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,786 UART: [kat] ++
897,938 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,173,094 UART: [fht] FHT @ 0x50003400
1,175,731 UART: [idev] ++
1,175,899 UART: [idev] CDI.KEYID = 6
1,176,259 UART: [idev] SUBJECT.KEYID = 7
1,176,683 UART: [idev] UDS.KEYID = 0
1,177,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,451 UART: [idev] Erasing UDS.KEYID = 0
1,201,072 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,430 UART: [ldev] ++
1,210,598 UART: [ldev] CDI.KEYID = 6
1,210,961 UART: [ldev] SUBJECT.KEYID = 5
1,211,387 UART: [ldev] AUTHORITY.KEYID = 7
1,211,850 UART: [ldev] FE.KEYID = 1
1,217,108 UART: [ldev] Erasing FE.KEYID = 1
1,243,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,486 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,589 UART: [fwproc] Recv command 0x46574c44
1,284,317 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,943 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,698 >>> mbox cmd response: failed
2,436,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,704 >>> mbox cmd response: failed
2,436,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,482 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,281 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,174,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,645 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,466 UART: [ldev] Erasing FE.KEYID = 1
1,242,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,450 UART: [fwproc] Wait for Commands...
1,282,209 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,265 UART: ROM Fatal Error: 0x000B002A
2,581,424 >>> mbox cmd response: failed
2,581,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,430 >>> mbox cmd response: failed
2,581,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,508 UART: [kat] HMAC-384Kdf
919,894 UART: [kat] LMS
1,168,206 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,433 UART: [fht] FHT @ 0x50003400
1,172,239 UART: [idev] ++
1,172,407 UART: [idev] CDI.KEYID = 6
1,172,768 UART: [idev] SUBJECT.KEYID = 7
1,173,193 UART: [idev] UDS.KEYID = 0
1,173,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,784 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,531 UART: [fwproc] Recv command 0x46574c44
1,282,264 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,910 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,070 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,521 >>> mbox cmd response: failed
2,432,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,527 >>> mbox cmd response: failed
2,432,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,182 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,501 UART: [kat] SHA2-256
891,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,063 UART: [kat] SHA2-512-ACC
905,964 UART: [kat] ECC-384
915,681 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,169,922 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,173,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,196 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,219 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,674 UART: [fwproc] Recv command 0x46574c44
1,283,407 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,560 UART: ROM Fatal Error: 0x000B002A
2,581,719 >>> mbox cmd response: failed
2,581,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,725 >>> mbox cmd response: failed
2,581,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,659 UART: [kat] HMAC-384Kdf
921,497 UART: [kat] LMS
1,169,809 UART: [kat] --
1,170,770 UART: [cold-reset] ++
1,171,216 UART: [fht] FHT @ 0x50003400
1,173,978 UART: [idev] ++
1,174,146 UART: [idev] CDI.KEYID = 6
1,174,507 UART: [idev] SUBJECT.KEYID = 7
1,174,932 UART: [idev] UDS.KEYID = 0
1,175,278 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,266 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,735 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,815 UART: [fwproc] Wait for Commands...
1,283,594 UART: [fwproc] Recv command 0x46574c44
1,284,327 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,578 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,819 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,124 >>> mbox cmd response: failed
2,433,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,130 >>> mbox cmd response: failed
2,433,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,533 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,475,913 UART: [cold-reset] ++
1,476,315 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,304 UART: [idev] Erasing UDS.KEYID = 0
1,504,512 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,148 UART: [idev] --
1,514,323 UART: [ldev] ++
1,514,491 UART: [ldev] CDI.KEYID = 6
1,514,854 UART: [ldev] SUBJECT.KEYID = 5
1,515,280 UART: [ldev] AUTHORITY.KEYID = 7
1,515,743 UART: [ldev] FE.KEYID = 1
1,521,033 UART: [ldev] Erasing FE.KEYID = 1
1,545,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,870 UART: [ldev] --
1,585,317 UART: [fwproc] Waiting for Commands...
1,586,072 UART: [fwproc] Received command 0x46574c44
1,586,863 UART: [fwproc] Received Image of size 114332 bytes
2,883,768 UART: ROM Fatal Error: 0x000B002B
2,884,927 >>> mbox cmd response: failed
2,884,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,933 >>> mbox cmd response: failed
2,884,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,252 UART: [kat] LMS
1,475,448 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,655 UART: [fht] Storing FHT @ 0x50003400
1,479,408 UART: [idev] ++
1,479,576 UART: [idev] CDI.KEYID = 6
1,479,936 UART: [idev] SUBJECT.KEYID = 7
1,480,360 UART: [idev] UDS.KEYID = 0
1,480,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,838 UART: [idev] Erasing UDS.KEYID = 0
1,505,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,416 UART: [idev] --
1,515,291 UART: [ldev] ++
1,515,459 UART: [ldev] CDI.KEYID = 6
1,515,822 UART: [ldev] SUBJECT.KEYID = 5
1,516,248 UART: [ldev] AUTHORITY.KEYID = 7
1,516,711 UART: [ldev] FE.KEYID = 1
1,522,061 UART: [ldev] Erasing FE.KEYID = 1
1,547,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,190 UART: [ldev] --
1,586,687 UART: [fwproc] Waiting for Commands...
1,587,428 UART: [fwproc] Received command 0x46574c44
1,588,219 UART: [fwproc] Received Image of size 114332 bytes
2,886,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,300 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,652 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,491 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,342 >>> mbox cmd response: failed
2,738,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,348 >>> mbox cmd response: failed
2,738,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,699 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,112 UART: [cold-reset] ++
1,476,448 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,319 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,017 UART: [idev] --
1,515,202 UART: [ldev] ++
1,515,370 UART: [ldev] CDI.KEYID = 6
1,515,733 UART: [ldev] SUBJECT.KEYID = 5
1,516,159 UART: [ldev] AUTHORITY.KEYID = 7
1,516,622 UART: [ldev] FE.KEYID = 1
1,522,190 UART: [ldev] Erasing FE.KEYID = 1
1,547,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,319 UART: [ldev] --
1,586,798 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 114332 bytes
2,884,623 UART: ROM Fatal Error: 0x000B002B
2,885,782 >>> mbox cmd response: failed
2,885,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,788 >>> mbox cmd response: failed
2,885,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,752 UART: [kat] SHA2-256
892,690 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,199 UART: [kat] HMAC-384Kdf
907,857 UART: [kat] LMS
1,476,053 UART: [kat] --
1,477,012 UART: [cold-reset] ++
1,477,542 UART: [fht] Storing FHT @ 0x50003400
1,480,283 UART: [idev] ++
1,480,451 UART: [idev] CDI.KEYID = 6
1,480,811 UART: [idev] SUBJECT.KEYID = 7
1,481,235 UART: [idev] UDS.KEYID = 0
1,481,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,493 UART: [idev] Erasing UDS.KEYID = 0
1,506,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,593 UART: [idev] --
1,515,774 UART: [ldev] ++
1,515,942 UART: [ldev] CDI.KEYID = 6
1,516,305 UART: [ldev] SUBJECT.KEYID = 5
1,516,731 UART: [ldev] AUTHORITY.KEYID = 7
1,517,194 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,547,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,801 UART: [ldev] --
1,587,204 UART: [fwproc] Waiting for Commands...
1,587,907 UART: [fwproc] Received command 0x46574c44
1,588,698 UART: [fwproc] Received Image of size 114332 bytes
2,885,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,790 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,127 >>> mbox cmd response: failed
2,738,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,133 >>> mbox cmd response: failed
2,738,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,770 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,260 UART: [kat] SHA2-512-ACC
908,161 UART: [kat] ECC-384
917,874 UART: [kat] HMAC-384Kdf
922,428 UART: [kat] LMS
1,170,756 UART: [kat] --
1,171,711 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,574 UART: [idev] ++
1,174,742 UART: [idev] CDI.KEYID = 6
1,175,102 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,475 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,196 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46574c44
1,283,584 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,135 UART: ROM Fatal Error: 0x000B002B
2,581,294 >>> mbox cmd response: failed
2,581,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,300 >>> mbox cmd response: failed
2,581,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,910 UART: [kat] SHA2-512-ACC
908,811 UART: [kat] ECC-384
918,318 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,229 UART: [cold-reset] ++
1,172,681 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,404 UART: [idev] Erasing UDS.KEYID = 0
1,201,837 UART: [idev] Sha1 KeyId Algorithm
1,210,089 UART: [idev] --
1,210,957 UART: [ldev] ++
1,211,125 UART: [ldev] CDI.KEYID = 6
1,211,488 UART: [ldev] SUBJECT.KEYID = 5
1,211,914 UART: [ldev] AUTHORITY.KEYID = 7
1,212,377 UART: [ldev] FE.KEYID = 1
1,217,519 UART: [ldev] Erasing FE.KEYID = 1
1,244,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,948 UART: [fwproc] Recv command 0x46574c44
1,284,676 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,715 >>> mbox cmd response: failed
2,435,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,721 >>> mbox cmd response: failed
2,435,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,201 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,102 UART: [state] WD Timer not started. Device not locked for debugging
87,299 UART: [kat] SHA2-256
892,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,074 UART: [kat] ++
897,226 UART: [kat] sha1
901,334 UART: [kat] SHA2-256
903,274 UART: [kat] SHA2-384
906,131 UART: [kat] SHA2-512-ACC
908,032 UART: [kat] ECC-384
917,661 UART: [kat] HMAC-384Kdf
922,289 UART: [kat] LMS
1,170,617 UART: [kat] --
1,171,630 UART: [cold-reset] ++
1,172,160 UART: [fht] FHT @ 0x50003400
1,174,735 UART: [idev] ++
1,174,903 UART: [idev] CDI.KEYID = 6
1,175,263 UART: [idev] SUBJECT.KEYID = 7
1,175,687 UART: [idev] UDS.KEYID = 0
1,176,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,829 UART: [idev] Erasing UDS.KEYID = 0
1,201,308 UART: [idev] Sha1 KeyId Algorithm
1,209,656 UART: [idev] --
1,210,606 UART: [ldev] ++
1,210,774 UART: [ldev] CDI.KEYID = 6
1,211,137 UART: [ldev] SUBJECT.KEYID = 5
1,211,563 UART: [ldev] AUTHORITY.KEYID = 7
1,212,026 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,243,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,918 UART: [ldev] --
1,282,315 UART: [fwproc] Wait for Commands...
1,282,985 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,414 UART: ROM Fatal Error: 0x000B002B
2,580,573 >>> mbox cmd response: failed
2,580,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,579 >>> mbox cmd response: failed
2,580,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
893,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,982 UART: [kat] ++
898,134 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,901 UART: [kat] SHA2-512-ACC
908,802 UART: [kat] ECC-384
918,607 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,789 UART: [idev] Erasing UDS.KEYID = 0
1,202,252 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,866 UART: [ldev] ++
1,212,034 UART: [ldev] CDI.KEYID = 6
1,212,397 UART: [ldev] SUBJECT.KEYID = 5
1,212,823 UART: [ldev] AUTHORITY.KEYID = 7
1,213,286 UART: [ldev] FE.KEYID = 1
1,218,330 UART: [ldev] Erasing FE.KEYID = 1
1,244,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,110 UART: [ldev] --
1,284,513 UART: [fwproc] Wait for Commands...
1,285,203 UART: [fwproc] Recv command 0x46574c44
1,285,931 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,197 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,034 >>> mbox cmd response: failed
2,436,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,040 >>> mbox cmd response: failed
2,436,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,896 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,520 UART: [state] LifecycleState = Unprovisioned
85,175 UART: [state] DebugLocked = No
85,793 UART: [state] WD Timer not started. Device not locked for debugging
87,072 UART: [kat] SHA2-256
890,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,751 UART: [kat] ++
894,903 UART: [kat] sha1
899,037 UART: [kat] SHA2-256
900,977 UART: [kat] SHA2-384
903,748 UART: [kat] SHA2-512-ACC
905,649 UART: [kat] ECC-384
915,132 UART: [kat] HMAC-384Kdf
919,488 UART: [kat] LMS
1,167,800 UART: [kat] --
1,168,647 UART: [cold-reset] ++
1,169,057 UART: [fht] FHT @ 0x50003400
1,171,513 UART: [idev] ++
1,171,681 UART: [idev] CDI.KEYID = 6
1,172,042 UART: [idev] SUBJECT.KEYID = 7
1,172,467 UART: [idev] UDS.KEYID = 0
1,172,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,263 UART: [idev] Erasing UDS.KEYID = 0
1,197,615 UART: [idev] Sha1 KeyId Algorithm
1,206,349 UART: [idev] --
1,207,372 UART: [ldev] ++
1,207,540 UART: [ldev] CDI.KEYID = 6
1,207,904 UART: [ldev] SUBJECT.KEYID = 5
1,208,331 UART: [ldev] AUTHORITY.KEYID = 7
1,208,794 UART: [ldev] FE.KEYID = 1
1,213,838 UART: [ldev] Erasing FE.KEYID = 1
1,239,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,708 UART: [ldev] --
1,279,028 UART: [fwproc] Wait for Commands...
1,279,777 UART: [fwproc] Recv command 0x46574c44
1,280,510 UART: [fwproc] Recv'd Img size: 114332 bytes
2,576,397 UART: ROM Fatal Error: 0x000B002B
2,577,556 >>> mbox cmd response: failed
2,577,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,562 >>> mbox cmd response: failed
2,577,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
921,250 UART: [kat] LMS
1,169,562 UART: [kat] --
1,170,491 UART: [cold-reset] ++
1,171,061 UART: [fht] FHT @ 0x50003400
1,173,879 UART: [idev] ++
1,174,047 UART: [idev] CDI.KEYID = 6
1,174,408 UART: [idev] SUBJECT.KEYID = 7
1,174,833 UART: [idev] UDS.KEYID = 0
1,175,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,003 UART: [idev] Erasing UDS.KEYID = 0
1,200,259 UART: [idev] Sha1 KeyId Algorithm
1,209,101 UART: [idev] --
1,210,108 UART: [ldev] ++
1,210,276 UART: [ldev] CDI.KEYID = 6
1,210,640 UART: [ldev] SUBJECT.KEYID = 5
1,211,067 UART: [ldev] AUTHORITY.KEYID = 7
1,211,530 UART: [ldev] FE.KEYID = 1
1,216,742 UART: [ldev] Erasing FE.KEYID = 1
1,243,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,236 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,281 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,976 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,461 >>> mbox cmd response: failed
2,432,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,467 >>> mbox cmd response: failed
2,432,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,654 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,174,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,429 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,373 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,294 UART: ROM Fatal Error: 0x000B002B
2,582,453 >>> mbox cmd response: failed
2,582,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,459 >>> mbox cmd response: failed
2,582,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,303 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,315 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,529 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,079 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,172 >>> mbox cmd response: failed
2,433,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,178 >>> mbox cmd response: failed
2,433,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,075 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
894,986 UART: [kat] SHA2-512-ACC
896,887 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,681 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,816 UART: [idev] ++
1,479,984 UART: [idev] CDI.KEYID = 6
1,480,344 UART: [idev] SUBJECT.KEYID = 7
1,480,768 UART: [idev] UDS.KEYID = 0
1,481,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,730 UART: [idev] Erasing UDS.KEYID = 0
1,505,024 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,532 UART: [idev] --
1,514,621 UART: [ldev] ++
1,514,789 UART: [ldev] CDI.KEYID = 6
1,515,152 UART: [ldev] SUBJECT.KEYID = 5
1,515,578 UART: [ldev] AUTHORITY.KEYID = 7
1,516,041 UART: [ldev] FE.KEYID = 1
1,521,209 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,778 UART: [fwproc] Received command 0x46574c44
1,587,569 UART: [fwproc] Received Image of size 114332 bytes
2,883,561 UART: ROM Fatal Error: 0x000B0028
2,884,718 >>> mbox cmd response: failed
2,884,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,724 >>> mbox cmd response: failed
2,884,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,730 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,727 UART: [kat] SHA2-256
881,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,773 UART: [kat] ++
885,925 UART: [kat] sha1
889,935 UART: [kat] SHA2-256
891,873 UART: [kat] SHA2-384
894,734 UART: [kat] SHA2-512-ACC
896,635 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,824 UART: [kat] LMS
1,475,020 UART: [kat] --
1,475,939 UART: [cold-reset] ++
1,476,293 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,024 UART: [idev] Erasing UDS.KEYID = 0
1,504,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,388 UART: [idev] --
1,514,679 UART: [ldev] ++
1,514,847 UART: [ldev] CDI.KEYID = 6
1,515,210 UART: [ldev] SUBJECT.KEYID = 5
1,515,636 UART: [ldev] AUTHORITY.KEYID = 7
1,516,099 UART: [ldev] FE.KEYID = 1
1,521,707 UART: [ldev] Erasing FE.KEYID = 1
1,547,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,538 UART: [ldev] --
1,587,039 UART: [fwproc] Waiting for Commands...
1,587,792 UART: [fwproc] Received command 0x46574c44
1,588,583 UART: [fwproc] Received Image of size 114332 bytes
2,886,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,392 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,553 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,736,997 >>> mbox cmd response: failed
2,736,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,003 >>> mbox cmd response: failed
2,737,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,923 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,558 UART: [kat] SHA2-256
882,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,604 UART: [kat] ++
886,756 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
902,937 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,504,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,611 UART: [idev] --
1,514,572 UART: [ldev] ++
1,514,740 UART: [ldev] CDI.KEYID = 6
1,515,103 UART: [ldev] SUBJECT.KEYID = 5
1,515,529 UART: [ldev] AUTHORITY.KEYID = 7
1,515,992 UART: [ldev] FE.KEYID = 1
1,521,618 UART: [ldev] Erasing FE.KEYID = 1
1,547,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,249 UART: [ldev] --
1,586,632 UART: [fwproc] Waiting for Commands...
1,587,485 UART: [fwproc] Received command 0x46574c44
1,588,276 UART: [fwproc] Received Image of size 114332 bytes
2,884,956 UART: ROM Fatal Error: 0x000B0028
2,886,113 >>> mbox cmd response: failed
2,886,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,119 >>> mbox cmd response: failed
2,886,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,961 UART: [state] LifecycleState = Unprovisioned
86,616 UART: [state] DebugLocked = No
87,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,034 UART: [kat] SHA2-256
882,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,080 UART: [kat] ++
887,232 UART: [kat] sha1
891,420 UART: [kat] SHA2-256
893,358 UART: [kat] SHA2-384
896,307 UART: [kat] SHA2-512-ACC
898,208 UART: [kat] ECC-384
903,829 UART: [kat] HMAC-384Kdf
908,679 UART: [kat] LMS
1,476,875 UART: [kat] --
1,477,824 UART: [cold-reset] ++
1,478,352 UART: [fht] Storing FHT @ 0x50003400
1,481,173 UART: [idev] ++
1,481,341 UART: [idev] CDI.KEYID = 6
1,481,701 UART: [idev] SUBJECT.KEYID = 7
1,482,125 UART: [idev] UDS.KEYID = 0
1,482,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,953 UART: [idev] Erasing UDS.KEYID = 0
1,506,783 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,441 UART: [idev] --
1,516,614 UART: [ldev] ++
1,516,782 UART: [ldev] CDI.KEYID = 6
1,517,145 UART: [ldev] SUBJECT.KEYID = 5
1,517,571 UART: [ldev] AUTHORITY.KEYID = 7
1,518,034 UART: [ldev] FE.KEYID = 1
1,523,426 UART: [ldev] Erasing FE.KEYID = 1
1,549,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,449 UART: [ldev] --
1,588,836 UART: [fwproc] Waiting for Commands...
1,589,523 UART: [fwproc] Received command 0x46574c44
1,590,314 UART: [fwproc] Received Image of size 114332 bytes
2,887,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,558 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,740,760 >>> mbox cmd response: failed
2,740,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,766 >>> mbox cmd response: failed
2,740,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
892,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,001 UART: [kat] ++
897,153 UART: [kat] sha1
901,513 UART: [kat] SHA2-256
903,453 UART: [kat] SHA2-384
906,160 UART: [kat] SHA2-512-ACC
908,061 UART: [kat] ECC-384
917,734 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,773 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,200,711 UART: [idev] Sha1 KeyId Algorithm
1,209,273 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,768 UART: ROM Fatal Error: 0x000B0028
2,581,925 >>> mbox cmd response: failed
2,581,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,931 >>> mbox cmd response: failed
2,581,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,903 UART: [kat] SHA2-256
903,843 UART: [kat] SHA2-384
906,532 UART: [kat] SHA2-512-ACC
908,433 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,450 UART: [kat] LMS
1,170,778 UART: [kat] --
1,171,501 UART: [cold-reset] ++
1,172,059 UART: [fht] FHT @ 0x50003400
1,174,728 UART: [idev] ++
1,174,896 UART: [idev] CDI.KEYID = 6
1,175,256 UART: [idev] SUBJECT.KEYID = 7
1,175,680 UART: [idev] UDS.KEYID = 0
1,176,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,257 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,160 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,738 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,252 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,554 >>> mbox cmd response: failed
2,436,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,560 >>> mbox cmd response: failed
2,436,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,451 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
907,027 UART: [kat] SHA2-512-ACC
908,928 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,886 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,419 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,209,866 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,244,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,058 UART: [ldev] --
1,284,377 UART: [fwproc] Wait for Commands...
1,285,093 UART: [fwproc] Recv command 0x46574c44
1,285,821 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,589 UART: ROM Fatal Error: 0x000B0028
2,583,746 >>> mbox cmd response: failed
2,583,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,752 >>> mbox cmd response: failed
2,583,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,735 UART: [kat] SHA2-512-ACC
908,636 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,481 UART: [idev] ++
1,175,649 UART: [idev] CDI.KEYID = 6
1,176,009 UART: [idev] SUBJECT.KEYID = 7
1,176,433 UART: [idev] UDS.KEYID = 0
1,176,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,943 UART: [idev] Erasing UDS.KEYID = 0
1,200,956 UART: [idev] Sha1 KeyId Algorithm
1,209,618 UART: [idev] --
1,210,662 UART: [ldev] ++
1,210,830 UART: [ldev] CDI.KEYID = 6
1,211,193 UART: [ldev] SUBJECT.KEYID = 5
1,211,619 UART: [ldev] AUTHORITY.KEYID = 7
1,212,082 UART: [ldev] FE.KEYID = 1
1,217,316 UART: [ldev] Erasing FE.KEYID = 1
1,243,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,600 UART: [ldev] --
1,283,057 UART: [fwproc] Wait for Commands...
1,283,871 UART: [fwproc] Recv command 0x46574c44
1,284,599 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,437,281 >>> mbox cmd response: failed
2,437,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,287 >>> mbox cmd response: failed
2,437,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,344 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,162 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,608 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,859 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,173,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,283 UART: [idev] Sha1 KeyId Algorithm
1,207,313 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,676 UART: [ldev] --
1,279,978 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,372 UART: ROM Fatal Error: 0x000B0028
2,579,529 >>> mbox cmd response: failed
2,579,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,535 >>> mbox cmd response: failed
2,579,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,541 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,173,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,962 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,810 >>> mbox cmd response: failed
2,431,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,816 >>> mbox cmd response: failed
2,431,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,188 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,442 UART: [cold-reset] ++
1,169,902 UART: [fht] FHT @ 0x50003400
1,172,484 UART: [idev] ++
1,172,652 UART: [idev] CDI.KEYID = 6
1,173,013 UART: [idev] SUBJECT.KEYID = 7
1,173,438 UART: [idev] UDS.KEYID = 0
1,173,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,208,022 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,874 UART: [fwproc] Recv command 0x46574c44
1,282,607 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,913 UART: ROM Fatal Error: 0x000B0028
2,581,070 >>> mbox cmd response: failed
2,581,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,076 >>> mbox cmd response: failed
2,581,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,875 UART: [ldev] SUBJECT.KEYID = 5
1,210,302 UART: [ldev] AUTHORITY.KEYID = 7
1,210,765 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,927 UART: [fwproc] Wait for Commands...
1,282,570 UART: [fwproc] Recv command 0x46574c44
1,283,303 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,189 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,447 >>> mbox cmd response: failed
2,432,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,453 >>> mbox cmd response: failed
2,432,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,825 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,485 UART: [fht] Storing FHT @ 0x50003400
1,479,114 UART: [idev] ++
1,479,282 UART: [idev] CDI.KEYID = 6
1,479,642 UART: [idev] SUBJECT.KEYID = 7
1,480,066 UART: [idev] UDS.KEYID = 0
1,480,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,840 UART: [idev] Erasing UDS.KEYID = 0
1,504,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,662 UART: [idev] --
1,513,563 UART: [ldev] ++
1,513,731 UART: [ldev] CDI.KEYID = 6
1,514,094 UART: [ldev] SUBJECT.KEYID = 5
1,514,520 UART: [ldev] AUTHORITY.KEYID = 7
1,514,983 UART: [ldev] FE.KEYID = 1
1,520,349 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,126 UART: [ldev] --
1,585,513 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 114332 bytes
2,884,071 UART: ROM Fatal Error: 0x000B0029
2,885,228 >>> mbox cmd response: failed
2,885,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,234 >>> mbox cmd response: failed
2,885,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,929 UART: [kat] SHA2-256
892,867 UART: [kat] SHA2-384
895,734 UART: [kat] SHA2-512-ACC
897,635 UART: [kat] ECC-384
903,374 UART: [kat] HMAC-384Kdf
908,048 UART: [kat] LMS
1,476,244 UART: [kat] --
1,476,963 UART: [cold-reset] ++
1,477,397 UART: [fht] Storing FHT @ 0x50003400
1,480,216 UART: [idev] ++
1,480,384 UART: [idev] CDI.KEYID = 6
1,480,744 UART: [idev] SUBJECT.KEYID = 7
1,481,168 UART: [idev] UDS.KEYID = 0
1,481,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,032 UART: [idev] Erasing UDS.KEYID = 0
1,505,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,743 UART: [ldev] ++
1,514,911 UART: [ldev] CDI.KEYID = 6
1,515,274 UART: [ldev] SUBJECT.KEYID = 5
1,515,700 UART: [ldev] AUTHORITY.KEYID = 7
1,516,163 UART: [ldev] FE.KEYID = 1
1,521,435 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,506 UART: [ldev] --
1,585,879 UART: [fwproc] Waiting for Commands...
1,586,548 UART: [fwproc] Received command 0x46574c44
1,587,339 UART: [fwproc] Received Image of size 114332 bytes
2,884,582 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,875 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,855 >>> mbox cmd response: failed
2,738,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,861 >>> mbox cmd response: failed
2,738,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,393 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,830 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,215 UART: [idev] ++
1,480,383 UART: [idev] CDI.KEYID = 6
1,480,743 UART: [idev] SUBJECT.KEYID = 7
1,481,167 UART: [idev] UDS.KEYID = 0
1,481,512 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,287 UART: [idev] Erasing UDS.KEYID = 0
1,505,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,403 UART: [idev] --
1,515,462 UART: [ldev] ++
1,515,630 UART: [ldev] CDI.KEYID = 6
1,515,993 UART: [ldev] SUBJECT.KEYID = 5
1,516,419 UART: [ldev] AUTHORITY.KEYID = 7
1,516,882 UART: [ldev] FE.KEYID = 1
1,521,980 UART: [ldev] Erasing FE.KEYID = 1
1,547,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,421 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,605 UART: [fwproc] Received command 0x46574c44
1,588,396 UART: [fwproc] Received Image of size 114332 bytes
2,885,672 UART: ROM Fatal Error: 0x000B0029
2,886,829 >>> mbox cmd response: failed
2,886,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,835 >>> mbox cmd response: failed
2,886,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,586 UART: [kat] SHA2-256
882,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,632 UART: [kat] ++
886,784 UART: [kat] sha1
891,102 UART: [kat] SHA2-256
893,040 UART: [kat] SHA2-384
895,759 UART: [kat] SHA2-512-ACC
897,660 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
908,145 UART: [kat] LMS
1,476,341 UART: [kat] --
1,477,470 UART: [cold-reset] ++
1,477,938 UART: [fht] Storing FHT @ 0x50003400
1,480,499 UART: [idev] ++
1,480,667 UART: [idev] CDI.KEYID = 6
1,481,027 UART: [idev] SUBJECT.KEYID = 7
1,481,451 UART: [idev] UDS.KEYID = 0
1,481,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,769 UART: [idev] Erasing UDS.KEYID = 0
1,506,985 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,637 UART: [idev] --
1,516,792 UART: [ldev] ++
1,516,960 UART: [ldev] CDI.KEYID = 6
1,517,323 UART: [ldev] SUBJECT.KEYID = 5
1,517,749 UART: [ldev] AUTHORITY.KEYID = 7
1,518,212 UART: [ldev] FE.KEYID = 1
1,523,512 UART: [ldev] Erasing FE.KEYID = 1
1,549,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,357 UART: [ldev] --
1,588,860 UART: [fwproc] Waiting for Commands...
1,589,675 UART: [fwproc] Received command 0x46574c44
1,590,466 UART: [fwproc] Received Image of size 114332 bytes
2,887,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,662 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,104 >>> mbox cmd response: failed
2,737,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,110 >>> mbox cmd response: failed
2,737,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,038 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
893,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,145 UART: [kat] ++
897,297 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,760 UART: [kat] HMAC-384Kdf
922,328 UART: [kat] LMS
1,170,656 UART: [kat] --
1,171,385 UART: [cold-reset] ++
1,171,929 UART: [fht] FHT @ 0x50003400
1,174,606 UART: [idev] ++
1,174,774 UART: [idev] CDI.KEYID = 6
1,175,134 UART: [idev] SUBJECT.KEYID = 7
1,175,558 UART: [idev] UDS.KEYID = 0
1,175,903 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,733 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,774 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,352 UART: [fwproc] Wait for Commands...
1,282,152 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,482 UART: ROM Fatal Error: 0x000B0029
2,580,639 >>> mbox cmd response: failed
2,580,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,645 >>> mbox cmd response: failed
2,580,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
893,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,141 UART: [kat] ++
897,293 UART: [kat] sha1
901,417 UART: [kat] SHA2-256
903,357 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,875 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,910 UART: [idev] Erasing UDS.KEYID = 0
1,201,033 UART: [idev] Sha1 KeyId Algorithm
1,209,629 UART: [idev] --
1,210,579 UART: [ldev] ++
1,210,747 UART: [ldev] CDI.KEYID = 6
1,211,110 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,598 UART: [fwproc] Wait for Commands...
1,283,416 UART: [fwproc] Recv command 0x46574c44
1,284,144 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,362 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,818 >>> mbox cmd response: failed
2,436,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,824 >>> mbox cmd response: failed
2,436,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,871 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
901,984 UART: [kat] SHA2-256
903,924 UART: [kat] SHA2-384
906,517 UART: [kat] SHA2-512-ACC
908,418 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,581 UART: [kat] LMS
1,170,909 UART: [kat] --
1,171,852 UART: [cold-reset] ++
1,172,294 UART: [fht] FHT @ 0x50003400
1,174,823 UART: [idev] ++
1,174,991 UART: [idev] CDI.KEYID = 6
1,175,351 UART: [idev] SUBJECT.KEYID = 7
1,175,775 UART: [idev] UDS.KEYID = 0
1,176,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,905 UART: [idev] Erasing UDS.KEYID = 0
1,200,464 UART: [idev] Sha1 KeyId Algorithm
1,208,892 UART: [idev] --
1,209,850 UART: [ldev] ++
1,210,018 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,807 UART: [ldev] AUTHORITY.KEYID = 7
1,211,270 UART: [ldev] FE.KEYID = 1
1,216,276 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,326 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,201 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,237 UART: ROM Fatal Error: 0x000B0029
2,582,394 >>> mbox cmd response: failed
2,582,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,400 >>> mbox cmd response: failed
2,582,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,593 UART: [idev] ++
1,175,761 UART: [idev] CDI.KEYID = 6
1,176,121 UART: [idev] SUBJECT.KEYID = 7
1,176,545 UART: [idev] UDS.KEYID = 0
1,176,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,427 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,250 UART: [idev] --
1,211,410 UART: [ldev] ++
1,211,578 UART: [ldev] CDI.KEYID = 6
1,211,941 UART: [ldev] SUBJECT.KEYID = 5
1,212,367 UART: [ldev] AUTHORITY.KEYID = 7
1,212,830 UART: [ldev] FE.KEYID = 1
1,218,102 UART: [ldev] Erasing FE.KEYID = 1
1,244,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,500 UART: [ldev] --
1,283,993 UART: [fwproc] Wait for Commands...
1,284,611 UART: [fwproc] Recv command 0x46574c44
1,285,339 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,406 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,710 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,631 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,352 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,851 >>> mbox cmd response: failed
2,435,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,857 >>> mbox cmd response: failed
2,435,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,304 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,855 UART: [idev] --
1,207,854 UART: [ldev] ++
1,208,022 UART: [ldev] CDI.KEYID = 6
1,208,386 UART: [ldev] SUBJECT.KEYID = 5
1,208,813 UART: [ldev] AUTHORITY.KEYID = 7
1,209,276 UART: [ldev] FE.KEYID = 1
1,214,652 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,850 UART: [ldev] --
1,280,222 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,274 UART: ROM Fatal Error: 0x000B0029
2,579,431 >>> mbox cmd response: failed
2,579,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,437 >>> mbox cmd response: failed
2,579,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,940 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,281,855 UART: [fwproc] Recv command 0x46574c44
1,282,588 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,310 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,116 >>> mbox cmd response: failed
2,431,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,122 >>> mbox cmd response: failed
2,431,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,606 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,212 UART: [state] WD Timer not started. Device not locked for debugging
88,573 UART: [kat] SHA2-256
892,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,252 UART: [kat] ++
896,404 UART: [kat] sha1
900,764 UART: [kat] SHA2-256
902,704 UART: [kat] SHA2-384
905,371 UART: [kat] SHA2-512-ACC
907,272 UART: [kat] ECC-384
917,081 UART: [kat] HMAC-384Kdf
921,761 UART: [kat] LMS
1,170,073 UART: [kat] --
1,170,790 UART: [cold-reset] ++
1,171,298 UART: [fht] FHT @ 0x50003400
1,174,116 UART: [idev] ++
1,174,284 UART: [idev] CDI.KEYID = 6
1,174,645 UART: [idev] SUBJECT.KEYID = 7
1,175,070 UART: [idev] UDS.KEYID = 0
1,175,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,300 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,575 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,471 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,803 UART: ROM Fatal Error: 0x000B0029
2,581,960 >>> mbox cmd response: failed
2,581,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,966 >>> mbox cmd response: failed
2,581,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,324 UART: [idev] ++
1,173,492 UART: [idev] CDI.KEYID = 6
1,173,853 UART: [idev] SUBJECT.KEYID = 7
1,174,278 UART: [idev] UDS.KEYID = 0
1,174,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,197 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,197 >>> mbox cmd response: failed
2,433,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,203 >>> mbox cmd response: failed
2,433,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,535 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,161 UART: [ldev] ++
1,515,329 UART: [ldev] CDI.KEYID = 6
1,515,692 UART: [ldev] SUBJECT.KEYID = 5
1,516,118 UART: [ldev] AUTHORITY.KEYID = 7
1,516,581 UART: [ldev] FE.KEYID = 1
1,521,889 UART: [ldev] Erasing FE.KEYID = 1
1,546,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,419 UART: [fwproc] Waiting for Commands...
1,587,178 UART: [fwproc] Received command 0x46574c44
1,587,969 UART: [fwproc] Received Image of size 114332 bytes
1,635,763 UART: ROM Fatal Error: 0x000B003F
1,636,922 >>> mbox cmd response: failed
1,636,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,928 >>> mbox cmd response: failed
1,636,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,018 UART: [kat] HMAC-384Kdf
906,518 UART: [kat] LMS
1,474,714 UART: [kat] --
1,475,729 UART: [cold-reset] ++
1,476,147 UART: [fht] Storing FHT @ 0x50003400
1,478,894 UART: [idev] ++
1,479,062 UART: [idev] CDI.KEYID = 6
1,479,422 UART: [idev] SUBJECT.KEYID = 7
1,479,846 UART: [idev] UDS.KEYID = 0
1,480,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,154 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,554 UART: [idev] --
1,513,587 UART: [ldev] ++
1,513,755 UART: [ldev] CDI.KEYID = 6
1,514,118 UART: [ldev] SUBJECT.KEYID = 5
1,514,544 UART: [ldev] AUTHORITY.KEYID = 7
1,515,007 UART: [ldev] FE.KEYID = 1
1,520,405 UART: [ldev] Erasing FE.KEYID = 1
1,545,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,286 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,398 UART: [fwproc] Received command 0x46574c44
1,587,189 UART: [fwproc] Received Image of size 114332 bytes
2,884,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,435 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,759 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,975 >>> mbox cmd response: failed
1,488,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,981 >>> mbox cmd response: failed
1,488,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,279 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,276 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,806 UART: [kat] SHA2-256
881,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,852 UART: [kat] ++
886,004 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,225 UART: [kat] SHA2-512-ACC
897,126 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,629 UART: [kat] LMS
1,475,825 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,480,119 UART: [idev] ++
1,480,287 UART: [idev] CDI.KEYID = 6
1,480,647 UART: [idev] SUBJECT.KEYID = 7
1,481,071 UART: [idev] UDS.KEYID = 0
1,481,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,505,887 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,633 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,520 UART: [ldev] Erasing FE.KEYID = 1
1,548,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,425 UART: [ldev] --
1,587,910 UART: [fwproc] Waiting for Commands...
1,588,641 UART: [fwproc] Received command 0x46574c44
1,589,432 UART: [fwproc] Received Image of size 114332 bytes
1,635,460 UART: ROM Fatal Error: 0x000B003F
1,636,619 >>> mbox cmd response: failed
1,636,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,625 >>> mbox cmd response: failed
1,636,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
891,022 UART: [kat] SHA2-256
892,960 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,329 UART: [kat] LMS
1,475,525 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,479,903 UART: [idev] ++
1,480,071 UART: [idev] CDI.KEYID = 6
1,480,431 UART: [idev] SUBJECT.KEYID = 7
1,480,855 UART: [idev] UDS.KEYID = 0
1,481,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,423 UART: [idev] --
1,515,504 UART: [ldev] ++
1,515,672 UART: [ldev] CDI.KEYID = 6
1,516,035 UART: [ldev] SUBJECT.KEYID = 5
1,516,461 UART: [ldev] AUTHORITY.KEYID = 7
1,516,924 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,547,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,306 UART: [fwproc] Waiting for Commands...
1,588,031 UART: [fwproc] Received command 0x46574c44
1,588,822 UART: [fwproc] Received Image of size 114332 bytes
2,886,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,659 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,814 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,370 >>> mbox cmd response: failed
1,487,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,376 >>> mbox cmd response: failed
1,487,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,662 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
85,857 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
892,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,943 UART: [kat] ++
897,095 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
917,748 UART: [kat] HMAC-384Kdf
922,276 UART: [kat] LMS
1,170,604 UART: [kat] --
1,171,485 UART: [cold-reset] ++
1,171,895 UART: [fht] FHT @ 0x50003400
1,174,444 UART: [idev] ++
1,174,612 UART: [idev] CDI.KEYID = 6
1,174,972 UART: [idev] SUBJECT.KEYID = 7
1,175,396 UART: [idev] UDS.KEYID = 0
1,175,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,209 UART: [idev] Sha1 KeyId Algorithm
1,208,605 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,641 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,760 UART: [fwproc] Recv command 0x46574c44
1,282,488 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,022 UART: ROM Fatal Error: 0x000B003F
1,331,181 >>> mbox cmd response: failed
1,331,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,187 >>> mbox cmd response: failed
1,331,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
893,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,207 UART: [kat] ++
897,359 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
918,386 UART: [kat] HMAC-384Kdf
922,822 UART: [kat] LMS
1,171,150 UART: [kat] --
1,172,269 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,464 UART: [idev] ++
1,175,632 UART: [idev] CDI.KEYID = 6
1,175,992 UART: [idev] SUBJECT.KEYID = 7
1,176,416 UART: [idev] UDS.KEYID = 0
1,176,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,201,345 UART: [idev] Sha1 KeyId Algorithm
1,209,655 UART: [idev] --
1,210,775 UART: [ldev] ++
1,210,943 UART: [ldev] CDI.KEYID = 6
1,211,306 UART: [ldev] SUBJECT.KEYID = 5
1,211,732 UART: [ldev] AUTHORITY.KEYID = 7
1,212,195 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,809 UART: [ldev] --
1,283,304 UART: [fwproc] Wait for Commands...
1,283,982 UART: [fwproc] Recv command 0x46574c44
1,284,710 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,886 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,316 >>> mbox cmd response: failed
1,187,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,322 >>> mbox cmd response: failed
1,187,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,011 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,843 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,533 UART: [idev] ++
1,175,701 UART: [idev] CDI.KEYID = 6
1,176,061 UART: [idev] SUBJECT.KEYID = 7
1,176,485 UART: [idev] UDS.KEYID = 0
1,176,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,676 UART: [idev] Sha1 KeyId Algorithm
1,210,066 UART: [idev] --
1,211,202 UART: [ldev] ++
1,211,370 UART: [ldev] CDI.KEYID = 6
1,211,733 UART: [ldev] SUBJECT.KEYID = 5
1,212,159 UART: [ldev] AUTHORITY.KEYID = 7
1,212,622 UART: [ldev] FE.KEYID = 1
1,217,926 UART: [ldev] Erasing FE.KEYID = 1
1,244,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,688 UART: [ldev] --
1,284,005 UART: [fwproc] Wait for Commands...
1,284,641 UART: [fwproc] Recv command 0x46574c44
1,285,369 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,475 UART: ROM Fatal Error: 0x000B003F
1,333,634 >>> mbox cmd response: failed
1,333,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,640 >>> mbox cmd response: failed
1,333,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,570 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,201,210 UART: [idev] Sha1 KeyId Algorithm
1,209,630 UART: [idev] --
1,210,688 UART: [ldev] ++
1,210,856 UART: [ldev] CDI.KEYID = 6
1,211,219 UART: [ldev] SUBJECT.KEYID = 5
1,211,645 UART: [ldev] AUTHORITY.KEYID = 7
1,212,108 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,652 UART: [ldev] --
1,283,073 UART: [fwproc] Wait for Commands...
1,283,753 UART: [fwproc] Recv command 0x46574c44
1,284,481 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,295 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,855 >>> mbox cmd response: failed
1,187,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,861 >>> mbox cmd response: failed
1,187,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,274 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,814 UART: [ldev] --
1,280,100 UART: [fwproc] Wait for Commands...
1,280,765 UART: [fwproc] Recv command 0x46574c44
1,281,498 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,103 UART: ROM Fatal Error: 0x000B003F
1,330,262 >>> mbox cmd response: failed
1,330,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,268 >>> mbox cmd response: failed
1,330,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,548 UART: [state] LifecycleState = Unprovisioned
85,203 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
903,958 UART: [kat] SHA2-512-ACC
905,859 UART: [kat] ECC-384
915,582 UART: [kat] HMAC-384Kdf
920,008 UART: [kat] LMS
1,168,320 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,881 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,933 UART: [idev] Erasing UDS.KEYID = 0
1,197,603 UART: [idev] Sha1 KeyId Algorithm
1,206,553 UART: [idev] --
1,207,564 UART: [ldev] ++
1,207,732 UART: [ldev] CDI.KEYID = 6
1,208,096 UART: [ldev] SUBJECT.KEYID = 5
1,208,523 UART: [ldev] AUTHORITY.KEYID = 7
1,208,986 UART: [ldev] FE.KEYID = 1
1,214,326 UART: [ldev] Erasing FE.KEYID = 1
1,240,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,634 UART: [ldev] --
1,279,034 UART: [fwproc] Wait for Commands...
1,279,617 UART: [fwproc] Recv command 0x46574c44
1,280,350 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,594 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,458 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,605 >>> mbox cmd response: failed
1,183,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,611 >>> mbox cmd response: failed
1,183,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,416 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,281,039 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,338 UART: ROM Fatal Error: 0x000B003F
1,330,497 >>> mbox cmd response: failed
1,330,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,503 >>> mbox cmd response: failed
1,330,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,765 UART: [kat] HMAC-384Kdf
921,237 UART: [kat] LMS
1,169,549 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,174,692 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,764 UART: [idev] Sha1 KeyId Algorithm
1,208,812 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,827 UART: [fwproc] Wait for Commands...
1,283,634 UART: [fwproc] Recv command 0x46574c44
1,284,367 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,105 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,298 >>> mbox cmd response: failed
1,184,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,304 >>> mbox cmd response: failed
1,184,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,977 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,743 UART: [kat] SHA2-256
881,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,789 UART: [kat] ++
885,941 UART: [kat] sha1
890,061 UART: [kat] SHA2-256
891,999 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,220 UART: [kat] HMAC-384Kdf
906,648 UART: [kat] LMS
1,474,844 UART: [kat] --
1,475,775 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,478,906 UART: [idev] ++
1,479,074 UART: [idev] CDI.KEYID = 6
1,479,434 UART: [idev] SUBJECT.KEYID = 7
1,479,858 UART: [idev] UDS.KEYID = 0
1,480,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,616 UART: [idev] Erasing UDS.KEYID = 0
1,504,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,860 UART: [idev] --
1,513,979 UART: [ldev] ++
1,514,147 UART: [ldev] CDI.KEYID = 6
1,514,510 UART: [ldev] SUBJECT.KEYID = 5
1,514,936 UART: [ldev] AUTHORITY.KEYID = 7
1,515,399 UART: [ldev] FE.KEYID = 1
1,520,139 UART: [ldev] Erasing FE.KEYID = 1
1,545,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,970 UART: [ldev] --
1,584,351 UART: [fwproc] Waiting for Commands...
1,585,054 UART: [fwproc] Received command 0x46574c44
1,585,845 UART: [fwproc] Received Image of size 114332 bytes
1,632,203 UART: ROM Fatal Error: 0x000B003C
1,633,362 >>> mbox cmd response: failed
1,633,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,368 >>> mbox cmd response: failed
1,633,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,405 UART: [kat] SHA2-256
882,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,451 UART: [kat] ++
886,603 UART: [kat] sha1
890,691 UART: [kat] SHA2-256
892,629 UART: [kat] SHA2-384
895,570 UART: [kat] SHA2-512-ACC
897,471 UART: [kat] ECC-384
903,238 UART: [kat] HMAC-384Kdf
907,686 UART: [kat] LMS
1,475,882 UART: [kat] --
1,476,733 UART: [cold-reset] ++
1,477,107 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,030 UART: [idev] Erasing UDS.KEYID = 0
1,505,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,515,017 UART: [ldev] ++
1,515,185 UART: [ldev] CDI.KEYID = 6
1,515,548 UART: [ldev] SUBJECT.KEYID = 5
1,515,974 UART: [ldev] AUTHORITY.KEYID = 7
1,516,437 UART: [ldev] FE.KEYID = 1
1,521,675 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,924 UART: [ldev] --
1,586,419 UART: [fwproc] Waiting for Commands...
1,587,094 UART: [fwproc] Received command 0x46574c44
1,587,885 UART: [fwproc] Received Image of size 114332 bytes
2,885,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,258 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,610 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,423 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,379 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,283 >>> mbox cmd response: failed
1,487,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,289 >>> mbox cmd response: failed
1,487,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,471 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,342 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,412 UART: [kat] SHA2-256
892,350 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,521 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,815 UART: [idev] ++
1,479,983 UART: [idev] CDI.KEYID = 6
1,480,343 UART: [idev] SUBJECT.KEYID = 7
1,480,767 UART: [idev] UDS.KEYID = 0
1,481,112 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,701 UART: [idev] Erasing UDS.KEYID = 0
1,505,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,907 UART: [idev] --
1,514,784 UART: [ldev] ++
1,514,952 UART: [ldev] CDI.KEYID = 6
1,515,315 UART: [ldev] SUBJECT.KEYID = 5
1,515,741 UART: [ldev] AUTHORITY.KEYID = 7
1,516,204 UART: [ldev] FE.KEYID = 1
1,521,580 UART: [ldev] Erasing FE.KEYID = 1
1,547,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,175 UART: [ldev] --
1,586,684 UART: [fwproc] Waiting for Commands...
1,587,375 UART: [fwproc] Received command 0x46574c44
1,588,166 UART: [fwproc] Received Image of size 114332 bytes
1,634,616 UART: ROM Fatal Error: 0x000B003C
1,635,775 >>> mbox cmd response: failed
1,635,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,781 >>> mbox cmd response: failed
1,635,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,936 UART: [kat] SHA2-256
881,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,982 UART: [kat] ++
886,134 UART: [kat] sha1
890,312 UART: [kat] SHA2-256
892,250 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,221 UART: [kat] HMAC-384Kdf
906,913 UART: [kat] LMS
1,475,109 UART: [kat] --
1,475,832 UART: [cold-reset] ++
1,476,346 UART: [fht] Storing FHT @ 0x50003400
1,479,177 UART: [idev] ++
1,479,345 UART: [idev] CDI.KEYID = 6
1,479,705 UART: [idev] SUBJECT.KEYID = 7
1,480,129 UART: [idev] UDS.KEYID = 0
1,480,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,233 UART: [idev] Erasing UDS.KEYID = 0
1,504,999 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,786 UART: [ldev] ++
1,514,954 UART: [ldev] CDI.KEYID = 6
1,515,317 UART: [ldev] SUBJECT.KEYID = 5
1,515,743 UART: [ldev] AUTHORITY.KEYID = 7
1,516,206 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,547,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,285 UART: [ldev] --
1,586,662 UART: [fwproc] Waiting for Commands...
1,587,501 UART: [fwproc] Received command 0x46574c44
1,588,292 UART: [fwproc] Received Image of size 114332 bytes
2,886,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,407 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,554 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,892 >>> mbox cmd response: failed
1,486,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,898 >>> mbox cmd response: failed
1,486,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,170 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
893,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,603 UART: [kat] ++
897,755 UART: [kat] sha1
902,101 UART: [kat] SHA2-256
904,041 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
922,928 UART: [kat] LMS
1,171,256 UART: [kat] --
1,171,875 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,313 UART: [ldev] ++
1,210,481 UART: [ldev] CDI.KEYID = 6
1,210,844 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,654 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,252 UART: ROM Fatal Error: 0x000B003C
1,331,411 >>> mbox cmd response: failed
1,331,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,417 >>> mbox cmd response: failed
1,331,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,171,881 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,781 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,008 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,392 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,254 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,718 >>> mbox cmd response: failed
1,186,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,724 >>> mbox cmd response: failed
1,186,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,730 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,549 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,905 UART: [state] LifecycleState = Unprovisioned
86,560 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,626 UART: [kat] SHA2-256
904,566 UART: [kat] SHA2-384
907,319 UART: [kat] SHA2-512-ACC
909,220 UART: [kat] ECC-384
919,381 UART: [kat] HMAC-384Kdf
923,989 UART: [kat] LMS
1,172,317 UART: [kat] --
1,173,420 UART: [cold-reset] ++
1,173,856 UART: [fht] FHT @ 0x50003400
1,176,417 UART: [idev] ++
1,176,585 UART: [idev] CDI.KEYID = 6
1,176,945 UART: [idev] SUBJECT.KEYID = 7
1,177,369 UART: [idev] UDS.KEYID = 0
1,177,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,165 UART: [idev] Erasing UDS.KEYID = 0
1,202,080 UART: [idev] Sha1 KeyId Algorithm
1,210,566 UART: [idev] --
1,211,548 UART: [ldev] ++
1,211,716 UART: [ldev] CDI.KEYID = 6
1,212,079 UART: [ldev] SUBJECT.KEYID = 5
1,212,505 UART: [ldev] AUTHORITY.KEYID = 7
1,212,968 UART: [ldev] FE.KEYID = 1
1,217,888 UART: [ldev] Erasing FE.KEYID = 1
1,244,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,460 UART: [ldev] --
1,283,823 UART: [fwproc] Wait for Commands...
1,284,493 UART: [fwproc] Recv command 0x46574c44
1,285,221 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,861 UART: ROM Fatal Error: 0x000B003C
1,334,020 >>> mbox cmd response: failed
1,334,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,026 >>> mbox cmd response: failed
1,334,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
893,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,226 UART: [kat] ++
897,378 UART: [kat] sha1
901,618 UART: [kat] SHA2-256
903,558 UART: [kat] SHA2-384
906,327 UART: [kat] SHA2-512-ACC
908,228 UART: [kat] ECC-384
917,923 UART: [kat] HMAC-384Kdf
922,545 UART: [kat] LMS
1,170,873 UART: [kat] --
1,171,576 UART: [cold-reset] ++
1,171,960 UART: [fht] FHT @ 0x50003400
1,174,663 UART: [idev] ++
1,174,831 UART: [idev] CDI.KEYID = 6
1,175,191 UART: [idev] SUBJECT.KEYID = 7
1,175,615 UART: [idev] UDS.KEYID = 0
1,175,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,263 UART: [idev] Erasing UDS.KEYID = 0
1,201,248 UART: [idev] Sha1 KeyId Algorithm
1,209,692 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,440 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,092 UART: [ldev] --
1,283,379 UART: [fwproc] Wait for Commands...
1,284,001 UART: [fwproc] Recv command 0x46574c44
1,284,729 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,951 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,005 >>> mbox cmd response: failed
1,187,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,011 >>> mbox cmd response: failed
1,187,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,536 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,174,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,105 UART: [idev] Sha1 KeyId Algorithm
1,207,023 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,359 UART: [fwproc] Recv command 0x46574c44
1,282,092 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,799 UART: ROM Fatal Error: 0x000B003C
1,329,958 >>> mbox cmd response: failed
1,329,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,964 >>> mbox cmd response: failed
1,329,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,416 UART: [ldev] --
1,279,764 UART: [fwproc] Wait for Commands...
1,280,359 UART: [fwproc] Recv command 0x46574c44
1,281,092 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,300 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,779 >>> mbox cmd response: failed
1,183,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,785 >>> mbox cmd response: failed
1,183,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,974 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,939 UART: [kat] LMS
1,169,251 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46574c44
1,284,619 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,772 UART: ROM Fatal Error: 0x000B003C
1,332,931 >>> mbox cmd response: failed
1,332,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,937 >>> mbox cmd response: failed
1,332,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,174,950 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,744 UART: [idev] Erasing UDS.KEYID = 0
1,199,780 UART: [idev] Sha1 KeyId Algorithm
1,208,516 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,282,123 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,601 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,656 >>> mbox cmd response: failed
1,182,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,662 >>> mbox cmd response: failed
1,182,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,659 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
903,194 UART: [kat] HMAC-384Kdf
907,892 UART: [kat] LMS
1,476,088 UART: [kat] --
1,476,787 UART: [cold-reset] ++
1,477,259 UART: [fht] Storing FHT @ 0x50003400
1,479,936 UART: [idev] ++
1,480,104 UART: [idev] CDI.KEYID = 6
1,480,464 UART: [idev] SUBJECT.KEYID = 7
1,480,888 UART: [idev] UDS.KEYID = 0
1,481,233 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,970 UART: [idev] Erasing UDS.KEYID = 0
1,505,474 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,120 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,963 UART: [ldev] Erasing FE.KEYID = 1
1,547,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,962 UART: [ldev] --
1,586,273 UART: [fwproc] Waiting for Commands...
1,586,908 UART: [fwproc] Received command 0x46574c44
1,587,699 UART: [fwproc] Received Image of size 114332 bytes
2,910,707 UART: ROM Fatal Error: 0x000B002C
2,911,866 >>> mbox cmd response: failed
2,911,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,872 >>> mbox cmd response: failed
2,911,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,432 UART: [kat] LMS
1,475,628 UART: [kat] --
1,476,773 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,480,064 UART: [idev] ++
1,480,232 UART: [idev] CDI.KEYID = 6
1,480,592 UART: [idev] SUBJECT.KEYID = 7
1,481,016 UART: [idev] UDS.KEYID = 0
1,481,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,200 UART: [idev] Erasing UDS.KEYID = 0
1,505,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,370 UART: [idev] --
1,515,357 UART: [ldev] ++
1,515,525 UART: [ldev] CDI.KEYID = 6
1,515,888 UART: [ldev] SUBJECT.KEYID = 5
1,516,314 UART: [ldev] AUTHORITY.KEYID = 7
1,516,777 UART: [ldev] FE.KEYID = 1
1,521,959 UART: [ldev] Erasing FE.KEYID = 1
1,546,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,026 UART: [ldev] --
1,586,455 UART: [fwproc] Waiting for Commands...
1,587,106 UART: [fwproc] Received command 0x46574c44
1,587,897 UART: [fwproc] Received Image of size 114332 bytes
2,886,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,277 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,764,479 >>> mbox cmd response: failed
2,764,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,485 >>> mbox cmd response: failed
2,764,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,025 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Manufacturing
86,012 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,294 UART: [kat] SHA2-256
882,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,340 UART: [kat] ++
886,492 UART: [kat] sha1
890,772 UART: [kat] SHA2-256
892,710 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,010 UART: [fht] Storing FHT @ 0x50003400
1,479,659 UART: [idev] ++
1,479,827 UART: [idev] CDI.KEYID = 6
1,480,187 UART: [idev] SUBJECT.KEYID = 7
1,480,611 UART: [idev] UDS.KEYID = 0
1,480,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,247 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,514,950 UART: [ldev] ++
1,515,118 UART: [ldev] CDI.KEYID = 6
1,515,481 UART: [ldev] SUBJECT.KEYID = 5
1,515,907 UART: [ldev] AUTHORITY.KEYID = 7
1,516,370 UART: [ldev] FE.KEYID = 1
1,521,776 UART: [ldev] Erasing FE.KEYID = 1
1,546,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,413 UART: [ldev] --
1,585,834 UART: [fwproc] Waiting for Commands...
1,586,535 UART: [fwproc] Received command 0x46574c44
1,587,326 UART: [fwproc] Received Image of size 114332 bytes
2,910,614 UART: ROM Fatal Error: 0x000B002C
2,911,773 >>> mbox cmd response: failed
2,911,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,779 >>> mbox cmd response: failed
2,911,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,438 UART: [kat] SHA2-256
882,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,484 UART: [kat] ++
886,636 UART: [kat] sha1
891,096 UART: [kat] SHA2-256
893,034 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,397 UART: [kat] HMAC-384Kdf
908,043 UART: [kat] LMS
1,476,239 UART: [kat] --
1,477,508 UART: [cold-reset] ++
1,478,072 UART: [fht] Storing FHT @ 0x50003400
1,480,663 UART: [idev] ++
1,480,831 UART: [idev] CDI.KEYID = 6
1,481,191 UART: [idev] SUBJECT.KEYID = 7
1,481,615 UART: [idev] UDS.KEYID = 0
1,481,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,127 UART: [idev] Erasing UDS.KEYID = 0
1,505,667 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,433 UART: [idev] --
1,515,558 UART: [ldev] ++
1,515,726 UART: [ldev] CDI.KEYID = 6
1,516,089 UART: [ldev] SUBJECT.KEYID = 5
1,516,515 UART: [ldev] AUTHORITY.KEYID = 7
1,516,978 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,445 UART: [ldev] --
1,586,860 UART: [fwproc] Waiting for Commands...
1,587,717 UART: [fwproc] Received command 0x46574c44
1,588,508 UART: [fwproc] Received Image of size 114332 bytes
2,886,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,796 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,852 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,764,812 >>> mbox cmd response: failed
2,764,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,818 >>> mbox cmd response: failed
2,764,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,120 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
893,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,411 UART: [kat] ++
897,563 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,147 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,208 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,614 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,462 UART: ROM Fatal Error: 0x000B002C
2,607,621 >>> mbox cmd response: failed
2,607,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,627 >>> mbox cmd response: failed
2,607,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
893,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,207 UART: [kat] ++
897,359 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,499 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,200,581 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,281,788 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,130 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,242 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,979 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,460,924 >>> mbox cmd response: failed
2,460,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,930 >>> mbox cmd response: failed
2,460,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,145 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Manufacturing
85,962 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,145 UART: [kat] HMAC-384Kdf
922,579 UART: [kat] LMS
1,170,907 UART: [kat] --
1,171,806 UART: [cold-reset] ++
1,172,198 UART: [fht] FHT @ 0x50003400
1,174,771 UART: [idev] ++
1,174,939 UART: [idev] CDI.KEYID = 6
1,175,299 UART: [idev] SUBJECT.KEYID = 7
1,175,723 UART: [idev] UDS.KEYID = 0
1,176,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,801 UART: [idev] Erasing UDS.KEYID = 0
1,201,192 UART: [idev] Sha1 KeyId Algorithm
1,209,712 UART: [idev] --
1,210,724 UART: [ldev] ++
1,210,892 UART: [ldev] CDI.KEYID = 6
1,211,255 UART: [ldev] SUBJECT.KEYID = 5
1,211,681 UART: [ldev] AUTHORITY.KEYID = 7
1,212,144 UART: [ldev] FE.KEYID = 1
1,217,260 UART: [ldev] Erasing FE.KEYID = 1
1,243,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,110 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46574c44
1,284,973 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,987 UART: ROM Fatal Error: 0x000B002C
2,609,146 >>> mbox cmd response: failed
2,609,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,152 >>> mbox cmd response: failed
2,609,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,550 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,561 UART: [idev] ++
1,175,729 UART: [idev] CDI.KEYID = 6
1,176,089 UART: [idev] SUBJECT.KEYID = 7
1,176,513 UART: [idev] UDS.KEYID = 0
1,176,858 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,412 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,211,026 UART: [ldev] ++
1,211,194 UART: [ldev] CDI.KEYID = 6
1,211,557 UART: [ldev] SUBJECT.KEYID = 5
1,211,983 UART: [ldev] AUTHORITY.KEYID = 7
1,212,446 UART: [ldev] FE.KEYID = 1
1,217,870 UART: [ldev] Erasing FE.KEYID = 1
1,244,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,754 UART: [ldev] --
1,284,015 UART: [fwproc] Wait for Commands...
1,284,701 UART: [fwproc] Recv command 0x46574c44
1,285,429 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,821 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,400 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,460,699 >>> mbox cmd response: failed
2,460,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,705 >>> mbox cmd response: failed
2,460,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,342 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Manufacturing
85,811 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,174,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,250 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,487 UART: [fwproc] Recv command 0x46574c44
1,282,220 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,795 UART: ROM Fatal Error: 0x000B002C
2,604,954 >>> mbox cmd response: failed
2,604,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,960 >>> mbox cmd response: failed
2,604,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,571 UART: [idev] ++
1,173,739 UART: [idev] CDI.KEYID = 6
1,174,100 UART: [idev] SUBJECT.KEYID = 7
1,174,525 UART: [idev] UDS.KEYID = 0
1,174,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,194 UART: [fwproc] Wait for Commands...
1,280,943 UART: [fwproc] Recv command 0x46574c44
1,281,676 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,574 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,829 >>> mbox cmd response: failed
2,458,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,835 >>> mbox cmd response: failed
2,458,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,304 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Manufacturing
85,954 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,539 UART: [kat] HMAC-384Kdf
919,967 UART: [kat] LMS
1,168,279 UART: [kat] --
1,168,790 UART: [cold-reset] ++
1,169,320 UART: [fht] FHT @ 0x50003400
1,171,828 UART: [idev] ++
1,171,996 UART: [idev] CDI.KEYID = 6
1,172,357 UART: [idev] SUBJECT.KEYID = 7
1,172,782 UART: [idev] UDS.KEYID = 0
1,173,128 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,930 UART: [idev] Erasing UDS.KEYID = 0
1,197,996 UART: [idev] Sha1 KeyId Algorithm
1,206,730 UART: [idev] --
1,207,685 UART: [ldev] ++
1,207,853 UART: [ldev] CDI.KEYID = 6
1,208,217 UART: [ldev] SUBJECT.KEYID = 5
1,208,644 UART: [ldev] AUTHORITY.KEYID = 7
1,209,107 UART: [ldev] FE.KEYID = 1
1,214,255 UART: [ldev] Erasing FE.KEYID = 1
1,240,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,883 UART: [ldev] --
1,279,321 UART: [fwproc] Wait for Commands...
1,280,044 UART: [fwproc] Recv command 0x46574c44
1,280,777 UART: [fwproc] Recv'd Img size: 114332 bytes
2,602,488 UART: ROM Fatal Error: 0x000B002C
2,603,647 >>> mbox cmd response: failed
2,603,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,653 >>> mbox cmd response: failed
2,603,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,721 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,646 UART: [cold-reset] ++
1,170,060 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,174,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,877 UART: [ldev] --
1,282,329 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,645 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,959 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,226 >>> mbox cmd response: failed
2,457,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,232 >>> mbox cmd response: failed
2,457,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,285 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Manufacturing
85,699 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,725 UART: [kat] SHA2-256
881,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,771 UART: [kat] ++
885,923 UART: [kat] sha1
890,375 UART: [kat] SHA2-256
892,313 UART: [kat] SHA2-384
895,088 UART: [kat] SHA2-512-ACC
896,989 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,289 UART: [cold-reset] ++
1,476,721 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,020 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,535 UART: [ldev] ++
1,514,703 UART: [ldev] CDI.KEYID = 6
1,515,066 UART: [ldev] SUBJECT.KEYID = 5
1,515,492 UART: [ldev] AUTHORITY.KEYID = 7
1,515,955 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,754 UART: [ldev] --
1,586,041 UART: [fwproc] Waiting for Commands...
1,586,714 UART: [fwproc] Received command 0x46574c44
1,587,505 UART: [fwproc] Received Image of size 114332 bytes
2,909,377 UART: ROM Fatal Error: 0x000B002E
2,910,536 >>> mbox cmd response: failed
2,910,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,910,542 >>> mbox cmd response: failed
2,910,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,910,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,479 UART: [kat] SHA2-256
882,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,525 UART: [kat] ++
886,677 UART: [kat] sha1
890,919 UART: [kat] SHA2-256
892,857 UART: [kat] SHA2-384
895,596 UART: [kat] SHA2-512-ACC
897,497 UART: [kat] ECC-384
903,216 UART: [kat] HMAC-384Kdf
907,970 UART: [kat] LMS
1,476,166 UART: [kat] --
1,477,103 UART: [cold-reset] ++
1,477,581 UART: [fht] Storing FHT @ 0x50003400
1,480,272 UART: [idev] ++
1,480,440 UART: [idev] CDI.KEYID = 6
1,480,800 UART: [idev] SUBJECT.KEYID = 7
1,481,224 UART: [idev] UDS.KEYID = 0
1,481,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,544 UART: [idev] Erasing UDS.KEYID = 0
1,506,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,146 UART: [idev] --
1,516,215 UART: [ldev] ++
1,516,383 UART: [ldev] CDI.KEYID = 6
1,516,746 UART: [ldev] SUBJECT.KEYID = 5
1,517,172 UART: [ldev] AUTHORITY.KEYID = 7
1,517,635 UART: [ldev] FE.KEYID = 1
1,522,919 UART: [ldev] Erasing FE.KEYID = 1
1,548,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,266 UART: [ldev] --
1,587,731 UART: [fwproc] Waiting for Commands...
1,588,410 UART: [fwproc] Received command 0x46574c44
1,589,201 UART: [fwproc] Received Image of size 114332 bytes
2,886,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,110 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,293 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,171 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,764,255 >>> mbox cmd response: failed
2,764,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,261 >>> mbox cmd response: failed
2,764,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,533 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,801 UART: [state] LifecycleState = Manufacturing
85,456 UART: [state] DebugLocked = No
86,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,788 UART: [kat] SHA2-256
881,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,834 UART: [kat] ++
885,986 UART: [kat] sha1
890,356 UART: [kat] SHA2-256
892,294 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,211 UART: [kat] LMS
1,475,407 UART: [kat] --
1,476,186 UART: [cold-reset] ++
1,476,756 UART: [fht] Storing FHT @ 0x50003400
1,479,391 UART: [idev] ++
1,479,559 UART: [idev] CDI.KEYID = 6
1,479,919 UART: [idev] SUBJECT.KEYID = 7
1,480,343 UART: [idev] UDS.KEYID = 0
1,480,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,521 UART: [idev] Erasing UDS.KEYID = 0
1,505,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,240 UART: [ldev] ++
1,515,408 UART: [ldev] CDI.KEYID = 6
1,515,771 UART: [ldev] SUBJECT.KEYID = 5
1,516,197 UART: [ldev] AUTHORITY.KEYID = 7
1,516,660 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,775 UART: [ldev] --
1,586,094 UART: [fwproc] Waiting for Commands...
1,586,715 UART: [fwproc] Received command 0x46574c44
1,587,506 UART: [fwproc] Received Image of size 114332 bytes
2,910,110 UART: ROM Fatal Error: 0x000B002E
2,911,269 >>> mbox cmd response: failed
2,911,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,275 >>> mbox cmd response: failed
2,911,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,040 UART: [kat] SHA2-256
881,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,086 UART: [kat] ++
886,238 UART: [kat] sha1
890,310 UART: [kat] SHA2-256
892,248 UART: [kat] SHA2-384
894,927 UART: [kat] SHA2-512-ACC
896,828 UART: [kat] ECC-384
902,121 UART: [kat] HMAC-384Kdf
906,789 UART: [kat] LMS
1,474,985 UART: [kat] --
1,475,940 UART: [cold-reset] ++
1,476,502 UART: [fht] Storing FHT @ 0x50003400
1,479,213 UART: [idev] ++
1,479,381 UART: [idev] CDI.KEYID = 6
1,479,741 UART: [idev] SUBJECT.KEYID = 7
1,480,165 UART: [idev] UDS.KEYID = 0
1,480,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,011 UART: [idev] Erasing UDS.KEYID = 0
1,504,783 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,405 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,521,044 UART: [ldev] Erasing FE.KEYID = 1
1,546,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,601 UART: [ldev] --
1,585,896 UART: [fwproc] Waiting for Commands...
1,586,595 UART: [fwproc] Received command 0x46574c44
1,587,386 UART: [fwproc] Received Image of size 114332 bytes
2,885,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,384 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,765,732 >>> mbox cmd response: failed
2,765,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,738 >>> mbox cmd response: failed
2,765,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,798 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,808 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Manufacturing
85,787 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
893,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,329 UART: [kat] ++
897,481 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
917,904 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,685 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,215 UART: [idev] Sha1 KeyId Algorithm
1,208,473 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x46574c44
1,283,216 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,764 UART: ROM Fatal Error: 0x000B002E
2,607,923 >>> mbox cmd response: failed
2,607,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,929 >>> mbox cmd response: failed
2,607,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
893,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,479 UART: [kat] ++
897,631 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,790 UART: [kat] LMS
1,171,118 UART: [kat] --
1,171,911 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,637 UART: [idev] Sha1 KeyId Algorithm
1,209,157 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,670 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,065 UART: [ldev] --
1,283,498 UART: [fwproc] Wait for Commands...
1,284,164 UART: [fwproc] Recv command 0x46574c44
1,284,892 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,163 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,462,382 >>> mbox cmd response: failed
2,462,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,388 >>> mbox cmd response: failed
2,462,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,757 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Manufacturing
86,300 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
893,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,834 UART: [kat] ++
897,986 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,325 UART: [idev] ++
1,175,493 UART: [idev] CDI.KEYID = 6
1,175,853 UART: [idev] SUBJECT.KEYID = 7
1,176,277 UART: [idev] UDS.KEYID = 0
1,176,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,071 UART: [idev] Erasing UDS.KEYID = 0
1,201,472 UART: [idev] Sha1 KeyId Algorithm
1,209,978 UART: [idev] --
1,210,988 UART: [ldev] ++
1,211,156 UART: [ldev] CDI.KEYID = 6
1,211,519 UART: [ldev] SUBJECT.KEYID = 5
1,211,945 UART: [ldev] AUTHORITY.KEYID = 7
1,212,408 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,468 UART: [ldev] --
1,282,967 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,823 UART: ROM Fatal Error: 0x000B002E
2,607,982 >>> mbox cmd response: failed
2,607,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,988 >>> mbox cmd response: failed
2,607,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,625 UART: [kat] HMAC-384Kdf
923,053 UART: [kat] LMS
1,171,381 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,259 UART: [idev] ++
1,175,427 UART: [idev] CDI.KEYID = 6
1,175,787 UART: [idev] SUBJECT.KEYID = 7
1,176,211 UART: [idev] UDS.KEYID = 0
1,176,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,053 UART: [idev] Erasing UDS.KEYID = 0
1,201,188 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,918 UART: [ldev] ++
1,211,086 UART: [ldev] CDI.KEYID = 6
1,211,449 UART: [ldev] SUBJECT.KEYID = 5
1,211,875 UART: [ldev] AUTHORITY.KEYID = 7
1,212,338 UART: [ldev] FE.KEYID = 1
1,217,726 UART: [ldev] Erasing FE.KEYID = 1
1,244,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,400 UART: [ldev] --
1,283,885 UART: [fwproc] Wait for Commands...
1,284,697 UART: [fwproc] Recv command 0x46574c44
1,285,425 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,049 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,463,183 >>> mbox cmd response: failed
2,463,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,189 >>> mbox cmd response: failed
2,463,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,194 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,466 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Manufacturing
85,625 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
890,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,937 UART: [kat] ++
895,089 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,779 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,173,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,173 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,207,077 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,714 UART: [ldev] Erasing FE.KEYID = 1
1,240,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,206 UART: [ldev] --
1,279,522 UART: [fwproc] Wait for Commands...
1,280,237 UART: [fwproc] Recv command 0x46574c44
1,280,970 UART: [fwproc] Recv'd Img size: 114332 bytes
2,602,447 UART: ROM Fatal Error: 0x000B002E
2,603,606 >>> mbox cmd response: failed
2,603,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,612 >>> mbox cmd response: failed
2,603,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,268 UART: [kat] HMAC-384Kdf
920,008 UART: [kat] LMS
1,168,320 UART: [kat] --
1,169,211 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,367 UART: [idev] Erasing UDS.KEYID = 0
1,198,177 UART: [idev] Sha1 KeyId Algorithm
1,207,071 UART: [idev] --
1,208,044 UART: [ldev] ++
1,208,212 UART: [ldev] CDI.KEYID = 6
1,208,576 UART: [ldev] SUBJECT.KEYID = 5
1,209,003 UART: [ldev] AUTHORITY.KEYID = 7
1,209,466 UART: [ldev] FE.KEYID = 1
1,214,818 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,166 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,568 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,485 >>> mbox cmd response: failed
2,457,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,491 >>> mbox cmd response: failed
2,457,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,796 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Manufacturing
86,134 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,755 UART: [kat] SHA2-512-ACC
906,656 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,684 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,668 UART: [idev] Erasing UDS.KEYID = 0
1,198,370 UART: [idev] Sha1 KeyId Algorithm
1,207,248 UART: [idev] --
1,208,377 UART: [ldev] ++
1,208,545 UART: [ldev] CDI.KEYID = 6
1,208,909 UART: [ldev] SUBJECT.KEYID = 5
1,209,336 UART: [ldev] AUTHORITY.KEYID = 7
1,209,799 UART: [ldev] FE.KEYID = 1
1,215,175 UART: [ldev] Erasing FE.KEYID = 1
1,241,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,751 UART: [ldev] --
1,281,213 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,542 UART: ROM Fatal Error: 0x000B002E
2,606,701 >>> mbox cmd response: failed
2,606,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,707 >>> mbox cmd response: failed
2,606,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,668 UART: [idev] ++
1,173,836 UART: [idev] CDI.KEYID = 6
1,174,197 UART: [idev] SUBJECT.KEYID = 7
1,174,622 UART: [idev] UDS.KEYID = 0
1,174,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,253 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,603 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,555 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,280 >>> mbox cmd response: failed
2,458,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,286 >>> mbox cmd response: failed
2,458,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,515 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,343 >>> mbox cmd response: failed
1,203,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,349 >>> mbox cmd response: failed
1,203,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,363 UART: [kat] SHA2-256
882,294 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,409 UART: [kat] ++
886,561 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
903,208 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,476,621 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,756 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,830 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,571 UART: [ldev] Erasing FE.KEYID = 1
1,546,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,734 UART: [ldev] --
1,586,095 UART: [fwproc] Waiting for Commands...
1,586,872 UART: [fwproc] Received command 0x46574c44
1,587,663 UART: [fwproc] Received Image of size 114332 bytes
2,886,380 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,390 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,545 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,261 >>> mbox cmd response: failed
1,202,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,267 >>> mbox cmd response: failed
1,202,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,951 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,374 >>> mbox cmd response: failed
1,203,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,380 >>> mbox cmd response: failed
1,203,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
908,019 UART: [kat] LMS
1,476,215 UART: [kat] --
1,477,338 UART: [cold-reset] ++
1,477,780 UART: [fht] Storing FHT @ 0x50003400
1,480,737 UART: [idev] ++
1,480,905 UART: [idev] CDI.KEYID = 6
1,481,265 UART: [idev] SUBJECT.KEYID = 7
1,481,689 UART: [idev] UDS.KEYID = 0
1,482,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,465 UART: [idev] Erasing UDS.KEYID = 0
1,506,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,799 UART: [idev] --
1,515,976 UART: [ldev] ++
1,516,144 UART: [ldev] CDI.KEYID = 6
1,516,507 UART: [ldev] SUBJECT.KEYID = 5
1,516,933 UART: [ldev] AUTHORITY.KEYID = 7
1,517,396 UART: [ldev] FE.KEYID = 1
1,522,804 UART: [ldev] Erasing FE.KEYID = 1
1,548,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,457 UART: [ldev] --
1,587,958 UART: [fwproc] Waiting for Commands...
1,588,653 UART: [fwproc] Received command 0x46574c44
1,589,444 UART: [fwproc] Received Image of size 114332 bytes
2,886,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,332 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,110 >>> mbox cmd response: failed
1,203,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,116 >>> mbox cmd response: failed
1,203,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,784 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,539 >>> mbox cmd response: failed
1,202,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,545 >>> mbox cmd response: failed
1,202,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,568 UART: [kat] LMS
1,170,896 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,297 UART: [fht] FHT @ 0x50003400
1,174,856 UART: [idev] ++
1,175,024 UART: [idev] CDI.KEYID = 6
1,175,384 UART: [idev] SUBJECT.KEYID = 7
1,175,808 UART: [idev] UDS.KEYID = 0
1,176,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,920 UART: [idev] Erasing UDS.KEYID = 0
1,201,225 UART: [idev] Sha1 KeyId Algorithm
1,209,673 UART: [idev] --
1,210,551 UART: [ldev] ++
1,210,719 UART: [ldev] CDI.KEYID = 6
1,211,082 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,704 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,126 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,088 >>> mbox cmd response: failed
1,203,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,094 >>> mbox cmd response: failed
1,203,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,595 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,145 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,916 >>> mbox cmd response: failed
1,203,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,922 >>> mbox cmd response: failed
1,203,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,095 UART: [kat] HMAC-384Kdf
922,661 UART: [kat] LMS
1,170,989 UART: [kat] --
1,172,124 UART: [cold-reset] ++
1,172,552 UART: [fht] FHT @ 0x50003400
1,175,157 UART: [idev] ++
1,175,325 UART: [idev] CDI.KEYID = 6
1,175,685 UART: [idev] SUBJECT.KEYID = 7
1,176,109 UART: [idev] UDS.KEYID = 0
1,176,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,058 UART: [idev] Sha1 KeyId Algorithm
1,209,596 UART: [idev] --
1,210,574 UART: [ldev] ++
1,210,742 UART: [ldev] CDI.KEYID = 6
1,211,105 UART: [ldev] SUBJECT.KEYID = 5
1,211,531 UART: [ldev] AUTHORITY.KEYID = 7
1,211,994 UART: [ldev] FE.KEYID = 1
1,217,326 UART: [ldev] Erasing FE.KEYID = 1
1,244,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,084 UART: [ldev] --
1,283,411 UART: [fwproc] Wait for Commands...
1,284,053 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,557 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,088 >>> mbox cmd response: failed
1,203,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,094 >>> mbox cmd response: failed
1,203,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,026 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,413 >>> mbox cmd response: failed
1,202,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,419 >>> mbox cmd response: failed
1,202,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,522 UART: [kat] HMAC-384Kdf
919,920 UART: [kat] LMS
1,168,232 UART: [kat] --
1,169,187 UART: [cold-reset] ++
1,169,625 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,216 UART: [ldev] ++
1,208,384 UART: [ldev] CDI.KEYID = 6
1,208,748 UART: [ldev] SUBJECT.KEYID = 5
1,209,175 UART: [ldev] AUTHORITY.KEYID = 7
1,209,638 UART: [ldev] FE.KEYID = 1
1,214,558 UART: [ldev] Erasing FE.KEYID = 1
1,240,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,276 UART: [ldev] --
1,280,692 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,990 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,883 >>> mbox cmd response: failed
1,203,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,889 >>> mbox cmd response: failed
1,203,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,392 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,487 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,764 >>> mbox cmd response: failed
1,203,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,770 >>> mbox cmd response: failed
1,203,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,885 UART: [state] LifecycleState = Unprovisioned
85,540 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,423 UART: [kat] SHA2-512-ACC
906,324 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,174,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,198,810 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,503 UART: [ldev] ++
1,208,671 UART: [ldev] CDI.KEYID = 6
1,209,035 UART: [ldev] SUBJECT.KEYID = 5
1,209,462 UART: [ldev] AUTHORITY.KEYID = 7
1,209,925 UART: [ldev] FE.KEYID = 1
1,215,041 UART: [ldev] Erasing FE.KEYID = 1
1,241,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,045 UART: [ldev] --
1,280,333 UART: [fwproc] Wait for Commands...
1,280,986 UART: [fwproc] Recv command 0x46574c44
1,281,719 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,587 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,204,784 >>> mbox cmd response: failed
1,204,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,790 >>> mbox cmd response: failed
1,204,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,729 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,209 UART: [kat] SHA2-256
892,147 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,120 UART: [kat] HMAC-384Kdf
906,798 UART: [kat] LMS
1,474,994 UART: [kat] --
1,476,003 UART: [cold-reset] ++
1,476,361 UART: [fht] Storing FHT @ 0x50003400
1,479,110 UART: [idev] ++
1,479,278 UART: [idev] CDI.KEYID = 6
1,479,638 UART: [idev] SUBJECT.KEYID = 7
1,480,062 UART: [idev] UDS.KEYID = 0
1,480,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,546 UART: [idev] Erasing UDS.KEYID = 0
1,503,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,354 UART: [idev] --
1,513,305 UART: [ldev] ++
1,513,473 UART: [ldev] CDI.KEYID = 6
1,513,836 UART: [ldev] SUBJECT.KEYID = 5
1,514,262 UART: [ldev] AUTHORITY.KEYID = 7
1,514,725 UART: [ldev] FE.KEYID = 1
1,519,821 UART: [ldev] Erasing FE.KEYID = 1
1,545,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,486 UART: [ldev] --
1,584,937 UART: [fwproc] Waiting for Commands...
1,585,566 UART: [fwproc] Received command 0x46574c44
1,586,357 UART: [fwproc] Received Image of size 114332 bytes
1,633,116 UART: ROM Fatal Error: 0x000B0012
1,634,273 >>> mbox cmd response: failed
1,634,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,279 >>> mbox cmd response: failed
1,634,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,240 UART: [kat] HMAC-384Kdf
907,816 UART: [kat] LMS
1,476,012 UART: [kat] --
1,477,003 UART: [cold-reset] ++
1,477,471 UART: [fht] Storing FHT @ 0x50003400
1,480,196 UART: [idev] ++
1,480,364 UART: [idev] CDI.KEYID = 6
1,480,724 UART: [idev] SUBJECT.KEYID = 7
1,481,148 UART: [idev] UDS.KEYID = 0
1,481,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,178 UART: [idev] Erasing UDS.KEYID = 0
1,505,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,396 UART: [idev] --
1,515,315 UART: [ldev] ++
1,515,483 UART: [ldev] CDI.KEYID = 6
1,515,846 UART: [ldev] SUBJECT.KEYID = 5
1,516,272 UART: [ldev] AUTHORITY.KEYID = 7
1,516,735 UART: [ldev] FE.KEYID = 1
1,522,191 UART: [ldev] Erasing FE.KEYID = 1
1,548,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,058 UART: [ldev] --
1,587,355 UART: [fwproc] Waiting for Commands...
1,588,104 UART: [fwproc] Received command 0x46574c44
1,588,895 UART: [fwproc] Received Image of size 114332 bytes
2,887,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,804 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,077 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,028 >>> mbox cmd response: failed
1,488,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,034 >>> mbox cmd response: failed
1,488,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,793 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,850 UART: [kat] SHA2-256
892,788 UART: [kat] SHA2-384
895,637 UART: [kat] SHA2-512-ACC
897,538 UART: [kat] ECC-384
903,335 UART: [kat] HMAC-384Kdf
907,977 UART: [kat] LMS
1,476,173 UART: [kat] --
1,477,356 UART: [cold-reset] ++
1,477,688 UART: [fht] Storing FHT @ 0x50003400
1,480,489 UART: [idev] ++
1,480,657 UART: [idev] CDI.KEYID = 6
1,481,017 UART: [idev] SUBJECT.KEYID = 7
1,481,441 UART: [idev] UDS.KEYID = 0
1,481,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,505 UART: [idev] Erasing UDS.KEYID = 0
1,506,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,819 UART: [idev] --
1,515,896 UART: [ldev] ++
1,516,064 UART: [ldev] CDI.KEYID = 6
1,516,427 UART: [ldev] SUBJECT.KEYID = 5
1,516,853 UART: [ldev] AUTHORITY.KEYID = 7
1,517,316 UART: [ldev] FE.KEYID = 1
1,522,650 UART: [ldev] Erasing FE.KEYID = 1
1,547,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,053 UART: [ldev] --
1,587,336 UART: [fwproc] Waiting for Commands...
1,588,201 UART: [fwproc] Received command 0x46574c44
1,588,992 UART: [fwproc] Received Image of size 114332 bytes
1,637,261 UART: ROM Fatal Error: 0x000B0012
1,638,418 >>> mbox cmd response: failed
1,638,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,424 >>> mbox cmd response: failed
1,638,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
903,077 UART: [kat] HMAC-384Kdf
907,635 UART: [kat] LMS
1,475,831 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,028 UART: [fht] Storing FHT @ 0x50003400
1,479,855 UART: [idev] ++
1,480,023 UART: [idev] CDI.KEYID = 6
1,480,383 UART: [idev] SUBJECT.KEYID = 7
1,480,807 UART: [idev] UDS.KEYID = 0
1,481,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,785 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,144 UART: [ldev] ++
1,515,312 UART: [ldev] CDI.KEYID = 6
1,515,675 UART: [ldev] SUBJECT.KEYID = 5
1,516,101 UART: [ldev] AUTHORITY.KEYID = 7
1,516,564 UART: [ldev] FE.KEYID = 1
1,521,744 UART: [ldev] Erasing FE.KEYID = 1
1,547,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,227 UART: [ldev] --
1,586,492 UART: [fwproc] Waiting for Commands...
1,587,213 UART: [fwproc] Received command 0x46574c44
1,588,004 UART: [fwproc] Received Image of size 114332 bytes
2,885,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,770 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,215 >>> mbox cmd response: failed
1,489,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,221 >>> mbox cmd response: failed
1,489,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,736 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
893,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,749 UART: [kat] ++
897,901 UART: [kat] sha1
902,337 UART: [kat] SHA2-256
904,277 UART: [kat] SHA2-384
906,898 UART: [kat] SHA2-512-ACC
908,799 UART: [kat] ECC-384
918,550 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,423 UART: [cold-reset] ++
1,172,899 UART: [fht] FHT @ 0x50003400
1,175,400 UART: [idev] ++
1,175,568 UART: [idev] CDI.KEYID = 6
1,175,928 UART: [idev] SUBJECT.KEYID = 7
1,176,352 UART: [idev] UDS.KEYID = 0
1,176,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,589 UART: [idev] Sha1 KeyId Algorithm
1,208,857 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,528 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,240 UART: [fwproc] Wait for Commands...
1,282,820 UART: [fwproc] Recv command 0x46574c44
1,283,548 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,817 UART: ROM Fatal Error: 0x000B0012
1,330,974 >>> mbox cmd response: failed
1,330,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,980 >>> mbox cmd response: failed
1,330,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,965 UART: [state] WD Timer not started. Device not locked for debugging
88,256 UART: [kat] SHA2-256
893,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,031 UART: [kat] ++
898,183 UART: [kat] sha1
902,505 UART: [kat] SHA2-256
904,445 UART: [kat] SHA2-384
907,012 UART: [kat] SHA2-512-ACC
908,913 UART: [kat] ECC-384
918,614 UART: [kat] HMAC-384Kdf
923,180 UART: [kat] LMS
1,171,508 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,693 UART: [fht] FHT @ 0x50003400
1,175,284 UART: [idev] ++
1,175,452 UART: [idev] CDI.KEYID = 6
1,175,812 UART: [idev] SUBJECT.KEYID = 7
1,176,236 UART: [idev] UDS.KEYID = 0
1,176,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,834 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,683 UART: [idev] --
1,210,787 UART: [ldev] ++
1,210,955 UART: [ldev] CDI.KEYID = 6
1,211,318 UART: [ldev] SUBJECT.KEYID = 5
1,211,744 UART: [ldev] AUTHORITY.KEYID = 7
1,212,207 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,569 UART: [ldev] --
1,282,974 UART: [fwproc] Wait for Commands...
1,283,678 UART: [fwproc] Recv command 0x46574c44
1,284,406 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,574 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,465 >>> mbox cmd response: failed
1,187,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,471 >>> mbox cmd response: failed
1,187,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,747 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
893,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,072 UART: [kat] ++
898,224 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
906,973 UART: [kat] SHA2-512-ACC
908,874 UART: [kat] ECC-384
919,175 UART: [kat] HMAC-384Kdf
923,919 UART: [kat] LMS
1,172,247 UART: [kat] --
1,173,170 UART: [cold-reset] ++
1,173,512 UART: [fht] FHT @ 0x50003400
1,176,223 UART: [idev] ++
1,176,391 UART: [idev] CDI.KEYID = 6
1,176,751 UART: [idev] SUBJECT.KEYID = 7
1,177,175 UART: [idev] UDS.KEYID = 0
1,177,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,121 UART: [idev] Erasing UDS.KEYID = 0
1,202,356 UART: [idev] Sha1 KeyId Algorithm
1,210,766 UART: [idev] --
1,211,676 UART: [ldev] ++
1,211,844 UART: [ldev] CDI.KEYID = 6
1,212,207 UART: [ldev] SUBJECT.KEYID = 5
1,212,633 UART: [ldev] AUTHORITY.KEYID = 7
1,213,096 UART: [ldev] FE.KEYID = 1
1,218,366 UART: [ldev] Erasing FE.KEYID = 1
1,245,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,650 UART: [ldev] --
1,283,953 UART: [fwproc] Wait for Commands...
1,284,613 UART: [fwproc] Recv command 0x46574c44
1,285,341 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,932 UART: ROM Fatal Error: 0x000B0012
1,334,089 >>> mbox cmd response: failed
1,334,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,095 >>> mbox cmd response: failed
1,334,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
907,249 UART: [kat] SHA2-512-ACC
909,150 UART: [kat] ECC-384
919,061 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,820 UART: [cold-reset] ++
1,173,228 UART: [fht] FHT @ 0x50003400
1,176,099 UART: [idev] ++
1,176,267 UART: [idev] CDI.KEYID = 6
1,176,627 UART: [idev] SUBJECT.KEYID = 7
1,177,051 UART: [idev] UDS.KEYID = 0
1,177,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,335 UART: [idev] Erasing UDS.KEYID = 0
1,202,358 UART: [idev] Sha1 KeyId Algorithm
1,210,890 UART: [idev] --
1,211,870 UART: [ldev] ++
1,212,038 UART: [ldev] CDI.KEYID = 6
1,212,401 UART: [ldev] SUBJECT.KEYID = 5
1,212,827 UART: [ldev] AUTHORITY.KEYID = 7
1,213,290 UART: [ldev] FE.KEYID = 1
1,218,370 UART: [ldev] Erasing FE.KEYID = 1
1,244,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,554 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,765 UART: [fwproc] Recv command 0x46574c44
1,285,493 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,439 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,050 >>> mbox cmd response: failed
1,187,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,056 >>> mbox cmd response: failed
1,187,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,624 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,174,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,609 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,782 UART: [ldev] --
1,280,232 UART: [fwproc] Wait for Commands...
1,280,895 UART: [fwproc] Recv command 0x46574c44
1,281,628 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,095 UART: ROM Fatal Error: 0x000B0012
1,328,252 >>> mbox cmd response: failed
1,328,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,258 >>> mbox cmd response: failed
1,328,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,109 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,174,079 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,215,118 UART: [ldev] Erasing FE.KEYID = 1
1,241,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,181 UART: [fwproc] Recv command 0x46574c44
1,281,914 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,204 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,145 >>> mbox cmd response: failed
1,183,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,151 >>> mbox cmd response: failed
1,183,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,820 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,174,466 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,641 UART: [ldev] --
1,281,003 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,417 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,198 UART: ROM Fatal Error: 0x000B0012
1,330,355 >>> mbox cmd response: failed
1,330,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,361 >>> mbox cmd response: failed
1,330,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,451 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,453 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,716 >>> mbox cmd response: failed
1,183,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,722 >>> mbox cmd response: failed
1,183,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,947 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,765 UART: [kat] SHA2-256
881,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,811 UART: [kat] ++
885,963 UART: [kat] sha1
890,283 UART: [kat] SHA2-256
892,221 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,180 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,476,079 UART: [cold-reset] ++
1,476,599 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,032 UART: [idev] Erasing UDS.KEYID = 0
1,505,108 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,857 UART: [ldev] ++
1,515,025 UART: [ldev] CDI.KEYID = 6
1,515,388 UART: [ldev] SUBJECT.KEYID = 5
1,515,814 UART: [ldev] AUTHORITY.KEYID = 7
1,516,277 UART: [ldev] FE.KEYID = 1
1,521,349 UART: [ldev] Erasing FE.KEYID = 1
1,547,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,336 UART: [ldev] --
1,586,781 UART: [fwproc] Waiting for Commands...
1,587,472 UART: [fwproc] Received command 0x46574c44
1,588,263 UART: [fwproc] Received Image of size 114332 bytes
1,630,900 UART: ROM Fatal Error: 0x000B0010
1,632,057 >>> mbox cmd response: failed
1,632,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,063 >>> mbox cmd response: failed
1,632,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
85,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,639 UART: [kat] SHA2-256
881,570 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,685 UART: [kat] ++
885,837 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,884 UART: [kat] SHA2-512-ACC
896,785 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,353 UART: [cold-reset] ++
1,476,895 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,530 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,844 UART: [idev] --
1,514,737 UART: [ldev] ++
1,514,905 UART: [ldev] CDI.KEYID = 6
1,515,268 UART: [ldev] SUBJECT.KEYID = 5
1,515,694 UART: [ldev] AUTHORITY.KEYID = 7
1,516,157 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,547,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,252 UART: [ldev] --
1,586,567 UART: [fwproc] Waiting for Commands...
1,587,234 UART: [fwproc] Received command 0x46574c44
1,588,025 UART: [fwproc] Received Image of size 114332 bytes
2,885,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,685 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,484,416 >>> mbox cmd response: failed
1,484,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,422 >>> mbox cmd response: failed
1,484,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,361 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,684 UART: [kat] SHA2-256
882,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,730 UART: [kat] ++
886,882 UART: [kat] sha1
891,260 UART: [kat] SHA2-256
893,198 UART: [kat] SHA2-384
895,939 UART: [kat] SHA2-512-ACC
897,840 UART: [kat] ECC-384
903,461 UART: [kat] HMAC-384Kdf
908,113 UART: [kat] LMS
1,476,309 UART: [kat] --
1,477,284 UART: [cold-reset] ++
1,477,658 UART: [fht] Storing FHT @ 0x50003400
1,480,457 UART: [idev] ++
1,480,625 UART: [idev] CDI.KEYID = 6
1,480,985 UART: [idev] SUBJECT.KEYID = 7
1,481,409 UART: [idev] UDS.KEYID = 0
1,481,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,305 UART: [idev] Erasing UDS.KEYID = 0
1,506,133 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,741 UART: [idev] --
1,515,688 UART: [ldev] ++
1,515,856 UART: [ldev] CDI.KEYID = 6
1,516,219 UART: [ldev] SUBJECT.KEYID = 5
1,516,645 UART: [ldev] AUTHORITY.KEYID = 7
1,517,108 UART: [ldev] FE.KEYID = 1
1,522,520 UART: [ldev] Erasing FE.KEYID = 1
1,548,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,895 UART: [ldev] --
1,587,232 UART: [fwproc] Waiting for Commands...
1,587,975 UART: [fwproc] Received command 0x46574c44
1,588,766 UART: [fwproc] Received Image of size 114332 bytes
1,631,195 UART: ROM Fatal Error: 0x000B0010
1,632,352 >>> mbox cmd response: failed
1,632,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,358 >>> mbox cmd response: failed
1,632,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
890,976 UART: [kat] SHA2-256
892,914 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,377 UART: [kat] HMAC-384Kdf
908,231 UART: [kat] LMS
1,476,427 UART: [kat] --
1,477,310 UART: [cold-reset] ++
1,477,728 UART: [fht] Storing FHT @ 0x50003400
1,480,533 UART: [idev] ++
1,480,701 UART: [idev] CDI.KEYID = 6
1,481,061 UART: [idev] SUBJECT.KEYID = 7
1,481,485 UART: [idev] UDS.KEYID = 0
1,481,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,717 UART: [idev] Erasing UDS.KEYID = 0
1,506,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,217 UART: [idev] --
1,516,112 UART: [ldev] ++
1,516,280 UART: [ldev] CDI.KEYID = 6
1,516,643 UART: [ldev] SUBJECT.KEYID = 5
1,517,069 UART: [ldev] AUTHORITY.KEYID = 7
1,517,532 UART: [ldev] FE.KEYID = 1
1,522,716 UART: [ldev] Erasing FE.KEYID = 1
1,548,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,229 UART: [ldev] --
1,587,610 UART: [fwproc] Waiting for Commands...
1,588,361 UART: [fwproc] Received command 0x46574c44
1,589,152 UART: [fwproc] Received Image of size 114332 bytes
2,886,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,441 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,748 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,484,613 >>> mbox cmd response: failed
1,484,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,619 >>> mbox cmd response: failed
1,484,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,688 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
85,933 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
892,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,989 UART: [kat] ++
897,141 UART: [kat] sha1
901,405 UART: [kat] SHA2-256
903,345 UART: [kat] SHA2-384
905,990 UART: [kat] SHA2-512-ACC
907,891 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,925 UART: [fht] FHT @ 0x50003400
1,174,628 UART: [idev] ++
1,174,796 UART: [idev] CDI.KEYID = 6
1,175,156 UART: [idev] SUBJECT.KEYID = 7
1,175,580 UART: [idev] UDS.KEYID = 0
1,175,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,007 UART: [idev] Sha1 KeyId Algorithm
1,208,379 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,030 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,943 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,749 UART: ROM Fatal Error: 0x000B0010
1,325,906 >>> mbox cmd response: failed
1,325,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,912 >>> mbox cmd response: failed
1,325,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,999 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,452 UART: [idev] Erasing UDS.KEYID = 0
1,201,057 UART: [idev] Sha1 KeyId Algorithm
1,209,485 UART: [idev] --
1,210,409 UART: [ldev] ++
1,210,577 UART: [ldev] CDI.KEYID = 6
1,210,940 UART: [ldev] SUBJECT.KEYID = 5
1,211,366 UART: [ldev] AUTHORITY.KEYID = 7
1,211,829 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,320 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,232 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,789 >>> mbox cmd response: failed
1,181,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,795 >>> mbox cmd response: failed
1,181,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,801 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,202,052 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,504 UART: [ldev] ++
1,211,672 UART: [ldev] CDI.KEYID = 6
1,212,035 UART: [ldev] SUBJECT.KEYID = 5
1,212,461 UART: [ldev] AUTHORITY.KEYID = 7
1,212,924 UART: [ldev] FE.KEYID = 1
1,218,326 UART: [ldev] Erasing FE.KEYID = 1
1,244,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,116 UART: [ldev] --
1,283,587 UART: [fwproc] Wait for Commands...
1,284,379 UART: [fwproc] Recv command 0x46574c44
1,285,107 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,156 UART: ROM Fatal Error: 0x000B0010
1,328,313 >>> mbox cmd response: failed
1,328,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,319 >>> mbox cmd response: failed
1,328,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,563 UART: [kat] LMS
1,171,891 UART: [kat] --
1,173,064 UART: [cold-reset] ++
1,173,416 UART: [fht] FHT @ 0x50003400
1,176,123 UART: [idev] ++
1,176,291 UART: [idev] CDI.KEYID = 6
1,176,651 UART: [idev] SUBJECT.KEYID = 7
1,177,075 UART: [idev] UDS.KEYID = 0
1,177,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,167 UART: [idev] Erasing UDS.KEYID = 0
1,202,538 UART: [idev] Sha1 KeyId Algorithm
1,211,000 UART: [idev] --
1,212,020 UART: [ldev] ++
1,212,188 UART: [ldev] CDI.KEYID = 6
1,212,551 UART: [ldev] SUBJECT.KEYID = 5
1,212,977 UART: [ldev] AUTHORITY.KEYID = 7
1,213,440 UART: [ldev] FE.KEYID = 1
1,219,106 UART: [ldev] Erasing FE.KEYID = 1
1,245,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,382 UART: [ldev] --
1,285,759 UART: [fwproc] Wait for Commands...
1,286,461 UART: [fwproc] Recv command 0x46574c44
1,287,189 UART: [fwproc] Recv'd Img size: 114332 bytes
2,585,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,409 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,136 >>> mbox cmd response: failed
1,182,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,142 >>> mbox cmd response: failed
1,182,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,392 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,140 UART: [kat] LMS
1,168,452 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,815 UART: [fht] FHT @ 0x50003400
1,172,391 UART: [idev] ++
1,172,559 UART: [idev] CDI.KEYID = 6
1,172,920 UART: [idev] SUBJECT.KEYID = 7
1,173,345 UART: [idev] UDS.KEYID = 0
1,173,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,208,078 UART: [ldev] ++
1,208,246 UART: [ldev] CDI.KEYID = 6
1,208,610 UART: [ldev] SUBJECT.KEYID = 5
1,209,037 UART: [ldev] AUTHORITY.KEYID = 7
1,209,500 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,240,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,720 UART: [ldev] --
1,280,024 UART: [fwproc] Wait for Commands...
1,280,789 UART: [fwproc] Recv command 0x46574c44
1,281,522 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,027 UART: ROM Fatal Error: 0x000B0010
1,325,184 >>> mbox cmd response: failed
1,325,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,190 >>> mbox cmd response: failed
1,325,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,229 UART: [kat] SHA2-256
902,169 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,343 UART: [idev] ++
1,173,511 UART: [idev] CDI.KEYID = 6
1,173,872 UART: [idev] SUBJECT.KEYID = 7
1,174,297 UART: [idev] UDS.KEYID = 0
1,174,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,653 UART: [idev] Erasing UDS.KEYID = 0
1,199,733 UART: [idev] Sha1 KeyId Algorithm
1,208,733 UART: [idev] --
1,209,798 UART: [ldev] ++
1,209,966 UART: [ldev] CDI.KEYID = 6
1,210,330 UART: [ldev] SUBJECT.KEYID = 5
1,210,757 UART: [ldev] AUTHORITY.KEYID = 7
1,211,220 UART: [ldev] FE.KEYID = 1
1,216,428 UART: [ldev] Erasing FE.KEYID = 1
1,242,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,332 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,387 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,358 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,323 >>> mbox cmd response: failed
1,178,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,329 >>> mbox cmd response: failed
1,178,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,818 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,174,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,810 UART: ROM Fatal Error: 0x000B0010
1,325,967 >>> mbox cmd response: failed
1,325,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,973 >>> mbox cmd response: failed
1,325,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,198,446 UART: [idev] Sha1 KeyId Algorithm
1,207,474 UART: [idev] --
1,208,317 UART: [ldev] ++
1,208,485 UART: [ldev] CDI.KEYID = 6
1,208,849 UART: [ldev] SUBJECT.KEYID = 5
1,209,276 UART: [ldev] AUTHORITY.KEYID = 7
1,209,739 UART: [ldev] FE.KEYID = 1
1,215,033 UART: [ldev] Erasing FE.KEYID = 1
1,241,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,751 UART: [ldev] --
1,281,223 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,581 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,166 >>> mbox cmd response: failed
1,179,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,172 >>> mbox cmd response: failed
1,179,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,325 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,853 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,009 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,192 UART: [idev] ++
1,479,360 UART: [idev] CDI.KEYID = 6
1,479,720 UART: [idev] SUBJECT.KEYID = 7
1,480,144 UART: [idev] UDS.KEYID = 0
1,480,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,188 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,521,047 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,460 UART: [ldev] --
1,585,753 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 114332 bytes
1,633,744 UART: ROM Fatal Error: 0x000B0040
1,634,901 >>> mbox cmd response: failed
1,634,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,907 >>> mbox cmd response: failed
1,634,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
902,630 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,317 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,996 UART: [idev] Erasing UDS.KEYID = 0
1,505,724 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,278 UART: [idev] --
1,515,381 UART: [ldev] ++
1,515,549 UART: [ldev] CDI.KEYID = 6
1,515,912 UART: [ldev] SUBJECT.KEYID = 5
1,516,338 UART: [ldev] AUTHORITY.KEYID = 7
1,516,801 UART: [ldev] FE.KEYID = 1
1,522,025 UART: [ldev] Erasing FE.KEYID = 1
1,547,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,324 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,516 UART: [fwproc] Received command 0x46574c44
1,588,307 UART: [fwproc] Received Image of size 114332 bytes
2,886,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,773 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,800 >>> mbox cmd response: failed
1,488,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,806 >>> mbox cmd response: failed
1,488,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,481 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,854 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,977 UART: [idev] Erasing UDS.KEYID = 0
1,505,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,522,478 UART: [ldev] Erasing FE.KEYID = 1
1,547,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,527 UART: [ldev] --
1,587,814 UART: [fwproc] Waiting for Commands...
1,588,571 UART: [fwproc] Received command 0x46574c44
1,589,362 UART: [fwproc] Received Image of size 114332 bytes
1,637,171 UART: ROM Fatal Error: 0x000B0040
1,638,328 >>> mbox cmd response: failed
1,638,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,334 >>> mbox cmd response: failed
1,638,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
903,405 UART: [kat] HMAC-384Kdf
908,093 UART: [kat] LMS
1,476,289 UART: [kat] --
1,476,974 UART: [cold-reset] ++
1,477,394 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,073 UART: [idev] Erasing UDS.KEYID = 0
1,505,483 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,085 UART: [idev] --
1,514,998 UART: [ldev] ++
1,515,166 UART: [ldev] CDI.KEYID = 6
1,515,529 UART: [ldev] SUBJECT.KEYID = 5
1,515,955 UART: [ldev] AUTHORITY.KEYID = 7
1,516,418 UART: [ldev] FE.KEYID = 1
1,521,370 UART: [ldev] Erasing FE.KEYID = 1
1,546,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,599 UART: [ldev] --
1,585,956 UART: [fwproc] Waiting for Commands...
1,586,739 UART: [fwproc] Received command 0x46574c44
1,587,530 UART: [fwproc] Received Image of size 114332 bytes
2,884,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,166 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,492 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,417 >>> mbox cmd response: failed
1,486,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,423 >>> mbox cmd response: failed
1,486,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,864 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,414 UART: [state] LifecycleState = Unprovisioned
85,069 UART: [state] DebugLocked = No
85,621 UART: [state] WD Timer not started. Device not locked for debugging
86,908 UART: [kat] SHA2-256
892,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,683 UART: [kat] ++
896,835 UART: [kat] sha1
900,911 UART: [kat] SHA2-256
902,851 UART: [kat] SHA2-384
905,774 UART: [kat] SHA2-512-ACC
907,675 UART: [kat] ECC-384
917,706 UART: [kat] HMAC-384Kdf
922,218 UART: [kat] LMS
1,170,546 UART: [kat] --
1,171,335 UART: [cold-reset] ++
1,171,799 UART: [fht] FHT @ 0x50003400
1,174,488 UART: [idev] ++
1,174,656 UART: [idev] CDI.KEYID = 6
1,175,016 UART: [idev] SUBJECT.KEYID = 7
1,175,440 UART: [idev] UDS.KEYID = 0
1,175,785 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,326 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,318 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,809 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,282,022 UART: [fwproc] Recv command 0x46574c44
1,282,750 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,995 UART: ROM Fatal Error: 0x000B0040
1,331,152 >>> mbox cmd response: failed
1,331,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,158 >>> mbox cmd response: failed
1,331,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
893,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,551 UART: [kat] ++
897,703 UART: [kat] sha1
902,059 UART: [kat] SHA2-256
903,999 UART: [kat] SHA2-384
906,872 UART: [kat] SHA2-512-ACC
908,773 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,973 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,255 UART: [idev] --
1,210,521 UART: [ldev] ++
1,210,689 UART: [ldev] CDI.KEYID = 6
1,211,052 UART: [ldev] SUBJECT.KEYID = 5
1,211,478 UART: [ldev] AUTHORITY.KEYID = 7
1,211,941 UART: [ldev] FE.KEYID = 1
1,217,145 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,461 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,528 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,369 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,565 >>> mbox cmd response: failed
1,185,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,571 >>> mbox cmd response: failed
1,185,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,684 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,384 UART: [kat] SHA2-256
904,324 UART: [kat] SHA2-384
907,323 UART: [kat] SHA2-512-ACC
909,224 UART: [kat] ECC-384
919,093 UART: [kat] HMAC-384Kdf
923,719 UART: [kat] LMS
1,172,047 UART: [kat] --
1,172,820 UART: [cold-reset] ++
1,173,264 UART: [fht] FHT @ 0x50003400
1,175,991 UART: [idev] ++
1,176,159 UART: [idev] CDI.KEYID = 6
1,176,519 UART: [idev] SUBJECT.KEYID = 7
1,176,943 UART: [idev] UDS.KEYID = 0
1,177,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,231 UART: [idev] Erasing UDS.KEYID = 0
1,202,448 UART: [idev] Sha1 KeyId Algorithm
1,210,998 UART: [idev] --
1,211,978 UART: [ldev] ++
1,212,146 UART: [ldev] CDI.KEYID = 6
1,212,509 UART: [ldev] SUBJECT.KEYID = 5
1,212,935 UART: [ldev] AUTHORITY.KEYID = 7
1,213,398 UART: [ldev] FE.KEYID = 1
1,218,816 UART: [ldev] Erasing FE.KEYID = 1
1,245,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,028 UART: [ldev] --
1,284,327 UART: [fwproc] Wait for Commands...
1,284,907 UART: [fwproc] Recv command 0x46574c44
1,285,635 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,730 UART: ROM Fatal Error: 0x000B0040
1,334,887 >>> mbox cmd response: failed
1,334,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,893 >>> mbox cmd response: failed
1,334,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,311 UART: [kat] SHA2-256
893,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,086 UART: [kat] ++
898,238 UART: [kat] sha1
902,440 UART: [kat] SHA2-256
904,380 UART: [kat] SHA2-384
907,141 UART: [kat] SHA2-512-ACC
909,042 UART: [kat] ECC-384
918,941 UART: [kat] HMAC-384Kdf
923,561 UART: [kat] LMS
1,171,889 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,849 UART: [idev] ++
1,176,017 UART: [idev] CDI.KEYID = 6
1,176,377 UART: [idev] SUBJECT.KEYID = 7
1,176,801 UART: [idev] UDS.KEYID = 0
1,177,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,246 UART: [idev] Sha1 KeyId Algorithm
1,210,750 UART: [idev] --
1,211,740 UART: [ldev] ++
1,211,908 UART: [ldev] CDI.KEYID = 6
1,212,271 UART: [ldev] SUBJECT.KEYID = 5
1,212,697 UART: [ldev] AUTHORITY.KEYID = 7
1,213,160 UART: [ldev] FE.KEYID = 1
1,218,236 UART: [ldev] Erasing FE.KEYID = 1
1,244,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,334 UART: [ldev] --
1,283,811 UART: [fwproc] Wait for Commands...
1,284,453 UART: [fwproc] Recv command 0x46574c44
1,285,181 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,629 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,820 >>> mbox cmd response: failed
1,187,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,826 >>> mbox cmd response: failed
1,187,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,642 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,056 UART: [ldev] Erasing FE.KEYID = 1
1,241,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,462 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,514 UART: ROM Fatal Error: 0x000B0040
1,329,671 >>> mbox cmd response: failed
1,329,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,677 >>> mbox cmd response: failed
1,329,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,465 UART: [idev] Sha1 KeyId Algorithm
1,208,347 UART: [idev] --
1,209,374 UART: [ldev] ++
1,209,542 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,333 UART: [ldev] AUTHORITY.KEYID = 7
1,210,796 UART: [ldev] FE.KEYID = 1
1,215,902 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,992 UART: [ldev] --
1,281,258 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,780 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,164 >>> mbox cmd response: failed
1,181,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,170 >>> mbox cmd response: failed
1,181,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,360 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,432 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,815 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,753 UART: ROM Fatal Error: 0x000B0040
1,330,910 >>> mbox cmd response: failed
1,330,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,916 >>> mbox cmd response: failed
1,330,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,361 UART: [kat] SHA2-256
891,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,040 UART: [kat] ++
896,192 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,281 UART: [kat] SHA2-512-ACC
907,182 UART: [kat] ECC-384
916,929 UART: [kat] HMAC-384Kdf
921,445 UART: [kat] LMS
1,169,757 UART: [kat] --
1,170,702 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,906 UART: [idev] ++
1,174,074 UART: [idev] CDI.KEYID = 6
1,174,435 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,175,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,942 UART: [idev] Sha1 KeyId Algorithm
1,208,812 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,297 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,117 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,295 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,185 >>> mbox cmd response: failed
1,183,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,191 >>> mbox cmd response: failed
1,183,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,181 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,247 UART: [kat] SHA2-256
892,185 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
902,244 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,365 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,164 UART: [idev] Erasing UDS.KEYID = 0
1,504,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,156 UART: [idev] --
1,514,261 UART: [ldev] ++
1,514,429 UART: [ldev] CDI.KEYID = 6
1,514,792 UART: [ldev] SUBJECT.KEYID = 5
1,515,218 UART: [ldev] AUTHORITY.KEYID = 7
1,515,681 UART: [ldev] FE.KEYID = 1
1,520,627 UART: [ldev] Erasing FE.KEYID = 1
1,545,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,118 UART: [ldev] --
1,585,443 UART: [fwproc] Waiting for Commands...
1,586,194 UART: [fwproc] Received command 0x46574c44
1,586,985 UART: [fwproc] Received Image of size 114332 bytes
2,884,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,512 >>> mbox cmd response: success
3,077,512 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
3,078,572 UART: [afmc] ++
3,078,740 UART: [afmc] CDI.KEYID = 6
3,079,102 UART: [afmc] SUBJECT.KEYID = 7
3,079,527 UART: [afmc] AUTHORITY.KEYID = 5
3,115,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,534 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,927 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,617 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,612 UART: [afmc] --
3,158,618 UART: [cold-reset] --
3,159,728 UART: [state] Locking Datavault
3,160,937 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,541 UART: [state] Locking ICCM
3,162,157 UART: [exit] Launching FMC @ 0x40000130
3,167,486 UART:
3,167,502 UART: Running Caliptra FMC ...
3,167,910 UART:
3,167,964 UART: [state] CFI Enabled
3,178,287 UART: [fht] FMC Alias Private Key: 7
3,286,888 UART: [art] Extend RT PCRs Done
3,287,316 UART: [art] Lock RT PCRs Done
3,288,722 UART: [art] Populate DV Done
3,296,801 UART: [fht] FMC Alias Private Key: 7
3,297,749 UART: [art] Derive CDI
3,298,029 UART: [art] Store in in slot 0x4
3,384,120 UART: [art] Derive Key Pair
3,384,480 UART: [art] Store priv key in slot 0x5
3,397,500 UART: [art] Derive Key Pair - Done
3,412,516 UART: [art] Signing Cert with AUTHO
3,412,996 UART: RITY.KEYID = 7
3,428,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,065 UART: [art] PUB.X = 9F926BD0B4184FD83B2BAAC879B79FC0962571BB8FF0D1500C1FDCE1C48B58BDE4ABE4A134A04BA0C1ABDE0D95787434
3,435,851 UART: [art] PUB.Y = 5B3F77AE51118BBA733BB8656C89845AF752F65BAFFE0141E2CCA8C0926C0295AEB53C282C3E2B6E6A676B9AE7AFE1F7
3,442,813 UART: [art] SIG.R = C3C1FAB602B53ACE73DFA5E325D1797D23A1622D1331BA50C16FF362EC3E2AD52EA78A2488C2C1C768BCC23120E968E4
3,449,594 UART: [art] SIG.S = A27EF33CC5CA9D606C8A50B6D4AFB27357E2A695279FE60D7D1ED3EE439B98F3B0AFF24730957492D9CE5AE7F526B34F
3,473,564 UART: Caliptra RT
3,473,817 UART: [state] CFI Enabled
3,582,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,122 UART:
3,584,138 UART: Running Caliptra ROM ...
3,584,546 UART:
3,584,600 UART: [state] CFI Enabled
3,587,368 UART: [state] LifecycleState = Unprovisioned
3,588,023 UART: [state] DebugLocked = No
3,588,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,238 UART: [kat] SHA2-256
4,384,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,284 UART: [kat] ++
4,388,436 UART: [kat] sha1
4,392,628 UART: [kat] SHA2-256
4,394,566 UART: [kat] SHA2-384
4,397,285 UART: [kat] SHA2-512-ACC
4,399,185 UART: [kat] ECC-384
4,404,668 UART: [kat] HMAC-384Kdf
4,409,272 UART: [kat] LMS
4,977,468 UART: [kat] --
4,978,577 UART: [update-reset] ++
5,090,150 >>> mbox cmd response: failed
5,090,150 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,090,574 UART: ROM Non-Fatal Error: 0x000B001F
5,091,358 UART: [state] Locking Datavault
5,091,972 UART: [state] Locking PCR0, PCR1 and PCR31
5,092,576 UART: [state] Locking ICCM
5,093,086 UART: [exit] Launching FMC @ 0x40000130
5,098,415 UART:
5,098,431 UART: Running Caliptra FMC ...
5,098,839 UART:
5,098,893 UART: [state] CFI Enabled
5,188,200 UART: [art] Extend RT PCRs Done
5,188,628 UART: [art] Lock RT PCRs Done
5,189,961 UART: [art] Populate DV Done
5,198,106 UART: [fht] FMC Alias Private Key: 7
5,199,076 UART: [art] Derive CDI
5,199,356 UART: [art] Store in in slot 0x4
5,284,951 UART: [art] Derive Key Pair
5,285,311 UART: [art] Store priv key in slot 0x5
5,298,749 UART: [art] Derive Key Pair - Done
5,313,505 UART: [art] Signing Cert with AUTHO
5,313,985 UART: RITY.KEYID = 7
5,329,211 UART: [art] Erasing AUTHORITY.KEYID = 7
5,329,976 UART: [art] PUB.X = 9F926BD0B4184FD83B2BAAC879B79FC0962571BB8FF0D1500C1FDCE1C48B58BDE4ABE4A134A04BA0C1ABDE0D95787434
5,336,762 UART: [art] PUB.Y = 5B3F77AE51118BBA733BB8656C89845AF752F65BAFFE0141E2CCA8C0926C0295AEB53C282C3E2B6E6A676B9AE7AFE1F7
5,343,724 UART: [art] SIG.R = C3C1FAB602B53ACE73DFA5E325D1797D23A1622D1331BA50C16FF362EC3E2AD52EA78A2488C2C1C768BCC23120E968E4
5,350,505 UART: [art] SIG.S = A27EF33CC5CA9D606C8A50B6D4AFB27357E2A695279FE60D7D1ED3EE439B98F3B0AFF24730957492D9CE5AE7F526B34F
5,374,357 UART: Caliptra RT
5,374,610 UART: [state] CFI Enabled
5,656,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,657,512 UART:
5,657,528 UART: Running Caliptra ROM ...
5,657,936 UART:
5,657,990 UART: [state] CFI Enabled
5,660,460 UART: [state] LifecycleState = Unprovisioned
5,661,115 UART: [state] DebugLocked = No
5,661,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,663,256 UART: [kat] SHA2-256
6,457,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,461,302 UART: [kat] ++
6,461,454 UART: [kat] sha1
6,465,722 UART: [kat] SHA2-256
6,467,660 UART: [kat] SHA2-384
6,470,499 UART: [kat] SHA2-512-ACC
6,472,399 UART: [kat] ECC-384
6,478,106 UART: [kat] HMAC-384Kdf
6,482,546 UART: [kat] LMS
7,050,742 UART: [kat] --
7,051,887 UART: [update-reset] ++
8,386,427 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,387,579 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,537,455 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,430 >>> mbox cmd response: success
2,926,430 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,988,378 UART:
2,988,394 UART: Running Caliptra FMC ...
2,988,802 UART:
2,988,856 UART: [state] CFI Enabled
2,999,385 UART: [fht] FMC Alias Private Key: 7
3,107,668 UART: [art] Extend RT PCRs Done
3,108,096 UART: [art] Lock RT PCRs Done
3,109,600 UART: [art] Populate DV Done
3,117,755 UART: [fht] FMC Alias Private Key: 7
3,118,807 UART: [art] Derive CDI
3,119,087 UART: [art] Store in in slot 0x4
3,204,728 UART: [art] Derive Key Pair
3,205,088 UART: [art] Store priv key in slot 0x5
3,218,786 UART: [art] Derive Key Pair - Done
3,233,601 UART: [art] Signing Cert with AUTHO
3,234,081 UART: RITY.KEYID = 7
3,249,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,082 UART: [art] PUB.X = A3EDA7FD8AFD4D8CAC113DD1AA556AAEC187933BB4DC749AF1504D21D6B6C9218891DF035A271D905D030CE06B64D05A
3,256,863 UART: [art] PUB.Y = 3A2FCA3495E50EE2FDEFE1E3F23ADE182030C3B31D041A1848631442E0DF1DDE105C172F3C03A1D696CAE28C638B3068
3,263,816 UART: [art] SIG.R = AD0A274E9DDD6DBAB90755300276665B73CA2033FDBDA6ADAB359069730BF098942FB982C88716152FA24E2D53EAE38B
3,270,584 UART: [art] SIG.S = 089513F7A264CB0D1692136B3F9267DCD4A7D94AD5A79A6D68D3D18A4153FBBD5F09C8B9412784037B7522E0397D18CF
3,294,525 UART: Caliptra RT
3,294,778 UART: [state] CFI Enabled
3,403,959 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,795,413 >>> mbox cmd response: failed
4,795,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,800,804 UART:
4,800,820 UART: Running Caliptra FMC ...
4,801,228 UART:
4,801,282 UART: [state] CFI Enabled
4,890,111 UART: [art] Extend RT PCRs Done
4,890,539 UART: [art] Lock RT PCRs Done
4,891,778 UART: [art] Populate DV Done
4,900,125 UART: [fht] FMC Alias Private Key: 7
4,901,277 UART: [art] Derive CDI
4,901,557 UART: [art] Store in in slot 0x4
4,987,412 UART: [art] Derive Key Pair
4,987,772 UART: [art] Store priv key in slot 0x5
5,000,906 UART: [art] Derive Key Pair - Done
5,015,795 UART: [art] Signing Cert with AUTHO
5,016,275 UART: RITY.KEYID = 7
5,031,303 UART: [art] Erasing AUTHORITY.KEYID = 7
5,032,068 UART: [art] PUB.X = A3EDA7FD8AFD4D8CAC113DD1AA556AAEC187933BB4DC749AF1504D21D6B6C9218891DF035A271D905D030CE06B64D05A
5,038,849 UART: [art] PUB.Y = 3A2FCA3495E50EE2FDEFE1E3F23ADE182030C3B31D041A1848631442E0DF1DDE105C172F3C03A1D696CAE28C638B3068
5,045,802 UART: [art] SIG.R = AD0A274E9DDD6DBAB90755300276665B73CA2033FDBDA6ADAB359069730BF098942FB982C88716152FA24E2D53EAE38B
5,052,570 UART: [art] SIG.S = 089513F7A264CB0D1692136B3F9267DCD4A7D94AD5A79A6D68D3D18A4153FBBD5F09C8B9412784037B7522E0397D18CF
5,076,147 UART: Caliptra RT
5,076,400 UART: [state] CFI Enabled
5,358,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,120,642 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,509 UART: [idev] ++
1,479,677 UART: [idev] CDI.KEYID = 6
1,480,037 UART: [idev] SUBJECT.KEYID = 7
1,480,461 UART: [idev] UDS.KEYID = 0
1,480,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,101 UART: [idev] Erasing UDS.KEYID = 0
1,504,805 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,337 UART: [idev] --
1,514,420 UART: [ldev] ++
1,514,588 UART: [ldev] CDI.KEYID = 6
1,514,951 UART: [ldev] SUBJECT.KEYID = 5
1,515,377 UART: [ldev] AUTHORITY.KEYID = 7
1,515,840 UART: [ldev] FE.KEYID = 1
1,520,908 UART: [ldev] Erasing FE.KEYID = 1
1,546,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,869 UART: [ldev] --
1,586,236 UART: [fwproc] Waiting for Commands...
1,586,917 UART: [fwproc] Received command 0x46574c44
1,587,708 UART: [fwproc] Received Image of size 114332 bytes
2,885,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,924 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,733 >>> mbox cmd response: success
3,076,733 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
3,077,813 UART: [afmc] ++
3,077,981 UART: [afmc] CDI.KEYID = 6
3,078,343 UART: [afmc] SUBJECT.KEYID = 7
3,078,768 UART: [afmc] AUTHORITY.KEYID = 5
3,113,787 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,407 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,800 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,490 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,373 UART: [afmc] --
3,157,349 UART: [cold-reset] --
3,158,233 UART: [state] Locking Datavault
3,159,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,806 UART: [state] Locking ICCM
3,160,234 UART: [exit] Launching FMC @ 0x40000130
3,165,563 UART:
3,165,579 UART: Running Caliptra FMC ...
3,165,987 UART:
3,166,130 UART: [state] CFI Enabled
3,176,779 UART: [fht] FMC Alias Private Key: 7
3,284,322 UART: [art] Extend RT PCRs Done
3,284,750 UART: [art] Lock RT PCRs Done
3,286,234 UART: [art] Populate DV Done
3,294,583 UART: [fht] FMC Alias Private Key: 7
3,295,567 UART: [art] Derive CDI
3,295,847 UART: [art] Store in in slot 0x4
3,382,102 UART: [art] Derive Key Pair
3,382,462 UART: [art] Store priv key in slot 0x5
3,394,828 UART: [art] Derive Key Pair - Done
3,409,628 UART: [art] Signing Cert with AUTHO
3,410,108 UART: RITY.KEYID = 7
3,424,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,639 UART: [art] PUB.X = 84EAA2CD493B414160EC12552D5FB790CEFA6F315A049A9476498F06AE31EC215673B4A775C99271C86D61A310C486C3
3,432,403 UART: [art] PUB.Y = E9BEA3743E3CD6C728032D3715CBA6A1B8D4CD3BDB0D7DBE130B187718B88F16B9B08DAB59520A51CF54A33BDF981E4A
3,439,361 UART: [art] SIG.R = 26909B7EF962E8B2F1C3269167141D23869DF73B520A4CC9913AF5A0F1F2AD96D282B87184E7D5E7A3448989955F1BDA
3,446,128 UART: [art] SIG.S = DC1202A2E80C3B5F667B084A7ABB8B950460EE4A7811B375E98F3EB9C572EA8C0EDA4B0A68EA86A48334C4AB3E81F5F6
3,469,549 UART: Caliptra RT
3,469,894 UART: [state] CFI Enabled
3,577,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,762 UART:
3,579,778 UART: Running Caliptra ROM ...
3,580,186 UART:
3,580,327 UART: [state] CFI Enabled
3,583,223 UART: [state] LifecycleState = Unprovisioned
3,583,878 UART: [state] DebugLocked = No
3,584,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,585,867 UART: [kat] SHA2-256
4,379,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,913 UART: [kat] ++
4,384,065 UART: [kat] sha1
4,388,311 UART: [kat] SHA2-256
4,390,249 UART: [kat] SHA2-384
4,392,862 UART: [kat] SHA2-512-ACC
4,394,762 UART: [kat] ECC-384
4,400,373 UART: [kat] HMAC-384Kdf
4,405,009 UART: [kat] LMS
4,973,205 UART: [kat] --
4,974,086 UART: [update-reset] ++
5,086,555 >>> mbox cmd response: failed
5,086,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,086,817 UART: ROM Non-Fatal Error: 0x000B001F
5,087,609 UART: [state] Locking Datavault
5,088,397 UART: [state] Locking PCR0, PCR1 and PCR31
5,089,001 UART: [state] Locking ICCM
5,089,459 UART: [exit] Launching FMC @ 0x40000130
5,094,788 UART:
5,094,804 UART: Running Caliptra FMC ...
5,095,212 UART:
5,095,355 UART: [state] CFI Enabled
5,184,242 UART: [art] Extend RT PCRs Done
5,184,670 UART: [art] Lock RT PCRs Done
5,185,959 UART: [art] Populate DV Done
5,194,250 UART: [fht] FMC Alias Private Key: 7
5,195,432 UART: [art] Derive CDI
5,195,712 UART: [art] Store in in slot 0x4
5,281,489 UART: [art] Derive Key Pair
5,281,849 UART: [art] Store priv key in slot 0x5
5,295,305 UART: [art] Derive Key Pair - Done
5,310,165 UART: [art] Signing Cert with AUTHO
5,310,645 UART: RITY.KEYID = 7
5,325,707 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,472 UART: [art] PUB.X = 84EAA2CD493B414160EC12552D5FB790CEFA6F315A049A9476498F06AE31EC215673B4A775C99271C86D61A310C486C3
5,333,236 UART: [art] PUB.Y = E9BEA3743E3CD6C728032D3715CBA6A1B8D4CD3BDB0D7DBE130B187718B88F16B9B08DAB59520A51CF54A33BDF981E4A
5,340,194 UART: [art] SIG.R = 26909B7EF962E8B2F1C3269167141D23869DF73B520A4CC9913AF5A0F1F2AD96D282B87184E7D5E7A3448989955F1BDA
5,346,961 UART: [art] SIG.S = DC1202A2E80C3B5F667B084A7ABB8B950460EE4A7811B375E98F3EB9C572EA8C0EDA4B0A68EA86A48334C4AB3E81F5F6
5,371,338 UART: Caliptra RT
5,371,683 UART: [state] CFI Enabled
5,653,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,655,242 UART:
5,655,258 UART: Running Caliptra ROM ...
5,655,666 UART:
5,655,807 UART: [state] CFI Enabled
5,658,643 UART: [state] LifecycleState = Unprovisioned
5,659,298 UART: [state] DebugLocked = No
5,659,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,661,533 UART: [kat] SHA2-256
6,455,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,459,579 UART: [kat] ++
6,459,731 UART: [kat] sha1
6,464,027 UART: [kat] SHA2-256
6,465,965 UART: [kat] SHA2-384
6,468,798 UART: [kat] SHA2-512-ACC
6,470,698 UART: [kat] ECC-384
6,476,349 UART: [kat] HMAC-384Kdf
6,480,799 UART: [kat] LMS
7,048,995 UART: [kat] --
7,049,614 UART: [update-reset] ++
8,384,474 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,385,702 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,535,578 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,225 >>> mbox cmd response: success
2,926,225 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,988,257 UART:
2,988,273 UART: Running Caliptra FMC ...
2,988,681 UART:
2,988,824 UART: [state] CFI Enabled
2,999,639 UART: [fht] FMC Alias Private Key: 7
3,108,150 UART: [art] Extend RT PCRs Done
3,108,578 UART: [art] Lock RT PCRs Done
3,109,864 UART: [art] Populate DV Done
3,118,297 UART: [fht] FMC Alias Private Key: 7
3,119,317 UART: [art] Derive CDI
3,119,597 UART: [art] Store in in slot 0x4
3,205,472 UART: [art] Derive Key Pair
3,205,832 UART: [art] Store priv key in slot 0x5
3,219,070 UART: [art] Derive Key Pair - Done
3,233,837 UART: [art] Signing Cert with AUTHO
3,234,317 UART: RITY.KEYID = 7
3,249,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,486 UART: [art] PUB.X = 45A63A8440B4576294CE3899B15FF9E23005F83713118F5A2AAA2E7B089295B34358294E9BD6B9D165F99B7A7524D000
3,257,220 UART: [art] PUB.Y = 97A74D6D4A131B2A4524B59A04D875F9C430BC12C8083167E6BE0324A17CE57E02A5F11898863C704B9D89E5BCB9C592
3,264,158 UART: [art] SIG.R = 39E3AFA32516461067E7166A4AA9762FB85A53B95C9DB9EDB5E0D9F8E7C7C8B119B2768E7ABE8D816DB780C2BB208C4B
3,270,942 UART: [art] SIG.S = 654FFEE1480F220AA4F54F4B6927B23D771173F70D7DDE0365F67E62D9D4A495BF0CA8ACEB7FDBE7FACA9B0D0AD5E850
3,295,024 UART: Caliptra RT
3,295,369 UART: [state] CFI Enabled
3,404,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,796,622 >>> mbox cmd response: failed
4,796,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,802,245 UART:
4,802,261 UART: Running Caliptra FMC ...
4,802,669 UART:
4,802,812 UART: [state] CFI Enabled
4,891,307 UART: [art] Extend RT PCRs Done
4,891,735 UART: [art] Lock RT PCRs Done
4,892,952 UART: [art] Populate DV Done
4,901,233 UART: [fht] FMC Alias Private Key: 7
4,902,373 UART: [art] Derive CDI
4,902,653 UART: [art] Store in in slot 0x4
4,988,242 UART: [art] Derive Key Pair
4,988,602 UART: [art] Store priv key in slot 0x5
5,001,946 UART: [art] Derive Key Pair - Done
5,016,743 UART: [art] Signing Cert with AUTHO
5,017,223 UART: RITY.KEYID = 7
5,032,355 UART: [art] Erasing AUTHORITY.KEYID = 7
5,033,120 UART: [art] PUB.X = 45A63A8440B4576294CE3899B15FF9E23005F83713118F5A2AAA2E7B089295B34358294E9BD6B9D165F99B7A7524D000
5,039,854 UART: [art] PUB.Y = 97A74D6D4A131B2A4524B59A04D875F9C430BC12C8083167E6BE0324A17CE57E02A5F11898863C704B9D89E5BCB9C592
5,046,792 UART: [art] SIG.R = 39E3AFA32516461067E7166A4AA9762FB85A53B95C9DB9EDB5E0D9F8E7C7C8B119B2768E7ABE8D816DB780C2BB208C4B
5,053,576 UART: [art] SIG.S = 654FFEE1480F220AA4F54F4B6927B23D771173F70D7DDE0365F67E62D9D4A495BF0CA8ACEB7FDBE7FACA9B0D0AD5E850
5,077,210 UART: Caliptra RT
5,077,555 UART: [state] CFI Enabled
5,358,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,120,373 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,489 UART: [kat] SHA2-256
903,429 UART: [kat] SHA2-384
906,120 UART: [kat] SHA2-512-ACC
908,021 UART: [kat] ECC-384
917,474 UART: [kat] HMAC-384Kdf
922,066 UART: [kat] LMS
1,170,394 UART: [kat] --
1,171,079 UART: [cold-reset] ++
1,171,647 UART: [fht] FHT @ 0x50003400
1,174,238 UART: [idev] ++
1,174,406 UART: [idev] CDI.KEYID = 6
1,174,766 UART: [idev] SUBJECT.KEYID = 7
1,175,190 UART: [idev] UDS.KEYID = 0
1,175,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,042 UART: [ldev] SUBJECT.KEYID = 5
1,211,468 UART: [ldev] AUTHORITY.KEYID = 7
1,211,931 UART: [ldev] FE.KEYID = 1
1,217,011 UART: [ldev] Erasing FE.KEYID = 1
1,243,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,537 UART: [ldev] --
1,282,856 UART: [fwproc] Wait for Commands...
1,283,506 UART: [fwproc] Recv command 0x46574c44
1,284,234 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,765 >>> mbox cmd response: success
2,775,765 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,776,915 UART: [afmc] ++
2,777,083 UART: [afmc] CDI.KEYID = 6
2,777,445 UART: [afmc] SUBJECT.KEYID = 7
2,777,870 UART: [afmc] AUTHORITY.KEYID = 5
2,813,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,450 UART: [afmc] --
2,856,506 UART: [cold-reset] --
2,857,236 UART: [state] Locking Datavault
2,858,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,925 UART: [state] Locking ICCM
2,859,353 UART: [exit] Launching FMC @ 0x40000130
2,864,682 UART:
2,864,698 UART: Running Caliptra FMC ...
2,865,106 UART:
2,865,160 UART: [state] CFI Enabled
2,875,589 UART: [fht] FMC Alias Private Key: 7
2,984,044 UART: [art] Extend RT PCRs Done
2,984,472 UART: [art] Lock RT PCRs Done
2,985,690 UART: [art] Populate DV Done
2,993,929 UART: [fht] FMC Alias Private Key: 7
2,994,927 UART: [art] Derive CDI
2,995,207 UART: [art] Store in in slot 0x4
3,080,738 UART: [art] Derive Key Pair
3,081,098 UART: [art] Store priv key in slot 0x5
3,094,114 UART: [art] Derive Key Pair - Done
3,109,106 UART: [art] Signing Cert with AUTHO
3,109,586 UART: RITY.KEYID = 7
3,124,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,325 UART: [art] PUB.X = 500819C2A94AE991CE17A6C0A0B803B38E8A1BDA0C98AC45780AD32A6525C9FA62BC05B445F308BE150569F0B550516D
3,132,080 UART: [art] PUB.Y = A582211CB0AE287A0E5201D899CE1C2ACA099C2DB36594880FAAE8CC1B9405614C9A584D0EF39FB9B06A9739094B36A0
3,139,017 UART: [art] SIG.R = E303E7A83CE3CABC5CBF544E107ADC6748EB341CA9E9337EDD29430220C807E453FB1E64EFBADF014A7670EC39EF5B89
3,145,795 UART: [art] SIG.S = 19045CF13448D0143DBA4F64A8279B1F52C29D446DAF5D0CF53283B94ECD1ED8ABDE08B931FB2ADCD1C95FCA9F670A87
3,169,748 UART: Caliptra RT
3,170,001 UART: [state] CFI Enabled
3,278,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,908 UART:
3,280,924 UART: Running Caliptra ROM ...
3,281,332 UART:
3,281,387 UART: [state] CFI Enabled
3,284,033 UART: [state] LifecycleState = Unprovisioned
3,284,688 UART: [state] DebugLocked = No
3,285,314 UART: [state] WD Timer not started. Device not locked for debugging
3,286,472 UART: [kat] SHA2-256
4,092,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,247 UART: [kat] ++
4,096,399 UART: [kat] sha1
4,100,771 UART: [kat] SHA2-256
4,102,711 UART: [kat] SHA2-384
4,105,406 UART: [kat] SHA2-512-ACC
4,107,306 UART: [kat] ECC-384
4,117,377 UART: [kat] HMAC-384Kdf
4,122,083 UART: [kat] LMS
4,370,411 UART: [kat] --
4,371,423 UART: [update-reset] ++
4,461,760 >>> mbox cmd response: failed
4,461,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,462,076 UART: ROM Non-Fatal Error: 0x000B001F
4,463,070 UART: [state] Locking Datavault
4,463,774 UART: [state] Locking PCR0, PCR1 and PCR31
4,464,378 UART: [state] Locking ICCM
4,464,898 UART: [exit] Launching FMC @ 0x40000130
4,470,227 UART:
4,470,243 UART: Running Caliptra FMC ...
4,470,651 UART:
4,470,705 UART: [state] CFI Enabled
4,559,562 UART: [art] Extend RT PCRs Done
4,559,990 UART: [art] Lock RT PCRs Done
4,561,333 UART: [art] Populate DV Done
4,569,350 UART: [fht] FMC Alias Private Key: 7
4,570,416 UART: [art] Derive CDI
4,570,696 UART: [art] Store in in slot 0x4
4,656,219 UART: [art] Derive Key Pair
4,656,579 UART: [art] Store priv key in slot 0x5
4,670,137 UART: [art] Derive Key Pair - Done
4,684,855 UART: [art] Signing Cert with AUTHO
4,685,335 UART: RITY.KEYID = 7
4,700,189 UART: [art] Erasing AUTHORITY.KEYID = 7
4,700,954 UART: [art] PUB.X = 500819C2A94AE991CE17A6C0A0B803B38E8A1BDA0C98AC45780AD32A6525C9FA62BC05B445F308BE150569F0B550516D
4,707,709 UART: [art] PUB.Y = A582211CB0AE287A0E5201D899CE1C2ACA099C2DB36594880FAAE8CC1B9405614C9A584D0EF39FB9B06A9739094B36A0
4,714,646 UART: [art] SIG.R = E303E7A83CE3CABC5CBF544E107ADC6748EB341CA9E9337EDD29430220C807E453FB1E64EFBADF014A7670EC39EF5B89
4,721,424 UART: [art] SIG.S = 19045CF13448D0143DBA4F64A8279B1F52C29D446DAF5D0CF53283B94ECD1ED8ABDE08B931FB2ADCD1C95FCA9F670A87
4,745,385 UART: Caliptra RT
4,745,638 UART: [state] CFI Enabled
5,026,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,028,396 UART:
5,028,412 UART: Running Caliptra ROM ...
5,028,820 UART:
5,028,875 UART: [state] CFI Enabled
5,031,545 UART: [state] LifecycleState = Unprovisioned
5,032,200 UART: [state] DebugLocked = No
5,032,892 UART: [state] WD Timer not started. Device not locked for debugging
5,034,102 UART: [kat] SHA2-256
5,839,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,843,877 UART: [kat] ++
5,844,029 UART: [kat] sha1
5,848,153 UART: [kat] SHA2-256
5,850,093 UART: [kat] SHA2-384
5,852,938 UART: [kat] SHA2-512-ACC
5,854,838 UART: [kat] ECC-384
5,865,023 UART: [kat] HMAC-384Kdf
5,869,661 UART: [kat] LMS
6,117,989 UART: [kat] --
6,118,865 UART: [update-reset] ++
7,430,913 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,431,962 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,581,786 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,486 >>> mbox cmd response: success
2,628,486 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,690,980 UART:
2,690,996 UART: Running Caliptra FMC ...
2,691,404 UART:
2,691,458 UART: [state] CFI Enabled
2,701,827 UART: [fht] FMC Alias Private Key: 7
2,809,738 UART: [art] Extend RT PCRs Done
2,810,166 UART: [art] Lock RT PCRs Done
2,811,926 UART: [art] Populate DV Done
2,820,141 UART: [fht] FMC Alias Private Key: 7
2,821,139 UART: [art] Derive CDI
2,821,419 UART: [art] Store in in slot 0x4
2,906,632 UART: [art] Derive Key Pair
2,906,992 UART: [art] Store priv key in slot 0x5
2,920,314 UART: [art] Derive Key Pair - Done
2,935,252 UART: [art] Signing Cert with AUTHO
2,935,732 UART: RITY.KEYID = 7
2,951,146 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,911 UART: [art] PUB.X = 23EDFFEF8BA1F2577391FFFF0B628700F4AA573745536E32B6034A84037CC625F96ED6BB0F4CFA312FBAE4C4DD4B8FCB
2,958,669 UART: [art] PUB.Y = 6CE0EE81697C2A47E2CC5546BB34B603E5E8082874B4C04617B7095F3F192BC65994D97342AF3FF17D8F00D953AEC493
2,965,590 UART: [art] SIG.R = 1A6E8A244FD3144F41157394E8EBA2259BEB9B5AAA828E90F44935395A35E8452038A0DD343CB4BD077E944499C0428B
2,972,357 UART: [art] SIG.S = ADD7EA1055837A4439449E87D3CA54D4EAA1113F336F713D9EA21876F4453C51750AF889921313936EE5FA09A9C18801
2,995,789 UART: Caliptra RT
2,996,042 UART: [state] CFI Enabled
3,103,521 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,861 >>> mbox cmd response: failed
4,169,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,175,414 UART:
4,175,430 UART: Running Caliptra FMC ...
4,175,838 UART:
4,175,892 UART: [state] CFI Enabled
4,264,903 UART: [art] Extend RT PCRs Done
4,265,331 UART: [art] Lock RT PCRs Done
4,266,646 UART: [art] Populate DV Done
4,274,581 UART: [fht] FMC Alias Private Key: 7
4,275,707 UART: [art] Derive CDI
4,275,987 UART: [art] Store in in slot 0x4
4,361,812 UART: [art] Derive Key Pair
4,362,172 UART: [art] Store priv key in slot 0x5
4,374,948 UART: [art] Derive Key Pair - Done
4,389,846 UART: [art] Signing Cert with AUTHO
4,390,326 UART: RITY.KEYID = 7
4,405,618 UART: [art] Erasing AUTHORITY.KEYID = 7
4,406,383 UART: [art] PUB.X = 23EDFFEF8BA1F2577391FFFF0B628700F4AA573745536E32B6034A84037CC625F96ED6BB0F4CFA312FBAE4C4DD4B8FCB
4,413,141 UART: [art] PUB.Y = 6CE0EE81697C2A47E2CC5546BB34B603E5E8082874B4C04617B7095F3F192BC65994D97342AF3FF17D8F00D953AEC493
4,420,062 UART: [art] SIG.R = 1A6E8A244FD3144F41157394E8EBA2259BEB9B5AAA828E90F44935395A35E8452038A0DD343CB4BD077E944499C0428B
4,426,829 UART: [art] SIG.S = ADD7EA1055837A4439449E87D3CA54D4EAA1113F336F713D9EA21876F4453C51750AF889921313936EE5FA09A9C18801
4,451,131 UART: Caliptra RT
4,451,384 UART: [state] CFI Enabled
4,728,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,166,067 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,318 UART: [state] WD Timer not started. Device not locked for debugging
88,583 UART: [kat] SHA2-256
894,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,358 UART: [kat] ++
898,510 UART: [kat] sha1
902,780 UART: [kat] SHA2-256
904,720 UART: [kat] SHA2-384
907,423 UART: [kat] SHA2-512-ACC
909,324 UART: [kat] ECC-384
919,131 UART: [kat] HMAC-384Kdf
924,007 UART: [kat] LMS
1,172,335 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,480 UART: [fht] FHT @ 0x50003400
1,176,163 UART: [idev] ++
1,176,331 UART: [idev] CDI.KEYID = 6
1,176,691 UART: [idev] SUBJECT.KEYID = 7
1,177,115 UART: [idev] UDS.KEYID = 0
1,177,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,811 UART: [idev] Erasing UDS.KEYID = 0
1,201,652 UART: [idev] Sha1 KeyId Algorithm
1,209,974 UART: [idev] --
1,211,012 UART: [ldev] ++
1,211,180 UART: [ldev] CDI.KEYID = 6
1,211,543 UART: [ldev] SUBJECT.KEYID = 5
1,211,969 UART: [ldev] AUTHORITY.KEYID = 7
1,212,432 UART: [ldev] FE.KEYID = 1
1,217,772 UART: [ldev] Erasing FE.KEYID = 1
1,244,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,077 UART: [fwproc] Wait for Commands...
1,284,677 UART: [fwproc] Recv command 0x46574c44
1,285,405 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,124 >>> mbox cmd response: success
2,775,124 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,776,306 UART: [afmc] ++
2,776,474 UART: [afmc] CDI.KEYID = 6
2,776,836 UART: [afmc] SUBJECT.KEYID = 7
2,777,261 UART: [afmc] AUTHORITY.KEYID = 5
2,813,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,026 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,745 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,597 UART: [afmc] --
2,856,637 UART: [cold-reset] --
2,857,625 UART: [state] Locking Datavault
2,858,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,326 UART: [state] Locking ICCM
2,859,924 UART: [exit] Launching FMC @ 0x40000130
2,865,253 UART:
2,865,269 UART: Running Caliptra FMC ...
2,865,677 UART:
2,865,820 UART: [state] CFI Enabled
2,876,473 UART: [fht] FMC Alias Private Key: 7
2,984,596 UART: [art] Extend RT PCRs Done
2,985,024 UART: [art] Lock RT PCRs Done
2,986,606 UART: [art] Populate DV Done
2,994,863 UART: [fht] FMC Alias Private Key: 7
2,995,951 UART: [art] Derive CDI
2,996,231 UART: [art] Store in in slot 0x4
3,082,086 UART: [art] Derive Key Pair
3,082,446 UART: [art] Store priv key in slot 0x5
3,095,388 UART: [art] Derive Key Pair - Done
3,110,224 UART: [art] Signing Cert with AUTHO
3,110,704 UART: RITY.KEYID = 7
3,126,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,177 UART: [art] PUB.X = 2EBC22C47D895FA6E34DFB23201005AC65E390754B7A025C905C5184E5FE97E811C96795828AE262215F389468404FD1
3,133,935 UART: [art] PUB.Y = D08EA626C2364411E1B192166392FB64ABDAE351C213F785DBE9E3CCD3ECF5DE54D81432B6B0F3C3E449D32C72722404
3,140,890 UART: [art] SIG.R = 98CEE12BE1B329BE91920135DADD76A62C7FAD15FF62E2E155E03FC18BD71C41D58D6DF28CFF90C19867EFAEC7ED55CE
3,147,683 UART: [art] SIG.S = 730DA53E83BFB33ED9C8DA385A8E1873E9005B037D7BC48884B4C1E2D8A5385880C8813B88C47F87D3D9A2484E1BEA8A
3,170,978 UART: Caliptra RT
3,171,323 UART: [state] CFI Enabled
3,279,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,324 UART:
3,281,340 UART: Running Caliptra ROM ...
3,281,748 UART:
3,281,890 UART: [state] CFI Enabled
3,284,766 UART: [state] LifecycleState = Unprovisioned
3,285,421 UART: [state] DebugLocked = No
3,285,917 UART: [state] WD Timer not started. Device not locked for debugging
3,287,087 UART: [kat] SHA2-256
4,092,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,862 UART: [kat] ++
4,097,014 UART: [kat] sha1
4,101,170 UART: [kat] SHA2-256
4,103,110 UART: [kat] SHA2-384
4,105,971 UART: [kat] SHA2-512-ACC
4,107,871 UART: [kat] ECC-384
4,117,608 UART: [kat] HMAC-384Kdf
4,122,270 UART: [kat] LMS
4,370,598 UART: [kat] --
4,371,504 UART: [update-reset] ++
4,461,377 >>> mbox cmd response: failed
4,461,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,461,793 UART: ROM Non-Fatal Error: 0x000B001F
4,462,585 UART: [state] Locking Datavault
4,463,287 UART: [state] Locking PCR0, PCR1 and PCR31
4,463,891 UART: [state] Locking ICCM
4,464,377 UART: [exit] Launching FMC @ 0x40000130
4,469,706 UART:
4,469,722 UART: Running Caliptra FMC ...
4,470,130 UART:
4,470,273 UART: [state] CFI Enabled
4,558,794 UART: [art] Extend RT PCRs Done
4,559,222 UART: [art] Lock RT PCRs Done
4,560,331 UART: [art] Populate DV Done
4,568,670 UART: [fht] FMC Alias Private Key: 7
4,569,816 UART: [art] Derive CDI
4,570,096 UART: [art] Store in in slot 0x4
4,656,001 UART: [art] Derive Key Pair
4,656,361 UART: [art] Store priv key in slot 0x5
4,670,347 UART: [art] Derive Key Pair - Done
4,685,195 UART: [art] Signing Cert with AUTHO
4,685,675 UART: RITY.KEYID = 7
4,701,217 UART: [art] Erasing AUTHORITY.KEYID = 7
4,701,982 UART: [art] PUB.X = 2EBC22C47D895FA6E34DFB23201005AC65E390754B7A025C905C5184E5FE97E811C96795828AE262215F389468404FD1
4,708,740 UART: [art] PUB.Y = D08EA626C2364411E1B192166392FB64ABDAE351C213F785DBE9E3CCD3ECF5DE54D81432B6B0F3C3E449D32C72722404
4,715,695 UART: [art] SIG.R = 98CEE12BE1B329BE91920135DADD76A62C7FAD15FF62E2E155E03FC18BD71C41D58D6DF28CFF90C19867EFAEC7ED55CE
4,722,488 UART: [art] SIG.S = 730DA53E83BFB33ED9C8DA385A8E1873E9005B037D7BC48884B4C1E2D8A5385880C8813B88C47F87D3D9A2484E1BEA8A
4,745,833 UART: Caliptra RT
4,746,178 UART: [state] CFI Enabled
5,026,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,027,690 UART:
5,027,706 UART: Running Caliptra ROM ...
5,028,114 UART:
5,028,256 UART: [state] CFI Enabled
5,031,224 UART: [state] LifecycleState = Unprovisioned
5,031,879 UART: [state] DebugLocked = No
5,032,551 UART: [state] WD Timer not started. Device not locked for debugging
5,033,883 UART: [kat] SHA2-256
5,839,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,843,658 UART: [kat] ++
5,843,810 UART: [kat] sha1
5,848,182 UART: [kat] SHA2-256
5,850,122 UART: [kat] SHA2-384
5,852,781 UART: [kat] SHA2-512-ACC
5,854,681 UART: [kat] ECC-384
5,864,114 UART: [kat] HMAC-384Kdf
5,868,802 UART: [kat] LMS
6,117,130 UART: [kat] --
6,117,888 UART: [update-reset] ++
7,430,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,431,359 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,581,183 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,240 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,529 >>> mbox cmd response: success
2,627,529 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,688,833 UART:
2,688,849 UART: Running Caliptra FMC ...
2,689,257 UART:
2,689,400 UART: [state] CFI Enabled
2,700,141 UART: [fht] FMC Alias Private Key: 7
2,808,418 UART: [art] Extend RT PCRs Done
2,808,846 UART: [art] Lock RT PCRs Done
2,810,474 UART: [art] Populate DV Done
2,818,659 UART: [fht] FMC Alias Private Key: 7
2,819,693 UART: [art] Derive CDI
2,819,973 UART: [art] Store in in slot 0x4
2,905,906 UART: [art] Derive Key Pair
2,906,266 UART: [art] Store priv key in slot 0x5
2,919,262 UART: [art] Derive Key Pair - Done
2,934,306 UART: [art] Signing Cert with AUTHO
2,934,786 UART: RITY.KEYID = 7
2,950,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,863 UART: [art] PUB.X = 912415AFDBC57590672AA9B0ABD6BA54817D50008909A9DD6300D6F4318F6CDB0BA7CB947FF0BFEA7FDC3A862B171D13
2,957,599 UART: [art] PUB.Y = 4CFB8E75EC16B9D7A10C2D5B981CEFD89ECC00F817C2CF2E2F2B7DAE77DC2E510D680FBE790229DBDA5BE497DFAD0579
2,964,542 UART: [art] SIG.R = CC3DB9D9D807C5F36E56296341CC9A76C67ADD5EF9BD80F0856E367E5DBB34CC5B38CEFA56508B14B4D8489FAC50FE6D
2,971,331 UART: [art] SIG.S = 9CA85E8E9D1235D90CF131DD577192D48D23AAB5CA6F829C59C50C038985D2CD33775182389D06C04D9C1C1586FA7300
2,995,360 UART: Caliptra RT
2,995,705 UART: [state] CFI Enabled
3,103,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,994 >>> mbox cmd response: failed
4,170,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,176,981 UART:
4,176,997 UART: Running Caliptra FMC ...
4,177,405 UART:
4,177,548 UART: [state] CFI Enabled
4,266,733 UART: [art] Extend RT PCRs Done
4,267,161 UART: [art] Lock RT PCRs Done
4,268,346 UART: [art] Populate DV Done
4,276,533 UART: [fht] FMC Alias Private Key: 7
4,277,469 UART: [art] Derive CDI
4,277,749 UART: [art] Store in in slot 0x4
4,363,666 UART: [art] Derive Key Pair
4,364,026 UART: [art] Store priv key in slot 0x5
4,377,554 UART: [art] Derive Key Pair - Done
4,392,644 UART: [art] Signing Cert with AUTHO
4,393,124 UART: RITY.KEYID = 7
4,408,500 UART: [art] Erasing AUTHORITY.KEYID = 7
4,409,265 UART: [art] PUB.X = 912415AFDBC57590672AA9B0ABD6BA54817D50008909A9DD6300D6F4318F6CDB0BA7CB947FF0BFEA7FDC3A862B171D13
4,416,001 UART: [art] PUB.Y = 4CFB8E75EC16B9D7A10C2D5B981CEFD89ECC00F817C2CF2E2F2B7DAE77DC2E510D680FBE790229DBDA5BE497DFAD0579
4,422,944 UART: [art] SIG.R = CC3DB9D9D807C5F36E56296341CC9A76C67ADD5EF9BD80F0856E367E5DBB34CC5B38CEFA56508B14B4D8489FAC50FE6D
4,429,733 UART: [art] SIG.S = 9CA85E8E9D1235D90CF131DD577192D48D23AAB5CA6F829C59C50C038985D2CD33775182389D06C04D9C1C1586FA7300
4,453,218 UART: Caliptra RT
4,453,563 UART: [state] CFI Enabled
4,738,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,177,880 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,328 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,174,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,541 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,627 UART: [fwproc] Recv command 0x46574c44
1,282,360 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,283 >>> mbox cmd response: success
2,771,283 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,772,520 UART: [afmc] ++
2,772,688 UART: [afmc] CDI.KEYID = 6
2,773,051 UART: [afmc] SUBJECT.KEYID = 7
2,773,477 UART: [afmc] AUTHORITY.KEYID = 5
2,808,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,185 UART: [afmc] --
2,852,279 UART: [cold-reset] --
2,853,189 UART: [state] Locking Datavault
2,854,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,776 UART: [state] Locking ICCM
2,855,448 UART: [exit] Launching FMC @ 0x40000130
2,860,777 UART:
2,860,793 UART: Running Caliptra FMC ...
2,861,201 UART:
2,861,255 UART: [state] CFI Enabled
2,871,968 UART: [fht] FMC Alias Private Key: 7
2,980,049 UART: [art] Extend RT PCRs Done
2,980,477 UART: [art] Lock RT PCRs Done
2,982,085 UART: [art] Populate DV Done
2,990,200 UART: [fht] FMC Alias Private Key: 7
2,991,172 UART: [art] Derive CDI
2,991,452 UART: [art] Store in in slot 0x4
3,077,537 UART: [art] Derive Key Pair
3,077,897 UART: [art] Store priv key in slot 0x5
3,091,245 UART: [art] Derive Key Pair - Done
3,106,249 UART: [art] Signing Cert with AUTHO
3,106,729 UART: RITY.KEYID = 7
3,121,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,534 UART: [art] PUB.X = E4523526C2475232E7D45CD2782DA576757944FBAE3DF29B354468ADB00B8D3E2EB1B14278C6D43D1CCA7936038BC1E9
3,129,302 UART: [art] PUB.Y = 7A0834EC2EF22E45CD2E6378CB1B7C13539A9E4116165070C496DA6C978F1EF49D77035723ACC7A50AF4373D0882386C
3,136,240 UART: [art] SIG.R = 5C8B173EA60B78545F9DCA4CB9C7C04C1F29C432E18354317E5BF6F8BAB6DABDA0DF510F961BA4FC1447851C05023643
3,143,010 UART: [art] SIG.S = 563222AF3AB549F39A8237B6BC0196C27925C64B7A59F2B1F184886A63D6EA49ACD608AF3F2962FEBA9CBD1BFADFCC60
3,167,139 UART: Caliptra RT
3,167,392 UART: [state] CFI Enabled
3,274,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,063 UART:
3,277,079 UART: Running Caliptra ROM ...
3,277,487 UART:
3,277,542 UART: [state] CFI Enabled
3,279,980 UART: [state] LifecycleState = Unprovisioned
3,280,635 UART: [state] DebugLocked = No
3,281,323 UART: [state] WD Timer not started. Device not locked for debugging
3,282,629 UART: [kat] SHA2-256
4,086,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,308 UART: [kat] ++
4,090,460 UART: [kat] sha1
4,094,782 UART: [kat] SHA2-256
4,096,722 UART: [kat] SHA2-384
4,099,455 UART: [kat] SHA2-512-ACC
4,101,355 UART: [kat] ECC-384
4,111,020 UART: [kat] HMAC-384Kdf
4,115,544 UART: [kat] LMS
4,363,856 UART: [kat] --
4,364,526 UART: [update-reset] ++
4,453,408 >>> mbox cmd response: failed
4,453,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,453,870 UART: ROM Non-Fatal Error: 0x000B001F
4,454,736 UART: [state] Locking Datavault
4,455,534 UART: [state] Locking PCR0, PCR1 and PCR31
4,456,138 UART: [state] Locking ICCM
4,456,718 UART: [exit] Launching FMC @ 0x40000130
4,462,047 UART:
4,462,063 UART: Running Caliptra FMC ...
4,462,471 UART:
4,462,525 UART: [state] CFI Enabled
4,551,104 UART: [art] Extend RT PCRs Done
4,551,532 UART: [art] Lock RT PCRs Done
4,552,581 UART: [art] Populate DV Done
4,560,836 UART: [fht] FMC Alias Private Key: 7
4,561,996 UART: [art] Derive CDI
4,562,276 UART: [art] Store in in slot 0x4
4,648,421 UART: [art] Derive Key Pair
4,648,781 UART: [art] Store priv key in slot 0x5
4,662,049 UART: [art] Derive Key Pair - Done
4,676,379 UART: [art] Signing Cert with AUTHO
4,676,859 UART: RITY.KEYID = 7
4,692,389 UART: [art] Erasing AUTHORITY.KEYID = 7
4,693,154 UART: [art] PUB.X = E4523526C2475232E7D45CD2782DA576757944FBAE3DF29B354468ADB00B8D3E2EB1B14278C6D43D1CCA7936038BC1E9
4,699,922 UART: [art] PUB.Y = 7A0834EC2EF22E45CD2E6378CB1B7C13539A9E4116165070C496DA6C978F1EF49D77035723ACC7A50AF4373D0882386C
4,706,860 UART: [art] SIG.R = 5C8B173EA60B78545F9DCA4CB9C7C04C1F29C432E18354317E5BF6F8BAB6DABDA0DF510F961BA4FC1447851C05023643
4,713,630 UART: [art] SIG.S = 563222AF3AB549F39A8237B6BC0196C27925C64B7A59F2B1F184886A63D6EA49ACD608AF3F2962FEBA9CBD1BFADFCC60
4,737,297 UART: Caliptra RT
4,737,550 UART: [state] CFI Enabled
5,016,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,018,100 UART:
5,018,116 UART: Running Caliptra ROM ...
5,018,524 UART:
5,018,579 UART: [state] CFI Enabled
5,020,821 UART: [state] LifecycleState = Unprovisioned
5,021,476 UART: [state] DebugLocked = No
5,022,208 UART: [state] WD Timer not started. Device not locked for debugging
5,023,372 UART: [kat] SHA2-256
5,826,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,831,051 UART: [kat] ++
5,831,203 UART: [kat] sha1
5,835,225 UART: [kat] SHA2-256
5,837,165 UART: [kat] SHA2-384
5,839,816 UART: [kat] SHA2-512-ACC
5,841,716 UART: [kat] ECC-384
5,851,507 UART: [kat] HMAC-384Kdf
5,856,103 UART: [kat] LMS
6,104,415 UART: [kat] --
6,105,273 UART: [update-reset] ++
7,416,664 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,417,641 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,567,465 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,311 >>> mbox cmd response: success
2,622,311 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,684,295 UART:
2,684,311 UART: Running Caliptra FMC ...
2,684,719 UART:
2,684,773 UART: [state] CFI Enabled
2,695,046 UART: [fht] FMC Alias Private Key: 7
2,803,251 UART: [art] Extend RT PCRs Done
2,803,679 UART: [art] Lock RT PCRs Done
2,805,275 UART: [art] Populate DV Done
2,813,570 UART: [fht] FMC Alias Private Key: 7
2,814,620 UART: [art] Derive CDI
2,814,900 UART: [art] Store in in slot 0x4
2,900,565 UART: [art] Derive Key Pair
2,900,925 UART: [art] Store priv key in slot 0x5
2,913,751 UART: [art] Derive Key Pair - Done
2,928,930 UART: [art] Signing Cert with AUTHO
2,929,410 UART: RITY.KEYID = 7
2,944,646 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,411 UART: [art] PUB.X = C6AC71E1ECC5F8B5A140E58769A91BD431C7AF02D71B897AE3EF374A93F70283581819F6A87A78E38B8AE5CD7B3FB4D6
2,952,189 UART: [art] PUB.Y = 6BC26E4738E537F6F5DAE35779EB8FCE3C82F0DAFD72776B814F5F651F309D326195FAF49CB85D2988856CC9BF41AB7A
2,959,153 UART: [art] SIG.R = 215C4B28A2A6A7FADE3B937DD55BFB7AFAE83054A3098718C2728AF8503AD08E41BAE20E03EBBB2DDC8358287FBA77AD
2,965,936 UART: [art] SIG.S = 813A9A9AC14121AEB00BAE6F55B942C7EDA84A99D8F83B675C1EA15995EF1E617850E8F4D8CACBCA2C7A7AEF5637B72A
2,989,586 UART: Caliptra RT
2,989,839 UART: [state] CFI Enabled
3,098,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,160,675 >>> mbox cmd response: failed
4,160,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,166,362 UART:
4,166,378 UART: Running Caliptra FMC ...
4,166,786 UART:
4,166,840 UART: [state] CFI Enabled
4,255,685 UART: [art] Extend RT PCRs Done
4,256,113 UART: [art] Lock RT PCRs Done
4,257,598 UART: [art] Populate DV Done
4,265,589 UART: [fht] FMC Alias Private Key: 7
4,266,589 UART: [art] Derive CDI
4,266,869 UART: [art] Store in in slot 0x4
4,352,530 UART: [art] Derive Key Pair
4,352,890 UART: [art] Store priv key in slot 0x5
4,365,914 UART: [art] Derive Key Pair - Done
4,380,919 UART: [art] Signing Cert with AUTHO
4,381,399 UART: RITY.KEYID = 7
4,396,375 UART: [art] Erasing AUTHORITY.KEYID = 7
4,397,140 UART: [art] PUB.X = C6AC71E1ECC5F8B5A140E58769A91BD431C7AF02D71B897AE3EF374A93F70283581819F6A87A78E38B8AE5CD7B3FB4D6
4,403,918 UART: [art] PUB.Y = 6BC26E4738E537F6F5DAE35779EB8FCE3C82F0DAFD72776B814F5F651F309D326195FAF49CB85D2988856CC9BF41AB7A
4,410,882 UART: [art] SIG.R = 215C4B28A2A6A7FADE3B937DD55BFB7AFAE83054A3098718C2728AF8503AD08E41BAE20E03EBBB2DDC8358287FBA77AD
4,417,665 UART: [art] SIG.S = 813A9A9AC14121AEB00BAE6F55B942C7EDA84A99D8F83B675C1EA15995EF1E617850E8F4D8CACBCA2C7A7AEF5637B72A
4,441,593 UART: Caliptra RT
4,441,846 UART: [state] CFI Enabled
4,724,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,158,816 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
917,221 UART: [kat] HMAC-384Kdf
921,767 UART: [kat] LMS
1,170,079 UART: [kat] --
1,170,960 UART: [cold-reset] ++
1,171,338 UART: [fht] FHT @ 0x50003400
1,174,242 UART: [idev] ++
1,174,410 UART: [idev] CDI.KEYID = 6
1,174,771 UART: [idev] SUBJECT.KEYID = 7
1,175,196 UART: [idev] UDS.KEYID = 0
1,175,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,444 UART: [idev] Sha1 KeyId Algorithm
1,209,338 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,825 UART: [ldev] SUBJECT.KEYID = 5
1,211,252 UART: [ldev] AUTHORITY.KEYID = 7
1,211,715 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,657 UART: [fwproc] Wait for Commands...
1,283,296 UART: [fwproc] Recv command 0x46574c44
1,284,029 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,812 >>> mbox cmd response: success
2,773,812 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,775,075 UART: [afmc] ++
2,775,243 UART: [afmc] CDI.KEYID = 6
2,775,606 UART: [afmc] SUBJECT.KEYID = 7
2,776,032 UART: [afmc] AUTHORITY.KEYID = 5
2,812,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,834 UART: [afmc] --
2,855,942 UART: [cold-reset] --
2,856,768 UART: [state] Locking Datavault
2,857,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,569 UART: [state] Locking ICCM
2,859,097 UART: [exit] Launching FMC @ 0x40000130
2,864,426 UART:
2,864,442 UART: Running Caliptra FMC ...
2,864,850 UART:
2,864,993 UART: [state] CFI Enabled
2,875,434 UART: [fht] FMC Alias Private Key: 7
2,983,199 UART: [art] Extend RT PCRs Done
2,983,627 UART: [art] Lock RT PCRs Done
2,985,009 UART: [art] Populate DV Done
2,992,958 UART: [fht] FMC Alias Private Key: 7
2,994,110 UART: [art] Derive CDI
2,994,390 UART: [art] Store in in slot 0x4
3,079,911 UART: [art] Derive Key Pair
3,080,271 UART: [art] Store priv key in slot 0x5
3,093,601 UART: [art] Derive Key Pair - Done
3,108,337 UART: [art] Signing Cert with AUTHO
3,108,817 UART: RITY.KEYID = 7
3,124,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,880 UART: [art] PUB.X = E9ECED44AD7DC289EAA2A8D64E04CFD17B5E8B3F406DC35CECCFBF22777A01E74DCD40CD1FDF51B616F4E91CD26B7C9B
3,131,680 UART: [art] PUB.Y = C9E54F8480C51580BF515B9E699308B04C9B2663029FCB4F410B8DC5E50DB5DE1B98447F8A979B60A10B2580B57736C5
3,138,615 UART: [art] SIG.R = 2C41AD5F55E4FE515A68D67C3F4723ADE7AB31A4AFB604D28CE79FACA399B39261925BF71C0D7BE2B1FF7248A9DCC688
3,145,399 UART: [art] SIG.S = ADA7AAC012CA1FE88B3E55D3DF7DBC25C4B0FEDCAC284FB8E6A8BFF17679EC787EFEC1AA1AB4B61EFA5A00012FE46352
3,169,413 UART: Caliptra RT
3,169,758 UART: [state] CFI Enabled
3,277,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,761 UART:
3,279,777 UART: Running Caliptra ROM ...
3,280,185 UART:
3,280,327 UART: [state] CFI Enabled
3,283,419 UART: [state] LifecycleState = Unprovisioned
3,284,074 UART: [state] DebugLocked = No
3,284,756 UART: [state] WD Timer not started. Device not locked for debugging
3,286,116 UART: [kat] SHA2-256
4,089,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,795 UART: [kat] ++
4,093,947 UART: [kat] sha1
4,098,141 UART: [kat] SHA2-256
4,100,081 UART: [kat] SHA2-384
4,102,832 UART: [kat] SHA2-512-ACC
4,104,732 UART: [kat] ECC-384
4,114,299 UART: [kat] HMAC-384Kdf
4,118,907 UART: [kat] LMS
4,367,219 UART: [kat] --
4,368,113 UART: [update-reset] ++
4,457,583 >>> mbox cmd response: failed
4,457,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,457,939 UART: ROM Non-Fatal Error: 0x000B001F
4,458,739 UART: [state] Locking Datavault
4,459,395 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,999 UART: [state] Locking ICCM
4,460,473 UART: [exit] Launching FMC @ 0x40000130
4,465,802 UART:
4,465,818 UART: Running Caliptra FMC ...
4,466,226 UART:
4,466,369 UART: [state] CFI Enabled
4,555,650 UART: [art] Extend RT PCRs Done
4,556,078 UART: [art] Lock RT PCRs Done
4,557,201 UART: [art] Populate DV Done
4,565,166 UART: [fht] FMC Alias Private Key: 7
4,566,118 UART: [art] Derive CDI
4,566,398 UART: [art] Store in in slot 0x4
4,651,973 UART: [art] Derive Key Pair
4,652,333 UART: [art] Store priv key in slot 0x5
4,665,505 UART: [art] Derive Key Pair - Done
4,679,967 UART: [art] Signing Cert with AUTHO
4,680,447 UART: RITY.KEYID = 7
4,695,861 UART: [art] Erasing AUTHORITY.KEYID = 7
4,696,626 UART: [art] PUB.X = E9ECED44AD7DC289EAA2A8D64E04CFD17B5E8B3F406DC35CECCFBF22777A01E74DCD40CD1FDF51B616F4E91CD26B7C9B
4,703,426 UART: [art] PUB.Y = C9E54F8480C51580BF515B9E699308B04C9B2663029FCB4F410B8DC5E50DB5DE1B98447F8A979B60A10B2580B57736C5
4,710,361 UART: [art] SIG.R = 2C41AD5F55E4FE515A68D67C3F4723ADE7AB31A4AFB604D28CE79FACA399B39261925BF71C0D7BE2B1FF7248A9DCC688
4,717,145 UART: [art] SIG.S = ADA7AAC012CA1FE88B3E55D3DF7DBC25C4B0FEDCAC284FB8E6A8BFF17679EC787EFEC1AA1AB4B61EFA5A00012FE46352
4,741,119 UART: Caliptra RT
4,741,464 UART: [state] CFI Enabled
5,022,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,023,760 UART:
5,023,776 UART: Running Caliptra ROM ...
5,024,184 UART:
5,024,326 UART: [state] CFI Enabled
5,027,256 UART: [state] LifecycleState = Unprovisioned
5,027,911 UART: [state] DebugLocked = No
5,028,439 UART: [state] WD Timer not started. Device not locked for debugging
5,029,799 UART: [kat] SHA2-256
5,833,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,837,478 UART: [kat] ++
5,837,630 UART: [kat] sha1
5,841,846 UART: [kat] SHA2-256
5,843,786 UART: [kat] SHA2-384
5,846,417 UART: [kat] SHA2-512-ACC
5,848,317 UART: [kat] ECC-384
5,858,084 UART: [kat] HMAC-384Kdf
5,862,550 UART: [kat] LMS
6,110,862 UART: [kat] --
6,111,476 UART: [update-reset] ++
7,424,569 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,425,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,575,518 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,124 >>> mbox cmd response: success
2,624,124 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,686,588 UART:
2,686,604 UART: Running Caliptra FMC ...
2,687,012 UART:
2,687,155 UART: [state] CFI Enabled
2,697,922 UART: [fht] FMC Alias Private Key: 7
2,806,155 UART: [art] Extend RT PCRs Done
2,806,583 UART: [art] Lock RT PCRs Done
2,808,131 UART: [art] Populate DV Done
2,816,576 UART: [fht] FMC Alias Private Key: 7
2,817,598 UART: [art] Derive CDI
2,817,878 UART: [art] Store in in slot 0x4
2,904,135 UART: [art] Derive Key Pair
2,904,495 UART: [art] Store priv key in slot 0x5
2,917,831 UART: [art] Derive Key Pair - Done
2,932,681 UART: [art] Signing Cert with AUTHO
2,933,161 UART: RITY.KEYID = 7
2,948,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,924 UART: [art] PUB.X = 88DF9DBBB0F68BD4474FE8E49CA71A4B54A1309D5B9EC13FC2D4BB600D780FA01CEA2AC7BC4DB60231373D8966C5B3CC
2,955,709 UART: [art] PUB.Y = 918B24A8B696D7E2956A984A9CE6ECA114618DD09152545958ADA6778424DB84D9571F8C88EBEFDA1D924EFB3712CD7B
2,962,667 UART: [art] SIG.R = 4F91B31D479479C27BCC230CBDC9D89CD128F6648B8720735CA736FAF126DFB1954EB8DA2773812358154D7892DA287D
2,969,436 UART: [art] SIG.S = 7A1D9DE8745F73CE0F7503DCD4AA3E043146DCFB3FA2FD751BB326B6C54EF98DE82ED81D4271300546FF177A68358586
2,992,777 UART: Caliptra RT
2,993,122 UART: [state] CFI Enabled
3,102,145 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,209 >>> mbox cmd response: failed
4,164,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,170,152 UART:
4,170,168 UART: Running Caliptra FMC ...
4,170,576 UART:
4,170,719 UART: [state] CFI Enabled
4,259,836 UART: [art] Extend RT PCRs Done
4,260,264 UART: [art] Lock RT PCRs Done
4,261,409 UART: [art] Populate DV Done
4,269,644 UART: [fht] FMC Alias Private Key: 7
4,270,806 UART: [art] Derive CDI
4,271,086 UART: [art] Store in in slot 0x4
4,356,657 UART: [art] Derive Key Pair
4,357,017 UART: [art] Store priv key in slot 0x5
4,370,755 UART: [art] Derive Key Pair - Done
4,385,109 UART: [art] Signing Cert with AUTHO
4,385,589 UART: RITY.KEYID = 7
4,401,085 UART: [art] Erasing AUTHORITY.KEYID = 7
4,401,850 UART: [art] PUB.X = 88DF9DBBB0F68BD4474FE8E49CA71A4B54A1309D5B9EC13FC2D4BB600D780FA01CEA2AC7BC4DB60231373D8966C5B3CC
4,408,635 UART: [art] PUB.Y = 918B24A8B696D7E2956A984A9CE6ECA114618DD09152545958ADA6778424DB84D9571F8C88EBEFDA1D924EFB3712CD7B
4,415,593 UART: [art] SIG.R = 4F91B31D479479C27BCC230CBDC9D89CD128F6648B8720735CA736FAF126DFB1954EB8DA2773812358154D7892DA287D
4,422,362 UART: [art] SIG.S = 7A1D9DE8745F73CE0F7503DCD4AA3E043146DCFB3FA2FD751BB326B6C54EF98DE82ED81D4271300546FF177A68358586
4,446,021 UART: Caliptra RT
4,446,366 UART: [state] CFI Enabled
4,728,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,163,609 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,428 UART: [kat] LMS
1,475,624 UART: [kat] --
1,476,293 UART: [cold-reset] ++
1,476,873 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,372 UART: [idev] Erasing UDS.KEYID = 0
1,505,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,514,741 UART: [ldev] ++
1,514,909 UART: [ldev] CDI.KEYID = 6
1,515,272 UART: [ldev] SUBJECT.KEYID = 5
1,515,698 UART: [ldev] AUTHORITY.KEYID = 7
1,516,161 UART: [ldev] FE.KEYID = 1
1,521,431 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,730 UART: [ldev] --
1,586,127 UART: [fwproc] Waiting for Commands...
1,586,870 UART: [fwproc] Received command 0x46574c44
1,587,661 UART: [fwproc] Received Image of size 114332 bytes
2,885,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,421 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,762 >>> mbox cmd response: success
3,078,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,079,834 UART: [afmc] ++
3,080,002 UART: [afmc] CDI.KEYID = 6
3,080,364 UART: [afmc] SUBJECT.KEYID = 7
3,080,789 UART: [afmc] AUTHORITY.KEYID = 5
3,115,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,617 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,307 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,118 UART: [afmc] --
3,159,064 UART: [cold-reset] --
3,159,584 UART: [state] Locking Datavault
3,160,649 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,253 UART: [state] Locking ICCM
3,161,817 UART: [exit] Launching FMC @ 0x40000130
3,167,146 UART:
3,167,162 UART: Running Caliptra FMC ...
3,167,570 UART:
3,167,624 UART: [state] CFI Enabled
3,178,373 UART: [fht] FMC Alias Private Key: 7
3,287,162 UART: [art] Extend RT PCRs Done
3,287,590 UART: [art] Lock RT PCRs Done
3,289,138 UART: [art] Populate DV Done
3,297,207 UART: [fht] FMC Alias Private Key: 7
3,298,337 UART: [art] Derive CDI
3,298,617 UART: [art] Store in in slot 0x4
3,383,950 UART: [art] Derive Key Pair
3,384,310 UART: [art] Store priv key in slot 0x5
3,397,706 UART: [art] Derive Key Pair - Done
3,412,472 UART: [art] Signing Cert with AUTHO
3,412,952 UART: RITY.KEYID = 7
3,427,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,419 UART: [art] PUB.X = AADF559EF754B7B5F14A4B9696305B5F2A190273222986C3BDA9AD85EAD03245D8187F89B6FB293495B10AEF8FC83CE1
3,435,193 UART: [art] PUB.Y = B9BB48EB9D9674349ED4B6F40FB0FC0ACDA5818C493F8F2067F4EE4B16750C06A896A586DFB57B8030A1CA87CF9600E2
3,442,123 UART: [art] SIG.R = 6D85D24421EBE31E4BF183A6F70B1EADF44D14B16EE0998550F1430FD616752E7901349D2845AB2E2F55094CCCA6FF93
3,448,887 UART: [art] SIG.S = 7C367DB2311E3D814820631BDBAB0E4F1628350BBDA5B24E6602DF6CC84973120DFB2AAF2A458DB820910430671F28FE
3,472,981 UART: Caliptra RT
3,473,234 UART: [state] CFI Enabled
3,580,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,817 UART:
3,582,833 UART: Running Caliptra ROM ...
3,583,241 UART:
3,583,295 UART: [state] CFI Enabled
3,586,277 UART: [state] LifecycleState = Unprovisioned
3,586,932 UART: [state] DebugLocked = No
3,587,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,189 UART: [kat] SHA2-256
4,383,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,235 UART: [kat] ++
4,387,387 UART: [kat] sha1
4,391,621 UART: [kat] SHA2-256
4,393,559 UART: [kat] SHA2-384
4,396,350 UART: [kat] SHA2-512-ACC
4,398,250 UART: [kat] ECC-384
4,403,977 UART: [kat] HMAC-384Kdf
4,408,451 UART: [kat] LMS
4,976,647 UART: [kat] --
4,977,504 UART: [update-reset] ++
5,014,989 >>> mbox cmd response: failed
5,014,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,015,445 UART: ROM Non-Fatal Error: 0x000B001D
5,016,239 UART: [state] Locking Datavault
5,016,923 UART: [state] Locking PCR0, PCR1 and PCR31
5,017,527 UART: [state] Locking ICCM
5,017,993 UART: [exit] Launching FMC @ 0x40000130
5,023,322 UART:
5,023,338 UART: Running Caliptra FMC ...
5,023,746 UART:
5,023,800 UART: [state] CFI Enabled
5,111,937 UART: [art] Extend RT PCRs Done
5,112,365 UART: [art] Lock RT PCRs Done
5,113,464 UART: [art] Populate DV Done
5,121,635 UART: [fht] FMC Alias Private Key: 7
5,122,803 UART: [art] Derive CDI
5,123,083 UART: [art] Store in in slot 0x4
5,208,758 UART: [art] Derive Key Pair
5,209,118 UART: [art] Store priv key in slot 0x5
5,222,338 UART: [art] Derive Key Pair - Done
5,236,992 UART: [art] Signing Cert with AUTHO
5,237,472 UART: RITY.KEYID = 7
5,252,828 UART: [art] Erasing AUTHORITY.KEYID = 7
5,253,593 UART: [art] PUB.X = AADF559EF754B7B5F14A4B9696305B5F2A190273222986C3BDA9AD85EAD03245D8187F89B6FB293495B10AEF8FC83CE1
5,260,367 UART: [art] PUB.Y = B9BB48EB9D9674349ED4B6F40FB0FC0ACDA5818C493F8F2067F4EE4B16750C06A896A586DFB57B8030A1CA87CF9600E2
5,267,297 UART: [art] SIG.R = 6D85D24421EBE31E4BF183A6F70B1EADF44D14B16EE0998550F1430FD616752E7901349D2845AB2E2F55094CCCA6FF93
5,274,061 UART: [art] SIG.S = 7C367DB2311E3D814820631BDBAB0E4F1628350BBDA5B24E6602DF6CC84973120DFB2AAF2A458DB820910430671F28FE
5,298,179 UART: Caliptra RT
5,298,432 UART: [state] CFI Enabled
5,583,468 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,142 UART:
5,585,158 UART: Running Caliptra ROM ...
5,585,566 UART:
5,585,620 UART: [state] CFI Enabled
5,587,846 UART: [state] LifecycleState = Unprovisioned
5,588,501 UART: [state] DebugLocked = No
5,589,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,590,798 UART: [kat] SHA2-256
6,384,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,388,844 UART: [kat] ++
6,388,996 UART: [kat] sha1
6,393,234 UART: [kat] SHA2-256
6,395,172 UART: [kat] SHA2-384
6,398,073 UART: [kat] SHA2-512-ACC
6,399,973 UART: [kat] ECC-384
6,405,610 UART: [kat] HMAC-384Kdf
6,410,216 UART: [kat] LMS
6,978,412 UART: [kat] --
6,979,473 UART: [update-reset] ++
8,314,447 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,315,641 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,465,517 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,525 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,150 >>> mbox cmd response: success
2,929,150 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,991,356 UART:
2,991,372 UART: Running Caliptra FMC ...
2,991,780 UART:
2,991,834 UART: [state] CFI Enabled
3,002,161 UART: [fht] FMC Alias Private Key: 7
3,110,276 UART: [art] Extend RT PCRs Done
3,110,704 UART: [art] Lock RT PCRs Done
3,112,274 UART: [art] Populate DV Done
3,120,267 UART: [fht] FMC Alias Private Key: 7
3,121,219 UART: [art] Derive CDI
3,121,499 UART: [art] Store in in slot 0x4
3,207,312 UART: [art] Derive Key Pair
3,207,672 UART: [art] Store priv key in slot 0x5
3,220,660 UART: [art] Derive Key Pair - Done
3,235,282 UART: [art] Signing Cert with AUTHO
3,235,762 UART: RITY.KEYID = 7
3,251,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,061 UART: [art] PUB.X = CD8E96B8A144EE8F6948C669215D1DB07CB87DB1548238657B12EC0AB02275DA18E64521A38AE25409DCD485E4B796CC
3,258,831 UART: [art] PUB.Y = 3C1347D0DAD76B91347DB369CD78DD23E22A018A05B9843FCA24F984B92776E2B2CB72B12F8BDAB176DFBBA2A9C1566B
3,265,791 UART: [art] SIG.R = A706002BA08C1CC59251111CB75C87E2A420CF9315EF0B361A15F567CD2FD2B19575574DCD7E147078B5340C5A44465C
3,272,530 UART: [art] SIG.S = 3465ADFCD203F0584CDD80596B23E1D29BC3938668B45EDC2C1D5DA0F43F8AE7B4A451EEA7D5AE4D91FB13CFDDA2816D
3,296,704 UART: Caliptra RT
3,296,957 UART: [state] CFI Enabled
3,405,434 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,760 >>> mbox cmd response: failed
4,723,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,729,473 UART:
4,729,489 UART: Running Caliptra FMC ...
4,729,897 UART:
4,729,951 UART: [state] CFI Enabled
4,819,472 UART: [art] Extend RT PCRs Done
4,819,900 UART: [art] Lock RT PCRs Done
4,821,145 UART: [art] Populate DV Done
4,829,490 UART: [fht] FMC Alias Private Key: 7
4,830,644 UART: [art] Derive CDI
4,830,924 UART: [art] Store in in slot 0x4
4,916,677 UART: [art] Derive Key Pair
4,917,037 UART: [art] Store priv key in slot 0x5
4,930,409 UART: [art] Derive Key Pair - Done
4,944,961 UART: [art] Signing Cert with AUTHO
4,945,441 UART: RITY.KEYID = 7
4,960,251 UART: [art] Erasing AUTHORITY.KEYID = 7
4,961,016 UART: [art] PUB.X = CD8E96B8A144EE8F6948C669215D1DB07CB87DB1548238657B12EC0AB02275DA18E64521A38AE25409DCD485E4B796CC
4,967,786 UART: [art] PUB.Y = 3C1347D0DAD76B91347DB369CD78DD23E22A018A05B9843FCA24F984B92776E2B2CB72B12F8BDAB176DFBBA2A9C1566B
4,974,746 UART: [art] SIG.R = A706002BA08C1CC59251111CB75C87E2A420CF9315EF0B361A15F567CD2FD2B19575574DCD7E147078B5340C5A44465C
4,981,485 UART: [art] SIG.S = 3465ADFCD203F0584CDD80596B23E1D29BC3938668B45EDC2C1D5DA0F43F8AE7B4A451EEA7D5AE4D91FB13CFDDA2816D
5,005,163 UART: Caliptra RT
5,005,416 UART: [state] CFI Enabled
5,286,987 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,049,896 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
902,889 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,598 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,911 UART: [idev] ++
1,480,079 UART: [idev] CDI.KEYID = 6
1,480,439 UART: [idev] SUBJECT.KEYID = 7
1,480,863 UART: [idev] UDS.KEYID = 0
1,481,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,506,163 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,677 UART: [idev] --
1,515,674 UART: [ldev] ++
1,515,842 UART: [ldev] CDI.KEYID = 6
1,516,205 UART: [ldev] SUBJECT.KEYID = 5
1,516,631 UART: [ldev] AUTHORITY.KEYID = 7
1,517,094 UART: [ldev] FE.KEYID = 1
1,522,610 UART: [ldev] Erasing FE.KEYID = 1
1,547,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,893 UART: [ldev] --
1,587,260 UART: [fwproc] Waiting for Commands...
1,588,097 UART: [fwproc] Received command 0x46574c44
1,588,888 UART: [fwproc] Received Image of size 114332 bytes
2,887,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,009 >>> mbox cmd response: success
3,081,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,082,221 UART: [afmc] ++
3,082,389 UART: [afmc] CDI.KEYID = 6
3,082,751 UART: [afmc] SUBJECT.KEYID = 7
3,083,176 UART: [afmc] AUTHORITY.KEYID = 5
3,118,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,852 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,542 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,273 UART: [afmc] --
3,161,277 UART: [cold-reset] --
3,162,021 UART: [state] Locking Datavault
3,163,510 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,114 UART: [state] Locking ICCM
3,164,776 UART: [exit] Launching FMC @ 0x40000130
3,170,105 UART:
3,170,121 UART: Running Caliptra FMC ...
3,170,529 UART:
3,170,672 UART: [state] CFI Enabled
3,181,405 UART: [fht] FMC Alias Private Key: 7
3,289,834 UART: [art] Extend RT PCRs Done
3,290,262 UART: [art] Lock RT PCRs Done
3,291,454 UART: [art] Populate DV Done
3,299,567 UART: [fht] FMC Alias Private Key: 7
3,300,633 UART: [art] Derive CDI
3,300,913 UART: [art] Store in in slot 0x4
3,386,730 UART: [art] Derive Key Pair
3,387,090 UART: [art] Store priv key in slot 0x5
3,400,236 UART: [art] Derive Key Pair - Done
3,414,750 UART: [art] Signing Cert with AUTHO
3,415,230 UART: RITY.KEYID = 7
3,430,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,197 UART: [art] PUB.X = A65ED3F3973F311D886C85BFA8152B0EC2F33598605824BEA6B8AE6D4ADA917B3FA0AFE5F7E53222F39EED8C097BC645
3,437,977 UART: [art] PUB.Y = 2D782DCFEC41CFF97AF9ABA3F4EF19FDAD63AAF72C763CC2ECFC9369CCD5E018C398F8AF49C2330CA77701070FC2811F
3,444,943 UART: [art] SIG.R = 797CE7E925E9666B2537E3161861876B0D4C8AA9DC8E3366827B6B98E9523DCE76DA4C710E03C9ABE4590A141FF692B2
3,451,703 UART: [art] SIG.S = D624F646F96200D5D9DBB60DE1A8642351798BC944B8D5B8AC2387F877EC43D1402A82718080C537C97F4BB2ECBB050F
3,475,479 UART: Caliptra RT
3,475,824 UART: [state] CFI Enabled
3,583,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,228 UART:
3,585,244 UART: Running Caliptra ROM ...
3,585,652 UART:
3,585,793 UART: [state] CFI Enabled
3,588,733 UART: [state] LifecycleState = Unprovisioned
3,589,388 UART: [state] DebugLocked = No
3,590,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,691 UART: [kat] SHA2-256
4,385,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,737 UART: [kat] ++
4,389,889 UART: [kat] sha1
4,394,189 UART: [kat] SHA2-256
4,396,127 UART: [kat] SHA2-384
4,398,862 UART: [kat] SHA2-512-ACC
4,400,762 UART: [kat] ECC-384
4,406,107 UART: [kat] HMAC-384Kdf
4,410,653 UART: [kat] LMS
4,978,849 UART: [kat] --
4,979,710 UART: [update-reset] ++
5,017,389 >>> mbox cmd response: failed
5,017,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,017,831 UART: ROM Non-Fatal Error: 0x000B001D
5,018,691 UART: [state] Locking Datavault
5,019,521 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,125 UART: [state] Locking ICCM
5,020,795 UART: [exit] Launching FMC @ 0x40000130
5,026,124 UART:
5,026,140 UART: Running Caliptra FMC ...
5,026,548 UART:
5,026,691 UART: [state] CFI Enabled
5,115,168 UART: [art] Extend RT PCRs Done
5,115,596 UART: [art] Lock RT PCRs Done
5,116,915 UART: [art] Populate DV Done
5,125,076 UART: [fht] FMC Alias Private Key: 7
5,126,104 UART: [art] Derive CDI
5,126,384 UART: [art] Store in in slot 0x4
5,211,977 UART: [art] Derive Key Pair
5,212,337 UART: [art] Store priv key in slot 0x5
5,225,833 UART: [art] Derive Key Pair - Done
5,240,401 UART: [art] Signing Cert with AUTHO
5,240,881 UART: RITY.KEYID = 7
5,255,853 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,618 UART: [art] PUB.X = A65ED3F3973F311D886C85BFA8152B0EC2F33598605824BEA6B8AE6D4ADA917B3FA0AFE5F7E53222F39EED8C097BC645
5,263,398 UART: [art] PUB.Y = 2D782DCFEC41CFF97AF9ABA3F4EF19FDAD63AAF72C763CC2ECFC9369CCD5E018C398F8AF49C2330CA77701070FC2811F
5,270,364 UART: [art] SIG.R = 797CE7E925E9666B2537E3161861876B0D4C8AA9DC8E3366827B6B98E9523DCE76DA4C710E03C9ABE4590A141FF692B2
5,277,124 UART: [art] SIG.S = D624F646F96200D5D9DBB60DE1A8642351798BC944B8D5B8AC2387F877EC43D1402A82718080C537C97F4BB2ECBB050F
5,301,128 UART: Caliptra RT
5,301,473 UART: [state] CFI Enabled
5,583,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,442 UART:
5,585,458 UART: Running Caliptra ROM ...
5,585,866 UART:
5,586,007 UART: [state] CFI Enabled
5,588,779 UART: [state] LifecycleState = Unprovisioned
5,589,434 UART: [state] DebugLocked = No
5,590,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,591,705 UART: [kat] SHA2-256
6,385,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,389,751 UART: [kat] ++
6,389,903 UART: [kat] sha1
6,394,089 UART: [kat] SHA2-256
6,396,027 UART: [kat] SHA2-384
6,398,676 UART: [kat] SHA2-512-ACC
6,400,576 UART: [kat] ECC-384
6,406,313 UART: [kat] HMAC-384Kdf
6,410,921 UART: [kat] LMS
6,979,117 UART: [kat] --
6,980,110 UART: [update-reset] ++
8,314,988 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,316,120 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,465,996 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,637 >>> mbox cmd response: success
2,927,637 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,135 UART:
2,989,151 UART: Running Caliptra FMC ...
2,989,559 UART:
2,989,702 UART: [state] CFI Enabled
3,000,537 UART: [fht] FMC Alias Private Key: 7
3,108,844 UART: [art] Extend RT PCRs Done
3,109,272 UART: [art] Lock RT PCRs Done
3,110,990 UART: [art] Populate DV Done
3,119,511 UART: [fht] FMC Alias Private Key: 7
3,120,529 UART: [art] Derive CDI
3,120,809 UART: [art] Store in in slot 0x4
3,206,656 UART: [art] Derive Key Pair
3,207,016 UART: [art] Store priv key in slot 0x5
3,220,450 UART: [art] Derive Key Pair - Done
3,235,329 UART: [art] Signing Cert with AUTHO
3,235,809 UART: RITY.KEYID = 7
3,250,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,518 UART: [art] PUB.X = 37425464C2AB3A3F54AE58A3B96C805F5042E1C10458067169EEBFC76A39EAF24B761A2D688726AD7C7BF834D9C5FDB0
3,258,290 UART: [art] PUB.Y = A8BC742FDA3104FE866B8484E9DFF59D1E5E282A59E8EDBA4B675F15741C5C6C49FA085D5FCE108A63264C0C7C60AEE1
3,265,249 UART: [art] SIG.R = 56ACFBF1A24CD637DA03C4D63367C490A940D3F11DD1253B45A3531145D4ED1C428C64131EEBCE79E7C374B0EA56D400
3,272,004 UART: [art] SIG.S = 04B41C47EE42408E75225580A1723C033DF08F73A8C9DE631AF578E00FCE6008798DDC65AA6E2F40FE8117FC92E4B456
3,295,541 UART: Caliptra RT
3,295,886 UART: [state] CFI Enabled
3,403,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,722,549 >>> mbox cmd response: failed
4,722,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,728,148 UART:
4,728,164 UART: Running Caliptra FMC ...
4,728,572 UART:
4,728,715 UART: [state] CFI Enabled
4,817,882 UART: [art] Extend RT PCRs Done
4,818,310 UART: [art] Lock RT PCRs Done
4,819,647 UART: [art] Populate DV Done
4,827,826 UART: [fht] FMC Alias Private Key: 7
4,828,826 UART: [art] Derive CDI
4,829,106 UART: [art] Store in in slot 0x4
4,914,763 UART: [art] Derive Key Pair
4,915,123 UART: [art] Store priv key in slot 0x5
4,928,309 UART: [art] Derive Key Pair - Done
4,943,174 UART: [art] Signing Cert with AUTHO
4,943,654 UART: RITY.KEYID = 7
4,958,952 UART: [art] Erasing AUTHORITY.KEYID = 7
4,959,717 UART: [art] PUB.X = 37425464C2AB3A3F54AE58A3B96C805F5042E1C10458067169EEBFC76A39EAF24B761A2D688726AD7C7BF834D9C5FDB0
4,966,489 UART: [art] PUB.Y = A8BC742FDA3104FE866B8484E9DFF59D1E5E282A59E8EDBA4B675F15741C5C6C49FA085D5FCE108A63264C0C7C60AEE1
4,973,448 UART: [art] SIG.R = 56ACFBF1A24CD637DA03C4D63367C490A940D3F11DD1253B45A3531145D4ED1C428C64131EEBCE79E7C374B0EA56D400
4,980,203 UART: [art] SIG.S = 04B41C47EE42408E75225580A1723C033DF08F73A8C9DE631AF578E00FCE6008798DDC65AA6E2F40FE8117FC92E4B456
5,004,012 UART: Caliptra RT
5,004,357 UART: [state] CFI Enabled
5,286,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,049,879 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
893,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,499 UART: [kat] ++
897,651 UART: [kat] sha1
901,963 UART: [kat] SHA2-256
903,903 UART: [kat] SHA2-384
906,712 UART: [kat] SHA2-512-ACC
908,613 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,172,285 UART: [cold-reset] ++
1,172,721 UART: [fht] FHT @ 0x50003400
1,175,310 UART: [idev] ++
1,175,478 UART: [idev] CDI.KEYID = 6
1,175,838 UART: [idev] SUBJECT.KEYID = 7
1,176,262 UART: [idev] UDS.KEYID = 0
1,176,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,428 UART: [idev] Erasing UDS.KEYID = 0
1,201,195 UART: [idev] Sha1 KeyId Algorithm
1,209,643 UART: [idev] --
1,210,605 UART: [ldev] ++
1,210,773 UART: [ldev] CDI.KEYID = 6
1,211,136 UART: [ldev] SUBJECT.KEYID = 5
1,211,562 UART: [ldev] AUTHORITY.KEYID = 7
1,212,025 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,284,094 UART: [fwproc] Recv command 0x46574c44
1,284,822 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,971 >>> mbox cmd response: success
2,774,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,776,211 UART: [afmc] ++
2,776,379 UART: [afmc] CDI.KEYID = 6
2,776,741 UART: [afmc] SUBJECT.KEYID = 7
2,777,166 UART: [afmc] AUTHORITY.KEYID = 5
2,812,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,552 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,156 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,882 UART: [afmc] --
2,855,924 UART: [cold-reset] --
2,856,666 UART: [state] Locking Datavault
2,858,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,695 UART: [state] Locking ICCM
2,859,249 UART: [exit] Launching FMC @ 0x40000130
2,864,578 UART:
2,864,594 UART: Running Caliptra FMC ...
2,865,002 UART:
2,865,056 UART: [state] CFI Enabled
2,875,377 UART: [fht] FMC Alias Private Key: 7
2,983,104 UART: [art] Extend RT PCRs Done
2,983,532 UART: [art] Lock RT PCRs Done
2,984,946 UART: [art] Populate DV Done
2,993,201 UART: [fht] FMC Alias Private Key: 7
2,994,189 UART: [art] Derive CDI
2,994,469 UART: [art] Store in in slot 0x4
3,079,766 UART: [art] Derive Key Pair
3,080,126 UART: [art] Store priv key in slot 0x5
3,093,210 UART: [art] Derive Key Pair - Done
3,107,807 UART: [art] Signing Cert with AUTHO
3,108,287 UART: RITY.KEYID = 7
3,123,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,466 UART: [art] PUB.X = 88985CFA8EE56E582C6564FFA2CD32F15453A09C6FEC2DC3F65F0422E75B5E8942A1A1A2301F8B2D4C818B3BC31F5A50
3,131,245 UART: [art] PUB.Y = 5A54070828F367D36D00F7065CE255692B70D7CC2113F30C66F5ED9C2664C5346E66F8916BE48C39AC113C4C91DCD9D7
3,138,161 UART: [art] SIG.R = EDF47C18A9C29B3113D34D4642CA05FDBE5276BB15AFA50890B6DF75B504064AA70E512284D6EAE476C612AF309B99AC
3,144,928 UART: [art] SIG.S = 9F1306F02E1F986C35967ACC78D50232ABFF93E644D724CED1E6F6A9C3FFC62F913F100159496FA2E78664445A847DFB
3,169,004 UART: Caliptra RT
3,169,257 UART: [state] CFI Enabled
3,277,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,979 UART:
3,278,995 UART: Running Caliptra ROM ...
3,279,403 UART:
3,279,458 UART: [state] CFI Enabled
3,282,508 UART: [state] LifecycleState = Unprovisioned
3,283,163 UART: [state] DebugLocked = No
3,283,661 UART: [state] WD Timer not started. Device not locked for debugging
3,284,871 UART: [kat] SHA2-256
4,090,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,646 UART: [kat] ++
4,094,798 UART: [kat] sha1
4,098,958 UART: [kat] SHA2-256
4,100,898 UART: [kat] SHA2-384
4,103,603 UART: [kat] SHA2-512-ACC
4,105,503 UART: [kat] ECC-384
4,114,960 UART: [kat] HMAC-384Kdf
4,119,526 UART: [kat] LMS
4,367,854 UART: [kat] --
4,368,526 UART: [update-reset] ++
4,383,769 >>> mbox cmd response: failed
4,383,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,384,179 UART: ROM Non-Fatal Error: 0x000B001D
4,385,025 UART: [state] Locking Datavault
4,385,817 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,421 UART: [state] Locking ICCM
4,386,847 UART: [exit] Launching FMC @ 0x40000130
4,392,176 UART:
4,392,192 UART: Running Caliptra FMC ...
4,392,600 UART:
4,392,654 UART: [state] CFI Enabled
4,481,665 UART: [art] Extend RT PCRs Done
4,482,093 UART: [art] Lock RT PCRs Done
4,483,368 UART: [art] Populate DV Done
4,491,675 UART: [fht] FMC Alias Private Key: 7
4,492,739 UART: [art] Derive CDI
4,493,019 UART: [art] Store in in slot 0x4
4,578,256 UART: [art] Derive Key Pair
4,578,616 UART: [art] Store priv key in slot 0x5
4,591,854 UART: [art] Derive Key Pair - Done
4,606,697 UART: [art] Signing Cert with AUTHO
4,607,177 UART: RITY.KEYID = 7
4,622,483 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,248 UART: [art] PUB.X = 88985CFA8EE56E582C6564FFA2CD32F15453A09C6FEC2DC3F65F0422E75B5E8942A1A1A2301F8B2D4C818B3BC31F5A50
4,630,027 UART: [art] PUB.Y = 5A54070828F367D36D00F7065CE255692B70D7CC2113F30C66F5ED9C2664C5346E66F8916BE48C39AC113C4C91DCD9D7
4,636,943 UART: [art] SIG.R = EDF47C18A9C29B3113D34D4642CA05FDBE5276BB15AFA50890B6DF75B504064AA70E512284D6EAE476C612AF309B99AC
4,643,710 UART: [art] SIG.S = 9F1306F02E1F986C35967ACC78D50232ABFF93E644D724CED1E6F6A9C3FFC62F913F100159496FA2E78664445A847DFB
4,668,024 UART: Caliptra RT
4,668,277 UART: [state] CFI Enabled
4,949,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,950,660 UART:
4,950,676 UART: Running Caliptra ROM ...
4,951,084 UART:
4,951,139 UART: [state] CFI Enabled
4,953,853 UART: [state] LifecycleState = Unprovisioned
4,954,508 UART: [state] DebugLocked = No
4,955,194 UART: [state] WD Timer not started. Device not locked for debugging
4,956,518 UART: [kat] SHA2-256
5,762,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,293 UART: [kat] ++
5,766,445 UART: [kat] sha1
5,770,795 UART: [kat] SHA2-256
5,772,735 UART: [kat] SHA2-384
5,775,428 UART: [kat] SHA2-512-ACC
5,777,328 UART: [kat] ECC-384
5,787,249 UART: [kat] HMAC-384Kdf
5,791,877 UART: [kat] LMS
6,040,205 UART: [kat] --
6,041,055 UART: [update-reset] ++
7,352,723 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,353,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,503,744 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,662 >>> mbox cmd response: success
2,626,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,688,308 UART:
2,688,324 UART: Running Caliptra FMC ...
2,688,732 UART:
2,688,786 UART: [state] CFI Enabled
2,698,689 UART: [fht] FMC Alias Private Key: 7
2,806,416 UART: [art] Extend RT PCRs Done
2,806,844 UART: [art] Lock RT PCRs Done
2,808,386 UART: [art] Populate DV Done
2,816,431 UART: [fht] FMC Alias Private Key: 7
2,817,501 UART: [art] Derive CDI
2,817,781 UART: [art] Store in in slot 0x4
2,903,032 UART: [art] Derive Key Pair
2,903,392 UART: [art] Store priv key in slot 0x5
2,916,936 UART: [art] Derive Key Pair - Done
2,932,009 UART: [art] Signing Cert with AUTHO
2,932,489 UART: RITY.KEYID = 7
2,947,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,116 UART: [art] PUB.X = 2F264A225B16C997B3B725E20A443316B64AD6F75F5D7425EE3A5FE51078634166FD7AF3C73F5289980242F66F9944E4
2,954,874 UART: [art] PUB.Y = 6F09364DEF96F83CA1BF60441ED654BFBE04D669C1DBB203E82CA1F17008612AEB05094889226246D05738FA0FDE28CA
2,961,811 UART: [art] SIG.R = B100B5D3A841A2508767A1C14ABF5D26336C6EB1BDAC3CD74ED43622CAE58CDDF8307E3B446668E37EE323949B4F6A1D
2,968,573 UART: [art] SIG.S = 45EDEF4DEA2B54D9CD1E6CFAEC3FE3F243582DB2B9F233639BBECE2900C5618849D23E52ACDA3B522734CF5F324B13F6
2,992,006 UART: Caliptra RT
2,992,259 UART: [state] CFI Enabled
3,100,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,588 >>> mbox cmd response: failed
4,093,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,099,399 UART:
4,099,415 UART: Running Caliptra FMC ...
4,099,823 UART:
4,099,877 UART: [state] CFI Enabled
4,189,240 UART: [art] Extend RT PCRs Done
4,189,668 UART: [art] Lock RT PCRs Done
4,191,011 UART: [art] Populate DV Done
4,199,298 UART: [fht] FMC Alias Private Key: 7
4,200,358 UART: [art] Derive CDI
4,200,638 UART: [art] Store in in slot 0x4
4,286,541 UART: [art] Derive Key Pair
4,286,901 UART: [art] Store priv key in slot 0x5
4,300,247 UART: [art] Derive Key Pair - Done
4,314,926 UART: [art] Signing Cert with AUTHO
4,315,406 UART: RITY.KEYID = 7
4,330,540 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,305 UART: [art] PUB.X = 2F264A225B16C997B3B725E20A443316B64AD6F75F5D7425EE3A5FE51078634166FD7AF3C73F5289980242F66F9944E4
4,338,063 UART: [art] PUB.Y = 6F09364DEF96F83CA1BF60441ED654BFBE04D669C1DBB203E82CA1F17008612AEB05094889226246D05738FA0FDE28CA
4,345,000 UART: [art] SIG.R = B100B5D3A841A2508767A1C14ABF5D26336C6EB1BDAC3CD74ED43622CAE58CDDF8307E3B446668E37EE323949B4F6A1D
4,351,762 UART: [art] SIG.S = 45EDEF4DEA2B54D9CD1E6CFAEC3FE3F243582DB2B9F233639BBECE2900C5618849D23E52ACDA3B522734CF5F324B13F6
4,375,609 UART: Caliptra RT
4,375,862 UART: [state] CFI Enabled
4,658,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,929 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,130 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,747 UART: [idev] Erasing UDS.KEYID = 0
1,200,738 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,234 UART: [ldev] ++
1,210,402 UART: [ldev] CDI.KEYID = 6
1,210,765 UART: [ldev] SUBJECT.KEYID = 5
1,211,191 UART: [ldev] AUTHORITY.KEYID = 7
1,211,654 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,726 UART: [ldev] --
1,282,993 UART: [fwproc] Wait for Commands...
1,283,571 UART: [fwproc] Recv command 0x46574c44
1,284,299 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,364 >>> mbox cmd response: success
2,774,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,775,588 UART: [afmc] ++
2,775,756 UART: [afmc] CDI.KEYID = 6
2,776,118 UART: [afmc] SUBJECT.KEYID = 7
2,776,543 UART: [afmc] AUTHORITY.KEYID = 5
2,812,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,025 UART: [afmc] --
2,855,925 UART: [cold-reset] --
2,856,803 UART: [state] Locking Datavault
2,858,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,608 UART: [state] Locking ICCM
2,859,078 UART: [exit] Launching FMC @ 0x40000130
2,864,407 UART:
2,864,423 UART: Running Caliptra FMC ...
2,864,831 UART:
2,864,974 UART: [state] CFI Enabled
2,875,573 UART: [fht] FMC Alias Private Key: 7
2,983,162 UART: [art] Extend RT PCRs Done
2,983,590 UART: [art] Lock RT PCRs Done
2,985,124 UART: [art] Populate DV Done
2,993,163 UART: [fht] FMC Alias Private Key: 7
2,994,113 UART: [art] Derive CDI
2,994,393 UART: [art] Store in in slot 0x4
3,080,436 UART: [art] Derive Key Pair
3,080,796 UART: [art] Store priv key in slot 0x5
3,094,314 UART: [art] Derive Key Pair - Done
3,109,225 UART: [art] Signing Cert with AUTHO
3,109,705 UART: RITY.KEYID = 7
3,125,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,978 UART: [art] PUB.X = 1A4E0CF1E791B4194F489E6D9E496101B61208C3A855926C3D60EC4EF29761AD2F57A450D1DBBFB03B5FBDD096708A21
3,132,747 UART: [art] PUB.Y = 9488D72120F50FE5BC96BED617D65BF37CE17895831374CC011E7A01599088303E6A2C2D15C8AA14FA8B2C491A55EF5E
3,139,692 UART: [art] SIG.R = 1B27E857C1F48CDF1691454B33B424D29057A8F05ECC359A3374ED51C2CF68C9EC466413F2D6F5C4D82961D453C1DEC3
3,146,468 UART: [art] SIG.S = F01C78BFFD0F6323D67F92750CDD3DCF0029CFB8CA31C1882A6EFAC29F2842125A04B20B90DBEE71B485F0E26EC9C39E
3,170,271 UART: Caliptra RT
3,170,616 UART: [state] CFI Enabled
3,278,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,491 UART:
3,280,507 UART: Running Caliptra ROM ...
3,280,915 UART:
3,281,057 UART: [state] CFI Enabled
3,284,053 UART: [state] LifecycleState = Unprovisioned
3,284,708 UART: [state] DebugLocked = No
3,285,234 UART: [state] WD Timer not started. Device not locked for debugging
3,286,374 UART: [kat] SHA2-256
4,092,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,149 UART: [kat] ++
4,096,301 UART: [kat] sha1
4,100,593 UART: [kat] SHA2-256
4,102,533 UART: [kat] SHA2-384
4,105,288 UART: [kat] SHA2-512-ACC
4,107,188 UART: [kat] ECC-384
4,116,907 UART: [kat] HMAC-384Kdf
4,121,511 UART: [kat] LMS
4,369,839 UART: [kat] --
4,370,749 UART: [update-reset] ++
4,385,754 >>> mbox cmd response: failed
4,385,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,386,262 UART: ROM Non-Fatal Error: 0x000B001D
4,387,064 UART: [state] Locking Datavault
4,387,958 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,562 UART: [state] Locking ICCM
4,389,106 UART: [exit] Launching FMC @ 0x40000130
4,394,435 UART:
4,394,451 UART: Running Caliptra FMC ...
4,394,859 UART:
4,395,002 UART: [state] CFI Enabled
4,484,529 UART: [art] Extend RT PCRs Done
4,484,957 UART: [art] Lock RT PCRs Done
4,486,018 UART: [art] Populate DV Done
4,494,109 UART: [fht] FMC Alias Private Key: 7
4,495,169 UART: [art] Derive CDI
4,495,449 UART: [art] Store in in slot 0x4
4,581,168 UART: [art] Derive Key Pair
4,581,528 UART: [art] Store priv key in slot 0x5
4,594,874 UART: [art] Derive Key Pair - Done
4,609,519 UART: [art] Signing Cert with AUTHO
4,609,999 UART: RITY.KEYID = 7
4,624,917 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,682 UART: [art] PUB.X = 1A4E0CF1E791B4194F489E6D9E496101B61208C3A855926C3D60EC4EF29761AD2F57A450D1DBBFB03B5FBDD096708A21
4,632,451 UART: [art] PUB.Y = 9488D72120F50FE5BC96BED617D65BF37CE17895831374CC011E7A01599088303E6A2C2D15C8AA14FA8B2C491A55EF5E
4,639,396 UART: [art] SIG.R = 1B27E857C1F48CDF1691454B33B424D29057A8F05ECC359A3374ED51C2CF68C9EC466413F2D6F5C4D82961D453C1DEC3
4,646,172 UART: [art] SIG.S = F01C78BFFD0F6323D67F92750CDD3DCF0029CFB8CA31C1882A6EFAC29F2842125A04B20B90DBEE71B485F0E26EC9C39E
4,669,317 UART: Caliptra RT
4,669,662 UART: [state] CFI Enabled
4,948,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,584 UART:
4,949,600 UART: Running Caliptra ROM ...
4,950,008 UART:
4,950,150 UART: [state] CFI Enabled
4,953,064 UART: [state] LifecycleState = Unprovisioned
4,953,719 UART: [state] DebugLocked = No
4,954,319 UART: [state] WD Timer not started. Device not locked for debugging
4,955,465 UART: [kat] SHA2-256
5,761,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,765,240 UART: [kat] ++
5,765,392 UART: [kat] sha1
5,769,680 UART: [kat] SHA2-256
5,771,620 UART: [kat] SHA2-384
5,774,579 UART: [kat] SHA2-512-ACC
5,776,479 UART: [kat] ECC-384
5,786,268 UART: [kat] HMAC-384Kdf
5,790,890 UART: [kat] LMS
6,039,218 UART: [kat] --
6,040,130 UART: [update-reset] ++
7,352,598 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,353,635 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,503,459 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,949 >>> mbox cmd response: success
2,626,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,973 UART:
2,689,989 UART: Running Caliptra FMC ...
2,690,397 UART:
2,690,540 UART: [state] CFI Enabled
2,701,447 UART: [fht] FMC Alias Private Key: 7
2,808,658 UART: [art] Extend RT PCRs Done
2,809,086 UART: [art] Lock RT PCRs Done
2,810,796 UART: [art] Populate DV Done
2,818,945 UART: [fht] FMC Alias Private Key: 7
2,820,031 UART: [art] Derive CDI
2,820,311 UART: [art] Store in in slot 0x4
2,905,856 UART: [art] Derive Key Pair
2,906,216 UART: [art] Store priv key in slot 0x5
2,918,982 UART: [art] Derive Key Pair - Done
2,933,412 UART: [art] Signing Cert with AUTHO
2,933,892 UART: RITY.KEYID = 7
2,948,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,591 UART: [art] PUB.X = B0FA4053F5135DB665F7408DA9B0AE5C6BC241BE5D5AF58E98CF086703D99E6C03C1E32C51FBE25F6D82E03723F043A5
2,956,364 UART: [art] PUB.Y = 7EB4186C42C0033705ACE71DCBAEE08B959451859763927B3D68B1C259A4BD9220CAC26550867D817DD0B5A2FF6FB464
2,963,312 UART: [art] SIG.R = 1E34475ED8803741094FC35AB789AD7DD7F221C25371B3E3B178B97FC6F00C160245344D0288059C7BFE24927D7B0A4A
2,970,062 UART: [art] SIG.S = 52D8EC3B946A6FA982D548E331C10CDF9F7C1C8318F56A47985FA462EBF91F9B85193462E5FB5EB65EB2B4C4537D31F0
2,994,498 UART: Caliptra RT
2,994,843 UART: [state] CFI Enabled
3,102,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,971 >>> mbox cmd response: failed
4,095,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,101,766 UART:
4,101,782 UART: Running Caliptra FMC ...
4,102,190 UART:
4,102,333 UART: [state] CFI Enabled
4,191,846 UART: [art] Extend RT PCRs Done
4,192,274 UART: [art] Lock RT PCRs Done
4,193,737 UART: [art] Populate DV Done
4,201,728 UART: [fht] FMC Alias Private Key: 7
4,202,716 UART: [art] Derive CDI
4,202,996 UART: [art] Store in in slot 0x4
4,288,779 UART: [art] Derive Key Pair
4,289,139 UART: [art] Store priv key in slot 0x5
4,302,147 UART: [art] Derive Key Pair - Done
4,316,777 UART: [art] Signing Cert with AUTHO
4,317,257 UART: RITY.KEYID = 7
4,332,783 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,548 UART: [art] PUB.X = B0FA4053F5135DB665F7408DA9B0AE5C6BC241BE5D5AF58E98CF086703D99E6C03C1E32C51FBE25F6D82E03723F043A5
4,340,321 UART: [art] PUB.Y = 7EB4186C42C0033705ACE71DCBAEE08B959451859763927B3D68B1C259A4BD9220CAC26550867D817DD0B5A2FF6FB464
4,347,269 UART: [art] SIG.R = 1E34475ED8803741094FC35AB789AD7DD7F221C25371B3E3B178B97FC6F00C160245344D0288059C7BFE24927D7B0A4A
4,354,019 UART: [art] SIG.S = 52D8EC3B946A6FA982D548E331C10CDF9F7C1C8318F56A47985FA462EBF91F9B85193462E5FB5EB65EB2B4C4537D31F0
4,377,987 UART: Caliptra RT
4,378,332 UART: [state] CFI Enabled
4,654,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,946 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,208,862 UART: [ldev] ++
1,209,030 UART: [ldev] CDI.KEYID = 6
1,209,394 UART: [ldev] SUBJECT.KEYID = 5
1,209,821 UART: [ldev] AUTHORITY.KEYID = 7
1,210,284 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,314 UART: [ldev] --
1,280,646 UART: [fwproc] Wait for Commands...
1,281,277 UART: [fwproc] Recv command 0x46574c44
1,282,010 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,005 >>> mbox cmd response: success
2,772,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,773,224 UART: [afmc] ++
2,773,392 UART: [afmc] CDI.KEYID = 6
2,773,755 UART: [afmc] SUBJECT.KEYID = 7
2,774,181 UART: [afmc] AUTHORITY.KEYID = 5
2,809,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,859 UART: [afmc] --
2,852,745 UART: [cold-reset] --
2,853,451 UART: [state] Locking Datavault
2,854,252 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,856 UART: [state] Locking ICCM
2,855,378 UART: [exit] Launching FMC @ 0x40000130
2,860,707 UART:
2,860,723 UART: Running Caliptra FMC ...
2,861,131 UART:
2,861,185 UART: [state] CFI Enabled
2,871,748 UART: [fht] FMC Alias Private Key: 7
2,979,547 UART: [art] Extend RT PCRs Done
2,979,975 UART: [art] Lock RT PCRs Done
2,981,259 UART: [art] Populate DV Done
2,989,746 UART: [fht] FMC Alias Private Key: 7
2,990,738 UART: [art] Derive CDI
2,991,018 UART: [art] Store in in slot 0x4
3,076,611 UART: [art] Derive Key Pair
3,076,971 UART: [art] Store priv key in slot 0x5
3,089,615 UART: [art] Derive Key Pair - Done
3,104,335 UART: [art] Signing Cert with AUTHO
3,104,815 UART: RITY.KEYID = 7
3,120,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,828 UART: [art] PUB.X = 839581AEF08E17078049F8B426657574C5B9AC41AE1051CE46E1398C1FC2EF84BFD1D401768621D68EE57A3C13179D88
3,127,590 UART: [art] PUB.Y = A8BE1EA32A489AC17DA0157142963DCF446D178147490C7E969CF10BCD3E6D0A705EF6EBFB482BF937171F2114C725E5
3,134,539 UART: [art] SIG.R = A28436B5166F9F1C238A4303FAF21F97B2881B2D2BDD434E82CDF093A303A42063C23BD7289CC03D26E7A45B4AC1480E
3,141,306 UART: [art] SIG.S = B99844D56E88187EF7E747C6F7DA79837AAB36FC999A780E5B11F1D75CBFB4096C0B2E7BAAFDAC2789537670126D7378
3,164,730 UART: Caliptra RT
3,164,983 UART: [state] CFI Enabled
3,272,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,579 UART:
3,274,595 UART: Running Caliptra ROM ...
3,275,003 UART:
3,275,058 UART: [state] CFI Enabled
3,277,596 UART: [state] LifecycleState = Unprovisioned
3,278,251 UART: [state] DebugLocked = No
3,278,877 UART: [state] WD Timer not started. Device not locked for debugging
3,280,095 UART: [kat] SHA2-256
4,083,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,774 UART: [kat] ++
4,087,926 UART: [kat] sha1
4,091,958 UART: [kat] SHA2-256
4,093,898 UART: [kat] SHA2-384
4,096,647 UART: [kat] SHA2-512-ACC
4,098,547 UART: [kat] ECC-384
4,108,358 UART: [kat] HMAC-384Kdf
4,112,942 UART: [kat] LMS
4,361,254 UART: [kat] --
4,362,122 UART: [update-reset] ++
4,377,499 >>> mbox cmd response: failed
4,377,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,377,937 UART: ROM Non-Fatal Error: 0x000B001D
4,378,873 UART: [state] Locking Datavault
4,379,829 UART: [state] Locking PCR0, PCR1 and PCR31
4,380,433 UART: [state] Locking ICCM
4,380,911 UART: [exit] Launching FMC @ 0x40000130
4,386,240 UART:
4,386,256 UART: Running Caliptra FMC ...
4,386,664 UART:
4,386,718 UART: [state] CFI Enabled
4,475,707 UART: [art] Extend RT PCRs Done
4,476,135 UART: [art] Lock RT PCRs Done
4,477,382 UART: [art] Populate DV Done
4,485,865 UART: [fht] FMC Alias Private Key: 7
4,486,925 UART: [art] Derive CDI
4,487,205 UART: [art] Store in in slot 0x4
4,572,922 UART: [art] Derive Key Pair
4,573,282 UART: [art] Store priv key in slot 0x5
4,586,206 UART: [art] Derive Key Pair - Done
4,601,242 UART: [art] Signing Cert with AUTHO
4,601,722 UART: RITY.KEYID = 7
4,617,802 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,567 UART: [art] PUB.X = 839581AEF08E17078049F8B426657574C5B9AC41AE1051CE46E1398C1FC2EF84BFD1D401768621D68EE57A3C13179D88
4,625,329 UART: [art] PUB.Y = A8BE1EA32A489AC17DA0157142963DCF446D178147490C7E969CF10BCD3E6D0A705EF6EBFB482BF937171F2114C725E5
4,632,278 UART: [art] SIG.R = A28436B5166F9F1C238A4303FAF21F97B2881B2D2BDD434E82CDF093A303A42063C23BD7289CC03D26E7A45B4AC1480E
4,639,045 UART: [art] SIG.S = B99844D56E88187EF7E747C6F7DA79837AAB36FC999A780E5B11F1D75CBFB4096C0B2E7BAAFDAC2789537670126D7378
4,663,213 UART: Caliptra RT
4,663,466 UART: [state] CFI Enabled
4,942,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,943,989 UART:
4,944,005 UART: Running Caliptra ROM ...
4,944,413 UART:
4,944,468 UART: [state] CFI Enabled
4,947,656 UART: [state] LifecycleState = Unprovisioned
4,948,311 UART: [state] DebugLocked = No
4,948,839 UART: [state] WD Timer not started. Device not locked for debugging
4,950,011 UART: [kat] SHA2-256
5,753,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,757,690 UART: [kat] ++
5,757,842 UART: [kat] sha1
5,762,200 UART: [kat] SHA2-256
5,764,140 UART: [kat] SHA2-384
5,766,873 UART: [kat] SHA2-512-ACC
5,768,773 UART: [kat] ECC-384
5,778,550 UART: [kat] HMAC-384Kdf
5,783,198 UART: [kat] LMS
6,031,510 UART: [kat] --
6,032,332 UART: [update-reset] ++
7,344,045 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,345,082 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,494,906 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,359 >>> mbox cmd response: success
2,623,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,686,305 UART:
2,686,321 UART: Running Caliptra FMC ...
2,686,729 UART:
2,686,783 UART: [state] CFI Enabled
2,697,446 UART: [fht] FMC Alias Private Key: 7
2,805,395 UART: [art] Extend RT PCRs Done
2,805,823 UART: [art] Lock RT PCRs Done
2,807,435 UART: [art] Populate DV Done
2,815,788 UART: [fht] FMC Alias Private Key: 7
2,816,918 UART: [art] Derive CDI
2,817,198 UART: [art] Store in in slot 0x4
2,902,903 UART: [art] Derive Key Pair
2,903,263 UART: [art] Store priv key in slot 0x5
2,915,831 UART: [art] Derive Key Pair - Done
2,930,791 UART: [art] Signing Cert with AUTHO
2,931,271 UART: RITY.KEYID = 7
2,945,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,740 UART: [art] PUB.X = 5D2D5A894C0308EEC12AA23567B9AB20CFF8B59B488121BA873D8ED5409E16D23E9DF1B7B3038B0982246D65E7ABEC14
2,953,508 UART: [art] PUB.Y = 81AE03AC76A77F5CAC54D99F3ACCFC94C4A3D17A6CC598BE5CD6405B244B37457C1DB7F382766D413BD17D4C2F7CF5EA
2,960,477 UART: [art] SIG.R = 5D2547B1814D7C95E39E2F90A85039F8092850D12CB3D7216051B06A2681CFF5B720E6DBEB74DEB181DDF628C1139E30
2,967,246 UART: [art] SIG.S = FEC4992D832BF3F1FCC1589042B95591A099017A36183F597ACDEA1A995F115061E1483DEDF351465993B974289F8E2B
2,991,038 UART: Caliptra RT
2,991,291 UART: [state] CFI Enabled
3,098,576 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,582 >>> mbox cmd response: failed
4,087,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,093,631 UART:
4,093,647 UART: Running Caliptra FMC ...
4,094,055 UART:
4,094,109 UART: [state] CFI Enabled
4,183,360 UART: [art] Extend RT PCRs Done
4,183,788 UART: [art] Lock RT PCRs Done
4,184,719 UART: [art] Populate DV Done
4,192,702 UART: [fht] FMC Alias Private Key: 7
4,193,734 UART: [art] Derive CDI
4,194,014 UART: [art] Store in in slot 0x4
4,279,309 UART: [art] Derive Key Pair
4,279,669 UART: [art] Store priv key in slot 0x5
4,293,269 UART: [art] Derive Key Pair - Done
4,308,021 UART: [art] Signing Cert with AUTHO
4,308,501 UART: RITY.KEYID = 7
4,323,373 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,138 UART: [art] PUB.X = 5D2D5A894C0308EEC12AA23567B9AB20CFF8B59B488121BA873D8ED5409E16D23E9DF1B7B3038B0982246D65E7ABEC14
4,330,906 UART: [art] PUB.Y = 81AE03AC76A77F5CAC54D99F3ACCFC94C4A3D17A6CC598BE5CD6405B244B37457C1DB7F382766D413BD17D4C2F7CF5EA
4,337,875 UART: [art] SIG.R = 5D2547B1814D7C95E39E2F90A85039F8092850D12CB3D7216051B06A2681CFF5B720E6DBEB74DEB181DDF628C1139E30
4,344,644 UART: [art] SIG.S = FEC4992D832BF3F1FCC1589042B95591A099017A36183F597ACDEA1A995F115061E1483DEDF351465993B974289F8E2B
4,367,828 UART: Caliptra RT
4,368,081 UART: [state] CFI Enabled
4,649,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,081,905 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,727 UART: [state] LifecycleState = Unprovisioned
85,382 UART: [state] DebugLocked = No
85,904 UART: [state] WD Timer not started. Device not locked for debugging
87,215 UART: [kat] SHA2-256
890,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,894 UART: [kat] ++
895,046 UART: [kat] sha1
899,244 UART: [kat] SHA2-256
901,184 UART: [kat] SHA2-384
904,109 UART: [kat] SHA2-512-ACC
906,010 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,174,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,306 UART: [fwproc] Recv command 0x46574c44
1,283,039 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,122 >>> mbox cmd response: success
2,773,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,387 UART: [afmc] ++
2,774,555 UART: [afmc] CDI.KEYID = 6
2,774,918 UART: [afmc] SUBJECT.KEYID = 7
2,775,344 UART: [afmc] AUTHORITY.KEYID = 5
2,810,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,810 UART: [afmc] --
2,853,884 UART: [cold-reset] --
2,854,754 UART: [state] Locking Datavault
2,855,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,595 UART: [state] Locking ICCM
2,857,177 UART: [exit] Launching FMC @ 0x40000130
2,862,506 UART:
2,862,522 UART: Running Caliptra FMC ...
2,862,930 UART:
2,863,073 UART: [state] CFI Enabled
2,873,448 UART: [fht] FMC Alias Private Key: 7
2,981,561 UART: [art] Extend RT PCRs Done
2,981,989 UART: [art] Lock RT PCRs Done
2,983,459 UART: [art] Populate DV Done
2,991,714 UART: [fht] FMC Alias Private Key: 7
2,992,828 UART: [art] Derive CDI
2,993,108 UART: [art] Store in in slot 0x4
3,079,107 UART: [art] Derive Key Pair
3,079,467 UART: [art] Store priv key in slot 0x5
3,093,125 UART: [art] Derive Key Pair - Done
3,107,715 UART: [art] Signing Cert with AUTHO
3,108,195 UART: RITY.KEYID = 7
3,123,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,348 UART: [art] PUB.X = EC3AA18F244DA5DF5BA853511AE65A24966DD28D607713C7DE0D97667F62145B86FA41EBBF4188D5552B6C5EC151AE68
3,131,125 UART: [art] PUB.Y = B5100C868F4B20F35B9A8B45BC40D899A1758B9FD769523864FAEC42068898521E33399D9FC4C6C6C24B0D90199225DA
3,138,064 UART: [art] SIG.R = 1AF003CDE603C239FB5A57E2683175522AACC73F2A82551FDF40FDB3461085FAB3FDBEB9FE242B33A635313AB537B276
3,144,840 UART: [art] SIG.S = 489FF8A00EDF767DEF3AC323DA46A7E0AB6545C43B038F0F6F23940AA424D57292B234DECCD34C21A5698A145A24FB49
3,168,471 UART: Caliptra RT
3,168,816 UART: [state] CFI Enabled
3,276,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,235 UART:
3,278,251 UART: Running Caliptra ROM ...
3,278,659 UART:
3,278,801 UART: [state] CFI Enabled
3,281,141 UART: [state] LifecycleState = Unprovisioned
3,281,796 UART: [state] DebugLocked = No
3,282,336 UART: [state] WD Timer not started. Device not locked for debugging
3,283,570 UART: [kat] SHA2-256
4,087,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,249 UART: [kat] ++
4,091,401 UART: [kat] sha1
4,095,463 UART: [kat] SHA2-256
4,097,403 UART: [kat] SHA2-384
4,100,104 UART: [kat] SHA2-512-ACC
4,102,004 UART: [kat] ECC-384
4,111,497 UART: [kat] HMAC-384Kdf
4,116,065 UART: [kat] LMS
4,364,377 UART: [kat] --
4,364,987 UART: [update-reset] ++
4,380,024 >>> mbox cmd response: failed
4,380,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,380,316 UART: ROM Non-Fatal Error: 0x000B001D
4,381,168 UART: [state] Locking Datavault
4,381,926 UART: [state] Locking PCR0, PCR1 and PCR31
4,382,530 UART: [state] Locking ICCM
4,383,128 UART: [exit] Launching FMC @ 0x40000130
4,388,457 UART:
4,388,473 UART: Running Caliptra FMC ...
4,388,881 UART:
4,389,024 UART: [state] CFI Enabled
4,477,961 UART: [art] Extend RT PCRs Done
4,478,389 UART: [art] Lock RT PCRs Done
4,479,446 UART: [art] Populate DV Done
4,487,385 UART: [fht] FMC Alias Private Key: 7
4,488,411 UART: [art] Derive CDI
4,488,691 UART: [art] Store in in slot 0x4
4,574,360 UART: [art] Derive Key Pair
4,574,720 UART: [art] Store priv key in slot 0x5
4,587,612 UART: [art] Derive Key Pair - Done
4,602,254 UART: [art] Signing Cert with AUTHO
4,602,734 UART: RITY.KEYID = 7
4,618,250 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,015 UART: [art] PUB.X = EC3AA18F244DA5DF5BA853511AE65A24966DD28D607713C7DE0D97667F62145B86FA41EBBF4188D5552B6C5EC151AE68
4,625,792 UART: [art] PUB.Y = B5100C868F4B20F35B9A8B45BC40D899A1758B9FD769523864FAEC42068898521E33399D9FC4C6C6C24B0D90199225DA
4,632,731 UART: [art] SIG.R = 1AF003CDE603C239FB5A57E2683175522AACC73F2A82551FDF40FDB3461085FAB3FDBEB9FE242B33A635313AB537B276
4,639,507 UART: [art] SIG.S = 489FF8A00EDF767DEF3AC323DA46A7E0AB6545C43B038F0F6F23940AA424D57292B234DECCD34C21A5698A145A24FB49
4,663,420 UART: Caliptra RT
4,663,765 UART: [state] CFI Enabled
4,943,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,944,941 UART:
4,944,957 UART: Running Caliptra ROM ...
4,945,365 UART:
4,945,507 UART: [state] CFI Enabled
4,948,025 UART: [state] LifecycleState = Unprovisioned
4,948,680 UART: [state] DebugLocked = No
4,949,248 UART: [state] WD Timer not started. Device not locked for debugging
4,950,442 UART: [kat] SHA2-256
5,753,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,758,121 UART: [kat] ++
5,758,273 UART: [kat] sha1
5,762,701 UART: [kat] SHA2-256
5,764,641 UART: [kat] SHA2-384
5,767,538 UART: [kat] SHA2-512-ACC
5,769,438 UART: [kat] ECC-384
5,779,279 UART: [kat] HMAC-384Kdf
5,783,963 UART: [kat] LMS
6,032,275 UART: [kat] --
6,033,177 UART: [update-reset] ++
7,345,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,346,337 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,496,161 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,676 >>> mbox cmd response: success
2,621,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,844 UART:
2,683,860 UART: Running Caliptra FMC ...
2,684,268 UART:
2,684,411 UART: [state] CFI Enabled
2,695,030 UART: [fht] FMC Alias Private Key: 7
2,803,043 UART: [art] Extend RT PCRs Done
2,803,471 UART: [art] Lock RT PCRs Done
2,804,783 UART: [art] Populate DV Done
2,813,002 UART: [fht] FMC Alias Private Key: 7
2,814,102 UART: [art] Derive CDI
2,814,382 UART: [art] Store in in slot 0x4
2,899,701 UART: [art] Derive Key Pair
2,900,061 UART: [art] Store priv key in slot 0x5
2,913,455 UART: [art] Derive Key Pair - Done
2,928,143 UART: [art] Signing Cert with AUTHO
2,928,623 UART: RITY.KEYID = 7
2,944,347 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,112 UART: [art] PUB.X = 167E427E6B93DC410B8778C2FAF0B6FC9203B65CD8B4E403F6FB52AF293A82ED385F7DF82803E0586F84DA30F76FF3E4
2,951,882 UART: [art] PUB.Y = 1591AFC1B55FA70C7A1916234286D299A90F3CBE9343D23652FC511E47AA35BFDB7FB9C9BBF164C3E6CBBA57A02497D3
2,958,840 UART: [art] SIG.R = 75902640E3039306DDA3782344A06819A447965CC4922F64F4813FFBEFE821C5FD71B217DCC02F444B1B5D477DD0DBF3
2,965,606 UART: [art] SIG.S = 6C3BCCB68EE2A19543076FEC076FFD755C6479D93B9A60C8ECE6321FF67AF64F54C5CD42DC2EB4E1CB7FD85470570F45
2,989,448 UART: Caliptra RT
2,989,793 UART: [state] CFI Enabled
3,097,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,691 >>> mbox cmd response: failed
4,086,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,092,204 UART:
4,092,220 UART: Running Caliptra FMC ...
4,092,628 UART:
4,092,771 UART: [state] CFI Enabled
4,181,746 UART: [art] Extend RT PCRs Done
4,182,174 UART: [art] Lock RT PCRs Done
4,183,565 UART: [art] Populate DV Done
4,191,868 UART: [fht] FMC Alias Private Key: 7
4,192,826 UART: [art] Derive CDI
4,193,106 UART: [art] Store in in slot 0x4
4,278,957 UART: [art] Derive Key Pair
4,279,317 UART: [art] Store priv key in slot 0x5
4,292,741 UART: [art] Derive Key Pair - Done
4,307,613 UART: [art] Signing Cert with AUTHO
4,308,093 UART: RITY.KEYID = 7
4,323,417 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,182 UART: [art] PUB.X = 167E427E6B93DC410B8778C2FAF0B6FC9203B65CD8B4E403F6FB52AF293A82ED385F7DF82803E0586F84DA30F76FF3E4
4,330,952 UART: [art] PUB.Y = 1591AFC1B55FA70C7A1916234286D299A90F3CBE9343D23652FC511E47AA35BFDB7FB9C9BBF164C3E6CBBA57A02497D3
4,337,910 UART: [art] SIG.R = 75902640E3039306DDA3782344A06819A447965CC4922F64F4813FFBEFE821C5FD71B217DCC02F444B1B5D477DD0DBF3
4,344,676 UART: [art] SIG.S = 6C3BCCB68EE2A19543076FEC076FFD755C6479D93B9A60C8ECE6321FF67AF64F54C5CD42DC2EB4E1CB7FD85470570F45
4,368,288 UART: Caliptra RT
4,368,633 UART: [state] CFI Enabled
4,652,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,152 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,527 UART: [kat] SHA2-256
882,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,573 UART: [kat] ++
886,725 UART: [kat] sha1
890,997 UART: [kat] SHA2-256
892,935 UART: [kat] SHA2-384
895,830 UART: [kat] SHA2-512-ACC
897,731 UART: [kat] ECC-384
903,158 UART: [kat] HMAC-384Kdf
907,678 UART: [kat] LMS
1,475,874 UART: [kat] --
1,476,625 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,910 UART: [idev] ++
1,480,078 UART: [idev] CDI.KEYID = 6
1,480,438 UART: [idev] SUBJECT.KEYID = 7
1,480,862 UART: [idev] UDS.KEYID = 0
1,481,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,524 UART: [idev] Erasing UDS.KEYID = 0
1,504,746 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,376 UART: [idev] --
1,514,261 UART: [ldev] ++
1,514,429 UART: [ldev] CDI.KEYID = 6
1,514,792 UART: [ldev] SUBJECT.KEYID = 5
1,515,218 UART: [ldev] AUTHORITY.KEYID = 7
1,515,681 UART: [ldev] FE.KEYID = 1
1,520,967 UART: [ldev] Erasing FE.KEYID = 1
1,546,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,482 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,524 UART: [fwproc] Received command 0x46574c44
1,587,315 UART: [fwproc] Received Image of size 114332 bytes
2,884,123 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,447 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,538 >>> mbox cmd response: success
3,076,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,077,718 UART: [afmc] ++
3,077,886 UART: [afmc] CDI.KEYID = 6
3,078,248 UART: [afmc] SUBJECT.KEYID = 7
3,078,673 UART: [afmc] AUTHORITY.KEYID = 5
3,113,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,374 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,086 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,141,997 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,147,704 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,155,524 UART: [afmc] --
3,156,534 UART: [cold-reset] --
3,157,516 UART: [state] Locking Datavault
3,158,707 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,311 UART: [state] Locking ICCM
3,159,953 UART: [exit] Launching FMC @ 0x40000130
3,165,282 UART:
3,165,298 UART: Running Caliptra FMC ...
3,165,706 UART:
3,165,760 UART: [state] CFI Enabled
3,175,957 UART: [fht] FMC Alias Private Key: 7
3,283,861 UART: [art] Extend RT PCRs Done
3,284,289 UART: [art] Lock RT PCRs Done
3,286,045 UART: [art] Populate DV Done
3,294,326 UART: [fht] FMC Alias Private Key: 7
3,295,494 UART: [art] Derive CDI
3,295,774 UART: [art] Store in in slot 0x4
3,381,317 UART: [art] Derive Key Pair
3,381,677 UART: [art] Store priv key in slot 0x5
3,394,163 UART: [art] Derive Key Pair - Done
3,408,954 UART: [art] Signing Cert with AUTHO
3,409,434 UART: RITY.KEYID = 7
3,424,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,277 UART: [art] PUB.X = 0CCC756DD0A58C98A4F036749BDE952663BA5048F7134B55196916E5AF3EEA66182807CBA2003A75D6A0C49D8B178182
3,432,019 UART: [art] PUB.Y = 1C7EAC4BE9E500C0EAB8F88E6195D4C14BB3DEBC2EC65C9DACC99DDDEC9FB4A26EA69220E50807A644DD8A7AE76932D7
3,438,971 UART: [art] SIG.R = CE161CE6F64B5BC89B3FE4BF76AB980A22DB3763073C43EE23F43C7A068B8BCCAD48C8BA0AF193E98F19575624ED2582
3,445,745 UART: [art] SIG.S = B9B39CC681FDC77E48DCEB3C363BBA2688B78B799E05D197CC7039D83F53FFFCBF2F9E726729A11D5EF6CAA6D3B6C9DE
3,469,163 UART: Caliptra RT
3,469,416 UART: [state] CFI Enabled
3,576,510 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,573 UART:
3,578,589 UART: Running Caliptra ROM ...
3,578,997 UART:
3,579,051 UART: [state] CFI Enabled
3,581,971 UART: [state] LifecycleState = Unprovisioned
3,582,626 UART: [state] DebugLocked = No
3,583,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,585,025 UART: [kat] SHA2-256
4,378,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,071 UART: [kat] ++
4,383,223 UART: [kat] sha1
4,387,419 UART: [kat] SHA2-256
4,389,357 UART: [kat] SHA2-384
4,392,128 UART: [kat] SHA2-512-ACC
4,394,028 UART: [kat] ECC-384
4,399,465 UART: [kat] HMAC-384Kdf
4,404,149 UART: [kat] LMS
4,972,345 UART: [kat] --
4,973,392 UART: [update-reset] ++
5,012,577 >>> mbox cmd response: failed
5,012,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,012,923 UART: ROM Non-Fatal Error: 0x000B001E
5,013,859 UART: [state] Locking Datavault
5,014,589 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,193 UART: [state] Locking ICCM
5,015,817 UART: [exit] Launching FMC @ 0x40000130
5,021,146 UART:
5,021,162 UART: Running Caliptra FMC ...
5,021,570 UART:
5,021,624 UART: [state] CFI Enabled
5,110,021 UART: [art] Extend RT PCRs Done
5,110,449 UART: [art] Lock RT PCRs Done
5,111,924 UART: [art] Populate DV Done
5,119,843 UART: [fht] FMC Alias Private Key: 7
5,120,971 UART: [art] Derive CDI
5,121,251 UART: [art] Store in in slot 0x4
5,206,300 UART: [art] Derive Key Pair
5,206,660 UART: [art] Store priv key in slot 0x5
5,219,088 UART: [art] Derive Key Pair - Done
5,234,027 UART: [art] Signing Cert with AUTHO
5,234,507 UART: RITY.KEYID = 7
5,249,503 UART: [art] Erasing AUTHORITY.KEYID = 7
5,250,268 UART: [art] PUB.X = 0CCC756DD0A58C98A4F036749BDE952663BA5048F7134B55196916E5AF3EEA66182807CBA2003A75D6A0C49D8B178182
5,257,010 UART: [art] PUB.Y = 1C7EAC4BE9E500C0EAB8F88E6195D4C14BB3DEBC2EC65C9DACC99DDDEC9FB4A26EA69220E50807A644DD8A7AE76932D7
5,263,962 UART: [art] SIG.R = CE161CE6F64B5BC89B3FE4BF76AB980A22DB3763073C43EE23F43C7A068B8BCCAD48C8BA0AF193E98F19575624ED2582
5,270,736 UART: [art] SIG.S = B9B39CC681FDC77E48DCEB3C363BBA2688B78B799E05D197CC7039D83F53FFFCBF2F9E726729A11D5EF6CAA6D3B6C9DE
5,294,710 UART: Caliptra RT
5,294,963 UART: [state] CFI Enabled
5,582,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,779 UART:
5,583,795 UART: Running Caliptra ROM ...
5,584,203 UART:
5,584,257 UART: [state] CFI Enabled
5,586,969 UART: [state] LifecycleState = Unprovisioned
5,587,624 UART: [state] DebugLocked = No
5,588,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,799 UART: [kat] SHA2-256
6,383,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,387,845 UART: [kat] ++
6,387,997 UART: [kat] sha1
6,392,317 UART: [kat] SHA2-256
6,394,255 UART: [kat] SHA2-384
6,397,098 UART: [kat] SHA2-512-ACC
6,398,998 UART: [kat] ECC-384
6,404,415 UART: [kat] HMAC-384Kdf
6,409,157 UART: [kat] LMS
6,977,353 UART: [kat] --
6,978,112 UART: [update-reset] ++
8,312,612 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,313,694 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,463,570 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,536 >>> mbox cmd response: success
2,927,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,342 UART:
2,989,358 UART: Running Caliptra FMC ...
2,989,766 UART:
2,989,820 UART: [state] CFI Enabled
3,000,195 UART: [fht] FMC Alias Private Key: 7
3,107,721 UART: [art] Extend RT PCRs Done
3,108,149 UART: [art] Lock RT PCRs Done
3,109,257 UART: [art] Populate DV Done
3,117,712 UART: [fht] FMC Alias Private Key: 7
3,118,704 UART: [art] Derive CDI
3,118,984 UART: [art] Store in in slot 0x4
3,204,523 UART: [art] Derive Key Pair
3,204,883 UART: [art] Store priv key in slot 0x5
3,218,377 UART: [art] Derive Key Pair - Done
3,233,190 UART: [art] Signing Cert with AUTHO
3,233,670 UART: RITY.KEYID = 7
3,248,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,717 UART: [art] PUB.X = D098499B7893DD1A13A77C84983032456FA2F14F89E615B8AD19FB223A753BACA9471139167A8B22C9A70024CF36B489
3,256,461 UART: [art] PUB.Y = 9B66C14D1EC4296909BA980AC7E6A69F9968FC1F99C7609471BEB06353EDFDFD122B3887D65DF9417D7B4F3F7EFD9090
3,263,415 UART: [art] SIG.R = EFC934A7F3231FF5A7EC7D6672633BB4A789E98155BEAED261CE3609349225E2E0AB25DD55D7F8DB62880D43BCF0C62D
3,270,193 UART: [art] SIG.S = FE457BF04821A9177D44C9F24D6B1170859C48B2567EF56D0DF3C16224D561F60449B06864A85A2155AC1388196B4644
3,294,366 UART: Caliptra RT
3,294,619 UART: [state] CFI Enabled
3,402,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,721,395 >>> mbox cmd response: failed
4,721,395 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,727,122 UART:
4,727,138 UART: Running Caliptra FMC ...
4,727,546 UART:
4,727,600 UART: [state] CFI Enabled
4,817,009 UART: [art] Extend RT PCRs Done
4,817,437 UART: [art] Lock RT PCRs Done
4,818,732 UART: [art] Populate DV Done
4,826,979 UART: [fht] FMC Alias Private Key: 7
4,828,093 UART: [art] Derive CDI
4,828,373 UART: [art] Store in in slot 0x4
4,914,106 UART: [art] Derive Key Pair
4,914,466 UART: [art] Store priv key in slot 0x5
4,927,804 UART: [art] Derive Key Pair - Done
4,942,775 UART: [art] Signing Cert with AUTHO
4,943,255 UART: RITY.KEYID = 7
4,958,217 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,982 UART: [art] PUB.X = D098499B7893DD1A13A77C84983032456FA2F14F89E615B8AD19FB223A753BACA9471139167A8B22C9A70024CF36B489
4,965,726 UART: [art] PUB.Y = 9B66C14D1EC4296909BA980AC7E6A69F9968FC1F99C7609471BEB06353EDFDFD122B3887D65DF9417D7B4F3F7EFD9090
4,972,680 UART: [art] SIG.R = EFC934A7F3231FF5A7EC7D6672633BB4A789E98155BEAED261CE3609349225E2E0AB25DD55D7F8DB62880D43BCF0C62D
4,979,458 UART: [art] SIG.S = FE457BF04821A9177D44C9F24D6B1170859C48B2567EF56D0DF3C16224D561F60449B06864A85A2155AC1388196B4644
5,003,077 UART: Caliptra RT
5,003,330 UART: [state] CFI Enabled
5,283,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,047,899 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
903,403 UART: [kat] HMAC-384Kdf
908,103 UART: [kat] LMS
1,476,299 UART: [kat] --
1,477,280 UART: [cold-reset] ++
1,477,714 UART: [fht] Storing FHT @ 0x50003400
1,480,713 UART: [idev] ++
1,480,881 UART: [idev] CDI.KEYID = 6
1,481,241 UART: [idev] SUBJECT.KEYID = 7
1,481,665 UART: [idev] UDS.KEYID = 0
1,482,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,495 UART: [idev] Erasing UDS.KEYID = 0
1,505,855 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,352 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,625 UART: [ldev] --
1,587,084 UART: [fwproc] Waiting for Commands...
1,587,901 UART: [fwproc] Received command 0x46574c44
1,588,692 UART: [fwproc] Received Image of size 114332 bytes
2,887,050 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,913,836 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,097 >>> mbox cmd response: success
3,079,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,080,227 UART: [afmc] ++
3,080,395 UART: [afmc] CDI.KEYID = 6
3,080,757 UART: [afmc] SUBJECT.KEYID = 7
3,081,182 UART: [afmc] AUTHORITY.KEYID = 5
3,115,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,997 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,138,709 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,144,620 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,150,327 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,158,139 UART: [afmc] --
3,159,257 UART: [cold-reset] --
3,160,195 UART: [state] Locking Datavault
3,161,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,886 UART: [state] Locking ICCM
3,162,478 UART: [exit] Launching FMC @ 0x40000130
3,167,807 UART:
3,167,823 UART: Running Caliptra FMC ...
3,168,231 UART:
3,168,374 UART: [state] CFI Enabled
3,178,783 UART: [fht] FMC Alias Private Key: 7
3,286,791 UART: [art] Extend RT PCRs Done
3,287,219 UART: [art] Lock RT PCRs Done
3,288,415 UART: [art] Populate DV Done
3,296,744 UART: [fht] FMC Alias Private Key: 7
3,297,792 UART: [art] Derive CDI
3,298,072 UART: [art] Store in in slot 0x4
3,383,593 UART: [art] Derive Key Pair
3,383,953 UART: [art] Store priv key in slot 0x5
3,397,251 UART: [art] Derive Key Pair - Done
3,411,733 UART: [art] Signing Cert with AUTHO
3,412,213 UART: RITY.KEYID = 7
3,427,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,358 UART: [art] PUB.X = C4A3496C21A951354154BD67B0CD6D9B1A09C163BBD7F549484FB14BBEA1508CCB17C6AF834B7009144AE8C1FC76369F
3,435,132 UART: [art] PUB.Y = 443FE696428E88AF89CFA926B19D0B481DA63BF1870029AA4BD530DC816D045C9FAEBE4295F4ADC60FFE47E4560CB6E6
3,442,064 UART: [art] SIG.R = F2C8ED86C2F4B997402CC444C8D7ED7B761B58164528BB8C0901AA375279A105D84B14B26A6170AE88CAE4CB69AA9B28
3,448,833 UART: [art] SIG.S = 4E7C71413888DA0219A150B84ED384664E8DD79B35268F115C4BD2F73B3BC190C316B99EDD4731A2A031BA6B84FEDB72
3,472,911 UART: Caliptra RT
3,473,256 UART: [state] CFI Enabled
3,582,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,228 UART:
3,584,244 UART: Running Caliptra ROM ...
3,584,652 UART:
3,584,793 UART: [state] CFI Enabled
3,587,721 UART: [state] LifecycleState = Unprovisioned
3,588,376 UART: [state] DebugLocked = No
3,588,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,545 UART: [kat] SHA2-256
4,384,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,591 UART: [kat] ++
4,388,743 UART: [kat] sha1
4,392,897 UART: [kat] SHA2-256
4,394,835 UART: [kat] SHA2-384
4,397,696 UART: [kat] SHA2-512-ACC
4,399,596 UART: [kat] ECC-384
4,404,933 UART: [kat] HMAC-384Kdf
4,409,551 UART: [kat] LMS
4,977,747 UART: [kat] --
4,978,932 UART: [update-reset] ++
5,017,989 >>> mbox cmd response: failed
5,017,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,018,347 UART: ROM Non-Fatal Error: 0x000B001E
5,019,113 UART: [state] Locking Datavault
5,019,749 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,353 UART: [state] Locking ICCM
5,020,857 UART: [exit] Launching FMC @ 0x40000130
5,026,186 UART:
5,026,202 UART: Running Caliptra FMC ...
5,026,610 UART:
5,026,753 UART: [state] CFI Enabled
5,116,242 UART: [art] Extend RT PCRs Done
5,116,670 UART: [art] Lock RT PCRs Done
5,117,979 UART: [art] Populate DV Done
5,126,270 UART: [fht] FMC Alias Private Key: 7
5,127,292 UART: [art] Derive CDI
5,127,572 UART: [art] Store in in slot 0x4
5,213,327 UART: [art] Derive Key Pair
5,213,687 UART: [art] Store priv key in slot 0x5
5,227,467 UART: [art] Derive Key Pair - Done
5,242,485 UART: [art] Signing Cert with AUTHO
5,242,965 UART: RITY.KEYID = 7
5,258,345 UART: [art] Erasing AUTHORITY.KEYID = 7
5,259,110 UART: [art] PUB.X = C4A3496C21A951354154BD67B0CD6D9B1A09C163BBD7F549484FB14BBEA1508CCB17C6AF834B7009144AE8C1FC76369F
5,265,884 UART: [art] PUB.Y = 443FE696428E88AF89CFA926B19D0B481DA63BF1870029AA4BD530DC816D045C9FAEBE4295F4ADC60FFE47E4560CB6E6
5,272,816 UART: [art] SIG.R = F2C8ED86C2F4B997402CC444C8D7ED7B761B58164528BB8C0901AA375279A105D84B14B26A6170AE88CAE4CB69AA9B28
5,279,585 UART: [art] SIG.S = 4E7C71413888DA0219A150B84ED384664E8DD79B35268F115C4BD2F73B3BC190C316B99EDD4731A2A031BA6B84FEDB72
5,303,833 UART: Caliptra RT
5,304,178 UART: [state] CFI Enabled
5,586,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,029 UART:
5,588,045 UART: Running Caliptra ROM ...
5,588,453 UART:
5,588,594 UART: [state] CFI Enabled
5,591,504 UART: [state] LifecycleState = Unprovisioned
5,592,159 UART: [state] DebugLocked = No
5,592,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,594,302 UART: [kat] SHA2-256
6,388,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,392,348 UART: [kat] ++
6,392,500 UART: [kat] sha1
6,396,866 UART: [kat] SHA2-256
6,398,804 UART: [kat] SHA2-384
6,401,511 UART: [kat] SHA2-512-ACC
6,403,411 UART: [kat] ECC-384
6,408,862 UART: [kat] HMAC-384Kdf
6,413,480 UART: [kat] LMS
6,981,676 UART: [kat] --
6,982,759 UART: [update-reset] ++
8,317,963 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,319,179 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,469,055 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,009 >>> mbox cmd response: success
2,928,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,861 UART:
2,989,877 UART: Running Caliptra FMC ...
2,990,285 UART:
2,990,428 UART: [state] CFI Enabled
3,000,991 UART: [fht] FMC Alias Private Key: 7
3,108,725 UART: [art] Extend RT PCRs Done
3,109,153 UART: [art] Lock RT PCRs Done
3,110,771 UART: [art] Populate DV Done
3,118,988 UART: [fht] FMC Alias Private Key: 7
3,120,114 UART: [art] Derive CDI
3,120,394 UART: [art] Store in in slot 0x4
3,205,981 UART: [art] Derive Key Pair
3,206,341 UART: [art] Store priv key in slot 0x5
3,219,683 UART: [art] Derive Key Pair - Done
3,234,632 UART: [art] Signing Cert with AUTHO
3,235,112 UART: RITY.KEYID = 7
3,250,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,021 UART: [art] PUB.X = C754E040AE6879D149C1B5765B1849268CB85B56C8070F27853DADA3A4A75F174B11E5648C5AACA1C47D993CDE57A1B7
3,257,791 UART: [art] PUB.Y = C9665FE628AB8646B60AB0ED29BF11A453995F7C4D73209F6616575E0C44F2A9B5BE15A6ECA25D63C447B3AAF9DDB81B
3,264,749 UART: [art] SIG.R = A4CEAB4B25D5F0345FE820B5BB27EF1133A944CB1FD688931948B3096DA2B820DF3756E56C0CE56F03EE81986B7248FC
3,271,520 UART: [art] SIG.S = 33DDD2CDC20593ECA4EA7C2F748A487DE5950219DF25679FF698CD85B56B7D68E235AE2325983F821DE76B5BAEAFE1E3
3,295,097 UART: Caliptra RT
3,295,442 UART: [state] CFI Enabled
3,404,545 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,772 >>> mbox cmd response: failed
4,723,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,729,339 UART:
4,729,355 UART: Running Caliptra FMC ...
4,729,763 UART:
4,729,906 UART: [state] CFI Enabled
4,818,655 UART: [art] Extend RT PCRs Done
4,819,083 UART: [art] Lock RT PCRs Done
4,820,572 UART: [art] Populate DV Done
4,828,809 UART: [fht] FMC Alias Private Key: 7
4,829,983 UART: [art] Derive CDI
4,830,263 UART: [art] Store in in slot 0x4
4,916,050 UART: [art] Derive Key Pair
4,916,410 UART: [art] Store priv key in slot 0x5
4,929,952 UART: [art] Derive Key Pair - Done
4,944,829 UART: [art] Signing Cert with AUTHO
4,945,309 UART: RITY.KEYID = 7
4,960,741 UART: [art] Erasing AUTHORITY.KEYID = 7
4,961,506 UART: [art] PUB.X = C754E040AE6879D149C1B5765B1849268CB85B56C8070F27853DADA3A4A75F174B11E5648C5AACA1C47D993CDE57A1B7
4,968,276 UART: [art] PUB.Y = C9665FE628AB8646B60AB0ED29BF11A453995F7C4D73209F6616575E0C44F2A9B5BE15A6ECA25D63C447B3AAF9DDB81B
4,975,234 UART: [art] SIG.R = A4CEAB4B25D5F0345FE820B5BB27EF1133A944CB1FD688931948B3096DA2B820DF3756E56C0CE56F03EE81986B7248FC
4,982,005 UART: [art] SIG.S = 33DDD2CDC20593ECA4EA7C2F748A487DE5950219DF25679FF698CD85B56B7D68E235AE2325983F821DE76B5BAEAFE1E3
5,005,810 UART: Caliptra RT
5,006,155 UART: [state] CFI Enabled
5,286,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,050,516 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,610 UART: [kat] LMS
1,170,938 UART: [kat] --
1,172,051 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,032 UART: [idev] ++
1,175,200 UART: [idev] CDI.KEYID = 6
1,175,560 UART: [idev] SUBJECT.KEYID = 7
1,175,984 UART: [idev] UDS.KEYID = 0
1,176,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,176 UART: [idev] Erasing UDS.KEYID = 0
1,201,357 UART: [idev] Sha1 KeyId Algorithm
1,209,843 UART: [idev] --
1,210,847 UART: [ldev] ++
1,211,015 UART: [ldev] CDI.KEYID = 6
1,211,378 UART: [ldev] SUBJECT.KEYID = 5
1,211,804 UART: [ldev] AUTHORITY.KEYID = 7
1,212,267 UART: [ldev] FE.KEYID = 1
1,217,645 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,891 UART: [ldev] --
1,283,290 UART: [fwproc] Wait for Commands...
1,283,944 UART: [fwproc] Recv command 0x46574c44
1,284,672 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,303 >>> mbox cmd response: success
2,774,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,775,529 UART: [afmc] ++
2,775,697 UART: [afmc] CDI.KEYID = 6
2,776,059 UART: [afmc] SUBJECT.KEYID = 7
2,776,484 UART: [afmc] AUTHORITY.KEYID = 5
2,812,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,458 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,170 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,081 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,795 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,609 UART: [afmc] --
2,855,729 UART: [cold-reset] --
2,856,557 UART: [state] Locking Datavault
2,857,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,398 UART: [state] Locking ICCM
2,858,870 UART: [exit] Launching FMC @ 0x40000130
2,864,199 UART:
2,864,215 UART: Running Caliptra FMC ...
2,864,623 UART:
2,864,677 UART: [state] CFI Enabled
2,875,164 UART: [fht] FMC Alias Private Key: 7
2,982,694 UART: [art] Extend RT PCRs Done
2,983,122 UART: [art] Lock RT PCRs Done
2,984,656 UART: [art] Populate DV Done
2,992,987 UART: [fht] FMC Alias Private Key: 7
2,994,085 UART: [art] Derive CDI
2,994,365 UART: [art] Store in in slot 0x4
3,080,042 UART: [art] Derive Key Pair
3,080,402 UART: [art] Store priv key in slot 0x5
3,093,150 UART: [art] Derive Key Pair - Done
3,107,725 UART: [art] Signing Cert with AUTHO
3,108,205 UART: RITY.KEYID = 7
3,123,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,316 UART: [art] PUB.X = 1B850BDD1175F7C9DC8777EACDF6C27EDDFE6F7B6226D65B21B712C60F32A2E773F73CD3FA94DF5B814E227F26810F54
3,131,093 UART: [art] PUB.Y = CAF4013F7B1FA862AC50D08CA4B3FD39F58677D64C762EEED37BB0988793C9A2BB3CBBF2DE9159E51C101B80FD7C9E90
3,138,060 UART: [art] SIG.R = 34843F0EA058CCE81FCF455506068A86A4407E13B2CDD67616E9894E83A03BFE2D01FA7C83060BAC156A35687D33D8D9
3,144,816 UART: [art] SIG.S = 1AF2A77A0BEDAA2EBB038F36CAD8B4339E0DF4E04DB8B4F7DE10D8735D5D2CA9B729B00E5AD01109328FA352FAFBE5B8
3,168,458 UART: Caliptra RT
3,168,711 UART: [state] CFI Enabled
3,277,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,888 UART:
3,278,904 UART: Running Caliptra ROM ...
3,279,312 UART:
3,279,367 UART: [state] CFI Enabled
3,281,813 UART: [state] LifecycleState = Unprovisioned
3,282,468 UART: [state] DebugLocked = No
3,283,042 UART: [state] WD Timer not started. Device not locked for debugging
3,284,178 UART: [kat] SHA2-256
4,089,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,953 UART: [kat] ++
4,094,105 UART: [kat] sha1
4,098,365 UART: [kat] SHA2-256
4,100,305 UART: [kat] SHA2-384
4,103,062 UART: [kat] SHA2-512-ACC
4,104,962 UART: [kat] ECC-384
4,114,743 UART: [kat] HMAC-384Kdf
4,119,335 UART: [kat] LMS
4,367,663 UART: [kat] --
4,368,377 UART: [update-reset] ++
4,385,948 >>> mbox cmd response: failed
4,385,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,386,304 UART: ROM Non-Fatal Error: 0x000B001E
4,387,146 UART: [state] Locking Datavault
4,388,060 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,664 UART: [state] Locking ICCM
4,389,084 UART: [exit] Launching FMC @ 0x40000130
4,394,413 UART:
4,394,429 UART: Running Caliptra FMC ...
4,394,837 UART:
4,394,891 UART: [state] CFI Enabled
4,483,972 UART: [art] Extend RT PCRs Done
4,484,400 UART: [art] Lock RT PCRs Done
4,485,737 UART: [art] Populate DV Done
4,494,030 UART: [fht] FMC Alias Private Key: 7
4,495,206 UART: [art] Derive CDI
4,495,486 UART: [art] Store in in slot 0x4
4,581,209 UART: [art] Derive Key Pair
4,581,569 UART: [art] Store priv key in slot 0x5
4,594,789 UART: [art] Derive Key Pair - Done
4,609,710 UART: [art] Signing Cert with AUTHO
4,610,190 UART: RITY.KEYID = 7
4,625,332 UART: [art] Erasing AUTHORITY.KEYID = 7
4,626,097 UART: [art] PUB.X = 1B850BDD1175F7C9DC8777EACDF6C27EDDFE6F7B6226D65B21B712C60F32A2E773F73CD3FA94DF5B814E227F26810F54
4,632,874 UART: [art] PUB.Y = CAF4013F7B1FA862AC50D08CA4B3FD39F58677D64C762EEED37BB0988793C9A2BB3CBBF2DE9159E51C101B80FD7C9E90
4,639,841 UART: [art] SIG.R = 34843F0EA058CCE81FCF455506068A86A4407E13B2CDD67616E9894E83A03BFE2D01FA7C83060BAC156A35687D33D8D9
4,646,597 UART: [art] SIG.S = 1AF2A77A0BEDAA2EBB038F36CAD8B4339E0DF4E04DB8B4F7DE10D8735D5D2CA9B729B00E5AD01109328FA352FAFBE5B8
4,670,233 UART: Caliptra RT
4,670,486 UART: [state] CFI Enabled
4,950,085 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,918 UART:
4,951,934 UART: Running Caliptra ROM ...
4,952,342 UART:
4,952,397 UART: [state] CFI Enabled
4,954,725 UART: [state] LifecycleState = Unprovisioned
4,955,380 UART: [state] DebugLocked = No
4,956,024 UART: [state] WD Timer not started. Device not locked for debugging
4,957,260 UART: [kat] SHA2-256
5,762,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,767,035 UART: [kat] ++
5,767,187 UART: [kat] sha1
5,771,389 UART: [kat] SHA2-256
5,773,329 UART: [kat] SHA2-384
5,775,992 UART: [kat] SHA2-512-ACC
5,777,892 UART: [kat] ECC-384
5,787,475 UART: [kat] HMAC-384Kdf
5,792,167 UART: [kat] LMS
6,040,495 UART: [kat] --
6,041,467 UART: [update-reset] ++
7,352,973 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,353,938 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,503,762 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,720 >>> mbox cmd response: success
2,624,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,687,012 UART:
2,687,028 UART: Running Caliptra FMC ...
2,687,436 UART:
2,687,490 UART: [state] CFI Enabled
2,698,265 UART: [fht] FMC Alias Private Key: 7
2,806,285 UART: [art] Extend RT PCRs Done
2,806,713 UART: [art] Lock RT PCRs Done
2,808,101 UART: [art] Populate DV Done
2,816,436 UART: [fht] FMC Alias Private Key: 7
2,817,530 UART: [art] Derive CDI
2,817,810 UART: [art] Store in in slot 0x4
2,903,399 UART: [art] Derive Key Pair
2,903,759 UART: [art] Store priv key in slot 0x5
2,917,159 UART: [art] Derive Key Pair - Done
2,932,229 UART: [art] Signing Cert with AUTHO
2,932,709 UART: RITY.KEYID = 7
2,947,519 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,284 UART: [art] PUB.X = D51969EA48F60BC3399E31A0EEC91F35D2AA47A687DC2039A11953E903265D0607169E931F065E600836C5F3C9DDDDB3
2,955,038 UART: [art] PUB.Y = 56997163C7A454F905FF1E25E702DDD68E505A55B4A756F145F4F749F63EEFA86282E997126123F04E7F1651B55D4E94
2,961,978 UART: [art] SIG.R = 183BFF544C82DD57EC9CC5205F30E29BD8897B6531D6F4A890B98BAF7AE27D0094AD88A1A2D8F518CA5582A2D195FA09
2,968,735 UART: [art] SIG.S = 99756CB97F9EAA94334AD4CEAF80C5800579B543BCDDDAD68C772DF4B2E7854F1177F6E3E6B625C77A471F9A601A4A2E
2,992,609 UART: Caliptra RT
2,992,862 UART: [state] CFI Enabled
3,100,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,613 >>> mbox cmd response: failed
4,094,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,100,504 UART:
4,100,520 UART: Running Caliptra FMC ...
4,100,928 UART:
4,100,982 UART: [state] CFI Enabled
4,190,439 UART: [art] Extend RT PCRs Done
4,190,867 UART: [art] Lock RT PCRs Done
4,192,042 UART: [art] Populate DV Done
4,200,257 UART: [fht] FMC Alias Private Key: 7
4,201,275 UART: [art] Derive CDI
4,201,555 UART: [art] Store in in slot 0x4
4,287,174 UART: [art] Derive Key Pair
4,287,534 UART: [art] Store priv key in slot 0x5
4,300,824 UART: [art] Derive Key Pair - Done
4,315,374 UART: [art] Signing Cert with AUTHO
4,315,854 UART: RITY.KEYID = 7
4,331,082 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,847 UART: [art] PUB.X = D51969EA48F60BC3399E31A0EEC91F35D2AA47A687DC2039A11953E903265D0607169E931F065E600836C5F3C9DDDDB3
4,338,601 UART: [art] PUB.Y = 56997163C7A454F905FF1E25E702DDD68E505A55B4A756F145F4F749F63EEFA86282E997126123F04E7F1651B55D4E94
4,345,541 UART: [art] SIG.R = 183BFF544C82DD57EC9CC5205F30E29BD8897B6531D6F4A890B98BAF7AE27D0094AD88A1A2D8F518CA5582A2D195FA09
4,352,298 UART: [art] SIG.S = 99756CB97F9EAA94334AD4CEAF80C5800579B543BCDDDAD68C772DF4B2E7854F1177F6E3E6B625C77A471F9A601A4A2E
4,375,928 UART: Caliptra RT
4,376,181 UART: [state] CFI Enabled
4,656,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,834 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,215 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,574 UART: [fht] FHT @ 0x50003400
1,175,259 UART: [idev] ++
1,175,427 UART: [idev] CDI.KEYID = 6
1,175,787 UART: [idev] SUBJECT.KEYID = 7
1,176,211 UART: [idev] UDS.KEYID = 0
1,176,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,675 UART: [idev] Erasing UDS.KEYID = 0
1,200,318 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,832 UART: [ldev] ++
1,210,000 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,789 UART: [ldev] AUTHORITY.KEYID = 7
1,211,252 UART: [ldev] FE.KEYID = 1
1,216,326 UART: [ldev] Erasing FE.KEYID = 1
1,242,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,844 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,283,073 UART: [fwproc] Recv command 0x46574c44
1,283,801 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,750 >>> mbox cmd response: success
2,773,750 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,758 UART: [afmc] ++
2,774,926 UART: [afmc] CDI.KEYID = 6
2,775,288 UART: [afmc] SUBJECT.KEYID = 7
2,775,713 UART: [afmc] AUTHORITY.KEYID = 5
2,811,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,017 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,729 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,640 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,354 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,218 UART: [afmc] --
2,854,172 UART: [cold-reset] --
2,855,200 UART: [state] Locking Datavault
2,856,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,841 UART: [state] Locking ICCM
2,857,415 UART: [exit] Launching FMC @ 0x40000130
2,862,744 UART:
2,862,760 UART: Running Caliptra FMC ...
2,863,168 UART:
2,863,311 UART: [state] CFI Enabled
2,873,742 UART: [fht] FMC Alias Private Key: 7
2,981,984 UART: [art] Extend RT PCRs Done
2,982,412 UART: [art] Lock RT PCRs Done
2,983,932 UART: [art] Populate DV Done
2,992,373 UART: [fht] FMC Alias Private Key: 7
2,993,311 UART: [art] Derive CDI
2,993,591 UART: [art] Store in in slot 0x4
3,079,340 UART: [art] Derive Key Pair
3,079,700 UART: [art] Store priv key in slot 0x5
3,093,464 UART: [art] Derive Key Pair - Done
3,108,221 UART: [art] Signing Cert with AUTHO
3,108,701 UART: RITY.KEYID = 7
3,124,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,814 UART: [art] PUB.X = 1F997AE63B0942A55CCCC1262F4C55A05712F19BB266D25D3D2357A3F8168B5F0EAA9C9D870C4768FADD219A77CC6B67
3,131,585 UART: [art] PUB.Y = 2AEECED19531A03A3711B155524E70A3E2A40C64C850C2907BC03A4E2677A3912A5429DC025A2F0BCB0DDD0B3BEB41D8
3,138,532 UART: [art] SIG.R = AAF4487EA62E81CBC74B3E5F1DF49C0474F02AF1BA8B2A52686F89D17927EC7C77C704F403B72DCA3292290B4309F862
3,145,295 UART: [art] SIG.S = FEE767269FBD20105048EB0A026AB4BFAE11F8A9FE191D8EA6BAC16246714A5A923B54E5EC147DC1281152C1E1B72B38
3,169,544 UART: Caliptra RT
3,169,889 UART: [state] CFI Enabled
3,277,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,857 UART:
3,279,873 UART: Running Caliptra ROM ...
3,280,281 UART:
3,280,423 UART: [state] CFI Enabled
3,282,945 UART: [state] LifecycleState = Unprovisioned
3,283,600 UART: [state] DebugLocked = No
3,284,120 UART: [state] WD Timer not started. Device not locked for debugging
3,285,304 UART: [kat] SHA2-256
4,090,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,079 UART: [kat] ++
4,095,231 UART: [kat] sha1
4,099,507 UART: [kat] SHA2-256
4,101,447 UART: [kat] SHA2-384
4,104,100 UART: [kat] SHA2-512-ACC
4,106,000 UART: [kat] ECC-384
4,115,873 UART: [kat] HMAC-384Kdf
4,120,667 UART: [kat] LMS
4,368,995 UART: [kat] --
4,369,647 UART: [update-reset] ++
4,386,534 >>> mbox cmd response: failed
4,386,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,387,046 UART: ROM Non-Fatal Error: 0x000B001E
4,388,054 UART: [state] Locking Datavault
4,388,886 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,490 UART: [state] Locking ICCM
4,389,988 UART: [exit] Launching FMC @ 0x40000130
4,395,317 UART:
4,395,333 UART: Running Caliptra FMC ...
4,395,741 UART:
4,395,884 UART: [state] CFI Enabled
4,485,505 UART: [art] Extend RT PCRs Done
4,485,933 UART: [art] Lock RT PCRs Done
4,486,996 UART: [art] Populate DV Done
4,495,373 UART: [fht] FMC Alias Private Key: 7
4,496,329 UART: [art] Derive CDI
4,496,609 UART: [art] Store in in slot 0x4
4,582,598 UART: [art] Derive Key Pair
4,582,958 UART: [art] Store priv key in slot 0x5
4,596,142 UART: [art] Derive Key Pair - Done
4,610,701 UART: [art] Signing Cert with AUTHO
4,611,181 UART: RITY.KEYID = 7
4,626,397 UART: [art] Erasing AUTHORITY.KEYID = 7
4,627,162 UART: [art] PUB.X = 1F997AE63B0942A55CCCC1262F4C55A05712F19BB266D25D3D2357A3F8168B5F0EAA9C9D870C4768FADD219A77CC6B67
4,633,933 UART: [art] PUB.Y = 2AEECED19531A03A3711B155524E70A3E2A40C64C850C2907BC03A4E2677A3912A5429DC025A2F0BCB0DDD0B3BEB41D8
4,640,880 UART: [art] SIG.R = AAF4487EA62E81CBC74B3E5F1DF49C0474F02AF1BA8B2A52686F89D17927EC7C77C704F403B72DCA3292290B4309F862
4,647,643 UART: [art] SIG.S = FEE767269FBD20105048EB0A026AB4BFAE11F8A9FE191D8EA6BAC16246714A5A923B54E5EC147DC1281152C1E1B72B38
4,671,128 UART: Caliptra RT
4,671,473 UART: [state] CFI Enabled
4,953,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,102 UART:
4,955,118 UART: Running Caliptra ROM ...
4,955,526 UART:
4,955,668 UART: [state] CFI Enabled
4,958,300 UART: [state] LifecycleState = Unprovisioned
4,958,955 UART: [state] DebugLocked = No
4,959,629 UART: [state] WD Timer not started. Device not locked for debugging
4,960,771 UART: [kat] SHA2-256
5,766,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,770,546 UART: [kat] ++
5,770,698 UART: [kat] sha1
5,774,968 UART: [kat] SHA2-256
5,776,908 UART: [kat] SHA2-384
5,779,709 UART: [kat] SHA2-512-ACC
5,781,609 UART: [kat] ECC-384
5,791,610 UART: [kat] HMAC-384Kdf
5,796,172 UART: [kat] LMS
6,044,500 UART: [kat] --
6,045,202 UART: [update-reset] ++
7,356,826 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,357,861 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,507,685 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,577 >>> mbox cmd response: success
2,628,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,691,195 UART:
2,691,211 UART: Running Caliptra FMC ...
2,691,619 UART:
2,691,762 UART: [state] CFI Enabled
2,702,713 UART: [fht] FMC Alias Private Key: 7
2,810,661 UART: [art] Extend RT PCRs Done
2,811,089 UART: [art] Lock RT PCRs Done
2,812,693 UART: [art] Populate DV Done
2,820,778 UART: [fht] FMC Alias Private Key: 7
2,821,806 UART: [art] Derive CDI
2,822,086 UART: [art] Store in in slot 0x4
2,907,995 UART: [art] Derive Key Pair
2,908,355 UART: [art] Store priv key in slot 0x5
2,921,203 UART: [art] Derive Key Pair - Done
2,935,715 UART: [art] Signing Cert with AUTHO
2,936,195 UART: RITY.KEYID = 7
2,951,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,136 UART: [art] PUB.X = 8475A8A0B596D3A446765DE532B0439B7D63E3A6753FA9DE82273BFECD2E2561897798D1F2D05E5258ED1EE70444C751
2,958,903 UART: [art] PUB.Y = 2D0009304394A506F6D7913A609C1ED295D7976619CDFE9E8F96A275A8DF10B0FA6F230C87B3F7B29B0E311302F81098
2,965,814 UART: [art] SIG.R = 28B66D89FD65755B8477DE6653F52242160DD3CDA7DE3CCECC8AA15CABF1872B3377C14186F1A6E21DD9D3C250A61E84
2,972,593 UART: [art] SIG.S = F4E7DD3A4F17EADDDCF39EEF3045B6744C294427653E4D9F79B1478D463E0EE89FD3EEBD3C59104D4FED0E4C003092A4
2,996,688 UART: Caliptra RT
2,997,033 UART: [state] CFI Enabled
3,105,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,077 >>> mbox cmd response: failed
4,101,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,106,652 UART:
4,106,668 UART: Running Caliptra FMC ...
4,107,076 UART:
4,107,219 UART: [state] CFI Enabled
4,196,930 UART: [art] Extend RT PCRs Done
4,197,358 UART: [art] Lock RT PCRs Done
4,199,001 UART: [art] Populate DV Done
4,207,274 UART: [fht] FMC Alias Private Key: 7
4,208,212 UART: [art] Derive CDI
4,208,492 UART: [art] Store in in slot 0x4
4,294,355 UART: [art] Derive Key Pair
4,294,715 UART: [art] Store priv key in slot 0x5
4,308,271 UART: [art] Derive Key Pair - Done
4,322,927 UART: [art] Signing Cert with AUTHO
4,323,407 UART: RITY.KEYID = 7
4,338,673 UART: [art] Erasing AUTHORITY.KEYID = 7
4,339,438 UART: [art] PUB.X = 8475A8A0B596D3A446765DE532B0439B7D63E3A6753FA9DE82273BFECD2E2561897798D1F2D05E5258ED1EE70444C751
4,346,205 UART: [art] PUB.Y = 2D0009304394A506F6D7913A609C1ED295D7976619CDFE9E8F96A275A8DF10B0FA6F230C87B3F7B29B0E311302F81098
4,353,116 UART: [art] SIG.R = 28B66D89FD65755B8477DE6653F52242160DD3CDA7DE3CCECC8AA15CABF1872B3377C14186F1A6E21DD9D3C250A61E84
4,359,895 UART: [art] SIG.S = F4E7DD3A4F17EADDDCF39EEF3045B6744C294427653E4D9F79B1478D463E0EE89FD3EEBD3C59104D4FED0E4C003092A4
4,383,770 UART: Caliptra RT
4,384,115 UART: [state] CFI Enabled
4,667,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,106,989 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,478 UART: [kat] HMAC-384Kdf
920,166 UART: [kat] LMS
1,168,478 UART: [kat] --
1,169,241 UART: [cold-reset] ++
1,169,779 UART: [fht] FHT @ 0x50003400
1,172,323 UART: [idev] ++
1,172,491 UART: [idev] CDI.KEYID = 6
1,172,852 UART: [idev] SUBJECT.KEYID = 7
1,173,277 UART: [idev] UDS.KEYID = 0
1,173,623 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,862 UART: [ldev] Erasing FE.KEYID = 1
1,241,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,702 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,064 >>> mbox cmd response: success
2,771,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,772,261 UART: [afmc] ++
2,772,429 UART: [afmc] CDI.KEYID = 6
2,772,792 UART: [afmc] SUBJECT.KEYID = 7
2,773,218 UART: [afmc] AUTHORITY.KEYID = 5
2,809,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,520 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,233 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,142 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,856 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,563 UART: [afmc] --
2,852,549 UART: [cold-reset] --
2,853,247 UART: [state] Locking Datavault
2,854,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,186 UART: [state] Locking ICCM
2,855,764 UART: [exit] Launching FMC @ 0x40000130
2,861,093 UART:
2,861,109 UART: Running Caliptra FMC ...
2,861,517 UART:
2,861,571 UART: [state] CFI Enabled
2,872,042 UART: [fht] FMC Alias Private Key: 7
2,979,488 UART: [art] Extend RT PCRs Done
2,979,916 UART: [art] Lock RT PCRs Done
2,981,346 UART: [art] Populate DV Done
2,989,591 UART: [fht] FMC Alias Private Key: 7
2,990,557 UART: [art] Derive CDI
2,990,837 UART: [art] Store in in slot 0x4
3,076,434 UART: [art] Derive Key Pair
3,076,794 UART: [art] Store priv key in slot 0x5
3,089,652 UART: [art] Derive Key Pair - Done
3,104,660 UART: [art] Signing Cert with AUTHO
3,105,140 UART: RITY.KEYID = 7
3,120,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,133 UART: [art] PUB.X = A67D575AA4142B49BFE942E9ACCE92ECCED923CCF356DDEF91A34945BE71AADFCC64A86F39FE58956AEB56A814EA2B16
3,127,931 UART: [art] PUB.Y = 73F5831DE18230D4B547A7EC9A6FE5891B9C660E828F8D52469F24333C6E15694317A74E01FCEEE9D594B674FCD266CD
3,134,879 UART: [art] SIG.R = E30919BE057DDE92BB1F35E4C283CA537984A24B4BE1AEBD34A93A5241006B5C4328B435BCBDFE6A9FA086416553C889
3,141,631 UART: [art] SIG.S = 4EC5FF8A5A0F1DA087DA390D943ED685584CFE12A56AE6B3631A961E1C9C847051D5890BAEB8C2F8DF37794BDA661144
3,165,809 UART: Caliptra RT
3,166,062 UART: [state] CFI Enabled
3,273,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,447 UART:
3,275,463 UART: Running Caliptra ROM ...
3,275,871 UART:
3,275,926 UART: [state] CFI Enabled
3,278,080 UART: [state] LifecycleState = Unprovisioned
3,278,735 UART: [state] DebugLocked = No
3,279,353 UART: [state] WD Timer not started. Device not locked for debugging
3,280,557 UART: [kat] SHA2-256
4,084,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,236 UART: [kat] ++
4,088,388 UART: [kat] sha1
4,092,694 UART: [kat] SHA2-256
4,094,634 UART: [kat] SHA2-384
4,097,255 UART: [kat] SHA2-512-ACC
4,099,155 UART: [kat] ECC-384
4,109,050 UART: [kat] HMAC-384Kdf
4,113,710 UART: [kat] LMS
4,362,022 UART: [kat] --
4,362,844 UART: [update-reset] ++
4,379,936 >>> mbox cmd response: failed
4,379,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,380,386 UART: ROM Non-Fatal Error: 0x000B001E
4,381,160 UART: [state] Locking Datavault
4,382,038 UART: [state] Locking PCR0, PCR1 and PCR31
4,382,642 UART: [state] Locking ICCM
4,383,122 UART: [exit] Launching FMC @ 0x40000130
4,388,451 UART:
4,388,467 UART: Running Caliptra FMC ...
4,388,875 UART:
4,388,929 UART: [state] CFI Enabled
4,478,288 UART: [art] Extend RT PCRs Done
4,478,716 UART: [art] Lock RT PCRs Done
4,479,771 UART: [art] Populate DV Done
4,487,862 UART: [fht] FMC Alias Private Key: 7
4,488,882 UART: [art] Derive CDI
4,489,162 UART: [art] Store in in slot 0x4
4,574,913 UART: [art] Derive Key Pair
4,575,273 UART: [art] Store priv key in slot 0x5
4,588,615 UART: [art] Derive Key Pair - Done
4,603,301 UART: [art] Signing Cert with AUTHO
4,603,781 UART: RITY.KEYID = 7
4,619,097 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,862 UART: [art] PUB.X = A67D575AA4142B49BFE942E9ACCE92ECCED923CCF356DDEF91A34945BE71AADFCC64A86F39FE58956AEB56A814EA2B16
4,626,660 UART: [art] PUB.Y = 73F5831DE18230D4B547A7EC9A6FE5891B9C660E828F8D52469F24333C6E15694317A74E01FCEEE9D594B674FCD266CD
4,633,608 UART: [art] SIG.R = E30919BE057DDE92BB1F35E4C283CA537984A24B4BE1AEBD34A93A5241006B5C4328B435BCBDFE6A9FA086416553C889
4,640,360 UART: [art] SIG.S = 4EC5FF8A5A0F1DA087DA390D943ED685584CFE12A56AE6B3631A961E1C9C847051D5890BAEB8C2F8DF37794BDA661144
4,664,488 UART: Caliptra RT
4,664,741 UART: [state] CFI Enabled
4,947,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,777 UART:
4,949,793 UART: Running Caliptra ROM ...
4,950,201 UART:
4,950,256 UART: [state] CFI Enabled
4,952,804 UART: [state] LifecycleState = Unprovisioned
4,953,459 UART: [state] DebugLocked = No
4,954,091 UART: [state] WD Timer not started. Device not locked for debugging
4,955,257 UART: [kat] SHA2-256
5,758,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,762,936 UART: [kat] ++
5,763,088 UART: [kat] sha1
5,767,260 UART: [kat] SHA2-256
5,769,200 UART: [kat] SHA2-384
5,771,783 UART: [kat] SHA2-512-ACC
5,773,683 UART: [kat] ECC-384
5,783,744 UART: [kat] HMAC-384Kdf
5,788,510 UART: [kat] LMS
6,036,822 UART: [kat] --
6,038,088 UART: [update-reset] ++
7,350,968 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,351,945 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,501,769 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,338 >>> mbox cmd response: success
2,621,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,068 UART:
2,683,084 UART: Running Caliptra FMC ...
2,683,492 UART:
2,683,546 UART: [state] CFI Enabled
2,694,221 UART: [fht] FMC Alias Private Key: 7
2,802,153 UART: [art] Extend RT PCRs Done
2,802,581 UART: [art] Lock RT PCRs Done
2,804,431 UART: [art] Populate DV Done
2,812,614 UART: [fht] FMC Alias Private Key: 7
2,813,626 UART: [art] Derive CDI
2,813,906 UART: [art] Store in in slot 0x4
2,899,615 UART: [art] Derive Key Pair
2,899,975 UART: [art] Store priv key in slot 0x5
2,912,503 UART: [art] Derive Key Pair - Done
2,927,312 UART: [art] Signing Cert with AUTHO
2,927,792 UART: RITY.KEYID = 7
2,943,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,187 UART: [art] PUB.X = 71B9657488B075A00C9348D3D0958EB9ADE776635450B85C08F18180B69543C6966CA377B5B18F21B86D6615B8DEA69B
2,950,945 UART: [art] PUB.Y = A3548E2526C55D75EC1F22BE84CCA4E03B55266E5BA5B7CE9C8C7CD26C56A575F88EBF2CE644DC11FC85556F4DD2BBDC
2,957,919 UART: [art] SIG.R = D352289C905EBAE2F19B7005B3BF5207B19CC8CD337C746FC852F6E9FC9C045D82E28AC52C0A86D9D19C67E30CF3A184
2,964,686 UART: [art] SIG.S = 56BA67624D1157EBE1ACF9774384E226FA2F3A66977A5678D2CEC7BE7D8447B50D7F8E374BCC2B4A0C9BC190CAF7B8F9
2,988,611 UART: Caliptra RT
2,988,864 UART: [state] CFI Enabled
3,095,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,096 >>> mbox cmd response: failed
4,086,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,091,713 UART:
4,091,729 UART: Running Caliptra FMC ...
4,092,137 UART:
4,092,191 UART: [state] CFI Enabled
4,181,526 UART: [art] Extend RT PCRs Done
4,181,954 UART: [art] Lock RT PCRs Done
4,183,337 UART: [art] Populate DV Done
4,191,644 UART: [fht] FMC Alias Private Key: 7
4,192,722 UART: [art] Derive CDI
4,193,002 UART: [art] Store in in slot 0x4
4,279,035 UART: [art] Derive Key Pair
4,279,395 UART: [art] Store priv key in slot 0x5
4,292,185 UART: [art] Derive Key Pair - Done
4,306,628 UART: [art] Signing Cert with AUTHO
4,307,108 UART: RITY.KEYID = 7
4,322,298 UART: [art] Erasing AUTHORITY.KEYID = 7
4,323,063 UART: [art] PUB.X = 71B9657488B075A00C9348D3D0958EB9ADE776635450B85C08F18180B69543C6966CA377B5B18F21B86D6615B8DEA69B
4,329,821 UART: [art] PUB.Y = A3548E2526C55D75EC1F22BE84CCA4E03B55266E5BA5B7CE9C8C7CD26C56A575F88EBF2CE644DC11FC85556F4DD2BBDC
4,336,795 UART: [art] SIG.R = D352289C905EBAE2F19B7005B3BF5207B19CC8CD337C746FC852F6E9FC9C045D82E28AC52C0A86D9D19C67E30CF3A184
4,343,562 UART: [art] SIG.S = 56BA67624D1157EBE1ACF9774384E226FA2F3A66977A5678D2CEC7BE7D8447B50D7F8E374BCC2B4A0C9BC190CAF7B8F9
4,367,751 UART: Caliptra RT
4,368,004 UART: [state] CFI Enabled
4,652,867 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,649 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,375 UART: [kat] SHA2-256
890,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,332 UART: [kat] SHA2-256
901,272 UART: [kat] SHA2-384
903,919 UART: [kat] SHA2-512-ACC
905,820 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
920,197 UART: [kat] LMS
1,168,509 UART: [kat] --
1,169,392 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,414 UART: [idev] ++
1,172,582 UART: [idev] CDI.KEYID = 6
1,172,943 UART: [idev] SUBJECT.KEYID = 7
1,173,368 UART: [idev] UDS.KEYID = 0
1,173,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,300 UART: [idev] Sha1 KeyId Algorithm
1,207,378 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,227 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,663 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,784 UART: [fwproc] Recv command 0x46574c44
1,282,517 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,201 >>> mbox cmd response: success
2,771,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,772,416 UART: [afmc] ++
2,772,584 UART: [afmc] CDI.KEYID = 6
2,772,947 UART: [afmc] SUBJECT.KEYID = 7
2,773,373 UART: [afmc] AUTHORITY.KEYID = 5
2,809,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,681 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,394 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,303 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,017 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,792 UART: [afmc] --
2,852,918 UART: [cold-reset] --
2,853,548 UART: [state] Locking Datavault
2,854,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,359 UART: [state] Locking ICCM
2,855,923 UART: [exit] Launching FMC @ 0x40000130
2,861,252 UART:
2,861,268 UART: Running Caliptra FMC ...
2,861,676 UART:
2,861,819 UART: [state] CFI Enabled
2,872,516 UART: [fht] FMC Alias Private Key: 7
2,980,348 UART: [art] Extend RT PCRs Done
2,980,776 UART: [art] Lock RT PCRs Done
2,982,076 UART: [art] Populate DV Done
2,990,539 UART: [fht] FMC Alias Private Key: 7
2,991,721 UART: [art] Derive CDI
2,992,001 UART: [art] Store in in slot 0x4
3,077,612 UART: [art] Derive Key Pair
3,077,972 UART: [art] Store priv key in slot 0x5
3,090,966 UART: [art] Derive Key Pair - Done
3,106,036 UART: [art] Signing Cert with AUTHO
3,106,516 UART: RITY.KEYID = 7
3,122,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,809 UART: [art] PUB.X = D884BD9A43DB4F57F5983B3BFA9DC1EA1F13D6F33D37BF92DC747EFD5DAA08E46B18EBB757207745268BCCF08596D255
3,129,594 UART: [art] PUB.Y = FC1F2764970F729FF7357DAAA151EBFC4E3E1959B787E33A13079B0A24FA8B366C2949EFC28762FFCC4634203AF47B7A
3,136,545 UART: [art] SIG.R = 04AD5086C4863FB53C6136BEB68DED9603AF438214849936D7F1290290BA9E7E4844D4B3E2C710F1C51B187666BA1CEE
3,143,308 UART: [art] SIG.S = EFE95CF76E094B3CB152E08E2329AFD112E9D253AACAF2B9783458061CB8B9E7656E76AD12B075B9BA797542B1465351
3,167,575 UART: Caliptra RT
3,167,920 UART: [state] CFI Enabled
3,276,127 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,271 UART:
3,278,287 UART: Running Caliptra ROM ...
3,278,695 UART:
3,278,837 UART: [state] CFI Enabled
3,281,639 UART: [state] LifecycleState = Unprovisioned
3,282,294 UART: [state] DebugLocked = No
3,282,930 UART: [state] WD Timer not started. Device not locked for debugging
3,284,086 UART: [kat] SHA2-256
4,087,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,765 UART: [kat] ++
4,091,917 UART: [kat] sha1
4,096,141 UART: [kat] SHA2-256
4,098,081 UART: [kat] SHA2-384
4,100,864 UART: [kat] SHA2-512-ACC
4,102,764 UART: [kat] ECC-384
4,113,107 UART: [kat] HMAC-384Kdf
4,117,677 UART: [kat] LMS
4,365,989 UART: [kat] --
4,366,775 UART: [update-reset] ++
4,383,503 >>> mbox cmd response: failed
4,383,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,384,141 UART: ROM Non-Fatal Error: 0x000B001E
4,385,063 UART: [state] Locking Datavault
4,385,717 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,321 UART: [state] Locking ICCM
4,386,881 UART: [exit] Launching FMC @ 0x40000130
4,392,210 UART:
4,392,226 UART: Running Caliptra FMC ...
4,392,634 UART:
4,392,777 UART: [state] CFI Enabled
4,482,292 UART: [art] Extend RT PCRs Done
4,482,720 UART: [art] Lock RT PCRs Done
4,483,885 UART: [art] Populate DV Done
4,492,126 UART: [fht] FMC Alias Private Key: 7
4,493,172 UART: [art] Derive CDI
4,493,452 UART: [art] Store in in slot 0x4
4,579,061 UART: [art] Derive Key Pair
4,579,421 UART: [art] Store priv key in slot 0x5
4,592,583 UART: [art] Derive Key Pair - Done
4,607,429 UART: [art] Signing Cert with AUTHO
4,607,909 UART: RITY.KEYID = 7
4,623,173 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,938 UART: [art] PUB.X = D884BD9A43DB4F57F5983B3BFA9DC1EA1F13D6F33D37BF92DC747EFD5DAA08E46B18EBB757207745268BCCF08596D255
4,630,723 UART: [art] PUB.Y = FC1F2764970F729FF7357DAAA151EBFC4E3E1959B787E33A13079B0A24FA8B366C2949EFC28762FFCC4634203AF47B7A
4,637,674 UART: [art] SIG.R = 04AD5086C4863FB53C6136BEB68DED9603AF438214849936D7F1290290BA9E7E4844D4B3E2C710F1C51B187666BA1CEE
4,644,437 UART: [art] SIG.S = EFE95CF76E094B3CB152E08E2329AFD112E9D253AACAF2B9783458061CB8B9E7656E76AD12B075B9BA797542B1465351
4,667,748 UART: Caliptra RT
4,668,093 UART: [state] CFI Enabled
4,953,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,427 UART:
4,955,443 UART: Running Caliptra ROM ...
4,955,851 UART:
4,955,993 UART: [state] CFI Enabled
4,959,105 UART: [state] LifecycleState = Unprovisioned
4,959,760 UART: [state] DebugLocked = No
4,960,278 UART: [state] WD Timer not started. Device not locked for debugging
4,961,426 UART: [kat] SHA2-256
5,764,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,769,105 UART: [kat] ++
5,769,257 UART: [kat] sha1
5,773,539 UART: [kat] SHA2-256
5,775,479 UART: [kat] SHA2-384
5,778,372 UART: [kat] SHA2-512-ACC
5,780,272 UART: [kat] ECC-384
5,790,023 UART: [kat] HMAC-384Kdf
5,794,613 UART: [kat] LMS
6,042,925 UART: [kat] --
6,043,797 UART: [update-reset] ++
7,355,853 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,356,982 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,506,806 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,809 >>> mbox cmd response: success
2,622,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,729 UART:
2,684,745 UART: Running Caliptra FMC ...
2,685,153 UART:
2,685,296 UART: [state] CFI Enabled
2,695,589 UART: [fht] FMC Alias Private Key: 7
2,804,395 UART: [art] Extend RT PCRs Done
2,804,823 UART: [art] Lock RT PCRs Done
2,806,463 UART: [art] Populate DV Done
2,814,656 UART: [fht] FMC Alias Private Key: 7
2,815,612 UART: [art] Derive CDI
2,815,892 UART: [art] Store in in slot 0x4
2,901,407 UART: [art] Derive Key Pair
2,901,767 UART: [art] Store priv key in slot 0x5
2,915,079 UART: [art] Derive Key Pair - Done
2,929,702 UART: [art] Signing Cert with AUTHO
2,930,182 UART: RITY.KEYID = 7
2,945,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,387 UART: [art] PUB.X = B352F8AF1999218E765B3BFE39C4156DFC3C16176F2D01B554A80CCD3703C6715BB849FC56F7CFEF408DB05A716BC310
2,953,158 UART: [art] PUB.Y = 6B93E0A1D495604288B04971E4DF28505C25865D2D9D34A0AB34F0D6B29ECD299A8CB22ACC47622358FEE81229C2F11D
2,960,112 UART: [art] SIG.R = FA74AEFFF1509B2F7B9020E93ECAF42A12D0593393DC71C87E0E993FBD308C7428161953B82C7BD28C7DCEA183B84C14
2,966,891 UART: [art] SIG.S = F0F61B54BD543CADD33DD30D5589C19C048756583971373C07B1C8A7D7DEDCD3A2750692C20360749F971ADC470F50E1
2,990,824 UART: Caliptra RT
2,991,169 UART: [state] CFI Enabled
3,098,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,833 >>> mbox cmd response: failed
4,088,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,094,700 UART:
4,094,716 UART: Running Caliptra FMC ...
4,095,124 UART:
4,095,267 UART: [state] CFI Enabled
4,184,098 UART: [art] Extend RT PCRs Done
4,184,526 UART: [art] Lock RT PCRs Done
4,186,033 UART: [art] Populate DV Done
4,194,378 UART: [fht] FMC Alias Private Key: 7
4,195,350 UART: [art] Derive CDI
4,195,630 UART: [art] Store in in slot 0x4
4,281,825 UART: [art] Derive Key Pair
4,282,185 UART: [art] Store priv key in slot 0x5
4,295,575 UART: [art] Derive Key Pair - Done
4,310,574 UART: [art] Signing Cert with AUTHO
4,311,054 UART: RITY.KEYID = 7
4,326,482 UART: [art] Erasing AUTHORITY.KEYID = 7
4,327,247 UART: [art] PUB.X = B352F8AF1999218E765B3BFE39C4156DFC3C16176F2D01B554A80CCD3703C6715BB849FC56F7CFEF408DB05A716BC310
4,334,018 UART: [art] PUB.Y = 6B93E0A1D495604288B04971E4DF28505C25865D2D9D34A0AB34F0D6B29ECD299A8CB22ACC47622358FEE81229C2F11D
4,340,972 UART: [art] SIG.R = FA74AEFFF1509B2F7B9020E93ECAF42A12D0593393DC71C87E0E993FBD308C7428161953B82C7BD28C7DCEA183B84C14
4,347,751 UART: [art] SIG.S = F0F61B54BD543CADD33DD30D5589C19C048756583971373C07B1C8A7D7DEDCD3A2750692C20360749F971ADC470F50E1
4,371,480 UART: Caliptra RT
4,371,825 UART: [state] CFI Enabled
4,655,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,088,710 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
903,100 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,447 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,371 UART: [ldev] ++
1,514,539 UART: [ldev] CDI.KEYID = 6
1,514,902 UART: [ldev] SUBJECT.KEYID = 5
1,515,328 UART: [ldev] AUTHORITY.KEYID = 7
1,515,791 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,912 UART: [ldev] --
1,586,427 UART: [fwproc] Waiting for Commands...
1,587,274 UART: [fwproc] Received command 0x46574c44
1,588,065 UART: [fwproc] Received Image of size 114332 bytes
5,272,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,204 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,465,297 >>> mbox cmd response: success
5,465,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,466,405 UART: [afmc] ++
5,466,573 UART: [afmc] CDI.KEYID = 6
5,466,935 UART: [afmc] SUBJECT.KEYID = 7
5,467,360 UART: [afmc] AUTHORITY.KEYID = 5
5,502,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,518,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,519,292 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,001 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,530,893 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,536,594 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,544,614 UART: [afmc] --
5,545,586 UART: [cold-reset] --
5,546,490 UART: [state] Locking Datavault
5,547,655 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,259 UART: [state] Locking ICCM
5,548,919 UART: [exit] Launching FMC @ 0x40000130
5,554,248 UART:
5,554,264 UART: Running Caliptra FMC ...
5,554,672 UART:
5,554,726 UART: [state] CFI Enabled
5,565,130 UART: [fht] FMC Alias Private Key: 7
5,673,046 UART: [art] Extend RT PCRs Done
5,673,474 UART: [art] Lock RT PCRs Done
5,675,314 UART: [art] Populate DV Done
5,683,564 UART: [fht] FMC Alias Private Key: 7
5,684,646 UART: [art] Derive CDI
5,684,926 UART: [art] Store in in slot 0x4
5,770,621 UART: [art] Derive Key Pair
5,770,981 UART: [art] Store priv key in slot 0x5
5,784,431 UART: [art] Derive Key Pair - Done
5,799,439 UART: [art] Signing Cert with AUTHO
5,799,919 UART: RITY.KEYID = 7
5,815,101 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,866 UART: [art] PUB.X = B4EC9552E5B40AF3E1891D3443982E8C4240B82C5057C46035D6D83966EF086B34CA6AB6067DECDFDA95DADB84A12179
5,822,635 UART: [art] PUB.Y = 7A51248503A5D6C1D56326F183F3583372F7E9DAF85CCAEB5BD5580DE725220923F944402AB07DD034B6C946AE1B1744
5,829,576 UART: [art] SIG.R = D7463A78F8FF791B27C3A7BB5A840ACD16D8E3724214DB413BB0BE88BBC26A291820E00015F7FFBA94456331081B8EBD
5,836,328 UART: [art] SIG.S = CDB4EB408389F8F9B1E5B6BB7E43670C4F38AD81616FE50D035364A142734F9FBAFBC5033F82520CD852221C15014137
5,859,773 UART: Caliptra RT
5,860,026 UART: [state] CFI Enabled
5,968,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,969,779 UART:
5,969,795 UART: Running Caliptra ROM ...
5,970,203 UART:
5,970,257 UART: [state] CFI Enabled
5,972,585 UART: [state] LifecycleState = Unprovisioned
5,973,240 UART: [state] DebugLocked = No
5,973,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,975,461 UART: [kat] SHA2-256
6,769,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,773,507 UART: [kat] ++
6,773,659 UART: [kat] sha1
6,777,903 UART: [kat] SHA2-256
6,779,841 UART: [kat] SHA2-384
6,782,512 UART: [kat] SHA2-512-ACC
6,784,412 UART: [kat] ECC-384
6,789,993 UART: [kat] HMAC-384Kdf
6,794,611 UART: [kat] LMS
7,362,807 UART: [kat] --
7,363,718 UART: [update-reset] ++
7,403,921 >>> mbox cmd response: failed
7,403,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,404,537 UART: ROM Non-Fatal Error: 0x000B003D
7,405,311 UART: [state] Locking Datavault
7,406,115 UART: [state] Locking PCR0, PCR1 and PCR31
7,406,719 UART: [state] Locking ICCM
7,407,237 UART: [exit] Launching FMC @ 0x40000130
7,412,566 UART:
7,412,582 UART: Running Caliptra FMC ...
7,412,990 UART:
7,413,044 UART: [state] CFI Enabled
7,502,097 UART: [art] Extend RT PCRs Done
7,502,525 UART: [art] Lock RT PCRs Done
7,503,686 UART: [art] Populate DV Done
7,512,124 UART: [fht] FMC Alias Private Key: 7
7,513,184 UART: [art] Derive CDI
7,513,464 UART: [art] Store in in slot 0x4
7,599,097 UART: [art] Derive Key Pair
7,599,457 UART: [art] Store priv key in slot 0x5
7,612,369 UART: [art] Derive Key Pair - Done
7,627,303 UART: [art] Signing Cert with AUTHO
7,627,783 UART: RITY.KEYID = 7
7,643,363 UART: [art] Erasing AUTHORITY.KEYID = 7
7,644,128 UART: [art] PUB.X = B4EC9552E5B40AF3E1891D3443982E8C4240B82C5057C46035D6D83966EF086B34CA6AB6067DECDFDA95DADB84A12179
7,650,897 UART: [art] PUB.Y = 7A51248503A5D6C1D56326F183F3583372F7E9DAF85CCAEB5BD5580DE725220923F944402AB07DD034B6C946AE1B1744
7,657,838 UART: [art] SIG.R = D7463A78F8FF791B27C3A7BB5A840ACD16D8E3724214DB413BB0BE88BBC26A291820E00015F7FFBA94456331081B8EBD
7,664,590 UART: [art] SIG.S = CDB4EB408389F8F9B1E5B6BB7E43670C4F38AD81616FE50D035364A142734F9FBAFBC5033F82520CD852221C15014137
7,688,087 UART: Caliptra RT
7,688,340 UART: [state] CFI Enabled
7,973,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,974,604 UART:
7,974,620 UART: Running Caliptra ROM ...
7,975,028 UART:
7,975,082 UART: [state] CFI Enabled
7,977,666 UART: [state] LifecycleState = Unprovisioned
7,978,321 UART: [state] DebugLocked = No
7,978,887 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,980,550 UART: [kat] SHA2-256
8,774,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,778,596 UART: [kat] ++
8,778,748 UART: [kat] sha1
8,782,992 UART: [kat] SHA2-256
8,784,930 UART: [kat] SHA2-384
8,787,671 UART: [kat] SHA2-512-ACC
8,789,571 UART: [kat] ECC-384
8,795,106 UART: [kat] HMAC-384Kdf
8,799,818 UART: [kat] LMS
9,368,014 UART: [kat] --
9,369,023 UART: [update-reset] ++
13,090,438 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,091,594 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,241,470 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,465,591 >>> mbox cmd response: success
5,465,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,527,854 UART:
5,527,870 UART: Running Caliptra FMC ...
5,528,278 UART:
5,528,332 UART: [state] CFI Enabled
5,538,682 UART: [fht] FMC Alias Private Key: 7
5,646,890 UART: [art] Extend RT PCRs Done
5,647,318 UART: [art] Lock RT PCRs Done
5,648,492 UART: [art] Populate DV Done
5,656,648 UART: [fht] FMC Alias Private Key: 7
5,657,826 UART: [art] Derive CDI
5,658,106 UART: [art] Store in in slot 0x4
5,743,135 UART: [art] Derive Key Pair
5,743,495 UART: [art] Store priv key in slot 0x5
5,756,541 UART: [art] Derive Key Pair - Done
5,771,452 UART: [art] Signing Cert with AUTHO
5,771,932 UART: RITY.KEYID = 7
5,787,264 UART: [art] Erasing AUTHORITY.KEYID = 7
5,788,029 UART: [art] PUB.X = E949BCAA015F7DDADDDC2A0D17F8D683CCD952DDD184AB728FDBF39301D431A376CC9BE1E7C6AE7BEB4D17FE21B89A10
5,794,822 UART: [art] PUB.Y = 7A9DE6A47833720DA7D97874095A8CA35729D2696A126366828E68D536F39035A8E0A81C13B4BAF5CD78948A42537BE0
5,801,760 UART: [art] SIG.R = C4D12A3E0574775841312335E44D452AB9C12A91062FC5BBC8A7E29B529C8F01388298A5D98AEDAB8BEEDD1F798FDB79
5,808,531 UART: [art] SIG.S = F5978030E05CCB0CC44BBC5808CBEE2B64E9289A629817553E344A314323B0340381ED6593A1BBE8F07E4332CA0A6BCA
5,832,242 UART: Caliptra RT
5,832,495 UART: [state] CFI Enabled
5,940,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,259,615 >>> mbox cmd response: failed
7,259,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,265,120 UART:
7,265,136 UART: Running Caliptra FMC ...
7,265,544 UART:
7,265,598 UART: [state] CFI Enabled
7,354,275 UART: [art] Extend RT PCRs Done
7,354,703 UART: [art] Lock RT PCRs Done
7,355,856 UART: [art] Populate DV Done
7,364,004 UART: [fht] FMC Alias Private Key: 7
7,365,178 UART: [art] Derive CDI
7,365,458 UART: [art] Store in in slot 0x4
7,451,257 UART: [art] Derive Key Pair
7,451,617 UART: [art] Store priv key in slot 0x5
7,464,971 UART: [art] Derive Key Pair - Done
7,479,930 UART: [art] Signing Cert with AUTHO
7,480,410 UART: RITY.KEYID = 7
7,495,316 UART: [art] Erasing AUTHORITY.KEYID = 7
7,496,081 UART: [art] PUB.X = E949BCAA015F7DDADDDC2A0D17F8D683CCD952DDD184AB728FDBF39301D431A376CC9BE1E7C6AE7BEB4D17FE21B89A10
7,502,874 UART: [art] PUB.Y = 7A9DE6A47833720DA7D97874095A8CA35729D2696A126366828E68D536F39035A8E0A81C13B4BAF5CD78948A42537BE0
7,509,812 UART: [art] SIG.R = C4D12A3E0574775841312335E44D452AB9C12A91062FC5BBC8A7E29B529C8F01388298A5D98AEDAB8BEEDD1F798FDB79
7,516,583 UART: [art] SIG.S = F5978030E05CCB0CC44BBC5808CBEE2B64E9289A629817553E344A314323B0340381ED6593A1BBE8F07E4332CA0A6BCA
7,540,756 UART: Caliptra RT
7,541,009 UART: [state] CFI Enabled
7,816,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,115,869 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,605 UART: [kat] SHA2-512-ACC
897,506 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,920 UART: [cold-reset] ++
1,477,448 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,847 UART: [idev] Erasing UDS.KEYID = 0
1,506,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,515 UART: [idev] --
1,515,650 UART: [ldev] ++
1,515,818 UART: [ldev] CDI.KEYID = 6
1,516,181 UART: [ldev] SUBJECT.KEYID = 5
1,516,607 UART: [ldev] AUTHORITY.KEYID = 7
1,517,070 UART: [ldev] FE.KEYID = 1
1,522,312 UART: [ldev] Erasing FE.KEYID = 1
1,547,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,691 UART: [ldev] --
1,587,132 UART: [fwproc] Waiting for Commands...
1,587,759 UART: [fwproc] Received command 0x46574c44
1,588,550 UART: [fwproc] Received Image of size 114332 bytes
5,310,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,340,222 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,369,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,505,509 >>> mbox cmd response: success
5,505,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,506,665 UART: [afmc] ++
5,506,833 UART: [afmc] CDI.KEYID = 6
5,507,195 UART: [afmc] SUBJECT.KEYID = 7
5,507,620 UART: [afmc] AUTHORITY.KEYID = 5
5,542,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,558,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,559,720 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,565,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,571,321 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,577,022 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,584,864 UART: [afmc] --
5,585,988 UART: [cold-reset] --
5,586,720 UART: [state] Locking Datavault
5,587,683 UART: [state] Locking PCR0, PCR1 and PCR31
5,588,287 UART: [state] Locking ICCM
5,588,839 UART: [exit] Launching FMC @ 0x40000130
5,594,168 UART:
5,594,184 UART: Running Caliptra FMC ...
5,594,592 UART:
5,594,735 UART: [state] CFI Enabled
5,605,445 UART: [fht] FMC Alias Private Key: 7
5,713,025 UART: [art] Extend RT PCRs Done
5,713,453 UART: [art] Lock RT PCRs Done
5,714,901 UART: [art] Populate DV Done
5,723,213 UART: [fht] FMC Alias Private Key: 7
5,724,233 UART: [art] Derive CDI
5,724,513 UART: [art] Store in in slot 0x4
5,810,010 UART: [art] Derive Key Pair
5,810,370 UART: [art] Store priv key in slot 0x5
5,823,916 UART: [art] Derive Key Pair - Done
5,838,657 UART: [art] Signing Cert with AUTHO
5,839,137 UART: RITY.KEYID = 7
5,854,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,855,202 UART: [art] PUB.X = F5C73310BA35D69897A2B212740019565A8BF44F2535112F76400892DDA681162BD3276BBE9F49E85BAC7AE171EBFE8B
5,861,949 UART: [art] PUB.Y = 22E82F187106EFE336E0C16A74D69768E441311276CD776D03EE8FB9AD77A94EB066F3F6C4AE88B2308AF6E722000258
5,868,868 UART: [art] SIG.R = FF5C2C427C3A1EF952B3B15E05816EE51657E41EA179F92B66EEAF3F7A3521130543F91E00B4C8C3CED051F10D415DE0
5,875,617 UART: [art] SIG.S = D5309ECAFD6DD01B0C5817D8EA0AA8DD19AFAED2713023AF778E48538687E6026D32AF0AEC421A0FDF437EDF6A210C35
5,899,430 UART: Caliptra RT
5,899,775 UART: [state] CFI Enabled
6,007,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,684 UART:
6,009,700 UART: Running Caliptra ROM ...
6,010,108 UART:
6,010,249 UART: [state] CFI Enabled
6,013,179 UART: [state] LifecycleState = Unprovisioned
6,013,834 UART: [state] DebugLocked = No
6,014,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,015,951 UART: [kat] SHA2-256
6,809,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,813,997 UART: [kat] ++
6,814,149 UART: [kat] sha1
6,818,505 UART: [kat] SHA2-256
6,820,443 UART: [kat] SHA2-384
6,823,132 UART: [kat] SHA2-512-ACC
6,825,032 UART: [kat] ECC-384
6,830,341 UART: [kat] HMAC-384Kdf
6,835,041 UART: [kat] LMS
7,403,237 UART: [kat] --
7,404,142 UART: [update-reset] ++
7,444,511 >>> mbox cmd response: failed
7,444,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,445,017 UART: ROM Non-Fatal Error: 0x000B003D
7,445,809 UART: [state] Locking Datavault
7,446,585 UART: [state] Locking PCR0, PCR1 and PCR31
7,447,189 UART: [state] Locking ICCM
7,447,799 UART: [exit] Launching FMC @ 0x40000130
7,453,128 UART:
7,453,144 UART: Running Caliptra FMC ...
7,453,552 UART:
7,453,695 UART: [state] CFI Enabled
7,542,852 UART: [art] Extend RT PCRs Done
7,543,280 UART: [art] Lock RT PCRs Done
7,544,657 UART: [art] Populate DV Done
7,552,907 UART: [fht] FMC Alias Private Key: 7
7,553,877 UART: [art] Derive CDI
7,554,157 UART: [art] Store in in slot 0x4
7,640,010 UART: [art] Derive Key Pair
7,640,370 UART: [art] Store priv key in slot 0x5
7,653,820 UART: [art] Derive Key Pair - Done
7,668,883 UART: [art] Signing Cert with AUTHO
7,669,363 UART: RITY.KEYID = 7
7,685,097 UART: [art] Erasing AUTHORITY.KEYID = 7
7,685,862 UART: [art] PUB.X = F5C73310BA35D69897A2B212740019565A8BF44F2535112F76400892DDA681162BD3276BBE9F49E85BAC7AE171EBFE8B
7,692,609 UART: [art] PUB.Y = 22E82F187106EFE336E0C16A74D69768E441311276CD776D03EE8FB9AD77A94EB066F3F6C4AE88B2308AF6E722000258
7,699,528 UART: [art] SIG.R = FF5C2C427C3A1EF952B3B15E05816EE51657E41EA179F92B66EEAF3F7A3521130543F91E00B4C8C3CED051F10D415DE0
7,706,277 UART: [art] SIG.S = D5309ECAFD6DD01B0C5817D8EA0AA8DD19AFAED2713023AF778E48538687E6026D32AF0AEC421A0FDF437EDF6A210C35
7,729,918 UART: Caliptra RT
7,730,263 UART: [state] CFI Enabled
8,013,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,014,693 UART:
8,014,709 UART: Running Caliptra ROM ...
8,015,117 UART:
8,015,258 UART: [state] CFI Enabled
8,017,578 UART: [state] LifecycleState = Unprovisioned
8,018,233 UART: [state] DebugLocked = No
8,018,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,020,434 UART: [kat] SHA2-256
8,814,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,818,480 UART: [kat] ++
8,818,632 UART: [kat] sha1
8,822,898 UART: [kat] SHA2-256
8,824,836 UART: [kat] SHA2-384
8,827,551 UART: [kat] SHA2-512-ACC
8,829,451 UART: [kat] ECC-384
8,835,450 UART: [kat] HMAC-384Kdf
8,840,160 UART: [kat] LMS
9,408,356 UART: [kat] --
9,408,795 UART: [update-reset] ++
13,167,719 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,168,795 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,318,671 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,205,093 >>> mbox cmd response: success
5,205,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,267,132 UART:
5,267,148 UART: Running Caliptra FMC ...
5,267,556 UART:
5,267,699 UART: [state] CFI Enabled
5,278,195 UART: [fht] FMC Alias Private Key: 7
5,386,055 UART: [art] Extend RT PCRs Done
5,386,483 UART: [art] Lock RT PCRs Done
5,387,999 UART: [art] Populate DV Done
5,395,915 UART: [fht] FMC Alias Private Key: 7
5,396,887 UART: [art] Derive CDI
5,397,167 UART: [art] Store in in slot 0x4
5,483,024 UART: [art] Derive Key Pair
5,483,384 UART: [art] Store priv key in slot 0x5
5,496,522 UART: [art] Derive Key Pair - Done
5,511,169 UART: [art] Signing Cert with AUTHO
5,511,649 UART: RITY.KEYID = 7
5,527,057 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,822 UART: [art] PUB.X = 07B536FFE4B9D62D0940952223690C63470D2DAEB7720ACAED28B675FE9B2CFC19918701DDA305E9CD7BCE131BBE4AC9
5,534,587 UART: [art] PUB.Y = A2117537D29859B6F9264654A9BD52A573CDA77A9C8444275A0298520F57062B4571CFC786393B0D5E92DD481D60D537
5,541,515 UART: [art] SIG.R = 8643434E14E901D39213E47F773EA8B4C917DFD7DEC52776D6F306ADF1AED9B331B4EF4FCFA5E261D639893F207D86FE
5,548,291 UART: [art] SIG.S = 1D48EA9EB9506D116C34572F5FE51B48A9CBE986BC596F4111CED40C3BA5F3F1558AC4C35B167CAD3BD9BF19F1CDBD45
5,572,109 UART: Caliptra RT
5,572,454 UART: [state] CFI Enabled
5,679,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,999,378 >>> mbox cmd response: failed
6,999,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,005,375 UART:
7,005,391 UART: Running Caliptra FMC ...
7,005,799 UART:
7,005,942 UART: [state] CFI Enabled
7,095,083 UART: [art] Extend RT PCRs Done
7,095,511 UART: [art] Lock RT PCRs Done
7,096,754 UART: [art] Populate DV Done
7,104,920 UART: [fht] FMC Alias Private Key: 7
7,105,882 UART: [art] Derive CDI
7,106,162 UART: [art] Store in in slot 0x4
7,192,019 UART: [art] Derive Key Pair
7,192,379 UART: [art] Store priv key in slot 0x5
7,205,645 UART: [art] Derive Key Pair - Done
7,220,518 UART: [art] Signing Cert with AUTHO
7,220,998 UART: RITY.KEYID = 7
7,236,080 UART: [art] Erasing AUTHORITY.KEYID = 7
7,236,845 UART: [art] PUB.X = 07B536FFE4B9D62D0940952223690C63470D2DAEB7720ACAED28B675FE9B2CFC19918701DDA305E9CD7BCE131BBE4AC9
7,243,610 UART: [art] PUB.Y = A2117537D29859B6F9264654A9BD52A573CDA77A9C8444275A0298520F57062B4571CFC786393B0D5E92DD481D60D537
7,250,538 UART: [art] SIG.R = 8643434E14E901D39213E47F773EA8B4C917DFD7DEC52776D6F306ADF1AED9B331B4EF4FCFA5E261D639893F207D86FE
7,257,314 UART: [art] SIG.S = 1D48EA9EB9506D116C34572F5FE51B48A9CBE986BC596F4111CED40C3BA5F3F1558AC4C35B167CAD3BD9BF19F1CDBD45
7,281,362 UART: Caliptra RT
7,281,707 UART: [state] CFI Enabled
7,563,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,600,092 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,931 UART: [kat] SHA2-256
903,871 UART: [kat] SHA2-384
906,662 UART: [kat] SHA2-512-ACC
908,563 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,676 UART: [kat] LMS
1,171,004 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,457 UART: [fht] FHT @ 0x50003400
1,175,166 UART: [idev] ++
1,175,334 UART: [idev] CDI.KEYID = 6
1,175,694 UART: [idev] SUBJECT.KEYID = 7
1,176,118 UART: [idev] UDS.KEYID = 0
1,176,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,392 UART: [idev] Erasing UDS.KEYID = 0
1,201,325 UART: [idev] Sha1 KeyId Algorithm
1,209,945 UART: [idev] --
1,211,183 UART: [ldev] ++
1,211,351 UART: [ldev] CDI.KEYID = 6
1,211,714 UART: [ldev] SUBJECT.KEYID = 5
1,212,140 UART: [ldev] AUTHORITY.KEYID = 7
1,212,603 UART: [ldev] FE.KEYID = 1
1,217,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,969 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,283,008 UART: [fwproc] Recv command 0x46574c44
1,283,736 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,804 >>> mbox cmd response: success
3,325,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,326,970 UART: [afmc] ++
3,327,138 UART: [afmc] CDI.KEYID = 6
3,327,500 UART: [afmc] SUBJECT.KEYID = 7
3,327,925 UART: [afmc] AUTHORITY.KEYID = 5
3,363,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,994 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,703 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,595 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,306 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,027 UART: [afmc] --
3,407,063 UART: [cold-reset] --
3,408,029 UART: [state] Locking Datavault
3,409,400 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,004 UART: [state] Locking ICCM
3,410,628 UART: [exit] Launching FMC @ 0x40000130
3,415,957 UART:
3,415,973 UART: Running Caliptra FMC ...
3,416,381 UART:
3,416,435 UART: [state] CFI Enabled
3,426,889 UART: [fht] FMC Alias Private Key: 7
3,534,167 UART: [art] Extend RT PCRs Done
3,534,595 UART: [art] Lock RT PCRs Done
3,535,925 UART: [art] Populate DV Done
3,544,171 UART: [fht] FMC Alias Private Key: 7
3,545,157 UART: [art] Derive CDI
3,545,437 UART: [art] Store in in slot 0x4
3,631,248 UART: [art] Derive Key Pair
3,631,608 UART: [art] Store priv key in slot 0x5
3,645,232 UART: [art] Derive Key Pair - Done
3,659,613 UART: [art] Signing Cert with AUTHO
3,660,093 UART: RITY.KEYID = 7
3,675,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,922 UART: [art] PUB.X = D1D5F9633EC35F4C860EF542535BC78106135EF0A5D07562E4A10D63488F12B1BFB314ACF7419E22872066E78EB0B550
3,682,683 UART: [art] PUB.Y = 3169D64E43116BDFFF013DA42C5E38506429A98E44C6D960A8421799AAA349696F7F8A2424641A5D926062BF0A6ABA64
3,689,625 UART: [art] SIG.R = 5248CD55D3532464A7A81B3A74FEAF34D84F468F6A4A14879A094A6E655C21639F0AFAA5A0BD78126867B73DEBAC19A4
3,696,397 UART: [art] SIG.S = BD68BB835C89770307E189C366C730C1E5EDD34B2DC35088809A6A42573F24AE52467DF5A57FF1A27B415F1183B30C5E
3,719,749 UART: Caliptra RT
3,720,002 UART: [state] CFI Enabled
3,827,602 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,312 UART:
3,829,328 UART: Running Caliptra ROM ...
3,829,736 UART:
3,829,791 UART: [state] CFI Enabled
3,832,519 UART: [state] LifecycleState = Unprovisioned
3,833,174 UART: [state] DebugLocked = No
3,833,904 UART: [state] WD Timer not started. Device not locked for debugging
3,835,182 UART: [kat] SHA2-256
4,640,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,644,957 UART: [kat] ++
4,645,109 UART: [kat] sha1
4,649,205 UART: [kat] SHA2-256
4,651,145 UART: [kat] SHA2-384
4,653,800 UART: [kat] SHA2-512-ACC
4,655,700 UART: [kat] ECC-384
4,665,655 UART: [kat] HMAC-384Kdf
4,670,233 UART: [kat] LMS
4,918,561 UART: [kat] --
4,919,449 UART: [update-reset] ++
4,937,464 >>> mbox cmd response: failed
4,937,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,937,846 UART: ROM Non-Fatal Error: 0x000B003D
4,938,634 UART: [state] Locking Datavault
4,939,522 UART: [state] Locking PCR0, PCR1 and PCR31
4,940,126 UART: [state] Locking ICCM
4,940,778 UART: [exit] Launching FMC @ 0x40000130
4,946,107 UART:
4,946,123 UART: Running Caliptra FMC ...
4,946,531 UART:
4,946,585 UART: [state] CFI Enabled
5,035,756 UART: [art] Extend RT PCRs Done
5,036,184 UART: [art] Lock RT PCRs Done
5,037,393 UART: [art] Populate DV Done
5,045,719 UART: [fht] FMC Alias Private Key: 7
5,046,767 UART: [art] Derive CDI
5,047,047 UART: [art] Store in in slot 0x4
5,132,478 UART: [art] Derive Key Pair
5,132,838 UART: [art] Store priv key in slot 0x5
5,146,628 UART: [art] Derive Key Pair - Done
5,161,523 UART: [art] Signing Cert with AUTHO
5,162,003 UART: RITY.KEYID = 7
5,176,981 UART: [art] Erasing AUTHORITY.KEYID = 7
5,177,746 UART: [art] PUB.X = D1D5F9633EC35F4C860EF542535BC78106135EF0A5D07562E4A10D63488F12B1BFB314ACF7419E22872066E78EB0B550
5,184,507 UART: [art] PUB.Y = 3169D64E43116BDFFF013DA42C5E38506429A98E44C6D960A8421799AAA349696F7F8A2424641A5D926062BF0A6ABA64
5,191,449 UART: [art] SIG.R = 5248CD55D3532464A7A81B3A74FEAF34D84F468F6A4A14879A094A6E655C21639F0AFAA5A0BD78126867B73DEBAC19A4
5,198,221 UART: [art] SIG.S = BD68BB835C89770307E189C366C730C1E5EDD34B2DC35088809A6A42573F24AE52467DF5A57FF1A27B415F1183B30C5E
5,222,025 UART: Caliptra RT
5,222,278 UART: [state] CFI Enabled
5,504,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,505,597 UART:
5,505,613 UART: Running Caliptra ROM ...
5,506,021 UART:
5,506,076 UART: [state] CFI Enabled
5,508,584 UART: [state] LifecycleState = Unprovisioned
5,509,239 UART: [state] DebugLocked = No
5,509,749 UART: [state] WD Timer not started. Device not locked for debugging
5,510,897 UART: [kat] SHA2-256
6,316,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,320,672 UART: [kat] ++
6,320,824 UART: [kat] sha1
6,325,038 UART: [kat] SHA2-256
6,326,978 UART: [kat] SHA2-384
6,329,805 UART: [kat] SHA2-512-ACC
6,331,705 UART: [kat] ECC-384
6,341,666 UART: [kat] HMAC-384Kdf
6,346,270 UART: [kat] LMS
6,594,598 UART: [kat] --
6,595,492 UART: [update-reset] ++
8,459,713 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,460,924 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,610,748 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,424 >>> mbox cmd response: success
3,167,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,229,615 UART:
3,229,631 UART: Running Caliptra FMC ...
3,230,039 UART:
3,230,093 UART: [state] CFI Enabled
3,240,881 UART: [fht] FMC Alias Private Key: 7
3,348,693 UART: [art] Extend RT PCRs Done
3,349,121 UART: [art] Lock RT PCRs Done
3,350,705 UART: [art] Populate DV Done
3,359,079 UART: [fht] FMC Alias Private Key: 7
3,360,133 UART: [art] Derive CDI
3,360,413 UART: [art] Store in in slot 0x4
3,446,480 UART: [art] Derive Key Pair
3,446,840 UART: [art] Store priv key in slot 0x5
3,459,624 UART: [art] Derive Key Pair - Done
3,474,530 UART: [art] Signing Cert with AUTHO
3,475,010 UART: RITY.KEYID = 7
3,490,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,043 UART: [art] PUB.X = 3102F787DC23943D9E02AC35FA4E4EBAB4C7F1D989D1EE910AA0BBA9317FB83D1FAAE48504D96E7E27F2B4BB6501687D
3,497,816 UART: [art] PUB.Y = 6ACECB2EA5C1E1DD6E46C7F69E039C02D7B74C38F8632384B298DB8FCB31526674CC25A7E3CA5601353F3D8D092AA510
3,504,766 UART: [art] SIG.R = A58088A0F7D331CB1ADCA6BF7B923F272EE9B7F765C15498DECB8C5C894845ED746DA6606C29FBA754DF7296AD3287DD
3,511,552 UART: [art] SIG.S = F9C0531AD7A5F5886DD82F6AC438D65938379DB7B76C46BE383D878E39320A354D362E6729E02C4D95549FC9AA15EB2D
3,535,342 UART: Caliptra RT
3,535,595 UART: [state] CFI Enabled
3,643,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,638,980 >>> mbox cmd response: failed
4,638,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,644,521 UART:
4,644,537 UART: Running Caliptra FMC ...
4,644,945 UART:
4,644,999 UART: [state] CFI Enabled
4,734,270 UART: [art] Extend RT PCRs Done
4,734,698 UART: [art] Lock RT PCRs Done
4,736,293 UART: [art] Populate DV Done
4,744,559 UART: [fht] FMC Alias Private Key: 7
4,745,497 UART: [art] Derive CDI
4,745,777 UART: [art] Store in in slot 0x4
4,831,424 UART: [art] Derive Key Pair
4,831,784 UART: [art] Store priv key in slot 0x5
4,845,638 UART: [art] Derive Key Pair - Done
4,860,124 UART: [art] Signing Cert with AUTHO
4,860,604 UART: RITY.KEYID = 7
4,875,496 UART: [art] Erasing AUTHORITY.KEYID = 7
4,876,261 UART: [art] PUB.X = 3102F787DC23943D9E02AC35FA4E4EBAB4C7F1D989D1EE910AA0BBA9317FB83D1FAAE48504D96E7E27F2B4BB6501687D
4,883,034 UART: [art] PUB.Y = 6ACECB2EA5C1E1DD6E46C7F69E039C02D7B74C38F8632384B298DB8FCB31526674CC25A7E3CA5601353F3D8D092AA510
4,889,984 UART: [art] SIG.R = A58088A0F7D331CB1ADCA6BF7B923F272EE9B7F765C15498DECB8C5C894845ED746DA6606C29FBA754DF7296AD3287DD
4,896,770 UART: [art] SIG.S = F9C0531AD7A5F5886DD82F6AC438D65938379DB7B76C46BE383D878E39320A354D362E6729E02C4D95549FC9AA15EB2D
4,920,890 UART: Caliptra RT
4,921,143 UART: [state] CFI Enabled
5,204,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,182,394 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,850 UART: [kat] SHA2-256
903,790 UART: [kat] SHA2-384
906,325 UART: [kat] SHA2-512-ACC
908,226 UART: [kat] ECC-384
917,883 UART: [kat] HMAC-384Kdf
922,601 UART: [kat] LMS
1,170,929 UART: [kat] --
1,171,896 UART: [cold-reset] ++
1,172,346 UART: [fht] FHT @ 0x50003400
1,175,011 UART: [idev] ++
1,175,179 UART: [idev] CDI.KEYID = 6
1,175,539 UART: [idev] SUBJECT.KEYID = 7
1,175,963 UART: [idev] UDS.KEYID = 0
1,176,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,901 UART: [idev] Erasing UDS.KEYID = 0
1,201,200 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,644 UART: [ldev] ++
1,210,812 UART: [ldev] CDI.KEYID = 6
1,211,175 UART: [ldev] SUBJECT.KEYID = 5
1,211,601 UART: [ldev] AUTHORITY.KEYID = 7
1,212,064 UART: [ldev] FE.KEYID = 1
1,217,014 UART: [ldev] Erasing FE.KEYID = 1
1,243,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,732 UART: [ldev] --
1,283,085 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,585 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,711 >>> mbox cmd response: success
3,316,711 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,317,729 UART: [afmc] ++
3,317,897 UART: [afmc] CDI.KEYID = 6
3,318,259 UART: [afmc] SUBJECT.KEYID = 7
3,318,684 UART: [afmc] AUTHORITY.KEYID = 5
3,353,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,341 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,050 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,942 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,653 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,498 UART: [afmc] --
3,397,516 UART: [cold-reset] --
3,398,526 UART: [state] Locking Datavault
3,399,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,353 UART: [state] Locking ICCM
3,400,921 UART: [exit] Launching FMC @ 0x40000130
3,406,250 UART:
3,406,266 UART: Running Caliptra FMC ...
3,406,674 UART:
3,406,817 UART: [state] CFI Enabled
3,417,467 UART: [fht] FMC Alias Private Key: 7
3,525,715 UART: [art] Extend RT PCRs Done
3,526,143 UART: [art] Lock RT PCRs Done
3,527,715 UART: [art] Populate DV Done
3,535,751 UART: [fht] FMC Alias Private Key: 7
3,536,687 UART: [art] Derive CDI
3,536,967 UART: [art] Store in in slot 0x4
3,622,454 UART: [art] Derive Key Pair
3,622,814 UART: [art] Store priv key in slot 0x5
3,635,554 UART: [art] Derive Key Pair - Done
3,650,332 UART: [art] Signing Cert with AUTHO
3,650,812 UART: RITY.KEYID = 7
3,666,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,935 UART: [art] PUB.X = 0CCC5FDBAC3EE9A65898A3A7DC57AADADBBD826713444A3C4A6321BF22AF0E4E3955C539109A7E444F358A842203EC76
3,673,712 UART: [art] PUB.Y = F73EB90B93536B76CEA3EC5112E77F1D1938049AE61B9407DFC3DD97F0E09B33AFC6E8598F5A8E5AE9A901CAB9888740
3,680,662 UART: [art] SIG.R = B8999ECAB7513A2B03CBB4F7651504C6D769DBC766D63F6EB9D57E77795FB569ADD13C3D1852CBF455F00EF52AAE3E47
3,687,439 UART: [art] SIG.S = 7693690D172BB425632074557E0AC168ACBE2C9CC9D8E2287181551450BFFA9A8E4CCB13EF7C59B3EAADC56836BBE7D0
3,711,022 UART: Caliptra RT
3,711,367 UART: [state] CFI Enabled
3,820,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,231 UART:
3,822,247 UART: Running Caliptra ROM ...
3,822,655 UART:
3,822,797 UART: [state] CFI Enabled
3,825,765 UART: [state] LifecycleState = Unprovisioned
3,826,420 UART: [state] DebugLocked = No
3,827,052 UART: [state] WD Timer not started. Device not locked for debugging
3,828,226 UART: [kat] SHA2-256
4,633,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,638,001 UART: [kat] ++
4,638,153 UART: [kat] sha1
4,642,339 UART: [kat] SHA2-256
4,644,279 UART: [kat] SHA2-384
4,647,014 UART: [kat] SHA2-512-ACC
4,648,914 UART: [kat] ECC-384
4,658,687 UART: [kat] HMAC-384Kdf
4,663,205 UART: [kat] LMS
4,911,533 UART: [kat] --
4,912,539 UART: [update-reset] ++
4,930,062 >>> mbox cmd response: failed
4,930,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,930,460 UART: ROM Non-Fatal Error: 0x000B003D
4,931,296 UART: [state] Locking Datavault
4,932,078 UART: [state] Locking PCR0, PCR1 and PCR31
4,932,682 UART: [state] Locking ICCM
4,933,128 UART: [exit] Launching FMC @ 0x40000130
4,938,457 UART:
4,938,473 UART: Running Caliptra FMC ...
4,938,881 UART:
4,939,024 UART: [state] CFI Enabled
5,028,361 UART: [art] Extend RT PCRs Done
5,028,789 UART: [art] Lock RT PCRs Done
5,030,044 UART: [art] Populate DV Done
5,038,324 UART: [fht] FMC Alias Private Key: 7
5,039,462 UART: [art] Derive CDI
5,039,742 UART: [art] Store in in slot 0x4
5,125,485 UART: [art] Derive Key Pair
5,125,845 UART: [art] Store priv key in slot 0x5
5,139,383 UART: [art] Derive Key Pair - Done
5,154,103 UART: [art] Signing Cert with AUTHO
5,154,583 UART: RITY.KEYID = 7
5,170,075 UART: [art] Erasing AUTHORITY.KEYID = 7
5,170,840 UART: [art] PUB.X = 0CCC5FDBAC3EE9A65898A3A7DC57AADADBBD826713444A3C4A6321BF22AF0E4E3955C539109A7E444F358A842203EC76
5,177,617 UART: [art] PUB.Y = F73EB90B93536B76CEA3EC5112E77F1D1938049AE61B9407DFC3DD97F0E09B33AFC6E8598F5A8E5AE9A901CAB9888740
5,184,567 UART: [art] SIG.R = B8999ECAB7513A2B03CBB4F7651504C6D769DBC766D63F6EB9D57E77795FB569ADD13C3D1852CBF455F00EF52AAE3E47
5,191,344 UART: [art] SIG.S = 7693690D172BB425632074557E0AC168ACBE2C9CC9D8E2287181551450BFFA9A8E4CCB13EF7C59B3EAADC56836BBE7D0
5,215,665 UART: Caliptra RT
5,216,010 UART: [state] CFI Enabled
5,497,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,907 UART:
5,498,923 UART: Running Caliptra ROM ...
5,499,331 UART:
5,499,473 UART: [state] CFI Enabled
5,501,769 UART: [state] LifecycleState = Unprovisioned
5,502,424 UART: [state] DebugLocked = No
5,503,040 UART: [state] WD Timer not started. Device not locked for debugging
5,504,316 UART: [kat] SHA2-256
6,309,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,314,091 UART: [kat] ++
6,314,243 UART: [kat] sha1
6,318,457 UART: [kat] SHA2-256
6,320,397 UART: [kat] SHA2-384
6,323,226 UART: [kat] SHA2-512-ACC
6,325,126 UART: [kat] ECC-384
6,334,773 UART: [kat] HMAC-384Kdf
6,339,529 UART: [kat] LMS
6,587,857 UART: [kat] --
6,588,501 UART: [update-reset] ++
8,443,020 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,444,051 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,593,875 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,986 >>> mbox cmd response: success
3,172,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,235,013 UART:
3,235,029 UART: Running Caliptra FMC ...
3,235,437 UART:
3,235,580 UART: [state] CFI Enabled
3,246,554 UART: [fht] FMC Alias Private Key: 7
3,354,330 UART: [art] Extend RT PCRs Done
3,354,758 UART: [art] Lock RT PCRs Done
3,356,232 UART: [art] Populate DV Done
3,364,570 UART: [fht] FMC Alias Private Key: 7
3,365,686 UART: [art] Derive CDI
3,365,966 UART: [art] Store in in slot 0x4
3,451,697 UART: [art] Derive Key Pair
3,452,057 UART: [art] Store priv key in slot 0x5
3,465,051 UART: [art] Derive Key Pair - Done
3,479,805 UART: [art] Signing Cert with AUTHO
3,480,285 UART: RITY.KEYID = 7
3,495,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,714 UART: [art] PUB.X = AB3897D376E8C8527E134C3609C055C816E00ABBC9A3B9E918CEE403868BDD2D3887086DBD3A77CA5E860718B242D922
3,503,473 UART: [art] PUB.Y = 8C56179412B93ED0FECF2BE3AA67AAD6D9D7D5565B1209B946A67EA27CEA6D3730A691A2A9BAD33200E5F5282DF5A084
3,510,412 UART: [art] SIG.R = 1E38E9DF9C56A46D782FB5C6216E2950EB5F264A526FCBEBFA6C95BBECA66BEF486CD6CFBCCE79CB7A0ABCB4A0774FF9
3,517,215 UART: [art] SIG.S = 9D9084F3606A42FA7392367AE4402AC6BE4015F6FF4732612CA846D34AA2ACB3E7A118D93554DEDECACE9103F735E43A
3,541,161 UART: Caliptra RT
3,541,506 UART: [state] CFI Enabled
3,649,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,644,529 >>> mbox cmd response: failed
4,644,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,650,350 UART:
4,650,366 UART: Running Caliptra FMC ...
4,650,774 UART:
4,650,917 UART: [state] CFI Enabled
4,740,008 UART: [art] Extend RT PCRs Done
4,740,436 UART: [art] Lock RT PCRs Done
4,741,515 UART: [art] Populate DV Done
4,749,653 UART: [fht] FMC Alias Private Key: 7
4,750,657 UART: [art] Derive CDI
4,750,937 UART: [art] Store in in slot 0x4
4,836,766 UART: [art] Derive Key Pair
4,837,126 UART: [art] Store priv key in slot 0x5
4,850,194 UART: [art] Derive Key Pair - Done
4,864,772 UART: [art] Signing Cert with AUTHO
4,865,252 UART: RITY.KEYID = 7
4,880,704 UART: [art] Erasing AUTHORITY.KEYID = 7
4,881,469 UART: [art] PUB.X = AB3897D376E8C8527E134C3609C055C816E00ABBC9A3B9E918CEE403868BDD2D3887086DBD3A77CA5E860718B242D922
4,888,228 UART: [art] PUB.Y = 8C56179412B93ED0FECF2BE3AA67AAD6D9D7D5565B1209B946A67EA27CEA6D3730A691A2A9BAD33200E5F5282DF5A084
4,895,167 UART: [art] SIG.R = 1E38E9DF9C56A46D782FB5C6216E2950EB5F264A526FCBEBFA6C95BBECA66BEF486CD6CFBCCE79CB7A0ABCB4A0774FF9
4,901,970 UART: [art] SIG.S = 9D9084F3606A42FA7392367AE4402AC6BE4015F6FF4732612CA846D34AA2ACB3E7A118D93554DEDECACE9103F735E43A
4,925,636 UART: Caliptra RT
4,925,981 UART: [state] CFI Enabled
5,203,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,188,683 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,167 UART: [kat] SHA2-256
901,107 UART: [kat] SHA2-384
903,742 UART: [kat] SHA2-512-ACC
905,643 UART: [kat] ECC-384
915,208 UART: [kat] HMAC-384Kdf
919,626 UART: [kat] LMS
1,167,938 UART: [kat] --
1,168,641 UART: [cold-reset] ++
1,169,049 UART: [fht] FHT @ 0x50003400
1,171,769 UART: [idev] ++
1,171,937 UART: [idev] CDI.KEYID = 6
1,172,298 UART: [idev] SUBJECT.KEYID = 7
1,172,723 UART: [idev] UDS.KEYID = 0
1,173,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,913 UART: [idev] Erasing UDS.KEYID = 0
1,197,655 UART: [idev] Sha1 KeyId Algorithm
1,206,591 UART: [idev] --
1,207,606 UART: [ldev] ++
1,207,774 UART: [ldev] CDI.KEYID = 6
1,208,138 UART: [ldev] SUBJECT.KEYID = 5
1,208,565 UART: [ldev] AUTHORITY.KEYID = 7
1,209,028 UART: [ldev] FE.KEYID = 1
1,214,236 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,142 UART: [ldev] --
1,280,650 UART: [fwproc] Wait for Commands...
1,281,345 UART: [fwproc] Recv command 0x46574c44
1,282,078 UART: [fwproc] Recv'd Img size: 114332 bytes
3,133,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,326,434 >>> mbox cmd response: success
3,326,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,327,577 UART: [afmc] ++
3,327,745 UART: [afmc] CDI.KEYID = 6
3,328,108 UART: [afmc] SUBJECT.KEYID = 7
3,328,534 UART: [afmc] AUTHORITY.KEYID = 5
3,364,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,159 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,869 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,759 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,470 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,422 UART: [afmc] --
3,407,340 UART: [cold-reset] --
3,408,162 UART: [state] Locking Datavault
3,409,277 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,881 UART: [state] Locking ICCM
3,410,443 UART: [exit] Launching FMC @ 0x40000130
3,415,772 UART:
3,415,788 UART: Running Caliptra FMC ...
3,416,196 UART:
3,416,250 UART: [state] CFI Enabled
3,426,748 UART: [fht] FMC Alias Private Key: 7
3,534,492 UART: [art] Extend RT PCRs Done
3,534,920 UART: [art] Lock RT PCRs Done
3,536,668 UART: [art] Populate DV Done
3,544,954 UART: [fht] FMC Alias Private Key: 7
3,546,110 UART: [art] Derive CDI
3,546,390 UART: [art] Store in in slot 0x4
3,632,141 UART: [art] Derive Key Pair
3,632,501 UART: [art] Store priv key in slot 0x5
3,645,731 UART: [art] Derive Key Pair - Done
3,660,815 UART: [art] Signing Cert with AUTHO
3,661,295 UART: RITY.KEYID = 7
3,676,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,210 UART: [art] PUB.X = 90DDA8C601EDA4C24DB80D9DA8B32B3B7FE08E95ADE9EED896BC5FD9FCECE976197AFC0F91B9D0D8B5D8C74247236BEE
3,684,003 UART: [art] PUB.Y = 0B633672DBA7A553DCF0DF0CDE298D65EAA1370DDEA038994D3BDBF7173BCFDBA1DD0AE0CA86A4AD804EAA53D924BB50
3,690,973 UART: [art] SIG.R = DD432F9477CEA478DFDA1B3F2E7E4E4DA1A8DDB9E0D613F4E8597AA095DFFBBFC2E708C5C364703569CE8E9FF232633B
3,697,764 UART: [art] SIG.S = E41F2FD188D96325414023A26212891F66693F88629D768C51C351213E1C257DE7BCF98EC2E3255E2C829CA0AC4BC3B0
3,721,435 UART: Caliptra RT
3,721,688 UART: [state] CFI Enabled
3,829,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,497 UART:
3,831,513 UART: Running Caliptra ROM ...
3,831,921 UART:
3,831,976 UART: [state] CFI Enabled
3,834,404 UART: [state] LifecycleState = Unprovisioned
3,835,059 UART: [state] DebugLocked = No
3,835,673 UART: [state] WD Timer not started. Device not locked for debugging
3,836,925 UART: [kat] SHA2-256
4,640,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,644,604 UART: [kat] ++
4,644,756 UART: [kat] sha1
4,649,034 UART: [kat] SHA2-256
4,650,974 UART: [kat] SHA2-384
4,653,857 UART: [kat] SHA2-512-ACC
4,655,757 UART: [kat] ECC-384
4,665,578 UART: [kat] HMAC-384Kdf
4,670,138 UART: [kat] LMS
4,918,450 UART: [kat] --
4,919,326 UART: [update-reset] ++
4,937,420 >>> mbox cmd response: failed
4,937,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,937,980 UART: ROM Non-Fatal Error: 0x000B003D
4,938,864 UART: [state] Locking Datavault
4,939,536 UART: [state] Locking PCR0, PCR1 and PCR31
4,940,140 UART: [state] Locking ICCM
4,940,724 UART: [exit] Launching FMC @ 0x40000130
4,946,053 UART:
4,946,069 UART: Running Caliptra FMC ...
4,946,477 UART:
4,946,531 UART: [state] CFI Enabled
5,035,326 UART: [art] Extend RT PCRs Done
5,035,754 UART: [art] Lock RT PCRs Done
5,036,969 UART: [art] Populate DV Done
5,045,209 UART: [fht] FMC Alias Private Key: 7
5,046,211 UART: [art] Derive CDI
5,046,491 UART: [art] Store in in slot 0x4
5,131,988 UART: [art] Derive Key Pair
5,132,348 UART: [art] Store priv key in slot 0x5
5,145,260 UART: [art] Derive Key Pair - Done
5,160,148 UART: [art] Signing Cert with AUTHO
5,160,628 UART: RITY.KEYID = 7
5,175,986 UART: [art] Erasing AUTHORITY.KEYID = 7
5,176,751 UART: [art] PUB.X = 90DDA8C601EDA4C24DB80D9DA8B32B3B7FE08E95ADE9EED896BC5FD9FCECE976197AFC0F91B9D0D8B5D8C74247236BEE
5,183,544 UART: [art] PUB.Y = 0B633672DBA7A553DCF0DF0CDE298D65EAA1370DDEA038994D3BDBF7173BCFDBA1DD0AE0CA86A4AD804EAA53D924BB50
5,190,514 UART: [art] SIG.R = DD432F9477CEA478DFDA1B3F2E7E4E4DA1A8DDB9E0D613F4E8597AA095DFFBBFC2E708C5C364703569CE8E9FF232633B
5,197,305 UART: [art] SIG.S = E41F2FD188D96325414023A26212891F66693F88629D768C51C351213E1C257DE7BCF98EC2E3255E2C829CA0AC4BC3B0
5,221,170 UART: Caliptra RT
5,221,423 UART: [state] CFI Enabled
5,502,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,504,407 UART:
5,504,423 UART: Running Caliptra ROM ...
5,504,831 UART:
5,504,886 UART: [state] CFI Enabled
5,507,554 UART: [state] LifecycleState = Unprovisioned
5,508,209 UART: [state] DebugLocked = No
5,508,691 UART: [state] WD Timer not started. Device not locked for debugging
5,510,039 UART: [kat] SHA2-256
6,313,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,317,718 UART: [kat] ++
6,317,870 UART: [kat] sha1
6,322,056 UART: [kat] SHA2-256
6,323,996 UART: [kat] SHA2-384
6,326,809 UART: [kat] SHA2-512-ACC
6,328,709 UART: [kat] ECC-384
6,338,258 UART: [kat] HMAC-384Kdf
6,343,022 UART: [kat] LMS
6,591,334 UART: [kat] --
6,592,278 UART: [update-reset] ++
8,459,309 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,460,492 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,610,316 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,769 >>> mbox cmd response: success
3,175,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,237,600 UART:
3,237,616 UART: Running Caliptra FMC ...
3,238,024 UART:
3,238,078 UART: [state] CFI Enabled
3,248,508 UART: [fht] FMC Alias Private Key: 7
3,356,850 UART: [art] Extend RT PCRs Done
3,357,278 UART: [art] Lock RT PCRs Done
3,358,680 UART: [art] Populate DV Done
3,366,830 UART: [fht] FMC Alias Private Key: 7
3,367,906 UART: [art] Derive CDI
3,368,186 UART: [art] Store in in slot 0x4
3,453,873 UART: [art] Derive Key Pair
3,454,233 UART: [art] Store priv key in slot 0x5
3,467,619 UART: [art] Derive Key Pair - Done
3,482,815 UART: [art] Signing Cert with AUTHO
3,483,295 UART: RITY.KEYID = 7
3,498,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,140 UART: [art] PUB.X = D613AF30E6BA8D1786ACCDE5808A3E120E97A57294A152C3A5D1BF4563EEEE35F67CDA854085DB39513D7F3293D4C27B
3,505,919 UART: [art] PUB.Y = 7945C04C367DC13C9F3EAF5DD4C6774D4C63213F3F0DF7A2F348AA5E3EA0F79658F3670C39069E1FA5CF92CABCBCF173
3,512,878 UART: [art] SIG.R = 2FC59FB89A6845615E360FDD1C245A5841567322173FE9536D7C672983C2582A83248E418607C9959A77BA687260E97F
3,519,628 UART: [art] SIG.S = 2CA9EF60C2E24DF272F79BFFB8D298F51FA85428884DB3C14F6A3041A1A1A020851A4CDF7A1DE6E7E1774594541566D4
3,543,583 UART: Caliptra RT
3,543,836 UART: [state] CFI Enabled
3,651,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,874 >>> mbox cmd response: failed
4,641,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,647,625 UART:
4,647,641 UART: Running Caliptra FMC ...
4,648,049 UART:
4,648,103 UART: [state] CFI Enabled
4,737,392 UART: [art] Extend RT PCRs Done
4,737,820 UART: [art] Lock RT PCRs Done
4,739,271 UART: [art] Populate DV Done
4,747,457 UART: [fht] FMC Alias Private Key: 7
4,748,561 UART: [art] Derive CDI
4,748,841 UART: [art] Store in in slot 0x4
4,834,562 UART: [art] Derive Key Pair
4,834,922 UART: [art] Store priv key in slot 0x5
4,848,264 UART: [art] Derive Key Pair - Done
4,863,182 UART: [art] Signing Cert with AUTHO
4,863,662 UART: RITY.KEYID = 7
4,878,520 UART: [art] Erasing AUTHORITY.KEYID = 7
4,879,285 UART: [art] PUB.X = D613AF30E6BA8D1786ACCDE5808A3E120E97A57294A152C3A5D1BF4563EEEE35F67CDA854085DB39513D7F3293D4C27B
4,886,064 UART: [art] PUB.Y = 7945C04C367DC13C9F3EAF5DD4C6774D4C63213F3F0DF7A2F348AA5E3EA0F79658F3670C39069E1FA5CF92CABCBCF173
4,893,023 UART: [art] SIG.R = 2FC59FB89A6845615E360FDD1C245A5841567322173FE9536D7C672983C2582A83248E418607C9959A77BA687260E97F
4,899,773 UART: [art] SIG.S = 2CA9EF60C2E24DF272F79BFFB8D298F51FA85428884DB3C14F6A3041A1A1A020851A4CDF7A1DE6E7E1774594541566D4
4,923,526 UART: Caliptra RT
4,923,779 UART: [state] CFI Enabled
5,206,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,192,154 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,434 UART: [kat] SHA2-256
902,374 UART: [kat] SHA2-384
905,313 UART: [kat] SHA2-512-ACC
907,214 UART: [kat] ECC-384
916,833 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,063 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,301 >>> mbox cmd response: success
3,318,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,319,486 UART: [afmc] ++
3,319,654 UART: [afmc] CDI.KEYID = 6
3,320,017 UART: [afmc] SUBJECT.KEYID = 7
3,320,443 UART: [afmc] AUTHORITY.KEYID = 5
3,356,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,894 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,604 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,494 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,205 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,005 UART: [afmc] --
3,400,111 UART: [cold-reset] --
3,400,777 UART: [state] Locking Datavault
3,401,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,534 UART: [state] Locking ICCM
3,403,142 UART: [exit] Launching FMC @ 0x40000130
3,408,471 UART:
3,408,487 UART: Running Caliptra FMC ...
3,408,895 UART:
3,409,038 UART: [state] CFI Enabled
3,419,420 UART: [fht] FMC Alias Private Key: 7
3,528,016 UART: [art] Extend RT PCRs Done
3,528,444 UART: [art] Lock RT PCRs Done
3,529,990 UART: [art] Populate DV Done
3,538,102 UART: [fht] FMC Alias Private Key: 7
3,539,232 UART: [art] Derive CDI
3,539,512 UART: [art] Store in in slot 0x4
3,624,975 UART: [art] Derive Key Pair
3,625,335 UART: [art] Store priv key in slot 0x5
3,638,461 UART: [art] Derive Key Pair - Done
3,652,782 UART: [art] Signing Cert with AUTHO
3,653,262 UART: RITY.KEYID = 7
3,668,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,229 UART: [art] PUB.X = E2C95B915EAB5D21DA96600E2C629E69CA3FE5A6F523BC902477CE1189AF862AE377BD71418A0C8E85916F9423D7D8B2
3,676,001 UART: [art] PUB.Y = B81E95452C6B231F09C117EE791742D6688BB9806584B6EDCAF0AB42602934A7D4EA63F0376A533B67180AA6D3550A94
3,682,940 UART: [art] SIG.R = 37D86DB7926AD22A4905B59470AAA4EAF2E372A720450DF9C1B8899E371933425E7790A6521358F268090F27EAD7D71D
3,689,694 UART: [art] SIG.S = 94C8981B9FEE4FAF03AF6907093E8E3531CE24564D8F1694E207087980533C5C0D8FFDEFF74DF962572A7DC45EC45F3D
3,713,567 UART: Caliptra RT
3,713,912 UART: [state] CFI Enabled
3,821,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,440 UART:
3,823,456 UART: Running Caliptra ROM ...
3,823,864 UART:
3,824,006 UART: [state] CFI Enabled
3,826,918 UART: [state] LifecycleState = Unprovisioned
3,827,573 UART: [state] DebugLocked = No
3,828,207 UART: [state] WD Timer not started. Device not locked for debugging
3,829,507 UART: [kat] SHA2-256
4,633,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,637,186 UART: [kat] ++
4,637,338 UART: [kat] sha1
4,641,532 UART: [kat] SHA2-256
4,643,472 UART: [kat] SHA2-384
4,646,185 UART: [kat] SHA2-512-ACC
4,648,085 UART: [kat] ECC-384
4,657,826 UART: [kat] HMAC-384Kdf
4,662,444 UART: [kat] LMS
4,910,756 UART: [kat] --
4,911,616 UART: [update-reset] ++
4,929,542 >>> mbox cmd response: failed
4,929,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,930,092 UART: ROM Non-Fatal Error: 0x000B003D
4,930,908 UART: [state] Locking Datavault
4,931,754 UART: [state] Locking PCR0, PCR1 and PCR31
4,932,358 UART: [state] Locking ICCM
4,933,016 UART: [exit] Launching FMC @ 0x40000130
4,938,345 UART:
4,938,361 UART: Running Caliptra FMC ...
4,938,769 UART:
4,938,912 UART: [state] CFI Enabled
5,028,061 UART: [art] Extend RT PCRs Done
5,028,489 UART: [art] Lock RT PCRs Done
5,029,820 UART: [art] Populate DV Done
5,038,126 UART: [fht] FMC Alias Private Key: 7
5,039,234 UART: [art] Derive CDI
5,039,514 UART: [art] Store in in slot 0x4
5,124,489 UART: [art] Derive Key Pair
5,124,849 UART: [art] Store priv key in slot 0x5
5,138,249 UART: [art] Derive Key Pair - Done
5,152,902 UART: [art] Signing Cert with AUTHO
5,153,382 UART: RITY.KEYID = 7
5,168,466 UART: [art] Erasing AUTHORITY.KEYID = 7
5,169,231 UART: [art] PUB.X = E2C95B915EAB5D21DA96600E2C629E69CA3FE5A6F523BC902477CE1189AF862AE377BD71418A0C8E85916F9423D7D8B2
5,176,003 UART: [art] PUB.Y = B81E95452C6B231F09C117EE791742D6688BB9806584B6EDCAF0AB42602934A7D4EA63F0376A533B67180AA6D3550A94
5,182,942 UART: [art] SIG.R = 37D86DB7926AD22A4905B59470AAA4EAF2E372A720450DF9C1B8899E371933425E7790A6521358F268090F27EAD7D71D
5,189,696 UART: [art] SIG.S = 94C8981B9FEE4FAF03AF6907093E8E3531CE24564D8F1694E207087980533C5C0D8FFDEFF74DF962572A7DC45EC45F3D
5,213,223 UART: Caliptra RT
5,213,568 UART: [state] CFI Enabled
5,496,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,459 UART:
5,498,475 UART: Running Caliptra ROM ...
5,498,883 UART:
5,499,025 UART: [state] CFI Enabled
5,501,415 UART: [state] LifecycleState = Unprovisioned
5,502,070 UART: [state] DebugLocked = No
5,502,640 UART: [state] WD Timer not started. Device not locked for debugging
5,503,964 UART: [kat] SHA2-256
6,307,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,311,643 UART: [kat] ++
6,311,795 UART: [kat] sha1
6,316,147 UART: [kat] SHA2-256
6,318,087 UART: [kat] SHA2-384
6,320,846 UART: [kat] SHA2-512-ACC
6,322,746 UART: [kat] ECC-384
6,332,597 UART: [kat] HMAC-384Kdf
6,337,265 UART: [kat] LMS
6,585,577 UART: [kat] --
6,586,319 UART: [update-reset] ++
8,443,084 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,444,275 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,594,099 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,160,901 >>> mbox cmd response: success
3,160,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,223,218 UART:
3,223,234 UART: Running Caliptra FMC ...
3,223,642 UART:
3,223,785 UART: [state] CFI Enabled
3,234,673 UART: [fht] FMC Alias Private Key: 7
3,342,605 UART: [art] Extend RT PCRs Done
3,343,033 UART: [art] Lock RT PCRs Done
3,344,529 UART: [art] Populate DV Done
3,352,691 UART: [fht] FMC Alias Private Key: 7
3,353,731 UART: [art] Derive CDI
3,354,011 UART: [art] Store in in slot 0x4
3,439,876 UART: [art] Derive Key Pair
3,440,236 UART: [art] Store priv key in slot 0x5
3,452,958 UART: [art] Derive Key Pair - Done
3,467,457 UART: [art] Signing Cert with AUTHO
3,467,937 UART: RITY.KEYID = 7
3,483,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,828 UART: [art] PUB.X = 4083DFA88FAEFDFA8F127ABB8C8D9A82AAA5EC7EC063F1D2ECD2AE2538119DC08479B30F0A5520B05781A6A1BEC9B0AA
3,490,620 UART: [art] PUB.Y = 01AED324BE92B9B84A70E15EC0BCB44009232A2F6A0AF68B22DF031654DE7C727422CDB45F86075EB50039E4CA32DBF0
3,497,545 UART: [art] SIG.R = C667D93C169DD32CCF17623CE45AF9956B22B7EFEC16DF12074C72240A5E86FC2BC478A5B18AC5A342C87847606B0EB3
3,504,316 UART: [art] SIG.S = 6F80E9FFE721881122BA39165055E569DD5E6E63F81BC74044B750DDAABFE1BEEDA991E5CB88D814E58EBB6FEBB9C5A1
3,527,725 UART: Caliptra RT
3,528,070 UART: [state] CFI Enabled
3,634,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,626,574 >>> mbox cmd response: failed
4,626,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,632,223 UART:
4,632,239 UART: Running Caliptra FMC ...
4,632,647 UART:
4,632,790 UART: [state] CFI Enabled
4,721,829 UART: [art] Extend RT PCRs Done
4,722,257 UART: [art] Lock RT PCRs Done
4,723,136 UART: [art] Populate DV Done
4,731,310 UART: [fht] FMC Alias Private Key: 7
4,732,396 UART: [art] Derive CDI
4,732,676 UART: [art] Store in in slot 0x4
4,818,403 UART: [art] Derive Key Pair
4,818,763 UART: [art] Store priv key in slot 0x5
4,831,931 UART: [art] Derive Key Pair - Done
4,846,554 UART: [art] Signing Cert with AUTHO
4,847,034 UART: RITY.KEYID = 7
4,862,306 UART: [art] Erasing AUTHORITY.KEYID = 7
4,863,071 UART: [art] PUB.X = 4083DFA88FAEFDFA8F127ABB8C8D9A82AAA5EC7EC063F1D2ECD2AE2538119DC08479B30F0A5520B05781A6A1BEC9B0AA
4,869,863 UART: [art] PUB.Y = 01AED324BE92B9B84A70E15EC0BCB44009232A2F6A0AF68B22DF031654DE7C727422CDB45F86075EB50039E4CA32DBF0
4,876,788 UART: [art] SIG.R = C667D93C169DD32CCF17623CE45AF9956B22B7EFEC16DF12074C72240A5E86FC2BC478A5B18AC5A342C87847606B0EB3
4,883,559 UART: [art] SIG.S = 6F80E9FFE721881122BA39165055E569DD5E6E63F81BC74044B750DDAABFE1BEEDA991E5CB88D814E58EBB6FEBB9C5A1
4,907,032 UART: Caliptra RT
4,907,377 UART: [state] CFI Enabled
5,186,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,159,057 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,385 UART: [kat] SHA2-256
882,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,431 UART: [kat] ++
886,583 UART: [kat] sha1
890,985 UART: [kat] SHA2-256
892,923 UART: [kat] SHA2-384
895,776 UART: [kat] SHA2-512-ACC
897,677 UART: [kat] ECC-384
903,126 UART: [kat] HMAC-384Kdf
907,764 UART: [kat] LMS
1,475,960 UART: [kat] --
1,476,753 UART: [cold-reset] ++
1,477,307 UART: [fht] Storing FHT @ 0x50003400
1,480,040 UART: [idev] ++
1,480,208 UART: [idev] CDI.KEYID = 6
1,480,568 UART: [idev] SUBJECT.KEYID = 7
1,480,992 UART: [idev] UDS.KEYID = 0
1,481,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,936 UART: [idev] Erasing UDS.KEYID = 0
1,505,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,304 UART: [idev] --
1,515,279 UART: [ldev] ++
1,515,447 UART: [ldev] CDI.KEYID = 6
1,515,810 UART: [ldev] SUBJECT.KEYID = 5
1,516,236 UART: [ldev] AUTHORITY.KEYID = 7
1,516,699 UART: [ldev] FE.KEYID = 1
1,521,845 UART: [ldev] Erasing FE.KEYID = 1
1,547,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,230 UART: [ldev] --
1,586,727 UART: [fwproc] Waiting for Commands...
1,587,584 UART: [fwproc] Received command 0x46574c44
1,588,375 UART: [fwproc] Received Image of size 114332 bytes
1,627,272 UART: ROM Fatal Error: 0x000B000D
1,628,431 >>> mbox cmd response: failed
1,628,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,437 >>> mbox cmd response: failed
1,628,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
895,058 UART: [kat] SHA2-512-ACC
896,959 UART: [kat] ECC-384
902,104 UART: [kat] HMAC-384Kdf
906,774 UART: [kat] LMS
1,474,970 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,225 UART: [fht] Storing FHT @ 0x50003400
1,479,018 UART: [idev] ++
1,479,186 UART: [idev] CDI.KEYID = 6
1,479,546 UART: [idev] SUBJECT.KEYID = 7
1,479,970 UART: [idev] UDS.KEYID = 0
1,480,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,044 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,855 UART: [ldev] Erasing FE.KEYID = 1
1,545,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,842 UART: [ldev] --
1,585,119 UART: [fwproc] Waiting for Commands...
1,585,924 UART: [fwproc] Received command 0x46574c44
1,586,715 UART: [fwproc] Received Image of size 114332 bytes
2,883,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,639 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,479,466 >>> mbox cmd response: failed
1,479,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,472 >>> mbox cmd response: failed
1,479,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,569 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,758 UART: [kat] SHA2-256
892,696 UART: [kat] SHA2-384
895,531 UART: [kat] SHA2-512-ACC
897,432 UART: [kat] ECC-384
903,191 UART: [kat] HMAC-384Kdf
907,997 UART: [kat] LMS
1,476,193 UART: [kat] --
1,477,044 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,185 UART: [idev] --
1,516,318 UART: [ldev] ++
1,516,486 UART: [ldev] CDI.KEYID = 6
1,516,849 UART: [ldev] SUBJECT.KEYID = 5
1,517,275 UART: [ldev] AUTHORITY.KEYID = 7
1,517,738 UART: [ldev] FE.KEYID = 1
1,523,190 UART: [ldev] Erasing FE.KEYID = 1
1,549,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,325 UART: [ldev] --
1,588,740 UART: [fwproc] Waiting for Commands...
1,589,417 UART: [fwproc] Received command 0x46574c44
1,590,208 UART: [fwproc] Received Image of size 114332 bytes
1,628,727 UART: ROM Fatal Error: 0x000B000D
1,629,886 >>> mbox cmd response: failed
1,629,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,892 >>> mbox cmd response: failed
1,629,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,918 UART: [kat] SHA2-256
892,856 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
902,727 UART: [kat] HMAC-384Kdf
907,165 UART: [kat] LMS
1,475,361 UART: [kat] --
1,476,124 UART: [cold-reset] ++
1,476,536 UART: [fht] Storing FHT @ 0x50003400
1,479,307 UART: [idev] ++
1,479,475 UART: [idev] CDI.KEYID = 6
1,479,835 UART: [idev] SUBJECT.KEYID = 7
1,480,259 UART: [idev] UDS.KEYID = 0
1,480,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,247 UART: [idev] Erasing UDS.KEYID = 0
1,505,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,773 UART: [idev] --
1,514,960 UART: [ldev] ++
1,515,128 UART: [ldev] CDI.KEYID = 6
1,515,491 UART: [ldev] SUBJECT.KEYID = 5
1,515,917 UART: [ldev] AUTHORITY.KEYID = 7
1,516,380 UART: [ldev] FE.KEYID = 1
1,521,912 UART: [ldev] Erasing FE.KEYID = 1
1,547,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,427 UART: [ldev] --
1,586,742 UART: [fwproc] Waiting for Commands...
1,587,381 UART: [fwproc] Received command 0x46574c44
1,588,172 UART: [fwproc] Received Image of size 114332 bytes
2,885,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,974 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,480,411 >>> mbox cmd response: failed
1,480,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,417 >>> mbox cmd response: failed
1,480,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,344 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,884 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,836 UART: [kat] SHA2-512-ACC
908,737 UART: [kat] ECC-384
918,642 UART: [kat] HMAC-384Kdf
923,288 UART: [kat] LMS
1,171,616 UART: [kat] --
1,172,375 UART: [cold-reset] ++
1,172,903 UART: [fht] FHT @ 0x50003400
1,175,700 UART: [idev] ++
1,175,868 UART: [idev] CDI.KEYID = 6
1,176,228 UART: [idev] SUBJECT.KEYID = 7
1,176,652 UART: [idev] UDS.KEYID = 0
1,176,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,772 UART: [idev] Erasing UDS.KEYID = 0
1,201,809 UART: [idev] Sha1 KeyId Algorithm
1,210,389 UART: [idev] --
1,211,481 UART: [ldev] ++
1,211,649 UART: [ldev] CDI.KEYID = 6
1,212,012 UART: [ldev] SUBJECT.KEYID = 5
1,212,438 UART: [ldev] AUTHORITY.KEYID = 7
1,212,901 UART: [ldev] FE.KEYID = 1
1,218,369 UART: [ldev] Erasing FE.KEYID = 1
1,244,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,581 UART: [ldev] --
1,284,024 UART: [fwproc] Wait for Commands...
1,284,664 UART: [fwproc] Recv command 0x46574c44
1,285,392 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,771 UART: ROM Fatal Error: 0x000B000D
1,324,930 >>> mbox cmd response: failed
1,324,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,936 >>> mbox cmd response: failed
1,324,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
923,052 UART: [kat] LMS
1,171,380 UART: [kat] --
1,172,441 UART: [cold-reset] ++
1,172,979 UART: [fht] FHT @ 0x50003400
1,175,656 UART: [idev] ++
1,175,824 UART: [idev] CDI.KEYID = 6
1,176,184 UART: [idev] SUBJECT.KEYID = 7
1,176,608 UART: [idev] UDS.KEYID = 0
1,176,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,258 UART: [idev] Erasing UDS.KEYID = 0
1,201,805 UART: [idev] Sha1 KeyId Algorithm
1,210,119 UART: [idev] --
1,211,001 UART: [ldev] ++
1,211,169 UART: [ldev] CDI.KEYID = 6
1,211,532 UART: [ldev] SUBJECT.KEYID = 5
1,211,958 UART: [ldev] AUTHORITY.KEYID = 7
1,212,421 UART: [ldev] FE.KEYID = 1
1,217,633 UART: [ldev] Erasing FE.KEYID = 1
1,243,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,823 UART: [ldev] --
1,283,270 UART: [fwproc] Wait for Commands...
1,283,842 UART: [fwproc] Recv command 0x46574c44
1,284,570 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,948 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,963 >>> mbox cmd response: failed
1,176,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,969 >>> mbox cmd response: failed
1,176,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,768 UART: [kat] SHA2-256
903,708 UART: [kat] SHA2-384
906,217 UART: [kat] SHA2-512-ACC
908,118 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,579 UART: [kat] LMS
1,170,907 UART: [kat] --
1,171,758 UART: [cold-reset] ++
1,172,212 UART: [fht] FHT @ 0x50003400
1,174,899 UART: [idev] ++
1,175,067 UART: [idev] CDI.KEYID = 6
1,175,427 UART: [idev] SUBJECT.KEYID = 7
1,175,851 UART: [idev] UDS.KEYID = 0
1,176,196 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,899 UART: [idev] Erasing UDS.KEYID = 0
1,201,080 UART: [idev] Sha1 KeyId Algorithm
1,209,508 UART: [idev] --
1,210,576 UART: [ldev] ++
1,210,744 UART: [ldev] CDI.KEYID = 6
1,211,107 UART: [ldev] SUBJECT.KEYID = 5
1,211,533 UART: [ldev] AUTHORITY.KEYID = 7
1,211,996 UART: [ldev] FE.KEYID = 1
1,217,336 UART: [ldev] Erasing FE.KEYID = 1
1,243,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,824 UART: [ldev] --
1,283,099 UART: [fwproc] Wait for Commands...
1,283,781 UART: [fwproc] Recv command 0x46574c44
1,284,509 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,944 UART: ROM Fatal Error: 0x000B000D
1,324,103 >>> mbox cmd response: failed
1,324,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,109 >>> mbox cmd response: failed
1,324,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,874 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,493 UART: [idev] Erasing UDS.KEYID = 0
1,201,454 UART: [idev] Sha1 KeyId Algorithm
1,209,926 UART: [idev] --
1,210,920 UART: [ldev] ++
1,211,088 UART: [ldev] CDI.KEYID = 6
1,211,451 UART: [ldev] SUBJECT.KEYID = 5
1,211,877 UART: [ldev] AUTHORITY.KEYID = 7
1,212,340 UART: [ldev] FE.KEYID = 1
1,217,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,484 UART: [ldev] --
1,283,935 UART: [fwproc] Wait for Commands...
1,284,683 UART: [fwproc] Recv command 0x46574c44
1,285,411 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,865 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,578 >>> mbox cmd response: failed
1,178,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,584 >>> mbox cmd response: failed
1,178,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,176 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,997 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,176 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,229 UART: [fwproc] Recv command 0x46574c44
1,282,962 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,495 UART: ROM Fatal Error: 0x000B000D
1,322,654 >>> mbox cmd response: failed
1,322,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,660 >>> mbox cmd response: failed
1,322,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,174,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,199,219 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,988 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,257 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,507 >>> mbox cmd response: failed
1,175,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,513 >>> mbox cmd response: failed
1,175,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,992 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,553 UART: [kat] LMS
1,168,865 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,259 UART: [ldev] ++
1,209,427 UART: [ldev] CDI.KEYID = 6
1,209,791 UART: [ldev] SUBJECT.KEYID = 5
1,210,218 UART: [ldev] AUTHORITY.KEYID = 7
1,210,681 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,285 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,671 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,642 UART: ROM Fatal Error: 0x000B000D
1,322,801 >>> mbox cmd response: failed
1,322,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,807 >>> mbox cmd response: failed
1,322,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,174,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,132 UART: [idev] --
1,208,975 UART: [ldev] ++
1,209,143 UART: [ldev] CDI.KEYID = 6
1,209,507 UART: [ldev] SUBJECT.KEYID = 5
1,209,934 UART: [ldev] AUTHORITY.KEYID = 7
1,210,397 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,241,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,001 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,304 UART: [fwproc] Recv command 0x46574c44
1,283,037 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,157 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,902 >>> mbox cmd response: failed
1,174,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,908 >>> mbox cmd response: failed
1,174,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,559 UART: [kat] SHA2-256
892,497 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,942 UART: [kat] HMAC-384Kdf
907,688 UART: [kat] LMS
1,475,884 UART: [kat] --
1,476,685 UART: [cold-reset] ++
1,477,259 UART: [fht] Storing FHT @ 0x50003400
1,480,040 UART: [idev] ++
1,480,208 UART: [idev] CDI.KEYID = 6
1,480,568 UART: [idev] SUBJECT.KEYID = 7
1,480,992 UART: [idev] UDS.KEYID = 0
1,481,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,492 UART: [idev] Erasing UDS.KEYID = 0
1,505,988 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,488 UART: [idev] --
1,515,461 UART: [ldev] ++
1,515,629 UART: [ldev] CDI.KEYID = 6
1,515,992 UART: [ldev] SUBJECT.KEYID = 5
1,516,418 UART: [ldev] AUTHORITY.KEYID = 7
1,516,881 UART: [ldev] FE.KEYID = 1
1,522,045 UART: [ldev] Erasing FE.KEYID = 1
1,546,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,546 UART: [ldev] --
1,586,035 UART: [fwproc] Waiting for Commands...
1,586,882 UART: [fwproc] Received command 0x46574c44
1,587,673 UART: [fwproc] Received Image of size 114332 bytes
1,612,216 UART: ROM Fatal Error: 0x000B0008
1,613,373 >>> mbox cmd response: failed
1,613,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,379 >>> mbox cmd response: failed
1,613,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,784 UART: [state] LifecycleState = Unprovisioned
85,439 UART: [state] DebugLocked = No
86,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,646 UART: [kat] SHA2-512-ACC
896,547 UART: [kat] ECC-384
902,164 UART: [kat] HMAC-384Kdf
906,656 UART: [kat] LMS
1,474,852 UART: [kat] --
1,475,607 UART: [cold-reset] ++
1,476,019 UART: [fht] Storing FHT @ 0x50003400
1,478,750 UART: [idev] ++
1,478,918 UART: [idev] CDI.KEYID = 6
1,479,278 UART: [idev] SUBJECT.KEYID = 7
1,479,702 UART: [idev] UDS.KEYID = 0
1,480,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,504,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,356 UART: [idev] --
1,514,449 UART: [ldev] ++
1,514,617 UART: [ldev] CDI.KEYID = 6
1,514,980 UART: [ldev] SUBJECT.KEYID = 5
1,515,406 UART: [ldev] AUTHORITY.KEYID = 7
1,515,869 UART: [ldev] FE.KEYID = 1
1,521,005 UART: [ldev] Erasing FE.KEYID = 1
1,546,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,782 UART: [ldev] --
1,586,231 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 114332 bytes
2,884,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,338 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,491 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,376 >>> mbox cmd response: failed
1,465,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,382 >>> mbox cmd response: failed
1,465,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,477 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,972 UART: [kat] SHA2-256
882,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,018 UART: [kat] ++
887,170 UART: [kat] sha1
891,436 UART: [kat] SHA2-256
893,374 UART: [kat] SHA2-384
896,015 UART: [kat] SHA2-512-ACC
897,916 UART: [kat] ECC-384
903,639 UART: [kat] HMAC-384Kdf
908,385 UART: [kat] LMS
1,476,581 UART: [kat] --
1,477,500 UART: [cold-reset] ++
1,477,908 UART: [fht] Storing FHT @ 0x50003400
1,480,587 UART: [idev] ++
1,480,755 UART: [idev] CDI.KEYID = 6
1,481,115 UART: [idev] SUBJECT.KEYID = 7
1,481,539 UART: [idev] UDS.KEYID = 0
1,481,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,427 UART: [idev] Erasing UDS.KEYID = 0
1,505,951 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,739 UART: [idev] --
1,515,698 UART: [ldev] ++
1,515,866 UART: [ldev] CDI.KEYID = 6
1,516,229 UART: [ldev] SUBJECT.KEYID = 5
1,516,655 UART: [ldev] AUTHORITY.KEYID = 7
1,517,118 UART: [ldev] FE.KEYID = 1
1,522,218 UART: [ldev] Erasing FE.KEYID = 1
1,547,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,157 UART: [ldev] --
1,586,430 UART: [fwproc] Waiting for Commands...
1,587,051 UART: [fwproc] Received command 0x46574c44
1,587,842 UART: [fwproc] Received Image of size 114332 bytes
1,613,211 UART: ROM Fatal Error: 0x000B0008
1,614,368 >>> mbox cmd response: failed
1,614,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,374 >>> mbox cmd response: failed
1,614,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,802 UART: [kat] SHA2-256
881,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,848 UART: [kat] ++
886,000 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,765 UART: [kat] HMAC-384Kdf
907,525 UART: [kat] LMS
1,475,721 UART: [kat] --
1,476,808 UART: [cold-reset] ++
1,477,370 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,263 UART: [idev] Erasing UDS.KEYID = 0
1,505,549 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,168 UART: [ldev] ++
1,515,336 UART: [ldev] CDI.KEYID = 6
1,515,699 UART: [ldev] SUBJECT.KEYID = 5
1,516,125 UART: [ldev] AUTHORITY.KEYID = 7
1,516,588 UART: [ldev] FE.KEYID = 1
1,521,698 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,003 UART: [ldev] --
1,586,368 UART: [fwproc] Waiting for Commands...
1,587,003 UART: [fwproc] Received command 0x46574c44
1,587,794 UART: [fwproc] Received Image of size 114332 bytes
2,885,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,039 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,391 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,338 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,180 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,467,699 >>> mbox cmd response: failed
1,467,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,705 >>> mbox cmd response: failed
1,467,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
918,574 UART: [kat] HMAC-384Kdf
923,126 UART: [kat] LMS
1,171,454 UART: [kat] --
1,172,141 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,388 UART: [idev] ++
1,175,556 UART: [idev] CDI.KEYID = 6
1,175,916 UART: [idev] SUBJECT.KEYID = 7
1,176,340 UART: [idev] UDS.KEYID = 0
1,176,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,318 UART: [idev] Erasing UDS.KEYID = 0
1,201,365 UART: [idev] Sha1 KeyId Algorithm
1,209,927 UART: [idev] --
1,210,957 UART: [ldev] ++
1,211,125 UART: [ldev] CDI.KEYID = 6
1,211,488 UART: [ldev] SUBJECT.KEYID = 5
1,211,914 UART: [ldev] AUTHORITY.KEYID = 7
1,212,377 UART: [ldev] FE.KEYID = 1
1,217,683 UART: [ldev] Erasing FE.KEYID = 1
1,243,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,821 UART: [ldev] --
1,283,252 UART: [fwproc] Wait for Commands...
1,283,888 UART: [fwproc] Recv command 0x46574c44
1,284,616 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,399 UART: ROM Fatal Error: 0x000B0008
1,310,556 >>> mbox cmd response: failed
1,310,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,562 >>> mbox cmd response: failed
1,310,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,663 UART: [cold-reset] ++
1,172,147 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,836 UART: [idev] Erasing UDS.KEYID = 0
1,201,067 UART: [idev] Sha1 KeyId Algorithm
1,209,483 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,800 UART: [fwproc] Recv command 0x46574c44
1,284,528 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,660 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,877 >>> mbox cmd response: failed
1,164,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,883 >>> mbox cmd response: failed
1,164,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,063 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
893,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,566 UART: [kat] ++
897,718 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,621 UART: [kat] HMAC-384Kdf
923,313 UART: [kat] LMS
1,171,641 UART: [kat] --
1,172,764 UART: [cold-reset] ++
1,173,108 UART: [fht] FHT @ 0x50003400
1,175,785 UART: [idev] ++
1,175,953 UART: [idev] CDI.KEYID = 6
1,176,313 UART: [idev] SUBJECT.KEYID = 7
1,176,737 UART: [idev] UDS.KEYID = 0
1,177,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,293 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,530 UART: [idev] --
1,211,544 UART: [ldev] ++
1,211,712 UART: [ldev] CDI.KEYID = 6
1,212,075 UART: [ldev] SUBJECT.KEYID = 5
1,212,501 UART: [ldev] AUTHORITY.KEYID = 7
1,212,964 UART: [ldev] FE.KEYID = 1
1,218,338 UART: [ldev] Erasing FE.KEYID = 1
1,244,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,916 UART: [ldev] --
1,284,391 UART: [fwproc] Wait for Commands...
1,285,151 UART: [fwproc] Recv command 0x46574c44
1,285,879 UART: [fwproc] Recv'd Img size: 114332 bytes
1,311,034 UART: ROM Fatal Error: 0x000B0008
1,312,191 >>> mbox cmd response: failed
1,312,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,197 >>> mbox cmd response: failed
1,312,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,182 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
893,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,108 UART: [kat] ++
898,260 UART: [kat] sha1
902,544 UART: [kat] SHA2-256
904,484 UART: [kat] SHA2-384
907,277 UART: [kat] SHA2-512-ACC
909,178 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,839 UART: [idev] ++
1,176,007 UART: [idev] CDI.KEYID = 6
1,176,367 UART: [idev] SUBJECT.KEYID = 7
1,176,791 UART: [idev] UDS.KEYID = 0
1,177,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,210,988 UART: [ldev] ++
1,211,156 UART: [ldev] CDI.KEYID = 6
1,211,519 UART: [ldev] SUBJECT.KEYID = 5
1,211,945 UART: [ldev] AUTHORITY.KEYID = 7
1,212,408 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,243,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,908 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,701 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,361 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,344 >>> mbox cmd response: failed
1,166,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,350 >>> mbox cmd response: failed
1,166,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,240,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,892 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,334 UART: ROM Fatal Error: 0x000B0008
1,307,491 >>> mbox cmd response: failed
1,307,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,497 >>> mbox cmd response: failed
1,307,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,242,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,866 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,518 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,170 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,600 >>> mbox cmd response: failed
1,159,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,606 >>> mbox cmd response: failed
1,159,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,422 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,174,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,064 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,093 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,993 UART: ROM Fatal Error: 0x000B0008
1,309,150 >>> mbox cmd response: failed
1,309,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,156 >>> mbox cmd response: failed
1,309,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,686 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,208,214 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,357 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,375 >>> mbox cmd response: failed
1,162,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,381 >>> mbox cmd response: failed
1,162,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,429 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,326 UART: [idev] ++
1,479,494 UART: [idev] CDI.KEYID = 6
1,479,854 UART: [idev] SUBJECT.KEYID = 7
1,480,278 UART: [idev] UDS.KEYID = 0
1,480,623 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,850 UART: [idev] Erasing UDS.KEYID = 0
1,504,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,722 UART: [idev] --
1,513,793 UART: [ldev] ++
1,513,961 UART: [ldev] CDI.KEYID = 6
1,514,324 UART: [ldev] SUBJECT.KEYID = 5
1,514,750 UART: [ldev] AUTHORITY.KEYID = 7
1,515,213 UART: [ldev] FE.KEYID = 1
1,520,199 UART: [ldev] Erasing FE.KEYID = 1
1,546,212 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,044 UART: [ldev] --
1,585,473 UART: [fwproc] Waiting for Commands...
1,586,242 UART: [fwproc] Received command 0x46574c44
1,587,033 UART: [fwproc] Received Image of size 114332 bytes
1,611,919 UART: ROM Fatal Error: 0x000B0009
1,613,076 >>> mbox cmd response: failed
1,613,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,082 >>> mbox cmd response: failed
1,613,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,423 UART: [kat] SHA2-256
882,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,469 UART: [kat] ++
886,621 UART: [kat] sha1
890,735 UART: [kat] SHA2-256
892,673 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
903,200 UART: [kat] HMAC-384Kdf
907,874 UART: [kat] LMS
1,476,070 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,477,065 UART: [fht] Storing FHT @ 0x50003400
1,479,858 UART: [idev] ++
1,480,026 UART: [idev] CDI.KEYID = 6
1,480,386 UART: [idev] SUBJECT.KEYID = 7
1,480,810 UART: [idev] UDS.KEYID = 0
1,481,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,712 UART: [idev] Erasing UDS.KEYID = 0
1,505,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,646 UART: [idev] --
1,514,737 UART: [ldev] ++
1,514,905 UART: [ldev] CDI.KEYID = 6
1,515,268 UART: [ldev] SUBJECT.KEYID = 5
1,515,694 UART: [ldev] AUTHORITY.KEYID = 7
1,516,157 UART: [ldev] FE.KEYID = 1
1,521,087 UART: [ldev] Erasing FE.KEYID = 1
1,546,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,994 UART: [ldev] --
1,585,443 UART: [fwproc] Waiting for Commands...
1,586,124 UART: [fwproc] Received command 0x46574c44
1,586,915 UART: [fwproc] Received Image of size 114332 bytes
2,884,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,841 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,887 >>> mbox cmd response: failed
1,465,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,893 >>> mbox cmd response: failed
1,465,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,923 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,807 UART: [kat] SHA2-512-ACC
897,708 UART: [kat] ECC-384
903,357 UART: [kat] HMAC-384Kdf
907,967 UART: [kat] LMS
1,476,163 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,400 UART: [fht] Storing FHT @ 0x50003400
1,480,409 UART: [idev] ++
1,480,577 UART: [idev] CDI.KEYID = 6
1,480,937 UART: [idev] SUBJECT.KEYID = 7
1,481,361 UART: [idev] UDS.KEYID = 0
1,481,706 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,167 UART: [idev] Erasing UDS.KEYID = 0
1,506,275 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,843 UART: [idev] --
1,515,948 UART: [ldev] ++
1,516,116 UART: [ldev] CDI.KEYID = 6
1,516,479 UART: [ldev] SUBJECT.KEYID = 5
1,516,905 UART: [ldev] AUTHORITY.KEYID = 7
1,517,368 UART: [ldev] FE.KEYID = 1
1,522,420 UART: [ldev] Erasing FE.KEYID = 1
1,547,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,267 UART: [ldev] --
1,586,630 UART: [fwproc] Waiting for Commands...
1,587,431 UART: [fwproc] Received command 0x46574c44
1,588,222 UART: [fwproc] Received Image of size 114332 bytes
1,612,810 UART: ROM Fatal Error: 0x000B0009
1,613,967 >>> mbox cmd response: failed
1,613,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,973 >>> mbox cmd response: failed
1,613,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,303 UART: [kat] SHA2-512-ACC
897,204 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,704 UART: [fht] Storing FHT @ 0x50003400
1,479,461 UART: [idev] ++
1,479,629 UART: [idev] CDI.KEYID = 6
1,479,989 UART: [idev] SUBJECT.KEYID = 7
1,480,413 UART: [idev] UDS.KEYID = 0
1,480,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,574 UART: [ldev] ++
1,515,742 UART: [ldev] CDI.KEYID = 6
1,516,105 UART: [ldev] SUBJECT.KEYID = 5
1,516,531 UART: [ldev] AUTHORITY.KEYID = 7
1,516,994 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,547,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,337 UART: [fwproc] Received command 0x46574c44
1,588,128 UART: [fwproc] Received Image of size 114332 bytes
2,886,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,488 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,467,634 >>> mbox cmd response: failed
1,467,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,640 >>> mbox cmd response: failed
1,467,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,266 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
893,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,791 UART: [kat] ++
897,943 UART: [kat] sha1
902,129 UART: [kat] SHA2-256
904,069 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
923,016 UART: [kat] LMS
1,171,344 UART: [kat] --
1,172,369 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,238 UART: [idev] ++
1,175,406 UART: [idev] CDI.KEYID = 6
1,175,766 UART: [idev] SUBJECT.KEYID = 7
1,176,190 UART: [idev] UDS.KEYID = 0
1,176,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,443 UART: [idev] Sha1 KeyId Algorithm
1,209,975 UART: [idev] --
1,210,929 UART: [ldev] ++
1,211,097 UART: [ldev] CDI.KEYID = 6
1,211,460 UART: [ldev] SUBJECT.KEYID = 5
1,211,886 UART: [ldev] AUTHORITY.KEYID = 7
1,212,349 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,031 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,283,992 UART: [fwproc] Recv command 0x46574c44
1,284,720 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,874 UART: ROM Fatal Error: 0x000B0009
1,311,031 >>> mbox cmd response: failed
1,311,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,037 >>> mbox cmd response: failed
1,311,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,870 UART: [kat] SHA2-512-ACC
908,771 UART: [kat] ECC-384
918,466 UART: [kat] HMAC-384Kdf
923,172 UART: [kat] LMS
1,171,500 UART: [kat] --
1,172,413 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,033 UART: [idev] Sha1 KeyId Algorithm
1,209,641 UART: [idev] --
1,210,535 UART: [ldev] ++
1,210,703 UART: [ldev] CDI.KEYID = 6
1,211,066 UART: [ldev] SUBJECT.KEYID = 5
1,211,492 UART: [ldev] AUTHORITY.KEYID = 7
1,211,955 UART: [ldev] FE.KEYID = 1
1,216,893 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,066 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,888 >>> mbox cmd response: failed
1,164,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,894 >>> mbox cmd response: failed
1,164,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,879 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,138 UART: [state] WD Timer not started. Device not locked for debugging
87,309 UART: [kat] SHA2-256
892,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,084 UART: [kat] ++
897,236 UART: [kat] sha1
901,320 UART: [kat] SHA2-256
903,260 UART: [kat] SHA2-384
906,015 UART: [kat] SHA2-512-ACC
907,916 UART: [kat] ECC-384
917,899 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,171,698 UART: [cold-reset] ++
1,172,236 UART: [fht] FHT @ 0x50003400
1,174,849 UART: [idev] ++
1,175,017 UART: [idev] CDI.KEYID = 6
1,175,377 UART: [idev] SUBJECT.KEYID = 7
1,175,801 UART: [idev] UDS.KEYID = 0
1,176,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,200,808 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,284 UART: [ldev] ++
1,210,452 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,241 UART: [ldev] AUTHORITY.KEYID = 7
1,211,704 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,576 UART: [ldev] --
1,283,021 UART: [fwproc] Wait for Commands...
1,283,701 UART: [fwproc] Recv command 0x46574c44
1,284,429 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,841 UART: ROM Fatal Error: 0x000B0009
1,310,998 >>> mbox cmd response: failed
1,310,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,004 >>> mbox cmd response: failed
1,311,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
894,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,186 UART: [kat] ++
898,338 UART: [kat] sha1
902,598 UART: [kat] SHA2-256
904,538 UART: [kat] SHA2-384
907,269 UART: [kat] SHA2-512-ACC
909,170 UART: [kat] ECC-384
919,133 UART: [kat] HMAC-384Kdf
923,663 UART: [kat] LMS
1,171,991 UART: [kat] --
1,172,840 UART: [cold-reset] ++
1,173,256 UART: [fht] FHT @ 0x50003400
1,176,029 UART: [idev] ++
1,176,197 UART: [idev] CDI.KEYID = 6
1,176,557 UART: [idev] SUBJECT.KEYID = 7
1,176,981 UART: [idev] UDS.KEYID = 0
1,177,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,151 UART: [idev] Erasing UDS.KEYID = 0
1,202,954 UART: [idev] Sha1 KeyId Algorithm
1,211,384 UART: [idev] --
1,212,358 UART: [ldev] ++
1,212,526 UART: [ldev] CDI.KEYID = 6
1,212,889 UART: [ldev] SUBJECT.KEYID = 5
1,213,315 UART: [ldev] AUTHORITY.KEYID = 7
1,213,778 UART: [ldev] FE.KEYID = 1
1,218,990 UART: [ldev] Erasing FE.KEYID = 1
1,244,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,284,183 UART: [fwproc] Wait for Commands...
1,284,811 UART: [fwproc] Recv command 0x46574c44
1,285,539 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,283 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,371 >>> mbox cmd response: failed
1,164,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,377 >>> mbox cmd response: failed
1,164,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,692 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,692 UART: [fwproc] Wait for Commands...
1,281,287 UART: [fwproc] Recv command 0x46574c44
1,282,020 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,246 UART: ROM Fatal Error: 0x000B0009
1,308,403 >>> mbox cmd response: failed
1,308,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,409 >>> mbox cmd response: failed
1,308,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,197 UART: [kat] SHA2-256
901,137 UART: [kat] SHA2-384
903,760 UART: [kat] SHA2-512-ACC
905,661 UART: [kat] ECC-384
915,210 UART: [kat] HMAC-384Kdf
919,788 UART: [kat] LMS
1,168,100 UART: [kat] --
1,168,803 UART: [cold-reset] ++
1,169,207 UART: [fht] FHT @ 0x50003400
1,171,965 UART: [idev] ++
1,172,133 UART: [idev] CDI.KEYID = 6
1,172,494 UART: [idev] SUBJECT.KEYID = 7
1,172,919 UART: [idev] UDS.KEYID = 0
1,173,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,589 UART: [idev] Erasing UDS.KEYID = 0
1,197,089 UART: [idev] Sha1 KeyId Algorithm
1,205,987 UART: [idev] --
1,206,978 UART: [ldev] ++
1,207,146 UART: [ldev] CDI.KEYID = 6
1,207,510 UART: [ldev] SUBJECT.KEYID = 5
1,207,937 UART: [ldev] AUTHORITY.KEYID = 7
1,208,400 UART: [ldev] FE.KEYID = 1
1,213,824 UART: [ldev] Erasing FE.KEYID = 1
1,239,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,716 UART: [ldev] --
1,279,082 UART: [fwproc] Wait for Commands...
1,279,703 UART: [fwproc] Recv command 0x46574c44
1,280,436 UART: [fwproc] Recv'd Img size: 114332 bytes
2,576,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,768,694 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,276 >>> mbox cmd response: failed
1,162,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,282 >>> mbox cmd response: failed
1,162,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,834 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,951 UART: [state] LifecycleState = Unprovisioned
86,606 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,332 UART: [kat] SHA2-256
902,272 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,691 UART: [kat] LMS
1,170,003 UART: [kat] --
1,171,024 UART: [cold-reset] ++
1,171,456 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,653 UART: [idev] SUBJECT.KEYID = 7
1,175,078 UART: [idev] UDS.KEYID = 0
1,175,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,386 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,209,130 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,242,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,153 UART: ROM Fatal Error: 0x000B0009
1,310,310 >>> mbox cmd response: failed
1,310,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,316 >>> mbox cmd response: failed
1,310,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
917,055 UART: [kat] HMAC-384Kdf
921,711 UART: [kat] LMS
1,170,023 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,254 UART: [fht] FHT @ 0x50003400
1,173,998 UART: [idev] ++
1,174,166 UART: [idev] CDI.KEYID = 6
1,174,527 UART: [idev] SUBJECT.KEYID = 7
1,174,952 UART: [idev] UDS.KEYID = 0
1,175,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,160 UART: [idev] Sha1 KeyId Algorithm
1,208,830 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,651 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,717 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,489 >>> mbox cmd response: failed
1,161,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,495 >>> mbox cmd response: failed
1,161,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,275 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,967 UART: [kat] SHA2-256
881,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,013 UART: [kat] ++
886,165 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,230 UART: [kat] LMS
1,475,426 UART: [kat] --
1,476,379 UART: [cold-reset] ++
1,476,855 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,505,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,174 UART: [idev] --
1,515,345 UART: [ldev] ++
1,515,513 UART: [ldev] CDI.KEYID = 6
1,515,876 UART: [ldev] SUBJECT.KEYID = 5
1,516,302 UART: [ldev] AUTHORITY.KEYID = 7
1,516,765 UART: [ldev] FE.KEYID = 1
1,521,889 UART: [ldev] Erasing FE.KEYID = 1
1,547,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,992 UART: [ldev] --
1,586,313 UART: [fwproc] Waiting for Commands...
1,587,156 UART: [fwproc] Received command 0x46574c44
1,587,947 UART: [fwproc] Received Image of size 114332 bytes
1,625,423 UART: ROM Fatal Error: 0x000B000C
1,626,582 >>> mbox cmd response: failed
1,626,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,588 >>> mbox cmd response: failed
1,626,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,236 UART: [kat] SHA2-512-ACC
897,137 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,370 UART: [kat] LMS
1,475,566 UART: [kat] --
1,476,537 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,046 UART: [idev] Erasing UDS.KEYID = 0
1,505,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,819 UART: [ldev] ++
1,514,987 UART: [ldev] CDI.KEYID = 6
1,515,350 UART: [ldev] SUBJECT.KEYID = 5
1,515,776 UART: [ldev] AUTHORITY.KEYID = 7
1,516,239 UART: [ldev] FE.KEYID = 1
1,521,747 UART: [ldev] Erasing FE.KEYID = 1
1,547,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,118 UART: [ldev] --
1,586,441 UART: [fwproc] Waiting for Commands...
1,587,062 UART: [fwproc] Received command 0x46574c44
1,587,853 UART: [fwproc] Received Image of size 114332 bytes
2,885,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,893 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,478,977 >>> mbox cmd response: failed
1,478,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,983 >>> mbox cmd response: failed
1,478,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,071 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,565 UART: [kat] HMAC-384Kdf
907,161 UART: [kat] LMS
1,475,357 UART: [kat] --
1,475,996 UART: [cold-reset] ++
1,476,546 UART: [fht] Storing FHT @ 0x50003400
1,479,365 UART: [idev] ++
1,479,533 UART: [idev] CDI.KEYID = 6
1,479,893 UART: [idev] SUBJECT.KEYID = 7
1,480,317 UART: [idev] UDS.KEYID = 0
1,480,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,895 UART: [idev] Erasing UDS.KEYID = 0
1,504,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,841 UART: [idev] --
1,513,940 UART: [ldev] ++
1,514,108 UART: [ldev] CDI.KEYID = 6
1,514,471 UART: [ldev] SUBJECT.KEYID = 5
1,514,897 UART: [ldev] AUTHORITY.KEYID = 7
1,515,360 UART: [ldev] FE.KEYID = 1
1,520,534 UART: [ldev] Erasing FE.KEYID = 1
1,546,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,071 UART: [ldev] --
1,585,448 UART: [fwproc] Waiting for Commands...
1,586,075 UART: [fwproc] Received command 0x46574c44
1,586,866 UART: [fwproc] Received Image of size 114332 bytes
1,623,822 UART: ROM Fatal Error: 0x000B000C
1,624,981 >>> mbox cmd response: failed
1,624,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,987 >>> mbox cmd response: failed
1,624,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,294 UART: [kat] SHA2-256
882,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,340 UART: [kat] ++
886,492 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,791 UART: [kat] HMAC-384Kdf
907,395 UART: [kat] LMS
1,475,591 UART: [kat] --
1,476,044 UART: [cold-reset] ++
1,476,512 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,617 UART: [idev] Erasing UDS.KEYID = 0
1,505,085 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,815 UART: [idev] --
1,515,072 UART: [ldev] ++
1,515,240 UART: [ldev] CDI.KEYID = 6
1,515,603 UART: [ldev] SUBJECT.KEYID = 5
1,516,029 UART: [ldev] AUTHORITY.KEYID = 7
1,516,492 UART: [ldev] FE.KEYID = 1
1,521,878 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,215 UART: [ldev] --
1,586,548 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 114332 bytes
2,885,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,124 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,480,706 >>> mbox cmd response: failed
1,480,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,712 >>> mbox cmd response: failed
1,480,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,318 UART: [kat] SHA2-512-ACC
908,219 UART: [kat] ECC-384
918,346 UART: [kat] HMAC-384Kdf
923,066 UART: [kat] LMS
1,171,394 UART: [kat] --
1,172,175 UART: [cold-reset] ++
1,172,607 UART: [fht] FHT @ 0x50003400
1,175,094 UART: [idev] ++
1,175,262 UART: [idev] CDI.KEYID = 6
1,175,622 UART: [idev] SUBJECT.KEYID = 7
1,176,046 UART: [idev] UDS.KEYID = 0
1,176,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,259 UART: [idev] --
1,210,407 UART: [ldev] ++
1,210,575 UART: [ldev] CDI.KEYID = 6
1,210,938 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,283,030 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,240 UART: ROM Fatal Error: 0x000B000C
1,322,399 >>> mbox cmd response: failed
1,322,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,405 >>> mbox cmd response: failed
1,322,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,132 UART: [kat] SHA2-256
893,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,907 UART: [kat] ++
898,059 UART: [kat] sha1
902,213 UART: [kat] SHA2-256
904,153 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
917,862 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,193 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,906 UART: [idev] Erasing UDS.KEYID = 0
1,201,513 UART: [idev] Sha1 KeyId Algorithm
1,210,017 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,217,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,943 UART: [ldev] --
1,283,238 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,486 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,143 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,740 >>> mbox cmd response: failed
1,178,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,746 >>> mbox cmd response: failed
1,178,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,495 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
893,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,020 UART: [kat] ++
898,172 UART: [kat] sha1
902,540 UART: [kat] SHA2-256
904,480 UART: [kat] SHA2-384
907,337 UART: [kat] SHA2-512-ACC
909,238 UART: [kat] ECC-384
919,507 UART: [kat] HMAC-384Kdf
924,075 UART: [kat] LMS
1,172,403 UART: [kat] --
1,173,198 UART: [cold-reset] ++
1,173,616 UART: [fht] FHT @ 0x50003400
1,176,341 UART: [idev] ++
1,176,509 UART: [idev] CDI.KEYID = 6
1,176,869 UART: [idev] SUBJECT.KEYID = 7
1,177,293 UART: [idev] UDS.KEYID = 0
1,177,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,229 UART: [idev] Erasing UDS.KEYID = 0
1,202,654 UART: [idev] Sha1 KeyId Algorithm
1,211,338 UART: [idev] --
1,212,560 UART: [ldev] ++
1,212,728 UART: [ldev] CDI.KEYID = 6
1,213,091 UART: [ldev] SUBJECT.KEYID = 5
1,213,517 UART: [ldev] AUTHORITY.KEYID = 7
1,213,980 UART: [ldev] FE.KEYID = 1
1,219,152 UART: [ldev] Erasing FE.KEYID = 1
1,245,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,466 UART: [ldev] --
1,284,945 UART: [fwproc] Wait for Commands...
1,285,731 UART: [fwproc] Recv command 0x46574c44
1,286,459 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,579 UART: ROM Fatal Error: 0x000B000C
1,324,738 >>> mbox cmd response: failed
1,324,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,744 >>> mbox cmd response: failed
1,324,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,811 UART: [kat] HMAC-384Kdf
923,417 UART: [kat] LMS
1,171,745 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,954 UART: [fht] FHT @ 0x50003400
1,175,679 UART: [idev] ++
1,175,847 UART: [idev] CDI.KEYID = 6
1,176,207 UART: [idev] SUBJECT.KEYID = 7
1,176,631 UART: [idev] UDS.KEYID = 0
1,176,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,751 UART: [idev] Erasing UDS.KEYID = 0
1,201,460 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,078 UART: [ldev] ++
1,211,246 UART: [ldev] CDI.KEYID = 6
1,211,609 UART: [ldev] SUBJECT.KEYID = 5
1,212,035 UART: [ldev] AUTHORITY.KEYID = 7
1,212,498 UART: [ldev] FE.KEYID = 1
1,217,904 UART: [ldev] Erasing FE.KEYID = 1
1,244,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,060 UART: [ldev] --
1,283,539 UART: [fwproc] Wait for Commands...
1,284,359 UART: [fwproc] Recv command 0x46574c44
1,285,087 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,923 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,065 >>> mbox cmd response: failed
1,179,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,071 >>> mbox cmd response: failed
1,179,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
85,907 UART: [state] WD Timer not started. Device not locked for debugging
87,118 UART: [kat] SHA2-256
890,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,797 UART: [kat] ++
894,949 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,244 UART: [kat] HMAC-384Kdf
919,886 UART: [kat] LMS
1,168,198 UART: [kat] --
1,169,037 UART: [cold-reset] ++
1,169,383 UART: [fht] FHT @ 0x50003400
1,171,999 UART: [idev] ++
1,172,167 UART: [idev] CDI.KEYID = 6
1,172,528 UART: [idev] SUBJECT.KEYID = 7
1,172,953 UART: [idev] UDS.KEYID = 0
1,173,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,216,102 UART: [ldev] Erasing FE.KEYID = 1
1,243,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,858 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,051 UART: [fwproc] Recv command 0x46574c44
1,283,784 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,564 UART: ROM Fatal Error: 0x000B000C
1,322,723 >>> mbox cmd response: failed
1,322,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,729 >>> mbox cmd response: failed
1,322,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Unprovisioned
86,297 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,677 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,174,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,573 UART: [idev] Sha1 KeyId Algorithm
1,208,233 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,164 UART: [ldev] Erasing FE.KEYID = 1
1,242,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,704 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,554 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,171,904 >>> mbox cmd response: failed
1,171,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,910 >>> mbox cmd response: failed
1,171,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,638 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,174,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,645 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,273 UART: ROM Fatal Error: 0x000B000C
1,321,432 >>> mbox cmd response: failed
1,321,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,438 >>> mbox cmd response: failed
1,321,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,174,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,282,043 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,509 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,473 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,383 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,415 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,627 >>> mbox cmd response: failed
1,174,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,633 >>> mbox cmd response: failed
1,174,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,685 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,444 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,614 UART: [idev] --
1,514,877 UART: [ldev] ++
1,515,045 UART: [ldev] CDI.KEYID = 6
1,515,408 UART: [ldev] SUBJECT.KEYID = 5
1,515,834 UART: [ldev] AUTHORITY.KEYID = 7
1,516,297 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,547,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,226 UART: [ldev] --
1,586,641 UART: [fwproc] Waiting for Commands...
1,587,480 UART: [fwproc] Received command 0x46574c44
1,588,271 UART: [fwproc] Received Image of size 114332 bytes
1,623,763 UART: ROM Fatal Error: 0x000B001C
1,624,922 >>> mbox cmd response: failed
1,624,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,928 >>> mbox cmd response: failed
1,624,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,717 UART: [kat] SHA2-256
881,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,763 UART: [kat] ++
885,915 UART: [kat] sha1
890,085 UART: [kat] SHA2-256
892,023 UART: [kat] SHA2-384
894,654 UART: [kat] SHA2-512-ACC
896,555 UART: [kat] ECC-384
902,264 UART: [kat] HMAC-384Kdf
906,878 UART: [kat] LMS
1,475,074 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,340 UART: [idev] --
1,514,431 UART: [ldev] ++
1,514,599 UART: [ldev] CDI.KEYID = 6
1,514,962 UART: [ldev] SUBJECT.KEYID = 5
1,515,388 UART: [ldev] AUTHORITY.KEYID = 7
1,515,851 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,546,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,585,955 UART: [fwproc] Waiting for Commands...
1,586,760 UART: [fwproc] Received command 0x46574c44
1,587,551 UART: [fwproc] Received Image of size 114332 bytes
2,884,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,478,103 >>> mbox cmd response: failed
1,478,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,109 >>> mbox cmd response: failed
1,478,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,473 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,820 UART: [kat] SHA2-256
881,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,866 UART: [kat] ++
886,018 UART: [kat] sha1
890,306 UART: [kat] SHA2-256
892,244 UART: [kat] SHA2-384
894,801 UART: [kat] SHA2-512-ACC
896,702 UART: [kat] ECC-384
902,409 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,296 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,597 UART: [idev] ++
1,479,765 UART: [idev] CDI.KEYID = 6
1,480,125 UART: [idev] SUBJECT.KEYID = 7
1,480,549 UART: [idev] UDS.KEYID = 0
1,480,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,029 UART: [idev] --
1,515,154 UART: [ldev] ++
1,515,322 UART: [ldev] CDI.KEYID = 6
1,515,685 UART: [ldev] SUBJECT.KEYID = 5
1,516,111 UART: [ldev] AUTHORITY.KEYID = 7
1,516,574 UART: [ldev] FE.KEYID = 1
1,521,878 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,305 UART: [ldev] --
1,586,578 UART: [fwproc] Waiting for Commands...
1,587,359 UART: [fwproc] Received command 0x46574c44
1,588,150 UART: [fwproc] Received Image of size 114332 bytes
1,623,920 UART: ROM Fatal Error: 0x000B001C
1,625,079 >>> mbox cmd response: failed
1,625,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,085 >>> mbox cmd response: failed
1,625,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,696 UART: [kat] SHA2-256
881,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,742 UART: [kat] ++
885,894 UART: [kat] sha1
890,070 UART: [kat] SHA2-256
892,008 UART: [kat] SHA2-384
894,587 UART: [kat] SHA2-512-ACC
896,488 UART: [kat] ECC-384
902,257 UART: [kat] HMAC-384Kdf
906,747 UART: [kat] LMS
1,474,943 UART: [kat] --
1,476,120 UART: [cold-reset] ++
1,476,646 UART: [fht] Storing FHT @ 0x50003400
1,479,389 UART: [idev] ++
1,479,557 UART: [idev] CDI.KEYID = 6
1,479,917 UART: [idev] SUBJECT.KEYID = 7
1,480,341 UART: [idev] UDS.KEYID = 0
1,480,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,379 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,269 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,521,862 UART: [ldev] Erasing FE.KEYID = 1
1,547,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,183 UART: [ldev] --
1,586,644 UART: [fwproc] Waiting for Commands...
1,587,465 UART: [fwproc] Received command 0x46574c44
1,588,256 UART: [fwproc] Received Image of size 114332 bytes
2,885,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,750 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,342 >>> mbox cmd response: failed
1,476,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,348 >>> mbox cmd response: failed
1,476,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,194 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,935 UART: [kat] SHA2-256
903,875 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
918,256 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,171,801 UART: [cold-reset] ++
1,172,361 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,310 UART: [idev] Erasing UDS.KEYID = 0
1,201,219 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,197 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,990 UART: [fwproc] Recv'd Img size: 114332 bytes
1,318,638 UART: ROM Fatal Error: 0x000B001C
1,319,797 >>> mbox cmd response: failed
1,319,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,803 >>> mbox cmd response: failed
1,319,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,430 UART: [kat] LMS
1,170,758 UART: [kat] --
1,171,477 UART: [cold-reset] ++
1,171,845 UART: [fht] FHT @ 0x50003400
1,174,422 UART: [idev] ++
1,174,590 UART: [idev] CDI.KEYID = 6
1,174,950 UART: [idev] SUBJECT.KEYID = 7
1,175,374 UART: [idev] UDS.KEYID = 0
1,175,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,479 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,456 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,716 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,530 >>> mbox cmd response: failed
1,174,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,536 >>> mbox cmd response: failed
1,174,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,899 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,206 UART: [state] WD Timer not started. Device not locked for debugging
88,449 UART: [kat] SHA2-256
894,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,224 UART: [kat] ++
898,376 UART: [kat] sha1
902,566 UART: [kat] SHA2-256
904,506 UART: [kat] SHA2-384
907,067 UART: [kat] SHA2-512-ACC
908,968 UART: [kat] ECC-384
918,357 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,184 UART: [fht] FHT @ 0x50003400
1,175,791 UART: [idev] ++
1,175,959 UART: [idev] CDI.KEYID = 6
1,176,319 UART: [idev] SUBJECT.KEYID = 7
1,176,743 UART: [idev] UDS.KEYID = 0
1,177,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,821 UART: [idev] Erasing UDS.KEYID = 0
1,202,392 UART: [idev] Sha1 KeyId Algorithm
1,210,820 UART: [idev] --
1,211,826 UART: [ldev] ++
1,211,994 UART: [ldev] CDI.KEYID = 6
1,212,357 UART: [ldev] SUBJECT.KEYID = 5
1,212,783 UART: [ldev] AUTHORITY.KEYID = 7
1,213,246 UART: [ldev] FE.KEYID = 1
1,218,466 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,600 UART: [ldev] --
1,284,059 UART: [fwproc] Wait for Commands...
1,284,725 UART: [fwproc] Recv command 0x46574c44
1,285,453 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,939 UART: ROM Fatal Error: 0x000B001C
1,322,098 >>> mbox cmd response: failed
1,322,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,104 >>> mbox cmd response: failed
1,322,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,385 UART: [kat] SHA2-512-ACC
908,286 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,904 UART: [fht] FHT @ 0x50003400
1,175,471 UART: [idev] ++
1,175,639 UART: [idev] CDI.KEYID = 6
1,175,999 UART: [idev] SUBJECT.KEYID = 7
1,176,423 UART: [idev] UDS.KEYID = 0
1,176,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,493 UART: [idev] Erasing UDS.KEYID = 0
1,201,588 UART: [idev] Sha1 KeyId Algorithm
1,210,026 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,217,598 UART: [ldev] Erasing FE.KEYID = 1
1,243,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,500 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,661 UART: [fwproc] Recv command 0x46574c44
1,284,389 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,211 >>> mbox cmd response: failed
1,176,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,217 >>> mbox cmd response: failed
1,176,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,108 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,156 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,506 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x46574c44
1,281,996 UART: [fwproc] Recv'd Img size: 114332 bytes
1,316,386 UART: ROM Fatal Error: 0x000B001C
1,317,545 >>> mbox cmd response: failed
1,317,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,551 >>> mbox cmd response: failed
1,317,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,422 UART: [kat] HMAC-384Kdf
919,796 UART: [kat] LMS
1,168,108 UART: [kat] --
1,168,967 UART: [cold-reset] ++
1,169,397 UART: [fht] FHT @ 0x50003400
1,172,037 UART: [idev] ++
1,172,205 UART: [idev] CDI.KEYID = 6
1,172,566 UART: [idev] SUBJECT.KEYID = 7
1,172,991 UART: [idev] UDS.KEYID = 0
1,173,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,926 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,684 >>> mbox cmd response: failed
1,170,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,690 >>> mbox cmd response: failed
1,170,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,792 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,711 UART: [kat] HMAC-384Kdf
921,487 UART: [kat] LMS
1,169,799 UART: [kat] --
1,170,586 UART: [cold-reset] ++
1,171,126 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 114332 bytes
1,318,503 UART: ROM Fatal Error: 0x000B001C
1,319,662 >>> mbox cmd response: failed
1,319,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,668 >>> mbox cmd response: failed
1,319,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,174,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,198,498 UART: [idev] Sha1 KeyId Algorithm
1,207,512 UART: [idev] --
1,208,551 UART: [ldev] ++
1,208,719 UART: [ldev] CDI.KEYID = 6
1,209,083 UART: [ldev] SUBJECT.KEYID = 5
1,209,510 UART: [ldev] AUTHORITY.KEYID = 7
1,209,973 UART: [ldev] FE.KEYID = 1
1,215,175 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,339 UART: [ldev] --
1,280,853 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,293 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,013 >>> mbox cmd response: failed
1,173,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,019 >>> mbox cmd response: failed
1,173,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,019 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,655 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,689 >>> mbox cmd response: failed
1,194,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,695 >>> mbox cmd response: failed
1,194,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,091 UART: [kat] SHA2-256
882,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,137 UART: [kat] ++
886,289 UART: [kat] sha1
890,665 UART: [kat] SHA2-256
892,603 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,438 UART: [kat] LMS
1,475,634 UART: [kat] --
1,476,507 UART: [cold-reset] ++
1,477,015 UART: [fht] Storing FHT @ 0x50003400
1,479,752 UART: [idev] ++
1,479,920 UART: [idev] CDI.KEYID = 6
1,480,280 UART: [idev] SUBJECT.KEYID = 7
1,480,704 UART: [idev] UDS.KEYID = 0
1,481,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,914 UART: [idev] Erasing UDS.KEYID = 0
1,505,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,811 UART: [ldev] ++
1,514,979 UART: [ldev] CDI.KEYID = 6
1,515,342 UART: [ldev] SUBJECT.KEYID = 5
1,515,768 UART: [ldev] AUTHORITY.KEYID = 7
1,516,231 UART: [ldev] FE.KEYID = 1
1,521,001 UART: [ldev] Erasing FE.KEYID = 1
1,545,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,642 UART: [ldev] --
1,584,979 UART: [fwproc] Waiting for Commands...
1,585,700 UART: [fwproc] Received command 0x46574c44
1,586,491 UART: [fwproc] Received Image of size 114332 bytes
2,884,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,208 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,497 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,717 >>> mbox cmd response: failed
1,194,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,723 >>> mbox cmd response: failed
1,194,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,528 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,436 >>> mbox cmd response: failed
1,195,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,442 >>> mbox cmd response: failed
1,195,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,855 UART: [kat] LMS
1,476,051 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,176 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,027 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,772 UART: [ldev] ++
1,515,940 UART: [ldev] CDI.KEYID = 6
1,516,303 UART: [ldev] SUBJECT.KEYID = 5
1,516,729 UART: [ldev] AUTHORITY.KEYID = 7
1,517,192 UART: [ldev] FE.KEYID = 1
1,522,352 UART: [ldev] Erasing FE.KEYID = 1
1,547,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,771 UART: [ldev] --
1,587,110 UART: [fwproc] Waiting for Commands...
1,587,739 UART: [fwproc] Received command 0x46574c44
1,588,530 UART: [fwproc] Received Image of size 114332 bytes
2,885,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,820 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,968 >>> mbox cmd response: failed
1,194,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,974 >>> mbox cmd response: failed
1,194,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,438 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,697 >>> mbox cmd response: failed
1,194,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,703 >>> mbox cmd response: failed
1,194,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
893,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,275 UART: [kat] ++
897,427 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,440 UART: [kat] LMS
1,170,768 UART: [kat] --
1,171,427 UART: [cold-reset] ++
1,171,919 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,696 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,958 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,355 UART: [ldev] --
1,282,652 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,193,635 >>> mbox cmd response: failed
1,193,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,641 >>> mbox cmd response: failed
1,193,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,531 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,455 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,270 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,052 >>> mbox cmd response: failed
1,196,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,058 >>> mbox cmd response: failed
1,196,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,389 UART: [kat] SHA2-512-ACC
908,290 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
923,187 UART: [kat] LMS
1,171,515 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,289 UART: [idev] ++
1,175,457 UART: [idev] CDI.KEYID = 6
1,175,817 UART: [idev] SUBJECT.KEYID = 7
1,176,241 UART: [idev] UDS.KEYID = 0
1,176,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,465 UART: [idev] Erasing UDS.KEYID = 0
1,201,674 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,211,092 UART: [ldev] ++
1,211,260 UART: [ldev] CDI.KEYID = 6
1,211,623 UART: [ldev] SUBJECT.KEYID = 5
1,212,049 UART: [ldev] AUTHORITY.KEYID = 7
1,212,512 UART: [ldev] FE.KEYID = 1
1,217,594 UART: [ldev] Erasing FE.KEYID = 1
1,243,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,388 UART: [ldev] --
1,282,875 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,887 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,878 >>> mbox cmd response: failed
1,196,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,884 >>> mbox cmd response: failed
1,196,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,112 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,363 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,193,483 >>> mbox cmd response: failed
1,193,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,489 >>> mbox cmd response: failed
1,193,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,174,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,242,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,024 UART: [ldev] --
1,281,480 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,336 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,153 >>> mbox cmd response: failed
1,195,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,159 >>> mbox cmd response: failed
1,195,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,824 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,422 >>> mbox cmd response: failed
1,195,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,428 >>> mbox cmd response: failed
1,195,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,703 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,504 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,104 UART: [idev] Erasing UDS.KEYID = 0
1,199,040 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,801 UART: [ldev] ++
1,208,969 UART: [ldev] CDI.KEYID = 6
1,209,333 UART: [ldev] SUBJECT.KEYID = 5
1,209,760 UART: [ldev] AUTHORITY.KEYID = 7
1,210,223 UART: [ldev] FE.KEYID = 1
1,215,429 UART: [ldev] Erasing FE.KEYID = 1
1,241,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,651 UART: [ldev] --
1,281,079 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,281 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,434 >>> mbox cmd response: failed
1,196,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,440 >>> mbox cmd response: failed
1,196,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,737 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,686 UART: [kat] SHA2-512-ACC
896,587 UART: [kat] ECC-384
901,854 UART: [kat] HMAC-384Kdf
906,548 UART: [kat] LMS
1,474,744 UART: [kat] --
1,475,535 UART: [cold-reset] ++
1,475,921 UART: [fht] Storing FHT @ 0x50003400
1,478,726 UART: [idev] ++
1,478,894 UART: [idev] CDI.KEYID = 6
1,479,254 UART: [idev] SUBJECT.KEYID = 7
1,479,678 UART: [idev] UDS.KEYID = 0
1,480,023 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,704 UART: [idev] Erasing UDS.KEYID = 0
1,504,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,676 UART: [idev] --
1,513,649 UART: [ldev] ++
1,513,817 UART: [ldev] CDI.KEYID = 6
1,514,180 UART: [ldev] SUBJECT.KEYID = 5
1,514,606 UART: [ldev] AUTHORITY.KEYID = 7
1,515,069 UART: [ldev] FE.KEYID = 1
1,520,549 UART: [ldev] Erasing FE.KEYID = 1
1,545,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,926 UART: [ldev] --
1,584,417 UART: [fwproc] Waiting for Commands...
1,585,058 UART: [fwproc] Received command 0x46574c44
1,585,849 UART: [fwproc] Received Image of size 114332 bytes
2,798,476 UART: ROM Fatal Error: 0x000B0030
2,799,633 >>> mbox cmd response: failed
2,799,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,799,639 >>> mbox cmd response: failed
2,799,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,799,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,947 UART: [kat] SHA2-256
881,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,993 UART: [kat] ++
886,145 UART: [kat] sha1
890,173 UART: [kat] SHA2-256
892,111 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,522 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,327 UART: [fht] Storing FHT @ 0x50003400
1,479,196 UART: [idev] ++
1,479,364 UART: [idev] CDI.KEYID = 6
1,479,724 UART: [idev] SUBJECT.KEYID = 7
1,480,148 UART: [idev] UDS.KEYID = 0
1,480,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,820 UART: [idev] Erasing UDS.KEYID = 0
1,504,526 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,002 UART: [idev] --
1,514,075 UART: [ldev] ++
1,514,243 UART: [ldev] CDI.KEYID = 6
1,514,606 UART: [ldev] SUBJECT.KEYID = 5
1,515,032 UART: [ldev] AUTHORITY.KEYID = 7
1,515,495 UART: [ldev] FE.KEYID = 1
1,520,929 UART: [ldev] Erasing FE.KEYID = 1
1,546,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,586,047 UART: [fwproc] Waiting for Commands...
1,586,900 UART: [fwproc] Received command 0x46574c44
1,587,691 UART: [fwproc] Received Image of size 114332 bytes
2,884,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,857 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,571 >>> mbox cmd response: failed
2,616,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,616,577 >>> mbox cmd response: failed
2,616,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,616,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,081 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
86,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,947 UART: [kat] SHA2-512-ACC
897,848 UART: [kat] ECC-384
903,421 UART: [kat] HMAC-384Kdf
908,135 UART: [kat] LMS
1,476,331 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,618 UART: [fht] Storing FHT @ 0x50003400
1,480,587 UART: [idev] ++
1,480,755 UART: [idev] CDI.KEYID = 6
1,481,115 UART: [idev] SUBJECT.KEYID = 7
1,481,539 UART: [idev] UDS.KEYID = 0
1,481,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,599 UART: [idev] Erasing UDS.KEYID = 0
1,506,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,287 UART: [idev] --
1,516,446 UART: [ldev] ++
1,516,614 UART: [ldev] CDI.KEYID = 6
1,516,977 UART: [ldev] SUBJECT.KEYID = 5
1,517,403 UART: [ldev] AUTHORITY.KEYID = 7
1,517,866 UART: [ldev] FE.KEYID = 1
1,523,200 UART: [ldev] Erasing FE.KEYID = 1
1,548,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,551 UART: [ldev] --
1,587,910 UART: [fwproc] Waiting for Commands...
1,588,597 UART: [fwproc] Received command 0x46574c44
1,589,388 UART: [fwproc] Received Image of size 114332 bytes
2,803,187 UART: ROM Fatal Error: 0x000B0030
2,804,344 >>> mbox cmd response: failed
2,804,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,804,350 >>> mbox cmd response: failed
2,804,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,804,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,642 UART: [kat] SHA2-256
881,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,688 UART: [kat] ++
885,840 UART: [kat] sha1
890,034 UART: [kat] SHA2-256
891,972 UART: [kat] SHA2-384
894,847 UART: [kat] SHA2-512-ACC
896,748 UART: [kat] ECC-384
902,359 UART: [kat] HMAC-384Kdf
907,025 UART: [kat] LMS
1,475,221 UART: [kat] --
1,475,990 UART: [cold-reset] ++
1,476,330 UART: [fht] Storing FHT @ 0x50003400
1,479,097 UART: [idev] ++
1,479,265 UART: [idev] CDI.KEYID = 6
1,479,625 UART: [idev] SUBJECT.KEYID = 7
1,480,049 UART: [idev] UDS.KEYID = 0
1,480,394 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,963 UART: [idev] Erasing UDS.KEYID = 0
1,505,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,937 UART: [idev] --
1,515,106 UART: [ldev] ++
1,515,274 UART: [ldev] CDI.KEYID = 6
1,515,637 UART: [ldev] SUBJECT.KEYID = 5
1,516,063 UART: [ldev] AUTHORITY.KEYID = 7
1,516,526 UART: [ldev] FE.KEYID = 1
1,521,846 UART: [ldev] Erasing FE.KEYID = 1
1,547,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,045 UART: [ldev] --
1,586,506 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 114332 bytes
2,885,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,641 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,924 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,505,217 >>> mbox cmd response: failed
2,505,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,505,223 >>> mbox cmd response: failed
2,505,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,505,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,298 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,764 UART: [kat] HMAC-384Kdf
923,226 UART: [kat] LMS
1,171,554 UART: [kat] --
1,172,127 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,228 UART: [idev] ++
1,175,396 UART: [idev] CDI.KEYID = 6
1,175,756 UART: [idev] SUBJECT.KEYID = 7
1,176,180 UART: [idev] UDS.KEYID = 0
1,176,525 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,164 UART: [idev] Erasing UDS.KEYID = 0
1,200,697 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,766 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,178 UART: [fwproc] Recv command 0x46574c44
1,283,906 UART: [fwproc] Recv'd Img size: 114332 bytes
1,596,514 UART: ROM Fatal Error: 0x000B0030
1,597,671 >>> mbox cmd response: failed
1,597,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,677 >>> mbox cmd response: failed
1,597,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,473 UART: [kat] SHA2-256
903,413 UART: [kat] SHA2-384
906,044 UART: [kat] SHA2-512-ACC
907,945 UART: [kat] ECC-384
917,278 UART: [kat] HMAC-384Kdf
921,794 UART: [kat] LMS
1,170,122 UART: [kat] --
1,171,099 UART: [cold-reset] ++
1,171,575 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,816 UART: [idev] SUBJECT.KEYID = 7
1,175,240 UART: [idev] UDS.KEYID = 0
1,175,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,723 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,862 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,630 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,450,765 >>> mbox cmd response: failed
1,450,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,771 >>> mbox cmd response: failed
1,450,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,919 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,457 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,558 UART: [cold-reset] ++
1,173,124 UART: [fht] FHT @ 0x50003400
1,175,629 UART: [idev] ++
1,175,797 UART: [idev] CDI.KEYID = 6
1,176,157 UART: [idev] SUBJECT.KEYID = 7
1,176,581 UART: [idev] UDS.KEYID = 0
1,176,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,680 UART: [idev] Sha1 KeyId Algorithm
1,209,990 UART: [idev] --
1,210,978 UART: [ldev] ++
1,211,146 UART: [ldev] CDI.KEYID = 6
1,211,509 UART: [ldev] SUBJECT.KEYID = 5
1,211,935 UART: [ldev] AUTHORITY.KEYID = 7
1,212,398 UART: [ldev] FE.KEYID = 1
1,217,800 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,074 UART: [ldev] --
1,283,469 UART: [fwproc] Wait for Commands...
1,284,097 UART: [fwproc] Recv command 0x46574c44
1,284,825 UART: [fwproc] Recv'd Img size: 114332 bytes
1,600,726 UART: ROM Fatal Error: 0x000B0030
1,601,883 >>> mbox cmd response: failed
1,601,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,889 >>> mbox cmd response: failed
1,601,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,364 UART: [kat] SHA2-256
904,304 UART: [kat] SHA2-384
907,243 UART: [kat] SHA2-512-ACC
909,144 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,033 UART: [idev] Erasing UDS.KEYID = 0
1,202,624 UART: [idev] Sha1 KeyId Algorithm
1,211,210 UART: [idev] --
1,212,042 UART: [ldev] ++
1,212,210 UART: [ldev] CDI.KEYID = 6
1,212,573 UART: [ldev] SUBJECT.KEYID = 5
1,212,999 UART: [ldev] AUTHORITY.KEYID = 7
1,213,462 UART: [ldev] FE.KEYID = 1
1,218,974 UART: [ldev] Erasing FE.KEYID = 1
1,245,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,882 UART: [ldev] --
1,285,311 UART: [fwproc] Wait for Commands...
1,285,887 UART: [fwproc] Recv command 0x46574c44
1,286,615 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,455,672 >>> mbox cmd response: failed
1,455,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,678 >>> mbox cmd response: failed
1,455,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,173,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,499 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,240,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,036 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,147 UART: [fwproc] Recv command 0x46574c44
1,281,880 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,480 UART: ROM Fatal Error: 0x000B0030
1,596,637 >>> mbox cmd response: failed
1,596,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,643 >>> mbox cmd response: failed
1,596,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,866 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,420 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,452,407 >>> mbox cmd response: failed
1,452,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,413 >>> mbox cmd response: failed
1,452,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,524 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,208,931 UART: [ldev] ++
1,209,099 UART: [ldev] CDI.KEYID = 6
1,209,463 UART: [ldev] SUBJECT.KEYID = 5
1,209,890 UART: [ldev] AUTHORITY.KEYID = 7
1,210,353 UART: [ldev] FE.KEYID = 1
1,215,713 UART: [ldev] Erasing FE.KEYID = 1
1,242,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,460 UART: [fwproc] Recv command 0x46574c44
1,283,193 UART: [fwproc] Recv'd Img size: 114332 bytes
1,588,140 UART: ROM Fatal Error: 0x000B0030
1,589,297 >>> mbox cmd response: failed
1,589,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,303 >>> mbox cmd response: failed
1,589,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,417 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,379 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,915 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,441 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,450,490 >>> mbox cmd response: failed
1,450,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,496 >>> mbox cmd response: failed
1,450,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,323 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,552 UART: [state] LifecycleState = Unprovisioned
85,207 UART: [state] DebugLocked = No
85,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,583 UART: [kat] SHA2-256
881,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,629 UART: [kat] ++
885,781 UART: [kat] sha1
889,985 UART: [kat] SHA2-256
891,923 UART: [kat] SHA2-384
894,620 UART: [kat] SHA2-512-ACC
896,521 UART: [kat] ECC-384
901,976 UART: [kat] HMAC-384Kdf
906,546 UART: [kat] LMS
1,474,742 UART: [kat] --
1,475,547 UART: [cold-reset] ++
1,475,965 UART: [fht] Storing FHT @ 0x50003400
1,478,616 UART: [idev] ++
1,478,784 UART: [idev] CDI.KEYID = 6
1,479,144 UART: [idev] SUBJECT.KEYID = 7
1,479,568 UART: [idev] UDS.KEYID = 0
1,479,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,512 UART: [idev] Erasing UDS.KEYID = 0
1,504,276 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,808 UART: [idev] --
1,513,727 UART: [ldev] ++
1,513,895 UART: [ldev] CDI.KEYID = 6
1,514,258 UART: [ldev] SUBJECT.KEYID = 5
1,514,684 UART: [ldev] AUTHORITY.KEYID = 7
1,515,147 UART: [ldev] FE.KEYID = 1
1,520,173 UART: [ldev] Erasing FE.KEYID = 1
1,545,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,154 UART: [ldev] --
1,584,615 UART: [fwproc] Waiting for Commands...
1,585,406 UART: [fwproc] Received command 0x46574c44
1,586,197 UART: [fwproc] Received Image of size 114332 bytes
1,612,189 UART: ROM Fatal Error: 0x000B0032
1,613,346 >>> mbox cmd response: failed
1,613,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,352 >>> mbox cmd response: failed
1,613,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,827 UART: [kat] SHA2-256
892,765 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,522 UART: [kat] LMS
1,475,718 UART: [kat] --
1,476,529 UART: [cold-reset] ++
1,476,863 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,878 UART: [idev] Erasing UDS.KEYID = 0
1,504,904 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,406 UART: [idev] --
1,514,463 UART: [ldev] ++
1,514,631 UART: [ldev] CDI.KEYID = 6
1,514,994 UART: [ldev] SUBJECT.KEYID = 5
1,515,420 UART: [ldev] AUTHORITY.KEYID = 7
1,515,883 UART: [ldev] FE.KEYID = 1
1,520,961 UART: [ldev] Erasing FE.KEYID = 1
1,546,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,316 UART: [ldev] --
1,585,725 UART: [fwproc] Waiting for Commands...
1,586,546 UART: [fwproc] Received command 0x46574c44
1,587,337 UART: [fwproc] Received Image of size 114332 bytes
2,883,614 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,742 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,981 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,466,165 >>> mbox cmd response: failed
1,466,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,171 >>> mbox cmd response: failed
1,466,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,007 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,743 UART: [kat] LMS
1,475,939 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,171 UART: [idev] ++
1,480,339 UART: [idev] CDI.KEYID = 6
1,480,699 UART: [idev] SUBJECT.KEYID = 7
1,481,123 UART: [idev] UDS.KEYID = 0
1,481,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,199 UART: [idev] Erasing UDS.KEYID = 0
1,505,545 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,063 UART: [idev] --
1,515,254 UART: [ldev] ++
1,515,422 UART: [ldev] CDI.KEYID = 6
1,515,785 UART: [ldev] SUBJECT.KEYID = 5
1,516,211 UART: [ldev] AUTHORITY.KEYID = 7
1,516,674 UART: [ldev] FE.KEYID = 1
1,522,158 UART: [ldev] Erasing FE.KEYID = 1
1,548,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,671 UART: [ldev] --
1,586,974 UART: [fwproc] Waiting for Commands...
1,587,619 UART: [fwproc] Received command 0x46574c44
1,588,410 UART: [fwproc] Received Image of size 114332 bytes
1,614,346 UART: ROM Fatal Error: 0x000B0032
1,615,503 >>> mbox cmd response: failed
1,615,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,509 >>> mbox cmd response: failed
1,615,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,343 UART: [kat] LMS
1,475,539 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,886 UART: [fht] Storing FHT @ 0x50003400
1,479,775 UART: [idev] ++
1,479,943 UART: [idev] CDI.KEYID = 6
1,480,303 UART: [idev] SUBJECT.KEYID = 7
1,480,727 UART: [idev] UDS.KEYID = 0
1,481,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,857 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,355 UART: [idev] --
1,515,650 UART: [ldev] ++
1,515,818 UART: [ldev] CDI.KEYID = 6
1,516,181 UART: [ldev] SUBJECT.KEYID = 5
1,516,607 UART: [ldev] AUTHORITY.KEYID = 7
1,517,070 UART: [ldev] FE.KEYID = 1
1,522,056 UART: [ldev] Erasing FE.KEYID = 1
1,547,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,879 UART: [ldev] --
1,586,280 UART: [fwproc] Waiting for Commands...
1,587,107 UART: [fwproc] Received command 0x46574c44
1,587,898 UART: [fwproc] Received Image of size 114332 bytes
2,885,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,884 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,468,036 >>> mbox cmd response: failed
1,468,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,042 >>> mbox cmd response: failed
1,468,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,312 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,072 UART: [kat] SHA2-256
892,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,847 UART: [kat] ++
896,999 UART: [kat] sha1
901,143 UART: [kat] SHA2-256
903,083 UART: [kat] SHA2-384
906,012 UART: [kat] SHA2-512-ACC
907,913 UART: [kat] ECC-384
917,754 UART: [kat] HMAC-384Kdf
922,166 UART: [kat] LMS
1,170,494 UART: [kat] --
1,171,267 UART: [cold-reset] ++
1,171,765 UART: [fht] FHT @ 0x50003400
1,174,660 UART: [idev] ++
1,174,828 UART: [idev] CDI.KEYID = 6
1,175,188 UART: [idev] SUBJECT.KEYID = 7
1,175,612 UART: [idev] UDS.KEYID = 0
1,175,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,208,801 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,283,996 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,172 UART: ROM Fatal Error: 0x000B0032
1,311,329 >>> mbox cmd response: failed
1,311,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,335 >>> mbox cmd response: failed
1,311,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Unprovisioned
86,275 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,072 UART: [kat] SHA2-256
893,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,847 UART: [kat] ++
897,999 UART: [kat] sha1
902,443 UART: [kat] SHA2-256
904,383 UART: [kat] SHA2-384
907,020 UART: [kat] SHA2-512-ACC
908,921 UART: [kat] ECC-384
918,720 UART: [kat] HMAC-384Kdf
923,152 UART: [kat] LMS
1,171,480 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,592 UART: [idev] ++
1,175,760 UART: [idev] CDI.KEYID = 6
1,176,120 UART: [idev] SUBJECT.KEYID = 7
1,176,544 UART: [idev] UDS.KEYID = 0
1,176,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,610 UART: [idev] Erasing UDS.KEYID = 0
1,201,847 UART: [idev] Sha1 KeyId Algorithm
1,210,275 UART: [idev] --
1,211,135 UART: [ldev] ++
1,211,303 UART: [ldev] CDI.KEYID = 6
1,211,666 UART: [ldev] SUBJECT.KEYID = 5
1,212,092 UART: [ldev] AUTHORITY.KEYID = 7
1,212,555 UART: [ldev] FE.KEYID = 1
1,217,911 UART: [ldev] Erasing FE.KEYID = 1
1,244,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,005 UART: [ldev] --
1,283,394 UART: [fwproc] Wait for Commands...
1,284,054 UART: [fwproc] Recv command 0x46574c44
1,284,782 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,042 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,904 >>> mbox cmd response: failed
1,166,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,910 >>> mbox cmd response: failed
1,166,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,603 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,101 UART: [kat] HMAC-384Kdf
922,761 UART: [kat] LMS
1,171,089 UART: [kat] --
1,171,828 UART: [cold-reset] ++
1,172,318 UART: [fht] FHT @ 0x50003400
1,174,897 UART: [idev] ++
1,175,065 UART: [idev] CDI.KEYID = 6
1,175,425 UART: [idev] SUBJECT.KEYID = 7
1,175,849 UART: [idev] UDS.KEYID = 0
1,176,194 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,949 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,209,904 UART: [idev] --
1,211,096 UART: [ldev] ++
1,211,264 UART: [ldev] CDI.KEYID = 6
1,211,627 UART: [ldev] SUBJECT.KEYID = 5
1,212,053 UART: [ldev] AUTHORITY.KEYID = 7
1,212,516 UART: [ldev] FE.KEYID = 1
1,217,814 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,980 UART: [ldev] --
1,283,433 UART: [fwproc] Wait for Commands...
1,284,053 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,713 UART: ROM Fatal Error: 0x000B0032
1,311,870 >>> mbox cmd response: failed
1,311,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,876 >>> mbox cmd response: failed
1,311,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,443 UART: [kat] LMS
1,171,771 UART: [kat] --
1,172,872 UART: [cold-reset] ++
1,173,292 UART: [fht] FHT @ 0x50003400
1,175,923 UART: [idev] ++
1,176,091 UART: [idev] CDI.KEYID = 6
1,176,451 UART: [idev] SUBJECT.KEYID = 7
1,176,875 UART: [idev] UDS.KEYID = 0
1,177,220 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,210,024 UART: [idev] --
1,211,160 UART: [ldev] ++
1,211,328 UART: [ldev] CDI.KEYID = 6
1,211,691 UART: [ldev] SUBJECT.KEYID = 5
1,212,117 UART: [ldev] AUTHORITY.KEYID = 7
1,212,580 UART: [ldev] FE.KEYID = 1
1,217,760 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,286 UART: [ldev] --
1,283,797 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,749 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,151 >>> mbox cmd response: failed
1,166,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,157 >>> mbox cmd response: failed
1,166,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,220 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,046 UART: ROM Fatal Error: 0x000B0032
1,309,203 >>> mbox cmd response: failed
1,309,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,209 >>> mbox cmd response: failed
1,309,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,526 UART: [kat] HMAC-384Kdf
920,150 UART: [kat] LMS
1,168,462 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,173,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,862 UART: [ldev] ++
1,209,030 UART: [ldev] CDI.KEYID = 6
1,209,394 UART: [ldev] SUBJECT.KEYID = 5
1,209,821 UART: [ldev] AUTHORITY.KEYID = 7
1,210,284 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,242,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,492 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,946 >>> mbox cmd response: failed
1,161,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,952 >>> mbox cmd response: failed
1,161,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,612 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,174,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,334 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,763 UART: [ldev] --
1,282,129 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,603 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,935 UART: ROM Fatal Error: 0x000B0032
1,310,092 >>> mbox cmd response: failed
1,310,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,098 >>> mbox cmd response: failed
1,310,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,362 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x46574c44
1,282,925 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,721 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,179 >>> mbox cmd response: failed
1,162,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,185 >>> mbox cmd response: failed
1,162,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,057 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,089 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,617 UART: [kat] SHA2-256
881,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,663 UART: [kat] ++
885,815 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,104 UART: [kat] HMAC-384Kdf
906,726 UART: [kat] LMS
1,474,922 UART: [kat] --
1,475,779 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,244 UART: [idev] ++
1,479,412 UART: [idev] CDI.KEYID = 6
1,479,772 UART: [idev] SUBJECT.KEYID = 7
1,480,196 UART: [idev] UDS.KEYID = 0
1,480,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,416 UART: [idev] Erasing UDS.KEYID = 0
1,505,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,616 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,696 UART: [ldev] --
1,586,099 UART: [fwproc] Waiting for Commands...
1,586,784 UART: [fwproc] Received command 0x46574c44
1,587,575 UART: [fwproc] Received Image of size 114332 bytes
1,613,646 UART: ROM Fatal Error: 0x00B0003A
1,614,807 >>> mbox cmd response: failed
1,614,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,813 >>> mbox cmd response: failed
1,614,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,679 UART: [cold-reset] ++
1,477,227 UART: [fht] Storing FHT @ 0x50003400
1,480,010 UART: [idev] ++
1,480,178 UART: [idev] CDI.KEYID = 6
1,480,538 UART: [idev] SUBJECT.KEYID = 7
1,480,962 UART: [idev] UDS.KEYID = 0
1,481,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,792 UART: [idev] Erasing UDS.KEYID = 0
1,505,382 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,962 UART: [idev] --
1,515,111 UART: [ldev] ++
1,515,279 UART: [ldev] CDI.KEYID = 6
1,515,642 UART: [ldev] SUBJECT.KEYID = 5
1,516,068 UART: [ldev] AUTHORITY.KEYID = 7
1,516,531 UART: [ldev] FE.KEYID = 1
1,521,663 UART: [ldev] Erasing FE.KEYID = 1
1,547,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,533 UART: [fwproc] Waiting for Commands...
1,587,322 UART: [fwproc] Received command 0x46574c44
1,588,113 UART: [fwproc] Received Image of size 114332 bytes
2,885,228 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,022 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,466,466 >>> mbox cmd response: failed
1,466,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,472 >>> mbox cmd response: failed
1,466,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,445 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,856 UART: [kat] SHA2-256
881,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,902 UART: [kat] ++
886,054 UART: [kat] sha1
890,500 UART: [kat] SHA2-256
892,438 UART: [kat] SHA2-384
895,357 UART: [kat] SHA2-512-ACC
897,258 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,905 UART: [idev] Erasing UDS.KEYID = 0
1,505,719 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,293 UART: [idev] --
1,515,144 UART: [ldev] ++
1,515,312 UART: [ldev] CDI.KEYID = 6
1,515,675 UART: [ldev] SUBJECT.KEYID = 5
1,516,101 UART: [ldev] AUTHORITY.KEYID = 7
1,516,564 UART: [ldev] FE.KEYID = 1
1,521,588 UART: [ldev] Erasing FE.KEYID = 1
1,547,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,509 UART: [ldev] --
1,586,872 UART: [fwproc] Waiting for Commands...
1,587,715 UART: [fwproc] Received command 0x46574c44
1,588,506 UART: [fwproc] Received Image of size 114332 bytes
1,614,979 UART: ROM Fatal Error: 0x00B0003A
1,616,140 >>> mbox cmd response: failed
1,616,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,146 >>> mbox cmd response: failed
1,616,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,566 UART: [kat] SHA2-256
892,504 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,427 UART: [kat] LMS
1,475,623 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,233 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,863 UART: [idev] --
1,514,866 UART: [ldev] ++
1,515,034 UART: [ldev] CDI.KEYID = 6
1,515,397 UART: [ldev] SUBJECT.KEYID = 5
1,515,823 UART: [ldev] AUTHORITY.KEYID = 7
1,516,286 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,547,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,499 UART: [ldev] --
1,586,940 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 114332 bytes
2,885,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,900 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,470,075 >>> mbox cmd response: failed
1,470,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,081 >>> mbox cmd response: failed
1,470,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,674 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
922,948 UART: [kat] LMS
1,171,276 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,611 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,202 UART: [idev] Erasing UDS.KEYID = 0
1,200,679 UART: [idev] Sha1 KeyId Algorithm
1,209,095 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,528 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,342 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,688 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,845 UART: ROM Fatal Error: 0x00B0003A
1,311,006 >>> mbox cmd response: failed
1,311,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,012 >>> mbox cmd response: failed
1,311,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,384 UART: [kat] SHA2-512-ACC
908,285 UART: [kat] ECC-384
917,742 UART: [kat] HMAC-384Kdf
922,152 UART: [kat] LMS
1,170,480 UART: [kat] --
1,171,327 UART: [cold-reset] ++
1,171,655 UART: [fht] FHT @ 0x50003400
1,174,404 UART: [idev] ++
1,174,572 UART: [idev] CDI.KEYID = 6
1,174,932 UART: [idev] SUBJECT.KEYID = 7
1,175,356 UART: [idev] UDS.KEYID = 0
1,175,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,208,519 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,110 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,080 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,165,681 >>> mbox cmd response: failed
1,165,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,687 >>> mbox cmd response: failed
1,165,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,321 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
907,105 UART: [kat] SHA2-512-ACC
909,006 UART: [kat] ECC-384
919,015 UART: [kat] HMAC-384Kdf
923,599 UART: [kat] LMS
1,171,927 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,084 UART: [fht] FHT @ 0x50003400
1,175,859 UART: [idev] ++
1,176,027 UART: [idev] CDI.KEYID = 6
1,176,387 UART: [idev] SUBJECT.KEYID = 7
1,176,811 UART: [idev] UDS.KEYID = 0
1,177,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,681 UART: [idev] Erasing UDS.KEYID = 0
1,201,840 UART: [idev] Sha1 KeyId Algorithm
1,210,264 UART: [idev] --
1,211,462 UART: [ldev] ++
1,211,630 UART: [ldev] CDI.KEYID = 6
1,211,993 UART: [ldev] SUBJECT.KEYID = 5
1,212,419 UART: [ldev] AUTHORITY.KEYID = 7
1,212,882 UART: [ldev] FE.KEYID = 1
1,218,210 UART: [ldev] Erasing FE.KEYID = 1
1,244,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,774 UART: [ldev] --
1,284,069 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 114332 bytes
1,311,872 UART: ROM Fatal Error: 0x00B0003A
1,313,033 >>> mbox cmd response: failed
1,313,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,039 >>> mbox cmd response: failed
1,313,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,245 UART: [kat] LMS
1,171,573 UART: [kat] --
1,172,882 UART: [cold-reset] ++
1,173,268 UART: [fht] FHT @ 0x50003400
1,175,749 UART: [idev] ++
1,175,917 UART: [idev] CDI.KEYID = 6
1,176,277 UART: [idev] SUBJECT.KEYID = 7
1,176,701 UART: [idev] UDS.KEYID = 0
1,177,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,849 UART: [idev] Erasing UDS.KEYID = 0
1,202,018 UART: [idev] Sha1 KeyId Algorithm
1,210,380 UART: [idev] --
1,211,402 UART: [ldev] ++
1,211,570 UART: [ldev] CDI.KEYID = 6
1,211,933 UART: [ldev] SUBJECT.KEYID = 5
1,212,359 UART: [ldev] AUTHORITY.KEYID = 7
1,212,822 UART: [ldev] FE.KEYID = 1
1,218,104 UART: [ldev] Erasing FE.KEYID = 1
1,245,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,410 UART: [ldev] --
1,284,895 UART: [fwproc] Wait for Commands...
1,285,695 UART: [fwproc] Recv command 0x46574c44
1,286,423 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,535 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,750 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,824 >>> mbox cmd response: failed
1,166,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,830 >>> mbox cmd response: failed
1,166,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,636 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,178 UART: [ldev] ++
1,209,346 UART: [ldev] CDI.KEYID = 6
1,209,710 UART: [ldev] SUBJECT.KEYID = 5
1,210,137 UART: [ldev] AUTHORITY.KEYID = 7
1,210,600 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,133 UART: [fwproc] Recv command 0x46574c44
1,282,866 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,849 UART: ROM Fatal Error: 0x00B0003A
1,311,010 >>> mbox cmd response: failed
1,311,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,016 >>> mbox cmd response: failed
1,311,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,418 UART: [kat] HMAC-384Kdf
919,950 UART: [kat] LMS
1,168,262 UART: [kat] --
1,169,055 UART: [cold-reset] ++
1,169,599 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
1,173,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,283 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,471 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,282,075 UART: [fwproc] Recv command 0x46574c44
1,282,808 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,294 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,931 >>> mbox cmd response: failed
1,161,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,937 >>> mbox cmd response: failed
1,161,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,164 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,966 UART: [kat] ++
896,118 UART: [kat] sha1
900,562 UART: [kat] SHA2-256
902,502 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
917,215 UART: [kat] HMAC-384Kdf
921,891 UART: [kat] LMS
1,170,203 UART: [kat] --
1,171,128 UART: [cold-reset] ++
1,171,616 UART: [fht] FHT @ 0x50003400
1,174,290 UART: [idev] ++
1,174,458 UART: [idev] CDI.KEYID = 6
1,174,819 UART: [idev] SUBJECT.KEYID = 7
1,175,244 UART: [idev] UDS.KEYID = 0
1,175,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,450 UART: [idev] Sha1 KeyId Algorithm
1,209,330 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,111 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,004 UART: ROM Fatal Error: 0x00B0003A
1,311,165 >>> mbox cmd response: failed
1,311,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,171 >>> mbox cmd response: failed
1,311,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,687 UART: [ldev] --
1,283,149 UART: [fwproc] Wait for Commands...
1,283,792 UART: [fwproc] Recv command 0x46574c44
1,284,525 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,433 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,720 >>> mbox cmd response: failed
1,161,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,726 >>> mbox cmd response: failed
1,161,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,785 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,317 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,125 UART: [cold-reset] ++
1,476,487 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,234 UART: [idev] Erasing UDS.KEYID = 0
1,504,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,727 UART: [ldev] ++
1,514,895 UART: [ldev] CDI.KEYID = 6
1,515,258 UART: [ldev] SUBJECT.KEYID = 5
1,515,684 UART: [ldev] AUTHORITY.KEYID = 7
1,516,147 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,360 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 114332 bytes
2,761,956 UART: ROM Fatal Error: 0x000B0033
2,763,113 >>> mbox cmd response: failed
2,763,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,119 >>> mbox cmd response: failed
2,763,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,943 UART: [fht] Storing FHT @ 0x50003400
1,479,680 UART: [idev] ++
1,479,848 UART: [idev] CDI.KEYID = 6
1,480,208 UART: [idev] SUBJECT.KEYID = 7
1,480,632 UART: [idev] UDS.KEYID = 0
1,480,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,819 UART: [ldev] ++
1,514,987 UART: [ldev] CDI.KEYID = 6
1,515,350 UART: [ldev] SUBJECT.KEYID = 5
1,515,776 UART: [ldev] AUTHORITY.KEYID = 7
1,516,239 UART: [ldev] FE.KEYID = 1
1,521,503 UART: [ldev] Erasing FE.KEYID = 1
1,547,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,396 UART: [ldev] --
1,586,829 UART: [fwproc] Waiting for Commands...
1,587,658 UART: [fwproc] Received command 0x46574c44
1,588,449 UART: [fwproc] Received Image of size 114332 bytes
2,887,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,691,076 >>> mbox cmd response: failed
2,691,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,691,082 >>> mbox cmd response: failed
2,691,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,691,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,985 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,683 UART: [kat] SHA2-512-ACC
897,584 UART: [kat] ECC-384
903,329 UART: [kat] HMAC-384Kdf
908,003 UART: [kat] LMS
1,476,199 UART: [kat] --
1,477,418 UART: [cold-reset] ++
1,477,846 UART: [fht] Storing FHT @ 0x50003400
1,480,565 UART: [idev] ++
1,480,733 UART: [idev] CDI.KEYID = 6
1,481,093 UART: [idev] SUBJECT.KEYID = 7
1,481,517 UART: [idev] UDS.KEYID = 0
1,481,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,367 UART: [idev] Erasing UDS.KEYID = 0
1,506,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,889 UART: [idev] --
1,515,936 UART: [ldev] ++
1,516,104 UART: [ldev] CDI.KEYID = 6
1,516,467 UART: [ldev] SUBJECT.KEYID = 5
1,516,893 UART: [ldev] AUTHORITY.KEYID = 7
1,517,356 UART: [ldev] FE.KEYID = 1
1,522,498 UART: [ldev] Erasing FE.KEYID = 1
1,547,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,787 UART: [ldev] --
1,587,190 UART: [fwproc] Waiting for Commands...
1,588,045 UART: [fwproc] Received command 0x46574c44
1,588,836 UART: [fwproc] Received Image of size 114332 bytes
2,765,213 UART: ROM Fatal Error: 0x000B0033
2,766,370 >>> mbox cmd response: failed
2,766,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,376 >>> mbox cmd response: failed
2,766,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,906 UART: [kat] SHA2-256
881,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,952 UART: [kat] ++
886,104 UART: [kat] sha1
890,182 UART: [kat] SHA2-256
892,120 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,381 UART: [kat] HMAC-384Kdf
907,089 UART: [kat] LMS
1,475,285 UART: [kat] --
1,476,190 UART: [cold-reset] ++
1,476,650 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,057 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,485 UART: [idev] --
1,514,520 UART: [ldev] ++
1,514,688 UART: [ldev] CDI.KEYID = 6
1,515,051 UART: [ldev] SUBJECT.KEYID = 5
1,515,477 UART: [ldev] AUTHORITY.KEYID = 7
1,515,940 UART: [ldev] FE.KEYID = 1
1,521,072 UART: [ldev] Erasing FE.KEYID = 1
1,546,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,863 UART: [ldev] --
1,585,136 UART: [fwproc] Waiting for Commands...
1,585,891 UART: [fwproc] Received command 0x46574c44
1,586,682 UART: [fwproc] Received Image of size 114332 bytes
2,884,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,881 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,212 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,654,926 >>> mbox cmd response: failed
2,654,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,932 >>> mbox cmd response: failed
2,654,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,018 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
893,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,667 UART: [kat] ++
897,819 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,907 UART: [cold-reset] ++
1,172,447 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,598 UART: [idev] Erasing UDS.KEYID = 0
1,200,513 UART: [idev] Sha1 KeyId Algorithm
1,208,967 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,312 UART: [fwproc] Recv'd Img size: 114332 bytes
1,587,978 UART: ROM Fatal Error: 0x000B0033
1,589,135 >>> mbox cmd response: failed
1,589,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,141 >>> mbox cmd response: failed
1,589,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
902,115 UART: [kat] SHA2-256
904,055 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,634 UART: [kat] HMAC-384Kdf
923,218 UART: [kat] LMS
1,171,546 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,481 UART: [fht] FHT @ 0x50003400
1,175,190 UART: [idev] ++
1,175,358 UART: [idev] CDI.KEYID = 6
1,175,718 UART: [idev] SUBJECT.KEYID = 7
1,176,142 UART: [idev] UDS.KEYID = 0
1,176,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,138 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,555 UART: [idev] --
1,210,591 UART: [ldev] ++
1,210,759 UART: [ldev] CDI.KEYID = 6
1,211,122 UART: [ldev] SUBJECT.KEYID = 5
1,211,548 UART: [ldev] AUTHORITY.KEYID = 7
1,212,011 UART: [ldev] FE.KEYID = 1
1,217,221 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,440 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,158 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,447,129 >>> mbox cmd response: failed
1,447,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,135 >>> mbox cmd response: failed
1,447,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,913 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
919,189 UART: [kat] HMAC-384Kdf
923,871 UART: [kat] LMS
1,172,199 UART: [kat] --
1,172,962 UART: [cold-reset] ++
1,173,466 UART: [fht] FHT @ 0x50003400
1,176,301 UART: [idev] ++
1,176,469 UART: [idev] CDI.KEYID = 6
1,176,829 UART: [idev] SUBJECT.KEYID = 7
1,177,253 UART: [idev] UDS.KEYID = 0
1,177,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,389 UART: [idev] Erasing UDS.KEYID = 0
1,203,122 UART: [idev] Sha1 KeyId Algorithm
1,211,668 UART: [idev] --
1,212,698 UART: [ldev] ++
1,212,866 UART: [ldev] CDI.KEYID = 6
1,213,229 UART: [ldev] SUBJECT.KEYID = 5
1,213,655 UART: [ldev] AUTHORITY.KEYID = 7
1,214,118 UART: [ldev] FE.KEYID = 1
1,219,346 UART: [ldev] Erasing FE.KEYID = 1
1,245,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,194 UART: [ldev] --
1,284,553 UART: [fwproc] Wait for Commands...
1,285,295 UART: [fwproc] Recv command 0x46574c44
1,286,023 UART: [fwproc] Recv'd Img size: 114332 bytes
1,593,594 UART: ROM Fatal Error: 0x000B0033
1,594,751 >>> mbox cmd response: failed
1,594,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,757 >>> mbox cmd response: failed
1,594,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,085 UART: [kat] SHA2-512-ACC
908,986 UART: [kat] ECC-384
918,917 UART: [kat] HMAC-384Kdf
923,649 UART: [kat] LMS
1,171,977 UART: [kat] --
1,172,776 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,176,145 UART: [idev] ++
1,176,313 UART: [idev] CDI.KEYID = 6
1,176,673 UART: [idev] SUBJECT.KEYID = 7
1,177,097 UART: [idev] UDS.KEYID = 0
1,177,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,021 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,294 UART: [idev] --
1,211,302 UART: [ldev] ++
1,211,470 UART: [ldev] CDI.KEYID = 6
1,211,833 UART: [ldev] SUBJECT.KEYID = 5
1,212,259 UART: [ldev] AUTHORITY.KEYID = 7
1,212,722 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,243,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,886 UART: [ldev] --
1,283,309 UART: [fwproc] Wait for Commands...
1,283,933 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,063 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,492 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,456,769 >>> mbox cmd response: failed
1,456,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,456,775 >>> mbox cmd response: failed
1,456,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,456,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,026 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,490 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,513 UART: [idev] ++
1,173,681 UART: [idev] CDI.KEYID = 6
1,174,042 UART: [idev] SUBJECT.KEYID = 7
1,174,467 UART: [idev] UDS.KEYID = 0
1,174,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,780 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 114332 bytes
1,598,234 UART: ROM Fatal Error: 0x000B0033
1,599,391 >>> mbox cmd response: failed
1,599,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,397 >>> mbox cmd response: failed
1,599,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,173,837 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,197,951 UART: [idev] Sha1 KeyId Algorithm
1,206,835 UART: [idev] --
1,207,962 UART: [ldev] ++
1,208,130 UART: [ldev] CDI.KEYID = 6
1,208,494 UART: [ldev] SUBJECT.KEYID = 5
1,208,921 UART: [ldev] AUTHORITY.KEYID = 7
1,209,384 UART: [ldev] FE.KEYID = 1
1,214,526 UART: [ldev] Erasing FE.KEYID = 1
1,240,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,494 UART: [ldev] --
1,279,990 UART: [fwproc] Wait for Commands...
1,280,739 UART: [fwproc] Recv command 0x46574c44
1,281,472 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,598 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,452,082 >>> mbox cmd response: failed
1,452,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,088 >>> mbox cmd response: failed
1,452,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,172 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,091 UART: [state] LifecycleState = Unprovisioned
86,746 UART: [state] DebugLocked = No
87,310 UART: [state] WD Timer not started. Device not locked for debugging
88,429 UART: [kat] SHA2-256
891,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,108 UART: [kat] ++
896,260 UART: [kat] sha1
900,332 UART: [kat] SHA2-256
902,272 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,174,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,508 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,391 UART: [ldev] ++
1,208,559 UART: [ldev] CDI.KEYID = 6
1,208,923 UART: [ldev] SUBJECT.KEYID = 5
1,209,350 UART: [ldev] AUTHORITY.KEYID = 7
1,209,813 UART: [ldev] FE.KEYID = 1
1,214,935 UART: [ldev] Erasing FE.KEYID = 1
1,241,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,139 UART: [ldev] --
1,280,647 UART: [fwproc] Wait for Commands...
1,281,290 UART: [fwproc] Recv command 0x46574c44
1,282,023 UART: [fwproc] Recv'd Img size: 114332 bytes
1,591,359 UART: ROM Fatal Error: 0x000B0033
1,592,516 >>> mbox cmd response: failed
1,592,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,522 >>> mbox cmd response: failed
1,592,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,271 UART: [kat] LMS
1,169,583 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,170,990 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,174,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,899 UART: [ldev] ++
1,210,067 UART: [ldev] CDI.KEYID = 6
1,210,431 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,242,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,450,222 >>> mbox cmd response: failed
1,450,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,228 >>> mbox cmd response: failed
1,450,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,999 >>> mbox cmd response: failed
1,197,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,005 >>> mbox cmd response: failed
1,198,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,375 UART: [kat] SHA2-256
892,313 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,469 UART: [fht] Storing FHT @ 0x50003400
1,479,058 UART: [idev] ++
1,479,226 UART: [idev] CDI.KEYID = 6
1,479,586 UART: [idev] SUBJECT.KEYID = 7
1,480,010 UART: [idev] UDS.KEYID = 0
1,480,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,930 UART: [idev] Erasing UDS.KEYID = 0
1,504,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,016 UART: [idev] --
1,514,085 UART: [ldev] ++
1,514,253 UART: [ldev] CDI.KEYID = 6
1,514,616 UART: [ldev] SUBJECT.KEYID = 5
1,515,042 UART: [ldev] AUTHORITY.KEYID = 7
1,515,505 UART: [ldev] FE.KEYID = 1
1,520,513 UART: [ldev] Erasing FE.KEYID = 1
1,545,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,248 UART: [ldev] --
1,585,751 UART: [fwproc] Waiting for Commands...
1,586,574 UART: [fwproc] Received command 0x46574c44
1,587,365 UART: [fwproc] Received Image of size 114332 bytes
2,884,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,048 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,611 >>> mbox cmd response: failed
1,196,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,617 >>> mbox cmd response: failed
1,196,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,852 >>> mbox cmd response: failed
1,198,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,858 >>> mbox cmd response: failed
1,198,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,395 UART: [kat] SHA2-512-ACC
897,296 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,139 UART: [idev] Erasing UDS.KEYID = 0
1,506,017 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,423 UART: [idev] --
1,515,638 UART: [ldev] ++
1,515,806 UART: [ldev] CDI.KEYID = 6
1,516,169 UART: [ldev] SUBJECT.KEYID = 5
1,516,595 UART: [ldev] AUTHORITY.KEYID = 7
1,517,058 UART: [ldev] FE.KEYID = 1
1,522,068 UART: [ldev] Erasing FE.KEYID = 1
1,547,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,531 UART: [ldev] --
1,586,992 UART: [fwproc] Waiting for Commands...
1,587,791 UART: [fwproc] Received command 0x46574c44
1,588,582 UART: [fwproc] Received Image of size 114332 bytes
2,885,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,570 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,900 >>> mbox cmd response: failed
1,197,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,906 >>> mbox cmd response: failed
1,197,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,938 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,759 >>> mbox cmd response: failed
1,197,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,765 >>> mbox cmd response: failed
1,197,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
893,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,245 UART: [kat] ++
897,397 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,777 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,580 UART: [idev] Erasing UDS.KEYID = 0
1,200,067 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,252 UART: [fwproc] Wait for Commands...
1,281,966 UART: [fwproc] Recv command 0x46574c44
1,282,694 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,952 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,009 >>> mbox cmd response: failed
1,197,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,015 >>> mbox cmd response: failed
1,197,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,839 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,474 >>> mbox cmd response: failed
1,197,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,480 >>> mbox cmd response: failed
1,197,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,538 UART: [kat] SHA2-256
904,478 UART: [kat] SHA2-384
907,357 UART: [kat] SHA2-512-ACC
909,258 UART: [kat] ECC-384
919,111 UART: [kat] HMAC-384Kdf
923,693 UART: [kat] LMS
1,172,021 UART: [kat] --
1,172,846 UART: [cold-reset] ++
1,173,358 UART: [fht] FHT @ 0x50003400
1,176,017 UART: [idev] ++
1,176,185 UART: [idev] CDI.KEYID = 6
1,176,545 UART: [idev] SUBJECT.KEYID = 7
1,176,969 UART: [idev] UDS.KEYID = 0
1,177,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,757 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,512 UART: [ldev] ++
1,211,680 UART: [ldev] CDI.KEYID = 6
1,212,043 UART: [ldev] SUBJECT.KEYID = 5
1,212,469 UART: [ldev] AUTHORITY.KEYID = 7
1,212,932 UART: [ldev] FE.KEYID = 1
1,218,496 UART: [ldev] Erasing FE.KEYID = 1
1,245,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,190 UART: [ldev] --
1,284,561 UART: [fwproc] Wait for Commands...
1,285,141 UART: [fwproc] Recv command 0x46574c44
1,285,869 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,009 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,590 >>> mbox cmd response: failed
1,197,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,596 >>> mbox cmd response: failed
1,197,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,907 >>> mbox cmd response: failed
1,196,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,913 >>> mbox cmd response: failed
1,196,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,220 UART: [kat] SHA2-256
890,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,899 UART: [kat] ++
895,051 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,535 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,174,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,321 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,517 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,944 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,224 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,103 >>> mbox cmd response: failed
1,197,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,109 >>> mbox cmd response: failed
1,197,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,234 >>> mbox cmd response: failed
1,197,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,240 >>> mbox cmd response: failed
1,197,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,207 UART: [kat] SHA2-512-ACC
906,108 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,173,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,646 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,913 UART: [ldev] ++
1,209,081 UART: [ldev] CDI.KEYID = 6
1,209,445 UART: [ldev] SUBJECT.KEYID = 5
1,209,872 UART: [ldev] AUTHORITY.KEYID = 7
1,210,335 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,739 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,599 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,871 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,494 >>> mbox cmd response: failed
1,197,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,500 >>> mbox cmd response: failed
1,197,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,591 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,293 >>> mbox cmd response: failed
1,178,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,299 >>> mbox cmd response: failed
1,178,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,286 UART: [kat] SHA2-512-ACC
897,187 UART: [kat] ECC-384
902,892 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,559 UART: [cold-reset] ++
1,477,101 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,684 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,482 UART: [idev] --
1,514,547 UART: [ldev] ++
1,514,715 UART: [ldev] CDI.KEYID = 6
1,515,078 UART: [ldev] SUBJECT.KEYID = 5
1,515,504 UART: [ldev] AUTHORITY.KEYID = 7
1,515,967 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,980 UART: [ldev] --
1,585,483 UART: [fwproc] Waiting for Commands...
1,586,148 UART: [fwproc] Received command 0x46574c44
1,586,939 UART: [fwproc] Received Image of size 114332 bytes
2,884,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,009 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,155 >>> mbox cmd response: failed
1,180,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,161 >>> mbox cmd response: failed
1,180,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,839 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,660 >>> mbox cmd response: failed
1,180,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,666 >>> mbox cmd response: failed
1,180,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,814 UART: [kat] SHA2-256
881,745 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,860 UART: [kat] ++
886,012 UART: [kat] sha1
890,250 UART: [kat] SHA2-256
892,188 UART: [kat] SHA2-384
894,755 UART: [kat] SHA2-512-ACC
896,656 UART: [kat] ECC-384
902,333 UART: [kat] HMAC-384Kdf
907,129 UART: [kat] LMS
1,475,325 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,485 UART: [idev] ++
1,479,653 UART: [idev] CDI.KEYID = 6
1,480,013 UART: [idev] SUBJECT.KEYID = 7
1,480,437 UART: [idev] UDS.KEYID = 0
1,480,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,597 UART: [idev] Erasing UDS.KEYID = 0
1,505,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,473 UART: [idev] --
1,515,658 UART: [ldev] ++
1,515,826 UART: [ldev] CDI.KEYID = 6
1,516,189 UART: [ldev] SUBJECT.KEYID = 5
1,516,615 UART: [ldev] AUTHORITY.KEYID = 7
1,517,078 UART: [ldev] FE.KEYID = 1
1,522,438 UART: [ldev] Erasing FE.KEYID = 1
1,548,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,613 UART: [ldev] --
1,587,884 UART: [fwproc] Waiting for Commands...
1,588,697 UART: [fwproc] Received command 0x46574c44
1,589,488 UART: [fwproc] Received Image of size 114332 bytes
2,886,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,377 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,262 >>> mbox cmd response: failed
1,180,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,268 >>> mbox cmd response: failed
1,180,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,500 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,975 >>> mbox cmd response: failed
1,178,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,981 >>> mbox cmd response: failed
1,178,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,422 UART: [kat] SHA2-512-ACC
908,323 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,534 UART: [kat] LMS
1,170,862 UART: [kat] --
1,171,433 UART: [cold-reset] ++
1,171,929 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,062 UART: [idev] SUBJECT.KEYID = 7
1,175,486 UART: [idev] UDS.KEYID = 0
1,175,831 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,550 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,422 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,827 >>> mbox cmd response: failed
1,180,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,833 >>> mbox cmd response: failed
1,180,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,485 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,816 >>> mbox cmd response: failed
1,180,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,822 >>> mbox cmd response: failed
1,180,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,055 UART: [kat] HMAC-384Kdf
922,863 UART: [kat] LMS
1,171,191 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,336 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,211,162 UART: [ldev] ++
1,211,330 UART: [ldev] CDI.KEYID = 6
1,211,693 UART: [ldev] SUBJECT.KEYID = 5
1,212,119 UART: [ldev] AUTHORITY.KEYID = 7
1,212,582 UART: [ldev] FE.KEYID = 1
1,217,758 UART: [ldev] Erasing FE.KEYID = 1
1,244,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,678 UART: [ldev] --
1,283,081 UART: [fwproc] Wait for Commands...
1,283,687 UART: [fwproc] Recv command 0x46574c44
1,284,415 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,301 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,102 >>> mbox cmd response: failed
1,179,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,108 >>> mbox cmd response: failed
1,179,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,724 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,065 >>> mbox cmd response: failed
1,179,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,071 >>> mbox cmd response: failed
1,179,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,162 UART: [kat] LMS
1,169,474 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,079 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,523 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,281,961 UART: [fwproc] Recv command 0x46574c44
1,282,694 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,157 >>> mbox cmd response: failed
1,179,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,163 >>> mbox cmd response: failed
1,179,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,398 >>> mbox cmd response: failed
1,179,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,404 >>> mbox cmd response: failed
1,179,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,705 UART: [state] LifecycleState = Unprovisioned
85,360 UART: [state] DebugLocked = No
85,888 UART: [state] WD Timer not started. Device not locked for debugging
87,175 UART: [kat] SHA2-256
890,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,854 UART: [kat] ++
895,006 UART: [kat] sha1
899,136 UART: [kat] SHA2-256
901,076 UART: [kat] SHA2-384
903,893 UART: [kat] SHA2-512-ACC
905,794 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,238 UART: [cold-reset] ++
1,169,642 UART: [fht] FHT @ 0x50003400
1,172,242 UART: [idev] ++
1,172,410 UART: [idev] CDI.KEYID = 6
1,172,771 UART: [idev] SUBJECT.KEYID = 7
1,173,196 UART: [idev] UDS.KEYID = 0
1,173,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,048 UART: [idev] Erasing UDS.KEYID = 0
1,197,662 UART: [idev] Sha1 KeyId Algorithm
1,206,488 UART: [idev] --
1,207,365 UART: [ldev] ++
1,207,533 UART: [ldev] CDI.KEYID = 6
1,207,897 UART: [ldev] SUBJECT.KEYID = 5
1,208,324 UART: [ldev] AUTHORITY.KEYID = 7
1,208,787 UART: [ldev] FE.KEYID = 1
1,213,933 UART: [ldev] Erasing FE.KEYID = 1
1,240,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,509 UART: [ldev] --
1,279,955 UART: [fwproc] Wait for Commands...
1,280,552 UART: [fwproc] Recv command 0x46574c44
1,281,285 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,220 >>> mbox cmd response: failed
1,179,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,226 >>> mbox cmd response: failed
1,179,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,911 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,981 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Manufacturing
85,889 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,299 UART: [cold-reset] ++
1,476,649 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,680 UART: [idev] --
1,514,827 UART: [ldev] ++
1,514,995 UART: [ldev] CDI.KEYID = 6
1,515,358 UART: [ldev] SUBJECT.KEYID = 5
1,515,784 UART: [ldev] AUTHORITY.KEYID = 7
1,516,247 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,307 UART: [fwproc] Waiting for Commands...
1,587,126 UART: [fwproc] Received command 0x46574c44
1,587,917 UART: [fwproc] Received Image of size 114332 bytes
1,608,031 UART: ROM Fatal Error: 0x000B0003
1,609,188 >>> mbox cmd response: failed
1,609,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,194 >>> mbox cmd response: failed
1,609,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,908 UART: [kat] HMAC-384Kdf
907,256 UART: [kat] LMS
1,475,452 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,086 UART: [idev] Erasing UDS.KEYID = 0
1,505,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,834 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,507 UART: [ldev] Erasing FE.KEYID = 1
1,547,276 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,884 UART: [ldev] --
1,586,381 UART: [fwproc] Waiting for Commands...
1,587,138 UART: [fwproc] Received command 0x46574c44
1,587,929 UART: [fwproc] Received Image of size 114332 bytes
2,885,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,455 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,460,205 >>> mbox cmd response: failed
1,460,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,211 >>> mbox cmd response: failed
1,460,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,803 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Manufacturing
86,440 UART: [state] DebugLocked = No
87,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,714 UART: [kat] SHA2-256
882,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,760 UART: [kat] ++
886,912 UART: [kat] sha1
891,274 UART: [kat] SHA2-256
893,212 UART: [kat] SHA2-384
895,985 UART: [kat] SHA2-512-ACC
897,886 UART: [kat] ECC-384
903,577 UART: [kat] HMAC-384Kdf
908,327 UART: [kat] LMS
1,476,523 UART: [kat] --
1,477,588 UART: [cold-reset] ++
1,478,030 UART: [fht] Storing FHT @ 0x50003400
1,480,691 UART: [idev] ++
1,480,859 UART: [idev] CDI.KEYID = 6
1,481,219 UART: [idev] SUBJECT.KEYID = 7
1,481,643 UART: [idev] UDS.KEYID = 0
1,481,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,819 UART: [idev] Erasing UDS.KEYID = 0
1,506,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,679 UART: [idev] --
1,516,668 UART: [ldev] ++
1,516,836 UART: [ldev] CDI.KEYID = 6
1,517,199 UART: [ldev] SUBJECT.KEYID = 5
1,517,625 UART: [ldev] AUTHORITY.KEYID = 7
1,518,088 UART: [ldev] FE.KEYID = 1
1,523,360 UART: [ldev] Erasing FE.KEYID = 1
1,549,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,375 UART: [ldev] --
1,588,646 UART: [fwproc] Waiting for Commands...
1,589,289 UART: [fwproc] Received command 0x46574c44
1,590,080 UART: [fwproc] Received Image of size 114332 bytes
1,609,880 UART: ROM Fatal Error: 0x000B0003
1,611,037 >>> mbox cmd response: failed
1,611,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,043 >>> mbox cmd response: failed
1,611,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,605 UART: [kat] SHA2-512-ACC
897,506 UART: [kat] ECC-384
903,545 UART: [kat] HMAC-384Kdf
908,029 UART: [kat] LMS
1,476,225 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,252 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,727 UART: [idev] Erasing UDS.KEYID = 0
1,505,235 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,999 UART: [idev] --
1,515,046 UART: [ldev] ++
1,515,214 UART: [ldev] CDI.KEYID = 6
1,515,577 UART: [ldev] SUBJECT.KEYID = 5
1,516,003 UART: [ldev] AUTHORITY.KEYID = 7
1,516,466 UART: [ldev] FE.KEYID = 1
1,521,662 UART: [ldev] Erasing FE.KEYID = 1
1,546,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,917 UART: [ldev] --
1,586,388 UART: [fwproc] Waiting for Commands...
1,587,107 UART: [fwproc] Received command 0x46574c44
1,587,898 UART: [fwproc] Received Image of size 114332 bytes
2,885,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,649 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,838 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,462,544 >>> mbox cmd response: failed
1,462,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,550 >>> mbox cmd response: failed
1,462,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,100 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Manufacturing
85,737 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,238 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,172,051 UART: [cold-reset] ++
1,172,615 UART: [fht] FHT @ 0x50003400
1,175,142 UART: [idev] ++
1,175,310 UART: [idev] CDI.KEYID = 6
1,175,670 UART: [idev] SUBJECT.KEYID = 7
1,176,094 UART: [idev] UDS.KEYID = 0
1,176,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,530 UART: [idev] Erasing UDS.KEYID = 0
1,200,311 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,451 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,884 UART: ROM Fatal Error: 0x000B0003
1,305,041 >>> mbox cmd response: failed
1,305,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,047 >>> mbox cmd response: failed
1,305,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,636 UART: [kat] SHA2-512-ACC
908,537 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,803 UART: [cold-reset] ++
1,172,311 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,795 UART: [idev] Sha1 KeyId Algorithm
1,209,347 UART: [idev] --
1,210,509 UART: [ldev] ++
1,210,677 UART: [ldev] CDI.KEYID = 6
1,211,040 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,217,083 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,366 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,932 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,108 >>> mbox cmd response: failed
1,161,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,114 >>> mbox cmd response: failed
1,161,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Manufacturing
85,944 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,053 UART: [kat] HMAC-384Kdf
922,763 UART: [kat] LMS
1,171,091 UART: [kat] --
1,171,962 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,283 UART: [idev] ++
1,175,451 UART: [idev] CDI.KEYID = 6
1,175,811 UART: [idev] SUBJECT.KEYID = 7
1,176,235 UART: [idev] UDS.KEYID = 0
1,176,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,201,012 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,216,886 UART: [ldev] Erasing FE.KEYID = 1
1,243,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,200 UART: [ldev] --
1,282,503 UART: [fwproc] Wait for Commands...
1,283,129 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,191 UART: ROM Fatal Error: 0x000B0003
1,305,348 >>> mbox cmd response: failed
1,305,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,354 >>> mbox cmd response: failed
1,305,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,457 UART: [kat] SHA2-512-ACC
908,358 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,887 UART: [kat] LMS
1,171,215 UART: [kat] --
1,171,962 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,607 UART: [idev] Erasing UDS.KEYID = 0
1,201,654 UART: [idev] Sha1 KeyId Algorithm
1,210,196 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,244,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,904 UART: [ldev] --
1,283,227 UART: [fwproc] Wait for Commands...
1,284,031 UART: [fwproc] Recv command 0x46574c44
1,284,759 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,983 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,069 >>> mbox cmd response: failed
1,161,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,075 >>> mbox cmd response: failed
1,161,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Manufacturing
85,831 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,173,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,275 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,214,878 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,470 UART: [fwproc] Wait for Commands...
1,281,273 UART: [fwproc] Recv command 0x46574c44
1,282,006 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,117 UART: ROM Fatal Error: 0x000B0003
1,303,274 >>> mbox cmd response: failed
1,303,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,280 >>> mbox cmd response: failed
1,303,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,699 UART: [kat] ++
895,851 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,173,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,496 UART: [ldev] ++
1,208,664 UART: [ldev] CDI.KEYID = 6
1,209,028 UART: [ldev] SUBJECT.KEYID = 5
1,209,455 UART: [ldev] AUTHORITY.KEYID = 7
1,209,918 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,136 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,297 UART: [fwproc] Recv command 0x46574c44
1,283,030 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,951 >>> mbox cmd response: failed
1,156,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,957 >>> mbox cmd response: failed
1,156,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,392 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Manufacturing
85,652 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,174,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,784 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,820 UART: ROM Fatal Error: 0x000B0003
1,304,977 >>> mbox cmd response: failed
1,304,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,983 >>> mbox cmd response: failed
1,304,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,734 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,091 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,099 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,559 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,869 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,354 >>> mbox cmd response: failed
1,157,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,360 >>> mbox cmd response: failed
1,157,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,644 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
902,220 UART: [kat] HMAC-384Kdf
906,720 UART: [kat] LMS
1,474,916 UART: [kat] --
1,475,857 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,134 UART: [idev] ++
1,479,302 UART: [idev] CDI.KEYID = 6
1,479,662 UART: [idev] SUBJECT.KEYID = 7
1,480,086 UART: [idev] UDS.KEYID = 0
1,480,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,505,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,224 UART: [idev] --
1,515,209 UART: [ldev] ++
1,515,377 UART: [ldev] CDI.KEYID = 6
1,515,740 UART: [ldev] SUBJECT.KEYID = 5
1,516,166 UART: [ldev] AUTHORITY.KEYID = 7
1,516,629 UART: [ldev] FE.KEYID = 1
1,522,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,722 UART: [ldev] --
1,587,099 UART: [fwproc] Waiting for Commands...
1,587,956 UART: [fwproc] Received command 0x46574c44
1,588,747 UART: [fwproc] Received Image of size 114332 bytes
1,624,080 UART: ROM Fatal Error: 0x000B001B
1,625,239 >>> mbox cmd response: failed
1,625,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,245 >>> mbox cmd response: failed
1,625,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,251 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,543 UART: [kat] SHA2-256
881,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,589 UART: [kat] ++
885,741 UART: [kat] sha1
889,997 UART: [kat] SHA2-256
891,935 UART: [kat] SHA2-384
894,800 UART: [kat] SHA2-512-ACC
896,701 UART: [kat] ECC-384
901,976 UART: [kat] HMAC-384Kdf
906,412 UART: [kat] LMS
1,474,608 UART: [kat] --
1,475,621 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,479,026 UART: [idev] ++
1,479,194 UART: [idev] CDI.KEYID = 6
1,479,554 UART: [idev] SUBJECT.KEYID = 7
1,479,978 UART: [idev] UDS.KEYID = 0
1,480,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,044 UART: [idev] Erasing UDS.KEYID = 0
1,504,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,892 UART: [idev] --
1,513,743 UART: [ldev] ++
1,513,911 UART: [ldev] CDI.KEYID = 6
1,514,274 UART: [ldev] SUBJECT.KEYID = 5
1,514,700 UART: [ldev] AUTHORITY.KEYID = 7
1,515,163 UART: [ldev] FE.KEYID = 1
1,520,575 UART: [ldev] Erasing FE.KEYID = 1
1,545,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,646 UART: [ldev] --
1,585,119 UART: [fwproc] Waiting for Commands...
1,585,948 UART: [fwproc] Received command 0x46574c44
1,586,739 UART: [fwproc] Received Image of size 114332 bytes
2,882,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,918 >>> mbox cmd response: failed
1,475,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,924 >>> mbox cmd response: failed
1,475,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,315 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,356 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,725 UART: [idev] ++
1,479,893 UART: [idev] CDI.KEYID = 6
1,480,253 UART: [idev] SUBJECT.KEYID = 7
1,480,677 UART: [idev] UDS.KEYID = 0
1,481,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,761 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,246 UART: [ldev] ++
1,515,414 UART: [ldev] CDI.KEYID = 6
1,515,777 UART: [ldev] SUBJECT.KEYID = 5
1,516,203 UART: [ldev] AUTHORITY.KEYID = 7
1,516,666 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,351 UART: [ldev] --
1,586,814 UART: [fwproc] Waiting for Commands...
1,587,455 UART: [fwproc] Received command 0x46574c44
1,588,246 UART: [fwproc] Received Image of size 114332 bytes
1,624,065 UART: ROM Fatal Error: 0x000B001B
1,625,224 >>> mbox cmd response: failed
1,625,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,230 >>> mbox cmd response: failed
1,625,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,893 UART: [kat] SHA2-512-ACC
897,794 UART: [kat] ECC-384
903,469 UART: [kat] HMAC-384Kdf
908,131 UART: [kat] LMS
1,476,327 UART: [kat] --
1,477,402 UART: [cold-reset] ++
1,477,862 UART: [fht] Storing FHT @ 0x50003400
1,480,651 UART: [idev] ++
1,480,819 UART: [idev] CDI.KEYID = 6
1,481,179 UART: [idev] SUBJECT.KEYID = 7
1,481,603 UART: [idev] UDS.KEYID = 0
1,481,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,721 UART: [idev] Erasing UDS.KEYID = 0
1,506,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,965 UART: [idev] --
1,515,862 UART: [ldev] ++
1,516,030 UART: [ldev] CDI.KEYID = 6
1,516,393 UART: [ldev] SUBJECT.KEYID = 5
1,516,819 UART: [ldev] AUTHORITY.KEYID = 7
1,517,282 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,763 UART: [ldev] --
1,587,234 UART: [fwproc] Waiting for Commands...
1,588,061 UART: [fwproc] Received command 0x46574c44
1,588,852 UART: [fwproc] Received Image of size 114332 bytes
2,886,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,779 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,285 >>> mbox cmd response: failed
1,477,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,291 >>> mbox cmd response: failed
1,477,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
893,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,187 UART: [kat] ++
897,339 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,171,929 UART: [fht] FHT @ 0x50003400
1,174,492 UART: [idev] ++
1,174,660 UART: [idev] CDI.KEYID = 6
1,175,020 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,175,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,201,011 UART: [idev] Sha1 KeyId Algorithm
1,209,451 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,250 UART: [ldev] SUBJECT.KEYID = 5
1,211,676 UART: [ldev] AUTHORITY.KEYID = 7
1,212,139 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,477 UART: [ldev] --
1,282,990 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,365 UART: ROM Fatal Error: 0x000B001B
1,320,524 >>> mbox cmd response: failed
1,320,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,530 >>> mbox cmd response: failed
1,320,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
917,404 UART: [kat] HMAC-384Kdf
922,026 UART: [kat] LMS
1,170,354 UART: [kat] --
1,171,105 UART: [cold-reset] ++
1,171,603 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,792 UART: [idev] SUBJECT.KEYID = 7
1,175,216 UART: [idev] UDS.KEYID = 0
1,175,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,647 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,283,080 UART: [fwproc] Recv command 0x46574c44
1,283,808 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,307 >>> mbox cmd response: failed
1,174,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,313 >>> mbox cmd response: failed
1,174,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,711 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,613 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,028 UART: [kat] SHA2-256
903,968 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
917,845 UART: [kat] HMAC-384Kdf
922,545 UART: [kat] LMS
1,170,873 UART: [kat] --
1,171,902 UART: [cold-reset] ++
1,172,402 UART: [fht] FHT @ 0x50003400
1,175,077 UART: [idev] ++
1,175,245 UART: [idev] CDI.KEYID = 6
1,175,605 UART: [idev] SUBJECT.KEYID = 7
1,176,029 UART: [idev] UDS.KEYID = 0
1,176,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,209,972 UART: [idev] --
1,210,966 UART: [ldev] ++
1,211,134 UART: [ldev] CDI.KEYID = 6
1,211,497 UART: [ldev] SUBJECT.KEYID = 5
1,211,923 UART: [ldev] AUTHORITY.KEYID = 7
1,212,386 UART: [ldev] FE.KEYID = 1
1,217,432 UART: [ldev] Erasing FE.KEYID = 1
1,243,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,089 UART: [fwproc] Wait for Commands...
1,283,817 UART: [fwproc] Recv command 0x46574c44
1,284,545 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,104 UART: ROM Fatal Error: 0x000B001B
1,320,263 >>> mbox cmd response: failed
1,320,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,269 >>> mbox cmd response: failed
1,320,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
893,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,386 UART: [kat] ++
897,538 UART: [kat] sha1
901,790 UART: [kat] SHA2-256
903,730 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,173,006 UART: [fht] FHT @ 0x50003400
1,175,471 UART: [idev] ++
1,175,639 UART: [idev] CDI.KEYID = 6
1,175,999 UART: [idev] SUBJECT.KEYID = 7
1,176,423 UART: [idev] UDS.KEYID = 0
1,176,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,308 UART: [ldev] Erasing FE.KEYID = 1
1,244,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,336 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,443 UART: [fwproc] Recv command 0x46574c44
1,285,171 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,788 >>> mbox cmd response: failed
1,175,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,794 >>> mbox cmd response: failed
1,175,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,800 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,516 UART: [kat] HMAC-384Kdf
919,916 UART: [kat] LMS
1,168,228 UART: [kat] --
1,169,109 UART: [cold-reset] ++
1,169,471 UART: [fht] FHT @ 0x50003400
1,172,145 UART: [idev] ++
1,172,313 UART: [idev] CDI.KEYID = 6
1,172,674 UART: [idev] SUBJECT.KEYID = 7
1,173,099 UART: [idev] UDS.KEYID = 0
1,173,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,079 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,302 UART: [ldev] --
1,280,584 UART: [fwproc] Wait for Commands...
1,281,257 UART: [fwproc] Recv command 0x46574c44
1,281,990 UART: [fwproc] Recv'd Img size: 114332 bytes
1,317,413 UART: ROM Fatal Error: 0x000B001B
1,318,572 >>> mbox cmd response: failed
1,318,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,578 >>> mbox cmd response: failed
1,318,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Unprovisioned
86,381 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,210 UART: [kat] SHA2-256
891,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,889 UART: [kat] ++
896,041 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,207,951 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,478 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,230 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,171 >>> mbox cmd response: failed
1,170,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,177 >>> mbox cmd response: failed
1,170,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,536 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,059 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,154 UART: ROM Fatal Error: 0x000B001B
1,320,313 >>> mbox cmd response: failed
1,320,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,319 >>> mbox cmd response: failed
1,320,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,174,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,420 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,241,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,173 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,053 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,143 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,970 >>> mbox cmd response: failed
1,170,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,976 >>> mbox cmd response: failed
1,170,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,063 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Manufacturing
85,777 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,452 UART: [kat] SHA2-512-ACC
897,353 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,211 UART: [fht] Storing FHT @ 0x50003400
1,480,068 UART: [idev] ++
1,480,236 UART: [idev] CDI.KEYID = 6
1,480,596 UART: [idev] SUBJECT.KEYID = 7
1,481,020 UART: [idev] UDS.KEYID = 0
1,481,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,742 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,629 UART: [ldev] Erasing FE.KEYID = 1
1,546,144 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,176 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,330 UART: [fwproc] Received command 0x46574c44
1,587,121 UART: [fwproc] Received Image of size 114332 bytes
1,632,004 UART: ROM Fatal Error: 0x000B0005
1,633,161 >>> mbox cmd response: failed
1,633,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,167 >>> mbox cmd response: failed
1,633,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,606 UART: [kat] LMS
1,475,802 UART: [kat] --
1,476,717 UART: [cold-reset] ++
1,477,103 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,660 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,840 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,277 UART: [ldev] Erasing FE.KEYID = 1
1,546,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,066 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,324 UART: [fwproc] Received command 0x46574c44
1,588,115 UART: [fwproc] Received Image of size 114332 bytes
2,885,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,774 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,850 >>> mbox cmd response: failed
1,485,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,856 >>> mbox cmd response: failed
1,485,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,675 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Manufacturing
85,652 UART: [state] DebugLocked = No
86,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,868 UART: [kat] SHA2-256
881,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,914 UART: [kat] ++
886,066 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
895,031 UART: [kat] SHA2-512-ACC
896,932 UART: [kat] ECC-384
902,439 UART: [kat] HMAC-384Kdf
907,019 UART: [kat] LMS
1,475,215 UART: [kat] --
1,476,066 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,451 UART: [idev] ++
1,479,619 UART: [idev] CDI.KEYID = 6
1,479,979 UART: [idev] SUBJECT.KEYID = 7
1,480,403 UART: [idev] UDS.KEYID = 0
1,480,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,217 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,813 UART: [idev] --
1,514,736 UART: [ldev] ++
1,514,904 UART: [ldev] CDI.KEYID = 6
1,515,267 UART: [ldev] SUBJECT.KEYID = 5
1,515,693 UART: [ldev] AUTHORITY.KEYID = 7
1,516,156 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,546,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,971 UART: [ldev] --
1,585,374 UART: [fwproc] Waiting for Commands...
1,586,183 UART: [fwproc] Received command 0x46574c44
1,586,974 UART: [fwproc] Received Image of size 114332 bytes
1,632,291 UART: ROM Fatal Error: 0x000B0005
1,633,448 >>> mbox cmd response: failed
1,633,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,454 >>> mbox cmd response: failed
1,633,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,976 UART: [kat] SHA2-256
881,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,022 UART: [kat] ++
886,174 UART: [kat] sha1
890,326 UART: [kat] SHA2-256
892,264 UART: [kat] SHA2-384
895,009 UART: [kat] SHA2-512-ACC
896,910 UART: [kat] ECC-384
902,419 UART: [kat] HMAC-384Kdf
907,083 UART: [kat] LMS
1,475,279 UART: [kat] --
1,476,216 UART: [cold-reset] ++
1,476,654 UART: [fht] Storing FHT @ 0x50003400
1,479,443 UART: [idev] ++
1,479,611 UART: [idev] CDI.KEYID = 6
1,479,971 UART: [idev] SUBJECT.KEYID = 7
1,480,395 UART: [idev] UDS.KEYID = 0
1,480,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,391 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,025 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,898 UART: [ldev] Erasing FE.KEYID = 1
1,547,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,586,992 UART: [fwproc] Waiting for Commands...
1,587,703 UART: [fwproc] Received command 0x46574c44
1,588,494 UART: [fwproc] Received Image of size 114332 bytes
2,885,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,727 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,966 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,691 >>> mbox cmd response: failed
1,486,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,697 >>> mbox cmd response: failed
1,486,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,552 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Manufacturing
85,449 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
892,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,123 UART: [kat] ++
897,275 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,206 UART: [kat] SHA2-512-ACC
908,107 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,172,213 UART: [cold-reset] ++
1,172,661 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,342 UART: [idev] Erasing UDS.KEYID = 0
1,201,919 UART: [idev] Sha1 KeyId Algorithm
1,210,511 UART: [idev] --
1,211,663 UART: [ldev] ++
1,211,831 UART: [ldev] CDI.KEYID = 6
1,212,194 UART: [ldev] SUBJECT.KEYID = 5
1,212,620 UART: [ldev] AUTHORITY.KEYID = 7
1,213,083 UART: [ldev] FE.KEYID = 1
1,218,355 UART: [ldev] Erasing FE.KEYID = 1
1,244,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,282,910 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,264 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,203 UART: ROM Fatal Error: 0x000B0005
1,330,360 >>> mbox cmd response: failed
1,330,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,366 >>> mbox cmd response: failed
1,330,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,582 UART: [state] LifecycleState = Unprovisioned
85,237 UART: [state] DebugLocked = No
85,727 UART: [state] WD Timer not started. Device not locked for debugging
86,900 UART: [kat] SHA2-256
892,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,675 UART: [kat] ++
896,827 UART: [kat] sha1
901,141 UART: [kat] SHA2-256
903,081 UART: [kat] SHA2-384
905,760 UART: [kat] SHA2-512-ACC
907,661 UART: [kat] ECC-384
917,454 UART: [kat] HMAC-384Kdf
922,164 UART: [kat] LMS
1,170,492 UART: [kat] --
1,171,297 UART: [cold-reset] ++
1,171,705 UART: [fht] FHT @ 0x50003400
1,174,274 UART: [idev] ++
1,174,442 UART: [idev] CDI.KEYID = 6
1,174,802 UART: [idev] SUBJECT.KEYID = 7
1,175,226 UART: [idev] UDS.KEYID = 0
1,175,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,144 UART: [idev] Erasing UDS.KEYID = 0
1,200,261 UART: [idev] Sha1 KeyId Algorithm
1,208,865 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,140 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,128 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,329 >>> mbox cmd response: failed
1,184,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,335 >>> mbox cmd response: failed
1,184,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,855 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Manufacturing
86,096 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,591 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,172,886 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,257 UART: [idev] Erasing UDS.KEYID = 0
1,201,548 UART: [idev] Sha1 KeyId Algorithm
1,209,950 UART: [idev] --
1,211,030 UART: [ldev] ++
1,211,198 UART: [ldev] CDI.KEYID = 6
1,211,561 UART: [ldev] SUBJECT.KEYID = 5
1,211,987 UART: [ldev] AUTHORITY.KEYID = 7
1,212,450 UART: [ldev] FE.KEYID = 1
1,217,582 UART: [ldev] Erasing FE.KEYID = 1
1,244,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,543 UART: [fwproc] Wait for Commands...
1,284,307 UART: [fwproc] Recv command 0x46574c44
1,285,035 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,566 UART: ROM Fatal Error: 0x000B0005
1,331,723 >>> mbox cmd response: failed
1,331,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,729 >>> mbox cmd response: failed
1,331,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
906,999 UART: [kat] SHA2-512-ACC
908,900 UART: [kat] ECC-384
918,843 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,629 UART: [idev] Erasing UDS.KEYID = 0
1,201,394 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,832 UART: [ldev] ++
1,211,000 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,789 UART: [ldev] AUTHORITY.KEYID = 7
1,212,252 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,244,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,590 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,801 UART: [fwproc] Recv command 0x46574c44
1,285,529 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,598 >>> mbox cmd response: failed
1,186,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,604 >>> mbox cmd response: failed
1,186,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Manufacturing
85,767 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,354 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,199 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,216,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,756 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,173 UART: ROM Fatal Error: 0x000B0005
1,329,330 >>> mbox cmd response: failed
1,329,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,336 >>> mbox cmd response: failed
1,329,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,945 UART: [fht] FHT @ 0x50003400
1,173,635 UART: [idev] ++
1,173,803 UART: [idev] CDI.KEYID = 6
1,174,164 UART: [idev] SUBJECT.KEYID = 7
1,174,589 UART: [idev] UDS.KEYID = 0
1,174,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,707 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,578 UART: [ldev] ++
1,209,746 UART: [ldev] CDI.KEYID = 6
1,210,110 UART: [ldev] SUBJECT.KEYID = 5
1,210,537 UART: [ldev] AUTHORITY.KEYID = 7
1,211,000 UART: [ldev] FE.KEYID = 1
1,216,316 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,098 UART: [ldev] --
1,281,454 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,069 >>> mbox cmd response: failed
1,180,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,075 >>> mbox cmd response: failed
1,180,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Manufacturing
85,724 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,151 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,174 UART: [fwproc] Recv command 0x46574c44
1,282,907 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,516 UART: ROM Fatal Error: 0x000B0005
1,328,673 >>> mbox cmd response: failed
1,328,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,679 >>> mbox cmd response: failed
1,328,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
891,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,078 UART: [kat] ++
896,230 UART: [kat] sha1
900,504 UART: [kat] SHA2-256
902,444 UART: [kat] SHA2-384
905,409 UART: [kat] SHA2-512-ACC
907,310 UART: [kat] ECC-384
917,093 UART: [kat] HMAC-384Kdf
921,579 UART: [kat] LMS
1,169,891 UART: [kat] --
1,170,926 UART: [cold-reset] ++
1,171,396 UART: [fht] FHT @ 0x50003400
1,174,122 UART: [idev] ++
1,174,290 UART: [idev] CDI.KEYID = 6
1,174,651 UART: [idev] SUBJECT.KEYID = 7
1,175,076 UART: [idev] UDS.KEYID = 0
1,175,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,322 UART: [idev] Sha1 KeyId Algorithm
1,209,214 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,741 UART: [ldev] SUBJECT.KEYID = 5
1,211,168 UART: [ldev] AUTHORITY.KEYID = 7
1,211,631 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,889 UART: [fwproc] Wait for Commands...
1,283,690 UART: [fwproc] Recv command 0x46574c44
1,284,423 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,419 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,212 >>> mbox cmd response: failed
1,181,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,218 >>> mbox cmd response: failed
1,181,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,385 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,670,284 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,674,450 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,674,194 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,697 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,712 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,878 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,208 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,694 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,219 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,779 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,519 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,669,686 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,152 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,893 UART: [state] LifecycleState = Production
85,501 UART: [state] DebugLocked = Yes
86,191 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
906,974 UART: [kat] LMS
1,475,170 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,397 UART: [idev] ++
1,479,565 UART: [idev] CDI.KEYID = 6
1,479,925 UART: [idev] SUBJECT.KEYID = 7
1,480,349 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Production
85,736 UART: [state] DebugLocked = Yes
86,330 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
903,207 UART: [kat] HMAC-384Kdf
907,969 UART: [kat] LMS
1,476,165 UART: [kat] --
1,477,120 UART: [cold-reset] ++
1,477,619 UART: [fht] Storing FHT @ 0x50003400
1,480,350 UART: [idev] ++
1,480,518 UART: [idev] CDI.KEYID = 6
1,480,878 UART: [idev] SUBJECT.KEYID = 7
1,481,302 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,801 UART: [state] LifecycleState = Production
85,409 UART: [state] DebugLocked = Yes
85,987 UART: [state] Starting the WD Timer 40000000 cycles
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,430 UART: [kat] LMS
1,170,758 UART: [kat] --
1,171,631 UART: [cold-reset] ++
1,172,050 UART: [fht] FHT @ 0x50003400
1,174,731 UART: [idev] ++
1,174,899 UART: [idev] CDI.KEYID = 6
1,175,259 UART: [idev] SUBJECT.KEYID = 7
1,175,683 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Production
86,024 UART: [state] DebugLocked = Yes
86,754 UART: [state] Starting the WD Timer 40000000 cycles
88,351 UART: [kat] SHA2-256
894,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,126 UART: [kat] ++
898,278 UART: [kat] sha1
902,526 UART: [kat] SHA2-256
904,466 UART: [kat] SHA2-384
907,315 UART: [kat] SHA2-512-ACC
909,216 UART: [kat] ECC-384
919,107 UART: [kat] HMAC-384Kdf
923,743 UART: [kat] LMS
1,172,071 UART: [kat] --
1,172,894 UART: [cold-reset] ++
1,173,275 UART: [fht] FHT @ 0x50003400
1,175,914 UART: [idev] ++
1,176,082 UART: [idev] CDI.KEYID = 6
1,176,442 UART: [idev] SUBJECT.KEYID = 7
1,176,866 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Production
85,907 UART: [state] DebugLocked = Yes
86,433 UART: [state] Starting the WD Timer 40000000 cycles
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,884 UART: [kat] SHA2-512-ACC
906,785 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,232 UART: [kat] LMS
1,169,544 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Production
86,110 UART: [state] DebugLocked = Yes
86,686 UART: [state] Starting the WD Timer 40000000 cycles
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,875 UART: [kat] HMAC-384Kdf
921,715 UART: [kat] LMS
1,170,027 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,083 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Production
86,233 UART: [state] DebugLocked = Yes
86,913 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,575 UART: [kat] SHA2-256
882,506 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,621 UART: [kat] ++
886,773 UART: [kat] sha1
891,005 UART: [kat] SHA2-256
892,943 UART: [kat] SHA2-384
895,770 UART: [kat] SHA2-512-ACC
897,671 UART: [kat] ECC-384
903,324 UART: [kat] HMAC-384Kdf
908,104 UART: [kat] LMS
1,476,300 UART: [kat] --
1,477,159 UART: [cold-reset] ++
1,477,520 UART: [fht] Storing FHT @ 0x50003400
1,480,291 UART: [idev] ++
1,480,459 UART: [idev] CDI.KEYID = 6
1,480,819 UART: [idev] SUBJECT.KEYID = 7
1,481,243 UART: [idev] UDS.KEYID = 0
1,481,588 ready_for_fw is high
1,481,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,990 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,070 UART: [idev] --
1,514,915 UART: [ldev] ++
1,515,083 UART: [ldev] CDI.KEYID = 6
1,515,446 UART: [ldev] SUBJECT.KEYID = 5
1,515,872 UART: [ldev] AUTHORITY.KEYID = 7
1,516,335 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,975 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,669 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,541 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,247 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,317 UART: [ldev] --
1,585,754 UART: [fwproc] Waiting for Commands...
1,586,515 UART: [fwproc] Received command 0x46574c44
1,587,306 UART: [fwproc] Received Image of size 114332 bytes
2,910,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,102,882 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 ready_for_fw is high
1,362,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,951,512 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,688 UART: [state] LifecycleState = Production
86,296 UART: [state] DebugLocked = Yes
86,964 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,606 UART: [kat] SHA2-256
882,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,652 UART: [kat] ++
886,804 UART: [kat] sha1
891,012 UART: [kat] SHA2-256
892,950 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,469 UART: [fht] Storing FHT @ 0x50003400
1,480,264 UART: [idev] ++
1,480,432 UART: [idev] CDI.KEYID = 6
1,480,792 UART: [idev] SUBJECT.KEYID = 7
1,481,216 UART: [idev] UDS.KEYID = 0
1,481,561 ready_for_fw is high
1,481,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,506,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,521 UART: [idev] --
1,515,426 UART: [ldev] ++
1,515,594 UART: [ldev] CDI.KEYID = 6
1,515,957 UART: [ldev] SUBJECT.KEYID = 5
1,516,383 UART: [ldev] AUTHORITY.KEYID = 7
1,516,846 UART: [ldev] FE.KEYID = 1
1,522,114 UART: [ldev] Erasing FE.KEYID = 1
1,547,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,082 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,776 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,648 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,354 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,438 UART: [ldev] --
1,586,919 UART: [fwproc] Waiting for Commands...
1,587,618 UART: [fwproc] Received command 0x46574c44
1,588,409 UART: [fwproc] Received Image of size 114332 bytes
2,911,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,104,847 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,763 ready_for_fw is high
1,362,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,954,367 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Production
85,753 UART: [state] DebugLocked = Yes
86,391 UART: [state] Starting the WD Timer 40000000 cycles
88,096 UART: [kat] SHA2-256
893,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,871 UART: [kat] ++
898,023 UART: [kat] sha1
902,273 UART: [kat] SHA2-256
904,213 UART: [kat] SHA2-384
907,004 UART: [kat] SHA2-512-ACC
908,905 UART: [kat] ECC-384
918,650 UART: [kat] HMAC-384Kdf
923,204 UART: [kat] LMS
1,171,532 UART: [kat] --
1,172,321 UART: [cold-reset] ++
1,172,836 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 ready_for_fw is high
1,176,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,684 UART: [idev] Erasing UDS.KEYID = 0
1,201,846 UART: [idev] Sha1 KeyId Algorithm
1,210,339 UART: [idev] --
1,211,613 UART: [ldev] ++
1,211,781 UART: [ldev] CDI.KEYID = 6
1,212,144 UART: [ldev] SUBJECT.KEYID = 5
1,212,570 UART: [ldev] AUTHORITY.KEYID = 7
1,213,033 UART: [ldev] FE.KEYID = 1
1,218,435 UART: [ldev] Erasing FE.KEYID = 1
1,244,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,861 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,555 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,427 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,133 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,146 UART: [ldev] --
1,283,465 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,800,719 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,314 ready_for_fw is high
1,060,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,651,146 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Production
85,454 UART: [state] DebugLocked = Yes
86,140 UART: [state] Starting the WD Timer 40000000 cycles
87,719 UART: [kat] SHA2-256
893,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,494 UART: [kat] ++
897,646 UART: [kat] sha1
901,766 UART: [kat] SHA2-256
903,706 UART: [kat] SHA2-384
906,221 UART: [kat] SHA2-512-ACC
908,122 UART: [kat] ECC-384
917,785 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,171,802 UART: [cold-reset] ++
1,172,167 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 ready_for_fw is high
1,176,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,599 UART: [idev] Erasing UDS.KEYID = 0
1,200,933 UART: [idev] Sha1 KeyId Algorithm
1,209,614 UART: [idev] --
1,210,486 UART: [ldev] ++
1,210,654 UART: [ldev] CDI.KEYID = 6
1,211,017 UART: [ldev] SUBJECT.KEYID = 5
1,211,443 UART: [ldev] AUTHORITY.KEYID = 7
1,211,906 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,384 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,078 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,950 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,656 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,667 UART: [ldev] --
1,283,172 UART: [fwproc] Wait for Commands...
1,283,838 UART: [fwproc] Recv command 0x46574c44
1,284,566 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,800,400 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,959 ready_for_fw is high
1,059,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,653,191 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Production
85,795 UART: [state] DebugLocked = Yes
86,521 UART: [state] Starting the WD Timer 40000000 cycles
88,042 UART: [kat] SHA2-256
891,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,860 UART: [kat] SHA2-512-ACC
906,761 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 ready_for_fw is high
1,174,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,677 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,598 UART: [ldev] ++
1,209,766 UART: [ldev] CDI.KEYID = 6
1,210,130 UART: [ldev] SUBJECT.KEYID = 5
1,210,557 UART: [ldev] AUTHORITY.KEYID = 7
1,211,020 UART: [ldev] FE.KEYID = 1
1,216,216 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,567 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,437 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,143 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,175 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,467 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,445 ready_for_fw is high
1,055,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,563 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Production
85,944 UART: [state] DebugLocked = Yes
86,468 UART: [state] Starting the WD Timer 40000000 cycles
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,207,846 UART: [idev] --
1,208,779 UART: [ldev] ++
1,208,947 UART: [ldev] CDI.KEYID = 6
1,209,311 UART: [ldev] SUBJECT.KEYID = 5
1,209,738 UART: [ldev] AUTHORITY.KEYID = 7
1,210,201 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,114 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,808 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,678 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,384 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,338 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,427 UART: [fwproc] Recv command 0x46574c44
1,282,160 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,336 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,598 ready_for_fw is high
1,056,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,546 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,105 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: ROM integrity test failed
895,412 UART: ROM Fatal Error: 0x90080001
897,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,033 >>> mbox cmd response: failed
897,033 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,039 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: ROM integrity test failed
895,984 UART: ROM Fatal Error: 0x90080001
897,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,605 >>> mbox cmd response: failed
897,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,611 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: ROM integrity test failed
896,071 UART: ROM Fatal Error: 0x90080001
897,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,692 >>> mbox cmd response: failed
897,692 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,698 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,771 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
85,952 UART: [state] WD Timer not started. Device not locked for debugging
87,169 UART: [kat] SHA2-256
890,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,690 UART: ROM integrity test failed
895,137 UART: ROM Fatal Error: 0x90080001
896,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
896,758 >>> mbox cmd response: failed
896,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
896,764 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: ROM integrity test failed
896,102 UART: ROM Fatal Error: 0x90080001
897,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,723 >>> mbox cmd response: failed
897,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,729 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,969 UART: ROM integrity test failed
895,416 UART: ROM Fatal Error: 0x90080001
897,031 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,037 >>> mbox cmd response: failed
897,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,043 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,037 UART: [state] LifecycleState = Unprovisioned
86,692 UART: [state] DebugLocked = No
87,380 UART: [state] WD Timer not started. Device not locked for debugging
88,637 UART: [kat] SHA2-256
892,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,158 UART: ROM integrity test failed
896,605 UART: ROM Fatal Error: 0x90080001
898,220 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
898,226 >>> mbox cmd response: failed
898,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
898,232 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: ROM integrity test failed
896,187 UART: ROM Fatal Error: 0x90080001
897,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,808 >>> mbox cmd response: failed
897,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,814 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: ROM integrity test failed
895,380 UART: ROM Fatal Error: 0x90080001
896,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,001 >>> mbox cmd response: failed
897,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,007 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: ROM integrity test failed
895,858 UART: ROM Fatal Error: 0x90080001
897,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,479 >>> mbox cmd response: failed
897,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,485 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,162 UART: ROM integrity test failed
895,609 UART: ROM Fatal Error: 0x90080001
897,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,230 >>> mbox cmd response: failed
897,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,236 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: ROM integrity test failed
896,109 UART: ROM Fatal Error: 0x90080001
897,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,730 >>> mbox cmd response: failed
897,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,736 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,746 >>> mbox cmd response: failed
814,746 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,403 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,554 >>> mbox cmd response: failed
814,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,079 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,679 >>> mbox cmd response: failed
814,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,200 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,071 >>> mbox cmd response: failed
815,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,256 >>> mbox cmd response: failed
814,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,347 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,580 >>> mbox cmd response: failed
814,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,429 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,621 >>> mbox cmd response: failed
814,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,826 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,305 >>> mbox cmd response: failed
815,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,450 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,692 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,902 >>> mbox cmd response: failed
814,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,927 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,116 >>> mbox cmd response: failed
815,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,651 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,009 >>> mbox cmd response: failed
815,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,624 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,369 >>> mbox cmd response: failed
815,369 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,806 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,786 UART: [state] LifecycleState = Unprovisioned
86,441 UART: [state] DebugLocked = No
86,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,639 UART: [kat] SHA2-256
882,570 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,685 UART: [kat] ++
886,837 UART: [kat] sha1
891,255 UART: [kat] SHA2-256
893,193 UART: [kat] SHA2-384
896,000 UART: [kat] SHA2-512-ACC
897,901 UART: [kat] ECC-384
903,550 UART: [kat] HMAC-384Kdf
908,156 UART: [kat] LMS
1,476,352 UART: [kat] --
1,477,363 UART: [cold-reset] ++
1,477,913 UART: [fht] Storing FHT @ 0x50003400
1,480,786 UART: [idev] ++
1,480,954 UART: [idev] CDI.KEYID = 6
1,481,314 UART: [idev] SUBJECT.KEYID = 7
1,481,738 UART: [idev] UDS.KEYID = 0
1,482,083 ready_for_fw is high
1,482,083 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,498 UART: [idev] Erasing UDS.KEYID = 0
1,506,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,998 UART: [idev] --
1,516,155 UART: [ldev] ++
1,516,323 UART: [ldev] CDI.KEYID = 6
1,516,686 UART: [ldev] SUBJECT.KEYID = 5
1,517,112 UART: [ldev] AUTHORITY.KEYID = 7
1,517,575 UART: [ldev] FE.KEYID = 1
1,522,765 UART: [ldev] Erasing FE.KEYID = 1
1,548,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,654 UART: [ldev] --
1,587,937 UART: [fwproc] Waiting for Commands...
1,588,614 UART: [fwproc] Received command 0x46574c44
1,589,405 UART: [fwproc] Received Image of size 115196 bytes
2,896,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,675 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,098 >>> mbox cmd response: success
3,091,234 UART: [afmc] ++
3,091,402 UART: [afmc] CDI.KEYID = 6
3,091,764 UART: [afmc] SUBJECT.KEYID = 7
3,092,189 UART: [afmc] AUTHORITY.KEYID = 5
3,127,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,079 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,769 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,442 UART: [afmc] --
3,170,550 UART: [cold-reset] --
3,171,460 UART: [state] Locking Datavault
3,172,921 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,525 UART: [state] Locking ICCM
3,174,179 UART: [exit] Launching FMC @ 0x40000130
3,179,508 UART:
3,179,524 UART: Running Caliptra FMC ...
3,179,932 UART:
3,179,986 UART: [state] CFI Enabled
3,190,619 UART: [fht] FMC Alias Private Key: 7
3,298,108 UART: [art] Extend RT PCRs Done
3,298,536 UART: [art] Lock RT PCRs Done
3,300,346 UART: [art] Populate DV Done
3,308,421 UART: [fht] FMC Alias Private Key: 7
3,309,525 UART: [art] Derive CDI
3,309,805 UART: [art] Store in in slot 0x4
3,395,456 UART: [art] Derive Key Pair
3,395,816 UART: [art] Store priv key in slot 0x5
3,409,152 UART: [art] Derive Key Pair - Done
3,424,231 UART: [art] Signing Cert with AUTHO
3,424,711 UART: RITY.KEYID = 7
3,439,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,396 UART: [art] PUB.X = 3BB8D53E5F6C7EC1987D9E4D7811D7A4761621BDA0C6DC325BAB80224D4C466842F9AC6E14705BB738E68E2CDF878FA9
3,447,178 UART: [art] PUB.Y = 9A2E1040AEF49014B7BFE16E37AB880CAD14EA88877C93C638DE2AF4FAE3DDF0F261B2B29EA509CEB43D6F66585ECD06
3,454,141 UART: [art] SIG.R = BF03A7841B9BC8CB1B29A0B543529B8C2CBF02682E5A3794D6A5B3956052AC8805030B785B7A9A790C6CB3986089D8B7
3,460,895 UART: [art] SIG.S = 8F2BE8F6FF5C8BFB20EFC3862D6A76700CBB9D539C21035FCF37E5978D586A1D9CC56FBE94B8E03143E9335D9D15B7C9
3,484,952 UART: Caliptra RT
3,485,205 UART: [state] CFI Enabled
3,593,703 UART: [rt] RT listening for mailbox commands...
3,594,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,029 UART: [rt]cmd =0x46504c54, len=4
3,625,165 >>> mbox cmd response data (8 bytes)
3,625,406 UART: [rt] FIPS self test
3,625,734 UART: [kat] ++
3,625,886 UART: [kat] sha1
3,630,066 UART: [kat] SHA2-256
3,632,088 UART: [kat] SHA2-384
3,634,915 UART: [kat] SHA2-512-ACC
3,636,842 UART: [kat] ECC-384
3,638,555 UART: Fatal Error: 0x90040004
3,640,094 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,099 >>> mbox cmd response: failed
3,640,099 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,439 UART: [kat] SHA2-256
882,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,485 UART: [kat] ++
886,637 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,468 UART: [kat] SHA2-512-ACC
897,369 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,562 UART: [kat] LMS
1,475,758 UART: [kat] --
1,476,535 UART: [cold-reset] ++
1,477,023 UART: [fht] Storing FHT @ 0x50003400
1,479,922 UART: [idev] ++
1,480,090 UART: [idev] CDI.KEYID = 6
1,480,450 UART: [idev] SUBJECT.KEYID = 7
1,480,874 UART: [idev] UDS.KEYID = 0
1,481,219 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,866 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,416 UART: [idev] --
1,515,503 UART: [ldev] ++
1,515,671 UART: [ldev] CDI.KEYID = 6
1,516,034 UART: [ldev] SUBJECT.KEYID = 5
1,516,460 UART: [ldev] AUTHORITY.KEYID = 7
1,516,923 UART: [ldev] FE.KEYID = 1
1,521,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,246 UART: [ldev] --
1,586,537 UART: [fwproc] Waiting for Commands...
1,587,310 UART: [fwproc] Received command 0x46574c44
1,588,101 UART: [fwproc] Received Image of size 115196 bytes
2,895,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,963 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,446 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,919 ready_for_fw is high
1,362,919 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,344 >>> mbox cmd response: success
3,001,570 UART:
3,001,586 UART: Running Caliptra FMC ...
3,001,994 UART:
3,002,048 UART: [state] CFI Enabled
3,012,107 UART: [fht] FMC Alias Private Key: 7
3,119,638 UART: [art] Extend RT PCRs Done
3,120,066 UART: [art] Lock RT PCRs Done
3,121,940 UART: [art] Populate DV Done
3,130,155 UART: [fht] FMC Alias Private Key: 7
3,131,159 UART: [art] Derive CDI
3,131,439 UART: [art] Store in in slot 0x4
3,217,042 UART: [art] Derive Key Pair
3,217,402 UART: [art] Store priv key in slot 0x5
3,230,746 UART: [art] Derive Key Pair - Done
3,245,752 UART: [art] Signing Cert with AUTHO
3,246,232 UART: RITY.KEYID = 7
3,261,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,931 UART: [art] PUB.X = 7A0CBFDB1A0A08A83392CD3B703063300A34705FF4B748057B32613C65460EBDF059C2E4041EC25C723BAF6C2AE07A7F
3,268,688 UART: [art] PUB.Y = DDA6C2431F9F8D2E16CA2F8EFA1C33178B411C0A3AA6B2AAD2310D2F8EA660988ED74DB9828101B743C3A9D79C8A6BB6
3,275,647 UART: [art] SIG.R = 710635F52525A9E745D98FBFD2F6DF82A2DF79241799864AC345A33746786687268CAC4B4607B9C5FF5E4D478ED8DE1D
3,282,413 UART: [art] SIG.S = 110C24109B2A269D885CBC50ADEDE9D9F5D5794B0FEE08AD8340ED747D01755A5C51FC6BEA99B1D9C21101E2707D81D8
3,306,269 UART: Caliptra RT
3,306,522 UART: [state] CFI Enabled
3,415,198 UART: [rt] RT listening for mailbox commands...
3,415,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,956 UART: [rt]cmd =0x46504c54, len=4
3,446,974 >>> mbox cmd response data (8 bytes)
3,447,111 UART: [rt] FIPS self test
3,447,439 UART: [kat] ++
3,447,591 UART: [kat] sha1
3,452,047 UART: [kat] SHA2-256
3,454,069 UART: [kat] SHA2-384
3,456,926 UART: [kat] SHA2-512-ACC
3,458,853 UART: [kat] ECC-384
3,460,420 UART: Fatal Error: 0x90040004
3,461,959 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,964 >>> mbox cmd response: failed
3,461,964 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,541 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,784 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,476 UART: [kat] SHA2-256
892,414 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,118 UART: [cold-reset] ++
1,476,552 UART: [fht] Storing FHT @ 0x50003400
1,479,539 UART: [idev] ++
1,479,707 UART: [idev] CDI.KEYID = 6
1,480,067 UART: [idev] SUBJECT.KEYID = 7
1,480,491 UART: [idev] UDS.KEYID = 0
1,480,836 ready_for_fw is high
1,480,836 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,673 UART: [idev] --
1,515,782 UART: [ldev] ++
1,515,950 UART: [ldev] CDI.KEYID = 6
1,516,313 UART: [ldev] SUBJECT.KEYID = 5
1,516,739 UART: [ldev] AUTHORITY.KEYID = 7
1,517,202 UART: [ldev] FE.KEYID = 1
1,522,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,764 UART: [fwproc] Waiting for Commands...
1,587,473 UART: [fwproc] Received command 0x46574c44
1,588,264 UART: [fwproc] Received Image of size 115196 bytes
2,896,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,285 >>> mbox cmd response: success
3,091,389 UART: [afmc] ++
3,091,557 UART: [afmc] CDI.KEYID = 6
3,091,919 UART: [afmc] SUBJECT.KEYID = 7
3,092,344 UART: [afmc] AUTHORITY.KEYID = 5
3,127,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,045 UART: [afmc] --
3,171,159 UART: [cold-reset] --
3,172,045 UART: [state] Locking Datavault
3,173,074 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,678 UART: [state] Locking ICCM
3,174,276 UART: [exit] Launching FMC @ 0x40000130
3,179,605 UART:
3,179,621 UART: Running Caliptra FMC ...
3,180,029 UART:
3,180,172 UART: [state] CFI Enabled
3,190,465 UART: [fht] FMC Alias Private Key: 7
3,297,852 UART: [art] Extend RT PCRs Done
3,298,280 UART: [art] Lock RT PCRs Done
3,300,056 UART: [art] Populate DV Done
3,308,043 UART: [fht] FMC Alias Private Key: 7
3,309,171 UART: [art] Derive CDI
3,309,451 UART: [art] Store in in slot 0x4
3,395,500 UART: [art] Derive Key Pair
3,395,860 UART: [art] Store priv key in slot 0x5
3,409,950 UART: [art] Derive Key Pair - Done
3,424,988 UART: [art] Signing Cert with AUTHO
3,425,468 UART: RITY.KEYID = 7
3,441,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,825 UART: [art] PUB.X = 68935A2AB2E8999111AB4246F0B59E61BB51E244B3C132AC17958888DA69D5F16124ACA54C46D3CCABD2609E4A712285
3,448,597 UART: [art] PUB.Y = 3A380D03F4D630CED07923DD126AF171B1D7D5DFE2453AE970B7EF2064C0482312A40769D9D1E2121F173930266F8734
3,455,534 UART: [art] SIG.R = 58A58B9718F6403283176C55601061F2F7F5D52889EBEA837067B6095EE190016C2A9F9AB80C7C9F1AC80A490D7296CC
3,462,285 UART: [art] SIG.S = CBCD07450500FDCCFBA9DE0B141C1673BEB639F69E089B8D693737196809C8110907A724F51740054FB3317DBC0A68A4
3,485,841 UART: Caliptra RT
3,486,186 UART: [state] CFI Enabled
3,594,021 UART: [rt] RT listening for mailbox commands...
3,594,684 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,433 UART: [rt]cmd =0x46504c54, len=4
3,625,469 >>> mbox cmd response data (8 bytes)
3,625,812 UART: [rt] FIPS self test
3,626,140 UART: [kat] ++
3,626,292 UART: [kat] sha1
3,630,514 UART: [kat] SHA2-256
3,632,536 UART: [kat] SHA2-384
3,635,381 UART: [kat] SHA2-512-ACC
3,637,308 UART: [kat] ECC-384
3,638,649 UART: Fatal Error: 0x90040004
3,640,188 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,193 >>> mbox cmd response: failed
3,640,193 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,477,092 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,437 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,039 UART: [idev] --
1,514,960 UART: [ldev] ++
1,515,128 UART: [ldev] CDI.KEYID = 6
1,515,491 UART: [ldev] SUBJECT.KEYID = 5
1,515,917 UART: [ldev] AUTHORITY.KEYID = 7
1,516,380 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,547,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,930 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 115196 bytes
2,896,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,331 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,642 ready_for_fw is high
1,361,642 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,523 >>> mbox cmd response: success
3,002,171 UART:
3,002,187 UART: Running Caliptra FMC ...
3,002,595 UART:
3,002,738 UART: [state] CFI Enabled
3,013,279 UART: [fht] FMC Alias Private Key: 7
3,121,866 UART: [art] Extend RT PCRs Done
3,122,294 UART: [art] Lock RT PCRs Done
3,123,990 UART: [art] Populate DV Done
3,132,141 UART: [fht] FMC Alias Private Key: 7
3,133,287 UART: [art] Derive CDI
3,133,567 UART: [art] Store in in slot 0x4
3,219,328 UART: [art] Derive Key Pair
3,219,688 UART: [art] Store priv key in slot 0x5
3,232,538 UART: [art] Derive Key Pair - Done
3,247,601 UART: [art] Signing Cert with AUTHO
3,248,081 UART: RITY.KEYID = 7
3,263,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,008 UART: [art] PUB.X = B916FAA64AB3D4ED76AC0697DDD3DAFF9A65AC6B69B5F66F26B71FE78B937AA7D52ED1F4EA640BD367A7B382DA8B2288
3,270,798 UART: [art] PUB.Y = 8EA6B4BD4BF1FC63CAE0BEE3261CF4DA4A4FE28CB478A49F9CB51C60521068832639DD39130BC3AFF38418D0D374116F
3,277,761 UART: [art] SIG.R = AC17138C55EFE37ACE7C9B6FB87280313DABDC5E08050B78083BEFFC2C962D3BD2E5DDACCBDB3B002D14F35F6832F46B
3,284,523 UART: [art] SIG.S = 9C18C6E939E5716305817A0217DCB0FD44D73A4AEAE8C7C01BF55182FEF3B584F2011DE5CB56C3DD222F2910F788DBF0
3,308,519 UART: Caliptra RT
3,308,864 UART: [state] CFI Enabled
3,416,520 UART: [rt] RT listening for mailbox commands...
3,417,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,918 UART: [rt]cmd =0x46504c54, len=4
3,448,136 >>> mbox cmd response data (8 bytes)
3,448,495 UART: [rt] FIPS self test
3,448,823 UART: [kat] ++
3,448,975 UART: [kat] sha1
3,453,341 UART: [kat] SHA2-256
3,455,363 UART: [kat] SHA2-384
3,458,116 UART: [kat] SHA2-512-ACC
3,460,043 UART: [kat] ECC-384
3,461,656 UART: Fatal Error: 0x90040004
3,463,195 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,463,200 >>> mbox cmd response: failed
3,463,200 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,463,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,148 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,755 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,761 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 ready_for_fw is high
1,176,235 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,080 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,208,961 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,628 UART: [ldev] SUBJECT.KEYID = 5
1,211,054 UART: [ldev] AUTHORITY.KEYID = 7
1,211,517 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,260 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,612 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,088 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,159 >>> mbox cmd response: success
2,787,207 UART: [afmc] ++
2,787,375 UART: [afmc] CDI.KEYID = 6
2,787,737 UART: [afmc] SUBJECT.KEYID = 7
2,788,162 UART: [afmc] AUTHORITY.KEYID = 5
2,823,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,882 UART: [afmc] --
2,866,844 UART: [cold-reset] --
2,867,578 UART: [state] Locking Datavault
2,868,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,335 UART: [state] Locking ICCM
2,869,787 UART: [exit] Launching FMC @ 0x40000130
2,875,116 UART:
2,875,132 UART: Running Caliptra FMC ...
2,875,540 UART:
2,875,594 UART: [state] CFI Enabled
2,886,169 UART: [fht] FMC Alias Private Key: 7
2,994,512 UART: [art] Extend RT PCRs Done
2,994,940 UART: [art] Lock RT PCRs Done
2,996,558 UART: [art] Populate DV Done
3,004,609 UART: [fht] FMC Alias Private Key: 7
3,005,635 UART: [art] Derive CDI
3,005,915 UART: [art] Store in in slot 0x4
3,091,108 UART: [art] Derive Key Pair
3,091,468 UART: [art] Store priv key in slot 0x5
3,105,366 UART: [art] Derive Key Pair - Done
3,120,148 UART: [art] Signing Cert with AUTHO
3,120,628 UART: RITY.KEYID = 7
3,136,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,013 UART: [art] PUB.X = B1E09639FDC2B4BCECEB159A6203D68DF5B3E3587C169EAF3B0F8AE530BCAE4E3D9CD12AE2036885C706991D0AC6B9A2
3,143,790 UART: [art] PUB.Y = EB3B01D07BF5701BD76ABF687AE27833B1E4B1B0AE18758F142BF1BF89CB27FBA8E4FE738DB316847D73A08DF5957513
3,150,751 UART: [art] SIG.R = 399EE61B9CCCB24F8DEE232679476A7256300E7CC31E4165FDDB37A47A35720F9C1B3331899F454D6E9A4AC1DAF25D40
3,157,523 UART: [art] SIG.S = 5BF06AB45F0B19401AAEE957BFD97B5F181AA394DA66685BC70E90669EA6D46BC160F86148FCE41405E12A3D7AD83E25
3,181,651 UART: Caliptra RT
3,181,904 UART: [state] CFI Enabled
3,290,211 UART: [rt] RT listening for mailbox commands...
3,290,874 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,033 UART: [rt]cmd =0x46504c54, len=4
3,322,277 >>> mbox cmd response data (8 bytes)
3,322,534 UART: [rt] FIPS self test
3,322,862 UART: [kat] ++
3,323,014 UART: [kat] sha1
3,327,274 UART: [kat] SHA2-256
3,329,296 UART: [kat] SHA2-384
3,332,245 UART: [kat] SHA2-512-ACC
3,334,172 UART: [kat] ECC-384
3,335,699 UART: Fatal Error: 0x90040004
3,337,238 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,337,243 >>> mbox cmd response: failed
3,337,243 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,337,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
893,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,599 UART: [kat] ++
897,751 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
918,574 UART: [kat] HMAC-384Kdf
923,012 UART: [kat] LMS
1,171,340 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,573 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,866 UART: [idev] Erasing UDS.KEYID = 0
1,201,605 UART: [idev] Sha1 KeyId Algorithm
1,210,069 UART: [idev] --
1,211,013 UART: [ldev] ++
1,211,181 UART: [ldev] CDI.KEYID = 6
1,211,544 UART: [ldev] SUBJECT.KEYID = 5
1,211,970 UART: [ldev] AUTHORITY.KEYID = 7
1,212,433 UART: [ldev] FE.KEYID = 1
1,217,661 UART: [ldev] Erasing FE.KEYID = 1
1,244,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,047 UART: [ldev] --
1,283,464 UART: [fwproc] Wait for Commands...
1,284,132 UART: [fwproc] Recv command 0x46574c44
1,284,860 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,744 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,773 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,364 >>> mbox cmd response: success
2,700,192 UART:
2,700,208 UART: Running Caliptra FMC ...
2,700,616 UART:
2,700,670 UART: [state] CFI Enabled
2,711,043 UART: [fht] FMC Alias Private Key: 7
2,818,508 UART: [art] Extend RT PCRs Done
2,818,936 UART: [art] Lock RT PCRs Done
2,820,444 UART: [art] Populate DV Done
2,828,907 UART: [fht] FMC Alias Private Key: 7
2,830,059 UART: [art] Derive CDI
2,830,339 UART: [art] Store in in slot 0x4
2,916,236 UART: [art] Derive Key Pair
2,916,596 UART: [art] Store priv key in slot 0x5
2,929,342 UART: [art] Derive Key Pair - Done
2,944,280 UART: [art] Signing Cert with AUTHO
2,944,760 UART: RITY.KEYID = 7
2,960,112 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,877 UART: [art] PUB.X = C5165A1D817CC73519BFD28F6038443B5FD86C24F6B167EBEC3374AAFCC3457295C4085BAA3540ADE30D0901F16BEE93
2,967,645 UART: [art] PUB.Y = 84864D0B201820E47DFC309AF8C61956123C558649632B8159A216F53B246401E6C673057FD38BC7E39AA4D5B53491B1
2,974,576 UART: [art] SIG.R = 8292909A6D5D4F73D57356F69C97019503E3CF69072784E89DE98651BC9AC48FC5F39A7F4558B4F37073C90D50449797
2,981,324 UART: [art] SIG.S = 59EB83A7487489B0680340031792900774275FF4B2F98F0159FF24FB0B514FB360BFAAB4B65F452835C8674E9A06D675
3,005,419 UART: Caliptra RT
3,005,672 UART: [state] CFI Enabled
3,114,125 UART: [rt] RT listening for mailbox commands...
3,114,788 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,367 UART: [rt]cmd =0x46504c54, len=4
3,145,453 >>> mbox cmd response data (8 bytes)
3,145,796 UART: [rt] FIPS self test
3,146,124 UART: [kat] ++
3,146,276 UART: [kat] sha1
3,150,570 UART: [kat] SHA2-256
3,152,592 UART: [kat] SHA2-384
3,155,479 UART: [kat] SHA2-512-ACC
3,157,406 UART: [kat] ECC-384
3,158,645 UART: Fatal Error: 0x90040004
3,160,184 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,189 >>> mbox cmd response: failed
3,160,189 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,270 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,510 UART: [kat] SHA2-256
904,450 UART: [kat] SHA2-384
907,269 UART: [kat] SHA2-512-ACC
909,170 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,473 UART: [kat] LMS
1,171,801 UART: [kat] --
1,172,940 UART: [cold-reset] ++
1,173,458 UART: [fht] FHT @ 0x50003400
1,176,135 UART: [idev] ++
1,176,303 UART: [idev] CDI.KEYID = 6
1,176,663 UART: [idev] SUBJECT.KEYID = 7
1,177,087 UART: [idev] UDS.KEYID = 0
1,177,432 ready_for_fw is high
1,177,432 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,437 UART: [idev] Erasing UDS.KEYID = 0
1,202,396 UART: [idev] Sha1 KeyId Algorithm
1,210,794 UART: [idev] --
1,211,720 UART: [ldev] ++
1,211,888 UART: [ldev] CDI.KEYID = 6
1,212,251 UART: [ldev] SUBJECT.KEYID = 5
1,212,677 UART: [ldev] AUTHORITY.KEYID = 7
1,213,140 UART: [ldev] FE.KEYID = 1
1,218,402 UART: [ldev] Erasing FE.KEYID = 1
1,245,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,048 UART: [ldev] --
1,284,539 UART: [fwproc] Wait for Commands...
1,285,213 UART: [fwproc] Recv command 0x46574c44
1,285,941 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,255 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,268 >>> mbox cmd response: success
2,789,450 UART: [afmc] ++
2,789,618 UART: [afmc] CDI.KEYID = 6
2,789,980 UART: [afmc] SUBJECT.KEYID = 7
2,790,405 UART: [afmc] AUTHORITY.KEYID = 5
2,826,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,653 UART: [afmc] --
2,869,595 UART: [cold-reset] --
2,870,349 UART: [state] Locking Datavault
2,871,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,096 UART: [state] Locking ICCM
2,872,546 UART: [exit] Launching FMC @ 0x40000130
2,877,875 UART:
2,877,891 UART: Running Caliptra FMC ...
2,878,299 UART:
2,878,442 UART: [state] CFI Enabled
2,889,217 UART: [fht] FMC Alias Private Key: 7
2,996,280 UART: [art] Extend RT PCRs Done
2,996,708 UART: [art] Lock RT PCRs Done
2,998,400 UART: [art] Populate DV Done
3,006,631 UART: [fht] FMC Alias Private Key: 7
3,007,657 UART: [art] Derive CDI
3,007,937 UART: [art] Store in in slot 0x4
3,093,814 UART: [art] Derive Key Pair
3,094,174 UART: [art] Store priv key in slot 0x5
3,107,612 UART: [art] Derive Key Pair - Done
3,122,460 UART: [art] Signing Cert with AUTHO
3,122,940 UART: RITY.KEYID = 7
3,138,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,397 UART: [art] PUB.X = 94EEDA56693D09E174B99A97A171E40EA25D01E709FEA2CD93E426C9C6F7AD289125158D37E9C5FF076FB8B8AB4D65BE
3,146,166 UART: [art] PUB.Y = A6956073BE903D79B6F315A87E32220701098AD4A62F077562C5657126D7C462164CB0EECF0D7166889FA9CFAD99BC32
3,153,099 UART: [art] SIG.R = 1CF9D8250FAE9884D4AFFAEE75D0E9FEE77511501F9A3821D0F2FDC2CC13217B5F18A6D3285776992EB6E509B9033057
3,159,868 UART: [art] SIG.S = 8344DD4579FC4A094CE36A8766FC3DDA0D52F463E73032A1ED4AF263B37CE8FF11C10482DB5A6A650504FB555A2EBCF9
3,183,502 UART: Caliptra RT
3,183,847 UART: [state] CFI Enabled
3,292,060 UART: [rt] RT listening for mailbox commands...
3,292,723 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,764 UART: [rt]cmd =0x46504c54, len=4
3,324,060 >>> mbox cmd response data (8 bytes)
3,324,245 UART: [rt] FIPS self test
3,324,573 UART: [kat] ++
3,324,725 UART: [kat] sha1
3,329,049 UART: [kat] SHA2-256
3,331,071 UART: [kat] SHA2-384
3,333,786 UART: [kat] SHA2-512-ACC
3,335,713 UART: [kat] ECC-384
3,337,272 UART: Fatal Error: 0x90040004
3,338,811 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,816 >>> mbox cmd response: failed
3,338,816 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
893,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,124 UART: [kat] ++
898,276 UART: [kat] sha1
902,344 UART: [kat] SHA2-256
904,284 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,522 UART: [cold-reset] ++
1,173,060 UART: [fht] FHT @ 0x50003400
1,175,691 UART: [idev] ++
1,175,859 UART: [idev] CDI.KEYID = 6
1,176,219 UART: [idev] SUBJECT.KEYID = 7
1,176,643 UART: [idev] UDS.KEYID = 0
1,176,988 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,202,406 UART: [idev] Sha1 KeyId Algorithm
1,210,876 UART: [idev] --
1,211,980 UART: [ldev] ++
1,212,148 UART: [ldev] CDI.KEYID = 6
1,212,511 UART: [ldev] SUBJECT.KEYID = 5
1,212,937 UART: [ldev] AUTHORITY.KEYID = 7
1,213,400 UART: [ldev] FE.KEYID = 1
1,218,674 UART: [ldev] Erasing FE.KEYID = 1
1,245,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,154 UART: [ldev] --
1,284,481 UART: [fwproc] Wait for Commands...
1,285,287 UART: [fwproc] Recv command 0x46574c44
1,286,015 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,577 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,740 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,218 ready_for_fw is high
1,060,218 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,968 >>> mbox cmd response: success
2,701,760 UART:
2,701,776 UART: Running Caliptra FMC ...
2,702,184 UART:
2,702,327 UART: [state] CFI Enabled
2,713,218 UART: [fht] FMC Alias Private Key: 7
2,820,857 UART: [art] Extend RT PCRs Done
2,821,285 UART: [art] Lock RT PCRs Done
2,822,881 UART: [art] Populate DV Done
2,831,098 UART: [fht] FMC Alias Private Key: 7
2,832,220 UART: [art] Derive CDI
2,832,500 UART: [art] Store in in slot 0x4
2,918,021 UART: [art] Derive Key Pair
2,918,381 UART: [art] Store priv key in slot 0x5
2,931,863 UART: [art] Derive Key Pair - Done
2,946,364 UART: [art] Signing Cert with AUTHO
2,946,844 UART: RITY.KEYID = 7
2,962,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,803 UART: [art] PUB.X = E72E796307D0F167CB02C032675733B4E43A4CBF970A2DE6A528157491621CFBB71909A1BEC83690A8309AD06DBE1633
2,969,561 UART: [art] PUB.Y = 0EB51ABF948C7C4A45EBC4922E0FC7C0F8D2B8B22AC265FD313331257FFA16F44A747EDEAA1F0D957914CDDF4FFC5A09
2,976,523 UART: [art] SIG.R = BCADAAF580E3A69FE84324780385350D7F4C4F3EDC44439D60D1BA41645E6E1E3843504B0FA522F065DA03A22C16ADCF
2,983,293 UART: [art] SIG.S = C9EDA60084A6C6ED43D8230DD746D43181295BAAE07FE0DFF0AFEFF51E045D31034878DC4A34004F4C1D8FD2D4CAECB7
3,006,677 UART: Caliptra RT
3,007,022 UART: [state] CFI Enabled
3,114,618 UART: [rt] RT listening for mailbox commands...
3,115,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,934 UART: [rt]cmd =0x46504c54, len=4
3,146,012 >>> mbox cmd response data (8 bytes)
3,146,215 UART: [rt] FIPS self test
3,146,543 UART: [kat] ++
3,146,695 UART: [kat] sha1
3,150,927 UART: [kat] SHA2-256
3,152,949 UART: [kat] SHA2-384
3,155,728 UART: [kat] SHA2-512-ACC
3,157,655 UART: [kat] ECC-384
3,159,166 UART: Fatal Error: 0x90040004
3,160,705 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,710 >>> mbox cmd response: failed
3,160,710 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,632 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,174,305 ready_for_fw is high
1,174,305 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,235 UART: [idev] Sha1 KeyId Algorithm
1,208,075 UART: [idev] --
1,209,174 UART: [ldev] ++
1,209,342 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,133 UART: [ldev] AUTHORITY.KEYID = 7
1,210,596 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,282,001 UART: [fwproc] Recv command 0x46574c44
1,282,734 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,295 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,375 >>> mbox cmd response: success
2,786,586 UART: [afmc] ++
2,786,754 UART: [afmc] CDI.KEYID = 6
2,787,117 UART: [afmc] SUBJECT.KEYID = 7
2,787,543 UART: [afmc] AUTHORITY.KEYID = 5
2,823,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,561 UART: [afmc] --
2,866,575 UART: [cold-reset] --
2,867,521 UART: [state] Locking Datavault
2,868,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,138 UART: [state] Locking ICCM
2,869,794 UART: [exit] Launching FMC @ 0x40000130
2,875,123 UART:
2,875,139 UART: Running Caliptra FMC ...
2,875,547 UART:
2,875,601 UART: [state] CFI Enabled
2,885,990 UART: [fht] FMC Alias Private Key: 7
2,994,023 UART: [art] Extend RT PCRs Done
2,994,451 UART: [art] Lock RT PCRs Done
2,995,891 UART: [art] Populate DV Done
3,004,054 UART: [fht] FMC Alias Private Key: 7
3,005,228 UART: [art] Derive CDI
3,005,508 UART: [art] Store in in slot 0x4
3,090,943 UART: [art] Derive Key Pair
3,091,303 UART: [art] Store priv key in slot 0x5
3,103,887 UART: [art] Derive Key Pair - Done
3,118,593 UART: [art] Signing Cert with AUTHO
3,119,073 UART: RITY.KEYID = 7
3,134,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,328 UART: [art] PUB.X = FDA319F868D2CA5CB6E476B82C131642B730148EBC79DFB549E25EE306CF77664863C02427614B0A7BC984A772002BC0
3,142,072 UART: [art] PUB.Y = 1F5F303A858F9CCE96F56CF975D16A8A49BA9D176A7E3082D69B5652B9A6C5287BB505BE7FFE9B49B88C35B259B04E66
3,149,029 UART: [art] SIG.R = A10A8ADE995FABEAE130518080BA8728416212F17D862236D926BBEA28C7AD6F2612D7D8644372C6C67B728230612944
3,155,792 UART: [art] SIG.S = 9EEFC2D996593BFE63FDBAF3C1596A7116009B9479235285DADCA96F69AB47320265EE2073ED24B82C5B42022F7F27E3
3,179,031 UART: Caliptra RT
3,179,284 UART: [state] CFI Enabled
3,286,918 UART: [rt] RT listening for mailbox commands...
3,287,581 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,482 UART: [rt]cmd =0x46504c54, len=4
3,318,666 >>> mbox cmd response data (8 bytes)
3,318,893 UART: [rt] FIPS self test
3,319,221 UART: [kat] ++
3,319,373 UART: [kat] sha1
3,323,583 UART: [kat] SHA2-256
3,325,605 UART: [kat] SHA2-384
3,328,394 UART: [kat] SHA2-512-ACC
3,330,321 UART: [kat] ECC-384
3,331,986 UART: Fatal Error: 0x90040004
3,333,525 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,530 >>> mbox cmd response: failed
3,333,530 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,174,439 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,001 UART: [idev] --
1,209,032 UART: [ldev] ++
1,209,200 UART: [ldev] CDI.KEYID = 6
1,209,564 UART: [ldev] SUBJECT.KEYID = 5
1,209,991 UART: [ldev] AUTHORITY.KEYID = 7
1,210,454 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,296 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,181 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,215 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 ready_for_fw is high
1,056,026 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,681 >>> mbox cmd response: success
2,694,391 UART:
2,694,407 UART: Running Caliptra FMC ...
2,694,815 UART:
2,694,869 UART: [state] CFI Enabled
2,705,316 UART: [fht] FMC Alias Private Key: 7
2,813,837 UART: [art] Extend RT PCRs Done
2,814,265 UART: [art] Lock RT PCRs Done
2,815,873 UART: [art] Populate DV Done
2,824,110 UART: [fht] FMC Alias Private Key: 7
2,825,168 UART: [art] Derive CDI
2,825,448 UART: [art] Store in in slot 0x4
2,910,967 UART: [art] Derive Key Pair
2,911,327 UART: [art] Store priv key in slot 0x5
2,924,953 UART: [art] Derive Key Pair - Done
2,939,721 UART: [art] Signing Cert with AUTHO
2,940,201 UART: RITY.KEYID = 7
2,955,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,432 UART: [art] PUB.X = F836EC684A9864433AD6CB6A574E3A514D4625B94E87C185579E9FBA7FC2BB8320B7B35792512E3CB248E0E0736261FC
2,963,204 UART: [art] PUB.Y = 73F4C874626FA9E906A5CDB0D01B00F9179EBB4BCF52E62F3E9782B21950A6B4DCD8EBEDA2CFE1B34350326B09EA36DE
2,970,146 UART: [art] SIG.R = 8D2FF6F672D0EDB2B4883EA2A6C023CC2F73206564FB588FF96821267B553B0BB1C47AB63BA37FB6A6863ECC6DDBD5DA
2,976,933 UART: [art] SIG.S = 470F0352E8BEE1DE21CD7F24B4F320A9A2E738C619FC8F2B76283107BBD04BEC0D6B78518ADBEBB58493257F8140B5E3
3,001,094 UART: Caliptra RT
3,001,347 UART: [state] CFI Enabled
3,109,084 UART: [rt] RT listening for mailbox commands...
3,109,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,700 UART: [rt]cmd =0x46504c54, len=4
3,140,950 >>> mbox cmd response data (8 bytes)
3,141,127 UART: [rt] FIPS self test
3,141,455 UART: [kat] ++
3,141,607 UART: [kat] sha1
3,145,795 UART: [kat] SHA2-256
3,147,817 UART: [kat] SHA2-384
3,150,698 UART: [kat] SHA2-512-ACC
3,152,625 UART: [kat] ECC-384
3,154,078 UART: Fatal Error: 0x90040004
3,155,617 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,622 >>> mbox cmd response: failed
3,155,622 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,364 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,955 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 ready_for_fw is high
1,174,684 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,061 UART: [ldev] --
1,282,385 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,709 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,526 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,572 >>> mbox cmd response: success
2,785,595 UART: [afmc] ++
2,785,763 UART: [afmc] CDI.KEYID = 6
2,786,126 UART: [afmc] SUBJECT.KEYID = 7
2,786,552 UART: [afmc] AUTHORITY.KEYID = 5
2,821,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,974 UART: [afmc] --
2,864,926 UART: [cold-reset] --
2,865,770 UART: [state] Locking Datavault
2,866,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,535 UART: [state] Locking ICCM
2,868,171 UART: [exit] Launching FMC @ 0x40000130
2,873,500 UART:
2,873,516 UART: Running Caliptra FMC ...
2,873,924 UART:
2,874,067 UART: [state] CFI Enabled
2,884,612 UART: [fht] FMC Alias Private Key: 7
2,992,331 UART: [art] Extend RT PCRs Done
2,992,759 UART: [art] Lock RT PCRs Done
2,994,183 UART: [art] Populate DV Done
3,002,328 UART: [fht] FMC Alias Private Key: 7
3,003,306 UART: [art] Derive CDI
3,003,586 UART: [art] Store in in slot 0x4
3,089,213 UART: [art] Derive Key Pair
3,089,573 UART: [art] Store priv key in slot 0x5
3,103,145 UART: [art] Derive Key Pair - Done
3,117,903 UART: [art] Signing Cert with AUTHO
3,118,383 UART: RITY.KEYID = 7
3,133,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,552 UART: [art] PUB.X = 3BA51265AFD05C8F494FE9B474DC7EE9ACBD514E9F61A636EE1C06638FE763C8C218FD744376EB8E405E60BA3EB5087B
3,141,332 UART: [art] PUB.Y = FEBF64F947A8FAEEBE483816C8C1801B43C2E995FE3ABE9E68CEAF782A13E5DDB82F80A289CB672938F6E643A848CED7
3,148,304 UART: [art] SIG.R = 79BF237EB4B74280859C7F752B780D4F6F77B4359B861F7D2A4FDA4555FED18DDE2F2F972D57C4DE5F24D238A01B0839
3,155,076 UART: [art] SIG.S = B5C91B8089592F7D9A281060AEA2F320A22E2F9F2939C1E398DDED98FFB8DB6587FE13CBC94B1BEC44A0B6F0360A0A71
3,178,709 UART: Caliptra RT
3,179,054 UART: [state] CFI Enabled
3,286,763 UART: [rt] RT listening for mailbox commands...
3,287,426 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,165 UART: [rt]cmd =0x46504c54, len=4
3,318,221 >>> mbox cmd response data (8 bytes)
3,318,374 UART: [rt] FIPS self test
3,318,702 UART: [kat] ++
3,318,854 UART: [kat] sha1
3,323,156 UART: [kat] SHA2-256
3,325,178 UART: [kat] SHA2-384
3,328,151 UART: [kat] SHA2-512-ACC
3,330,078 UART: [kat] ECC-384
3,331,687 UART: Fatal Error: 0x90040004
3,333,226 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,231 >>> mbox cmd response: failed
3,333,231 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,275 UART: [ldev] --
1,280,539 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,826 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,962 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,665 ready_for_fw is high
1,056,665 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,240 >>> mbox cmd response: success
2,698,426 UART:
2,698,442 UART: Running Caliptra FMC ...
2,698,850 UART:
2,698,993 UART: [state] CFI Enabled
2,709,604 UART: [fht] FMC Alias Private Key: 7
2,817,027 UART: [art] Extend RT PCRs Done
2,817,455 UART: [art] Lock RT PCRs Done
2,819,309 UART: [art] Populate DV Done
2,827,522 UART: [fht] FMC Alias Private Key: 7
2,828,684 UART: [art] Derive CDI
2,828,964 UART: [art] Store in in slot 0x4
2,914,461 UART: [art] Derive Key Pair
2,914,821 UART: [art] Store priv key in slot 0x5
2,927,985 UART: [art] Derive Key Pair - Done
2,942,674 UART: [art] Signing Cert with AUTHO
2,943,154 UART: RITY.KEYID = 7
2,958,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,315 UART: [art] PUB.X = E81F68BB0B10A183B343ECFB947C4FEF18A027FEB4094AED4941D4FF445F3F81CED4EBD41BC7F5C1A45DA313B5CE2CB5
2,966,107 UART: [art] PUB.Y = 29ABAC47F4E2E280ED8E87AAB8BEA09334FBC426D124E7AEC6792279BDFB224A173DC4BC48D9469F6A7DDF8C125B8EFC
2,973,083 UART: [art] SIG.R = E2E2F33EAE12B5E121EAA0676BE65FD31E43055652F19C1A6B56948A3FDE6F7A40746EB6662BC609E776AEB97CA52153
2,979,857 UART: [art] SIG.S = 94C343347D90E3B63E080F7457290D310F1073633059EDA0E4506053573E9C537838C6C754B5BE2170663B862CC06D78
3,003,956 UART: Caliptra RT
3,004,301 UART: [state] CFI Enabled
3,112,659 UART: [rt] RT listening for mailbox commands...
3,113,322 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,363 UART: [rt]cmd =0x46504c54, len=4
3,144,623 >>> mbox cmd response data (8 bytes)
3,144,828 UART: [rt] FIPS self test
3,145,156 UART: [kat] ++
3,145,308 UART: [kat] sha1
3,149,396 UART: [kat] SHA2-256
3,151,418 UART: [kat] SHA2-384
3,154,321 UART: [kat] SHA2-512-ACC
3,156,248 UART: [kat] ECC-384
3,157,769 UART: Fatal Error: 0x90040004
3,159,308 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,313 >>> mbox cmd response: failed
3,159,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,872 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,224 >>> mbox cmd response: failed
822,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,193 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,344 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,352 >>> mbox cmd response: failed
821,352 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,845 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,309 >>> mbox cmd response: failed
822,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,588 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,045 >>> mbox cmd response: failed
822,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,122 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,640 >>> mbox cmd response: failed
821,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,957 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,454 >>> mbox cmd response: failed
821,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,141 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,491 >>> mbox cmd response: failed
822,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,416 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,347 >>> mbox cmd response: failed
822,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,228 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,328 >>> mbox cmd response: failed
822,328 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,727 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,154 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,162 >>> mbox cmd response: failed
822,162 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,755 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,145 >>> mbox cmd response: failed
822,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,780 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,893 >>> mbox cmd response: failed
822,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,990 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,643 UART: [kat] SHA2-256
881,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,689 UART: [kat] ++
885,841 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
894,776 UART: [kat] SHA2-512-ACC
896,677 UART: [kat] ECC-384
902,262 UART: [kat] HMAC-384Kdf
906,890 UART: [kat] LMS
1,475,086 UART: [kat] --
1,476,027 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,350 UART: [idev] ++
1,479,518 UART: [idev] CDI.KEYID = 6
1,479,878 UART: [idev] SUBJECT.KEYID = 7
1,480,302 UART: [idev] UDS.KEYID = 0
1,480,647 ready_for_fw is high
1,480,647 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,896 UART: [idev] Erasing UDS.KEYID = 0
1,504,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,260 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,341 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,314 UART: [ldev] --
1,586,807 UART: [fwproc] Waiting for Commands...
1,587,492 UART: [fwproc] Received command 0x46574c44
1,588,283 UART: [fwproc] Received Image of size 115196 bytes
2,896,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,680 >>> mbox cmd response: success
3,090,692 UART: [afmc] ++
3,090,860 UART: [afmc] CDI.KEYID = 6
3,091,222 UART: [afmc] SUBJECT.KEYID = 7
3,091,647 UART: [afmc] AUTHORITY.KEYID = 5
3,126,618 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,021 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,711 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,532 UART: [afmc] --
3,169,660 UART: [cold-reset] --
3,170,540 UART: [state] Locking Datavault
3,171,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,475 UART: [state] Locking ICCM
3,172,985 UART: [exit] Launching FMC @ 0x40000130
3,178,314 UART:
3,178,330 UART: Running Caliptra FMC ...
3,178,738 UART:
3,178,792 UART: [state] CFI Enabled
3,189,357 UART: [fht] FMC Alias Private Key: 7
3,297,650 UART: [art] Extend RT PCRs Done
3,298,078 UART: [art] Lock RT PCRs Done
3,299,444 UART: [art] Populate DV Done
3,307,789 UART: [fht] FMC Alias Private Key: 7
3,308,873 UART: [art] Derive CDI
3,309,153 UART: [art] Store in in slot 0x4
3,395,140 UART: [art] Derive Key Pair
3,395,500 UART: [art] Store priv key in slot 0x5
3,408,426 UART: [art] Derive Key Pair - Done
3,423,250 UART: [art] Signing Cert with AUTHO
3,423,730 UART: RITY.KEYID = 7
3,438,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,729 UART: [art] PUB.X = C9CFE36881013403BD51FF8A4E8BBBE636AD24892C0476CEC5EB385C2F0D35E65541DDF4E4601CF8B8618FCA1D92C7AC
3,446,505 UART: [art] PUB.Y = 5111C4ACF72DAFFEBFD8084A8EA733A98BDDA107955E240530463AB45207F7F25AA750541172851A9B682B0E995AD1B8
3,453,446 UART: [art] SIG.R = AED1CCB1577D309046DA5AF709D90066B5D54A8F4A47662FFFC769254C67939B0083AD02D312D1C5DCFCE4F467C35F49
3,460,176 UART: [art] SIG.S = 88DE320A241CFB97FC1DC4816D86E50E154DAAA2E55E2CE0688A4FC20B85AA99219CB7FBF7A8364159D4B6458E4E6A0C
3,484,309 UART: Caliptra RT
3,484,562 UART: [state] CFI Enabled
3,593,228 UART: [rt] RT listening for mailbox commands...
3,593,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,426 UART: [rt]cmd =0x46504c54, len=4
3,624,630 >>> mbox cmd response data (8 bytes)
3,624,911 UART: [rt] FIPS self test
3,625,239 UART: [kat] ++
3,625,391 UART: [kat] sha1
3,629,635 UART: [kat] SHA2-256
3,631,657 UART: [kat] SHA2-384
3,634,694 UART: [kat] SHA2-512-ACC
3,636,621 UART: [kat] ECC-384
3,645,466 UART: Fatal Error: 0x90040005
3,647,005 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,647,010 >>> mbox cmd response: failed
3,647,010 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,647,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,942 UART: [kat] HMAC-384Kdf
907,698 UART: [kat] LMS
1,475,894 UART: [kat] --
1,476,965 UART: [cold-reset] ++
1,477,465 UART: [fht] Storing FHT @ 0x50003400
1,480,192 UART: [idev] ++
1,480,360 UART: [idev] CDI.KEYID = 6
1,480,720 UART: [idev] SUBJECT.KEYID = 7
1,481,144 UART: [idev] UDS.KEYID = 0
1,481,489 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,268 UART: [idev] Erasing UDS.KEYID = 0
1,506,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,606 UART: [idev] --
1,515,463 UART: [ldev] ++
1,515,631 UART: [ldev] CDI.KEYID = 6
1,515,994 UART: [ldev] SUBJECT.KEYID = 5
1,516,420 UART: [ldev] AUTHORITY.KEYID = 7
1,516,883 UART: [ldev] FE.KEYID = 1
1,522,085 UART: [ldev] Erasing FE.KEYID = 1
1,547,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,690 UART: [ldev] --
1,587,021 UART: [fwproc] Waiting for Commands...
1,587,762 UART: [fwproc] Received command 0x46574c44
1,588,553 UART: [fwproc] Received Image of size 115196 bytes
2,897,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,632 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 ready_for_fw is high
1,362,741 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,138 >>> mbox cmd response: success
3,001,020 UART:
3,001,036 UART: Running Caliptra FMC ...
3,001,444 UART:
3,001,498 UART: [state] CFI Enabled
3,012,213 UART: [fht] FMC Alias Private Key: 7
3,120,424 UART: [art] Extend RT PCRs Done
3,120,852 UART: [art] Lock RT PCRs Done
3,122,070 UART: [art] Populate DV Done
3,130,471 UART: [fht] FMC Alias Private Key: 7
3,131,593 UART: [art] Derive CDI
3,131,873 UART: [art] Store in in slot 0x4
3,217,544 UART: [art] Derive Key Pair
3,217,904 UART: [art] Store priv key in slot 0x5
3,230,882 UART: [art] Derive Key Pair - Done
3,245,402 UART: [art] Signing Cert with AUTHO
3,245,882 UART: RITY.KEYID = 7
3,261,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,881 UART: [art] PUB.X = ACB9308468068C1F596A79AF9AAAAABEB89837E1CFB7220B3D2108F27CA3B1895B038C1E5302C159B84B2B9517045DC9
3,268,641 UART: [art] PUB.Y = B534FAB5887956CB5395960D63C18A2B18C73ABFDEB1DEF33DB2568E14049778C23BF22DBAACFFCFAA08D90020FAB336
3,275,580 UART: [art] SIG.R = 3BEAD74622BDE7BCF669E525B05E9F3F70952B30BF5B789EC5293306C2A7A41A5399E966970EC758290B92F70B92CE82
3,282,342 UART: [art] SIG.S = 58406B64DA0214E49BF0194049713E9EB6B2E2F3865D317641CBD06D16613EB38662DA0C92F81F03FB97611AE605B853
3,306,271 UART: Caliptra RT
3,306,524 UART: [state] CFI Enabled
3,415,344 UART: [rt] RT listening for mailbox commands...
3,416,007 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,848 UART: [rt]cmd =0x46504c54, len=4
3,447,110 >>> mbox cmd response data (8 bytes)
3,447,249 UART: [rt] FIPS self test
3,447,577 UART: [kat] ++
3,447,729 UART: [kat] sha1
3,452,085 UART: [kat] SHA2-256
3,454,107 UART: [kat] SHA2-384
3,456,918 UART: [kat] SHA2-512-ACC
3,458,845 UART: [kat] ECC-384
3,467,932 UART: Fatal Error: 0x90040005
3,469,471 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,469,476 >>> mbox cmd response: failed
3,469,476 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,469,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,946 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,863 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,907 UART: [idev] Erasing UDS.KEYID = 0
1,505,719 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,349 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,300 UART: [ldev] Erasing FE.KEYID = 1
1,547,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,957 UART: [ldev] --
1,587,308 UART: [fwproc] Waiting for Commands...
1,588,019 UART: [fwproc] Received command 0x46574c44
1,588,810 UART: [fwproc] Received Image of size 115196 bytes
2,896,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,984 >>> mbox cmd response: success
3,093,158 UART: [afmc] ++
3,093,326 UART: [afmc] CDI.KEYID = 6
3,093,688 UART: [afmc] SUBJECT.KEYID = 7
3,094,113 UART: [afmc] AUTHORITY.KEYID = 5
3,128,830 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,439 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,129 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,866 UART: [afmc] --
3,171,768 UART: [cold-reset] --
3,172,338 UART: [state] Locking Datavault
3,173,441 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,045 UART: [state] Locking ICCM
3,174,669 UART: [exit] Launching FMC @ 0x40000130
3,179,998 UART:
3,180,014 UART: Running Caliptra FMC ...
3,180,422 UART:
3,180,565 UART: [state] CFI Enabled
3,191,476 UART: [fht] FMC Alias Private Key: 7
3,299,775 UART: [art] Extend RT PCRs Done
3,300,203 UART: [art] Lock RT PCRs Done
3,301,731 UART: [art] Populate DV Done
3,309,580 UART: [fht] FMC Alias Private Key: 7
3,310,700 UART: [art] Derive CDI
3,310,980 UART: [art] Store in in slot 0x4
3,396,759 UART: [art] Derive Key Pair
3,397,119 UART: [art] Store priv key in slot 0x5
3,410,331 UART: [art] Derive Key Pair - Done
3,425,191 UART: [art] Signing Cert with AUTHO
3,425,671 UART: RITY.KEYID = 7
3,440,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,434 UART: [art] PUB.X = 20C424E98232293AAA4F5FD083C0E05D54984047D1D3772D83A6E373D4B20699979F49F838AA4B6E9D1C47148D4AB32E
3,448,199 UART: [art] PUB.Y = 1869B419743575A1AA107A09803137D79D2C823ACBDC1A24B0C0A14495A7CCDCAF9D057A6F9B99F08D4B19EA53EB7B83
3,455,153 UART: [art] SIG.R = 17BE7A1F4433F34B350EC0A7DC47907CB62A9569FE45A362E84D97376DECD3FA78CA4899A751685C4C3890E96ECE5206
3,461,923 UART: [art] SIG.S = 3EAEEFEC4B162BEA2321BC0749CD351A6753AED2FFE6047D1B36CFB1AFEDCAE4D60C2B40163E1ADFDD137C80901740C5
3,485,687 UART: Caliptra RT
3,486,032 UART: [state] CFI Enabled
3,594,230 UART: [rt] RT listening for mailbox commands...
3,594,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,714 UART: [rt]cmd =0x46504c54, len=4
3,625,930 >>> mbox cmd response data (8 bytes)
3,626,231 UART: [rt] FIPS self test
3,626,559 UART: [kat] ++
3,626,711 UART: [kat] sha1
3,630,961 UART: [kat] SHA2-256
3,632,983 UART: [kat] SHA2-384
3,635,806 UART: [kat] SHA2-512-ACC
3,637,733 UART: [kat] ECC-384
3,646,768 UART: Fatal Error: 0x90040005
3,648,307 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,312 >>> mbox cmd response: failed
3,648,312 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,692 UART: [kat] SHA2-256
882,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,738 UART: [kat] ++
886,890 UART: [kat] sha1
891,238 UART: [kat] SHA2-256
893,176 UART: [kat] SHA2-384
896,061 UART: [kat] SHA2-512-ACC
897,962 UART: [kat] ECC-384
903,873 UART: [kat] HMAC-384Kdf
908,265 UART: [kat] LMS
1,476,461 UART: [kat] --
1,477,432 UART: [cold-reset] ++
1,477,820 UART: [fht] Storing FHT @ 0x50003400
1,480,729 UART: [idev] ++
1,480,897 UART: [idev] CDI.KEYID = 6
1,481,257 UART: [idev] SUBJECT.KEYID = 7
1,481,681 UART: [idev] UDS.KEYID = 0
1,482,026 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,687 UART: [idev] Erasing UDS.KEYID = 0
1,506,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,041 UART: [idev] --
1,515,998 UART: [ldev] ++
1,516,166 UART: [ldev] CDI.KEYID = 6
1,516,529 UART: [ldev] SUBJECT.KEYID = 5
1,516,955 UART: [ldev] AUTHORITY.KEYID = 7
1,517,418 UART: [ldev] FE.KEYID = 1
1,522,304 UART: [ldev] Erasing FE.KEYID = 1
1,547,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,985 UART: [ldev] --
1,586,260 UART: [fwproc] Waiting for Commands...
1,586,927 UART: [fwproc] Received command 0x46574c44
1,587,718 UART: [fwproc] Received Image of size 115196 bytes
2,895,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,374 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,196 ready_for_fw is high
1,362,196 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,379 >>> mbox cmd response: success
3,000,765 UART:
3,000,781 UART: Running Caliptra FMC ...
3,001,189 UART:
3,001,332 UART: [state] CFI Enabled
3,011,871 UART: [fht] FMC Alias Private Key: 7
3,119,834 UART: [art] Extend RT PCRs Done
3,120,262 UART: [art] Lock RT PCRs Done
3,121,820 UART: [art] Populate DV Done
3,129,997 UART: [fht] FMC Alias Private Key: 7
3,131,083 UART: [art] Derive CDI
3,131,363 UART: [art] Store in in slot 0x4
3,217,534 UART: [art] Derive Key Pair
3,217,894 UART: [art] Store priv key in slot 0x5
3,231,356 UART: [art] Derive Key Pair - Done
3,246,082 UART: [art] Signing Cert with AUTHO
3,246,562 UART: RITY.KEYID = 7
3,261,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,613 UART: [art] PUB.X = 80EB8282167DA87AA372BCBBC00AD7ED4602C2F589FB9B68049CAAC5497A1012793239E95671A8FC11D0C9E3E822A477
3,269,380 UART: [art] PUB.Y = 5834D231B4DB144A7A2E2A62F008E25AA8AC756CAF8F5A5EE971FA6EC59491564C5E08B27F01DCCE692B746245943CE3
3,276,331 UART: [art] SIG.R = A36AE5080F7CFA8F2189615944F5993D55BBC897F765B231BB5D9638A50F2A6A370A6716058410C0051E32CDF36E8BA5
3,283,083 UART: [art] SIG.S = BB4A6325C1C5F1C9AF7FBB308892DC632302103707950B2C1506DB2E387952E2D9021EDD1E19FA078BE712ABCEEE96B5
3,306,604 UART: Caliptra RT
3,306,949 UART: [state] CFI Enabled
3,414,567 UART: [rt] RT listening for mailbox commands...
3,415,230 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,149 UART: [rt]cmd =0x46504c54, len=4
3,446,379 >>> mbox cmd response data (8 bytes)
3,446,574 UART: [rt] FIPS self test
3,446,902 UART: [kat] ++
3,447,054 UART: [kat] sha1
3,451,402 UART: [kat] SHA2-256
3,453,424 UART: [kat] SHA2-384
3,456,279 UART: [kat] SHA2-512-ACC
3,458,206 UART: [kat] ECC-384
3,467,123 UART: Fatal Error: 0x90040005
3,468,662 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,468,667 >>> mbox cmd response: failed
3,468,667 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,468,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,632 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,003 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,870 UART: [kat] SHA2-512-ACC
908,771 UART: [kat] ECC-384
918,460 UART: [kat] HMAC-384Kdf
923,030 UART: [kat] LMS
1,171,358 UART: [kat] --
1,172,047 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 ready_for_fw is high
1,176,583 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,548 UART: [idev] Erasing UDS.KEYID = 0
1,201,445 UART: [idev] Sha1 KeyId Algorithm
1,209,949 UART: [idev] --
1,211,125 UART: [ldev] ++
1,211,293 UART: [ldev] CDI.KEYID = 6
1,211,656 UART: [ldev] SUBJECT.KEYID = 5
1,212,082 UART: [ldev] AUTHORITY.KEYID = 7
1,212,545 UART: [ldev] FE.KEYID = 1
1,217,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,562 UART: [fwproc] Recv command 0x46574c44
1,284,290 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,196 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,311 >>> mbox cmd response: success
2,787,353 UART: [afmc] ++
2,787,521 UART: [afmc] CDI.KEYID = 6
2,787,883 UART: [afmc] SUBJECT.KEYID = 7
2,788,308 UART: [afmc] AUTHORITY.KEYID = 5
2,823,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,064 UART: [afmc] --
2,867,030 UART: [cold-reset] --
2,867,974 UART: [state] Locking Datavault
2,869,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,771 UART: [state] Locking ICCM
2,870,323 UART: [exit] Launching FMC @ 0x40000130
2,875,652 UART:
2,875,668 UART: Running Caliptra FMC ...
2,876,076 UART:
2,876,130 UART: [state] CFI Enabled
2,886,845 UART: [fht] FMC Alias Private Key: 7
2,995,190 UART: [art] Extend RT PCRs Done
2,995,618 UART: [art] Lock RT PCRs Done
2,996,890 UART: [art] Populate DV Done
3,005,077 UART: [fht] FMC Alias Private Key: 7
3,006,109 UART: [art] Derive CDI
3,006,389 UART: [art] Store in in slot 0x4
3,091,908 UART: [art] Derive Key Pair
3,092,268 UART: [art] Store priv key in slot 0x5
3,105,508 UART: [art] Derive Key Pair - Done
3,120,101 UART: [art] Signing Cert with AUTHO
3,120,581 UART: RITY.KEYID = 7
3,135,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,030 UART: [art] PUB.X = 1FE5ABD199EBE7027D69FECB8583101EA4B9074A299C8BEA6A966871991B6E11482BDFE59D56DD5F1CD078DA85E15E15
3,142,808 UART: [art] PUB.Y = C0193F090B200ABF8C4C20FBA2EB2A8C8D6805B4586B0DE804160F260189E30AECDFA4124DBE3CFEE83B81C94CAC37C1
3,149,751 UART: [art] SIG.R = B2CFA916DCB1D92F6E9D04AC0282666A0AEA2ACF5D784353534BE00F46621C0B3AD343595ADFA7512FF2A2B8F557874B
3,156,520 UART: [art] SIG.S = E0AA48AA01A56DAAEC19CB7D9D110E2EBBAF63618D74319C8DF5EF726FF31F49CE2152CC56517D32C2BCF2311873A6FB
3,179,887 UART: Caliptra RT
3,180,140 UART: [state] CFI Enabled
3,288,240 UART: [rt] RT listening for mailbox commands...
3,288,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,564 UART: [rt]cmd =0x46504c54, len=4
3,319,636 >>> mbox cmd response data (8 bytes)
3,319,755 UART: [rt] FIPS self test
3,320,083 UART: [kat] ++
3,320,235 UART: [kat] sha1
3,324,479 UART: [kat] SHA2-256
3,326,501 UART: [kat] SHA2-384
3,329,244 UART: [kat] SHA2-512-ACC
3,331,171 UART: [kat] ECC-384
3,340,154 UART: Fatal Error: 0x90040005
3,341,693 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,698 >>> mbox cmd response: failed
3,341,698 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
893,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,557 UART: [kat] ++
897,709 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,644 UART: [kat] HMAC-384Kdf
923,234 UART: [kat] LMS
1,171,562 UART: [kat] --
1,172,377 UART: [cold-reset] ++
1,172,887 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,176,857 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,506 UART: [idev] Erasing UDS.KEYID = 0
1,201,443 UART: [idev] Sha1 KeyId Algorithm
1,209,747 UART: [idev] --
1,210,949 UART: [ldev] ++
1,211,117 UART: [ldev] CDI.KEYID = 6
1,211,480 UART: [ldev] SUBJECT.KEYID = 5
1,211,906 UART: [ldev] AUTHORITY.KEYID = 7
1,212,369 UART: [ldev] FE.KEYID = 1
1,217,623 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,521 UART: [ldev] --
1,282,900 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,264 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,132 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,213 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,758 >>> mbox cmd response: success
2,700,780 UART:
2,700,796 UART: Running Caliptra FMC ...
2,701,204 UART:
2,701,258 UART: [state] CFI Enabled
2,711,629 UART: [fht] FMC Alias Private Key: 7
2,819,020 UART: [art] Extend RT PCRs Done
2,819,448 UART: [art] Lock RT PCRs Done
2,821,004 UART: [art] Populate DV Done
2,829,151 UART: [fht] FMC Alias Private Key: 7
2,830,321 UART: [art] Derive CDI
2,830,601 UART: [art] Store in in slot 0x4
2,916,248 UART: [art] Derive Key Pair
2,916,608 UART: [art] Store priv key in slot 0x5
2,929,998 UART: [art] Derive Key Pair - Done
2,944,749 UART: [art] Signing Cert with AUTHO
2,945,229 UART: RITY.KEYID = 7
2,960,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,422 UART: [art] PUB.X = 50C342EBB71CAAA90D6FE7D9C48DA7709EA71FCDBAF889AA5FAC535035A2EEF2B43B7F37F4C01907C6C8845CB1F97327
2,968,208 UART: [art] PUB.Y = D8BBEB947418D84526F7A5A3B65FCF3F67F5A5D537286F2593455FFCB9C8B4AEE56C12735FD2A0F2FB7B9D83246E7DBE
2,975,176 UART: [art] SIG.R = D8D76ACEE5F9172AB14A79CCAD4E7CD379E1289A8DC643476FFC3860776EB8AC27F283BC1DA39A1211696D8C9F6172D5
2,981,960 UART: [art] SIG.S = 7B402BE7FDF4485CA5031E64CE3E74D99C74A0D053ADB52BFF5C59B6761B5FBE3C1577A544C8334031C1B4B4A2CD5C11
3,005,664 UART: Caliptra RT
3,005,917 UART: [state] CFI Enabled
3,113,400 UART: [rt] RT listening for mailbox commands...
3,114,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,954 UART: [rt]cmd =0x46504c54, len=4
3,145,190 >>> mbox cmd response data (8 bytes)
3,145,359 UART: [rt] FIPS self test
3,145,687 UART: [kat] ++
3,145,839 UART: [kat] sha1
3,150,083 UART: [kat] SHA2-256
3,152,105 UART: [kat] SHA2-384
3,154,998 UART: [kat] SHA2-512-ACC
3,156,925 UART: [kat] ECC-384
3,165,854 UART: Fatal Error: 0x90040005
3,167,393 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,398 >>> mbox cmd response: failed
3,167,398 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,518 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
893,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,446 UART: [kat] ++
897,598 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
918,313 UART: [kat] HMAC-384Kdf
922,969 UART: [kat] LMS
1,171,297 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,878 UART: [fht] FHT @ 0x50003400
1,175,409 UART: [idev] ++
1,175,577 UART: [idev] CDI.KEYID = 6
1,175,937 UART: [idev] SUBJECT.KEYID = 7
1,176,361 UART: [idev] UDS.KEYID = 0
1,176,706 ready_for_fw is high
1,176,706 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,685 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,206 UART: [idev] --
1,211,270 UART: [ldev] ++
1,211,438 UART: [ldev] CDI.KEYID = 6
1,211,801 UART: [ldev] SUBJECT.KEYID = 5
1,212,227 UART: [ldev] AUTHORITY.KEYID = 7
1,212,690 UART: [ldev] FE.KEYID = 1
1,217,826 UART: [ldev] Erasing FE.KEYID = 1
1,244,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,160 UART: [ldev] --
1,283,657 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,001 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,971 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,146 >>> mbox cmd response: success
2,787,392 UART: [afmc] ++
2,787,560 UART: [afmc] CDI.KEYID = 6
2,787,922 UART: [afmc] SUBJECT.KEYID = 7
2,788,347 UART: [afmc] AUTHORITY.KEYID = 5
2,824,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,655 UART: [afmc] --
2,867,767 UART: [cold-reset] --
2,868,435 UART: [state] Locking Datavault
2,869,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,990 UART: [state] Locking ICCM
2,870,508 UART: [exit] Launching FMC @ 0x40000130
2,875,837 UART:
2,875,853 UART: Running Caliptra FMC ...
2,876,261 UART:
2,876,404 UART: [state] CFI Enabled
2,887,049 UART: [fht] FMC Alias Private Key: 7
2,994,870 UART: [art] Extend RT PCRs Done
2,995,298 UART: [art] Lock RT PCRs Done
2,996,876 UART: [art] Populate DV Done
3,004,895 UART: [fht] FMC Alias Private Key: 7
3,005,933 UART: [art] Derive CDI
3,006,213 UART: [art] Store in in slot 0x4
3,091,728 UART: [art] Derive Key Pair
3,092,088 UART: [art] Store priv key in slot 0x5
3,105,520 UART: [art] Derive Key Pair - Done
3,120,110 UART: [art] Signing Cert with AUTHO
3,120,590 UART: RITY.KEYID = 7
3,135,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,533 UART: [art] PUB.X = DB3B4665D41A3269DBD10FCF60619E644DDEB410748111E0CE790BDB483A489098898CBB4FD64E01DBC93AC1329EE048
3,143,304 UART: [art] PUB.Y = D47BF4EF6132751B03E1A0077ADC0F2BF2930FF3F09A358B376F3940299134A93E8B2F75DD8CEAB89921685F3AD4A39E
3,150,250 UART: [art] SIG.R = C5583798722A556B17862542A393909325BA4BAC0368A51539FD8C23AF30B27406EB09106FC05800C7352BF544D82137
3,156,975 UART: [art] SIG.S = 68787A275CE4F98E642F3E19B9A14C70EC0E14BEBFA141A7DBA181DB04B5C551FC6A41DDE358FCA91868D0F2E82E7DAB
3,179,882 UART: Caliptra RT
3,180,227 UART: [state] CFI Enabled
3,287,934 UART: [rt] RT listening for mailbox commands...
3,288,597 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,554 UART: [rt]cmd =0x46504c54, len=4
3,319,660 >>> mbox cmd response data (8 bytes)
3,320,023 UART: [rt] FIPS self test
3,320,351 UART: [kat] ++
3,320,503 UART: [kat] sha1
3,324,939 UART: [kat] SHA2-256
3,326,961 UART: [kat] SHA2-384
3,329,616 UART: [kat] SHA2-512-ACC
3,331,543 UART: [kat] ECC-384
3,340,516 UART: Fatal Error: 0x90040005
3,342,055 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,060 >>> mbox cmd response: failed
3,342,060 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
893,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,788 UART: [kat] ++
897,940 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,078 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
1,176,584 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,149 UART: [idev] Erasing UDS.KEYID = 0
1,201,532 UART: [idev] Sha1 KeyId Algorithm
1,210,234 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,056 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,255 UART: [fwproc] Wait for Commands...
1,283,921 UART: [fwproc] Recv command 0x46574c44
1,284,649 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,751 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,856 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,954 ready_for_fw is high
1,060,954 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,507 >>> mbox cmd response: success
2,700,733 UART:
2,700,749 UART: Running Caliptra FMC ...
2,701,157 UART:
2,701,300 UART: [state] CFI Enabled
2,712,131 UART: [fht] FMC Alias Private Key: 7
2,820,016 UART: [art] Extend RT PCRs Done
2,820,444 UART: [art] Lock RT PCRs Done
2,822,082 UART: [art] Populate DV Done
2,830,211 UART: [fht] FMC Alias Private Key: 7
2,831,313 UART: [art] Derive CDI
2,831,593 UART: [art] Store in in slot 0x4
2,917,314 UART: [art] Derive Key Pair
2,917,674 UART: [art] Store priv key in slot 0x5
2,931,086 UART: [art] Derive Key Pair - Done
2,945,748 UART: [art] Signing Cert with AUTHO
2,946,228 UART: RITY.KEYID = 7
2,961,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,553 UART: [art] PUB.X = D35A8695D4B52878C4D65B53AF3D087BA710029DA5FB09D774F58C045D057E49506054C68816A583ED5BD8F66DA6D764
2,969,308 UART: [art] PUB.Y = 8352061C1B69C94EB54559C51C4E61D936A95779E6961EEB4C400FC41799012A09520B28A53995639A41F408E2E11845
2,976,226 UART: [art] SIG.R = 7E00FE6129FB2B56E2A68B0C075AEBD9A9CB92BEC0A9030553384AA7D5CDFFE947F134DF2D22D34DCC29A4FCA2C6E2E5
2,982,988 UART: [art] SIG.S = 8DD9EE66DC5B92EFCDE9799A34A483067A161116DA92FAFB12097A80C94B161D71AC0D68999B4F8F8861EE4C6C885759
3,006,422 UART: Caliptra RT
3,006,767 UART: [state] CFI Enabled
3,114,552 UART: [rt] RT listening for mailbox commands...
3,115,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,038 UART: [rt]cmd =0x46504c54, len=4
3,146,152 >>> mbox cmd response data (8 bytes)
3,146,273 UART: [rt] FIPS self test
3,146,601 UART: [kat] ++
3,146,753 UART: [kat] sha1
3,150,933 UART: [kat] SHA2-256
3,152,955 UART: [kat] SHA2-384
3,155,816 UART: [kat] SHA2-512-ACC
3,157,743 UART: [kat] ECC-384
3,166,774 UART: Fatal Error: 0x90040005
3,168,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,318 >>> mbox cmd response: failed
3,168,318 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,883 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,174,397 ready_for_fw is high
1,174,397 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,140 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,230 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,225 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,267 >>> mbox cmd response: success
2,784,410 UART: [afmc] ++
2,784,578 UART: [afmc] CDI.KEYID = 6
2,784,941 UART: [afmc] SUBJECT.KEYID = 7
2,785,367 UART: [afmc] AUTHORITY.KEYID = 5
2,820,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,282 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,233 UART: [afmc] --
2,864,299 UART: [cold-reset] --
2,865,435 UART: [state] Locking Datavault
2,866,522 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,126 UART: [state] Locking ICCM
2,867,738 UART: [exit] Launching FMC @ 0x40000130
2,873,067 UART:
2,873,083 UART: Running Caliptra FMC ...
2,873,491 UART:
2,873,545 UART: [state] CFI Enabled
2,884,006 UART: [fht] FMC Alias Private Key: 7
2,991,251 UART: [art] Extend RT PCRs Done
2,991,679 UART: [art] Lock RT PCRs Done
2,993,233 UART: [art] Populate DV Done
3,001,334 UART: [fht] FMC Alias Private Key: 7
3,002,456 UART: [art] Derive CDI
3,002,736 UART: [art] Store in in slot 0x4
3,088,225 UART: [art] Derive Key Pair
3,088,585 UART: [art] Store priv key in slot 0x5
3,100,943 UART: [art] Derive Key Pair - Done
3,115,892 UART: [art] Signing Cert with AUTHO
3,116,372 UART: RITY.KEYID = 7
3,131,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,329 UART: [art] PUB.X = 0EA8687B1B821E767673DDE30F66F566F50D8E0177972D50C2932029AB43EE5A0A23FC0163A1D5BD240943D34D903233
3,139,074 UART: [art] PUB.Y = DC669A48D5D5B9FDD77180C66C7CD90A97255CC33FCE8FD5C75EED0F982C95AEED7DF4490CC524C8DC3AE97CFA929A39
3,146,041 UART: [art] SIG.R = 36AE834820C2935DC370C005932E3C087EDC90AB08A6A2EA4318CB61CEC7167C717CD040A74AF8D98EC0B626694ADA00
3,152,788 UART: [art] SIG.S = 7FCC318BA411D83DD5A693EEBF1D89AEEE9B9DC63FDC85F5DD951011DA87D6A412E2F4FC1E5020C2589F168EDDF3D7CB
3,176,865 UART: Caliptra RT
3,177,118 UART: [state] CFI Enabled
3,284,617 UART: [rt] RT listening for mailbox commands...
3,285,280 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,841 UART: [rt]cmd =0x46504c54, len=4
3,315,951 >>> mbox cmd response data (8 bytes)
3,316,166 UART: [rt] FIPS self test
3,316,494 UART: [kat] ++
3,316,646 UART: [kat] sha1
3,320,778 UART: [kat] SHA2-256
3,322,800 UART: [kat] SHA2-384
3,325,657 UART: [kat] SHA2-512-ACC
3,327,584 UART: [kat] ECC-384
3,336,453 UART: Fatal Error: 0x90040005
3,337,992 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,337,997 >>> mbox cmd response: failed
3,337,997 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,563 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,174,325 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,361 UART: [idev] Sha1 KeyId Algorithm
1,208,299 UART: [idev] --
1,209,404 UART: [ldev] ++
1,209,572 UART: [ldev] CDI.KEYID = 6
1,209,936 UART: [ldev] SUBJECT.KEYID = 5
1,210,363 UART: [ldev] AUTHORITY.KEYID = 7
1,210,826 UART: [ldev] FE.KEYID = 1
1,216,188 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,794 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,185 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,277 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,101 >>> mbox cmd response: success
2,695,365 UART:
2,695,381 UART: Running Caliptra FMC ...
2,695,789 UART:
2,695,843 UART: [state] CFI Enabled
2,706,252 UART: [fht] FMC Alias Private Key: 7
2,814,225 UART: [art] Extend RT PCRs Done
2,814,653 UART: [art] Lock RT PCRs Done
2,816,267 UART: [art] Populate DV Done
2,824,590 UART: [fht] FMC Alias Private Key: 7
2,825,590 UART: [art] Derive CDI
2,825,870 UART: [art] Store in in slot 0x4
2,911,617 UART: [art] Derive Key Pair
2,911,977 UART: [art] Store priv key in slot 0x5
2,925,261 UART: [art] Derive Key Pair - Done
2,939,705 UART: [art] Signing Cert with AUTHO
2,940,185 UART: RITY.KEYID = 7
2,955,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,634 UART: [art] PUB.X = 95DFE86FA75878B351A27EAF038D7FEBB20ACC059AAFB0BEF587A54646DC098A2CAF4CED78410164D5B5BF019A6C9286
2,963,406 UART: [art] PUB.Y = 34170DA33B5DF07C9CF091BE587FCDCE402E27580816B9CF98314CE94D24E2640BA52DC7F122AA573E75A49D91F09AE4
2,970,357 UART: [art] SIG.R = B823F427107BABFAFCC64F9BD96342AED90AD7384DEE402D8F006B7264EFD235CD9A3133CA01EEF19F2489DB0198C50D
2,977,111 UART: [art] SIG.S = F967FC9CB99A8E1926FBD02A3340A8EB774C5CFB57C8C6B7B4E1705F1244F6CD377AB640B8D8D8F48C5F27E3F2C728D2
3,001,104 UART: Caliptra RT
3,001,357 UART: [state] CFI Enabled
3,109,283 UART: [rt] RT listening for mailbox commands...
3,109,946 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,995 UART: [rt]cmd =0x46504c54, len=4
3,141,111 >>> mbox cmd response data (8 bytes)
3,141,394 UART: [rt] FIPS self test
3,141,722 UART: [kat] ++
3,141,874 UART: [kat] sha1
3,146,288 UART: [kat] SHA2-256
3,148,310 UART: [kat] SHA2-384
3,151,177 UART: [kat] SHA2-512-ACC
3,153,104 UART: [kat] ECC-384
3,162,081 UART: Fatal Error: 0x90040005
3,163,620 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,625 >>> mbox cmd response: failed
3,163,625 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,738 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,239 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,778 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,175,078 ready_for_fw is high
1,175,078 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,801 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,990 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,052 >>> mbox cmd response: success
2,786,223 UART: [afmc] ++
2,786,391 UART: [afmc] CDI.KEYID = 6
2,786,754 UART: [afmc] SUBJECT.KEYID = 7
2,787,180 UART: [afmc] AUTHORITY.KEYID = 5
2,822,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,490 UART: [afmc] --
2,866,518 UART: [cold-reset] --
2,867,186 UART: [state] Locking Datavault
2,868,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,025 UART: [state] Locking ICCM
2,869,687 UART: [exit] Launching FMC @ 0x40000130
2,875,016 UART:
2,875,032 UART: Running Caliptra FMC ...
2,875,440 UART:
2,875,583 UART: [state] CFI Enabled
2,886,040 UART: [fht] FMC Alias Private Key: 7
2,993,887 UART: [art] Extend RT PCRs Done
2,994,315 UART: [art] Lock RT PCRs Done
2,995,691 UART: [art] Populate DV Done
3,003,934 UART: [fht] FMC Alias Private Key: 7
3,005,104 UART: [art] Derive CDI
3,005,384 UART: [art] Store in in slot 0x4
3,090,905 UART: [art] Derive Key Pair
3,091,265 UART: [art] Store priv key in slot 0x5
3,104,423 UART: [art] Derive Key Pair - Done
3,119,063 UART: [art] Signing Cert with AUTHO
3,119,543 UART: RITY.KEYID = 7
3,134,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,184 UART: [art] PUB.X = 70ABDC886160FFF229CB48A09599BED06D3101816241884AE57A3E69C401E4A336ACE957AC801B2F24A2FAA3C52018BA
3,141,956 UART: [art] PUB.Y = D5AA6D52EAEE519264F5037C12F5452721BCF3D35B979A7D54D40BF8677368E43775FBB9BED3908AAB997E26C87C4CBD
3,148,912 UART: [art] SIG.R = A513C970B277BA824421002E2DCE11F12572E8F8714A91DC8D6C210BEF0F98BF2CE9BF9FBB6DE00DF89E0D3CDD64C861
3,155,666 UART: [art] SIG.S = 3D309637ADF1F13493DF0C23BDF213E8274F0D2E98E11209B15B9B2F728FC607E4D566EAEA185C3D7A4EFDAF47C1E5D0
3,179,729 UART: Caliptra RT
3,180,074 UART: [state] CFI Enabled
3,287,985 UART: [rt] RT listening for mailbox commands...
3,288,648 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,223 UART: [rt]cmd =0x46504c54, len=4
3,319,307 >>> mbox cmd response data (8 bytes)
3,319,662 UART: [rt] FIPS self test
3,319,990 UART: [kat] ++
3,320,142 UART: [kat] sha1
3,324,332 UART: [kat] SHA2-256
3,326,354 UART: [kat] SHA2-384
3,329,139 UART: [kat] SHA2-512-ACC
3,331,066 UART: [kat] ECC-384
3,339,871 UART: Fatal Error: 0x90040005
3,341,410 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,415 >>> mbox cmd response: failed
3,341,415 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,174,428 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,207,990 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,510 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,620 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,157 ready_for_fw is high
1,057,157 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,122 >>> mbox cmd response: success
2,696,116 UART:
2,696,132 UART: Running Caliptra FMC ...
2,696,540 UART:
2,696,683 UART: [state] CFI Enabled
2,707,286 UART: [fht] FMC Alias Private Key: 7
2,815,053 UART: [art] Extend RT PCRs Done
2,815,481 UART: [art] Lock RT PCRs Done
2,816,917 UART: [art] Populate DV Done
2,825,100 UART: [fht] FMC Alias Private Key: 7
2,826,180 UART: [art] Derive CDI
2,826,460 UART: [art] Store in in slot 0x4
2,912,033 UART: [art] Derive Key Pair
2,912,393 UART: [art] Store priv key in slot 0x5
2,925,871 UART: [art] Derive Key Pair - Done
2,940,603 UART: [art] Signing Cert with AUTHO
2,941,083 UART: RITY.KEYID = 7
2,956,879 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,644 UART: [art] PUB.X = F5911DC9595B592BC7D55FA7C908361DB9985E5C9210957C2E9627E542F683DE6F020B69A1779C3A5BCB1056922F6762
2,964,401 UART: [art] PUB.Y = 6AE4F385C40AFC1B6608BB65BD98D25D91D2A4A58C8FC26A6C1D85B9BC0FB4C8B0A85EF65E34C6E56C02DAFA59CA455A
2,971,365 UART: [art] SIG.R = E02C3E0E99AE6B1C63CB2AB70BC623C2428E2EDB1A13D14B4D5BBB2ED8B9D293EC64E3687D7CF43FC5FEF250A8EE5FE1
2,978,159 UART: [art] SIG.S = 8061BF7353D5A42A3EACC434504C8208C49A656D5D234E2FBD94EE10A34CF8090DD93FF4E69034E1889789C6708466D8
3,002,011 UART: Caliptra RT
3,002,356 UART: [state] CFI Enabled
3,110,008 UART: [rt] RT listening for mailbox commands...
3,110,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,518 UART: [rt]cmd =0x46504c54, len=4
3,141,732 >>> mbox cmd response data (8 bytes)
3,141,845 UART: [rt] FIPS self test
3,142,173 UART: [kat] ++
3,142,325 UART: [kat] sha1
3,146,561 UART: [kat] SHA2-256
3,148,583 UART: [kat] SHA2-384
3,151,304 UART: [kat] SHA2-512-ACC
3,153,231 UART: [kat] ECC-384
3,161,988 UART: Fatal Error: 0x90040005
3,163,527 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,532 >>> mbox cmd response: failed
3,163,532 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,461 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,136 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,775 >>> mbox cmd response: failed
816,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,987 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,593 >>> mbox cmd response: failed
816,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,291 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,206 >>> mbox cmd response: failed
817,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,384 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,244 >>> mbox cmd response: failed
817,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,678 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,189 >>> mbox cmd response: failed
817,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,289 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,507 >>> mbox cmd response: failed
816,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,527 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,476 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,484 >>> mbox cmd response: failed
817,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,712 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,720 >>> mbox cmd response: failed
817,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,400 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,097 >>> mbox cmd response: failed
817,097 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,747 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,431 >>> mbox cmd response: failed
817,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,987 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,674 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,316 >>> mbox cmd response: failed
817,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,980 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,552 >>> mbox cmd response: failed
816,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,284 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,544 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,476,111 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,324 UART: [idev] ++
1,479,492 UART: [idev] CDI.KEYID = 6
1,479,852 UART: [idev] SUBJECT.KEYID = 7
1,480,276 UART: [idev] UDS.KEYID = 0
1,480,621 ready_for_fw is high
1,480,621 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,168 UART: [idev] Erasing UDS.KEYID = 0
1,505,316 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,760 UART: [idev] --
1,514,687 UART: [ldev] ++
1,514,855 UART: [ldev] CDI.KEYID = 6
1,515,218 UART: [ldev] SUBJECT.KEYID = 5
1,515,644 UART: [ldev] AUTHORITY.KEYID = 7
1,516,107 UART: [ldev] FE.KEYID = 1
1,521,613 UART: [ldev] Erasing FE.KEYID = 1
1,546,694 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,682 UART: [ldev] --
1,586,045 UART: [fwproc] Waiting for Commands...
1,586,824 UART: [fwproc] Received command 0x46574c44
1,587,615 UART: [fwproc] Received Image of size 115196 bytes
2,896,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,668 >>> mbox cmd response: success
3,090,890 UART: [afmc] ++
3,091,058 UART: [afmc] CDI.KEYID = 6
3,091,420 UART: [afmc] SUBJECT.KEYID = 7
3,091,845 UART: [afmc] AUTHORITY.KEYID = 5
3,126,470 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,742 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,135 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,825 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,726 UART: [afmc] --
3,169,804 UART: [cold-reset] --
3,170,794 UART: [state] Locking Datavault
3,172,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,825 UART: [state] Locking ICCM
3,173,261 UART: [exit] Launching FMC @ 0x40000130
3,178,590 UART:
3,178,606 UART: Running Caliptra FMC ...
3,179,014 UART:
3,179,068 UART: [state] CFI Enabled
3,189,445 UART: [fht] FMC Alias Private Key: 7
3,297,594 UART: [art] Extend RT PCRs Done
3,298,022 UART: [art] Lock RT PCRs Done
3,299,828 UART: [art] Populate DV Done
3,307,937 UART: [fht] FMC Alias Private Key: 7
3,308,997 UART: [art] Derive CDI
3,309,277 UART: [art] Store in in slot 0x4
3,394,502 UART: [art] Derive Key Pair
3,394,862 UART: [art] Store priv key in slot 0x5
3,408,338 UART: [art] Derive Key Pair - Done
3,423,548 UART: [art] Signing Cert with AUTHO
3,424,028 UART: RITY.KEYID = 7
3,439,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,089 UART: [art] PUB.X = 78A5801A6D990AD04710422EB0D813C941F172BFACB953B063B487518C38704B3D8218FFAC3503C566411CACC0B4CE4F
3,446,857 UART: [art] PUB.Y = B5FFA752FFE03F08E018EBC2FD6BBC895232E52AAC64DFF9E6ECD76ED1427B420EB2FE94A8CAB3A6DDC2A1A34F579C67
3,453,833 UART: [art] SIG.R = 79B0BADD5B33D465E8C7FC73F3C69E5E0615026347B22E9BFB09A891CEEDE42B64A729C4309C874861EF83AC6BE47A01
3,460,603 UART: [art] SIG.S = 2F43C1605EB7E9E2E287A546BB5D3567A37982D9F8341E4B9ECD40FC00BA47A633415974AC16EAF593A45205CA2E6BA7
3,484,807 UART: Caliptra RT
3,485,060 UART: [state] CFI Enabled
3,593,232 UART: [rt] RT listening for mailbox commands...
3,593,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,776 UART: [rt]cmd =0x46504c54, len=4
3,624,804 >>> mbox cmd response data (8 bytes)
3,624,989 UART: [rt] FIPS self test
3,625,317 UART: [kat] ++
3,625,469 UART: [kat] sha1
3,629,657 UART: [kat] SHA2-256
3,631,679 UART: [kat] SHA2-384
3,634,742 UART: [kat] SHA2-512-ACC
3,636,669 UART: [kat] ECC-384
3,640,401 UART: Fatal Error: 0x90040004
3,641,940 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,641,945 >>> mbox cmd response: failed
3,641,945 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,641,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,103 UART: [kat] SHA2-256
892,041 UART: [kat] SHA2-384
894,792 UART: [kat] SHA2-512-ACC
896,693 UART: [kat] ECC-384
902,270 UART: [kat] HMAC-384Kdf
906,834 UART: [kat] LMS
1,475,030 UART: [kat] --
1,475,935 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,324 UART: [idev] Erasing UDS.KEYID = 0
1,504,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,433 UART: [ldev] ++
1,514,601 UART: [ldev] CDI.KEYID = 6
1,514,964 UART: [ldev] SUBJECT.KEYID = 5
1,515,390 UART: [ldev] AUTHORITY.KEYID = 7
1,515,853 UART: [ldev] FE.KEYID = 1
1,521,123 UART: [ldev] Erasing FE.KEYID = 1
1,545,938 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,868 UART: [ldev] --
1,585,129 UART: [fwproc] Waiting for Commands...
1,585,988 UART: [fwproc] Received command 0x46574c44
1,586,779 UART: [fwproc] Received Image of size 115196 bytes
2,894,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,086 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,009 ready_for_fw is high
1,363,009 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,980 >>> mbox cmd response: success
3,000,084 UART:
3,000,100 UART: Running Caliptra FMC ...
3,000,508 UART:
3,000,562 UART: [state] CFI Enabled
3,011,199 UART: [fht] FMC Alias Private Key: 7
3,119,040 UART: [art] Extend RT PCRs Done
3,119,468 UART: [art] Lock RT PCRs Done
3,120,928 UART: [art] Populate DV Done
3,128,941 UART: [fht] FMC Alias Private Key: 7
3,129,881 UART: [art] Derive CDI
3,130,161 UART: [art] Store in in slot 0x4
3,215,942 UART: [art] Derive Key Pair
3,216,302 UART: [art] Store priv key in slot 0x5
3,229,364 UART: [art] Derive Key Pair - Done
3,243,890 UART: [art] Signing Cert with AUTHO
3,244,370 UART: RITY.KEYID = 7
3,259,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,069 UART: [art] PUB.X = E1FA49F9363856206F4708542CF999561F6F4AA6BEE905579471DFD6C320BB5A2FBBE34671E8F40EBEB99F070E5940A2
3,266,830 UART: [art] PUB.Y = E5842A5FCCBFFBD704DAA572E7EAA3DECC9B7C2D9C0B4785973CAB937FF97BCD28E89E3FC216A0F2BE0C8D304F6A91BB
3,273,805 UART: [art] SIG.R = E4A038FC248B03EEE895104AEB4882A17CEDA4D63DDC95094CB5A3168F0AA8E1C35B3BBFAC37F0890141E7E0263380F0
3,280,577 UART: [art] SIG.S = 4DAFE2B45FB6519A20D28EF0D6E242FA2079CDF9BA859D4ABC0F5886C493486400E23AFEA69D52312D82D98EDEDD689A
3,304,291 UART: Caliptra RT
3,304,544 UART: [state] CFI Enabled
3,412,769 UART: [rt] RT listening for mailbox commands...
3,413,432 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,105 UART: [rt]cmd =0x46504c54, len=4
3,444,235 >>> mbox cmd response data (8 bytes)
3,444,568 UART: [rt] FIPS self test
3,444,896 UART: [kat] ++
3,445,048 UART: [kat] sha1
3,449,206 UART: [kat] SHA2-256
3,451,228 UART: [kat] SHA2-384
3,454,061 UART: [kat] SHA2-512-ACC
3,455,988 UART: [kat] ECC-384
3,459,994 UART: Fatal Error: 0x90040004
3,461,533 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,538 >>> mbox cmd response: failed
3,461,538 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,354 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
890,992 UART: [kat] SHA2-256
892,930 UART: [kat] SHA2-384
895,707 UART: [kat] SHA2-512-ACC
897,608 UART: [kat] ECC-384
902,999 UART: [kat] HMAC-384Kdf
907,729 UART: [kat] LMS
1,475,925 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,419 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,881 UART: [idev] --
1,516,082 UART: [ldev] ++
1,516,250 UART: [ldev] CDI.KEYID = 6
1,516,613 UART: [ldev] SUBJECT.KEYID = 5
1,517,039 UART: [ldev] AUTHORITY.KEYID = 7
1,517,502 UART: [ldev] FE.KEYID = 1
1,522,796 UART: [ldev] Erasing FE.KEYID = 1
1,548,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,419 UART: [ldev] --
1,587,808 UART: [fwproc] Waiting for Commands...
1,588,437 UART: [fwproc] Received command 0x46574c44
1,589,228 UART: [fwproc] Received Image of size 115196 bytes
2,897,302 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,452 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,901 >>> mbox cmd response: success
3,092,915 UART: [afmc] ++
3,093,083 UART: [afmc] CDI.KEYID = 6
3,093,445 UART: [afmc] SUBJECT.KEYID = 7
3,093,870 UART: [afmc] AUTHORITY.KEYID = 5
3,129,263 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,680 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,370 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,323 UART: [afmc] --
3,172,221 UART: [cold-reset] --
3,173,141 UART: [state] Locking Datavault
3,174,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,818 UART: [state] Locking ICCM
3,175,284 UART: [exit] Launching FMC @ 0x40000130
3,180,613 UART:
3,180,629 UART: Running Caliptra FMC ...
3,181,037 UART:
3,181,180 UART: [state] CFI Enabled
3,191,647 UART: [fht] FMC Alias Private Key: 7
3,299,848 UART: [art] Extend RT PCRs Done
3,300,276 UART: [art] Lock RT PCRs Done
3,301,598 UART: [art] Populate DV Done
3,309,763 UART: [fht] FMC Alias Private Key: 7
3,310,865 UART: [art] Derive CDI
3,311,145 UART: [art] Store in in slot 0x4
3,397,104 UART: [art] Derive Key Pair
3,397,464 UART: [art] Store priv key in slot 0x5
3,411,108 UART: [art] Derive Key Pair - Done
3,426,135 UART: [art] Signing Cert with AUTHO
3,426,615 UART: RITY.KEYID = 7
3,441,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,308 UART: [art] PUB.X = 72463289F048817918A67DBEBA94A12144AABCFD7F0B5859F439430A10B4D6C775D42FBC77174A585DCEC3070ABD7781
3,449,070 UART: [art] PUB.Y = 20DDD0AF186CC496911511A02B87B95D252E3DE0D9AE7DFD5246708F9BBFBDC692A3F96CB06D983572DF2F7A34086E25
3,456,029 UART: [art] SIG.R = 3029C39C3A0DE5C4D612A25BDAA03DAE37E512EB20735461F373FC835A38023892070115E9AF23DC058EDCC4790F1AAA
3,462,789 UART: [art] SIG.S = B06FA8ED21E440488D35489043E9579D91AFE8F6EE32AE7A080A7AB6B44BA959835D9BFA8595B23D9AE5D8DCCEEDFF40
3,486,766 UART: Caliptra RT
3,487,111 UART: [state] CFI Enabled
3,595,982 UART: [rt] RT listening for mailbox commands...
3,596,645 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,344 UART: [rt]cmd =0x46504c54, len=4
3,627,602 >>> mbox cmd response data (8 bytes)
3,627,839 UART: [rt] FIPS self test
3,628,167 UART: [kat] ++
3,628,319 UART: [kat] sha1
3,632,755 UART: [kat] SHA2-256
3,634,777 UART: [kat] SHA2-384
3,637,488 UART: [kat] SHA2-512-ACC
3,639,415 UART: [kat] ECC-384
3,643,159 UART: Fatal Error: 0x90040004
3,644,698 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,703 >>> mbox cmd response: failed
3,644,703 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,781 UART: [kat] LMS
1,475,977 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,965 UART: [idev] ++
1,480,133 UART: [idev] CDI.KEYID = 6
1,480,493 UART: [idev] SUBJECT.KEYID = 7
1,480,917 UART: [idev] UDS.KEYID = 0
1,481,262 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,505,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,506 UART: [ldev] ++
1,515,674 UART: [ldev] CDI.KEYID = 6
1,516,037 UART: [ldev] SUBJECT.KEYID = 5
1,516,463 UART: [ldev] AUTHORITY.KEYID = 7
1,516,926 UART: [ldev] FE.KEYID = 1
1,522,174 UART: [ldev] Erasing FE.KEYID = 1
1,547,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,529 UART: [ldev] --
1,586,964 UART: [fwproc] Waiting for Commands...
1,587,669 UART: [fwproc] Received command 0x46574c44
1,588,460 UART: [fwproc] Received Image of size 115196 bytes
2,895,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,699 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,766 ready_for_fw is high
1,362,766 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,942,491 >>> mbox cmd response: success
3,004,181 UART:
3,004,197 UART: Running Caliptra FMC ...
3,004,605 UART:
3,004,748 UART: [state] CFI Enabled
3,015,173 UART: [fht] FMC Alias Private Key: 7
3,122,752 UART: [art] Extend RT PCRs Done
3,123,180 UART: [art] Lock RT PCRs Done
3,124,556 UART: [art] Populate DV Done
3,132,583 UART: [fht] FMC Alias Private Key: 7
3,133,653 UART: [art] Derive CDI
3,133,933 UART: [art] Store in in slot 0x4
3,219,782 UART: [art] Derive Key Pair
3,220,142 UART: [art] Store priv key in slot 0x5
3,233,508 UART: [art] Derive Key Pair - Done
3,248,477 UART: [art] Signing Cert with AUTHO
3,248,957 UART: RITY.KEYID = 7
3,264,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,040 UART: [art] PUB.X = 4EA2A555B69AD246A0530AF95FBFD2BD22F73F737214E6C7947FF998B2E132F78025CE3146BCBF4E65DE1F6D76118754
3,271,815 UART: [art] PUB.Y = 2E3B44C6E6AF76E5F03693EE7C8944FB104DA9E0071BD046CA80D17ACB98DB9A404AB97F08C31A2B0E89081C285105CD
3,278,762 UART: [art] SIG.R = 9D4D16964E7B5C46470D656DEB6D020F4CD60AC3615A965C211ABD7F7A901DA1BB0DADFF9EA3AE846497A2EED1259236
3,285,533 UART: [art] SIG.S = F2ED4BAC91508B13BACE1E8A8604164464FC7543F47F32DCBE171C5D271DB6BC11109DF82A354674A8EABAC57E99496D
3,309,337 UART: Caliptra RT
3,309,682 UART: [state] CFI Enabled
3,417,198 UART: [rt] RT listening for mailbox commands...
3,417,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,598 UART: [rt]cmd =0x46504c54, len=4
3,448,682 >>> mbox cmd response data (8 bytes)
3,448,845 UART: [rt] FIPS self test
3,449,173 UART: [kat] ++
3,449,325 UART: [kat] sha1
3,453,663 UART: [kat] SHA2-256
3,455,685 UART: [kat] SHA2-384
3,458,642 UART: [kat] SHA2-512-ACC
3,460,569 UART: [kat] ECC-384
3,464,415 UART: Fatal Error: 0x90040004
3,465,954 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,465,959 >>> mbox cmd response: failed
3,465,959 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,465,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,862 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,843 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,023 UART: [kat] SHA2-256
903,963 UART: [kat] SHA2-384
906,730 UART: [kat] SHA2-512-ACC
908,631 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,171,635 UART: [cold-reset] ++
1,172,063 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 ready_for_fw is high
1,176,179 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,201,089 UART: [idev] Sha1 KeyId Algorithm
1,209,337 UART: [idev] --
1,210,563 UART: [ldev] ++
1,210,731 UART: [ldev] CDI.KEYID = 6
1,211,094 UART: [ldev] SUBJECT.KEYID = 5
1,211,520 UART: [ldev] AUTHORITY.KEYID = 7
1,211,983 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,243,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,914 UART: [fwproc] Wait for Commands...
1,283,600 UART: [fwproc] Recv command 0x46574c44
1,284,328 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,388 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,387 >>> mbox cmd response: success
2,786,417 UART: [afmc] ++
2,786,585 UART: [afmc] CDI.KEYID = 6
2,786,947 UART: [afmc] SUBJECT.KEYID = 7
2,787,372 UART: [afmc] AUTHORITY.KEYID = 5
2,822,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,462 UART: [afmc] --
2,865,540 UART: [cold-reset] --
2,866,218 UART: [state] Locking Datavault
2,867,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,989 UART: [state] Locking ICCM
2,868,479 UART: [exit] Launching FMC @ 0x40000130
2,873,808 UART:
2,873,824 UART: Running Caliptra FMC ...
2,874,232 UART:
2,874,286 UART: [state] CFI Enabled
2,884,773 UART: [fht] FMC Alias Private Key: 7
2,993,584 UART: [art] Extend RT PCRs Done
2,994,012 UART: [art] Lock RT PCRs Done
2,995,814 UART: [art] Populate DV Done
3,004,283 UART: [fht] FMC Alias Private Key: 7
3,005,227 UART: [art] Derive CDI
3,005,507 UART: [art] Store in in slot 0x4
3,090,702 UART: [art] Derive Key Pair
3,091,062 UART: [art] Store priv key in slot 0x5
3,104,366 UART: [art] Derive Key Pair - Done
3,119,493 UART: [art] Signing Cert with AUTHO
3,119,973 UART: RITY.KEYID = 7
3,134,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,666 UART: [art] PUB.X = 250E5B55526BD9E777E379F5C00FDB478776668CA5E7B877CFBF3E1317AF0E68CDDDB0939B4A7AD2A4BE384C034BC946
3,142,438 UART: [art] PUB.Y = B72C01ABB87A54A689BEEAB55E082CFCBCEBB714A4F5D7D631865C7C98A897DC00A6D36F9AD19E435444EEBD4E337F1F
3,149,384 UART: [art] SIG.R = EDFDFD6341D10820FA5D6092EFFD0FDE03824D7A4A8878FD35EA4A72A75095AAD84CDBEAA55DB4949DB56690F5182CFC
3,156,169 UART: [art] SIG.S = 6674A188CCA37B3542A28F970C055A6EE2E901D2A2603896B1047A343BDED31B9601C3ADB13FA5A2A3EAA365E94A2737
3,179,907 UART: Caliptra RT
3,180,160 UART: [state] CFI Enabled
3,287,579 UART: [rt] RT listening for mailbox commands...
3,288,242 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,057 UART: [rt]cmd =0x46504c54, len=4
3,319,053 >>> mbox cmd response data (8 bytes)
3,319,174 UART: [rt] FIPS self test
3,319,502 UART: [kat] ++
3,319,654 UART: [kat] sha1
3,323,858 UART: [kat] SHA2-256
3,325,880 UART: [kat] SHA2-384
3,328,701 UART: [kat] SHA2-512-ACC
3,330,628 UART: [kat] ECC-384
3,334,052 UART: Fatal Error: 0x90040004
3,335,591 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,596 >>> mbox cmd response: failed
3,335,596 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,150 UART: [kat] SHA2-512-ACC
908,051 UART: [kat] ECC-384
918,264 UART: [kat] HMAC-384Kdf
922,642 UART: [kat] LMS
1,170,970 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,977 UART: [idev] Sha1 KeyId Algorithm
1,208,579 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,174 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,559 UART: [ldev] --
1,281,030 UART: [fwproc] Wait for Commands...
1,281,716 UART: [fwproc] Recv command 0x46574c44
1,282,444 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,646 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,837 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,652 >>> mbox cmd response: success
2,698,678 UART:
2,698,694 UART: Running Caliptra FMC ...
2,699,102 UART:
2,699,156 UART: [state] CFI Enabled
2,709,463 UART: [fht] FMC Alias Private Key: 7
2,817,364 UART: [art] Extend RT PCRs Done
2,817,792 UART: [art] Lock RT PCRs Done
2,819,428 UART: [art] Populate DV Done
2,827,831 UART: [fht] FMC Alias Private Key: 7
2,828,961 UART: [art] Derive CDI
2,829,241 UART: [art] Store in in slot 0x4
2,915,110 UART: [art] Derive Key Pair
2,915,470 UART: [art] Store priv key in slot 0x5
2,928,346 UART: [art] Derive Key Pair - Done
2,942,829 UART: [art] Signing Cert with AUTHO
2,943,309 UART: RITY.KEYID = 7
2,958,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,360 UART: [art] PUB.X = 86666DAC78CFAFA795C78C1A1B4FB0A9B67AB127670FD6B6AD3923B6D723B5B723E6136D4C2B6733672163FFD628C2C6
2,966,137 UART: [art] PUB.Y = 25D22B91765AB0B0E4F7F9C45CB18B264EB8D7FF888E94F2517DF2AD59CA60F27666B6AED5DB7D4BA1E7AEDEDDDF9892
2,973,113 UART: [art] SIG.R = 6E7AD948F543E8B032431E5548E62E77270E0596657E816E2D6F644C7BA2613365D0AF349991949DDA8E71643167918E
2,979,865 UART: [art] SIG.S = FD7E9C4A00531767B21A9FEC3356FB24D77EE3CA3D537D0C0490DBD432C36F791F730C1720C346D3501020575C707EEF
3,003,411 UART: Caliptra RT
3,003,664 UART: [state] CFI Enabled
3,110,987 UART: [rt] RT listening for mailbox commands...
3,111,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,393 UART: [rt]cmd =0x46504c54, len=4
3,142,363 >>> mbox cmd response data (8 bytes)
3,142,708 UART: [rt] FIPS self test
3,143,036 UART: [kat] ++
3,143,188 UART: [kat] sha1
3,147,362 UART: [kat] SHA2-256
3,149,384 UART: [kat] SHA2-384
3,152,249 UART: [kat] SHA2-512-ACC
3,154,176 UART: [kat] ECC-384
3,157,922 UART: Fatal Error: 0x90040004
3,159,461 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,466 >>> mbox cmd response: failed
3,159,466 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,737 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,324 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
893,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,388 UART: [kat] ++
897,540 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,776 UART: [fht] FHT @ 0x50003400
1,175,469 UART: [idev] ++
1,175,637 UART: [idev] CDI.KEYID = 6
1,175,997 UART: [idev] SUBJECT.KEYID = 7
1,176,421 UART: [idev] UDS.KEYID = 0
1,176,766 ready_for_fw is high
1,176,766 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,397 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,422 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,164 UART: [ldev] --
1,283,527 UART: [fwproc] Wait for Commands...
1,284,303 UART: [fwproc] Recv command 0x46574c44
1,285,031 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,825 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,948 >>> mbox cmd response: success
2,788,090 UART: [afmc] ++
2,788,258 UART: [afmc] CDI.KEYID = 6
2,788,620 UART: [afmc] SUBJECT.KEYID = 7
2,789,045 UART: [afmc] AUTHORITY.KEYID = 5
2,824,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,679 UART: [afmc] --
2,867,793 UART: [cold-reset] --
2,868,625 UART: [state] Locking Datavault
2,869,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,260 UART: [state] Locking ICCM
2,870,684 UART: [exit] Launching FMC @ 0x40000130
2,876,013 UART:
2,876,029 UART: Running Caliptra FMC ...
2,876,437 UART:
2,876,580 UART: [state] CFI Enabled
2,887,289 UART: [fht] FMC Alias Private Key: 7
2,995,072 UART: [art] Extend RT PCRs Done
2,995,500 UART: [art] Lock RT PCRs Done
2,996,866 UART: [art] Populate DV Done
3,005,205 UART: [fht] FMC Alias Private Key: 7
3,006,283 UART: [art] Derive CDI
3,006,563 UART: [art] Store in in slot 0x4
3,092,130 UART: [art] Derive Key Pair
3,092,490 UART: [art] Store priv key in slot 0x5
3,105,930 UART: [art] Derive Key Pair - Done
3,120,804 UART: [art] Signing Cert with AUTHO
3,121,284 UART: RITY.KEYID = 7
3,136,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,465 UART: [art] PUB.X = 64BA9537F5978AA3089545807544F5D11423F2DE1F6F390252129845E8D9FB9FEB3E4784A2647C67CC7B8882645CAB47
3,144,223 UART: [art] PUB.Y = 7A0354D5DFCC04E23A1488C2DEF4844EF7E070888862A11526853DCFB02E675BA700661EAF28B6DD97F825D84484E478
3,151,147 UART: [art] SIG.R = 1030C3ECC236F2B8129B8C6D056F1E250AC8D00BC5E1AFE0E6647FE583C76DD873FFF7CB09FD4D5BFA75FDDE18C83B01
3,157,926 UART: [art] SIG.S = 8FF8875660442D351B4C1C07A33D349DB4FEF382A19AD315C071D5E9AF11B7B32988CE1D8CE7C63E112639172FE42FBA
3,181,748 UART: Caliptra RT
3,182,093 UART: [state] CFI Enabled
3,289,428 UART: [rt] RT listening for mailbox commands...
3,290,091 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,016 UART: [rt]cmd =0x46504c54, len=4
3,321,076 >>> mbox cmd response data (8 bytes)
3,321,439 UART: [rt] FIPS self test
3,321,767 UART: [kat] ++
3,321,919 UART: [kat] sha1
3,326,231 UART: [kat] SHA2-256
3,328,253 UART: [kat] SHA2-384
3,331,234 UART: [kat] SHA2-512-ACC
3,333,161 UART: [kat] ECC-384
3,336,779 UART: Fatal Error: 0x90040004
3,338,318 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,323 >>> mbox cmd response: failed
3,338,323 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
893,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,960 UART: [kat] ++
898,112 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,945 UART: [kat] SHA2-512-ACC
908,846 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,870 UART: [fht] FHT @ 0x50003400
1,175,541 UART: [idev] ++
1,175,709 UART: [idev] CDI.KEYID = 6
1,176,069 UART: [idev] SUBJECT.KEYID = 7
1,176,493 UART: [idev] UDS.KEYID = 0
1,176,838 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,200 UART: [idev] --
1,211,196 UART: [ldev] ++
1,211,364 UART: [ldev] CDI.KEYID = 6
1,211,727 UART: [ldev] SUBJECT.KEYID = 5
1,212,153 UART: [ldev] AUTHORITY.KEYID = 7
1,212,616 UART: [ldev] FE.KEYID = 1
1,218,084 UART: [ldev] Erasing FE.KEYID = 1
1,245,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,044 UART: [ldev] --
1,284,383 UART: [fwproc] Wait for Commands...
1,285,041 UART: [fwproc] Recv command 0x46574c44
1,285,769 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,993 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,106 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,362 ready_for_fw is high
1,060,362 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,101 >>> mbox cmd response: success
2,701,121 UART:
2,701,137 UART: Running Caliptra FMC ...
2,701,545 UART:
2,701,688 UART: [state] CFI Enabled
2,712,315 UART: [fht] FMC Alias Private Key: 7
2,820,210 UART: [art] Extend RT PCRs Done
2,820,638 UART: [art] Lock RT PCRs Done
2,822,080 UART: [art] Populate DV Done
2,830,459 UART: [fht] FMC Alias Private Key: 7
2,831,391 UART: [art] Derive CDI
2,831,671 UART: [art] Store in in slot 0x4
2,917,062 UART: [art] Derive Key Pair
2,917,422 UART: [art] Store priv key in slot 0x5
2,931,000 UART: [art] Derive Key Pair - Done
2,945,741 UART: [art] Signing Cert with AUTHO
2,946,221 UART: RITY.KEYID = 7
2,961,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,634 UART: [art] PUB.X = 8AE84BABB9AA81A84BA33553D91C550CE62CA9408BABDF0408FD96528CD86694BCA73E6BA3A9677697F6AFECDBEAF292
2,969,419 UART: [art] PUB.Y = 92B57425725E169FF6092B8A96D8EB5ADB35F79A30D493DEFDECCB141B4BC12FD9DBF2EDCBC7A38C22D0C43CF5DE17D1
2,976,394 UART: [art] SIG.R = 518D1A8EA43FCD31F90F21B144B17C542F38E0060CC886132949678684C16523F3F3B52C113A57A2E775D2DFF7C67F48
2,983,153 UART: [art] SIG.S = 651F5E35B7453A86E39392EB02DAE90DEB2C29B28A372EFC0AEFB5933C404BA39BC72F1EAE2ED69BF6D2869DE5857F79
3,006,921 UART: Caliptra RT
3,007,266 UART: [state] CFI Enabled
3,115,603 UART: [rt] RT listening for mailbox commands...
3,116,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,151 UART: [rt]cmd =0x46504c54, len=4
3,147,349 >>> mbox cmd response data (8 bytes)
3,147,568 UART: [rt] FIPS self test
3,147,896 UART: [kat] ++
3,148,048 UART: [kat] sha1
3,152,414 UART: [kat] SHA2-256
3,154,436 UART: [kat] SHA2-384
3,157,451 UART: [kat] SHA2-512-ACC
3,159,378 UART: [kat] ECC-384
3,162,922 UART: Fatal Error: 0x90040004
3,164,461 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,466 >>> mbox cmd response: failed
3,164,466 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,106 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,343 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 ready_for_fw is high
1,174,069 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,867 UART: [idev] --
1,208,868 UART: [ldev] ++
1,209,036 UART: [ldev] CDI.KEYID = 6
1,209,400 UART: [ldev] SUBJECT.KEYID = 5
1,209,827 UART: [ldev] AUTHORITY.KEYID = 7
1,210,290 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,529 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,719 >>> mbox cmd response: success
2,784,966 UART: [afmc] ++
2,785,134 UART: [afmc] CDI.KEYID = 6
2,785,497 UART: [afmc] SUBJECT.KEYID = 7
2,785,923 UART: [afmc] AUTHORITY.KEYID = 5
2,821,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,107 UART: [afmc] --
2,865,203 UART: [cold-reset] --
2,866,063 UART: [state] Locking Datavault
2,867,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,896 UART: [state] Locking ICCM
2,868,448 UART: [exit] Launching FMC @ 0x40000130
2,873,777 UART:
2,873,793 UART: Running Caliptra FMC ...
2,874,201 UART:
2,874,255 UART: [state] CFI Enabled
2,884,842 UART: [fht] FMC Alias Private Key: 7
2,992,233 UART: [art] Extend RT PCRs Done
2,992,661 UART: [art] Lock RT PCRs Done
2,994,499 UART: [art] Populate DV Done
3,002,664 UART: [fht] FMC Alias Private Key: 7
3,003,800 UART: [art] Derive CDI
3,004,080 UART: [art] Store in in slot 0x4
3,089,613 UART: [art] Derive Key Pair
3,089,973 UART: [art] Store priv key in slot 0x5
3,103,283 UART: [art] Derive Key Pair - Done
3,118,364 UART: [art] Signing Cert with AUTHO
3,118,844 UART: RITY.KEYID = 7
3,133,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,725 UART: [art] PUB.X = 5FBF1FABAE5937B08B9A8733420C569FD4F63925871B9AEB072BE0443B48716A086CD3FC5501BBF1A8BE63412E4E9710
3,141,491 UART: [art] PUB.Y = 951D5A50BB168F77319FF85F5454726F4DBA452FF1AEE9FE1162ADF27AAFA659CD6E9F67689833C6899C798AAF57794F
3,148,451 UART: [art] SIG.R = 69D7ABABA988BD99B98F76C15838F6A85D2D5243FEE0B7378D1AFB686CB87A59571CC6098F5DA527CC396771567B2EB1
3,155,228 UART: [art] SIG.S = 25638609AF93A59005A5F7DEE9627AF7D6DC01D39C1F6B0A2571399F54800CE692662A7DB656CD92B1B2640D5D2B52A2
3,179,141 UART: Caliptra RT
3,179,394 UART: [state] CFI Enabled
3,287,195 UART: [rt] RT listening for mailbox commands...
3,287,858 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,407 UART: [rt]cmd =0x46504c54, len=4
3,318,531 >>> mbox cmd response data (8 bytes)
3,318,694 UART: [rt] FIPS self test
3,319,022 UART: [kat] ++
3,319,174 UART: [kat] sha1
3,323,340 UART: [kat] SHA2-256
3,325,362 UART: [kat] SHA2-384
3,328,283 UART: [kat] SHA2-512-ACC
3,330,210 UART: [kat] ECC-384
3,333,762 UART: Fatal Error: 0x90040004
3,335,301 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,306 >>> mbox cmd response: failed
3,335,306 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,169,845 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,173,823 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,138 UART: [ldev] ++
1,208,306 UART: [ldev] CDI.KEYID = 6
1,208,670 UART: [ldev] SUBJECT.KEYID = 5
1,209,097 UART: [ldev] AUTHORITY.KEYID = 7
1,209,560 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,718 UART: [ldev] --
1,280,180 UART: [fwproc] Wait for Commands...
1,280,765 UART: [fwproc] Recv command 0x46574c44
1,281,498 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,805 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,849 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,366 ready_for_fw is high
1,056,366 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,607 >>> mbox cmd response: success
2,696,157 UART:
2,696,173 UART: Running Caliptra FMC ...
2,696,581 UART:
2,696,635 UART: [state] CFI Enabled
2,707,206 UART: [fht] FMC Alias Private Key: 7
2,815,393 UART: [art] Extend RT PCRs Done
2,815,821 UART: [art] Lock RT PCRs Done
2,817,415 UART: [art] Populate DV Done
2,825,812 UART: [fht] FMC Alias Private Key: 7
2,826,784 UART: [art] Derive CDI
2,827,064 UART: [art] Store in in slot 0x4
2,912,813 UART: [art] Derive Key Pair
2,913,173 UART: [art] Store priv key in slot 0x5
2,926,369 UART: [art] Derive Key Pair - Done
2,941,035 UART: [art] Signing Cert with AUTHO
2,941,515 UART: RITY.KEYID = 7
2,957,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,874 UART: [art] PUB.X = 096EF01072F628BB45415B0A1FCE5934AB9296D669E0EBDD65F3B63802C5FB2240E571225205BE1F6A328B9AAFC6481A
2,964,638 UART: [art] PUB.Y = 8B92FE74DDA39645295974B0E3C9D144DFF8B1ED413234AFB823793F2270F530B91000D3214940A239499C5765E6590C
2,971,555 UART: [art] SIG.R = BC655B66AA0FB1F3E32DF238AC1CDFB61A7FF91AB6E95DCBE98F06CC1692FBBC484B253DA6A9EE9BF83836BA5F6A3442
2,978,349 UART: [art] SIG.S = A346C0BB3A8A2A935A6FBAC627853E58FB832643588EBBD8496355689E8A36C64648BA94728DFC91DC2207F6311D81AC
3,002,105 UART: Caliptra RT
3,002,358 UART: [state] CFI Enabled
3,109,514 UART: [rt] RT listening for mailbox commands...
3,110,177 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,808 UART: [rt]cmd =0x46504c54, len=4
3,140,906 >>> mbox cmd response data (8 bytes)
3,141,245 UART: [rt] FIPS self test
3,141,573 UART: [kat] ++
3,141,725 UART: [kat] sha1
3,145,825 UART: [kat] SHA2-256
3,147,847 UART: [kat] SHA2-384
3,150,628 UART: [kat] SHA2-512-ACC
3,152,555 UART: [kat] ECC-384
3,156,427 UART: Fatal Error: 0x90040004
3,157,966 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,971 >>> mbox cmd response: failed
3,157,971 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,424 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,857 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 ready_for_fw is high
1,174,680 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,241 UART: [ldev] ++
1,209,409 UART: [ldev] CDI.KEYID = 6
1,209,773 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,631 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,240 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,334 >>> mbox cmd response: success
2,785,601 UART: [afmc] ++
2,785,769 UART: [afmc] CDI.KEYID = 6
2,786,132 UART: [afmc] SUBJECT.KEYID = 7
2,786,558 UART: [afmc] AUTHORITY.KEYID = 5
2,822,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,804 UART: [afmc] --
2,865,774 UART: [cold-reset] --
2,866,562 UART: [state] Locking Datavault
2,867,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,115 UART: [state] Locking ICCM
2,868,709 UART: [exit] Launching FMC @ 0x40000130
2,874,038 UART:
2,874,054 UART: Running Caliptra FMC ...
2,874,462 UART:
2,874,605 UART: [state] CFI Enabled
2,885,198 UART: [fht] FMC Alias Private Key: 7
2,993,505 UART: [art] Extend RT PCRs Done
2,993,933 UART: [art] Lock RT PCRs Done
2,995,561 UART: [art] Populate DV Done
3,003,870 UART: [fht] FMC Alias Private Key: 7
3,004,908 UART: [art] Derive CDI
3,005,188 UART: [art] Store in in slot 0x4
3,090,903 UART: [art] Derive Key Pair
3,091,263 UART: [art] Store priv key in slot 0x5
3,104,783 UART: [art] Derive Key Pair - Done
3,119,512 UART: [art] Signing Cert with AUTHO
3,119,992 UART: RITY.KEYID = 7
3,135,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,049 UART: [art] PUB.X = 1F1B8AAAE4FC664EE838D65BF481646EB6CA991CC279BAC41B752F74716DAD40EE8DAF0B8FC34228B268883481F34155
3,142,828 UART: [art] PUB.Y = E75D157EEC32716952991C11B1AAA48C4B18125FB6CCB3C15D1720CDA85356127F83DB38928E226D014979E58D0EEE1F
3,149,776 UART: [art] SIG.R = 92F6F73B64BD4E4EF427BAA30C8E7526B12C8ED4AB3C8BD0D04447DECA59FE4D6585B7547EADF1B5D192F7C38A5D08AE
3,156,564 UART: [art] SIG.S = 8996BC0B11727F7F1C0631F195F5EB52E46EE34D7A25D5A58EF33FB3D8A82879AB7C70F3DC2BB18D750233C830603C6C
3,180,092 UART: Caliptra RT
3,180,437 UART: [state] CFI Enabled
3,288,015 UART: [rt] RT listening for mailbox commands...
3,288,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,541 UART: [rt]cmd =0x46504c54, len=4
3,319,695 >>> mbox cmd response data (8 bytes)
3,319,856 UART: [rt] FIPS self test
3,320,184 UART: [kat] ++
3,320,336 UART: [kat] sha1
3,324,616 UART: [kat] SHA2-256
3,326,638 UART: [kat] SHA2-384
3,329,363 UART: [kat] SHA2-512-ACC
3,331,290 UART: [kat] ECC-384
3,335,158 UART: Fatal Error: 0x90040004
3,336,697 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,336,702 >>> mbox cmd response: failed
3,336,702 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,336,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,679 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,282,056 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,596 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,748 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,021 ready_for_fw is high
1,056,021 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,090 >>> mbox cmd response: success
2,696,802 UART:
2,696,818 UART: Running Caliptra FMC ...
2,697,226 UART:
2,697,369 UART: [state] CFI Enabled
2,707,910 UART: [fht] FMC Alias Private Key: 7
2,816,119 UART: [art] Extend RT PCRs Done
2,816,547 UART: [art] Lock RT PCRs Done
2,817,857 UART: [art] Populate DV Done
2,826,028 UART: [fht] FMC Alias Private Key: 7
2,827,028 UART: [art] Derive CDI
2,827,308 UART: [art] Store in in slot 0x4
2,913,097 UART: [art] Derive Key Pair
2,913,457 UART: [art] Store priv key in slot 0x5
2,926,703 UART: [art] Derive Key Pair - Done
2,941,533 UART: [art] Signing Cert with AUTHO
2,942,013 UART: RITY.KEYID = 7
2,957,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,104 UART: [art] PUB.X = A4AEBA9942D9D2D0550044FED1108083E2E135B6A312D44531ADE5B8DC9B39DF5D10A4F03B8DA4BA4BAACBD4F3C7BC6E
2,964,878 UART: [art] PUB.Y = 9316301C00B9BAD876E2C9E379DCA25D12CB1DC522AD5D6234CB0CAE6C6321D00EDA6F656CB7AC70BE743B795DBBAE4A
2,971,824 UART: [art] SIG.R = 5CB2A085C13E5C647C4CD7A3F647A9A435347DB3B830893E8BD9CC946DC48A39BEA209ADFAA5343522F2232CC545FC24
2,978,603 UART: [art] SIG.S = 30F9B55E423B855715A8630734CE3BD466A71E76EA3DB1866D1697277650B47610921387FAA03332290BFD5742BDB832
3,002,066 UART: Caliptra RT
3,002,411 UART: [state] CFI Enabled
3,110,112 UART: [rt] RT listening for mailbox commands...
3,110,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,878 UART: [rt]cmd =0x46504c54, len=4
3,142,010 >>> mbox cmd response data (8 bytes)
3,142,287 UART: [rt] FIPS self test
3,142,615 UART: [kat] ++
3,142,767 UART: [kat] sha1
3,146,887 UART: [kat] SHA2-256
3,148,909 UART: [kat] SHA2-384
3,151,852 UART: [kat] SHA2-512-ACC
3,153,779 UART: [kat] ECC-384
3,157,753 UART: Fatal Error: 0x90040004
3,159,292 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,297 >>> mbox cmd response: failed
3,159,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,119 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,658 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,651 >>> mbox cmd response: failed
822,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,803 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,999 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,007 >>> mbox cmd response: failed
822,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,667 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,498 >>> mbox cmd response: failed
822,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,818 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,576 >>> mbox cmd response: failed
823,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,696 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,433 >>> mbox cmd response: failed
822,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,383 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,807 >>> mbox cmd response: failed
822,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,211 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,752 >>> mbox cmd response: failed
823,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,930 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,538 >>> mbox cmd response: failed
823,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,450 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,147 >>> mbox cmd response: failed
822,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,669 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,949 >>> mbox cmd response: failed
822,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,550 >>> mbox cmd response: failed
822,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,508 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,978 >>> mbox cmd response: failed
822,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,726 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,953 UART: [kat] SHA2-256
892,891 UART: [kat] SHA2-384
895,600 UART: [kat] SHA2-512-ACC
897,501 UART: [kat] ECC-384
903,170 UART: [kat] HMAC-384Kdf
907,614 UART: [kat] LMS
1,475,810 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,481,123 ready_for_fw is high
1,481,123 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,580 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,210 UART: [idev] --
1,514,207 UART: [ldev] ++
1,514,375 UART: [ldev] CDI.KEYID = 6
1,514,738 UART: [ldev] SUBJECT.KEYID = 5
1,515,164 UART: [ldev] AUTHORITY.KEYID = 7
1,515,627 UART: [ldev] FE.KEYID = 1
1,520,973 UART: [ldev] Erasing FE.KEYID = 1
1,546,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,944 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,154 UART: [fwproc] Received command 0x46574c44
1,586,945 UART: [fwproc] Received Image of size 115196 bytes
2,894,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,981 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,370 >>> mbox cmd response: success
3,089,460 UART: [afmc] ++
3,089,628 UART: [afmc] CDI.KEYID = 6
3,089,990 UART: [afmc] SUBJECT.KEYID = 7
3,090,415 UART: [afmc] AUTHORITY.KEYID = 5
3,124,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,679 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,369 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,352 UART: [afmc] --
3,168,238 UART: [cold-reset] --
3,168,872 UART: [state] Locking Datavault
3,169,967 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,571 UART: [state] Locking ICCM
3,171,241 UART: [exit] Launching FMC @ 0x40000130
3,176,570 UART:
3,176,586 UART: Running Caliptra FMC ...
3,176,994 UART:
3,177,048 UART: [state] CFI Enabled
3,187,409 UART: [fht] FMC Alias Private Key: 7
3,295,202 UART: [art] Extend RT PCRs Done
3,295,630 UART: [art] Lock RT PCRs Done
3,296,830 UART: [art] Populate DV Done
3,304,877 UART: [fht] FMC Alias Private Key: 7
3,306,029 UART: [art] Derive CDI
3,306,309 UART: [art] Store in in slot 0x4
3,391,684 UART: [art] Derive Key Pair
3,392,044 UART: [art] Store priv key in slot 0x5
3,405,572 UART: [art] Derive Key Pair - Done
3,420,367 UART: [art] Signing Cert with AUTHO
3,420,847 UART: RITY.KEYID = 7
3,435,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,340 UART: [art] PUB.X = F603C1F11A744FCF5F6C277BF184F75910D70EF962B6E1CD28F4AE0A14121072FBF90CBE6A8B7773D7C28BD87CD6D166
3,443,112 UART: [art] PUB.Y = E6C7356E1FC322286E09ECA16F305719DEE8E0CA559E8A552B9C6D4DC425149F6D496DEE323723A7BF514B8CAC72BD44
3,450,071 UART: [art] SIG.R = D0982F905861BFB1A184659DC451137494390DEEF1673A6DCCEA799C2ABCE455B94F46B7F27C8BFE3AD6745E283593CF
3,456,848 UART: [art] SIG.S = 13EA2747C641643A74057E35928734ACFB5BEBAC6005C01D21AA8444468C274AFDCE54B9CCCC0ACF9978D45D21BC514D
3,480,258 UART: Caliptra RT
3,480,511 UART: [state] CFI Enabled
3,589,544 UART: [rt] RT listening for mailbox commands...
3,590,207 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,796 UART: [rt]cmd =0x46504c54, len=4
3,620,836 >>> mbox cmd response data (8 bytes)
3,621,089 UART: [rt] FIPS self test
3,621,417 UART: [kat] ++
3,621,569 UART: [kat] sha1
3,625,845 UART: [kat] SHA2-256
3,627,867 UART: [kat] SHA2-384
3,630,698 UART: [kat] SHA2-512-ACC
3,632,625 UART: [kat] ECC-384
3,642,169 UART: Fatal Error: 0x90040003
3,643,708 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,643,713 >>> mbox cmd response: failed
3,643,713 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,643,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,518 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,504,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,584 UART: [idev] --
1,514,665 UART: [ldev] ++
1,514,833 UART: [ldev] CDI.KEYID = 6
1,515,196 UART: [ldev] SUBJECT.KEYID = 5
1,515,622 UART: [ldev] AUTHORITY.KEYID = 7
1,516,085 UART: [ldev] FE.KEYID = 1
1,521,105 UART: [ldev] Erasing FE.KEYID = 1
1,546,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,912 UART: [ldev] --
1,585,191 UART: [fwproc] Waiting for Commands...
1,585,826 UART: [fwproc] Received command 0x46574c44
1,586,617 UART: [fwproc] Received Image of size 115196 bytes
2,895,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,898 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,943 ready_for_fw is high
1,361,943 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,484 >>> mbox cmd response: success
2,998,590 UART:
2,998,606 UART: Running Caliptra FMC ...
2,999,014 UART:
2,999,068 UART: [state] CFI Enabled
3,009,381 UART: [fht] FMC Alias Private Key: 7
3,117,504 UART: [art] Extend RT PCRs Done
3,117,932 UART: [art] Lock RT PCRs Done
3,119,528 UART: [art] Populate DV Done
3,127,565 UART: [fht] FMC Alias Private Key: 7
3,128,545 UART: [art] Derive CDI
3,128,825 UART: [art] Store in in slot 0x4
3,214,608 UART: [art] Derive Key Pair
3,214,968 UART: [art] Store priv key in slot 0x5
3,227,632 UART: [art] Derive Key Pair - Done
3,242,381 UART: [art] Signing Cert with AUTHO
3,242,861 UART: RITY.KEYID = 7
3,257,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,362 UART: [art] PUB.X = 4850A2285B960799A925501EBE45D248D83CBD5DC96CEAE47DE12E13BC672B13CB356C356105875E364098258A42F9CA
3,265,126 UART: [art] PUB.Y = CCA10B6F32F3224D50FCED82A76197464901537F4057414571BD117C9D5127C64F9A60A0B8FD3F5E387684019BA95AA6
3,272,065 UART: [art] SIG.R = 80D1BCE96769D57F53E424AE22F67A8428714D1466B3813219947C3EB4B6359BB1BB6B9D3B18DFCCA095D9DE29A1E3D6
3,278,843 UART: [art] SIG.S = A836ABBAE11B53AE3C805973574352A2B0292C2012CC01781DFB799897919640CB35BAB24CE7AA1FFC9750C4579FB450
3,302,779 UART: Caliptra RT
3,303,032 UART: [state] CFI Enabled
3,410,896 UART: [rt] RT listening for mailbox commands...
3,411,559 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,150 UART: [rt]cmd =0x46504c54, len=4
3,442,336 >>> mbox cmd response data (8 bytes)
3,442,599 UART: [rt] FIPS self test
3,442,927 UART: [kat] ++
3,443,079 UART: [kat] sha1
3,447,409 UART: [kat] SHA2-256
3,449,431 UART: [kat] SHA2-384
3,452,272 UART: [kat] SHA2-512-ACC
3,454,199 UART: [kat] ECC-384
3,464,133 UART: Fatal Error: 0x90040003
3,465,672 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,465,677 >>> mbox cmd response: failed
3,465,677 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,465,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,059 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,478 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,092 UART: [kat] SHA2-256
882,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,138 UART: [kat] ++
886,290 UART: [kat] sha1
890,336 UART: [kat] SHA2-256
892,274 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,563 UART: [kat] HMAC-384Kdf
907,207 UART: [kat] LMS
1,475,403 UART: [kat] --
1,476,368 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 ready_for_fw is high
1,480,760 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,611 UART: [idev] Erasing UDS.KEYID = 0
1,505,311 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,514,906 UART: [ldev] ++
1,515,074 UART: [ldev] CDI.KEYID = 6
1,515,437 UART: [ldev] SUBJECT.KEYID = 5
1,515,863 UART: [ldev] AUTHORITY.KEYID = 7
1,516,326 UART: [ldev] FE.KEYID = 1
1,521,574 UART: [ldev] Erasing FE.KEYID = 1
1,547,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,985 UART: [ldev] --
1,586,256 UART: [fwproc] Waiting for Commands...
1,586,985 UART: [fwproc] Received command 0x46574c44
1,587,776 UART: [fwproc] Received Image of size 115196 bytes
2,894,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,511 >>> mbox cmd response: success
3,089,651 UART: [afmc] ++
3,089,819 UART: [afmc] CDI.KEYID = 6
3,090,181 UART: [afmc] SUBJECT.KEYID = 7
3,090,606 UART: [afmc] AUTHORITY.KEYID = 5
3,125,749 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,432 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,122 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,937 UART: [afmc] --
3,168,913 UART: [cold-reset] --
3,169,601 UART: [state] Locking Datavault
3,170,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,570 UART: [state] Locking ICCM
3,172,020 UART: [exit] Launching FMC @ 0x40000130
3,177,349 UART:
3,177,365 UART: Running Caliptra FMC ...
3,177,773 UART:
3,177,916 UART: [state] CFI Enabled
3,188,399 UART: [fht] FMC Alias Private Key: 7
3,296,716 UART: [art] Extend RT PCRs Done
3,297,144 UART: [art] Lock RT PCRs Done
3,298,778 UART: [art] Populate DV Done
3,307,017 UART: [fht] FMC Alias Private Key: 7
3,308,069 UART: [art] Derive CDI
3,308,349 UART: [art] Store in in slot 0x4
3,393,866 UART: [art] Derive Key Pair
3,394,226 UART: [art] Store priv key in slot 0x5
3,406,712 UART: [art] Derive Key Pair - Done
3,421,565 UART: [art] Signing Cert with AUTHO
3,422,045 UART: RITY.KEYID = 7
3,437,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,920 UART: [art] PUB.X = B7976FC9ECD110A3CCBEE03C778FA0C663032967D3ADF6239344309295A641205AC5D39FFADBDD574E51E2FC8714FB6F
3,444,701 UART: [art] PUB.Y = F6C9EB5AA4A4C3E0D7ADCBD344C096A3C1FB3BAD71F5F351FDFCDF008C9EBEF4E04F42D0D7E7033F419B28318B0F2B5B
3,451,655 UART: [art] SIG.R = 24FD9F6B9BD1DBB764342A3682BB84FBBBFD6FBBEB6C70B63135FFE9A2A7FD7EE875130BF4436AC1DE022DCB9853D42A
3,458,447 UART: [art] SIG.S = 183C14C86E351DCFBC3E3FAB3BCE1BFA1E697245E6DCBD74F6BC7975C9451EF7CB792BAEC358DBE0028751E02BC43062
3,481,625 UART: Caliptra RT
3,481,970 UART: [state] CFI Enabled
3,590,808 UART: [rt] RT listening for mailbox commands...
3,591,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,002 UART: [rt]cmd =0x46504c54, len=4
3,622,030 >>> mbox cmd response data (8 bytes)
3,622,371 UART: [rt] FIPS self test
3,622,699 UART: [kat] ++
3,622,851 UART: [kat] sha1
3,627,013 UART: [kat] SHA2-256
3,629,035 UART: [kat] SHA2-384
3,631,898 UART: [kat] SHA2-512-ACC
3,633,825 UART: [kat] ECC-384
3,643,487 UART: Fatal Error: 0x90040003
3,645,026 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,645,031 >>> mbox cmd response: failed
3,645,031 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,645,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,896 UART: [kat] SHA2-256
892,834 UART: [kat] SHA2-384
895,605 UART: [kat] SHA2-512-ACC
897,506 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
908,123 UART: [kat] LMS
1,476,319 UART: [kat] --
1,477,084 UART: [cold-reset] ++
1,477,582 UART: [fht] Storing FHT @ 0x50003400
1,480,383 UART: [idev] ++
1,480,551 UART: [idev] CDI.KEYID = 6
1,480,911 UART: [idev] SUBJECT.KEYID = 7
1,481,335 UART: [idev] UDS.KEYID = 0
1,481,680 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,647 UART: [idev] Erasing UDS.KEYID = 0
1,506,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,997 UART: [idev] --
1,515,972 UART: [ldev] ++
1,516,140 UART: [ldev] CDI.KEYID = 6
1,516,503 UART: [ldev] SUBJECT.KEYID = 5
1,516,929 UART: [ldev] AUTHORITY.KEYID = 7
1,517,392 UART: [ldev] FE.KEYID = 1
1,522,722 UART: [ldev] Erasing FE.KEYID = 1
1,548,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,318 UART: [fwproc] Waiting for Commands...
1,588,113 UART: [fwproc] Received command 0x46574c44
1,588,904 UART: [fwproc] Received Image of size 115196 bytes
2,897,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,479 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,260 ready_for_fw is high
1,363,260 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,355 >>> mbox cmd response: success
3,000,425 UART:
3,000,441 UART: Running Caliptra FMC ...
3,000,849 UART:
3,000,992 UART: [state] CFI Enabled
3,011,621 UART: [fht] FMC Alias Private Key: 7
3,119,298 UART: [art] Extend RT PCRs Done
3,119,726 UART: [art] Lock RT PCRs Done
3,121,210 UART: [art] Populate DV Done
3,129,181 UART: [fht] FMC Alias Private Key: 7
3,130,167 UART: [art] Derive CDI
3,130,447 UART: [art] Store in in slot 0x4
3,216,076 UART: [art] Derive Key Pair
3,216,436 UART: [art] Store priv key in slot 0x5
3,229,518 UART: [art] Derive Key Pair - Done
3,244,230 UART: [art] Signing Cert with AUTHO
3,244,710 UART: RITY.KEYID = 7
3,259,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,663 UART: [art] PUB.X = 993B73F2C17C6131A08D7DADE3486401BF1156F9E4951D774B15E9377AF5097B92D43EBE74303FD13B9E92254C95F05C
3,267,427 UART: [art] PUB.Y = 3B20BA31726DAE83721D88B184F405384A04A2B5353605F1C582BE977C965B0C29013D343094C39DAE94B97D755F0C5C
3,274,355 UART: [art] SIG.R = DA142D3AD9A386E0AC0B8AB3215DDFC5C290F53AD8D99BBF0528C0B8C3F012CC720F5C63E34B79669396CBBDBFACEF2E
3,281,144 UART: [art] SIG.S = 700D460FF1016D2208F81009E3A259B5437D7BE52A128977215B2FBE7B66FDD98EE08441DA91CB4BFBD7CF5190413171
3,305,044 UART: Caliptra RT
3,305,389 UART: [state] CFI Enabled
3,413,276 UART: [rt] RT listening for mailbox commands...
3,413,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,526 UART: [rt]cmd =0x46504c54, len=4
3,444,720 >>> mbox cmd response data (8 bytes)
3,444,865 UART: [rt] FIPS self test
3,445,193 UART: [kat] ++
3,445,345 UART: [kat] sha1
3,449,535 UART: [kat] SHA2-256
3,451,557 UART: [kat] SHA2-384
3,454,378 UART: [kat] SHA2-512-ACC
3,456,305 UART: [kat] ECC-384
3,465,871 UART: Fatal Error: 0x90040003
3,467,410 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,415 >>> mbox cmd response: failed
3,467,415 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,284 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,101 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,416 UART: [kat] SHA2-512-ACC
908,317 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,807 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 ready_for_fw is high
1,176,119 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,955 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,340 UART: [fwproc] Recv command 0x46574c44
1,284,068 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,686 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,807 >>> mbox cmd response: success
2,786,975 UART: [afmc] ++
2,787,143 UART: [afmc] CDI.KEYID = 6
2,787,505 UART: [afmc] SUBJECT.KEYID = 7
2,787,930 UART: [afmc] AUTHORITY.KEYID = 5
2,822,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,446 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,250 UART: [afmc] --
2,866,208 UART: [cold-reset] --
2,867,188 UART: [state] Locking Datavault
2,868,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,919 UART: [state] Locking ICCM
2,869,409 UART: [exit] Launching FMC @ 0x40000130
2,874,738 UART:
2,874,754 UART: Running Caliptra FMC ...
2,875,162 UART:
2,875,216 UART: [state] CFI Enabled
2,885,375 UART: [fht] FMC Alias Private Key: 7
2,993,198 UART: [art] Extend RT PCRs Done
2,993,626 UART: [art] Lock RT PCRs Done
2,995,108 UART: [art] Populate DV Done
3,003,333 UART: [fht] FMC Alias Private Key: 7
3,004,487 UART: [art] Derive CDI
3,004,767 UART: [art] Store in in slot 0x4
3,090,406 UART: [art] Derive Key Pair
3,090,766 UART: [art] Store priv key in slot 0x5
3,104,406 UART: [art] Derive Key Pair - Done
3,119,563 UART: [art] Signing Cert with AUTHO
3,120,043 UART: RITY.KEYID = 7
3,134,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,698 UART: [art] PUB.X = DB00166085142F3153D95AC9E5E12CA5EACD258801DFD0163C6397B40CA27B5ED84598C936BDBB08D23CEBA26931B308
3,142,442 UART: [art] PUB.Y = A44C6D9B85083733A14D16805726E85DF98FD1D90386561E7AAC69DAF086F0ED5C2132E0C40E722ADF060E8528B7BB52
3,149,381 UART: [art] SIG.R = 3404DD4A42447921FFECF74C35E0474CC9A81B57F70FB6EA58611311706829B38422F69CDFDA17CCF86D12B593B351A0
3,156,149 UART: [art] SIG.S = 23F24B41E0545B37F9E9FA96A7F269B1FBB4050F8312E3A38CB3237EE60FA6D9BEC618A178691646E4975EC4923A94C7
3,179,643 UART: Caliptra RT
3,179,896 UART: [state] CFI Enabled
3,287,625 UART: [rt] RT listening for mailbox commands...
3,288,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,113 UART: [rt]cmd =0x46504c54, len=4
3,319,293 >>> mbox cmd response data (8 bytes)
3,319,414 UART: [rt] FIPS self test
3,319,742 UART: [kat] ++
3,319,894 UART: [kat] sha1
3,324,116 UART: [kat] SHA2-256
3,326,138 UART: [kat] SHA2-384
3,328,929 UART: [kat] SHA2-512-ACC
3,330,856 UART: [kat] ECC-384
3,340,338 UART: Fatal Error: 0x90040003
3,341,877 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,882 >>> mbox cmd response: failed
3,341,882 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,588 UART: [idev] ++
1,174,756 UART: [idev] CDI.KEYID = 6
1,175,116 UART: [idev] SUBJECT.KEYID = 7
1,175,540 UART: [idev] UDS.KEYID = 0
1,175,885 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,034 UART: [idev] Erasing UDS.KEYID = 0
1,200,741 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,548 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,432 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,485 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,417 ready_for_fw is high
1,059,417 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,388 >>> mbox cmd response: success
2,700,048 UART:
2,700,064 UART: Running Caliptra FMC ...
2,700,472 UART:
2,700,526 UART: [state] CFI Enabled
2,710,945 UART: [fht] FMC Alias Private Key: 7
2,818,698 UART: [art] Extend RT PCRs Done
2,819,126 UART: [art] Lock RT PCRs Done
2,820,654 UART: [art] Populate DV Done
2,829,009 UART: [fht] FMC Alias Private Key: 7
2,830,023 UART: [art] Derive CDI
2,830,303 UART: [art] Store in in slot 0x4
2,915,918 UART: [art] Derive Key Pair
2,916,278 UART: [art] Store priv key in slot 0x5
2,930,242 UART: [art] Derive Key Pair - Done
2,944,691 UART: [art] Signing Cert with AUTHO
2,945,171 UART: RITY.KEYID = 7
2,960,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,898 UART: [art] PUB.X = 14B100A483EA29180A5EDD87676EA56CECDF3BF043731096DD5F144F4BC79C016E547634001FE10E06479991170B4B9F
2,967,609 UART: [art] PUB.Y = FBB09679D7A649926FCA090D3BB743FE14C5696575EB42A5BF9813294B97FD3F1E7C8585F46ED99E76356CCBF74137B9
2,974,559 UART: [art] SIG.R = AE5DD5DCDB17E3B14E0AE5446173B1C61DC2FC472AE26A94D2D8D0DF590EB10E896826710F78C4FDE3CB644D65209DC9
2,981,335 UART: [art] SIG.S = 56B75AE1330772351D763059F9BAA2089EF60631CC927D100DB3EB2FC450769E042B261D3E3C0E5778E1B41459A899FD
3,004,440 UART: Caliptra RT
3,004,693 UART: [state] CFI Enabled
3,113,868 UART: [rt] RT listening for mailbox commands...
3,114,531 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,296 UART: [rt]cmd =0x46504c54, len=4
3,145,284 >>> mbox cmd response data (8 bytes)
3,145,549 UART: [rt] FIPS self test
3,145,877 UART: [kat] ++
3,146,029 UART: [kat] sha1
3,150,137 UART: [kat] SHA2-256
3,152,159 UART: [kat] SHA2-384
3,154,924 UART: [kat] SHA2-512-ACC
3,156,851 UART: [kat] ECC-384
3,166,063 UART: Fatal Error: 0x90040003
3,167,602 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,607 >>> mbox cmd response: failed
3,167,607 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,372 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,935 UART: [kat] HMAC-384Kdf
923,735 UART: [kat] LMS
1,172,063 UART: [kat] --
1,172,972 UART: [cold-reset] ++
1,173,490 UART: [fht] FHT @ 0x50003400
1,176,187 UART: [idev] ++
1,176,355 UART: [idev] CDI.KEYID = 6
1,176,715 UART: [idev] SUBJECT.KEYID = 7
1,177,139 UART: [idev] UDS.KEYID = 0
1,177,484 ready_for_fw is high
1,177,484 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,301 UART: [idev] Erasing UDS.KEYID = 0
1,202,236 UART: [idev] Sha1 KeyId Algorithm
1,210,546 UART: [idev] --
1,211,706 UART: [ldev] ++
1,211,874 UART: [ldev] CDI.KEYID = 6
1,212,237 UART: [ldev] SUBJECT.KEYID = 5
1,212,663 UART: [ldev] AUTHORITY.KEYID = 7
1,213,126 UART: [ldev] FE.KEYID = 1
1,218,408 UART: [ldev] Erasing FE.KEYID = 1
1,244,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,594 UART: [ldev] --
1,283,985 UART: [fwproc] Wait for Commands...
1,284,687 UART: [fwproc] Recv command 0x46574c44
1,285,415 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,421 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,638 >>> mbox cmd response: success
2,788,770 UART: [afmc] ++
2,788,938 UART: [afmc] CDI.KEYID = 6
2,789,300 UART: [afmc] SUBJECT.KEYID = 7
2,789,725 UART: [afmc] AUTHORITY.KEYID = 5
2,825,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,605 UART: [afmc] --
2,868,515 UART: [cold-reset] --
2,869,317 UART: [state] Locking Datavault
2,870,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,168 UART: [state] Locking ICCM
2,871,730 UART: [exit] Launching FMC @ 0x40000130
2,877,059 UART:
2,877,075 UART: Running Caliptra FMC ...
2,877,483 UART:
2,877,626 UART: [state] CFI Enabled
2,888,597 UART: [fht] FMC Alias Private Key: 7
2,996,316 UART: [art] Extend RT PCRs Done
2,996,744 UART: [art] Lock RT PCRs Done
2,998,502 UART: [art] Populate DV Done
3,006,849 UART: [fht] FMC Alias Private Key: 7
3,007,805 UART: [art] Derive CDI
3,008,085 UART: [art] Store in in slot 0x4
3,093,406 UART: [art] Derive Key Pair
3,093,766 UART: [art] Store priv key in slot 0x5
3,107,372 UART: [art] Derive Key Pair - Done
3,122,397 UART: [art] Signing Cert with AUTHO
3,122,877 UART: RITY.KEYID = 7
3,137,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,648 UART: [art] PUB.X = 93E6CB596C1294885A97C88DEECEAEC030F7E3E6F9052CAF021846FBA2E73C5BC5322B8F08B3AD8B828A1BE42A1E6506
3,145,422 UART: [art] PUB.Y = 312C5329B3BC59B5A591FA3C40F1F26EA25218CC5D46292D6A304AD248FF1DCCE3339A81722C509E118989493D2A4580
3,152,372 UART: [art] SIG.R = F8E539FF43D493C7677AFE74479CF3035015550025471228D94C0C1C69C712C6F2E48DE02245258CA2C22B43C3198972
3,159,104 UART: [art] SIG.S = A1176D661D6BA15177F530B866DE6A72DE69AC67BFD1868F772C89DC57D68B8E7111459BF44EDB8D234D043D8409FEF3
3,182,997 UART: Caliptra RT
3,183,342 UART: [state] CFI Enabled
3,290,346 UART: [rt] RT listening for mailbox commands...
3,291,009 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,690 UART: [rt]cmd =0x46504c54, len=4
3,322,034 >>> mbox cmd response data (8 bytes)
3,322,367 UART: [rt] FIPS self test
3,322,695 UART: [kat] ++
3,322,847 UART: [kat] sha1
3,327,093 UART: [kat] SHA2-256
3,329,115 UART: [kat] SHA2-384
3,331,826 UART: [kat] SHA2-512-ACC
3,333,753 UART: [kat] ECC-384
3,343,533 UART: Fatal Error: 0x90040003
3,345,072 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,345,077 >>> mbox cmd response: failed
3,345,077 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,345,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
917,899 UART: [kat] HMAC-384Kdf
922,411 UART: [kat] LMS
1,170,739 UART: [kat] --
1,171,642 UART: [cold-reset] ++
1,172,126 UART: [fht] FHT @ 0x50003400
1,174,613 UART: [idev] ++
1,174,781 UART: [idev] CDI.KEYID = 6
1,175,141 UART: [idev] SUBJECT.KEYID = 7
1,175,565 UART: [idev] UDS.KEYID = 0
1,175,910 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,373 UART: [idev] Erasing UDS.KEYID = 0
1,200,442 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,874 UART: [ldev] ++
1,210,042 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,831 UART: [ldev] AUTHORITY.KEYID = 7
1,211,294 UART: [ldev] FE.KEYID = 1
1,216,544 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,524 UART: [ldev] --
1,282,879 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,185 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,781 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,948 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,252 ready_for_fw is high
1,060,252 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,003 >>> mbox cmd response: success
2,701,713 UART:
2,701,729 UART: Running Caliptra FMC ...
2,702,137 UART:
2,702,280 UART: [state] CFI Enabled
2,712,963 UART: [fht] FMC Alias Private Key: 7
2,821,348 UART: [art] Extend RT PCRs Done
2,821,776 UART: [art] Lock RT PCRs Done
2,823,602 UART: [art] Populate DV Done
2,831,761 UART: [fht] FMC Alias Private Key: 7
2,832,691 UART: [art] Derive CDI
2,832,971 UART: [art] Store in in slot 0x4
2,918,528 UART: [art] Derive Key Pair
2,918,888 UART: [art] Store priv key in slot 0x5
2,932,058 UART: [art] Derive Key Pair - Done
2,947,104 UART: [art] Signing Cert with AUTHO
2,947,584 UART: RITY.KEYID = 7
2,963,262 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,027 UART: [art] PUB.X = 7D51E1AD2155F836785190D47DCCAF343A65066FC0FC8813629A1B54149AE063F41EFBC83A02DF59085A8A929A2DB629
2,970,792 UART: [art] PUB.Y = 54902594923A5C1D5EE0121C8FD9EF682EF50F95CC12AAB543DC2FE46669461BB37591BE583A448B80C233C5F0FC35F6
2,977,745 UART: [art] SIG.R = 153370C6334EBE3381BFC4740B30EE3941A6D6130024486C0F91B8C681A7D40C762DD8789CB8ECECCB8C34D8293E9350
2,984,486 UART: [art] SIG.S = 01C4CCF4095F01515E8C8F54A788DC8B2B33317736A70F7EAE5B5A0E76D37DA64347E69CA1953BC7EE7B46C85441BC89
3,008,446 UART: Caliptra RT
3,008,791 UART: [state] CFI Enabled
3,116,756 UART: [rt] RT listening for mailbox commands...
3,117,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,484 UART: [rt]cmd =0x46504c54, len=4
3,148,654 >>> mbox cmd response data (8 bytes)
3,148,885 UART: [rt] FIPS self test
3,149,213 UART: [kat] ++
3,149,365 UART: [kat] sha1
3,153,455 UART: [kat] SHA2-256
3,155,477 UART: [kat] SHA2-384
3,158,230 UART: [kat] SHA2-512-ACC
3,160,157 UART: [kat] ECC-384
3,169,613 UART: Fatal Error: 0x90040003
3,171,152 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,157 >>> mbox cmd response: failed
3,171,157 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,978 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,941 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 ready_for_fw is high
1,174,253 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,557 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,544 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,041 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,257 >>> mbox cmd response: success
2,783,394 UART: [afmc] ++
2,783,562 UART: [afmc] CDI.KEYID = 6
2,783,925 UART: [afmc] SUBJECT.KEYID = 7
2,784,351 UART: [afmc] AUTHORITY.KEYID = 5
2,819,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,981 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,419 UART: [afmc] --
2,863,313 UART: [cold-reset] --
2,864,159 UART: [state] Locking Datavault
2,865,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,000 UART: [state] Locking ICCM
2,866,422 UART: [exit] Launching FMC @ 0x40000130
2,871,751 UART:
2,871,767 UART: Running Caliptra FMC ...
2,872,175 UART:
2,872,229 UART: [state] CFI Enabled
2,882,562 UART: [fht] FMC Alias Private Key: 7
2,990,351 UART: [art] Extend RT PCRs Done
2,990,779 UART: [art] Lock RT PCRs Done
2,992,369 UART: [art] Populate DV Done
3,000,708 UART: [fht] FMC Alias Private Key: 7
3,001,832 UART: [art] Derive CDI
3,002,112 UART: [art] Store in in slot 0x4
3,087,955 UART: [art] Derive Key Pair
3,088,315 UART: [art] Store priv key in slot 0x5
3,101,979 UART: [art] Derive Key Pair - Done
3,116,872 UART: [art] Signing Cert with AUTHO
3,117,352 UART: RITY.KEYID = 7
3,132,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,333 UART: [art] PUB.X = B4139E1CB2BBDD95F1CC5E5CE5D1654F834D2EC41FFFBD24BEF73110D7493B6FB63BA98C7B1AB78761D496E876BAB054
3,140,125 UART: [art] PUB.Y = 4374909F08E8B3D786C1B50C0305E3AB69E9B9235881505841697264F13AB78F4B2B98D1FDA9F306C487DB24AD095A3D
3,147,055 UART: [art] SIG.R = 6D7F6AAE96AB27D7B3FEF1C5F94082CAF6C3AC15B097EBDE52E37264A40E1954825BF553174C2C52A6F309B71E075B3B
3,153,830 UART: [art] SIG.S = EFEF280570CEF9BE735E52EB81BE52ED94C2E09871899FF6FCFB38FEAD0A917FF2182D053F62E2B37492FC7FEDA36B58
3,177,302 UART: Caliptra RT
3,177,555 UART: [state] CFI Enabled
3,285,622 UART: [rt] RT listening for mailbox commands...
3,286,285 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,036 UART: [rt]cmd =0x46504c54, len=4
3,317,022 >>> mbox cmd response data (8 bytes)
3,317,317 UART: [rt] FIPS self test
3,317,645 UART: [kat] ++
3,317,797 UART: [kat] sha1
3,322,157 UART: [kat] SHA2-256
3,324,179 UART: [kat] SHA2-384
3,327,160 UART: [kat] SHA2-512-ACC
3,329,087 UART: [kat] ECC-384
3,338,167 UART: Fatal Error: 0x90040003
3,339,706 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,711 >>> mbox cmd response: failed
3,339,711 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,282,211 UART: [fwproc] Recv command 0x46574c44
1,282,944 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,467 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,571 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,984 ready_for_fw is high
1,055,984 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,989 >>> mbox cmd response: success
2,697,273 UART:
2,697,289 UART: Running Caliptra FMC ...
2,697,697 UART:
2,697,751 UART: [state] CFI Enabled
2,708,342 UART: [fht] FMC Alias Private Key: 7
2,815,701 UART: [art] Extend RT PCRs Done
2,816,129 UART: [art] Lock RT PCRs Done
2,817,811 UART: [art] Populate DV Done
2,825,950 UART: [fht] FMC Alias Private Key: 7
2,827,086 UART: [art] Derive CDI
2,827,366 UART: [art] Store in in slot 0x4
2,912,863 UART: [art] Derive Key Pair
2,913,223 UART: [art] Store priv key in slot 0x5
2,925,917 UART: [art] Derive Key Pair - Done
2,940,261 UART: [art] Signing Cert with AUTHO
2,940,741 UART: RITY.KEYID = 7
2,955,937 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,702 UART: [art] PUB.X = 8478C3585BE41FB4E5E6F8B39D5E178AA69FB9C094C92EE4D0CDB38593E155AB8ECDFEE1B44528534A2641F85150B831
2,963,482 UART: [art] PUB.Y = 4A4D1185828F141348F413788C31BDF592C9392D0AAB1878A139AF5920FB9089A5B631DF8092ECDD579139495D867515
2,970,421 UART: [art] SIG.R = 9FA4734C004B9A0368642F51382B7DD66FE1421ABFA8F15BD4129D135DEE4C7F52E4ED502D969D9C0B22F278AD3022A4
2,977,171 UART: [art] SIG.S = 214628DF0138B62C227D024AF079EDCFFD721949FDB9E3864CB45ED4ACAF54321BCE24A52393E41D2FD0CFEE74944BA7
3,001,166 UART: Caliptra RT
3,001,419 UART: [state] CFI Enabled
3,109,726 UART: [rt] RT listening for mailbox commands...
3,110,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,974 UART: [rt]cmd =0x46504c54, len=4
3,141,036 >>> mbox cmd response data (8 bytes)
3,141,275 UART: [rt] FIPS self test
3,141,603 UART: [kat] ++
3,141,755 UART: [kat] sha1
3,145,989 UART: [kat] SHA2-256
3,148,011 UART: [kat] SHA2-384
3,150,822 UART: [kat] SHA2-512-ACC
3,152,749 UART: [kat] ECC-384
3,162,211 UART: Fatal Error: 0x90040003
3,163,750 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,755 >>> mbox cmd response: failed
3,163,755 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,968 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,353 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,174,926 ready_for_fw is high
1,174,926 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,099 UART: [ldev] ++
1,210,267 UART: [ldev] CDI.KEYID = 6
1,210,631 UART: [ldev] SUBJECT.KEYID = 5
1,211,058 UART: [ldev] AUTHORITY.KEYID = 7
1,211,521 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,830 UART: [fwproc] Recv command 0x46574c44
1,283,563 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,016 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,210 >>> mbox cmd response: success
2,786,257 UART: [afmc] ++
2,786,425 UART: [afmc] CDI.KEYID = 6
2,786,788 UART: [afmc] SUBJECT.KEYID = 7
2,787,214 UART: [afmc] AUTHORITY.KEYID = 5
2,822,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,860 UART: [afmc] --
2,865,892 UART: [cold-reset] --
2,866,650 UART: [state] Locking Datavault
2,867,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,151 UART: [state] Locking ICCM
2,868,631 UART: [exit] Launching FMC @ 0x40000130
2,873,960 UART:
2,873,976 UART: Running Caliptra FMC ...
2,874,384 UART:
2,874,527 UART: [state] CFI Enabled
2,884,936 UART: [fht] FMC Alias Private Key: 7
2,993,053 UART: [art] Extend RT PCRs Done
2,993,481 UART: [art] Lock RT PCRs Done
2,995,011 UART: [art] Populate DV Done
3,003,142 UART: [fht] FMC Alias Private Key: 7
3,004,128 UART: [art] Derive CDI
3,004,408 UART: [art] Store in in slot 0x4
3,090,153 UART: [art] Derive Key Pair
3,090,513 UART: [art] Store priv key in slot 0x5
3,103,657 UART: [art] Derive Key Pair - Done
3,118,472 UART: [art] Signing Cert with AUTHO
3,118,952 UART: RITY.KEYID = 7
3,134,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,833 UART: [art] PUB.X = 5970B083713CA098C7A7F418233C6DFAEDF5BC9DB9F110D5CDC2A01C9A0D9DCFFAF8FE90888B181DED2C0A4417F3B2F4
3,141,621 UART: [art] PUB.Y = 7EDE97032F5940F70E22DBC675AB013D652D478CEAB1A0F0C24DA13293ACAB384A50BB18A871F479290E8A1CCAA92B7E
3,148,575 UART: [art] SIG.R = 51CF0DF4E5310CDEBE6A7C10C2F3DCF9166E94A9EB5A210E740CD5BA649615E0F79B40AFCEC12D5D41250F0031189F18
3,155,324 UART: [art] SIG.S = 5564147BE722966FADCEA8CF9E5AF63E72651553E99A0072C109BD7CE00ACBBFBAD62C7E6D07D92ABAC89FDF132C7C4B
3,178,364 UART: Caliptra RT
3,178,709 UART: [state] CFI Enabled
3,287,094 UART: [rt] RT listening for mailbox commands...
3,287,757 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,656 UART: [rt]cmd =0x46504c54, len=4
3,318,592 >>> mbox cmd response data (8 bytes)
3,318,833 UART: [rt] FIPS self test
3,319,161 UART: [kat] ++
3,319,313 UART: [kat] sha1
3,323,665 UART: [kat] SHA2-256
3,325,687 UART: [kat] SHA2-384
3,328,666 UART: [kat] SHA2-512-ACC
3,330,593 UART: [kat] ECC-384
3,340,577 UART: Fatal Error: 0x90040003
3,342,116 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,121 >>> mbox cmd response: failed
3,342,121 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
905,033 UART: [kat] SHA2-512-ACC
906,934 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,007 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,058 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,078 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,843 ready_for_fw is high
1,055,843 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,172 >>> mbox cmd response: success
2,696,180 UART:
2,696,196 UART: Running Caliptra FMC ...
2,696,604 UART:
2,696,747 UART: [state] CFI Enabled
2,707,762 UART: [fht] FMC Alias Private Key: 7
2,816,311 UART: [art] Extend RT PCRs Done
2,816,739 UART: [art] Lock RT PCRs Done
2,818,401 UART: [art] Populate DV Done
2,826,400 UART: [fht] FMC Alias Private Key: 7
2,827,522 UART: [art] Derive CDI
2,827,802 UART: [art] Store in in slot 0x4
2,913,391 UART: [art] Derive Key Pair
2,913,751 UART: [art] Store priv key in slot 0x5
2,926,897 UART: [art] Derive Key Pair - Done
2,941,807 UART: [art] Signing Cert with AUTHO
2,942,287 UART: RITY.KEYID = 7
2,957,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,526 UART: [art] PUB.X = D9CBE38C9082829096CD09C54D0A358F2F22CC40BDCA9DAEF9AA5A80BDE679E6755FB587D651A04676E23AFE7FE85CF4
2,965,310 UART: [art] PUB.Y = 52591EFED1C7BF52FAB084F165D077816F9D3EB97E21A60AED5D198BE5AA11890DACFE9443916867850DC29E4ADF8CFF
2,972,269 UART: [art] SIG.R = DD42B063582E529BFCF54FF67C8D0FAD5B5D3E7E9C334B097606EDDD569EEE29A13C3F79BBC43ECB02D27CCA593CD1DF
2,979,055 UART: [art] SIG.S = 2E2E0CCDF952FB3E16EBAEDAF15040E7AB379F1C3EA5919FA689EA202166A6C7D3FCFDFC9372E89A6733A2FE7C7FB147
3,003,641 UART: Caliptra RT
3,003,986 UART: [state] CFI Enabled
3,112,687 UART: [rt] RT listening for mailbox commands...
3,113,350 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,105 UART: [rt]cmd =0x46504c54, len=4
3,144,383 >>> mbox cmd response data (8 bytes)
3,144,670 UART: [rt] FIPS self test
3,144,998 UART: [kat] ++
3,145,150 UART: [kat] sha1
3,149,260 UART: [kat] SHA2-256
3,151,282 UART: [kat] SHA2-384
3,153,981 UART: [kat] SHA2-512-ACC
3,155,908 UART: [kat] ECC-384
3,165,774 UART: Fatal Error: 0x90040003
3,167,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,318 >>> mbox cmd response: failed
3,167,318 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,945 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,902 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,529 >>> mbox cmd response: failed
824,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,923 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,921 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,069 >>> mbox cmd response: failed
824,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,997 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,824 >>> mbox cmd response: failed
823,824 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,140 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,420 >>> mbox cmd response: failed
824,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,852 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,595 >>> mbox cmd response: failed
823,595 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,087 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,881 >>> mbox cmd response: failed
823,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,525 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,638 >>> mbox cmd response: failed
823,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,512 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,026 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,732 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,740 >>> mbox cmd response: failed
823,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,162 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,609 >>> mbox cmd response: failed
823,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,599 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,959 >>> mbox cmd response: failed
823,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,857 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,088 >>> mbox cmd response: failed
824,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,216 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,636 >>> mbox cmd response: failed
824,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,620 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,478 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,710 UART: [state] LifecycleState = Unprovisioned
85,365 UART: [state] DebugLocked = No
86,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,635 UART: [kat] SHA2-256
881,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,681 UART: [kat] ++
885,833 UART: [kat] sha1
890,023 UART: [kat] SHA2-256
891,961 UART: [kat] SHA2-384
894,736 UART: [kat] SHA2-512-ACC
896,637 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,956 UART: [kat] LMS
1,475,152 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,246 UART: [idev] ++
1,479,414 UART: [idev] CDI.KEYID = 6
1,479,774 UART: [idev] SUBJECT.KEYID = 7
1,480,198 UART: [idev] UDS.KEYID = 0
1,480,543 ready_for_fw is high
1,480,543 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,950 UART: [idev] Erasing UDS.KEYID = 0
1,504,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,638 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,590 UART: [fwproc] Received command 0x46574c44
1,587,381 UART: [fwproc] Received Image of size 115196 bytes
2,894,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,963 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,478 >>> mbox cmd response: success
3,089,728 UART: [afmc] ++
3,089,896 UART: [afmc] CDI.KEYID = 6
3,090,258 UART: [afmc] SUBJECT.KEYID = 7
3,090,683 UART: [afmc] AUTHORITY.KEYID = 5
3,125,608 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,255 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,945 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,006 UART: [afmc] --
3,169,028 UART: [cold-reset] --
3,169,802 UART: [state] Locking Datavault
3,170,941 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,545 UART: [state] Locking ICCM
3,172,143 UART: [exit] Launching FMC @ 0x40000130
3,177,472 UART:
3,177,488 UART: Running Caliptra FMC ...
3,177,896 UART:
3,177,950 UART: [state] CFI Enabled
3,188,579 UART: [fht] FMC Alias Private Key: 7
3,296,192 UART: [art] Extend RT PCRs Done
3,296,620 UART: [art] Lock RT PCRs Done
3,298,036 UART: [art] Populate DV Done
3,306,339 UART: [fht] FMC Alias Private Key: 7
3,307,351 UART: [art] Derive CDI
3,307,631 UART: [art] Store in in slot 0x4
3,393,630 UART: [art] Derive Key Pair
3,393,990 UART: [art] Store priv key in slot 0x5
3,407,094 UART: [art] Derive Key Pair - Done
3,421,983 UART: [art] Signing Cert with AUTHO
3,422,463 UART: RITY.KEYID = 7
3,437,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,748 UART: [art] PUB.X = ED62BD50ABCD58E0490063B43012C712736A2D17E728FA9A9A15BEC10ADA06B0F796BBADBAFC266F5E59CD6E3FB6E318
3,445,512 UART: [art] PUB.Y = E8B4D6F5BB432770B7EF8F71A20EA58E501D7E49F75E5BCBE1A246B6009AE6C49A6D1DA422B39C252B887C1E4203805F
3,452,446 UART: [art] SIG.R = C9753D3A23B086ECBACEBF70748E53BA3C194992EC67E7B1483DA863CDB5CE4B2DD76FE3D0D628142476BDE140E80C1C
3,459,231 UART: [art] SIG.S = 5BDCD9DB393EFF916F1543C47FC85367638F8A2DF8A9DADA46A64C73F4E455129B219E5FDEF0AB1B3A072F3DC143D0FC
3,482,929 UART: Caliptra RT
3,483,182 UART: [state] CFI Enabled
3,592,361 UART: [rt] RT listening for mailbox commands...
3,593,024 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,893 UART: [rt]cmd =0x46504c54, len=4
3,624,045 >>> mbox cmd response data (8 bytes)
3,624,322 UART: [rt] FIPS self test
3,624,650 UART: [kat] ++
3,624,802 UART: [kat] sha1
3,628,996 UART: [kat] SHA2-256
3,631,018 UART: [kat] SHA2-384
3,633,773 UART: [kat] SHA2-512-ACC
3,635,700 UART: [kat] ECC-384
3,645,590 UART: [kat] HMAC-384Kdf
3,646,474 UART: Fatal Error: 0x90030001
3,648,013 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,018 >>> mbox cmd response: failed
3,648,018 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,521 UART: [kat] SHA2-256
881,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,567 UART: [kat] ++
885,719 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,600 UART: [kat] SHA2-512-ACC
896,501 UART: [kat] ECC-384
902,192 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,536 UART: [idev] ++
1,479,704 UART: [idev] CDI.KEYID = 6
1,480,064 UART: [idev] SUBJECT.KEYID = 7
1,480,488 UART: [idev] UDS.KEYID = 0
1,480,833 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,368 UART: [idev] Erasing UDS.KEYID = 0
1,505,308 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,763 UART: [ldev] ++
1,514,931 UART: [ldev] CDI.KEYID = 6
1,515,294 UART: [ldev] SUBJECT.KEYID = 5
1,515,720 UART: [ldev] AUTHORITY.KEYID = 7
1,516,183 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,547,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,308 UART: [ldev] --
1,586,811 UART: [fwproc] Waiting for Commands...
1,587,512 UART: [fwproc] Received command 0x46574c44
1,588,303 UART: [fwproc] Received Image of size 115196 bytes
2,896,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,410 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,279 ready_for_fw is high
1,362,279 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,704 >>> mbox cmd response: success
3,001,260 UART:
3,001,276 UART: Running Caliptra FMC ...
3,001,684 UART:
3,001,738 UART: [state] CFI Enabled
3,012,303 UART: [fht] FMC Alias Private Key: 7
3,120,420 UART: [art] Extend RT PCRs Done
3,120,848 UART: [art] Lock RT PCRs Done
3,122,248 UART: [art] Populate DV Done
3,130,417 UART: [fht] FMC Alias Private Key: 7
3,131,431 UART: [art] Derive CDI
3,131,711 UART: [art] Store in in slot 0x4
3,217,106 UART: [art] Derive Key Pair
3,217,466 UART: [art] Store priv key in slot 0x5
3,231,056 UART: [art] Derive Key Pair - Done
3,245,769 UART: [art] Signing Cert with AUTHO
3,246,249 UART: RITY.KEYID = 7
3,261,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,136 UART: [art] PUB.X = D1BB03A1C40F79963E5E8379FAEDC2468A4B7E0C1171E4EB6228023F474A427D922A0BA90D5B4E8B6CCF19EE09E7B6C5
3,268,899 UART: [art] PUB.Y = B070B16F985E9C465BEFB61BE6DF9DD05F60562DC25D2891F6D63DD4BE2CD06915E0A44845252688317921FE8BEDEF88
3,275,859 UART: [art] SIG.R = 8C5FE016E7F3622DFBA1FBE9DF5ADA664900F257C0750185CD27D55CF408C7ABFEE6E5BC750DF6F21FA5DD1689676148
3,282,616 UART: [art] SIG.S = 89F75B6C91A25F0B51BC5C7B17E92959B964968E6945B957DD0C5D7A6BA5949A5251EF651AA484D0011DCB69657BC2DB
3,306,432 UART: Caliptra RT
3,306,685 UART: [state] CFI Enabled
3,415,819 UART: [rt] RT listening for mailbox commands...
3,416,482 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,355 UART: [rt]cmd =0x46504c54, len=4
3,447,443 >>> mbox cmd response data (8 bytes)
3,447,640 UART: [rt] FIPS self test
3,447,968 UART: [kat] ++
3,448,120 UART: [kat] sha1
3,452,344 UART: [kat] SHA2-256
3,454,366 UART: [kat] SHA2-384
3,457,473 UART: [kat] SHA2-512-ACC
3,459,400 UART: [kat] ECC-384
3,469,516 UART: [kat] HMAC-384Kdf
3,470,362 UART: Fatal Error: 0x90030001
3,471,901 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,906 >>> mbox cmd response: failed
3,471,906 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,385 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,238 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
891,160 UART: [kat] SHA2-256
893,098 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,455 UART: [kat] HMAC-384Kdf
908,077 UART: [kat] LMS
1,476,273 UART: [kat] --
1,477,136 UART: [cold-reset] ++
1,477,466 UART: [fht] Storing FHT @ 0x50003400
1,480,201 UART: [idev] ++
1,480,369 UART: [idev] CDI.KEYID = 6
1,480,729 UART: [idev] SUBJECT.KEYID = 7
1,481,153 UART: [idev] UDS.KEYID = 0
1,481,498 ready_for_fw is high
1,481,498 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,155 UART: [idev] Erasing UDS.KEYID = 0
1,506,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,509 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,522,126 UART: [ldev] Erasing FE.KEYID = 1
1,547,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,533 UART: [ldev] --
1,587,040 UART: [fwproc] Waiting for Commands...
1,587,683 UART: [fwproc] Received command 0x46574c44
1,588,474 UART: [fwproc] Received Image of size 115196 bytes
2,897,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,547 >>> mbox cmd response: success
3,091,701 UART: [afmc] ++
3,091,869 UART: [afmc] CDI.KEYID = 6
3,092,231 UART: [afmc] SUBJECT.KEYID = 7
3,092,656 UART: [afmc] AUTHORITY.KEYID = 5
3,127,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,727 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,340 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,030 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,765 UART: [afmc] --
3,170,783 UART: [cold-reset] --
3,171,669 UART: [state] Locking Datavault
3,172,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,584 UART: [state] Locking ICCM
3,174,242 UART: [exit] Launching FMC @ 0x40000130
3,179,571 UART:
3,179,587 UART: Running Caliptra FMC ...
3,179,995 UART:
3,180,138 UART: [state] CFI Enabled
3,190,747 UART: [fht] FMC Alias Private Key: 7
3,299,206 UART: [art] Extend RT PCRs Done
3,299,634 UART: [art] Lock RT PCRs Done
3,301,120 UART: [art] Populate DV Done
3,309,669 UART: [fht] FMC Alias Private Key: 7
3,310,773 UART: [art] Derive CDI
3,311,053 UART: [art] Store in in slot 0x4
3,396,710 UART: [art] Derive Key Pair
3,397,070 UART: [art] Store priv key in slot 0x5
3,410,678 UART: [art] Derive Key Pair - Done
3,425,718 UART: [art] Signing Cert with AUTHO
3,426,198 UART: RITY.KEYID = 7
3,441,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,175 UART: [art] PUB.X = 3F8B45712EEFBE0D6EC4CE88C1BCC0B90982AFC0B8F01A2A983E771BAACF4870F46A78FB26D7C99216B3F70F9DE3ECC7
3,448,962 UART: [art] PUB.Y = 8FBDB552A73BE0E7BDD10C970C590DABC73602FF80315E0B80F13C7878FFB6120F3B14243F543FD14625C53F747A6379
3,455,900 UART: [art] SIG.R = 3317E40D95A44958FDC343208FE487806EFB7554A2A415D8E53BFE7335417778676A701AFAB6E6FDABAF58A48F45EAAC
3,462,677 UART: [art] SIG.S = DCA77EDD33C79D9228CFF669BFE99490622CC44D22F9A197E36111842B7BC0D16AB84833BDF14E4F52390C761DFBB3C9
3,486,933 UART: Caliptra RT
3,487,278 UART: [state] CFI Enabled
3,596,397 UART: [rt] RT listening for mailbox commands...
3,597,060 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,181 UART: [rt]cmd =0x46504c54, len=4
3,628,355 >>> mbox cmd response data (8 bytes)
3,628,560 UART: [rt] FIPS self test
3,628,888 UART: [kat] ++
3,629,040 UART: [kat] sha1
3,633,422 UART: [kat] SHA2-256
3,635,444 UART: [kat] SHA2-384
3,638,339 UART: [kat] SHA2-512-ACC
3,640,266 UART: [kat] ECC-384
3,650,056 UART: [kat] HMAC-384Kdf
3,651,144 UART: Fatal Error: 0x90030001
3,652,683 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,652,688 >>> mbox cmd response: failed
3,652,688 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,652,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,385 UART: [kat] SHA2-512-ACC
897,286 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,828 UART: [fht] Storing FHT @ 0x50003400
1,479,611 UART: [idev] ++
1,479,779 UART: [idev] CDI.KEYID = 6
1,480,139 UART: [idev] SUBJECT.KEYID = 7
1,480,563 UART: [idev] UDS.KEYID = 0
1,480,908 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,527 UART: [idev] Erasing UDS.KEYID = 0
1,505,235 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,515,000 UART: [ldev] ++
1,515,168 UART: [ldev] CDI.KEYID = 6
1,515,531 UART: [ldev] SUBJECT.KEYID = 5
1,515,957 UART: [ldev] AUTHORITY.KEYID = 7
1,516,420 UART: [ldev] FE.KEYID = 1
1,521,704 UART: [ldev] Erasing FE.KEYID = 1
1,546,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,635 UART: [ldev] --
1,586,098 UART: [fwproc] Waiting for Commands...
1,586,815 UART: [fwproc] Received command 0x46574c44
1,587,606 UART: [fwproc] Received Image of size 115196 bytes
2,895,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,381 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,546 ready_for_fw is high
1,363,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,207 >>> mbox cmd response: success
3,002,491 UART:
3,002,507 UART: Running Caliptra FMC ...
3,002,915 UART:
3,003,058 UART: [state] CFI Enabled
3,013,875 UART: [fht] FMC Alias Private Key: 7
3,121,862 UART: [art] Extend RT PCRs Done
3,122,290 UART: [art] Lock RT PCRs Done
3,124,010 UART: [art] Populate DV Done
3,132,221 UART: [fht] FMC Alias Private Key: 7
3,133,213 UART: [art] Derive CDI
3,133,493 UART: [art] Store in in slot 0x4
3,219,216 UART: [art] Derive Key Pair
3,219,576 UART: [art] Store priv key in slot 0x5
3,233,140 UART: [art] Derive Key Pair - Done
3,247,972 UART: [art] Signing Cert with AUTHO
3,248,452 UART: RITY.KEYID = 7
3,263,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,723 UART: [art] PUB.X = DF336A81423688AA5631A68B9C59F54B33FF45C70C355D1C9BABC17638E640A4C5A12E6484D12DCFBC82D94C85B9DC42
3,271,500 UART: [art] PUB.Y = 04B0D2068787AC3C91FB191A36434477FAECC34CC3B3C0B6E406E9AE77B0F32542D0CF252343DA2DC08AE4ED19259148
3,278,449 UART: [art] SIG.R = 59884E4068310043DEAADC505EDCCD93442CD3D77E481F6457BC4503F7DC5B484A6DAE43ECB711CDE866FE1C6CF50F86
3,285,207 UART: [art] SIG.S = 602BA6DB27B6663D09A8B9D789CF7620E87C431D0D4C8F40F6A316500E1386F6C3346531CE02B2B633C80E74EB1DB9BD
3,308,821 UART: Caliptra RT
3,309,166 UART: [state] CFI Enabled
3,418,148 UART: [rt] RT listening for mailbox commands...
3,418,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,798 UART: [rt]cmd =0x46504c54, len=4
3,450,116 >>> mbox cmd response data (8 bytes)
3,450,269 UART: [rt] FIPS self test
3,450,597 UART: [kat] ++
3,450,749 UART: [kat] sha1
3,454,911 UART: [kat] SHA2-256
3,456,933 UART: [kat] SHA2-384
3,459,986 UART: [kat] SHA2-512-ACC
3,461,913 UART: [kat] ECC-384
3,471,623 UART: [kat] HMAC-384Kdf
3,472,409 UART: Fatal Error: 0x90030001
3,473,948 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,473,953 >>> mbox cmd response: failed
3,473,953 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,473,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,552 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,583 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
893,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,639 UART: [kat] ++
897,791 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,432 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,221 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,252 UART: [idev] ++
1,175,420 UART: [idev] CDI.KEYID = 6
1,175,780 UART: [idev] SUBJECT.KEYID = 7
1,176,204 UART: [idev] UDS.KEYID = 0
1,176,549 ready_for_fw is high
1,176,549 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,201,359 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,282,844 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,142 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,366 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,429 >>> mbox cmd response: success
2,787,575 UART: [afmc] ++
2,787,743 UART: [afmc] CDI.KEYID = 6
2,788,105 UART: [afmc] SUBJECT.KEYID = 7
2,788,530 UART: [afmc] AUTHORITY.KEYID = 5
2,824,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,894 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,566 UART: [afmc] --
2,867,498 UART: [cold-reset] --
2,868,458 UART: [state] Locking Datavault
2,869,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,973 UART: [state] Locking ICCM
2,870,491 UART: [exit] Launching FMC @ 0x40000130
2,875,820 UART:
2,875,836 UART: Running Caliptra FMC ...
2,876,244 UART:
2,876,298 UART: [state] CFI Enabled
2,886,401 UART: [fht] FMC Alias Private Key: 7
2,994,994 UART: [art] Extend RT PCRs Done
2,995,422 UART: [art] Lock RT PCRs Done
2,997,030 UART: [art] Populate DV Done
3,005,135 UART: [fht] FMC Alias Private Key: 7
3,006,145 UART: [art] Derive CDI
3,006,425 UART: [art] Store in in slot 0x4
3,091,832 UART: [art] Derive Key Pair
3,092,192 UART: [art] Store priv key in slot 0x5
3,105,218 UART: [art] Derive Key Pair - Done
3,120,329 UART: [art] Signing Cert with AUTHO
3,120,809 UART: RITY.KEYID = 7
3,136,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,194 UART: [art] PUB.X = 09BCCE3A9BF36A7B4715DDFF54AAA866BA3716E93EF33FE34BA3A22575A8A0318E0BF75223EE7783C054D9CF9E3829E4
3,143,974 UART: [art] PUB.Y = 359F977DD6686D40AE1FA25AC86B06FB27D896AD6F067FEAE0AD2482B3CACF77C0FAE8509682803DC9E8A0266FE0EF55
3,150,936 UART: [art] SIG.R = 09FA7C54A89C0506B254A81C6F2CB16DCB1B0DBAA40CD9F7150F577755940373CCA1D3FB663C4ADA7335CC1931BE0C70
3,157,696 UART: [art] SIG.S = 880C986A0BE941398911A638D4CD825D0F82E681332101BBBAA436299CDD337F413282A718E708C8685D76FE9301D4E8
3,181,483 UART: Caliptra RT
3,181,736 UART: [state] CFI Enabled
3,289,287 UART: [rt] RT listening for mailbox commands...
3,289,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,729 UART: [rt]cmd =0x46504c54, len=4
3,320,989 >>> mbox cmd response data (8 bytes)
3,321,174 UART: [rt] FIPS self test
3,321,502 UART: [kat] ++
3,321,654 UART: [kat] sha1
3,325,880 UART: [kat] SHA2-256
3,327,902 UART: [kat] SHA2-384
3,330,883 UART: [kat] SHA2-512-ACC
3,332,810 UART: [kat] ECC-384
3,342,578 UART: [kat] HMAC-384Kdf
3,343,638 UART: Fatal Error: 0x90030001
3,345,177 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,345,182 >>> mbox cmd response: failed
3,345,182 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,345,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,347 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,032 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,127 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,223 ready_for_fw is high
1,060,223 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,348 >>> mbox cmd response: success
2,698,964 UART:
2,698,980 UART: Running Caliptra FMC ...
2,699,388 UART:
2,699,442 UART: [state] CFI Enabled
2,710,013 UART: [fht] FMC Alias Private Key: 7
2,817,394 UART: [art] Extend RT PCRs Done
2,817,822 UART: [art] Lock RT PCRs Done
2,819,364 UART: [art] Populate DV Done
2,827,449 UART: [fht] FMC Alias Private Key: 7
2,828,405 UART: [art] Derive CDI
2,828,685 UART: [art] Store in in slot 0x4
2,914,216 UART: [art] Derive Key Pair
2,914,576 UART: [art] Store priv key in slot 0x5
2,927,632 UART: [art] Derive Key Pair - Done
2,942,406 UART: [art] Signing Cert with AUTHO
2,942,886 UART: RITY.KEYID = 7
2,957,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,419 UART: [art] PUB.X = 49C2EE4C5B717177EB0AF48E70CE6AE562AB935577C21D5F1A020E03D38B431C871012E89720EDCB93A1FF2837F642F5
2,965,183 UART: [art] PUB.Y = A9BE574F7A1FBAE81366E60BB17DD98CD7465416DA5DE2734BA7D1171F7F76A38280C3776181738A8A6B223F8BCDB6D1
2,972,140 UART: [art] SIG.R = 7279FE958BD80EAB333C3B6E13681EA6AB07E664F71CDBCE268D6AE0882C5221E4600C43209EFC194F5E5ABFFF459210
2,978,913 UART: [art] SIG.S = 606713D32F76C31B4F6B988711788C5D28C960CBD10CF19742F707E5D6B99E0A36C58AA9297D4CF9119F65B884E9A07F
3,002,795 UART: Caliptra RT
3,003,048 UART: [state] CFI Enabled
3,110,775 UART: [rt] RT listening for mailbox commands...
3,111,438 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,391 UART: [rt]cmd =0x46504c54, len=4
3,142,613 >>> mbox cmd response data (8 bytes)
3,142,782 UART: [rt] FIPS self test
3,143,110 UART: [kat] ++
3,143,262 UART: [kat] sha1
3,147,424 UART: [kat] SHA2-256
3,149,446 UART: [kat] SHA2-384
3,152,183 UART: [kat] SHA2-512-ACC
3,154,110 UART: [kat] ECC-384
3,164,300 UART: [kat] HMAC-384Kdf
3,165,516 UART: Fatal Error: 0x90030001
3,167,055 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,060 >>> mbox cmd response: failed
3,167,060 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,904 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,153 UART: [kat] HMAC-384Kdf
922,779 UART: [kat] LMS
1,171,107 UART: [kat] --
1,171,980 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,247 UART: [idev] ++
1,175,415 UART: [idev] CDI.KEYID = 6
1,175,775 UART: [idev] SUBJECT.KEYID = 7
1,176,199 UART: [idev] UDS.KEYID = 0
1,176,544 ready_for_fw is high
1,176,544 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,695 UART: [idev] Erasing UDS.KEYID = 0
1,200,968 UART: [idev] Sha1 KeyId Algorithm
1,209,466 UART: [idev] --
1,210,456 UART: [ldev] ++
1,210,624 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,413 UART: [ldev] AUTHORITY.KEYID = 7
1,211,876 UART: [ldev] FE.KEYID = 1
1,217,274 UART: [ldev] Erasing FE.KEYID = 1
1,243,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,700 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,951 UART: [fwproc] Recv command 0x46574c44
1,284,679 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,199 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,236 >>> mbox cmd response: success
2,787,386 UART: [afmc] ++
2,787,554 UART: [afmc] CDI.KEYID = 6
2,787,916 UART: [afmc] SUBJECT.KEYID = 7
2,788,341 UART: [afmc] AUTHORITY.KEYID = 5
2,823,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,251 UART: [afmc] --
2,867,287 UART: [cold-reset] --
2,868,319 UART: [state] Locking Datavault
2,869,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,056 UART: [state] Locking ICCM
2,870,596 UART: [exit] Launching FMC @ 0x40000130
2,875,925 UART:
2,875,941 UART: Running Caliptra FMC ...
2,876,349 UART:
2,876,492 UART: [state] CFI Enabled
2,887,277 UART: [fht] FMC Alias Private Key: 7
2,995,498 UART: [art] Extend RT PCRs Done
2,995,926 UART: [art] Lock RT PCRs Done
2,997,570 UART: [art] Populate DV Done
3,005,611 UART: [fht] FMC Alias Private Key: 7
3,006,571 UART: [art] Derive CDI
3,006,851 UART: [art] Store in in slot 0x4
3,093,014 UART: [art] Derive Key Pair
3,093,374 UART: [art] Store priv key in slot 0x5
3,106,868 UART: [art] Derive Key Pair - Done
3,121,626 UART: [art] Signing Cert with AUTHO
3,122,106 UART: RITY.KEYID = 7
3,137,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,067 UART: [art] PUB.X = 00C6EBB89592C617BBC67C3D82DFAD0DC00B52856794909758E6528AB3AC655481E04D099428E8F236BADAD7BF0A0CAF
3,144,812 UART: [art] PUB.Y = 364B2CD4995D59984632BE9A3E2B01E399E5D4AD9710DD3BF729A9EB52D81F4C46DCD9C090A8DE75D74D0E0236F39D23
3,151,763 UART: [art] SIG.R = 957A28265F71FEF7D4AF52C59E8CD6EBA452F847098643673CE51BD3131176D3A50DF6284838C548C0F57CB05A7392B6
3,158,527 UART: [art] SIG.S = 44A7E6AC42148A57FA877DF00F68F720C05BD30340D5CAC69C6EDC20082C59FB864AE1451043CE9B8E99D557A155CA15
3,181,965 UART: Caliptra RT
3,182,310 UART: [state] CFI Enabled
3,290,425 UART: [rt] RT listening for mailbox commands...
3,291,088 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,527 UART: [rt]cmd =0x46504c54, len=4
3,321,657 >>> mbox cmd response data (8 bytes)
3,321,868 UART: [rt] FIPS self test
3,322,196 UART: [kat] ++
3,322,348 UART: [kat] sha1
3,326,778 UART: [kat] SHA2-256
3,328,800 UART: [kat] SHA2-384
3,331,623 UART: [kat] SHA2-512-ACC
3,333,550 UART: [kat] ECC-384
3,343,734 UART: [kat] HMAC-384Kdf
3,344,666 UART: Fatal Error: 0x90030001
3,346,205 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,346,210 >>> mbox cmd response: failed
3,346,210 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,346,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,721 UART: [kat] SHA2-512-ACC
908,622 UART: [kat] ECC-384
918,547 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,790 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,960 UART: [ldev] ++
1,211,128 UART: [ldev] CDI.KEYID = 6
1,211,491 UART: [ldev] SUBJECT.KEYID = 5
1,211,917 UART: [ldev] AUTHORITY.KEYID = 7
1,212,380 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,244,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,077 UART: [fwproc] Wait for Commands...
1,284,729 UART: [fwproc] Recv command 0x46574c44
1,285,457 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,725 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,844 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 ready_for_fw is high
1,061,058 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,983 >>> mbox cmd response: success
2,700,355 UART:
2,700,371 UART: Running Caliptra FMC ...
2,700,779 UART:
2,700,922 UART: [state] CFI Enabled
2,711,523 UART: [fht] FMC Alias Private Key: 7
2,819,668 UART: [art] Extend RT PCRs Done
2,820,096 UART: [art] Lock RT PCRs Done
2,821,618 UART: [art] Populate DV Done
2,829,763 UART: [fht] FMC Alias Private Key: 7
2,830,829 UART: [art] Derive CDI
2,831,109 UART: [art] Store in in slot 0x4
2,916,756 UART: [art] Derive Key Pair
2,917,116 UART: [art] Store priv key in slot 0x5
2,930,242 UART: [art] Derive Key Pair - Done
2,944,929 UART: [art] Signing Cert with AUTHO
2,945,409 UART: RITY.KEYID = 7
2,960,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,096 UART: [art] PUB.X = EB45555D868B227E35A8722C8893AF8CC80BE84E9B6E9380D107FC3FDC616390E310672EEE7E33E7C0E52D2309AE3FB2
2,967,865 UART: [art] PUB.Y = 83DE6D89589D245182B5A820744CAA6CF067EFCE4D34E12C326B6D2AE3C8C0CAF9A0465637400EB0C8C31FFC6763581F
2,974,822 UART: [art] SIG.R = 76042B76A1156064B75A86F1489CF405FF2632AB5D1328403D93EE24545F1FE05FF4A8EC5E2D03E31E95A8CDC2EA32BF
2,981,591 UART: [art] SIG.S = 879BA9A5B0393C3B9DF92E066F1207FA29705FADF4EBD6C7B71ACA09F832E4A10AAB91F93F247EF90492B650BA434941
3,005,179 UART: Caliptra RT
3,005,524 UART: [state] CFI Enabled
3,113,581 UART: [rt] RT listening for mailbox commands...
3,114,244 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,955 UART: [rt]cmd =0x46504c54, len=4
3,145,093 >>> mbox cmd response data (8 bytes)
3,145,266 UART: [rt] FIPS self test
3,145,594 UART: [kat] ++
3,145,746 UART: [kat] sha1
3,149,902 UART: [kat] SHA2-256
3,151,924 UART: [kat] SHA2-384
3,154,675 UART: [kat] SHA2-512-ACC
3,156,602 UART: [kat] ECC-384
3,166,690 UART: [kat] HMAC-384Kdf
3,167,990 UART: Fatal Error: 0x90030001
3,169,529 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,169,534 >>> mbox cmd response: failed
3,169,534 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,169,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,610 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,243 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,199,313 UART: [idev] Sha1 KeyId Algorithm
1,208,363 UART: [idev] --
1,209,474 UART: [ldev] ++
1,209,642 UART: [ldev] CDI.KEYID = 6
1,210,006 UART: [ldev] SUBJECT.KEYID = 5
1,210,433 UART: [ldev] AUTHORITY.KEYID = 7
1,210,896 UART: [ldev] FE.KEYID = 1
1,216,114 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,551 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,309 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,397 >>> mbox cmd response: success
2,785,552 UART: [afmc] ++
2,785,720 UART: [afmc] CDI.KEYID = 6
2,786,083 UART: [afmc] SUBJECT.KEYID = 7
2,786,509 UART: [afmc] AUTHORITY.KEYID = 5
2,821,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,967 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,287 UART: [afmc] --
2,865,335 UART: [cold-reset] --
2,866,235 UART: [state] Locking Datavault
2,867,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,164 UART: [state] Locking ICCM
2,868,654 UART: [exit] Launching FMC @ 0x40000130
2,873,983 UART:
2,873,999 UART: Running Caliptra FMC ...
2,874,407 UART:
2,874,461 UART: [state] CFI Enabled
2,884,762 UART: [fht] FMC Alias Private Key: 7
2,992,535 UART: [art] Extend RT PCRs Done
2,992,963 UART: [art] Lock RT PCRs Done
2,994,765 UART: [art] Populate DV Done
3,002,920 UART: [fht] FMC Alias Private Key: 7
3,003,936 UART: [art] Derive CDI
3,004,216 UART: [art] Store in in slot 0x4
3,089,843 UART: [art] Derive Key Pair
3,090,203 UART: [art] Store priv key in slot 0x5
3,103,233 UART: [art] Derive Key Pair - Done
3,117,683 UART: [art] Signing Cert with AUTHO
3,118,163 UART: RITY.KEYID = 7
3,133,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,532 UART: [art] PUB.X = DAA7C09413A45D8A135D0EA6BEF304775DDEAD3BC64E0C15F3353859BD8D5FFC029C489DD51CE0FA7E88D3338FF5E4DB
3,141,314 UART: [art] PUB.Y = 84B6380EB96CB1C4B0D33B45CA631AEB91CFDD9BF588EF91360A421EC5340B26F0D8B46D31CF29274B8A250F9B73FD2A
3,148,268 UART: [art] SIG.R = 2F11475E000D1111BB270AB5437EA54A5FAADEF3E2C80A412C630000992E2656631DAA1B35998C0EA5C5245639AF3F22
3,154,962 UART: [art] SIG.S = FD6221B2ADC9CE72515093F19EA01EBD3AF51DF36D35355A874AC2178C292A430202F2A02823CF730B0A2D336DB412A5
3,178,555 UART: Caliptra RT
3,178,808 UART: [state] CFI Enabled
3,287,377 UART: [rt] RT listening for mailbox commands...
3,288,040 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,747 UART: [rt]cmd =0x46504c54, len=4
3,318,927 >>> mbox cmd response data (8 bytes)
3,319,274 UART: [rt] FIPS self test
3,319,602 UART: [kat] ++
3,319,754 UART: [kat] sha1
3,323,802 UART: [kat] SHA2-256
3,325,824 UART: [kat] SHA2-384
3,328,731 UART: [kat] SHA2-512-ACC
3,330,658 UART: [kat] ECC-384
3,340,632 UART: [kat] HMAC-384Kdf
3,341,704 UART: Fatal Error: 0x90030001
3,343,243 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,248 >>> mbox cmd response: failed
3,343,248 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,566 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,151 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,415 UART: [idev] ++
1,172,583 UART: [idev] CDI.KEYID = 6
1,172,944 UART: [idev] SUBJECT.KEYID = 7
1,173,369 UART: [idev] UDS.KEYID = 0
1,173,715 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,536 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,227 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,281 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,240 ready_for_fw is high
1,055,240 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,097 >>> mbox cmd response: success
2,693,749 UART:
2,693,765 UART: Running Caliptra FMC ...
2,694,173 UART:
2,694,227 UART: [state] CFI Enabled
2,704,538 UART: [fht] FMC Alias Private Key: 7
2,812,299 UART: [art] Extend RT PCRs Done
2,812,727 UART: [art] Lock RT PCRs Done
2,813,925 UART: [art] Populate DV Done
2,822,260 UART: [fht] FMC Alias Private Key: 7
2,823,410 UART: [art] Derive CDI
2,823,690 UART: [art] Store in in slot 0x4
2,909,487 UART: [art] Derive Key Pair
2,909,847 UART: [art] Store priv key in slot 0x5
2,923,569 UART: [art] Derive Key Pair - Done
2,938,174 UART: [art] Signing Cert with AUTHO
2,938,654 UART: RITY.KEYID = 7
2,954,146 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,911 UART: [art] PUB.X = 14EDE1606A84B7FF5269EB83902E608E7FC71AC142F6F450AF993B4E5D5E6A8BE5C61D697442A99128D6BE4DDA8FE8D1
2,961,695 UART: [art] PUB.Y = DDCA6559CD0AD43CAD75D29B2AE112083A7EF262B9170D1EC324D725D1285300B653EC9BF2EE6F14960261593A2EFA5B
2,968,623 UART: [art] SIG.R = AE3308FA9A97B6D68A9B505411C898E41153CF9E8234818A52627306B8AEDC56E979CD6407CBDBA3AD1A1B09E622BC14
2,975,389 UART: [art] SIG.S = 734EB7572EA63CAC95EC05AE9E525A639FBC2EA522801DAB4F2AD7C21F44D704FD289690A74F67B9AE6F60BF897B01C5
2,998,757 UART: Caliptra RT
2,999,010 UART: [state] CFI Enabled
3,107,853 UART: [rt] RT listening for mailbox commands...
3,108,516 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,071 UART: [rt]cmd =0x46504c54, len=4
3,139,429 >>> mbox cmd response data (8 bytes)
3,139,772 UART: [rt] FIPS self test
3,140,100 UART: [kat] ++
3,140,252 UART: [kat] sha1
3,144,490 UART: [kat] SHA2-256
3,146,512 UART: [kat] SHA2-384
3,149,445 UART: [kat] SHA2-512-ACC
3,151,372 UART: [kat] ECC-384
3,161,282 UART: [kat] HMAC-384Kdf
3,162,218 UART: Fatal Error: 0x90030001
3,163,757 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,762 >>> mbox cmd response: failed
3,163,762 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,501 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,403 UART: [kat] LMS
1,169,715 UART: [kat] --
1,170,818 UART: [cold-reset] ++
1,171,390 UART: [fht] FHT @ 0x50003400
1,174,168 UART: [idev] ++
1,174,336 UART: [idev] CDI.KEYID = 6
1,174,697 UART: [idev] SUBJECT.KEYID = 7
1,175,122 UART: [idev] UDS.KEYID = 0
1,175,468 ready_for_fw is high
1,175,468 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,208,960 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,887 UART: [fwproc] Wait for Commands...
1,283,680 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,926 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,016 >>> mbox cmd response: success
2,786,177 UART: [afmc] ++
2,786,345 UART: [afmc] CDI.KEYID = 6
2,786,708 UART: [afmc] SUBJECT.KEYID = 7
2,787,134 UART: [afmc] AUTHORITY.KEYID = 5
2,822,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,404 UART: [afmc] --
2,865,536 UART: [cold-reset] --
2,866,106 UART: [state] Locking Datavault
2,867,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,893 UART: [state] Locking ICCM
2,868,527 UART: [exit] Launching FMC @ 0x40000130
2,873,856 UART:
2,873,872 UART: Running Caliptra FMC ...
2,874,280 UART:
2,874,423 UART: [state] CFI Enabled
2,884,892 UART: [fht] FMC Alias Private Key: 7
2,993,157 UART: [art] Extend RT PCRs Done
2,993,585 UART: [art] Lock RT PCRs Done
2,995,195 UART: [art] Populate DV Done
3,003,328 UART: [fht] FMC Alias Private Key: 7
3,004,488 UART: [art] Derive CDI
3,004,768 UART: [art] Store in in slot 0x4
3,090,617 UART: [art] Derive Key Pair
3,090,977 UART: [art] Store priv key in slot 0x5
3,104,589 UART: [art] Derive Key Pair - Done
3,119,232 UART: [art] Signing Cert with AUTHO
3,119,712 UART: RITY.KEYID = 7
3,135,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,021 UART: [art] PUB.X = 8D9B10706D836E597137E2712084E1179F3290C46ED6ABA963C30FC130B3C08870B46D89AC63105ABF6DC21A274F86EF
3,142,788 UART: [art] PUB.Y = F7D753E7E8A9075C1D81C1AB7F30BED9EA805907CF52C303A3F306F2044D99C82A2F26212063050603BC5D95E4CF7B59
3,149,718 UART: [art] SIG.R = A723CE35CD6EF072DDB047B99BCFCF03F90E0FA2D4DFE164526AB1B895E7E12807F02053ED144E164E0AD9D41E202725
3,156,487 UART: [art] SIG.S = 3E3DC380CE1ED9A5D429AD4E3F81B236D40CC5A9158F8B8172DD61E1E663538F8429F099A6BB079395294416C767E369
3,180,612 UART: Caliptra RT
3,180,957 UART: [state] CFI Enabled
3,288,518 UART: [rt] RT listening for mailbox commands...
3,289,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,078 UART: [rt]cmd =0x46504c54, len=4
3,320,410 >>> mbox cmd response data (8 bytes)
3,320,559 UART: [rt] FIPS self test
3,320,887 UART: [kat] ++
3,321,039 UART: [kat] sha1
3,325,111 UART: [kat] SHA2-256
3,327,133 UART: [kat] SHA2-384
3,329,984 UART: [kat] SHA2-512-ACC
3,331,911 UART: [kat] ECC-384
3,341,389 UART: [kat] HMAC-384Kdf
3,342,301 UART: Fatal Error: 0x90030001
3,343,840 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,845 >>> mbox cmd response: failed
3,343,845 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,539 UART: [kat] LMS
1,168,851 UART: [kat] --
1,169,766 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,174,062 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,975 UART: [ldev] ++
1,209,143 UART: [ldev] CDI.KEYID = 6
1,209,507 UART: [ldev] SUBJECT.KEYID = 5
1,209,934 UART: [ldev] AUTHORITY.KEYID = 7
1,210,397 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,214 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,400 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,483 ready_for_fw is high
1,056,483 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,724 >>> mbox cmd response: success
2,698,148 UART:
2,698,164 UART: Running Caliptra FMC ...
2,698,572 UART:
2,698,715 UART: [state] CFI Enabled
2,709,844 UART: [fht] FMC Alias Private Key: 7
2,817,861 UART: [art] Extend RT PCRs Done
2,818,289 UART: [art] Lock RT PCRs Done
2,819,689 UART: [art] Populate DV Done
2,827,728 UART: [fht] FMC Alias Private Key: 7
2,828,816 UART: [art] Derive CDI
2,829,096 UART: [art] Store in in slot 0x4
2,914,889 UART: [art] Derive Key Pair
2,915,249 UART: [art] Store priv key in slot 0x5
2,928,297 UART: [art] Derive Key Pair - Done
2,942,788 UART: [art] Signing Cert with AUTHO
2,943,268 UART: RITY.KEYID = 7
2,958,174 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,939 UART: [art] PUB.X = 509FB1F68B343F8CBB69B9682259AA14FAEC7582D8194CFB6CDBCFAC396D059FC844791BD931EA32DEFE639CB4F9124F
2,965,726 UART: [art] PUB.Y = 77B7E124C4FC3CB5B1D6D719A7590EB5B5C1DF01C8A63B7BB4CC554DF743332E0751C4D813E3E809CFD87452F49A4411
2,972,674 UART: [art] SIG.R = 9B9D6DF262A4DD46CF890ADCECFEDA5DCF1FD500A03AE216CA11217B77291555964AF11BCD77880E52C3324B2F15EAC9
2,979,436 UART: [art] SIG.S = B48067F9DBB8531FD6DAC4054098EDC884F044AD1B6E207140D89328CE4845F13B36E06C74EB04D444919DB9A1270BF3
3,003,570 UART: Caliptra RT
3,003,915 UART: [state] CFI Enabled
3,111,465 UART: [rt] RT listening for mailbox commands...
3,112,128 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,821 UART: [rt]cmd =0x46504c54, len=4
3,143,079 >>> mbox cmd response data (8 bytes)
3,143,244 UART: [rt] FIPS self test
3,143,572 UART: [kat] ++
3,143,724 UART: [kat] sha1
3,147,840 UART: [kat] SHA2-256
3,149,862 UART: [kat] SHA2-384
3,152,623 UART: [kat] SHA2-512-ACC
3,154,550 UART: [kat] ECC-384
3,164,634 UART: [kat] HMAC-384Kdf
3,165,916 UART: Fatal Error: 0x90030001
3,167,455 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,460 >>> mbox cmd response: failed
3,167,460 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,353 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,392 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,732 >>> mbox cmd response: failed
827,732 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,525 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,577 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,190 >>> mbox cmd response: failed
827,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,711 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,217 >>> mbox cmd response: failed
828,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,832 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,862 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,915 >>> mbox cmd response: failed
827,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,066 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,116 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,678 >>> mbox cmd response: failed
827,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,823 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,080 >>> mbox cmd response: failed
827,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,787 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,625 >>> mbox cmd response: failed
827,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,312 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,777 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,785 >>> mbox cmd response: failed
827,785 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,956 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,220 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,228 >>> mbox cmd response: failed
827,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,817 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,632 >>> mbox cmd response: failed
827,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,105 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,899 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,239 >>> mbox cmd response: failed
827,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,406 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,761 >>> mbox cmd response: failed
827,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,526 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,950 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,887 UART: [kat] SHA2-256
892,825 UART: [kat] SHA2-384
895,798 UART: [kat] SHA2-512-ACC
897,699 UART: [kat] ECC-384
903,522 UART: [kat] HMAC-384Kdf
908,058 UART: [kat] LMS
1,476,254 UART: [kat] --
1,477,151 UART: [cold-reset] ++
1,477,701 UART: [fht] Storing FHT @ 0x50003400
1,480,352 UART: [idev] ++
1,480,520 UART: [idev] CDI.KEYID = 6
1,480,880 UART: [idev] SUBJECT.KEYID = 7
1,481,304 UART: [idev] UDS.KEYID = 0
1,481,649 ready_for_fw is high
1,481,649 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,366 UART: [idev] Erasing UDS.KEYID = 0
1,506,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,014 UART: [idev] --
1,516,267 UART: [ldev] ++
1,516,435 UART: [ldev] CDI.KEYID = 6
1,516,798 UART: [ldev] SUBJECT.KEYID = 5
1,517,224 UART: [ldev] AUTHORITY.KEYID = 7
1,517,687 UART: [ldev] FE.KEYID = 1
1,522,829 UART: [ldev] Erasing FE.KEYID = 1
1,548,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,070 UART: [ldev] --
1,588,509 UART: [fwproc] Waiting for Commands...
1,589,302 UART: [fwproc] Received command 0x46574c44
1,590,093 UART: [fwproc] Received Image of size 115196 bytes
2,897,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,183 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,804 >>> mbox cmd response: success
3,092,904 UART: [afmc] ++
3,093,072 UART: [afmc] CDI.KEYID = 6
3,093,434 UART: [afmc] SUBJECT.KEYID = 7
3,093,859 UART: [afmc] AUTHORITY.KEYID = 5
3,129,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,238 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,631 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,321 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,200 UART: [afmc] --
3,172,104 UART: [cold-reset] --
3,173,048 UART: [state] Locking Datavault
3,174,205 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,809 UART: [state] Locking ICCM
3,175,433 UART: [exit] Launching FMC @ 0x40000130
3,180,762 UART:
3,180,778 UART: Running Caliptra FMC ...
3,181,186 UART:
3,181,240 UART: [state] CFI Enabled
3,191,553 UART: [fht] FMC Alias Private Key: 7
3,298,756 UART: [art] Extend RT PCRs Done
3,299,184 UART: [art] Lock RT PCRs Done
3,300,646 UART: [art] Populate DV Done
3,308,649 UART: [fht] FMC Alias Private Key: 7
3,309,633 UART: [art] Derive CDI
3,309,913 UART: [art] Store in in slot 0x4
3,395,684 UART: [art] Derive Key Pair
3,396,044 UART: [art] Store priv key in slot 0x5
3,409,510 UART: [art] Derive Key Pair - Done
3,424,325 UART: [art] Signing Cert with AUTHO
3,424,805 UART: RITY.KEYID = 7
3,440,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,988 UART: [art] PUB.X = 41890807BA65191F43CB7C9BD9A54DC58D4C6C28CFDA50DC5E0C12C419011EEB76AFA6C130DBE3E80CCAAFAA76469953
3,447,763 UART: [art] PUB.Y = 56C1FE83AEB7AA873875AE81E86917E61A08D597AFFD574BDAEB11D904106796D2660F04CFB220B29288F2BE2CEAF763
3,454,713 UART: [art] SIG.R = 6176E956F129DE03B06D801B851909FBFE18CD6D25A942C2A30F8453120591E14DF081C37B61D0AA0927CC6A98691F2A
3,461,468 UART: [art] SIG.S = 0D1B01D42ADD1887D334B96619206B527D2F91179D00AB0D10F1B73D6AC449336DCC32C3B52F68341FB3AF1E822A4F43
3,485,316 UART: Caliptra RT
3,485,569 UART: [state] CFI Enabled
3,594,449 UART: [rt] RT listening for mailbox commands...
3,595,112 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,785 UART: [rt]cmd =0x46504c54, len=4
3,625,907 >>> mbox cmd response data (8 bytes)
3,626,044 UART: [rt] FIPS self test
3,626,372 UART: [kat] ++
3,626,524 UART: [kat] sha1
3,630,700 UART: [kat] SHA2-256
3,632,722 UART: [kat] SHA2-384
3,635,557 UART: [kat] SHA2-512-ACC
3,637,484 UART: [kat] ECC-384
3,647,900 UART: [kat] HMAC-384Kdf
3,652,526 UART: Fatal Error: 0x90030002
3,654,065 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,654,070 >>> mbox cmd response: failed
3,654,070 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,654,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,412 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,107 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,218 UART: [idev] ++
1,479,386 UART: [idev] CDI.KEYID = 6
1,479,746 UART: [idev] SUBJECT.KEYID = 7
1,480,170 UART: [idev] UDS.KEYID = 0
1,480,515 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,284 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,815 UART: [ldev] ++
1,514,983 UART: [ldev] CDI.KEYID = 6
1,515,346 UART: [ldev] SUBJECT.KEYID = 5
1,515,772 UART: [ldev] AUTHORITY.KEYID = 7
1,516,235 UART: [ldev] FE.KEYID = 1
1,521,547 UART: [ldev] Erasing FE.KEYID = 1
1,546,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,016 UART: [ldev] --
1,585,357 UART: [fwproc] Waiting for Commands...
1,586,130 UART: [fwproc] Received command 0x46574c44
1,586,921 UART: [fwproc] Received Image of size 115196 bytes
2,894,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,114 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,627 ready_for_fw is high
1,362,627 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,082 >>> mbox cmd response: success
3,000,652 UART:
3,000,668 UART: Running Caliptra FMC ...
3,001,076 UART:
3,001,130 UART: [state] CFI Enabled
3,011,523 UART: [fht] FMC Alias Private Key: 7
3,119,778 UART: [art] Extend RT PCRs Done
3,120,206 UART: [art] Lock RT PCRs Done
3,121,532 UART: [art] Populate DV Done
3,129,987 UART: [fht] FMC Alias Private Key: 7
3,131,125 UART: [art] Derive CDI
3,131,405 UART: [art] Store in in slot 0x4
3,216,838 UART: [art] Derive Key Pair
3,217,198 UART: [art] Store priv key in slot 0x5
3,230,804 UART: [art] Derive Key Pair - Done
3,245,571 UART: [art] Signing Cert with AUTHO
3,246,051 UART: RITY.KEYID = 7
3,261,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,938 UART: [art] PUB.X = 9061EE401B1AE29C299D09D4056F748EAD16FCAB53C1687C83037B5522D8E6131E0E831458E39C0238D79E998B94547B
3,268,689 UART: [art] PUB.Y = 9F7333F61EE6B0C04E194D544496C4D8FBFBCC96D862DDA721C03F49A3395E375F00616BA9E4D7B6DBEC14F5CEE101D8
3,275,630 UART: [art] SIG.R = 763A831930C1B59EE12D338ABCFB2C8F6100A88D31095E79ED751C178D81F4338F2C4FF4430AD89DE1B5368E79787D3A
3,282,376 UART: [art] SIG.S = C872F02091D880AD864E8055C8AB87D4F24EF389CBA80E8CE1D0395EEE371ED2210AAE44E887A0AEC0413CCC613A6747
3,305,247 UART: Caliptra RT
3,305,500 UART: [state] CFI Enabled
3,414,861 UART: [rt] RT listening for mailbox commands...
3,415,524 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,223 UART: [rt]cmd =0x46504c54, len=4
3,446,409 >>> mbox cmd response data (8 bytes)
3,446,540 UART: [rt] FIPS self test
3,446,868 UART: [kat] ++
3,447,020 UART: [kat] sha1
3,451,078 UART: [kat] SHA2-256
3,453,100 UART: [kat] SHA2-384
3,456,165 UART: [kat] SHA2-512-ACC
3,458,092 UART: [kat] ECC-384
3,468,248 UART: [kat] HMAC-384Kdf
3,472,894 UART: Fatal Error: 0x90030002
3,474,433 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,474,438 >>> mbox cmd response: failed
3,474,438 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,474,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,954 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
87,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,692 UART: [kat] SHA2-256
882,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,738 UART: [kat] ++
886,890 UART: [kat] sha1
891,190 UART: [kat] SHA2-256
893,128 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,515 UART: [kat] HMAC-384Kdf
907,973 UART: [kat] LMS
1,476,169 UART: [kat] --
1,477,150 UART: [cold-reset] ++
1,477,562 UART: [fht] Storing FHT @ 0x50003400
1,480,389 UART: [idev] ++
1,480,557 UART: [idev] CDI.KEYID = 6
1,480,917 UART: [idev] SUBJECT.KEYID = 7
1,481,341 UART: [idev] UDS.KEYID = 0
1,481,686 ready_for_fw is high
1,481,686 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,295 UART: [idev] Erasing UDS.KEYID = 0
1,506,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,731 UART: [idev] --
1,515,752 UART: [ldev] ++
1,515,920 UART: [ldev] CDI.KEYID = 6
1,516,283 UART: [ldev] SUBJECT.KEYID = 5
1,516,709 UART: [ldev] AUTHORITY.KEYID = 7
1,517,172 UART: [ldev] FE.KEYID = 1
1,522,614 UART: [ldev] Erasing FE.KEYID = 1
1,548,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,797 UART: [ldev] --
1,588,232 UART: [fwproc] Waiting for Commands...
1,588,909 UART: [fwproc] Received command 0x46574c44
1,589,700 UART: [fwproc] Received Image of size 115196 bytes
2,897,870 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,800 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,249 >>> mbox cmd response: success
3,092,329 UART: [afmc] ++
3,092,497 UART: [afmc] CDI.KEYID = 6
3,092,859 UART: [afmc] SUBJECT.KEYID = 7
3,093,284 UART: [afmc] AUTHORITY.KEYID = 5
3,129,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,543 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,051 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,936 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,626 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,741 UART: [afmc] --
3,172,797 UART: [cold-reset] --
3,173,785 UART: [state] Locking Datavault
3,175,044 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,648 UART: [state] Locking ICCM
3,176,268 UART: [exit] Launching FMC @ 0x40000130
3,181,597 UART:
3,181,613 UART: Running Caliptra FMC ...
3,182,021 UART:
3,182,164 UART: [state] CFI Enabled
3,192,713 UART: [fht] FMC Alias Private Key: 7
3,299,816 UART: [art] Extend RT PCRs Done
3,300,244 UART: [art] Lock RT PCRs Done
3,301,660 UART: [art] Populate DV Done
3,309,709 UART: [fht] FMC Alias Private Key: 7
3,310,737 UART: [art] Derive CDI
3,311,017 UART: [art] Store in in slot 0x4
3,396,602 UART: [art] Derive Key Pair
3,396,962 UART: [art] Store priv key in slot 0x5
3,410,158 UART: [art] Derive Key Pair - Done
3,425,385 UART: [art] Signing Cert with AUTHO
3,425,865 UART: RITY.KEYID = 7
3,441,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,034 UART: [art] PUB.X = DD35D4E0684D0327F27BFE4003CF86730654287F6250DA30EDB9C1ED505BDA3864F9A7EA48947FD938092E77307B3E03
3,448,791 UART: [art] PUB.Y = CE8A810469A82F6AD3BA5E625F5FBDC9705B8E6527F3DC5F565969F5B7163BBE37C0891B64452D0D0F5F205AF2984872
3,455,738 UART: [art] SIG.R = 5D80B8A255B18FD8264C25007393A5101A196E1861339DB2C04485CFC9AA9BE7D94634F628CCB4839B322FE882CB8380
3,462,484 UART: [art] SIG.S = 6DA84D3EA8D16757CF4120B82A981C5BD26F3E9323B405EF3C46A205B6FB36DED35E091A404BFAA6D6E6C75F6D892257
3,486,028 UART: Caliptra RT
3,486,373 UART: [state] CFI Enabled
3,595,447 UART: [rt] RT listening for mailbox commands...
3,596,110 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,861 UART: [rt]cmd =0x46504c54, len=4
3,627,179 >>> mbox cmd response data (8 bytes)
3,627,314 UART: [rt] FIPS self test
3,627,642 UART: [kat] ++
3,627,794 UART: [kat] sha1
3,632,022 UART: [kat] SHA2-256
3,634,044 UART: [kat] SHA2-384
3,637,015 UART: [kat] SHA2-512-ACC
3,638,942 UART: [kat] ECC-384
3,648,920 UART: [kat] HMAC-384Kdf
3,653,752 UART: Fatal Error: 0x90030002
3,655,291 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,655,296 >>> mbox cmd response: failed
3,655,296 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,655,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,404 UART: [kat] SHA2-256
882,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,450 UART: [kat] ++
886,602 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,517 UART: [kat] LMS
1,475,713 UART: [kat] --
1,476,436 UART: [cold-reset] ++
1,476,784 UART: [fht] Storing FHT @ 0x50003400
1,479,533 UART: [idev] ++
1,479,701 UART: [idev] CDI.KEYID = 6
1,480,061 UART: [idev] SUBJECT.KEYID = 7
1,480,485 UART: [idev] UDS.KEYID = 0
1,480,830 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,085 UART: [idev] Erasing UDS.KEYID = 0
1,504,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,217 UART: [idev] --
1,514,262 UART: [ldev] ++
1,514,430 UART: [ldev] CDI.KEYID = 6
1,514,793 UART: [ldev] SUBJECT.KEYID = 5
1,515,219 UART: [ldev] AUTHORITY.KEYID = 7
1,515,682 UART: [ldev] FE.KEYID = 1
1,520,976 UART: [ldev] Erasing FE.KEYID = 1
1,545,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,009 UART: [ldev] --
1,585,438 UART: [fwproc] Waiting for Commands...
1,586,185 UART: [fwproc] Received command 0x46574c44
1,586,976 UART: [fwproc] Received Image of size 115196 bytes
2,895,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,719 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,384 ready_for_fw is high
1,362,384 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,403 >>> mbox cmd response: success
2,998,089 UART:
2,998,105 UART: Running Caliptra FMC ...
2,998,513 UART:
2,998,656 UART: [state] CFI Enabled
3,009,185 UART: [fht] FMC Alias Private Key: 7
3,117,652 UART: [art] Extend RT PCRs Done
3,118,080 UART: [art] Lock RT PCRs Done
3,119,346 UART: [art] Populate DV Done
3,127,791 UART: [fht] FMC Alias Private Key: 7
3,128,735 UART: [art] Derive CDI
3,129,015 UART: [art] Store in in slot 0x4
3,214,666 UART: [art] Derive Key Pair
3,215,026 UART: [art] Store priv key in slot 0x5
3,228,382 UART: [art] Derive Key Pair - Done
3,243,519 UART: [art] Signing Cert with AUTHO
3,243,999 UART: RITY.KEYID = 7
3,259,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,862 UART: [art] PUB.X = 05110CE5727CF4DC52D3F3F3A63751D2D1FB25E23BC3AA4F3E30F7D05C84EABDCC97016613B0378E5B5C7BD440F9A1F8
3,266,639 UART: [art] PUB.Y = 034322E9E1E1E4D7C83995FE5ADAC10918C7D9AD723B827A3BAC901FC2B5D166F8343901EF0D14AE1E6B9B167C634B93
3,273,587 UART: [art] SIG.R = FC54CD5AF55C276102C37EC9FA5FCB23F763D74F7915A4BABC978E9BE11DF02AEF80F49FC916E36A2FD0F8C1BB3BA559
3,280,380 UART: [art] SIG.S = DD1348A17A365657BC62EC62110A2C7833A0B9021BF02A826905FDEC94A766B76B8CE8AAA7A909084EFBE861FB81D5D0
3,303,632 UART: Caliptra RT
3,303,977 UART: [state] CFI Enabled
3,411,739 UART: [rt] RT listening for mailbox commands...
3,412,402 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,013 UART: [rt]cmd =0x46504c54, len=4
3,443,285 >>> mbox cmd response data (8 bytes)
3,443,446 UART: [rt] FIPS self test
3,443,774 UART: [kat] ++
3,443,926 UART: [kat] sha1
3,448,246 UART: [kat] SHA2-256
3,450,268 UART: [kat] SHA2-384
3,453,023 UART: [kat] SHA2-512-ACC
3,454,950 UART: [kat] ECC-384
3,465,382 UART: [kat] HMAC-384Kdf
3,470,262 UART: Fatal Error: 0x90030002
3,471,801 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,806 >>> mbox cmd response: failed
3,471,806 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,627 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
893,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,165 UART: [kat] ++
897,317 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,196 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,172,303 UART: [cold-reset] ++
1,172,697 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 ready_for_fw is high
1,176,755 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,681 UART: [idev] --
1,210,689 UART: [ldev] ++
1,210,857 UART: [ldev] CDI.KEYID = 6
1,211,220 UART: [ldev] SUBJECT.KEYID = 5
1,211,646 UART: [ldev] AUTHORITY.KEYID = 7
1,212,109 UART: [ldev] FE.KEYID = 1
1,217,143 UART: [ldev] Erasing FE.KEYID = 1
1,244,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,797 UART: [ldev] --
1,283,064 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,790 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,959 >>> mbox cmd response: success
2,788,183 UART: [afmc] ++
2,788,351 UART: [afmc] CDI.KEYID = 6
2,788,713 UART: [afmc] SUBJECT.KEYID = 7
2,789,138 UART: [afmc] AUTHORITY.KEYID = 5
2,824,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,168 UART: [afmc] --
2,868,260 UART: [cold-reset] --
2,869,290 UART: [state] Locking Datavault
2,870,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,667 UART: [state] Locking ICCM
2,871,293 UART: [exit] Launching FMC @ 0x40000130
2,876,622 UART:
2,876,638 UART: Running Caliptra FMC ...
2,877,046 UART:
2,877,100 UART: [state] CFI Enabled
2,887,279 UART: [fht] FMC Alias Private Key: 7
2,995,216 UART: [art] Extend RT PCRs Done
2,995,644 UART: [art] Lock RT PCRs Done
2,997,262 UART: [art] Populate DV Done
3,005,397 UART: [fht] FMC Alias Private Key: 7
3,006,385 UART: [art] Derive CDI
3,006,665 UART: [art] Store in in slot 0x4
3,092,360 UART: [art] Derive Key Pair
3,092,720 UART: [art] Store priv key in slot 0x5
3,105,792 UART: [art] Derive Key Pair - Done
3,120,977 UART: [art] Signing Cert with AUTHO
3,121,457 UART: RITY.KEYID = 7
3,136,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,200 UART: [art] PUB.X = 362F26B5E49331A33C034DD0F0494C9A0C543DBC8FD0B6EC5455F15295649333954DB05E749C7BF93DC962BA4933893D
3,143,964 UART: [art] PUB.Y = 2E554541FC8A515162F2E76AD7C8E3480271D1B29BBBA56356FDB048A00AAECA50205554FC9C064C89F568F664D04C69
3,150,909 UART: [art] SIG.R = F04C306F5F38F0EB0DC3377CEC525E78B4F5CEB394BF013AB0BF174480C992E4EACDDFD7D8A78B498425F713D5E44919
3,157,689 UART: [art] SIG.S = 01608B535EBC10E92F89905026216C52AAB9002858BA319915EF1B3000344E44ED607ECC81459F9AE07053BD86E8BA1B
3,181,535 UART: Caliptra RT
3,181,788 UART: [state] CFI Enabled
3,289,279 UART: [rt] RT listening for mailbox commands...
3,289,942 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,577 UART: [rt]cmd =0x46504c54, len=4
3,320,727 >>> mbox cmd response data (8 bytes)
3,321,068 UART: [rt] FIPS self test
3,321,396 UART: [kat] ++
3,321,548 UART: [kat] sha1
3,325,664 UART: [kat] SHA2-256
3,327,686 UART: [kat] SHA2-384
3,330,601 UART: [kat] SHA2-512-ACC
3,332,528 UART: [kat] ECC-384
3,342,490 UART: [kat] HMAC-384Kdf
3,347,154 UART: Fatal Error: 0x90030002
3,348,693 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,348,698 >>> mbox cmd response: failed
3,348,698 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,348,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
892,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,095 UART: [kat] ++
897,247 UART: [kat] sha1
901,577 UART: [kat] SHA2-256
903,517 UART: [kat] SHA2-384
906,260 UART: [kat] SHA2-512-ACC
908,161 UART: [kat] ECC-384
917,666 UART: [kat] HMAC-384Kdf
922,166 UART: [kat] LMS
1,170,494 UART: [kat] --
1,171,175 UART: [cold-reset] ++
1,171,635 UART: [fht] FHT @ 0x50003400
1,174,320 UART: [idev] ++
1,174,488 UART: [idev] CDI.KEYID = 6
1,174,848 UART: [idev] SUBJECT.KEYID = 7
1,175,272 UART: [idev] UDS.KEYID = 0
1,175,617 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,745 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,854 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,864 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,949 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,409 ready_for_fw is high
1,060,409 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,802 >>> mbox cmd response: success
2,702,640 UART:
2,702,656 UART: Running Caliptra FMC ...
2,703,064 UART:
2,703,118 UART: [state] CFI Enabled
2,713,855 UART: [fht] FMC Alias Private Key: 7
2,821,714 UART: [art] Extend RT PCRs Done
2,822,142 UART: [art] Lock RT PCRs Done
2,823,968 UART: [art] Populate DV Done
2,832,195 UART: [fht] FMC Alias Private Key: 7
2,833,337 UART: [art] Derive CDI
2,833,617 UART: [art] Store in in slot 0x4
2,919,232 UART: [art] Derive Key Pair
2,919,592 UART: [art] Store priv key in slot 0x5
2,932,656 UART: [art] Derive Key Pair - Done
2,947,443 UART: [art] Signing Cert with AUTHO
2,947,923 UART: RITY.KEYID = 7
2,963,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,100 UART: [art] PUB.X = 24997F651B41BE36849A38DB7AB2ACD8972E877EB851AD9B579AE766A9E6137C3E94EAE7440F2C2C8FAC6536CA127388
2,970,875 UART: [art] PUB.Y = B29F76E68B56E662D2A416A087193E2C56934B6FA5A2D34203024B5C594E43F2422581FF967A653D4D4C864190517640
2,977,807 UART: [art] SIG.R = E3DCB842E2884C0CEAFA7C49E3471FF73252816C3000EDFD8BD39C7D7AC78C95F3B121D4B0CF5D9059035B1CC4836A25
2,984,563 UART: [art] SIG.S = 0DC310F8D559DDFA68E5F2491CEF2426841FE7E06D2A9825253394DE1CF832ABCB675E5B971D67783179FFA7AE60BEA4
3,008,849 UART: Caliptra RT
3,009,102 UART: [state] CFI Enabled
3,115,961 UART: [rt] RT listening for mailbox commands...
3,116,624 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,403 UART: [rt]cmd =0x46504c54, len=4
3,147,569 >>> mbox cmd response data (8 bytes)
3,147,844 UART: [rt] FIPS self test
3,148,172 UART: [kat] ++
3,148,324 UART: [kat] sha1
3,152,420 UART: [kat] SHA2-256
3,154,442 UART: [kat] SHA2-384
3,157,257 UART: [kat] SHA2-512-ACC
3,159,184 UART: [kat] ECC-384
3,169,338 UART: [kat] HMAC-384Kdf
3,173,948 UART: Fatal Error: 0x90030002
3,175,487 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,175,492 >>> mbox cmd response: failed
3,175,492 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,175,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,630 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
922,937 UART: [kat] LMS
1,171,265 UART: [kat] --
1,171,924 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 ready_for_fw is high
1,176,508 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,202,026 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,218,028 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,144 UART: [ldev] --
1,283,603 UART: [fwproc] Wait for Commands...
1,284,363 UART: [fwproc] Recv command 0x46574c44
1,285,091 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,715 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,720 >>> mbox cmd response: success
2,787,950 UART: [afmc] ++
2,788,118 UART: [afmc] CDI.KEYID = 6
2,788,480 UART: [afmc] SUBJECT.KEYID = 7
2,788,905 UART: [afmc] AUTHORITY.KEYID = 5
2,824,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,281 UART: [afmc] --
2,868,401 UART: [cold-reset] --
2,869,363 UART: [state] Locking Datavault
2,870,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,080 UART: [state] Locking ICCM
2,871,648 UART: [exit] Launching FMC @ 0x40000130
2,876,977 UART:
2,876,993 UART: Running Caliptra FMC ...
2,877,401 UART:
2,877,544 UART: [state] CFI Enabled
2,887,627 UART: [fht] FMC Alias Private Key: 7
2,995,676 UART: [art] Extend RT PCRs Done
2,996,104 UART: [art] Lock RT PCRs Done
2,997,634 UART: [art] Populate DV Done
3,005,977 UART: [fht] FMC Alias Private Key: 7
3,007,105 UART: [art] Derive CDI
3,007,385 UART: [art] Store in in slot 0x4
3,093,574 UART: [art] Derive Key Pair
3,093,934 UART: [art] Store priv key in slot 0x5
3,107,636 UART: [art] Derive Key Pair - Done
3,122,069 UART: [art] Signing Cert with AUTHO
3,122,549 UART: RITY.KEYID = 7
3,137,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,256 UART: [art] PUB.X = 90F088377EC84D58DC6F38B78879ED3A14D669171BC660B5C309346876AC20048668FEA86B6C0586F6D2EE4B90BEB695
3,145,017 UART: [art] PUB.Y = 0541BF7FCDCBDB5C83F440ADD6B043B40C1672562FB67134A66711F11FDE560E9F8E036E0A6D0A58BDF7F059F04F237F
3,151,963 UART: [art] SIG.R = 300ABBA01D5FD22961B64376A3CB8E8F167402D825BF45FFBB9C7D6363A33250625960A96E2ACBCC8A07A2F5725C840C
3,158,729 UART: [art] SIG.S = 5DDB6B8E4EA00E00455D45E14DFD956135BA4EFD3A1A3170B9694A349AE6FA089B28E672FEFA32EC0BDBA8453FFF3EAB
3,182,417 UART: Caliptra RT
3,182,762 UART: [state] CFI Enabled
3,291,291 UART: [rt] RT listening for mailbox commands...
3,291,954 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,889 UART: [rt]cmd =0x46504c54, len=4
3,323,111 >>> mbox cmd response data (8 bytes)
3,323,250 UART: [rt] FIPS self test
3,323,578 UART: [kat] ++
3,323,730 UART: [kat] sha1
3,327,912 UART: [kat] SHA2-256
3,329,934 UART: [kat] SHA2-384
3,332,711 UART: [kat] SHA2-512-ACC
3,334,638 UART: [kat] ECC-384
3,344,842 UART: [kat] HMAC-384Kdf
3,349,278 UART: Fatal Error: 0x90030002
3,350,817 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,350,822 >>> mbox cmd response: failed
3,350,822 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,350,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
893,349 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,474 UART: [kat] ++
897,626 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,481 UART: [kat] SHA2-512-ACC
908,382 UART: [kat] ECC-384
918,555 UART: [kat] HMAC-384Kdf
923,385 UART: [kat] LMS
1,171,713 UART: [kat] --
1,172,526 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,867 UART: [idev] ++
1,176,035 UART: [idev] CDI.KEYID = 6
1,176,395 UART: [idev] SUBJECT.KEYID = 7
1,176,819 UART: [idev] UDS.KEYID = 0
1,177,164 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,255 UART: [idev] Erasing UDS.KEYID = 0
1,202,906 UART: [idev] Sha1 KeyId Algorithm
1,211,260 UART: [idev] --
1,212,152 UART: [ldev] ++
1,212,320 UART: [ldev] CDI.KEYID = 6
1,212,683 UART: [ldev] SUBJECT.KEYID = 5
1,213,109 UART: [ldev] AUTHORITY.KEYID = 7
1,213,572 UART: [ldev] FE.KEYID = 1
1,218,664 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,438 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,407 UART: [fwproc] Recv command 0x46574c44
1,285,135 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,823 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,058 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 ready_for_fw is high
1,060,910 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,319 >>> mbox cmd response: success
2,700,473 UART:
2,700,489 UART: Running Caliptra FMC ...
2,700,897 UART:
2,701,040 UART: [state] CFI Enabled
2,711,593 UART: [fht] FMC Alias Private Key: 7
2,819,622 UART: [art] Extend RT PCRs Done
2,820,050 UART: [art] Lock RT PCRs Done
2,821,504 UART: [art] Populate DV Done
2,829,525 UART: [fht] FMC Alias Private Key: 7
2,830,635 UART: [art] Derive CDI
2,830,915 UART: [art] Store in in slot 0x4
2,916,140 UART: [art] Derive Key Pair
2,916,500 UART: [art] Store priv key in slot 0x5
2,929,676 UART: [art] Derive Key Pair - Done
2,944,547 UART: [art] Signing Cert with AUTHO
2,945,027 UART: RITY.KEYID = 7
2,960,135 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,900 UART: [art] PUB.X = B51869674FDD8B70A32DA1B1AD1D13C1E2C7302CA95662880965BFE78506DF70AF060BE6A2C2BD61923CBBB200F105F4
2,967,643 UART: [art] PUB.Y = 82DA36762CAC4A1283337354EF73FB4366C90C947717CE993CF78E9AB2AA814D8FE5F17E582CEDF0D11F9F89418EF211
2,974,598 UART: [art] SIG.R = EECF38D0AD9143977F2996D355E91B433875CF1C6A2B0924F348F76CB9011767DD1BA9728D5D6514598330F67447196C
2,981,356 UART: [art] SIG.S = 261BDBD6F05EF09B3ACA11F215D0795AEC48090D65377D6C6C61040D5E14A387414012FCB82064DFD865DC5BD0B64353
3,004,875 UART: Caliptra RT
3,005,220 UART: [state] CFI Enabled
3,112,259 UART: [rt] RT listening for mailbox commands...
3,112,922 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,609 UART: [rt]cmd =0x46504c54, len=4
3,143,903 >>> mbox cmd response data (8 bytes)
3,144,186 UART: [rt] FIPS self test
3,144,514 UART: [kat] ++
3,144,666 UART: [kat] sha1
3,149,010 UART: [kat] SHA2-256
3,151,032 UART: [kat] SHA2-384
3,153,741 UART: [kat] SHA2-512-ACC
3,155,668 UART: [kat] ECC-384
3,165,738 UART: [kat] HMAC-384Kdf
3,170,398 UART: Fatal Error: 0x90030002
3,171,937 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,942 >>> mbox cmd response: failed
3,171,942 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,124 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,315 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,174,049 ready_for_fw is high
1,174,049 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,825 UART: [fwproc] Recv command 0x46574c44
1,282,558 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,851 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,909 >>> mbox cmd response: success
2,784,956 UART: [afmc] ++
2,785,124 UART: [afmc] CDI.KEYID = 6
2,785,487 UART: [afmc] SUBJECT.KEYID = 7
2,785,913 UART: [afmc] AUTHORITY.KEYID = 5
2,821,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,677 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,396 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,249 UART: [afmc] --
2,865,133 UART: [cold-reset] --
2,865,991 UART: [state] Locking Datavault
2,867,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,644 UART: [state] Locking ICCM
2,868,068 UART: [exit] Launching FMC @ 0x40000130
2,873,397 UART:
2,873,413 UART: Running Caliptra FMC ...
2,873,821 UART:
2,873,875 UART: [state] CFI Enabled
2,884,620 UART: [fht] FMC Alias Private Key: 7
2,992,459 UART: [art] Extend RT PCRs Done
2,992,887 UART: [art] Lock RT PCRs Done
2,994,291 UART: [art] Populate DV Done
3,002,630 UART: [fht] FMC Alias Private Key: 7
3,003,740 UART: [art] Derive CDI
3,004,020 UART: [art] Store in in slot 0x4
3,089,807 UART: [art] Derive Key Pair
3,090,167 UART: [art] Store priv key in slot 0x5
3,103,461 UART: [art] Derive Key Pair - Done
3,118,237 UART: [art] Signing Cert with AUTHO
3,118,717 UART: RITY.KEYID = 7
3,134,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,780 UART: [art] PUB.X = 6242730B9CDAE4A0427E9A67AD6E98E2E5ACAB61CAFE3F8B492271ACBD740808320764F657C99E536826EA8C028F3800
3,141,519 UART: [art] PUB.Y = 11EE58A07A39D44C1F9D373C33DBC362FD2A138BD51B360ECBD7FF03FC1E42BC34FEFB0F7679D355DDA8CA44EFD7851B
3,148,486 UART: [art] SIG.R = EBAAF5FB7967262244DCE510E369EA64D8E3D5888DD8A6AD972658E2BFAF8A0865ECF783526D25C886A9F29A0D2758EC
3,155,264 UART: [art] SIG.S = C29B9AE6A2900517A430C90DBBB813D023E6951B3AB53B1FE40A9D904F592FA4283F4D9A43277C59DFE88994B72D92D7
3,179,810 UART: Caliptra RT
3,180,063 UART: [state] CFI Enabled
3,286,975 UART: [rt] RT listening for mailbox commands...
3,287,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,805 UART: [rt]cmd =0x46504c54, len=4
3,318,881 >>> mbox cmd response data (8 bytes)
3,319,056 UART: [rt] FIPS self test
3,319,384 UART: [kat] ++
3,319,536 UART: [kat] sha1
3,323,722 UART: [kat] SHA2-256
3,325,744 UART: [kat] SHA2-384
3,328,627 UART: [kat] SHA2-512-ACC
3,330,554 UART: [kat] ECC-384
3,340,232 UART: [kat] HMAC-384Kdf
3,344,774 UART: Fatal Error: 0x90030002
3,346,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,346,318 >>> mbox cmd response: failed
3,346,318 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,346,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,360 UART: [kat] HMAC-384Kdf
920,090 UART: [kat] LMS
1,168,402 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,289 UART: [idev] ++
1,172,457 UART: [idev] CDI.KEYID = 6
1,172,818 UART: [idev] SUBJECT.KEYID = 7
1,173,243 UART: [idev] UDS.KEYID = 0
1,173,589 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,180,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,207,990 UART: [ldev] ++
1,208,158 UART: [ldev] CDI.KEYID = 6
1,208,522 UART: [ldev] SUBJECT.KEYID = 5
1,208,949 UART: [ldev] AUTHORITY.KEYID = 7
1,209,412 UART: [ldev] FE.KEYID = 1
1,214,552 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,742 UART: [ldev] --
1,280,106 UART: [fwproc] Wait for Commands...
1,280,739 UART: [fwproc] Recv command 0x46574c44
1,281,472 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,593 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,781,697 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,322 ready_for_fw is high
1,055,322 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,669 >>> mbox cmd response: success
2,696,255 UART:
2,696,271 UART: Running Caliptra FMC ...
2,696,679 UART:
2,696,733 UART: [state] CFI Enabled
2,706,738 UART: [fht] FMC Alias Private Key: 7
2,814,927 UART: [art] Extend RT PCRs Done
2,815,355 UART: [art] Lock RT PCRs Done
2,816,735 UART: [art] Populate DV Done
2,825,070 UART: [fht] FMC Alias Private Key: 7
2,826,088 UART: [art] Derive CDI
2,826,368 UART: [art] Store in in slot 0x4
2,911,885 UART: [art] Derive Key Pair
2,912,245 UART: [art] Store priv key in slot 0x5
2,925,269 UART: [art] Derive Key Pair - Done
2,940,192 UART: [art] Signing Cert with AUTHO
2,940,672 UART: RITY.KEYID = 7
2,956,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,783 UART: [art] PUB.X = F5EA3FE9C9226B08B65DFCD33C83D41348E093A92743B65A2F5A0E0820FC6519E22C34DFD4C6D4E0C2A1926C89BFB31B
2,963,558 UART: [art] PUB.Y = D5A1C9ED84B833644F37B99570E50B381AF4ABBD727A48FCF7CCE699C28359604BF5D843EC804525DEF525FDF5783A26
2,970,515 UART: [art] SIG.R = 92CD4DC8F3E6FBAC5665A5430F72D521190EC8F34B071198971F86F9B895CDDD38750C499016E96C8FABF0577FA259FE
2,977,281 UART: [art] SIG.S = 1448389CF32A58125147BBD3E2819F0A7403CD6E000E825D7239427B4C4D121BA4335C9064DA2BE4716580C4F8259FBD
3,001,259 UART: Caliptra RT
3,001,512 UART: [state] CFI Enabled
3,109,063 UART: [rt] RT listening for mailbox commands...
3,109,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,423 UART: [rt]cmd =0x46504c54, len=4
3,140,701 >>> mbox cmd response data (8 bytes)
3,140,916 UART: [rt] FIPS self test
3,141,244 UART: [kat] ++
3,141,396 UART: [kat] sha1
3,145,562 UART: [kat] SHA2-256
3,147,584 UART: [kat] SHA2-384
3,150,511 UART: [kat] SHA2-512-ACC
3,152,438 UART: [kat] ECC-384
3,162,656 UART: [kat] HMAC-384Kdf
3,167,420 UART: Fatal Error: 0x90030002
3,168,959 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,964 >>> mbox cmd response: failed
3,168,964 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,726 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,273 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,169,804 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 ready_for_fw is high
1,174,322 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,111 UART: [ldev] ++
1,209,279 UART: [ldev] CDI.KEYID = 6
1,209,643 UART: [ldev] SUBJECT.KEYID = 5
1,210,070 UART: [ldev] AUTHORITY.KEYID = 7
1,210,533 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,670 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,820 >>> mbox cmd response: success
2,786,069 UART: [afmc] ++
2,786,237 UART: [afmc] CDI.KEYID = 6
2,786,600 UART: [afmc] SUBJECT.KEYID = 7
2,787,026 UART: [afmc] AUTHORITY.KEYID = 5
2,823,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,617 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,426 UART: [afmc] --
2,866,492 UART: [cold-reset] --
2,867,296 UART: [state] Locking Datavault
2,868,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,841 UART: [state] Locking ICCM
2,869,285 UART: [exit] Launching FMC @ 0x40000130
2,874,614 UART:
2,874,630 UART: Running Caliptra FMC ...
2,875,038 UART:
2,875,181 UART: [state] CFI Enabled
2,885,870 UART: [fht] FMC Alias Private Key: 7
2,993,985 UART: [art] Extend RT PCRs Done
2,994,413 UART: [art] Lock RT PCRs Done
2,995,983 UART: [art] Populate DV Done
3,004,186 UART: [fht] FMC Alias Private Key: 7
3,005,326 UART: [art] Derive CDI
3,005,606 UART: [art] Store in in slot 0x4
3,091,377 UART: [art] Derive Key Pair
3,091,737 UART: [art] Store priv key in slot 0x5
3,105,193 UART: [art] Derive Key Pair - Done
3,120,128 UART: [art] Signing Cert with AUTHO
3,120,608 UART: RITY.KEYID = 7
3,135,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,345 UART: [art] PUB.X = AC6339C3DA87090EF0414AF925450E545914600873427A1901748E613D7B36745D55B5D81ABEAB86883540B88F9A69AF
3,143,092 UART: [art] PUB.Y = 9585FD07CA22C2B2119CD16850838C67DDB01A40EA677025EDB40A9B1324930C40229795633B7B804258932BC8BF16EB
3,150,029 UART: [art] SIG.R = 45C925697E1C123A1BB7697AC7163AE0F30F70FE90364216D6A8DDFFBCC4D55FCE29C1C3DC64328E37D8A763FEE805FE
3,156,809 UART: [art] SIG.S = 6608CE92E0C81AC89669143B845650858A2F225F1313172290AF318786D45E226FD0D8B4A80C057A44AE1539264E0623
3,180,182 UART: Caliptra RT
3,180,527 UART: [state] CFI Enabled
3,288,400 UART: [rt] RT listening for mailbox commands...
3,289,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,754 UART: [rt]cmd =0x46504c54, len=4
3,319,788 >>> mbox cmd response data (8 bytes)
3,319,973 UART: [rt] FIPS self test
3,320,301 UART: [kat] ++
3,320,453 UART: [kat] sha1
3,324,597 UART: [kat] SHA2-256
3,326,619 UART: [kat] SHA2-384
3,329,588 UART: [kat] SHA2-512-ACC
3,331,515 UART: [kat] ECC-384
3,341,439 UART: [kat] HMAC-384Kdf
3,346,027 UART: Fatal Error: 0x90030002
3,347,566 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,347,571 >>> mbox cmd response: failed
3,347,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,347,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,986 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,194 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 ready_for_fw is high
1,056,043 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,078 >>> mbox cmd response: success
2,697,230 UART:
2,697,246 UART: Running Caliptra FMC ...
2,697,654 UART:
2,697,797 UART: [state] CFI Enabled
2,708,498 UART: [fht] FMC Alias Private Key: 7
2,816,991 UART: [art] Extend RT PCRs Done
2,817,419 UART: [art] Lock RT PCRs Done
2,818,877 UART: [art] Populate DV Done
2,827,140 UART: [fht] FMC Alias Private Key: 7
2,828,322 UART: [art] Derive CDI
2,828,602 UART: [art] Store in in slot 0x4
2,914,665 UART: [art] Derive Key Pair
2,915,025 UART: [art] Store priv key in slot 0x5
2,928,001 UART: [art] Derive Key Pair - Done
2,942,441 UART: [art] Signing Cert with AUTHO
2,942,921 UART: RITY.KEYID = 7
2,958,179 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,944 UART: [art] PUB.X = 4CC00720CEC5771C4BAE920EF9F26BFC353B05FFE0066C9ED14EA0836087B66356C59CF767985993A021710FE22A6B00
2,965,681 UART: [art] PUB.Y = F73D00286FCEB79C8F0D1D6C05072D523880084699C2F5D1B26D9F41BA119DC4DCDA0F8E0794345B85EFA96404FF4015
2,972,594 UART: [art] SIG.R = AF0591921B614E91ABB96D1CC89EDBD4B39A8603F2F76AC6BC47434A6B8E72CFE5EDC07E1C4AEC937EBAC10453796116
2,979,373 UART: [art] SIG.S = 5BDB9190357D3B1D11B2531AF89EF4D0E1A701E731E0087C9ED8586DD154C54CFB42747191F203ADF87EA710876CB427
3,002,795 UART: Caliptra RT
3,003,140 UART: [state] CFI Enabled
3,111,935 UART: [rt] RT listening for mailbox commands...
3,112,598 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,517 UART: [rt]cmd =0x46504c54, len=4
3,143,763 >>> mbox cmd response data (8 bytes)
3,143,990 UART: [rt] FIPS self test
3,144,318 UART: [kat] ++
3,144,470 UART: [kat] sha1
3,148,666 UART: [kat] SHA2-256
3,150,688 UART: [kat] SHA2-384
3,153,387 UART: [kat] SHA2-512-ACC
3,155,314 UART: [kat] ECC-384
3,165,644 UART: [kat] HMAC-384Kdf
3,170,228 UART: Fatal Error: 0x90030002
3,171,767 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,772 >>> mbox cmd response: failed
3,171,772 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,843 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,320 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,434 >>> mbox cmd response: failed
1,098,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,853 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,342 >>> mbox cmd response: failed
1,097,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,027 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,929 >>> mbox cmd response: failed
1,098,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,140 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,623 >>> mbox cmd response: failed
1,098,623 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,498 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,348 >>> mbox cmd response: failed
1,098,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,365 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,016 >>> mbox cmd response: failed
1,098,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,307 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,389 >>> mbox cmd response: failed
1,098,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,194 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,770 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,763 >>> mbox cmd response: failed
1,097,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,892 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,076 >>> mbox cmd response: failed
1,098,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,115 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,862 >>> mbox cmd response: failed
1,097,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,551 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,465 >>> mbox cmd response: failed
1,097,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,120 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,723 >>> mbox cmd response: failed
1,097,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,700 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,030 UART: [kat] SHA2-512-ACC
896,931 UART: [kat] ECC-384
902,450 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,765 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 ready_for_fw is high
1,480,899 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,186 UART: [idev] Erasing UDS.KEYID = 0
1,504,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,260 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,520,785 UART: [ldev] Erasing FE.KEYID = 1
1,545,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,440 UART: [ldev] --
1,584,757 UART: [fwproc] Waiting for Commands...
1,585,452 UART: [fwproc] Received command 0x46574c44
1,586,243 UART: [fwproc] Received Image of size 115196 bytes
2,893,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,850 >>> mbox cmd response: success
3,088,970 UART: [afmc] ++
3,089,138 UART: [afmc] CDI.KEYID = 6
3,089,500 UART: [afmc] SUBJECT.KEYID = 7
3,089,925 UART: [afmc] AUTHORITY.KEYID = 5
3,124,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,428 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,821 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,511 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,208 UART: [afmc] --
3,168,150 UART: [cold-reset] --
3,168,956 UART: [state] Locking Datavault
3,170,189 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,793 UART: [state] Locking ICCM
3,171,267 UART: [exit] Launching FMC @ 0x40000130
3,176,596 UART:
3,176,612 UART: Running Caliptra FMC ...
3,177,020 UART:
3,177,074 UART: [state] CFI Enabled
3,187,867 UART: [fht] FMC Alias Private Key: 7
3,295,772 UART: [art] Extend RT PCRs Done
3,296,200 UART: [art] Lock RT PCRs Done
3,297,624 UART: [art] Populate DV Done
3,305,609 UART: [fht] FMC Alias Private Key: 7
3,306,727 UART: [art] Derive CDI
3,307,007 UART: [art] Store in in slot 0x4
3,392,574 UART: [art] Derive Key Pair
3,392,934 UART: [art] Store priv key in slot 0x5
3,405,744 UART: [art] Derive Key Pair - Done
3,420,351 UART: [art] Signing Cert with AUTHO
3,420,831 UART: RITY.KEYID = 7
3,435,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,680 UART: [art] PUB.X = 5ECE8BF982F7FEB1CA9526875E78ECD55B8A592438A9FC1F2C4E0E93E28FEC046A014ACF230376C54D2872B0F079156D
3,443,450 UART: [art] PUB.Y = 775BD3DD96BB26BEF4713422457501DFFA252939D3764F589306D5F9AD4601C834970954036A236A518514C3406252E4
3,450,371 UART: [art] SIG.R = C40BEE9727BC0F365C712826C70A720F161019DAC439BBEE04C05169216056479C543056748AE527D8B72AFF33E6C5FA
3,457,126 UART: [art] SIG.S = 6CD2202C7B3C258929F8A7BCF727A4DC8C33BEA70B936D315AB7F7440F318069369D5580430186FCF88200B5990538CE
3,481,443 UART: Caliptra RT
3,481,696 UART: [state] CFI Enabled
3,590,619 UART: [rt] RT listening for mailbox commands...
3,591,282 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,925 UART: [rt]cmd =0x46504c54, len=4
3,621,951 >>> mbox cmd response data (8 bytes)
3,622,130 UART: [rt] FIPS self test
3,622,458 UART: [kat] ++
3,622,610 UART: [kat] sha1
3,626,912 UART: [kat] SHA2-256
3,628,934 UART: [kat] SHA2-384
3,631,757 UART: [kat] SHA2-512-ACC
3,633,684 UART: [kat] ECC-384
3,643,694 UART: [kat] HMAC-384Kdf
3,648,338 UART: [kat] LMS
3,914,403 UART: Fatal Error: 0x90070002
3,915,942 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,915,947 >>> mbox cmd response: failed
3,915,947 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,915,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,104 UART: [kat] SHA2-512-ACC
897,005 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,479 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,902 UART: [idev] ++
1,480,070 UART: [idev] CDI.KEYID = 6
1,480,430 UART: [idev] SUBJECT.KEYID = 7
1,480,854 UART: [idev] UDS.KEYID = 0
1,481,199 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,036 UART: [idev] Erasing UDS.KEYID = 0
1,505,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,047 UART: [ldev] ++
1,515,215 UART: [ldev] CDI.KEYID = 6
1,515,578 UART: [ldev] SUBJECT.KEYID = 5
1,516,004 UART: [ldev] AUTHORITY.KEYID = 7
1,516,467 UART: [ldev] FE.KEYID = 1
1,521,603 UART: [ldev] Erasing FE.KEYID = 1
1,547,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,784 UART: [ldev] --
1,587,177 UART: [fwproc] Waiting for Commands...
1,587,934 UART: [fwproc] Received command 0x46574c44
1,588,725 UART: [fwproc] Received Image of size 115196 bytes
2,897,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,315 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,938 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,297 ready_for_fw is high
1,362,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,994 >>> mbox cmd response: success
3,001,166 UART:
3,001,182 UART: Running Caliptra FMC ...
3,001,590 UART:
3,001,644 UART: [state] CFI Enabled
3,012,263 UART: [fht] FMC Alias Private Key: 7
3,119,894 UART: [art] Extend RT PCRs Done
3,120,322 UART: [art] Lock RT PCRs Done
3,121,648 UART: [art] Populate DV Done
3,130,231 UART: [fht] FMC Alias Private Key: 7
3,131,403 UART: [art] Derive CDI
3,131,683 UART: [art] Store in in slot 0x4
3,217,436 UART: [art] Derive Key Pair
3,217,796 UART: [art] Store priv key in slot 0x5
3,231,214 UART: [art] Derive Key Pair - Done
3,245,754 UART: [art] Signing Cert with AUTHO
3,246,234 UART: RITY.KEYID = 7
3,261,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,139 UART: [art] PUB.X = 8AA58F91D8947089D628527C96E9CA5364074377289C18C3D924B503BCD83CD4C8AE9521F1224AA434834646905943E0
3,268,891 UART: [art] PUB.Y = FF2A35F53A300A2240A2731076B2DA4F1A0EA7F2F9189BD8B85FB304ADAFB2720BFA63D87BB28BF75401F88B17A28924
3,275,838 UART: [art] SIG.R = 4BE9D53613F574E09BD063D46F584F8929ECD5F2E211D1DF3C3BB54DF2568B9C11704D84A83AEC334BD9C8D757DC2E04
3,282,617 UART: [art] SIG.S = B8A38CA619512FFA7C145209F9D2365B13FFD19946095A3A30C799AB17441E25461001DDB57B141F0899F52B3B8DF361
3,306,270 UART: Caliptra RT
3,306,523 UART: [state] CFI Enabled
3,415,888 UART: [rt] RT listening for mailbox commands...
3,416,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,430 UART: [rt]cmd =0x46504c54, len=4
3,447,592 >>> mbox cmd response data (8 bytes)
3,447,727 UART: [rt] FIPS self test
3,448,055 UART: [kat] ++
3,448,207 UART: [kat] sha1
3,452,513 UART: [kat] SHA2-256
3,454,535 UART: [kat] SHA2-384
3,457,246 UART: [kat] SHA2-512-ACC
3,459,173 UART: [kat] ECC-384
3,469,177 UART: [kat] HMAC-384Kdf
3,473,733 UART: [kat] LMS
3,739,976 UART: Fatal Error: 0x90070002
3,741,515 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,741,520 >>> mbox cmd response: failed
3,741,520 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,741,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,055 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,935,980 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,591 UART: [kat] SHA2-512-ACC
897,492 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,766 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 ready_for_fw is high
1,481,326 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,115 UART: [idev] Erasing UDS.KEYID = 0
1,505,737 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,221 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,521,950 UART: [ldev] Erasing FE.KEYID = 1
1,547,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,981 UART: [ldev] --
1,586,278 UART: [fwproc] Waiting for Commands...
1,587,079 UART: [fwproc] Received command 0x46574c44
1,587,870 UART: [fwproc] Received Image of size 115196 bytes
2,896,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,439 >>> mbox cmd response: success
3,091,573 UART: [afmc] ++
3,091,741 UART: [afmc] CDI.KEYID = 6
3,092,103 UART: [afmc] SUBJECT.KEYID = 7
3,092,528 UART: [afmc] AUTHORITY.KEYID = 5
3,127,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,063 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,456 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,146 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,049 UART: [afmc] --
3,171,019 UART: [cold-reset] --
3,171,877 UART: [state] Locking Datavault
3,172,922 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,526 UART: [state] Locking ICCM
3,173,978 UART: [exit] Launching FMC @ 0x40000130
3,179,307 UART:
3,179,323 UART: Running Caliptra FMC ...
3,179,731 UART:
3,179,874 UART: [state] CFI Enabled
3,190,577 UART: [fht] FMC Alias Private Key: 7
3,298,728 UART: [art] Extend RT PCRs Done
3,299,156 UART: [art] Lock RT PCRs Done
3,300,744 UART: [art] Populate DV Done
3,308,989 UART: [fht] FMC Alias Private Key: 7
3,310,081 UART: [art] Derive CDI
3,310,361 UART: [art] Store in in slot 0x4
3,396,106 UART: [art] Derive Key Pair
3,396,466 UART: [art] Store priv key in slot 0x5
3,409,936 UART: [art] Derive Key Pair - Done
3,424,667 UART: [art] Signing Cert with AUTHO
3,425,147 UART: RITY.KEYID = 7
3,440,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,294 UART: [art] PUB.X = 4AD1DC574B02BEAD6E6561C81278EEF2D50932355A4B507687AAC5E8E38595CB26215E05000C69EA60776DB77FC438D1
3,448,034 UART: [art] PUB.Y = 3233B4DE5BB71399EA26B9F6DDEBACDA0F17C5AF75E0CE41004344C341A3A7A5542F9D2B3D32228A9AAC3EF34161C8EC
3,454,979 UART: [art] SIG.R = 73C473C6116216FD58F117A21AC4B543812383BC09E881770B36D1CC067FBC73940D7753E2E9DDBCDA3D0399D31DE482
3,461,736 UART: [art] SIG.S = 932AA3BAE3512C1359278AEA0AF286FA778253CB922D7D1AA9835DBBC0084B0DA2F26E4527A124E8EE876BB32DCD3FC4
3,486,090 UART: Caliptra RT
3,486,435 UART: [state] CFI Enabled
3,595,956 UART: [rt] RT listening for mailbox commands...
3,596,619 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,688 UART: [rt]cmd =0x46504c54, len=4
3,627,776 >>> mbox cmd response data (8 bytes)
3,627,997 UART: [rt] FIPS self test
3,628,325 UART: [kat] ++
3,628,477 UART: [kat] sha1
3,632,551 UART: [kat] SHA2-256
3,634,573 UART: [kat] SHA2-384
3,637,634 UART: [kat] SHA2-512-ACC
3,639,561 UART: [kat] ECC-384
3,649,401 UART: [kat] HMAC-384Kdf
3,653,947 UART: [kat] LMS
3,920,208 UART: Fatal Error: 0x90070002
3,921,747 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,921,752 >>> mbox cmd response: failed
3,921,752 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,921,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,769 UART: [idev] ++
1,479,937 UART: [idev] CDI.KEYID = 6
1,480,297 UART: [idev] SUBJECT.KEYID = 7
1,480,721 UART: [idev] UDS.KEYID = 0
1,481,066 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,545 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,139 UART: [idev] --
1,515,014 UART: [ldev] ++
1,515,182 UART: [ldev] CDI.KEYID = 6
1,515,545 UART: [ldev] SUBJECT.KEYID = 5
1,515,971 UART: [ldev] AUTHORITY.KEYID = 7
1,516,434 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,547,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,985 UART: [ldev] --
1,586,374 UART: [fwproc] Waiting for Commands...
1,587,213 UART: [fwproc] Received command 0x46574c44
1,588,004 UART: [fwproc] Received Image of size 115196 bytes
2,895,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,600 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,952 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,209 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,732 ready_for_fw is high
1,362,732 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,697 >>> mbox cmd response: success
3,003,591 UART:
3,003,607 UART: Running Caliptra FMC ...
3,004,015 UART:
3,004,158 UART: [state] CFI Enabled
3,015,003 UART: [fht] FMC Alias Private Key: 7
3,122,496 UART: [art] Extend RT PCRs Done
3,122,924 UART: [art] Lock RT PCRs Done
3,124,596 UART: [art] Populate DV Done
3,133,031 UART: [fht] FMC Alias Private Key: 7
3,134,183 UART: [art] Derive CDI
3,134,463 UART: [art] Store in in slot 0x4
3,220,100 UART: [art] Derive Key Pair
3,220,460 UART: [art] Store priv key in slot 0x5
3,233,008 UART: [art] Derive Key Pair - Done
3,247,713 UART: [art] Signing Cert with AUTHO
3,248,193 UART: RITY.KEYID = 7
3,263,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,488 UART: [art] PUB.X = 59CD8547A12BA504769DD60244B926B2EC57538BFB6B2982C3395E83345B17D82022A7DDD03B4BAE008AB71FF4B16AA5
3,271,236 UART: [art] PUB.Y = 1FA6D6EACE2155C75123B4B671DF7BE0E2A414FE7313788FFB3DA51C44A308AB81AEB4E75ED27B7C93FB6FED05D9AB21
3,278,204 UART: [art] SIG.R = 282418F22A967000C80D5AAAE3CB525289728A7999FAC730EF44A805FA911DEDD35341CB17D678ECD2362A0B307D1AEC
3,284,951 UART: [art] SIG.S = 3626E7F1ADBEAFF356A341FB362FF30A0A9786C7F2CFC1D661203254DC777D68EB5AC14EBAF278E8D584D0B4725F9D60
3,309,018 UART: Caliptra RT
3,309,363 UART: [state] CFI Enabled
3,418,451 UART: [rt] RT listening for mailbox commands...
3,419,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,159 UART: [rt]cmd =0x46504c54, len=4
3,450,309 >>> mbox cmd response data (8 bytes)
3,450,542 UART: [rt] FIPS self test
3,450,870 UART: [kat] ++
3,451,022 UART: [kat] sha1
3,455,466 UART: [kat] SHA2-256
3,457,488 UART: [kat] SHA2-384
3,460,383 UART: [kat] SHA2-512-ACC
3,462,310 UART: [kat] ECC-384
3,472,586 UART: [kat] HMAC-384Kdf
3,477,216 UART: [kat] LMS
3,743,457 UART: Fatal Error: 0x90070002
3,744,996 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,745,001 >>> mbox cmd response: failed
3,745,001 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,745,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,579 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
893,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,293 UART: [kat] ++
897,445 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,630 UART: [kat] LMS
1,170,958 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 ready_for_fw is high
1,176,225 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,201,255 UART: [idev] Sha1 KeyId Algorithm
1,209,721 UART: [idev] --
1,210,931 UART: [ldev] ++
1,211,099 UART: [ldev] CDI.KEYID = 6
1,211,462 UART: [ldev] SUBJECT.KEYID = 5
1,211,888 UART: [ldev] AUTHORITY.KEYID = 7
1,212,351 UART: [ldev] FE.KEYID = 1
1,217,657 UART: [ldev] Erasing FE.KEYID = 1
1,244,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,073 UART: [ldev] --
1,283,574 UART: [fwproc] Wait for Commands...
1,284,220 UART: [fwproc] Recv command 0x46574c44
1,284,948 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,184 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,411 >>> mbox cmd response: success
2,787,517 UART: [afmc] ++
2,787,685 UART: [afmc] CDI.KEYID = 6
2,788,047 UART: [afmc] SUBJECT.KEYID = 7
2,788,472 UART: [afmc] AUTHORITY.KEYID = 5
2,823,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,322 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,354 UART: [afmc] --
2,867,468 UART: [cold-reset] --
2,868,352 UART: [state] Locking Datavault
2,869,389 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,993 UART: [state] Locking ICCM
2,870,483 UART: [exit] Launching FMC @ 0x40000130
2,875,812 UART:
2,875,828 UART: Running Caliptra FMC ...
2,876,236 UART:
2,876,290 UART: [state] CFI Enabled
2,887,063 UART: [fht] FMC Alias Private Key: 7
2,994,990 UART: [art] Extend RT PCRs Done
2,995,418 UART: [art] Lock RT PCRs Done
2,996,910 UART: [art] Populate DV Done
3,005,437 UART: [fht] FMC Alias Private Key: 7
3,006,389 UART: [art] Derive CDI
3,006,669 UART: [art] Store in in slot 0x4
3,092,110 UART: [art] Derive Key Pair
3,092,470 UART: [art] Store priv key in slot 0x5
3,105,502 UART: [art] Derive Key Pair - Done
3,120,403 UART: [art] Signing Cert with AUTHO
3,120,883 UART: RITY.KEYID = 7
3,135,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,670 UART: [art] PUB.X = DAD310F1423924F6DF6FA1C46DED5E34D9A0AC82EC60A5DDC97E5CB0B06DF4A52956180BF2D866B9BB824CD4004232E1
3,143,433 UART: [art] PUB.Y = E1C41E5C29E18287F2B3E5DAA82FD5D7226129F95A4E88FB41572649DBD529FDF55881AACE2BC561A6BF2E5ABEADD53F
3,150,405 UART: [art] SIG.R = 712BA0F708DB32A524912BD8B30D96FF69B0F585BCC973EF02B3C4FB234333002885CA851BB98F008B5F8F816DCBAD0F
3,157,131 UART: [art] SIG.S = 9AC5CE6EA22F5DBFE6206B05A6C31DB37DDA73CD89C47DB464EE7AFD7AAE95568DECC02976887245D03254ABAB5A10B4
3,180,449 UART: Caliptra RT
3,180,702 UART: [state] CFI Enabled
3,288,477 UART: [rt] RT listening for mailbox commands...
3,289,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,995 UART: [rt]cmd =0x46504c54, len=4
3,320,211 >>> mbox cmd response data (8 bytes)
3,320,354 UART: [rt] FIPS self test
3,320,682 UART: [kat] ++
3,320,834 UART: [kat] sha1
3,325,104 UART: [kat] SHA2-256
3,327,126 UART: [kat] SHA2-384
3,329,989 UART: [kat] SHA2-512-ACC
3,331,916 UART: [kat] ECC-384
3,341,588 UART: [kat] HMAC-384Kdf
3,346,242 UART: [kat] LMS
3,612,275 UART: Fatal Error: 0x90070002
3,613,814 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,613,819 >>> mbox cmd response: failed
3,613,819 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,613,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
893,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,225 UART: [kat] ++
897,377 UART: [kat] sha1
901,537 UART: [kat] SHA2-256
903,477 UART: [kat] SHA2-384
906,204 UART: [kat] SHA2-512-ACC
908,105 UART: [kat] ECC-384
917,892 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,301 UART: [fht] FHT @ 0x50003400
1,174,906 UART: [idev] ++
1,175,074 UART: [idev] CDI.KEYID = 6
1,175,434 UART: [idev] SUBJECT.KEYID = 7
1,175,858 UART: [idev] UDS.KEYID = 0
1,176,203 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,143 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,217,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,802 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,804 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,011 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 ready_for_fw is high
1,060,371 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,394 >>> mbox cmd response: success
2,697,148 UART:
2,697,164 UART: Running Caliptra FMC ...
2,697,572 UART:
2,697,626 UART: [state] CFI Enabled
2,708,155 UART: [fht] FMC Alias Private Key: 7
2,816,124 UART: [art] Extend RT PCRs Done
2,816,552 UART: [art] Lock RT PCRs Done
2,818,090 UART: [art] Populate DV Done
2,826,267 UART: [fht] FMC Alias Private Key: 7
2,827,269 UART: [art] Derive CDI
2,827,549 UART: [art] Store in in slot 0x4
2,913,332 UART: [art] Derive Key Pair
2,913,692 UART: [art] Store priv key in slot 0x5
2,927,130 UART: [art] Derive Key Pair - Done
2,941,933 UART: [art] Signing Cert with AUTHO
2,942,413 UART: RITY.KEYID = 7
2,957,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,440 UART: [art] PUB.X = 67972754DBEB8A4D41831B37C3434C3B32D716160FB07D4C994F9DB52FD1515EBBC318EF1CAA4DEEFF1AAFDFEA91D7D5
2,965,231 UART: [art] PUB.Y = 2ADC79AB0F8F73A42652946BAC6DF3673141915904D5C25AD0712903BE286D513C9536FB924F2F76A1E4E18239B18964
2,972,168 UART: [art] SIG.R = F0F484003DBAA72979FE2C9EA7D652CFA70757C976DB380498A04FF4B949510B6B8F79A130F03A331AF4C3B8E6FDC12C
2,978,919 UART: [art] SIG.S = 845B747BFC40A2030A49D5D4A3513D503C984B822700BCF6024EE21E303CAE753F9F696F7BE5BFC16FF5CF66E8BFEF59
3,003,011 UART: Caliptra RT
3,003,264 UART: [state] CFI Enabled
3,110,614 UART: [rt] RT listening for mailbox commands...
3,111,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,012 UART: [rt]cmd =0x46504c54, len=4
3,142,258 >>> mbox cmd response data (8 bytes)
3,142,443 UART: [rt] FIPS self test
3,142,771 UART: [kat] ++
3,142,923 UART: [kat] sha1
3,147,137 UART: [kat] SHA2-256
3,149,159 UART: [kat] SHA2-384
3,152,032 UART: [kat] SHA2-512-ACC
3,153,959 UART: [kat] ECC-384
3,163,753 UART: [kat] HMAC-384Kdf
3,168,373 UART: [kat] LMS
3,434,476 UART: Fatal Error: 0x90070002
3,436,015 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,436,020 >>> mbox cmd response: failed
3,436,020 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,436,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,942 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,132 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [kat] SHA2-256
894,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,180 UART: [kat] ++
898,332 UART: [kat] sha1
902,636 UART: [kat] SHA2-256
904,576 UART: [kat] SHA2-384
907,233 UART: [kat] SHA2-512-ACC
909,134 UART: [kat] ECC-384
919,161 UART: [kat] HMAC-384Kdf
923,695 UART: [kat] LMS
1,172,023 UART: [kat] --
1,172,946 UART: [cold-reset] ++
1,173,382 UART: [fht] FHT @ 0x50003400
1,175,919 UART: [idev] ++
1,176,087 UART: [idev] CDI.KEYID = 6
1,176,447 UART: [idev] SUBJECT.KEYID = 7
1,176,871 UART: [idev] UDS.KEYID = 0
1,177,216 ready_for_fw is high
1,177,216 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,907 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,210,898 UART: [idev] --
1,212,048 UART: [ldev] ++
1,212,216 UART: [ldev] CDI.KEYID = 6
1,212,579 UART: [ldev] SUBJECT.KEYID = 5
1,213,005 UART: [ldev] AUTHORITY.KEYID = 7
1,213,468 UART: [ldev] FE.KEYID = 1
1,218,966 UART: [ldev] Erasing FE.KEYID = 1
1,245,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,400 UART: [ldev] --
1,284,813 UART: [fwproc] Wait for Commands...
1,285,503 UART: [fwproc] Recv command 0x46574c44
1,286,231 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,199 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,410 >>> mbox cmd response: success
2,789,562 UART: [afmc] ++
2,789,730 UART: [afmc] CDI.KEYID = 6
2,790,092 UART: [afmc] SUBJECT.KEYID = 7
2,790,517 UART: [afmc] AUTHORITY.KEYID = 5
2,825,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,021 UART: [afmc] --
2,868,943 UART: [cold-reset] --
2,869,725 UART: [state] Locking Datavault
2,870,934 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,538 UART: [state] Locking ICCM
2,872,060 UART: [exit] Launching FMC @ 0x40000130
2,877,389 UART:
2,877,405 UART: Running Caliptra FMC ...
2,877,813 UART:
2,877,956 UART: [state] CFI Enabled
2,888,575 UART: [fht] FMC Alias Private Key: 7
2,996,468 UART: [art] Extend RT PCRs Done
2,996,896 UART: [art] Lock RT PCRs Done
2,998,346 UART: [art] Populate DV Done
3,006,541 UART: [fht] FMC Alias Private Key: 7
3,007,585 UART: [art] Derive CDI
3,007,865 UART: [art] Store in in slot 0x4
3,093,496 UART: [art] Derive Key Pair
3,093,856 UART: [art] Store priv key in slot 0x5
3,107,608 UART: [art] Derive Key Pair - Done
3,122,467 UART: [art] Signing Cert with AUTHO
3,122,947 UART: RITY.KEYID = 7
3,138,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,864 UART: [art] PUB.X = C8EF8E56EC8E776F123D68C78E1530A8426C4B6EDB6B46F8F3963F8E5576F2E87C3F3D399831212D4EAA85625E0BE953
3,145,637 UART: [art] PUB.Y = 7DC620DD14C796409F9026C69495AF8351281B20CFBC955060BD1A6A0961427C21E2CCFD6E0699F2CD9DBF7D45B1AAB8
3,152,591 UART: [art] SIG.R = 15E9314BA65973FF5D9B4F139AEEBF7A43C3F6D44BB4BF665F6CEBB2C1E57C76A76011B5038F07936BC7D805C8AA36A7
3,159,368 UART: [art] SIG.S = C218260D7430536539E2694855568709CE11DC95BA916D6E8326B27C3F3A69878B513A6CA92C1817C9C3B0271F98B47C
3,183,069 UART: Caliptra RT
3,183,414 UART: [state] CFI Enabled
3,291,603 UART: [rt] RT listening for mailbox commands...
3,292,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,949 UART: [rt]cmd =0x46504c54, len=4
3,323,041 >>> mbox cmd response data (8 bytes)
3,323,272 UART: [rt] FIPS self test
3,323,600 UART: [kat] ++
3,323,752 UART: [kat] sha1
3,327,780 UART: [kat] SHA2-256
3,329,802 UART: [kat] SHA2-384
3,332,549 UART: [kat] SHA2-512-ACC
3,334,476 UART: [kat] ECC-384
3,344,558 UART: [kat] HMAC-384Kdf
3,349,096 UART: [kat] LMS
3,615,127 UART: Fatal Error: 0x90070002
3,616,666 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,616,671 >>> mbox cmd response: failed
3,616,671 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,616,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
894,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,174 UART: [kat] ++
898,326 UART: [kat] sha1
902,710 UART: [kat] SHA2-256
904,650 UART: [kat] SHA2-384
907,517 UART: [kat] SHA2-512-ACC
909,418 UART: [kat] ECC-384
919,311 UART: [kat] HMAC-384Kdf
923,887 UART: [kat] LMS
1,172,215 UART: [kat] --
1,173,254 UART: [cold-reset] ++
1,173,722 UART: [fht] FHT @ 0x50003400
1,176,381 UART: [idev] ++
1,176,549 UART: [idev] CDI.KEYID = 6
1,176,909 UART: [idev] SUBJECT.KEYID = 7
1,177,333 UART: [idev] UDS.KEYID = 0
1,177,678 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,599 UART: [idev] Erasing UDS.KEYID = 0
1,202,766 UART: [idev] Sha1 KeyId Algorithm
1,211,328 UART: [idev] --
1,212,370 UART: [ldev] ++
1,212,538 UART: [ldev] CDI.KEYID = 6
1,212,901 UART: [ldev] SUBJECT.KEYID = 5
1,213,327 UART: [ldev] AUTHORITY.KEYID = 7
1,213,790 UART: [ldev] FE.KEYID = 1
1,218,930 UART: [ldev] Erasing FE.KEYID = 1
1,244,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,436 UART: [ldev] --
1,283,805 UART: [fwproc] Wait for Commands...
1,284,501 UART: [fwproc] Recv command 0x46574c44
1,285,229 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,767 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,830 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,220 ready_for_fw is high
1,061,220 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,479 >>> mbox cmd response: success
2,700,611 UART:
2,700,627 UART: Running Caliptra FMC ...
2,701,035 UART:
2,701,178 UART: [state] CFI Enabled
2,711,985 UART: [fht] FMC Alias Private Key: 7
2,819,792 UART: [art] Extend RT PCRs Done
2,820,220 UART: [art] Lock RT PCRs Done
2,821,784 UART: [art] Populate DV Done
2,830,037 UART: [fht] FMC Alias Private Key: 7
2,830,985 UART: [art] Derive CDI
2,831,265 UART: [art] Store in in slot 0x4
2,916,988 UART: [art] Derive Key Pair
2,917,348 UART: [art] Store priv key in slot 0x5
2,929,766 UART: [art] Derive Key Pair - Done
2,944,953 UART: [art] Signing Cert with AUTHO
2,945,433 UART: RITY.KEYID = 7
2,960,881 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,646 UART: [art] PUB.X = 1072D1B7F4D7547DB29B4FE5973DF5638FA053F3B0D367D40AD81C2D444FF499AEAB203499E29CA5DDE4998DDB544B68
2,968,425 UART: [art] PUB.Y = 39190F72A7568162DB8B5C5E4B31CF6A21477B13AAB9977B93AB46B5D73B8C67C922D5E16AC2A1A860F085E66EF68FFE
2,975,382 UART: [art] SIG.R = AE4AAFA884D37D0894BF915E7A03FE63CD7CE4E03C2699B2A7DB22AD91ED8A34820E8D036DDBDF81A1AC3EDE470833DF
2,982,163 UART: [art] SIG.S = 66FADFB9ADA3A99D9FE383C11CE56EEB10FBB0287DBA6118CD652F08048CAE34AC4584FD198BA791C4B73514F8E585AD
3,006,244 UART: Caliptra RT
3,006,589 UART: [state] CFI Enabled
3,113,354 UART: [rt] RT listening for mailbox commands...
3,114,017 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,842 UART: [rt]cmd =0x46504c54, len=4
3,145,178 >>> mbox cmd response data (8 bytes)
3,145,309 UART: [rt] FIPS self test
3,145,637 UART: [kat] ++
3,145,789 UART: [kat] sha1
3,150,019 UART: [kat] SHA2-256
3,152,041 UART: [kat] SHA2-384
3,154,938 UART: [kat] SHA2-512-ACC
3,156,865 UART: [kat] ECC-384
3,166,729 UART: [kat] HMAC-384Kdf
3,171,465 UART: [kat] LMS
3,437,718 UART: Fatal Error: 0x90070002
3,439,257 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,439,262 >>> mbox cmd response: failed
3,439,262 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,439,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,911 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
85,881 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
890,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,833 UART: [kat] ++
894,985 UART: [kat] sha1
899,263 UART: [kat] SHA2-256
901,203 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,684 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,841 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 ready_for_fw is high
1,173,999 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,808 UART: [ldev] ++
1,208,976 UART: [ldev] CDI.KEYID = 6
1,209,340 UART: [ldev] SUBJECT.KEYID = 5
1,209,767 UART: [ldev] AUTHORITY.KEYID = 7
1,210,230 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,242,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,323 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,479 >>> mbox cmd response: success
2,784,546 UART: [afmc] ++
2,784,714 UART: [afmc] CDI.KEYID = 6
2,785,077 UART: [afmc] SUBJECT.KEYID = 7
2,785,503 UART: [afmc] AUTHORITY.KEYID = 5
2,820,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,785 UART: [afmc] --
2,863,793 UART: [cold-reset] --
2,864,777 UART: [state] Locking Datavault
2,866,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,660 UART: [state] Locking ICCM
2,867,256 UART: [exit] Launching FMC @ 0x40000130
2,872,585 UART:
2,872,601 UART: Running Caliptra FMC ...
2,873,009 UART:
2,873,063 UART: [state] CFI Enabled
2,883,290 UART: [fht] FMC Alias Private Key: 7
2,991,265 UART: [art] Extend RT PCRs Done
2,991,693 UART: [art] Lock RT PCRs Done
2,993,141 UART: [art] Populate DV Done
3,001,304 UART: [fht] FMC Alias Private Key: 7
3,002,332 UART: [art] Derive CDI
3,002,612 UART: [art] Store in in slot 0x4
3,088,081 UART: [art] Derive Key Pair
3,088,441 UART: [art] Store priv key in slot 0x5
3,101,419 UART: [art] Derive Key Pair - Done
3,116,008 UART: [art] Signing Cert with AUTHO
3,116,488 UART: RITY.KEYID = 7
3,131,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,629 UART: [art] PUB.X = 382BF2C623FAC212FCD1476AEE2CB0FD99563BC00FFDDC6997F907EDD322ECF75ECE00378905C969E4B0B75A6CB19C4F
3,139,390 UART: [art] PUB.Y = B59CA64486711A857EAF99AF495FB50DEC31168919FADF1A21317A1713E386220CCC614137F445ADF4A48FB6DFEB995F
3,146,344 UART: [art] SIG.R = 1CC3AE8AC453EC3B758BC9E8CC65CBF90272E817F15C15F2B7B0BAD2C185531628770625950DF6312911E0DD60A327C5
3,153,111 UART: [art] SIG.S = 3ADC53656BB03480A1F3F96F1D1C1431D759C0EF8F540D0A69A56ED987B7617DE6E068D5E826CF9A6F505BE0FC16DCEC
3,177,426 UART: Caliptra RT
3,177,679 UART: [state] CFI Enabled
3,285,464 UART: [rt] RT listening for mailbox commands...
3,286,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,914 UART: [rt]cmd =0x46504c54, len=4
3,317,130 >>> mbox cmd response data (8 bytes)
3,317,307 UART: [rt] FIPS self test
3,317,635 UART: [kat] ++
3,317,787 UART: [kat] sha1
3,322,017 UART: [kat] SHA2-256
3,324,039 UART: [kat] SHA2-384
3,326,876 UART: [kat] SHA2-512-ACC
3,328,803 UART: [kat] ECC-384
3,338,857 UART: [kat] HMAC-384Kdf
3,343,479 UART: [kat] LMS
3,609,728 UART: Fatal Error: 0x90070002
3,611,267 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,272 >>> mbox cmd response: failed
3,611,272 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,551 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,658 UART: [ldev] Erasing FE.KEYID = 1
1,240,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,170 UART: [ldev] --
1,279,646 UART: [fwproc] Wait for Commands...
1,280,269 UART: [fwproc] Recv command 0x46574c44
1,281,002 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,723 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,881 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 ready_for_fw is high
1,055,610 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,306 >>> mbox cmd response: success
2,695,916 UART:
2,695,932 UART: Running Caliptra FMC ...
2,696,340 UART:
2,696,394 UART: [state] CFI Enabled
2,707,025 UART: [fht] FMC Alias Private Key: 7
2,815,340 UART: [art] Extend RT PCRs Done
2,815,768 UART: [art] Lock RT PCRs Done
2,817,156 UART: [art] Populate DV Done
2,825,393 UART: [fht] FMC Alias Private Key: 7
2,826,341 UART: [art] Derive CDI
2,826,621 UART: [art] Store in in slot 0x4
2,912,250 UART: [art] Derive Key Pair
2,912,610 UART: [art] Store priv key in slot 0x5
2,925,812 UART: [art] Derive Key Pair - Done
2,940,706 UART: [art] Signing Cert with AUTHO
2,941,186 UART: RITY.KEYID = 7
2,955,844 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,609 UART: [art] PUB.X = 8E29DFE49A2C340C99BD01E944A37F62BA72F11E7529402BB40FD5D62FF8056F27262FC2FFE41639E526D2E543840E03
2,963,365 UART: [art] PUB.Y = 2C345DDFF0FE31FF77E7F0F5D8DAFF3506FFA401B65C5374729BA0B3B6875B0E0C37D06387CD06FE8C42450FF5729345
2,970,309 UART: [art] SIG.R = D50E4295141FAF679F429AE9CE444CBEC348D0FBD8C6469CA897DF06BD60DA746F28307CC935398E8BC135014ED39587
2,977,078 UART: [art] SIG.S = 251DF60ED0BEF77CE5508C3A9286AA6A040F55F9263D684FA4A6E82B15357B187644BD2B95E9217FCB22008B34B5F3BC
3,000,934 UART: Caliptra RT
3,001,187 UART: [state] CFI Enabled
3,109,982 UART: [rt] RT listening for mailbox commands...
3,110,645 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,512 UART: [rt]cmd =0x46504c54, len=4
3,141,832 >>> mbox cmd response data (8 bytes)
3,142,091 UART: [rt] FIPS self test
3,142,419 UART: [kat] ++
3,142,571 UART: [kat] sha1
3,146,705 UART: [kat] SHA2-256
3,148,727 UART: [kat] SHA2-384
3,151,640 UART: [kat] SHA2-512-ACC
3,153,567 UART: [kat] ECC-384
3,163,937 UART: [kat] HMAC-384Kdf
3,168,443 UART: [kat] LMS
3,434,694 UART: Fatal Error: 0x90070002
3,436,233 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,436,238 >>> mbox cmd response: failed
3,436,238 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,436,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,378 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,358 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,175,114 ready_for_fw is high
1,175,114 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,286 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,095 UART: [ldev] ++
1,210,263 UART: [ldev] CDI.KEYID = 6
1,210,627 UART: [ldev] SUBJECT.KEYID = 5
1,211,054 UART: [ldev] AUTHORITY.KEYID = 7
1,211,517 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,531 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46574c44
1,283,939 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,284 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,360 >>> mbox cmd response: success
2,786,383 UART: [afmc] ++
2,786,551 UART: [afmc] CDI.KEYID = 6
2,786,914 UART: [afmc] SUBJECT.KEYID = 7
2,787,340 UART: [afmc] AUTHORITY.KEYID = 5
2,823,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,086 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,412 UART: [afmc] --
2,866,428 UART: [cold-reset] --
2,867,356 UART: [state] Locking Datavault
2,868,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,069 UART: [state] Locking ICCM
2,869,679 UART: [exit] Launching FMC @ 0x40000130
2,875,008 UART:
2,875,024 UART: Running Caliptra FMC ...
2,875,432 UART:
2,875,575 UART: [state] CFI Enabled
2,886,302 UART: [fht] FMC Alias Private Key: 7
2,994,827 UART: [art] Extend RT PCRs Done
2,995,255 UART: [art] Lock RT PCRs Done
2,996,749 UART: [art] Populate DV Done
3,004,930 UART: [fht] FMC Alias Private Key: 7
3,005,962 UART: [art] Derive CDI
3,006,242 UART: [art] Store in in slot 0x4
3,091,895 UART: [art] Derive Key Pair
3,092,255 UART: [art] Store priv key in slot 0x5
3,105,137 UART: [art] Derive Key Pair - Done
3,119,884 UART: [art] Signing Cert with AUTHO
3,120,364 UART: RITY.KEYID = 7
3,135,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,249 UART: [art] PUB.X = 2C3CAF52F7EBECED99C9C5797BBE30744BC1783AC7D61C78152EACBB7BDBCC32D5BC3FCD275B6DD0DC138DE237217114
3,143,047 UART: [art] PUB.Y = A52F6BB5B1AE904B47897DABD6D52A56FAD67EEFC73212EEED3E0D5174986C221B7C6C7913A0A0740C40818B3E1E9DA7
3,150,007 UART: [art] SIG.R = 53C84896F98344698A3DBD2C372756C86E9FE66E86B1CBA059D9E139AB29428D58445CC6E4DE0CE26313889F3865BAD4
3,156,776 UART: [art] SIG.S = C1DEDDAAEDA7CE428D08890398D8E5D379AC29DF3E84E4B09E5AD9F2691BAFA7D24E40ADE0CBDD7992524EBEB8470DF9
3,180,478 UART: Caliptra RT
3,180,823 UART: [state] CFI Enabled
3,289,908 UART: [rt] RT listening for mailbox commands...
3,290,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,630 UART: [rt]cmd =0x46504c54, len=4
3,321,712 >>> mbox cmd response data (8 bytes)
3,321,881 UART: [rt] FIPS self test
3,322,209 UART: [kat] ++
3,322,361 UART: [kat] sha1
3,326,531 UART: [kat] SHA2-256
3,328,553 UART: [kat] SHA2-384
3,331,388 UART: [kat] SHA2-512-ACC
3,333,315 UART: [kat] ECC-384
3,343,591 UART: [kat] HMAC-384Kdf
3,348,181 UART: [kat] LMS
3,614,358 UART: Fatal Error: 0x90070002
3,615,897 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,615,902 >>> mbox cmd response: failed
3,615,902 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,615,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,512 UART: [idev] ++
1,173,680 UART: [idev] CDI.KEYID = 6
1,174,041 UART: [idev] SUBJECT.KEYID = 7
1,174,466 UART: [idev] UDS.KEYID = 0
1,174,812 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,386 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,822 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,898 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,225 ready_for_fw is high
1,056,225 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,792 >>> mbox cmd response: success
2,697,204 UART:
2,697,220 UART: Running Caliptra FMC ...
2,697,628 UART:
2,697,771 UART: [state] CFI Enabled
2,708,324 UART: [fht] FMC Alias Private Key: 7
2,815,977 UART: [art] Extend RT PCRs Done
2,816,405 UART: [art] Lock RT PCRs Done
2,817,695 UART: [art] Populate DV Done
2,825,870 UART: [fht] FMC Alias Private Key: 7
2,826,840 UART: [art] Derive CDI
2,827,120 UART: [art] Store in in slot 0x4
2,912,539 UART: [art] Derive Key Pair
2,912,899 UART: [art] Store priv key in slot 0x5
2,926,491 UART: [art] Derive Key Pair - Done
2,941,184 UART: [art] Signing Cert with AUTHO
2,941,664 UART: RITY.KEYID = 7
2,957,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,813 UART: [art] PUB.X = 7A82A4C0A72877F5AD1514ABF1BE2FB053940DE7A29662FEB663206DBAEFF34544749D03A3829E781DA1768FA5B450E7
2,964,585 UART: [art] PUB.Y = 00EBDF32640C8D3A511BAD97B41E19E714CF1111A4C5DA1CFA2341EA98617D6BDD27A4AB7F8AA60E01E83D7CC58059CF
2,971,524 UART: [art] SIG.R = 9D16A6CEB50486D97FA9088383E73F94999261EAE30377BB8394D548F78E11D04C4A03164062D3D43649235E5D9731D8
2,978,272 UART: [art] SIG.S = C33570789C1A3E6814CCD89A17EAA2E5CF661EF44B5178FBCE6A9621D43A032AB25ECA57F9E67FA2A74B252F2E4EC438
3,002,222 UART: Caliptra RT
3,002,567 UART: [state] CFI Enabled
3,110,433 UART: [rt] RT listening for mailbox commands...
3,111,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,919 UART: [rt]cmd =0x46504c54, len=4
3,142,095 >>> mbox cmd response data (8 bytes)
3,142,216 UART: [rt] FIPS self test
3,142,544 UART: [kat] ++
3,142,696 UART: [kat] sha1
3,146,926 UART: [kat] SHA2-256
3,148,948 UART: [kat] SHA2-384
3,151,609 UART: [kat] SHA2-512-ACC
3,153,536 UART: [kat] ECC-384
3,163,540 UART: [kat] HMAC-384Kdf
3,168,294 UART: [kat] LMS
3,434,361 UART: Fatal Error: 0x90070002
3,435,900 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,435,905 >>> mbox cmd response: failed
3,435,905 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,435,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,439 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,544 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,310 >>> mbox cmd response: failed
804,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,865 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,710 >>> mbox cmd response: failed
803,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,629 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,029 >>> mbox cmd response: failed
804,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,830 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,901 >>> mbox cmd response: failed
804,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,198 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,482 >>> mbox cmd response: failed
803,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,565 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,198 >>> mbox cmd response: failed
803,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,667 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,799 >>> mbox cmd response: failed
803,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,654 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,925 >>> mbox cmd response: failed
803,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,162 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,478 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,542 >>> mbox cmd response: failed
803,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,905 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,668 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,676 >>> mbox cmd response: failed
803,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,785 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,827 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,939 >>> mbox cmd response: failed
803,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,938 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,279 >>> mbox cmd response: failed
804,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,858 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,626 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,514 UART: [kat] SHA2-512-ACC
897,415 UART: [kat] ECC-384
903,118 UART: [kat] HMAC-384Kdf
907,640 UART: [kat] LMS
1,475,836 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,477,125 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 ready_for_fw is high
1,481,091 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,586 UART: [idev] Erasing UDS.KEYID = 0
1,505,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,996 UART: [idev] --
1,515,029 UART: [ldev] ++
1,515,197 UART: [ldev] CDI.KEYID = 6
1,515,560 UART: [ldev] SUBJECT.KEYID = 5
1,515,986 UART: [ldev] AUTHORITY.KEYID = 7
1,516,449 UART: [ldev] FE.KEYID = 1
1,521,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,376 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,530 UART: [fwproc] Received command 0x46574c44
1,587,321 UART: [fwproc] Received Image of size 115196 bytes
2,895,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,202 >>> mbox cmd response: success
3,090,388 UART: [afmc] ++
3,090,556 UART: [afmc] CDI.KEYID = 6
3,090,918 UART: [afmc] SUBJECT.KEYID = 7
3,091,343 UART: [afmc] AUTHORITY.KEYID = 5
3,126,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,918 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,698 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,311 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,001 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,796 UART: [afmc] --
3,169,810 UART: [cold-reset] --
3,170,728 UART: [state] Locking Datavault
3,171,683 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,287 UART: [state] Locking ICCM
3,172,725 UART: [exit] Launching FMC @ 0x40000130
3,178,054 UART:
3,178,070 UART: Running Caliptra FMC ...
3,178,478 UART:
3,178,532 UART: [state] CFI Enabled
3,188,931 UART: [fht] FMC Alias Private Key: 7
3,296,920 UART: [art] Extend RT PCRs Done
3,297,348 UART: [art] Lock RT PCRs Done
3,298,876 UART: [art] Populate DV Done
3,307,261 UART: [fht] FMC Alias Private Key: 7
3,308,259 UART: [art] Derive CDI
3,308,539 UART: [art] Store in in slot 0x4
3,394,418 UART: [art] Derive Key Pair
3,394,778 UART: [art] Store priv key in slot 0x5
3,408,390 UART: [art] Derive Key Pair - Done
3,423,089 UART: [art] Signing Cert with AUTHO
3,423,569 UART: RITY.KEYID = 7
3,438,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,176 UART: [art] PUB.X = 0209EBF0838E5A2A3B0457083F8E228B361ABD9857E807F17CDE7DE22BC9545355F0CDCB4EDC9375EC1586151D678E48
3,445,937 UART: [art] PUB.Y = 5A641E1EEF1331F02C8BC923702A87B4AC5A20095ED22392599306A6D9C6D60B47A5D77BA6C6954275ED1718F4C31BC9
3,452,880 UART: [art] SIG.R = 13647F2A5CE2D00E0C878829C91095D179F112841517F2C9974C4CA72CE56E3EC83CA6771112200F0267EAE1D8F545EE
3,459,636 UART: [art] SIG.S = 98BF3A21D6A3B9EE911893702F6841418841DA58BC8CF52B79F8CA4944DE109CF2A562ABC7E7733637E344E75E7A0732
3,482,768 UART: Caliptra RT
3,483,021 UART: [state] CFI Enabled
3,591,592 UART: [rt] RT listening for mailbox commands...
3,592,255 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,082 UART: [rt]cmd =0x46504c54, len=4
3,623,356 >>> mbox cmd response data (8 bytes)
3,623,533 UART: [rt] FIPS self test
3,623,861 UART: [kat] ++
3,624,013 UART: [kat] sha1
3,624,661 UART: Fatal Error: 0x90060001
3,626,200 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,626,205 >>> mbox cmd response: failed
3,626,205 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,626,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,060 UART: [kat] LMS
1,475,256 UART: [kat] --
1,476,199 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,830 UART: [idev] Erasing UDS.KEYID = 0
1,505,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,984 UART: [idev] --
1,515,073 UART: [ldev] ++
1,515,241 UART: [ldev] CDI.KEYID = 6
1,515,604 UART: [ldev] SUBJECT.KEYID = 5
1,516,030 UART: [ldev] AUTHORITY.KEYID = 7
1,516,493 UART: [ldev] FE.KEYID = 1
1,521,875 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,676 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,688 UART: [fwproc] Received command 0x46574c44
1,587,479 UART: [fwproc] Received Image of size 115196 bytes
2,896,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,208 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 ready_for_fw is high
1,362,657 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,514 >>> mbox cmd response: success
3,000,058 UART:
3,000,074 UART: Running Caliptra FMC ...
3,000,482 UART:
3,000,536 UART: [state] CFI Enabled
3,011,069 UART: [fht] FMC Alias Private Key: 7
3,118,908 UART: [art] Extend RT PCRs Done
3,119,336 UART: [art] Lock RT PCRs Done
3,121,082 UART: [art] Populate DV Done
3,129,181 UART: [fht] FMC Alias Private Key: 7
3,130,205 UART: [art] Derive CDI
3,130,485 UART: [art] Store in in slot 0x4
3,216,508 UART: [art] Derive Key Pair
3,216,868 UART: [art] Store priv key in slot 0x5
3,229,850 UART: [art] Derive Key Pair - Done
3,244,647 UART: [art] Signing Cert with AUTHO
3,245,127 UART: RITY.KEYID = 7
3,260,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,374 UART: [art] PUB.X = 325A76D5790275D681FC9F40EC7528783F193E3E576E435197AB88D4FFD6D69E39D4E8DCC99E8928AF0F3FF3E136ADEC
3,268,148 UART: [art] PUB.Y = 2F5B8E07B608AB5D9649899D2FC3D76F06FD3FA04681660D9BDA146AD4C717A13B816CCD550CCF43DBB8680CBB42CF90
3,275,096 UART: [art] SIG.R = 9C14F1BC3AD8BA961E1CD3828FF6DE8D4CE10C476CA7D6E48A3451DEAB185D4289E69A0E684BBF78E39DB69D1EE5D32D
3,281,884 UART: [art] SIG.S = 7F8C0C1B9132AF4A992E0F54C3656BE1A421800E977209E1218AE9813A23DF40D56AE873D816E288B941A7A8003C5026
3,305,489 UART: Caliptra RT
3,305,742 UART: [state] CFI Enabled
3,413,119 UART: [rt] RT listening for mailbox commands...
3,413,782 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,557 UART: [rt]cmd =0x46504c54, len=4
3,444,511 >>> mbox cmd response data (8 bytes)
3,444,856 UART: [rt] FIPS self test
3,445,184 UART: [kat] ++
3,445,336 UART: [kat] sha1
3,446,234 UART: Fatal Error: 0x90060001
3,447,773 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,447,778 >>> mbox cmd response: failed
3,447,778 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,447,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,027 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,546 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,752 UART: [kat] SHA2-256
892,690 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,422 UART: [fht] Storing FHT @ 0x50003400
1,480,263 UART: [idev] ++
1,480,431 UART: [idev] CDI.KEYID = 6
1,480,791 UART: [idev] SUBJECT.KEYID = 7
1,481,215 UART: [idev] UDS.KEYID = 0
1,481,560 ready_for_fw is high
1,481,560 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,595 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,959 UART: [idev] --
1,515,950 UART: [ldev] ++
1,516,118 UART: [ldev] CDI.KEYID = 6
1,516,481 UART: [ldev] SUBJECT.KEYID = 5
1,516,907 UART: [ldev] AUTHORITY.KEYID = 7
1,517,370 UART: [ldev] FE.KEYID = 1
1,522,548 UART: [ldev] Erasing FE.KEYID = 1
1,547,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,717 UART: [ldev] --
1,587,124 UART: [fwproc] Waiting for Commands...
1,587,783 UART: [fwproc] Received command 0x46574c44
1,588,574 UART: [fwproc] Received Image of size 115196 bytes
2,895,769 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,928 >>> mbox cmd response: success
3,090,156 UART: [afmc] ++
3,090,324 UART: [afmc] CDI.KEYID = 6
3,090,686 UART: [afmc] SUBJECT.KEYID = 7
3,091,111 UART: [afmc] AUTHORITY.KEYID = 5
3,125,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,155 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,845 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,876 UART: [afmc] --
3,169,968 UART: [cold-reset] --
3,170,870 UART: [state] Locking Datavault
3,172,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,769 UART: [state] Locking ICCM
3,173,417 UART: [exit] Launching FMC @ 0x40000130
3,178,746 UART:
3,178,762 UART: Running Caliptra FMC ...
3,179,170 UART:
3,179,313 UART: [state] CFI Enabled
3,190,038 UART: [fht] FMC Alias Private Key: 7
3,297,735 UART: [art] Extend RT PCRs Done
3,298,163 UART: [art] Lock RT PCRs Done
3,299,729 UART: [art] Populate DV Done
3,307,914 UART: [fht] FMC Alias Private Key: 7
3,308,988 UART: [art] Derive CDI
3,309,268 UART: [art] Store in in slot 0x4
3,395,051 UART: [art] Derive Key Pair
3,395,411 UART: [art] Store priv key in slot 0x5
3,408,967 UART: [art] Derive Key Pair - Done
3,423,925 UART: [art] Signing Cert with AUTHO
3,424,405 UART: RITY.KEYID = 7
3,439,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,134 UART: [art] PUB.X = 1E935040BC53D7F4B3D60F222FD2F4F7E75CE146CAE7F74B69567BAE366792CDEDB94332A1256E714789F1A0A2276F78
3,446,907 UART: [art] PUB.Y = 5EF36EAF775BE39724125E220B0F404F07437600BFCCFB0D057A76ED7A0100C84163612C39AAE157711418F94F1EB3D2
3,453,797 UART: [art] SIG.R = 222E7E6AFF67E9AA373961CF9D2ED406F1C2585ABE46570E107A2A1ABE1F8477F6BFE22CC8B5A7CB02F7928AE6573F26
3,460,574 UART: [art] SIG.S = C92AA5D04138F9E1862C46F79F3160EA1F588B6E697E3C4B6CA17E2FFB6305C778C0751A9B08682DAA193C3DF1A081A7
3,484,041 UART: Caliptra RT
3,484,386 UART: [state] CFI Enabled
3,593,575 UART: [rt] RT listening for mailbox commands...
3,594,238 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,821 UART: [rt]cmd =0x46504c54, len=4
3,625,007 >>> mbox cmd response data (8 bytes)
3,625,216 UART: [rt] FIPS self test
3,625,544 UART: [kat] ++
3,625,696 UART: [kat] sha1
3,626,490 UART: Fatal Error: 0x90060001
3,628,029 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,628,034 >>> mbox cmd response: failed
3,628,034 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,628,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,982 UART: [kat] SHA2-256
881,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,028 UART: [kat] ++
886,180 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,437 UART: [kat] LMS
1,475,633 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,860 UART: [fht] Storing FHT @ 0x50003400
1,479,611 UART: [idev] ++
1,479,779 UART: [idev] CDI.KEYID = 6
1,480,139 UART: [idev] SUBJECT.KEYID = 7
1,480,563 UART: [idev] UDS.KEYID = 0
1,480,908 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,611 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,913 UART: [idev] --
1,514,888 UART: [ldev] ++
1,515,056 UART: [ldev] CDI.KEYID = 6
1,515,419 UART: [ldev] SUBJECT.KEYID = 5
1,515,845 UART: [ldev] AUTHORITY.KEYID = 7
1,516,308 UART: [ldev] FE.KEYID = 1
1,521,886 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,415 UART: [ldev] --
1,586,730 UART: [fwproc] Waiting for Commands...
1,587,593 UART: [fwproc] Received command 0x46574c44
1,588,384 UART: [fwproc] Received Image of size 115196 bytes
2,896,397 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,065 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,664 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,602 ready_for_fw is high
1,363,602 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,097 >>> mbox cmd response: success
3,002,181 UART:
3,002,197 UART: Running Caliptra FMC ...
3,002,605 UART:
3,002,748 UART: [state] CFI Enabled
3,013,299 UART: [fht] FMC Alias Private Key: 7
3,121,782 UART: [art] Extend RT PCRs Done
3,122,210 UART: [art] Lock RT PCRs Done
3,123,878 UART: [art] Populate DV Done
3,132,057 UART: [fht] FMC Alias Private Key: 7
3,133,237 UART: [art] Derive CDI
3,133,517 UART: [art] Store in in slot 0x4
3,219,232 UART: [art] Derive Key Pair
3,219,592 UART: [art] Store priv key in slot 0x5
3,232,650 UART: [art] Derive Key Pair - Done
3,247,391 UART: [art] Signing Cert with AUTHO
3,247,871 UART: RITY.KEYID = 7
3,262,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,538 UART: [art] PUB.X = 3D3705180C8AACF367288C0770A0F2020D5A1D3B3FE1878599C93A0555D3D4310EAEA1E0D0CD668E58A34D27DD0158AA
3,270,290 UART: [art] PUB.Y = 66C1AF992DD3EDA96BF309BDC5F35E43F75DFF566B5BA96088BCE241A330F779EEC0F6E8BE7FB410D629425447CCCE67
3,277,257 UART: [art] SIG.R = D1B9C1D19CC2D0B90FEDF08ED12EC180F56732D05C82268BA0A7E53362B0C787B10DEF94ACC306EB0F647EF8D239D8A3
3,284,033 UART: [art] SIG.S = A0D9075F97D136BCE456FB68C2498C72E0139DD5EB80D3E1B16F3C67B6C48D4634BC7D91FF81E030F73C02040D25C777
3,308,094 UART: Caliptra RT
3,308,439 UART: [state] CFI Enabled
3,417,173 UART: [rt] RT listening for mailbox commands...
3,417,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,811 UART: [rt]cmd =0x46504c54, len=4
3,448,995 >>> mbox cmd response data (8 bytes)
3,449,326 UART: [rt] FIPS self test
3,449,654 UART: [kat] ++
3,449,806 UART: [kat] sha1
3,450,802 UART: Fatal Error: 0x90060001
3,452,341 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,452,346 >>> mbox cmd response: failed
3,452,346 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,452,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,560 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,137 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
892,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,989 UART: [kat] ++
897,141 UART: [kat] sha1
901,223 UART: [kat] SHA2-256
903,163 UART: [kat] SHA2-384
905,694 UART: [kat] SHA2-512-ACC
907,595 UART: [kat] ECC-384
917,176 UART: [kat] HMAC-384Kdf
921,808 UART: [kat] LMS
1,170,136 UART: [kat] --
1,170,959 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,652 UART: [idev] SUBJECT.KEYID = 7
1,175,076 UART: [idev] UDS.KEYID = 0
1,175,421 ready_for_fw is high
1,175,421 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,106 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,110 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,336 UART: [fwproc] Wait for Commands...
1,282,158 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,936 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,923 >>> mbox cmd response: success
2,785,141 UART: [afmc] ++
2,785,309 UART: [afmc] CDI.KEYID = 6
2,785,671 UART: [afmc] SUBJECT.KEYID = 7
2,786,096 UART: [afmc] AUTHORITY.KEYID = 5
2,821,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,480 UART: [afmc] --
2,864,370 UART: [cold-reset] --
2,865,232 UART: [state] Locking Datavault
2,866,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,031 UART: [state] Locking ICCM
2,867,611 UART: [exit] Launching FMC @ 0x40000130
2,872,940 UART:
2,872,956 UART: Running Caliptra FMC ...
2,873,364 UART:
2,873,418 UART: [state] CFI Enabled
2,884,005 UART: [fht] FMC Alias Private Key: 7
2,991,686 UART: [art] Extend RT PCRs Done
2,992,114 UART: [art] Lock RT PCRs Done
2,993,508 UART: [art] Populate DV Done
3,001,801 UART: [fht] FMC Alias Private Key: 7
3,002,875 UART: [art] Derive CDI
3,003,155 UART: [art] Store in in slot 0x4
3,088,858 UART: [art] Derive Key Pair
3,089,218 UART: [art] Store priv key in slot 0x5
3,101,714 UART: [art] Derive Key Pair - Done
3,116,641 UART: [art] Signing Cert with AUTHO
3,117,121 UART: RITY.KEYID = 7
3,132,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,946 UART: [art] PUB.X = 0C54E43C6E5F56903DEA94D77E21F0D3B1D4F28CC7A02AC3B93B4F7F45A6CE8A35CF6BC9178EB6E97A04B135E9D63562
3,139,726 UART: [art] PUB.Y = 073FF99D197196AF66442677429CA912C4D0DDCCD965A0F7CF28E686D1AD90D4F91ABDA7BE9AF3B9B4A91DD2C982CEE9
3,146,693 UART: [art] SIG.R = F4D12AD1B38F602EF85A9BF4CF7546FFC37A08D121C99134B66DF1A13298D6F1D79770E38F5F454F3DCFC400B42C3420
3,153,448 UART: [art] SIG.S = 163EC51DC956D7EB8435E637E1515758B108D64EA0F12759E42856B415F4DDFA93BE641E04CB47D5FD523DED005C4BE6
3,176,371 UART: Caliptra RT
3,176,624 UART: [state] CFI Enabled
3,283,839 UART: [rt] RT listening for mailbox commands...
3,284,502 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,255 UART: [rt]cmd =0x46504c54, len=4
3,315,399 >>> mbox cmd response data (8 bytes)
3,315,698 UART: [rt] FIPS self test
3,316,026 UART: [kat] ++
3,316,178 UART: [kat] sha1
3,316,848 UART: Fatal Error: 0x90060001
3,318,387 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,318,392 >>> mbox cmd response: failed
3,318,392 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,318,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,535 UART: [kat] SHA2-256
903,475 UART: [kat] SHA2-384
906,272 UART: [kat] SHA2-512-ACC
908,173 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,398 UART: [idev] ++
1,175,566 UART: [idev] CDI.KEYID = 6
1,175,926 UART: [idev] SUBJECT.KEYID = 7
1,176,350 UART: [idev] UDS.KEYID = 0
1,176,695 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,150 UART: [idev] Erasing UDS.KEYID = 0
1,201,695 UART: [idev] Sha1 KeyId Algorithm
1,210,217 UART: [idev] --
1,211,219 UART: [ldev] ++
1,211,387 UART: [ldev] CDI.KEYID = 6
1,211,750 UART: [ldev] SUBJECT.KEYID = 5
1,212,176 UART: [ldev] AUTHORITY.KEYID = 7
1,212,639 UART: [ldev] FE.KEYID = 1
1,217,829 UART: [ldev] Erasing FE.KEYID = 1
1,244,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,195 UART: [ldev] --
1,283,690 UART: [fwproc] Wait for Commands...
1,284,282 UART: [fwproc] Recv command 0x46574c44
1,285,010 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,964 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,149 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,775 ready_for_fw is high
1,060,775 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,932 >>> mbox cmd response: success
2,700,450 UART:
2,700,466 UART: Running Caliptra FMC ...
2,700,874 UART:
2,700,928 UART: [state] CFI Enabled
2,711,253 UART: [fht] FMC Alias Private Key: 7
2,818,446 UART: [art] Extend RT PCRs Done
2,818,874 UART: [art] Lock RT PCRs Done
2,820,250 UART: [art] Populate DV Done
2,828,353 UART: [fht] FMC Alias Private Key: 7
2,829,351 UART: [art] Derive CDI
2,829,631 UART: [art] Store in in slot 0x4
2,915,486 UART: [art] Derive Key Pair
2,915,846 UART: [art] Store priv key in slot 0x5
2,928,392 UART: [art] Derive Key Pair - Done
2,943,137 UART: [art] Signing Cert with AUTHO
2,943,617 UART: RITY.KEYID = 7
2,959,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,840 UART: [art] PUB.X = 183CB66B43D8A8E738B084337AD9B0CAC40C0574B783E8D7D895AF958E568DB8062743718E27345B30DAAEFF93DC109A
2,966,607 UART: [art] PUB.Y = 60A2DB2B35765989B7509BF69B540C1FECD6D803D323899A3B9BADFAF0BCBB53CFA61318C4751D56287FCBCE956C461A
2,973,567 UART: [art] SIG.R = 5D89B50C7E67F3FB6CFCC93511D686AD5218677C6D1A91D27A8289217D31BAE6FEF5DAB9DB41FA88DA20A49023DC75FB
2,980,352 UART: [art] SIG.S = 797D7E0B2859D4C5592CDC700CFFC9DB0F6DDC901BEA7BA2A8409705680432C84070DB2A8D189E58AF173394D751B634
3,004,180 UART: Caliptra RT
3,004,433 UART: [state] CFI Enabled
3,112,148 UART: [rt] RT listening for mailbox commands...
3,112,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,508 UART: [rt]cmd =0x46504c54, len=4
3,143,582 >>> mbox cmd response data (8 bytes)
3,143,707 UART: [rt] FIPS self test
3,144,035 UART: [kat] ++
3,144,187 UART: [kat] sha1
3,145,027 UART: Fatal Error: 0x90060001
3,146,566 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,146,571 >>> mbox cmd response: failed
3,146,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,146,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,030 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,112 UART: [state] WD Timer not started. Device not locked for debugging
87,397 UART: [kat] SHA2-256
893,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,172 UART: [kat] ++
897,324 UART: [kat] sha1
901,336 UART: [kat] SHA2-256
903,276 UART: [kat] SHA2-384
905,977 UART: [kat] SHA2-512-ACC
907,878 UART: [kat] ECC-384
917,661 UART: [kat] HMAC-384Kdf
922,235 UART: [kat] LMS
1,170,563 UART: [kat] --
1,171,594 UART: [cold-reset] ++
1,172,086 UART: [fht] FHT @ 0x50003400
1,174,693 UART: [idev] ++
1,174,861 UART: [idev] CDI.KEYID = 6
1,175,221 UART: [idev] SUBJECT.KEYID = 7
1,175,645 UART: [idev] UDS.KEYID = 0
1,175,990 ready_for_fw is high
1,175,990 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,385 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,600 UART: [ldev] ++
1,209,768 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,557 UART: [ldev] AUTHORITY.KEYID = 7
1,211,020 UART: [ldev] FE.KEYID = 1
1,216,186 UART: [ldev] Erasing FE.KEYID = 1
1,242,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,767 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,203 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,353 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,420 >>> mbox cmd response: success
2,786,438 UART: [afmc] ++
2,786,606 UART: [afmc] CDI.KEYID = 6
2,786,968 UART: [afmc] SUBJECT.KEYID = 7
2,787,393 UART: [afmc] AUTHORITY.KEYID = 5
2,822,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,399 UART: [afmc] --
2,866,375 UART: [cold-reset] --
2,867,115 UART: [state] Locking Datavault
2,868,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,882 UART: [state] Locking ICCM
2,869,556 UART: [exit] Launching FMC @ 0x40000130
2,874,885 UART:
2,874,901 UART: Running Caliptra FMC ...
2,875,309 UART:
2,875,452 UART: [state] CFI Enabled
2,886,063 UART: [fht] FMC Alias Private Key: 7
2,994,082 UART: [art] Extend RT PCRs Done
2,994,510 UART: [art] Lock RT PCRs Done
2,996,174 UART: [art] Populate DV Done
3,004,325 UART: [fht] FMC Alias Private Key: 7
3,005,417 UART: [art] Derive CDI
3,005,697 UART: [art] Store in in slot 0x4
3,091,488 UART: [art] Derive Key Pair
3,091,848 UART: [art] Store priv key in slot 0x5
3,105,436 UART: [art] Derive Key Pair - Done
3,120,398 UART: [art] Signing Cert with AUTHO
3,120,878 UART: RITY.KEYID = 7
3,136,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,701 UART: [art] PUB.X = C6FDF43D640B4C2BDBE623A42E065374C1B4A9298F06BB24C9088FFFF38420C340DE330B1363D818496BA8211EF5372A
3,144,462 UART: [art] PUB.Y = 68D051EDA90D10A8C7A7EAC9F63E04C812D0BD0D08CBC4B6CEB8C213694BEDDA93CC2725A6C7926C54E2A7FD2D694696
3,151,420 UART: [art] SIG.R = 26BF2249B3CFE3BEE2081C68FB1B3B936C126A7D7FAC5B49F85A42BE14E496859CFD85170BB15A994C02FF0633D95A6D
3,158,192 UART: [art] SIG.S = 1249E21DE61D6317F77C0557C380C3BCF81DB14E1457DF8462A2801ECE19A1BD4EB5DF8F8E57C3BA2E1982AFC3827006
3,181,687 UART: Caliptra RT
3,182,032 UART: [state] CFI Enabled
3,289,421 UART: [rt] RT listening for mailbox commands...
3,290,084 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,813 UART: [rt]cmd =0x46504c54, len=4
3,321,109 >>> mbox cmd response data (8 bytes)
3,321,396 UART: [rt] FIPS self test
3,321,724 UART: [kat] ++
3,321,876 UART: [kat] sha1
3,322,682 UART: Fatal Error: 0x90060001
3,324,221 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,226 >>> mbox cmd response: failed
3,324,226 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
893,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,080 UART: [kat] ++
898,232 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
907,183 UART: [kat] SHA2-512-ACC
909,084 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,461 UART: [idev] ++
1,175,629 UART: [idev] CDI.KEYID = 6
1,175,989 UART: [idev] SUBJECT.KEYID = 7
1,176,413 UART: [idev] UDS.KEYID = 0
1,176,758 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,201,352 UART: [idev] Sha1 KeyId Algorithm
1,209,810 UART: [idev] --
1,210,832 UART: [ldev] ++
1,211,000 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,789 UART: [ldev] AUTHORITY.KEYID = 7
1,212,252 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,780 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,915 UART: [fwproc] Recv command 0x46574c44
1,284,643 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,875 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,904 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,190 ready_for_fw is high
1,061,190 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,997 >>> mbox cmd response: success
2,702,357 UART:
2,702,373 UART: Running Caliptra FMC ...
2,702,781 UART:
2,702,924 UART: [state] CFI Enabled
2,713,579 UART: [fht] FMC Alias Private Key: 7
2,821,408 UART: [art] Extend RT PCRs Done
2,821,836 UART: [art] Lock RT PCRs Done
2,823,618 UART: [art] Populate DV Done
2,831,807 UART: [fht] FMC Alias Private Key: 7
2,832,935 UART: [art] Derive CDI
2,833,215 UART: [art] Store in in slot 0x4
2,919,152 UART: [art] Derive Key Pair
2,919,512 UART: [art] Store priv key in slot 0x5
2,932,736 UART: [art] Derive Key Pair - Done
2,947,258 UART: [art] Signing Cert with AUTHO
2,947,738 UART: RITY.KEYID = 7
2,962,734 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,499 UART: [art] PUB.X = E43E8F9493F530E23AF56CDDAFC3A0455C05F1E682C942E8D1EAC68313FC3E06BD37E533FF663A14B84D3610708B8D56
2,970,273 UART: [art] PUB.Y = 66FAB363C1FEDAA079A32A59D3BB9F4AE4738152F4F5FDE50D6CE42DE4B5CAF9B8177D104179743ED0F5D067C37CA643
2,977,238 UART: [art] SIG.R = D67CC9A02F5CB5A76CF253ED4BB06AB3E5ED380207E599E0EA507B45E0939822BE066DA30CC186AA3B3A8E531D911795
2,984,008 UART: [art] SIG.S = FF8E8650ED429954C6ACF33D844D2F86F840B2D3F0BA718C028DCC50EA02F891949112B004038EAA5DCB7DB7CFF63E43
3,007,533 UART: Caliptra RT
3,007,878 UART: [state] CFI Enabled
3,116,414 UART: [rt] RT listening for mailbox commands...
3,117,077 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,758 UART: [rt]cmd =0x46504c54, len=4
3,147,880 >>> mbox cmd response data (8 bytes)
3,148,195 UART: [rt] FIPS self test
3,148,523 UART: [kat] ++
3,148,675 UART: [kat] sha1
3,149,187 UART: Fatal Error: 0x90060001
3,150,726 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,731 >>> mbox cmd response: failed
3,150,731 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,265 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,322 UART: [kat] SHA2-512-ACC
906,223 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 ready_for_fw is high
1,174,579 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,158 UART: [ldev] Erasing FE.KEYID = 1
1,241,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,227 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,461 >>> mbox cmd response: success
2,785,654 UART: [afmc] ++
2,785,822 UART: [afmc] CDI.KEYID = 6
2,786,185 UART: [afmc] SUBJECT.KEYID = 7
2,786,611 UART: [afmc] AUTHORITY.KEYID = 5
2,822,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,773 UART: [afmc] --
2,865,743 UART: [cold-reset] --
2,866,783 UART: [state] Locking Datavault
2,867,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,272 UART: [state] Locking ICCM
2,868,844 UART: [exit] Launching FMC @ 0x40000130
2,874,173 UART:
2,874,189 UART: Running Caliptra FMC ...
2,874,597 UART:
2,874,651 UART: [state] CFI Enabled
2,885,096 UART: [fht] FMC Alias Private Key: 7
2,992,957 UART: [art] Extend RT PCRs Done
2,993,385 UART: [art] Lock RT PCRs Done
2,994,863 UART: [art] Populate DV Done
3,002,960 UART: [fht] FMC Alias Private Key: 7
3,003,918 UART: [art] Derive CDI
3,004,198 UART: [art] Store in in slot 0x4
3,089,571 UART: [art] Derive Key Pair
3,089,931 UART: [art] Store priv key in slot 0x5
3,102,707 UART: [art] Derive Key Pair - Done
3,117,644 UART: [art] Signing Cert with AUTHO
3,118,124 UART: RITY.KEYID = 7
3,133,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,311 UART: [art] PUB.X = 98DC93948852DF2BE675E5032847694FDABE50BD603C3D3ED6989E2D476CC90A57F439C1ECBD73957D086A63B251F840
3,141,076 UART: [art] PUB.Y = 95BFFCFC19A54684ADF3AA13701A40F0302A68A4AD0E418EAD436BD21385AD686BC2F2F8EBCD2B9D20C276919ED7DB35
3,148,043 UART: [art] SIG.R = 46FB020978438395E08979A17DB2B14C6AFA9747CB62D32DFDE0EE1B459A4DE6EACDEFBC936636B4A10432AFEE8B59B1
3,154,822 UART: [art] SIG.S = C88BD9CF470702A0B0EDDE5A00398808B461EF83C4D6740954C314FE3B547CD14F0CE8BCC33EC3DABCBB3BF6230878CA
3,178,203 UART: Caliptra RT
3,178,456 UART: [state] CFI Enabled
3,286,813 UART: [rt] RT listening for mailbox commands...
3,287,476 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,191 UART: [rt]cmd =0x46504c54, len=4
3,318,275 >>> mbox cmd response data (8 bytes)
3,318,462 UART: [rt] FIPS self test
3,318,790 UART: [kat] ++
3,318,942 UART: [kat] sha1
3,319,834 UART: Fatal Error: 0x90060001
3,321,373 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,378 >>> mbox cmd response: failed
3,321,378 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,213 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,208,022 UART: [ldev] ++
1,208,190 UART: [ldev] CDI.KEYID = 6
1,208,554 UART: [ldev] SUBJECT.KEYID = 5
1,208,981 UART: [ldev] AUTHORITY.KEYID = 7
1,209,444 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,501 UART: [fwproc] Recv command 0x46574c44
1,282,234 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,531 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,677 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,738 ready_for_fw is high
1,055,738 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,489 >>> mbox cmd response: success
2,695,989 UART:
2,696,005 UART: Running Caliptra FMC ...
2,696,413 UART:
2,696,467 UART: [state] CFI Enabled
2,707,016 UART: [fht] FMC Alias Private Key: 7
2,814,849 UART: [art] Extend RT PCRs Done
2,815,277 UART: [art] Lock RT PCRs Done
2,816,875 UART: [art] Populate DV Done
2,825,452 UART: [fht] FMC Alias Private Key: 7
2,826,516 UART: [art] Derive CDI
2,826,796 UART: [art] Store in in slot 0x4
2,912,507 UART: [art] Derive Key Pair
2,912,867 UART: [art] Store priv key in slot 0x5
2,925,619 UART: [art] Derive Key Pair - Done
2,940,322 UART: [art] Signing Cert with AUTHO
2,940,802 UART: RITY.KEYID = 7
2,956,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,815 UART: [art] PUB.X = 6AE3C01421F9110BA709049915BE5E459598699A07FD150D3EFA68A1907E3C449E317C83DDEF7B717B5B0E7F803CF474
2,963,569 UART: [art] PUB.Y = BF12DA8FC3D7457AD86A9A673CA3166E93A6FBF0EB7E967F02E809A70A0CC4272CEB9FF870A151E1C649A0784F0A81A9
2,970,520 UART: [art] SIG.R = 09EE12079C8625AB850D53B5F81C3384607C81AD631D65A8857130A7FD5FC057B7C527C39C504208AA70227CE22D4491
2,977,272 UART: [art] SIG.S = A0AFCCA62C8B8F3F61F611C0EFFA248A2C0DDF2621D5BABBABE3B4AFC6E42D48755008762C2E79AD5FD9BB6F9CC570DB
3,000,835 UART: Caliptra RT
3,001,088 UART: [state] CFI Enabled
3,108,779 UART: [rt] RT listening for mailbox commands...
3,109,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,381 UART: [rt]cmd =0x46504c54, len=4
3,140,477 >>> mbox cmd response data (8 bytes)
3,140,792 UART: [rt] FIPS self test
3,141,120 UART: [kat] ++
3,141,272 UART: [kat] sha1
3,141,922 UART: Fatal Error: 0x90060001
3,143,461 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,143,466 >>> mbox cmd response: failed
3,143,466 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,143,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,643 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,648 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,174,058 ready_for_fw is high
1,174,058 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,079 UART: [ldev] --
1,281,401 UART: [fwproc] Wait for Commands...
1,281,986 UART: [fwproc] Recv command 0x46574c44
1,282,719 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,900 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,912 >>> mbox cmd response: success
2,785,935 UART: [afmc] ++
2,786,103 UART: [afmc] CDI.KEYID = 6
2,786,466 UART: [afmc] SUBJECT.KEYID = 7
2,786,892 UART: [afmc] AUTHORITY.KEYID = 5
2,822,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,951 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,834 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,553 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,412 UART: [afmc] --
2,865,400 UART: [cold-reset] --
2,866,262 UART: [state] Locking Datavault
2,867,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,865 UART: [state] Locking ICCM
2,868,457 UART: [exit] Launching FMC @ 0x40000130
2,873,786 UART:
2,873,802 UART: Running Caliptra FMC ...
2,874,210 UART:
2,874,353 UART: [state] CFI Enabled
2,885,016 UART: [fht] FMC Alias Private Key: 7
2,992,501 UART: [art] Extend RT PCRs Done
2,992,929 UART: [art] Lock RT PCRs Done
2,994,055 UART: [art] Populate DV Done
3,002,190 UART: [fht] FMC Alias Private Key: 7
3,003,250 UART: [art] Derive CDI
3,003,530 UART: [art] Store in in slot 0x4
3,089,271 UART: [art] Derive Key Pair
3,089,631 UART: [art] Store priv key in slot 0x5
3,103,739 UART: [art] Derive Key Pair - Done
3,118,467 UART: [art] Signing Cert with AUTHO
3,118,947 UART: RITY.KEYID = 7
3,133,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,476 UART: [art] PUB.X = 50432CF694AC9EA18D67C0CF662D0D8043BF37E38F018EDFAD29CF219B65AD2996B32C534191E7079B30F409579F04E3
3,141,235 UART: [art] PUB.Y = F9FB87B0F5846308393F5B82118E5F73AA31810EA399971F53C48164AE8D081773A1DA21FC9895C3FB6B593BAFE6FA45
3,148,180 UART: [art] SIG.R = 98596011371BE77D292A97A31E986281D00AEC920C880A31EAA843774AE5D61B83EF36AE796785998885FA76E8F0F68B
3,154,937 UART: [art] SIG.S = 4FBC94108562716DDE9DCEBD2BE904F4FD127CC15EE071F268CE248961DC6524827FB0ECDCAD5C5DBA1FDEED9B89CBC9
3,179,215 UART: Caliptra RT
3,179,560 UART: [state] CFI Enabled
3,287,457 UART: [rt] RT listening for mailbox commands...
3,288,120 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,987 UART: [rt]cmd =0x46504c54, len=4
3,319,277 >>> mbox cmd response data (8 bytes)
3,319,494 UART: [rt] FIPS self test
3,319,822 UART: [kat] ++
3,319,974 UART: [kat] sha1
3,320,640 UART: Fatal Error: 0x90060001
3,322,179 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,184 >>> mbox cmd response: failed
3,322,184 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
915,399 UART: [kat] HMAC-384Kdf
920,013 UART: [kat] LMS
1,168,325 UART: [kat] --
1,169,290 UART: [cold-reset] ++
1,169,676 UART: [fht] FHT @ 0x50003400
1,172,166 UART: [idev] ++
1,172,334 UART: [idev] CDI.KEYID = 6
1,172,695 UART: [idev] SUBJECT.KEYID = 7
1,173,120 UART: [idev] UDS.KEYID = 0
1,173,466 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,194 UART: [idev] Erasing UDS.KEYID = 0
1,197,894 UART: [idev] Sha1 KeyId Algorithm
1,206,694 UART: [idev] --
1,207,837 UART: [ldev] ++
1,208,005 UART: [ldev] CDI.KEYID = 6
1,208,369 UART: [ldev] SUBJECT.KEYID = 5
1,208,796 UART: [ldev] AUTHORITY.KEYID = 7
1,209,259 UART: [ldev] FE.KEYID = 1
1,214,521 UART: [ldev] Erasing FE.KEYID = 1
1,240,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,265 UART: [ldev] --
1,280,603 UART: [fwproc] Wait for Commands...
1,281,378 UART: [fwproc] Recv command 0x46574c44
1,282,111 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,042 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,485 ready_for_fw is high
1,056,485 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,614 >>> mbox cmd response: success
2,697,148 UART:
2,697,164 UART: Running Caliptra FMC ...
2,697,572 UART:
2,697,715 UART: [state] CFI Enabled
2,708,632 UART: [fht] FMC Alias Private Key: 7
2,816,419 UART: [art] Extend RT PCRs Done
2,816,847 UART: [art] Lock RT PCRs Done
2,818,283 UART: [art] Populate DV Done
2,826,376 UART: [fht] FMC Alias Private Key: 7
2,827,354 UART: [art] Derive CDI
2,827,634 UART: [art] Store in in slot 0x4
2,913,267 UART: [art] Derive Key Pair
2,913,627 UART: [art] Store priv key in slot 0x5
2,927,435 UART: [art] Derive Key Pair - Done
2,942,263 UART: [art] Signing Cert with AUTHO
2,942,743 UART: RITY.KEYID = 7
2,958,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,008 UART: [art] PUB.X = 15941A3EFC886C545BFBCE45EC7FCA5E67E1039CE4BF4B4ED71FBA297D9AA60A8D08E826ECC4A4800EB633855A0A2AD1
2,965,787 UART: [art] PUB.Y = 26FE3F7C815436F97D47FA7246777A47B9D657703D08E3752C0BE2CF9310A21FA89E70420050424662933ECD76708EFD
2,972,703 UART: [art] SIG.R = 32A1D9BAD64E92F49D98AAF4AB45745614C9C825C1AA64EBC69F79EA5660B5BDA54221D6389EE34962883184217BFC31
2,979,479 UART: [art] SIG.S = 85504709C5238F5E5A33CF96EE0E9E44B01B55C27A8B0C521FB13F62418C62BE15C574ECC4EA28B47043AA6E9D39778E
3,003,389 UART: Caliptra RT
3,003,734 UART: [state] CFI Enabled
3,113,177 UART: [rt] RT listening for mailbox commands...
3,113,840 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,445 UART: [rt]cmd =0x46504c54, len=4
3,144,525 >>> mbox cmd response data (8 bytes)
3,144,772 UART: [rt] FIPS self test
3,145,100 UART: [kat] ++
3,145,252 UART: [kat] sha1
3,146,180 UART: Fatal Error: 0x90060001
3,147,719 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,724 >>> mbox cmd response: failed
3,147,724 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,718 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
806,965 >>> mbox cmd response: failed
806,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
806,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,389 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,135 >>> mbox cmd response: failed
807,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,725 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,184 >>> mbox cmd response: failed
807,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,252 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,468 >>> mbox cmd response: failed
807,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,090 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,183 >>> mbox cmd response: failed
807,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,365 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,149 >>> mbox cmd response: failed
807,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,047 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,244 >>> mbox cmd response: failed
807,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,278 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,934 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,644 >>> mbox cmd response: failed
807,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,872 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,287 >>> mbox cmd response: failed
807,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,473 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,813 >>> mbox cmd response: failed
807,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,827 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,654 >>> mbox cmd response: failed
807,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,740 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,442 >>> mbox cmd response: failed
807,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,428 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,395 UART: [kat] SHA2-256
882,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,441 UART: [kat] ++
886,593 UART: [kat] sha1
890,765 UART: [kat] SHA2-256
892,703 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
903,140 UART: [kat] HMAC-384Kdf
907,724 UART: [kat] LMS
1,475,920 UART: [kat] --
1,476,847 UART: [cold-reset] ++
1,477,257 UART: [fht] Storing FHT @ 0x50003400
1,479,834 UART: [idev] ++
1,480,002 UART: [idev] CDI.KEYID = 6
1,480,362 UART: [idev] SUBJECT.KEYID = 7
1,480,786 UART: [idev] UDS.KEYID = 0
1,481,131 ready_for_fw is high
1,481,131 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,948 UART: [idev] Erasing UDS.KEYID = 0
1,505,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,980 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,363 UART: [ldev] Erasing FE.KEYID = 1
1,546,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,476 UART: [ldev] --
1,585,751 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 115196 bytes
2,897,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,230 >>> mbox cmd response: success
3,093,420 UART: [afmc] ++
3,093,588 UART: [afmc] CDI.KEYID = 6
3,093,950 UART: [afmc] SUBJECT.KEYID = 7
3,094,375 UART: [afmc] AUTHORITY.KEYID = 5
3,129,132 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,167 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,857 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,648 UART: [afmc] --
3,171,560 UART: [cold-reset] --
3,172,380 UART: [state] Locking Datavault
3,173,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,879 UART: [state] Locking ICCM
3,174,545 UART: [exit] Launching FMC @ 0x40000130
3,179,874 UART:
3,179,890 UART: Running Caliptra FMC ...
3,180,298 UART:
3,180,352 UART: [state] CFI Enabled
3,190,451 UART: [fht] FMC Alias Private Key: 7
3,298,946 UART: [art] Extend RT PCRs Done
3,299,374 UART: [art] Lock RT PCRs Done
3,300,806 UART: [art] Populate DV Done
3,309,121 UART: [fht] FMC Alias Private Key: 7
3,310,079 UART: [art] Derive CDI
3,310,359 UART: [art] Store in in slot 0x4
3,396,466 UART: [art] Derive Key Pair
3,396,826 UART: [art] Store priv key in slot 0x5
3,409,582 UART: [art] Derive Key Pair - Done
3,424,086 UART: [art] Signing Cert with AUTHO
3,424,566 UART: RITY.KEYID = 7
3,439,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,403 UART: [art] PUB.X = 61B0637BE94EF9EC0EBB563424277D1FDB3CA318E632D24ABD6AE00A16524F24FA544A812A80678C77CB1DE9C19BF746
3,447,179 UART: [art] PUB.Y = 7C47EB2585449983EB23571DE9D63F9ED484AF10225085DAFC11956E5030417B397A52F21ED87458003DB787AADD82A9
3,454,105 UART: [art] SIG.R = 1F40A4E9E87FCD6D9B7466A605881B1FD2B7E1100BF4541C810DBF795A080664A78FBA331FCE570BE758C67F54ECA18A
3,460,869 UART: [art] SIG.S = 47B4BCA9641198760B1327BDAA71DC4A6559FD8CAB48DA62A999C9880AD866A7CFB073B4F674493AEF733BAA0B8A8D53
3,484,313 UART: Caliptra RT
3,484,566 UART: [state] CFI Enabled
3,593,338 UART: [rt] RT listening for mailbox commands...
3,594,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,840 UART: [rt]cmd =0x46504c54, len=4
3,625,100 >>> mbox cmd response data (8 bytes)
3,625,393 UART: [rt] FIPS self test
3,625,721 UART: [kat] ++
3,625,873 UART: [kat] sha1
3,629,972 UART: Fatal Error: 0x90060002
3,631,511 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,516 >>> mbox cmd response: failed
3,631,516 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
902,812 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,477 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,888 UART: [idev] ++
1,480,056 UART: [idev] CDI.KEYID = 6
1,480,416 UART: [idev] SUBJECT.KEYID = 7
1,480,840 UART: [idev] UDS.KEYID = 0
1,481,185 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,380 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,628 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,521,017 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,062 UART: [ldev] --
1,585,513 UART: [fwproc] Waiting for Commands...
1,586,338 UART: [fwproc] Received command 0x46574c44
1,587,129 UART: [fwproc] Received Image of size 115196 bytes
2,894,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,616 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,643 ready_for_fw is high
1,362,643 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,410 >>> mbox cmd response: success
3,002,864 UART:
3,002,880 UART: Running Caliptra FMC ...
3,003,288 UART:
3,003,342 UART: [state] CFI Enabled
3,014,129 UART: [fht] FMC Alias Private Key: 7
3,121,850 UART: [art] Extend RT PCRs Done
3,122,278 UART: [art] Lock RT PCRs Done
3,123,640 UART: [art] Populate DV Done
3,132,045 UART: [fht] FMC Alias Private Key: 7
3,133,063 UART: [art] Derive CDI
3,133,343 UART: [art] Store in in slot 0x4
3,219,172 UART: [art] Derive Key Pair
3,219,532 UART: [art] Store priv key in slot 0x5
3,232,686 UART: [art] Derive Key Pair - Done
3,247,156 UART: [art] Signing Cert with AUTHO
3,247,636 UART: RITY.KEYID = 7
3,263,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,933 UART: [art] PUB.X = E345EDF92A5C66FB1AEF261A8456886E60EA9F8688FA8CE0261760A18164558B387544DE6245D9F4EF49D6FF04D2AC5C
3,270,708 UART: [art] PUB.Y = 692F23C8A567F4D2C531205F7176D73FC59AA1160AC796A9E7EEBA166B3E4F9EB2880B8F95B1F2A622946A420EB35F48
3,277,655 UART: [art] SIG.R = 79B1AD81AB5CA8B119F7F0A6B0BDAE72FC785B13601B365CBDF70427A3C78518C0FD462D54729EBEC18127805A6B4367
3,284,432 UART: [art] SIG.S = 5C780B4A6AD941206FDC33F5803ABCA0CABCF286694D073DEF47476C187AFF9B47D7ABEB415571BC022EDAB90B105913
3,308,087 UART: Caliptra RT
3,308,340 UART: [state] CFI Enabled
3,416,404 UART: [rt] RT listening for mailbox commands...
3,417,067 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,892 UART: [rt]cmd =0x46504c54, len=4
3,448,108 >>> mbox cmd response data (8 bytes)
3,448,253 UART: [rt] FIPS self test
3,448,581 UART: [kat] ++
3,448,733 UART: [kat] sha1
3,452,880 UART: Fatal Error: 0x90060002
3,454,419 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,424 >>> mbox cmd response: failed
3,454,424 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,531 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,316 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,779 UART: [idev] ++
1,479,947 UART: [idev] CDI.KEYID = 6
1,480,307 UART: [idev] SUBJECT.KEYID = 7
1,480,731 UART: [idev] UDS.KEYID = 0
1,481,076 ready_for_fw is high
1,481,076 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,899 UART: [idev] Erasing UDS.KEYID = 0
1,505,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,343 UART: [ldev] --
1,586,606 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 115196 bytes
2,895,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,924 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,199 >>> mbox cmd response: success
3,091,257 UART: [afmc] ++
3,091,425 UART: [afmc] CDI.KEYID = 6
3,091,787 UART: [afmc] SUBJECT.KEYID = 7
3,092,212 UART: [afmc] AUTHORITY.KEYID = 5
3,127,459 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,685 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,078 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,768 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,871 UART: [afmc] --
3,170,987 UART: [cold-reset] --
3,171,947 UART: [state] Locking Datavault
3,173,286 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,890 UART: [state] Locking ICCM
3,174,384 UART: [exit] Launching FMC @ 0x40000130
3,179,713 UART:
3,179,729 UART: Running Caliptra FMC ...
3,180,137 UART:
3,180,280 UART: [state] CFI Enabled
3,190,627 UART: [fht] FMC Alias Private Key: 7
3,297,976 UART: [art] Extend RT PCRs Done
3,298,404 UART: [art] Lock RT PCRs Done
3,299,704 UART: [art] Populate DV Done
3,308,079 UART: [fht] FMC Alias Private Key: 7
3,309,205 UART: [art] Derive CDI
3,309,485 UART: [art] Store in in slot 0x4
3,394,990 UART: [art] Derive Key Pair
3,395,350 UART: [art] Store priv key in slot 0x5
3,408,438 UART: [art] Derive Key Pair - Done
3,422,859 UART: [art] Signing Cert with AUTHO
3,423,339 UART: RITY.KEYID = 7
3,438,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,252 UART: [art] PUB.X = 2933C5FD016DE302CC072FBB68753080E3285390252200C5E9B9134FDE7FEF4D56458C004E8992D54F8FA3DEA5ADA589
3,445,973 UART: [art] PUB.Y = F0D45BECFBD6F1D0CD1E9225AF9D63483A7DA1F52794A9015BD009C3F89BB5DA9232F9AB14102C768735FC986F9ABEDC
3,452,937 UART: [art] SIG.R = 872AEBA6B49E5073A31F9AA2C5847CA711369D98BE323CA5A858BE63687E1D43B6708A2156F13B57DB645F0F50AB2583
3,459,708 UART: [art] SIG.S = C8C13E29B5E16F5EAF9B5A4FC96D86C30EC770544581049EE21CE53E4573F2799C4E76441E540B50487A96B8EE3AB97E
3,483,628 UART: Caliptra RT
3,483,973 UART: [state] CFI Enabled
3,592,015 UART: [rt] RT listening for mailbox commands...
3,592,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,797 UART: [rt]cmd =0x46504c54, len=4
3,624,049 >>> mbox cmd response data (8 bytes)
3,624,168 UART: [rt] FIPS self test
3,624,496 UART: [kat] ++
3,624,648 UART: [kat] sha1
3,629,033 UART: Fatal Error: 0x90060002
3,630,572 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,630,577 >>> mbox cmd response: failed
3,630,577 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,630,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,175 UART: [kat] SHA2-512-ACC
897,076 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,605 UART: [idev] ++
1,479,773 UART: [idev] CDI.KEYID = 6
1,480,133 UART: [idev] SUBJECT.KEYID = 7
1,480,557 UART: [idev] UDS.KEYID = 0
1,480,902 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,197 UART: [idev] Erasing UDS.KEYID = 0
1,505,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,838 UART: [ldev] ++
1,515,006 UART: [ldev] CDI.KEYID = 6
1,515,369 UART: [ldev] SUBJECT.KEYID = 5
1,515,795 UART: [ldev] AUTHORITY.KEYID = 7
1,516,258 UART: [ldev] FE.KEYID = 1
1,521,482 UART: [ldev] Erasing FE.KEYID = 1
1,546,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,586,026 UART: [fwproc] Waiting for Commands...
1,586,719 UART: [fwproc] Received command 0x46574c44
1,587,510 UART: [fwproc] Received Image of size 115196 bytes
2,896,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,257 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 ready_for_fw is high
1,363,266 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,649 >>> mbox cmd response: success
3,002,259 UART:
3,002,275 UART: Running Caliptra FMC ...
3,002,683 UART:
3,002,826 UART: [state] CFI Enabled
3,013,377 UART: [fht] FMC Alias Private Key: 7
3,121,648 UART: [art] Extend RT PCRs Done
3,122,076 UART: [art] Lock RT PCRs Done
3,123,470 UART: [art] Populate DV Done
3,131,651 UART: [fht] FMC Alias Private Key: 7
3,132,683 UART: [art] Derive CDI
3,132,963 UART: [art] Store in in slot 0x4
3,218,694 UART: [art] Derive Key Pair
3,219,054 UART: [art] Store priv key in slot 0x5
3,232,484 UART: [art] Derive Key Pair - Done
3,247,402 UART: [art] Signing Cert with AUTHO
3,247,882 UART: RITY.KEYID = 7
3,263,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,195 UART: [art] PUB.X = 08F6327296B3D1BDB23A1549EFE06D1B34CB5AE1398408C98A5FDB1B47EAA215E0A3759A43092894C0A94C012EE7D396
3,270,959 UART: [art] PUB.Y = 4A64B67DDB9D29893838354E83A777497E8C6FA48168A08FAC0E3EEE92CC4023E7AAE554803BC39631562C6CE23F1789
3,277,908 UART: [art] SIG.R = BE2FCFADC991A1E472B7ACB876B1A4FF03E9581D791DC62547C35061411D65279B2F67F1013BFACE2647AE1576B609FC
3,284,681 UART: [art] SIG.S = 8416B8E3CD40E971923932F9F7A03C084B726572A479F11ABEFFE32910A8BB11CEEC739B9F65E740144044F7BAF1AB69
3,308,119 UART: Caliptra RT
3,308,464 UART: [state] CFI Enabled
3,416,112 UART: [rt] RT listening for mailbox commands...
3,416,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,346 UART: [rt]cmd =0x46504c54, len=4
3,447,502 >>> mbox cmd response data (8 bytes)
3,447,701 UART: [rt] FIPS self test
3,448,029 UART: [kat] ++
3,448,181 UART: [kat] sha1
3,452,530 UART: Fatal Error: 0x90060002
3,454,069 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,074 >>> mbox cmd response: failed
3,454,074 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,200 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,137 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,710 UART: [kat] SHA2-512-ACC
908,611 UART: [kat] ECC-384
918,106 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,767 UART: [cold-reset] ++
1,172,287 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 ready_for_fw is high
1,176,247 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,201,027 UART: [idev] Sha1 KeyId Algorithm
1,209,449 UART: [idev] --
1,210,499 UART: [ldev] ++
1,210,667 UART: [ldev] CDI.KEYID = 6
1,211,030 UART: [ldev] SUBJECT.KEYID = 5
1,211,456 UART: [ldev] AUTHORITY.KEYID = 7
1,211,919 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,516 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,832 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,666 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,701 >>> mbox cmd response: success
2,785,737 UART: [afmc] ++
2,785,905 UART: [afmc] CDI.KEYID = 6
2,786,267 UART: [afmc] SUBJECT.KEYID = 7
2,786,692 UART: [afmc] AUTHORITY.KEYID = 5
2,822,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,706 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,591 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,310 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,194 UART: [afmc] --
2,866,152 UART: [cold-reset] --
2,867,042 UART: [state] Locking Datavault
2,868,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,747 UART: [state] Locking ICCM
2,869,369 UART: [exit] Launching FMC @ 0x40000130
2,874,698 UART:
2,874,714 UART: Running Caliptra FMC ...
2,875,122 UART:
2,875,176 UART: [state] CFI Enabled
2,885,555 UART: [fht] FMC Alias Private Key: 7
2,993,232 UART: [art] Extend RT PCRs Done
2,993,660 UART: [art] Lock RT PCRs Done
2,995,110 UART: [art] Populate DV Done
3,003,291 UART: [fht] FMC Alias Private Key: 7
3,004,357 UART: [art] Derive CDI
3,004,637 UART: [art] Store in in slot 0x4
3,089,864 UART: [art] Derive Key Pair
3,090,224 UART: [art] Store priv key in slot 0x5
3,103,666 UART: [art] Derive Key Pair - Done
3,118,808 UART: [art] Signing Cert with AUTHO
3,119,288 UART: RITY.KEYID = 7
3,134,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,335 UART: [art] PUB.X = A9537CAC5D2AF53E3D4108E80BB52CA0DA7F116DDC04E17E2C9D32AC75EE6B8D014E8AEC11CF5A91F6DB880987705898
3,142,108 UART: [art] PUB.Y = 5E2B049A6FA7F51BEF1E280332A71824F02BCDF12EF7948AEEAD29D1466DF84D404447FC2ADCC8B84C6E62A3C0BB43BA
3,149,074 UART: [art] SIG.R = C7254161D5944622165AAA7CBD78430F5326B0BCB04D2BE3277721200FAFE754CCE14AA01B1B8D3FF53CD895151378A9
3,155,842 UART: [art] SIG.S = 445F9B7AF4D460FD51FA341168241295E3142B91A72C97AF40D06A2A1541F4A1E46D2B094195DF63F3F1A376ACA6C884
3,179,958 UART: Caliptra RT
3,180,211 UART: [state] CFI Enabled
3,288,294 UART: [rt] RT listening for mailbox commands...
3,288,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,732 UART: [rt]cmd =0x46504c54, len=4
3,319,744 >>> mbox cmd response data (8 bytes)
3,319,865 UART: [rt] FIPS self test
3,320,193 UART: [kat] ++
3,320,345 UART: [kat] sha1
3,324,610 UART: Fatal Error: 0x90060002
3,326,149 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,154 >>> mbox cmd response: failed
3,326,154 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,240 UART: [kat] SHA2-512-ACC
908,141 UART: [kat] ECC-384
917,872 UART: [kat] HMAC-384Kdf
922,238 UART: [kat] LMS
1,170,566 UART: [kat] --
1,171,185 UART: [cold-reset] ++
1,171,603 UART: [fht] FHT @ 0x50003400
1,174,132 UART: [idev] ++
1,174,300 UART: [idev] CDI.KEYID = 6
1,174,660 UART: [idev] SUBJECT.KEYID = 7
1,175,084 UART: [idev] UDS.KEYID = 0
1,175,429 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,893 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,448 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,758 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,284 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,323 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,755 ready_for_fw is high
1,060,755 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,422 >>> mbox cmd response: success
2,699,000 UART:
2,699,016 UART: Running Caliptra FMC ...
2,699,424 UART:
2,699,478 UART: [state] CFI Enabled
2,709,817 UART: [fht] FMC Alias Private Key: 7
2,817,894 UART: [art] Extend RT PCRs Done
2,818,322 UART: [art] Lock RT PCRs Done
2,819,782 UART: [art] Populate DV Done
2,827,985 UART: [fht] FMC Alias Private Key: 7
2,829,057 UART: [art] Derive CDI
2,829,337 UART: [art] Store in in slot 0x4
2,915,168 UART: [art] Derive Key Pair
2,915,528 UART: [art] Store priv key in slot 0x5
2,928,964 UART: [art] Derive Key Pair - Done
2,943,972 UART: [art] Signing Cert with AUTHO
2,944,452 UART: RITY.KEYID = 7
2,959,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,093 UART: [art] PUB.X = 4765162AD114E36B8B853CF82E153DC42460F6FF9B7C8970CC391D46958546C3455DCBE2F9591FD29BC2BB6F10C7FAE5
2,966,871 UART: [art] PUB.Y = 3A8309BF778D0EB9C5EFFADF004EDDCE39D827D94969F66BFB766055CB17810B0F0DE0E8D3584FE2139656F08C9CBA88
2,973,800 UART: [art] SIG.R = D4561E921A3F69BFADFC3C18E57B899F56E7B9B6B224FB8F4E825C9ED41573408AE74E459B17AF0EB4300634B1F980D8
2,980,574 UART: [art] SIG.S = 504BD59CA0B8BE4C6F1CA96557F5903914033259BC4FE253A0A6149131DC1E7C1CA047C8E1D6F596B720D2C11B9B3AE6
3,004,256 UART: Caliptra RT
3,004,509 UART: [state] CFI Enabled
3,110,988 UART: [rt] RT listening for mailbox commands...
3,111,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,298 UART: [rt]cmd =0x46504c54, len=4
3,142,438 >>> mbox cmd response data (8 bytes)
3,142,685 UART: [rt] FIPS self test
3,143,013 UART: [kat] ++
3,143,165 UART: [kat] sha1
3,147,412 UART: Fatal Error: 0x90060002
3,148,951 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,956 >>> mbox cmd response: failed
3,148,956 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,230 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,120 UART: [kat] SHA2-256
904,060 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,423 UART: [kat] LMS
1,171,751 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,256 UART: [fht] FHT @ 0x50003400
1,175,925 UART: [idev] ++
1,176,093 UART: [idev] CDI.KEYID = 6
1,176,453 UART: [idev] SUBJECT.KEYID = 7
1,176,877 UART: [idev] UDS.KEYID = 0
1,177,222 ready_for_fw is high
1,177,222 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,125 UART: [idev] Erasing UDS.KEYID = 0
1,202,604 UART: [idev] Sha1 KeyId Algorithm
1,211,110 UART: [idev] --
1,212,054 UART: [ldev] ++
1,212,222 UART: [ldev] CDI.KEYID = 6
1,212,585 UART: [ldev] SUBJECT.KEYID = 5
1,213,011 UART: [ldev] AUTHORITY.KEYID = 7
1,213,474 UART: [ldev] FE.KEYID = 1
1,218,676 UART: [ldev] Erasing FE.KEYID = 1
1,244,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,634 UART: [ldev] --
1,283,985 UART: [fwproc] Wait for Commands...
1,284,647 UART: [fwproc] Recv command 0x46574c44
1,285,375 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,771 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,860 >>> mbox cmd response: success
2,788,116 UART: [afmc] ++
2,788,284 UART: [afmc] CDI.KEYID = 6
2,788,646 UART: [afmc] SUBJECT.KEYID = 7
2,789,071 UART: [afmc] AUTHORITY.KEYID = 5
2,824,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,384 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,103 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,799 UART: [afmc] --
2,867,891 UART: [cold-reset] --
2,868,833 UART: [state] Locking Datavault
2,870,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,758 UART: [state] Locking ICCM
2,871,380 UART: [exit] Launching FMC @ 0x40000130
2,876,709 UART:
2,876,725 UART: Running Caliptra FMC ...
2,877,133 UART:
2,877,276 UART: [state] CFI Enabled
2,887,667 UART: [fht] FMC Alias Private Key: 7
2,995,236 UART: [art] Extend RT PCRs Done
2,995,664 UART: [art] Lock RT PCRs Done
2,997,032 UART: [art] Populate DV Done
3,005,225 UART: [fht] FMC Alias Private Key: 7
3,006,231 UART: [art] Derive CDI
3,006,511 UART: [art] Store in in slot 0x4
3,092,558 UART: [art] Derive Key Pair
3,092,918 UART: [art] Store priv key in slot 0x5
3,106,266 UART: [art] Derive Key Pair - Done
3,121,514 UART: [art] Signing Cert with AUTHO
3,121,994 UART: RITY.KEYID = 7
3,137,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,211 UART: [art] PUB.X = 0B4899D92FDAD3E5C0ED3103E296D33BB72AF51A15DAF62E746DAE0B64D76D274F15D0E5D312A62E0CA183929FDD1E05
3,144,982 UART: [art] PUB.Y = 0ABD1188B78E214FD116CDAAFDF5762A2E1D6017038A93F324B48B9CDA84F4361164D6D6EF9BCB088DFDD0FFCDD0B91F
3,151,947 UART: [art] SIG.R = E70A386AFF17106E8A4CEFC70043C3B37CAA717999D15B57EDD9899B31D3E60C29DCD7568ADCEB413330123B3879FB72
3,158,699 UART: [art] SIG.S = 574263E9F1CD2AFDCB8C0D47B63DE1D376B6FE711B5AB5D047B5639B5E1DBEE977F0A9ECF8ABD9D8C5587DC88F9D55DD
3,182,345 UART: Caliptra RT
3,182,690 UART: [state] CFI Enabled
3,291,253 UART: [rt] RT listening for mailbox commands...
3,291,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,725 UART: [rt]cmd =0x46504c54, len=4
3,322,865 >>> mbox cmd response data (8 bytes)
3,323,098 UART: [rt] FIPS self test
3,323,426 UART: [kat] ++
3,323,578 UART: [kat] sha1
3,327,697 UART: Fatal Error: 0x90060002
3,329,236 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,241 >>> mbox cmd response: failed
3,329,241 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,618 UART: [kat] SHA2-256
903,558 UART: [kat] SHA2-384
906,333 UART: [kat] SHA2-512-ACC
908,234 UART: [kat] ECC-384
918,139 UART: [kat] HMAC-384Kdf
922,919 UART: [kat] LMS
1,171,247 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,358 UART: [fht] FHT @ 0x50003400
1,174,915 UART: [idev] ++
1,175,083 UART: [idev] CDI.KEYID = 6
1,175,443 UART: [idev] SUBJECT.KEYID = 7
1,175,867 UART: [idev] UDS.KEYID = 0
1,176,212 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,975 UART: [idev] Erasing UDS.KEYID = 0
1,200,794 UART: [idev] Sha1 KeyId Algorithm
1,209,240 UART: [idev] --
1,210,318 UART: [ldev] ++
1,210,486 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,217,042 UART: [ldev] Erasing FE.KEYID = 1
1,242,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,237 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,221 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,296 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,268 ready_for_fw is high
1,061,268 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,131 >>> mbox cmd response: success
2,703,225 UART:
2,703,241 UART: Running Caliptra FMC ...
2,703,649 UART:
2,703,792 UART: [state] CFI Enabled
2,714,261 UART: [fht] FMC Alias Private Key: 7
2,822,326 UART: [art] Extend RT PCRs Done
2,822,754 UART: [art] Lock RT PCRs Done
2,824,448 UART: [art] Populate DV Done
2,832,499 UART: [fht] FMC Alias Private Key: 7
2,833,625 UART: [art] Derive CDI
2,833,905 UART: [art] Store in in slot 0x4
2,919,288 UART: [art] Derive Key Pair
2,919,648 UART: [art] Store priv key in slot 0x5
2,933,172 UART: [art] Derive Key Pair - Done
2,947,919 UART: [art] Signing Cert with AUTHO
2,948,399 UART: RITY.KEYID = 7
2,963,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,476 UART: [art] PUB.X = A33C6834ADCBF50403103F9D391CEF5D4999B0C9183B3AB00B84C8DF455F800E1A9922AF30D908993BF7A5E2A55AAA0C
2,971,240 UART: [art] PUB.Y = 77674598F602CD20872623E4E7F41A212DB79C565CD33010A746C27205E0F0D32A19E65A048DCED516B4EDA0CFB241FA
2,978,185 UART: [art] SIG.R = 2FC031FF42C293F0780A36A6BC16E91B8C7ACD0AFCCC8D89843201EF687E4F2DB1E3F7464E0CA0108FAB0BB0446DD929
2,984,958 UART: [art] SIG.S = 9B9E1AF4BB1DA514ED53B3593251E70EA24A880E9326E4594A76FB607C6CB71B66254BEA38816C09AE1F6555BC1CDBA9
3,008,904 UART: Caliptra RT
3,009,249 UART: [state] CFI Enabled
3,116,766 UART: [rt] RT listening for mailbox commands...
3,117,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,340 UART: [rt]cmd =0x46504c54, len=4
3,148,314 >>> mbox cmd response data (8 bytes)
3,148,539 UART: [rt] FIPS self test
3,148,867 UART: [kat] ++
3,149,019 UART: [kat] sha1
3,153,460 UART: Fatal Error: 0x90060002
3,154,999 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,004 >>> mbox cmd response: failed
3,155,004 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,870 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,641,241 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,313 UART: [cold-reset] ++
1,169,859 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 ready_for_fw is high
1,174,001 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,209 UART: [idev] Sha1 KeyId Algorithm
1,207,109 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,914 UART: [ldev] --
1,280,260 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,097 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,781,315 >>> mbox cmd response: success
2,782,476 UART: [afmc] ++
2,782,644 UART: [afmc] CDI.KEYID = 6
2,783,007 UART: [afmc] SUBJECT.KEYID = 7
2,783,433 UART: [afmc] AUTHORITY.KEYID = 5
2,818,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,887 UART: [afmc] --
2,861,901 UART: [cold-reset] --
2,862,761 UART: [state] Locking Datavault
2,863,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,468 UART: [state] Locking ICCM
2,864,898 UART: [exit] Launching FMC @ 0x40000130
2,870,227 UART:
2,870,243 UART: Running Caliptra FMC ...
2,870,651 UART:
2,870,705 UART: [state] CFI Enabled
2,881,282 UART: [fht] FMC Alias Private Key: 7
2,989,629 UART: [art] Extend RT PCRs Done
2,990,057 UART: [art] Lock RT PCRs Done
2,991,535 UART: [art] Populate DV Done
2,999,738 UART: [fht] FMC Alias Private Key: 7
3,000,874 UART: [art] Derive CDI
3,001,154 UART: [art] Store in in slot 0x4
3,086,947 UART: [art] Derive Key Pair
3,087,307 UART: [art] Store priv key in slot 0x5
3,100,459 UART: [art] Derive Key Pair - Done
3,115,151 UART: [art] Signing Cert with AUTHO
3,115,631 UART: RITY.KEYID = 7
3,130,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,356 UART: [art] PUB.X = 83D73C12DC98C2782D703E68DB102172586D39D0D78986D0AFE95404FBA1B597106B486C3BD018B37AFFA41A1EA90594
3,138,122 UART: [art] PUB.Y = 78CD34AC42B11DE76F1752003E80486E40DCD0E1BB0FDADCE2DF2A643757894A725ABBDBB019F96EF286E528A8869E56
3,145,061 UART: [art] SIG.R = 177A9899265E495442E9D49391513C9EC1C508CF9F7C73A0CEB3DE0EB21289BC3415B3F916D909883A6F9EE992278749
3,151,818 UART: [art] SIG.S = 7210BA7A0C1DE3C72ABD5AB28FAD9614CA979B5ED7EA85562469433A8910AF1ECB3EB8E023A23AFF1D4241DF1D82AA34
3,175,464 UART: Caliptra RT
3,175,717 UART: [state] CFI Enabled
3,283,626 UART: [rt] RT listening for mailbox commands...
3,284,289 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,064 UART: [rt]cmd =0x46504c54, len=4
3,315,298 >>> mbox cmd response data (8 bytes)
3,315,553 UART: [rt] FIPS self test
3,315,881 UART: [kat] ++
3,316,033 UART: [kat] sha1
3,320,284 UART: Fatal Error: 0x90060002
3,321,823 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,828 >>> mbox cmd response: failed
3,321,828 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,476 UART: [ldev] --
1,279,956 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,397 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,551 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,874 ready_for_fw is high
1,055,874 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,903 >>> mbox cmd response: success
2,697,177 UART:
2,697,193 UART: Running Caliptra FMC ...
2,697,601 UART:
2,697,655 UART: [state] CFI Enabled
2,708,346 UART: [fht] FMC Alias Private Key: 7
2,816,523 UART: [art] Extend RT PCRs Done
2,816,951 UART: [art] Lock RT PCRs Done
2,818,327 UART: [art] Populate DV Done
2,826,370 UART: [fht] FMC Alias Private Key: 7
2,827,300 UART: [art] Derive CDI
2,827,580 UART: [art] Store in in slot 0x4
2,913,127 UART: [art] Derive Key Pair
2,913,487 UART: [art] Store priv key in slot 0x5
2,926,781 UART: [art] Derive Key Pair - Done
2,941,556 UART: [art] Signing Cert with AUTHO
2,942,036 UART: RITY.KEYID = 7
2,957,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,191 UART: [art] PUB.X = FACD6F52DE130E2589ABCDDEC226603F9E50E84AB2DC68D5B86EE8B3A3FFD2E47072D16C037D9795D73CBB8605E0FF6E
2,964,976 UART: [art] PUB.Y = 666BA2DC8406FB98CB849E8046643D12CEEA32D32828E03988621CD4F21604EF1639418826980B74FCA6BB17DC4CD83A
2,971,919 UART: [art] SIG.R = 3D66D02B81471DACC8E0127E9659225933266090A63395C36B8BEC64A308DF3446A04B78988152E3D9B15172F967D60E
2,978,673 UART: [art] SIG.S = AAE6149E66D515D0ACAB37BDE694C2EF0091E43DA70B60609BA4D78B7D30ADF9C03C600AAF64E72A13F36554E5E07B39
3,002,314 UART: Caliptra RT
3,002,567 UART: [state] CFI Enabled
3,110,404 UART: [rt] RT listening for mailbox commands...
3,111,067 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,040 UART: [rt]cmd =0x46504c54, len=4
3,142,072 >>> mbox cmd response data (8 bytes)
3,142,273 UART: [rt] FIPS self test
3,142,601 UART: [kat] ++
3,142,753 UART: [kat] sha1
3,147,028 UART: Fatal Error: 0x90060002
3,148,567 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,572 >>> mbox cmd response: failed
3,148,572 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,048 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,665 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,681 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,470 UART: [cold-reset] ++
1,169,810 UART: [fht] FHT @ 0x50003400
1,172,262 UART: [idev] ++
1,172,430 UART: [idev] CDI.KEYID = 6
1,172,791 UART: [idev] SUBJECT.KEYID = 7
1,173,216 UART: [idev] UDS.KEYID = 0
1,173,562 ready_for_fw is high
1,173,562 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,608 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,171 UART: [ldev] Erasing FE.KEYID = 1
1,241,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,577 UART: [ldev] --
1,281,029 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,348 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,512 >>> mbox cmd response: success
2,784,555 UART: [afmc] ++
2,784,723 UART: [afmc] CDI.KEYID = 6
2,785,086 UART: [afmc] SUBJECT.KEYID = 7
2,785,512 UART: [afmc] AUTHORITY.KEYID = 5
2,820,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,750 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,398 UART: [afmc] --
2,864,470 UART: [cold-reset] --
2,865,224 UART: [state] Locking Datavault
2,866,303 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,907 UART: [state] Locking ICCM
2,867,419 UART: [exit] Launching FMC @ 0x40000130
2,872,748 UART:
2,872,764 UART: Running Caliptra FMC ...
2,873,172 UART:
2,873,315 UART: [state] CFI Enabled
2,883,762 UART: [fht] FMC Alias Private Key: 7
2,991,669 UART: [art] Extend RT PCRs Done
2,992,097 UART: [art] Lock RT PCRs Done
2,993,591 UART: [art] Populate DV Done
3,002,204 UART: [fht] FMC Alias Private Key: 7
3,003,150 UART: [art] Derive CDI
3,003,430 UART: [art] Store in in slot 0x4
3,089,039 UART: [art] Derive Key Pair
3,089,399 UART: [art] Store priv key in slot 0x5
3,103,003 UART: [art] Derive Key Pair - Done
3,117,990 UART: [art] Signing Cert with AUTHO
3,118,470 UART: RITY.KEYID = 7
3,133,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,407 UART: [art] PUB.X = 92DE066374CFC3CF88F1D23724BE7ABCCAE14263CB189E79BEA6A7D661F17C8FE1AF1A363A2D939BCADB74A30F3F084C
3,141,192 UART: [art] PUB.Y = 9BA8ABE776AC69A808D0D341E2B74C7DA6E0A963B0FD33BE9A603E32422165CBFE9ECA6CFE68709A8C3BE7AF10C2D349
3,148,161 UART: [art] SIG.R = 974431416BEA950BADD927932CC2F477BC33D626759487BA60BE0B2FE1C008BD14F9DF9013428AC2B2594D105F517569
3,154,922 UART: [art] SIG.S = 25CA67E1F937792F9D78A46054717AF98ED8F102D5CF71D415A665289E638571703191DF7939DF7773C7A71853D0D67E
3,178,378 UART: Caliptra RT
3,178,723 UART: [state] CFI Enabled
3,286,932 UART: [rt] RT listening for mailbox commands...
3,287,595 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,308 UART: [rt]cmd =0x46504c54, len=4
3,318,438 >>> mbox cmd response data (8 bytes)
3,318,783 UART: [rt] FIPS self test
3,319,111 UART: [kat] ++
3,319,263 UART: [kat] sha1
3,323,372 UART: Fatal Error: 0x90060002
3,324,911 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,916 >>> mbox cmd response: failed
3,324,916 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,363 UART: [kat] LMS
1,168,675 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,960 UART: [fht] FHT @ 0x50003400
1,172,682 UART: [idev] ++
1,172,850 UART: [idev] CDI.KEYID = 6
1,173,211 UART: [idev] SUBJECT.KEYID = 7
1,173,636 UART: [idev] UDS.KEYID = 0
1,173,982 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,460 UART: [fwproc] Recv command 0x46574c44
1,283,193 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,592 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,670 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,305 ready_for_fw is high
1,056,305 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,969 >>> mbox cmd response: success
2,697,081 UART:
2,697,097 UART: Running Caliptra FMC ...
2,697,505 UART:
2,697,648 UART: [state] CFI Enabled
2,707,899 UART: [fht] FMC Alias Private Key: 7
2,816,920 UART: [art] Extend RT PCRs Done
2,817,348 UART: [art] Lock RT PCRs Done
2,819,108 UART: [art] Populate DV Done
2,827,413 UART: [fht] FMC Alias Private Key: 7
2,828,541 UART: [art] Derive CDI
2,828,821 UART: [art] Store in in slot 0x4
2,914,520 UART: [art] Derive Key Pair
2,914,880 UART: [art] Store priv key in slot 0x5
2,928,064 UART: [art] Derive Key Pair - Done
2,942,875 UART: [art] Signing Cert with AUTHO
2,943,355 UART: RITY.KEYID = 7
2,958,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,412 UART: [art] PUB.X = A8C3EC2C0921B74AFE1EF8F2B9110E7B5130EE2BC4B8B56614725A8F6F20A7E06AA9A0622BF8A49F11BE45C6CDF66BDC
2,966,198 UART: [art] PUB.Y = EEDD695CCDF11C3AAE042C6B9D30BAB6518889AAA4A6BCB8903BDA1CD74F49A985AC3D93EFC696541D95EA16ABD85133
2,973,171 UART: [art] SIG.R = 904F65BE9F4105301212EB59931E4A1D480777753E5331EE5533F6C99B2B8D8CF0BDB723E68AA65B5C700867706634C1
2,979,926 UART: [art] SIG.S = 13C0A2C6A2DE913B9C138B1AE35A0017170B104C037062CA1AB37A923BC4A54F3161FA7C128C202C123FACF3B000771B
3,003,921 UART: Caliptra RT
3,004,266 UART: [state] CFI Enabled
3,112,645 UART: [rt] RT listening for mailbox commands...
3,113,308 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,361 UART: [rt]cmd =0x46504c54, len=4
3,144,449 >>> mbox cmd response data (8 bytes)
3,144,738 UART: [rt] FIPS self test
3,145,066 UART: [kat] ++
3,145,218 UART: [kat] sha1
3,149,505 UART: Fatal Error: 0x90060002
3,151,044 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,049 >>> mbox cmd response: failed
3,151,049 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,759 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,375 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,670 >>> mbox cmd response: failed
85,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,353 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,219 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,986 >>> mbox cmd response: failed
85,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,209 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,993 >>> mbox cmd response: failed
85,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,146 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,181 >>> mbox cmd response: failed
86,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,092 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,316 >>> mbox cmd response: failed
86,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,725 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,664 >>> mbox cmd response: failed
85,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,075 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,477 >>> mbox cmd response: failed
86,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,074 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,261 >>> mbox cmd response: failed
86,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,890 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,566 >>> mbox cmd response: failed
85,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,521 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,414 >>> mbox cmd response: failed
86,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,727 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,123 >>> mbox cmd response: failed
86,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,274 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,473 >>> mbox cmd response: failed
86,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,332 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,427 UART: [kat] SHA2-256
892,365 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,862 UART: [kat] HMAC-384Kdf
907,574 UART: [kat] LMS
1,475,770 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,886 UART: [idev] ++
1,480,054 UART: [idev] CDI.KEYID = 6
1,480,414 UART: [idev] SUBJECT.KEYID = 7
1,480,838 UART: [idev] UDS.KEYID = 0
1,481,183 ready_for_fw is high
1,481,183 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,950 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,236 UART: [idev] --
1,515,263 UART: [ldev] ++
1,515,431 UART: [ldev] CDI.KEYID = 6
1,515,794 UART: [ldev] SUBJECT.KEYID = 5
1,516,220 UART: [ldev] AUTHORITY.KEYID = 7
1,516,683 UART: [ldev] FE.KEYID = 1
1,521,753 UART: [ldev] Erasing FE.KEYID = 1
1,547,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,294 UART: [ldev] --
1,586,661 UART: [fwproc] Waiting for Commands...
1,587,484 UART: [fwproc] Received command 0x46574c44
1,588,275 UART: [fwproc] Received Image of size 115196 bytes
2,896,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,724 >>> mbox cmd response: success
3,091,894 UART: [afmc] ++
3,092,062 UART: [afmc] CDI.KEYID = 6
3,092,424 UART: [afmc] SUBJECT.KEYID = 7
3,092,849 UART: [afmc] AUTHORITY.KEYID = 5
3,127,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,790 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,403 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,093 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,986 UART: [afmc] --
3,171,106 UART: [cold-reset] --
3,171,998 UART: [state] Locking Datavault
3,172,947 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,551 UART: [state] Locking ICCM
3,173,989 UART: [exit] Launching FMC @ 0x40000130
3,179,318 UART:
3,179,334 UART: Running Caliptra FMC ...
3,179,742 UART:
3,179,796 UART: [state] CFI Enabled
3,190,279 UART: [fht] FMC Alias Private Key: 7
3,298,198 UART: [art] Extend RT PCRs Done
3,298,626 UART: [art] Lock RT PCRs Done
3,300,338 UART: [art] Populate DV Done
3,308,515 UART: [fht] FMC Alias Private Key: 7
3,309,491 UART: [art] Derive CDI
3,309,771 UART: [art] Store in in slot 0x4
3,395,508 UART: [art] Derive Key Pair
3,395,868 UART: [art] Store priv key in slot 0x5
3,408,452 UART: [art] Derive Key Pair - Done
3,423,189 UART: [art] Signing Cert with AUTHO
3,423,669 UART: RITY.KEYID = 7
3,439,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,948 UART: [art] PUB.X = 484D32865DED48A7E3CD53787E0435C5F1444F3DF309D311549AB45998B1429BB4F95BC824E44CF0A64FFD7AC4E51355
3,446,716 UART: [art] PUB.Y = 1CE88B392D25AE12D55062243634142CC61912E1814829D9FB50EF1566405E42A26D1404B505BAC85932506167216F02
3,453,641 UART: [art] SIG.R = 571ADEBF2FBF924D3C6231D8C880A1822E1ACA522122C6092BE3FC955876D47575D0D3987207CF528392D12E3D2D86CA
3,460,409 UART: [art] SIG.S = 79E269133E2BA96A21B6D942A22BE1A7BCBF7EAAD1DF507B0AE1BA6033E2F9B2DF567DE6FE2D739E8ABC6602439814BC
3,484,040 UART: Caliptra RT
3,484,293 UART: [state] CFI Enabled
3,592,299 UART: [rt] RT listening for mailbox commands...
3,592,962 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,725 UART: [rt]cmd =0x46504c54, len=4
3,623,945 >>> mbox cmd response data (8 bytes)
3,624,248 UART: [rt] FIPS self test
3,624,576 UART: [kat] ++
3,624,728 UART: [kat] sha1
3,629,048 UART: [kat] SHA2-256
3,629,604 UART: Fatal Error: 0x90010001
3,631,143 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,148 >>> mbox cmd response: failed
3,631,148 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,900 UART: [kat] LMS
1,475,096 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,287 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,414 UART: [idev] --
1,514,383 UART: [ldev] ++
1,514,551 UART: [ldev] CDI.KEYID = 6
1,514,914 UART: [ldev] SUBJECT.KEYID = 5
1,515,340 UART: [ldev] AUTHORITY.KEYID = 7
1,515,803 UART: [ldev] FE.KEYID = 1
1,520,959 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,474 UART: [ldev] --
1,585,931 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 115196 bytes
2,895,901 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,172 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,915 ready_for_fw is high
1,361,915 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,466 >>> mbox cmd response: success
3,000,206 UART:
3,000,222 UART: Running Caliptra FMC ...
3,000,630 UART:
3,000,684 UART: [state] CFI Enabled
3,011,231 UART: [fht] FMC Alias Private Key: 7
3,119,946 UART: [art] Extend RT PCRs Done
3,120,374 UART: [art] Lock RT PCRs Done
3,122,174 UART: [art] Populate DV Done
3,130,169 UART: [fht] FMC Alias Private Key: 7
3,131,291 UART: [art] Derive CDI
3,131,571 UART: [art] Store in in slot 0x4
3,216,940 UART: [art] Derive Key Pair
3,217,300 UART: [art] Store priv key in slot 0x5
3,230,646 UART: [art] Derive Key Pair - Done
3,245,522 UART: [art] Signing Cert with AUTHO
3,246,002 UART: RITY.KEYID = 7
3,261,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,057 UART: [art] PUB.X = E66AFB6008C1836CD31D5BA5E8C99889CDBEDB5C6EA0674459F6F2134CA0DE55FC5DC2394AE4BB1AE9C22271FA8C3864
3,268,844 UART: [art] PUB.Y = A01A21065D59FBE409D57139FB7F7B0960A893DEF522494DEFE22EB4319A8FA439B41F78CB13B71041452F061E193D05
3,275,781 UART: [art] SIG.R = A2D6D4B8E1340228FD1C21EAEC5430C7384384C389D36D7C7A0D9E3EF55F318AA1A4388D51C8E9AECA6CBF1650A21FBB
3,282,563 UART: [art] SIG.S = ED5E0E7892A06F9C3797562FE4A7CECE96D717238A352121CDE27C030061B397A3E907CD99B9E477BAC991807B2A21E1
3,306,317 UART: Caliptra RT
3,306,570 UART: [state] CFI Enabled
3,415,192 UART: [rt] RT listening for mailbox commands...
3,415,855 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,772 UART: [rt]cmd =0x46504c54, len=4
3,446,932 >>> mbox cmd response data (8 bytes)
3,447,275 UART: [rt] FIPS self test
3,447,603 UART: [kat] ++
3,447,755 UART: [kat] sha1
3,451,927 UART: [kat] SHA2-256
3,452,467 UART: Fatal Error: 0x90010001
3,454,006 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,011 >>> mbox cmd response: failed
3,454,011 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,227 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,936 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,681 UART: [kat] LMS
1,475,877 UART: [kat] --
1,476,874 UART: [cold-reset] ++
1,477,204 UART: [fht] Storing FHT @ 0x50003400
1,479,969 UART: [idev] ++
1,480,137 UART: [idev] CDI.KEYID = 6
1,480,497 UART: [idev] SUBJECT.KEYID = 7
1,480,921 UART: [idev] UDS.KEYID = 0
1,481,266 ready_for_fw is high
1,481,266 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,505,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,615 UART: [idev] --
1,515,804 UART: [ldev] ++
1,515,972 UART: [ldev] CDI.KEYID = 6
1,516,335 UART: [ldev] SUBJECT.KEYID = 5
1,516,761 UART: [ldev] AUTHORITY.KEYID = 7
1,517,224 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,548,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,907 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,821 UART: [fwproc] Received command 0x46574c44
1,588,612 UART: [fwproc] Received Image of size 115196 bytes
2,896,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,141 >>> mbox cmd response: success
3,091,393 UART: [afmc] ++
3,091,561 UART: [afmc] CDI.KEYID = 6
3,091,923 UART: [afmc] SUBJECT.KEYID = 7
3,092,348 UART: [afmc] AUTHORITY.KEYID = 5
3,127,627 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,346 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,036 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,981 UART: [afmc] --
3,170,893 UART: [cold-reset] --
3,171,679 UART: [state] Locking Datavault
3,172,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,490 UART: [state] Locking ICCM
3,173,910 UART: [exit] Launching FMC @ 0x40000130
3,179,239 UART:
3,179,255 UART: Running Caliptra FMC ...
3,179,663 UART:
3,179,806 UART: [state] CFI Enabled
3,190,593 UART: [fht] FMC Alias Private Key: 7
3,298,674 UART: [art] Extend RT PCRs Done
3,299,102 UART: [art] Lock RT PCRs Done
3,300,692 UART: [art] Populate DV Done
3,308,747 UART: [fht] FMC Alias Private Key: 7
3,309,833 UART: [art] Derive CDI
3,310,113 UART: [art] Store in in slot 0x4
3,395,580 UART: [art] Derive Key Pair
3,395,940 UART: [art] Store priv key in slot 0x5
3,408,920 UART: [art] Derive Key Pair - Done
3,423,671 UART: [art] Signing Cert with AUTHO
3,424,151 UART: RITY.KEYID = 7
3,439,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,366 UART: [art] PUB.X = 22513C26640F497A739CC9230EC0B438165E46EE3906DE6D851FD6C334E302E02DDCAC7B815155850D43F06B6A622B26
3,447,119 UART: [art] PUB.Y = 6931DEA10B1799FFC15518301D3B3E95C5B168C2687FC77930C2178745DA8738DE7F6275EF265EBE2BF59F76201247A8
3,454,064 UART: [art] SIG.R = 8DE15B315BACD626E05D5E9EE8E909FE16D9B7C025C7D3481A10E82A3D5C58831B3FDB575C8D206E962BA8C3A2C0260E
3,460,842 UART: [art] SIG.S = 76C2FF58F669656D7F35C122C27B4B74B99492D800F86B5AF2B14D7D9541619BCEFD69C98C1846E917273E733D916617
3,484,071 UART: Caliptra RT
3,484,416 UART: [state] CFI Enabled
3,593,649 UART: [rt] RT listening for mailbox commands...
3,594,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,189 UART: [rt]cmd =0x46504c54, len=4
3,625,193 >>> mbox cmd response data (8 bytes)
3,625,538 UART: [rt] FIPS self test
3,625,866 UART: [kat] ++
3,626,018 UART: [kat] sha1
3,630,258 UART: [kat] SHA2-256
3,630,800 UART: Fatal Error: 0x90010001
3,632,339 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,344 >>> mbox cmd response: failed
3,632,344 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,327 UART: [kat] SHA2-512-ACC
897,228 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,960 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,480,047 UART: [idev] ++
1,480,215 UART: [idev] CDI.KEYID = 6
1,480,575 UART: [idev] SUBJECT.KEYID = 7
1,480,999 UART: [idev] UDS.KEYID = 0
1,481,344 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,197 UART: [idev] --
1,515,358 UART: [ldev] ++
1,515,526 UART: [ldev] CDI.KEYID = 6
1,515,889 UART: [ldev] SUBJECT.KEYID = 5
1,516,315 UART: [ldev] AUTHORITY.KEYID = 7
1,516,778 UART: [ldev] FE.KEYID = 1
1,521,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,571 UART: [ldev] --
1,586,858 UART: [fwproc] Waiting for Commands...
1,587,523 UART: [fwproc] Received command 0x46574c44
1,588,314 UART: [fwproc] Received Image of size 115196 bytes
2,895,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,530 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,097 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,008 ready_for_fw is high
1,363,008 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,623 >>> mbox cmd response: success
3,002,003 UART:
3,002,019 UART: Running Caliptra FMC ...
3,002,427 UART:
3,002,570 UART: [state] CFI Enabled
3,012,859 UART: [fht] FMC Alias Private Key: 7
3,120,642 UART: [art] Extend RT PCRs Done
3,121,070 UART: [art] Lock RT PCRs Done
3,122,806 UART: [art] Populate DV Done
3,130,653 UART: [fht] FMC Alias Private Key: 7
3,131,751 UART: [art] Derive CDI
3,132,031 UART: [art] Store in in slot 0x4
3,217,884 UART: [art] Derive Key Pair
3,218,244 UART: [art] Store priv key in slot 0x5
3,231,808 UART: [art] Derive Key Pair - Done
3,246,568 UART: [art] Signing Cert with AUTHO
3,247,048 UART: RITY.KEYID = 7
3,262,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,105 UART: [art] PUB.X = 66822B5AAB11482C00776B295DF8BC1F7D23A238EA5AFFC698B72E3FD15732FA273F1B79F154E5B5CAD60F34BA23A004
3,269,859 UART: [art] PUB.Y = A9E9E9B687004364AEFA550A394DAFD10C15391D6A913F42DFAAE34117F8862F1A04EA49DAD8C13AE0CAFBD5AF87E2E9
3,276,800 UART: [art] SIG.R = 9F8820CE21C065837FC9C64E47C24ED163F695EEBCEA13107F3B7F9D994B84131188D7F5755E3CEBE61B3191B39643F6
3,283,574 UART: [art] SIG.S = 1E10608F9AAFCC0CEAD6C7525D525F9E2EADD99B87DC90209FC8571A6487AEBBF8D63EF8CCD9AE7FD99B4317AFAFF3F7
3,307,144 UART: Caliptra RT
3,307,489 UART: [state] CFI Enabled
3,416,966 UART: [rt] RT listening for mailbox commands...
3,417,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,498 UART: [rt]cmd =0x46504c54, len=4
3,448,582 >>> mbox cmd response data (8 bytes)
3,448,921 UART: [rt] FIPS self test
3,449,249 UART: [kat] ++
3,449,401 UART: [kat] sha1
3,453,557 UART: [kat] SHA2-256
3,454,125 UART: Fatal Error: 0x90010001
3,455,664 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,669 >>> mbox cmd response: failed
3,455,669 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,835 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
893,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,717 UART: [kat] ++
897,869 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,868 UART: [kat] SHA2-512-ACC
908,769 UART: [kat] ECC-384
918,958 UART: [kat] HMAC-384Kdf
923,560 UART: [kat] LMS
1,171,888 UART: [kat] --
1,172,473 UART: [cold-reset] ++
1,173,021 UART: [fht] FHT @ 0x50003400
1,175,772 UART: [idev] ++
1,175,940 UART: [idev] CDI.KEYID = 6
1,176,300 UART: [idev] SUBJECT.KEYID = 7
1,176,724 UART: [idev] UDS.KEYID = 0
1,177,069 ready_for_fw is high
1,177,069 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,784 UART: [idev] Erasing UDS.KEYID = 0
1,201,727 UART: [idev] Sha1 KeyId Algorithm
1,210,145 UART: [idev] --
1,210,997 UART: [ldev] ++
1,211,165 UART: [ldev] CDI.KEYID = 6
1,211,528 UART: [ldev] SUBJECT.KEYID = 5
1,211,954 UART: [ldev] AUTHORITY.KEYID = 7
1,212,417 UART: [ldev] FE.KEYID = 1
1,217,583 UART: [ldev] Erasing FE.KEYID = 1
1,243,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,967 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,742 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,911 >>> mbox cmd response: success
2,786,135 UART: [afmc] ++
2,786,303 UART: [afmc] CDI.KEYID = 6
2,786,665 UART: [afmc] SUBJECT.KEYID = 7
2,787,090 UART: [afmc] AUTHORITY.KEYID = 5
2,822,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,824 UART: [afmc] --
2,865,842 UART: [cold-reset] --
2,866,496 UART: [state] Locking Datavault
2,867,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,421 UART: [state] Locking ICCM
2,868,997 UART: [exit] Launching FMC @ 0x40000130
2,874,326 UART:
2,874,342 UART: Running Caliptra FMC ...
2,874,750 UART:
2,874,804 UART: [state] CFI Enabled
2,885,321 UART: [fht] FMC Alias Private Key: 7
2,993,624 UART: [art] Extend RT PCRs Done
2,994,052 UART: [art] Lock RT PCRs Done
2,995,694 UART: [art] Populate DV Done
3,003,495 UART: [fht] FMC Alias Private Key: 7
3,004,609 UART: [art] Derive CDI
3,004,889 UART: [art] Store in in slot 0x4
3,090,462 UART: [art] Derive Key Pair
3,090,822 UART: [art] Store priv key in slot 0x5
3,103,928 UART: [art] Derive Key Pair - Done
3,118,591 UART: [art] Signing Cert with AUTHO
3,119,071 UART: RITY.KEYID = 7
3,134,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,094 UART: [art] PUB.X = 7E9C6E507328958DBEB67BE525E4F3EB56A1DC3BD7FF2F10B77EC4151AFD9AAA167A57F6F232AE90B93FF6EC8BE1DE49
3,141,890 UART: [art] PUB.Y = FDDDB412261D3C2F45BE797890DCD662EFCAD729141297BBA1A842C507BA396FEF298495A7F833688C1451680873BBC5
3,148,840 UART: [art] SIG.R = B79EA66E27E228BE101C8CFAE18CBF77DFF05F80967C39B5AEC3CDE9F9CEDD508935561C5F3B8FD109F029BB0FFFF101
3,155,627 UART: [art] SIG.S = 2B60111676363277083A2903259C9D823C62386D6D1AA243CC493B67A0C8AC29AB8BC84C4A7B485C4557ABBE0767A50B
3,179,978 UART: Caliptra RT
3,180,231 UART: [state] CFI Enabled
3,287,728 UART: [rt] RT listening for mailbox commands...
3,288,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,624 UART: [rt]cmd =0x46504c54, len=4
3,319,562 >>> mbox cmd response data (8 bytes)
3,319,853 UART: [rt] FIPS self test
3,320,181 UART: [kat] ++
3,320,333 UART: [kat] sha1
3,324,689 UART: [kat] SHA2-256
3,325,091 UART: Fatal Error: 0x90010001
3,326,630 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,635 >>> mbox cmd response: failed
3,326,635 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
893,044 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,169 UART: [kat] ++
897,321 UART: [kat] sha1
901,563 UART: [kat] SHA2-256
903,503 UART: [kat] SHA2-384
906,480 UART: [kat] SHA2-512-ACC
908,381 UART: [kat] ECC-384
918,108 UART: [kat] HMAC-384Kdf
922,886 UART: [kat] LMS
1,171,214 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,443 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,914 UART: [idev] Erasing UDS.KEYID = 0
1,200,843 UART: [idev] Sha1 KeyId Algorithm
1,209,337 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,217,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,864 UART: [fwproc] Wait for Commands...
1,283,640 UART: [fwproc] Recv command 0x46574c44
1,284,368 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,898 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,937 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,609 ready_for_fw is high
1,060,609 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,816 >>> mbox cmd response: success
2,701,038 UART:
2,701,054 UART: Running Caliptra FMC ...
2,701,462 UART:
2,701,516 UART: [state] CFI Enabled
2,711,779 UART: [fht] FMC Alias Private Key: 7
2,819,508 UART: [art] Extend RT PCRs Done
2,819,936 UART: [art] Lock RT PCRs Done
2,821,410 UART: [art] Populate DV Done
2,829,957 UART: [fht] FMC Alias Private Key: 7
2,831,105 UART: [art] Derive CDI
2,831,385 UART: [art] Store in in slot 0x4
2,916,888 UART: [art] Derive Key Pair
2,917,248 UART: [art] Store priv key in slot 0x5
2,930,370 UART: [art] Derive Key Pair - Done
2,945,055 UART: [art] Signing Cert with AUTHO
2,945,535 UART: RITY.KEYID = 7
2,960,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,746 UART: [art] PUB.X = 25CF86B7A37825D5E8334F82045FFB38286775F32BFB50B981AE7F60616FB70A1771B022A49C0B459216F12B8458A8FF
2,968,505 UART: [art] PUB.Y = 9F9873A61F634C4EBA2554671A36CDB2974CA9F642F401DC1677F443698055E560995525898C2EAD1EB6B7AC6E69AD44
2,975,452 UART: [art] SIG.R = 9A86D4841D32BC792C03A45185617673AF1569D7B47268FE71DED2266B789063AD5B2BC27D823CB3697641A15D74571F
2,982,213 UART: [art] SIG.S = E5C4189372AD757EDA78CF481B5A2D80EBF085D8CBFB58F09AD7E4390E7C8C0544473276211DEFA12883A04354FBB352
3,005,612 UART: Caliptra RT
3,005,865 UART: [state] CFI Enabled
3,113,061 UART: [rt] RT listening for mailbox commands...
3,113,724 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,489 UART: [rt]cmd =0x46504c54, len=4
3,144,691 >>> mbox cmd response data (8 bytes)
3,144,872 UART: [rt] FIPS self test
3,145,200 UART: [kat] ++
3,145,352 UART: [kat] sha1
3,149,412 UART: [kat] SHA2-256
3,150,008 UART: Fatal Error: 0x90010001
3,151,547 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,552 >>> mbox cmd response: failed
3,151,552 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,247 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,804 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,497 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 ready_for_fw is high
1,176,650 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,435 UART: [idev] Erasing UDS.KEYID = 0
1,201,204 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,794 UART: [ldev] ++
1,210,962 UART: [ldev] CDI.KEYID = 6
1,211,325 UART: [ldev] SUBJECT.KEYID = 5
1,211,751 UART: [ldev] AUTHORITY.KEYID = 7
1,212,214 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,244,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,072 UART: [ldev] --
1,283,481 UART: [fwproc] Wait for Commands...
1,284,119 UART: [fwproc] Recv command 0x46574c44
1,284,847 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,057 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,108 >>> mbox cmd response: success
2,787,320 UART: [afmc] ++
2,787,488 UART: [afmc] CDI.KEYID = 6
2,787,850 UART: [afmc] SUBJECT.KEYID = 7
2,788,275 UART: [afmc] AUTHORITY.KEYID = 5
2,823,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,375 UART: [afmc] --
2,867,407 UART: [cold-reset] --
2,868,275 UART: [state] Locking Datavault
2,869,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,008 UART: [state] Locking ICCM
2,870,512 UART: [exit] Launching FMC @ 0x40000130
2,875,841 UART:
2,875,857 UART: Running Caliptra FMC ...
2,876,265 UART:
2,876,408 UART: [state] CFI Enabled
2,887,345 UART: [fht] FMC Alias Private Key: 7
2,994,922 UART: [art] Extend RT PCRs Done
2,995,350 UART: [art] Lock RT PCRs Done
2,996,802 UART: [art] Populate DV Done
3,005,175 UART: [fht] FMC Alias Private Key: 7
3,006,111 UART: [art] Derive CDI
3,006,391 UART: [art] Store in in slot 0x4
3,091,812 UART: [art] Derive Key Pair
3,092,172 UART: [art] Store priv key in slot 0x5
3,105,548 UART: [art] Derive Key Pair - Done
3,120,536 UART: [art] Signing Cert with AUTHO
3,121,016 UART: RITY.KEYID = 7
3,136,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,461 UART: [art] PUB.X = C6A4CF0586B326DB05B1631CA2A0134F1CFBE645B602DF90DB09B7C342BDE0A8412FA915CAE1B0564314D7342FDC109B
3,144,233 UART: [art] PUB.Y = 920968F57CF46DFDE5E262C249D5549F067026D1565847E3BB9EA719B20A8BC485847794804B0192F086BDE262591F16
3,151,163 UART: [art] SIG.R = 4BACF21C79F618256F00E149CDB92D7623752603939F453D00A68AC0BE9A40060C185A3C2480E2FE5D64EDB3BD8F9D63
3,157,886 UART: [art] SIG.S = 6487C10AD5A62A09D49C3BCCAC75FF3A44C7E2FE93FE4BB457181F9BE6B002A9DD962792B1D980EE294ED8C2CE11D528
3,181,340 UART: Caliptra RT
3,181,685 UART: [state] CFI Enabled
3,290,232 UART: [rt] RT listening for mailbox commands...
3,290,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,902 UART: [rt]cmd =0x46504c54, len=4
3,322,032 >>> mbox cmd response data (8 bytes)
3,322,351 UART: [rt] FIPS self test
3,322,679 UART: [kat] ++
3,322,831 UART: [kat] sha1
3,327,151 UART: [kat] SHA2-256
3,327,531 UART: Fatal Error: 0x90010001
3,329,070 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,075 >>> mbox cmd response: failed
3,329,075 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,951 UART: [state] LifecycleState = Unprovisioned
86,606 UART: [state] DebugLocked = No
87,284 UART: [state] WD Timer not started. Device not locked for debugging
88,455 UART: [kat] SHA2-256
894,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,230 UART: [kat] ++
898,382 UART: [kat] sha1
902,590 UART: [kat] SHA2-256
904,530 UART: [kat] SHA2-384
907,177 UART: [kat] SHA2-512-ACC
909,078 UART: [kat] ECC-384
918,889 UART: [kat] HMAC-384Kdf
923,523 UART: [kat] LMS
1,171,851 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,707 UART: [idev] ++
1,175,875 UART: [idev] CDI.KEYID = 6
1,176,235 UART: [idev] SUBJECT.KEYID = 7
1,176,659 UART: [idev] UDS.KEYID = 0
1,177,004 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,627 UART: [idev] Erasing UDS.KEYID = 0
1,201,848 UART: [idev] Sha1 KeyId Algorithm
1,210,254 UART: [idev] --
1,211,216 UART: [ldev] ++
1,211,384 UART: [ldev] CDI.KEYID = 6
1,211,747 UART: [ldev] SUBJECT.KEYID = 5
1,212,173 UART: [ldev] AUTHORITY.KEYID = 7
1,212,636 UART: [ldev] FE.KEYID = 1
1,218,080 UART: [ldev] Erasing FE.KEYID = 1
1,244,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,400 UART: [ldev] --
1,283,689 UART: [fwproc] Wait for Commands...
1,284,357 UART: [fwproc] Recv command 0x46574c44
1,285,085 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,889 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,012 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,772 ready_for_fw is high
1,061,772 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,257 >>> mbox cmd response: success
2,702,681 UART:
2,702,697 UART: Running Caliptra FMC ...
2,703,105 UART:
2,703,248 UART: [state] CFI Enabled
2,713,679 UART: [fht] FMC Alias Private Key: 7
2,821,770 UART: [art] Extend RT PCRs Done
2,822,198 UART: [art] Lock RT PCRs Done
2,824,030 UART: [art] Populate DV Done
2,832,419 UART: [fht] FMC Alias Private Key: 7
2,833,409 UART: [art] Derive CDI
2,833,689 UART: [art] Store in in slot 0x4
2,919,190 UART: [art] Derive Key Pair
2,919,550 UART: [art] Store priv key in slot 0x5
2,932,594 UART: [art] Derive Key Pair - Done
2,947,336 UART: [art] Signing Cert with AUTHO
2,947,816 UART: RITY.KEYID = 7
2,963,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,843 UART: [art] PUB.X = 349977124576ADDBB5507D2D8165818805CFAD9BE0D31E3842913DB63A0722471CFB93F5EDA0EC5D23301F4C7A7727D8
2,970,609 UART: [art] PUB.Y = CB6EDB9F26354C32893F12B9235CF2CC8EBD4C808D90430C73FF15E638DCA3DC8ABC2EC98D51343C432C901C52E361A8
2,977,570 UART: [art] SIG.R = B613CDF8217A69A91A4779E7F88E5A30D6444E5E5F90392B750FD8A0C7A22C6CFEA537075D7C47C2BDD7E09534ED610D
2,984,341 UART: [art] SIG.S = 0787706E82CF44257DAC4243F62554BE1208E0798E6334D8D5C60DF746A5632ED84312020D7DA11406BFB47C1C3E45DA
3,008,634 UART: Caliptra RT
3,008,979 UART: [state] CFI Enabled
3,115,524 UART: [rt] RT listening for mailbox commands...
3,116,187 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,190 UART: [rt]cmd =0x46504c54, len=4
3,147,302 >>> mbox cmd response data (8 bytes)
3,147,451 UART: [rt] FIPS self test
3,147,779 UART: [kat] ++
3,147,931 UART: [kat] sha1
3,152,179 UART: [kat] SHA2-256
3,152,743 UART: Fatal Error: 0x90010001
3,154,282 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,287 >>> mbox cmd response: failed
3,154,287 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,210 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,621 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,174,073 ready_for_fw is high
1,174,073 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,237 UART: [idev] --
1,208,086 UART: [ldev] ++
1,208,254 UART: [ldev] CDI.KEYID = 6
1,208,618 UART: [ldev] SUBJECT.KEYID = 5
1,209,045 UART: [ldev] AUTHORITY.KEYID = 7
1,209,508 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,818 UART: [ldev] --
1,280,118 UART: [fwproc] Wait for Commands...
1,280,877 UART: [fwproc] Recv command 0x46574c44
1,281,610 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,293 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,511 >>> mbox cmd response: success
2,785,688 UART: [afmc] ++
2,785,856 UART: [afmc] CDI.KEYID = 6
2,786,219 UART: [afmc] SUBJECT.KEYID = 7
2,786,645 UART: [afmc] AUTHORITY.KEYID = 5
2,821,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,750 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,637 UART: [afmc] --
2,864,757 UART: [cold-reset] --
2,865,581 UART: [state] Locking Datavault
2,866,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,088 UART: [state] Locking ICCM
2,867,672 UART: [exit] Launching FMC @ 0x40000130
2,873,001 UART:
2,873,017 UART: Running Caliptra FMC ...
2,873,425 UART:
2,873,479 UART: [state] CFI Enabled
2,884,166 UART: [fht] FMC Alias Private Key: 7
2,992,435 UART: [art] Extend RT PCRs Done
2,992,863 UART: [art] Lock RT PCRs Done
2,994,497 UART: [art] Populate DV Done
3,002,996 UART: [fht] FMC Alias Private Key: 7
3,004,028 UART: [art] Derive CDI
3,004,308 UART: [art] Store in in slot 0x4
3,089,637 UART: [art] Derive Key Pair
3,089,997 UART: [art] Store priv key in slot 0x5
3,103,049 UART: [art] Derive Key Pair - Done
3,117,719 UART: [art] Signing Cert with AUTHO
3,118,199 UART: RITY.KEYID = 7
3,133,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,046 UART: [art] PUB.X = A897557BF93676292C9C13D8E592828A753E98ADE845F90E4DFA5662D71941FDCBD0979ABFD13BB9A396BEF8BDEB76B3
3,140,827 UART: [art] PUB.Y = D2E05EC9C2AB92D1312588E4E9851379C29984D5754C1BE35F747CC588F2B351D60B12B5ED8A071694BAC0EEADCC1CEF
3,147,785 UART: [art] SIG.R = 69272816C977C3E669A3E83A7CD0E7EA2B6162E2127E02E3D5ACD891E3AC09447DBC3377B05FB838E3F56F156E449182
3,154,551 UART: [art] SIG.S = B216DA657FCF1234F44FC956D9469A47D46A0897246946CF16159E57E57E039F891BF4F5E5124B68A0D57C316AA7988E
3,179,030 UART: Caliptra RT
3,179,283 UART: [state] CFI Enabled
3,285,948 UART: [rt] RT listening for mailbox commands...
3,286,611 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,572 UART: [rt]cmd =0x46504c54, len=4
3,317,782 >>> mbox cmd response data (8 bytes)
3,318,081 UART: [rt] FIPS self test
3,318,409 UART: [kat] ++
3,318,561 UART: [kat] sha1
3,322,709 UART: [kat] SHA2-256
3,323,279 UART: Fatal Error: 0x90010001
3,324,818 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,823 >>> mbox cmd response: failed
3,324,823 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,324,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
890,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,949 UART: [kat] ++
895,101 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,156 UART: [kat] LMS
1,168,468 UART: [kat] --
1,169,207 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,173,817 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,345 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,240,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,540 UART: [ldev] --
1,279,832 UART: [fwproc] Wait for Commands...
1,280,601 UART: [fwproc] Recv command 0x46574c44
1,281,334 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,631 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,751 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,292 ready_for_fw is high
1,056,292 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,633 >>> mbox cmd response: success
2,696,165 UART:
2,696,181 UART: Running Caliptra FMC ...
2,696,589 UART:
2,696,643 UART: [state] CFI Enabled
2,707,378 UART: [fht] FMC Alias Private Key: 7
2,815,631 UART: [art] Extend RT PCRs Done
2,816,059 UART: [art] Lock RT PCRs Done
2,817,857 UART: [art] Populate DV Done
2,826,082 UART: [fht] FMC Alias Private Key: 7
2,827,076 UART: [art] Derive CDI
2,827,356 UART: [art] Store in in slot 0x4
2,913,101 UART: [art] Derive Key Pair
2,913,461 UART: [art] Store priv key in slot 0x5
2,926,829 UART: [art] Derive Key Pair - Done
2,941,641 UART: [art] Signing Cert with AUTHO
2,942,121 UART: RITY.KEYID = 7
2,957,443 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,208 UART: [art] PUB.X = 1369DD4D1A5705BDC2B6CA161A02467EA606F8A6E0CAEC5020267DDE55AD1FDD01D44152E8BEB5221D0DFAB54B68EE50
2,964,983 UART: [art] PUB.Y = 17FDCD168BD0EE354E76870CD200C896F3D5B7B2D600EC970257BABAF49105A543CEFB26E02579C5BA6D8FB35E0A996C
2,971,893 UART: [art] SIG.R = D2AC7F589400E289423C71F26560BD6E0A44C7298E4F8FCC08124468E4AAD691F096F52D0A688CA093D6AB2871A2019F
2,978,631 UART: [art] SIG.S = 618CE12B5EA704B23289C07C56B42651E77E439D4D7A73992F2495E0E044CBB9B1D575865BFAD7AAE0D852D9751B1F9E
3,001,937 UART: Caliptra RT
3,002,190 UART: [state] CFI Enabled
3,110,011 UART: [rt] RT listening for mailbox commands...
3,110,674 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,667 UART: [rt]cmd =0x46504c54, len=4
3,141,827 >>> mbox cmd response data (8 bytes)
3,142,124 UART: [rt] FIPS self test
3,142,452 UART: [kat] ++
3,142,604 UART: [kat] sha1
3,146,956 UART: [kat] SHA2-256
3,147,400 UART: Fatal Error: 0x90010001
3,148,939 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,944 >>> mbox cmd response: failed
3,148,944 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,526 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,945 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,746 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,675 UART: [ldev] --
1,283,165 UART: [fwproc] Wait for Commands...
1,283,754 UART: [fwproc] Recv command 0x46574c44
1,284,487 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,660 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,890 >>> mbox cmd response: success
2,787,981 UART: [afmc] ++
2,788,149 UART: [afmc] CDI.KEYID = 6
2,788,512 UART: [afmc] SUBJECT.KEYID = 7
2,788,938 UART: [afmc] AUTHORITY.KEYID = 5
2,824,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,043 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,358 UART: [afmc] --
2,868,424 UART: [cold-reset] --
2,869,270 UART: [state] Locking Datavault
2,870,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,071 UART: [state] Locking ICCM
2,871,547 UART: [exit] Launching FMC @ 0x40000130
2,876,876 UART:
2,876,892 UART: Running Caliptra FMC ...
2,877,300 UART:
2,877,443 UART: [state] CFI Enabled
2,888,034 UART: [fht] FMC Alias Private Key: 7
2,995,875 UART: [art] Extend RT PCRs Done
2,996,303 UART: [art] Lock RT PCRs Done
2,997,817 UART: [art] Populate DV Done
3,006,108 UART: [fht] FMC Alias Private Key: 7
3,007,058 UART: [art] Derive CDI
3,007,338 UART: [art] Store in in slot 0x4
3,093,397 UART: [art] Derive Key Pair
3,093,757 UART: [art] Store priv key in slot 0x5
3,107,331 UART: [art] Derive Key Pair - Done
3,122,187 UART: [art] Signing Cert with AUTHO
3,122,667 UART: RITY.KEYID = 7
3,137,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,712 UART: [art] PUB.X = 5CC7DFD014CF2BF4AEAB6AFBD2A8F1159890C9C6AEB3422D6784BAE682CC8F7380F6C79C74FB1B69F179F15B84ECCFA5
3,145,510 UART: [art] PUB.Y = 6F2CE1FD56D39B0A9D47E3284EEBED931D1681184893663948C4349F88DAB6321C292CB86079DDB3D90CEDC3C1A55786
3,152,460 UART: [art] SIG.R = 9826AE3D0A7DC80D77B68D516E4E25C39508AD549C90A2872BB5937B6DCDA78EA927E41CE9EC584D4242969A17BE1A33
3,159,229 UART: [art] SIG.S = 2055B15CF9DBC021A73BB570943FFB7B69601478F68A45D583A8839CD382E302AD1D8870C11E931C928F69E59D50B712
3,183,387 UART: Caliptra RT
3,183,732 UART: [state] CFI Enabled
3,291,523 UART: [rt] RT listening for mailbox commands...
3,292,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,169 UART: [rt]cmd =0x46504c54, len=4
3,323,385 >>> mbox cmd response data (8 bytes)
3,323,742 UART: [rt] FIPS self test
3,324,070 UART: [kat] ++
3,324,222 UART: [kat] sha1
3,328,262 UART: [kat] SHA2-256
3,328,668 UART: Fatal Error: 0x90010001
3,330,207 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,212 >>> mbox cmd response: failed
3,330,212 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,174,090 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,456 UART: [idev] Erasing UDS.KEYID = 0
1,198,592 UART: [idev] Sha1 KeyId Algorithm
1,207,624 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,215,171 UART: [ldev] Erasing FE.KEYID = 1
1,241,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,128 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,222 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,371 ready_for_fw is high
1,056,371 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,128 >>> mbox cmd response: success
2,696,568 UART:
2,696,584 UART: Running Caliptra FMC ...
2,696,992 UART:
2,697,135 UART: [state] CFI Enabled
2,708,214 UART: [fht] FMC Alias Private Key: 7
2,816,373 UART: [art] Extend RT PCRs Done
2,816,801 UART: [art] Lock RT PCRs Done
2,818,297 UART: [art] Populate DV Done
2,826,568 UART: [fht] FMC Alias Private Key: 7
2,827,530 UART: [art] Derive CDI
2,827,810 UART: [art] Store in in slot 0x4
2,913,781 UART: [art] Derive Key Pair
2,914,141 UART: [art] Store priv key in slot 0x5
2,927,699 UART: [art] Derive Key Pair - Done
2,942,300 UART: [art] Signing Cert with AUTHO
2,942,780 UART: RITY.KEYID = 7
2,957,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,747 UART: [art] PUB.X = 60C49E4D0CFA0742839C3FBC4C7B3E30054BFC91E7DEB7454FD348DED5AF979B3ED05FB72D2CB910C480E6A41398E45D
2,965,526 UART: [art] PUB.Y = 6C1FBF2AA38037ECC056A46FD0F634A5CC123ED440C7B5DD5D9B6022C92BC0EACD62E7C97CAF9C3128BE215A0A3E65A5
2,972,497 UART: [art] SIG.R = 6FB5D8503A9198E9E694D06D178613201ECC93F457A2E39F71DCA6B24A31D3D062BA5E8C0366E565BE479439A1D7C32C
2,979,268 UART: [art] SIG.S = CD8253CEACCC0D97D4A6CAF3981EA84B91EB8EA95C3A5987E6F19DC57FBD9D4054FA1E5EAE33B10E56DEA899E47A48A8
3,002,977 UART: Caliptra RT
3,003,322 UART: [state] CFI Enabled
3,111,023 UART: [rt] RT listening for mailbox commands...
3,111,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,427 UART: [rt]cmd =0x46504c54, len=4
3,142,637 >>> mbox cmd response data (8 bytes)
3,142,930 UART: [rt] FIPS self test
3,143,258 UART: [kat] ++
3,143,410 UART: [kat] sha1
3,147,708 UART: [kat] SHA2-256
3,148,098 UART: Fatal Error: 0x90010001
3,149,637 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,642 >>> mbox cmd response: failed
3,149,642 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,805 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,166 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,430 >>> mbox cmd response: failed
87,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,675 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,356 >>> mbox cmd response: failed
87,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,095 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,869 >>> mbox cmd response: failed
87,869 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,550 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,739 >>> mbox cmd response: failed
87,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,030 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,378 >>> mbox cmd response: failed
87,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,929 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,462 >>> mbox cmd response: failed
87,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,607 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,821 >>> mbox cmd response: failed
87,821 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,754 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,883 >>> mbox cmd response: failed
87,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,360 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,728 >>> mbox cmd response: failed
87,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,695 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,608 >>> mbox cmd response: failed
87,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,645 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,563 >>> mbox cmd response: failed
87,563 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,518 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,825 >>> mbox cmd response: failed
87,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,848 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,345 UART: [kat] SHA2-256
881,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,391 UART: [kat] ++
885,543 UART: [kat] sha1
889,743 UART: [kat] SHA2-256
891,681 UART: [kat] SHA2-384
894,244 UART: [kat] SHA2-512-ACC
896,145 UART: [kat] ECC-384
902,030 UART: [kat] HMAC-384Kdf
906,546 UART: [kat] LMS
1,474,742 UART: [kat] --
1,475,525 UART: [cold-reset] ++
1,475,897 UART: [fht] Storing FHT @ 0x50003400
1,478,654 UART: [idev] ++
1,478,822 UART: [idev] CDI.KEYID = 6
1,479,182 UART: [idev] SUBJECT.KEYID = 7
1,479,606 UART: [idev] UDS.KEYID = 0
1,479,951 ready_for_fw is high
1,479,951 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,508 UART: [idev] Erasing UDS.KEYID = 0
1,504,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,036 UART: [idev] --
1,514,231 UART: [ldev] ++
1,514,399 UART: [ldev] CDI.KEYID = 6
1,514,762 UART: [ldev] SUBJECT.KEYID = 5
1,515,188 UART: [ldev] AUTHORITY.KEYID = 7
1,515,651 UART: [ldev] FE.KEYID = 1
1,520,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,298 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 115196 bytes
2,895,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,841 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,424 >>> mbox cmd response: success
3,090,544 UART: [afmc] ++
3,090,712 UART: [afmc] CDI.KEYID = 6
3,091,074 UART: [afmc] SUBJECT.KEYID = 7
3,091,499 UART: [afmc] AUTHORITY.KEYID = 5
3,126,736 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,049 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,739 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,572 UART: [afmc] --
3,169,620 UART: [cold-reset] --
3,170,694 UART: [state] Locking Datavault
3,171,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,401 UART: [state] Locking ICCM
3,173,059 UART: [exit] Launching FMC @ 0x40000130
3,178,388 UART:
3,178,404 UART: Running Caliptra FMC ...
3,178,812 UART:
3,178,866 UART: [state] CFI Enabled
3,189,473 UART: [fht] FMC Alias Private Key: 7
3,296,960 UART: [art] Extend RT PCRs Done
3,297,388 UART: [art] Lock RT PCRs Done
3,298,660 UART: [art] Populate DV Done
3,306,911 UART: [fht] FMC Alias Private Key: 7
3,307,989 UART: [art] Derive CDI
3,308,269 UART: [art] Store in in slot 0x4
3,394,098 UART: [art] Derive Key Pair
3,394,458 UART: [art] Store priv key in slot 0x5
3,407,496 UART: [art] Derive Key Pair - Done
3,422,422 UART: [art] Signing Cert with AUTHO
3,422,902 UART: RITY.KEYID = 7
3,437,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,655 UART: [art] PUB.X = 24E90B0C831898480B651EDB2806B725016898DFC2BAAB49E61C3B80B4AA7F717FF4E62EBA0A6082102B529D28C132D7
3,445,411 UART: [art] PUB.Y = 87F8F2760548EEF8F052CF5FE12B25B0DE6A9DF257BD6AE21D59EAC3F1BCA4F719AEB5E532D77227B37AC1A279C4B32A
3,452,380 UART: [art] SIG.R = 6ED44C53CF67CFF1645D61BFE8C9E021201F407A337338F09A0539683C3724D94A22DF1EBB7709B92F1F690A5916258C
3,459,141 UART: [art] SIG.S = 2FBBF1636EB8256C0963CF22242C77970CDF7C71EF7CB97DD527785D789E73AF1440FA673027EB3746CDBF022D979C7B
3,482,867 UART: Caliptra RT
3,483,120 UART: [state] CFI Enabled
3,591,726 UART: [rt] RT listening for mailbox commands...
3,592,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,040 UART: [rt]cmd =0x46504c54, len=4
3,623,214 >>> mbox cmd response data (8 bytes)
3,623,407 UART: [rt] FIPS self test
3,623,735 UART: [kat] ++
3,623,887 UART: [kat] sha1
3,628,137 UART: [kat] SHA2-256
3,630,227 UART: Fatal Error: 0x90010002
3,631,766 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,771 >>> mbox cmd response: failed
3,631,771 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,631,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,303 UART: [kat] SHA2-256
882,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,349 UART: [kat] ++
886,501 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,326 UART: [kat] SHA2-512-ACC
897,227 UART: [kat] ECC-384
902,828 UART: [kat] HMAC-384Kdf
907,506 UART: [kat] LMS
1,475,702 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,408 UART: [idev] Erasing UDS.KEYID = 0
1,504,710 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,232 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,520,669 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,524 UART: [ldev] --
1,585,791 UART: [fwproc] Waiting for Commands...
1,586,510 UART: [fwproc] Received command 0x46574c44
1,587,301 UART: [fwproc] Received Image of size 115196 bytes
2,896,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,242 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,971 ready_for_fw is high
1,362,971 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,960 >>> mbox cmd response: success
3,002,360 UART:
3,002,376 UART: Running Caliptra FMC ...
3,002,784 UART:
3,002,838 UART: [state] CFI Enabled
3,013,159 UART: [fht] FMC Alias Private Key: 7
3,121,432 UART: [art] Extend RT PCRs Done
3,121,860 UART: [art] Lock RT PCRs Done
3,123,544 UART: [art] Populate DV Done
3,131,851 UART: [fht] FMC Alias Private Key: 7
3,132,925 UART: [art] Derive CDI
3,133,205 UART: [art] Store in in slot 0x4
3,218,956 UART: [art] Derive Key Pair
3,219,316 UART: [art] Store priv key in slot 0x5
3,232,996 UART: [art] Derive Key Pair - Done
3,247,722 UART: [art] Signing Cert with AUTHO
3,248,202 UART: RITY.KEYID = 7
3,263,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,247 UART: [art] PUB.X = F6119429B35CDAF8F574BE56207AEBB1656C0A67A915C1602ADD607F60D240E6AF365DEEA704461728B50F4AA08320AB
3,271,016 UART: [art] PUB.Y = 1BCB237655A40D6CC0AAAA8C597C11139D4B286FDAEC727E3A31EBD64DA9F3494E6ABB271F3219D0E1B8AB983A01D07D
3,277,980 UART: [art] SIG.R = 8EBB932013CE249F7BA6158DE3359BBCD7904DF6B37B53D9D465F89A62D324E62B053C6BD242CCD8DF02414C1413D03B
3,284,754 UART: [art] SIG.S = C3CE79F452EC4040EAF2B0467DABF06A7F682DBC5027C85BBB7F20900BA9F77B81672DE9074D474FA73513417CD3DFB7
3,308,291 UART: Caliptra RT
3,308,544 UART: [state] CFI Enabled
3,417,192 UART: [rt] RT listening for mailbox commands...
3,417,855 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,806 UART: [rt]cmd =0x46504c54, len=4
3,448,928 >>> mbox cmd response data (8 bytes)
3,449,163 UART: [rt] FIPS self test
3,449,491 UART: [kat] ++
3,449,643 UART: [kat] sha1
3,453,983 UART: [kat] SHA2-256
3,456,021 UART: Fatal Error: 0x90010002
3,457,560 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,565 >>> mbox cmd response: failed
3,457,565 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,539 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,478 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,213 UART: [kat] SHA2-512-ACC
897,114 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,215 UART: [kat] LMS
1,475,411 UART: [kat] --
1,476,436 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,725 UART: [idev] ++
1,479,893 UART: [idev] CDI.KEYID = 6
1,480,253 UART: [idev] SUBJECT.KEYID = 7
1,480,677 UART: [idev] UDS.KEYID = 0
1,481,022 ready_for_fw is high
1,481,022 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,657 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,650 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,075 UART: [ldev] --
1,586,382 UART: [fwproc] Waiting for Commands...
1,587,151 UART: [fwproc] Received command 0x46574c44
1,587,942 UART: [fwproc] Received Image of size 115196 bytes
2,895,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,110 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,583 >>> mbox cmd response: success
3,090,679 UART: [afmc] ++
3,090,847 UART: [afmc] CDI.KEYID = 6
3,091,209 UART: [afmc] SUBJECT.KEYID = 7
3,091,634 UART: [afmc] AUTHORITY.KEYID = 5
3,126,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,195 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,588 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,278 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,161 UART: [afmc] --
3,170,121 UART: [cold-reset] --
3,170,823 UART: [state] Locking Datavault
3,171,954 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,558 UART: [state] Locking ICCM
3,172,994 UART: [exit] Launching FMC @ 0x40000130
3,178,323 UART:
3,178,339 UART: Running Caliptra FMC ...
3,178,747 UART:
3,178,890 UART: [state] CFI Enabled
3,189,397 UART: [fht] FMC Alias Private Key: 7
3,297,806 UART: [art] Extend RT PCRs Done
3,298,234 UART: [art] Lock RT PCRs Done
3,299,810 UART: [art] Populate DV Done
3,308,009 UART: [fht] FMC Alias Private Key: 7
3,309,077 UART: [art] Derive CDI
3,309,357 UART: [art] Store in in slot 0x4
3,395,150 UART: [art] Derive Key Pair
3,395,510 UART: [art] Store priv key in slot 0x5
3,408,752 UART: [art] Derive Key Pair - Done
3,423,654 UART: [art] Signing Cert with AUTHO
3,424,134 UART: RITY.KEYID = 7
3,439,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,393 UART: [art] PUB.X = 75802B9ADF7C76D3F4AC6AF316E0648CFD6C466E9D35B7F71BF2E68837C245C5DA849A1EC4F9AE27B8D53B5592D17EB6
3,447,179 UART: [art] PUB.Y = DF50C210A4499F277DED9CFAE5C8659EF30246E2DE4C80BA42744F84DF1415D77F449522B43D09307D6779F3170A537A
3,454,122 UART: [art] SIG.R = 5F0745DA3C13F390725CFD901E241AD68EBF2CF4BC28A8F62E4483B681BC555DD959B3F7FDA9A4E2468599A8C445417E
3,460,899 UART: [art] SIG.S = F244338D2D6280B3277CE936F141B83A7DB0EEFA76D9334972AC8026649D04B96A8F040A88C9DA3127213F32047E4886
3,484,330 UART: Caliptra RT
3,484,675 UART: [state] CFI Enabled
3,594,106 UART: [rt] RT listening for mailbox commands...
3,594,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,508 UART: [rt]cmd =0x46504c54, len=4
3,625,584 >>> mbox cmd response data (8 bytes)
3,625,857 UART: [rt] FIPS self test
3,626,185 UART: [kat] ++
3,626,337 UART: [kat] sha1
3,630,711 UART: [kat] SHA2-256
3,632,611 UART: Fatal Error: 0x90010002
3,634,150 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,155 >>> mbox cmd response: failed
3,634,155 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
891,116 UART: [kat] SHA2-256
893,054 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,325 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,048 UART: [cold-reset] ++
1,477,446 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,504,983 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,393 UART: [idev] --
1,514,380 UART: [ldev] ++
1,514,548 UART: [ldev] CDI.KEYID = 6
1,514,911 UART: [ldev] SUBJECT.KEYID = 5
1,515,337 UART: [ldev] AUTHORITY.KEYID = 7
1,515,800 UART: [ldev] FE.KEYID = 1
1,521,100 UART: [ldev] Erasing FE.KEYID = 1
1,546,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,229 UART: [ldev] --
1,585,684 UART: [fwproc] Waiting for Commands...
1,586,461 UART: [fwproc] Received command 0x46574c44
1,587,252 UART: [fwproc] Received Image of size 115196 bytes
2,895,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,172 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,643 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,832 ready_for_fw is high
1,363,832 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,843 >>> mbox cmd response: success
3,000,161 UART:
3,000,177 UART: Running Caliptra FMC ...
3,000,585 UART:
3,000,728 UART: [state] CFI Enabled
3,011,463 UART: [fht] FMC Alias Private Key: 7
3,119,900 UART: [art] Extend RT PCRs Done
3,120,328 UART: [art] Lock RT PCRs Done
3,122,070 UART: [art] Populate DV Done
3,130,011 UART: [fht] FMC Alias Private Key: 7
3,131,019 UART: [art] Derive CDI
3,131,299 UART: [art] Store in in slot 0x4
3,216,584 UART: [art] Derive Key Pair
3,216,944 UART: [art] Store priv key in slot 0x5
3,229,758 UART: [art] Derive Key Pair - Done
3,244,382 UART: [art] Signing Cert with AUTHO
3,244,862 UART: RITY.KEYID = 7
3,260,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,325 UART: [art] PUB.X = 5D6472199F7681A17A31BF10AD10C74BF671E36D0924D69A3BCA5D179D6A87BD1ADDF522615531337EADEA3F9E9EAF71
3,268,104 UART: [art] PUB.Y = 5A3BB4C7BA08C7D2F6553A70B209D4C034D0AC2FBCDDA1B165FACCC0C0D929E364BD093ED19EAB51E40B44458B1D45DF
3,275,068 UART: [art] SIG.R = 485EC450B5CE83C5A554148A5E245E22B8569EE2A0A207B19790872510A571A6668E14C6A175FD6D1B9444ADE85495D5
3,281,831 UART: [art] SIG.S = EA3735BF6E9438B09466A00B8CE65471FAB8685B1260FB085A8494FE674B5C9AC8493297C360B2591CB238F6E4060430
3,305,824 UART: Caliptra RT
3,306,169 UART: [state] CFI Enabled
3,414,636 UART: [rt] RT listening for mailbox commands...
3,415,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,878 UART: [rt]cmd =0x46504c54, len=4
3,446,036 >>> mbox cmd response data (8 bytes)
3,446,255 UART: [rt] FIPS self test
3,446,583 UART: [kat] ++
3,446,735 UART: [kat] sha1
3,451,025 UART: [kat] SHA2-256
3,452,993 UART: Fatal Error: 0x90010002
3,454,532 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,537 >>> mbox cmd response: failed
3,454,537 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,454,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,882 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,193 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
893,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,713 UART: [kat] ++
897,865 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,326 UART: [kat] HMAC-384Kdf
922,928 UART: [kat] LMS
1,171,256 UART: [kat] --
1,172,423 UART: [cold-reset] ++
1,172,767 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 ready_for_fw is high
1,176,583 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,529 UART: [idev] --
1,210,673 UART: [ldev] ++
1,210,841 UART: [ldev] CDI.KEYID = 6
1,211,204 UART: [ldev] SUBJECT.KEYID = 5
1,211,630 UART: [ldev] AUTHORITY.KEYID = 7
1,212,093 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,780 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,188 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,460 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,479 >>> mbox cmd response: success
2,787,663 UART: [afmc] ++
2,787,831 UART: [afmc] CDI.KEYID = 6
2,788,193 UART: [afmc] SUBJECT.KEYID = 7
2,788,618 UART: [afmc] AUTHORITY.KEYID = 5
2,823,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,830 UART: [afmc] --
2,866,882 UART: [cold-reset] --
2,867,522 UART: [state] Locking Datavault
2,868,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,351 UART: [state] Locking ICCM
2,869,933 UART: [exit] Launching FMC @ 0x40000130
2,875,262 UART:
2,875,278 UART: Running Caliptra FMC ...
2,875,686 UART:
2,875,740 UART: [state] CFI Enabled
2,885,945 UART: [fht] FMC Alias Private Key: 7
2,993,642 UART: [art] Extend RT PCRs Done
2,994,070 UART: [art] Lock RT PCRs Done
2,995,380 UART: [art] Populate DV Done
3,003,495 UART: [fht] FMC Alias Private Key: 7
3,004,441 UART: [art] Derive CDI
3,004,721 UART: [art] Store in in slot 0x4
3,090,004 UART: [art] Derive Key Pair
3,090,364 UART: [art] Store priv key in slot 0x5
3,103,420 UART: [art] Derive Key Pair - Done
3,118,430 UART: [art] Signing Cert with AUTHO
3,118,910 UART: RITY.KEYID = 7
3,134,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,857 UART: [art] PUB.X = 37ABFB7CD1CCBDABF43907FC1119DAFA36CB392B41BA00B83817C8F88EBA4D77715B84C0F56EAED6D4B241EF303B37C0
3,141,628 UART: [art] PUB.Y = 71A6BF8467789F8DAA4F35428DF5E64A19F205673007276629AE47BCE38641B05433FF266B948B7C2AA5A07DEA23E222
3,148,572 UART: [art] SIG.R = 676070644B663C12D29BB5F02F16B80D28B87181A37ACD6F223100959D1B2AE87F10D5A67E597E9C22D26457B5D3A37C
3,155,315 UART: [art] SIG.S = EFC446A6B8922660E44EFFBFB9493A418770F62033E6FB1E3CE987FBEA999E03269A57305DB97DA2BD7E78521DAB527E
3,179,611 UART: Caliptra RT
3,179,864 UART: [state] CFI Enabled
3,287,541 UART: [rt] RT listening for mailbox commands...
3,288,204 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,297 UART: [rt]cmd =0x46504c54, len=4
3,319,433 >>> mbox cmd response data (8 bytes)
3,319,700 UART: [rt] FIPS self test
3,320,028 UART: [kat] ++
3,320,180 UART: [kat] sha1
3,324,486 UART: [kat] SHA2-256
3,326,426 UART: Fatal Error: 0x90010002
3,327,965 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,970 >>> mbox cmd response: failed
3,327,970 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
917,638 UART: [kat] HMAC-384Kdf
922,096 UART: [kat] LMS
1,170,424 UART: [kat] --
1,171,401 UART: [cold-reset] ++
1,171,917 UART: [fht] FHT @ 0x50003400
1,174,618 UART: [idev] ++
1,174,786 UART: [idev] CDI.KEYID = 6
1,175,146 UART: [idev] SUBJECT.KEYID = 7
1,175,570 UART: [idev] UDS.KEYID = 0
1,175,915 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,021 UART: [idev] Sha1 KeyId Algorithm
1,208,481 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,082 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,766 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,436 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,653 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,889 ready_for_fw is high
1,060,889 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,282 >>> mbox cmd response: success
2,700,220 UART:
2,700,236 UART: Running Caliptra FMC ...
2,700,644 UART:
2,700,698 UART: [state] CFI Enabled
2,711,277 UART: [fht] FMC Alias Private Key: 7
2,819,430 UART: [art] Extend RT PCRs Done
2,819,858 UART: [art] Lock RT PCRs Done
2,821,718 UART: [art] Populate DV Done
2,829,777 UART: [fht] FMC Alias Private Key: 7
2,830,833 UART: [art] Derive CDI
2,831,113 UART: [art] Store in in slot 0x4
2,916,674 UART: [art] Derive Key Pair
2,917,034 UART: [art] Store priv key in slot 0x5
2,929,592 UART: [art] Derive Key Pair - Done
2,944,391 UART: [art] Signing Cert with AUTHO
2,944,871 UART: RITY.KEYID = 7
2,960,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,836 UART: [art] PUB.X = 1F223B859F4524F913F385F3933C91083ACB326A98E7FC87797F0CA92AA774084C9C7D9EAEA9C91E6E4CA4EEBB453B2A
2,967,609 UART: [art] PUB.Y = A05D57EE9433EDD365B305C27F261C6B0E9D3B943FD690501E046DF641CCE0D1295304600FB63B4FF74D87A6D446E874
2,974,548 UART: [art] SIG.R = 80AEC7AA0727952435CE51C84BD64FB4A73959027859E7199440137B4511F46015F36EDABD22772959445714DD2D420F
2,981,299 UART: [art] SIG.S = F8204672F30CD8411BD3EC58F2505009AF31C896BC2C8B0B9749EC1A2A1C89788624C2F20170A291411BA50212C9588F
3,005,385 UART: Caliptra RT
3,005,638 UART: [state] CFI Enabled
3,112,446 UART: [rt] RT listening for mailbox commands...
3,113,109 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,928 UART: [rt]cmd =0x46504c54, len=4
3,144,004 >>> mbox cmd response data (8 bytes)
3,144,333 UART: [rt] FIPS self test
3,144,661 UART: [kat] ++
3,144,813 UART: [kat] sha1
3,148,897 UART: [kat] SHA2-256
3,151,007 UART: Fatal Error: 0x90010002
3,152,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,551 >>> mbox cmd response: failed
3,152,551 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,346 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
893,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,124 UART: [kat] ++
898,276 UART: [kat] sha1
902,486 UART: [kat] SHA2-256
904,426 UART: [kat] SHA2-384
907,337 UART: [kat] SHA2-512-ACC
909,238 UART: [kat] ECC-384
919,329 UART: [kat] HMAC-384Kdf
923,911 UART: [kat] LMS
1,172,239 UART: [kat] --
1,173,304 UART: [cold-reset] ++
1,173,804 UART: [fht] FHT @ 0x50003400
1,176,431 UART: [idev] ++
1,176,599 UART: [idev] CDI.KEYID = 6
1,176,959 UART: [idev] SUBJECT.KEYID = 7
1,177,383 UART: [idev] UDS.KEYID = 0
1,177,728 ready_for_fw is high
1,177,728 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,211 UART: [idev] Erasing UDS.KEYID = 0
1,202,366 UART: [idev] Sha1 KeyId Algorithm
1,210,824 UART: [idev] --
1,211,832 UART: [ldev] ++
1,212,000 UART: [ldev] CDI.KEYID = 6
1,212,363 UART: [ldev] SUBJECT.KEYID = 5
1,212,789 UART: [ldev] AUTHORITY.KEYID = 7
1,213,252 UART: [ldev] FE.KEYID = 1
1,218,432 UART: [ldev] Erasing FE.KEYID = 1
1,244,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,018 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,073 UART: [fwproc] Recv command 0x46574c44
1,284,801 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,485 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,470 >>> mbox cmd response: success
2,786,654 UART: [afmc] ++
2,786,822 UART: [afmc] CDI.KEYID = 6
2,787,184 UART: [afmc] SUBJECT.KEYID = 7
2,787,609 UART: [afmc] AUTHORITY.KEYID = 5
2,822,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,691 UART: [afmc] --
2,865,749 UART: [cold-reset] --
2,866,593 UART: [state] Locking Datavault
2,867,738 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,342 UART: [state] Locking ICCM
2,868,964 UART: [exit] Launching FMC @ 0x40000130
2,874,293 UART:
2,874,309 UART: Running Caliptra FMC ...
2,874,717 UART:
2,874,860 UART: [state] CFI Enabled
2,885,163 UART: [fht] FMC Alias Private Key: 7
2,992,790 UART: [art] Extend RT PCRs Done
2,993,218 UART: [art] Lock RT PCRs Done
2,994,472 UART: [art] Populate DV Done
3,002,999 UART: [fht] FMC Alias Private Key: 7
3,004,041 UART: [art] Derive CDI
3,004,321 UART: [art] Store in in slot 0x4
3,089,898 UART: [art] Derive Key Pair
3,090,258 UART: [art] Store priv key in slot 0x5
3,103,612 UART: [art] Derive Key Pair - Done
3,118,450 UART: [art] Signing Cert with AUTHO
3,118,930 UART: RITY.KEYID = 7
3,134,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,275 UART: [art] PUB.X = BB6808C505492FECD5252BC969F606BC3DAB2BC284EE8C93FDC7E299F66C0FC6ECFE653B2282DCDDB4CFC313BAFA380E
3,142,060 UART: [art] PUB.Y = 92CC26BA8C3FCCE45D7006A2A7D7D2F804391373A2BDF7116887D9261221C0E9D4FDAD021F3D52F900FA6C0D17C26395
3,148,984 UART: [art] SIG.R = B4FB8A70E35423D2BE376F4EFDE4A408239A03CFFECB9694A5871EB6E2FDB518CB2EB0766A376C54C0D6F28599FCC160
3,155,766 UART: [art] SIG.S = 0A7B597369D1A69761C0F48DFE52CB1796D5273633CD1073090B1B3CAD316EC06ED5557B13EBCD91EF566EBA3C502F3E
3,179,510 UART: Caliptra RT
3,179,855 UART: [state] CFI Enabled
3,287,814 UART: [rt] RT listening for mailbox commands...
3,288,477 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,250 UART: [rt]cmd =0x46504c54, len=4
3,319,472 >>> mbox cmd response data (8 bytes)
3,319,711 UART: [rt] FIPS self test
3,320,039 UART: [kat] ++
3,320,191 UART: [kat] sha1
3,324,551 UART: [kat] SHA2-256
3,326,587 UART: Fatal Error: 0x90010002
3,328,126 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,131 >>> mbox cmd response: failed
3,328,131 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
893,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,158 UART: [kat] ++
897,310 UART: [kat] sha1
901,318 UART: [kat] SHA2-256
903,258 UART: [kat] SHA2-384
905,951 UART: [kat] SHA2-512-ACC
907,852 UART: [kat] ECC-384
917,947 UART: [kat] HMAC-384Kdf
922,477 UART: [kat] LMS
1,170,805 UART: [kat] --
1,171,866 UART: [cold-reset] ++
1,172,268 UART: [fht] FHT @ 0x50003400
1,174,951 UART: [idev] ++
1,175,119 UART: [idev] CDI.KEYID = 6
1,175,479 UART: [idev] SUBJECT.KEYID = 7
1,175,903 UART: [idev] UDS.KEYID = 0
1,176,248 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,057 UART: [idev] Erasing UDS.KEYID = 0
1,200,742 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,082 UART: [ldev] ++
1,210,250 UART: [ldev] CDI.KEYID = 6
1,210,613 UART: [ldev] SUBJECT.KEYID = 5
1,211,039 UART: [ldev] AUTHORITY.KEYID = 7
1,211,502 UART: [ldev] FE.KEYID = 1
1,216,768 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,706 UART: [ldev] --
1,282,013 UART: [fwproc] Wait for Commands...
1,282,719 UART: [fwproc] Recv command 0x46574c44
1,283,447 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,099 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,250 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 ready_for_fw is high
1,060,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,093 >>> mbox cmd response: success
2,700,253 UART:
2,700,269 UART: Running Caliptra FMC ...
2,700,677 UART:
2,700,820 UART: [state] CFI Enabled
2,711,337 UART: [fht] FMC Alias Private Key: 7
2,819,482 UART: [art] Extend RT PCRs Done
2,819,910 UART: [art] Lock RT PCRs Done
2,821,348 UART: [art] Populate DV Done
2,829,763 UART: [fht] FMC Alias Private Key: 7
2,830,941 UART: [art] Derive CDI
2,831,221 UART: [art] Store in in slot 0x4
2,916,586 UART: [art] Derive Key Pair
2,916,946 UART: [art] Store priv key in slot 0x5
2,930,124 UART: [art] Derive Key Pair - Done
2,944,798 UART: [art] Signing Cert with AUTHO
2,945,278 UART: RITY.KEYID = 7
2,960,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,591 UART: [art] PUB.X = 7DB59D9D3F7BF4BA09A4DD25C9481DCE9D881B5AD4A3CC3C9873B7C6A0AF78487E745F0CCA0E5FCBEFF39A2A2C25B751
2,968,380 UART: [art] PUB.Y = 71187AD6B13D1D0FC334AF7FC7639E8E6C7B9488B7384CE38BE96F62CC8F304D918D45D9B3859F3572ACEF2E629BD1CB
2,975,341 UART: [art] SIG.R = EC518AC63A6D689ABBFA00CA5F337C9CBCB0DE62F9CBB8EF8AB33AD6B3CB2048D59F16571BB37DE311A46330FAD402CF
2,982,116 UART: [art] SIG.S = 417E575BAE21C23B0E9C8D1B39523A25BD87D18352434124E9D2325B5B2533DB2B0ABF11E4D4B72368391775FA2163A0
3,005,639 UART: Caliptra RT
3,005,984 UART: [state] CFI Enabled
3,114,069 UART: [rt] RT listening for mailbox commands...
3,114,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,319 UART: [rt]cmd =0x46504c54, len=4
3,145,411 >>> mbox cmd response data (8 bytes)
3,145,560 UART: [rt] FIPS self test
3,145,888 UART: [kat] ++
3,146,040 UART: [kat] sha1
3,150,168 UART: [kat] SHA2-256
3,152,152 UART: Fatal Error: 0x90010002
3,153,691 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,696 >>> mbox cmd response: failed
3,153,696 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,782 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,323 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,174,167 ready_for_fw is high
1,174,167 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,117 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,320 UART: [fwproc] Wait for Commands...
1,281,067 UART: [fwproc] Recv command 0x46574c44
1,281,800 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,725 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,869 >>> mbox cmd response: success
2,784,038 UART: [afmc] ++
2,784,206 UART: [afmc] CDI.KEYID = 6
2,784,569 UART: [afmc] SUBJECT.KEYID = 7
2,784,995 UART: [afmc] AUTHORITY.KEYID = 5
2,820,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,271 UART: [afmc] --
2,864,325 UART: [cold-reset] --
2,865,145 UART: [state] Locking Datavault
2,866,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,080 UART: [state] Locking ICCM
2,867,732 UART: [exit] Launching FMC @ 0x40000130
2,873,061 UART:
2,873,077 UART: Running Caliptra FMC ...
2,873,485 UART:
2,873,539 UART: [state] CFI Enabled
2,884,078 UART: [fht] FMC Alias Private Key: 7
2,991,489 UART: [art] Extend RT PCRs Done
2,991,917 UART: [art] Lock RT PCRs Done
2,993,639 UART: [art] Populate DV Done
3,002,086 UART: [fht] FMC Alias Private Key: 7
3,003,206 UART: [art] Derive CDI
3,003,486 UART: [art] Store in in slot 0x4
3,089,527 UART: [art] Derive Key Pair
3,089,887 UART: [art] Store priv key in slot 0x5
3,103,403 UART: [art] Derive Key Pair - Done
3,118,253 UART: [art] Signing Cert with AUTHO
3,118,733 UART: RITY.KEYID = 7
3,133,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,302 UART: [art] PUB.X = 511BD2917EEC371B39C9401D26D576440801C1040FC4CE4F5598A614DB742FBBF41643250619C1C6116FD604681A2DDF
3,141,052 UART: [art] PUB.Y = 844401B1193F89BB67B3E1E5126BB618EDF4237B7C1DF1E74C780FDAF209F3C5CB93718816F1C53BA893D15F3838F6FA
3,148,001 UART: [art] SIG.R = 58CAE9475E456137B570B48BE7124291B63AD1472E2F3C34160B585416ECE88215833B56BF3D6C57085DF73DA52D5465
3,154,759 UART: [art] SIG.S = 06103B0392CE507DD41EB596522F7BDA2E13AF16663036E342D511C06C16038E740644BE28DD43702C5AAF1ECC199776
3,178,818 UART: Caliptra RT
3,179,071 UART: [state] CFI Enabled
3,286,884 UART: [rt] RT listening for mailbox commands...
3,287,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,186 UART: [rt]cmd =0x46504c54, len=4
3,318,380 >>> mbox cmd response data (8 bytes)
3,318,577 UART: [rt] FIPS self test
3,318,905 UART: [kat] ++
3,319,057 UART: [kat] sha1
3,323,393 UART: [kat] SHA2-256
3,325,403 UART: Fatal Error: 0x90010002
3,326,942 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,947 >>> mbox cmd response: failed
3,326,947 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,209,142 UART: [ldev] ++
1,209,310 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,101 UART: [ldev] AUTHORITY.KEYID = 7
1,210,564 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,574 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,011 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,189 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,134 ready_for_fw is high
1,056,134 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,145 >>> mbox cmd response: success
2,694,089 UART:
2,694,105 UART: Running Caliptra FMC ...
2,694,513 UART:
2,694,567 UART: [state] CFI Enabled
2,704,962 UART: [fht] FMC Alias Private Key: 7
2,813,251 UART: [art] Extend RT PCRs Done
2,813,679 UART: [art] Lock RT PCRs Done
2,815,317 UART: [art] Populate DV Done
2,823,744 UART: [fht] FMC Alias Private Key: 7
2,824,850 UART: [art] Derive CDI
2,825,130 UART: [art] Store in in slot 0x4
2,910,487 UART: [art] Derive Key Pair
2,910,847 UART: [art] Store priv key in slot 0x5
2,923,465 UART: [art] Derive Key Pair - Done
2,938,035 UART: [art] Signing Cert with AUTHO
2,938,515 UART: RITY.KEYID = 7
2,953,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,640 UART: [art] PUB.X = 9841A3A5F03EF4C46588E033C4F98ECAD8E7FEC8806ABCB2ACCFD055E02A9F27037805172D83B9CD86A42B8221C577EC
2,961,418 UART: [art] PUB.Y = 62DBC7FDB2F9663428379EBB4FFEF9CF524AE2B30810CDB34246FAFB82D94C82DC1279A8E6E062F5BED98B1F3649A6ED
2,968,387 UART: [art] SIG.R = 55CC001B3EF1BB74BFEF445D7B111BD6D1527CCD0744CAD64BA683DE2C0A9EDA659F36419EE1D10F8000E854F8F8628F
2,975,122 UART: [art] SIG.S = FE8C317D0351A6A0B82972FEBD4534103E70D87BFE3948C1702A974999CFCC02BFD8F79840B2E38C7D4159DD1D430FFA
2,998,660 UART: Caliptra RT
2,998,913 UART: [state] CFI Enabled
3,106,654 UART: [rt] RT listening for mailbox commands...
3,107,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,364 UART: [rt]cmd =0x46504c54, len=4
3,138,698 >>> mbox cmd response data (8 bytes)
3,139,009 UART: [rt] FIPS self test
3,139,337 UART: [kat] ++
3,139,489 UART: [kat] sha1
3,143,869 UART: [kat] SHA2-256
3,145,997 UART: Fatal Error: 0x90010002
3,147,536 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,541 >>> mbox cmd response: failed
3,147,541 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,702 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,773 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,174,992 ready_for_fw is high
1,174,992 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,584 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,352 UART: [fwproc] Recv command 0x46574c44
1,284,085 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,610 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,684 >>> mbox cmd response: success
2,787,727 UART: [afmc] ++
2,787,895 UART: [afmc] CDI.KEYID = 6
2,788,258 UART: [afmc] SUBJECT.KEYID = 7
2,788,684 UART: [afmc] AUTHORITY.KEYID = 5
2,824,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,528 UART: [afmc] --
2,867,654 UART: [cold-reset] --
2,868,686 UART: [state] Locking Datavault
2,870,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,641 UART: [state] Locking ICCM
2,871,223 UART: [exit] Launching FMC @ 0x40000130
2,876,552 UART:
2,876,568 UART: Running Caliptra FMC ...
2,876,976 UART:
2,877,119 UART: [state] CFI Enabled
2,887,458 UART: [fht] FMC Alias Private Key: 7
2,995,053 UART: [art] Extend RT PCRs Done
2,995,481 UART: [art] Lock RT PCRs Done
2,997,169 UART: [art] Populate DV Done
3,005,338 UART: [fht] FMC Alias Private Key: 7
3,006,470 UART: [art] Derive CDI
3,006,750 UART: [art] Store in in slot 0x4
3,092,531 UART: [art] Derive Key Pair
3,092,891 UART: [art] Store priv key in slot 0x5
3,106,429 UART: [art] Derive Key Pair - Done
3,120,970 UART: [art] Signing Cert with AUTHO
3,121,450 UART: RITY.KEYID = 7
3,136,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,107 UART: [art] PUB.X = 94FC665A27ABA0B12079A25CE59694B7CAF54FA1C1483FC0636663175CE1D8983743B26312220E550164733EA4A33F37
3,143,865 UART: [art] PUB.Y = 0BDBAD34257209B6B04F4E94F6A6F5B858CA6C2FBF66E681D4475FAD22604F11C337F7D364822D8661002A0EB1F8A7A3
3,150,792 UART: [art] SIG.R = EE60C81E15BA1C9A676EA0422F9093692A06A47D7CB8CABDAE4D3053B087AB9413057EF40CE8BE63FA2E014074A3DD40
3,157,564 UART: [art] SIG.S = 3634C25D593EB57872956269B374590C06C49406DFDFEABB528196FE9631BAE05262B8E73349AEBAEDD881AA6A0BE2B8
3,181,891 UART: Caliptra RT
3,182,236 UART: [state] CFI Enabled
3,290,171 UART: [rt] RT listening for mailbox commands...
3,290,834 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,989 UART: [rt]cmd =0x46504c54, len=4
3,322,199 >>> mbox cmd response data (8 bytes)
3,322,326 UART: [rt] FIPS self test
3,322,654 UART: [kat] ++
3,322,806 UART: [kat] sha1
3,326,994 UART: [kat] SHA2-256
3,328,900 UART: Fatal Error: 0x90010002
3,330,439 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,444 >>> mbox cmd response: failed
3,330,444 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,119 UART: [kat] LMS
1,169,431 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,986 UART: [idev] Sha1 KeyId Algorithm
1,208,916 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,435 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,103 UART: [ldev] --
1,282,573 UART: [fwproc] Wait for Commands...
1,283,180 UART: [fwproc] Recv command 0x46574c44
1,283,913 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,088 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,302 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 ready_for_fw is high
1,056,547 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,314 >>> mbox cmd response: success
2,694,606 UART:
2,694,622 UART: Running Caliptra FMC ...
2,695,030 UART:
2,695,173 UART: [state] CFI Enabled
2,705,902 UART: [fht] FMC Alias Private Key: 7
2,813,995 UART: [art] Extend RT PCRs Done
2,814,423 UART: [art] Lock RT PCRs Done
2,816,037 UART: [art] Populate DV Done
2,824,162 UART: [fht] FMC Alias Private Key: 7
2,825,252 UART: [art] Derive CDI
2,825,532 UART: [art] Store in in slot 0x4
2,911,269 UART: [art] Derive Key Pair
2,911,629 UART: [art] Store priv key in slot 0x5
2,924,861 UART: [art] Derive Key Pair - Done
2,939,649 UART: [art] Signing Cert with AUTHO
2,940,129 UART: RITY.KEYID = 7
2,955,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,520 UART: [art] PUB.X = AD8970E8657615A998CA78FEDBF97C17CEDF7E27F417E8EF67F5C70A3CE5E5981D53053320A249EDDDAF3FB6F7017DF0
2,963,299 UART: [art] PUB.Y = A877DF274B1837DE89392710C79242D5CB1DAD5D17DDA4117E998A7CB660AEBFF9C649980C040A76D010ADC8E0E504DF
2,970,249 UART: [art] SIG.R = E510141A6E9603F9DD40E8866A75C26BBEEA7357D5FE882C4FE9287230BA70C6D13FC49729D6EAC9582D4A29E48CA50D
2,977,023 UART: [art] SIG.S = 57E208E482E20558FC68475DF104C95B89BB45863BD168921ECB89B01C47569F5D9F9B3390003A58009DE7932AE51007
3,000,908 UART: Caliptra RT
3,001,253 UART: [state] CFI Enabled
3,109,502 UART: [rt] RT listening for mailbox commands...
3,110,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,806 UART: [rt]cmd =0x46504c54, len=4
3,141,004 >>> mbox cmd response data (8 bytes)
3,141,333 UART: [rt] FIPS self test
3,141,661 UART: [kat] ++
3,141,813 UART: [kat] sha1
3,146,057 UART: [kat] SHA2-256
3,148,045 UART: Fatal Error: 0x90010002
3,149,584 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,589 >>> mbox cmd response: failed
3,149,589 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,256 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,456 >>> mbox cmd response: failed
812,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,383 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,406 >>> mbox cmd response: failed
811,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,905 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,205 >>> mbox cmd response: failed
812,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,024 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,451 >>> mbox cmd response: failed
812,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,908 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,470 >>> mbox cmd response: failed
811,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,401 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,260 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,268 >>> mbox cmd response: failed
812,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,479 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,735 >>> mbox cmd response: failed
812,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,780 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,235 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,243 >>> mbox cmd response: failed
812,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,428 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,748 >>> mbox cmd response: failed
811,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,213 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,504 >>> mbox cmd response: failed
811,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,025 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,843 >>> mbox cmd response: failed
811,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,122 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,779 >>> mbox cmd response: failed
811,779 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,458 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,357 UART: [kat] SHA2-256
882,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,403 UART: [kat] ++
886,555 UART: [kat] sha1
890,717 UART: [kat] SHA2-256
892,655 UART: [kat] SHA2-384
895,564 UART: [kat] SHA2-512-ACC
897,465 UART: [kat] ECC-384
903,268 UART: [kat] HMAC-384Kdf
907,858 UART: [kat] LMS
1,476,054 UART: [kat] --
1,477,009 UART: [cold-reset] ++
1,477,367 UART: [fht] Storing FHT @ 0x50003400
1,480,228 UART: [idev] ++
1,480,396 UART: [idev] CDI.KEYID = 6
1,480,756 UART: [idev] SUBJECT.KEYID = 7
1,481,180 UART: [idev] UDS.KEYID = 0
1,481,525 ready_for_fw is high
1,481,525 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,152 UART: [idev] Erasing UDS.KEYID = 0
1,505,818 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,574 UART: [idev] --
1,515,609 UART: [ldev] ++
1,515,777 UART: [ldev] CDI.KEYID = 6
1,516,140 UART: [ldev] SUBJECT.KEYID = 5
1,516,566 UART: [ldev] AUTHORITY.KEYID = 7
1,517,029 UART: [ldev] FE.KEYID = 1
1,522,265 UART: [ldev] Erasing FE.KEYID = 1
1,547,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,552 UART: [ldev] --
1,586,883 UART: [fwproc] Waiting for Commands...
1,587,518 UART: [fwproc] Received command 0x46574c44
1,588,309 UART: [fwproc] Received Image of size 115196 bytes
2,897,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,456 >>> mbox cmd response: success
3,092,532 UART: [afmc] ++
3,092,700 UART: [afmc] CDI.KEYID = 6
3,093,062 UART: [afmc] SUBJECT.KEYID = 7
3,093,487 UART: [afmc] AUTHORITY.KEYID = 5
3,127,780 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,828 UART: [afmc] --
3,170,740 UART: [cold-reset] --
3,171,676 UART: [state] Locking Datavault
3,172,629 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,233 UART: [state] Locking ICCM
3,173,899 UART: [exit] Launching FMC @ 0x40000130
3,179,228 UART:
3,179,244 UART: Running Caliptra FMC ...
3,179,652 UART:
3,179,706 UART: [state] CFI Enabled
3,190,479 UART: [fht] FMC Alias Private Key: 7
3,298,234 UART: [art] Extend RT PCRs Done
3,298,662 UART: [art] Lock RT PCRs Done
3,300,312 UART: [art] Populate DV Done
3,308,299 UART: [fht] FMC Alias Private Key: 7
3,309,359 UART: [art] Derive CDI
3,309,639 UART: [art] Store in in slot 0x4
3,395,196 UART: [art] Derive Key Pair
3,395,556 UART: [art] Store priv key in slot 0x5
3,409,008 UART: [art] Derive Key Pair - Done
3,423,573 UART: [art] Signing Cert with AUTHO
3,424,053 UART: RITY.KEYID = 7
3,439,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,600 UART: [art] PUB.X = 8FA0E99F32A05BE32B29AB7130BE1C46A4B5D8E51A1D67DFE363091859C0B1E0AB16A11EA72E0088ECAA9D8B8FF09226
3,447,361 UART: [art] PUB.Y = D8E16A143E61020748B5CDC989FDA6E6500A9CECD30825CFA1C383BA796B3D65257F767CDBE8570E7F5A4AE0471C22D3
3,454,308 UART: [art] SIG.R = 1B25EF94C9B7EDFC115C4AF847154E9C6DBFD566DA9EDD41319DB18ADCE530628C2B864509D8762CF8FCFEED9A9F2C93
3,461,099 UART: [art] SIG.S = E4D20DCE7980041ED69177FEFB80699CEB790336BEEFBD98C1747E34D7002AD321E5F05ECC742CA4048D4911DEC69D82
3,485,198 UART: Caliptra RT
3,485,451 UART: [state] CFI Enabled
3,593,616 UART: [rt] RT listening for mailbox commands...
3,594,279 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,068 UART: [rt]cmd =0x46504c54, len=4
3,625,180 >>> mbox cmd response data (8 bytes)
3,625,435 UART: [rt] FIPS self test
3,625,763 UART: [kat] ++
3,625,915 UART: [kat] sha1
3,629,895 UART: [kat] SHA2-256
3,631,917 UART: [kat] SHA2-384
3,634,734 UART: [kat] SHA2-512-ACC
3,635,139 UART: Droping operation
3,635,574 UART: Fatal Error: 0x90050002
3,637,113 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,118 >>> mbox cmd response: failed
3,637,118 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
894,876 UART: [kat] SHA2-512-ACC
896,777 UART: [kat] ECC-384
902,342 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,807 UART: [cold-reset] ++
1,476,143 UART: [fht] Storing FHT @ 0x50003400
1,478,792 UART: [idev] ++
1,478,960 UART: [idev] CDI.KEYID = 6
1,479,320 UART: [idev] SUBJECT.KEYID = 7
1,479,744 UART: [idev] UDS.KEYID = 0
1,480,089 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,024 UART: [idev] Erasing UDS.KEYID = 0
1,504,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,278 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,521,003 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,557 UART: [fwproc] Waiting for Commands...
1,586,406 UART: [fwproc] Received command 0x46574c44
1,587,197 UART: [fwproc] Received Image of size 115196 bytes
2,894,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,768 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,309 ready_for_fw is high
1,363,309 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,798 >>> mbox cmd response: success
3,002,246 UART:
3,002,262 UART: Running Caliptra FMC ...
3,002,670 UART:
3,002,724 UART: [state] CFI Enabled
3,013,243 UART: [fht] FMC Alias Private Key: 7
3,121,766 UART: [art] Extend RT PCRs Done
3,122,194 UART: [art] Lock RT PCRs Done
3,123,896 UART: [art] Populate DV Done
3,132,239 UART: [fht] FMC Alias Private Key: 7
3,133,265 UART: [art] Derive CDI
3,133,545 UART: [art] Store in in slot 0x4
3,218,690 UART: [art] Derive Key Pair
3,219,050 UART: [art] Store priv key in slot 0x5
3,232,286 UART: [art] Derive Key Pair - Done
3,247,191 UART: [art] Signing Cert with AUTHO
3,247,671 UART: RITY.KEYID = 7
3,262,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,564 UART: [art] PUB.X = E8BDA80D8C4C8BA9D49418776EA2608ADA0AC7584691E2E9A442E229680BC5D491B71C20F9E12E7AD1E0B43083F7A471
3,270,333 UART: [art] PUB.Y = 62F425359BB3F7ADCC7154457E7CE6956CD373CB1EA434CBD5FE5499124FA8161B8465498B91D4499705430A80ADFFD4
3,277,281 UART: [art] SIG.R = 6CAC59377C7169F77028FF89697F2D29702A53A43C1A00ED39A9463E224A1D18F53B4FBB90BE14839D6737E78D1AF5E0
3,284,031 UART: [art] SIG.S = 3E38E1988936DBC7BEA7F6F9AF2BDFDA6E3A27F5CB2DFCBB7CBD2E4A910DF223E1E99395D815EB7713FBC9291969C188
3,308,053 UART: Caliptra RT
3,308,306 UART: [state] CFI Enabled
3,416,808 UART: [rt] RT listening for mailbox commands...
3,417,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,384 UART: [rt]cmd =0x46504c54, len=4
3,448,454 >>> mbox cmd response data (8 bytes)
3,448,773 UART: [rt] FIPS self test
3,449,101 UART: [kat] ++
3,449,253 UART: [kat] sha1
3,453,493 UART: [kat] SHA2-256
3,455,515 UART: [kat] SHA2-384
3,458,446 UART: [kat] SHA2-512-ACC
3,458,851 UART: Droping operation
3,459,270 UART: Fatal Error: 0x90050002
3,460,809 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,814 >>> mbox cmd response: failed
3,460,814 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,899 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,822 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,396 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 ready_for_fw is high
1,481,584 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,563 UART: [idev] Erasing UDS.KEYID = 0
1,506,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,334 UART: [ldev] Erasing FE.KEYID = 1
1,547,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,849 UART: [ldev] --
1,587,318 UART: [fwproc] Waiting for Commands...
1,588,103 UART: [fwproc] Received command 0x46574c44
1,588,894 UART: [fwproc] Received Image of size 115196 bytes
2,896,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,267 >>> mbox cmd response: success
3,092,461 UART: [afmc] ++
3,092,629 UART: [afmc] CDI.KEYID = 6
3,092,991 UART: [afmc] SUBJECT.KEYID = 7
3,093,416 UART: [afmc] AUTHORITY.KEYID = 5
3,128,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,368 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,058 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,933 UART: [afmc] --
3,171,909 UART: [cold-reset] --
3,172,709 UART: [state] Locking Datavault
3,173,842 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,446 UART: [state] Locking ICCM
3,174,902 UART: [exit] Launching FMC @ 0x40000130
3,180,231 UART:
3,180,247 UART: Running Caliptra FMC ...
3,180,655 UART:
3,180,798 UART: [state] CFI Enabled
3,191,515 UART: [fht] FMC Alias Private Key: 7
3,299,548 UART: [art] Extend RT PCRs Done
3,299,976 UART: [art] Lock RT PCRs Done
3,301,308 UART: [art] Populate DV Done
3,309,493 UART: [fht] FMC Alias Private Key: 7
3,310,507 UART: [art] Derive CDI
3,310,787 UART: [art] Store in in slot 0x4
3,396,484 UART: [art] Derive Key Pair
3,396,844 UART: [art] Store priv key in slot 0x5
3,410,176 UART: [art] Derive Key Pair - Done
3,424,849 UART: [art] Signing Cert with AUTHO
3,425,329 UART: RITY.KEYID = 7
3,440,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,500 UART: [art] PUB.X = 3E8564B3FDE13E802322783A73469DE474F8AE9DD8055CA627F468F7BA5602909D8DA2BDF7FC36D34443A36178F5B938
3,448,266 UART: [art] PUB.Y = 049937C091CF2E5C45B086815F19C9574434A9D575781A5EAB24984C0FEBC0E09AF8E843D2896D35BB2E06FD86603E20
3,455,207 UART: [art] SIG.R = 3B421CFF3AB3105939101EEA7163EA8D9A47C762D36A91E0CB03812BB8204D49D0324A1428E528241937A50427588B79
3,461,963 UART: [art] SIG.S = 1508D1FE2E70F0886627843E0C168C5495460257E9EF38EA08428D748CB4577FE28B17478F6C66552C794C4C0D06B625
3,485,122 UART: Caliptra RT
3,485,467 UART: [state] CFI Enabled
3,592,399 UART: [rt] RT listening for mailbox commands...
3,593,062 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,073 UART: [rt]cmd =0x46504c54, len=4
3,624,123 >>> mbox cmd response data (8 bytes)
3,624,482 UART: [rt] FIPS self test
3,624,810 UART: [kat] ++
3,624,962 UART: [kat] sha1
3,629,350 UART: [kat] SHA2-256
3,631,372 UART: [kat] SHA2-384
3,634,123 UART: [kat] SHA2-512-ACC
3,634,528 UART: Droping operation
3,634,919 UART: Fatal Error: 0x90050002
3,636,458 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,636,463 >>> mbox cmd response: failed
3,636,463 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,636,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,441 UART: [kat] SHA2-512-ACC
897,342 UART: [kat] ECC-384
902,961 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,124 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,309 UART: [idev] Erasing UDS.KEYID = 0
1,505,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,429 UART: [idev] --
1,515,552 UART: [ldev] ++
1,515,720 UART: [ldev] CDI.KEYID = 6
1,516,083 UART: [ldev] SUBJECT.KEYID = 5
1,516,509 UART: [ldev] AUTHORITY.KEYID = 7
1,516,972 UART: [ldev] FE.KEYID = 1
1,522,582 UART: [ldev] Erasing FE.KEYID = 1
1,547,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,061 UART: [ldev] --
1,586,492 UART: [fwproc] Waiting for Commands...
1,587,315 UART: [fwproc] Received command 0x46574c44
1,588,106 UART: [fwproc] Received Image of size 115196 bytes
2,895,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,767 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 ready_for_fw is high
1,363,090 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,825 >>> mbox cmd response: success
3,002,277 UART:
3,002,293 UART: Running Caliptra FMC ...
3,002,701 UART:
3,002,844 UART: [state] CFI Enabled
3,013,559 UART: [fht] FMC Alias Private Key: 7
3,121,134 UART: [art] Extend RT PCRs Done
3,121,562 UART: [art] Lock RT PCRs Done
3,122,978 UART: [art] Populate DV Done
3,130,931 UART: [fht] FMC Alias Private Key: 7
3,131,963 UART: [art] Derive CDI
3,132,243 UART: [art] Store in in slot 0x4
3,217,940 UART: [art] Derive Key Pair
3,218,300 UART: [art] Store priv key in slot 0x5
3,231,862 UART: [art] Derive Key Pair - Done
3,247,006 UART: [art] Signing Cert with AUTHO
3,247,486 UART: RITY.KEYID = 7
3,263,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,885 UART: [art] PUB.X = ABBCCD07E6C64B8E41F1874B0F1F12AA192D318BE7F1BC6DAE6C2FB09941A7E10100188311B12CFCEB67E2453A65C0B1
3,270,642 UART: [art] PUB.Y = 82242BDC1266D73A256E53E6F84DDC615AFAE94D3E3577C1495BB28D0D83917E732C218058418847D6054F81DE38D9D6
3,277,584 UART: [art] SIG.R = F62240A2588EC766FB9AFF39817EE8059A2384B273D9014E48C504E7747CF2583EEC9F21FE44F4F4C08FC122EC3A9EA6
3,284,353 UART: [art] SIG.S = D2F041D6279B53C28D569AC4536B12AE78FC7D23AF47D13B5014FBB5A35539D5F4483B13D295765FFF3FE96524056197
3,307,469 UART: Caliptra RT
3,307,814 UART: [state] CFI Enabled
3,416,040 UART: [rt] RT listening for mailbox commands...
3,416,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,408 UART: [rt]cmd =0x46504c54, len=4
3,447,524 >>> mbox cmd response data (8 bytes)
3,447,793 UART: [rt] FIPS self test
3,448,121 UART: [kat] ++
3,448,273 UART: [kat] sha1
3,452,329 UART: [kat] SHA2-256
3,454,351 UART: [kat] SHA2-384
3,457,194 UART: [kat] SHA2-512-ACC
3,457,599 UART: Droping operation
3,458,076 UART: Fatal Error: 0x90050002
3,459,615 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,459,620 >>> mbox cmd response: failed
3,459,620 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,459,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,327 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,294 UART: [kat] HMAC-384Kdf
922,756 UART: [kat] LMS
1,171,084 UART: [kat] --
1,171,903 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 ready_for_fw is high
1,176,241 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,201,345 UART: [idev] Sha1 KeyId Algorithm
1,210,053 UART: [idev] --
1,211,085 UART: [ldev] ++
1,211,253 UART: [ldev] CDI.KEYID = 6
1,211,616 UART: [ldev] SUBJECT.KEYID = 5
1,212,042 UART: [ldev] AUTHORITY.KEYID = 7
1,212,505 UART: [ldev] FE.KEYID = 1
1,218,055 UART: [ldev] Erasing FE.KEYID = 1
1,243,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,847 UART: [ldev] --
1,283,238 UART: [fwproc] Wait for Commands...
1,283,996 UART: [fwproc] Recv command 0x46574c44
1,284,724 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,676 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,883 >>> mbox cmd response: success
2,786,123 UART: [afmc] ++
2,786,291 UART: [afmc] CDI.KEYID = 6
2,786,653 UART: [afmc] SUBJECT.KEYID = 7
2,787,078 UART: [afmc] AUTHORITY.KEYID = 5
2,822,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,234 UART: [afmc] --
2,866,154 UART: [cold-reset] --
2,867,080 UART: [state] Locking Datavault
2,868,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,629 UART: [state] Locking ICCM
2,869,221 UART: [exit] Launching FMC @ 0x40000130
2,874,550 UART:
2,874,566 UART: Running Caliptra FMC ...
2,874,974 UART:
2,875,028 UART: [state] CFI Enabled
2,885,737 UART: [fht] FMC Alias Private Key: 7
2,993,456 UART: [art] Extend RT PCRs Done
2,993,884 UART: [art] Lock RT PCRs Done
2,995,634 UART: [art] Populate DV Done
3,003,919 UART: [fht] FMC Alias Private Key: 7
3,005,007 UART: [art] Derive CDI
3,005,287 UART: [art] Store in in slot 0x4
3,091,004 UART: [art] Derive Key Pair
3,091,364 UART: [art] Store priv key in slot 0x5
3,104,814 UART: [art] Derive Key Pair - Done
3,119,622 UART: [art] Signing Cert with AUTHO
3,120,102 UART: RITY.KEYID = 7
3,135,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,277 UART: [art] PUB.X = 75A8F7AEEB60E56942C9CE9DE3CC245EECFA92F991E601E901089D27AC9B09CABC393D6E970BEFA2F9EE31F6534D6B62
3,143,054 UART: [art] PUB.Y = 3428762FFBE7864EA842B399E850B1365407ABE0CEEB62EA1B4582DDA7E2DDDCBE948D973D010D20AA1132D3C1311F10
3,150,007 UART: [art] SIG.R = 0C874A8B736E5DCF31318CFC1D80E113479C1934F0920A742D30B04B0186C5DE4F2CD6F9B0246983DD84FDD92D2499E6
3,156,772 UART: [art] SIG.S = DF21C9503CF84362DD5B36687460CA5346452BA26743DBB04C2AFC6533A5F2E801238B34C652DE0D71AA4849B95143CC
3,180,693 UART: Caliptra RT
3,180,946 UART: [state] CFI Enabled
3,288,443 UART: [rt] RT listening for mailbox commands...
3,289,106 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,305 UART: [rt]cmd =0x46504c54, len=4
3,320,605 >>> mbox cmd response data (8 bytes)
3,320,876 UART: [rt] FIPS self test
3,321,204 UART: [kat] ++
3,321,356 UART: [kat] sha1
3,325,580 UART: [kat] SHA2-256
3,327,602 UART: [kat] SHA2-384
3,330,333 UART: [kat] SHA2-512-ACC
3,330,738 UART: Droping operation
3,331,239 UART: Fatal Error: 0x90050002
3,332,778 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,783 >>> mbox cmd response: failed
3,332,783 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,556 UART: [kat] HMAC-384Kdf
922,060 UART: [kat] LMS
1,170,388 UART: [kat] --
1,171,297 UART: [cold-reset] ++
1,171,821 UART: [fht] FHT @ 0x50003400
1,174,440 UART: [idev] ++
1,174,608 UART: [idev] CDI.KEYID = 6
1,174,968 UART: [idev] SUBJECT.KEYID = 7
1,175,392 UART: [idev] UDS.KEYID = 0
1,175,737 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,415 UART: [idev] --
1,210,463 UART: [ldev] ++
1,210,631 UART: [ldev] CDI.KEYID = 6
1,210,994 UART: [ldev] SUBJECT.KEYID = 5
1,211,420 UART: [ldev] AUTHORITY.KEYID = 7
1,211,883 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,482 UART: [fwproc] Recv command 0x46574c44
1,284,210 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,923 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,645 ready_for_fw is high
1,059,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,524 >>> mbox cmd response: success
2,698,872 UART:
2,698,888 UART: Running Caliptra FMC ...
2,699,296 UART:
2,699,350 UART: [state] CFI Enabled
2,709,651 UART: [fht] FMC Alias Private Key: 7
2,817,688 UART: [art] Extend RT PCRs Done
2,818,116 UART: [art] Lock RT PCRs Done
2,819,380 UART: [art] Populate DV Done
2,827,701 UART: [fht] FMC Alias Private Key: 7
2,828,791 UART: [art] Derive CDI
2,829,071 UART: [art] Store in in slot 0x4
2,914,982 UART: [art] Derive Key Pair
2,915,342 UART: [art] Store priv key in slot 0x5
2,928,380 UART: [art] Derive Key Pair - Done
2,943,289 UART: [art] Signing Cert with AUTHO
2,943,769 UART: RITY.KEYID = 7
2,959,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,896 UART: [art] PUB.X = FEF4F1644EB5CA788A4E32D8BA0C206C53C7B1F592461FE99852FC2B50B1C19497205776812BE80C34467672070DE7EE
2,966,656 UART: [art] PUB.Y = 9E3151AB5738C96F451FE16DCBD829B15F05D8C9FB56AF5FFDC41B1A3ABA71330D879C3C586864CECAE7AB54CB730815
2,973,615 UART: [art] SIG.R = F0C1DCFC370F34F83D79D11A1ABA172BCCBBB83892E977B1694061736A97CBB16C28AAF5A95913252FA2F2B17FF68AF4
2,980,398 UART: [art] SIG.S = 1DC22B901E3C54ACA0DC92D4E57BDB4359DC4AA265D339F503BAF981C6B7AA54F1ADB91F79D201A351FFD1BB7B6572CB
3,004,303 UART: Caliptra RT
3,004,556 UART: [state] CFI Enabled
3,111,863 UART: [rt] RT listening for mailbox commands...
3,112,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,423 UART: [rt]cmd =0x46504c54, len=4
3,143,653 >>> mbox cmd response data (8 bytes)
3,143,950 UART: [rt] FIPS self test
3,144,278 UART: [kat] ++
3,144,430 UART: [kat] sha1
3,148,524 UART: [kat] SHA2-256
3,150,546 UART: [kat] SHA2-384
3,153,295 UART: [kat] SHA2-512-ACC
3,153,700 UART: Droping operation
3,154,325 UART: Fatal Error: 0x90050002
3,155,864 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,869 >>> mbox cmd response: failed
3,155,869 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,230 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,772 UART: [fht] FHT @ 0x50003400
1,175,555 UART: [idev] ++
1,175,723 UART: [idev] CDI.KEYID = 6
1,176,083 UART: [idev] SUBJECT.KEYID = 7
1,176,507 UART: [idev] UDS.KEYID = 0
1,176,852 ready_for_fw is high
1,176,852 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,201,966 UART: [idev] Sha1 KeyId Algorithm
1,210,456 UART: [idev] --
1,211,546 UART: [ldev] ++
1,211,714 UART: [ldev] CDI.KEYID = 6
1,212,077 UART: [ldev] SUBJECT.KEYID = 5
1,212,503 UART: [ldev] AUTHORITY.KEYID = 7
1,212,966 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,414 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,471 UART: [fwproc] Recv command 0x46574c44
1,285,199 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,341 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,404 >>> mbox cmd response: success
2,788,568 UART: [afmc] ++
2,788,736 UART: [afmc] CDI.KEYID = 6
2,789,098 UART: [afmc] SUBJECT.KEYID = 7
2,789,523 UART: [afmc] AUTHORITY.KEYID = 5
2,824,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,063 UART: [afmc] --
2,868,013 UART: [cold-reset] --
2,868,731 UART: [state] Locking Datavault
2,869,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,392 UART: [state] Locking ICCM
2,870,820 UART: [exit] Launching FMC @ 0x40000130
2,876,149 UART:
2,876,165 UART: Running Caliptra FMC ...
2,876,573 UART:
2,876,716 UART: [state] CFI Enabled
2,887,263 UART: [fht] FMC Alias Private Key: 7
2,994,780 UART: [art] Extend RT PCRs Done
2,995,208 UART: [art] Lock RT PCRs Done
2,996,948 UART: [art] Populate DV Done
3,005,379 UART: [fht] FMC Alias Private Key: 7
3,006,397 UART: [art] Derive CDI
3,006,677 UART: [art] Store in in slot 0x4
3,092,002 UART: [art] Derive Key Pair
3,092,362 UART: [art] Store priv key in slot 0x5
3,105,872 UART: [art] Derive Key Pair - Done
3,120,759 UART: [art] Signing Cert with AUTHO
3,121,239 UART: RITY.KEYID = 7
3,136,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,484 UART: [art] PUB.X = DBC94A68C6B147D33E1D312C3EA67318D9798F832591CDEA73CEBBF087E7E615214AC997C9939FBD2D3DAD41B0B7BAE7
3,144,272 UART: [art] PUB.Y = 0CE2C668770AA0E5F2BA38A10ABCBEE75467A6D2D41503B003B58C39EF099F99042BF3739BCE829A6B8B4848585375D6
3,151,207 UART: [art] SIG.R = CF47F7CAC6ADC1D6A99E38AD82A49E4390987E7457C82EA2DFA9DF095D0A4396185CCF3F7D343B3C3181FC64C66E8003
3,157,982 UART: [art] SIG.S = EDD8B571185636C314F5019F3D17FE2ED99EAC5433C3765F0C33B32D8A34988E72C44385DC5A5755D3D9C859193B99A4
3,182,059 UART: Caliptra RT
3,182,404 UART: [state] CFI Enabled
3,290,266 UART: [rt] RT listening for mailbox commands...
3,290,929 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,686 UART: [rt]cmd =0x46504c54, len=4
3,321,924 >>> mbox cmd response data (8 bytes)
3,322,287 UART: [rt] FIPS self test
3,322,615 UART: [kat] ++
3,322,767 UART: [kat] sha1
3,327,007 UART: [kat] SHA2-256
3,329,029 UART: [kat] SHA2-384
3,332,018 UART: [kat] SHA2-512-ACC
3,332,423 UART: Droping operation
3,332,840 UART: Fatal Error: 0x90050002
3,334,379 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,384 >>> mbox cmd response: failed
3,334,384 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,131 UART: [kat] SHA2-512-ACC
909,032 UART: [kat] ECC-384
919,115 UART: [kat] HMAC-384Kdf
923,889 UART: [kat] LMS
1,172,217 UART: [kat] --
1,173,090 UART: [cold-reset] ++
1,173,562 UART: [fht] FHT @ 0x50003400
1,175,987 UART: [idev] ++
1,176,155 UART: [idev] CDI.KEYID = 6
1,176,515 UART: [idev] SUBJECT.KEYID = 7
1,176,939 UART: [idev] UDS.KEYID = 0
1,177,284 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,049 UART: [idev] Erasing UDS.KEYID = 0
1,202,010 UART: [idev] Sha1 KeyId Algorithm
1,210,374 UART: [idev] --
1,211,236 UART: [ldev] ++
1,211,404 UART: [ldev] CDI.KEYID = 6
1,211,767 UART: [ldev] SUBJECT.KEYID = 5
1,212,193 UART: [ldev] AUTHORITY.KEYID = 7
1,212,656 UART: [ldev] FE.KEYID = 1
1,217,976 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,016 UART: [ldev] --
1,283,457 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,059 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,130 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,340 ready_for_fw is high
1,060,340 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,811 >>> mbox cmd response: success
2,701,649 UART:
2,701,665 UART: Running Caliptra FMC ...
2,702,073 UART:
2,702,216 UART: [state] CFI Enabled
2,712,603 UART: [fht] FMC Alias Private Key: 7
2,820,618 UART: [art] Extend RT PCRs Done
2,821,046 UART: [art] Lock RT PCRs Done
2,822,336 UART: [art] Populate DV Done
2,830,695 UART: [fht] FMC Alias Private Key: 7
2,831,835 UART: [art] Derive CDI
2,832,115 UART: [art] Store in in slot 0x4
2,917,852 UART: [art] Derive Key Pair
2,918,212 UART: [art] Store priv key in slot 0x5
2,932,044 UART: [art] Derive Key Pair - Done
2,946,826 UART: [art] Signing Cert with AUTHO
2,947,306 UART: RITY.KEYID = 7
2,962,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,531 UART: [art] PUB.X = 81E17FF6FA610E34C9403501CF42358A7850C6AC93CE1DE7ACFC006F45B11A4F9C12A577632719379D5E1BDAD14D1272
2,970,279 UART: [art] PUB.Y = 66E33179737B2BCF23EBECF08417BAB601A835A4D805FFB4077144EF4794BA461A9A850C2A3C5F4812AC3D560361976B
2,977,218 UART: [art] SIG.R = 67863F42907FE1F04BEAB69978C686E7CC8B6841F0A4B43A8C007D18D3D6751FDA0BF26610B251ACABD0E4F04B4211E2
2,983,973 UART: [art] SIG.S = 33B8A8B42B8D5EC42D865C9155D3B63034D1200257FEC09E333F3FF93E4691FE14B9AF8302C15639E41E5A94EF310E5A
3,008,007 UART: Caliptra RT
3,008,352 UART: [state] CFI Enabled
3,116,053 UART: [rt] RT listening for mailbox commands...
3,116,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,367 UART: [rt]cmd =0x46504c54, len=4
3,147,595 >>> mbox cmd response data (8 bytes)
3,147,846 UART: [rt] FIPS self test
3,148,174 UART: [kat] ++
3,148,326 UART: [kat] sha1
3,152,668 UART: [kat] SHA2-256
3,154,690 UART: [kat] SHA2-384
3,157,591 UART: [kat] SHA2-512-ACC
3,157,996 UART: Droping operation
3,158,617 UART: Fatal Error: 0x90050002
3,160,156 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,161 >>> mbox cmd response: failed
3,160,161 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,138 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,207 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,174,747 ready_for_fw is high
1,174,747 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,208,926 UART: [ldev] ++
1,209,094 UART: [ldev] CDI.KEYID = 6
1,209,458 UART: [ldev] SUBJECT.KEYID = 5
1,209,885 UART: [ldev] AUTHORITY.KEYID = 7
1,210,348 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,511 UART: [fwproc] Recv command 0x46574c44
1,282,244 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,681 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,719 >>> mbox cmd response: success
2,784,740 UART: [afmc] ++
2,784,908 UART: [afmc] CDI.KEYID = 6
2,785,271 UART: [afmc] SUBJECT.KEYID = 7
2,785,697 UART: [afmc] AUTHORITY.KEYID = 5
2,821,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,863 UART: [afmc] --
2,864,953 UART: [cold-reset] --
2,865,627 UART: [state] Locking Datavault
2,866,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,570 UART: [state] Locking ICCM
2,867,998 UART: [exit] Launching FMC @ 0x40000130
2,873,327 UART:
2,873,343 UART: Running Caliptra FMC ...
2,873,751 UART:
2,873,805 UART: [state] CFI Enabled
2,884,414 UART: [fht] FMC Alias Private Key: 7
2,993,339 UART: [art] Extend RT PCRs Done
2,993,767 UART: [art] Lock RT PCRs Done
2,995,263 UART: [art] Populate DV Done
3,003,216 UART: [fht] FMC Alias Private Key: 7
3,004,292 UART: [art] Derive CDI
3,004,572 UART: [art] Store in in slot 0x4
3,090,167 UART: [art] Derive Key Pair
3,090,527 UART: [art] Store priv key in slot 0x5
3,103,963 UART: [art] Derive Key Pair - Done
3,118,658 UART: [art] Signing Cert with AUTHO
3,119,138 UART: RITY.KEYID = 7
3,134,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,887 UART: [art] PUB.X = E24AEAC182F251FAAF584E284853B0D0B5E11D66FDE97480D23536C8738E588014A6AFD2B30E38156611F5273AD56265
3,141,654 UART: [art] PUB.Y = 0F1D6B961896562897883888F1CD2782E2E46F98030B2BD650817B7DB994FA6CBCC90C89F7562D3FA61CDA9E12492F7F
3,148,594 UART: [art] SIG.R = F4BE41D0557D5E3120D5F83E1489A588EB3FD8CC192EF9E07DFDCFEE96129E8E6AED121AAECE95A65F3E6AE280A12C73
3,155,388 UART: [art] SIG.S = 2DF8217DCAC6B3AB7A2C0C2A6FF0CA3467D0372813592EAF66F89266AB283990AF85E252C8413652984C05DD02148AF8
3,179,142 UART: Caliptra RT
3,179,395 UART: [state] CFI Enabled
3,287,512 UART: [rt] RT listening for mailbox commands...
3,288,175 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,890 UART: [rt]cmd =0x46504c54, len=4
3,319,124 >>> mbox cmd response data (8 bytes)
3,319,315 UART: [rt] FIPS self test
3,319,643 UART: [kat] ++
3,319,795 UART: [kat] sha1
3,323,947 UART: [kat] SHA2-256
3,325,969 UART: [kat] SHA2-384
3,328,742 UART: [kat] SHA2-512-ACC
3,329,147 UART: Droping operation
3,329,758 UART: Fatal Error: 0x90050002
3,331,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,302 >>> mbox cmd response: failed
3,331,302 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,466 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,651 UART: [fht] FHT @ 0x50003400
1,172,357 UART: [idev] ++
1,172,525 UART: [idev] CDI.KEYID = 6
1,172,886 UART: [idev] SUBJECT.KEYID = 7
1,173,311 UART: [idev] UDS.KEYID = 0
1,173,657 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,197,691 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,658 UART: [ldev] ++
1,207,826 UART: [ldev] CDI.KEYID = 6
1,208,190 UART: [ldev] SUBJECT.KEYID = 5
1,208,617 UART: [ldev] AUTHORITY.KEYID = 7
1,209,080 UART: [ldev] FE.KEYID = 1
1,214,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,278 UART: [fwproc] Wait for Commands...
1,280,993 UART: [fwproc] Recv command 0x46574c44
1,281,726 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,139 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,261 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,934 ready_for_fw is high
1,055,934 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,473 >>> mbox cmd response: success
2,696,981 UART:
2,696,997 UART: Running Caliptra FMC ...
2,697,405 UART:
2,697,459 UART: [state] CFI Enabled
2,708,132 UART: [fht] FMC Alias Private Key: 7
2,816,171 UART: [art] Extend RT PCRs Done
2,816,599 UART: [art] Lock RT PCRs Done
2,818,197 UART: [art] Populate DV Done
2,826,644 UART: [fht] FMC Alias Private Key: 7
2,827,712 UART: [art] Derive CDI
2,827,992 UART: [art] Store in in slot 0x4
2,913,773 UART: [art] Derive Key Pair
2,914,133 UART: [art] Store priv key in slot 0x5
2,927,323 UART: [art] Derive Key Pair - Done
2,942,333 UART: [art] Signing Cert with AUTHO
2,942,813 UART: RITY.KEYID = 7
2,958,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,036 UART: [art] PUB.X = 547BE8839BA176AA931EFC7B011675B252BE5DD91588079308FD8A11E1828B533A38BCCA3078E331830CD703CCFCA3D6
2,965,797 UART: [art] PUB.Y = 3022ADB5D07D8C3C0E99CF220554BCF3A8E37EC1E672CC1D3C2E854139DF50DFB15531B13E1352A84CEC52EA466CA972
2,972,755 UART: [art] SIG.R = B406FF62E62253581FFD60775CC21976EC7CA101231974A55877B79B062770DCDB695670289321D24682F2DAAE9F7A5F
2,979,512 UART: [art] SIG.S = B1EAA8EFF2119C0F114145AEFE56BD7F4D65D6A300F17B900F9ED2F0E1FDBB691B3CD548D388D5853B972A8160535A27
3,003,013 UART: Caliptra RT
3,003,266 UART: [state] CFI Enabled
3,111,186 UART: [rt] RT listening for mailbox commands...
3,111,849 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,870 UART: [rt]cmd =0x46504c54, len=4
3,143,114 >>> mbox cmd response data (8 bytes)
3,143,375 UART: [rt] FIPS self test
3,143,703 UART: [kat] ++
3,143,855 UART: [kat] sha1
3,148,099 UART: [kat] SHA2-256
3,150,121 UART: [kat] SHA2-384
3,153,174 UART: [kat] SHA2-512-ACC
3,153,579 UART: Droping operation
3,154,024 UART: Fatal Error: 0x90050002
3,155,563 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,568 >>> mbox cmd response: failed
3,155,568 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,189 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,174,842 ready_for_fw is high
1,174,842 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,209,223 UART: [ldev] ++
1,209,391 UART: [ldev] CDI.KEYID = 6
1,209,755 UART: [ldev] SUBJECT.KEYID = 5
1,210,182 UART: [ldev] AUTHORITY.KEYID = 7
1,210,645 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,146 UART: [fwproc] Recv command 0x46574c44
1,282,879 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,874 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,884 >>> mbox cmd response: success
2,784,929 UART: [afmc] ++
2,785,097 UART: [afmc] CDI.KEYID = 6
2,785,460 UART: [afmc] SUBJECT.KEYID = 7
2,785,886 UART: [afmc] AUTHORITY.KEYID = 5
2,821,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,952 UART: [afmc] --
2,865,032 UART: [cold-reset] --
2,866,014 UART: [state] Locking Datavault
2,867,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,867 UART: [state] Locking ICCM
2,868,329 UART: [exit] Launching FMC @ 0x40000130
2,873,658 UART:
2,873,674 UART: Running Caliptra FMC ...
2,874,082 UART:
2,874,225 UART: [state] CFI Enabled
2,884,808 UART: [fht] FMC Alias Private Key: 7
2,993,035 UART: [art] Extend RT PCRs Done
2,993,463 UART: [art] Lock RT PCRs Done
2,995,095 UART: [art] Populate DV Done
3,003,416 UART: [fht] FMC Alias Private Key: 7
3,004,582 UART: [art] Derive CDI
3,004,862 UART: [art] Store in in slot 0x4
3,090,499 UART: [art] Derive Key Pair
3,090,859 UART: [art] Store priv key in slot 0x5
3,104,319 UART: [art] Derive Key Pair - Done
3,119,317 UART: [art] Signing Cert with AUTHO
3,119,797 UART: RITY.KEYID = 7
3,135,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,964 UART: [art] PUB.X = FFF7C3C41FF8B98DE5C804A794B04AAD74A2714DE5A569F420BDAB3DC697999B7E188E0854BD69286A23E85308366C82
3,142,733 UART: [art] PUB.Y = E7D1D4ABE28CEE885E99B07A9010875E7095F160A3647AB8616E2485DD8F07A9AB68E204C911C575B18DFC37881748A9
3,149,679 UART: [art] SIG.R = 540A4EDAF34499D11D2A4E91A75475751F52F4AADB1BE65AA46879A8C92823D3B70E960A97D0DF7787D585BF872F57B3
3,156,446 UART: [art] SIG.S = 82048CE79D91EE1265DDC9DD1CF4449938DA293B7AD74187F677EDD373F89D4752F630B5B77AE729B54D599A8DAA22D3
3,180,344 UART: Caliptra RT
3,180,689 UART: [state] CFI Enabled
3,289,690 UART: [rt] RT listening for mailbox commands...
3,290,353 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,320 UART: [rt]cmd =0x46504c54, len=4
3,321,390 >>> mbox cmd response data (8 bytes)
3,321,607 UART: [rt] FIPS self test
3,321,935 UART: [kat] ++
3,322,087 UART: [kat] sha1
3,326,283 UART: [kat] SHA2-256
3,328,305 UART: [kat] SHA2-384
3,331,128 UART: [kat] SHA2-512-ACC
3,331,533 UART: Droping operation
3,331,980 UART: Fatal Error: 0x90050002
3,333,519 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,524 >>> mbox cmd response: failed
3,333,524 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,532 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,175,016 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,894 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,126 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,455 ready_for_fw is high
1,056,455 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,994 >>> mbox cmd response: success
2,694,744 UART:
2,694,760 UART: Running Caliptra FMC ...
2,695,168 UART:
2,695,311 UART: [state] CFI Enabled
2,705,848 UART: [fht] FMC Alias Private Key: 7
2,813,523 UART: [art] Extend RT PCRs Done
2,813,951 UART: [art] Lock RT PCRs Done
2,815,633 UART: [art] Populate DV Done
2,823,890 UART: [fht] FMC Alias Private Key: 7
2,824,916 UART: [art] Derive CDI
2,825,196 UART: [art] Store in in slot 0x4
2,910,805 UART: [art] Derive Key Pair
2,911,165 UART: [art] Store priv key in slot 0x5
2,924,087 UART: [art] Derive Key Pair - Done
2,939,116 UART: [art] Signing Cert with AUTHO
2,939,596 UART: RITY.KEYID = 7
2,954,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,435 UART: [art] PUB.X = 85C0D6483273E20D8D55A856DBF9AEE0A803BAB7A999CF3F7DB87D3059912C5318312035CE07CECBAAE68AE716057ADE
2,962,207 UART: [art] PUB.Y = BA20FAA39EDB51311E981CC3676454EE7749793F79EFDBB0DF2C130977FE9D0B9043809E7969E308254741300E65419A
2,969,143 UART: [art] SIG.R = 3DCBA12D48885C93C9EA5FAB4AAF7442CE423026A1C77752FE6BA2B8732AF6BF3550BEA7FAD03F3E088596E085838097
2,975,922 UART: [art] SIG.S = 33A369189AED5FD2C8A76270FD502B8985A94B7A50AD893A1810DFAE6708380E4F2236C2FD9052F6075FD5A41ED3BBCB
2,999,896 UART: Caliptra RT
3,000,241 UART: [state] CFI Enabled
3,108,032 UART: [rt] RT listening for mailbox commands...
3,108,695 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,494 UART: [rt]cmd =0x46504c54, len=4
3,139,628 >>> mbox cmd response data (8 bytes)
3,139,975 UART: [rt] FIPS self test
3,140,303 UART: [kat] ++
3,140,455 UART: [kat] sha1
3,144,595 UART: [kat] SHA2-256
3,146,617 UART: [kat] SHA2-384
3,149,540 UART: [kat] SHA2-512-ACC
3,149,945 UART: Droping operation
3,150,566 UART: Fatal Error: 0x90050002
3,152,105 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,110 >>> mbox cmd response: failed
3,152,110 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,867 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,710 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,276 >>> mbox cmd response: failed
813,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,275 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,040 >>> mbox cmd response: failed
813,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,875 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,773 >>> mbox cmd response: failed
813,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,290 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,435 >>> mbox cmd response: failed
813,435 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,398 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,002 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,010 >>> mbox cmd response: failed
813,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,801 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,486 >>> mbox cmd response: failed
813,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,555 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,385 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,393 >>> mbox cmd response: failed
813,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,724 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,509 >>> mbox cmd response: failed
813,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,514 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,546 >>> mbox cmd response: failed
812,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,485 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,290 >>> mbox cmd response: failed
813,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,691 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,497 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,505 >>> mbox cmd response: failed
813,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,410 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,680 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,221 >>> mbox cmd response: failed
813,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,978 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,663 UART: [kat] SHA2-256
892,601 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,559 UART: [cold-reset] ++
1,477,053 UART: [fht] Storing FHT @ 0x50003400
1,479,962 UART: [idev] ++
1,480,130 UART: [idev] CDI.KEYID = 6
1,480,490 UART: [idev] SUBJECT.KEYID = 7
1,480,914 UART: [idev] UDS.KEYID = 0
1,481,259 ready_for_fw is high
1,481,259 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,086 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,746 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,344 UART: [ldev] --
1,585,643 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 115196 bytes
2,895,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,729 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,081 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,342 >>> mbox cmd response: success
3,090,518 UART: [afmc] ++
3,090,686 UART: [afmc] CDI.KEYID = 6
3,091,048 UART: [afmc] SUBJECT.KEYID = 7
3,091,473 UART: [afmc] AUTHORITY.KEYID = 5
3,127,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,116 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,624 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,509 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,199 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,176 UART: [afmc] --
3,170,054 UART: [cold-reset] --
3,171,018 UART: [state] Locking Datavault
3,172,269 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,873 UART: [state] Locking ICCM
3,173,313 UART: [exit] Launching FMC @ 0x40000130
3,178,642 UART:
3,178,658 UART: Running Caliptra FMC ...
3,179,066 UART:
3,179,120 UART: [state] CFI Enabled
3,189,155 UART: [fht] FMC Alias Private Key: 7
3,297,578 UART: [art] Extend RT PCRs Done
3,298,006 UART: [art] Lock RT PCRs Done
3,299,692 UART: [art] Populate DV Done
3,307,827 UART: [fht] FMC Alias Private Key: 7
3,308,807 UART: [art] Derive CDI
3,309,087 UART: [art] Store in in slot 0x4
3,394,660 UART: [art] Derive Key Pair
3,395,020 UART: [art] Store priv key in slot 0x5
3,408,322 UART: [art] Derive Key Pair - Done
3,423,134 UART: [art] Signing Cert with AUTHO
3,423,614 UART: RITY.KEYID = 7
3,438,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,511 UART: [art] PUB.X = 043731AAF42AF320847ECF9B132594BA11DB611280B18FFC2145D3C946C3B7C389C6A12939BB1AC75EB4201C231E4097
3,446,280 UART: [art] PUB.Y = C3B72F4444E92024BBEF2C4297306B9853CA96514C224D45FC5CB72A76B1EF1B16182325888D5572FFE5D35E4DA7FF2D
3,453,236 UART: [art] SIG.R = E6738473CB529898F690E03E0401B9BC9A3C13584778BEB34DC7109E28855B9B175C774E16012FA947E0F771B0DD134A
3,459,993 UART: [art] SIG.S = BB07DA421CBB6DFA246BC3EBE9630806738E8395A4DF8E569707873B5377EFEF33D8E858FFC6E5976367512834C58EE8
3,483,810 UART: Caliptra RT
3,484,063 UART: [state] CFI Enabled
3,592,955 UART: [rt] RT listening for mailbox commands...
3,593,618 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,503 UART: [rt]cmd =0x46504c54, len=4
3,624,727 >>> mbox cmd response data (8 bytes)
3,624,938 UART: [rt] FIPS self test
3,625,266 UART: [kat] ++
3,625,418 UART: [kat] sha1
3,629,874 UART: [kat] SHA2-256
3,631,896 UART: [kat] SHA2-384
3,634,693 UART: [kat] SHA2-512-ACC
3,636,176 UART: Droping operation
3,636,729 UART: Fatal Error: 0x90050003
3,638,268 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,273 >>> mbox cmd response: failed
3,638,273 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,506 UART: [idev] ++
1,479,674 UART: [idev] CDI.KEYID = 6
1,480,034 UART: [idev] SUBJECT.KEYID = 7
1,480,458 UART: [idev] UDS.KEYID = 0
1,480,803 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,958 UART: [idev] Erasing UDS.KEYID = 0
1,504,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,986 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,479 UART: [ldev] Erasing FE.KEYID = 1
1,545,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,044 UART: [ldev] --
1,585,313 UART: [fwproc] Waiting for Commands...
1,586,056 UART: [fwproc] Received command 0x46574c44
1,586,847 UART: [fwproc] Received Image of size 115196 bytes
2,894,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,221 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,573 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,119 ready_for_fw is high
1,362,119 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,600 >>> mbox cmd response: success
3,001,508 UART:
3,001,524 UART: Running Caliptra FMC ...
3,001,932 UART:
3,001,986 UART: [state] CFI Enabled
3,012,567 UART: [fht] FMC Alias Private Key: 7
3,120,740 UART: [art] Extend RT PCRs Done
3,121,168 UART: [art] Lock RT PCRs Done
3,123,042 UART: [art] Populate DV Done
3,131,343 UART: [fht] FMC Alias Private Key: 7
3,132,319 UART: [art] Derive CDI
3,132,599 UART: [art] Store in in slot 0x4
3,218,458 UART: [art] Derive Key Pair
3,218,818 UART: [art] Store priv key in slot 0x5
3,231,890 UART: [art] Derive Key Pair - Done
3,246,655 UART: [art] Signing Cert with AUTHO
3,247,135 UART: RITY.KEYID = 7
3,262,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,180 UART: [art] PUB.X = BD5DE8BE58052E43DDAC59D3AB5C013EA6C3CA9D0194AA51290299E956207527330B2AA03F7CBB9527C6785D4C79340D
3,269,940 UART: [art] PUB.Y = BD82C5E20F054ADFF19FD854492EC498FED0B3E4297D2B3A3FA725100712BFCB3FCE2850E518800E5F18198A0A44DC1F
3,276,889 UART: [art] SIG.R = A9E93544AAD280C80599ED459C0087BC98CE7AF2D26314C43C7E96607DCE8FEB137F8098CC1632069FE817CA21E85997
3,283,635 UART: [art] SIG.S = D9E53734CFAE014F73C55B7C407F2D702A5A687C89DE5E9639D7D916BBC4AADA3285AE17183C43A019BCE4897ED2AA2C
3,307,381 UART: Caliptra RT
3,307,634 UART: [state] CFI Enabled
3,414,912 UART: [rt] RT listening for mailbox commands...
3,415,575 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,388 UART: [rt]cmd =0x46504c54, len=4
3,446,316 >>> mbox cmd response data (8 bytes)
3,446,611 UART: [rt] FIPS self test
3,446,939 UART: [kat] ++
3,447,091 UART: [kat] sha1
3,451,279 UART: [kat] SHA2-256
3,453,301 UART: [kat] SHA2-384
3,456,256 UART: [kat] SHA2-512-ACC
3,457,739 UART: Droping operation
3,458,182 UART: Fatal Error: 0x90050003
3,459,721 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,459,726 >>> mbox cmd response: failed
3,459,726 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,459,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,206 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,366 UART: [kat] SHA2-256
892,304 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,479 UART: [kat] HMAC-384Kdf
907,355 UART: [kat] LMS
1,475,551 UART: [kat] --
1,476,384 UART: [cold-reset] ++
1,476,888 UART: [fht] Storing FHT @ 0x50003400
1,479,525 UART: [idev] ++
1,479,693 UART: [idev] CDI.KEYID = 6
1,480,053 UART: [idev] SUBJECT.KEYID = 7
1,480,477 UART: [idev] UDS.KEYID = 0
1,480,822 ready_for_fw is high
1,480,822 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,153 UART: [idev] --
1,515,386 UART: [ldev] ++
1,515,554 UART: [ldev] CDI.KEYID = 6
1,515,917 UART: [ldev] SUBJECT.KEYID = 5
1,516,343 UART: [ldev] AUTHORITY.KEYID = 7
1,516,806 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,781 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,803 UART: [fwproc] Received command 0x46574c44
1,588,594 UART: [fwproc] Received Image of size 115196 bytes
2,894,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,081 >>> mbox cmd response: success
3,090,263 UART: [afmc] ++
3,090,431 UART: [afmc] CDI.KEYID = 6
3,090,793 UART: [afmc] SUBJECT.KEYID = 7
3,091,218 UART: [afmc] AUTHORITY.KEYID = 5
3,126,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,592 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,282 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,017 UART: [afmc] --
3,169,127 UART: [cold-reset] --
3,170,005 UART: [state] Locking Datavault
3,171,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,836 UART: [state] Locking ICCM
3,172,298 UART: [exit] Launching FMC @ 0x40000130
3,177,627 UART:
3,177,643 UART: Running Caliptra FMC ...
3,178,051 UART:
3,178,194 UART: [state] CFI Enabled
3,188,813 UART: [fht] FMC Alias Private Key: 7
3,296,906 UART: [art] Extend RT PCRs Done
3,297,334 UART: [art] Lock RT PCRs Done
3,298,610 UART: [art] Populate DV Done
3,306,901 UART: [fht] FMC Alias Private Key: 7
3,308,035 UART: [art] Derive CDI
3,308,315 UART: [art] Store in in slot 0x4
3,394,114 UART: [art] Derive Key Pair
3,394,474 UART: [art] Store priv key in slot 0x5
3,407,694 UART: [art] Derive Key Pair - Done
3,422,904 UART: [art] Signing Cert with AUTHO
3,423,384 UART: RITY.KEYID = 7
3,438,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,453 UART: [art] PUB.X = F9F90A204239B5DFF24F2113B1BA43F920B1BC9CC139CA3F386F7DFEF47EC6ACEEA41C2C3C3A1B16BF87A06830232F46
3,446,240 UART: [art] PUB.Y = 796F3744AFF2E0981ADFAD89EB5571A9C47A8C9719A2F6EAC8F5E8479AB42F72F76A5C037D93270BAD0F2D2BFB29A775
3,453,197 UART: [art] SIG.R = 78D7ECE58F4DCFC2B3640D16CDA5E1D4282545EFEDD2A2C0F2F2A93CD33B132F4703D873386FF1B7205D231FA19CF199
3,459,977 UART: [art] SIG.S = E5A228A9E8E983D0CADA7997B4AC6C33654A2F19388A46D99E093D164CCBF72CBA72DD52EAC1FE490B96747496DF05AA
3,484,145 UART: Caliptra RT
3,484,490 UART: [state] CFI Enabled
3,592,969 UART: [rt] RT listening for mailbox commands...
3,593,632 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,597 UART: [rt]cmd =0x46504c54, len=4
3,624,751 >>> mbox cmd response data (8 bytes)
3,624,934 UART: [rt] FIPS self test
3,625,262 UART: [kat] ++
3,625,414 UART: [kat] sha1
3,629,510 UART: [kat] SHA2-256
3,631,532 UART: [kat] SHA2-384
3,634,447 UART: [kat] SHA2-512-ACC
3,635,930 UART: Droping operation
3,636,527 UART: Fatal Error: 0x90050003
3,638,066 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,071 >>> mbox cmd response: failed
3,638,071 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,521 UART: [kat] HMAC-384Kdf
908,131 UART: [kat] LMS
1,476,327 UART: [kat] --
1,477,176 UART: [cold-reset] ++
1,477,578 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,199 UART: [idev] Erasing UDS.KEYID = 0
1,505,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,545 UART: [idev] --
1,515,702 UART: [ldev] ++
1,515,870 UART: [ldev] CDI.KEYID = 6
1,516,233 UART: [ldev] SUBJECT.KEYID = 5
1,516,659 UART: [ldev] AUTHORITY.KEYID = 7
1,517,122 UART: [ldev] FE.KEYID = 1
1,522,582 UART: [ldev] Erasing FE.KEYID = 1
1,548,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,853 UART: [ldev] --
1,588,216 UART: [fwproc] Waiting for Commands...
1,588,893 UART: [fwproc] Received command 0x46574c44
1,589,684 UART: [fwproc] Received Image of size 115196 bytes
2,897,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,225 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,608 ready_for_fw is high
1,362,608 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,625 >>> mbox cmd response: success
3,001,633 UART:
3,001,649 UART: Running Caliptra FMC ...
3,002,057 UART:
3,002,200 UART: [state] CFI Enabled
3,012,867 UART: [fht] FMC Alias Private Key: 7
3,121,376 UART: [art] Extend RT PCRs Done
3,121,804 UART: [art] Lock RT PCRs Done
3,123,612 UART: [art] Populate DV Done
3,131,885 UART: [fht] FMC Alias Private Key: 7
3,132,839 UART: [art] Derive CDI
3,133,119 UART: [art] Store in in slot 0x4
3,218,684 UART: [art] Derive Key Pair
3,219,044 UART: [art] Store priv key in slot 0x5
3,232,400 UART: [art] Derive Key Pair - Done
3,247,170 UART: [art] Signing Cert with AUTHO
3,247,650 UART: RITY.KEYID = 7
3,262,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,589 UART: [art] PUB.X = 1CF8F6D50E6F0156BEA238DFFB7E37CD4A9DC8FC5A7E9EAD5C2DF440D712825D486F1347F72F1E9177C48FEF66758FB9
3,270,373 UART: [art] PUB.Y = 96F38F1D17A4BDF6152AFFBA8AECE74E03BB77D7A9867A6518993AA53D53778809C29B2E06A68FDB34054537B5699D47
3,277,317 UART: [art] SIG.R = 8B2EC52D3287A1F198028C0259A0C58F6E953A7A3A47F1B8FADE94E715C9B8CDDD4BB82812075FA09207A7FD700E4814
3,284,080 UART: [art] SIG.S = DE8658770ACF2211FC9D24BD1A5F477D68480CE4D24AD3B34296FD53EFA2AF6DAB9DA834FDA87338B09E39D6B5338D29
3,308,153 UART: Caliptra RT
3,308,498 UART: [state] CFI Enabled
3,417,450 UART: [rt] RT listening for mailbox commands...
3,418,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,234 UART: [rt]cmd =0x46504c54, len=4
3,449,446 >>> mbox cmd response data (8 bytes)
3,449,803 UART: [rt] FIPS self test
3,450,131 UART: [kat] ++
3,450,283 UART: [kat] sha1
3,454,533 UART: [kat] SHA2-256
3,456,555 UART: [kat] SHA2-384
3,459,364 UART: [kat] SHA2-512-ACC
3,460,847 UART: Droping operation
3,461,350 UART: Fatal Error: 0x90050003
3,462,889 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,462,894 >>> mbox cmd response: failed
3,462,894 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,462,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,373 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,593 UART: [fht] FHT @ 0x50003400
1,175,474 UART: [idev] ++
1,175,642 UART: [idev] CDI.KEYID = 6
1,176,002 UART: [idev] SUBJECT.KEYID = 7
1,176,426 UART: [idev] UDS.KEYID = 0
1,176,771 ready_for_fw is high
1,176,771 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,400 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,209,977 UART: [idev] --
1,210,801 UART: [ldev] ++
1,210,969 UART: [ldev] CDI.KEYID = 6
1,211,332 UART: [ldev] SUBJECT.KEYID = 5
1,211,758 UART: [ldev] AUTHORITY.KEYID = 7
1,212,221 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,332 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,360 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,353 >>> mbox cmd response: success
2,785,501 UART: [afmc] ++
2,785,669 UART: [afmc] CDI.KEYID = 6
2,786,031 UART: [afmc] SUBJECT.KEYID = 7
2,786,456 UART: [afmc] AUTHORITY.KEYID = 5
2,821,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,912 UART: [afmc] --
2,864,862 UART: [cold-reset] --
2,865,922 UART: [state] Locking Datavault
2,867,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,787 UART: [state] Locking ICCM
2,868,287 UART: [exit] Launching FMC @ 0x40000130
2,873,616 UART:
2,873,632 UART: Running Caliptra FMC ...
2,874,040 UART:
2,874,094 UART: [state] CFI Enabled
2,884,755 UART: [fht] FMC Alias Private Key: 7
2,993,588 UART: [art] Extend RT PCRs Done
2,994,016 UART: [art] Lock RT PCRs Done
2,995,562 UART: [art] Populate DV Done
3,003,797 UART: [fht] FMC Alias Private Key: 7
3,004,725 UART: [art] Derive CDI
3,005,005 UART: [art] Store in in slot 0x4
3,090,792 UART: [art] Derive Key Pair
3,091,152 UART: [art] Store priv key in slot 0x5
3,104,240 UART: [art] Derive Key Pair - Done
3,118,840 UART: [art] Signing Cert with AUTHO
3,119,320 UART: RITY.KEYID = 7
3,134,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,411 UART: [art] PUB.X = 30A5F5D38141B433E357C5FEC8004F33FB4F041BA1BB9EC6B48223E6DB754C473621C72D9DCB88A5CD3E56984F325E0C
3,142,163 UART: [art] PUB.Y = C7010EE1E6A41FF7EE69873B960DB8A2CF2B0FF147B04637B6D634899B84F89807FDE69B70D357DDE68A323D7FE1A200
3,149,086 UART: [art] SIG.R = 35406D075D18E3ED27B26491E8D78F7C94EBD358FF52DCF726C72AE4C59E61E4A4CFC14C90E69482DA3E3482C206475D
3,155,858 UART: [art] SIG.S = D137C31DBA8F59B93EF7C63577DAB70CD3D2227D568ADACCA274F4FA66C56E47EC7C57601802465E5F5005CFDF69D733
3,180,026 UART: Caliptra RT
3,180,279 UART: [state] CFI Enabled
3,287,560 UART: [rt] RT listening for mailbox commands...
3,288,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,032 UART: [rt]cmd =0x46504c54, len=4
3,318,942 >>> mbox cmd response data (8 bytes)
3,319,159 UART: [rt] FIPS self test
3,319,487 UART: [kat] ++
3,319,639 UART: [kat] sha1
3,323,913 UART: [kat] SHA2-256
3,325,935 UART: [kat] SHA2-384
3,328,800 UART: [kat] SHA2-512-ACC
3,330,283 UART: Droping operation
3,330,838 UART: Fatal Error: 0x90050003
3,332,377 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,382 >>> mbox cmd response: failed
3,332,382 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,356 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,613 UART: [fht] FHT @ 0x50003400
1,175,204 UART: [idev] ++
1,175,372 UART: [idev] CDI.KEYID = 6
1,175,732 UART: [idev] SUBJECT.KEYID = 7
1,176,156 UART: [idev] UDS.KEYID = 0
1,176,501 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,238 UART: [idev] Erasing UDS.KEYID = 0
1,201,099 UART: [idev] Sha1 KeyId Algorithm
1,209,807 UART: [idev] --
1,210,895 UART: [ldev] ++
1,211,063 UART: [ldev] CDI.KEYID = 6
1,211,426 UART: [ldev] SUBJECT.KEYID = 5
1,211,852 UART: [ldev] AUTHORITY.KEYID = 7
1,212,315 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,282,180 UART: [fwproc] Wait for Commands...
1,282,958 UART: [fwproc] Recv command 0x46574c44
1,283,686 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,946 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,173 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 ready_for_fw is high
1,060,179 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,196 >>> mbox cmd response: success
2,699,360 UART:
2,699,376 UART: Running Caliptra FMC ...
2,699,784 UART:
2,699,838 UART: [state] CFI Enabled
2,710,305 UART: [fht] FMC Alias Private Key: 7
2,818,470 UART: [art] Extend RT PCRs Done
2,818,898 UART: [art] Lock RT PCRs Done
2,820,396 UART: [art] Populate DV Done
2,828,793 UART: [fht] FMC Alias Private Key: 7
2,829,823 UART: [art] Derive CDI
2,830,103 UART: [art] Store in in slot 0x4
2,915,904 UART: [art] Derive Key Pair
2,916,264 UART: [art] Store priv key in slot 0x5
2,929,820 UART: [art] Derive Key Pair - Done
2,944,810 UART: [art] Signing Cert with AUTHO
2,945,290 UART: RITY.KEYID = 7
2,960,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,203 UART: [art] PUB.X = DC73762FF994BA02494D24FE0EC76DA40EEC823E26FFFFE24794ADCD8F5405740AD4EC8DE16A174DB1C002DCF711E0CE
2,967,979 UART: [art] PUB.Y = 7098533807BBFBFEC2D7D51F97A1F7C040A39D2085E11314B2038FFDB9A88DDCD53B3F27C2ACB648BD132E072EE1D09F
2,974,936 UART: [art] SIG.R = 5CEC8C369D21F20E001145B4C8F00286112CC0921A497DE870BA09C40EB0446149FE35CF4FFCEC87E057C136FC3D282B
2,981,680 UART: [art] SIG.S = 9DDB749BE2F18421BF3ED40CB63D06800E98C79A1F0517FFCCA40A1A1567D03583692A99DDE9A540243542574FCF4C0A
3,005,987 UART: Caliptra RT
3,006,240 UART: [state] CFI Enabled
3,114,493 UART: [rt] RT listening for mailbox commands...
3,115,156 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,951 UART: [rt]cmd =0x46504c54, len=4
3,146,207 >>> mbox cmd response data (8 bytes)
3,146,568 UART: [rt] FIPS self test
3,146,896 UART: [kat] ++
3,147,048 UART: [kat] sha1
3,151,502 UART: [kat] SHA2-256
3,153,524 UART: [kat] SHA2-384
3,156,353 UART: [kat] SHA2-512-ACC
3,157,836 UART: Droping operation
3,158,341 UART: Fatal Error: 0x90050003
3,159,880 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,885 >>> mbox cmd response: failed
3,159,885 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,744 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,486 UART: [kat] SHA2-256
904,426 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
918,975 UART: [kat] HMAC-384Kdf
923,699 UART: [kat] LMS
1,172,027 UART: [kat] --
1,173,260 UART: [cold-reset] ++
1,173,834 UART: [fht] FHT @ 0x50003400
1,176,395 UART: [idev] ++
1,176,563 UART: [idev] CDI.KEYID = 6
1,176,923 UART: [idev] SUBJECT.KEYID = 7
1,177,347 UART: [idev] UDS.KEYID = 0
1,177,692 ready_for_fw is high
1,177,692 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,541 UART: [idev] Erasing UDS.KEYID = 0
1,202,968 UART: [idev] Sha1 KeyId Algorithm
1,211,478 UART: [idev] --
1,212,428 UART: [ldev] ++
1,212,596 UART: [ldev] CDI.KEYID = 6
1,212,959 UART: [ldev] SUBJECT.KEYID = 5
1,213,385 UART: [ldev] AUTHORITY.KEYID = 7
1,213,848 UART: [ldev] FE.KEYID = 1
1,218,998 UART: [ldev] Erasing FE.KEYID = 1
1,245,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,784 UART: [ldev] --
1,285,295 UART: [fwproc] Wait for Commands...
1,285,987 UART: [fwproc] Recv command 0x46574c44
1,286,715 UART: [fwproc] Recv'd Img size: 115196 bytes
2,595,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,009 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,789,064 >>> mbox cmd response: success
2,790,248 UART: [afmc] ++
2,790,416 UART: [afmc] CDI.KEYID = 6
2,790,778 UART: [afmc] SUBJECT.KEYID = 7
2,791,203 UART: [afmc] AUTHORITY.KEYID = 5
2,826,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,476 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,233 UART: [afmc] --
2,870,333 UART: [cold-reset] --
2,871,005 UART: [state] Locking Datavault
2,872,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,164 UART: [state] Locking ICCM
2,873,634 UART: [exit] Launching FMC @ 0x40000130
2,878,963 UART:
2,878,979 UART: Running Caliptra FMC ...
2,879,387 UART:
2,879,530 UART: [state] CFI Enabled
2,890,093 UART: [fht] FMC Alias Private Key: 7
2,997,928 UART: [art] Extend RT PCRs Done
2,998,356 UART: [art] Lock RT PCRs Done
2,999,928 UART: [art] Populate DV Done
3,008,179 UART: [fht] FMC Alias Private Key: 7
3,009,235 UART: [art] Derive CDI
3,009,515 UART: [art] Store in in slot 0x4
3,094,982 UART: [art] Derive Key Pair
3,095,342 UART: [art] Store priv key in slot 0x5
3,108,800 UART: [art] Derive Key Pair - Done
3,123,555 UART: [art] Signing Cert with AUTHO
3,124,035 UART: RITY.KEYID = 7
3,138,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,476 UART: [art] PUB.X = E26D1FDA5BC5C099179AB8B7BB9A723C155FD9919A4AF3FC19993AFD6B434CC198DB2CB46BC73064A0F800C96F493535
3,146,238 UART: [art] PUB.Y = 606764F42D27B3347A44B40623D79392386DD82CD931B75FC2779E839B0CA610BBF517A340F3CE06A288B1E376ABCC1D
3,153,181 UART: [art] SIG.R = 97ACCAC3B4CFE4A9EBF9C6C2882D7358B4C280E9D24802EDDF1CBD657E4CC2BBA3D5AA939D429564E588660733DBAA23
3,159,967 UART: [art] SIG.S = 167E1616FB9567BA5C089F81B936883C4D20DC47A6F4DCB00B764C0BCEBAFD2B4A9E86215069F7C261849A73C5DAEFBA
3,184,455 UART: Caliptra RT
3,184,800 UART: [state] CFI Enabled
3,293,679 UART: [rt] RT listening for mailbox commands...
3,294,342 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,133 UART: [rt]cmd =0x46504c54, len=4
3,325,407 >>> mbox cmd response data (8 bytes)
3,325,692 UART: [rt] FIPS self test
3,326,020 UART: [kat] ++
3,326,172 UART: [kat] sha1
3,330,256 UART: [kat] SHA2-256
3,332,278 UART: [kat] SHA2-384
3,335,113 UART: [kat] SHA2-512-ACC
3,336,596 UART: Droping operation
3,337,179 UART: Fatal Error: 0x90050003
3,338,718 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,723 >>> mbox cmd response: failed
3,338,723 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
917,999 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,886 UART: [cold-reset] ++
1,172,354 UART: [fht] FHT @ 0x50003400
1,174,849 UART: [idev] ++
1,175,017 UART: [idev] CDI.KEYID = 6
1,175,377 UART: [idev] SUBJECT.KEYID = 7
1,175,801 UART: [idev] UDS.KEYID = 0
1,176,146 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,507 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,208,880 UART: [idev] --
1,209,892 UART: [ldev] ++
1,210,060 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,849 UART: [ldev] AUTHORITY.KEYID = 7
1,211,312 UART: [ldev] FE.KEYID = 1
1,216,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,428 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,277 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,406 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,124 ready_for_fw is high
1,061,124 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,365 >>> mbox cmd response: success
2,700,863 UART:
2,700,879 UART: Running Caliptra FMC ...
2,701,287 UART:
2,701,430 UART: [state] CFI Enabled
2,712,301 UART: [fht] FMC Alias Private Key: 7
2,819,880 UART: [art] Extend RT PCRs Done
2,820,308 UART: [art] Lock RT PCRs Done
2,821,714 UART: [art] Populate DV Done
2,830,175 UART: [fht] FMC Alias Private Key: 7
2,831,277 UART: [art] Derive CDI
2,831,557 UART: [art] Store in in slot 0x4
2,917,424 UART: [art] Derive Key Pair
2,917,784 UART: [art] Store priv key in slot 0x5
2,931,182 UART: [art] Derive Key Pair - Done
2,945,958 UART: [art] Signing Cert with AUTHO
2,946,438 UART: RITY.KEYID = 7
2,962,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,781 UART: [art] PUB.X = 09319BD9853BAB3D780F5A1F34C96978016966B38EDA21A0184D8CA48D6CC050672BF71882B318F72A3548D414AE1BD6
2,969,542 UART: [art] PUB.Y = 0FAD3FB965A4D95A8D74980034254E41F0CE097F87EE81F1D626FED04C91A546F6DE70FDBD8742D1FE9C32FB2C597095
2,976,476 UART: [art] SIG.R = 640F4E1A6DC7DA9171A622495B1544CF6836F6185F4735BD90904B967BFB4E24D04136AE930BD5982A251563A9E8262A
2,983,236 UART: [art] SIG.S = B92E7AAB4A5792372E3E13094D0C9D1DFAE35ED8A7A3C180B59BD5EA246FDA2ABF129C8665D90382E3DA5768FC4BF98A
3,006,682 UART: Caliptra RT
3,007,027 UART: [state] CFI Enabled
3,114,852 UART: [rt] RT listening for mailbox commands...
3,115,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,464 UART: [rt]cmd =0x46504c54, len=4
3,146,642 >>> mbox cmd response data (8 bytes)
3,146,841 UART: [rt] FIPS self test
3,147,169 UART: [kat] ++
3,147,321 UART: [kat] sha1
3,151,459 UART: [kat] SHA2-256
3,153,481 UART: [kat] SHA2-384
3,156,372 UART: [kat] SHA2-512-ACC
3,157,855 UART: Droping operation
3,158,284 UART: Fatal Error: 0x90050003
3,159,823 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,828 >>> mbox cmd response: failed
3,159,828 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,992 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,927 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,136 UART: [kat] SHA2-256
890,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,815 UART: [kat] ++
894,967 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,126 UART: [kat] SHA2-512-ACC
906,027 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,173,947 ready_for_fw is high
1,173,947 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,265 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,208,066 UART: [ldev] ++
1,208,234 UART: [ldev] CDI.KEYID = 6
1,208,598 UART: [ldev] SUBJECT.KEYID = 5
1,209,025 UART: [ldev] AUTHORITY.KEYID = 7
1,209,488 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,240,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,280,002 UART: [fwproc] Wait for Commands...
1,280,807 UART: [fwproc] Recv command 0x46574c44
1,281,540 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,359 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,415 >>> mbox cmd response: success
2,784,468 UART: [afmc] ++
2,784,636 UART: [afmc] CDI.KEYID = 6
2,784,999 UART: [afmc] SUBJECT.KEYID = 7
2,785,425 UART: [afmc] AUTHORITY.KEYID = 5
2,821,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,407 UART: [afmc] --
2,864,503 UART: [cold-reset] --
2,865,535 UART: [state] Locking Datavault
2,866,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,488 UART: [state] Locking ICCM
2,868,034 UART: [exit] Launching FMC @ 0x40000130
2,873,363 UART:
2,873,379 UART: Running Caliptra FMC ...
2,873,787 UART:
2,873,841 UART: [state] CFI Enabled
2,885,054 UART: [fht] FMC Alias Private Key: 7
2,993,579 UART: [art] Extend RT PCRs Done
2,994,007 UART: [art] Lock RT PCRs Done
2,995,477 UART: [art] Populate DV Done
3,003,548 UART: [fht] FMC Alias Private Key: 7
3,004,640 UART: [art] Derive CDI
3,004,920 UART: [art] Store in in slot 0x4
3,090,661 UART: [art] Derive Key Pair
3,091,021 UART: [art] Store priv key in slot 0x5
3,103,433 UART: [art] Derive Key Pair - Done
3,118,224 UART: [art] Signing Cert with AUTHO
3,118,704 UART: RITY.KEYID = 7
3,134,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,835 UART: [art] PUB.X = 1D4F88F46AFE6735168F0C711A809DC3BF4E64BCCC4196D34FA6F37719BA8A9A16DA35AEBB187895A790A3C26FF135FE
3,141,618 UART: [art] PUB.Y = 2B639B8586E07F9891EF0B398D7790FBE20F611DD68AF662A2A37355D939154D844563AA1FC3D8C1A2B333D45610578A
3,148,560 UART: [art] SIG.R = 7A72D8080FED7D133E3D521813D70B6B74E2E0FB07A9831BA738CA0792DBFE8620D89081E2D877FFAC8B98B604CD32AA
3,155,324 UART: [art] SIG.S = A7D1647795C66EB514408F57A5BCD532BDF11A19AC206AA05E178B216DD20EEB804057A014DBB9625FD9FF9E149AFBBD
3,179,420 UART: Caliptra RT
3,179,673 UART: [state] CFI Enabled
3,287,538 UART: [rt] RT listening for mailbox commands...
3,288,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,866 UART: [rt]cmd =0x46504c54, len=4
3,319,162 >>> mbox cmd response data (8 bytes)
3,319,303 UART: [rt] FIPS self test
3,319,631 UART: [kat] ++
3,319,783 UART: [kat] sha1
3,323,797 UART: [kat] SHA2-256
3,325,819 UART: [kat] SHA2-384
3,328,676 UART: [kat] SHA2-512-ACC
3,330,159 UART: Droping operation
3,330,650 UART: Fatal Error: 0x90050003
3,332,189 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,194 >>> mbox cmd response: failed
3,332,194 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,914 UART: [kat] LMS
1,169,226 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,174,375 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,209,290 UART: [ldev] ++
1,209,458 UART: [ldev] CDI.KEYID = 6
1,209,822 UART: [ldev] SUBJECT.KEYID = 5
1,210,249 UART: [ldev] AUTHORITY.KEYID = 7
1,210,712 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,644 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,407 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,403 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,378 ready_for_fw is high
1,055,378 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,655 >>> mbox cmd response: success
2,694,125 UART:
2,694,141 UART: Running Caliptra FMC ...
2,694,549 UART:
2,694,603 UART: [state] CFI Enabled
2,705,088 UART: [fht] FMC Alias Private Key: 7
2,813,219 UART: [art] Extend RT PCRs Done
2,813,647 UART: [art] Lock RT PCRs Done
2,815,245 UART: [art] Populate DV Done
2,823,702 UART: [fht] FMC Alias Private Key: 7
2,824,656 UART: [art] Derive CDI
2,824,936 UART: [art] Store in in slot 0x4
2,910,727 UART: [art] Derive Key Pair
2,911,087 UART: [art] Store priv key in slot 0x5
2,924,819 UART: [art] Derive Key Pair - Done
2,939,551 UART: [art] Signing Cert with AUTHO
2,940,031 UART: RITY.KEYID = 7
2,955,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,154 UART: [art] PUB.X = 9E8229D2381C3E8EB1E38629CBD50EDAD05223C78A467205BC8CDFF8F7A5ACFCC75584295D9D1F6C493A34FAB8618054
2,962,930 UART: [art] PUB.Y = 4D3A6A080FD3FE4EB3F3F0048984E69DD94F030B28719D063FCD5E63DB046DDE7716496FA4A089CEE6D238D0D136E9BD
2,969,873 UART: [art] SIG.R = 0275588E49F80B192BC790632DF3AF230316DB69513695CC891CE2518927208F03398A34A5E707CEB0DAB168CD250A5A
2,976,621 UART: [art] SIG.S = 4DB582DA311D6CA346216C8A506A261E105B5638F964A09C7BCD4445C1DB9CFC334472ED8CE68EF74208C3AB7C11162D
2,999,933 UART: Caliptra RT
3,000,186 UART: [state] CFI Enabled
3,107,425 UART: [rt] RT listening for mailbox commands...
3,108,088 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,959 UART: [rt]cmd =0x46504c54, len=4
3,139,063 >>> mbox cmd response data (8 bytes)
3,139,224 UART: [rt] FIPS self test
3,139,552 UART: [kat] ++
3,139,704 UART: [kat] sha1
3,143,942 UART: [kat] SHA2-256
3,145,964 UART: [kat] SHA2-384
3,148,759 UART: [kat] SHA2-512-ACC
3,150,242 UART: Droping operation
3,150,661 UART: Fatal Error: 0x90050003
3,152,200 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,205 >>> mbox cmd response: failed
3,152,205 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,600 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,735 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,665 UART: [ldev] ++
1,208,833 UART: [ldev] CDI.KEYID = 6
1,209,197 UART: [ldev] SUBJECT.KEYID = 5
1,209,624 UART: [ldev] AUTHORITY.KEYID = 7
1,210,087 UART: [ldev] FE.KEYID = 1
1,215,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,025 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,282,110 UART: [fwproc] Recv command 0x46574c44
1,282,843 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,784 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,868 >>> mbox cmd response: success
2,786,071 UART: [afmc] ++
2,786,239 UART: [afmc] CDI.KEYID = 6
2,786,602 UART: [afmc] SUBJECT.KEYID = 7
2,787,028 UART: [afmc] AUTHORITY.KEYID = 5
2,823,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,212 UART: [afmc] --
2,867,216 UART: [cold-reset] --
2,867,930 UART: [state] Locking Datavault
2,869,105 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,709 UART: [state] Locking ICCM
2,870,209 UART: [exit] Launching FMC @ 0x40000130
2,875,538 UART:
2,875,554 UART: Running Caliptra FMC ...
2,875,962 UART:
2,876,105 UART: [state] CFI Enabled
2,887,054 UART: [fht] FMC Alias Private Key: 7
2,995,579 UART: [art] Extend RT PCRs Done
2,996,007 UART: [art] Lock RT PCRs Done
2,997,691 UART: [art] Populate DV Done
3,005,862 UART: [fht] FMC Alias Private Key: 7
3,006,876 UART: [art] Derive CDI
3,007,156 UART: [art] Store in in slot 0x4
3,092,785 UART: [art] Derive Key Pair
3,093,145 UART: [art] Store priv key in slot 0x5
3,106,711 UART: [art] Derive Key Pair - Done
3,121,016 UART: [art] Signing Cert with AUTHO
3,121,496 UART: RITY.KEYID = 7
3,136,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,269 UART: [art] PUB.X = 3025B2EB903CF9E82DA92906C3B126558241257D6B1287C17093083EB930D86313F9643F7E971626F9C5E54EC9E5CAC6
3,144,027 UART: [art] PUB.Y = 01F02C6146940FA176F8C8F3CFB4A87FD6736C77E407F5BA5B97A6C56127C719E32FC0FB18C4F5BA97F62227C163FD47
3,150,976 UART: [art] SIG.R = 10A30FE979DB579FCCBDF8837FE8CDD7093A0D82094752C5C0C2A5526B9AC0FAF148DB750BBF98D80D97F4AF03B91C71
3,157,743 UART: [art] SIG.S = 9888C48B51F5153E86BA3F57BDB0C93D03EC19FA84A9B2E147EBA4387C5CE8932E29306E512AB28912A6684F986AB493
3,181,351 UART: Caliptra RT
3,181,696 UART: [state] CFI Enabled
3,289,673 UART: [rt] RT listening for mailbox commands...
3,290,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,291 UART: [rt]cmd =0x46504c54, len=4
3,321,469 >>> mbox cmd response data (8 bytes)
3,321,778 UART: [rt] FIPS self test
3,322,106 UART: [kat] ++
3,322,258 UART: [kat] sha1
3,326,532 UART: [kat] SHA2-256
3,328,554 UART: [kat] SHA2-384
3,331,437 UART: [kat] SHA2-512-ACC
3,332,920 UART: Droping operation
3,333,419 UART: Fatal Error: 0x90050003
3,334,958 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,963 >>> mbox cmd response: failed
3,334,963 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,176 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,370 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,647 ready_for_fw is high
1,056,647 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,058 >>> mbox cmd response: success
2,697,312 UART:
2,697,328 UART: Running Caliptra FMC ...
2,697,736 UART:
2,697,879 UART: [state] CFI Enabled
2,708,486 UART: [fht] FMC Alias Private Key: 7
2,815,875 UART: [art] Extend RT PCRs Done
2,816,303 UART: [art] Lock RT PCRs Done
2,818,013 UART: [art] Populate DV Done
2,826,158 UART: [fht] FMC Alias Private Key: 7
2,827,200 UART: [art] Derive CDI
2,827,480 UART: [art] Store in in slot 0x4
2,913,175 UART: [art] Derive Key Pair
2,913,535 UART: [art] Store priv key in slot 0x5
2,926,765 UART: [art] Derive Key Pair - Done
2,941,528 UART: [art] Signing Cert with AUTHO
2,942,008 UART: RITY.KEYID = 7
2,957,280 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,045 UART: [art] PUB.X = 6A10498237AC3CBE0AFBCFC68E4AFF1982A8DDD4A838AB21FA45EA09839F296E97EB010B0BDD09BC9BE5E6595C41F8C3
2,964,821 UART: [art] PUB.Y = A22A6FFD33B3B6FB247290505008F9B0CEA379A73442D923FABB2250D4D3D2ADC607BAA1255CC6E1328A42ACF7BD4222
2,971,779 UART: [art] SIG.R = A0A96DF6DBE227175F5A00F46E1D98F61239E095DECD54C470B416FF28473C820DA5135D61051628CFFE570288CF7FBA
2,978,526 UART: [art] SIG.S = BE15602F4D2D8A4A83F476F2DC7D006C228A52DF265854235975AD9827B790693F6CC9326B065165BEE120D199241EDC
3,001,940 UART: Caliptra RT
3,002,285 UART: [state] CFI Enabled
3,109,915 UART: [rt] RT listening for mailbox commands...
3,110,578 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,527 UART: [rt]cmd =0x46504c54, len=4
3,141,669 >>> mbox cmd response data (8 bytes)
3,141,922 UART: [rt] FIPS self test
3,142,250 UART: [kat] ++
3,142,402 UART: [kat] sha1
3,146,486 UART: [kat] SHA2-256
3,148,508 UART: [kat] SHA2-384
3,151,405 UART: [kat] SHA2-512-ACC
3,152,888 UART: Droping operation
3,153,339 UART: Fatal Error: 0x90050003
3,154,878 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,883 >>> mbox cmd response: failed
3,154,883 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,203 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,454 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,222 >>> mbox cmd response: failed
812,222 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,449 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,542 >>> mbox cmd response: failed
812,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,223 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,815 >>> mbox cmd response: failed
811,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,746 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,816 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,285 >>> mbox cmd response: failed
812,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,250 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,358 >>> mbox cmd response: failed
812,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,981 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,734 >>> mbox cmd response: failed
811,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,797 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,245 >>> mbox cmd response: failed
812,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,251 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,176 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,141 >>> mbox cmd response: failed
812,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,922 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,582 >>> mbox cmd response: failed
811,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,121 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,314 >>> mbox cmd response: failed
812,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,715 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,349 >>> mbox cmd response: failed
812,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,284 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,277 >>> mbox cmd response: failed
812,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,698 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,693 UART: [kat] SHA2-256
892,631 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
903,052 UART: [kat] HMAC-384Kdf
907,842 UART: [kat] LMS
1,476,038 UART: [kat] --
1,477,131 UART: [cold-reset] ++
1,477,689 UART: [fht] Storing FHT @ 0x50003400
1,480,464 UART: [idev] ++
1,480,632 UART: [idev] CDI.KEYID = 6
1,480,992 UART: [idev] SUBJECT.KEYID = 7
1,481,416 UART: [idev] UDS.KEYID = 0
1,481,761 ready_for_fw is high
1,481,761 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,178 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,012 UART: [idev] --
1,514,937 UART: [ldev] ++
1,515,105 UART: [ldev] CDI.KEYID = 6
1,515,468 UART: [ldev] SUBJECT.KEYID = 5
1,515,894 UART: [ldev] AUTHORITY.KEYID = 7
1,516,357 UART: [ldev] FE.KEYID = 1
1,521,503 UART: [ldev] Erasing FE.KEYID = 1
1,546,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,882 UART: [ldev] --
1,586,175 UART: [fwproc] Waiting for Commands...
1,586,890 UART: [fwproc] Received command 0x46574c44
1,587,681 UART: [fwproc] Received Image of size 115196 bytes
2,896,121 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,326 >>> mbox cmd response: success
3,091,580 UART: [afmc] ++
3,091,748 UART: [afmc] CDI.KEYID = 6
3,092,110 UART: [afmc] SUBJECT.KEYID = 7
3,092,535 UART: [afmc] AUTHORITY.KEYID = 5
3,127,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,705 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,395 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,282 UART: [afmc] --
3,170,170 UART: [cold-reset] --
3,170,974 UART: [state] Locking Datavault
3,172,347 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,951 UART: [state] Locking ICCM
3,173,411 UART: [exit] Launching FMC @ 0x40000130
3,178,740 UART:
3,178,756 UART: Running Caliptra FMC ...
3,179,164 UART:
3,179,218 UART: [state] CFI Enabled
3,189,899 UART: [fht] FMC Alias Private Key: 7
3,297,740 UART: [art] Extend RT PCRs Done
3,298,168 UART: [art] Lock RT PCRs Done
3,299,708 UART: [art] Populate DV Done
3,308,009 UART: [fht] FMC Alias Private Key: 7
3,308,969 UART: [art] Derive CDI
3,309,249 UART: [art] Store in in slot 0x4
3,394,520 UART: [art] Derive Key Pair
3,394,880 UART: [art] Store priv key in slot 0x5
3,407,752 UART: [art] Derive Key Pair - Done
3,422,726 UART: [art] Signing Cert with AUTHO
3,423,206 UART: RITY.KEYID = 7
3,437,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,737 UART: [art] PUB.X = 2BA5AA02FAE52845A7DF2C069C3AA3C117AA224D29A65EB79B3024A803AD0082BAAFF1AF737E5E42B335F028A6D637DF
3,445,494 UART: [art] PUB.Y = B0039262E515ABD3ACA77699B24DB9817C0C05F6511DE8E37FB52CF18FDD78CBC363B25FC50CB447EAB086B4E3F1C8EA
3,452,452 UART: [art] SIG.R = E27D1063599E2968C211F2C44E732B385EC64E383F3E77A74F2CB21F13217B9B4070853E7294E221FC25A28ED979E857
3,459,216 UART: [art] SIG.S = 64A73558E57EE1E793FA891900212447E40D9E5A5F4E6F742AFDF6EDA1D9B907E59778DB699971EDFFC1920B08013697
3,482,926 UART: Caliptra RT
3,483,179 UART: [state] CFI Enabled
3,592,216 UART: [rt] RT listening for mailbox commands...
3,592,879 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,778 UART: [rt]cmd =0x46504c54, len=4
3,624,006 >>> mbox cmd response data (8 bytes)
3,624,209 UART: [rt] FIPS self test
3,624,537 UART: [kat] ++
3,624,689 UART: [kat] sha1
3,628,853 UART: [kat] SHA2-256
3,630,875 UART: [kat] SHA2-384
3,633,674 UART: [kat] SHA2-512-ACC
3,634,324 UART: Fatal Error: 0x90050001
3,635,863 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,868 >>> mbox cmd response: failed
3,635,868 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,345 UART: [kat] SHA2-256
882,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,391 UART: [kat] ++
886,543 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
902,846 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,390 UART: [idev] Erasing UDS.KEYID = 0
1,504,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,138 UART: [idev] --
1,514,239 UART: [ldev] ++
1,514,407 UART: [ldev] CDI.KEYID = 6
1,514,770 UART: [ldev] SUBJECT.KEYID = 5
1,515,196 UART: [ldev] AUTHORITY.KEYID = 7
1,515,659 UART: [ldev] FE.KEYID = 1
1,520,801 UART: [ldev] Erasing FE.KEYID = 1
1,546,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,168 UART: [ldev] --
1,585,627 UART: [fwproc] Waiting for Commands...
1,586,280 UART: [fwproc] Received command 0x46574c44
1,587,071 UART: [fwproc] Received Image of size 115196 bytes
2,895,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,250 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,893 ready_for_fw is high
1,361,893 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,978 >>> mbox cmd response: success
3,000,184 UART:
3,000,200 UART: Running Caliptra FMC ...
3,000,608 UART:
3,000,662 UART: [state] CFI Enabled
3,010,845 UART: [fht] FMC Alias Private Key: 7
3,118,648 UART: [art] Extend RT PCRs Done
3,119,076 UART: [art] Lock RT PCRs Done
3,120,326 UART: [art] Populate DV Done
3,128,515 UART: [fht] FMC Alias Private Key: 7
3,129,481 UART: [art] Derive CDI
3,129,761 UART: [art] Store in in slot 0x4
3,215,416 UART: [art] Derive Key Pair
3,215,776 UART: [art] Store priv key in slot 0x5
3,228,744 UART: [art] Derive Key Pair - Done
3,243,531 UART: [art] Signing Cert with AUTHO
3,244,011 UART: RITY.KEYID = 7
3,258,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,754 UART: [art] PUB.X = D02F20B1D4FE8D6BAE03EB8639199786F03ED4085FB17799A4069F06DDACCFEDA8C758340B3799A558B964D083B6FB08
3,266,516 UART: [art] PUB.Y = 001C5B17664889BE05B544CCE18343FEE0197A90FB2DE8A1BF76F43CB1645951CDC6F60400D133A70E8E71C81C9A5D35
3,273,419 UART: [art] SIG.R = F8C6C5B320A04827F797BC1C17AFDE54A9C0D93844139A8897FFB361C1B1180BA596AD8BA4572C48F3E1CB2D14F911FA
3,280,198 UART: [art] SIG.S = 2BA21D0DA15FE29E87165497C5ACF0510500D72A1586E92071ED804E865BE1953B3A9AD627B7676E1C67503920979D5B
3,303,787 UART: Caliptra RT
3,304,040 UART: [state] CFI Enabled
3,411,799 UART: [rt] RT listening for mailbox commands...
3,412,462 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,167 UART: [rt]cmd =0x46504c54, len=4
3,443,303 >>> mbox cmd response data (8 bytes)
3,443,442 UART: [rt] FIPS self test
3,443,770 UART: [kat] ++
3,443,922 UART: [kat] sha1
3,448,332 UART: [kat] SHA2-256
3,450,354 UART: [kat] SHA2-384
3,452,983 UART: [kat] SHA2-512-ACC
3,453,501 UART: Fatal Error: 0x90050001
3,455,040 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,045 >>> mbox cmd response: failed
3,455,045 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,563 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,702 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,260 UART: [kat] SHA2-256
882,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,306 UART: [kat] ++
886,458 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,312 UART: [cold-reset] ++
1,476,758 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 ready_for_fw is high
1,480,964 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,713 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,515,022 UART: [ldev] ++
1,515,190 UART: [ldev] CDI.KEYID = 6
1,515,553 UART: [ldev] SUBJECT.KEYID = 5
1,515,979 UART: [ldev] AUTHORITY.KEYID = 7
1,516,442 UART: [ldev] FE.KEYID = 1
1,521,912 UART: [ldev] Erasing FE.KEYID = 1
1,547,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,743 UART: [ldev] --
1,587,198 UART: [fwproc] Waiting for Commands...
1,588,007 UART: [fwproc] Received command 0x46574c44
1,588,798 UART: [fwproc] Received Image of size 115196 bytes
2,896,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,675 >>> mbox cmd response: success
3,092,825 UART: [afmc] ++
3,092,993 UART: [afmc] CDI.KEYID = 6
3,093,355 UART: [afmc] SUBJECT.KEYID = 7
3,093,780 UART: [afmc] AUTHORITY.KEYID = 5
3,129,359 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,729 UART: [afmc] --
3,172,769 UART: [cold-reset] --
3,173,749 UART: [state] Locking Datavault
3,174,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,250 UART: [state] Locking ICCM
3,175,902 UART: [exit] Launching FMC @ 0x40000130
3,181,231 UART:
3,181,247 UART: Running Caliptra FMC ...
3,181,655 UART:
3,181,798 UART: [state] CFI Enabled
3,192,479 UART: [fht] FMC Alias Private Key: 7
3,300,398 UART: [art] Extend RT PCRs Done
3,300,826 UART: [art] Lock RT PCRs Done
3,302,418 UART: [art] Populate DV Done
3,310,529 UART: [fht] FMC Alias Private Key: 7
3,311,525 UART: [art] Derive CDI
3,311,805 UART: [art] Store in in slot 0x4
3,397,292 UART: [art] Derive Key Pair
3,397,652 UART: [art] Store priv key in slot 0x5
3,411,480 UART: [art] Derive Key Pair - Done
3,425,850 UART: [art] Signing Cert with AUTHO
3,426,330 UART: RITY.KEYID = 7
3,441,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,717 UART: [art] PUB.X = 9944043D8AFDD312D2274B24A28FAEF827D9D18B56723483F52312D47400AB7E7AFA74C0EDB88D9E9170534522A7CBC7
3,449,466 UART: [art] PUB.Y = E91515B029B501A2612743C07FC12691970E0E5BC2481201E6669CBC710C138AC38C968FF061D19D1994C6E4DCB0C79B
3,456,399 UART: [art] SIG.R = 08D357C4942B47E41B8281F957BA19E661A4F4AEE79B74BEA5EAE06F7C63C1345C931EA9E761BA39CA8927FDE119472A
3,463,176 UART: [art] SIG.S = B58CC7698D08F249AF75F5DA73EEAFC48BB48DB0EBDE050576C6833DEB7EBF9385277B9EC54E547DA99282DC3FB537D7
3,487,208 UART: Caliptra RT
3,487,553 UART: [state] CFI Enabled
3,594,790 UART: [rt] RT listening for mailbox commands...
3,595,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,452 UART: [rt]cmd =0x46504c54, len=4
3,626,458 >>> mbox cmd response data (8 bytes)
3,626,589 UART: [rt] FIPS self test
3,626,917 UART: [kat] ++
3,627,069 UART: [kat] sha1
3,631,237 UART: [kat] SHA2-256
3,633,259 UART: [kat] SHA2-384
3,635,938 UART: [kat] SHA2-512-ACC
3,636,646 UART: Fatal Error: 0x90050001
3,638,185 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,190 >>> mbox cmd response: failed
3,638,190 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,056 UART: [kat] SHA2-256
881,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,102 UART: [kat] ++
886,254 UART: [kat] sha1
890,338 UART: [kat] SHA2-256
892,276 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,639 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,272 UART: [cold-reset] ++
1,476,748 UART: [fht] Storing FHT @ 0x50003400
1,479,553 UART: [idev] ++
1,479,721 UART: [idev] CDI.KEYID = 6
1,480,081 UART: [idev] SUBJECT.KEYID = 7
1,480,505 UART: [idev] UDS.KEYID = 0
1,480,850 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,207 UART: [idev] --
1,515,232 UART: [ldev] ++
1,515,400 UART: [ldev] CDI.KEYID = 6
1,515,763 UART: [ldev] SUBJECT.KEYID = 5
1,516,189 UART: [ldev] AUTHORITY.KEYID = 7
1,516,652 UART: [ldev] FE.KEYID = 1
1,521,812 UART: [ldev] Erasing FE.KEYID = 1
1,548,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,945 UART: [ldev] --
1,587,386 UART: [fwproc] Waiting for Commands...
1,588,177 UART: [fwproc] Received command 0x46574c44
1,588,968 UART: [fwproc] Received Image of size 115196 bytes
2,897,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,985 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 ready_for_fw is high
1,363,140 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,159 >>> mbox cmd response: success
3,000,711 UART:
3,000,727 UART: Running Caliptra FMC ...
3,001,135 UART:
3,001,278 UART: [state] CFI Enabled
3,011,835 UART: [fht] FMC Alias Private Key: 7
3,119,118 UART: [art] Extend RT PCRs Done
3,119,546 UART: [art] Lock RT PCRs Done
3,121,048 UART: [art] Populate DV Done
3,129,323 UART: [fht] FMC Alias Private Key: 7
3,130,281 UART: [art] Derive CDI
3,130,561 UART: [art] Store in in slot 0x4
3,216,064 UART: [art] Derive Key Pair
3,216,424 UART: [art] Store priv key in slot 0x5
3,229,600 UART: [art] Derive Key Pair - Done
3,244,425 UART: [art] Signing Cert with AUTHO
3,244,905 UART: RITY.KEYID = 7
3,260,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,108 UART: [art] PUB.X = A8D68AA8FDA16CBF38D7C4F36D7A78E50DBA0CDFC00E351BC0DCEB83E64B3C4BDA3136B936F72C8B1DF07743A574B7A1
3,267,897 UART: [art] PUB.Y = 3EA24C803E1802868D14E947BF6E3C3CCCE6B5FCF00A635A06BFA57A64F053495582DE283147DA600866681FC7FDA631
3,274,841 UART: [art] SIG.R = 8BA0AD92C7F0DEA8A07B8F9BC395F91E00CC355128112A11DE32C22E003A63972C3BC5ED2C4C6AEDE1F8B18D31ACFA59
3,281,589 UART: [art] SIG.S = 347D5384AC0FB27873B870B87A5D2DC5BD34AC38FBBAE2C27358B8A3C539CD765E5935CE755C812CB3B00AF6784C12D8
3,305,594 UART: Caliptra RT
3,305,939 UART: [state] CFI Enabled
3,414,280 UART: [rt] RT listening for mailbox commands...
3,414,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,594 UART: [rt]cmd =0x46504c54, len=4
3,445,708 >>> mbox cmd response data (8 bytes)
3,445,841 UART: [rt] FIPS self test
3,446,169 UART: [kat] ++
3,446,321 UART: [kat] sha1
3,450,571 UART: [kat] SHA2-256
3,452,593 UART: [kat] SHA2-384
3,455,476 UART: [kat] SHA2-512-ACC
3,456,106 UART: Fatal Error: 0x90050001
3,457,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,650 >>> mbox cmd response: failed
3,457,650 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,164 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,865 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
893,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,781 UART: [kat] ++
897,933 UART: [kat] sha1
902,193 UART: [kat] SHA2-256
904,133 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,614 UART: [kat] HMAC-384Kdf
923,178 UART: [kat] LMS
1,171,506 UART: [kat] --
1,172,395 UART: [cold-reset] ++
1,172,947 UART: [fht] FHT @ 0x50003400
1,175,594 UART: [idev] ++
1,175,762 UART: [idev] CDI.KEYID = 6
1,176,122 UART: [idev] SUBJECT.KEYID = 7
1,176,546 UART: [idev] UDS.KEYID = 0
1,176,891 ready_for_fw is high
1,176,891 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,201,533 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,704 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,202 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,413 >>> mbox cmd response: success
2,787,483 UART: [afmc] ++
2,787,651 UART: [afmc] CDI.KEYID = 6
2,788,013 UART: [afmc] SUBJECT.KEYID = 7
2,788,438 UART: [afmc] AUTHORITY.KEYID = 5
2,824,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,834 UART: [afmc] --
2,867,788 UART: [cold-reset] --
2,868,644 UART: [state] Locking Datavault
2,869,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,339 UART: [state] Locking ICCM
2,870,909 UART: [exit] Launching FMC @ 0x40000130
2,876,238 UART:
2,876,254 UART: Running Caliptra FMC ...
2,876,662 UART:
2,876,716 UART: [state] CFI Enabled
2,887,067 UART: [fht] FMC Alias Private Key: 7
2,995,036 UART: [art] Extend RT PCRs Done
2,995,464 UART: [art] Lock RT PCRs Done
2,996,854 UART: [art] Populate DV Done
3,005,187 UART: [fht] FMC Alias Private Key: 7
3,006,137 UART: [art] Derive CDI
3,006,417 UART: [art] Store in in slot 0x4
3,092,028 UART: [art] Derive Key Pair
3,092,388 UART: [art] Store priv key in slot 0x5
3,106,240 UART: [art] Derive Key Pair - Done
3,121,285 UART: [art] Signing Cert with AUTHO
3,121,765 UART: RITY.KEYID = 7
3,136,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,424 UART: [art] PUB.X = F0B079F77464BD7165D9C4CDAFEED73B7476A6B0A52382A70D296801CB1EC3EBCEAC8E839E26847767AD53B8B148A5EE
3,144,204 UART: [art] PUB.Y = 44A2C285BE4AC06462C98D2A948465F69B16B9DCAE98399509BEC8C18413753D9AD2432AE0668253EA0F4E5C726BE04B
3,151,152 UART: [art] SIG.R = 11A654794349BC4D9B565DBEFC4C24CDA89DDA1F020E4321E880809833478FD091D2F9A604FA789AFA590196C2BA0546
3,157,911 UART: [art] SIG.S = 57F0F1800D3A08D976BE11622D21D6C7B5DB4C29015D0FC1B829DE349DF589EB0C2695AACC0761F4F15D6203E0FD578F
3,181,639 UART: Caliptra RT
3,181,892 UART: [state] CFI Enabled
3,290,009 UART: [rt] RT listening for mailbox commands...
3,290,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,559 UART: [rt]cmd =0x46504c54, len=4
3,321,707 >>> mbox cmd response data (8 bytes)
3,321,894 UART: [rt] FIPS self test
3,322,222 UART: [kat] ++
3,322,374 UART: [kat] sha1
3,326,398 UART: [kat] SHA2-256
3,328,420 UART: [kat] SHA2-384
3,331,343 UART: [kat] SHA2-512-ACC
3,331,929 UART: Fatal Error: 0x90050001
3,333,468 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,473 >>> mbox cmd response: failed
3,333,473 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,652 UART: [kat] SHA2-512-ACC
908,553 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
922,940 UART: [kat] LMS
1,171,268 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,354 UART: [idev] Erasing UDS.KEYID = 0
1,201,095 UART: [idev] Sha1 KeyId Algorithm
1,209,597 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,162 UART: [ldev] SUBJECT.KEYID = 5
1,211,588 UART: [ldev] AUTHORITY.KEYID = 7
1,212,051 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,652 UART: [fwproc] Wait for Commands...
1,283,428 UART: [fwproc] Recv command 0x46574c44
1,284,156 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,740 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,863 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,741 ready_for_fw is high
1,060,741 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,122 >>> mbox cmd response: success
2,700,580 UART:
2,700,596 UART: Running Caliptra FMC ...
2,701,004 UART:
2,701,058 UART: [state] CFI Enabled
2,711,451 UART: [fht] FMC Alias Private Key: 7
2,819,758 UART: [art] Extend RT PCRs Done
2,820,186 UART: [art] Lock RT PCRs Done
2,822,042 UART: [art] Populate DV Done
2,830,369 UART: [fht] FMC Alias Private Key: 7
2,831,543 UART: [art] Derive CDI
2,831,823 UART: [art] Store in in slot 0x4
2,917,608 UART: [art] Derive Key Pair
2,917,968 UART: [art] Store priv key in slot 0x5
2,931,350 UART: [art] Derive Key Pair - Done
2,946,254 UART: [art] Signing Cert with AUTHO
2,946,734 UART: RITY.KEYID = 7
2,961,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,477 UART: [art] PUB.X = 1F75B3909FBD3C1907722BF751DE8168E1FFCD2289925EB5354AE9BDF4AFC47DB50A582A1E4F2853927C11553B6A5E57
2,969,249 UART: [art] PUB.Y = F24830B39F7EE54CB12F978E67818225BD3AC67F2033ECCC93DF5D8D8A69CE161B8D0E5E80831F239B625FD7E048068A
2,976,201 UART: [art] SIG.R = 86077C50EE37DE41828E523476428879D37B1AEEF36DD47ACCF5FD8AE49E9B69F6DC0B94070C98C73BBC8C6F194AF5FC
2,982,975 UART: [art] SIG.S = CC25A8D682BB7AF45E1F3900D1F2B7CF0C91BFE15C76FA4C8C30F68A7AAF42FAA6842B1A23DCAB73AD91C97C188FD10C
3,006,984 UART: Caliptra RT
3,007,237 UART: [state] CFI Enabled
3,115,045 UART: [rt] RT listening for mailbox commands...
3,115,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,671 UART: [rt]cmd =0x46504c54, len=4
3,146,803 >>> mbox cmd response data (8 bytes)
3,147,102 UART: [rt] FIPS self test
3,147,430 UART: [kat] ++
3,147,582 UART: [kat] sha1
3,151,892 UART: [kat] SHA2-256
3,153,914 UART: [kat] SHA2-384
3,156,863 UART: [kat] SHA2-512-ACC
3,157,453 UART: Fatal Error: 0x90050001
3,158,992 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,997 >>> mbox cmd response: failed
3,158,997 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,917 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,224 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
893,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,286 UART: [kat] ++
897,438 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
918,041 UART: [kat] HMAC-384Kdf
922,619 UART: [kat] LMS
1,170,947 UART: [kat] --
1,171,916 UART: [cold-reset] ++
1,172,250 UART: [fht] FHT @ 0x50003400
1,174,933 UART: [idev] ++
1,175,101 UART: [idev] CDI.KEYID = 6
1,175,461 UART: [idev] SUBJECT.KEYID = 7
1,175,885 UART: [idev] UDS.KEYID = 0
1,176,230 ready_for_fw is high
1,176,230 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,641 UART: [idev] Erasing UDS.KEYID = 0
1,200,674 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,492 UART: [ldev] ++
1,210,660 UART: [ldev] CDI.KEYID = 6
1,211,023 UART: [ldev] SUBJECT.KEYID = 5
1,211,449 UART: [ldev] AUTHORITY.KEYID = 7
1,211,912 UART: [ldev] FE.KEYID = 1
1,216,946 UART: [ldev] Erasing FE.KEYID = 1
1,243,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,222 UART: [ldev] --
1,282,713 UART: [fwproc] Wait for Commands...
1,283,433 UART: [fwproc] Recv command 0x46574c44
1,284,161 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,133 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,210 >>> mbox cmd response: success
2,787,384 UART: [afmc] ++
2,787,552 UART: [afmc] CDI.KEYID = 6
2,787,914 UART: [afmc] SUBJECT.KEYID = 7
2,788,339 UART: [afmc] AUTHORITY.KEYID = 5
2,824,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,303 UART: [afmc] --
2,867,321 UART: [cold-reset] --
2,868,189 UART: [state] Locking Datavault
2,869,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,246 UART: [state] Locking ICCM
2,870,734 UART: [exit] Launching FMC @ 0x40000130
2,876,063 UART:
2,876,079 UART: Running Caliptra FMC ...
2,876,487 UART:
2,876,630 UART: [state] CFI Enabled
2,887,399 UART: [fht] FMC Alias Private Key: 7
2,994,592 UART: [art] Extend RT PCRs Done
2,995,020 UART: [art] Lock RT PCRs Done
2,996,444 UART: [art] Populate DV Done
3,004,513 UART: [fht] FMC Alias Private Key: 7
3,005,573 UART: [art] Derive CDI
3,005,853 UART: [art] Store in in slot 0x4
3,091,648 UART: [art] Derive Key Pair
3,092,008 UART: [art] Store priv key in slot 0x5
3,104,636 UART: [art] Derive Key Pair - Done
3,119,140 UART: [art] Signing Cert with AUTHO
3,119,620 UART: RITY.KEYID = 7
3,135,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,159 UART: [art] PUB.X = 1627675D92555205C5C02B6848236F336FD07B9059F29ECBACB65A4AD8A566D94BB7E2855BB598CD4638B90B645C6B5C
3,142,925 UART: [art] PUB.Y = 0A1BF446D1312B505AC3B1851DC78A08BC322E22C0A7D9236326AE45307A94B76360C5F188BFE2E83DB3F2A04FC7D05E
3,149,877 UART: [art] SIG.R = 8AD545272E65A748590154C0BE8E6555B81BA47A50E93D16FA61127390336A579241008D0AD679ABA576EF4EBBCB2AD2
3,156,621 UART: [art] SIG.S = 7E658A3471C49A391D49E5C73270A3A747A7E1BAF4F200B37EC6D00C8E58CB8C4496475368428C5E7F90F41CF45BA1CC
3,180,999 UART: Caliptra RT
3,181,344 UART: [state] CFI Enabled
3,289,403 UART: [rt] RT listening for mailbox commands...
3,290,066 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,053 UART: [rt]cmd =0x46504c54, len=4
3,321,237 >>> mbox cmd response data (8 bytes)
3,321,576 UART: [rt] FIPS self test
3,321,904 UART: [kat] ++
3,322,056 UART: [kat] sha1
3,326,228 UART: [kat] SHA2-256
3,328,250 UART: [kat] SHA2-384
3,330,925 UART: [kat] SHA2-512-ACC
3,331,621 UART: Fatal Error: 0x90050001
3,333,160 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,165 >>> mbox cmd response: failed
3,333,165 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
893,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,398 UART: [kat] ++
897,550 UART: [kat] sha1
901,720 UART: [kat] SHA2-256
903,660 UART: [kat] SHA2-384
906,281 UART: [kat] SHA2-512-ACC
908,182 UART: [kat] ECC-384
917,921 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,011 UART: [idev] Erasing UDS.KEYID = 0
1,201,500 UART: [idev] Sha1 KeyId Algorithm
1,210,106 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,218,186 UART: [ldev] Erasing FE.KEYID = 1
1,244,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,996 UART: [ldev] --
1,284,395 UART: [fwproc] Wait for Commands...
1,285,069 UART: [fwproc] Recv command 0x46574c44
1,285,797 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,399 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,494 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,930 ready_for_fw is high
1,059,930 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,045 >>> mbox cmd response: success
2,701,277 UART:
2,701,293 UART: Running Caliptra FMC ...
2,701,701 UART:
2,701,844 UART: [state] CFI Enabled
2,711,975 UART: [fht] FMC Alias Private Key: 7
2,819,674 UART: [art] Extend RT PCRs Done
2,820,102 UART: [art] Lock RT PCRs Done
2,821,592 UART: [art] Populate DV Done
2,829,927 UART: [fht] FMC Alias Private Key: 7
2,830,897 UART: [art] Derive CDI
2,831,177 UART: [art] Store in in slot 0x4
2,916,904 UART: [art] Derive Key Pair
2,917,264 UART: [art] Store priv key in slot 0x5
2,930,574 UART: [art] Derive Key Pair - Done
2,945,450 UART: [art] Signing Cert with AUTHO
2,945,930 UART: RITY.KEYID = 7
2,960,998 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,763 UART: [art] PUB.X = 341FFFF2C4FC7A7A87478172C68CD3F5970F596B88538B60DC6B949FBCF4A43AD851499BC7282C60714533C590F4774E
2,968,532 UART: [art] PUB.Y = 218A5357DF079DEDF360C07EB48BD366BD91BBAA7308AAA92887D3AE0F9765AD66BC983A5917D7DB8DE4276468AB344F
2,975,487 UART: [art] SIG.R = 6C080AF6A3352692E854420C35A9A9821CE407CFED79B3C80AA57A4A29012D9BDE373244FDECDF7409AD9351B3BB4581
2,982,244 UART: [art] SIG.S = 1F0EDEF4C21AE1CA315338D97D2A9F2265AFB2482AF7FE5E738DE6864376595262656DA2BC0B8BBCDA17A48AF5518ED7
3,005,829 UART: Caliptra RT
3,006,174 UART: [state] CFI Enabled
3,114,759 UART: [rt] RT listening for mailbox commands...
3,115,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,943 UART: [rt]cmd =0x46504c54, len=4
3,146,075 >>> mbox cmd response data (8 bytes)
3,146,442 UART: [rt] FIPS self test
3,146,770 UART: [kat] ++
3,146,922 UART: [kat] sha1
3,151,022 UART: [kat] SHA2-256
3,153,044 UART: [kat] SHA2-384
3,156,069 UART: [kat] SHA2-512-ACC
3,156,693 UART: Fatal Error: 0x90050001
3,158,232 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,237 >>> mbox cmd response: failed
3,158,237 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,251 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,199,191 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,632 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46574c44
1,282,528 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,699 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,789 >>> mbox cmd response: success
2,784,962 UART: [afmc] ++
2,785,130 UART: [afmc] CDI.KEYID = 6
2,785,493 UART: [afmc] SUBJECT.KEYID = 7
2,785,919 UART: [afmc] AUTHORITY.KEYID = 5
2,821,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,171 UART: [afmc] --
2,865,293 UART: [cold-reset] --
2,866,031 UART: [state] Locking Datavault
2,867,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,726 UART: [state] Locking ICCM
2,868,384 UART: [exit] Launching FMC @ 0x40000130
2,873,713 UART:
2,873,729 UART: Running Caliptra FMC ...
2,874,137 UART:
2,874,191 UART: [state] CFI Enabled
2,884,834 UART: [fht] FMC Alias Private Key: 7
2,992,805 UART: [art] Extend RT PCRs Done
2,993,233 UART: [art] Lock RT PCRs Done
2,994,907 UART: [art] Populate DV Done
3,003,030 UART: [fht] FMC Alias Private Key: 7
3,004,204 UART: [art] Derive CDI
3,004,484 UART: [art] Store in in slot 0x4
3,090,487 UART: [art] Derive Key Pair
3,090,847 UART: [art] Store priv key in slot 0x5
3,103,739 UART: [art] Derive Key Pair - Done
3,118,241 UART: [art] Signing Cert with AUTHO
3,118,721 UART: RITY.KEYID = 7
3,133,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,188 UART: [art] PUB.X = 29B30BCFBC82B10933538B16C4F1053BA4ED2DB139022E03E9D23A042F36168311B387B6B0BF344C1B78409D18D6D43F
3,140,942 UART: [art] PUB.Y = 9D9454CAE71B81F07423D199B0B92189D43E9747A1586921C10ADC79C8E3B48D39FBFAE810996B39B21C3A56C84A9F88
3,147,891 UART: [art] SIG.R = 2E1C648142CFC52CB941938AFC1C26BC87415ED5F00D6E101AE24564B3E6C18EA6C1CF4B410BE6856D71CD1EDAF3D6B5
3,154,673 UART: [art] SIG.S = FD864880CC930E3538FE56A9ED85267F5F4B99C034529C8F698C49F3B37D6F0036ED1AE8F45A3780B62AFFDD75FC3949
3,178,311 UART: Caliptra RT
3,178,564 UART: [state] CFI Enabled
3,286,711 UART: [rt] RT listening for mailbox commands...
3,287,374 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,079 UART: [rt]cmd =0x46504c54, len=4
3,318,029 >>> mbox cmd response data (8 bytes)
3,318,308 UART: [rt] FIPS self test
3,318,636 UART: [kat] ++
3,318,788 UART: [kat] sha1
3,322,986 UART: [kat] SHA2-256
3,325,008 UART: [kat] SHA2-384
3,327,951 UART: [kat] SHA2-512-ACC
3,328,441 UART: Fatal Error: 0x90050001
3,329,980 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,985 >>> mbox cmd response: failed
3,329,985 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,198,557 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,528 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,037 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,215 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,488 ready_for_fw is high
1,056,488 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,111 >>> mbox cmd response: success
2,696,583 UART:
2,696,599 UART: Running Caliptra FMC ...
2,697,007 UART:
2,697,061 UART: [state] CFI Enabled
2,707,646 UART: [fht] FMC Alias Private Key: 7
2,815,971 UART: [art] Extend RT PCRs Done
2,816,399 UART: [art] Lock RT PCRs Done
2,818,191 UART: [art] Populate DV Done
2,826,350 UART: [fht] FMC Alias Private Key: 7
2,827,282 UART: [art] Derive CDI
2,827,562 UART: [art] Store in in slot 0x4
2,913,207 UART: [art] Derive Key Pair
2,913,567 UART: [art] Store priv key in slot 0x5
2,926,331 UART: [art] Derive Key Pair - Done
2,940,997 UART: [art] Signing Cert with AUTHO
2,941,477 UART: RITY.KEYID = 7
2,956,935 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,700 UART: [art] PUB.X = EDC5512AD87B8D976D2DC1F93F55DDA47DE37E75B4F3E6CAC200C1D9AA4D9506203E72408B97937749FA34850770B73E
2,964,450 UART: [art] PUB.Y = EC1A552B12F3E177014E6509C9513CFB25A06A7F61A2F1BC5EBCCB43A779DE8276DBE5FC98C18671329D6DEC251049B2
2,971,406 UART: [art] SIG.R = D8F981D48AE3C32F11ABB176FDC2DD0114E8604A0289CCAD07D1A713945D5BAF452579FBEE19081A9E50528BF6DF04BF
2,978,177 UART: [art] SIG.S = D8955F3795F74E14EFA2A03C9A4399E985089F1C7CE24412D9267B82CDB362D57676A0D28EF43E0613BD127EB125F7AC
3,002,210 UART: Caliptra RT
3,002,463 UART: [state] CFI Enabled
3,109,147 UART: [rt] RT listening for mailbox commands...
3,109,810 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,391 UART: [rt]cmd =0x46504c54, len=4
3,140,487 >>> mbox cmd response data (8 bytes)
3,140,838 UART: [rt] FIPS self test
3,141,166 UART: [kat] ++
3,141,318 UART: [kat] sha1
3,145,650 UART: [kat] SHA2-256
3,147,672 UART: [kat] SHA2-384
3,150,679 UART: [kat] SHA2-512-ACC
3,151,289 UART: Fatal Error: 0x90050001
3,152,828 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,833 >>> mbox cmd response: failed
3,152,833 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,713 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,875 UART: [kat] HMAC-384Kdf
921,595 UART: [kat] LMS
1,169,907 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,294 UART: [fht] FHT @ 0x50003400
1,174,008 UART: [idev] ++
1,174,176 UART: [idev] CDI.KEYID = 6
1,174,537 UART: [idev] SUBJECT.KEYID = 7
1,174,962 UART: [idev] UDS.KEYID = 0
1,175,308 ready_for_fw is high
1,175,308 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,455 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,678 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,674 >>> mbox cmd response: success
2,785,785 UART: [afmc] ++
2,785,953 UART: [afmc] CDI.KEYID = 6
2,786,316 UART: [afmc] SUBJECT.KEYID = 7
2,786,742 UART: [afmc] AUTHORITY.KEYID = 5
2,821,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,344 UART: [afmc] --
2,865,446 UART: [cold-reset] --
2,866,358 UART: [state] Locking Datavault
2,867,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,351 UART: [state] Locking ICCM
2,868,821 UART: [exit] Launching FMC @ 0x40000130
2,874,150 UART:
2,874,166 UART: Running Caliptra FMC ...
2,874,574 UART:
2,874,717 UART: [state] CFI Enabled
2,885,408 UART: [fht] FMC Alias Private Key: 7
2,993,483 UART: [art] Extend RT PCRs Done
2,993,911 UART: [art] Lock RT PCRs Done
2,995,269 UART: [art] Populate DV Done
3,003,404 UART: [fht] FMC Alias Private Key: 7
3,004,356 UART: [art] Derive CDI
3,004,636 UART: [art] Store in in slot 0x4
3,090,217 UART: [art] Derive Key Pair
3,090,577 UART: [art] Store priv key in slot 0x5
3,103,663 UART: [art] Derive Key Pair - Done
3,118,519 UART: [art] Signing Cert with AUTHO
3,118,999 UART: RITY.KEYID = 7
3,134,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,990 UART: [art] PUB.X = DD207440B3CEA65EAED4718FD1088BAA7B36D00FCD98C8B683E84738AA2D6186498DC527AFDEBCEF26CFF1A9879CA1AF
3,141,780 UART: [art] PUB.Y = E2713A9990FBADABF2C765456DA05C6D8134AF6317353FA5D6E9D7DFE24640DD824377787FBCCF612631E17899E28440
3,148,734 UART: [art] SIG.R = 02744670A2C69371995FB603148A2B536437ABCACB7C90C4737E762BC24FDF54954BD2EA2FE1480C4B5507B400054644
3,155,463 UART: [art] SIG.S = BC3D2D032C148ACE0D8D4AF1EC034EFFD0D0E75225B48AA1304EAC0ED97BD9B5C58D1B1E8A3C2118EE13713D9481AEAA
3,178,890 UART: Caliptra RT
3,179,235 UART: [state] CFI Enabled
3,287,560 UART: [rt] RT listening for mailbox commands...
3,288,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,410 UART: [rt]cmd =0x46504c54, len=4
3,319,524 >>> mbox cmd response data (8 bytes)
3,319,771 UART: [rt] FIPS self test
3,320,099 UART: [kat] ++
3,320,251 UART: [kat] sha1
3,324,583 UART: [kat] SHA2-256
3,326,605 UART: [kat] SHA2-384
3,329,608 UART: [kat] SHA2-512-ACC
3,330,162 UART: Fatal Error: 0x90050001
3,331,701 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,706 >>> mbox cmd response: failed
3,331,706 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,537 UART: [kat] SHA2-256
892,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,216 UART: [kat] ++
896,368 UART: [kat] sha1
900,698 UART: [kat] SHA2-256
902,638 UART: [kat] SHA2-384
905,445 UART: [kat] SHA2-512-ACC
907,346 UART: [kat] ECC-384
917,159 UART: [kat] HMAC-384Kdf
921,645 UART: [kat] LMS
1,169,957 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,292 UART: [fht] FHT @ 0x50003400
1,173,868 UART: [idev] ++
1,174,036 UART: [idev] CDI.KEYID = 6
1,174,397 UART: [idev] SUBJECT.KEYID = 7
1,174,822 UART: [idev] UDS.KEYID = 0
1,175,168 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,745 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,123 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,626 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,834 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 ready_for_fw is high
1,056,275 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,282 >>> mbox cmd response: success
2,696,848 UART:
2,696,864 UART: Running Caliptra FMC ...
2,697,272 UART:
2,697,415 UART: [state] CFI Enabled
2,708,292 UART: [fht] FMC Alias Private Key: 7
2,815,375 UART: [art] Extend RT PCRs Done
2,815,803 UART: [art] Lock RT PCRs Done
2,817,245 UART: [art] Populate DV Done
2,825,620 UART: [fht] FMC Alias Private Key: 7
2,826,800 UART: [art] Derive CDI
2,827,080 UART: [art] Store in in slot 0x4
2,912,751 UART: [art] Derive Key Pair
2,913,111 UART: [art] Store priv key in slot 0x5
2,926,249 UART: [art] Derive Key Pair - Done
2,940,962 UART: [art] Signing Cert with AUTHO
2,941,442 UART: RITY.KEYID = 7
2,956,782 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,547 UART: [art] PUB.X = 80A226762FA4033B2440E3601BE27D9796100AAD5301DA9EDA54C8831201A14CC64C893D383AA63C8A2A08063DA86BC0
2,964,299 UART: [art] PUB.Y = AB26FBF7C29C66524F4BA6FED945D2212BC09D1D9A220ECF5A934889014DF5EDCCEED593D881FC7CC46AA31E1BBEAF95
2,971,271 UART: [art] SIG.R = B29A6D67C88FE76317E182033AFC1629A02CC7B29998D82E26451B22AF4854ECC8065603487EADF78A90581CA5894C10
2,978,030 UART: [art] SIG.S = 032DDD88F1A96E51B33CCC3F8D7FD83A72660E67107DEA931DD3B985C007108FF666D8E5CDA35EB1AEB6021529CA2A6B
3,002,187 UART: Caliptra RT
3,002,532 UART: [state] CFI Enabled
3,110,025 UART: [rt] RT listening for mailbox commands...
3,110,688 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,335 UART: [rt]cmd =0x46504c54, len=4
3,141,469 >>> mbox cmd response data (8 bytes)
3,141,822 UART: [rt] FIPS self test
3,142,150 UART: [kat] ++
3,142,302 UART: [kat] sha1
3,146,380 UART: [kat] SHA2-256
3,148,402 UART: [kat] SHA2-384
3,151,171 UART: [kat] SHA2-512-ACC
3,151,797 UART: Fatal Error: 0x90050001
3,153,336 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,341 >>> mbox cmd response: failed
3,153,341 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,832 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,152 >>> mbox cmd response: failed
809,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,165 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,580 >>> mbox cmd response: failed
809,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,221 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,895 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,903 >>> mbox cmd response: failed
809,903 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,870 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,053 >>> mbox cmd response: failed
810,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,834 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,024 >>> mbox cmd response: failed
810,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,467 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,838 >>> mbox cmd response: failed
809,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,393 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,001 >>> mbox cmd response: failed
810,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,852 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,167 >>> mbox cmd response: failed
810,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,342 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,064 >>> mbox cmd response: failed
810,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,557 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,822 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,830 >>> mbox cmd response: failed
809,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,299 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,057 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,065 >>> mbox cmd response: failed
810,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,834 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,671 >>> mbox cmd response: failed
809,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,216 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,439 UART: [kat] SHA2-256
882,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,485 UART: [kat] ++
886,637 UART: [kat] sha1
890,869 UART: [kat] SHA2-256
892,807 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,582 UART: [kat] LMS
1,475,778 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,476,921 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,378 UART: [idev] Erasing UDS.KEYID = 0
1,505,582 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,426 UART: [idev] --
1,515,467 UART: [ldev] ++
1,515,635 UART: [ldev] CDI.KEYID = 6
1,515,998 UART: [ldev] SUBJECT.KEYID = 5
1,516,424 UART: [ldev] AUTHORITY.KEYID = 7
1,516,887 UART: [ldev] FE.KEYID = 1
1,521,923 UART: [ldev] Erasing FE.KEYID = 1
1,547,688 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,824 UART: [ldev] --
1,587,263 UART: [fwproc] Waiting for Commands...
1,588,108 UART: [fwproc] Received command 0x46574c44
1,588,899 UART: [fwproc] Received Image of size 115196 bytes
2,896,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,204 >>> mbox cmd response: success
3,091,350 UART: [afmc] ++
3,091,518 UART: [afmc] CDI.KEYID = 6
3,091,880 UART: [afmc] SUBJECT.KEYID = 7
3,092,305 UART: [afmc] AUTHORITY.KEYID = 5
3,127,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,548 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,161 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,851 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,612 UART: [afmc] --
3,170,626 UART: [cold-reset] --
3,171,390 UART: [state] Locking Datavault
3,172,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,267 UART: [state] Locking ICCM
3,173,817 UART: [exit] Launching FMC @ 0x40000130
3,179,146 UART:
3,179,162 UART: Running Caliptra FMC ...
3,179,570 UART:
3,179,624 UART: [state] CFI Enabled
3,189,985 UART: [fht] FMC Alias Private Key: 7
3,298,456 UART: [art] Extend RT PCRs Done
3,298,884 UART: [art] Lock RT PCRs Done
3,300,296 UART: [art] Populate DV Done
3,308,403 UART: [fht] FMC Alias Private Key: 7
3,309,493 UART: [art] Derive CDI
3,309,773 UART: [art] Store in in slot 0x4
3,395,726 UART: [art] Derive Key Pair
3,396,086 UART: [art] Store priv key in slot 0x5
3,409,086 UART: [art] Derive Key Pair - Done
3,423,816 UART: [art] Signing Cert with AUTHO
3,424,296 UART: RITY.KEYID = 7
3,439,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,327 UART: [art] PUB.X = 072F7E6B4E6892F57AC98BF2355946715A0733F370BA52319D3A60536599298E11BD6142FCCC669205378F8295C54866
3,447,074 UART: [art] PUB.Y = 3DACA300892C5CB9747A67AB874C866AC36EAD3EDF2FC63C9707BEB17B66A6FB4EAB81318F9451E09EE6F67F6372CEDB
3,454,021 UART: [art] SIG.R = 55433373A6CAC19D38EA2EACC2F876C0D9C724DE29BDFB3F2A3611970308FC2E03B9832A263C7FBE743C555323ED4051
3,460,790 UART: [art] SIG.S = 7AE989BB0108448A542B9568007AABED65D38F0806B27B3DFDDDE1B8196244AB0850F6701E6CBEBEFE625968BDCD3930
3,484,782 UART: Caliptra RT
3,485,035 UART: [state] CFI Enabled
3,593,075 UART: [rt] RT listening for mailbox commands...
3,593,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,281 UART: [rt]cmd =0x46504c54, len=4
3,624,445 >>> mbox cmd response data (8 bytes)
3,624,672 UART: [rt] FIPS self test
3,625,000 UART: [kat] ++
3,625,152 UART: [kat] sha1
3,629,466 UART: [kat] SHA2-256
3,631,488 UART: [kat] SHA2-384
3,632,586 UART: Fatal Error: 0x90020001
3,634,125 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,130 >>> mbox cmd response: failed
3,634,130 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,833 UART: [kat] SHA2-256
892,771 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,038 UART: [kat] HMAC-384Kdf
907,714 UART: [kat] LMS
1,475,910 UART: [kat] --
1,476,849 UART: [cold-reset] ++
1,477,251 UART: [fht] Storing FHT @ 0x50003400
1,479,962 UART: [idev] ++
1,480,130 UART: [idev] CDI.KEYID = 6
1,480,490 UART: [idev] SUBJECT.KEYID = 7
1,480,914 UART: [idev] UDS.KEYID = 0
1,481,259 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,832 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,042 UART: [idev] --
1,514,877 UART: [ldev] ++
1,515,045 UART: [ldev] CDI.KEYID = 6
1,515,408 UART: [ldev] SUBJECT.KEYID = 5
1,515,834 UART: [ldev] AUTHORITY.KEYID = 7
1,516,297 UART: [ldev] FE.KEYID = 1
1,521,419 UART: [ldev] Erasing FE.KEYID = 1
1,546,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,014 UART: [ldev] --
1,586,359 UART: [fwproc] Waiting for Commands...
1,587,078 UART: [fwproc] Received command 0x46574c44
1,587,869 UART: [fwproc] Received Image of size 115196 bytes
2,895,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,719 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,358 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,001 ready_for_fw is high
1,363,001 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,872 >>> mbox cmd response: success
3,000,734 UART:
3,000,750 UART: Running Caliptra FMC ...
3,001,158 UART:
3,001,212 UART: [state] CFI Enabled
3,011,815 UART: [fht] FMC Alias Private Key: 7
3,119,524 UART: [art] Extend RT PCRs Done
3,119,952 UART: [art] Lock RT PCRs Done
3,121,494 UART: [art] Populate DV Done
3,129,683 UART: [fht] FMC Alias Private Key: 7
3,130,651 UART: [art] Derive CDI
3,130,931 UART: [art] Store in in slot 0x4
3,216,984 UART: [art] Derive Key Pair
3,217,344 UART: [art] Store priv key in slot 0x5
3,230,208 UART: [art] Derive Key Pair - Done
3,245,210 UART: [art] Signing Cert with AUTHO
3,245,690 UART: RITY.KEYID = 7
3,261,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,089 UART: [art] PUB.X = F463B849CA56E402B40FF629AC83F4CF7B76E30F72CBB5708483107E7DF0A9EF3B6CA3D1C847929CFF9EAD32B0AF670E
3,268,865 UART: [art] PUB.Y = A6BA2FD21DE16AEC469544D117A6C5C39AE92D9F7F96ADDACC55ABCBB6E4899D3FBBF5D691677E28365F4CFB8F32D75F
3,275,843 UART: [art] SIG.R = CFE9D78699B2C1ACD027E35911DCBB3BCEDB35C8C9E71662DAE9CD1FBEE75E64660460D3E6799293D7B7F45C34D6899C
3,282,628 UART: [art] SIG.S = A6AC2F14B7E18C401A58A9663DED261BC6751FE22DE2894670D3A17B28F7615830CC1AD6E979744FF11D707D7DA34949
3,306,559 UART: Caliptra RT
3,306,812 UART: [state] CFI Enabled
3,413,876 UART: [rt] RT listening for mailbox commands...
3,414,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,618 UART: [rt]cmd =0x46504c54, len=4
3,445,864 >>> mbox cmd response data (8 bytes)
3,445,983 UART: [rt] FIPS self test
3,446,311 UART: [kat] ++
3,446,463 UART: [kat] sha1
3,450,791 UART: [kat] SHA2-256
3,452,813 UART: [kat] SHA2-384
3,453,575 UART: Fatal Error: 0x90020001
3,455,114 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,119 >>> mbox cmd response: failed
3,455,119 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,495 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,962 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
902,379 UART: [kat] HMAC-384Kdf
906,977 UART: [kat] LMS
1,475,173 UART: [kat] --
1,476,070 UART: [cold-reset] ++
1,476,442 UART: [fht] Storing FHT @ 0x50003400
1,479,315 UART: [idev] ++
1,479,483 UART: [idev] CDI.KEYID = 6
1,479,843 UART: [idev] SUBJECT.KEYID = 7
1,480,267 UART: [idev] UDS.KEYID = 0
1,480,612 ready_for_fw is high
1,480,612 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,505,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,755 UART: [idev] --
1,514,928 UART: [ldev] ++
1,515,096 UART: [ldev] CDI.KEYID = 6
1,515,459 UART: [ldev] SUBJECT.KEYID = 5
1,515,885 UART: [ldev] AUTHORITY.KEYID = 7
1,516,348 UART: [ldev] FE.KEYID = 1
1,521,322 UART: [ldev] Erasing FE.KEYID = 1
1,546,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,139 UART: [ldev] --
1,585,406 UART: [fwproc] Waiting for Commands...
1,586,265 UART: [fwproc] Received command 0x46574c44
1,587,056 UART: [fwproc] Received Image of size 115196 bytes
2,893,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,680 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,032 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,159 >>> mbox cmd response: success
3,088,171 UART: [afmc] ++
3,088,339 UART: [afmc] CDI.KEYID = 6
3,088,701 UART: [afmc] SUBJECT.KEYID = 7
3,089,126 UART: [afmc] AUTHORITY.KEYID = 5
3,124,837 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,077 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,470 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,160 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,091 UART: [afmc] --
3,168,117 UART: [cold-reset] --
3,169,127 UART: [state] Locking Datavault
3,170,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,964 UART: [state] Locking ICCM
3,171,424 UART: [exit] Launching FMC @ 0x40000130
3,176,753 UART:
3,176,769 UART: Running Caliptra FMC ...
3,177,177 UART:
3,177,320 UART: [state] CFI Enabled
3,188,099 UART: [fht] FMC Alias Private Key: 7
3,296,402 UART: [art] Extend RT PCRs Done
3,296,830 UART: [art] Lock RT PCRs Done
3,298,656 UART: [art] Populate DV Done
3,306,519 UART: [fht] FMC Alias Private Key: 7
3,307,687 UART: [art] Derive CDI
3,307,967 UART: [art] Store in in slot 0x4
3,393,758 UART: [art] Derive Key Pair
3,394,118 UART: [art] Store priv key in slot 0x5
3,408,028 UART: [art] Derive Key Pair - Done
3,422,511 UART: [art] Signing Cert with AUTHO
3,422,991 UART: RITY.KEYID = 7
3,438,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,032 UART: [art] PUB.X = 4981565DC0E4170CFF8820FAC758E08479083CDDC5FE53B4767A14B85A0C10EA40D0AFAA7CCF8DD0F71D00BCB1071015
3,445,782 UART: [art] PUB.Y = 102D0CF4914A50F8FCD39347FA0E7E41372C78222D76CD77157674A32081CC1D321F36F65D7868A4C930765E5D967A4B
3,452,722 UART: [art] SIG.R = C3BFA7F4077EF9434D2A259218E109739D4877C78247F0B690778039FF186224B1A6022777A3849B60021FDCC7402BAA
3,459,472 UART: [art] SIG.S = CC4C10027810E4B773E814AC8B8BB7D18FA76A591953EF7DC01F0900972CDC706120B66F34F2D4E3A74C9A41D91689C5
3,482,915 UART: Caliptra RT
3,483,260 UART: [state] CFI Enabled
3,591,390 UART: [rt] RT listening for mailbox commands...
3,592,053 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,790 UART: [rt]cmd =0x46504c54, len=4
3,622,954 >>> mbox cmd response data (8 bytes)
3,623,321 UART: [rt] FIPS self test
3,623,649 UART: [kat] ++
3,623,801 UART: [kat] sha1
3,628,041 UART: [kat] SHA2-256
3,630,063 UART: [kat] SHA2-384
3,630,865 UART: Fatal Error: 0x90020001
3,632,404 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,409 >>> mbox cmd response: failed
3,632,409 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,605 UART: [kat] SHA2-512-ACC
897,506 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,477,032 UART: [cold-reset] ++
1,477,596 UART: [fht] Storing FHT @ 0x50003400
1,480,343 UART: [idev] ++
1,480,511 UART: [idev] CDI.KEYID = 6
1,480,871 UART: [idev] SUBJECT.KEYID = 7
1,481,295 UART: [idev] UDS.KEYID = 0
1,481,640 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,189 UART: [idev] Erasing UDS.KEYID = 0
1,505,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,601 UART: [idev] --
1,515,782 UART: [ldev] ++
1,515,950 UART: [ldev] CDI.KEYID = 6
1,516,313 UART: [ldev] SUBJECT.KEYID = 5
1,516,739 UART: [ldev] AUTHORITY.KEYID = 7
1,517,202 UART: [ldev] FE.KEYID = 1
1,522,742 UART: [ldev] Erasing FE.KEYID = 1
1,548,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,371 UART: [ldev] --
1,587,856 UART: [fwproc] Waiting for Commands...
1,588,599 UART: [fwproc] Received command 0x46574c44
1,589,390 UART: [fwproc] Received Image of size 115196 bytes
2,898,800 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,563 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,264 ready_for_fw is high
1,363,264 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,805 >>> mbox cmd response: success
3,003,879 UART:
3,003,895 UART: Running Caliptra FMC ...
3,004,303 UART:
3,004,446 UART: [state] CFI Enabled
3,014,773 UART: [fht] FMC Alias Private Key: 7
3,122,848 UART: [art] Extend RT PCRs Done
3,123,276 UART: [art] Lock RT PCRs Done
3,124,792 UART: [art] Populate DV Done
3,133,137 UART: [fht] FMC Alias Private Key: 7
3,134,143 UART: [art] Derive CDI
3,134,423 UART: [art] Store in in slot 0x4
3,220,364 UART: [art] Derive Key Pair
3,220,724 UART: [art] Store priv key in slot 0x5
3,233,902 UART: [art] Derive Key Pair - Done
3,248,736 UART: [art] Signing Cert with AUTHO
3,249,216 UART: RITY.KEYID = 7
3,264,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,225 UART: [art] PUB.X = 34BE94318795DD2177DAFC48717717CD2980804D1B39EF9A45187EB519B9AD0A4E61FEED25CBB10FCB0CA8B629B4D4C2
3,272,000 UART: [art] PUB.Y = 8666D6CD1C92AE3B6D8E05D414F7E6ED5458851151EEFA575BBB15CD2E581488A7299D8A3877A23A47CDBDA71ED38777
3,278,957 UART: [art] SIG.R = A044576B56978CDAA3D611AA801563101CEFB8BAEE7F6F51FFCB66C6CFEEB87FC14CA8FE191E6E9721A83F274B069A5D
3,285,746 UART: [art] SIG.S = FA10AE2C8ED8C90959580B10494F52FFC98D31E94CC3009A07CAEF309DA9D60BA0205C9DDB30D6BEC28B7F1252FAD545
3,309,151 UART: Caliptra RT
3,309,496 UART: [state] CFI Enabled
3,417,500 UART: [rt] RT listening for mailbox commands...
3,418,163 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,958 UART: [rt]cmd =0x46504c54, len=4
3,449,060 >>> mbox cmd response data (8 bytes)
3,449,355 UART: [rt] FIPS self test
3,449,683 UART: [kat] ++
3,449,835 UART: [kat] sha1
3,453,967 UART: [kat] SHA2-256
3,455,989 UART: [kat] SHA2-384
3,456,641 UART: Fatal Error: 0x90020001
3,458,180 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,185 >>> mbox cmd response: failed
3,458,185 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,739 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
893,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,125 UART: [kat] ++
897,277 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,201,019 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,217,189 UART: [ldev] Erasing FE.KEYID = 1
1,244,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,083 UART: [ldev] --
1,283,558 UART: [fwproc] Wait for Commands...
1,284,152 UART: [fwproc] Recv command 0x46574c44
1,284,880 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,380 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,431 >>> mbox cmd response: success
2,787,685 UART: [afmc] ++
2,787,853 UART: [afmc] CDI.KEYID = 6
2,788,215 UART: [afmc] SUBJECT.KEYID = 7
2,788,640 UART: [afmc] AUTHORITY.KEYID = 5
2,824,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,948 UART: [afmc] --
2,867,930 UART: [cold-reset] --
2,868,744 UART: [state] Locking Datavault
2,869,917 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,521 UART: [state] Locking ICCM
2,870,977 UART: [exit] Launching FMC @ 0x40000130
2,876,306 UART:
2,876,322 UART: Running Caliptra FMC ...
2,876,730 UART:
2,876,784 UART: [state] CFI Enabled
2,887,191 UART: [fht] FMC Alias Private Key: 7
2,994,864 UART: [art] Extend RT PCRs Done
2,995,292 UART: [art] Lock RT PCRs Done
2,996,924 UART: [art] Populate DV Done
3,005,027 UART: [fht] FMC Alias Private Key: 7
3,005,961 UART: [art] Derive CDI
3,006,241 UART: [art] Store in in slot 0x4
3,091,478 UART: [art] Derive Key Pair
3,091,838 UART: [art] Store priv key in slot 0x5
3,105,332 UART: [art] Derive Key Pair - Done
3,120,137 UART: [art] Signing Cert with AUTHO
3,120,617 UART: RITY.KEYID = 7
3,136,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,954 UART: [art] PUB.X = FAAF90B08ABA9C0B26AF90EA751512C2C379E4D7CCCFF39CEFA1242948A27222F222C3CEB38F6A09128A8634A69B9EC2
3,143,736 UART: [art] PUB.Y = A7AAB2632417458FD73FBDB22133AA89121C3F453DDA3B994B7B2EC2AAAA94C4D461B701F48373019E597A7D16C96712
3,150,686 UART: [art] SIG.R = E979705182E34FC80A17AB6BB41193F0F6802A849D3CC9F21301FB1DB428B84783581D1F97AF031677E8C5E0B53E3238
3,157,445 UART: [art] SIG.S = 952846437D7D48CE7A0BDC3A2F9CD5621715BACE305049B675174BF7E3BD2A52C292843A2CE896CD8349F47ADC11EC7C
3,181,429 UART: Caliptra RT
3,181,682 UART: [state] CFI Enabled
3,289,408 UART: [rt] RT listening for mailbox commands...
3,290,071 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,996 UART: [rt]cmd =0x46504c54, len=4
3,321,262 >>> mbox cmd response data (8 bytes)
3,321,493 UART: [rt] FIPS self test
3,321,821 UART: [kat] ++
3,321,973 UART: [kat] sha1
3,326,169 UART: [kat] SHA2-256
3,328,191 UART: [kat] SHA2-384
3,328,783 UART: Fatal Error: 0x90020001
3,330,322 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,327 >>> mbox cmd response: failed
3,330,327 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
893,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,631 UART: [kat] ++
897,783 UART: [kat] sha1
902,205 UART: [kat] SHA2-256
904,145 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,436 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,711 UART: [fht] FHT @ 0x50003400
1,175,454 UART: [idev] ++
1,175,622 UART: [idev] CDI.KEYID = 6
1,175,982 UART: [idev] SUBJECT.KEYID = 7
1,176,406 UART: [idev] UDS.KEYID = 0
1,176,751 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,192 UART: [idev] Erasing UDS.KEYID = 0
1,201,487 UART: [idev] Sha1 KeyId Algorithm
1,210,035 UART: [idev] --
1,211,071 UART: [ldev] ++
1,211,239 UART: [ldev] CDI.KEYID = 6
1,211,602 UART: [ldev] SUBJECT.KEYID = 5
1,212,028 UART: [ldev] AUTHORITY.KEYID = 7
1,212,491 UART: [ldev] FE.KEYID = 1
1,217,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,010 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,219 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 ready_for_fw is high
1,059,999 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,530 >>> mbox cmd response: success
2,699,926 UART:
2,699,942 UART: Running Caliptra FMC ...
2,700,350 UART:
2,700,404 UART: [state] CFI Enabled
2,710,777 UART: [fht] FMC Alias Private Key: 7
2,818,148 UART: [art] Extend RT PCRs Done
2,818,576 UART: [art] Lock RT PCRs Done
2,820,466 UART: [art] Populate DV Done
2,828,601 UART: [fht] FMC Alias Private Key: 7
2,829,543 UART: [art] Derive CDI
2,829,823 UART: [art] Store in in slot 0x4
2,915,398 UART: [art] Derive Key Pair
2,915,758 UART: [art] Store priv key in slot 0x5
2,928,872 UART: [art] Derive Key Pair - Done
2,943,646 UART: [art] Signing Cert with AUTHO
2,944,126 UART: RITY.KEYID = 7
2,959,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,253 UART: [art] PUB.X = 5C62BFBF1D4A26D15C44FEFFCE370E0E367BFA5596DDB57718B3FBD3F82C300393B2FE4266F2E9ABBCCE1323B6D46EE0
2,967,040 UART: [art] PUB.Y = 4791EA053BD31D6467F47EF0AF853D3B7E7181EB66BBCDAFB26BC464F363E32121476BBA62A89BD2B25BDE72B314CBFA
2,974,007 UART: [art] SIG.R = 3EFAB3ABBAC50878D9CA3C356163713902BE0EBD724D86E31220C9A09DF57D0E0BE15B489669396F054F842D4F3E08E6
2,980,764 UART: [art] SIG.S = 8134ABB8E9A23BFAD53D101EBD36A70AC8D51D6E46818B4183EDB978B4DA1A442811C051754362CAFCBEB46149946EB3
3,004,644 UART: Caliptra RT
3,004,897 UART: [state] CFI Enabled
3,113,648 UART: [rt] RT listening for mailbox commands...
3,114,311 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,980 UART: [rt]cmd =0x46504c54, len=4
3,145,310 >>> mbox cmd response data (8 bytes)
3,145,629 UART: [rt] FIPS self test
3,145,957 UART: [kat] ++
3,146,109 UART: [kat] sha1
3,150,425 UART: [kat] SHA2-256
3,152,447 UART: [kat] SHA2-384
3,153,241 UART: Fatal Error: 0x90020001
3,154,780 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,785 >>> mbox cmd response: failed
3,154,785 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,377 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,564 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
893,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,120 UART: [kat] ++
898,272 UART: [kat] sha1
902,612 UART: [kat] SHA2-256
904,552 UART: [kat] SHA2-384
907,449 UART: [kat] SHA2-512-ACC
909,350 UART: [kat] ECC-384
919,367 UART: [kat] HMAC-384Kdf
924,095 UART: [kat] LMS
1,172,423 UART: [kat] --
1,173,112 UART: [cold-reset] ++
1,173,588 UART: [fht] FHT @ 0x50003400
1,176,423 UART: [idev] ++
1,176,591 UART: [idev] CDI.KEYID = 6
1,176,951 UART: [idev] SUBJECT.KEYID = 7
1,177,375 UART: [idev] UDS.KEYID = 0
1,177,720 ready_for_fw is high
1,177,720 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,287 UART: [idev] Erasing UDS.KEYID = 0
1,202,572 UART: [idev] Sha1 KeyId Algorithm
1,210,878 UART: [idev] --
1,212,050 UART: [ldev] ++
1,212,218 UART: [ldev] CDI.KEYID = 6
1,212,581 UART: [ldev] SUBJECT.KEYID = 5
1,213,007 UART: [ldev] AUTHORITY.KEYID = 7
1,213,470 UART: [ldev] FE.KEYID = 1
1,218,638 UART: [ldev] Erasing FE.KEYID = 1
1,245,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,016 UART: [ldev] --
1,284,313 UART: [fwproc] Wait for Commands...
1,285,113 UART: [fwproc] Recv command 0x46574c44
1,285,841 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,119 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,344 >>> mbox cmd response: success
2,788,514 UART: [afmc] ++
2,788,682 UART: [afmc] CDI.KEYID = 6
2,789,044 UART: [afmc] SUBJECT.KEYID = 7
2,789,469 UART: [afmc] AUTHORITY.KEYID = 5
2,825,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,198 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,683 UART: [afmc] --
2,868,607 UART: [cold-reset] --
2,869,205 UART: [state] Locking Datavault
2,870,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,154 UART: [state] Locking ICCM
2,871,590 UART: [exit] Launching FMC @ 0x40000130
2,876,919 UART:
2,876,935 UART: Running Caliptra FMC ...
2,877,343 UART:
2,877,486 UART: [state] CFI Enabled
2,888,353 UART: [fht] FMC Alias Private Key: 7
2,996,342 UART: [art] Extend RT PCRs Done
2,996,770 UART: [art] Lock RT PCRs Done
2,998,454 UART: [art] Populate DV Done
3,006,649 UART: [fht] FMC Alias Private Key: 7
3,007,697 UART: [art] Derive CDI
3,007,977 UART: [art] Store in in slot 0x4
3,093,602 UART: [art] Derive Key Pair
3,093,962 UART: [art] Store priv key in slot 0x5
3,106,662 UART: [art] Derive Key Pair - Done
3,121,476 UART: [art] Signing Cert with AUTHO
3,121,956 UART: RITY.KEYID = 7
3,136,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,625 UART: [art] PUB.X = 3C8248D52833D5BD42927A92B06365A2A555ED53C56EB160AF75561C699F03527EC18FAC6259C344EB66A67ABA403502
3,144,387 UART: [art] PUB.Y = 58EED2720167FD190B37B3CB7A2A5E65517F4C0717421284196192945CE4D52B6FCF75A973AA81891AF1F725F145DD0B
3,151,325 UART: [art] SIG.R = EEFAF200D51E00C127BDCAB9475A70AFA3BEBB3E7BE8C260F917CC5042087A3E179ED3C869777D07528F4FC3B81F3B85
3,158,063 UART: [art] SIG.S = 3D7C32D05EC6BDF8C37ACE276D440B623EDBB92EECE83EBC75E980B0F3F74FDD26E5FE21B7FDB6B2885C21CFDC642A93
3,182,013 UART: Caliptra RT
3,182,358 UART: [state] CFI Enabled
3,289,957 UART: [rt] RT listening for mailbox commands...
3,290,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,567 UART: [rt]cmd =0x46504c54, len=4
3,321,757 >>> mbox cmd response data (8 bytes)
3,322,096 UART: [rt] FIPS self test
3,322,424 UART: [kat] ++
3,322,576 UART: [kat] sha1
3,326,810 UART: [kat] SHA2-256
3,328,832 UART: [kat] SHA2-384
3,329,836 UART: Fatal Error: 0x90020001
3,331,375 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,380 >>> mbox cmd response: failed
3,331,380 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,338 UART: [kat] SHA2-256
904,278 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
919,213 UART: [kat] HMAC-384Kdf
923,835 UART: [kat] LMS
1,172,163 UART: [kat] --
1,172,764 UART: [cold-reset] ++
1,173,218 UART: [fht] FHT @ 0x50003400
1,175,945 UART: [idev] ++
1,176,113 UART: [idev] CDI.KEYID = 6
1,176,473 UART: [idev] SUBJECT.KEYID = 7
1,176,897 UART: [idev] UDS.KEYID = 0
1,177,242 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,202,098 UART: [idev] Sha1 KeyId Algorithm
1,210,608 UART: [idev] --
1,211,704 UART: [ldev] ++
1,211,872 UART: [ldev] CDI.KEYID = 6
1,212,235 UART: [ldev] SUBJECT.KEYID = 5
1,212,661 UART: [ldev] AUTHORITY.KEYID = 7
1,213,124 UART: [ldev] FE.KEYID = 1
1,218,342 UART: [ldev] Erasing FE.KEYID = 1
1,245,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,132 UART: [ldev] --
1,284,589 UART: [fwproc] Wait for Commands...
1,285,209 UART: [fwproc] Recv command 0x46574c44
1,285,937 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,801 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,862 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,446 ready_for_fw is high
1,060,446 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,625 >>> mbox cmd response: success
2,699,513 UART:
2,699,529 UART: Running Caliptra FMC ...
2,699,937 UART:
2,700,080 UART: [state] CFI Enabled
2,711,151 UART: [fht] FMC Alias Private Key: 7
2,818,988 UART: [art] Extend RT PCRs Done
2,819,416 UART: [art] Lock RT PCRs Done
2,821,210 UART: [art] Populate DV Done
2,829,289 UART: [fht] FMC Alias Private Key: 7
2,830,233 UART: [art] Derive CDI
2,830,513 UART: [art] Store in in slot 0x4
2,916,230 UART: [art] Derive Key Pair
2,916,590 UART: [art] Store priv key in slot 0x5
2,929,646 UART: [art] Derive Key Pair - Done
2,944,577 UART: [art] Signing Cert with AUTHO
2,945,057 UART: RITY.KEYID = 7
2,960,201 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,966 UART: [art] PUB.X = 69DDD39A0A1A931B12109B6A7F29F657708AA1E763ECF175A45E0111924A72C561CF214416A11E009CF9A0078803D5CB
2,967,702 UART: [art] PUB.Y = 9D1754F8D62A5AE7FA34CB22267627E1371C59279B2D4BF1906F6CF00C4EE1D9CA2B4E958F7F36CD7C2F5A0EB0AE391D
2,974,662 UART: [art] SIG.R = 6F20971C2DF57C7E1E43C1AD2A1B27677CF7F3ECD2C53B01FEDA8BA12E7C59FD710242B42A497B413A2554FCCCC72B98
2,981,444 UART: [art] SIG.S = BA44FC31F64C0B77A8C90EAAF7FB41E023DB7BBFB91C5AB3C7F2990DEB13D84F0C391D6E8B589643F093B2C0893F8C27
3,005,789 UART: Caliptra RT
3,006,134 UART: [state] CFI Enabled
3,114,531 UART: [rt] RT listening for mailbox commands...
3,115,194 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,815 UART: [rt]cmd =0x46504c54, len=4
3,145,761 >>> mbox cmd response data (8 bytes)
3,145,878 UART: [rt] FIPS self test
3,146,206 UART: [kat] ++
3,146,358 UART: [kat] sha1
3,150,660 UART: [kat] SHA2-256
3,152,682 UART: [kat] SHA2-384
3,153,486 UART: Fatal Error: 0x90020001
3,155,025 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,030 >>> mbox cmd response: failed
3,155,030 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,655 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,174,859 ready_for_fw is high
1,174,859 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,199,235 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,952 UART: [ldev] Erasing FE.KEYID = 1
1,242,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,467 UART: [fwproc] Recv command 0x46574c44
1,283,200 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,253 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,475 >>> mbox cmd response: success
2,787,562 UART: [afmc] ++
2,787,730 UART: [afmc] CDI.KEYID = 6
2,788,093 UART: [afmc] SUBJECT.KEYID = 7
2,788,519 UART: [afmc] AUTHORITY.KEYID = 5
2,823,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,783 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,502 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,433 UART: [afmc] --
2,867,433 UART: [cold-reset] --
2,868,139 UART: [state] Locking Datavault
2,869,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,972 UART: [state] Locking ICCM
2,870,408 UART: [exit] Launching FMC @ 0x40000130
2,875,737 UART:
2,875,753 UART: Running Caliptra FMC ...
2,876,161 UART:
2,876,215 UART: [state] CFI Enabled
2,886,480 UART: [fht] FMC Alias Private Key: 7
2,994,045 UART: [art] Extend RT PCRs Done
2,994,473 UART: [art] Lock RT PCRs Done
2,996,081 UART: [art] Populate DV Done
3,004,336 UART: [fht] FMC Alias Private Key: 7
3,005,342 UART: [art] Derive CDI
3,005,622 UART: [art] Store in in slot 0x4
3,091,263 UART: [art] Derive Key Pair
3,091,623 UART: [art] Store priv key in slot 0x5
3,105,393 UART: [art] Derive Key Pair - Done
3,119,924 UART: [art] Signing Cert with AUTHO
3,120,404 UART: RITY.KEYID = 7
3,135,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,263 UART: [art] PUB.X = 749CE9B9F2CE7173CB691D9E5557416C3C7C660B298DCBD40FFB2674E35296092B31EBD22F9CB64F2AC042183722F64C
3,143,030 UART: [art] PUB.Y = A2CD1F1738F8E443D0C64A094124666E698E4549C02B67EAC2932217DFD49520A603936D5CF5AC7F7754A30B8BF32378
3,149,969 UART: [art] SIG.R = 99612570EDE3F486DA1AF895CF0C309E10B89C5828816A0BD4D41DAA4FDE70897370CAEDB21101021D7471C9F92FD48C
3,156,735 UART: [art] SIG.S = E190590381E1C5E9A97A6B9B4236E7BC0BFB66149D815DEC5C238214FCABDE599088E54F098BBA7BF88A86C4490E4237
3,180,382 UART: Caliptra RT
3,180,635 UART: [state] CFI Enabled
3,288,569 UART: [rt] RT listening for mailbox commands...
3,289,232 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,203 UART: [rt]cmd =0x46504c54, len=4
3,320,405 >>> mbox cmd response data (8 bytes)
3,320,614 UART: [rt] FIPS self test
3,320,942 UART: [kat] ++
3,321,094 UART: [kat] sha1
3,325,204 UART: [kat] SHA2-256
3,327,226 UART: [kat] SHA2-384
3,327,964 UART: Fatal Error: 0x90020001
3,329,503 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,508 >>> mbox cmd response: failed
3,329,508 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,105 UART: [idev] ++
1,173,273 UART: [idev] CDI.KEYID = 6
1,173,634 UART: [idev] SUBJECT.KEYID = 7
1,174,059 UART: [idev] UDS.KEYID = 0
1,174,405 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,916 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,992 UART: [ldev] --
1,280,378 UART: [fwproc] Wait for Commands...
1,281,139 UART: [fwproc] Recv command 0x46574c44
1,281,872 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,405 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,643 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,874 ready_for_fw is high
1,055,874 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,631 >>> mbox cmd response: success
2,696,109 UART:
2,696,125 UART: Running Caliptra FMC ...
2,696,533 UART:
2,696,587 UART: [state] CFI Enabled
2,706,690 UART: [fht] FMC Alias Private Key: 7
2,814,829 UART: [art] Extend RT PCRs Done
2,815,257 UART: [art] Lock RT PCRs Done
2,816,519 UART: [art] Populate DV Done
2,824,600 UART: [fht] FMC Alias Private Key: 7
2,825,654 UART: [art] Derive CDI
2,825,934 UART: [art] Store in in slot 0x4
2,912,085 UART: [art] Derive Key Pair
2,912,445 UART: [art] Store priv key in slot 0x5
2,925,637 UART: [art] Derive Key Pair - Done
2,940,539 UART: [art] Signing Cert with AUTHO
2,941,019 UART: RITY.KEYID = 7
2,956,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,960 UART: [art] PUB.X = 5CEB61D87E756FE64A877753D5FF0853079F7CE337C383D313529FC8025B185B0DBC068D89466AA69A78F0994367DCDB
2,963,717 UART: [art] PUB.Y = CFF06776258BAF023C9998733F202A83214B2D7387A415FD15CDF908A0743972CD213F26D1FF01603870798ED185E18D
2,970,652 UART: [art] SIG.R = 82E88DAD084FE14F6AC98CEE296590C66A3BB74004DD2117804CD720D8B3D8B6035693B13CD6819CEBD2548BDC663D28
2,977,421 UART: [art] SIG.S = B83CE3EA7A1D6FB9BD39B28E348D7A66A4DAB195F72B35A3293459BF77A9719D1867336572C5C0097A9CF52B9C44E647
3,001,047 UART: Caliptra RT
3,001,300 UART: [state] CFI Enabled
3,108,938 UART: [rt] RT listening for mailbox commands...
3,109,601 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,426 UART: [rt]cmd =0x46504c54, len=4
3,140,570 >>> mbox cmd response data (8 bytes)
3,140,883 UART: [rt] FIPS self test
3,141,211 UART: [kat] ++
3,141,363 UART: [kat] sha1
3,145,519 UART: [kat] SHA2-256
3,147,541 UART: [kat] SHA2-384
3,148,219 UART: Fatal Error: 0x90020001
3,149,758 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,763 >>> mbox cmd response: failed
3,149,763 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,851 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,174,452 ready_for_fw is high
1,174,452 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,983 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,600 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,716 >>> mbox cmd response: success
2,785,951 UART: [afmc] ++
2,786,119 UART: [afmc] CDI.KEYID = 6
2,786,482 UART: [afmc] SUBJECT.KEYID = 7
2,786,908 UART: [afmc] AUTHORITY.KEYID = 5
2,822,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,555 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,352 UART: [afmc] --
2,866,408 UART: [cold-reset] --
2,867,326 UART: [state] Locking Datavault
2,868,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,289 UART: [state] Locking ICCM
2,869,711 UART: [exit] Launching FMC @ 0x40000130
2,875,040 UART:
2,875,056 UART: Running Caliptra FMC ...
2,875,464 UART:
2,875,607 UART: [state] CFI Enabled
2,886,142 UART: [fht] FMC Alias Private Key: 7
2,994,285 UART: [art] Extend RT PCRs Done
2,994,713 UART: [art] Lock RT PCRs Done
2,996,385 UART: [art] Populate DV Done
3,004,548 UART: [fht] FMC Alias Private Key: 7
3,005,514 UART: [art] Derive CDI
3,005,794 UART: [art] Store in in slot 0x4
3,091,331 UART: [art] Derive Key Pair
3,091,691 UART: [art] Store priv key in slot 0x5
3,105,169 UART: [art] Derive Key Pair - Done
3,119,978 UART: [art] Signing Cert with AUTHO
3,120,458 UART: RITY.KEYID = 7
3,135,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,519 UART: [art] PUB.X = 00ADD687956084C1A766A24F20DC451F7FD3FD40138329C711E6C35AB45623C2E3A3A05BA117DA0C5B8FAA45E7EC3349
3,143,272 UART: [art] PUB.Y = 933C42F9932B62732417F6D079B91D3BED539F0955355E167EABD47C20FBE60F496FC3A3771B9124122422F591F91A00
3,150,188 UART: [art] SIG.R = D97FDE298B459B820609B0AC600548F5991BF3E36F188427AB6568004FF2DF4549A15FEA6E6BB3B20B4B8A13E04AD229
3,156,930 UART: [art] SIG.S = AA95DCBDBA2FC4B84D236783B7739F626559E5DE7B7989682215E597BE4137C9CBA8AEF067A743A092760F788B5153DC
3,179,990 UART: Caliptra RT
3,180,335 UART: [state] CFI Enabled
3,287,385 UART: [rt] RT listening for mailbox commands...
3,288,048 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,089 UART: [rt]cmd =0x46504c54, len=4
3,319,223 >>> mbox cmd response data (8 bytes)
3,319,406 UART: [rt] FIPS self test
3,319,734 UART: [kat] ++
3,319,886 UART: [kat] sha1
3,324,216 UART: [kat] SHA2-256
3,326,238 UART: [kat] SHA2-384
3,327,108 UART: Fatal Error: 0x90020001
3,328,647 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,652 >>> mbox cmd response: failed
3,328,652 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [kat] SHA2-256
891,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,098 UART: [kat] ++
896,250 UART: [kat] sha1
900,556 UART: [kat] SHA2-256
902,496 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,174,518 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,208 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,591 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,285 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,942 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,956 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,033 ready_for_fw is high
1,057,033 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,000 >>> mbox cmd response: success
2,699,300 UART:
2,699,316 UART: Running Caliptra FMC ...
2,699,724 UART:
2,699,867 UART: [state] CFI Enabled
2,710,362 UART: [fht] FMC Alias Private Key: 7
2,818,365 UART: [art] Extend RT PCRs Done
2,818,793 UART: [art] Lock RT PCRs Done
2,820,071 UART: [art] Populate DV Done
2,828,432 UART: [fht] FMC Alias Private Key: 7
2,829,472 UART: [art] Derive CDI
2,829,752 UART: [art] Store in in slot 0x4
2,915,639 UART: [art] Derive Key Pair
2,915,999 UART: [art] Store priv key in slot 0x5
2,929,813 UART: [art] Derive Key Pair - Done
2,944,434 UART: [art] Signing Cert with AUTHO
2,944,914 UART: RITY.KEYID = 7
2,959,612 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,377 UART: [art] PUB.X = 8546BCC846A328F68422188C61F5F93588B64C11ED824F2D7884EABA50E1E614F50D59530579347A6D8E24F02230715F
2,967,133 UART: [art] PUB.Y = E0AAE87B2F36EAF771DF1189BCD543B97EE24DCE92BB4685D5A0FBC107B3F364A31CE62B001F6A57BD320ECA438D3ABD
2,974,081 UART: [art] SIG.R = 949A7B37F3992554A4FB4955AB59FC6E25CA1A0ECA534C0133AD4BA34C3013C75401D50133134A7CB2E994D27AD376E5
2,980,843 UART: [art] SIG.S = 0D9109D981FA128028729B369E58002E5B971DDE7ED999D76F362FFFBF19447104F91C75875E92CDC4F1C0F0B4F7142D
3,004,429 UART: Caliptra RT
3,004,774 UART: [state] CFI Enabled
3,112,215 UART: [rt] RT listening for mailbox commands...
3,112,878 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,911 UART: [rt]cmd =0x46504c54, len=4
3,144,045 >>> mbox cmd response data (8 bytes)
3,144,326 UART: [rt] FIPS self test
3,144,654 UART: [kat] ++
3,144,806 UART: [kat] sha1
3,149,214 UART: [kat] SHA2-256
3,151,236 UART: [kat] SHA2-384
3,152,260 UART: Fatal Error: 0x90020001
3,153,799 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,804 >>> mbox cmd response: failed
3,153,804 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,821 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,990 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,729 >>> mbox cmd response: failed
811,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,611 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,335 >>> mbox cmd response: failed
811,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,533 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,942 >>> mbox cmd response: failed
810,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,132 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,970 >>> mbox cmd response: failed
811,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,398 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,131 >>> mbox cmd response: failed
812,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,185 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,769 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,783 >>> mbox cmd response: failed
811,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,987 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,264 >>> mbox cmd response: failed
811,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,402 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,202 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,660 >>> mbox cmd response: failed
811,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,000 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,437 >>> mbox cmd response: failed
811,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,981 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,637 >>> mbox cmd response: failed
811,637 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,993 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,882 >>> mbox cmd response: failed
811,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,102 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,556 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,602 >>> mbox cmd response: failed
811,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,916 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,041 UART: [kat] SHA2-256
891,979 UART: [kat] SHA2-384
894,810 UART: [kat] SHA2-512-ACC
896,711 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 ready_for_fw is high
1,480,651 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,856 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,434 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,520,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,668 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,754 UART: [fwproc] Received command 0x46574c44
1,587,545 UART: [fwproc] Received Image of size 115196 bytes
2,895,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,478 >>> mbox cmd response: success
3,090,654 UART: [afmc] ++
3,090,822 UART: [afmc] CDI.KEYID = 6
3,091,184 UART: [afmc] SUBJECT.KEYID = 7
3,091,609 UART: [afmc] AUTHORITY.KEYID = 5
3,127,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,943 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,633 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,530 UART: [afmc] --
3,170,502 UART: [cold-reset] --
3,171,298 UART: [state] Locking Datavault
3,172,249 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,853 UART: [state] Locking ICCM
3,173,291 UART: [exit] Launching FMC @ 0x40000130
3,178,620 UART:
3,178,636 UART: Running Caliptra FMC ...
3,179,044 UART:
3,179,098 UART: [state] CFI Enabled
3,189,601 UART: [fht] FMC Alias Private Key: 7
3,297,700 UART: [art] Extend RT PCRs Done
3,298,128 UART: [art] Lock RT PCRs Done
3,299,692 UART: [art] Populate DV Done
3,307,957 UART: [fht] FMC Alias Private Key: 7
3,308,995 UART: [art] Derive CDI
3,309,275 UART: [art] Store in in slot 0x4
3,394,908 UART: [art] Derive Key Pair
3,395,268 UART: [art] Store priv key in slot 0x5
3,408,870 UART: [art] Derive Key Pair - Done
3,423,819 UART: [art] Signing Cert with AUTHO
3,424,299 UART: RITY.KEYID = 7
3,439,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,488 UART: [art] PUB.X = 95A5CA1000202A7BAD68CD4260AFD5AB0076B8239FECB3AA11E241D5D2B2692FC8CE89FCAF966908DA619328258E3665
3,447,221 UART: [art] PUB.Y = 8DFF03586B83AF511CDC759079CFCDD5FAF51CDBC6EA4BB11978A7A5D39DC10D2AFFFB8C66F3D0BFB4C04CE8D2185A91
3,454,197 UART: [art] SIG.R = 15B95FE2850E1145820E860CC2FA640328650A5030C7156F2ED323A00E1D8AC1FF36C9CDF5B117A9E1E008B85241EC06
3,460,945 UART: [art] SIG.S = 9803EE1D8353FDB48F8D8DAC5F93E03601C0562CB0D31350C8E118FF5D5967D5886AE82B43E9905978F18E28ABC56C1B
3,485,194 UART: Caliptra RT
3,485,447 UART: [state] CFI Enabled
3,594,348 UART: [rt] RT listening for mailbox commands...
3,595,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,938 UART: [rt]cmd =0x46504c54, len=4
3,626,210 >>> mbox cmd response data (8 bytes)
3,626,355 UART: [rt] FIPS self test
3,626,683 UART: [kat] ++
3,626,835 UART: [kat] sha1
3,631,019 UART: [kat] SHA2-256
3,633,041 UART: [kat] SHA2-384
3,635,604 UART: Fatal Error: 0x90020002
3,637,143 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,148 >>> mbox cmd response: failed
3,637,148 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,813 UART: [kat] SHA2-256
881,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,859 UART: [kat] ++
886,011 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
901,888 UART: [kat] HMAC-384Kdf
906,652 UART: [kat] LMS
1,474,848 UART: [kat] --
1,475,715 UART: [cold-reset] ++
1,476,253 UART: [fht] Storing FHT @ 0x50003400
1,479,036 UART: [idev] ++
1,479,204 UART: [idev] CDI.KEYID = 6
1,479,564 UART: [idev] SUBJECT.KEYID = 7
1,479,988 UART: [idev] UDS.KEYID = 0
1,480,333 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,303 UART: [ldev] ++
1,514,471 UART: [ldev] CDI.KEYID = 6
1,514,834 UART: [ldev] SUBJECT.KEYID = 5
1,515,260 UART: [ldev] AUTHORITY.KEYID = 7
1,515,723 UART: [ldev] FE.KEYID = 1
1,520,947 UART: [ldev] Erasing FE.KEYID = 1
1,545,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,656 UART: [ldev] --
1,585,161 UART: [fwproc] Waiting for Commands...
1,585,916 UART: [fwproc] Received command 0x46574c44
1,586,707 UART: [fwproc] Received Image of size 115196 bytes
2,894,679 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,160 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 ready_for_fw is high
1,362,601 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,088 >>> mbox cmd response: success
3,000,276 UART:
3,000,292 UART: Running Caliptra FMC ...
3,000,700 UART:
3,000,754 UART: [state] CFI Enabled
3,011,361 UART: [fht] FMC Alias Private Key: 7
3,119,820 UART: [art] Extend RT PCRs Done
3,120,248 UART: [art] Lock RT PCRs Done
3,121,838 UART: [art] Populate DV Done
3,130,177 UART: [fht] FMC Alias Private Key: 7
3,131,245 UART: [art] Derive CDI
3,131,525 UART: [art] Store in in slot 0x4
3,217,170 UART: [art] Derive Key Pair
3,217,530 UART: [art] Store priv key in slot 0x5
3,230,066 UART: [art] Derive Key Pair - Done
3,245,001 UART: [art] Signing Cert with AUTHO
3,245,481 UART: RITY.KEYID = 7
3,260,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,566 UART: [art] PUB.X = 87F34E3E0FAEC449D11DF2C4738E996D471C7CAF6C57F992DFA20431FEBB01F6DC859AEDA9ADD14F88A3241038DE8C70
3,268,347 UART: [art] PUB.Y = 562886E26A8241017B0EFB8A62B92843DDE28C299A34538CF007DD4C78CFE5DF1566F903A8446DDDBA3F314C6CBBC140
3,275,295 UART: [art] SIG.R = 0ACA2E89A99F71104834A951A45B5818249254016131CB1487C47B462D2ED9AAFC64BA76A689D9C8B4F6E747F4636187
3,282,055 UART: [art] SIG.S = EF752AEEAADD60F4429514553D4A3A63CC690A362AE93E4B2D08DC8856C7652C236C2C75FCCAD322884F7A37E94ECB14
3,305,346 UART: Caliptra RT
3,305,599 UART: [state] CFI Enabled
3,413,692 UART: [rt] RT listening for mailbox commands...
3,414,355 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,248 UART: [rt]cmd =0x46504c54, len=4
3,445,564 >>> mbox cmd response data (8 bytes)
3,445,899 UART: [rt] FIPS self test
3,446,227 UART: [kat] ++
3,446,379 UART: [kat] sha1
3,450,615 UART: [kat] SHA2-256
3,452,637 UART: [kat] SHA2-384
3,455,256 UART: Fatal Error: 0x90020002
3,456,795 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,800 >>> mbox cmd response: failed
3,456,800 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,407 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,642 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,350 UART: [kat] SHA2-256
893,288 UART: [kat] SHA2-384
895,899 UART: [kat] SHA2-512-ACC
897,800 UART: [kat] ECC-384
903,423 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,477,124 UART: [cold-reset] ++
1,477,554 UART: [fht] Storing FHT @ 0x50003400
1,480,387 UART: [idev] ++
1,480,555 UART: [idev] CDI.KEYID = 6
1,480,915 UART: [idev] SUBJECT.KEYID = 7
1,481,339 UART: [idev] UDS.KEYID = 0
1,481,684 ready_for_fw is high
1,481,684 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,183 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,363 UART: [idev] --
1,515,338 UART: [ldev] ++
1,515,506 UART: [ldev] CDI.KEYID = 6
1,515,869 UART: [ldev] SUBJECT.KEYID = 5
1,516,295 UART: [ldev] AUTHORITY.KEYID = 7
1,516,758 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,547,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,845 UART: [ldev] --
1,587,344 UART: [fwproc] Waiting for Commands...
1,588,043 UART: [fwproc] Received command 0x46574c44
1,588,834 UART: [fwproc] Received Image of size 115196 bytes
2,897,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,020 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,405 >>> mbox cmd response: success
3,091,423 UART: [afmc] ++
3,091,591 UART: [afmc] CDI.KEYID = 6
3,091,953 UART: [afmc] SUBJECT.KEYID = 7
3,092,378 UART: [afmc] AUTHORITY.KEYID = 5
3,127,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,764 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,454 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,407 UART: [afmc] --
3,170,503 UART: [cold-reset] --
3,171,483 UART: [state] Locking Datavault
3,172,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,268 UART: [state] Locking ICCM
3,173,800 UART: [exit] Launching FMC @ 0x40000130
3,179,129 UART:
3,179,145 UART: Running Caliptra FMC ...
3,179,553 UART:
3,179,696 UART: [state] CFI Enabled
3,190,403 UART: [fht] FMC Alias Private Key: 7
3,299,036 UART: [art] Extend RT PCRs Done
3,299,464 UART: [art] Lock RT PCRs Done
3,301,030 UART: [art] Populate DV Done
3,309,291 UART: [fht] FMC Alias Private Key: 7
3,310,383 UART: [art] Derive CDI
3,310,663 UART: [art] Store in in slot 0x4
3,396,014 UART: [art] Derive Key Pair
3,396,374 UART: [art] Store priv key in slot 0x5
3,409,730 UART: [art] Derive Key Pair - Done
3,424,486 UART: [art] Signing Cert with AUTHO
3,424,966 UART: RITY.KEYID = 7
3,440,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,093 UART: [art] PUB.X = 65BB9EEBE260CE080AE721F92569772AF051CB6DF5FA96A75B2BC7EC987956D61F6EC63FB64FDA8E5834D2EBEE7D72F4
3,447,879 UART: [art] PUB.Y = E151E9ED63F5BD1EDF954D95CBCBCFB563CEC7CEDA458D040FFAA0A92C9B2178FB3BE0C6C6C14C00FAE3A61477E4C798
3,454,833 UART: [art] SIG.R = 46A53D86EBEFFDF124D8916CCCD81DEAB5EED98C536B5B944181ED371C422D184D150A75488D44043AF62545316CC405
3,461,602 UART: [art] SIG.S = 77DFA6810DA51C1AAE72F06BC54984BB8A266D07791B37EB45914B9F78E99B5A81D32F216BF5D66676643698BADF79FF
3,485,845 UART: Caliptra RT
3,486,190 UART: [state] CFI Enabled
3,594,484 UART: [rt] RT listening for mailbox commands...
3,595,147 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,150 UART: [rt]cmd =0x46504c54, len=4
3,626,314 >>> mbox cmd response data (8 bytes)
3,626,671 UART: [rt] FIPS self test
3,626,999 UART: [kat] ++
3,627,151 UART: [kat] sha1
3,631,443 UART: [kat] SHA2-256
3,633,465 UART: [kat] SHA2-384
3,636,138 UART: Fatal Error: 0x90020002
3,637,677 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,682 >>> mbox cmd response: failed
3,637,682 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,241 UART: [kat] SHA2-512-ACC
897,142 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,770 UART: [cold-reset] ++
1,477,196 UART: [fht] Storing FHT @ 0x50003400
1,479,937 UART: [idev] ++
1,480,105 UART: [idev] CDI.KEYID = 6
1,480,465 UART: [idev] SUBJECT.KEYID = 7
1,480,889 UART: [idev] UDS.KEYID = 0
1,481,234 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,691 UART: [idev] --
1,515,600 UART: [ldev] ++
1,515,768 UART: [ldev] CDI.KEYID = 6
1,516,131 UART: [ldev] SUBJECT.KEYID = 5
1,516,557 UART: [ldev] AUTHORITY.KEYID = 7
1,517,020 UART: [ldev] FE.KEYID = 1
1,522,230 UART: [ldev] Erasing FE.KEYID = 1
1,548,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,827 UART: [ldev] --
1,588,214 UART: [fwproc] Waiting for Commands...
1,588,933 UART: [fwproc] Received command 0x46574c44
1,589,724 UART: [fwproc] Received Image of size 115196 bytes
2,897,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,375 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 ready_for_fw is high
1,362,926 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,371 >>> mbox cmd response: success
3,001,085 UART:
3,001,101 UART: Running Caliptra FMC ...
3,001,509 UART:
3,001,652 UART: [state] CFI Enabled
3,012,527 UART: [fht] FMC Alias Private Key: 7
3,120,506 UART: [art] Extend RT PCRs Done
3,120,934 UART: [art] Lock RT PCRs Done
3,122,464 UART: [art] Populate DV Done
3,130,633 UART: [fht] FMC Alias Private Key: 7
3,131,695 UART: [art] Derive CDI
3,131,975 UART: [art] Store in in slot 0x4
3,217,902 UART: [art] Derive Key Pair
3,218,262 UART: [art] Store priv key in slot 0x5
3,231,798 UART: [art] Derive Key Pair - Done
3,246,932 UART: [art] Signing Cert with AUTHO
3,247,412 UART: RITY.KEYID = 7
3,262,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,239 UART: [art] PUB.X = 7F4EBAF21BFC88B8441D1633537D7EC7519021D7B78EA71248ADDC16522C956A6431BCCD73597AC520181CAF683F86CE
3,270,017 UART: [art] PUB.Y = FE28767E63BD390CB79D2BA5D0388BF42DCCEF8BE145D65FB79E62E38A68043BB6C84BD94745CA1EFCEA1FA4FA929FEA
3,276,989 UART: [art] SIG.R = 7DFADB50EA7851667F9CB28AB47F6C513FECFD35BCD687BDDC2E637714F764E0C02DECFC2B61C656B4B4E04B22DDCEB5
3,283,789 UART: [art] SIG.S = 59B2944B895A2DCADC22289C1CF160429C1DE31E477AC30A022C108779C9ABC305B3FFD8A221E5DA7D90130479896F00
3,308,182 UART: Caliptra RT
3,308,527 UART: [state] CFI Enabled
3,416,245 UART: [rt] RT listening for mailbox commands...
3,416,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,739 UART: [rt]cmd =0x46504c54, len=4
3,447,735 >>> mbox cmd response data (8 bytes)
3,447,860 UART: [rt] FIPS self test
3,448,188 UART: [kat] ++
3,448,340 UART: [kat] sha1
3,452,436 UART: [kat] SHA2-256
3,454,458 UART: [kat] SHA2-384
3,457,215 UART: Fatal Error: 0x90020002
3,458,754 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,759 >>> mbox cmd response: failed
3,458,759 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,494 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,615 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
893,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,693 UART: [kat] ++
897,845 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,868 UART: [kat] SHA2-512-ACC
908,769 UART: [kat] ECC-384
918,410 UART: [kat] HMAC-384Kdf
922,978 UART: [kat] LMS
1,171,306 UART: [kat] --
1,172,145 UART: [cold-reset] ++
1,172,669 UART: [fht] FHT @ 0x50003400
1,175,454 UART: [idev] ++
1,175,622 UART: [idev] CDI.KEYID = 6
1,175,982 UART: [idev] SUBJECT.KEYID = 7
1,176,406 UART: [idev] UDS.KEYID = 0
1,176,751 ready_for_fw is high
1,176,751 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,594 UART: [idev] Erasing UDS.KEYID = 0
1,201,809 UART: [idev] Sha1 KeyId Algorithm
1,210,293 UART: [idev] --
1,211,233 UART: [ldev] ++
1,211,401 UART: [ldev] CDI.KEYID = 6
1,211,764 UART: [ldev] SUBJECT.KEYID = 5
1,212,190 UART: [ldev] AUTHORITY.KEYID = 7
1,212,653 UART: [ldev] FE.KEYID = 1
1,218,013 UART: [ldev] Erasing FE.KEYID = 1
1,244,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,023 UART: [ldev] --
1,283,314 UART: [fwproc] Wait for Commands...
1,283,994 UART: [fwproc] Recv command 0x46574c44
1,284,722 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,418 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,635 >>> mbox cmd response: success
2,787,713 UART: [afmc] ++
2,787,881 UART: [afmc] CDI.KEYID = 6
2,788,243 UART: [afmc] SUBJECT.KEYID = 7
2,788,668 UART: [afmc] AUTHORITY.KEYID = 5
2,823,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,378 UART: [afmc] --
2,867,468 UART: [cold-reset] --
2,868,148 UART: [state] Locking Datavault
2,869,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,785 UART: [state] Locking ICCM
2,870,389 UART: [exit] Launching FMC @ 0x40000130
2,875,718 UART:
2,875,734 UART: Running Caliptra FMC ...
2,876,142 UART:
2,876,196 UART: [state] CFI Enabled
2,886,715 UART: [fht] FMC Alias Private Key: 7
2,995,116 UART: [art] Extend RT PCRs Done
2,995,544 UART: [art] Lock RT PCRs Done
2,997,426 UART: [art] Populate DV Done
3,005,881 UART: [fht] FMC Alias Private Key: 7
3,006,993 UART: [art] Derive CDI
3,007,273 UART: [art] Store in in slot 0x4
3,093,128 UART: [art] Derive Key Pair
3,093,488 UART: [art] Store priv key in slot 0x5
3,106,408 UART: [art] Derive Key Pair - Done
3,121,265 UART: [art] Signing Cert with AUTHO
3,121,745 UART: RITY.KEYID = 7
3,137,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,948 UART: [art] PUB.X = 92B20BFB75BCD5D2FF2FE42708B352E411CCD35FF46D50E13E028CA9AC891CFFF74D2A947804AF6EBF2A72B8EF42D2AF
3,144,732 UART: [art] PUB.Y = 02B1694C879C9EFE25A83D08D8FFD2ADC3282A3126D36E76BB40B09471A99FD23A3AECBB92EA1A91BA566B4A3EED92A3
3,151,696 UART: [art] SIG.R = BC4443D339F549C0E65D80629CC328A26C30D5024099876DC71A98D0286C8D1215C3AD5E48CED9C6A83EDA9EB1E6D44D
3,158,471 UART: [art] SIG.S = E270628F5FA5CA8A011388FCB20900C4A77A257D24E44C6360430C63DB245DE34309B499AE28BE3C71FD411929D34DD9
3,182,570 UART: Caliptra RT
3,182,823 UART: [state] CFI Enabled
3,290,903 UART: [rt] RT listening for mailbox commands...
3,291,566 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,399 UART: [rt]cmd =0x46504c54, len=4
3,322,531 >>> mbox cmd response data (8 bytes)
3,322,648 UART: [rt] FIPS self test
3,322,976 UART: [kat] ++
3,323,128 UART: [kat] sha1
3,327,502 UART: [kat] SHA2-256
3,329,524 UART: [kat] SHA2-384
3,332,123 UART: Fatal Error: 0x90020002
3,333,662 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,667 >>> mbox cmd response: failed
3,333,667 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
892,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,067 UART: [kat] ++
897,219 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,329 UART: [cold-reset] ++
1,171,817 UART: [fht] FHT @ 0x50003400
1,174,674 UART: [idev] ++
1,174,842 UART: [idev] CDI.KEYID = 6
1,175,202 UART: [idev] SUBJECT.KEYID = 7
1,175,626 UART: [idev] UDS.KEYID = 0
1,175,971 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,744 UART: [idev] Erasing UDS.KEYID = 0
1,200,531 UART: [idev] Sha1 KeyId Algorithm
1,208,939 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,510 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,660 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,962 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,027 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,997 ready_for_fw is high
1,059,997 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,828 >>> mbox cmd response: success
2,699,046 UART:
2,699,062 UART: Running Caliptra FMC ...
2,699,470 UART:
2,699,524 UART: [state] CFI Enabled
2,710,027 UART: [fht] FMC Alias Private Key: 7
2,817,830 UART: [art] Extend RT PCRs Done
2,818,258 UART: [art] Lock RT PCRs Done
2,819,952 UART: [art] Populate DV Done
2,828,239 UART: [fht] FMC Alias Private Key: 7
2,829,249 UART: [art] Derive CDI
2,829,529 UART: [art] Store in in slot 0x4
2,915,178 UART: [art] Derive Key Pair
2,915,538 UART: [art] Store priv key in slot 0x5
2,928,758 UART: [art] Derive Key Pair - Done
2,943,500 UART: [art] Signing Cert with AUTHO
2,943,980 UART: RITY.KEYID = 7
2,959,376 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,141 UART: [art] PUB.X = 16DF53C40CF6A112D23A6E1AF1F39A560E1DB7196DA4F262FD5C7E652618C6BD900AC043B233247ED36FE2C942D1F4A7
2,966,914 UART: [art] PUB.Y = 9FB1A333FBDE58610DAD329AEFD0CE92946ADDC8550A38571802335423A7700A708D71B330A421A148BA2C4085287833
2,973,850 UART: [art] SIG.R = 376A565795DFE55F87AE24622E70D9ECEAA330A99A0818980D86170C50DB7F07232082C4B93EB1D99AF62D7E9DADDEAF
2,980,620 UART: [art] SIG.S = A0EF6BD8DBEB39B3BD01D88E29250E30BFB6991E1D07A787870776FF921154594644BA81B848D91FF121E0C5AE98869A
3,004,333 UART: Caliptra RT
3,004,586 UART: [state] CFI Enabled
3,111,653 UART: [rt] RT listening for mailbox commands...
3,112,316 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,169 UART: [rt]cmd =0x46504c54, len=4
3,143,393 >>> mbox cmd response data (8 bytes)
3,143,676 UART: [rt] FIPS self test
3,144,004 UART: [kat] ++
3,144,156 UART: [kat] sha1
3,148,440 UART: [kat] SHA2-256
3,150,462 UART: [kat] SHA2-384
3,153,415 UART: Fatal Error: 0x90020002
3,154,954 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,959 >>> mbox cmd response: failed
3,154,959 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,154,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,787 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,076 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,973 UART: [state] LifecycleState = Unprovisioned
86,628 UART: [state] DebugLocked = No
87,270 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
894,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,272 UART: [kat] ++
898,424 UART: [kat] sha1
902,678 UART: [kat] SHA2-256
904,618 UART: [kat] SHA2-384
907,535 UART: [kat] SHA2-512-ACC
909,436 UART: [kat] ECC-384
919,525 UART: [kat] HMAC-384Kdf
924,261 UART: [kat] LMS
1,172,589 UART: [kat] --
1,173,490 UART: [cold-reset] ++
1,173,934 UART: [fht] FHT @ 0x50003400
1,176,737 UART: [idev] ++
1,176,905 UART: [idev] CDI.KEYID = 6
1,177,265 UART: [idev] SUBJECT.KEYID = 7
1,177,689 UART: [idev] UDS.KEYID = 0
1,178,034 ready_for_fw is high
1,178,034 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,171 UART: [idev] Erasing UDS.KEYID = 0
1,202,840 UART: [idev] Sha1 KeyId Algorithm
1,211,402 UART: [idev] --
1,212,592 UART: [ldev] ++
1,212,760 UART: [ldev] CDI.KEYID = 6
1,213,123 UART: [ldev] SUBJECT.KEYID = 5
1,213,549 UART: [ldev] AUTHORITY.KEYID = 7
1,214,012 UART: [ldev] FE.KEYID = 1
1,219,402 UART: [ldev] Erasing FE.KEYID = 1
1,246,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,386 UART: [ldev] --
1,285,819 UART: [fwproc] Wait for Commands...
1,286,473 UART: [fwproc] Recv command 0x46574c44
1,287,201 UART: [fwproc] Recv'd Img size: 115196 bytes
2,595,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,909 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,789,022 >>> mbox cmd response: success
2,790,206 UART: [afmc] ++
2,790,374 UART: [afmc] CDI.KEYID = 6
2,790,736 UART: [afmc] SUBJECT.KEYID = 7
2,791,161 UART: [afmc] AUTHORITY.KEYID = 5
2,826,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,895 UART: [afmc] --
2,869,813 UART: [cold-reset] --
2,870,659 UART: [state] Locking Datavault
2,871,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,414 UART: [state] Locking ICCM
2,872,970 UART: [exit] Launching FMC @ 0x40000130
2,878,299 UART:
2,878,315 UART: Running Caliptra FMC ...
2,878,723 UART:
2,878,866 UART: [state] CFI Enabled
2,889,295 UART: [fht] FMC Alias Private Key: 7
2,997,482 UART: [art] Extend RT PCRs Done
2,997,910 UART: [art] Lock RT PCRs Done
2,999,354 UART: [art] Populate DV Done
3,007,847 UART: [fht] FMC Alias Private Key: 7
3,008,927 UART: [art] Derive CDI
3,009,207 UART: [art] Store in in slot 0x4
3,094,838 UART: [art] Derive Key Pair
3,095,198 UART: [art] Store priv key in slot 0x5
3,108,326 UART: [art] Derive Key Pair - Done
3,123,597 UART: [art] Signing Cert with AUTHO
3,124,077 UART: RITY.KEYID = 7
3,139,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,996 UART: [art] PUB.X = C7B687D380B50DD582D7C39C6ACE0A0D29182E89A5B9530774AE0E641B78783B43AF0809AC3B76FB6512BDF6559D3C74
3,146,751 UART: [art] PUB.Y = C66B6D0A87212EEA79C662B4A23B377B78411BFB41D0FFEC0E895A36541C863FABAF0DFE6ECD2EF222F6F3E8A94DA316
3,153,714 UART: [art] SIG.R = 82C1B6B4A41C8FE2A951DCA89F0F851C9B8B8ACCA8C3AE19FED1EE0DCE6DDE6E8C9EB3F5AC482966105DE2EE74CABA57
3,160,514 UART: [art] SIG.S = 27D80E0FEBF807B5186C932E9183A447AF4D613854E949D2A664A310270E05D04807DE869917A81D95F51BF6DB18936E
3,183,697 UART: Caliptra RT
3,184,042 UART: [state] CFI Enabled
3,291,761 UART: [rt] RT listening for mailbox commands...
3,292,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,295 UART: [rt]cmd =0x46504c54, len=4
3,323,493 >>> mbox cmd response data (8 bytes)
3,323,674 UART: [rt] FIPS self test
3,324,002 UART: [kat] ++
3,324,154 UART: [kat] sha1
3,328,516 UART: [kat] SHA2-256
3,330,538 UART: [kat] SHA2-384
3,333,381 UART: Fatal Error: 0x90020002
3,334,920 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,925 >>> mbox cmd response: failed
3,334,925 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
923,087 UART: [kat] LMS
1,171,415 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,527 UART: [idev] ++
1,175,695 UART: [idev] CDI.KEYID = 6
1,176,055 UART: [idev] SUBJECT.KEYID = 7
1,176,479 UART: [idev] UDS.KEYID = 0
1,176,824 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,201,360 UART: [idev] Sha1 KeyId Algorithm
1,209,736 UART: [idev] --
1,210,812 UART: [ldev] ++
1,210,980 UART: [ldev] CDI.KEYID = 6
1,211,343 UART: [ldev] SUBJECT.KEYID = 5
1,211,769 UART: [ldev] AUTHORITY.KEYID = 7
1,212,232 UART: [ldev] FE.KEYID = 1
1,217,276 UART: [ldev] Erasing FE.KEYID = 1
1,243,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,038 UART: [ldev] --
1,282,357 UART: [fwproc] Wait for Commands...
1,282,971 UART: [fwproc] Recv command 0x46574c44
1,283,699 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,237 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,292 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,060 ready_for_fw is high
1,060,060 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,335 >>> mbox cmd response: success
2,700,745 UART:
2,700,761 UART: Running Caliptra FMC ...
2,701,169 UART:
2,701,312 UART: [state] CFI Enabled
2,712,391 UART: [fht] FMC Alias Private Key: 7
2,820,922 UART: [art] Extend RT PCRs Done
2,821,350 UART: [art] Lock RT PCRs Done
2,823,018 UART: [art] Populate DV Done
2,831,423 UART: [fht] FMC Alias Private Key: 7
2,832,561 UART: [art] Derive CDI
2,832,841 UART: [art] Store in in slot 0x4
2,918,736 UART: [art] Derive Key Pair
2,919,096 UART: [art] Store priv key in slot 0x5
2,932,188 UART: [art] Derive Key Pair - Done
2,946,777 UART: [art] Signing Cert with AUTHO
2,947,257 UART: RITY.KEYID = 7
2,962,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,688 UART: [art] PUB.X = 4D70923C12D902055747815D357DB0E7BD03961A8BF87CB5025D246C4B7894055AD5E0CCEBAB87B8C0EF5CF922C41D19
2,970,449 UART: [art] PUB.Y = D8F26EB7AEC76020E2C91D342A8735296C8FBA4FF89F36967B92BEDCB5129183FAE6716C25B16E582C3E71A40871C2CA
2,977,406 UART: [art] SIG.R = 0865104D66DE059AC12490572F0DCB2D72968830C40DF8EDC55431D04FD157B73337E68F3AFE62C3FE765A0F9125311E
2,984,161 UART: [art] SIG.S = A241D098C707E28BABB80DF3983DB59070FB29A08115531D74507BD0660E65EB17DAD13DF28EC5604A30359B5E06AA9C
3,008,024 UART: Caliptra RT
3,008,369 UART: [state] CFI Enabled
3,115,294 UART: [rt] RT listening for mailbox commands...
3,115,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,676 UART: [rt]cmd =0x46504c54, len=4
3,146,794 >>> mbox cmd response data (8 bytes)
3,146,953 UART: [rt] FIPS self test
3,147,281 UART: [kat] ++
3,147,433 UART: [kat] sha1
3,151,599 UART: [kat] SHA2-256
3,153,621 UART: [kat] SHA2-384
3,156,538 UART: Fatal Error: 0x90020002
3,158,077 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,082 >>> mbox cmd response: failed
3,158,082 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,064 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,469 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 ready_for_fw is high
1,174,121 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,386 UART: [ldev] --
1,280,904 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,411 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,517 >>> mbox cmd response: success
2,784,564 UART: [afmc] ++
2,784,732 UART: [afmc] CDI.KEYID = 6
2,785,095 UART: [afmc] SUBJECT.KEYID = 7
2,785,521 UART: [afmc] AUTHORITY.KEYID = 5
2,820,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,239 UART: [afmc] --
2,864,221 UART: [cold-reset] --
2,865,305 UART: [state] Locking Datavault
2,866,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,162 UART: [state] Locking ICCM
2,867,740 UART: [exit] Launching FMC @ 0x40000130
2,873,069 UART:
2,873,085 UART: Running Caliptra FMC ...
2,873,493 UART:
2,873,547 UART: [state] CFI Enabled
2,884,080 UART: [fht] FMC Alias Private Key: 7
2,992,191 UART: [art] Extend RT PCRs Done
2,992,619 UART: [art] Lock RT PCRs Done
2,994,227 UART: [art] Populate DV Done
3,002,412 UART: [fht] FMC Alias Private Key: 7
3,003,378 UART: [art] Derive CDI
3,003,658 UART: [art] Store in in slot 0x4
3,088,793 UART: [art] Derive Key Pair
3,089,153 UART: [art] Store priv key in slot 0x5
3,102,407 UART: [art] Derive Key Pair - Done
3,117,195 UART: [art] Signing Cert with AUTHO
3,117,675 UART: RITY.KEYID = 7
3,133,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,958 UART: [art] PUB.X = 2CCFF00E509DC7911291F8324F213AC19E0B52435B20427182538C39177656E429048A8391E43B7E145A1066E23F3BA6
3,140,707 UART: [art] PUB.Y = F6CB77AC30567A80B10DBF3443C7A6F6C477E69F87251809DC3DD747190564E70EDBBB0101E7E8FBFA9C94678F78C851
3,147,647 UART: [art] SIG.R = 72803F797E2C9AECD9F6E92FDF2CFC0CDF3F75619B2C52ACD7E5D428246FAE93389F2D0215CCB303782B2D61118EBBE6
3,154,426 UART: [art] SIG.S = FA796E4FD9D328F08FD706BE77B388FDE47C7DA4C9206FC921C8F7B3AC0CBBFF43C6147DE0981FB646FE4085566E1820
3,178,679 UART: Caliptra RT
3,178,932 UART: [state] CFI Enabled
3,287,451 UART: [rt] RT listening for mailbox commands...
3,288,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,665 UART: [rt]cmd =0x46504c54, len=4
3,318,823 >>> mbox cmd response data (8 bytes)
3,319,006 UART: [rt] FIPS self test
3,319,334 UART: [kat] ++
3,319,486 UART: [kat] sha1
3,323,562 UART: [kat] SHA2-256
3,325,584 UART: [kat] SHA2-384
3,328,505 UART: Fatal Error: 0x90020002
3,330,044 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,049 >>> mbox cmd response: failed
3,330,049 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,173,881 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,051 UART: [idev] --
1,208,088 UART: [ldev] ++
1,208,256 UART: [ldev] CDI.KEYID = 6
1,208,620 UART: [ldev] SUBJECT.KEYID = 5
1,209,047 UART: [ldev] AUTHORITY.KEYID = 7
1,209,510 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,240,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,974 UART: [ldev] --
1,280,372 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 115196 bytes
2,587,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,803 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,780,961 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 ready_for_fw is high
1,056,284 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,395 >>> mbox cmd response: success
2,694,219 UART:
2,694,235 UART: Running Caliptra FMC ...
2,694,643 UART:
2,694,697 UART: [state] CFI Enabled
2,705,416 UART: [fht] FMC Alias Private Key: 7
2,813,997 UART: [art] Extend RT PCRs Done
2,814,425 UART: [art] Lock RT PCRs Done
2,816,287 UART: [art] Populate DV Done
2,824,320 UART: [fht] FMC Alias Private Key: 7
2,825,494 UART: [art] Derive CDI
2,825,774 UART: [art] Store in in slot 0x4
2,911,481 UART: [art] Derive Key Pair
2,911,841 UART: [art] Store priv key in slot 0x5
2,924,811 UART: [art] Derive Key Pair - Done
2,939,574 UART: [art] Signing Cert with AUTHO
2,940,054 UART: RITY.KEYID = 7
2,955,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,987 UART: [art] PUB.X = E8A49FF89970A35C29ECF495543C8829D7BCEF7839198137C70B12FA781FE1E1C460CB17438710BF7F268D90D53B204E
2,962,756 UART: [art] PUB.Y = C734D69B898ED685E3307D73BD1257EDC68E9E2F392F5CD1AF1747F4D43BF3E289F33E113F3F8E458D25D9EA5759D966
2,969,714 UART: [art] SIG.R = A9CCC106B93E8272D4A009F1E3FB2872119795F7630A537CEC22546CA54B295176D69FD2FD68A3F7E718EEFD7B844E82
2,976,481 UART: [art] SIG.S = 9D8A40B5CEB4244BD8EC0F906A31EC3CAC1C2C553B4AA11BDF73CB0E55B09EB51D2445269A746D2DCD42A95C7C04D2E9
3,000,297 UART: Caliptra RT
3,000,550 UART: [state] CFI Enabled
3,108,316 UART: [rt] RT listening for mailbox commands...
3,108,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,724 UART: [rt]cmd =0x46504c54, len=4
3,139,964 >>> mbox cmd response data (8 bytes)
3,140,121 UART: [rt] FIPS self test
3,140,449 UART: [kat] ++
3,140,601 UART: [kat] sha1
3,144,937 UART: [kat] SHA2-256
3,146,959 UART: [kat] SHA2-384
3,149,748 UART: Fatal Error: 0x90020002
3,151,287 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,292 >>> mbox cmd response: failed
3,151,292 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,416 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,533 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,591 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,174,828 ready_for_fw is high
1,174,828 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,242,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,100 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,222 >>> mbox cmd response: success
2,786,279 UART: [afmc] ++
2,786,447 UART: [afmc] CDI.KEYID = 6
2,786,810 UART: [afmc] SUBJECT.KEYID = 7
2,787,236 UART: [afmc] AUTHORITY.KEYID = 5
2,823,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,058 UART: [afmc] --
2,866,998 UART: [cold-reset] --
2,867,566 UART: [state] Locking Datavault
2,868,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,567 UART: [state] Locking ICCM
2,870,047 UART: [exit] Launching FMC @ 0x40000130
2,875,376 UART:
2,875,392 UART: Running Caliptra FMC ...
2,875,800 UART:
2,875,943 UART: [state] CFI Enabled
2,886,160 UART: [fht] FMC Alias Private Key: 7
2,993,995 UART: [art] Extend RT PCRs Done
2,994,423 UART: [art] Lock RT PCRs Done
2,995,783 UART: [art] Populate DV Done
3,003,830 UART: [fht] FMC Alias Private Key: 7
3,004,890 UART: [art] Derive CDI
3,005,170 UART: [art] Store in in slot 0x4
3,091,007 UART: [art] Derive Key Pair
3,091,367 UART: [art] Store priv key in slot 0x5
3,104,905 UART: [art] Derive Key Pair - Done
3,119,602 UART: [art] Signing Cert with AUTHO
3,120,082 UART: RITY.KEYID = 7
3,135,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,925 UART: [art] PUB.X = CD8916D00D3E830862720D914641CB9842F66DED45A57A6F77B028F34A00B21BF3A5ABA23795C193032BADABD78D38C1
3,142,667 UART: [art] PUB.Y = 5D2B6FC2EBF6B783CCC0766A101226FB9F6A028A445F46B3C2F600EF37D8B774A0C8011127A48DDD11EF131BB4764C23
3,149,599 UART: [art] SIG.R = FCE75A41D8CD1D0C8D5E141205BE81EA041F2A3877D586D364D0D9C0360F5853DD1764B219AB76D0EDF531A609A3ADFF
3,156,368 UART: [art] SIG.S = ABFA1C8498064B05ABC8564E5FF84D776189C8A5ECE0053B81DF5905C0D8D1AEF89E25C518DA0BA29DBBAFAD3797FEBE
3,179,886 UART: Caliptra RT
3,180,231 UART: [state] CFI Enabled
3,288,457 UART: [rt] RT listening for mailbox commands...
3,289,120 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,287 UART: [rt]cmd =0x46504c54, len=4
3,320,543 >>> mbox cmd response data (8 bytes)
3,320,822 UART: [rt] FIPS self test
3,321,150 UART: [kat] ++
3,321,302 UART: [kat] sha1
3,325,756 UART: [kat] SHA2-256
3,327,778 UART: [kat] SHA2-384
3,330,541 UART: Fatal Error: 0x90020002
3,332,080 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,085 >>> mbox cmd response: failed
3,332,085 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,482 UART: [kat] SHA2-256
902,422 UART: [kat] SHA2-384
905,131 UART: [kat] SHA2-512-ACC
907,032 UART: [kat] ECC-384
916,903 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,171,000 UART: [cold-reset] ++
1,171,440 UART: [fht] FHT @ 0x50003400
1,174,208 UART: [idev] ++
1,174,376 UART: [idev] CDI.KEYID = 6
1,174,737 UART: [idev] SUBJECT.KEYID = 7
1,175,162 UART: [idev] UDS.KEYID = 0
1,175,508 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,240 UART: [idev] Erasing UDS.KEYID = 0
1,200,218 UART: [idev] Sha1 KeyId Algorithm
1,209,076 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,471 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,835 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,197 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,470 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,644 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 ready_for_fw is high
1,056,269 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,644 >>> mbox cmd response: success
2,696,830 UART:
2,696,846 UART: Running Caliptra FMC ...
2,697,254 UART:
2,697,397 UART: [state] CFI Enabled
2,707,834 UART: [fht] FMC Alias Private Key: 7
2,815,803 UART: [art] Extend RT PCRs Done
2,816,231 UART: [art] Lock RT PCRs Done
2,817,707 UART: [art] Populate DV Done
2,825,798 UART: [fht] FMC Alias Private Key: 7
2,826,868 UART: [art] Derive CDI
2,827,148 UART: [art] Store in in slot 0x4
2,912,537 UART: [art] Derive Key Pair
2,912,897 UART: [art] Store priv key in slot 0x5
2,926,161 UART: [art] Derive Key Pair - Done
2,941,133 UART: [art] Signing Cert with AUTHO
2,941,613 UART: RITY.KEYID = 7
2,957,125 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,890 UART: [art] PUB.X = AB4D52B621D4655723347EE18F6FCB8D87FC0312FF7B2523EB9B6FC46C51B4A6C33949C4F41D5F07005FF9F9E00E57C8
2,964,639 UART: [art] PUB.Y = EA87364816625022658DEC71BEEB04962BCF65D720B7B538555A3E51850BFA7CA704C68679125FBFB84A41394F3DDAAD
2,971,586 UART: [art] SIG.R = 8AED7C1AA64ABD26BEEFDBBC30DB158EDFC5396DC448F980E9CA9A127DED33BB2AC0044422610BA76AB756C94F49E0CD
2,978,380 UART: [art] SIG.S = B157555EE83FA3508E2731B42B24E612028493EF3507F47862BE2B48899271B9BFB4635C38C23FECF194367BD096A8B5
3,001,893 UART: Caliptra RT
3,002,238 UART: [state] CFI Enabled
3,110,792 UART: [rt] RT listening for mailbox commands...
3,111,455 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,538 UART: [rt]cmd =0x46504c54, len=4
3,142,560 >>> mbox cmd response data (8 bytes)
3,142,827 UART: [rt] FIPS self test
3,143,155 UART: [kat] ++
3,143,307 UART: [kat] sha1
3,147,627 UART: [kat] SHA2-256
3,149,649 UART: [kat] SHA2-384
3,152,240 UART: Fatal Error: 0x90020002
3,153,779 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,784 >>> mbox cmd response: failed
3,153,784 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,727 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,242 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,494 UART: [kat] SHA2-512-ACC
897,395 UART: [kat] ECC-384
903,216 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,489 UART: [cold-reset] ++
1,477,039 UART: [fht] Storing FHT @ 0x50003400
1,479,824 UART: [idev] ++
1,479,992 UART: [idev] CDI.KEYID = 6
1,480,352 UART: [idev] SUBJECT.KEYID = 7
1,480,776 UART: [idev] UDS.KEYID = 0
1,481,121 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,505,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,807 UART: [ldev] ++
1,514,975 UART: [ldev] CDI.KEYID = 6
1,515,338 UART: [ldev] SUBJECT.KEYID = 5
1,515,764 UART: [ldev] AUTHORITY.KEYID = 7
1,516,227 UART: [ldev] FE.KEYID = 1
1,521,193 UART: [ldev] Erasing FE.KEYID = 1
1,546,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,182 UART: [ldev] --
1,585,645 UART: [fwproc] Waiting for Commands...
1,586,390 UART: [fwproc] Received command 0x46505652
1,587,272 UART: [rt] FIPS Version
1,587,825 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,493 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,974 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,782 UART: [kat] SHA2-256
882,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,828 UART: [kat] ++
886,980 UART: [kat] sha1
891,248 UART: [kat] SHA2-256
893,186 UART: [kat] SHA2-384
895,821 UART: [kat] SHA2-512-ACC
897,722 UART: [kat] ECC-384
903,467 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,928 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,506,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,942 UART: [ldev] ++
1,516,110 UART: [ldev] CDI.KEYID = 6
1,516,473 UART: [ldev] SUBJECT.KEYID = 5
1,516,899 UART: [ldev] AUTHORITY.KEYID = 7
1,517,362 UART: [ldev] FE.KEYID = 1
1,522,816 UART: [ldev] Erasing FE.KEYID = 1
1,548,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,518 UART: [fwproc] Waiting for Commands...
1,588,233 UART: [fwproc] Received command 0x46505652
1,589,115 UART: [rt] FIPS Version
1,589,668 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,443,105 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,529 UART: [kat] SHA2-256
903,469 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,168 UART: [idev] ++
1,175,336 UART: [idev] CDI.KEYID = 6
1,175,696 UART: [idev] SUBJECT.KEYID = 7
1,176,120 UART: [idev] UDS.KEYID = 0
1,176,465 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,498 UART: [idev] Erasing UDS.KEYID = 0
1,201,411 UART: [idev] Sha1 KeyId Algorithm
1,209,673 UART: [idev] --
1,210,717 UART: [ldev] ++
1,210,885 UART: [ldev] CDI.KEYID = 6
1,211,248 UART: [ldev] SUBJECT.KEYID = 5
1,211,674 UART: [ldev] AUTHORITY.KEYID = 7
1,212,137 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,105 UART: [ldev] --
1,283,470 UART: [fwproc] Wait for Commands...
1,284,212 UART: [fwproc] Recv command 0x46505652
1,285,033 UART: [rt] FIPS Version
1,285,587 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,995 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,447 UART: [kat] SHA2-512-ACC
908,348 UART: [kat] ECC-384
918,033 UART: [kat] HMAC-384Kdf
922,649 UART: [kat] LMS
1,170,977 UART: [kat] --
1,171,832 UART: [cold-reset] ++
1,172,332 UART: [fht] FHT @ 0x50003400
1,175,223 UART: [idev] ++
1,175,391 UART: [idev] CDI.KEYID = 6
1,175,751 UART: [idev] SUBJECT.KEYID = 7
1,176,175 UART: [idev] UDS.KEYID = 0
1,176,520 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,200,954 UART: [idev] Sha1 KeyId Algorithm
1,209,564 UART: [idev] --
1,210,488 UART: [ldev] ++
1,210,656 UART: [ldev] CDI.KEYID = 6
1,211,019 UART: [ldev] SUBJECT.KEYID = 5
1,211,445 UART: [ldev] AUTHORITY.KEYID = 7
1,211,908 UART: [ldev] FE.KEYID = 1
1,217,188 UART: [ldev] Erasing FE.KEYID = 1
1,243,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,950 UART: [ldev] --
1,282,325 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46505652
1,283,962 UART: [rt] FIPS Version
1,284,516 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,668 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,413 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46505652
1,282,184 UART: [rt] FIPS Version
1,282,745 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,522 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,470 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,174,548 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46505652
1,283,139 UART: [rt] FIPS Version
1,283,700 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,167 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,841 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,117 UART: [kat] SHA2-256
892,055 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
901,990 UART: [kat] HMAC-384Kdf
906,504 UART: [kat] LMS
1,474,700 UART: [kat] --
1,475,691 UART: [cold-reset] ++
1,476,215 UART: [fht] Storing FHT @ 0x50003400
1,478,904 UART: [idev] ++
1,479,072 UART: [idev] CDI.KEYID = 6
1,479,432 UART: [idev] SUBJECT.KEYID = 7
1,479,856 UART: [idev] UDS.KEYID = 0
1,480,201 ready_for_fw is high
1,480,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,444 UART: [idev] Erasing UDS.KEYID = 0
1,503,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,166 UART: [idev] --
1,513,245 UART: [ldev] ++
1,513,413 UART: [ldev] CDI.KEYID = 6
1,513,776 UART: [ldev] SUBJECT.KEYID = 5
1,514,202 UART: [ldev] AUTHORITY.KEYID = 7
1,514,665 UART: [ldev] FE.KEYID = 1
1,519,509 UART: [ldev] Erasing FE.KEYID = 1
1,545,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,222 UART: [ldev] --
1,584,645 UART: [fwproc] Waiting for Commands...
1,585,440 UART: [fwproc] Received command 0x46574c44
1,586,231 UART: [fwproc] Received Image of size 114332 bytes
2,883,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,616 >>> mbox cmd response: success
3,076,616 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,698 UART: [afmc] ++
3,077,866 UART: [afmc] CDI.KEYID = 6
3,078,228 UART: [afmc] SUBJECT.KEYID = 7
3,078,653 UART: [afmc] AUTHORITY.KEYID = 5
3,113,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,107 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,797 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,794 UART: [afmc] --
3,156,908 UART: [cold-reset] --
3,157,782 UART: [state] Locking Datavault
3,158,895 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,499 UART: [state] Locking ICCM
3,159,939 UART: [exit] Launching FMC @ 0x40000130
3,165,268 UART:
3,165,284 UART: Running Caliptra FMC ...
3,165,692 UART:
3,165,746 UART: [state] CFI Enabled
3,175,933 UART: [fht] FMC Alias Private Key: 7
3,283,862 UART: [art] Extend RT PCRs Done
3,284,290 UART: [art] Lock RT PCRs Done
3,285,906 UART: [art] Populate DV Done
3,293,975 UART: [fht] FMC Alias Private Key: 7
3,295,067 UART: [art] Derive CDI
3,295,347 UART: [art] Store in in slot 0x4
3,381,386 UART: [art] Derive Key Pair
3,381,746 UART: [art] Store priv key in slot 0x5
3,394,674 UART: [art] Derive Key Pair - Done
3,409,686 UART: [art] Signing Cert with AUTHO
3,410,166 UART: RITY.KEYID = 7
3,425,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,131 UART: [art] PUB.X = 09D6656F2C5FEFA72210F80302BD37E3CCB2359E292D098FD8E3AF8E08B5B482D11E5B137062E3E9F6C6CE039BE4CD54
3,432,895 UART: [art] PUB.Y = 5A012A3ECF7DBA8C755C654A0DDB5B4913786CC46210A40232CDE077DC68FCD55904A718A237CD01142A20BAE78C807A
3,439,840 UART: [art] SIG.R = 0C142F782A49642B9E3FEE9DA4B2F3EFB09A64C8102DEA3C6610953D1ED44803CA0C278F68813D83AFDDADBA7D12964A
3,446,617 UART: [art] SIG.S = BC0A5F8A1154CEC844121E02B24E64E7BB0D85B0CE982FAC0B39DBC7186FEC7D7BE92228AC43D92E9B5E625DE926B71A
3,470,646 UART: Caliptra RT
3,470,899 UART: [state] CFI Enabled
3,578,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,832 UART: [rt]cmd =0x46505652, len=4
3,609,492 UART: [rt] FIPS Version
3,610,617 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,617 ready_for_fw is high
1,362,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,776 >>> mbox cmd response: success
2,928,776 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,968 UART:
2,989,984 UART: Running Caliptra FMC ...
2,990,392 UART:
2,990,446 UART: [state] CFI Enabled
3,001,091 UART: [fht] FMC Alias Private Key: 7
3,108,810 UART: [art] Extend RT PCRs Done
3,109,238 UART: [art] Lock RT PCRs Done
3,110,966 UART: [art] Populate DV Done
3,118,947 UART: [fht] FMC Alias Private Key: 7
3,119,881 UART: [art] Derive CDI
3,120,161 UART: [art] Store in in slot 0x4
3,205,914 UART: [art] Derive Key Pair
3,206,274 UART: [art] Store priv key in slot 0x5
3,219,358 UART: [art] Derive Key Pair - Done
3,234,253 UART: [art] Signing Cert with AUTHO
3,234,733 UART: RITY.KEYID = 7
3,249,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,678 UART: [art] PUB.X = 8DF4B84CD65E0E1F507672439F486FB128D6414EDD9556B9BA84691D96636DA3789D455A20DC45D11D4D6A52464F53C1
3,257,445 UART: [art] PUB.Y = 4B6DA85212D0192DBFCBECA2CE76DEC126422617EB89A5D5EA545CA601193203E5D1D5E1A4DC4CB7472C4E36A91548C1
3,264,403 UART: [art] SIG.R = 87A5E6396501F91A33268EC52A03D38332773369B99FE99ACA3C19FE678EFADBEBCDD15113DB15C30E2A954D5C8FB247
3,271,174 UART: [art] SIG.S = 26AAB40F8BE28654ECEA91E3A01ACE078CB84D5053DF35A4D1CA66CBCBE5CBD534211FBA5A971778047D2D30437768B4
3,294,706 UART: Caliptra RT
3,294,959 UART: [state] CFI Enabled
3,402,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,974 UART: [rt]cmd =0x46505652, len=4
3,433,634 UART: [rt] FIPS Version
3,434,825 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
903,191 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,477,064 UART: [cold-reset] ++
1,477,446 UART: [fht] Storing FHT @ 0x50003400
1,480,345 UART: [idev] ++
1,480,513 UART: [idev] CDI.KEYID = 6
1,480,873 UART: [idev] SUBJECT.KEYID = 7
1,481,297 UART: [idev] UDS.KEYID = 0
1,481,642 ready_for_fw is high
1,481,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,331 UART: [idev] Erasing UDS.KEYID = 0
1,506,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,725 UART: [idev] --
1,515,814 UART: [ldev] ++
1,515,982 UART: [ldev] CDI.KEYID = 6
1,516,345 UART: [ldev] SUBJECT.KEYID = 5
1,516,771 UART: [ldev] AUTHORITY.KEYID = 7
1,517,234 UART: [ldev] FE.KEYID = 1
1,522,844 UART: [ldev] Erasing FE.KEYID = 1
1,548,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,987 UART: [ldev] --
1,587,282 UART: [fwproc] Waiting for Commands...
1,587,987 UART: [fwproc] Received command 0x46574c44
1,588,778 UART: [fwproc] Received Image of size 114332 bytes
2,886,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,826 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,163 >>> mbox cmd response: success
3,079,163 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,355 UART: [afmc] ++
3,080,523 UART: [afmc] CDI.KEYID = 6
3,080,885 UART: [afmc] SUBJECT.KEYID = 7
3,081,310 UART: [afmc] AUTHORITY.KEYID = 5
3,116,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,152 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,842 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,837 UART: [afmc] --
3,159,745 UART: [cold-reset] --
3,160,693 UART: [state] Locking Datavault
3,161,888 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,492 UART: [state] Locking ICCM
3,163,126 UART: [exit] Launching FMC @ 0x40000130
3,168,455 UART:
3,168,471 UART: Running Caliptra FMC ...
3,168,879 UART:
3,169,022 UART: [state] CFI Enabled
3,179,635 UART: [fht] FMC Alias Private Key: 7
3,287,068 UART: [art] Extend RT PCRs Done
3,287,496 UART: [art] Lock RT PCRs Done
3,288,984 UART: [art] Populate DV Done
3,297,143 UART: [fht] FMC Alias Private Key: 7
3,298,165 UART: [art] Derive CDI
3,298,445 UART: [art] Store in in slot 0x4
3,383,922 UART: [art] Derive Key Pair
3,384,282 UART: [art] Store priv key in slot 0x5
3,397,130 UART: [art] Derive Key Pair - Done
3,411,758 UART: [art] Signing Cert with AUTHO
3,412,238 UART: RITY.KEYID = 7
3,427,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,463 UART: [art] PUB.X = 4D075039BD9B71B5E63134F93B8D51D39F5A6B0A3AEF84B706E2342A4056072D7220461FC411181ED97B6417858AB9DD
3,435,219 UART: [art] PUB.Y = 6BA46B33D98559DA18C9F921D0F1702C54048A7BAE9429B8AD6106B8710EAE8BD367F749CB731A4AAA784FAF6D02AD43
3,442,169 UART: [art] SIG.R = 9D6305D200BFA8BF8706770EB837148C47BFFF17A1D3B4C18809BB8E188EB43C2ED5BF865D80EB19694C592DBA52424E
3,448,915 UART: [art] SIG.S = 80448A2F1B053F91949983151ED0072C3A7BB708F680EBA0D31800BA17CD77A60E64C055388C57408C6CB2324419E481
3,472,388 UART: Caliptra RT
3,472,733 UART: [state] CFI Enabled
3,581,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,899 UART: [rt]cmd =0x46505652, len=4
3,612,559 UART: [rt] FIPS Version
3,613,672 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,506 ready_for_fw is high
1,363,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,429 >>> mbox cmd response: success
2,928,429 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,671 UART:
2,989,687 UART: Running Caliptra FMC ...
2,990,095 UART:
2,990,238 UART: [state] CFI Enabled
3,000,853 UART: [fht] FMC Alias Private Key: 7
3,109,644 UART: [art] Extend RT PCRs Done
3,110,072 UART: [art] Lock RT PCRs Done
3,111,570 UART: [art] Populate DV Done
3,119,737 UART: [fht] FMC Alias Private Key: 7
3,120,729 UART: [art] Derive CDI
3,121,009 UART: [art] Store in in slot 0x4
3,206,680 UART: [art] Derive Key Pair
3,207,040 UART: [art] Store priv key in slot 0x5
3,220,076 UART: [art] Derive Key Pair - Done
3,234,836 UART: [art] Signing Cert with AUTHO
3,235,316 UART: RITY.KEYID = 7
3,250,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,393 UART: [art] PUB.X = A968FE4697B8F543774804640C43DE770F4B5243F8B75A576691E692A93D6B9C85DDDFF91FCDD0A9F4E9E0AE8892E3E4
3,258,162 UART: [art] PUB.Y = 20CD269A09272995B28FCF2F58CF275C9CE6C3A7EF392E8D4855F04CFC260F1952879AC5DF09F74D4235BD8FCB4584C1
3,265,113 UART: [art] SIG.R = AF623F11BF8F0C8422D9A3FA516217DB0F5159E7E3BB830183F262F967D9D3F367B2D8C39641C4E7589126FD8A2108A3
3,271,873 UART: [art] SIG.S = 31FC2E5A810399B1AC4A938C208176EC0B0D80604F065F9914CACFCFFB67D0314CD96901D37B6FC27DB8648A6917DFFB
3,295,703 UART: Caliptra RT
3,296,048 UART: [state] CFI Enabled
3,404,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,473 UART: [rt]cmd =0x46505652, len=4
3,436,133 UART: [rt] FIPS Version
3,437,136 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,502 UART: [kat] SHA2-512-ACC
908,403 UART: [kat] ECC-384
918,422 UART: [kat] HMAC-384Kdf
922,996 UART: [kat] LMS
1,171,324 UART: [kat] --
1,172,337 UART: [cold-reset] ++
1,172,847 UART: [fht] FHT @ 0x50003400
1,175,616 UART: [idev] ++
1,175,784 UART: [idev] CDI.KEYID = 6
1,176,144 UART: [idev] SUBJECT.KEYID = 7
1,176,568 UART: [idev] UDS.KEYID = 0
1,176,913 ready_for_fw is high
1,176,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,755 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,303 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,445 >>> mbox cmd response: success
2,773,445 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,697 UART: [afmc] ++
2,774,865 UART: [afmc] CDI.KEYID = 6
2,775,227 UART: [afmc] SUBJECT.KEYID = 7
2,775,652 UART: [afmc] AUTHORITY.KEYID = 5
2,811,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,188 UART: [afmc] --
2,854,196 UART: [cold-reset] --
2,854,904 UART: [state] Locking Datavault
2,856,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,703 UART: [state] Locking ICCM
2,857,177 UART: [exit] Launching FMC @ 0x40000130
2,862,506 UART:
2,862,522 UART: Running Caliptra FMC ...
2,862,930 UART:
2,862,984 UART: [state] CFI Enabled
2,873,353 UART: [fht] FMC Alias Private Key: 7
2,981,746 UART: [art] Extend RT PCRs Done
2,982,174 UART: [art] Lock RT PCRs Done
2,983,748 UART: [art] Populate DV Done
2,991,923 UART: [fht] FMC Alias Private Key: 7
2,992,865 UART: [art] Derive CDI
2,993,145 UART: [art] Store in in slot 0x4
3,078,822 UART: [art] Derive Key Pair
3,079,182 UART: [art] Store priv key in slot 0x5
3,092,494 UART: [art] Derive Key Pair - Done
3,107,344 UART: [art] Signing Cert with AUTHO
3,107,824 UART: RITY.KEYID = 7
3,123,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,879 UART: [art] PUB.X = 7BA4C275630F31199A7A1A85295186204107EA79515C566B1130C9D8897BF39CE79A90C6E063E618CC93469ADA619449
3,130,633 UART: [art] PUB.Y = 5686324A65DAA12A7817F5025AFDAF523B66940C2880F917C97C18FFA667299983E3F9F920B3A022E2596EE3C36D6E3C
3,137,577 UART: [art] SIG.R = 27DF89D330CDDD896AD83F9C7EA61105CF6472A951489F76A4C15BF34AC995FA01EF2BCA1EC93FD62900C5A9935C75F7
3,144,333 UART: [art] SIG.S = D57795273CA98790F8AB73AD5F20C9E43B7D44AD655A6EA6534A1ADD374C4FBD874CF1D3CDCBB81D69AA7818C57A0067
3,168,086 UART: Caliptra RT
3,168,339 UART: [state] CFI Enabled
3,276,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,662 UART: [rt]cmd =0x46505652, len=4
3,308,322 UART: [rt] FIPS Version
3,309,529 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 ready_for_fw is high
1,060,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,230 >>> mbox cmd response: success
2,626,230 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,782 UART:
2,688,798 UART: Running Caliptra FMC ...
2,689,206 UART:
2,689,260 UART: [state] CFI Enabled
2,699,967 UART: [fht] FMC Alias Private Key: 7
2,807,382 UART: [art] Extend RT PCRs Done
2,807,810 UART: [art] Lock RT PCRs Done
2,809,322 UART: [art] Populate DV Done
2,817,631 UART: [fht] FMC Alias Private Key: 7
2,818,605 UART: [art] Derive CDI
2,818,885 UART: [art] Store in in slot 0x4
2,904,712 UART: [art] Derive Key Pair
2,905,072 UART: [art] Store priv key in slot 0x5
2,917,988 UART: [art] Derive Key Pair - Done
2,932,774 UART: [art] Signing Cert with AUTHO
2,933,254 UART: RITY.KEYID = 7
2,948,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,861 UART: [art] PUB.X = 4C732DF5D476815CDA760A7A7B4940F1A7A6C10171323DE18CFC902CF729F8086B20FD58767B32D69CFE6DD0814A58C8
2,955,628 UART: [art] PUB.Y = CB899D9A3F5C618907C2B008C68B5703F3832137551568378D993835C5828DAD3F6F2C5F0D6438346DF782C74B987F10
2,962,556 UART: [art] SIG.R = 17DF3968E7A7B283DA6E6295157244783C63C3684DD734AA17070208BAA58767C6A8956E76B42C5292B320908A3F5D7A
2,969,309 UART: [art] SIG.S = 7271D3CA3B5E5AC04DB93B2281701FE333253EDDB784664DA014B049E9471E310A70186C3408D70D20ECE836EAF07AFA
2,992,803 UART: Caliptra RT
2,993,056 UART: [state] CFI Enabled
3,101,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,099 UART: [rt]cmd =0x46505652, len=4
3,132,759 UART: [rt] FIPS Version
3,133,834 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
893,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,988 UART: [kat] ++
898,140 UART: [kat] sha1
902,422 UART: [kat] SHA2-256
904,362 UART: [kat] SHA2-384
907,281 UART: [kat] SHA2-512-ACC
909,182 UART: [kat] ECC-384
918,889 UART: [kat] HMAC-384Kdf
923,615 UART: [kat] LMS
1,171,943 UART: [kat] --
1,172,894 UART: [cold-reset] ++
1,173,354 UART: [fht] FHT @ 0x50003400
1,176,125 UART: [idev] ++
1,176,293 UART: [idev] CDI.KEYID = 6
1,176,653 UART: [idev] SUBJECT.KEYID = 7
1,177,077 UART: [idev] UDS.KEYID = 0
1,177,422 ready_for_fw is high
1,177,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,986 UART: [idev] Sha1 KeyId Algorithm
1,210,486 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,217,764 UART: [ldev] Erasing FE.KEYID = 1
1,244,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,236 UART: [ldev] --
1,283,605 UART: [fwproc] Wait for Commands...
1,284,193 UART: [fwproc] Recv command 0x46574c44
1,284,921 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,604 >>> mbox cmd response: success
2,773,604 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,812 UART: [afmc] ++
2,774,980 UART: [afmc] CDI.KEYID = 6
2,775,342 UART: [afmc] SUBJECT.KEYID = 7
2,775,767 UART: [afmc] AUTHORITY.KEYID = 5
2,811,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,993 UART: [afmc] --
2,854,953 UART: [cold-reset] --
2,855,871 UART: [state] Locking Datavault
2,856,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,560 UART: [state] Locking ICCM
2,858,056 UART: [exit] Launching FMC @ 0x40000130
2,863,385 UART:
2,863,401 UART: Running Caliptra FMC ...
2,863,809 UART:
2,863,952 UART: [state] CFI Enabled
2,874,617 UART: [fht] FMC Alias Private Key: 7
2,982,484 UART: [art] Extend RT PCRs Done
2,982,912 UART: [art] Lock RT PCRs Done
2,984,714 UART: [art] Populate DV Done
2,992,991 UART: [fht] FMC Alias Private Key: 7
2,994,147 UART: [art] Derive CDI
2,994,427 UART: [art] Store in in slot 0x4
3,080,182 UART: [art] Derive Key Pair
3,080,542 UART: [art] Store priv key in slot 0x5
3,094,600 UART: [art] Derive Key Pair - Done
3,109,266 UART: [art] Signing Cert with AUTHO
3,109,746 UART: RITY.KEYID = 7
3,125,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,019 UART: [art] PUB.X = EF3C71C551CBAFA12A4E429BA81B71611BE67BCEF5F43455F0653F129F6FD9B8D378B59076FE08848D3057E22565D80D
3,132,791 UART: [art] PUB.Y = A17A0A264025679C43608A8C279F8A56650B5891B7C320AF215B38F7FD1AA6A3B41A5A89A2DCCC1EFA435EF25615383B
3,139,741 UART: [art] SIG.R = E0314FB69C31AA4E0CA43BE01120551B00DB04826AF9749E262EEEBC78485A7E5F6A4301859C41B171CD9C6C7B592E3E
3,146,488 UART: [art] SIG.S = BF94620B6370A35CA26F1768A97724E4DBE4009018902B259172716AC16868E663C87A1B4526FF59CBF6C089883EFD38
3,170,082 UART: Caliptra RT
3,170,427 UART: [state] CFI Enabled
3,278,087 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,323 UART: [rt]cmd =0x46505652, len=4
3,308,983 UART: [rt] FIPS Version
3,310,092 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,350 ready_for_fw is high
1,060,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,667 >>> mbox cmd response: success
2,627,667 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,205 UART:
2,690,221 UART: Running Caliptra FMC ...
2,690,629 UART:
2,690,772 UART: [state] CFI Enabled
2,701,319 UART: [fht] FMC Alias Private Key: 7
2,809,338 UART: [art] Extend RT PCRs Done
2,809,766 UART: [art] Lock RT PCRs Done
2,811,378 UART: [art] Populate DV Done
2,819,449 UART: [fht] FMC Alias Private Key: 7
2,820,567 UART: [art] Derive CDI
2,820,847 UART: [art] Store in in slot 0x4
2,905,960 UART: [art] Derive Key Pair
2,906,320 UART: [art] Store priv key in slot 0x5
2,919,890 UART: [art] Derive Key Pair - Done
2,934,669 UART: [art] Signing Cert with AUTHO
2,935,149 UART: RITY.KEYID = 7
2,950,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,254 UART: [art] PUB.X = 6380F5C60A9E74087FAA5E9AC685CEB35E67EA94E81CA73422E84BBEC6900AC13C282026F189A3FF1364C057DD55FF15
2,958,025 UART: [art] PUB.Y = 8DE6CB2F54D8E243531B17E934E7182AA57FFADF63D0FD93272BC30E4F886929AB1280F0DF8481558411B62CE652D537
2,964,976 UART: [art] SIG.R = 6403B873797C141A916589D86CA1ADD913FBF209AFB62C4FB4F07AA8C86042D551F7570BF6CCDD60FCC5EC1C2DEA1B66
2,971,755 UART: [art] SIG.S = 600FC5161F7A04D2D1B28D4374123B16DF0C59922482C3F411589540EF8CD74EDBC7AF0C9AE3A75689DD2E5FE69EE84E
2,995,276 UART: Caliptra RT
2,995,621 UART: [state] CFI Enabled
3,102,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,416 UART: [rt]cmd =0x46505652, len=4
3,134,076 UART: [rt] FIPS Version
3,135,013 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,465 UART: [idev] ++
1,172,633 UART: [idev] CDI.KEYID = 6
1,172,994 UART: [idev] SUBJECT.KEYID = 7
1,173,419 UART: [idev] UDS.KEYID = 0
1,173,765 ready_for_fw is high
1,173,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,206,841 UART: [idev] --
1,207,884 UART: [ldev] ++
1,208,052 UART: [ldev] CDI.KEYID = 6
1,208,416 UART: [ldev] SUBJECT.KEYID = 5
1,208,843 UART: [ldev] AUTHORITY.KEYID = 7
1,209,306 UART: [ldev] FE.KEYID = 1
1,214,304 UART: [ldev] Erasing FE.KEYID = 1
1,240,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,496 UART: [ldev] --
1,279,776 UART: [fwproc] Wait for Commands...
1,280,501 UART: [fwproc] Recv command 0x46574c44
1,281,234 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,431 >>> mbox cmd response: success
2,770,431 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,546 UART: [afmc] ++
2,771,714 UART: [afmc] CDI.KEYID = 6
2,772,077 UART: [afmc] SUBJECT.KEYID = 7
2,772,503 UART: [afmc] AUTHORITY.KEYID = 5
2,808,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,275 UART: [afmc] --
2,851,181 UART: [cold-reset] --
2,852,007 UART: [state] Locking Datavault
2,852,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,478 UART: [state] Locking ICCM
2,854,036 UART: [exit] Launching FMC @ 0x40000130
2,859,365 UART:
2,859,381 UART: Running Caliptra FMC ...
2,859,789 UART:
2,859,843 UART: [state] CFI Enabled
2,870,342 UART: [fht] FMC Alias Private Key: 7
2,978,471 UART: [art] Extend RT PCRs Done
2,978,899 UART: [art] Lock RT PCRs Done
2,980,537 UART: [art] Populate DV Done
2,989,022 UART: [fht] FMC Alias Private Key: 7
2,989,996 UART: [art] Derive CDI
2,990,276 UART: [art] Store in in slot 0x4
3,075,871 UART: [art] Derive Key Pair
3,076,231 UART: [art] Store priv key in slot 0x5
3,089,151 UART: [art] Derive Key Pair - Done
3,103,696 UART: [art] Signing Cert with AUTHO
3,104,176 UART: RITY.KEYID = 7
3,119,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,127 UART: [art] PUB.X = 897D6C336ADEF794BD3E22DA1B483FFC9CA9DA999E2ACBD2BA55D28B5728C4D6DAC41F2547134C45FA941EB952C10C4B
3,126,916 UART: [art] PUB.Y = 58B8FF1E744052A323E1A23EF3C8DFD07E9F22A331D667D147C2D6454CC6DD15DA8675735B50550D6F34390E7AD59E96
3,133,864 UART: [art] SIG.R = FEA46439B085D81A56701854F878B5A6662184A4F70DECF505BC7A2D90707AEB11C1CE3D42CBD77EB797184F3FB82862
3,140,634 UART: [art] SIG.S = 7DEC473D44257CD7430DD0BF82DDC57683C9FD9784FCC7861BB71C88E6A252B1833630CA38EFD3FC82762A02A18664CE
3,164,129 UART: Caliptra RT
3,164,382 UART: [state] CFI Enabled
3,273,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,199 UART: [rt]cmd =0x46505652, len=4
3,304,859 UART: [rt] FIPS Version
3,305,886 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,434 ready_for_fw is high
1,056,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,291 >>> mbox cmd response: success
2,623,291 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,265 UART:
2,685,281 UART: Running Caliptra FMC ...
2,685,689 UART:
2,685,743 UART: [state] CFI Enabled
2,696,246 UART: [fht] FMC Alias Private Key: 7
2,804,149 UART: [art] Extend RT PCRs Done
2,804,577 UART: [art] Lock RT PCRs Done
2,806,263 UART: [art] Populate DV Done
2,814,414 UART: [fht] FMC Alias Private Key: 7
2,815,464 UART: [art] Derive CDI
2,815,744 UART: [art] Store in in slot 0x4
2,901,207 UART: [art] Derive Key Pair
2,901,567 UART: [art] Store priv key in slot 0x5
2,914,599 UART: [art] Derive Key Pair - Done
2,929,236 UART: [art] Signing Cert with AUTHO
2,929,716 UART: RITY.KEYID = 7
2,945,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,953 UART: [art] PUB.X = 9D3A37627484A30A4E7244D525A7CB6A25A0F9571DCA07451C3FC4DB0B1C357267D87E1B481EF6A93E9F77E489AE592B
2,952,720 UART: [art] PUB.Y = AE2874AE8DB681892DAF25704E07A685F07E76EC33EDE159F9B0B686EDE615EC6AC9F6CDD5687FE4127C9D48B29326E5
2,959,681 UART: [art] SIG.R = B87664DA7A8CA2D34C51F95E0A5A9057FB468FB3079DCE14140EB58A6867A7A7E78C5F4FB39B15B8341244A40EB08576
2,966,445 UART: [art] SIG.S = DDE51C403DA00059A54EBE20731A0E871AC4F5A60E5DB63CFA80677C688CF3C6875E2E964AEF6989D9BE4A41AC0CCB3A
2,991,049 UART: Caliptra RT
2,991,302 UART: [state] CFI Enabled
3,099,158 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,590 UART: [rt]cmd =0x46505652, len=4
3,130,250 UART: [rt] FIPS Version
3,131,353 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,717 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,272 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,174,532 ready_for_fw is high
1,174,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,633 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,026 >>> mbox cmd response: success
2,773,026 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,127 UART: [afmc] ++
2,774,295 UART: [afmc] CDI.KEYID = 6
2,774,658 UART: [afmc] SUBJECT.KEYID = 7
2,775,084 UART: [afmc] AUTHORITY.KEYID = 5
2,810,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,964 UART: [afmc] --
2,854,070 UART: [cold-reset] --
2,854,800 UART: [state] Locking Datavault
2,855,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,471 UART: [state] Locking ICCM
2,856,935 UART: [exit] Launching FMC @ 0x40000130
2,862,264 UART:
2,862,280 UART: Running Caliptra FMC ...
2,862,688 UART:
2,862,831 UART: [state] CFI Enabled
2,873,768 UART: [fht] FMC Alias Private Key: 7
2,981,755 UART: [art] Extend RT PCRs Done
2,982,183 UART: [art] Lock RT PCRs Done
2,984,109 UART: [art] Populate DV Done
2,992,562 UART: [fht] FMC Alias Private Key: 7
2,993,548 UART: [art] Derive CDI
2,993,828 UART: [art] Store in in slot 0x4
3,079,215 UART: [art] Derive Key Pair
3,079,575 UART: [art] Store priv key in slot 0x5
3,092,803 UART: [art] Derive Key Pair - Done
3,107,262 UART: [art] Signing Cert with AUTHO
3,107,742 UART: RITY.KEYID = 7
3,123,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,867 UART: [art] PUB.X = 4C53F9BAF191E5E80EB8BBEFEA580073E0CB6EDBAD6AEF137E2DE842CB44659CC4B032253385556A75B1D6699A47DE4D
3,130,632 UART: [art] PUB.Y = D3016984DD870ED02E08B0FE2D0D6D51069D302EB283B8E81D0F686F520965DDE279DE227132BED0CDCEBCAB15894795
3,137,571 UART: [art] SIG.R = C6307838C18515453829DDB03B61C38AEA68C75845593FA015CD22EF96F9E164ECD3A2F317EBFF83F28D9B9AB0159956
3,144,345 UART: [art] SIG.S = 53A9A95090E18C772E4CBC4CEE852DE9AF4443874F7573608B698D02E63BCD32DB8B7DCC589982CF2062AFEC1143C7E2
3,168,019 UART: Caliptra RT
3,168,364 UART: [state] CFI Enabled
3,276,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,489 UART: [rt]cmd =0x46505652, len=4
3,308,149 UART: [rt] FIPS Version
3,309,160 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,679 ready_for_fw is high
1,056,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,922 >>> mbox cmd response: success
2,623,922 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,154 UART:
2,686,170 UART: Running Caliptra FMC ...
2,686,578 UART:
2,686,721 UART: [state] CFI Enabled
2,697,374 UART: [fht] FMC Alias Private Key: 7
2,805,155 UART: [art] Extend RT PCRs Done
2,805,583 UART: [art] Lock RT PCRs Done
2,807,265 UART: [art] Populate DV Done
2,815,332 UART: [fht] FMC Alias Private Key: 7
2,816,284 UART: [art] Derive CDI
2,816,564 UART: [art] Store in in slot 0x4
2,902,229 UART: [art] Derive Key Pair
2,902,589 UART: [art] Store priv key in slot 0x5
2,915,287 UART: [art] Derive Key Pair - Done
2,929,893 UART: [art] Signing Cert with AUTHO
2,930,373 UART: RITY.KEYID = 7
2,945,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,308 UART: [art] PUB.X = 2E0982DDD3D22C169E2A521DBE70EB28CEF1AA5D21ADD2D864CAF2E61D9BF9972E25CCE74082EF371E622AFF551E8566
2,953,095 UART: [art] PUB.Y = 96FF38F1419A4DBD833A5FA5F62A3A1D8090AC9E3E1D5FFF83FCBBF5DE08863B2A3A66E246773F9069D1A30E6258E606
2,960,050 UART: [art] SIG.R = 9F3C36D39016FADBCA8D1407A131EC81AD9644E723D0DD92C528CD291AD3E8CE0D7E2965D171C2610D6C9581B62BFEDA
2,966,827 UART: [art] SIG.S = 9C254825C569CCC573E0770D7B38C2640978B89F3BF1B398BF343442B08CAAA22C5309FA2CF8D64F5C67650E3799F3B1
2,990,700 UART: Caliptra RT
2,991,045 UART: [state] CFI Enabled
3,098,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,633 UART: [rt]cmd =0x46505652, len=4
3,129,293 UART: [rt] FIPS Version
3,130,290 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,398 UART: [kat] SHA2-512-ACC
897,299 UART: [kat] ECC-384
902,922 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,305 UART: [cold-reset] ++
1,476,871 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,505,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,798 UART: [idev] --
1,514,853 UART: [ldev] ++
1,515,021 UART: [ldev] CDI.KEYID = 6
1,515,384 UART: [ldev] SUBJECT.KEYID = 5
1,515,810 UART: [ldev] AUTHORITY.KEYID = 7
1,516,273 UART: [ldev] FE.KEYID = 1
1,521,779 UART: [ldev] Erasing FE.KEYID = 1
1,546,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,396 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46505652
1,587,526 UART: [rt] FIPS Version
1,588,079 >>> mbox cmd response data (36 bytes)
1,588,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,262 UART: [fwproc] Received command 0x46504c54
1,589,169 UART: [kat] SHA2-256
2,383,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,215 UART: [kat] ++
2,387,367 UART: [kat] sha1
2,391,719 UART: [kat] SHA2-256
2,393,657 UART: [kat] SHA2-384
2,396,488 UART: [kat] SHA2-512-ACC
2,398,388 UART: [kat] ECC-384
2,403,931 UART: [kat] HMAC-384Kdf
2,408,479 UART: [kat] LMS
2,976,675 UART: [kat] --
2,976,913 >>> mbox cmd response data (8 bytes)
2,976,914 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,992 UART: [fwproc] Received command 0x46504c67
2,977,946 >>> mbox cmd response data (8 bytes)
2,977,947 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,167 UART: [fwproc] Received command 0x43415053
2,979,215 >>> mbox cmd response data (24 bytes)
2,979,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,510 UART: [fwproc] Received command 0x4d454153
2,983,574 >>> mbox cmd response data (12 bytes)
2,983,575 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,727 UART: [fwproc] Received command 0x46505344
2,984,675 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,930 >>> mbox cmd response data (36 bytes)
1,441,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,126 >>> mbox cmd response data (8 bytes)
2,717,127 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,579 >>> mbox cmd response data (8 bytes)
2,717,580 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,092 >>> mbox cmd response data (24 bytes)
2,718,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,491 >>> mbox cmd response data (12 bytes)
2,721,492 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,813 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,984 UART: [kat] SHA2-256
881,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,030 UART: [kat] ++
886,182 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,085 UART: [kat] SHA2-512-ACC
896,986 UART: [kat] ECC-384
902,523 UART: [kat] HMAC-384Kdf
906,965 UART: [kat] LMS
1,475,161 UART: [kat] --
1,476,026 UART: [cold-reset] ++
1,476,366 UART: [fht] Storing FHT @ 0x50003400
1,479,043 UART: [idev] ++
1,479,211 UART: [idev] CDI.KEYID = 6
1,479,571 UART: [idev] SUBJECT.KEYID = 7
1,479,995 UART: [idev] UDS.KEYID = 0
1,480,340 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,163 UART: [idev] Erasing UDS.KEYID = 0
1,504,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,335 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,138 UART: [ldev] Erasing FE.KEYID = 1
1,546,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,139 UART: [ldev] --
1,586,418 UART: [fwproc] Waiting for Commands...
1,587,115 UART: [fwproc] Received command 0x46505652
1,587,997 UART: [rt] FIPS Version
1,588,550 >>> mbox cmd response data (36 bytes)
1,588,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,693 UART: [fwproc] Received command 0x46504c54
1,589,600 UART: [kat] SHA2-256
2,383,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,646 UART: [kat] ++
2,387,798 UART: [kat] sha1
2,392,092 UART: [kat] SHA2-256
2,394,030 UART: [kat] SHA2-384
2,396,685 UART: [kat] SHA2-512-ACC
2,398,585 UART: [kat] ECC-384
2,404,198 UART: [kat] HMAC-384Kdf
2,408,890 UART: [kat] LMS
2,977,086 UART: [kat] --
2,977,324 >>> mbox cmd response data (8 bytes)
2,977,325 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,447 UART: [fwproc] Received command 0x46504c67
2,978,401 >>> mbox cmd response data (8 bytes)
2,978,402 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,596 UART: [fwproc] Received command 0x43415053
2,979,644 >>> mbox cmd response data (24 bytes)
2,979,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,819 UART: [fwproc] Received command 0x4d454153
2,983,883 >>> mbox cmd response data (12 bytes)
2,983,884 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,990 UART: [fwproc] Received command 0x46505344
2,984,938 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,191 >>> mbox cmd response data (36 bytes)
1,442,192 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,691 >>> mbox cmd response data (8 bytes)
2,717,692 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,990 >>> mbox cmd response data (8 bytes)
2,717,991 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,441 >>> mbox cmd response data (24 bytes)
2,718,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,806 >>> mbox cmd response data (12 bytes)
2,721,807 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,252 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,172,067 UART: [fht] FHT @ 0x50003400
1,174,728 UART: [idev] ++
1,174,896 UART: [idev] CDI.KEYID = 6
1,175,256 UART: [idev] SUBJECT.KEYID = 7
1,175,680 UART: [idev] UDS.KEYID = 0
1,176,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,494 UART: [idev] Erasing UDS.KEYID = 0
1,200,405 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,400 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,956 UART: [fwproc] Recv command 0x46505652
1,283,777 UART: [rt] FIPS Version
1,284,331 >>> mbox cmd response data (36 bytes)
1,284,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,448 UART: [fwproc] Recv command 0x46504c54
1,285,294 UART: [kat] SHA2-256
2,090,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,069 UART: [kat] ++
2,095,221 UART: [kat] sha1
2,099,359 UART: [kat] SHA2-256
2,101,299 UART: [kat] SHA2-384
2,103,904 UART: [kat] SHA2-512-ACC
2,105,804 UART: [kat] ECC-384
2,115,427 UART: [kat] HMAC-384Kdf
2,119,959 UART: [kat] LMS
2,368,287 UART: [kat] --
2,368,525 >>> mbox cmd response data (8 bytes)
2,368,526 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,767 UART: [fwproc] Recv command 0x46504c67
2,369,660 >>> mbox cmd response data (8 bytes)
2,369,661 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,369,800 UART: [fwproc] Recv command 0x43415053
2,370,783 >>> mbox cmd response data (24 bytes)
2,370,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,370,879 UART: [fwproc] Recv command 0x4d454153
2,374,888 >>> mbox cmd response data (12 bytes)
2,374,889 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,375,090 UART: [fwproc] Recv command 0x46505344
2,375,977 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,949 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,323 >>> mbox cmd response data (36 bytes)
1,139,324 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,666 >>> mbox cmd response data (8 bytes)
2,112,667 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,993 >>> mbox cmd response data (8 bytes)
2,112,994 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,464 >>> mbox cmd response data (24 bytes)
2,113,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,895 >>> mbox cmd response data (12 bytes)
2,116,896 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,202 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,171,814 UART: [cold-reset] ++
1,172,238 UART: [fht] FHT @ 0x50003400
1,174,875 UART: [idev] ++
1,175,043 UART: [idev] CDI.KEYID = 6
1,175,403 UART: [idev] SUBJECT.KEYID = 7
1,175,827 UART: [idev] UDS.KEYID = 0
1,176,172 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,975 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,754 UART: [ldev] ++
1,210,922 UART: [ldev] CDI.KEYID = 6
1,211,285 UART: [ldev] SUBJECT.KEYID = 5
1,211,711 UART: [ldev] AUTHORITY.KEYID = 7
1,212,174 UART: [ldev] FE.KEYID = 1
1,217,520 UART: [ldev] Erasing FE.KEYID = 1
1,244,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,516 UART: [ldev] --
1,283,841 UART: [fwproc] Wait for Commands...
1,284,519 UART: [fwproc] Recv command 0x46505652
1,285,340 UART: [rt] FIPS Version
1,285,894 >>> mbox cmd response data (36 bytes)
1,285,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,286,203 UART: [fwproc] Recv command 0x46504c54
1,287,049 UART: [kat] SHA2-256
2,092,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,824 UART: [kat] ++
2,096,976 UART: [kat] sha1
2,101,296 UART: [kat] SHA2-256
2,103,236 UART: [kat] SHA2-384
2,106,031 UART: [kat] SHA2-512-ACC
2,107,931 UART: [kat] ECC-384
2,117,850 UART: [kat] HMAC-384Kdf
2,122,460 UART: [kat] LMS
2,370,788 UART: [kat] --
2,371,026 >>> mbox cmd response data (8 bytes)
2,371,027 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,371,300 UART: [fwproc] Recv command 0x46504c67
2,372,193 >>> mbox cmd response data (8 bytes)
2,372,194 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,372,415 UART: [fwproc] Recv command 0x43415053
2,373,398 >>> mbox cmd response data (24 bytes)
2,373,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,373,532 UART: [fwproc] Recv command 0x4d454153
2,377,541 >>> mbox cmd response data (12 bytes)
2,377,542 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,377,777 UART: [fwproc] Recv command 0x46505344
2,378,664 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,922 >>> mbox cmd response data (36 bytes)
1,139,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,151 >>> mbox cmd response data (8 bytes)
2,113,152 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,426 >>> mbox cmd response data (8 bytes)
2,113,427 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,801 >>> mbox cmd response data (24 bytes)
2,113,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,284 >>> mbox cmd response data (12 bytes)
2,117,285 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,767 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,371 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,173,877 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,055 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,800 UART: [ldev] ++
1,208,968 UART: [ldev] CDI.KEYID = 6
1,209,332 UART: [ldev] SUBJECT.KEYID = 5
1,209,759 UART: [ldev] AUTHORITY.KEYID = 7
1,210,222 UART: [ldev] FE.KEYID = 1
1,215,332 UART: [ldev] Erasing FE.KEYID = 1
1,241,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46505652
1,282,642 UART: [rt] FIPS Version
1,283,203 >>> mbox cmd response data (36 bytes)
1,283,204 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,463 UART: [fwproc] Recv command 0x46504c54
1,284,317 UART: [kat] SHA2-256
2,087,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,091,996 UART: [kat] ++
2,092,148 UART: [kat] sha1
2,096,354 UART: [kat] SHA2-256
2,098,294 UART: [kat] SHA2-384
2,101,243 UART: [kat] SHA2-512-ACC
2,103,143 UART: [kat] ECC-384
2,113,074 UART: [kat] HMAC-384Kdf
2,117,752 UART: [kat] LMS
2,366,064 UART: [kat] --
2,366,305 >>> mbox cmd response data (8 bytes)
2,366,306 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,522 UART: [fwproc] Recv command 0x46504c67
2,367,426 >>> mbox cmd response data (8 bytes)
2,367,427 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,609 UART: [fwproc] Recv command 0x43415053
2,368,604 >>> mbox cmd response data (24 bytes)
2,368,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,756 UART: [fwproc] Recv command 0x4d454153
2,372,783 >>> mbox cmd response data (12 bytes)
2,372,784 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,043 UART: [fwproc] Recv command 0x46505344
2,373,946 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,046 >>> mbox cmd response data (36 bytes)
1,137,047 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,995 >>> mbox cmd response data (8 bytes)
2,105,996 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,416 >>> mbox cmd response data (8 bytes)
2,106,417 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,922 >>> mbox cmd response data (24 bytes)
2,106,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,371 >>> mbox cmd response data (12 bytes)
2,110,372 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,624 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,444 UART: [kat] SHA2-256
902,384 UART: [kat] SHA2-384
905,057 UART: [kat] SHA2-512-ACC
906,958 UART: [kat] ECC-384
916,787 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,243,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,586 UART: [fwproc] Recv command 0x46505652
1,284,413 UART: [rt] FIPS Version
1,284,974 >>> mbox cmd response data (36 bytes)
1,284,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,148 UART: [fwproc] Recv command 0x46504c54
1,286,002 UART: [kat] SHA2-256
2,089,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,093,681 UART: [kat] ++
2,093,833 UART: [kat] sha1
2,098,025 UART: [kat] SHA2-256
2,099,965 UART: [kat] SHA2-384
2,102,566 UART: [kat] SHA2-512-ACC
2,104,466 UART: [kat] ECC-384
2,114,155 UART: [kat] HMAC-384Kdf
2,118,633 UART: [kat] LMS
2,366,945 UART: [kat] --
2,367,186 >>> mbox cmd response data (8 bytes)
2,367,187 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,347 UART: [fwproc] Recv command 0x46504c67
2,368,251 >>> mbox cmd response data (8 bytes)
2,368,252 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,538 UART: [fwproc] Recv command 0x43415053
2,369,533 >>> mbox cmd response data (24 bytes)
2,369,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,669 UART: [fwproc] Recv command 0x4d454153
2,373,696 >>> mbox cmd response data (12 bytes)
2,373,697 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,798 UART: [fwproc] Recv command 0x46505344
2,374,701 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,537 >>> mbox cmd response data (36 bytes)
1,137,538 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,106,478 >>> mbox cmd response data (8 bytes)
2,106,479 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,979 >>> mbox cmd response data (8 bytes)
2,106,980 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,107,523 >>> mbox cmd response data (24 bytes)
2,107,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,976 >>> mbox cmd response data (12 bytes)
2,110,977 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,111,325 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,846 UART: [kat] HMAC-384Kdf
907,582 UART: [kat] LMS
1,475,778 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,880 UART: [idev] ++
1,480,048 UART: [idev] CDI.KEYID = 6
1,480,408 UART: [idev] SUBJECT.KEYID = 7
1,480,832 UART: [idev] UDS.KEYID = 0
1,481,177 ready_for_fw is high
1,481,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,980 UART: [idev] Erasing UDS.KEYID = 0
1,505,562 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,082 UART: [idev] --
1,514,985 UART: [ldev] ++
1,515,153 UART: [ldev] CDI.KEYID = 6
1,515,516 UART: [ldev] SUBJECT.KEYID = 5
1,515,942 UART: [ldev] AUTHORITY.KEYID = 7
1,516,405 UART: [ldev] FE.KEYID = 1
1,521,653 UART: [ldev] Erasing FE.KEYID = 1
1,546,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,620 UART: [ldev] --
1,585,963 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 114332 bytes
2,885,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,602 >>> mbox cmd response: success
3,078,602 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,640 UART: [afmc] ++
3,079,808 UART: [afmc] CDI.KEYID = 6
3,080,170 UART: [afmc] SUBJECT.KEYID = 7
3,080,595 UART: [afmc] AUTHORITY.KEYID = 5
3,115,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,222 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,615 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,305 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,016 UART: [afmc] --
3,157,986 UART: [cold-reset] --
3,158,854 UART: [state] Locking Datavault
3,160,029 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,633 UART: [state] Locking ICCM
3,161,289 UART: [exit] Launching FMC @ 0x40000130
3,166,618 UART:
3,166,634 UART: Running Caliptra FMC ...
3,167,042 UART:
3,167,096 UART: [state] CFI Enabled
3,177,489 UART: [fht] FMC Alias Private Key: 7
3,285,372 UART: [art] Extend RT PCRs Done
3,285,800 UART: [art] Lock RT PCRs Done
3,287,078 UART: [art] Populate DV Done
3,295,081 UART: [fht] FMC Alias Private Key: 7
3,296,075 UART: [art] Derive CDI
3,296,355 UART: [art] Store in in slot 0x4
3,381,948 UART: [art] Derive Key Pair
3,382,308 UART: [art] Store priv key in slot 0x5
3,395,846 UART: [art] Derive Key Pair - Done
3,410,232 UART: [art] Signing Cert with AUTHO
3,410,712 UART: RITY.KEYID = 7
3,426,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,969 UART: [art] PUB.X = 3B0FAD43E8981BA8A774A7E308AD5B79E18A7F80BD1BCE1460246711487F26282FE9E2377F3D4CA0D58CB16BDCDB38BC
3,433,749 UART: [art] PUB.Y = B27380BDE3BF6D68682AE9ED584957E7434FE8BEB6B24834C08F2BADC04A6F894C4F818BAA4CD87739CBB538B26A4976
3,440,713 UART: [art] SIG.R = 9C18CF9B4BF3A1BCEEAE661A369DFCABFDADAE4F3D8169DFB0C1C4847853290F1E1F15592D2E81A2AAC2A5319EE0D0E7
3,447,510 UART: [art] SIG.S = 62C286B3CC86BFF2CDB661F5C5F3CA40245A2F2B176F1DA4E6D37826E80E2DB7746CF1A510F1C7A13E274DDB0232EBC0
3,471,095 UART: Caliptra RT
3,471,348 UART: [state] CFI Enabled
3,578,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,451 UART: [rt]cmd =0x46505652, len=4
3,610,111 UART: [rt] FIPS Version
3,610,982 >>> mbox cmd response data (36 bytes)
3,610,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,294 UART: [rt]cmd =0x46504c54, len=4
3,641,440 >>> mbox cmd response data (8 bytes)
3,641,441 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,671,130 UART: [rt]cmd =0x46504c67, len=4
3,672,090 >>> mbox cmd response: failed
3,672,426 UART: [rt] FIPS self test
3,672,757 UART: [kat] ++
3,672,909 UART: [kat] sha1
3,677,034 UART: [kat] SHA2-256
3,678,964 UART: [kat] SHA2-384
3,681,723 UART: [kat] SHA2-512-ACC
3,683,618 UART: [kat] ECC-384
3,693,653 UART: [kat] HMAC-384Kdf
3,698,104 UART: [kat] LMS
3,946,995 UART: [kat] --
6,166,055 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,840 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,201,166 UART: [rt]cmd =0x46504c67, len=4
6,202,403 >>> mbox cmd response data (8 bytes)
6,202,404 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,231,863 UART: [rt]cmd =0x49444543, len=4
6,238,257 >>> mbox cmd response data (37 bytes)
6,238,258 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,267,519 UART: [rt]cmd =0x49444549, len=4
6,269,880 >>> mbox cmd response data (104 bytes)
6,269,881 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,299,340 UART: [rt]cmd =0x49444550, len=4
6,309,507 >>> mbox cmd response data (8 bytes)
6,309,508 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,041 UART: [rt]cmd =0x4c444556, len=4
6,349,430 >>> mbox cmd response data (687 bytes)
6,349,431 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,732 UART: [rt]cmd =0x43455246, len=4
6,391,243 >>> mbox cmd response data (920 bytes)
6,391,244 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,420,739 UART: [rt]cmd =0x43455252, len=4
6,431,317 >>> mbox cmd response data (783 bytes)
6,431,318 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,461,693 UART: [rt]cmd =0x53494756, len=196
6,467,205 >>> mbox cmd response data (8 bytes)
6,467,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,497 UART: [rt]cmd =0x4d454153, len=108
6,517,708 >>> mbox cmd response data (12 bytes)
6,517,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,547,038 UART: [rt]cmd =0x494e464f, len=4
6,550,967 >>> mbox cmd response data (312 bytes)
6,550,968 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,645 UART: [rt]cmd =0x54514754, len=24
6,582,999 >>> mbox cmd response data (8 bytes)
6,583,000 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,379 UART: [rt]cmd =0x47544744, len=8
6,614,877 >>> mbox cmd response data (104 bytes)
6,614,878 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,435 UART: [rt]cmd =0x50435252, len=8
6,646,145 >>> mbox cmd response data (8 bytes)
6,646,146 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,675,611 UART: [rt]cmd =0x50435251, len=36
6,843,208 >>> mbox cmd response data (1848 bytes)
6,843,209 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,872,968 UART: [rt]cmd =0x50435245, len=56
6,876,652 >>> mbox cmd response data (8 bytes)
6,876,653 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,028 UART: [rt]cmd =0x44504543, len=20
6,926,805 >>> mbox cmd response data (44 bytes)
6,926,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,956,421 UART: [rt]cmd =0x44504543, len=24
6,982,615 >>> mbox cmd response data (40 bytes)
6,982,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,012,563 UART: [rt]cmd =0x44504543, len=96
7,048,621 >>> mbox cmd response data (56 bytes)
7,048,622 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,671 UART: [rt]cmd =0x44504543, len=92
7,305,920 >>> mbox cmd response data (6284 bytes)
7,305,921 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,336,384 UART: [rt]cmd =0x44504543, len=136
7,403,233 >>> mbox cmd response data (136 bytes)
7,403,234 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,432,683 UART: [rt]cmd =0x44504543, len=40
7,458,848 >>> mbox cmd response data (40 bytes)
7,458,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,488,224 UART: [rt]cmd =0x44504543, len=28
7,531,349 >>> mbox cmd response data (2076 bytes)
7,531,350 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,560,801 UART: [rt]cmd =0x44504543, len=36
7,590,766 >>> mbox cmd response data (24 bytes)
7,590,767 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,620,126 UART: [rt]cmd =0x4453424c, len=4
7,634,041 >>> mbox cmd response data (8 bytes)
7,634,042 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,663,371 UART: [rt]cmd =0x46505344, len=4
7,771,827 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 ready_for_fw is high
1,362,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,582 >>> mbox cmd response: success
2,927,582 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,692 UART:
2,989,708 UART: Running Caliptra FMC ...
2,990,116 UART:
2,990,170 UART: [state] CFI Enabled
3,000,747 UART: [fht] FMC Alias Private Key: 7
3,109,180 UART: [art] Extend RT PCRs Done
3,109,608 UART: [art] Lock RT PCRs Done
3,111,144 UART: [art] Populate DV Done
3,119,401 UART: [fht] FMC Alias Private Key: 7
3,120,465 UART: [art] Derive CDI
3,120,745 UART: [art] Store in in slot 0x4
3,206,008 UART: [art] Derive Key Pair
3,206,368 UART: [art] Store priv key in slot 0x5
3,219,276 UART: [art] Derive Key Pair - Done
3,234,056 UART: [art] Signing Cert with AUTHO
3,234,536 UART: RITY.KEYID = 7
3,249,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,523 UART: [art] PUB.X = 1340A39411444A8D6431518C6514595425C344638BD8EB19A6F04B152F3F68F32444AB6167F7BF7D6F4720CAB59289E4
3,257,283 UART: [art] PUB.Y = 5F43EFEA485ED737B45022467170800A02ED2B75F36BB99BDFFEA5AC0F3ED04C1840B3ABC0DD6AE07EC1AD5148033D65
3,264,239 UART: [art] SIG.R = 6F31C78842297012BEBD62B2978CAD1D3E6C5E85FA25C4CEBCB784C98E0A3ABEA7C36B168496D53EB1C3ACE605C222F3
3,271,021 UART: [art] SIG.S = 274CC2FD86DEB95B02FF792443A7E4006973D9911553D39705EBC21113AE1FA4AD5D6F41960579FD54F8A8C6DDED3BFB
3,295,349 UART: Caliptra RT
3,295,602 UART: [state] CFI Enabled
3,403,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,378 UART: [rt]cmd =0x46505652, len=4
3,435,038 UART: [rt] FIPS Version
3,436,063 >>> mbox cmd response data (36 bytes)
3,436,064 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,317 UART: [rt]cmd =0x46504c54, len=4
3,466,591 >>> mbox cmd response data (8 bytes)
3,466,592 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,496,103 UART: [rt]cmd =0x46504c67, len=4
3,497,003 >>> mbox cmd response: failed
3,497,305 UART: [rt] FIPS self test
3,497,636 UART: [kat] ++
3,497,788 UART: [kat] sha1
3,501,837 UART: [kat] SHA2-256
3,503,767 UART: [kat] SHA2-384
3,506,546 UART: [kat] SHA2-512-ACC
3,508,441 UART: [kat] ECC-384
3,518,136 UART: [kat] HMAC-384Kdf
3,522,895 UART: [kat] LMS
3,771,786 UART: [kat] --
5,884,176 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,764 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,114 UART: [rt]cmd =0x46504c67, len=4
5,917,219 >>> mbox cmd response data (8 bytes)
5,917,220 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,946,735 UART: [rt]cmd =0x49444543, len=4
5,953,099 >>> mbox cmd response data (37 bytes)
5,953,100 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,982,325 UART: [rt]cmd =0x49444549, len=4
5,984,476 >>> mbox cmd response data (104 bytes)
5,984,477 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,902 UART: [rt]cmd =0x49444550, len=4
6,023,990 >>> mbox cmd response data (8 bytes)
6,023,991 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,053,640 UART: [rt]cmd =0x4c444556, len=4
6,064,029 >>> mbox cmd response data (687 bytes)
6,064,030 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,445 UART: [rt]cmd =0x43455246, len=4
6,105,684 >>> mbox cmd response data (920 bytes)
6,105,685 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,135,120 UART: [rt]cmd =0x43455252, len=4
6,146,064 >>> mbox cmd response data (782 bytes)
6,146,065 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,626 UART: [rt]cmd =0x53494756, len=196
6,181,734 >>> mbox cmd response data (8 bytes)
6,181,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,211,730 UART: [rt]cmd =0x4d454153, len=108
6,231,821 >>> mbox cmd response data (12 bytes)
6,231,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,261,091 UART: [rt]cmd =0x494e464f, len=4
6,264,796 >>> mbox cmd response data (312 bytes)
6,264,797 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,294,326 UART: [rt]cmd =0x54514754, len=24
6,296,558 >>> mbox cmd response data (8 bytes)
6,296,559 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,944 UART: [rt]cmd =0x47544744, len=8
6,328,482 >>> mbox cmd response data (104 bytes)
6,328,483 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,357,806 UART: [rt]cmd =0x50435252, len=8
6,359,260 >>> mbox cmd response data (8 bytes)
6,359,261 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,388,670 UART: [rt]cmd =0x50435251, len=36
6,556,065 >>> mbox cmd response data (1848 bytes)
6,556,066 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,585,725 UART: [rt]cmd =0x50435245, len=56
6,589,393 >>> mbox cmd response data (8 bytes)
6,589,394 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,618,913 UART: [rt]cmd =0x44504543, len=20
6,639,634 >>> mbox cmd response data (44 bytes)
6,639,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,669,000 UART: [rt]cmd =0x44504543, len=24
6,695,262 >>> mbox cmd response data (40 bytes)
6,695,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,725,164 UART: [rt]cmd =0x44504543, len=96
6,761,894 >>> mbox cmd response data (56 bytes)
6,761,895 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,791,916 UART: [rt]cmd =0x44504543, len=92
7,019,039 >>> mbox cmd response data (6284 bytes)
7,019,040 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,049,301 UART: [rt]cmd =0x44504543, len=136
7,116,462 >>> mbox cmd response data (136 bytes)
7,116,463 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,146,038 UART: [rt]cmd =0x44504543, len=40
7,172,429 >>> mbox cmd response data (40 bytes)
7,172,430 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,201,817 UART: [rt]cmd =0x44504543, len=28
7,245,094 >>> mbox cmd response data (2076 bytes)
7,245,095 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,274,558 UART: [rt]cmd =0x44504543, len=36
7,304,391 >>> mbox cmd response data (24 bytes)
7,304,392 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,333,937 UART: [rt]cmd =0x4453424c, len=4
7,347,974 >>> mbox cmd response data (8 bytes)
7,347,975 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,377,246 UART: [rt]cmd =0x46505344, len=4
7,485,610 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,803 UART: [kat] LMS
1,475,999 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,176 UART: [fht] Storing FHT @ 0x50003400
1,479,975 UART: [idev] ++
1,480,143 UART: [idev] CDI.KEYID = 6
1,480,503 UART: [idev] SUBJECT.KEYID = 7
1,480,927 UART: [idev] UDS.KEYID = 0
1,481,272 ready_for_fw is high
1,481,272 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,957 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,428 UART: [ldev] Erasing FE.KEYID = 1
1,546,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,219 UART: [ldev] --
1,585,488 UART: [fwproc] Waiting for Commands...
1,586,277 UART: [fwproc] Received command 0x46574c44
1,587,068 UART: [fwproc] Received Image of size 114332 bytes
2,884,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,577 >>> mbox cmd response: success
3,077,577 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,621 UART: [afmc] ++
3,078,789 UART: [afmc] CDI.KEYID = 6
3,079,151 UART: [afmc] SUBJECT.KEYID = 7
3,079,576 UART: [afmc] AUTHORITY.KEYID = 5
3,114,689 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,462 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,152 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,225 UART: [afmc] --
3,158,127 UART: [cold-reset] --
3,158,951 UART: [state] Locking Datavault
3,160,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,632 UART: [state] Locking ICCM
3,161,266 UART: [exit] Launching FMC @ 0x40000130
3,166,595 UART:
3,166,611 UART: Running Caliptra FMC ...
3,167,019 UART:
3,167,162 UART: [state] CFI Enabled
3,177,793 UART: [fht] FMC Alias Private Key: 7
3,285,338 UART: [art] Extend RT PCRs Done
3,285,766 UART: [art] Lock RT PCRs Done
3,287,602 UART: [art] Populate DV Done
3,295,803 UART: [fht] FMC Alias Private Key: 7
3,296,847 UART: [art] Derive CDI
3,297,127 UART: [art] Store in in slot 0x4
3,382,814 UART: [art] Derive Key Pair
3,383,174 UART: [art] Store priv key in slot 0x5
3,395,976 UART: [art] Derive Key Pair - Done
3,410,899 UART: [art] Signing Cert with AUTHO
3,411,379 UART: RITY.KEYID = 7
3,426,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,082 UART: [art] PUB.X = DD4B808A8AEA377E7CE7757C91FFB3C13B152199FF065F127E5E6A334B8FE4DF9AD89B0F09A88ACEB70781D70E8C35C9
3,433,855 UART: [art] PUB.Y = 05111D967C1F277EFB8A378C1FCB55CD331C392ED4C2757897372D3EEF737BF1C43A3BBAD09AAA153DB299F01F2C61C6
3,440,816 UART: [art] SIG.R = 4A6F9C15812CD60E618E02E0262A8331CCBC273FEB996F326062FB45128E25CDF6947F312125E459E7B780F1542A9B0C
3,447,577 UART: [art] SIG.S = 7B539D9DECD1F8E35DF268129961F9A8F2FFDF7FB35184960137849A520EED26D05460C184AA8C1FB6CD06CE43B291CB
3,472,083 UART: Caliptra RT
3,472,428 UART: [state] CFI Enabled
3,580,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,538 UART: [rt]cmd =0x46505652, len=4
3,611,198 UART: [rt] FIPS Version
3,612,117 >>> mbox cmd response data (36 bytes)
3,612,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,363 UART: [rt]cmd =0x46504c54, len=4
3,642,495 >>> mbox cmd response data (8 bytes)
3,642,496 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,671,941 UART: [rt]cmd =0x46504c67, len=4
3,672,793 >>> mbox cmd response: failed
3,673,023 UART: [rt] FIPS self test
3,673,354 UART: [kat] ++
3,673,506 UART: [kat] sha1
3,677,605 UART: [kat] SHA2-256
3,679,535 UART: [kat] SHA2-384
3,682,182 UART: [kat] SHA2-512-ACC
3,684,077 UART: [kat] ECC-384
3,693,732 UART: [kat] HMAC-384Kdf
3,698,383 UART: [kat] LMS
3,947,274 UART: [kat] --
6,166,404 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,543 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,201,981 UART: [rt]cmd =0x46504c67, len=4
6,203,196 >>> mbox cmd response data (8 bytes)
6,203,197 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,232,556 UART: [rt]cmd =0x49444543, len=4
6,239,038 >>> mbox cmd response data (37 bytes)
6,239,039 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,384 UART: [rt]cmd =0x49444549, len=4
6,270,707 >>> mbox cmd response data (104 bytes)
6,270,708 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,163 UART: [rt]cmd =0x49444550, len=4
6,310,151 >>> mbox cmd response data (8 bytes)
6,310,152 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,327 UART: [rt]cmd =0x4c444556, len=4
6,349,974 >>> mbox cmd response data (687 bytes)
6,349,975 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,224 UART: [rt]cmd =0x43455246, len=4
6,391,623 >>> mbox cmd response data (920 bytes)
6,391,624 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,420,785 UART: [rt]cmd =0x43455252, len=4
6,431,471 >>> mbox cmd response data (782 bytes)
6,431,472 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,461,927 UART: [rt]cmd =0x53494756, len=196
6,467,437 >>> mbox cmd response data (8 bytes)
6,467,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,519 UART: [rt]cmd =0x4d454153, len=108
6,518,230 >>> mbox cmd response data (12 bytes)
6,518,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,547,850 UART: [rt]cmd =0x494e464f, len=4
6,551,709 >>> mbox cmd response data (312 bytes)
6,551,710 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,949 UART: [rt]cmd =0x54514754, len=24
6,583,099 >>> mbox cmd response data (8 bytes)
6,583,100 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,483 UART: [rt]cmd =0x47544744, len=8
6,614,819 >>> mbox cmd response data (104 bytes)
6,614,820 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,153 UART: [rt]cmd =0x50435252, len=8
6,645,569 >>> mbox cmd response data (8 bytes)
6,645,570 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,675,383 UART: [rt]cmd =0x50435251, len=36
6,843,082 >>> mbox cmd response data (1848 bytes)
6,843,083 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,872,848 UART: [rt]cmd =0x50435245, len=56
6,876,226 >>> mbox cmd response data (8 bytes)
6,876,227 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,742 UART: [rt]cmd =0x44504543, len=20
6,926,437 >>> mbox cmd response data (44 bytes)
6,926,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,955,903 UART: [rt]cmd =0x44504543, len=24
6,982,023 >>> mbox cmd response data (40 bytes)
6,982,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,011,961 UART: [rt]cmd =0x44504543, len=96
7,049,103 >>> mbox cmd response data (56 bytes)
7,049,104 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,921 UART: [rt]cmd =0x44504543, len=92
7,307,541 >>> mbox cmd response data (6284 bytes)
7,307,542 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,337,571 UART: [rt]cmd =0x44504543, len=136
7,404,162 >>> mbox cmd response data (136 bytes)
7,404,163 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,433,840 UART: [rt]cmd =0x44504543, len=40
7,460,105 >>> mbox cmd response data (40 bytes)
7,460,106 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,489,513 UART: [rt]cmd =0x44504543, len=28
7,532,894 >>> mbox cmd response data (2076 bytes)
7,532,895 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,562,638 UART: [rt]cmd =0x44504543, len=36
7,592,709 >>> mbox cmd response data (24 bytes)
7,592,710 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,622,121 UART: [rt]cmd =0x4453424c, len=4
7,636,440 >>> mbox cmd response data (8 bytes)
7,636,441 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,665,924 UART: [rt]cmd =0x46505344, len=4
7,774,118 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,711 >>> mbox cmd response: success
2,927,711 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,249 UART:
2,989,265 UART: Running Caliptra FMC ...
2,989,673 UART:
2,989,816 UART: [state] CFI Enabled
3,000,373 UART: [fht] FMC Alias Private Key: 7
3,107,736 UART: [art] Extend RT PCRs Done
3,108,164 UART: [art] Lock RT PCRs Done
3,109,818 UART: [art] Populate DV Done
3,118,285 UART: [fht] FMC Alias Private Key: 7
3,119,405 UART: [art] Derive CDI
3,119,685 UART: [art] Store in in slot 0x4
3,205,446 UART: [art] Derive Key Pair
3,205,806 UART: [art] Store priv key in slot 0x5
3,219,104 UART: [art] Derive Key Pair - Done
3,234,143 UART: [art] Signing Cert with AUTHO
3,234,623 UART: RITY.KEYID = 7
3,249,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,380 UART: [art] PUB.X = 9D9C4412F497B309B9DFB4E452244B5C461F761C378DA3D22062EAB7937FF918222F2BEF113F7CD6E6B5D23D34920F30
3,257,148 UART: [art] PUB.Y = 0ED0D3186245F330ECF19C2F64318E31C3E303218C1B2A8CAD3A09BB7959EEA510E39B343550BE1AC224A613AD97356F
3,264,095 UART: [art] SIG.R = 4C38F6CA33375EA84CA69560CBC95821D1D7ED2D992F60F05ABA1DE471C9A6BE66CC95A1066521C5B80B272C35085699
3,270,862 UART: [art] SIG.S = 88B3B6D211DFEF9E22A522AF1F7F150AE050EA69DFD7E395F518BB9E5B97D1EF2877C2591BEE48C09FECD998AD5FAD09
3,294,149 UART: Caliptra RT
3,294,494 UART: [state] CFI Enabled
3,402,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,225 UART: [rt]cmd =0x46505652, len=4
3,433,885 UART: [rt] FIPS Version
3,434,892 >>> mbox cmd response data (36 bytes)
3,434,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,308 UART: [rt]cmd =0x46504c54, len=4
3,465,580 >>> mbox cmd response data (8 bytes)
3,465,581 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,495,262 UART: [rt]cmd =0x46504c67, len=4
3,496,154 >>> mbox cmd response: failed
3,496,278 UART: [rt] FIPS self test
3,496,609 UART: [kat] ++
3,496,761 UART: [kat] sha1
3,500,788 UART: [kat] SHA2-256
3,502,718 UART: [kat] SHA2-384
3,505,465 UART: [kat] SHA2-512-ACC
3,507,360 UART: [kat] ECC-384
3,517,295 UART: [kat] HMAC-384Kdf
3,521,864 UART: [kat] LMS
3,770,755 UART: [kat] --
5,881,635 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,885,915 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,211 UART: [rt]cmd =0x46504c67, len=4
5,916,476 >>> mbox cmd response data (8 bytes)
5,916,477 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,945,950 UART: [rt]cmd =0x49444543, len=4
5,952,402 >>> mbox cmd response data (37 bytes)
5,952,403 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,898 UART: [rt]cmd =0x49444549, len=4
5,984,237 >>> mbox cmd response data (104 bytes)
5,984,238 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,705 UART: [rt]cmd =0x49444550, len=4
6,023,856 >>> mbox cmd response data (8 bytes)
6,023,857 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,053,252 UART: [rt]cmd =0x4c444556, len=4
6,063,669 >>> mbox cmd response data (687 bytes)
6,063,670 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,021 UART: [rt]cmd =0x43455246, len=4
6,105,198 >>> mbox cmd response data (920 bytes)
6,105,199 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,134,624 UART: [rt]cmd =0x43455252, len=4
6,145,552 >>> mbox cmd response data (783 bytes)
6,145,553 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,114 UART: [rt]cmd =0x53494756, len=196
6,181,256 >>> mbox cmd response data (8 bytes)
6,181,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,211,242 UART: [rt]cmd =0x4d454153, len=108
6,231,987 >>> mbox cmd response data (12 bytes)
6,231,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,261,193 UART: [rt]cmd =0x494e464f, len=4
6,264,898 >>> mbox cmd response data (312 bytes)
6,264,899 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,294,488 UART: [rt]cmd =0x54514754, len=24
6,296,440 >>> mbox cmd response data (8 bytes)
6,296,441 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,904 UART: [rt]cmd =0x47544744, len=8
6,328,698 >>> mbox cmd response data (104 bytes)
6,328,699 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,357,920 UART: [rt]cmd =0x50435252, len=8
6,359,728 >>> mbox cmd response data (8 bytes)
6,359,729 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,389,218 UART: [rt]cmd =0x50435251, len=36
6,557,037 >>> mbox cmd response data (1848 bytes)
6,557,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,586,691 UART: [rt]cmd =0x50435245, len=56
6,590,199 >>> mbox cmd response data (8 bytes)
6,590,200 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,619,627 UART: [rt]cmd =0x44504543, len=20
6,640,396 >>> mbox cmd response data (44 bytes)
6,640,397 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,670,066 UART: [rt]cmd =0x44504543, len=24
6,695,906 >>> mbox cmd response data (40 bytes)
6,695,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,725,868 UART: [rt]cmd =0x44504543, len=96
6,762,458 >>> mbox cmd response data (56 bytes)
6,762,459 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,792,282 UART: [rt]cmd =0x44504543, len=92
7,020,630 >>> mbox cmd response data (6284 bytes)
7,020,631 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,050,804 UART: [rt]cmd =0x44504543, len=136
7,118,275 >>> mbox cmd response data (136 bytes)
7,118,276 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,147,989 UART: [rt]cmd =0x44504543, len=40
7,174,036 >>> mbox cmd response data (40 bytes)
7,174,037 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,203,424 UART: [rt]cmd =0x44504543, len=28
7,246,345 >>> mbox cmd response data (2076 bytes)
7,246,346 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,276,181 UART: [rt]cmd =0x44504543, len=36
7,306,222 >>> mbox cmd response data (24 bytes)
7,306,223 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,335,376 UART: [rt]cmd =0x4453424c, len=4
7,348,805 >>> mbox cmd response data (8 bytes)
7,348,806 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,378,217 UART: [rt]cmd =0x46505344, len=4
7,486,481 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,803 UART: [cold-reset] ++
1,172,263 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 ready_for_fw is high
1,176,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,511 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,574 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,707 >>> mbox cmd response: success
2,773,707 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,765 UART: [afmc] ++
2,774,933 UART: [afmc] CDI.KEYID = 6
2,775,295 UART: [afmc] SUBJECT.KEYID = 7
2,775,720 UART: [afmc] AUTHORITY.KEYID = 5
2,811,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,087 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,596 UART: [afmc] --
2,854,576 UART: [cold-reset] --
2,855,512 UART: [state] Locking Datavault
2,856,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,123 UART: [state] Locking ICCM
2,857,577 UART: [exit] Launching FMC @ 0x40000130
2,862,906 UART:
2,862,922 UART: Running Caliptra FMC ...
2,863,330 UART:
2,863,384 UART: [state] CFI Enabled
2,873,895 UART: [fht] FMC Alias Private Key: 7
2,981,836 UART: [art] Extend RT PCRs Done
2,982,264 UART: [art] Lock RT PCRs Done
2,983,546 UART: [art] Populate DV Done
2,991,911 UART: [fht] FMC Alias Private Key: 7
2,992,941 UART: [art] Derive CDI
2,993,221 UART: [art] Store in in slot 0x4
3,078,818 UART: [art] Derive Key Pair
3,079,178 UART: [art] Store priv key in slot 0x5
3,092,346 UART: [art] Derive Key Pair - Done
3,106,708 UART: [art] Signing Cert with AUTHO
3,107,188 UART: RITY.KEYID = 7
3,122,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,111 UART: [art] PUB.X = E4114E857B532ED421C291F3D6120574CEA3824EEFEC8FB5AA82FD06CF593855BCCC75B3E8890AC05B2242AA195355EC
3,129,884 UART: [art] PUB.Y = C4C1D1F121BAD45C53BE8B4A161F93C995EA4FF25CCA1A2234F7022F498C50D424E7D2B3BD8BCB425CE4361E3982F4F6
3,136,847 UART: [art] SIG.R = E316B528F1B86C2ECEFCAC8D1B203B24FC83E7432C0466403C5EC76D59CF33653C1FF92514A5F8B5FF5163D964106E8D
3,143,624 UART: [art] SIG.S = DA85D6A833355D3F8ED3EC62BF4568A650B8A933CAC372DEA3182971E7653D880CF71C4D24C0AF3C46BA068D22A195EB
3,167,205 UART: Caliptra RT
3,167,458 UART: [state] CFI Enabled
3,275,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,432 UART: [rt]cmd =0x46505652, len=4
3,307,092 UART: [rt] FIPS Version
3,308,115 >>> mbox cmd response data (36 bytes)
3,308,116 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,527 UART: [rt]cmd =0x46504c54, len=4
3,338,513 >>> mbox cmd response data (8 bytes)
3,338,514 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,921 UART: [rt]cmd =0x46504c67, len=4
3,368,913 >>> mbox cmd response: failed
3,369,211 UART: [rt] FIPS self test
3,369,542 UART: [kat] ++
3,369,694 UART: [kat] sha1
3,373,991 UART: [kat] SHA2-256
3,375,921 UART: [kat] SHA2-384
3,378,682 UART: [kat] SHA2-512-ACC
3,380,577 UART: [kat] ECC-384
3,390,436 UART: [kat] HMAC-384Kdf
3,394,941 UART: [kat] LMS
3,643,832 UART: [kat] --
5,871,420 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,662 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,130 UART: [rt]cmd =0x46504c67, len=4
5,909,391 >>> mbox cmd response data (8 bytes)
5,909,392 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,827 UART: [rt]cmd =0x49444543, len=4
5,945,157 >>> mbox cmd response data (37 bytes)
5,945,158 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,515 UART: [rt]cmd =0x49444549, len=4
5,976,924 >>> mbox cmd response data (104 bytes)
5,976,925 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,144 UART: [rt]cmd =0x49444550, len=4
6,016,119 >>> mbox cmd response data (8 bytes)
6,016,120 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,745 UART: [rt]cmd =0x4c444556, len=4
6,056,216 >>> mbox cmd response data (687 bytes)
6,056,217 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,085,456 UART: [rt]cmd =0x43455246, len=4
6,097,463 >>> mbox cmd response data (887 bytes)
6,097,464 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,763 UART: [rt]cmd =0x43455252, len=4
6,137,618 >>> mbox cmd response data (784 bytes)
6,137,619 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,220 UART: [rt]cmd =0x53494756, len=196
6,173,678 >>> mbox cmd response data (8 bytes)
6,173,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,762 UART: [rt]cmd =0x4d454153, len=108
6,225,125 >>> mbox cmd response data (12 bytes)
6,225,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,329 UART: [rt]cmd =0x494e464f, len=4
6,257,984 >>> mbox cmd response data (312 bytes)
6,257,985 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,358 UART: [rt]cmd =0x54514754, len=24
6,289,196 >>> mbox cmd response data (8 bytes)
6,289,197 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,318,366 UART: [rt]cmd =0x47544744, len=8
6,320,760 >>> mbox cmd response data (104 bytes)
6,320,761 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,940 UART: [rt]cmd =0x50435252, len=8
6,351,272 >>> mbox cmd response data (8 bytes)
6,351,273 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,994 UART: [rt]cmd =0x50435251, len=36
6,548,265 >>> mbox cmd response data (1848 bytes)
6,548,266 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,117 UART: [rt]cmd =0x50435245, len=56
6,581,685 >>> mbox cmd response data (8 bytes)
6,581,686 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,127 UART: [rt]cmd =0x44504543, len=20
6,631,650 >>> mbox cmd response data (44 bytes)
6,631,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,661,064 UART: [rt]cmd =0x44504543, len=24
6,687,210 >>> mbox cmd response data (40 bytes)
6,687,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,717,172 UART: [rt]cmd =0x44504543, len=96
6,754,152 >>> mbox cmd response data (56 bytes)
6,754,153 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,784,014 UART: [rt]cmd =0x44504543, len=92
7,011,981 >>> mbox cmd response data (6284 bytes)
7,011,982 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,401 UART: [rt]cmd =0x44504543, len=136
7,109,030 >>> mbox cmd response data (136 bytes)
7,109,031 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,574 UART: [rt]cmd =0x44504543, len=40
7,164,603 >>> mbox cmd response data (40 bytes)
7,164,604 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,005 UART: [rt]cmd =0x44504543, len=28
7,237,178 >>> mbox cmd response data (2076 bytes)
7,237,179 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,266,768 UART: [rt]cmd =0x44504543, len=36
7,297,241 >>> mbox cmd response data (24 bytes)
7,297,242 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,326,753 UART: [rt]cmd =0x4453424c, len=4
7,340,360 >>> mbox cmd response data (8 bytes)
7,340,361 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,369,786 UART: [rt]cmd =0x46505344, len=4
7,477,976 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 ready_for_fw is high
1,060,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,628 >>> mbox cmd response: success
2,625,628 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,454 UART:
2,687,470 UART: Running Caliptra FMC ...
2,687,878 UART:
2,687,932 UART: [state] CFI Enabled
2,698,701 UART: [fht] FMC Alias Private Key: 7
2,806,220 UART: [art] Extend RT PCRs Done
2,806,648 UART: [art] Lock RT PCRs Done
2,808,348 UART: [art] Populate DV Done
2,816,601 UART: [fht] FMC Alias Private Key: 7
2,817,691 UART: [art] Derive CDI
2,817,971 UART: [art] Store in in slot 0x4
2,903,264 UART: [art] Derive Key Pair
2,903,624 UART: [art] Store priv key in slot 0x5
2,916,316 UART: [art] Derive Key Pair - Done
2,930,824 UART: [art] Signing Cert with AUTHO
2,931,304 UART: RITY.KEYID = 7
2,946,738 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,503 UART: [art] PUB.X = 47A454F09AA157E47BD639DF10035354C853A8172739C20706F7AB5F6B8FDB6F0E7EFFA6C740BF93BF80D8B4239DB2FC
2,954,273 UART: [art] PUB.Y = DB72D328B9B8FE23FAD5F5389C915229939BE4304EA3DC96E1DFB62B2FF762763485E02A16235A34ED80C08D56951137
2,961,225 UART: [art] SIG.R = 806B1D97F28CCE0E96C3D599D75847A3B90E998C894F1B241530077FDCEFF88A1ECA3176A97C04CBA8D94A2040BC7F31
2,967,993 UART: [art] SIG.S = 2C83E031B3AABCE9D8EDEB7028CC82DF72BF85A635C524DADA7290DB68496C98DAF3191D471357D7D8D9AEC423851910
2,992,060 UART: Caliptra RT
2,992,313 UART: [state] CFI Enabled
3,099,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,160 UART: [rt]cmd =0x46505652, len=4
3,130,820 UART: [rt] FIPS Version
3,131,733 >>> mbox cmd response data (36 bytes)
3,131,734 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,007 UART: [rt]cmd =0x46504c54, len=4
3,162,299 >>> mbox cmd response data (8 bytes)
3,162,300 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,191,861 UART: [rt]cmd =0x46504c67, len=4
3,192,835 >>> mbox cmd response: failed
3,193,125 UART: [rt] FIPS self test
3,193,456 UART: [kat] ++
3,193,608 UART: [kat] sha1
3,197,975 UART: [kat] SHA2-256
3,199,905 UART: [kat] SHA2-384
3,202,884 UART: [kat] SHA2-512-ACC
3,204,779 UART: [kat] ECC-384
3,214,344 UART: [kat] HMAC-384Kdf
3,218,771 UART: [kat] LMS
3,467,662 UART: [kat] --
5,589,758 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,592,595 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,621,979 UART: [rt]cmd =0x46504c67, len=4
5,623,080 >>> mbox cmd response data (8 bytes)
5,623,081 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,652,366 UART: [rt]cmd =0x49444543, len=4
5,658,900 >>> mbox cmd response data (37 bytes)
5,658,901 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,294 UART: [rt]cmd =0x49444549, len=4
5,690,645 >>> mbox cmd response data (104 bytes)
5,690,646 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,720,003 UART: [rt]cmd =0x49444550, len=4
5,730,107 >>> mbox cmd response data (8 bytes)
5,730,108 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,575 UART: [rt]cmd =0x4c444556, len=4
5,769,880 >>> mbox cmd response data (687 bytes)
5,769,881 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,182 UART: [rt]cmd =0x43455246, len=4
5,811,353 >>> mbox cmd response data (887 bytes)
5,811,354 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,615 UART: [rt]cmd =0x43455252, len=4
5,851,405 >>> mbox cmd response data (783 bytes)
5,851,406 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,937 UART: [rt]cmd =0x53494756, len=196
5,887,143 >>> mbox cmd response data (8 bytes)
5,887,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,917,137 UART: [rt]cmd =0x4d454153, len=108
5,937,896 >>> mbox cmd response data (12 bytes)
5,937,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,967,368 UART: [rt]cmd =0x494e464f, len=4
5,970,975 >>> mbox cmd response data (312 bytes)
5,970,976 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,405 UART: [rt]cmd =0x54514754, len=24
6,002,759 >>> mbox cmd response data (8 bytes)
6,002,760 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,032,235 UART: [rt]cmd =0x47544744, len=8
6,034,719 >>> mbox cmd response data (104 bytes)
6,034,720 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,064,071 UART: [rt]cmd =0x50435252, len=8
6,065,755 >>> mbox cmd response data (8 bytes)
6,065,756 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,095,089 UART: [rt]cmd =0x50435251, len=36
6,262,204 >>> mbox cmd response data (1848 bytes)
6,262,205 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,291,838 UART: [rt]cmd =0x50435245, len=56
6,295,520 >>> mbox cmd response data (8 bytes)
6,295,521 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,194 UART: [rt]cmd =0x44504543, len=20
6,346,117 >>> mbox cmd response data (44 bytes)
6,346,118 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,375,529 UART: [rt]cmd =0x44504543, len=24
6,401,523 >>> mbox cmd response data (40 bytes)
6,401,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,431,345 UART: [rt]cmd =0x44504543, len=96
6,468,447 >>> mbox cmd response data (56 bytes)
6,468,448 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,315 UART: [rt]cmd =0x44504543, len=92
6,726,310 >>> mbox cmd response data (6284 bytes)
6,726,311 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,484 UART: [rt]cmd =0x44504543, len=136
6,823,645 >>> mbox cmd response data (136 bytes)
6,823,646 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,853,393 UART: [rt]cmd =0x44504543, len=40
6,879,084 >>> mbox cmd response data (40 bytes)
6,879,085 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,892 UART: [rt]cmd =0x44504543, len=28
6,952,147 >>> mbox cmd response data (2076 bytes)
6,952,148 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,981,755 UART: [rt]cmd =0x44504543, len=36
7,011,808 >>> mbox cmd response data (24 bytes)
7,011,809 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,041,350 UART: [rt]cmd =0x4453424c, len=4
7,055,303 >>> mbox cmd response data (8 bytes)
7,055,304 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,721 UART: [rt]cmd =0x46505344, len=4
7,192,827 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,605 UART: [kat] SHA2-512-ACC
908,506 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,687 UART: [kat] LMS
1,171,015 UART: [kat] --
1,171,880 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,175,107 UART: [idev] ++
1,175,275 UART: [idev] CDI.KEYID = 6
1,175,635 UART: [idev] SUBJECT.KEYID = 7
1,176,059 UART: [idev] UDS.KEYID = 0
1,176,404 ready_for_fw is high
1,176,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,389 UART: [idev] Erasing UDS.KEYID = 0
1,201,408 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,846 UART: [ldev] ++
1,211,014 UART: [ldev] CDI.KEYID = 6
1,211,377 UART: [ldev] SUBJECT.KEYID = 5
1,211,803 UART: [ldev] AUTHORITY.KEYID = 7
1,212,266 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,243,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,556 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,501 UART: [fwproc] Recv command 0x46574c44
1,284,229 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,340 >>> mbox cmd response: success
2,774,340 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,590 UART: [afmc] ++
2,775,758 UART: [afmc] CDI.KEYID = 6
2,776,120 UART: [afmc] SUBJECT.KEYID = 7
2,776,545 UART: [afmc] AUTHORITY.KEYID = 5
2,812,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,008 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,727 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,379 UART: [afmc] --
2,855,433 UART: [cold-reset] --
2,856,353 UART: [state] Locking Datavault
2,857,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,180 UART: [state] Locking ICCM
2,858,734 UART: [exit] Launching FMC @ 0x40000130
2,864,063 UART:
2,864,079 UART: Running Caliptra FMC ...
2,864,487 UART:
2,864,630 UART: [state] CFI Enabled
2,875,563 UART: [fht] FMC Alias Private Key: 7
2,983,170 UART: [art] Extend RT PCRs Done
2,983,598 UART: [art] Lock RT PCRs Done
2,985,036 UART: [art] Populate DV Done
2,993,223 UART: [fht] FMC Alias Private Key: 7
2,994,383 UART: [art] Derive CDI
2,994,663 UART: [art] Store in in slot 0x4
3,080,040 UART: [art] Derive Key Pair
3,080,400 UART: [art] Store priv key in slot 0x5
3,093,594 UART: [art] Derive Key Pair - Done
3,108,186 UART: [art] Signing Cert with AUTHO
3,108,666 UART: RITY.KEYID = 7
3,123,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,549 UART: [art] PUB.X = A4BC1AF8808D03AE5B657F3185C6907B1338FEA8B3CC61103E1658F56603FE6A37E0896E713CF10B9BA279A3638F69F0
3,131,314 UART: [art] PUB.Y = 19AAE13175503A90BAAE4471436BFFDD830EC53E83BF3A5FC0F4A3D61091C965D02B90407ED058BA25ADA5CE4D25D105
3,138,272 UART: [art] SIG.R = 7DA629F74DE1A7481CB349C294CAD2FD625BD2DA25523D3DA8DDFF6F6F6E87A1BD13810A714E0F843372C5EE02DC73F7
3,145,051 UART: [art] SIG.S = 38048A7B1302F2BAB164B50875523A9F11F4BAA77F396CB5897ACD7B16C244A8552C6055D32E2C07838F0DD2AA991CA7
3,169,261 UART: Caliptra RT
3,169,606 UART: [state] CFI Enabled
3,277,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,779 UART: [rt]cmd =0x46505652, len=4
3,308,439 UART: [rt] FIPS Version
3,309,694 >>> mbox cmd response data (36 bytes)
3,309,695 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,016 UART: [rt]cmd =0x46504c54, len=4
3,340,080 >>> mbox cmd response data (8 bytes)
3,340,081 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,369,874 UART: [rt]cmd =0x46504c67, len=4
3,370,926 >>> mbox cmd response: failed
3,371,210 UART: [rt] FIPS self test
3,371,541 UART: [kat] ++
3,371,693 UART: [kat] sha1
3,375,728 UART: [kat] SHA2-256
3,377,658 UART: [kat] SHA2-384
3,380,471 UART: [kat] SHA2-512-ACC
3,382,366 UART: [kat] ECC-384
3,391,761 UART: [kat] HMAC-384Kdf
3,396,426 UART: [kat] LMS
3,645,317 UART: [kat] --
5,873,959 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,675 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,083 UART: [rt]cmd =0x46504c67, len=4
5,911,270 >>> mbox cmd response data (8 bytes)
5,911,271 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,806 UART: [rt]cmd =0x49444543, len=4
5,947,188 >>> mbox cmd response data (37 bytes)
5,947,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,560 UART: [rt]cmd =0x49444549, len=4
5,978,937 >>> mbox cmd response data (104 bytes)
5,978,938 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,155 UART: [rt]cmd =0x49444550, len=4
6,018,121 >>> mbox cmd response data (8 bytes)
6,018,122 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,381 UART: [rt]cmd =0x4c444556, len=4
6,057,906 >>> mbox cmd response data (687 bytes)
6,057,907 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,326 UART: [rt]cmd =0x43455246, len=4
6,099,405 >>> mbox cmd response data (887 bytes)
6,099,406 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,813 UART: [rt]cmd =0x43455252, len=4
6,139,669 >>> mbox cmd response data (782 bytes)
6,139,670 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,099 UART: [rt]cmd =0x53494756, len=196
6,175,339 >>> mbox cmd response data (8 bytes)
6,175,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,243 UART: [rt]cmd =0x4d454153, len=108
6,225,958 >>> mbox cmd response data (12 bytes)
6,225,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,255,390 UART: [rt]cmd =0x494e464f, len=4
6,259,077 >>> mbox cmd response data (312 bytes)
6,259,078 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,675 UART: [rt]cmd =0x54514754, len=24
6,290,775 >>> mbox cmd response data (8 bytes)
6,290,776 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,061 UART: [rt]cmd =0x47544744, len=8
6,322,633 >>> mbox cmd response data (104 bytes)
6,322,634 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,017 UART: [rt]cmd =0x50435252, len=8
6,353,633 >>> mbox cmd response data (8 bytes)
6,353,634 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,383,191 UART: [rt]cmd =0x50435251, len=36
6,550,492 >>> mbox cmd response data (1848 bytes)
6,550,493 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,024 UART: [rt]cmd =0x50435245, len=56
6,583,700 >>> mbox cmd response data (8 bytes)
6,583,701 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,374 UART: [rt]cmd =0x44504543, len=20
6,634,167 >>> mbox cmd response data (44 bytes)
6,634,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,663,717 UART: [rt]cmd =0x44504543, len=24
6,690,385 >>> mbox cmd response data (40 bytes)
6,690,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,720,351 UART: [rt]cmd =0x44504543, len=96
6,757,465 >>> mbox cmd response data (56 bytes)
6,757,466 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,787,343 UART: [rt]cmd =0x44504543, len=92
7,014,972 >>> mbox cmd response data (6284 bytes)
7,014,973 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,045,120 UART: [rt]cmd =0x44504543, len=136
7,111,335 >>> mbox cmd response data (136 bytes)
7,111,336 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,895 UART: [rt]cmd =0x44504543, len=40
7,167,026 >>> mbox cmd response data (40 bytes)
7,167,027 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,522 UART: [rt]cmd =0x44504543, len=28
7,239,887 >>> mbox cmd response data (2076 bytes)
7,239,888 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,269,481 UART: [rt]cmd =0x44504543, len=36
7,299,296 >>> mbox cmd response data (24 bytes)
7,299,297 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,328,784 UART: [rt]cmd =0x4453424c, len=4
7,342,277 >>> mbox cmd response data (8 bytes)
7,342,278 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,819 UART: [rt]cmd =0x46505344, len=4
7,480,061 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,026 ready_for_fw is high
1,061,026 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,367 >>> mbox cmd response: success
2,627,367 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,719 UART:
2,689,735 UART: Running Caliptra FMC ...
2,690,143 UART:
2,690,286 UART: [state] CFI Enabled
2,701,159 UART: [fht] FMC Alias Private Key: 7
2,809,042 UART: [art] Extend RT PCRs Done
2,809,470 UART: [art] Lock RT PCRs Done
2,810,940 UART: [art] Populate DV Done
2,819,087 UART: [fht] FMC Alias Private Key: 7
2,820,227 UART: [art] Derive CDI
2,820,507 UART: [art] Store in in slot 0x4
2,906,272 UART: [art] Derive Key Pair
2,906,632 UART: [art] Store priv key in slot 0x5
2,919,822 UART: [art] Derive Key Pair - Done
2,934,719 UART: [art] Signing Cert with AUTHO
2,935,199 UART: RITY.KEYID = 7
2,950,497 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,262 UART: [art] PUB.X = 2818E41BCD83A11490D72A806F07508C0F20C050DF5A17AB7FA5F30526BD45B7F841805302B9980A9919B7D452907E6C
2,958,013 UART: [art] PUB.Y = F48E90F6F77371822B29FC0F7293CC6E4FA228EA781B7BA151B4E683CD045953F204220076C6E1F41B66ABA4C9F9FEB9
2,964,940 UART: [art] SIG.R = C7725476B39EE00A474387D21FF3C9ABD670B1C88BE676D97373DF48EF3B80732B74F2AAF225575E559F1DB17EB2FC27
2,971,715 UART: [art] SIG.S = 1AA4B8A2D06207BC8B2F9FC280027A9AEEFAC39B4587A32DED93BE96775C250491B95868A27E85784AFE1EA2C572E854
2,995,219 UART: Caliptra RT
2,995,564 UART: [state] CFI Enabled
3,102,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,387 UART: [rt]cmd =0x46505652, len=4
3,134,047 UART: [rt] FIPS Version
3,135,068 >>> mbox cmd response data (36 bytes)
3,135,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,524 UART: [rt]cmd =0x46504c54, len=4
3,165,586 >>> mbox cmd response data (8 bytes)
3,165,587 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,195,244 UART: [rt]cmd =0x46504c67, len=4
3,196,270 >>> mbox cmd response: failed
3,196,426 UART: [rt] FIPS self test
3,196,757 UART: [kat] ++
3,196,909 UART: [kat] sha1
3,201,244 UART: [kat] SHA2-256
3,203,174 UART: [kat] SHA2-384
3,206,043 UART: [kat] SHA2-512-ACC
3,207,938 UART: [kat] ECC-384
3,217,735 UART: [kat] HMAC-384Kdf
3,222,240 UART: [kat] LMS
3,471,131 UART: [kat] --
5,594,229 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,596,030 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,625,526 UART: [rt]cmd =0x46504c67, len=4
5,626,729 >>> mbox cmd response data (8 bytes)
5,626,730 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,656,301 UART: [rt]cmd =0x49444543, len=4
5,662,961 >>> mbox cmd response data (37 bytes)
5,662,962 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,692,329 UART: [rt]cmd =0x49444549, len=4
5,694,654 >>> mbox cmd response data (104 bytes)
5,694,655 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,946 UART: [rt]cmd =0x49444550, len=4
5,734,062 >>> mbox cmd response data (8 bytes)
5,734,063 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,448 UART: [rt]cmd =0x4c444556, len=4
5,774,101 >>> mbox cmd response data (687 bytes)
5,774,102 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,803,449 UART: [rt]cmd =0x43455246, len=4
5,815,536 >>> mbox cmd response data (887 bytes)
5,815,537 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,844,860 UART: [rt]cmd =0x43455252, len=4
5,855,654 >>> mbox cmd response data (783 bytes)
5,855,655 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,252 UART: [rt]cmd =0x53494756, len=196
5,891,440 >>> mbox cmd response data (8 bytes)
5,891,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,921,464 UART: [rt]cmd =0x4d454153, len=108
5,942,107 >>> mbox cmd response data (12 bytes)
5,942,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,971,587 UART: [rt]cmd =0x494e464f, len=4
5,975,192 >>> mbox cmd response data (312 bytes)
5,975,193 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,722 UART: [rt]cmd =0x54514754, len=24
6,006,756 >>> mbox cmd response data (8 bytes)
6,006,757 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,036,170 UART: [rt]cmd =0x47544744, len=8
6,038,776 >>> mbox cmd response data (104 bytes)
6,038,777 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,068,220 UART: [rt]cmd =0x50435252, len=8
6,069,732 >>> mbox cmd response data (8 bytes)
6,069,733 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,099,502 UART: [rt]cmd =0x50435251, len=36
6,266,937 >>> mbox cmd response data (1848 bytes)
6,266,938 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,296,387 UART: [rt]cmd =0x50435245, len=56
6,300,061 >>> mbox cmd response data (8 bytes)
6,300,062 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,329,459 UART: [rt]cmd =0x44504543, len=20
6,350,330 >>> mbox cmd response data (44 bytes)
6,350,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,856 UART: [rt]cmd =0x44504543, len=24
6,406,208 >>> mbox cmd response data (40 bytes)
6,406,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,436,098 UART: [rt]cmd =0x44504543, len=96
6,472,846 >>> mbox cmd response data (56 bytes)
6,472,847 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,502,804 UART: [rt]cmd =0x44504543, len=92
6,731,652 >>> mbox cmd response data (6284 bytes)
6,731,653 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,761,980 UART: [rt]cmd =0x44504543, len=136
6,829,271 >>> mbox cmd response data (136 bytes)
6,829,272 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,859,031 UART: [rt]cmd =0x44504543, len=40
6,885,004 >>> mbox cmd response data (40 bytes)
6,885,005 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,512 UART: [rt]cmd =0x44504543, len=28
6,957,695 >>> mbox cmd response data (2076 bytes)
6,957,696 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,987,227 UART: [rt]cmd =0x44504543, len=36
7,017,040 >>> mbox cmd response data (24 bytes)
7,017,041 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,046,458 UART: [rt]cmd =0x4453424c, len=4
7,060,083 >>> mbox cmd response data (8 bytes)
7,060,084 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,089,633 UART: [rt]cmd =0x46505344, len=4
7,197,701 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,345 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,173,793 ready_for_fw is high
1,173,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,608 UART: [fwproc] Wait for Commands...
1,281,277 UART: [fwproc] Recv command 0x46574c44
1,282,010 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,007 >>> mbox cmd response: success
2,773,007 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,192 UART: [afmc] ++
2,774,360 UART: [afmc] CDI.KEYID = 6
2,774,723 UART: [afmc] SUBJECT.KEYID = 7
2,775,149 UART: [afmc] AUTHORITY.KEYID = 5
2,810,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,071 UART: [afmc] --
2,854,083 UART: [cold-reset] --
2,855,165 UART: [state] Locking Datavault
2,856,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,910 UART: [state] Locking ICCM
2,857,528 UART: [exit] Launching FMC @ 0x40000130
2,862,857 UART:
2,862,873 UART: Running Caliptra FMC ...
2,863,281 UART:
2,863,335 UART: [state] CFI Enabled
2,873,776 UART: [fht] FMC Alias Private Key: 7
2,981,793 UART: [art] Extend RT PCRs Done
2,982,221 UART: [art] Lock RT PCRs Done
2,983,781 UART: [art] Populate DV Done
2,992,144 UART: [fht] FMC Alias Private Key: 7
2,993,202 UART: [art] Derive CDI
2,993,482 UART: [art] Store in in slot 0x4
3,079,093 UART: [art] Derive Key Pair
3,079,453 UART: [art] Store priv key in slot 0x5
3,092,351 UART: [art] Derive Key Pair - Done
3,107,288 UART: [art] Signing Cert with AUTHO
3,107,768 UART: RITY.KEYID = 7
3,122,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,567 UART: [art] PUB.X = 87F1E5402F0FAFFCAC699128D5A2942C858836A17A7F6FDF46454D670D385E78DC8A6F39838239EF15192974C4D66E81
3,130,331 UART: [art] PUB.Y = 7A51056554336DD79C8DB56D3BB5D5B92B7C531EFACF394F7D2DEF4407F3EAC7EE8C29F490A1D4C84BBE650C72170B58
3,137,285 UART: [art] SIG.R = 7938D00B07231B3BB4BD8E6493941CC93927CA8B36B6EA2E30F35C66AB72E7AE03EC89749DBB0F150E163C1275A06650
3,144,044 UART: [art] SIG.S = D03EBB2A60794FC75C6E5AD50230F0C60BD18F4B5065A47496C7CD4653E31162D248E56FF42EF524122A3FE4A757F0A2
3,167,743 UART: Caliptra RT
3,167,996 UART: [state] CFI Enabled
3,275,461 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,931 UART: [rt]cmd =0x46505652, len=4
3,306,591 UART: [rt] FIPS Version
3,307,444 >>> mbox cmd response data (36 bytes)
3,307,445 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,746 UART: [rt]cmd =0x46504c54, len=4
3,338,014 >>> mbox cmd response data (8 bytes)
3,338,015 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,516 UART: [rt]cmd =0x46504c67, len=4
3,368,312 >>> mbox cmd response: failed
3,368,580 UART: [rt] FIPS self test
3,368,911 UART: [kat] ++
3,369,063 UART: [kat] sha1
3,373,422 UART: [kat] SHA2-256
3,375,352 UART: [kat] SHA2-384
3,378,163 UART: [kat] SHA2-512-ACC
3,380,058 UART: [kat] ECC-384
3,389,883 UART: [kat] HMAC-384Kdf
3,394,286 UART: [kat] LMS
3,643,177 UART: [kat] --
5,869,093 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,061 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,907,559 UART: [rt]cmd =0x46504c67, len=4
5,908,632 >>> mbox cmd response data (8 bytes)
5,908,633 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,937,918 UART: [rt]cmd =0x49444543, len=4
5,944,188 >>> mbox cmd response data (37 bytes)
5,944,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,606 UART: [rt]cmd =0x49444549, len=4
5,976,077 >>> mbox cmd response data (104 bytes)
5,976,078 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,601 UART: [rt]cmd =0x49444550, len=4
6,015,897 >>> mbox cmd response data (8 bytes)
6,015,898 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,229 UART: [rt]cmd =0x4c444556, len=4
6,055,584 >>> mbox cmd response data (687 bytes)
6,055,585 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,084,924 UART: [rt]cmd =0x43455246, len=4
6,097,017 >>> mbox cmd response data (887 bytes)
6,097,018 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,373 UART: [rt]cmd =0x43455252, len=4
6,137,347 >>> mbox cmd response data (783 bytes)
6,137,348 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,839 UART: [rt]cmd =0x53494756, len=196
6,173,039 >>> mbox cmd response data (8 bytes)
6,173,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,041 UART: [rt]cmd =0x4d454153, len=108
6,223,838 >>> mbox cmd response data (12 bytes)
6,223,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,448 UART: [rt]cmd =0x494e464f, len=4
6,257,309 >>> mbox cmd response data (312 bytes)
6,257,310 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,769 UART: [rt]cmd =0x54514754, len=24
6,288,675 >>> mbox cmd response data (8 bytes)
6,288,676 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,317,905 UART: [rt]cmd =0x47544744, len=8
6,320,375 >>> mbox cmd response data (104 bytes)
6,320,376 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,835 UART: [rt]cmd =0x50435252, len=8
6,351,055 >>> mbox cmd response data (8 bytes)
6,351,056 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,575 UART: [rt]cmd =0x50435251, len=36
6,547,860 >>> mbox cmd response data (1848 bytes)
6,547,861 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,577,598 UART: [rt]cmd =0x50435245, len=56
6,581,224 >>> mbox cmd response data (8 bytes)
6,581,225 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,574 UART: [rt]cmd =0x44504543, len=20
6,631,563 >>> mbox cmd response data (44 bytes)
6,631,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,661,321 UART: [rt]cmd =0x44504543, len=24
6,687,571 >>> mbox cmd response data (40 bytes)
6,687,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,717,527 UART: [rt]cmd =0x44504543, len=96
6,754,293 >>> mbox cmd response data (56 bytes)
6,754,294 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,783,991 UART: [rt]cmd =0x44504543, len=92
7,011,208 >>> mbox cmd response data (6284 bytes)
7,011,209 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,041,474 UART: [rt]cmd =0x44504543, len=136
7,107,519 >>> mbox cmd response data (136 bytes)
7,107,520 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,136,977 UART: [rt]cmd =0x44504543, len=40
7,162,900 >>> mbox cmd response data (40 bytes)
7,162,901 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,192,326 UART: [rt]cmd =0x44504543, len=28
7,235,511 >>> mbox cmd response data (2076 bytes)
7,235,512 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,265,095 UART: [rt]cmd =0x44504543, len=36
7,294,828 >>> mbox cmd response data (24 bytes)
7,294,829 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,324,268 UART: [rt]cmd =0x4453424c, len=4
7,338,491 >>> mbox cmd response data (8 bytes)
7,338,492 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,367,913 UART: [rt]cmd =0x46505344, len=4
7,475,959 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 ready_for_fw is high
1,055,944 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,451 >>> mbox cmd response: success
2,621,451 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,419 UART:
2,683,435 UART: Running Caliptra FMC ...
2,683,843 UART:
2,683,897 UART: [state] CFI Enabled
2,694,506 UART: [fht] FMC Alias Private Key: 7
2,802,267 UART: [art] Extend RT PCRs Done
2,802,695 UART: [art] Lock RT PCRs Done
2,804,143 UART: [art] Populate DV Done
2,812,678 UART: [fht] FMC Alias Private Key: 7
2,813,752 UART: [art] Derive CDI
2,814,032 UART: [art] Store in in slot 0x4
2,899,609 UART: [art] Derive Key Pair
2,899,969 UART: [art] Store priv key in slot 0x5
2,912,975 UART: [art] Derive Key Pair - Done
2,927,972 UART: [art] Signing Cert with AUTHO
2,928,452 UART: RITY.KEYID = 7
2,943,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,467 UART: [art] PUB.X = FF78E58BCA850B57829E6FDD01FB9C4F379812AC43B904D9D2E66337D428F7B3DB0C7E2F4AAEA141CD019C857CD88EA1
2,951,240 UART: [art] PUB.Y = 8C95841FFEFCF90CF73DD86DA8441A853A7C37E0991BFACBB1CE5ED93DE6F4675ED337A5C3BC640753406C9A8DE5D47F
2,958,206 UART: [art] SIG.R = 7E0C81DECB027E0279957CB94D568E8C852BE62F5C193976C1FC3327693A89492C9D68E6F9500E34CF36370C114D0D42
2,964,956 UART: [art] SIG.S = 6C8FA0F81F1C4058E313034450041EE269A7B2E1D59C5D9095D6FA58C5C8DD4DEBE20609268D2B0440E1FFC5EAD11337
2,988,590 UART: Caliptra RT
2,988,843 UART: [state] CFI Enabled
3,096,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,054 UART: [rt]cmd =0x46505652, len=4
3,127,714 UART: [rt] FIPS Version
3,128,819 >>> mbox cmd response data (36 bytes)
3,128,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,359 UART: [rt]cmd =0x46504c54, len=4
3,159,395 >>> mbox cmd response data (8 bytes)
3,159,396 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,189,141 UART: [rt]cmd =0x46504c67, len=4
3,190,057 >>> mbox cmd response: failed
3,190,355 UART: [rt] FIPS self test
3,190,686 UART: [kat] ++
3,190,838 UART: [kat] sha1
3,195,131 UART: [kat] SHA2-256
3,197,061 UART: [kat] SHA2-384
3,199,674 UART: [kat] SHA2-512-ACC
3,201,569 UART: [kat] ECC-384
3,211,386 UART: [kat] HMAC-384Kdf
3,215,949 UART: [kat] LMS
3,464,840 UART: [kat] --
5,583,718 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,817 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,619,341 UART: [rt]cmd =0x46504c67, len=4
5,620,310 >>> mbox cmd response data (8 bytes)
5,620,311 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,732 UART: [rt]cmd =0x49444543, len=4
5,656,210 >>> mbox cmd response data (37 bytes)
5,656,211 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,404 UART: [rt]cmd =0x49444549, len=4
5,687,831 >>> mbox cmd response data (104 bytes)
5,687,832 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,279 UART: [rt]cmd =0x49444550, len=4
5,727,377 >>> mbox cmd response data (8 bytes)
5,727,378 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,717 UART: [rt]cmd =0x4c444556, len=4
5,767,154 >>> mbox cmd response data (687 bytes)
5,767,155 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,510 UART: [rt]cmd =0x43455246, len=4
5,808,523 >>> mbox cmd response data (887 bytes)
5,808,524 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,879 UART: [rt]cmd =0x43455252, len=4
5,848,847 >>> mbox cmd response data (782 bytes)
5,848,848 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,413 UART: [rt]cmd =0x53494756, len=196
5,884,955 >>> mbox cmd response data (8 bytes)
5,884,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,199 UART: [rt]cmd =0x4d454153, len=108
5,936,068 >>> mbox cmd response data (12 bytes)
5,936,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,965,468 UART: [rt]cmd =0x494e464f, len=4
5,969,279 >>> mbox cmd response data (312 bytes)
5,969,280 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,953 UART: [rt]cmd =0x54514754, len=24
6,000,961 >>> mbox cmd response data (8 bytes)
6,000,962 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,030,409 UART: [rt]cmd =0x47544744, len=8
6,032,917 >>> mbox cmd response data (104 bytes)
6,032,918 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,127 UART: [rt]cmd =0x50435252, len=8
6,063,691 >>> mbox cmd response data (8 bytes)
6,063,692 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,147 UART: [rt]cmd =0x50435251, len=36
6,260,588 >>> mbox cmd response data (1848 bytes)
6,260,589 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,302 UART: [rt]cmd =0x50435245, len=56
6,294,104 >>> mbox cmd response data (8 bytes)
6,294,105 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,323,646 UART: [rt]cmd =0x44504543, len=20
6,344,355 >>> mbox cmd response data (44 bytes)
6,344,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,373,955 UART: [rt]cmd =0x44504543, len=24
6,400,795 >>> mbox cmd response data (40 bytes)
6,400,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,430,829 UART: [rt]cmd =0x44504543, len=96
6,467,899 >>> mbox cmd response data (56 bytes)
6,467,900 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,705 UART: [rt]cmd =0x44504543, len=92
6,726,274 >>> mbox cmd response data (6284 bytes)
6,726,275 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,274 UART: [rt]cmd =0x44504543, len=136
6,823,109 >>> mbox cmd response data (136 bytes)
6,823,110 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,852,731 UART: [rt]cmd =0x44504543, len=40
6,878,598 >>> mbox cmd response data (40 bytes)
6,878,599 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,907,848 UART: [rt]cmd =0x44504543, len=28
6,951,175 >>> mbox cmd response data (2076 bytes)
6,951,176 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,980,841 UART: [rt]cmd =0x44504543, len=36
7,010,902 >>> mbox cmd response data (24 bytes)
7,010,903 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,040,314 UART: [rt]cmd =0x4453424c, len=4
7,054,179 >>> mbox cmd response data (8 bytes)
7,054,180 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,083,653 UART: [rt]cmd =0x46505344, len=4
7,192,091 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,450 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,700 UART: [idev] ++
1,173,868 UART: [idev] CDI.KEYID = 6
1,174,229 UART: [idev] SUBJECT.KEYID = 7
1,174,654 UART: [idev] UDS.KEYID = 0
1,175,000 ready_for_fw is high
1,175,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,776 UART: [idev] Erasing UDS.KEYID = 0
1,200,360 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,037 UART: [ldev] --
1,282,449 UART: [fwproc] Wait for Commands...
1,283,208 UART: [fwproc] Recv command 0x46574c44
1,283,941 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,688 >>> mbox cmd response: success
2,773,688 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,917 UART: [afmc] ++
2,775,085 UART: [afmc] CDI.KEYID = 6
2,775,448 UART: [afmc] SUBJECT.KEYID = 7
2,775,874 UART: [afmc] AUTHORITY.KEYID = 5
2,811,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,790 UART: [afmc] --
2,854,678 UART: [cold-reset] --
2,855,604 UART: [state] Locking Datavault
2,856,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,441 UART: [state] Locking ICCM
2,857,895 UART: [exit] Launching FMC @ 0x40000130
2,863,224 UART:
2,863,240 UART: Running Caliptra FMC ...
2,863,648 UART:
2,863,791 UART: [state] CFI Enabled
2,874,588 UART: [fht] FMC Alias Private Key: 7
2,982,103 UART: [art] Extend RT PCRs Done
2,982,531 UART: [art] Lock RT PCRs Done
2,984,123 UART: [art] Populate DV Done
2,992,354 UART: [fht] FMC Alias Private Key: 7
2,993,512 UART: [art] Derive CDI
2,993,792 UART: [art] Store in in slot 0x4
3,079,467 UART: [art] Derive Key Pair
3,079,827 UART: [art] Store priv key in slot 0x5
3,092,455 UART: [art] Derive Key Pair - Done
3,107,219 UART: [art] Signing Cert with AUTHO
3,107,699 UART: RITY.KEYID = 7
3,122,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,462 UART: [art] PUB.X = 799292F31669CDEDC9E389E92EA983B293D475156584A4D8B354859C0C778C4261E58B9288E34A08B8B16CC8C682DECD
3,130,226 UART: [art] PUB.Y = 431FEB6574C2C6DC933154031F8F071612C995AD5E464E6EE72B24F7690C95095B25A4851C1BB5AAA207A84AABFF2F69
3,137,167 UART: [art] SIG.R = 9C2EF8F7BD5E3F943B5916E778A8432F760CA8CE5FE5EDDC3DB29385F7816A778A500843085824FA0570D09094C83F50
3,143,927 UART: [art] SIG.S = FCE2DAB9EE3D4A26D20A9344385234E9E41FC7EB0BF4459A387618AD70BBB19236AE2C5547103C062C767215569C431C
3,167,675 UART: Caliptra RT
3,168,020 UART: [state] CFI Enabled
3,276,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,910 UART: [rt]cmd =0x46505652, len=4
3,307,570 UART: [rt] FIPS Version
3,308,553 >>> mbox cmd response data (36 bytes)
3,308,554 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,801 UART: [rt]cmd =0x46504c54, len=4
3,339,119 >>> mbox cmd response data (8 bytes)
3,339,120 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,677 UART: [rt]cmd =0x46504c67, len=4
3,369,611 >>> mbox cmd response: failed
3,369,977 UART: [rt] FIPS self test
3,370,308 UART: [kat] ++
3,370,460 UART: [kat] sha1
3,374,777 UART: [kat] SHA2-256
3,376,707 UART: [kat] SHA2-384
3,379,546 UART: [kat] SHA2-512-ACC
3,381,441 UART: [kat] ECC-384
3,390,990 UART: [kat] HMAC-384Kdf
3,395,683 UART: [kat] LMS
3,644,574 UART: [kat] --
5,871,316 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,360 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,642 UART: [rt]cmd =0x46504c67, len=4
5,909,869 >>> mbox cmd response data (8 bytes)
5,909,870 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,289 UART: [rt]cmd =0x49444543, len=4
5,945,793 >>> mbox cmd response data (37 bytes)
5,945,794 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,351 UART: [rt]cmd =0x49444549, len=4
5,977,606 >>> mbox cmd response data (104 bytes)
5,977,607 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,076 UART: [rt]cmd =0x49444550, len=4
6,017,175 >>> mbox cmd response data (8 bytes)
6,017,176 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,785 UART: [rt]cmd =0x4c444556, len=4
6,057,108 >>> mbox cmd response data (687 bytes)
6,057,109 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,652 UART: [rt]cmd =0x43455246, len=4
6,098,633 >>> mbox cmd response data (887 bytes)
6,098,634 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,033 UART: [rt]cmd =0x43455252, len=4
6,139,022 >>> mbox cmd response data (784 bytes)
6,139,023 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,790 UART: [rt]cmd =0x53494756, len=196
6,175,492 >>> mbox cmd response data (8 bytes)
6,175,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,506 UART: [rt]cmd =0x4d454153, len=108
6,226,045 >>> mbox cmd response data (12 bytes)
6,226,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,255,519 UART: [rt]cmd =0x494e464f, len=4
6,259,212 >>> mbox cmd response data (312 bytes)
6,259,213 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,950 UART: [rt]cmd =0x54514754, len=24
6,291,126 >>> mbox cmd response data (8 bytes)
6,291,127 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,394 UART: [rt]cmd =0x47544744, len=8
6,322,978 >>> mbox cmd response data (104 bytes)
6,322,979 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,420 UART: [rt]cmd =0x50435252, len=8
6,353,902 >>> mbox cmd response data (8 bytes)
6,353,903 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,383,570 UART: [rt]cmd =0x50435251, len=36
6,551,095 >>> mbox cmd response data (1848 bytes)
6,551,096 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,781 UART: [rt]cmd =0x50435245, len=56
6,584,237 >>> mbox cmd response data (8 bytes)
6,584,238 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,629 UART: [rt]cmd =0x44504543, len=20
6,634,566 >>> mbox cmd response data (44 bytes)
6,634,567 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,663,986 UART: [rt]cmd =0x44504543, len=24
6,690,004 >>> mbox cmd response data (40 bytes)
6,690,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,719,696 UART: [rt]cmd =0x44504543, len=96
6,756,936 >>> mbox cmd response data (56 bytes)
6,756,937 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,786,700 UART: [rt]cmd =0x44504543, len=92
7,014,544 >>> mbox cmd response data (6284 bytes)
7,014,545 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,044,830 UART: [rt]cmd =0x44504543, len=136
7,111,129 >>> mbox cmd response data (136 bytes)
7,111,130 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,557 UART: [rt]cmd =0x44504543, len=40
7,167,030 >>> mbox cmd response data (40 bytes)
7,167,031 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,574 UART: [rt]cmd =0x44504543, len=28
7,239,629 >>> mbox cmd response data (2076 bytes)
7,239,630 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,269,111 UART: [rt]cmd =0x44504543, len=36
7,299,194 >>> mbox cmd response data (24 bytes)
7,299,195 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,328,542 UART: [rt]cmd =0x4453424c, len=4
7,341,991 >>> mbox cmd response data (8 bytes)
7,341,992 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,215 UART: [rt]cmd =0x46505344, len=4
7,479,743 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 ready_for_fw is high
1,056,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,096 >>> mbox cmd response: success
2,623,096 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,478 UART:
2,686,494 UART: Running Caliptra FMC ...
2,686,902 UART:
2,687,045 UART: [state] CFI Enabled
2,697,954 UART: [fht] FMC Alias Private Key: 7
2,805,595 UART: [art] Extend RT PCRs Done
2,806,023 UART: [art] Lock RT PCRs Done
2,807,343 UART: [art] Populate DV Done
2,815,576 UART: [fht] FMC Alias Private Key: 7
2,816,708 UART: [art] Derive CDI
2,816,988 UART: [art] Store in in slot 0x4
2,902,763 UART: [art] Derive Key Pair
2,903,123 UART: [art] Store priv key in slot 0x5
2,916,157 UART: [art] Derive Key Pair - Done
2,930,847 UART: [art] Signing Cert with AUTHO
2,931,327 UART: RITY.KEYID = 7
2,946,475 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,240 UART: [art] PUB.X = A8D78B62C15119F59092E5D4F27FF64FFAE1397E19229A736A19F221ACF690658C6FFF31E672515FE6CE2F0EB376673B
2,954,013 UART: [art] PUB.Y = FAC317513A286E60465920CCE4A60E85190F4C6457F9E577787EFECD06A74486B46A17BFD9C8D2F9310A48A369B9C3A1
2,960,955 UART: [art] SIG.R = 31B38C1DB50EB54C9B3B40EA46648677F62AB778166556359CE2EB1309992EBE4C6B67BA9500E84609830F4F879ACBE8
2,967,693 UART: [art] SIG.S = A3F78F1B476DEBD6CBAC1FB1A30042816255177CA16B5D924AD1B93595C545A38997617DAEBD575243C883B0AE67A7A4
2,991,842 UART: Caliptra RT
2,992,187 UART: [state] CFI Enabled
3,100,576 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,166 UART: [rt]cmd =0x46505652, len=4
3,131,826 UART: [rt] FIPS Version
3,133,043 >>> mbox cmd response data (36 bytes)
3,133,044 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,391 UART: [rt]cmd =0x46504c54, len=4
3,163,537 >>> mbox cmd response data (8 bytes)
3,163,538 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,193,217 UART: [rt]cmd =0x46504c67, len=4
3,194,003 >>> mbox cmd response: failed
3,194,263 UART: [rt] FIPS self test
3,194,594 UART: [kat] ++
3,194,746 UART: [kat] sha1
3,198,863 UART: [kat] SHA2-256
3,200,793 UART: [kat] SHA2-384
3,203,442 UART: [kat] SHA2-512-ACC
3,205,337 UART: [kat] ECC-384
3,215,324 UART: [kat] HMAC-384Kdf
3,219,865 UART: [kat] LMS
3,468,756 UART: [kat] --
5,588,118 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,593,763 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,623,035 UART: [rt]cmd =0x46504c67, len=4
5,624,384 >>> mbox cmd response data (8 bytes)
5,624,385 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,653,860 UART: [rt]cmd =0x49444543, len=4
5,660,344 >>> mbox cmd response data (37 bytes)
5,660,345 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,689,764 UART: [rt]cmd =0x49444549, len=4
5,692,039 >>> mbox cmd response data (104 bytes)
5,692,040 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,721,265 UART: [rt]cmd =0x49444550, len=4
5,731,203 >>> mbox cmd response data (8 bytes)
5,731,204 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,511 UART: [rt]cmd =0x4c444556, len=4
5,770,996 >>> mbox cmd response data (687 bytes)
5,770,997 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,558 UART: [rt]cmd =0x43455246, len=4
5,812,771 >>> mbox cmd response data (887 bytes)
5,812,772 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,081 UART: [rt]cmd =0x43455252, len=4
5,852,975 >>> mbox cmd response data (783 bytes)
5,852,976 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,479 UART: [rt]cmd =0x53494756, len=196
5,889,023 >>> mbox cmd response data (8 bytes)
5,889,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,918,931 UART: [rt]cmd =0x4d454153, len=108
5,939,164 >>> mbox cmd response data (12 bytes)
5,939,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,968,510 UART: [rt]cmd =0x494e464f, len=4
5,972,397 >>> mbox cmd response data (312 bytes)
5,972,398 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,001,773 UART: [rt]cmd =0x54514754, len=24
6,004,021 >>> mbox cmd response data (8 bytes)
6,004,022 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,033,497 UART: [rt]cmd =0x47544744, len=8
6,036,187 >>> mbox cmd response data (104 bytes)
6,036,188 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,065,777 UART: [rt]cmd =0x50435252, len=8
6,067,163 >>> mbox cmd response data (8 bytes)
6,067,164 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,096,921 UART: [rt]cmd =0x50435251, len=36
6,264,380 >>> mbox cmd response data (1848 bytes)
6,264,381 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,294,094 UART: [rt]cmd =0x50435245, len=56
6,297,796 >>> mbox cmd response data (8 bytes)
6,297,797 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,326,922 UART: [rt]cmd =0x44504543, len=20
6,347,765 >>> mbox cmd response data (44 bytes)
6,347,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,377,259 UART: [rt]cmd =0x44504543, len=24
6,403,725 >>> mbox cmd response data (40 bytes)
6,403,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,433,517 UART: [rt]cmd =0x44504543, len=96
6,470,189 >>> mbox cmd response data (56 bytes)
6,470,190 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,500,107 UART: [rt]cmd =0x44504543, len=92
6,728,653 >>> mbox cmd response data (6284 bytes)
6,728,654 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,995 UART: [rt]cmd =0x44504543, len=136
6,825,582 >>> mbox cmd response data (136 bytes)
6,825,583 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,855,228 UART: [rt]cmd =0x44504543, len=40
6,881,641 >>> mbox cmd response data (40 bytes)
6,881,642 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,325 UART: [rt]cmd =0x44504543, len=28
6,954,702 >>> mbox cmd response data (2076 bytes)
6,954,703 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,984,508 UART: [rt]cmd =0x44504543, len=36
7,014,389 >>> mbox cmd response data (24 bytes)
7,014,390 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,665 UART: [rt]cmd =0x4453424c, len=4
7,057,164 >>> mbox cmd response data (8 bytes)
7,057,165 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,608 UART: [rt]cmd =0x46505344, len=4
7,194,930 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,225 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,598 UART: [idev] ++
1,479,766 UART: [idev] CDI.KEYID = 6
1,480,126 UART: [idev] SUBJECT.KEYID = 7
1,480,550 UART: [idev] UDS.KEYID = 0
1,480,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,236 UART: [idev] Erasing UDS.KEYID = 0
1,505,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,254 UART: [idev] --
1,515,427 UART: [ldev] ++
1,515,595 UART: [ldev] CDI.KEYID = 6
1,515,958 UART: [ldev] SUBJECT.KEYID = 5
1,516,384 UART: [ldev] AUTHORITY.KEYID = 7
1,516,847 UART: [ldev] FE.KEYID = 1
1,522,075 UART: [ldev] Erasing FE.KEYID = 1
1,547,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,492 UART: [ldev] --
1,586,819 UART: [fwproc] Waiting for Commands...
1,587,526 UART: [fwproc] Received command 0x46504c54
1,588,433 UART: [kat] SHA2-256
2,382,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,479 UART: [kat] ++
2,386,631 UART: [kat] sha1
2,390,895 UART: [kat] SHA2-256
2,392,833 UART: [kat] SHA2-384
2,395,590 UART: [kat] SHA2-512-ACC
2,397,490 UART: [kat] ECC-384
2,402,939 UART: [kat] HMAC-384Kdf
2,407,503 UART: [kat] LMS
2,975,699 UART: [kat] --
2,975,937 >>> mbox cmd response data (8 bytes)
2,975,938 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,218 UART: [fwproc] Received command 0x46504c67
2,977,172 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,233 >>> mbox cmd response data (8 bytes)
2,715,234 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,715,564 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
891,084 UART: [kat] SHA2-256
893,022 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,225 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,236 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,853 UART: [idev] Erasing UDS.KEYID = 0
1,505,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,053 UART: [ldev] --
1,587,504 UART: [fwproc] Waiting for Commands...
1,588,247 UART: [fwproc] Received command 0x46504c54
1,589,154 UART: [kat] SHA2-256
2,383,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,200 UART: [kat] ++
2,387,352 UART: [kat] sha1
2,391,606 UART: [kat] SHA2-256
2,393,544 UART: [kat] SHA2-384
2,396,081 UART: [kat] SHA2-512-ACC
2,397,981 UART: [kat] ECC-384
2,403,534 UART: [kat] HMAC-384Kdf
2,408,296 UART: [kat] LMS
2,976,492 UART: [kat] --
2,976,730 >>> mbox cmd response data (8 bytes)
2,976,731 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,829 UART: [fwproc] Received command 0x46504c67
2,977,783 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,220 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,066 >>> mbox cmd response data (8 bytes)
2,716,067 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,479 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,576 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,739 UART: [state] WD Timer not started. Device not locked for debugging
86,882 UART: [kat] SHA2-256
892,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,657 UART: [kat] ++
896,809 UART: [kat] sha1
901,135 UART: [kat] SHA2-256
903,075 UART: [kat] SHA2-384
905,802 UART: [kat] SHA2-512-ACC
907,703 UART: [kat] ECC-384
917,788 UART: [kat] HMAC-384Kdf
922,542 UART: [kat] LMS
1,170,870 UART: [kat] --
1,171,573 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,656 UART: [idev] ++
1,174,824 UART: [idev] CDI.KEYID = 6
1,175,184 UART: [idev] SUBJECT.KEYID = 7
1,175,608 UART: [idev] UDS.KEYID = 0
1,175,953 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,428 UART: [idev] Erasing UDS.KEYID = 0
1,200,545 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,492 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46504c54
1,283,700 UART: [kat] SHA2-256
2,089,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,475 UART: [kat] ++
2,093,627 UART: [kat] sha1
2,097,799 UART: [kat] SHA2-256
2,099,739 UART: [kat] SHA2-384
2,102,584 UART: [kat] SHA2-512-ACC
2,104,484 UART: [kat] ECC-384
2,114,257 UART: [kat] HMAC-384Kdf
2,119,009 UART: [kat] LMS
2,367,337 UART: [kat] --
2,367,575 >>> mbox cmd response data (8 bytes)
2,367,576 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,783 UART: [fwproc] Recv command 0x46504c67
2,368,676 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,103 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,406 >>> mbox cmd response data (8 bytes)
2,113,407 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,697 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
893,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,494 UART: [kat] ++
897,646 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,855 UART: [kat] LMS
1,171,183 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,535 UART: [idev] ++
1,175,703 UART: [idev] CDI.KEYID = 6
1,176,063 UART: [idev] SUBJECT.KEYID = 7
1,176,487 UART: [idev] UDS.KEYID = 0
1,176,832 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,601 UART: [idev] Erasing UDS.KEYID = 0
1,201,564 UART: [idev] Sha1 KeyId Algorithm
1,210,084 UART: [idev] --
1,211,028 UART: [ldev] ++
1,211,196 UART: [ldev] CDI.KEYID = 6
1,211,559 UART: [ldev] SUBJECT.KEYID = 5
1,211,985 UART: [ldev] AUTHORITY.KEYID = 7
1,212,448 UART: [ldev] FE.KEYID = 1
1,217,414 UART: [ldev] Erasing FE.KEYID = 1
1,244,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,822 UART: [ldev] --
1,283,121 UART: [fwproc] Wait for Commands...
1,283,907 UART: [fwproc] Recv command 0x46504c54
1,284,753 UART: [kat] SHA2-256
2,090,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,528 UART: [kat] ++
2,094,680 UART: [kat] sha1
2,099,084 UART: [kat] SHA2-256
2,101,024 UART: [kat] SHA2-384
2,103,899 UART: [kat] SHA2-512-ACC
2,105,799 UART: [kat] ECC-384
2,115,894 UART: [kat] HMAC-384Kdf
2,120,452 UART: [kat] LMS
2,368,780 UART: [kat] --
2,369,018 >>> mbox cmd response data (8 bytes)
2,369,019 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,124 UART: [fwproc] Recv command 0x46504c67
2,370,017 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,463 >>> mbox cmd response data (8 bytes)
2,113,464 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,898 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,259 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,173,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,206,929 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,240,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,644 UART: [ldev] --
1,279,934 UART: [fwproc] Wait for Commands...
1,280,721 UART: [fwproc] Recv command 0x46504c54
1,281,575 UART: [kat] SHA2-256
2,085,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,254 UART: [kat] ++
2,089,406 UART: [kat] sha1
2,093,446 UART: [kat] SHA2-256
2,095,386 UART: [kat] SHA2-384
2,098,075 UART: [kat] SHA2-512-ACC
2,099,975 UART: [kat] ECC-384
2,109,888 UART: [kat] HMAC-384Kdf
2,114,330 UART: [kat] LMS
2,362,642 UART: [kat] --
2,362,883 >>> mbox cmd response data (8 bytes)
2,362,884 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,362,968 UART: [fwproc] Recv command 0x46504c67
2,363,872 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,103,995 >>> mbox cmd response data (8 bytes)
2,103,996 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,258 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,631 UART: [fwproc] Wait for Commands...
1,282,280 UART: [fwproc] Recv command 0x46504c54
1,283,134 UART: [kat] SHA2-256
2,086,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,090,813 UART: [kat] ++
2,090,965 UART: [kat] sha1
2,095,365 UART: [kat] SHA2-256
2,097,305 UART: [kat] SHA2-384
2,100,088 UART: [kat] SHA2-512-ACC
2,101,988 UART: [kat] ECC-384
2,111,693 UART: [kat] HMAC-384Kdf
2,116,353 UART: [kat] LMS
2,364,665 UART: [kat] --
2,364,906 >>> mbox cmd response data (8 bytes)
2,364,907 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,001 UART: [fwproc] Recv command 0x46504c67
2,365,905 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,093 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,788 >>> mbox cmd response data (8 bytes)
2,105,789 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,141 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,663 UART: [kat] SHA2-256
881,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,709 UART: [kat] ++
885,861 UART: [kat] sha1
889,995 UART: [kat] SHA2-256
891,933 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,678 UART: [kat] HMAC-384Kdf
907,370 UART: [kat] LMS
1,475,566 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,699 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 ready_for_fw is high
1,480,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,706 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,436 UART: [idev] --
1,514,419 UART: [ldev] ++
1,514,587 UART: [ldev] CDI.KEYID = 6
1,514,950 UART: [ldev] SUBJECT.KEYID = 5
1,515,376 UART: [ldev] AUTHORITY.KEYID = 7
1,515,839 UART: [ldev] FE.KEYID = 1
1,521,061 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,522 UART: [ldev] --
1,585,821 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 114332 bytes
2,885,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,768 >>> mbox cmd response: success
3,077,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,078,988 UART: [afmc] ++
3,079,156 UART: [afmc] CDI.KEYID = 6
3,079,518 UART: [afmc] SUBJECT.KEYID = 7
3,079,943 UART: [afmc] AUTHORITY.KEYID = 5
3,115,812 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,221 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,911 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,834 UART: [afmc] --
3,158,896 UART: [cold-reset] --
3,159,864 UART: [state] Locking Datavault
3,160,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,361 UART: [state] Locking ICCM
3,161,995 UART: [exit] Launching FMC @ 0x40000130
3,167,324 UART:
3,167,340 UART: Running Caliptra FMC ...
3,167,748 UART:
3,167,802 UART: [state] CFI Enabled
3,178,417 UART: [fht] FMC Alias Private Key: 7
3,287,196 UART: [art] Extend RT PCRs Done
3,287,624 UART: [art] Lock RT PCRs Done
3,289,120 UART: [art] Populate DV Done
3,297,367 UART: [fht] FMC Alias Private Key: 7
3,298,535 UART: [art] Derive CDI
3,298,815 UART: [art] Store in in slot 0x4
3,384,664 UART: [art] Derive Key Pair
3,385,024 UART: [art] Store priv key in slot 0x5
3,398,516 UART: [art] Derive Key Pair - Done
3,413,349 UART: [art] Signing Cert with AUTHO
3,413,829 UART: RITY.KEYID = 7
3,429,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,982 UART: [art] PUB.X = 45764713D03AD0F490B39A80B1B46E918027A54D89E3A6596C413F814BBDC6357F4276CC390FDAEE0163821A3C1D61DE
3,436,748 UART: [art] PUB.Y = AE059960271A015EAAA716CCA6ACE51942678F883EB263B29F714CCAED7EA1197B4E5C7FE8E471DE76C1D0079DB2CA4B
3,443,707 UART: [art] SIG.R = E40A7D35162CC6268A7337D818313FB513E52DE2892196D060CD10075F82206FED99D15E1BEA86223E966AF26D3A9E81
3,450,469 UART: [art] SIG.S = 47A410B0A1ECBE4C36668CDE14EF957E0C4E660ADD3829C1ED8860C25428AC770FAA9FE61598583391B35DD1F37BDC7B
3,474,315 UART: Caliptra RT
3,474,568 UART: [state] CFI Enabled
3,581,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,407 UART: [rt]cmd =0x46504c54, len=4
3,613,477 >>> mbox cmd response data (8 bytes)
3,613,478 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,643,165 UART: [rt]cmd =0x46504c67, len=4
3,644,301 >>> mbox cmd response: failed
3,644,485 UART: [rt] FIPS self test
3,644,816 UART: [kat] ++
3,644,968 UART: [kat] sha1
3,649,083 UART: [kat] SHA2-256
3,651,013 UART: [kat] SHA2-384
3,653,676 UART: [kat] SHA2-512-ACC
3,655,571 UART: [kat] ECC-384
3,665,012 UART: [kat] HMAC-384Kdf
3,669,615 UART: [kat] LMS
3,918,506 UART: [kat] --
6,137,234 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,144,051 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,569 UART: [rt]cmd =0x46504c67, len=4
6,174,668 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,243 ready_for_fw is high
1,362,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,714 >>> mbox cmd response: success
2,925,714 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,987,266 UART:
2,987,282 UART: Running Caliptra FMC ...
2,987,690 UART:
2,987,744 UART: [state] CFI Enabled
2,998,365 UART: [fht] FMC Alias Private Key: 7
3,107,090 UART: [art] Extend RT PCRs Done
3,107,518 UART: [art] Lock RT PCRs Done
3,109,100 UART: [art] Populate DV Done
3,117,287 UART: [fht] FMC Alias Private Key: 7
3,118,315 UART: [art] Derive CDI
3,118,595 UART: [art] Store in in slot 0x4
3,203,932 UART: [art] Derive Key Pair
3,204,292 UART: [art] Store priv key in slot 0x5
3,217,548 UART: [art] Derive Key Pair - Done
3,232,236 UART: [art] Signing Cert with AUTHO
3,232,716 UART: RITY.KEYID = 7
3,247,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,555 UART: [art] PUB.X = 86DDAC46AEAB0DDE0CA37992F32C201D975594F32D4D161B83D3F28A04B636CD068C976CFAFA4FF6B7502B45F8E7375D
3,255,329 UART: [art] PUB.Y = 8608B202B6BC6CE1E588E4882F7E6E103AE42B6769A192BA25C4FE1C4DCF25E8BAA0954F0E8CEEEF135E4AEB317592AF
3,262,290 UART: [art] SIG.R = AEE1E0415723060BB93D47CFDC27DB51AE156CAA22F7DB43DC1009914DC7307971C9090ABB20972C11533CDB11C1AE16
3,269,055 UART: [art] SIG.S = FCAD1990831C581012AC41B7C51F8DB9337F9FACF24A5B326432728A72CADEBAD22E31AD836A9614CE8953445CAB7B28
3,292,750 UART: Caliptra RT
3,293,003 UART: [state] CFI Enabled
3,402,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,009 UART: [rt]cmd =0x46504c54, len=4
3,434,305 >>> mbox cmd response data (8 bytes)
3,434,306 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,463,957 UART: [rt]cmd =0x46504c67, len=4
3,464,959 >>> mbox cmd response: failed
3,465,275 UART: [rt] FIPS self test
3,465,606 UART: [kat] ++
3,465,758 UART: [kat] sha1
3,469,945 UART: [kat] SHA2-256
3,471,875 UART: [kat] SHA2-384
3,474,686 UART: [kat] SHA2-512-ACC
3,476,581 UART: [kat] ECC-384
3,486,372 UART: [kat] HMAC-384Kdf
3,490,923 UART: [kat] LMS
3,739,814 UART: [kat] --
5,850,836 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,720 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,164 UART: [rt]cmd =0x46504c67, len=4
5,885,365 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,084 UART: [fht] Storing FHT @ 0x50003400
1,480,033 UART: [idev] ++
1,480,201 UART: [idev] CDI.KEYID = 6
1,480,561 UART: [idev] SUBJECT.KEYID = 7
1,480,985 UART: [idev] UDS.KEYID = 0
1,481,330 ready_for_fw is high
1,481,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,615 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,119 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,521,884 UART: [ldev] Erasing FE.KEYID = 1
1,547,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,145 UART: [ldev] --
1,586,428 UART: [fwproc] Waiting for Commands...
1,587,179 UART: [fwproc] Received command 0x46574c44
1,587,970 UART: [fwproc] Received Image of size 114332 bytes
2,883,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,235 >>> mbox cmd response: success
3,076,235 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,077,473 UART: [afmc] ++
3,077,641 UART: [afmc] CDI.KEYID = 6
3,078,003 UART: [afmc] SUBJECT.KEYID = 7
3,078,428 UART: [afmc] AUTHORITY.KEYID = 5
3,113,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,462 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,152 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,185 UART: [afmc] --
3,157,315 UART: [cold-reset] --
3,157,951 UART: [state] Locking Datavault
3,159,096 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,700 UART: [state] Locking ICCM
3,160,284 UART: [exit] Launching FMC @ 0x40000130
3,165,613 UART:
3,165,629 UART: Running Caliptra FMC ...
3,166,037 UART:
3,166,180 UART: [state] CFI Enabled
3,177,185 UART: [fht] FMC Alias Private Key: 7
3,285,760 UART: [art] Extend RT PCRs Done
3,286,188 UART: [art] Lock RT PCRs Done
3,287,594 UART: [art] Populate DV Done
3,295,797 UART: [fht] FMC Alias Private Key: 7
3,296,771 UART: [art] Derive CDI
3,297,051 UART: [art] Store in in slot 0x4
3,383,332 UART: [art] Derive Key Pair
3,383,692 UART: [art] Store priv key in slot 0x5
3,396,660 UART: [art] Derive Key Pair - Done
3,411,773 UART: [art] Signing Cert with AUTHO
3,412,253 UART: RITY.KEYID = 7
3,427,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,238 UART: [art] PUB.X = B06B9902C4FF5263D803C3B26791BE375277AE311266022AF1861DE983588DD6F4BA2373A8902782561A37A07C4B67BD
3,434,993 UART: [art] PUB.Y = D8D168F2FDB5B666EA511F3EC6262741B945C828C8500E4681D1DB7E90D05B7266F1999DFFF62222E89B9F397ABAC922
3,441,946 UART: [art] SIG.R = E2D9108F23D8174060C9C89D4418BC8604427A717CB756D58F78F814990CD9FC8C13F19A6F3BC8F6EA48D0C89B914B40
3,448,712 UART: [art] SIG.S = C5976BF7EABE56C74537A5488454F3C72C4591AFE01614C4E6BAC0121D24E3F33B97ADFE12BFD78638EF63B8E42E2264
3,472,509 UART: Caliptra RT
3,472,854 UART: [state] CFI Enabled
3,581,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,524 UART: [rt]cmd =0x46504c54, len=4
3,612,594 >>> mbox cmd response data (8 bytes)
3,612,595 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,642,382 UART: [rt]cmd =0x46504c67, len=4
3,643,204 >>> mbox cmd response: failed
3,643,510 UART: [rt] FIPS self test
3,643,841 UART: [kat] ++
3,643,993 UART: [kat] sha1
3,648,164 UART: [kat] SHA2-256
3,650,094 UART: [kat] SHA2-384
3,652,663 UART: [kat] SHA2-512-ACC
3,654,558 UART: [kat] ECC-384
3,664,167 UART: [kat] HMAC-384Kdf
3,668,810 UART: [kat] LMS
3,917,701 UART: [kat] --
6,136,821 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,142,954 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,564 UART: [rt]cmd =0x46504c67, len=4
6,173,617 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 ready_for_fw is high
1,363,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,631 >>> mbox cmd response: success
2,929,631 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,991,895 UART:
2,991,911 UART: Running Caliptra FMC ...
2,992,319 UART:
2,992,462 UART: [state] CFI Enabled
3,002,905 UART: [fht] FMC Alias Private Key: 7
3,110,396 UART: [art] Extend RT PCRs Done
3,110,824 UART: [art] Lock RT PCRs Done
3,112,062 UART: [art] Populate DV Done
3,120,145 UART: [fht] FMC Alias Private Key: 7
3,121,193 UART: [art] Derive CDI
3,121,473 UART: [art] Store in in slot 0x4
3,207,232 UART: [art] Derive Key Pair
3,207,592 UART: [art] Store priv key in slot 0x5
3,221,256 UART: [art] Derive Key Pair - Done
3,235,931 UART: [art] Signing Cert with AUTHO
3,236,411 UART: RITY.KEYID = 7
3,251,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,488 UART: [art] PUB.X = 1E52AEF76F934BA32A0825A4157CD3683AB0F82511B1F79B68E5B9DCB91481DCDD2269E80D5274C04D7C62C1FDD2DAF0
3,259,266 UART: [art] PUB.Y = 33BAA3D47EFCD686A11CD913545B35F28E27A3B929373875F547CC0EBEA4A4B46289AA0A5419C9E142A41BD53392617B
3,266,216 UART: [art] SIG.R = 2CD897BC18E88133F9A6E7D3A039C672F9E82006012B3C9C0E2212DF88B51D6BB8BE5858160B84E50AA0349AFCB6B056
3,272,977 UART: [art] SIG.S = B730DEBE2C9C8235B92F3BA254AB7449388682D7EC6C5EAE4DC8172C9AA09F4623086262F19F3A0473EAD3790275A61B
3,296,341 UART: Caliptra RT
3,296,686 UART: [state] CFI Enabled
3,404,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,691 UART: [rt]cmd =0x46504c54, len=4
3,436,719 >>> mbox cmd response data (8 bytes)
3,436,720 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,466,315 UART: [rt]cmd =0x46504c67, len=4
3,467,371 >>> mbox cmd response: failed
3,467,659 UART: [rt] FIPS self test
3,467,990 UART: [kat] ++
3,468,142 UART: [kat] sha1
3,472,483 UART: [kat] SHA2-256
3,474,413 UART: [kat] SHA2-384
3,477,348 UART: [kat] SHA2-512-ACC
3,479,243 UART: [kat] ECC-384
3,488,638 UART: [kat] HMAC-384Kdf
3,493,241 UART: [kat] LMS
3,742,132 UART: [kat] --
5,854,788 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,857,132 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,762 UART: [rt]cmd =0x46504c67, len=4
5,887,815 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,830 UART: [state] LifecycleState = Unprovisioned
86,485 UART: [state] DebugLocked = No
87,007 UART: [state] WD Timer not started. Device not locked for debugging
88,206 UART: [kat] SHA2-256
893,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,981 UART: [kat] ++
898,133 UART: [kat] sha1
902,499 UART: [kat] SHA2-256
904,439 UART: [kat] SHA2-384
907,186 UART: [kat] SHA2-512-ACC
909,087 UART: [kat] ECC-384
918,876 UART: [kat] HMAC-384Kdf
923,482 UART: [kat] LMS
1,171,810 UART: [kat] --
1,172,735 UART: [cold-reset] ++
1,173,165 UART: [fht] FHT @ 0x50003400
1,175,718 UART: [idev] ++
1,175,886 UART: [idev] CDI.KEYID = 6
1,176,246 UART: [idev] SUBJECT.KEYID = 7
1,176,670 UART: [idev] UDS.KEYID = 0
1,177,015 ready_for_fw is high
1,177,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,885 UART: [idev] Sha1 KeyId Algorithm
1,210,487 UART: [idev] --
1,211,407 UART: [ldev] ++
1,211,575 UART: [ldev] CDI.KEYID = 6
1,211,938 UART: [ldev] SUBJECT.KEYID = 5
1,212,364 UART: [ldev] AUTHORITY.KEYID = 7
1,212,827 UART: [ldev] FE.KEYID = 1
1,218,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,963 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,120 UART: [fwproc] Recv command 0x46574c44
1,284,848 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,747 >>> mbox cmd response: success
2,773,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,831 UART: [afmc] ++
2,774,999 UART: [afmc] CDI.KEYID = 6
2,775,361 UART: [afmc] SUBJECT.KEYID = 7
2,775,786 UART: [afmc] AUTHORITY.KEYID = 5
2,811,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,384 UART: [afmc] --
2,854,288 UART: [cold-reset] --
2,855,216 UART: [state] Locking Datavault
2,856,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,107 UART: [state] Locking ICCM
2,857,661 UART: [exit] Launching FMC @ 0x40000130
2,862,990 UART:
2,863,006 UART: Running Caliptra FMC ...
2,863,414 UART:
2,863,468 UART: [state] CFI Enabled
2,873,855 UART: [fht] FMC Alias Private Key: 7
2,981,704 UART: [art] Extend RT PCRs Done
2,982,132 UART: [art] Lock RT PCRs Done
2,983,926 UART: [art] Populate DV Done
2,991,995 UART: [fht] FMC Alias Private Key: 7
2,992,957 UART: [art] Derive CDI
2,993,237 UART: [art] Store in in slot 0x4
3,078,490 UART: [art] Derive Key Pair
3,078,850 UART: [art] Store priv key in slot 0x5
3,091,800 UART: [art] Derive Key Pair - Done
3,106,350 UART: [art] Signing Cert with AUTHO
3,106,830 UART: RITY.KEYID = 7
3,121,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,755 UART: [art] PUB.X = 1322CA84D5A369383D41581D741FDC9E0A998CF137A79B88F2F064DA49FA6C473D5CE87F61C901D3B961A335334B3BCA
3,129,525 UART: [art] PUB.Y = FACEDFCECE38E084C79BA030D0A5D1F5C570E3FFD214A7684801F2916F0F0BD582050E49F4520447E893D99D9D65B4C9
3,136,469 UART: [art] SIG.R = 1D10BD74F251EF2FC56AA3D6E02ADF6643D02935F7C772E722A0FEA2723CC2A723EDE3EDC868B3F1A3E42B36600CEDE4
3,143,256 UART: [art] SIG.S = 69703D76E225859B1E16DDD820D147FC9D803B22BCE039006794E3507B9E9C224A6D47E9DDADB9C8CB71BE7128B7FBD0
3,167,313 UART: Caliptra RT
3,167,566 UART: [state] CFI Enabled
3,274,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,551 UART: [rt]cmd =0x46504c54, len=4
3,305,619 >>> mbox cmd response data (8 bytes)
3,305,620 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,339 UART: [rt]cmd =0x46504c67, len=4
3,336,395 >>> mbox cmd response: failed
3,336,695 UART: [rt] FIPS self test
3,337,026 UART: [kat] ++
3,337,178 UART: [kat] sha1
3,341,543 UART: [kat] SHA2-256
3,343,473 UART: [kat] SHA2-384
3,346,284 UART: [kat] SHA2-512-ACC
3,348,179 UART: [kat] ECC-384
3,358,170 UART: [kat] HMAC-384Kdf
3,362,767 UART: [kat] LMS
3,611,658 UART: [kat] --
5,839,926 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,846,144 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,604 UART: [rt]cmd =0x46504c67, len=4
5,876,657 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,929 ready_for_fw is high
1,059,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,408 >>> mbox cmd response: success
2,626,408 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,394 UART:
2,688,410 UART: Running Caliptra FMC ...
2,688,818 UART:
2,688,872 UART: [state] CFI Enabled
2,699,271 UART: [fht] FMC Alias Private Key: 7
2,806,130 UART: [art] Extend RT PCRs Done
2,806,558 UART: [art] Lock RT PCRs Done
2,808,040 UART: [art] Populate DV Done
2,816,131 UART: [fht] FMC Alias Private Key: 7
2,817,287 UART: [art] Derive CDI
2,817,567 UART: [art] Store in in slot 0x4
2,903,016 UART: [art] Derive Key Pair
2,903,376 UART: [art] Store priv key in slot 0x5
2,916,244 UART: [art] Derive Key Pair - Done
2,930,975 UART: [art] Signing Cert with AUTHO
2,931,455 UART: RITY.KEYID = 7
2,947,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,940 UART: [art] PUB.X = B0EE3792B23D5C6A2AF0FE16E756042D4E2C58F7F486822E5312537ADFDDCD6545C5832557E167E208AD9F2B39798DFB
2,954,712 UART: [art] PUB.Y = 5F06E076B963A333891D0FE714C69D70760CC5CF564C1C2931E94561E25ADF8770A66055B040B10DD6656232BB7D3178
2,961,644 UART: [art] SIG.R = 0A9C5717C142D4086E3E46FF2EE3D0DE0F640BECA433A3ADC3279E3A9DD1B15453A814349F911AFA38E493F174412D7D
2,968,412 UART: [art] SIG.S = BBA66E46076FC7FB8D4C57F24704AAE1DD05020E58612B2432025DD4C94EE8B771472BEB8B7888580C0FA470EEB80FAD
2,991,882 UART: Caliptra RT
2,992,135 UART: [state] CFI Enabled
3,098,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,432 UART: [rt]cmd =0x46504c54, len=4
3,130,612 >>> mbox cmd response data (8 bytes)
3,130,613 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,160,254 UART: [rt]cmd =0x46504c67, len=4
3,161,258 >>> mbox cmd response: failed
3,161,450 UART: [rt] FIPS self test
3,161,781 UART: [kat] ++
3,161,933 UART: [kat] sha1
3,166,208 UART: [kat] SHA2-256
3,168,138 UART: [kat] SHA2-384
3,171,007 UART: [kat] SHA2-512-ACC
3,172,902 UART: [kat] ECC-384
3,182,329 UART: [kat] HMAC-384Kdf
3,186,986 UART: [kat] LMS
3,435,877 UART: [kat] --
5,558,745 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,561,018 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,420 UART: [rt]cmd =0x46504c67, len=4
5,591,717 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,486 UART: [kat] SHA2-256
904,426 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
919,165 UART: [kat] HMAC-384Kdf
923,907 UART: [kat] LMS
1,172,235 UART: [kat] --
1,172,770 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,779 UART: [idev] ++
1,175,947 UART: [idev] CDI.KEYID = 6
1,176,307 UART: [idev] SUBJECT.KEYID = 7
1,176,731 UART: [idev] UDS.KEYID = 0
1,177,076 ready_for_fw is high
1,177,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,693 UART: [idev] Erasing UDS.KEYID = 0
1,201,726 UART: [idev] Sha1 KeyId Algorithm
1,210,072 UART: [idev] --
1,211,110 UART: [ldev] ++
1,211,278 UART: [ldev] CDI.KEYID = 6
1,211,641 UART: [ldev] SUBJECT.KEYID = 5
1,212,067 UART: [ldev] AUTHORITY.KEYID = 7
1,212,530 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,244,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,320 UART: [ldev] --
1,283,679 UART: [fwproc] Wait for Commands...
1,284,417 UART: [fwproc] Recv command 0x46574c44
1,285,145 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,360 >>> mbox cmd response: success
2,776,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,777,558 UART: [afmc] ++
2,777,726 UART: [afmc] CDI.KEYID = 6
2,778,088 UART: [afmc] SUBJECT.KEYID = 7
2,778,513 UART: [afmc] AUTHORITY.KEYID = 5
2,813,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,123 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,879 UART: [afmc] --
2,856,897 UART: [cold-reset] --
2,857,793 UART: [state] Locking Datavault
2,859,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,680 UART: [state] Locking ICCM
2,860,124 UART: [exit] Launching FMC @ 0x40000130
2,865,453 UART:
2,865,469 UART: Running Caliptra FMC ...
2,865,877 UART:
2,866,020 UART: [state] CFI Enabled
2,876,449 UART: [fht] FMC Alias Private Key: 7
2,984,504 UART: [art] Extend RT PCRs Done
2,984,932 UART: [art] Lock RT PCRs Done
2,986,422 UART: [art] Populate DV Done
2,994,713 UART: [fht] FMC Alias Private Key: 7
2,995,675 UART: [art] Derive CDI
2,995,955 UART: [art] Store in in slot 0x4
3,081,864 UART: [art] Derive Key Pair
3,082,224 UART: [art] Store priv key in slot 0x5
3,095,436 UART: [art] Derive Key Pair - Done
3,109,951 UART: [art] Signing Cert with AUTHO
3,110,431 UART: RITY.KEYID = 7
3,125,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,550 UART: [art] PUB.X = C74CE6B78E418A4A1C1907FD47252AF59793025F5FB1F6D94D7DA8957EBA504F69DD1CE4CE10C2EA9F546E17F55442CD
3,133,328 UART: [art] PUB.Y = 93A0D42F4C4589F6570FA8AD5FD507BAC33024BD35DE194ECEA702A24EE70BDECFEF1BDB99E094FF6DEEDB2833466B1E
3,140,294 UART: [art] SIG.R = 303BBB3F4C023936575E3ADD9CBEF309907BBFD141C6117D6D42049AFD6E4D8A5C858681627BFF30EE5184CD96BE1DBE
3,147,071 UART: [art] SIG.S = BF92CBDBC841A389C690B17DD2FDEFE9C734839E0E2BD725B5BFD691DD8EA832CE487AABB679CE49A5A7900456AE8C17
3,170,898 UART: Caliptra RT
3,171,243 UART: [state] CFI Enabled
3,279,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,930 UART: [rt]cmd =0x46504c54, len=4
3,311,112 >>> mbox cmd response data (8 bytes)
3,311,113 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,340,704 UART: [rt]cmd =0x46504c67, len=4
3,341,792 >>> mbox cmd response: failed
3,341,958 UART: [rt] FIPS self test
3,342,289 UART: [kat] ++
3,342,441 UART: [kat] sha1
3,346,712 UART: [kat] SHA2-256
3,348,642 UART: [kat] SHA2-384
3,351,301 UART: [kat] SHA2-512-ACC
3,353,196 UART: [kat] ECC-384
3,362,887 UART: [kat] HMAC-384Kdf
3,367,452 UART: [kat] LMS
3,616,343 UART: [kat] --
5,844,201 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,851,541 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,705 UART: [rt]cmd =0x46504c67, len=4
5,882,002 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,254 ready_for_fw is high
1,061,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,987 >>> mbox cmd response: success
2,626,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,667 UART:
2,688,683 UART: Running Caliptra FMC ...
2,689,091 UART:
2,689,234 UART: [state] CFI Enabled
2,700,119 UART: [fht] FMC Alias Private Key: 7
2,808,876 UART: [art] Extend RT PCRs Done
2,809,304 UART: [art] Lock RT PCRs Done
2,810,662 UART: [art] Populate DV Done
2,818,781 UART: [fht] FMC Alias Private Key: 7
2,819,731 UART: [art] Derive CDI
2,820,011 UART: [art] Store in in slot 0x4
2,905,588 UART: [art] Derive Key Pair
2,905,948 UART: [art] Store priv key in slot 0x5
2,918,848 UART: [art] Derive Key Pair - Done
2,933,466 UART: [art] Signing Cert with AUTHO
2,933,946 UART: RITY.KEYID = 7
2,949,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,193 UART: [art] PUB.X = D8BD44F1C2322F1F4EA0CDD6D9AA4739FC96F748C14D9E548F996AC3B492DD2FB2DC954FF90A07396C47ADFDDEC767B0
2,956,981 UART: [art] PUB.Y = 538F73141592F9048F2F06CCF95759F69FD8AAD28DBA73288B558CF9DBD68C0260A570AC08DC79985C49D70D752C1EBA
2,963,924 UART: [art] SIG.R = C4ECD9F84F1F27B3DA28AF4A0F12F30D64C3D17DBE2038A2AE2D9AD4554C9497AF82C69DEF7AB4A51CA45EC3FDB10984
2,970,711 UART: [art] SIG.S = B77894B8B1401066B7BDFA72FC2DFE933E26E5A47FA734D4C2B5099F67CA551B792A97D187AE231D80B1846D70FA0811
2,994,812 UART: Caliptra RT
2,995,157 UART: [state] CFI Enabled
3,102,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,291 UART: [rt]cmd =0x46504c54, len=4
3,134,423 >>> mbox cmd response data (8 bytes)
3,134,424 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,164,011 UART: [rt]cmd =0x46504c67, len=4
3,165,213 >>> mbox cmd response: failed
3,165,389 UART: [rt] FIPS self test
3,165,720 UART: [kat] ++
3,165,872 UART: [kat] sha1
3,170,203 UART: [kat] SHA2-256
3,172,133 UART: [kat] SHA2-384
3,174,862 UART: [kat] SHA2-512-ACC
3,176,757 UART: [kat] ECC-384
3,186,254 UART: [kat] HMAC-384Kdf
3,190,789 UART: [kat] LMS
3,439,680 UART: [kat] --
5,562,516 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,564,973 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,594,221 UART: [rt]cmd =0x46504c67, len=4
5,595,202 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,169,881 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,173,855 ready_for_fw is high
1,173,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,242,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,076 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x46574c44
1,282,480 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,671 >>> mbox cmd response: success
2,771,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,772,762 UART: [afmc] ++
2,772,930 UART: [afmc] CDI.KEYID = 6
2,773,293 UART: [afmc] SUBJECT.KEYID = 7
2,773,719 UART: [afmc] AUTHORITY.KEYID = 5
2,809,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,839 UART: [afmc] --
2,852,913 UART: [cold-reset] --
2,853,905 UART: [state] Locking Datavault
2,855,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,652 UART: [state] Locking ICCM
2,856,298 UART: [exit] Launching FMC @ 0x40000130
2,861,627 UART:
2,861,643 UART: Running Caliptra FMC ...
2,862,051 UART:
2,862,105 UART: [state] CFI Enabled
2,872,762 UART: [fht] FMC Alias Private Key: 7
2,980,789 UART: [art] Extend RT PCRs Done
2,981,217 UART: [art] Lock RT PCRs Done
2,983,325 UART: [art] Populate DV Done
2,991,504 UART: [fht] FMC Alias Private Key: 7
2,992,562 UART: [art] Derive CDI
2,992,842 UART: [art] Store in in slot 0x4
3,078,113 UART: [art] Derive Key Pair
3,078,473 UART: [art] Store priv key in slot 0x5
3,091,579 UART: [art] Derive Key Pair - Done
3,106,414 UART: [art] Signing Cert with AUTHO
3,106,894 UART: RITY.KEYID = 7
3,122,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,175 UART: [art] PUB.X = 511AA8FFA188B8E760019FBF2132692F1FE8076C0591CB1FC463625914D231FD7758FADD74F1B5DD0B1758BBB69158AE
3,129,941 UART: [art] PUB.Y = 2733CE02B52057FC97364D2C802F1A7002D6AD74BC7F3EA5A6BB8683B0671467186B9BF37AE0547BC6D50A33EE4F47BE
3,136,890 UART: [art] SIG.R = 5EF629CD2D586CD396DDEF3D60954234EB4AD287000CB5B4AA528B29F8CB04AE1BF369D03CDEA1A4B1DE40E45193A440
3,143,650 UART: [art] SIG.S = 28210B7F2277690C931CDDFE43ABD89B1D6F2D03792D7432806FA75C79F0AC29658C5BB09FC4F2B4A6BCA9315312C09E
3,167,084 UART: Caliptra RT
3,167,337 UART: [state] CFI Enabled
3,275,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,208 UART: [rt]cmd =0x46504c54, len=4
3,306,234 >>> mbox cmd response data (8 bytes)
3,306,235 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,844 UART: [rt]cmd =0x46504c67, len=4
3,336,696 >>> mbox cmd response: failed
3,336,818 UART: [rt] FIPS self test
3,337,149 UART: [kat] ++
3,337,301 UART: [kat] sha1
3,341,472 UART: [kat] SHA2-256
3,343,402 UART: [kat] SHA2-384
3,346,127 UART: [kat] SHA2-512-ACC
3,348,022 UART: [kat] ECC-384
3,357,663 UART: [kat] HMAC-384Kdf
3,362,216 UART: [kat] LMS
3,611,107 UART: [kat] --
5,837,867 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,846,445 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,713 UART: [rt]cmd =0x46504c67, len=4
5,876,924 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,562 ready_for_fw is high
1,056,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,715 >>> mbox cmd response: success
2,621,715 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,684,503 UART:
2,684,519 UART: Running Caliptra FMC ...
2,684,927 UART:
2,684,981 UART: [state] CFI Enabled
2,695,688 UART: [fht] FMC Alias Private Key: 7
2,803,121 UART: [art] Extend RT PCRs Done
2,803,549 UART: [art] Lock RT PCRs Done
2,805,077 UART: [art] Populate DV Done
2,813,252 UART: [fht] FMC Alias Private Key: 7
2,814,274 UART: [art] Derive CDI
2,814,554 UART: [art] Store in in slot 0x4
2,900,445 UART: [art] Derive Key Pair
2,900,805 UART: [art] Store priv key in slot 0x5
2,913,571 UART: [art] Derive Key Pair - Done
2,928,217 UART: [art] Signing Cert with AUTHO
2,928,697 UART: RITY.KEYID = 7
2,943,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,384 UART: [art] PUB.X = 4DE962D88EC759771DC8B6B80E384A560A61255FAD7A6410EBE064F945014FB4DC526641A8FEBEDB8620BF86DFEA56AF
2,951,161 UART: [art] PUB.Y = 13A0E2E23D8D529CB5C86FD6346E842AC554C44552E9C673D1D4E8A2209D88E9747C2B66384400D6EB394E2E5AE35001
2,958,086 UART: [art] SIG.R = 22023F0BABF225E2E1D9553AD9E546B067467D2E5D14B8652BF46BD8FC5851F9E58BF3572F086599EAAEE68F213A1C98
2,964,855 UART: [art] SIG.S = 1CC32F82E24AB71B34275673C0614ED3593AC54E00831833D7C99FBD904EAE4D712691F1B5525817F1C4573757B97DAC
2,988,138 UART: Caliptra RT
2,988,391 UART: [state] CFI Enabled
3,096,198 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,914 UART: [rt]cmd =0x46504c54, len=4
3,128,112 >>> mbox cmd response data (8 bytes)
3,128,113 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,157,786 UART: [rt]cmd =0x46504c67, len=4
3,158,870 >>> mbox cmd response: failed
3,159,122 UART: [rt] FIPS self test
3,159,453 UART: [kat] ++
3,159,605 UART: [kat] sha1
3,163,868 UART: [kat] SHA2-256
3,165,798 UART: [kat] SHA2-384
3,168,533 UART: [kat] SHA2-512-ACC
3,170,428 UART: [kat] ECC-384
3,180,217 UART: [kat] HMAC-384Kdf
3,184,722 UART: [kat] LMS
3,433,613 UART: [kat] --
5,553,031 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,558,630 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,084 UART: [rt]cmd =0x46504c67, len=4
5,589,073 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,446 UART: [cold-reset] ++
1,169,838 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 ready_for_fw is high
1,173,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,095 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,116 >>> mbox cmd response: success
2,773,116 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,331 UART: [afmc] ++
2,774,499 UART: [afmc] CDI.KEYID = 6
2,774,862 UART: [afmc] SUBJECT.KEYID = 7
2,775,288 UART: [afmc] AUTHORITY.KEYID = 5
2,810,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,662 UART: [afmc] --
2,854,756 UART: [cold-reset] --
2,855,514 UART: [state] Locking Datavault
2,856,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,389 UART: [state] Locking ICCM
2,857,953 UART: [exit] Launching FMC @ 0x40000130
2,863,282 UART:
2,863,298 UART: Running Caliptra FMC ...
2,863,706 UART:
2,863,849 UART: [state] CFI Enabled
2,874,572 UART: [fht] FMC Alias Private Key: 7
2,982,965 UART: [art] Extend RT PCRs Done
2,983,393 UART: [art] Lock RT PCRs Done
2,984,859 UART: [art] Populate DV Done
2,993,054 UART: [fht] FMC Alias Private Key: 7
2,994,050 UART: [art] Derive CDI
2,994,330 UART: [art] Store in in slot 0x4
3,080,305 UART: [art] Derive Key Pair
3,080,665 UART: [art] Store priv key in slot 0x5
3,094,285 UART: [art] Derive Key Pair - Done
3,109,056 UART: [art] Signing Cert with AUTHO
3,109,536 UART: RITY.KEYID = 7
3,124,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,615 UART: [art] PUB.X = 171B47AB4D4C8712790B85CE14A028E96315380C61FD1432433B314A1B3865F5A4F05B031D5C3E90954240C3ADFC286F
3,132,372 UART: [art] PUB.Y = E883B49FD8C647768B24F8D4D4E963C00FE0B9815C9DF508B94AD36B5F4BA398554987A04202165D7E9F0B17BC53E67F
3,139,314 UART: [art] SIG.R = 4774FAFB18799B25DBAC0424DC25849906CFD58F38458A8DDCDDA3A24DAB6F4410CDFF57BA117A924102EA39E3687E5D
3,146,091 UART: [art] SIG.S = 99AC72F2B17DD6E86BAE67CEFF917399F4F2973676BC5C755AA815384731F1DB904DA62DB34AC0B72E2FF006BAB59A12
3,170,009 UART: Caliptra RT
3,170,354 UART: [state] CFI Enabled
3,278,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,107 UART: [rt]cmd =0x46504c54, len=4
3,310,113 >>> mbox cmd response data (8 bytes)
3,310,114 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,339,535 UART: [rt]cmd =0x46504c67, len=4
3,340,355 >>> mbox cmd response: failed
3,340,533 UART: [rt] FIPS self test
3,340,864 UART: [kat] ++
3,341,016 UART: [kat] sha1
3,344,999 UART: [kat] SHA2-256
3,346,929 UART: [kat] SHA2-384
3,349,542 UART: [kat] SHA2-512-ACC
3,351,437 UART: [kat] ECC-384
3,361,370 UART: [kat] HMAC-384Kdf
3,366,055 UART: [kat] LMS
3,614,946 UART: [kat] --
5,840,872 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,104 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,504 UART: [rt]cmd =0x46504c67, len=4
5,880,729 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,837 ready_for_fw is high
1,055,837 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,698 >>> mbox cmd response: success
2,622,698 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,684,288 UART:
2,684,304 UART: Running Caliptra FMC ...
2,684,712 UART:
2,684,855 UART: [state] CFI Enabled
2,695,686 UART: [fht] FMC Alias Private Key: 7
2,803,455 UART: [art] Extend RT PCRs Done
2,803,883 UART: [art] Lock RT PCRs Done
2,805,571 UART: [art] Populate DV Done
2,813,670 UART: [fht] FMC Alias Private Key: 7
2,814,734 UART: [art] Derive CDI
2,815,014 UART: [art] Store in in slot 0x4
2,900,419 UART: [art] Derive Key Pair
2,900,779 UART: [art] Store priv key in slot 0x5
2,913,977 UART: [art] Derive Key Pair - Done
2,928,724 UART: [art] Signing Cert with AUTHO
2,929,204 UART: RITY.KEYID = 7
2,944,580 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,345 UART: [art] PUB.X = BC8BC59C41AC5014715CE6E1FFE1C64AB2090DAD1CF399FA5D2EF6AD49EF832ADA08FD6A0BF01F36FC7E1ECF60480AB4
2,952,132 UART: [art] PUB.Y = 269D50C75EB73D41AB8B0ACB46774B414A0B8AEC7FD7AB72D8542A3BFE2F081C54C4ED8E56C496088DC21935984536B2
2,959,080 UART: [art] SIG.R = 44D3F302C39377E5D8976EC63D18A886683259C2F9CDEC65D04295427535E69A10B0A6CF72EB081B853ED8E4B68F8821
2,965,842 UART: [art] SIG.S = 8B211A476BD1D936DB847EAA1AA922C22974D2C6E4AB138FCCEB6371E0C23C4F7C4ED5E24CB64B2AEEA36E845079A30D
2,989,808 UART: Caliptra RT
2,990,153 UART: [state] CFI Enabled
3,097,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,162 UART: [rt]cmd =0x46504c54, len=4
3,129,462 >>> mbox cmd response data (8 bytes)
3,129,463 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,159,002 UART: [rt]cmd =0x46504c67, len=4
3,160,144 >>> mbox cmd response: failed
3,160,328 UART: [rt] FIPS self test
3,160,659 UART: [kat] ++
3,160,811 UART: [kat] sha1
3,164,864 UART: [kat] SHA2-256
3,166,794 UART: [kat] SHA2-384
3,169,509 UART: [kat] SHA2-512-ACC
3,171,404 UART: [kat] ECC-384
3,180,697 UART: [kat] HMAC-384Kdf
3,185,208 UART: [kat] LMS
3,434,099 UART: [kat] --
5,553,507 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,559,904 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,246 UART: [rt]cmd =0x46504c67, len=4
5,590,313 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,103 UART: [kat] SHA2-256
892,041 UART: [kat] SHA2-384
894,700 UART: [kat] SHA2-512-ACC
896,601 UART: [kat] ECC-384
902,102 UART: [kat] HMAC-384Kdf
906,766 UART: [kat] LMS
1,474,962 UART: [kat] --
1,476,001 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,546 UART: [idev] Erasing UDS.KEYID = 0
1,504,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,010 UART: [idev] --
1,514,161 UART: [ldev] ++
1,514,329 UART: [ldev] CDI.KEYID = 6
1,514,692 UART: [ldev] SUBJECT.KEYID = 5
1,515,118 UART: [ldev] AUTHORITY.KEYID = 7
1,515,581 UART: [ldev] FE.KEYID = 1
1,520,639 UART: [ldev] Erasing FE.KEYID = 1
1,545,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46505652
1,587,256 UART: [rt] FIPS Version
1,587,809 >>> mbox cmd response data (36 bytes)
1,587,810 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,587,898 UART: [fwproc] Received command 0x46574c44
1,588,689 UART: [fwproc] Received Image of size 114332 bytes
2,887,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,414 >>> mbox cmd response: success
3,079,414 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,458 UART: [afmc] ++
3,080,626 UART: [afmc] CDI.KEYID = 6
3,080,988 UART: [afmc] SUBJECT.KEYID = 7
3,081,413 UART: [afmc] AUTHORITY.KEYID = 5
3,116,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,619 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,309 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,964 UART: [afmc] --
3,160,058 UART: [cold-reset] --
3,160,876 UART: [state] Locking Datavault
3,161,927 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,531 UART: [state] Locking ICCM
3,162,991 UART: [exit] Launching FMC @ 0x40000130
3,168,320 UART:
3,168,336 UART: Running Caliptra FMC ...
3,168,744 UART:
3,168,798 UART: [state] CFI Enabled
3,179,461 UART: [fht] FMC Alias Private Key: 7
3,287,480 UART: [art] Extend RT PCRs Done
3,287,908 UART: [art] Lock RT PCRs Done
3,289,542 UART: [art] Populate DV Done
3,297,731 UART: [fht] FMC Alias Private Key: 7
3,298,877 UART: [art] Derive CDI
3,299,157 UART: [art] Store in in slot 0x4
3,384,960 UART: [art] Derive Key Pair
3,385,320 UART: [art] Store priv key in slot 0x5
3,398,884 UART: [art] Derive Key Pair - Done
3,413,422 UART: [art] Signing Cert with AUTHO
3,413,902 UART: RITY.KEYID = 7
3,429,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,225 UART: [art] PUB.X = 832CF82101B2A02FF21F30BF0FF156B0ED85F3E8748958DA71783D88DD5B4006A0A452D014CBC83B13A28A00391A7879
3,436,966 UART: [art] PUB.Y = 69A01193C1A085A19E6BC098401D886E1F5CE2D0C161D1BB2A16E414C05C584DBD4DDAC36BABC02F9E58B82654426FF4
3,443,928 UART: [art] SIG.R = BF86AC33DC5FEC2A334C66B5605C61B8C4AD404A6D6D2D0640E568AC932050A6A9C9D484D27116685FF146776187EF32
3,450,699 UART: [art] SIG.S = C0F6CF715673D26987AA83F58AF905C6CB1EFFA30B9F364656E9ED67AA53AD89F2EE28A636B555B33AA905B83D78B018
3,474,361 UART: Caliptra RT
3,474,614 UART: [state] CFI Enabled
3,583,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,448 UART: [rt]cmd =0x46505652, len=4
3,614,108 UART: [rt] FIPS Version
3,615,211 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,875 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,662 >>> mbox cmd response data (36 bytes)
1,440,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,579 >>> mbox cmd response: success
2,927,579 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,965 UART:
2,989,981 UART: Running Caliptra FMC ...
2,990,389 UART:
2,990,443 UART: [state] CFI Enabled
3,000,704 UART: [fht] FMC Alias Private Key: 7
3,108,411 UART: [art] Extend RT PCRs Done
3,108,839 UART: [art] Lock RT PCRs Done
3,110,411 UART: [art] Populate DV Done
3,118,730 UART: [fht] FMC Alias Private Key: 7
3,119,846 UART: [art] Derive CDI
3,120,126 UART: [art] Store in in slot 0x4
3,205,663 UART: [art] Derive Key Pair
3,206,023 UART: [art] Store priv key in slot 0x5
3,218,691 UART: [art] Derive Key Pair - Done
3,233,608 UART: [art] Signing Cert with AUTHO
3,234,088 UART: RITY.KEYID = 7
3,249,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,935 UART: [art] PUB.X = 990C03CC93E95B5CDDEF40F013301D56B081D1DCCC9AA4C2C8C01CB1D9A4452F92C825DCF9D45B3E10877FE0AE19BE3E
3,256,721 UART: [art] PUB.Y = 53B754940108DFE43A514BE25A9D8B96148A6D91C4AEB40EEA0C7829B319AD61CFE42663B735FE921DEDBB21EE3241E8
3,263,671 UART: [art] SIG.R = D190C4C8ED6A2ADE679AD9D5F1DCCF4502C2DCEEDCB003ED0B0FB813FC4241FCF78C10D34F42E32AE097A76F1F6195A9
3,270,457 UART: [art] SIG.S = EE09F65BD7F8DA0BABA409204321BE9EA319DC6AB33943AAB3CACF4E4B6E7C2751A637F377F229C6645A0E6D005E3B91
3,294,398 UART: Caliptra RT
3,294,651 UART: [state] CFI Enabled
3,402,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,405 UART: [rt]cmd =0x46505652, len=4
3,434,065 UART: [rt] FIPS Version
3,435,256 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,706 UART: [kat] SHA2-256
882,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,752 UART: [kat] ++
886,904 UART: [kat] sha1
891,084 UART: [kat] SHA2-256
893,022 UART: [kat] SHA2-384
895,677 UART: [kat] SHA2-512-ACC
897,578 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,900 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,355 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,227 UART: [idev] --
1,515,362 UART: [ldev] ++
1,515,530 UART: [ldev] CDI.KEYID = 6
1,515,893 UART: [ldev] SUBJECT.KEYID = 5
1,516,319 UART: [ldev] AUTHORITY.KEYID = 7
1,516,782 UART: [ldev] FE.KEYID = 1
1,522,072 UART: [ldev] Erasing FE.KEYID = 1
1,547,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,329 UART: [ldev] --
1,586,634 UART: [fwproc] Waiting for Commands...
1,587,293 UART: [fwproc] Received command 0x46505652
1,588,175 UART: [rt] FIPS Version
1,588,728 >>> mbox cmd response data (36 bytes)
1,588,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,588,937 UART: [fwproc] Received command 0x46574c44
1,589,728 UART: [fwproc] Received Image of size 114332 bytes
2,887,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,348 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,505 >>> mbox cmd response: success
3,080,505 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,715 UART: [afmc] ++
3,081,883 UART: [afmc] CDI.KEYID = 6
3,082,245 UART: [afmc] SUBJECT.KEYID = 7
3,082,670 UART: [afmc] AUTHORITY.KEYID = 5
3,117,641 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,388 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,078 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,957 UART: [afmc] --
3,160,877 UART: [cold-reset] --
3,161,585 UART: [state] Locking Datavault
3,162,746 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,350 UART: [state] Locking ICCM
3,163,902 UART: [exit] Launching FMC @ 0x40000130
3,169,231 UART:
3,169,247 UART: Running Caliptra FMC ...
3,169,655 UART:
3,169,798 UART: [state] CFI Enabled
3,180,327 UART: [fht] FMC Alias Private Key: 7
3,288,302 UART: [art] Extend RT PCRs Done
3,288,730 UART: [art] Lock RT PCRs Done
3,290,290 UART: [art] Populate DV Done
3,298,787 UART: [fht] FMC Alias Private Key: 7
3,299,869 UART: [art] Derive CDI
3,300,149 UART: [art] Store in in slot 0x4
3,386,100 UART: [art] Derive Key Pair
3,386,460 UART: [art] Store priv key in slot 0x5
3,399,834 UART: [art] Derive Key Pair - Done
3,414,283 UART: [art] Signing Cert with AUTHO
3,414,763 UART: RITY.KEYID = 7
3,430,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,986 UART: [art] PUB.X = 3B77D942F476241F4152AC3D303C4C6EA09490BCF7462DE29818345277E18A992C8181D2A5EA53AC899FA09F1EC6F1DF
3,437,760 UART: [art] PUB.Y = 4603238C22DE4CDBD67377132F395E093AC900B497092B575D0367DA64D1C8E77E1BB52D6E215F3CC901280585E7ABEC
3,444,672 UART: [art] SIG.R = 5ECADAC6C70F2E77A177C1E61A3B8919FBEE9E96BC4A3E15898E4A7FDC8D4D346FD0D4630A8593234B918F11CB12C0CF
3,451,456 UART: [art] SIG.S = A24350A94761865339B7BA230DB82DD42FCFA44653ED7DE5995F36AFF3296B9E5A6588056109AA07E830539129B2C82B
3,475,669 UART: Caliptra RT
3,476,014 UART: [state] CFI Enabled
3,584,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,577 UART: [rt]cmd =0x46505652, len=4
3,615,237 UART: [rt] FIPS Version
3,616,332 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,717 >>> mbox cmd response data (36 bytes)
1,441,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,634 >>> mbox cmd response: success
2,929,634 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,312 UART:
2,991,328 UART: Running Caliptra FMC ...
2,991,736 UART:
2,991,879 UART: [state] CFI Enabled
3,002,630 UART: [fht] FMC Alias Private Key: 7
3,111,283 UART: [art] Extend RT PCRs Done
3,111,711 UART: [art] Lock RT PCRs Done
3,113,195 UART: [art] Populate DV Done
3,121,554 UART: [fht] FMC Alias Private Key: 7
3,122,654 UART: [art] Derive CDI
3,122,934 UART: [art] Store in in slot 0x4
3,208,423 UART: [art] Derive Key Pair
3,208,783 UART: [art] Store priv key in slot 0x5
3,222,211 UART: [art] Derive Key Pair - Done
3,237,111 UART: [art] Signing Cert with AUTHO
3,237,591 UART: RITY.KEYID = 7
3,252,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,524 UART: [art] PUB.X = 70E4CED9146948368A107F686C2BDBFD9499E17BB19DE793D067795E458A3A58FBDAE9927764C025A5A9FD080CB63BBC
3,260,298 UART: [art] PUB.Y = 75366D2FCDF10D644BA3A0DD97F4CE316432A134F8C7B75DAEC7E781EC2D24C8380A78BE642867BAE1EC783416C5FEFC
3,267,260 UART: [art] SIG.R = 17D5B523C24B38115A9C3F42A34C6DACE40A25CE6D65196CDD618400C7B833164313A67347115F9704FA0A36D2D40249
3,273,992 UART: [art] SIG.S = D40A5F8EA6A955F871586BE7243A247EDB6120457A90BB8A818FE978877A4CE31308429D05536CBB6C11568A8C95FAA0
3,297,996 UART: Caliptra RT
3,298,341 UART: [state] CFI Enabled
3,406,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,942 UART: [rt]cmd =0x46505652, len=4
3,437,602 UART: [rt] FIPS Version
3,438,423 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
893,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,763 UART: [kat] ++
897,915 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,804 UART: [kat] SHA2-512-ACC
908,705 UART: [kat] ECC-384
918,388 UART: [kat] HMAC-384Kdf
923,034 UART: [kat] LMS
1,171,362 UART: [kat] --
1,172,061 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,212 UART: [idev] ++
1,175,380 UART: [idev] CDI.KEYID = 6
1,175,740 UART: [idev] SUBJECT.KEYID = 7
1,176,164 UART: [idev] UDS.KEYID = 0
1,176,509 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,061 UART: [idev] Sha1 KeyId Algorithm
1,209,575 UART: [idev] --
1,210,627 UART: [ldev] ++
1,210,795 UART: [ldev] CDI.KEYID = 6
1,211,158 UART: [ldev] SUBJECT.KEYID = 5
1,211,584 UART: [ldev] AUTHORITY.KEYID = 7
1,212,047 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,283,000 UART: [fwproc] Wait for Commands...
1,283,764 UART: [fwproc] Recv command 0x46505652
1,284,585 UART: [rt] FIPS Version
1,285,139 >>> mbox cmd response data (36 bytes)
1,285,140 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,410 UART: [fwproc] Recv command 0x46574c44
1,286,138 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,077 >>> mbox cmd response: success
2,776,077 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,255 UART: [afmc] ++
2,777,423 UART: [afmc] CDI.KEYID = 6
2,777,785 UART: [afmc] SUBJECT.KEYID = 7
2,778,210 UART: [afmc] AUTHORITY.KEYID = 5
2,812,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,001 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,720 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,652 UART: [afmc] --
2,856,722 UART: [cold-reset] --
2,857,752 UART: [state] Locking Datavault
2,859,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,769 UART: [state] Locking ICCM
2,860,415 UART: [exit] Launching FMC @ 0x40000130
2,865,744 UART:
2,865,760 UART: Running Caliptra FMC ...
2,866,168 UART:
2,866,222 UART: [state] CFI Enabled
2,876,923 UART: [fht] FMC Alias Private Key: 7
2,984,778 UART: [art] Extend RT PCRs Done
2,985,206 UART: [art] Lock RT PCRs Done
2,986,734 UART: [art] Populate DV Done
2,994,771 UART: [fht] FMC Alias Private Key: 7
2,995,929 UART: [art] Derive CDI
2,996,209 UART: [art] Store in in slot 0x4
3,082,026 UART: [art] Derive Key Pair
3,082,386 UART: [art] Store priv key in slot 0x5
3,095,594 UART: [art] Derive Key Pair - Done
3,110,787 UART: [art] Signing Cert with AUTHO
3,111,267 UART: RITY.KEYID = 7
3,126,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,062 UART: [art] PUB.X = AB54765812FB013EF42F6F2D22259772587BB8151089495E799F4A8FD06BC4668F3C9A0C3E905A29E03685FD63EE8517
3,133,822 UART: [art] PUB.Y = D1A8628F8AA1C52E8F7FEB8757F7DC9349053111808EBE8C2F47852612FC7301FDDE1FB53A5B89F90ABB447E6FC26501
3,140,770 UART: [art] SIG.R = 8FF6DB4E741E2AC0464DF1BA73B1883BBF08EE205449912B25B618DA6EC6C47DF41BADCDD42F274DF8E88A8BDC7693E3
3,147,559 UART: [art] SIG.S = 4E12B11C54FCE62E5397E1F63BAC8B708AAE62D576511D4D35724A13C3EAAF479FB55FB362D8205E73AC9AEC6BA81AA4
3,171,662 UART: Caliptra RT
3,171,915 UART: [state] CFI Enabled
3,280,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,970 UART: [rt]cmd =0x46505652, len=4
3,311,630 UART: [rt] FIPS Version
3,312,853 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,529 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,697 >>> mbox cmd response data (36 bytes)
1,140,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,386 >>> mbox cmd response: success
2,627,386 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,020 UART:
2,690,036 UART: Running Caliptra FMC ...
2,690,444 UART:
2,690,498 UART: [state] CFI Enabled
2,700,469 UART: [fht] FMC Alias Private Key: 7
2,808,166 UART: [art] Extend RT PCRs Done
2,808,594 UART: [art] Lock RT PCRs Done
2,810,002 UART: [art] Populate DV Done
2,818,301 UART: [fht] FMC Alias Private Key: 7
2,819,367 UART: [art] Derive CDI
2,819,647 UART: [art] Store in in slot 0x4
2,905,038 UART: [art] Derive Key Pair
2,905,398 UART: [art] Store priv key in slot 0x5
2,918,808 UART: [art] Derive Key Pair - Done
2,933,357 UART: [art] Signing Cert with AUTHO
2,933,837 UART: RITY.KEYID = 7
2,948,753 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,518 UART: [art] PUB.X = 79AC0C01A81A6847739857985C672BCE2D743DE497B6B1EB1B1F053AF056512D3F5E2CE1C046EAB16F89B96EED702CB2
2,956,289 UART: [art] PUB.Y = 85D6BD863E768FDA2AB4C9525173BC9E9F9387EB8B534C1E4593CDBC65484E50D80B7E9B1706EF45A44631322A8D88C0
2,963,239 UART: [art] SIG.R = 13F7FCABCC2D65F14FC8771C969B67DD3F756080BB833FB0FE142D539DCA6AFB52D61BC44C3DA1F2668520F2D671EC2C
2,970,029 UART: [art] SIG.S = 4DED4DBD17695381AC6A41C493A63EF3DE4AF8E58E41E6630AC77370738AAC0A8B27D3E078B4C90C1429E9C9BD5DE39F
2,994,065 UART: Caliptra RT
2,994,318 UART: [state] CFI Enabled
3,102,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,961 UART: [rt]cmd =0x46505652, len=4
3,133,621 UART: [rt] FIPS Version
3,134,794 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
893,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,314 UART: [kat] ++
897,466 UART: [kat] sha1
901,710 UART: [kat] SHA2-256
903,650 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
918,381 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,702 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,211,108 UART: [ldev] ++
1,211,276 UART: [ldev] CDI.KEYID = 6
1,211,639 UART: [ldev] SUBJECT.KEYID = 5
1,212,065 UART: [ldev] AUTHORITY.KEYID = 7
1,212,528 UART: [ldev] FE.KEYID = 1
1,218,212 UART: [ldev] Erasing FE.KEYID = 1
1,245,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,008 UART: [ldev] --
1,284,521 UART: [fwproc] Wait for Commands...
1,285,171 UART: [fwproc] Recv command 0x46505652
1,285,992 UART: [rt] FIPS Version
1,286,546 >>> mbox cmd response data (36 bytes)
1,286,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,286,747 UART: [fwproc] Recv command 0x46574c44
1,287,475 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,424 >>> mbox cmd response: success
2,776,424 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,592 UART: [afmc] ++
2,777,760 UART: [afmc] CDI.KEYID = 6
2,778,122 UART: [afmc] SUBJECT.KEYID = 7
2,778,547 UART: [afmc] AUTHORITY.KEYID = 5
2,813,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,688 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,231 UART: [afmc] --
2,857,289 UART: [cold-reset] --
2,858,167 UART: [state] Locking Datavault
2,859,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,274 UART: [state] Locking ICCM
2,860,812 UART: [exit] Launching FMC @ 0x40000130
2,866,141 UART:
2,866,157 UART: Running Caliptra FMC ...
2,866,565 UART:
2,866,708 UART: [state] CFI Enabled
2,877,211 UART: [fht] FMC Alias Private Key: 7
2,985,540 UART: [art] Extend RT PCRs Done
2,985,968 UART: [art] Lock RT PCRs Done
2,987,450 UART: [art] Populate DV Done
2,995,717 UART: [fht] FMC Alias Private Key: 7
2,996,837 UART: [art] Derive CDI
2,997,117 UART: [art] Store in in slot 0x4
3,082,936 UART: [art] Derive Key Pair
3,083,296 UART: [art] Store priv key in slot 0x5
3,097,012 UART: [art] Derive Key Pair - Done
3,111,814 UART: [art] Signing Cert with AUTHO
3,112,294 UART: RITY.KEYID = 7
3,127,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,343 UART: [art] PUB.X = 951DDB8267A73A7B8BFC81BE053DD760FC85D86A7FE5EFCBA78EE859F95942E1B51E6A86495A7B543B6922F2FEA7BC47
3,135,128 UART: [art] PUB.Y = E7306F24B50724BB79BFF59556EEDB021E38F63EA5966D77780ABD5250F3185BF5A1EFDEC716559F809F493D51671838
3,142,071 UART: [art] SIG.R = 04BB170AFBF42BFA3D836E47CF1F288D7E7FC31F408B1C4FE23178FE55C2F89F7D80439A8C6254363EFEFBFC6A420D40
3,148,850 UART: [art] SIG.S = 3F660AD6659C00959A81CE98A19BAF22517968CB6725BFF62C206001C3AC45537E9843C14F12505D5C1827FEBA024EA5
3,172,454 UART: Caliptra RT
3,172,799 UART: [state] CFI Enabled
3,281,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,036 UART: [rt]cmd =0x46505652, len=4
3,312,696 UART: [rt] FIPS Version
3,313,825 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,954 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,226 >>> mbox cmd response data (36 bytes)
1,140,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,713 >>> mbox cmd response: success
2,626,713 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,499 UART:
2,689,515 UART: Running Caliptra FMC ...
2,689,923 UART:
2,690,066 UART: [state] CFI Enabled
2,700,629 UART: [fht] FMC Alias Private Key: 7
2,809,254 UART: [art] Extend RT PCRs Done
2,809,682 UART: [art] Lock RT PCRs Done
2,811,174 UART: [art] Populate DV Done
2,819,519 UART: [fht] FMC Alias Private Key: 7
2,820,605 UART: [art] Derive CDI
2,820,885 UART: [art] Store in in slot 0x4
2,906,494 UART: [art] Derive Key Pair
2,906,854 UART: [art] Store priv key in slot 0x5
2,920,584 UART: [art] Derive Key Pair - Done
2,935,156 UART: [art] Signing Cert with AUTHO
2,935,636 UART: RITY.KEYID = 7
2,950,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,381 UART: [art] PUB.X = 3240AD2DE3F4CB15DA4FFB93F35FC810771AAFAEDFB75C785D04AF263507A9D42CF0967DFE34C6031A2EE8C98D66CC32
2,958,164 UART: [art] PUB.Y = B68C10383BE049D8C369EFAF9398F8DBBE39D509198BFBAFC043705632E504A2DF2A61A7CECBAD82BD2F34B1637913F3
2,965,124 UART: [art] SIG.R = 24E2BB1393D65926A6357E83CB213AC4CBB0E1076268D8D3E87CD5A4603AD1DD57D160D97F743F76BE330E59BB6E68CC
2,971,898 UART: [art] SIG.S = 05189A12608128437AB15B4E4AE57CC66B2C27ABD8E9786DEF66CADD088AFF9677E15AD0EFFF3D9F08D0C0F9DC05E63D
2,995,313 UART: Caliptra RT
2,995,658 UART: [state] CFI Enabled
3,104,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,465 UART: [rt]cmd =0x46505652, len=4
3,135,125 UART: [rt] FIPS Version
3,136,264 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
890,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,845 UART: [kat] ++
894,997 UART: [kat] sha1
899,137 UART: [kat] SHA2-256
901,077 UART: [kat] SHA2-384
903,792 UART: [kat] SHA2-512-ACC
905,693 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,868 UART: [kat] LMS
1,168,180 UART: [kat] --
1,169,187 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,261 UART: [idev] ++
1,172,429 UART: [idev] CDI.KEYID = 6
1,172,790 UART: [idev] SUBJECT.KEYID = 7
1,173,215 UART: [idev] UDS.KEYID = 0
1,173,561 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,169 UART: [idev] Erasing UDS.KEYID = 0
1,197,989 UART: [idev] Sha1 KeyId Algorithm
1,206,813 UART: [idev] --
1,207,724 UART: [ldev] ++
1,207,892 UART: [ldev] CDI.KEYID = 6
1,208,256 UART: [ldev] SUBJECT.KEYID = 5
1,208,683 UART: [ldev] AUTHORITY.KEYID = 7
1,209,146 UART: [ldev] FE.KEYID = 1
1,214,126 UART: [ldev] Erasing FE.KEYID = 1
1,239,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,388 UART: [ldev] --
1,278,824 UART: [fwproc] Wait for Commands...
1,279,565 UART: [fwproc] Recv command 0x46505652
1,280,392 UART: [rt] FIPS Version
1,280,953 >>> mbox cmd response data (36 bytes)
1,280,954 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,281,117 UART: [fwproc] Recv command 0x46574c44
1,281,850 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,205 >>> mbox cmd response: success
2,772,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,354 UART: [afmc] ++
2,773,522 UART: [afmc] CDI.KEYID = 6
2,773,885 UART: [afmc] SUBJECT.KEYID = 7
2,774,311 UART: [afmc] AUTHORITY.KEYID = 5
2,809,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,433 UART: [afmc] --
2,852,495 UART: [cold-reset] --
2,853,405 UART: [state] Locking Datavault
2,854,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,850 UART: [state] Locking ICCM
2,855,508 UART: [exit] Launching FMC @ 0x40000130
2,860,837 UART:
2,860,853 UART: Running Caliptra FMC ...
2,861,261 UART:
2,861,315 UART: [state] CFI Enabled
2,871,384 UART: [fht] FMC Alias Private Key: 7
2,979,521 UART: [art] Extend RT PCRs Done
2,979,949 UART: [art] Lock RT PCRs Done
2,981,239 UART: [art] Populate DV Done
2,989,384 UART: [fht] FMC Alias Private Key: 7
2,990,464 UART: [art] Derive CDI
2,990,744 UART: [art] Store in in slot 0x4
3,076,211 UART: [art] Derive Key Pair
3,076,571 UART: [art] Store priv key in slot 0x5
3,089,739 UART: [art] Derive Key Pair - Done
3,104,356 UART: [art] Signing Cert with AUTHO
3,104,836 UART: RITY.KEYID = 7
3,120,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,787 UART: [art] PUB.X = 48E0A502713CD4CC9A81EDB8E21FE91E0042442E6A4E587B947449447ECD835C22E7A608C68D1D4BE4CAF7B95A39224E
3,127,537 UART: [art] PUB.Y = 0E51793F49DF37BDB8A2C463A083C1BA106DA5C8951296E97B748C3C5CB5DF607FEA4035E76E07605AF626315BB6E8F6
3,134,489 UART: [art] SIG.R = 158ADE90DBFCF2B344C5F852A2C481CA7F64C8D91A89DDDFCE6E713B332C48E3BEB32E42B0DD8D74CFE92393A00E9192
3,141,278 UART: [art] SIG.S = 1457ED24211693AA594056E46B2019D2483A2A818B2205BEB9A6CD00960B4071FB55AC8694EA1284E2A9BB869C48DD67
3,165,839 UART: Caliptra RT
3,166,092 UART: [state] CFI Enabled
3,274,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,755 UART: [rt]cmd =0x46505652, len=4
3,305,415 UART: [rt] FIPS Version
3,306,460 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,768 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,792 >>> mbox cmd response data (36 bytes)
1,136,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,507 >>> mbox cmd response: success
2,623,507 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,297 UART:
2,685,313 UART: Running Caliptra FMC ...
2,685,721 UART:
2,685,775 UART: [state] CFI Enabled
2,695,860 UART: [fht] FMC Alias Private Key: 7
2,803,959 UART: [art] Extend RT PCRs Done
2,804,387 UART: [art] Lock RT PCRs Done
2,806,091 UART: [art] Populate DV Done
2,814,576 UART: [fht] FMC Alias Private Key: 7
2,815,758 UART: [art] Derive CDI
2,816,038 UART: [art] Store in in slot 0x4
2,902,143 UART: [art] Derive Key Pair
2,902,503 UART: [art] Store priv key in slot 0x5
2,915,109 UART: [art] Derive Key Pair - Done
2,929,936 UART: [art] Signing Cert with AUTHO
2,930,416 UART: RITY.KEYID = 7
2,945,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,653 UART: [art] PUB.X = F41216022FF5E9CA7E848D11903BD1B8250B9A87B7193C8984AA2AED7187E149EC5B8C94745B26CCD36CC7BBED68D16C
2,953,429 UART: [art] PUB.Y = 1D8C2FD06D08E2AD2E1B05AE9061F2E4431275B8E698454B25EF82894800B93558C4B3A73145C51B1B7515AE350FC01D
2,960,348 UART: [art] SIG.R = DE6C4A4DD11FB96471C7AB35D7DEEC90F7AFDBDAC3081C1BD4A684A7EE8A5C8E664D3441119F29F1E21338F667E2F29B
2,967,137 UART: [art] SIG.S = 93A356CA97007D2481A3DADF05EEE4BA01955E9E9C7B778367DF5EC9122DCB8DA4014089AEB78DB87715173D1B4355C3
2,990,675 UART: Caliptra RT
2,990,928 UART: [state] CFI Enabled
3,099,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,656 UART: [rt]cmd =0x46505652, len=4
3,130,316 UART: [rt] FIPS Version
3,131,449 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,198,646 UART: [idev] Sha1 KeyId Algorithm
1,207,518 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46505652
1,283,013 UART: [rt] FIPS Version
1,283,574 >>> mbox cmd response data (36 bytes)
1,283,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,283,706 UART: [fwproc] Recv command 0x46574c44
1,284,439 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,206 >>> mbox cmd response: success
2,775,206 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,389 UART: [afmc] ++
2,776,557 UART: [afmc] CDI.KEYID = 6
2,776,920 UART: [afmc] SUBJECT.KEYID = 7
2,777,346 UART: [afmc] AUTHORITY.KEYID = 5
2,812,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,860 UART: [afmc] --
2,855,852 UART: [cold-reset] --
2,856,584 UART: [state] Locking Datavault
2,857,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,285 UART: [state] Locking ICCM
2,858,721 UART: [exit] Launching FMC @ 0x40000130
2,864,050 UART:
2,864,066 UART: Running Caliptra FMC ...
2,864,474 UART:
2,864,617 UART: [state] CFI Enabled
2,875,148 UART: [fht] FMC Alias Private Key: 7
2,982,671 UART: [art] Extend RT PCRs Done
2,983,099 UART: [art] Lock RT PCRs Done
2,984,747 UART: [art] Populate DV Done
2,992,974 UART: [fht] FMC Alias Private Key: 7
2,993,958 UART: [art] Derive CDI
2,994,238 UART: [art] Store in in slot 0x4
3,080,341 UART: [art] Derive Key Pair
3,080,701 UART: [art] Store priv key in slot 0x5
3,093,705 UART: [art] Derive Key Pair - Done
3,108,634 UART: [art] Signing Cert with AUTHO
3,109,114 UART: RITY.KEYID = 7
3,124,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,113 UART: [art] PUB.X = FBE842160A143C01181761C25E9B98C69953137098677FB2AC1C233CC4BD0E3D3AB38FD2AC40C0F4D419FD793FD6116A
3,131,880 UART: [art] PUB.Y = 90875814B2ED3ABD30C46CA5EF08E783432D5B6FA5177AFAE9AAC9CA2A9FC1EFC4CD56675C9E74070D48941AF62512DA
3,138,839 UART: [art] SIG.R = 5B5F613D26B78E52AA6173C87D14354F0AA0E6F18B2A88784FAEDC0B50576856A4B286F673802123EB669B04868D41EC
3,145,600 UART: [art] SIG.S = AD5B8E73A0D6E308C84CA7CD16FFA20FB8E80B2BB4FB660C2E368228B6D0A4ED058F91DB8065EA0A1AB772BE755DECBC
3,169,759 UART: Caliptra RT
3,170,104 UART: [state] CFI Enabled
3,278,087 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,593 UART: [rt]cmd =0x46505652, len=4
3,309,253 UART: [rt] FIPS Version
3,310,526 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,333 >>> mbox cmd response data (36 bytes)
1,136,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,766 >>> mbox cmd response: success
2,621,766 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,828 UART:
2,683,844 UART: Running Caliptra FMC ...
2,684,252 UART:
2,684,395 UART: [state] CFI Enabled
2,694,948 UART: [fht] FMC Alias Private Key: 7
2,802,911 UART: [art] Extend RT PCRs Done
2,803,339 UART: [art] Lock RT PCRs Done
2,804,837 UART: [art] Populate DV Done
2,813,306 UART: [fht] FMC Alias Private Key: 7
2,814,332 UART: [art] Derive CDI
2,814,612 UART: [art] Store in in slot 0x4
2,900,021 UART: [art] Derive Key Pair
2,900,381 UART: [art] Store priv key in slot 0x5
2,913,107 UART: [art] Derive Key Pair - Done
2,927,933 UART: [art] Signing Cert with AUTHO
2,928,413 UART: RITY.KEYID = 7
2,943,473 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,238 UART: [art] PUB.X = 10BFA5ECE55F4AF39B619D762FFC997545F3245F1272A2572FB089F0DF2E1C66BFE2C7F46D33CCA97C8C6C86F07F496B
2,951,024 UART: [art] PUB.Y = 06758F6FAD9CE3C77AB5C7119D0507D167F132B4F1A87BA5D3A765070150E465E52A0B9377007A08C4D13D351F2CFEE6
2,957,935 UART: [art] SIG.R = 21D44F0B4CA5EA867D0D3CE49BE10D0217EE0E77F51BFB613BE56B1903A9F10F52F2A2E12592CA0F76C41A1AD0FC50C5
2,964,699 UART: [art] SIG.S = F4930635610D1330451A75B0849DE1A715506602B34B01E59083734E216311F26DD2514895C97A9BDC0D48AD21412F52
2,988,289 UART: Caliptra RT
2,988,634 UART: [state] CFI Enabled
3,096,163 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,943 UART: [rt]cmd =0x46505652, len=4
3,127,603 UART: [rt] FIPS Version
3,128,524 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,297 UART: [kat] SHA2-256
882,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,343 UART: [kat] ++
886,495 UART: [kat] sha1
890,713 UART: [kat] SHA2-256
892,651 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,436 UART: [idev] ++
1,479,604 UART: [idev] CDI.KEYID = 6
1,479,964 UART: [idev] SUBJECT.KEYID = 7
1,480,388 UART: [idev] UDS.KEYID = 0
1,480,733 ready_for_fw is high
1,480,733 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,688 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,266 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,521,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,815 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 115196 bytes
2,895,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,028 >>> mbox cmd response: success
3,089,028 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,090,204 UART: [afmc] ++
3,090,372 UART: [afmc] CDI.KEYID = 6
3,090,734 UART: [afmc] SUBJECT.KEYID = 7
3,091,159 UART: [afmc] AUTHORITY.KEYID = 5
3,125,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,680 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,073 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,763 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,828 UART: [afmc] --
3,168,892 UART: [cold-reset] --
3,169,678 UART: [state] Locking Datavault
3,170,707 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,311 UART: [state] Locking ICCM
3,171,869 UART: [exit] Launching FMC @ 0x40000130
3,177,198 UART:
3,177,214 UART: Running Caliptra FMC ...
3,177,622 UART:
3,177,676 UART: [state] CFI Enabled
3,187,761 UART: [fht] FMC Alias Private Key: 7
3,295,606 UART: [art] Extend RT PCRs Done
3,296,034 UART: [art] Lock RT PCRs Done
3,297,652 UART: [art] Populate DV Done
3,306,059 UART: [fht] FMC Alias Private Key: 7
3,307,019 UART: [art] Derive CDI
3,307,299 UART: [art] Store in in slot 0x4
3,392,872 UART: [art] Derive Key Pair
3,393,232 UART: [art] Store priv key in slot 0x5
3,406,550 UART: [art] Derive Key Pair - Done
3,421,374 UART: [art] Signing Cert with AUTHO
3,421,854 UART: RITY.KEYID = 7
3,436,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,603 UART: [art] PUB.X = CF3F03D58837582CE8A5FEBADE51AA60952DC21761D64CDB130B724E3A5BE7BAEA4D8005C4956800AADB8291FDFE8FE0
3,444,364 UART: [art] PUB.Y = 1675602E2C8ADA672142E45EDA03C7306A1F289161462D3DFEF68A082962F634B2ABE440B8FBA4ED0D826237663EC406
3,451,304 UART: [art] SIG.R = E855EF42D65DF4183862E42F59B128A55C17CF3F2DC27D5084C50970742332694268A7318F6BB221AD31E9DCBB59B3E5
3,458,071 UART: [art] SIG.S = 1435033BD58AA5F45350CE39D61E0B3BED2893D3A1E3FBD672AC41CE4548BB2D38BB75793933C1E090A6CE51130472CA
3,481,603 UART: Caliptra RT
3,481,856 UART: [state] CFI Enabled
3,590,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,931 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,070 >>> mbox cmd response: success
2,938,070 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,000,058 UART:
3,000,074 UART: Running Caliptra FMC ...
3,000,482 UART:
3,000,536 UART: [state] CFI Enabled
3,010,925 UART: [fht] FMC Alias Private Key: 7
3,118,304 UART: [art] Extend RT PCRs Done
3,118,732 UART: [art] Lock RT PCRs Done
3,120,530 UART: [art] Populate DV Done
3,128,579 UART: [fht] FMC Alias Private Key: 7
3,129,531 UART: [art] Derive CDI
3,129,811 UART: [art] Store in in slot 0x4
3,215,090 UART: [art] Derive Key Pair
3,215,450 UART: [art] Store priv key in slot 0x5
3,228,674 UART: [art] Derive Key Pair - Done
3,243,487 UART: [art] Signing Cert with AUTHO
3,243,967 UART: RITY.KEYID = 7
3,259,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,914 UART: [art] PUB.X = 1A1F72B7FA5CD77C62CE6F2FD4240F94E12FC06BD89F7A69338E4878DC6E531C94E6FC0A862F49720E861391C96A8FF3
3,266,685 UART: [art] PUB.Y = 2235C38DF1E469187AC68AFA0834B2454E89F73B28E597E8D2CE5304306BD4C44605A472B1685EC839BD131440F11E8B
3,273,624 UART: [art] SIG.R = 2A5BAE0E072FC8F0A0936CFA616DF4F16F0E3A7363F1105D29DF6E5E323979269145495474CFFF597D8E602C0FA38E5B
3,280,390 UART: [art] SIG.S = 81E023978398D0096547817E49DB4684215A3C4B6C74C3B0AB81FDBB263514D9F45DD82A3D047CF2BB8F64E47CE26576
3,303,445 UART: Caliptra RT
3,303,698 UART: [state] CFI Enabled
3,412,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,437 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,426 UART: [kat] SHA2-256
882,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,472 UART: [kat] ++
886,624 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,833 UART: [kat] LMS
1,476,029 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,306 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 ready_for_fw is high
1,481,326 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,217 UART: [idev] Erasing UDS.KEYID = 0
1,505,789 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,558 UART: [ldev] Erasing FE.KEYID = 1
1,548,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,151 UART: [ldev] --
1,587,466 UART: [fwproc] Waiting for Commands...
1,588,297 UART: [fwproc] Received command 0x46574c44
1,589,088 UART: [fwproc] Received Image of size 115196 bytes
2,897,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,210 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,829 >>> mbox cmd response: success
3,090,829 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,092,063 UART: [afmc] ++
3,092,231 UART: [afmc] CDI.KEYID = 6
3,092,593 UART: [afmc] SUBJECT.KEYID = 7
3,093,018 UART: [afmc] AUTHORITY.KEYID = 5
3,128,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,557 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,337 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,950 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,640 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,671 UART: [afmc] --
3,171,607 UART: [cold-reset] --
3,172,537 UART: [state] Locking Datavault
3,173,620 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,224 UART: [state] Locking ICCM
3,174,672 UART: [exit] Launching FMC @ 0x40000130
3,180,001 UART:
3,180,017 UART: Running Caliptra FMC ...
3,180,425 UART:
3,180,568 UART: [state] CFI Enabled
3,191,179 UART: [fht] FMC Alias Private Key: 7
3,299,414 UART: [art] Extend RT PCRs Done
3,299,842 UART: [art] Lock RT PCRs Done
3,301,278 UART: [art] Populate DV Done
3,309,631 UART: [fht] FMC Alias Private Key: 7
3,310,811 UART: [art] Derive CDI
3,311,091 UART: [art] Store in in slot 0x4
3,396,588 UART: [art] Derive Key Pair
3,396,948 UART: [art] Store priv key in slot 0x5
3,410,674 UART: [art] Derive Key Pair - Done
3,425,546 UART: [art] Signing Cert with AUTHO
3,426,026 UART: RITY.KEYID = 7
3,441,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,065 UART: [art] PUB.X = 715E0E709EA1CD58889A4CED3EBA7FF8E44CFF1EDC105414AB585703303A592C48FA1A3A1FE2BC41D3C350FC71467734
3,448,843 UART: [art] PUB.Y = 029EBDFE8501CD656BCCEDFD7FCDD6089DF470C516E377F245E42BC55D7E656B5EE3770EC00D2D8F2CC753B6E2CAF425
3,455,802 UART: [art] SIG.R = 57073625FDA0A960F9256B6B28F7FD04031325DAF2F03C466390A4599FAFCB451ACD189FCDC29853D59FDD5CABB4E4BB
3,462,579 UART: [art] SIG.S = 48D3AF0F4B3B2D5E270305FB3C7B5F11B6D2D6BF9B1043CF50E7EA3F1BBF834DC2611AE21E452146D3C74949E488D9AB
3,486,459 UART: Caliptra RT
3,486,804 UART: [state] CFI Enabled
3,595,696 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,128 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,608 ready_for_fw is high
1,362,608 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,607 >>> mbox cmd response: success
2,938,607 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,998,775 UART:
2,998,791 UART: Running Caliptra FMC ...
2,999,199 UART:
2,999,342 UART: [state] CFI Enabled
3,009,983 UART: [fht] FMC Alias Private Key: 7
3,117,852 UART: [art] Extend RT PCRs Done
3,118,280 UART: [art] Lock RT PCRs Done
3,120,090 UART: [art] Populate DV Done
3,128,235 UART: [fht] FMC Alias Private Key: 7
3,129,311 UART: [art] Derive CDI
3,129,591 UART: [art] Store in in slot 0x4
3,215,432 UART: [art] Derive Key Pair
3,215,792 UART: [art] Store priv key in slot 0x5
3,229,260 UART: [art] Derive Key Pair - Done
3,244,192 UART: [art] Signing Cert with AUTHO
3,244,672 UART: RITY.KEYID = 7
3,260,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,805 UART: [art] PUB.X = 7CA3F89C9DACD28BD07B8717992441B727EAA24154527F9B59EDE1DCE74549BEA2336348BEBE1BEA2BCDC39422CAB80E
3,267,592 UART: [art] PUB.Y = 2E8E5E444DE10BFF928678F6C717A3F263A303D44B674E8F49B11D77AFAE60CE7193A56C9662D9363B8F6AAE7A845D9B
3,274,546 UART: [art] SIG.R = 045C7891D55405F60CF1914474B2E95D846557D42F16B54B623CFAA24789FEB1126A72D9FD0EDC9E21614936B994F81F
3,281,302 UART: [art] SIG.S = D11D1F8B92B4BF1B9AC120E34261A31D68EB6173A6A9AD34C58E6197B938565A80C73E33378E88D73655949B137057EB
3,305,475 UART: Caliptra RT
3,305,820 UART: [state] CFI Enabled
3,413,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,527 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
902,041 UART: [kat] SHA2-256
903,981 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,451 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 ready_for_fw is high
1,176,527 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,201,367 UART: [idev] Sha1 KeyId Algorithm
1,209,885 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,555 UART: [ldev] Erasing FE.KEYID = 1
1,243,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,577 UART: [ldev] --
1,282,960 UART: [fwproc] Wait for Commands...
1,283,676 UART: [fwproc] Recv command 0x46574c44
1,284,404 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,062 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,283 >>> mbox cmd response: success
2,787,283 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,788,295 UART: [afmc] ++
2,788,463 UART: [afmc] CDI.KEYID = 6
2,788,825 UART: [afmc] SUBJECT.KEYID = 7
2,789,250 UART: [afmc] AUTHORITY.KEYID = 5
2,824,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,218 UART: [afmc] --
2,868,158 UART: [cold-reset] --
2,868,910 UART: [state] Locking Datavault
2,870,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,827 UART: [state] Locking ICCM
2,871,383 UART: [exit] Launching FMC @ 0x40000130
2,876,712 UART:
2,876,728 UART: Running Caliptra FMC ...
2,877,136 UART:
2,877,190 UART: [state] CFI Enabled
2,887,835 UART: [fht] FMC Alias Private Key: 7
2,995,436 UART: [art] Extend RT PCRs Done
2,995,864 UART: [art] Lock RT PCRs Done
2,997,518 UART: [art] Populate DV Done
3,005,665 UART: [fht] FMC Alias Private Key: 7
3,006,735 UART: [art] Derive CDI
3,007,015 UART: [art] Store in in slot 0x4
3,092,892 UART: [art] Derive Key Pair
3,093,252 UART: [art] Store priv key in slot 0x5
3,106,432 UART: [art] Derive Key Pair - Done
3,121,457 UART: [art] Signing Cert with AUTHO
3,121,937 UART: RITY.KEYID = 7
3,137,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,888 UART: [art] PUB.X = 2860EC82557BFB141498ACA5F07F19646025392E39803BF6DB4710342AA0E13617097B1E64B76AE79DC7BB101A8304C8
3,144,648 UART: [art] PUB.Y = 74977094C0721DA7DFD65E6AB29C9F5CA9D1252FC9D84FDB0FF924EC4CAF53E6F918103CA92F6B2B7B930B51E6949882
3,151,604 UART: [art] SIG.R = 448A49CFA8F684CDA6BAD12DC8886338AAE45BE4BF754B76102E2D79CA75A4948770BECEFA91743A202CA4C1C97B5A11
3,158,390 UART: [art] SIG.S = 181B891F362B4FB8B79FFD459EFE302164242BA125050C6FB75829CBB7F85473DC757479B12CFBC8BCF3FDFC5D1D183D
3,181,687 UART: Caliptra RT
3,181,940 UART: [state] CFI Enabled
3,289,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,387 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 ready_for_fw is high
1,060,359 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,776 >>> mbox cmd response: success
2,637,776 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,700,124 UART:
2,700,140 UART: Running Caliptra FMC ...
2,700,548 UART:
2,700,602 UART: [state] CFI Enabled
2,711,289 UART: [fht] FMC Alias Private Key: 7
2,819,948 UART: [art] Extend RT PCRs Done
2,820,376 UART: [art] Lock RT PCRs Done
2,822,044 UART: [art] Populate DV Done
2,830,571 UART: [fht] FMC Alias Private Key: 7
2,831,663 UART: [art] Derive CDI
2,831,943 UART: [art] Store in in slot 0x4
2,917,550 UART: [art] Derive Key Pair
2,917,910 UART: [art] Store priv key in slot 0x5
2,930,930 UART: [art] Derive Key Pair - Done
2,945,430 UART: [art] Signing Cert with AUTHO
2,945,910 UART: RITY.KEYID = 7
2,961,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,791 UART: [art] PUB.X = 9812687E3E65CA97FD221C365A501EAC68967C02D2A21B948D98D63F003E123F7A638542A7E551E5674846D822F39B8B
2,968,530 UART: [art] PUB.Y = B34489B19963C3ADFAF36FB1BEA2D7B604DE3EF15EE969F7B3C6DCDD905E2B1F3E40BED2A3D6E88601E16D13E9A04310
2,975,496 UART: [art] SIG.R = 905788288E30D942E860CB28D94DE218DFA7F2404681A4E0CCE81F597093466A33C7F6342766E81D6C86877993765B38
2,982,254 UART: [art] SIG.S = D1A7B08F21A99110C0030282234497F6BB89CEEF8400E2E7B11FA3C76E7332061BC6ABB2C9FD089A15877E5B58EC4022
3,006,261 UART: Caliptra RT
3,006,514 UART: [state] CFI Enabled
3,114,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,346 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
893,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,834 UART: [kat] ++
897,986 UART: [kat] sha1
902,418 UART: [kat] SHA2-256
904,358 UART: [kat] SHA2-384
907,121 UART: [kat] SHA2-512-ACC
909,022 UART: [kat] ECC-384
918,839 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,173,172 UART: [fht] FHT @ 0x50003400
1,175,899 UART: [idev] ++
1,176,067 UART: [idev] CDI.KEYID = 6
1,176,427 UART: [idev] SUBJECT.KEYID = 7
1,176,851 UART: [idev] UDS.KEYID = 0
1,177,196 ready_for_fw is high
1,177,196 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,961 UART: [idev] Erasing UDS.KEYID = 0
1,202,310 UART: [idev] Sha1 KeyId Algorithm
1,210,964 UART: [idev] --
1,212,058 UART: [ldev] ++
1,212,226 UART: [ldev] CDI.KEYID = 6
1,212,589 UART: [ldev] SUBJECT.KEYID = 5
1,213,015 UART: [ldev] AUTHORITY.KEYID = 7
1,213,478 UART: [ldev] FE.KEYID = 1
1,218,762 UART: [ldev] Erasing FE.KEYID = 1
1,245,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,014 UART: [ldev] --
1,284,457 UART: [fwproc] Wait for Commands...
1,285,235 UART: [fwproc] Recv command 0x46574c44
1,285,963 UART: [fwproc] Recv'd Img size: 115196 bytes
2,595,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,849 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,836 >>> mbox cmd response: success
2,787,836 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,789,038 UART: [afmc] ++
2,789,206 UART: [afmc] CDI.KEYID = 6
2,789,568 UART: [afmc] SUBJECT.KEYID = 7
2,789,993 UART: [afmc] AUTHORITY.KEYID = 5
2,825,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,088 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,753 UART: [afmc] --
2,868,787 UART: [cold-reset] --
2,869,393 UART: [state] Locking Datavault
2,870,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,226 UART: [state] Locking ICCM
2,871,680 UART: [exit] Launching FMC @ 0x40000130
2,877,009 UART:
2,877,025 UART: Running Caliptra FMC ...
2,877,433 UART:
2,877,576 UART: [state] CFI Enabled
2,888,427 UART: [fht] FMC Alias Private Key: 7
2,996,316 UART: [art] Extend RT PCRs Done
2,996,744 UART: [art] Lock RT PCRs Done
2,998,240 UART: [art] Populate DV Done
3,006,413 UART: [fht] FMC Alias Private Key: 7
3,007,391 UART: [art] Derive CDI
3,007,671 UART: [art] Store in in slot 0x4
3,093,568 UART: [art] Derive Key Pair
3,093,928 UART: [art] Store priv key in slot 0x5
3,107,506 UART: [art] Derive Key Pair - Done
3,122,097 UART: [art] Signing Cert with AUTHO
3,122,577 UART: RITY.KEYID = 7
3,137,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,630 UART: [art] PUB.X = CC71D4952C69F7ACE0A8ECAE501365708DA5A36DCB6B2E8B3A832A9B80BFBCB6F48DDC88C1061CE7570E875D1F9A2835
3,145,414 UART: [art] PUB.Y = CC847BB9C246AA4E9472423FCD65648CC70F769C0E2E74ED9C3CB41EF2AA59DF7C968D87E592980AE7542FBAD3D89206
3,152,366 UART: [art] SIG.R = CA3A7254BC280964CE048F9450173AEA2426B7AD23414E8DDDB887D3610A2E79D778AB76BD0619CFCC250AC712583AD2
3,159,129 UART: [art] SIG.S = EB211BB6A3BB7DAE0F1EFC3023856F243994BC9A55029A2A54BBC39A0DF0D3A19E70807AD582676139C78DD6A98DDBCE
3,182,673 UART: Caliptra RT
3,183,018 UART: [state] CFI Enabled
3,291,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,444 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,760 ready_for_fw is high
1,060,760 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,455 >>> mbox cmd response: success
2,638,455 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,701,271 UART:
2,701,287 UART: Running Caliptra FMC ...
2,701,695 UART:
2,701,838 UART: [state] CFI Enabled
2,712,435 UART: [fht] FMC Alias Private Key: 7
2,820,108 UART: [art] Extend RT PCRs Done
2,820,536 UART: [art] Lock RT PCRs Done
2,821,864 UART: [art] Populate DV Done
2,830,021 UART: [fht] FMC Alias Private Key: 7
2,830,987 UART: [art] Derive CDI
2,831,267 UART: [art] Store in in slot 0x4
2,916,554 UART: [art] Derive Key Pair
2,916,914 UART: [art] Store priv key in slot 0x5
2,930,344 UART: [art] Derive Key Pair - Done
2,945,030 UART: [art] Signing Cert with AUTHO
2,945,510 UART: RITY.KEYID = 7
2,960,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,583 UART: [art] PUB.X = C03D05124097FF988EB5EFB63D3A983D28342AFEFA363D52EB19C0D2B5AA155AB5D7F42AD718F8A34662AC8F97C7D18D
2,968,366 UART: [art] PUB.Y = 9DAE55F959D5BF9287AD0CABE21E8CF165082E41CDAEBD23D413D3C01FA7CACC37A11CD2E132F72CD47835F124302DF0
2,975,332 UART: [art] SIG.R = 0C9F3D49A4121A6B92D62265B6BE15C0B3D4379A8B1FB8765D629C80061D94C64057F1737CFFDD266D115CFEA98ACABB
2,982,108 UART: [art] SIG.S = 22E0F5D7770D1738E0396F0D49DCC3E355BEBED6C0C4F9C50651364DE6D1F95B624B16188099258DD95D473EB1163639
3,006,262 UART: Caliptra RT
3,006,607 UART: [state] CFI Enabled
3,114,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,350 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 ready_for_fw is high
1,174,591 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,199,343 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,256 UART: [ldev] ++
1,209,424 UART: [ldev] CDI.KEYID = 6
1,209,788 UART: [ldev] SUBJECT.KEYID = 5
1,210,215 UART: [ldev] AUTHORITY.KEYID = 7
1,210,678 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,243,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,996 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,105 UART: [fwproc] Recv command 0x46574c44
1,283,838 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,727 >>> mbox cmd response: success
2,783,727 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,784,982 UART: [afmc] ++
2,785,150 UART: [afmc] CDI.KEYID = 6
2,785,513 UART: [afmc] SUBJECT.KEYID = 7
2,785,939 UART: [afmc] AUTHORITY.KEYID = 5
2,821,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,609 UART: [afmc] --
2,864,527 UART: [cold-reset] --
2,865,377 UART: [state] Locking Datavault
2,866,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,184 UART: [state] Locking ICCM
2,867,700 UART: [exit] Launching FMC @ 0x40000130
2,873,029 UART:
2,873,045 UART: Running Caliptra FMC ...
2,873,453 UART:
2,873,507 UART: [state] CFI Enabled
2,884,092 UART: [fht] FMC Alias Private Key: 7
2,992,473 UART: [art] Extend RT PCRs Done
2,992,901 UART: [art] Lock RT PCRs Done
2,994,731 UART: [art] Populate DV Done
3,002,834 UART: [fht] FMC Alias Private Key: 7
3,003,968 UART: [art] Derive CDI
3,004,248 UART: [art] Store in in slot 0x4
3,089,809 UART: [art] Derive Key Pair
3,090,169 UART: [art] Store priv key in slot 0x5
3,102,891 UART: [art] Derive Key Pair - Done
3,117,787 UART: [art] Signing Cert with AUTHO
3,118,267 UART: RITY.KEYID = 7
3,133,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,244 UART: [art] PUB.X = 9183B8944C9D717A257E93D3A53024F627EB1D4D5F6476866A05EE124D98F594B4A65F695D2E93904D6FFE2F8D23BCD6
3,141,013 UART: [art] PUB.Y = C3609B1F47BDABE2AF0CB43A1C4DD6C70C4B26E05944AEFCA3A513D9CF5EEA7984B076062F292DB986CF1981E76767CB
3,147,974 UART: [art] SIG.R = A16DF69C7E41F838FE1127FA1B7A44F9A6193C54FADEAD1BA6717A8E0E64C1C3B71B44FDD84A8D362DDB735591986344
3,154,755 UART: [art] SIG.S = 59608008E097E6D5D3657210E04445D6FBE8F4806092BA5EDF429F34C0D54A102FB6A7298BD80E3E12065DBE73618BF7
3,177,565 UART: Caliptra RT
3,177,818 UART: [state] CFI Enabled
3,284,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,299 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,350 ready_for_fw is high
1,056,350 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,461 >>> mbox cmd response: success
2,633,461 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,696,111 UART:
2,696,127 UART: Running Caliptra FMC ...
2,696,535 UART:
2,696,589 UART: [state] CFI Enabled
2,707,094 UART: [fht] FMC Alias Private Key: 7
2,814,101 UART: [art] Extend RT PCRs Done
2,814,529 UART: [art] Lock RT PCRs Done
2,816,267 UART: [art] Populate DV Done
2,824,590 UART: [fht] FMC Alias Private Key: 7
2,825,704 UART: [art] Derive CDI
2,825,984 UART: [art] Store in in slot 0x4
2,911,813 UART: [art] Derive Key Pair
2,912,173 UART: [art] Store priv key in slot 0x5
2,925,699 UART: [art] Derive Key Pair - Done
2,940,780 UART: [art] Signing Cert with AUTHO
2,941,260 UART: RITY.KEYID = 7
2,956,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,973 UART: [art] PUB.X = 2A5045A42F1CBC2E50869AF5EC72370F6C0F4D8D1969EC869A89C7902F98A98BE18360C777F99DCB651F80812073D3A2
2,963,739 UART: [art] PUB.Y = 68A0223F6A4AEDE3F97BCBF518D799A23A6E221EAC83DA06B1067CF0F1B4EDB688CC29C1A6C19AFC04599F079D385DFA
2,970,699 UART: [art] SIG.R = D5ABA025B0C9581809E7A4C9981C944464680C845EACF16A1E33FCB83C291FD73FBD726F8F2541B0632EE3EBD5D4FCCD
2,977,479 UART: [art] SIG.S = E960E8631A00C2D9B2547216C61B545FF06A5AC1F485FB2A8BE6F6284996E7CD8015A87CCA3B12A802B5BFD6B142B361
3,001,139 UART: Caliptra RT
3,001,392 UART: [state] CFI Enabled
3,108,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,566 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
891,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,014 UART: [kat] ++
896,166 UART: [kat] sha1
900,466 UART: [kat] SHA2-256
902,406 UART: [kat] SHA2-384
905,269 UART: [kat] SHA2-512-ACC
907,170 UART: [kat] ECC-384
916,979 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,688 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
1,175,054 ready_for_fw is high
1,175,054 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,834 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,433 UART: [ldev] Erasing FE.KEYID = 1
1,242,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,221 UART: [fwproc] Wait for Commands...
1,282,958 UART: [fwproc] Recv command 0x46574c44
1,283,691 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,076 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,188 >>> mbox cmd response: success
2,784,188 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,785,217 UART: [afmc] ++
2,785,385 UART: [afmc] CDI.KEYID = 6
2,785,748 UART: [afmc] SUBJECT.KEYID = 7
2,786,174 UART: [afmc] AUTHORITY.KEYID = 5
2,822,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,024 UART: [afmc] --
2,866,126 UART: [cold-reset] --
2,866,708 UART: [state] Locking Datavault
2,867,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,527 UART: [state] Locking ICCM
2,869,163 UART: [exit] Launching FMC @ 0x40000130
2,874,492 UART:
2,874,508 UART: Running Caliptra FMC ...
2,874,916 UART:
2,875,059 UART: [state] CFI Enabled
2,885,606 UART: [fht] FMC Alias Private Key: 7
2,993,959 UART: [art] Extend RT PCRs Done
2,994,387 UART: [art] Lock RT PCRs Done
2,995,959 UART: [art] Populate DV Done
3,004,372 UART: [fht] FMC Alias Private Key: 7
3,005,326 UART: [art] Derive CDI
3,005,606 UART: [art] Store in in slot 0x4
3,091,695 UART: [art] Derive Key Pair
3,092,055 UART: [art] Store priv key in slot 0x5
3,105,347 UART: [art] Derive Key Pair - Done
3,120,092 UART: [art] Signing Cert with AUTHO
3,120,572 UART: RITY.KEYID = 7
3,135,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,283 UART: [art] PUB.X = 8BD4D2D6FE09C2C3F3B4D040D8A12C2A0F03286E6491FB60BC7D17E75D60C21CDFD94114BC28F300FBDD174D6ECE01B8
3,143,039 UART: [art] PUB.Y = 9C84DA1E11E5D150B5B855503D680EC42B15B3010942C71F4EB89A653E3C9098B67E48015A2E562339BB14ABB1DA13FC
3,149,981 UART: [art] SIG.R = C847894396C6AD47F6738352FE21F84DC8E192D3C93395C80DA8CB00E2ABA5065BBB0364ED6CE932B619ABE793DDD9C0
3,156,732 UART: [art] SIG.S = E10B7CB3D18E0DC6CE0879A8584E4826E47105207BB23B573F3BA7139FA78AF7800F3890896CB4B6F89159E8EDDE7D2A
3,179,932 UART: Caliptra RT
3,180,277 UART: [state] CFI Enabled
3,289,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,981 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 ready_for_fw is high
1,056,435 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,264 >>> mbox cmd response: success
2,633,264 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,695,072 UART:
2,695,088 UART: Running Caliptra FMC ...
2,695,496 UART:
2,695,639 UART: [state] CFI Enabled
2,706,232 UART: [fht] FMC Alias Private Key: 7
2,814,315 UART: [art] Extend RT PCRs Done
2,814,743 UART: [art] Lock RT PCRs Done
2,815,861 UART: [art] Populate DV Done
2,824,056 UART: [fht] FMC Alias Private Key: 7
2,825,032 UART: [art] Derive CDI
2,825,312 UART: [art] Store in in slot 0x4
2,911,299 UART: [art] Derive Key Pair
2,911,659 UART: [art] Store priv key in slot 0x5
2,925,407 UART: [art] Derive Key Pair - Done
2,940,246 UART: [art] Signing Cert with AUTHO
2,940,726 UART: RITY.KEYID = 7
2,956,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,091 UART: [art] PUB.X = 0C5B4B1ED0830E649C9D8CCEA181813645281E4F679E9104AF955CE62DCFEBE728C4874F6373FB1EDFAA3EDE00423AFF
2,963,848 UART: [art] PUB.Y = 2E772FD447952CEAD1D996E76B40FC444D45B61BD9EC17703B50C67261DC84BA998BB63D04F8C8AB7A71935BEEA18AD9
2,970,809 UART: [art] SIG.R = 73A5A45FC69A82B5AD42962C6613307E7DD0DD2BAE255732F6E0EAFCF1E34AC90A8EA1652F5AFC602EF8D986DA992F3C
2,977,596 UART: [art] SIG.S = 12507C82A0FFC9826B57408978F53A592EAA5636716C698E4C4F7C17D894D358AFB8C770EBB942108C3AC318ADFE9162
3,001,547 UART: Caliptra RT
3,001,892 UART: [state] CFI Enabled
3,109,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,109 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,494 UART: [kat] SHA2-512-ACC
897,395 UART: [kat] ECC-384
902,522 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,655 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 ready_for_fw is high
1,480,835 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,378 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,520 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,520,925 UART: [ldev] Erasing FE.KEYID = 1
1,546,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,579 UART: [fwproc] Waiting for Commands...
1,586,300 UART: [fwproc] Received command 0x46574c44
1,587,091 UART: [fwproc] Received Image of size 7036 bytes
1,653,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,680,682 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,681,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,684,899 >>> mbox cmd response: success
1,686,069 UART: [afmc] ++
1,686,237 UART: [afmc] CDI.KEYID = 6
1,686,599 UART: [afmc] SUBJECT.KEYID = 7
1,687,024 UART: [afmc] AUTHORITY.KEYID = 5
1,721,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,737,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,738,348 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,744,069 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,749,964 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,755,676 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,763,399 UART: [afmc] --
1,764,429 UART: [cold-reset] --
1,765,089 UART: [state] Locking Datavault
1,766,608 UART: [state] Locking PCR0, PCR1 and PCR31
1,767,212 UART: [state] Locking ICCM
1,767,704 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,772,999 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,774,882 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,267 ready_for_fw is high
1,362,267 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,249 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
903,013 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,477,086 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,445 UART: [idev] ++
1,480,613 UART: [idev] CDI.KEYID = 6
1,480,973 UART: [idev] SUBJECT.KEYID = 7
1,481,397 UART: [idev] UDS.KEYID = 0
1,481,742 ready_for_fw is high
1,481,742 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,615 UART: [idev] Erasing UDS.KEYID = 0
1,506,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,341 UART: [idev] --
1,516,156 UART: [ldev] ++
1,516,324 UART: [ldev] CDI.KEYID = 6
1,516,687 UART: [ldev] SUBJECT.KEYID = 5
1,517,113 UART: [ldev] AUTHORITY.KEYID = 7
1,517,576 UART: [ldev] FE.KEYID = 1
1,523,002 UART: [ldev] Erasing FE.KEYID = 1
1,548,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,247 UART: [ldev] --
1,587,720 UART: [fwproc] Waiting for Commands...
1,588,541 UART: [fwproc] Received command 0x46574c44
1,589,332 UART: [fwproc] Received Image of size 7036 bytes
1,657,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,685,763 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,686,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,689,830 >>> mbox cmd response: success
1,690,854 UART: [afmc] ++
1,691,022 UART: [afmc] CDI.KEYID = 6
1,691,384 UART: [afmc] SUBJECT.KEYID = 7
1,691,809 UART: [afmc] AUTHORITY.KEYID = 5
1,726,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,742,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,743,549 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,749,270 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,755,165 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,760,877 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,768,854 UART: [afmc] --
1,769,790 UART: [cold-reset] --
1,770,764 UART: [state] Locking Datavault
1,772,183 UART: [state] Locking PCR0, PCR1 and PCR31
1,772,787 UART: [state] Locking ICCM
1,773,235 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,778,530 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,780,413 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 ready_for_fw is high
1,363,160 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,538,612 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,642 UART: [kat] LMS
1,170,970 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,415 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 ready_for_fw is high
1,176,315 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,940 UART: [idev] Erasing UDS.KEYID = 0
1,200,725 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,808 UART: [fwproc] Wait for Commands...
1,283,592 UART: [fwproc] Recv command 0x46574c44
1,284,320 UART: [fwproc] Recv'd Img size: 7036 bytes
1,352,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,979 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,381,095 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,384,108 >>> mbox cmd response: success
1,385,254 UART: [afmc] ++
1,385,422 UART: [afmc] CDI.KEYID = 6
1,385,784 UART: [afmc] SUBJECT.KEYID = 7
1,386,209 UART: [afmc] AUTHORITY.KEYID = 5
1,421,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,582 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,303 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,198 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,890 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,728 UART: [afmc] --
1,464,606 UART: [cold-reset] --
1,465,396 UART: [state] Locking Datavault
1,466,595 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,199 UART: [state] Locking ICCM
1,467,655 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,950 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,833 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,823 ready_for_fw is high
1,059,823 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,399 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
902,012 UART: [kat] SHA2-256
903,952 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,172,002 UART: [cold-reset] ++
1,172,436 UART: [fht] FHT @ 0x50003400
1,175,027 UART: [idev] ++
1,175,195 UART: [idev] CDI.KEYID = 6
1,175,555 UART: [idev] SUBJECT.KEYID = 7
1,175,979 UART: [idev] UDS.KEYID = 0
1,176,324 ready_for_fw is high
1,176,324 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,625 UART: [idev] Erasing UDS.KEYID = 0
1,200,876 UART: [idev] Sha1 KeyId Algorithm
1,209,424 UART: [idev] --
1,210,496 UART: [ldev] ++
1,210,664 UART: [ldev] CDI.KEYID = 6
1,211,027 UART: [ldev] SUBJECT.KEYID = 5
1,211,453 UART: [ldev] AUTHORITY.KEYID = 7
1,211,916 UART: [ldev] FE.KEYID = 1
1,216,982 UART: [ldev] Erasing FE.KEYID = 1
1,243,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,358 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,531 UART: [fwproc] Recv command 0x46574c44
1,284,259 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,324 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,440 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,361 >>> mbox cmd response: success
1,383,561 UART: [afmc] ++
1,383,729 UART: [afmc] CDI.KEYID = 6
1,384,091 UART: [afmc] SUBJECT.KEYID = 7
1,384,516 UART: [afmc] AUTHORITY.KEYID = 5
1,419,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,436,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,159 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,442,880 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,448,775 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,454,467 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,391 UART: [afmc] --
1,463,345 UART: [cold-reset] --
1,464,421 UART: [state] Locking Datavault
1,465,690 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,294 UART: [state] Locking ICCM
1,466,760 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,055 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,473,938 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,508 ready_for_fw is high
1,060,508 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,235,634 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
1,174,017 ready_for_fw is high
1,174,017 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,322 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 7036 bytes
1,350,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,377,553 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,674 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,381,564 >>> mbox cmd response: success
1,382,683 UART: [afmc] ++
1,382,851 UART: [afmc] CDI.KEYID = 6
1,383,214 UART: [afmc] SUBJECT.KEYID = 7
1,383,640 UART: [afmc] AUTHORITY.KEYID = 5
1,418,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,435,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,435,865 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,441,587 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,447,480 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,453,172 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,460,833 UART: [afmc] --
1,461,777 UART: [cold-reset] --
1,462,871 UART: [state] Locking Datavault
1,464,160 UART: [state] Locking PCR0, PCR1 and PCR31
1,464,764 UART: [state] Locking ICCM
1,465,388 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,470,683 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,472,566 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,231,218 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,195 UART: [kat] LMS
1,168,507 UART: [kat] --
1,169,258 UART: [cold-reset] ++
1,169,800 UART: [fht] FHT @ 0x50003400
1,172,508 UART: [idev] ++
1,172,676 UART: [idev] CDI.KEYID = 6
1,173,037 UART: [idev] SUBJECT.KEYID = 7
1,173,462 UART: [idev] UDS.KEYID = 0
1,173,808 ready_for_fw is high
1,173,808 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,038 UART: [idev] Sha1 KeyId Algorithm
1,207,816 UART: [idev] --
1,208,953 UART: [ldev] ++
1,209,121 UART: [ldev] CDI.KEYID = 6
1,209,485 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,909 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,451 UART: [fwproc] Recv'd Img size: 7036 bytes
1,349,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,377,458 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,579 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,381,587 >>> mbox cmd response: success
1,382,694 UART: [afmc] ++
1,382,862 UART: [afmc] CDI.KEYID = 6
1,383,225 UART: [afmc] SUBJECT.KEYID = 7
1,383,651 UART: [afmc] AUTHORITY.KEYID = 5
1,419,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,436,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,436,832 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,442,554 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,448,447 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,454,139 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,096 UART: [afmc] --
1,463,082 UART: [cold-reset] --
1,463,766 UART: [state] Locking Datavault
1,465,177 UART: [state] Locking PCR0, PCR1 and PCR31
1,465,781 UART: [state] Locking ICCM
1,466,455 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,471,750 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,473,633 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 ready_for_fw is high
1,056,023 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,233,447 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s